id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_1_shard_00001926_processed.jsonl/20882
|
Buyer Community> Trade Intelligence> Trade knowledge> Foreign Currency
Source: Mushroom Trade Mushroom Trade
Foreign Currency
Published: 17 Apr 2013 23:30:02 PST
A buyer and a seller who are in different countries rarely use the same currency. Payment is usually made in either the buyer's or the seller's currency or in a third mutually agreed-upon currency.
One of the risks associated with foreign trade is the uncertainty of the future exchange rates. The relative value between the two currencies could change between the time the deal is concluded and the time payment is received. If the exporter is not properly protected, a devaluation or depreciation of the foreign currency could cause the exporter to lose money. For example, if the buyer has agreed to pay 500,000 French francs for a shipment and the franc is valued at 20 cents, the seller would expect to receive US$100,000. If the franc later decreased in value to be worth 19 US cents, payment under the new rate would be only US$95,000, a loss of US$5,000 for the seller. On the other hand, if the foreign currency increases in value the exporter would get a windfall in extra profits. Nonetheless, most exporters are not interested in speculating on foreign exchange fluctuations and prefer to avoid risks.
If the buyer asks to make payment in a foreign currency, the exporter should consult an international banker before negotiating the sales contract. Banks can offer advice on the foreign exchange risks that exist with a particular currency. Some international banks can also help hedge against such a risk, by agreeing to purchase the foreign currency at a fixed price in dollars, regardless of the currencies value at the time the customer pays. Banks will normally charge a fee or discount the transaction for this service. If this mechanism is used, the bank's fee should be included in the price quotation.
Share this post:
Related Article
Most Popular
|
global_01_local_1_shard_00001926_processed.jsonl/20890
|
We Were Soldiers
First screened and reviewed in April 2002
Director: Randall Wallace. Cast: Mel Gibson, Sam Elliott, Barry Pepper, Greg Kinnear, Chris Klein, Madeleine Stowe, Keri Russell, Don Duong, Clark Gregg, Brian Tee, Josh Daugherty, Dylan Walsh, Ryan Hurst, Simbi Khali. Screenplay: Randall Wallace (based on the memoir We Were Soldiers Once...and Young by Lt. Gen. (Ret.) Harold G. Moore and Joseph L. Galloway).
Twitter Capsule: Decent, but reliably hedges bets every time it appears to test new ground. Awfully affirming for a Vietnam movie.
VOR: The modicum of respect for Vietnamese point of view should be a minimum; sad truth is this represents a real gesture. In every other way, pretty by-the-numbers for its genre.
Photo © 2002 Paramount Pictures/Icon Entertainment
The soldiers whom Randall Wallace's We Were Soldiers is designed to honor were indeed brave, self-sacrificing, and tested beyond what any human being should expect to experience. This is both the central assertion of Wallace's movie—adapted from the joint memoir of Lt. Gen. Harold G. Moore and Joseph Galloway, the characters played here by Mel Gibson and Barry Pepper—and also the hugest anxiety bedeviling the picture. As a whole, We Were Soldiers is an honorable effort but also a redundant one, not because it tells a story familiar from other films, and certainly not because the story deserves no retellings, but because it reprises an error that lesser war films are always in danger of committing. Though Wallace, most famous as the screenwriter of Braveheart, would probably never admit this, his film undermines the courage and goodness of its protagonists just as often as it celebrates them, because he indulges so many plotlines and character details that have nothing to do with his central purpose.
If We Were Soldiers genuinely believed that the stamina, commitment, and self-endangerment of soldiers on the battlefield were tantamount, self-justifying virtues, it is unlikely that the picture would load itself with so many scenes and images that are transparently engineered to make these men our heroes: Gibson and Chris Klein praying in a hospital chapel, Gibson leading his mob of angel-faced children in collective address to God, Greg Kinnear flashing his blue peepers and pearly whites, or Sam Elliott cracking wise with market-tested punchlines. Wallace intimates not so much that soldiers in battle are brave, but that these guys, categorically, are good blokes, and that fighting a war—like praying, or playing softball with your men, or making love to your wife—is but one of many conventional, interchangeable ways of expressing this inherent honorability. The film seems not to believe that we will root for these soldiers or grasp the scale of their bravery if it has not first convinced us that they are decent, Christian folk. If what I am saying sounds crazy or confusing, an excellent point of contrast is Ridley Scott's Black Hawk Down, which preceded We Were Soldiers in American cineplexes by only a matter of weeks. I harbor some ambivalences about other aspects of Black Hawk Down, but one thing Scott's film gets absolutely right is that it respects its characters enough to let their behaviors, decisions, and even their lapses as military men speak for themselves. Countless viewers have faulted Black Hawk Down for skimping on character detail, but in fact what distinguishes the film is precisely this emphasis on soldiery as a self-sufficient dramatic enterprise, one which does not necessarily "reveal character" or externalize any inborn goodness in the combatants. At the opposite end of the creative spectrum, Wallace's preferred strategy for celebrating the courage of his soldiers is to sink us in nearly an hour of narrative that has nothing to do with soldiery.
Things improve measurably once General Moore's forces arrive in Vietnam, and not just for the reasons I have described. Though Dean Semler's photography shows a disturbing tendency to aestheticize the countryside into orange sunsets and leafy vistas, as though he has learned no new tricks since Dances With Wolves, the editing gets tighter, the acting is stronger and more terse, and James Horner's musical score mostly gets out of the way. These are all victories, though in other ways the film never stops hedging its bets. For instance, a few stray scenes in a Vietnamese base camp have been widely trumpeted as a rare gesture to "humanizing the enemy" in an American war film, an attitude which many critics found to be lacking in Black Hawk Down. Indeed, Nazis, kamikazes, and Viet Cong have subsisted for so long in our cinematic canon as faceless scourges that the very impulse of We Were Soldiers to buck the trend is quite refreshing—but the careful viewer will still observe that Vietnamese troops retain the exclusive privilege of having their flesh desecrated in graphic, lingering slow-motion, a spectacle whose tastelessness would probably be more obvious if applied to American bodies. Another instance of honoring an age-old boundary that the film only appears to trascend involves its treatment of journalists. Just when Pepper's character, a war photographer, is handed a gun and absorbed into battle—implying, quite rarely for this genre, that newsmen and image-makers are not helplessly ineffectual—a late-arriving press corps reaffirms that the Meddlesome Liberal Media, people who (gasp!) wish to ask questions about armed conflict, remains a safe object for ridicule in pictures like this.
So it becomes a pattern in We Were Soldiers, even as its second half improves drastically on its first, that for every dramatic or structural step forward, there is usually a step back. The pattern recurs again in the honorable impulse to cede several scenes to the wives and girlfriends "back home," in stagily constructed and cosmetically awkward scenes that suggest the filmmakers' discomfort with this domestic idiom. On final reflection, the formal modesty and safely middlebrow themes of We Were Soldiers (combat devotion = religious devotion = family devotion, a sentiment most loudly articulated when Moore espouses about fatherhood and soldiery that "hopefully being good at one makes me better at the other") may well be the movie's most surprising gesture, since these attributes are much more customary in World War II films than in the fractious, left-leaning tradition of Vietnam narratives on screen. We Were Soldiers ultimately takes shape as a Vietnam movie that hard-right Repbulicans can get into bed with, and for better or for worse, that in itself must be some kind of feat. Grade: C+
Permalink Home 2002 ABC Blog E-Mail
|
global_01_local_1_shard_00001926_processed.jsonl/20932
|
Friday, December 10, 2004
New Version of "Twas the Night Before Christmas"
Today I received the following poem, forwarded in an email (mahalo to Jay!), and wanted to share it. The anonymous originator of the email claims it was written by a Marine. Whoever wrote it, I think it's worth sharing:
Subject: Twas the Night Before Christmas
Twas the night before Christmas, he lived all alone,
In a one bedroom house made of plaster and stone.
I had come down the chimney with presents to give,
And to see just who in this home did live.
I looked all about, a strange sight did I see,
No tinsel, no presents, not even a tree.
No stocking by mantle, just boots filled with sand,
On the wall hung pictures of far distant lands.
With medals and badges, awards of all kinds,
A sober thought came through my mind.
For this house was different, it was dark and dreary,
The soldier lay sleeping, silent, alone,
Curled up on the floor in this one bedroom home.
The face was so gentle, the room in such disorder,
Not how I pictured a United States soldier.
Was this the hero of whom I'd just read?
Curled up on a poncho, the floor for a bed?
I realized the families that I saw this night,
Owed their lives to these soldiers who were willing to fight.
Soon round the world, the children would play,
And grownups would celebrate a bright Christmas Day.
They all enjoyed freedom each month of the year,
Because of the soldiers, like the one lying here.
I couldn't help wonder how many lay alone,
On a cold Christmas Eve in a land far from home.
The very thought brought a tear to my eye,
I dropped to my knees and started to cry.
The soldier awakened and I heard a rough voice,
"Santa, don't cry, this life is my choice;
I fight for freedom, I don't ask for more,
The soldier rolled over and drifted to sleep,
I couldn't control it, I continued to weep.
I kept watch for hours, so silent and still
And we both shivered from the cold night's chill.
This guardian of honor so willing to fight.
Whispered, "Carry on, Santa, It's Christmas Day, all is secure."
At the end of the email was this: "This poem was written by a Marine. The following is his request. I think it is reasonable.....PLEASE. Would you do me the kind favor of sending this to as many people as you can? Christmas will becoming soon and some credit is due to our U.S. service men and women for our being able to celebrate these festivities. Let's try in this small way to pay a tiny bit of what we owe. Make people stop and think of our heroes, living and dead, who sacrificed themselves for us. Please, do your small part to plant this small seed. "
|
global_01_local_1_shard_00001926_processed.jsonl/20954
|
Neill Clift on Sun, 01 Jan 2017 04:47:21 +0100
Re: Getting a very large polynomial into pari/gp
On 12/31/2016 9:05 AM, Bill Allombert wrote:
> The libpari library provides a set of functions to deal with polynomials
> over F_p that implement the half-GCD algorithm but they are not directly
> available in GP.
> Try:
> install("FpX_gcd","GGG")
> p = 2^64-59;
> a = Pol(read(""));
> b = Pol(read(""));
> FpX_gcd(a,b,p)
> and actually since p is less than 2^64 there is another function that
> use a more compact representation of polynomials (Vecsmall), but the
> above function will do the conversions for you.
> Read about FpX, FpX_gcd, Flx and Flx_gcd in the documentation.
While the other gcd ran overnight this one failed in an hour.
(18:03) gp > FpX_gcd(a,b,p)
*** at top-level: FpX_gcd(a,b,p)
*** FpX_gcd: not enough memory
(19:08) gp >
This seems to be different from the stack size messages I have got
(stack size set to 64G).
> If you use Windows make sure to use the installer and ot the stand-alone
> binary. Unfortunately install() does not work with the stand-alone
> binary.
I believe I used the installer as I have a desktop icon that's a
shortcut to pari/gp and it shows installed in control panel.
> For this kind of computation, you should consider using the PARI library
> directly.
That was my initial thought as well but my first try at getting the code
to compile with just the Pari header included gave me errors:
1>../src/kernel/none/divll_pre.h(37): error C2275: 'pari_ulong': illegal
use of this type as an expression
1> c:\program files (x86)\pari64-2-9-1\include\pari\parigen.h(17):
note: see declaration of 'pari_ulong'
1>../src/kernel/none/divll_pre.h(37): error C2146: syntax error: missing
')' before identifier '__arg'
|
global_01_local_1_shard_00001926_processed.jsonl/20999
|
It is the (comparatively recent) pictures taken from space where the sheer blackness is staggering. Children have often thought of space as blue! So why should it be so demeaning to happen to have black skin? Actually, we generally worship as heroes those who have made their white skin darker, artificially or in the sun. Thanks be to God for darkness in the world, too.
1. Thanks be to God for making the darkness:
it isn't enough that you gave us the light;
2. without the night, we couldn't see the stars:
we shouldn't be able to sleep
if there were no rest from brightness.
3. The night brings its own kind of beauty and excitement:
it's the time for leisure and for real enjoyment;
4. we know that black is beautiful:
dark skin a sign of health in a white society;
5. it's blackness that shows up what happens in the light:
the drama on stage or screen
we see from darkened surroundings;
6. the sad sweet songs of past days praised the darkness:
the richest of all tunes in nature
comes from the nightingale.
7. Help us appreciate the dark in your creation:
Lucifer's the one who brings evil,
and he was the angel of light!
8. For you are God, and you rule the darkness as well as the day:
you have made the blackness of space majestic.
|
global_01_local_1_shard_00001926_processed.jsonl/21001
|
Information for "Missing Information"
From PubNight
Basic information
Display titleMissing Information
Default sort keyMissing Information
Page length (in bytes)3,527
Page ID2061
Page content languageen - English
Page content modelwikitext
Indexing by robotsAllowed
Number of redirects to this page0
Counted as a content pageYes
Page protection
EditAllow all users (infinite)
MoveAllow all users (infinite)
Edit history
Page creatorSteve (talk | contribs)
Date of page creation14:34, 2 June 2013
Latest editorSteve (talk | contribs)
Date of latest edit14:34, 2 June 2013
Total number of edits1
Total number of distinct authors1
Recent number of edits (within past 90 days)0
Recent number of distinct authors0
|
global_01_local_1_shard_00001926_processed.jsonl/21003
|
URLs du Jour
[Amazon Link]
• Sometimes Proverbs speaks timeless truths, and … sometimes it does not. Proverbs 14:23 is one in the latter category.
23 All hard work brings a profit,
but mere talk leads only to poverty.
The Proverbialist wrote in an era blessed with universal dire poverty. And without TED talks.
• At Reason, Katherine Mangu-Ward asks the musical question: Was Trump Elected to Take Revenge on Job-Stealing Robots? Noting the emotions that some people feel when watching robot videos:
The pathetic fallacy is a mental error in which people ascribe human feelings or thoughts to inanimate objects. This mostly leads to irrational behavior, such as resentment on behalf of robots that don't smart from mistreatment but instead grow smarter. It's the same shorthand of thought you indulge in when you say the robots are invading workplaces or stealing jobs. In fact, those are nonsensical concepts, at least for robots as they are currently constituted. Human beings are replacing some portions of many other human beings' jobs with labor-saving devices, as we have done for hundreds of years using tools such as tractors, blenders, and washing machines.
This is an article from the print version of the magazine, but it's been annotated with the videos to which she could only allude on paper.
So far, she's been doing a great job at editing one of my two favorite magazines.
• The "Enlightenment" has gotten a lot of good press lately, most notably from Steven Pinker's fine book Enlightenment Now. David Brooks at the NYT has also been a cheerleader. At the WSJ, Yoram Hazony demurs strongly, revealing The Dark Side of the Enlightenment.
Boosters of the Enlightenment make an attractive case. Science, medicine, free political institutions, the market economy—these things have dramatically improved our lives. They are all, Mr. Pinker writes, the result of “a process set in motion by the Enlightenment in the late 18th century,” when philosophers “replaced dogma, tradition and authority with reason, debate and institutions of truth-seeking.” Mr. Brooks concurs, assuring his readers that “the Enlightenment project gave us the modern world.” So give thanks for “thinkers like John Locke and Immanuel Kant who argued that people should stop deferring blindly to authority” and instead “think things through from the ground up.”
As Mr. Pinker sums it up: “Progress is a gift of the ideals of the Enlightenment, and will continue to the extent that we rededicate ourselves to those ideals.”
Very little of this is true. Consider the claim that the U.S. Constitution was a product of Enlightenment thought, derived by throwing out the political traditions of the past and applying unfettered human reason. Disproving this idea requires only reading earlier writers on the English constitution. The widely circulated 15th-century treatise “In Praise of the Laws of England,” written by the jurist John Fortescue, clearly explains due process and the theory now called “checks and balances.” The English constitution, Fortescue wrote, establishes personal liberty and economic prosperity by shielding the individual and his property from the government. The protections that appear in the U.S. Bill of Rights were mostly set down in the 1600s by those drafting England’s constitutional documents—men such as John Selden, Edward Hyde and Matthew Hale.
I still strongly recommend Pinker's book, but (as I noted after reading it) he can get "strident and simplistic" when he wanders too far afield from his scientific roots.
• James Lileks has an entertaining column (as usual) riffing on the mindlessness of Internet advertising: Can you buy a something online without committing to a lifetime of e-mail annoyance? And I mainly liked his acerbic comment on e-mail opt-outs, made necessary by his unwise disclosure of his address to a slipper-seller:
Anyway: The slipper company sends me an e-mail every day, with a promo code. I have attempted to unsubscribe, and I always get the same huffy message: "You have been unsubscribed to our e-mails. It may take several business days to process your request." Uh-huh. Like someone has to find the hard drive where my e-mail address is located, remove it from the rack and physically scratch the bits off the drive with a sharp tool.
Um, exactly. He hit a similar theme in the print edititon of National Review (probably subsciber-only, sorry).
Click. Click. Click. Click. Cart. Buy. After you’ve bought something, ads will follow you around the Internet for a week, each offering the same thing. Imagine buying a toilet seat in a store, then dealing with a guy who pops up at work, on the street, in your garage, offering another toilet seat.
I have to delete my cookies so I’m not offered more toilet seats, you’d think. Another phrase that makes perfect sense these days.
You don't even have to buy anything. I made the mistake of checking out the price on complete-season DVD sets of the great misunderestimated David Janssen series Harry O. Spoiler: the price is still exorbitant. But the Internet still remembers I looked, and asks me to come back and look again, day after day.
But if anyone wants to buy it for me, it's today's Amazon link du jour.
• And we missed National Beer Day. It was April 7. But (eventually) the Google LFOD alert pointed me to the UK [?] Yahoo! news article: Interesting Facts For All Brew Lovers
My first thought, and perhaps yours as well: I am not doing my fair share. Must try harder.
But my second thought was: probably it's due to out-of-staters driving to NH to avoid onerous taxes.
But I can't back that up with obvious evidence. Our usual punching bag, Massachusetts, has no sales tax on beer, and its excise tax ($0.11 per gallon) is much lower than New Hampshire's ($0.30/gallon). Vermont has a slightly lower excise tax rate ($0.27/gallon) but also sticks you with a 6% sales tax. Maine has a slightly higher excise tax ($0.35/gallon). and a 5.5% sales tax.
All in all, it appears we just like beer. A lot. And is it really that much? 41.7 gallons/year works out to 14.6 fluid ounces/day, just slightly over a standard can or bottle.
|
global_01_local_1_shard_00001926_processed.jsonl/21008
|
Quo Vadimus
Saturday, May 17, 2003
Words of Wisdom. #006:
BLVR: What kind of materials did you work with? Metal, wood?
JW: I wanted to work on more mid-century modern things like Noel and Herman Miller furniture when I first started apprenticing, but it's the most difficult upholstery you can do - I wasn't experienced enough to get into that yet. Also, the person I apprenticed for in Detroit had the market locked down and I didn't want to compete with him, so I was mostly doing antique furniture, you know, people's settees and chaise lounges and stuff like that. The clientele is mostly older people who could actually afford it, because it's pretty expensive.
BLVR: It's incredibly expensive, isn't it?
BLVR: Why is it so expensive?
JW: Say you want to re-upholster a couch. The couch is like twelve yards of fabric, and if you've got cheap fabric for $10 a yard (which would be really cheap), that's $120 already. Then it takes 35-40 hours of work to upholster a couch, so even if you work for $10 an hour, it would end up being like $560 to do a couch, not counting the padding, the cushion, all that stuff. So you couldn't just cut a deal; you can't upholster someone's couch for less than $1,000.
posted by Linus | 12:55 PM
|
global_01_local_1_shard_00001926_processed.jsonl/21049
|
3 Things I Hate (But Still Do Every Day)
A Toast to Pain: Our Most Valuable Teacher
The price of wisdom isn’t age, it’s pain — and that’s a good thing. Everyone can learn something from misery and use it to create.
Why I Will Never Go to The Doctor Again
Going to the doctor is a thing of the past. And we, my friends, live in the future.
When to Sever a Friendship
|
global_01_local_1_shard_00001926_processed.jsonl/21066
|
Best Bets for 1999
See allHide authors and affiliations
Science 18 Dec 1998:
Vol. 282, Issue 5397, pp. 2158
DOI: 10.1126/science.282.5397.2158
To find future winners in the research game, Science's editors turned to our crystal ball and saw six fields emerge:
Maturing research.
Genes that extend life in the fruit fly and worm have now confirmed the notion that individual genes can regulate aging. Next up: more genetics, plus a flurry of mechanistic work to try to pinpoint how certain enzymes, hormones, and cellular structures mold the aging process. Also expect a continuing flurry of studies of the now-trendy telomeres—DNA sequences on chromosome ends—whose shortening over time may contribute to cellular aging. Top priority: to test these ideas in human cells.
L. Yi-Jyun, L. Seroude, and S. Benzer, “Extended Life-Span and Stress Resistance in the Drosophila Mutant methuselah,” Science 282, 943 (30 October 1998).
A. G. Bodnar et al., “Extension of Life-Span by Introduction of Telomerase into Normal Human Cells,” Science 279, 349 (16 January 1998).
T. de Lange, “Telomeres and Senescence: Ending the Debate,” Science 279, 334 (16 January 1998).
L. Guarente, G. Ruvkun, and R. Amasino, “Aging, life span, and senescence,” Proceedings of the National Academy of Sciences 95, 11034 (1998).
Bioterror troubles. The superpowers halted aggressive biowarfare R&D 30 years ago, but a new threat is emerging, as smaller nations such as Iraq and even cults like the Aum Shinrikyo sect in Japan seek to exploit the deadly power of nature's toxins. In response, a worried U.S. Congress this year approved $150 million for civilian bioterrorism defense, funding medical supplies, disease surveillance, and new vaccine research.
Bioterror site
Crystal power. New Agers claiming that crystals channel vibes have it almost right. Specially tailored photonic crystals have latticelike structures that can transmit certain wavelengths of light while excluding others. This year researchers created the first optical fibers based on such crystals, which promise to carry light pulses farther without losing the signal. Look for a new world of crystal applications in areas from advanced sensors to telecommunications equipment.
J. C. Knight et al., “Photonic Band Gap Guidance in Optical Fibers,” Science 282, 1476 (20 November 1998). See also Knight et al. Web site
Sink search. One burning question in climate research concerns the so-called “missing sink”: Terrestrial plants seem to be sopping up carbon dioxide—staving off some greenhouse warming—but no one knows just where this sponge is or whether it's forests, croplands, or both. A controversial modeling study this year pointed to North America, but more debate is sure to come in 1999, as other modelers compare their results and new data come in from a worldwide network of towers measuring CO2 flowing in and out of forests.
Woods Hole Research Center page on the missing carbon sink
Carbon Dioxide Tower Network's Web site
United Nations site for the Convention on Climate Change, with emissions and sinks data for countries
IGBP Terrestrial Carbon Working Group, “The Terrestrial Carbon Cycle: Implications for the Kyoto Protocol,” Science 280, 1393 (29 May 1998).
S. Fan et al., “A Large Terrestrial Carbon Sink in North America Implied by Atmospheric and Oceanic Carbon Dioxide Data and Models,” Science 282, 442 (1998).
J. Kaiser, “Possibly Vast Greenhouse Gas Sponge Ignites Controversy,” Science 282, 386 (1998).
Take a deep breath. Allergies and asthma made headlines in 1998, as some U.S. schools and airlines banned peanuts to accommodate allergy sufferers and asthma cases rose to an estimated 155 million worldwide. But peanut butter could make a comeback if advances in understanding the dozens of molecules involved in allergic responses pay off. Trials for DNA vaccines and antibodies that block key steps in runaway immune reactions are set to begin in 1999, and nearly 200 different asthma treatments are in development or clinical trials. Expect some relief for sneezing and wheezing in 1999.
Lung information from NHLBI
NIAID home page
Global Initiative for Asthma home page
JAMA Asthma Information Center
European Federation of Asthma and Allergy Associations
ISAAC Steering Committee, “Worldwide variation in prevalence of symptoms of asthma, allergic rhinoconjunctivitis and atopic eczema: ISAAC,” The Lancet 351, 1225 (25 April 1998).
Once and future climate. A growing torrent of data is revealing why climate has varied, often abruptly, over the millennia. As researchers tie together climate records from oceans, lakes, and glacial ice, they are discovering the global nature of climatic jitters that can drive the planet halfway to an ice age in a decade—and that might pop up in a greenhouse world. As records are linked from pole to pole, expect the research flurry to move from the North Atlantic, where swings are strongest, to the tropics, where the trigger for millennial change may lie.
Meeting on Mechanisms of Millennial-Scale Global Climate change, 14-18 June 1998.
R. Kerr, “Warming's Unpleasant Surprise: Shivering in the Greenhouse?” Science 281, 156 (10 July 1998).
Navigate This Article
|
global_01_local_1_shard_00001926_processed.jsonl/21071
|
RE:[sap-log-sd] Setting batch printing job to print invoices?
Reply from Adriano on Feb 10 at 4:50 PM
I don't want to print my invoices to print upon creation. As you said, I would like to have a spool job. How this requirement can be met? How does spooling work in SAP invoice printing?
From: Adriano
Sent: Friday, February 10, 2012 3:50 PM
Subject: Setting batch printing job to print invoices?
We have a printer at corporate office. Name of the printer is CORP01. I want 20 invoices to be printed in that printer for testing purpose. Out basis team has configured the printer in SAP and I can view the printer in VF02-->Goto Header-->Output-->Communication method.
In VF02 goto header--> output-->RD00, I selected the printer and clicked 'print immediately' and saved. I came out of the document completely and in VF02 (Change billing document screen) for the same billing document, I selected billing document-->issue output to-->RD00-->Print.
I did it 20 times for 20 documents.
Now, I don't understand how to set up batch job and get it printed?
Reply to this email to post your response.
Manage Settings | Unsubscribe | Create FAQ | Send Feedback
Mark as helpful
View this online
Ask a new question
|
global_01_local_1_shard_00001926_processed.jsonl/21073
|
FATF Recommendations
Unique transaction reference number
refers to a combination of letters, numbers or symbols, determined by the payment service provider, in accordance with the protocols of the payment and settlement system or messaging system used for the wire transfer (as this term is used in the Interpretive note to Recommendation 16).
Source: Glossary of the FATF Recommendations
Vienna Convention
Virtual Asset
Source: Glossary of the FATF Recommendations
Virtual Asset Service Providers
i. exchange between virtual assets and fiat currencies;
ii. exchange between one or more forms of virtual assets;
iii. transfer1 of virtual assets;
Source: Glossary of the FATF Recommendations
Without delay
The phrase without delay means, ideally, within a matter of hours of a designation by the United Nations Security Council or its relevant Sanctions Committee (e.g. the 1267 Committee, the 1988 Committee, the 1718 Sanctions Committee). For the purposes of S/RES/1373(2001), the phrase without delay means upon having reasonable grounds, or a reasonable basis, to suspect or believe that a person or entity is a terrorist, one who finances terrorism or a terrorist organisation. In both cases, the phrase without delay should be interpreted in the context of the need to prevent the flight or dissipation of funds or other assets which are linked to terrorists, terrorist organisations, those who finance terrorism, and to the financing of proliferation of weapons of mass destruction, and the need for global, concerted action to interdict and disrupt their flow swiftly.
Source: Glossary of the FATF Recommendations
|
global_01_local_1_shard_00001926_processed.jsonl/21078
|
Feed on
keeping the faith
photo credits: http://i.dailymail.co.uk/i/pix/2013/03/12/article-2291993-189870E0000005DC-697_964x634.jpg
A few weeks before Lent, the Catholic community was shocked by the news of Pope Benedict XVI retiring on February 28, 2013. The 85-year-old pontiff is reportedly the first to retire in Roman Catholic church history, spanning a period of 600 years.
I pride myself for being raised as a product of a Catholic school from pre-school to high school, and if Lola Mama were still alive today she would have insisted I enroll the girls at a school similar to mine. I remember attending masses every Sunday (or anticipated masses on Saturdays), doing the Eucharistic fast at least an hour before mass, not missing Palm Sundays, attending lengthy services during Maundy Thursdays (washing of the feet) and salubongs (“welcoming”?) on Black Saturday nights for Easter Sundays. In Grade VI at my childhood province of Bongabon, Nueva Ecija I once wore a white dress and a blue veil and played the role of a live Mama Mary at the church Belen (nativity scene) in one of the midnight masses. But I have not been a perfectly devout Catholic, and until recently (as part of my New Year’s Resolutions which I have so far been keeping…) attending Sunday masses was optional, and actually done only insofar as may be convenient for us.
Sometime last year though, the first time our family attended a Sunday dawn mass during Christmas season, I felt this certain peace and serenity in my heart I could not explain. For a minute I felt transported back to my hometown of Cabanatuan, attending masses with my Mama. And it felt both light and heavy at the same time: lightness for feeling her presence very near me, and heaviness in the heart realizing it has been more than four years since I physically felt her warm embrace. Nonetheless the way I felt that time convinced me that it was her way of telling me to be a good example to our family, and to raise my kids in faith and good devotion the way she did with me.
It did not really shock me that the Pope would retire; after all, he is just human like the rest of us and has the biggest responsibility of guiding the Catholic community. I actually admire his strength and courage to admit he can no longer take on the task. This morning I was in church for Ash Wednesday and felt pride with the multitude of people also there to mark the beginning of Lent. It proved that despite the shocking news (well, for some) affecting our church leadership, we are firmly guided by faith and devotion above all. God bless the Pope, and God bless us all, as He always does.
Leave a Reply
|
global_01_local_1_shard_00001926_processed.jsonl/21089
|
The negotiations lasted into 1988, with Jobs becoming prickly
“If we scroll down the thesaurus, though, we see that the antonym is ‘saturnine.’ Well what’s that? By simply double-clicking on it, we immediately
look that up in the dictionary, and here it is: ‘Cold and steady in moods. Slow to act or change. Of a gloomy or surly disposition.’” A little smile came across his face as he waited for the ripple of laughter.
for a licensing fee,
but it never
got the chance to
change the world.
|
global_01_local_1_shard_00001926_processed.jsonl/21094
|
Resources > School News >
2018-19 Registration
posted Jul 17, 2018, 7:25 PM by DANIELLE IVEY
Parents: Student registration emails are being sent out for the 2018-19 school year. You can complete the paperwork for registration online. Adjustments are still being made to student schedules, but they will be finalized at registration on August 1 & 2. We appreciate your patience!
|
global_01_local_1_shard_00001926_processed.jsonl/21153
|
Installing RabbitMQ on Ubuntu server
RabbitMQ is a messaging broker. It means it can be used as a transport layer to communicate between some applications by sending and receding messages. Sounds quite simple but actually it’s not that simple and has a lot of features. For instance, unlike some other message broker it supports persistence . RabbitMQ is an Erlang application….
Read more
|
global_01_local_1_shard_00001926_processed.jsonl/21159
|
Areas of Advice
• No categories
The Advice Archive
Latest comments
Penis banding
Penis banding is the act of placing a constrictive material around the penis. The general goal is to decrease functionality of the penis by damaging nerves and other tissues in the penis.
This is accomplished in two ways: by reducing blood flow to the penis, thereby causing a mild form of necrosis, and/or by damaging the nerves and tissue directly beneath the band by sheer force.
The reasoning and goals behind this activity are widely varied. It can be performed as part of a BDSM function, where a dominant would have their submissive ‘band’ in an effort to show their commitment or servitude. It can also be performed as a form of chastity or orgasm denial, where the goal is either to numb the penis, or damage it to such an extent that it can no longer become erect, thus rendering it useless. This provides a means to deter someone from having orgasms without dealing with Chastity Devices.
Penis banding can be done with a variety of materials. Ranging from a shoelace or rubber bands, to using actual elastrator bands that are used on animals for castration. Generally, the aforementioned elestrator bands are preferred for the act. An elastrator kit is also essential, as it allows the user to apply the bands, which cannot be stretched open easily. Tools to remove the band, such as cat claw clippers or safety scissors, are necessary also, as the bands are difficult to take off.
Banding has its risks: if bands are left on too long, blood clots could form, resulting in a stroke. There are risks of getting gangrene also. Banding is unpredictable, and those who take part in it must ensure that they not apply the bands for too long; the longer that the bands are in place, the higher the risk of blood clotting is. Those who band usually intend to cause penile numbness for a few days, but this can often last as long as a few weeks. It is recommended that bands are not applied for more than sixty minutes.
The state of the penis when banding is a critical aspect to the practicer’s safety. It is unadvisable to perform banding on an erect penis, since the increased pressure from the bands could rupture penile tissues. This could lead to massive hemorrhaging and a trip to the hospital. However, banding while completely flaccid tends to result in more severe results, such as long term damage to nerves. Most practicants feel that being semi-flaccid is the preferred state.
The last key aspect of banding is how tight the bands are. Using a single elastrator band may produce nominal results in 30-40 minutes, compared to the significant results that using three bands together can cause within 3-5 minutes.
External links
• Joseph Mason
Banding is really rough on the penis skin too… issues like chafing, soreness and other irritations are quite common. It is smart to use a penis skin moisturizer like Man1 Man Oil to protect yourself from these things. Just apply it once a day and you will be all set. Hope this helps.
|
global_01_local_1_shard_00001926_processed.jsonl/21174
|
Main / Music & Audio / File via ajax php
File via ajax php
File via ajax php
Name: File via ajax php
File size: 483mb
Language: English
Rating: 6/10
And now for the server-side script, using PHP in this case. . Best File Upload Using Jquery Ajax With Materialise Click Here to Download. In this blog post we have covered one of the topic of ajax i.e. to upload images using Ajax and php without page refresh. Then using jQuery Ajax, it is send to php script on submit button event. PHP script stores the image in a defined location and returns the message of the. 8 Dec In our earlier tutorial, we have provided the various way to upload file using jQuery and Ajax in PHP. The example code shows how to submit form data and upload file using FormData object and PHP. Submit image file with other form data using jQuery and Ajax.
23 Jan In our earlier tutorial, different methods have provided to upload file in PHP. Today we'll build a simple Ajax file upload script with jQuery and. 22 Mar In just few easy steps, this tutorial on file and Image upload in PHP will be help you add an AJAX based file load in PHP componnet to your. 23 Jan - 5 min - Uploaded by CodexWorld Read Tutorial and Download source code from - http://www.
21 Jun Ajax file uploader is useful web tool, which is actually very easy to create with jQuery and PHP, and with new HTML5 FileReader API support. 26 Jul All files will be uploaded via AJAX or can be added within a form, and files We' ve got a form that posts to, which we'll look at in a. AJAX PHP Example The function is triggered by the onkeyup event. The PHP file checks an array of names, and returns the corresponding name(s) to the . A method for handling file uploads on a form with AJAX using jQuery. Posted 5 years Quick and dirty php script to upload the files and pass back some info. The examples below cannot be used with file uploads inside a form. To submit form with file uploads, see the example Submitting HTML Forms With AJAX.
PHP. Create an file and upload directory for storing image files. Check the file extension if it is valid then store the file and return. Uploading Files With AJAX. Upload Image Without Page Refresh Using Ajax,jQuery And PHP. The jQuery load() method is a simple, but powerful AJAX method. example loads the content of the element with id="p1", inside the file "", into a . 29 Jan The problem with the cookie is that I can't call the php file from the javascript function using ajax, so I was wondering if there is an alternative.
30 May In a nutshell: create a folder in the wp-content/plugins directory, I named mine ajax-text. Within your folder create a PHP file with the same. Ajax file upload - Upload image file without page refresh using Ajax and PHP. Net or How do I use the AjaxFileUpload control of AJAX or AJAX FileUpload or. Hi You have Use this COde For WordPress front-end AJAX file . echo "File Upload Successfully"; } else { /** * Error generated by _wp_handle_upload() * @ see _wp_handle_upload() in wp-admin/includes/ */ echo. 3 Jan On submitting the form with the selected image file, the AJAX script will be executed. In this code, it sends the upload request to PHP with the.
