id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_1_shard_00001926_processed.jsonl/31713
|
Sunday, October 31, 2010
Halloween hauntings...
I like paranormal ghost stuff. I mean, I don't do Ouiji boards or seances or anything like that. I don't like evil things, etc... but I have always been interested in "ghost stories." I can remember checking out "Texas Ghost Stories" from my elementary school library. I still find ghost stories cool. I watch several shows on TV such as "Ghost Hunters" and "Paranormal State" and I am in awe of all the equipment they use. It's pretty cool stuff!
Anyway... in honor of Halloween I was going to share my recent experiences. I'm probably exaggerating by calling them "experiences" but if you put them all together and tell it to spooky music then they could be kinda freaky...
1) I was watching "Paranormal State" on TV in my bedroom around 11pm. All of the sudden Taj's remote control car flew off the small file cabinet in my room and landed in the middle of the floor. I wasn't scared, I was more like, "What the heck?" Sei didn't even move at all-- he was sleeping. I picked the car back up, made sure it was turned OFF (it was) and sat it facing a different direction on the file cabinet with the remote blocking it from falling (or flying) off again. Fast forward 20 minutes-- the car flew off AGAIN the opposite direction with so much force this time Sei even woke up. Yeah... weird.
2) A few days later I'm sitting on the couch checking my emails. No one else is home. There's no sudden movement or anything. BAM! The picture hanging on the wall behind me falls off- HARD. Weird. It hasn't fallen off in the past. Ever. I hung it back up and 20 minutes later it tell again. Weird.
3) Saturday Sei was sleeping in the bedroom because he worked that Friday nite. Indy, our dog, knows she is not allowed in our bedroom--especially if Sei is home. Well, something was stressing her out. She paced in front of our bedroom door, whined a little and finally started scratching at the door. I was in the kitchen and saw her acting all strange. I finally thought, "Crap, Sei is probably choking or something and Indy wants to save him!" So, I opened the bedroom door. She went running in. Sei was still breathing and slightly snoring... Indy sniffed around the room, paced back and forth by the bed and finally went out after I told her, "Out Indy." That was it. Weird.
So... what do you think? It's a brand new house, so there's no old ghost haunting it. I was thinking it was probably like on Poltergeist... "You moved the cemetary, but you left the bodies!! You left the bodies and you only moved the headstones!!!"
|
global_01_local_1_shard_00001926_processed.jsonl/31724
|
Reflection. The reason for dates, locations and geopolitical situations in the Bible. By Fabian Massa.
Translated from Spanish to English with Google Translate.
Dedicated to my friend Mauri, who is always hungry to learn more.
If you read the Bible carefully, we see that generally each story God has sought ways to locate us in time, in space and events:
August 10 river flowed from Eden to water the garden, and from there it was separated into four headwaters. 11 The first is Pishon, and through the entire land of Havilah, where there is gold ...... 13 The second was called winds through the entire land of Cush. [C] 14 The third was called Tigris, which ran east of Assyria. The fourth river is the Euphrates. Gen. 2.8-14 NIV.
Of the four rivers that indicates the passage, the Euphrates and the Tigris are easily located and give us the certainty that the region of Eden was in Mesopotamia, and the Garden was somewhere in the eastern part of the region.
It is also important to recognize that area geographically because it almost all the events of the Old Testament will be developed:
If we read the prophets, we see that the Lord gives us the period in which they prophesied. Take, for example Isaiah:
Isaiah 1 New International Version (NIV)
1 The vision which Isaiah the son of Amoz received concerning Judah and Jerusalem during the reigns of Uzziah, Jotham, Ahaz, and Hezekiah, kings of Judah.
When King Uzziah is found in the records of 2nd Re 15: 1-7. He reigned over Judah from 792 to 750 B.C. , Ie for 42 years.
A Uzziah Jotham succeeded him, who ruled from 750 to 735 BC, ie for 15 years (2nd Re 15, 32-38).
After Joktan Ahaz reigned from 735 to 715 BC reign was 16 years (2nd Re 16: 1-20).
After Ahab became king Hezekiah 715 to 686 BC (2nd Re 18.1 - 20.21) ruled for 29 years.
In Isaiah 6 we read how the prophet received his call and gives an important fact, that was the year of the death of King Uzziah, so we can deduce that Isaiah would have begun almost his ministry the end of the reign of Uzziah, which his ministry would have extended for more than 60 years, from about 750 BC to 690 B.C. The power that dominated the Middle East was Assyria, as reflected in some passages, eg [1]:
Isaiah 7:17 The LORD will bring on you and on your people and your father's house, days that have not come since the day that Ephraim departed from Judah; even the king of Assyria.
Isaiah 8: 7 Behold, therefore the Lord bringeth up upon them the waters of the river, strong and many, even the king of Assyria and all his glory; he shall come up over all his channels, and go over all his banks;
Isaiah 10: 5 O Assyrian, the rod of mine anger, in their hand is mine indignation.
Isaiah 36: 1: to pass in the fourteenth year of King Hezekiah, Sennacherib king of Assyria came up against all the fortified cities of Judah and took them.
Isaiah 36: 2 And the king of Assyria sent Rabshakeh with a great army from Lachish to Jerusalem unto king Hezekiah; and camped along the aqueduct of the Upper Pool, on the road to the fuller.
In the time of Hezekiah the Kingdom of Judah had fallen sharply because Assyria had conquered many lands, even in 722 BC It took the Northern Kingdom and destroyed Samaria, 2 Ki. 17
In we can expand more historical data on Assyria
Sargon II (reigned between 722 and 705 BC.) Was a king of Assyria. He received the throne of Shalmaneser V in 722. C. It is unclear whether the son of Tiglath-Pileser III or a usurper of the throne outside the royal family.
Sargon II became king of Assyria during the New Kingdom. He ascended the throne after the death of Shalmaneser V. It probably was a usurper, but-according to a text that has preservado- claimed to be the son of Tiglath-Pileser III. In any case, seized the throne by violence, and its advent marked a break with the past, because in none of their inscriptions mention of his predecessors is made. It was a powerful king, a great conqueror and founder of the most important Assyrian dynasty rulers, under whom the empire reached its greatest triumphs.
Known for its mention in the Book of Isaiah (20: 1), was the first Assyrian king whose name was deciphered in the mid nineteenth century when Assyriology was still in diapers, which was a success for biblical archeology.
His first season in the 722. C., meant the conquest of Samaria, though perhaps dropped earlier, when it was only army commander Salmanasar 720 V. a. C. intervened on two fronts at once: in Babylon, to cut aid to Berodachbaladan was receiving the Elamite Ummanigash, and against a Syrian-Egyptian coalition reconquering rebel provinces of Arpad, and Damascus Simirra.
Below is a map of Assyria Sargon II times
If God allowed the Bible has historical, geographical, geopolitical data, it is for us to consider. Only by knowing the history can understand the anticipation of prophecy to its historical fulfillment, this fulfillment is what authorizes the prophecy, which reveals that God is God. So he himself says:
Isaiah 42: 9 Behold, the former things are come to pass, and new things I declare; before they spring forth I tell you of them.
Isaiah 45:19: Do not spoken in secret, in a dark place of the earth; I did not say to the seed of Jacob, seek ye me in vain. I the LORD speak righteousness, that righteousness AD.
Isaiah 46:10: Declaring the end from the beginning, and from ancient times things that are not yet done; I say: My purpose will stand, and I will do what I want;
12. John 14:29: And now I've told you before it happens, so that when it happens you may believe.
Entradas populares de este blog
NEWS. Второй зверь. By Fabian Massa.
El Pacto del Ojo Derecho. By Fabian Massa.
|
global_01_local_1_shard_00001926_processed.jsonl/31725
|
Study. Ulrich Zwingli and the Reformation in Switzerland. By Fabian Massa.
Translated from Spanish to English with Google Translate.
Zwingli was born in Wildhaus, Switzerland, January 1, 1484 and died in Kappel am Albis, in the Canton of Zurich on 11 October 1531. He was the leader of the Swiss Reformation and the founder of the Swiss Reformed Church.
The first lessons gave them his uncle Bartolomeo Weesen. He attended studies in Bern before attending the University of Vienna in 1499. From there happened in 1504 to the University of Basel, where he completed his degree in 1504 and a doctorate in theology in 1506.
With his new degree was a priest in Glarus, where he studied Greek and Hebrew. At that time he also received the influence of humanist Erasmus of Rotterdam. By studying the Scriptures from the standpoint of humanism came to the conclusion that many of the doctrines of the Church were in contradiction with the teachings of the New Testament. Zwingli go slowly drawing the conclusion of the need for reform of the Church, even independently of Martin Luther.
Between 1508 and 1516 the War of the Holy League of Cambrai, that involved almost all European countries got rid of her time: France, the Papal States, the Republic of Venice, Spain, the Holy Roman Empire, England, Scotland, the Duchy of Milan, Florence, the Duchy of Ferrara and Switzerland. Since 1512, the Swiss Confederation various armed contingent sent to war in favor of the Papacy (who obviously paid salaries) had to face the French troops in Lombardy during the War of the League. Zwingli accompanied the troops as Swiss Army Chaplain and witnessed the victories of Pavia and Novara, but also the defeat of the Confederates at Marignano, from which his preaching against the Swiss custom of fighting as mercenaries , claiming that they were losing many lives and resources in wars that were not their own.
The current "Swiss Guard" that protects the Pope is rooted precisely in the sixteenth century, Pope Sixtus IV had made an alliance with the Swiss Confederation and built barracks in "Via Pellegrino" foreseeing the possibility of recruiting Swiss mercenaries.
In 1516 began to preach in the Abbey of Einsiedeln, who was one of the busiest pilgrimage centers and superstitions. Thus begins his preaching against these practices and against the dealer in indulgences Bernardin Samson, who had arrived in Switzerland at the request of the Pope in 1518. On January 1, 1519 began operating in Zurich, where his clear and direct speech is explaining to parishioners the gospels. The city government decided to support the new courses in 1520 and has all the preachers act along the lines of Zwingli.
This is one of the big differences between the Reformation of Luther in Germany and Zwingli in Switzerland: While Luther was persecuted by Carlos V and his government towards Rome, the Swiss had the political support of the ruling class from the start.
In 1522 Zwingli published his first reformatory work, directed against the fast of "Lent" advocated by the Church of Rome, which forbids eating meat. Zwingli writes against this Roman tradition and at the same time another letter was sent by him and ten of his companions to the Bishop of Constance, which affirmed their willingness to continue preaching the Gospel and as calling for the abolition of celibacy. Pope Adrian VI tries to convince him not to undertake further actions that violate the substance of Catholic theology.
In the prosecution of the Dominicans of Zwingli spread heresy, the Grand Council of the City convened the First Zurich Disputation on January 29, 1523 a large number of theologians. In the discussion, it would be public, should discuss the thesis defended by Zwingli. It was attended by 600 people between clergy and laity. As happened with Luther, the envoys of Rome put an emphasis on the traditions and teachings of the "church fathers" and Councils, however Zwingli defended his position with Scripture (as did Luther in his opportunity) the authorities gave the reformist victory dialectics and envoys from Rome suffered a great defeat.
Would not that, however, the only official and public dispute held in Zurich:
There was another in October 1523 where the need to remove the images from churches, decision just adopted and will be implemented in a gradual manner discussed.
Also in January 1524 the topic was the Mass and its possible abolition, which was finally established.
Zwingli That same year he married the widow Anna Meyer, with whom he lived marital way for some time. The Reformation in Zurich affected the whole society of his time: the school system, marriage, customs, etc. Zwingli's role is crucial in this process, because although organic assumes no office, his charisma and his preaching among the people will become a key figure in the process.
In 1525 Zwingli published his confession of faith (Of true and false religion). His theology, which coincides with that of Luther in many basic aspects, operates in a more radical way in others, such as the question of the Eucharist, in rejecting Zwingli's real presence of Christ in communion. From 1525, the Reformation in Zurich is completed:
• The Eucharist is administered under both kinds,
• Mass is deleted
• Images of churches are eliminated,
• The abolition of priestly celibacy is decreed,
• It establishes and regulates a charity for the poor, financed with the proceeds of the secularization of church property.
That year, 1525, a school for theologians, biblical exegesis where they can learn, later used in his sermons to the people is also based on Grossmünster.
Important for Zwingli's theology is his conception of the relationship between the secular and religious power, because while it is considered right and duty to organize the earthly Church and society, on the other hand supports the ability to overthrow the ruling group if it does not behave properly to the teachings of the Gospel way.
Relations with the German reform movement led by Luther and Melanchthon, are hindered by the conception that both parties are on communion. These differences become insurmountable clearly the most important attempt is made to combine positions, when in October 1529 the Landgrave Philip I of Hesse invites Zwingli and Luther to a theological discussion (known as the Marburg Colloquy).
Although the first Peace of Kappel in 1529, tensions between Zurich and Bern (which was won by Zwingli for movement) on one hand and the cantons remained Catholic, on the other, could not help bursting into a political conflict - and ultimately also armed, the Wars of Kappel. The choice of Zwingli was clear in this regard: use weapons to spread the Gospel truth was a duty of every good Christian. Finally the conflict erupts October 11, 1531 Zwingli fell in battle near Kappel am Albis.
Entradas populares de este blog
NEWS. Второй зверь. By Fabian Massa.
El Pacto del Ojo Derecho. By Fabian Massa.
|
global_01_local_1_shard_00001926_processed.jsonl/31726
|
What is "Pinch pleat" - Definition & Explanation
A triple pleat tacked at the bottom of the drapery header.
Some other terms
Some more terms:
Ability of a fiber or fabric to carry electrical charges. Fabrics with low conductivity build up static electric charges and can cling or produce static shocks. Cling and conductivity are also...
A lightweight or heavy open-construction fabric made byknotting ortwistingyarns together, thereby forminggeometric patterns such assquares orhexagons.Ranges in weight from very sheer to very heavy...
An inorganic fiber made from minerals and metals, blended and extruded to form fibers. The fiber is formed from a flat ribbon of metal, coated with a protective layer of plastic, which reduces...
It is a fabric woven as 5 end satin weave using worsted warp and woolen weft. The fabric is given after treatments such as milling and raising, so as to impart a soft feel and handle. It finds use as...
Companies for Pinch pleat:
If you manufacture, distribute or otherwise deal in Pinch pleat, please fill your company details below so that we can list our company for FREE!
Add a definition
• The term you want to define
• Its definition in 500 words or less
• Attach an image if necessary.
(s) 2018 TextileGlossary.com Some rights reserved. • Sitemap
|
global_01_local_1_shard_00001926_processed.jsonl/31733
|
Central PA's LGBT News Source
Where to find us
To find the nearest locations to pick up a copy, type in your zip code, select your town, or search our list.
If you want copies of Central Voice to give to your clients/customers, please send an e-mail to [email protected] or call (717) 944-4628.
Enter a zip code:
- OR -
Select a town:
- OR -
Search for a keyword:
|
global_01_local_1_shard_00001926_processed.jsonl/31743
|
Wednesday, November 2, 2016
Burn Through Your Cardio in Only 15 Minutes!
Wikimedia Commons
Start Sprinting
Use high intensity training
Do kettlebell swings
Wikimedia Commons
Most people associate the kettlebell with building muscle. But it’s also a great tool for those who don’t want to spend lots of time doing cardio. Start with holding the kettlebell with both hands and let it dangle in front of your between your legs. Then heave using your legs and lower back to swing the kettlebell up in front of you. Repeat this for 30 seconds and then rest for 30 seconds. Do this until the fifteen minutes are up. I Love kettlebells.
Do circuits
The good thing about circuit training is that it forces your body to so many different moves from different angles. You’re not just trying to lift a weight in a certain way. Instead, your body’s movement becomes the focus of the exercise.
Doing circuits with weights takes a little bit of preparation. Choose four to six different exercises. Pick things like pull ups, lunges, jumps, box jumps and so on. Then do one after another in succession without a break. This workout is a little bit like the workout that the actors did in preparation for the film 300 (Gerard Butler- eat your heart out!). It wasn’t the longest of regimens, (about 14 minutes) but it certainly was one of the most intense.
1 comment:
|
global_01_local_1_shard_00001926_processed.jsonl/31746
|
A Revenge Honey National Honey Month Review by Linnie
The Wicker Man (2006)
The only thing I love more than a horror film is a horror film that gets fucked up beyond belief and somehow becomes an unintentional comedy. The second best example of this is M. Night Shyamalan's The Happening, which is only slightly less hilarious than playwright Neil LaBute's hamfisted attempt to remake The Wicker Man with Nicolas Cage. How hilariously awful is the Wicker Man remake? So hilarious that this re-cut comedy trailer is perfection...
But yet again, I am getting ahead of myself. This week, let us walk through a version of Summerisle where Nicolas Cage runs around punching bitches in a bear suit, dolls get burned with reckless abandon, and people get really frigging worked up about bees.
The Plot: Tremendously similar and yet... offensively different from the original, LaBute's Wicker Man follows a mainland sheriff as he travels to the shockingly-ignored-by-the-American Government Pacific Northwest island of Summerisle to search for his ex-fiancé's missing daughter. Who is also his daughter. Unlike the original Summerisle, this one is inhabited by really angry women who keep the men around them to an absolute minimum and purely for procreational purposes. And yell about phallic symbols a lot: even more so than your average women's studies major. Nic starts running around looking for the kid, punching girls, and decking himself out in a bear costume that would make even the most devoted furry jealous.
To love this version of The Wicker Man is to engage in an interesting kind of masochism. Let's begin with the director: Neil LaBute. As a theatre student, I have read most, if not of all, of his plays, and while a master of sexual politics, I have become convinced that LaBute has some serious issues with women. If you have seen his other works, including In the Company of Men, Your Friends and Neighbors, and The Shape of Things, you know what I'm talking about. The Wicker Man seems like a random venue for these issues to explode like frigging Krakatoa, but explode they do. Everything that occurs on Summerisle is like some misogynist nightmare of the Feminist endgame: an island where women are in charge, teach little girls to hate men, and sacrifice "true" men to protect their livelihood. THIS version of The Wicker Man is shockingly unenlightened but at the same time... strangely hilarious. Because how could anyone be THAT clueless?
Then again, the bear looks more self-aware than Nic Cage in this scene.
Once you surrender to the ridiculously idiotic politics of the film, the only thing left is to admit that the over-acting and complete inability of LaBute to control his cast make The Wicker Man one of the best comedies in the history of film. If you are a fan of Nic Cage at a full blown, grab your precious belongings and pets and evacuate the area, Category Five like I am, then you can't get any more perfect than his performance in this movie.
You could watch this gif for an hour, and it's still less time than the actual scene went on.
And despite featuring a cast that is normally unbearably brilliant, including Ellen Burstyn, Molly Parker, and Horror Honey favorite Frances Conroy (BALENCIAGA!), there is no rhyme or reason to the behavior of the women in the movie. Some small part of me wants to believe that they were intentionally tanking the film because they all knew what a piece of sexist garbage it was.
Except her. She just wandered on set.
So how do you rate a film that makes you laugh every time you watch it based on sheer awkwardness alone? The only way you can... With black humor.
Revenge Honey Rating - 3 Acts of Violence Against Women out of 5
And of course, on our Nicolas Cage Performance Spectrum, The Wicker Man is a solid, terrifying, and unequivocal Category Five.
|
global_01_local_1_shard_00001926_processed.jsonl/31747
|
Fall has arrived,
has already removed his shoes
and stretched out with ease
all spread over our green sofa,
his snores sending billows of frost
into this his old familiar dwelling
where we find him once again
for his favorite quarter,
and yet still I find my path bending
toward the brambles and my spirit
nursing a faint spark of hope
that I will discover today
the sinister eyes of the
wild black raspberry bush
staring me square in the face
begging, pleading, desperate,
eat us now, eat us all, and
you are very welcome.
|
global_01_local_1_shard_00001926_processed.jsonl/31756
|
There was a time when Netflix seemed like the ultimate solution to all our TV and film watching issues. Unfortunately, long buffering times, low-quality streaming or inaccessible content does not help in reaching the entertainment bliss you have always dreamt of. But don’t worry: here are a few Netflix tips and tricks that will keep you glued to your TV forever.
How to make the best choice every single time
Do you spend most of your watching time scrolling over the various films and TV shows on offer? Try this trick: Use the Enhancement Suite, which is a Chrome plugin for Netflix.
Set up the suite to add Rotten Tomatoes ratings to your Netflix listing in addition to the other features like IMDb facts, official trailers, etc. If you want to watch the movies with the highest ratings, this is the best way to do it.
Use Reddit to improve your Netflix experience
Don’t trust Rotten Tomatoes ratings? No worries, there is another way – use Reddit. The subpage in Reddit’s home page features all the best that Netflix can offer. You can even manage to find awesome shows and movies that you are sure to miss otherwise. Over 300,000 Reddit users vote for the content so you can easily narrow down your choices and watch the show you like – finally!
Watch and chat simultaneously with your friends
Although watching your favorite show on Netflix is a wonderful thing, even better is discussing it with friends. Rabbit can show you the way. This is a group chat app that lets you watch content and share the experience with your friends simultaneously and in real time.
Use a VPN service
If you are in a region where Netflix is not accessible, using a VPN service can help you unblock the geo-restriction. For instance, if you want to watch the US Netflix content in London, a VPN service will do the trick. With a good VPN service, you can even watch Netflix in China, where it is completely banned. However, since Netflix policy forbids this, you have to consider the pros and cons before you take the plunge.
Download and watch offline
Lack of proper internet connectivity used to be a big bane on Netflix viewers. Streaming obstacles and buffering prevented many from enjoying the Netflix experience to the full. But this is not a problem anymore. Netflix offers the facility to download the TV shows and movies you want on to your mobile and watch them anywhere and anytime. Make sure you use the download app for mobile to enjoy this feature.
No more buffering
To end the buffering issue and relish in your binge-watching, you should make sure the internet and your settings are optimized properly. If you use a computer, there are some shortcuts that can get rid of the buffering. Open up the hidden menu that has streaming options and buffering solutions by pressing Alt+S or Ctrl+Shift+Opt. For PS3, Xbox 360 and Wii use directional pad click up twice, down twice, left, right, left and up four times to get to the menu. For other streaming devices, like Apple TV, you can use the Playback settings feature and select the low or auto feature for better streaming even when the connection is not good.
Hope the tips and tricks above will help you get the best out of Netflix. These hacks are sure to enhance your experience dramatically.
One Response
1. Jay
I am currently using Netflix but I have been seeing ads for Neptune Tv. Has anyone heard of this? It’s a live tv streaming app.
Leave a Reply
Your email address will not be published.
|
global_01_local_1_shard_00001926_processed.jsonl/31757
|
Friday, March 24, 2006
Get rid of bad and mediocre researchers
I am sorry for the emotional title. I have come to the following two conclusions:
1) Bad or mediocre researchers are much worse than not having them at all. Often, any extra help even if not-very-skilled is welcomed. For example, in charities everyone can contribute towards the success of a charity, and tasks are often allocated by ability. And if not, this happens the next time around when new tasks are assigned and people have complained. But in research, you need two good scientists to undo the work of one bad or mediocre researcher. Not only do they not contribute towards advancing our knowledge, in fact they actually destroy knowledge. By producing one flawed article after the other, the research field is flooded with much useless, distorting and misleading information. I read so many studies on PDS, and I often find it hard to judge whether I can trust the results or not... This takes a lot of time, and is often inconclusive as I was not present at the experiment. Finally, bad or mediocre researchers often go or are pushed into managerial roles (often aided by superior political skills and self confidence as opposed to the good but nerdy scientist), which makes the situation even worse. Now, they have power and money to conduct bad research, and flooding the field and conferences with confusing ideas...
2) Often I read articles written by people who are clearly intelligent but completely miss the point as they lack the necessary insight. It is often not their fault. It is just that their education had not exposed them to the right experiences to be a good scientist, they lack mathematical understanding or good people from whom they can learn by discussing their ideas. They are like the victorious warrior, and then you have point out to them: Yes, congratulations, you have conquered the fortress, but it is the wrong one. They are not our enemies but stayed neutral. So we wasted 3 weeks of our time, 100 soldiers, but gained their eternal hatred. This is especially true for some therapists who turned researchers. They are clearly intelligent, but mixed with the wrong people and education (for being good researchers that is and not for being a good therapist).
OK. That's enough science jingoism from me. :-)
Einar said...
Wow... Which "solution" would you suggest for these kind of scientists then, exile or death penalty... ;-)) I guess there'd be very few scientists left then... ;-))
Carl Joakim Gagnon said...
I've checked your blog a few times in the last months. I'm interested in many of the same questions you are, and think understanding how the brain works is going to be the biggest thing since agriculture, and not only for stutterers. I'd like a post on how you see the general relation between neuroscience and that oldest guide to how the mind works, introspection. Surely the only way to even design and understand experiments is coming at them from both angles? Anyway, a post on that would be interesting.
All best,
Michael said...
Tom, I agree on your opinion about bad or mediocre researchers, but how many reaseachers think that they did something good and in fact it was just an attempt which is honestly speaking rubbish - but upto that time it was right for them. I have made this experience with myself - so I the results were clear and could be proved , but the original data was not really suitable for the whole case study - which I came to know only two years later (after several talks, papers etc. - fortunately no-one died, I am just a cartographer :)) ... so it is not that easy ... Sure, there are scientists who cheat on purpose but that is not the majority I believe (I might be wrong in that but anyway ...) ...
introspection is the best way of understanding stuttering since we are all different from each other - what may be right for you might be like that for Tom, Einar or me. Modern Science and also Neuroscience is only a method to get things approved which you might already know deep inside - so don't wait for them, it may take you interesting years of your life :)
Michael (
|
global_01_local_1_shard_00001926_processed.jsonl/31768
|
A Song of Gratitude to the Freelancing Life
We biked to where Kilauea is spitting hot lava into the sea—Hawaii is reborn!
Well, my typing sounds better than my singing, so let’s go with this: This past Saturday, I returned from a month in Hawaii, having spent most of the time on Oahu and some on the Big Island. I don’t sleep on golden pillows, so how could Alice and I take off for (and more tellingly, pay for) a month on a tropical island? (And yes, there were mai tais.)
For the same reason we previously stayed for long periods in the Bahamas, Panama, Mexico and Hawaii once before: freelancing.
The freelancing life can often be a scramble, particularly if you do a fruit salad of contract work like I do. I do B2B and B2C copywriting, edit books (both fiction and non), write essays and journalistic pieces, and travel articles too. I’ve never been able to narrow my work to a niche—something that’s undoubtedly affected my income—because my interests are broad. My writing palette has too many colors, and I find that pleasing. More pleasing yet is that, with the glories of the Internet, my office travels with me. As does Alice’s with her.
Thus, when we read of a house-sitting opportunity on some golden isle, and the setting and the situation fits, we go for it. Most of the time we still work close to our regular schedules, using that Franklinesque early to bed, early to rise admonition. But we get to rise in places like Hawaii! And there’s plenty of time to play, in such places where the play is often plentiful.
Sometimes the Freelancing Life Offers No Gravy At All
But I don’t want to downplay the occasional downers of being a contract worker. You do have to deal with social isolation—if you have a water cooler, you’re usually the only person to lurk around it. Some freelancers I know like to go to coffee shops or other public places to work, but that’s never appealed to me. I like the silence, which gives me plenty of head space in which to fret. And I can always go from my Airstream office in the yard to pester Alice in the house when I need some companionship.
You also have to be comfortable with marketing yourself, and with rejection. I send out a lot of article pitches, and often don’t get a response. A long while back I used to steam about that, but really, what’s the point? I just send more pitches. I still don’t hear back from many, but I’d guess I’ve had at least 40 and maybe 50 paid articles published this year. Here’s one that was in the latest Writer’s Market on one of the themes of this piece, Writing From the Road.
You also have to be comfortable with fluctuating income. As I said, no golden pillows, but I do have socks. I’m not breaking any banks (or breaking into banks), but I’ve been doing this, with a short corporate-writing break, for 25 years, and I’m still here.
But Sometimes the Gravy Is Very Good
I first sketched out above some real benefits of a freelancing life, but here are a few more:
Control: for the most part, you get to choose for whom you work, and what you work on. Sure, freelancers sometimes take on projects that are dull or tedious, but you really do have the choice to say no. And to say yes!
Choice: speaking of choices, they are vast in the freelancing realm. You can work for large businesses and small, you can sell products from your website or a place like Etsy, you can work at 3am if you are a night creature, you can use your expertise to design an online course, you can write books in your downtime, you can take online courses to spruce up your old skills or learn new ones. Choice and control are kissing cousins, but having lots of each is positively positive.
Exercise: one of the choices I make is to exercise every work day. Might be a hike, might be a bike, might be a stroll on one of the many picturesque slough trails in our area. Or if the weather is lousy, a ride on the recumbent bike inside. Many people think that exercise is a tedious chore, but for me, so much the opposite: you get to move the legs, move the blood, see some sights, change your perspective. And maybe eat a larger lunch because you did all those things. I always look forward to the mid-day exercise break, and it’s something that most office workers don’t get a chance to easily do.
Naps: what’s better than a short nap after exercise and lunch? And better yet, on the orange plaid of our ’66 Airstream? I rarely actually go to sleep, but the 20–25 minutes of hazy glow make for a more focused afternoon.
So, freelancing: there might be a pimple or two, and some days the clouds race in, but most of the time, the face and the weather are fine.
Vin Scully and the Voice in Your Head
I must mention a delightful coincidence that came from the Hawaii trip: I got to hear Vin Scully, the legendary voice of the Dodgers, announce his last six games. In the 60s, growing up in Southern California, I was a baseball maniac. It’s not that I simply played baseball a lot (in the streets at home, in Little League, in public parks), but I read bunches of baseball biographies, memorized statistics—even the heights and weights of players. My brother and I would spend hours pitching a tennis ball to each other in our driveway against the back gate. (We used a tennis ball because I’d broken so many neighborhood windows with hardballs.)
I loved baseball, and more so because I heard a voice in my head while I played, declaring my glory on the field. The voice I heard was Vin Scully, the announcer for the Dodgers for SIXTY-SEVEN YEARS. Sixty-seven. Because I’d grown up with Vin, I thought all baseball announcers were like him: sunny, smooth, always ready with a story that no one had ever heard or told before. A great, boundless lover of the game, but never a “homer” for the Dodgers. It’s almost impossible to express what warmth and human connection came through the radio from this modest guy—he was baseball’s easy-spoken orator, an open-hearted genius behind the mic.
There’s a quote from the writer William Dean Howells about Mark Twain that says, “Emerson, Longfellow, Lowell, Holmes—I knew them all and all the rest of our sages, poets, seers, critics, humorists; they were like one another, and like other literary men; but Clemens was sole, incomparable, the Lincoln of our literature.” Vin Scully was the Lincoln of baseball announcing. It was a profound pleasure that I happened to be in Hawaii to listen to the last of his games, when since moving from Southern California forty years ago, I’d hardly heard him at all.
Vin, you lazy guy, you’re only 88, why not go a few more?
That was a gift from the freelancing life as well—Vinnie, wishing us all a pleasant evening, wherever we are, forever.
[Note: the gracious folks at Invoice2Go, who make simple-to-use invoicing applications for freelancers and the like, are going to excerpt some of this post on their site for a helpful infographic on freelancing tips. Check out their stuff if you have invoicing needs.]
Leave a Reply
|
global_01_local_1_shard_00001926_processed.jsonl/31782
|
The Ellen DeGeneres Show
Season 9 Episode 144
Jesse Tyler Ferguson/Rita Wilson
Aired Weekdays Apr 24, 2012 on NBC
out of 10
User Rating
0 votes
By Users
Write A Review
Episode Summary
Jesse Tyler Ferguson/Rita Wilson
Jesse Tyler Ferguson of Modern Family. He always has a new funny story, so check out what he's got this time. Plus, Rita Wilson debuts her new CD "AM/FM" and talks about what it's like to be married to Mr. Tom Hanks (for 24 years).
Episode Discussion
Join the discussion of this episode Episode Discussion
Trivia, Notes, Quotes and Allusions
See All Trivia, Notes, Quotes and Allusions Trivia & Quotes
Season 9 Episodes
See All
Ep 170
Vanessa Williams/Sarah ...
Ep 169
Vince Vaughn/Bethenny F...
Ep 168
Ellie Kemper/Rufus Wain...
Ep 167
Matt LeBlanc/Olivia Munn
Ep 166
Charlize Theron
Ep 165
Justin Bieber/Will Smith
Ep 164
Katy Perry/Alanis Moris...
Ep 163
Howie Mandel/Cat Deeley
Ep 162
Ellen's 1500th Show (Su...
Ep 161
Russell Brand
Ep 160
Steve Carell/Brooklyn D...
Ep 159
Jennifer Lopez/Cameron ...
Ep 158
Kate Beckinsale/Taylor ...
Ep 157
Hilary Duff/Nick Cannon...
Ep 156
Nicki Minaj
Ep 155
Carrie Underwood/Anna K...
Ep 154
Johnny Depp/Michelle Pf...
Ep 153
Eva Mendes/Beth Stern
Ep 152
Scarlett Johansson/Robe...
Ep 151
Bill Clinton
Ep 150
Julianna Margulies/Kevi...
Ep 149
Jessica Alba/Scott Caan...
Ep 148
Diane Keaton/Donald Dri...
Ep 147
Hugh Grant
Ep 146
Sophia Grace and Rosie/...
Ep 145
Jack Black/Cobie Smulders
|
global_01_local_1_shard_00001926_processed.jsonl/31784
|
Christianity in the Debate of Women's Rights in the Early Nineteenth Century by Tyler Wood
After women got involved in politics by petitioning Indian removal they realized they could, and should, get involved in politics. The ‘separate spheres’ of sexes idea was in place at the time, which meant women should stay out of the public life. The next movement saw a more active role for women, like Angelina and Sarah Grimke, speaking out against slavery. In the process of this movement they realized their rights to speak were under attack and began fighting for equal rights for women based on their interpretation of scripture. Christianity takes center stage in the debate, existing as the field of battle amongst the three sides; pro-women’s rights/ pro-abolition, pro-abolition / anti-women’s rights (at least until slavery is taken care of), and anti-both. This paper will discuss the role of Christianity in the debate of women’s rights - pro, con, and in between - and how it plays into the relation between the abolitionist movement, the Grimke sisters, and the women’s movement.
Read More
Christianity in the Debate of Indian Removal by Tyler Wood
There were a lot of ideologies present in the debate upon Cherokee removal in the early 19th century in America. The main focus of power rests in the hands of nations in this debate but the role of religion is extremely significant. The stance Christianity takes is an impetus for action; originally, by the Americans that becomes a justification for the Cherokees. Late in the removal debate, before the act itself, Christianity becomes less important and policy and legality become the shining stars for the Americans to act upon. I will discuss the influence of Christianity on the debate of Indian Removal, from the Civilization program to the defense and support of Andrew Jackson and Indian removal as an Act in 1830, as well as, the decline in Christian ideas in support of removal.
Read More
|
global_01_local_1_shard_00001926_processed.jsonl/31786
|
Mann & Frau & Animal AKA Man & Woman & Animal (1973)
The earlier films of Valie Export, one feels, were motivated by the author's desire and need to investigate her own subjectivity, with the audience as a necessary part of the transference and the polemic. Man & Woman & Animal shows a woman finding pleasure in herself, the whole film is a kind of assertion and affirmation of female sexuality and its independence from male values and pleasures...
|
global_01_local_1_shard_00001926_processed.jsonl/31818
|
Duplicate Symbols For Architecture I386 Clang Error
I keep getting a msg have you re-installed boot-up issues that I can't seem to resolve. You will be able to access the data that signs of a don?t disappear ? Has my comp dozens symbols (Master Boot Record) code 28 can you help.
To be honest I'm clang for any help may be corrupted. Can anybody help me as good few the W7 HDD. Cheers. Boot from i386 'disable automatic restart architecture x86_64 OK, my subject line might sound cryptic! error Try upgrading the firmware and hope hi I accidently dropped my monitor turn it back on? Fourth; make sure that your exit i386 In XP autoplay for CD and not checked "to Mute". Thanks in advanced (same brand) as a gateway the drive needed replacing. I tried 3 have a burning program card etc? GPU questions: Video driver 12279622 architecture external volume control, (if you have for you referring to a "driver disk"?
Help is appriciated. Update XP will this be choose the repair option-startup problems. No overclocking... always had an Does anyone know what could be causing this. You need to 2 GB device manager error icons architecture Arrayout predicted TEC date. Also there's a symbols the Windows 7 CD, then 0f00:286eClick to expand... The system has error if I disconnect i386 uninstall the drives and restart but nothing.
The drag and called KIlldisk that wrote 0?s to plugged into the correct jack)? Could these be : for as it heats symbols or assistance as always! The MBR error is detected 5 months of Multiple BSODs on duplicate symbols for architecture armv7 XP drive or OS. XP will to their power source (or This can be done using another computer. Are any of these helpful? ios don't have a cd, are clang installed, something like Nero? Check the Speak undefined symbols get the 8'' screen because issues here....
But generally write down the STOP Code for us the same issues. Architecture Almost as clang a problem with found errors and is repairing them.
architecture x86_64
And if so for png now has vertical Error connected to my main. Apparently they used a program symbols well, start over, keeping notes as you go. linker command duplicate small but then it goes bigger. Does this indicate for it says that it has http://www.wiinewsdaily.com/deb-error-wrong-architecture using a 500w power supply.
Michael architecture well it?s awesome screen that looks darker. If so, disconnect it to see if is not a brand new computer - driver or hardware error? When you first turn on Duplicate Symbols For Architecture X86_64 clang I would have to but am just curious. I too have an older for been giving me xcode one) is not set too low.
Toggle it, and see if the USB device clang apple mach the computer will start ran diagnostics came do they have fresh batteries)? They formatted it to SP3 i have tried to my hard drive? Also I've duplicate said: ↑ for 2 duplicate symbols for architecture x86_64 ionic replace the lcd module itself? The wires usually get symbols without any warning I have some Duplicate off or on. I have all 3 position on my mobo, lines across the screen. Also,go into your BIOS set up error I post duplicate symbols for architecture x86_64 ionic working in windows.
If there in FAT32 then the mother board's problem. If your not familiar, you will need i386 armv7 Gateway (4525gz). I am device manager error symbols minidumps and info? I have transcend 4gb pendrive your sound card (and is not refreshing. Kelvin autoplay is turned up it's brighter. Is it likely that Start -> My architecture potientially dangerous? Lastly, When you say you duplicate architecture arm64 are not set to zero, clang my hard drive? If you are familiar with error shot cable in the power interest in electronics. I have a second router different power supplies and up with 2 error codes: 0f00:286e, 0f00:136c.
Are they plugged in The "missing" drive of the BSODs . So I suspect Multimedia Audio Controller not loaded clang a new PC. When ever I run chkdsk getting a new one pals my usb drive is not working. Are they attached to duplicate repairing laptops, this is a clang Computer and RIght Click.
Im most likely going to Duplicate Symbols For Architecture X86_64 React Native for sfitness if the screen no power at all. I have Duplicate Symbols For Architecture X86_64 Xcode 9 the sound and W7 is SATA 1. Now I've decided symbols of your computer? Any1 have any clue hell from the start. Make sure that your sliders that works http://www.bioticaindia.com/sigmatel-stac9721-23.html What I change the transfer rate of the drive to 1.5 gb/s? Some how symbols developer xcode to why this is hapening and ubuntu and windowsxp.
When it runs repairing this could be bad... It's a : i386 way Is there any way that I could clang stack mouse is lit on. How should both os to whats going on, its just like ..missing. Cheers. What is the make and model it could be loaded the op system. First Go to and enable the onboard sound. hai whilest carrying it down very steep stairs. Also is clang is rotating and the for years old.
Last time I saw drop mouse marks drives may affect USB device detection...
Does this indicate duplicate just to build i386 a couple with variegated symptoms. See if 2 Duplicate Symbols For Architecture Arm64 Ionic to take it in for repair for faulty graphics card? duplicate The hard drive may have just failed, i386 dpkg error processing libc6-dev pinched by the top architecture the sound driver? I plugged the power the monitor this area is the HDD before they formatted it? PassMark DiskCheckup keeps clang 2014 has supposedly caused some symbols my budget is very low.
XP is on the SATA symbols cannot 'see' the and it really performs. See how it does, then if it works boot normally fairly easy thing to repair. Sometimes the BIOS my datas backup and cover hinges over time. These problems disappear error of problems or just architecture how to recover from this problem. The CPU fan clang duplicate symbols for architecture arm64 react native this code, it meant for I cant use them. After that it a problem with would like for you to do is this... My pendrive part of the on system failure'.
It's a laptop, changing its mind a possibly complicated fix? Your computer will reboot, next time it crashes are no and without problem. Please help. onefreeeagle Volume Button for supply and sparks blew everywhere.
Select the option how can I of RAM.
|
global_01_local_1_shard_00001926_processed.jsonl/31819
|
posted by organizer: madimi2017 || 1031 views || tracked by 2 users: [display]
Helors 2017 : 6th International Symposium & 28th National Conference on Operational Research -- OR in the digital era - ICT challenges
When Jun 8, 2017 - Jun 10, 2017
Where University of Macedonia, Thessaloniki,Gr
Submission Deadline Mar 31, 2017
Notification Due Apr 24, 2017
Categories operational research
Call For Papers
The 6th International Symposium & 28th National Conference on Operational Research will be held at the University of Macedonia, Thessaloniki, Greece, June 8-10, 2017.
The conference will be co-organized by the Department of Applied Informatics of the University of Macedonia and the Hellenic Operational Research Society (HELORS).
The purpose of the Conference is to disseminate recent scientific advances in the field of Operational Research and Management Science in Greece and to promote international co-operation among researchers and practitioners working in the field. The specific aim of this year’s Conference is to highlight the role and importance of OR in the digital era and the underlying ICT challenges (“OR in the Digital Era – ICT Challenges”).
Conference Topics
We invite all researchers, academicians, practitioners, as well as students interested in all branches of operational research, mathematical modeling and decision making to participate in the conference and present their current research in the following indicative areas:
• Agent-based Modeling
• Banking and Financial Decision Making
• Big Data and Business Analytics
• Bioinformatics
• Combinatorial Optimization and Integer Programming
• Data Envelopment Analysis and Performance Benchmarking
• Data Mining
• Decision Support Systems
• e-Commerce
• e-Government
• Digital Economics
• Energy Management
• Energy Policy and Planning
• Fuzzy Systems
• Game Theory
• Governance and Policy Modeling
• Group Decision Making and GDSS
• Heuristics, Metaheuristics, and Nature Inspired Optimization Algorithms
• ICT Applications
• Linear and Nonlinear Programming
• Locational Analysis
• Logistics and Supply Chain Management
• Marketing Management
• Mathematical Modeling and Decision Making
• Mathematical Programming
• Military Operational Research
• Multiple Criteria Decision Analysis and Multi-Objective Optimization
• Network Design and Optimization
• O.R. Applications in Agriculture and Forest Management
• Optimal Control
• Optimization Theory and Applications
• Parallel Processing and Grid Computing
• Production and Operations Management
• Project Management
• Queuing Theory
• Resource Scheduling
• Risk Analysis and Management
• Security
• Simulation
• Stochastic Programming
• Strategy and Innovation Management
• Structural Optimization
• System Dynamics
• Telecommunications and Telematics
• Transportation Analysis and Decision Making
• Vehicle Routing and Scheduling
• Waste Management
• Water Management
Book of Abstracts
The abstracts submitted and approved for presentation will be included in the book of abstracts that will be distributed at the beginning of the Conference.
Publication in Special Issues
International Journal of Decision Support Systems, Inderscience.
International Journal of Sustainable Agricultural Management and Informatics, Inderscience.
More journals to be announced.
All papers (in extended form - after revision), will be refereed according to the standards of the respective journal.
Invited Speakers
Panos M. Pardalos, University of Florida
Georgios Doukidis, Athens University of Economics and Business
Chairs of the Conference
Maro Vlachopoulou, University of Macedonia
Glykeria Kalfakakou, Aristotle University of Thessaloniki
Basil Manos, Aristotle University of Thessaloniki
Organizing Committee
E. Stiakakis, University of Macedonia (Chair of the organizing committee)
F. Kitsios, University of Macedonia
M. Madas, University of Macedonia
K. Petridis, University of Macedonia
N. Petridis, Aristotle University of Thessaloniki
A. Sifaleras, University of Macedonia
K. Vergidis, University of Macedonia
Ch. Ziakis, University of Macedonia
Final Important Dates
Deadline for abstract submission: 31 March, 2017
Notification of acceptance: 24 April, 2017
Deadline for early registration: 20 May, 2017
Conference dates: 8 to 10 June, 2017
Submissions should be uploaded to the EasyChair Conference system:
Social Media
Related Resources
SOR'19 The 15th International Symposium on Operations Research in Slovenia
AAAI 2019 National Conference on Artificial Intelligence
ICRLSH 2019 2019 – 6th International Conference on Research in Life-Sciences & Healthcare (ICRLSH), 07-08 June, Prague
ICSTR 2019 ICSTR Rome – International Conference on Science & Technology Research, 03-04 May 2019
ICRLSH 2019 2019 – 5th International Conference on Research in Life-Sciences & Healthcare (ICRLSH), 04-05 May, Rome
|
global_01_local_1_shard_00001926_processed.jsonl/31841
|
August 30, 2005
Mixed messages
Posted by Francis at 10:48 PM
That is most strange. Stranger is that only the encyclopedia seems to be remiss; the dictionaries and thesauri and fable dictionaries (?. !.) that are on all give fine explanations of "palindrome" independent of "anagram." Maybe as of 2001 palindrome stopped enjoying independent status.
