id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_1_shard_00001926_processed.jsonl/36826
|
Security guard: Wikis
From Wikipedia, the free encyclopedia
Security guard
Security guard in China
Type Employment
Activity sectors Security
Related jobs Bouncer, doorman, guard, bodyguard
Private factory guard
A security guard, (or security officer) is usually a privately and formally employed person who is paid to protect property, assets, or people.
Functions and duties
Many security officers are required to go through additional training mandated by the state for the carrying of weapons such as batons, firearms, and pepper spray (e.g. the Bureau of Security and Investigative Services[1] in California has requirements that a license for each item listed must be carried while on duty).[1] Some officers are required to complete police certification for special duties.
Positions are also set to grow in the U.S., with 175,000 new security jobs expected before 2016.[2] In recent years, due to elevated threats of terrorism, most security officers are required to have bomb-threat training and/or emergency crisis training, especially those located in soft target areas such as shopping malls, schools, and any other area where the general public congregate.
This is because having security on site increases the odds that any fire will be noticed and reported to the local fire department before a total loss occurs. Also, the presence of security personnel (particularly in combination with effective security procedures) tends to diminish "shrinkage," theft, employee misconduct and safety rule violations, property damage, or even sabotage. Many casinos hire security guards to protect money when transferring it from the casino to the casino's bank.
Recently, electronic systems have risen in popularity due to their light weight, ease of use, and downloadable logging capabilities [3]. Regular patrols are, however, becoming less accepted as an industry standard, as it provides predictability for the would-be criminal, as well as monotony for the security officer on duty.
Types of security personnel and companies
Security personnel are classified as either of the following
• "contract," working for a private security company which protects many locations.
• "Public Security," "Private Police Officers," or security police
• "Parapolice", aggressive firms that routinely engage in criminal investigation and arrests.[4]
Cash transport van with a crew of security guards in Guangzhou, China
Alberta and Ontario probibit the use of the term 'Security Officer' which is in widespread use in the United States for many decades. Recent changes to the act have also introduced restrictions on uniform and vehicle colours and markings to make private security personnel clearly distinctive from police personnel. Some sources feel that some of these restrictions are put in place to satisfy the Canadian Police Association.[5]
There is a marked difference between persons performing the duties historically associated with watchmen and persons who take a more active role in protecting persons and property. The former, often called "guards," are taught the mantra "observe and report," are minimally trained, and not expected to deal with the public or confront criminals.
Ironically enough, there may be no relationship between duties performed and compensation—many mall "security officers" who are exposed to serious risks make less per hour than "industrial security guards" with less training and responsibility.[6] However, there are now more positions in the security role that separate not just the titles, but the job itself. The roles have progressed and so have the areas for which security people are needed. All security jobs vary in pay and duties at present.
The term "agent" is particularly problematic in the security industry because it can describe not only a civil legal relationship between an employee and their employer or contractor ("agent of the owner" in California PC 602), but also describes a person in government service ("Special Agent Jones of the Federal Bureau of Investigation.") However we should then also consider the fact that this title is also made available to banking agents, loan agents and real estate agents.
Security "agents" found in loss prevention and personal or executive protection (bodyguards) typically work in plainclothes, without a uniform, and are usually highly trained to act lawfully in direct defense of life and/or property. There is also confusion with bail enforcement agents, or as they are popularly known "bounty hunters," who are sometimes regulated by the same agencies which regulate private security.
Licensing and regulation
Flag of Australia.svg Australia
Any person who conducts a business or is employed in a security related field within Australia is required to be licensed. Each of the six (6) states and two (2) territories of Australia have separate legislation that covers all security activities. Licensing management in each state/territory is varied and is carried out by either Police, Attorney General's Department, Justice Department or the Department of Consumer Affairs.
New South Wales - (Police) Security Industry Act 1997 & Security Industry Regulation 2007; Victoria - (Police) Private Security Act 2004; Queensland - (Justice & Attorney-General) Security Providers Act 1993; South Australia - (Consumer & Business Affairs) Security and Investigation Agents Act 1995; Western Australia - (Police) Security & Related Activities (Control) Act 1996 & Security & Related Activities (Control) Regulations 1997; Tasmania - (Police) Security and Investigation Agents Act 2002; Northern Territory - (Justice) Private Security Act & Private Security (Security Officer/Crowd Controller/Security Firms/Miscellaneous Matters) Regulations; Australian Capital Territory - (Regulatory Services) Security Industry Act 2003 & Security Industry Regulation 2003. All of this legislation was aimed to enhance the intrigity of the private security industry.
All persons licensed to perform security activities are required to undertake a course of professional development in associated streams that are recognised nationally. This has not always been the case and the introduction of this aspect should regulate the educational standards/knowledge base expected so that the particular job can be competently undertaken.
Strict requirements are laid down as to the type of uniform and badging used by security companies. Uniforms or badging that may be confused with a police officer are not permitted similarly, the use of the title 'Security Police' or 'Private Detective' are unacceptable. Whilst the term security guard is used by companies, government bodies and individuals, the term security officer is deemed more suitable. 'Bouncers' are Crowd Controllers and Store Detectives are Loss Prevention or Asset Protection Officers.
Security Officers are not permitted to carry firearms, handcuffs or batons unless they have a legitimate requirement to do so and then only when working and have the appropriate sub-class accreditation to their license.
Flag of Canada.svg Canada
In Canada, private security falls under the jurisdiction of Canada's ten provinces and three territories. All ten of Canada's provinces and one of its territories (the Yukon) have legislation that regulates the contract security industry.[9] These eleven jurisdictions require that companies that provide security guard services and their employees be licensed.
Most of them also require that, in order to be issued a licence, a security guard either have completed a training course or have previous experience as a peace officer (i.e. a police officer). As well, most provinces in Canada regulate the use of handcuffs and weapons (such as firearms and batons) by contract security companies and their employees, either banning such use completely or permitting it only under certain circumstances.
Canada's federal laws also restrict the ability of security guards to be armed. For example, section 17 of Firearms Act makes it an offence for any person, including a security guard, to possess prohibited or restricted firearms (i.e. handguns) anywhere outside of his or her home.
There are two exceptions to this prohibition found in sections 18 and 19 of the Act. Section 18 deals with transportation of firearms while Section 19 deals with allowing persons to carry such firearms on their persons to protect their lives or the lives of other persons, or for the performance of their occupation, provided an Authorization to Carry (ATC) is first obtained.
British Columbia
Private security in the province of British Columbia is governed by two pieces of legislation: the Security Services Act[10] and the Security Services Regulation.[11] These laws are administered and enforced by the Security Programs and Police Technology Division[12] of the Ministry of Public Safety and Solicitor General.
In the past, only personnel that worked for contract security, that is, security companies, were regulated in British Columbia. However, as of September 1, 2009, in-house security guards and private investigators came under the jurisdiction of the Security Services Act and Security Services Regulation. The same occurred to bodyguards and bouncers, effective November 1, 2009.[14]
Flag of Europe.svg Europe
Armed private security are much rarer in Europe, and nonexistent many of them, such as the United Kingdom, The Netherlands and Switzerland. In developing countries (with host country permission), an armed security force composed mostly of ex-military personnel is often used to protect corporate assets, particularly in war-torn regions.
In Finland, all contract security guards are required to have a valid license granted by police. Temporary license is valid for four months and normal license for five years. License requires a minimum 40 hours course for temporary license and 60 hours more for a normal license. Additionally a narrow security vetting is required. The 40 hours course allows the carrying of a fixed-length baton and handcuffs, separate training and license is required for the security guard to carry pepper spray, extendable baton or a firearm. Rehearse of weapons usage is mandatory every year and is regulated by the Ministry of The Interior, to ensure the safe handling of pepper spray and such. In Finland, a security guard has the right to detain a person "red-handed", or seen committing a crime and the right to search the detained individual for harmful items and weapons. An indivual who has been forcefully detained can only be released by the police. All companies providing security guarding services are also required to have a valid license from Ministry of the Interior.[16]
In The Netherlands security guards Beveiligingsbeabte must undergo a criminal backgroundcheck bij the local police department in the area where the private security company is located. To become a securtiy guard in The Netherlands a person must complete the basic training level 2 Beveiliger2, to complete the training a trainee must undergo a three month intership with a private security company that is licensed bij the svpb, this is the board that controls security exams. A trainee guard must pass for his diploma within one year, if the trainee does not pass he is not allowed to work anymore until the trainee completes his training with a positive result, after a positive result a new ID can be issued and is valid for three years, after that the guard must undergo a backgroundcheck bij the local police again. Security guards in The Netherlands are not allowed to carry any kind of weapon or handcuffs. Every uniformed security guard in The Netherlands must have the V symbol on its uniform to ensure the public they are dealing with a private guard, this rule is mandatory by the Ministry of justice. Security uniforms may not look like similar to police uniforms ,and may not contain any kind of rank designation,and the collor yellow or gold are not allowed to used because the Dutch police uses gold accents in their uniforms, also wearing a uniformcap is not longer allowed. Every new uniform design or addition must be approved by the ministry of justice before use. A patrol vehicle may not look like a police striped vehicle. The only private security guards that are allowed to carry firearms are those who work for the military or Dutch National bank (De Nederlandsche Bank) this is were the national gold reserve can be found.
Flag of Hong Kong.svg Hong Kong
• under and in accordance with a permit; or
• otherwise than for reward. [4]
security work means any of the following activities-
• guarding any property;
• installing, maintaining or repairing a security device;
• designing for any particular premises or place a system incorporating a security device.
• the occurrence of any offence; or
• No criminal record.
• At least 18 years old when submitting his/her application.
Although the Security and Guarding Services Industry Authority ( SGSIA ) is the agency in charge of the security service industry, all applicants must submit their application and pay the fee by mail or in person to Hong Kong Police Force(License Section).
Power of Arrest
Flag of Israel.svg Israel
In Israel, almost all security guards carry a firearm, primarily to prevent terror attacks. Security guards are common: they perform entrance checks at shopping malls, transportation terminals, government and other office buildings, and many stores. Many locations with a high number of visitors, such as the Jerusalem Bus Station, employ X-ray machines to check passenger's bags; in other places, they are opened and visually inspected. As of 2009, private security guards have also replaced official security forces at some checkpoints inside and on the border of the West Bank, as well as the crossings to Gaza.
Flag of Malaysia.svg Malaysia
In August 2007, Malaysia banned hiring of foreign security guards following a rape and murder of a student by a Pakistani security guard.[17]
Security guard companies need to apply to the Ministry of Internal Security.
South Africa South Africa
Flag of the United States.svg United States
Most states require a license to work as a security officer.[19] This license may include a criminal background check and/or mandated training requirements.
Most security officers do not carry weapons and have the same powers of arrest as a private citizen, called a "private person" arrest, "any person" arrest, or "citizen's arrest." If weapons are carried, additional permits and training are usually required. Armed security personnel are generally used to protect sensitive sites such as government and military installations, armored money transports, casinos, banks (or other financial institutions), nuclear power plants, etc. However, armed security is quickly becoming a standard for vehicle patrol officers and on many other non-government sites.
California Security Guards are required to obtain a license from the Bureau of Security and Investigative Services, of the California Department of Consumer Affairs. Applicants must be at least 18 years old, undergo a criminal history background check through the California Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), and complete a 40-hour course of required training.
The training and exam may be administered by any private patrol operator or by a certified training facility, additional permits and training are required to carry firearms, batons or tear gas.[21]
New Jersey As of 2006 all security personnel must undergo a state mandated certified training program. This law commonly referred to SORA is the state's effort to increase the quality of security personnel.
Pennsylvania No licensing requirements to be an unarmed security guard. However, armed security guards must undergo and successfully complete a 40 hour training course (including shooting range time) in order to be certified to carry weapons and on watch while on duty under the Lethal Weapons Training Act (commonly referred to as Act 235 certification). Certification involves qualifying on a pistol range, with firing of 50 rounds of .38 cal. ammo. You are also required to qualify on a shotgun. The certification is good for five years at which time an eight hour refresher course must be taken or the certification is revoked.[22]
Virginia Security officers in Virginia are required to be licensed by DCJS (Department of Criminal Justice Services)[23]. To be licensed as an unarmed security officer one must go through 18 hours of classroom training from a licensed instructor in order to obtain this card and it must be done by the end of their 90 days after hire with a Security company. Every two years the card must be renewed, by completing an inservice with a licensed instructor. To be licensed as an armed security officer one must complete an additional 16 hours of firearms training, 6 hours of training in conducting a lawful arrest, and qualification with the type and caliber of weapon they intend to carry. Firearms endorsements must be renewed annually by completing an inservice and passing a firearms qualification. Licensed armed security officers are authorized under state code to arrest [24]for any offense committed in their presence while they are on duty at the location they are hired to protect. They may also be granted the authority by the chief law enforcement officer in their jurisdiction to issue summons to appear in court[25] for felonies and misdemeanors.For more information on DCJS codes and regs click here.
Security officers and the police
Security personnel are not police officers, unless they are security police, but are often identified as such due to similar uniforms and behaviors, especially on private property. Security personnel in the U.S. derive their powers from state laws, that allow them a contractual arrangement with clients that give them Agent of the Owner powers.
This includes a nearly unlimited power to question with the absence of probable cause requirements that frequently dog public law enforcement officers, provided that the security officer does not tread on the rights and liberties of others as guaranteed by the United States Constitution.
Police are called in when a situation warrants a higher degree of authority to act upon reported observations that security does not have the authority to act upon, however, some states allow Licensed Security Officer the full arrest powers equal to that of a Sheriff Deputy.
Instead, the wealthy pay to provide their own premium services, through voluntary, exclusive associations. As taxpayer resistance has limited government budgets, and as the demand for secure homes in gated communities has grown, these trends have continued in the 1990s and 2000s.
In the aftermath of 9/11, the trend in the US is one of a quiet transformation of the role of security guards into first responders in case of a terrorist attack or major disaster. This has resulted in longer guard instruction hours, extra training in Terrorism tactics and increased laws governing private security companies in some states.[27]
Within the “in-house” sector, where security personnel are not subject to licensing under the Private Security Industry Act 2001, the same divergence can be seen; with some companies opting for in-house security to maintain control of their standards, whilst others use it as a route to cheaper, non-regulated, security.
Notable security guards
• The security guard Frank Wills detected the Watergate burglars, ultimately leading to the resignation of Richard M. Nixon as President of the United States.
• In 1980, musician John Lennon was fatally shot in front of his own apartment house, The Dakota, by a former security guard, Mark David Chapman.
• In 2001, Gary Coleman, former child actor, was employed as a shopping mall security guard in the Los Angeles area. Whilst shopping for a bullet-proof vest for his job, Coleman assaulted a female autograph collector. Coleman said he felt "threatened by her insistence" and punched her in the head.[6] He was later charged for the assault and ordered to pay her $1,665 for hospital bills.
• In 2007 Matthew Murray opened fire first at the Youth With A Mission retreat center in Arvada Colorado, killing two and wounding two more. A few hours later he opened fire in the New Life Church parking lot, killing two and wounding three. When he proceeded inside the building, he was met by armed security guard Jeanne Assam, who ordered him to drop his weapon and opened fire when he failed to comply. The pastor of New Life Church credited Assam with saving over 100 lives.
In June, 1947, the United States Congress passed the Taft-Hartley Act placing many restrictions on labor unions. Section 9 (B) (3) of the act prevents the National Labor Relations Board (NLRB) from certifying for collective bargaining any unit which mixes security employees with non-security employees. That restriction makes it illegal for security employees to join any union that also represents other types of employees.
Security, Police, and Fire Professionals of America
United Government Security Officers of America
There is controversy surrounding recent efforts by certain unions to become involved in the security industry, such as the Service Employees International Union (SEIU) because it primarily represents janitors, trash collectors, and other building service employees.
Depending on individual locations & companies, Security Guards in Canada are part of the United Food and Commercial Workers Union (UFCW Local 333) or the United Steelworkers Union (the Canadian wing of the United Steelworkers Union of America (USWA)). In contrast to the union restrictions in the United States, Canadian security guards may be in a Canadian Labour Congress (CLC)-affiliated union or in the same union with other classifications of employees.
See also
1. ^ Power to Arrest Training Manual - California Bureau of Security and Investigative Services
2. ^ Bureau of Labor Statistics Occupational Outlook Handbook, 2008-09 Edition
3. ^ Morse Watchmans | Products | PowerCheck
4. ^ Rigakos, George. 2002. The New Parapolice: Risk Markets and the Commodification of Social Control. Toronto: University of Toronto Press. (see: or McLeod, Ross. 2004. Parapolice: A Revolution in the Business of Law Enforcement. Toronto: Boheme Press. See also the recent empirical work of Button, Mark. 2007. Security Officers and Policing: Powers, Culture and Control in the Governance of Private Space. Aldershot: Ashgate.
6. ^ "security guard services guide". Retrieved 2007-12-06.
7. ^ City of Ceres, California, Chief de Werk's Weekly Article
8. ^
13. ^
15. ^ SIA website
16. ^ Ministry of the Interior unit for supervision of the private security industry
17. ^ "Malaysia bans hiring of foreign security guards".
19. ^ Security Guards and Gaming Surveillance Officers
21. ^
22. ^ LWTA Rules and Regulations
23. ^
24. ^
25. ^
26. ^ National Advisory Commission on Criminal Justice Standards and Goals (NAC-CJSG) (1976), Private Security: Report of the Task Force on Private Security, Washington, DC: U.S. Department of Justice, Law Enforcement Assistance Administration
27. ^
28. ^
29. ^
External links
Got something to say? Make a comment.
Your name
Your email address
|
global_01_local_1_shard_00001926_processed.jsonl/36829
|
Labor Pain or Not?
Arianna Sofía
Creative Commons License photo credit: gabofr
The woman who’s pregnant for the first time has all sorts of baggage and preconceived notions when it comes to what labor is going to be like. The fact of the matter is, however, she’s probably going to be wrong on a great many things. This is, largely, because every pregnancy is a little different; what one woman experiences, you may not.
Take, for example, labor. For some women, it’s excruciatingly painful. That’s why we have epidurals and all of these other labor pain medications, after all. However for other women, such as Hillary Duff, it turns out labor pain is no big deal. The singer and actress recently told Ellen DeGeneres that the birth of her son Luca was relatively painless, quick, and easy.
You really never know how it’s going to be until you get there.
Know your options
Part of pregnancy is being prepared for labor, so it’s important that you know what your options are going to be for pain relief. Essentially, there are several ways you can relieve pain:
• Natural pain management. These are the methods you’ll use in early labor, and that some women will use throughout labor and delivery. It includes things like relaxation techniques, breathing exercises, changes of position, and more. Playing music and even taking a shower may help, as well.
• Nontraditional pain management. Some women rely on more alternative pain management techniques. This might include hypnosis, acupuncture, reflexology, and others.
• Medications. Narcotics may sometimes be given during labor to alter your perception of pain.
• Epidural and spinal blocks. These methods are used to block pain to your lower body. An epidural may be used throughout the entire labor process, while a spinal block is likely to be used only just before delivery.
Each pain management option has its pros and cons. Do your research so that you know, for example, how narcotic pain medications might affect your baby, and affect your experience of the birthing process. Know what you want during labor, and write it all down in your birth plan. Make sure to discuss that plan thoroughly with your doctor, as well.
|
global_01_local_1_shard_00001926_processed.jsonl/36840
|
When You Are Wrong
May 25, 2015
"I'm right," I insisted, anger edging my voice. Hands trembling, I twisted the damp Kleenex in my lap. Pausing to look up, I met the gazes of the women surrounding the edges of the living room.
Soberly, momentarily silent, they met my gaze. As I looked around, I had the sudden ugly, panicked feeling that maybe I wasn't right. And if that was true, then life as I knew it was about to change.
Oh, we'd been talking about moving to the Twin Cities for months. At first, it was a passing thought, a wish and a prayer sent up on days when ice coated the highways or road construction added an hour or two to Tim's commute. But after a few years of driving 120 miles round-trip each day just to get to the edges of the territory he covered for work, he was convinced we needed a change. Me, not so much. My work was in St. Cloud. My friends were in St. Cloud. My family was in St. Cloud. Why would he want to take that away from me?
But voicing my anger and fears to women I trusted, the same women I saw every Saturday morning at Bible study -- women who knew me well -- didn't give me the validation I had hoped. Why was no one agreeing with me?
Bewildered, I went home. The next time the topic arose, I begrudgingly told Tim we could start house-hunting. I envisioned it as a slow process, with lots of time for me to adjust to the idea. Instead, he was ready to list our house the next day, and eagerly lined up houses for us to look at in the Cities.
Outwardly calm, I continued to sulk on the inside. The houses were ugly. They were too big, too small, not worth the money, had no yard, had too much yard, or were just too far away from my family. And then we found a house -- one I loved -- and suddenly, the prospect of moving didn't seem so far-fetched. We found a location that suited us, halfway between our current location and the Cities. It was a compromise.
More than four years later, I'm SO GLAD we moved. We have a cozy home with a tree-filled backyard that brings me peace each time I see it out the window. We have wonderful neighbors. We live in a small town, but have easy access to the city. We found a church we love. We have life-long friends that we "do life" with, sharing burdens and joys. Life is better, richer, more fulfilling than it was before.
When we lived in St. Cloud, I had prayed for those things, but I had wanted God to answer them my way.
It's humbling to me now, thinking of how in my righteous anger, I was so sure that moving was a mistake. How I could not have possibly imagined what God had in store for us. And I remember how, in years past while sitting in the pews at First Baptist Church, I heard the benediction intoned with equal parts reverence and jubilation every Sunday morning:
Looking back, the words ring true. More than all we ask or imagine. Isn't that worth a compromise? A move? Some humility? A willingness to learn that I'm not always right?
I can admit now that on one particular Saturday morning, I was terribly wrong. And I've never been happier to say so.
Post a Comment
Latest Instagrams
© The Ruth Experience. Design by FCD.
|
global_01_local_1_shard_00001926_processed.jsonl/36853
|
The new “Google WhatsApp” is already available on PC
So last year Google announced that it was giving the humble SMS app an upgrade. Not just any upgrade though, SMS was going to get the full-on messaging upgrade it needed to take on WhatsApp. Well now, Google’s messaging app is now available to download on PC.
The PC version of Google messages works a lot like WhatsApp Web but is a reflection of the SMS app found on Android phones. It can send texts and photos to all of your contacts. As well as this, however, it’ll even allow users to send messages to email addresses using their phone number.
To use Messages on PC all you have to do is:
1. Check that you have the latest version of the Messages app installed on your smartphone. If you don’t click hereto download it.
2. Once you have the app installed, open it, tap the three dots in the upper right corner, and then Messages for Web.
3. On your desktop, using any browser, go to
4. Scan your QR code with your smartphone’s camera and you’re good to go.
5. Read more:
|
global_01_local_1_shard_00001926_processed.jsonl/36855
|
The Top 10 Free Bachelorette Party Games
Free Bachelorette Party Games
Conservative or wild, every bachelorette party needs fun games!
We have come up with some of the most entertaining and crazy games! We want to pass them onto you so you can make the bachelorette's night, a night to remember! No party needs to cost a ton either, so here are our top 10 free bachelorette party games...
1)Scavenger Hunt- This is a fun one if you plan on going out for the night. Make a list of things the bachelorette must collect while out. Some ideas are: boxers, phone number of a guy, condom...
2)To-Do List- Another fun one if you are going out...Make up a list of things the bachelorette must do while out. To make it fun for everyone, you could make all the ladies participate in the fun and give them the same list to complete! Some examples are: get a guy to buy you a shot, dance with a bald guy, hug the bartender or waiter...
3)I Never- This game can get you into trouble! Go around the room and one person will start by saying something they've never done before. If anyone has done it, they must drink. Once everyone gets a little alcohol in them, the game gets a little more interesting by what people start admitting. Some good "I Nevers": I never peed in the shower, I never cheated on a boyfriend... (If playing a non-drinking game, hold up five fingers and if you've done it, put a finger down, the last person with fingers up, wins!
4)Truth or Dare- Take a step back into time by playing truth or dare - the game everyone loved to play at their childhood slumber parties! Who wouldn't love a classic game of truth or dare for a bachelorette party?!
5)Buck-A-Suck- This one takes a little more creativity...get a plain white tank top, t-shirt, or whatever you choose and sew lifesavers all over it! In the middle of the shirt write "Buck-A-Suck." Have the bachelorette wear it and while out, guys must pay a buck to eat one of the lifesavers off the shirt!!! If the lifesaver is in a "risque" spot on the shirt... charge more! Fun time for all!
6)How Well Do You Know the Bachelorette?- This is a great ice-breaker game if all the ladies don't know eachother well. Make a list of questions for everyone to answer about the bachelorette. Depending on the mood of the party, you can make them funny, relationship/sex related, or just general questions. The person with the most right wins!
7)Pin the Penis on the Man- A "naughty" spin on an old classic! There are many party kits out there you can buy but if free bachelorette party games is what you're looking for, you can make it yourself! Just cut-out a manly looking figure out of some poster board or other paper. Then cut a penis figure out. Blindfold each guest and have them try to pin the penis on the man! Closest one wins!
8) ABC's of Alcohol- Have each guest right the letters A-Z down the side of a piece of paper. Set a timer for a time you choose and have each person write an alcohol that begins with each letter. The one with that thinks of the most in the time given wins...or is an alcoholic!
9) Penis-Doh- Give each person some play-doh. Give them 2 minutes to sculpt the best penis they possibly can. After the time is up, have everyone vote on the best penis!
10) Who's Panties - Give each guest the bachelorette's panty size before the party. Have each person buy and bring a pair of panties in the bachelorette's size to the party. Keep it a secret and hang the panties on a clothesline or string. Everyone tries to guess who brought which panties and the one who guesses the most right, wins! Although this isn't a totally free bachelorette party game, have the bachelorette keep the additional gift needed!
Well there you have our top-10-free-bachelorette party games! No matter the style of the party, there's a game for everyone to enjoy!
Share Your Favorite Bachelorette Party Game or Idea...
Return from Free Bachelorette Party Games...Hop back to Bachelorette Party
Hop back to Homepage
Bridal Shower Favors
Newest Shower Feature:
Camping Bridal Shower
|
global_01_local_1_shard_00001926_processed.jsonl/36879
|
UX Recorder: Screen capturing software for iOS. Learn more.
Glossary » Psychology
mental map
(website navigation) a representation in a person’s mind of the structure of a website, which is likely to be incomplete and simplified. A mental map helps people simplify the job of remembering what they’ve seen to the problem of remembering…
Read more »
mental model
Humans establish mental models of how things work, or how they would behave in a particular situation. For example, having been a student at a university for a while, a student can establish a “mental model” of attending a university.…
Read more »
Meyer’s Law
T = A + B * SQRT(D/W)
T = time to move to a target
D = distance to target
W = width of target
A ~ -13 msec
B ~ 108 msec
Meyer’s Law is…
Read more »
Model Human Processor. A simple cognitive architecture used as the basis of the GOMS family of user modeling techniques. This representation of human cognition consists of separate components for cognitive, motor, and perceptual processors (and associated buffers), as well as…
Read more »
an error of reasoning or inappropriate subgoals, such as making a bad choice or failing to think through the full implications of an action.
Read more »
mode error
a type of slip where a user performs an action appropriate to one situation in another situation, common in software with multiple modes. Examples include drawing software, where a user tries to use one drawing tool as if it were…
Read more »
mundane realism
the extent to which a study, such as user testing, matches the real-world situation to which its results will be applied. This is an example of an external validity concern. This means matching the types of users being tested and…
Read more »
Natural GOMS Language. NGOMSL was developed as a formally defined version of CMN-GOMS based on cognitive complexity theory (CCT). It has a more structured hierarchy than CMN-GOMS and a well-defined analysis methodology for developing models. In addition to the execution…
Read more »
nominal-ordinal-interval-ratio. A mnemonic for remembering common data scales used in empirical measurement.
Nominal – a set of items that can be distinguished by name or category. Ordinal – items that can be ordered, such as military rank, or units of
Read more »
opportunistic goals
user goals that are formulated on the spot in reaction to prominent system events or displays that suggest those goals.
Read more »
pilot test
or formative test; an initial run of a study (e.g. an experiment, survey, or interview) for the purpose of verifying that the test itself is well-formulated. For instance, a colleague or friend can be asked to participate in a user…
Read more »
power law of practice
an expression of time to perform a task based on practice trials, saying that people improve in speed at a decaying exponential rate.
Tn = T1 n-a, a ~ 0.4
Tn = the time to perform a task after n…
Read more »
prototype-instance model
(programming) a version of object-oriented programming that does not have classes. Instead, objects inherit behavior directly from other objects. This dramatically simplifies the language by removing unnecessary concepts such as metaclasses. This approach was popularized by the “Self” language.
Read more »
psychology of programming
PoP; the study of how programmers create software, including such topics as learning a programming language, planning a program, how language features affect coding time and accuracy, and how programmers isolate and repair bugs.
In addition to understanding basic principles…
Read more »
a discipline of psychology that measures the response characteristics of human perception in a method parallel to measuring the response characteristics of physical materials. The prototypical examples are human perception of the intensity of light and sound. People report the…
Read more »
question-asking protocol
Read more »
a means of expressing that participants in a conversation come with different skills and interests and should have a user-interface that reflects their personal needs.
Roles such as chairperson, scribe, and facilitator reflect a set of access capabilities to shared…
Read more »
a theory of human reasoning that says that people minimize cognitive load by minimizing reasoning and using quick heuristics to make decisions. Thus, people avoid complex memory, planning, and decision-making in favor of acting upon information immediately available perceptually, well-known…
Read more »
schedule chart
a diagram used in project management, planning, and scheduling. The schedule chart shows the different resources and activities involved in a project and time dependencies between them. With this diagram, a critical path can be found that indicates the shortest…
Read more »
selection bias
in choosing test users for a usability study, selection bias is any imperfection in the selection process that gets either the wrong types of users (people who aren’t in your target audience) or a sample of users that is not…
Read more »
Read more »
semantic differential
a type of survey question where respondents are asked to rate their opinion on a linear scale between 2 endpoints, typically with 7 levels. For example:
Please rate this software on the following dimensions:
easy to use 1 2 3
Read more »
sensory modality
A communication channel associated with one of the human senses of sound, vision, touch, smell or taste. As used in discussing usability this may imply input to and output from the computer as well as the human user. E.g., the…
Read more »
single-case experimental design
a method for determining the effect of an experimental manipulation with only one test subject (one user, one organization, etc.), basically by applying and removing the intervention over time:
measure the dependent variable initially apply the intervention, and measure
Read more »
situated action
the notion that people’s behavior is contextualized, i.e. the situation is a very important factor in determining what people will do. In the extreme view, this is the idea that you can’t generalize and predict people’s behavior from one situation…
Read more »
↑ Back to top
Page 3 of 41234
|
global_01_local_1_shard_00001926_processed.jsonl/36888
|
Battle - Age of Empires (W32)
From Video Game Music Preservation Foundation Wiki
Jump to: navigation, search
Output - PCM.svg
Age of Empires - W32 - Battlesong.png
Composer David Rippy
Arranger David Rippy
Released 1997-10-15
Length 3:16
Format CD.png
Game Age of Empires (W32)
Title Origin Official
Loops No
This page is for the Age of Empires (W32) song, for more titles see Battle.
Battle is one of the 10 different songs that are played during a regular game if using the CD audio track. It is the third track that is played. The tracks are played in sequence starting from Cave and ending with Gray Sky, at which point the list starts over from the beginning.
The song title has been confirmed by Stephen Rippy.
|
global_01_local_1_shard_00001926_processed.jsonl/36904
|
Come see us at THE Expo!
This weekend we have a massive event ahead of us; it’s almost as big as the trucks we drive around in! We’re off to the biggest event in trucking history, THE Expo. Come along to Mystery Creek and check out all our truckers displaying their fancy beasts. And since we like to fuel up our [...]
|
global_01_local_1_shard_00001926_processed.jsonl/36926
|
Lake-Placid Scenery for Condor Flight Simulator
This scenery is not quite complete but is quite useable. Two versions are available, one based on Landsat imagery and one based on Google-Earth/Maps (GEM) imagery. (More information...)
The Landsat version is based on 2048x2048 pixel resolution tiles, while the GEM version is based on 4096x4096 pixel resolution. Condor can support variable resolution in one scenery. One of the 25 tiles in the GEM scenery, the one for the Lake Placid Airport area, has a resolution of 8192x8192.
Because of the lower resolution, the Landsat file size for downloading is 1/4 the size the GEM version.
Sample view of the Landsat imagery (click image for larger view).
Sample view of the GEM imagery (click image for larger view).
Downloading the scenery
You can download the Landsat version or the GEM version or both as desired. The scenery files are available in separate files, a common "Base" file, the Landsat imagery file and the GEM imagery file. You need to download the base file and one imagery file.
The Base File V0.2 has a size of 10 Mbytes.
The Landsat V1.1 File has a size of 50 Mbytes.
The GEM V1.1 File has a size of 230 Mbytes.
The files have to be installed in the Condor\Landscapes folder. First, UnZip each file, and then drag the un-zipped LakePlacid folder into the Condor\Landscapes folder. Then, in the folder Condor\Landscapes\LakePlacid, double-click the Landsat.bat file icon, or GEM.bat as appropriate to set-up the imagery.
To select the scenery, the appropriate batch file must be executed to select the desired imagery. Double-click on the Landsat.bat icon to select the Landsat imagery, or double-click on the GEM.bat icon to select the GEM imagery as desired. You must do this once after installing the imagery. You can swap between imageries as desired by selecting the appropriate batch file at any time.
Downloading sample flight plan
A sample flight plan for a task around Lake Placid.
The flight plan has a maximum start altitude of 5000' MSL and no minimum finish altitude.
Un-zip the file and copy into the Condor\FlightPlans\User folder.
E-mail: Lake Placid Condor Scenery
|
global_01_local_1_shard_00001926_processed.jsonl/36934
|
Spam filtering for business security
In today’s modern times all the companies do business via email, in fact, the whole business world today has become digitally modernised. Everything from making orders to the suppliers to contacting customer support is dependent on the email. Sending and receiving of mails has become extremely important for a company; however, a company can at times receive unwanted emails that can cause a lot of threat. The only way of dealing with these unwanted emails is with the help of spam filtering.
Spam filtering
Reasons for choosing spam filtering
Spam filtering services help in blocking unwanted mails, these services simply block all the transmissions from spammers and hackers. Here are a few reasons why businesses and business houses should consider spam filtering:
• Spam filtering assures that the unwanted mail reaches the trash; it blocks the junk mails and prevents them from reaching the inbox in the future. This is great, because if the user would take out time to clear out the junk then it would take a lot of time to decide which mail to dump and which to keep. Due to spam filtering, the employees can also concentrate on their work.
• Spam filtering is great for keeping the data secure and safe; it makes sure the security is up-to-date.
• The main job of the spam filter is to prevent threats because a person cannot tell the difference between spam and illegitimate mails. If the spam mails are not blocked then they can lead to data loss and disruption of privacy.
• Spam filtering helps in maintaining the image of the company because the client data gets affected by the spam mails then it can lead to financial and client loss.
So, spam filtering is an effective and efficient way of maintaining privacy and security of the company.
|
global_01_local_1_shard_00001926_processed.jsonl/36944
|
Reservation sheet
thank you.
Please tell us your details.
1. Name
2. The number of join
3. Cell phone number
4. E-mail
5. Date
6. Start time
If you have some question, please tell us.
zero paraglider school E-mail:
The tide of paraglider "A sandhill school"
【STEP1】 Meet at "Rakudaya"
Please report at the reception.
Don`t forget to use the restroom.
【STEP2】 Carrying the paragliding equipment to the entrance.
【STEP3】 We go to the best location depending on the wind condition.
【STEP4】 Please take the flying lessons.
Please listen carefully.
【STEP5】 After training, please open your paraglider, and listen for further instraction.
【STEP6】 You must operate your paraglider by your self.
Let's practice on the graund.
【STEP7】 If the wind condition is good, let's try it.
【STEP8】 Even if you're pulled up and almost floating, you must keep running.
【STEP9】 And a flight!
【STEP10】 Please operate your paraglider following the instructor's orders, don't be afraid even if you can't fly.
【STEP11】 If you pull a left cord,you'll go left and if you pull a right cord, you'll go right.
【STEP12】 After you make a successful landing, you must carry your paraglider back to the starting position.
※Children or people who aren't confident of their physical stregth.
【STEP13】 After you go back to the starting position, please take a rest.
If you feel good and a wind condition is good, do that again.
Clothing:Sport wear/confortable/it's ok to get dirty and sneakers.
※flipflops are not allowed.
For people with sensitive skin, we recommend long sleeves and jeans to prevent sunburn.
things you reed:gloves, water (you should prepare a lot of drinks)in summer.
convinient things:hat or cap, sunglasses(Especially people who wear contactlenses), towel, suncreen, camera(camera case is necessary for preventing getting darty),health insurance card.
|
global_01_local_1_shard_00001926_processed.jsonl/36968
|
What is the railway like in Vietnam?
In Vietnam, all railways are government run but they have allowed private companies to furnish and service luxury cars which are attached to the state trains. Tracks span the length of the country and generally run near the coast which can make for nice views. Nearly all major tourist destinations can be reached by train and in most cases, it is faster than taking the bus and certainly more relaxing. One of the only popular places unreachable by train is Dalat in the central highlands which one can get to by bus or plane. Short delays are not uncommon but often trains are able to make up the lost time and arrive on time.
Tags: Vietnam, Vietnam Railways
|
global_01_local_1_shard_00001926_processed.jsonl/37019
|
Weekly Update – 12/21/17
Hello, Internet!
A new week, a new post. Life moves on, and on, and on. Next week I’ll be on vacation for the holiday season, so I may or may not post. I’ll decide sometime next week. In either case, I’m currently planning to do some sort of larger End of 2017/Start of 2018 post in the next few weeks, as we move into the new year.
I think it might be a touch bittersweet, but nonetheless beneficial to take a look at the last year, and to look forward to a new year’s goals.
I picked it up just because it was in my stack, but I found The Fifth Season by N.K. Jemison to be a much more engaging, interesting read than I’d expected. Suppose I should have had higher expectations than I did – considering it did win the Hugo – but the whole premise of writing in 2nd person always feels very sketchy.
Ultimately, Jemison built a fascinating world with a few interesting characters, a few cardboard cutouts. She crafted a deeply diverse cast (and I presume intentionally, given her academic interests stated in the bio and online), but at times it felt like artifice, like “Oh, I should have a gay character” – or white or black or transgender or whatever label fits – “so here’s a character for the sake of representation.” Perhaps it’s just my taste, but as usual, trying to mix social politics and literature felt clumsy to me.
But, to re-emphasize, the worldbuilding is really, really good. The world of the Stillness is probably one of my favorite takes on the post-apocalyptic. Or, perhaps plain ol’ apocalyptic.
The world’s premise is that there is one continent, and the planet is dying. The two continental plates grind together, creating constant tectonic disasters. Some lead to an extended winter, known as a “Fifth Season.” Some people have power to interact with the Stillness, to calm it or exacerbate it. Basically, the planet’s trying to kill everyone, but is doing it very slowly.
The way the Stillness is designed is a very good example of political thought within fantasy (particularly when juxtaposed with Jemisin’s lackluster characterization). It’s clearly meant to be a far, far-distant future Earth, or Earth-facsimile, one in which humans have nearly destroyed their planet. I found this theme to be a subtle, constant undercurrent throughout the novel; present, but not in-your-face. In my opinion, that’s generally the best way to intermix political thought and literature – sneakily.
I think The Fifth Season is worth reading. It would probably make my list of books all fantasy writers should read, even if in the end I’m not convinced it’s a “great book.” It experiments a lot with the genre, and I find that highly commendable. I’m curious, though, why it won the Hugo (and may go look up on that note) since it ends with a massive cliffhanger. The sort that makes me think Jemisin’s trilogy was originally one book, and just clipped off at this point.
In my opinion, that’s a cardinal sin lurking at the end of an otherwise decent novel.
Most of my writing time has been devoured in fiddling with worldbuilding and prewriting for Jiharel. Currently, I’m working with religions and mythology – and with deciding where the stories shared by the people are true, and where they are false. I’m focusing on one ethnicity, the Jihari (which is the people from which my main characters come) and expanding from there.
At present, I have some rough lines written of an in-world religious piece, The Songs of the Nine. I’m currently conceiving of it as nine cantos, each dedicated to one of the nine gods (who are in turn organized into three thematic groupings). I don’t know if I’ll write a full version of the Songs, or if they’ll just be a structural piece in the background. At the very least, I’d like to have extensive chunks of it written.
The lines written so far are from the first canto, First Dragon’s Song. It feels a bit like a fantasy-flavored blending of Genesis and the Gospel of John, to me. There’s also a lot of Plato undergirding the metaphysics of this world, and I suspect it shows. Ancient Greek culture and religion is going to peek in pretty heavily throughout. The real question is if I’m going to go into full Tolkien mode and create too much world, without ever getting to a solid version of the story.
In Review:
Last Week: Just get things done. I feel like I’ve been successful at this, but in hindsight that’s a terrible goal. Good goals ought to be specific, not just “do things!”
This Week: That being said, I’m not setting a goal this week. I’ll be traveling for the holidays and while I suspect I’ll keep chipping away at notes and such – because I do enjoy working on my world(s) and story(s) – I feel like there’s no great need to plan an obligation for myself.
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/37024
|
Wednesday, August 13, 2014
Ready To Love Again Blog Tour: Day in The Life of Chase
So today I have the Ready To Love Again blog tour stopping here. The Author Annalyse Knight has written a beautiful book and I can't wait to share my thoughts of it with all of you, but first we have a great guest post. Day in the life of Chase, one of the great characters from this book. Let's get to know more about Chase and his life.
Chase waved one last time as his mother drove away with Liz, Tony and Shawn for the day. He loved his kids, but hed been looking forward to this day for a week. He finally had a few hours of uninterrupted time with Katie before he had to go to work, and she had requested a beach date. When she showed up with her little bikini and a sarong tied around her waist, it took every ounce of willpower Chase had not to turn into a Neanderthal, sling her over his shoulder, and carry her to his room. Instead, he led her to the living room and pulled her into his lap.
I thought we were going to the beach? she said with a raised eyebrow. Chase buried his face in her neck and nipped at the tender flesh below her ear.
We are, but we have the house completely to ourselves and I thought . . . He trailed off, letting her draw her own conclusion. Gooseflesh pimpled on her arms and he smiled to himself as her fingers wound into his hair and she tugged his mouth to hers. She gasped against his mouth as he pulled her closer until she straddled his hips.
Mmmmmm, Chase.
He loved it when she said his name in a throaty whisper. Tired of waiting, he stood with her and pulled her legs securely around his waist. She hooked her ankles together while his hands slid up her thighs. Their lips crushed together as he went for the stairs.
Chase, she whispered, pulling away and looking down at him. Chase grunted in response while his lips tried to seek hers again. She pulled further away and he growled at her teasing. I really want to watch you surf.
He knew from the tone in her voice that she was determined to get her way and any hanky-panky he had in mind was going to take some convincing. Chase carried her up to his room, hoping the sight of his bed would give her second thoughts of halting where he hoped this was headed.
He laid her gently on the bed and then hovered over her with both elbows on either side of her shoulders. He hoped he had enough of an advantage to change her mind as he leaned down and pulled her bottom lip between his. Her fingers went to his back and she pulled his shirt over his head.
Woohoo! Shes giving in.
Are you going to surf in these shorts? She pulled at the waistband to his cargo shorts.
What? Surf? All plans of surfing had flown out of his mind when she sauntered into his house in her bikini. He shook his head and continued to kiss a trail down her neck until he reached her collarbone.
Then dont you think you should get your wetsuit on?
Chase stopped his kisses and looked up at her with pleading eyes. You want to watch me surf now? he asked, hoping that her answer would be no. Her breathing had picked up and her skin was slightly flushed so he knew she was having a hard a time resisting. The knowledge made him feel a little more powerful so he went back to trailing kisses down her shoulder. She sucked in a breath and he smiled to himself.
Almost there.
Her hands were quickly on his shoulders as she gave a small push. You are terrible, she said with a laugh.
Chase groaned as he rolled onto his back. Katie, he whined, sounding like a five-year-old who didnt get a treat while in the grocery store. He rolled onto his side and looked down at her. Her large green eyes stared back up at him and he felt the desire rolling off her. He didnt understand.
Did I do something wrong? His hand went to caress her cheek and she shyly looked away and shook her head.
No, you didnt do anything wrong, she whispered. He gripped her chin between his fingers and brought her face back to his.
Then whats the matter?
She closed her eyes and slowly took a deep breath before her eyes opened. I havent stopped thinking about how hot you are when youre surfing, she said.
