id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_1_shard_00001926_processed.jsonl/27655
|
4 Responses
1. I wouldn’t trust anything that WaPo published; they’re almost as anti-American as the NY Times.
Of course they ascribe purely political and partisan motive to the GOP members in the House and Senate. They (WaPo) would never say that these people just didn’t support a piece of legislation that went against every principle that they hold.
Remember, if they believed in the appropriateness of this sort of spending, they’d be Democrats.
2. Funny thing, I get the exact same thing from people on the far left, “Oh, the Washington Post is an evil neo-con dungeon!” OH TEH HUMANITIES!! I happen to think that no bias is fixed, and that it’s not very “American” to say that something or someone is anti-American. But thanks for stopping by anyway.
3. I haven’t heard such claims from the Left – except for some devotees of the NY Times, which is even worse.
4. Really, it’s more along the line of extremists at both ends of the spectrum moaning and groaning about how the media never favors them.
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/27673
|
Hazardous Mataterial - Response Priorities and Actions No. 1
Progress Indicator:
Question 1 of 22
1. What should be done first when evacuating people during a hazardous materials incident? p. 964
1. Neutralize the hazardous material threat
2. Identify which materials may be present
3. Evacuate the surrounding area
4. Send in personnel for primary search
See more about these products
|
global_01_local_1_shard_00001926_processed.jsonl/27701
|
Category Archives: Corporate Onboarding basics
Outlook block pictures howto / Change images in E-mail messages to not show automatically
If you’re working in a corporation such as IBM or Hewlett Packard Enterprise and you’re forced to use MS Outlook Express, because of the Calendar / Lync integration, you probably will get a lot of useless Corporate Junk informative emails (Corporate SPAM). This is very annoying but the ugly thing is, you have to check that emails and you can’t simply send them in Spam folder, at least partially. The major irritation from these SPAM like corporate emails steams in the annoying pictures, which are supposed to give you e-mail interactivity sense but instead or showing a lot of laughing joyful (bur obviously brainless) looking people.
These is too much annoying at a point, so in order to decrease the mind overheat from that, I’ve decided that it will be nice to not show up the pictures in Outlook emails.
Initially I thought there might be necessery to install an extra plugin, but after a quick search in Google Search Engine, luckily it turned out Outlook is equipped with such functionality by default:
Block picture downloads for all messages in Outlook Express
1. Click the File tab.
2. Click Options.
3. Click Trust Center.
4. Under Microsoft Outlook Trust Center, click Trust Center Settings.
|
global_01_local_1_shard_00001926_processed.jsonl/27709
|
Archive for January, 2016
Syria, IS, and conflict minerals…
As far as I can see, the self-declared “Islamic State” Caliphate is formed of two major components:-
• A whole load of weaponed-up fundamentalists (many of whom are just kids); but who are obviously being funded by…
• Some seriously well-connected chancers who are siphoning off extraordinary amounts of oil from Syrian oilfields and selling them to third-party chancers with passing oil tankers.
Really? Yes.
Why does the world not treat Syrian oil as a conflict mineral, and find a way of putting some tracer element into the source oil that can be easily detected downstream, but would survive the oil refining process?
Never mind having “a tiger in your tank”, lots of people around the world now have a Caliphate in their tank.
Do you think it’s nice having diesel under a pound a litre? No, not if it’s conflict diesel, it certainly isn’t.
All the while people focus on tackling the fundamentalists, they’re missing the whole funding issue.
In short, “Islamic State” is nothing more complex than a high-growth startup with a novel funding model. But we need to make their access to funding more difficult.
|
global_01_local_1_shard_00001926_processed.jsonl/27714
|
Get Natural Dog Training on Kindle
Introducing the Natural Heeler™
“How Dogs Work” Part Two
Whenever Coppinger inquires into the nature of the dog, conventional thinking and cherished romantic notions are quick to fall by the wayside. In “Work” Coppinger has pushed the limits of the current paradigm to its breaking point, which is why it is a seminal book. Yet at the same time, the power of his argument ends up begging a far more fundamental question. I’m writing the following post to ask and answer this deeper question and in the process this will draw distinctions between my argument and Coppinger’s. Nevertheless I don’t want to present a critical tone. “Work” is a ground breaking book and interestingly there doesn’t seem to be much discussion of it in dogdom. I wonder why. Given the strictures of the current paradigm I appreciate Coppinger’s step-by-step progression and I also find his candor particularly refreshing. “Work” allows us to integrate thermodynamics and the laws of motion with the domain of behavior and cognition.
In his earlier book “Dogs” Coppinger makes a compelling case for the domestication of the dog resulting from the invention of villages and the inevitable village dump. In the dump scenario, when disturbed by the advance of a human, the most approachable of any given set of wolves would prove to be the last to leave and the first to return. In this way the suite of neurochemicals associated with the trait of approachability were inadvertently being selected for since these more approachable wolves would end up getting more to eat. Eventually, and a Russian fox breeding experiment reveals that it wouldn’t take much time, the “village dog” emerges. However, since selecting for the trait of approachability so readily produced a proto-fox-dog in the Russian breeding experiment, where then are the fox-dogs? The village dump has now been around for millennia and so Coppinger’s argument begs the question: why did only the wolf produce a domesticated version as opposed to coyotes, not to mention bears, raccoons and o’possums? There must therefore be something unique about wolves, apart from the trait of approachability, or which possibly underwrites the trait of approachability, and which made the wolf amenable to the village dump process of selection. This furthermore means that a legacy of scavenging and a state of dependency on humans can’t be what makes a dog a dog.
Likewise in “How Dogs Work” Coppinger makes a compelling case for the overwhelming influence of shape. Coppinger’s thesis is that the shape of the parts that make an organism determine the shape of the organism, determine the shape of its movements and ultimately, the shape of the mind that directs its movements. Genes don’t encode for the mind that makes the movements, rather, the mind is shaped by the shape of the “machinery” because it forms in accommodation to the range of movements available to it as it interacts with the world. Intrinsic rules of one part, adjust and adapt in order to accommodate the intrinsic rules of other parts, even the vast complex matrix of neuronal interconnections in the brain that are built up through experience develop in accommodation with these experiences. And from these interactions a new form of information as to how to interact with the external world emerges and produces new behavioral shapes. Therefore, certain behaviors that Dogdom has traditionally seen as the essence of intelligence, such as cooperative hunting, or as the quintessence of the dog, playfulness, barking, humping, giving paw, are according to Coppinger emergent shapes that are not genetically directed, have not been winnowed into shape by natural selection, but rather, emerge in a manner that makes them unrelated to the substrate from which they have arisen. These behaviors have no discrete explanation according to classic biological processes.
As in “Dogs,” the thesis of “Work” begs a more fundamental question: What is the shape of a movement, even of an emergent behavior such as a play bow, humping or giving paw? All movements have a shape, emergent behaviors as well, so is there one form to which all these other shapes are consonant with and so therefore due to a common shape, even emergent behaviors are related to the simpler substrate patterns from which they are purported to have emerged unscathed. Is there a “master shape” that all movements and therefore all minds have in common? And if there is a master shape—-is what makes a dog quintessentially a dog—-a function of this master shape? And hence, paradoxically, the capacity to effect the master shape under a variety of circumstances is in fact what makes a dog a dog, singular in the animal kingdom and yet paradoxically, is a uniqueness that is due to a general principle universal to all animals. This master shape and its functionality would therefore be revealed by the peculiarities for what dogs are especially known: playfulness, barking, howling, herding, humping, circling to lie down, make a bed, eliminate or search a grid, and most importantly; a readiness to perform specific tasks in conjunction with humans. In other words, is this master shape how-dogs-work?
Consider the phenomenon of play. In ethology play presents a problem.
“The fundamental problem for ethologists studying play behavior is, as we’ve said, that it doesn’t appear to have an obvious function. If that is right, it poses a profound challenge to the fundamental ethological premise that behaviors are products of natural selection. Remember that the logic of the Darwinian story of evolution is that selection favors individuals who move and act in a particular way because the functional effect of the behavior is to confer a selective advantage: it enables the animal to live long enough to produce successful offspring. We expect to be able to observe (or infer) and measure some immediate benefit: a foraging activity leads to the acquiring of calories that provide energy to drive the machine; a hazard-avoidance motor pattern reduces an imminent threat or risk to life; a reproductive act culminates in the successful fertilization of an egg. When you look at playing dogs, you do often see behaviors that resemble (parts of) the adaptive motor patterns that are associated with these functional activities. Chasing and biting, for instance, are commonly seen. But in play the functional goal of the motor pattern isn’t attained: a dog that chews up a slipper gains no caloric benefit from doing it. So what is the benefit of play? Why would any young animal expend a considerable— sometimes an extraordinary— amount of energy in playing if there is no adaptive payback in life? Could play behaviors have arisen for reasons other than as adaptive products of natural selection?”
Coppinger then goes on to show how the conventional interpretations of the beneficial aspects of play such as bonding, mental enhancement, reproductive advantage, don’t hold up to scrutiny. Coppinger concludes from a study of the play bow:
“In short, the “playing” animal is in conflict about its next move— and the play bow in fact looks just like a combination of multiple conflicting behavioral shapes. The lowered front end of a play bow is essentially identical to the posture of a canid moving toward prey in EYE > STALK; the raised hind quarters and rear legs are readied for quick flight. Like barking, we think that the shape of the play bow is a result of the animal being in two motivational states at once: it is moving toward a prey object but unable to transition into the normal next step of the predatory sequence. So we don’t believe that a play bow sequence is a special adaptive (let alone intentional) signal at all. We submit that it is an emergent effect of a dog (or wolf) simultaneously displaying two motor-pattern components when it is in multiple and conflicting states. The informational uncertainty of this emergent combinatory event could well attract the attention of a receiver and increase the chances that it would engage in some way with the sender. When it is directed to conspecifics this could facilitate a social interaction that looks like play. If this is the right way to think about the so-called play bow, however, it shouldn’t be interpreted as an adaptive signal generated by natural selection to initiate play. Nor should it encourage us to conclude that play as a whole is also adaptive.”
So, what then is the shape of two dogs playing, or in fact, of any given movement? Better asked—-What is the shape of moving well? Let us return to thermodynamics. Thermodynamics is the movement of heat, force, mass and energy. Until the Constructal law (as detailed by its discoverer Adrian Bejan in “Design In Nature”) the movement of heat, force, mass and energy was merely discussed in terms of quantitative analysis given the fact that energy always moves from a pole of high concentration to one of lesser concentration, it moves from that which can project heat, force, energy, to that which can absorb heat, force, energy. One pole has energy to give, one pole has energy to receive. Before Bejan no one cared how it got there, just how much arrived and what work might be done along the way. But as Bejan puts it, that’s like saying someone travelled from Paris to Milan without specifying how they travelled, by plane, car, train, bike? Since Bejan was designing circuit boards with conductive grids to move heat away from the machine as efficiently as possible, he had to care quite a bit about the precise path heat had to travel and in so doing he discovered a fundamental principle when he realized that he solved the problem the same way nature always does, via the Constructal law. This law reveals the precise structure of the most efficient movement—-a branching, vascularizing architecture that connects a point to an area and an area to a point so as to move more force, mass and energy farther and faster with less and less effort. This minimizes loss to the various resistances that impede movement. This is a universal “design” for all configurations whether they be animate or inanimate, whether there are naturally occurring or man made because this is the only configuration which can persist given the realities of thermodynamics and nature’s law of construction.
Furthermore, Bejan discovered that an animal’s organs in their size and internal placement evolved to their particular specification in deference to its “Locomotive Rhythm,” the particular style of flying, running or swimming that moved the most amount of mass, further and faster with the least expenditure of energy. The shape of this movement determines the size, functionality and internal configuration of the body’s organs. So Coppinger’s thesis of shape being all encompassing is consistent with the Constructal law and this linkage is a huge advancement in the discussion on dogs given that we now have two front line scientists from different disciplines advocating for thermodynamics as the most important filter for the evolution of behavior.
My theory is that the locomotive rhythm is in fact the master wave because it is how an animal moves well and moving well towards something one wants, or away from something one fears, is the best an animal can do in any given set of circumstances. It’s therefore the basis of an animal’s sense of well-being since its mind evolves as a function of the shape of its movements. These shapes formulate its construct of reality and a sense-of-self, i.e. how various movements affect its integrity. The mind is shaped by the locomotive rhythm, a wave, the most powerful wave an organism can generate.
The only way an organism can move, especially mammals given that their body plan is bilaterally symmetrical, is to make a wave. A horse running, a bird flying, even a protozoa flagellating, are all wave making. Minor movements are subsets of this major movement since the functionality of any movement is to return an organism to a state of well-being and homeostasis. (Interestingly, bilateral symmetry evolved either simultaneously, or perhaps even before the evolution of a centralized nervous system. There can’t be one without the other. So the evolution of the nervous system was shaped by the mandate of the body having to generate a wave action in order to propel the organism in accordance with the Constructal Law.) And as the mammalian mind evolved over the millennia in response to how the body moves, and since the optimal shape is a wave form, specifically the Locomotive Rhythm, then the mind itself is a function of a wave, and objects come to mind as a function of a wave.
The locomotive rhythm is a wave composed of two phases. The projection phase is when force is projected through all four legs being extended outwards. The collection phase is when all four legs are retracted so as to gather force back into the body in preparation for the next stride. At the peak of these two phases is a beat of physical suspension when all four feet are off the ground. In order to execute a perfect locomotive rhythm and attain and sustain a state of physical suspension (how an individual recognizes a perfect locomotive rhythm) both the projection and collection phase have to be perfectly symmetrical. Collection must precisely match projection as otherwise ground is neither covered efficiently or the body in motion becomes physically unstable. Uneven ground or obstacles require varying these phases in order to find the best possible rhythm that most closely approximates the optimal gait. It may be that the individual has to stagger step or extend a stride by momentarily decoupling projection from collection in order to successfully navigate the ground that needs to be covered. Decoupling one phase from the other in order to negotiate a situation is the essence of locomotive adaptability, which by logical extension is therefore the essence of behavioral plasticity since the shape of the body and the shapes of its movements shape the development of the mind. The wave form varies in order to accommodate obstacles in the surroundings and so the mind must likewise fabricate a wave form in order to accommodate stimuli in the surroundings.
So if one takes the most important points of Coppinger’s book which focuses on how complex behavior emerges from simple rule based actions, with the shape of movement being all encompassing over every aspect of mind and manner, and merges this with the Constructal Law which precisely details the wave form and how the mind, body and evolutionary processes are in service to this wave, and finally the NDT principle of emotional conductivity (Emotion as a function of attraction …. then becoming Unresolved Emotion due to the influence of resistance ….. and then becoming Resolved Emotion through collectivized behavior, E—>UE—>RE) ….. we can thereby follow the thermodynamic principle of “Work” to its logical extension and understand the true basis of play, sexuality, personality, hunting, collectivized group activity, all of which are a function of the master shape to which all body forms are encoded to fulfill because in service to achieving this rhythm they will end up constantly improving the flow of heat, force, mass and energy. Understanding that physical shapes determine physical movements and therefore mental processes, we can use the principles of thermodynamics to probe Input (perception)—-Throughput (processing)—-and Output (performance) on the most fundamental level of its very architecture.
In thermodynamics energy moves from a pole or place of high concentration, to a pole or place of lesser concentration, in short, from warm to cool. Behaviorally, there is one simple rule that renders two prime emotional values. Emotion moves from a pole of high concentration (-) — a predatory aspect —-> to a pole of lesser concentration ——> (+) —a preyful aspect.
A stimulus that cannot be accelerated and/or projects force (-), thus interrupts the flow of emotion and we can categorize such objects as “predator energy”. Predatory aspects have momentum “to give.” Thus if a rock rolls down a hill toward an animal, it perceives the rock as if it is a predator advancing toward him. The animal need not entertain the concept of danger, or the cognitive idea from Plato’s cave of a predator, just how much momentum his body and mind can absorb without collapsing an emotional state of attraction.
In contrast that which can be accelerated, is “prey energy.” Preyful aspects have momentum to absorb. If a predator stares at a rabbit, and the rabbit runs, it has been emotionally accelerated and can absorb the predator’s momentum. So if an individual avoids that which cannot be accelerated, and consumes that which can, then one has a simple program for not running into trees, avoiding predators, staying out to the path of rolling boulders and eating anything that can be accelerated and tastes good. And since achieving the locomotive rhythm is each and every organisms’ auto-tuning feedback metric for adjudging its surroundings, this additionally means that moving in sync and in alignment with emotionally relevant objects that can be accelerated but can’t be eaten is even more satisfying (according to the Constructal law, incorporating objects of resistance into the configuration is the source of evolutionary progress) than consuming said object. In other words: Input—>Throughput—>Output can be summed up with a simple rule: If you can’t eat ‘em, join ‘em.
This also means that objects are assayed in terms of their capacity to match one’s inborn locomotive rhythm. Objects would arise in the mind, the mental process of objectification, as a function of their resistance to the locomotive rhythm. So each object would fundamentally be a statement of its conductivity, i.e. how easy it is to sync up with it. For example, a goose would be inherently drawn to another goose because their body shape, the object as a function of resistance to its sense of flow, proves conducive to aligning and synchronizing with it since the shape (and hence the movements this shape can generate) is a statement of its own locomotive rhythm. This means that in addition to an early imprinting process, a compulsion to mirror the movements of its fellow geese will emerge later in life. Hence birds of a feather are drawn together and have an intrinsic basis for self-organization and in a matter that is evolutionarily rewarded since more mass is going to be moved farther and faster as opposed to singular action. While this may be emergent, it is still a function of the simple underlying principle of emotional conductivity of force moving toward that which can absorb it. The complex behaviors are directly related to the substrate and are evolutionarily adaptive even though they serve no discrete adaptive purpose in the short term, for example, tens of thousands of starlings expending vast amounts of energy in a murmuration for no obvious return. Nevertheless their behavior is adaptive because it reveals that their minds are organized in accordance with the thermodynamic mandate to move more mass faster and farther with less and less energy. The herd, the pack, the flock, the swarm, physically manifest the Constructal law as a branching configuration that saturates and vascularizes its surroundings. In this vein we can recall the National Geographic documentary which detailed how reintroduction of wolves changed the course of a river in just six years.
Below this network level of adaptability, how else is wave making adaptive? First, as per the Constructal Law a wave-like manner of movement optimizes the reduction of resistances so that movement is efficient, the individual can move their body farther and faster and with less expenditure of energy. Furthermore, since moving as fast as possible toward something one wants or as fast as possible away from something one fears—-is the optimal response for life’s most graphic moments, this means that as mentioned earlier, a wave function is a the foundation for an organismal, homeostatic sense of well-being. It becomes an auto-tuning feedback dynamic for assigning emotional values to things and making sense of the world without a high-level cognitive construct of data.
Secondly wave making is predictive, it is a modeling program. Since waves are periodic, and since a wave function imprint is the basis of the mind’s architecture, therefore where an individual finds themselves on a wave (peak or trough, ascending or descending) can serve to adjudge where another stimulus happens to be on a wave since every object comes to mind in terms of a wave. Thus the mind has an inborn capacity to predict where forms in motion are going to be. (In a thermodynamic interpretation of behavior, information is form-in-motion, hence to understand the nature of information I prefer the term: “Informotion.” ) When one watches two dogs at play, which in toto unfolds along the template of a circle, the slower dog quickly learns to cut off the faster dog at a point along the circle’s circumference. He doesn’t figure it out, he feels it, the calculus of momentum is built into an emotional state just as the geometry of a social configuration is built into a feeling. (Again in this vein, temperament, the predictive faculty of wave-making, should be renamed “Temperamotion.”)
Third, there is an order of adaptability many magnitudes greater than these preceding two benefits, and which emerges from them. Wave-Coupling.
Wave-Coupling is the gateway to FREE ENERGY, the ultimate gold standard in any behavior’s adaptive value. Coppinger specifically profiles this phenomenon in a discussion of the iconic V formation of migrating geese. Because geese are large birds and soaring is not a viable strategy for their migratory needs, they learn to draft slightly off to one side of a forward goose so as to significantly decrease the resistance they face. The V emerges as the simple consequence of this thermodynamic, aerodynamic consideration. By coupling their collective wave forms together, they capture and harness free energy drafting in each other’s wake and thus move their big bodies farther and faster and with far less expenditure of energy.
However, to conclude that this thermodynamic reality doesn’t carry a real social overtone I believe is in error. I’ve seen a flock of geese circle around and around a lake bedeviled with tricky winds, trying to land in formation. Around them other wild fowl were dropping in easily one-by-one whereas this large flock of geese didn’t decompose but instead circled round and round, honking in a progressively agitated manner, apparently because they felt compelled to land as if they were a jumbo jet with a 200 foot wingspan. I believe this social imprint would carry over into many other ways their minds process informotion.
Now with these three adaptive values in mind, let us return to the phenomenon of play.
Coppinger concludes:
“Play behavior in and of itself, on our view, is not an intrinsic behavioral property of dogs or other mammals— not a special evolutionary outcome shaped by direct selection as a way to practice adult behavior, or as a mechanism to provide pleasure, or a means of reinforcing the domestic bond between dogs and humans. Rather, we think, the seemingly mysterious and ‘protean’ nature of play in mammals like the dog is a fortuitous emergent consequence of the development and interaction of other behavioral systems. It arises from the random combination and recombination of fragmentary components of behavior that appear during juvenile metamorphosis— an emergent “by-product” that comes about from the interplay between simple, fragmentary behaviors turning on and off at overlapping times in development.”
Random? In “NDT” I likewise argued that cubs aren’t playing in practice for the hunt (for one thing deer when they feel safe, play like dogs so therefore they would have to be practicing to be the hunted.) Since the brain with its vast matrix of interconnected neurons is shaped by the shape of the movements the body makes, and the optimal movement is a wave, the mind that emerges must also be a wave function, not a random emergent process. The mind would develop to be attuned to its species specific locomotive rhythm, the optimal wave form that minimizes the resistances impeding efficient movement. Thus objects that are emotionally relevant are adjudged according to their impact on an animal’s capacity to move well. (Try herding a straggling chicken into the confined space of a coop before she’s ready to call it a day.) This means that objects are formulated in the mind, the input from the senses is organized into a specific shape, in terms of a wave function. Objects obtain relevance and value in terms of their coherence with wave propagation. Objects are composed of predatory aspects which resist, if not interrupt and collapse the wave form, (i.e. an emotional state of attraction). And/or they are composed of preyful aspects which absorb and conduct the wave form. The simple rule being, can I be in contact/proximity with this object and still move well? Moving well means food, safety, pleasure, sensual, tactile affiliation, well-being. Not being able to move well means danger, compression, fear, disconnection, collapse of homeostasis. My theory is that all motor patterns revolve around this central dynamic of moving well. Indeed shape is everything.
So while the play bow is not intentional, and while it is also a state of conflict (albeit a positive versus a negative state of contrasting) because the way forward for the playful dog isn’t 100% clear, nevertheless it is not the emergent result of a random coupling of motor patterns diametrically opposed to each other. The play bowing dog isn’t in conflict about going forward versus going backwards. Rather, adapting one’s body to the shape of the wave that another animal’s body makes, just as the body in motion adapts to vagaries of the terrain, IS the basis of adaptability. Wave coupling is the basis of moving well when dealing with resistance.
Coppinger shows a picture of a dog with a sheep killing history, performing a play bow before a sheep that apparently won’t budge. Obviously the sheep killing dog isn’t intending play (less obviously perhaps neither does a sheep killing dog intend to kill a sheep). However what behaviorism and the cognitive school of interpretation call a play bow, I call “collecting.” The “play bow” is the collecting phase of the locomotive rhythm, decoupled from its complementary phase of projection. The sheep in this picture is doing the projecting (due to the phenomenon of emotional momentum as a function of the physical memory of motion), and this leaves it to the dog to perform the collecting phase in order to incorporate the object-of-resistance into its locomotive rhythm, in other words to reset its metric of its well-being and reacquire the wave form that is its predictor of ultimate success.
This interpretation addresses three questions: What is going on inside the mind of the dog, and why would such a behavior have the tendency to promote play in others, and why do human observers find play endearing?
The play bow is not emergent in the sense of not being related to the substrate. If the dog were chasing the sheep, which in Coppinger’s model would activate the Bite sequence, by running at full speed, he would be performing a very strong wave form, his optimal locomotive rhythm. So the form of a sheep in motion constitutes full locomotive rhythm and the exhilaration of incorporating all resistances (changes in terrain and direction of sheep) and subsuming these into the locomotive rhythm. The “bow” is the collecting phase decoupled from the projecting phase in order to incorporate an object of resistance into the locomotive rhythm that in this instance the dog’s can’t express because for some reason this particular sheep refuses to run. While the dog is focused on the sheep’s predatory aspect (eyes as source of force) it is simultaneously holding this IN CONJUNCTION with its preyful aspect (bulbous body plan and hence suggestive of the full locomotive rhythm) and so we observe a positive state of contrasting. The dog looks expectantly happy, an observer would misinterpret this to be an invitation to play were he not to know the dog’s history. But in the NDT model, even between two playful dogs, we don’t interpret the bow as an invitation to play. When the predatory aspect can be felt in tandem with the preyful aspect, then the individual recognizes their “self” in that object of attraction/resistance. I don’t mean “self” cognitively, only that the object of attraction responds in perfect mirror fashion according to Newton’s third law of motion, i.e. every action provokes an equal and opposite reaction. The laws of motion, the operating system of emotion, allow the individual on a deep architectural level to find commonality with objects in the world because when an object of attraction responds in this way on a feedback loop, reciprocating with the right kind of shape, the dog feels he can manipulate the object into its locomotive rhythm by fine tuning his own output.
NDT always strives toward a thermodynamic explanation (as well as the laws of motion) as the most parsimonious approach to this intelligent aspect to sentience. So to accommodate the motionless sheep, the dog opts for the equal/opposite phase of the locomotive rhythm, the collecting phase in order to incorporate the sheep, in his mind, into his locomotive rhythm. Collecting is integral to locomotion, the dog is bringing both phases into a perfect point of balance, the fulcrum being the eyes of the sheep. The dog is not in conflict about going forward. If he can’t eat ‘im, he’s inclined to join ‘im.
How does a dog know to decouple? Consider a dog coming to a fallen tree blocking a trail. He wants to get to the other side and while the height is high, it’s doable. The dog is in a state of conflict because the way forward isn’t 100% clear, but the resistance he’s encountering, the height to overcome (-), is amplifying rather than dampening his state of attraction for what he wants on the other side. He’s in a positive state of emotional contrasting, the resistance between where he is and where he wants to be, AROUSES him even more to get to the other side. So the dog will collect himself by gathering his weight on his hind end, focusing his gaze on a leverage point somewhere on the blowdown, in order to vault over his forelegs as springboards. When the degree of muscle tension in his hind end is greater than the perception of resistance, he launches. The dog responds to the resistance to his capacity to move well by exaggerating one aspect of the wave form over its complementary phase.
The dog that is collecting onto his hindquarters is not on the one hand looking to retreat and the other hand to go forward, as in the Coppinger interpretation of the play bow. Rather the dog is is isolating on the collection phase of the master wave, the locomotive rhythm. The particular body shape of a play bow is the locomotive rhythm adapting itself to an obstacle of resistance. The body is molding itself to fit with the complementary phase of the locomotive wave. Wave-making and wave-coupling is what I have heretofore referred to as mirroring.
How does a dog map the collecting phase from an environmental value such as a tree blocking a trail, to a temperamental value, such as another animal refusing to budge? Tug-of-war is one very powerful way this bridge is created wherein collecting is accorded a high strategical value in the mind of a dog. Not coincidentally, dogs love to play tug because this is such an important component of wave-coupling.
The play bow as wave-coupling has an equal/opposite inverse expression as when an owner approaches their dog and he yawns and does the “Down-Dog” yoga pose. The dog is perceiving the advance of his human as a wave moving toward him, and he collects himself to absorb that emotional momentum, like a swimmer gathering to dive through a wall of surf to get to the calm water on the other side of the churn.
The shape of a play bow or a Down-Dog wave form has an emotional effect on an observer because when a dog shifts his focus from projecting his force forward, to collecting his force onto his hind end, his wave-like body mechanics and facial expressions will transmit a discrete emotional signal that means the emotional momentum of the observer can be absorbed. Since all mammals have the same mental process of objectification in terms of a wave form, they would therefore feel encouraged to engage because the dog in a collecting state is quite likely melting the state of tension every emotional being walks about in, and amplified by a stimulus. By subliminally focusing force on his hind end, with the forelegs as springboards, this translates into lowering and minimizing his head (predatory aspect), and this reduces the feeling of pressure in an observer. And by simultaneously maximizing his hind end, which is an animal’s preyful aspect, (one can move well toward an individual who is moving away) the play bower is absorbing emotional momentum and now an observer can feel that the way forward is clear and which might incline him to engage. (Remember that any object that can come to mind, is a function of resistance to the locomotive rhythm and in order to return to a state of well-being, the object needs to be brought into concordance with the locomotive rhythm. So there is an automatic and autonomic state of attraction with anything that is emotionally relevant (i.e. can stimulate and disturb equilibrium), and this is followed by an inherent motive to accelerate the object of attraction so that the locomotive rhythm can be reacquired.) Furthermore, when an individual exhibits the 3rd law of motion, then they are safe to incorporate into the sense-of-self because they can be induced, through feedback, to conform to the locomotive rhythm. Hence they become emotionally conductive.
The third law of motion as an intrinsic rule of emotion also conforms to the Constructal law because in this way, individuals diversify according to a branching architecture of personality development, and which will then lead to a branching architecture of collectivized movements. They will not vary at random Thus a group arises and moves systematically through a region, vascularizing their surroundings with their coordinated movements. We call this territoriality.
This returns us to the notion of emotion as a modeling program. The wave mechanics of mental processing means that at a safe distance and well before actual physical contact is made, an observer can project and compute how an interaction is going to unfold. No need for a high risk trial and error since the wave form can preemptively predict success or failure in advance of in-close physical contact.
Whereas like most behaviorists, Coppinger links emotion to high cognition and intention as opposed to a simple state of attraction and so intrinsic rules, accommodation and emergence would seem therefore to be the whole story. In a discussion of rat pups huddling for warmth:
“Several researchers carried out computer simulations that utilized these rules, and successfully modeled rat huddling with abstract agents. Nothing more needed to be said about the rat pups’ emotional state, intentions, or anything else— two simple rules alone generated the grouping behavior, and adding a third rule into the simulation, to model development, changed it appropriately.”
But taking emotion out of the equation obscures the systems logic of wave-making and wave-coupling, the way by which every configuration improves itself, a dynamic which is really running the show and which is highly adaptive according to the thermodynamics by which configurations improve themselves. In “NDT” 1992 I articulated all this as the harmonic pathways of learning, i.e. waves coupled in phase to amplify force. Emergent means immediate moment. Rule driven means attraction. Harmonic pathways of learning encapsulates these concepts and more and doesn’t rely on cognitive constructs.
The immediate-moment manner of analysis does not interpret two interactants trying to figure out how to interact, but rather, trying to feel how to map their locomotive rhythm onto objects of resistance, each other . (Remember resistance is an impediment that must be incorporated into the locomotive rhythm in order to sustain a feeling of movement, i.e. well-being. If we know that Output is some form of a wave, then Input and Throughput must also be functioning in terms of a wave as the wave form is the essence of adaptability. Wave-functionality is how the animal mind construes sensory inputs into meaningful shapes.) They are trying to merge into one wave form in order to move well and reacquire a state of emotional equilibrium (displaced whenever stimulated) so as to reestablish a feeling of well-being. If they are successful, we observe two beings merging into one wave form manifested by their collectivized actions.
In point of fact there is no intrinsic rule specifying LOST—-RETRIEVE—-EYE——STALK—-CHASE—-STAY-NEXT-TO-PREY And then to encircle the prey: REMAIN-EQUIDISTANT-FROM-PACKMATES. There is no command module stating do-this and then-do-that. While these new interpretations are insightful and helpful in removing the old cognitive interpretation and calling into question the gene-centric approach (and I might add inadvertently demonstrating that all behavior is a function of attraction), what is happening inside the mind of an animal IS an emotional state, one that doesn’t derive its intelligence from a sentient awareness of its placement within a situation, a cognitive construct of reality, an intention, but rather by a feeling for the wave function that every stimulus arrives in the mind as a formulation thereof. Each individual’s feeling is a slice of an overall template, a section of a circle, a wave function, and which can best be articulated and discussed in terms of attraction, resistance and an emotional charge that accrues and not only overcomes resistance, but intrinsically inspires an individual to incorporate an object of resistance into the configuration. If you can’t eat ‘em, join ‘em.
Wave coupling is adaptive because it satisfies the criteria of every level of adaptive success, an individual moves faster and farther if it can mold uneven terrain and obstacles into a smooth locomotive rhythm, it if can coherently deal with force, both its capacity to absorb and project it, socially wave-coupling amplifies the many into one combined force that can do more work, and the network is satisfied because objects of resistance are incorporated into configurations thereby improving the network wide flow pattern.
The extent to which one aspect of the wave-making dynamic can be decoupled and then re-coupled as a complement to an object of resistance, IS the essence of adaptability. This is adaptive on every level of selection, from the individual, to the social unit, to the network. Dogs are the masters of de-coupling one phase of the master shape from another and then re-coupling in order to make a bigger wave. Since this post is so long, I’ll leave a discussion of barking, howling, humping for later, but I trust you can already see that these quintessential doggy behaviors are dramatic examples of wave coupling as well, most especially howling, the dog literally making a sound wave to resonate with another. Free energy from wave-coupling; that’s how the dog emerged from the wild. That’s the shape of domestication.
(BTW: In terms of training practicality, the Five Core Exercises are concerned with strengthening the Wave-Coupling faculty.)
Want to Learn More about Natural Dog Training?
Create Your Account Today!
Published January 7, 2016 by Kevin Behan
10 responses to ““How Dogs Work” Part Two”
1. Jamey says:
Well written, thanks very much. I am starting to get an understanding of NDT. I have been able to work some into real world dog interaction. When do you have time to work on dogs? This is so well thought out.
2. I second that! You’re getting closer and closer to a new understanding that will change the landscape entirely. (A trophic cascade of ideas?)
By the way, I’ve been corresponding with a university student in Sweden. She’s fascinated with Natural Dog Training and the 5 Core Exercises. The upshot is that she’s doing some preliminary work on testing how well NDT treats PTSD in dogs against how behaviorism fares. She’s at Gothenberg University.
3. Kevin Behan says:
Thanks for taking the time to read such a long article. I’m glad it’s starting to add up. As I like to say, it’s so simple it’s hard to get. The best time for me to write is in the early morning before it’s time for the dogs. But I must note that being physical with the dogs is the perfect antidote/complement to being mental with the computer.
4. Kevin Behan says:
Excellent. I think the next generation of scientists are going to be open to questioning these long standing assumptions that we’ve been challenging all these years. Keep us posted!
5. Willem says:
Thrilling. Bit by bit I understand the picture of the “network” on a deeper and deeper level.
6. b... says:
The book’s alignment with your theory is refreshing and encouraging. Of course the profundity of what you’ve laid here is at least an order of magnitude beyond the advancement that Coppinger has uncovered so it may take a proportionate length of time for it to permeate the behavioral community. Some may suspend their belief of emotion as a mystical system disembodied from the laws of physics long enough to appreciate the connection, but that doesn’t take away from how fascinating it is to see the pieces unfold here and observe in real life. Bravo.
7. Sheri says:
Beautiful, beautiful, beautiful integration of all these emerging ideas! I love everything you’re doing, but this has been my favorite article ever. The increased ability of my thinking to flow because of it feels really good.
This explains so many things that I think about and work on I’d probably run out of comment room trying to list them. But one thing of special importance is how much this elucidates the work of Emmi Pikler, as brought to us by Magda Gerber, author of Your Self-Confident Baby.
For Emmi, one of the foundations of self-confidence in babies is the ability to engage in unrestricted movement and for us not to “help” them move by propping them up, “walking” them in our hands, putting them in walkers and infant seats, etc.
A second important tenant is in allowing children to confront and overcome resistance rather than removing resistance from their life.
So illuminating. Thank-you!
8. b... says:
Kevin, could you elaborate a little bit on this statement?: “Tug-of-war is one very powerful way this bridge is created wherein collecting is accorded a high strategical value in the mind of a dog.”
9. Kevin Behan says:
When a dog plays tug-of-war he is investing all his energy into the collecting phase, the bucking back is like reverse thrusters, the engine running full out in reverse. The success of this imprint in infancy I believe allows the dog to invest a lot of energy in his play bow. However, the question becomes does the hind end arousal state win out over the tense shoulder state, and when an owner over does the tug they end up reinforcing the tense shoulder state rather than the arousal state so smoke eventually starts coming out the dog’s ears. Basically the system was designed to run full throttle in forward rather than reverse motion.
Leave a Reply
Join the
NDT Study Group
Learn more
Books about Natural Dog Training by Kevin Behan
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/27719
|
• Full Access to our 639 Lessons. More Lessons Added Every Week!
• Content created by Rene Molenaar (CCIE #41726)
351 New Members signed up the last 30 days!
100% Satisfaction Guaranteed!
You may cancel your monthly membership at any time.
No Questions Asked!
Tags: ,
Forum Replies
1. On your Introduction to Access-Lists on Cisco IOS Router lesson, you have, in the picture for where to place the ACL, the word inbound twice. I believe that the top router should be “inbound” and the bottom router should be the “outbound.”
2. Is there any example on how to configure classification on a router.
3. Hi Rene,
if i do access list like:
access-list out_acz_in permit any
access list out_acsz_in udp permit any eq h323
What isthe difference between both, what will be the default if i don`t mention tcp/udp and destination port in first case -what is the default type?
4. Asi
The first thing you have to decide is whether you are creating an standard or extended access-list. The next decision to make is whether you wanted to use an access-list number or an access-list name. In the examples you gave, you chose to use named access-lists for both (out_acsz_in). Also, in your example, we must be using extended access-lists (because you specified the destination of the traffic you are permitting).
Let’s look at your two examples, and reconfigure them so they are using the proper syntax.