I generally trust Wikipedia with such inquiries, which is like totally weird, since Wikipedia is fly-by-night-user-created-and-vetted-which-means-you-really-have-no-idea-what-you're-getting, rather than written by real encyclopedia people. But hey, here's one example where it'd have given you a better answer, at least.
Posted by: polyglot conspiracy at August 30, 2005 11:37 PM
This may be a totally stupid question, but have you heard (seen the video) for the Weird Al song "Bob" (a sendup of Dylan and pailendromes all at once)?
I laughed till I almost peed and my family could not for the life of them understand what I thought was so funny, even after I explained it.
It is hard to live with an odd sense of what is funny.
Posted by: Scarff aka Rick at August 31, 2005 01:43 AM
That song is one of the most brilliant things Weird Al has ever done.
I am also inordinately fond of "It's All About the Pentiums".
Posted by: Francis at August 31, 2005 01:54 AM
But...but...but where's the anagram in "Able was I..."? The "ere" is in there just once. Doofuses.
Posted by: Orange at August 31, 2005 09:49 AM
Hm. Good point, Orange. I think the whole thing is supposed to be an anagram of itself? This whole thing confuses me.
Other songs about palindromes: "I, Palindrome, I" by TMBG and "Fake Palindromes" by Andrew Bird.
Posted by: polyglot conspiracy at August 31, 2005 11:09 AM
Ah, yes, TMBG. "I palindrome I. Man, o nam." Could there be any more sensible lyrics?
Posted by: Orange at August 31, 2005 06:16 PM
Don't forget Ookla the Mok's "Rats Live on No Evil Star."
Posted by: Fafner at September 1, 2005 10:45 PM
|
global_01_local_1_shard_00001926_processed.jsonl/31852
|
Search the lexicon
strong verb
MORPHOLOGY: a term which is used for the class of verbs where inflection is expressed by stem allomorphy or ablaut, that is, by a change of the stem vowel, a change of the stem consonants, or both. EXAMPLE: English: sing:sang:sung, dwell:dwelt:dwelt, and bring:brought:brought, Dutch: loop:liep:gelopen, zit:zat:gezeten.
|
global_01_local_1_shard_00001926_processed.jsonl/31858
|
Some publications by Paolo Tonella
Articles in journal or book chapters
Conference articles
1. Paolo Tonella and Alessandra Potrich. Reverse Engineering of the UML Class Diagram from C++ Code in Presence of Weakly Typed Containers. In Gerardo Canfora and Anneliese Amschler Andrews--Von Maryhauser, editors, Proceedings of the 9st International Conference on Software Maintenance, pages 376--385, November 2001. IEEE Computer Society Press. [WWW ]
2. Paolo Tonella and Guilio Antoniol. Object Oriented Design Pattern Inference. In Proceedings of ICSM '99 (International Conference on Software Maintenance), pages 230-238, August 1999. IEEE Computer Society Press.
This document was translated from BibTEX by bibtex2html
|
global_01_local_1_shard_00001926_processed.jsonl/31864
|
An important aspect of content marketing is the use of media. Social advertising, native advertising or influencer advertising, for instance. Paid media is necessary, because even though you create the funniest or best content; if you don’t reach your audience, all your effort goes to waste.
Online content distribution is normally divided into three categories: social advertising, native advertising or influencer marketing. We happily explain what we mean with these three.
Social advertising
We speak of social advertising when content on one’s own channel is published and broadcasted, and subsequently supported with advertising. The main goal here is to create reach, and also strengthening all earned media.
The benefit of social advertising is that content is seen by those who don’t necessarily follow your brand, but are reached by extensive targeting options. Platforms to use social advertising are Facebook, Instagram, YouTube and Twitter.
Native advertising
Aside from social advertising, we also mention native advertising a lot. In this, you work with an established platform (such as a blog) that already communicates with your target audience. This medium creates an article with your preferred message, but in it’s own tone of voice.
The advantage of native advertising is the credibility. Also, you get an extra large amount of reach outside of your own social channels.
Influencer advertising
Besides channels, we also use persona’s to create reach. We call them influencers. These are literally influential people with reach and influence within a target audience. Often they are though leader within one specific subject, but sometimes they also create more wide-ranging content. Influencers often collaborate with brands and produce content that fits their own style.
Developing a media strategy
A media strategy is not something you think of afterwards; ideally you create a good strategy during the concerting phase. Choosing channels or platforms often reflects creative choices. In other words: a video created for Facebook is way different than a pre-roll produced for YouTube.
At Yune we take care of the distribution of most content ourselves. For this we have a very dedicated media department that – in our opinion – leads to the best results. Mainly because creation and distribution are intertwined. Our media guys can act quickly and interact with the creation department when needed. This way we can create content that is actually ready for use and that suits the wishes of the target audience.
Secondly, we can keep the velocity of content in mind. This is often very short and therefore it’s preferable that content is planned and optimized without an external media agency. This also cuts costs: no extra media club means less overhead.
Want to learn more about content distribution and Yune? Then contact us and our media specialist will inform you about all the ins and outs!
|
global_01_local_1_shard_00001926_processed.jsonl/31866
|
A study of the two ancient faiths taoism and hinduism
The claim about branches in Korea, and 30 in North America and Europe. Simply put, these two figures are from different sources and are based on different methodologies and critera. The government regulates its activities through the Chinese Taoist Association.
Ram Swarupfor example, points to the Vedas as being specifically polytheistic, [33] and states that, "only some form of polytheism alone can do justice to this variety and richness. Rarely are statistical surveys of religious affiliation done with large enough sample sizes to accurately count the adherents of small minority religious groups.
They merely classify Hindus as all people who call themselves Hindu, Muslims as all people who call themselves Muslim, Christians as all people who call themselves Christian. A critical component of the spiritist influence upon the Yoruba traditions as practiced in the Western hemisphere is the pervasive influence of the BaKongo tradition, known as Palo Monte and Umbanda.
African Diasporic Religions are those which have arisen, typically in the Western hemisphere, among Africans who retained much of their traditional culture and beliefs but adapted to new environments. Groups which self-identify as part of Christianity include but are not limited to: From a worldwide and historical perspective, Vodoun is properly classified as a branch of African diasporic religion, in the same way that Lutheranism is a subset of Christianity.
A reasonable worldwide number that some newspapers have used is 10 million, but this is only a guess. These are usually polytheistic, but many Neo-Pagans consider their faith pantheistic, and many other concepts of deity can be found among Neo-Pagans as well.
The Axis Mundi: Sacred Sites Where Heaven Meets Earth
Some people have mistakenly concluded that this means the overwhelming majority of Scientologists live outside the U. Sered used this term in a way that would encompass polytheism, rather than exclude much of it, as she intended to capture both polytheistic systems and nontheistic systems that assert the influence of "spirits or ancestors.
Every human is in certain respects a.
Some sources give numbers in the range of 2. This is a collection of laws attributed to Manu. Estimates based on indirect data: Does the larger religion consider the faith group to be part of its tradition?
Hindus venerate deities in the form of the murtior idol. In any case, the primary criterion for the rankings on this page is self-identification, which has nothing to do with practice.
There are an estimated 9 to 12 million Roma Gypsies; also "Rroma" in the world, concentrated in Europe, but also in North America, Australia and elsewhere. The situation is similar with Confucianism.Sacred Texts of Hinduism; complete translation of the Rig-Veda, transcribed Sanskrit Rig-Veda, Max Mullers' translation of the Upanishads, the Bhaghavad Gita, and other Hinduism.
Guides to world religions and beliefs. Includes Atheism, Christianity, Islam, Paganism, Jainism, Zoroastrian and many more. This lesson will seek to explain the four permissible goals of Hindu life. In doing so, it will define the ancient concepts of kama, artha, dharma.
English speakers continue to debate the preferred romanization of the words "Daoism" and "Taoism". The root Chinese word 道 "way, path" was romanized tao in the 19th century Wade–Giles system and dào in the 20th century's Pinyin system.
Both Wade–Giles tao and Pinyin dao are intended to be articulated identically (d as in dog). This is a listing of the major religions of the world, ranked by number of adherents.
Peach Festival of the Queen Mother of the West, a Chinese Ming Dynasty painting from the early 17th century. (PericlesofAthens/ CC BY SA ) This is a mythological event traditionally occurring on the axis mundi - Kunlun Mountain.
As another example, in Hinduism, Mount Meru in India, and Mount Kailash in Tibet are both regarded as the .
A study of the two ancient faiths taoism and hinduism
Rated 0/5 based on 58 review
|
global_01_local_1_shard_00001926_processed.jsonl/31867
|
5. Co Creation
So now we have a more Fanoesque diagram again, all nodes connecting to the User, and all Nodes with 3 connections, ensuring that any one node is only 2 relationships away.
The light colour inner circle could have been drawn with straight lines between the Seconday Nodes and whould have given the same structure. But with the curves the reader can see a zone that is closer to the user and sectors that sit next to industry.
The next task was to start labeling the relationships across the whole diagram. The question was with what purpose. What is this supposed to show. Well, as its user centric, supported by Industry controlled sectors, the relationships must refer to the consumer/prosumer activities.
With this in mind, it seems sensible to see the sections next to the Primary nodes as Parent ing Zones, areas of development and nurtured by industry for the user, whilst the sectors around the user would be the adoption zone, areas of devleopment the user was using.
This game me enough context to think about what the relationship labels between all Nodes should be.
Industry relationships
|
global_01_local_1_shard_00001926_processed.jsonl/31870
|
Now We Do It For Real, 2011
Collaboration with Hans Bryssinck
Performance / duration: 55 minutes
Now We Do It For Real is an ongoing collaborative project that is to be presented as a succession of episodes – twelve in total. The format remains the same for each episode, yet the content varies for every occasion. For each episode we construct a performance following basic conversation dynamics. We converse not so much in words and sentences, instead we present things to each other – images, videos, live acts, drawings a.o. The choice of materials reveals our respective thinking processes. Within this interchange, we make associations and connections, which produce unusual constellations.
|
global_01_local_1_shard_00001926_processed.jsonl/31889
|
Endurance Training: What It’s All About & 15-Minute Workout
Chances are, you’ve heard of endurance running or endurance cycling, but what does endurance training actually mean? Simply put, endurance is the ability to exert a high level of physical effort for an extended period of time. A good example would be a marathon – it’s a test of endurance as opposed to a short sprint.
Researchers classify sports like running and cycling as cardiovascular endurance, but there’s also an additional classification: muscular endurance. This form of endurance takes into account the number of repetitions you complete of one exercise without needing to rest and would include strength training exercises like pushups or weight lifting.
Want to learn more? Let’s dig right into the two types of endurance and see if we can make more sense of it.
Alba running outdoors
The two types of endurance training
Cardiovascular endurance
When we talk about cardiovascular endurance, we’re talking about the ability of our heart, lungs and blood vessels to provide our muscles with oxygen for a sustained period. How long, you might ask? The time varies, but endurance running, for example, is considered any continuous run that’s 30 minutes long minimum.
Your cardiovascular system is endurant when your heart beats at a slower rate, even while performing strenuous physical activities. In situations where a person who is physically inactive or even moderately active might get out of breath, a person who regularly practices endurance training would find it less difficult breathing and recovering afterward.
Cardiovascular endurance includes long periods of:
• Cycling
• Running
• Dancing
• Team sports
• Brisk walking
• Hiking/climbing
If you want to improve your cardiovascular endurance, try slowing down on your next run or bike ride and adding a few more minutes to your total workout time. As you get used to running the new time, you can start to run that time faster, or continue to add more minutes to your endurance training session.
Ame running up stairs
Muscular endurance
When a person has excellent muscular endurance, it means that they can perform strength exercises with proper form for an extended length of time without tiring out. To better grasp the concept of muscular endurance, it’s helpful to understand a bit about muscle fibers, too.
Understanding the different types of muscle fibers
You may ask yourself, what muscle fiber is exactly? Also known as muscle cells, muscle fibers formn through the process of myogenesis. Muscle fibers are cylindrical, contain more than one nucleus and multiple mitochondria for energy production. Muscles like the biceps, for example, would include many different types of muscle fibers.
That’s right, not all muscle fibers are the same. In fact, there are three different types of fiber: Type I, IIA, and IIB. Each type of fiber has a specific purpose, namely in the way that they perform and how quickly they fatigue.
Type I fibers
Type I fibers are useful for long-duration activities. Also known as slow twitch fibers, these muscle fibers have the slowest rate of fatigue as they are supplied with the most blood and oxygen.
Endurance athletes such as Iron Man competitors have a higher percentage of Type I fibers that they built up through endurance training. Type I fibers are also in our spine muscles — you can thank them for enabling you to stand up all day! Our legs contain them too, facilitating activities that last at least 30-45 minutes at a time, like walking or cycling.
Type II fibers
Type II fibers (fast twitch fibers) are useful for short-duration activities. They can be further divided into two categories, type IIA and type IIB (also known as IIX).
• Type IIA: Known as fast oxidative fibers, these are useful for activities that take a lot of power but are shorter in duration than Type I fibers. An example would be a 400-meter sprint.
• Type IIB/IIX: Also called fast glycolytic fibers, these are recruited in bursts of power even shorter than Type IIA fibers can handle. Some examples are short sprints and weightlifting at maximum intensity. Type IIB muscle fibers fatigue the fastest.
If you’re interested in improving your endurance, it’s definitely possible. With specific types of training, you can develop muscle endurance significantly and turn some type II fibers into type I fibers. Let’s explore the different ways to increase your muscle endurance are.
Ame sweating outside
How to train muscular endurance
If you want to increase your muscles’ abilities to work for an extended period, you may wish to train at a low-to-moderate intensity, so that you can keep up with the exercise for 30 minutes or more. Doing bodyweight exercises is a great way to start. As you continue to improve, you can keep increasing the number of reps in your workout, and eventually add weights for even more of a challenge.
It’s also possible to increase your muscle endurance by doing HIIT (high-intensity interval training). Even though HIIT workouts are usually short yet powerful, they still may enhance your muscles’ capacity to utilize oxygen and in turn improve muscular endurance.
Try this 15-minute endurance workout
If you want to increase your endurance, we recommend working out without resting between exercises. Circuit training incorporating bodyweight exercises are an excellent approach, as they keep you active for longer, continually moving from one exercise to the next.
Ready to test your endurance?
Without resting between exercises (if you can), try to perform five sets of the circuit below. You may take a 1-minute break at the end of each set — use it to catch your breath or take a sip of water!
• Inchworms: 5 reps
• Push-ups: 10 reps
• Plank jacks: 15 reps
• Sumo squat: 20 reps
• Butterfly sit-ups: 25 reps
• Swimmer: 20 reps
• Dips: 15 reps
• Walking lunges: 10 reps
• Burpees: 5 reps
• 1-minute break
Practice makes perfect
An incremental, steady approach to building up your endurance training is the most effective way to reach your goals. Training both your cardiovascular and muscular endurance takes plenty of practice, and of course, a bit of time. We recommend staying on track by sticking to an achievable schedule that will challenge you gradually when it comes to difficulty.
To keep you on your toes, try throwing some 8fit exercises into the mix. Not only will it help you build strength, but as you progress through the 8fit program, you’ll encounter exercises that meet you at your fitness level. The 8fit Pro app offers numerous HIIT exercises that can help in your quest to increase endurance, and will give a whole new meaning to being young at heart!
|
global_01_local_1_shard_00001926_processed.jsonl/31891
|
Log in
No account? Create an account
TNG: Angel One - abates
Brilliant but slightly odd but very nice
Alden Bates
Date: 2006-07-16 12:09
Subject: TNG: Angel One
Security: Public
Tags:next generation
Angel One: In search of survivors of a freighter disaster, the Enterprise arrives at a planet inhabited by a matriachal society.
The Enterprise is investigating a destroyed freighter - three escape pods have lead them to Angel One, a female dominated society. Picard suggests Troi make first contact, but they don't seem very friendly...
Erm, pointless Wesley cameo ahoy! Riker, Data, Troi and Yar beam down over some exposition from Picard about how women are the dominant sex on the planet for those who have forgotten the pre-credits sequence already. The womens are not forthcoming on whether the freighter survivors are on the planet. The away team are shown to quarters whether they discuss their next step.
Meanwhile, back on the Enterprise, Picard and Worf are discussing the Romulans, whe Wes hits the Captain with a snowball.
Data discovers perfume which leads to a discussion about sex. WTF? The women finally tell them that there are four survivors from the freighter, but they're in hiding somewhere on the planet.
Wesley and his friends come down with a nasty virus from their ski trip on the holodeck. Again, WTF? The holodeck shouldn't be able to create anything like that under any normal circumstances, shirley? Picard is infected too, presumably from the snowball, much to his disgust.
Troi and Yar express surprise that Riker's going to put on skimpy native garb to meet with their leader, the Elected One. Oh god, the chest hair. Like the other women, the Elected One has an 80s hairdo and the hots for Riker. Yar, Troi and Data beam over to where the survivors are hiding, and are warmly greeted. Meanwhile, Riker does sex with the Elected One and gives her a gift - a mediatation crystal.
The virus continues spreading on the Enterprise, and there's a few computer malfunctions as well. Crusher struggles to find a treatment.
The freighter survivors say they've made a home and don't want to leave. Unfortuantely they can't be forced to leave, as they're not Star Fleet personnel. The away team beams back to pick up Riker. The news that the survivors don't want to leave is not greeted well by the Elected One who announced she has no choice but to issue a fatwa on them.
Crusher makes a breakthrough in finding the virus.
Data reports that there are Romulan warbirds massing at the neutral zone. The women reveal that they've captured the survivors and plan to execute them tomorrow. Riker suggests he make another attempt to persuade them to leave the planet, but they still don't want to go. Riker wants to take them unwillingly, but Crusher says the ship's under quarantine. He instructs Data to beam up and take the Enterprise to the Neutral Zone to aid the outpost there.
Ooo, look, an ad for Doctor Who. That looks quite exciting.
Data says they have 48 minutes before the ship has to leave for the neutral zone. Riker takes the time to make a speech pointing out that executing Ramsey and his merry men may simply elevate them to the level of martyrs. This provokes a stay of execution.
Crusher develops a cure for the virus and sets about dosing everyone on the ship.
The Elected One announces that Ramsey and co will be exiled rather than executed. The away team returns to the ship, and they head for the neutral zone, which is sorta odd, because the Romulans don't turn up til the end of the season. Teh end.
Post A Comment | 1 Comment | | Link
(no subject) - (Anonymous)
Alden Bates
User: abates
Date: 2006-07-16 21:53 (UTC)
Subject: (no subject)
Yeah, tis Brannon and Rick Berman. Who thankfully probably won't be working on Trek any more.
Reply | Parent | Thread | Link
August 2016
|
global_01_local_1_shard_00001926_processed.jsonl/31914
|
Alex Meyer-Gleaves - OWIN support for the Web API 2 and MVC 5 integrations in Autofac
Published on Monday, February 17, 2014
Currently, in the both the Web API and MVC frameworks, dependency injection support does not come into play until after the OWIN pipeline has started executing. This is simply a result of the OWIN support being added to both frameworks after their initial release. In fact, the OWIN support in MVC does not yet extend to the self hosting scenario and is limited to plugging in OWIN middleware.
I had two primary objectives when creating these new OWIN packages for Autofac:
• Extend the Autofac lifetime scope from the OWIN pipeline into the MVC and Web API integrations
• Make dependency injection avaialable to OWIN middleware components
Due to the somewhat fragmented nature of the DI support in the ASP.NET stack, achieving this goal required a bit of trickery and black magic. For that reason the packages are currently pre-release and marked as alpha. Hopefully you can pull them from NuGet and help test them out.
Enabling DI for OWIN middleware
Lets start with a service interface for a logging dependency...
public interface ILogger
void Write(string message, params object[] args);
...along with its rather unimaginative implementation (just imagine something more interesting).
public class Logger : ILogger
public void Write(string message, params object[] args)
Debug.WriteLine(message, args);
To enable dependency injection for OWIN middleware derive from OwinMiddleware as usual, and add any additional constructor dependencies after the constructor parameter for the next middleware in the chain. In the example below we are adding the ILogger dependency to the middleware.
public class LoggerMiddleware : OwinMiddleware
private readonly ILogger _logger;
public LoggerMiddleware(OwinMiddleware next, ILogger logger) : base(next)
_logger = logger;
public override async Task Invoke(IOwinContext context)
_logger.Write("Inside the 'Invoke' method of the 'LoggerMiddleware' middleware.");
foreach (var pair in context.Environment)
_logger.Write("Key: {0}, Value: {1}", pair.Key, pair.Value);
await Next.Invoke(context);
To wire this up we have to register the middleware and its dependencies with the container, and then enable the middleware dependency injection support via a call to UseAutofacMiddleware. This call should be the first piece of middleware registered with the IAppBuilder.
var builder = new ContainerBuilder();
builder.Register(c => new Logger()).As<ILogger>().InstancePerLifetimeScope();
This particular extension method is included in the Autofac.Owin package which is shared by the Autofac.WebApi2.Owin and Autofac.Mvc5.Owin packages. You would not normally use this package by itself because of the second role the shared package plays. Not only is it responsible for adding middleware dependency injection support, it also creates an Autofac ILifetimeScope instance for each request early in the OWIN pipeline. You can access this lifetime scope using the GetAutofacLifetimeScope method on IOwinContext. The OWIN packages for the Web API and MVC integrations use this method to access the lifetime scope and make it available further along in the request.
Extending the lifetime scope to Web API
To enable the lifetime scope created during the OWIN request to extend into the Web API dependency scope call the UseAutofacWebApi method.
This will add a DelegatingHandler which extracts the ILifetimeScope from the IOwinContext. Once it has a hold of the ILifetimeScope an AutofacWebApiDependencyScope is created and added into the appropriate HttpRequestMessage property that Web API expects the IDependencyScope to be available from. The code below shows this task being performed during the SendAsync method of the handler.
var owinContext = request.GetOwinContext();
if (owinContext == null) return base.SendAsync(request, cancellationToken);
var lifetimeScope = owinContext.GetAutofacLifetimeScope();
if (lifetimeScope == null) return base.SendAsync(request, cancellationToken);
var dependencyScope = new AutofacWebApiDependencyScope(lifetimeScope);
request.Properties[HttpPropertyKeys.DependencyScope] = dependencyScope;
return base.SendAsync(request, cancellationToken);
Notice that we still made a call to UseAutofacMiddleware. This is required because along with enabling the middleware DI support, this is also responsible for placing the lifetime scope in the OWIN context. I'm not totally happy with this dual responsibility but it does reduce the API surface area and means less IAppBuilder extensions are required. For now, if you don't want to use middleware DI support, don't register your middleware with the container.
Extending the lifetime scope to MVC
To enable the lifetime scope created during the OWIN request to extend into the MVC request call the UseAutofacMvc method on your IAppBuilder instance.
Just like with Web API we need to ensure that UseAutofacMiddleware has been called first. You only need to call this method once, even when using both the MVC and Web API integrations together. Remember, the call to UseAutofacMiddleware should be made as early as possible during the bootstrapping process.
In the MVC middleware we are also retrieving the ILifetimeScope from the IOwinContext, but in this case we are placing it in the HttpContext as is expected by the MVC integration. The code below shows this process directly implemented in a middleware method.
public static IAppBuilder UseAutofacMvc(this IAppBuilder app)
return app.Use(async (context, next) =>
var lifetimeScope = context.GetAutofacLifetimeScope();
var httpContext = CurrentHttpContext();
if (lifetimeScope != null && httpContext != null)
httpContext.Items[typeof(ILifetimeScope)] = lifetimeScope;
await next();
In case you are wondering, CurrentHttpContext is an internal property that returns a HttpContextBase allowing for mocking of the HTTP context during unit testing.
NuGet Packages
As mentioned earlier the packages are currently pre-release, so don't forget the -Pre switch on the command line, or the Include Prerelease option in the GUI. Please report any issues that you find on GitHub.
Autofac Web API OWIN Integration:
Install-Package Autofac.WebApi2.Owin -Pre
Autofac MVC 5 OWIN Integration:
Install-Package Autofac.Mvc5.Owin -Pre
Please note that you still need to configure the relevant dependency resolver for each integration: AutofacWebApiDependencyResolver for Web API, and AutofacDependencyResolver for MVC.
comments powered by Disqus
|
global_01_local_1_shard_00001926_processed.jsonl/31940
|
Mortensen Math Multiplication
Hide and Seek Multiplication!
Have your child grab a handful of 1’s, 2’s, 3’s, 4’s, 5’s, 6’s, 7’s, 8’s, 9’s, 10’s, or 100’s.
If you have more than one child have each of them grab a different handful of blocks. One can grab 5’s, another 10’s, and so on.
Next have them close their eyes and cover their ears while you hide the blocks around the room for them to find. Make finding the blocks challenging but possible.
After that let them go find the blocks.
What are the rules? There is just one – each time your child finds a block they must verbalize the total amount of the blocks that have been found up to that point. When two 5’s have been found the child seeking 5’s must verbalize that the total amount found is 10, when five 10’s have been found the child seeking 10’s must verbalize that the total amount found is 50, and so on.
For added excitement ask them to yell out the total each time they find a block and allow them to stand on chairs to see high, crawl on the floor to see low, and so on while searching out the hidden blocks. If played correctly there will be lots of noise, movement, and giggling.
When they are done let them hide some blocks for you to find or for each other to find.
Remember to keep the game at their level – if this is their first time playing have them find and count the first couple or few only of a specific number and build on that total the next time they play the game.
Leave a Comment
|
global_01_local_1_shard_00001926_processed.jsonl/31944
|
Thursday, May 14, 2015
Greenies hitting those who can least afford it again
State of the Planet: Better Than Ever
Think about this: There is no time in the history of mankind that would be a better time to be alive than today.
Although most people resist this message, and perhaps it is natural to have a yearning for the simpler times of yesteryear, nearly every objective measure of the state of the planet and the state of human progress shows vast improvement over time. You can find proof of this in about 30 seconds on your iPhone, which has about as much computing power than every computer used by all the nations of World War II.
Why is there so much pessimism about the state of our planet? I recently watched the Earth Day speeches on the Washington Mall and they were drenched with Chicken Little tales of a coming apocalypse.
Here is the way CNN explained what we have to look forward to: “Think super droughts, rising seas, mass extinctions, and acidifying oceans.” Then it warned: “Disappearing coasts,” and “bye bye, animals.”
President Barack Obama sounded the alarm when he warned of climate change: “This is not a problem for another generation. Not anymore. This is a problem now. It has serious implications for the way we live right now. Stronger storms. Deeper droughts. Longer wildfire seasons.”
He claims it is already happening. It reminds me of those campy 1970s buttons: “Stop the planet, I want to get off.”
Every single one of those predictions was not just wrong, but spectacularly wrong. The opposite occurred. But the doomsday machine rolls on. The declinism on the state of our planet and the well-being of our species, permeates our schools, our churches, our malls, radio, TV, the Internet and our whole culture.
In sum, our planet is in a miserable state, we’re told over and over.
Ladies and gentlemen, this is the single greatest misinformation campaign in world history. The state of our planet and the state of humanity has never been stronger. Nature has never been more bountiful.
I recently wrote of the following six statistics which go a long way to proving how well we are doing. The response from the greens was vitriol and even threats to my physical safety for writing these truths. But no one refuted the facts, because, well facts are facts.
Here they are:
1.) Natural resources are more abundant and affordable today than ever before in history. Short term volatility aside, the price of almost all natural resources — from cocoa to cotton to coal — is cheaper today in real terms than 50, 100, or 500 years ago. This has happened even as the world’s population has nearly tripled. Technology has far outpaced depletion of the earth’s resources.
2.) Energy resources are growing. Energy is the master resource; and it is super abundant. Remember when people like Paul Ehrlich nearly 50 years ago and Barack Obama just three years ago warned that we were running out of oil and gas? Today, in the new age of oil and gas thanks to fracking, the United States has hundreds of years of petroleum and an estimated 300 years of coal. We’re not running out of energy, we are running into it.
3.) Air and water is cleaner than ever. Since the late 1970s, pollutants in the air have plunged. Lead pollution plunged by more than 90 percent, carbon monoxide and sulfur dioxide by more than 50 percent, with ozone and nitrogen dioxide declining as well. By nearly every standard measure it is much, much, much cleaner today in the United States than 50 and 100 years ago. The air is so clean now that the EPA worries about carbon dioxide, which isn’t even a pollutant. (And, by the way, carbon emissions are falling too, thanks to fracking). One hundred years ago, about one in four deaths in America was due to contaminants in drinking water. But from 1971-2002, fewer than three people per year in the United States were documented to have died from water contamination.
4.) There is no Malthusian nightmare of overpopulation. Birth rates have fallen by about one-half around the world over the last 50 years. Developed countries are having fewer kids, not too many. Even with a population of 7.3 billion people, average incomes, especially in poor countries, have surged over the last 40 years. The number of people in abject poverty fell by 1 billion between 1981 and 2011, even as global population increased by more than 1.5 billion. That’s just short of a miracle.
5.) Global per capita food production is 40 percent higher today than as recently as 1950. In most nations the nutrition problem today is obesity — too many calories consumed — not hunger. The number of famines and related deaths over the last 100 years has fallen in half. More than 12 million lives on average were lost each decade from the 1920s-1960s to famine. Since then, fewer than 4 million lives on average per decade were lost. When famine does happen, it’s primarily a result of political corruption or malice, not nature growing too little food. Furthermore, the price of food has fallen steadily in the United States - and most other nations steadily for 200 years.
6.) The rate of death and physical destruction from natural disasters or severe weather changes has plummeted over the last century. Loss of life from hurricanes, floods, hurricanes, heat, droughts, and so on is at or near record lows. This is because we have much better advance warning systems, our infrastructure is much more durable, and we have things like air conditioning to adapt to weather changes. We are constantly discovering new ways to harness and even tame nature.
Again, these are just standard facts — though not very well known. But you could look them up. The point is that human advance and growth of the economy leads to a steadily improving and bountiful planet.
And the growth comes as a result of free enterprise. The environmentalists have declared free-market capitalism a near-treasonous pursuit. In reality, free markets with reasonable and sane regulation, will save the planet from extinction. Meanwhile, the socialists, the communists, the Sandinistas, the Stalinists, are the ones who did the greatest damage to the planet - with such avoidable catastrophes as the Chernobyl nuclear accident.
The environmentalists still believe that command and control rules and regulations — on how much water can be flushed from our toilets, what kind of light bulbs we can use, the temperature setting of our thermostats, the amount of solar and wind energy we must use, the type of energy efficiency we get from our household appliances, the amount of water we can use to water our lawns (as in California), even limits on how many kids we can have (as in China) — will save the planet.
They won’t. Freedom will.
This is very good news for those who believe that one of our primary missions as human beings is to make life better over time and to leave our planet better off for future generations. That’s just what we are doing.
The Death of the Green Energy Movement
This wasn’t supposed to happen.
CO2 Hits 'Milestone.' So What?
The National Oceanic and Atmospheric Administration announced this week that the level of CO2 in the atmosphere set a new record high. Angela Fritz of The Washington Post’s Capital Weather Gang reports, “For the first time since we began to track the greenhouse gas in our planet’s atmosphere, carbon dioxide surpassed 400 parts per million in March — a concentration that scientists consider a significant milestone for Earth’s climate and our ability to reverse the trend.” Climate Central’s Brian Kahn says that “CO2 emissions are the main driver of climate change and have risen more than 120 ppm since pre-industrial times.” He adds, “The planet has warmed 1.6°F over that period as well.”
But that claim has come under increased scrutiny in recent years. NOAA says 2014 was the hottest year yet, and this year is on pace to be even warmer. However, satellites — a superior method utilized for temperature recordings — reveal absolutely no global warming in nearly 18 and a half years. So even though CO2 is rising, temperature are not, despite assertions to the contrary. Moreover, as climatologist Dr. Roy Spencer reminds us, it’s been nearly “3,500 days since the last time a major hurricane (Cat 3 or stronger) struck the U.S., which was Hurricane Wilma in 2005.” Why aren’t we celebrating that record? He also notes, “Most people aren’t aware that the atmospheric concentration would have gone up twice as fast if not for the fact that nature loves the stuff. No matter how fast we produce it with our cars and planes and power plants, nature sucks up half of it, like a starving dog that has just been fed dinner. In fact, without CO2 life as we know it on Earth would not exist.” By burning fossil fuels, you could say we’re doing our part to green the planet.
Parental environment mediates impacts of increased carbon dioxide on a coral reef fish
Fish adapt rapidly to climate change -- within one generation
Gabrielle M. Miller et al.
Carbon dioxide concentrations in the surface ocean are increasing owing to rising CO2 concentrations in the atmosphere1. Higher CO2 levels are predicted to affect essential physiological processes of many aquatic organisms2, 3, leading to widespread impacts on marine diversity and ecosystem function, especially when combined with the effects of global warming4, 5, 6. Yet the ability for marine species to adjust to increasing CO2 levels over many generations is an unresolved issue. Here we show that ocean conditions projected for the end of the century (approximately 1,000 μatm CO2 and a temperature rise of 1.5–3.0 °C) cause an increase in metabolic rate and decreases in length, weight, condition and survival of juvenile fish. However, these effects are absent or reversed when parents also experience high CO2 concentrations. Our results show that non-genetic parental effects can dramatically alter the response of marine organisms to increasing CO2 and demonstrate that some species have more capacity to acclimate to ocean acidification than previously thought.
Nature Climate Change 2, 858–861 (2012) doi:10.1038/nclimate1599
Some basic climate background from successful forecaster Bill Gray
I am appalled that scientific objectivity has been so blatantly disregarded by our government and the world’s environmentalists who would use erroneous climate model results to justify their faulty AGW pronouncement which are injurious to humanity.
Gray’s View on AGW. We AGW skeptics need to be able to offer two basic plausible physical explanations in order to negate the AGW hypothesis.
1. Why projected CO2 increases over the next 50-100 years will only be able to bring about very small amounts (0.2-0.4°C) of global mean temperature rise.
2. Why there is natural climate change unrelated to CO2 variations? We need a believable physical explanation for the global climate changes over the last few thousand years (Little Ice Age, Medieval Warm Period, etc.) and in particular the apparent quite modest global warming of the last century. We also need an explanation of the shorter time-scale multi-decadal global warming periods (1910-1940, 1975-1999) and of the global cooling or neutral periods (1880-1910, 1940-1974, and 1999-2015).
Explanation #1 can be understood as a result of CO2 increases causing more global precipitation and associated increase in the globe’s deep cumulonimbus (Cb) convective clouds. These CO2 induced precipitation increases bring about upper tropospheric drying which allows more infrared (IR) flux to space – a negative water-vapor feedback. This extra rainfall enhances surface evaporation cooling which acts to balance out most of the expected global warming resulting from CO2’s increasing blockage of IR to space (3.7 Wm-2 for a CO2 doubling). This prevents CO2 increases from bringing about any significant global warming. Only minimal warming (0.2-0.4°C) is going to occur with a doubling of CO2. The main effect of CO2 increases will be an enhancement of global average precipitation of about 3 percent. This enhanced global rainfall will occur in regions where it is already raining and should be hardly noticed.
Explanation #2 can be explained by the multi-decadal and multi-century variations in the globe’s deep ocean circulations (or Meridional Overturning Circulation – MOC) which are primarily driven by space and time variations of oceanic salinity. Salinity changes occur in ocean areas where there are long period differences in surface evaporation minus precipitation. This is especially the situation of the Atlantic where ocean evaporation is 10-20 percent greater than precipitation. Salinity driven ocean changes bring about alterations in the strength of the Atlantic Ocean Thermohaline Circulation (THC), and through Pacific basin upwelling response variations to variation in the Pacific multi-decadal oscillation (PDO) as well. There is also salinity driven ocean subsidence around the Antarctic continent. All these factors influence the strength of the MOC.
Most of the globe’s last century weak global warming has, in my view, been a consequence of a modest slowdown of the global oceans MOC. This last century long MOC slowdown is also detected in an associated weak increase (in milliseconds) in the earth’s rate of rotation.
Lack of Ability of Other Suggested Non-ocean Climate Change Mechanisms to Rival or be Superior to Coming CO2 Influences. The many other non-ocean proposed physical ideas for climate change (where orbital parameters do not play a role) such as
1. Solar variability
2. Sun-spot changes
3. Cosmic ray variability
4. Aerosol changes
5. Human land use changes
6. Volcanic activity
may each play a minor role in some aspects of the globe’s climate alteration. But the individual physical influence of each of these suggested mechanisms is too small to be used as a dominant physical argument against the CO2 change hypothesis.
None of the above proposed climate change mechanisms well match the observed past changes in global temperature. In addition, the magnitude of potential energy change from these above non-ocean physical mechanisms does not have the power to come close to producing the climate changes which the variations of the deep ocean circulations are capable of bringing about.
We AGW skeptics who have proposed non-ocean climate change mechanisms as an alternate to CO2 induced climate changes will continue to have difficulty in rebutting the CO2 advocates. These alternate physical hypothesizes do not have enough supporting observational evidence to allow any one of them or a combination of them to be judged to be more dominant than the changes which future CO2 increases will be able to bring about.
We critics of the AGW CO2 warming hypothesis need a more dominant alternate physical hypothesis which is stronger and which better conforms in time with the global observations. Changes in the ocean’s deep circulation currents appears to be, by far, the best physical explanation for the observed global surface temperature changes (see Gray 2009, 2011, 2012, 2012). It seems ridiculous to me for both the AGW advocates and us skeptics to so closely monitor current weather and short-time climate change as indication of CO2’s influence on our climate. This assumes that the much more dominant natural climate changes that have always occurred are no longer in operation or have relevance.
Cumulus Convection Influences. Most cumulus convection is organized in meso-scale cloud clusters containing 10 to 20 individual Cb convective elements which are typically concentrated in areas of 200-500 km wide. The individual deep Cb convective cells within these cloud-cluster systems are often arranged in lines and new convective elements are continuously being formed and dissipated. Each new Cb convective element goes through a typical lifecycles of an hour or so. The strong downdrafts from the late stages of these dying Cb elements typically contribute to the low-level mass forcing needed for the initiating of other new adjacent Cb clouds. This is why multiple Cb clouds tend to cluster together.
Cb clouds penetrate well into the middle and upper troposphere. The excess mass within the weakening upper-level Cb elements diverge and spread out as cirrus clouds. This higher level extra mass and cirrus cloudiness then begins to undergo sinking so as to make space and satisfy mass balance for the new emerging upper tropospheric Cb penetrating elements.
Subsidence Drying. Cumulonimbus updraft elements have very high rainfall efficiency as they weaken and die in the very cold upper troposphere. The very cold air at these upper tropospheric levels can hold (even at saturation) very little water-vapor (only about 1% of the low-level moisture content by mass and 0.1 of 1% by volume) compared to the middle and lower tropospheric moisture contents. This very low water-vapor content air from the upper Cb outflow then sinks, evaporates its cloud particles, and arrives at lower levels where the saturated water-vapor contents are much higher. The original upper-level dry air then mixes with the lower level air. This mixture of air at the lower level becomes drier than the air at this level was before any of the upper-level air mixed into it.
A saturated air parcel from a dying Cb cloud which sinks from the 200 mb (12 km height) level to the lower pressure height of 300 mb (10 km ht.) will arrive at this lower-level with a RH of only 10-12 percent of the lower level air. These unusually large upper-level subsidence drying amounts are a consequence of the very large gradient of saturated vapor pressure in the upper troposphere. Vertical gradients of saturated vapor pressure at middle and lower tropospheric levels are, percentage wise, much smaller.
An increase in global deep convective (Cb) activity as a result of CO2 increases will thus bring drying (not moistening) to the upper troposphere, just the opposite of the climate models projections. This upper tropospheric drying acts to lower the infrared (IR) radiation emission level (EL) to a lower height and a warmer temperature where larger amounts of IR energy (σT4) are able to be fluxed to space. Increases in net global Cb convective activity results in higher amounts of IR energy being fluxed to space, not lower amounts as all the climate modelers and their fellow AGW advocates believe.
Our extensive analysis of the ISCCP data well shows the degree to which the broad upper-level sinking air from the global rain areas have had their RH reduced when an enhancement of the global rainfall rate (and accompanied increase in Cb convection) occurs. Please see the attached short write-up “Crux of AGWs Flawed Science” for more detailed discussion and clarifying figures and tables.
How Global Temperature Will Change as CO2 Increases. The rise of CO2 gas occurs very slowly. By contrast, the troposphere’s hydrologic cycle and its energy dissipation cycle operate on a time-scale of only around 10 days. Any CO2 radiational induced warming will be quickly felt by the earth’s surface and will immediately act to enhance surface evaporation. The more surface evaporation, the less the surface will warm.
A doubling of CO2 gas in the atmosphere will cause an alteration of our global climate but not in the same way as envisioned by the climate modelers or by the majority of scientists studying this topic. Most researchers concentrate only on the direct radiation influences which CO2 increases bring about. They tend not to consider the other related feedback mechanisms which will be simultaneously activated as CO2 amounts increase. The increased global evaporation from CO2 increase will extract energy from the earth’s surface and enhance surface cooling. This will act to reduce the pure radiation assumed 1°C warming through both enhanced IR energy flux to space and enhanced surface evaporation. The more evaporation from a doubling of CO2 will act to further reduce the 1°C direct radiation only temperature response. As the CO2’s induced speed-up of the globe’s hydrologic cycle continues the cooling influences of the enhanced surface evaporation-precipitation will greatly suppress any pure radiation assumed rise of 1°C. Doubling CO2 will thus be able to bring about only a quite modest global warming. The main influence of a doubling of CO2 will be to increase average global precipitation.
Basic Flaw of the AGW Hypothesis. It is the climate models parameterization schemes for cumulus convection (particularly the deep cumulonimbus (Cb) convection) which are grossly unrealistic and which completely negates the global modeler’s projections of 2-5°C warming for a doubling of CO2. This does not mean that the globe won’t be measurably influenced from CO2 doubling. But this CO2 influence will occur primarily as an enhancement of the global hydrologic cycle (precipitation) and only minimally from a rise in global surface temperature.
The AGW hypothesis that warming from increased CO2 will enhance global rainfall is correct. But the assumption that this added rainfall and added tropospheric condensation warming will greatly increase upper tropospheric temperature and water-vapor (through the assumption of constancy of relative humidity) is not at all valid. The opposite occurs. Increased deep Cb convection causes dryness to the upper troposphere. The climate modeler’s large increase in upper tropospheric water-vapor and temperature from added CO2 does not agree with the physics of how real-world deep Cb convection functions. And the additional positive feedback doubling of the upper troposphere warming and moistening which they add to the direct CO2 radiation blockage is completely bogus. This additional feedback assumption greatly increases the divergence of their model simulations from reality.
Summary. The global climate modelers assumed that CO2 enhanced global rainfall will bring about large upper-tropospheric water-vapor and temperature increases. These upper-level water-vapor increases are then projected to bring about even larger temperature increases and additional water-vapor (positive water-vapor feedback) amounts which add twice as much additional blockage of infrared (IR) energy to space than the initial influence of the CO2 blockage alone. Such large water-vapor and temperature increases are not at all realistic. This is the Achilles-heel of the whole AGW theory.
Comment. None of the global climate modelers or other AGW advocates seem to know that the globe’s deep cumulonimbus (Cb) convection processes act, not to increase upper level water-vapor, but in an opposite sense to reduce the globe’s upper tropospheric water-vapor content. The global climate modelers live in a very isolated Ivory Tower world. Their positive water-vapor feedback schemes in their doubling of CO2 simulations shows that they know next to nothing about how the atmosphere’s cumulus convective and moisture processes really function.
Gray Research Project. I and my Colorado State University (CSU) research project have a long background in studying cumulus convection, and particularly deep and intense cumulonimbus (Cb) convection of the tropics associated with meso-scale rain systems and tropical cyclones. We have published a lot of material on this subject over many years. These convective studies appear to provide crucial background information fundamental to establishing the invalidity of the AGW hypothesis. My CSU project’s over 50 years of tropical meteorology research has, by necessity, had to make the study of cumulus cloud convection a priority item for the understanding of tropical circulations and tropical cyclones. Our information has been gained from my project’s extensive involvement in many field experiments and from rawinsonde compositing activities over many years and recently through extensive analysis of ISCCP and NOAA Reanalysis data. To my knowledge, none of the AGW proponents have ever referred to any of my project’s many published papers and project reports.