That wasnt at all what he expected. Was his sweet Katie having dirty thoughts about him and his surfboard? A lopsided smile started to form on Chases face as he thought about that possibility.
Youve been having naughty fantasies about me surfing? he asked, trying to clarify. She looked down and bit her lip before she met his gaze again and nodded. Chase groaned and flopped over onto his back. Well then, lets not make you wait any longer. Even though it was hard to leave her, half-naked and in his bed, he found the strength to get up and make his way to the bathroom to change into his wetsuit.
He held out his hand when he emerged and Katie quickly scurried off the bed. She placed her hand on his chest and her fingers trailed over the neoprene suit.
Ive always been curious as to what you wear under this, she said in a seductive whisper.
He groaned and shook his head as he grasped her hand and led her back downstairs. He needed to get her out of that room or to hell with surfing. Between all of the kisses and teasing that had gone on before they made it to the beach, Chase was ready to cool off in the ocean anyway.
Katie set up a large blanket and pulled off her sarong before situating herself on the beach. He kept his eyes trained on the breaking surf and resolved that he was going to do his best to make her little surfer fantasy become a reality. Before the desire won to curl up with her on the beach, he leaned down, kissed her quickly, grabbed his board, and headed toward the surf.
He usually spent his time on the outside of the breaks, away from the surfers competing for the best waves. Surfing was more relaxing to him than thrill seeking, so he usually let the hotshots go first, but not today. Katie had picked a spot on the beach that was right in front of where the majority of surfers rode. Chase wanted to make sure she got a view of her fantasy coming to fruition.
Paddling out, he grasped the board and dipped it under a wave as it started to crash down. Under the water, all sound was replaced by the peaceful silence, until he popped back up and shook the hair out of his eyes. He passed the break and turned his board, waiting for the next wave.
Turning his board, he waited until he saw a decent wave coming then paddled with all his strength until it picked up his board and sent it sailing forward. Chase grasped the edges and stood up. His feet gripped the surfboard and he cut it sharp until he rode to the top of the wave and then dipped back downward to catch some speed. He zigzagged back and forth against the strong push of the water until it slowly died down and he sank back onto his board. Happy with his ride, he made his way back out until he was among several other surfers talking with each other.
Hey man, did you see the hottie on the beach? one of them called out to him. Chase glanced over at him and then back at the beach. Katie was the only girl he could have been referring to and Chase felt a small smile pull at his lips before he turned back to him.
Yeah, shes a beauty, he said.
Shes definitely doable, the surfer commented.
A low growl caught in Chases throat as he squinted against the sun to get a better look at the ass who eyed his girl. He was young, maybe early twenties, with dark hair and Chase had to admit he was a good-looking guy despite his crass attitude.
Ah, this ones mine, the surfer yelled before he started paddling. Chase watched him as he easily stood up and got tricky with his moves. One of his friends chuckled as the surfer attempted to launch himself off the back of the wave and ended up falling off his board.
Wipeout, dude! His buddy laughed while the idiot climbed back on his board with a huge grin and a thumbs-up before he paddled for shore.
Good riddance, Chase muttered under his breath. He spent the next few minutes watching the break and consistency of the waves as they rolled in, letting the others take the smaller ones. He saw a wave building and knew it was the one hed been waiting for. He paddled toward the shore and jumped up when the wave caught the board. With a determination he hadnt felt in a long time, he bounced across the water, trying to build up speed. He skated across the wave and then cut toward it. When he reached the top, he swiveled his hips quickly, snapping the surfboard back around until he had done a complete 360. Slightly stunned that he had done it, he passed a surfer sitting on his board who pumped his fist.
Yeah man! That rocked!
A huge grin took over Chases face as he neared the end of the wave. Sinking back down onto his board, he glanced up, searching for Katie on the beach. She was sitting up with her hand shielding the sun as she watched Chase. The surfer from earlier sat in the sand next to her.
Chase set his jaw and pushed himself to paddle as quickly as he could to shore. When he strolled up the beach, Katie was turned slightly toward the surfer. He said something that made her throw her head back and laugh. Chase tried to play it cool, but he was fuming inside because he knew what the little twerp was trying to do. He laid his board down next to the blanket and she looked up at him and smiled. The surfer next to her scowled when her attention went to Chase.
Hey, babe, he greeted. Chase grasped the string in the back of his wetsuit and pulled the zipper down, peeling it off his shoulders until it hung off his waist. Whos your friend? he asked, nodding to the idiot.
Oh, this is Joshua, she said, immediately dismissing the jerk next to her. He was pretty impressed with your trick out there, she said with a big smile. Chase cocked an eyebrow at the surfer and received a glare in return. Chase leaned down, took Katie by the hand, and pulled her up until she was in his arms. Chase, what are you—”
He silenced her with a kiss. She sank into his arms, giving up on any kind of protest she may have considered. Her hand went into his hair and she tugged it, causing him to groan into her mouth. He broke the kiss and looked over at her admirer. He just rolled his eyes and shook his head.
Katie recovered from his attack and smacked him on the chest. She turned to face Joshua and began to apologize for Chases rude behavior. He smirked and Chase watched as his eyes raked down her body, stopping for a moment on her chest. Chase picked up his surfboard and held it under one arm while he dipped under Katies arm and lifted her onto his shoulder. She let out a little squeal and kicked her feet.
Chase ODonnell. Put. Me. Down, she demanded with a laugh. Chase turned quickly, clocking the guy that was eyeing his girlfriend, with his surfboard. The surfer let out a howl of pain and Chase couldnt help the smirk that played at his lips.
Sorry about that, dude, he said over his shoulder as he darted up the beach with Katie over his shoulder.
Im going to let you have it when you put me down, Katie said.
Chase propped the surfboard against the fence when he entered the patio and then walked into the house.
You can put me down, Mister Caveman. I think that youve proven your point, Katie said with mock annoyance. Chase chuckled and smacked her on the rear as he headed straight for the stairs. She let out another squeal and he smiled as he threw open his bedroom door and tossed her on the bed.
She bit her bottom lip and he could see she was holding back a smile but didnt want to give up her annoyed facade. That was so rude. I cant believe you did that. She crossed her arms over her chest and looked away. Chase couldnt help but think how beautiful she was when she was flushed. Her hair spilled across the crisp, white sheets of his bed and her skin held a slight tinge of pink. Whether that was from the sun or from the desire she was holding back remained to be seen.
Do you still want to know what I have on underneath the suit? Chase asked. Her face snapped back toward him and she nodded, her gaze traveling down his chest and then back up to his eyes. He laughed, but it immediately faded when he heard the vibration from his pager.
No! Katie sighed, rolled over, and buried her face in the pillow. Chase took a disappointed breath and released it slowly as he went for the pager on his dresser. They had been together long enough that she knew when the hospital called there wasnt anything he could do.
Please dont be 911.
Chase looked at the pager and sighed when he saw the emergency code he couldnt ignore.
Im sorry, love.
She looked up from the pillow. Im going to stay in this bed until you leave or you wont make it out of the house.
He groaned and nodded. Thats probably a good idea.
Thank you so much Annalyse and Chase for spending the day with us and for sharing a bit of your life with us as well. Next up my thoughts on Ready to Love Again.
Related Posts Plugin for WordPress, Blogger...
This Blog is Protected.. registered & protected
Get your own free Blogoversary button!
My Beautiful Blog was Designed by...
Ali's Bookshelf © 2011-present
|
global_01_local_1_shard_00001926_processed.jsonl/37035
|
Sweetheart pins, wings, handkerchiefs, bracelets, and pillow covers are some of the gifts that military men bought for their girlfriends and wives. This tiny sterling-silver pin has a bar engraved with USAF and is attached by a chain to a miniature set of aviation wings. It was bought at the base exchange at Lackland AFB, Texas.
Write a Comment
Your email address will not be published.
Please check "I'm not a robot" before clicking Send.
|
global_01_local_1_shard_00001926_processed.jsonl/37036
|
Eleutherodactylus jasperi
Golden Coquí, Coquí Dorado
Subgenus: Eleutherodactylus
family: Eleutherodactylidae
subfamily: Eleutherodactylinae
Conservation Status (definitions)
IUCN (Red List) Status Critically Endangered (CR)
Other International Status None
National Status None
Regional Status None
View distribution map using BerkeleyMapper.
Eleutherodactylus jasperi is a relatively small frog with adults reaching 22.4 mm in snout-vent length. Males and females are the same size. This frog has a bluntly rounded snout which is almost truncate when viewed from above, and an indistinct canthus rostralis. The tympanum is indistinct. Prevomerine teeth are lacking. The digits have only vestigial webbing and are moderately long with rounded terminal discs. Subarticular tubercles are prominent but metatarsal tubercles are absent. Palmar tubercles are small but distinct. The dorsum is shagreened (with small bumps), with well-developed subdermal glands on the flanks and the posterior surfaces of the thighs. The venter is areolate in texture. Dorsally, the color is a uniform olive-gold to yellow-gold. If the frog is disturbed, the color may pale. Ventrally, the coloration is pale yellow except for transparent abdominal skin. Few to no melanophores appear to be present on the ventral surfaces of the head and abdomen. The iris is pale gray with black speckles (Drewry and Jones, 1976).
Eleutherodactylus jasperi can be distinguished from other Eleutherodactylus in Puerto Rico by its golden ground color without dorsal patterning, by its translucent venter without dark pigmentation, and by the lack of prevomerine teeth (Drewry and Jones, 1976).
Distribution and Habitat
Country distribution from AmphibiaWeb's database: Puerto Rico
View distribution map using BerkeleyMapper.
The Golden Coquí occurs at an elevation of 650-850 m in Sierra de Cayey, in southern Puerto Rico. It inhabits arboreal bromeliads in subhumid forest, and is restricted to a small area (10 km in radius) with dense bromeliad growth. Although the bromeliad growth seems to be dependent on heavy dew from orographic uplift of air passing over the mountain range, the habitat itself is actually somewhat xeric and prone to fire damage (Drewry and Jones, 1976).
Life History, Abundance, Activity, and Special Behaviors
This is a nocturnal species, and found only in bromeliads of the genera Guzmania, Hohenbergia, and Vriesia. Eleutherodactylus jasperi tend to occur mainly in clusters of bromeliads rather than isolated plants, implying that this species prefers to disperse over short distances. Inhabited bromeliad clusters were found on the ground, on trees, on large boulders, and on cliffsides (Drewry and Jones, 1976).
During the mating season, males give off a call that sounds like "tuit-tuit-tuit-tuit" (Duellman, 2003). A single call sequence lasts for between ten seconds and two minutes. The first call of the sequence has one to two notes, with successive calls increasing up to a maximum of four to six notes, and maintaining at that maximum number until the end of the call sequence. Notes have approximately the same duration. They consist of relatively pure tones of about 5 kHz. The advertisement calls seem to be the same as territorial calls, as there was no difference between calls made by solitary calling males and those given by multiple males placed together in a single collecting bag. Males placed together in a bag alternately called and engaged in biting each other (Drewry and Jones, 1976).
Call sequences are somewhat synchronized between neighboring males. Eleutherodactylus jasperi is more difficult to distinguish in a multi-species chorus, as it makes somewhat softer calls than other frog species in the same habitat. However, it calls throughout the night, unlike other species which subside between midnight and dawn (Drewry and Jones, 1976).
Eleutherodactylus jasperi is ovoviviparous. It is the only live-bearing species in the genus Eleutherodactylus and family Leptodactylidae, and thus presumably also the only species in that genus and family to have internal fertilization. The only other species of frogs known to retain developing embryos within the oviducts are in the genus Nectophrynoides, in the family Bufonidae (Wake, 1978).
Gravid females have been collected between April and August, containing three to six mature eggs (Drewry and Jones, 1976). Mature eggs are large, 3.3 to 5 mm in diameter (Drewry and Jones, 1976; Wake, 1978). Once fertilized, eggs are retained within a chamber, essentially a uterus, formed of fused portions of the oviducts (Wake, 1978). The embryos take about a month to develop (Drewry and Jones, 1976). As is characteristic of other species with direct development, Eleutherodactylus jasperi embryos have poorly developed mouthparts, lacking denticles and adhesive organs (Wake, 1978). The larval spiracle and external gills are present but transitory, and rates of development are also modified (Wake, 1978). Approximately thirty-three days after amplexus, three to five tiny, fully metamorphosed froglets are born (Drewry and Jones, 1976). The froglets of this species have a small egg tooth and a large, thin, highly vascularized fan-like tail (Wake, 1978). The tail may function in intra-oviducal gaseous exchange (Wake, 1978). The source of nutrition for developing embryos appears to be egg yolk and not maternal secretions, as there is no evidence of a placenta or maternal secretions, and unresorbed yolk is still present in froglets after birth (Wake, 1978). Thus E. jasperi is classified as ovoviviparous, and not viviparous.
Females may reproduce more than once a year, since dissected females had two visible size classes of eggs within the ovaries (Wake, 1978). Although gravid females were collected between April and August, Wake (1978) noted that year-round collections had not been done. Thus it is not known whether reproduction in this species is seasonal or if it occurs throughout the year.
Subadults have been found in the same plant with females, implying that dispersal does not occur until the juvenile is older (Drewry and Jones, 1976).
This species preys mostly on small arthropods (Duellman, 2003).
Trends and Threats
Eleutherodactylus jasperi, the Golden Coqui, is presumed to be extinct. It has not been seen since 1981, despite searches since then (Moreno, 1991; Burrowes et al., 2004).
Possible reasons for amphibian decline
General habitat alteration and loss
Subtle changes to necessary specialized habitat
The chromosome number of Eleutherodactylus jasperi is 2n = 26 (Drewry and Jones, 1976).
This species was first described by Drewry and Jones (1976). It was named for one of the collectors of the holotype, Dr. Jasper J. Loftus-Hills, of New Victoria, Australia. Dr. Loftus-Hills passed away in 1974 at the age of 28 from an automobile accident. (Drewry and Jones, 1976).
Burrowes, P. A., Joglar, R. L., and Green, D. E. (2004). ''Potential causes for amphibian declines in Puerto Rico.'' Herpetologica, 60, 141-154.
Drewry, G. E., and Jones, K. L. (1976). ''A new ovoviviparous frog, Eleutherodactylus jasperi (Amphibia, Anura, Leptodactylidae) from Puerto Rico.'' Journal of Herpetology, 10(3), 161-165.
Duellman, W. E. (2003). ''Golden coqui, Eleutherodactylus jasperi.'' Grzimek's Animal Life Encyclopedia, Volume 6, Amphibians. 2nd edition. M. Hutchins, W. E. Duellman, and N. Schlager, eds., Gale Group, Farmington Hills, Michigan.
Moreno, J. A. (1991). ''Status survey of the Golden Coqui, Eleutherodactylus jasperi.'' Status y Distribución de los Anfibios y Reptiles de Puerto Rico, Publicación Científica Miscelaneous No. 1. J.A. Moreno, eds., Departamento de Recursos Naturales, San Juan, Puerto Rico, 37-41.
Wake, M. H. (1978). ''The reproductive biology of Eleutherodactylus jasperi (Amphibia, Anura, Leptodactylidae, with comments on the evolution of live-bearing systems.'' Journal of Herpetology, 12(2), 121-133.
Written by Kellie Whittaker, Peera Chantasirivisal (biologist AT, UC Berkeley
First submitted 2005-11-10
Edited by Kellie Whittaker (2008-11-14)
Species Account Citation: AmphibiaWeb 2008 Eleutherodactylus jasperi: Golden Coquí <> University of California, Berkeley, CA, USA. Accessed Dec 15, 2018.
Feedback or comments about this page.
AmphibiaWeb's policy on data use.
|
global_01_local_1_shard_00001926_processed.jsonl/37040
|
USA – maturitní otázka z angličtiny (3)
Otázka: USA
Jazyk: Angličtina
Přidal(a): Dara
Geography and population
The United states of America – the richest and one of the biggest countries in the world – has several names. People say The United states, The States, America or just the USA or the US. There are 50 states in the USA and over 250 million people live in them. The capital of the USA is Washington, D.C.
The USA are situated in southern part of North America. Its neighbours are Canada in the north, Mexico in the south and Russia in Alaska. Central plains are bounded by the Rocky Mountains and the Coastal Mountains to west, the Appalachian Mountains to east and alluvial plains around the Gulf of Mexico. The highest mountain in the USA is Mount McKinley in the Alaska Range which is 6 l94 m high. The largest rivers are the Mississippi and the Missouri. It is the third longest river system in the world after the Amazon and the Nile. The border with Canada is in its central part made by the Great Lakes Region. Lakes Superior, Huron, Erie and Ontario share the USA with Canada. Lake Superior is the second largest lake in the world. In respect of climatic and other natural conditions, the USA is quite variable. Every part of the country is different from Alaska in the north, covered with snow and ice, to tropical Florida in the south. In the USA we can find industrial areas (especially the cities of Chicago and Detroit) and other big cities (Boston, New York, Washington, Philadelphia) but also farmlands (Mid-West, Ohio, Indiana and Wisconsin) and deserts (the great deserts of Nevada and Arizona). Near Los Angeles, California’s largest city, is Hollywood, where film-stars have their homes.
In the USA there are many different minorities, e.g. African-American, Asian, Eskimo, Chinese, Italian, Spanish, Arabic, Polish, Swedish, Japanese etc. and each of them has its own culture which always differs a bit from the other one. This means a great contribution to American culture.
Examples of animals that live in the USA are cattle, horses, seals, salmons, pumas, alligators and so on.
Christopher Columbus discovered America in 1492 and met the native Americans (Indians) there. Settlement by Europeans was slow, and at first only Spanish explorers showed any interest.
The first English colony was founded in Virginia in 1607. In November 1620, the small ship Mayflower brought a group of English Puritans, who had left England to avoid persecution after their conflict with James I and his Church, to Massachusetts. They landed near present day Boston, at a place which they called Plymouth. Half of them died of starvation or epidemics during the first winter. Those who survived celebrated their first harvest with a feast of thanksgiving. Within the next few years the Pilgrim Fathers were followed by thousands of other settlers: English, Dutch, Irish and French. They called their new home New England. Wars between Britain and France, who both had colonies here, lasted for many years and cost Britain great sums of money. The British government continually raised the taxies on the colonies, but in the end it caused rebellion: in 1773, North Americans, dressed as Indians, emptied chests of British tea into the waters of Boston harbour. This Boston Tea Party marked the beginning of the War of Independence (1775-1783).On July 4, 1776, the representatives of the original thirteen colonies adopted the Declaration of Independence, which established the United States of America. The author of this document was Thomas Jefferson. Britain recognised the USA in 1783. In 1788, the American Constitution was adopted and the following year George Washington was elected the first President of the United States.
In the 19th century, more than 10 million new settlers arrived from Europe. Nearly all of them settled in the North, where industry was developing rapidly. The South was agricultural and there was slavery, which the Northerners did not like. They wanted to abolish it, but the Southerners did not agree. This disagreement on the slavery question led to the Civil War between the South and the North (1861-1865). The north won the war. In 1863, President Lincoln gave the slaves freedom by the Emancipation Proclamation. But the problem of slavery was not solved by it and continued. More steps had to be made and the most difficult thing was to change especially white people´s minds and attitudes towards former slaves or black Americans.
In the 20th century, immigration continued. America has become the “melting pot” of nations and it is often called “a nation of immigrants”.
Political system
The USA is a federation consisting of fifty states.
The Constitution went into effect in March l789. Some new parts were added over the years but the political system created by the Constitution is basically the same today as it was in l790. This document gave the USA the principle of a balance power divided into three branches – legislative (Congress), executive (President) and judicial (Supreme Court).
The American President is one of the most powerful men in the world. He can make war, or peace. He can touch the lives of millions in many different countries. But the President cannot do just what he wants. Congress must agree first. In some ways, the United States is like fifty small countries and not one large one. Every state has its own governor, its own police, and its own laws. The government of the whole country (the federal government) works from Washington, the capital. This is where Congress is based. Congress is the supreme law-making body in the country. It has two parts, the Senate, and the House of Representatives. There are l00 members of the Senate (Senators), two from each state. The President cannot act without the Senate’s agreement. The House of Representatives has 435 members. Like the senators, they can make new laws. Americans choose a new President every four years. The election is a great occasion. It is a serious business, of course, but the Americans make sure that it is fun too. In America, the President is the Head of the State. He makes the most important decisions and chooses the members of his cabinet who will help him to govern the country. The President also represents the United States on official occasions. He receives ambassadors from other countries, gives parties for important visitors from abroad, and takes the first place in any national ceremony. The Supreme Court is the main instrument of the federal judiciary.
The main political parties in the USA are the Democratic Party and the Republican Party. When members of a political party form a majority in the Congress, they have great power to decide what kinds of laws will be passed.
The American flag and anthem
The American flag consists of two parts – one smaller blue oblong with 50 white stars symbolising 50 American states and one larger oblong consisting of 6 white and 7 red stripes symbolising the original 13 states which used to be the British colonies. The flag is sometimes called “Old Glory” or “Stars and Stripes”. The first US flag was created in 1776. The American anthem, “The Star-Spangled Banner”, was written in 1814.
The main industrial items are manufacturing, steel, car industry, electronics, machinery, clothing. Nearly half of the country is a farmland, however only 2l per cent is arable. The main agriculture products are corn, soya beans, wheat, cotton, tobacco, cattle breeding, fruit and vegetables. The USA is rich in the following mineral resources: coal, copper, lead, uranium, gold, iron, mercury, oil. The main trading partners are Canada, Japan, Mexico and Great Britain.
The main language spoken here is American English but various ethnic minorities speak their original languages (Chinese, Spanish etc.). American English differs from British English in vocabulary, pronunciation and spelling (US spelling is simpler, e.g. “color, harbor, program”).
Here are some vocabulary differences:
tube, underground
chap, fellow
ground floor
kluk, chlápek
nákl. auto
first floor
Questions on the text:
1. What is the geographic location of the USA? How many states does the USA consist of?
2. What important mountains, rivers, lakes and deserts would you find in the USA?
3. What important industrial cities are there?
4. What important American resources can you mention?
5. When was the USA discovered and what was the history of the USA?
6. Who was the first President of the USA?
7. What can you say about the slavery problem in the USA?
8. What kind of political system operates in the USA? – What can you say about the Constitution, the American President, Congress and the Supreme Court?
9. What are the main political parties in the USA?
10. Describe the American flag. How is it called? What is the name of the American anthem?
11. Can you mention some language differences between British and American English?
to be bounded by – hraničit s
alluvial – naplavený
to share – dělit se
to mine – dolovat; mine – důl
shore -břeh, pobřeží
to found – založit
persecution – pronásledování
starvation – (vy)hladovění
feast – svátek, slavnost, oslava, hostina
continually – nepřetržitě, neustále
rebellion – povstání, vzpoura
to empty – vyprázdnit, vysypat
chest – bedna
harbour – přístav
establish – založit, zřídit, ustanovit
to recognize – uznat; poznat
constitution – ústava
to adopt – přijmout
settler – osadník
rapidly – rychle, prudce
slavery – otroctví
to abolish – zrušit
proclamation – prohlášení
former – dřívější, někdejší, minulý
melt – tát, roztavit, rozplynout se
pot – hrnek, džbán, kotlík, nádoba
come into effect – vstoupit v paltnost
legislative – zákonodárný
executive – výkonný, výkonná moc
judicial – soudní
act – jednat, pracovat, působit; hrát, předstírat
election – volba, volby
ceremony – obřad, slavnost
ambassador – velvyslanec
to pass a law – vydat zákon
oblong – obdélník; podlouhlý obdélný
stripe – pruh
Star Spangled Banner – hvězdami posázený prapor
arable – orná (půda)
cattle breeding – chov dobytka
corn – obilí
wheat – pšenice
copper – měď
lead – olovo
iron – železo
mercury – rtuť
oil – nafta
resources – zdroje
1. Where are the USA situated?
2. Name the most famous mountains.
3. The largest rivers are:
4. The Mississippi + the Missouri
5. The Columbia + the Colorado
6. The Rio Grande
7. When was the land discovered by Ch. Columbus?
8. Write down at least 3 examples of differences (in vocabulary) between British and American English: e.g. Br. E. SHOP – Am. E. STORE.
9. Who are the original inhabitants?
10. The English
11. American Indians
12. African Americans
13. What’s the name of the holiday firstly celebrated by the Pilgrim Fathers in 1621?
14. The first English colony in America was:
15. California
16. Florida
17. Virginia
18. The rebellion against high taxes imposed by Britain was called?
19. By whom was The Declaration of Independence written?
20. The first American President was:
21. Thomas Jefferson
22. George Washington
23. Abraham Lincoln
24. The Civil War was between:
25. The English and the Americans
26. East and west
27. North and south
28. Name 5 states of the USA.
Stáhnout práci v PDF Upozornit na chybu
Učebnice k maturitě Maturitní kurzy
Učebnice k VŠ přijímačkám Kurzy na přijímačky
Další podobné materiály na webu:
|
global_01_local_1_shard_00001926_processed.jsonl/37066
|
Milking Bombs (Lactation Aid Cookies)
Leave a comment Standard
For a pure breastfeeding mommy like me, my worry is:
Do I have or will I have enough milk?
Aside from the law of Supply and Demand, it doesn’t hurt to take some help to increase or stabilise your supply of breastmilk. I am into trying a LOT of these lactation cookies, one of the cookies I’ve tried is from Milking Bombs by Bettina Carlos. I was super intrigued by this cookies since it has a tagline of “Guaranteed let down in 30 minutes”.
That sounded good to me so I bought it online from their instagram account @milkingbombsbyabc the same day I’ve heard about it. I’ve received it in a few days, depends on when you order and where you are located. They specify which days of the week they deliver to your location.
I’ve ordered their Classic Milking Bombs (the one I’m holding in the picture), Crink oats and Choc-nut brownies. They were all delicious, plus, they claim that their products are rich in fiber, omega 3, B complex and other essential nutrients.
I ate all three kinds. Not the whole box, mind you. One of each kind, then I’ve waited for 20 minutes before letting Lowe latch unto my breast.
That feeling of mild pins and needles on my breast came after 10-15 minutes of latching, so the let down tagline was true. 😂
I’ve no idea if my supply went up or not, as I do not pump regularly so I couldn’t show any visible results of my milk supply, but I can show you the result:
One happy and healthy baby Lowe!
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/37078
|
jump to navigation
IBM Websphere Portal is Web 0.5 February 26, 2008
Posted by Tomas in IBM Webspehere.
1 comment so far
One of the selling Websphere Portal features is the integrated MVC framework – Struts. Websphere Portal uses modified Struts 1.1 Framework. Not only modifications are buggy, but it is ancient! Struts 1.1 was released on 29th of June 2003. This is Web 0.5 technology, the rest of the world have moved on but Websphere portal stayed behind.
No to mention that Webshpere portal runs on modified (why would you do that?) 1.4 jdk. This complicates things a lot. No modern tools can be used for development or troubleshooting. We tried to profile the slowness using Netbeans and struggled. Old JDK version would not allow us to use native java debugging capabilities and modified JVM crashes because of class versioning.
So if you can use tomcat or something based on it and stay away form Websphere Portal.
|
global_01_local_1_shard_00001926_processed.jsonl/37105
|
Two days ago my wallet at was hacked, everything was taken (760 coins).
Besides the password I use Google two step verification. I also use this on the gmail that I use to authorise computers, anybody knows how this could have happened?
I backed up my wallet to Google Drive.
Could you be more specific on which 2 way authentication you used? What where the exact steps so we can rebuild the scenario or at least understand what happened exactly.
If it was email by gmail consider the machines you used the gmail on as compromised. Most probably all login forms on this machines have been grabbed.
• 1
I used the Google 2-Step authentication. – Bastiaan Quast May 19 '13 at 8:07
From this link:
Is it possible that you had authorized the computer the transaction was initiated from? This would match the idea that the computer was/is compromised. With a remote control tool an attacker eventually was able to login over this pc and make the transaction through remote control desktop.
If this is true, consider all actions taken on this computer as logged.
• yes I considered this, I authorized two computers, one ubuntu gnome 13.04, and a chromebook. Also a rooted S3 running CM10.1. – Bastiaan Quast May 20 '13 at 9:34
• ah and as can be seen from the link, the command originated from somewhere near Ghana, I am in Geneva. – Bastiaan Quast May 20 '13 at 9:35
• 1
Well, id contact asap to get more precise information. Beside that, there might be a slim chance the intruder has still the bot/trojan running (bots usually dont have remote control, my bet it was a trojan), in best case the intruder did not use a proxy, in worst case he had a multi proxy environment. Anyway, id monitor the traffic from the compomised machine in hope to get an ip where this bot connects to. Maybe from there this is the place to go. On popular hackforums are also articles about tracing down trojan owners. – Aurigae May 20 '13 at 11:48
• 1
The map showing a location 'somewhere near Ghana' is just showing latitude 0, longitude 0, so it's very unlikely that the request was actually from there. – kybernetikos Jun 11 '13 at 0:00
Your Answer
|
global_01_local_1_shard_00001926_processed.jsonl/37113
|
Under the Hood Part 1: RequireJS and AngularJS
Posted: December 29th, 2015Author: and
In the “ under the Hood” series, we’ll be explaining in detail how works. We hope that this information will give you a deeper insight into how to make better apps by giving you a deeper understanding of the platform.
Loading resources when needed
When developing big scalable web apps, the question of how to manage tons of libraries and services arises pretty quickly. There are a few key reason why a powerful and flexible dependency management tool becomes mandatory:
• The vast majority of libraries dictate their own requirements for dependencies. This makes it critically important to load and launch resources in the appropriate order
• Loading all the libraries and other resources at once increases network traffic and should be avoided when possible. This is even more important for mobile apps
• App loading time can be significantly decreased when loading only the required libraries:
• A ready event will be fired only once for all the required resources
• For mobile devices and apps, page size can be optimized as much as possible to prevent browser or OS failures
• Overloading the device CPU by loading unnecessary libraries will decrease battery life
• The bigger the development team, the more complicated library dependency management becomes
This is why has chosen RequireJS to solve the cumbersome process of dependency management. Let’s see how RequireJS is used in apps.
RequireJS implements an AMD (Asynchronous Module Definition) approach and allows the declarative description of dependencies among app modules. RequireJS also guarantees that all module dependencies will be resolved before module execution. In the AMD pattern means each module has its own isolated variables area. This makes your app more stable by reducing the possibility of namespace conflicts.
AngularJS with RequireJS
AngularJS has its own built-in dependency manager, but without the option to asynchronously load external modules. This is done by RequireJS.
The first problem when trying to combine RequireJS and AngularJS in one app is that AngularJS doesn’t support RequireJS. This can be only partially resolved by selecting “not AMD modules support” in RequireJS.
App launch
When AngularJS is loaded in the page, it searches for a ng-app directive as an entry point and ignores everything outside of this tag. When ng-app tag is found, AngularJS starts to parse the whole DOM-tree, executing all found directives and expressions.
This approach doesn’t fit app development because of a really simple reason: when AngularJS is ready, other app dependencies such as libraries for external services, REST API services, and other resources will not be ready. As a result, there will be a lot of errors caused by references to not yet loaded modules.
Let’s look at this example:
In this example, an app module called app is loaded as well as angular and ui-bootstrap. AngularJS is also aware of the entry point and module name which will maintain this element. Up to this point, the app module is already loaded through the app dependency.
The app is launched.
Flicker effect during app launch
The structure above has a small but very undesirable problem. Expressions ({{…}}) processed by AngularJS are displayed in their raw (uncompiled) form while the application is loading. The expressions are compiled fast, but even one-tenth of a second will be visible to the user and will make the UI flicker.
AngularJS provides ng-cloak directive that hides not yet compiled templates until the app loaded. But in the case of RequireJS, it’s not enough, because AngularJS itself can be loaded at the very end. In app, AngularJS is loaded using a simple script tag which is the very first tag on the page. This way we can be sure that AngularJS will be loaded even before CSS styles and RequiresJS. Therefore, all the expressions will be compiled as quickly as possible.
Here is an example of such a page:
To prevent AngularJS from being loaded twice by RequireJS, this module was intentionally defined before the first call:
This way we can ensure that all uncompiled UI will be hidden as quickly as possible and that all the required resources will be loaded and ready the moment they are needed.
In the next installment of the “ under the Hood” series, we’ll cover global app dependencies.
|
global_01_local_1_shard_00001926_processed.jsonl/37125
|
The Signal messenger recently incorporated an interesting mechanism to circumvent censorship in some troubled countries, such as Egypt or the UAE. The technique called domain fronting uses popular cloud services like the ones from Google or Amazon as a middle man to route all traffic. You can read more on that on the Signal creators' blog or see the original paper.
During my security analysis of the Telegram IM (full text available here) I've discovered Telegram obfuscates its traffic by re-encrypting everything with a prepended key. When I've prompted the Telegram Security team for comments, they responded that this measure is used to "counter some of the less sophisticated attempts at banning our service in certain countries". MTProto has a fixed structure where the auth_key_id value is always present at the beginning of the packet and therefore easily recognizable.
Let's have a look how the official Telegram for Android application obfuscates the traffic and why this is quite a naive idea.
When I started the analysis I wanted to check the network traffic Telegram produces. I've expected the data to correspond with the official documentation and to be in a form of:
I've extracted my own auth_key_id and I expected to see it amongst the sniffed data. However, the whole traffic seemed random and therefore likely encrypted, and no sign of the expected structure was present.
I've examined the code and after a few weeks of pain and despair I've discovered that the function responsible for this behavior is the Connection::sendData function. Before sending the data in the expected manner, Telegram encrypts them one more time with a random key attached in front of the data. Interestingly, the Counter block mode is used instead of the IGE endorsed by Telegram.
Technical details
To properly explain the obfuscation method I need to introduce my own terminology first to add a little more clarity because Telegram does not practise a great job in naming variables. Since the variables are explained in more detail in the following sections, reader may skip this list and use it as a reference later on.
• obf_enc_key_bytes 64 random bytes storing obf_enc_key and obf_enc_iv used for obfuscation. Telegram calls this simply bytes.
• obf_enc_key The key used for encryption to obfuscate data.
• obf_enc_iv The IV used for encryption to obfuscate data.
• obf_dec_key_bytes 64 bytes derived from obf_enc_key_bytes storing the server's encryption key and IV. Labeled in Telegram as temp.
Temporary encryption keys
The obfuscation process starts by generating 64 random bytes obf_enc_key_bytes. The first 8 bytes are unused. Bytes 8 – 39 are used as an encryption key and bytes 40 – 55 as an IV. Bytes 56 – 63 are composed of the last 8 bytes of obf_enc_key_bytes encryption of itself. It is unclear what are those bytes used for. The final obf_enc_key_bytes to be sent:
The length of the packet, yet again encrypted, and the real data to be transmitted as expected from the official documentation are then AES-CTR encrypted using the obf_enc_key and obf_enc_iv, and sent. All the other data in this TCP stream are encrypted using the same obfuscation key. When another connection is established, a new obf_enc_key_bytes is generated and the process repeats itself.
Besides the obf_enc_key_bytes setup, the very same function deals with setting up the obf_dec_key_bytes. This temporary key is used for decrypting the incoming traffic.
The obf_dec_key_bytes is derived from the obf_enc_key_bytes. 48 bytes are reversed from obf_enc_key_bytes, starting at position 8. This may be seen in the code snippet below. The first 32 bytes are then used as a key and the next 16 bytes as an IV for the incoming traffic decryption.
for (int a = 0; a < 48; a++) {
obf_dec_key_bytes[a] = obf_enc_key_bytes[55 - a];
I believe Telegram server receives the obf_enc_key_bytes, tampers with them in a way described in this section and finally encrypts the response with obf_dec_key_bytes.
Deobfuscation program
As a part of the analysis I've written a simple C software, which removes the obfuscation. The program does not sniff the network data so you have to provide it with a file of sniffed data. I've used Wireshark to do this.
The program is also capable of describing the real MTProto traffic in case you use the master secret key auth_key as an argument. The key is obviously not available to an attacker rather this functionality is meant for study purposes if you want to examine what Telegram sends from your own device.
You may check it out on github. A readme file and an example is available there.
Why not TLS?
The obfuscation method is not officially documented, which makes sense if Telegram uses it to circumvent censorship. However, the reality of its functionality is doubtful at best. A more conventional approach would be much appreciated, such as the usage of SSL/TLS. If Telegram would use TLS, the traffic would then be indistinguishable from any other protocols using it, such as HTTPS.
Finishing on a personal note; I wasn't sure whether I should publish or not. Obviously, I don't want to make things easier for any oppressive regimes, on the other hand if a non-paid student can find this in a month or two does anyone actually believe the agencies can't or didn't already?
I came to a conclusion that I should publish these findings with a hope that Telegram might come up with a finer idea on how to do this or may get inspired by the Signal's technique.
|
global_01_local_1_shard_00001926_processed.jsonl/37130
|
Qualitative Code Differences in Managed Code
Qualitative Code Differences in Managed/Unmanaged Code
Intrinsic Runtime Features
“Optional” Features
JIT Compiler Limitations
Comments (23)
1. Adam says:
Exception Handling: They’re doing this because you (microsoft as a whole) told them initially this was the new way and that it was practically free.
In reality, its expensive and this advice was poor.
2. Matthew W. Jackson says:
I personally believe that the lack of inlining for Value Types is the biggest issue in current JIT performance. I think that Value Types in general need much more aggressive inlining than reference types. If performance were not an issue, nobody would be using Value Types in the first place.
Special-casing of generics for Value Types is great (at the cost of a bigger working set), but the lack of inling makes it difficult/unworthwhile to create efficient lightweight wrappers for other primitive types that add additional features (like say a wrapper for Int32 that restricted its values, or implemented a generic interface such as IArithmetic<T> for doing math in generics). It also adds penalties when creating new primitive-like types (such as a Complex number).
Personally, I think that there should be really aggressive inlining on overloaded operators, property accessors, and constructors defined for Value Types, even if it increases the initial cost of JITing a Value Type a bit.
Most programmers do not "see" the added cost of calling an overloaded operator, and the runtime (or maybe even the C# compiler) should work as hard as possible to inline them.
Even System.Decimal would benefit from such changes to the JIT, and it is very frequently used in business applications.
3. Stu Smith says:
With regards interop with unmanaged code, I wonder if you’d consider writing a post on suggestions for performance regarding crossing the managed/unmanaged boundary? We have a slight performance issue with the following, and I’m sure it must be a common scenario (even if not exactly the same).
We started our application (in C#) pretty much as soon as .NET 1.0 appeared. Front-end and business objects are written entirely in C#. We reused an in-house object/relational system that sits on top of the database, which we upgraded from straight C++. In the middle is an auto-generated data-access layer, with a pair of object/collection classes per table, and a pair of get/set methods per column. Business objects are stateless and only contain a reference to the data-acess object. These d/a methods have the form:
// MC++
Type Table::GetField()
// Type is ‘simple’: one of int, bool, System::String *, DateTime, etc.
Type value = m_pRow->GetValue( <fieldindex> ); // m_pRow is unmanaged.
GC::KeepAlive( this );
return value;
So obviously the interface is too ‘chatty’ but that’s hindsight and can’t be easily changed. How can we know if we’re making the cheapest possible call here (you mentioned argument conversion and security)?
I recently read about the improved NGEN in 2.0:
The article indicates that NGEN works by invoking the same underlying JIT compiler. But at install time, there isn’t the time constraint. Why can’t NGEN use a more agressive optimizer than the JIT’er?
5. Goran Pušić says:
On exceptions (first comment):
"In reality, its expensive and this advice was poor"
Not true. Exceptions have a cost, granted. But, the thing is, if they are used to actually handle errors (1/1000 rule from Rico’s other post), the cost is not important. Why? Well, because if you have an error, the amount of processing to do is normally MUCH less than what’s needed for normal operation (we write code to do stuff and not to handle errors, don’t we? BTW, that’s also why exceptions are good: they help us to have to write less code for error handling; that leaves us more time to write code that does stuff)
The important overhead, then, is the "static" one for exception handling init/cleanup. But, there, do not forget that you compare the compiler-generated code that you don’t see, with code for error handling that you write. So, it’s not that you have hidden overhead in case of exception-enabled environment as opposed to NOTHING in exception-free (C code, anyone?) environments.
6. Jeff Atwood says:
Where have you seen this? Everything I’ve read, and I do mean everything, told me that exceptions are expensive and should be avoided– eg, used for only "Exceptional" cases.
In practice, exceptions are brutally slow– literally slower than a database query! But I’m fine with that, because I only use them in exceptional conditions as designed.
If you have read this somewhere (microsoft docs saying exceptions are free), can you provide a link to it?
7. Dmitriy Zaslavskiy says:
Why can’t CLR use thing like GetWriteWatch instead of memorybarrier?
8. Jeffrey Sax says:
My vote for most pressing performance issue also goes to inlining value types. This should have been a priority from the outset, not an afterthought.
By their nature, value types tend to be used for small, fundamental types like complex numbers, intervals, quantities (size + unit), etc. Method bodies are usually very small. These value types are used in calculations, very often inside loops.
A second issue concerns mutable reference types with value semantics. These are sometimes necessary, but seem to run against the NET philosophy and their use is discouraged at every opportunity. One example: C# doesn’t allow overloading of compound assignment operators. It just assumes your objects are immutable and therefore "operator synthesis" (x@=y -> x=x@y) is all you need.
The String/Builder pattern can’t be used for objects like vectors and matrices. Like value types, these objects are used in calculations, implying that their component values change often. Recycling is a must. Bounds checking can often be eliminated if certain class-level invariants can be verified.
9. Rico Mariani says:
Jeffery Sax’s thoughts are closely aligned with mine. Of the JIT issues, the inliner is the thing I would most like to see improved and handling of value types in the inliner is doubly important. I think value types are largely under-used and perhaps they might be used more often if you could cash in, in practice, on the gains that they offer in theory.
But of course all the areas identified as weaknesses in the Jit above are obviously on our minds.
10. Goran Pušić says:
"In practice, exceptions are brutally slow– literally slower than a database query!"
I call bullshit! Care to show a sample program that times an exception and a DB query that proves this? I’ll show you one where DB query is slower!
11. Ryan Lamansky (Kardax) says:
It’s good to know that value-type inlining is on your (Microsoft’s) minds. Not having it is driving me insane!
If I had the choice, I would give up every single one of .NET 2.0’s new features in exchange for value-type inlining. Seriously.
12. Rico Mariani says:
There was a question about GetWriteWatch() up there. It’s an interesting strategy to use OS based information instead of write barriers but I don’t think you’d net any performance doing it.
I see these problems:
-using GetWriteWatch will manipulate the page tables, that causes more TLB misses and loading CR0 ain’t cheap anyway, we’d have to do this on every garbage collection
-once armed, you’ll pretty much have to take the equivalent of soft page faults to clear the bit (the OS does this for you), those aren’t cheap neither
-the granularity would be at the page level, so we’d have to assume a lot more pointers are dirty
-if we use that feature then others (like debuggers) can’t, and it seems more useful to them than to us
At the end of the day Write Barriers aren’t killing us.
13. Rico Mariani says:
In order to get an exception to compete in slowness with a database query, you first need a pretty simple query. e.g. "select 1"
Obviously a highly complex query could take arbitrarily long.
Secondly, perhaps the biggest cost of the exception is gathering the callstack information. So you’d want to do the throw from a very deeply nested function.
So I could imagine a case where all that gathering is actually slower than a network round trip to a database but I don’t think it would be the norm.
I guess the other factor is there could be an arbitrary number of finally clauses that did an arbitrary amount of work. So if you timed from the throw to the catch you might be waiting a while.
That’s the thing about throwing — you just don’t know what is going to happen exactly — it’s both the strength and the weakness of the mechanisms generality.
14. Dmitriy Zaslavskiy says:
Back to using OS info.
Like you said measure first. Do you guys have a prototype?
I can argue that in app that takes does little GC compare to updating it’s structures this will be a significant win.
Extra code/data for wb will cause more data to be touched trashing TLB etc.
On large memory systems you would probably wont to have granularity bigger than even a page (sans large pages)
I am sure you would agree that this is nowhere near a clear cut desision.
And I didn’t understand your last point about debuggers
15. murphee says:
On Write Barriers:
If you’re curious about the impact of
Write Barriers refer to this paper:
(The Title "Write Barriers – Friend or Foe?" should tell you what it’s about).
16. Jeffrey Sax says:
Not all exceptions are thrown by code deep down in the call stack. Exceptions are often raised by the CLR because of an issue with code inside a method. For example: OverflowException on a checked block.
A form of ‘light-weight exception handling’ for these situations, where the JIT bypasses the full exception handling mechanism, would be very welcome. I.e. if a CLR exception is thrown by code inside a try block, and the exception is caught in a corresponding catch block, the overhead of building a full-featured exception object could be eliminated.