Your first example is this:
... Continue reading in our forum
5. Hello Siu Kai L,
Both inbound and outbound get the job done, they filter packets. It depends on the scenario which one you might want to use. For example, let’s say you have a router with 4 interfaces:
* 1x WAN interface that connects to the Internet
* 3x LAN interface
Let’s say you want to restrict internet traffic from your LAN to the Internet. You could attach the same access-list INBOUND on all three LAN interfaces, or you can attach the access-list OUTBOUND on your WAN interface. Both get the job done, the only difference is you have to apply it once inste
... Continue reading in our forum
|
global_01_local_1_shard_00001926_processed.jsonl/27730
|
Building a VPN Solution using OpenVPN Server on a Raspberry Pi – Part 2 Configuring the clients
Now that we have configured the openvpn server, we will continue on to configuring the clients. If you haven’t configured the openvpn server yet, please refer to my previous blog
To connect to the openvpn server, the client needs a ovpn file. This file contains the required certificates and the openvpn servers address. The article at provides the steps required. However I have deviated from the steps listed in that article abit, for the following reasons
• I am not using comp-lzo, which is used for backwards compatibility
• I am using AES-256-CBC
• I am using a more verbose level (verb 3)
Now that the above is out of the way, use the steps below to generate the client configuration file
1. On the Raspberry Pi, using terminal, elevate your session to root and then change to the easy-rsa keys folder using the following command
sudo su
cd /etc/openvpn/easy-rsa/keys
2. Create a new file with the following lines and save it as Default.txt ( do not forget to replace <your public domain name to openvpn server> with your openvpn public hostname)
dev tun
proto udp
remote <your public domain name to openvpn server> 1194
resolv-retry infinite
ns-cert-type server
key-direction 1
cipher AES-256-CBC
verb 3
mute 20
3. Download the script from Github using the following command (the actual Github url is The command below is using the raw version of the file)
4. The script needs some modification to match our openvpn server configuration. Modify the script based on the following
change line 7 from KEY=".3des.key" to KEY=".aes256.key"
change line 21 from echo "Client’s cert found: $NAME$CR" to
echo "Client’s cert found: $NAME$CRT"
change line 72 by adding a # in front of the line (so you are commenting out the line)
5. The script will be owned by root. Grant it execute permissions by running the following
chmod u+rwx
6. Now execute the script using the following command. You will be asked for the name of an existing client for whom you had generated the keys and certificates for when configuring the openvpn server (for instance client1)
The script checks to ensure the following files exist in the folder /etc/openvpn/easy-rsa/keys
If any of the above files are missing, an error is displayed and the script stops.
However, if everything goes well, the following is displayed
Done! {client1}.ovpn Successfully Created.
and the file {client1}.ovpn is placed in the /etc/openvpn/easy-rsa/keys folder
7. Thats it folks! The client config file is now ready. Import it into your openvpn client to connect to your openvpn server. Don’t forget the password you had configured for the client when you generated the key because it will be requested everytime you try connecting to the openvpn server.
A good MacOS OpenVPN client is On IOS, you can download the free OpenVPN Connect app.
Let me know what you think of my blog and enjoy the privacy and benefits of the vpn server 🙂
|
global_01_local_1_shard_00001926_processed.jsonl/27738
|
Every once in awhile, almost everyone deals with bad breath, or halitosis. Whether it’s caused by gum disease, dry mouth or something else, there are ways you can deal with this problem safely and effectively. Here’s some information on the causes of this embarrassing problem, and six ways to get rid of it.
The Usual Culprits
There are a few common reasons why someone develops halitosis. Causes may include …
Dry mouth
If you feel like you don’t have enough saliva in your mouth, that could contribute to your bad breath. There are a few reasons why this happens. It could be a problem with a salivary gland or you might be taking a medication that leaves you parched. Do you breathe through your mouth while sleeping? This can cause dry mouth. It might also be a sign that you have sleep apnea, a potentially serious medical condition.1
Bacteria growth
We have a lot of good bacteria in our bodies, but we also have a lot of harmful ones. There are a lot of bacteria in the mouth, of course. When you eat, they feed on the tiny bits of food left in your mouth and your teeth after a meal. That can result in foul-smelling breath.
Just like an imbalance of bad and good bacteria in the mouth can contribute to halitosis, an imbalance in the gut can also lead to bad breath. This is a condition known as dysbiosis.2
Whether you smoke or use another tobacco product, that can lead to gum disease. But even if it doesn’t, people who smoke usually have a decreased sense of smell. You might not even realize that you have bad breath.
stop smoking bad breath
Gum disease
A buildup of plaque on the gums is one of the main causes of halitosis. If you tend to have bad breath on a regular basis, then you might have a serious case of gum disease. Get to a dentist as soon as you can for a checkup.
Medical problems
Most of the causes of halitosis are usually minor. But it can sometimes occur due to a problem somewhere else in the body. This even includes a potential liver or kidney issue.3 Talk to your doctor to find out if there’s something wrong.
Getting Rid of Your Bad Breath
Most cases of halitosis can be eliminated easily. Put these tips to use, and see if they clear up your problem.
1. Fight Dry Mouth
One of the best ways to keep an ample supply of saliva in your mouth is to eat food you need to chew a lot. Apples and carrots are good choices, because they give your teeth a workout. Sugar-free candy and gum will also help get the saliva flowing. It’s important to stimulate the production of saliva, because it has enzymes that help to kill harmful bacteria in the mouth.4
2. Clean Your Tongue
tongue cleaner bad breath
Even if you’re brushing your teeth and flossing every day, you still might experience bad breath. One reason could be that you’re not cleaning your tongue well. The tongue harbors traces of food as well as bacteria that can contribute to halitosis. You can’t get rid of this by brushing and flossing alone. That’s why you should always remember to clean your tongue when you brush.
If you have a loot of grooves in your tongue, you might want to consider using a tongue scraper. This device will clean the area much better than a toothbrush.Talk to your dentist to see if a tongue scraper is right for you. It’s important that you see a dentist regularly anyway, so that they can provide a deep teeth and gum cleaning. This will get rid of bacteria and plaque that might be hiding in places you can’t reach with a toothbrush.
3. Consider a Dietary Change
Research indicates that a diet high in proteins and low in carbohydrates could play a role in causing halitosis.This type of diet contributes to something called “ketosis.” This occurs when the body uses fat for fuel, because there are no carbs to burn. When this happens, ketones build up, and are released when you breathe. And you might have bad breath as a result.5
Another thing you can do for your diet is to drink more tea. According to researchers, chemical components in tea known as polyphenols can inhibit the growth of certain bacteria that contribute to halitosis.6
4. Use Mouthwash
Again, brushing and flossing your teeth every day will help keep your mouth healthy – but it might not get rid of your bad breath. Mouthwash helps kill bacteria that cause halitosis. Try to avoid products that contain alcohol, though. They may contribute to dry mouth.7
5. Stop Smoking
You need to stop smoking for many reasons, including bad breath. Tobacco use contributes to gum disease, as well as dry mouth. Both can lead to a big, bad case of halitosis.
6. Get a Physical Examination
If you take good care of your teeth and you still have halitosis, you should visit your doctor’s office and schedule a physical examination. This examination could reveal a health issue that could be the cause of your problem.
The Last Word
Your oral health is vital to your overall health. Take bad breath seriously, and not just because of the potential social consequences. You might have a health problem that’s behind your halitosis. If you try these tips and still have bad breath, get checked out by your doctor, to get to the root of the issue.
Learn More:
Fact or Fiction: Is Sitting All Day the New Smoking?
|
global_01_local_1_shard_00001926_processed.jsonl/27812
|
Smush stopping at the 5th image
I ran smush and it smushed around 700 out of 15K, until I realized that it got stuck, when I refreshed the page to run a new scan, it seems to be stopping at the 5th image now.
And it shows this error :
'invalid file format. Only PNG, JPEG, and GIF files are supported.'
• Adam Czajczyk
Hello Sam
I hope you're well today and thank you for your question!
I can see that smushing now stops after five images, reporting all five that it already went through as invalid. I checked these specific images it reports and they actually do seem invalid: the media library doesn't show any preview for them, Chrome browser shows just a "white square on black background" and Firefox says that it cannot load them because they contain errors.
An example image would be this (it's a link to Media Library, just replace YOUR_DOMAIN_HERE with your actual domain name):
If you look through the Media Library there's also quite a lot of images (easiest to find if you start checking form the last page of the list there) that actually don't even exist: there's an info about image in the database - that's why they are listed in Media Library - but there seems to be no related image file.
Most of these images are unattached, meaning that they are most likely not used in any posts but I can't say that for sure as there are also other ways to include posts in content (some plugin might be using them or they might be linked directly). Those images were not even yet processed by Smush so it's not Smush that caused that but I'm wondering whether you noticed that before.
Also, did you remove any images from the server physically (e.g. via FTP)? Were you using any image editing/optimization plugins other than Smush on the same site before? Was the site somehow migrated (or the images exported/imported) somehow from other site or location?
Let me know, please.
Best regards,
• Predrag Dubajic
Hi Sam,
Since your images completely missing, meaning there's no full-size image that could be used to regenerate your thumbnails, you will need to resolve those missing images, either remove them or if you have those original images somewhere, upload them via FTP to their correct location.
This plugin should help you to find the broken images in your library:
In plugin settings disable "Regenerate attachments metadata and thumbnails" option and select "Write a note to log" or "Delete" for Unreferenced Thumbnails depending if you want to delete them or track the ones with issues.
After you have list of your broken images you can upload the original ones to the correct location and after that you will be able to regenerate thumbnails out of them, or you can delete them and if you still need some of those upload them again.
Please note that the above plugin is not one of our products and I'm not fully familiar with it so I would suggest having a backup ready before doing any cleanup, just to stay on the safe side.
Best regards,
Thank NAME, for their help.
Let NAME know exactly why they deserved these points.
Gift a custom amount of points.
|
global_01_local_1_shard_00001926_processed.jsonl/27813
|
Unable to update Events+ plugin
Hi all, at one your ago i updated membership 2 which everything went normally, now it noticed a new update from Events+ but it doesn't update the plugin. It shows the message update success but when i go to other page its still saying to update Events+ to new version, then i went check the plugin version and i confirmed it didn't applied the update.
Is this a known issue or its only happening to me?
|
global_01_local_1_shard_00001926_processed.jsonl/27814
|
Loading presentation...
Present Remotely
Send the link below via email or IM
Present to your audience
Start remote presentation
• Invited audience members will follow you as you navigate and present
• People invited to a presentation do not need a Prezi account
• This link expires 10 minutes after you close the presentation
• A maximum of 30 users can follow your presentation
• Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
The Integumentary System
No description
Cheryl Stover
on 24 January 2012
Comments (0)
Please log in to add your comment.
Report abuse
Transcript of The Integumentary System
Skin and Body Membranes Skin and Body Membranes Integumentary System What is Skin Anatomy of Skin General Anatomy
A large organ composed of all 4 tissue types
2 Major layers of skin
– Epidermis is epithelial tissue only
– Dermis is layer of connective tissue, nerve & muscle
Subcutaneous Tissue (Hypodermis or subQ) is layer of adipose & loose CT
Epidermis Dermis Subcutaneous Layer
(Hypodermis) Flat dead cells filled with keratin
Continuously shed
Barrier to light, heat, water, chemicals & bacteria
Stratum Corneum Stratum Lucidum Seen in thick skin on palms & soles of feet Stratum Granulosum organelles deteriorating
Stratum Spinosum During slide preparation, cells shrink and look spiny
Melanin (pigment protein) taken in by phagocytosis from nearby melanocytes
Deepest single layer of cells
Called stratum germinativum
Combo of merkel cells, melanocytes, keratinocytes & stem cells that divide repeatedly
Cells attached to each other & to basement membrane
Stratum Basale Keratinocyte Keratinocyte Keratinocyte Keratinocyte Merkel
Cell Melanin Langerhans Cell (immune) Keratin (not Pictured) Melanocyte Melanocyte Dermis Dermis Nerve
Ending Connective tissue layer macrophages & fat cells
Contains hair follicles, glands, nerves & blood vessels
Major regions of dermis: papillary region& reticular region
anchors epidermis to dermis
contains capillaries that feed epidermis
contains Meissner’s Corpuscles (touch) & free nerve endings (pain & temp)
Papillae Insulator: conserving body heat
Shock absorber: protecting internal organs from injury
Stores fat as an energy reserve
Corpuscle Arrector Pili smooth muscle
causes goose bumps
Gland Produces Sebum
cholesterol, proteins, fats & salts
keeps hair and skin soft & pliable
inhibits growth of bacteria & fungi (ringworm)
Gland Sudoriferous glands
Hair Shaft Eccrine (sweat) glands
–most areas of skin
–secretory portion in dermis with duct to surface
–regulate body temperature with perspiration
Apocrine (sweat) glands
–armpit and pubic region
–secretory portion in dermis with duct that opens onto hair follicle
–secretions more viscous (milky)
Hair Root Root Hair Plexus
Senses hair movment Stratified squamous epithelium
No blood vessels (avascular)
4 types of cells
5 distinct strata (layers) of cells
Melanin produced in epidermis by melanocytes
– same # of melanocytes in everyone, but differing amounts of pigment produced
– results vary from yellow to tan to black color
– UV in sunlight increases melanin production
Carotene in dermis
– yellow-orange pigment
– red, oxygen-carrying pigment in blood cells
– if other pigments are not present, epidermis is translucent so pinkness occurs
Regulation of body temperature
Protection as physical barrier
Sensory receptors
Excretion and absorption
Synthesis of vitamin
Destruction of proteins of the skin = chemicals, electrical, heat
Problems that result
– shock due to water, plasma and plasma protein loss
– circulatory & kidney problems from loss of plasma
– bacterial infection
3 common forms of skin cancer
– Basal Cell Carcinoma (rarely metastasize)
– Squamous Cell Carcinoma (may metastasize)
– Malignant Melanomas (metastasize rapidly)
-arise from melanocytes ----life threatening!!!
General Functions of the Skin Skin Cancer
First-degree Burn = only epidermis (sunburn)
Second-degree Burn
– destroys entire epidermis & part of dermis
– fluid-filled blisters separate epidermis & dermis
– epidermal derivatives are not damaged
– heals without grafting in 3 to 4 weeks & may scar
Third-degree or full-thickness
– destroy epidermis, dermis & epidermal derivatives
– damaged area is numb due to loss of sensory nerves Burns Types of Burns Skin Color Pigments Serous membranes line and enclose several body cavities, known as serous cavities, where they secrete a lubricating fluid which reduces friction from muscle movement Serous membranes Each serous membrane is composed of a secretory epithelial layer and a connective tissue layer underneath. – parietal layer lines walls of cavities (outside)
– visceral layer covers viscera (internal organs) within the cavities Visceral Pleura: clings to surface of lungs
Parietal Pleura: lines chest wall
Visceral Pericardium: covers heart
Parietal Pericardium: lines pericardial sac
Visceral Peritoneum -serous membrane that covers the abdominal viscera (organs)
Parietal Peritoneum - serous membrane that lines the abdominal wall Visceral Layer Parietal Layer Serous Fluid Mucous membranes Line cavites that open to the outside
Made of epithelial and CT
Synovial membranes Cutaneous
membranes Synovial Membrane Synovial fluid Synovial fluid Found in joints
Connective tissue only
Produces Synovial fluid Skin
only dry membrane
Full transcript
|
global_01_local_1_shard_00001926_processed.jsonl/27817
|
Erectile Dysfunction Treatment
Post Image
Erectile dysfunction is the lack of will to have sex and erection or not beeing able to sustain the state during erection.
In this case, man can not provide the rigidity of the penis to initiate a sexual relationship or to continue to ensure that satisfaction. Erection (hardening) is an involuntary event that occurs in response to sexual excitement or stimulation.
A sexual stimulation can increase blood flow to the penis, as a result of the joint effect of brain, nerve, heart, blood vessels and hormones.
The penis consists of 3 tubular structure. Two of them are on the sides and the upper side, the other one is on the lower and middle side of the penis. The one at the bottom-middle has the the urinary tract and contributing to hardening is not much. The other two cylinders into the fullness of blood, the penis becomes larger for sexual intercourse, and hardening becomes steeper.
Prolargent 5x5 Extreme Natural Pill
60% of men will experience short-term or permanent impotence problems throughout their lives. Erectile dysfunction affects men's or couple's life in a negative way, but the results vary from person to person. Some men can accept it as a natural process. This may become a focal point to disrupt his entire life and depression in younger people may drag or in men with a more active life.
Prolargent 5x5 Extreme Treatment
Now, impotence disorders and erectile dysfunction can treated with Prolargent 5x5 Extreme!!
• Pin It
|
global_01_local_1_shard_00001926_processed.jsonl/27822
|
Papers and Presentations
May 2005 - Playing with Visualization Tools.
June 2004 - IPv6 deployments have been growing over the past several years, including commercial deployments of them in the domestic US market. We will cover some of the deployments that are happening, how the service is progressing and what roadblocks and landmines one should look out for. PDF - PPT
April 2003 - The problem
A quick paper documenting the problems of filtering unassigned space, what happens when it's finally assigned and the pains that people go through to update outdated filters.
© 2003-2004 jared at puck dot nether dot net Jared Mauch Homepage Puck main webpage
|
global_01_local_1_shard_00001926_processed.jsonl/27833
|
Mauka Mauka Ringtones for iPhone and Android
I have habit of setting up custom ringtones . Something I am doing from Nokia days. 🙂
I wanted to set Mauka Mauka tune as my ringtone from some time but only today I got time to work on it.
I downloaded original Mauka Mauka song from YouTube using youtube-dl and did some trimming and effects in Audacity.
Below are direct downloadable versions:
1. Mauka Mauka – 40 sec version mainly for iOS (mp3 version)
2. Mauka Mauka – longer version mainly for Android (m4r format)
iOS Version (40 Sec)
Android Version (Longer)
Leave a comment
Leave a Reply
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/27846
|
0 votes
I have a valid H1B visa with expiration date of Mar 31 2017. And I filed for an amendment due to the change of location. And it got approved with reduced validity of July 31, 2016.
My earlier Visa expiration was March 31, 2017
I-94 is valid till March 31, 2017
Amendment approval notice says July 31, 2016
Can someone please clarify, till what date I can stay. When should I file an extension? and Can I travel to India in this situation?
asked in H1B Visa by (140 points)
Hey Rajesh, What happened to your case ?, im on the same boat and your response would help me.
I filed an extension at that time
Even I am in progress of extension and trying to find out the option if it comes negative.
Good question but I didn’t face the situation. So i have no answer for it.
Ok np and thanks for responding!
1 Answer
0 votes
What duration did your employer requested? If they submitted client/project information, then what's the end date mentioned for the contract?
answered by (286k points)
I have no idea on the information provided by my employer and i am trying to get it. Regardless - what should be my visa expiry date now? Do i need to follow old petition or my new?
If you are working at new location the follow the new receipt notice. This implies an extension needs to be filed soon.
If you travel outside US, then you need an approved petition for new location which is still valid on your return date. So this can happen either after you have received extension approval; or now (but then you will have to file extension soon after returning to US prior to July 31).
Thanks for the response. It really helps. My employer is keep saying "Always the initial petition validity remains the same even if the amendment validity is less". Is it something wrong statement?
If you are working at new location, it is governed by new petition and not the old one. If you plan to work at old location, then you have more time in hand.
Did amendment come w/ an I-94 attached? If yes, then what is its expiration date?
I will be working in the new location only. I have the approved petition which has a section called "Detach this Half for Personal records". It contains I94 # which is different from my old I94. And mentioned the new validity (July 31). Is this the new I94 validity?
Yes, that is the latest I-94 which states allowed duration.
Can you try one more thing. Generate your I-94 online over here - https://i94.cbp.dhs.gov/I94/consent.html
See what it shows.
In online I94, it shows with the old date only (Mar 31, 2017). Thats where i am confused.
Yes, this is confusing. They should also not have issued a different I-94# with amendment but used the same I-94#. Maybe an error on part of USCIS.
I would talk to the immigration lawyer (not employer but lawyer) and take their advice, and go w/ it.
Related questions
0 votes
1 answer 2.4k views
0 votes
1 answer 859 views
0 votes
0 answers 1.1k views
0 votes
1 answer 2.6k views
|
global_01_local_1_shard_00001926_processed.jsonl/27854
|
Removing pop-up Instantly
Remove pop-up from Chrome pop-up related similar infections
Browser HijackerClick.Giftload,,, Globososo Virus,, HeadlineAlley Toolbar,,,,,, Surfairy
RansomwareCoverton Ransomware, CryptFile2 Ransomware, [email protected] File Extension Ransomware, Wallet Ransomware, [email protected] Ransomware
SpywareMicroBillSys, Trojan Win32.Murlo, Web Surfer Watcher, Worm.Socks.aa, Windows Custom Settings, RemedyAntispy, ShopAtHome.B, SmartFixer, VirusEraser, FindFM Toolbar
AdwareZestyFind, NdotNet, DosPop Toolbar, Adware.Zbani, Addendum, Adware.AntiSpamBoy, Gentee, Adware.OfferAgent, NaughtyPops, MegaSearch.m
TrojanTrojan.Rbot-BBQ, Tibs.JG, Trojan.Camtob.A, Zlob.websoft-c.Cookie, PWSteal.Ldpinch.CQ, Trojan-Dropper.Win32.Delf.gzg, Troj/Backdr-HG, Virus.Obfuscator.ABZ, Packed.Generic.402, Win-Trojan/Agent.45056.AMQ, Trojan.Downloader.Agent-ADL, Trojan.Spy.Savnut.A!dll, Trojan-PWS.Win32.Bjlog, Linuz
Simple Way To Get Harmful pop-up Viruses :-
• Opening of few malicious attachments or links from unknown emails.
• Downloading of several free softwares from dubious sites.
• Online Ads.
• Social Media.
• Unpatched Software.
Why pop-up Is Risky For Your System ?
Download Scanner To Delete pop-up From System
Method 1 : Delete pop-up Related Process From Task Manager
Method 2 : Delete pop-up From Registry Editor
Method 3 : Start Your Computer In Safe Mode With Networking
Method 4 : Delete pop-up From Firefox
Method 5 : Delete pop-up From Control Panel
Method: 1 Erase pop-up Related Files From Task Manager In System
Method: 2 Erase pop-up From Registry Editor In System
• Step2: Type regedit and then Press OK.
Method: 3 Start Your Computer In Safe Mode To Search & Delete pop-up From System
Delete pop-up Windows Xp/Vista
• Step 1: Restart your Personal computer.
• Step 3: Once opened Advance Boot Option.
Delete pop-up Windows 8/10
• Step 2: Select Troubleshoot option.
• Step 3: Click on Advanced Options.
• Step 4: Select Startup Settings option.
Method: 4 Help To Delete pop-up From Firefox
Removal Of pop-up From Mozilla Firefox
Once pop-up is Erase successfully then close all opened windows of Mozilla Firefox and Re-Start browser to complete the process.
Removal Of pop-up From Google Chrome
• Step 2: Click Tools option Extensions.
Again re-start Google once pop-up is Delete Possible Steps For from browser.
Removal Of pop-up From Internet Explorer
Removal Of pop-up From Microsoft Edge
Method: 5 Delete pop-up From Control Panel In System
Erase pop-up From Windows XP/Vista
• Step 1: Select Start menu and then Control panel.
• Step 2: Select Add or Delete program option.
you wanted to Delete from System.
• Step 4: Click Delete Button.
Delete pop-up From Windows 7
• Step 1: Click Windows Key on your keyboard.
• Step 2: Select Control panel Option From start menu.
• Step 4: Select pop-up or unwanted programs from your System
whom you want to Delete.
Delete pop-up From Windows 8
• Step 3: Click Delete a program.
• Step 4: Select pop-up and other unwanted program whom you want to Erase Click Delete.
Erase pop-up From Windows 10
• Step 2: Select System option.
• Step 3: Click Apps and Features option.
|
global_01_local_1_shard_00001926_processed.jsonl/27878
|
Restraints.append() — read spatial restraints
This command reads restraints, excluded atom pairs, and pseudo atom definitions from a file. An excluded atom pair specifies two atoms that are not to be tested during generation of the dynamic non-bonded pair list. There is one restraint entry per line. The new restraints are added to those that are already in memory; if you want to replace them, call Restraints.clear() first. All the new restraints are automatically selected.
file can be a filename or a readable file handle (see modfile.File()).
Example: See Restraints.make() command.
Automatic builds 2018-05-30
|
global_01_local_1_shard_00001926_processed.jsonl/27879
|
Adding additional restraints to the defaults
You can add your own restraints to the restraints file, with the homology-derived restraints, by redefining the automodel.special_restraints() routine (by default it does nothing). This can be used, for example, to add information from NMR experiments or to add regions of known secondary structure. Symmetry restraints, excluded pairs, or rigid body definitions can also be added in this routine (see Section 2.2.12 for a symmetry example). The example below enforces an additional restraint on a single CA-CA distance, adds some known secondary structure, and shows how to add restraints from a file. (See Section 5.3 for further information on how to specify restraints, and Section 6.8 for details on secondary structure restraints.)
Note that the residue numbers for any restraints refer to the model, not the templates. See Section 2.2.6 for more discussion.
Example: examples/automodel/model-addrsr.py
# Addition of restraints to the default ones
from modeller import *
from modeller.automodel import * # Load the automodel class
env = environ()
# directories for input atom files
class MyModel(automodel):
def special_restraints(self, aln):
rsr = self.restraints
at = self.atoms
# Add some restraints from a file:
# rsr.append(file='my_rsrs1.rsr')
# Residues 20 through 30 should be an alpha helix:
rsr.add(secondary_structure.alpha(self.residue_range('20:', '30:')))
# Two beta-strands:
rsr.add(secondary_structure.strand(self.residue_range('1:', '6:')))
rsr.add(secondary_structure.strand(self.residue_range('9:', '14:')))
# An anti-parallel sheet composed of the two strands:
rsr.add(secondary_structure.sheet(at['N:1'], at['O:14'],
# Use the following instead for a *parallel* sheet:
# rsr.add(secondary_structure.sheet(at['N:1'], at['O:9'],
# sheet_h_bonds=5))
# Restrain the specified CA-CA distance to 10 angstroms (st. dev.=0.1)
# Use a harmonic potential and X-Y distance group.
mean=10.0, stdev=0.1))
a = MyModel(env,
alnfile = 'alignment.ali', # alignment filename
knowns = '5fd1', # codes of the templates
sequence = '1fdx') # code of the target
a.starting_model= 1 # index of the first model
a.ending_model = 1 # index of the last model
# (determines how many models to calculate)
a.make() # do comparative modeling
Automatic builds 2018-05-30
|
global_01_local_1_shard_00001926_processed.jsonl/27881
|
More Recent Comments
Sunday, March 15, 2009
What's Up with New Scientist?
Amanda Gefter wrote a nice article in New Scientist pointing out the sneaky tricks that creationists use to discredit science. You can read the article here.
Unfortunately, you can't read this article on the New Scientist website because it has been removed. If you click on How to spot a hidden religious agenda you'll find the following message ....
I can't imagine a complaint that would cause a respectable magazine to withdraw that article. It sounds like New Scientist isn't standing behind its writers.
[Hat Tip: PZ Myers]
1. I read PZ's post and the comments. I also read the article and noted that Amanda Gefter mentions Denyse O'Leary who call herself a "Roman Catholic Christian."
O'Leary should ask her pope about the connection between Darwin and the Holocaust.
Is it too obvious to point out that O'Leary and Uncommon Descent complained about Gefter's story?
2. I can understand their anger. The article cleanly outs their cryptic attempts to make creationism a science. Years of hard work got flushed in a single article. The pens and keyboards had to be rallied to kill this threat.
Sadly New Scientist pulled the plug and caved to the "complaints".
But in the internet age, anything online stays online. PZ supplied a link to the article. I found no threats on that website, despite the scary warning from my browser.
3. I sent a comment to the New Scientist; unfortunately my comment is #647:
Story Temporarily Not Available?
Mon Mar 16 14:49:03 GMT 2009
I can't comment if I can't read the article. I really want to read it; I hear Denyse O'Leary is mentioned.
4. Whoa, when I clicked on the link it said:
Which may imply something totally different, e.g., not capitulating but rather protecting itself against legal action.
5. Carlo's comment does put a different spin on the matter. However, I note with some sadness the fact that the legal advice New Scientist apparently received was rather boring and conservative.
In contrast, there is the story of Patagonia, a sports-and-outdoor clothing company, which received notice that anti-abortionists were planning to picket their stores because of Patagonia's support of Planned Parenthood. Patagonia's response was to inform the anti-abortion organization of their new Pledge-a-Picket program, where for each picket they would pledge a designated amount to Planned Parenthood.
No pickets showed.
It would be nice if New Scientist's counsel could figure out an analogous in-your-ear strategy to deal with whoever complained about the article.
6. Denyse O'Leary has posted on Uncommon Descent
"New Scientist pulls post for legal reasons?" March 19, 2009.
O'Leary says, "Apparently, someone complained, but - although the post mentions me, - I wasn’t the one."
|
global_01_local_1_shard_00001926_processed.jsonl/27888
|
By Sarb Johal 16/07/2018 1
One view of language is that it emerged as a single big bang event in one of our ancestors and from that point on the linguistic capability and ability for the human species somehow exploded from that point. Another idea, of which Michael is a keen supporter of, is that somehow gesture and our capacity to position ourselves and move in spacial habitats underpins language, but also this idea of mental time travel.
M Corballis: Well, I guess it began really with an interest in brain asymmetry and handedness, and sort of relation between the two. Of course, the brain is asymmetrical in two striking ways, one is the representation of language in the left hemisphere, and the other is handedness, and I guess that led me to the idea that there ought to be a link, and that maybe handedness holds the key to where language came from, and that led me to the idea of the gestural theory of the origins of language. So, language begins in the hand, not the mouth, so to speak.
Sarb Johal: Yes, because there are competing theories around where language comes from…
MC: Well yes, I think most people take it for granted that language probably evolved from animal calls. In other words it was vocal to begin with. So I then began to develop the alternative idea that really it probably started with manual gesture, and that vocalisation came later, and I think the opinion is probably about even now, there are still people who insist to me that language must have come out of animal calls. So I’ve been trying to build a case for gesture for some time now.
SJ: And even within the idea that language came from animal calls, there’s even some difference there around how this may have come about, whether this was gradual evolutionary process, or if there was almost some kind of big event that led to this sudden development of language.
MC: Oh, absolutely, I also find myself trying to counter that Chomsky notion, in fact the Biblical notion, if you like, that language was suddenly bestowed on us as a kind of gift, so that there are no precursors to language, language sort of happened. And even Chomsky’s quite explicit about that. He’s got the idea that language appeared suddenly within the last 100,000 years, as a singular event, even in a singular person. The Bible calls that person Adam, but Chomsky, tongue in cheek, perhaps, calls that person Prometheus, as there was suddenly a bestowal of language on the single individual. So partly my message is Darwinian, trying to argue that language probably evolved gradually, and the gestural argument is part of that, part of the argument that it was a gradual evolution, not a sudden emergence.
SJ: So if we just focus in on this part of the story at a neuropsychological level, and how the hippocampus is really critical in understanding space and our relationship to space. How does the hippocampus fit into this idea that there may be a gestural underpinning to what this vocal language that we engage in?
MC: Well, really the mental time travel argument, the hippocampal argument is a little bit separate. The idea that what language evolved for, whether it’s vocal language or gestural language, language evolved to be able to communicate about the non-present. What happened yesterday, or what might happen tomorrow, or even things that are in your head, experiences. So that’s a somewhat separate argument, I think, the hippocampal argument. It’s known for a long time that the hippocampus is a cognitive map, so there was a famous book written I think in the 1980’s called “The Hippocampus as a Cognitive Map”, so if you do, even in the rat, if you take recordings from single cells in hippocampus, they seem to represent where the animal is located in space. Okay, so it’s almost like a GPS system, the hippocampus, so it also transpired that if you take an animal out of a maze, it keeps on giving recordings for locations where it has been, and even where it might go, so I think it’s now understood the hippocampus is kind of mapping out past trajectories in space and future ones, and that I think is in a way, the basis of mental time travel in humans. So, we also know from hippocampal recordings in humans, through fMRI, that when we think about a past event or a future event, the hippocampus lights up in very specific ways. So that has to do with the role of language in … Well this provides the basis, if you like, for experiences that are not involved in the present, and language has emerged in order for us to tell other people about that. Or people about travels in Europe, or whatever.
SJ: So really, it’s back to the common sense idea that language evolved from a basic need to communicate, and that communication is about, perhaps, where we may have found food in the past, or where it is that we may want to go in the future, depending upon our experiences and our plans for the future, enables us, as you say, this time travel.
MC: Absolutely, and I think that’s what language is really all about. Communicating about things that are not present. If you want to communicate about things in the present, you can point to them, and share experiences, but once you get away from the present, then you need a system of communication, to tell people what you did yesterday, or what you’re going to do tomorrow. And I think that probably emerged in a gestural form of communication, rather than a vocal one, because vocalisations not very good at that, if you think about it. Vocalisation doesn’t really easily address locations in space, or things that happened at different points in time, whereas gesture and the use of space, through gesture, is a more obvious way to do it.
SJ: So what are the sorts of things that are a prerequisite, then, in order to be able to communicate through gesture, our experiences of the past, and then the future? If language, as in vocalised language doesn’t necessarily seem to be a necessary format, that can be achieved through gesture, what other things would have to be in place for that to be effective, for that to work?
MC: Well, I think just having experience of space is one. That’s the first requisite, because that’s what you’re trying to communicate about. And I think the ability to construct space in your head and then use gesture to communicate is a natural way to go about it. Sign language is a good illustration of what is necessary. People using sign language actually construct kind of virtual spaces in front of them where they locate objects and then point to them in a virtual fashion, right? So I think that sort of system grew naturally from the understanding of space itself, and the use of gesture to address that space, and then you can begin to tell stories by constructing virtual objects in front of you that the person that you’re communicating with can see. So, just the use of space, the understanding of space, and the role of gesture and manipulation in space kind of puts the story together.
SJ: And as you’re talking, I’m put in mind of children, and in their development, and how they learn to communicate quite early on through gesture if you’re sensitive enough to pick it up. Some of them are quite obvious, but some of them can be quite sensitive, you’d have to be quite sensitive to pick it up. What are your thoughts around that, because this is often way pre-verbal, any kind of articulation of language that children are able to communicate in this way.
MC: Yeah, I think development kind of maps on to evolution, kids naturally begin by communicating with pointing. Young kids … I think they understand language through pointing before they understand it through words, so they will point to things to communicate their interest in something, and that sort of precedes the actual naming of things with words. And of course, kids with sign language, kids brought up in a sign language environment actually babble in gesture, so it’s much more natural, and earlier, I think, to communicate through pointing and using your body than it is through using sound.
SJ: So one of the other things that we think about with children as well, and some of the things that you’ve talked about, is this idea or theory of mind, so in order to be able to effectively communicate with someone, we have to have some idea as to what’s going on in their minds as well.
MC: That’s absolutely critical, I think. Language is really … People say it’s under represented. Language is hopeless really, it doesn’t work unless you know what another person is thinking. So really what you’re doing is elaborating on their own thoughts by giving hints. So, language is very seldom fully explicit. It’s underdetermined, so I think you’ve got to know what’s going on in the other person’s mind in order to even generate a meaningful sentence that they will understand. I think it’s probably easier with respect to gesture, because then you are directly accessing space, but even when we’re speaking, I think we have to have an intuitive understanding of what’s in the other person’s mind. Like I can say to you, “Hey, that was a great game yesterday, wasn’t it?” I’m talking about cricket, in case you don’t watch it.
SJ: I’m still thinking, is it the women’s cricket, or the men’s cricket he’s talking about?
MC: Well, I was actually watching the men’s cricket, I’m ashamed to say. But we normally talk in a kind of telegraphese, we don’t say explicitly everything we want to communicate about, so I’m just going to say that’s a great game, and what’s going through your mind, I think, is images of that game, so we’ve gotta have this communal imagery, this communal understanding that lies behind what we’re trying to communicate. So, language itself just scratches the surface.
SJ: Yes, and there’s an interesting example that you’ve written about and quoted other people, where people who know each other quite well can just say a few words, and there is an implicit awakening of a shared understanding comes up with those words.
MC: Exactly. Yeah, a couple of grunts will do it.
SJ: So how does gesture fit into that? How does it underpin that, or how do we think differently about how gesture might achieve that?
MC: Well I think simply that gesture does it more naturally, and more obviously somehow. A shrug, or a raise of the eyebrow, or whatever, all of these things are kind of … They’re almost like sentences, but they’re more direct. So somehow you’ve got to understand the words of a language in order to use spoken language to do these things, but gesture’s more natural, isn’t it? Although different cultures gesture it somewhat differently, but I think there’s an awful lot of shared gesture that simply illustrates the naturalness of gesture as distinct from the naturalness of vocalisation.
SJ: Because, I guess, you have the many different languages that are spoken, where some of them share common roots, and many of them do not, and I guess part of that is because of this regional and physical separation, which meant that languages developed differently; but partly there are reasons why languages are quite different from each other as well, and it’s interesting that you’re saying that perhaps there is more of a shared common core within a gestural set across the human species.
MC: Yeah, I think so. At one time it was thought that all sign languages were the same. There was just one sign language. That’s nonsense, too. Sign languages differ, but people who use different sign languages communicate much better than people who use different spoken languages. There’s something like 6,000 different spoken languages, and most of them are mutually incomprehensible. Whereas people who have different sign languages communicate moderately well, and we all resort to sign language anyway, if we’re in a country where they don’t speak the language that you speak. My favourite story is trying to ask for a bottle opener in Russia. The only way I could do that was mimicking the idea of opening a bottle with a bottle opener and pretending to glug it down, they understood that instantly, but I’d never been able to get the idea across using any kind of spoken language.
SJ: And as you’re speaking, I sat there thinking about Washoe, the primate. Was Washoe a chimpanzee? I seem to remember Washoe was a chimpanzee, communicating…
MC: Washoe was, yeah.
SJ: Yeah, communicating in this kind of sign language, or pointing to symbols that they’d been taught to use, in what way does that map on to our human experience and understanding? How much do we know about that?
MC: Well I think the language that was taught to Kansi in particular, and Washoe, I think, was based in part on sign language, on the grounds that that was sort of a natural way to communicate. They of course, early on, had tried to teach chimps to speaks, but that got nowhere at all, and I supposed, I’m not quite sure I can answer that question very well, they also use symbols on a kind of giant iPad kind of thing with Kansi, and communicate by pointing to the symbols. So, it’s sort of natural to point to things, point to things to draw attention to them, and then use them as communicative symbols.
SJ: And did they show evidence that they could mentally time travel as well, in the way that they used those symbols, pointing at symbols and also their gestures?
MC: Yes, I think this … It’s not very good evidence, I don’t think, but sometimes Kansi … Kansi is the champion, I think. He was a Bonobo, actually, not a chimp, but he will sort of point to things and then lead the keeper as it were, to somewhere else in space where something is hidden, so that suggests that when he points to the symbol representing what it is that’s hidden, he has in mind having hidden it a day earlier, or something like that. So there are, they’re a little bit anecdotal I think, cases of communication by chimps using gesture, that refer to something that happened a day before, or something that’s about to happen. “I’m about to take you to where I know something is.”
SJ: Yes. I guess one of the things I’m thinking about, the difference, perhaps, between those gestures that primates and humans may make, and language, is that perhaps people think of, or conceptualise language as having many different building blocks that we can construct in many different ways to produce complex ideas and long strings of narrative that come together to enable us to tell stories, and through these stories, we communicate who we are, where we’ve been, who we might be in the future, and how we relate to others. How does that idea that language is unique in enabling us to do that, verbal utterance of language, how does that map on to the idea that perhaps gestures can do this, too, or perhaps gestures were the genesis of this?