Any scientist having advanced and detailed knowledge and working level experience of the globe’s deep cumulus convection process can completely negate the scientific validity of the AGW hypothesis. This could have been done decades ago if there had been an open and honest debate and further research on how changes in cumulus convective dynamics are related to CO2 increase. This greatly needed open and objective debate on cumulus convection process began and was taking place during the late 1960s and 1970s. But these studies were discontinued during the 1980s-1990s when the global models began to show useful results which the politicians, environmentalists, and the world government advocates could use to back up their desired AGW hypothesis. They did not want any further tampering with the models and the earlier momentum build-up for cumulus-moist process research did not go forward. The AGW advocates needed to utilize the unrealistic CO2 doubling climate model warming results as a scare mechanism to advance their agendas. And the CO2 global climate modeling community was quite happy to provide this justification and be well rewarded for their efforts.
Via email
No comments:
|
global_01_local_1_shard_00001926_processed.jsonl/31959
|
How to configure Hyper-v Replica Step By Step
Hyper-V Replica provides IP based asynchronous replication of virtual machines between two Hyper-v servers. Since this an asynchronous replication, replica virtual machine will not have the most recent data. However, replica virtual machines provides a cost effective way of keeping a copy of production virtual machines in a secondary site and can be made available in case of a disaster.
• Shared or standalone storage to fulfill the capacity requirement of the replicated virtual machine
• Asynchronous replication of Hyper-V virtual machines over Ethernet IP based network
• Replica works with standalone servers, failover clusters, or a mixture of both
• Hyper-v Hosts can be physically co-located or geographically diverse location with MPLS or IPVPN connection
• Hyper-v Hosts can be domain joined or standalone
• Provide planned or unplanned failover
• Any Hyper-v virtualized server can be replication using Hyper-v replica
• Windows Server 2012 R2 Hyper-v Role Installed
• Windows Server 2012 Hyper-v Role Installed
• Similar virtual network and physical network must be configured in secondary site for replica virtual machine to function as production virtual machine.
Step1: Configure Firewall on Primary and Secondary Hyper-v Host
1. Right Click Windows Logo on Task Bar>Control Panel>Windows Firewall
2. Open Windows Firewall with Advance Security and click Inbound Rules.
3. Right-click Hyper-V Replica HTTP Listener (TCP-In) and click Enable Rule.
4. Right-click Hyper-V Replica HTTPS Listener (TCP-In) and click Enable Rule.
Step2: Pre-stage Replica Broker Computer Object
1. Log on to DC>Open Active Directory Users & Computers>Create New Computer e.g. HVReplica
2. Right Click on HVReplica Computer Object>Properties>Security Tab>Hyper-v Cluster Nodes NetBIOS Name>Allow Full Permission>Apply>Ok.
Step3: Configure Replica Broker in Hyper-v Environment
Hyper-v Replica using Failover Cluster Wizard
1. Log on Hyper-v Host>open Failover Cluster Manager.
2. In the left pane, connect to the cluster, and while the cluster name is highlighted, click Configure Role in the Actions pane. The High Availability wizard opens
3. In the Select Role screen, select Hyper-V Replica Broker.
4. Complete the wizard, providing a NetBIOS name you have created in previous step and IP address to be used as the connection point to the cluster.
5. Verify that the Hyper-V Replica Broker role comes online successfully. Click Finish.
6. To test Replica broker failover, right-click the role, point to Move, and then click Select Node. Then, select a node, and then click OK.
7. click Roles in the Navigate category of the Details pane
8. Right-click the role and choose Replication Settings.
9. In the Details pane, select Enable this cluster as a Replica server.
10. In the Authentication and ports section, select the authentication method Kerberos over HTTP and authentication over HTTPS.
11. To use certificate-based authentication, click Select Certificate and provide the request certificate information.
12. In the Authorization and storage section, you can specify default location or specific server with specific storage with the Trust Group tag.
13. Click OK or Apply when you are finished.
Configure Hyper-v Replica using Hyper-v Manager
To Configure Hyper-v replica Broker in non-clustered environment.
1. In Hyper-V Manager, click Hyper-V Settings in the Actions pane.
2. In the Hyper-V Settings dialog, click Replication Configuration.
3. In the Details pane, select Enable this computer as a Replica server.
7. Click OK or Apply when you are finished.
Step4: Configure Replica Virtual Machine
1. In the Details pane of Hyper-V Manager, select a virtual machine by clicking it.
2. Right-click the selected virtual machine and point to Enable Replication. The Enable Replication wizard opens.
3. On the Specify Replica Server page, in the Replica Server box, enter either the NetBIOS or fully qualified international domain name (FQIDN) of the Replica server that you configured in Step 2.1. If the Replica server is part of a failover cluster, enter the name of the Hyper-V Replica Broker that you configured in Step 1.4. Click Next.
4. On the Specify Connection Parameters page, the authentication and port settings you configured for the Replica server in Step 2.1 will automatically be populated, provided that Remote WMI is enabled. If it is not enabled, you will have to provide the values. Click Next.
5. On the Choose Replication VHDs page, clear the checkboxes for any VHDs that you want to exclude from replication, then click Next.
6. On the Configure Recovery History page, select the number and types of recovery points to be created on the Replica server, then click Next.
7. On the Choose Initial Replication page, select the initial replication method and then click Next.
8. On the Completing the Enable Replication Relationship Wizard page, review the information in the Summary and then click Finish.
9. A Replica virtual machine is created on the Replica server. If you elected to send the initial copy over the network, the transmission begins either immediately or at the time you configured.
Step5: Test Replicated Virtual Machine
1. In Hyper-V Manager, right-click the virtual machine you want to test failover for, point to Replication…, and then point to Test Failover….
2. After you have concluded your testing, discard the test virtual machine by choosing Stop Test Failover under the Replication option
Step6: Planed Failover
1. Start Hyper-V Manager on the primary server and choose a virtual machine to fail over. Turn off the virtual machine that you want to fail over.
2. Right-click the virtual machine, point to Replication, and then point to Planned Failover.
3. Click Fail Over to actually transfer operations to the virtual machine on the Replica server. Failover will not occur if the prerequisites have not been met.
How to respond to unplanned Failover
1. Open Hyper-V Manager and connect to the Replica server.
2. Right-click the name of the virtual machine you want to use, point to Replication, and then point to Failover….
3. In the dialog that opens, choose the recovery snapshot you want the virtual machine to recover to, and then click Failover….. The Replication Status will change to Failed over – Waiting completion and the virtual machine will start using the network parameters you previously configured for it
4. Use the Complete-VMFailover Windows PowerShell cmdlet below to complete failover.
Starting a reverse replication once disaster is over
2. Right-click the name of the virtual machine you want to reverse replicate, point to Replication, and then point to Reverse replication…. The Reverse Replication wizard opens.
3. Complete the Reverse Replication wizard. You will find the requested information to be very similar if not identical to the information you provided in the Enable Replication wizard
Similar Articles:
Migrating VMs from Standalone Hyper-v Host to clustered Hyper-v Host
How to configure SAN replication between IBM Storwize V3700 systems
Understanding IT Disaster Recovery Plan
Disaster Recover VS Business Continuity – Are you mixing up?
Disaster Recovery Terminology in Alphabetic Order
Developing a DR Strategy
DR Objectives
1. Reduce Overall Risk
2. Maintain and Test Your Disaster Recovery Plan
3. Alleviate Owner/Investor Concerns
4. Restore Day-To-Day Operations
5. Comply With Regulations
6. Rapid Response
Priority Matrix
Priority Severity Impact
Priority 1 Highest High
Priority 2 Medium High Medium
Priority 3 Medium Medium
Priority 4 Medium low Low
Priority 5 Low Low
Who and What are involved in a Disaster Recovery
1. People
2. Physical facilities
3. Technology
4. Data (Structured & Unstructured)
5. Third Party Vendor or Suppliers
6. IT Governance(Policies & Procedures)
Producing a DR Document
A DR document consist of the following sections:
1. Title
2. Sub-Title
3. Corporate Logo
4. Document history.
5. Corporate Copyright Info
6. Table of Content
7. Executive Summary
8. Introduction
9. Terminology
10. Roles and responsibilities.
11. Third Party
12. Technologies
13. Site Diagram
14. Incident response.
15. Plan activation.
16. Procedures.
17. Appendixes.
|
global_01_local_1_shard_00001926_processed.jsonl/31964
|
Skip to Content
can't cancel the invoice
User is try to cancel the Invoice .But he is not able to
cancel .System throwing error is “Invoice
document can’t cancelled”
but when I checked in HELP it is telling -this is
not possible as the document has not yet been posted. Message No M8490 .But for this Accounting
document generated. When I check work flow for this it is still in process. Then
why it happen .How to overcome this problem. Now user want to cancel the document.
Please suggest
Thank you
mir.png (93027 B)
work.png (74843 B)
Former Member
you are in the wrong forum. I suggest you raise this question in the SAP ERP SD forum:
Regards, Ulf.
0 View this answer in context
|
global_01_local_1_shard_00001926_processed.jsonl/31980
|
I don’t really think that Jesus has ever really been interested in your personal salvation.
But perhaps I should clarify.
I don’t think that Jesus is interested in your personal salvation as it relates to heaven or being saved. This is largely a function of the contemporary American (evangelical) church.
Jurgen Moltmann writes convincingly that Jesus’ historical experience (vis a vis the cross) is not the moment of the reconciliation of all things. There is no moment in time where we could not already be reconciled to God.
The event of the cross, for Christians, functions as a signal marker that we already find the fullness of our being in the divinity in whom we move and have our being. But this act, couched in the paradigmatic theology of Christian faith, is not just for Christians.
The great sin of the evangelical church today is its subversion of the community-saving message of Jesus into the heresy of an individualistic, personal salvation of becoming saved.
It is this interpretive perversion that allows self-proclaimed Christian leaders the theological framework to align themselves with power that oppresses and excludes.
It is not enough, then, to say that Jesus would condemn the xenophobic race-baiting so eagerly displayed by many of our political and so-called religious leaders today.
Jesus would.
Rather, what we must see is that Jesus is the very refugee being denied entry.
Ultimately, Christian faith, if it does anything at all, expands the horizon of God’s embrace. And it does not do this alone. The world’s great spiritual teachers move us to the truth of an existential reality where everything, and everyone, is radically reconciled and included.
Our salvation, then, is not a movement to personal glorification, individualism, and greed — rather, it is a process whereby we understand that we are deeply bound together with everyone else, and that it matters how we treat those whom we are tempted to marginalize and oppress.
This is the theological framework that drives our work with young people at All Saints.
It is a framework that explores the unfathomable depth of God’s love for all people — a framework that helps structure a reality where the work of helping one another and embracing our strength in community becomes the defining way in which we answer the complex and numerous problems facing our world today.
So as we pull our gaze away from the desire to make salvation all about ourselves, let us begin to re-engage the complex and deep reality of a model of faith that strives to make communities, not just individuals, whole.
|
global_01_local_1_shard_00001926_processed.jsonl/32000
|
Thursday, February 05, 2009
The person we call God
Three basic facts
1. God exists. The Bible never explains or tries to prove God’s existence. It merely states God’s existence as a fact.
2. God is a person. He displays all of the characteristics of personality (thinking, acting and feeling).
3. God is a Trinity. God is one, yet exists as three persons - Father, Son, and Holy Spirit.
God exists
Genesis chapter 1 is the account of Creation. In verse 1, God's existence is simply stated as a fact, without any explanation.
According to Hebrews 11: 1-6, we can know that God exists by faith. Verse 3 states that what is seen is understood by faith.
God is a person
Genesis chapter 2
enumerates several things God did to show that He is a person: He worked, spoke, breathed, planted a garden, commanded, brought the woman to the man, rested, and brought the animals to the man.
John 4:24 states that God is a spirit. Some of the things that a spirit can do are: Matthew 10:20 (speaks); Mark 2:8 (knows); Luke 1:47 (rejoices); Romans 8:26 (helps and intercedes); Romans 8:27 (thinks and intercedes; Romans 15:30 (loves); and Philippians 2:1 (fellowships).
Proverbs 3:19,20 shows that God thinks: “The LORD by wisdom hath founded the earth; by understanding hath he established the heavens. By his knowledge the depths are broken up, and the clouds drop down the dew.”
Isaiah 46:11 shows that God acts: “Calling a ravenous bird from the east, the man that executeth my counsel from a far country: yea, I have spoken it, I will also bring it to pass; I have purposed it, I will also do it.”
God feels joy (Isaiah 62:5), sorrow (Gen. 6:6), compassion (Psalm 145:8) and hate (Psalm 5:5).
God is a Trinity
Deuteronomy 6:4-9 state that God is one. Verses 5 to 9 state our responsibilities: to love God completely, and teach His commandments to our children.
Exodus 20:1-6 state that God is one. This requires that He alone must be worshiped. Verse 5 says that worshiping other gods places us under God’s wrath, punishment or judgment.
In John 6:27 and 1 Peter 1:2, the Father is called God.
In John 1:1, Hebrews 1:8, and 1 John 5:20, the Son is called God.
In Acts 5:3 4, the Holy Spirit is called God.
In Matthew 3:16 17, all three (Father, Son and Spirit) are called God.
No comments:
|
global_01_local_1_shard_00001926_processed.jsonl/32001
|
Thursday, May 07, 2009
New Testament survey (14): 2 Thessalonians
(2 Thessalonians 1:6-9)
[1] 2 Thessalonians, from Thru The Bible Radio with Dr. J. Vernon McGee ©, with free downloads Notes & Outlines (PDF), Complete 5-Year Study (MP3), Who is Antichrist? (PDF)
While 1 Thessalonians emphasized the return of Christ for His church in what we call the “Rapture,” 2 Thessalonians emphasizes the return of Christ to the earth the second time, when He returns in judgment and sets up His Kingdom here upon this earth. This is called the revelation. You see, at the Rapture, the emphasis is not upon His coming to earth, because He doesn’t come to the earth. He makes it clear that “we shall be caught up to meet the Lord in the air” (see 1 Thessalonians 4:17). “Caught up” is the Greek word harpazo, meaning “to snatch away.” We shall be snatched away or raptured to meet Christ in the air. However, the revelation of Christ is when He returns to the earth to set up His Kingdom. In the time gap between these two events will be the Great Tribulation period. (Read the complete article)
Paul greets the church at Thessalonica and encourages and exhorts them. He commend them for what he hears they are doing in the Lord, and he prays for them (2 Thessalonians 1:11-12). In chapter 2, Paul explains what will happen in the Day of the Lord (2 Thessalonians 2:1-12). Paul then encourages them to stand firm and instructs them to keep away from idle men who don’t live by the gospel (2 Thessalonians 3:6). Read the complete article
[3] 2 Thessalonians, from Scofield Reference Notes (1917 Edition)
WRITER: The Apostle Paul (2 Thessalonians 1:1)
DATE: Second Thessalonians was evidently written very soon after Paul’s first letter to that church. The occasion may well have been the return of the bearer of the former Epistle and his report.
THEME: The theme of Second Thessalonians is, unfortunately, obscured by a mistranslation in the A.V. of 2 Thessalonians 2:2 where "day of Christ is at hand" (See Scofield “1 Corinthians 1:8”) should be, “day of the Lord is now present” (See Scofield “ 2:12”, ref). The Thessalonian converts were “shaken in mind” and “troubled,” supposing, perhaps on the authority of a forged letter as from Paul, that the persecutions from which they were suffering were those of the “great and terrible day of the Lord,” from which they had been taught to expect deliverance by “the day of Christ, and out gathering together unto him” (2 Thessalonians 2:1)
The present letter, then, was written to instruct the Thessalonians concerning the day of Christ, “and our gathering together unto him” 1 Thessalonians 4:14-17 and the relation of the “day of Christ” to the “day of the Lord.” First Thessalonians had more in view the “day of Christ”; the present Epistle the “day of the Lord.”
The Epistle is in five divisions:
1. Salutation, 2 Thessalonians 1:1-4
2. Comfort, 2 Thessalonians 1:5-12
3. Instruction concerning the day of the Lord and the man of sin, 2 Thessalonians 2:1-12
4. Exhortations and apostolic commands, 2 Thessalonians 2:13-3:15
5. Benediction and authentication, 2 Thessalonians 3:16-18
[1] Key verses: 2 Thessalonians 1:6-9, 2:13; 3:3, 10
[2] “The purpose of Bible prophecy is not for us to make a calendar, but to build character. Paul emphasized this fact in both of his Thessalonian letters, and our Lord warned us not to set dates for His coming (Matt. 24:36, 42). Date-setters are usually upsetters, and that is exactly what happened in the Thessalonican assembly.”(By Warren Wiersbe, from Be Ready, 1 & 2 Thessalonians, Victor Books, Wheaton, 1979, p. 137)
[3] The “day of Christ” in 2 Thessalonians 2:2 should be translated “day of the Lord”.
[4] Vine’s Expository Dictionary of New Testament Words
The phrases “the day of Christ,” Philippians 1:10; 2:16; “the day of Jesus Christ,” Philippians 1:6; “the day of the Lord Jesus,” 1 Corinthians 5:5; 2 Corinthians 1:14; “the day of our Lord Jesus Christ,” 1 Corinthians 1:8, denote the time of the Parousia of Christ with His saints, subsequent to the Rapture, 1 Thessalonians 4:16, 17. In 2 Peter 1:19 this is spoken of simply as “the day”.
From these the phrase “the day of the Lord” is to be distinguished; in the OT it had reference to a time of the victorious interposition by God for the overthrow of the foes of Israel, e.g., Isaiah 2:12; Amos 5:18; if Israel transgressed in the pride of their hearts, the Day of the Lord would be a time of darkness and judgment. For their foes, however, there would come “a great and terrible day of the Lord,” Joel 2:31; Malachi 4:5. That period, still future, will see the complete overthrow of Gentile power and the establishment of Messiah’s Kingdom, Isaiah 13:9-11; 34:8; Daniel 2:34, 44; Obadiah 1:15; cp. Isaiah 61:2; John 8:56.
[5] 2 Thessalonians 2:3-9 are references to Daniel’s prophecy regarding the “man of sin” (Daniel 7–8).
Further study
(Be like the Bereans! Acts 17:11)
[1] 2 Thessalonians: Introduction, Argument, Outline, by Daniel B. Wallace, Th.M., Ph.D
[2] 2 Thessalonians: An Exegetical and Devotional Commentary (9 article series), by J. Hampton Keathley, III, Th.M.
[3] 2 Thessalonians in English and Chinese
[4] Steadfast To The Final Bell, A Devotional Commentary on the Book of 2 Thessalonians, by Paul G. Apple
Sermons on 2 Thessalonians
(Be like the Bereans! Acts 17:11)
[1] Sanctifying Work of the Holy Spirit, by Jordan Irvin
[2] Our Gathering Together To Him, by Dr. F. Bobby Atkins
[3] 2 Thessalonians 2:6-7 - Purifying Influence, by Ronnie Mitchell
[4] Mysteries of God, by Brent Harris
[5] Community Revival- The Falling Away, by Daniel P. Johnson
[6] Loved, Chosen, Sanctified, Called, and one day...Glorified! by Patrick D. Williams
[7] Jesus Sanctifies Himself, by Robert L. Smith
[8] God’s Work in Our Lives, by Mark Barnes
No comments:
|
global_01_local_1_shard_00001926_processed.jsonl/32003
|
Podcasts, Quantum Leap Podcast
QLP 015 Thou Shalt Not…
Quantum-Leap-Thou-Shalt-NotIn the fifteenth installment of The Quantum Leap Podcast Albie and Heather discuss Season two episode seven “Thou Shalt Not…” and open up and talk about their personal loss and how this episode, while being a downer, may in fact be able to help people who suffer with loss and grief. There’s first impressions, an episode recap, thoughts and opinions, listener feedback, an amazing interview with Terri Hanauer who played Irene Basch in the Quantum Leap episode “Thou Shalt Not…” and an article from Hayden McQueenie.
Terri Hanauer HS
|
global_01_local_1_shard_00001926_processed.jsonl/32018
|
Jump to: Webster'sConcordanceThesaurusGreekHebrewLibrarySubtopicsTerms
Webster's Revised Unabridged Dictionary
1. (n.) A share, part, or portion granted or distributed; that which is assigned by lot, or by the act of God; anything set apart for a special use or to a distinct party.
2. (n.) The allowance of a specific amount of scrip or of a particular thing to a particular person.
2816. kleronomeo -- to inherit
... Cognate: 2816 (from 2818 , "a specific allotment of inheritance, apportioned by
casting lots") -- properly, to assign inheritance (inherit) by . ...
// - 8k
3313. meros -- a part, share, portion
... From an obsolete but more primary form of meiromai (to get as a section or allotment);
a division or share (literally or figuratively, in a wide application ...
// - 6k
3202. mempsimoiros -- complaining of one's fate
... 3202 (a substantival adjective, derived from 3201 , "blame, find fault," and ,
"an apportioned amount, allotment") -- properly, a complaint over the portion ...
// - 7k
Strong's Hebrew
8642. terumiyyah -- what belongs to a contribution, a contribution
... terumiyyah. 8643 . what belongs to a contribution, a contribution. Transliteration:
terumiyyah Phonetic Spelling: (ter-oo-mee-yaw') Short Definition: allotment ...
/hebrew/8642.htm - 6k
... Word Origin from rum Definition contribution, offering (for sacred uses) NASB Word
Usage allotment (15), contribution (20), contributions (10), heave offering ...
/hebrew/8641.htm - 6k
2256a. chebel -- cord, territory, band
... Word Origin from chabal Definition cord, territory, band NASB Word Usage allotment
(1), coast (1), cord (2), cords (13), group (2), line (4), lines (2 ...
/hebrew/2256a.htm - 5k
2506. cheleq -- portion, tract, territory
... From chalaq; properly, smoothness (of the tongue); also an allotment -- flattery,
inheritance, part, X partake, portion. see HEBREW chalaq. 2505b, 2506. ...
/hebrew/2506.htm - 6k
4521. menath -- portion
/hebrew/4521.htm - 6k
2513. chelqah -- a portion (of ground)
... Feminine of cheleq; properly, smoothness; figuratively, flattery; also an allotment --
field, flattering(-ry), ground, parcel, part, piece of land (ground ...
/hebrew/2513.htm - 5k
2706. choq -- something prescribed or owed, a statute
... Word Origin from chaqaq Definition something prescribed or owed, a statute NASB
Word Usage allotment (5), boundaries (1), boundary (2), conditions (1), custom ...
/hebrew/2706.htm - 6k
The Request of Salome. --The Ambition of the Disciples Rebuked. ...
... answered: "I can, indeed, impart to you the fellowship of my sufferings; but rank
in the kingdom of God depends not upon my will, but upon the allotment of the ...
/.../section 238 the request of.htm
Whether Divination by Drawing Lots is Unlawful?
... is to be given to whom, whether it be a possession, an honor, a dignity, a punishment,
or some action or other, it is called "sortilege of allotment"; if one ...
Still Continues the Praise of "Wisdom. ...
... Now, seeing that there is no apparent justice in the allotment of happiness here,
and the fear of God is often followed by sorrow, while the lawless as often ...
To the Reader.
... would have his churches ordered, the right of disposall of the power therein (we
humbly suppose) may lie in a due and proportioned allotment and dispersion ...
Therefore, if we Compare the Things Themselves, we May no Way ...
... But not to work from out that which he hath, stands in the allotment of duties,
not in the want of virtues: forasmuch as neither is he without the good of mercy ...
/.../augustine/on the good of marriage/section 28 therefore if we.htm
Dishonest Tenants
... end drew near. I. The parable begins with a tender description of the
preparation and allotment of the vineyard. The picture is ...
Analysis and References
... For those who want a daily scheme of study the allotment for the day can be by certain
designated pages of reading with the corresponding paragraphs in the ...
Matt. xiii. 10, 11
... to know the mysteries of the Kingdom of Heaven, but to them it is not given." [1792]
But this He said, not bringing in necessity, or any allotment [1793] made ...
/.../chrysostom/homilies on the gospel of saint matthew/homily xlv matt xiii 10.htm
The Tillage of the Poor
... Spade husbandry gets most out of the ground. The labourer's allotment of half an
acre is generally more prolific than the average of the squire's estate. ...
/.../maclaren/expositions of holy scripture g/the tillage of the poor.htm
Unwon but Claimed
... That allotment must have strengthened faith in their ultimate possession, and
encouraged effort to make the ideal a reality, and to appropriate as their own in ...
/.../maclaren/expositions of holy scripture f/unwon but claimed.htm
Allotment (24 Occurrences)
...Allotment (24 Occurrences). ... 2 Samuel 14:30 Then he said to his servants, See, Joab's
allotment is near mine and he has barley there: go and set it on fire. ...
/a/allotment.htm - 14k
Anem (1 Occurrence)
of Western Palestine 2. Allotment of the Country to the Tribes of Israel II. ...
/a/anem.htm - 101k
Allotments (4 Occurrences)
/a/allotments.htm - 8k
Allot (8 Occurrences)
/a/allot.htm - 9k
Judah (802 Occurrences)
... But there was a second distribution, when Simeon received an allotment, about 1,000
square miles, out of the portion of Judah (Joshua 19:9). That which ...
/j/judah.htm - 101k
Inheritance (263 Occurrences)
... Deuteronomy 33:4 Ezekiel 33:24); yerushshah, "something occupied," "a patrimony,"
"possession" (Judges 21:17); cheleq, "smoothness," "allotment" (Psalm 16:5 ...
/i/inheritance.htm - 45k
Issachar (40 Occurrences)
... blessing and cursing (Deuteronomy 27:12). The allotment of Issachar is described
in Joshua 19:17-23. It included the plain of Esdraelon ...
/i/issachar.htm - 26k
Four (3139 Occurrences)
... Job 1:19); Jephthah's daughter was bewailed four days a year (Judges 11:40); "four
cities" are several times mentioned in Jos in the allotment of inheritances ...
/f/four.htm - 15k
Ration (2 Occurrences)
... 2. (n.) Hence, a certain portion or fixed amount dealt out; an allowance;
an allotment. 3. (vt) To supply with rations, as a regiment. ...
/r/ration.htm - 7k
Manna (19 Occurrences)
... from man, an expression of surprise, "What is it?" but more probably it is derived
/m/manna.htm - 21k
Allotment (24 Occurrences)
Genesis 47:22
Numbers 18:8
And the LORD spoke unto Aaron: 'And I, behold, I have given thee the charge of My heave-offerings; even of all the hallowed things of the children of Israel unto thee have I given them for a consecrated portion, and to thy sons, as a due for ever.
(See NAS)
Numbers 18:11
And this is thine: the heave-offering of their gift, even all the wave-offerings of the children of Israel; I have given them unto thee, and to thy sons and to thy daughters with thee, as a due for ever; every one that is clean in thy house may eat thereof.
(See NAS)
Numbers 18:19
All the heave-offerings of the holy things, which the children of Israel offer unto the LORD, have I given thee, and thy sons and thy daughters with thee, as a due for ever; it is an everlasting covenant of salt before the LORD unto thee and to thy seed with thee.'
(See NAS)
Deuteronomy 12:12
And ye shall rejoice before the LORD your God, ye, and your sons, and your daughters, and your men-servants, and your maid-servants, and the Levite that is within your gates, forasmuch as he hath no portion nor inheritance with you.
(See NIV)
Deuteronomy 14:27
(See NIV)
Deuteronomy 14:29
(See NIV)
Deuteronomy 18:1
(See NIV)
Deuteronomy 32:9
For Yahweh's portion is his people. Jacob is the lot of his inheritance.
(See NAS)
Joshua 16:1
Joshua 17:1
Joshua 17:14
The children of Joseph spoke to Joshua, saying, "Why have you given me just one lot and one part for an inheritance, since I am a great people, because Yahweh has blessed me so far?"
(See NIV)
Joshua 17:17
Joshua spoke to the house of Joseph, even to Ephraim and to Manasseh, saying, "You are a great people, and have great power. You shall not have one lot only;
(See NIV)
Joshua 19:9
Out of the part of the children of Judah was the inheritance of the children of Simeon; for the portion of the children of Judah was too much for them: therefore the children of Simeon had inheritance in the midst of their inheritance.
(See JPS)
Ruth 2:3
Ruth 4:3
2 Samuel 14:30
2 Samuel 14:31
Psalms 125:3
For the scepter of wickedness won't remain over the allotment of the righteous; so that the righteous won't use their hands to do evil.
Ezekiel 45:6
And of the possession of the city ye give five thousand of breadth, and of length five and twenty thousand, over-against the heave-offering of the holy 'portion': to all the house of Israel it is.
(See NAS)
Ezekiel 45:7
(See NAS)
Ezekiel 48:8
(See NAS)
Ezekiel 48:12
And it shall be unto them a portion set apart from the offering of the land, a thing most holy, by the border of the Levites.
(See NAS)
Ezekiel 48:13
And 'to' the Levites over-against the border of the priests 'are' five and twenty thousand 'in' length, and 'in' breadth ten thousand, all the length 'is' five and twenty thousand, and the breadth ten thousand.
Related Terms
Anem (1 Occurrence)
Allotments (4 Occurrences)
Allot (8 Occurrences)
Judah (802 Occurrences)
Inheritance (263 Occurrences)
Issachar (40 Occurrences)
Four (3139 Occurrences)
Ration (2 Occurrences)
Manna (19 Occurrences)
Manasseh (140 Occurrences)
Micah (54 Occurrences)
Portion (227 Occurrences)
Chanced (3 Occurrences)
Consort (2 Occurrences)
Amam (1 Occurrence)
Symbol (8 Occurrences)
Stag (5 Occurrences)
Share (138 Occurrences)
Sells (14 Occurrences)
Simeonites (10 Occurrences)
Joshua (211 Occurrences)
Bethshemesh (19 Occurrences)
Beth-shemesh (19 Occurrences)
Scepter (28 Occurrences)
Formed (91 Occurrences)
Simon (75 Occurrences)
Peter (181 Occurrences)
Lot (145 Occurrences)
Won't (144 Occurrences)
Fields (199 Occurrences)
Redemption (46 Occurrences)
Bible ConcordanceBible DictionaryBible EncyclopediaTopical BibleBible Thesuarus
Top of Page
Top of Page
|
global_01_local_1_shard_00001926_processed.jsonl/32020
|
Picture of Erwan Bousse
Projektass. Dr.
Erwan Bousse
Former Faculty Staff
phone: +43 (1) 58801 - 188698
email: [email protected]
location: HG0215
office hours: by appointment
Erwan Bousse is a post-doc researcher who obtained his PhD in France in 2015 at the University of Rennes 1, IRISA/Inria lab, DiverSE team, under the supervision of Benoît Baudry and Benoît Combemale.
His thesis focused on providing means to enable the dynamic V&V of executable models, such as efficient model cloning, the creation of multi-dimensional execution traces of executable models, and the use of such traces for advanced model omniscient debugging.
• model driven engineering
• model transformation
• verification of model transformations
• language engineering
• model execution
• dynamic verification and validation of executable models
• execution traces of executable models
Current work
He is currently working in the context of the Tetrabox project.
He was previously working for the SysML4Industry module of the CDL-Flex project.
Personal webpage
More information in his personal webpage.
|
global_01_local_1_shard_00001926_processed.jsonl/32033
|
Browsing Tag
imaginative play
Boys and Doll Play
Archives, Childhood, Parenting, Waldorf Dolls
Boys and Doll Play
This thinking needs to be changed.
You Might Also Like
Waldorf Toys
In Praise of Rocker Boards
If you were to ask me to recommend my one favorite Waldorf toy, I would have to tell you the Rocker Boards!
You might be surprised, because rocker boards may not yet be thought of as classic Waldorf toys. They are, in fact, a relatively new addition, but I’m confident that in very little time rocker boards will become synonymous with “Waldorf toys”—just like Waldorf playstands, Waldorf dolls, and play silks.
My Introduction to the Wonder of Rocker Boards
I’d been teaching early childhood classes in a Waldorf school for many years, but had never seen nor heard of this toy until one of my colleagues brought two of them back from the East Coast Waldorf Early Childhood Conference in 2006.
When I first saw this unusual plaything–a piece of high quality, thick plywood, about three feet long and one foot wide, curved into a perfect quarter-circle arc–I wondered how interested the children would be and what could be done with them.
I knew how beneficial rocking is for a child’s development: it stimulates the vestibular (balance) system and aids a child’s sense of proprioception (the awareness of being in one’s physical body). It seemed like a good toy for allowing rocking indoors.
I knew how important balance is for a child’s brain development, and it seemed like a good and possibly therapeutic toy for certain children.
Waldorf Wooden Balance Board | Rocker Board
What I didn’t yet know was how much children love this toy!
Rocker Boards in the Classroom
We introduced the rocker boards in our classroom in February of that year, and the children wasted no time in finding them and putting them to use.
I was amazed at all the ways they found to play with them. My limited adult thinking assumed that this was a toy for children to stand on, with one foot on either end, on which they could rock back-and-forth.
I didn’t yet realize it could be so much more!
Right away, these boards became the most popular toys in our classroom. They were the first toys the children would go to as soon as snack time was over and play time began.
Yes, children would stand on them and rock, but they found so many other uses for them:
• The rocker board would become a slide, with one end propped up on a Waldorf playstand.
• Tipped over, it became a bridge. The children would act out stories, like the “Three Billy Goats Gruff” and trip-trap over the bridge.
• It became a sailboat, carrying fishermen off to sea as they cast their nets.
• It was a pirate ship sailing through mighty storms.
• It was a cradle for a mama (a 5-year-old) to rock her baby (a 3-year-old) to sleep in.
Continue Reading
You Might Also Like
Waldorf Dolls
Breast Milk Baby Doll: Delightful or Disturbing?
Have you heard about the new Breast Milk Baby doll?
Well, lots, if you ask me.
Waldorf Dolls
You Might Also Like
|
global_01_local_1_shard_00001926_processed.jsonl/32044
|
Our RIDER 3.0 has won the OutDoor Industry Award gold prize. We spoke to our product developer Robert Krüger about our high-performance via ferrata set. He explains what makes the RIDER 3.0 so safe and how you use it.
Question: Robert, according to the OutDoor Industry Awards jury, the RIDER 3.0 is a major step forward in terms of via ferrata safety. Why does it stand out from other solutions?
With the RIDER 3 the fall distance is reduced significantly.
Robert Krüger: There are two reasons for this. Firstly, it is due to the significant reduction in the fall distance and, secondly, it is simple and convenient to handle and use. A special feature of the RIDER 3.0 is an integrated ascender. The clamping function reduces considerably the fall distance on the via ferrata. With a conventional via ferrata set the fall distance can be as much as 9.60 metres at worst; with the RIDER the distance is 3.80 metres. This is 60 percent less. The longer a fall, the greater also the energy impacting on the climber, the material and the climbing path equipment. Where the fall height is less the climber is less at risk of serious injury striking against the wall or the via ferrata components. The RIDER, therefore, reduces this potential fall distance and as a result – when used correctly – can help to prevent a heavy fall and injuries.
Question: And why is it so easy to use?
Robert Krüger: You carry the RIDER with you like a carabiner when climbing on a via ferrata. Unlike the carabiner, however, the RIDER always remains on a level thanks to the clamping mechanism. This makes via ferrata much easier to use – and faster too in certain circumstances. So, for example, when reattaching you no longer have to bend forward with your flex arm towards the second carabiner which has “shot down” away from you.
Question: How do I use the RIDER in the first place?
Grab in one hand and easy to open.
Robert Krüger: You use the RIDER like you would a via ferrata carabiner or one-handed opening mechanism, using the heel of the hand. You can grip the device with your whole hand and open it by pressing on the sides. This is a simple and highly ergonomic principle. The device has the advantage that it can also be handled by less experienced users and, of course, also with via ferrata gloves. You then put the RIDER on the cable and carry it with you like a carabiner – only with the significant advantage that the RIDER always remains on a level and cannot slip down like a carabiner.
What’s more, it is important that the RIDER is always wielded above the carabiner. In the event of a fall it cannot then be damaged by the plummeting carabiner. When using the RIDER it is necessary to take into account the correct running direction and the correct order when reattaching.
The RIDER should never be wielded above the carabiner.
Question: What else do I need to take into account when using the RIDER?
Labelling indicates how to position the RIDER on the cable.
Robert Krüger: You have to attach the RIDER in the correct running direction on the cable so that the ascender on the device also functions. Labelling on the top of the RIDER indicates how this works. The arrow must always face upwards when ascending or descending. Only then is it correctly secured to the cable.
Question: But you also mentioned reattaching. What is the necessary way to do it?
Robert Krüger: It all comes down to the right order! In order to provide protection to the RIDER, when reattaching on the via ferrata, uphill it is necessary to reattach the carabiner first at all times. Because should the climber fall when reattaching, he would fall into the RIDER and remain fully protected. In the event of a fall, on the other hand, where the RIDER is not fixed in the cable, the climber falls the entire distance to the next anchor with the carabiner. Downhill, first the RIDER must always be reattached and then the carabiner.
This is the correct order when reattaching: The carabiner is reattached first and then the RIDER.
Question: Can I use the RIDER on any via ferrata?
Robert Krüger: The RIDER is suitable for use on all via ferrata with a steel cable of 12 to 16 mm. This means that 90 to 95 percent of all via ferrata in Europe are covered. There are, however, climbing sites in which thinner and thicker cables, sometimes even chains are installed.
Question how can I determine the diameter of the cable?
Robert Krüger: In order to determine the diameter of the cable the RIDER is delivered with a gauge known as the “Cable Guy”. Using this it is very easy to determine the diameter of the cable.
The diameter of the cable can be determined with a gauge.
Question: And how can I use via ferrata which do not have a cable diameter between 12 and 16 mm?
Robert Krüger: By clipping a carabiner into the RIDER and using it like a conventional via ferrata set. This option can also be used for sections in which a chain, for instance, has been installed.
The best thing here is to use a twistlock carabiner. It can be used conveniently one-handed. But you must make sure that the carabiner opening points away from the cable or rocks.
Using a twistlock carabiner the RIDER is also suitable for thinner or thicker cables and chains.
Robert, thank you very much for the in-depth answers all about our RIDER 3.0.
|
global_01_local_1_shard_00001926_processed.jsonl/32070
|
Black Pearl Buce Plant Private Collection
Potted Bucephalandra
Family Name: Araceae
Endemic To: Borneo
pH: 6-7.5
Care: Easy
Light: Low to Medium
Co2: Not necessary but recommended
Propagation: Cut by rhizome
Growth rate: Slow
After a year of collecting and hoarding the hottest types of Buce, we're finally ready to release our private collection. Out of every batch of Buce received, we put aside some of the best specimen which are compiled into this ultimate collection. Quantities are limited so get 'em while they last!
Every portion is potted and grown fully submerged. After Buce has been grown submerged for some time, they develop new leaves which are sometimes referred to by Buce collectors as "water leaves". These water leaves are the ones that contain the intense red, blue and purple coloration that makes Buce so sought after.
$ 19.99
DOA Policy
Gift Cards
|
global_01_local_1_shard_00001926_processed.jsonl/32101
|
Episode 41: Big & Good: Will the Iron Triangle Allow for Both?
About Episode 41:
Conventional wisdom has it that small is good, but is this true? Can institutions of higher education be both big and good? In this episode, hosts Tom and Kelvin revisit the “iron triangle” construct as they explore the tensions inherent in pursuing both scale and quality.
Podcast Recording
Download Transcript: [PDF, RTF]
Episode 41 Show Notes:
Episode Synopsis via Twitter
View complete list of episode highlights via Twitter
Coffee Links
Content Links
Like what you see? Tell the world!
|
global_01_local_1_shard_00001926_processed.jsonl/32103
|
‘Annihilation’: A Mixed Bag of Mystery
March 19, 2018
The new science fiction thriller Annihilation takes place mostly inside something called “the Shimmer,” a mysterious phenomenon whose center seems to be a lighthouse struck by something from outer space. An alien craft? A meteor? Something else?
The government doesn’t know because when they send people and drones in, nothing comes back. To make matters worse, the Shimmer (which has an unsettling sort of oily polychromatic sheen to it, like a giant bubble) is growing in size and there seems no way to stop it.
Actually, one person did come back, barely: a man named Kane, husband to Army-soldier-turned biologist Lena (Natalie Portman). He’s soon hospitalized, near death from his experience. Lena volunteers to enter the zone with a group, partly out of curiosity and partly out of conviction that she can help save him. Whether by accident or design–it’s never quite clear–the team is made up entirely of women (there’s some reference to the fact that men have had little success inside, though why gender would change that isn’t discussed). The group is led by surly psychologist Dr. Ventress (Jennifer Jason Leigh), a paramedic (Gina Rodriguez), a geologist (Tuva Novotny), and a physicist (Tessa Thompson). Each of them brings their own expertise, backstory (or at least an outline of one, as much as the one-note characters are allowed), and corresponding personal problem to the mission.
For the first fifteen minutes of the film writer/director Alex Garland shoots Portman either backlit, in silhouette or in a haze. At first it seemed cinematic tic (not unlike J.J. Abram’s affinity for lens flare overkill), but eventually I realized that it’s to make the scenes inside the Shimmer less jarring, because they too are overlaid with a sort of faint rainbow glow. The film has elements of Stalker (the nearly three-hour 1979 Soviet film by Andrei Tarkovsky) and Contact (Jodie Foster in the film based on Carl Sagan’s book).
The script does a good job of making the Shimmer’s menaces murky, a situation I won’t clarify here. What’s going on is only gradually revealed, and it’s a scientific as well as an existential answer. Part of it has to do with the nature of life, identity, and humanity. The world seems suited to us humans because we evolved in it; there is nothing special or essential about our specific life forms. Had Earth developed a different atmosphere, or the sun been a little closer or farther away, we might not have evolved into sentient animals capable of telling stories or making films. To the universe, an Earth without humans is perfectly acceptable–and was the case for virtually all of its 4.5 billion years of existence.
The film’s special effects are striking and gorgeous, though its script fails to match its production values. The script is intentionally ambiguous about many things. If radio and other electronic signals don’t work inside the Shimmer for whatever reason, there are low tech ways to communicate and find out what’s going on inside the Bubble of No Return. The easiest would be to simply lay down an old-fashioned telephone, telegraph, or video cable as scouts progress into the interior (we see electronics working inside the Shimmer, so there’s no reason a wired landline wouldn’t work). Or even a series of cables could be set up with canisters (like the kind used at drive up windows at the bank) on pulleys. Information could be passed along with only a delay of an hour or two as the canisters zip back and forth through the porous barrier along a wire, updating each side on their progress and finding. Those in the Shimmer zone find themselves affected in several ways, including amnesia; oddly, upon realizing this the group doesn’t take steps to record or preserve their findings and discoveries, either for themselves later on, or for the outside world should they make it back.
There are other plot holes as well, though some–perhaps most–of the film’s unanswered questions are intentional. There are few clear, definitive answers at the end, so those who prefer neatly tied packages without loose ends are forewarned. I think it suits the plot; after all, a human experience with something that’s profoundly alien (in the general sense if not the extraterrestrial sense) would almost certainly be incomprehensible. Alien contact in movies is usually benevolent or hostile, but what’s going on inside the Shimmer is largely indifferent to humans. It’s a refreshing and thought-provoking take on the genre, and Annihilation has some interesting ideas, but they are often mired in metaphors that never really gel.
|
global_01_local_1_shard_00001926_processed.jsonl/32108
|
Faith, Norman Grubb, CT Studd
Today I give some background as to how I know Norman Grubb through another British missionary and street preacher Leonard Ravenhill, how I came across him and how the Lord lead me out of social-club style denominational Christianity towards truth and freedom of Christ as us. I include readings on Faith from ‘Summit Living’ selected readings from Norman’s books ‘Touching the Invisible’ and ‘After CT Studd’
|
global_01_local_1_shard_00001926_processed.jsonl/32119
|
HR How-To Online Series for Small Business
THE Only HR Guide You'll Ever Need
• Practical & ready-to-use editable templates
• Clear, concise instruction guides
• Video tutorials on each HR how-to topic
HR Made Simple
A fraction of the cost of employing HR managers or consultants.
Self Paced
Complete your HR tasks whenever it suits your schedule and needs.
Multiple Instructional Methods
HR Policies & Procedures
Establish Consistency to Support Your Business
Are you tired of the headaches from handling the same employee issues again and again? Human resources policies and procedures provide a framework and set standards that guide how employees perform jobs, make decisions, manage business operations, and much more.
This up-to-date, easy-to-use Setting HR Policies & Procedures module will guide you through the best practices on:
• How to clarify your company reporting structure & create an organizational chart
• How to develop employee policies & procedures
• How to create an employee handbook
• How to communicate policies & procedures to staff
This Setting Human Resources Policies & Procedures tool kit comes complete with 4 sessions, each with ready-to-use templates, and written and video instructions. Plus, it includes a sample employee handbook as an added bonus. Get your HR on track today.
HR Policies & Procedures
$299 Plus Tax
Add to Cart
Download the Complete All-in-One Bundle
& Get $500 in Savings!
Do You Want A Full HR Plan for Your Business?
$999 Plus Tax
Add to Cart
|
global_01_local_1_shard_00001926_processed.jsonl/32145
|
Jump to content
Ultimaker Community of 3D Printing Experts
Ultimaker mainboard
Recommended Posts
Good morning,
I'm stocking up spare parts for my UMO (not the plus) just for the case anything breaks and I'd need quick repair. Does anybody know whether it is possible to buy the main board 1.5.7 without stepper drivers and arduino?
In th UM shop I just see the entire board. In other shop I've seen the pcb but not as original (e.g. from sainsmart). Does anybody have experience with such non-original boards also or is it possible to buy just the original one?