This is especially important since the CLI spec states that certain tests throw an exception if the test fails rather than branch if it succeeds. Example: the ckfinite instruction. In other words, without this type of optimization, the CLI *imposes* severe performance degradation.
I’m aware that exception handling code can be extremely complicated, but that does not mean that the simple cases cannot be optimized.
17. A few weeks ago I spoke at Gamefest 2007 where I delivered this talk: The Costs of Managed Code: The
Skip to main content
|
global_01_local_1_shard_00001926_processed.jsonl/37131
|
Higgs boson
The latest results from the Atlas experiment indicate that there may be two different Higgs bosons—one that weighs 123.5 GeV (in blue) and another that's 126.6 GeV (in red).
A month ago scientists at the Large Hadron Collider released the latest Higgs boson results. And although the data held few obvious surprises, most intriguing were the results that scientists didn’t share.
The original Higgs data from back in July had shown that the Higgs seemed to be decaying into two photons more often than it should—an enticing though faint hint of something new, some sort of physics beyond our understanding. In November, scientists at the Atlas and LHC CMS experiments updated just about everything except the two-photon data.* This week we learned why.
Yesterday researchers at the Atlas experiment finally updated the two-photon results. What they seem to have found is bizarre—so bizarre, in fact, that physicists assume something must be wrong with it. Instead of one clean peak in the data, they have found two an additional peak.* There seems to be a Higgs boson with a mass of 123.5 GeV (gigaelectron volts, the measuring unit that particle physicists most often use for mass), and another Higgs boson at 126.6 GeV—a statistically significant difference of nearly 3 GeV. Apparently, the Atlas scientists have spent the past month trying to figure out if they could be making a mistake in the data analysis, to little avail. Might there be two Higgs bosons?
Although certain extensions of the Standard Model of particle physics postulate the existence of multiple Higgs bosons, none of them would predict that two Higgs particles would have such similar masses. They also don’t predict why one should preferentially decay into two Z particles (the 123.5 GeV bump comes from decays of the Higgs into Zs), while the other would decay into photons.
The particle physicist Adam Falkowski (under the nom de plume Jester) writes that the results “most likely signal a systematic problem rather than some interesting physics.” (By “systematic problem” he means something like a poorly-calibrated detector.) The physicist Tommaso Dorigo bets that it’s a statistical fluke that will go away with more data. Indeed, he’s willing to bet $100 on it with up to five people, in case you’re the kind of person who likes to wager on the results of particle physics experiments with particle physicists. The Atlas physicists are well aware of both of these possibilities, of course, and have spent the past month trying to shake the data out to see if they can fix it. Still, the anomaly remains.
But let’s not let this intriguing blip distract us from the original scent of new physics. Back when the preliminary data seemed to show that the Higgs was decaying into two photons more often than it should, I wrote that it could be “a statistical blip that would wash away in the coming flood of data.” But more data has now arrived, and the blip hasn’t gone anywhere. The Higgs boson continues to appear to be decaying into two photons nearly twice as often as it should.
All the more reason to stay tuned for the next big data release, currently scheduled for March.
*Update 12/17/12: In November, scientists at the Atlas and CMS experiments (not the "LHC" experiment—apologies for the dumb typo) updated everything except for the two-photon data and, in the case of Atlas, the data regarding the decay of the Higgs into four leptons. I have added "just about" to indicate that the two-photon data wasn't the only thing missing. I apologize for the imprecise language.
*Update 12/17/12: The sentence as originally written inadvertently implied that there are two peaks in the two-photon data. In fact the two photon data has one peak, but at a different mass than the peak found in other data sets. The Higgs to two-photon data shows a peak at 126.6 GeV, while the Higgs to four-lepton data (newly updated) shows a peak at 123.5 GeV. Apologies for the confusion.
Higgs boson at CMS
Image of the new Higgs data courtesy of Atlas/CERN. Image of Higgs to two-photon event courtesy of CMS/CERN.
|
global_01_local_1_shard_00001926_processed.jsonl/37135
|
I won’t be dishonest to get along with you…
This Andrew Sullivan piece on tribalism (and how it leads Republicans to ignore attacks on our longstanding institutions) made me think.
Yes, in this case, Republicans, including those who would NOT tolerate incompetence in their own businesses, have turned a blind eye to incompetence in the Trump administration. And, as time goes on, that could eventually hurt us..especially if we run into a crisis.
During “normal times”, we have enough momentum as a country to coast a bit.
So, am *I* tribal? Of course, though, like many, I am not so sure that my tribe falls neatly into “liberal/conservative”. Sure, I am more liberal than most Americans but I am more willing to go against current liberal orthodoxy when the data, as I see it, warrants it.
I am not going to say that I believe something when, in fact, I don’t (though hopefully I’ll change my erroneous beliefs when the evidence warrants it).
One area where I disagree sharply with some liberals: free speech. Yes, I know; the law talks about government censorship of speech. But I think that, as a general principle, campuses should tread carefully too, even if they are well within the bounds of law. Jerry Coyne’s op-ed in the Chicago Tribune is excellent.
Too many think that THEY should determine what the rest of us should be able to hear and have no problem shouting down those whose views they do not like.
And yes, on intellectual grounds, not all views have equal value.
Let me explain it this way: if some campus Bible beater group wanted to sponsor a creationist speaker, I would not attempt to get them disinvited.
But if some science professor tried to teach creationism as a valid science theory in the classroom, I’d want that professor fired for incompetence (it would be fine to teach creationism as, say, part of a “myths of the world” course.)
Workout notes: heel still hurts a bit, but it feels best when wearing shower shoes. So I went to school in my “Brooks Beasts” sand my hard orthotics.
It feels better.
weights only: usual pt, pull ups (5 sets of 10), bench: 10 x 135, 7 x 185 (good), 8 x 175
incline: 10 x 135, military: barbell 6 x 95, 10 x 85, dumbbell (standing) 10 x 50. Rows: 2 sets of 10 x 60 each arm, 10 x 200 hammer.
goblet squats to the windowsill: 10 x 53, 10 x 62
abs: 48 twist crunches (24 each side) 12 yoga leg lifts, moving bridge, headstand (tough to get into but got it done), side planks, 2 minute front plank (tough for me)
February 2, 2018 - Posted by | social/political, weight training | , , ,
No comments yet.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/37154
|
A Wiser Woman
Credit: www.flickr.com
She’s just like him
Words of wisdom from a child
He keeps his distance
Stands his ground
I had never seen her
But became acutely aware of her on that April morning
You know that feeling when someone is looking at you behind your back?
I turn to look
She penetrated my gaze
Followed me out the door
I turned once again
Laser-like, strong in my volley
I sensed an artist of insinuation in my midst
I knew we would meet again
I began to notice and be alert for her comings and goings
She was easy to spot
Devoid of femininity
Nearly transparent in nature
Her body a void
Dressing as a slacker social climber
Expensive jeans
made by poor souls in Bangladesh no doubt
The Designer Look that lacks originality
She appears to be his twin
A mirror image of him
As the seasons change, she creates a perch in the shop
A table by the window for her phone, Ipad and coffee
Trying to look earnest and important
She is a user of men
Flaunting her wiles for her own gain
Acting helpless while they lick her feet
I cannot warn them
I can only watch
Be careful my boy says
Keep quiet
Those behind the counter are trained to smile
but are aware of her guile
Her mission with me is incomplete
I am replete with stellar intuition
and spiritual revelation
I can handle any situation
My grace and style help me walk the mile
She hasn’t been around in a long, long while
9 thoughts on “A Wiser Woman
1. You brought her to life — I could see her sitting there, and the effect she had on men. I’m glad you passed the test, and you haven’t had to deal with her for a very long time!
1. I realize now that her appearances were for a reason more so than the usual small town nonsense. When I look at it as a sign from the universe, I allowed myself to look deeper into my own self and healing and come out the better and stronger person as a result.
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/37162
|
Research Paper Cover Should Make Positive Impression
While writing an essay or a research paper you need to create a good looking, impressive and attractive research paper cover. One can think that this is an easy task but it is not so and many of the students have difficulties with it. Trying to make an impression they, usually, fell into a trap, making the cover page coloured and fancy looking. Remember, your essay is not a fiction or a novel, so you should always follow the rules and should never create something personal.
Research papers cover is very important in your work, so please pay attention to them too. The instructors and even the readers pay much attention to the title of the research paper as it is the beginning of your writing and it should be done properly. The title of a research paper can be written in different ways. There is a number of the official written formats and one of them will be used to write your work.
The most common styles for today are: MLA (the Morden Language Association), APA (the American Psychological Association), the Chicago writing style and the CBE. These styles differ from each other, so the title page will be created in the different ways as well. So, first of all, the author should get acquainted with all the styles and choose the best and most suitable according to the teacher’s requirements.
Naturally, your research paper cover must have a title. Normally, it is placed at the centre of the sheet and is double spaced. The title will be followed by the name of the author; it will also be double spaced and placed nearly three-four lines below the title of your paper. The cover will also contain the name of your instructor, the subject of a research work and the date. The cover page is never numbered. So, again, please make sure you have put the following information into the cover page:
• The first and the last name, for example, John Riddle
• The information on your college or the university
• The title of your writing which should not be too long
• The class or the group where you are studying
• The name of your instructor
• The period of time
• The actual date of your research paper submission
• The cover page may illustrate the picture in some cases if it is allowed
Very often, the professor or the instructor can provide his own rules on how to make a cover paper. That is why it is important to consider his requirements too. And as a young author, you need to remember, that this writing is of an academic type and no one wants to evaluate your skills of an artist.
There should be no troubles with the research papers cover writing if you have learned what is written above. But if you still remain unconfident you can ask for a help of the professional research paper writers. You can ask for assistance, order your title page or look at some examples at
|
global_01_local_1_shard_00001926_processed.jsonl/37177
|
Skip to contentSkip to main navigationSkip to local navigation
ESL 400 Composition for Non-Native Speakers
Find Courses
Search by Keyword
Browse Courses by Subject Code
Course Description
In this course, students learn to plan, organize, compose, and revise expository essays based on the analysis of complex pieces of writing, both fiction and nonfiction. In addition, students review and follow the conventions of standard written English including punctuation, mechanics, grammar and sentence structure. Successful completion of ESL 400 qualifies students for entrance into ENGL 100.
Units: 5
Degree Credit
Letter Grade Only
• Lecture hours/semester: 80-90
• Homework hours/semester: 160-180
Prerequisites: ESL 844 or ESL 924 or appropriate skill level as indicated by placement test score and other measures as needed.
Corequisites: None
Transfer Credit: CSU , UC
|
global_01_local_1_shard_00001926_processed.jsonl/37198
|
EU e-Privacy Directive
View e-Privacy Directive Documents
You have declined cookies. This decision can be reversed.
Posts from category "Satellites"
ISS Contact With Fleurance Astronomy Festival
Tonight's ISS contact was a success, despite some initial delay (it had taken about 4 minutes from the beginning of the pass to good communication on both sides).
In just under 9 minutes the participants managed to ask all planned questions (read the Southgate ARC article for more details, note also only downlink is audible in this recording due to my location being too far away from Fleurance):
1. How are you? How do you feel today? (4:15)
2. Which time zone do you use? (4:32)
3. Which scientific experiments are you working at the moment? (4:52)
4. What's the latest big problem you have experienced? (5:20)
5. What did you feel during take-off? (5:51)
6. How often do you go out of the station? (6:13)
7. Do you do your own laundry, if yes, how? (6:36)
8. What can you do if you have health problems? (6:51)
9. What do you eat? (7:15)
10. Do you look forward to going back on Earth? (7:39)
11. What do you fear the most in the Station? (7:56)
12. Is there day and night in space? (8:17)
13. Do you have internet access in the station? (8:37)
14. Do nails and hair still grow in space? (inaudible from my location)
This recording was made using:
• Yaesu FT857-D
• 2m Quadrifilar Helix antenna
• Raspberry Pi (audio recording + doppler correction)
ISS SWL or How I Got To Hear a Real Astronaut
|
global_01_local_1_shard_00001926_processed.jsonl/37199
|
Pain relief
The pain syndrome indicates a malfunction of the body. Therefore, to get rid of pain should be with the help of drugs aimed at eliminating the disease itself. This does not mean that discomfort should be tolerated, but it is not worth confining yourself to taking medications that only stop the pain. Consider the main types of remedies that reduce pain.
Neuralgia develops gradually. The longer the pain syndrome, the more intense the pain becomes. This causes serious damage to the nerve cells and ultimately leads to their death. Then, the nervous system may lose its ability to control pain, says Ed Ross, MD, director of pain management at Brigham Hospital in Boston.
“Painful neuropathy is a chronic problem,” Robert Gervin emphasizes. Therefore, general practitioners should actively take care of it. ” According to him, endocrinologists and therapists, and not only pain specialists, often prescribe anesthesia. Discuss the following pain relief options with your doctor and decide what methods are appropriate to improve your comfort level.
Local treatment
Local analgesics in the form of cream or gel can relieve the tingling sensation, numbness or pain in the extremities. However, this treatment itself is not very effective, experts recommend using it along with other means, including medications and additional procedures.
Prevention of pain
It is easier and cheaper to prevent pain than to treat it:
1. Practice. Regular physical activity contributes to weight loss, which can slow the development of pain and reduce inflammation throughout the body. If you already feel mild symptoms of neuropathy, do not stop. Look for low-intensity exercises, such as swimming or biking, and discuss with your doctor what painless exercise suits you.
2. Visit your doctor regularly. Therefore, it will be more likely that, in time, you will take the additional precautions necessary to avoid further damage.
3. Talk about your problems. Be honest with your doctor and talk about what you are experiencing. If you feel any pain, or if you feel tingling or numbness, which can then cause pain, and does not control these phenomena, it increases the likelihood that the pain syndrome will increase.
|
global_01_local_1_shard_00001926_processed.jsonl/37205
|
But let's revisit his finest moment, shall we? And that is...getting his ass kicked.
Yes! In order to make a quick buck, Canseco joined the DREAM Super Hulk Tournament which kicked off at DREAM 9 in Yokohama in 2009. Canseco claimed he was for REAL, you guys, and begged various MMA trainers to take him seriously, but alas nobody did, because he's a roided up, pompous dickhead. Still, you have to give it to the guy - he lasted a whopping 77 seconds, which is longer than I would have given him against a motivated opponent who SERIOUSLY wanted to kick his ass.
|
global_01_local_1_shard_00001926_processed.jsonl/37214
|
Type keyword(s) to search
Sitemap Image 266
Posted on March 26, 2018 by Nora
100 out of 100 based on 806 user ratings
Sitemap Image 266
Loading Sitemap Image 266 ...
Global Image Sports - Gis - Oceania Our Mission. Sitemap Image 266 The goal of GIS has always been to provide access to soccer tours and camps to enhance players and coaches’ abilities and knowledge. Sandhill Cove - Senior Living Community – Palm City ... Retirement meets the sun, sea, and amenities at Sandhill Cove, a unique and fun waterfront community serving Martin and St. Lucie counties in Florida.
Canon Ixus 240 Hs ThetechtwisterSource: thetechtwister.com
Download Image
Sitemap Image 266
Related Video of Sitemap Image 266
Galleries of Sitemap Image 266
You may like also Home Design Software Used On Property Brothers
|
global_01_local_1_shard_00001926_processed.jsonl/37219
|
Jump to content
SF2 MLD PV-2 Harpoon Skin Set 1.0.0
(0 reviews)
Sign in to follow this
1 Screenshot
About This File
SF2 MLD PV-2 Harpoon Skin Pack 9/5/2017
= For SF2 (Full 5 Merged RECCOMENDED) =
This package contains a new skin for Veltro2k's Lockheed PV-2 Harpoon naval patrol bomber. This
skin/decal set represents the 18 as used by the Royal Netherlands Naval Air Service
(Marineluchtvaartdienst) or MLD.
The MLD recieved 18 Harpoon in 1950, and were used in the Martime Recon, and Search & Rescue
until their replacement by P2V Neptunes in the early 1960s.
The skin is in jpg format, in overall "Dark Gloss Navy Blue" finish. All markings are decals,
and decal randomization is TRUE. Displayed serial numbers are 100% historically correct for the
aircraft depicted, as used by the MLD.
Also included is the updated (and a backup copy) of the data ini for those that have not updated
their WW2 versions. If you've done so, you need not install these 2 files (they're the same as
in the update pack, so no harm will come if you do).
You will still need the aircraft itself, available at the following URL:
the readme for the install instructions.
*Please note, that even though the aircraft is WW2 vintage, THIS use is Cold War, which is why
it's been placed here*
Happy Landings!
Kevin Stein
User Feedback
There are no reviews to display.
Important Information
|
global_01_local_1_shard_00001926_processed.jsonl/37222
|
AnsweredAssumed Answered
upload zip files and automatically extract into folder
Question asked by davidturner90 on Apr 17, 2008
Latest reply on Apr 18, 2008 by pmonks
I am writing a custom script that runs when a zip file is added to a folder space. The script will automatically extract the content of the zip file and place the content items in the target folder.
My approach is to create a content rule based on the condition that the file pattern matches *.zip. This executes a custom script that unzips the contents into the space. If the zip contains content items that have the same name as content items already stored in the space then an error message is displayed informing the user that an existing file or files already exist and provide the name(s) of the existing files.
I would appreciate any comments on this approach and also has anybody done anything similar?
|
global_01_local_1_shard_00001926_processed.jsonl/37223
|
JIRA 7.X groovy error
I am trying to build a query:
Fetch all the fix versions of a ticket, see if that fix version is assigned to any other tickets in the same project. Below script works fine for 6.X but it is throwing the below error in 7.X
Please help me to fix these errors.
[Static type checking] - Cannot find matching method com.atlassian.jira.ComponentManager#getSearchService(). Please check if the declared type is right and if the method exists.
@ line 61, column 47.
[Static type checking] - Cannot assign value of type com.atlassian.jira.user.ApplicationUser to variable of type com.atlassian.crowd.embedded.api.User
@ line 65, column 18.
[Static type checking] - Cannot find matching method com.atlassian.jira.bc.issue.search.SearchService#search(com.atlassian.crowd.embedded.api.User, com.atlassian.query.Query, com.atlassian.jira.web.bean.PagerFilter). Please check if the declared type is right and if the method exists.
Possible solutions: each(groovy.lang.Closure) @ line 66, column 16.
Issue curissue = issue
curissuekey = curissue.getKey();
Collection<Version> fixVersionList = issue.getFixVersions();
if (fixVersionList.size() > 0)
for (Version v : fixVersionList)
fvname = v.getName();
JqlQueryBuilder builder = JqlQueryBuilder.newBuilder();
Query query = builder.buildQuery();
SearchService searchService = ComponentManager.getInstance().getSearchService();
SearchResults results = null;
User user = ComponentAccessor.getJiraAuthenticationContext().getLoggedInUser();
results = searchService.search(user, query, PagerFilter.getUnlimitedFilter());
catch (Exception e){}
nCount = results.getTotal();
1 answer
1 accepted
It seems that your issue is related of using the ComponentManager as your SearchService and that's deprecated in favor of the ComponentAccessor class.
The problem is here:
SearchService searchService = ComponentManager.getInstance().getSearchService();
Try changing it to this instead:
SearchService searchService = ComponentAccessor.getComponentOfType(SearchService.class);
Then there's another issue where you're trying to get the Current Logged in User and for that you'll need to import the ApplicationUser class as it changed as of Jira 7.x to use that instead of the atlassian.crowd class so simply add the following line on top of your code:
import com.atlassian.jira.user.ApplicationUser
Then change this code:
User user = ComponentAccessor.getJiraAuthenticationContext().getLoggedInUser();
To this one:
JiraAuthenticationContext authContext = ComponentAccessor.getJiraAuthenticationContext()
ApplicationUser user = authContext.getLoggedInUser()
Hi Pinchus,
Thanks it worked like charm in JIRA 7.x.
Suggest an answer
Log in or Sign up to answer
Community showcase
Published Nov 29, 2018 in Marketplace Apps
1,373 views 0 8
Read article
Atlassian User Groups
Find a group
Find my local user group
Unfortunately there are no AUG chapters near you at the moment.
Start an AUG
Groups near you
|
global_01_local_1_shard_00001926_processed.jsonl/37224
|
Auth0 Home Blog Docs
What are the OIDC standards that the applications using Auth0 must follow?
I just want to know brief explanation of OIDC standards that all the applications must follow. I have found a book about OIDC standards but I just want a brief explanation if anybody can provide
While this is a pretty broad question, I’m going to provide you with some resources from our Docs which should get you going:
|
global_01_local_1_shard_00001926_processed.jsonl/37234
|
How Mahalo Works
Mahalo Searches
If you go to Mahalo and pull up a search, you might see some links with little symbols next to them. These symbols are used to tag links. There are three kinds of tags:
• Warning tags: These tags tell the user that the link might be very good, but it has some things Mahalo usually tries to avoid, like pop-up ads and intrusive music, or parts of it are written in languages other than English. Moving your cursor over the warning icon generates a message that explains why the guide felt that warning was necessary.
• What is? tags: Sometimes a guide will find a really great link relating to a search topic, but the link's source is obscure. If the guide feels that the user might not be familiar with the link's source, he or she can create a What is? tag, which will give a short description of the Web page when you run your mouse over the icon.
• Guide's Choice tags: Mahalo guides use the shaka symbol to designate really cool links. If a guide feels that a particular link is better than others, he or she can mark it with a Guide's Choice tag. If you move your cursor over the icon, you'll see a short explanation that describes how this link is one of the best on the Internet.
If you find a dead link on Mahalo or a link that leads to a substandard Web site, you can report it by clicking on the "Report a problem" link. You can also discuss the page on Mahalo's forums by clicking on the "Discuss this Page" link.
Perhaps you know of a link that should be on the Mahalo page but isn't. In that case, you can click on the "Recommend a Link" option. Clicking on it opens a couple of fields. The first field is for the link's URL and the second is for a short description of why you feel the link belongs on Mahalo's search results page.
In the next section, we'll learn about the guides who generate Mahalo search results.
More to Explore
|
global_01_local_1_shard_00001926_processed.jsonl/37244
|
She cried in the evenings, like paint dripping from the walls. She thought of those moments, glowing fragments of a former life, when happiness seeped into her skin. It was something distant, somethings vague, something lost. She dreamt of those lost frames, burning celluloid coiled into ashes.
It was winter in her soul – another evening.
She raised the glass of water to her lips and the liquid trickled faintly down her throat. The ice rattled for a moment as she placed the glass on the table. She reclined into her chair and allowed the memories to flow back into her mind.
It was in these moments that she saw the birth of everything. All her faults and all her wisdom. The shades flickered in her mind, like ice crystals capturing the light in the evening sun. Everlasting, yet cold. It was in these moments that she saw herself.
She wept in grief until there was nothing left. Her heart felt blank. Empty. These moments lasted forever. Some moments fade away, dissipate like dust crawling under damp furniture. But these moments crawled over mountains, swept through time. She begged for these moments yet, when they arrived, they held the weight of all her pain. Every moment of sickness, every thought of melancholy tore through her. She wept in the dusk because she knew nothing else.
She recalled the childhood with her sister, one of happiness. They were young – very young. Mere children, free of responsibility and the coldness of the world. They had never felt this coldness before. Everything was bright in those days. The sun’s warmth felt real, like you could reach out and lightly touch its glow. Expressions were real and people were real and everything was real and nothing was fake and it all seemed like it had never occurred – but a dream, merely a dream.
She begged for those days to return, but it seemed so long ago. Almost. Almost like they had never occurred.
And then she was back in front of the fire. The melancholy stirred, burned into her skin. The fire spat pulsing embers.
She wondered what this meant. Perhaps it was the world telling her something. Something vague, but something important. A message from some faraway land. Something she could never understand.
And then nausea sunk into her skin. The sickness of sleep. And the scarlet flickers of the fire dampened and she fell deep deep down into her own wonderland.
Dusk crawled into dawn. Sleep dances in the darkness, like every night. In these states of slumber, clarity forms into a pasty orb. All those feelings of melancholy and all those feels of emptiness and all those feelings lost innocence evaporated, curled into nothingness. When dawn arrives, everything is born again.
Crawling out of bed, the edges of light seep through the shades. It’s blinding, but warm upon the skin. And then the world returns, all the memory and moments of a life.
Coffee soothes the morning sun. Adrenaline eases into my blood vessel. The day dawned upon me. Endless routine. The same motions over and over and over again. That was everything. That is all.
Some days, I feel born again. Revamped from another life. Resurrected from a former experience.
And then mother returns through the doorway and she is talking about something. Something important, but it is lost. Everything is mute. Her words dissipate in my brain. I try to focus, on the movement of her lips, the creases in her throat as they move and mould words. But their is nothing. She is looking at me with those lost eyes. Like she knows everything. Like she knows the truth.
But I can’t talk to her. I can’t tell her the truth. I can’t tell her how things really are. How I stay awake until early dawn, musing on the sickness and bleak thoughts. How I wander aimlessly through the streets, waiting for some meaning to form. Or how I wonder I am just waiting just waiting just waiting and nothing. She appears to know everything, yet she knows nothing.
In the end, it doesn’t matter.
Layers of scarlet scream across the sky as I lie nestled into jaded grass. Everything seemed vacant and my mind was wandering and all that chaos that lurks in the mind, sheltered from reality, returned to light. Just an aura of harlequin light blistering upon a bed of darkness.
The morning wind was cold and it crept into my brain and my brain froze into my skull and I wondered whether winter would ever fade away.
Time is a strange creature. She kisses you with warmth, with creased lips that are pure. She provides you with some essence that takes upon the soul. Something to cherish. Time is a mask. Its warmth is merely a farce, a long-ridden joke. Beneath the thin layer of beauty is a hateful figure. She wants you to cry, to tear away the pages of time, to waste away those precious moments. She wants your skin to decay, your hair to dissipate into nothingness. Lost in the soul of time past and time thereafter.
Time is a strange creature and she laughs, always.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/37252
|
Home Bemorecreative
Creative Quotations from . . .
J. P. Morgan
(1837-1913) born on
Apr 17
US financier. He formed U.S. Steel, 1901 which became the first billion-dollar corporation in the world.
You can't pick cherries with your back to the tree.
Anyone who has to ask about the annual upkeep of a yacht can't afford one.
Beckoning a waiter J. P. Morgan once ordered a beer while saying, 'When Morgan drinks, everybody drinks.' Everybody had a beer and when Morgan had finished, he slapped a dime upon the table, saying, 'When Morgan pays, everybody pays.'
Be More Creative
Published Sources for the above Quotations:
F: In "Quotable Business," ed. Louis E. Boone, 1992.
R: In "20,000 Quips and Quotes" by Evan Esar, 1968.
A: Attributed.
K: In "2500 Anecdotes for All Occasions," by Edmund Fuller, 1970.
copyright 1996-2014 by Baertracks at bemorecreative.com
|
global_01_local_1_shard_00001926_processed.jsonl/37255
|
Log in
No account? Create an account
Previous Entry Share Next Entry
Cocco+Kamara. My first semi-fic writing. PG-13 for mild innuendo? I don't rate these things much
Years of talking, communicating across a body of water that neither could cross. Dreaming of what might happen, what she would think.
All those years of wishing and dreaming were finally coming true. She was on her way. She had left, and was flying over that body of water. She would be there soon.
As cocco pushed her hair back from her face, she smiled nervously into the mirror. She knew that kamara must be just as nervous as her, bouncing in her squished airline seat as she flew across the Atlantic. She knew, rationally, that everything would be okay - they had been talking for years, hadn't they? never a dull moment between them. That wouldn't go away just because they met in real life.
Despite telling herself that, she couldn't stop her hands from shaking.
She knew kamara loved this outfit. The plaid skirt, just past the knees, showed off her legs nicely. The white shirt, tucked into the skirt all around, always got her stares in public. She wanted to make kamara happy, and this was the first way she could think of. As soon as she got off the plane, she could imagine kam's face lighting up in a grin at the outfit. She hadn't told her what she was wearing - she wanted it to be a surprise.
There would be more than one surprise that day.
Staring out the window distractedly, kamara could hardly sit still. They were landing soon, she could see land. She could see other airplanes, the airport that she would soon be at, running at cocco and giving her the hug she had been wanting for years. To finally be able to see her, to hear her voice, to have her be there... it was an amazing thought.
"Ladies and gentlemen," the speaker at the front of the cabin announced, "Please observe the 'Fasten seatbelts' sign, as we are beginning our descent to Logan airport. Thank you for flying the friendly skies, and welcome to the United States."
Kamara's breathing quickens a bit, as she realizes how close they are. What if cocco takes one look at her, and walks away without saying a word? What if she's not there? What if she gets lost? These people won't understand her... she was no scouser, but her accent was still thick.
Pushing these worries aside, kamara pulled out the picture she had brought. Just seeing it brought a smile to her face. She knew that everything would be alright, they would have fun, they would enjoy themselves. They had been talking online for ages online, nothing would be different. They would just be together.
Cocco scanned the crowd exiting the security gates, passing by her. She had to be here, she had gotten on the plane, she had to be here.
Suddenly, she saw her. The hair did it first... burgandy red dyed hair, flowing back behind her, steel blue eyes piercing the crowd, looking for her.
Taking a deep breath, cocco waved her hand and shouted. "Gem!"
Kamara turns, sees her, and starts into a fast walk, and breaks into a run. Getting to cocco, she wraps her arms around her in a tight hug and, for the first time, melts in someone else's arms.
Leaning back, they look into each others eyes and see the playfullness behind them. Realizing they're blocking a crowd of people, they giggle, say their hellos, and decide that moving on would be a good idea. They walk, hand in hand to the baggage claim, knowing that neither of them wants to leave behind kamara's things, as they may prove useful later.
As they stand waiting by the baggage claim, kamara glances around, sees that the area they're in is empty and wraps her arms around cocco. Stealthily, she whispers to cocco, "I've been wanting to do this for ages." Pulling her lips back from cocco's ear, she slowly presses them onto cocco's. Feeling no resistance, she slips her tongue past cocco's lips, and finds her first sign of resistance - a playful cocco blocking her way.
Giggling, kamara pulls back and smiles. Seeing another passanger walk up, she quickly kisses cocco's neck, and grabs her bag as it passes by, leaving her standing gaping for a minute. Quickly, cocco follows, directing kamara to where she's parked.
She doesn't want to waste any more time than she has to, before getting to a private place.
Happy canada day.
|
global_01_local_1_shard_00001926_processed.jsonl/37281
|
Using Sub-accounts with the REST API
We are looking for a way track the usage of Zoom across each of our departments and partners.
Using the API Plan, our idea is to Create sub-accounts for each of our partners then use the sub-accounts to create meetings. In this way we can see which divisions are using what amount of zoom minutes.
Is this a reasonable way of doing this? Is there a better way?
Hi Daniel,
I’m following up from my previous post with a correction. There is a better way of doing this.
If you are a master account owner, then you can create sub accounts and track the usage in those accounts independent of each other. Using the APIs this is currently the only option.
@Michael , thanks.
If we had an API Plan master account and we are creating users under subaccounts for tracking usage by our departments then what TYPE do we use for the users that are created?
The API lists the following types:
| type_integer_ | User’s type
1 basic
2 pro
3 corp
It doesn’t really describe what each of those types means.
Hi Daniel,
You can use any user type under those sub accounts. Here is an article explaining in details about Basic, Pro, Crop.
• Basic: A basic user is a free account user who can host up to 40 minute group meetings (3 or more participants).
• Pro: A pro user is a paid account user who can host unlimited meetings on the public cloud.
• Corp: A corp user is a paid account who can host unlimited meetings on the hybrid cloud (meeting connector).
@Michael , thanks again.
Let me expand on my question about user type.
If we had the per-minute API plan (as seen here ) and we want to create per-minute meetings in those sub-accounts then which type of user should we select? It’s my understanding that with the API Plan we don’t pay for each individual host we just pay for the minutes used each month.
Hi Daniel,
You can create as many Pro users as you want. Yes, you are correct, you only pay per minute used each month.
|
global_01_local_1_shard_00001926_processed.jsonl/37301
|
Visible Binding
The visible binding shows or hides the target DOM element or widget depending on the View-Model value. If the value is true, the target DOM element is shown. If the value is false, the target DOM element is hidden—its display CSS attribute is set to none.
Getting Started
The example below demonstrates how to use the visible binding.
<div id="view">
<div data-bind="visible: isVisible">some content
<button data-bind="click: hide">Hide</button>
var viewModel = kendo.observable({
isVisible: true,
hide: function() {
this.set("isVisible", false);
kendo.bind($("div"), viewModel);
In the example the div element is initially visible because the value of the isVisible field is true. When the user clicks the button, the div is going to be hidden because the value of the isVisible field is set to false.
Non-Boolean Values
Non-boolean values, such as 0, null, undefined and "", are treated as false by the visible binding. All other values are treated as true.
See Also
Other articles on the Kendo UI MVVM component and bindings:
In this article
Not finding the help you need? Improve this article
|
global_01_local_1_shard_00001926_processed.jsonl/37306
|
Category:Articles with unsourced statements
An article appears in this category when tagged with the {{fact}} template. This should be reserved only for assertions which cannot be verified by examining the source code and/or IWADs (for instance, an explanation as to why sloping floors were removed from the Doom engine requires a bibliography; saying that there are two Cacodemons on E3M8: Dis does not).
|
global_01_local_1_shard_00001926_processed.jsonl/37313
|
Information for "Church"
Jump to: navigation, search
Basic information
Display titleChurch
Default sort keyChurch
Page length (in bytes)2,554
Page ID10478
Page content languageen - English
Page content modelwikitext
Indexing by robotsAllowed
Number of redirects to this page3
Counted as a content pageYes
Page protection
EditAllow all users (infinite)
MoveAllow all users (infinite)
Edit history
Page creatorSpongeBathBill (talk)
Date of page creation08:23, 27 February 2009
Latest editorFollower of Light (talk | contribs)
Date of latest edit09:47, 8 May 2018
Total number of edits21
Total number of distinct authors8
Recent number of edits (within past 90 days)0
Recent number of distinct authors0
Page properties
Transcluded templates (3)
Templates used on this page:
|
global_01_local_1_shard_00001926_processed.jsonl/37335
|
Street Corner Society
cover 2018 small
Shem, Son of Noah
front cover
15-year-old Shem lives a carefree existence with his younger brothers Ham and Japeth, but the boys’ idyllic lifestyle ends abruptly when God commands Noah to build the Ark. The family’s life becomes one of turmoil as they face the seemingly insurmountable obstacles before them, but their love for each other and faith in their God gives them strength and sees them through.
Can be found at major book retailers as well as Smashwords:
|
global_01_local_1_shard_00001926_processed.jsonl/37356
|
Page semi-protected
From Wikipedia, the free encyclopedia
(Redirected from Copper (element))
Jump to navigation Jump to search
Copper, 29Cu
Native copper (~4 cm in size)
General properties
Appearancered-orange metallic luster
Standard atomic weight (Ar, standard)63.546(3)[1]
Copper in the periodic table
Hydrogen Helium
Lithium Beryllium Boron Carbon Nitrogen Oxygen Fluorine Neon
Sodium Magnesium Aluminium Silicon Phosphorus Sulfur Chlorine Argon
Atomic number (Z)29
Groupgroup 11
Periodperiod 4
Element category transition metal
Electron configuration[Ar] 3d10 4s1
Electrons per shell
2, 8, 18, 1
Physical properties
Phase at STPsolid
Melting point1357.77 K (1084.62 °C, 1984.32 °F)
Boiling point2835 K (2562 °C, 4643 °F)
Density (near r.t.)8.96 g/cm3
when liquid (at m.p.)8.02 g/cm3
Heat of fusion13.26 kJ/mol
Heat of vaporization300.4 kJ/mol
Molar heat capacity24.440 J/(mol·K)
Vapor pressure
at T (K) 1509 1661 1850 2089 2404 2834
Atomic properties
Oxidation states−2, +1, +2, +3, +4 (a mildly basic oxide)
ElectronegativityPauling scale: 1.90
Ionization energies
• 1st: 745.5 kJ/mol
• 2nd: 1957.9 kJ/mol
• 3rd: 3555 kJ/mol
• (more)
Atomic radiusempirical: 128 pm
Covalent radius132±4 pm
Van der Waals radius140 pm
Color lines in a spectral range
Spectral lines of copper
Other properties
Crystal structureface-centered cubic (fcc)
Face-centered cubic crystal structure for copper
Speed of sound thin rod(annealed)
3810 m/s (at r.t.)
Thermal expansion16.5 µm/(m·K) (at 25 °C)
Thermal conductivity401 W/(m·K)
Electrical resistivity16.78 nΩ·m (at 20 °C)
Magnetic orderingdiamagnetic[2]
Magnetic susceptibility−5.46·10−6 cm3/mol[3]
Young's modulus110–128 GPa
Shear modulus48 GPa
Bulk modulus140 GPa
Poisson ratio0.34
Mohs hardness3.0
Vickers hardness343–369 MPa
Brinell hardness235–878 MPa
CAS Number7440-50-8
Namingafter Cyprus, principal mining place in Roman era (Cyprium)
DiscoveryMiddle East (9000 BC)
Main isotopes of copper
63Cu 69.15% stable
64Cu syn 12.70 h ε 64Ni
β 64Zn
65Cu 30.85% stable
67Cu syn 61.83 h β 67Zn
| references
Copper is one of the few metals that can occur in nature in a directly usable metallic form (native metals). This led to very early human use in several regions, from c. 8000 BC. Thousands of years later, it was the first metal to be smelted from sulfide ores, c. 5000 BC, the first metal to be cast into a shape in a mold, c. 4000 BC and the first metal to be purposefully alloyed with another metal, tin, to create bronze, c. 3500 BC.[4]
In the Roman era, copper was principally mined on Cyprus, the origin of the name of the metal, from aes сyprium (metal of Cyprus), later corrupted to сuprum (Latin), from which the words derived, coper (Old English) and copper, first used around 1530.[5]
The commonly encountered compounds are copper(II) salts, which often impart blue or green colors to such minerals as azurite, malachite, and turquoise, and have been used widely and historically as pigments.
Copper is essential to all living organisms as a trace dietary mineral because it is a key constituent of the respiratory enzyme complex cytochrome c oxidase. In molluscs and crustaceans, copper is a constituent of the blood pigment hemocyanin, replaced by the iron-complexed hemoglobin in fish and other vertebrates. In humans, copper is found mainly in the liver, muscle, and bone.[6] The adult body contains between 1.4 and 2.1 mg of copper per kilogram of body weight.[7]
A copper disc (99.95% pure) made by continuous casting; etched to reveal crystallites
Copper, silver, and gold are in group 11 of the periodic table; these three metals have one s-orbital electron on top of a filled d-electron shell and are characterized by high ductility, and electrical and thermal conductivity. The filled d-shells in these elements contribute little to interatomic interactions, which are dominated by the s-electrons through metallic bonds. Unlike metals with incomplete d-shells, metallic bonds in copper are lacking a covalent character and are relatively weak. This observation explains the low hardness and high ductility of single crystals of copper.[8] At the macroscopic scale, introduction of extended defects to the crystal lattice, such as grain boundaries, hinders flow of the material under applied stress, thereby increasing its hardness. For this reason, copper is usually supplied in a fine-grained polycrystalline form, which has greater strength than monocrystalline forms.[9]
The softness of copper partly explains its high electrical conductivity (59.6×106 S/m) and high thermal conductivity, second highest (second only to silver) among pure metals at room temperature.[10] This is because the resistivity to electron transport in metals at room temperature originates primarily from scattering of electrons on thermal vibrations of the lattice, which are relatively weak in a soft metal.[8] The maximum permissible current density of copper in open air is approximately 3.1×106 A/m2 of cross-sectional area, above which it begins to heat excessively.[11]
Copper is one of a few metallic elements with a natural color other than gray or silver.[12] Pure copper is orange-red and acquires a reddish tarnish when exposed to air. The characteristic color of copper results from the electronic transitions between the filled 3d and half-empty 4s atomic shells – the energy difference between these shells corresponds to orange light.
As with other metals, if copper is put in contact with another metal, galvanic corrosion will occur.[13]
The East Tower of the Royal Observatory, Edinburgh. The contrast between the refurbished copper installed in 2010 and the green color of the original 1894 copper is clearly seen.
Copper does not react with water, but it does slowly react with atmospheric oxygen to form a layer of brown-black copper oxide which, unlike the rust that forms on iron in moist air, protects the underlying metal from further corrosion (passivation). A green layer of verdigris (copper carbonate) can often be seen on old copper structures, such as the roofing of many older buildings[14] and the Statue of Liberty.[15] Copper tarnishes when exposed to some sulfur compounds, with which it reacts to form various copper sulfides.[16]
There are 29 isotopes of copper. 63Cu and 65Cu are stable, with 63Cu comprising approximately 69% of naturally occurring copper; both have a spin of 32.[17] The other isotopes are radioactive, with the most stable being 67Cu with a half-life of 61.83 hours.[17] Seven metastable isotopes have been characterized; 68mCu is the longest-lived with a half-life of 3.8 minutes. Isotopes with a mass number above 64 decay by β, whereas those with a mass number below 64 decay by β+. 64Cu, which has a half-life of 12.7 hours, decays both ways.[18]
62Cu and 64Cu have significant applications. 62Cu is used in 62Cu-PTSM as a radioactive tracer for positron emission tomography.[19]
Native copper from the Keweenaw Peninsula, Michigan, about 2.5 inches (6.4 cm) long
Copper is produced in massive stars[20] and is present in the Earth's crust in a proportion of about 50 parts per million (ppm).[21] In nature, copper occurs in a variety of minerals, including native copper, copper sulfides such as chalcopyrite, bornite, digenite, covellite, and chalcocite, copper sulfosalts such as tetrahedite-tennantite, and enargite, copper carbonates such as azurite and malachite, and as copper(I) or copper(II) oxides such as cuprite and tenorite, respectively.[10] The largest mass of elemental copper discovered weighed 420 tonnes and was found in 1857 on the Keweenaw Peninsula in Michigan, US.[21] Native copper is a polycrystal, with the largest single crystal ever described measuring 4.4×3.2×3.2 cm.[22]
Chuquicamata, in Chile, is one of the world's largest open pit copper mines
World production trend
Copper prices 2003–2011 in US$ per tonne
Most copper is mined or extracted as copper sulfides from large open pit mines in porphyry copper deposits that contain 0.4 to 1.0% copper. Sites include Chuquicamata, in Chile, Bingham Canyon Mine, in Utah, United States, and El Chino Mine, in New Mexico, United States. According to the British Geological Survey, in 2005, Chile was the top producer of copper with at least one-third of the world share followed by the United States, Indonesia and Peru.[10] Copper can also be recovered through the in-situ leach process. Several sites in the state of Arizona are considered prime candidates for this method.[23] The amount of copper in use is increasing and the quantity available is barely sufficient to allow all countries to reach developed world levels of usage.[24]
Copper has been in use at least 10,000 years, but more than 95% of all copper ever mined and smelted has been extracted since 1900,[25] and more than half was extracted the last 24 years. As with many natural resources, the total amount of copper on Earth is vast, with around 1014 tons in the top kilometer of Earth's crust, which is about 5 million years' worth at the current rate of extraction. However, only a tiny fraction of these reserves is economically viable with present-day prices and technologies. Estimates of copper reserves available for mining vary from 25 to 60 years, depending on core assumptions such as the growth rate.[26] Recycling is a major source of copper in the modern world.[25] Because of these and other factors, the future of copper production and supply is the subject of much debate, including the concept of peak copper, analogous to peak oil.
The price of copper has historically been unstable,[27] and its price increased from the 60-year low of US$0.60/lb (US$1.32/kg) in June 1999 to $3.75 per pound ($8.27/kg) in May 2006. It dropped to $2.40/lb ($5.29/kg) in February 2007, then rebounded to $3.50/lb ($7.71/kg) in April 2007.[28][better source needed] In February 2009, weakening global demand and a steep fall in commodity prices since the previous year's highs left copper prices at $1.51/lb ($3.32/kg).[29]
Scheme of flash smelting process
The concentration of copper in ores averages only 0.6%, and most commercial ores are sulfides, especially chalcopyrite (CuFeS2), bornite (Cu5FeS4) and, to a lesser extent, covellite (CuS) and chalcocite (Cu2S).[30] These minerals are concentrated from crushed ores to the level of 10–15% copper by froth flotation or bioleaching.[31] Heating this material with silica in flash smelting removes much of the iron as slag. The process exploits the greater ease of converting iron sulfides into oxides, which in turn react with the silica to form the silicate slag that floats on top of the heated mass. The resulting copper matte, consisting of Cu2S, is roasted to convert all sulfides into oxides:[30]
2 Cu2S + 3 O2 → 2 Cu2O + 2 SO2
The cuprous oxide is converted to blister copper upon heating:
2 Cu2O → 4 Cu + O2
Cu2+ + 2 e → Cu
Flowchart of copper refining (Anode casting plant of Uralelektromed) # Blister copper # Smelting # Reverberatory furnace # Slag removal # Copper casting of anodes # Casting wheel # Anodes removal machine # Anodes take-off # Rail cars # Transportation to the tank house
Like aluminium,[33] copper is recyclable without any loss of quality, both from raw state and from manufactured products.[34] In volume, copper is the third most recycled metal after iron and aluminium.[35] An estimated 80% of all copper ever mined is still in use today.[36] According to the International Resource Panel's Metal Stocks in Society report, the global per capita stock of copper in use in society is 35–55 kg. Much of this is in more-developed countries (140–300 kg per capita) rather than less-developed countries (30–40 kg per capita).