MC: Well. I think the crunch question here is how much stories depend on language, and how much stories depend on what is being communicated. It may be that chimps, and even rats have stories in their heads, but don’t have the ability to communicate them, so one of the precursors then, is having this mental time travel, this record in your head of things that have happened. This is where the hippocampal recordings come in, it looks like the rat can replay in its hippocampus a trajectory that it undertook in a maze a short while ago. And that in a sense is a kind of primitive story, and it’s also known from some of the rat experiments, amazingly, hippocampal experiments, that these locations are also associated with smells or with simple happenings. So in a way, that’s a precursor to a story, but it’s a story in the head, it’s not a story that’s told, so at some point in evolution, I think it became adaptive not just to have records of the past or plans for the future, or things that you’re gonna do, or things that you’re going to relive in your mind. It became adaptive to communicate them. So, I think stories are part what’s happening in your mind, but they’re also part the communication of that. Now the Chompskian view of language is you need … The generative aspect, it comes from language itself. What I’m trying to argue is that the generative language is there as a precursor to language. The generative aspect is the experience itself, the memories, the plans, and all the rest of it. So, you’ve got the stuff in your head, you want to tell somebody else about it, I think the natural way to do it was probably through gesture, because then you can link directly to space by the use of pointing and by the use of mimicking shapes with your hands, and movements of your hands and so forth. Okay, am I being clear?
SJ: I think so. I think taking on from your ideas, and correct me if I’m wrong, is that you have these gestures that you put forward, and somehow, through need or process of becoming familiar, that these gestures became minimised or shrunken, so you didn’t have to go through the whole gesture, because people were familiar enough with it, “Okay, if you do that, then you mean all of this instead.”
MC: Right. Gestures in a way are more elaborate than they need to be, probably, and if you’re going to … To mime a story is quite an effort, it takes energy, it takes movement, it’s probably inefficient, so if you can cut it down, minimise it, you can still create the story by using much simpler devices like spoken words. So, you have to have a system whereby you can map your communicative device onto the story you’re trying to tell, but the important thing is the story itself, that’s where all the generativity is, that’s where all the complexity is, and so forth. And that’s where language itself is quite complex, but the complexity really derives from the story, and not from the language, that’s where I think I part company from Chomsky.
SJ: Okay, so the story then becomes the motivator to communicate, because I’ve got something to communicate about, and then the vocal utterance, the language, becomes a shortcut for the extended mime that tells the story of my physical relationship to this experience that I’ve had.
MC: Exactly. So you’re using these funny little things called words and sentences to try and get the other person’s mind moving in the same direction as your own.
SJ: Right, right. So, as we’re talking, I don’t know why, but Donald Trump is coming to my head, and I’m thinking about his gestural use, and his use of language, and this idea that actually he has a very, how shall we say, unique take on events and things that may have happened in his recounting, and he is very noticeable in his gestural use when you see him talk, he has particular ways of being in his physical self while he’s talking. What do we know about how our non-verbal communication maps onto our verbal communication, given your point of view? Both of these can be happening at the same time.
MC: Yeah, I’m never that convinced of the sharp distinction between verbal and non-verbal. Because people gesture all the time, and they speak anyway, and I think it’s part of the language itself, so we make use of shrugs and pointings, and waving our arms around, which is actually part of the communication system. I don’t think there’s a sharp distinction between what’s verbal and what’s non-verbal. Perhaps to some extent, gestures add emotion that’s not part of the language, but I think the fact that we gesture all the time as we’re talking derives from the fact that language probably was gesture initially, in the first place.
SJ: It’s interesting how we socialise our children, and often you hear people saying things like use your words.
MC: Yeah, don’t point.
SJ: Yes, yes.
MC: Some cultures disallow pointing, I think, it’s very rude to point.
SJ: That’s right, and you use a different sort of a hand gesture instead.
MC: So somehow we’re being taught, perhaps in different cultures in different degrees, taught to suppress their pointings and their movements, and use words, but I think in a way, the pointing is natural. And at some point in evolution, was probably more pointing than words, then vocalisations.
SJ: So if it makes … If it doesn’t make sense, we need to separate out this idea of this division between non-verbal and verbal behaviour, actually they’re all part of the same system, and you need to understand people, you look at that in a coherent way, a cohesive way. What’s the point of this line of thought? Who should care about this, Michael? When we’re thinking about the implications of what you’re saying, how does this move us forward in different ways? How should we be thinking about communicating with people, with each other?
MC: Now that’s a trick question. I don’t know, I think simply recognising the importance of gesture and the total communication system is important, whether it’s important to consider whether we should suppress it or not. Our culture perhaps does suppress the kind of gestural components. There are big cultural differences here for a start. The Italians are famous for gesturing as they speak, so gesturing’s a very important part of the culture in Naples. There’s something about buttoned up English culture that sort of suppresses gesture, but I don’t know that I have a moral position on this in particular, it’s just there, isn’t it? It’s something that some cultures do and some don’t.
SJ: It is, it is just there, it’s an interesting … It would be an interesting question to understand a little bit more about why some tended to … I don’t know if suppress is the right word, but discourage gestures as opposed to language, or whether one is seen as superior to the other.
MC: Yeah, I think we’re taught to think that spoken language is superior and the mark of sophistication and all the rest of it. I think sign language, for example, for a very long time got a very bad rap, as though it was somehow crude and it was not proper language. One of the things that’s come out over the last 50 years or so is that sign language is real, it’s a real language. It has grammar, it has sophistication, and it can be quite beautiful. So I think this partly, a kind of prejudice against gesture, as if people who gesture are not using language properly. I think they probably are, and I think we have to try to understand language in that broader context. Gestures are a natural part of spoken language, of our own language, but it’s also all of sign language, so I think just the recognition that this is what language is, rather than some sort of extremely complex high level thing that’s purely spoken and just uses spoken words. So, I think that’s part of the deal, trying to see language as broader than just the rather pretentious thing that linguists have built up. I got a bit of a thing about linguists, maybe. There’s a sort of snobbery associated with speech, as though embellishing it with gestures is kind of crude, and unsophisticated.
SJ: … I was just thinking about where we started off this conversation.
MC: Yeah, goodness knows where all that came from.
SJ: No, I think it’s been a really fascinating conversation, a little bit wide-ranging, but I’ll just bring you back to the idea that you were saying that perhaps it’s about 50/50 at the moment, as to the degree of support as to whether people think that we have this gestural basic underpinning of where language comes from, or as a base of language, as opposed to this kind of big bang, one particular moment in the last 100,000 years, where this one individual came along that was able to do this, and all languages come from that. Where is this debate at the moment? In what direction is it moving?
MC: One gets a bit biased by the people you talk to. I go to conferences, and I do the stuff, and I get … Probably most people are reasonably sympathetic, but then I realise there’s a bunch of hard-core people out there who won’t buy it at all. One of the problems is the notion that switching from a visual mode to an auditory one just seems too extreme. Going from sight to sound just doesn’t seem plausible, so that’s probably the most compelling argument, that somehow, in the course of evolution we shifted from a visual modality to an auditory one, so some people simply can’t buy that in neurophysiological or neurological terms. So, then I have to argue that in fact there’s a very close connection between what we do with our hands and what we do with our mouths. So part of my argument is that speaking itself is gestural. What we are doing, we’re sort of making gestures with our mouths, with our larynxes, with our tongues, and there’s a natural connection between the hand and the mouth anyway, it comes from eating, among other things. So, really it’s not so much a switch from vision to audition, from sight to sound, as it is a blending from one form of gesture to another. Gesture that was with the hands and face, but then increasingly became the face and less the hands. That’s one of the critical questions, I think. Why would language shift so radically from the visual system to an auditory one, and so that’s one of the sore snags in the gestural argument.
SJ: Speaking as a clinician, and I guess this is why I thought it would be good to talk to you, is that this resonates with me, and that I remember as a young learner … Well not so young, but as a learner clinician, one of the things that I got fed back on was that I tended to use the whole of my body to communicate, and that I was, when I was in a clinical situation, I was somehow switching this off, and I was becoming very verbal, and this was affecting my effectiveness as a clinician. Some of my supervisors who would sit in with me would notice this. So there was some kind of value, particularly when we’re talking about talking therapies that is given just to talking, and I was starting to change who I was because I was prioritising talking, whereas actually, if I allowed myself to bring a bit more of the whole of me to any kind of interaction in the clinical setting, then I became more effective. So I wonder how much I do screen myself, and be very matter about it and stick to language, whereas actually I might be much more of an effective communicator if I let go of that a little bit.
MC: Yeah, there’s something a little bit buttoned up about speech, isn’t there, really? It happens in the mouth, it’s all …I like to think of it … Speech is minimalist. It’s miniaturisation, so it buttons you up, alright. Whereas if you use gesture along with your speech, which is perfectly natural, you’re revealing more, you’re perhaps getting at more, aren’t you? People talk about this as non-verbal communication, as though it’s separate, and you should watch what people do, but I think it’s part of the communication process in general. So, by just restricting yourself to speech, you’re kind of buttoned up and slightly closed down.
SJ: Yeah, and I think that probably also has implications to how we hear other people, too, by only hearing the vocalisation, rather than attending to the whole, rather than, as you say, I’m not bifurcating this and that. I’m looking at the whole and experiencing a person as the whole, rather than just their speech, or just their gestures. Then I’m getting a different picture.
MC: There are a number of people, by the way, who kind of argue that gesture and speech were there all the time. My argument is that it began with manual gesture, and became increasingly miniaturised and located in the mouth, but there are other who argue quite plausibly, I think sometimes, that it always was this way. In other words, there was vocalisation and gesture, and they belong naturally together. That’s one of the arguments I sometimes get, that it’s not gesture first at all, it’s that gesture was always there and always will be.
SJ: And what’s their premise for that argument, that they both existed at the same time, they always have?
MC: It’s not a very good argument in some sense, I think they base it primarily on studies of people gesturing while they’re speaking, and the close connection in terms of timing between the way the hands move and the way vocal utterances are made. I don’t think they really look back at what chimpanzee communication is like, because clearly in a chimpanzee you can’t teach a chimp to talk, but you can teach it to gesture. And all of the success with chimpanzee communication has been related to gesture and not to vocalisation. So, I think they’re really trying to extrapolate backwards for what they see people doing in natural speech using gesture, so I try to educate the people that argue with me on those grounds, on the basis of what you can do with a chimpanzee.
SJ: So, I guess I’m just thinking about our conversation and winding us up a little bit now. One of the things I learnt from reading some of your work, Mike, is that perhaps language isn’t as special as we think it is. Perhaps the experience, at least the internal experience of what the motivator for language is may be more common than we think.
MC: Absolutely, I think that’s what I’m trying to say. I’m trying to argue against the specialness of language, that it comes out of natural human behaviour, natural things like memory, like time travel, like bodily movement. So what I’m indeed trying to argue for is evolutionary continuity, that this has all got to do animals that move, and animals that move have experiences in time and experiences in place, and gradually, over the course of the millennia, we’ve developed ways to communicate this with each other, but it’s still presently. People have done studies of chimpanzees in the wild. They sort of tell stories, and they play. Animals play. They generate sequences of events, they communicate to some extent through movements, their own movements and their own gestures. There was probably a bit of discontinuity with things like bipedalism, which frees up the body a bit more, whereby you can get more elaborate kinds of communications of what’s in your mind, but I don’t buy the argument that all this happened 100,000 years ago. I think it’s sort of there in animal behaviour, and in particular in primate behaviour, because primates are fairly capable of making expressive movements with their hands and bodies more than, say, a cow is. So I kind of like to see this, as you say, as it’s been there all the time, really. We’ve kind of built it up to a fairly sophisticated degree in our own species, although we don’t really know much about what happened in the last 6 billion years, since humans and chimpanzees went their different ways, but the notion that it all happened 100,000 years ago seems to me to be fairly minimal. It just doesn’t make sense to me. I’m not really terribly sure about any of it, to be honest. You keep trying to make the case, and people have different arguments, but I think there’s a huge sort … It’s partly religion, I think, it’s all got to do with the notion or the attempts to prove that humans are somehow special. And I think that’s kind of important, because we like to put down animals, we like to put down anything that’s not sophisticated in the sense that human language is, so we kind of … From the Bible on, really, language is the definition of what is special about humans. The one thing that we can be sure that we seem to … Or we think we’re sure about that we seem to do differently, is talk. It goes back to Descartes, it goes back to the Bible, it goes back to language being given to Adam as a special privilege, and so I think that overrides a hell of a lot of this. The notion that language makes us human, other animals don’t have it, that makes us superior. It’s probably got to do a lot with the fact, with a kind of guilt over the way we treat other animals. We eat them, and we ride on them, and we exploit them in goodness knows how many ways, so we have to have the notion that we are superior, that they don’t have feelings, and all the rest of it. So I think that kind of overrides the whole thing in a way, and language is right at the centre of it.
SJ: It sounds almost like a post-hoc rationalisation…
MC: Yeah, exactly, it’s a kind of rationalisation. It’s sort of hard to break down, I think.
The post Is human language underpinned by gestures? appeared first on Sarb Johal.
One Response to “Is human language underpinned by gestures?”
• I can imagine in our ancestral savannah homelands, open spaces dotted with copses of trees when we needed to move from one to the other we would be pretty vulnerable to predation. Gestural language with our hands and body language in general would be valuable. Modern hunters use hand gestures in mixed cover. Note also in modern group urban environments we use eye attention and gestures in the name of discretion. Purely oral language is enforced when social and group control is being enforced. Gestural language is often reserved for subversive communication.
Note also that the two species that socialise naturally with humans, cats and dogs, use body language and understand eye attention.
|
global_01_local_1_shard_00001926_processed.jsonl/27895
|
Official site of author and historian Sean Munger.
Double Perigee, Episode 2: “Rough Night.”
Click to Play!
Dejected that his best friend will be leaving him, Raljebi goes in search of a drink on Algeron’s squalid second moon. At the only dive bar on the moon that will serve humanoids, he unexpectedly crosses paths with three drunk Menkarian merchant mariners who are intent on demonstrating just how much they hate Caprionese. The encounter leads to Raljebi’s sudden change of heart about Quilq’s plans to join the protest movement.
Written and performed by: Sean Munger
Original music: George Kay
Length: 15 minutes 47 seconds
(April 28, 2018)
Show Notes
This episode was the second half of the original “Goodbye, Algeron” short story from 1993. Although the story was originally written before I went there, the “Club Q” bar in this episode instantly took on the look and atmosphere of a real-life dive bar, specifically catering to college students, just next to the Tulane University campus. I’m talking about The Boot, which is every bit as depressing and divey as Club Q in this story.
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/27900
|
410 Gone
410 gone
A 4xx status code means that it is likely that a request error has prevented the server from correctly processing the request.
Specifically, a 410 error code means that the page does not exist. The error code is displayed when content has previously been located at the specific address that has been requested, but is no longer there.
How search engines interpret 410 errors
Search engines like Google will often revisit URLs that are linked to that report 404 errors. They do this to ensure that the page has not come back online at a later date and now reports a different status code. After all, there is still a link to that particular page, so Googlebot will follow it, finding and revisiting the relevant pages.
410 errors are a different situation. If Googlebot encounters a 410 response, it will not attempt to revisit the URL, even though external links continue to link to it.
410 is accepted as a permanent URL deletion
The 410 status code is the correct code to use for deleted content if you have no other relevant page to redirect the user to.
Google recommends the use of 410 status if you want to quickly delete a URL from your index and you do not want to use a noindex tag or the URL removal tool that is part of the Google Search Console.
The problem with “410 gone”
Landing on a page that reports a “410 gone” status is not conducive to a positive user experience. Usually, it would be better for the user to land at a comparable page elsewhere on the website.
However, there may be instances where visibility is undesired, or where you do not want a page to be visible to the Google index, or on your website. If so, 410 is the correct status code to use.
You should not link to a 410 gone, as this will direct the user to a negative experience on your website. Therefore, it is important to update internal and external links to that particular URL.
External links pointing to 410 gone URLs provide no link value to your website. Accordingly, if you have many 410 pages to which external links direct, you should as far as possible try to reactivate the page at the relevant URL, or redirect it to an active URL.
How should you deal with 410 gone pages?
As with other error pages, 410 error pages need first of all to be identified and action must then be taken , on the pages which report 410 errors.
There may be scenarios in which a former webmaster has decided to use a 410 gone, but where you at a later time to find out that you want to reactivate the content that was previously available at the URL.
In such cases, you should reactivate the URL and place the content back on the page. Internal links should then be reactivated again so that the page is properly crawled. If external links direct to the relevant page, the link value from these links will once again begin to count towards the total account for your domain’s overall authority.
It can therefore also be a good idea to scan your website to find 410 gone pages which could instead be activated. 410 gone pages may also have been configured by mistake, or by a webmaster who did not understood the consequences of setting this status.
Leave a comment
|
global_01_local_1_shard_00001926_processed.jsonl/27909
|
loading, one second please...
Tommy Smith's Facebook Marketing
Reviewing: Tommy Smith Facebook Marketing Success Ebook | Rating:
John Barnes By John Barnes on
Growing up, I spent much of my time browsing Facebook aimlessly, socializing and catching up with friends, and sometimes wondered why no-one had taken advantage of Facebook's high traffic to advertise their products or services. After trying out Tommy Smith's Facebook marketing secrets ebook for free, and enjoying it, I felt confident enough to buy his 'Facebook marketing success' ebook. The ebook boasts that it will have you understanding and using Facebook to successfully market your product or service in as little as 30 days, in 4 simple lessons, for just $27.
While that may seem a little steep, I found it incredibly rewarding, as I'd hoped. There are 4 lessons, each covering a variety of information. Each lesson is split into many subheadings, such as explaining how third-party apps are used, or how to use Facebook events to advertise your product or service. I found it very helpful, as it gave me a detailed insight into how Facebook works, which is relevant to just about anyone today, and is also very useful if like me you want to boost the daily views your website receives. It goes into further detail about how people use Facebook, and how you can use this knowledge to your advantage. A negative point is that it splits all Facebook users into 2 groups, from a business point of view, this is halving your target market - a horrible move, yet I believe this is the only downside to an excellent ebook.
Haven't you ever wondered why people keep coming back to Facebook, and what ads are the most popular ? I truly believe this guide goes through it all, and despite limiting all of its information to one single website, it delves into many key areas of internet marketing, psychological habits and more. I believe the $27 price a steal, as there is much to learn If you share the passion I have for computers, Facebook, or if you're just a little curious, I recommend it!
|
global_01_local_1_shard_00001926_processed.jsonl/27910
|
Speaking of time management, there’s a new Fantastical app out and, well, it’s fantastic.
I’ve been using Fantastical for Mac since before it shipped, and it is hands down one of my most-used and favorite apps. It’s such an awesome blend of helpful and delightful.
The new version is a serious upgrade. It rocks a very handsome, Yosemity-ified look, a full-on (non-Menu Bar) Calendar app, Calendar sets, and a slew of new features.
Fantastical 2 for Mac is on sale for 20% off right now. If you’re a Fantastical user, it’s a worthwhile upgrade. If you’re new to Fantastical, you’re in for a treat.
Fantastical 2 for Mac
|
global_01_local_1_shard_00001926_processed.jsonl/27912
|
BEA WebLogic may reveal script source code by URL trickery ---------------------------------------------------------- Sverre H. Huseby security advisory #2, 2001-03-28 Systems affected ---------------- WebLogic 5.1.0 SP 8, and probably earlier versions. Description ----------- BEA WebLogic may be tricked into revealing the source code of JSP scripts by using simple URL encoding of characters in the filename extension. Details ------- It seems that the built in web server in WebLogic does URL decoding in an unreasonable order. URLs like the following where %70 is an URL encoded 'p', returns the source code of index.jsp rather than running the script on the server side. To speculate (read: guess): The JSP handler is skipped as this URL does not end in ".jsp", but the static file handler is nevertheless able to map the URL into a correct file name. Impact ------ This design error makes it possible to fetch the source code of JSP scripts. Such source code may contain database passwords and file names, and may reveal design errors or programming bugs that make it possible to further exploit the server or service. Reported by Sverre H. Huseby,
|
global_01_local_1_shard_00001926_processed.jsonl/27917
|
The Man Behind the Goal
• Click to enlarge
The Man Behind the Goal
Tap to enlarge
By Brian Glanville
The Man Behind The Goal is a new collection that brings together the best short stories, many out of print for a while, by the acclaimed football writer Brian Glanville. The subjects include embittered managers raging against their foes, the shady world of the hanger-on, bewildering transfer negotiations in Italy and the coaching theories of eccentric amateurs. As Harry Pearson writes in the introduction: “Most are set in the Britain of my childhood, a slightly seedy place of mist and dampness... This is a world of players named Jimmy and Ron, agents who lived above suburban sweet shops, wild nights of light ale that end when the pubs shut at 11... Sympathy is with the losers, however ill-suited for it they may at first appear.”
Product code235
This field is required
|
global_01_local_1_shard_00001926_processed.jsonl/27920
|
@revista_internacional{345, author = {Carlos Porcel and álvaro Tejeda-Lorente and María Angeles Martínez and Enrique Herrera-Viedma}, title = {A hybrid recommender system for the selective dissemination of research resources in a technology transfer office.}, abstract = {Recommender systems could be used to help users in their access processes to relevant information. Hybrid recommender systems represent a promising solution for multiple applications. In this paper we propose a hybrid fuzzy linguistic recommender system to help the Technology Transfer Office staff in the dissemination of research resources interesting for the users. The system recommends users both specialized and complementary research resources and additionally, it discovers potential collaboration possibilities in order to form multidisciplinary working groups. Thus, this system becomes an application that can be used to help the Technology Transfer Office staff to selectively disseminate the research knowledge and to increase its information discovering properties and personalization capacities in an academic environment.}, year = {2012}, journal = {Information Sciences}, volume = {184}, pages = {1-19}, publisher = {Information Sciences}, issn = {0020-0255}, doi = {http://dx.doi.org/10.1016/j.ins.2011.08.026}, }
|
global_01_local_1_shard_00001926_processed.jsonl/27922
|
Clive Newstead · Home· Teaching· Book· Talks
Foundations of Higher Mathematics (Math 300) — Fall 2018
Welcome to Math 300! As its name suggests, this course will introduce you to the fundamental mathematical concepts and skills that you will need to study mathematics at a higher level than a typical introductory calculus and linear algebra sequence. We will emphasise both problem-solving and proof-writing skills, including typesetting mathematics using LaTeX.
Most administrative aspects of the course will be handled using Canvas.
Time and place. Class meets MoWeFr 9:00–9:50am in Tech MG51. Discussion meets Tu 9:00–9:50 in Tech MG51.
Syllabus. You can download the course syllabus here.
Textbook. Our textbook will be my book-in-progress, An infinite descent into pure mathematics, which can be downloaded for free here.
Homework. Homework assignments will be due at the beginning of class on Wednesdays—they can be downloaded from Canvas.
Examinations. There will be a midterm exam and a final exam.
Course calendar
|
global_01_local_1_shard_00001926_processed.jsonl/27937
|
Just add a blanket and a steaming mug of hot cocoa…
Today’s topic: books for girls. I know. There’s no such thing as books for girls. Books are books, right? But…let’s be honest. You just reach a time in your life when you have questions and there’s nothing like a good book to remind you that this road to adulthood is well traveled. Here are ten books that I recommend to middle school girls when they need to remember that they are not alone:
Speak by Laurie Halse Anderson
What I Saw and How I Lied by Judy Blundell
The Sisterhood of the Traveling Pants by Ann Brashares
Waiting for Normal by Leslie Connor
A Northern Light by Jennifer Donnelly
The Secret Life of Bees by Sue Monk Kidd
Saving Francesca by Melina Marchetta
Jacob Have I Loved by Katherine Paterson
A Tree Grows in Brooklyn by Betty Smith
Elsewhere by Gabrielle Zevin
Tomorrow…10 Books for Middle School Boys
|
global_01_local_1_shard_00001926_processed.jsonl/27957
|
I have the following C++ code:
#include <math.h>
#include <cmath.h> // per http://www.cplusplus.com/reference/clibrary/cmath/abs/
// snip ...
if ( (loan_balance < 0) && (abs(loan_balance) > loan_payment) ) {
and make blows up on:
error: call of overloaded 'abs(double)' is ambiguous
also of interest:
/usr/include/stdlib.h:785: note: candidates are: int abs(int)
How can I specify that the compiler needs to call the abs() in cmath.h that can handle floats?
Compiler info (Not sure if this matters):
[some_man@some_box ~/some_code]# gcc -v
Using built-in specs.
Target: i386-redhat-linux
Thread model: posix
gcc version 4.1.2 20080704 (Red Hat 4.1.2-44)
The header <math.h> is a C std lib header. It defines a lot of stuff in the global namespace. The header <cmath> is the C++ version of that header. It defines essentially the same stuff in namespace std. (There are some differences, like that the C++ version comes with overloads of some functions, but that doesn't matter.) The header <cmath.h> doesn't exist.
Since vendors don't want to maintain two versions of what is essentially the same header, they came up with different possibilities to have only one of them behind the scenes. Often, that's the C header (since a C++ compiler is able to parse that, while the opposite won't work), and the C++ header just includes that and pulls everything into namespace std. Or there's some macro magic for parsing the same header with or without namespace std wrapped around it or not. To this add that in some environments it's awkward if headers don't have a file extension (like editors failing to highlight the code etc.). So some vendors would have <cmath> be a one-liner including some other header with a .h extension. Or some would map all includes matching <cblah> to <blah.h> (which, through macro magic, becomes the C++ header when __cplusplus is defined, and otherwise becomes the C header) or <cblah.h> or whatever.
That's the reason why on some platforms including things like <cmath.h>, which ought not to exist, will initially succeed, although it might make the compiler fail spectacularly later on.
I have no idea which std lib implementation you use. I suppose it's the one that comes with GCC, but this I don't know, so I cannot explain exactly what happened in your case. But it's certainly a mix of one of the above vendor-specific hacks and you including a header you ought not to have included yourself. Maybe it's the one where <cmath> maps to <cmath.h> with a specific (set of) macro(s) which you hadn't defined, so that you ended up with both definitions.
Note, however, that this code still ought not to compile:
#include <cmath>
double f(double d)
return abs(d);
There shouldn't be an abs() in the global namespace (it's std::abs()). However, as per the above described implementation tricks, there might well be. Porting such code later (or just trying to compile it with your vendor's next version which doesn't allow this) can be very tedious, so you should keep an eye on this.
Its boils down to this: math.h is from C and was created over 10 years ago. In math.h, due to its primitive nature, the abs() function is "essentially" just for integer types and if you wanted to get the absolute value of a double, you had to use fabs(). When C++ was created it took math.h and made it cmath. cmath is essentially math.h but improved for C++. It improved things like having to distinguish between fabs() and abs, and just made abs() for both doubles and integer types. In summary either: Use math.h and use abs() for integers, fabs() for doubles or use cmath and just have abs for everything (easier and recommended)
Hope this helps anyone who is having the same problem!
Use fabs() instead of abs(), it's the same but for floats instead of integers.
• 6
that's not really accurate in the std namespace, where abs is overload for float, double etc. – Flexo Sep 14 '11 at 12:32
• fixed gcc6 error: call of overloaded ‘abs(uint32_t)’ is ambiguous – Sérgio Jul 4 '16 at 2:51
• @Sérgio I think you should just remove the call to abs, since uint32_t is unsigned. (Instead you're implicitly casting uint32_t to double for fabs(double) and then I assume casting the result back to an integer!) – Raptor007 Nov 17 '16 at 3:05
• I don't remember where I used this patch, I can't find where either, I looked in google, but I agree with you ... I'd like review this gcc6 fix Thanks. – Sérgio Nov 18 '16 at 3:01
Your Answer
|
global_01_local_1_shard_00001926_processed.jsonl/27959
|
Log in
No account? Create an account
Writer's Block: Down on Memory Lane - Redhead Rantings [entries|archive|friends|userinfo]
[ userinfo | livejournal userinfo ]
[ archive | journal archive ]
Writer's Block: Down on Memory Lane [Feb. 11th, 2009|07:27 am]
[Tags|, ]
[Current Mood |nostalgicnostalgic]
What is your earliest childhood memory?
I remember being a toddler in our Auburn house and walking to the door to see Daddy off to work. He had this hard sided lunchpail and thermos he always took with him to work. This was before he went downhill and things were in turmoil and he would yell for no reason, so all of my memories of the Auburn house are filled with happy. I just think with so many kids under 5 (3 kids) it was too busy for him to yell over nothing. I like those memories. I shared a bed with my sister and we would always touch feet while we sleeped. She was a good big sister and made sure no monsters could get me.
[User Picture]From: puppie
2009-02-12 02:25 am (UTC)
My first memory is of watching tv. I was watching President Jimmy Carter disembark from an airplane and wave at the crowd with his giant smile full of giant teeth.
What a weird-ass first memory, eh? :-D
(Reply) (Thread)
[User Picture]From: starrynytes4me
2009-02-12 02:27 am (UTC)
Those are some giant teeth. You are lucky to not have fear of horses.
(Reply) (Parent) (Thread)
|
global_01_local_1_shard_00001926_processed.jsonl/27962
|
Personal growth and accepting that I’m “enough”
Right now I’m procrastinating. I have work I would like to do, or at least I think I should do. Work that I want to do that would help me grow. And yet, I’m not motivated to do it. Why is that? Is it that I feel I’ve already done enough work? That pushing myself more would be detrimental? That I should accept that I will want to play video games a certain amount of hours a week?
Oh sure, I know I need to accept that I’m enough and I’m working enough and doing enough learning and the like. But is that true? Or more accurately how do I know and find that balance? Mark Manson mentioned in an AMA that he feels the answer is to focus on specific things in your life one at a time. I understand the appeal of that. It’s how I focused on getting healthier for the last few years (with great success).
But if that is the answer, then I guess it means figuring out and prioritizing what I want to achieve. Something I know I should do, but still not easy.
One thought on “Personal growth and accepting that I’m “enough”
1. Thanks for sharing this. In the first few episodes of Scandal (yep, self-help from Olivia Pope) she keeps saying to people, “What do you want?!” I hear myself asking that every once in a while – it’s a harder question to answer than it seems.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/27982
|
If you have lost or forgotten your Ooma Office password, it can be recovered by the Account Administrator by following these steps:
1. Visit the Ooma Office Manager at http://office.ooma.com and click the “password reset” link at the bottom:
reset password
2. Enter the Ooma Office phone number and the email address that is on file for the account administrator.
3. A new password will be emailed to that address shortly.
4. When access to the account is regained, don’t forget to follow the “Changing your account password” instructions to update your Ooma Office password!
|
global_01_local_1_shard_00001926_processed.jsonl/27986
|
Perusall automatically groups students in the course into smaller "discussion groups," by default with about 20 students. Students will only see the comments of other students in their group, plus any threads that an instructor has started. This is to ensure that:
1. Students see enough comments so that they can get into a good discussion of the text.
2. Students don't see too many comments that it is overwhelming to read and process.
Each document has a different set of groups formed, so students have an opportunity to interact with different people over the course of the semester. Groups for a particular document are fixed once the document is uploaded, to ensure students have a consistent view of each document.
The number of groups formed depends on the enrollment estimate and target group size, both of which can be updated through the course settings. However, note that since the groups are fixed, changing these settings will not affect the groups for any documents already added to the course; they will instead take effect going forward for any documents uploaded after that point.
As a consequence of this, if a student is the first one in their group to comment on a particular document, then they won't see any other comments in the document even though other students in the class may have also started commenting. This is normal; they should start to see other students' comments as others in their group start reading and commenting on the document as well.
Reviewing student groups
To see the groups that students have been placed into:
1. Click on Course Setup > Readings.
2. Click to highlight a document in the Documents panel, and then click the Groups button in the toolbar.
Automatic vs manual groups
If you prefer to manually place students into groups, you can do so under the Grouping Options tab of the course settings. Here you can manually assign students to groups by entering a group number next to each student in your roster. For example, to place students A, B, C, and D into two groups, you could assign students A and B to group 1 and students C and D to group 2. Students that enroll in your course after you set the groups will be placed into one of the groups at random, but you can change this in the Grouping Options at any time.
Changing grouping options
Be careful when changing the grouping settings for a course: since students only see the comments of others in their group, a change mid-course could be confusing to students since they will see a different set of comments when reopening a document after you have made the change. In particular, it is possible that a student may no longer be able to see one of their own comments in the document; if student B responded to a comment by student A and then those two students were later placed into separate groups, student B would no longer be able to see her response because she would no longer see student A's comment.
You can always change from automatic to manual groups, or change the manual grouping at any time.
As described above, the automatically-generated groups for a particular document are fixed once the document is uploaded, to ensure students have a consistent view of each document. If you want to change from manual to automatic groups and force Perusall to regenerate its automatic groups (e.g., you may want larger or smaller groups):
1. Go to Course Setup > Grouping.
2. Switch to the manual grouping option, click the link to place all students into one group, and click Save Changes.
3. Now switch back to automatic grouping, and click Save Changes again.
|
global_01_local_1_shard_00001926_processed.jsonl/28003
|
Telemus Special Report – January 23, 2015
In Adam Smith’s An Inquiry into the Nature and Causes of the Wealth of Nations, the 18th Century philosopher speaks of the division of labor and free trade, the limits of government intervention, price discovery and the importance of the free market, all of which were theories that many believed transitioned economics to the “modern” and spawned Capitalism. Much of Smith’s work informs that which we are experiencing today in the financial markets: government intervention in the form of quantitative easing, falling interest rates, the precipitous fall of energy prices and other industrial commodities, and most recently, extreme volatility in currency values. Adam Smith explains price discovery is the natural process by which buyers and sellers solve the supply and demand equation to arrive at a “market” price. In the case of the Swiss franc, government intervention was lifted and price discovery was immediately found at a 20% uptick.
Switzerland’s culture of bank secrecy, which dates back hundreds of years and was codified in 1934, has made Swiss banks in Geneva and Zurich safe havens for the ill-gotten wealth of “bad guys” for decades. Switzerland’s bank secrecy laws are, in no small way, responsible for this tiny country’s ability to maintain their neutrality and national sovereignty. Swiss neutrality, even through two World Wars, allowed the Swiss banking sector to thrive throughout the years. Switzerland’s central bank, the Swiss National Bank (SNB), has historically been an able steward of the country’s finances with virtually zero inflation and the legal requirement that a minimum of 40% of the total outstanding currency be backed by gold reserves. Accordingly, the Swiss franc has long been recognized as the most stable of currencies. So much so that as the Great Recession spread to a global financial crisis, worried wealth from across the globe began to migrate to the Swiss franc pushing the currency to new highs and causing worry for the export-driven Swiss economy.
When the euro zone debt crisis developed, the Swiss franc soared in value relative to major currencies. In September of 2011 the SNB sought to mitigate the rise by fixing its currency against the euro at a rate of 1.2 Swiss. Within minutes of the SNB action, the euro, the dollar and the pound sterling appreciated 8-9% against the Swiss franc – a move that was described at the time by one experienced economist as the “single largest foreign exchange move I have ever seen.” Enforcing the franc/euro peg required the SNB to buy currencies in unlimited quantities, and so they did. Over the ensuing three years, the SNB expanded their balance sheet five-fold by printing Swiss francs to amass an ever increasing mound of euros. By 2014, this amounted to $480 billion, a sum equal to roughly 75% of Swiss GDP. Suddenly, the staid bankers of Switzerland, renowned for prudent fiscal stewardship, were huge owners of a depreciating foreign currency to which their own currency was pegged. The SNB now knows that there is a limit to unlimited quantities, and apparently the limit is $480 billion.
The European Central Bank(ECB) announced a major quantitative easing program this week, a move that will likely drive the value of the euro even lower, and the SNB chose to capitulate to the inevitable by abandoning the franc/euro peg. Now that the Swiss franc has been unhinged from the depreciating euro, the spring-loaded value of the franc sits 18% higher than one week ago, and the Swiss stock market is 13% lower. The short term impact of the SNB decision will be problematic for the Swiss economy, but will likely be better for their economy in the long run. In the meantime, the SNB will lick their wounded reputation as they reread the writings of Adam Smith and reacquaint themselves with the free market and the process of price discovery.
So what happens now? A combination of the coming ECB quantitative easing program and the Swiss no longer buying euros will likely further depress the value of the euro relative to most major currencies. Moreover, interest rates are likely to move lower across the board including rates that are already negative. We now have an active discourse on “negative interest rate policy,” something that has been largely theoretical and without actual practice. We do well to remember that quantitative easing on the scale seen in the US, in Japan, and soon in the EU, are monetary experiments designed to combat deflationary pressures, and the results are unknown. Financial markets like predictability, and “unknown” doesn’t reconcile with “predictable.” Accordingly, we are likely to see heightened volatility as the financial markets navigate deflationary terrain.
We have meaningfully reduced our international exposure and have allocated assets to intermediate and longer dated treasuries, both of which help to mitigate the risks of the current environment.
|
global_01_local_1_shard_00001926_processed.jsonl/28025
|
"I don't think I'll come back from this.I'm not made for the world."
I want to tell him he's wrong. That to me, he's one of the strongest people in existence. Now more than ever. But I know he won't believe me and, even if he did, he wouldn't relate to the sentiment in any way that made things better for him. My desperation for him to stay in my life just triggers guilt and hints of buried resentment.
I want to tell him that we can still do this. We can get the resources to everything we hope for and more. We can change the world in small but tangible, systemic ways for ourselves and so many more people. I'm just not sure if I can believe it fully anymore.
I fall asleep refining our plan and calculating budgets, scheming out the steps toward passive income so we can start a community center. I fantasize about wrangling kids programs while he gives speeches that pull people together a few blocks at a time. I imagine having an office and more people invested in the mission. I think of the kids with nothing to go home to, the mothers who don't know how they'll get to work, the felons with no hope of house or job, and I see all of us building the means to make our own money. Build profit for our communities rather than bankers.
But then morning comes, the sounds of weedwhackers and passing cars already vibrating the air, the rising sun starting its gradual daily process of boiling my organs. My bladder aches on the quarter mile walk to the nearest public restroom, and the mirrors there that won't let me forget how quickly I'm aging now. I look more homeless each day and find it continually harder to care. I wash my hair in the sink there and hastily change clothes while trying not to let anything touch the dirty floor. And then I go to work doing customer service for a wage that would be livable in another place. Each moment just barely sustains itself. There's nothing to move forward with and no reason to believe that will be different soon. How can I ask him to hold on when the only thing he wants from the world is so far away? If we make a wrong move, we sink down another level of poverty. From there, there's no getting back up.
So we leave again. Instead of continuing this cycle until we spiral out, we leave in search of another chance. I just hope we can make it, and I hope that he's still able to care when we get there.
