id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_1_shard_00001926_processed.jsonl/42949
|
Category: social causes
let me
let me lean against your torso
as I fight the war inside my head,
let me rest it on your shoulder,
heavy with the pain
of the suffering, of the wails on the streets.
let me close my eyes for a moment,
and escape it, just for a second.
let me let you hold me
in your arms, as you tell me to breathe,
breathe softly, so my breaths are not
mixed with the cacophony of the world’s bullets, howls, screams,
laughs, sneers, coughs, screeches.
let me let you carry me,
head heavy from the constant aches,
throbbing pain that sometimes kills,
if not diffusing the fire within.
The same one that burns to scream,
from top of buildings,
to love, to hate, even to kill.
let me help you, through the multitude
of everything, as you trip over your feet,
bodies tangled, covered in blood.
let me help you, to fuse the fire within you.
Over the Threshold
Over the Threshold
You had me cover my eyes as we crossed
the threshold to your home,
Oh, I always forget that it’s now ‘our’ home.
It never felt like mine, you know? It rather
felt as if I was on a display, there for every
one to see, and my vision snatched away
from me by a cloth around my eyes.
I never knew what it was to be impaired,
growing up despising control. I
couldn’t live like that, you know?
Bound by chains so strong they couldn’t
be visible to the naked eye. But, they were
there. Unseen,
but there. On display for everyone to see.
I struggled to get rid of them.
Those cuffs around my wrists were
suffocating, chafing skin and veins,
binding me to you even more.
Tried hard to make people realise how I was living in a cage.
I was a bird with my wings cut off;
The people around me were blind, and
maybe even dumb and deaf, because
none of them ever raised their voices for me, the noise of gossip was decibels much higher than my pleas.
My scars were visible, even the band aid couldn’t fix them.
Permanence was temporary, just like the
marks around my eyes and the scars
covering my wrists, beneath,
there was me,
My very first collaboration with Saloni Mhapsekar.
Art by: Saloni Mhapsekar. (Check her out on Instagram, @saloniquietlybrilliant )
I see you taking off your belt,
removing it from the shackles of your trousers
wearing a scary look on your face,
ready to lash at me with it.
Only because my words stung you, right?
But aren’t there too many of us?
So many, that even if your belts are torn and ripped,
we’ll stay, bleeding, but words unwavering.
You then take away my paper,
Make me work longer, harder.
Pointing empty drafts and bills at my head,
forcing me to survive on water,
stirring empty pots and drinking from empty pitchers.
You took away my land,
you have almost taken away my religion too.
You want me to follow you, don’t you?
When your bullets were piercing through the
bodies of my mates, children, wives,
where was your religion?
Was it not there, looming in the depths and shadows
of your dark, merciless eyes?
How could you not feel, the slightest bit of apprehension
when you so casually made slits into our uniformity;
dividing us, forming castes, breaking unity?
And while we are at it, let’s not forget
the inter-caste wars, love, marriages,
killings, when the father saw to it that
his daughter was burnt to death, along with her lover?
You also took away opportunities,
chances from my offspring, making them
redundant, unable to go out into the world,
stealing their pages, pens, ink.
What would they know of the world,
when they didn’t know how to read and write?
Your corrupted mind,
pulling money out of my pockets,
not admitting my child in your schools
and colleges without an opaque donation,
a transparent bribery.
I’m home, waiting for your call,
the acceptance letter in your hands,
lies unhanded to me,
your lame excuses, poor reasoning,
I’m fed up of it all.
And then you look into my eyes,
emotional against emotionless.
Which one’s are yours, which are mine?
After all you have done,
How do you expect sentiment to be in mine?
|
global_01_local_1_shard_00001926_processed.jsonl/42966
|
Jump to content
• entries
• comments
• views
Contributors to this blog
Chevy Bolt – Specific Instructions
Sign in to follow this
Thank you for contributing your Bolt EV Data! There are no special additional steps required to set up your Bolt EV to contribute data.
There are two options for PID Lists:
1. Full PID List from Sean Graham on the Chevy Bolt Forum
2. Short PID List, listing only the parameters needed by ABRP
Download one of these to your phone and return to the Generic Instructions. Keep this tab open, as you will need to reference the desired PID list. When needed by the Generic Instructions, these are the PIDs you will need to select for Logging:
Required PIDs
PID Title
!Charger HV Current
!Charger HV Voltage
!Charger HV Power
!HV Current
!MG Voltage
!State of Charge Raw
!Battery Capacity
!Air Temp 0
*Speed kmh
GPS Altitude
GPS Latitude
GPS Longitude
Speed (GPS)
Speed (OBD)
All other parameters are optional, and are not recorded by ABRP.
Webserver URL
Sign in to follow this
1 Comment
Recommended Comments
Add a comment...
× Pasted as rich text. Paste as plain text instead
Only 75 emoji are allowed.
× Your previous content has been restored. Clear editor
Contact Us
Bo - Lead Developer and Tesla owner: [email protected]
|
global_01_local_1_shard_00001926_processed.jsonl/42969
|
help my plant
Discussion in 'Growing Marijuana Outdoors' started by TheHempMan, Jun 10, 2003.
1. my plant was out side on my balcony when it was born and it got prety bi maybe a foot.Then my mom told me to put it in the house so know one could see it.But i didnt have any lights or anything so i got a reptile light we used for my lizard it cept the plant alive but it didnt grow any bigger so i hid it my back yard to get a little sun light and the bottom leaves all died so i brang it back in my house but now it looks like a palm tree. so my question is should i keep it out side or in and will it be ok?
2. Hey,
Realy you should get this plant to the some point where it gets direct sunlight at least six hours a day. Otherwise just forget it. The light you used for your lizard is no good.
"All you need to know
are a few basics.
First, there are
male and female plants.
The substance that gives
marijuana its famous
psychoactive kick
is concentrated in the
flowers or buds of the females.
So when they're old enough
to tell them apart,
kill the males.
Two, give your plants
plenty of light
and not too much water."
ABCs News Special
“Pot of Goldâ€
1997, rebroadcast 1998
3. so should i put it back on the balcony were it was when it sprouted?
4. If the bottom pleaves are dying its prob roodtbound get a bigger pot and more soil. Then put it back outside in an area that gets at least 4 hours of direct ligh per day.
5. alright thanx peps
6. the roots arent cramped its in a 5 gal pot and the plant is only a foot tall. so wat im ascking is it is still alive but the bottom leaves died but the top is good but im wondering if i put it out side will it still have its flowering season
7. yes after the equanox comes it will begin to flower.
8. when exactly ,or approximately, is the equanox i cant seem to figure out when 12/12 comes along
9. when the sun starts to get less and less through summer
Grasscity Deals Near You
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/42974
|
Sitka Mountain Gear
Experience with G5 Dead Meat broadheads
Contributors to this thread:
Little Bear 03-Oct-18
Bake 03-Oct-18
JW 03-Oct-18
Little Bear 04-Oct-18
Bowfreak 04-Oct-18
Little Bear 19-Nov-18
From: Little Bear
I've been a slick trick fan for years but I'm contemplating the G5 Dead Meat head. I'd love to hear if any of you have good or bad experiences from real life test (not shooting into plywood, etc.) but actual blood trails.
From: Bake
I like the head. I've shot a mouflon ram, a hog, an elk, and a turkey with them. I've had pretty decent blood trails. Great penetration. Decently strong heads.
I'm shooting them again this year.
From: JW
Killed 3 white tails with them last year. 2 big bodied midwestern bucks were both pass throughs and left ample blood trails. Both heads I used still spin true and are back in the quiver with new, sharp blades. Really stout head for a mechanical.
From: Little Bear
Thanks for the responses so far.
From: Bowfreak
It is a great concept.....and like a few other G5 products I've used, they would be awesome with a little refinement. If there is a head that flies better than the Dead Meat I'd be shocked. They are very sharp and are stainless. The practice head they come with is awesome too. Some say they don't open to 1.5" but that didn't bother me. What bothers me most about them is that the blades rattle beyond belief. While shooting with heads loaded into my Tightspot, they vibrate like crazy at the shot.
From: Little Bear
I wanted to come back and provide my experience with these heads. I shot an 8 point buck that flipped over after going less than 40 yards in what seemed like 30 seconds and was down. We can take two deer a day if one is antlerless so I continued to hunt. Three hours later I heart shot a doe and she also went less than 40 yards and blood trail on her was incredible. Cabela's and other shops don't seem to carry the replaceable blades so I'll have to order those from G5, but the existing blades still seem sharp and weren't bent. I was impressed. I imagine my old stand-by Slick Tricks would have done the same given the same shot placement but these will be in my quiver for a while. Thanks for the input provided.
• Sitka Gear
|
global_01_local_1_shard_00001926_processed.jsonl/42976
|
A short text I wrote: What to do when getting a new used Mac
Discussion in 'PowerPC Macs' started by garirry, Oct 7, 2015.