В© 2018 - all rights reserved!
|
global_01_local_1_shard_00001926_processed.jsonl/21191
|
Resources and Products
I don't think everyone needs professional equipment. I do, however think a few affordable additions to your filming process can up your video game and set you apart from the crowd. Here are a few links to products I previously or currently use in my video production.
**Yep, I'll get a teeny tiny compensation if you buy through my affiliate links.
|
global_01_local_1_shard_00001926_processed.jsonl/21201
|
For Raph <3
Original Character
Number of posts : 1758
Age : 27
Registration date : 2008-09-22
For Raph <3
Post by Lexi on Mon Sep 12, 2011 10:34 pm
For you, my love.
[Brad] We didn’t care if people stared
We’d make out in a crowd somewhere
Somebody’d tell us to get a room
It’s hard to believe that was me and you
Now we keep saying that we’re ok
But I don’t want to settle for good not great
[Carrie] Remind me, remind me
[Carrie] Remind me, remind me
[Carrie] Remember the airport dropping me off
We were kissing goodbye and we couldn’t stop
[Brad] I felt bad cause you missed your flight
[Carrie] Do you remember how it used to be
we’d turn out the lights and didn’t just sleep
[Brad] Remind me Remind me
Baby remind me
[Carrie] Oh so on fire so in love
that look in your eyes that I miss so much
[Brad] Remind me, baby remind me
[Brad] I wanna feel that way
[Carrie] Yeah I wanna hold you close
[Brad and Carrie] Oh If you still love me
Don’t just assume I know
[Carrie] Do you remember the way it felt?
[Brad] You mean back when we couldn’t control ourselves
[Carrie] Remind me, remind me
[Brad] Yeah remind me
[Carrie] All those things that you used to do
That made me fall in love with you
Remind me. Oh Baby Remind Me
[Brad] Yeah you’d wake up in my old t-shirt
All those mornings I was late for work
Remind me
[Brad and Carrie] Oh baby remind me
Current date/time is Sat Dec 15, 2018 8:52 pm
|
global_01_local_1_shard_00001926_processed.jsonl/21205
|
Sunday, August 25, 2013
Carroll Bryant UFO
I thought I would share with you my UFO experience.
Taken June 3rd, 2013.
Taken June 21st.
Some people say my hand was shaking, explaining why the one on the right was all over the place. Okay, then explain why the one on the left remained still? Except for when it initially backs away, then back towards the one on the right and then back away again. In a precise diagonal line. If the one on the right was jerking all around due to my "shaky" hands, then why isn't the one on the left doing the same thing?
I don't even know what the hell that blue line is in the first one.
1. That is so crazy. The movement is irrational and erratic, which makes no sense. I can tell it's not your hand shaking, 'cause I can see the stars steady in the background, but ... the way the light is moving is weird. Almost like a laser pointer that someone is trying to entice a cat to chase, which of course would not show up against the night sky like that.
I've heard of those lines, though, in a book I read early last year; they sometimes show up during light appearances. I don't remember what explanation was given, or if they had one. The book was about mysterious lights somewhere in Texas. I'll try to track down the book and give you the title, although I think I might have already done so one one of these YouTube videos.
2. Yes you did do that. I have gone to the library to find that book but they didn't appear to have it. But I am familiar with its contents I'm sure because I have read several books regarding strange dancing lights phenom. And UFO's. And have watched many programs about them.
I have captured a few more videos but what's the point in posting them? They're all the same really. I am hoping to catch something more, something bigger. Like a craft! LOL
|
global_01_local_1_shard_00001926_processed.jsonl/21249
|
Tigerific things happen in the TWL
Quick Links
Log in ti Blackboard
Welcome to The Tiger Writing Lab (TWL)
Mission Statement
The mission of the English Department and the Tiger Writing Lab is to provide writing assistance to TSU students in all disciplines across campus. The Tiger Writing Lab will provide them writing techniques that will allow them to edit their own papers independently before submission. It is our goal for TSU students to grow into independent writers and editors.
Tiffany L. Ware
MTM Tiger Writing Lab Director, Visiting Instructor
English Department
|
global_01_local_1_shard_00001926_processed.jsonl/21263
|
Breast pads
Reusable breast pads
Breast pads or nursing pads are for women who are breastfeeding. You put them in your bra over your nipples to stop milk leaking out onto your clothes. You can get disposable or washable pads. If you get machine-washable pads use a laundry bag when you wash them to keep them together so they don’t get lost through your clothes.
Check out our Ultimate guide to nursing bras for tips on bras to use while breastfeeding and the changes your breasts will go through.
|
global_01_local_1_shard_00001926_processed.jsonl/21264
|
Facts about Umeå
Umeå is situated on the inlet of the Gulf of Bothnia at the mouth of the Ume River, in the south of Västerbotten. Umeå is about 600 km north of Stockholm and about 400 km south of the Arctic Circle. It is the largest city north of the Stockholm-Uppsala region. The climate of Umeå is subarctic, with short and fairly warm summers. Winters are lengthy and freezing.
In 1622, the city was founded by King Gustav II Adolf. On 25 June 1888, a fire devastated Umeå and at least 2,300 of the 3,000 inhabitants became homeless. In the restoration following the fire, birch trees were planted along wide avenues to prevent future fires from spreading. For this reason Umeå is sometimes known as the “City of Birches” and the name of the Umeå ice-hockey team, Björklöven, means “The Birch Leaves”.
The establishment of the university in the mid 1960s led to a population expansion which still continues, with about 1000 new inhabitants every year. The university hospital serves the entire region of northern Sweden.
Some key years
3000 B.C. Norrfors rock carvings
1622 Umeå founded by King Gustav II Adolf
1809 Battle of Sävar, the last battle fought on Swedish soil
1864 Umeå Music Association is formed
1888 The Great Fire makes almost all of the population homeless
1896 The railway comes to Umeå
1962 Umeå Airport opens
1965 Umeå University opens
1968 Umeå Jazz festival has its premier
1974 Norrlandsoperan opens
1992 Umeå becomes Norrland’s most populous municipality
2009 Umeå designated European Capital of Culture 2014
You are here: Homepage | Visit Umeå | Facts about Umeå
|
global_01_local_1_shard_00001926_processed.jsonl/21283
|
Executive Committee
The Executive Committee, subject to decisions made and directions set by General Meetings and Staff Rep Assemblies, oversees the business of VESTA, and exercises the powers of the local on behalf of the membership.
Members are elected by the VESTA Annual General Meeting to serve on the Executive Committee for a one-year term. Minutes of all Executive Committee meetings are distributed to all worksites via Staff Reps.
President: Chloë McKnight
1st Vice President: Jill Barclay
2nd Vice President: Joanne Sutherland
3rd Vice President: Allison Jambor
Secretary-Treasurer: Leslie Roosa
Adult Ed Sublocal
President: Hollie Williams
Local Reps to the BCTF
Heather Allison
Donna Brack
Anne Miller
Darren Tereposky
Members at Large
Greg Canning
Tanja Cvekic
Patricia Gudlaugson
Sylvia Jackson
Standing Committee Chairpersons
Aboriginal Education: Brenda Koch
Communications: Brian Sampson
Health & Safety: Karin Bernauer
Professional Issues:
Social Justice & Solidarity: Jean-Michel Oblette, Elaine Ong and Julia Pressman
Teachers On Call: Vanessa Lefebvre
WLC/Bargaining: Marjorie Dumont
Area Counsellors: Leslie MacKenzie
Gifted Education:
Pychologists: Larissa Jackson
Speech Language Pathologists: Heba Ghobrial
Teacher-Librarians: Mary Locke
Events Calendar:
calendar numbers
Past News
Follow @VESTA39
|
global_01_local_1_shard_00001926_processed.jsonl/21315
|
Revision as of 23:58, April 25, 2012 by Lacrossestar83 (Talk | contribs)
Jump to: navigation, search
Unfortunately, sometimes there are users who prefer to vandalize ytmnd wiki than contribute constructively to it. Vandalism is the conscious malicious edit to an article, such as adding an unconstructive comment, edit, or simply attempting to delete the entire page. Please, report vandals using this page.
Sometimes an edit might look like vandalism, but it could be a user testing out the features. If it looks more like an experiment than actual vandalism, give them one warning, pointing them to the sandbox. If they continue report them here.
Admins: After dealing with the vandal, delete the vandal's entry from this and note what you did in the edit summary. If the list is not empty, note that on the edit summary as well.
Current reports
Do we really need the "List of Trolls" page on here? It just seems to be causing more drama than it's worth, and it's actually feeding the trolls if you think about it. Lacrossestar83 20:08, July 7, 2011 (CDT)
These entries are spam about a troll user's own personal circle jerk by said user. They have 0 relevance and should be deleted. --Anig 00:50, August 20, 2011 (CDT)
This has been explained to you before. Those articles discuss subjects that are well documented here. Nothingman 21:00, August 20, 2011 (CDT)
Ok, I'm going to spam the front page of YTMND with 3 different images and call it the great shit caper. Then I'm going to make two wiki articles about it. That's perfectly reasonable according to you. You explained nothing. You try to rationalize your trolling and it's laughable. I hope Westing1992 has visited YTMND at least twice in the last year. If he has, then he knows that you're full of shit.--Anig 21:22, August 20, 2011 (CDT)
The Barney Bunch is defunct. The Great Troll Caper is defunct. Each of these groups is responsible for thousands of YTMND sites. A sampling of such sites can be found within the wiki articles for each group. If you would like to spam 3 sites and make 2 wiki articles, that's none of my business, but I doubt that you'd meet the requirements for notability. The two groups whose legitimacy you question have been around for years, have double digit members, and have several external websites. Additionally the Barney Bunch is on Encyclopedia Dramatica, Know Your Meme, the Newgrounds wiki, TV Tropes, Oh Internet, Uncyclopedia, and probably many other notable database catalogs. Nothingman 21:59, August 20, 2011 (CDT)
I've been around for years, I have double digit friends on my frienemies list, and I have an external website. So that qualifies me for a pointless wiki entry?--Anig 23:50, August 20, 2011 (CDT)
So go ahead and make a wiki for User:Anig then. Please stop harassing me. Nothingman 13:00, August 21, 2011 (CDT)
I'm not harassing you. I'm just trying to get the mods to do their job and delete your trash articles.--Anig 16:21, August 21, 2011 (CDT)
Impersonation Wiki Accounts
People are still impersonating YTMND users by taking their user names here. Nothingman was impersonated here for 6 months and the moderator who finally deleted them said it was for something else and not even for impersonating a YTMND. So is it acceptable then to do this? Can I make accounts of YTMNDers and make pages for them? Because that seems almost retarded - but it's been allowed up to this point. I wrote a PM at YTMND to that kid westing letting him know it's my account. If nothing's done then it's assumed that impersonating YTMNDers here is okay. The 6 months nothingman and tile where used here the Mods never asked for proof when I asked them to be deleted for impersonating me. I was just ignored. - Umfuld Sept 2011
You've never mentioned that you are Image until now. How many accounts do you have? Can you please list them? Maybe there is a reason that ytmnd and ytmnd wiki have separate accounts? Again, please stop the personal attacks. You spent 6 months vandalizing the wiki and claiming it was okay because you didn't happen to like the author. What you are doing here is trolling. Image 07:36, September 24, 2011 (CDT)
Westing, please go ahead and ban That guy just reset my password from that IP. -lacrossestar83
|
global_01_local_1_shard_00001926_processed.jsonl/21316
|
DIY Camera SLIDER (Part 4) – FINISHED! | 2-axis MOTORIZED | Arduino | stepper
The camera slider is finished (…for now).
In this video I do the final assembly, testing and a few modifications to the slider.
First of you have the wiring diagram:
Wiring Diagram
Here are the inputs and outputs on the Arduino Nano (notepad Docment):
Materials used in this project (
linear bearings:
small bearings:
Ball Joint 360 Swivel Mini for camera:
Nema17 stepper motor:
ATmega328P Arduino NANO:
5pcs a4988 stepper motor driver:
400 Holes Breadboard Kit:
5pcs 10K Potensiometers:
10pcs Plastic Rotary Taper for Potentiometer:
Switch ON/OFF:
3-mode switch ON/OFF/ON 6-pins:
10pcs Push button switch ON/OFF:
10pcs Limit switch:
Big Pulley 40 tooth:
Big Pulley 60 tooth:
Belt 60 Tooth Closed Loop 15mm Width:
Big timing belt with 4xGT2 pulleys:
GT2 Aluminum Timing Idlers Pulley:
Inspirational recourses:
Physics Anonymous video:
Physics Anonymous github arduino code:
Leave a comment
|
global_01_local_1_shard_00001926_processed.jsonl/21337
|
hoverbox hoverbox
Most Played Games
Warriors And Archers
In this game you have to fight against mummies. If you want to play adventure and war games, you have to try this game. You have to attack with your friend. And after each level, you can buy new weapons. With this way, you can improve your fighting cabability.
We are Social
Exchange Game
Online Web Games
|
global_01_local_1_shard_00001926_processed.jsonl/21343
|
January 9, 2013
Ways To Fight Acne #1 | Diet
Some of you might remember the post a long while back about my acne story. In there I promised to also share my story concerning how exactly I "got rid" of it. I actually wanted to do one full post, and give you tips and tricks on how and what I did. However, the more I was planning to write the post, the more things came into my mind. I just figured it'd be impossible to put all that info in one post. Or well, that'd be a hell of a big one!
I am very sensitive to acne, so even right now when my skin has improved so much, I'm still very careful with everything. I basically got acne from everything, but the main problems were diet, lifestyle, and skincare, and there of course are other facts. I'll separate the posts per topic, and the first post is about diet changes. Now I want to put a disclaimer out first: I'm in no way a skincare/acne expert. All this is based on my own experiences, trial and errors, and research. Something that might work for me, or affects me, might not affect you at all.
I know that there are many "scientific reports" claiming that food won't affect acne, and that fried food, and chocolate are not the reason for acne. Wrong. It so is, for me, that is. So when you know that you feel a spot coming up after that chocolate bar, you know that you can't eat it, or eat it every once in a while. It's important to know what causes your acne, and a way to know that is through face mapping. I wrote a blog post about that, and it would really help getting to the core of the problem. After you located what, and where the source is of your acne problem, Google can be your best friend. You have to know what can "fix" or well... better said, improve your skin - we're talking only food right now. A rule I take real seriously, and live by is beauty has to start from the inside. This means inner beauty, and removing all the toxic from your body to let your beautiful skin shine through.
It's also proven that dairy can affect your skin in a bad way. I'm allergic to dairy (milk, yoghurt, and that kind of jazz) so I stopped drinking it until I was 15. So I can't say if it works or not. I do know many people who cut dairy out of their diet saw improvements in their skin, and saw less or no blemishes after a while. A thing that is proven to improve your skin when done, is drinking water. It is so important that you drink a lot of water, every day. When you drink water, you give your body the chance of cleansing you, but from the inside. I can see the difference when I drink a lot of water a day, and on a day where I haven't drank as much water. Also, dry skin can result in early wrinkles!
My list of favourite fruits/veggies (in random order) to eat for skin detox/cleansing/improvement, or just as healthy snacks are:
LemonS: Don't get me wrong, I don't really eat these. I have a stack in my fridge, and when I wake up, I just go to the kitchen, cut the lemon, and squeeze some lemon juice in my cup of water (lukewarm is the best to drink every morning, 2 cups if possible!). If you're a bit too lazy for that, you can buy drink-ready lemon juice (the pure juice) in the supermarket. The fresher the better though!
Berries: The best, most famous, and most-yummy antioxidant rich fruits. Strawberries, blueberries, blackberries, cranberries, goji berries, and açai berries are all berries that are full of antioxidants. What does it do? It defences our body from harmful free radicals, and oxidative stress. Oh and also, it helps with rebuilding the cells of the body, and keep your cells functioning and healthy longer. Other fruits that do the same, but didn't fit in the berries list: black cherries, purple plums, and pomegranate get the job done too ;-).
GRAPEs: Grapes are great antioxidants, but it does so much more than just that. Grapes are effective for constipation, and gives relief in piles. It prevents skin dryness, and it purifies the blood. You can also squash some grapes, and make a DIY face pack - is proven that it may reduce hyper pigmentation too!
raw nuts: It provides your body with the essential fatty acids. I'm obviously not talking about the salted nuts, stray away from those darling! All kinds of nuts have different kinds of great results for your skin. Just grab a handful everyday as a snack, and try to have a handful in the morning too.
Sweet potatoes: Great for digestion, increases antioxidants in your body, which increases the ability to absorb free radicals, which results in better looking skin. Also is a great veggie for digestion, and just yummy to have as a snack during the day (just boil it in a pan of water for a while, prick in it to see if it's soft inside, and you're ready to eat).
KIWIS: A great source of vitamin C, K, potassium, and phrosphorus. One kiwi contains about 71 percent of the recommended daily intake for adults. It can enhance your immune system, helping your body ward off bacterial and viral infections (inflammation on spots people?). It also helps your body produce serotonin, and norepinephrine, which basically are chemicals that relieve stress, and depression, all thanks to good 'ol vitamin C!
GrapefruitS: It's just like the kiwi, a great source of vitamin C. Also is good for your digestion, and when you're on a diet. Don't eat/drink it too much, as that may do more harm than good for your body.
(Dried) figS: It's high in fibers, which means it's good for your digestion, and good for your skin/body. Also, it may reduce the risk of heart disease.
dried apricotS: A rich source of iron, and beta carotene. Eat a handful everyday as a snack for more radiant looking skin.
AVOCADOS: It contains healthy fats, can even replace the butter on your sandwich. It's a very good source of fibers, and contains lots of great vitamins. I guess we all know that avocados are great for the hair too.
PapayaS: Is not only a delicious fruit itself, just like all the other foods on the list (I'm a food lover you know ;-), but also is an enzyme that aids digestion. When you have bad digestion, it may result in spots - refer to my face mapping post for more detail. Plus, papaya cleanses the body completely, it delays ageing of the skin, and aids in maintaining the health of the skin because of its high level of vitamin A. Did I already mention that when applied raw juice externally, it may help to cure pimples, and also reduce wrinkles?
Remember that what you eat does reflect on your skin. Results won't come in a day or two, so be patient. If you do it right, you'll see improvements after the first week already. Continue, and you'll see the result you've been wishing for - trial and error baby. And most importantly: keep that water comin'!
Do you still struggle with acne?
xoxo Gloria
2. Very informative post! Lovely blog! Followed!
shabna x x
1. Thanks babe, glad you found it useful! x
Blogger Template Created by pipdig
|
global_01_local_1_shard_00001926_processed.jsonl/21345
|
Tips on Document Layouts
A paper bleed is an extra bit of printing on your document. This helps to make a good clean cut and seemless edges when cutting down your documents. These are used when you don''t want white borders on your prints.
Make sure your document has been saved as CMYK coloring instead of RGB. CMYK is for printing presses while RGB mode if for digital devices.
The best file format for images are .TIFF files. They are high in quality and hold any layers that might be used in Photoshop or other layout programs.
The best file format for graphics are vector images which are typically .EPS files or .PDF files. Vector images are the original line designs. Not a .JPEG image.
Including the fonts that you''ve used on your documents can be extremely helpful if they aren''t standard fonts.
Previous Page
|
global_01_local_1_shard_00001926_processed.jsonl/21382
|
Two Tangent Circles and a Square- Problem With Solution
You are givn the perimeter of a small circle to find the radius of a larger circle inscribed within a square.
Problem : In the figure below, the small circle with center B and the larger circle with center C are tangent at point T. A is the vertex of the square circumscribing the larger circle. Points A, B, T and C are collinear. The perimeter of the small circle is equal to 4π. Find the radius of the larger circle.
Solution to Problem :
2 Methods to solve the above problem
METHOD 1
• From point T, we draw TM and TN where points M and N are points of intersection of the small circle with the large square. Since AT is a diameter, AMT and ANT are right angles. Because of symmetry, the lengths of the cords AM and AN are equal and therefore AMTN is a square. The diagonal of this small square is equal to the diameter of the small circle. Since we know the perimeter, the diameter d is given by
two tangent circles and a square, solution
d = perimeter / π = 4 π / π = 4
• Now that we have the diagonal of the small square, we find the length of its sides as follows
AN2 + NT2 = 42
• Solve to obtain
AN = NT = 2sqrt(2)
• We now consider the rigth triangle TPC and use Pythagora's theorem to write
x 2 + y 2 = r 2
• Note that
x = r - AN = r - 2sqrt(2) and y = r - NT = r - 2sqrt(2)
• Substitute x and y in the equation x 2 + y 2 = r 2 and write
(r - 2sqrt(2)) 2 + (r - 2sqrt(2)) 2 = r 2
• Group like term
2 (r - 2sqrt(2)) 2 = r 2
• Extract the square root to obtain two equations
sqrt(2) (r - 2sqrt(2)) = r or sqrt(2) (r - 2sqrt(2)) = - r
• The above equations gives two solutions but only one is valid and is given by.
r = 4 + 4sqrt(2)
METHOD 2
• Consider the right triangle AQC and use Pythagora's theorem to write
r 2 + r 2 = (r + 4) 2
• Expand and solve to obtain 2 solutions to the above equation but again only one of them is valid and is given by r = 4 + 4sqrt(2).
More geometry problems.
Geometry Tutorials, Problems and Interactive Applets.
|
global_01_local_1_shard_00001926_processed.jsonl/21384
|
Comments for A Random Process Information theory, math, computing, etc. Fri, 17 Aug 2018 06:26:17 +0000 hourly 1 Comment on Resolution for 2018: Delete MATLAB by BestJohnnie Fri, 17 Aug 2018 06:26:17 +0000 I see you don’t monetize your blog, don’t waste your traffic, you can earn extra cash every month.
You can use the best adsense alternative for any type
boorfe’s tips monetize your website
|
global_01_local_1_shard_00001926_processed.jsonl/21385
|
Deal: Save 20% on Panasonic’s Sony WH1000xM2 clone
Panasonic headphone deal, active noise cancelling over ear headphones for $61 off.
The Panasonic headphone deal includes hi-res active noise canceling headphones which are now available for $61 off, a 20 percent discount. These over-ear wireless headphones provide many of the same features as the Sony WH-1000XM2, including LDAC and aptX HD support.
The headphones feature a 20-hour battery life and require just 15 minutes to quick charge. Similar to the Sony WH-1000XM3 and its predecessor, the Panasonic headphones house 40mm drivers. Additionally, when you invest in the Panasonic headphone deal, you get headphones that can allow ambient noise in simply by covering the right housing with your palm.
There’s no indication regarding the duration of this deal, so now’s the time to try out that new pair of noise-canceling headphones.
Powered by WPeMatico
By | 2018-09-21T16:04:57+00:00 September 21st, 2018|Android Related, Deals|Comments Off on Deal: Save 20% on Panasonic’s Sony WH1000xM2 clone
About the Author:
Vancouver, Canada
|
global_01_local_1_shard_00001926_processed.jsonl/21391
|
10th Annual Mark-a-thon
Our 10th Annual Mark-a-thon was held on August 10th with a goal of $10,000 to be raised. Mark took up the challange and raised over $8,000 himself pushing the event total to almost $13,000 raised.
A special thanks to all our participants, to Kelsey's Resturant for the food and to Giant Tiger and Reid's Valu-Mart for their cash out efforts.
|
global_01_local_1_shard_00001926_processed.jsonl/21401
|
Woman faces reduced charge in scents case
November 27th, 2003
To the Editor,
Your article, “Woman faces reduced charge in scents case” by Pat Moore indicates that charges brought against a woman for intentionally damaging her husband via the use of household products containing toxic chemicals were reduced. This was due to the prosecutor concluding that the sprays never “touched” the husband despite his being injured by them.
Science does not support such a conclusion. Fumes from sprays are intended to “touch” people, entering our bodies through nasal and oral passages and via absorption through the skin and eyes. Many air fresheners work via placement of a fragranced, oily “film” in your nostrils to overwhelm more unpleasant scents. The CDC and the EU have both recently published studies indicating that every person has a surprising array of toxic chemicals in their bodies which got there via airborne residues from common household and office products.
All that happens legally until you add “malice aforethought”. These products contain registered poisons and can become weapons in the hands of one who knows another person is vulnerable to their adverse effects. The concept of “touching” does not apply when a “weapon” is dispersed into the air. The chemical trespasses occurring daily in society via this modality, affects every segment of society. Malice may be absent but profit motives and the lack of warning on labels that a product contains poisons which can minimally be regarded as “respiratory” irritants or neurotoxins should be considered a crime against the consumer.
Barbara Rubin
Categories: Palm Beach Post
Leave a comment
Leave a comment
http://www.armchairactivist.us / Woman faces reduced charge in scents case
|
global_01_local_1_shard_00001926_processed.jsonl/21407
|
Revision history of "Musipedia:General disclaimer"
Jump to: navigation, search
• (cur | prev) 14:23, 5 February 2017Tom (talk | contribs). . (405 bytes) (+405). . (Created page with "This is a general Music revision website. The content of this site is being provided freely, and no kind of agreement or contract is created between you and the owners or use...")
|
global_01_local_1_shard_00001926_processed.jsonl/21475
|
So, were you the kind of kid who used a PEZ dispenser for it’s intended, single-serve, purpose–or, were you the other kind of kid that just got one because it looked cool, and then just ate the package of PEZ by itself because it was easier? (We were totally the latter–just in case there was any […]
|
global_01_local_1_shard_00001926_processed.jsonl/21477
|
Get In Touch With Us
We are here to answer any questions you may have about Cape Cod Appliance Service.
11 Jan Sebastian Dr Ste 5
Sandwich, Massachusetts
Sandwich: (508) 888-2400
Barnstable: (508) 420-7475
Duxbury: (781) 934-2100
Mashpee: (508) 477-6233 I
Falmouth: (508) 540-2424 I
Please enter Your Name.
Please provide real email.
Please enter Your Subject.
Please enter Your Message.
|
global_01_local_1_shard_00001926_processed.jsonl/21481
|
ABBA recorded at the Rivoli cinema...or did they?
Published November 11, 2016
At first glance, the picture to the left in the attached montage looks very familiar, doesn't it? Of course, it's ABBA's Polar Music Studio on a wintry Stockholm day. But hang on... there's something not quite right... Why does it say RIVOLI above the entrance, and those posters on either side of it, what are they doing there?
This picture was actually taken in late 1934 or early 1935 and shows us what the premises were originally used for. The building was known as Sportpalatset ("The Sports Palace"), a large complex of which the Rivoli cinema was a part (this cinema belonged to a chain known as the Ri cinemas: you guessed it: the cinema/stage area in Benny Andersson's Rival complex was once also a part of that chain). On this winter's day back in the mid-1930s, the cinema was showing the Katharine Hepburn movie Christopher Strong. The picture of ABBA was taken almost exactly 44 years later, in December 1978, as part of promotion for the studio. So until the studio finally closed on 1 January 2005, there was always something connected to show business and entertainment going on there.
It's been fascinating putting together the story of Polar Music Studio for the revised and expanded edition of ABBA - The Complete Recording Sessions. It's got a quite interesting back story, which I don't think I've fully grasped until now. The wonderful Lennart Östlund - employed as engineer shortly before the studio opened in 1978, and today literally the person that is Polar Studios - gave me an extensive interview that filled in many blanks for me and made the story come alive. Can't wait to share it with you all!
The Polar Music Studio story is just one of many revelatory aspects of ABBA - The Complete Recording Sessions, which you can pre-order here:
And remember: everyone who pre-orders before 1 December will have their names automatically listed as a contributor in the book!
Forty-five years after opening as the Rivoli cinema in 1933, the premises turned into Polar Music Studio.
|
global_01_local_1_shard_00001926_processed.jsonl/21521
|
June 4, 2013
The Massey University Study of Transgender People
When the gender shoe does not fit (photos.com)
In my post Jaimie Veale's study of gender variant people throw new light upon crossdreamers I presented the high lights from one of the most important new studies of gender variant people. In this post I give a more in depth assessment of the findings.
The study
What makes the underlying study from Masset University of New Zealand and her Ph.D: thesis much more reliable than similar research, is the number of respondents.
Ray Blanchard, who coined the term "autogynephilia", used the database of the Clarke Institute in Toronto for his studies of transsexuals. His ""Heterosexual and Homosexal Gender Dysphoria" paper of 1987, for instance, refers to a selection of 197 respondents, all of them patients at the university clinic.
Veale, on the other hand, is working on a sample of 2277 respondent, gender variant and gender typical, recruited via the internet.
There is still a bias towards white, "western", respondents, but she manages to cover a much wider group of gender variant people, also people who have not and will not seek out gender therapists.
In other words: Veale does to a much larger degree include non-transsexual transgender and crossdreamer people.
Gender Variant
Veale defines gender variant as "a subjective sense of not belonging completely to the gender of one's birth-assigned sex."
Note the word "completely". The term gender-variance is used to refer to the behavioral expression of this identity which could range from occasionally dressing as one's identified gender to living full-time in this gender.
She has deliberately chosen to look into biological, psychological and cultural factors that other researchers have argued may influence the development of gender identity.
She explains this in this way:
"Previous research has found that genetics, prenatal hormone exposure, neuroanatomy, handedness and dermatoglyphics [studies of fingerprints] (proposed to be related to susceptibility to developmental disturbances), fraternal birth order, and abuse are related to gender identity. While a number of investigators have studied these variables individually, the present study is the first know research to examine the inter-relationships between these variables." (p. 2).
Her point is that variations in gender identity and the intensity of alternative gender experiences may be the end result of an interaction between various factors -- genetic, hormonal, psychological and cultural. Moreover one variable might "hide" another influential cause of gender variance.
How to intepret results
When one read studies like this one, it is extremely important to keep in mind that she is writing about statistical aggregates, and not absolutes that apply to all people of a certain category.
For instance: Relative finger length varies between men and women on average.
Among men the the second (index) finger is more likely to be shorter than the fourth (ring) finger. This so-called 2D:4D digit ratio is believed to point to a higher exposure to "male" hormones (androgens) in the womb. Among women we will find that the fingers are more likely to be of equal length.
I have seen male to female transgender people enthusiastically proclaim that they must be female, because they have a "female" 2D:4D ratio. That is mixing the macro level with the life story of the individual. A lot of women born women have a "masculine" ratio. That does not stop them from being real women.
This graph can serve to illustrate the fact that we are talking about relative small, although significant, differences. Note the huge overlap between men and women.
Digit ratio visualization according to data from Bailey and Hurd
Blue line represents men, green line women. Click on image to enlarge!
With the exception of body height and sex organs practically all differences between men and women are less significant than this.
It is clear from this figure that if there is a causal relationship between exposure to androgens in the womb and the digit ratio, the effect must be masked in many, otherwise "manly", men.
This tells me, at least, that we should be very careful to interpret such findings in a dogmatic way. Androgen exposure alone cannot explain the existence of all male to female gender variant people.
Her main findings
Since Veale has only studied a limited number of potential factors influencing the development of gender identity, she finds that somewhere between 7 and 23 percent of the variance found can be accounted for from the biological and psycho-social factors listed above.
I will go through the variables, one by one.
Number and ratio of siblings
Male to female (MTF) transsexuals are more likely to have older brothers than non-transgender males, according to Veale's data. This difference is not found to the same effect in other gender variant MTF gender variant people:
"Birth order and sibling sex ration did not differ between birth assigned males with other gender variant identities [as opposed to transsexual] and males with gender-typical identities in spite of previous research suggesting that cross-dressers are more likely to be first-born males."
I guess someone would argue that this proves that real transsexual women are completely different from non-transsexual transgender male bodied persons. However, the difference is a matter of degree, non-transsexual MTF transgender taking an intermediate position between MTF transsexuals and non-transgender men. This finding could be used to support a spectrum model of gender variance.
Click on image to enlarge! (Figure from Veale's thesis)
There is no difference for the number of older brothers among birth assigned females.
You might ask what all of this has to do with the price of eggs.
Well, it turns out Ray Blanchard has argued that homosexual men are more likely to be effeminate if they have a larger number of older brothers, while we will not see this effect among non-homosexual men (and by implication MTF transgender attracted to women). This argument has been used to "prove" that gynephilic transwomen are "less feminine" than the ones loving men.
Veale finds no significant difference between androphilic (man-loving) and non-androphilc (woman-loving and bisexual) MTF transsexuals in her data.
Sexual orientation
This conclusion, i.e. that there is no significant differences between male to female transgender who are attracted to men and those that are attracted to women, applies to the whole data set as well.
Blanchard argues that there are two distinct types of male to female transgender and transseuxals: the "homosexual transsexual", who is a extremely feminine man, and the "autogynephile" who is a non-homosexual man suffering from an erotic target error. He is basically a pervert in love with the idea of himself as a woman.
On the Blanchard scale of perversions, the man loving trans woman is slightly above the "autogynephile" on the mental illness scale. The fact that Blanchard also considers homosexuality a mental disorder, doesn't leave much respect for any of the two categories, however.
Veale, of course, knows this theory very well, and has very carefully checked her own data to see if they support Blanchard's dichotomy.
"Blanchard's theory predicts that there would be improvement in the model if biological and psychosocial variables' prediction of gender variance in this study were allowed to vary between androphilic and non-androphilic birth-assigned males. However, when these restrictions were relaxed, no significant improvement in the model fit was observed."
Anne Lawrence and J. Michael Bailey had tried to shoot down earlier papers by Veale and her colleagues, by arguing that she had no real androphilic trans women in her sample. Because of this she and her friends had imposed strict criteria for being categorized as androphilic. Veale argues strongly that the sample size is large enough to detect group differences.
There are no such differences. Sexual orientation does not determine different types of gender variant people. The autogynephilia theory is wrong.
The role of gender variant relatives
Transsexuals and gender variant respondents were much more likely to report gender variant relatives than respondents with gender typical identities.
Veale explains:
"Given the methodology of this research, it is not possible to distinguish whether this concordance is the result of a genetic or a social learning effect. However, it has been reported elsewhere that usually these individuals are not aware that their relative is gender variant until they reach adulthood, suggesting a genetic explanation is more likely." (p. 110)
Handedness has been used to determine hormonal effects in the womb.
"The study found non-righthandedness was significantly related to adult gender variance in birth assigned females, but not birth-assigned males. The results are in accordance with previous findings for both birth-assigned females and consistent with the hypothesis that developmental instability has a role to play in the development of gender identities." (p.111)
I am not sure how she comes to this conclusion given that she finds no such effect among the birth assigned males.
She provides a methodological discussion that is simply to complex for me to popularize it here. See chapter 8.1.4 in the thesis.
Other studies have shown, however, higher levels of left-handedness among MTF transsexual women, and it is the fact that this study does not confirm these findings that causes confusion.
Veale finds an increased level of emotional, physical and sexual abuse among transsexuals and participants with other gender variant identities.
It is harder to decide whether the abuse is causing gender variance or whether it is caused by it:
"The SEM [Standard Error of Mean] results showed that recalled childhood gender-variance partially meditated the relationship between emotional abuse and adult gender-variance among both birth assigned genders. This suggest that as well as having a direct influence on adult gender variance, emotional abuse was also the result of gender variance being the target for abuse. (p. 112)
In other words: Veale believes abuse is caused by gender variance, but that it will also influence its development. This study does not provide a final answer to this enigma.
Finger length ratio
As explained above finger length ratio (2D:4D) is believed to be a marker for prenatal androgen exposure (i.e.variations in the presence of "male" hormones in the womb).
Veale finds no differences between gender typical and gender variant respondents or between the different types of gender variant people.
Her conclusion is the following:
"Overall, these findings tell us little about the extent to which 2D:4D is related to prenatal exposure, or the role that prenatal androgen exposure might play in the development of gender identities."
Mental rotation and systemising quotient
Throughout the history of sexology there has been made many attempts to test for differences in male and female cognitive capabilities. We have all heard the "truism" that men are good with numbers and women are good with words.
Being a male bodied person with a preference for words, I might have taken this as proof of my inner femininity, but the existence of a significant number of successful male authors (and female engineers) has dampened my trust in such arguments.