I used to think he needed this more than me, but now I'm not sure. I just know I can't do it alone.
|
global_01_local_1_shard_00001926_processed.jsonl/28028
|
200 Million WhatsApp Users Vulnerable to vCard Vulnerability
WhatsApp recently claimed to have hit 900 Million monthly active users, but a dangerous security flaw in the web version of the popular instant messaging app puts up to 200 Million of its users at risk.
Yes, the web-based extension of WhatsApp is vulnerable to an exploit that could allow hackers to trick users into downloading malware on their computers in a new and more sophisticated way.
WhatsApp made its web client, WhatsApp Web, available to iPhone users just last month, after first rolling out its web-based instant messaging service for Android, Windows and BlackBerry Phone earlier in the year.
Similar to Facebook Messenger, WhatsApp Web is an effective way to experience the mobile app in a web browser, allowing you to view all of the conversations you have made with your friends – including images, audio files, videos, GPS location and contact cards – straight on your PCs.
However, a security flaw discovered by Check Point's security researcher Kasif Dekel could allow hackers to compromise your machines by distributing malware including:
• Remote Access Tools (RATs) – Give hackers remote access to the victim's PC
• Ransomware – Forces victims to pay a ransom in order to regain access to their systems and personal data
• Bots – Cause the machines to slow down to a crawl
• Other malicious software
Here's How the WhatsApp Exploit Works
In order to exploit the vulnerability, all an attacker needs is to send a seemingly innocent vCard contact card containing a malicious code to a WhatsApp user, and, of course, the target's phone number.
"To target an individual, all an attacker needs is the phone number associated with the [WhatsApp] account," Oded Vanunu from Check Point wrote in a blog post on Tuesday.
According to the researcher, it is easy for anyone to create and send a .BAT file as a legit vCard that looks like any other message from a friend, but actually triggers a malicious code when clicked.
Once the vCard is opened in WhatsApp Web, the executable malicious code in the card runs on the target machine, further leaving the infected machine open to other attacks that could:
• Take complete control over the target machine
• Monitor user's activities
• Use the target machine to spread viruses
The flaw affects all versions of WhatsApp before V0.1.4481. So, users are advised to make sure that they are running the fully updated version of WhatsApp.
|
global_01_local_1_shard_00001926_processed.jsonl/28064
|
Crash Course in Italian
The picture of the Grand Canal was shot from the Rialto Bridge, around 6:00 am to give Venice the look of an old movie set with the empty balconies and the deserted canal. The Montage was made by combining the famous Trevi fountain in Rome, which I shot a few days later, to give the image a surreal scenario of Gondoliers going down a waterfall in total control, for the more adventure seeking tourists.
|
global_01_local_1_shard_00001926_processed.jsonl/28067
|
Debunking FDA bunkum funk
Having recently attended a highly entertaining cardiovascular conference, I thought I would attempt to cleanse myself of the purely factual reporting I was doing there and open a can of nerdy whoop-ass.
The conference reporting game brings up more happy surprises the longer I do it. By far my greatest pleasure is getting to know the scientists and therapists that are the best at what they do, and talking to them off the record.
One such big cheese said that drug-eluting balloons, which have been transforming the sordid yet inexplicably glamorous world of artery-unblocking in Europe for a while now, have not yet been approved by the FDA in the US. The reason for this strange discrepancy? They are not as profitable for the big businesses involved as the devices that are currently employed.
As a little aside, before I started covering these technologies I had no idea how amazing they were, and I had the privilege of watching some amazing open and endovascular procedures live during the conference. Endovascular techniques are performed by making a small incision in the groin, and often the armpit too, and threading a catheter through these arteries to the area where there is a blockage. The procedures are beamed live from hospitals to the conference centre. A suave surgeon narrates the procedure in a sexy Italian accent as he does it, amid the ghoulish groaning of the patient, who lies, fully conscious, on the table covered in iodine. The arterial blockage can be piledriven through using a sort of minuscule drill, and it can be squashed against the artery wall using little balloons that are inflated once they are fed into the blockage via the catheter. The artery can be held open with a device called a stent, which is like a metal scaffold.
In my naivete, I was shocked to hear my dear turncoat’s words, which were spoken over mouthfuls of delicious faculty lunch and washed down with hot, quintessentially German mountain herb tea. But as I started to think about it, I realised that this was nothing less than a testament to the way the US and many other nations are run.
We have all heard the unsavoury tales surrounding the FDA approval of dangerous drugs, of the immoral marketing of drugs that have resulted in a nation of med-heads, of its flagrant disregard of rigorous science in favour of pushing through profitable drugs, of the sway that big pharma lobbyists hold in Congress… etc.
The fact about endovascular devices – stents, balloons, catheters, etc – is that they are very expensive. And the tight times we are going through might mean that less people in the US are exposed to the benefit of these technologies because their insurance no longer covers it. By people I mean obese individuals with type II diabetes, who incidentally make up an obscene 30% of the US population. No, that’s not a typo. It’s 30%, but what the hell — it’s their right to be fatties, is it not? It’s all about fighting for the choice, even if, like the children and animals we still are, we cannot be trusted to put down the slurpy straw, as Mayor Bloomberg can now attest to.
To get back to the econo-trough, the case is that people are still getting these devices placed. They are still undergoing the procedures, but what is unfortunately being scaled back as a money-saving measure is patient follow-up. Where patients used to be able to claim for a one-month, three-month, six-month, etc, follow-up, most states are now only providing for a single follow-up, which means that late complications cannot be anticipated until it reaches the point that the patient is experiencing acute pain. With one in three cases of stent placement resulting in restenosis (the reblocking of the stent) this is far from a trivial matter. In fact, the only party kept in pocket and risk-free in this scenario is, amazingly, devices manufacturers.
It is great that people are able to have their blood vessels unblocked so that they don’t have to have, as may be the case, their legs amputated, and are therefore able to contribute to society as they were before. But alas, were it that we lived in a saner world, more funding would be placed into dealing with the root causes of cardiovascular disease, such as addiction to unhealthy foods and smoking, possible underlying symptoms of depression, lack of physical exercise, and lack of basic nutritional and culinary education, and I daresay we would all be in a better place.
p.s. The case is no different in countries where big business doesn’t exist, such as poor little Bulgaria, who is simply run, very publicly, by the mafia instead.
2 thoughts on “Debunking FDA bunkum funk
while I was looking on Bing for something
the excellent b.
2. Hi there, I do think your web site may be having browser
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/28068
|
Menu Plan for Fall II: Week 5, Day 3
Meat Loaf with Mushroom Sauce
Baked Sweet Potatoes
Cannellini with Tomatoes and Sage
My mother used to alternate her meat loaf - one time she would smother it in Campbell's Tomato Soup, the next, Cream of Mushroom. This is my version of Meat Loaf with Cream of Mushroom Soup. Leftover Meat Loaf on Day 4; leftover Cannellini on Day 5.
Meat Loaf with Creamy Mushroom Sauce
Total time: 70 minutes
Classic meat loaf paired with a creamy sauce made from field mushrooms. You can use any ground meat or combination.
Meat Loaf with Creamy Mushroom Sauce Ingredients:
Slied Meat Loaf Instructions:
Baked Sweet Potatoes
Total time: 60 minutes 10 - 15 in the microwave
These will, obviously, cook much faster in the microwave and I have seen in the U.S. that you can buy them micro-wave ready ....whatever that means. Sweet potatoes are incredibly good for us, easy and delicious! You can start in the micro for 8 minutes, then finish in the oven for 20 - 30 longer. Faster but still with a crisp skin.
Baked Sweet Potatoes Ingredients:
Cannellini with Sage, Garlic and Tomatoes
Total time: 20 minutes
Cannellini with Sage, Garlic and Tomatoes Ingredients:
Cooking Schedule: 70 minutes
Assemble all ingredients and utensils
Utensils: measuring cups, spoons, knives,
large bowl, roasting pan, medium skillet, foil
Turn oven on, 400F (200C), arrange 2 shelves
Scrub sweet potatoes, make slit
Put potatoes on foil in oven, slit side up, roast
Mince onion
Lightly beat egg
Add onion, wine, crumbs, herbs, mustard, mix
Add meat, mix very well
Shape into loaf, put into roaster, bake
30 minute break
Roughly chop mushrooms
Sauté mushrooms
Chop onion, garlic for beans
Chop tomatoes
Open, drain, rinse beans
Add stock to mushrooms, heat
Dissolve cornstarch in water
Thicken sauce
Remove sauce from heat, stir in yogurt
Remove meat loaf from oven, spoon sauce over
Return meat loaf to oven
Clean skillet
Sauté onion for beans
Add garlic, sage, saute
Add tomatoes, cover, simmer
Add beans, cover, simmer
Pause a few minutes while stuff finishes
Remove meat loaf, let rest
Remove potatoes
Add vinegar to beans, stir, remove from heat
Remove meat loaf from roaster, slice
Spoon sauce into dish, Serve all
|
global_01_local_1_shard_00001926_processed.jsonl/28078
|
JOHN DUNCAN – Pleasure Escape (1985)
Review by: Jonathan Moss
Album assigned by: Tristan Peterson
It was a cold day and Billy set off to his work at the graveyard. He had been working there for several years now, and, contrary to what pop-psychology would tell you, it had had no ill effect on him. He still was of a generally cheery inclination, had a small group of close friends and a larger group of trustworthy associates. He was happy with his job, the graveyard had a stereotypically gothic beauty and it gave him time to think. The cold weather on this particular day was annoying him somewhat, and obviously like any job it was still for the most part tedious, he wasn’t feeling particularly negative. This, of course, was about to change.
He stumbled across a man, how shall we put it, having relations with a corpse.
“What the hell are you doing?”, screamed Billy, who was vaguely aware of such goings on but generally preferred not to think about them, let alone be confronted by them.
“Goddamnit! I was almost finished” shouted the necrophiliac.
“Oh well” he said, removing himself and getting dressed, “I suppose I can always do this another time”
“Hey man, I’m a libertarian” replied Billy, “I don’t care what you do, just do it in another graveyard”
“Fair enough” replied the necrophiliac “I guess I do owe you an explanation. My name is John Duncan and I’m a field recorder and experimental artist. I was defiling this corpse sexually to make a comment on nihilism in modern society, probably”
“Ah”, thought Billy. So he was one of those crazy avant-gardists. Billy had heard about these fellows, doing obscene and immoral activities to prove a point about the decadence of society, maybe. Poor John Duncan probably didn’t even enjoy screwing that corpse, he was doing it out of some higher calling, in his own way he was a God. Of course, Billy wasn’t sure why John couldn’t have made his point in writing, as people like Schopenhauer, Comte de Lautreamont, Thomas Ligotti, and of course, Marquis De Sade had.
Well, Billy didn’t actually think that, he didn’t know who any of those people were. He did however contemplate calling the police, but decided to be true to his word and let John Duncan go, where he would record a film soundtrack, or something.
Author: tomymostalas
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/28086
|
If last month’s round of next-gen console launches left you in a fog, prepare yourself for the incoming Steam Machine. Valve has released only 300 beta kits into the wild, so grab your companion cube and hold tight—we’re about to open one up.
After-the-fact-note: we specced out the Steam Machine on and came up with roughly $1300 in parts.
There’s more teardown where that came from—keep up with us on Instagram, Facebook, and Twitter!
Bu teardown bir tamir kılavuzu değildir. Steam Machine cihazınızı onarmak için, servis kılavuzumuzu kullanın.
1. With only 300 Steam Boxes to go around, how can you possibly get one? Follow our detailed guide.
• Or beg your co-worker, the inimitable Christopher Patton, for the opportunity to destroy his. We'll be careful, Chris! Probably.
• We'd like to start with specs, but the Steam Machine hardware varies—and the components aren't exactly printed on the box. Will it pack a punchy i3 paired with a GTX 660? Maybe a monster i7 mated to a Titan?
• We may never know—we can't stop drooling over the packaging.
I love that the 'handle with care' stamp has a companion cube in the middle :D
Adam Hintz - Yanıt
Be nice to my baby!
Christopher Patton - Yanıt
Just wanted to point out that you made a slight error in step 17. You wrote originally that the PSU is 80 PLUS Gold efficient, then you went on to say it was 80 PLUS Bronze when the picture does indicate that it is Gold efficiency.
Tanny Qureshi - Yanıt
Thanks! Got it updated.
Andrew Optimus Goldberg -
The irony is that you burn the companion cube afterward. I assume they knew people were going to tear this thing apart as readily as they'd toss the cube into the incinerator.
Brandon Bachman - Yanıt
2. Whatever the contents, Valve wins the award for best packaging. Ever.
• Whatever the contents, Valve wins the award for best packaging. Ever.
• We resist the urge to bring out the crowbar, unlatching the Steam Box box safely.
• Looks like Steam neglected to ship brass goggles with the console, but there's only one way to be sure...
Yorum Ekle
• As we crack open the crate, no steam escapes—apart from this sweet logo.
• Up front: a ginormous button.
• The button has a lighted indicator ring, and sits next to two USB 3.0 ports for your wired controllers.
Regarding the lack of steam, it's a shame Valve didn't copy Nokia and their Hackerbox (limited edition N900 case)...
Neil - Yanıt
Why do those front-facing USB ports look so tacked-on, I wonder? Everything else about this device looks sleek and rad, but then there's those two USB-holes kind of just awkwardly hanging out there.
Adam Rezich - Yanıt
We were wondering the same thing—turns out, as you can see here, the front USB ports are individual cables held in place with a plastic bracket. Not as beautiful as we expected, but this is a prototype after all :)
Andrew Optimus Goldberg -
I'm doing DIY replica of this case (well, kind of). Could you tell dimensions of case, please?
Valerii Kuznetsov - Yanıt
The Silverstone Raven RVZ01 is about as close to the chassis as you can get.
shokikugawa -
• Before we put the main hardware under the knife, let's take a quick look at the side dishes.
• Is this the future of the gamepad vs. keyboard-and-mouse debate? Valve seems to have wrapped a keyboard and mouse around a controller.
• Individually configurable touchpads and loads of buttons make this a sort of hybrid of everyone's favorite input devices.
• Valve is encouraging developers and tinkerers to experiment with its operating system, and as such has thoughtfully provided a contingency plan: a USB recovery drive.
• According to Valve: "SteamOS Beta ships with our Steam Client program, which... serves as a user interface and provides connectivity to our Steam online services. That being said, you can still access standard Linux desktop."
Yorum Ekle
• Bringing PC games to the living room without a keyboard means you're gonna need a controller with a lot of buttons. This looks like enough.
• The only thing that feels better than a new controller in your hands is... taking it apart.
• If you're keeping count, this is application number 101,997 of the Pro Tech Screwdriver Set.
Yorum Ekle
• And we're in! The plastic casing separates into two halves: main button board and covers in the upper, and not a thing in the lower.
• Speaking of nothing, where's the battery? We've grown accustomed to wireless console controllers, so this is a surprise. The Steam Machine Controller is wired only, and connects to the Box with the included extra-long USB cable.
• Lifting the main button board out gives a quick look at how the super-configurable touchpads fit into the unit.
I think the plan with the Steam Controllers is to make them wireless, but the beta ones require a wired connection.
Tahoma - Yanıt
Yes, this seems likely to us at iFixit as well.
Taylor Arnicar -
3. Spread Fixmas Cheer
Spread Fixmas Cheer
• Reading all of those inputs and sending them back to the mothership is a tough job. But the NXP LPC11U37F microcontroller handles the task well.
• Now if we could only figure out how to handle the buttons...
• On the reverse of the the main board, we find three switches. Half Life 3 confirmed.
Yorum Ekle
• PS/2 keyboard/mouse port
• Two USB 2.0 and four USB 3.0 ports
• HDMI, Dual-link DVI, and DisplayPort
• S/PDIF digital optical audio out
• eSATA
• RJ-45 Ethernet port, plus connectors for the external Wi-Fi antenna
Yorum Ekle
• See that shiny grille hole there? We've got a theory for that:
There are 300 vent holes. Based on my count it looks like yours is #167. On the sticker near the back by a QR code it does indeed seem to say FX-167.
Dylan - Yanıt
• This looks like a built-in extension cord, to bring power from the back of the Steam Box up to the power supply in the front. Just to be safe, we'll start the unplugging here.
• A molded plastic cowling covers the video card and fills the void between the card and the upper case, protecting it from shaking around and damaging itself.
Yorum Ekle
• Wild SATA data and power connectors appear! This pleases iFixit.
• If you were worried about storage capacity, worry no more. It seems the Steam Box is prepped for a second hard drive to store all your games.
• This particular Steam Machine has a 1 TB Seagate ST1000LM014 laptop SSHD (Solid State Hybrid Drive). It's a 2.5" SATA III 6 Gb/s, 5400 RPM SSHD with a 64 MB DRAM cache and 8 GB MLC NAND Flash.
• TL;DR This is a one terabyte platter drive paired with an 8 GB SSD and some clever software that keeps your most-frequently used data on the super-fast SSD.
Yorum Ekle
• Tucked away inside this unit is a ZOTAC GeForce GTX 780 3 GB GDDR5 graphics card.
• Just to save you the trouble, here are its sweet specs:
• 2304 Stream Processors running at 863 MHz Base / 900 MHz Boost
• 3 GB GDDR5 RAM running at 6008 MHz
• PCI Express 3.0, SLI-compatible
• As an added bonus, it looks like some kind of futuristic car.
How can it have Stream Processors if it is an nVidia card, shouldn't it be CUDA cores? AMD cards have stream processors.
Matthew Bilker - Yanıt
Brian Volk -
• The inner cowling is one complex bit of custom-fitted craftsmanship. Its two parts were a little tough to wrangle out of their homes.
• A SilverStone RC2 PCI Express x16 riser card also falls in our quest toward motherboard glory.
Yorum Ekle
• Out comes the entire off-the-shelf Mini-ITX motherboard.
• This Steam Box is equipped with two modules of Crucial Ballistix Sport 8 GB DDR3 (PC3 12800) RAM. At 16 GB total, it's the maximum this motherboard will support.
• A nook in the motherboard cowling gives you access to the RAM before you get this deep. But they won't be easy to finagle out of their slots, even with only one clip apiece to secure them.
• This motherboard includes DisplayPort, DVI, and HDMI ports, just in case you feel like using the integrated Intel HD Graphics 4600 instead of the GTX 780.
• Valve was nice enough to discourage this with port covers.
Yorum Ekle
• A gaming giant this juiced needs some serious cooling power; this fancy fan is no surprise.
• This heatsink fan is a Zalman CNPS 2X Mini-ITX CPU cooler. Big AND quiet—nice.
• Under the hood, the CPU powering our Steam Machine is a 3.2 GHz (with a Max Turbo Frequency of 3.6 GHz) Intel Core i5-4570.
Why does the CPU not have the retention assembly? Is removal requiered for the Cooler?
Elpidio Simon - Yanıt
How is the valve button connected to the rest of the machine? Also possible to see the backside of the button?
zer0her0 - Yanıt
Probably USB considering the microcontroller on it has USB device support. Simplest way to interface custom hardware to a PC I would think. Or simple serial. But I'd say USB along with a few I/O pins that connect to the mobos power/reset lines. This is backed up by the two differential traces you can see going from the connector to the two USB pins on the micro (check the datasheet) in the image of the custom board.
Ryan V -
Ryan, I was more interested on seeing 1) the cabling 2) the exact headers they plug into, I think they'd need to plug into some power header in addition to USB. (do boards even come w/ serial headers still?) oh and 3) the backside, I'm sure it's boring but still nice to see.
zer0her0 -
Why did they find it necessary to use an ARM to drive 12 LEDs and read one button? Surely they could have found a cheaper microcontroller to do that. (I didn't count the RST and ISP buttons in the upper left corner because they're presumably only used for debugging the board.)
notexactly - Yanıt
They probably used the ARM because it's similar to the one in the controller and they had the same team design both PCBs. As others have said, it is a prototype, so I would imagine that they went with what they knew. Mass production would likely see that chip replaced with something much cheaper.
David -
The Cortex-M0 line is actually meant to compete with 8-bit and 16-bit MCUs, though they are slightly pricier still. It still depends on what's needed (and you need at least 13 I/O lines).
shokikugawa -
But what does that MCU actually do? Do those LEDs just straight light up, or do they create some patterns, some primitive animation...?
Gianmario Scotti - Yanıt
• We found a SilverStone SST-ST45SF-G 450W SFX12V SLI Ready CrossFire Ready 80 PLUS GOLD Certified Full Modular Active PFC Power Supply in our Steam Machine.
• Some notable features about the power supply:
• 450 W continuous power output at 40° C operating temperature rated for 24/7 operation
• Silent running 80 mm fan with 18 dBA minimum
your information is conflicting with source
Dung Huy Le - Yanıt
Thanks for catching that! I've updated the step to reflect the proper specs.
Andrew Optimus Goldberg -
• Steam Machine (Beta) Repairability Score: 9 out of 10 (10 is easiest to repair):
• RAM removal is made difficult by the motherboard cowling, and may require removing the cowling.
• During reassembly, precise cable routing is difficult without a repair manual.
• Our Steam Machine is a prototype, but according to Valve, you'll be able to fashion your own Steam Machine out of any computer running SteamOS. Your mileage may vary, and future revisions may have different scores.
roughly an $850 Machine, that can play any game on Ultra...Not Bad. How much does valve plan on charging consumers?
Rustie Patterson - Yanıt
18 Yorum
Wait...a 450watt power supply can power all that? Including a near top of the line single Nvidia 780 (only 780Ti and Titan might be higher). This confuses me as Nvidia recommends a MINIMUM 600 watt supply for the 780.
Jon Labbe - Yanıt
its because nvidia has to accomondate for the low quality psus which are "up labeled";
every decent 550watt psu will run a single gpu/cpu config with oc no problems and since in the steam machine there are no a ton of extra drives/hdds or OC it is enough for this card
Angelo Merte -
They recommend that because they don't want to be liable if you get a low-quality PSU.
Most gaming towers that are running a 780 have a lot of other serious hardware, so this is never a bad idea. A 780 by itself doesn't need that much power. nVidia's hardware outshines ATI/AMD in performance and efficiency like nobody's business.
The rest of the hardware on this box is not power-intensive at all. Mini-ITX board, reasonably efficient i5, only 2 sticks of RAM (a lot of MOBO's take 8 or more) and a 2.5 inch hard drive.
Christopher Patton -
Those recommendations about power requirements for video cards are grossly overstated. 450w is tons.
phmsin -
The GTX780 has a system load of 405W on Furmark/Battlefield 3, and that’s with an i7-3960X test system. 450W is plenty enough if its paired with an i5.
JS Ng -
As other said, it's to cover their butts when people use lower quality PSUs, among other things (like a fully loaded system). In reality, gaming computers use a lot less power than people think. I have a system with a Core i5-2500, 4GBx2 RAM, a "regular" motherboard, a GeForce GTX 670, a sound card, a hard drive, and an SSD. Running say Crysis, my Kill-A-Watt reported it was drawing about 200W-230W.
I took my measurements and ran it against eXtreme Outer Vision's PSU calculator at 100% load and found that running Crysis didn't even draw 60% of the total power load (and 60% is the lowest their calculator goes)... if that means anything.
shokikugawa -
GPU manufacturers recommend power supplies based on bad power supplies, i.e. ones that cannot actually deliver as much power as they say they can. The actual power draw of a GeForce 780 is 250W, and the rest of this system is only brushing 100W (84W CPU + motherboard and SSHD and whatever fans).
paulcombe - Yanıt
So this system could easily be selling for $1500? Is anyone going to be buying what they are marketing as a gaming console for 3 times more than the competitors? Why not just build a $1500 PC with better airflow and case?
Izzy Data - Yanıt
Some people will build their own machines, and install SteamOS on them. Valve encourages people to do just that. I think this option is more targeted at people who don't know how to build their own computer, or who simply don't want to build their own.
Taylor Arnicar -
Sweet little box. Really looks like a prototype-HTPC with some oompf. I wonder how loud it is?
Is that fan duct detachable, I wonder?
amarg - Yanıt
Those asking why Valve would put together such an expensive don't get it. Valve has said repeatedly that this prototype is mainly a test bed for the operating system, not an indication of hardware they actually plan to ship.
Sure, you can build something way cheaper than this. Valve wants you to. But these demo models are built to be as powerful as possible so that gamers testing them can run any game specifically for the purpose of making sure everything works. They don't want their beta testers running into issues where the hardware isn't as capable as it needs to be to handle certain games running at maxed out settings.
So yeah, you can (and should) build something cheaper than this if you want to. But you're not trying to beta test a new operating system on the most powerful hardware you can get.
mike - Yanıt
Is there a reason this was scored a 9 out of 10? I didn't see any reference to why it was marked down by 1 point in the guide.
Ben W - Yanıt
Brian Volk -
While a 550watt might be able to run it, you only want to use 60% of your total capability.
John Ryder - Yanıt
Tbh I hope the steam machine works to make other companies think about creating small console sized cases for people who don't have room or want a large PC just shows how you can do a lot with such a small space. I may not buy the machine but I may have to try and convert my Pc to something like that when I move to Uni so that I can make it easier to move with me.
Javehn - Yanıt
Silverstone makes several of them, two that readily come to mind are the Raven RVZ01 and the ML07B. Plus a lot of Silverstone's HTPC cases will take up to mATX boards and full-size (although not oversized) graphics cards.
rgletur -
Hi all guys, congrats for the very interesting article ! For all those who are wondering if the SilverStone PSU is capable of handling this system, here's a test with a Core i7 920 and a GTX480, which is very power hungry configuration (100% load):
Ps: if you're interested, here's another article about cabinets like the steam one (unfortunately without a powerful vga):
We will soon analyze the SilverStone RVZ01 (a competitor of this steam platform), that you can find here:
Matteo Trinca - Yanıt
Also you're going to have to cut off about 1/5th of it to be this size.
Jeff Jenkins - Yanıt
Yorum Ekle
İstatistikleri Görüntüle:
Son 24 Saat: 2
Son 7 Gün: 29
Son 30 Gün: 215
Her zaman: 348,020
|
global_01_local_1_shard_00001926_processed.jsonl/28092
|
Why Tri?
Sometimes I get asked why I love the sport of triathlon so much. Well, it's kind of complicated. It's actually a love-hate relationship, but I'd say mostly love (until I'm running 17+ miles in the Texas heat.) Anyways, there are actually a few reasons why I like to tri: 1. I used to be overweight. … Continue reading Why Tri?
|
global_01_local_1_shard_00001926_processed.jsonl/28096
|
1. Tibet has a somewhat complex history. There is (or was) a stone monument with the remarks of the Tan Dynasty (619 -circa 915 A.D.) and the Tibetan leaders of the time that talks of mutual understanding and peaceful wishes for both countries, both peoples. (I would have to look this up, but the point is that China and Tibet recognized each other’s independent status as 2 separate peoples and nations more than a thousand years ago.)
The Communist Chinese assert that Tibet has always been an “integral part” of China, but history does not bear that out. Only together under Mongol rule in the 13th century, Tibet was conquered separately and at a different time than China was. As well, Tibet (re)gained its independence from the Mongols earlier and separately from the Chinese overthrow of the Mongols in 1368 (establishing the new Ming Dynasty).
While the world’s and the UN’s attention was focused on the Korean peninsula in late 1950, Chinese forces, as you note above, invaded and occupied Tibet.
2. http://www.trimondi.de/SDLE/Annex.htm
Over the past few years, increasing criticism has been leveled at Tibetan
Buddhism, the history of Lamaism, conditions among the Tibetans in exile and
the XIV Dalai Lama himself, criticism which is not from the Chinese quarter.
Historians from the USA have begun questioning the widespread glorifying
whitewash of Tibetan history (Melvin C. Goldstein, A. Tom Grundfeld).
Critical Tibetologists have raised accusations of deliberate manipulation by
official Tibetology (Donald S. Lopez Jr.). Tibet researchers have
investigated the “dreams of power” that are activated and exacerbated by the
“Tibet myth” nurtured by Lamaists (Peter Bishop). Prominent politicians have
had to admit the evidence of their own eyes that the Chinese are not
committing “genocide” in Tibet, as the Tibetans in exile continue to claim
(Antje Vollmar, Mary Robinson). Former female Buddhists have condemned, on
the basis of personal experience and with great expertise, the systematic
and sophisticated oppression and abuse of women in Tibetan Buddhism (June
Campbell). Psychologists and psychoanalysts have investigated the aggressive
and morbid character of Lamaist culture (Robert A. Paul, Fokke Sierksma,
Colin Goldner). From within the Dalai Lama’s own ranks, overwhelming
evidence of his intolerant, superstitious and autocratic nature has been
amassed since 1997 (Shugden Affair).
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/28121
|
VENERABLE 003: Creating Boundaries, Safeguarding Our Values
May 2, 2017
Dawn reads an excerpt from her book, Venerable Women: Transform Ourselves, Transform the World—and gives a new perspective on how to create and maintain boundaries.
Dawn Morningstar: Creator, Host, Executive Producer
Bryan Schumann: Composer, Audio Engineer, Assistant Producer
Paige Severson: Executive Assistant
Kate DeVoe: Production Assistant
|
global_01_local_1_shard_00001926_processed.jsonl/28122
|
Chemical Formula: (SrSO4)
Although commonly mistaken as a member of the Quartz family, Celestite is a sulfate mineral with an incredibly unique blue color. It forms in tropical environments within volcanic carbonate rocks. These conditions for crystal growth are rare, making Celestite a well sought after mineral.
Metaphysical Properties
Celestite is known as the stone of the angels. It provides guidance and security during hard times, and can act as a connector for individuals and lost loved ones.
|
global_01_local_1_shard_00001926_processed.jsonl/28143
|
IMAGINE: Earning 5-10 times the money of a regular job and your earning potential is only limited by you!
NOTE: In order for your application to be considered and to help us ensure that your application is processed as fast as possible, please answer the following questions in your application!
1. Please tell us how you will bring in your model candidates?
2. Do you have any experience with marketing or other relevant skills?
Thanks and Happy Registering!
|
global_01_local_1_shard_00001926_processed.jsonl/28149
|
Log in
No account? Create an account
That which does not kill me...
...has made a grievous tactical error.
Previous Entry Share Next Entry
(no subject)
Wolf trapped
• 1
[Guriel . . . is panicking. Recent days have been hell on Ben's coping mechanisms -- not to mention his soul -- and Guriel very, very much does not like not being able to find him.
He knows a thing or two about conventional tracking -- "conventional" in the sense of "non-angelic", anyway -- so he falls back on that, combing the shabby streets for any sign of Ben while he sends up fervent prayers.]
Come on, Dad, please give me a sign . . .
[The "tattoo" on his chest is cause for comment, but they don't actually ask him about it. Two of them are male, one female, and they're watching him like a lion drooling over a particularly fat and tasty gazelle. He assiduously avoids their gazes.]
Let me go and this won't escalate.
[They laugh. "Do you know how rare wolves are these days? Let you go? We're going to keep you as long as possible."]
[Guriel's listening with all his might to the chatter in the Heavenlies, to brothers who saw things and heard things. It's not the usual efficient buzz it would be before . . . well, before.
Guriel hates this. Nothing good can come of Ben being this hard to find.]
[The lady vamp stations herself beside his head, and the two males are at either side under his outstretched arms. The table is slightly humped under his shoulders, which forces his neck to tilt back. The lady vamp runs her fingers through his hair before fisting her hand in it and wrenching his head to one side.
"Relax, puppy. You'll like it, I promise."]
[She doesn't listen of course. She bends over and sinks her fangs into his exposed throat. He makes a strangled sound as a wave of pleasure suffuses his entire body, and he suddenly knows how vampires have survived all this time. It really does feel fantastic.
He doesn't even notice when the male vampires start feeding from his forearms.]
[Guriel's getting increasingly agitated, flitting from place to place through the Elsewhere without being especially careful who might see him bodily disappearing when he does.
He has other things to think about. Much more important things. Like where the hell Ben is, and exactly how bad things might be if Guri can't find him . . .]
[The imp materializes at Guriel's shoulder. "What's the matter, wingly? At loose ends now your Charge is dead?"
He's a demon. Lying is what they do, after all.
Meanwhile, the vampires take nearly a pint apiece, leaving Ben limp and panting hoarsely and wondering what the hell just happened. They should be bones and ash right now, but they look way healthier than he does.
One of the males wheels an IV pole over. "Should probably get some blood expanders into you, puppydog."
He tries to recoil, unsuccessfully.] Keep that fucking thing away from me.
[Guriel wheels and gets the imp by the throat, cloaking his fist in a nimbus of pure power.]
I am in no ruttin' mood, Hellspawn. Tell me where he is.
[The imp laughs, high, screeching, and grating. "In Hell, cubby. I mean, you can't feel him anymore, right?"
The vampires don't listen to Ben's protests, of course, because no one ever does. They tape the needle into the back of his hand, and the panic attack surprises them with its vehemence.]
You're lying. [Guriel dials up the power in his grip. Sue him, he's cranky.] My Father, my brothers would've told me, dumbass, so try again. Where. Is. Ben. Lockwood.
["Oh, sure. Your Daddy would never teach you a lesson about getting attached to the meatsacks, and make your brothers keep quiet about it. Right?" The imp sneers, though it's in a fair amount of pain. "Face it. He gave himself over, and now he's getting his just reward."
Ben can't breathe, or feel his face. The needle in conjunction with the vampires is doing terrible things to his scattered coping mechanisms. The lady vamp runs her fingers through his overgrown hair. "Relax, puppy. We'll make it good for you."
He just swears at her in Chinese.]
No, He wouldn't. Because Dad isn't an asshole, which is more than I can say for you. Last chance, dude, tell me where Ben really is or I smite you into a greasy little stain on the wall here.
["Okay, okay, jeez, play hardball, you must really be worr--" The imp gets a good look at Guriel's expression and realizes that he really is thisclose to a bad smiting. "Fine, okay, he's in the whore district looking for hookers and blow because this broke him just that much, are you happy now?"
Ben is, of course, in no way ready for the whore district, and if any of these vamps touch him that way, he's going to stake them so hard.
At this point, however, they seem content to just feed from him, and then build him back up again. In the interests of that, they've removed the wolfsbane, but he's still strapped down tightly enough that he can't move.]
Edited at 2015-04-11 04:49 pm (UTC)
. . . hookers and blow. Really?
[Guri knows Ben is in a bad way. But he's under no illusion that he's in a bad enough way to just not be Ben. He leans in close and bares his teeth at the demon, much more lion than man right now.]
While you're in the Pit, find someone to teach you how to be a better liar.
[He doesn't even bother with his sword, just a surge of power that should be more than enough to turn the imp into a cloud of component atoms. It makes him feel marginally better.]
[The imp shrieks as it pops out of existence with a wet and smelly bloop. But it has the satisfaction of knowing that Guri is no closer to finding Ben than he was before.
Ben, meanwhile, is still breathing threats at the vampires (when he can breathe). They're getting ready to feed from him again...]
[One of the male vamps leans over Ben with a predatory grin. "You're delicious, wolfy. Anybody ever tell you that before?"
He sinks his teeth deep in Ben's neck without waiting for a response.]
• 1
|
global_01_local_1_shard_00001926_processed.jsonl/28159
|
Chadwick Boseman
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Chadwick Boseman
Chadwick Boseman by Gage Skidmore July 2017 (cropped).jpg
Boseman in 2017
Born Chadwick Aaron Boseman
(1977-11-29) November 29, 1977 (age 40)
or 1976/1977 (age 40–41) (sources differ)
Anderson, South Carolina, U.S.
Alma mater Howard University, B.F.A. 2000
British American Drama Academy
Occupation Actor, director, producer
Years active 2000–present
Chadwick Aaron Boseman[1] (born November 29, 1977[2] or 1976)[3] (sources differ) is an American actor known for his portrayals of real-life historical figures such as Jackie Robinson in 42 (2013), James Brown in Get on Up (2014), and Thurgood Marshall in Marshall (2017) and has appeared as the superhero Black Panther in the Marvel Cinematic Universe films Captain America: Civil War (2016), Black Panther (2018), Avengers: Infinity War (2018) and the upcoming Avengers 4 (2019). He has also had roles in the television series Lincoln Heights (2008) and Persons Unknown (2010), and the films The Express (2008), Draft Day (2014) and Message from the King (2016).
Early life[edit]
Boseman was born and raised in Anderson, South Carolina,[2] to Carolyn[4] and Leroy Boseman, both African American.[5] According to Boseman, DNA testing has indicated that his ancestors were Yoruba people from Nigeria and Limba people from Sierra Leone.[6] His mother was a nurse and his father worked at a textile factory, keeping an upholstery business as well.[7] Boseman graduated from T. L. Hanna High School in 1995.[8] In his junior year, he wrote his first play, Crossroads, and staged it at the school after a classmate was shot and killed.[7] He studied at Howard University in Washington, DC, graduating in 2000 with a bachelor of fine arts in directing.[9] One of his teachers was Phylicia Rashad, who became a mentor.[7] She helped raise funds so that Boseman and some classmates could attend the Oxford Mid-Summer Program of the British American Drama Academy in London, to which they'd been accepted.[7]
Boseman wanted to write and direct, and initially began studying acting to learn how to relate to actors.[10] After he returned to the US, he graduated from New York City's Digital Film Academy.[11] He lived in Brooklyn at the start of his career.[7] Boseman worked as the drama instructor in the Schomburg Junior Scholars Program, housed at the Schomburg Center for Research in Black Culture in Harlem, New York.[1] In 2008 he moved to Los Angeles to pursue an acting career.[12]
Boseman at the Deauville Film Festival in September 2014.