The process of recycling copper is roughly the same as is used to extract copper but requires fewer steps. High-purity scrap copper is melted in a furnace and then reduced and cast into billets and ingots; lower-purity scrap is refined by electroplating in a bath of sulfuric acid.[37]
Numerous copper alloys have been formulated, many with important uses. Brass is an alloy of copper and zinc. Bronze usually refers to copper-tin alloys, but can refer to any alloy of copper such as aluminium bronze. Copper is one of the most important constituents of silver and carat gold and carat solders used in the jewelry industry, modifying the color, hardness and melting point of the resulting alloys.[38] Some lead-free solders consist of tin alloyed with a small proportion of copper and other metals.[39]
The alloy of copper and nickel, called cupronickel, is used in low-denomination coins, often for the outer cladding. The US five-cent coin (currently called a nickel) consists of 75% copper and 25% nickel in homogeneous composition. The alloy of 90% copper and 10% nickel, remarkable for its resistance to corrosion, is used for various objects exposed to seawater, though it is vulnerable to the sulfides sometimes found in polluted harbors and estuaries.[40] Alloys of copper with aluminium (about 7%) have a golden color and are used in decorations.[21] Shakudō is a Japanese decorative alloy of copper containing a low percentage of gold, typically 4–10%, that can be patinated to a dark blue or black color.[41]
A sample of copper(I) oxide.
Copper forms a rich variety of compounds, usually with oxidation states +1 and +2, which are often called cuprous and cupric, respectively.[42]
Binary compounds
As with other elements, the simplest compounds of copper are binary compounds, i.e. those containing only two elements, the principal examples being oxides, sulfides, and halides. Both cuprous and cupric oxides are known. Among the numerous copper sulfides, important examples include copper(I) sulfide and copper(II) sulfide.
Cuprous halides (with chlorine, bromine, and iodine) are known, as are cupric halides with fluorine, chlorine, and bromine. Attempts to prepare copper(II) iodide yield only cuprous iodide and iodine.[42]
2 Cu2+ + 4 I → 2 CuI + I2
Coordination chemistry
Pourbaix diagram for copper in uncomplexed media (anions other than OH- not considered). Ion concentration 0.001 m (mol/kg water). Temperature 25 °C.
Cu2+ + 2 OH → Cu(OH)2
Many other oxyanions form complexes; these include copper(II) acetate, copper(II) nitrate, and copper(II) carbonate. Copper(II) sulfate forms a blue crystalline pentahydrate, the most familiar copper compound in the laboratory. It is used in a fungicide called the Bordeaux mixture.[43]
Polyols, compounds containing more than one alcohol functional group, generally interact with cupric salts. For example, copper salts are used to test for reducing sugars. Specifically, using Benedict's reagent and Fehling's solution the presence of the sugar is signaled by a color change from blue Cu(II) to reddish copper(I) oxide.[44] Schweizer's reagent and related complexes with ethylenediamine and other amines dissolve cellulose.[45] Amino acids form very stable chelate complexes with copper(II). Many wet-chemical tests for copper ions exist, one involving potassium ferrocyanide, which gives a brown precipitate with copper(II) salts.
Organocopper chemistry
Compounds that contain a carbon-copper bond are known as organocopper compounds. They are very reactive towards oxygen to form copper(I) oxide and have many uses in chemistry. They are synthesized by treating copper(I) compounds with Grignard reagents, terminal alkynes or organolithium reagents;[46] in particular, the last reaction described produces a Gilman reagent. These can undergo substitution with alkyl halides to form coupling products; as such, they are important in the field of organic synthesis. Copper(I) acetylide is highly shock-sensitive but is an intermediate in reactions such as the Cadiot-Chodkiewicz coupling[47] and the Sonogashira coupling.[48] Conjugate addition to enones[49] and carbocupration of alkynes[50] can also be achieved with organocopper compounds. Copper(I) forms a variety of weak complexes with alkenes and carbon monoxide, especially in the presence of amine ligands.[51]
Copper(III) and copper(IV)
Copper(III) is most often found in oxides. A simple example is potassium cuprate, KCuO2, a blue-black solid.[52] The most extensively studied copper(III) compounds are the cuprate superconductors. Yttrium barium copper oxide (YBa2Cu3O7) consists of both Cu(II) and Cu(III) centres. Like oxide, fluoride is a highly basic anion[53] and is known to stabilize metal ions in high oxidation states. Both copper(III) and even copper(IV) fluorides are known, K3CuF6 and Cs2CuF6, respectively.[42]
Some copper proteins form oxo complexes, which also feature copper(III).[54] With tetrapeptides, purple-colored copper(III) complexes are stabilized by the deprotonated amide ligands.[55]
Complexes of copper(III) are also found as intermediates in reactions of organocopper compounds.[56] For example, in the Kharasch–Sosnovsky reaction.
A timeline of copper illustrates how the metal has advanced human civilization for the past 11,000 years.[57]
Prehistoric history
Copper Age
Many tools during the Chalcolithic Era included copper, such as the blade of this replica of Ötzi's axe
Copper ore (chrysocolla) in Cambrian sandstone from Chalcolithic mines in the Timna Valley, southern Israel.
Copper occurs naturally as native metallic copper and was known to some of the oldest civilizations on record. The history of copper use dates to 9000 BC in the Middle East;[58] a copper pendant was found in northern Iraq that dates to 8700 BC.[59] Evidence suggests that gold and meteoric iron (but not smelted iron) were the only metals used by humans before copper.[60] The history of copper metallurgy is thought to follow this sequence: First, cold working of native copper, then annealing, smelting, and, finally, lost-wax casting. In southeastern Anatolia, all four of these techniques appear more or less simultaneously at the beginning of the Neolithic c. 7500 BC.[61]
Copper smelting was independently invented in different places. It was probably discovered in China before 2800 BC, in Central America around 600 AD, and in West Africa about the 9th or 10th century AD.[62] Investment casting was invented in 4500–4000 BC in Southeast Asia[58] and carbon dating has established mining at Alderley Edge in Cheshire, UK, at 2280 to 1890 BC.[63] Ötzi the Iceman, a male dated from 3300–3200 BC, was found with an axe with a copper head 99.7% pure; high levels of arsenic in his hair suggest an involvement in copper smelting.[64] Experience with copper has assisted the development of other metals; in particular, copper smelting led to the discovery of iron smelting.[64] Production in the Old Copper Complex in Michigan and Wisconsin is dated between 6000 and 3000 BC.[65][66] Natural bronze, a type of copper made from ores rich in silicon, arsenic, and (rarely) tin, came into general use in the Balkans around 5500 BC.[67]
Bronze Age
Alloying copper with tin to make bronze was first practiced about 4000 years after the discovery of copper smelting, and about 2000 years after "natural bronze" had come into general use.[68] Bronze artifacts from the Vinča culture date to 4500 BC.[69] Sumerian and Egyptian artifacts of copper and bronze alloys date to 3000 BC.[70] The Bronze Age began in Southeastern Europe around 3700–3300 BC, in Northwestern Europe about 2500 BC. It ended with the beginning of the Iron Age, 2000–1000 BC in the Near East, and 600 BC in Northern Europe. The transition between the Neolithic period and the Bronze Age was formerly termed the Chalcolithic period (copper-stone), when copper tools were used with stone tools. The term has gradually fallen out of favor because in some parts of the world, the Chalcolithic and Neolithic are coterminous at both ends. Brass, an alloy of copper and zinc, is of much more recent origin. It was known to the Greeks, but became a significant supplement to bronze during the Roman Empire.[70]
Ancient and Post-classical history
Chalcolithic copper mine in Timna Valley, Negev Desert, Israel.
In Greece, copper was known by the name chalkos (χαλκός). It was an important resource for the Romans, Greeks and other ancient peoples. In Roman times, it was known as aes Cyprium, aes being the generic Latin term for copper alloys and Cyprium from Cyprus, where much copper was mined. The phrase was simplified to cuprum, hence the English copper. Aphrodite (Venus in Rome) represented copper in mythology and alchemy because of its lustrous beauty and its ancient use in producing mirrors; Cyprus was sacred to the goddess. The seven heavenly bodies known to the ancients were associated with the seven metals known in antiquity, and Venus was assigned to copper.[71]
Copper was first used in ancient Britain in about the 3rd or 2nd Century BC. In North America, copper mining began with marginal workings by Native Americans. Native copper is known to have been extracted from sites on Isle Royale with primitive stone tools between 800 and 1600.[72] Copper metallurgy was flourishing in South America, particularly in Peru around 1000 AD. Copper burial ornamentals from the 15th century have been uncovered, but the metal's commercial production did not start until the early 20th century.
The gates of the Temple of Jerusalem used Corinthian bronze treated with depletion gilding.[clarification needed][citation needed] The process was most prevalent in Alexandria, where alchemy is thought to have begun.[75] In ancient India, copper was used in the holistic medical science Ayurveda for surgical instruments and other medical equipment. Ancient Egyptians (~2400 BC) used copper for sterilizing wounds and drinking water, and later to treat headaches, burns, and itching.
Modern history
18th century copper kettle from Norway made from Swedish copper
The Great Copper Mountain was a mine in Falun, Sweden, that operated from the 10th century to 1992. It satisfied two thirds of Europe's copper consumption in the 17th century and helped fund many of Sweden's wars during that time.[76] It was referred to as the nation's treasury; Sweden had a copper backed currency.[77]
Copper is used in roofing,[14] currency, and for photographic technology known as the daguerreotype. Copper was used in Renaissance sculpture, and was used to construct the Statue of Liberty; copper continues to be used in construction of various types. Copper plating and copper sheathing were widely used to protect the under-water hulls of ships, a technique pioneered by the British Admiralty in the 18th century.[78] The Norddeutsche Affinerie in Hamburg was the first modern electroplating plant, starting its production in 1876.[79] The German scientist Gottfried Osann invented powder metallurgy in 1830 while determining the metal's atomic mass; around then it was discovered that the amount and type of alloying element (e.g., tin) to copper would affect bell tones. Flash smelting was developed by Outokumpu in Finland and first applied at Harjavalta in 1949; the energy-efficient process accounts for 50% of the world's primary copper production.[80]
The Intergovernmental Council of Copper Exporting Countries, formed in 1967 by Chile, Peru, Zaire and Zambia, operated in the copper market as OPEC does in oil, though it never achieved the same influence, particularly because the second-largest producer, the United States, was never a member; it was dissolved in 1988.[81]
Assorted copper fittings
The major applications of copper are electrical wire (60%), roofing and plumbing (20%), and industrial machinery (15%). Copper is used mostly as a pure metal, but when greater hardness is required, it is put into such alloys as brass and bronze (5% of total use).[21] For more than two centuries, copper paint has been used on boat hulls to control the growth of plants and shellfish.[82] A small part of the copper supply is used for nutritional supplements and fungicides in agriculture.[43][83] Machining of copper is possible, although alloys are preferred for good machinability in creating intricate parts.
Wire and cable
Despite competition from other materials, copper remains the preferred electrical conductor in nearly all categories of electrical wiring except overhead electric power transmission where aluminium is often preferred.[84][85] Copper wire is used in power generation, power transmission, power distribution, telecommunications, electronics circuitry, and countless types of electrical equipment.[86] Electrical wiring is the most important market for the copper industry.[87] This includes structural power wiring, power distribution cable, appliance wire, communications cable, automotive wire and cable, and magnet wire. Roughly half of all copper mined is used for electrical wire and cable conductors.[88] Many electrical devices rely on copper wiring because of its multitude of inherent beneficial properties, such as its high electrical conductivity, tensile strength, ductility, creep (deformation) resistance, corrosion resistance, low thermal expansion, high thermal conductivity, ease of soldering, malleability, and ease of installation.
For a short period from the late 1960s to the late 1970s, copper wiring was replaced by aluminium wiring in many housing construction projects in America. The new wiring was implicated in a number of house fires and the industry returned to copper.[89][90]
Electronics and related devices
Copper electrical busbars distributing power to a large building
Integrated circuits and printed circuit boards increasingly feature copper in place of aluminium because of its superior electrical conductivity; heat sinks and heat exchangers use copper because of its superior heat dissipation properties. Electromagnets, vacuum tubes, cathode ray tubes, and magnetrons in microwave ovens use copper, as do waveguides for microwave radiation.[91]
Electric motors
Copper's superior conductivity enhances the efficiency of electrical motors.[92] This is important because motors and motor-driven systems account for 43%–46% of all global electricity consumption and 69% of all electricity used by industry.[93] Increasing the mass and cross section of copper in a coil increases the efficiency of the motor. Copper motor rotors, a new technology designed for motor applications where energy savings are prime design objectives,[94][95] are enabling general-purpose induction motors to meet and exceed National Electrical Manufacturers Association (NEMA) premium efficiency standards.[96]
Copper roof on the Minneapolis City Hall, coated with patina
Old copper utensils in a Jerusalem restaurant
Copper has been used since ancient times as a durable, corrosion resistant, and weatherproof architectural material.[97][98][99][100] Roofs, flashings, rain gutters, downspouts, domes, spires, vaults, and doors have been made from copper for hundreds or thousands of years. Copper's architectural use has been expanded in modern times to include interior and exterior wall cladding, building expansion joints, radio frequency shielding, and antimicrobial and decorative indoor products such as attractive handrails, bathroom fixtures, and counter tops. Some of copper's other important benefits as an architectural material include low thermal movement, light weight, lightning protection, and recyclability.
The metal's distinctive natural green patina has long been coveted by architects and designers. The final patina is a particularly durable layer that is highly resistant to atmospheric corrosion, thereby protecting the underlying metal against further weathering.[101][102][103] It can be a mixture of carbonate and sulfate compounds in various amounts, depending upon environmental conditions such as sulfur-containing acid rain.[104][105][106][107] Architectural copper and its alloys can also be 'finished' to take on a particular look, feel, or color. Finishes include mechanical surface treatments, chemical coloring, and coatings.[108]
Copper has excellent brazing and soldering properties and can be welded; the best results are obtained with gas metal arc welding.[109]
Antibiofouling applications
Copper is biostatic, meaning bacteria and many other forms of life will not grow on it. For this reason it has long been used to line parts of ships to protect against barnacles and mussels. It was originally used pure, but has since been superseded by Muntz metal and copper-based paint. Similarly, as discussed in copper alloys in aquaculture, copper alloys have become important netting materials in the aquaculture industry because they are antimicrobial and prevent biofouling, even in extreme conditions[110] and have strong structural and corrosion-resistant[111] properties in marine environments.
Antimicrobial applications
Copper-alloy touch surfaces have natural properties that destroy a wide range of microorganisms (e.g., E. coli O157:H7, methicillin-resistant Staphylococcus aureus (MRSA), Staphylococcus, Clostridium difficile, influenza A virus, adenovirus, and fungi).[112] Some 355 copper alloys[clarification needed] were proven to kill more than 99.9% of disease-causing bacteria within just two hours when cleaned regularly.[113] The United States Environmental Protection Agency (EPA) has approved the registrations of these copper alloys as "antimicrobial materials with public health benefits";[113] that approval allows manufacturers to make legal claims to the public health benefits of products made of registered alloys. In addition, the EPA has approved a long list of antimicrobial copper products made from these alloys, such as bedrails, handrails, over-bed tables, sinks, faucets, door knobs, toilet hardware, computer keyboards, health club equipment, and shopping cart handles (for a comprehensive list, see: Antimicrobial copper-alloy touch surfaces#Approved products). Copper doorknobs are used by hospitals to reduce the transfer of disease, and Legionnaires' disease is suppressed by copper tubing in plumbing systems.[114] Antimicrobial copper alloy products are now being installed in healthcare facilities in the U.K., Ireland, Japan, Korea, France, Denmark, and Brazil[citation needed] and in the subway transit system in Santiago, Chile, where copper-zinc alloy handrails will be installed in some 30 stations between 2011 and 2014.[115][116][117]
Folk medicine
Copper is commonly used in jewelry, and according to some folklore, copper bracelets relieve arthritis symptoms.[118] In one trial for osteoarthritis and one trial for rheumatoid arthritis no differences is found between copper bracelet and control (non-copper) bracelet.[119][120] No evidence shows that copper can be absorbed through the skin. If it were, it might lead to copper poisoning.[121]
Compression clothing
Recently, some compression clothing with inter-woven copper has been marketed with health claims similar to the folk medicine claims. Because compression clothing is a valid treatment for some ailments, the clothing may have that benefit, but the added copper may have no benefit beyond a placebo effect.[122]
Other uses
Textile fibers are blended with copper to create antimicrobial protective fabrics.[123][124]
Chromobacterium violaceum and Pseudomonas fluorescens can both mobilize solid copper as a cyanide compound.[125] The ericoid mycorrhizal fungi associated with Calluna, Erica and Vaccinium can grow in metalliferous soils containing copper.[125] The ectomycorrhizal fungus Suillus luteus protects young pine trees from copper toxicity. A sample of the fungus Aspergillus niger was found growing from gold mining solution and was found to contain cyano complexes of such metals as gold, silver, copper, iron, and zinc. The fungus also plays a role in the solubilization of heavy metal sulfides.[126]
Biological role
Copper proteins have diverse roles in biological electron transport and oxygen transportation, processes that exploit the easy interconversion of Cu(I) and Cu(II).[127] Copper is essential in the aerobic respiration of all eukaryotes. In mitochondria, it is found in cytochrome c oxidase, which is the last protein in oxidative phosphorylation. Cytochrome c oxidase is the protein that binds the O2 between a copper and an iron; the protein transfers 8 electrons to the O2 molecule to reduce it to two molecules of water. Copper is also found in many superoxide dismutases, proteins that catalyze the decomposition of superoxides by converting it (by disproportionation) to oxygen and hydrogen peroxide:
• Cu2+-SOD + O2 → Cu+-SOD + O2 (reduction of copper; oxidation of superoxide)
• Cu+-SOD + O2 + 2H+ → Cu2+-SOD + H2O2 (oxidation of copper; reduction of superoxide)
The protein hemocyanin is the oxygen carrier in most mollusks and some arthropods such as the horseshoe crab (Limulus polyphemus).[128] Because hemocyanin is blue, these organisms have blue blood rather than the red blood of iron-based hemoglobin. Structurally related to hemocyanin are the laccases and tyrosinases. Instead of reversibly binding oxygen, these proteins hydroxylate substrates, illustrated by their role in the formation of lacquers.[129] The biological role for copper commenced with the appearance of oxygen in earth's atmosphere.[130] Several copper proteins, such as the "blue copper proteins", do not interact directly with substrates; hence they are not enzymes. These proteins relay electrons by the process called electron transfer.[129]
Photosynthesis functions by an elaborate electron transport chain within the thylakoid membrane. A central link in this chain is plastocyanin, a blue copper protein.
A unique tetranuclear copper center has been found in nitrous-oxide reductase.[131]
Chemical compounds which were developed for treatment of Wilson's disease have been investigated for use in cancer therapy.[132]
Dietary needs
Copper is an essential trace element in plants and animals, but not all microorganisms. The human body contains copper at a level of about 1.4 to 2.1 mg per kg of body mass.[133] Copper is absorbed in the gut, then transported to the liver bound to albumin.[134] After processing in the liver, copper is distributed to other tissues in a second phase, which involves the protein ceruloplasmin, carrying the majority of copper in blood. Ceruloplasmin also carries the copper that is excreted in milk, and is particularly well-absorbed as a copper source.[135] Copper in the body normally undergoes enterohepatic circulation (about 5 mg a day, vs. about 1 mg per day absorbed in the diet and excreted from the body), and the body is able to excrete some excess copper, if needed, via bile, which carries some copper out of the liver that is not then reabsorbed by the intestine.[136][137]
Dietary recommendations
The U.S. Institute of Medicine (IOM) updated the estimated average requirements (EARs) and recommended dietary allowances (RDAs) for copper in 2001. If there is not sufficient information to establish EARs and RDAs, an estimate designated Adequate Intake (AI) is used instead. The AIs for copper are: 200 μg of copper for 0–6-month-old males and females, and 220 μg of copper for 7–12-month-old males and females. The RDAs for copper are: 340 μg of copper for 1–3-year-old males, 440 μg of copper for 4–8-year-old males, 700 μg of copper for 9–13-year-old males, 890 μg of copper for 14–18-year-old males, and 900 μg of copper for males that are 19 years old and older. The RDAs for copper are: 340 μg of copper for 1–3-year-old females, 440 μg of copper for 4–8-year-old females, 700 μg of copper for 9–13-year-old females, 890 μg of copper for 14–18-year-old females, and 900 μg of copper for females that are 19 years old and older. The RDAs for copper are: 1,000 μg of copper for 14–50-year-old pregnant females; furthermore, 1,300 μg of copper for 14–50-year-old lactating females.[138] As for safety, the IOM also sets Tolerable upper intake levels (ULs) for vitamins and minerals when evidence is sufficient. In the case of copper the UL is set at 10 mg/day. Collectively the EARs, RDAs, AIs and ULs are referred to as Dietary Reference Intakes.[139]
The European Food Safety Authority (EFSA) refers to the collective set of information as Dietary Reference Values, with Population Reference Intake (PRI) instead of RDA, and Average Requirement instead of EAR. AI and UL defined the same as in United States. For women and men ages 18 and older the AIs are set at 1.3 and 1.6 mg/day, respectively. AIs for pregnancy and lactation is 1.5 mg/day. For children ages 1–17 years the AIs increase with age from 0.7 to 1.3 mg/day. These AIs are higher than the U.S. RDAs.[140] The European Food Safety Authority reviewed the same safety question and set its UL at 5 mg/day, which is half the U.S. value.[141]
For U.S. food and dietary supplement labeling purposes the amount in a serving is expressed as a percent of Daily Value (%DV). For copper labeling purposes 100% of the Daily Value was 2.0 mg, but as of May 27, 2016 it was revised to 0.9 mg to bring it into agreement with the RDA.[142] A table of the old and new adult Daily Values is provided at Reference Daily Intake. The original deadline to be in compliance was July 28, 2018, but on September 29, 2017 the FDA released a proposed rule that extended the deadline to January 1, 2020 for large companies and January 1, 2021 for small companies.[143]
Because of its role in facilitating iron uptake, copper deficiency can produce anemia-like symptoms, neutropenia, bone abnormalities, hypopigmentation, impaired growth, increased incidence of infections, osteoporosis, hyperthyroidism, and abnormalities in glucose and cholesterol metabolism. Conversely, Wilson's disease causes an accumulation of copper in body tissues.
Gram quantities of various copper salts have been taken in suicide attempts and produced acute copper toxicity in humans, possibly due to redox cycling and the generation of reactive oxygen species that damage DNA.[145][146] Corresponding amounts of copper salts (30 mg/kg) are toxic in animals.[147] A minimum dietary value for healthy growth in rabbits has been reported to be at least 3 ppm in the diet.[148] However, higher concentrations of copper (100 ppm, 200 ppm, or 500 ppm) in the diet of rabbits may favorably influence feed conversion efficiency, growth rates, and carcass dressing percentages.[149]
Elevated copper levels have also been linked to worsening symptoms of Alzheimer's disease.[150][151]
Human exposure
In the US, the Occupational Safety and Health Administration (OSHA) has designated a permissible exposure limit (PEL) for copper dust and fumes in the workplace as a time-weighted average (TWA) of 1 mg/m3. The National Institute for Occupational Safety and Health (NIOSH) has set a Recommended exposure limit (REL) of 1 mg/m3, time-weighted average. The IDLH (immediately dangerous to life and health) value is 100 mg/m3.[152]
Copper is a constituent of tobacco smoke.[153][154] The tobacco plant readily absorbs and accumulates heavy metals, such as copper from the surrounding soil into its leaves. These are readily absorbed into the user's body following smoke inhalation.[155] The health implications are not clear.[156]
See also
4. ^ McHenry, Charles, ed. (1992). The New Encyclopedia Britannica. 3 (15 ed.). Chicago: Encyclopedia Britannica, Inc. p. 612. ISBN 0-85229-553-7.
5. ^ "Copper". Merriam-Webster Dictionary. 2018. Retrieved 22 August 2018.
6. ^ Johnson, MD PhD, Larry E., ed. (2008). "Copper". Merck Manual Home Health Handbook. Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. Retrieved 7 April 2013.
7. ^ "Copper in human health".
8. ^ a b George L. Trigg; Edmund H. Immergut (1 November 1992). Encyclopedia of applied physics. 4: Combustion to Diamagnetism. VCH Publishers. pp. 267–272. ISBN 978-3-527-28126-8. Retrieved 2 May 2011.
9. ^ Smith, William F. & Hashemi, Javad (2003). Foundations of Materials Science and Engineering. McGraw-Hill Professional. p. 223. ISBN 0-07-292194-3.
11. ^ Resistance Welding Manufacturing Alliance (2003). Resistance Welding Manual (4th ed.). Resistance Welding Manufacturing Alliance. pp. 18–12. ISBN 0-9624382-0-0.
12. ^ Chambers, William; Chambers, Robert (1884). Chambers's Information for the People. L (5th ed.). W. & R. Chambers. p. 312. ISBN 0-665-46912-8.
13. ^ "Galvanic Corrosion". Corrosion Doctors. Retrieved 29 April 2011.
14. ^ a b Grieken, Rene van; Janssens, Koen (2005-09-27). Cultural Heritage Conservation and Environmental Impact Assessment by Non-Destructive Testing and Micro-Analysis. CRC Press. p. 197. ISBN 978-0-203-97078-2.
15. ^ " Education: Statue of Liberty: Reclothing the First Lady of Metals – Repair Concerns". Retrieved 11 April 2011.
16. ^ Rickett, B. I.; Payer, J. H. (1995). "Composition of Copper Tarnish Products Formed in Moist Air with Trace Levels of Pollutant Gas: Hydrogen Sulfide and Sulfur Dioxide/Hydrogen Sulfide". Journal of the Electrochemical Society. 142 (11): 3723–3728. doi:10.1149/1.2048404.
18. ^ "Interactive Chart of Nuclides". National Nuclear Data Center. Retrieved 8 April 2011.
19. ^ Okazawad, Hidehiko; Yonekura, Yoshiharu; Fujibayashi, Yasuhisa; Nishizawa, Sadahiko; Magata, Yasuhiro; Ishizu, Koichi; Tanaka, Fumiko; Tsuchida, Tatsuro; Tamaki, Nagara; Konishi, Junji (1994). "Clinical Application and Quantitative Evaluation of Generator-Produced Copper-62-PTSM as a Brain Perfusion Tracer for PET" (PDF). Journal of Nuclear Medicine. 35 (12): 1910–1915. PMID 7989968.
20. ^ Romano, Donatella; Matteucci, Fransesca (2007). "Contrasting copper evolution in ω Centauri and the Milky Way". Monthly Notices of the Royal Astronomical Society: Letters. 378 (1): L59–L63. arXiv:astro-ph/0703760. Bibcode:2007MNRAS.378L..59R. doi:10.1111/j.1745-3933.2007.00320.x.
21. ^ a b c d Emsley, John (11 August 2003). Nature's building blocks: an A-Z guide to the elements. Oxford University Press. pp. 121–125. ISBN 978-0-19-850340-8. Retrieved 2 May 2011.
23. ^ Randazzo, Ryan (19 June 2011). "A new method to harvest copper". Retrieved 25 April 2014.
24. ^ Gordon, R. B.; Bertram, M.; Graedel, T. E. (2006). "Metal stocks and sustainability". Proceedings of the National Academy of Sciences. 103 (5): 1209–1214. Bibcode:2006PNAS..103.1209G. doi:10.1073/pnas.0509498103. PMC 1360560. PMID 16432205.
25. ^ a b Leonard, Andrew (2 March 2006). "Peak copper?". Salon – How the World Works. Archived from the original on 7 March 2008. Retrieved 23 March 2008.
27. ^ Schmitz, Christopher (1986). "The Rise of Big Business in the World, Copper Industry 1870–1930". Economic History Review. 2. 39 (3): 392–410. doi:10.1111/j.1468-0289.1986.tb00411.x. JSTOR 2596347.
28. ^ "Copper Trends: Live Metal Spot Prices". Archived from the original on 1 May 2012.
29. ^ Ackerman, R. (2 April 2009). "A Bottom In Sight For Copper". Forbes.
31. ^ Watling, H. R. (2006). "The bioleaching of sulphide minerals with emphasis on copper sulphides — A review" (PDF). Hydrometallurgy. 84 (1): 81–108. doi:10.1016/j.hydromet.2006.05.001. Archived from the original (PDF) on 18 August 2011.
32. ^ Samans, Carl (1949). Engineering metals and their alloys. New York: Macmillan. OCLC 716492542.
33. ^ Burton, Julie McCulloch (2015-02-20). Pen to Paper: Making Fun of Life. iUniverse. ISBN 9781491753941.
34. ^ Bahadir, Ali Mufit; Duca, Gheorghe (2009-08-03). The Role of Ecological Chemistry in Pollution Research and Sustainable Development. Springer. ISBN 9789048129034.
35. ^ Green, Dan (2016-09-06). The Periodic Table in Minutes. Quercus. ISBN 9781681443294.
36. ^ "International Copper Association".
37. ^ "Overview of Recycled Copper" (25 August 2010). Retrieved on 8 November 2011.
38. ^ "Gold Jewellery Alloys". World Gold Council. Archived from the original on 14 April 2009. Retrieved 6 June 2009.
39. ^ Balver Zinn Solder Sn97Cu3 Archived 7 July 2011 at the Wayback Machine.. (PDF) . Retrieved on 8 November 2011.
40. ^ Corrosion Tests and Standards. ASTM International. 2005. p. 368.
41. ^ Oguchi, Hachiro (1983). "Japanese Shakudō: its history, properties and production from gold-containing alloys". Gold Bulletin. World Gold Council. 16 (4): 125–132. doi:10.1007/BF03214636.
42. ^ a b c Holleman, A. F.; Wiberg, N. (2001). Inorganic Chemistry. San Diego: Academic Press. ISBN 978-0-12-352651-9.
43. ^ a b Wiley-Vch (2 April 2007). "Nonsystematic (Contact) Fungicides". Ullmann's Agrochemicals. p. 623. ISBN 978-3-527-31604-5.
44. ^ Ralph L. Shriner, Christine K. F. Hermann, Terence C. Morrill, David Y. Curtin, Reynold C. Fuson "The Systematic Identification of Organic Compounds" 8th edition, J. Wiley, Hoboken. ISBN 0-471-21503-1
45. ^ Saalwächter, Kay; Burchard, Walther; Klüfers, Peter; Kettenbach, G.; Mayer, Peter; Klemm, Dieter; Dugarmaa, Saran (2000). "Cellulose Solutions in Water Containing Metal Complexes". Macromolecules. 33 (11): 4094–4107. Bibcode:2000MaMol..33.4094S. doi:10.1021/ma991893m.
46. ^ "Modern Organocopper Chemistry" Norbert Krause, Ed., Wiley-VCH, Weinheim, 2002. ISBN 978-3-527-29773-3.
47. ^ Berná, José; Goldup, Stephen; Lee, Ai-Lan; Leigh, David; Symes, Mark; Teobaldi, Gilberto; Zerbetto, Fransesco (26 May 2008). "Cadiot–Chodkiewicz Active Template Synthesis of Rotaxanes and Switchable Molecular Shuttles with Weak Intercomponent Interactions". Angewandte Chemie. 120 (23): 4464–4468. doi:10.1002/ange.200800891.
48. ^ Rafael Chinchilla & Carmen Nájera (2007). "The Sonogashira Reaction: A Booming Methodology in Synthetic Organic Chemistry". Chemical Reviews. 107 (3): 874–922. doi:10.1021/cr050992x. PMID 17305399.
49. ^ "An Addition of an Ethylcopper Complex to 1-Octyne: (E)-5-Ethyl-1,4-Undecadiene" (PDF). Organic Syntheses. 64: 1. 1986. doi:10.15227/orgsyn.064.0001. Archived from the original (PDF) on 19 June 2012.
50. ^ Kharasch, M. S.; Tawney, P. O. (1941). "Factors Determining the Course and Mechanisms of Grignard Reactions. II. The Effect of Metallic Compounds on the Reaction between Isophorone and Methylmagnesium Bromide". Journal of the American Chemical Society. 63 (9): 2308–2316. doi:10.1021/ja01854a005.
51. ^ Imai, Sadako; Fujisawa, Kiyoshi; Kobayashi, Takako; Shirasawa, Nobuhiko; Fujii, Hiroshi; Yoshimura, Tetsuhiko; Kitajima, Nobumasa; Moro-oka, Yoshihiko (1998). "63Cu NMR Study of Copper(I) Carbonyl Complexes with Various Hydrotris(pyrazolyl)borates: Correlation between 63Cu Chemical Shifts and CO Stretching Vibrations". Inorganic Chemistry. 37 (12): 3066–3070. doi:10.1021/ic970138r.
52. ^ G. Brauer, ed. (1963). "Potassium Cuprate (III)". Handbook of Preparative Inorganic Chemistry. 1 (2nd ed.). NY: Academic Press. p. 1015.
53. ^ Schwesinger, Reinhard; Link, Reinhard; Wenzl, Peter; Kossek, Sebastian (2006). "Anhydrous phosphazenium fluorides as sources for extremely reactive fluoride ions in solution". Chemistry: A European Journal. 12 (2): 438–45. doi:10.1002/chem.200500838. PMID 16196062.
54. ^ Lewis, E. A.; Tolman, W. B. (2004). "Reactivity of Dioxygen-Copper Systems". Chemical Reviews. 104 (2): 1047–1076. doi:10.1021/cr020633r. PMID 14871149.
55. ^ McDonald, M. R.; Fredericks, F. C.; Margerum, D. W. (1997). "Characterization of Copper(III)-Tetrapeptide Complexes with Histidine as the Third Residue". Inorganic Chemistry. 36 (14): 3119–3124. doi:10.1021/ic9608713. PMID 11669966.
56. ^ Greenwood, Norman N.; Earnshaw, Alan (1997). Chemistry of the Elements (2nd ed.). Butterworth-Heinemann. p. 1187. ISBN 0-08-037941-9.
57. ^ A Timeline of Copper Technologies, Copper Development Association,
58. ^ a b "CSA – Discovery Guides, A Brief History of Copper". Retrieved 12 September 2008.
59. ^ Rayner W. Hesse (2007). Jewelrymaking through History: an Encyclopedia. Greenwood Publishing Group. p. 56. ISBN 0-313-33507-9.No primary source is given in that book.
60. ^ "Copper". Retrieved 12 September 2008.
61. ^ Renfrew, Colin (1990). Before civilization: the radiocarbon revolution and prehistoric Europe. Penguin. ISBN 978-0-14-013642-5. Retrieved 21 December 2011.
62. ^ Cowen, R. "Essays on Geology, History, and People: Chapter 3: Fire and Metals". Retrieved 7 July 2009.
63. ^ Timberlake, S. & Prag A.J.N.W. (2005). The Archaeology of Alderley Edge: Survey, excavation and experiment in an ancient mining landscape. Oxford: John and Erica Hedges Ltd. p. 396.
64. ^ a b "CSA – Discovery Guides, A Brief History of Copper". CSA Discovery Guides. Retrieved 29 April 2011.
65. ^ Pleger, Thomas C. "A Brief Introduction to the Old Copper Complex of the Western Great Lakes: 4000–1000 BC", Proceedings of the Twenty-seventh Annual Meeting of the Forest History Association of Wisconsin, Oconto, Wisconsin, 5 October 2002, pp. 10–18.
66. ^ Emerson, Thomas E. and McElrath, Dale L. Archaic Societies: Diversity and Complexity Across the Midcontinent, SUNY Press, 2009 ISBN 1-4384-2701-8.
67. ^ Dainian, Fan. Chinese Studies in the History and Philosophy of Science and Technology. p. 228.
68. ^ Wallach, Joel. Epigenetics: The Death of the Genetic Theory of Disease Transmission.
70. ^ a b McNeil, Ian (2002). Encyclopaedia of the History of Technology. London ; New York: Routledge. pp. 13, 48–66. ISBN 0-203-19211-7.
71. ^ Rickard, T. A. (1932). "The Nomenclature of Copper and its Alloys". Journal of the Royal Anthropological Institute. Royal Anthropological Institute. 62: 281. doi:10.2307/2843960. JSTOR 2843960.
72. ^ Martin, Susan R. (1995). "The State of Our Knowledge About Ancient Copper Mining in Michigan". The Michigan Archaeologist. 41 (2–3): 119. Archived from the original on 7 February 2016.
73. ^ Hong, S.; Candelone, J.-P.; Patterson, C. C.; Boutron, C. F. (1996). "History of Ancient Copper Smelting Pollution During Roman and Medieval Times Recorded in Greenland Ice". Science. 272 (5259): 246–249 (247f.). Bibcode:1996Sci...272..246H. doi:10.1126/science.272.5259.246.
74. ^ de Callataÿ, François (2005). "The Graeco-Roman Economy in the Super Long-Run: Lead, Copper, and Shipwrecks". Journal of Roman Archaeology. 18: 361–372 (366–369).
75. ^ Savenije, Tom J.; Warman, John M.; Barentsen, Helma M.; van Dijk, Marinus; Zuilhof, Han; Sudhölter, Ernst J. R. (2000). "Corinthian Bronze and the Gold of the Alchemists" (PDF). Macromolecules. 33 (2): 60–66. Bibcode:2000MaMol..33...60S. doi:10.1021/ma9904870. Archived from the original (PDF) on 29 September 2007.
76. ^ Lynch, Martin (15 April 2004). Mining in World History. p. 60. ISBN 978-1-86189-173-0.
77. ^ "Gold: prices, facts, figures and research: A brief history of money". Retrieved 22 April 2011.
78. ^ "Copper and Brass in Ships". Retrieved 6 September 2016.
79. ^ Stelter, M.; Bombach, H. (2004). "Process Optimization in Copper Electrorefining". Advanced Engineering Materials. 6 (7): 558–562. doi:10.1002/adem.200400403.
80. ^ "Outokumpu Flash Smelting" (PDF). Outokumpu. p. 2. Archived from the original (PDF) on 24 July 2011.
81. ^ Karen A. Mingst (1976). "Cooperation or illusion: an examination of the intergovernmental council of copper exporting countries". International Organization. 30 (2): 263–287. doi:10.1017/S0020818300018270.
82. ^ Ryck Lydecker. "Is Copper Bottom Paint Sinking?". BoatUS Magazine. Retrieved 2016-06-03.
83. ^ "Copper". American Elements. 2008. Retrieved 12 July 2008.
84. ^ Pops, Horace, 2008, "Processing of wire from antiquity to the future", Wire Journal International, June, pp. 58–66
85. ^ The Metallurgy of Copper Wire,
86. ^ Joseph, Günter, 1999, Copper: Its Trade, Manufacture, Use, and Environmental Status, edited by Kundig, Konrad J.A., ASM International, pps. 141–192 and pps. 331–375.
87. ^ "Copper, Chemical Element – Overview, Discovery and naming, Physical properties, Chemical properties, Occurrence in nature, Isotopes". Retrieved 16 October 2012.
89. ^ "Aluminum Wiring Hazards and Pre-Purchase Inspections". Retrieved 2016-06-03.
90. ^ "Electrical Wiring FAQ (Part 2 of 2)Section - Aluminum wiring". Retrieved 2016-06-03.
91. ^ "Accelerator: Waveguides (SLAC VVC)". SLAC Virtual Visitor Center. Retrieved 29 April 2011.
92. ^ IE3 energy-saving motors, Engineer Live,
93. ^ Energy‐efficiency policy opportunities for electric motor‐driven systems, International Energy Agency, 2011 Working Paper in the Energy Efficiency Series, by Paul Waide and Conrad U. Brunner, OECD/IEA 2011
94. ^ Fuchsloch, J. and E.F. Brush, (2007), "Systematic Design Approach for a New Series of Ultra‐NEMA Premium Copper Rotor Motors", in EEMODS 2007 Conference Proceedings, 10–15 June, Beijing.
95. ^ Copper motor rotor project; Copper Development Association; "Archived copy". Archived from the original on 13 March 2012. Retrieved 2012-11-07.
96. ^ NEMA Premium Motors, The Association of Electrical Equipment and Medical Imaging Manufacturers; "Archived copy". Archived from the original on 2 April 2010. Retrieved 2009-10-12.
99. ^ Architecture, European Copper Institute; Archived 9 October 2012 at the Wayback Machine.
100. ^ Kronborg completed; Agency for Palaces and Cultural Properties, København, "Archived copy". Archived from the original on 24 October 2012. Retrieved 2012-09-12.
101. ^ Berg, Jan. "Why did we paint the library's roof?". Archived from the original on 25 June 2007. Retrieved 20 September 2007.
102. ^ Architectural considerations; Copper in Architecture Design Handbook,
103. ^ Peters, Larry E. (2004). Preventing corrosion on copper roofing systems; Professional Roofing, October 2004,
104. ^ Oxidation Reaction: Why is the Statue of Liberty Blue-Green? Engage Students in Engineering;; Chun Wu, Ph.D., Mount Marty College; Funded by the National Science Foundation (NSF) under Grant No. 083306. "Archived copy" (PDF). Archived from the original (PDF) on 25 October 2013. Retrieved 2013-10-25.
105. ^ Fitzgerald, K. P.; Nairn, J.; Atrens, A. (1998). "The chemistry of copper patination". Corrosion Science. 40 (12): 2029–50. doi:10.1016/S0010-938X(98)00093-6.
106. ^ Application Areas: Architecture – Finishes – patina;
107. ^ Glossary of copper terms, Copper Development Association (UK): "Archived copy". Archived from the original on 20 August 2012. Retrieved 2012-09-14.
108. ^ Finishes – natural weathering; Copper in Architecture Design Handbook, Copper Development Association Inc., "Archived copy". Archived from the original on 16 October 2012. Retrieved 2012-09-12.
109. ^ Davis, Joseph R. (2001). Copper and Copper Alloys. ASM International. pp. 3–6, 266. ISBN 0-87170-726-8.
110. ^ Edding, Mario E., Flores, Hector, and Miranda, Claudio, (1995), Experimental Usage of Copper-Nickel Alloy Mesh in Mariculture. Part 1: Feasibility of usage in a temperate zone; Part 2: Demonstration of usage in a cold zone; Final report to the International Copper Association Ltd.
111. ^ Corrosion Behaviour of Copper Alloys used in Marine Aquaculture. (PDF) . Retrieved on 8 November 2011.
112. ^ Copper Touch Surfaces Archived 23 July 2012 at the Wayback Machine.. Copper Touch Surfaces. Retrieved on 8 November 2011.
113. ^ a b EPA registers copper-containing alloy products, May 2008
114. ^ Biurrun, Amaya; Caballero, Luis; Pelaz, Carmen; León, Elena; Gago, Alberto (1999). "Treatment of a Legionella pneumophila‐Colonized Water Distribution System Using Copper‐Silver Ionization and Continuous Chlorination". Infection Control and Hospital Epidemiology. 20 (6): 426–428. doi:10.1086/501645. JSTOR 30141645. PMID 10395146.
115. ^ Chilean subway protected with Antimicrobial Copper – Rail News from Archived 24 July 2012 at the Wayback Machine.. Retrieved on 8 November 2011.
116. ^ Codelco to provide antimicrobial copper for new metro lines (Chile)[dead link]. Retrieved on 8 November 2011.
117. ^ PR 811 Chilean Subway Installs Antimicrobial Copper Archived 23 November 2011 at the Wayback Machine.. (PDF). Retrieved on 8 November 2011.
118. ^ Walker, W. R.; Keats, D. M. (1976). "An investigation of the therapeutic value of the 'copper bracelet'-dermal assimilation of copper in arthritic/rheumatoid conditions". Agents and actions. 6 (4): 454–9. PMID 961545.