1. garirry macrumors 68000
Apr 27, 2013
Canada is my city
Hello everyone!
A few weeks ago, I wrote a short text that is made specifically to guide people who bought a used Mac to clean it, repair it, and make it almost brand new. There could be a few things that are missing or wrong, but here's the text:
Tell me what you think and what there is to improve if there is anything. :)
2. flyrod macrumors 6502
Jan 12, 2015
Seems pretty complete. If an order is implied, I'd move cleaning closer to the top. I've seen some pretty nasty used computers. Keyboards in general are disgusting.
3. LightBulbFun macrumors 68000
Nov 17, 2013
London UK
Id Just like to point out that Some later releases of OS X will run faster then older OS X releases of OS X on the same hardware for example Lion was a quite a hog, I have a late 2006 blackbook that runs mountain lion much better then it does Lion... or for example 10.4 is faster on my G3 beige then 10.2 on the same machine (or 10.1 for that matter) the early OS X releases are quite slow, speed started to get good in 10.2 and peaked at 10.4 before leopard and its eye candy galore LOL
4. Surrat macrumors 6502
Jun 20, 2014
United States
Cleaning should be nearly the first thing you do, and very important to remove the PSU and clean it out. Being in the bottom of the case is the worst place, they suck up floor dust and lint, and are sometimes 95% clogged with dust bunnies. Taking them out is a pain, but necessary.
5. bunnspecial macrumors 603
May 3, 2014
One comment I'll add with regard to not running an older OS than the most current one it will run:
There are situations where running an older OS is preferable or possibly necessary. A good example is if one needs to run OS 9 programs on a G5-in this case, Tiger(or earlier) is mandatory as Leopard dropped support for Classic mode. Similarly, if one wants to run PPC programs on an Intel Mac, Snow Leopard or earlier is mandatory for Rosetta.
6. garirry thread starter macrumors 68000
Apr 27, 2013
Canada is my city
Hello, I updated the text. Here's the new version. Thanks for your comments.
7. Eugen Mezei macrumors member
Mar 21, 2015
One of the first things I do after getting a computer to run is to contact the previous owner (most often they left their emails too) and ask if they are interested to send them their data. (One wonders about what lies on the harddisks. Begining with family photos, some of the more intimate nature, to emails, work and school papers up to sensible data like contracts and bank data.)
'The reactions are unpredictible, from polite and thankfull to angry.
(Btw, I do the same with pictures from cameras, being digital or with forgotten film in them. A bit harder to find out contact data of the former owner.)
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/42977
|
Airport Extreme as network extension
Discussion in 'Mac Accessories' started by tommy060289, Oct 11, 2012.
1. tommy060289 macrumors regular
Jun 20, 2011
Hey Everyone,
I currently have a fritz box 7390 that sits down stairs in the lounge and acts as my modem/router but I could do with some more ethernet ports and probably boosting the wireless signal upstairs.
Im thinking of getting an airport extreme and using an ethernet cable to link it to the fritz box but what I want is a set up where the AE is basically acting as a switch and wireless extender.
So, if I set the fritz as master and just plug it in, is it possible to set the AE so that:
a) it sits on the same network so a computer connected via ethernet to the fritz will see a NAS attached by ethernet to the AE
b) act as a wireless extender for the fritz wireless network so I dont needlessly create more wireless networks.
2. skorpien macrumors 68020
Jan 14, 2008
Yup! Just connect the Ethernet cable from your modem/router to the Extreme's WAN port and use AirPort Utility to disable DHCP by setting Connections Sharing to "Off (Bridge mode)"
As for the wireless extender, you can give the SSID from your Extreme the same name and password as your original network and devices should switch between the two seamlessly (note: I've never attempted this but from my research this is how it's supposed to work).
The only downside is you lose the ability to create a guest network.
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/42978
|
permanently disable PowerBook LCD display
Discussion in 'PowerPC Macs' started by javieralvarez, Mar 17, 2008.
1. javieralvarez macrumors newbie
Mar 17, 2008
I have a 1ghz PowerBook G4 (titanium) whose LCD has expired long ago... I want to re-purpose it for use as an FTP server, and maybe also some sort of media server. I've removed the LCD panel from the PowerBook, and even snipped the two sets of leads into the display from the PowerBook. However, when I plug a monitor into the PB's DVI, and it boots up, it still reads the "Color LCD" display... I want to permanently disable the LCD, and not have to "mirror" my display, as I will only be using an external display, and don't want any resources diverted to the ghost LCD...
Please advise.
2. bartelby macrumors Core
Jun 16, 2004
Could you not just keep the thing closed and run in clamshell mode?
3. mrwizardno2 macrumors 6502a
Jun 19, 2007
Columbus, OH
You know, I sort of have the same kind of situation. I have a PB G4 without a head, as well... but mine had no OS on it (i bought it this way as spare parts for 20 bucks... hehehe the ram alone was worth that much!). I tried to load leopard (plugged in an external display) but it only displayed on the non-existing LCD. I used my macbook pro and counted tabs and spaces to do setup without seeing anything... surprisingly I got it installed, but I still can't see anything!
If there were a way to switch it to just use the external monitor, I'd be thrilled!
Edit: I think we're both beyond the point of using in clamshell mode because of the lack of an LCD attached. The problem here is activating the reed switch since there is no magnet. If I could figure out where that was, I'm sure I could trip it and use clamshell mode.
4. bartelby macrumors Core
Jun 16, 2004
Ooops, I some how skipped the removing of the LCD bit.
5. squeeks macrumors 68040
Jun 19, 2007
cant you just make the external the primary display and ignore the "color LCD" ??? or do you not know how to do that?
you drag the tiny white bar from one screen to the other in the arrangement section of the displays give you a pic but im not at home right now and dont have a monitor to do it on
6. alphaod macrumors Core
Feb 9, 2008
Yeah I just got off the phone with Apple about this thing. They said you need the display closed, so the computer will auto-user the external display.
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/42985
|
Automatic data connection for customers of Thematic.
3 Pull survey responses into Thematic for analysis
3 View and use analytics tools to find insights
3 Create dashboards for presenting findings to the wider organization
Thematic is used by companies to help understand what drives customer loyalty and retention. We pull in survey responses from customer feedback surveys (NPS etc) along with metadata about each response and analyze the free text comments to produce a list of themes. Our analysis tools can then be used to identify what people are mentioning most frequently, what is driving scores up or down and to track these things over time as more responses come in.
We also have tools to create dashboards for sharing in the organization and to help benchmark regions or departments against each other. These can be converted into reports and sent via email or as Powerpoint presentations.
|
global_01_local_1_shard_00001926_processed.jsonl/42987
|
60 Free Education Vector Icons
Published by on Sep 21, 2014
Here is 60 free education vector icons that created with Illustrator.
Perfect for education and school related projectlike website, apps and others.
Includes Illustrator Ai, eps, and transparent png files (Png icons: 48 x 48px, 64 x 64px, 128 x 128px).
Available in two styles including dark grey and colorful set. You can use these vector icons for your personal or commercial projects.
Presented by Dreamstale
1. This is very col vector icon set! thanks for sharing with the designers community.
Leave a Comment
Please Support US
|
global_01_local_1_shard_00001926_processed.jsonl/43003
|
[Photograph 2012.201.B0070.0443] Citations, Rights, Re-Use
Southerland, Paul. [Photograph 2012.201.B0070.0443], photograph, May 15, 1978; (gateway.okhistory.org/ark:/67531/metadc237760/: accessed December 15, 2018), The Gateway to Oklahoma History, gateway.okhistory.org; crediting Oklahoma Historical Society.
Responsibilities of Use
Information concerning your ability to use this photograph.
Educational / Private Use
Examples of encouraged use:
• A source for a school paper or presentation.
• Primary source reference in research project.
• Reference/citation in public discussions or forums.
• Genealogical research.
Examples of discouraged use:
• Claiming as your own original work.
Licensing and Permissions
Copyright and Licensing Status
At this time, no copyright or licensing has been determined.
Rights Holder
• Undetermined
Linking and Embedding
Linking to Digital Items
Permanent URL (Overview)
Permanent URL (Overview)
Permanent URL (Overview)
Embedding Images
1. Consider your intended use.
2. Review the rights information above.
3. Choose your preferred format below.
Image URL (Primary/First Page)
Image HTML (Linked to Item)
Image BBCode (Linked to Item)
Image Markdown (Linked to Item)
Copies and Reproductions
Looking for high resolution copies of this photograph?
High Resolution Copies
Contact Us
PDF Downloads and Multi-Page Printing
|
global_01_local_1_shard_00001926_processed.jsonl/43006
|
{{:: 'cloud_flare_always_on_short_message' | i18n }}
Check @genius for updates. We'll have things fixed soon.