Boseman got his first television role in 2003, in an episode of Third Watch. His early work included episodes of the series Law & Order, CSI:NY, and ER.[1] He also continued to write plays, with his script for Deep Azure performed at the Congo Square Theatre Company in Chicago, Illinois; it was nominated for a 2006 Joseph Jefferson Award for New Work.[13] In 2008, he played a recurring role on the television series Lincoln Heights and appeared in his first feature film, The Express.[14] He landed a regular role in 2010 in another television series, Persons Unknown.[14]
Boseman had his first starring role in the 2013 film 42, in which he portrayed baseball pioneer and star Jackie Robinson.[14] He had been directing an off-Broadway play in East Village when he auditioned for the role.[15] He had considered giving up acting and pursuing directing full-time at the time.[16] About 25 other actors had been seriously considered for the role, but director Brian Helgeland liked Boseman's bravery and cast him after he had auditioned twice.[17][9] In 2013, Boseman also starred in the indie film The Kill Hole, which was released in theaters a few weeks before 42.[18]
In 2014, Boseman appeared opposite Kevin Costner in Draft Day, in which he played an NFL draft prospect.[19] Later that year, he starred as James Brown in Get on Up. In 2016, he starred as Thoth, a deity from Egyptian mythology, in Gods of Egypt.[20]
He started portraying the Marvel Comics character T'Challa / Black Panther in 2016, with Captain America: Civil War being his first film in a five-picture deal with Marvel.[21][22] He headlined Black Panther in 2018,[23] which focused on his character and his home country of Wakanda, in Africa. The film opened to great anticipation, becoming one of the highest-grossing films in the United States. He reprised the role in Avengers: Infinity War, which was released in April 2018, and will return in the Avengers 4 which is scheduled to be released in May 2019.[24]
Personal life[edit]
Boseman was raised a Christian. He was baptized, and was part of a church choir and youth group. His former pastor said that he still keeps his faith.[25] Boseman has stated that he prayed to be the Black Panther before he was cast as the character in the Marvel Cinematic Universe.[26]
Year Title Role Director Notes
2008 The Express Floyd Little Gary Fleder
2013 The Kill Hole Lt. Samuel Drake Mischa Webley
42 Jackie Robinson Brian Helgeland
2014 Draft Day Vontae Mack Ivan Reitman
Get on Up James Brown Tate Taylor
2016 Gods of Egypt Thoth Alex Proyas
Captain America: Civil War T'Challa / Black Panther Anthony & Joe Russo Nominated – Saturn Award for Best Supporting Actor in a Film[27]
Message from the King Jacob King Fabrice Du Welz Also executive producer
2017 Marshall Thurgood Marshall Reginald Hudlin Also co-producer
2018 Black Panther T'Challa / Black Panther Ryan Coogler MTV Movie Award for Best Actor in a Movie
MTV Movie Award for Best Hero
Nominated – Best On-Screen Team (with Lupita Nyong'o, Danai Gurira and Letitia Wright)
Nominated – Best Fight (with Winston Duke)
Nominated – Saturn Award for Best Actor in a Film
Avengers: Infinity War Anthony & Joe Russo
2019 Avengers 4 Post-production
Year Title Role Notes
2003 All My Children Reggie Porter Recurring role
2006 CSI: NY Rondo Episode: "Heroes"
2008 ER Derek Taylor Episode: "Oh, Brother"
2008 Cold Case Dexter Collins Episode: "Street Money"
2008–2009 Lincoln Heights Nathaniel "Nate" Ray 9 episodes
2010 Persons Unknown Sergeant McNair 13 episodes
2010 The Glades Michael Richmond Episode: "Honey"
2011 Castle Chuck Russell Episode: "Poof, You're Dead"
2011 Fringe Mark Little / Cameron James Episode: "Subject 9"
2011 Detroit 1-8-7 Tommy Westin Episode: "Beaten/Cover Letter"
2011 Justified Ralph Beeman Episode: "For Blood or Money"
2. ^ a b "Chadwick Boseman Biography: Screenwriter, Actor, Director (1977–)". Biography.com (FYI / A&E Networks. Archived from the original on April 2, 2016. Retrieved May 9, 2016.
3. ^ His age is given as 37, making his birth year c. 1976, at Rothman, Michael (October 29, 2014). "5 Things to Know About Chadwick Boseman". ABC News. Retrieved January 11, 2018. and Feinberg, Scott (October 29, 2014). "Ocsar Contender and New Marvel Superhero Chadwick Boseman on his Journey to Stardom". The Hollywood Reporter. Retrieved January 12, 2018. Neither source gives specific birth date.
6. ^ Colbert, Stephen (May 17, 2018). "Chadwick Boseman On Bringing Humanity To 'Black Panther'" (Interview). New York City: The Late Show with Stephen Colbert.
8. ^ "Hanna Grad Chad Boseman Plays Jackie Robinson in "42"" (PDF). Parent Newsletter (47). T. L. Hanna High School. April 11, 2013. Archived from the original (PDF) on March 4, 2016.
17. ^ Herndon, Jessica (April 8, 2013). "Chadwick Boseman: The Distinguished Rise of Cinema's Next Champion". Flaunt. Archived from the original on March 7, 2018. Retrieved April 29, 2015.
19. ^ Kaye, Don (April 11, 2014). "Chadwick Boseman on 'Draft Day,' Sports Legends, and Becoming James Brown". Moviefone. Retrieved April 29, 2015.
External links[edit]
|
global_01_local_1_shard_00001926_processed.jsonl/28173
|
Twenty Black Carolinians Meet Near The Stono River
The Stono Rebellion (sometimes called Cato's Conspiracy or Cato's Rebellion) was a slave rebellion begun on Sunday, September 9, 1739, in the colony of South Carolina. It was the largest slave uprising in the British mainland colonies prior to the American Revolution. One of the earliest known organized rebellions in the present United States, it was led by native Africans who were Catholic and likely from the kingdom of Kongo, and some of whom spoke Portuguese. Jemmy (referred to in some reports as "Cato") was a literate slave who led 20 other enslaved Kongolese, who may have been former soldiers, in an armed march south from the Stono River (for which the rebellion is named). They recruited nearly 60 other slaves and killed 22-25 whites before being intercepted by a South Carolina militia near the Edisto River. In that battle, 20 whites and 44 slaves were killed, and the rebellion was suppressed. A group of slaves escaped and traveled another 30 miles before battling a week later with a militia; most of the slaves were executed; a few survived to be sold to the West Indies.
In response, the South Carolina legislature passed the Negro Act of 1740 restricting slave assembly, education and movement. It also enacted a 10-year moratorium against importing African slaves, and established penalties against slaveholders' harsh treatment of slaves. It required legislative approval for manumissions, which slaveholders had previously been able to arrange privately.
|
global_01_local_1_shard_00001926_processed.jsonl/28174
|
On Air Now
BBC Newshour Extra
BBC Newshour Extra
12:10 p.m. - 1 p.m.
Follow WRS on Facebook, Twitter, and Instagram.
Listen Live
Just Played
BBC News
BBC News
1 p.m. - 1:06 p.m.
Next on WRS
Swiss Up! - Swatch: The plastic watch born in crisis
Swiss Up! // Community// Explore Switzerland// Science & Technology// Health// General // By Tay Kinnear // Oct. 9, 2018
Ever heard the story of Swatch, the famously Swiss plastic watch brand? Today on Swiss Up! Dario explains that story, including the risk one employee took when the company was on the brink of bankruptcy...
Related articles
|
global_01_local_1_shard_00001926_processed.jsonl/28207
|
Weekend Special | Take 10% Off. Get the code »
David Cristofano
David Cristofano has earned degrees in government and politics, and computer science from the University of Maryland at College Park and has worked for different branches of the federal government for over a decade. His short works have been published by Like Water Burning and McSweeney?s. He currently works in the Washington, D.C., area, where he lives with his wife, son, and daughter. The Girls She Used to Be is his first novel.
|
global_01_local_1_shard_00001926_processed.jsonl/28216
|
15 Tips for Defeating the Trumps in Your Own Life
It's a tricky game to argue with a know-it-all, commander-in-chief and otherwise.
Photo Credit: pathdoc / Shutterstock
Our current administration will focus many of us on one of the biggest vulnerabilities we face in public and private life: an inability to reason with the unreasonable, to beat the seemingly invincible; in short, how to trump a trump.
Trumps are not conservatives. What makes them trumps is not what they believe, but how they believe it. They hold on to their beliefs like know-it-alls, with a lock-tight grip shrouded in multiple layers of seemingly impenetrable, defensive, Teflon-coated armor that allows them to act like they're right about everything, and everyone else is wrong about everything.
So if you’re a conservative, frustrated by arguments with know-it-all liberals, the question of how to trump a trump matters as much to you as to us liberals frustrated with talking to know-it-all conservatives.
And if you’re not frustrated by talking to know-it-alls, maybe you are one, in which case you’ll have no reason to read on since you already know it all.
There are chinks in that armor. You just have to know how to find them. Here are some factors to consider.
1. It takes two to tango, so ask yourself if you can you walk away: George Bernard Shaw said, "Never fight with a pig. You'll just get dirty and the pig likes it." Not fighting is a good idea when possible. Still, sometimes it isn’t, so you can never say never. When you have to fight, getting dirty isn’t the only possible outcome. You may be able to subdue them, which is why sometimes it's worth trying.
2. Pay attention to audience: You’ll rarely get a trump to admit he doesn't know it all, since, by definition and design, trumps aim to prove you wrong about everything. Still, you can often get an audience to side with you against him, thereby diminishing the trump’s power. In such cases, play to your audience and not the trump. Say things like, "See what he did there?” instead of “See what you did there?” But also, pay attention to the costs of having an audience. Audiences sometimes make trumps escalate toward greater aggression since they don’t want to lose face. And if the audience already supports the trump, you’re better off confronting him in private.
3. Don't reason with know-it-alls: The Shaw quote would be a bit more accurate if it read, “never reason with a pig, since their defining characteristic is their unreasonableness." Trump typically mistake fake reasons for real reasons. Here’s a list of fake reasons to listen for. If you hear many of these, chances are, you’re dealing with a trump and reasoning is futile or worse, enabling, since nothing makes the unreasonable look more reasonable than someone treating them as though they can be reasoned with.
4. Reasonable trumps: Some trumps are just going through the motions. They don’t know any better. They’re aping what they see their know-it-all heroes do. So “never reason with a trump” is still an overstatement. Give reason a chance or two and if you’re getting nowhere, switch gears to fighting, not reasoning.
5. Don’t be down on yourself for taking the bait from a trump: When you reason with trumps you give them ammunition for making you look like an idiot. That’s what Shaw meant by you’ll just get dirty and the pig likes it. But not reasoning and instead, jumping to the conclusion that they’re trumps, can leave you feeling dirty too. That’s the bind we’re in. It can be stated in the form of a variation on the serenity prayer: Grant me the patience to reason with the receptive, the impatience to give up on the unreceptive, and the wisdom to know the difference. You need the wisdom, because reasoning with the unreceptive and not reasoning with the receptive will both leave you feeling dirty. But here’s the thing: You’ll never have perfect wisdom. The unreasonable go to great lengths to pretend that they’re reasonable. They would prefer you believe they are reasonable, but short of that, they're happy enough to keep you in doubt. Don’t blame yourself for guessing wrong sometimes. Just do your best to guess carefully.
6. Fight fire with fire: If you decide someone is a trump, shift attention to a higher moral goal: Making her leave the engagement disappointed. Drop your concerns about being kind, receptive, generous or giving her the benefit of the doubt. In the service of that higher goal, be ready to fight fire with fire, to go after her cunningly with whatever it takes to shake her. Don't try to shame her morally. She's proud of her naughty-girl immorality. To her, it's a badge of honor. And don't hold yourself to the same moral standard you set for dealing with the reasonable. This is different.
7. Be tenacious: Trumps win debates by controlling them. Indeed, the Donald controlled the debate seamlessly throughout the campaign season. Never once did he let someone else decide what he would talk about or set the ground rules for the debate. If you try to stay honorable by responding to a trump's questions and challenges, he'll whip you around like bull whips a bull rider. Pick a point and stick with it. Never let him off the hook. If he asks questions (which are more like attacks dressed up as questions) ignore it and ask a question back. Pretend he never asked you and keep on him about how he refuses to answer your question.
8. Mark your place: Trumps are slippery. Interviewers often ask them a question two or three times and give up when they don’t answer. Don’t ever give up without marking the question as unanswered. Say something like, “I’ve asked you three times and you haven’t answered once. Obviously, you’re unwilling to answer the question.”
9. Out-trump them: Trumps are masters of relentless character assassination. Don’t play the game at their level. Instead, play it up a level, character assassination for character assassination. Accuse them of never admitting they’re wrong, never apologizing, always changing the subject, and always make the problem someone else's. The trump will likely reinforce your argument by responding in a way that confirms your accusation. Always point that out to the audience: “See? He did it again.”
10. Don’t play into their stereotypes: You have your natural reactions to trumps and you’ll be tempted to express them. Recognize that the trump is familiar with them all and is fully loaded with his know-it-all reactions. If you do what comes naturally, he’ll be there waiting to knock you down. So you have to out-maneuver him, hitting him with surprising responses. To make any communication effective, you need discipline. You have to say it the way that he can hear it, even if it’s not the way that rolls most easily off your tongue. Nowhere is that more important than with a trump. Already deaf to what he expects from you, he'll only hear what’s surprising, different and unexpected.
11. Murmur truth to power: The know-it-all sets you up to get agitated and unstable. That way she disqualifies you for getting emotional. Don’t take the bait. Stay calm, confident, laconic, laid back, even glib. Keep breathing. Let her talk and talk little. The less you say, the less of a surface you present for her to pick apart with her know-it-all formula. Master communicators know not to lean into a conflict. Leaning back forces the other person to lean in off her grounded center.
12. Make confident assumptions: Don’t say, “I could be wrong but I insist, it seems to me you’re acting like a know-it-all.” Simply assume that he is, and go from there. For example, “When did you first discover that you can feel like a winner just by acting like a know-it-all? Were you very young, or was it only as an adult? Did you have a role model who made a big impression on you?” He will likely try to defend himself, arguing that he isn't a know-it-all, which puts him on the defensive. Act surprised and unconvinced since it’s obvious that he is a know-it-all and that he likes it.
13. Give them a taste of their medicine: Follow their logic and pretend you embrace their assumptions. Follow their assumptions to their logical conclusions and act surprised if they don’t come to the same conclusions. Here’s an example to be used with a Trump voter: "I get it. You're one of those no-compromise, look-out-for-number-one guys. It's a dog-eat-dog world and you'll be damned if you're going to tie your hands by compromising to accommodate others. That's why you support Trump. He's your kind of guy. Nothing matters but winning the game. But this is what confuses me: If you've been so uncompromising, why aren't you more successful? It can’t be because you're fighting those compromisers. They're fighting two battles, to win and stay politically correct. You're just fighting to win. You should beat them hands down, but you haven’t. Why are you still a loser even though you’re not one of those losers who cares about anything but winning?”
14. Beat them at their own rhetorical game: If they’re giving you a familiar spiel, surprise the heck out of them by making their case better than they did: Say something like, “Here let me help you." And then, without a drop of snarkiness or veiled criticism, outclass them rhetorically by making a great case in favor of whatever belief they’re espousing. Follow it by saying, "Obviously, you were impressed by your ability to mouth that old argument. I wasn’t. Anyone could make it. It’s easy especially when you only have to fool the gullible. What’s hard is making a realistic argument. I dare you to make my argument cleanly." Then mark the fact that they didn’t or wouldn’t make your case as convincingly as you made theirs.
15. Argue like it's 2020: We learned something very important in this election: Many Americans can't distinguish between opinions and reality. Though Trump lied about reality more than any other presidential candidate in history, these people thought he was honest because he "speaks his mind." By this ridiculous standard, someone who says, "I'm absolutely sure that guns should be outlawed because every gun in America is used to kill a kitten," would be deemed honest. For these gullible Americans, the real test of honesty is insistence. To them, the more insistent you are in your opinions, the more honest you are about reality. Which is total BS of course. So don't play into it. Don't let someone think he can win a debate through insistence and don't try to out-insist him. Calmly note that only time will tell. Reality wins all debates in the end. You and he are placing different bets about how reality will play out. You can drop out of a debate anytime by saying, "I'll be happy to revisit this in two years. If your bet proved right, I'll be happy to concede the point, and if you were honestly interested in reality, you'll do the same."
None of these approaches guarantee success. They are all just attempts to address the number-one challenge in our public and private lives. Other suggestions for how to trump a trump are welcomed.
Jeremy Sherman Ph.D. researches how the living interpret, from their cradle at the origin of life to our current grave situation.
What advice would you give other teachers considering a strike?
|
global_01_local_1_shard_00001926_processed.jsonl/28324
|
Rust to Dust
Rust to Dust - The Hero's Journey
Created on: May-28-2018 Last updated: May-29-2018
Theme: Teen Privacy: Everyone
48 pages 3 reads 0 people's favorite 0 likes
Add as a Favorite Like it
Share with Friends
"Can't hurt to just have some fun and freedom, can it?"
In the vauge future of ZZXX, the remains of an abandoned planet-wide Amusement park experiences a malfunction that causes the Androids to start breaking away from the cliches of their stories. The once simple tales of heroism and adventure are turned on their head when a Western extra background character, Clint, decides she can be a hero too.
Yes, not all Hero's Journeys start with some corpse looting. But, when you have a gun at your side, a nifty hat on your head and a semi-functioning brain on your shoulders; what can go wrong?
Death traps, Fairies and Damsels? Oh my!
Reader comments:
Author Profile
Kanassa Kanassa
Joined: May-28-2018
More Books From this Author:
Author's Personal Bookstore
Author Bio
|
global_01_local_1_shard_00001926_processed.jsonl/28331
|
RCPN Flashcards Preview
Zold - Cartórios > RCPN > Flashcards
This is a private class.
You need a Pro account to access a Private class
I have an access code
To request access, contact Victor Falavinha, and ask that they share the class directly with you, using the email address you use for your Brainscape account.
|
global_01_local_1_shard_00001926_processed.jsonl/28345
|
Bulk Ammo For Sale
All Products
20 Rounds of 9mm + P Ammo by Corbon Glaser - 100gr PowR Ball
Out of Stock
Ammo Overview
Quantity - 20 rounds per box
Manufacturer - Corbon
Bullet - 100 grain Pow'RBall
Casing - Boxer-primed brass
This 9mm +P cartridge by Corbon Glaser has a 100 grain bullet. That is relatively light for the caliber, which means less recoil and faster follow-up shots. What makes this bullet truly special is its proprietary Pow’RBall design. The bullet is a gilding metal jacket with a V-shaped lead core. A polymer ball is inserted into the cavity and crimped in place by the copper jacket, which not only facilitates feeding in finicky pistols, but also provides controlled expansion upon impact in soft tissue with deep penetration and superior weight retention. If your pistol is choosy about what you chamber in it but you’d still like to count on it for self-defense, then discovering the Pow'RBall is like winning the lottery.
The great care that Corbon puts into their production process means they take a little longer to manufacture ammunition, but the outstanding quality this results in speaks for itself. The South Dakotan company stands behind their tried and true designs, and offers a 100 percent satisfaction guarantee on all of their ammunition.
Write Your Own Review
You're reviewing: 20 Rounds of 9mm + P Ammo by Corbon Glaser - 100gr PowR Ball
How do you rate this product? *
1 star 2 stars 3 stars 4 stars 5 stars
Ammo Performance
There are no entries.
Post your question
* Required Fields
|
global_01_local_1_shard_00001926_processed.jsonl/28375
|
Take our quiz and meet the car you’ll love.
This Nissan Frontier Costs Less Than $20,000; Should You Buy One?
If you're familiar with new pickup trucks, you know that pricing is out of control. There are $65,000 trucks available with features that rival luxury cars. But affordable trucks still exist, and this is one of them. In fact, this is the most affordable truck out there: the 2018 Nissan Frontier. This exact model that we're looking at is less than $20,000: $19,965 with destination fee.
Related: 2017 Nissan Frontier Review: Cheap Trucks Do Exist
But what exactly do you get in a sub-$20,000 truck?
• The steering wheel is made from urethane.
• Not just regular dish steel wheels, but styled steel wheels.
• The front seat is adjustable in four ways.
• The stereo has four speakers.
• You may be surprised to find two backseats, and there's plenty of headroom.
• There's a bed.
• The transmission is manual.
• The locks are manual.
• And the windows? They're manual too.
There are, however, a few surprises. There's a backup camera. Now, it is a federally mandated backup camera, but it's actually pretty decent. It's displayed in the main multimedia screen and not in a little square in the rearview mirror.
Also part of the multimedia system is a USB port, plus you get Bluetooth and steering-wheel audio controls, which is a nice little touch at this price range. The USB port looks like a truck-stop adapter that's been glued to the cigarette lighter, and the multimedia screen is smaller than some phone screens — but those are ridiculous sizes for a phone anyway.
All joking aside, this is a real truck for less than $20,000. You can't even get a Volkswagen hatchback for less than $20,000, and this has a 900-pound payload capacity, and it can tow up to nearly 3,800 pounds with a 152-horsepower four-cylinder engine and rear-wheel drive. And all of the nasty crap that you can put in this bed is stuff you wouldn't dare put inside your Volkswagen Golf.
So it's cheap, but should you buy one? Well, if you're willing to spend around $1,200 more, the Chevrolet Colorado has power windows and locks, six-speed manual transmission, better ride and handling, tilt and telescoping steering wheel, more room and nicer interior quality.
But, really, if you're a small-business owner and that bottom line is everything, you need a dirt-cheap truck to haul your dirt. And that truck is the Nissan Frontier.
Related Articles
|
global_01_local_1_shard_00001926_processed.jsonl/28416
|
File:CTU 0601.jpg
From Chrono Compendium
Jump to: navigation, search
Original file(3,290 × 3,659 pixels, file size: 1.6 MB, MIME type: image/jpeg)
File history
current13:14, 6 May 2010Thumbnail for version as of 13:14, 6 May 20103,290 × 3,659 (1.6 MB)ZeaLitY (Talk | contribs)
• You cannot overwrite this file.
The following page links to this file:
|
global_01_local_1_shard_00001926_processed.jsonl/28420
|
CSI SAP2000 v18
(Last Updated On: December 13, 2017)
CSI SAP2000 v18
New in SAP2000 v18
Graphical User Interface
• DirectX graphics mode has been enhanced to use DirectX 11 for enhanced speed and capabilities.
• A full 64-bit version of SAP2000 is now available.
• Ability to specify accidental eccentricity for response spectrum cases added.
• Automated response spectrum functions according to the Costa Rica Seismic Code 2010, Ecuador (NEC-SE-DS 2015), Korean KBC 2009, Mexico (CFE-93 and CFE-2008), and Peru (NTE E.030 2014) codes added.
• Auto-seismic loading according to Korean Building Code (KBC 2009) added
• Auto-seismic loading according to the Dominican Republic (R-001) code added
International Frame Design Codes
• Concrete Frame Design - ACI 318-08, -11, -14 enhancement allows specifying Design System Rho (ρ) and Design System SDS factors in the concrete frame design preferences.
• Steel Frame Design - Korean Building Code (KBC 2009) code added
• Steel Frame Design - Russian SP 16.13330.2011 code added
• Steel Frame Design - Eurocode 3-2005 enhancement to perform a basic torsion design for I- and tubular sections.
• The default design load combinations have been enhanced for ACI 318-08, -11, -14 to include roof live load patterns.
• The default design load combinations have been enhanced for CSA A23.3-04, CSA A23.3-14, CSA S16-09, and CSA S16-14 to include companion loads.
Output and Display
• Contour plots are now available for frame deflections and axial stresses.
• The center of mass is now reported in the Assembled Joint Masses table for each mass source.
External Import/ExportOutput and Display
• The export to Revit Structure has been enhanced to export steel sections parametrically such that Revit can import the section dimensions if it cannot match the section name.
CSI SAP2000 v18
BECOME A MEMBER TO REQUEST AN EVALUATION VERSION
|
global_01_local_1_shard_00001926_processed.jsonl/28454
|
Bible Lesson Week of February 22
Dear Parents,
Have you ever wondered what the Christian faith is really all about? Well, you are not the first person to do so. Nicodemus, the man your child is learning about this week, had questions about Jesus too.
Curious about Jesus’ identity, he met secretly with Christ to discover the truth.
John 3:1-21 describes Jesus’ conversation with Nicodemus. Getting into heaven doesn’t depend on following a set of rules or living a life morally superior to someone else. Receiving eternal life is based on one thing – a personal faith in Jesus Christ, God’s one and only Son.
Isn’t it a relief knowing that your salvation is in Christ? You don’t have to buy it. You don’t have to earn it. It isn’t passed down from your parents. You simply have to believe in Him and receive His salvation. What an amazing gift!
If you’ve been worried about your salvation or if you’ve been trying to do enough good things to get God’s attention, stop to consider Christ’s words. For God so loved the world that He gave His only begotten Son, that whoever believes in Him should not perish but have everlasting life. ( John 3:16)
Thank you for helping your child learn the Bible truth.
Things to talk about at home:
1. Why do you think Nicodemus wanted to see Jesus at night?
2. If you visited with Jesus, what would you ask Him?
3. How can you know that you will have everlasting life?
© Bible Preschool
Leave a Reply
|
global_01_local_1_shard_00001926_processed.jsonl/28460
|
What is Bitcoin and how does it work?
Bitcoin is a new form of internet money that is fundamentally different from existing currencies. It is decentralised, meaning it isn’t controlled by any single company or person, and all transactions are peer-to-peer. The history of all transactions is continually being verified by powerful computers, so it is impossible to change once a transaction has been accepted.
There are many benefits to this approach. There is no single entity that can manipulate it in any way, meaning there is no central authority like a government or institution controlling its supply and distribution. Similarly, since it is purely digital, open and peer-to-peer, anybody can buy bitcoin, and send any amount of money, cheaply and quickly, to anybody else, anywhere in the world.
The transactions that occur within the network are also validated by users. These users are rewarded in bitcoin for contributing their computing power to maintaining and validating the network. This process (called proof-of-work) also secures the network and helps it operate.
What about the double-spending problem associated with transactions?
Double-spending is essentially what it sounds like; it is the act of trying to send a specific amount of money, say $50, to two people at the same time. We know that only one person can receive this $50, otherwise you’d be making the other $50 out of thin air.
The Bitcoin network solves this problem by validating all transactions before accepting them. If a certain amount of money is attempted to be sent twice in succession, the first transaction will be accepted as there are sufficient funds for it to proceed, but the second transaction trying to spend the same amount of bitcoin will be rejected by the network as it conflicts with the first, verified transaction.
Dilbert on Bitcoin
Let’s dive a little further to understand the way in which bitcoin transactions work and what this means for the rest of the network.
Think of the transaction process similar to sending an email. Where anybody with an internet connection can send and receive email, they can do the same with bitcoins.
A user can send money by using a Bitcoin wallet. To do this, you use a private key (password) to access a public address (where the bitcoins you control are stored). Think of this process as logging in to your email account. Once you log in, you can send bitcoin like you send a message: the amount of bitcoin you would like to send is selected, and the address of the recipient is added. The transaction is then sent, and goes into a queue, awaiting validation.
The real magic of bitcoin happens during the validation process.
What is bitcoin mining?
All bitcoin transactions are validated and then listed publicly for all to see by computational mathematics conducted by virtual miners. The transactions are listed in a ‘block’ (think of each block as an individual ledger), are time stamped, and cannot be altered. They therefore become immutable.
In Bitcoin’s case, all completed blocks are linked to new blocks that are being opened every ~10 minutes. Each block contains the history of the previous block, which in turn creates a chain of information. Hence the term ‘blockchain' (learn more about blockchain here).
This information is publicly available for anybody to see. If a new pending transaction appears to be out of sorts from the prior recorded transactions, it will be rejected by the vast community of miners that are responsible for validating each new transaction.
Once transactions are secured within the blockchain, the information on each of the blocks becomes near impossible to alter once added to this pubic ledger. To change a single block of information would require changing the history in each of the blocks up the chain.
When a block is completed, the computers validating the transactions get rewarded by mining some bitcoin. The newly mined bitcoin is then added at the beginning of each new block, thereby informing the rest of the community that some additional bitcoins have been added into circulation.
Furthermore, the elegant proof-of-work algorithm that Bitcoin is built upon was designed to be adaptable to the amount of computing power attempting to validate each and every transaction. Therefore, no matter how many or how few computers are being used to make these cryptographic calculations, a set number of bitcoins will enter circulation approximately every 10 minutes. So you can’t just add more computers and get more bitcoin.
The code ensures that the amount of new bitcoins which can be mined is halved approximately every 4 years. So, at the beginning (2008) 50 bitcoins were entering circulation every 10 minutes.
This figure has halved twice since then, allowing miners to add 12.5 bitcoins each time a new block is added (time of writing is 2018). This figure will halve again in 2020 where there will only be 6.25 bitcoins mined every 10 minutes, and so on, until there is a maximum of 21 million bitcoins in circulation (ending in the year 2140).
Based on this, it’ll take roughly 36 years to mine the last bitcoin.
Zoolander mining
Retention of value
There will never be any more bitcoins created after this. This is very unlike traditional forms of currency, where governments are able to print more into circulation to deal with economic stresses.
Printing more cash and pouring it into an economy results in reducing its worth over time. Therefore, a dollar today (regardless of country) will always be worth more than a dollar in the future.
Bitcoin is therefore immune from the effects of inflation because its supply is capped. In fact, bitcoin is deflationary because it is likely that there will be far fewer than 21 million bitcoins due to lost accounts or incorrect transaction that have taken place over the years.
The ledger, the distributed database - it’s called a blockchain - is held in the cloud by all the parties involved. It can’t be broken by any of them. It’s cryptographically too strong. You would have to compromise the entire network to take over Bitcoin.
- Naval Ravikant
Bitcoin is everything that traditional currency is not. It is not controlled by any single entity, but is instead maintained by all the users and developers in a trustless network. It is tamper proof, and verifiable by all that are willing to look.
However, It’s not without drawbacks; because of its decentralised nature, a user will never have asset insurance like that built into the traditional financial system.
It therefore throws back the onus on the user.
The key advantage to this is that the user has total control and ownership of this form of internet money.
This means that a transaction cannot be stopped by any person or entity.
An account cannot be seized or frozen by a central authority.
No form of censorship or permission can be forced upon it.
It is a new way of thinking, but Bitcoin and internet money is simply the beginning.
Return to blog page
Stay updated with the latest crypto articles, explainers and resources:
|
global_01_local_1_shard_00001926_processed.jsonl/28466
|
Summer Exhibition 2015
Royal Academy staircase
Magenta Gallery
Magenta Gallery
Buddha by David Mach RA
Buddha by David Mach RA
Now to lunch. I’m very fortunate in having a friend who is a Friend of the RA. If you don’t have such a thing then I urge you to find one or sign up now. You get unlimited access to all the exhibitions at the Academy but more than that you can go through the door that leads to the Friends Room, Garden and even restaurant. On this occasion we had a fine light lunch finished off with an indulgent slice of lemon and poppy seed cake.
8 June — 16 August 2015
Main Galleries, Royal Academy, Burlington House, Piccadilly, London W1J 0BD
Open: Saturday – Thursday 10am – 6pm, Friday 10am – 10pm
Admission: £12, Friends of the RA and under 16s go free.
Leave a Reply
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/28480
|
Jordan by Steve Seebeck
Had to share an image of the sweet, beautiful, and smart Jordan whom Steve Seebeck photographed so beautifully. Jordan's make up was a classic glam look but her hair is what sticks out most in my mind. For our trial, she said," I want to wear it down because I've never had an updo I liked." I might have taken a little too much pride in the fact that she liked what I did so much she decided to wear it up!