As time goes by, and women enter more and more occupations and take over the universities, the differences reported by researchers become more and more insignificant.
In other words: I suspect that men and women are equal intellectually and mentally, and that the differences found by researchers are the results mainly of nurture rather than nature. This means that I doubt that such tests can be used to determine whether gender variance is inborn or cultural. (See my post on the differences between men and women for details.)
In Veale's scientific world you have to look into such variables, however, and she does.
She notes that past studies have found that transsexuals are more likely to score in the same way as persons of their target sex when it comes to tests of three-dimensional object mental rotation (which is something men are supposed to excel at). This suggest a neuro-biological explanation for gender variant identity development.
Veale gets the same results among the birth assigned males in her study. The results for the female bodied gender variant responents are less clear, however, as Veale will have to disregard the "systemising quotient" (the interaction between variables) to get the expected results.
She concludes:
"It can be concluded from these inconsistent results that there is at best limited further evidence for a neurobiological explanation of gender variant identity development among birth assigned females."
She finds similar results for the axis "systemising ability" (typicallly male according to sociobiologist Simon Baron-Cohen) and "empathizing ability" (a female enhanced trait according to Baron-Cohen). The male bodied gender variant respondents are more likely to have a "female brain", while there is no significant differences between birth-assigned females with gender variant or gender typical identities for systemizing.
I find it very hard to believe that gender variance in male bodied persons should be neurobiological and variance in female bodied persons should be cultural. There is clearly something wrong with the premise for the argument -- and the methodology.
Veal seems to believe these variables do say something about the origins of gender variance, though:
"Overall, these results are consistent with a prenatal hormone predisposition for gender-variant og gender-typical identities, although the possibility of systemising being caused by more than prenatal androgens and the role of socially desirable responding should not be discounted."
In other words: Gender-variant people may also be tempted to live up to gender stereotypes as this may make their target gender identity more understandable in the eyes of others.
This leaves us with the question of why female bodied respondents are less likely to live up to the stereotypes. Maybe this is caused by the fact that women in general are less likely to be punished for masculine behavior than men are for feminine behavior.
Parental age
This is the first study that shows that gender-variant birth-assigned females are more likely to have older mothers than the rest of the population:
"The more gender-variant a birth-assigned female's identity was, the older the mother tended to be [at the respondents birth]"
The sexual orientation of the respondents was of no relevance.
Veale notes that:
"The link between autism and adult gender-variance that is discussed in Section 8.1.8 [on the systemising quotient] is also relevant here, and it is notable that it was also birth assigned females with gender-variant identities that this study found tended to score more autistic-typically (as opposed to gender-variant birth assigned males who scored less autistic-typically.)"
Please note that Baron-Cohen argues that autism is caused by some kind of hyper-masculine systemizing brain. Finding more autism among female bodied gender variant people might therefore indicate that a male gender identity is caused by a masculine brain development.
At the same time the finding that male bodied transgender people are less likely to be autistic, indicates that their brains are more female.
Again: I strongly advice readers to proceed with caution when reading these types of arguments. There are just too many undocumented steps leading up to the conclusion.
It is interesting to see that Veale finds fewer autistic traits among gender variant male bodied persons than among the non-transgender men, though.
In online fora you will find MTF crossdreamers arguing the opposite: that crossdreaming is somehow related to autism or Asperger among the birth-assigned males. I have suspected that it is gender confusion and shame that have made them less socially adaptable, and not some kind of autism.
Parental cohabitation
In the Veale study the chances of being gender-variant increases the earlier the father leaves the home. On the other hand, cohabitation with mother and parental death is not related to gender variance.
Veale says that:
"Generally, the finding provides some evidence in favour of theories that have proposed that parental absence plays a role in the causation of gender-variance as a psychosocial factor."
Earlier studies has found this correlation among male bodied persons only. Veale's study, however, finds this correlation among birth-assigned females, and not among birth-assigned males.
I am not sure what to make of that, and nor does Veale it seems, who suggests that more research is needed.
Socially desirable responding
When Blanchard & Co find that their data does not support their theory about "autogynephiliacs", they pull up the "they are lying" card.
In their book androphilic (man-loving) trans women cannot be crossdreaming (having "autogynephilic" erotic fantasies), so the ones that do report such arousal are reclassified as "non-homosexual". They must be deceiving themselves and/or the researcher about their love for men, according to Blanchard.
Interestingly, Blanchard never seems to look equally close at the truthfulness of androphilic transwomen. Maybe they are lying about their lack of crossdreaming fantasies, trying to live up to Blanchard's fantasy of the proper "homosexual transsexual"? But such a result would undermine Blanchard's theory, so he ignores this possibility.
I have always found Blanchard's respondents to be extremely frank about their crossdreaming fantasies. If they had been less forthcoming, maybe we wouldn't have been in this mess.
That being said, it is definitely true that many male to female transsexuals have lied to the gate-keepers of hormones and surgery to get the surgery they want. If the gate keepers lives in a world of sexual stereotypes, you'd better learn to live up to them. And if the gate keeper believes proper women love men, you tell him what he wants to hear.
Veale has one big advantage compared to Blanchard. She is not a gate keeper, and in an anonymized online survey the respondents do not have the same reason to sugar coat their life stories.
Veale writes:
"Accounting for social desirability did not significantly change the results. It is possible that the anonymous nature of the survey made it less susceptible to social desirability bias than the past research conducted by Blanchard & al.... and this differs from participation in Blanchard's et al's study which assessed participant's reports of gender-variance experience. Furthermore, participants in Blanchard's et al.'s study may have believed that their access to treatment was contingent on how they responded."
Transsexual vs. no-transsexual gender variant people
Veale finds support for Richard F. Docter's theory of gender variance. He has proposed a continuum from no gender variant identity at one end (often misleadingly labelled as "normal people") to transsexuals at the other end.
Veale puts it this way:
"As outlined in Chapter 2, Docter's (1988) theory of gender variant identity development proposes a continuum from no gender variant identity to transsexualism at the ends, with persons with other gender variant identities being somewhere between these. If this proposal is correct, then it would be expected that the participants with other gender variant identities would score intermediary between transsexuals and participants with gender typical identities on biological and psychological variables."
This is exactly what she finds:
"This was the case for the majority of the biological and the psychosocial variables in the present research that showed between group differences."
The biological origins of gender variance
All of this leads Veale to conclude that biological factors play a role in what causes gender variant identities. She is even willing to consider the possibility that this has one genetic origin:
"While there is evidence for a number of biological variables, this does not necessarily imply more than one biological mechanism plays a role -- these biological factors may be related and share a common precursor. For instance, it is plausible that there is a causal pathway in which genes that cause atypical prenatal hormone levels lead to neuroanatomical differences linked to gender identity."
Does all of this mean that Veale has provided the final truth about the origins of transgender conditions?
I seriously doubt that. But she has made an important contribution to our understanding of what this is all about. What is especially important for crossdreamers, though, is that she has debunked the theories of Ray Blanchard and his followers, on his terms.
This will not make Blanchard change his mind, though. He has invested too much in his restrictive view of humanity do to so. This research will make it easier for other researchers and care takers to develop a less toxic and stigmatizing view of gender variants, though.
Veale puts it this way:
"These findings suggest sexual orientation is not a moderating factor in the development of gender-variant identities in birth assigned males. This is likely to decrease the social stigma associated with gender-variant identities."
Jaimie Veale's publications can be found at her web site.
Richard F Docter: Transvestites and Transsexuals: Toward a Theory of Cross-Gender Behavior (Perspectives in Sexuality) Springer 1988
1. I have always like studies that seem to back up my side. But I have always thought that studies like this could be manipulating the statistics to support a preconceived conclusion.
Also, how did they recruit the people for the poll? Could anyone do it? Was it a random sample? There's lots of ways for the researchers bias to creep in.
I like her conclusions, but I don't trust them.
2. I think that this study was open to anyone. However, if I am to believe people like Senrub, I might suspect that the sample itself is biased, in that if what senrub says is true, then real transsexuals would not participate n the survey and BTW I think that removing senrub's comments and banning her makes this entire discussion very biased and one sided.
I am not sure if I am TS or not but I really found what senrub had to say very helpful in helping me try to figure myself out and I don't think she is transphobic at all.
3. @Lindsay
i have included a link to the thesis in the post. Chapter 5 describes the methodology in detail.
No one, absolutely no one, can do research without taking their own prejudices with them. This also applies to Veale.
She is extremely focused on the methodology, however, and discuss everything she is doing in detail to make sure that all potential problems are covered.
As I noted, there might be some problems with the underlying scientific paradigm, but if this is the case, that will apply to all studies of this kind, including Blanchard's and Benjamin's.
Participants were recruited for an internet-based survey described as investigating the development of gender and sexuality. This was conducted through Google advertising to web sites and search pages that had keywords such as “transsexual”, “transgender”, “sexuality”, and from contacting international gay-, lesbian-, bisexual-, and/or transgender-related online groups and organisations that had a web site asking if they would distribute a call for participants among their members.
There were 2,709 responses to the questionnaire. She used 2,278. 755 reported they were transsexual, 899 other types of gender variant and 623 gender typical.
There is no reason to believe that "real transsexuals" did not take part in this study, unless you define "real transsexuals" as those that adhere to the gospel of the CT/HBS-tribes,. That would mean that transsexual women are defined by their cultural and political belief, instead of sex identity, which is both meaningless and offensive.
The CT/HBS-groups are so small that their lack of response will have little or no statistical significance on any study of trans lives.
4. "The CT/HBS-groups are so small that their lack of response will have little or no statistical significance on any study of trans lives."
I believe that may have been senrub's point. Was it not her assertion that "CT's", (Classic Transsexuals), and those suffering from what has been disparaged as "Harry Benjamin's Syndrome", (HBS), are so raree and so few in number as to be statistically inconsequential?
5. Hi Jack,
It just seems that the group is way too small and it's definitely not a random sample. It's bigger but I'm having trouble believing it's any more reliable than Blanchard's. It looks like she's made a genuine effort to stripped out any bias, which Blanchard failed to do.
I'm sorry that HBS/CT's want to isolate themselves from their roots. They could be a great benefit to the community. But I understand their desire to melt into the background. But that being said, it looks like there are many TS's who don't isolate themselves. Many more than the HBS/TS's who frequent these sites. So I don't think that this study's sample is underrepresented. HBS/CT's aren't anything special they are just a minority of Benjiman's Type 4-6's who for whatever reason want to be left alone but then refuse to just walk away from the TG umbrella which they abhor.
6. Lindsay. Are you always so receptive to the opinions and thoughts of others? You address me as "insanity". Perhaps I should address you as Lewis or Larry.
You must be really insecure as a man.
7. That's hilarious. My auto correct changes InnisAnity to insanity. Didn't even notice it, thanks for pointing it out.
Your reply sounds more like Senrub, are you sure you're not her?
8. I wish. *sigh*. She sounds like a pretty smart post-op Too bad you keep trashing her comments.
9. This comment has been removed by the author.
10. @Lindsay
"It's bigger but I'm having trouble believing it's any more reliable than Blanchard's"
It is definitely much more reliable than Blanchard's. Her sample is much bigger than his.
Remember also that Blanchard make use of data from people who have approached the Toronto clinic for help, most of them wanting to transition. Not only is the geographic range smaller, his sample is also dominated by transsexuals.
There are very few studies out there of transgender people who do not seek out the health system for help. Veale is providing us with one.
Innis Anity may or may not be Senrub, but she is definitely part of the classic transsexual tribe.
Do a search for her pen name in Google and you will see that she has called transactivist Suzan Cooke "a drug addled anarchist" (because she has denounced the HBS agenda).
Innis Anity believes there is a TG conspiracy attempting to trap real transsexual women in a TG Ghetto.
I guess the fact that people like her and Senrub are posting here is a good sign. I must be doing something right if they consider this blog a threat.
I am not going to let any of them do us more harm, however.
11. Jack I think you should let senrub post as she means well and even if she does not agree with everyone here all the time we do need sanity checks and balances. What do you think?
12. Agreed here too ! She does no more damage than blanchard and everyone can interpret all theories differently..
13. I don't have a problem with the HBS/CT crowd if they remain civil. We normally have discussions with no name calling or insults. It seems to me that if you try to present your own beliefs and they differ from what the HBS/CT's advocate that they start up with the insults and name calling. It's like they're trying to sway you through intimidation rather than the strength of their arguments.
I respect every ones beliefs and opinions. I expect the same respect for mine. But my belief is that any one who shows disrespect should be banned (even me, but I think when I've shown disrespect it's been in self defense).
14. Wow! These are great links, Jack.
"From Suzan Cooke, who is almost always good for a laugh...
I was trying to be kind in my assessment.
A " TG conspiracy " ???
"I don't typically give out "advice," since I think everyone's journey is their own, and everyone needs to experience things for themselves and find out what works best. However, there is one thing that I feel more and more strongly about as time goes on, and that is this. If you're someone who someday wishes for a normal life, and if this advice applies to you, you'll know what I mean by "normal," don't out yourself unnecessarily. I remember how good it felt, when I first started my transition, to be open and free and myself. This thing I had hidden for so long, I was finally free to shout to the world without apology if I so chose.
My take on how people have reacted to me has gone through a bit of a journey in and of itself, and it went something like this: Initially, no one out-and-out rejected me. Everyone *seemed* supportive. So I was open about it for a while. But then, I noticed that phone calls stopped, social things stopped, calls from family members decreased. Hmm. Well, perhaps they were only saying what they need to so as not to appear closed-minded, and they knew that guy, and it's a lot to hope for, to have the same relationship as we did before. Not realistic."
15. This comment has been removed by a blog administrator.
16. @senrub and Innis,
Way to keep up the name calling. That really helps your case. It seems you'd rather hurl insults than engage in any form of debate. Whenever anyone tries to make a point you disagree with you just get nasty.
17. This comment has been removed by a blog administrator.
18. This comment has been removed by a blog administrator.
19. This comment has been removed by the author.
20. This blog is very informative and intelligently written.
I'm a gynephilic ts who is attracted to female masculinity.
The following brain study performed on gynephilic ts women (pre hormone) by a research group led by Ivanka Savic really got me to think twice about transitioning
In this study there was no femininization detected in the brains of the gynephilic ts sample. there were differences found between the the male control group and the gynephilic ts but these differences were not characterized by feminization.
I was hoping someone could provide me with links to studies that contradict Savic's findings. I have HRT treatments scheduled to begin next month. I must admit this new finding is a bit disturbing.
Sorry if there is another article on this study somewhere else in this blog. I couldn't find it.
21. @Joanna
We do need sanity checks and balances, which is why I have have encouraged an open debate on this blog.
I have also been very tolerant of the more extreme fringes of the transgender community, which is also why I let Senrub go on for so long.
But I am not taking verbal abuse from anyone, and I am no longer accepting comments from people whose main agenda is to belittle and pathologize crossdreamers. This is what the HBS crowd does.
If you think they represent a voice of reason, please read my posts on the HBS.
The HBS activists have developed an interesting technique:
1. First they present themselves as understanding listeners, not revealing their true intent.
2. Then they start using their own interpretation of Harry Benjamin to draw a line between true transsexuals and other transgender. (Their interpretation is wrong, but let us leave that for a moment)
3. If you challenge their views with facts and arguments, they avoid commenting on anything they do not understand or like, and continue to repeat their main message. They are not really interested in a discussion. They already know the truth.
4. As time goes by, it becomes harder and harder for them to keep their real views hidden, and it becomes apparent to most that they feel a strong contempt for crossdreamers and crossdressers. Senrub comment about me looking through my mother's underwear drawer is typical.
5. When asked to be civil, they start complaining about censorship. And when banned, they present themselves as victims of transgender oppression.
This is, in fact, a very efficient technique. By the time the moderator's patience has run out, they have managed to scare away many of the more reasonable readers, limiting the discussion to what they think is important: The difference between the pure and the unholy.
There is a lot of pain and suffering in transgender circles. The suicide rate among transsexuals is close to 50 percent. The fact that Senrub and others seek a kind of psychological haven in the HBS gospel, should therefore come as no surprise. Our societies are not tolerant of ambiguity, so they try to edit that ambiguity out of their lives. It is understandable.
But by their actions they have become a threat to those of us who do not fit their narrow definitions of right and wrong. They are not here to learn, they are not here to help -- they are here to destroy.
22. @Amy
Take a look at this blog post, which sums up much of what I would say about this research as well.
There are several studies out there now that try to identify the maleness of men and the femaleness of women by studying the differences between brains.
Much of this research is interesting, but also extremely simplistic.
The researchers do not really know that the brain parts they find have anything to do with sex identity, only that they differ between men and women ON AVERAGE.
If you look at the numbers you will always find men with female looking brain parts and women with male looking brain parts. That does not mean that these people are trans. These findings only makes sense on an aggregated level, if at all.
In the studies I have read the researchers are looking at a lot of different parts of the brain. All they can say is that differences in these parts MAY reflect prenatal hormonal influences, not that this particular part is responsible for your sense of self.
I mean, women are more likely to develop breasts than men, that does not mean that her sex identity is anchored in her tits.
The major problem with research like this is that given the fact that these trans women have lived in male bodies for most of their lives, the differences you see can be the end result of any effect of having a male body, many of them completely unrelated to sex identity and many of them developed later in life.
Modern neurophysiologists like V S Ramachandran stress the complex interaction between various parts of the brain and its interaction with the environment. Nearly nothing can be reduced to one and only one gene or brain sector, especially not a complex phenomenon as your sense of self.
Some studies, like the one you refer to, start out with the typology of Blanchard as a premise. Ask yourself why they did not include androphilic trans women. They probably took the answer for granted.
Other studies say that trans women do have feminized brains.
I will come back to you asap with more info.
23. @Amy
I have now uploaded the Savic and Arver paper you referred to to the Crossdream Life library. The online library is open for all crossdreamers, transgender and friends of transgender.
This library contains many of the papers referred to in the debate.
I have read the paper more carefully now that I see that it may actually have a very serious effect on your life.
It has one very important flaw that undermines the results in a serious manner.
Note that the authors say the following:
"Considering that homosexuality and transsexuality are two different phenomena with
presumably different underlying neurobiology, and positing that MtF-TR would have feminized brain, we deemed it relevant to first investigate only nonhomosexual MtF-TR and avoid possible confounds related to homosexuality."
The reason for this is that they use Blanchard's theory as a starting point. (When they say "homosexuality", they actually mean "heterosexuality" in trans women. )
This would have been all very well if they had compared the MTF trans women to both homosexual and heterosexual non-transgender men and women. But they do not. The trans women are benchmarked against heterosexual men and women only.
Ironically, this means it is impossible to find out whether the differences in the brain regions are related to sex identity or to sexual orientation.
In other words: It could be that the similarity between the MTF trans women and the non-transsexual men is caused by the fact that both groups love women.
Given that they have not included androphilic trans women or non-transgender lesbians either, we have no way of finding out.
I would like to add one more thing: You should not make the decision of whether you should transition or not based on one research report.
As the authors of this paper point out, many studies have given different results, and given the rather primitive nature of such research, more discrepancies are to be expected.
Savic and Arver also add the following very important caveat:
...which is more or less what I said in my previous comment.
Ivanka Savic and Stefan Arver "Sex Dimorphism of the Brain in Male-to-Female Transsexuals"
Related posts:
Spanish brain scan study shows male to female transsexuals to be different from men
What brain science says about M2F transsexuals
1. @Jack, ♥️ I appreciated the thoughtful thorough response you provided to @Amy
24. This comment has been removed by a blog administrator.
25. @senrub
It sounds like the only solution to your problem is for Jack and all other TG/TS bloggers to shut down their sites and for all us poor excuse's for men to crawl away in shame. I'm I reading you correctly? You know that will never happen. It's way too late.
If you're really the happy well adjusted woman that you claim to be then why are you even here? You don't consider yourself to be one of us, so why are you threatened by us? Regular women don't hang out here. Regular women aren't constantly haranguing us.
All your comments seem to be destructive. You constantly distort what people say and you take bits and pieces out of context. Why can't you leave us to discuss our petty issues in peace.
I've seen your type my whole life. You're a bully. And it really surprises me that you could do it. I've been TS my whole life. I've had to put up with bullying my whole life. I imagine that when you were a boy you were bullied just like me. Now that your a woman you've decided to bully the very people you once were. It's unimaginable to me how you could do it.
If you truly want to be left alone, leave us alone. We're not going to go away.
26. This comment has been removed by a blog administrator.
27. Senrub, even those who didnt quite feel like transsexuals (but had strong feminine urges), can have an unquestioning need to transition later on..not to meantion those who really were in the same position as youself, but cant transition because of social or economical issues.
Are you even a believer in homosexual rights? If so, why do you not assume there are transsexual lesbians existing who in these days still can get confused for believing ther are straight men at first?
If not, you really are old fashion and should have a reality check to see how there are a lot others not a clear case like yourself.
So why do i care about this not being TG myself? Well lets just say i feel for all of ya, its tough being different..
28. This comment has been removed by a blog administrator.
29. I will continue to delete the comments of Senrub, as soon as I see them.
I will also ask the rest of you not to respond to her bullying.
For those of you who still thinks she is an open minded and innocent participant in an open discourse, I have copied the following comment from one of her comments from yesterday.
Lindsay said
"I've been TS my whole life".
Senrub replied by repeating the HBS dogma, without knowing Lindsay and without respecting her gender identity.
"So you say. Maybe yes, maybe no. You are certainly entitled to your opinion, but I seriously doubt that you are. I certainly would not commit to a positive assessment w/o much more info. But given your long term commitment to your manhood, I seriously doubt that you are. A true TS simply must transition to the closest approximation of their true sex as possible. That is the defining factor. The absolute, total unquestioning NEED, is what defines a true TS. There is no compromise."
She starts out with underlining the need for more information about the sex identity of Lindsay, but ends up denouncing her anyway. In her eyes anyone who defends crossdreamers cannot be a real woman.
As I said, give an HBS troll enough time and her true nature shines through. It is not a pretty sight.
30. Senrub, yeah i was refering to the so called trans-bians.. and yeah i think i get what your game here is...
I was refering to homosexual rights because you obviously deny the existence of lesbians. If transsexuals are real women just like other cissexual women, there are some lesbians like there are some lesbian transsexuals, or do you deny transwomen to be like real women? Furthermore, what about lesbian transwomen who transitions early because they have a real need to do so, just like yourself? By your standards, they would qualify as "real women" too. And no, im not using the word transbian, just likei dont use the word transhomosexual for you.
Jack, i dont mind replying to Senrub unless you wont mind that. I didnt even know there were "right wing" transsexuals so im actually interested in seeing what shes all about..
31. This comment has been removed by a blog administrator.
32. This comment has been removed by a blog administrator.
33. This comment has been removed by a blog administrator.
34. This comment has been removed by a blog administrator.
35. This comment has been removed by a blog administrator.
36. @senrub
Why don't you go away? You're wasting bandwith. Everyone can see who and what you are. You don't want a civil debate. If anyone dare to disagree with you, you call them names, insult them and try to intimidate them. You can't stand someone having a different opinion than yours.
These are all traits of a bully. And most if not all TS's have had to put up with people like you. We don't need more bullying from a fellow TS. You should be ashamed of yourself. All you're doing is making your cause look ridiculous. Thank God you seem to be one of the few with these beliefs.
I look forward to what you call me this time. I learned long ago to ignore the insults and to laugh at them.
37. This comment has been removed by a blog administrator.
38. @ senrub,
I've answered your questions repeatedly but you just browbeat me. You never answer any of my questions about you.
"Please explain to me how this in any way makes you a woman. Remember. I am not denying your transgender identity."
OK, let me turn the question on you. How does inverting your penis make you a woman? You're the one case where Blanchard's models work. You're a effeminate homosexual male. Can I call you Bob?
How do you like that? Do you like me accusing you of something that's not true? That's what you do to me and others here all the time. You know nothing about me, but you make blanket statements about me.
You're just a bully and I know how to deal with you.
39. This comment has been removed by a blog administrator.
40. @senrub
How is what I said insulting to you? Calling you a bully? Now you parrot me by calling me a bully, what a joke. When have I bullied you?
What I did was cite an example. Did you read the next statement? (Do you like me accusing you of something that's not true?) I was only giving you an example of what you say to me and others here. Did you like it? Go back and read my replies to your posts and you'll see that I have not insulted you. I have answered your questions by stating my own opinions. I have not answered any insulting questions. Do you keep asking the same questions hoping I'll change my mind? You take snippets of what I say out of context and turn them into insults. You are failing to make your point by making personal attacks on people with different opinions than your own.
I'll repeat for the umpteenth time, you know almost nothing about me, both from my past or the present. How can you make such blanket untrue statements. Everyone here can see you for the bully you are. Please go away and quit wasting our time.
When you stop with the personal attacks, name calling and respect other peoples opinions I'll gladly call a truce.
41. This comment has been removed by a blog administrator.
42. If your criteria for being a real woman is early transitioning because of a life threatening need (assuming you were suicidal) and not wanting anything to do with men, there is much to discuss.
I can agree with you on the first one but the second one is way off. This article proves all of it, every single one of us is a gender variant at least to some degree. And this has nothing to do with sex-dysphoria itself. Thats why you can be a masculine woman, lesbian identified transwoman but still have a lifethreatening need to transition. The dysphoria might feel less because at least masculine lesbian can cope with the exact same problem you had, but as a straight man, like Lindsay. It has nothing to do with a wet dream, clinicians sure take this into account when making the diagnosis. Its not like anyone would lie to them to fulfil a sexual fantasy of being a "transbian".
If you insist on pointing out why others with a deep feeling of feeling like a woman, are not real woman, i can turn the question back on you like Lindsay did earlier. You were born a man, have the biology like a man, you did unnatural procedures of changing your natural body into something artificial, how are you a real woman? Im sure i can find as many feminists to support the previous claim i had, as i can find people supporting your way of thinking. Trans-fanaticism never wins, thats why im trying to open up your narrow mindedness as kindly as possible, at least without insulting.
43. This comment has been removed by a blog administrator.
44. This comment has been removed by the author.
45. Lindsay and Sam Z
I understand your feelings, and the desire to set things straight. This especially applies to you, Lindsay, as Senrub again and again denies you the right to call yourself a woman.
The fact that transsexual women can spend so much time on attacking other trans women is sickening, and says a lot about their state of mind.
Still, please do not feed this troll anymore.
46. This comment has been removed by a blog administrator.
47. This comment has been removed by a blog administrator.
48. @Senrub
Imagine a member of the Ku Klux Klan entering a support group for African-Americans.
He starts preaching his racist gospel, expecting the black people present accept his philosophy.
He gets insulted when they argue against him, and argues that their very resistance is proof of their racial inferiority.
When they finally ask him to leave, exasperated by his lack of civility, he starts complaining about censorship.
What you do, Senrub, is no less insulting than this.
But let us make this very simple. Reflect on what normal people do when they are no longer welcome in a house. They leave.
This blog is my home. You are no longer welcome.
GET OUT!
49. This comment has been removed by a blog administrator.
50. I do understand your resentment jack because I am always skeptical of someone who needs to find fault and critisize. I have never understood why some transsexuals feel the need to attack others because they don't measure up to a set of criteria of their own choosing. I remember reading the transsexual phenomenon and never once read any vitriol or categorizing in terms of order of superiority the types of transsexuals.
51. In my experience anger ALWAYS points to insecurity. I am also basically an advanced disphoric and have been all my life but I wish everyone well in their personal journeys. I don't get the motivation for attacks if that individual is secure and well adjusted...
52. @Joanna
"In my experience anger ALWAYS points to insecurity."
Yes, I agree. Or at least, this applies to the kind of obsessive anger we witness here.
Anger in itself i neither good nor bad, it is only a natural response to what the psyche perceives as a threat.
If the threat is real, and all other options have been explored, expressing anger may be legitimate.
53. Calling a charlatan and a fraud out for being what they are is not an expression of anger nor a personal attack. It is a simple expression of opinion. An opinion which I am prepare to substantiate with the false statements, outright lies and the hypocrisy of the double standards exhibited on this blog.
Calling those that disagree with your personally self-serving justifications and pure folderol, racists, trolls and other vile names is clearly an angry expression of being in that frustrating position of not having any valid or meaningful answer to being called out for such ridiculously unbelievable allegations and assertions that men, who live, work and have sex as men are "really women", because they "cross-dream" they are and say so.
Face it Jack. You are an angry man for a variety of reasons, not least of which is the success of some, where you have failed.
I am not angry. I am amused by your antics.
54. @Joanna.
" I remember reading the transsexual phenomenon and never once read any vitriol or categorizing in terms of order of superiority the types of transsexuals".
You are conflating here. Clearly there were several different categorizations made into groups and types. They were not made for the purpose of proposing or supporting a "hierarchy", or 'proving" any type of "superiority". That idea has been demagogued by TG's and cross-dressers in just one more "trans"parent effort to disparage this seminal work.
Further, I have never proposed nor addressed any "criteria". If you go back and read many of the comments in this thread, you will find that those "criteria" are the words and ideas of those vicious and malicious, an self-justifying individuals in their efforts to silence me.
55. Senrub the whole idea of arguing amongst trans people disturbs me. Not only because it is divisive but mostly because it serves no purpose. Assuming that you are comfortably and happily a woman then why not lead your life and just not come here? If these people (myself included) are poor, confused and dellusional crossdreamers or trans people then why not just leave us alone to try and figure out what makes us tick?
After all you've arrived and the rest of us are confused. Your combatative style is not helping either. I guess I'm trying to figure out your motivation since no one here means you any harm.
Please explain...
56. Of course benjamin categorized transsexuals but never once will you find any judgemental statements saying that for example early transitioners are women and late transitioners. So I don't for one minute buy your argument. Categorizing is just grouping without value judgement pure and simple. Conventional transvestites are also treated respectfully in the book I might add...
57. I never finished my sentence sorry.....that late transitioners are men in dresses...
58. The crux of the argument from the HBS crowd is quite simple actually. They see themselves as true transsexuals because they knew they were women early and did something about it before they jumped off a bridge or blew their brains out.
The problem with this argument is that, like most arguments around this issue, there is very little to no science to back it up,
In the end it is all conjecture which is why Benjamin rightly stuck to pure observation back in 1966. Had there been then or now conclusive evidence to their argument then it would be included in the latest research studies.
Everyone agrees that Blanchard is the enemy because he treats everyone equally poorly in that the HBSers are homosexual men and the rest of us perverts.
But what is particularly fruatrating for HBSers is the idea that gender fluidity is more like a spectrum with they being on the furthest side of the disphoric scale. This of course implies that they get lumped in with the rest of us "pretenders" which is of course the most galling thing of all.
This frightens and hits home which then brings out the vitriol.
I don't pretend to be anything as I am a confused disphoric trying to figure out how to live with this abnormality. However I refuse to believe that HBSers are real women solely on the basis of their one argument.
In the end none of us really are nor ever will be but our brain thinks we are and how to deal with that little voice is what this whole thing is all about.
59. All that being said I am a firm supporter of transition if it will keep you from going bananas. This is hard enough to live with and there is not a day that goes by that I don't imagine what my life might be like as a woman. I am petrified to need to do something to my body and am looking for alternative solutions all the time...
60. I was planning to repost my "deleted" comments to point out that I am not many any 'argument' or proposing any 'criteria' or value system. You and your friends hear seem to have a fetish for these arguments and falsely attributing them to me.
Accusing me of being 'combative' is just one more example of your passive aggression, when the truth is that all I have done is question the validity of the ridiculous assertion that a man, who has lived his entire life as a man, worked as a man, had sex as a man for 50+ years and has benefitted from male privilege is "really a woman", just because he claim to be.
In order to classify this tiresome exercise as a discussion or even a debate, those issues raised by one party or the other, need to be addressed.
To answer my question as to why I persist in pointing out the misrepresentations, conflations and out-right lies, is that this "narrative", this "thesis" that "cross-dreamers"/transvestites are in any way related to men or women born with a cross-sexed neurology is just plain false.
It sows confusion and conflict. It allows those with a private self-serving agendato pass off their crackpot theories as eal science or research.
Why do you think Jack is so afraid to engage in open constructive debate? He knows that his arguments have no substance. All he can do is attempt to silence the messenger by any means possible. I ask a real question.
Answer it.
61. You don't get it senrub do you? No one is claiming to be a woman here. The reason people transition is to get rid of their horrible disphoria. Inverting your penis and taking hormones does not make you a woman. GID is an illness plain and simple. The more extreme the disphoria the more likely you will transition. Oh and as far as having sex as a man? I CANNOT! Why not? Because I have gender disphoria and need to fantasize myself as a woman? How many men do you know who need to do that??
62. I see. Thank so much for clarifying that for me. No doubt your personal feelings and self-identification as a gender dysphoric man will apply to all your friends and fellow transgenders, T-gurls and twans-women. I must have missed that memo.
Be sure to inform them that perhaps that is why women, reject the idea of having these dysphoric men in our private spaces.
Oh, and nice dig on the 'inverted penis' meme. Way to keep it civil. LOL...Like water off a ducks back. You start with that and you lose the argument and all respect. Sorry about your dick Charlie.
63. Its a fact and I'm sorry that it disturbs you but you are a transsexual and not a cis woman. I have no issue whatsoever with your transition and you did absolutely the right thing. But if some poor deluded disphoric does the same thing that is not your concern. You are not more superior than that person by virtue of your transition path. Everyone has a right to deal with their disphoria in whatever way they see fit.
You don't know me nor my struggles and don't have any right to make any sort of value judgements on what I might do or not do to my body.
There is no hierarchy in the trans community other than what is being artificially created by people such as yourself. That reason remains unclear to me.
But if you think my personal struggles with gender disphoria are steeped in self dellusion I could care less. As I have said no one has made any pronouncements on your chosen path and you might want to do the same vis a vis others.
The fact that you think we are all men in dresses has no bearing on my daily reality in dealing with this issue since a very tender age and your constant baiting serves no purpose.
If you have some useful advice for us disphorics then we're all ears...
64. Ah...the ol' "cis-woman" vs "trans-woman". Just the needed device for othering one from the other invented by the trannie-tribe to separate and distinguish real women from fake women.
Great effort. You keep going round and round labeling yourself and others as delusional, perverted, superior, hierarchy, etc., etc,, etc. These are your words not mine. Trying to accuse me of that type of thinking is just another "trans"-parent example of you projecting your own self-loathing and feelings of inferiority onto others.
Let me ask you this. Why are you so intent on attacking me when it is my message that causes you so much angst?
I have never called you a man in a dress. You have. You call yourself deluded and abnormal and then you lash out at me in frustration because I have achieved that quiet sense of normality that you so angrily covet.
The biased flaws in your thinking can be seen here: "There is no hierarchy in the trans community other than what is being artificially created by people such as yourself".
You blindly ignore the fact that folks like me are not a part of your "trans-community". Who is the "separatist". Are you not the one making the distinction between "trans", and the rest of society? Is that not why your community invented the concept of "cis"? To other yourself, to separate yourself from other women?
Yet you call me the separatist. Here is a reality check for you. What you think about yourself does not matter a whit to others. They see what they see and hear what they here and they/we, the society at large make the call. Not you. Not me
65. I have never called myself a man in a dress. I suffer from gender disphoria and always have. I bear no one any ill will and will never understand why people like you have a problem with this site or the people who post here. I don't want to be a transsexual and only seek for viable and effective methods to treat my condition. The rest is unimportant to me.
For me the transgender most certainly includes transsexuals like yourself becsuse you have felt compelled to alter the body you were born with. The reason for this is not yet understood. You form part of a group of people in this world who are not comfortable with their birth gender and that by default qualifies you for membership.
The fact that you feel you are exceptional due exclusively to your having transitioned early is not reason enough for me but you are certainly entitled to your opinion.
66. Parsing the language now. How trite. You self-describe as a gender dysphoic man. You tell us how you are pleased by the fact that you are perceived as a woman when cross-dressed.
While I understand that you somehow see your self as a woman are you not still a gender dysphoric man...wearing a dress?