Untitled (rough)
Shawn May
Untitled (rough) Lyrics
12:08 in the morning
Its kinda boring
My minds soaring
It's just been enduring a lot
Ending the block
My nerves heavy
Keeping this shit simple and ready
Constructing possibilities in a Chevy
But that's to make a bar, its really in my nig lil' truck
Steady running obstacles, not giving no fucks
Whats the worse when a kid ain't got no worth
Being here upon this earth is like a curse
But hey we gotta make it work
But hey I need to spit a verse
Tired of the petty shit
I know I fucked up but ain't no need for all the laughing shit
And bitches cutting me because they realize that I'm fucking ugly
I told everyone here
Now that Byakugan got the people seeing too clear
Seeing through fear
Seeing too much
I kinda wish I don't love
Cuz when I do, I'm always fucked up
This here the truth
I'm way different from you
I'm here to prove it
Before a nigga lose it
Steady close to throw the deuces
Find someone to pass the movement
They wonder what I'm doing
The mindset I'm pursuing
Why I wanna wear a mask
Why I think your shit trash
Average Shawn
This here a fucking gimmick
The sample I'm fucking wit it
Yeah I'ma bout to finish with this mediocre
Simple is coming closer
More on Genius
About “Untitled (rough)”
"Untitled (rough)" Track Info
|
global_01_local_1_shard_00001926_processed.jsonl/43010
|
Weekend Is Best For: Trying Out New Hang Out Places!
Well, the title is not entirely true, but it’s not entirely false either. I don’t know what about you, but … More
Postcards From Labuan Bajo: A Birthday Trip With Travel Society!
I still remember last year strolling around several Instagram accounts, hoppin from one photo to another, and stumblin upon many … More
|
global_01_local_1_shard_00001926_processed.jsonl/43017
|
General purpose shared utilities for diffpy.
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.
General purpose shared utilities for the diffpy libraries.
The diffpy.utils package provides functions for extracting array data from variously formatted text files and wx GUI utilities used by the PDFgui program. The package also includes an interpolation function based on the Whittaker-Shannon formula that can be used to resample a PDF or other profile function over a new grid.
For more information about the diffpy.utils library, see the users manual at
The diffpy.utils package requires Python 3.6, 3.5, 3.4 or 2.7 and the following software:
• setuptools - tools for installing Python packages
• NumPy - library for scientific computing with Python
The functions in diffpy.utils.wx module require
• wxPython - GUI toolkit for the Python language
We recommend to use Anaconda Python as it allows to install the software dependencies together with diffpy.utils. For other Python distributions it is necessary to install the required software separately. As an example, on Ubuntu Linux the required software can be installed with
sudo apt-get install python-setuptools python-numpy
The preferred method is to use Anaconda Python and install from the "diffpy" channel of Anaconda packages
conda config --add channels diffpy
conda install diffpy.utils
Another option is to use easy_install to download and install the latest release from Python Package Index
easy_install diffpy.utils
If you prefer to install from sources, obtain the source archive and run
python install
You may need to use sudo with system Python as it attempts to install to standard system directories. If sudo is not available, check the usage info from python install --help for options to install to user-writable locations. The installation integrity can be verified by changing to the HOME directory and running
python -m
diffpy.utils is an open-source software developed as a part of the DiffPy-CMI complex modeling initiative at the Brookhaven National Laboratory. The diffpy.utils sources are hosted at
Feel free to fork the project and contribute. To install diffpy.utils in a development mode, with its sources being directly used by Python rather than copied to a package directory, use
python develop --user
For more information on diffpy.utils please visit the project web-page
or email Prof. Simon Billinge at
|
global_01_local_1_shard_00001926_processed.jsonl/43019
|
A number of excellent resources focused on international cultures are available online. Below are links to country-specific cultural information for San Marino. For a complete list of culture resources, please visit globalEDGE's Global Resource Directory
|
global_01_local_1_shard_00001926_processed.jsonl/43024
|
I have just received this heartfelt missive from a U.S. military officer currently deployed in the Middle East, and was moved by his passionate writing of his experience in honoring the heroes making their final journey home. God, bless this writer and all those in harm’s way. Amen.
“Family & Friends,
I just returned from a ceremony. At 10 o’clock this morning, I experienced a paradox that penetrated my heart. On the one hand, it was the greatest honor I could bestow on another Soldier. Yet, on the other hand, it was the heaviest burden I could carry for him. I swelled up with pride one moment as I saw each American flag, but had to suppress anger as I considered what happened to the warrior beneath it. I thanked God for the ultimate sacrifice of each brave volunteer, but mourned deeply for the families who would receive them.
These precious souls.
All of them sons.
Some of them husbands and fathers.
Some of them brothers and uncles.
All of them heroes.
You see, I stood among 200 fellow warriors on the tarmac just moments ago as we welcomed seven of our courageous brothers who “gave the last full measure of devotion.” This, their last stop before they fly home to America for a heart-wrenching reunion, not the way their loved ones imagined. Grieving families who must now endure indescribable pain.
I couldn’t help but notice the irony of the moment. The sky was as blue as I’ve ever seen it. Clear, not a cloud. Hot, but no humidity, and a cool breeze. This very spot where I stood today is one of the most desired points in this war-torn region because this is where you catch the “Freedom Bird” as we call it—the plane that takes you home to embrace your loved ones. But today’s bird could hardly be called “Freedom.” I couldn’t keep from picturing the wives and children, the mothers and fathers, the friends and loved ones.
We collectively saluted each American Hero as he was gently and slowly loaded onto the aircraft with precision and grace. The chaplain offered a prayer of gratitude for the price these men paid in service to our country, and he pleaded for God’s comfort for those left behind. Then, each flag-draped casket disappeared into the plane’s belly of darkness. It was a moving tribute that brought the reality of war squarely into focus.
Sadly, these ceremonies are not uncommon. So I ask you to petition God on behalf of these men and the many others who stand courageously in the fight even as you read this. While I did not know a single one of these heroes, their presence brought a wellspring of emotion as I prayed for their families and the brothers who fought beside them on the battlefield. I don’t know where their hearts were, but I do know that the remaining harvest is plenty and there is no time to waste. So, again, I ask that you pray for God to move in the hearts of our Nation’s warriors so they can personally receive God’s grace and have the assurance that this brief visit here on earth is only the beginning of an eternal love affair with Jesus.
We can’t choose how we start this race called life, but we all must make the choice as to how we are going to finish it. The only true “Freedom Bird” chose three nails, and He took our place on the cross so that we could have a place in Heaven.
Finish Strong!
Kevin Bouren
P.S. I asked God to give me peace and He drew me to His Word—Romans 5:1-10—maybe you’ll find comfort there as well.”
Romans 5: 1-11 Peace and Joy
|
global_01_local_1_shard_00001926_processed.jsonl/43036
|
Greedy Goblin
Wednesday, July 4, 2012
The EVE Offline curse
I found it hard to figure out why the great game of EVE Online is not more popular. Sure, having consequences for your actions keep total idiots out and griefing annoys some just because it's "evil", but still there should be a much larger population. After all in many games defeat has consequences and griefing is possible even in WoW.
At the Logistics checklist post I found another reason: the EVE Offline curse. It comes with the claim: "ships are designed by ccp with all-level-5-skills in mind. fleet setups are designed, usually with level 5 skills in mind. If you cannot afford to train all relevant skills to V you shouldn't be flying the ship yet." In other words: in the first year of playing don't even bother to undock your ship, just log in to queue the next skill. OK, you can undock in a Rifter to lol around but don't even dream of doing anything worth mentioning.
The above demand is totally idiotic. The skills are usually in the form of "giving 5% bonus per level", maybe "giving 10% bonus per level". If we divide the level 4 result by the level 5 result, we get 120/125 = 0.96 and 140/150 = 0.93. Learning a rank 1 skill to level 5 takes 256000 points, while level 4 takes 45255 pt. Spending 18% of the training time gives you 96/93% of the effect. The other 82% gives you the remaining 4/7%. Clearly a new player, when faced with this nonsense will give up playing after a few months. I mean it's totally unrealistic for someone to subscribe a game for a year without playing it.
What can CCP do to end it? They already did everything they could by removing the learning skills (except Cybernetics). They purposefully made rank 5 a small increase over a large investment. The problem is not their doing, players are rising artificial barriers, just like the infamous "LFM random HC must have raid instance level gearscore" in WoW.
Why do they do it? Is it just pointless elitism saying "Just because I played a year longer, I'm so much better than you that you shouldn't even bother to undock"? No, I think it's rather based on the collectivist organization of alliances and fleets. I mean the pilots have no word in the strategy but they also have no risks and responsibilities. Their ships are given by the alliance and will be replaced for free if destroyed. It is indeed unreasonable to ask the FC to redesign the fleet doctrine and give out a free ship just to let you tag along.