|
global_01_local_1_shard_00001926_processed.jsonl/28500
|
Destroy All Software Screencasts Destroy All Software Screencasts Implementing Assertion Syntax We make two important changes to our assertion syntax. First, we switch from the old RSpec "should" syntax to the new "expect" syntax. Then we implement "raise_error", allowing us to write tests that expect the tested code to fail. In the process, we begin to build our test runner's test suite, using the test runner to test itself. Mon, 19 Nov 2018 00:00:00 +0000 Assertions Large and Small We explore a number of issues related to assertion size. Should we limit ourselves to one assertion per test? That question is much more difficult to answer than it seems. Should we assert "about" an object's attributes, or should we construct an expected value and assert the entire object "against" it? If we choose the right one in the right circumstance, the test itself can alert us to missing coverage. Mon, 08 Oct 2018 00:00:00 +0000 Test Runner From Scratch We write an RSpec-style test runner from scratch. During this screencast series, we'll continually build on this runner to see how to write good tests, and do demystify testing tools' internals. (Note 1: The test runner is similar to the one built in "<a href="/screencasts/catalog/building-rspec-from-scratch">Building RSpec From Scratch</a>" seven years earlier. Note 2: ANSI escape codes are mentioned briefly here. There's a bit more about them in "<a href="/screencasts/catalog/text-editor-from-scratch">Text Editor From Scratch</a>".) Wed, 05 Sep 2018 00:00:00 +0000 HTML Template Rendering We complete our templating system by writing recursive render functions, transforming our parsed template into HTML output. We then integrate the template library back into our demo application, ending with a real request going thorugh our complete server-side web framework: routing a request to the correct handler, looking up database records based on the request, and rendering a template using data retrieved from the database. Wed, 25 Jul 2018 00:00:00 +0000 HTML Template Language Parser We build a templating system from scratch to go with our router and database library. It uses haml-style syntax, where we don't have to write all of the angle brackets and closing tags of HTML. In this screencast, we define the language and write its parser. Thu, 05 Jul 2018 00:00:00 +0000 Better Database Library API We switch our database library from positional arguments to keyword arguments, in the same style used by ActiveRecord and many other database libraries. This saves us from argument order errors, making the library easier to use. Thu, 31 May 2018 00:00:00 +0000 Database Library Tests We start writing a test suite for our database library to keep ourselves honest, then use it to fix our SQL injection vulnerability. Tests open up easier refactoring, so we make the first of a few API improvements for usability. Fri, 27 Apr 2018 00:00:00 +0000 First Attempt at Database Library We make a first attempt at a database library. It hides potentially-complex SQL queries behind nice names, using simple SQL substitution to insert dynamic query parameters. Unfortunately, the ghost of the 1990s stings us and we end up with a framework-wide SQL injection vulnerability. Fri, 30 Mar 2018 00:00:00 +0000 Three Router Tweaks There are a few annoyances with the router that will crop up later. Rather than fixing them during screencasts about the database portion, we fix all three right now. This screencast is optional and doesn't show significant changes to the framework. Fri, 30 Mar 2018 00:00:00 +0000 Variables in Routes We extend our simple request router to allow variables in the routes, like the variable "username" in "/users/:username". It extracts the variables' values from the requested path and feeds them to the handler block, as in most web frameworks. Regexes are the obvious implementation choice in a language like Ruby. We briefly look at the pitfalls in the regex approach, then implement with a much more straightforward method. Fri, 23 Feb 2018 00:00:00 +0000 Routing Simple Requests The first step in our web framework is to handle web requests. We set up the basic project structure, then define a Sinatra-style routing DSL allowing us to route different request paths to different blocks of code. Thu, 08 Feb 2018 00:00:00 +0000 Malloc From Scratch We build the malloc() and free() functions from scratch, seeing how memory allocation actually works. This screencast is done entirely in C, but it's OK if you don't know C already; we'll introduce the necessary ideas as we go. (Nitpicky note: the comment in this screencast about pointers and arrays being "the same" will ruffle experienced C programmers' feathers. The C language does distinguish between arrays and pointers, so the comment is strictly wrong. However, thinking of arrays as being pointers will help new C programmers to understand what's actually happening: arrays are laid out directly in memory, with no extra metadata added, so the address of the array itself is also the address of the first element of the array. Simplifying this to "arrays are lies; they're really just pointers" is easier to grasp for someone who's new to C.) Thu, 09 Nov 2017 00:00:00 +0000 HTTP Server From Scratch We build an HTTP server that can serve static files from disk, as well as dynamic applications in the style of cgi-bin. The network server component is built using socket system calls (socket, setsockopt, bind, listen, and accept), rather than using the pre-made TCP servers available in the Ruby standard library. Mon, 09 Oct 2017 00:00:00 +0000 Shell From Scratch We build a shell in the style of the Bourne shell, Bash, zsh, etc. It supports (1) running commands with arbitrarily many arguments, (2) quoting those arguments, and (3) combining the commands into arbitrarily long pipelines where the output of one command becomes the input of the next. This requires writing a parser, which we do with Parslet, a PEG parser library. Thu, 31 Aug 2017 00:00:00 +0000 Text Editor From Scratch We build a text editor from scratch. It includes basic text editing: moving the cursor, typing, backspacing, etc., as well as undo. However, we leave out some of the less-interesting bits, like saving edited text to files. Thu, 03 Aug 2017 00:00:00 +0000 Data Compressor From Scratch We build a self-contained data compressor and decompressor from scratch. The compression scheme is based on Huffman coding, which is used in gzip, zip, and many other compression formats. No prior knowledge of Huffman coding or data compression is necessary. The source code, including helper files not shown in the screencast, is available <a href="">on GitHub</a>. Tue, 18 Jul 2017 00:00:00 +0000 A Compiler From Scratch We build a small compiler out of the standard components: a tokenizer, a parser, and a code generator. By the end, we successfully compile some code in our language, producing JavaScript output that we can execute. Most compilers are highly optimized for speed, but ours will be optimized for easy readability and understanding. Thu, 29 Jun 2017 00:00:00 +0000 Final Notes on Computation We examine some curiosities that tie the ideas in this series together. First, how can we write a grammar for the syntax of regular expressions themselves? That is, what are the rules for a valid regex? Likewise, how can we write a grammar for the syntax of grammar definitions themselves? (The answers to these are surprising!) Finally, how does the historical division between Turing machine and lambda calculus relate to the modern division between imperative and functional programming? <p>(Note: The grammar-grammar shown in this screencast isn't actually a grammar for itself for a trivial reason: it uses double quotes for literals, but only describes a syntax using single quotes. Changing the quotes to ''' would correct the problem, though that syntax is less clear to human readers. This doesn't impact the conclusions drawn.) Tue, 17 Jan 2017 00:00:00 +0000 The Most Complex Languages We finish the Chomsky hierarchy by looking at context-sensitive languages (which include C, JavaScript, and many other programming languages) and unrestricted grammars, which are Turing-complete. We also connect the undecidable problems to the Chomsky hierarchy by thinking of them as a fifth level. Surprisingly, there's at least one programming language whose grammar is <a href="">technically undecidable</a>. Wed, 07 Dec 2016 00:00:00 +0000 Recognizing Programming Languages Compilers and interpreters need to understand code's structure to run it, just as we need to understand code's structure to read it. This screencast introduces context-free languages, which are used to define the syntaxes of Python, Lua, Lisp, and many other programming languages. We begin with a simple synthetic example showing why context-free languages are more powerful than regular languages. Then, we examine the actual grammar definitions of the Python and Lua programming languages. We analyze code snippets in each language, using the languages' grammar definitions to see the structure of the code in the same way that a compiler or interpreter sees it. Tue, 15 Nov 2016 00:00:00 +0000 Recognizing Simple Languages This screencast introduces the regular languages, the simplest level in the Chomsky hierarchy of languages and their corresponding computational systems. Regular languages are sets of strings recognized by many equivalent systems, including the regular expressions that we use in everyday programming. We begin with a simple regular expression, gradually transforming it into a regular grammar, and then into a finite state machine. This shows the relationship between these three systems, and also hints at one method of implementing regular expression engines. Fri, 28 Oct 2016 00:00:00 +0000 The Limits of Computation We explore some problems that no practical or theoretical computer can solve. Does a given function always return the same value? Are two functions equivalent? Will a given function ever return? We also briefly examine implications of these three undecidable problems in compilers, refactoring, and powerful static type systems, respectively. Wed, 12 Oct 2016 00:00:00 +0000 Power of Lambda Calculus We build numbers from scratch using nothing except functions of one argument returning other functions of one argument. Those numbers, together with a similar implementation of booleans, allow us to remove all Python dependencies from the factorial function. When we're finished, it doesn't even look like code any more, but it still performs the same computation that the original Python function did. The final code is available <a href="">on GitHub</a>, but it won't make sense unless you've watched the screencast! Note 1 (for after you've watched this screencast): When converting from Church numerals into Python numbers, there's nothing special about <code>(lambda x: x + 1)(0)</code>. We could also use <code>(lambda x: x + "A")("")</code>, for example. In that case, the Church numeral 1 would be converted into "A"; 2 would be converted into "AA" etc. Note 2: MULT can be written a bit more more simply as <code>lambda n: lambda m: n(ADD(m))(ZERO)</code>, but the more complex version shown in the screencast is still correct. Thu, 22 Sep 2016 00:00:00 +0000 Computing by Constructing We write a simple, easy-to-read example function in Python. Then, remove Python features one by one, transforming it into the lambda calculus. At the end, there's nothing left except (1) definitions of functions that take exactly one argument and (2) calls to functions with exactly one argument. At the end, there are still some helper functions that use Python features. Next time, we'll remove all of those as well, reimplementing numbers and booleans from scratch using nothing but functions of one argument. The final code is available <a href="">on GitHub</a>, but it won't make sense unless you've watched the screencast! Fri, 02 Sep 2016 00:00:00 +0000 Power of Turing Machines We show that Turing machines can achieve three results that we're familiar with from everyday programming: repetition, conditionals, and compound data structures. We use all three in an example that implements integer addition. We also see how arrays, strings, and nested data structures can be built using the same techniques. Fri, 19 Aug 2016 00:00:00 +0000 Computing by Changing We build the initial Turing machine simulator, using it to run our first simple Turing machine. Some of Alan Turing's many clever simplifications are pointed out along the way. Thu, 04 Aug 2016 00:00:00 +0000 Introduction to Computation This is a brief overview of the topics that we'll cover in the rest of this series: Turing machines, the lambda calculus, the halting problem, Turing equivalence, and the Chomsky hierarchy. Thu, 04 Aug 2016 00:00:00 +0000 A Day in The Life As the last Destroy All Software screencast (at least for now), this one is weird. It covers a couple of command line scripts that never showed up in other screencasts, then shows a glimpse of what the last two years of screencast and talk preparation have looked like from my perspective: tools, organization, editing, etc. Thanks to everyone who's subscribed over the past two years! It's been real. Thu, 21 Mar 2013 00:00:00 +0000 When Rails Is Right Several Destroy All Software Screencasts have shown ways to "fight" web frameworks like Rails, avoiding its design primitives. Usually these focus on using service objects instead of controllers and models. This screencast demonstrates a refactoring where Rails primitives do provide the best design after all. We start with two controllers, refactoring them to move behavior out. At the end, the controllers only do delegation and translation to and from HTTP. Note: There's a mistake in the "Account.create_with_schema" method: it should take the account parameters from the controller. This doesn't affect any of the content of the screencast, fortunately. Thu, 07 Mar 2013 00:00:00 +0000 Test Recommendations This screencast provides a laundry list of test recommendations. Some of them have been mentioned in passing in other screencasts, but the whole group has never been presented together. First, recommendations about general test design: 1) separate unit and integration tests, and 2) use alternate constructors to simplify test object creation. Then, recommendations about using test doubles like stubs and mocks: 3) name your stubs for debugging and clarity; 4) don't stub primitives; 5) listen to test setup complexity, even if it's not immediately obvious; and 6) only stub things that you trust. Thu, 21 Feb 2013 00:00:00 +0000 Running Tests Asynchronously In most Destroy All Software screencasts, the tests are run synchronously: the test process is forked from the editor and blocks the terminal. This screencast shows another option: running tests asynchronously in another split. First, we use tmux, which is a common approach. Then, we do it using Unix primitives: a named pipe to communicate between the two windows, and a shell script to manage the communication. Thu, 07 Feb 2013 00:00:00 +0000 Actor Syntax From Scratch In this screencast, we use Ruby's remarkable flexibility to actually implement the theoretical actor syntax shown in <a href="">"Separating Arrangement and Work"</a>. We start at the theoretical syntax, then work forward to a working system: get it to parse; get it to run; and then get it to do the work that we want it to do. This highlights the flexibility of Ruby, as well as serving as a simple explanation of the actor model. Thu, 24 Jan 2013 00:00:00 +0000 Analyzing Context Switches When analyzing a system's behavior or performance, there's a huge spectrum of tools available: everything from the load average—which boils a machine down to a single number—to DTrace and STrace, which can provide very fine-grained information. We'll briefly look at the load average and why it's not sufficient. Then we'll look at one particular method that's in between the two extremes: the /usr/bin/time command, which can report many statistics about program execution. We'll use it to compute the number of involuntary context switches in each of Destroy All Software's Cucumber scenarios, giving us a starting point for localizing an anomaly in the system's behavior. Note: Some questions have been raised about the exact details of load average accounting. Unfortunately, I'm not an expert on Linux kernel internals, so I'm going to resist the urge to try to correct myself. To be brief: I may have significantly overstated the impact of IO on load average accounting. In any case, the larger point is unaffected: load average is at one extreme of the continuum of performance analysis tools and, once you get past the first few seconds of performance analysis, you'll need to dig deeper. Thu, 10 Jan 2013 00:00:00 +0000 A Bit of C Most of the software running on our machines is written in C—the operating system, our VMs and compilers, the Unix shell and its various utilities, and our editors. This screencast briefly introduces a project written in C, focusing on its unit tests and the ways in which its design is similar to OO. This is not a tutorial on C—programming in it effectively requires a lot of learning. But, as demonstrated here, many ideas and practices used in more modern languages do apply directly to programming in C. Note: there's at least one pointer bug visible in the code shown here ("trie_create" incorrectly zeroes the "values" field instead of the entire trie). Thanks to <a href="">Leo Cassarani</a> for <a href="">pointing this out</a>. Thu, 27 Dec 2012 00:00:00 +0000 Test Cases vs. Examples Before BDD and tools like RSpec took off, tests were often written in a "test case" style: they were phrased in the computer's terms. Well-written RSpec usually approaches testing from the human direction: instead of focusing on the software's terminology, the human-visible behavior is specified in English, and the examples map those English descriptions onto software terminology. In this screencast we'll refactor part of <a href="">Hamster</a>'s test suite, translating it from a test case style to an example style. This will require many trade-offs, most notably trading completeness of test coverage in some corner cases for readability of test names. Note: There's a bug in the mutation test that I missed during recording. Because RSpec's "let" variables are memoized, the "empty" value is only computed once. If it were mutated, both references to "empty" would point to the mutated value, defeating the test. As pointed out by <a href="">Myron Marston</a>, the test would <a href="">even pass</a> for Ruby's Array class, which clearly mutates. Unfortunately, mistakes like this are possible when validating a test by breaking the test itself, rather than by breaking the production code. Thu, 13 Dec 2012 00:00:00 +0000 Debugging With Tests We'll start by translating a bug report into a test, providing an objective first-pass validation of any fix we come up with. Then we'll push down into the system using tests as a guide: each test we write will be smaller and more focused. To simulate ignorance of the system, we'll avoid looking at production code until we've gotten to the very bottom of the stack. To simulate a complex bug where the stack trace doesn't indicate the full subtlety of interactions, we'll push down one step at a time instead of simply jumping to the deepest part of the stack. When we get down to the defect itself, we can then run the tests we generated in reverse order, "popping stack" back to the system-level view. Thu, 29 Nov 2012 00:00:00 +0000 Imperative to OO to Functional This screencast demonstrates a refactoring through three and a half paradigms. First, we see the code in imperative form: code that mutates data, with the code and data being separated. Then we merge some of the data and code to form an object to get object oriented code: code and data mixed, with mutation. We quickly look at a variant of this where the object is only allowed to have pure functions (no mutation or IO). Finally, we remove the object, leaving only the functions, which gives us a more standard functional solution. Thu, 15 Nov 2012 00:00:00 +0000 Isolating by Separating Value This screencast presents a method for writing isolated tests without using stubs or mocks. We'll explicitly separate the value part of an object—its instance variables—from the behavior part—its methods. Then, when testing other classes, we can integrate them only with the value part, as exposed by the accessor methods. We avoid the danger of mocks and stubs going out of sync with the code being tested, since we're integrating with real accessor methods that will exist in the final object. We also avoid the danger of accidentally calling complex methods that shouldn't be under test: since we only test against the data part of the object, there's no risk of integration. This method isn't universal. It falls flat on objects that are heavy on behavior and light on data. But it is one way to test against commonly-used, data-heavy classes (in the case of the Destroy All Software codebase that we work on here, the Screencast class). Thu, 01 Nov 2012 00:00:00 +0000 Primitive Obsession Primitive obsession is the use of primitive values—integers, strings, arrays, hashes, etc.—when a more specialized, domain-relevant object would provide a better design. Rather than discuss the idea abstractly, this screencast is a concrete example: we examine Destroy All Software's Screencast class, then replace it throughout the system with a simple hash. At the end, we review the changes to get a sense of what primitive obsession does to a design. Note: As mentioned in the screencast, no tests are run or touched. At over 15 minutes long, this screencast is well on the high end of DAS lengths and test maintenance would've increased that. As a result, at least one mistake is made: the Screencast.slug method should've taken a screencast and computed the slug from it. This doesn't impact the design analysis, but certainly reaffirms the importance of testing. Thu, 18 Oct 2012 00:00:00 +0000 Separating Arrangement and Work Hard coupling—putting the name of one class inside of another—is a problem for both design and testing. It makes adjusting the objects' boundaries harder because the static names must be changed and different dependencies can't be swapped in for those hard-coupled points. It makes testing harder because you can't test one object without it invoking the other, so focusing a test is difficult. Dependency injection can help with this, but it's really a special case of a more general principle: separating the arrangement of a program's pieces from the work that they actually do. This screencast is an example of separating arrangement of work, but not by dependency injection. Instead, we separate the data flow between objects from the objects themselves, which eventually allows us to convert to a simple actor-based concurrency model in one smooth transition. Thu, 04 Oct 2012 00:00:00 +0000 Where Correctness Is Enforced Imagining the most naive possible Rails app, it would probably do a lot of data validation at the controller level. We don't do that, of course: we push the data integrity responsibility down to ActiveRecord, via validations. Unfortunately, ActiveRecord validations aren't good enough either: there are a few ways that they can be sidestepped, and those ways will eventually come up in many real-world apps. This screencast looks at those sidestepping mechanisms, the problems they create, and how to solve them by using real database constraints. Thu, 20 Sep 2012 00:00:00 +0000 Python vs. Ruby Objects Many people assume that Python and Ruby have similar object systems. That's sort of true, in that they have roughly the same level of dynamic expressiveness, but the way that they achieve it is actually quite different. We'll compare the two systems, focusing on one very fundamental division between them: Python deals with attributes, but Ruby deals with methods, with each implementing one in terms of the other. This leads to some characteristic properties of the language: Python's consistency and focus on correctness vs. Ruby's terseness for defining and calling methods. Thu, 06 Sep 2012 00:00:00 +0000 Removing a Rubinius Feature Rubinius is a Ruby implementation known for being "written in Ruby", although that's not entirely true since it does have a large VM written in C++. We'll start off by briefly looking at the structure of Rubinius, focusing on the load order and object system bootstrapping. Then we'll remove a feature from it by updating all of the source files that reference that feature, then verifying the change both by running the tests and by visual inspection. Note: At the very beginning, I misspeak and say that Class's superclass is Class. This isn't true: Class's superclass is Module, and the class of Class is Class, which is what's being set up in the line in question. Object system bootstrapping is hard to keep straight! Thu, 23 Aug 2012 00:00:00 +0000 Splitting Active Record Models This is a continuation of the <a href="">previous</a> screencast, "Collapsing Services into Values". We'll transform the Subscription value object we created into a database table and ActiveRecord model. Although creating the value object in the last screencast did clean up the system, it still left the User class with a lot of knowledge about subscriptions. User still contained their validations, and in a complete system it would have knowledge about how to create subscriptions from itself and update itself from subscriptions. When we extract the subscriptions into their own table and model, this knowledge disappears from User entirely, although it does re-raise the question we started with: where should the logic go? Thu, 09 Aug 2012 00:00:00 +0000 Collapsing Services Into Values In the "What Goes in Active Records" series (<a href="">part 1</a> and <a href="">part 2</a>), we looked at some design constraints for what goes in ActiveRecord models. Sometimes, these constraints can lead to very small classes being extracted, which often feels awkward. This screencast looks at one such class: a single line of service code with an alarmingly long test file. By creating a new value class and tightening the service's interface around it, we shorten the tests slightly. Then, by collapsing the service into the new value class, we shorten them even more. We're left with tests that are easier to reason about, and with a new abstraction reified in the code. Finally, although this isn't stated in the screencast, the tests are fully isolated from Rails after this refactoring, whereas the original tests integrated with it. The new tests are about eight times faster (and will remain fast even as the application grows). Thu, 26 Jul 2012 00:00:00 +0000 Functional Core, Imperative Shell Purely functional code makes some things easier to understand: because values don't change, you can call functions and know that only their return value matters—they don't change anything outside themselves. But this makes many real-world applications difficult: how do you write to a database, or to the screen? In this screencast we look at one method for crossing this divide. We review a Twitter client whose core is functional: managing tweets, syncing timelines to incoming Twitter API data, remembering cursor positions within the tweet list, and rendering tweets to text for display. This functional core is surrounded by a shell of imperative code: it manipulates stdin, stdout, the database, and the network, all based on values produced by the functional core. This design has many nice side effects. For example, testing the functional pieces is very easy, and it often naturally allows isolated testing with no test doubles. It also leads to an imperative shell with few conditionals, making reasoning about the program's state over time much easier. Thu, 12 Jul 2012 00:00:00 +0000 Test Isolation Without Mocks In this screencast we TDD the same code twice: once in the traditional, imperative OO way with mutation; then again in a functional way by returning a value. We look at several differences between the two implementations, but the most interesting is in the way that they're isolated. Though both are isolated against external behavior, only the OO version requires mocks. The functional version achieves isolation by taking a value in (a Tweet value object) and return a value out (an array of strings to be rendered). This saves us from the danger of mocked methods going out of sync. Note 1: For realism, the tests are written in exactly the way that I naturally wrote them on my first practice run. This does make the OO version slightly more complicated; the mocking could be simplified but, of course, it can't be removed. Additionally, since this is how I wrote it originally, it shows how easy it is to introduce accidental complexity when mocking in tests. Note 2: The magic numbers that I claim have "disappeared" in the functional version are still present in the padding numbers (" " * 16, etc.) This was simply sloppy language on my part; I should've said that the tests and production code together remove the magic from the numbers. The production code contains the details, whereas the tests give a clear high-level view of what's happening. Thu, 28 Jun 2012 00:00:00 +0000 Time to First Request This time we build a script that can run a process, wait for it to start listening on a socket, and then kill it. This is useful for benchmarking a web framework's (or even a web app's) startup times. We also compensate for error in the measurements due to cold cache effects and due to constant costs introduced by our script itself. The script is <a href="">available</a> for download if you'd like to use it. Thu, 14 Jun 2012 00:00:00 +0000 Conditional Whac-A-Mole Removing conditionals can sometimes reduce complexity. However, the benefits aren't so obvious in this example. We'll replace a conditional five times, each using a different language feature, and see how it impacts the understandability of the code. Thu, 07 Jun 2012 00:00:00 +0000 Test Driving Shell Scripts To show that Bash really is a full programming language, let's test-drive a shell script. We'll have all of the familiar tools from xUnit style testing tools, like setUp methods and assertions. Thu, 31 May 2012 00:00:00 +0000 The Mock Obsession Problem When first learning about mocks and isolation, it's tempting to overdo it, and I did. We'll look at a test that I wrote several years ago and examine its obsession with mocking. As we do that, we'll refactor it to be simpler, more direct, and with less indirection via mocks. Thu, 24 May 2012 00:00:00 +0000 Ugly Tests Trigger Refactoring Paying close attention to your tests can highlight design problems in production code that you might not notice otherwise. Here, we'll look at an example that occurred during the development of <a href="">Raptor</a>: the tests contain deep stubs, irrelevant names, and a rectangular shape, all of which point to a design problem. Thu, 17 May 2012 00:00:00 +0000 A Magical Isolation Story Python's namespacing and module system make it possible for a testing tool to enforce test isolation automatically. We'll test drive such a tool from scratch, though it will be a rough implementation (it won't undo its changes after tests complete, for example). This will give us the chance to see several features of Python that are missing in Ruby. Thu, 10 May 2012 00:00:00 +0000 Mutation in Tell Don't Ask The Tell Don't Ask principle tells us not to manipulate objects conditionally based on their state; instead, the knowledge of when to manipulate belongs in the object. That sounds like a rule about mutability, but it's not: it applies just as well when objects are immutable. This screencast will look at an example of "asking", convert it to a "tell", and examine the role (or lack thereof) of mutation. Thu, 03 May 2012 00:00:00 +0000 Pretty Git Logs In this screencast we'll derive my git log format from scratch. It has one line per commit without sacrificing detail, with each field colorized and aligned in its own column. Along the way, we'll see a couple of command line tricks—column and various arguments to less—that haven't appeared in a screencast before. My <a href="">gitconfig</a> and <a href="">githelpers</a> files are both available on GitHub. Thu, 26 Apr 2012 00:00:00 +0000 Sucks/Rocks 8: The Whole Design In the last part of the series, we start by elevating the Cucumber features to run against the full stack, not just the service layer. Then, we step back and look at the whole design: how could we have handled NoScore without a sentinel? What was the result of the obsession with avoiding nil? And how would the design allow us to easily switch to a new search engine? The full source of Sucks/Rocks is available <a href="">on GitHub</a>. Thu, 22 Mar 2012 00:00:00 +0000 Sucks/Rocks 7: More Cucumber In the previous part of this series, we did some exploratory testing to ensure that the controller was working. To avoid repeating that work in the future, we'll automate it by writing more Cucumber tests. In the process, we'll find and fix yet another bug. Thu, 15 Mar 2012 00:00:00 +0000 Sucks/Rocks 6: a Controller Finally, we actually serve the new Sucks/Rocks app as a web site. Using the old static assets, we introduce a tiny controller method to wire our services up to to Rails. This ends up revealing a bug, which we write a test for and fix. Thu, 08 Mar 2012 00:00:00 +0000 Sucks/Rocks 5: a Bug and a Model In part five, we go back and fix the bug that we found in part three. Then, we complete the caching layer by pushing down to the ActiveRecord model. Finally, five screencasts in, we introduce a database schema and use Rails. Thu, 01 Mar 2012 00:00:00 +0000 Sucks/Rocks 4: Caching We now add a caching layer to Sucks/Rocks. It's another plain old Ruby object that uses the RockScore service. This is part four of the series, and in it we add our third class, but we still don't need any Rails at all! Thu, 23 Feb 2012 00:00:00 +0000 Sucks/Rocks 3: The Search Engine In part three, we integrate Bing as our search engine source, using VCR for record/playback of interactions when testing it. We also get our first passing Cucumber scenario, but find a bug in the process. Thu, 16 Feb 2012 00:00:00 +0000 Sucks/Rocks 2: Computing Scores In part two, we begin the unit-level TDD for Sucks/Rocks. I try to explain every little decision I make as I'm TDDing: how the examples are chosen, when to generalize, and how to force the code to return a specific data type. Thu, 09 Feb 2012 00:00:00 +0000 Sucks/Rocks 1: The Rails App In this series, we'll rebuild <a href="">Sucks/Rocks</a> from scratch. It's currently broken because the services it relies on have been discontinued. We'll rebuild it as a Rails app using both TDD loops (acceptance and unit), and using many of the design principles discussed in earlier Destroy All Software screencasts. Thu, 02 Feb 2012 00:00:00 +0000 Three Test Shapes When keeping tests small, they tend to repeatedly form a few consistent shapes. This time, we'll look at the three main test shapes that are relevant to mutability: immutability, local mutation, and global mutation (or, equivalently: nondestructive, locally destructive, and globally destructive). Then, we'll look at three ways that these tests can go wrong by being implementation-obsessed. Thu, 19 Apr 2012 00:00:00 +0000 Pushing Complexity Down Pushing complexity down to lower levels is a common refactoring. We'll TDD a small class to work on, then look at two ways to push a particular conditional down to a lower level. One of them will result in a much better design than the other. This shows that merely pushing down isn't enough; sometimes it's simply redrawing the lines in the same bad design. Thu, 12 Apr 2012 00:00:00 +0000 The .vimrc By popular demand, we'll talk a trip through my .vimrc file—not a line-by-line examination, but a look at the most interesting parts that you might want to steal. We'll see tab key overloading, customizations to ease the rougher edges of Ruby syntax, and my system for running only the tests that are needed. My <a href="">vimrc</a> is on GitHub, as is the test running <a href="">plugin</a> that was mentioned. Thu, 05 Apr 2012 00:00:00 +0000 When to Generalize in TDD When a TDDed test fails, you can often make it pass by "sliming": making the method in question return a hard-coded value, instead of computing the answer in the "right" way. When you write that slimed code, when should you generalize to the full implementation, and when should you write another test to force the generalization? We'll look at some specific cases where I jump straight to the generalization. Thu, 29 Mar 2012 00:00:00 +0000 Shorter Class Syntax How terse can Ruby class definition get without changing the language or impacting readability? We'll give it a shot in this screencast, finding it surprisingly easy to turn six lines of declaration into two. The resulting helper code has been cleaned up, had its monkey patches removed, and is available <a href="">as a gem</a>. Thu, 26 Jan 2012 00:00:00 +0000 Generating Coupons With Bash Destroy All Software coupon codes are each composed of three random Unix words, like "ls ruby fi". We'll build the coupon generation script from scratch. It starts with the list of man pages on the host system and turns them into random three-word coupon codes. Although the script is fundamentally one long chain of pipes, we'll take care to keep the names and structure readable throughout. Thu, 19 Jan 2012 00:00:00 +0000 Repository Statistics in Raptor We revisit an old topic: computing statistics over a repository. This time, we have a concrete example taken from the Raptor web framework, which has its own statistics script that results in very detailed plots. Along the way, we'll see some shell details, including some confusing behavior from the `time` builtin. Raptor's <a href="">statistics script</a> and the <a href="">run-command-on-git-revisions</a> script are both available if you'd like to try them out. Thu, 12 Jan 2012 00:00:00 +0000 Brittle and Fragile Tests The terms "fragility" and "brittleness" get thrown around: proponents of integration tests claim that mocking is fragile; proponents of mocking claim the opposite. It turns out that they're both right, and we'll look at why, then end with a look at an arguably incorrect use of the terms as applied to truly isolated tests. Thu, 05 Jan 2012 00:00:00 +0000 Stubbing Unloaded Dependencies Writing fast tests often means testing without loading the rest of the application. When you want to stub a method on a class that isn't loaded, how do you do it? There are many ways, and here we'll quickly look at five of them, four of which have no test performance impact at all. Note: After the publiciation of this screencast, RSpec gained a "stub_const" function. Using this is generally easier than creating an empty class, but provides similar results. The trade-offs are slightly different from the empty class approach, but almost all of the disussion in this screencast holds. Thu, 29 Dec 2011 00:00:00 +0000 Emacs, Chainsaw of Chainsaws Most Destroy All Software screencasts have used Vim, so let's take a moment to appreciate Emacs, the other "One True Editor". We'll look at some of my customizations from my past as an Emacs user, as well as some of the features I miss when I'm in Vim. (After publication, <a href="">Avdi Grimm</a> reminded me of <a href="">Evil</a>, which you may want to try for better Vim emulation in Emacs.) Thu, 22 Dec 2011 00:00:00 +0000 Untested Code Part 4: Refactoring 2 In the final part of this series, we pull a large piece of code out of the controller, moving it into its own class. That class is tested in isolation by using the controller's integration tests as a guide. While doing this, one of the tests stands out with very complex stubbing, so we make a small design change to simplify it. Finally, we step back and look at the final suite of tests we've created. Thu, 15 Dec 2011 00:00:00 +0000 Untested Code Part 3: Refactoring 1 Now that we have tests, we can finally refactor! We'll do some minor cleaning on the structure of the controller action, and then extract some model logic into a new model method. During the process, we'll disentangle the book-finding logic from the book-adding logic. This will allow us to extract the book finding logic in part 4, reducing the controller to very little code. Thu, 08 Dec 2011 00:00:00 +0000 Untested Code Part 2: Adding Tests In part 2 of this series, we write actual tests for the context structure we discovered in part 1. Along the way, we'll verify that each test is actually testing something by breaking the code in a very small way to see it fail. (Ideally, this would cause an assertion failure each time; some erroring tests are allowed to slip by for speed's sake.) (The respond_to block used in this screencast could be replaced with `post :foo, :id => 12, :format => :js` in the test, leaving the production code unchanged.) Thu, 01 Dec 2011 00:00:00 +0000 Untested Code Part 1: Introduction This is part one of a three part series on dealing with legacy code. We'll start with a completely untested Rails controller, put tests around it that cover all of the cases, and then extract pieces of the code safely using the tests, while simultaneously pushing the tests down to lower levels of isolation. In this screencast, we introduce the code and try to create an exhaustive list of pending RSpec contexts and examples. Thu, 24 Nov 2011 00:00:00 +0000 Web Apps: When to Test in Isolation With 40 screencasts in the catalog, many of which discuss testing, we now have enough context to talk about when to test in isolation and when to integrate. It comes down to one main question: who owns the interfaces you depend on? We'll go through the major components in a modern web app, looking at why each can be tested in isolation or not, or why they're somewhere between those extremes, and see exactly why each one falls where it does. Thu, 17 Nov 2011 00:00:00 +0000 Outside-in TDD: Stubs vs. Stash When doing TDD from the outside in, stubs are the norm. We build the outermost class first, stubbing its dependencies, which may not even exist yet. Those stubs tell us what the interface of the next layer down should be; this is how TDD drives the design. When we're not isolating our tests, though, we can't do this. We can still start at the top, but we can't make the test pass without an actual implementation. This can lead to large, unwieldy commits. We'll look at how to avoid those large commits using the git stash, and then compare the results of outside-in TDD with stubs vs. outside-in TDD with the stash. Thu, 10 Nov 2011 00:00:00 +0000 What Goes in Active Records Part 2 In the second part of this series, we'll actually remove the various parts of the model that don't belong, as shown in the part 1. Most of the time will be spent removing the two ActiveRecord callbacks, replacing them with a class that sits between the controller and model, mediating the lifecycle of the User and Braintree API objects. We'll also briefly replace the other two methods with implementations outside the ActiveRecord class. Thu, 27 Oct 2011 00:00:00 +0000 What Goes in Active Records Several screencasts have talked about moving logic out of models and into naked Ruby classes, but what are the things we should leave behind in the ActiveRecord models? That's what we'll address here: a walk through the types of methods that belong on AR models, and why they belong there. Thu, 20 Oct 2011 00:00:00 +0000 TDDing Spikes Away With Rebase A spike is a small, disposable experiment in code. After learning about your problem or solution via the spike, you throw it away and rewrite the code using TDD. Here, we look at a process for doing that incrementally, using the spike as a guide and git's rebase functionality as the means. It's only appropriate when the spiked code is heavily constrained by external interfaces. But, in that case, it can guide you through tricky third party interactions. Because this is a subtle topic, the screencast is necessarily demonstrating a simplified form: the spiked and TDDed code are identical. When doing this in practice, the rebases will result in nontrivial conflicts since the implementations won't be identical. The more dissimilar they are, the closer you are to true test driven design, and the less useful this technique is. Thu, 03 Nov 2011 00:00:00 +0000 Which Tests to Write In this screencast, we'll revisit the example from "<a href="/screencasts/catalog/performance-of-different-test-sizes">Performance of Different Test Sizes</a>", where we wrote similar pairs of tests at four different levels. We'll go through each level, asking which of those tests we should keep, and why. Along the way, we'll compare the layers a test claims to test to the layers it actually interacts with, and see how that indicates the quality of the test. Thu, 13 Oct 2011 00:00:00 +0000 Splitting Into Fine Grained Tests The bigger a single test is, the worse the feedback. We'll look at a test that's already good but can be split further, comparing the failure patterns it generates before and after splitting. By turning one test into three, we'll be able to understand the failures simply by looking at the test names, instead of having to analyze the actual assertion failures. Thu, 06 Oct 2011 00:00:00 +0000 Simple Bash Script Testing Cowboying a shell script is fun, but how do we test it? We'll look at a basic method in this screencast, using nothing except standard shell tools. In the process, we'll also see a simple method for using a git repository as a fixture for testing a tool that operates on it. Everything shown is Bash-compatible, though the screencast is a mix of Bash and Zsh. Thu, 29 Sep 2011 00:00:00 +0000 Performance of Different Test Sizes This time, we analyze the execution time of testing a small piece of behavior at four different levels: from Cucumber, from the controller, from the view, and from an isolated Ruby class. This lets us quantify the performance benefit of fine-grained testing and make more objective decisions about what should be tested at a given level. Thu, 22 Sep 2011 00:00:00 +0000 History Spelunking With Unix In this screencast, we once again analyze the history of a git repository. This time, though, we go further: we first generate a chart showing test runtimes across revisions, using only the command line. We then focus on a sudden change in runtime that the chart reveals, repurposing git bisect to make git find the commit that caused the change automatically. Thu, 15 Sep 2011 00:00:00 +0000 Some Vim Tips This is a screencast full of tips for learning Vim. They range from introductory (how do I learn to use Vim effectively?) to specific questions I'm asked (what plugins do I use?) to advanced (how should I guide my use of plugins to maximize speed?), so there should be something for everyone. We also touch on color schemes a couple times: both my grb256 color scheme based on ir_black (available <a href="">on GitHub</a>) and <a href="">Solarized</a>, which is a more subtle choice. Thu, 08 Sep 2011 00:00:00 +0000 Extracting From Models Returning to ChiliProject, we now extract some application logic from a model into some naked classes in lib. This results in removing code from the model, centralizing knowledge, eliminating duplication, and providing points for reuse. A method marked "This method [...] is to be kept as is" even gets refactored. (I'm sure it'll be fine!) Thu, 01 Sep 2011 00:00:00 +0000 Acceptance Tests In this screencast, we look at Cucumber for writing high-level acceptance tests with examples taken from Destroy All Software's Cucumber suite. We'll touch on step naming and the abstract/detailed split between features and steps, as well as some performance tips and notes about browser engines. Thu, 25 Aug 2011 00:00:00 +0000 Extracting From Controller to Model This is a follow-up to the two-part controller refactoring series. Here, we step outside the controller itself, moving small pieces of model querying and logic into the model. This clarifies the controller's intent, provides points for reuse, and simplifies testing of both the controller and the newly-extracted model methods. Thu, 18 Aug 2011 00:00:00 +0000 Controller Refactoring Demo Part 2 This is the second of two screencasts showing a live refactoring of a large controller method. In this half, we try to improve the names of all of our new methods by at least a little bit. Along the way, we extract some more fine-grained methods. At the end, we look at how breaking this class down makes it easy to move code out of the controller and into other classes. The final version of the class is <a href="">available</a> if you'd like to look over it. Thu, 11 Aug 2011 00:00:00 +0000 Controller Refactoring Demo Part 1 This is the first of two screencasts showing a live refactoring of a large controller method. In the first half, we break the method down into smaller methods so that we can understand it better. In the second half, we'll reason about those small pieces, find good names for them, and clarify. The end goals are small, understandable methods; better names; reduced early returns, conditionals, and other control structures; and better clarification of intent. Thu, 04 Aug 2011 00:00:00 +0000 Notes on Stubbing In this screencast we look just at stubbing: not other types of test doubles, and not when to use a test double or not. We'll hit three stub-specific topics: the difference between incidental and essential interactions; a method for testing mix-ins without depending on a class that mixes them in; and creating more focused test examples by pulling out common stubs and mutating them for each example. Thu, 28 Jul 2011 00:00:00 +0000 Spiking and Continuous Spiking To spike code, you stop doing TDD, throw some code together without tests to learn something, then delete the code and do it the right way. In this screencast, we'll look at spiking, and specifically the idea of "continuous spiking": instead of throwing the code away, transitioning it into TDDed production code iteratively. It's a dangerous practice, but doing it with care can help you through unclear parts of your application development. Thu, 21 Jul 2011 00:00:00 +0000 Test Isolation and Refactoring Isolated unit tests have many benefits, but one drawback is a loss of confidence in the integrated system. At high levels of isolation, you lack a feedback mechanism for learning that the pieces don't actually work together: for example, they call the wrong methods, or call them with the wrong number of arguments. This can make refactoring with isolated tests scary. In this screencast, we'll look at the technique I use as a first line of defense. It's a hybrid between fully isolated unit testing and slow, expensive integration testing. Thu, 14 Jul 2011 00:00:00 +0000 Coupling and Abstraction Coupling and abstraction are closely related: by introducing a method to reify an abstraction, you often naturally decrease the coupling between two classes. We'll explore this with a simple model/controller example, as well as a case where the situation isn't so straightforward: a method call that looks like a good, simple abstraction but is actually dangerous because it's third-party. Finally, we'll see the way that isolated, outside-in TDD naturally encourages you to build good abstractions early. Thu, 07 Jul 2011 00:00:00 +0000 Tar, Fork, and the Tar Pipe The tar pipe is my favorite Unix command. It combines several important Unix concepts around files, subprocesses, and interprocess communication in just a few characters. We'll look at the tar pipe and what it does, then dive down into what the shell is doing to make it work, including forking and the creation of pipes. We'll also look at some raw tar data, which you rarely see in the wild. Thu, 30 Jun 2011 00:00:00 +0000 Composing a Unix Command Line We've seen a lot of Unix commands, but never stopped to talk specifically about building a large command. That's what we'll do in this screencast: we'll solve a problem using a large one-off command, but the goal is to think about the command itself. Along the way, we'll see most of the utilities you need to do text processing in Unix. If you learn each of these, you'll be able to manipulate text streams quite well. Thu, 23 Jun 2011 00:00:00 +0000 Clarity via Isolated Tests Several Destroy All Software screencasts have touched on isolated testing, but never addressed it directly for its own sake. That's the topic of this screencast: why do we care about isolating the class under test from other classes? We'll look at an actual example I ran into: I started TDDing a class, letting it integrate with some other simple classes. After realizing that the test was becoming a mess, I deleted it, rewrote it in an isolated way, and it was far more readable. We'll retrace those steps to see the dramatic difference isolated testing made. Thu, 16 Jun 2011 00:00:00 +0000 Wrapping Third Party APIs Third party APIs can be a source of bad design in your applications. When you mix your application's logic with calls into an API, you're obscuring both responsibilities. In this screencast, we'll look at a class where I've done just that. Then we'll extract the API access out into a wrapper, simplifying the original class and adding clarity to both the production code and the tests. Thu, 09 Jun 2011 00:00:00 +0000 A Refactoring Story While thinking about this week's screencast, I happened to do a pretty big refactoring on one of Destroy All Software's controllers. I translated a confusing mess of exception rescuing into a more sensible action, pushing validation and special cases down into lower-level classes. We'll look at the before picture, the changes I made, and then the after picture. There are naming changes, structural changes, and some important Rails behavior that was a little surprising. This is a departure from the normal Destroy All Software style, so please <a href="">let us know what you think</a>! Thu, 02 Jun 2011 00:00:00 +0000 Quick and Easy Perf Tests Writing traditional arrange-act-assert tests for performance is difficult: what do you assert on? In this screencast, we'll look at a simple method for doing ongoing performance analysis: running small benchmarks across the commits in version control. With a few lines of shell scripts and RSpec, we can get a visual sense of our system's performance over time, allowing us to catch performance problems before they make it to production. The run-command-on-git-revisions script used here is available <a href="">on GitHub</a>. Thu, 26 May 2011 00:00:00 +0000 Extracting Objects in Django This is a sequel to the original <a href="/screencasts/catalog/extracting-domain-objects">Extracting Domain Objects</a> screencast. Once again, we'll look at Destroy All Software's catalog logic, pulling it out of the Django View (equivalent to a Rails controller), and moving it into its own domain-relevant class. Then we'll isolate and simplify the tests for both the view and the new Catalog class. Finally, we'll use the newly isolated tests to extend the behavior of the Catalog without changing or breaking the view and its tests. Thu, 19 May 2011 00:00:00 +0000 File Navigation in Vim Vim's file navigation features are weak, so customization can speed you up a lot. We'll cover finding and opening files, including Rails-specific hacks that help you avoid the problem of finding one file among many with similar names. Then we'll look at the customizations I use to make splitting and window management work well with an outside-in TDD workflow. To try these customizations yourself, see the <a href="/file-navigation-in-vim.html">reference</a> that accompanies this screencast. Thu, 12 May 2011 00:00:00 +0000 Packaging in Ruby and Python There's been an explosion in packaging tools in the last few years. Creation and installation aren't the hard parts any more: now we're managing multiple runtime versions, isolating package sets for different applications, and specifying dependencies in a repeatable way. This screencast looks at the landscapes in Ruby and Python, comparing their solutions to these problems. A <a href="/ruby-vs-python-packaging-comparison.html">companion table</a> of packaging-related commands in Ruby and Python is available to review the tools used in this screencast. Thu, 05 May 2011 00:00:00 +0000 Git Workflow Many people have asked about my git workflow, so here it is. Almost every command I run is an alias of some kind, but I explain them all. We'll go through a cycle of hacking, retroactively splitting commits, running tests over them, fetching from origin, rebasing over it, running tests over the new commits, and finally pushing. You can download <a href="">my .gitconfig</a> and the <a href="">run-command-on-git-revisions script</a> to use them yourself. Also see the <a href="/screencasts/catalog/source-code-history-integrity">"Source Code History Integrity"</a> screencast for more on that topic. Thu, 28 Apr 2011 00:00:00 +0000 Fast Tests With and Without Rails Rails' startup can make running tests, and especially doing TDD, painful. You can escape this for most tests by moving code into the lib directory and testing it outside of Rails. We'll look at the performance of tests with and without Rails, as well as how I configure my environment to automatically skip loading it when possible. The script mentioned at the end of this screencast is <a href="">available for download</a>. Thu, 21 Apr 2011 00:00:00 +0000 Exceptions and Control Flow The mantra "don't use exceptions for control flow" is repeated often, but its real implications tend to be glossed over. Using an example, I'll show you exactly what I think about it, and why I'm OK with using exceptions in certain cases that some people would dismiss as control flow. Thu, 14 Apr 2011 00:00:00 +0000 Processes and Jobs Processes and jobs—processes running in your shell—are the core of a Unix development workflow. For the first half of this screencast, we'll look at the shell's job control mechanisms, how GNU Screen works, and how I use them together for my development workflow. Then we'll look at an advanced use of process management that enables powerful composition of Unix tools beyond simple piping. Thu, 07 Apr 2011 00:00:00 +0000 Growing a Test Suite When building a system, it's easy to continually append tests to your suite without considering the relationship between them. By building your test suite more deliberately, you can write clearer, terser tests, and also put better design pressure on your system. We'll build a small piece of code both ways: first by simply appending tests, then by extending existing tests and thinking about the implications. Thu, 31 Mar 2011 00:00:00 +0000 Conflicting Principles There are a whole lot of object oriented design principles. It's tempting to view them as absolute rules, but we also need to understand the trade-offs between them. We'll look at a case where The Single Responsibility Principle and Tell Don't Ask conflict, then touch on the grander implications. Thu, 24 Mar 2011 00:00:00 +0000 Extracting Domain Objects In modern web frameworks, it's easy to extend model and controller objects over and over again, leaving you with huge, unwieldy objects. To avoid this, you can extract small pieces into their own classes. This has many benefits, such as: much faster test execution, naming concepts in the system that were previously implicit, and adding explicit abstraction layers. We'll look at an example from Destroy All Software itself, a Rails app, and pull a piece of model logic embedded in a controller out into its own class with isolated tests. Thu, 17 Mar 2011 00:00:00 +0000 Source Code History Integrity Source code history is a touchy topic. Should we ever edit history? Is it safe? We'll look at what can go wrong when editing history, and how to avoid the potential problems. We'll also briefly talk about the Mercurial and Git communities. Warning: there's some editorializing! Thu, 10 Mar 2011 00:00:00 +0000 Building RSpec From Scratch RSpec has lured many programmers into the Ruby world with its beautiful syntax. For some, its working remain a mystery. Let's dispel that. We'll build some of RSpec's basic syntax from scratch, test driving it using Test::Unit. This is done in Ruby, of course. Basic Ruby knowledge will definitely help. Thu, 03 Mar 2011 00:00:00 +0000 How and Why to Avoid Nil We'll look at nil from many angles. Why do nils show up in your programs? What kinds of problems can they cause when they get out of control? How can we design our systems to fail loudly when unexpected nils exist and, more importantly, to avoid the introduction of nils entirely? This screencast uses Ruby, but the techniques apply in any language. Thu, 24 Feb 2011 00:00:00 +0000 Statistics Over Git Repositories We'll use the shell and the git command line tools to iterate over revisions, computing a statistic for each revision. Initially, it'll be a one-liner at the prompt. Then we'll promote it to a full script, refactor it, and add some more features. Thu, 17 Feb 2011 00:00:00 +0000
|
global_01_local_1_shard_00001926_processed.jsonl/28504
|
Origin of canework
First recorded in 1855–60; cane + work Unabridged Based on the Random House Unabridged Dictionary, © Random House, Inc. 2018
Examples from the Web for canework
Historical Examples of canework
• They are also largely imported into Great Britain for canework.