Perhaps the cross-dressing somehow relieves your GD. If this is the case then perhaps this is a good thing for you.
You are most surely mistaken if you believe that I "form part of a group of people in this world who are not comfortable with their birth gender and that by default qualifies you for membership".
I am perfectly happy with both my gender and my sex. I am quite sure that "at birth" I had no concept of either my birth, my gender, or my sex for that matter.
And it you want to forcibly qualify me for some politically motivated label, against my will I might add, then perhaps we should consider your dick as qualification as a male.
PS: Nobody has said that "I feel exceptional" except you. Stop attributing your thoughts an misgivings to me. Those are your thoughts and feelings not mine.
67. Yes the crossdressing helps me manage my disphoria.
What is exactly is the point you are trying to make to everyone here by the way? Maybe I missed it. Is it that by virtue that you were always a woman that disqualifies you from the transgender umbrella?
I'm good with that if it makes you happy.
68. Oh and thanks for pointing out the obvious...of course I'm male. I am a disphoric male. Why exaxtly do you come here senrub? Do you suffer from GD?
69. Joanna. I have no issue with you. You seem to have a realistic grasp of your own condition. In truth I am bewildered why you choose to beat a dead horse. Jack insisted that I "GET OUT" of his house, comparing me to a KKK racist.
You might remember that I slunk off as would be expected of a good house n*****r. "Yassa Massa. I be goin' now Massa. Thank You Massa".
I was happily on my way until you began your baiting, by "trans"-parently speculating "why some transsexuals feel the need to attack others because they don't measure up to a set of criteria of their own choosing". Something that I have never done and represents just one more flight of your fanciful imagination which you seem compelled to attribute to those you see as your enemy,
Kinda sad, really.
70. I don't see anyone as my enemy other than my GD and I have had to embrace a kind of duality of gender in order to bear it. I wish anyone with anyone with any gender incronguity well because its no picnic to live with.
Be well...
71. This comment has been removed by a blog administrator.
Click here for this blog's Code of Conduct!
Discuss crossdreamer and transgender issues!
|
global_01_local_1_shard_00001926_processed.jsonl/21607
|
nivten theory 2, Science
why say f=ma
Posted Date: 8/1/2016 4:42:29 AM | Location : Sri Lanka
Related Discussions:- nivten theory 2, Assignment Help, Ask Question on nivten theory 2, Get Answer, Expert's Help, nivten theory 2 Discussions
Write discussion on nivten theory 2
Your posts are moderated
Related Questions
elow chart of vertibrates
Explain the Functions of Unicellular Organism You might wonder what functions a single-celled organism is capable of performing. Surprisingly, a unicellular organism is able to
Describe the factors which decide the broad area of Scientific activity.
how do you find the contour interval
Define the Ear Canal The other part of the outer ear is the ear canal. The ear canal, which conveys the sound to the eardrum, is a rather tortuous canal. It is lined with skin,
Neptune The eigth planet, Neptune, was discoveted in 1846 by astronomer Johann Gottfried Galle. We have already told you the story of its discovery in last. It is so f
how do they protecte themselves
Define The Large Intestine The large intestine or colon is about five feet long. It begins at the caecum and terminates at the rectum and anal canal. It is divided into a numbe
Demonstrating an eclipse of the moon Use a flash light or a lighted candle in a darkened room to show the sun. Hold an 8 cm rubber ball in one hand to show the earth. Hold a 2-
Explain the Functions of Gastric Juice - Antiseptic Action Antiseptic action: Hydrochloric acid in the gastric juice acts as a barrier to the passage of certain microorganisms
|
global_01_local_1_shard_00001926_processed.jsonl/21633
|
Anomaly: Warzone Earth Announced for Xbox 360
11 bit studios' "tower offense" strategy game coming to XBLA next spring
11 bit studios sent out a press release announcing that the Xbox 360 version for Anomaly Warzone Earth, a game that puts players in charge of a military convoy, will be released in Spring 2012. In this game, players take part in battles personally to support and assist a hand-picked armor squad, utilizing their top-down tactical view to plot each and every turn of the convoy. As they progress through the story campaign and challenge modes, players will unlock upgrades and new units to build their ultimate destruction squad. Five screenshots depicting the Xbox 360 version of this title made their way through our gallery.
|
global_01_local_1_shard_00001926_processed.jsonl/21646
|
Bad Advertisement?
Are you a Christian?
Online Store:
• Visit Our Store
The new scene and conditions of Christ's high-priestly work - the higher sanctuary and the better covenant (ch. viii. 1-6) - are presented with more detail.
1. Ordinances of divine service (dikaiwmata latreiav). For dikaiwma ordinance, see on Rom. v. 16. For latreia service, see on Luke i. 74; Apoc. xxii. 3; Philip. iii. 3; 2 Tim. i. 3. The meaning is ordinances directed to or adapted for divine service.
A worldly sanctuary (to agion kosmikon). The A.V. misses the force of the article. Rend. and its sanctuary a sanctuary of this world. To agion in the sense of sanctuary only here. Elsewhere the plural ta agia. of this world in contrast with the heavenly sanctuary to be mentioned later. 207
2. Was made (kateskeuasqh) See on ch. iii. 3.
The first. The first tabernacle, that is, the first division of the tabernacle. He speaks of the two divisions as two tabernacles.
Candlestick (lucnia). Rend. lampstand, See on Matt. v. 15; Apoc. i. 12. Description in Exod. xxv. 31-37. Comp. Zechariah 4. The table and the shewbread (h trapexa kai h proqesiv twn artwn). See Exod. xxv. 23-30; x xxv. 13; 2 Chron. ii. 4; xiii. 11. The table and the loaves are treated as one item. Lit. the table and the setting forth o f the loaves, that is, the table with its loaves set forth. See on Mark ii. 26; Acts xi. 23.
Which is called the sanctuary (htiv-agia). Since it was thus furnished. See on ch. viii. 2.
3. After the second veil (meta to deuteron katapetasma). According to Exod. xxvi. 31-37 there were two veils, the one before the door of the tent and the other before the sanctuary. After passing the first veil and entering the tent, the worshipper would see before him the second veil behind which was the holy of holies. The writer calls this also a tabernacle, ver. 2.
4. The golden censer (crusoun qumiathrion). The noun N.T.o . It may mean either censer or altar of incense. In LXX the altar of incense is called qusiasthrion qumiamatov Exod. xxx. 1, 27; Lev. iv. 7; comp. Luke i. 11. Qumiathrion is used of a censer, 2 Chron. xxvi. 19; Ezek. viii. 11; 4 Macc. vii. 11. These are the only instances of the word in LXX: accordingly, never in LXX of the altar of incense. Josephus uses it for both. The golden censer is not mentioned in O.T. as a part of the furniture of the holy of holies. The facts of the case then are as follows:
(b) Philo and Josephus use qumiathrion for the altar of incense; 208
(c) there is no mention in O.T. Of a censer set apart for the day of atonement;
(d) the high priest was to enter with incense, so that the ark might be veiled by the smoke (Lev. xvi. 12). Hence the censer could not have been kept in the holy of holies;
(e) the writer clearly speaks of an abiding-place of the qumiathrionin a particular division of the tabernacle.
There is evidently a discrepancy, probably owing to the fact that the writer drew his information from the O.T. by which he might have been led into error. Thus Exod. xxvi. 35, there are mentioned in the holy place without the veil only the candlestick and the table, and not the incense-altar. Again, when the standing-place of the incense altar was mentioned, the expressions were open to misconstruction: see Exodus xxx. 6; xl. 5. On the day of atonement, the incense-altar, like the most holy place, was sprinkled with blood. This might have given rise to the impression that it was in the holy of holies.
With gold (crusiw). Properly, wrought gold.
Wherein (en h). But according to Exod. xvi. 34; Num. xvii. 10, neither the pot of manna nor Aaron's rod was in the ark, but "before the testimony"; while in Exod. xxv. 16, Moses was commanded to put only the tables of the law into the ark; and in 1 Kings viii. 9 it is said of the ark in the temple, "there was nothing in the ark save the two tables of stone." The writer follows the rabbinical tradition that the pot of manna and the rod were inside of the ark.
Golden pot (stamov crush). Stamov, N.T.o , a few times in LXX, rare in Class. Golden is an addition of the LXX. Comp. Exod. xvi. 33.
5. Cherubim of glory (ceroubein doxhv). Setting forth or exhibiting the divine glory. The word signifies living creatures, and they are described as zwa. Hence usually with the neuter article ta. See Isa. vi. 2, 3; Ezekiel i. 5-10; x. 5-20, and comp. Apoc. iv. 6-8. Nothing could be more infelicitous than the A.V. rendering of zwa beasts.
Shadowing the mercy-seat (kataskiazonta to ilasthrion).
Kataskiazein, N.T.o , o LXX, occasionally in Class. Throwing their shadow down upon the mercy-seat. For, iJlasrhrion, see on Romans iii. 25. Used in LXX to translate qophert, the place of covering sin, the throne of mercy above the ark.
Always (dia pantov). Rend. continually. The phrase is usually found in connection with matters involving relations to God - worship, sacrifice, etc. See Matt. xviii. 10; Luke xxiv. 53; Acts ii. 25; x. 2; 2 Thessalonians iii. 16; Heb. xiii. 5.
Accomplishing (epitelountev). See on ch. viii. 5, and Gal. iii. 3. The verb is used of performing religious services by Herodotus. See i. 167; ii. 63, 122; iv. 186.
7. Errors (agnohmatwn). Lit. ignorances. See on ch. v. 2.
The way into the holiest of all (thn twn agiwn odon). Lit. the way of the holies. For the construction comp. odon ejqnwn way of the Gentiles, Mark x. 5. The phrase N.T.o . Twn ajgiwn as in vers. 12, 24, 25; x. 19. While as the first tabernacle was yet standing (eti thv prwthv skhnhv ejcoushv stasin). By the first tabernacle is meant the first division. The point is that the division of the tabernacle showed the limitations of the Levitical system, and kept the people from coming directly to God. Of this limitation the holy place, just outside the second veil, was specially significant; for the holy place barred priests and people alike from the holy of holies. The priests could not pass out of it into the holy of holies; the people could not pass through it to that sanctuary, since they were not allowed in the holy place. The priests in the holy place stood between the people and God as revealed in the shrine. Exoushv stasin, lit. had standing. The phrase N.T.o . Stasiv everywhere in N.T. except here, is used in its secondary sense of faction, sedition, insurrection. Here in its original sense. Note that the sense is not physical and local as the A.V. implies, but remained a recognized institution.
A figure (parabolh). Outside of the Synoptic Gospels, only here and ch. xi. 19. Here of a visible symbol or type. See on Matt. xiii. 3. For the time then present (eikv ton kairon ton enesthkota). Rend. now present, as contrasted with the "time of reformation," ver. 10. See on these last days, ch. i. 2. jEiv for; with reference to; applying to. Kairov season is used instead of aijwn age, because "the time" is conceived by the writer as a critical point, - a turning-point, at which the old system is to take its departure. For ejnesthkota present, see on Gal. i. 4, and comp. Rom. viii. 38; 1 Cor. iii. 22.
In which (kaq hn). The A.V. wrongly assumes a reference to the tabernacle; whereas the reference is to the parable. Rend. according to which.
Were offered - could not (prosferontai mh dunamenai). Rend. "are offered" or "are being offered"; and for "could not," "cannot." Make him that did the service perfect (teleiwsai ton latreuonta). Rend. as Rev. "make the worshipper perfect." See ch. vii. 11.
As pertaining to the conscience (kata suneidhsin). Having shown that the division of the tabernacle proved the imperfection of the worship, the writer will now show that the Levitical ritual did not accomplish the true end of religion. The radical defect of the Levitical system was its inability to deal with the conscience, and thus bring about the "perfection" which is the ideal of true religion. That ideal contemplated the cleansing and renewal of the inner man; not merely the removal of ceremonial uncleanness, or the formal expiation of sins. Comp. Matt. xxiii. 25, 26. For suneidhsiv conscience, see on 1 Pet. iii. 16.
10. The impotence of the gifts and sacrifices lay in the fact that they were only symbolic ordinances.
Which stood in (epi). The passage should be read thus: "according to which are offered gifts and sacrifices which cannot perfect the worshipper as touching the conscience, being mere ordinances of the flesh on the ground of (epi resting upon) meats," etc.
Meats and drinks and divers washings (brwmasin kai pomasin kai diaforoiv baptismoiv). Brwmasin, clean and unclean meats. pomasin drinks, concerning which the Levitical law laid down no prescriptions except as to abstinence in the case of a Nazarite vow, and of the priests when they were about to officiate. See Num. vi. 3; Lev. x. 9. For baptismoiv washings see on ch. vi. 2.
And carnal ordinances (dikaiwmata sarkov). Omit and. The phrase is a general description of meats, etc. Lit. ordinances of the flesh. Imposed (epikeimena). Some interpreters find in this the suggestion of a burden, which these ceremonial observances assuredly were. Comp. Acts xv. 10. This, however, is not probable.
Until the time of reformation (mecri kairou diorqwsewv).
Diorqwsiv N.T.o , o LXX, occasionally in Class. Diorqwma correction, amendment, Acts xxiv. 2. Diorqwsiv lit. making straight: used by medical writers of straightening a distorted limb. The verb diorqoun (not in N.T.) in LXX of mending one's ways, Jer. vii. 3, 5; Wisd. ix. 18. Of setting up or establishing, Isa. xvi. 5; xlii. 7. "The time of reformation" is the Christian age, when God made with his people a better covenant. It was inaugurated by the death of Christ. See on ch. i. 2. The gifts and offerings were only provisional, to tide the people over to the better time.
11. The time of reformation introduces a higher sanctuary, a better offering, a more radical salvation.
Having come (paragenomenov). Having appeared in the world. Only here in Hebrews, and only once in Paul. 1 Cor. xvi. 3. Most frequent in Luke and Acts.
Of good things to come (twn genomenwn agaqwn). According to this reading the A.V. is wrong. It should be "of the good things realized," or that have come to pass. The A.V. follows the reading mellontwn about to be. So Tischendorf and Rev. T. Weiss with Westcott and Hort read genomenwn. Blessings not merely prophetic or objects of hope, but actually attained; free approach to God, the better covenant, personal communion with God, the purging of the conscience.
Through a greater and more perfect tabernacle (dia). The preposition is instrumental. Comp. ver. 12. Const. with ajrciereuv high priest, and as qualifying it. "A high priest with a greater and more perfect tabernacle." It has been shown that the new high priest must have a sanctuary and an offering (ch. viii. 2-8). Accordingly, as the Levitical priests were attached to (were priests with) an inferior tabernacle, so Christ appears with a greater and more perfect tabernacle. For this use of dia see Rom. ii. 27; xiv. 20; 2 Cor. ii. 4; iii. 11. Note the article with tabernacle, his greater, etc. That is to say not of this building (tout estin ou tauthv thv ktisewv). For building rend. creation. See on Rom. viii. 19; 2 Corinthians v. 17; Col. i. 15. The meaning is, not belonging to this natural creation either in its materials or its maker.
12. By the blood of goats and calves (di aimatov tragwn kai moscwn). Dia with, as ver. 11. Moscov originally a tender shoot or sprout: then offspring generally. Everywhere in the Bible calf or bullock, and always masculine.
His own blood. The distinction is not between the different bloods, but between the victims. The difference of blood is unimportant. Regarded merely as blood, Christ's offering is not superior to the Levitical sacrifice. If Christianity gives us only the shedding of blood, even Christ's blood, it does not give us a real or an efficient atonement. Whatever significance may attach to the blood is derived from something else. See on ver. 14. Once (efapax). Rend. once for all.
Having obtained eternal redemption (aiwnian lutrwsin euramenov). Having found and won by his act of entrance into the heavenly sanctuary. This is better than to explain "entered the sanctuary after having obtained redemption by his life, death, and resurrection"; for the work of redemption is crowned and completed by Christ's ascension to glory and his ministry in heaven (see Romans 6). Even in the old sanctuary the rite of the Day of Atonement was not complete until the blood had been offered in the sanctuary. Eternal, see or ch. vi. 2. Not mere duration is contemplated, but quality; a redemption answering in its quality to that age when all the conditions of time shall be no more: a redemption not ritual, but profoundly ethical and spiritual. Lutrwsin redemption, only here, Luke i. 68; ii. 38. See on might redeem, Tit. ii. 4.
13-14. Justifying the preceding words, and answering the question, What has Christ to offer?
13. Ashes of a heifer (spodov damalewv). Spodov ashes, only here, Matt. xi. 21; Luke x. 13, in both instances in the phrase sackcloth and ashes. Often in LXX. Damaliv heifer, N.T.o . The two examples selected cover the entire legal provision for removing uncleanness, whether contracted by sin or by contact with death. "The blood of bulls and goats" refers to the sin-offerings, perhaps especially to the annual atonement (Leviticus 16); "the ashes of a heifer" to the occasional sacrifice of the red heifer (Numbers 19) for purification from uncleanness contracted by contact with the dead. The Levitical law required two remedies: the Christian economy furnishes one for all phases of defilement.
Sprinkling the unclean (rantizousa touv kekoinwmenouv). For sprinkling see on 1 Pet. i. 2. The verb only in Hebrews, except Mark vii. 4. For the unclean rend. them that have been defiled. The literal rendering of the participle brings out better the incidental or occasional character of the defilement.
14. Through the eternal spirit (dia pneumatov aiwniou). For the rend. an. Dia through = by virtue of. Not the Holy Spirit, who is never so designated, but Christ's own human spirit: the higher element of Christ's being in his human life, which was charged with the eternal principle of the divine life. Comp. Rom. i. 4; 1 Cor. xv. 45; 1 Pet. iii. 18; Heb. vii. 16. This is the key to the doctrine of Christ's sacrifice. The significance and value of his atonement lie in the personal quality and motive of Christ himself which are back of the sacrificial act. The offering was the offering of Christ's deepest self - his inmost personality. Therein consists the attraction of the cross, not to the shedding of blood, but to Christ himself. This is Christ's own declaration, John xii. 32. "I will draw all men unto me." Therein consists its potency for men: not in Christ's satisfaction of justice by suffering a legal penalty, but in that the cross is the supreme expression of a divine spirit of love, truth, mercy, brotherhood, faith, ministry, unselfishness, holiness, - a spirit which goes out to men with divine intensity of purpose and yearning to draw them into its own sphere, and to make them partakers of its own eternal quality. This was a fact before the foundation of the world, is a fact today, and will be a fact so long as any life remains unreconciled to God. Atonement is eternal in virtue of the eternal spirit of Christ through which he offered himself to God.
Offered himself without spot (eauton proshnegken amwmon). The two other elements which give superior validity to Christ's sacrifice. It was voluntary, a self-offering, unlike that of brute beasts who had no volition and no sense of the reason why they were offered. It was spotless. He was a perfectly righteous, sinless being, perfectly and voluntarily obedient to the Father's will, even unto the suffering of death. The legal victims were only physically unblemished according to ceremonial standards. Amwmov in LXX, technically, of victims, Exod. xxix. 1; Lev. i. 3, 10, etc.
Purge your conscience (kaqariei thn suneidhsin hmwn) For your rend. our. The superior nature of Christ's sacrifice appears in its deeper effect. While the Levitical sacrifice accomplished only formal, ritual expiation, leaving the inner man unaffected, while it wrought externally and dealt with specific sins the effect of Christ's sacrifice goes to the center of the moral and spiritual life, and cleanses the very fountainhead of being, thus doing its work where only an eternal spirit can do it. Kaqarizein to purge is not a classical word. In Class. kaqairein (also in LXX): but kaqarizein appears in inscriptions in a ritual sense, and with ajpo from, as here, 211 thus showing that the word was not confined to biblical and ecclesiastical Greek.
15. The efficacy of Christ's sacrifice is bound up with a covenant. His priesthood involves a new and a better covenant. See ch. viii. 6-13. That covenant involves his death.
For this cause (dia touto). Indicating the close relation between the cleansing power of Christ's blood and the new covenant.
Mediator of the new testament (diaqhkhv kainhv mesithv). For the new testament rend. a new covenant. See on next verse. For mesithv mediator, see on Gal. iii. 19, 20.
By means of death (qanatou genomenou). Rend. a death having taken place.
For the redemption of the transgressions (eiv apolutrwsin twn parabasewn). The phrase redemption of transgressions (that is, from transgressions) only here. jApolutrwsiv in N.T. mostly absolutely: the redemption, or your redemption, or simply redemption. Twice with genitive of that which is redeemed, Rom. viii. 23; Eph. i. 14. Only once in LXX, Dan. iv. 32. For parabasiv transgression, see on Romans ii. 23.
Under the first testament (epi). On the basis of: estimated according to the standard of the provisions of the first covenant, and to be atoned for in the way which it prescribed. By this expression he emphasizes the insufficiency of every other atoning provision, selecting the system which represented the most elaborate and complete atonement for sin prior to Christ. The intimation is in the same direction with that of the phrase through an eternal spirit - that the ideal redemption must be eternal. They which are called (oi keklhmenoi). Without regard to nationality. The scope of the new covenant was wider than that of the old. Comp. Acts ii. 39. In ch. iii. 1, the readers are addressed as "partakers of a heavenly calling," which corresponds with "eternal inheritance" here. Those who obtain this inheritance are designated as "called." See Eph. i. 18; 1 Thessalonians ii. 12; v. 24; 1 Pet. iii. 9.
Of eternal inheritance (thv aiwniou klhronomiav). Rend. "the eternal inheritance": something recognized as a fact. For klhronomia inheritance, see on 1 Pet. i. 4, and comp. Eph. i. 14. The whole statement implies that the provisions of the Levitical system were inadequate to procure and insure full salvation.
16. For where a testament is (opou gar diaqhkh). "The English Version has involved this passage in hopeless obscurity by introducing the idea of a testament and a testator." This statement of Rendall (Epistle to the Hebrews, p. 159) is none too strong. That interpretation, however, is maintained by a very strong array of modern expositors. 212 It is based upon klhronomia inheritance; it being claimed that this word changes the whole current of thought. Hence it is said that the new covenant established by Christ is here represented as a testamentary disposition on his part, which could become operative in putting the heirs in possession of the inheritance only through the death of Christ. See Additional Note at the end of this chapter.
There must also of necessity be the death of the testator (qanatou anagkh feresqai tou diaqemenou). Rend. it is necessary that the death of the institutor (of the covenant) should be born. With the rendering testament, feresqai is well-nigh inexplicable. If covenant the meaning is not difficult. If he had meant to say it is necessary that the institutor die, he might better have used genesqai: "it is necessary that the death of the institutor take place"; but he meant to say that it was necessary that the institutor die representatively; that death should be born for him by an animal victim. If we render testament, it follows that the death of the testator himself is referred to, for which qanatou feresqai is a very unusual and awkward expression.
17. For a testament is of force after men are dead (diaqhkh gar epi nekroiv bebaia). Rend. "for a covenant is of force (or sure) over (or upon) dead (victims)." Comp. Soph. Elect. 237; Eurip. Ion. 228; Aesch. Eumen. 316; Hdt. iv. 162. See also Lev. xxi. 5.
Otherwise it is of no strength at all while the testator liveth (epei mh tote iscuei ote zh o diaqemenov). Rend. "since it hath not then force when the institutor is alive": until he has been representatively slain.
18. Whereupon (oqen). Rend. wherefore, or for which reason: on the general principle that a covenant must be ratified by death.
Neither the first testament was dedicated without blood (oude h prwth cwriv aimatov enkekainistai). Rend. "neither hath the first (covenant) been inaugurated without blood." There is surely no excuse for inserting testament here, as A.V., since the allusion is clearly to the ratification of a covenant with blood. But further, as this and the verses immediately following are intended to furnish a historical illustration of the statements in vers. 16, 17, we seem forced either to render covenant in those verses, or to assume that the transaction here related was the ratification of a will and testament, or to find our writer guilty of using an illustration which turns on a point entirely different from the matter which he is illustrating. Thus: a testament is of force after men are dead. It has no force so long as the testator is alive. Wherefore, the first covenant was ratified by slaying victims and sprinkling their blood. For the incident see Exod. xxiv. 8. jEnkainizein only here and ch. x. 20 LXX, to renew, 1 Samuel xi. 14; 2 Chron. xv. 8; Psalm i. 10: to dedicate, 1 Kings viii. 63; 1 Macc. iv. 86. Comp. ta ejnkainia the feast of dedication, John x. 22. Rend. oujde neither, as A.V., and not not even, in which case the meaning would be, "not even the first covenant, although its ministries did not perfect the worshipper as touching the conscience," a thought which would be foreign to the point, which is merely the analogy in the matter of death.
19. The statement of verse 18 historically confirmed by the story of the establishment of the law-covenant, Exodus 24.
Of calves and goats (twn moscwn kai twn tragwn). Not mentioned in the O.T. account. The goat was always for a sin-offering, and the sacrifices on this occasion were oxen, and are described as burnt offerings and sacrifices of peace, Exod. xxiv. 5. In the original covenant with Abraham a she-goat and a heifer are specially mentioned, Gen. xv. 9.
Water, scarlet wool, hyssop - sprinkled the book (udatov, ejriou kokkinou, uJsswpou aujto te to biblion ejrantisen). None of these are mentioned in the O.T. account, which the writer appears to have filled up from the details of subsequent usage. Comp. the additions in vers. 5,
10. It will also be observed that the sacrifices on the occasion of establishing the law covenant were not made according to the Mosaic ritual. They were offered, not by the priests, but by the young men, Exod. xxiv. 5. For kokkinov scarlet, see on Matt. xxvii. 6. %Usswpov hyssop appears in Exod. xii. 22; Lev. xiv. 4, 6, 49; Num. xix. 6, 18; Psalm li. 9; John xix. 29. Mostly in connection with lustral ceremonies. The vexed question of the precise botanical character of the plant has never been decisively settled. 213
22. The historical facts are summed up, emphasizing one point - cleansing by blood.
Almost all things (scedon-panta). The A.V. is wrong. Sxedon almost or nearly is prefixed to the entire clause, and applies to both its members. Rend. "and I may almost say, it is in blood," etc. Almost provides for such exceptions as Exod. xix. 10; xxxii. 30-32; v. 11-13; Lev. xv. 5; xvi. 26-28; xxii. 6; Num. xvi. 46-48; xxxi. 23, 24; Psalm li. 1-17; xxxii. 1, 2. And without shedding of blood is no remission (kai cwriv aimatekcusiav ou ginetai afesiv). This sentence also is covered by "I may almost say." It does not state that without shedding of blood there is no remission of sins, which "would be in conflict with the history and literature of the Old Testament." 214 See exceptions above. aimatekcusia shedding of blood, N.T.o , o LXX, o Class. Ouj ginetai afesiv, lit. remission does not take place or ensue. For afesiv see on Jas. v. 15; most frequent in Luke and Acts. In Hebrews only here and ch. x. 18. Commonly with a genitive, in the phrase remission of sins: but sometimes absolutely as here, Mark iii. 29; Luke iv. 18.
23. The heavenly sanctuary required a better purification than the Levitical.
The patterns of things in the heavens. The earthly tabernacle and its furniture. See on ch. viii. 5.
With these (toutoiv). Things specified in ver. 19.
The holy places made with hands (ceiropoihta agia). For holy places rend. a holy place, the plural being used of the sanctuary. Christ is not entered into a hand-made sanctuary.
Figures (antitupa). Or. figure. Only here and 1 Pet. iii. 21, see note. Answering to the patterns in the heavens, ch. viii. 5. Rev. like in pattern. Now to appear (nun emfanisqhnai). Now, not only in contrast with the time of the old, typical economy, but also implying a continually-present manifestation, for us, now, as at his first entrance into the heavenly sanctuary. jEmfanisqhnai, rend. to be manifested. Better than to appear, because it exhibits the manifestation of Christ as something brought about as the result of a new and better economy, and distinctly contemplated in the institution of that economy. Christ is made openly manifest before the face of God. The Levitical priest was compelled to shroud the ark and the shekinah with incense-smoke, that he might not look upon God face to face.
25. Nor yet that (ou d ina). Supply did he enter. "Nor yet did he enter that he might offer," etc.
He should offer himself often (pollakiv prosferh eauton). His offering did not need repetition like the Levitical sacrifices. Offer himself refers rather to Christ's entrance into the heavenly sanctuary and presentation of himself before God, than to his offering on the cross. See on ver. 14. The sacrifice on the cross is described by paqein suffer, ver. 26, and is introduced as a distinct thought. The point is that, being once in the heavenly sanctuary, Christ was not compelled to renew often his presentation of himself there, since, in that case, it would be necessary for him to suffer often. Each separate offering would necessitate a corresponding suffering.
26. Since the foundation of the world (apo katabolhv kosmou). For, from the foundation of the world, sin required atonement by sa
God Rules.NET
|
global_01_local_1_shard_00001926_processed.jsonl/21653
|
Wednesday, February 10, 2010
regarding the care and feeding of your visiting author
Here I am, on book 173 of 308 books to be signed at my recent (and very lovely) visit at the Brooklyn Friends School:
I'm getting a bit tired.
Until, of course, the cupcakes arrive!
Only 135 books left? Piece of cake! Oh, I guess I mean cupcake...
Thank you, oh wise (very wise) Brooklyn Friends School Librarians!
|
global_01_local_1_shard_00001926_processed.jsonl/21668
|
Series: Oasis
Beyond Oasis
This entry is part 1 of 2 in the series Oasis
Perhaps it’s got a bad rap, but the Genesis is not remembered for its RPG library. Despite being the home
Legend of Oasis, The
This entry is part 2 of 2 in the series Oasis
WRONG CHARACTER PICS UPLOADED FOR A FEW The Legend of Oasis is simultaneously a sequel and prequel to Beyond Oasis. It features
|
global_01_local_1_shard_00001926_processed.jsonl/21692
|
DBA Tips Archive for Oracle
Convert Numbers to Words
by Brian Membrey, The PaperBag Software Company Pty Ltd
I guess a mundane exercise that most programmers cop at some stage is having to convert a number (123) into a text equivalent (ONE HUNDRED AND TWENTY THREE) - for cheques, group certificates, etc. Probably the code involved a loop stripping out the numerals and then applying a value according to the relative position within the overall value.
Although it winds a strange path via date functions, SQL*Plus actually provides a mechanism for automating much of this process. Executing the following :
SELECT TO_CHAR ( TO_DATE ( TO_CHAR ( 103465, '99999999999') , 'J'), 'JSP') FROM dual;
If we break the statement into each component function, then what happens is :
SP can be used in a number of situations. For example, if SYSDATE is 26-AUG-98, then :
SELECT TO_CHAR ( SYSDATE, 'DdSp') FROM dual; -- spells the day as Twenty-Six,
Some simple manipulations can be included with the base conversion to cover floating numbers or currencies (email [email protected] for source), eg. 103465.27 becomes ONE HUNDRED AND THREE THOUSAND FOUR HUNDRED AND SIXTY-FIVE DOLLARS AND TWENTY-SEVEN CENTS.
One covenant however : if in your mad appreciation of this trivia you want to send me a cheque for more than $5,373,484.00, then you'll have to write it manually, or send more than one cheque!
SQL*Plus restricts Julian days to between 1 and 5373484, which won't be a problem for most applications, but should be borne in mind before using the technique in anger.
5373484 represents 31-Dec-9999, so this may be Oracle's way of introducing us to a Year 10K problem!
Last modified on
Saturday, 23-Nov-2002 00:00:00 EST
Page Count: 24305
|
global_01_local_1_shard_00001926_processed.jsonl/21703
|
Execute your own systemaster SQL statement.
Use infx status to run a simple select statement on the sysmaster syslocks.
infx looks for external sql files in /infx/local/sql/external.
The files must be owner/group informix and have permissions 660.
Select from syslocks table.
SQL file /infx/local/sql/external/syslocks.sql:
Reference the results of the SQL via a list variable, named the same as the SQL file i.e. ext_syslocks.
Make sure you alias any expressions in the select, you need a column name for reference.
You can use a number select statements, as long as all but the last go into temp tables
To access the results of syslocks.sql
|
global_01_local_1_shard_00001926_processed.jsonl/21719
|
A bird and two kittens
If you're like me at all, the garden isn't a garden unless it's full of birds. Well, not "full" because you need some room for plants, but there must be birds around. They add an extra sense of life to a garden, they eat insects, they sing for us, and amuse us with their antics (sometimes). There's also the excitement of seeing a species that you don't recognize, perhaps something that is only seen in your area while migrating, or is very hard to catch a glimpse of.
Sometimes the only chance you get to see these rarer birds is when something tragic happens, as with this Indigo Bunting that apparently flew into one of our windows.
It's sad when this happens, and I think it happens to us once or twice a year -- a bird dies from a collision with our windows. There are also many less-severe collisions, usually by Mourning Doves who leave a big, feathery imprint on the window, walk around dazed for a couple of minutes, then fly away.
It's not that our windows are spotless. In fact, they're pretty dirty right now as they haven't been washed since the Summer. I'm not sure that washing them will cause more bird crashes, but I have a feeling that's so. Still, the windows need to be cleaned. The trouble is, if I start thinking about birds and windows, and the number of buildings in this country and around the world that have glass windows, it gets somewhat depressing. If one bird dies each year at every house, that's millions of birds every year just in the US!
That's a depressing thought, but perhaps even millions dead from window impacts is just a very small percentage of the total bird population, and isn't really a problem. I'm sure there are more significant causes of bird deaths (disease, loss of habitat, pollution, etc.) but it still saddens me greatly when I find a lifeless bird under one of my windows.
Since gardening is all about balance, including the balance between life and death, I'll balance out the rest of this post with a quick look at Super-whitey's kittens!
Tiny-toe is the boy:
Tiny-whitey is the girl:
She seems to be a little larger and more aggressive than her brother, but I expect that to change soon.
They're both starting to walk now, so things become more complicated. I'm not sure if we'll be able to keep them in the garage, but I definitely need to get a taller box, as they've managed to climb out once already. Once they're lost in the mess that is my garage right now, we may never find them!
I've got to start reading more about kittens and how to care for them, because I think it's going to start getting very interesting pretty soon.
They're just over 3 weeks old now.
Blog Widget by LinkWithin
Post a Comment
© Blogger template Shush by Ourblogtemplates.com 2009
Back to TOP
|
global_01_local_1_shard_00001926_processed.jsonl/21724
|
Tuesday, June 13, 2006
X-Men: The Last Stand
Got to see this one in the afternoon, after having jury duty in the morning. It was the best kind of jury duty - show up at eight in the morning, watch an instructional video, work on a book of cross sums until you're told at eleven that you won't be needed. And it's Friday! And you've got Monday off because it's a holiday! Awe. Sum!
I spent a good chunk of the afternoon filling out forms and trying to print out a picture so that I could go to the post office and drop money for a passport. The plan's to head back to Montreal for Fantasia this year, since last year was a ton of fun. Having a passport would have streamlined things.
Also: That was one of those days where the weather plays mean tricks on you. I was a sweaty mess by eight o'clock when I got to the courthouse (walking to the other end of Cambridge will do that), changed into shorts when I got back home, really needed the large soda by the time I'd crossed the river and made my way to Fenway... And walked out of the theater into the pouring rain. Real cute, weather gods. Real cute.
X-Men: The Last Stand
* * * ¼ (out of four)
Seen 26 May 2006 at AMC Fenway #13 (first-run)
Considering the continued popularity of the series, I doubt that X-Men: The Last Stand really represents the last of anything, especially considering the rich library of characters filmmakers can choose from should they choose to jettison more expensive pieces. And give them credit for recognizing this - the third X-Men movie certainly plays like they could either walk away or at least play a very different team in #4.
Characters don't necessarily have to die, though. A San Francisco pharmaceutical company has just announced the development of a drug that permanently suppresses expression of the mutant "X-gene" - a cure, so to speak. Mutant terrorist Magneto (Ian McKellen) and his Brotherhood of Mutants consider this an abomination; telepathic Professor Charles Xavier (Patrick Stewart) doesn't like the idea, but recalls having to place mental blocks in a student to prevent her own powers from going out of control. That former student, Jean Grey (Famke Janssen) was presumed dead at the end of the last movie, but she's back, and her hold on sanity is slipping just as Xavier feared.