There are special fleets in the TEST alliance, called kitchen sink. There you can fly whatever you want. These fleets aren't performing that bad. The infamous Laser Rokh + Retreiver fleet got nearly 50% ISK efficiency against a "perfect doctrine" fleet. How? Because the individual pilots weren't F1-drones, but thinking people who fit their ships to their strengths and weaknesses.
CCP clearly designed the game with the "every ship is useful" idea, making a uniform all-drake fleet largely sub-optimal. Why does anyone field a bad fleet? Because it's easy to mass-produce and easy to micro-manage. Practically it's equal to a multibox fleet where the multiboxing hardware is the voice comm. The statement of "Intelligent human > 4-lines bot" is obvious. "Good fleet composition > multibox" is obvious too. You don't see such fleets in the alliance tournament or even in small-gang roams.
The uniform "doctrine" fleets are optimized to a "smart FC, dumb F1-drones" scheme. Trying to break it would be a disaster. Left on their own devices, most players would get in a cheap terrible-fit (or over-pimped terrible-fit if the alliance pays the bills) and get devastated. While "Intelligent human > F1-drone" is true, "Average player > F1-drone" is absolutely not.
One can easily figure out an "easy" solution: F1 drones fly uniformed ships, smart people act on their own. However the FC asking "who are smart people here?" wouldn't be the best way to determine. How can we make that choice? TEST figured that out too: as independence always comes with responsibility, the kitchen sink fleets are not reinbursed. If your idea didn't work out (or you joined with bad FC or bad fleet) you won't get your ship back. You have to play with your own money.
I can't imagine that there is a large-fleet FC (killboard junkies are different) who would reject a pilot saying: "take me, I can keep the speed with the others and do what I can. If I pop, it costs you nothing". After all, even if he does nothing at all, he still serve as decoy, if he is primaried, he just saved someone else from being primary. I can't imagine that any FC would reject my logi just because it has 12% smaller tank and heals 8% less. On the other hand he is completely right to reject me flying his money in a sub-optimal ship at sub-optimal efficiency.
It's not the job of CCP to end the EVE Offline curse. It's not the job of the FC to redesign his doctrine and toss a free ship just to accept a special snowflake. It is your job to break it by taking the financial responsibility of your actions. Ask your FC two questions: speed and optimal range. Fit whatever you want to fly and offer your services to the fleet on your own money, without asking them to help you buy the ship or to replace it if lost.
Maybe I'm wrong. Maybe it's just dumb elitism like the infamous "you must have raid gear for a faceroll dungeon" in WoW WotLK. Maybe TEST is a special place with a special culture. Then I was wrong yesterday too. If it is the case, if only TEST fields kitchen sink fleets and the victory of SoCo would mean the end of such fleets, then it is something worth fighting for. If you know of kitchen-sink fleets in other alliances, or if you are sure that this or that alliance would not allow custom ships to join even for free, please comment.
PS: My plan of learning logi is still too EVE-Offline as the logi pilot is almost 3 months old and still more than a month away from flying it. The fastest path is learning Cybernetics 4 on the starter remap, get +4 implants and learn Signature analysis and Long range targeting 5 (both needed to learn Logistics skill). Learn the rest of the support skills to level 3. These take 15 days. Then remap P7-W7, learn faction cruiser 5 and Logistics 3. That takes 24.3 days and you are ready to fly. You'll suck but you'll be able to escort someone to L4 or disappear in a blop (get MWD). Continue learning logistics to 5 (25 more days), then remap I10-M4 and pull up your support skills to 4, then 5. The reason why I did not follow this path is that I go for a carrier and I'd run out of remaps (PW, IM, back to PW for carrier, back to IM for capital support skills). My way is IM for all support to 4-5, PW for logi and carrier, back IM for capital support and lvl 5s).
Wednesday morning report: 82.7B (1.5B spent on main accounts, 1.3 spent on logi, 1.0 on Ragnarok, 0.5 on Rorqual, 0.9 on Nyx, 0.8 on Avatar, 2.6B received as gift).
Alkarasu said...
Your effectiveness calculations are a little off here. Yes, skills themselves provide linear increase in effect with level (so with exponential growth of training time it is true, that lvl5 is pretty much not an effective way to spend training time, compared to lvl4), but there are more to that, then just skill own effects. Some skills require lvl5 of other skills to be accessible at all (and they require not just some x1-x4 basic skills, but x16 monsters as well). Some skills tend to stack in so interesting way, that 1 level of that skills provide not listed 5% increase in efficiency, but much more. Some modules require lvl5 to fit (and though there are alternatives with the same or even better effect, they are naturally pretty expensive, as most of them are rare random drops).
Just to clear some mathematic, everything else sounds valid.
Anonymous said...
" fleet setups are designed, usually with level 5 skills in mind. "
Has not been my generalexperience. Please provide examples.
""ships are designed by ccp with all-level-5-skills in mind"
There are certainly skills where lvl 5 is a big deal. Logi is arguably one of them, as well as gateway skills that open up T2 paths, but plenty of fine ship setups can be flown without many lvl 5 skills.
Babar said...
This is exactly how most fleets work though. If your ship doesn't follow the doctrine, you don't get reimbursed. So you can fly a tackling scimitar if you want (they are actually pretty good at it!), but you won't get any money back. Seems fair enough.
As for a drake fleet, it's not just drakes, just the majority. A drakefleet will consist of drakes for dps, scimitars for logistics, claymores for fleetbonuses, hictors and dictors for bubbling, and usually some interceptors for long range tackling. And in CFC, almost always a few newbee rifters doing their part.
And again, your premise is flawed. Sure, logistics take a while to train for. But you can fly a drake reasonably well after about 30 days, and pretty well after 60 days. There are tons of other alternatives also.
Anonymous said...
nice post - you're starting to understand.
Fleet doctrines are called when the alliance needs to be more certain of the outcome.
It comes back to knowing your own capabilities - if I have a 70% chance that my thrown together fleet will have capability = X but if I put together a doctrine fleet I know that I have X-n capability but I can guarantee that capability. Certainty is always preferred. It's been said that large alliance leaders merely play a vast real-time strategy game. It is only when a certain fitting is mandated that the ships get replaced by the alliance - any other fleets only have general guidelines: frigates/cruisers/battlecruisers, armor/shield, longrange/shortrange. and people bring what they can afford to lose.
also: as mentioned above - all drakefleets or alphafleets etc have a certain percentage of small tackle, a very small number of HICs and some logistics - these people (perhaps I'm biased as I fly a HIC) need to display a bit more initiative than the rest of their fleet due to their critical role. the FC can't micromanage the logistics or tacklers.
Bozzor said...
You are right about most skills.Training to lvl 4 is stupid.HOWEVER, the skills one needs for pvp MUST be lvl 5.
And there are PLENTY of those skills.
I started to do pvp in a Drake in 2007 and INSISTED to keep flying Drakes even tho 99% of the people laughed at me...until Drake become the flavor in fleets.
Anyway, I was not havinf enough dps and enough tank with all skills at lvl 4.I had to train missiles (both HAM and HML) to 5 so i can train specialization to 5.Also engineering, mechanincs and electronics.Also ALL shield realted skills, like the resist to passives and active shields and tactical manipulation.While Overloading is not really needed at 5 it is better to do it.
I cannot even start about Gunery.In gunnery you need even more skills at 5.I know because I am not only trained in Caldari.I can fly all BS races and all HAC races.Logis, only Caldari.
Wanna be a logi pilot AND in the same time have fun and provide help for the fleet? Train every shit to lvl 5.
You don't understand now, but a shield rep of 2000 compared to a 2200 one is much weaker than those 10% you think.
Go in null and live there for a while.You will see the diference between theory and practice.
Anonymous said...
In theory, you make sense.
I don't think EVE quite works that way. How many FCs (as opposed to CEOs) really care whether the alliance or the pilot is funding the ship? In neither case is it the FC. And God forbid the untraditional pilot dies.You hurt the Killboard and all the other little boys will belittle you in the forums. And unusual fits are more likely to get mentioned. Except for the kitchen sink, freedom for freedoms sake, feet, the risk/reward for a FC to allow diversity is low. Besides, there is the traditional role of suicide tacklers for people with less than a year of SP.
I also think that logistically it is easier to keep a standard fleet available in 0.0 than if there is too much diversity.
I have yet to read any idea for making EVE more popular or accessible that was supported by the players or at least forum posters.
Anonymous said...
From what I've seen, the reason that L5 is important is because it allows normally pushes you past a CPU/Power threshold that allows you to fit better or more modules.
Still, I think most skills at L4 normally seems to be good enough to get started. Sure, an L5 pilot would beat an L4, but two L4s would beat one L5.
Is this leading to the formation of the "Underskilled" Corp? No L5 skills permitted except those required to learn other skills. No set ship designs only basic guidelines?