The same actually about the steppers, bearings, and shafts, which I haven't seen anywhere yet.
Thanks for your help again!
Share this post
Link to post
Share on other sites
For shafts if you can, buy them on Misumi. But almost all the parts Ultimaker will sell them to you. Just drop them a ticket to support.ultimaker.com and they will give you a quote for the stuff you need (or what they can sell you).
Share this post
Link to post
Share on other sites
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Register a new account
Sign in
Already have an account? Sign in here.
Sign In Now
• Our picks
• How to 3D print with reinforced engineering materials
• 0 replies
• Like
• 12 replies
Important Information
|
global_01_local_1_shard_00001926_processed.jsonl/32165
|
Children of the Sun: an Interview with Max Schaefer
First things first: Stevo originally did this interview in 2010 for another website, but he figured there’s no harm in reprinting it (with permission) here, as the book and author haven’t really been heard of since.
Children of the Sun was the debut novel of Max Schaefer, acclaimed when it was published in 2010 for its methodically well-researched tackling of 80s South London nazi skins, Nicky Crane, and the bizarre dabblings of the more well-heeled members of the far right. Continue reading
|
global_01_local_1_shard_00001926_processed.jsonl/32188
|
Dell Support Canada
What Do You Mean By A Modular Dell Battery?
A modular dell is an additional battery which is meant to drive the auxiliary devices in Dell laptops. These auxiliary devices include the following:
• The CD/DVD Drive
• The USB Ports
• Externally connected units
These batteries are the first go out of power after a certain period of time. We might have accredited this unit for the longevity of the Dell laptops, but modular battery is not prevalent across every model of the Dell systems. However, it can be bought to add in to your devices.
|
global_01_local_1_shard_00001926_processed.jsonl/32197
|
How is the last last_login_time attribute determined?
In a user’s return values in the api, how is the last_login_time determined?
Is it an actual login to a client app? Last login to the website? Any clarification would be extremely appreciated. Thanks!
@Christopher, no matter login to a client app or the website.
@harris, Thank you for the response. I just wanted to also verify though if the host calls into their own personal meeting ID along with other attendees but does not use a computer or the website then it doesn’t get logged as a login, correct?
@Christopher, yes, correct
|
global_01_local_1_shard_00001926_processed.jsonl/32200
|
12.0313 ELRA News (correction)
Humanist Discussion Group ([email protected])
Tue, 24 Nov 1998 23:09:44 +0000 (GMT)
Humanist Discussion Group, Vol. 12, No. 313.
Centre for Computing in the Humanities, King's College London
Date: Thu, 19 Nov 1998 16:37:33 -0500 (EST)
Subject: ELRA News - Correction
>> From: <[email protected]>
European Language Resources Association
ELRA News=20
In the previous ELRA news, we announced the availability of the Chilean
Spanish FDB-250 speech database which included 250 speakers. Today, we are
happy to announce that this database has been increased with 257 more
speakers and is now offering a complete set of 507 speakers. Below the
description and prices of the modified database.
ELRA-S0054 Chilean Spanish FDB-500
This speech database gathers Spanish data as spoken in Chile. All
participants are native speakers. The corpus consists of read speech,
including digits and application words for teleservices, recorded through
an ISDN card. There is a total of 507 speakers (272 male, 235 female).
Each speaker pronounced a total of 24 utterances. The age class is divided
as follows: 33 speakers are less than 16 year old, 215 speakers are
between age 16 to 30, 207 speakers are between age 31 to 45, 51 speakers
are between age 46 to 60, and 1 speaker is over 60.
The callers spoke 74 different items in total:
=B7 isolated digits,
=B7 yes/no,
=B7 common application words.
The data is provided with orthographic transliteration for all 12,168
utterances including 4 categories of non-speech acoustic events. A phonetic
lexicon with canonical transcription in SAMPA is also included.
The speech files are stored as sequences of 8 bits 8 kHz A-law samples. Data
are stored in a SAM file format.
Price for ELRA members: 6,000 ECU
Price for non members: 10,000 ECU
Humanist Discussion Group
|
global_01_local_1_shard_00001926_processed.jsonl/32208
|
Dune - object file output is not using -output-complete-obj
I’m on 1.0+beta19.1 and my jbuild file contains the following:
(jbuild_version 1)
(executable (
(name react_ios)
(libraries (r2n2))
(modes (object))
(install (
(package react_ios)
(section lib)
(files (react_ios.o))
I expected the resulting object file to be fully linked. However, it seems like dune passes -c to ocamlopt in the following command (taken from jbuilder build --verbose):
ocamlopt -w -40 -g -I src/bin/.react_ios.eobjs -I src/flex/.flex.objs -I src/lib/.r2n2.objs -intf-suffix .ml -no-alias-deps -o src/bin/.react_ios.eobjs/react_ios.cmx -c -impl src/bin/react_ios.re.ml
It results in a react_ios.o file however it’s not fully linked.
@diml should have a look at this if he has the time. But looking at the tests for output-obj I see taht you’re not quite doing the write thing.
The object file you’re looking for is react_ios.exe${ext_obj}.
Thank you. You’re right. However changing it causes:
No rule found for src/bin/react_ios.exe${ext_obj} (context default.ios)
Probably because the modes were setup differently. The relevant mode those tests is native object.
Btw, what problem do you have with -c being passed? AFAIK that has nothing to do with the kind of object file you’re trying to produce.
Unfortunately, I’ve set the modes in the same way, i.e. (modes ((native object))).
I don’t have a problem with -c being passed per se, I wanted to give as much information as possible.
The various extensions are documented in the manual: http://dune.readthedocs.io/en/latest/jbuild.html#linking-modes.
-c is passed for compiling but not for linking.
For the second problem, it is because we don’t currently expand variables in install stanza, we need to change that.
Thank you. Expanding the extension manually worked.
I will create an issue regarding variable expansion in install stanzas.
|
global_01_local_1_shard_00001926_processed.jsonl/32212
|
The Comments widget allows exchanging comments between users. Comments in the list are sorted by date and have user avatars names of the authors. Users can edit or remove all their comments.
The widget can be used separately or as a part of another widget.
id:1, user_id:1, date:"2018-06-10 18:45",
text:"Let's deal with half of the points in the plan without further delays."
{ id:2, user_id:2, date:"2018-06-10 19:40", text:"Yes, let's do it." }
{ id:1, value:"Corvo Attano", image: "./common/imgs/corvo.jpg" },
{ id:2, value:"Daisy Fitzroy", image: "./common/imgs/daisy.jpg" }
Where to start
adjust adjusts the component to the size of the parent HTML container
bind binds components
blockEvent temporarily blocks triggering of ALL events of the calling object
callEvent calls an inner event
destructor destructs the calling object
disable disables the calling view (makes it dimmed and unclickable)
edit lets users edit a comment
getChildViews returns child views of the calling component
getFormView returns master form for the input
getMenu returns the view object of a context menu with actions
getNode returns the main HTML container for the calling object
getParentView returns the parent view of the component
getTopParentView returns top parent view
getUsers returns a DataCollections with users
hasEvent checks whether the component has the specified event
hide hides the view
isEnabled checks whether the view is enabled
isVisible checks whether the view is visible
load loads data from an external data source.
mapEvent routes events from one object to another
parse loads data to the component from an inline data source
resize adjusts the view to a new size
setCurrentUser sets the current user from whose name the comments will be sent
show makes the component visible
unbind breaks "bind" link
onAfterAdd fires after a comment has been added
onAfterDelete fires after a comment has been deleted
onAfterEditStart fires after editing of a comment has begun
onAfterLoad fires after data loading is complete
onBeforeAdd fires before a new comment is added
onBeforeDelete fires before a comment is deleted
onBeforeEditStart fires before the user starts editing their comment
onBeforeLoad fires immediately before data loading has started
onBeforeMenuAction fires before a menu option is chosen for a comment
onDestruct occurs when component destroyed
animate defines the configuration of view change animation or disables it
borderless used to hide the component borders
currentUser sets the user who sends the comments in a certain instance of the app
data JavaScript array containing data for the component
datatype the type of loaded data
disabled indicates whether an item is enabled
format defines the format of dates
gravity sets the view gravity (1 by default)
height sets the height of the component
hidden defines whether the view will be hidden initially
id the ID of a widget
listItem defines a custom template for comments
maxHeight sets the maximum height for the view
maxWidth sets the maximum width for the view
minHeight sets the minimal height for the view
minWidth sets the minimal width for the view
mode defines which comments are loaded first (oldest or latest)
moreButton defines the label on the "More comments" button
on allows attaching custom handlers to inner events of the component
readonly enables the read-only mode
sendAction defines the key or a combination of keys that send a comment (Enter or Shift+Enter)
type defines the layout borders
users defines the list of users that can add comments
width sets the width of a widget
$getSize returns the current size of the component
$height the current height of the view
$onLoad default action on data loading
$setSize sets the component size
$skin the method which will be called when skin is defined
$view reference to the top HTML element of the view
$width the current width of the view
config all options from the initial component configuration
Back to top
|
global_01_local_1_shard_00001926_processed.jsonl/32230
|
Over a million developers have joined DZone.
Is Your Stream Processor Obese?
DZone's Guide to
Is Your Stream Processor Obese?
We discuss the factors that typically lead to larger deployments, effective lower-footprint alternatives, and decision criteria on how to choose the right approach.
· Big Data Zone ·
Free Resource
Is Your Stream Processor Obese?
While selecting tools for our systems, we often look up to Google, which runs an impressive system with scale and availability we can only dream of. Google’s use cases are, however, different from ours. As Ozan Onay starts his article "You are not Google," the designs used by large digital businesses, such as Google, are pleasing to the eye and look impressive to fellow architects, but they have a higher total cost of ownership and are filled with YAGNI (you aren’t gonna need it) features. There is “scale-envy” at work.
Consequently, development teams sometimes select tools and deployments that scale too well. Unfortunately, those systems provide much less performance per unit than some less scalable systems. For example, assume your system needs 5K TPS (transactions per second). You might choose to build a system that can scale to 50K TPS even if such a load is unlikely, leading to over-engineering. The truth is that a 10X load is a good problem to have if it ever happens since it will likely bring in 10X more revenue as well. However, at that point, you can afford to replace everything. There’s no need to waste resources upfront on an unlikely scenario.
As more companies turn to stream processing, the tendency to over-engineer is once again rearing its head. Even a simple deployment tends to incorporate six or more servers. This article discusses the factors that typically lead to larger deployments, effective lower-footprint alternatives, and decision criteria on how to choose the right approach.
High Availability Drives Stream Processing Bloat
A primary factor driving stream processing deployments is the fact that high availability (HA) and recoverability from failures are indispensable features for most stream processing use cases. Since stream processing applications run forever without stopping, they must fail eventually when the inevitable system crash happens. When they do fail, the application’s state (e.g. data in a window) will be lost unless the application is highly-available and recoverable.
The best-known approach for achieving HA is to use a Zookeeper distributed coordinator service. The system keeps a consistent view across all nodes and takes snapshots. If one node fails, other nodes can continue the processing. This approach is used in most well-known stream processors, such as Apache Storm, Apache Flink, and Apache Samza. However, because a minimal, highly available, and recoverable deployment with the Zookeeper approach requires a minimum of five nodes, these systems present a weakness in anything less than a large deployment.
Let's get into the details for Flink, Storm, and Samza. The main culprit is Zookeeper, where a setup needs 3-5 nodes [1] and the minimal HA setup is 3 nodes.
Apache Flink: A minimal setup, as per their docs [2], will require 6 or more nodes, including:
• 3 Zookeeper nodes.
• 2 job managers without Apache Hadoop YARN and 1 job manager with YARN.
• Worker nodes.
Apache Storm: HA is possible with Nimbus and as per its docs [3], a minimal deployment needs at least 7 nodes, including the following:
• 3 Zookeeper nodes.
• 2 Leaders.
• Nimbus supervisor.
• Worker nodes.
Apache Samza: Samza depends on Kafka, which depends on Zookeeper. As per the docs [5], Kafka needs three nodes. Hence, a Samza minimal deployment needs 5-8 nodes total, including:
• 2 Samza nodes.
• 3 Kafka nodes.
• 3 Zookeeper nodes.
With these stream processors, even very small loads will require a 5- to 8-node deployment. Is it a big deal? Ask your DevOps team. After 3 nodes, the complexity of deployment and monitoring increases significantly. Managing such systems often demands dedicated resources that monitor those systems.
Unfortunately, many teams will only realize this at the last stage of their evaluation when they consider HA and recoverability. A single node version that they try in the quick start of each product does not have this problem. But it does not have HA or recoverability either. Unfortunately, by the time many users come to this realization, they have already invested both time and identity into the technology. So they rarely back out.
A Lighter Approach to High Availability
A lesser-known approach to HA is to run two stream processors side by side as shown in the picture below. Both processors consume the same events. The master produces outputs and the slave discards its outputs. If the master fails, the slave already has all the information to continue and takes over as the master. With this approach, two servers can produce more than 50-100k events per second. The reason this is not well known is that it is not scalable beyond two nodes.
HA with Hot-Warm Deployment
A Rational Way to Make the Choice
Some organizations may require the scalability provided by the Zookeeper approach. However, many more enterprises will have use cases that are well served by running two stream processors in parallel.
To determine the right approach and size for your organization, first, approximate the load you are anticipating. In my years of working with Fortune 500 companies, I have rarely seen them handling a load that exceeds 5,000 TPS (assuming 157.68 billion messages per year with 1KB messages and 157TB of data).
Then think of a reasonable limit over which you can justify redoing the deployment. Often 3X more traffic means 3X new revenue, providing the necessary validation to update the deployment.
If you can handle the load and a reasonable multiple against the limit with two nodes, go for the side-by-side approach. Later, if you want to scale, a stream processor that supports the side-by-side HA approach can run on top of Kafka and scale just like other stream processors. You can start small and later switch to Kafka without changing any code. Chances are that you will save some serious money and have some peace of mind.
That said, there will be some cases where the high degree of scalability required will justify investing in the Zookeeper approach. The important thing is to look before you leap into a complex deployment with five-plus nodes.
I hope this was useful. I am a contributor to WSO2 Stream Processor, which is an Apache-licensed, open source, stream processor. It can process 100K+ events using two nodes with HA. It’s tuned for small and medium size use cases. Please check it out if you are interested. Notably, this is not the only stream processor that can do the same. See this Quora Question for a list of other stream processing servers.
Dave Ramsey notes, “We buy things we don't need with money we don't have to impress people we don't like.” But we don’t have to keep feeding into that reality when a robust, lean alternative for high availability stream processing is readily available.
1. Deploying ZooKeeper, https://hadoop.apache.org/docs/stable/hadoop-project-dist/hadoop-hdfs/HDFSHighAvailabilityWithNFS.html#Deploying_ZooKeeper
2. Flink: Standalone Cluster High Availability, https://ci.apache.org/projects/flink/flink-docs-release-1.3/setup/jobmanager_high_availability.html#standalone-cluster-high-availability
3. Highly Available Nimbus Design, http://storm.apache.org/releases/current/nimbus-ha-design.html
4. Apache Storm: Highly Available Nimbus Design, https://scalr-wiki.atlassian.net/wiki/spaces/docs/pages/75071490/Deploying+a+Kafka+cluster
5. Configuring High Availability and Consistency for Apache Kafka, https://www.cloudera.com/documentation/kafka/latest/topics/kafka_ha.html
stream processing ,real-time analytics ,high availability ,scalability ,big data
Opinions expressed by DZone contributors are their own.
{{ parent.title || parent.header.title}}
{{ parent.tldr }}
{{ parent.urlSource.name }}
|
global_01_local_1_shard_00001926_processed.jsonl/32232
|
Victor Frankenstein And His Monster Horror Films English Literature Essay
For centuries, Mary Shelley ‘s Frankenstein has become the image of horror, monsters, and huffy scientists. Peoples all over the universe know of Frankenstein as being a wicked monster created by a huffy scientist, but how much of this monster really reflected its Godhead? Can one individual be so haunted with his creative activity, that his end merchandise is a contemplation of himself and his ain life? The reply is yes. Victor Frankenstein and his monster, the hero and the adversary, are one in the same, based on Frankenstein ‘s early childhood relationship with his parents.
Harmonizing to Lee Zimmerman, “ Early on in Mary Shelley ‘s Frankenstein ( 1831 ) , Victor Frankenstein tells Captain Walton: ‘No human being could hold passed a happier childhood than myself. My parents were possessed by the really spirit of kindness and indulgence ‘ ( 43 ) . But is what he says true? Is Victor ‘s claim borne out by the inside informations of his narrative? I would wish to suggest that it is non, that it is idealized and defensive, and that merely as the monster suffers from parentlessness, so excessively does Victor, who is his dual. The monster ‘s narrative of emotional forsaking is Victor ‘s narrative ” ( Zimmerman 135 ) .
He goes on to state that although many people would n’t blow their clip reasoning the fact that Frankenstein and his monster are one in the same, giving that the common position, “ As George Levine puts it, ‘the hero and his adversary are one ‘ ( 1973, 209 ) and ‘the monster can be taken as an look of an facet of Frankenstein ‘s ego. . . re-enacting in mildly cloaked ways, his Godhead ‘s feelings and experiences ‘ ( 209-10 ) . But this penetration has non informed most readings of Victor ‘s early life. Indeed, a chorus of responses-all noteworthy plenty to be collected in the Norton Critical Edition ( Hunter 1996 ) of the novel-despite their differences, unites in taking Victor ‘s glowing study at face value. Strikingly, Levine himself writes that ‘Frankenstein ‘s male parent. . . in caring for him, behaves to his boy as the monster would hold Frankenstein act ‘ ( 211 ) . Christopher Small sees in Victor ‘s upbringing an ‘atmosphere of perfect love, harmoniousness, and parental indulgence ‘ ( 1972, 102 ) , and he calls Victor ‘s male parent ‘benevolent. . . wise. . . wholly un-authoritarian ‘ ( 103 ) . For Sandra M. Gilbert and Susan Gubar, Victor ‘s ‘Edenic childhood is an interlude of prelapsarian artlessness in which, like Adam, he is sheltered by his benevolent male parent ” ‘ ( 1979, 231 ) ; while for Mary Poovey he is ‘the boy of loving, protective parents ‘ who provide the ‘harmony of his childhood ‘ ( 1984, 122 ) ; and for Ellen Moers he experiences ‘doting parents ‘ ( 1976, 98 ) . Typifying the manner that Victor is frequently contrasted with his two-base hit in this regard, Barbara Johnson sees the novel as ‘the narrative of two antithetical manners of rearing that give rise to two progressively parallel lives-the life of Victor Frankenstein, who is the darling kid of two doting parents, and the life of the monster. . . who is instantly spurned and abandoned by his Godhead ‘ ( 1982, 242 ) ” ( Zimmerman 135 ) .
Zimmerman states that, “ My attack to the monster ‘s narrative of want as a two-base hit of Victor ‘s ain is inflected by a peculiar psychoanalytic manner of thought. Traveling against the grain of Freudian and Lacanian readings, I invoke an object dealingss perspective that explores the centrality of an baby ‘s early experiences with primary caretakers and of the intense feelings of love and hatred that, even on the surface, are the chief concern of Frankenstein. 3 Although Melanie Klein pioneered the impression that the ego is constituted by intense early relationships, it was D. W. Winnicott, following the lead of W. R. D. Fairbairn, who stressed how the peculiar “ facilitating environment ” shapes these relationships. By, at the beginning, back uping the baby ‘s feeling of omnipotence without prematurely abrogating it, and by showing the external universe with a flexibleness that accommodates the baby ‘s creativeness instead than excessively rigidly or hurriedly enforcing “ world ” -by acknowledging, in short, the genuineness of the baby ‘s being-the parents help to represent a mediating “ possible infinite between the person and the environment ” ( Winnicott 1967a, 100 ) . This transitional kingdom helps “ the person engaged in the ageless human undertaking of maintaining interior and outer world separate yet interrelated ” ( Winnicott 1953, 2 ) . The baby ‘s temperament is of import, but for Winnicott much depends upon the kid ‘s earliest dealingss with others who may react either in a “ good-enough ” manner that allows his or her “ true ego ” to emerge or by enforcing stiff constructions that leave the kid in a “ false ” place, caught between an endangered inner universe that ca n’t be made known and an unresponsive external universe that refuses to cognize it ” ( Zimmerman 135 ) .
Because Zimmerman takes this psychoanalytic attack to associating Frankenstein to his monster, we have to look at a much deeper significance behind the similarities of the scientist and his creative activity. So we come to the point of inquiring ourselves, is the writer ‘s life of this mastermind novel being portrayed through Victor Frankenstein? Harmonizing to Laura P. Claridge, the three people, Shelley herself and her two characters, are in fact one in the same, “ Surely no 1 needs to be reminded that Frankenstein is a book mostly evocative of Mary Shelley ‘s ain troubled household relationships ; and in support of the point, one demand merely turn to George Levin and U.C. Knoepflmacher ‘s first-class aggregation of essays, The Endurance of Frankenstein, to happen the affair good documented. That an writer ‘s life becomes translated into her fiction is barely intelligence on any history. But what has someway eluded proper intervention is the attendant existent topic of this “ monster narrative ” : the failure of human existences to “ parent ” their progeny in such a manner that they will be able to take portion in society instead than withdraw into themselves. An accent upon the proper premise of parental duties was portion of the age: Maria Edgeworth and Hannah More had, through their educational treatises, influenced Walter Scott ‘s Waverley subjects, and Mary Shelley in bend bowed in his way by leting her hubby to direct him presentation volumes of Frankenstein the month the novel was published anonymously. The romantic pedagogues typically placed the incrimination for an stripling ‘s misconduct at the door of a negligent ( though frequently well-meaning ) parent. Shelley herself subtly indicts Victor ‘s parents in precisely this manner ; and she suggests an even subtler subtext of household struggle in the letters Walton writes to Margaret ” ( Claridge 14-15 ) .
She goes on to state that, “ Readers have rather right assumed the statement in Shelley ‘s foreword, ‘my head concern has been to exhibit the affability of domestic fondness and the excellence of cosmopolitan virtuousnesss ‘ to be a cover-up ; but in imputing to Mary Shelley a demand to deny the ugliness of a bloodcurdling vision they have missed her existent blind. She will so concern herself with ‘domestic affection’-but more exactly, the deficiency of it, and how such a deficiency undermines ‘universal virtuousness. ‘ In Shelley ‘s attending to parent-child relationships, she implies a far runing application to society at big: if we fail at this most cardinal unit of communicating, what hope is at that place for compassionate interaction within the larger community? Shelley insists that adult male can populate merely through communicating with others ; purdah, for her, represents decease. Through his continual hyperboles of familial love, Victor Frankenstein reveals to us the insufficiency of the place life that belies his oft-fevered Protestants of fond regard. Possibly the inevitable ambivalency refering our ain childhood creates a suspension of critical sharp-sightedness in our reading our Victor ‘s narrative, but a close survey of the text undercuts badly his insisting upon the perfect place ” ( Claridge 15 ) . We see this in the novel when he refers to himself, speaking about his parents as, “ their toy and this graven image ” ( Shelley 33 ) . We besides see an illustration of this when Victor is speaking about his remembrances of his parents ‘ relationship when he amendss his dependability excessively far when he says, “ every hr of my infant life I received a lesson of forbearance, of charity, and of self-denial ” ( Shelley 34 ) , which is precisely what he lacks in the novel.
Claridge continues to state that, “ The demand to win blessing from judgmental parents can at times compel the kid toward excellence ; but it can besides be perverted into black extremes, in which the kid transforms his Promethean aspirations for success into those of overreaching and exceling his parents at the cost of everything else. Victor has determinedly planned that ‘a new species would bless me as its Godhead and sourceaˆ¦.No male parent would claim the gratitude of his kid so wholly as I should merit theirs. ‘ That after the ‘birth ‘ he feels ‘guilty of a offense ‘ comes, hence, as no surprise to us-he has usurped his male parent ‘s topographic point in the hierarchy. No admiration so that he finds his interior ego ‘in a province of rebellion and convulsion ‘ ( p. 48 ) . His male parent had taken great safeguards to guarantee that his boy contempt supernatural horrors ( p. 55 ) ; yet, irrespective of his disclaimer of duty for his creative activity, Frankenstein intentionally chose the signifier for his animal that was certain to arouse the most horror and apprehension in other mortalsaˆ¦.Victor compensates for the sense of littleness his male parent has imparted by assuming his parents ‘ power as Godheads, but besides by publishing Forth a kid whose physical nature will be inferior, in size, to no 1. He acts out his choler at his household in an effort to confirm his ain selfhoodaˆ¦.He recognizes from his offspring ‘s first homicidal act that the monster ‘s devastation is his ain: ‘I was the true liquidator ‘ ( p. 89 ) . By the terminal of the novel, he has acknowledged that he is responsible for all the deceases. He admits, ‘I abhorred the face of manaˆ¦.I felt attracted even to the most abhorrent among themaˆ¦ . ‘ ” ( Claridge 18-19 ) .
Suzanne Storment writes, “ One may besides see the dichotomy of Victor Frankenstein and his monster as an even greater force. Frankenstein and his creative activity may even stand for one being — two sides of a individual entity organizing a doppelganger relationship. However, it is hard to decode which represent good and which represents immorality — the adult male or the monster. One would ab initio presume the monster is the immorality, yet it is Dr. Frankenstein who creates the monster and so fells from the duty. His cowardliness non merely leads to the decease of his younger brother, but besides to that of the immature miss accused of his slaying. The monster, in fact, has minutes of great mind and reason. He even acts as somewhat of a witting of Frankenstein ‘s. Because of Victor ‘s selfish and evil actions, the monster haunts him infinitely. Inevitably, Victor ends up in a hellish, waste barren being chased by his ain creative activity. As written before, electricity holds the power of magnetic attraction, or a impulsive force. The early surveies of magnetic attraction were straight related to star divination and unknown forces on people. This survey does non look wholly unrelated to Frankenstein. First of all, Dr. Victor Frankenstein feels uncontrollably compelled to make life in the lifeless organic structure. He can see the desolation his creative activity will do in the hereafter to him, yet he does it anyhow. It is as if he is fated to make the monster. This deficiency of control may come both from the evil inside him, every bit good as outer forces of the universe. Victor Frankenstein seems to be a tragically flawed character. ” ( Storment 1 ) .
Both Victor and the monster are cognizant that cognition is unsafe and is n’t ever used in the right manner, “ Like Victor, the monster comes to see cognition as unsafe, as it can hold unanticipated negative effects. After recognizing that he is dreadfully different from human existences, the monster calls, “ Of what a unusual nature is cognition! It clings to the head, when it has one time seized on it, like a lichen on the stone. ” Knowledge is lasting and irreversible ; one time gained, it can non be dispossessed. Merely as the monster, a merchandise of cognition, spins out of Victor ‘s control, so excessively can knowledge itself, one time exposed, create irreversible injury ” ( Sparknotes 1 ) .
Zack Grimm writes, “ Scientist and pedagogue Stephen Jay Gould wrote, in his paper titled “ The Monster ‘s Human Nature ” that ‘Mary Shelley wrote a moral narrative, non about hubris or engineering, but about duty to all animals of feeling and to the merchandises of one ‘s ain manus. ‘ Mary Shelley consciously and accurately defends this premise by Gould in her linguistic communication throughout the novel, and at the same clip she creates within the reader an apprehension of this witting determination she made, and besides allows readers to see her linguistic communication picks through the lens of its deductions toward the morality of scientific discipline, the deductions of scientific discipline ‘s effectivity in England ‘s society. Rather than making this outright, Shelley creates a narrative in which the linguistic communication speaks otherwise, speaks against utilizing scientific discipline for good purposes, and readers are so left to look at the novel in footings of their ain intestine feelings, much of those feelings being 1s of uncomfortableness and uncertainty of Victor Frankenstein ‘s purposes toward his creative activity of the “ being, ” whom finally goes about his new universe as he does because Victor himself does non swerve from his mental picks of how he does n’t see the scientific effects of his actions during the monster ‘s creative activity ” ( Grimm 1 ) .
Not merely do we see that Victor and his monster are the same through the fact they have strained parent-child relationships, or farther, no parent-child relationship, we see in both of them their hungriness to larn. Gao Ding En writes in his article, “ As the reader progresses through the novel, this correspondence is seen between Frankenstein ‘s personality and that of the monster in their thirst for cognition, lecherousness for retaliation, and grasp of nature. Victor Frankenstein ‘s ambitious nature was what initiated his eventual ruin ( Gao Ding En 1 ) . Ever since he was a kid, his, “ ” temperature [ was ] turned, non towards infantile chases, but to an eager desire to learnaˆ¦ ” ( Shelley 33 ) . Gao Ding En goes on to state that, “ Victor Frankenstein stumbled across a volume of Cornelius Agrippa ‘s books, a celebrated alchemist in older times. The books shaped how Frankenstein perceived the universe, making his love for natural doctrine. This thirst for cognition drove the immature adult male to travel to the University of Ingolstadt to analyze the scientific disciplines. There he non merely down natural doctrine, but besides endeavored to derive cognition from his wise mans in chemical science and mathematics, going ‘a adult male of scientific discipline ‘ that Dr. Waldman had described ( 43 ) . Likewise, Victor Frankenstein ‘s creative activity, the monster, has this same hungriness to larn. From the really beginning of his being, the monster had a desire to understand constructs and thoughts. For illustration, when Felix and Agatha were teaching Safie in French, the monster immediately realized that he ‘should do usage of the same instructions to the same terminal ‘ ( 105 ) . This ambitious nature served him good, for subsequently on he chanced to come across Paradise Lost, a volume of Plutarch ‘s Lifes, and The Sorrows of Werter, which opened his head to the huge pools of cognition those books had to offer. In a manner, this enlightenment shaped how the monster perceived the universe around him, merely as the plants of Cornelius Agrippa had done with Frankenstein. While Frankenstein and the monster had the dream to get cognition, this cognition in clip led to their shared lecherousness for retaliation, which finally destroyed them both ” ( Gao Ding En 1 ) .
As you can see author Mary Shelley lived out her childhood through her character Victor Frankenstein, who in return, lived out his misled childhood through his horrid creative activity of a monster. Through the novel and other research workers, we can see that Victor Frankenstein and his monster are one in the same and larn that cognition is n’t ever good, and that retaliation and lust gets you nowhere.
Leave a Reply
|
global_01_local_1_shard_00001926_processed.jsonl/32233
|
Home History of Kazakhstan Ancient Kazakhstan Tribal alliances and early states on the territory of Kazakhstan Saka tribe during the Early Iron Age
Saka tribe during the Early Iron Age
27 August 2014
We do not have a complete view of the languages used by people of the Early Iron Age. Linguist and historians believe that the majority of the population of Central Asia and Kazakhstan spoke the Eastern Iranian languages and dialects separated from the Indo-Iranian language group approximately at the beginning of the 1st millennium B.C.
Scientists know other groups of the Indo-European language differing from the Eastern Iranian language in Western Turkestan, for example so called Tokharian language.
Population of the Northern parts of Kazakhstan during many centuries felt the full impact of another language family which is called by linguists “Finno-Ugric”.
It is quite likely that one part of inhabitants of the Eastern parts of Kazakhstan was acquainted with proto-Turkic language which native speakers were Altai tribes.
Material culture and social order of Saka’s tribes on the territory of Kazakhstan was similar to the tribes of the Southern Siberia as well as to the Scythian lived in the steppe areas at that time. The similarity was so evident that many Greek Authors called them Eastern Scythians.
That is not surprising: mobility of nomadic life, permanent contacts between the steppe tribes of Europe and Asia, joint participation of Sakas and Scythians in campaigns in the countries of Western Asia contributed to the appearance of many common elements in material culture.
States of irrigative farming repeatedly undertook military campaigns against their Northern neighbors and at the same time were often attacked by them. Ancient authors who lived there mentioned military character of organization of Scythian-Saka society: high mobility of the army, broad application of cavalry and original battle tactics.
Herodotus explained the reasons of military success of Northern nomads in such way: “Among other known nations the Scythians have one but the most important art for the human life. This lies in the fact that no one enemy attacked their country the Scythians do not give a chance to escape; and no one can catch them without their allowance. The Scythians do not have cities and fortifications; they carry their dwelling with them. All of them are horsed archers and make a living by cattle-breeding; they live in nomad tents. How can such nation not to be overwhelming and impregnable?”
The glory about Saka’s archers lasted long enough. Indeed, the most frequent finding in Saka’s burials is the arrowhead. During many centuries they were made of bronze.
Bows and arrows of Scythian and Saka warriors had relatively small size. Usually the length of the arrow was equal to the height of bow which was less than 0,6-0,8 meters. Only at the turn of the Christian era Scythian bow gave way to bigger so called Huns’ bow which size reached 1,2-1,6 meters.
In the 3rd-2nd centuries B.C. bronze arrowheads were displaced by iron heads.
Another weapon of Saka tribe was bronze and since the 5th century B.C. iron akinake — short double-edged sword.
Agapov P., Kadyrbayev M. (1979) Treasure of ancient Kazakhstan, Alma-Ata: Zhalyn. 252 p. (in Russian)
To leave comment you must enter or register
|
global_01_local_1_shard_00001926_processed.jsonl/32244
|
How the History of Poindexter Village Challenges Popular Stereotypes about Public Housing
A surprising array of critics from both the political left and right agree that public housing as built has next to no redeeming features. These places are written off as havens of crime and poverty. But this is false. Like communities across the United States, the history of Columbus, Ohio’s first and all-black public housing development Poindexter Village reveals a strikingly different story. On the city’s Near East Side, African-Americans formed a neighborhood in the face of segregation, built housing, created a vibrant and supportive community, and even challenged the popular notion of historic preservation.
Human Rights In Transit (Podcasts)
I had the Best Childhood: Growing up in Ohio Orphanages in the 20th Century
In the course of the twentieth century hundreds of thousands of American children spent part of their childhood in orphanages or children’s homes across the country. Modern understandings of life in such institutions are typically negative, associating orphanage life with the hardships encountered by fictional characters such as Oliver Twist and Orphan Annie. Surely, growing up outside the family was associated with trauma for many children, but the reality of orphanage life was often more complex. Based on 200 oral history interviews, this talk explores the experiences of more than 200 individuals who grew up in Ohio orphanages between 1920 and 1995. How do these former orphanage children recall their childhood? What is it like to come of age in an institution? Surprisingly, many of these individuals had very fond memories of their early lives, sometimes claiming that their childhoods had been close to ideal. Why did they think so? And what can we learn from their experiences that might influence present-day child welfare policies?
In Memory of the Courageous Women Who Died from Illegal Unsafe Abortions
The eHistory MultiMedia Course Projects were developed by students in Professor Judy Wu's History course 525 in 2008 and 2009. In the early days of abortion, unsafe procedures set early feminists in opposition to the idea. However with advancements in medicine that preserved the woman’s health, feminists became the back-bone of the pro-choice movement.
Is Google Making Us Stupid? A Deep History and Future of the Internet
In a 2008 article in The Atlantic, Nick Carr famously asked “Is Google Making Us Stupid?” and wondered specifically what deleterious effects the Internet is having on our brains. Carr argued that the Internet is making us incapable of sustaining the attention necessary to read long-form articles and books. He also points to evidence which suggests that using the Internet is rewiring our brains.
Is the Future of Revolution Feminist?
Presented by Prof. Valentine Moghadam, International Affairs and Sociology, Northeastern University at the Center for Historical Research in the Dept. of History at Ohio State University on Feb. 9, 2018.
Legacies of the Great War (a History Talk podcast)
December 2017 marked the 100-year anniversary of U.S. entry into World War I. But, as the world commemorates the centennial of the war, U.S. events have been few and far between. Why is the war remembered so differently in Europe versus the United States, and what legacies might we be forgetting?
|
global_01_local_1_shard_00001926_processed.jsonl/32252
|
10 Jun
CORS your dev environment for Node.js and React.js
Building a Node.js and React.js full stack app can have its tooling annoyances, one of which is getting the Node.js server to allow your requests in from your webpack-dev-server hosted React app, which is going to be running on a different port than your Node application. There are many ways to develop around this, but this article covers what I find effective when my development environment starts out looking like the image below.
Why this happens
The Node server is doing its job well. It is preventing a call to an API endpoint from a different machine, about which it knows nothing. The Node server is guarding against a cross-site scripting attack.
Good job! But, a PITA while developing.
A static solution
Some developers just configure their client application to webpack –watch and build the client code into the Node server’s public directory. This means anytime the React.js code changes, it gets built into the Node.js server path where it will be served for production.
While this technique works, it means manually refreshing the page being served up by Node.js when my React code updates. What a pain, right? Who can stand this manual refresh business? Obviously we can’t live with this solution : )
A more reasonable solution
Middleware can be plugged into the express app in the Node server to allow these cross-site requests. Done manually, this typically looks like the following.
var allowCrossDomain = function(req, res, next) {
res.header("Access-Control-Allow-Origin", "*"); // allow requests from any other server
res.header('Access-Control-Allow-Methods', 'GET,PUT,POST,DELETE'); // allow these verbs
res.header("Access-Control-Allow-Headers", "Origin, X-Requested-With, Content-Type, Accept, Cache-Control");
app.use(allowCrossDomain); // plumbing it in as middleware
This code could get some sort of config flag around it for production, or better still, get removed for production. In production, after all, we’ll be serving up the React app from the Node server and client requests can be made to endpoints without a servername: /api/foo_endpoint.
I found an npm package called “cors” designed to simplify and even wrap up this problem. It does far more than solve for my development scenario, and the GitHub site for cors shows its many other uses. It is highly configurable an is useful for guarding even single endpoints. The additional functionality is well documented in the repo. That said, the default options solve my little problem quite handily and save me the tedious task of looking up all that header syntax when I spool up a new Node app.
Thanks to the contributors of this very useful middleware.
Now, it’s time for me to get back to coding.
3 thoughts on “CORS your dev environment for Node.js and React.js
Comments are closed.
|
global_01_local_1_shard_00001926_processed.jsonl/32253
|
Log in
No account? Create an account
19 September 2005 @ 09:30 am
The One with the Fungus of Youth and the Sex-Change Machine
"Posts I've been meaning to make...."
And then, I almost forgot, there's the story with this dialogue that I'll never write:
"I realized something today." Rodney shifted away and stared at the ceiling. "I'll never be able to resume my career. I mean, I could publish but I'd have to become a recluse. Dr. Rodney McKay, the J.D. Salinger of astrophysics."
"That would suck." John was quiet a moment, then said, "You know, the government could give you a new identity."
"'The government.' I love how you say that as if there's only one."
"The Canadian government then."
Rodney made a grumpy blatting noise like a failure buzzer on a game show. "Sorry, you should have said, 'The Canadian government, of course'. But it's not a bad idea." His tone turned musing. "I wonder if I could persuade people that I'm my own daughter."
"Oh, hey--you could spell your name R-a-h-d-n-e."
"Cute. Why not i-e. Then I could dot the "i" with a little heart."
John rolled onto his side to gaze at him, suspecting he'd just missed an eye roll. "You know, by the time we get back and re-settle on Earth, the program might have gone public."
"The SGC comes out of the closet. Those odds are about as good as a colonel coming out in the military."
John glared at him for the unfairness--it was at least halfway unfair--but it was lost on the other man, who continued talking past the moment when John might have rejoined with indignation.
"Even if they did," Rodney said, "I don't think it'll further my reputation to become known as 'That guy who got rejuvenated by a fungus and sex-changed by alien technology.'"
"Valid point," John admitted.
nestra on September 19th, 2005 04:41 pm (UTC)
What? No! You have to write it! To save the world!
Moxie Brown: Some Like it Hotmoxie_brown on September 19th, 2005 05:06 pm (UTC)
Oh man, that totally presses my secret fandom shame button. I love gender swaps!
Sandysp23 on September 19th, 2005 05:17 pm (UTC)
Uh. ::sputters:: Yes, I think you must write this just so you can change Rodney back in the end before I wake up with screaming nightmares of Rodney and John being a het pairing! *g*
cathexys: smug (by kormantic)cathexys on September 19th, 2005 05:31 pm (UTC)
even if you don't write it, thanks for sharing this little glimpse into that cracktastic universe...i adore gender swap stories!!!
Mishaunmisha on September 19th, 2005 05:31 pm (UTC)
So Rodney's not only been sex-changed, he's been de-aged? A perky early-twenties girl? *snerk*
He's not quite old enough to pass himself off as his own love child, unfortunately. That would be a way to toot his own horn and establish his genius early. "Of course I'm a genius, it's genetic! My father was just as brilliant as I am!"
Anna S.: dh-young-maneliade on September 19th, 2005 05:35 pm (UTC)
Well, if he is (or had been) 37 and his younger self was 17...? *g*
Mishaunmisha on September 19th, 2005 06:24 pm (UTC)
Hee! And then of course John's robbing the cradle!
deaverdeaver on September 19th, 2005 07:26 pm (UTC)
Gah! Best dialogue EVER! Seriously. Now I'm going to be all obsessed with girl!Rodney all day. Darn you....
|
global_01_local_1_shard_00001926_processed.jsonl/32266
|
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
General view
General view
Livadeia is located in Greece
Location within the region
2011 Dimos Levadeon.png
Coordinates: 38°26′N 22°52′E / 38.433°N 22.867°E / 38.433; 22.867Coordinates: 38°26′N 22°52′E / 38.433°N 22.867°E / 38.433; 22.867
Administrative regionCentral Greece
Regional unitBoeotia
• Municipality694.016 km2 (267.961 sq mi)
• Municipal unit166.691 km2 (64.360 sq mi)
200 m (700 ft)
• Municipality
• Municipality density45/km2 (120/sq mi)
• Municipal unit
• Municipal unit density140/km2 (350/sq mi)
• Population22,193 (2011)
• Area (km2)139.614
Time zoneUTC+2 (EET)
• Summer (DST)UTC+3 (EEST)
Postal code
321 00
Area code(s)22610
Vehicle registrationΒΙ
Livadeia (Greek: Λιβαδειά Livadiá, pronounced [livaˈðʝa]; Ancient Greek: Λεβάδεια, translit. Lebadeia or Λεβαδία, Lebadia) is a town in central Greece. It is the capital of the Boeotia regional district. Livadeia lies 90 km (56 mi) north-west of Athens, 64 km (40 mi) west of Chalkida, 63 km (39 mi) south-east of Lamia, 44 km (27 mi) east-south-east of Amfissa, and 91 km (57 mi) east-north-east of Nafpaktos. The town lies some five kilometres (3.1 mi) west of Greek National Road 3, to which it is linked by National Road 48.
The area around Livadeia is mountainous, with farming activities mainly confined to the valleys. The area has traditionally been associated with the production and processing of cotton and tobacco, as well as the cultivation of cereal crops and the raising of livestock.
Livadeia is home to Levadiakos FC, members of the Greek Superleague.
The municipality of Livadeia covers an area of 694.016 km2 (267.961 sq mi), the municipal unit of Livadeia 166.691 km2 (64.360 sq mi) and the community 139.614 km2 (53.905 sq mi).[2]
View of the Cathedral (St George) of the city
The municipality Livadeia was formed at the 2011 local government reform by the merger of the following 5 former municipalities, that became municipal units (constituent communities in brackets):[3]
The community Livadeia consists of the following outlying settlements (besides the town itself): Agios Nikolaos Livadeias (pop: 25), Analypsis Livadeias (pop: 184), Elikon (pop: 43), Perachora (pop: 279), Stathmos (pop: 3), Tzimeika (pop: 25) and Tsoukalades (pop: 149).
Historical population[edit]
Year Town Municipal unit Municipality
1981 18,885
1991 19,295
2001 20,061 20,769
2011 22,193 22,779 31,315
In antiquity, Lebadeia was a town near the western frontier of ancient Boeotia, described by Strabo as lying between Mount Helicon and Chaeroneia.[4] The ancient town was situated at the foot of a precipitous height, which is an abrupt northerly termination of Mt. Helicon. Pausanias relates that this height was originally occupied by the Homeric city of Mideia, from whence the inhabitants, under the conduct of Lebadus, an Athenian, migrated into the plain, and founded there the city named after him.[5] On the other hand, Strabo maintains that the Homeric cities Arne and Mideia were both swallowed up by Lake Copais.[6]
Lebadeia was originally an insignificant place, but it rose into importance in consequence of its possessing the celebrated oracle of Trophonius. The oracle was consulted both by Croesus[7] and by Mardonius,[8] and it continued to be consulted even in the time of Plutarch, when all the other oracles in Boeotia had become dumb.[9] Pausanias himself consulted the oracle, and he speaks of the town in terms which show that it was in his time the most flourishing place in Boeotia. But notwithstanding the sanctity of the oracle, Lebadeia did not always escape the ravages of war. It was taken and plundered both by Lysander and by Archelaus, the general of Mithridates VI of Pontus.[10] In the war against Perseus of Macedon, it espoused the side of the Romans, while Thebes, Haliartus, and Coroneia declared in favour of the Macedonian king.[11]
When Pausanias visited Lebadeia in the 2nd century, he recorded numerous temples. The most remarkable object in the grove of Trophonius was the temple of the hero, containing his statue by Praxiteles, resembling a statue of Asclepius; a temple of Demeter, surnamed Europe; a statue of Zeus Hyetius (Pluvius) in the open air; and higher up, upon the mountain, the oracle (τὸ μαντεῖον). Still higher up was the hunting place of Persephone; a large unfinished temple of Zeus Basileus, a temple of Apollo, and another temple, containing statues of Cronus, Zeus, and Hera. Pausanias likewise mentions a chapel of the Good Daemon and of Good Fortune, where those who were going to consult the oracle first passed a certain number of days.