119. ^ Richmond SJ, Gunadasa S, Bland M, Macpherson H (2013). "Copper bracelets and magnetic wrist straps for rheumatoid arthritis--analgesic and anti-inflammatory effects: a randomised double-blind placebo controlled crossover trial". PLoS ONE. 8 (9): e71529. Bibcode:2013PLoSO...871529R. doi:10.1371/journal.pone.0071529. PMC 3774818. PMID 24066023.
120. ^ Richmond, Stewart J.; Brown, Sally R.; Campion, Peter D.; Porter, Amanda J. L.; Moffett, Jennifer A. Klaber; Jackson, David A.; Featherstone, Valerie A.; Taylor, Andrew J. (2009). "Therapeutic effects of magnetic and copper bracelets in osteoarthritis: A randomised placebo-controlled crossover trial". Complementary Therapies in Medicine. 17 (5–6): 249–256. doi:10.1016/j.ctim.2009.07.002. ISSN 0965-2299. PMID 19942103.
121. ^ University of Arkansas for Medical Sciences:
Find the Truth Behind Medical Myths Archived 6 January 2014 at the Wayback Machine.
While it's never been proven that copper can be absorbed through the skin by wearing a bracelet, research has shown that excessive copper can result in poisoning, causing vomiting and, in severe cases, liver damage.
122. ^ Truth in Advertising
Tommie Copper
123. ^ "Copper and Cupron". Cupron.[unreliable source?]
124. ^ Ergowear, Copper antimicrobial yarn technology used in male underwear[unreliable source?]
128. ^ "Fun facts". Horseshoe crab. University of Delaware. Retrieved 13 July 2008.
129. ^ a b S. J. Lippard, J. M. Berg "Principles of bioinorganic chemistry" University Science Books: Mill Valley, CA; 1994. ISBN 0-935702-73-3.
130. ^ Decker, H. & Terwilliger, N. (2000). "COPs and Robbers: Putative evolution of copper oxygen-binding proteins". Journal of Experimental Biology. 203 (Pt 12): 1777–1782. PMID 10821735.
131. ^ Schneider, Lisa K.; Wüst, Anja; Pomowski, Anja; Zhang, Lin; Einsle, Oliver (2014). "Chapter 8. No Laughing Matter: The Unmaking of the Greenhouse Gas Dinitrogen Monoxide by Nitrous Oxide Reductase". In Peter M.H. Kroneck; Martha E. Sosa Torres. The Metal-Driven Biogeochemistry of Gaseous Compounds in the Environment. Metal Ions in Life Sciences. 14. Springer. pp. 177–210. doi:10.1007/978-94-017-9269-1_8.
132. ^ Denoyer, Delphine; Clatworthy, Sharnel A. S.; Cater, Michael A. (2018). "Chapter 16. Copper Complexes in Cancer Therapy". In Sigel, Astrid; Sigel, Helmut; Freisinger, Eva; Sigel, Roland K. O. Metallo-Drugs: Development and Action of Anticancer Agents. 18. Berlin: de Gruyter GmbH. pp. 469–506. doi:10.1515/9783110470734-022.
133. ^ a b "Amount of copper in the normal human body, and other nutritional copper facts". Retrieved 3 April 2009.
134. ^ Adelstein, S. J.; Vallee, B. L. (1961). "Copper metabolism in man". New England Journal of Medicine. 265 (18): 892–897. doi:10.1056/NEJM196111022651806.
135. ^ M C Linder; Wooten, L.; Cerveza, P.; Cotton, S.; Shulze, R.; Lomeli, N. (1 May 1998). "Copper transport". The American Journal of Clinical Nutrition. 67 (5): 965S–971S. PMID 9587137.
136. ^ Frieden, E.; Hsieh, H. S. (1976). "Ceruloplasmin: The copper transport protein with essential oxidase activity". Advances in Enzymology and Related Areas of Molecular Biology. Advances in Enzymology - and Related Areas of Molecular Biology. 44: 187–236. doi:10.1002/9780470122891.ch6. ISBN 978-0-470-12289-1. JSTOR 20170553. PMID 775938.
137. ^ S. S. Percival; Harris, E. D. (1 January 1990). "Copper transport from ceruloplasmin: Characterization of the cellular uptake mechanism". American Journal of Physiology. Cell Physiology. 258 (1): C140–6. doi:10.1152/ajpcell.1990.258.1.c140. PMID 2301561.
138. ^ Dietary Reference Intakes: RDA and AI for Vitamins and Elements Food and Nutrition Board, Institute of Medicine, National Academies Press, 2011. Retrieved 18 April 2018.
143. ^ "Changes to the Nutrition Facts Panel - Compliance Date"
144. ^ Bonham, Maxine; O'Connor, Jacqueline M.; Hannigan, Bernadette M.; Strain, J. J. (2002). "The immune system as a physiological indicator of marginal copper status?". British Journal of Nutrition. 87 (5): 393–403. doi:10.1079/BJN2002558. PMID 12010579.
145. ^ Li, Yunbo; Trush, Michael; Yager, James (1994). "DNA damage caused by reactive oxygen species originating from a copper-dependent oxidation of the 2-hydroxy catechol of estradiol". Carcinogenesis. 15 (7): 1421–1427. doi:10.1093/carcin/15.7.1421. PMID 8033320.
146. ^ Gordon, Starkebaum; John, M. Harlan (April 1986). "Endothelial cell injury due to copper-catalyzed hydrogen peroxide generation from homocysteine". J. Clin. Invest. 77 (4): 1370–6. doi:10.1172/JCI112442. PMC 424498. PMID 3514679.
147. ^ "Pesticide Information Profile for Copper Sulfate". Cornell University. Retrieved 10 July 2008.
148. ^ Hunt, Charles E. & William W. Carlton (1965). "Cardiovascular Lesions Associated with Experimental Copper Deficiency in the Rabbit". Journal of Nutrition. 87 (4): 385–394. PMID 5841854.
149. ^ Ayyat M.S.; Marai I.F.M.; Alazab A.M. (1995). "Copper-Protein Nutrition of New Zealand White Rabbits under Egyptian Conditions". World Rabbit Science. 3 (3): 113–118. doi:10.4995/wrs.1995.249.
150. ^ Brewer GJ. Copper excess, zinc deficiency, and cognition loss in Alzheimer's disease. BioFactors. March 2012;38(2):107–113. doi:10.1002/biof.1005. PMID 22438177.
151. ^ "Copper: Alzheimer's Disease". Retrieved 21 June 2015.
152. ^ "NIOSH Pocket Guide to Chemical Hazards #0150". National Institute for Occupational Safety and Health (NIOSH).
153. ^ OEHHA Copper
156. ^ David Bernhard, Andrea Rossmann, and Georg Wick Metals in Cigarette Smoke, IUBMB Life, 57(12): 805–809, December 2005
Pourbaix diagrams for copper
Copper in water pourbiax diagram.png
Copper in sulphide media pourbiax diagram.png
Copper in 10M ammonia pourbiax diagram.png
Copper in chloride media more copper pourbiax.png
in pure water, or acidic or alkali conditions. Copper in neutral water is more noble than hydrogen. in water containing sulfide in 10 M ammonia solution in a chloride solution
Further reading
External links
|
global_01_local_1_shard_00001926_processed.jsonl/37357
|
Public holidays in Romania
From Wikipedia, the free encyclopedia
(Redirected from Holidays in Romania)
Jump to navigation Jump to search
Following is a list of holidays in Romania.
Official non-working holidays[edit]
Date Local name English name Remarks
January 1/2 Anul Nou New Year
January 24 Unirea Principatelor Române/Mica Unire Union Day/Small Union It celebrates the unification of the Romanian Principalities of Moldavia and Wallachia in 1859, and the foundation of the Romanian modern state.[1] A day off since 2017.
April/May Paștele Easter The official holiday is the Orthodox Easter. The holiday is three days long, Good Friday,[2] Easter Sunday and Monday are non-working, Tuesday is not a public holiday.
May 1 Ziua Muncii Labour Day International Labour Day
June 1 Ziua Copilului Children's Day Public Holiday starting with 2017[3]
May/June (27 May in 2018) Rusaliile Pentecost, Whit Monday The 50th and 51st day after the Orthodox Easter.
August 15 Adormirea Maicii Domnului/Sfânta Maria Mare Dormition of the Theotokos Also the Day of the Romanian Naval Forces since St. Mary is the patron saint of the Navy.
November 30 Sfântul Andrei St. Andrew's Day Saint Andrew is the patron saint of Romania.
December 1 Ziua Națională/Ziua Marii Uniri National Day/Great Union It celebrates the union of Transylvania with Romania.
December 8 Constitution Day Date when the referendum on the Romanian Constitution was held in 1991 thus establishing the first democratic republic.
December 25/26 Crăciunul Christmas Both first and second Christmas Day are holidays. Third Christmas Day is not a public holiday.
Other working holidays and observances[edit]
Date Name Remarks
February 19 Brâncuși Day[4] Not a public holiday.
March 8 Women's Day Observes women's day[5]
Last Sunday in March Earth Hour Not a public holiday
First Sunday in April NATO Day Not a public holiday – observed by the Government institutions
April 22 Earth Day Not a public holiday
May 9 Independence Day[6]/Victory Day/Europe Day It celebrates Romania's proclamation of independence during the war against the Ottoman Empire in 1877-1878, concluded with the recognition of Romania's independence. Romania celebrates the capitulation of Nazi Germany in 1945. Also, starting 2007, Romania observes Europe Day.
May 10 King's Day Not a public holiday - celebrates the crowning of Carol I as its first king, as well as all the kings of the Romanian monarchy.
May/June Heroes' Day/Ascension The 40th day from the Orthodox Easter. Not a public holiday - observed with military and religious festivities at the monuments dedicated to the national heroes (such as the Tomb of the Unknown Soldier)
June 26 National Flag Day Not a public holiday
July 29 National Anthem Day Date when Deşteaptă-te, române! was first performed, in 1848 at Râmnicu Vâlcea - not a public holiday
August 23 Liberation from Fascist Occupation Day/Day of Remembrance of the Victims of Fascism and Communism National holiday between 1949 and 1990. On 23 August 1944, King Michael I joined with pro-Allied opposition politicians and led a successful coup against Conducător of Romania, Marshal Ion Antonescu's fascist government. Romania joins the Allies and participates alongside the Red Army in liberating Hungary, Czechoslovakia and Austria from Nazi occupation. Since 2011, Romania observes the European Day for Commemoration of the Victims of Totalitarian and Authoritarian regimes, also as a reminder of the Molotov-Ribbentrop pact signed on this day in 1939 – which resulted in Romania losing most of the region that is now Moldova and parts of Ukraine (see Soviet occupation of Bessarabia and Northern Bukovina).
October 25 Armed Forces Day Not a public holiday. Observed by the Romanian Army and its veterans on the anniversary of the liberation of Carei, the last Romanian city under horthyst-fascist occupation during World War II. Also the birthday of King Michael I
November 14 Dobrogea Day Date which celebrates the integration of Northern Dobruja into Romania in 1878.
November 19 Men's Day Observes men's day[5]
November 28 Bucovina Day Date which celebrates the Union of Bucovina with Romania in 1918.
December 21 Day of Remembrance of the Victims of Communism in Romania Marks the peak of the victorious Romanian Revolution of 1989 and commemorates the victims who fell in the violent street confrontations between 16 and 27 December.
Traditional holidays - working observances[edit]
Date Name Remarks
February 24 Dragobetele Similar to St. Valentine's Day
March 1 Mărțișorul Spring festival
1. ^ "Legea prin care 24 ianuarie a fost declarată zi liberă nelucrătoare a fost promulgată de Iohannis". Mediafax (in Romanian). 7 October 2016. Retrieved 7 October 2016.
2. ^ "Iohannis a promulgat legea prin care Vinerea Mare este sărbătoare legală nelucrătoare". Mediafax (in Romanian). 12 March 2018. Retrieved 16 March 2018.
3. ^ Inteligo. "Din 2017, salariații vor sta acasă și de Ziua Copilului. 1 iunie, inclusă de azi pe lista liberelor legale". Retrieved 2017-01-02.
5. ^ a b "Legea nr. 22/2016 - declararea zilei de 8 martie — Ziua femeii si 19 noiembrie — Ziua bărbatului". Retrieved 30 September 2017.
6. ^ Cristea, Irina Andreea (9 May 2018). "9 Mai - Ziua Independenţei de Stat a României". (in Romanian). Agerpres. Retrieved 10 May 2018.
External links[edit]
|
global_01_local_1_shard_00001926_processed.jsonl/37358
|
Hong Kong English pop
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Hong Kong English pop (Chinese: 英文歌) are English language songs that are made, performed and popularised in Hong Kong. It is known as simply English pop by Hong Kong people. The height of the English pop era in Hong Kong was from the 1950s to mid 1970s.[1]
As English was the only official language from 1843 to 1974 in Hong Kong, it was spoken widely, especially in formal context, by Hongkongers in the 20th century.[2] As a result, pop songs performed in English language were very popular among both ethnic Chinese and British Hong Kong citizens.
Many of the bandleaders and musicians were Filipinos. Lobing Samson, who led the house band at Ciro's for many years, later made his way to Hong Kong as did Fred Carpio, Vic Cristobal and many others.[1]
In 1951, Frankie Laine recorded "Rose, Rose, I Love You" in Hong Kong, which is an English version of the popular Chinese song Mei gui mei gui wo ai ni composed by Chen Gexin (陳歌辛), and first recorded by Yao Lee in Shanghai 1940s.[1] In 1959 Tsai Chin recorded an English version of Yao Min's "The Second Spring", which featured in the London stage musical The World of Suzie Wong.[1]
Imported pop music in English language from the West such as The Beatles, Elvis Presley and Johnny Mathis enjoyed much popularity in the city.[3] Inspired by many imported pop music from the West, Hong Kong artists started to produce Hong Kong’s own pop music in English in the 1960s. The Kontinentals, a schoolboy band originating at King George V School, is often credited with being the first Hong Kong band to record original compositions in the style of British pop of the early 1960s. Lead singer and bassist Anders Nelsson and lead guitarist Roy Davenport, composed I Still Love You and I Think of Her, respectively, and the songs were chart-topping hits on the indie Orbit Records label owned by British jazz singer Gery Scott.
Prior to this most English-language recordings in the British Colony had been so-called cover versions and with a few exceptions this trend continued in the 1960s. Nelsson continued as a singer songwriter with subsequent bands on the Diamond Music label and hits included Out of Sight, Out of Mind, Missing You and How Do You Do. Nelsson later resurfaced in the early 1970s with a band called Ming which recorded mostly his own compositions, including Reasons Why, Never Coming Home and U 'n I. After the band broke up in 1976 Nelsson joined the label as a producer, eventually working his way up to A&R Manager. He left three years later to start his own company which managed and produced artists such as Louie Castro and Rowena Cortes, recording both in English and Cantonese. Teddy Robin and his band Teddy Robin and the Playboys (biggest hits Lies and You Can't Grow Peaches on a Cherry Tree), Joe Junior with his band The Side-Effects (biggest hits Here's A Heart, Letter To Susan) and Irene Ryder were some of the successful artistes. They mostly came to fame in the latter half of the 1960s. DJ 'Uncle' Ray Cordeiro of local government station RTHK's Radio 3 English-language service is credited with heavily promoting and nurturing Hong Kong's English-language pop scene, and the same station's Chinese channels also featured a programme called 'Listen to song, learn English', which also enhanced the popularity of the genre. Such programmes have been credited with being one of the reasons for a high standard of spoken English in the 1960s and 1970s in Hong Kong.
Other Hong Kong English Pop artistes include Judi Jim (詹小屏), D'Topnotes- 3 of their members include lead singer and bass player Christine Samson, drummer Michael Samson, singer Vikki Samson are the children of bandleader Lobing Samson, Michael Remedios and The Mystics, Danny Diaz & The Checkmates. Based in hotels and ballrooms, HK nightclubs featured both Filipino and Chinese dance bands often fronted by local female singers. At the upper end of the market, Rebecca Pan, Mona Fong (方逸華) and Kiang Ling (江玲) became well known for their mixed Mandarin and English repertoires.[1] Diamond Records also became an independent HK label established in 1960, issuing albums in Mandarin and English originals.[1] Pathé Records (Hong Kong) followed suit with a series of albums on the Columbia and Pathé labels by Chang Loo (張露), Betty Chung (鍾玲玲), Billie Tam (蓓蕾), Judy Jim (詹小屏) and Irene Ryder. And in 1968, Paul Leung (梁寶耳) produced one of the more remarkable bilingual albums of the 1960s.[1]
Other bands include Giancarlo and his Italian Combo, The Corsairs, The Reynettes and The Fabulous Echoes, Mystics, the Zoundcrackers, the Downbeats, and the Side Effects, Mod East, Sons of Han, The Menace, Anders Nelsson, the Inspirations, The Menace and Joe Chen, The Black Jacks, The Quests (Mr. Rainbow) as well as folk songs by artists including Buddy Wong, the Willows, the Nautics, the Swinging Monstrels, The Young Men, the Gabriels.[1] and The Thunderbirds by Robert Lee.[4][5]
Imported pop music in English language from the West remained very popular in the territory.[3] Locally, Wynners, Roman and the Four Steps, Rowena Cortes, Teresa Carpio, Frances Yip, Albert Au, Chelsia Chan, Agnes Chan, Chopstick Sisters with Sandra Lang and Lotus featuring Samuel Hui and Ming, a band formed by Anders Nelsson and recording his compositions, were some of the notable examples. Other artistes who performed in English include Maria Cordero, Gracie Rivera, The Young Men, etc.
A Midsummer Night Festival concert at City Hall featured a mixed line-up of English and Mandarin acts, with tickets ranging from HK$10–20 featuring Mike Remedios, The Ripples, Chin Wai (秦淮), Joe Chen (陳任), William Chan (陳威廉), Peter Chan (陳浩德), Ko Siu-Hung (高小紅), Paula Tsui, Elaine Sun (孫泳恩), Stella Chee (奚秀蘭), Fung Wai-tong (馮偉棠), Shu Ya Chung (舒雅頌), Derek Cheng (張皓暉), Pau Lap (鮑立), Annie Chung (鍾安妮), Jennie Chung (鍾珍妮), all accompanied by Celso Cristobal and His Jacks.[1] As we all know, many of these stars were extremely famous throughout Asian history. Good examples would be Annie Chung (鍾安妮),and Jennie Chung (鍾珍妮). This sister duet- also known as Chung Sisters, have made significance to TVB and EYT, as we saw them on TV every night.
The rise of Cantopop attracted some of the aforementioned artistes or band members moved to/went solo in Cantopop in 1980s, such as Rowena Cortes, Kenny Bee and Alan Tam of The Wynners, Roman Tam of Roman and the Four Steps. Beyond, formed in 1983 and later achieved decades long unparalleled success in Hong Kong, released some of their early works in English, such as their "Long Way Without Friends" and "Myth". The Citybeat was formed in the 1980s and achieved brief moderate success before moving to Cantopop.
Today, pop music in English language remains popular among Hongkongers, second only to C-pop. While most Hong Kong artists now sing primarily in Cantonese, it is still very common for Hong Kong artists to include English tracks in their albums. Some artists produces more English works than others, artists who produced substantial works in English include Wakin Chau, Chet Lam, Janice Vidal, The Pancakes, Ghost Style, etc.
Kelly Chen released the English language single Lover's Concerto in 1998,and that was popular in South Korea 1999. Faye Wong released the English language single Eyes on Me in Japan and later North America[6] as the theme song of Final Fantasy VIII which received globe exposure and critical acclaim. <dr chan] released English album Touch of Love in 2000. Teresa Carpio collaborated with the Hong Kong Philharmonic Orchestra in 2003 and performed series of concerts and released a double disk English album.
Other artists who are fluent in English include Coco Lee, Janice Vidal, Jill Vidal, Kelly Chen, Karen Joy Morris, Astor Fong, Fiona Sit, Edison Chen, Justin Lo, Kary Ng, Stephanie Cheng, Julio Acconci and Dino Acconci of Soler.
On the other hand, there has been a revival of the use of the language among indie bands and alternative musicians, English has once again become the language of choice among bands such as Innisfallen, Hard Candy, 22 Cats, My Little Airport, Audiotraffic, etc.[1]
There is a surge in popularity with Hong Kong singers releasing audiophile CDs in English. The popular audiophile singers include Astor Fong, Susan Wong, Anders Nelsson and Mimi Lo. These audiophile CDs are mostly cover version of Jazz numbers or easy listening. Concerts and club gigs featuring Anders Nelsson, Teresa Carpio, Joe Junior and other singers from the 1960s and 1970s performing in English have been well attended. Some of these performances have been nostalgia concerts featuring hits from those decades but the trend is towards adding jazz and swing standards and rearranged versions of old hits to reflect the international popularity of light jazz.[citation needed]
The most recent of Hong Kong's English Pop Stars to rise to fandom is rapper and Hong Kong local Lucas Scibetta, oft referred to by his copatriots and fellow gangbangers as "SkiBs the Kid". His rise to fame followed the release of his hit single Hong Kong Kids,[7] a beat-heavy anthem calling the children of Hong Kong to unite and "give it up" because they "don't give a fuck".[8] The video was viewed 35,000 times within the first fortnight of its release,[7] and shortly thereafter anglophone Scibetta amassed a cult following of minors and teenage girls who strongly believed in Scibetta's message of world peace and economic prosperity in times of hardship.[9] The Hong Kong Kids music video received a fair share of controversy,[10] several commentators upset about producer (and Hong Kong native) Barton Chan's (stagename DXL) lack of proper garments throughout the entirety of the video.[11] The true meaning behind the lyrics of the song have been hotly debated by locals and foreigners alike; many have suggested that his lyrics allude to the plight of the common man, while others say that such interpretation bears too deep into the lyrics, which they believe are simply about drug abuse and reckless conduct.[12]
See also[edit]
1. ^ a b c d e f g h i j Hong Kong Institute of Education. "HKIedu." Article. Retrieved on 25 June 2008.
2. ^ Chan Yuen-Ying (2000) The English-language media in Hong Kong World Englishes 19 (3) , 323–335 doi:10.1111/1467-971X.00182, Journalism and Media Studies Centre, The University of Hong Kong
4. ^ Web UK Online, Bruce Lee Articles In The Shadow Of A Legend – Robert Lee Remembers Bruce Lee by Steve Rubinstein
5. ^ Trans World 60's Punk Hong Kong 60s Re-capture
6. ^ Maeda, Yoshitake (1999). Final Fantasy VIII Original Soundtrack (Limited Edition). DigiCube.
7. ^ a b http://www.scmp.com/news/hong-kong/article/1050429/expat-rapper-lucas-scibetta-causes-row-hong-kong-kids-video
8. ^ https://www.youtube.com/watch?v=I0Ut8hg0ZVk
9. ^ "Hong Kong teen rapper SkiBs walks his own way". South China Morning Post. Retrieved 2016-04-04.
10. ^ http://www.scmp.com/lifestyle/arts-culture/article/1271020/hong-kong-teen-rapper-skibs-walks-his-own-way
11. ^ https://www.youtube.com/all_comments?v=I0Ut8hg0ZVk
12. ^ http://hongwrong.com/hong-kong-kids/
|
global_01_local_1_shard_00001926_processed.jsonl/37359
|
Municipal borough
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Municipal borough
CategoryLocal government district
LocationEngland and Wales, Republic of Ireland, Northern Ireland
Found inAdministrative county
Created byMunicipal Corporations Act 1835 (England and Wales)
Municipal Corporations (Ireland) Act 1840 (Ireland)
Abolished byLocal Government Act 1972 (England and Wales)
Local Government (Boundaries) Act (Northern Ireland) 1971 (Northern Ireland)
Local Government Act 2001 (Republic of Ireland)
Abolished1974 (England and Wales)
1973 (Northern Ireland)
2002 (Republic of Ireland)
Possible typesCounty borough
Non-county borough
Possible statusCity
Royal borough
GovernmentMunicipal corporation
Municipal boroughs were a type of local government district which existed in England and Wales between 1835 and 1974, in Northern Ireland from 1840 to 1973 and in the Republic of Ireland from 1840 to 2002. Broadly similar structures existed in Scotland from 1833 to 1975 with the reform of royal burghs and creation of police burghs.
England and Wales[edit]
Municipal Corporations Act 1835[edit]
Boroughs had existed in England and Wales since mediæval times. By the late Middle Ages they had come under royal control, with corporations established by royal charter. These corporations were not popularly elected: characteristically they were self-selecting oligarchies, were nominated by tradesmen's guilds or were under the control of the lord of the manor. A Royal Commission was appointed in 1833 to investigate the various borough corporations in England and Wales. In all 263 towns were found to have some form of corporation created by charter or in existence by prescription. The majority had self-elected common councils, whose members served for life. Where there was an election, the incumbent members of the corporation often effectively nominated the electorate. Eleven boroughs were manorial court leets.[1] Following the report of the royal commission, legislation was introduced to reform borough corporations.
The Municipal Corporations Act 1835 provided for a reformed form of town government, designated a municipal borough. The Act introduced a uniform system of town government in municipal boroughs, with an elected town council, consisting of a mayor, aldermen and councillors to oversee many local affairs. The legislation required all municipal corporations to be elected according to a standard franchise, based on property ownership. The Act reformed 178 boroughs. At the same time, a procedure was established whereby the inhabitant householders of a town could petition the Crown via the privy council to grant a charter of incorporation, constituting the area a municipal borough.[2] The attempts to incorporate large industrial towns such as Birmingham, Bolton, Manchester and Sheffield by Whig and Radical "incorporationists" were bitterly contested by Tory "anti-incorporationists".[3] The Tory objections to the legality of the charters led to them boycotting elections to the new boroughs until the enactment of the Borough Charters Confirmation Act 1842.[4]
A number of further acts of parliament[which?] amended the 1835 legislation. All of these were repealed and replaced by the Municipal Corporations Act 1882. The 1882 Act and the consolidating Local Government Act 1933 provided the statutory basis for municipal boroughs up to their abolition. An important change in the 1933 legislation removed the right to petition for incorporation from inhabitant householders. In future, petitions could only be made by existing urban or rural district councils.[5]
The boroughs unreformed by the Act were not immediately abolished. Several of them subsequently sought new charters as municipal boroughs; those that did not were finally abolished in 1887 by the Municipal Corporations Act 1886. Only the City of London Corporation survived as a local authority in an unreformed state; the City undertook a major reform of its democratic structure in 2005.
In 1873 the Association of Municipal Corporations was formed to represent the interests of the boroughs collectively; its membership included both county and non-county boroughs. The AMC was later to be a strong advocate for expanding county boroughs and unitary local government, and it was to the annual conference of the AMC in 1965 that Richard Crossman called for a reform of all local government. This speech eventually led to the Redcliffe-Maud Report recommending large unitary councils for all England.[6]
Corporation and council[edit]
Each municipal borough possessed a corporation uniformly designated as the Mayor, Aldermen, and Burgesses of the town. The only exception was where the borough enjoyed city status; in this case "burgesses" became "citizens". In a handful of cities the chief magistrate was granted the further dignity of lord mayor.
The corporation was a body corporate with perpetual succession, and included all registered electors or "burgesses" of the borough. However, the actual administration was carried out by a town council, which was in effect a committee representative of the community at large. All those eligible to vote were entered in the "burgess roll", which was compiled by the town clerk annually.[7]
Town councils[edit]
The town council of each municipal borough consisted of a mayor, aldermen and councillors. The councillors were directly elected by the burgesses for a three-year term, with one third of their membership retiring each year. Boroughs with a population of more than 6,000 were divided into wards with separate elections held in each ward annually.[8] One quarter of the council were aldermen, who were elected by the council for a six-year term. Half of the aldermen were elected every third year at the council's annual meeting. It was originally envisaged that the council would choose persons from outside of the municipal body. In practice, however, the aldermanic benches were almost exclusively filled by the promotion of long-serving councillors.[7] The mayor of the borough was elected for a one-year term, although he was eligible for re-election indefinitely. Under the original legislation the mayor was required to be a councillor or alderman. The Municipal Corporations Act 1882 empowered the council to elect any suitably qualified inhabitant of the borough as mayor. However, the mayoralty continued to be almost universally conferred on a senior alderman or councillor.[7]
Municipal elections were originally held on 1 November, with the mayoral election and filling of aldermanic vacancies on 9 November . Elections were cancelled during the First and Second World Wars, and the November 1948 elections were postponed until May 1949. From that date municipal elections were held on the second Thursday of May.[9] In view of the forthcoming local government reorganisation, the 1972 elections were rescheduled to 4 May, with no elections in 1973 and all sitting councillors and aldermen holding their seats until midnight on 31 March 1974.[10]
County and non-county boroughs[edit]
In 1889, the Local Government Act 1888 created county councils across England and Wales. Boroughs were divided into two sorts, with some becoming county boroughs which were entirely self-governing and independent from county council administration.
The non-county boroughs had more limited powers of self-government, and shared power with county councils. In 1894, towns which had not been incorporated as boroughs became urban districts with similar powers to municipal boroughs.
The title of 'borough' was considered to be more dignified than 'urban district', and so many larger urban districts petitioned to be granted the status of a municipal borough, and many were granted this right. Borough status did not substantially increase local government powers, although municipal boroughs above a certain size had the right to run primary education.
Under the Local Government Act 1958, small municipal boroughs could be absorbed by surrounding rural districts to become rural boroughs, with the powers of a parish council. Seven small boroughs in Cornwall, Devon and Shropshire underwent this process.
The remaining municipal boroughs, of which there were over 200, were abolished on 1 April 1974 by the Local Government Act 1972. In England, they were replaced by metropolitan or non-metropolitan districts and in Wales by districts.
In most cases the civic privileges and coat of arms of the abolished boroughs were inherited by one of the new local authorities. District councils were permitted to apply for a charter to receive borough status, while small municipal boroughs became successor parishes with town councils headed by a town mayor. In a few cases charter trustees, a special committee of district councillors, were formed to pepetuate the mayoralty of a town or city.
Ireland 1840–1922[edit]
The Municipal Corporations (Ireland) Act 1840 followed the example of the legislation in England and Wales. Unlike the 1835 Act, the Irish Act abolished nearly all of the country's boroughs, reforming just 10. Inhabitants of the larger of the abolished boroughs or of any town with a population of 3,000 could petition the crown for incorporation under the Act. In the event, only one additional borough was created when Wexford received a charter of incorporation in 1846.[11] The corporation and town council was identical in constitution to the English boroughs, and each borough was divided into wards with three, six or nine councillors per ward and one alderman for every three councillors.[12]
The Local Government (Ireland) Act 1898 designated the six largest municipalities (Belfast, Cork, Dublin, Limerick, Derry and Waterford) as county boroughs. The Local Government (Ireland) Act 1919 introduced a system of proportional representation into municipal elections. Wards were replaced by electoral areas, and the entire council was to be elected triennially. Separate elections of aldermen and councillors were ended, with all members of the council elected by popular vote. One quarter of the elected members were entitled to the title of "alderman", which was used to designate the first candidates elected in each area. The remaining successful candidates being "councillors".[13]
On partition in 1922, two boroughs were included in Northern Ireland, and nine in the Irish Free State.
Northern Ireland[edit]
On establishment, Northern Ireland contained only the county boroughs of Belfast and Londonderry. The Parliament of Northern Ireland abolished proportional representation in local government elections in 1922, and amended the 1840 Act in 1926, allowing urban districts to petition the Governor for a charter of incorporation.[14][15] Accordingly, by 1972 the number of boroughs had increased to 12 in number.
The system of local government was reorganised in 1973, with 26 local government districts replacing all county and municipal boroughs as well as urban and rural districts. The city or borough status conferred by the municipal charters passed to the new district councils.[16]
Irish Free State and the Republic of Ireland[edit]
Nine boroughs (four county boroughs and five municipal boroughs) were included in the territory of the Irish Free State in 1922. Two new boroughs were created by statute. In 1930, the borough of Dún Laoghaire was created by the amalgamation of the four urban districts of Blackrock, Dalkey, Dún Laoghaire, and Killiney and Ballybrack in County Dublin.[17] This borough was later abolished under the Local Government (Dublin) Act, 1993.[18] In 1937 the town of Galway was reconstituted as a municipal borough.[19]
The Local Government Act 2001 abolished municipal boroughs. County boroughs were replaced by statutory "cities", while the title of "borough" was retained for the other towns holding the status.[20]
See also[edit]
1. ^ Joseph Fletcher, Statistics of the Municipal Institutions of the English Towns in Journal of the Statistical Society of London, Vol. 5, No. 2, (Jul., 1842), pp. 97-168
2. ^ Municipal Corporations Act 1835 (C.76) S.141
3. ^ Nicholas C Edsall, Varieties of Radicalism: Attwood, Cobden and the Local Politics of Municipal Incorporation, in The Historical Journal, Vol. 16, No. 1, (March 1973), pp. 93-107
4. ^ 1842 C.111
5. ^ Local Government Act 1933 (C.51), S.129
6. ^ Bruce Wood, "The Process of Local Government Reform 1966-74", George Allen & Unwin, 1976, p. 19.
7. ^ a b c Albert Shaw, Municipal Government in Great Britain, in Political Science Quarterly, Vol4, No.2, June 1889, pp. 197-229
8. ^ G B A M Finlayson, The Politics of Municipal Reform, 1835, in The English Historical Review, Vol.81, No.321, (October 1966), pp.673-692
9. ^ The Municipal Elections, The Times, 13 May 1949 p.3
10. ^ The Times, 5 May 1972
11. ^ "History of Borough Council". Wexford Borough Council. Archived from the original on 19 November 2007. Retrieved 2008-07-14.
12. ^ Municipal Corporations (Ireland) Act 1840 C.108
13. ^ Local Government (Ireland) Act 1919 C.19
14. ^ Review of Legislation 1922, Journal of Comparative Legislation and International Law, Third Series, Vol. 6, No. 3 (1924)
15. ^ Municipal Corporations Act (Northern Ireland) 1926
16. ^ Local Government (Northern Ireland) Act 1972 (N.I. 1972 c.9)
17. ^ "Local Government (Dublin) Act, 1930". Irish Statute Book. Office of the Attorney General. Retrieved 2008-07-14.
18. ^ "Local Government (Dublin) Act, 1993". Irish Statute Book. Office of the Attorney General. Retrieved 2016-08-05.
19. ^ "Local Government (Galway) Act, 1937". Irish Statute Book. Office of the Attorney General. Retrieved 2008-07-14.
20. ^ "Local Government Act, 2001". Irish Statute Book. Office of the Attorney General. Retrieved 2008-07-14.
|
global_01_local_1_shard_00001926_processed.jsonl/37360
|
2017 Migration from ESXi 5.5 to Proxmox 5.0
8/28/2017 - Pascal (updated on 11/24/2017)
Here at Encodo, we host our services in our own infrastructure which, after 12 years, has grown quite large. But this article is about our migration away from VMWare.
So, here's how we proceeded:
We set up a test environment as close as possible to the new one before buying the new server, to test everything. This is the first time we had contact with software raids and it's monitoring capabilities.
Install the Hypervisor
Installation time, here it goes:
• Install latest Proxmox1: This is very straight forward, I won't go into that part.
• After the installation is done, log in via ssh and check the syslog for errors (we had some NTP issues, so I fixed that before doing anything else).
Check Disks
We have our 3 Disks for our Raid5. We do not have a lot of files to store, so we use 1TB which should be still OK (see Why RAID 5 stops working in 2009 as to why you shouldn't do RAID5 anymore).
We set up Proxmox on a 256GB SSD. Our production server will have 4x 1TB SSD's, one of which is a spare. Note down the serial number of all your disks. I don't care how you do it -- make pictures or whatever -- but if you ever care which slot contains which disk or if the failing disk is actually in that slot, having solid documentation really helps a ton.
You should check your disks for errors beforehand! Do a full smartctl check. Find out which disks are which. This is key, we even took pictures prior to inserting them into the server (and put them in our wiki) so we have the SN available for each slot.
See which disk is which:
for x in {a..e}; do smartctl -a /dev/sd$x | grep 'Serial' | xargs echo "/dev/sd$x: "; done
Start a long test for each disk:
for x in {a..e}; do smartctl -t long /dev/sd$x; done
See SMART tests with smartctl for more detailed information.
Disk Layout & Building the RAID
We'll assume the following hard disk layout:
/dev/sda = System Disk (Proxmox installation)
/dev/sdb = RAID 5, 1
/dev/sdc = RAID 5, 2
/dev/sdd = RAID 5, 3
/dev/sde = RAID 5 Spare disk
/dev/sdf = RAID 1, 1
/dev/sdg = RAID 1, 2
/dev/sdh = Temporary disk for migration
When the check is done (usually a few hours), you can verify the test result with
smartctl -a /dev/sdX
Now that we know our disks are OK, we can proceed creating the software RAID. Make sure you get the correct disks:
The RAID5 will start building immediately but you can also start using it right away. Since I had other things on my hand, I waited for it to finish.
Add the spare disk (if you have one) and export the configuration to the config:
mdadm --add /dev/md0 /dev/sde
Configure Monitoring
Edit the email address in /etc/mdadm/mdadm.conf to a valid mail address within your network and test it via
mdadm --monitor --scan --test -1
Once you know that your monitoring mails come through, add active monitoring for the raid device:
mdadm --monitor --daemonise [email protected] --delay=1800 /dev/md0
To finish up monitoring, it's important to read the mismatch_cnt from /sys/block/md0/md/mismatch_cnt periodically to make sure the Hardware is OK. We use our very old Nagios installation for this and got a working script for the check from Mdadm checkarray by Thomas Krenn
Creating and Mounting Volumes
Back to building! We now need to make the created storage available to Proxmox. To do this, we create a PV, VG and an LV-Thin-Pool. We use 90% of the storage since we need to migrate other devices as well, and 10% is enough for us to migrate 2 VM's at a time. We format it with XFS:
pvcreate /dev/md0 storage
vgcreate raid5vg /dev/md0
lvcreate -l 90%FREE -T raid5vg
lvcreate -n migrationlv -l +100%FREE raid5vg
mkfs.xfs /dev/mapper/raid5vg-migrationlv
Mount the formatted migration logical volume (if you want to reboot, add it to fstab obviously):
mkdir /mnt/migration
mount /dev/mapper/raid5vg-migrationlv /mnt/migration
If you don't have the disk space to migrate the VM's like this, add an additional disk (/dev/sdh in our case). Create a new partition on it with
fdisk /dev/sdh
Accept all the defaults for max size. Then format the partition with xfs and mount it:
mkfs.xfs /dev/sdh1
mkdir /mnt/largemigration
mount /dev/sdh1 /mnt/largemigration
Now you can go to your Proxmox installation and add the thin pool (and your largemigration partition if you have it) in the Datacenter -> Storage -> Add. Give it an ID (I called it raid5 because I'm very creative), Volume Group: raid5vg, Thin Pool: raid5lv.
Extra: Upgrade Proxmox
At this time, we'd bought our Proxmox license and did a dist upgrade from 4.4 to 5.0 which had just released. To do that, follow the upgrade document from the Proxmox wiki. Or install 5.0 right away.
Migrating VMs
Now that the storage is in place, we are all set to create our VM's and do the migration. Here's the process we were doing - there are probably more elegant and efficient ways to do that, but this way works for both our Ubuntu installations and our Windows VM's:
1. In ESXi: Shut down the VM to migrate
2. Download the vmdk file from vmware from the storage or activate ssh on ESXi and scp the vmdk including the flat file (important) directly to /mnt/migration (or largemigration respectively).
3. Shrink the vmdk if you actually downloaded it locally (use the non-flat file as input if the flat doesn't work):2
vdiskmanager-windows.exe -r vmname.vmdk -t 0 vmname-pve.vmdk
4. Copy the new file (vmname-pve.vmdk) to proxmox via scp into the migration directory /mnt/migration (or largemigration respectively)
5. Ssh into your proxmox installation and convert the disk to qcow2:
qemu-img convert -f vmdk /mnt/migration/vmname-pve.vmdk -O qcow2 /mnt/migration/vmname-pve.qcow2
6. In the meantime you can create a new VM:
1. In general: give it the same resources as it had in the old hypervisor
2. Do not attach a cd/dvd
3. Set the disk to at least the size of the vmdk image
4. Make sure the image is in the "migration" storage
5. Note the ID of the vm, you're gonna need it in the next step
7. Once the conversion to qcow2 is done, override the existing image with the converted one. Make sure you get the correct ID and that the target .qcow2 file exists. Override with no remorse:
mv /mnt/migration/vmname-pve.qcow2 /mnt/migration/images/<vm-id>/vm-<vm-id>-disk-1.qcow2
8. When this is done, boot the image and test if it comes up and runs
9. If it does, go to promox and move the disk to the RAID5:
1. Select the VM you just started
2. Go to Hardware
3. Click on Hard Disk
4. Click on Move Disk
5. Select the Raid5 Storage and check the checkbox Delete Source
6. This will happen live
That's it. Now repeat these last steps for all the VMs - in our case around 20, which is just barely manageable without any automation. If you have more VMs you could automate more things, like copying the VMs directly from ESXi to Proxmox via scp and do the initial conversion there.
1. We initially installed Proxmox 4.4, then upgraded to 5.0 during the migration.
2. You can get the vdiskmanager from Repairing a virtual disk in Fusion 3.1 and Workstation 7.1 (1023856) under "Attachments"
This really helped, thanks!
Sign up for our Newsletter
|
global_01_local_1_shard_00001926_processed.jsonl/37379
|
A mathematical phrase used in Algebra. Like terms refers to various monomials, binomials, and polynomials.
2, 7, 3.14, and 1/2 are like terms. Numbers are like terms.
5x, -90x, and .75x are like terms. Variables that use the same letters are like terms.
In sum (pun intended) like terms are terms that have the same variable coefficients.
Why would use use like terms? Because when simplifying an equation, you can only use like terms. If you do otherwise, you'll get the ever annoying wrong answer.
/me is amazed someone didn't node this earlier.
|
global_01_local_1_shard_00001926_processed.jsonl/37380
|
If you play tennis, racquetball, another racquet sport or even if you're a carpenter, you might know all-too-well the discomfort and pain of tennis elbow. Oddly enough, though, less than 5% of all reported cases of tennis elbow are tennis players. Thus the ailment, lateral epicondylitis, is given a misnomer for a nickname.
Symptoms of tennis elbow:
• You feel a recurring pain on the outside of the upper forearm just below the bend of the elbow. This pain can be sharp or that "dull-achy" pain. Occasionally, the pain radiates down the arm toward the wrist.
• There is pain when you lift or bend your arm or grasp even light objects such as a glass of water.
• You have difficulty extending your forearm fully (because of inflamed muscles, tendons, and ligaments).
• There is pain that typically lasts for 6 to 12 weeks; the discomfort can continue for as little as 3 weeks or as long as several years. Now if you've had this pain for several years, I'd be a bit worried.
There are two other elbow conditions that are often mistaken as tennis elbow. One is known as Golfer's Elbow, or medial epicondylitis. This differs from tennis elbow in that the pain persists on the inside of the elbow for golfer's elbow. Tennis elbow affects the outside of the elbow. The other condition is known as bursitis. Bursitis affects the back of the elbow.
What is tennis elbow?
You can get tennis elbow while playing racquet sports when the constant shocks from the racquet striking the ball reach elbow and create tiny tears in a part of the tendon and in muscle coverings. These injuries may heal, but are prone to tear again, leading to hemorrhaging and the formation of "rough, granulated tissue and calcium deposits within the surrounding tissues."1 This leads to collagen leaking out from around the injured areas, resulting in inflammation of that area. The pain you feel comes from the pressure from this inflammation pinching the radial nerve and cutting off the blood flow. As a result, the tendons do no receive as much oxygen and blood as muscles, thus the tendons heal more slowly.
To prevent tennis elbow:
When you pick stuff up, turn your palm towards your body. This prevents unnecessary strain on the tendons in your elbows. You can also try strengthening exercises with hand weights. With your elbow cocked and your palm down, repeatedly bend your wrist. This should stretch out and strengthen the muscles and joints susceptible to tennis elbow. Stop, though, if you feel any pain.
What to do to get relief from tennis elbow:
The best way to relieve tennis elbow is to let it rest from whatever is causing the pain. Time without stressing the area will allow it to heal, but you must stop doing anything that irritates your elbow. However, this won't be that easy for the manual laborer, office worker, or professional athlete who must continually inflict pain upon themselves to pay the bills and do their jobs.