Avensys said...
I disagree with you, Gevlon.
You are the one spreading the "I am useless in pvp unless I can fly at least T2 cruisers and better capitals" sentiment.
The fittings for these ships are usually designed around very good support skills as by the time a player gets into t2 cruisers he should have trained these while flying various t1 hulls.
The usual skill progression suggested to newbies in the CFC is:
Rifter -> Thrasher -> Blackbird -> Drake -> Scorpion
in a more "elite pvp" environment that might be:
Rifter -> Stiletto -> Hound -> Sabre
(picking up probing skills somewhere along the way)
Both of these paths would get you into a lot of fleets from day 1 (I'd prefer the second one for pvp-oriented players as it will make you a really valuable asset to quite literally *any* fleet but it doesn't entail a good ratting ship so ISK might be a problem).
but nowhere I've ever seen
[nothing] -> Guardian
being suggested for anything but (incursion) alts.
TEST didn't use any AHAC fleets for one and a half years (despite constant demands for them) because the SP requirements for that fleet composition were deemed to be too high relative to the age of most TEST pilots.
Not to mention that even once you have spent half a year training for your Guardian you will be completely useless to at least three out of four fleets (armor battleships are even less used today than they were a year ago, most alliances go with shield doctrines these days).
Nobody will scoff at a Drake with lvl3 or 4 skills, but don't come crying if an AHAC fitting requires T2 guns and AWU V.
Or if you get left behind in your carrier because nobody can be bothered to slow down the whole fleet for one guy with JDC4.
Training skills to lvl5 often makes a bigger difference in performance than the raw numbers would suggest.
Some of them are requirements for decent fittings (e.g. AWU V, Recon V, Logi V for Scimitars), some of them give you additional bonuses beyond their raw stat increase (e.g. access to t2 ammo - entirely no point using t1 pulse lasers, barrage is very nice to have for projectiles), some of them are required so you can use your ship properly (Logi V for Guardians, Tactical Weapons Reconfig. V for dreads) and sometimes they just feel really useful for certain ships (e.g. no matter what EFT might tell you Abaddons felt pretty weak to me - until I had Amarr Battleship V).
Most (but not all) T1 ships are very tolerant to low skills and the designers of fleet doctrines pay attention that standard fitting remain accessible to a wide variety of players.
T2 cruisers and beyond are where you get into the "perfect skills required" territory but nobody expects newbies to train for these within the first 6 months or so.
Veterans tend to take a very different view to skill training compared to new players - once you have a few 30+ days skills under your belt you just stop seeing the big issue with having to devote a few weeks to train for some role.
And there might of course be some sort of ex-post rationalization going on - I spent 40 days training this skill, now I will *feel* a big improvement in performance to justify that investment.
But in general I think you are struggling with a problem of your own making.
Anonymous said...
I think the problem here is that you have stated you want to fly logistics. The impression is that this is all you want to fly. You are applying some "healer class" mentality (evidenced by the clear guardian -> triage carrier progression).
Tech 2 is hard to fly. Its not even just the space ship command skills which are time consuming to get into, to fit a T2 ship properly you need a tonne of supporting skills, and it is often beneficial to have these maxed out.
For most Tech 2 ships, level 5 of its relevant space ship command skill is also very beneficial. Logistics 4 is considered 'minimum' for guardians, but our fleets wont accept any guardian pilots unless they are level 5 - not level 5 yet, go jump in some cheap DPS and mash F1.
I appreciate that you want to fly what you want to fly - goals are always good. But despite all the talk in eve about progression going out the window in favor of role fulfilling ships, there is a clear progression between T1 ships and T2 ships.
You should get out in a tackling rifter first. Move up to T2 frigates, progress into being a skillful cruiser and battlecruiser pilot. All of the knowledge you gain from doing this will do wonders for your ability to be an effective guardian pilot. You'll learn from experience who needs to be locked up because you anticipate that they will broadcast for reps any second as they get yellow boxed by everything.
You'll learn what ships you personally need to watch out for (having probably by now been involved in the dismantling of logistics chains from an offensive position many times over).
Again, fly whatever you want, however you want, whenever you want - but you shouldn't think for an instant that this is the best/most appropriate way to do it. You'll annoy logi bosses and FCs and find yourself on the outer instead of being the hero logi.
Nobody is saying "don't login for a year and a half". Nobody *once* suggested that. Its just been suggested that maybe you should take some time, fly other things, and get some PvP basics under your belt before hand. Who knows, you may end up discovering that you don't want to logi - you'd rather specialise in neut boats, or high dps brawlers, or ewar.
Gevlon said...
@Avensys, Anonymous: I never said "guardian" I said "logi, probably guardian". Learning another logi isn't hard (like 2 weeks) after you learned one. My very first idea was a Basilisk, but that would need someone to trade energy, so I'll probably go with Scimitar.
And yes, I want to fly a logi. I don't want to fly rifters, trashers, battlecruisers, especially they take my training time an place skillpoints where I won't use them. I know that T2 is hard and I accept that. I don't accept people artificially making it harder and telling that I should go to Rifter/trasher/F1-drone detail for a year.
I will fly a logi. Watch me!
Anonymous said...
As many EVE leaders, including the Mittani, have concluded, defeating an enemy alliance is an exercise in destruction of morale, not ISK.
The higher the "hope" of a fleet, the bigger the loss in morale at defeat. You don't want to fly with a dozen logis feeling strong, only to find out they are lvl 4 - stragglers and get wiped by a PL gank a third of your number and be made the laughing stock of EVE for the day.
The strength of a kitchen fleet is not the financial responsibility, but the refusal of having high hopes for success.
In the end of the day, capsuleers are immortal, and there are plenty of ways to fill their wallets. In the end of the day, morale is what counts.
Anonymous said...
Id actually have to agree with this part of his statement "ships are designed by ccp with all-level-5-skills in mind" as far as tech II/III ships are concerned. Just look at logistics ships, logi 5 is the difference between needing 1 or 2 energy transfers. The sole reason you use guardians/basi's over the other two is provide cap to your fleet. You cant do this with a fleet of logi 4 pilots. The difference in effectiveness is infinite.
Fade Toblack said...
Actually it was a commenter on a previous post that said you need all skills to 5 to fly any ship. That said, Gevlon isn't helping his case by holding out to fly a Guardian/Basilisk.
There are some skills for which the bonus per level is so great that you almost certainly want to train them to 5. Logistics is one of them. There are also a load of core skills that aid stuff like fitting that are really useful to train to 5 as they apply to every ship you may ever fly - go look at the "Core" certificates in EveMon.
As far as fleet doctrines go it also depends on the alliance. As said Test have Kitchen Sink fleets, also I believe that Goons are less fussy about fleet composition. Some "elite" alliances are much more strict - even to the degree that they have minimum specs for your PC so you don't suffer from game-lag. Some of the mercenaries in the game are very loss-averse as losses look bad to potential clients (who often have to reimburse them.) These are the places where you will be ridiculed for flying the wrong ship, a badly fit ship, or not having the skills to fly the preferred fitting.
Also one of the things that you're missing comes - again - from lack of real PvP experience. There are some advantages to uniformity when it comes to certain types of tactics. Having a bunch of ships that all do damage at the same range, and travel at the same speed allows you to keep the fleet in a blob. That allows you to more easily keep the logistics in range of the entire fleet.
All that said there are plenty of places where variety matters more, smaller gang PvP - eg low-sec pirates or some of the groups in Syndicate will use more varied fleet compositions. Simply because in these situations it's not simply DPS-wins, a single Falcon could be enough to allow you to engage a fleet double your size. So you're looking for an edge.
As an aside - as I've not had time to comment for a couple of days - I'd like to address Gevlon's desire to play logistics-only.
Gevlon, you will almost certainly not be able to FC a fleet whilst flying logistics. In fact if you only ever fly logistics, then becoming an FC will be quite a challenge. Of course if you don't want to FC, that won't be an issue - but I believe you've called raids in WoW before, so wanted to address it in case it was a goal in Eve.
On the T2 logistics ships themselves, each has two bonuses - although the remote tracking bonuses on Scimitar and Oneiros are almost never used, instead the ships are fit with cap-boosting mods that allow them to operate independently. That difference, along with the other differences between shield-tanking and armour-tanking means that the 4 ships are all used slightly differently, and there are slight differences to fly them well in a fleet.
Finally, I'll echo some of the other comments to get out there and get some experience - even if it's flying a tackle rifter. Whilst flying a Drake in a blob may be reduced to locking the target the FC calls and pressing F1 - if you're flying in a support role there's usually more to manage. Being in some fleets and taking part, will allow you to first-hand observe and analyse what is happening, which will hopefully give you more awareness for when you do actually fly support. You are going to have screw-ups whilst you're learning the ropes - and if you do those whilst flying logistics then other people will lose ships too - ultimately you're risking being the logistics guy that no FC wants in his fleet...