Read the rest at HBS.
No comments:
|
global_01_local_1_shard_00001926_processed.jsonl/21809
|
Manuel Betancourt
About Me
Manuel is an accomplished writer with over eight years experience in an academic background. He specializes in critical thinking about media and the LGBT experience, with a particular focus on cinema and representation. He is a regular contributor to The Film Experience, and a burgeoning video essayist.
Selected Writing Clips
4 Reasons Why Netflix Has the Best ...
|
global_01_local_1_shard_00001926_processed.jsonl/21823
|
Back to Angles
Is It Good
For The Jews?
Joe Lieberman is either the greatest thing to happen to the Jews in the 21st century, or the harbinger of certain disaster. The point is: start worrying now.
by David Holzel
Mike Gold, whose 1930 autobiographical novel Jews Without Money detailed immigrant life on New York's Lower East Side, many years later recalled his father exclaiming, "Great news, Katie. The 20th century is coming next Thursday night."
"Whatever it is," his mother replied, "it probably means more trouble for the Jews.''
"On the one hand, Mrs. Gold's words proved prophetic. On the other hand, it's undeniable that good things happened to the Jews in the 20th century—the State of Israel, for instance, and Chinese take-out.
But Mrs. Gold's conclusion should not have been unexpected. Despite a tradition that reflects an optimistic view of life, Jews have developed an uncanny knack for taking the most miniscule detail and divining grave implications.
The time-tested yardstick for determining the malevolence of a given situation is the question, "Is it good for the Jews?" The standard answer is, of course, "no." But a rational look at the question, you might be surprised to learn, can turn up a huge swath of gray area and some unconventional conclusions.
Take cholent. Contrary to what you've always thought, it is not good for the Jews. Despite being a Shabbat staple for centuries, this slow-cooked stew is a culinary pogrom, producing enough gas in one weekend to cause another 2,000 years of Jewish suffering.
On the other hand, call waiting is very good for the Jews. Face it, Jews hate to wait, and we don't mind interrupting someone else's conversation.
Air travel? Bad for the Jews. It's confining, you're never able to relax in the bathroom, and the food they serve is lousy. And in such small portions. Worse, your life is totally in gentile hands. Fly El Al and your life is in the hands of Israelis. We're still not sure if that's good for the Jews.
Now comes Joe Lieberman. Poised to ride into Washington on a donkey, he is an unlikely messiah as there ever was. As the first Jew ever given the chance to become first sidekick, Fightin' Joe from the start raised the crucial question on everyone's mind—
Is this good for the Jews?
The first reports were mixed:
It's a proud day when a Jew is picked to be a heartbeat from the presidency.
This will bring the anti-Semites out of the woodwork.
This proves that Jews have truly made it in America.
I Ruth Bader Ginsburg hadn't Stephen Breyer realized Alan Greenspan Jews Robert Rubin hadn't Dianne Feinstein made it Michael Eisner in Jason Alexander America.
Then the really in-depth analysis began:
He's too religious. His public moralizing is breaching the wall of church and state and doing the Christian Right's work.
His open religiosity will attract Christian Americans like no Democrat has in 25 years.
His Jewishness will inflame the anti-Semitism of African-Americans.
Poised to ride into Washington on a donkey, Lieberman is an unlikely messiah as there ever was.
His affinity with the Bible will strike a chord with African-Americans.
It began to sound like a Jackie Mason routine. He's too Jewish. He's not Jewish enough but he's too religious. He's too conservative. He's too Orthodox. He's not Orthodox enough. I wouldn't mind him being so conservative if he were just Conservative and not Orthodox. Why did he have to marry a woman named Hadassah? Why couldn't her name be Jewish Women International? Why is his daughter Hana's name spelled with one 'n'? He's not funny enough. Why couldn't Gore have picked Alan King? Now that man is funny. How do we know he's even Jewish? Maybe we're worrying for nothing.
Worry never goes to waste. But in the weeks leading to the election, Lieberman will have to confront these questions and many others, some of them irrelevant. Still, we cannot lose sight of the essential question: In a divided Jewish community, can Joe Lieberman be the man to unite us by giving all of us something to disagree about?
It's taken hundreds of years of Jewish exile and powerlessness to evolve antennae sensitive enough to determine what is good for the Jews. Despite our relative security nowadays, it never hurts to exercise our antennae. The Lieberman nomination presents just such an opportunity.
So now that you're warmed up, consider which of the following suggests catastrophe for the Jews:
A) The winner of "Survivor" is an under-exercised, frequently unclothed gay man.
B) Bell Atlantic changes its name to Verizon.
C) Unemployment inches up, meaning the Federal Reserve will not raise interest rates.
D) Gwyneth Paltrow becomes a blond again.
E) All of the above.
You picked E, didn't you? Thought so. Pass the sweet and sour sauce.
TELL A FRIEND about this article
Back to Angles
|
global_01_local_1_shard_00001926_processed.jsonl/21842
|
[Livehttpheaders] livehttpheaders: feedback from Terra
notes at mozdev.org notes at mozdev.org
Tue Mar 11 12:28:18 PDT 2008
I'm using Live HTTP Headers for quite a while now on my Windows computer and after I switched to a macbook pro I'm experiencing the problem that LHH interferes with the native mac shortcuts.
After installing LHH on my powerbook I can't write the @ symbol anymore in FireFox. Because the native shortcut for @ is ALT+L, the same as the LHH sidebar
Mozilla/5.0 (Macintosh; U; Intel Mac OS X; de; rv: Gecko/20071025 Firefox/
More information about the Livehttpheaders mailing list
|
global_01_local_1_shard_00001926_processed.jsonl/21903
|
204 Area Code
Recent comments on numbers in area code 204:
Click the phone number to see all of its comments.
204-799-7212 from hhgty
Drug Dealer winnipeg MB
204-474-1473 from Ackley
My husband and I had 5 missed calls from this number when we got home from work one day. When we tried to call back,
204-482-4191 from Golden
This number keeps calling. If I ever do get the chance to answer all I hear on the other line is a bunch of beeping
204-783-6810 from Lendall
I got a call form this number and it was someone telling me that my taxi had arrived. The only problem was that I
If the number isn't listed, try our Reverse Phone Lookup
We have comments and information on:
Searched numbers in the 204 area:
204-000-0000 204-205-0000 204-205-0445 204-247-0000 204-247-0322 204-284-0000
|
global_01_local_1_shard_00001926_processed.jsonl/21905
|
Angular Momentum
It is the ability of a body by virtue of which it imparts rotatory motion to other bodies. Angular momentum is product of linear momentum and perpendicular distance of direction of linear momentum from center of rotation.
Angular velocity
It is defined as rate of change of angular displacement.
It is the phenomenon of exhibiting different values of a physical property in different crystallographic directions.
It is the process of heat treatment of metal by which microstructure and consequently properties of a material are altered. Annealing is generally heating of metal to specific temperature, for certain duration and then allowed to cool slowly thus softening by re-crystallizing. Cold worked metals usually undergo this for relieving strain.
Anode Rays
Rays of positively charged particles formed inside gas discharge tubes. These rays were discovered by Goldstein in 1886.
It is the electrode in an electrochemical cell that experiences oxidation, or gives up electron.
It is an electrochemical metal finishing process used for increasing thickness and toughness of the naturally occurring protective oxides on surface of metals. The process is called anodizing, as the part to be chemically treated forms the anode electrode of electric circuit. The process increases non-corrosiveness & non-conductivity.
Anomalous Dielectric Dispersion
The fall in permittivity of a dielectric material with increasing frequency of external electric field is a phenomenon called anomalous dielectric dispersion.
Anomalous Expansion of Water
When temperature of water is raised from 0 oC, its volume decreases up to 4 oC and above 4 oC its volume increases. This is called anomalous expansion. It is due to formation of more number of Hydrogen bonds.
Anomalous Zeeman Effect
When spectral lines of an atom split into three or more unequally spaced lines in the presence of magnetic field then the phenomenon is called as anomalous Zeeman effect. This usually happens for the systems where net spin i.e. spin quantum number is not zero.
A type of transducer that converts RF fields into alternating current or vice versa. A receiving antenna intercepts RF energy and delivers oscillating electric current to electronic equipment, and the transmitting antenna is fed with electric current to generate RF field. They consist of metallic conductors, electrically connected to transistor or receiver.
Anti Ferromagnetism
Phenomenon of magnetic moment (spin moments) of neighboring atoms or ions aligned in exactly opposite directions.
Anti Logarithm
If ‘y’ is result of logarithm of a given number ‘x’ then ‘x’ is antilog of ‘y’.
Anti Matter
Matter which comprises of antiparticles.
Anti Particle
Every fundamental particle is presumed to have an antiparticle which has same mass but opposite charge.
Position of particles on a wave which vibrate simple harmonically with maximum amplitude is called anti node.
Antistokes Lines
The smaller frequency lines in Raman spectra are called Anti-Stokes lines.
The point in the orbit of planet, at which it is farthest from sun, is termed as Aphelion.
Word attributed to small opening in an optical system or arrangement or instrument, through which light is made to pass for focusing it on to any plane.
Aplanatic Points
See Aplanatism
The property of the surface by virtue of which all rays starting from a particular point object on its axis, after reflection or refraction at the surface, converge or appear to diverge from a single point image, is called aplanatism and the particular object and image points are called aplanatic points while the surface is said to be aplanatic surface with respect to those two points.
|
global_01_local_1_shard_00001926_processed.jsonl/21938
|
What is the purpose of the cia?
Answer To gather intelligence on all things alien to the united states, conduct research into these subjects, and if required act upon the intelligence gathered. Basically find out everything possible abo... Read More »
Top Q&A For: What is the purpose of the cia
What Is the Purpose of a Du Rag?
A du rag is worn on the head for different purposes. It may be worn for a functional purpose or it may be worn simply for cosmetic reasons.
What Is the Purpose of a Wig Cap?
Wearing a wig cap is beneficial in holding the hair in place when wearing a wig, whether the hair is short or long. It also prevents the hair from breaking when a wig rubs against the scalp. If you... Read More »
The Purpose of the USB on a PS2?
The PS2 featured two USB ports. The USB ports were primarily used by official and unofficial PS2 peripherals, ranging from the PS2 Multitap to most standard USB mouses and USB keyboards.
|
global_01_local_1_shard_00001926_processed.jsonl/21943
|
Google+ swCj71E42RfqfgWx3JOogUovB8w Dumbass News: Kid Gets Kicked Out of School; Mom Goes to School to Beat His Ass; Slaps Piss Outta Wrong Kid! : o77OwPu8GHYudT_bxY1ohX-tzdw
Sunday, December 29, 2013
Best of Dumbass News
I have.
I was wrong.
I was wrong.
Knot Slappin'
Her three children are in protective custody.
Inquiring Minds Wanna Know
• Never in public.
• At least if there are witnesses.
• Just ask Tyshekka.
• Really?
• Dumbass of the Year is not.
• Who the hell names their kid "Tyshekka"?
1. Kind of gives a whole new meaning to the term "dopeslapping" doesn't it?
1. Dopeslapping! I haven't heard that in a while! Thanks for the memories, Bones!
Long live AOL!
2. Knowing kids today, I bet the newly titled knothead probably needed it anyway.
As you pointed out, Fearless Leader, the problem here is witnesses.
1. Witnesses indeed.
I was a Pre-Law Major. I know these things.
Until I pissed my Mom off and she came to the college and....well, you know....
3. My real name is Tyshekka. I go by Teri because when I was a kid, I was waiting in the school office for my mom to pick me up and some crazy bitch named Tyshekka came in and slapped me right in the face. It was then that I had my name legally changed to Teri. ;)
1. If i had a daughter, she'd look just like Tyshekka...
Oh, wait....
I do have daughters.
And they don't look like Tyshekka.
My given name is Dontaviustaytay though.
2. Debbi DeChellis (Oregon Dumbass Society)December 30, 2013 at 10:33 AM
Teri ....... OMG!!! Hahahahaha Now that was funny!
In Oreeegone its normal for pissed off Moms with sick kids to bitch slap your youngin...... When a pissed off Momma comes flying thru those school house doors .... kids hit the floor! Its just the way things are done round here !
Thank Goodness I'm a Caleeefornia Native ! Where Moms carry concealed weapons!! No witnesses !!
3. Moms in Cal-ee-forn-ya conceal carry?
Are they Bloods or Crips?
Happy New Year, Debbi!
Debbi...I think you'd like Teri's blog. She's a very funny lady. Humorous too. :)
Here's the link:
4. Dontaviustaytay, you're the best!!!
5. You aight too, Terishakita-isha. :)
4. This makes me so glad I chose to not have any children......
1. And the Rest of World thanks you!
Just kiddin', Bro.
I have kids 34, 31, 11 and 6. I am a glutton for punishment.
Humor Blogs - Blog Rankings Google
Follow Us
|
global_01_local_1_shard_00001926_processed.jsonl/21979
|
Mustard oil for hair loss: does it work?When it comes to treating hair loss, there are many different miracle solutions that frequently surface, claiming to solve your hair loss worries forever. One of the most recent solutions to do the rounds is mustard oil for hair loss.
So how exactly is mustard oil supposed to work and is there any truth behind its claims?
Why is mustard oil for hair loss advertised?
Mustard oil has actually been used for decades as a remedy for various issues. Before traditional medicine, people used a wide range of natural remedies to cure their various ailments.
There are several reasons it is linked to healthy hair including the fact it conditions, contains a high level of antioxidants and it’s a good scalp massager. When you look into tips to promote healthy hair, you’ll soon discover nutrients play an important part.
The number of nutrients mustard oil is said to contain is outstanding, though whether or not it does contribute to healthy hair is another matter entirely.
In terms of conditioning, it’s thought to be the alpha fatty acids contained in the oil that leave the hair feeling nourished. It is also said to help with blood circulation when massaged into the scalp.
So does it work?
Simply put, it’s undecided whether using mustard oil for hair loss actually works. There is no real scientific evidence to suggest it could be used as a hair loss solution. However, trying it isn’t going to cause any harm and you may experience other benefits due to its high nutrient content.
Overall however, it is recommended you visit a doctor and see what is causing the problem before using mustard oil for hair loss. Some types of hair loss will not improve with nutrient-based solutions.
The cause could be an underlying medical condition for example, in which case it would need to be treated with appropriate medication.
|
global_01_local_1_shard_00001926_processed.jsonl/21990
|
Hairfall ? You may be eating the wrong Foods
For a girl there is one thing which makes her look even more beautiful than she already is. Its her HAIR.
Yes, you read that correctly. Forget the almond shaped eyes, the flawless skin or the luscious lips. Its the hair. Dermatologists say that they can predict how healthy a person is by just looking at their hair.
You may say that you eat a lot of food. But at times its not the quantity that matters, but the correct type of nutrients. I once did a project in school about balanced diet. It said the same thing as well : Focus on what goes in and not how much goes in.
Image result for hair
Why does your hair start falling ? Because the body says, " I am not getting enough nutrients, so I won't supply to some part of the body." So it decides to sacrifice the least important one : HAIR
So, I've browsed through a couple of sites and found out the best ways to prevent hair fall (and it doesn't include going for hair spa).
1. CHICKEN (protein)
This may not stop the normal, everyday hair loss, however it will help you replace the lost ones. Protein are the building blocks for hair. Vegetarians can have chickpeas (chole) or lentils.
Image result for cooked chicken
You need vitamin C to build the proteins and strawberries are full of them. You can have other citrus fruits like sweetlimes, guavas etc.
My favorite. You can have these on the go. If you have any problems eating them hard, soak and have it. They contain Vitamin E and protects your hair from the UV rays.
Image result for dry fruits
4. BEANS / SPINACH (palak)
When you have the I-can-see-my-scalp kind of a hair loss, its quite evident that you have iron deficiency. Eat a lot of beans. It will surely help.
Image result for spinach
Rich in iron, fibre,zinc and omega 3.
Image result for oatmeal
Eggs have a vitamin B called biotin which strengthens hair and brittle fingernails.
Image result for eggs sunny side up
Prevents hair fall, increases blood circulation, makes hair lustrous and protects hair from external damages.
Image result for carrots
No comments:
Post a Comment
Billion Dollar Day 1985
ShamiKa's Popular Posts
|
global_01_local_1_shard_00001926_processed.jsonl/22002
|
Aleutian volcanoes: Landsat 8 photo.
An Icy Volcano and the Cosmic Cycle of Life
An Icy Volcano and the Cosmic Cycle of Life
Bad Astronomy
The entire universe in blog form
Jan. 2 2015 7:30 AM
An Icy Volcano and the Cosmic Cycle of Life
Living on the edge of the Rocky Mountains in the winter means getting up every morning and seeing those snow-capped peaks poking out over the nearer foothills. It’s a magnificent view to occupy me as I wait for my coffee to steep.
Seeing the mountains from the side is endlessly fun, but I sometimes wish I could see them from above. After all, when Landsat 8 does it, the view is simply incredible:
Volcanoes from space
The Islands of the Four Mountains. I have no idea why they named them that.
Photo by NASA Earth Observatory/Jesse Allen, using Landsat data from the U.S. Geological Survey
Now, to be fair, those aren’t the Rockies; those are the Islands of the Four Mountains, a collection of islands in the Aleutian archipelago curving west off of Alaska. There are actually seven islands in the group, but these four volcanoes stand tall: Herbert (lower left), Cleveland (center), Carlisle (upper left), and Tana (the rugged one to the right).
Phil Plait Phil Plait
The Landsat image shows them on June 8, 2013. As you can see, even in summer there’s snow on them thar hills, kind of. What’s funny to me is that Cleveland is the tallest of the four volcanoes (1,730 meters at its peak, about 5,700 feet), but it’s the only one without snow on it. Weather can be weird sometimes.
I love the cloud patterns here, too. North is up, so the wind is clearly blowing north, and the volcanoes punching up into the sky break that flow. The wind blows around the islands, creating that lovely ship-wave effect. Note how the lower flanks of the volcanoes are relatively clear, but then clouds form higher up; as the wind blows up the windward face of the mountains it cools, and clouds form as water condenses out.
Herbert has no records of eruptions in modern times, but Cleveland erupted in 2006 (and again in subsequent years). Get this: That first eruption was actually discovered by astronauts on the International Space Station who happened to be flying over it at the time! They apparently caught it right after the eruption started, too:
Mount Cleveland
Hello Cleveland!
Photo by NASA
It’s a pretty stark (and frankly gorgeous) reminder that we live on a planet that’s not nearly done cooking yet. We live on the cool, solid skin of a vast ball of superheated rock and iron, still roiling inside with energy leftover from its formation (as well as from the decay of radioactive elements and other forces). It’s slightly terrifying to think that all that separates us from all that is a thin veneer of rock just a dozen or two kilometers thick, but we owe our existence to all that heat. It generates tectonic forces that in turn have created the land we live on, and continental drift has pressured life into changing over the eons—allopatric speciation—evolving into us.
As always in the Universe, life and death hang on the same thread; creation and destruction are two sides of the same coin.
That may not be the first thought you have, looking at a pretty picture of Alaskan islands from space. But it’s not a bad one. One of the things I love about science is how it gives us perspective.
|
global_01_local_1_shard_00001926_processed.jsonl/22053
|
Coding in a nutshell
Learning how to code: 9 tools you can start using right away
Not knowing how to code may be the illiteracy of the future. Yet learning to program is so easy today. Here are nine tips on how to teach yourself the basics quickly and easily. Read More
Write new comment
Comments (0)
No comments found!
|
global_01_local_1_shard_00001926_processed.jsonl/22078
|
Thursday, May 7, 2009
Nap Happy
The sleep schedule at night leads us to feel somewhat well-rested, being as collectively we end up with six to seven hours, Rob getting more because he falls asleep as Jackson eats. However, the increments of sleep tend to make us a little drowsy during the day. Two hours asleep, one hour awake may make for a full night's sleep, but it doesn't feel right about four hours into the day. So we've been following Jackson's lead and getting naps when possible.
As such, yesterday Rob had the world's greatest nap, as he is a napper that can fall asleep for twenty minutes and wake up completely refreshed. This nap was especially perfect, and so he wants to thank those involved -
First off, to Noelle's mom, Baby's First Furniture, and Best Chairs Inc. - thank you for providing the world's most comfortable chair. This deluxe rocker/recliner is soft, feels like sueded, and rocks literally and figuratively. Here's a picture of Noelle enjoying it, while Schuley checks it out.
And here's Noelle asleep in it.
Second off, to Noelle - thank you for tiring the boy out with your urine adventures this morning. Thanks also for handing him over to me for some Daddy Time.
Third off, to Scott and Father George - thanks for making my absence from school so easy on me. I went by the school to pick up and drop off papers, and my buddy Scott has been handling lots of issues for me while I've been gone, including entering my grades for me. Father George is the Greek Orthodox priest who has been subbing for me, and as any educator will tell you, you never know what type of substitute you're going to have. Will it be a newspaper reader, a riot instigator, or a non-English speaker? Well, Father George is competent, witty, and communicative. He may actually be a better teacher than me. My classes are in capable hands, for once!
Fourth off, to Bill Willingham - thanks for writing Fables. I had just finished Book Four when I drifted. Those are some well-told tales.
Fifth off, to Jackson North MacGregor - thanks for falling asleep in my arms. Your tiny breaths and tiny heat helped me relax happily and lovingly. I only closed my eyes for minutes, but waking up with you there, with Fables on the chair's arm, with George and Scott handling my job, with Noelle asleep in the next room, and in the most comfortable chair ever - it was perfect. I was recharged and life looks great.
And, as a day later footnote, I thought I would have a repeat of the situation at the end of the day. Jackson and I were in the chair, I was cozy, I had the next book of Fables, and Jackson was falling asleep.
Then he peed on me.
The Kemps said...
Haha...I was adoring the photo so much it took a while before I notice the final line!
Courtney said...
Just discovered you had a blog! And your baby's cute!!!
|
global_01_local_1_shard_00001926_processed.jsonl/22089
|
Sunday, December 30, 2012
Halo - Protector - Grant McLaughlin
1 - A shot of deep space. Floating in the vast nothingness is the portion of the "Forward Unto Dawn" that the Master Chief and Cortana were stuck in between Halo 3 and Halo 4. That ship is the main focus of panel. It's a little hard to see the ship, as minimal power is on and there isn't anything nearby in the surrounding space.
CAPTION (CORTANA): You've saved us all from so much.
2 - Interior of the ship. It's the same room from the ending of Halo 3 (this one). The Master Chief remains asleep in the cryo-chamber. Cortana stands at the same pedestal. However, time has clearly past. The ship is cold and frozen. The lights are low from drained power. It's clear that Cortana is the only one who's been doing much of anything in the last however long it's been. Despite my example picture, this panel is angled from the side, with Cortana on the left of the panel looking towards the cryo-chamber on the right. The Chief is not actually visible from this angle. The captions fill the space between the two.
CAPTION (CORTANA) (1): The Covenant.
CAPTION (CORTANA) (2): The Flood.
CAPTION (CORTANA) (3): The Forerunner.
CAPTION (CORTANA) (4): To name but a few.
3 - Close-up of Cortana. She looks sad and concerned. Maybe a little lost. If you're far enough out, have her hugging herself, as if against the cold (even if she can't feel it).
CAPTION (CORTANA): But when this is all over - when your fight is finally finished --
4 - Close-up of the cryo-chamber in which the Chief remains asleep. Although the glass is icy and fogged and the room is dark, you can see the Chief's face (helmet) through the glass - just barely. It's faint, kind of like a ghost.
CAPTION (CORTANA): Who's going to save you?
1. I liked this one, it's a nice glimpse into the relationship between MC and Cortana and the question posed at the end is one very much in the vein of the series (I got a Halo 3 vibe from it, personally).
2. Panels 3 and 4 are so strong. You show the complex and slightly unusually relationship between MC and Cortana in two visually interesting snapshots, the idea of Cortana hugging herself is a subtle idea but one that really adds to the emotion and haunting quality to the page.
|
global_01_local_1_shard_00001926_processed.jsonl/22091
|
Happy Birthday to Jon Bon Jovi
Here’s a bit about how this love affair started:
At least I’ll always have my fantasies.
0 thoughts on “Happy Birthday to Jon Bon Jovi”
1. Ah, the memories…substitute Nikki Sixx and you’d have my teenage fantasy! I think I kind of outgrew mine, though.
It’s a shame they’re pricing their fans out of shows. A lot of bands are, though. That’s exactly why I started attending mostly “intimate” club shows of lesser-known bands & artists. I try to hit the festivals to see some of the bigger bands I like, but more and more of them are no longer doing the festival circuit, and the best fests are all kind of expensive nowadays, too. Not to mention, usually several hours from here at the very least.
Are JNTL definitely not doing Bama Jam? It sounds awesome!
2. uhm yeah… gotta let you know. I kissed him. well sort of, it was a lovey romancy kiss but he totally kissed me on the cheek and asked if I was ok at a concert. so yeah. you can touch me.. and now.. you know… he is a gentleman and he is “fine” always was always will be.
Leave a Comment
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/22095
|
James Hicks
From the unofficial Duke TIP Wiki
Jump to: navigation, search
James Hicks is a longtime staff member, working as a fourth-year RC in 2008 and a TA in 2009 and 2010 (for Writing With Power and Symbols and Structure, respectively), and may or may not have been a Term I TiPster in 2003 and 2004. He is known for saying "mmkay" and "Does that make sense?" too often to be considered healthy. He's a pretty cool guy with a booming voice (hence his nickname "The Iron Diaphragm"), which he notoriously uses for bellowing "HEY TIPSTERS!" and "It's about that time!" James may or may not love the song "Fish Heads" because it is hip like he is.
He was probably the second most famous TA of 2010 after Peter Sloan. He knows that Mel Weyant may think she should come in second place, but he also knows that this is little more than a pipe dream. But we all know that Mel is right in her thoughts and she is in-fact the second most famous TA, despite what James thinks.
He is notorious for his overuse of the phrases "mmkay" and "Does that make sense?" while leading discussions about dead white French men. His Term II 2010 Symbols and Structure class counted 107 mmkays and 20 DTMS in a 30-minute period, and, from that sample, it is predicted that he would emit 23,112 mmkays and 4,320 DTMS if he were to teach the entire term at these rates.
James is the self-proclaimed greatest jello-snarfler in TIP history and has the power to tell which TiPsters edit his page based on the details they choose to include. He also finds editing their atrocious grammar an ethical obligation, which is quite unfortunate because Alli Schloeman believes that poor grammar gives a TiPWiki page character.
As a fourth-year in 2004, James slept in the same bed as Amaresh Srikanthan and the same room as Peter Sloan, though one might note that, as a Term I TiPster, he was there first.
|
global_01_local_1_shard_00001926_processed.jsonl/22105
|
Monday, March 26, 2012
So....This happened
Ava riding her bike with no training wheels! I let her ride to the park with her friends and then I promptly stalked them in the car. :)
Monday, March 5, 2012
Some Things I Have Learned in 34 Years
You can't make everyone happy.
No matter how hard you try, or how good you are, somebody is going to be disappointed in the decision you make. I've reached a point in my life where I'm ok with that. Related:
You won't like everyone and everyone won't like you.
I've put myself out there a lot in the past few years. For a long time I was wrapped up in family and babies and didn't really have a social life. Now that I have friends and a social circle and places to be other than at my kids' school or playgroups, I'm still kind of surprised and confused sometimes by the way people interact. I've come a long way with my social awkwardness though and I think a lot of it has to do with realizing that not everyone has to like me. I'm kind of annoying if you're not into running or sci fi television or artsy fartsy dance. The flip side is that I don't have to include people that aren't worth my time into my own life. Win.
Being immature is fun. So is returning to maturity again.
Running 197 miles across state lines with 11 friends in a couple of crudely decorated vans, making countless "That's What She Said" jokes and dancing to 1990s music was a highlight of last year for me. But I also love that I got to come home and be plain old mom again the next day. People count on me and although sometimes it can be a drag, I like being a grown-up overall.
Be grateful for everything you have. All the time.
Didn't you read my post from the other day? ;)
Fighting over politics isn't worth it.
I will still believe what I believe just as strongly whether or not I let myself get drawn into a virtual shouting match over some political issue via Facebook. Odds are, the person on the other side of the issue will feel continue to feel just as strongly too- in the opposite direction. These days I save my breath for talking to people who's minds still have the possibility of being changed. And if there's nobody left out there like that, I simply put my money where my mouth is, support the causes and people I believe in, and vote, vote, vote.
All that crap about remembering to use sunscreen? It's totally true.
Do what makes you happy. Ignore people who tell you it is dumb, harmful or a waste of time.
"Running long distances is bad for you. You shouldn't eat meat, or carbs, or sugar, or caffeine, or anything that doesn't grow from the earth. Don't drink wine or beer or margaritas. (Insert activity here) is the only real way to be fit. Blogging/Twitter/Social Media is dumb. Why would anybody ever spend their time doing (fill in the blank)."
Don't care, don't care, don't care. I'm old enough to know how my body responds to things. I'm also in pretty gosh darn good shape. And even with things outside of fitness, I know what makes me feel good and I know how I want to spend my time. I do some things you probably do yourself, but I also do a lot of things you probably would never do. That's cool. I'm not asking you to do them.
The idea of camping is awesome. But so is a super comfy hotel bed.
I'll say it again: Be happy.
Life is too short to waste time doing stuff you don't care about. If we're stuck here we might as well find out what makes us tick. Stop to smell the roses, scratch the surface, survey the landscape. We're all going to wake up one day and it will be almost over.
And when all else fails: Fish Face.
|
global_01_local_1_shard_00001926_processed.jsonl/22117
|
04 October 2012
Nature's art ~
This interesting stump is in a weedy lot in the Lost Barrio district. I think it has real character and is a great tool for the imagination. I see a chimpanzee face, a dog's head, a hooded monk... cool!
1. How come I don't always see you on my blogs list?? Or much later...
Anyway I like art letting imagination at work like this stump.
2. Therese, I wish I could answer your question. This site is run with Google's eBlogger program and it is also registered as a .com site. I really don't know how those "blogs I'm following" lists are compiled. Do you have to add a site? Maybe someone else here knows and can suggest something. I'm not tech savvy, I'm afraid - sorry. Dianne
3. Maybe because I've heard one tonight, but I see an owl in the trunk.
K. from Boston
4. It's great isn't it - to keep looking and seeing different things!
|
global_01_local_1_shard_00001926_processed.jsonl/22137
|
Spinner 2 1650mAh Variable Voltage Battery
One of our most successful products to date, the 1650mAh Spinner 2 variable voltage battery offers voltages between 3.3 and 4.8 volts. You can choose 3.3, 3.8, 4.3, or 4.8 volts by turning the rotary dial on the bottom of the battery. The precise engineering on the Spinner 2 also lets you fine tune voltage levels to achieve the exact voltage you need. For example, if you leave the spinner dial halfway between 4.3 volts and 4.8 volts, you get an output of 4.55V. Lightweight and compact, the Spinner 2 features a very powerful, longer-lasting battery cell that allows you to vape for hours on a single charge.
Length: 124.5mm
Diameter: 16.5mm
Compatibility: 510/eGo
Voltage: 3.3V to 4.8V
Power: 1650mAh
Higher voltage means more vapour produced per unit of time; lower voltage, less. The beauty of the Spinner 2 is that if you prefer taking small puffs, you can increase voltage and get still get the amount of vapour you want; this is not so with classic batteries. Also, if you prefer taking longer puffs, you can lower voltage to get just the right amount of vapour without being overloaded. Variable voltage is a great feature in terms of vapour production but it is also remarkable in the sense that you can also adjust the strength of the throat hit; higher voltage delivers a stronger hit, and vice versa. The Spinner 2 allows you to customize your vape to optimal levels. Selecting voltage levels is very straightforward; you just turn the spinner dial on the bottom of the battery and align the indicator with your preferred voltage (forcing the dial beyond 3.3V and 4.8V may cause damage to the battery). Each battery is packaged and delivered in the "off" position; to activate/deactivate, you'll need to press the button five times in two seconds. The Spinner 2 sports an upgraded and very stable printed circuit board (PCB) that protects the battery against overcharging, discharging, and short circuiting. Another safety feature of the Spinner 2 is automatic cut-off; the battery shuts off if the button is kept pressed for more than eight seconds. The Spinner 2 comes with an authenticity check code that can be used to verify you have received a genuine VISION/VAPROS product.
Button Colours
Orange: Battery full 0 to 30%
Blue: Battery full 30 to 60%
White: Battery full 60 to 100%
For best results, please use a USB charger with 420mAh output (and a wall adapter with 500mAh output if you will be charging through a wall socket). Chargers with lower output values may result in the battery not charging right or cause damage to battery cells.
Package Contents
1x VISION Spinner 2 (II) Battery (1650mAh)
|
global_01_local_1_shard_00001926_processed.jsonl/22145
|
VFB Holiday Gift Guide: Under $30
Still haven't scratched off that person from your holiday shopping list. Well don't fret, here are a couple of suggestions all under $30 to help make your holiday shopping a bit easier and won't dig a whole in your pocket:
1.Multi-Color Scarf, Delia's, $24
2.Aviator Sunglasses, Fred Flare, $11
3. Book: Fifty Dresses That Changed the World, Amazon, $14
4. Book:Keep Calm and Carry On, Urban Outfitters, $8.99
5.Braided Necklace, AE, $12
6.Cocktail Ring, Forever 21, $5.80
7.Lip Gloss Palette, Victoria's Secret, $10
8.Convertible Gloves, Urban Outfitters, $18
9.Archipelago Soy Wax Candle, Nordstrom, $24
10.Marc by Marc Jacobs Jelly Bands, Shopbop, $15
11. Shiseido Eye Shadow, Sephora, $25
There will be more to come....
1. My sister is obsessed over jelly bands! Never thought there'd be designer ones, she'd be happy to receive them! ...
Related Posts Plugin for WordPress, Blogger...
|
global_01_local_1_shard_00001926_processed.jsonl/22176
|
Muscle Building and Butrition
Hi Mike, I am 19 years old, 5'7 and 150-155 pounds. At the beginning of the 2011 summer I began to train hardcore and advanced. I have gotten much stronger and more lean but I want a lot more. Just to give you some bench marks at where I am at; I have maxed benched at 245 for 1, full squat 315 (haven’t tried going higher), deadlift 275, can do chin ups with an extra 90lbs for 3. I eat very healthy with a lot of protein and try to keep my carbs low. I want a lot more though. I would like to get to about 165 pounds of muscle. However, I currently do not have the ripped abs that I would like. I want to gain this 10 pounds of muscle and shred my abs and obliques. How do you suggest I eat and workout to achieve my goal? Thank you.
It sounds like you have actually achieved tremendous success. Be proud that you have accomplished so much. I hear you though. Its like a drug. You just want more. My suggestion is to keep up the pace. Eat like crazy if your having trouble gaining mass, and I would recommend taking supps as well. Keep it simple. Protein, BCAA’s, and a good pre workout before you train, Drink the BCAA’s during, and make sure to hit up about 30g of protein after for recovery. My suggested products. Any Whey Protein, Cytosport Muscle Milk (I go with the light version) etc…, COncret( Creatine), Scivation Xtend for the BCAA’s, and BPI’s 1MR, and or MRI’s BLACK POWDER. I have used others, but I cant go wrong when I take those lines.
|
global_01_local_1_shard_00001926_processed.jsonl/22185
|
Filtering by Category: Germany
A Mad Man's Home is his Castle - Neuschwanstein
Buy a print of this image
Many things could be said about this castle. It is an awesome sight and, frankly, my picture does not do it justice. If the castle looks familiar that's because it has been the inspiration for castles in several movies and such including Disney's Sleeping Beauty castle.