Juliana Horatia Ewing
• The maxilla is a flat frame of canework with one or two arms at the side and a low back provided with a cushion.
Stanley in Africa
James P. Boyd
• In the central panel of the Restoration chair-back, canework began to be used instead of the Early Jacobean carving.
|
global_01_local_1_shard_00001926_processed.jsonl/28505
|
Also sky·troop [skahy-troop] /ˈskaɪˌtrup/.
Origin of paratroop
First recorded in 1935–40; back formation from paratrooper Unabridged Based on the Random House Unabridged Dictionary, © Random House, Inc. 2018
Examples from the Web for paratroop
Contemporary Examples of paratroop
• Armored vehicles, paratroop units and snipers sealed off Kabul's streets during this week's conference.
The Daily Beast logo
Karzai's Newest Lie
Stephen Kinzer
July 20, 2010
Historical Examples of paratroop
Hunter Patrol
Henry Beam Piper and John J. McGuire
|
global_01_local_1_shard_00001926_processed.jsonl/28526
|
Go to unit's home.
Home | People
The DTC has brought together almost 30 faculty from disciplines as diverse as architecture, physics, biology, chemical engineering, computer science, and electrical engineering among others. In addition to these faculty, the DTC also houses visiting faculty and researchers. The operations of the DTC are guided by a number of committees.
The DTC also as an administrative and technical support staff.
|
global_01_local_1_shard_00001926_processed.jsonl/28527
|
Friday Letters
Want to join in? Just click the button and join the link up
Dear Canadian friends and family who post on FB every time it's almost Halloween therefore snow is a big possibility. I mean really, how many kids have we seen go as skiers and snowboarders for Trick or Treating? You and I both know that snow could actually happen any time after Thanksgiving. It's really not that shocking. But rest assured, it's not snowing here.
Dear Husband...I made my own coffee twice this week. Be proud of me.
Dear friend I spoke with on Skype yesterday...I'm proud of you.
Dear Chocolate banana muffins I made...I will be shocked if you survive until Sunday.
Dear Plot of my NaNoWriMo novel...if you could be more than a vague picture in my head that would be awesome.
Dear Main character for my NaNoWriMo novel...if you could show yourself that would be fantastic.
Dear CSI: Miami...I'm watching entirely to much of you right now. Furthermore, is there an actor or celebrity who DIDN'T appear on your show?! Also, I'm fairly sure Horatio has secret ginger magic that makes all the pretty Latina women fall all over him. I'm familiar with the ginger magic, I'm fairly certain that's how my husband made me fall in love with him.
Dear husband...when you referred to John Hamm of Mad Men as a Dreamboaty Every man yesterday I laughed so hard no sound came out.
Dear Bestie...I'm glad and relieved you like the book I sent you. Most people aren't as respective to having feminist foisted upon them.
Dear Assignment 3 for travel writing course...I swear on my quirky T-shirt, prescription ray ban glasses and my copy of Lonely Planets Guide to France I will finish you today.
1. Hooray for Switzerland! I haven't been yet, but am dying to visit. Next year for sure. I love Germany, but need to see some other countries.
Here's to hoping your novel comes along splendidly, and that your writing assignment is finished quickly so you can enjoy this gorgeous autumn weekend!
1. Thanks so much! I am so hoping that this weekend is nice! But it's fall in Switzerland I think they're predicting fog, fog, more fog and some rain.
2. dreamboaty every man is the BEST description ever! haha loved your letters, thanks for linking up!
3. LOL at the ginger magic! At least you know what works for you!!!
4. You're doing nanowrimo!! That's awesome! Have you done it before? I did it in 2009 and OHMYGAWD I swear all I did was sit at starbucks and just writewritewrite! I actually started it on nov. 11 and ended it on nov. 23rd. I didn't finish. Ha! I had family come to town and I just didn't get the time. Excuses excuses, I know. But they're real excuses. I just found my nanowrimo the other day. That stuff is intense! ;)
Good luck with it!
Found you from the blog hop! Following via email subscription!
1. This will be my 6th year doing NaNoWriMo. I'm sure excited.
5. i never make my own coffee, even proud of you
6. I am not too good at making my own coffee thank goodness for my kurig :) & I love CSI all of them :) They are so dang good :) I also love Criminal Minds...
7. My boyfriend makes me a coffee every morning too :)
Now go do that assignment girly, get it finished!
Post a Comment
|
global_01_local_1_shard_00001926_processed.jsonl/28543
|
Discussion in 'Politics' started by vladiator, Nov 28, 2003.
1. Hey guys, I think I remember there being a thread about this, but after having all that Thankgiving food, I'm too lazy to dig it up. The thread was about what music people listened to when trading. I have found this really cool trance/techno station that does it for me. It's at Scroll down a bit. No sign up required.
|
global_01_local_1_shard_00001926_processed.jsonl/28553
|
Using hyphens effectively
What are hyphens?
Hyphens are short horizontal lines ( – ) that link certain words together to show a relationship. For example, thirty-five, ex-partner, etc.
So what are the guidelines for using hyphens?
1. To connect two-part adjectives
We typically place a hyphen between two-part adjectives where the second part has an -ing or -ed suffix:
• The long-suffering mother continued to support her wayward child.
• She was always pleased to hear her partner referred to as good-looking.
• The end of a long relationship can leave both parties feeling broken-hearted.
• The brown-eyed visitor surveyed the room.
Using hyphens is also important to show that there is a strong relationship between the two nouns:
• The blue-green sea shimmered in the morning sunlight.
• The Manchester-Madrid flight leaves in ten minutes.
• The Spurs-Fulham game has been abandoned due to a flooded pitch.
2. To connect compound adjectives
When we create a phrase that functions as an adjective before a noun, we hyphenate the phrase to show it functions as one single adjective:
• Armies often operate a shoot-to-kill policy.
• We enjoy having access to up-to-the-minute news.
• They arrived in a well-polished Mercedes.
However, compound adjectives placed predicatively after the noun are not hyphenated:
• The army’s policy was shoot to kill.
• The news we enjoy most is up to the minute.
• The Mercedes was well polished.
3. In two-part nouns
Two-part nouns are hyphenated in British English where the first noun receives the primary word stress:
• lorry-driver
• a ‘paper-shop
• some ‘running-shoes
4. To connect compound nouns (with prepositions)
• She is my sister-in-law.
• He is my brother-in-law.
5. To connect some prefixes to their nouns
We can use hyphens to link the prefixes ex-, non- and co- to their nouns:
• She is my ex-headmistress.
• We work in a non-smoking environment.
• My co-workers are excellent colleagues.
Using hyphens to avoid confusion when using other prefixes is also acceptable:
• The counter-argument is that investment creates employment.
• You can now pre-order the new edition of the Oxford English Dictionary.
• Pushing into the front of a queue is considered very un-British.
6. Two-part verbs beginning with a noun
We use hyphens to connect two-part verbs that begin with a noun:
• I am going to baby-sit for my brother this evening.
• We can’t come to the party because we are flat-hunting at the moment.
• He goes out wind-surfing every Sunday afternoon.
7. Numbers
We use hyphens to link two-part numbers:
• thirty-seven
• sixty-two
• one hundred and forty-nine
8. Word division
Hyphens are also used to connect words that may be separated between lines due to space constrictions:
We are writing collectively to request that your discrimin-
atory immigration laws are reviewed.
Change in usage
The rules for using hyphens can be confusing, and the usage may not always be clear. As a result, hyphens are being used less frequently and a number of originally hyphenated words are now written as one complete word (e.g., takeover, weekend, whiteboard). As such, you may encounter three different forms for the same word (e.g., bookshop, book-shop or book shop).
Hopefully this blog has offered some helpful rules to follow when using hyphens but if you are still unsure, the best solution is to either check in a trusted dictionary source, or write the words without the hyphen.
|
global_01_local_1_shard_00001926_processed.jsonl/28563
|
When Young Breitbarts Attack: Obama's Church 'War'
Just this week, we've had the jumping and howling and pitching of poo because, four years ago, the lamestream media covered up for President Mohammad Hussein Alinsky when he said that the Constitutional Convention "lasted through the spring of 1787," when every super-otherwise-unemployable citizen-journalist knows that the convention actually ran through the summer, too. Scoreboard! (Of course, by saying it "lasted through the spring," the president was being perfectly accurate. The convention ran from May 14 to September 17, 1787. So it did indeed "last through" the spring of 1787. It was not until the winter of 1791, of course, that we officially added a Bill of Rights, whereby freedom of the press is guaranteed to all of us, even self-evident dingbats.) Mr. Bogg already has had perfectly adequate fun with these people on this point, and with a special bonus Guess Who reference, besides.
Undaunted by the gales of laughter sweeping down upon them from all sides, The Vetting goes gamely on. Today, we apparently discover that President Socialist J. Caseworker was schooled in his obvious anti-Catholicism by exactly the kind of guy you'd go to if you wanted to be schooled in obvious anti-Catholicism: the Cardinal Archbishop of Chicago. Joseph Bernadin was a towering figure of the liberal church, a good and decent man who died too young of pancreatic cancer. His memory deserves better than to be thrown by a pipsqueak know-nothing into a game of wingnut Mad Libs. (Also, the fact that paid Vatican hack George Weigel wasn't a big fan represents still more points in Bernadin's favor.) He replaced in Chicago John Cardinal Cody, a reactionary twit who ran the archdiocese like a wardheeler, up to and including serious financial chicanery, as well as a "relationship" with a wealthy widow for whom Cody bought a car. Bernadin brought the archdiocese's credibility up from the bottom of the sea. He took an early stand on the subject of clerical sexual abuse, formulating a policy that eventually would be a model for the rest of the church to follow. When, shortly before he took sick, he himself was accused of a similar offense — a charge later dropped by his accuser — he forgave the man who brought the action. One of the last things he did while he was alive was file an amicus brief with the Supreme Court opposing a right-to-die law.
This is the life that is summed up by the following:
Obama's travel documents and expenses were signed and approved by the late Cardinal Joseph Bernardin,a controversial figure in the Catholic church who supported nearly every left-wing movement within it. Though Bernardin was well liked in Chicago, especially by a fawning media anxious to have a Catholic imprimatur on nearly every social issue of the day, Bernardin's work undermined many Catholic teachings. Early on, he tried to maneuver around Paul VI's teaching in Humanae Vitae, which governs the morally appropriate way to deal with sex and birth. At a dinner party, Bernardin famously credited Mikhail Gorbachev, not Reagan or John Paul II, with ending the Soviet Union. And perhaps most mischievously, Bernardin called for a "consistent ethic of life," which tied the anti-abortion cause to pacifism and redistributionism and therefore gave cover to liberal Democrats trying to claim they were Catholic.
Bernardin's most enduring left-wing project was the Campaign for Human Development (CHD)-which, according to Obama biographer Stanley Kurtz, is "probably the largest funding source for community organizing in the United States." According to George Weigel, "the Campaign for Human Development began to support programs of community organizing modeled on or promoted by Saul Alinsky's Industrial Areas Foundation.
Oh, for fuck's sake, just stop it.
The entire church — including me, and every Catholic I've ever known — has been "maneuvering around" the theological idiocy of Humanae Vitae since shortly after the ink dried on it. And heresy against St. Ronnie? Surely, another Cadaver Synod is order. And you know who else called, in one way or another, for a "consistent ethic of life," including economic and social justice, and an end to war and the arms race?
This guy.
And this guy.
And these guys.
And this guy.
And especially this guy.
Advertisement - Continue Reading Below
|
global_01_local_1_shard_00001926_processed.jsonl/28583
|
How Do You Delete Photos On Facebook
The capacity to share your personal pictures with your friends as well as loved ones is one of the most preferred feature of Facebook Therefore many of us have quite a few photo albums in our Facebook accounts. How Do You Delete Photos On Facebook: However as long as we use Facebook, we are still completely not aware of the number of of its most evident features work. The website has various choices and also features and also consequently there are plenty of usability problems with lots of great choices being hidden so well that you never ever recognize they exist.
How Do You Delete Photos On Facebook
1. How To Erase Photos From Facebook
It is very important to note that Facebook will let you "hide" images to ensure that only you can see them, however that isn't really the like deleting them. To remove the picture from the real website, follow these steps.
- Click on "Photos" on the left-hand side of Facebook. This will certainly take you to a web page of pictures of on your own, pictures you've uploaded, and albums. Click "Photos" near the top of the web page.
- Facebook will take you to a collection of all images you have actually published, as a collection of smaller pictures called "thumbnails" that allow you to easily recognize which photo is which. Locate the photo you intend to eliminate by scrolling via till you detect it.
- Hover your computer mouse arrow over the thumbnail. A pencil icon will certainly show up in the top right-hand man edge of the thumbnail. Click it as well as it will certainly open up a menu. Select Delete This Photo" You'll be asked to verify that you intended to eliminate this photo. Click Confirm and it's gone.
2. WAYS TO: Remove Numerous Images From A Photo album
If you were ever before questioning ways to erase numerous pictures from an album (while still keeping the album), right here are the required (yet not actually evident) steps:
- The next web page will allow you examine the boxes below the photos you intend to get rid of as well as delete them on in bulk (below are a couple of checkbox assistants for you as an included bonus):
A Word Of Warning
Eliminating pictures from social networks is typically a great way to remove them from search engine result, however it's possible others have downloaded the images and may re-post them or otherwise share them. You might have restricted options if photos you have actually gotten rid of have actually shown up online.
Iklan Atas Artikel
Iklan Tengah Artikel 1
Iklan Tengah Artikel 2
Iklan Bawah Artikel
|
global_01_local_1_shard_00001926_processed.jsonl/28584
|
How to Change Phone Number On Facebook Account
Adding mobile number to your Facebook profile gives added capability like text message updates and task notifications. How To Change Phone Number On Facebook Account: Registering mobile number on Facebook also aids at the time of password recuperation and for easier account logins. But all the above only feature correctly if you are making use of a running and also working mobile number.
In case you have discarded your number and also have actually bought a new one, you should additionally upgrade the new number on your Facebook account.
If you want to transform your registered mobile number on Facebook, you have to comply with the described actions:
How To Change Phone Number On Facebook Account
Action 1: On your internet browser, open
Step 4: Click setting: From the drop-down list that shows up, click the Settings choice as shown bellow.
Tip 5: On the General Accounts Settings page that opens, pick Mobile from the categories present in the left pane.
Action 6: On the Mobile Settings page, under Your phones area, click the Add another mobile phone number link. Below you can do diver of operation to your mobile setting. These include: Include brand-new mobile number, lost your number as well as if you are already included one before, you could wish to change it.
Though, the aim of this post is to change Facebook contact number on your account. Then, click remove and add new mobile number.
Step 7: On the Please re-enter your password box that opens, enter your password to verify your actions, click Submit.
Tip 8: On the Activate Facebook Messages window that appears, pick your country/region as well as your mobile carrier from the respective areas. Then click Next to proceed.
Tip 9: On the brand-new window that opens, input the verification code that you will certainly obtain on your brand-new mobile number. As quickly as you will certainly enter the confirmation code, your mobile number will be signed up with Facebook.
If you do not get the confirmation code quickly, please await some while. As soon as you get the code, go back to the very same Mobile section under the Settings page of your Facebook account, and also input the confirmation code to settle the registration process on modification Facebook telephone number.
If you desire, you can now remove (disassociate) your old mobile number from your Facebook account in case it is not being used.
Iklan Atas Artikel
Iklan Tengah Artikel 1
Iklan Tengah Artikel 2
Iklan Bawah Artikel
|
global_01_local_1_shard_00001926_processed.jsonl/28591
|
• Member Since 29th May, 2013
• offline last seen 43 minutes ago
Pretty much a writer of almost anything. Lover of RariDash and background ponies. Patreon.
Latest Stories
Favorite Ponies
1) Rainbow Dash/Spitfire/Rarity/Twilight Sparkle/Windy Whistles
2) Fleetfoot/Sunset Shimmer/Night Glider/Starlight Glimmer/Twilight Velvet
3) Lightning Dust/Sonata Dusk/Daring Do/Berry Punch/Stormy Flare
4) Fluttershy/Lyra/Cloudy Quartz
5) Trixie/Maud
6) Vinyl/Bon Bon
7) Octavia/Chrysalis
8) Colgate/Limestone
9) Cloudchaser/Flitter
10) Raindrops/Marble
Lunar Republic/ Princess Luna
Solar Empire/ Princess Celestia
Magictatorship/ Twilight Sparkle
Lovelist/ Princess Cadence
Loyalist/ Rainbow Dash
Charitable Empire/ Rarity
Fluffy Kingdom/ Fluttershy
Party Palace/ Pinkie Pie
Honest Capital/ Applejack
Changeling Horde/ Queen Chrysalis
Molesting Harem/ Princess Molestia
Moon Republic/ Nightmare Moon
Troll Bridge/ Princess Trollestia
These are some kingdoms that a friend and I made that included the two that already existed.
Update · 12:21am December 8th
Just a quick update for anyone interested.
Read More
Report Duelist96 · 284 views · Story: Fleeting Flames ·
Comments ( 548 )
• Viewing 544 - 548 of 548
I plan to have at least 1 update to come out before my next semester starts.
Not going to lie I'm hoping once all is said and done you'll come back and do some more Fleeting Flames. But in the meantime, good luck with your exams and such! :twilightsmile:
I have no idea what this is for, but I'll take the cookie.
Thanks for hopping on board the Crazy Train, Duelist.
• Viewing 544 - 548 of 548
Login or register to comment
Join our Patreon to remove these adverts!
|
global_01_local_1_shard_00001926_processed.jsonl/28616
|
The Case Against Agile: Ten Perennial Management Objections
--Albert Einstein
A lively discussion ensued from my articles last week, The Best-Kept Management Secret On the Planet: Agile, and Why Can’t The C-Suite Grasp Agile?
The general reaction within the Agile world was naturally strongly positive. Finally, mainstream management is getting it. “Next step -> Rule the World!” wrote @lateralus009.
There was somewhat less enthusiasm from the traditional management camp to having the world ruled by Agile. The most complete—and revealing—response from the traditional management camp came from a link submitted by PM Hut and written by Bruno Collet: The Limitations of Agile Software Development. The defenders of traditional management claim to be unafraid of being tagged as “behind”, “old school” or “just plain stupid”: traditional IT professionals know that “Agile has limitations.”
1. “Agile is only for stars”
“Agile was designed for experienced, smart, and high-achieving people like its creators, i.e. stars. You could give them any project, with any method, and they would succeed. Not every group can be motivated, experienced, and skilled enough to self-organize into an efficient team. We have to work with the staff we have. They need close supervision. So Agile is not for us.”
In other words, make do with mediocrity. Learn to live with the people who are either not experienced or smart or high-achieving. Hierarchical bureaucracy makes an assumption of incompetence and expects mediocre performance. It learns to live with mediocrity on a permanent basis, in the process creating—not surprisingly—the need for the layers middle managers to provide the "close supervision".
Agile makes the opposite assumption: competence. It expects performance and forces action if it doesn’t occur. It assumes a workforce who know what they are doing and provides a transparent framework for them to show what they can do. If the group doesn’t deliver at the end of each short cycle, then that is painfully apparent to everyone—immediately, not years later when the project runs out of money and the software doesn’t work. Agile is a way of forcing either high performance or change.
Agile squeezes out mediocrity and requires high-performance. Hierarchical bureaucracy breeds incompetence and feeds off mediocrity: the organization performs accordingly. Faced with the choice between high-performance and the mediocrity, traditional management opts for mediocrity.
2. “Agile doesn’t fit our organizational culture”
“Agile is fine for startups run by kids with earrings, tattoos and blue hair. But in our firm, respecting the chain of command and job responsibility are keys to survival. It takes a couple of days just to go through the company’s policy manual. The narrow responsibilities, and rigid policies, processes, and one-size-fits-all methodologies of our firm don’t fit the free-wheeling ways of Agile. Agile isn't going to work here.”
Precisely. What’s wrong here is the corporate culture, not Agile. Surviving in today’s marketplace requires individual and team freedom. It translates into cross-functional work that is constantly adapting, with roles switching as needed. It also mewans adjusting processes continuously to reflect the current situation.
In Agile, processes are secondary to the requirements of the work. Bureaucracy is the opposite: the requirements of the work—and the customer—are secondary to the bureaucracy. Not surprisingly, firms in this mode do a poor job of meeting customers’ needs.
When the culture doesn’t fit Agile, the solution is not to reject Agile. The solution is to change the organizational culture. One doesn’t even have to look at the business results of firms using hierarchical bureaucracy to know that they are fatally ill. In today’s marketplace, they will need to change their culture or they will die. They need to become Agile.
“Teams larger than eight are too big to be Agile. We are a large organization with large projects so Agile won’t work for us.”
It’s true that Agile requires small teams. The reality as Richard Hackman pointed out in his classic book, Leading Teams: Setting the Stage for Great Performances, is that all effective teams should be small. A big effective team is an oxymoron.
In any event, there are obvious solutions to coping with large projects by dividing the work into a number of relatively independent smaller subprojects then each part can be implemented by an agile team. As explained by Craig Larman and Bas Vodde in their book, Practices for Scaling Lean & Agile Development: Large, Multisite, and Offshore Product Development with Large-Scale Scrum (2010).
"Agile emphasizes that face-to-face, spontaneous conversation is the best form of communication. In some organizations, this isn’t possible. Moreover, work extends beyond the development team since other stakeholders such as business analysts also require interaction. Hence this limits the applicability of Agile."
The reality is that distributed software development using Agile can be highly productive, as firms like Xebia have shown. See also the Larman/Vodde book for more discussion of distributed Agile teams.
5. “Agile lacks project management processes”
“Most agile methodologies do not define any project management processes. Whether we’re agile or not, we need to manage project scope, planning, budgets, strategies, and reporting. So Agile can’t be the answer.”
It’s true that Agile doesn’t solve all management issues. Agile solves a specific management issue, namely, how to combine disciplined execution with creativity and innovation.
As Bruno Collet helpfully points out, “Unless you choose an agile methodology that encompasses all needed processes, you should combine it with a methodology that define these processes and rely on agile for day-to-day team management.”
6. “Our firm’s individual accountability systems don’t fit Agile”
“Agile development stresses the importance of team ownership in order to improve teamwork and therefore overall results. But how can we implement team ownership when our organization’s performance-reward system assesses individual performance and rewards individuals, not teams?”
The answer is pretty simple: change the organization’s reward system. They are the problem, not Agile.
7. “Agile is just a fad”
“Here we go again. Another silver bullet! Another panacea! Another management fad!”
Again, let’s be clear. The article didn’t say that Agile was “the” solution to everything. It’s not a panacea. It’s not a silver bullet. What the article said was that Agile is the solution to a particular problem, namely, reconciling disciplined execution with creativity and innovation.
There are other management problems that the Agile Manifesto didn’t address. Some of those other management problems are discussed in Kent Beck’s talk discussed in Applying ‘inspect and adapt’ to the Agile Manifesto.
One important aspect concerns the goal of the organization. Agile teams that work in organizations where the goal is maximizing shareholder value are ultimately just as doomed as teams practicing waterfall. Sooner or later, the money-driven culture will crush even the successful Agile teams. Genuine Agile involves re-thinking the goal of the entire organization in terms of adding value to customers sooner.
8. “There are better ideas than Agile”
One critic said, “Introducing these ideas to management via the path of Agile software development doesn’t make sense. Much more interesting would be to introduce these ideas via things that make sense to non-software managers, such as beyond budgeting, complexity thinking, lean management and rightshifting.”
The approaches of beyond budgeting, complexity thinking, lean management and rightshifting are helpful and obviously related to Agile software development, but it’s not obvious that they are having any more real success in changing the basic command-and-control paradigm of traditional management.
9. “Nothing new here”
All of the individual components of Agile have been around for quite a long time. What is new is to put those elements together in a coherent and integrated fashion as in radical management.
10. “Not a fair comparison?”
“How can you possibly compare Agile to the discovery of longitude?” was one agitated answer to the first article which cited the historical examples where path-breaking ideas were rejected by the experts for decades, such as the sad experience of John Harrison who despite the scientists discovered a way to measure longitude.
Let’s be clear, first, that John Harrison, the Yorkshire carpenter, didn’t “discover longitude”. The British scientists of the 18th Century knew all about longitude. What they didn’t know was how ships’ captains could measure longitude in the middle of the oceans. They could measure latitude from the stars, but they couldn’t seem to find a way to read the stars so as to get a handle on longitude. So the scientists spent decades studying the stars trying to find the secret that “must be there”.
What John Harrison figured out was that the answer didn’t lie in the stars: the solution lay in having an accurate clock. With an accurate clock, you could take a reading from the sun at noon and figure out your longitude. The problem was that there weren’t any clocks accurate throughout a long voyage. So Harrison set out to invent one. When he had done it and shown that it worked on the long voyage from London to Jamaica, the scientists went apoplectic. They were upset that the solution to the problem didn’t lie in the fancy astronomy of the heavens that they had been studying for decades: it lay right under their noises with a simple clock. Very annoying!
In their frustration, the scientists refused to concede that they had been wrong and give John Harrison his well-deserved prize. It took an act of parliament—in effect, ordinary citizens—to give him his recompense: equivalent to over a million pounds in today’s money.
Something similar seems to be happening with Agile. The solutions that the experts have offered to the problem of reconciling disciplined execution with innovation have all tended to be various ways of increasing or modifying control over an increasing number of ideas—chief innovation officers (Debra Amidon), innovation “factories” (P&G), the innovation marketplace (Alpheus Bingham and Dwayne Spradlin), separate business units (Clayton Christensen), open source innovation (Henry Chesbrough) and shared value (Michael Porter and Mark Kramer).
What’s annoying about Agile to control-minded management practitioners and theorists is that it recognizes that the problem lies is control itself. The solution to reconciling disciplined execution and innovation lies in giving greater freedom to those people doing the work to exercise their talents and creativity, but doing so within short cycles so that those doing the work can themselves see whether they are making progress or not.
Even worse for hierarchical bureaucracy, Agile thrives on transparency. One of the dirty not-so-little secrets of traditional management is that control thrives on non-transparency. So introducing (real) Agile means exposing all of the non-transparent tricks that hierarchical managers play on their subordinates to maintain power. Is it any wonder that Agile isn’t naturally popular with the command-and-control gang?
Read also:
The Best-Kept Management Secret On the Planet: Agile,
Why Can’t The C-Suite Grasp Agile?
Scrum is a major management discovery
Fred Allen: Most chief innovation officers are just window
The five surprises of radical management
Executive education workshop: Making The Entire Organization Agile
Follow Steve Denning on Twitter @stevedenning
|
global_01_local_1_shard_00001926_processed.jsonl/28632
|
For Freshmen. By Freshmen.
Display formatted freshu
Dec 04 2016
by Jessica Vuong
8 Bad Habits to Break to Be A Happier You
By Jessica Vuong - Dec 04 2016
As college students, we are expected to be social, do well in school, figure out what we want to do with the rest of our lives, exercise, get enough sleep and maintain a social life. It's no mystery that college students struggle with being productive, healthy and stress free. Often times, we neglect to reflect back on why we feel this way and instead tend to just put up with it. This may be hard for some of us to admit, but we fail to realize that our bad habits contribute to our stress and anxiety. Now that I've planted the issue in your head, here are several bad habits you can break in order to be happier and more productive.
1. Always Saying "Yes"
Yes... college is a time for you to try new things, go out with friends and have fun, but it is important to know your limitations. It's okay to say no to an event or activity if you know you have more important things on your plate to deal with. Taking on too many activities can lead to stress, anxiety and burnout. When given new opportunities, check your priorities and strategically choose which requests to agree to. At the end of the day, you're the one in charge of your education and your life so attend to your priorities first.
2. Hitting the Snooze Button
This is something almost everyone is guilty of. Studies show that when you press the snooze button and go back to sleep, your brain is actually resetting your sleep cycle so that when you wake up from your second (or maybe third or fourth) alarm, you are actually groggier and more tired than you would have been if you had woken up from the initial alarm. Try placing your alarm clock across the room to force yourself to get up and turn it off. Once you're out of bed, it will be easier to just get going.
3. Doing Busy Work
Busy work is an activity that you carry out in order to kill time and avoid appearing idle. In reality, busy work has no real value. Checking emails, cleaning your desk, organizing your files and updating your phone all constitute as busy work, and you know it. Most of the time, students engage in busy work to trick themselves into thinking they are being productive while that one daunting task due tomorrow is left abandoned in a dark corner. Break this habit by tackling your heavy duty tasks head on, preferably in the morning because that is when your mind is refreshed and awake.
4. Being a Perfectionist
While being a perfectionist can be seen as a positive trait, it has its downsides. Perfectionists have a mindset that their work must be perfect or else it must be discarded. This type of thinking hinders the creative process of brainstorming, constructing and editing, because perfectionists tend to abandon projects that end up lesser than their projected expectations. A large part of productivity is modifying your work to improve it. If your work doesn't turn out the way you wanted it to, don't toss it; give it another chance by figuring out what you can do to improve it. Allow time for your thoughts and ideas to process and grow.
5. Leaving Small Tasks Undone
The "touch it once" rule is the key to productivity and time management. Many people realize that they have a task to complete, but put it in the back of their head, which requires them to remember to do it later. When you finally remember to do the task, you are wasting time reassessing and reprocessing exactly what is it that you had to do. Not to mention, you had to remember to remember the tasks. If you keep putting little tasks in the back of your mind throughout the day, then at the end of the day you will have a bucket full of unfinished things to do. If your task takes less than five to ten minutes and is easy to handle, then follow the "touch it once" rule by dealing with it then and there, so you can forget about it and carry on with your day.
6. Not Having A Routine
Our brains like routines. That's why we have habits, both good and bad. When we repeatedly do a specific activity at a certain time or in a certain situation, we are developing a habit. Use this to your advantage by creating good habits, rather than bad ones. Start a morning ritual, which can include simple things such as drinking a glass of water, lightly exercising or eating a healthy breakfast. Having a schedule, such as a cleaning or studying schedule, can help you save time later on by splitting up your work over time instead of leaving all your work near the deadline. Having a routine provides structure in your every day life while allowing you to build healthy, productive habits.
7. Multitasking
Multitasking gives off the illusion that you are completing more tasks at once, when it reality, it is making you slower. Multitasking requires your brain to section off parts of it to different activities, forcing you to attempt to focus on everything at once. The result of this is that you end up working slower, making unnecessary mistakes or having information overload. Multitasking also requires your brain to refocus and reassess the situation each time you switch from one task to another, making you lose overall focus. Try handling one task at a time so that when you finish one, you can cross it off your to-do list and transfer all your mental energy on to the next task.
8. Being Too Hard on Yourself
Finally, don't forget to give yourself the credit that you deserve. If something doesn't go as planned, don't put all the blame on yourself, try to understand the situation and accept the outcome. It's natural to feel negative emotions, so take your time to process through the situation. Then, accept what cannot be changed. In the end, you learned a lesson and you can grow from it.
While these bad habits seem like small, insignificant parts of your day, bad habits can add up. Replace your bad habits with good habits and see a positive change in your productivity, stress levels and happiness.
Lead Image Credit: Sylwia Bartyzel via Unsplash
Want to write for Fresh U? Join now
Want more Fresh U? Like us on Facebook!
Jessica Vuong - University of California, Davis
Most Popular
|
global_01_local_1_shard_00001926_processed.jsonl/28640
|
Jump to content
• Advertisement
• Content Count
• Joined
• Last visited
Community Reputation
194 Neutral
About Puyover
• Rank
1. Puyover
Object-Oriented Game Design
I know this results in educative purpose, but I would like to state that people should use more about C++ has to offer, and I mean by this the use of references and smart pointers for example.
2. Is there any reason why you don't use any C++11 features? (nullptr, smart pointers, etc)
3. Puyover
How to Structure a Game
Very good article, I have to read it more in deep.
4. Puyover
Let's Make: BattleGame! [Part 1 - Classes]
Moreover prior comments: - Your getter function are not returning a const value, but you should however. - You should use forward declaration in Monster.h instead including the Character and Monster headers. - This is just style stuff, but take a look at, for example, Google Style Guide for Cpp Programming. @Matt-D I'm agree of using size_t for counting jobs, beside that, using int is the best one can do instead using char or short (if you are talking here about optimizing).
5. Puyover
Modern Garbage Collectors under the Hood
@Thurok @Nickie That is what the author means with reference counting I think; shared pointers, not raw pointers.
6. Puyover
Tetris clone in BASH script
Really a good job you have done. Congratulations
7. Puyover
Monday morning code...
If this was C++ there would be some chance of success due to operator overload, but...
8. Puyover
Class instances gone wrong!
Dude please, stop programming C++ stuff and pick a book or read some of the C++ faqs or the new approaches about C++11, but you are programming like if you were doing a thing between Java and C. I learnt C++ years ago too, but one month ago when I backed to do C++ stuff I knew I had horrible bad practices and I had to solve them, so I just picked a quick summary comparing old C++ with C++11, together with the faqs are linked in this thread and I achieve to get a big knowledge about the language itself. I know I still have some problems which usually they are design related, but at least I don't have serious problems with stack/heap memory or using macros (language stuff related).
9. Puyover
C++11 Lesson One: Hello World!
Why not simply using Code::Blocks with TDM (GCC 4.7) ? I think it's more instructive since you could explain how gcc works, and of course is less weight than Visual Studio. Also, I consider it faster to launch than VS :)
10. Puyover
Need help with C++
If you are not very experienced in C++ I suppose you are neither with OOP, so I would recommend you to choose SDL instead SFML. Use structured C++ instead object oriented so you don't need to learn a whole paradigm at all. If I'm wrong with your knowledge, just forget the previous paragraph and go full OOP with SFML.
11. Thank you skullfire, nice to know there is a pattern at least which is well established into game development I will give that articles a read.
12. Hi there, I'm currently returning to game development from my traditional software development, but years ago when I started with C and SDL I didn't care about design patterns at all, so now I found myself surrounded with their chaos and can't simply code without standing with one of them. I don't understand which one fits better into game dev (MVC? Components? ... ), and indeed, I don't know many of them however. So my question is, where to start in design patterns? I'm studying the library SFML with C++ right now, which is a language I had forgotten (And I hated) but industry right now almost force you to know C++, and I was very lazy with Java, so I need that change. Thanks in advance.
• Advertisement
Important Information
Sign me up!
|
global_01_local_1_shard_00001926_processed.jsonl/28641
|
Zombie games. Which is better? 7 replies
Please wait...
Renegade Cybertronian
50 XP
22nd September 2005
0 Uploads
10,694 Posts
0 Threads
#1 9 years ago
Vote in the poll and post your reasons in the main thread.
Acualy Is Confusingkid
Keep honking im reloading
50 XP
19th September 2006
0 Uploads
4,563 Posts
0 Threads
#2 9 years ago
I can only comment on Left 4 Dead and Dead rising as I've yet to play RE5 due to no PC release...
I prefer Left 4 Dead dude to the multiplayer aspect.
I played the hell out of Dead Rising, but when it comes down to it, it is quite repetitive and sometimes frustrating. It is a nice free-roam game with tons to do, lots of different weapons (basically anything) and tons of different endings. It also takes quite a while to finish, especially if you're an achievement collector.
As for Left 4 Dead, it's fun with friends, and is a good game to pick up and play for an hour or so. Of course, you can always play longer, but it's more fun within the first hours you play. Left 4 Dead offers a short (yet challenging, especially on expert) campaign that can be played alone, or with friends. Both have their pros and cons and aren't really comparable with the exception of the zombies.
however, Left 4 Dead gets my vote as i love playing with friends. :)
Feel my heat, Heavens on fire.
45,365 XP
3rd August 2005
0 Uploads
4,209 Posts
0 Threads
#3 9 years ago
I vote L4D. Dead rising became really boring really fast. I have always hated the controls in Resident Evil. I mean, come on, its 2009. What is up with not being able to strafe/shoot at the same time. L4D has several fun game modes & the graphics look great.