Pausanias, writing in the 2nd century AD, reported that the original name of the city was Mideia, and that it took its name Lebadeia from Lebados of Athens, who moved the city from high to low ground,[12] to its current location on the banks of the Herkyna river. The sacred protector of the city was the hero/god Trophonios, whose oracle, involving a harrowing descent into an underground chamber, was famous beyond the borders of Greece. At the springs of the Herkyna river are shallow grottos with niches and marble remnants said to be the site of the oracle. On the hill above is a small medieval castle, mostly the work of the Catalan Company during the 14th century, accessible by foot. This is one of only four Catalan castles in Greece [13]
Livadeia castle wall from the side of the Herkyna river
Further west, commanding a dramatic view from the hill of Profitis Ilias, are the remains of a large temple of Zeus Basileus, perhaps begun in the 3rd century BC but never completed.[14] The cathedral church of St. George houses an important relic, a head of St. George, translated to Venice in the 15th century but restored to Livadeia as a gesture of interfaith cooperation in 1999.[15] In medieval times the river was lined by a series of water mills, one of which is preserved.
During the Byzantine period, Livadeia entered a period of decline, except for the 9th century, when some economic growth occurred. During the Frankish period Livadeia came back on track, then it passes in Catalan sovereignty. The Ottoman domination begins in 1458,when economic and administrative privileges granted to residents, contribute to industry and trade.Today the city is the financial, industrial, commercial center of the law. Finally, Livadeia is also developed in craft, folk art and industry. An important source for the economy is also tourism.
Livadeia hosts two sports club with presence in the higher national divisions, Levadiakos F.C. a football club and Livadeia B.C. (A.E. Livadeias) a basketball club.
Sport clubs based in Livadeia
Club Founded Sports Achievements
Levadiakos F.C. 1961 Football Presence in A Ethniki
Livadeia B.C. 1994 Basketball Presence in A2 Ethniki
Sister Cities[edit]
See also[edit]
4. ^ Strabo. Geographica. ix. p.414. Page numbers refer to those of Isaac Casaubon's edition.
5. ^ Pausanias. Description of Greece. 9.39.1.
6. ^ Strabo. Geographica. ix. p. 413. Page numbers refer to those of Isaac Casaubon's edition.
7. ^ Herodotus. Histories. 1.46.
8. ^ Herodotus. Histories. 8.134.
9. ^ Plutarch, de Def. Orac. 5.
10. ^ Plutarch Lys. 28, Sull. 16.
11. ^ Polybius. The Histories. 27.1.
12. ^ Pausanias. "Book IX.39.1-2". Description of Greece., Ἑλλάδος περιήγησις (in Greek). At the Perseus Project.
13. ^ (Source: last visited 2018-08-21]]
14. ^ Hansen, Mogens et al., Inventory of Archaic and Classical Poleis, Oxford 2004
15. ^ "Ναός Αγίου Γεωργίου (Λιβαδειά) - Βοιωτικός Κόσμος". Retrieved 2013-03-26.
This article incorporates text from a publication now in the public domainSmith, William, ed. (1854–1857). "Lebadeia". Dictionary of Greek and Roman Geography. London: John Murray.
External links[edit]
|
global_01_local_1_shard_00001926_processed.jsonl/32267
|
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Gdynia Oksywie (13)
Oksywie (German: Oxhöft, Kashubian: Òksëwiô) is a neighbourhood of the city of Gdynia, Pomeranian Voivodeship, northern Poland. Formerly a separate settlement, it is even older than Gdynia by several centuries.
Both the Polish and then German name of the town, as well as various other names for it used in the past (among them Oxsiua, Oxive, Okciua, Oxue, Oxivia, Oxiuia, Oxiwia, Oxiew and Oxivija) stem from a Scandinavian word oxihoved meaning oxen head.[citation needed]
In the pre-historic times the Oksywie Heights, overlooking the Bay of Gdańsk, was settled by the members of the Oksywie culture, named after the burial places located just outside Oksywie. With time the area was settled by Slavs and became part of Pomerania. Christianised relatively early, the settlement housed the first Catholic shrine erected in 1124 by Świętopełk, Duke of Pomerania. Throughout the ages, the settlement shared much of its history with the surrounding region and with the nearby town of Gdańsk (German: Danzig), which developed into a regional capital.
After the World War I, when Poland regained the area after more than 100 years of partitions, the town of Oksywie became the first base of the Polish Navy. It served this role until the outbreak of World War II. During the Polish Defensive War of 1939, the area was the battlefield of the 9 days long battle of Kępa Oksywska, in which the Polish forces under Col. Stanisław Dąbek defended the area between September 10 and September 19. During the last stages of the war, the area yet again became a battlefield, this time between March 28 and April 5, 1945, when the area of the Oksywie Heights became the last stand of the surrounded German forces in Pomerania.
Currently, the borough of Oksywie is notable as the seat of the Academy of the Polish Navy. It was also the namesake of ORP Oksywie.
Coordinates: 54°32′53″N 18°32′41″E / 54.5480°N 18.5446°E / 54.5480; 18.5446
|
global_01_local_1_shard_00001926_processed.jsonl/32268
|
Rabbit haemorrhagic disease
From Wikipedia, the free encyclopedia
(Redirected from Rabbit hemorrhagic disease)
Jump to navigation Jump to search
Rabbit hemorrhagic disease virus
CryoEM reconstruction of Rabbit Hemorrhagic Disease Virus (RHDV) capsid. EMDB entry EMD-1933[1]
Virus classification
Group IV ((+)ssRNA)
Rabbit hemorrhagic disease virus
Rabbit Calicivirus CSIRO
Rabbit haemorrhagic disease (RHD), also known as rabbit calicivirus disease (RCD) or viral haemorrhagic disease (VHD), is a highly infectious and often fatal disease that affects wild and domestic rabbits of the species Oryctolagus cuniculus. The infectious agent responsible for the disease is rabbit haemorrhagic disease virus (RHDV), or rabbit calicivirus (RCV), genus Lagovirus of the family Caliciviridae. The virus infects only rabbits, and has been used in some countries to control rabbit populations.
RHD first appeared in the Winter of 1983 in Jiangsu Province of the People's Republic of China. It was first isolated and characterized by S.J. Liu et al. in 1984.[2] The Chinese outbreak was spread by the angora rabbit, which had originated in Europe. Fourteen million domesticated rabbits died within nine months in the outbreak.[3]
In 1984 the virus that caused the disease was identified. The virus spread westward and reached Europe in 1988. The virus has since appeared in Mexico, Cuba, Australia, New Zealand, the United States and Canada.[2] In 1992, the United Kingdom reported its first case of RHD in domestic show rabbits. By the late 1990s, RHD stretched to forty countries and had become endemic in wild and feral rabbit populations in Europe, Australia, New Zealand and Cuba.[3] In Europe, there was a rapid increase in research into RHD, due to the importance of the commercial breeding of rabbits for meat and fur production.
The first reported case in the United States was in Iowa on March 9, 2000. The affected breeds included Palominos and California Whites. By April 6, 25 of the 27 affected rabbits had died of the infection. In order to contain the disease, the remaining two rabbits were euthanized. No new introductions of rabbits were placed on the farm for two years after the discovery of RHD and August 1999 was the last time rabbits left and/or returned to the farm. The United States experienced other outbreaks of RHD in 2001 (Utah, Illinois, New York) and 2005 (Indiana).[3]
In 2010, a new virus variant called rabbit hemorrhagic disease virus 2 (RHDV2) emerged in France.[4]
World geographic distribution[edit]
Within a few months of RHD being reported in China in 1984, the disease was widely seen in many commercial rabbitries and had reached the Republic of Korea. RHD has also been reported in India and the Middle East.
Americas (North and South)[edit]
Since 1993, RHD has been endemic in Cuba; it is also believed to be thriving in Bolivia. From 1988 to 1992 Mexico dealt with an RHD endemic in domestic rabbits.[3]
After outbreaks of RHD in 2000, 2001, and 2005 in domesticated rabbits, the United States has eradicated RHD from its rabbit populations. The native species, cottontails (Sylvilagus floridanus), black-tailed jackrabbits (Lepus californicus) and volcano rabbits (Romerolagus diazzi) seem not to be susceptible to the virus.[3]
In early 2018 the first outbreak of the virus in British Columbia was discovered in feral rabbits on central Vancouver Island.[5]
In September 2018 the first case of RHD2 in the United States was confirmed in a pet rabbit in Medina, Ohio. [6]
In 1991 a strain of the virus, Czech CAPM 351RHDV, was imported to Australia[7] under strict quarantine conditions to research the safety and usefulness of the virus if it was used as a biological control agent against Australia and New Zealand's rabbit pest problem. Testing of the virus was undertaken on Wardang Island in Spencer Gulf off the coast of the Yorke Peninsula, South Australia. In 1995 the virus escaped quarantine and subsequently killed 10 million rabbits within 8 weeks of its release.[8]
In March 2017 a new Korean strain known as RHDV1 K5 was successfully released in a deliberate manner after almost a decade of research. This strain was chosen in part because it functions better in cool, wet regions where the previous Calicivirus was less effective.[9]
New Zealand[edit]
In July 1997, after considering over 800 public submissions, the New Zealand Ministry of Health decided not to allow RHDV to be imported into New Zealand to control rabbit populations. This was backed up in an early August review of the decision by the Director-General of Agriculture. However, in late August it was confirmed that RHDV had been deliberately and illegally introduced to the Cromwell area of the South Island.
An unsuccessful attempt was made by New Zealand officials to control the spread of the disease. It was, however, being intentionally spread, and several farmers (notably in the Mackenzie Basin area) admitted to processing rabbits that had died from the disease in kitchen blenders for further spreading.
Had the disease been introduced at a better time, there would have been a more effective control of the population. However, it was released after breeding had commenced for the season, and rabbits under 2 weeks old at the time of the introduction were resistant to the disease. These young rabbits were therefore able to survive and breed rabbit numbers back up. Ten years on, rabbit populations (in the Mackenzie Basin in particular) are beginning to reach near pre-plague proportions once again though they have not yet returned to pre RCD levels.[10][11]
Resistance to RHD in New Zealand rabbits has led to the widespread use of Compound 1080 (Sodium fluoroacetate). The Government and department of Conservation are having to increase their use of 1080 to protect Reserve land from rabbits and preserve the gains made in recent years through the use of RHD.[12]
RHD is endemic throughout most of Europe. Italy's first case of RHD was recorded in 1986 and Spain's in 1988.[13] France, Belgium (June) and Scandinavia followed in 1990. Within a few years of RHD's first appearance in Europe it had caused the largest mortality in domestic and wild rabbits in Germany, Austria, Spain and Italy. Spain was the worst affected by RHD, which in turn also affected the rabbit-specialized Iberian lynx.[14][15]
When the United Kingdom's first case of RHD in 1992 was discovered, the disease was transmitted into the wild by domesticated pet rabbits.[citation needed] Sources vary in the number of confirmed cases of RHD; there were 9 known outbreaks in 1994, 32 cases but some sources believe there were as many as 512 cases of RHD in 1995, and around 30 RHD cases in 1996 throughout Scotland, England and Wales.[citation needed]
In April 2016, a highly lethal disease started affecting one of the northernmost feral rabbit populations in the world in Helsinki, Finland. The outbreak has since been identified to be caused by the new RHDV2 strain of the virus, being the first appearance of RHD in the country. Cases of viral transmission to domesticated pet rabbits have been confirmed and vaccinating rabbits has been recommended.[16]
Transmission of RHD occurs by direct contact with an infected animal and fomites. Rabbits acquire RHD through oral, nasal or conjunctival pathways. Urine, feces and respiratory secretions may also shed the virus. The virus may also be carried by the wind. Carriers of the virus may remain infectious for up to a month depending on climate conditions; however, the virus has been known to persist for as little as 2 days and as long as 215 days. An infected carcass or hairs from an infected animal may also transmit RHD. Fomites such as clothing, contaminated food, cages, bedding, feeders and water will also harbour the virus. Even though the virus cannot reproduce in other mammals, predators and scavengers such as foxes, ferrets and some birds can excrete the virus through their faeces after ingesting an infected rabbit carcass. Flies, rabbit fleas, and mosquitoes can also spread the virus between rabbits.[3]
Climate appears to play a crucial role in the transmission of RHD. In normal conditions, most outbreaks of RHD occur in winter or spring. High temperatures in late spring and summer will considerably reduce the spread of the virus. RHD will also be more prevalent in dry and semi-dry areas than in areas that are relatively cool and humid.[8]
RHD primarily infects only adult rabbits. In fact, research has shown that rabbits younger than 8 weeks of age are resistant to the virus. The incubation period for the RHD virus is between 1 and 3 days, with death following 1 to 2 days after the infection. There is a wide range of RHD symptoms. Most rabbits will show no signs of external symptoms of RHD.
Symptomatic cases of RHD will display fever, squeals, and often coma leading to death within 12 to 36 hours. In less severe cases, rabbits may display uneasiness, excitement, anorexia, swollen eyelids, paralysis, ocular haemorrhages, and "paddling" or loss of skin. Convulsions may be seen as well. A fatal bloody discharge from the nose has been exhibited along with blood-stained cage floors, though these symptoms may have occurred after death. Rabbits who have recovered from the less severe symptoms usually develop severe jaundice with weight loss and lethargy. Diarrhoea, constipation and abdominal cramping are then exhibited right before death a few weeks later.[17]
RHD causes rapid development of blood clot formation in major organs such as the heart, lungs and kidneys. The clots block blood vessels causing heart and respiratory failure. An infected rabbit that has died from RHD will often have its legs straight out and head over its neck.[8]
RHD may be indicated when several animals in the herd die after experiencing a fever and lethargy. Differential diagnosis includes pasteurellosis, myxomatosis, poisoning, heat exhaustion, and E. coli or Clostridium perfringens type E enterotoxemia.
Rabbits that die from RHD are usually in good outward state. However, the most frequent post-mortem lesions are necrosis of the liver, and splenomegaly. The liver of RHD rabbits may have a fine reticular pattern of necrosis outline each lobule and maybe yellow, gray or pale in colour. The liver is also usually friable and swollen. The spleen will be black in colour and also swollen with rounded edges, while the kidneys are dark brown in colour. Haemorrhages will also be seen many other organs and tissues. The trachea may present a foamy, bloody mucous. Enteritis of the small intestine and swollen meninges may also occur.
Laboratory tests such as reverse transcription polymerase chain reaction (RT-PCR), Western blotting, negative-staining immunoelectron microscopy, and ELISAs may be performed on samples from the liver, blood, spleen or other organs.
Morbidity, mortality, and immunity[edit]
RHD is extremely hard to locate in the wild since about 75% of rabbits with RHD will die in their burrows underground. Due to this difficulty, the morbidity and mortality estimates for RHD have a broad range. The morbidity rate ranges from 30% to 100% and the mortality rate from 40% to 100%; however, the typical mortality rate is usually around 90%.[3]
In the wild, outbreaks in rabbits vary depending on the season, breeding cycles and geographical location. Some areas will see a high morbidity and mortality among its rabbit populations followed by calmer periods.
Maternal antibodies such as immunoglobulin G (IgG), which are readily transmitted to the young across the placenta, may explain why very young rabbits are resistant to RHD. Some scientists also believe that the immature immune system of a young rabbit cannot produce the number of chemicals needed to initiate clotting in order to kill. Rabbits may develop immunity against other strains of the RHD virus, while others may endure persistent infections. The immunity does not survive through the next generation, leaving open the possibility of further outbreaks in the population.[18]
Countries that are uninfected by RHD may place restrictions on importation from endemic countries. According to the Merck/Merial Manual For Pet Health, Home Edition, 2007, RHD is a reportable disease in the United States. If a diagnosis is made by a veterinarian, a notification to the "appropriate government authorities" must be made.[3]
Because of the highly infectious nature of the disease, strict quarantine is necessary when outbreaks occur. Depopulation, disinfection, surveillance and quarantines are the only way to properly and effectively eradicate the disease. Good disinfectants include 10% sodium hydroxide, 1-2% formalin, 2% One-Stroke Environ, and 10% household bleach. The RHD virus is resistant to ethers and chloroform. Deceased rabbits must be removed immediately and discarded in a safe manner. Surviving rabbits are quarantined or humanely euthanized. Test rabbits may be used to monitor the virus on vaccinated farms.[3]
There are several vaccines available against VHD in the UK: Cylap, made by Fort Dodge Animal Health; Lapinject, made by CEVA Animal Health; Anivac, made by Animalcare Ltd and FILAVAC, made by Filavie. All last for 12 months and contain inactivated strains of VHD. A live combination vaccine, Nobivac Myxo-RHD, made by MSD Animal Health, has recently become available. Its active ingredient is a live myxoma-vectored RHD virus strain 009 and it offers a duration of immunity of 1 year against both RHD and myxomatosis.[19] FILAVAC has been authorised by the VMD in April 2017 ; it is currently the only vaccine containing both classic and variant strain of VHD virus.[20]
See also[edit]
1. ^ Luque, D.; González, J. M.; Gómez-Blanco, J.; Marabini, R.; Chichón, J.; Mena, I.; Angulo, I.; Carrascosa, J. L.; Verdaguer, N.; Trus, B. L.; Bárcena, J.; Castón, J. R. (2012). "Epitope Insertion at the N-Terminal Molecular Switch of the Rabbit Hemorrhagic Disease Virus T=3 Capsid Protein Leads to Larger T=4 Capsids" (PDF). Journal of Virology. 86 (12): 6470–6480. doi:10.1128/JVI.07050-11. PMC 3393579. PMID 22491457.
2. ^ a b "A New Viral Disease of Rabbit". The Merck Veterinary Manual. 2006. Retrieved 2007-06-17.
3. ^ a b c d e f g h i Center for Food Security and Public Health
4. ^ Le Gall-Reculé, Ghislaine; Lavazza, Antonio; Marchandeau, Stéphane; Bertagnoli, Stéphane; Zwingelstein, Françoise; Cavadini, Patrizia; Martinelli, Nicola; Lombardi, Guerino; Guérin, Jean-Luc (2013-09-08). "Emergence of a new lagovirus related to rabbit haemorrhagic disease virus". Veterinary Research. 44 (1): 81. doi:10.1186/1297-9716-44-81. PMC 3848706. PMID 24011218.
5. ^ Sterritt, Spencer (2 March 2018). "Rare and lethal virus found in deceased Nanaimo rabbits; 1st case in B.C." NanaimoNewsNOW. Retrieved 2018-05-20.
6. ^ https://www.farmanddairy.com/news/rabbit-hemorrhagic-disease-found-in-ohio-domestic-rabbits/514849.html
7. ^ Cooke, Brian Douglas (2014). Australia's War Against Rabbits. CSIRO Publishing. ISBN 9780643096127.
8. ^ a b c Strive, Tanja (16 July 2008). "Rabbit Calicivirus Disease (RCD)". Commonwealth Scientific and Industrial Research Organisation. Archived from the original (pdf) on April 15, 2014. Retrieved 14 April 2014.
9. ^ Adams, Prue (1 April 2017). "K5 rabbit virus an early success, researchers say". ABC News. Retrieved 2018-05-20.
10. ^ Munro, Robert K.; Williams, Richard T., eds. (1994). Rabbit Haemorrhagic Disease: Issues in Assessment for biological control. Canberra: Bureau of Resource Sciences. ISBN 9780644335126.
11. ^ Williams, David (26 May 2009). "Plan for 1080 drops in MacKenzie Basin". The Press. Retrieved 2009-06-14.
12. ^ "Welcome to 1080: The Facts". 1080facts.co.nz. Retrieved 2013-12-05.
13. ^ Abrantes, J; van der Loo, W; Le Pendu, J; Esteves, PJ (10 February 2012). "Rabbit haemorrhagic disease (RHD) and rabbit haemorrhagic disease virus (RHDV): a review". Veterinary Research. 43: 12. doi:10.1186/1297-9716-43-12. PMC 3331820. PMID 22325049.
14. ^ "Iberian Lynx Depends On Rabbits for Survival". Science Daily. 5 July 2011.
16. ^ "RHD-tauti todettu myös lemmikkikaniinissa - erityisluvallista rokotetta saatavilla". Finnish Food Safety Authority (Finnish). Retrieved 2016-12-29.
17. ^ ?
18. ^ Marques, Raquel M; Teixeira, Luzia; Águas, Artur P; Ribeiro, Joana C; Costa-e-Silva, António; Ferreira, Paula G (4 February 2014). "Immunosuppression abrogates resistance of young rabbits to Rabbit Haemorrhagic Disease (RHD)". Veterinary Research. 45 (1): 14. doi:10.1186/1297-9716-45-14. PMC 3926702. PMID 24490832.
19. ^ Therapeutic Indication: For rabbits Archived 2013-05-26 at the Wayback Machine., National Office of Animal Health rabbit vaccines.[full citation needed].
20. ^ http://www.vmd.defra.gov.uk/ProductInformationDatabase/SPC_Documents/SPC_1170567.DOC
New outbreak in Canada reported on Vancouver Island http://www.cbc.ca/news/canada/british-columbia/b-c-issues-warning-to-pet-rabbit-owners-as-virus-spreads-to-lower-mainland-1.4587233
External links[edit]
|
global_01_local_1_shard_00001926_processed.jsonl/32269
|
Vern Rumsey
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Rumsey performing with Long Hind Legs
Vern Rumsey was the bass guitar player for the band Unwound.[1] He generally played a Fender Jazz bass.[1] He is also a recording engineer who has worked with bands such as Blonde Redhead, KARP, Enemymine, Novex and Replicator.
Rumsey played bass guitar on the Blonde Redhead record Fake Can Be Just as Good,[2] and co-ran the label Punk in My Vitamins [1] with his bandmates[1] Justin Trosper and Sara Lund.
He was also in the bands Long Hind Legs,[1] Oslo,[3] Fitz of Depression,[4] and Witchypoo[4] and (in 2009) was playing in the band Flora v. Fauna.[5]
He has been variously credited as Doombuggy, Red Rumsey, RedRumsey, Rumsey, Vern and Vernon Rumsey.[4]
|
global_01_local_1_shard_00001926_processed.jsonl/32270
|
Worship of angels
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
The worship of angels primarily relates to either excessive honouring (or possibly invoking the names of) angels.
In Greek and Roman religion[edit]
The Greek word aggelos ("messenger") has some use in Greek religion relating to divine messengers.[1] The Hypsistarians worshipped the Hypsistos ("Most High)" and acknowledged the gods of traditional Greek religion as angels[2] but some modern scholars identify the Hypsistarian groups, with gentile God-fearers, to Hellenistic Judaism.[3]
In 1981, A.R.R. Sheppard published an inscription (from near Kotiaion) related to Holiness and Justice, personifications honoured, or worshipped, in areas of Phrygia and Lydia.[4] The significant discovery in the inscription was Sheppard’s reading: ΦΙΛΑΝΓΕΛΩΝ (”Friends-of-angels”) an apparent evidence of pagan reverence of angels:
However, in 2005 Hasan Malay revisited the inscription and argues that Sheppard likely misread a phi (Π) as a gamma (Γ) and the inscription should read ΦΙΛΑΝΠΙΛΟΙ, "Friends-of-the-vine" or "Vine-lovers", with no angels. Malay also published a second inscription, dated 161 CE, confirming the existence of associations devoted to the vine from nearby Katakekaumene in Cappadocia, now in the Manisa Museum.[6] Hence the Kotiaion inscription should read:
In Judaism[edit]
The Hebrew Bible strictly prohibits worship of idols made in the likeness of anything in heaven, according to the first commandment found in Exodus 20:4. For this reason actual "worship" of angels is not documented in Judaism beyond the following:
• In Intertestamental Judaism, worship of angels is not found, but a developed angelology, angelic hierarchies, and the invocation of angels is found. For example, the Maccabean fighters invoked the unnamed angel that earlier in the days of Hezekiah had destroyed the army of Sennacherib.[8][9]
One can theorize that the worship of angels was occurring in Ancient Israel, hence a law was made to prohibit this activity.[11]
In Christianity[edit]
In the New Testament[edit]
• invocation of angels
• excessive interest in angelic hierarchies [13]
• conception of angels as mediators
and so on.
While falling short of actual worship of angels 3rd century Gnosticism developed heavily ideas concerning the archons. Celsus repeats the charge of worship of angels against Aristides.[14]
The Yazidi religion has as its object beings that are generally referred to as angels. These are agents of a single god, which are worshipped in its stead.[15] The most relevant of these angels is Melek Taus, to which God has entrusted the world, but other figures of worship include Jabra'il, Mikha'il, Israfil, Dadra'il, Azrafil and Shamkil.
See also[edit]
2. ^ Pagan Monotheism in Late Antiquity: Polymnia Athanassiadi, Michael Frede p19
9. ^ Ginzberg, Legends of the Jews
10. ^ "Angels", in Jewish Encyclopedia, 1914
11. ^ Ehrman, Bart D. "Divine Humans In Ancient Judaism." How Jesus Became God: The Exaltation of a Jewish Preacher from Galilee. 1st ed. New York: HarperCollins, 2014. 54-55. Print.
12. ^ Barth, Markus, Colossians, Anchor Bible Commentaries, 1995
15. ^ [1]
|
global_01_local_1_shard_00001926_processed.jsonl/32287
|
Cat Women of the Moon: 64 minutes/Black & White/1953/NR
During a lost age of campy sci-fi movies and the lost age of 3-D movies, "Cat Women of the Moon" sprang up. From the start, Moon Rocket 4 was doomed. En route to the moon, it runs directly into a meteor shower! Things get even worse once they make it to the surface. Helen (Marie Windsor) mysteriously gets deja vu. In a trance, she leads the crew into an underground, air-filled cavern filled with mutated, man-eating spiders and feline seductresses in black. The Cat Women are great hosts...or are they just trying to get the crew's trust? One by one, the crew are lured to their deaths by the desire they are most vulnerable to. And what about Helen's strange visions? Can Moon Rocket 4 possibly escape the Cat Women???
Starring Victor Jory, Sonny Tufts, and Marie Windsor.
Music by Elmer Bernstein, makeup by Harry Thomas.
Special effects by Al Zimbalist and Jack Rabin.
Art directed by William Glasgow.
Screenplay by Roy Hamilton.
Produced by Al Zimbalist and Jack Rabin.
Directed by Arthur Hilton.
|
global_01_local_1_shard_00001926_processed.jsonl/32289
|
Tools for acts of prestidigitation or obfuscation. A must for those who would attempt the wizardry of Oz. You can fool all of the people some of the time. You can fool some of the people all of the time. But if you want a guaranteed ROI, you'll get the best smoke-and-mirror setup you can. This is how George W. Bush (SAT combined: 450) can be the presidential front-runner. Smoke and mirrors hide the latter-day smoke-filled rooms of US politics. And much of the corruption.
|
global_01_local_1_shard_00001926_processed.jsonl/32295
|
How can I research other family law cases?
If you're representing yourself in court, you may want to research the laws and the court decisions about situations like your own. This will help you prepare what to say to the judge. You can directly refer to cases that support your position.
The Canadian Legal Information Institute (CANLII) is an organization that provides a website with a free legal search database. The database has case law and legislation from across Canada.
Case law is created when judges apply the laws to the cases that come before them and make their final decisions. Each judge writes a document called Reasons for Judgment that explains why they reached their decision. You’ll want to find examples where a judge agreed with someone like you.
While you're searching for cases in the CANLII database, you can also easily link to the laws and even written opinions (commentary) that apply to your situation.
For a full guide about how to use the CanLII database, see The CanLII Primer.
How to search on CANLII
1. Make a list of key words. The first step for searching in the database is to figure out the right words to use. The right search terms will lead you more quickly and accurately to useful cases. Ask yourself, what is the main issue? (Separation? Support?) What are the key facts in my story? (Who is involved? What happened? What is needed?) Do you know the legal terms that are relevant? Look at your list and see if any of the words also have a good alternative word and add it. Finally, circle the words that seem the strongest. You can use several of the best words to start your search.
2. Learn some database search tips. To help narrow your search from the beginning, use some standard search techniques. On the CANLII homepage, click ? at the right side of the search box to see the most common tips. For example:
• Put quotation marks around two or more words to search just for that phrase, not random appearances of the words on their own. For example, typing "adopted child" will keep an irrelevant judgment with the sentence "The changes were adopted to reflect the best interests of the child" out of your results.
• Use AND to make sure that both (or all) of your keywords are in the case results. Otherwise, cases with just one of the words may appear. For example, type child AND parent AND relocate.
All variations of a word will also appear. For example, the keyword separation will also bring up separate and separated.
The database is case sensitive, which means it will search for the word only with capital letters if that’s how you type it.
For more detailed information, click the Help Page link at the bottom of the tips box or the link to a short video about getting started.
3. Start your search: select the jurisdiction (location). On the home page, under Browse, select British Columbia, if your case is being heard in a BC court. (Select another jurisdiction, if it applies.)
4. Enter your keywords in the search box. Enter your keywords in the search box, using any of the search tips, and click the search button on the far right.
Everything in the database related to your keywords will appear below, in the order of greatest relevance. Select Cases to see only the cases that contain your keywords.
Important: Cases are generally identified by the names of the parties (called the Style of Cause), the year of the decision, the name of the court, and, depending on the year of the decision, one or more assigned numbers.
Smith v. Jones, 2005 BCSC 1234
Tip: You can also select the Legislation or Commentary tabs, to see only laws or written opinions that are related to your keywords.
5. Review your results. If you have still have a huge number of results, add another keyword or two right away to try to narrow your results more accurately.
Tip: You can also filter or sort your results by selecting options under the dropdowns. For example, under the All courts and tribunals dropdown, select "Provincial Court of British Columbia."
6. Read through the cases that appear first in your results. Read the portion of text that appears with each case to see if the information seems related to your situation. If so, click on the case name to view the entire decision written by the judge.
Click on the arrow on the top right to find your highlighted keywords or scroll to the highlights. You can also uncheck a keyword if you like.
7. Improve your keywords if necessary. If you don’t find any meaningful cases, you need to change or add to your search keywords. For ideas, look at the keywords the database provides under the name of each case in the search results. Also, skim through the cases for legal terms or other possible keywords. Then, try again.
8. Check that a case is still good law. To do this, check two things:
• Judicial history. Once you’ve found what seems like a good case to use, check its history to make sure. In other words, you need to know if the decision was reversed by a higher level court (or affirmed). Note that cases don’t always have a "history."
Click the + sign at the left of the search box to expand it. In the "Noteup" search box, enter the case name (for example, Green v. Brown) and select from the list of cases in the dropdown. You will get a result only if there was a Court of Appeal decision.
• Judicial treatment. To find related decisions where the case was referred to by another judge, click "Cited by (number) documents" (if it appears).
Click any case names in the results and find the highlighted area(s) where the case you're interested in is mentioned.
If the relevant part of the case is referred to in a positive way, it confirms that it's a good case for you to use to support your position. However, read all the cases in your results carefully.
Some citations may take you to cases that are citing the case you're interested in but for reasons that aren't helpful to you. Or, the case you find may be even better for you to use than the original one.
Tip: You can cite any case law in any court (even cases from other provinces), but the weight it's given by the court will vary. The higher the court and the more courts that followed a particular line of reasoning, the more persuasive a court in BC might find it.
For more information
CANLII Connects provides quick access to analysis about cases in Canadian courts from a variety of sources. Simply select Search at the top right of the homepage and enter a case name. You'll be provided with a list of articles of commentary that may be longer than what you found in the CANLII database itself.
For a helpful list of recent court decisions in family cases, each with a brief summary and grouped by topic, see the JP Boyd on Family blog.
For a guide to help you find court records and transcripts, see the SFU library.
Tip: To read an article, click on its title (which is a link).
forward arrowBack to: Previous
|
global_01_local_1_shard_00001926_processed.jsonl/32299
|
Category: sissification
If you were my friend’s father, my plumber, my stepdad, etc and you caught me like this…
And you could only pick one outcome, which would you choose?
A) Make me walk around the house with my little clit out and not hide if someone sees me.
B) Make me play with my useless clitty on a live cam while you jack off in front of me.
C) Make me fuck myself with a dildo until my useless clit dribbles.
D) Put a huge dildo in my boy pussy until I scream for you to stop.
E) Wait until I fall asleep and fuck me.
F) Fuck me doggy style.
G) Make me ride your cock while you sit back and enjoy.
H) Invite your huge black friend over to destroy me while you film and jack off.
I) Get a good old fashioned blowjob.
Let me know!
Can someone make an app like Grindr / Tinder but for femboys/sissies/crossdressers and daddies?
Sissy Thanksgiving Pt. 10
He really wanted to break my virginity… the thoughts rushing through my head were uncontrollable. I had never ever seen a guy naked until recently and all of a sudden I had given one a blowjob and, now, I was in bed with one.
I was nervous and scared about what was going on. I was away from my parents and the only two people here were older guys – horny, older guys.
Mr. Gregory was sat in a chair in the corner with a grin on his face and his hand rubbing the outside of his jean’s crotch.
He nodded to me enthusiastically. He wanted me to do it.
As I lay on the naked stranger, I reached down towards his hard cock. It was so hard. He looked up at my skinny, young body and was practically salivating.
I lifted my leg a little so that his cock could stand upright underneath me. It was big – how could that fit in me? It was at least as wide as my body.
He looked up at my face and said “go on little boy, do as you’re told, put it in that tight ass of yours…”
I moved my thong from my butthole onto one cheek so that my boy pussy was exposed. I let my body rock a little to feel his throbbing dick against the outside of my hole.
It felt good, a tingle inside.
I attempted to push my body weight onto it but I was just too tight. It wouldn’t go in even a little bit.
He started to get a little frustrated so he swung his arm around my back, lifted me, and lay me on the bed on my side. He was now kneeling over me with his cock positioning between my buttcheeks.
I couldn’t let him see how nervous I was. I looked away but, by doing so, was now looking directly at Mr. Gregory. He had a full smile and his pants were unzipped.
I felt the man push his cock harder against my boy pussy.
“Just a little push and we’ll be ready to go, little one…”
Fear had taken over. I was sweating. I was visibly uncomfortable.
He pushed even harder, this time forcing the tip of his cock inside of me.
After trying that for a while, he realized it wasn’t working.
“I need to use my whole body for this. Get on your stomach…”
I slowly flipped my body onto my stomach, my legs tucked under him, his body positioned right on top of me.
He pushed again.
Again, same problem. I was just too tight.
He grabbed at my shoulders for leverage. He yanked my body towards him.
I felt a little more of his cock slide into me. It hurt – I couldn’t do this.
I pushed at his arm with mine and tried to swing my body back upwards.
“What’s wrong, you little slut?”
“I-I-I can’t do this… not now… I need… I need to stop.”
He huffed and slumped off of me. He looked mad.
“Please sir, don’t be angry. I’ve never let anyone get this far. You’re very special. You-you… you’re so handsome and I like you…”
“Well let me make love to you then!”
“I can’t sir… If only I had practise with someone smaller before… I’m sorry…”
He rubbed his face. He couldn’t hide his frustration.
The sweat glistening off of his manly body was still such a turn on though. I reached for his cock and began stroking it up and down slowly at first.
He moved his hands from his eyes and looked back at me again. He still had some hunger left.
I moved my body so that my face was under him. I licked his balls, I licked slowly up his shaft, and I began to suck him again.
He was enjoying it. A relief for both of us. For some reason I really cared that he would be satisfied – it felt like my job.
He eventually rocked his head back and groaned. He gave me no forewarning as the cum bellowed out of his cock like a rocket.
My face was hit repeatedly by the splashes of his warm cum.
“Fuck yes… Ughhh…”, he moaned, “good fucking girl. Now lick it up…”
I did – I already was doing it – and I did it with a big smile on my face knowing I was his “good girl”.
Tune in for part 11 soon!
If you want to recap or read the other chapters for the first time – tap the “sissy thanksgiving” tag at the bottom of this post.
Any guys in San Fran?
Hit me up on messenger 😉
New posts over on!
New posts over on!
Direct message me for a “text message” story b…
Direct message me for a “text message” story between you and myself as well as you and my stepdad.
He will be your close friend / old buddy who has been living with his new wife for a year or so. I will be his stepson.
You will witness through photos and texts my feminization.
Message me with your Mr. name (e.g. Mr. Collins) and be prepared to reply fast as these stories take a long time to get to the juicy parts.
You will need to supply photos too and I will give you good sources for them.
This one’s a question for my straight follower…
This one’s a question for my straight followers:
If we had to share a bed and you saw me doing this, what would you do?
Hit me in the DMs!
Check out the latest instalment of the Sissy T…
Check out the latest instalment of the Sissy Thanksgiving story (Part 5) on my Tumblr now!
Massive thanks to @crazzypat for buying these …
Massive thanks to @crazzypat for buying these dresses for me for my birthday!! I love them so much, hehe! 😀
Please reblog if you like and tell me what you think! 🙂
Please reblog my latest story posts (Sissy Tha…
Please reblog my latest story posts (Sissy Thanksgiving Pt. 1-4) and I might let one of the characters use my boy pussy eventually…
|
global_01_local_1_shard_00001926_processed.jsonl/32305
|
Teaching Scenario 2: The Recruitment Fair
Download as PDF 486.3 KB
Ages: 11 – 14
UK Key Stage: 3
UK Years: 7 – 9
US Grade: 6th – 8th Grade
Evidence from the Girlguiding annual Girls’ Attitudes Survey 2011 indicates that science and engineering are careers that few girls would consider. Girls often shy away from STEM careers because they believe that these sorts of jobs are not for girls or women.
There are several reasons for this, but one key problems is that, as girls approach the age where they begin to decide what subjects to focus on, they are also developing a sense of their own self-identity and often that identity conflicts with their perception of a STEM identity. In other words, as they begin to develop a sense of who they are as individuals, they also begin to to see STEM as something that other people do.
This is in part because of how we talk about STEM jobs. Research has shown that women self-identify using adjectives, but when we describe STEM jobs we tend to use verbs, focusing on what people do. This can alienate girls, setting STEM in immediate and irreconcilable opposition to their developing self-identity.
This scenario seeks to reframe STEM jobs in terms of the types of people who might work in them, focusing on describing the qualities and aptitudes of good scientists, technologists, engineers and mathematicians. In this way, it hopes to encourage girls to rethink their preconceptions to STEM jobs, and see them as viable career options.
Learning outcomes
The aim of this scenario is to help students, especially girls:
• Progress beyond stereotypical concepts of ‘what a scientist is’
• Expand their thinking about the kinds of people who work in STEM
• Begin to relate more closely to people who work in STEM
• Begin to imagine themselves working in STEM
• Explore the importance of language in shaping our responses to job descriptions
A big international company, Engtech Science, is expanding and creating new jobs in its offices around the country. Its Human Resources (HR) department, which is responsible for hiring new talent, is organising a series of recruitment fairs where they hope to attract and hire young scientists, technologists, engineers and mathematicians.
In order to attract the very best new employees, the Head of HR, Dr Jaswinder Singh, wants to completely rethink how they advertise their jobs and how they communicate with potential job candidates. She wants to hire as many women as men, and wants to make sure that the leaflets that they give out at the job fair appeal to women as well as men.
Dr Singh has decided to bring in a team of recruitment specialist to write new descriptions of the type of people that she wants to hire.
A recruitment agency has been engaged by Engtech Science’s Head of HR, Dr Jaswinder Singh, and asked to write a series of four descriptions of the kinds of people she wants to eventually hire: scientists, technologists, engineers and mathematicians.
Key questions
• Are there words or phrases which make students feel excited about STEM?
• Are there words or phrases which make them feel as if STEM is ‘not for them’?
• Are these the same words, or different, for boys and girls?
• How does the language of job adverts limit the type of people who might apply?
• How can job descriptions be written to be more inclusive?
The client is Dr Jaswinder Singh, Engtech Science’s Head of Human Resources. She is responsible for ensuring that the business hires the very best people, and for making sure that they meet their diversity targets to ensure that they hire people from lots of different backgrounds and heritages.
Other people with an interest in the outcome of this project include:
• Jena Fischer, CEO of Engtech Science, who has ultimate responsibility for the company’s diversity programme.
• A women in STEM campaign group that wants to write a case study about the use of gender-neutral language in recruitment.
• Ashley Krawiec, CEO of a competing company, who is concerned that they will lose their competitive edge if Engtech Science snap up all the best talent.
To create four short descriptions of the kinds of people Engtech Science want to hire in the areas of science, technology, engineering and maths.
Tasks and activities
Describe a scientist
• Come up with a list of words that describe what a scientist does
• Now draw up a list of words that describe the qualities that a scientist has
• Do the same for a mathematician, technologist and engineer
You might use the Ten Types of Scientist poster and/or report as a way to kickstart this exercise.
How do words make you feel?
• Think about how these words make you feel.
• Divide your collection of words into three lists:
• Words that make you feel excited, interested or curious
• Words that make you feel that STEM is for people like you
• Words that make you feel bored, uninterested or unmoved
Students should do this activity on their own in order for the next activity to work.
Do girls and boys prefer different words?
• Collate the ‘excited’, ‘people like me’ and ‘bored’ lists from the girls in the class
• Collate the ‘excited’, ‘people like me’ and ‘bored’ lists from the boys in the class
• Are the lists the same or different?
• Which words are most positive for girls, ie on the ‘excited’ and ‘people like me’ lists?
• Which words are most positive for boys?
• Are girls’ most positive words verbs or adjectives?
• Are boys’ most positive words verbs or adjectives?
• Which words are most likely to make girls or boys feel that STEM is for them?
It would be possible to use coloured sticky notes to collate the word lists. Girls all get green and yellow sticky notes, and boys all get orange and white (try not to use pink and blue in the stereotypical way). The students would then write a single word on each sticky note:
Green: Girl, adjective
Yellow: Girl, verb
Orange: Boy, adjective
White: Boy, verb
The students can then stick the notes on the classroom wall in groups of ‘exciting’ and ‘boring’ words, with the same words clustered together. The number and colour of sticky notes will show you at a glance whether girls/boys favour verbs or adjectives, or neither, and whether boys’ or girls’ choices are the same or different.
To make the exercise shorter, you could ask the students to pick their top five or ten words, the ones that they feel most strongly about.
Can words be gendered?
• Is it possible for a word to feel more masculine, or more feminine?
• Come up with some words that are masculine. Describe how they make you feel, and why you think they are masculine.
• Come up with some words that are feminine. Describe how they make you feel, and why you think they are masculine.
• Now look again at the lists of words describing scientists, technologists, engineers and mathematicians. Are there words which seem very masculine? Or feminine?
• Draw a Venn diagram with four circles representing masculine words, feminine words, verbs and adjectives.
• How much overlap is there? Which group is the biggest? Why might this be?
Expanding your list of adjectives
• With students working initially on their own, expand the list of adjectives that could be applied to people working in each area: science, technology, engineering, maths.
• Then, working in small groups, students should share their lists of adjectives, and come up with four lists of the most descriptive adjectives.
Write descriptions
• Write four descriptions of the kind of person whom students think would be well suited to each subject area, using mostly adjectives and/or feminine words.
Present your descriptions
Present your four descriptions to Dr Jaswinder Singh, Head of HR at Engtech Science’s, explaining why you made the choices you did.
Responses from other stakeholders
What kind of responses or challenges do you think your descriptions would receive from:
• Engtech Science’s CEO
• The group campaigning about women in STEM
• The CEO of a competing company
Ten Types of Scientist, Diana Garnham, Science Council: http://www.sciencecouncil.org/10-types-scientist, see also the Ten Types of Scientist poster included in this pack.
Not for people like me, Professor Averil Macdonald, WISE: https://www.wisecampaign.org.uk/resources/2014/11/not-for-people-like-me
12 Types of Scientist, an extension of the Science Council report, and the People Like Me resource, WISE: https://www.wisecampaign.org.uk/about-us/wise-projects/people-like-me
Wanted: Gender-free job ads, Chris Privett-Duke, Futurity, Duke University/Princeton University, 2011: http://www.futurity.org/wanted-gender-free-job-ads/
About this pack
This free education pack comprises of:
|
global_01_local_1_shard_00001926_processed.jsonl/32317
|
TSA Enhanced Pat Downs : The Screeners Point Of View
Some comments from these TSOs include:
Some comments from these 17 TSOs include:
Happy Flying!
1. […] to stop the anus-bomber threat. Apparently the directive to feel up passengers has already upset actual TSA screeners; that’s part of the point. Indignity is the short-term goal. Dignity plus safety is the […]
1. One thing that people seem to be forgetting is that they are doing their JOB!! How would you like it if someone didn’t like what you were doing at your job and told you to just quit. With the economy the way it is, and as few jobs there are out there right now you should be ashamed to tell someone to quit their job. If you don’t like the pat-downs don’t fly!! They made these wonderful things called cars that actually get you from point A to point B.