The castle is named Neuschwanstein and was built by a mad man, King Ludwig II. This was just one of his many castles and palaces. One thing that is amazing to me is the castle was built in the 1870s and 1880s. I always think castles like this were built in ancient times.
This photo was taken from a Marien Brücke (or Mary's Bridge). It was named after the king's mother.
Until next time...
|
global_01_local_1_shard_00001926_processed.jsonl/22189
|
Knowing What’s Good for You
Suppose you don’t feel well. You keep getting the flu. You can’t sleep. You’re anxious and irritable. Your gut is in turmoil. Nothing you do works, so you go to a doctor who prescribes some drugs. Or you go to a naturopath who prescribes some neurofeedback. Or you go to a homeopath who prescribes some remedies. Or you go to an acupuncturist who treats you and sends you home with some medicinal teas.
The important question for you is “Which one of these practitioners will make me feel better?” You, of course, choose one based on your sense of what will work. “Sense” has two meanings: one is rational sense, the other is emotional sense; what looks right and what feels right.
Beyond all that, how do you know that the treatment offered is the one most likely to restore your health?
The conventional view is that to know these things, you need to be statistically literate. In this view, the ability to weigh the relative risks and benefits is essential to reasoning about your health. This approach is illustrated in books such as Better Doctors, Better Patients, Better Decisions in which researchers argue that practitioners are as statistically illiterate as their patients. Doctors and patients alike need to be made comfortable and competent with the statistics upon which rational decisions are made.
This assumes, of course, that the pool of information is a sound basis for making a decision. The conventional view is that you should use only sources such as the Journal of American Medical Association and the New York Times. But you likely use information from sources such as the Orthomolecular News Service and GreenMedInfo.
While you use information sources outside the conventional corral, you also reason about, think through that information differently than the conventional experts insist you should. What they’re promoting is a standard that might be called cognitivist or rationalist or utilitarian—it is a process that calculates. You do that kind of thinking, of course, but that’s not the only kind of thinking you do. You also do emotional thinking.
Going to an MD might calculate right, but it might not feel right. Or the other way round. The calculation for taking that antidepressant or antipsychotic or antibiotic (whether pharmaceutical or natural) might make one kind of sense to your utilitarian brain, but not to your emotional brain.
That’s because you have two modes of reasoning that occur in two separate parts of your brain. It confirms what you experience. It’s reasoning cool and hot. It’s how you make sense of things: one disembodied (the numbers) and one embodied (feelings). These processes balance one another.
So while the information piles up for your utilitarian brain to calculate what’s best, your emotional brain chews on other kinds of information—for example, your gut feeling. The point here isn’t to always trust your gut. The point is to pay attention to it. As it turns out, you do it all the time. But you’ve been subject to a good deal of propaganda and bullying that the utilitarian calculation is the only one that counts.
It might help to ask, “Where does all this emotional information come from?” We have all these professional journals and expert opinions and other sanctioned sources for utilitarian calculations. What supports emotional thinking?
Your own experience, as your body understands it. That’s why it’s called your sense of things. That’s why it’s called “making sense.” That’s why we have gut feelings.
But just as the officially sanctioned data sources are not always reliable, your gut feelings are not always reliable. I’ll give you an example.
Some neuroscientists studying better ways to identify effective anti-smoking campaigns discovered a way to accurately predict the effect of advertising on a large population. They showed three TV ads to 31 people. The strength with which a specific part of each person’s brain lit up accurately predicted how successful a TV ad would be in getting people to quit smoking. The news report’s title was “Your Brain Knows Which Ads Are Winners, Better Than You Do: Study On Smokers’ Brains May Mark Dawn of New Age in Advertising.”
OK, so advertising doesn’t affect you. Do movies? One study shows a strong relationship between smoking in movies and adolescents who start the habit. Movies are storytelling. Advertising, at least for the last 50 years, is storytelling. Branding is all about telling a story that makes you want to be a part of it. And that’s older than Aristotle’s Poetics.
OK, so you don’t smoke. Do you use a cell phone? What story is that part of?
And by the way, those symptoms I listed at the beginning? They’re common to people who are electrosensitive. An effective treatment is to unplug the SmartPhone and SmartMeter and wireless router and PDA and cordless phone and dirty electricity and other sources of electrosmog. That trick is not in the bag of most health practitioners because, just like you, they have stories of their own to deal with.
|
global_01_local_1_shard_00001926_processed.jsonl/22196
|
Brett Kavanaugh joins the Supreme Court
The consequences of a controversial confirmation process
On October 6, Brett Kavanaugh became an Associate Justice of the Supreme Court of the United States, after going through a controversial confirmation process. The question is, what does his appointment to the Supreme Court mean continuing forward, both politically and across society?
Kavanaugh’s nomination and confirmation process was fairly smooth until several sexual assault allegations emerged in late September, which delayed the vote of the Senate Judiciary Council; however, the key hearing of the confirmation process was when Dr. Christine Ford came before the council to answer questions about an alleged sexual assault that occurred in the early 1980s when both her and Kavanaugh were in high school. Despite the allegations against him, Kavanaugh was sworn in with 50 votes for and 48 against his appointment during the final vote in the United States Senate.
Immediately after Kavanaugh was sworn in, the message from the Democrats, to disappointed individuals, was to vote. Since the American midterm elections are November 6 and Republicans currently control the Senate by a slim majority, voting is a chance for those against Kavanaugh to voice their discontent with the Senators that voted him in. Furthermore, changing what party controls Congress can act as a safeguard against right-leaning Supreme Court decisions that are probable with Kavanaugh’s appointment since Congress can pass bills that override court rulings.
There are also worries about how Kavanaugh will vote when important cases involving issues like the right to bears arms and religion come up.
Particularly, there are concerns that Kavanaugh might vote to overturn or weaken Roe v Wade, the case that establishes the right to access legal abortions. While Kavanaugh has stated that he acknowledges the case as precedent, he has sided in the past with dissenters to the outcome of the case. In general, Kavanaugh poses a political threat since he brings the number of right-leaning justices to a majority in the Supreme Court, which could mean the future rollback of rights.
Kavanaugh’s appointment has caused political concerns, but the messages from the way the allegations of sexual assault were handled during the confirmation are having a far greater impact on society. The contrast between the crowds of protesters outside the hearings versus President Trump’s strong convictions of Kavanaugh’s innocence shows that America is clearly divided over Kavanaugh. While some might see the sexual assault allegations as a distraction to voting in a Supreme Court justice, many others want to make sure that judges appointed for life will make decisions that are fair and just to all members of society, particularly women.
Kavanaugh’s confirmation hearing over the sexual assault allegations also represented the imbalances in which men and women are treated during such cases. Dr. Ford, a highly educated woman, answered every question during the hearing calmly with the use of some scientific explanations, passed a polygraph test, and after all that, received death threats for going public with her accusations.
Kavanaugh, on the other hand, did not answer all the questions, became extremely emotional and aggressive, attacked Democrats for trying to undermine him, and ended up on the Supreme Court. Even sexual assault allegations at the top level in America reflect that even if a woman does everything in her power to ensure her credibility, her accusations can be brushed aside in favour of an alleged perpetrator of sexual violence.
That is not to say that there were only faults with how Dr. Ford and Kavanaugh’s testimonies were presented and then weighed during the hearings. There is also the issue that the members of the Senate Judiciary Council are predominantly men, which undermines their ability to decide if Kavanaugh’s final Senate vote should occur since they do not represent the actual proportion of men and women in the United States. Women are at a higher risk of sexual assault and with limited representation on the Senate, they may be biased when it comes to sexual assault allegations. Furthermore, the FBI investigation that was ordered after Dr. Ford and Kavanaugh’s hearing was limited by which witnesses and evidence it could find in such a short period of time, which for some people, leaves it unable to prove Kavanaugh’s innocence.
Kavanaugh’s appointment to the Supreme Court is sure to cause ripples for years to come politically and across American society. The greatest lesson that Kavanaugh’s confirmation process can teach is how much more work there is to do on how sexual assault allegations are examined, especially with respect to how victims are treated. Perhaps that lesson can be applied a bit closer to home at StFX, since the university is currently facing the complicated task of learning how properly address sexual assault on campus.
|
global_01_local_1_shard_00001926_processed.jsonl/22201
|
Gaining Advantage
As outlined in my previous post, there is an interesting dynamic involving the "first step" for advancing in on your opponent successfully in IaMP. In most older 2D fighters; every action is a short, deliberate, and generally direct action. Although the game of footsies can sometimes seem indirect because you are pushing your opponent into the corner and advancing on your opponent slowly, but after a certain amount of experience the concept becomes more obvious and and seemingly more direct.
The fact is; if a movement doesn't immediately lead to you punching your in the face, that doesn't mean the movement was a failure or worthless. In most older Fighting games, it is more ideal to control the area around yourself with hitboxes and potential hitboxes, while slowly advancing forward and forcing the hit-area "bubble" more and more toward your opponent, thus pushing your opponent further into the corner -- because obviously they don't want to be inside your bubble unless they can guarantee an ideal outcome (countering/beating your attack). Yes, it seems indirect to the untrained player, but in reality it is brute force and very direct -- the aggressor is pushing and shoving their opponent into a very bad spot where they have less options.
IaMP, however, can at times feel even more indirect due to the movement system that allows characters a large range of motion. However, deep down it's really quite the same, it just doesn't appear that way superficially. In order to advance on your opponent you must purchase a particular area in order to own that area, and once that area is owned you must react to your opponent in order to gain advantage. In IaMP this is called "Cover", though in other games it's generally referred to as "Zoning" and "Controlling Space".
In short: there's multiple steps that you have to take before you can hit your opponent without fail, you can't just go from point (A) to point (Z) without stopping at all the other points first.
Here we see Sakuya performing her 236C bullet attack, scaled at 50% size. Another particularly strong bullet move. The bullets fired spread out rather erratically by shooting in a random direction angled forwards, and thus it becomes a swarm of knives that travels gradually horizontally. By spending some of her meter she has partially purchased the area in front of her. The projectiles move horizontally slow enough for Sakuya to dash into them either from the air or ground. And now that area, plus the area she is able to cover with melee, is "owned".
At this point, with Sakuya you can choose what to do depending on what your opponent is doing. If the opponent attempts to overwhelm your bullets with their own bullets then you can graze or graze-attack through the opponents bullets. If the opponent attacks from the ground (generally with a graze attack), then you can attack from the air. If the opponent goes into the air, then you can chase them with a jumping melee such as with her j.A. And if the opponents gets hit or simply blocks, then you now have momentum.
Sakuya j.236C 6D j.B hitbox Sakuya j.236C 6D j.A hitbox
As you can see from these two pictures (scaled 50% again), Sakuya has purchased a great deal of vertical and horizontal space by firing her 236C (in these pictures, a j.236C). But she does not control that space with the bullets (knives) alone, since the opponent can simply graze through the bullets. However the opponent can't graze forward against Sakuya's j.B because they will run right into the j.B hitbox. They also can't high jump graze or they will run into Sakuya's j.A hitbox. They also can not attack with melee because the bullets will hit them out of the melee. And they can not use bullets because Sakuya's bullets will trade with them, leaving her melee to smack the opponent in the face.
The correct answer for this trap is to either block, or avoid it in the first place by using your own bullets and melee to control the space that Sakuya would normally try to perform this string in. Basically, push comes to shove, much like in other 2D Fighters.
- Copyright © Xenozip.
No comments:
|
global_01_local_1_shard_00001926_processed.jsonl/22228
|
Eric Clapton`s watch sold for 2.3 mn pounds
London: Singer Eric Clapton`s watch has been bought by a collector for 2.3 million pounds at an auction.
The Patek Phillipe watch made by the luxury Swiss watchmaker was with Clapton, 67, for almost a decade and was bought by an Asian at a Christie`s auction here, reports a website.
|
global_01_local_1_shard_00001926_processed.jsonl/22233
|
Skip to content
• Poster presentation
• Open Access
Phase sequences in balanced recurrent networks
BMC Neuroscience201314 (Suppl 1) :P207
• Published:
• Phase Sequence
• Connection Probability
• Sequential Firing
• Plasticity Rule
• Recurrent Probability
Electrophysiological recordings suggest that cortical circuits operate in a regime where the excitatory and inhibitory currents received by individual neurons are highly correlated in both time and stimulus selectivity. For such balanced input, neurons are activated by fluctuations in the input and tend to fire asynchronously and at irregular time intervals, a regime known as asynchronous irregular state.
However, transient synchronization and precise sequential firing has been observed during certain perceptual tasks or behavioral states. The neural mechanism behind these activity patterns has not yet been resolved. Here we address the problem by modeling a phase sequence embedded into a random recurrent network with sparse connectivity prand. The phase sequence as originally proposed by Donald Hebb [1] is a series of activity of cell assemblies connected in a feed-forward fashion. In our model, neurons representing one assembly are connected with recurrent probability prc>prand while neurons in subsequent assemblies are connected with feed-forward probability pff>prand. Each assembly has a corresponding inhibitory subpopulation to which it is recurrently connected with probability prc (see Figure 1A). Additionally, we apply an inhibitory plasticity rule that balances excitation and inhibition [2]. The role of such inhibition is twofold: it maintains asynchronous irregular firing of the excitatory population, and it enhances the response of an excitatory assembly through balanced amplification [3]. In the extreme case of no recurrent connectivity (prc = 0), the network resembles a synfire chain: a feed-forward network with convergent-divergent connections between subsequent groups of neurons [4].
Figure 1
Figure 1
A. Schematic of network connectivity between excitatory (E) and inhibitory (I) groups; B. Raster plots of 5,000 excitatory neurons representing ten assemblies, each of size 500 neurons during a phase sequence (prc = 0.06, pff = 0.06, prand = 0.01).
In contrast to synfire chain models, the balanced recurrent network dramatically reduces the connection probability pff that is required for the propagation of activity (Figure 1B). Simulations reveal a range of parameters in which asynchronous irregular spiking coexists with reliable activation and propagation of synchronous waves.
Supported by BMBF grants no. 01GQ1001A and 01GQ1201.
Authors’ Affiliations
Bernstein Center for Computational Neuroscience Berlin, Germany
1. Hebb DO: The Organization of Behavior: A Neuropsychological Theory. New York: Wiley. 1949Google Scholar
3. Murphy BK, Miller KD: Balanced amplification: a new mechanism of selective amplification of neural activity patterns. Neuron. 2009, 61: 635-648. 10.1016/j.neuron.2009.02.005.PubMed CentralView ArticlePubMedGoogle Scholar
4. Diesmann M, Gewaltig MO, Aertsen A: Stable propagation of synchronous spiking in cortical neural networks. Nature. 1999, 402: 529-533. 10.1038/990101.View ArticlePubMedGoogle Scholar
© Chenkov et al; licensee BioMed Central Ltd. 2013
|
global_01_local_1_shard_00001926_processed.jsonl/22235
|
Software-Based Data Sanitization Methods Overview
##Software-Based Data Sanitization Methods
Following up on my “Guide for Data Sanitization” post, I’ve decided to write up an article regarding the most common and popular data overwrite patterns, in other words, software-based sanitization methods (aka wipe methods).
Essentially, what all these methods do is overwrite the sensitive data on some form of electronic media, replacing it with gibberish. They all fall in the “Clear” type of sanitization, discussed in my previous post.
Most of these methods are freely provided by open source programs and tools such as:
And many more, all with different degrees of complexity and available methods.
#####DISCLAIMER : As expected, neither I or the bussinesses behind these programs can guarantee that all data is successfully erased or that it can’t be recovered, either partially or in it’s totality. Use them at your own risk.
On one hand, it’s widely agreed upon that a single overwrite is enough to prevent any software-based recovery technique. On the other hand, it’s not so agreed upon that a single overwrite is enough to prevent more advanced hardware recovery techniques.
In other words, not everyone supports the idea that a software-based sanitization method prevents all types of data extraction techniques. This doubt sparked the creation of various overwrite patterns, both by independent researchers and governmental agencies organizations, according to their own research. Some examples are listed below.
– Secure Erase
Secure Erase is arguably the best and most effective way to delete data on a HDD. It’s not really a program, but rather a set of commands available on the firmware of PATA / SATA like HDD’s. It works like this:
Pass 1: Writes a binary 1 or 0
Being an operation that occurs from the drive itself, there’s no need to verifiy the overwrite (the drive’s own write fault detection makes sure it doesn’t happen). This also makes the whole process considerably faster than other methods that involve 3rd Party software.
– Write Zero Method
The Write Zero - aka the Single Write / zero fill Method, is rather simple. It’s implemented the following way:
Pass 1: Writes a zero.
And that’s it… The main problem with this method is that, originally, it doesn’t verify if the 0 was actually written, making it less effective than other methods that actually do
There’s also another factor to take into account when choosing to implement this method. For example, let’s say you’re a Detective and you’re searching for your suspect in a big crowd. The first thing you should do is look for something that stands out, something that’s not supposed to be there.
The same applies to Data Forensics. If you know that a storage device was only overwritten with 0’s, then all you have to do you is look for something that doesn’t fit the pattern. However , if you overwrite it with 1’s, 0’s or random characters, it makes significantly harder to search for data since you don’t know what you’re looking for.
– US DoD 5220.22-M Standard
This was the standard wipe method of the US Department of Defense (and other 3 letter agencies). However, it’s no longer considered a viable / authorized wipe method by the regulatory authorities.
Although there are many different version of this method, this is the most common implementation:
Pass 1: Writes a 0 and verifies the write
Pass 2: Writes a 1 and verifies the write
Pass 3: Writes a random character and verifies the write
– Schneier Method
The Schneier Method follows this pattern:
Pass 1: Writes a 0
Pass 2: Writes a 1
Pass 3: Writes a string of random characters
Pass 4: Writes a string of random characters
Pass 5: Writes a string of random characters
Pass 6: Writes a string of random characters
Pass 7: Writes a string of random characters
– Gutmann Method
This method was created by Peter Gutmann in 1996. I believe it’s the most complex method as it runs a total of 35 passes, like so:
Pass 1 - 35: Writes a random character
From the first and last 4 passes (1 - 4; 32 - 35) it simply writes a random character, however, between Passes 5 - 31 it uses a complex overwriting pattern.
This doesn’t necessarily mean that the Gutmann method is the best wipe method. It’s important to understand that this was developed in the 90’s, maybe even before, meaning that it was designed for past technology. Peter himself said that most of the passes in his method are useless to modern drives and that our best bet is just a random pattern overwrite.
Alternatively, some programs let you implement your own custom method by letting you choose how many passes to run and what to do in those passes.
In this post we covered the most popular software sanitization methods, but believe me when I say there are many more. As you can see, there are only slight variations from method to method - some add / remove passes, others change what to do in those passes or even just add a ‘verify write’ step.
I believe it all comes down to your personal preference and a good speed / security ratio, because, if you think about it, that’s what originated all these different methods.
As all the methods described fall in the “Clear” type of sanitization, there’s still a chance that target data can be recovered by more advanced / state of the art hardware-based recovery techniques, but you shouldn’t worry about that unless you’ve made some pretty powerful enemies…
With that said, I believe we’ve reached the end of this post. As always, I hope you’ve enjoyed reading it and feel free to give suggestions. Thanks.
(Co-Founder and Part-time Fool ) #2
What about:
sudo dd if=/dev/zero of=/dev/sda bs=8M
This works too right?
Heh, ‘disk destroyer’, but of course…
(system) #4
|
global_01_local_1_shard_00001926_processed.jsonl/22245
|
Cast It Out (Genesis 45, Matthew 5:1-16)
The "Word To Life" audioblog is a weekly audio devotional, covering one solar calendar year, beginning at the biblical first week of the year - Passover/Easter Week (Exodus 12:2, Mark 14:1). It features 2 minutes of highly realistic and engaging Scripture drama followed by 2 minutes of commentary by Steve Cook.
God is in my acts of love, not my acts of fear. As long as I cling to laundry lists of fear, and not lists of love, like Matthew 5:1-16, I will be hopelessly doomed to a life of segregation and bitterness. This week, a listen to Genesis 45 reminds me that if I want to see God at work in my life, I must ask Him to help me overcome my fears; no matter how hard that is.
|
global_01_local_1_shard_00001926_processed.jsonl/22276
|
Blogger Blitz – First Round Recap
Get psyched! Blogger Blitz will be back on Monday, and Chris from Overthinker Y has you covered with a recap of the festivities so far!
OverThinker Y
Over the last month or so, something very special has been happening.
Under the watchful eye of curator and event runner Adventure Rules (Twitter here, and blog here), a group of brave adventurers has been pitting some of their favourite gaming characters against each other in a series of increasingly bizarre challenges as part of the inaugural Blogger Blitz, with judges including yours truly.
The first round in the bracket has just wrapped up, with the semi-finals due to start next week, so now seems as good a time as any to do a quick round-up and recap of what’s been going on so far. Here’s the official bracket as it stands right now, by the way, but if you’re going to read that then there’s almost no point reading this. Oh, well. Let’s dive in to the first set of matches!
By the way, I’ll…
View original post 1,058 more words
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/22279
|
MORE Spotlight
Jack & Jack Reveal The Meaning Behind Beg
Jack Johnson and Jack Gilinsky, AKA Jack & Jack, make their way to the YH Studio to tell is all about what we can expect from their first big tour in a while and how it will be different from their past tours! They also discuss the meaning behind their song "Beg" and what inspired them to make their long-form music video, "Gone"!
|
global_01_local_1_shard_00001926_processed.jsonl/22320
|
Navigáció kihagyása
Bletchley – The Cryptlet Fabric & Evolution of blockchain Smart Contracts
Közzétéve: február 9, 2017
Principal Program Manager, Azure Blockchain Engineering
Anatomy of a Smart Contract
The concept of a Smart Contract has been around for awhile and is largely attributed to Nick Szabo’s work in the late 1990s. However, it remained an abstract concept until the summer of 2015 with the Frontier release of Ethereum as its first implementation. The promise of Smart Contracts is sprawling and has gotten the attention of every industry as a revolutionary disrupter that can change the way business is done forever. That remains to be seen, but like most first implementations of significantly important technology, there are some early lessons learned and some introspection about how improvements can be made.
I have written a paper that describes at a high level how Smart Contracts are implemented today and how they can be refactored to significantly improve their performance, security, scalability, manageability, versioning, and reuse in the near future. This paper describes the thought process and historical context for a new architectural approach that focuses on separation of concerns and implementing a 3 Layered/Tiered Smart Contract architecture.
To understand the context and exactly what a “3-Layered & Tiered” Smart Contract architecture means please give this paper a read, Anatomy of a Smart Contract.
If you want the short and sweet answer it is this: Smart Contracts designed for semi-trusted enterprise consortium networks should be separated into 3 main layers:
• Data Layer – The definition of data schema and only the data logic for validation of inserts (appends) and optimization of reads. In platforms like Ethereum or Chain, languages like Solidity and Ivy can be used at this layer. This is similar to how relational databases use the SQL language and stored procedures.
• Business Layer – All business logic for Smart Contracts and surface level APIs for interacting with Smart Contracts from the Presentation layer (UI) or other external applications. Cryptlets written in any language targeting the runtimes supported by the Cryptlet Fabric. (.NET, .NET Core, JVM, native)
• Presentation Layer – User Interface platforms and other applications built on using the exposed APIs by Cryptlets.
These Layers can then be deployed, optimized, and scaled in their respective tiers: Presentation, Middle (Business), and Data tiers.
*Note, this approach is not generally valid for trustless implementations of Smart Contracts, but targeted at enterprise consortium blockchains.
The Cryptlet Fabric – Update
Cryptographic primitives, secure execution enclaves and a runtime secure key (secrets) platform that allows for the creation, persistence and dynamic reanimation for performing cryptographically secure operations with these keys at scale.
This allows Cryptlets to create, store, and use key pairs in a secure execution environment to do all sorts of “blockchain-ey” things like digital signatures, zero knowledge proofs, ring signatures, threshold signatures, and even homomorphic encryption all within secure enclaves. Cryptlets will come in 2 basic types, which I went into some detail in the reading Cryptlets in Depth, utility and contract.
The Cryptlet Fabric provides a blockchain router layer, abstracting away different transaction messages and cryptographic signing from the code implemented in Cryptlets, as well as integration with existing systems. For example, a Cryptlet’s output only contains the information to be sent to the blockchain, like market data or business logic results, and is packaged into the actual blockchain specific transaction by the Cryptlet Fabric below it by the blockchain router and blockchain platform specific providers. This encapsulation technique has been used for decades allowing technologies like TCP/IP to work on all sorts of networks (LAN, WAN, Internet and Mobile) and all kinds of applications. This is what allows for Cryptlets to be reused across different types of blockchains.
Utility Cryptlets (oracles)
Ok, I admit that being a Microsoft guy makes it hard for me to call anything an oracle without associating it with the company. The fact of the matter is that Utility Cryptlets can largely be thought of as a more scalable, standard, secure, and discoverable way to write blockchain oracles. The majority of requests that we get for Cryptlets are initially in this category, providing a secure attested data source for blockchain applications. You will able to write cryptlet oracles using the language of your choice targeting (initially) .NET, .NET Core, JVM and bare metal runtimes, so C#, Java, C++, F#, VB, etc... Your cryptlet oracle can publish any type of data you want, including:
• Market prices
• Package delivery notifications
• Workflow next steps
• Weather alerts
• Counterparty updates like credit downgrade
and define your subscription parameters like:
• Time and date
• Event driven triggers from the blockchain or listening to external sources
• Conditional – if “this” and “that” are true, evaluation combinations if, else if, switches, etc.
• Combination – if the time is 4PM EST & the NYSE was open today then send me the LIBOR and the price of x
As a developer or provider of cryptlet oracles you can publish them as libraries into the Azure Marketplace for discovery and acquiring customers. We expect to see a robust catalog of Cryptlet libraries from our partners big and small.
However, there is more to Utility Cryptlets than just providing data. You can use them to expose a secure channel into your blockchain based applications for other applications and user interfaces. An ERP or CRM system can read data from the blockchain without having to know any of the details, and they can also securely fire data and events into the blockchain to ease integration of blockchains into existing enterprise infrastructure. Cryptlets can also provide services to blockchain applications and analytics platforms by triggering events into existing systems by watching blockchain transactions and issuing an index request or data pull.
I’m sure that customers and partners will find many uses for Utility Cryptlets, but the first and most obvious is for blockchain oracles.
Contract Cryptlets
These Cryptlets are key to fully realizing the refactoring of Smart Contracts into a 3-Layered/Tiered architecture. These Cryptlets differ from Utility Cryptlets in many ways. Utility Cryptlets can have many instances at once, each handling many different subscriptions at the same time, whereas Contract Cryptlets are single, paired, or ring instanced and bound to a specific Smart Contract. Contract Cryptlets contain the business logic, rules, and external API for interaction for executing a Smart Contract between counterparties. In a private, semi-trusted consortium blockchain network where there are strong identities or trust between counterparties, the Smart Contract logic does not need to exist “on-chain” or be executed by every node on the network. Separation of concerns between the data layer in the blockchain and the business and presentation above, isolates code between layers abstracting implementations for reuse and optimization.
Contract Cryptlets are themselves digitally signed and run within an enclave that attests that the code they contain ran unaltered without tampering in private. This allows for the code in the Cryptlet to be private between counterparties and even be encrypted to protect intellectual property. Counterparties can write and review their own Contract Cryptlets and all inspect and verify the code before compiling and packaging for implementation, or they can choose from certified Contract Cryptlets that a vendor or reputation stands behind.
Contract Cryptlets can be instantiated for each counterparty participating in a specific Smart Contract instance. These Cryptlet Pairs and Rings are optional, but allows for each Contract Cryptlet to hold secrets like private keys for signing or encryption belonging to that counterparty, avoiding co-mingling secrets of counterparties in the same address space. This capability allows for more advanced transaction scenarios, like encrypting results, to be stored on the blockchain using threshold or ring encryption schemes.
Contract Cryptlets can use private keys and secrets it has permissions to that are fetched from the fabric’s “secret” services. These secrets are controlled completely by the counterparty via Azure Key Vault, and remain inaccessible to other participants, including Microsoft.
This approach allows code defining a Smart Contract’s business and integration logic to be run on scaled up resources and collocated near data for maximum performance. The data that they persist to the blockchain is still subject to the data logic “on-chain” and is reconciled on the network through its consensus process. The digital signatures from the Cryptlet, enclave and blockchain provider are used for validation and attestation, and can be stored along with each transaction on the blockchain as proofs.
Contract Cryptlets also use Utility Cryptlet services, however they can interact directly within the fabric via a subscription or direct API access.
Using Cryptlets allows for a three layered architecture where:
• The Smart Contract on the blockchain defines schema and data logic, which is deployed to the blockchain network representing the Data Tier.
• Contract Cryptlets define business logic and a Surface Level API for User Interfaces and external applications deployed to the Cryptlet Fabric representing the Middle Tier.
• Utility Cryptlets provide reusable data sources and events also in the Middle Tier.
• Presentation tier communicates with the Surface Level API of the Cryptlet Fabric using standard UI technologies or integration platforms deployed to web servers, mobile devices, service bus, etc. for the Presentation Tier.
This architectural approach provides abstraction of the blockchain implementation from its clients, as well as tuning and scaling the blockchain and Cryptlet Fabric independently.
Cryptlet Fabric Diagram
Here is an updated diagram of the Cryptlet Fabric. We will cover its parts in more detail in subsequent posts and white papers, which will also be included in its releases.
|
global_01_local_1_shard_00001926_processed.jsonl/22333
|
Update: Check new design of our homepage!
Makeup Ideas to Amplify the Beautiful 'YOU'
Makeup Ideas
Makeup, if done properly, can enhance your natural beauty like nothing else. Here are some makeup ideas you can try to define your style.
BeautiSecrets Staff
Last Updated: Jul 4, 2017
Everyone is blessed with natural beauty, but sometimes it needs to be enhanced and taken to the next level, and that is where good makeup steps in. Whether you would like to keep it simple with a cute look or jazz it up for a girls' night out with a dramatic look, there is a little something for everyone. Take a look at these ideas that would help you play up your natural beauty and have you stand out in the crowd.
Cute Makeup
The basic principle to sport a cute look with your makeup is to keep it subtle.
1. The first step is to cleanse, tone, and moisturize the skin thoroughly. Apply a tinted moisturizer to give your face a clear, even skin tone, and to avoid the powdery look.
2. Conceal any dark circles under the eyes with a concealer that blends well with your skin tone. You can apply it with your fingertips or with a concealer brush.
3. Apply a very thin layer of a semi-transparent powder to set the makeup base in place. For those with oily skin, this step will also help avoid the shine caused by the oil.
4. For the makeup to look cute, apply a mild, subtle shade of eyeshadow on the eyes, from the upper lash line to the eyebrows. An eyeliner will make your eyes stand out. Also use mascara to volumize the eyelashes.
5. Apply a very mild pink blush to the cheek bones, and blend it well around the area.
6. For the lips, apply a light and tinted lip gloss to give it that additional pout. You can go with a lip gloss that has a mild shimmer too.
Dramatic Makeup
Sometimes you may want to jazz up your look a bit by going dramatic with your makeup.
1. Begin by cleansing and moisturizing your face with a light moisturizer. For oily skin, use a toner before applying your moisturizer. This will prevent the shine caused by excessively oily skin.
2. Apply an even layer of foundation on your skin, one that matches your skin tone. Excess foundation will give the skin an unnatural tone, so be careful. Proceed to use highlighting powder and an under eye concealer.
3. For dramatic makeup, you have to play up the eyes. Pick out three colors of eyeshadow as per your choice. However, these shades should proceed from light to dark and should, therefore, belong to the same family of colors. You could start with a light cream, moving to a slightly darker shade, followed by the darkest shade.
4. Use the lightest color of eyeshadow on your eyelids, starting from the lash line to the eyebrows. Apply it well, and let it blend evenly with your skin. To further dramatize the jazz, apply just one line of the eyeshadow below the lower lash line, from the inner to the outer corner of the eye.
5. The next step is to apply the next, darker shade of eyeshadow. You will apply this from the lash line only up to the eye crease. Now apply the darkest shade using an angled eye shadow brush. This is to be applied above the crease. Begin with a little eyeshadow and proceed to apply more depending on how dark you want the shade to be. Ensure that you blend all the shades well. Let it proceed from light to dark naturally.
6. Use a dark eyeliner pencil, and make the line starting just below the outer corner of the eye. Extend it slightly to create the cat's-eye look, and bring it back right up to the inner corner of the eye, above the upper lash line. Now apply a fine line just below but very close to the lower lash line. The upper eyeliner can be slightly thicker.
7. Curl your eyelashes with a curler, and then use a mascara to add volume to them.
8. Use a blush on your cheeks that matches your skin tone. Use a rosy blush if your skin is light, and if it is darker, use a nude shade. Apply it on your cheek bones, and blend it around the area.
9. Apply a shimmering lip gloss, one that matches your skin tone. You can also apply a darker shade to jazz up your look a little.
You may already be a natural beauty, but when you try out these makeup styles, see the compliments that pour in. Just remember to adhere to the basic rules of skin care for these styles to have the desired effect at all times.
Beauty asian female skincare of her face
woman applying makeup on cheek
|
global_01_local_1_shard_00001926_processed.jsonl/22338
|
Baking Recipes, Desserts / Sweets, Lebanese recipes, ramadan recipes
I am really over the moon right now! I finally made Baklava.
Baklava is a baked sweet which is made of Filo / Phyllo / Fillo pastry. It has endless layers of the pastry, nuts and butter soaked in sweet flavoured syrup.
Filo pastry is nothing but basic flour dough rolled into thin sheets. The highlight of baklava is the Filo pastry; thinner the better.
During my college days, the one day I decided to bunk was the day we were taught Baklava. Since then, it has been kind of an “adhuri icchha” (unfulfilled wish) to make this utterly indulgent sweet.
Baklava is a lavish (in my opinion) sweet that is popularly made in Middle East, Greece and some parts of North Africa. All have different versions of the sweet. What I am sharing today is a Walnut Baklava Recipe which is inspired by the Middle Eastern variety.
Filo / Phyllo Pastry is the common ingredient in any type of Baklava. What varies is the choice of nuts, the flavour of the syrup and the shape of the sweet.
For eg, Greeks usually use Pistachios in their baklava and soak it in just honey. While the Lebanese scent their soaking syrup with orange rind. A special kind of Turkish Baklava even has cream in it. These are differences based on traditional ways of making the sweet but these days you see all kinds of baklava being relished in every region that claims its origin.
If you have never eaten Baklava or even heard about it then let me tell you, you have missed out on one of the best things life has to offer.
turkish baklava
All this while I thought Baklava was an extremely difficult dish to make but no, I was wrong. Now, I feel Baklava is the easiest sweet I have ever made. If you have ready made Filo pastry (which is advisable) then this sweet is a breeze. Something even a 7 year old can rustle up.
Filo Pastry is not commonly found in local Indian stores. I managed to buy an Australian brand from Nature’s Basket Stores in Mumbai. One can easily find it in stores selling imported or high-end ingredients. However, making Filo pastry at home is also a possibility. If you can manage to roll out thin films of the dough then nothing like it.
Walnut Baklava Recipe
1 readymade Filo / Phyllo pastry packet (not mentioning the weight or size because ultimately you will have to adjust it to the pan you are making it in. I have mentioned my pan size and the ingredients are as per that. )
½ cup melted butter (salted is fine)
To be mixed together in a bowl
¾ cups finely chopped walnuts (roast them for added flavour)
1.5 teaspoons cinnamon powder (use freshly made for better results)
2 teaspoons sugar
For the syrup
½ cup sugar
½ cup water
¼ cup honey
2 tsp lemon juice
Step 1 – Mix walnuts, cinnamon powder and sugar together in a bowl. Keep aside.
Step 2 – For the syrup, heat sugar and water on medium flame till the sugar melts complete. Bring to a gentle boil and switch off the flame. Add honey and mix well. Let syrup cool completely at room temperature then mix in lemon juice.
Baklava layering
Step 1 – Pre-heat oven at 200C.