The most effective conventional and alternative treatments for tennis elbow have the same basic premise: You want to rest the arm until the pain disappears, then massage to relieve stress and tension in the muscles, and exercise to strengthen the area and prevent reinjury. These steps are, of course, similar to the preventative measures you should take if you're worried about getting tennis elbow. If you have to go on with whatever caused the problem in the first place, be sure to warm up your arm for at least 5 to 10 minutes with the gentle stretching and movements described above before starting any activity. And don't forget to take frequent breaks.
For most mild to moderate cases of tennis elbow, aspirin or ibuprofen will help with the inflammation and the pain while you are resting the injury, and then you can follow up with exercise and massage to speed healing. For stubborn cases of tennis elbow your doctor may advise corticosteroid injections, which dramatically reduce inflammation, but they cannot be used long-term because of potentially damaging side effects. It also does not heal the damage to the tendons of your elbow. There are anti-inflammatory topical ointments that you can apply to the skin in the sore areas to reduce swelling as well.
If rest, anti-inflammatory medications, and a stretching routine fail to cure your tennis elbow, you may have to consider surgery, though this form of treatment is rare (fewer than 3 percent of patients). One option is to use the procedure where the tendon is cut loose from the epicondyle, the rounded bump at the end of the bone, eliminating stress on the tendon but rendering the muscle useless. This, obviously, would not be the ideal solution. Another surgical technique involves removing the granulated tissue in the tendon and repairing the tears.
Even after you feel you have overcome a case of tennis elbow, be sure to continue babying your arm. Always warm up your arm for 5 to 10 minutes before starting any activity involving your elbow. And if you develop severe pain after use anyway, pack your arm in ice for 15 to 20 minutes and call your doctor.
To prevent a relapse:
You should discontinue or modify the action that is causing the strain on your elbow joint. If you must continue, be sure to warm up for 10 minutes or more before any activity involving your arm, and apply ice to it afterward. Take more frequent breaks.
You can also try strapping a band around your forearm just below your elbow. If the support seems to help you lift heavy objects like your physics textbook, then continue with wearing the band. You should be aware, however, that such bands can cut off circulation and impede the healing process, so they are best used once tennis elbow has disappeared.
Call your doctor if...
1"What is Tennis Elbow?" http://www.tennis-elbow.net/tenniselbow.htm. Mad props for consulting for this w/u.
|
global_01_local_1_shard_00001926_processed.jsonl/37381
|
I found this printout in a computer lab on the campus of Oklahoma University a year and a half ago. It's a bit old, and I couldn't make out all of it. Plus, my knowledge of mathematical notation is way the hell off, and I have no chance in hell of understanding this, so the transcription of this will be more than a bit off. So, in mangled form, here's the outline of the proof of Fermat's Last Theorem.
Groundwork : Frey Curves
Suppose there were a nontrivial solution of the Fermat equation for some number N, i. e. nonzero integers A, B, C, N such that A^N + B^N = C^N.
Then we recall that around 1982 Frey called attention to the elliptic curve Y^2 = X(X - A^N)(X + B^N).
Call this curve E. Frey noted it had some very unusual properties, and guessed it might be so unusual it could not actually exist.
To begin with, various routine calculations enable us to make some useful simplifying assumptions, without loss of generality. For instance, N may be supposed to be prime and is greater than or equal to 5. B can be assumed to be even, A is equal to 3 (mod 4), and C is equal to 1 mod 4. A, B, and C can be assumed relatively prime.
The "minimal discriminant" of E, can be computed to be ((ABC)^(2N)) = (2^8) - a power of 2 times a perfect prime power. One unusual thing about E is how large the discriminant is.
The conductor is a product of primes at which E has bad reduction, which is the same as the set of primes that divide the minimal discriminant. However, the exact power of each prime occurring in the conductor depends on what type of singularity the curve possesses modulo the primes of bad reduction. The definition of the conductor provides that P divides the conductor only to the first power if X(X-A)(X+B) has only a double root rather than a triple root mod P. Now, any prime can divide only A or B but not both, since otherwise it would also divide C, and we have assumed A, B, and C are relatively prime. Hence the the polynomial will have the form X(X+D) mod P, where (P,D) = 1. Hence there is only at most a double root modulo any prime, and therefore the conductor is square-free. In other words, E is semistable.
There are other odd things about E, which have to do with specific properties of its Galois representations. Because of these, Ribet's results allow us to conclude that E cannot be modular.
Proof of Fermat's Last Theorem from the Taniyama-Shimura conjecture
After Frey drew attention to the unusual elliptic curve which would result if there were actually a nontrivial solution to the Fermat equation, Jean-Pierre Serre (who has made many contributions to modern number theory and algebraic geometry) formulated various conjectures which, sometimes alone and sometimes together with the Taniyama-Shimura conjecture, could be used to prove Fermat's Last Theorem.
Kenneth Ribet quickly found a way to prove one of these conjectures. The conjecture itself doesn't really talk about either Frey curves or FLT. Instead, it simply states that if the Galois representation associated with an elliptic curve E has certain properties, then E cannot be modular. Specifically, it cannot be modular in the sense that there exists a modular form which gives rise to the same Galois representation.
We need to introduce a little additional notation and terminology to explain this more precisely. Let S(N) be the (vector) space of cusp forms for Theta(N) of weight 2. "Classical" theory of modular forms shows that S(N) can be identified with the space of "holomorphic differentials" on the Riemann surface X(N). Furthermore, the dimension of S(N) is finite and equal to the "genus" of X(N). "Genus" is a standard topological property of surfaces, which is intuitively the number of holes in the surface. (E. g. a torus, such as an elliptic curve, has genus 1.)
But there are relatively simple explicit formulas for the genus of X(N). These formulas, developed long ago by Hurwitz in the theory of Riemann surfaces, involve the index of Theta(N) in G. A fact of crucial importance is that for N <. 11, the genus of X(N), and hence the dimension of S(N), is zero. In other words, S(N) contains only the constant form 0 in that case. We shall use this fact about S(2) very soon.
There are certain operators called Hecke operators, after Erich Hecke, on spaces of modular forms, and for the subspace S(N) in particular, since they preserve the weight of a form. Hecke operators can be defined concretely in various ways. There is a Hecke operator T(N) for all N grater than or equal to 1. There are formulas that relate T(N) for composite N to T(P) where is a prime dividing N, so T(P) for prime P determine all T(N).
All T(N) are linear operators on S(N). If there is an F in S(N) that is a simultaneous eigenvector of all T(N), i. e. T(N)(F) = Rho(N)F, where Rho(N) is the set of (C, F) is called an eigenfor. (Nontrivial eigenforms need not exist, e. g. if S(N) has dimension 0.) F is said to be normalized if its leading Fourier series coefficient is 1. In that case, the eigenvalues (n) turn out to be the Fourier series coefficients in the expansion F(N) = The sum of (from n = 0 to infinity) ANe^(2 * Pi * I * N * (undecipherable)).
It can be shown that if F(Z) is a cusp form which is a normalized eigenfunction for all T(P), then there is an Euler product decomposition for the L-function L(F,S). This is obviously of great technical usefulness in relating L-functions of forms and those of elliptic curves (which are Euler products by definition).
If F is in the set of all S(N) is a normalized eigenform of all Hecke operators, it can in fact be shown that the coefficients in the Fourier expansion are all algebraic numbers and that they generate a finite extension K of Q.
Prime ideals of the ring of integers of K are the analogues of prime numbers of Q. In the case that f is a normalized eigenform it is possible to carry out the construction of a Galois representation Phi(F,Gamma) of Gal(Lambda/Q) for any prime ideal Gamma of the ring of integers of K.
At last we can describe what Ribet proved. Suppose E is a semistable elliptic curve with conductor N and that its associated Galois representation Phi(E,P) for some prime P has certain properties. Suppose 2 divides N (which is true for Frey curves). If E is modular, then there is a normalized eigenform f and a prime ideal Gamma lying over P (i. e. one of the prime factors of P in the extension field generated by the Fourier coefficients of F) such that the Galois representation Phi(F,Gamma) is Phi(E,P). Ribet showed that it is possible to find an odd prime q is not equal to p which divides N such that there is another F' is in the set of all S(N/Q), and a corresponding prime ideal Gamma' of the ring of integers in the field generated by the coefficients of F' such that Phi(F',Gamma') gives essentially the same Galois representation. This is known as the "level lowering" conjecture since it asserts that under the right conditions there is an eigenform of a lower level that gives essentially the same representation.
But this process can be repeated as long as N has any odd prime factors. It is important that the curve E is semistable so that N is square-free. This means all that all odd prime factors of N can been eliminated, so there must be a nontrivial eigenform of level 2, i. e. in S(2), that gives essentially the same Galois representation. And that is a contradiction, since S(2) has dimension 0, hence contains no non-trivial forms. The contradiction means that E can't be modular.
Now we invoke the "unusual" properties of the Frey curve resulting from a solution of FLT. These properties allow it to be shown that the associated Galois representation has the properties required to apply Ribet's result. Hence the Frey curve can't be modular.
But the Frey curve is semistable, so the semistable case of the Taniyama-Shimura conjecture, which Wiles proved, implies the curve is modular. This contradiction means that the assumption of the existence of a nontrivial solution of the Fermat equation must be wrong, and so Fermat's Last Theorem is proved.
Proof of the semistable case of the Taniyama-Shimura conjecture
Not very surprisingly (since it was such hard work), the proof is quite technical. However, the outline of it is relatively simple. In the following, we assume that E is a semistable elliptic curve with conductor N. We have to prove E is modular.
We know we can construct a Galois representation Phi(E,P^Infinity) : G->GL(Z) (I think... undecipherable) for any prime P. To show that E is modular, we have to show this representation is modular in a suitable sense. The wonderful thing is, this needs to be done for only one prime P, and we can "shop around" for whatever prime is easiest to work with.
To show Phi(E,P^Infinity) is modular involves finding a normalized eigenform F in S(N) with appropiate properties. The properties required are that the eigenvalues of F, which are its Fourier series coefficients, should be congruent mod Q to trace(Phi(E,P^Infinity) (something, undecipherable)) for all but a finite number of prime Q. ((something, undecipherable) G is the "Frobenius element".) We know that the trace is, for Q prime to PN, the coefficient A = Q + 1 - #(E(F)) of the Dirichlet series of L(E,S).
The longest and hardest part of Wiles' work was to prove a general result which is roughly that if Phi(E,P) is modular then so is Phi(E,P^Infinity). In other words, to show that E is modular, it is actually sufficient just to show that Phi(E,P) : G->GL(Z/pZ) is modular. This is called the "modular lifting problem".
The problem boils down to assuming that Phi(E,P) is modular and attempting to "lift" the representation to Phi(E,P). This is done mainly by working with the theory of representations as much as possible, without specific reference to the curve E. The proof uses a concept called "deformation", which suggests intuitively what goes on in the process of lifting.
The outcome of this part of Wiles work is:
Theorem: Suppose that E is a semistable elliptic curve over Q. Let P be an odd prime. Assume that the representation Phi(E,P) is both irreducible and modular. Then E is a modular elliptic curve.
At this point, all we have to do is find a single prime P such that Phi(E,P) is irreducible and modular. But Langlands and Tunnell had already proven in 1980-81 that Phi(E,3) is modular.
Unfortunately, this isn't quite enough. If Phi(E,3) is irreducible, we are done. But otherwise, one more step is required. So suppose Phi(E,3) is reducible. Wiles then considered Phi(E,5). That may be either reducible or irreducible as well. If it is reducible, Wiles proved directly that E is modular.
So the last case is if Phi(E,5) is irreducible. Wiles showed that there is another semistable curve E' such that Phi(E',3) is irreducible, and hence E' is modular by the above theorem. But Wiles could also arrange that the representations Phi(E',5) and Phi(E,5) are isomorphic. Hence Phi(E,5) is irreducible and modular, so E is modular by the theorem.
Copyright © 1996 by Charles Daney, All Rights Reserved (Reprinted without Permission)
I've e-mailed the last known address of the guy asking for permission. No reply. I'm leaving this in hopes that he or someone close to him reads this someday - just tell someone to delete this, give proof of who you are, and it will be done, no messy legal action needed.
|
global_01_local_1_shard_00001926_processed.jsonl/37398
|
U.S. Markets closed
Donald Trump Roasted For Painfully Awkward Attempt To Hold Melania's Hand
Sometime beforeDonald Trump picked “dandruff” offEmmanuel Macron’s shoulder and engaged in a bizarrehandshake/cheek kiss momentwith the French president on Tuesday, Trump tried to hold his wife Melania’s hand.
The moment was not a smooth one, and MSNBC cameras picked up the awkward attempt in excruciating detail. Video shows Trump using a few fingers to initiate holding hands ― to no response. Then he tried again with his pinky, which also didn’t work. Then he put multiple fingers in Melania’s palm, which finally resulted in what looked like two people mutually agreeing to join hands.
The footage of Trump attempting and eventually succeeding spread around the internet quickly, with people focusing on the president’s insistence despite his wife’s seemingly unhelpful reaction.
“The Daily Show” went one step further, dubbing the moment with music from “Jaws,” which happens to sync up pretty perfectly.
Though the president and first lady seemed slow on the hand-holding uptake while welcoming Macron and his wife, Brigitte, on Tuesday, the Trumps were in fact photographed multiple times holding hands during the French leader’s visit.
This article originally appeared on HuffPost.
|
global_01_local_1_shard_00001926_processed.jsonl/37399
|
Category Archives: Finch The Superb
Ok, here’s what I call Super Villain Style #1:
Collection 2 ~or~ The Red Death
And finally, collection 3: The Unexpected.
Why does it seem like all of a sudden, the best way to name your child is to just to randomly dump consonants or vowels into a perfectly good name? I sat at work one day and came up with over one hundred different permutations of the name “Madison”. And I have probably seen at least half of those various spellings over the course of my career. It’s like people just reach into a Scrabble tile bag. “Ok child, your name is ‘Zqxugfb’.” Or they toss a handful of corn on a keyboard and let a chicken peck out a moniker. People are naming their kids like some kind of Lovecraftian deity. “Oh, those are my kids Cthulhu and Nyarlathotep. It’s ok– their name are supposed to be unpronounceable to human vocal capabilities.” I know that people want to be creative when naming their child, but if you go naming them something ridangdiculous, they’re never going to be able to find pens or pencils or coffee mugs or key chains with their name on it. They’re gonna have to go with the ones that say “They didn’t have your name”. And I’m not saying that your children will hate you for that, but I am saying that it will definitely be a deciding factor if it comes to choosing you a nursing home.
Oftentimes, I amuse myself at work by planning elaborate ways of becoming a super villain and taking over the world. Many components go into making a good super villain; outfits, witty banter, an arch nemesis with which to engage in the aforementioned witty banter, an appropriately evil laugh, etc. But one very important factor is your army. It can be minions, henchmen, a hoard of mercenary barbarians, or any number of things. The most important thing is that there be droves of them. Scads, even. Perchance a plethora if you’re feeling spunky. And they must be outfitted well. A common error in super villainy is under equipping your staff. If your underlings are getting mowed down by your foes like so many blades of grass before the whirring blades of a lawn tractor, it does not bode well for you. Not only is it expensive to replace human resources, but it’s bad for morale as well. And the last thing you want is a bunch of demotivated lackeys between you and your enemy.
That’s why I have figured out the one item that must be standard issue to all my troops: An attack unicorn. Hear me out. Picture that you’re one of my foes (if you’re already one of my foes–and you know who you are–this should be easy) and that you’re making a futile attempt to storm my lair. You’ve crossed the moat, defeated the Sphinx and her riddles, and solved the Rubik’s Cube of Eternal Frustration. Nothing left to do but defeat my hoard. Should be pretty simple–but hang on–what’s this now? What’s that crunching rumble that your hear fast approaching? Why it’s my henchmen, astride their titanium-clad attack unicorns. And that crunching sound is not the hooves of their steeds–it’s the tank treads of their steeds. Crushing beneath them the bones of other fools who dared oppose me. And does that majestic, rainbow-hued horn also double as a rocket launcher? You bet your sweet bippy it does. Oh, and how observant of you to notice that my attack unicorns have laser eyes. Most people would just assume that it was magic and wonder twinkling in those crimson orbs. Well, that’s partly correct–magic and wonder and lasers. And just a smidgin of pixie dust. Can’t forget that.
As you cower there–whimpering, soiling yourself profusely and ruing the day you ever thought to cross me– you notice the crowning achievement of my army. It’s my valiant and noble steed. You weep at its beauty. It’s not merely an attack unicorn–it’s an attack Pegasus unicorn. Its glittering wings blind you. It has the standard rocket launcher horn and laser eyes and tank treads in case of land maneuvers, but it also has an additional feature. That’s right, it breathes fire as well. Give up now, puny mortal. Your pathetic endeavor has failed and I have emerged victorious. I am triumphant. All shall love me and despair. Bwah ha ha ha!
… And then I realize that I have been cackling aloud at my cubicle, eliciting concerned and wary stares from my coworkers. I must return to my drudgery for now, at least until I can create a Kickstarter account to fund my attack-a-corns project. Sigh.
There is just nothing good to eat at my desk. Oh sure, I have popcorn, pretzels, a jar of chunky peanut butter (for dipping the aforementioned pretzels in), and like 3 different kinds of oatmeal, but I don’t have what I really want: MEAT.
Desk food is limited to sweets and salty snacks. I guess it’s because these kind of things have a relatively long shelf life. But I want more. I want it to be socially acceptable to have meat at your desk. And I’m not talking about jerky. That’s some of the nastiest, foul smelling, sorry excuse for a food product that I ever did see. It’s like someone de-joyed the meat instead of dehydrating it. So that’s right out. Same thing with tuna fish. I don’t know who ever convinced humans that eating tuna right out of the can is something that should occur, but let me tell you Brethren, you have been lied to. Tuna belongs in cassaroles, where it can be properly cooked and its funk concealed by noodles and a creamy sauce. And don’t get me started on Spam. Can you eat Spam raw? Does it require preparation? I don’t know. It’s in a can like tuna, and it’s ham. Is it like a canned lunch meat? If so, is there canned bologna? And if so, is it called Spaloney? (If not, I totally claim that product name.)
No, we need a desk meat revolution. I want to be able to open up my desk drawer and have a rotisserie chicken in there. On an actual rotisserie. A Rotiss-adex. Powered by little jars of canned heat. I’ll be singing Jamiroqai at work: “Got canned heat in my desk tonight baby! You know this chicken is for real!” Then I’d open another drawer and oh what is this folks? It’s a grill. It’s a grill with steaks. Everyone gather round, I’m servin’ up ribeyes offa my Steakler. Pull out the keyboard tray and bam, it’s a griddle. We are go for bacon. Yes, desk bacon: the best kind of bacon. Ok, yes I can toss some sausage on my Griddleboard; you only had to ask.
I’m sad now because when I return to work on Monday, I will have none of these wonderful things. My meat tooth will go unsatisified. But this is a wonderful country where any sort of harebrained food preparation product can hit the market. One day, one day, the Rotiss-adex, the Griddleboard and even the Steakler shall be mine. Sigh…
|
global_01_local_1_shard_00001926_processed.jsonl/37400
|
Find the word definition
Could not find any definition of word "reshut"
Usage examples of "reshut".
The detective opened the door, let the bat drop out, and reshut it firmly.
By the time I had climbed over her, reshut my book and stowed it, and let down the table tray, her eyes were closed again, her breathing soft and steady.
|
global_01_local_1_shard_00001926_processed.jsonl/37415
|
Writing a function that depends on time
Hello friends
How to write a function that is dependent on time in the DYNARE.
Like x=1+exp(k t)_2exp(h t)
I want friends to help me in this case.
Hi, I do not know why you would need that… But if you do not rely on the perturbation approach (and use a perfect foresight based solution method) you can simply add a state variable named time with corresponding equation:
time = time(-1) + 1;
in the model block. If you set the initial condition of this new variable to zero, you will have exactly what you want.
thanks for the reply
Now I encountered the following error
Residuals of the static equations:
Equation number 14 : -1
Hi, This equation (random walk with drift) does not admit any steady state. That is expected. Do you really need a steady state?
Hi, Stepan
I also know that this equation does not admit any steady state.
But anyway, I encounter this error and can not continue to work.
I want to write the following equation in the DYNARE, but I do not know how.
Hi Esmael,
I do not really understand your equation (the term between square brackets looks like the solution of a linear second order differential equation), but in this case you do not need to declare t as a variable to have this equation in Dynare. Suppose you have a term like e^{\alpha t }, where \alpha is a parameter. Then you have:
e^{\alpha (t+1)} = e^{\alpha t}e^{\alpha}
Hence it is possible to define this term recursively. Let A_t = e^{\alpha t}, you must have A_{t} = e^{\alpha}A_{t-1} , and you would write something like:
A = exp(alpha) * A(-1);
in you model block. The steady state of this equation is well defined (A=0), and this steady state is stable provided \alpha<0.
Thank you very much
Sorry I replied late.
I was traveling.
|
global_01_local_1_shard_00001926_processed.jsonl/37417
|
Appendix Bash Problem
Am working through the appendix for Learn Python The Hard Way to familiarise myself with bash. However, in exercise 55.9.1 it shows us the pushd and popd commands t move around. When it says to type this:
cd temp
$ mkdir i/like/icecream
I do the exact the same thing in my terminal (Mac OSx) and get the following:
mkdir: i/like: no such file or directory.
i’m not sure what I"m doing wrong and it’d be great if someone could tell me. I’m going to move on from that exercise but I imagine it’s pretty important.
ok nevermind it was because i wasn’t putting the -p in between mkdir and i/like/icecream. i can’t see where that is specifically mentioned in the chapter beforehand, though.
So, in PowerShell on windows you don’t need the -p so I removed it. Are you maybe reading the wrong commands?
Hm, I’m not sure. I’m using a mac and I followed these commands. Screenshot attached.
Yes, you need the “-p” on macOS.
This screenshot is from the pdf version of the book. The pdf version is missing the “-p”.
The html version is correct. It has the “-p”.
Hi Zed,
I encountered this issue myself when working through the command line appendix. As quoted above, the -p modifier for the mkdir command is missing from the .pdf at the beginning of exercise 55.9.1 (line 2). Just wanted to make sure this is the case. I understand the importance of typing in the commands exactly as we see them for beginners and this one had me confused for a while before I just decided to google the issue and found others having the same problem. Thanks for such a great approach to learning this stuff. I’m very much enjoying it.
If you are on Windows you don’t need -p. You might be looking at the instructions for Windows when on a Mac.
I’m fairly certain I’m looking at the right page. I quoted it above. Other people have this problem in the forum, I just don’t think anybody followed up with a reply to you that it was a possible misprint. Take a look…a screenshot of the currently downloadable .pdf is viewable above this post.
Oh weird, yeah the -p is missing on the linux instructions but I fixed that ages ago in the Python 3 book. What book are you using again? When did you get it?
I’m using the Python 3 .pdf. I downloaded it about a month ago.
Awesome, I’ll confirm that it should be fixed … again.
That’s the way it goes sometimes…but bug fixed! Thanks for being responsive.
Yep, finally fixed it. Thanks for letting me know.
|
global_01_local_1_shard_00001926_processed.jsonl/37421
|
Purse Holders
1. Do you ladies use them? The holder allows you to hang your purse right from the table. I hate it when I go out and there's no place to put my purse (especially in the bathroom). Lately, all of my purses have short handles, so I can't hang them from my chair. I'm not putting my bag on the floor! My purse holder was given to me and I don't know where I can get another. I would love to have one for each bag.
Any suggestions?
Thanks ladies.
2. Duh!! I just found a whole slew of 'em on ebay. Thanks anyway, girls. Do any of y'all use them too?
3. There are a ton of girls on the eBay purse boards that love them.
Now I need to find where I saw the one that hangs from the headrest on your car seat to hang a bag from. That way it doesn't sit in the floor board. (I have kids and don't always have room in the seat for it. I've actually been keeping it on my console or in my lap! LOL)
4. I use them all the time and I never go out without one :love:
5. I found some cute ones on ebay a couple of years ago -- I bought a dozen of them and gave them to my girlfriends as stocking stuffers. The are great -- I'd like to get some more!
6. Do you have some pics of the purse holders? Never seen one...
7. i got mine for $6.49 shipped from eBay :nuts::
8. These are the ones that I have.
Can't you tell I love pink, LOL :P
9. Claires & the like have them. I think you have to be careful, I have heard horror stories about table tipping & food spilling on bags...
10. What bag is that? I have never seen one???
11. I think Gucci?
12. it's the Guccissima Wave Boston Bag :yes:
13. I love this place! I have learned sooo much---first pursekets, now purseholders! Y'all ROCK!
14. i hope this isn't a silly question but how does the top of the holder stay on the bale, are they really heavy or is there a gentle adhesive?
they are cute though, it makes me want to buy some :biggrin:
15. The weight of the bag makes the holder stay put. Although do remember that it puts more pressure on one side of the table and light tables can tip over.
|
global_01_local_1_shard_00001926_processed.jsonl/37422
|
Deployment fails in Qt5.2-rc1, androiddeployqt.exe exited with code 14
1. make sure you use the .bat script, not the .cmd, e.g. in Options/Android, my ANT location is
C:\Program Files\Android\adt-bundle-windows-x86_64-20131030\eclipse\plugins\org.apache.ant_1.8.3.v201301120609\bin\ant.bat
I don't know why there are both but the cmd causes errors leading to code14.
2. Set JAVA_HOME in Projects/Build and Run/Build Environment, e.g. mine is
Do not specify the \bin.
Then it works, so far so good!
Log in to reply
|
global_01_local_1_shard_00001926_processed.jsonl/37423
|
Look and Feel
1. ttobey Developer
Let me think No.
Juraiya, Mizgamer62 and Kittybock like this.
2. ttobey Developer
No and no.
Mizgamer62 likes this.
3. ttobey Developer
With a little bit of No.
Juraiya and Mizgamer62 like this.
4. ttobey Developer
It must be Nosday.
5. Kelvmor Active Member
There's something else that could be looked into...
When flying up, or diagonally forward and up, the angle for the Sokokar's head and general body is off. If you fly straight up with a Sokokar mount, the angle is wrong--it looks more like the Sokokar is preparing for a flip, with his head and upper body tilted too far back to look like he's naturally flying straight up. Same goes for flying diagonally up and forward. I'll post screenshots in a few.
6. ttobey Developer
Can't be helped. It's a head tracking problem that I'm not messing with. Think of it as a feature now.
7. Boopydoodle Member
8. Ibukia Member
Can we get sulfide and peacock club weapons on the shady swash? Also could you make it so we could see and purchase all classes weapons from the freeport/qeynos timelines. Some cool weapons in there. With wardrobe it'd be cool to use more of em.
Rosyposy likes this.
9. Errrorr Well-Known Member
10. Rhodris Well-Known Member
I'm waiting for a broom mount....
11. Ibukia Member
Oops meant soulfire. Autocorrect got me again!
12. ttobey Developer
It doesn't matter, I have no idea what you are talking about.
13. ttobey Developer
14. ttobey Developer
And why that posted four times is also beyond me.
15. Mizgamer62 Well-Known Member
We need more of ttobey's awesomeness on these forums more often!
Rhodris, ttobey and Spindle like this.
16. ttobey Developer
I usually have forum open, waiting for something. What I'm waiting for I don't know.
Mizgamer62 likes this.
17. Mercychalice Well-Known Member
A crow mount....I'm waiting on a crow....
18. Errrorr Well-Known Member
A new mount request thread!
Rhodris and Mizgamer62 like this.
19. ttobey Developer
No that's not it.
Mizgamer62 and Errrorr like this.
20. Rosyposy Well-Known Member
You'll know it when you see it?
Mizgamer62 likes this.
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/37428
|
thinnest hard case? no shields or films
Discussion in 'iPhone Accessories' started by nyc4lifedt, Sep 5, 2009.
1. nyc4lifedt macrumors member
Aug 19, 2009
I never put my iphone in a case, but currently shopping for one. wear and tear you can't do much about it, but the main reason why I'm buying a case is because of finger prints. 3GS screen deals well with finger prints, but the back is just horrible.
So. Figured putting a case might reduce the finger prints a bit, but i hate the bulk. iPhone is so thin and stylish and putting on a case just reduces the experience. BUT can't deal with finger prints.
What is the thinnest hard case out there? I don't want films/screens. I saw one my friend had, dust gets on the edges, looks horrible. No silicons either, i don't like how it gets stretched and flabby.
I don't need to protect the screen. I usually take care of my phone very well, so I don't need the screen protector. Just a simple back case, as thin as possible and matte.
I looked at SGP case, but wasn't thin enough. Saw Air Jacket at the Apple store, wasn't as good either. Any others for consideration?
2. Gav2k macrumors G3
Jul 24, 2009
I have a marware silicon slip on well two of then. They do not disform and I take mine off more than once a day. They offer resent shock protection too.
3. BergerFan macrumors 68020
Mar 6, 2008
Mos Eisley
Check out the Air Jacket by Power Support. As far as I'm aware, it comes in Black, Clear, and a new Chrome(which won't help the fingerprints, lol).
It offers the least bulk(imo), that you can get from a hard plastic case.
My ultimate case though, has to be the Incase Slider.
itsmemorphious gives thorough reviews. :cool:
4. Blueline29 macrumors 68020
Jun 16, 2009
Indian Rocks Beach, FL
The Incipio Feather's the thinnest one that I personally have ever used. Offers nothing in the way of screen protection, but you said that wasn't an issue. I think the AT&T stores and Radio Shack (at least the one near me) carry them in-store if you wanted to see one before you buy.
5. iFerd macrumors 6502a
Jul 20, 2007
6. nyc4lifedt thread starter macrumors member
Aug 19, 2009
I'll take a look at the feather.
has anyone used Moshi ones? they look pretty similar.
anything thinner? nothing adhesive, no sticky stuff.
7. lpnjake macrumors member
Sep 4, 2009
this carlos guy is funny.. sounds like he should wear a pink shirt when he says his name
8. lpnjake macrumors member
Sep 4, 2009
incipio is the thinnest you will get, the power support is a TAD i mean TAD sticker then incipio. just read the other threads.. there have been around 10 saying incipio is the thinnest
9. Chizzled macrumors member
Jul 12, 2009
I know you said you didnt want skins or films because the corners lift up and catch lint, but serious, Wrapsol is GREAT! I am super anal about that kind of stuff too, and this skin does not budge. No finger prints, no residue along the edges where the skin adheres to the phone. I love it.
I also keep my phone in a Sena Ultra Slim pouch when it is in my pocket, so that might prevent lint and such, but it is a tight squeeze to get inside and the corners have never lifted at all.
I'd give it a shot.
try code "Youtubecontest" if it still works, you will get 50% off.
10. nyc4lifedt thread starter macrumors member
Aug 19, 2009
so you put a skin and also put it in a pouch? that's too much for me. I'd rather go naked with the phone. just can't deal with fingerprints on the back. but I'm gonna take a look at the wrapsol. I like the fact that the back part is matte. just worried about the corners and sides picking up dust and lint. that's less attractive than finger prints.
11. lpnjake macrumors member
Sep 4, 2009
code doesnt work. someone was selling them on ebay MAD cheap but it seems they are sold out of the iphone model
12. Clix Pix macrumors demi-goddess
Clix Pix
Oct 9, 2005
8 miles from the Apple Store at Tysons (VA)
I use the Air Jacket and it works great! The beauty of my white iPhone still shines through the clear back and yet it is being protected. I don't use anything on the front screen, as I don't think it is necessary.
13. lpnjake macrumors member
Sep 4, 2009
take your air jacket off, bet your bezel is all marked up. if its not then you are either blind or lie.
14. Mangoit macrumors newbie
Sep 9, 2009
how about his case
how about this case ,leather shell , its very pop here
Attached Files:
15. Ferris23 macrumors 68020
Sep 24, 2007
Wrapsol is what you want. It is finger print proof. Look through this forum and you can see pictures of my phone in Wrapsol. It has an amazing look and texture, protects the back of the phone and will totally eliminate fingerprints and smudges on the back of the phone. Not to mention it's as good as carrying the phone naked as it adds no bulk.
16. KyPosey macrumors regular
Sep 13, 2008
Louisville, Ky
my incase white slider isnt the smallest out there by no means, but i just feel safer with this one. its also slick so it will fit in my pocket unlike the rubber ones...they never seem to go in jean pockets smoothly.
17. BergerFan macrumors 68020
Mar 6, 2008
Mos Eisley
Agreed. Luckily my chrome was already self-brushed, so I just brushed it again, to get rid of the marks that the Air Jacket made.
18. Uabcar macrumors 6502
Aug 31, 2009
Incipio Feather
hey- this case looks nice. I've got a similar case - cheap $6 no name version from HDAccessories. It's pretty thin but only wraps around to the front bust stops right at the chrome bezel. From the the pics posted on their site, it appears that Incipio Feather wraps around to the front a bit more- such that is covers about 1/2 of the chrome? Is that right?
19. nyc4lifedt thread starter macrumors member
Aug 19, 2009
I tried a few cases after recommendations:
SGP Ultra Thin Case, Case Mate Barely There, Air Jacket, Incipio Feather, Moshi iGlaze.
1. Casemate Barely There, not a bad case, but kinda wasn't worth it. It's not a total protection yet not a total slim design. This was the thickest of the ones that I've tried.
2. SGP Ultra Thin Case, wasn't as thin as was advertised. I ordered two, one crystal see-through and one with a leather texture. It was thicker than 1/29 of an inch that was advertised. I have one of those slide in dock speakers that is designed to work with a naked iPhone, so I could do non-scientific comparison. This covered the list amount of the chrome bezel, which wasn't an issue with me.
3. Air Jacket was "alright" and it was thin. BUT it solved nothing on the part of finger prints on the back. Probably it was due to the fact that I ordered the see-through version rather than the rubber coated version. Probably would have kept it had I ordered the black version.
Incipio Feather I didn't like at all. It was thin, as other posters in this thread. However, it kinda felt like a cheap plastic that was covering the $200 iPhone. (All of these are cheap plastics, but Incipio Feather made it more feel like it. You know what I mean.)
Moshi iGlaze is the one that I'm going to be keeping for now. It's just as thin as the other ones, texture is matte and rubber coated so it adds more grip. It adds a very little bulk, and I can use it without taking the case off to use it in a universal dock or a slide-in dock speaker. FINALLY no finger prints.
As I get tired of this case, I'm gonna try the Wrapsol in a little bit. My friend had one installed, and he sucked at putting it on. Which I was very turned off by, haha. But I saw the videos on YouTube and some review/pictures and it looks great. I'm gonna give it a shot in a little bit.
20. Madmic23 macrumors 6502a
Apr 21, 2004
Wrapsol Ultra
I just installed a Wrapsol Ultra on my iPhone 3GS, and this thing is awesome! I replaced an iFrogz hard case with it.
The Wrapsol Ultra goes on dry, so you don't have to spray your iPhone down with the solution like the previous Wrapsol and the Invisible Shield. That part really scared me off from using those.
But the installation of this thing was a breeze. Just tack it down on the bottom corners and then smooth it on. It wraps around the edges and corner as well, which is nice. The best part is, you can barely tell it's there unless you look at the corners to see the seams.
I bought it because the back of my phone was a finger print mess, and this cuts that down significantly. I bought the iFrogz case first, but I noticed it was leaving some tiny scratches on the back of my phone. Now it's scratch proof.
They say this is suppose to be drop resistant as well, but I'm not about to test that out.
When I upgrade to the next iPhone, I'm not going to buy it until I have a Wrapsol skin to apply to it directly out of the box.
21. Rayfire macrumors 68030
Aug 25, 2008
That indeed looks promising, especially with the use of dry application.
However, a review posted here doesn't really offer drop resistance very well. So I guess for now I'm stuck with a case (Vulcan) till the next iPhone comes out.
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/37429
|
Will there be major software developments for the current iPhone?
Discussion in 'iPhone' started by skeen, Dec 2, 2007.
1. skeen macrumors 6502
Jul 12, 2007
London, England
With all this talk about a new iPhone next year, will there be major software developments for the current iPhone, in the same way we get software developments for OSX? Will we see 2.0 software? Will software development for the current iPhone cease when the new one is out, or will those software enhancements apply to current iPhones?
What do you guys think? The iPhone is constantly toted as being very software-based, that is new features simply require new software, so will they actually make use of this, or leave us behind?
2. sparkyms macrumors 65816
Feb 22, 2007
Southampton UK
Apple have just released new firmware for 5th Gen iPods even now the Classic is out, so basically all we can say is "we live in hope".
3. DeaconGraves macrumors 65816
Apr 25, 2007
Dallas, TX
Seeing that we're just a few months away from the release of the official SDK, it'd be pretty foolish of Apple to constrain all future software updates to a newer iPhone.
Especially if the new phone just add 3G and maybe a larger hard drive, there would be no technological reasons that Apple doesn't continue to to update the software on all iPhones.
4. lordgaino macrumors member
Nov 28, 2007
wow you lot are becoming rather too pessimistic.
the iphone has been out for barely two weeks in europe and already you are writing it off as obsolete!!!
5. bob5820 macrumors 6502a
Jun 23, 2006
I think that once the SDK is released there will be quite a bit of development on the current phone. Especially if Apple does some sort of licensing to develop applications like Sony does on the PSP and MS on the X-box. I can't think off any compelling reason why Apple would exclude the current phone, theres too much money still to be made.
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/37430
|
Jump to content
This topic is now archived and is closed to further replies.
Connecting php to mysql v 5
Recommended Posts
I need to connect mysql to php, both are version 5s. I changed the extensions_dir in php.ini to correct path, i uncommented the extension=php_mysql.dll, but php still gives me:
Fatal error: Call to undefined function mysql_connect() in C:\Apache\Apache2\htdocs\test.php on line 8
I think i forgot to move a dll from or to mysql direction, does anyone know what dll i am suppoused to move?
Share this post
Link to post
Share on other sites
Hello ReVeR,
When setting up my server I had similar problem, and I resolved it by adding
extension=php_mysqli.dll instead of extension=php_mysql.dll as php5 and MySQL5 use this instead, as mysqli i believe this to mean MySQL Improved and only works for later versions of PHP and MySQL.
You will also have to edit the MySQLi section of your php.ini file instead of the MySQL section:
See Example:
; Maximum number of links. -1 means no limit.
mysqli.max_links = -1
mysqli.default_port = 3306
; MySQL defaults.
mysqli.default_socket =
mysqli.default_host = localhost
mysqli.default_user = root
; file will be able to reveal the password as well.
mysqli.default_pw =
; Allow or prevent reconnect
mysqli.reconnect = Off
; Allow or prevent persistent links.
msql.allow_persistent = On
msql.max_persistent = -1
msql.max_links = -1
I hope this helps and solves your problem
Share this post
Link to post
Share on other sites
Please read my thread [a href=\"http://www.phpfreaks.com/forums/index.php?showtopic=87276\" target=\"_blank\"]here[/a]
Share this post
Link to post
Share on other sites
thx alot,. thats the file i forgot to move. sry that i didn;t find that thread b4 posting.
Share this post
Link to post
Share on other sites
Important Information
|
global_01_local_1_shard_00001926_processed.jsonl/37462
|
It is usual practise for a prisoner to contact the MP who represents their home address (or last address prior to entering the prison system). If your issues or concerns are relating to a legal matter please follow the guidance for Legal Queries by clicking this link.
To discuss any other issues please call my office on 0114 234 9079, email on or write to The Office of Gill Furniss MP, Shirecliffe Community Centre, 349 Shirecliffe Road, Sheffield, S5 8XJ.
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/37467
|
Mustek just rolled out its PF-i700 digital photo frame that has an integrated iPod docking station. Since digital picture frames are so hot this holiday season, perhaps the company figured it might as well ride that wave while satisfying the iPod crowd at the same time.
Unfortunately, like lots of inexpensive digital photo frames, its 7-inch LCD panel has a 16x9 aspect ratio with a low-rez 480x234 screen. That's not going to look too good, but hey, it's cheap at $129.99, and you can watch MPEG 4, XviD and motion-JPEG movies on it.
Mustek helpfully tosses in a couple of stereo speakers with a headphone jack, but still, most digital cameras shoot in 4x3, so this 16x9 frame will usually give you black bands on either side of your pictures. Look for it in March. Bah, humbug. [Mustek]
|
global_01_local_1_shard_00001926_processed.jsonl/37485
|
Odd words: Floccinaucinihilipilification (once longest word)
The action or habit of judging something to be worthless.
Back in the eighteenth century, Eton College had a grammar book which listed a set of words from Latin which all meant “of little or no value”. In order, those were flocci, nauci, nihili, and pili (which sound like four of the seven dwarves, Roman version, but I digress). As a learned joke, somebody put all four of these together and then stuck –fication on the end to make a noun for the act of deciding that something is totally and absolutely valueless (a verb, floccinaucinihilipilificate, to judge a thing to be valueless, could also be constructed, but hardly anybody ever does). The first recorded use is by William Shenstone in a letter in 1741: “I loved him for nothing so much as his flocci-nauci-nihili-pili-fication of money”.
A quick Latin lesson: flocci is derived from floccus, literally a tuft of wool and the source of English words like flocculate, but figuratively in Latin something trivial; pili is likewise the plural of pilus, a hair, which we have inherited in words like depilatory, but which in Latin could mean a whit, jot, trifle or generally a thing that is insignificant; nihili is from nihil, nothing, as in words like nihilism and annihilate; nauci just means worthless.
The word’s main function is to be trotted out as an example of a long word (it was the longest in the first edition of the Oxford English Dictionary but pneumonoultramicroscopicsilicovolcanoconiosis edged it out in the second). It had a rare public airing in 1999 when Senator Jesse Helms used it in commenting on the demise of the Comprehensive Test Ban Treaty: “I note your distress at my floccinaucinihilipilification of the CTBT”. (worldwidewords.org)
About admin
Check Also
Fujifilm sets World Record . . . .for Situps!
|
global_01_local_1_shard_00001926_processed.jsonl/37498
|
HL1 article
Wiki images
This article would greatly benefit from the addition of more images.
Wiki cleanup
Wiki spoiler
This article contains spoilers. Read at your own risk!
"The can never know...the truth....."
―The Nihilanth[src]
The Nihilanth is the supreme leader of the Xen forces that invade Earth during the Black Mesa Incident, and acts as the main antagonist and final boss of Half-Life.
Physically, the Nihilanth resembles a gigantic, abnormally proportioned brownish-gray fetus with a massive head atop a smaller body. The creature's minuscule legs appear either to be vestigial or the remains of amputation, as the Nihilanth relies on a mechanical levitation device for movement.
His head is so large that he must be kept upright with a small cord that extends from the base of the spine to the back of the head. The Nihilanth's body features, like the other intelligent Xen races, has a third appendage protruding from the middle of his pectoral chest region. He has unusually long arms, huge hands, and disproportionate fingers.
The Nihilanth wears metallic wristbands similar to those worn by enslaved Vortigaunts.
Sometime before the Black Mesa incident, the Nihilanth's species came into contact with the Combine. What followed was an incredibly long struggle, that eventually ended with the Nihilanth's kind being hunted to near extinction. The Nihilanth himself was the only survivor, and he and his minions managed to escape into the borderworld, Xen, where they barely managed to survive in a new ecosystem.
Gordon Freeman is tasked with killing the Nihilanth as he was the only force holding the dimensional rift open after the Satellite Delivery Rocket launched by the Black Mesa Lambda Labs failed to reverse the Resonance Cascade. After Gordon enters Xen, the Nihilanth regularly contacts Gordon telepathically and occasionally taunts him. These messages are often received right after a teleportation in Xen.
Upon entering his lair, the Nihilanth attacks Gordon by launching two different types of energy spheres: a swarm of blue-colored electrical orbs which cause immense damage and have a small splash radius, and a slow-moving, green-colored orb which homes in and teleports him to other sections of the Nihilanth's lair populated by other Xen aliens. In addition, these green spheres teleport creatures into the Nihilanth's main chamber on impact with the cavern walls to help defend against intruders.
A series of gold-colored "energy spheres" orbit around the Nihilanth's head, rendering him impervious to damage. These are consumed as the Nihilanth takes damage, but specialized crystals within the upper portion of his chamber replenish the spheres as they vanish. After Gordon destroys these crystals, the shield put up by the orbs will not regenerate anymore. After a massive amount of damage is done, the shield drops and the orbs disappear, leaving the Nihilanth's body exposed and susceptible to damage. At this point, the glow of his brain is visible through his head.
After a large amount of damage is done to the Nihilanth's body his head opens up like a flower, revealing a shining, vulnerable brain. This appears to weaken his ability to attack, as once this happens he is only able to fire one electrical orb at a time. After a significant amount of damage is done to the brain, the Nihilanth floats up to the roof of his chamber and dies in a massive green explosion.
Half-Life: Decay
Dr. Richard Keller discovers an alien force actively holding the dimensional rift open from the other side, when Dr. Gina Cross and Dr. Colette Green attempt to release the dampening fields to create a resonance reversal after the Resonance Cascade, leading him to realize that not all the aliens are there by accident.