GF's resident evol
50 XP
13th May 2009
0 Uploads
203 Posts
0 Threads
#4 9 years ago
I voted for Left 4 Dead as well. For the reasons stated by Confusingkid, Left 4 Dead is just a really fun multi-player zombie shoot 'em up. I have not, however, played Dead Rising, so I can't comment there. RE5, on the other hand, is interesting on the first play through, if only to see the story line played out. Otherwise, it is essentially an RE4 clone on the 360 with Co-Op gameplay. The Co-Op adds a new element to the game, and can be quite entertaining when played in the Mercenaries Mode. But, overall, RE5 has little replay value and still feels very static by comparison to L4D or other zombie oriented games as you still can't move and shoot at the same time in RE5. Why they never improved this aspect of the game is beyond me and makes the game move at a markedly slower pace to the point of being almost obstinate at times.
Serio VIP Member
The Dane
149,931 XP
11th November 2006
3 Uploads
12,511 Posts
38 Threads
#5 9 years ago
Dead Rising because it's closer to a sandbox Zombie RPG than any other game. I enjoyed Left 4 Dead, but it didn't feel as intense as Dead Rising, and honestly it felt more like watching an Action movie than playing a Horror game. I never played Resident Evil 5 other than the demo, and sure it was fun but nothing in comparison to the other two.
I tawt I taw a puddy tat...
50 XP
30th December 2002
0 Uploads
2,806 Posts
0 Threads
#6 9 years ago
Granyaski VIP Member
High as a kite
107 XP
29th May 2008
0 Uploads
11,881 Posts
1 Threads
#7 9 years ago
Left 4 dead wooooot! It is purely just killing zombies (or the survivors) and being made by valve I find it perfect for multiplayer
Nature's best screw up.
132,255 XP
27th July 2005
0 Uploads
12,663 Posts
0 Threads
#8 9 years ago
Oblivious;4928447Plants Vs. Zombies :smokin:
Yes. He forgot Plants vs Zombies. I won't vote.
|
global_01_local_1_shard_00001926_processed.jsonl/28700
|
Gumm & Green, LLP, Attorneys at Law
Take Your First Step To A New Beginning
855-707-4233 | 805-577-7657
Pros and cons of a Chapter 7 bankruptcy
If you are feeling the pressure of mounting debt, actively looking for solutions sooner rather than later can help you decide on the best options. Filing for bankruptcy can be an effective way to handle financial difficulty.
Those filing for personal bankruptcy may resort to a Chapter 13 or a Chapter 7 filing. Each has its own requirements as well as its own advantages and drawbacks. A knowledgeable attorney can help you determine which would work best in your situation.
How it works
Chapter 7 is a liquidation bankruptcy. This means the court assigns a trustee to oversee the process. The trustee sells your non-exempt assets and uses the proceeds to pay off creditors. In many cases, this means distributing proportional payments and discharging the part of the debt proceeds cannot cover.
Keeping property
If you want to keep a secured asset you still owe money on, such as a financed car, you will need to sign a Reaffirmation Agreement and keep making payments. The equity you have in the asset must also be covered by the exemptions.
Advantages of a Chapter 7 filing
Filing for Chapter 7 should halt collection proceedings against you and protect you from calls and other attempts to collect. This type of bankruptcy process tends to go quickly; you can be finished in as little as three months from filing.
When a Chapter 7 may not help
However, Chapter 7 does have some important limitations. You will not be able to hold on to property that exceeds California exemptions; this includes homes and vehicles. If keeping certain property is a priority for you, you may consider filing a Chapter 13 bankruptcy instead.
In addition, some debts cannot be discharged through either type of bankruptcy. If you file for Chapter 7, you will have to continue repaying them. Generally, these debts include family support obligations, financial penalties for breaking the law and judgments against you for injuries caused by drunk driving.
You must also continue to repay most types of tax debts and student loans; speak with your attorney about solutions that may be available if these obligations present a serious hardship. Finally, you will remain on the hook for debts you omitted from your bankruptcy filing, unless the creditor actually finds out about your bankruptcy.
No Comments
Leave a comment
Comment Information
Get Support Today
Bold labels are required.
Contact Information
Privacy Policy
Email Us For A Response
Office Location
5743 Corsa Avenue, Suite 111
Westlake Village, CA 91362-6440
Toll Free: 855-707-4233
Phone: 818-707-4233
Phone: 805-577-7657
Fax: 818-707-4262
Map & Directions
Local Numbers
|
global_01_local_1_shard_00001926_processed.jsonl/28711
|
Monthly Archives: September 2014
Catching Up on Emails
I have been busy and haven't even looked at this project in months. It's time now to dust the cobwebs.
Since I have not even read the emails I have been getting, that's where I am going to start.
If you sent me an email this summer, I'll try to reply to you in the next few days. If you don't hear from me by October 1, drop me a line.
Update: I just realized I have emails from Spring to answer as well.
|
global_01_local_1_shard_00001926_processed.jsonl/28752
|
Author: Richard Stallman
About Richard Stallman
Richard Stallman is a software developer and software freedom activist. He is the founder of the Free Software movement, the GNU project, the Free Software Foundation, and the League for Programming Freedom. He is the author of the GNU GPL (GNU General Public License), the principal copyleft license.
Latest articles:
Educators need to take care when choosing licenses
On-line education is using a flawed Creative Commons license Prominent universities are using a nonfree license for their digital educational works. That is bad already, but even worse, the license they are using has...
|
global_01_local_1_shard_00001926_processed.jsonl/28757
|
TIP #2: Pride
TIP #2: Pride
Happy [Gay] Pride Month!
In this super exciting episode, I wonder why I have to have a spoon in my coffee to drink it and talk about the difference of being gay and out here in Australia vs Texas. I also chat a bit about my feelings about getting married in about a month.
Note: This was recorded on 2 June 2018.
Feel free to comment or let me know what you want to hear!
You can subscribe by going to The Idiologic Podcast on the iTunes Store or listen to or download this episode below:
|
global_01_local_1_shard_00001926_processed.jsonl/28767
|
NASA spots 'floating' hills on Pluto
The images were captured by NASA's New Horizons spacecraft.
Photo: @NASA
Floating hills of Pluto. Photo: @NASA
NASA has captured images of Pluto showing numerous 'floating hills' carried by frozen nitrogen glaciers that may be fragments of water ice.
The images were captured by NASA's New Horizons spacecraft.
The 'floating hills' individually measure one to several kilometres across, according to images and data from New Horizons.
The hills, which are in the vast ice plain informally named Sputnik Planum within Pluto's 'heart,' are likely miniature versions of the larger, jumbled mountains on Sputnik Planum's western border.
They are yet another example of Pluto's fascinating and abundant geological activity, NASA said.
'Chains' of the drifting hills are formed along the flow paths of the glaciers.
At the northern end of the image, the feature informally named Challenger Colles - honouring the crew of the lost space shuttle Challenger - appears to be an especially large accumulation of these hills, measuring 60 by 35 kilometres.
This feature is located near the boundary with the uplands, away from the cellular terrain, and may represent a location where hills have been 'beached' due to the nitrogen ice being especially shallow.
The new image was captured using New Horizons' Multispectral Visible Imaging Camera (MVIC) instrument.
It was obtained at a range of approximately 16,000 kilometres from Pluto, about 12 minutes before New Horizons' closest approach to Pluto on July 14, last year.
Also read:
NASA's most powerful rocket to send 13 tiny satellites into space
NASA video shows invisible magnetic fields in the Sun: All about it
• Andriod App
• IOS App
Do You Like This Story?
|
global_01_local_1_shard_00001926_processed.jsonl/28827
|
It's Not A New F-Zero, But It Will Do For Now
Arriving on the Wii U eShop on December 11, Fast Racing Neo is a futuristic hovercar racer everyone is comparing to F-Zero, because everyone wants a new F-Zero. It's not quite that, but it scratches the same itch.
Back in 2011 Shin'en Multimedia released a game called Fast Racing League for WiiWare, a game I would have played if I'd cared at all about the Wii at that point. I love a good futuristic racer (Wipeout, F-Zero GX). Hell, I even love a not-so-good one (Extreme G, that one with the things). I find the feeling of unrealistic speed exhillarating, and I long for the stomach-drop that comes when the whole world becomes a blue.
Fast Racing Neo made my stomach drop quite a bit.
Like many of the recent attempts at reviving the racing sub-genre on mobile, this game puts a slight twist on the standard raving format. Throughout the tracks racers will encounter blue and orange speed pads and jumps. Pressing a button swaps the ship's magnetic field or something between orange and blue. Hitting the right pad while the right colour speeds things up considerably, while the wrong colour drags.
I've played through three groups of four races in the Novice Cup so far, with two more difficulty levels to go. Things are pretty spectacular from the get-go, with sharp turns and stomach-churning drops. It's all pretty tame until the third group of four tracks, where the rails are taken away and those without a good handle on their vehicles explode. A lot.
It's Not A New F-Zero, But It will Do For Now
These fucking rocks.
Luckily there's a time attack that's good for practicing the game's 16 tracks, and something called Hero Mode which I've not unlocked yet. Plus there's online racing for up to eight players, and local for four. Not bad at all for a $22.49 ($NZ24.49) download.
Fast Racing Neo is nice to look at, but you'll be too busy trying not to die to notice. You'll barely have time to bemoan the fact that we've not gotten a new F-Zero game since 2004.
But you still will, because dammit.
I played this at PAX, it was the only game I was really wanting to check out. It looks really good on the Wii U and plays well. Been looking forward to this for a while now.
Fulcon Capitol - Captain Falcon???
That does look pretty cool, but I like the weapons, like in wipeout.
I'm not a uge fan of F-Zero games, only one I had any sort of fun with was the 64 one, didn't enjoy the original or Gamecube ones.
This game, however, is much more fun for me.
Looking at those environments made me want a new Star Wars podracing game.
Join the discussion!
Trending Stories Right Now
|
global_01_local_1_shard_00001926_processed.jsonl/28831
|
Vascular Disorders of the Upper Extremity
Blood filled with oxygen is carried from the heart by arteries and returned to the heart and lungs by veins. There are two major arteries in the wrist that bring blood to the hand, but because of personal differences, not everyone's anatomy is exactly the same. The way blood gets to the fingers is often different across individuals.
Many things can impact the flow of blood and the vascular system. Although disorders to the upper-extremities (i.e., the area from the arms to the fingertips) aren't particularly common, any that arise can impact health in significant and long-lasting ways.
Common Causes of the Disorders
The causes of disorders to the vascular system can be sorted into five groups:
• Disorders caused by trauma
• Compressive disorders
• Occlusive disorders
• Vasospastic disorders, or spasms of the artery
• Tumors and malformations
Those with certain diseases such as kidney failure, diabetes, or hypertension often have vascular disorders, as do those who undergo dialysis. Smoking and some occupational contexts, such as working in cold temperatures or with vibrating equipment, are also associated with vascular problems.
Symptoms of Vascular Insufficiency
An impaired supply of blood can produce a number of symptoms. Any of these may indicate that a visit to your hand surgeon should be considered. Any changes in the color of the fingertips, or any sense of numbness or tingling in them, can indicate a loss of blood circulation. Fingers, or the entire hand, may be more susceptible to cold, which may be hard to relieve and tolerate. Areas around the blood vessels may become swollen, and ulcers or sores on the hand may be slow to heal, if they heal at all.
Diagnosis & Examination
Your hand surgeon will examine you, especially your extremities, if vascular insufficiency is suspected. During the examination, your pulse and its strength will be checked by your hand surgeon in a number of locations. Such locations include the armpit, elbow, wrist, and at the finger. Your surgeon will also examine you for signs of swelling or vein distension and discoloration. Your hand surgeon will take your temperature and your fingertips will be carefully checked for the possibility of gangrene or signs of ulcers. Any masses or lumps will be examined to determine their size, color, character, location, and you will be asked about their duration.
Diagnostic Tests for the Disorder
If earlier examinations support it, many diagnostic tests to confirm the diagnosis and evaluate the extent of the disorder may be used. Such tests include:
• Checking the blood flow in the arteries and veins through ultrasound or Doppler examinations
• Using small cuffs and ultrasound transducers on the fingers and arm to record the pressure in the arteries and the volume of blood carried by the veins each pulse
• Taking an MRI or magnetic resonance angiography (MRA) of the affected area to examine the vessels
• Injecting contrast into the blood vessel suspected to have a problem and taking an x-ray of the hand or arm in a procedure called arteriography, which gives the most detailed view of the system
• Doing a cold stress test, where the finger's blood pressures and temperatures are measured before and after they've been held in cold water. This test will check how much the blood vessels react and how quickly they return to normal
Causes of Vascular Disorders
Many things can injure a blood vessel and impair its use, including:
• Vascular Malformation - This condition presents itself when the connection between the veins and arteries is unusual. Typically, the tiny vessels connecting them are forced to carry much more blood than usual and grow in size. Any time the small vessels connecting veins and arteries have to carry abnormally large amounts of blood, the area affected can produce pain and show a higher temperature than surrounding areas. It's also common for the area to show localized sweating and hair growth, and spontaneous and unexpected bleeding may occur.
• Aneurysms - If a portion of a vein or arterial wall is weak, it can suddenly expand and pop. This condition is referred to as an aneurysm. It is usually painless, but a mass might show up where it occurred. After the vessel pops, it may become blocked if a clot forms. If an aneurysm is in the wrist, it can lead to pain or numbness, an increased sensitivity to pain, and even gangrene at the fingertips.
• Raynaud's Disease - This phenomenon occurs when the arteries in the fingers begin to spasm and cut off the flow of blood. When this happens, the fingers, themselves, often lose color and become whiter, only to get their original color back when the spasm ends. The spasms often show up after the hand is exposed to tobacco or cold, so treatment includes quitting smoking and protecting the hands from the cold by wearing gloves or mittens. Medicine, also, can be helpful in treating the condition by improving the flow of blood to the fingertips by expanding the blood vessels. If these treatments don't work, surgery to separate the nerves around the vessels can be performed to attempt to reduce their contribution to the spasms.
• Trauma - Obviously, any cut from a sharp object can damage the blood vessels, but they can be injured by blunt objects as well. Small cuts that seem harmless can cause major damage, and whenever a blood vessel is injured a clot can form stopping the flow of blood from reaching the fingertips. When this happens, the fingertips will lose their color and grow cold and painful. Unless your hand surgeon is certain that other arteries can keep supplying blood, reconstructing or repairing the vessel may be necessary to prevent gangrene and death of the finger.
|
global_01_local_1_shard_00001926_processed.jsonl/28848
|
Adults pay bills of £1.2M over lifetime
We all love bills, right!
We all love bills, right!
Share this article
Brits will part with almost £1.2MILLION on household bills in their lifetime, according to a new study.
The biggest chunk of that goes on bills - amounting to around £520.22 a month - or £6,242.64-a-year and £376,431.19 in total.
However, despite their huge monthly outgoings, a quarter of people admit they have at least one 'redundant' direct debit they haven't yet got around to cancelling.
Unfortunately, just under half of people regularly struggle to pay their bills - as such fifteen per cent have been known to cover bills with their overdraft, while 17 per cent will put them on the credit card.
A further 12 per cent have borrowed money from family or friends to cover unwanted bills and one in 20 have even taken out a loan.
But savvy shoppers are trying to reduce their bills - with 85 per cent trying to shop around for the best deals.
|
global_01_local_1_shard_00001926_processed.jsonl/28868
|
Oesophageal Manometry(measurement of pressures in the oesophagus) and 48hr pH recording(measurement of the amount of acidity in the oesophagus) are normally used to investigate gastro oesophageal reflux and heartburn. They are useful in diagnosing the problem in people with atypical symptoms and also in assessing suitability for surgical treatment. Manometry is useful in diagnosing swallowing problems.
These two procedures are usually performed together. In oesophageal manometry a fine probe is passed down through the nose into the oesophagus or gullet and pressures within the gullet are measured. This is then followed by a radio capsule being attached to the lining of the oesophagus under sedation. This then transmits information to a radio receiver (which the patient carries around with them) about the amount of acid that is refluxing from the stomach up into the oesophagus. The recording continues for 48 hrs. The receiver falls off the lining of the oesophagus on its own after 2-3 days. The information is then obtained from the recorder and the results interpreted.
Make An Enquiry
|
global_01_local_1_shard_00001926_processed.jsonl/28869
|
Fiskars restaurants
Finnish in Fiskars
Restaurant Kuparipaja
The terrace overhanging the river at the old copper forge is a mesmerising setting for a foray into Finnish gastronomy. Starters such as organic beef tartare (from a local cattle farm) are followed by mains like pik…
Cafe in Fiskars
Café Antique
Heavenly, hand-baked cardamom buns are among this family-run cafe's treats, along with sweet and savoury pies, soups, sandwiches and cakes. It's located inside Fiskars' red-brick clock-tower building (originally a s…
|
global_01_local_1_shard_00001926_processed.jsonl/28879
|
Famous lyrics by »
Leland Tyler Wayne (born September 16, 1993), professionally known as Metro Boomin (also known as Young Metro or simply Metro), is an American record producer, record executive, songwriter, and DJ. Raised in St. Louis, Wayne began a production career while in high school and became best known for his successful recordings with Atlanta rap artists such as Future, 21 Savage, Gucci Mane, and Migos in the mid-2010s. In 2017, Forbes called him "easily one of the most in-demand hitmakers in the world," while Stereogum described him as "one of the most original, vivid, important voices in rap right now."Early production success for Wayne came with tracks such as ILoveMakonnen's 2014 hit "Tuesday" and Future and Drake's 2015 single "Jumpman". Since then he has amassed over a dozen Top 20 hits, including "Bad and Boujee" by Migos, "Mask Off" by Future, "Bank Account" by 21 Savage, "Congratulations" by Post Malone, and "Tunnel Vision" by Kodak Black. He has also released full-length collaborations, including Savage Mode (2016) with 21 Savage, Double or Nothing (2017) with Big Sean, and DropTopWop (2017) with Gucci Mane. His debut solo album Not All Heroes Wear Capes was released in November 2018.
FAVORITE (0 fans)
Albums by Metro BoominSort:By AlbumA - Z
Call Me
Call Me
w/ NAV
Double or Nothing [2017]
Go Legend
w/ Big Sean, Travis Scott
No Complaints [2017]
No Complaints
w/ Drake, Offset
Perfect Timing [2017]
w/ NAV
Pull Up N Wreck [2017]
Pull Up N Wreck
w/ Big Sean, 21 Savage
All For Me
w/ Belly
Share your thoughts on the Metro Boomin Band with the community:
Missing lyrics by Metro Boomin?
Know any other songs by Metro Boomin? Don't keep it to yourself!
Our awesome collection of
Promoted Songs
|
global_01_local_1_shard_00001926_processed.jsonl/28919
|
What other names is Arnica known by?
What is Arnica?
People take arnica by mouth for sore mouth and throat, pain such as pain after surgery or wisdom tooth removal, insect bites, painful and swollen veins near the surface of the skin (superficial phlebitis), bruising, muscle pain, vision problems due to diabetes, stroke, and for causing abortions.
Possibly Effective for...
• Osteoarthritis.
• Early research shows that using an arnica gel product (A. Vogel Arnica Gel, Bioforce AG, Switzerland) twice daily for 3 weeks reduces pain and stiffness and improves function in people with osteoarthritis in the hand or knee. Other research shows that using the same gel works as well as the painkiller ibuprofen in reducing pain and improving function in the hands.
Possibly Ineffective for...
• Reducing pain, swelling, and complications of wisdom tooth removal.In most research, taking arnica by mouth does not seem to reduce pain, swelling, or complications after wisdom tooth removal. One early study suggests that taking six doses of homeopathic arnica 30C might reduce pain, but not bleeding.
Insufficient Evidence to Rate Effectiveness for...
• Bruises. Most research shows that taking homeopathic arnica by mouth or applying arnica to the skin does not reduce bruising. But one study shows that taking 12 doses of a specific arnica product (SinEcch, Alpine Pharmaceuticals) might reduce bruising under the skin in women following face-lift surgery. Also, applying an arnica ointment has been shown to reduce bruising when applied twice daily for 2 weeks.
• Vision problems due to diabetes. Early research shows that taking homeopathic arnica 5C by mouth for 6 months reduces vision problems in people with vision loss due to diabetes.
• Muscle pain. There is inconsistent evidence on the effects of arnica on muscle pain. Some early research suggests that taking homeopathic arnica by mouth does not prevent muscle soreness. Other early research shows that applying an arnica cream (Boiron Group, France) three times daily every 24 hours after performing calf raises does not reduce muscle pain. However, other research shows that applying an arnica gel on the leg muscles immediately after running and then every 4 hours while awake for 5 days might reduce muscle pain or soreness after 3 days. Also, taking homeopathic arnica D30 by mouth reduce muscle pain if started the night before a marathon and repeated every morning and evening for 3 days.
• Pain after surgery. Most research shows that taking homeopathic arnica by mouth slightly reduces pain after surgery. In some cases, homeopathic arnica has been used together with an arnica ointment from 72 hours after surgery for 2 weeks. But not all reduces have been positive. Some research shows that taking homeopathic arnica for 5 days does not reduce pain following surgery.
• Stroke. Early research shows that taking one tablet of homeopathic arnica 30C under the tongue every 2 hours for six doses does not benefit people who have had a stroke.
• Acne.
• Chapped lips.
• Insect bites.
• Painful, swollen veins near the surface of the skin..
• Sore throats.
• Other conditions.
Quick GuideVitamin D Deficiency: How Much Vitamin D Is Enough?
Vitamin D Deficiency: How Much Vitamin D Is Enough?
How does Arnica work?
Are there safety concerns?
Arnica is POSSIBLY SAFE when taken by mouth in the amounts commonly found in food or when applied to unbroken skin short-term. The Canadian government, however, is concerned enough about the safety of arnica to prohibit its use as a food ingredient.
Special Precautions & Warnings:
Pregnancy and breast-feeding: Don't take arnica by mouth or apply to the skin if you are pregnant or breast-feeding. It is considered LIKELY UNSAFE.
Broken skin: Don't apply arnica to damaged or broken skin. Too much could be absorbed.
Digestion problems: Arnica can irritate the digestive system. Don't take it if you have irritable bowel syndrome (IBS), ulcers, Crohn's disease, or other stomach or intestinal conditions.
Fast heart rate: Arnica might increase your heart rate. Don't take arnica if you have a fast heart rate.
Are there any interactions with medications?
Medications that slow blood clotting (Anticoagulant / Antiplatelet drugs)
Interaction Rating: Moderate Be cautious with this combination.
Talk with your health provider.
Dosing considerations for Arnica.
The following dose has been studied in scientific research:
• For Osteoarthritis: An arnica gel product with a 50 gram/100 gram ratio (A. Vogel Arnica Gel, Bioforce AG, Switzerland) has been rubbed into the affected joints two to three times daily for 3 weeks.
FDA Logo
Report Problems to the Food and Drug Administration
Health Solutions From Our Sponsors
Last Editorial Review: 3/29/2011
|
global_01_local_1_shard_00001926_processed.jsonl/28938
|
Windows VPN Keep Alive
Batch file properties window.
Batch Shortcut
I enjoy the one-click facility for connecting to my VPN in Windows XP. It gets the job done, but I sometimes struggle with the famous dead connection bug. This is a very common problem in Windows that causes the VPN to become unresponsive after two to five minutes of inactivity, even though the status still says “Connected.”
I created a one-click solution for both connecting and maintaining a VPN. Setting it up is simple. It involves just these steps, which I will explain below:
1. Set the VPN “idle time before hanging up” period to “5 minutes” instead of “never.” This forces Windows to properly reflect any disconnection.
2. Create a new batch file, which I have provided below.
3. Edit the batch file to match the name and address of your connection.
4. Create a desktop shortcut to the batch file.
5. Edit the shortcut properties so that the batch automatically runs minimized with a nice icon.
My Intranet.bat
@echo off
rem Check if already connected
ping -n 1 -w 500 > nul && goto Notice
rasdial "My Intranet" || goto Failed
echo %date% %time%
echo Leave this window open for keep-alive service.
ping -n 30 > nul
ping -n 1 -w 500 && goto Loop
ping -n 1 -w 500 && goto Loop
echo Connection died %date% %time%
rasdial "My Intranet" /disconnect
goto Attempt
echo Connection failed %date% %time%
In the batch file above, there are two things that must be edited. The phrase “My Intranet” shows up in two places, and it must be edited to match the name of your VPN connection. Additionally, the IP address appears three times and must be edited to match the VPN segment gateway address. This address can be found in the Details tab of the VPN status window when connected. It is labeled “Server IP address.”
The desktop shortcut is created simply by holding down the Alt key while dragging the batch file to the desktop. The default name is displayed as “Shortcut to My Intranet.bat” and it can be renamed safely to “My Intranet”. The shortcut name does not have to match the connection name. Right-click the shortcut to see its properties. That is where you may select a nice icon and change the Run property from “Normal window” to “Minimized.”
To manually disconnect the VPN, first close the running batch window, then click Disconnect on the VPN icon.
Note this solution does not solve the problem of the Offline Files system disconnecting frequently from remote servers. I will follow up with a new article when I figure out how to make that part behave better.
Getting Fancy
If you wish to further customize the batch file, take note of the following parameters: “30” is the keep-alive interval in seconds. “500” is the ping timeout in milliseconds. The latter is used twice to allow for a single packet to be lost before assuming the link has died.
Last year, I wrote about how to easily create a split tunnel VPN to speed up non-intranet traffic while staying connected to your servers. What I didn’t elaborate on in that article is that sometimes I find myself at a non-encrypted hot spot wanting to log in to a non-encrypted website. In that situation, I want to take full advantage of my VPN encryption so that my traffic isn’t being broadcast in the clear, no matter how slowly it runs. To give myself that flexibility, I simply keep two different VPN icons in the network connections panel. One of them is a split tunnel connection with customized TCP/IP settings, and the other uses the default settings and the same server. I’ve created two separate batch files now so that I can click on one icon or the other to get the desired connection and an automatic keep-alive signal. When I’m wired, I click on my split tunnel. When I’m wireless, I click on my remote gateway. Problems solved! 🙂
1 Nov 2011
Systems Engineering
Comment Feed
Write a Comment
|
global_01_local_1_shard_00001926_processed.jsonl/28943
|
Before you watch the below video, know this: You're going to wince. Don't worry — everything turns out OK, but without some context there's very little to indicate that's going to be the case. This is because the barnacle goose, which breeds on the arctic islands of the North Atlantic, has one of the craziest tests of survival I've ever seen.
In an effort to avoid predators, barnacle geese build their nests on mountain cliffs measuring hundreds of feet high. Makes sense, right? Things take a sharp turn for the crazy due to the fact that the parents, like all geese, do not feed their goslings. Instead, the little ones, only a few hours old, are forced to throw themselves off the cliffs to reunite with their cheering family down below. What starts off as a graceful glide, at least for the lucky, quickly turns into something out of a cartoon, with the goslings ricocheting off rocks on their way to the bottom.
barnacle gosling free falling off a cliff
Leap of faith: Barnacle goslings can survive falls as high as 400 feet when they're only a few hours old. (Photo: BBC)
It gets worse. Goslings that do somehow manage to survive the 300'-400' free fall are then faced with outrunning the very same predators their parents were trying to avoid in the first place. Any at all injured by the bumpy trip down generally don't make it. It's seriously one of the most terrifying first 24-hours on the planet nature has devised.
For the new BBC series "Life Story," the first nature documentary shot in ultra high-definition, filmmakers traveled to the cliffs of Greenland to capture this incredible rite of passage. Hold your breath and watch one gosling's dramatic first steps below.
Related on MNN:
The miraculous, death-defying free fall of the barnacle gosling
BBC filmmakers capture what's likely the most terrifying leap of faith ever conceived by nature.
|
global_01_local_1_shard_00001926_processed.jsonl/28947
|
Paulsboro Railroad Bridge Emergency Response
During the early morning hours of Friday, November 30, 2012, seven freight train cars derailed at the Paulsboro Bridge over the Mantua Creek. An integral part of Conrail's Penns Grove Secondary – a 20-mile railroad freight line in the Delaware Valley – Conrail turned to trusted bridge experts Modjeski and Masters to assist with restoring safe operations of the railroad.
Also known as the East Jefferson Street railroad bridge, the Paulsboro Bridge was built in 1917 and rebuilt in 1940 for the Pennsylvania-Reading Seashore Lines. Following an emergency field response and inspection, M&M worked with Conrail to reopen U.G. Bridge No. 13.70 over Mantua Creek. The reconstructed bridge ensured continued safety for the local community and safe operations for Conrail. The existing 183-ft single-track bridge features a 52-ft movable span which was rendered inoperable in late 2012.
Bridge Geometry
Length of Main Span 52.5 Feet
Total Projet Length 183.5 Feet
Tracks on Structure One
|
global_01_local_1_shard_00001926_processed.jsonl/28959
|
The Simpsons
Homer Alone - S3-E15
Deliberate mistake: Arnie says that he drops his bagel. When he does he starts to say it, but when we see the helicopter it has just fallen out. If he dropped it at the time he did, then it would be much further down and wouldn't be visible in that shot.
Join the mailing list
|
global_01_local_1_shard_00001926_processed.jsonl/28972
|
Tag Results (for Groups only)
Groups tagged with "mygrid" (2) [See results for all types]
Network-member myGrid
Unique name: myGrid
376 shared items | 0 announcements
Network-member Taverna 1.7.1 workflow workbench examples
Unique name: tavernaExamples
Created: Wednesday 05 March 2008 13:45:09 (UTC)
The workflows visible from this group correspond to the examples from the Taverna 1.7.1 workflow workbench
17 shared items | 0 announcements
What is this?
Linked Data
Non-Information Resource URI: https://www.myexperiment.org/tags/662
Alternative Formats
|
global_01_local_1_shard_00001926_processed.jsonl/28980
|
Poem: Bhagawate Vasudevay
It's the day 11 of April poem-a-day celebration. Let's make the challenge a bit tougher. Today's poem an acrostic hymn to Lord Krishna. The first letter of every verse forms the sacred Mantra, 'Aum Namo Bhagawate Vasudevay', I bow to Bhagwan Vasudeva and so is the name of the poem.
Image: Lord Krishna and Radhaji
If a chant is suggested by the Sadguru, it's Kalyankari which means it will bring the realization of Mukti. As it is said that 'Sarva deva namaskaram keshavam pratigacchati' all the names of Bhagwan and mantras are divine and reach to Lord Krishna - Keshava.
To understand and follow Bhaktiyoga exemplary lives of devotees teach us a lot. Dhruva, the little boy, disheartened by his fate chanted the mantra 'Aum Namo Bhagawate Vasudevay' and Lord Vishnu listened to his prayers and fulfilled his wishes bestowing Bhakti to Dhruva. This story can be found in the Puranas, like Vishnupurana.
Today, I wish to pray Lord Krishna with the same mantra. Mantrajaap means chanting the divine name or mantra of Bhagwan repeatedly. It's a spiritual Sadhana to grow Bhakti, it's a kind of meditation to discover the peace within. Millions of devotees have met their Bhagwanji by chanting Naamjap.
Auspicious is your name, purifies our hearts, wiping the cover of ignorance.
Unuttered divine letters of your name echo in the environment becoming the vibrations of love in deep Bhakti.
Manifested your grace in your name, chanting, again and again, weaves your name in breaths.
Name, your divine name has your vibes making your presence experienced so existent in my life
Aura of divinity created by reciting your name soothes the bruised heart gently.
My mind captivated by your name is slowly cleaning the amassed doubts of worldly thoughts.
O Dear Lord Krishna, your name is my only hope now, my solace now.
Bhakti is flourishing melting my rioting thoughts in your name and your supreme love.
Having faced unkind ordeals, having searched for answers for so long, your name is the only harbor, I trust now.
Ardently I call your name, again and again, to meet you eternally.
Great promises and the knowledge you imparted in Bhagwadgeeta, I remember again and again, while calling you.
As the days are passing, I feel your deep love filling the core of my heart.
Wish, only one wish now, to dissolve all my desires in you.
And experience the oneness with you.
Though I am not a great devotee like Dhruva, Meeraji, and Draupadi,
Existence of your name in my heart has made me perfect.
Vedas and Puranas tell that you never leave your Bhakta.
Attuned to your flute of love that brings me closer to you.
Sowing the seeds of your name in my heart to grow my life in devotion.
Unattainable Moksha and Gyana -- for an ordinary naive like me -- has become my life now by your Love, dear Krishna.
Dedicating hymns, poems, and songs to you, dearest Lord Krishna, please sing them with the eternal music of your love.
Enchanted, elated and enlightened by your love, by singing your name continuously.
Vagaries of life that made me read your teachings in Bhagwadgeeta transformed ‘me’ in your love.
And now I can’t feel my existence separate from you at all, not for a single moment.
Yearning for your love, knowing and realizing you in my heart.
Naamjapa has different stages of chanting, spoken chanting loudly is Vaikhari Japa, chanting like whispering is Upanshu, unspoken chanting is remembering the name in mind is Manasic, and last is Paravani.
Attaining higher stages in Naamjapa is a process that needs patience and devotion, the guidance of a Sadguru and the Gurukripa or Ishwarkripa.
In the highest phase of Naamjapa, the chanting continues involuntarily without intentional efforts. Such chanting does not have uttered words yet the reciting goes on deep within. An example of Paravani is the Bhakti by Arjuna. Arjuna once while sleeping, unknowingly, was chanting Krishna, Krishna and slowly the voice of the words Krishna, Krishna became so loud that Narada and other people gathered there. Arjuna was still in the deep sleep. The supreme devotion can reach this high altitude. I can believe this incident as the supreme love does not need efforts to feel it. The Bhakta can't live without their Bhagwan. I think such Bhaktiyoga is even above Mukti and Gyanyoga.
Many Bhaktas love Dvaita Bhakti. They wish to worship their Bhagwan believing themselves and the Bhagwan as two, which is a very beautiful form of love. But, I wish to experience Advaita Bhakti where my Bhagwan and Me, won't be 'two', we will be 'one', only Lord Krishna.
Enter your email address to get latest motivational poems in your inbox:
|
global_01_local_1_shard_00001926_processed.jsonl/29043
|
Search Site: OnlineNigeria
Have You Ever Done This?
Posted by Mimi on Tuesday, July 5th, 2016
Written by: Mimi,
1.- if u didn’t kill earthworm with salt.
2.- if u didn’t play rubber band.
3.- if u neva bath in the rain.
4.- if nobody told u about india vs nigeria 99-1
5.- if u did not sleep on the couch and wake up on the bed.
6.- if u didn’t throw ur milk teeth on the roof for lizards to take it and give you new ones.
7.- if u don’t just watch your legs n hands instead of bathing before going to school.
8.- if u didn’t act film inside uncompleted building or under bed with friends.
9.- if u have never flew a kite.
10.- if u didn’t use your two legs to build houses with sands.
11.- if u never write your name on a paper and insert it into your pen so that no one will steal it.
12.- if didn’t close the fridge door really slowly and see when the light went off.
13.- if u neva wave at white birds expecting your nails to be whiter.
14.- if u did heard of ghost that stay under mango trees at night.
15.- if u never drive a single car tyre with stick and call it a car.
16.- if u never mix garri and sugar in ur pocket and eat it while walking on the street.
17. if u never did mama n papa play e.g cooking leaf and sand without fire.
18.- if u didn’t play table soccer with bottle cover.
If you did not do any of this, your childhood was not fun.
Latest News
|
global_01_local_1_shard_00001926_processed.jsonl/29045
|
format file epk
What is an epk file and how do I open an epk file?
EPK is a data package format used by Metin2, an eastern fantasy-based Massively Multiplayer Online Role-Playing Game. It may contain multiple types of data, including 3D objects, textures, sounds, scripts, and level data loaded by the game.
Recommended epk file download:
Ymir Entertainment Metin2
Metin2 File Extractor
Detail epk file extension information:
File Type: epk
File Format: Metin2 Game Data Package
Primary Association: Package Files
|
global_01_local_1_shard_00001926_processed.jsonl/29055
|
o zone login
1. You are at:
2. Home
3. About us
4. Our work
5. Protecting the osteopathic title policy
Protecting the osteopathic title policy
The GOsC's Protecting the osteopathic title enforcement policy sets out how and when we will take action against unregistered individuals who call themselves osteopaths.
Section 32(1) of the Osteopaths Act 1993 (the 1993 Act) makes it a criminal offence for a person, who is not registered with the GOsC to describe themselves, either expressly or by implication, as any kind of osteopath. S32(1) applies to the United Kingdom and it lists, in particular, the following protected titles:
• osteopath
• osteopathic practitioner
• osteopathic physician
• osteopathist
• osteotherapist.
The policy
Our policy confirms that we will focus on cases that present a risk to patient safety and public protection, and that we will adopt a proportionate response if we hear allegations that the title of osteopath is being misused.
The policy has not changed since we consulted on a draft version over the Summer 2014. Respondents to the consultation told us that the draft policy was clear, and agreed that it should require the GOsC to:
• always seek to reclaim the costs of a criminal prosecution if the defendant is found guilty or pleads guilty
• always seek publicity for every successful prosecution.
If you suspect that an unregistered person is claiming to be an osteopath, please tell us – we explain what to do on our Protecting the title 'osteopath' page
|
global_01_local_1_shard_00001926_processed.jsonl/29056
|
The Spiritual Practice of Trusting in God: Day 5 of 8
Living Water
-Rick Hocker
Some of the most spiritually beautiful people in the world have undergone suffering and been transformed by it. These people seem to have a stronger presence of being, a deeper understanding of life and self, and greater compassion than others. These people do not view suffering as bad, but see all of life as a means to experience God. They transcend the need to label their experiences, but focus instead on knowing God and grasping His fullness in their lives. The cisterns of their souls have been enlarged and filled to the brim with Living Water.
God is powerful enough to use anything in our lives to transform us, if we allow it. It is our trust in God that transforms us, not the event itself. At its most basic level, it is our struggle to remain in that state of trust that stretches and enlarges our souls, that increases our capacity for God's life within us, so that we may be filled with all the fullness of God.
I mentioned that when I was bedridden, God was not accessible to me. There are many reasons why we get disconnected from God. One reason is because God intentionally withdraws Himself from us. He does that to see whether we will seek him more earnestly or walk away. When the water dries up, will we put down deeper roots to seek new sources of water? Will we dig our cisterns deeper until we hit water again? If we choose to dig, then we will have deeper cisterns to hold more of His Spirit when times of infilling come.
I don't know about you, but my Christian life has been characterized by long stretches of drought and thirst. I'm like one of those tabletop sand gardens: you can drag that little wooden rake until your fingers cramp, but you're not going to find any water that way. My spiritual thirst is what propels me and motivates me to seek God, and to keep digging my underground cistern. It worries me when I have no thirst because then I become apathetic and abandon the work beneath my house. If you're not spiritually thirsty, then ask God to revive your thirst. Spiritual revival starts with thirst, not with outpouring. What good is it for God to send rain when all we have are thimbles to catch the rainwater? It is our thirst for God that drives us to seek Him, to plead for his presence, to long for His Living Water, to keep digging our cisterns to hold the water He sends in response to our thirst.
About the Author
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.