Step 2 – Carefully unroll the Filo on a dry surface. Please follow instructions as per the pack.IMG_20180807_132405
Step 3 – Cut the sheet as per your pan size. I used 4 inch x 6 inch sheets. In total 20 sheets.
Step 4 – Start by greasing the pan with melted butter. Place one Filo sheet and brush butter on it. Repeat this with 6 Filo sheets.
Step 5 – After 6 Filo layers, sprinkle about half the nuts.
Step 6 – Repeat Filo and butter layers once again using 6 sheets.
Step 7 – Top with remaining nut mixture and cover this with remaining Filo sheets (layering with butter). Fold in the Filo from sides.
Step 8 – Brush butter on the top most layer and refrigerate for 10 minutes. Refrigeration just makes it easier to cut the baklava neatly.
Step 9 – Before baking cut baklava into squares using a sharp knife.
Step 10 – Place the pan in the bottom most rack of the oven and bake for 50 to 60 minutes at 200C. The sheets will turn golden brown and that should be the indicator of doneness.
Step 11 – Once out of the oven pour the syrup immediately over the baklava.Let syrup seep for minimum 4 hours at room temperature. After 4 hours refrigerate and serve baklava as and when needed. Garnish with chopped walnuts before serving.
Till then, Love Being a Mommy!
2 thoughts on “Baklava”
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/22355
|
Negative Cloud Margins?
A few days ago, I had a conversation with a friend of mine who told me something shocking: a particular cloud company's gross margins on cloud products are below -40%. That is not a typo, it is minus 40% or worse.
Essentially, the company is doing one of: burning investor money; running down their own cash reserves; borrowing from banks or the market; or subsidizing from other business lines. Whatever the method they are using to stay afloat, they are burning quite a hole.
The fundamental question, though, is why they have such terrible margins on the cloud business. Cloud businesses should have good positive gross margins. Jason Lemkin says it should be 80% or higher; Brad Feld quotes Battery Ventures who says that growth rate + gross margins should equal 40%, so for -40% gross margins, you should have an 80% annual growth rate. I have been assured that this company is not growing at 80%!
What are they doing wrong?
Without getting inside the company, it is very hard to know. However, there are several key factors that determine gross margins in a cloud company.
First, a definition:
gross margin = revenue - cost of goods sold (or cost of services)
• Revenue is easy to figure out: "customer X paid us $100,000 this year."
• Cost of Goods Sold (COGS) / Services (COS) is a bit harder, since we have to know what, exactly to include.
COGS is easy when you are selling hammers: it is the cost of the hammer, plus perhaps cost of delivery, and the cost of the salesman. COS in a SaaS business is harder. If I have a data centre that can handle 100 customers, and only 2 are in it now, is my cost the entire data centre, or can I just allocated 2% of the cost?
In fairness, with the maturity of the public cloud infrastructure market this should be less of an issue. For most businesses, you can scale up rather than invest capex upfront.
As an aside, R&D always is current-period expense not allocated to a particular customer's COS, unless you really did develop the particular feature just for that customer and no one else. Even then expect the accountants to give you a hard time about it.
Whatever the allocation, you still should have a strong positive gross margin and/or strong positive growth rate. Indeed, one of the key reasons to get into the cloud business is "cloud margins".
So negative margins means either low revenue per customer or high costs (or both). I do not know how much this company can raise prices. Even if they can, doubling the price (something they likely cannot do) only will lead to 30% gross margins. With current margins of -40%, costs are 1.4x revenue, so doubling revenue means costs of 1.4/2, for margins of (2-1.4)/2 = 30%.
Thus, the primary focus has to be costs. What drives costs in a cloud business?
1. Infrastructure
2. Sales
3. Process
Let's look at each in turn.
Infrastructure is a major cost of a cloud business. Fortunately, infrastructure can be turned into easily scalable opex with cloud infrastructure offerings from AWS, Google, Microsoft, Joyent. The key question then becomes how much infrastructure you are using vs. how much you need.
Does your application need an average of 1 server instance per customer, 100, or 1,000? Or does it need 10% of 1? Similarly for storage, do you need 1MB per customer, 1GB, or 1TB. How long do you need to store the data? Are there solutions such as compression or slower archive storage that can reduce that cost?
Similarly, is your application architecture efficiently using those resources? The correct design and good coding practices can have a significant impact on the resources required. When I was a fairly young engineer at a large financial firm's IT department, I found that a critical reporting process was running beyond night-time processes and into the day, threatening our ability to operate. I took a good look at both the design and the algorithms, and in a few weeks changed both, leading to finishing the process in less than half the time and half the resource cost.
Most importantly, once you understand what your infrastructure costs truly are and what drives them, you need ongoing analytics. This is not a one-time process. Just as you monitor your databases to make sure they are running and servicing requests, and do not rely upon the fact that they were fine yesterday to assume they are fine today, so you need to create great metrics for resource utilization per customer and monitor those on at least a weekly basis. Don't wait until your CFO shows bad profit numbers to try and figure it out again.
This is the easiest to analyze. Are your costs of sales too high? Is your commission plan appropriate? Is it driven by the right metrics? Are you spending too much closing each customer? If you spend $20,000 in expense - lawyers, travel, etc. - to close most customers, don't go after deals that will provide only $25,000 in revenue!
Process is the trickiest part to resolve, especially for technology-driven organizations.
• How long does it take you to go from "deal signed" to "customer live"?
• How many people and teams need to be involved?
• What is your support methodology? How expensive is it? How long does it take to resolve problems? How often are there problems?
Process suffers from 2 challenges:
1. It is subtle, and therefore harder to evaluate. Infrastructure is easier to manage, sales is easier to calculate and change.
2. It is unglamorous, almost boring. I have never met a CTO or VP Product who gladly will shift resources from building the great new feature sales wants to providing better analysis tools for the operations team or stability and bug fixes, yet, these are much greater force multipliers for increasing margins.
A driver of process is your organization and incentives. Is your organization structured in a way enabling it to operate as quickly as possible, and thus drive down costs? Or is it structured for long handoffs with unclear processes between groups? At any given moment, do you know exactly how many issues and open tasks are outstanding, how long they have been open, expected completion, and how expensive it has been?
The same applies to incentives. Do you have incentives that encourage efficient practices and lower costs, or those that discourage them?
As an example of incentives, let's look at a company with which I worked a few years ago. They started using AWS for their testing and staging environments, but the budget was held by a specific operations group. This led to the counterproductive situation wherein the technical expert on AWS controlled the funds, while the teams had no control at all. With a limited budget in the operations team's hands, but nothing in each engineering team's:
• A backlog was created, since the budget was utilized.
• The operations team decided who got which resources, rather than the executive management as part of a budget process.
• No one who had a resource wanted to give it up, since you never knew when you would get it back.
• Horse-trading between groups became common.
A better situation would have the operations team provide the key tools and access, while each team used their own budget to pay for resources. Team A used $20,000? That is between them and their VP, not the head of cloud operations! Team B wants $5,000 of resources? They need ask only their VP or CFO, and justify it to them like any other expense.
If you run a cloud business, except in the very earliest stages or if you are growing like a rocket, your margins should be high to extremely high. If you are suffering from low or negative margins, your operational cost structure is challenged.
Look at your infrastructure utilization, your architecture that creates that pattern, your sales costs and structure, and your processes and incentives. An outsider often has the experience, the knowledge and the ability to navigate the legacy and potential strains between the groups to find the issues and implement creative solutions.
Somewhere - usually several somewheres - you are spending far too much money trying to provide services. Unless you can solve it, eventually the cloud business will go under.
Ask us to help you.
|
global_01_local_1_shard_00001926_processed.jsonl/22356
|
A Fresh Take on CRE
How to Water Down a Relocation Clause
Landlords like big tenants. Quite simply, they're easier to deal with, and cause less administrative headaches. They sign longer leases, they do their own work, they understand real estate, and they pay a lot of rent. Sure, big tenants have their negatives as well, but on the whole, landlords prefer them.
To that end, if a landlord has the option to move a small tenant to make room for a big tenant, they might just do it and if your lease has a relocation clause, they can! So what exactly is a relocation clause? Well, it's pretty straightforward, and generally it says, that with XX days notice, the landlord can move you to another space in the building of a similar size, and charge you the same amount per sf that you are paying now, for the new space.
Given the significant cost of business downtime, if a relocation clause is exercised, it can cost a small tenant an incredible sum of money. With this in mind, when I submit an offer on behalf of a client, I always ask if the landlord's lease has a relocation clause.
So, what if the lease I am about to sign has a relocation clause, what do I do?
In this situation, you have 2 options. The first, of course, is to demand that the clause is removed from the lease. This is often possible, but for some landlords, the relocation clause is very important. In these cases, your best option is to water down the clause. Here's how you do it.
1) These clauses generally say that the landlord may move you anywhere in the building he/she chooses. You should change the clause to say that the landlord may only move you to a location on the same floor or higher. You may also wish to request that the floor is facing the same direction and gets better or equal light and views, and has at least as many windows.
2) Few spaces in a building are exactly the same size. The landlord will want to move you to a space of "similar" size, but how do you define similar. Furthermore, the landlord will want to charge you more for your new larger space! You should demand that the space your are moved to is equal or larger than the space you currently occupy. Additionally, your "proportionate share" of the building should not go up for tax and escalation purposes, and you should pay no more than you are currently paying for rent and electricity.
3) Moving expenses - The landlord should pay for all moving expenses.
4) Downtime expenses - The landlord should pay for all expenses related to business downtime.
5) Build-out - The landlord should build out your new space to a degree of quality that is as good or better than your current space.
6) Notice date - Demand that you receive plenty of notice of the landlord's intent to relocate you.
7) Other concessions - Free rent, additional tenant installation $, etc.
It's worth noting, that the relocation clause is really not as scary as it seems. Truth be told, landlords rarely relocate tenants. It's generally prohibitively expensive and very time consuming (even more so when you include all of the restrictions we did above). Also, there is rarely one small tenant on a large floor. Relocating one often means relocating the others. Nonetheless, it's important that you protect yourself.
|
global_01_local_1_shard_00001926_processed.jsonl/22374
|
Chapters ▾ 2nd Edition
A3.5 Appendix C: Git Commands - Sharing and Updating Projects
Sharing and Updating Projects
There are not very many commands in Git that access the network, nearly all of the commands operate on the local database. When you are ready to share your work or pull changes from elsewhere, there are a handful of commands that deal with remote repositories.
git fetch
The git fetch command communicates with a remote repository and fetches down all the information that is in that repository that is not in your current one and stores it in your local database.
We first look at this command in Fetching and Pulling from Your Remotes and we continue to see examples of its use in Remote Branches.
We also use it in several of the examples in Contributing to a Project.
We use it to fetch a single specific reference that is outside of the default space in Pull Request Refs and we see how to fetch from a bundle in Bundling.
We set up highly custom refspecs in order to make git fetch do something a little different than the default in The Refspec.
git pull
The git pull command is basically a combination of the git fetch and git merge commands, where Git will fetch from the remote you specify and then immediately try to merge it into the branch you’re on.
We introduce it quickly in Fetching and Pulling from Your Remotes and show how to see what it will merge if you run it in Inspecting a Remote.
We also see how to use it to help with rebasing difficulties in Rebase When You Rebase.
We show how to use it with a URL to pull in changes in a one-off fashion in Checking Out Remote Branches.
Finally, we very quickly mention that you can use the --verify-signatures option to it in order to verify that commits you are pulling have been GPG signed in Signing Commits.
git push
The git push command is used to communicate with another repository, calculate what your local database has that the remote one does not, and then pushes the difference into the other repository. It requires write access to the other repository and so normally is authenticated somehow.
We first look at the git push command in Pushing to Your Remotes. Here we cover the basics of pushing a branch to a remote repository. In Pushing we go a little deeper into pushing specific branches and in Tracking Branches we see how to set up tracking branches to automatically push to. In Deleting Remote Branches we use the --delete flag to delete a branch on the server with git push.
Throughout Contributing to a Project we see several examples of using git push to share work on branches through multiple remotes.
We see how to use it to share tags that you have made with the --tags option in Sharing Tags.
In Publishing Submodule Changes we use the --recurse-submodules option to check that all of our submodules work has been published before pushing the superproject, which can be really helpful when using submodules.
In Other Client Hooks we talk briefly about the pre-push hook, which is a script we can setup to run before a push completes to verify that it should be allowed to push.
Finally, in Pushing Refspecs we look at pushing with a full refspec instead of the general shortcuts that are normally used. This can help you be very specific about what work you wish to share.
git remote
The git remote command is a management tool for your record of remote repositories. It allows you to save long URLs as short handles, such as “origin” so you don’t have to type them out all the time. You can have several of these and the git remote command is used to add, change and delete them.
This command is covered in detail in Working with Remotes, including listing, adding, removing and renaming them.
It is used in nearly every subsequent chapter in the book too, but always in the standard git remote add <name> <url> format.
git archive
The git archive command is used to create an archive file of a specific snapshot of the project.
We use git archive to create a tarball of a project for sharing in Preparing a Release.
git submodule
The git submodule command is used to manage external repositories within a normal repositories. This could be for libraries or other types of shared resources. The submodule command has several sub-commands (add, update, sync, etc) for managing these resources.
This command is only mentioned and entirely covered in Submodules.
|
global_01_local_1_shard_00001926_processed.jsonl/22384
|
Creating a Content Marketing Plan [Guide]
This guide will give you an easy, step-by-step process for creating a content marketing plan. You can use it to create an overall strategy for developing blog posts, which articles you want to share and highlight in social media, and to better understand your target market’s needs.
We cover:
• What is Content Marketing and why should you use it?
• The steps to creating a content marketing plan.
• What to do with your plan once you’ve finished it.
What is Content Marketing and Why Should You Use It?
Simply put, content marketing is the practice of providing knowledge and ideas (content) that your target market finds valuable and using this content to establish authority. Done correctly, content marketing also increases your visibility in search engines and on social media platforms.
Unlike the old-school notion of selling the features and benefits of your products and services, content marketing starts with the assumption that your goal as a marketer is to establish credibility with your target market by demonstrating how you solve their problems or meet a need. Content marketers solve problems for prospective customers (or students) by creating content that helps them answer questions and solve challenges.
Content marketing doesn’t sell as its first goal. Instead, it informs and entertains – which establishes you as a trusted authority that has your prospects’ best interests at heart.
Why adopt this approach? The rise of ratings sites and social media, means that organizations no longer control the flow of information about their services or about the verticals they serve. Instead, prospective buyers and consumers engage in a continuous conversation about companies, products, strategies for problem solving, and news items. As a marketer, you want to be a participant in as much of that conversation as possible – and you want your participation to be welcome and encouraged! Providing useful and helpful content divorced from a constant sales pitch establishes the idea that you understand your buyers’ needs and that you care about meeting those needs more than you care about “selling”.
In addition to these obvious benefits, there are two other reasons to embrace content marketing: First, everyone is doing it and (done right) it is a very, very powerful tool in developing a steady stream of inbound leads. As organizations have better understood the power of participation, the amount of available content has exploded. According to the Content Marketing Institute’s most recent study on B2B content marketing (, over 70% of marketers are creating more content in 2015 than they did in 2014. Fortunately, only 21% think that their efforts are successful and the remainder wish they had a more effective strategy.
Content marketing is growing, but the majority of practitioners don’t yet feel that they are building the relationships with prospects that will lead to increased revenue and interaction with the brand. This means that adopting an effective strategy will give you a leg up on the competition.
And developing an effective strategy gives the added benefit of increasing your visibility in search engines and creating the potential for lots of “long tail” inbound traffic that converts into leads. (“Long tail” refers to search terms that are longer than one or two keywords. In fact, more than 27% of all search queries are in the form of questions and over 50% of search queries have more than four words. By creating a model of the journey that prospects take when becoming a customer, you can develop a list of commonly asked questions that arise during the buying process. Developing content that answers these questions (for example “What is the best way to decide on the type of college that is best for me?” or “How do I decide how big a washing machine to get?”) allows you to demonstrate your value. It also positions that content to rank highly for relevant web searches.
The more detailed and granular you are in addressing the needs that come up in the buyer’s journey, the more likely you are to create content that will rank well.
Now let’s get on with creating your first Content Marketing Plan!
Creating a Content Marketing Plan:
The goal of a content marketing plan (CMP) is to provide a framework for ongoing online (and some offline) marketing efforts for your organization. This framework is based on:
1.) Figuring out what kinds of circumstances trigger a search that results in you being “The Answer”. (In other words, what problems does your organization solve for its clients and customers? What questions do they ask that make you the answer?)
2.) Determining a list of topics and associated keywords that will drive content development, promotion, and SEO/PPC efforts.
The end result of developing the plan will be a structured list of “marketing triggers” specific to your organization’s offerings, with each trigger having a specific set of associated questions and answers.
This list of questions and answers will then yield a list of content topics/ideas, keywords for inclusion in PPC and SEO programs, and notes on which social media platforms will provide the most useful potential traffic for the client.
Step 1: Understand your organization’s products and/or services.
It is surprising how many marketers don’t really have a clear and simple understanding of their products and services and how those things play a role in solving customer problems. In this step, you simply need to write the down the answers to the following questions.
What programs/products/services do you offer? Write out a simple list of the distinct programs or products you offer. This should include as broad a listing as possible. For example, if you are a college, then you might offer internship placement or career services in addition to academic programs. Be sure to give a brief explanation of each item in your list.
What is the profile of the typical buyer and influencer of each type of offering? For example, in many b2b situations, there are buyers who sign checks as well as influencers and ‘researchers’ who have a say in the ultimate purchase. In the “traditional” college market, the buyer is often a parent who is making a decision on behalf of a child.
What problems do you solve for your customers? How do you solve them? Ideally, this list should be posed as a series of very clear and distinct challenges. As in, “We help students learn the skills necessary to become a welder. We do this by offering classes, extensive outside lab time, and the only certification center in the state.” Ideally, you will not reference a specific program or offering here. Instead, describe what your organization does. For example, rather than say, “We help students find jobs through our career services office.” You would instead say “We help students in their job search by providing resume writing services, actively seeking out employers with positions, and teaching them interviewing skills.”
What problems does each specific offering/program solve for your customers? How does the program solve these problems? Take the list you created in the first question of this step and write next to each offering the exact problem(s) that offering solves. Then make notes (using your answers above) that show how that program solves those problems.
Step 2: Create a grid of “marketing triggers”.
Our goal in this step is to develop a list of milestones or triggers that will result in your offerings becoming relevant to potential buyers. You are trying to develop a specific set of questions/problems that you solve for your customers.
For each of the problems you listed in Step 1, write out a list of 5 to 7 major events/issues that would trigger or create that problem for your potential customers . For example, “I just got fired from my minimum wage job.” Or “My washing machine is making a funny noise.”
For each of these major events, write out a list of questions, worries, or challenges associated with that event. Say the event is getting fired from a minimum wage job, prospects might ask: “What can I do to never have another minimum wage job?”, “How do I get out of the hand to mouth existence of being a disposable employee?”, “What do I do next?”
For each question you identify, write out an answer — that answer should be fully generic — it should be the *right* answer to the question without specific reference to your programs/offerings.
When you have identified triggers, questions, and answers, you can create a grid like the one below. This example grid is for a translation firm and shows some of the questions and answers surrounding the legal and regulatory compliance needs of multinational organizations.
When you develop the full grid of all triggers, questions/problems, and solutions, you will have a framework that will help you create production schedules. It will also help you determine content topics for blogs, ads, email campaigns, and any website or social media content. You will also use this grid as the foundation for identifying potential keywords for use in PPC campaigns.
Step 3: Create a Keywords list.
Now it’s time to create a list of keywords that people have actually used to find your website. This will help you establish which topics are most relevant to your audience as well as where to find your best (and worst) opportunities for content marketing.
Look at your organization’s analytics and webmaster tools for a list of organic search terms. Unfortunately, most of the organic terms being searched come through as “not set” because of browser privacy defaults. Make a list of those keywords that are *not branded* (meaning your organization’s name does not appear in the term) and that also appear in the top 100 search listings. You are looking for non-branded terms that bring traffic to your site where you ranked better than 100.
Look at top performing keywords in any existing PPC accounts and then look at Search Insights to get a list of the actual searches that are triggering those keywords. List the keywords and their top associated searches together.
Look at both lists and eliminate any of those that would appear to be bringing bad traffic (for example, if your school runs a pharmacy tech program, you may see a lot of “pharmacy” keywords — take out the ones where people are looking for a local pharmacy and not an academic program.)
Step 4: Create long-tail keywords list.
At this point, you are ready to identify those longer, question based searches that will provide the most likely sources of traffic for you.
Take your master keyword list from Step 3 and create clusters of keywords with related meanings or that share related concepts. If you have a bunch of keywords that are associated with a particular program, group them together. If you have different keywords associated with a particular type of question or service, then group those together.
Take these basic clusters of keywords and give each one a simple name. It should be a phrase of no more than four words and lends itself to being part of a question. For instance, let’s say you have a welding instruction program and you identified a cluster of keywords about different, specific types of certification. You can call that keyword cluster: “Types of welding certification” and it would easily be part of the question “What are the types of welding certification?” or “How can I get tested in the different types of welding certification?”
Take the clusters of keywords and match them to the broad “marketing triggers” from Step 2. Here you are simply matching keyword clusters to particular marketing triggers that you identified earlier. Note that a cluster of keywords may match more than one trigger. In addition, more than one trigger may be relevant to a particular keyword cluster. For example, if you have keywords for your school’s nursing program and have identified both “I just got fired from my minimum wage job.” And “I want to find a career where I can help people.” As marketing triggers, then the nursing keywords would be appropriate for both.
Login to an adwords account and use the keyword planner to get suggested search terms and adgroup ideas. Type in the names of your keyword clusters and see what related terms adwords suggests. When you find keyword or adgroup ideas that seem like they would produce good traffic because they are closely related to the concepts you identified earlier and have decent traffic per month (for national level campaigns — at least 100. for a local market — at least 30) as well as a competition ranking anywhere below “High”, add them to your cluster.
Take each of your cluster titles from above and create two or three questions for them. For “Types of welding certification” you could use: “What are the types of welding certification?” and “How do I get different types of welding certification?”
Type these questions into google — type them, do not copy and paste them — and watch the suggested searches that come up as you type. Suggested searches are the ones that appear under what you are typing (see below). Make note of any suggested searches that seem like promising questions or topics.
When you have typed in your questions, copy down the first three URL’s that appear in the search results for each. These are your competitors for the traffic you want.
Creating Your Plan:
Now you should have your “marketing triggers” grid and a list of keywords broken into clusters. These clusters have questions associated with them and you have a list of the top URL’s for each question. In addition, you have linked each of your keyword clusters to a specific trigger.
From here, you can write up a social media plan and a blogging/content schedule centered around your problem/solution grid and the keywords you would use in describing them. Even if your social media plan is heavily image or video dependent, you now have a set of guidelines for producing that content.
Here is an example of some blog titles that center around the “compliance” grid we showed above:
blog titles about compliance
Writing specific and detailed content to match these titles increases the likelihood that you will develop a positive relationship with potential buyers and it increases the likelihood that search engines like Google and Bing will rank that content highly as searchers pose relevant questions.
From here, you can begin to list potential blog titles, types of articles you want to re-post or highlight on social media, the kinds of photos you will want to publish, as well as which keywords and ideas to highlight in your website content.
And given the size of the list, you will now have a structure that easily allows you to create an entire social media and content marketing calendar for (at least) several months.
Have you had success with content marketing? Do you have any other must do steps in creating a plan? Let us know!
|
global_01_local_1_shard_00001926_processed.jsonl/22404
|
Chat with us, powered by LiveChat
Go to the San Blas islands Panama
The San Blas Islands are a group of islands in the Archipelago de San Blas, located in the Northwest of Panama facing the Caribbean Sea.
There are 378 islands within the archipelago and they are scattered around in an area of about 100 square miles. If you leave the Golfo de San Blas by boat you will enter the Caribbean Sea. The majority of the 378 islands have no inhabitants, but on the larger ones, you will find the gentle native people known as the Guna. These people can be found on the larger inhabited Islands; Aguja Island, Guanidup Island, Chichime, Yandup Island and El Porvenir.
|
global_01_local_1_shard_00001926_processed.jsonl/22424
|
It has been brutal. For the past year and a half, a struggle ensued for my mind and soul. Constant spiritual warfare wore me down to the point where, on most days, I could barely hold up my head. Going to Mass became a chore. Something was seriously wrong within my soul. All this time, it seemed God was distant. Watching me, yes, but with his back turned the other way. I wandered in the desert like the weeping Israelites, praying and hoping for the streams of life.
During the worst times, I could barely pray. Nothing gave me the joy and consolation I formerly felt. Even throughout Mass, everything remained numb, dead inside. Seeing Jesus in the priest’s hands: the solution to all my ills, I begged Him for deliverance, remembering in my mind the most-dreary verse of Psalm 88: “Friend and neighbor you have taken away, my one companion is darkness.” What the melancholy King David sang thousands of years ago, I felt in my heart this day. Asking God for His grace, I decided to snub the devil by taking up even more prayer.
Now was not the time to let up. It was time for heavy artillery. Eucharistic adoration. If the local parish didn’t have exposition, I’d go into the church, before the silent tabernacle and voice my complaints and regretfully, not enough thanksgivings. Adoring the sacred host, the Real presence of the Lord is a remedy of peace, a soothing balm on the wounded soul. When you have one foot in the grave, in front of the tabernacle is where you need to be.
Another weapon: The Divine Office. A very ancient and powerful prayer, using the Scriptures, prayed in union with the entire church. It ensures the name of God be blessed at every hour… and the devil hates that! You don’t need to pray all five in a day as monks do. Start with Vespers or Evening prayer, which is easiest. Work your way up. Try chanting, in monotone or with accompaniment. As St Augustine advises: “He who sings prays twice.”
The spirits of despair and anger had encompassed me. There seemed no place to run. Last night, I struggled through my rosary, feeling suffocated by the evil and sin which weighed down heavy. Feelings of worthlessness, weariness and stress hung over my brow. It is no consequence that during the darkest times, Mary came to me, a quiet and serene presence. There is such power in the Mother of Christ, Our Perpetual Help. She crushes the serpent’s head. Wherever a public rosary was offered, I’d try best to make it.
But I am here to proclaim that God does wondrous things, even when we’re on the brink of giving up. We are always ready to give up, but Our Lord, He never gives up on us. Frayed, at the very end of my rope, I attended the rosary and adoration service at a nearby parish in Winter Haven Florida. The priest there is known to be very nice. He once heard my confession on the spot. I asked him before the service if he had time but he was understandably busy. After the service, I approached him and told him about this spiritual warfare I’d been going through, asking for his prayers. Even before we spoke, he could tell something was up. I glanced away, explaining that I’ve been thrown into so much confusion that I wasn’t even sure if I committed sins or not. He offered to bless and then absolve me!!
Taken totally by surprise, I knelt down before him, my eyes on the white stole hanging from beneath his robes. The power to forgive sins. Next to the voice of your husband, saying “I love you,” there is no better sound than a priests voice saying “I absolve you.” To me, it’s Jesus saying “I love you.” Totally beside myself with gratitude, I kissed the priest’s stole, thanked him profusely and skipped out of the church like a giddy fool.
Finally, I knew what it felt like to be that one leper, who showing himself to the priest, found he was completely healed. My heart racing, my face aglow, I ran and told everyone nearby of God’s goodness, of the healing power Jesus Christ gives through His “other Christ’s”, how God always comes through when we least expect it, how His love endures even in darkness. And that is why I wrote this for you today.
|
global_01_local_1_shard_00001926_processed.jsonl/22425
|
Tag Archive: catholicism
A New Direction
Here is the address for my new blog:
~ ~ ~
The Wine of the Mass.
The Honey of the Mass.
The Oil of the Mass.
The Holy Sacrifice of the Mass is the most-perfect gift in which God gives himself to man, and man gives himself to God. When we go to Mass, a banquet is spread before us full of splendor, richness, sweetness and praise. God’s goodness overflows. As a Protestant, I couldn’t really see God’s love for me, nor touch or taste it. God was an abstract person, far from us, that the preacher only talked about. Yes, he did tell us to “accept Jesus into our hearts” but this sort of prayer seemed like an intellectual exercise. When I finally discovered the Catholic Mass, I was able to say, here is truly the outward manifestation of God’s love for us! In the act of receiving communion, believed to be the actual body and blood of Jesus, “accepting Jesus into your heart” became more than just an idea but a real, concrete thing.
The Mass is our “Mysterium Tremendum”. It is the kingly, priestly and prophetic prayer of the entire people of God. Both a banquet and a sacrifice, it reopens every grace bestowed to us by Jesus on the cross of Calvary. In a lifetime, it would be impossible to understand all that happens at the Holy Sacrifice of the Mass or count all its gifts. Before such a tremendous mystery, we can only reflect on bits and pieces until the whole is revealed in heaven, where at the altar not made of human hands, we will worship for all eternity. The following gifts I now reflect on are just a foretaste of what God prepares for us, that which eye has not seen and ear has not heard.
The Gold of the Mass:
When the sweet smell of incense rises in smoky curls, the organ thunders and heavenly strains of Gregorian chant hit your ears as you see the priest process by wearing vestments that shimmer like fire, you are experiencing the gold of the Mass. These are the outward treasures of the church proudly displayed. While such beauty may consist of expensive materials, they speak of the treasures of heaven rather than earth. We do not count the cost of this perfume poured out in devotion, for God is master of all things.
Some may deem beauteous things as mere externals however, we know their true purpose: our senses, sight, smell, sound, touch, are guided to heavenly realities. Mysteries are brought low, so that man may taste and see. We see before us, entrance into that paradise lost and a foretaste of eternal delight. A lavish wedding feast calls our attention, our minds and hearts.
The gold of the Mass is the priceless adornment of the temple of God, which should match the adornment in our heart. Since we cannot see the hearts of others, we are shown something to strive for, the adornment of virtue, faith, hope, charity. It is also a reminder of God’s greatest gift to us, His Only begotten Son, who was incarnated of the Virgin Mary and became man. The Lord of all creation became poor so we may be rich. He became human so we could become divine. Gold was presented to the newborn babe in Bethlehem, placed before the manger of the King of Kings. Now, chalices and plates of gold are a fitting throne for Him. From a gold vessel we receive something infinitely more precious than gold. We receive the price of our redemption: the blood of Jesus Christ!
The beauty of the Mass summons our collective memory as ransomed people of God, no longer slaves but friends and servants of the most high. A royal priesthood, whose bonds have been loosed, we stand and give thanks to God, carrying our gold, singing our song of victory. Thus the gold corresponds to the end of the Mass which is thanksgiving.
Instead of being a pompous parade of human accomplishments, fine vestments and solemn chant sing of God’s accomplishments. He shed all the glories of heaven and while still Lord of Lords, died on a barren cross for our sins. He wore the sorrowful vestments of death so we could wear the glittering garments of resurrection. Being tried in fire, gold is living. Pressed in the crucible, it emerges stronger. It is also a very pure element, mirroring pure worship. Therefore, being given an inheritance that never fades away, we echo the words: “How can I repay the Lord for his goodness to me.”
What is this Catholic faith of ours? What does it mean to be Catholic? It is history, beauty and majesty. It is a love story between God and man. It is not the mundane entertainment of the world nor is it some abstract concept of our intellect. It is a real covenant relationship, a way of life lived to the fullest. It isn’t the way of death, some sterile, modern standard that is pressed upon us day in and day out, no it is life- defying death. Jesus spoke of this saying:
Too many people look at our faith as a set of rules and doctrines. They don’t realize that these rules and doctrines are actually a deposit of rich treasure, lovingly passed down by the apostles, and those saints and martyrs before us, originating from Christ’s undying love for us. Our doctrines and expressions are a gift, a sweet yoke. Not like the yoke of the world which burdens and destroys us. We must cast that yoke off and leave it behind. Then we can truly understand the Church’s wisdom, which is as a fount from heaven.
We worship in a liturgy because creation is liturgy, love is a liturgy. It is an act of giving and receiving and then giving again. It is speaking and being spoken to. God has always spoken to us in the law of gift. Moved by love, He spoke and all things in the universe were made and He pronounced them good. Each person, created in God’s image is a gift to be given. Christ offers us the gift of His very flesh and blood. He makes His life our own and we, enraptured by this act of love, can do nothing but adore and cry out “Amen!!”
Catholicism is a wedding, lasting throughout the ages. It is a lush garden where souls are planted and tended, where men become saints. God’s only son, the loving Bridegroom leapt down from heaven and became flesh to rescue us, to deliver us from sin and death. He gave all he had, his very life, for us. When water and blood poured from the side of the crucified Christ, a bride was taken and many sons and daughters were born anew from this union. We become God’s own sons and daughters. Because of this new identity:
“The righteous flourish like the palm tree and grow like a cedar in Lebanon.” –Psalm 92-12
In this family of the Catholic Church, we have a foretaste of our promised inheritance. As a wedding gift, He bestowed the Holy Ghost, the spirit of God, so that in a spirit of hope, charity and self-sacrifice, we may show others this Kingdom of God. The husband and wife reveal God’s covenant with man, made from the beginning. The priest’s celibacy shows his mystical marriage with the Church, the chosen Bride. Nothing like this has ever happened! Through the sacraments, which are seven jewels of great price, God makes us partakers in His Divine Life. Everything that belongs to God now belongs to His people.
“I am my beloved’s and my beloved is mine” – Song of Solomon 6:3
What we see in the visible Church points to a wondrous, unseen reality. Our communion here on earth is united to a greater communion in heaven, those who have fought and loved before us. Out of their sacrifices, modeled after the One Sacrifice of Christ, comes our power and strength. We are weak and have nothing in this world for our treasure is elsewhere.
The Catholic faith proclaims the forgiveness of sins, that when Jesus climbed up on that rugged cross, He undid the sin of Adam and reopened the gates of paradise. And how immense is God’s love that when a priest says “I absolve you from your sins” that through the blood of Christ, we are washed clean. Our faith is one that believes second chances are possible!
This is our faith, why add or take anything away from it? Why not love and cherish it as Christ loved and cherished us? Catholicism is the pure water in which we have been reborn. It is the Precious Blood we drink. It is God’s Holy Spirit moving and breathing within us. It is the anticipation of life and resurrection and of every good thing in the world to come.
mother of priests
|
global_01_local_1_shard_00001926_processed.jsonl/22433
|
To create a new customer case, first type the customer’s company name the case represents, and click “Create”. Then, fill out all relevant case information to describe and classify the customer case (and click submit):
• Customer
• Title
• Priority
• Owner
• Department
• Case Type
• Description
• Resolution Type
• Resolution Comments
Action Taken
The goal here is to log all actions taken in response to the customer feedback from initiation of the case to resolution. To log an ‘action’, select which kind of action was performed, and write a brief description of the context of the action (i.e. what the customer feedback was, what clarification was needed, and what was done or promised in the company to address the feedback or complaint). The default options for Action Taken are: email, survey, verbal, probation, termination, policy change, and other. For information on how to edit or add to these default options, click here.
Click “add to history” to log the action in case history.
To attach files and documents to any Customer Case, select the ‘Documents’ tab on the left sidebar of the customer case view screen; the files will be stored in the particular case you attach them to for future access with complete revision control. For information on Cetec ERP Document Mangement features and functionality, click here.
Add a note to the knowledge base for each individual customer case. Notes can be added to establish a system-wide knowledge base for details on customer cases. Additionally, you may set reminders on notes to send you personal calendar reminder to follow up with a customer. For more information on the Cetec ERP knowledge base feature, click here.
Is there a list of all customer cases in one location in the system? Yes - this is the Satisfaction Cases list. This is also where you may search for a customer case in the system. Search and filter by:
• Case Title
• Case Number
• Case Type
• Customer Name
• Case Resolution
• Department
To locate a customer case in the system, set the filters you want to search on and click ‘Search’. Note that when you create a customer case, it is automatically assigned the next available “case number” in the system. So, if you sort by case number, the results will be delivered in the order in which they were entered in the system.