Furthermore, in the bonus chapter Xen Attacks, the Nihilanth orders two Vortigaunts, drone subjects X-8973 and R-4913, to retrieve several stolen Xen crystals from the Ordnance Storage Facility in Sector E Biodome Complex, a mission the Vortigaunts accomplish. This chapter also shows that the Nihilanth is capable of controlling when or where his minions are teleported and is capable of sending them quite close to their target.
Half-Life 2
The Nihilanth is mentioned by various Vortigaunts throughout City 17, such as the All-Knowing Vortigaunt, if they are triggered. It is through these messages that he is revealed that the Vortigaunts see Gordon as a messianic figure after he frees them by killing the Nihilanth during the Black Mesa Incident.
The Nihilanth is capable of actively holding the dimensional rift caused by the Resonance Cascade open, though not of opening a new one. He can control when and where his Vortigaunt minions are teleported to a fair degree. He also has some form of Telepathy, as evidenced by the numerous messages heard by Gordon Freeman on Xen. He is capable of using energy spheres as a shielding mechanism as well as for offense. He can regain strength to a certain extent using Xen Crystals.
Hl nihilanthcrystal
The Nihilanth regaining his strength using a Xen crystal.
The Nihilanth is defeated.
There are several cryptic phrases that are either spoken or telepathically broadcast by the Nihilanth once Gordon Freeman reaches Xen, but most are difficult to understand in-game. Below are transcripts of several speech files extracted directly from the Half-Life sound files. Note that these transcriptions may not be entirely accurate, as the exact contents of the Nihilanth's speech are fairly difficult to make out due to unclear articulation and the low, gravelly manner in which he speaks. Some of them are not heard at all in-game.
• "Comes... another...": Said when Gordon first enters Xen.
• "Win... you cannot win...": Said when Gordon enters Gonarch's Lair.
• "Done... what have you done...": Said after the Gonarch's defeat, when Gordon enters the chapter Interloper.
• "You are man... he is not man... for you he waits... for you...": Said when Gordon enters the second part of Interloper at the alien camp.
• "Die... you all die... you all die...": Said in the second part of the chapter Interloper.
• "Alone... aren't you alone...": Said in the 3rd map of the chapter Interloper and after the player is teleported by the Nihilanth's teleport orb for the first time.
• "The last... I am... the last...": Said when Freeman enters the final part of Interloper near an eerie, coral-like altar with a red portal.
• "Deceive you... he will deceive you...": Said when the player is teleported by the Nihilanth's teleport orb for the third time.
• "Now die... now die... now...": Said during the battle with the Nihilanth, when the player is teleported by the Nihilanth's teleport orb for the fourth time.
• "Their slaves... we are their slaves... we are..." Rarely said when Freeman enters the 3rd map of the chapter Interloper.
• "The truth... you can never know... the truth..." Said during the battle with the Nihilanth, when the player is teleported by the Nihilanth's teleport orb for the second time.
• "Thieves... you all are thieves... you all are...": Heard at the beginning of the bonus chapter "Xen Attacks" in Half-Life: Decay.
• "Freeeeemaaaaaannn...": The Nihilanth eerily utters Freeman's name at the very beginning of the game's final battle.
• "The last... you are the last... you are...": Unused quote.
Behind the scenes
Half-Life 2: Raising the Bar states that the first part of the Nihilanth's name is reference to Nihilism, while -anth is a common suffix that is related to flowers and is a reference to how his scalp peels open like a blossom.[1]
He could also be inferred that, because "Nihil" translates to "not" or "nothing," and -anth refers to man, or humans, the term Nihilanth means, literally, "Not Man".
• Using the Xen Trampolines scattered around the Nihilanth's lair, it is possible to get into his head. Hitting him with the crowbar shows an interesting blood effect not shown anywhere else, it cannot kill him but it can damage him until his health reduces to 1 point, at which point the player must switch to a firearm and shoot his brain, a single bullet will kill him.
• Using the "notarget" or "god" console command whilst fighting the Nihilanth and later killing him will result in a continuous loop of his dying animation with no sound and the player being stuck on this stage, not teleported to the G-man.
• In an Interview with Valve News Network, Gabe Newell's son Grey Newell said that the boss was inspired by his birth saying "The final boss of Half-Life 1, the giant evil baby monster, is supposed to be me. When my mother was in childbirth they were thinking, ‘what’s really scary’? And at the time, having a child seemed to be the most scary thing to everyone.”
List of appearances
|
global_01_local_1_shard_00001926_processed.jsonl/37511
|
How can we help?
What is the difference between PvE and PvP phases
In DC Universe Online (and many other online games), the terms or 'labels' PVE and PVP are used regularly to describe the type of game environment a player is participating in. PVE stands for 'Player vs. Environment", while PVP stands for 'Player vs. Player'.
In PVE environments, players work against non-player characters/monsters, or NPC's to accomplish tasks. PVE worlds do not have public or open-world 'player vs. player' combat, but may have specific areas or encounters where PVP combat might occur. DC has Legends PVP and Arena PVP; these scenarios can be accessed from the 'On Duty' tab on an 'on-demand' basis.
In PVP worlds, players still work against the same types of NPC combatants and encounters that PVE players do, but are also subject to attack from other players anywhere in the open world.
In DC Universe Online, we split PVE and PVP up into 'phases', or instances of the same environment. Players can switch between PVE and PVP phases by visiting the 'Phase Shifters', located in the central area of the Watchtower and Hall of Doom. This allows players to create a single character on a server, and lets them choose what environment they want to play in, when they want to play in it. (this differs from other gaming models, where a whole server is considered PVE or PVP)
Please be aware that as of GU 32, PvP gear may no longer be used in PvE instances. Players will be informed via the chat log when their gear is disabled and re-enabled. PvP weapons will become unusable but not unequipped.
|
global_01_local_1_shard_00001926_processed.jsonl/37512
|
How do I import reviews from AliExpress?
To import reviews from AliExpress, please follow these instructions:
1. Drag the "Import to Loox" button to your bookmarks bar (click here to learn how
2. Go to the AliExpress product page you'd like to import reviews from
3. While on that page, click on the "Import to Loox" button that you've added to your bookmarks bar
4. Choose the product you'd like to import to, using the "Import to" drop-down menu or by typing the product name
5. Define any desired filtering rules
6. Click the "Preview & import"
After completing the import process you can head over to your product page and refresh it to see all imported reviews.
Please note: AliExpress protects their customers' privacy by either censoring their name with stars or anonymizing the review by replacing the name with "Shopper" and that is how they will be imported.
What does the "Import variant information (Item types)" field do?
The "Item type" field includes product variant information. For example, if a customer orders a medium-sized, striped T-shirt, an "Item type" field could appear as follows:
When importing from AliExpress, Loox provides the option to import AliExpress product variants that the reviewers ordered.
Please note that these variants correspond with the AliExpress product that is offered and might not match the variants that you use on your store.
|
global_01_local_1_shard_00001926_processed.jsonl/37544
|
Category Archives: Tutorials
Overview of HTML5 tags
Overview of HTML5 tags HTML5 is a language for structuring and presenting content for the World Wide Web. It is known for its new markup, new JavaScript APLs.The main objective for HTML5 is to give better meaning to the web. We will look at some of the tag & its usage, article The main contain… Read More »
How To: Compress Websites Images to get Faster Page Speed
In web development the success of your websites are determined by speed and UI, how fast it loads. The design, color, information play’s the second role because there are thousands of website having the same or better information and better traffic. This noticeably show why most of the students are using instead of… Read More »
Welcome to Python 3.2 LiveTUT Learning Series -Day 1
In this set of tutorials we will discuss complete overview and some in-depth Concepts of Python 3.2 What is Python? Well Python is powerful Programming Language which has effective data structures and better approach to object-oriented programming. Python’s e syntax are simple and easy to understand together with its interpreted nature, make it an ideal… Read More »
How to: Re-enable the Task Manager when disabled by a Virus
Viruses are the most dreadful things that we don’t like coming into our computer. They perform various operations that make us feel annoyed and disturbed. When a virus is found in a computer ,the Antivirus cleans it .But sometimes Antivirus programs will not respond to viruses. As soon as we react to get rid of this problem , the virus would… Read More »
Use Google doc as Online Feedback Form, Event Registration page.
Google Docs is one power full cloud application from Google ,Which contains word processor, spreadsheet and presentation editor that enables users create documents faster and view then online. But it has unknown feature form which can be used for creating Feedback Form, Event registration page, surveys & much more.This might help you to avoid paying for services… Read More »
Subscribe Button for your YouTube Channel
Get Download Button for YouTube videos
ASP.NET MVC (Models, Views and Controllers)
ASP.NET is helps developers create dynamic web pages and powerful web applications.ASP.NET MVC(Models, Views and Controllers) is the same except that we get some additional featuers for reflecting data from a table easily and enable the client to add/edit/delete content in a database easily. Instance : http://example .com is the target client website. We can… Read More »
|
global_01_local_1_shard_00001926_processed.jsonl/37547
|
FileMaker Quick Find Alternative
FileMaker is awesome but not in all aspects specially when it comes to FileMaker quick find. If you don’t believe me, just ask your end users how many times do they use FileMaker quick search in a day.
The biggest drawback of FileMaker quick find is that you can’t perform a wildcard search using it. Well, you can perform a wildcard search on text and number fields using FileMaker quick find if you add a prefix and a suffix asterisk (*) to your search criteria. Seems to be pretty easy but, how about searching on date, time or timestamp fields? Let’s say we want to find all records with a number “10” in a time stamp field. To perform a wildcard find on a timestamp field you need to add at least six find requests as bellow:
“Read More”
Show Buttons
Hide Buttons
|
global_01_local_1_shard_00001926_processed.jsonl/37574
|
Multiple Vulnerabilities like Buffer Overflow Parsing HTML5 fragments, Multiple Memory Corruption in Mozilla Firefox
Security researcher firehack reported a buffer overflow when parsing HTML5 fragments in a foreign context such as under an <svg> node. This results in a potentially exploitable crash when inserting an HTML fragment into an existing document.
Style Switcher
Predefined Colors
Layout Style
Header Color
Footer Top Color
Footer Bottom Color
|
global_01_local_1_shard_00001926_processed.jsonl/37582
|
Archive for the ‘JasperReport’ Category
In many different forums, I have seen posts regarding how to send parameters to JasperReport. If you are still looking for an answer, you can definitely find it over here.
I am assuming that you are familiar with JasperReport and the JRXML template.
JasperReport allows you to pass parameters to the report during runtime. In order to do so you need to:
• Declare the parameter in your report template (jrxml) as follow
<parameter name="itemName" class="java.lang.String"/>
You can set a default value for the parameter in case it is not been passed. In order to do so, you can use the child element defaultValueExpression.
• You can then refer to the parameter that you have declared in your template using the syntax “$P{PARAMETER NAME}”
• To refer to the parameter declared earlier in a text field use the follow syntax
$P{ itemName }
The text field will display the value of this parameter when the report is filled.
• To pass the parameter declared earlier to a query, use the following syntax
SELECT * FROM product WHERE itemName = $P{ itemName } ORDER BY inventoryDate
• To dynamically modify portions of the SQL query or to pass the entire SQL query as a parameter the syntax differs a little. BE CAREFUL. The ! character is needed. See the following example
SELECT * FROM $P!{MyTable} ORDER BY $P!{OrderByClause}
The parameters here are used to pass the table name in the FROM clause and the column names in the ORDER BY clause. Note that you cannot use the normal parameters (i.e. $P{}) to dynamically modify your query.
Please note that the reporting engine first deals with the $P!{} parameter references by using their values to obtain the final form of the SQL query, and only after that it transforms the rest of the $P{} parameters.
Reference: The Definitive Guide to JasperReports by Teodor Danciu and Lucian Chirita
Read Full Post »
|
global_01_local_1_shard_00001926_processed.jsonl/37611
|
Be unique Name tag
Do you make a Statement? Do you as a person think about what you’re telling people every day? I’m not talking about saying, “Hi, my name is Bob.” This is a ‘little s’ statement. No I’m talking making a Statement– “I’m Bob the most amazing person you’ll ever meet and here’s why…” See the difference? If you just said, No, you don’t make that kind of Statement… Are you sure about that?
As a society, we make decisions for all sorts of reasons- but our first decisions are most influenced by what we see around us. Everyone knows first impressions are important, and most people will tell you you have to keep living up to that first impression. But how do you get beyond an impression, and into really making a statement? And why should you care?
It’s all about subtlety.
No, really, it is. A statement doesn’t have to be a huge screaming neon sign that’s fifty feet tall- it can be a quiet and reserved whisper. For example…
mouse made mountain
mouse made mountain by spysgrandson
Adams The Tetons and the Snake River
Adams The Tetons and the Snake River from Wikimedia Commons
Both images are of mountains. Both make a statement- but they are both uniquely different. I know people who would look at that rather astonishing orange mountain and say “Yes! That’s me!!” They are bright, vibrant people who care passionately about every detail around them and live life to it’s fullest. I also know people who would look at the Ansel Adam picture and say with quiet reserve and intensity, “No, that one’s me…” and they are also bright, vibrant people who care passionately about every detail around them and live life to it’s fullest but in a totally different way.
These two very different groups of people make two entirely different declarations simply by existing. They can’t help it. Every action you take, in every single way says something about you as a person. From the clothes you wear, to the car you drive, to the pages you like on Facebook- people are listening to the statements you make.
I’ve started to notice that the statements I see people making are continuing in an increasingly homogenized direction. Second example- I keep seeing the same girl in my town. She’s somewhere between 13 and 25, 5’5″, 115 pounds or so, has this shaggy hair style and she’s usually some form of brunette. Except, it’s actually probably closer to 100 people I keep seeing that look almost exactly the same. They’re trying to look exactly the same. Their statement is sameness, and it doesn’t have to be that way! Now, I know this is probably an extreme example, but still. For someone like me, who believes that every person is uniquely amazing in some way-it’s not just confusing, this is down right disheartening.
I’m not unique in noticing this. Great bloggers like Seth Godin talk about this trend all the time. He writes articles and books that are more succinct and thought provoking than I ever will be because he’s an excellent and insightful author. But I’m an artist. I create jewelry that practically jumps out from the crowd and makes a bold statement of presence to whomever sees it. And this is my blog- so my initial reaction is to draft a declaration of uniqueness in text as I do in metals. To design a statement that can be a starting point for true originals:
You are your own person. You are individual. You are different than the next person. You are an exclusive original. There have been, are, and will be more people than there are stars in the sky, and each person is separate and distinct from the next. You are not a clone. You are actually unique- don’t hide that! Refuse to blend in. Let your statement be your own.
Now, I’m not saying you should wear neon striped leggings and combat boots with 6 inch soles so you stand out from the crowd… unless that’s who you are- then more power to you! No, all I’m saying is when you walk through this world, remember that you are unique. Carry yourself as a special, irreplaceable person should. Stand out from the crowd in a way that shows the world who you are. Design your declaration for you and you alone.
What’s your Statement?
|
global_01_local_1_shard_00001926_processed.jsonl/37628
|
Ideas to Market Your Book All Year-Round
Here’s information for my fellow authors!
market a book
I probably don’t have to tell you that marketing your book is a year-round endeavor. Today’s digital world provides you with endless ways to market your book and connect directly with your readers. Just like we all build relationships in the real world… with an investment of your time, you can build your readership online. As you put together your digital marketing game plan, here are some ideas for you to consider.
View original post 309 more words
So whatcha thinking?
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/37633
|
RPA Dallas Solution Providers: 2 Day Conference only
01/17/2018 02:00 AM - 01/18/2018 12:00 PM
Event Pass Information
Event Pass Type
Standard Pricing: 2 Day Conference only $2,499.00 USD
Event Details
RPA & Cognitive Congress Dallas is assembling leading service delivery and automation professionals for frank and pragmatic discussion about RPA, the benefits and opportunities of this technology, and the real-world challenges they’re facing in implementation. Use cases from early adopters will demonstrate how machine learning technology and digitization solutions, such as OCR and NLP, can take out the human touchpoints of a process and supercharge RPA. This discussion will be framed within analysis of the organizational transformation that is necessary to fully maximize the ROI from process automation and future technological innovations.
Key Topics to be Discussed Include:
• Quantifying and unlocking the potential of RPA: Building the business case, constructing a call-to-action proof-of-concept, selecting a process to pilot, the pros and cons of re-engineering before automating, vetting vendors and implementation partners, determining whether to start in F&A or HR, deciding whether to use an attended or unattended approach.
• Implementing RPA: Change management & communication, aligning realistic leadership expectations, qualifying success, establishing a governance model, managing bot security and IT infrastructure.
• Scaling RPA: Hub and spoke vs. ‘as a platform’, monitoring the performance of bots, managing global deployments, balancing speed and sustainability.
• Supercharging’ RPA: Determining which processes are best suited to cognitive functionality and AI, and intelligently enhancing your RPA with that functionality.
• Digital Transformation: Reconfiguring your organization to take full advantage of digital innovation.
|
global_01_local_1_shard_00001926_processed.jsonl/37636
|
New! Generate native iOS and Mac animation code Read More →
A powerful animation and prototyping application for Mac & iOS
Download TrialRequires macOS 10.12+ Buy Now $99
“It’s kind of like Sketch meets After Effects
– A designer
Visually drag and drop layers to build complex interfaces on a WYSIWYG canvas. Add animations and tune them with the integrated timeline.
Have 1 minute? Watch a video.
“It’s kind of like PaintCode but for Core Animation”
– A developer
News and Updates
Just a few examples of what you can create with Kite Compositor. You can explore all of these example documents and more from within the template chooser of the app.
See all examples ›
See more in the Showcase ›
Kite is full of amazing tools and features to help you bring user interfaces to life quickly. See all features ›
Set colors, adjust animation curves, add Core Image filters – all at the click of a mouse.
Drag and drop layers and animations from the library to build your interface visually.
Save reuseable layer hierarchies into your library for easy component reuse.
e.g. “My Button”
Design on Mac View on iOS
Kite Viewer for iOS
Generate Native Core Animation Code
Generate zero-dependency Swift or Objective-C code for your animation
Code compatible for both iOS and Mac
No more guessing how fast something should move, how large it should grow, or how to ease between keyframes
Generate Native Code for your Design
Adobe XD Integration
Integrate with Adobe XD CC
Perfect your design in Adobe XD and then import it into Kite to polish the final animation details! Preserve animatable layer properties like bezier paths, colors, text attributes, shadows, and much more.
Export Your Design
Import from Sketch
Import From Sketch
Scripting Feature
BetaEmbed Kite Documents in Your Own App
App developers can download the KiteKit framework to embed and play .kite documents right from within your own iOS or macOS apps. For examples and documentation, see the KiteKit GitHub repo.
Embed Kite Documents in Your Own App
Built on Core Animation
Built on Core Animation
Kite was built from the ground up for Mac using macOS's native Core Animation technology.
Core Animation is one of the key underpinning graphics technologies on Mac and iOS that produces stunning animations at high framerates.
|
global_01_local_1_shard_00001926_processed.jsonl/37639
|
Insert quotas in your survey
Compatibility:IdSurvey 6IdSurvey 7
With IdSurvey you can quickly insert quotas in your survey to check data collection focusing on specific quantities.
Quota management is available for all methods: CATI, CAWI and CAPI.
For CAPI (face-to-face) module data synchronization with the server is necessary to update quota progress. The quota progress is available in real time for CATI and it can also be checked by interviewers on their interface.
The system runs a “Normal” (the check is only performed at the beginning and the end of the survey or in pages with an “update field” setting) or “Aggressive” (the check si performed after each page) control depending on what was set in “Survey settings”.
IdSurvey manages both simple and stratified quotas on an unlimited number of parameters. You can set quotas on contact variables already known and/or on variables obtained during the interview. In this case you have to use on questions the function “Update field” – that in software version previous than 6.0 is called “Update quota” (you can check related article in this knowledge base).
You can either insert quotas in your survey manually with GUI or import them from a file in Quotas Settings section.
Instructions to create a quota with GUI
To insert quotas in your survey via GUI, go on “Quotas Management” section of the survey menu and click on the “+” button on top left to add a new quota. The page you display is the quota editor where you have to complete all fields to create your new quota.
“Description” is the title of the quota that identifies values requested.
“Color” is the color you pick to associate with a certain quota.
“Required” is the number of interviews required to complete that quota.
“Set filter” is the editor you have to use to set parameters for your quota. To add parameter(s) click on the “+”. From the first drop down list select the field where the value that identifies your quota is saved. Second drop down list is to select the symbol to build your quota. Finally third text box is to write the value that identifies the quota and that is present in field selected in the first list.
You can stratifies multiple parameters for the same quotas adding more conditions with the “+” (for example, females from “Zone” Europe).
quota management editor
Instructions to create a quota importing an Excel file
Quotas can be also imported into Quotas Settings section using an Excel file.
To build your Excel file you have to insert (exactly in this order):
• column “Description”: insert the name of the quota with no space
• column “Color”: insert the color code to associate to the quota
• Name of the field(s) to create the quota on: insert the name of the field or (if stratified quota) fields to insert values
• “Required”: insert the number of required contacts for the quota
quotas excel file
Excel file for simple quota on “Zone” field
Schermata 2016-08-23 alle 15.45.02
Excel file for stratified quota on “Gender” and “Field1” fields
Once you created your file you can import it on Quotas Settings. Click on the gearwheel button and then on “Insert”. Click on “Upload” on top left in the upload window then “Add file” to select the Excel file from your computer.
Click on “Upload” then on “Close” when it’s 100%. Click on “Insert”, select the Excel sheet then click “Insert data”. Wait for the upload to be completed and close.
Leave A Comment?
|
global_01_local_1_shard_00001926_processed.jsonl/37642
|
Kopitiam Bot
News · Lifestyle · Tech
Rami Malek Filmed The Entire Queen Live Aid Set For ‘Bohemian Rhapsody’
(Source: ladbible.com)
Queen biopic Bohemian Rhapsody is smashing it at the box office, spending two weeks at the top spot in the UK.
The movie is the ninth biggest hit of 2018 so far, pulling in over $100 million (£78.1m) in the US and $185 million (£144.6m) in the rest of the world. Critics and fans have heaped a ton of praise on the movie and Rami Malek for his portrayal of Freddie Mercury.
Malek reportedly watched Mercury’s 1985 Live Aid performance more than 1,500 times to nail the scene, which he absolutely did to be fair. Malek managed to perfectly copy every little gesture, head movement and step, so all his hard-work paid off and the Live Aid scene, which ends the movie, is one of the most talked parts of it.
In a recent interview for Collider, Malek revealed that he actually performed the full six-song set for the camera, so that it could be dropped in throughout the movie, meaning that there’s a complete version of the entire performance there – most likely going to end up as an extra on the DVD when its released.
Speaking to news.co.au about getting the performance spot-on, Malek previously said: “That’s something we tried to get move for move, even just gesture for gesture perfectly.
“It felt like I had it in my bones and I didn’t want to keep going back to it. It felt like sometimes you would lose a little bit of the authenticity if you tried to nail it so perfectly.
After clips of the scene turned up alongside the original online fans rushed to comment on how good a job Malek and the team had done, with one writing: “These dudes were literally able to recreate the greatest live show ever performed and made a new generation be able to experience it as if they were actually there. This scene literally gave me fucking CHILLS god damnit.”
Another said: “They did it precisely that I got confused which is the original and which is the remake.”
I reckon Freddie would be made up with this.
Featured Image Credit: 20th Century Fox/PA
More Info: ladbible.com
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/37662
|
Stateless Service Gotchas
Home / Developer Tools / Stateless Service Gotchas
Stateless Service Gotchas
Why stateless services?
The primary benefit of stateless services is scalability. In particular, Functions-as-a-Service — AWS Lambda, Azure Functions, Google Cloud Functions, etc. — should only host stateless services. Because each function execution might run on a different machine and multiple executions may run in parallel on different machines.
What is state?
State is just data. But in this context it means data kept in memory between executions, and needed in order to service requests. A stateless service should not be required to keep anything between executions, but it may depend on other parts of the architecture with “memory” like databases.
How To
So this is easy right? Just shove everything in a database instead of keeping it in memory. Nearly that. Below I have outlined some specific gotchas that can make a service stateful unintentionally. The first couple of the gotchas below may already be disallowed by Functions-as-a-service providers. But I’ll mention them anyway, because statelessness can be useful even if not using FaaS.
Gotcha: resource handles
This is pretty well-understood nowadays, but it bears mentioning that open files and network connections have state. To be stateless, you cannot assume a resource handle is still open between invocations of the service. You have to assume the service may be shutdown and restarted on a different node at any time. In general, it is best to open a resource only when you need it and close it immediately afterward.
Gotcha: session data
Many platforms offer built-in session handling and default to keeping it in-memory. If you want to use session data, move it off of being handled by the service, probably into a database.
Gotcha: ordering
You cannot assume that two requests issued asynchronously will be executed in the order they are sent. It could be that the first request gets delayed in processing on one node. Then the second request runs on a different node and finishes first. If the order of processing is important, wait for the first request to finish before issuing the second.
Gotcha: serial identity
The common type of serial identity is the auto-increment primary key. Since many copies of a service may be executing in parallel, you cannot make assumptions about the next-assigned ID or guarantee a gapless ID sequence due to write conflicts (discussed below). In fact, the whole concept of serial identity can become a bottleneck to scalability unless due considerations are made. There are other identity strategies that fit better for scalability, including ones that are (mostly) ordered.
Gotcha: write conflicts
It can happen that two users are trying to make changes to the same entity at the same time. Classic example: An account has $100 balance. Two simultaneous requests are issued to withdraw $100. In a naive multi-threaded or multi-node system, neither request knows about the other, so both would likely succeed. You would rather this kind of situation be detected as a write conflict. (In the real world, banks see this as an opportunity for profit instead of a problem. But either way they have to handle it.)
Every API potentially has this problem. But a lot of APIs never take write conflicts into consideration, and might not need to. In low-volume systems or systems where users can’t change shared resources, concurrency conflicts are rare. And the worst case is typically an every-blue-moon support call: “Hey, I just made changes to this item, but now my changes are missing.” Two simultaneous changes to an item resulted in one of the changes overwriting the other (aka Last Writer Wins). Support replies “Have you tried turning it off and on again?” and everybody moves on with their lives.
Write conflicts are where you have to start thinking about concurrency control. The usual suspects being pessimistic or optimistic concurrency.
Pessimistic concurrency
In general pessimistic concurrency will get slower as you add more nodes. You can think of it as having to obtain an exclusive lock on the data before you start running business logic. More nodes means longer waiting times for a lock. Since the point is being scalable, pessimistic concurrency is not a great fit.
Optimistic concurrency
Optimistic concurrency says I’ll go ahead execute the request and prepare all the changes. But before I commit my changes, I’ll make sure that the entity is exactly the same as when I started… nobody else changed it in the meanwhile.
The most common way to implement optimistic concurrency is by adding a “version” to each entity. It could be, for example, an integer or an etag. When I start executing the request I can read the version of the entity from the database or let the client provide it. (After all, the client has made the decision to change the entity based on the version they had at the time. So why not let the client tell me that?) Then if the version still matches when I’m ready to commit, I bump the version with the commit.
If the version does not match, then there are decisions to make. Do I stop and error? Do I reread the entity and retry the request? Do I commit the changes anyway? Fortunately these are not my decisions to make. I have to ask my business experts: what should I do if two people try to make changes to the same order at the same time? It might even come down to very specific circumstances like: Bob is trying to cancel the order but meanwhile Pete just added $10,000 more in sales to it. They will probably tell you to chuck Bob’s request in the trash.
Yep, scaling will make you think about problems you never considered before. Both technical and business-oriented.
Should all services be stateless?
Oh, you want more? Ok, well sometimes it is not worth the trade-off. For example internal APIs with a low number of requests per second. Save yourself some time there by skipping the extra-cost scalability features.
Doesn’t this just move the scalability problem to the database?
Yes, great observation! With your services stateless, you can deploy as many copies as you need to handle your load. But your storage tech may not be able to handle it. That is a topic for another post.
Addendum – Examining the Scalability of Authentication and Authorization
Authentication means proving yourself to be a valid user. “This Van Gogh painting has been authenticated as genuine.” Authorization means checking whether a valid user has permission to perform an operation. “You are authorized to access floors 1-3, but floors 4 and above are off-limits.” When referring to both I usually write “auth”.
Not that I’ve done a formal survey, but most auth frameworks should already work with stateless services. Users, permissions, and the link between them are likely stored in a database anyway. Traditional auth frameworks store the list of active logins in the database too. Then your service needs to lookup that active login session on every request to make sure it hasn’t been terminated (logged off by either the user or an admin) or had its authorizations changed. That means a network round-trip to ask the database on every request. Even in stateful services, this can cause unwanted latency. So auth frameworks frequently introduce in-memory caching to reduce the number of database reads.
The problem here is that in-memory caching has limited effectiveness on stateless services, if the FaaS provider even supports it. Because each service invocation could run on a different service instance, there will be a lot more cache misses than in stateful services. And consequently a much larger percentage of requests will need to make a round-trip to the auth database. Thus adding latency and database load which may hinder scalability. To make caching effective again, you would need to use an external cache like Redis. That is another integration point, another system to care for and feed.
The newer alternative is to use a cryptographic signature in lieu of centralized database lookups. The common implementation is JWT. I have an LI5 post that does a decent job comparing JWT with traditional authorization. JWT allows for self authorization. That is, the service can check for itself (using CPU instead of a DB round trip) whether the token is valid. Once validated, the token’s data (e.g. roles and permissions) can be trusted.
But JWT has a couple of downsides that come to mind. The first one is that it has a learning curve. Like most things that use cryptography, it is best to let a trusted provider or library take care of most of the gory details. Configuring it can still feel other-worldly. But don’t panic. Others have done it, and you can too.
Second, permission changes are not immediate. Remember above how I said that authorization is self-service? Without checking some central list of valid logins, I do not have a way to know that a particular token has been administratively revoked. As far as my service is concerned the token will continue to be valid — letting the user make requests — until it expires. The common way around this is using Refresh Tokens. This boils down to forcing a reauthentication every so often (e.g. every 5 minutes). But the reauthentication happens behind-the-scenes with no user interaction. That way at least every 5 minutes (or whatever time you set) you get updates on permission changes. This outcome is eerily similar to traditional auth lookups with 5-minute caching. 😉
Personally, I have been using JWT for newer development. I haven’t found that I needed refresh tokens so far. It is a good thing too, because most sources say that refresh tokens should not be exposed to the browser. What fun.
Leave a Reply
Your email address will not be published.
|
global_01_local_1_shard_00001926_processed.jsonl/37663
|
--Your friends at LectureNotes
Managerial Economics
by Bhavya BansalBhavya Bansal
Type: NoteInstitute: lingayas university Offline Downloads: 2Views: 328Uploaded: 2 months ago
Share it with your friends
Suggested Materials
Leave your Comments
Bhavya Bansal
Bhavya Bansal
Lesson - 1 Business Economics- Meaning, Nature, Scope and significance Introduction and meaning : (Author : Dr. M.S. Khanchi) Business Economics, also called Managerial Economics, is the application of economic theory and methodology to business. Business involves decision-making. Decision making means the process of selecting one out of two or more alternative courses of action. The question of choice arises because the basic resources such as capital, land, labour and management are limited and can be employed in alternative uses. The decision-making function thus becomes one of making choice and taking decisions that will provide the most efficient means of attaining a desired end, say, profit maximation. Different aspects of business need attention of the chief executive. He may be called upon to choose a single option among the many that may be available to him. It would he in the interest of the business to reach an optimal decision- the one that promotes the goal of the business firm. A scientific formulation of the business problem and finding its optimals solution requires that the business firm is he equipped with a rational methodology and appropriate tools. Business economic meets these needs of the business firm. This is illustrated in the following presentation. Economic Theory and Methodology Decision problems in Business Business Economic Application of Economic Theory and Methodology to solving Business problems
Optimal Solution to Business Problems it may be that business economics serves as a bridge between economic theory and decision-making in the context of business. According to Mc Nair and Meriam, “Business economic consists of the use of economic modes of thought to analyse business situations.” Siegel man has defined managerial economic (or business economic) as “the integration of economic theory with business practice for the purpose of facilitating decision-making and forward planning by management.” We may, therefore, define business economic as that discipline which deals with the application of economic theory to business management. Business economic thus lies on the borderline between economic and business management and serves as a bridge between the two disciplines. Nature of Business Economics : Traditional economic theory has developed along two lines; viz., normative and positive. Normative focuses on prescriptive statements, and help establish rules aimed at attaining the specified goals of business. Positive, on the other hand, focuses on description it aims at describing the manner in which the economic system operates without staffing how they should operate. The emphasis in business economics is on normative theory. Business economic seeks to establish rules which help business firms attain their goals, which indeed is also the essence of the word normative. However, if the firms are to establish valid decision rules, they must thoroughly understand their environment. This requires the study of positive or descriptive theory. Thus, Business economics combines the essentials of the normative and positive economic theory, the emphasis being more on the former than the latter. Scope of Business Economics :
As regards the scope of business economics, no uniformity of views exists among various authors. However, the following aspects are said to generally fall under business economics. 1. Demand Analysis and Forecasting 2. Cost and production Analysis. 3. Pricing Decisions, policies and practices. 4. Profit Management. 5. Capital Management. These various aspects are also considered to be comprising the subject matter of business economic. 1. Demand Analysis and Forecasting : A business firm is an economic organisation which transform productive resources into goods to be sold in the market. A major part of business decision making depends on accurate estimates of demand. A demand forecast can serve as a guide to management for maintaining and strengthening market position and enlarging profits. Demands analysis helps identify the various factors influencing the product demand and thus provides guidelines for manipulating demand. Demand analysis and forecasting provided the essential basis for business planning and occupies a strategic place in managerial economic. The main topics covered are: Demand Determinants, Demand Distinctions and Demand Forecastmg. 2. Cost and Production Analysis : A study of economic costs, combined with the data drawn from the firm’s accounting records, can yield significant cost estimates which are useful for management decisions. An element of cost uncertainty exists because all the factors determining costs are not known and controllable. Discovering
economic costs and the ability to measure them are the necessary steps for more effective profit planning, cost control and sound pricing practices. Production analysis is narrower, in scope than cost analysis. Production analysis frequently proceeds in physical terms while cost analysis proceeds in monetary terms. The main topics covered under cost and production analysis are: Cost concepts and classification, Cost-output Relationships, Economics and Diseconomics of scale, Production function and Cost control. 3. Pricing Decisions, Policies and Practices : Pricing is an important area of business economic. In fact, price is the genesis of a firms revenue and as such its success largely depends on how correctly the pricing decisions are taken. The important aspects dealt with under pricing include. Price Determination in Various Market Forms, Pricing Method, Differential Pricing, Product-line Pricing and Price Forecasting. 4. Profit Management : Business firms are generally organised for purpose of making profits and in the long run profits earned are taken as an important measure of the firms success. If knowledge about the future were perfect, profit analysis would have been a very easy task. However, in a world of uncertainty, expectations are not always realised so that profit planning and measurement constitute a difficult area of business economic. The important aspects covered under this area are : Nature and Measurement of profit, Profit policies and Technique of Profit Planning like Break-Even Analysis. 5. Capital Management : Among the various types business problems, the most complex and troublesome for the business manager are those relating to a firm’s capital investments. Relatively large sums are involved and the problems are so complex that their solution requires considerable time and labour. Often the decision involving capital management are taken by the top management. Briefly Capital management implies planning and control of capital
Lecture Notes
|
global_01_local_1_shard_00001926_processed.jsonl/37664
|
(redirected from beside)
Also found in: Dictionary, Thesaurus, Idioms.
See: also, further, save
References in classic literature ?
Wasn't that just like you, Aunt Polly, to come on here and get married right beside my bed, so I could see you.
To friends above, from fiends below, the indignant ghost is riven - "From Hell unto a high estate far up within the Heaven - "From grief and groan, to a golden throne, beside the King of Heaven.
But before she had quite reached it another vehicle shot out from a clump of trees on the summit, came round the bend of the road there, passed the luggage-cart, and halted beside Tess, who looked up as if in great surprise.
Beside me frolicked a laughing brooklet, hurrying upon its noisy way down to the silent sea.
|
global_01_local_1_shard_00001926_processed.jsonl/37683
|
List Headline Image
Updated by The Road We've Shared on Nov 03, 2015
3 items 1 followers 0 votes 21 views
Alzheimer's and Down syndrome
A list of sites that contain resources for those with a dual diagnosis of Down syndrome and Alzheimer's disease.
Aging and Disability Resource Center Program (ADRC)
Maps of state ADRC program profiles
National Task Group on Intellectual Disabilities and Dementia Practices
What are we? The 'NTG' is a coalition of individuals and organizations working toward ensuring that the needs and interests of adults with intellectual and developmental disabilities who are affected by Alzheimer's disease and related dementias - as well as their families and friends - are taken into account as part of the National Plan to Address Alzheimer's Disease.
Study led by Temple researchers reveals new link between Down syndrome and Alzheimer's
Individuals with Down syndrome who survive into adulthood face the additional challenge of early-onset dementia, in which toxic amyloid plaques build up in the brain. The condition is strikingly similar to Alzheimer's disease, and as new work led by researchers at the Lewis Katz School of Medicine at Temple University shows, dementia in Down syndrome involves defects in a regulatory enzyme known as γ-secretase activating protein, which also happens to malfunction in Alzheimer's disease.
|
global_01_local_1_shard_00001926_processed.jsonl/37698
|
17 All Too Real ✌🏼 Truths about Breaking up 💔 No One Ever Talks about 🙊 ...
Breakups are tough. Everyone tells you that there are other fish in the sea, you're better off, and you should just get over it, but it's not that easy. Every breakup is different, every reason is different, but there are lots of similarities, too. The pain, the regret, the hope – those are usually the same. It's just that nobody ever tells you the full truth about breakups.
1. Typically, the Love Doesn't Just Disappear
person, film noir, emotion, demon, But,
You can't just turn it on and off like a light switch, even if your ex was horrible and your breakup was messy.
2. And It's Possible to Love Someone and Hate Them at the Same Time
person, facial expression, portrait photography, portrait, photo shoot,
You'll probably feel a whole big mix of things after your breakup, in fact.
3. Certain Songs, Movies, and Books Will Hurt You Too Much for a While
person, singing, guitarist, musician, hairstyle,
It might be a while before you can listen to certain songs, watch certain things, and go to places that remind you of your ex.
4. Sometimes Venting Your Vitriol Really is the Only Way to Feel Better
person, black and white, facial expression, human action, film noir,
Everybody always tells you to rise above it, and you might resist the temptation, but it's understandable if you don't.
5. You Might Want to Get Back with Your Ex … a Lot
facial expression, emotion, film noir, unabashinglyme, You,
If you really think it's a possibility, you might want to surround yourself with friends and family for a while, so you don't send any texts or make any calls you'll regret.
6. You Might Even Be Willing to Put Yourself in Some Really Painful Situations
black, person, photograph, black and white, photography,
For example, you might force a friendship with your ex just to keep them in your life, even though it hurts.
7. It's Possible You'll Insta Stalk Your Ex without Even Really Wanting to
Catfish: The TV Show, clothing, hairstyle, blouse, think,
Facebook and Twitter, too – the urge to see what they're up to and how they're dealing is just too much sometimes.
8. You'll do Your Fair Share of Wallowing, and That's Okay
person, black hair, mouth, Somewhere, deep,
Wallow as much as you need to until you start feeling more like yourself – you need time to heal and grieve.
9. Even Though It's Not True, You'll Feel like You'll Never Love Again
person, facial expression, emotion, You, have,
Better things are waiting for you in the future, and you'll realize that in time.
10. It's Common to Isolate Yourself for a Little While
person, Seriously,, I'm, done,
While you're grieving or raging or wallowing, you don't always want to be around other people.
11. You Might do Some Things You Aren't Proud of
person, emotion, profession, KHLOE, LAMAR,
Like eating the entirety of your fridge or drunk texting your ex.
12. Like Trying to Make Your Ex Jealous
person, emotion, film, romance, suck,
This is a possibility, too, and it's understandable, honestly.
13. Or Flirting/hooking up with Their Friends
person, photograph, black and white, facial expression, painting,
So is this, I think almost everybody feels that way, whether they go through with it or not.
14. You Might Decide You Need a Revenge Rebound
person, singing, you, can, see,,
The revenge may or may not pan out the way you want it to, but sometimes a rebound is exactly what you need.
15. And It's Totally Possible You'll Get a Dramatic Haircut
film noir, emotion, One, day, you,
This is a popular breakup trope, but it's kind of true, you know?
16. There Will Be Days when You Don't Even Want to Change Your Clothes
hair, person, hairstyle, singer, emotion,
This goes hand in hand with the wallowing, but more than that, you may go through a period where you don't care about anything at all.
17. And Reminders of Your Ex Will Either Hurt You or Drive You into a Rage
person, music, profession, singing, guitarist,
So, you might wind up holding your ex's shirt and sobbing into it or collecting all the stuff that's still at your place and lighting it on fire.
The most important thing to remember, though, is that it will get better. Your heart will heal!
Tara Elizabeth Nixon
After a couple On and off months he's now officially ended things with me and I still want him in my life and we're "trying to be friends" but I still love him and it makes it hard 😪
Tara Elizabeth Nixon
#6 tho omg what do I do
Lana Zastoupil
I just may love mine he says we need a break 😩
Meditate! Love him but don't let his words get to you and destroy your inner peace!
Help! I feel like I might have started going down this path. I really love him but sometimes everything he says gets on my nerves! Any advice on how to stop this?!
View all comments
|
global_01_local_1_shard_00001926_processed.jsonl/37725
|
Grade 7 Maths Tests
Home/Tests & Exams/Grade 7 Maths Tests
Click on the folder links below to navigate through the material. To download a specific file click on the file icon or hyperlink to start downloading the material.
To access this content, you must purchase Basic Annual Paid Membership, or log in if you are a member.
|
global_01_local_1_shard_00001926_processed.jsonl/37735
|
Getting Help from Your Program Administrator
Do you have a question about the mentoring program? Need some advice on working with your mentoring partner? Let us know!
For program-related and employee-specific questions, contact your program administrator. You can send an email to your administrator directly (through your business email directory), or you can use MentorcliQ to reach out.
The monthly QuickcliQs (mentoring activity surveys) include a mechanism for reaching out to your administrator.
To contact your administrator using the QuickcliQ
1. Click the link in the QuickcliQ email to open the QuickcliQ.
2. At the bottom of the form, select Send a note to my program administrators.
3. Enter your message.
4. Click Submit
To contact MentorcliQ support
For MentorcliQ software or system access issues, feel free to reach out to the MentorcliQ support team at We're happy to help!
|
global_01_local_1_shard_00001926_processed.jsonl/37769
|
Arnold "The Tennis Machine" Ignashov
Arnold Ignashov
Tennis no Ouji-sama
add Supporting
Member Favorites: 0
Arnold Ignashov (アーノルド・イグニショフ)
After immigrating to the United States from East Germany as a child, Arnold became disillusioned and turned to life as a street punk. After he was beaten up, he discovered a magazine with an article about Baker training athletes and becomes involved with his program. According to Baker, Arnold has never lost in an official match. Part of this is due to his determination to not want to return to this "hellish" life; however, he loses to Syuusuke Fuji of Seigaku, who incidentally has never lost in an official singles match before at this point during the Goodwill Games. Arnold is called a tennis machine because of his accuracy and the ability to finger out his opponent's shots and countering them.
Voice Actors
Matsumoto, Yoshirou
|
global_01_local_1_shard_00001926_processed.jsonl/37789
|
Get Natural Dog Training on Kindle
Introducing the Natural Heeler™
Faith is a Four-Legged Dog
Many clients of problem dogs are afraid that their pet, once a happy-go-lucky pup, has gone bad. Or they fear that an evil gene is now beginning to express itself, or worse, that they have failed their dog in some irretrievable, unredeemable way. As I go on to assure them that there is nothing constitutionally wrong with their dog, that their dog’s output is simply recapitulating its input according to principles of thermodynamics, which to me is great news since it means that it’s a law of nature that their dog can be healed, some sigh and say “I hope you’re right.” Unfortunately however hope won’t do us any good and so I reply: “Hope is a four-letter word.” It’s the difference between saying; “I hope help is on the way.” versus; “I know help is on the way.” What we need is faith. “Okay, then I will have faith in you.” Nope, we’re not quite there yet. “Don’t put your faith in me, have faith in your dog.” A dog will always choose flow over fear once he can feel it. Our job is to help him feel it. Then help IS on the way.