Anonymous said...
you are wrong.
as an fc i need to know more than optimal range and speed.
i need to know how much damage my fleet can ditch out
i need to know how much damage they can take
i need to know when their capacitors would run out
at what distance how many can provide tackle.
i need my logistics to be of the same type as the tank of the ones they are supposed to fix
i need to know the signature size of my fleets ships
i need to know at what distance they can go at full speed
i need to know how long they need to get aligned.
telling people to break the doctrine and take financial responsibility is bullhit.
And for a good reason most corps will kick you out if you come in the wrong ship with the wrong fit all the time.
a while ago, when i was in a huge alliance, we had an op. and there was a guy tagging along who was only in the alliance because his girlfriend was one of the higher ups.
Since he was new to eve he actually brought a drake - without even having the proper skills, and with a horrible selfmade fit.
So when ever we would warp from gate to gate he would be out of capacitor.
our way back from the fight took us over 2 hours because of him - for a trip the rest of the fleet would have done in 40 minutes.
during those two hours we could have been hot dropped and lost the complete fleet. Basically his selfish behaviour could have gotten the whole fleet killed.
Another example,
on a movement op we had a (fresh) titan pilot with us. his fit was, lets say creative. he did not know how to handle the ship either (he was playing for 9 month and had bought character and ship).
we had to wait almost 15 minutes after each jump for him to regain cap, and he did stupid shit like in the middle of the movement decide to jump on a lowsec gatecamp with the titan - and we had to commit our capital fleet which was fit for cap recharge and fully loaded with ships and replacement modules, to save his sorry ass.
The reason why we don't want people in creative own fits is not because we don't believe that other fits might work, its because we don't know the numbers that we need to know if people do that, and we know we got a lose cannon there as well.
If you want to achieve certain goals and prevent your hostiles to achieve some of theirs.
Also your assessment of the role of a tackler not doing anything worth mentioning is bullshit. There are two things that you cant have enough in a fleet. That's logistics and tacklers.
A tackler (and interceptor > rifter) can be trained in a few weeks. Not a year.
And i rather have 1 new guy in an interceptor in my fleet, than having 5 guys in logistics that have no prior fleet battle experience, and not the right set of skills.
PS: 50% isk efficiency is a *horrible* number, its not even close to being OK.
Gevlon said...
@Anonymous: you mistake low SP with being idiot. Not SP made him to jump on a lowsec camp. Nor SP made that drake slow.
You are right that other data can be important, but they can all be listed.
Fade Toblack said...
Just a follow-up on this:
This isn't about in-game character skills, this is about your real-life experience of the game. There's nothing stopping you from still min/maxing your logistics character, but surely you can spare a week of training on another character, and using that to gain that experience.
Personally I'd say without it, it's actually you that's artificially raising your own barrier of being productive in any role in a fleet. You could spend the next couple of months whilst your character trains reading up on every aspect of PvP - but none of that theory is worthwhile until you've been tested on the battlefield. In this aspect Eve is similar to real-life war and armies.
Hell at worst you can find one of the open-entry null-sec roams (RvB Ganked is one - but there are others) and tag along. You're not going to gain as much as you might from tagging along on an Agony Unleashed PvP class for example.
Alrenous said...
Sounds like college.
Why bother accepting skill-4 applicants when you can get fives for exactly the same price? If the corp insists on paying for the ship, accepting a lower skill would indeed cost more.
Anonymous said...
The point here Gevlon, is not whether or not you can go straight for a guardian. That is fairly easy to do (select guardian in evemon and add to plan. Add the pre-reqs and follow the plan religiously)
But flying a guardian (or any logistics, it doesn't matter) is one of the most difficult things to do to begin with. You need to watch your cap, manually pilot, watch ranges,watch for incoming neuts, watch your targets - all the while watching broadcast while some monkey repeatedly spams the broadcast for reps button.
You *need* to have some appreciation for how PvP in general works to be effective at it. Any logi pilot who trains straight for logi with no prior PvP experience in eve is going to die. Worse, its going to get fleet mates killed.
Your assertion is correct, you don't "need" to go through all those things you don't want to fly (which are by the way, incredibly rewarding and fun to fly), but it is the height of arrogance to brush the advice being given to you to do those things aside.
Your first few fights you will panic. Absolutely you will. fumbling around not knowing what you are meant to be doing while you are charged with keeping potentially billions of isk worth of ships alive is demonstrably silly.
Here's another example of something which happens all the time in the wormhole I live in:
You join a wormhole corp, and a fleet is forming up. They already have enough guardians - skilled, proven guardian pilots that they know and trust to do their work. The FC asks you to hop into a DPS boat instead. What is your answer going to be? Hint: if you answer "i can only fly logi", you wont last long in corp - thats assuming a pvp corp lets you in as such an inflexible pilot to begin with.
Anonymous said...
I can say why EVE does not interest me.
It has no ranked pvp system (where you meet similar skilled players) in an instanced environment.
Current PvP requires you to invest (time) in your ship, which does not support experimentation when it comes to strategy.
It is a grind, like Vanilla WoW. It just requires time investment and repeated activities to compete. I believe a game with such a model is not good for competitive play; the competitiveness gets artificially influenced by efficiency and time investment rather than by learning curves.
The level of strategy I look for in a game does not seem possible in EVE. Having to make a ship to test out a strategy is inefficient for a competitive pvp-er. Having to sacrifice hundreds of ships (that require resources and time investment) just to master strategies doesn't sound appealing or something I would do. If the depth of this game doesn't require you to burn through hundreds of ships it wouldnt be the game for me anyway.
I do not know how EVE works on a detailed level. I would however subscribe and try EVE for 3 months if they add a ranked instanced pvp server where people could have matches between an x number of ships fairly distributed for both sides.
Anonymous said...
@ Anon 2108
Eve is war, not UFC.
The idea that Eve does not support 'experimentation' is ridiculous. As long as you can fit to your ship, you can fly it.
Simply put, if you choose to go into Eve with the mindset of a UFC 'competitive' fighter, you won't have much fun after someone brings a Falcon to a frigate fight.
Agent Black Cat said...
If you find an alliance whose "replacement" policy is provide your own ship, get paid a percentage of the value you destroy, let me know. That'd provide a nice incentive for creative design.
Anonymous said...
"Laser Rokh + Retreiver fleet"
"individual pilots weren't F1-drones, but thinking people who fit their ships to their strengths and weaknesses. "
If you don't know already - you probably don't - that fleet was a joke. It wasn't people being smart, they DELIBERATELY chose ridiculous fits. If they won on ISK it's because their opponents flew more expensive ships, or because their opponents were outnumbered, or made a bad call. Take one of those fleets to a real fight and you'll get torn to bits every time by uniformity.
On another note, if you don't want to wait just buy a maxed out character for 30b and stop worrying about skills. 30b can be made in a few weeks, but training a maxed out character from scratch will take you a decade. (Character trading for ISK is allowed in EVE, unlike in WoW?)
Anonymous said...
@annonymous 0321
What kind of history would that character have? Hoe many times would you need to deal with friends/enemies from years in that character's past? Maybe even a crap name that you now have to live with.
NormenKD said...
Im trying my best to get your Ideas to a larger crowd of the EVE community (Not that you need any kind of approval by peers, i simply would like the community to learn and think about your ideas). My latest attempt is Reddit-post . Have a look at the comments and please explain to me what happened there. Is this 'just' plain stupidity?
Khanh'rhh said...
He's not completely wrong, but he is mashing together two things, fleet doctrines and SP elitism.
Fleet doctrines exist for reasons he doesn't understand, but SP elitism usually exists way, way outside of these fleets. In fact, you most normally see it in highsec, among carebears running PVE missions / Incursions.
Fleet doctines exist because of effectiveness, and *scalable effectiveness* - two concepts that are crucial.
OP is seeing it backwards, instead of "I'll bring anything, better than nothing, right?" he should be thinking that "Yes, since it is the doctine ship I can both fly it and am optimized in it. This helps both myself, the fleet and the alliance as a whole as a result."
You need to push a doctrine, as kitchen sink fleets *will* get ripped apart otherwise. One battlereport where 50% efficiency was achieved despite outnumbering the opponent is not a good example against this.
Anonymous said...
@Anon 21:50
I am talking about something different when I discuss experimentation. How long would it take someone to try out a wide range of tactics in different fittings?
How much would it cost me (time wise) to try out 20x a ship (and I would probably do this with quite a few ships) in different pvp battles?
There are serious barriers to competitive play. Your pvp units require resources! The chance of finding an equal battle where skill is the dominating factor will be small (always tough to find in non pre arranged world pvp).
The players who played this game longer do not only have an advantage when it comes to knowledge, they also have more resources available (and used their previous resources to increase their skills/knowledge).