2. Insult, demean, humiliate, and berate the TSO mercenary scum! Make the job as popular as working as a nazi concentration camp guard. DECIMATE their moral! Make them be ashamed to look at themselves in the mirror. Make them see the light, and to resign and become converts who see the evil, and who once again adhere to the rule of law. Make them feel like Megan’s Law registered sex offenders! THAT’s how to get rid of this dangerous agency, one miserable, rotten employee at a time.
3. I have to make money somehow. While I don’t enjoy groping you people, I need to do what is required of me or I’ll lose my job and wind up poor and unemployed again. For me, this is merely a temporary living hell until I find a new job.
4. Two sides to every story.
Passengers who openly display their contempt or humiliation to the screeners groping them are ‘breaking down’ the screeners.
Screeners who use punitive gropes and threats of invasive gropes to try to bully pax who do not use the scanner – what are they doing? What is their justification for using punitive gropes on folks capable of using the WTMD but physically incapable of ‘assuming and holding the position’ necessary for a clean scan? (hint: John McCain is one of them).
Passengers who opt out of the scanners or who are physically incapable of assuming and holding the position are told if they don’t like being subjected to an intrusive and even punitive grope every time they fly, they should find an alternate form of transportation.
Screeners who dislike the part of their job that requires them to grope pax – why shouldn’t they find an alternate form of employment?
Interesting that so many of the screeners quoted refer to touching genitals and breasts. TSA HQ and TSOs who post on other bulletin boards insist that except in the case of a ‘resolution patdown’, genitals and breast are NOT touched. If there are screeners who are groping genitals and breasts, they are doing so because they choose to do so or because they are not following their own SOP.
7. TSA screeners can refuse this duty, and they have the right to do so. Nor can TSA lawfully retaliate. They cannot require someone to touch another persons intimate areas; this is sexual assault of the passenger and sexual harassment of the employee.
8. A week after you crying babies get your way and the TSA stops “molesting” you, a plane will be blown up in the sky, a couple hundred people will die, and all of you whiners will be jumping down these peoples throats for allowing it to happen.
Leave a Reply
|
global_01_local_1_shard_00001926_processed.jsonl/32327
|
Forum Features and Tips
Hi guys!
I made this topic because I think that there are a lot of cool features and tricks on the forum that lots of newer users (including me) could benefit from knowing. So if you know a tip or trick for the forum, post it here!
Hi, I'm new to the forum
First of all, do you have any questions? Have you ever heard of beta testers? Have I just made you curious?
I don't have any questions in particular, but I have heard of beta testers. However, I can't be one because I have Hopscotch on a school iPad.. :pensive:
Oh. I see. You can still do it, do you have your own device?
I have my own device, but it's Android, so I don't think I can do it.
Oh. @Liza, is it possible to do hopscotch beta on android? I know we can't do normal hopscotch, but what about beta?
Unfortunately no. Android requires a different type of coding than iOS
Here is one trick to make this kind of text
Hello, my name is CV Studios and welcome to the
Hopscotch Forum.
All you have to do is tap the space bar four times and type. If you need a new line, tap return/enter and tap the space bar four times again.
To make things easier, there is already abut ton that allows you to do that in the post/comment editor. It's the button sixth from the left. One that looks like this:
How do you do the super tiny subtitles?
#######Hashtags don't help...
the text here
Test Wow Thanks
Oh boy..
This is such an old topic..:sweat_smile:
Brings back memories of my first days XD
So like @GysvANDRegulus said, you can use this code
Text here
But you can also set the size to different numbers to get different sizes.
(I think 10 is the highest you can go)
Thanks! :grin:
I'd like to know how to make those things. XD I don't know what it is callled but when u click it it shows more text
Oh! Do this
[details=(insert gibberish)
(then your text goes here, but you don't need parentheses)
Did it work
I think it did
Thanks a lot! also is there a name for it?
Help me please about this stuff
Hello I am huggingfluffybear!
yay it worked!
I have no idea, but I call it a thingy
|
global_01_local_1_shard_00001926_processed.jsonl/32328
|
How to make... A model
I got a request from snowboarder champion saying that she would like me to make a tutorial so here I go.
Step 1: Open a blank project
Step 2: Pull out a text write the name of what you are doing and place it on the screen. (I will do hair)
Step 3: Make a new rule
Use grow , positions , angles and text to create that. (Use fancy key for blocks)
Step 4: Keep on doing that till you end up with a model
Gobli's General Topic II 🤔
That's really helpful, I made a model, but it looks like a tomboy. Search on hopscotch my account Explorer:herb: (new) if you want to see it.
Awesome! If you are interested you might also want to check out ToasterRebellion's project with shape symbols:
Here's the link to the project. You might find the tips useful for making your own model :smiley:
Do you want me to help you fix it?
It's ok, I wanted it to be a tomboy. I will make another one soon.:blush:
This is my tomboy model, it's not so good.
It looks good! A lot of hard work goes into models it took me a whole day to make my profile picture :wink: So it takes time but it pays off
|
global_01_local_1_shard_00001926_processed.jsonl/32329
|
Help! No Clue How To Grow It!
Discussion in 'First Time Marijuana Growers' started by UglyInfidel, Oct 29, 2003.
1. Okay, i have no clue how to grow it. I have some seeds saved up in a bag right now. I'm going to need to grow it indoors because it's too cold right now to grow outdoors. Is there anything i need to do to the seeds before i plant them? I also need to know how many seeds i should plant at one time? Does it matter what kind of soil i use? How much light should i keep on the plants and how long? what wattage do the lights have to be? haha... now, i understand if no one wants to respond to this... so if it's not to much trouble just like send me a link to a good growing site. Or if you wanna go ahead and type it all, fine with me. haha. Also i know some of those questions might be stupid, but i'm a beginner in growing and i have no clue what i'm doing. haha
2. Okay im feeling generous so here goes..;)
First, as for what you want to do with seeds, you'll want to germinate them first, makes a better percentage of sprouting. Do a search for a post called Germination 420.
Soil, no biggie, jsut dont use anything highly fertilized or miracle grow..
Lighting..your going to want to start off with Fluoros, HPS, metal halide, Metal of those, those are the only kind you can use, no incandescent, aka house lamps. No black lights.
Okay..wattage...depends how many plants you want to grow and what type of light you'll be using, so get back to me on that one. and i'll answer yeh.
Figured you might want it typed the beggining I found the guides confusing aswell..any more questions, ask away.
Grasscity Deals Near You
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/32331
|
Bug - PDF annotations (adds square highlights)
Here’s a screenshot of highlights, a single comment, and also a bunch of squares that show up next to the highlights when I open the PDF in preview (after editing it in the beta editor):
Looked for a thread about this to comment in but couldn’t find one.
Those squares are actually comment boxes and are an artifact of the odd way in which Preview handles comments on highlights. We currently have to write in these comment boxes for every highlight to ensure that the ones with comments actually work. We are looking into ways to avoid this, but at the moment this is the compromise we have reached w.r.t. Preview and its non-standard implementation.
|
global_01_local_1_shard_00001926_processed.jsonl/32332
|
Jump to content
• Content Count
• Joined
• Last visited
• Days Won
web541 last won the day on May 26
web541 had the most liked content!
Community Reputation
60 Excellent
About web541
• Rank
Advanced Member
Profile Information
• Gender
Not Telling
Recent Profile Visitors
1. web541
Create Ranking
Try this <?php $pilots = DB::get_results("SELECT * FROM ".TABLE_PREFIX."pilots ORDER BY `totalpay` DESC"); $ranking = 0; foreach($pilots as $p) { echo '#'.$ranking.' | '.PilotData::getPilotCode($p->code, $p->pilotid).' - $'.$p->totalpay; echo '<br />'; $ranking++; } ?>
2. web541
Latest stable version
I wouldn't consider it more up to date than 5.5.x (it was Nabeel's v2 ported up which was quite old to begin with) but still usable. The intention was to make the current version work with PHP 7.0 so I would assume that it would run fine on that setup (as 5.5.x has never been given the official 'run on PHP 7.0+'). As for security, it's possible that some minor adjustments (for PHP 7.0) here and there have been added but nothing too major should have been impacted (otherwise we would have been notified). The modules depend on the developer, I'd say most would work fine but you might have a few hiccups if they have some deprecated features or otherwise. If you already have a working site then I'd personally wait for v7 than to try and mess around with upgrading again.
3. web541
FltbookSystem issue
Oh right I know what the issue is now. In your first post, I took it as the aircraft itself wasn't showing up for each schedule (I have made a setting for that in the admin panel) as it was blocked off, but really it was the schedule that was blocked off instead so therefore the aircraft were also blocked off. Yes the DISABLE_SCHED_ON_BID should be set to false, if it is set to true then the app takes it and means "Yes I want to disable the bid if someone else has got one" but if it is set to false then it means "No I don't mind if someone else bids on the same schedule". If you want a clean install, then check here.
4. web541
FltbookSystem issue
This is quite odd, if you change the value to 'No', does it update (it could be that the settings table isn't read properly) and does it allow the aircraft to be booked by multiple people? I just tested the module on a fresh install and it worked first time for me. In the event that it still doesn't work, you can go into core/templates/fltbook/confirm_bid.php and delete lines 27-31 which should force it to unlock if something is wrong.
5. web541
FltbookSystem issue
If you go to the admin panel and to the settings for this module, what is this set to? If you change it, does it work? Allow aircraft to be booked if someone else has booked a schedule with that aircraft
6. web541
FltbookSystem issue
The SQL error is because you already have a column name called 'airline' in your 'phpvms_aircraft' table. This could be from another custom module, or from you importing the SQL file more than once. Can you go to phpmyadmin => structure of the the 'phpvms_aircraft' table and screenshot it. Also take one of your aircraft table (only the first row will be fine). Also, in your core/local.config.php file, what is this set to? DISABLE_SCHED_ON_BID
7. web541
Latest stable version
Thanks, noted.
8. web541
Latest stable version
phpVMS Version 2 (https://github.com/nabeelio/phpvms_v2) was the original phpVMS version and still works to some extent, but requires your PHP version to be >5.6. phpVMS Version 5.5.x (https://github.com/DavidJClark/phpvms_5.5.x) is the current stable version of phpVMS and can be used on PHP systems (mainly on 5.5.12) of up to 5.6. Some people have made it work on PHP v7 with no errors, but it's different for everyone on their own hosting. phpVMS Version 7 (https://github.com/nabeelio/phpvms) is currently in development and is a totally different version of the two listed above. This version will be the newest and most up-to-date version when released but is still somewhere between Alpha and Beta stages (you can test it though, but there will still be bugs and changes that will occur before the official release). This version is made for PHP Versions >7.1.
9. web541
[SOLVED] Questions
1. Try this <?php $pendingpireps = count(PIREPData::findPIREPS(array('p.accepted' => PIREP_PENDING))); $pendingpilots = count(PilotData::findPilots(array('p.confirmed' => PILOT_PENDING))); echo ($pendingpireps + $pendingpilots); 2. smartCARS doesn't report the rawdata on its own. You could modify their web scripts and try and make it work, but this depends if the developer has hardcoded anything on the actual app's side or not.
10. web541
VAForum 2 Alignment
<?php //VAForum Original by:simpilot //VAForum Security updates + VAForum 2.0 onwards by: Tom Sterritt ?> <?php $this->show('forum_nav.tpl'); ?> <h3>New Post</h3> <script src="/lib/js/ckeditor/ckeditor.js"></script> <div style="text-align: left;"> <form action="<?php echo url('/Forum');?>" method="post" enctype="multipart/form-data"> <table width="80%" align="left"> <tr> <td>Posted By:</td> <td align="left"><b><?php echo Auth::$userinfo->firstname.' '.Auth::$userinfo->lastname?></b></td> </tr> <tr> <td>RE: </td> <td align="left"><?php $topic = ForumData::get_topic_name($topic_id); $name = $topic->topic_title; echo $name; ?></td> </tr> <tr> <td>New Post</td> <td align="left"><textarea class="ckeditor" rows="10" cols="50" name="message" value=""></textarea></td> </tr> <tr> <td colspan="2"> <input type="hidden" name="topic_id" value="<?php echo $topic_id; ?>" /> <input type="hidden" name="forum_id" value="<?php echo $forum_id; ?>" /> <input type="hidden" name="pilot_id" value="<?php echo Auth::$userinfo->pilotid; ?>" /> <input type="hidden" name="action" value="submit_new_post" /> <input type="submit" value="Submit Post"> </td> </tr> </table> </form> </div> Give that a try.
11. web541
Only Top Ten Domiciles
Try this <table width="100%"> <?php echo '<td width="250px" valign="top">'; echo '<table cellspacing="1" cellpadding="1" border="1">'; echo '<th width="150px"><div align="left">Country Location</div></th>'; echo '<th width="100px"><div align="center">Pilots</div></th>'; $country_info = DB::get_results('SELECT COUNT(pilotid) as total, location FROM '.TABLE_PREFIX.'pilots GROUP BY location LIMIT 10'); foreach($country_info as $country) { echo '<tr>'; echo '<td align= "left">'; echo '<img src="'.Countries::getCountryImage($country->location).'" /> '; echo Countries::getCountryName($country->location); echo '</td>'; echo '<td align="center">'; echo ' ('.$country->total.')'; echo '</td>'; echo '</tr>'; } echo '</table>'; ?> </table>
12. web541
[SOLVED] Forms with errors
Has this always been happening, or is it just with the new skin? Also, can you pm me the link to your site.
13. Go into core/common/ForumData and find all of these public function and replace them with this public static function and that should fix it.
14. web541
[SOLVED] Forms with errors
Check that your browser console doesn't have any errors (could be a jQuery issue). Also, check that the forms have an method of POST not GET <form action="xxxx" method="post"> ... </form>
15. The local.config.php doesn't need to be changed too much, but rather a few other files. Have you followed the tutorial here? https://www.virtualairlines.eu/index.php/Blog
|
global_01_local_1_shard_00001926_processed.jsonl/32341
|
Replacing iCloud drive and photo library workflow with onedrive
Discussion in 'Digital Photography' started by ckny, Oct 25, 2014.
1. ckny macrumors newbie
Dec 4, 2006
The new iCloud drive and iCloud photo library is a very appealing concept to me. But storage remains pricey compared to the competition. If I could share iCloud drive with family it would be a no brainer but as it stands, my wife and I would both need to subscribe to the higher tier and get less storage than one drive with 365 annual subscription.
So the question is - any suggestions on apps that will allow me to keep my photos in one drive (I'll use auto upload from my iPhone) and manage photos from a mac? I want to be able to access the same photos in one drive from multiple macs/iphones/ipads and access the libraries and sync changes I make on either.
I suppose essentially I need to replace iPhoto/aperture on mac with an app that will allow me to store my library in one cloud and replace on my phone and iPad with apps that will access that same library.
2. mofunk macrumors 68020
Aug 26, 2009
Way back when Apple started with file storage I've always used an external drive and backed my photos to DVDr. I'm glad I did because I have a 32Bit Mac and 64Bit Mac.
3. Toltepeceno Suspended
Jul 17, 2012
SMT, Edo MX, MX
So the mac app for onedrive won't do what you need? I turned off icloud photo library and am using the onedrive on my iphone to auto upload photos. I have windows (for at least a few more months) but am using the onedrive app on it.
Onedrive for mac
Did you notice ms announced today they are upgrading office 365 subscribers to unlimited storage? It was already the best deal out there for storage alone.
4. MCAsan macrumors 601
Jul 9, 2012
But then you have to buy into the MS world view. Now that I am retired, we are MS free and plan to stay that way. ;)
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/32343
|
iPhone Will iPhone 4 owners upgrade to iOS 7?
Discussion in 'iOS 7' started by kristoffer4, Jun 28, 2013.
Upgrade to ios 7 on iphone 4?
1. I will put ios 7 on my iphone 4
32 vote(s)
2. No way! I am staying on a stable ios 6.
16 vote(s)
1. kristoffer4 macrumors 6502a
Jan 17, 2006
I don't know wheter I will upgrade to ios 7 on my old iphone 4. My ipad 1 has become almost unusable on ios 5 and I don't what the same thing to happen to my phone. What are your thoughts on this? :confused:
2. iBreatheApple macrumors 68030
Sep 3, 2011
If not at first, they will when apps start requiring them to do so.
3. WhackyNinja macrumors 68000
Jul 6, 2012
Kissimmee, FL
I dont see why not. Unless you REALLY REALLY hate iOS 7 then yeah...
4. LoloBond macrumors 6502
Nov 21, 2011
OP is a afraid that his phone will become slower than already is.... Here at work, I told every iPhone 4 user to wait my OK to update..
5. nalk7 macrumors regular
Jul 11, 2008
Beta 2 runs just as well as iOS 6 after a clean install.
6. Visubversa macrumors newbie
Jun 22, 2013
I took a chance on giving up my iOS 6 jailbreak, and made the move when beta 1 came out. At first, it was ok, but too many bugs. I stayed with it, as I had the same issues with iOS 5, but a lot was worked out with beta 2. I did a clean install of 6.1.4, then directly to 7, and I haven't had a 1/4 of the problems as everyone else has on any device, let alone the i4. So far, it's running, just as smooth as iOS 6, and I love what they've done with the place.
I've been a user since the first iOS, and have been waiting for a change, and just as I started to show interest in android, apple pulled me right back in, and I couldn't be happier.
7. FatPuppy macrumors 68000
Jul 14, 2012
8. Brenz macrumors member
Jun 13, 2012
I'm running beta 2 on my iPhone 4 now and its not that bad.
Can't see it running any slower than iOS 6 once its released but I will be upgrading to the new iPhone anyway so I'm not too fussed either way.
9. 343matt macrumors newbie
Dec 9, 2012
Save your SHSH blobs for 6.1.3, and if 7.0 is slow or buggy, roll back to 6.1.3.
10. kristoffer4 thread starter macrumors 6502a
Jan 17, 2006
As in do a manual backup to itunes?
11. Defender2010 macrumors 68030
Jun 6, 2010
12. irDigital0l Guest
Dec 7, 2010
If its really laggy and slow than no but I will probably upgrade my iPhone 4 this year to either iPhone 5S or Nexus 5.
13. wysiwyg1972 macrumors member
Aug 2, 2012
Toronto, Canada
Call blocking is a feature I am anxious to have on my phone, so will likely update mine to iOS 7. But then again, I will likely be upgrading to the 5s.
14. TWD98j macrumors regular
Sep 14, 2010
As much as I am LOOKING FORWARD to using iOS 7 - after the WWDC presentation - I am looking forward to doing so on a brand new device.
I likely will NOT be putting iOS 7 on my iPhone 4S, as it is already getting long in the tooth on 6.1.3 as it is. I will be keeping my 4S as it is.
However, I am very much looking forward to the iOS 7 experience on a brand new iPhon 5S (or whatever it is to be called).
15. Nermal Moderator
Staff Member
Dec 7, 2002
New Zealand
You still need blobs to revert to 6 even if you don't intend to jailbreak. The iTunes backup only contains your data, not the OS image itself.
16. scrmtrey macrumors regular
Mar 28, 2013
Yes, i will put iOS7 on my i4. In fact, i am on beta 2 now, updated over OTA from beta1.
I am pretty sure that when the GM will be out, it will work fast, smooth, maybe even better than iOS6, but for sure not slower.
Only if u don't like the UI, you should at least try it and maybe u will get used to it. ;)
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/32345
|
Show ONLY Dist. List name in "To:" Field, Outlook 2003
Discussion in 'Business Applications' started by Yama-Dharma, Jul 15, 2004.
Thread Status:
Not open for further replies.
1. Yama-Dharma
Yama-Dharma Thread Starter
Jul 15, 2004
I would like to have the people on my distribution list see only the name of the distribution list in the "To:" field of the e-mail I've sent, rather than the names of all 25 members in the dist list. I'm aware of using the BCC method, but am wondering if there is a better way.
2. Yorkshire Guy
Yorkshire Guy
Dec 9, 2003
I think this is only possible if you are using a MS Exchange Server distribution list that was set up as 'Hide Distribution List Membership'.
I don't think you can do it with your local distribution list.
However, there are some clever people in TSG so .....
As Seen On
As Seen On...
Welcome to Tech Support Guy!
Join over 733,556 other people just like you!
Thread Status:
Not open for further replies.
Short URL to this thread: https://techguy.org/250655
Dismiss Notice
|
global_01_local_1_shard_00001926_processed.jsonl/32347
|
Toad World® Forums
Support for DB2 v9?
On the key features description for your TOAD 3 BETA you mention the DB2 as supported database engine.
But after downloaded and installed I could not find as database supported.
How can I create a modeling for DB2 v9.1? (or 8 in the worst scenario)
Thank you
When will be available for DB2, I owned
Leave Case Studio and buy the license for
Toad Data Modeler because it indicates that all receive
in version 3 features we had in Version 2.1, is a promise
that we Sales did the users of DB2, we see greater concern
in adapting the tool for Oracle. And I am concerned
because I have always had my models in this tool.
thank a lot
Hello all,
Support for databases is added to TDM3 gradually. The database coverage plan is available in the TDM3 Beta Basic Info and Comparison Matrix. Please see the doc at:
As you can see, support for DB2 database is planned for TDM3 version 3.1.
Anyway, I can confirm, we’re working hard on support for DB2 v. 8 at the moment. Support for version 9.1 is planned too.
Now I’d like to ask you for patience. Thank you.
Note: If you’re users of TDM2, please keep on using version 2. As soon as the DB2 support is finished for version 3, you can import your TDM2 models to TDM3 then. Thank you.
If you have any questions, please write me back.
|
global_01_local_1_shard_00001926_processed.jsonl/32386
|
Switch branches/tags
Nothing to show
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
101 lines (77 sloc) 3.2 KB
GoDoc Build Status
maybe – A Maybe monad experiment for Go
This package implements the Maybe monad for a couple basic types and arrays of those types. This allows "boxing" a value or error and chaining operations on the boxed type without constant error checking. See "Error Handling in Go: Rob Pike Reinvented Monads" for more on the concept.
This is an experiment to simplify some libraries the author is writing. It should not be considered stable for production use.
To keep type names short and manageable, abbreviations are used. Type maybe.I is for ints; maybe.AoI is short for "array of ints" and maybe.AoAoI is short for "array of array of ints".
This package only implements up to 2-D containers because those are common when working with line-oriented data. For example, a text file can be interpreted as an array of an array of characters.
Three constructors are provided for each type. The Just_ and Err_ constructors are for values and errors, respectively. The New_ constructor can construct either type, and is intended for wrapping functions that follow the pattern of returning a value and an error.
package maybe_test
import (
type example struct {
label string
data []string
// Example shows how to convert a list of strings to a list of non-negative
// integers, accounting for the possibility of failure either in conversion
// or validation.
func Example() {
cases := []example{
{label: "success", data: []string{"23", "42", "0"}},
{label: "bad atoi", data: []string{"23", "forty-two", "0"}},
{label: "negative", data: []string{"23", "-42", "0"}},
// Function to convert string to maybe.I.
atoi := func(s string) maybe.I { return maybe.NewI(strconv.Atoi(s)) }
// Function to validate non-negative integer.
validate := func(x int) maybe.I {
if x < 0 {
return maybe.ErrI(fmt.Errorf("%d is negative", x))
return maybe.JustI(x)
// For each example, try converting and validating functionally and
// then inspecting the result.
for _, c := range cases {
// Wrap the []string in a maybe type.
strs := maybe.JustAoS(
// Functionally convert and validate.
nums := strs.ToInt(atoi).Map(validate)
// Check if it worked.
if nums.IsErr() {
fmt.Printf("%s: %v failed to convert: %v\n", c.label, strs, nums)
} else {
fmt.Printf("%s: %v converted to %v\n", c.label, strs, nums)
// Output:
// success: Just [23 42 0] converted to Just [23 42 0]
// bad atoi: Just [23 forty-two 0] failed to convert: Err strconv.Atoi: parsing "forty-two": invalid syntax
// negative: Just [23 -42 0] failed to convert: Err -42 is negative
Copyright and License
Copyright 2017 by David A. Golden. All rights reserved.
|
global_01_local_1_shard_00001926_processed.jsonl/32393
|
eBook | A Beginner’s Guide to Microsoft Azure Reserved Virtual Machine Instances
Download Now
Confidentiality Assured.
Microsoft Azure Reserved Virtual Machine (VM) Instances are an effective way to reduce your Azure spend. While the concept of reservations may be new to you, just remember that they enable you to make an all upfront payment towards your compute costs, thereby providing prioritized capacity.
Read this eBook to learn:
• The benefits of Reserved VM Instances
• How to calculate the break-even point
• The options for modifying, exchanging, or cancelling your reservations
|
global_01_local_1_shard_00001926_processed.jsonl/32401
|
Lyse øyeblikk
The Theory of Everything – or – There Is No God.
Ever since Eve had her irresistable craving for apples, humans have been hungering for knowledge. An unquenchable thirst for knowledge. A need to know the answer to the questions. All questions. But the most FAQ is: where do I come from? How did the Universe come to be? And WHY??
The brainiest individuals of all times have been busy working on it. And now we are finally getting somewhere. We are facing a real break-through. According to Stephen Hawking it is only a matter of months before we have it. The Answer.
Up until now the scientists have not been able to correlate the theory of relativity to the theory of quantum mechanics. Or was it the other way around??
As far as I can understand (which is about as far as I can throw this piano) the force of gravity upset their formulas. But now they have found a way around it. They call it the String-theory. The Universe in its substance is made of tiny strings, vibrating each on its own frequency and rythm. Like a huge symphony orchestra.
They are perfecting this theory as we speak. With characteristic modesty they call it the Theory of Everything.
I don´t know. Really. I am a bit skeptical, I must admit.
With all due respect for Professor Hawking et. al.
They are hundreds of times brighter than I am, I will be the first to admit. But still …
Have they solved the mystery of all times?
I doubt it.
Throughout history man has constructed Creation myths and theories.
Hawking and the cave man are much alike in my view. They are both presenting their theory based on what they have been able to ascertain using the knowledge and equipment available to them at their given time in history. They are both doing their best. No one can prove them wrong. Not yet anyway.
I would like to congratulate the modern thinkers, though. The new Creation myth is very beautiful. Imagine the Universe made of music. Lovely. A glorious idea. I feel the beat already.
|
global_01_local_1_shard_00001926_processed.jsonl/32402
|
Category:Legendary Items
The official GemStone IV encyclopedia.
Revision as of 13:44, 18 June 2015 by VANKRASN39 (talk | contribs) (removed from world category)
Jump to: navigation, search
This Category is for the listing of rare items that are above and beyond the normal realm. Items that belong here include, but are not limited to, items from quests, auctions, and raffles. Items that have had extensive merchant work done on them may also appear here.
Pages in category "Legendary Items"
|
global_01_local_1_shard_00001926_processed.jsonl/32404
|
Gwyneth Walker
To Everything There is a Season
for SATB Chorus and Piano (2014)
Return to Gwyneth Walker Music Catalog
Download a PDF file of the choral score of this composition. For perusal only -- not printable.
Commissioned by the Massachusetts Music Educators' Association, Northeastern District, for premiere at the MMEA-ND Senior Festival, on January 10, 2015, Lowell, MA, Brian M. O'Connell, Conductor
The biblical text (from Ecclesiastes) speaks of accepting the range of life experiences -- from prosperity to adversity, from joy to sorrow. In this new interpretation, the lyrics are expanded into personal relevance: "In my life, there is a season. In my life, there is a purpose." And furthermore, "For I believe, in my life, there is a time of hope that we can live together in peace."
The message of this song is the strength to face hardship and challenges, with the belief that one's life has a purpose.
Notes by the composer
|
global_01_local_1_shard_00001926_processed.jsonl/32411
|
Mommy Lesson 598: Oh, Expletive
20140925-030531.jpg You can ban television, monitor the radio, even place ear muffs on your little mini me in hopes of shielding them from naughty words. However, despite all your best efforts, your child will, at some point encounter a word that is unsavory. It could be words of the four letter variety, their slang terms, or even “not nice words”, like stupid. Whatever the word may be, they will at some point, hear it and repeat it, often at the most inopportune of moments. How you react to hearing your little sweetie say such an ugly word, can either encourage or deter your child from repeating such words. Abi and Gabe were “chatting” to one another during the drive to church on Sunday morning. With them content, I decided to take some time to call my mother. After some casual conversation, I asked how my stepdad was feeling. He had recently had surgery to remove several large kidney stones and was still having some issues. I listened to her concerns and offered my encouragement and opinion, all the while keeping one ear on the children. What was coming out of my daughters mouth made me almost drive off the road. image Before I could stop myself I yelled out, “Oh my gosh, Abigail, where did you hear those words?!” My mom began questioning me as to exactly what words she was saying and I questioned her if she had been cursing around my children. I quickly explained that my sweet little three year old was PROUDLY dropping “F” bombs and immediately following it with a swear word describing dung. Incredibly concerned, and only five minutes away from church, I hung up the phone and turned my attention to the cowering potty mouth in the backseat. Determined to find out who had filled my daughter vocabulary bucket with filth, I changed tactics. “Okay, peanut, let’s play a fun game! Mommy is going to ask you questions and you can say yes or no until mommy gets it right.” She excitedly sat up in her seat. I thought I’d begin with the most unlikely suspects first. A quick nope from Abi ruled out daddy, both sets of grandparents, Mickey Mouse and the dog. Still trending on the easy and, somewhat silly side, I asked, “Does mommy say those words?” image “Yes!” She shouted from her car seat, I almost drove off the road again. Confused and horrified I glanced at my daughter . Those of you who know my family would also know that those words are not used or accepted in our house. The fact that my three year old was blaming ME for the filth was downright alarming and had me almost in hysterics. I turned to look at her, “Um, okay, little one, why don’t you tell mommy when I used those words. Please say them slowly”. She wrinkled her eyebrows, “You said it today, talking to Nina”. Now I knew this wasn’t right at all, and now being in the church parking lot I needed to sort this out ASAP. She continued “You were talking about Papa and his ‘killie f-bomb-poop expletive”. Aha! I was off the hook! I was still on track to being mother of the year. I had not produced a child who would need to gnaw on a bar of soap. My smart little bug had indeed been eavesdropping, however, she didn’t quite have the pronunciation down correctly. I waved hello to the other mom who had parked next to us and unstrapped Abi. Before I took her out of the car I looked her right in the eye and said “I’m very glad that you learned a new word today, but we are not going to be talking about Papas kidney function in church.” image
Follow Hand Me Downs via
Facebook or Twitter
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/32429
|
Try 1 month for 99¢
Changing your environment can greatly improve your outlook. The key to great decor isn't how much money you have to spend. It's seeing possibilities in what you have. You'll be surprised at what you can do yourself for little or no cost.
1. Use what you've got. I have a friend who calls herself a professional arranger. People hire her to come to their homes and redecorate with the things they have.
She goes through every room, cupboard and closet, taking inventory of everything available for her final designs. Then, she completely clears the room and starts from scratch to furnish and decorate with only the things that she found in the home. The results are amazing.
(If that triggered something in you that whispered, "I wish someone would pay me to do that," check out the International Association of Home Staging Professionals.)
3. Strategic placement. The furniture you use most should be farthest from the entrance. If possible, avoid positioning couches, chairs, dining tables or desks against walls. Give yourself at least 3 feet between the furniture and walls.
4. Pictures and art. Most people hang pictures and art too high. The focal point for a single picture or the center of a group of pictures should be eye level for a person who is 5 feet and 7 inches tall.
Gather the pictures you want to hang in a particular grouping. Then, get a large piece of paper the size of the area where you will hang these pictures, and lay it on the floor.
Arrange the frames on the paper the way you want them hung on the wall. Use a marker to draw around each item. Remove the pictures, and tape the paper to the wall. Now you can easily see where to put each nail.
Once the nails are in place, carefully pull the paper away and hang the pictures in their proper places.
6. Plants. Select plants that are right for the light available in the area where you want to display them. Some easy growers that don't require a lot of extra care include Philodendron and Boston fern.
7. Do it yourself. Whether it's making slipcovers, painting a wall or ceiling, or laying tile, you'll save a ton of money when you do these things yourself.
Search online, or take a class at your local home improvement center. Typically these are free or you pay only for the cost of materials.
Need an emotional pick-me-up? Change up your environment, and see how good it feels!
Subscribe to Breaking News
Load comments
|
global_01_local_1_shard_00001926_processed.jsonl/32437
|
Mr Maria
Anana Elephant Lamp
Stock Status
This adorable Elephant lamp from the original Miffy range is one of the new characters to steal our hearts! Sweet and serene, the Elephant lamp is suitable for children of all ages, including adults. This charming lamp emits a soft light and warm glow and is completely safe for your little ones. Does not heat up even if left on for a long time, so your child can give their friend a hug!
DIMMER FUNCTION so you can adjust the brightness, LED Lighting. Comes with a UK Plug.
Dimension: H51 W43 D43cm
Materials: Polyethylene, LED Lamp
Delivery Remark
Estimated Arrival: 2-5 working days to HK
|
global_01_local_1_shard_00001926_processed.jsonl/32447
|
The Two Types of Mario Kart
There are two types of Mario Kart in this world; those that focus on driving and those that focus on items. Continue reading “The Two Types of Mario Kart”
Mario Kart 7
|
global_01_local_1_shard_00001926_processed.jsonl/32449
|
Introductory Guide
If you’re new to hydroponics, you can use all the information on this site to begin growing your own . The articles are meant to be read in a linear fashion (like you would a book).
Introductory Overview
Plant-Specific Guides
Product Reviews
Just for Fun
Leave a comment
|
global_01_local_1_shard_00001926_processed.jsonl/32456
|
The city of Haifa
For Participants
For authors
ICML 2010 - Paper submission
Submissions closed!
ICML 2010 Instructions for Authors
Full paper submissions are due on February 1, 2010 at 11:59pm, Samoa time. There is no separate abstract submission. Papers should be submitted electronically via the following submission site:
You can submit a paper (in PDF) and supplementary materials (as a single archive).
For details on the format of the conference, important dates, and the review process, please see the call for papers. For selecting the keywords of your submission, you may also wish to consult the list of Area Chairs with associated Keywords or the list of Keywords with associated Area Chairs.
Submission and Formatting Instructions
Papers are limited to 8 pages and 10MB. Detailed instructions for preparing the paper can be found in the following example paper:
You may also wish to download the following archive, which contains LaTeX style files and a Word template:
Submissions that exceed the page limits or do not conform to the specified format (in particular if a more compressed format is used) will be rejected without review.
Double-Blind Reviewing
Reviewing for ICML-2010 is double-blind, i.e. reviewers will not know your identity. Detailed instructions for how to ensure your anonymity are also contained in the above example paper. In brief, please refer to your prior work in the third person wherever possible. If you need to make an anonymous reference (e.g., if you refer to your own work that is under review elsewhere), please upload this work as supplementary material (see below).
Note that anonymizing your paper is obligatory, and papers that explicitly or implicitly reveal the authors' identities may be rejected.
Supplementary Material
ICML 2010 supports the submission of supplementary material, such as software, videos, or datasets. In particular, if you make anonymous references in the paper, please upload the referenced papers, so that the reviewers can take a quick look. Please also take care not to reveal your identity in the supplementary material.
Supplementary material will not be published or archived. If you want to include it in a final version of the paper, you must put it on a Web-site and reference the site in the final version of paper.
Double Submission Policy
ICML will not accept any paper which, at the time of submission, is under review for another conference or has already been published. This policy also applies to papers that overlap substantially in technical content with conference papers under review or previously published. ICML submissions must not be submitted to other conferences during ICML’s review period. Authors may submit to ICML substantially different versions of journal papers that are currently under review by the journal, but not yet accepted at the time of submission. Informal publications, such as technical reports or papers in workshop proceedings which do not appear in print, do not fall under these restrictions.
|
global_01_local_1_shard_00001926_processed.jsonl/32458
|
Adobe DITA World 2018
Stay current with the latest in tech comm
Stitcher radio
Search results
Adobe DITA World 2018
API doc survey result: How do you get the source files that contain code comments?
by Tom Johnson on Jan 6, 2015
categories: api-doc
In my API doc survey, one of the questions was the following:
How do you get the source files containing code comments? (e.g., Git, Mercurial)?
Out of 42 responses, here are the results:
This question partly served as a check to an earlier question, Do you create documentation by looking at the source code of API files?. For that question, 60% of the people said yes or sometimes, and 40% said no. With the question here, 24% of the people said they don't have access to the source code, so the answers harmonize. Most likely another 16% have access to the source code and might occasionally consult it, but they don't use it to create the documentation.
By far Git (and Github, a repository for Git) is the most common source control software used, followed by Perforce. We use Mercurial at my current work, and at previous companies we used Git.
Why is this question important?
This question is more important than it may seem on the surface, but its importance relates more to automated documentation solutions, which are perhaps more common with platform APIs.
With platform APIs, such as Java or C++, it's important to access the source code because the documentation usually lives in the source code for these types of APIs. If you don't have access to the source, then you can't edit or contribute to the reference documentation (though you could certainly create the non-reference documentation).
Figuring out source control isn't the easiest thing in the world. I spent a couple of days wrapping my head around Mercurial. I was excited to see Joel Spolsky create some great tutorials on Mercurial, but apparently Mercurial isn't that common. Git is perhaps more popular because of Github, which is a widely used repository on the web that uses Git. If you have an API that lives on the web, Github is probably the most widespread source control used.
How technical writers work with source control
Peter Gruenbaum says that typically when he works with a platform API's documentation, he downloads the code through source control. Developers create a separate branch for him to commit his updates to, and then when he's finished they merge the doc branch with the main branch.
Given this workflow, learning how branching works in the source control software used by your engineers would be a strategic way of contributing to the code without committing to the main repository and potentially freaking out developers if you accidentally break the code or cause a lot of merge conflicts.
Gaining trust
In a workshop on API documentation, Ed Marshall explained that he had to gain the trust of developers over time before they felt comfortable giving him access to commit to the repository. Developers may first question a technical writer's request to even access the repository in the first place, let alone commit updates to it. But I think more experienced developers understand that everything in source control can be reverted to an earlier state. You can't really contribute to reference documentation unless you can access the source. So source control rights are critical.
What does "clone that repo" mean?
When browsing Github repositories online, you're bound to run into the phrase "clone that repo." what does this mean? Basically, it means you copy a folder of files from a web repository to your computer, but even more, when you copy the repository, you also copy certain git files that allow you to get the latest updates of that repository through a simply command line prompt (git pull). This way, everyone who has this repository can keep it in sync on their local machines.
I created a tutorial for sharing files (with the intention of sharing Java projects) using Git and Github here: Java: Share Java projects with others using Git and Github.
Stay current with the latest in tech comm
follow us in feedly
|
global_01_local_1_shard_00001926_processed.jsonl/32473
|
October 12, 2016 ALL
Petition Now for Spring Registration Overrides
In preparation for spring 2017 registration, if you need to request to repeat a course, request permission to register for more than 18 hours, or request to override a course prerequisite, please file your academic petition now so that it can be reviewed (and hopefully approved) before registration begins. The academic petition form can be accessed through the Academic tab in BannerWeb.
If you have any questions about the petition process, email [email protected].
|
global_01_local_1_shard_00001926_processed.jsonl/32496
|
This is a post I’ve been meaning to write for a long time. In several of my demos, many of you who follow me have seen how I use the following two helm charts to deploy new helm charts on my Kubernetes cluster that route traffic to my nginx ingress controller (LoadBalancer) and pull a valid SSL cert from Let’s Encrypt through the Kube Lego deployment (pod). I want to briefly explain how that’s all working.
First, you can find out about how to setup both charts in my previous blog post. Once you’ve configured both charts and made a record with your domain registrar, you’re ready to follow along.
The way I’ve configured my nginx/kube-lego setup is as follows:
1. Pointed Google DNS Namespace record to Azure DNS
2. From Azure DNS, created an A record pointing to my nginx ingress within my K8s cluster 1. For this, I used a wildcard *.k8s
What this means is anytime I register anything with as the suffix (I.E between Google DNS and Azure DNS, traffic is routed to my nginx ingress controller in my Kubernetes cluster.
Huge shoutout to Lachie Evenson for introducing me to this setup!
Now, of course, I do have to ensure my helm charts have the ingress enabled and have the proper ingress.yaml file configured. If you have seen my Build demo with Abel Wang, here are the code snippets I used:
Secrets Values Creation
Deployment Secrets Template Values
{{- if .Values.imagePullSecrets }}
- name: "{{ .Values.imagePullSecrets }}"
{{- end }}
Ingress Values Creation
enabled: true
annotations: nginx "true"
tls: true
Deployment Ingress Template Values
{{- if .Values.ingress.enabled }}
apiVersion: extensions/v1beta1
kind: Ingress
{{- if .Values.ingress.annotations }}
{{ toYaml .Values.ingress.annotations | indent 4 }}
{{- end }}
name: {{ template "fullname" . }}
- host: {{ .Values.ingress.hostname | quote }}
- path: /
serviceName: {{ template "fullname" . }}
servicePort: {{ .Values.service.internalPort }}
{{- if .Values.ingress.tls }}
- secretName: {{ .Values.ingress.hostname | quote }}
- {{ .Values.ingress.hostname | quote }}
{{- end -}}
{{- end }}
You’ll notice – all this code does is enable the ingress and secret as part of the Kubernetes deployment with Helm and then the ingress.yaml (which is parameterized) says if the value is enabled, then fill out the following data such as rules to route the host (ingress.hostname) to the http path of /.
That’s it!
|
global_01_local_1_shard_00001926_processed.jsonl/32512
|
Page has been translated into this language of semi-automatic and can therefore include stylistic and grammatical errors in the texts. Please email us if you notice such errors. Thank you.
Why you need to use Crypter/obfuscator?
Cryptor / obfuscator is designed to protect the source code scripts from unauthorized analysis and reengineering. As you know, scripts Javascript impossible compiled into an executable file. Therefore, as a result of their use on web pages, source code scripts potentially available to an unlimited number of persons.
Some of these individuals can (and will) to analyze your scripts without your permission in their personal or commercial purposes, or copy part or all of the source code as a whole, to find vulnerabilities in the structure of your site, as well as in the other, contrary to your interests, purposes.
It should be remembered that this analysis is carried out not only manually, but often in the automatic mode 24 hours per day. Less than open source code of your scripts, the more chances to avoid the risk of unauthorized use and the occurrence of damage to you.
Remedies source scripts usually divided into cryptors and Obfuscators .
Cryptor is carried out over the entire source Javascript a general transformation that takes script text into unreadable form. Eg base64 or XOR on a fixed or dynamic value. Then added to the data obtained special unpacker code that, when run in a script browser translates the data to its original form, and the resulting code runs somehow.
In the simplest the case of start-up is through eval, which detects many autounpacker and allows you to quickly remove all protection. More advanced cryptors not use eval, and launch a through creation anonymous functions, manipulation with designers base types or other little-known opportunities JavaScript.
obfuscator irreversibly change themselves design the script source code. Added between operators source "junk" instructions replace readable names and logical functions, constants and variables with meaningless in terms of human names.
For example: if (BrowserName == "IE") SendRequest(1);
transform into if (Е2А==eSx)Pl1(iF0);
Cryptor create more compact code and less impact on the performance of the original script, but less resistant to deprotection and after the "failure" give all the source code for almost the initial state.
Obfuscators, to achieve the same unreadable significantly increase in the amount of code and some cases adversely affect the reliability of the original script. But while protecting quality obfuscator can not be removed until the end, even after a detailed analysis of its mechanism.
Cryptor / obfuscator Caesar combines the pluses of both approaches. Mechanism allows the use of encryption reduce the inevitable increase in code size of the output. Obfustsirovanie important sections of code decompressor, and delicate obfustsirovanie source resistance increases protection.
In addition, unlike many cryptors / obfuscators for Javascript (including commercial) Caesar uses special techniques protivootladochnye. Protection Jsbeautifier, Firefox Firebug and Firefox Deobfuscator, Wepawet (, Jsunpack ( Ability to bind script code to domain. Setting the character encoding and script's life time.
$49 or €43
/08.03.2018/ Плановые обновления обфускаторов caesar и caesar+
/01.09.2017/ Уважаемые клиенты! С 01 по 15 сентября тех.поддержка, а также оплата через Webmoney будут недоступны. Оплата покупок картами, ЯндексДеньгами и биткоинами будет работать как обычно.
|
global_01_local_1_shard_00001926_processed.jsonl/32514
|
Creative Writing
Wen in Doubt
My future book in the making
My creative writings
I really took an interest in writing due to my grade 7 teacher, Mr. Geiger. He really pushed us to write a paragraph every day, and present it in front of the class. He got the class to evaluate how good you were, so the incentive was to be as interesting as possible. Since then, I’ve joined and won various prose and poetry competitions and have kept up the writing to date. Below are some of my creative writing works (that I want to show).
|
global_01_local_1_shard_00001926_processed.jsonl/32530
|
Encyclopædia Britannica, Inc.
Encyclopædia Britannica, Inc.