Want to Learn More about Natural Dog Training?
Create Your Account Today!
Published April 16, 2016 by Kevin Behan
Tags: , , , ,
9 responses to “Faith is a Four-Legged Dog”
1. Greg says:
How do you deal with fear using the Theory of thermodynamics? What is a protocol to show a dog a better way?
2. Kevin Behan says:
In my thermodynamic interpretation of behavior, fear is the collapse of a state of attraction. A state of attraction arises from the confluence of the balance and hunger circuitry. If balance is stronger than hunger, the dog is susceptible to a collapse when the rate of change becomes too high for his comfort zone, which is marginal. What makes a collapse frightening is the dog’s perception of falling, literally, and this is conjured up from the physical memory of an intense rate of acceleration, which is how a dog perceives a stimulus, i.e. being stimulated into motion. I call these sensations. If hunger is stronger than balance, then the dog is impervious to these sensations and instead experiences the stimulation of the stimulus as arousal and his body feels sensual. So what’s gained by this understanding is that we can see that fear is a complex construct, there is no such “thing” as fear per se, as if it is a monolithic and fundamental building block of emotional experience. Rather there must first be a state of attraction that collapses and thereby produces a powerful cascade of “ungrounded” sensations. Therefore we can strengthen a state of attraction through the five core exercises so that the dog’s threshold of collapse is raised until it experiences the provocative event as a normal spike in an overall feeling of flow, like a modulating amplitude in a signal embedded in a radio wave. In other words we can turn static into information. The capacity to sustain a state of attraction is based on a feeling of grounding, a literal projection of the body’s physical center-of-gravity into the object of attraction and which is then fueled by the dog’s hunger circuitry. (This is the basis of a sexual drive which can then evolve into an affiliative relationship.) Change when in the hunger modality is perceived of as good because it heightens a state of arousal. The five core exercises strengthen the dog’s feeling of grounding so that the stimulation cannot overwhelm the dog’s balance circuitry and he can perceive and respond through his hunger circuitry. Whereas too high a rate of change in balance circuitry collapses the state of attraction. A dog can easily learn impulse control when aroused, but cannot (other than being left in a profound state of conflict) when stimulated.
3. Antje Hebel says:
Sorry, I have 2 unclear phrases:
1. What are the 5 core exercises? Bark, bite, push, pull, making contact?
2. What exactly is the difference between an aroused and stimulated dog? For me as German, it means the same. But how can we differentiate if a dog is “aroused” or “stimulated”?
4. Kevin Behan says:
The 5 core exercises are Push (projecting force)–Collecting—(absorbing force)—Bark–(project and absorb force in one locomotive cycle)—Rub-a-Dub–(grounding force in the shoulder blades)–Bite/Carry—(complete the emotional cycle to the DIS point at center of circle). These exercises develop a dog’s capacity to rotate its shoulders in all axes/planes so that it can easily integrate objects of attraction/resistance into its locomotive rhythm (which serves internally as a metric of well-being) and sustain a state of attraction by being able to oscillate between projecting and absorbing force in mirror image to what it’s attracted to. Because of this shoulder flexibility the dog feels in motion even when restraining itself from movement. This is because it is able to subliminally referent its breathing in a deep metered way as a facsimile for movement. Its vagal tone is improved and its body feels whole and sensual. This then induces the object of attraction/resistance to reciprocate in kind since all beings have the same definition of well-being and are able to communicate and integrate via this internalized rhythm of locomotion.
I make the distinction between stimulation and arousal due to the balance/hunger continuum by which the animal mind is configured. So stimulation is when the dog is knocked off balance, displaced from the emotional stasis of whatever mood it was in. Arousal on the other hand is when it feels physically connected to stimulus via emotional projection of p-cog and so is able to mirror via the whole body/relaxed forequarters described above. A stimulated state only wants to return to neutral, an aroused state wants to integrate and realize more energy than was previously in hand so that the new state of equilibrium holds more force, i.e. coupled wave forms.
5. Antje Hebel says:
Thank you. I try to understand the meaning, but it is very complicated for not native english people…
6. Kevin Behan says:
To boil it all down, the five core exercises give a dog a feeling of movement that he can then associate with a calm breathing pattern, and then he will concentrate on breathing calmly rather than physically moving or reacting when the circumstances might be too tense.
7. Willem says:
That last response was amazing! Please do a couple posts about theory in that voice it helps so much to hear the dynamics in more everyday, familiar terms, even though t doesn’t speak to the thermodynamic foundation of the behaviors.
8. Kevin Behan says:
I don’t know if I have another one in me but I’ll give it a shot.
9. Antje Hebel says:
I am sure you can. Easier language would help many more dog owners to understand your method and their dogs motivation, instead the scientific background.
Just remember what I asked you some years ago: “How would you explain it to a 5 year old…?”
Thanks for all your knowledge.
Leave a Reply
Join the
NDT Study Group
Learn more
Books about Natural Dog Training by Kevin Behan
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/37818
|
Holiday and Retail Closing Day Charts
Holiday and Retail Closing Day Charts : NS Labour and Advanced Education, Employment Rights
Find out who is entitled to a paid holiday or how to calculate the benefit.
The Remembrance Day holiday is governed by the Remembrance Day Act. Some employees may be entitled to a benefit.
Non-Statutory Holidays: Some days are commonly recognized as holidays but are not paid holidays under the Nova Scotia Labour Standards Code. Employers may agree to provide their employees with additional paid holidays and the Labour Standards Division could enforce such an agreement.
Designated retail closing days in Nova Scotia
Closing Day
Date 2018
Date 2019
New Year's Day January 1, 2018 January 1, 2019
Nova Scotia Heritage Day February 19, 2018 February 18, 2019
Good Friday March 30, 2018 April 19, 2019
Easter Sunday April 1, 2018 April 21, 2019
Canada Day July 1, 2018
July 1, 2019
Labour Day September 3, 2018 September 2, 2019
Thanksgiving Day October 8, 2018 October 14, 2019
Christmas Day December 25, 2018 December 25, 2019
Boxing Day December 26, 2018 December 26, 2019
Jours désignés de fermeture des commerces de détail en Nouvelle-Écosse
For more information on retail closing days, please see our Guide to the Code.
Remembrance Day has different closing rules.
|
global_01_local_1_shard_00001926_processed.jsonl/37848
|
Log in
Mahwek (human ethnicity)
From PathfinderWiki
(Redirected from Mahwek)
The Mahwek people dominate northeastern Arcadia, and are the most populous and well-known Arcadian ethnicity to the continent's Avistani settlers.[1][2] The nation of Degasi is mostly comprised of Mahwek, as are three other nations that join it in a trade coalition that protects and regulates the Avistani colonies.[2]
|
global_01_local_1_shard_00001926_processed.jsonl/37862
|
EA Play 2018: Sea of Solitude is the Latest EA Originals Indie
Posted by | June 09, 2018 | News, PC, PlayStation 4, Video, Xbox One | No Comments
During EA Play 2018, we were introduced to German indie studio Jo-Mei, who is working with EA under their EA Originals label. Jo-Mei’s Creative Director, Cornelia Geppert, introduced her studio’s game, Sea of Solitude. Sea of Solitude is coming early 2019 to PlayStation 4, Xbox One, and PC.
Sea of Solitude is a third person action game starring a young woman named Kay. Kay has transformed into a monstrous version of herself due to overwhelming loneliness. The game touches on emotional and mental themes as she navigates her flooded world, battling and evading other monsters, and hopefully saving them and herself.
The game is a personal creative project from Geppert, who wrote and designed it during a dark time in her life. You can watch her presentation about halfway through the EA Play 2018 video, around 1:34:00.
Sea of Solitude is the latest indie game to be published by EA through their EA Originals brand. Earlier this year EA Originals released mature co-op action game A Way Out as well as action-platformer Fe. A sequel to Unravel, Unravel Two, was just announced and released by EA Originals today, during the EA Play 2018 conference.
Sea of Solitude is due early 2019. It’ll be available for PlayStation 4, Xbox One, and PC.
Eric Watson
About Eric Watson
|
global_01_local_1_shard_00001926_processed.jsonl/37870
|
Adorable Baby Animals with Dave Salmoni & Keegan-Michael Key - Playxem.com
To learn more about wildlife go to:
African Wildlife Foundation
Jimmy Kimmel Chats with Mom Who Gave Birth in Moving Car https://youtu.be/qRQJwGzGl_Q
Watch Mean Tweets: http://bit.ly/KimmelMT10
Connect with Jimmy Kimmel Live Online:
About Jimmy Kimmel Live:
Adorable Baby Animals with Dave Salmoni & Keegan-Michael Key
Wild Animals with Dave Salmoni
Dave brings out wild animals that make Jimmy very uncomfortable. One of the animals is a cheetah. This is the first time a cheetah has ever appeared o...
Robert Irwin and Jimmy Feed Baby Pygmy Goats
Leopards, a Bearcat & Penguin w/ Jack Hanna
Jack Hanna returns with some small animals, including a penguin, for James, Tom Hiddleston & Thomas Middleditch to meet. "Subscribe To ""The Late Lat...
Wild Animals with Dave Salmoni
Dave brings out silkie chickens, a bobcat and a Eurasian boar that all make Jimmy very uncomfortable. SUBSCRIBE to get the latest #KIMMEL: http://bit...
Terrifying & Adorable Animals with Dave Salmoni
Dave brings out an Asian water monitor, a hedgehog, a beautiful but scary vulture, a porcupine and the cutest pot belly pigs you’ve ever seen. Jimmy ...
True Confessions with Matthew McConaughey
Matthew McConaughey, Jimmy and The Roots' Tarik Trotter play a game where they take turns confessing a random fact before interrogating each other to ...
|
global_01_local_1_shard_00001926_processed.jsonl/37874
|
PokéBase - Pokémon Q&A
0 votes
I keep trying to get some shiny Pokémon. I stink at the Pokémon Radar the fishing method just is not working and so I turned to this but now I can't figure it out. I am putting two Pokémon from different nationalities but It is not working. Is there something I am doing wrong?
1 Answer
1 vote
You aren't guarenteed to get a shiny.
There's just a chance to get a shiny. It's still very high, and is most likely over 1/1000 (the current chance is still unknown).
You aren't doing anything wrong. It just takes love, patience, and a Pokemon with Flame Body/Magma Armor.
Source: Experience
|
global_01_local_1_shard_00001926_processed.jsonl/37883
|
Protect sidebar content with Membership plugin?
Forgive me if this has been covered somewhere here that I haven't found yet.
I'm using the Membership plugin RC3 (will update to 1.0 as soon as I can) and want to protect sidebar content. I've tried shortcodes, but they're visible even when not logged in as a member (shortcodes are set to be protected by default).
How do I do that?
|
global_01_local_1_shard_00001926_processed.jsonl/37896
|
Geohistorical Materialism
By Mark Pingree
Issue 1 February 21, 2016 Download PDF
“But, in the end, it is the threat of universal extinction hanging over all the world today that changes, totally and forever, the nature of reality and brings into devastating question the true meaning of man’s history.”
—James Baldwin[1]
“What if the always already might explode? What if the always already were self-destructive and able to disappear…?”
—Catherine Malabou[2]
There’s a certain irony, or comedy if you like, in the realization that the philosopher of history has ended up so comprehensively on the wrong side of history. Taking into account the many ways Hegel has been discredited leads Frank Ruda to admit that, surely, Hegel must be the worst philosopher. Rather than regard this as a weakness, however, Ruda’s opening gambit is to take this worst-ness seriously not by reading Hegel as a teleological thinker advocating for the status quo, but as an apocalyptic fatalist, a thinker of the end of all things. The philosophy of history is not a tale of progressive unfolding but a tale of inevitable decay and inexorable worsening. The mere existence of philosophy as such indicates that the worst has always already happened. Philosophy, in other words, is not destruction, but destruction thinking itself—a reactive and intrinsic endeavor to think the end. From this central insight, Hegel emerges as an absolute fatalist whose radically subtractive approach reveals that philosophy can only emerge out of the dissolution of futurity, finitude, history and even Spirit itself.[3] When the air clears, philosophy can reveal only that there is nothing to reveal; it is a groundless ground, a vanishing of vanishings (109-111). Thus, philosophy’s first and most fundamental principle is the conceptualization of the end of all things. Philosophy is not concerned with what is to come but with what is always already gone. The realization that the worst has always already happened is crucial for Ruda as it abolishes illusory notions of freedom and gives rise to true freedom in the form of the fatalist subject. In an era of catastrophic climate change—and now with the rise of a neo-fascist, ecocidal U.S. President—anything less than an apocalyptic fatalism, perhaps, can only fall short of addressing the full weight of our contemporary moment. Addressing climate change directly, Ruda defends fatalism as an “assumption that makes it possible to prepare for what one cannot prepare for—that is, for what Badiou calls an ‘event’ […], a final (for example, ecological) catastrophe that would end the present order of things”; an event which is “absolutely certain based on our present knowledge” (19-20). Ruda is right, we are already living in the dust of this planet, or as Roy Scranton punctuates, “we’re fucked.”[4]
Facing the end of all things, Ruda asks us to gaze into the abyss once more and cast off our fears that the worst is to come: “Act as if the apocalypse had always already happened! Act as if everything were always already lost! Act as if you were dead!” (129). While these fearless slogans are potentially mobilizing, questions remain surrounding Hegel’s transcendental approach to the material question of extinction, the unfolding of which poses a direct challenge to the notion that the worst has always already happened. In light of extinction, a contemporary fatalism must maintain a fidelity to the materiality of the event by admitting that geologic shifts underfoot very well might (re)ground conditions of possibility for theoretical formulation. Geologically speaking, we live in the shadow not of Hegel, but of the Anthropocene. The history of the latter cannot be subsumed by the history of the former without misdiagnosing the crisis.
For this reason, the friendly provocation I offer here is not intended as a critique, but rather as an attempt to think the consequences of extinction against the merits of Ruda’s central maneuver, the “inversion of the apocalypse” which holds that the end is not “something we will have to face in the future,” but something “that already took place” (10). The “always already” gesture is central to Ruda’s analysis, for without it the definition of philosophy is rendered wholly incoherent—that the worst has always already happened is the implicit condition of philosophy insofar as philosophy is destruction thinking itself. Climate change introduces a challenge to this definition by calling into question the tenuous link between Hegel’s destruction-thinking and material destruction as such. It is not the case that philosophy is indifferent to the actuality of extinction, strictly speaking, but that extinction is indifferent to the destruction philosophy thinks it thinks. The always already totalizes destruction, history, and philosophy into a posture of thought and thereby runs the risk of losing sight of the particularities that shape any material event. As a consequence, philosophy becomes anthropocentric, sealed up in a hermetic conceptualism, the groundless ground of which can no longer be moved, changed, or influenced by the very material events that presumably give rise to philosophy in the first place. The geohistorical, material reality of the Anthropocene, in other words, is a negation of the conditions of thought requisite for a Hegelian conception of world history.
Out of this negation, new material and conceptual problems arise. If Hegel seems ill equipped to address the particularities and nuances of geohistory, it is because, according to Tom Cohen, “the aporia of an era of climate change are structurally different from those that devolved on the torsions of Western metaphysics […]; the logics of extinction compromise the aims of an emancipatory future along with all else.”[5] Extinction immobilizes the dialectic by encroaching on thought itself and by asserting of the temporal that the worst is actually happening, which threatens to foreclose the conditions through which Ruda’s emancipatory, future-oriented subject might be actualized.[6] And while ecocide might afford some form of interim subjectivity, I fear that this provisionality is already compromised by the nexus of postfordism and disaster capitalism, which presupposes and profits from the logic of the always already (disaster capitalism) and undermines conditions of subjectivation by way of machinic enslavement (postfordism). Before addressing post-fordist (de)subjectivation, however, I will first offer a materialist addendum to Ruda’s Hegel, lest all that is solid about the end of history melt into air.
Extinction at the Limit of Thought
As outlined above, philosophy’s most fundamental procedure entails an inversion of the end. The always already, Oxona Timofeeva explains, ensures that “a fear of the future and anxiety about some indefinite event (‘we will all die’) is easier to suffer than a certain, irreparable, and irreversible horror that has just happened (‘we are all already dead’).”[7] For Ruda, philosophy must affirm and maintain a fidelity to the inversion of the end, in this case to the irreparable horror of the always already. With climate change, we have to invert this inversion once again. This is not to suggest that the always already is made redundant by the Anthropocene—for the philosophically uninitiated, this remains a crucial step—but to suggest that its inversion no longer holds the emancipatory power it once held. Inverting the inverse, today we must maintain that the notion of extinction (‘we will all die’) is in fact more difficult to suffer than some indefinite, primordial catastrophe (‘we are all already dead’). Having surpassed major climate tipping points (20+ years ago no less), extinction is a transpiring material event, the catastrophic effects of which we are already witnessing. Our predicament suggests that a philosophy such as Hegel’s, one that “thinks that the end has already happened, and is awaiting its actualization,” is not yet a philosophy of the end of all things (105-6, emphasis added). Ecocide introduces a materialist totality, the universal destruction of (human) life on earth, and “unlike a Hegelian universal,” as Dipesh Chakrabarty observes, geohistory “cannot subsume particularities […] it is not a Hegelian universal arising dialectically out of the movement of history.”[8] Extinction offers no “reconciliation with destruction,” as Ruda claims, no synthesis, no next step. If destruction has always already happened, it fails to materialize. Thus, Ruda accidentally ends up on the side of the climate change denier who affirms, “the climate has always been changing!” “The situation is always already bad!” “The worst has already happened!” While the threat of catastrophe may refer to a primordial, transcendental destruction that dwarfs all others, ecocide is not a conceptual event that refers to a transcendental past, but a material event that refers to the terminating present.
For this reason, we must think of climate change according to Catherine Malabou’s notion of Ereignis, which she defines as a “meaningless interruption of the transcendental itself,” a shock large enough to “erase personal histories, destroying the very notion of psychic destiny, of childhood, of past, even of the unconscious itself.”[9] We might therefore conclude that subjects of climate trauma, from today’s estimated 20-30 million climate refugees per year (rising to 50 million by just 2030),[10] to the rest of us rendered lithic by the horror of fossil capitalism’s unopposed race to extinction, are “living examples of the death drive and of the dimension beyond the pleasure principle that Freud and Lacan both fail to locate or to expose. Beyond the always already principle is the true beyond the pleasure principle.”[11] Perhaps, then, ecocide marks the absolute limit of conceptual thought, of the always already; or perhaps, rather than a reactive endeavor to think the end, extinction introduces different speculative imperatives and expressive opportunities that can and must escape Hegel’s orbit by giving rise to a mode of post-philosophical inquiry. Martin McQuillan reminds us, for example, of Derrida’s assertion, “it is the closure of philosophy by nonphilosophy that gives thought a future.”[12] Taking Derrida seriously, we might consider the merits of those contemporary theories that pursue post-philosophical methods by resisting philosophy’s tendency to shift discursive registers from empirical to transcendental, a shift that often insulates philosophy against any materialist intervention that might force an amendment of some of its fundamental methodological assumptions and procedures.[13]
One need not be a speculative realist to admit that theory in the Anthropocene needs to proceed from materialism, that is, from destruction itself rather than destruction-thinking. After all, one crucial implication of the fact that human beings have become a collective geologic agent in their own right is that the stratigraphic layer archiving the Anthropocene is, strictly speaking, neither natural nor unnatural, neither human nor non-human. We do not discover archefossils in our contaminated sedimentary layers and Antarctic ice cores so much as technofossils, radioactive geochemical signatures, plastics that constitute new forms of rock, hydrocarbons, pesticides, and so on. Unlike the Holocene, the passive background of which allowed “autonomous” human agents to emerge and act out the entirety of their human drama against a relatively passive background, the Anthropocene blurs the line between subject and object as both science and philosophy are forced to confront and confuse one another in unexpected ways. As Bruno Latour states,
humans are no longer submitted to the diktats of objective nature, since what comes to them is also an intensively subjective form of action. To be a subject is not to act autonomously in front of an objective background, but to share agency with other subjects that have also lost their autonomy […] we have to shift away from dreams of mastery as well as from the threat of being fully naturalized. Kant without bifurcation between object and subject; Hegel without Absolute Spirit; Marx without dialectics.[14]
While for Ruda autonomy must be abolished by the subject who internalizes the transcendental truth of the always already, for Latour autonomy is abolished by the intrusion of the object, that is, by a “nature” which is no longer natural, if it ever was.
The Subject and the End of Promissory Time
If Latour’s materialism can help illuminate a deficiency in Ruda, Ruda’s recuperation of the subject might help inform a more coherent politics without the pitfalls of neo-vitalist “new materialisms” that risk becoming so immersed in relations that they lose sight of essential political lines of asymmetry necessary for resistance. As Frédéric Neyrat’s ecology of separation reminds us, “when everything is connected, everything is dangerous.”[15] However, while Ruda clearly draws a line of political asymmetry, his recuperation of the subject also recuperates a notion of futurity (of and for the subject) at a time when there can be no promise of either futurity or subjectivity. Much like philosophy itself, peering behind the mask of Ruda’s subject reveals that there is nothing to reveal and that any defense of true subjectivity can follow only from the realization that the subject is impossible. This impossibility, however, is necessary to counter naïve notions of both freedom and subjectivity and to pave the way for a subjectivity rooted in fatalism (the always already), which is “the very precondition of preparing for that which we cannot prepare […], the precondition for the emergence of a genuinely free act” (127). Here, Ruda recuperates notions of both futurity and subjectivity, while also gesturing towards a foundation for an ethics or a politics ‘to-come.’[16] Through the realization that the worst has always already happened, the subject is killed in order to be saved. What is gained in the process is an implicit yet unmistakable promise; first, an unequivocal promise of futurity and, subsequently, the promise of a future-oriented ethics.
The promise of futurity that arises in the recuperation of the subject resembles what Claire Colebrook calls “an almost automatic promissory response in humanities inquiry.”[17] Promissory ethics are constructed on a conceptual plane of futurity. If not justice now, then justice to-come. Futurity lost, the Anthropocene does not offer a promise but a prediction. According to Colebrook, there is a beauty and creativity to the promise in its optimistic structure of deferral. The prediction, meanwhile, is ugly insofar as it makes the promise far more difficult to fulfill. Predictions have a different temporal structure than promises; they do not rely on retention and anticipation, rather they “they happen to us, from elsewhere.” And it is this elsewhere—the elsewhere of the Anthropocene—that “seems to be destroying once and for all the future arrow of promissory time. By suggesting geological impact, and not just change within the human milieu, human time […] is now displaced.”[18] While Ruda’s recuperated subject relies on the promise of futurity, the Anthropocene’s only promise is the foreclosure of the future arrow of promissory time.
Disaster Capitalism: Worse than the Worst
Before the last dam breaks, however, some provisional form of subjectivity must be in play, prompting us to read Ruda’s subjectivation in relation to the contemporary economic and ideological conditions of (de)subjectivation at work in post-Fordist disaster capitalism. Pace Ruda’s absolute fatalism, my concern is that today’s capitalism has already occupied the true fatalist camp, and that perhaps even Ruda’s absolute fatalism is, rather depressingly, too optimistic in light of cognitive and machinic processes of desubjectivation already at work in everyday digital life. The emancipatory potential of Ruda’s always already, therefore, will have to account for the dramatic implications that stem from the fact that (digital, networked) machinisms have invaded every aspect of our lives. Experience is always mediated, of course, but with the rise of digitality a new temporal dimension is introduced into lived experience. While Marx could not have foreseen the full extent of post-Fordism, his Grundrisse already envisages what Jason Smith calls “a tendency, a limit point in the process of the valorization of capital: the impossible possibility that capital might circulate ‘without circulation time,’ at an infinite velocity, such that the passage from one moment in the circulation of capital to the next would take place at the ‘speed of thought.’”[19] Marx was able to see a false logic of infinity at work in capitalism, both on the level of the general economy and on the level of the commodity. When the object becomes an exchangeable commodity it also introduces a different temporality, one that transcends finitude, by becoming forever replaceable, iterable, exchangeable, reproducible, consumable, and so on. In short, the fetishized object is gilded with an aura of abundance and immortality.[20]
Under post-Fordism, the mass dissemination of networked devices tether the subject to a digital conception of time as capitalism’s false logic of infinity comes to appropriate the lived time of the subject. Unlike the Fordist worker who physically winds the clock to the rhythms of factory life by clocking in and then clocking out, post-Fordism introduces an infinite, digital perception of time that removes the distinction between work and leisure—there is no more clocking out, you have always already clocked in. Meanwhile, the sheer speed of digital capitalism short circuits the temporal foundations of attention as experience is impoverished by an overwhelming barrage of stimuli.[21] Moving from sovereignty to discipline and on to endless habitual conditioning, machinic deterritorialization has become a vehicle for forms of social management that bypass discursive subjectivation by reducing the subject to a series of pre-linguistic, physical inputs and outputs divorced from both historical and lived-time. Post-Fordism, in other words, no longer produces subjects as the individuals of a discursive politics, but as the dividuals of a machinic economics—desubjectified component parts in the business, financial, media or welfare state assemblages that have become contiguous with machines.[22]
Given this context, Ruda’s Hegel enters the scene at a time when the subject has already been revealed to be nothing—not by way of discourse or the dialectic, but by cognitive capitalism and machinic enslavement. By prescribing a mode of subjectivation that hinges on the discursive recognition that the worst has always already happened without taking into account contemporary processes of desubjectivation, Ruda risks falling prey to a form of capitalism that assumes his very logic. Capitalism has welcomed the notion that the worst has always already happened, not only because it operates under a (false) logic of infinity, but also because it has (d)evolved to thrive on crisis rather than crumble under its weight. To avoid profit-loss, disaster was once something to be avoided, whereas today the rich get richer no matter how many points the Dow Jones drops. The oil industry, a disaster industry writ large (the ongoing struggle at #NoDAPL comes to mind), traffics not in life but in death as biopolitics dissolve into necropolitics and capitalism mutates into thanaticism.[23] Disaster capitalism, like the climate change denier, is unaffected by the notion that the worst has always already happened, for it is precisely this logic that fuels what Jodi Dean calls “left anthropocenic enjoyment,” which “thrives on the disaster that capitalist enjoyment produces. In this circuit, captivation in enjoyment fuels the exploitation, expropriation and extraction driving the capitalist system: more, more, more; endless circulation, dispossession, destruction and accumulation; ceaseless, limitless death.”[24] This circuit is only reinforced by endless notifications, advertisements and, yes, disaster-filled news feeds perpetually reminding us that the worst has always already happened. What emerges is a crude formula for an ideology of post-Fordist disaster capitalism where adding infinite destruction to infinite time results in the figure of the always already. If we are quick to normalize the catastrophic, perhaps it is because catastrophe has become so common that it is insipid, blasé. Through the speed of digital capitalism, the post-Fordist subject has become so familiar with the ubiquity of the always already that it has become wholly unremarkable; it has become ideology par excellence.
The Future is Now
To break the cycle, perhaps we can no longer affirm that the worst has always already happened since on these grounds no line of asymmetry can be pursued. Critics of the environmental humanities sometimes see the discourses surrounding extinction as overly optimistic, an approach that amounts to a symptomatic, if not eschatological, fervor to end it all; passive attitudes, in other words, that get us nowhere. The situation, we are told, is in fact much worse than this precisely because the end has always already happened. With this sentiment, the radical left risks racing past extinction, dismissing it as yet another hysterical apocalypse narrative that smacks of conservatism. And yet, might not these dismissals miss a central insight? Might they not also serve to repress the singular, unimaginable horror leering at us from our peripheral vision?
Facing ecological and philosophical feedback loops that only serve to perpetuate disaster circuits and endless death cycles, perhaps the always already no longer holds the subversive potential it once did.[25] Beneath these dialectical feedback loops, however, lies the (im)mobilizing potential of ecological Ereignis, the logic of which does not refute so much as refuse the possibility of endless dialectical unfolding. Accordingly, theory in the Anthropocene requires a fidelity to the materiality of finitude against the transcendental, infinite logic of the always already; after all, extinction is not the absolute negation of truth, but the absolute truth of negation.[26] Thus, as the din of human history dissipates into the ominous silence of T.S. Eliot’s whimper, we might return to Ruda’s provocation: “Act as if the apocalypse had always already happened! Act as if everything were always already lost! Act as if you were dead!” (129), and add an even more shocking materialist provocation of our own:
The apocalypse is happening! Everything is lost! You’re dead!
[1] James Baldwin, The Fire Next Time (New York: Vintage Books: 1993), 56.
[2] Catherine Malabou, “Post-Trauma: Towards a New Definition?,” Telemorphosis: Theory in the Era of Climate Change. Vol. 1. ed. Tom Cohen (Open Humanities Press: Ann Arbor, 2012), 229.
[3] Frank Ruda, Abolishing Freedom: A Plea for a Contemporary Use of Fatalism (Lincoln: University of Nebraska Press, 2016), 108. All further page references will be given parenthetically in the text.
[4] Roy Scranton, Learning to Die in the Anthropocene: Reflections on the End of a Civilization (San Francisco: City Lights Books, 2015), 16.
[5] Tom Cohen, “Murmurations—‘Climate Change’ and the Defacement of Theory,” Telemorphosis, 19. Cohen expounds elsewhere: “The new aporia of ‘climate change’ are refreshingly bracing and absolutely ruthless, like the future prospect of a geo-engineering scramble that can patch up one catastrophe at one time (e.g., aerosol deflection) but exacerbate another (e.g., monsoons, droughts, pollution)” See, Cohen, “Anecographics: Climate Change and ‘Late’ Deconstruction,” Impasses of the Post-Global: Theory in the Era of Climate Change Vol. 2, ed. Henry Sussman (Open Humanities Press: Ann Arbor, 2012), 37.
[6] Despite Ruda’s claim that futurity plays no role in Hegel whatsoever (103), a notion of futurity is recuperated in his theory of the subject, who actualizes and implicitly assumes a future by internalizing the notion that the worst has always already happened.
[7] Oxana Timofeeva, “The End of the World: From Apocalypse to the End of History and Back,” e-flux no. 56 (June 2014); (accessed February 2017).
[8] Dipesh Chakrabarty, “The Climate of History: Four Theses,” Critical Inquiry 35.2 (Winter 2009): 222.
[9] Catharine Malabou, “Post-Trauma: Towards a New Definition?,” Telemorphosis, 235. While Malabou’s angle is a neuropsychoanlytic account of material trauma, she opens the door for ecology by granting, “Our socio-political reality imposes multiple versions of external intrusions, traumas, which are just meaningless brutal interruptions that destroy the symbolic texture of the subject’s identity and render all kinds of internalization/interiorization impossible” (238). The material for Malabou is a fourth dimension that escapes Lacan’s tripartite formulation of the real, imaginary, and symbolic and shuts down the always already, which she synonymizes with Freud’s claim that psychic life is indestructible (237-8).
[10] Christophe Bonneuil and Jean-Baptiste Fressoz, The Shock of the Anthropocene: The Earth, History and Us, trans. David Fernbach (New York: Verso, 2016), 25.
[11] Malabou, “Post-Trauma,” 227-228; my italics in only the second quoted sentence.
[12] Martin McQuillan, “Notes Toward a Post-Carbon Philosophy,” Telemorphosis, 271-272.
[13] While Quentin Meillassoux could never quite arrive at a coherent notion of correlationism, his lament that we might have lost sight of “the great outdoors” remains relevant. See, Meillassoux, After Finitude, trans. Ray Brassier (London: Continuum, 2008), 7. And while Meillassoux and Graham Harman seem to have overshot the great outdoors for the cosmos, evacuating the political in the process, other materialisms are on offer that might help point a way forward. See, for example, Katerina Kolozova and Eileen A. Joy, eds., After the “Speculative Turn:” Realism, Philosophy and Feminism (Brooklyn: punctum books, 2016).
[14] Bruno Latour, “Agency at the Time of the Anthropocene,” New Literary History 45.1 (2014): 5.
[15] Cited in Jodi Dean, “The Anamorphic Politics of Climate Change,” e-flux no. 69 (January 2016); (accessed February 2017).
[16] While Ruda is able to simultaneously nullify and defend the subject (through the dialectic), the affirmative gesture alone is enough to also affirm the emancipated, if inverted, subject. And while Ruda claims Hegel’s philosophy offers no concept of futurity, a future of and for the subject is inevitably recuperated.
[17] Claire Colebrook, “What is the Anthro-Political?,” Twilight of the Anthropocene Idols, ed. Tom Cohen and Claire Colebrook (London: Open Humanities Press:, 2016), 99; my emphasis.
[18] Colebrook, “What is the Anthro-Political?,” 104-5.
[19] Jason Smith, “Soul on Strike,” preface to Franco “Bifo” Berardi, The Soul at Work: From Alienation to Autonomy, trans. Francesca Cadel and Guiseppina Mechia (Cambridge: MIT Press, 2009), 11.
[20] This false logic of infinity can only function to repress scarcity and therefore has played no small role in precipitating the present ecological death spiral.
[21] A simple Google search reveals that the average smart phone user interacts with her device somewhere between 46 and 150 times a day, roughly between two and six times per hour.
[22] Maurizio Lazzarato, Signs and Machines: Capitalism and the Production of Subjectivity, trans. Joshua David Jordan (Cambridge: MIT Press, 2014), 23-29.
[23] McKenzie Wark defines thanatacism as “a social order which subordinates the production of use values to the production of exchange value, to the point that the production of exchange value threatens to extinguish the conditions of existence of use value”; like “fanaticism, a gleeful, overly enthusiastic will to death […] the mode of production of non-life.” See, Wark, “Birth of Thanatacism,” Public Seminar [April 2014]; [accessed February 2017]).
[24] Dean, “The Anamorphic Politics of Climate Change.”
[25] The always already is nothing new. According to Catherine Malabou, the always already originates in the Cartesian subject, “from Descartes to Damasio via Lacan there would, once again, be one and only one principle: trauma has always already happened” (“Post-Trauma,” 229).
[26] Ray Brassier, Nihil Unbound: Enlightenment and Extinction (Palgrave Macmillan: New York, 2007).
Posted in Issue 1.
Leave a Reply
|
global_01_local_1_shard_00001926_processed.jsonl/37902
|
Quill and Quire
« Back to
Charles Taylor Foundation gives books to America
The Charles Taylor Prize for the Literay Non-Fiction has donated almost 100 books to Canada’s embassy in Washington D.C. The gift was presented at the IFOA in Toronto. Photos courtesy of the Charles Taylor Foundation.
Carolyn Strauss, culture and outreach counsellor with the Canadian embassy in Washington, speaks to the crowd at the IFOA, with author and host for the evening, Charlotte Gray, in the background.
Charles Taylor prize administrator June Dickenson presents the books to Strauss.
Rudy Wiebe, whose book Of This Earth: A Mennonite Boyhood in the Boreal Forest won this year’s Charles Taylor prize, with Strauss.
|
global_01_local_1_shard_00001926_processed.jsonl/37922
|
– after all these years
Mondays in Paris
Oh God, I’ll miss Paris
If you ask me what the best thing about living in Luxembourg is, and/or what I’ll miss the most, the answer to both will probably be Paris. Continue reading “Oh God, I’ll miss Paris”
Create a free website or blog at
Up ↑
|
global_01_local_1_shard_00001926_processed.jsonl/37943
|
When Sri Sathya Sai first designed the Sarva Dharma Symbol…
Wednesday, March 04, 1970 to
Thursday, March 12, 1970
Sri Sathya Sai addressing devotees gathered at Prasanthi Nilayam for Mahashivaratri
Swami addressed the Seva Dals who had been allotted specific duties for the Mahashivratri festival on 4th March, 1970. Swami hoisted the Prashanti Flag on the 6th morning and gave a Discourse. Prior to Swami’s Discourse, Dr. Diwakarla Venkatavadhanulu, Professor at Osmania University, Hyderabad addressed the devotees. Swami materialised a nine-jewelled locket and fixed it on the forehead of Shirdi Sai’s silver idol and performed the Vibhuti Abhishekam. During the Vibhuti Abhishekam, precious stones also fell from the pot along with Vibhuti. Prof. V. K. Gokak, Sri Nakul Sen (Lieutenant Governeor of Goa), and Dr. Diwakarla Venkatavadhanulu spoke in the evening. Swami then delivered His Shivaratri Discourse. In His Discourse He said:
“If you love another person, you will not covet lordship over him; you will not covet his property; you will have no envy when he prospers, no joy when he suffers. Love is the strongest antidote for greed. This therefore, is the fundamental spiritual discipline: give love and receive Love. You might have heard of Bhooa-bali, a word that is interpreted as a sacrifice in order to satisfy spirits. Bali means 'tax' as well. Bhoota-bali which everyone is enjoined to give is tax to be paid, to the Bhootas (elements), for this splendid chance of human birth. For all the good words that come your way, all the good deeds you benefit by, and all the good thoughts that spread peace in your heart and light on the road you trod, you have to pay tax.
Love persuades you to consider the distress of the other, whenever you are overcome by it. You are drawn to those who have equal ground for grief. You become engrossed in the sorrow of others and so forget your own. Draupadi bewailed her lot before Krishna, She cried, "Krishna! When a mother loses a child, snatched away from her lap by death, she is drowned in grief. Now, Ashwatthama slaughtered in cold blood at dead of night while they were sleeping soundly, all my children! I have lost all, all of them. How can I be consoled? How can I get those children back?" Krishna said, "Sister! You braved the insults that the wicked Kauravas inflicted on you in open Durbaar (court); brave this blow with equal courage. Look at Gandhari, the Mother of Kauravas. She has imposed on herself the blindness which her husband is suffering from; she has lost all her one hundred sons! Not one is left." Krishna consoled her, presenting before her the picture for greater fortitude borne by another mother. Consider the agony of others, and the means of sharing the grief they have. Feel for them, more than you feel for your own calamity. This is the sign of a genuine Sai Bhakta. He should have compassion, tolerance and sympathy; if he does not possess these, he will be the target of ridicule. And with good reason.
People ask sneeringly, "Where is your God? How does He look? What does He do?" etc. They sneer because those who have experienced the majesty and glory of God are very few. God is Truth, Goodness and Beauty, but only those who have had experience of Him can assert so and convince. You may have a pot full of Amrita, but unless you place a drop on your tongue, how can you assert about its fragrance and sweetness? Through you, Sai Bhaktas, a transformation has to be brought about in the minds of people; so your responsibility is very great.
When the Mahabharata War was imminent, it was said in circles that knew the evils of the age, that only a thick shower of arrows could smother the flames of hate. Now, it is the other way: only a thick shower of Love can smother and destroy the flames of anger, fear and anxiety that envelop the world. A group of scholars who had come to Me recently asked Me, "Swami! You talk of flames of anxiety and fear; but, surely, you appreciate the great step forward that man has taken by landing on the moon!" I told them, it was wrong to spend billions of dollars and roubles on such enterprises. They argued that though there may not be any immediate profit from all that capital lost, its potentialities for good are very great. I said, "It is a question of priorities; first things first. When so many nations upon the Earth are undernourished, undereducated, underhoused, it is sheer absence of discrimination to spend time, skill and money for this spectacular competitive adventure. Later, when the earth has been made the home of a happy family of peoples, such enterprises can be planned."
The Earth is the natural habitat of man. Why should he venture out of the range of the elements of which his body is composed and go places where to he has to take water, air and other essential requisites with him? When he goes to the moon, he does not leave anxiety, fear and falsehood behind. The moon that man has to voyage into is the mind, not this dead satellite, with no capacity to illumine itself.
The Ramayana mentions that Ravana skillfully prepared a wax head similar to that of Rama and arranged that it be presented before Seetha as the severed head of her Lord, so that, she might give up all thought of living with Him again, and surrender to the wiles of her captor, Ravana. The moon is like that lifeless imitation head of Rama. The real Rama is vibrant, active, somewhere else. The real Moon for man is in the firmament of his 'heart,' where the mind and the intelligence (the real Sun) revolve.
When that Moon is mastered, Shivam illumines the Night, and it is transmuted into Shivaratri. Or else, it is Shava-ratri (the Night of death). When man sleeps unaware of himself and of his divinity, he is as a corpse. The sages of India laid down various rites, ceremonies, disciplines, modes of behaviour, conventions and festivals to help cleanse the emotions and confirm faith, I shall speak today of the importance of one of these---of the disciplines that they laid down for food. Take in only simple pure clean food---what is called Sattvic food by the sages. That is to say, food which will not arouse the impulses and emotions, sharpen the passions, upset the equanimity, hamper health. Food offered to God is free from the evil vibrations that injure the individual in subtle ways. Food offered to the hungry and then eaten has also the same beneficial quality. Since food has a subtle impact on the feelings and thoughts of man, you have to be vigilant ever.”
After the Discourse Swami sang a few Bhajans. Thereafter, a heavy oval Linga composed of opal emanated from Swami during Lingodbhavam. The night-long Bhajan session concluded with Swami’s Discourse on 7th morning. Swami blessed the devotees with yet another Discourse that evening. Prior to Swami’s discourse, Brahmasri Bairagi Sastry and Swami Karunyananda addressed them.
Sri Sathya Sai distributing Prasadam to the devotees
The thousands gathered at Prashanti Nilayam were blessed with Prasadam and Pada Namaskar from Swami Himself on the 8th. Swami gave interviews to all the disabled devotees between the 9th and the 11th. Swami left for Anantapur on the 12th.
It was during this Shivaratri that Swami drew a figure with the holy symbols of the five major Religions of the World [Hinduism (Sanatana Dharma), Islam, Christianity, Buddhism and Zoroastrianism] with the Lotus Pillar in the centre. This drawing became the ‘Sarva Dharma’ emblem of Sathya Sai’s mission stating ‘There is only one Religion, the Religion of Love.’
The Sarva Dharma Emblem of Sri Sathya Sai Organisations
1. Can I get the message(Sanskrit Sloka along with meaning )written on Sarva Dharma Stupa... I had got it but later missed somewhere(For some reasons I need it)...Happy Mahashivaratri
Back to Top
|
global_01_local_1_shard_00001926_processed.jsonl/37955
|
Search results
1. Krisg1234
Movie Friday The 13th: The Beginning
we just need one more good film so that there are 13 movies in the series.
2. Krisg1234
Movie Friday the 13th
Tina Shepard could just raise her from the dead, no big deal.
3. Krisg1234
Movie Friday the 13th
Somebody already wrote that script. it's on the site somewhere.
4. Krisg1234
Movie Resident Evil - Reboot script by Greg Russo
i'd also like to read MK if anybody is sharing.
5. Krisg1234
Movie Other Jurassic Park 4 drafts
you should watch Roger Corman's Carnosaur 2. it is exactly like Aliens but with raptors instead.
6. Krisg1234
Movie Jason X: Hell Freezes Over
Do you have the sequel script? If so, what would you want in trade?
7. Krisg1234
What are...
Payback, Halloween 6 Curse of Michael Myers
8. Krisg1234
Movie God Particle
9. Krisg1234
Movie Batman And Robin Akiva Goldsman
Are the earlier drafts any better than what was eventually filmed?
10. Krisg1234
Movie Friday the 13th
You would be my hero if you could share this script :D
11. Krisg1234
Movie Famous Unproduced Scripts
I would trade one of my kidneys for a chance to read it.
12. Krisg1234
Movie Friday the 13th
You guys still looking for the guzikowski draft?
13. Krisg1234
Movie Friday the 13th
Sorry, i couldnt access the vip section until just now. I figured if i was able to find it, it was probably in vip, but i thought others without access to vip might want to read it. I may still be unclear about the rules, but i thought it is safe to post once the film is officially cancelled.
14. Krisg1234
Movie Aliens sequel by Neill Blomkamp
It would be very easy to just write off Alien 3 & 4 as dreams Ripley had while she was in cryo-stasis.
15. Krisg1234
Movie Friday The Thirteenth (Nick Antacosta Draft)
My eyes are welling up with tears of joy right now. Thank you so much for sharing.
16. Krisg1234
Movie Joe Carnahan's Death Wish
Can i please have a copy?
17. Krisg1234
Movie Looking for this Script
I have the Ed Wood Draft and the David Mamet rewrite, but if you want the earlier unproduced draft by Clark Gregg & Russ Meyer I'll need something spectacular in trade. In particular, I'm looking for the upcoming I Spit On Your Grave 4 that Spielberg & Lucas collaborated on.
18. Krisg1234
Movie Friday The 13th (2009)
I haven't seen this one on the site at all, so here is the screenplay for the 2009 Platinum Dunes reboot of Friday The 13th. There are a few minor differences between the script and the finished film. the scene where Pamela Voorhees dies is in the middle of the script instead of being the...
19. Krisg1234
Movie Make a wish...
A Nightmare On Elm Street - The Dream Lover by Peter Jackson
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.