Need to know more?
|
global_01_local_1_shard_00001926_processed.jsonl/22450
|
filter your search allcollegesexamnews
IAS Mains Assamese Syllabus
Last Updated - December 28, 2016
IAS Exam is held on multiple dates starting from December 03 to December 09, 2016. In IAS, Main exam there are 2 optional papers in UPSC civil services mains exam. In IAS Mains examination paper 6&7 are optional subject papers. You can choose Assamese language as an optional subject, if you have graduated in the literature of Assamese language as the main subject. With well-planned strategies, you can easily score well in the Assamese literature. Interest should be the prime criteria for choosing any optional. Each Konkani paper consists of 250 marks. Duration for each Assamese mains paper is 3 hours. Here is a detailed IAS Assamese Syllabus.
IAS Mains Assamese Paper 1
Answers in IAS Mains Exam must be written in Assamese language only.
Section A: Language
b. Developments of Assamese prose.
d. Assamese vocabulary-and its sources.
e. Morphology of the language-conjugation-enclitic definitive and pleonastic suffixes.
f. Dialectical divergences-the standard colloquial and the Kamrupi dialect in particulars.
g. Assamese scripts-its evolution through the ages till 19th century A.D.
Read About IAS Exam
Section B: Literary Criticism and Literary History
a. Principles of Literary criticism up to New criticism.
b. Different literary genres.
c. Development of literary forms in Assamese.
d. Development of literary criticism in Assamese.
e. Periods of the literary history of Assam from the earliest beginnings, i.e. from the period of the charyyageets with their socio-cultural background: the proto Assamese-Pre-Sankaradeva Sankaradeva-post SankaradevaModern period (from the coming of the Britishers)-Post-Independence period. Special emphasis is to be given on the Vaisnavite period, the gonaki and the post-Independence period.
IAS Mains Assamese Paper 2
Section A
1. Ramayana (Ayodhya Kanda only)-by Madhava Kandali.
2. Parijat-Harana-by Sankaradeva.
3. Rasakrida-by Sankaradeva (From Kirtana Ghosa).
4. Bargeet-by Madhavadeva
5. Rajasuya-by Madhavadeva.
6. Katha-Bhagavata (Books I and II)-by Baikunthanath Bhattacharyya.
7. Gurucarit-Katha (Sankaradeva's Part only)-ed. by Maheswar Neog.
Read About IAS Exam
Section B
1. Mor Jeevan Sonwaran-by Lakshminath Bezbaroa.
2. Kripabar Barbaruar Kakatar Topola-by Lakshminath Bezbaroa.
3. Pratima-by Chandra Kumar Agarwalla.
4. Gaonburha-by Padmanath Gohain Barua.
5. Monamati-by Rajanikanta Bordoloi.
6. Purani Asamiya Sahitya-by Banikanta Kakati.
7. Karengar Ligiri-by Jyotiprasad Agarwalla
8. Jeevanar Batat-by Bina Barwa (Birinchi Kumar Barua)
9. Mrityunjoy-by Birendrakumar
10. Bhattachary-ya
11. Samrat-by Navakanta Barua.
Remember not to commit grammatical mistakes. Improve writing skills for IAS Assamese literature exam. Handwriting should be legible for IAS Exam. A good command over the language is always helpful. Analytical and unconventional questions are appearing in previous papers so while preparing student should keep IAS Mains Assamese Syllabus and previous papers for reference.
No Comments To Show
Related News & Articles
October 01, 2018IAS-EXAM 2018
IAS 2019 Application Form
October 31, 2017IAS-EXAM 2018
IAS Exam Centers in Delhi
Find here IAS Exam Centers, nearest metro stations ...
August 25, 2017IAS-EXAM 2018
IAS Mains 2018
June 30, 2017IAS-EXAM 2018
UPSC IAS Prelims 2017 Cut off
Candidates who clear the round 1 will be appearing ...
|
global_01_local_1_shard_00001926_processed.jsonl/22463
|
How do I change the Listings slug?
NOTE: This doesn't apply to WP Pro Real Estate 7
Really easy, go into admin > custom-posts.php > change line 36 to whatever you like.
|
global_01_local_1_shard_00001926_processed.jsonl/22499
|
Introduction to Neural Machine Translation with GPUs (Part 2)
Note: This is part two of a detailed three-part series on machine translation with neural networks by Kyunghyun Cho. You may enjoy part 1 and part 3.
Encoder-Decoder Architecture for Machine Translation
Figure 1. Encoder-Decoder for Machine Translation.
Figure 1. Encoder-Decoder for Machine Translation.
Figure 2. The very first neural machine translation system.
Figure 2. The very first neural machine translation system.
The Encoder
We start from the encoder, a straightforward application of a recurrent neural network, based on its property of sequence summarization. If you recall the previous post, this should be very natural. In short, we apply the recurrent activation function recursively over the input sequence, or sentence, until the end when the final internal state of the RNN h_T is the summary of the whole input sentence.
First, each word in the source sentence is represented as a so-called one-hot vector, or 1-of-K coded vector as in Figure 3. This kind of representation is the dumbest representation you can ever find. Every word is equidistant from every other word, meaning that it does not preserve any relationships among them.
Figure 3. Step 1: A word to a one-hot vector.
We take a hierarchical approach to extracting a sentence representation, a vector that summarizes the input sentence. In that hierarchy, the first step is to obtain a meaningful representation of each word. But, what do I mean by “meaningful” representation? A short answer is “we let the model learn from data!”, and there isn’t any longer answer.
The encoder linearly projects the 1-of-K coded vector w_i (see Figure 3) with a matrix E which has as many columns as there are words in the source vocabulary and as many rows as you want (typically, 100 – 500.) This projection s_i = E w_i, shown in Figure 4, results in a continuous vector for each source word, and each element of the vector is later updated to maximize the translation performance. I’ll get back to what this means shortly.
Figure 4. Step 2: A one-hot vector to a continuous-space representation.
At this point, we have transformed a sequence of words into a sequence of continuous vectors s_is, and the recurrent neural network comes in. At the end of the last post, I said that one of the two key capabilities of the RNN was a capability of summarizing a sequence, and here, I will use an RNN to summarize the sequence of continuous vectors corresponding to the words in a source sentence. Figure 5 illustrates how an RNN does it.
I can write this process of summarization in mathematical notation as
h_i = \phi_{\theta}(h_{i-1}, s_i)
where h_0 is an all-zero vector. In other words, after the last word’s continuous vector s_T is read, the RNN’s internal state h_T represents a summary of the whole source sentence.
Figure 5. Step 3: Sequence summarization by a recurrent neural network.
What does the summary vector look like?
Now that we have a summary vector, a natural question comes to mind: “what does this summary vector look like?” I would love to spend hours talking about what that summary vector should look like, what it means and how it’s probably related to representation learning and deep learning, but I think one figure from [Sutskever et al., 2014] says it all in a much more compact form (Figure 6).
To plot the points in Figure 6, Sutskever et al. (2014) trained a neural machine translation system which we’re now training on a large parallel corpus of English and French. Once the model was trained on the corpus, he fed in several English sentences into the encoder to get their corresponding sentence representations, or summary vectors h_T‘s. (I guess, in order to show off their model’s awesomeness!)
Unfortunately, human beings are pretty three dimensional, and our screens and papers can only faithfully draw two-dimensional projections. So it’s not easy to show anyone a vector which has hundreds of numbers, especially on paper. There are a number of information visualization techniques for high-dimensional vectors using a much lower-dimensional space. In the case of Figure 6, Sutskever et al. (2014) used principal component analysis (PCA) to project each vector onto a two-dimensional space spanned by the first two principal components (x-axis and y-axis in Figure 6). From this, we can get a rough sense of the relative locations of the summary vectors in the original space. What we can see from Figure 6 is that the summary vectors do preserve the underlying structure, including semantics and syntax (if there’s a such thing as syntax); in other words, similar sentences are close together in summary vector space.
Figure 6. 2-D Visualization of Sentence Representations from [Sutskever et al., 2014]. Similar sentences are close together in summary-vector space.
The Decoder
Now that we have a nice fixed-size representation of a source sentence, let’s build a decoder, again using a recurrent neural network (the top half in Figure 2). Again, I will go through each step of the decoder. It may help to keep in mind that the decoder is essentially the encoder flipped upside down.
Figure 7. Decoder - Step 1: Computing the internal hidden state of the decoder.
Figure 7. Decoder – Step 1: Computing the internal hidden state of the decoder.
Let’s start by computing the RNN’s internal state z_i based on the summary vector h_T of the source sentence, the previous word u_{i-1} and the previous internal state z_{i-1}. Don’t worry, I’ll shortly tell you how to get the word. The new internal state z_i is computed by
z_i = \phi_{\theta'} (h_T, u_{i-1}, z_{i-1}).
The details of \phi_{\theta'} were described in the previous post. Figure 7 illustrates this computation. With the decoder’s internal hidden state z_i ready, we can now score each target word based on how likely it is to follow all the preceding translated words given the source sentence. This is done by assigning a probability p_i to each word (Figure 8). Note, a probability is different from a score in that the probabilities over all possible words sum to one, while the scores don’t need to.
Figure 8. Decoder - Step 2: Next word probability.
Figure 8. Decoder – Step 2: Next word probability.
First, we score each word k given a hidden state z_i such that
e(k) = w_k^{\top} z_i + b_k,
where w_k and b_k are the (target) word vector and a bias, respectively.
Let’s forget about the bias b_k for now, and think of the first term, the dot product between two vectors. The dot product is larger when the target word vector w_k and the decoder’s internal state z_i are similar to each other, and smaller otherwise. Remember: a dot product gives the length of the projection of one vector onto another; if they are similar vectors (nearly parallel) the projection is longer than if they very different (nearly perpendicular). So this mechanism scores a word high if it aligns well with the decoder’s internal state.
Once we compute the score of every word, we now need to turn the scores into proper probabilities using
p(w_i=k|w_1, w_2, \ldots, w_{i-1}, h_T) = \frac{\exp(e(k))}{\sum_{j} \exp(e(j))}.
This type of normalization is called softmax [Bridle, 1990].
Now we have a probability distribution over the target words, which we can use to select a word by sampling the distribution (see here), as Figure 9 shows. After choosing the i-th word, we go back to the first step of computing the decoder’s internal hidden state (Figure 7), scoring and normalizing the target words (Figure 8) and selecting the next (i+1)-th word (Figure 9), repeating until we select the end-of-sentence word (<eos>).
Figure 9. Decoder - Step 3: Sampling the next word.
Figure 9. Decoder – Step 3: Sampling the next word.
Training: Maximum Likelihood Estimation
Okay, now we have a neural machine translation system ready. How do we train this system so that it can actually translate? As usual with any machine learning model, there are many ways to tune this model to do actual translation. Here, I will describe how to train a neural machine translation model based on the previously described encoder-decoder by maximizing the log-likelihood. Maximum (log-) likelihood estimation (MLE) is a common statistical technique.
First, a so-called parallel corpus D must be prepared. Each sample in the corpus is a pair (X^n, Y^n) of source and target sentences. Each sentence is a sequence of integer indices corresponding to words, which is equivalent to a sequence of one-hot vectors. (A one-hot vector is a binary vector with a single element set to 1. Multiplying a one-hot vector with a matrix (from the left) is equivalent to taking the i-th column of the matrix, where the i-th element of the one-hot vector is 1.) Given any pair from the corpus, the NMT model can compute the conditional log-probability of Y^n given X^n: \log P(Y^n | X^n, \theta), and we write the log-likelihood of the whole training corpus as
\mathcal{L}(D, \theta) = \frac{1}{N} \sum_{n=1}^N \log P(Y^n | X^n, \theta),
where N is the number of training pairs.
All we need to do is to maximize this log-likelihood function, which we can do using stochastic gradient descent (SGD).
The gradient of the log-likelihood \mathcal{L} with respect to all the parameters can be easily and efficiently computed by backpropagation. All you need to do is to build a backward graph starting from the final log-probability to the input, and compute derivatives of each operator in the forward computational graph. Well, I don’t know about you, but that sounds awfully complicated and time-consuming to me. Instead of doing it manually, we can use Theano’s automatic differentiation procedure by calling theano.tensor.grad(-loglikelihood, parameters). Here is an example, and here is more detailed documentation.
Once Theano has automatically computed the derivative of the log-likelihood with respect to each parameter, we update the parameter to move along that derivative slowly. Often, this slowly moving part is one that frustrates a lot of people, and this is one of the reasons why many people mistake deep learning for black magic. I agree that finding good learning parameters (initial learning rate, learning rate scheduling, momentum coefficient and its scheduling, and so on) can be frustrating.
So, I often simply go for one of the recently proposed adaptive learning rate algorithms. Among many of them, Adadelta [Zeiler, 2012] and Adam [Kingma and Ba, 2015] are my favourites. They can be easily implemented in Theano, and if you’re not too keen on reading the paper and implementing the algorithm, you can refer to the Theano documentation. Also you might want to have a look at these visualizations of the
Figure 10. Behaviour of adaptive learning rate algorithms at a saddle point. From http://imgur.com/a/Hqolp
optimization algorithms (also figure 10), although I must warn you that the behavior in this low dimensional space is not necessarily representative of the behavior in a higher dimensional space.
Why GPUs? The Computational Complexity of NMT Training
Does this mean that I can train a neural machine translation model on a large parallel corpus with my laptop? Unfortunately, no. As you may have guessed, the amount of computation you need for each update is quite large, and the number of SGD updates needed to fully train a model is also large. Let’s first count what kind of computation is required for a single forward pass:
1. Source word embeddings: T \times |V| (T source words, |V| unique words)
2. Source embeddings to the encoder: T \times n_e \times (3 \times n_r) (n_e-dim embedding, n_r recurrent units; two gates and one unit for GRU)
3. h_{t-1} to h_t: T \times n_r \times (3 \times n_r)
4. Context vector to the decoder: T \times n_r \times (3 \times n_r)
5. z_{t-1} to z_t: T \times n_r \times (3 \times n_r)
6. The decoder to the target word embeddings: T' \times n_r \times n_{e'} (T' target words, n_{e'}-dim target embedding)
7. Target embeddings to the output: T' \times n_{e'} \times |V'| (|V'| target words)
8. Softmax normalization of the output: T' \times |V'|
Considering that |V| and |V'| are often on the order of tens or hundreds of thousands and that n_e, n_{e'} and n_r are on the order of hundreds to thousands, the whole computation load is quite substantial. Furthermore, almost the same amount of computation is required for backpropagation, i.e., computing the gradient of the log-likelihood function.
Note that most of these computations are matrix-vector or matrix-matrix multiplications of high-dimensional vectors or matrices, and when it comes to Generalized Matrix-Matrix multiplications (GEMM) of large matrices, it’s well-known that GPUs significantly outperform CPUs (in terms of wall-clock time.) So it’s crucial to have a nice set of the latest GPUs to develop, debug and train neural machine translation models.
For instance, see Table 1 for how much time you can save by using GPUs. The table presents only the time needed for translation, and the gap between CPU and GPU grows much greater when training a model, as the complexity estimates above show.
CPU (Intel i7-4820K) GPU (GTX TITAN Black)
RNNsearch [Bahadanau et al,, 2015] 0.09s 0.02s
Table 1. The average per-word decoding/translation time. From [Jean et al., 2015]
I can assure you that I didn’t write this section to impress NVIDIA; you really do need good GPUs to train any realistic neural machine translation models, at least until scalable and affordable universal quantum computers become available!
The Story So Far
Continuing from the previous post, today I described how a recently proposed neural machine translation system is designed using recurrent neural networks. The neural machine translation system in today’s post is a simple, basic model that was recently shown to be excellent in practice for English-French translation.
Based on this basic neural machine translation model, in my next post I will tell you how we can push neural machine translation much further by introducing an attention mechanism into the model. Furthermore, I will show you how we can use neural machine translation to translate from images and even videos into their descriptions! Stay tuned.
|
global_01_local_1_shard_00001926_processed.jsonl/22500
|
Page MenuHome
Weird bug with Particle Instance Modifier
Open, Needs TriagePublic
System Information
Win 10 x64, nVidia GTX 1080Ti
Blender Version
Broken: All
Worked: (optional)
Short description of error
I have a very weird bug with the Particle Instance Modifier. In the OpenGL viewport, rendered view and when rendering in the GUI (F12) everything renders fine, but when rendering via command line or on the farm (with cgru, i.e. a farm software rendering with the command line), the instances are located at the wrong place.
I use a very simple hair emitter to instance meshes along the strands using the "Create along Paths" option. It works very nicely and interactively in the viewport but fails in a very weird way as soon as I send my scene on the farm. I attached a simplified version of the scene and hope it can be fixed.
Exact steps for others to reproduce the error
• Load this blend file:
• Press F12 to render. It looks like this:
• Now call the same render via command line. It should work like this, you will have to change the paths:
blender -b "E:\Instance_Bug_v01.blend" -o "E:\Instance_Bug.#" -s 1 -e 1 -a"
• This is the result:
• All the instances now start from the origin of the scene (at least in this example). And they also have weird velocity vectors.
P.S.: Here are the motion vectors when rendering with the command line. There is no animation or deformation on these instances whatsoever, when rendering in the GUI the motion vector pass is totally neutral / empty:
|
global_01_local_1_shard_00001926_processed.jsonl/22501
|
Dear All!
I'm new to Gracenote and I have a few general question on Gracenote's Accelerator (Beta) plan and its conditions.
On my website (commercial), where I sell digital sheet music, I'd like to enrich my existing content with additional music metadata, such as artist and/or composer biographies, genres, song and album descriptions, recommondations, music search, era, artist type, other song and albums of the artist/composer and cover art, images and fan art.
In addition to that, I'm looking for descreptive data and cover art, images and fan art for videos (movies and TV-Shows), sports events and stage entertainment (such as musicals and operas).
As far as I understood, Gracenotes Accelerator Plan is seemt to be suitabe for above issues. But do not fully understand the conditions of the plan.
Predetermined user and query limits:
• How is this defined?
• Who does count as a "user"?
Low monthly fee per active user:
• How low is it?
• How is an "active user" defined? Is it already a visitor of a Website, a logged in user or user that are actually purchasing something (plan or single item)?
Qualification terms apply:
• What are those qualification terms? I haven't been able to find them.
Is there any example available, where I can see the whole range of music & video metadata, cover art, images and fan art, genres, etc.?
Thanks for your support,
Forum Discussions
|
global_01_local_1_shard_00001926_processed.jsonl/22512
|
Getting rid of variant constructors
Disclaimer: This is a copy of a StackOverflow question I posted yesterday. I’m posting it here too for extended discussion.
As a side project, I try to implement the basics of an RDF library in OCaml.
As you may (or may not) know, a RDF statement (or triple) is composed of 3 parts:
• The subject can be an IRI or a blank node;
• The predicate must be an IRI;
• The object can be an IRI, a blank node or a literal.
I have module and types for IRIs, blank nodes and literals, and in order to type-proof the rules described above, here is what I’ve started to write:
(* In `` *)
type subject = Iri of Iri.t | Bnode of Bnode.t
type objekt = Iri of Iri.t | Bnode of Bnode.t | Literal of Literal.t
type t = subject * Iri.t * objekt
let create s p o = s, p, o
So this is nice and everything, but one thing grinds my gears: whenever I want to use Triple.create, I must explicitly state the constructor of the variant:
let iri = (* Some Iri.t value *) in
let literal = (* Literal.t value *) in
Triple.create (Iri iri) (Iri iri) (Literal literal)
I’m pretty sure OCaml has ways to work around that, but I’m not sure how.
Some thoughts: I could parameterize the Triple.t type with the type of its subject and the type of its object, but then how do I enforce the restrictions on the parameter types? Or maybe it is a good use case for a GADT?
Someone in the comments also suggested using OOP for this particular case, but I don’t know how I feel about this. These types don’t have much in common other than the fact that they can be used interchangeably in a RDF triple.
You can’t do such a thing directly without the constructors, no. With subtyping you could use ``reuse’’ the constructors, but that’s all you could achieve, and you would still need a value constructors for proper subtypes (i.e. object constructors or polymorphic variants).
For example
val create : [`Iri of Iri.t | `Bnode of Bnode.t] -> [`Iri of Iri.t] -> [`Iri of Iri.t | `Bnode of Bnode.t | `Literal of Literal.t] -> ...
Hmm, I see.
As a library user, would you mind having to specify a constructor in cases like this? Can you think of similar examples in the wild?
Why do you want to get rid of constructors? There are plenty of options here, including GADT, phantom types, etc. Can you explain what you’re trying to achieve, like ideally?
I feel like constructors add an unneeded overhead to the final syntax. Maybe this is because of my Ruby background, where typing is so loose.
Ideally, something along these lines would be awesome:
let bnone = (* Some Bnode.t value *) in
let iri = (* Some Iri.t value *) in
let literal = (* Some Literal.t value *) in
let some_triple = Triple.create iri iri literal
let other_triple = Triple.create bnode iri literal
let another_triple = Triple.create iri iri bnode
(* These invalid examples would get caught by type-checking *)
let invalid_triple = Triple.create literal iri iri (* Literal.t cannot be a subject *)
let another_one = Triple.create iri bnode iri (* Bnode.t cannot be a predicate *)
let yet_another_one = Triple.create bnode literal literal (* Literal.t cannot be a predicate *)
So again, we have many options here, depending on how you will design or redesign your RDF representation. If we will start with your particular representation, we can see that you have an rdf construction function with a bounded polymorphism, i.e., there are certain combinations of types that are accepted, and certain that are not. We can easily express this using a GADT:
type (_,_) valid =
| II : (Iri.t , Iri.t) valid
| NN : (Bnode.t , Bnode.t) valid
| IN : (Iri.t , Bnode.t) valid
| NI : (Bnode.t , Iri.t) valid
| IL : (Iri.t , Literal.t) valid
| NL : (Bnode.t , Literal.t) valid
We basically enumerated all possible combinations of the input parameters, which are acceptable. Since we currently don’t have a notion to speak about RDF elements in general (i.e., we don’t have an abstraction for an rdf element) we have to range our constructor over the set of all type constructors (i.e., there is nothing that tells us that Iri.t has any relation with Bnode.t for example).
Now, we can use a GADT to represent RDF which will be constrained by the type that is a member of our set of acceptable pairs of types :
type ('a,'b) rdf = Rdf : ('a,'b) valid * 'a * 'b -> ('a,'b) rdf
So now the create function is very simple:
let create c x y = Rdf (c,x,y)
Without any wrapping to the arguments and with the type ('a, 'b) r -> 'a -> 'b -> ('a, 'b) rdf, that basically says, that if there exists a and b s.t. (a,b) valid then there exists('a,'b) rdf. And we also provide 6 axioms, that state that the following set of pairs (out of the infinte set of all possible pairs of all tyes) form a valid representations of RDF:
(Iari.t , Iri.t),
(Bnode.t , Bnode.t),
(Iri.t , Bnode.t),
(Bnode.t , Iri.t),
(Iri.t , Literal.t),
(Bnode.t , Literal.t)
This solution basically reifies ad-hoc polymorphism into a GADT constraint. So now, we have to implement overloading for each possible variant of our multimethod, e.g.,
let show : type s o. (s,o) rdf -> string = function
| Rdf (II,x,y) -> x ^ y
| Rdf (NN,x,y) -> x ^ y
| Rdf (IN,x,y) -> x ^ y
| Rdf (NI,x,y) -> x ^ y
| Rdf (IL,x,y) -> x ^ y
| Rdf (NL,x,y) -> x ^ y
The only difference with the conventional overloading is that a user has to provide a witness that shows that the overload is valid (or that the constructed polymorphic type is member of the set of types which we are ready to accept).
If we will revisit our design, we will find one thing that strikes immediately: why do we have to enumerate over all possible types, like (int,float) or (string, int list) while we actually are concerned only about three players: iri, literal, and node? So it looks like that we need an extra abstraction that will say that a type is an element of RDF. Moreover, we can actually claim that we have only three sorts (i.e., three non-intersecting sets) of elements: node, literal, and iri. This knowledge should also be captured in our model. Without further ado, here is how we can express our model in OCaml:
module type Rdf = sig
type t
type 'a elt
val create : [< `iri | `node] elt -> [< `iri | `node | `literal] elt -> t
module type S = sig
type sort
val create : string -> sort elt
val show : sort elt -> string
module Iri : S with type sort = [`iri]
module Bnode : S with type sort = [`node]
module Literal : S with type sort = [`literal]
Now let’s provide some stub implementation:
module Rdf : Rdf = struct
(* trust zone begins *)
type 'a elt = string
type t = string * string
module type S = sig
type sort
val create : string -> sort elt
val show : sort elt -> string
module Stub(T : sig type t end) = struct
type sort = T.t
let create x = x
let show x = x
module Iri = Stub(struct type t = [`iri] end)
module Bnode = Stub(struct type t = [`node] end)
module Literal = Stub(struct type t = [`literal] end)
let create x y = x,y
And now we can check how it works, provided an iri and literal
let hello = Rdf.Iri.create "hello"
let world = Rdf.Literal.create "world"
A user can use them in a correct order, e.g.,
let good = Rdf.create hello world
typechecks, while
let bad = Rdf.create world hello
complains with
This expression has type Rdf.Literal.sort Rdf.elt
but an expression was expected of type
([< `iri | `node ] as 'a) Rdf.elt
Type Rdf.Literal.sort = [ `literal ] is not compatible with type
[< `iri | `node ] as 'a
These two variant types have no intersection
Alright, this introduces a fair load of new things for me, but I think I’m okay with that. Thanks a lot for the write-up!
I’ll try implementing that as soon as I have a moment, and I’ll let you know how it goes. :slight_smile:
I think I’m missing something important here: how do I connect this with my acutal implementation of Iri.t, Literal.t and Bnode.t?
For instance, you wrote
module Rdf : Rdf = struct
type 'a elt = string
(* ... *)
But I can’t provide a real implementation of a triple term since it’s basically a sum type of IRIs, blank nodes and literals.
The more I look at this, the more confused I get.
By the way, you can take a look at the code here
Sorry, I didn’t notice your reply.
If it is a sum, then you have to implement some kind of a sum type, and since RDF is a product, then you need to use some kind of a product type in the implementation. Depending on your style or need you may employ different techniques for implementing sums and products of types, the most common would be to use Algebraic Data Types, possibly generalized (later on this), but you shall keep in mind that it is not the only way. You may also opt into abstract data types. For example, when you have a sum of two concepts, (lets pick int and float as an example) then you can represent their sum using the sum type:
type number = Int of int | Float of float
let add x y = match x,y with
| Int x, Int y -> Int (x+y)
| Float x, Float y -> Float (x +. y)
| Float x, Int y -> Float (x +. float y)
| Int x, Float y -> Float (float x +. y)
you may also use GADT to expose extra constraints, e.g., suppose we would like the add operation to be monomorphic, i.e., we would like to prevent from adding floats to ints and vice verse. You can’t express this with normal ADT, but GADT allows for it
type _ number = Int : int -> [`Z] number | Float : float -> [`R] number
let add : type s. s number -> s number -> s number =
fun x y -> match x,y with
Notice, that not only the typechecker won’t allow you to add a float to int, but it will also accept the pattern as exhaustive (and even more will disallow you to write any other cases, as they do not fit the constraint).
However, ADT is not the only solution, you may also use Abstract Data Types (unfortunately abbreviated also to ADT), again OCaml provides many techniques for implementing them starting from straightforward records:
type 'a number = {
v : 'a;
add : 'a -> 'a -> 'a
let float v = {v; add = (+.)}
let int v = {v; add = (+)}
let add {v=x; add} {v=y} = {v=add x y; add}
going to much more heavyweight first class modules (notice type annotations):
module type Number = sig
type t
val v : t
val add : t -> t -> t
type 'a number = (module Number with type t = 'a)
let add : type t. t number -> t number -> t number =
fun (module X : Number with type t = t)
(module Y : Number with type t = t) ->
(module struct
include X
let v = X.add X.v X.v
and finally going to object and classes:
class type ['a] number = object
method value : 'a
method add : 'a number -> 'a number -> 'a number
class r x : [float] number = object
method value = x
method add x y = new r (x#value +. y#value)
class z x : [int] number = object
method value = x
method add x y = new z (x#value + y#value)
Now, after this showcase, let’s get back to your example. But keep in mind, that I’m not trying to show you the way, but instead, I’m showing you different ways, so that you can build your own intution and pick the right way. In other words, I’m trying to tell you how to implement instead of what to implement. Anyway, back on track :slight_smile:
So you have a nice interface that is easy to use correctly and impossible to use incorrectly. Now the easy part - you need to implement it. When we choose between algebraic representation and abstract representation we have to consider our design constraints and fit them into the expression problem (described better here). If we will more likely add more operations then we have to stick with algebraic data types, if we more likely will add more entities, but the behavior is fixed, then we need to use abstract data types. If we are going to add both, we need to use the Tagless-final approach.
Fortunately, our case is simple, since we have a fixed set of objects, that we’re not going to extend, namely iri, node, and literal. Hence, we will stick to algebraic data types.
The next question is whether we should use plain ADT for our elt ty[e, and keep the type parameter phantom, or use constrained GADT. The first option is usually easy to implement, but you can’t rely on the type inference to check that your code is correct. Basically, the type system will admit whatever you will tell it about your phantom types. And since constraints are erased from ADT the exhaustiveness check will be overly pessimistic so you will be forced to spill quite a few assert falses around your code. It doesn’t sound like a lot of fun, but sometimes, this is the only way to implement the signature (GADT power is still limited), so let’s look a this implementation:
type _ elt = (* type parameter is not used on rhs - thus it is a phantom *)
| I of iri
| N of node
| L of literal
(* we don't want the constraint to escape to the rdf type, so we may use
GADT here to implement an existential. We can use first class modules,
objects, records with universal quantifiers, but GADT is the least
verbose here *)
type t = Rdf : _ elt * _ elt -> t
(* create is easy, but it loses the constraint that we've specified in
the signature *)
let create x y = Rdf (x,y)
(* hence the typechecker expects unexpectable *)
let show (Rdf (x,y)) = match x,y with
| I x, I y -> x ^ y
| N x, N y -> x ^ y
| I x, N y -> x ^ y
| N x, I y -> x ^ y
| I x, L y -> x ^ y
| N x, L y -> x ^ y
(* nothing else is posible, but the typechecker doesn't know this *)
| _ -> assert false
Fortunately, we can use GADT to keep our constraints,
type 'a elt = (* the constraint is propagated to the branches *)
| I : iri -> [`iri] elt
| N : node -> [`node] elt
| L : literal -> [`literal] elt
(* and kept alive in our existential *)
type t = Rdf : [< `iri | `node] elt * [<`iri | `node | `literal] elt -> t
(* create is still the same easy *)
let create x y = Rdf (x,y)
(* but show is now exhaustive *)
| I x, I y -> x ^ y
| N x, N y -> x ^ y
| I x, N y -> x ^ y
| N x, I y -> x ^ y
| I x, L y -> x ^ y
| N x, L y -> x ^ y
(* and we can't even add an impossible combination here *)
To summarize, OCaml is a very versatile language and provides many different techniques which you can employ to model your problem as tight as possible. Mastering all the techniques takes time, an investment that will be returned once you will start to apply them in the real world scenarios. A properly chosen abstraction will save you a lot of time in the software lifecycle.
|
global_01_local_1_shard_00001926_processed.jsonl/22513
|
Getting signature of caml program
I have a project using OCaml that successfully compiles by using the dune
However, I want to know the signature of some file. The “ocamlc -i” works for let’s say small files. However, if the file has some dependency as is the case in this project then the answer to the question “Ocamlc -i error:Unbound module, how to fix it?” mentions the cmi files as needed to be compiled.
That is fine as things go but how could is use dune (which has access to all the cmi files) in order to get this signature file? The dune documentation does to even has “signature” in its 80 page pdf files.
Just hazarding a guess, your ocamlc line might work better if you wrap it in the right ocamlfind invocation.
The way I understand it, @Mathieu_DS would like to ask Dune to compute an interface file from an ML file. Invoking ocamlc trough ocamlfind manually would leave it with the user to provide the packages that the ML file depends on whereas Dune would compute these and compile dependencies when necessary.
We’re aware that this is a current limitation in dune. The issue is that adding such a rule for every ocaml module has performance implications for those who aren’t using this feature.
Luckily, dune’s internals are undergoing some major changes which will eventually make it possible for such a feature without backwards compatibility issues. There’s no eta yet, but stay tuned. In the meantime, there’s a workaround using Merlin that’s well known.
If my ml file compiles and I want to add an mli, my DIY solution so far has been the following:
1. opam install cmitomli
2. locate the cmi file for, using for example find <PROJECT ROOT> -name '*Foo.cmi'
3. run cmitomli to produce a valid Foo.mli
4. edit the mli as desired
Note that is just this:
let version = "1.0.0"
let cmi_to_mli infile =
let x = Cmi_format.read_cmi infile in
let l = x.Cmi_format.cmi_sign in
Printtyp.signature Format.std_formatter l;
Format.print_flush ();
print_newline ();
flush stdout
let usage () =
Printf.eprintf "\
cmitomli %s for ocaml %s
Usage: cmitomli <file.cmi>\n%!"
version Sys.ocaml_version
let main () =
match Sys.argv with
[| _; ("-help" | "--help" | "-h") |] -> usage (); exit 0
| [| _; x |] -> cmi_to_mli x
| _ -> usage (); exit 1
let () = main ()
|
global_01_local_1_shard_00001926_processed.jsonl/22518
|
Stipends may be Income
Expense reimbursements paid by employers may be considered income for child support or spousal support calculations in a divorce proceeding. The standard to be evaluated is whether the reimbursed expenses are SIGNIFICANT and REDUCE personal living expenses. Examples include monies paid to compensate for cost of living in a foreign country because such monies serve as compensation, which is to fund the parties lifestyle and financial obligations. Also included is the value of free military housing which a previous court held to equate to a 20% increase in the parties gross income. However, a monthly stipend of $52 per month used to defray a parties health insurance expense was included in gross income as it did not meet the standard of being both significant and reducing personal living expenses. If you have any questions about your particular situation, please contact a divorce mediator at Divorce Help Center to discuss your particular situation.
|
global_01_local_1_shard_00001926_processed.jsonl/22520
|
User password recovery
Furnace framework > Furnace authentication > Optional authentication features
Prev:User profile editing
Next:User registration
The furnace.auth.features.recover-password vocabulary implements an authentication feature for user password recovery, allowing users to get a new password e-mailed to them in the event they forget their current one.
To enable this feature, first call the following word on an authentication realm,
allow-password-recovery ( realm -- realm )
Then set a global configuration variable:
In addition, the SMTP client library may need to be configured as well.
To check if password recovery is enabled:
allow-password-recovery? ( -- ? )
This feature adds a recover-password action to the realm, and a link to this action can be inserted in Chloe templates using the following XML snippet:
<t:if t:code="furnace.auth.features.recover-password:allow-password-recovery?"> <t:button t:action="$realm/recover-password">Recover password</t:button> </t:if>
|
global_01_local_1_shard_00001926_processed.jsonl/22528
|
2,500+ designers match your search
that match your criteria Clear search Sort: Trending Followers
1. Chaotic™ (Otto Greenslade) Chaotic™ (Otto Gree... We’re hiring
London, Great Britain
I lead Chaotic™, a Multi-Disciplinary Design Studio & CDO at Xamariners. Led design at Find us – Chao...
1. Previous Shot
2. Next Shot
2. Rosie | MetraBit Rosie | MetraBit We’re hiring
Leuven, Belgium
Hi there, my name is Rosie, I'm from Leuven, Belgium. I enjoy creating Mobile & Web UI/UX Design and Illustrations. G...
1. Previous Shot
2. Next Shot
3. Ghostly Ferns Ghostly Ferns We’re hiring
Brooklyn, NY
Ghostly Ferns is a collaborative design studio working for happy companies!
1. Previous Shot
2. Next Shot
Finding designers…
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.