Catching up, even with an above average learning curve, seems brutal at best. Even if EVE had ranked PVP it would take too long to play on a top level, it most likely wouldn't be worth the time investment.
Will I eventually lose 50% of the battles I engage in because my wins match me vs better and more challenging (fun) opponents? My brains gives me more rewards if I lose a very strategic battle where I learned something than a win versus a bad opponent.
What I imagined with competitive play is nearly equal battles in an ranked instanced environment. I do know this is impossible to implement. Battles between equal fleets (although large scale pvp does not allow complex communication), perhaps between small fleets where you can switch between ships with basic AI for non player controlled units.
I dismiss any online multiplayer game where time/resources rather than strategic decisions influence battle outcomes. I dismiss any online game where I am not forced against similar or better opponents.
Like I said. EVE is not for me.
|
global_01_local_1_shard_00001926_processed.jsonl/43044
|
Controlling for Volatility
Managing the Long-Wave Frequency of Risk
Nature does not care if we know what the right thing to do is, or care to do it. When it comes to the human experience, much as the Objectivist describes it, nature is functionally psychopathic.
Without the human experience there is nothing about nature that is right or wrong. Existing measure and resisting nothing, however, right and wrong emerges with the experience of being human over time.
Over time, the probability of human existence is better than zero. In the same way, the probability of right and wrong is also, contrary to what Objectivists believe, better than nothing.
Nihilism (that there is really nothing to constrain human conduct because, objectively, controlling for human existence, nature does not “know” right from wrong) makes for a volatile existence. The financial marketplace, for example, is a model for human conduct. With limited liability (operating with “objective identity”), the conduct of financial enterprise is characteristically nihilistic, and extremely volatile.
(It is important to understand that a volatile environment, nihilisticly organized in priority, exists in a risk-prone, “it just happens” proportion. When it crosses with political events, like a Ukrainian crisis, risk tends to manifest suddenly and violently. Once the violence starts, accumulating retributive value, it yields to the point of exhaustion.
Like Ayn Rand said, what’s the point; simply accept objective reality–elites rule–and by natural design the fighting is over now. Elites, however, pathologically determined by the object of self-perseverance, fight among themselves for dominance, dragging everybody else into the path of self-destruction in the name of self-preservation.
No, contrary to Ayn Rand, like Hobbes said, elites need to be ruled by design. They naturally exist on demand or they find out, over the long term, that their reason for being means nothing.
It is important to recognize that the difference between right and wrong EXISTS in priority. Being risk averse is categorically imperative. It always exists now.
Naturally, we learn to resist organized psychopathy–we grow up! Over time we exist the measure and resist the value of nothing–nihilism. “We” naturally resist the accumulation of retributive value with pluralistic means to ends. The American Revolution specifically represents that existential value, expressly averse to the consolidation of power, objectively recognizing that risk is best managed, long term, not by social contract but by being indefinitely determined in a commonly divisible proportion.
Causation on demand beats chain of command every time.
President Obama, for example, being a lawyer, is arguing “chain of causation” and “strict liability” in the MH17 incident. He says that Russia is directly liable for the conditions at the border, and thus the tragedy of MH17. Rather than being nihilisticly consumed as an “it just happens” event–regardless of intent, the liability being strictly constructed on demand–compensatory damages are in order and not just nothing. In other words, the conditions being created there are a nuisance, and a nuisance demands to be regulated, existing measure over time and resisting nothing.)
Rather than being a function of right or wrong, for the Objectivist the means to ends is a measure of probability that exists over time depending on how much space (volume) you can occupy on demand. Existence is a function of being on demand–it is functionally psychopathic, measurably getting what you want on demand, plentifully supplied, without disruption, and a familiar way to objectively measure that existential value is to discount the rate of probable risk.
Since “elites always win” is “objective reality,” the risk of loss, existing over time, is discounted. The risk of loss (which can’t happen by natural design) is fully valued (100%) now and priced into the future (the delivery date on demand). Calculating the future now can be complex, if not arbitrary, which results in “the arbitrage argument.”
Arbitrating the future, fully valued now is to determine the risk, and the farther out you go the more risk (occupying space over time) is being assumed.
Of course, being naturally psychopathic and fully functional, you want to make it so you don’t assume all the risk now fully valued. So you sell it at a discount rate, which (yielding the price) creates volatility (the argument to be arbitraged). Objectively, winning or losing the argument (how much cash you have on account against debt) is the difference between being right and being wrong.
Keep in mind that being right all the time is abnormal. Risk is inherently fickle–it is a timing function, existing measure (probability) over time. What makes it “arbitrary” is the timing but, objectively, it is not arbitrary at all. Just because something “just happens” (like when Wall Street wins big and everybody else loses without fail) does not mean it happens without a cause.
Wall Street tells investors, “don’t try to time the market.” Why, however, is because the timing (the long-wave distribution of the risk) derives from (is caused by) your position at any particular time; and now, especially, in a flash it can crash, supporting the organized psychopathy as a long-term “objective reality” attributable to the objective probability of the risk.
Psychopathy, you see, is not an abnormal, psychological condition. Instead, it is how we cope with risk. We grow up with it, discovering the difference between right and wrong, tested with an on-demand existence that delimits (arbitrarily yielding to) an objective identity.
About griffithlighton
This entry was posted in Political-Economy and Philosophy and tagged , , , , . Bookmark the permalink.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/43052
|
Tuesday, March 13, 2018
An Adversary and Enemy
Seated in center - the Satmar Rebbe, Aharon Teitelbaum (Behadrey)
I can only think of one appellation that applies to the Admor (Chasidic Rebbe) of Satmar, Aharon Teitelbaum. He is an Ish Tzar V’Oyev - a man that is an adversary and an enemy of the Jewish people.
How dare I say that about a rabbinic leader of such high stature? How can I describe him in terms used for the Hitler of ancient Persian history - the wicked Haman? I have a precedent. Rabbi Teitelbaum’s great uncle and founder of Satmar, R’ Yoel Teitelbaum used that same appellation about Rav Avraham Yitzchak HaKohen Kook, ZTL. A Gadol much older and greater than he was in my view.
How apt it is to turn that phrase around right back at R’ Yoel’s great nephew and a current leader of Satmar. (Actually he is one of two current leaders. There is some controversy about who was the real heir to the Satmar throne: R’ Aharon or his brother R’ Zalman. But it doesn’t really matter. They are both rabidly anti Israel.)
I bring this up now in light of a story in Behadrey Haredim (Hebrew). Mostly in reaction to the US declaring Jerusalem as Israel’s capital, Rabbi Teitelbaum has called for a massive anti Israel protest right after Pesach. Which is shortly before Israel celebrates Yom Ha'atzmaut - its independence day. He wants to make sure the world knows that the State of Israel is an evil entity that does not deserve to exist. Much the same view as the Supreme Leader of Iran (the current Persia): Ayatollah Sayyid Ali Hosseini Khamenei!
That there is any credibility given to Statmar by any faction in Orthodoxy is disgusting. Opposition to Satmar because of this ought to be universal - just as it is toward the extreme Left. There may be different reasons for that opposition. But that does not make Satmar any less deserving. The resultant Chilul HaShem of a massive anti Israel demonstration by the most religious looking Jews among us - will be immediate and devastating. They will no doubt proclaim (as they always do) that being anti Israel is the authentic Torah view.
I can just see all the rabid anti Israel Mullahs in the Muslim world salivating at this. I wouldn’t be surprised if that demonstration were attended by official representation from Iran, Hamas and Hezbollah. Satmar would no doubt welcome it!
There ought to be a huge outcry by all of mainstream Orthodoxy condemning this as a distorted view of the Torah and Jewish values. The problem is that this will never happen. What may instead happen is that some mainstream Charedi leaders might actually attend this demonstration and sit conspicuously on a stage together with the Satmar. Just as they have done on other occasions. There is no way that any mainstream organization would condemn a demonstration attended by members of their own group. Which is why Satmar will get away with it with hardly a word of protest. And that legitimizes them.
As I have said many many times. This isn't about Satmar’s anti Israel views. They have every right to believe as they wish. They may even have some solid sources for those beliefs as interpreted by their founder. I have no issue with that even though my own views are diametrically opposite theirs. What they do not have a right to do is cause a major Chilul HaShem using those views as an excuse.
If this demonstration takes place and is as large as they hope it will be… and is attended by any mainstream Charedi leader, they will have succeeded in not only making a Chilul HaSehm, but in possibly causing great harm to our people. If the nations of the world see a mass of religious looking Jews opposing the State of Israel, why shouldn’t they? Why should they favor tiny Israel over the multitude of Muslim countries that want to see Israel dismantled - just like Satmar does?
If this does not rate Rabbi Teitelbaum the appellation Ish Tzar V’Oyev, I don’t know what does.