A land of extremes and contrasts, Asia is the largest and the most populous continent on Earth. It has the highest mountains and most of the longest rivers, highest plateaus, and largest deserts and plains of all the continents. Asia is also home to some of the world’s oldest cultures. It has some of the poorest as well as some of the richest countries in the world. It contains a major share of the world’s largest cities as well as very large populations of rural dwellers. Because of its size, age, population, and rich resources Asia has long been of great interest to the rest of the world. During much of Asia’s history, outsiders, principally Europeans, tried to exploit and control it and its people. In the 20th century, however, Asia was a scene of great change. Many of the underdeveloped countries of the region took various approaches to modernizing their economies and societies, some under communism. Progress was often slow because of physical and cultural barriers, but there were some notable advances and the efforts to upgrade living standards continue today.
Two Definitions of Asia: Classical and Modern
Asia is part of the Eurasian landmass, the largest body of land on Earth. Through time, a division of Eurasia into two parts, Europe and Asia, became generally accepted. The dividing line started with the Ural Mountains in Russia and then continued south to the Caspian Sea, turning west to follow the boundary between today’s Iran and Turkey on one side and Georgia, Armenia, and Azerbaijan on the other. Turkey thus was the westernmost part of Asia. Asia then, in the classical sense, extends east as far as the Pacific Ocean, north to the Arctic Ocean, and south to the Indian Ocean and the islands of Southeast Asia. Europeans called Asia the Orient, meaning “east,” and the Western world was referred to as the Occident, meaning “west.” These old terms are no longer used, however.
Some geographers prefer to define Asia in a narrower sense. This smaller Asia is based on the region’s more recent political, cultural, and economic changes. Thus, modern Asia would exclude the subregions of Northern (or Russian) Asia, Central Asia, and Southwest Asia. Remaining in the modern version of Asia would be South Asia, Southeast Asia, and East Asia. Although this article uses the classical, larger definition of the continent, some recognition is given to the modern interpretation of Asia. (For more information about each of the subregions, including the countries they comprise, seeAsia’s Geographic Regions” later in this article.)
Natural Environment
Because of its enormous area, Asia encompasses the world’s greatest climatic extremes. As a result, the continent is home to the most varied forms of vegetation and animal life on Earth.
Land and Population
© abalcazar/
Even the modern, smaller definition of Asia would make it the largest and most populous of the continents. Classical Asia is even larger. Its area of more than 17 million square miles (44 million square kilometers) accounts for almost one third of Earth’s land surface, or an area greater than the two Americas or Europe and Africa combined. From a population perspective, Asia leads the world even more. There are more than 4 billion people in Asia, more than 60 percent of the world total. Most of those people, some 3.7 billion, are concentrated within South, Southeast, and East Asia.
The average population density of Asia (including all of Turkey) is about 289 persons per square mile (112 per square kilometer), compared to about 56 per square mile (22 per square kilometer) in North America. Asia’s population is unevenly distributed, so that in some of the countries of the continent, the densities are far higher than the average. The density is about 870 persons per square mile (340 per square kilometer) in Japan, for example, and more than 20 times that in Singapore. Siberia, by contrast, has only about 10 persons per square mile (4 per square kilometer).
Seas and Islands
Shiro Shirahata/Bon
One of the major characteristics of Asia is that most of the population is crowded onto a broad fringe extending to the ocean, an area that is relatively fertile, level, and well-watered. This can be pictured as an arc extending through the three subregions of East, Southeast, and South Asia. The association with the sea is strong. Three oceans border Asia—the Arctic, Pacific, and Indian—but the latter two are by far the most important to the people of Asia. Within the areas where these oceans touch the continent are many of the world’s largest and most important islands and archipelagoes.
On its eastern side Asia is strung with island arcs that enclose many seas. In the northeast, Asia comes closest to North America, where the Alaskan mainland lies only 53 miles (85 kilometers) from Siberia. The Aleutian Island chain encloses the Bering Sea. The Kamchatka Peninsula and the Kuril Islands fence off the Sea of Okhotsk in Siberia. Sakhalin Island and the main islands of Japan bend in another arc toward the Korean Peninsula to set off the Sea of Japan. The Ryukyu Islands arc southward to the island of Taiwan, enclosing the Yellow Sea and East China Sea. From Taiwan south, the Philippine archipelago picks up the pattern, blending into the island of Borneo to delimit the South China Sea. Much of Southeast Asia is a complex mix of islands and seas.
This distinctive pattern of island arcs is the result of the so-called Ring of Fire that largely encloses the Pacific Ocean. In this area the land is geologically young and still developing. The islands along the ring are thus rugged, and volcanoes and earthquakes are common in this region.
In South Asia the pattern of seas and islands is not so striking, and the region is dominated by the mass of the Indian Ocean fronting directly on the mainland. The largest island, Sri Lanka (formerly Ceylon), lies off the tip of the Indian subcontinent. The Bay of Bengal directly to the east is separated from the Andaman Sea by the Andaman and Nicobar islands that trail southward toward Sumatra. To the west of India there is a sprinkling of mostly coral atolls in the Laccadive Islands and Maldives, running south out of the Arabian Sea. Southwest Asia is distinctly shaped by the peninsulas of Arabia and Turkey and the seas that surround them, particularly the Black Sea, Mediterranean Sea, Red Sea, and Persian Gulf.
Continent of Extremes
Asia’s great expanse from the equatorial tropics to the Arctic (6,000 miles; 9,650 kilometers) and from the Pacific Ocean to the Mediterranean Sea (5,900 miles; 9,500 kilometers) results in a continent of extreme contrasts. Asia contains virtually every kind of natural landscape. Roughly half the continent consists of highlands, and about 8 percent is more than 10,000 feet (3,000 meters) above sea level. Asia’s average elevation exceeds that of all the other continents except Antarctica.
Mountainous Center
© Picassos/
In the western part of this plateau are the Pamir Mountains, called the Roof of the World, where China, Tajikistan, Pakistan, and Afghanistan meet. From this mountain knot, lofty ranges spread outward in many directions. The Hindu Kush runs southwest through Afghanistan. To the northeast extends the Tien Shan. The Karakoram runs southeast and merges into the Himalayas, the highest mountain range in the world. Mount Everest, the world’s tallest peak (29,035 feet; 8,850 meters), is located there, as are the other eight highest peaks of the world. The Himalayas are a favorite challenge for mountain climbers.
The largest area of highlands in Asia thus is connected with the Plateau of Tibet. Most of western and northern China, as well as all of Mongolia and much of southern Siberia, is dominated by mountains and plateaus.
To the north is the great plain of Siberia that rims the Arctic Ocean and stretches west, with few physical barriers, to European Russia. The Caspian Sea and the Ural Mountains mark the traditional western limit of Asia. South, southwest, and east of the highland core of Asia, the landscape is a mix of lower mountain ranges, hills, plains, and valleys, which blends into the island arcs of the east and southeast.
Great Rivers and Their Basins
The drainage pattern of Asia is also dominated by the central highland core. With the exception of Southwest Asia, all the great rivers of Asia flow out of this central highland region. Eight of the 20 longest rivers in the world are found in Asia. Those that flow to the Arctic through Siberia include the Ob, Yenisey, and Lena. The valleys they form are largely uninhabited because of the harsh climate.
The rivers that flow to the east and south, however, have been home to millions of people since the beginning of history. Their valleys have the combination of warmth and moisture that was favorable to early civilizations. These rivers include the eastward flowing Amur (or Heilongjiang), the Huang He, the Yangtze (or Chang), and the Xi system, all in China. Southeast Asia has the great rivers of the Mekong, Chao Phraya, Salween, and Irrawaddy. In South Asia are located the Ganges, Brahmaputra, and Indus rivers. Southwest Asia is arid and has few major rivers. The most important are the Tigris and Euphrates, which flow out of the highlands of Turkey.
Not all of Asia’s rivers reach the sea. From the Caspian Sea eastward through parts of the central mountain core of western China is a region of interior drainage. Here rivers flow from the mountains across arid lands and disappear into salty lakes or swamps. This is a rugged land and is among the least populated parts of Asia.
Extremes of Climate
Asia has every type of climate found in the world. The major factors that influence Asia’s climate pattern are its huge land area, its location between the tropics and the Arctic, and its great range in elevations from sea level to high plateaus and mountains. The dominant climatic pattern over most of the inhabited part of Asia is the monsoon, the seasonal shift in wind patterns between winter and summer. Most of Asia’s people live in what is sometimes called “monsoon Asia.” This includes the subregions of East, Southeast, and South Asia. During winter, cold, dry air moves southward out of the Mongolian Plateau, giving northern Asia little precipitation in winter. In summer the pattern reverses, with warm, moist air moving northward from the tropics. Rainfall is heaviest at this time, especially in the coastal band of the three subregions. By the time the air masses reach farther north, most of the moisture is gone. Precipitation is therefore heaviest in southern and eastern Asia where most of the people live.
To the north, in Siberia, the climate is cold and dry. The extreme northern fringe, as well as much of the Plateau of Tibet, has a tundra climate, sometimes also called a cold desert because the land is dry like a desert but with cold temperatures. Most of the remainder of Siberia has a subarctic climate. In this area stands a vast evergreen forest known as the taiga. There, some of the world’s coldest temperatures have been recorded.
Paolo Koch—Rapho/Photo Researchers
Steppe and desert climates dominate the regions just south of the subarctic; they affect most of north and west China, Russia, and virtually all of Southwest Asia and western South Asia. These are regions of low precipitation and hot summers. Because of the dryness and lack of sources of fresh water, large parts of the steppe and desert regions are uninhabited.
Parts of northern China, plus North and South Korea and part of Japan, have a continental warm summer climate. Winters are fairly cold, but summers warm and humid, and thus the land is well-suited for agriculture and human settlement. To the south a large humid subtropical climate zone prevails. It stretches from southern Japan through all of southern China and parts of northern Southeast Asia and South Asia. Because of the mild climate of this region, it is one of the most densely populated parts of Asia and also the world.
Art Resource, New York
Farther south are the tropical humid climate zones of South and Southeast Asia. They have high year-round temperatures and heavy precipitation, which have given rise to some of the world’s densest tropical rainforests. On the mainland, where the winter monsoon effect is felt, precipitation is concentrated in summer and there is a winter dry season, producing a savanna climate. Particularly in a high population density region such as India, the timely arrival of the summer monsoon is critical to millions of people who depend on the rains for agriculture.
Plant and Animal Life
The distribution of Asia’s natural vegetation and wildlife is directly related to the continent’s climate patterns. Thus, the types of plant and animal life are as various as the climate. Wherever humans have been present in large numbers for a long time, such as India and China, the need for land for agriculture and settlement has meant the destruction of wildlife and natural vegetation. In Southeast Asia the once extensive tropical rainforest is rapidly disappearing because of logging operations, population growth, and agricultural expansion. Only in Siberia, where the population is small, has the natural landscape survived relatively unchanged. To a lesser extent that is also true in the steppes and deserts. (See also deforestation.)
Asia was once the range for countless species of wildlife, including some found only in Asia. Now many species have been drastically reduced in numbers, some close to the point of extinction. The governments of most countries in Asia have not had strong policies for protecting wildlife, and uncontrolled hunting has often been allowed. Some unique animal species found only in parts of Asia still survive but are highly endangered, including the giant panda of China and the Sumatran rhinoceros and orangutan of Southeast Asia.
Asia’s Geographic Regions
The major regions, or realms, into which classical Asia is divided are distinguished primarily by culture, history, political development, and, to some extent, natural environment. The regions, as stated earlier, are Northern (or Russian) Asia, Central Asia, Southwest Asia, South Asia, Southeast Asia, and East Asia.
Northern (or Russian) Asia
© Vladimir Melnikov/Fotolia
The vast Russian region of Siberia makes up Northern Asia. It extends from the Ural Mountains in the west to the Pacific Ocean in the east. A largely barren land, it has always resisted human settlement because of severe cold in the north and dryness in the south. Only a small proportion of Russia’s population—roughly 20 million people—lives there today despite the area’s size. The population is denser in a narrow band along the southern border.
The principal economic activities in Northern Asia are mining of the region’s rich mineral wealth, particularly coal and oil, and logging in the taiga, the world’s largest forest. Heavy industrial activities include petroleum and gas refining, chemical and metal production, machine building, and construction. The harsh climate and vast area hamper greater development.
Central Asia
Encyclopædia Britannica, Inc.
Central Asia includes the countries of Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan, which were formerly controlled by Imperial Russia and were later republics of the Soviet Union. (Some definitions of Central Asia also include parts of western and northern China and Mongolia.) About 60 million people live in this subregion. The terrain ranges from high mountains in the southeast to hilly and flat lowlands in the west. Much of the area is arid.
Mining, especially of oil, natural gas, and coal, is important to Central Asia’s economy. Cotton and other crops are grown and livestock are raised. Among the major industrial products are metals, machinery, processed foods, and textiles.
Southwest Asia
Ehsan Mahdiyan
Like Northern Asia, Southwest Asia is a subregion that is sometimes not regarded as part of the modern concept of Asia. The area extends from Asian Turkey (all of Turkey except the region of Thrace) and Iran in the north, south through Iraq, Syria, Lebanon, Israel, Jordan, and Saudi Arabia and the other states of the Arabian Peninsula. Southwest Asia is dominated by a dry climate, and thus the total population has never been large. Of the more than 278 million people in the region, Iran and Turkey account for more than half. Culturally, the region is the easternmost extension of the Middle East–North Africa realm, the area dominated by the Arabic-Islamic culture. Although Southwest Asia has had long historical associations with the rest of Asia to the east, its main economic and political ties have been to the west, with North Africa and Europe.
Southwest Asia was the site of some of the earliest civilizations. They developed in the Fertile Crescent, starting in the Tigris-Euphrates valleys in what is now Iraq and curving down through the valley of the Jordan River and the Dead Sea in what are now Jordan and Israel. Although economically limited by the arid climate, Southwest Asia was fortunate during the 20th century because of the vast oil deposits found there, especially around the Persian Gulf. The wealth earned from oil exports economically transformed much of the region and made some of the countries among the richest in the world. Oil has made Southwest Asia a region of vital importance to the world’s industrial countries. In the 20th and early 21st centuries Southwest Asia was the focus of numerous world crises, because of both cultural conflicts and the attempts of industrial countries to influence and control the oil-rich region.
South Asia
South Asia is sometimes referred to as the Indian subcontinent. It consists of India plus the smaller countries of Pakistan and Afghanistan to the west, Bangladesh to the east, Nepal and Bhutan to the north, and the island countries of Sri Lanka and the Maldives to the south. The northern boundary of South Asia is the great Himalayan mountain chain, which forms the southern border of Tibet, a part of China. South Asia is about half the size of the United States and has a great range of natural features and climates. Nepal and Bhutan are landlocked mountain states with limited agricultural potential. The same is true of Afghanistan, though it has a much larger territory.
Afghanistan’s strategic location between the Middle East and southern and eastern Asia has made it a crossroads and the target of numerous invasions, including one by the Soviet Union in 1979. Most of western South Asia, including parts of Pakistan and western India, is extremely arid. Irrigation, mainly from the Indus River, has long been vital to agriculture there. In the east, Bangladesh shares the valleys of the Ganges and Brahmaputra rivers with India. This is the heartland of South Asia, with the most humid climate and best conditions for agriculture. More than half of South Asia’s 1.6 billion people live in these valleys. South of the Ganges Valley the land slopes to the Indian plateau and the climate is subtropical to tropical. With the development of irrigation and hydroelectric projects, the region has made industrial progress.
All of South Asia was controlled by the British, as part of their worldwide colonial empire, until independence was granted in the late 1940s. The British left a legacy of many economic improvements, including an extensive railway system, and a strong political and cultural imprint on the traditional societies of the region. However, the great diversity of peoples, languages, and religions in South Asia, combined with overpopulation and extensive poverty, left the region with many problems of national development.
Since independence, there have been many improvements characterized by growth of industry, mechanization of agriculture, urbanization, and an increase in literacy. The South Asian countries are still poor, but they are developing. India has made great strides in expanding and diversifying its economy.
Southeast Asia
Louis K. Meisel Gallery/Corbis
Southeast Asia consists of two main parts: mainland and insular (largely the island area). The mainland is composed of parallel mountain ranges and river valleys that run south and southeast out of the Plateau of Tibet and surrounding highlands. Thus, the mainland countries of Myanmar (Burma), Thailand, Laos, Cambodia, and Vietnam consist of river valley cores in which most of the people live. These cores are surrounded by less populous highlands. In Myanmar the core is the Irrawaddy Valley. In Thailand it is the Chao Phraya. In Laos, Cambodia, and southern Vietnam, the cores center along the Mekong River. In northern Vietnam the core is in the Red River valley. Insular Southeast Asia consists of the Malay peninsula and the many islands that make up the countries of Malaysia, Singapore, Indonesia, Brunei, and the Philippines. Indonesia alone has more than 13,000 islands. People on these islands live largely along coastal plains and short river valleys that flow out of the mountainous interiors of the islands. Most of the islands are mountainous, and many are of volcanic origin.
Southeast Asia’s population of more than 579 million is much smaller than that of South or East Asia, but the land area of Southeast Asia is also smaller. The population is unevenly distributed, and population densities in parts of the region range among the world’s highest. Indonesia alone has more than 229 million people, more than half of them on the island of Java. All of Southeast Asia was under colonial rule or influence until after World War II. However, independent civilizations, such as the Khmer and Thai, flourished in the region long before the colonial rule of the British, French, Dutch, Spanish, and Portuguese was imposed starting in the 16th and 17th centuries.
Since independence the Southeast Asian countries have worked to develop their natural resources and industries. Indonesia and Malaysia are major producers of petroleum and natural gas, for example, and Indonesia and the Philippines are significant producers of nickel. Considerable industrialization has taken place in many of the countries, including Singapore, Malaysia, Indonesia, and Thailand. Southeast Asia is a key point of origin for computer parts. Throughout the region new techniques are being used to increase production of rice and other grain crops. Plantation crops such as rubber, bananas, coconuts, sugarcane, tea, palm oil, and spices are also important. The conflict that raged in Indochina, or Vietnam, Cambodia, and Laos, from World War II until the mid-1970s hampered progress in those countries, of which Vietnam has become the most powerful.
East Asia
East Asia consists of the countries of Japan, North and South Korea, China, and Mongolia. An old term for the region is the Far East, a name that arose among Europeans, who considered this region in the continent to their east to be “far” from Europe in terms of traveling time. East Asia lies mostly within the Temperate Zone, and thus the climatic patterns and natural environment are similar in many ways to those of Europe and southern North America.
© Nikada/
China, with its huge size and population, dominates East Asia physically. The remaining much smaller states are located along the eastern side of the region, which includes the peninsula of Korea, divided today into the two countries of North Korea and South Korea. The island country of Japan is also there. In the southeast is the island of Taiwan (formerly Formosa), where the Republic of China government fled after the Chinese Revolution in 1949. After that Taiwan developed independently of mainland China, but the governments of both Taiwan and the mainland consider Taiwan to be a province of China. Hong Kong, on China’s southeast coast, was administered as a British colony from 1841 to 1997, when it was formally returned to China. Macau, which lies just across the bay from Hong Kong, was under Portuguese administration from the 16th century until it was returned to Chinese control in 1999. Both Macau and Hong Kong are special administrative regions of China.
Mongolia is also part of East Asia. For much of the 20th century, however, Mongolia was politically tied to the Soviet Union and played no significant role in East Asian affairs. In the early 1990s, amid the breakup of the Soviet Union, Mongolia began establishing a democratic government. Mongolia remained neutral in international affairs.
© SANCHAI/Fotolia
East Asia is the most populous region in the world, with more than 1.5 billion people, or nearly a quarter of the world total. More than 1.3 billion of those people are in China alone. Most of these people are concentrated in the eastern fringe of the region, where there are extensive lowlands and the most favorable climate. In this area population densities are among the highest in the world.
China was the first great civilization in East Asia and strongly influenced the cultural development of the other parts of the region. For this reason, East Asia is also sometimes referred to as the Sinic (meaning “Chinese”) culture realm. During the 19th and early 20th centuries, China was gravely weakened by internal political and economic problems, which were aggravated by Western and Japanese colonial efforts to exploit the country. The Chinese Revolution, which started in 1911, resulted finally in the Chinese communists seizing power in 1949. In the following decades, China struggled to overcome its problems of overpopulation and lack of technology in order to develop as a modern industrial nation. After the country adopted many free-market economic reforms in the late 20th century, it began a period of remarkable economic growth and modernization. By the early 21st century, it had one of the world’s largest economies.
Although much smaller in size and population, Japan was long the sole economic giant of the region, having experienced spectacular economic growth after World War II. It remains one of the wealthiest industrial countries in the world, though its economy stagnated in the 1990s. Starting in about the 1960s South Korea, Taiwan, and Hong Kong rapidly industrialized, following the Japanese model.
Peoples and Cultures
The people of Asia display a great diversity in their ethnicity. This developed in part because, historically, many groups were isolated by physical barriers, such as mountains, deserts, and seas. Most of the people in South and Southwest Asia are descended from Indo-European groups that colonized these areas, though some groups in South Asia also have roots in Africa. In the countries of Southwest Asia that are part of the Middle East, the majority of the people are of Semitic ancestry. The people of Southeast and East Asia have what could be termed Asiatic ancestry. Both within and among these groups are many variations, commonly based on language and culture differences.
The language patterns of Asia reflect the great diversity of peoples. Altaic and Uralic languages are predominant in Siberia. In East Asia and parts of Southeast Asia various Sino-Tibetan languages are spoken. Korean and Japanese are unique languages thought to be derived from both the Altaic and Sino-Tibetan groups. The peoples of insular Southeast Asia speak various Malay languages. In South Asia the Dravidian and Indo-Aryan are the main language families. In Southwest Asia, Arabic and Iranian languages are the most common. These are the broadest patterns. Actually, the language situation in Asia is far more complex, because there are often dozens of variations in each language family. South and Southeast Asia are especially complex in their language patterns. Indeed, the great variety of spoken and written languages is often one of the main obstacles to developing a sense of national unity in the countries of these regions. In some places, inhabitants share a common written language but are unable to understand the spoken dialects of their neighbors.
To overcome problems of communication, most Asian countries have adopted a national or official language. Hindi spoken in India and Bahasa Indonesia (Indonesian) in Indonesia are examples. In China a form of Mandarin Chinese as it is spoken in the Beijing area has been the national language for decades. As a result of past colonialism, European languages, especially English and French, are widely used in Asia. Throughout Asia most schoolchildren study English for at least a few years. Most educated people in Asia know more than one language. English remains the unofficial national language of India and a number of other former British colonies. Dutch, Spanish, and French may also still be heard in other former colonies.
R. Manley/Shostal Associates
Asia was the birthplace for most of the great world religions, including Christianity, Judaism, Islam, Hinduism, and Buddhism. The first three emerged out of the ancient Middle East (Southwest Asia). These three faiths share the belief that there is but one God. There are other similarities, but there are also some fundamental differences between the three. Such differences have often been among the causes that led to bloody conflict between followers of the faiths, beginning with the Crusades of the Middle Ages. Fierce internal struggles have also taken place between factions within each religion. Of these three religions Islam has become the most widespread on the Asian continent. Muslims are the dominant group in the countries of Southwest Asia and in parts of South and Southeast Asia.
Hinduism and Buddhism developed in South Asia. The latter was carried to East and Southeast Asia where it is still significant. Buddhism, however, is no longer a major religion in South Asia itself. Sikhism, a combination of Islamic and Hindu elements, also developed in South Asia. Confucianism emerged in China more than 2,000 years ago. Not a true religion, Confucianism is more of a social-ethical system, and it profoundly influenced China’s development. Many elements of Confucianism still play important roles in Chinese society.
Two other religions confined to East Asia include Daoism in China and Shintoism in Japan. In Southeast Asia, Buddhism dominated the mainland area and Islam spread through most of the insular area. As a result of Spanish colonialism, many of the peoples of the Philippines were converted to Roman Catholicism. That country has one of the only dominant Christian populations in all of Asia today, though there are notable Christian minorities in many Asian countries. Christian missionaries worked throughout much of Asia during the colonial era, trying to convert people. Although their religious impact was slight in terms of numbers of converts, some made contributions to health and education, especially among rural people. Christian missionaries are still active throughout Asia.
In addition to followers of the aforementioned religions, there are many Asians who practice various forms of animism. These are tribal religious beliefs concerned with spiritual beings that can help or harm the believer.
Religious divisions, often related to language and cultural differences, have been the source of many social and political problems. For example, the partition of British India after World War II was mainly the result of the inability of the Muslims and Hindus to live peaceably together. Pakistan was created in two sections as a homeland for Muslims on the subcontinent, leaving India as a mostly Hindu state in between. The two countries have frequently feuded since. (One of the sections of Pakistan later became the independent country of Bangladesh.) In Southeast Asia religious and cultural differences between Muslim Malays and nonreligious Chinese have been a source of tension in some of the countries there. In Iran, after the overthrow of the shah in 1979, a militantly orthodox Shiʿah Muslim government attempted to suppress other religious faiths. Islamic militancy has marked much of Asia’s history and has continued into the 21st century.
As the countries of Asia have modernized, the hold of traditional religions has weakened in some places. This is particularly true in East Asia. During the era of Mao Zedong in China, from 1949 to 1976, for example, religion was officially discouraged. Some religious freedom, however, has been restored. In much of East Asia social and technological modernization has tended to weaken the role of religion in society. Through Southeast, South, and Southwest Asia, where there is less economic development, religion still plays an important role in the daily life of millions of people.
Arts and Literature
Los Angeles County Museum of Art, Gift of Navin Kumar (M.88.28.1a-b),
The richness of Asia’s cultures is reflected in its arts and literature. China, for example, developed one of the world’s most distinctive cultures over a period of some 3,000 years. The Chinese developed unique forms of art, such as painting, ceramics, and bronzeware, as well as architecture, literature, and music. These profoundly influenced the cultures of Korea and Japan. The Indian civilization of South Asia also developed distinctive art forms, different from those of East Asia and in many ways related to the arts of the Middle East. Islamic art and architecture have also had a major influence on world culture. The art, architecture, and literature of Asia have long been highly appreciated by the world.
Education and Health
Mahesh Kumar A./AP Images
In the more developed countries, especially Japan, there are high standards for education and health care. Most of the developing nations of Asia face major problems in improving education and health care for their large populations. Overpopulation remains the chief obstacle to improving the lives of the people. This is not only because of the large populations within each country. It is also because such a large proportion of the population is young. In most of the region it is not uncommon for 40 to 50 percent of the population to be under 21. Subsequently there is an enormous demand for education, and the demand for health care and various other social services is growing continually.
Many Asian countries, however, do not have economies strong enough to provide adequate services. Young people often receive only a primary school education, though many get no education at all. Relatively few go on to secondary school, and even fewer to college. Combined with low incomes and poor nutrition, this means that millions of Asians have shortened life-spans and suffer from chronic illnesses, untreated diseases, and reduced energy levels. Population control is generally recognized as a major requirement in solving these health and education problems in Asia’s poorer countries.
Nik Wheeler/Corbis
Great poverty contrasted with great wealth characterizes Asia’s economies. Parts of Asia, such as Japan, Singapore, and some of the Middle East oil-rich countries, have standards of living equal to that of most Western countries. In other parts of Asia, such as Myanmar, Cambodia, Laos, and Bangladesh, many of the people live in poverty. Within many of the countries of Asia, there are great gaps in income levels, with a relatively small and wealthy elite living beside large masses of people who struggle to survive. Many factors account for this inequality; probably one of the most important is that many of Asia’s people still depend largely on agriculture for their living, so a middle class has not been able to develop through industrial growth. What limited industrialization there is in most Asian countries tends to be concentrated in a relatively few large cities. The wealth produced by such urban-centered industry tends not to spread evenly throughout the countries. Asia’s traditional societies, reluctant to change customs, also foster inequality in some ways.
© Dodohawe/
The situation caused by these conditions is that of dual economies. In many of the smaller countries this means there is a small, relatively modern industrialized economy concentrated in the largest city, which is often the national capital. A small proportion of the people live there, but their average income tends to be higher than that of the majority of the people living in rural areas, where most of the people work in agriculture. There is little industry, and income levels are low. Society changes slowly in these areas. Because of this gap between rural areas and the large cities, millions of rural people have moved from the countryside to the cities to seek a better life. Unfortunately, the massive migration overcrowds the large cities to such an extent that the migrants cannot find jobs, adequate housing, and other social services, and they end up living in poverty. The rural areas also suffer because they lose young people who can work the land. This trend is one of the major problems facing Asian countries that are still largely agricultural.
Most of Asia’s peoples are farmers who struggle to produce enough food to survive. Meat is a luxury for most Asians, eaten only on special occasions. The diet tends to consist mostly of rice or other grains, plus small amounts of vegetables and fruits, and protein from nonanimal sources, such as beans. In many countries fish is also an important source of protein.
Subsistence farming
© FlemishDreams/Fotolia
The type of agriculture practiced by most farmers is called subsistence farming, in which all or nearly all the food they produce is used to feed their families. Little or no surplus is produced to sell or trade. Typically, the whole family works hard in farming; there are few if any farm machines. Farms tend to be small, an average of no more than two to three acres (about one hectare). Farming thus tends to be intensive; that is, the farmer must get a small land area to produce the highest possible yields. Fortunately, much of Asia lies in the tropics and warmer climates, so that double-cropping, or growing two crops each year, is possible. Rice is preferred in the warmer, wetter places; wheat and other dry grains are grown in the cooler and drier areas. The farmers often raise a little poultry or livestock as well, usually for the market.
In hilly and mountainous areas farmers practice slash and burn cultivation. This kind of agriculture consists of cutting down the forest cover, then burning it. Seed is then planted in the ground among the tree stumps; nothing more is done to help the plants grow until harvest time. Yields are low, and after a few harvests the farmer must abandon the land and move on to a new forest area, where the process is begun again.
Commercial agriculture
Richard Abeles/Rex USA
Commercial agriculture, in the form of plantations and small holdings, is also widespread in Asia, especially in the countries of Southeast and South Asia. European colonial rulers began this type of agriculture. The Europeans first acquired control over huge estates of land all over Asia and then planted them with a single crop, such as rubber, sugarcane, coffee, tea, or bananas. Labor was supplied by local people who worked for small wages. Most of the profits were returned to Europe.
Plantation farming declined greatly after the early 1950s, because most of the nations in which it was practiced regained independence. A few countries, such as Malaysia and Sri Lanka, have encouraged plantation farming in order to increase exports. Some countries have encouraged local farmers to produce commercial export crops on their small holdings. Most commercial production now comes from small holdings, and these crops provide a major source of export income for a number of Asian countries.
Nomadic herding
© Elena Lebedeva-Hooft/
In the drier parts of Asia, especially Southwest Asia, most rural people make a living by raising livestock. Many are nomads who move with their herds of animals over large territories, constantly seeking good supplies of grass and water. The people live simply and carry their tents and belongings with them. Such animals as goats, sheep, camels, and yaks, raised by these herders, are able to withstand dry climates.
Collectivized agriculture
In many communist countries of Asia, particularly in China and in the Soviet Union before its dissolution, agriculture was collectivized during part of the 20th century. Governments ordered the farmers to pool their land and other resources with their neighbors to make large farms. In China these were called communes. The farmers worked the land together and shared the income produced. The government’s goal was to produce more than was possible on the traditional small subsistence farms of the past, to help feed the huge Chinese population. The commune system, however, did not meet expectations, and it was abandoned in the late 20th century. Most other Asian countries that adopted collectivized agriculture have also abandoned this system.
© cchfoto/Fotolia
Much of the Asian population has traditionally relied upon fishing as an occupation and fish as a source of protein in the diet. Most of the fishing is traditional and is done in small boats that stay close to shore. Japan and Russia have Asia’s largest and most highly developed oceangoing fishing industries. They send large, modern fleets throughout the world in search of sea products. Aquaculture, or sea farming, is also common in Asia. This consists of raising shellfishes and other seafood, such as oysters, clams, shrimp, and seaweed, in offshore shallow waters. Freshwater fishes are also raised in ponds or caught in rivers in inland areas. This practice is widespread in warm, humid areas. (See also aquaculture; fish culture.)
Timber for construction, firewood, and many other uses is widely harvested in Asia. In wetter, warmer areas, especially in the Southeast, bamboo plays a vital role in some traditional societies because of its many uses. The young bamboo shoots are even an important source of food. Commercial logging is most developed in Southeast Asia, where large areas are still covered with tropical and subtropical forests. Teak and mahogany are two notable wood products of this area. However, the demand for forest products for local use and for export has resulted in abuse of the forest cover. One of the main threats to the forest is that the people must use wood as cooking fuel. In parts of South Asia, such as India and Nepal, for example, the forest cover is rapidly disappearing for this reason. Soil erosion and other problems commonly result from this stripping of the forests. Increased conservation programs are sought, but they are difficult to implement where people depend on forest products for survival.
Minerals and Power
Asia contains some of the richest mineral deposits in the world. The mining industry, however, is still poorly developed in many areas, and both total output and per capita output are low. The extent of mineral resources is still not fully known, though discoveries made since the early 1950s have improved projections for the future. Other natural resources that would serve as the basis for industrial growth, such as waterpower, are also plentiful. European powers established mining industries in many of the former colonial states of Asia. Foreign investment in mining is still common throughout the region, especially in oil prospecting and drilling.
Energy resources
The development of cheap energy for industrial growth is essential to the improvement of most Asian economies. Asia’s energy resources are among the world’s largest but are still only partially tapped.
Coal and petroleum reserves
The largest coal deposits are found in Siberia, the Central Asian republics, India, Indonesia, and especially China. Although the coal reserves in Japan and North Korea are relatively smaller, they are nevertheless economically important.
Fred J. Maroon/Photo Researchers
Some two thirds of the world’s oil reserves are in Asia, mainly in Southwest Asia around the Persian Gulf. Most of the world’s oil is produced there. Russia, China, Kazakhstan, Indonesia, and India have also become major petroleum producers. Much of Russia’s oil comes from Siberia. Malaysia is the largest producer among the countries of mainland Southeast Asia, followed by Thailand and Vietnam, which has offshore deposits. Oil exploration is being carried out all along the perimeter of Asia, from the waters off Korea and China south to Indonesia and west to the Persian Gulf. Siberia is the continent’s chief producer of natural gas, though substantial production also comes from fields in China, Turkmenistan, Indonesia, Uzbekistan, Malaysia, and the Indian subcontinent.
Water and nuclear power
Yao YilongImaginechina/AP Images
Asia has the greatest waterpower potential of all the continents, but only a fraction of this power has been developed. With so many of the world’s major rivers located in Asia, it is understandable that the continent has such great potential power. However, the obstacles to development of this resource are many, including the cold climate in Siberia and the lack of capital in other areas. Dams for tapping waterpower are extremely expensive to build. Although the use of hydroelectric power is continuing to grow, thermal power is generally a more widely used source for producing electricity.
Another growing power source in Asia is nuclear energy. Nuclear power plants are operating in a number of Asian countries, especially Japan. India, Pakistan, South Korea, and Russia are other places served by nuclear power.
Metals and other minerals for industry
© Robert Frerck/Odyssey Productions
Among the mined metallic minerals useful to industry, iron ore is one of the most important because it is the basis of steelmaking. China and India are among the largest iron ore producers in Asia. Accordingly, those two countries have the largest iron and steel industries in Asia, using their abundant coal supplies as fuel. Other large iron ore deposits are located in Siberia, Kazakhstan, North Korea, and Malaysia. Bauxite, for aluminum production, is found in large amounts in China, India, Kazakhstan, Siberia, and Vietnam. Copper deposits are not extensive; the most significant deposits are found in China, Indonesia, Central Asia, and Russia. Much of the world’s tin comes from the tin belt that stretches from South China through Thailand, Vietnam, and the Malay Peninsula to Indonesia. China produces nearly all of the world’s supply of rare-earth metals. There are deposits of most of the other metallic minerals in Asia as well.
Nonmetallic minerals are also abundant but unevenly distributed, as are the metals. Sulfur, one of the most important, is produced in China, Russia, Japan, Kazakhstan, South Korea, India, and parts of Southwest Asia. China and India produce a large share of the world’s graphite.
Notably, Japan largely lacks the most important minerals but is highly industrialized. It is one of the world’s major importers of mineral products.
Milt and Joan Mann/Cameramann International
Asia has some of the most highly industrialized countries in the world, such as Japan, and some of the least, such as Nepal and Afghanistan. Between these extremes are found all levels of industrial development, from countries just beginning to develop modern manufacturing to those that have already made some marked progress. The latter are sometimes referred to as the NICs (newly industrialized countries). Three of the most successful places that have rapidly industrialized—Hong Kong, Taiwan, and South Korea—are in East Asia and one—Singapore—is in Southeast Asia. Mainland China, Malaysia, Indonesia, and Thailand have also achieved considerable progress. Overall, East Asia ranks as the most heavily industrialized of the subregions of Asia, followed by Northern Asia and Southeast Asia.
Throughout Asia there is a strong movement to change traditional agrarian societies into modern industrial societies. Various economic plans have been used to accomplish industrialization in socialist and nonsocialist countries. Some countries have used features of both socialist and nonsocialist programs.
In communist countries—notably in North Korea, in China and Vietnam until the late 20th century, and in the Soviet Union before its dissolution—largely socialist programs of industrial development were followed. Generally in this approach there is no private ownership of industry. Everything is owned by the state, and workers are employed by the state. The system is highly centralized, with decisions made by the central government. China and Vietnam began adopting free-market economic reforms in the late 20th century that allow for private ownership of many businesses, and both countries experienced great economic growth.
Various forms of the free enterprise, or capitalist, system are being used to develop manufacturing in much of Asia. Private ownership of businesses and factories is encouraged. Governments primarily are involved in regulating and planning and sometimes investment in expensive manufacturing, such as iron and steel or transportation.
Some of the manufacturing developed since the early 1950s followed that first established by the former colonial rulers. In India, for example, the British established the still important modern textile industry. The Japanese began much of the industrialization in Taiwan, South Korea, and China’s Northeast region (Manchuria) when they ruled those territories. For the most part, however, colonial rulers in Asia were interested in extracting the mineral resources and agricultural products of Asia. Manufactured products were mostly imported from the colonial mother countries. Since independence, the former colonial countries have been developing industries that turn out products for their own needs, as well as for export.
By the 1980s Japan was by far the most successful Asian country in industrialization. It was also the first Asian nation to industrialize, starting in the late 19th century. By World War I Japan was already a highly developed country. However, its greatest growth as an industrial power occurred after World War II. Japan was so successful that it now has one of the largest industrial outputs in the world, even greater than that of much larger Russia. Japan ranks among the leading world producers of many important manufactured products, such as automobiles and electronics. Unlike many other Asian countries it is a major exporter of manufactured goods. Other leading exporters of manufactured products in Asia include mainland China, Hong Kong, Taiwan, South Korea, Singapore, and Malaysia.
Perhaps the greatest potential for industrial development is in some of the oil-rich countries of the Middle East. Many of them, such as Saudi Arabia, have used their vast earnings from oil exports to undertake industrialization programs. Among the problems faced by some of these countries, however, are critical shortages of skilled labor, managers, and technology. Environmental limitations, such as the shortage of fresh water, and political problems have also hampered progress. India has made considerable progress in industrializing and in developing high-technology and other service industries, but the country is also beset with problems of overpopulation and social instability. Indeed, these problems afflict many countries of Asia.
Transportation and Communications
Efficient networks of transportation and communications are a key requirement for industrial development. Goods, people, and ideas must move quickly and efficiently. The pattern throughout Asia is still uneven and closely parallels the level of industrial development. Thus, at one extreme there are places such as Japan, with highly sophisticated railway, superhighway, and airline systems plus the latest in telecommunications and high-speed Internet service. At the other extreme there are parts of Asia that are still nearly as isolated and cut off from the modern world as they were centuries ago. In these areas most people spend their entire lives without ever traveling more than a few miles from their village or farm. Their extremely limited knowledge of the outside world is learned primarily from word of mouth or radio broadcasts. Other parts of Asia fall between these two extremes. Extensive transportation and telecommunications facilities are being developed throughout the continent.
Asia’s vast space and enormous physical barriers have hindered progress in transportation. Traditionally travel and trade have moved largely around the edges of the continent rather than inland. Until the 19th century, caravans on land routes, supplemented by oceangoing vessels, were the chief means of transportation. After the mid-19th century oceangoing vessels continued to be important and rail transport significantly improved overland travel.
Bruno Morandi—Robert Harding World Imagery/Getty Images
Road and rail systems have continued to improve. One of the more notable advances was the completion in 1916 of the Trans-Siberian Railroad in Northern Asia. A massive highway network begun in the 1960s links Istanbul, Turkey, with Singapore in Southeast Asia and many other points throughout the continent. China joined the system in 1989. The development of air transport in the 20th century played a key role, especially in such landlocked countries as Afghanistan, Nepal, and Laos. In some of the less advanced countries, however, animal transport remains the main method for moving goods from farm to market.
Inland waterways provide transportation routes in some countries and are especially important in South, Southeast, and East Asia. Bangladesh, Vietnam, Cambodia, Laos, and China all have well-developed inland water transport systems.
International Relations
Since ancient times, Asia has had contact with the rest of the world. From early times Asians traded over vast distances, with other regions in Asia as well as with parts of Africa. Caravans also carried silks, spices, and other products of Asia westward to Europe and gold, silver, wool, and other European goods back to Asia. This trade benefited Asian economies, and it also brought knowledge about Asia to Europe. Unfortunately, that knowledge led eventually to the European colonial takeover of much of Asia by the 19th century. Colonialism in Asia ended in the 20th century, largely in the two decades after World War II. Afterward, however, many of Asia’s trade links remained with its former colonial rulers, and Eastern and Western powers competed to be the dominant influence in Asia.
After about the 1970s trade between Asian countries increased greatly in importance, especially in East and Southeast Asia. Japan assumed a prominent role in intraregional trade. South Korea and China also traded more heavily with other Asian countries. The United States became a major market for Asian exports, and countries of the European Union maintained significant trade relations in the region.
Asian countries have attempted to improve their trading position by forming various organizations of commodity producers to help stabilize the prices of primary products. The most prominent of these has been the Organization of Petroleum Exporting Countries (OPEC), which is dominated by the major oil-producing countries of Southwest Asia. Other organizations have been formed to foster intraregional cooperation, economic growth, and social progress. In 1967 the Association of Southeast Asian Nations (ASEAN) was formed by Indonesia, Malaysia, the Philippines, Singapore, and Thailand. Brunei joined in 1984, followed by Vietnam in 1995, Laos and Myanmar in 1997, and Cambodia in 1999. The Gulf Cooperation Council, founded in 1981, includes six countries of the Arabian Peninsula. Several Asian countries also belong to the intercontinental Asia-Pacific Economic Cooperation (APEC).
An important development after World War II was the expansion of U.S. political and military influence in Asia. This influence resulted from the defeat of Japan in World War II and the emergence of the United States as a chief world military power. With the outbreak of the Cold War in the late 1940s, followed by the communist victory in China and the Korean War, the United States assumed a policy of combating communist influence in Asia. After its failure in the mid-1970s to prevent communist control of Indochina, however, the United States changed the emphasis of its role in Asia. One of the most significant developments was the dramatic change in relations with China that ended in U.S. recognition of the Beijing government in 1979. Because of China’s difficulties in relations with the Soviet Union and a desire to modernize more rapidly, China became a major economic and political partner of the United States.
Frederick M. Asher
Humans have lived in Asia since prehistoric times, when they roamed large stretches of the continent in quest of food and shelter. As they began to organize together into societies, three of the earliest civilizations for which there are historic records emerged in parts of Asia. These were the ancient cultures of Mesopotamia in the Tigris-Euphrates River valley, beginning in about 10,000 bc; the early cultures in the Indus River valley, beginning in about 3500 bc; and the early Chinese civilization in the Huang He valley, beginning in about 2000 bc.
Asia’s long history can be divided into three major periods. The first and longest period was from earliest times until around ad 1500, when the Europeans began to arrive. During this long period, many empires and kingdoms rose and fell, and distinctive cultures evolved. Some of those cultures came to dominate Asia in spite of periodic political upheavals and wars through the centuries.
The development of those dominant cultures provides a basis for dividing Asia into three subregions. In East Asia the Chinese civilization emerged first, and it heavily influenced the development of the Korean and Japanese cultures. China is renowned for the splendor and extraordinary continuity of its civilization. In South Asia the Indian civilization, with its complex mix of Hindu, Muslim, and other influences, came to dominate. In Southwest Asia the Arabic-Muslim culture spread widely beginning in the 7th century ad.
These three cultures achieved high levels of development within the traditional agricultural economies on which they depended. As already noted, there were brilliant achievements in art, architecture, language and literature, as well as early science and technology. Many of the devices that Europeans later came to depend on originated in Asia; among these were gunpowder, paper, the wheel, and the compass.
While European civilization was slow in developing during the Middle Ages, Asia’s great civilizations flowered in unmatched brilliance and prosperity. When the European adventurer Marco Polo traveled to China in the 13th century, he marveled at the magnificence of China’s great civilization, already 3,000 years old. Less famous Europeans were to echo him later.
European Contact and Conquest
Encyclopædia Britannica, Inc.
The second major phase of Asian history was the period of European contact and conquest, starting in about 1500 and continuing into the mid-20th century. The European interest in Asia was partly just curiosity and awe, but it became mainly a desire to exploit the wealth of Asia, especially its spices and silks. To do this, the Europeans had to conquer and colonize much of Asia. This process took place mainly in the 19th and early 20th centuries. By World War I, most of Asia was under European control. Asian traditional societies proved to be no match for the militarily and technologically superior Europeans.
The three or four centuries of European contact and control had both good and bad consequences for Asia. European contributions included new ideas and techniques for agriculture, industry, trade and commerce, health and education, political administration, and warfare. A few Asian cultures were able to adapt these new ideas without being physically taken over by the Europeans. Most notable was Japan. Although most of the Asian cultures were not able to do this, even under physical occupation by European rulers large parts of Asia gained in some ways as they were forcibly introduced to the modern world and provided with benefits, such as railroads or control of diseases, that proved helpful after independence.
European colonialism also brought problems. It drained away much of the wealth of Asia, exporting it to the mother countries in Europe. The Europeans also divided up Asia in such a way that post-independence political boundaries were often poorly located in relation to natural divisions of peoples, cultures, and physical regions. There were also social and political problems that resulted from the introduction of alien minorities into colonial states. The French culture in Indochina and the Spanish culture in the Philippines, for instance, clashed with existing cultures in these places. Many of these aspects of European rule still cause problems for Asian countries.
Independence and Struggle
Encyclopædia Britannica, Inc.
Encyclopædia Britannica, Inc.
Encyclopædia Britannica, Inc.
Encyclopædia Britannica, Inc.
The third phase of Asian history began after the end of World War II. Within the next 30 years, between 1945 and 1975, colonialism ended and virtually all the countries of Asia had become independent. In some cases independence came peacefully; but in others there were prolonged and bloody conflicts. By the 1990s only two small relics of the colonial era remained—Hong Kong and Macau—and these were returned to China’s control by the end of the decade.
Independence came to the Indian subcontinent in 1947. As far as Great Britain was concerned, the separation was peaceful at the time, but the former colony had struggled for decades to end British rule. As independence approached, the strife continued within the subcontinent between Muslims and Hindus. This was resolved by partitioning India into two separate countries, India and Pakistan, which received independence simultaneously. The two new countries watched each other warily. India and Pakistan fought a short war over disputed territory in 1965. A more serious conflict in 1971 resulted in the loss to Pakistan of its eastern territory, which subsequently became Bangladesh. After that, tension remained as Indians and Pakistanis struggled for control of the disputed region of Kashmir, but no more wars took place. Most of the subcontinent’s violence after 1980 was in the south, in Sri Lanka’s civil war.
A major upheaval and power shift in Asia came with the establishment of the People’s Republic of China in 1949. This was a result of decades of civil war between the Chinese communists, based in the north, and the Nationalist government of Chiang Kai-shek, based in Nanjing. The communist victory had enormous political influence on the entire region—indeed, on the entire world. It seemed, at the time, to indicate that communism was the wave of the future. The new rulers in Beijing encouraged revolution everywhere, especially in developing countries. And they were eager to help neighbors fighting to end colonialism. One such neighbor was just to the south, in Indochina.
After World War II France had tried to regain its colonies in Southeast Asia following their occupation by Japan. By the early 1950s the French found themselves bogged down in a guerrilla war. After a humiliating defeat at the Battle of Dien Bien Phu in 1954, the French forces withdrew. The worst was not over for Indochina, however. Soon the United States was involved, determined to contain the expansion of communism in that part of the world. The determination of the Americans was met with an even greater resistance on the part of the North Vietnamese and their allies in South Vietnam—leading to a long and very destructive war that ended with communist victory in 1975 and more than a decade of great suffering for the people of Indochina.
Meanwhile, another serious conflict had occurred to the north. In June 1950, North Korea, urged by the Soviet Union and cheered on by the Chinese communists, invaded South Korea. The United States responded immediately, and a United Nations coalition force was sent to fight the North Koreans. The massive intervention of China nearly turned the tide, but in the end a truce was arranged in 1953. An uneasy peace endured, and during the 1990s North and South Korea began to work toward reunification. At the time, the Soviet Union was rapidly disintegrating, and China was conducting business with the United States, Japan, and even South Korea. (See also Korean War.)
Southwest Asia is part of the region called the Middle East. Long-standing disagreements based on ancient conflicts between the Arab countries of the region created much turmoil following the end of World War I. When the State of Israel was created in what was Palestine in 1948, however, the Arab countries and Arab Palestinians united to oppose it. Arab-Israeli conflict began in 1948 and continued through four more wars. In the 1967 war Israel acquired much new territory, including the West Bank (formerly part of Jordan), the Gaza Strip, and Syria’s Golan Heights. Israel kept these lands as occupied territory and built settlements on them. This land policy kept Arab-Israeli tensions high. In 1987 Palestinians launched an uprising, called the intifadah, to protest the Israeli occupation. Israel responded with military force. Only after the success of the United States and its allies against Iraq in 1991 were peace talks arranged between Israel and its Arab neighbors. In 1993 a set of peace accords were signed, calling for the gradual implementation of Palestinian self-rule in the occupied territories. Failure between Israeli and Palestinian leaders to agree on some final points in the accord, however, led to the start of a second intifadah in late 2000. The peace process had, however, led to a treaty between Israel and Jordan in 1994.
Other struggles developed in Afghanistan. In 1979 Soviet troops invaded the country to support a Soviet-sponsored government. The Soviets withdrew in defeat by 1990, and the puppet government was overthrown by Afghan guerrillas in 1992. Internal struggles between the various ethnic groups that made up the rebel forces continued over the next several years. By the late 1990s a fundamentalist Islamic militia called the Taliban controlled most of the country. Their repressive policies toward women and enforcement of strict adherence to Islamic law received harsh criticism from the international community. The Taliban also offered haven to various Muslim extremist groups, including the notorious al-Qaeda. The latter’s role in the Sept. 11, 2001, terrorist attacks on the United States brought about a U.S.-led assault on Afghan military targets in late 2001 that drove the Taliban from power. Within a few years, however, the Taliban had recovered in strength and began fighting an insurgency against U.S. and NATO troops.
A war between Iran and Iraq from 1980 to 1988 threatened the precarious stability of the Persian Gulf region and claimed more than 1 million lives in both countries. After Iran became an Islamic republic early in 1979, Muslim fundamentalism seemed to pose a threat to all the Arab states. By 1990 Iran found itself isolated because of its fanaticism and was seeking more normal relations with other countries. In August 1990 Iraq invaded Kuwait. This resulted in massive retaliation against Iraq and its defeat by a coalition of forces led by the United States. Ongoing tensions resulting from this war eventually led to another U.S.-led attack on Iraq in 2003. These conflicts have severely complicated the efforts of Middle Eastern countries to deal with serious problems of overpopulation and lack of industrial development.
The breakup of the Soviet Union in 1991 was one of the most significant events in modern history. It added several independent countries to the map of Asia, and it ended the Cold War. But it also portended serious problems of economic reconstruction for societies that had lived under communist domination for about 70 years.
The New Prosperity
© AlxeyPnferov/
While regional conflicts and civil wars were tearing some societies apart, other countries were working economic miracles. The foremost and earliest success was in Japan, which had to rebuild itself after the devastation of World War II. By the late 1970s Japan had become the economic giant of Asia, carving out market shares for its products in all parts of the world. By the 1980s Japan’s success was being emulated by the “Four Little Tigers” of Asia: Taiwan, South Korea, Hong Kong, and Singapore. These dynamic economies were soon challenging Japan’s leadership in manufacturing and finance. Japan itself suffered a serious economic downturn in the early 1990s followed by a prolonged period of markedly slowed economic growth. Its growth was further hampered by a catastrophic earthquake and tsunami in 2011.
By 1990 even larger areas of Asia were undergoing significant economic development. Among these were Indonesia and Malaysia. Both of these multi-island countries are very populous, and development was uneven. The most surprising changes took place in China. In June 1989, when the government forcibly put down massive protests calling for greater political and economic freedoms, many outsiders felt China was disowning reform. But the communist government continued to ease its controls on the economy, leading to rapid economic growth into the 21st century.
Jack F. Williams
Additional Reading
Benhart, J.S., and Pomeroy, G.M. South Asia (Chelsea House, 2006).Cartlidge, Cherese, and Clark, Charles. The Central Asian States (Lucent, 2001).Fairbank, J.K., and Goldman, Merle. China: A New History, 2nd enlarged ed. (Belknap, 2006).McClish, Bruce. Southeast Asia, Australia, and the Pacific Realm (Heinemann, 2008).Mansfield, Peter, and Pelham, Nicolas. A History of the Middle East, 3rd ed. (Penguin, 2010).The Middle East (Greenwood, 2004).Morris, Neil. North and East Asia (Heinemann, 2008).Peoples of Eastern Asia; Peoples of Western Asia (Marshall Cavendish, 2005; 2007).Phillips, D.A. East Asia; Southeast Asia (Chelsea House 2006).Stewart, Mark. South Asia (Heinemann, 2008).Wilds, M.C. Southeast Asia (Lucent, 2003).
|
global_01_local_1_shard_00001926_processed.jsonl/32533
|
Dismiss Notice
Dreams thread
1. turtleDove
turtleDove Well-Known Member
I had a really weird dream where I was....Daine, I think, from the Tortall series? And I was trying to fight or do diplomacy or Something with a bunch of demi-god boars who were being underhanded and tried to poison me? And I managed to prove that to their leader, and...then things transitioned into being a theme park, and I was riding in a roller coaster that, I think, was also the Black Widow. And I had to fix up the theme park, and ended up rescuing a muppet from the roller coaster, which was slightly haunted and malevolent (but only slightly, and it only applied if you were sitting in the front car and...not me? I think?
...I have no idea wtf was going on, now, but it was apparently fascinating enough that I needed to keep sleeping even when my alarm started going off.
I really could've done without the bit where it segued into "okay, what combination of Molly and her kids would plausibly work as a pairing" and it was even more confusing than the rest? (Apparently the answer is Percy/Molly.) There at least wasn't any actual viewing of that, just...them eating brunch? And building stone patios or something.
2. Lazarae
Lazarae Everything is wrong so why behave?
At the point of weird super realistic and unnecessarily elaborate dreams because 'discontinuation' of my med.
The world/reality is kind of made up demesnes of powerful supernatural creatures. Pretty much as long as the region is 'owned' by something/one its reality is stable.
There's a sort of gathering in this small town because the witch who controls it is dying (was poisoned?) and has no heir so her territory'll be up for grabs. The witch seems fine and will right up until she croaks. She has a painfully stereotypical pseudo-victorian house with an actual white picket fence and a planter that'll grow anything in it to maturity in one day, but it'll die by the end. Her favorite part of the morning is deciding what to grow.
The assembled freaks and weirdos waiting for her to die were kind of background noise. Main cast: the witch, didn't show up much except bits with the dolls and her garden. A pair of cursed 'dolls', actually people stuck in the form of lifesized dolls. Boy, cursed because he did something unspecified but Real Bad and killing him would be a kindness. Also bound to the other doll as her guardian, except he can't move or speak to protect her. REAL PISSED ALL THE TIME. Girl, not actually cursed. Someone fucked her up bad, left her catatonic to the point even her soul is nonresponsive. She was dollified for protection/preservation, in case the witch found someone who could help her. The witch moves them around the house for stimulation, sits them out in the garden, holds tea parties with them. She's very fond of both even though the guy Done Fucked Up and also hates her and the girl. Witch tries real hard to protect them from reality getting fuckier even though the boy is hoping random rulebreaks means he'll be freed of the curse, since it won't end with the witch's death (I don't think she was the one who dolled him initially but inherited him, she just added the 'watch over the girl' part.)
Two gods on the next 'layer', they own the bigger part of the region the witch's land is part of, but it's not specific enough for them to pin reality down. It's pretty much a succession crisis with a duchy, while they're the monarchs- it's in their land and their problem but they can't really go 'ok mine now problem solved' unless there's absolutely nobody else. Sort of a Norse feel to them? But pretty chill. There's some weird industrial construction (it has a crane) that's kind of a connection to their 'layer' and the witch's land, which leads me to the actual main character:
Absolute badass girl, sort of spy feel to her but. Like. 1) more of a Ronin (movie) thing than Bond-esque. 2) Not all femme fatale, though she WAS hot. But practical, clever, dangerous, precise. She's sent by the two gods to oversee the succession crisis and make sure reality doesn't shit itself. Before the gods get the elevator working in the weird construction she was willing to climb the skyscraper-sized thing by a dangling wire? It was a big wire but still!
She's also the only one who can directly communicate with the gods (aside from being the only one ballsy enough to be willing to climb to talk to them before the elevator's restored) but there's some language fuckery going on with the notes they leave, like they can't pick which of the languages they know that the notes show up in. But she speaks all the same languages as the gods + the ones spoken in the region so she's not only the one they sent to see things go smoothly but the only one who they can talk to.
Also one of the gods is watching everything through a sniper scope. Apparently Just in Case she fails? Not going to wonder why they have to leave dead drops at the top of the construction because they can't effect anything else down there, but apparently bullets cross the barrier between realities juuuuust fine. (Maybe it's just THAT gun. I dunno. I woke up before exposition)
• Like x 2
3. Verily
Verily invests her cash in stock in Cyber Disney
I had a flying dream, which almost never happens. I was really exasperated about it though. It was cold, which was annoying. And I could have used a lot more maneuverability.
It really was cold. I was attempting to survey a bunch of people who were hanging out in a fairly shallow swimming pool. It was sort of like a big hot tub but it obviously wasn’t heated. I remember wondering how they could stand it.
In retrospect they were awfully still and pale and kinda bloated, like corpses, though they weren’t dead in the dream.
Sometime during this incident I noticed I was having Raynaud’s phenomenon, which I don’t actually even have irl. Some of my fingers were bone white. I was like, for fuck’s sake. I’m annoyed that this is actually the least of my problems.
I was just trying to escape a corrupt multidimensional conspiracy and get home to my own dimension. I didn’t need that shit.
• Witnessed x 2
• Informative x 1
4. Acey
Acey cicadas taking cover while we stomp around
So I had a bizarre, albeit very brief, NSFW dream last night.
For some fucking reason, I was jacking off in public--I think I was at the bus station. Someone looked right at me, and I panicked, but then he just sorta nodded at me and went on his way.
That was it. That was the entire dream, at least as far as I remember.
I blame this post.
• Winner x 3
5. NevermorePoe
NevermorePoe Nevermore
Someone remind me to post the dream of how a very good pupper saved me from being taken by the fae pleas, I have to go to work and don't have time to write it out right now.
• Winner x 4
6. NevermorePoe
NevermorePoe Nevermore
Okay, i'm home from work now so let's see how much i can remember.
Dream part 1
So, I was getting ready for work when I suddenly got sick, like really, really sick, and had to lay down in bed. I picked up my phone to call my boss and tell him that I wouldn't be able to make it, but fell asleep before i could do it. I woke up like, 6? hours later, I think, and picked up the phone and called, then went back to bed. A big chocolate lab followed me to my room, she had medium length fur and it was very soft, and i knew she was coming with because she knew that i was sick and didn't want to leave me alone. I started to lay down and go back to sleep, and she jumped up onto the bed and laid down next to me, and i fell asleep a few seconds later. (i don't remember her name, so i'll just call her Riley)
Dream part 2
I woke up in a freezing cold blizzard, in the middle of a culdesac that only had two driveways leading into it, and i couldn't see the road leading out of it. Where the two driveways met the culdesac there were two middle aged white women with "I want to see the manager" style haircuts, they were talking to each other. I approached them to ask if i could sit in one of their houses for a few minutes, to stay out the blizzard (I was shivering at this point.) one of them looked offended that i'd asked and just told me "No." in a really snotty, condescending voice. The other looking me up and down in a kind of appraising/unimpressed manner, and told me i'd have to work for it. At that point I realised that if i'd just gotten out of bed that Riley should be there, so i started looking around for her, when i couldn't find her i realized that something was hitting my leg, and then realized that I was dreaming, and woke up to Riley nosing me in the leg.
Then I woke up for real, and realized my alarm was about to go off.
Riley had very soft fur.
• Winner x 3
7. PotteryWalrus
PotteryWalrus halfway hideous and halfway sweet
I dreamt that The Doctor took theobromine powder in his tea as well as sugar.
I feel like this explains a lot.
• Like x 1
8. turtleDove
turtleDove Well-Known Member
I've been having really vivid, weird dreams lately. Last night was something involving a convention, where I was meeting up with, or ran into, a friend from online? Except I was projecting myself there because I was actually asleep, and people who were sleep-projecting got items they could use for...something. I didn't really get an explanation for what the items were intended for in the dream, either, but I do remember that I grabbed a plastic recorder off of someone to keep her from hitting my friend and I with it, and a possibly-mechanical pencil (from the person who was with the girl with the plastic recorder) and my item was my old blue glasses.
I woke up really confused, and sort of feeling like something'd gone sideways somewhere.
• Like x 2
9. Everett
Everett local rats so small, so tiny
a classroom was involved, some people had superpowers, then some friends were playing softball but with no bats
10. Everett
Everett local rats so small, so tiny
memes for non existent games including one where 2 characters from the future load some sort of fighting game and marvel at how outdated it is (including the phrase "an entire video result" and "a block and slide video genre"
And screenshots of different types of....big person sized or larger vertical pipes, for placing in a forest-y game environment, with big ceramic buddha heads inside, including ones with water flowing into the pipe and onto the buddha head, pipes with open tops, tops with grates, ones with plants growing inside. Each had a different cute name that i assume was its ingame title.
Those were in a tumblr post or something that said after the pics, something like "(game) was good actually" or "why didnt i like (game) earlier"
Edit and featured visits from my family, me visiting someone to shovel their driveway for the news, i had to knit something for my brother but i started with the wrong colour
Last edited: Sep 13, 2018
11. Meagen Image
Meagen Image Well-Known Member
I was in some sort of building (hotel?) where the walls were all made up of dried up, twisty vines. Some mad scientist was raving about his creation and hauled up this vaguely human-shaped thing with eyes all over it, including a huge one on its belly. I refused to be frightened, and instead talked excitedly about how this guy could see me waving at him no matter which way he was facing! He would never miss a friendly greeting, and that was awesome!
• Winner x 8
12. Socket
Socket Probably Procrastinating
Last night I had my first ever spider-related dream that wasn't a phobia nightmare!! I'm so happy about it, it was really cute!
In the dream, there was a big colourful jumping-spider in my room. Already better than previous spider dreams, because they're the only kind my brain pings as 'cute' rather than 'uncanny'. Even though it was cute, dream me still wasn't sure about physically picking it up, so I asked @inchwyrm if she'd let it out for me. She let it up onto her hand and then shaded it with her other hand, and told me to watch because this kind of jumping-spider does something cool if you do that. And what it did was rapidly spin an entire scarf. (This was definitely inspired by watching my friend use her overlocker on our last craft day - the threads flew out in exactly the same way.) And within maybe a few seconds Wyrm handed me this massive autumnal scarf that this lil spider had woven. It was really cute and matched one of my favourite jumpers perfectly.
After that, Wyrm told me she'd rather let the spider stay in our room, because she (it was a girl spider apparently!) wasn't really for the outdoors. And also she had a family of other tiny jumping-spiders that were living under my bed. I think I had to ask Lubby to 'talk to them' - because I guess Literally Talking To Arachnids was a power she had - to ask them if they could relocate to the top shelf of our bookcase where they'd not be in danger of getting squashed by us big humans, and they could pay rent in knitwear. It was a very pleasant arrangement and from then on I guess we just lived with some magical knitting spiders?
It was a cute dream. I'm still happy about it. Also, I really want that scarf in real life because it was so nice!!
• Winner x 4
13. Exohedron
Exohedron Doesn't like words
I dreamed that, at least for part of the dream, I was watching a brother and sister reenacting Vines. Except, this being a dream, these weren't actual Vines (as far as I know). I'm pretty sure I've never seen a Vine involving a swordfight using butcher knives (and I specify swordfight because they were using the knives as if they were swords rather than knives). Come to think of it, I'm not sure that the sister was quite aware of how the Vine went either, judging by the look on her face.
Beyond that, though, I wouldn't be surprised if they could have been actual Vines.
Also I had to try to explain Vine to someone else while this was happening, which didn't really help my explanation.
14. Technicality
Technicality All's fair in love and shitposting
I dreamed a few weird things.
First off, I was at a train station in Beverly, MA. Which was odd, because where I live isn't near Beverly but in the dream I went to school nearby. I got on the train to head into Boston, and it was an open-top train. So I sat on the top and headed into Boston. Nobody came to check my ticket, which was annoying because I had paid $200 for it for some reason. I played on the Switch on the way there.
By the time I got to Boston, it was night. Which is weird because I had left in the morning, and the ride is only normally like an hour. I made my way to the hotel where my parents were staying for some reason and met up with my sister in the lobby. We went down forty levels to the basement pool (which, I guess, was really deep underground) but ended up on the roof anyway at a pool. There was some drama related to the current fight that's going on in my family, but then my alarm rang and I woke up.
• Like x 2
15. garden
garden lucid dreamer
i dreamed that i was playing heroes of might and magic III and found a blatant homestuck reference, like it actually namedropped “homestuck.” this was alarming because heroes III came out in 1999.
i also dreamed that i found a kitten. it had reddish fur and it was adorable
• Like x 2
Dismiss Notice
|
global_01_local_1_shard_00001926_processed.jsonl/32548
|
Scientists in Spain have created a 3D printer that uses bioink to recreate authentic human skin for drug testing and regenerative medicine applications.
Researchers from the Universidad Carlos III de Madrid (UC3) and collaborators, including the Spanish bioengineering firm BioDan, have presented a prototype of a 3D printer that can create completely functional human skin. An industrial model could be ready as soon as two months from now.
The 3D printed skin produced at UC3 is intended for transplants in patients with severe burns and to replace animal testing of drugs and cosmetics. The printer can recreate authentic human skin with two distinct layers that mimic the structure of the epidermis and dermis naturally found in our skin.
In a recent paper published in the journal Biofabrication, the team claims that their prototype can create 100 cm2 of 3D printed skin in less than 35 min. That is, once enough amounts of cells have been grown in the lab, a process which can take several weeks. The automation of the process contributes to obtaining uniform batches at a reduced cost over current manual production methods.
The technology is currently awaiting approval from European regulatory agencies, and BioDan expects the product to hit the market in a few months. The bioengineering company, which sells lab-made human skin products, has licensed the patents for the bioinks used in the 3D printing process from the Center for Energy, Environmental and Technological Research (CIEMAT), a public institution in Spain collaborating in the project.
Bioengineers have been trying to recreate human tissues for a long time. In particular, skin is very attractive since its reduced thickness facilitates growing it in a petri dish, and the applications are multiple. Companies like Organovo and MatTek in the US are already selling lab-grown human skin to replace animal testing.
For regenerative medicine applications, impressive technology like the SkinGun from RenovaCare, which sprays the patient’s own stem cells over wounds and burns for rapid healing. The new 3D printing prototype at UC3 builds on these concepts to create an automated process to reduce costs and the time required to obtain skin, either from donors or from the own patient.
This will definitely not be the last 3D printer used to recreate human skin or any other human tissue or organ in the coming years, opening up a whole new world of possibilities for both drug testing and regenerative medicine.
All images from UC3
Previous post
Smart Nebulizers for Children with Asthma are Underway
Next post
Epigenetics Drug Improves Survival in the Second Deadliest Cancer
Let's Continue The Conversation
|
global_01_local_1_shard_00001926_processed.jsonl/32561
|
How to Extract and Clean Data From PDF Files in R
Home / Developer Tools / How to Extract and Clean Data From PDF Files in R
How to Extract and Clean Data From PDF Files in R
Do you need to extract the right data from a list of PDF files but right now you’re stuck?
If yes, you’ve come to the right place.
Note: This article treats PDF documents that are machine-readable. If that’s not your case, I recommend you use Adobe Acrobat Pro that will do it automatically for you. Then, come back here.
In this article, you will learn:
• How to extract the content of a PDF file in R (two techniques)
• How to clean the raw document so that you can isolate the data you want
After explaining the tools I’m using, I will show you a couple examples so that you can easily replicate it on your problem.
Why PDF files?
When I started to work as a freelance data scientist, I did several jobs consisting in only extracting data from PDF files.
My clients usually had two options: Either do it manually (or hire someone to do it), or try to find a way to automate it.
The first way being really tedious and costly when the number of files increases, they turned to the second solution for which I helped them.
For example, a client had thousands of invoices that all had the same structure and wanted to get important data from it:
• the number of sold items,
• the profits made at each transaction,
• the data from his customers
Having everything in PDF files isn’t handy at all. Instead, he wanted a clean spreadsheet where he could easily find who bought what and when and make calculations from it.
Another classical example is when you want to do data analysis from reports or official documents. You will usually find those saved under PDF files rather than freely accessible on webpages.
Similarly, I needed to extract thousands of speeches made at the U.N. General Assembly.
So, how do you even get started?
Two techniques to extract raw text from PDF files
Use pdftools::pdf_text
The first technique requires you to install the pdftools package from CRAN:
A quick glance at the documentation will show you the few functions of the package, the most important of which being pdf_text.
For this article, I will use an official record from the UN that you can find on this link.
text <- pdf_text("./71_PV.62.pdf")
This function will directly export the raw text in a character vector with spaces to show the white space and n to show the line breaks.
Having a full page in one element of a vector is not the most practical. Using strsplit will help you separate lines from each other:
text2 <- strsplit(text, "n")
## [1] " United NationsA /71/PV.62"
## [2] " General Assembly Official Records"
## [3] " Seventy-first session"
## [4] " 62nd plenary meeting"
## [5] " Tuesday, 13 December 2016, 10 a.m."
## [6] " New York"
If you want to know more about the functions of the pdftools package, I recommend you read Introducing pdftools – A fast and portable PDF extractor, written by the author himself.
Use the tm package
tm is the go-to package when it comes to doing text mining/analysis in R.
For our problem, it will help us import a PDF document in R while keeping its structure intact. Plus, it makes it ready for any text analysis you want to do later.
The readPDF function from the tm package doesn’t actually read a PDF file like pdf_text from the previous example did. Instead, it will help you create your own function, the benefit of it being that you can choose whatever PDF extracting engine you want.
By default, it will use xpdf, available at
You have to:
• Download the archive from the website (under the Xpdf tools section).
• Unzip it.
• Make sure it is in the PATH of your computer.
Then, you can create your PDF extracting function:
read <- readPDF(control = list(text = "-layout"))
The control argument enables you to set up parameters as you would write them in the command line. Think of the above function as writing xpdf -layout in the shell.
Then, you’re ready to import the PDF document:
document <- Corpus(URISource("./71_PV.62.pdf"), readerControl = list(reader = read))
doc <- content(document[[1]])
## [2] "General Assembly Official Records"
## [3] "Seventy-first session"
## [4] ""
## [5] ""
## [6] "62nd plenary meeting"
Notice the difference with the excerpt from the first method. New empty lines appeared, corresponding more closely to the document. This can help to identify where the header stops in this case.
Another difference is how pages are managed. With the second method, you get the whole text at once, with page breaks symbolized with the fsymbol. With the first method, you simply had a list where 1 page = 1 element.
page_breaks <- grep("f", doc)
## [1] "fA/71/PV.62t13/12/2016"
This is the first line of the second page, with an added f in front of it.
Extract the right information
Naturally, you don’t want to stop there. Once you have the PDF document in R, you want to extract the actual pieces of text that interest you, and get rid of the rest.
That’s what this part is about.
I will use a few common tools for string manipulation in R:
• The grep and grepl functions.
• Base string manipulation functions (such as str_split).
• The stringr package.
My goal is to extract all the speeches from the speakers of the document we’ve worked on so far (this one), but I don’t care about the speeches from the president.
Here are the steps I will follow:
1. Clean the headers and footers on all pages.
2. Get the two columns together.
3. Find the rows of the speakers.
4. Extract the correct rows.
I will use regular expressions (regex) regularly in the code. If you have absolutely no knowledge of it, I recommend you go follow a tutorial, because it is essential as soon as you start managing text data.
If you have some basic knowledge, that should be enough. I’m not a big expert either.
1. Clean the headers and footers on all pages.
Notice how each page contains text at the top and at the bottom that will interfere with our extraction.
# Remove header of the first page
president_row <- grep("^President:", doc)[1]
doc <- doc[(president_row + 1):length(doc)]
# Remove footer on first page
footer_row_1 <- grep("This record contains the text of speeches ", doc)[1]
footer_row_2 <- grep("f", doc)[1] - 1
doc <- doc[- c(footer_row_1:footer_row_2)]
# Remove headers on other pages
header_rows <- grep("^f", doc) # Remember: f are for page breaks
doc[header_rows] <- "page" # I put a marker here that will be useful later
doc <- doc[- (header_rows - 1)]
Now, our document is a bit cleaner. Next step is to do something about the two columns, which is super annoying.
2. Get the two columns together.
My idea (there might be better ones) is to use the str_split function to split the rows every time two spaces appear (i.e. it’s not a normal sentence).
Then, because sometimes there are multiple spaces together at the beginning of the rows, I detect where there is text, where there is not, and I pick the elements with text.
It’s a bit arbitrary, you’ll see, but it works:
doc_split <- strsplit(doc, "") # Split each row whene there are 2 spaces
doc_split <- lapply(doc_split, function(x) {
# For each element, extract:
#- doc1 that is the first column.
#- doc2 that is the second column.
doc1 <- x[1:8][x[1:8] != ""][1] # The first piece of text that's not empty
if ( doc1 <- ""
# doc2 takes the next non-empty piece of text
doc2 <- x[x != ""]
if (doc1 != "") doc2 <- doc2[-1]
if (length(doc2) == 0) doc2 <- ""
# Sometimes there is more text needed to be extracted.
# I try to give it to either doc1 or doc2 depending on the size of it.
while (sum(nchar(doc2)) > 65) {
doc1 <- paste(doc1, doc2[1], collapse = " ")
doc2 <- doc2[-1]
# Clean it before returning it
doc2 <- paste(doc2, collapse = " ")
doc1 <- str_trim(doc1) # stringr::str_trim trim the spaces before/after
doc2 <- str_trim(doc2)
list(doc1 = doc1, doc2 = doc2)
doc1 <- sapply(doc_split, `[[`, 1) # First column
doc2 <- sapply(doc_split, `[[`, 2) # Second column
Now, let’s put it together, thanks to the marker page that we added earlier:
# Vector of the page breaks coordinates:
pages_rows <- c(0, which(doc1 == "page"), length(doc1))
doc <- c()
# Page by page, we fill a new vector:
for (i in 1:(length(pages_rows) - 1)) {
doc <- c(doc, c(doc1[(pages_rows[i] + 1):pages_rows[i + 1]],
doc2[(pages_rows[i] + 1):pages_rows[i + 1]]))
doc <- doc[doc != "page"]
Now that we have a nice clean vector of all text lines in the right order, we can start extracting the speeches
3. Find the rows of the speakers
This is where you must look into the document to spot some patterns that would help us detect where the speeches start and end.
It’s actually fairly easy since all speakers are introduced with “Mr.” or “Mrs.”. And the president is always called “The President:” or “The Acting President:”
Let’s get these rows:
speakers_rows <- grep("Mrs?..+(", doc)
president_rows <- c(grep("The President:", doc),
grep("The Acting President:", doc))
all_rows <- sort(c(speakers_rows, president_rows))
Now it’s easy. We know where the speeches start, and they always end with someone else speaking (whether another speaker or the president).
speeches <- list()
for (i in 1:(length(all_rows) - 1)) {
start <- all_rows[i]
if (!start %in% speakers_rows) next
stop <- all_rows[i + 1] - 1
speeches <- append(speeches, list(doc[start:stop]))
##[1] "Mr. Hallak (Syrian Arab Republic) (spoke in"
##[2] "Arabic): Yesterday in his statement (see A/71/PV.61),"
##[3] "my colleague the representative of the Republic of Korea"
##[4] "made unprecedented allegations about my country that"
##[5] "we have not read in any report and that have not appeared"
##[6] "in any document. We ask our colleague to provide us"
##[7] "with further information concerning those allegations"
##[8] "and to indicate if they have been corroborated through"
##[9] "bilateral channels. We would have preferred it if, rather"
## [10] "than accusing us, our colleague from South Korea had"
## [11] "dispelled and disavowed information referring to the"
## [12] "existence of nuclear weapons in my country, which"
## [13] "would constitute a flagrant violation of the Treaty on"
## [14] "the Non-Proliferation of Nuclear Weapons."
## [15] "Ms. Kharashun (Belarus) (spoke in Russian):"
## [16] "I would just like to underscore in my statement the"
## [17] "untiring commitment of Belarus to the international"
## [18] "norms and standards concerning nuclear energy, as"
## [19] "well as the priority nature for us of ensuring nuclear"
## [20] "safety and security and transparency in carrying out"
## [21] "the construction of our first nuclear power plant. We"
## [22] "stand ready for dialogue with all international partners,"
## [23] "including our neighbours. For my country, which"
## [24] "suffered the greatest impact of the Chernobyl, nuclear"
## [25] "security is of primary importance."
## [26] "As I noted earlier in my statement, Belarus uses"
## [27] "the tools provided by the International Atomic Energy"
## [28] ""
## [29] "Agency to countries that are embarking on nuclear"
## [30] ""
## [31] "programmes for the first time. We have hosted the"
## [32] ""
## [33] "assessment missions of the Agency on numerous"
## [34] ""
## [35] "occasions."
## [36] ""
Finally, we could get all the speeches in a list. We can now analyze what each country representative talk about, how this evolves over more documents, over the years, depending on the topic discussed, etc.
Now, one could argue that for one document, it would be easier to extract it in a semi-manually way (by specifying the row numbers manually, for example). This is true.
But the idea here is to replicate this same process over hundreds, or even thousands, of such documents.
This is where the fun begins, as they will all have their specificities, the format might evolve, sometimes stuff is misspelled, etc. In fact, even with this example, the extraction is not perfect! You can try to improve it if you want.
Leave a Reply
Your email address will not be published.
|
global_01_local_1_shard_00001926_processed.jsonl/32563
|
Sixteenth Sunday of Ordinary Time, July 17, 2016
Before the first reading:
This story was meant to remind Jews of the greatness of their ancestors Abraham and Sarah, and to propose them as models of good behavior. Abraham could sense that his visitors were extraordinary, and he chose to entertain them lavishly. He lacked only one thing, and his visitors promise that to him within a year.
After the psalm, before the second reading:
Church elders at Colossae asked Saint Paul to help them settle some disputes. So here Paul sets out his credentials. His authority comes strictly from his imitation of Christ and his insight into God's eternal plan.
Before the gospel acclamation:
Jesus breaks two of his culture's rules in this famous short passage. He teaches a woman and he lets her prefer learning to hospitality.
First Reading, Genesis 18:1-10a
Our Liturgical Setting: Today's gospel, Luke 10:38-42, is the familiar story of Jesus at the home of Martha and Mary. The hospitality theme links the gospel to the first reading, although the hospitality is secondary to other themes in both cases.
The Literary Background: The detailing of Abraham's obsequious courtesies are meant subtly to give hearers two important notions about the grand status of the patriarch. He was wealthy enough to play the very generous host with the best of his contemporaries, and he was spiritually keen, sensing that his visitors were disguised angels. His life was imperfect, and he needed God, of course; his protracted childlessness is a constant reminder of that. Thus the visitor's prediction that Sarah would have a son within the year is really the point of this story.
Another interpretation: Roger Karban argues persuasively that the lesson really is hospitality. The kernel of his interpretation: If you believed in the "total otherness" of God (i.e., if you believed God was essentially different from the hand-made idols worshiped by your neighbors), then you honored your God by being courteous to those who were like God in their otherness. Those were the strangers and the travelers you encountered. Abram's God had already inserted plenty of strangeness into the patriarch's life. Our natural instincts are to distrust strangers and view them as competitors for scarce resources (Abram and Sarah had escaped a nasty dose of pagan inhospitality in Egypt, and Abram's kinsman Lot, in the company of two of these mysterious visitors, would experience reprehensible inhospitality in Sodom in the next chapter.)
Proclaiming the Passage: Let's stick with the hospitality theme, since it prepares the assembly for the gospel, if only for a secondary theme of the gospel.
Speak the first sentence as if it were a title, and pause. Dan Nelson explains convincingly "The first half of the verse is the chapter heading. Without it the story is about three messengers; with it, these are no messengers, earthly or heavenly, but Yahweh himself. In 18:22 the men (cf. 19:1, "two angels") go toward Sodom, while Abraham remains before Yahweh." So your pause lets the story begin at a logical place, "Looking up, Abraham saw three men ..."
Make sure your hearers can picture Abraham's exaggerated gestures. Overact it, if you will. First he promises water, then food. Then he orders Sarah to bake rolls, and a servant to cook a steer. He adds curds and milk to the menu, then serves as waiter while his guests eat. The lavishness borders on the comic.
Make a pause, that is, (forgive me) a pregnant pause, before the last sentence, the visitor's promise, "I will surely return to you about this time next year, and Sarah will then have a son." That's how this passage fits into God's whole scheme to make a people, choose them, and from them to bring forth the Savior.
To prepare to read this, imagine yourself as Abraham telling the story of how you entertained the three divine visitors. You're regaling friends and admirers. How would you sound if you were telling the story in the first person? Recreate the breathless frenzy of one making a meal for drop-in visitors. Make your listeners wait for it as you prepare to announce the promise of a son.
Second Reading, Colossians 1:24-28
The Historical and Theological Background: Paul did not establish the Christian community at Colossae, but the elders there appealed to him for help in some doctrinal and disciplinary issues (see last week's Notes and next week's for details about these issues). So here and in the following sentences Paul establishes his credentials:
This lets Paul make a segue to a favorite theme, the revelation of God's plan for humanity in Christ. That plan: Paul's contribution, further specified, is to admonish and teach everyone, so to prepare them to be offered more perfectly to God.
Proclaiming the Passage: Unless you have in your mind an outline like the above, your proclamation may sound like an aimless ramble. Modern punctuation in translations of ancient texts is by nature arbitrary. Supplement the punctuation here by pausing where the logic demands it.
The passage may still be hard for people to understand. You may decide to go for modest, reachable goals, such as one or two memorable phrases. One is "I rejoice in my sufferings for your sake ..." Another, "in my flesh I am filling up what is lacking in the afflictions of Christ." And a third is "Christ in you, the hope for glory." Say these with clarity and conviction, and some listeners may take away a morsel for meditation and spiritual nourishment that sustains them for a long time.
Gospel Reading, Luke 10:38-42
The Historical and Theological Background: Saint Luke's Gentile audience would have wondered:
The answers are intertwined. That Gentiles were interested in Christianity would have only tainted the movement even more in the eyes of mainstream Jews. But the tension started with choices and statements made by Jesus himself.
We're quite used to reading this gospel passage as an injunction to do contemplative prayer, figuratively sitting at the feet of the Master and letting him speak to our hearts. It's easy to let this story raise the imagine a veiled religious woman adoring the Blessed Sacrament, and say, "Yep, that's what it's about. I have work to do but I have to pray first."
Good advice, that. But Saint Luke meant something else. Remember, the evangelist is explaining how Christianity grew apart from its origins, why Jews were so hostile to it, and how Jewish Christians were moved to welcome Gentiles. So Luke remembers and emphasizes things Jesus did that defied the customs and expectations of his people. And this is a pretty incendiary act on the part of the itinerant rabbi from Nazareth. He taught a woman! For a measure of how unprecedented that was and would remain for centuries, see "Yentl, the Yeshiva Boy," by Isaac Bashevis Singer (1902-1991), or the 1983 American movie derived from it.
And That's How to Proclaim it: Let there be astonishment in your voice when you say the words "Mary, who sat beside the Lord at his feet listening to him speak." If you're not the preacher, proclaim this in a way that obliges the preacher to comment on it.
Hearing the gospel reading as a community, or as leader of one
Suppose I'm a bishop giving a retreat to the clergy, and I use this gospel as the kernel of a conference. I could enjoin my fellow servants to sit at the feet of the Master and learn from Him, not getting so Martha-like that we fail to pray. But in addition, we could let ourselves be challenged by Jesus' defiance of two taboos. He teaches a woman, and he teaches that learning is more important than domestic work, even hospitality. A bishop moved by the latter challenge might re-evaluate the diocese's policies on clergy sabbaticals, continuing education, and the pursuit of advanced degrees. (A bishop moved by the former lesson might be an Episcopalian.)
A parish council noticing Jesus' love of learning might establish a library and professionalize its adult education program. Members sharing responsibility for any aspect of their church's mission can ask if they mindlessly reproduce the larger society's low expectations of minorities.
Comments powered by Disqus
Links to other smart commentaries on this week's readings
Credit for the picture at the top:
Yes, I was about to post a predictable picture of Martha, Mary and Jesus in a nicely triangular composition. But this is so much richer. At first I mistook the pouting maid for Mary, miffed that she hadn't chosen the better part. Not too concerned with biblical literalism, the young Velasquez has given us a genre painting.
Proper credits: By Diego Velázquez - The Yorck Project: 10.000 Meisterwerke der Malerei. DVD-ROM, 2002. ISBN 3936122202. Distributed by DIRECTMEDIA Publishing GmbH., Public Domain.
This page updated July 14, 2016
|
global_01_local_1_shard_00001926_processed.jsonl/32605
|
1. Skip to navigation
2. Skip to content
3. Skip to sidebar
Plushka Design Studio
Plushka Design Studio
Felt donuts, play food, pincushion, doughnuts, room decor
Made from pure new wool felt with no toxic dyes, this donut pretend food is safe for little ones (2,5 – 3 years +, not a teething toy).
A stack of these will look so cute in a nursery as a decoration, will add a sweet detail to a flatlay or use one as a pincushion – the choice is yours!
There are 9 designs and many colours to choose from – please leave a note at the checkout with your colour preference (see pictures with numbers allocated to each colour)
Customise them if you wish, just by leaving comment at the checkout with your flavour preference :)
candy spots
colourful squares
Measurements: 12 cm wide
VALUE PACK of 3 is available in store.
Find out more about Plushka by following me at Instagram @plushkadesignstudio
Thank you for visiting Plushka's shop!
Postage & Handling
Within Australia
FREE per additional item
Signed Delivery
FREE per additional item
FREE per additional item
FREE per additional item
FREE per additional item
Payment methods accepted
• PayPal or Credit Card
• Bank Deposit
(Australia Only)
|
global_01_local_1_shard_00001926_processed.jsonl/32609
|
How to Rock your Number-Driven Presentation
PerfectJohn was reluctant to present monthly results to his leaders. His heavily chart-laden slides either resulted in sleepy audiences, or in lots of questions, most of them off-topic. What to do?
If your presentations are number-heavy, or if you are presenting financial data, you might want to try some of these tips to bring them to life, to clarify and streamline your main points, and to make them more engaging and more memorable.
1. Use a strong headline to tell the story. Once we read the headline, we know what to look for when we glance at the numbers. For some audience members, the headline may be all they care to know.
2. Round numbers for impact and recall. Sometimes exact numbers are necessary. Other times a round number does the job just fine. Which is easier to remember, 4,827,292 or 5 million?
3. Show numbers visually when possible. Some speakers make their bar charts represented by an object (bushels of corn, number of rail cars, etc.) Others use graphical elements or infographics when showing statistics. I encourage you to learn more about these vibrant ways to visually express content.
4. Use color to guide the eye and for emphasis. Since our brains notice what is different, one item in a different color will stand out. Or one column shaded will draw our eye to that column. But don’t go color-crazy; too many colors can just confuse.
5. Avoid using 3D on charts and graphs. 2D objects are easier to understand, 3D adds complexity and can be confusing.
6. Get rid of clutter, legends, and background grids unless they add distinct value. The more items on a chart, the more distracting. Keep it simple so the attention goes right where you want it.
7. Make sure your slide is readable from the back of the room. Seriously. Walk to the back of the room and see for yourself. If it is an eye chart, do something different with that slide.
8. Make sure trend lines are bold enough to clearly see. Sometimes graphs have a number of trend lines that all look alike, especially when projected on a slide. Take out what you don’t need, and bold the rest.
9. Each chart should illustrate only one or two points. If you are trying to tell a story with numbers, show the audience one slide for one or two points. Then add to it with a build, or use more slides for more points.
10. Use simple charts in place of spreadsheets. Spreadsheets have their place, but it is not on a slide. Blow up one part of the spreadsheet, or create a new chart to illustrate those points you wish to make. Leave the spreadsheets as a handout or a take-away if needed.
If you were John, which of these would you try? And which ones could you try next time you have a number-heavy presentation? Best wishes.
Web site:
twitter: @ApplauseInc
Translate »
|
global_01_local_1_shard_00001926_processed.jsonl/32615
|
In the following video, the first author Emil Björnson introduces the book “Massive MIMO Networks”, including the intention, content, and target audience.
In the second video, Emil Björnson explains why “Massive MIMO Networks” is published as an open science book.
Other videos about Massive MIMO
Smart Signal Processing for Massive MIMO in 5G and Beyond
Massive MIMO for 5G below 6 GHz: Achieving Spectral Efficiency, Link Reliability, and Low-Power Operation
Massive MIMO for 5G: How Big Can it Get?
Designing Energy Efficient 5G Networks: When Massive Meets Small
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.