If this event is not going to be condemned by the rest of the mainstream Orthodox leadership, it ought to be done at a grass roots level. There ought to be a counter rally of support for Israel in close proximity that is even bigger than the one Satmar hopes for. Orthodox Jews from all streams of Orthodoxy ought to show up and shout out loudly and proudly a message of love and support for the Jewish State. Speaker after speaker should talk about all Israel has achieved in its short 70 year history. Both in Torah and in Mada. And addressed by as many rabbinic leaders from as many factions of Orthodoxy that can be convinced to attend.
That, in my view, will overturn the damage of a Satmar anti Israel demonstration that would surely result if they are allowed to proceed unchallenged.
|
global_01_local_1_shard_00001926_processed.jsonl/43057
|
Amazing Banana Oat pancakes
Keeps you full and happy!
Super quick and delicious!! There are only 3 ingredients and it only takes 10 minutes. I use an electric griddle but you can use a frying pan. If you don’t have time in the morning this is perfect for you. You can use any quick oats you want unless you like uncooked oats. The oats I use are Qia supersedes & grains, you can find them at Whole Foods or Amazon
image_6483441 (1)
Time 10 minutes. Calories 335 without syrup
1 banana smashed
1 egg
1 oatmeal pack
Heat a griddle to 350( add coconut spray) or frying pan at medium-low heat and add a little vegetable oil for frying.
1 Mash up the banana
2 Add egg mix together until well blended
3 Mix in oats
It’s best to make small size pancakes it helps to cook them more evenly, also easier to flip.
Let me know how they came out?
If you or someone you know is in need of personal training or health coaching check out my website.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/43089
|
Kaitlyn and Devyn
How He Asked
We had just reached our destination to New York city after a five day road trip from Coeur d’Alene Idaho. I had never been before and it had been a dream of mine to go ever since I was a little girl! I was in awe of such an amazing city and when we went into Time Square at night I had no idea what was about to happen! We got right into the heart of it and when we where about take a picture he looked at me, I had thought he was going in for a kiss and then he got down on one knee, I was so shocked I could barely believe what was happening then really fast because he was so nervous he asked me to marry him, of course I said YES!!
Then after I looked up after a minute of hugging and kissing him I didn’t realize how many people where clapping and cheering!
It was definitely a moment I will never forget and thanks to his best friend who caught it on video and the amazing photographer who captured some amazing photos unexpectedly I will never have to!
Special Thanks
Arken Avan
|
global_01_local_1_shard_00001926_processed.jsonl/43096
|
results found in ( seconds)
ICD-10-CM Code F84
Pervasive developmental disorders
Non-Billable Code
| ICD-10 from 2011 - 2016
ICD Code F84 is a non-billable code. To code a diagnosis of this type, you must use one of the six child codes of F84 that describes the diagnosis 'pervasive developmental disorders' in more detail.
The ICD code F84 is used to code Pervasive developmental disorder
The diagnostic category pervasive developmental disorders (PDD), as opposed to specific developmental disorders (SDD), refers to a group of five disorders characterized by delays in the development of multiple basic functions including socialization and communication. The pervasive developmental disorders are pervasive developmental disorder not otherwise specified (PDD-NOS), which includes atypical autism and is the most common; autism, the best-known, now understood to be part of a spectrum; Asperger syndrome; Rett syndrome; and childhood disintegrative disorder (CDD).
Specialty: Pediatrics, Psychiatry
MeSH Code: D002659
ICD 9 Code: 299
Source: Wikipedia
Coding Notes for F84 Info for medical coders on how to properly use this ICD-10 code
Additional Code Note:
Use Additional Code
Code to identify any associated medical condition and intellectual disabilities.
** This Document Provided By ICD.Codes **
Source: http://icd.codes/icd10cm/F84
|
global_01_local_1_shard_00001926_processed.jsonl/43106
|
Woll Smothing
There is an internet meme called the “Woll Smoth” meme where you take pictures of celebrities and shrink certain facial features. It is closely related to another meme where you give celebrities tiny faces. In all cases, they misspell the celebrities name to include more O’s, normally in the place of other vowels. Here is the original Woll Smoth picture that started the meme:
I don’t know about you, but I find that pretty hilarious to look at.
Here are some other “Woll Smoth Meme” pictures that I found online, collected here for your enjoyment:
ImageImage ImageImageImageImage
And lastly but not least, here is a Woll Smoth photo that I made out of Ed Sheeran after looking at the meme… Err… Well I guess that would be Od Shooron 😉
Here is another photo that I edited (Harry Styles / Horry Stylos)
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/43123
|
How can we help?
What if I already insure my units individually with initio?
When your policies are due to renew you will have 2 options. The first, is to leave it as is and renew the policies as individual units. The second is to take out a new multi unit rental policy, if you choose this option, we will lapse the exisiting policies from renewal.
|
global_01_local_1_shard_00001926_processed.jsonl/43130
|
How does Facebook actually rank your friends ?
Have you ever wondered how Facebook ranks your friends for you? The company keeps a score for everyone you interact with on the social network.
This affects the order of results when you start typing a name into the search box, the people that appear in your Friends pane when someone visits your profile, whose content shows up in your News Feed, and pretty much any list that displays who you interact with on the site. To put this in layman’s terms, Facebook tracks who you interact with or stalk, and vice versa.
As a result, Facebook users are often curious to know how the service ranks their friends. Many people have created tools to list these figures, and Arjun Sreedharan‘s is one of easiest to use.
You can check your friends’ rankings in just three steps:
1. Drag and drop the following link to your browser’s bookmarks bar: FB Friends Ranking
2. Login to Facebook and click on the bookmark.
3. You will see a list of your Facebook friends’ ranking score (scroll down past the “undefined” entries).
The first 15 entries of an example ranking score look like this (names have been blocked out to protect the innocent):
As Sreedharan explains, the smaller the friend’s score, the higher the rank:
The score gives an indication of the length of the edge between you and the friend. I guess only facebook would know what it exactly means
In other words, unless you’re a Facebook engineer, this number is meaningless by itself. It is only useful when compared to your other friends and/or people who you interact with on Facebook.
Source: thenextweb
|
global_01_local_1_shard_00001926_processed.jsonl/43141
|
Friends fight about a lot of things, but there's often an underlying theme in what sets them off. Now two psychology researchers at Wilfrid Laurier University say they have come up with a simple test that reveals whether two friends will have a tempestuous relatoinship or not. It all has to do with knowing your friend's "triggers." Researchers Charity Friesen and Lara Kammrath gave students a test where they built up profiles of how their friends respond to a variety of behaviors.
In a release about their study, they explain:
This included a list of "triggers"-descriptions of behaviors that someone might find annoying. One example was the word "skepticism" which was described as when someone is overly disbelieving of information that he/she receives, when he/she questions things that are generally accepted, or when he/she is very hard to convince of something. The list also included gullibility, social timidity, social boldness, perfectionism, obliviousness and several dozen other possible triggers. For each behavior, each respondent answered a question about how much this triggers them and how much it triggers their friend.
Some people knew their friends' triggers well; others had almost no idea what set their friends off. And that made a difference to the friendship. People who had more knowledge of their friend's if-then profile of triggers had better relationships. They had less conflict with the friend and less frustration with the relationship.
via The Association for Psychological Science
Image via Shutterstock
|
global_01_local_1_shard_00001926_processed.jsonl/43148
|
Skip to main content
Energy Systems Mechanical Engineering Technology
Program Objectives
1. Solve technical problems typical of those encountered in the energy systems mechanical engineering technology discipline.
2. Work and communicate effectively in multidisciplinary teams.
3. Stay current industry standards, challenges and innovations.
Student Outcomes
1. Demonstrate safe work practices in laboratory and industrial environments.
2. Be aware and familiar with society and government codes, standards, and regulations with their typical format and application.
3. Demonstrate written and verbal communication skills.
4. Utilize test equipment to troubleshoot and analyze electrical, electronic, instrumentation, and motor control related circuits.
5. Analyze systems through the understanding of mechanical principles, fluid mechanics, thermodynamics, material science, and equipment design.
6. Identify the correct pump or valve for a given process condition and apply a comprehensive understanding of pumps and valves to troubleshoot systems.
7. Interpret and utilize technical documentation.
8. Demonstrate basic structural welding.
9. Demonstrate basic computer-aided drafting and design.
10. Demonstrate commissioning practices for equipment setup and alignment.
11. Recognize specific equipment applications for reactive, preventive, predictive, and proactive maintenance.
Annual Enrollment and Graduation Data
2018 10 2
2017 14 7
2016 17 2
2015 10 4
2014 9 2
2013 6 5
2012 5
* Enrollments: Number of students majoring in the program enrolled in the fall semester of the academic year.
Graduates: Number of students awarded a degree during the academic year.
921 South 8th Avenue
Pocatello, Idaho, 83209
(208) 282-4636
Discover opportunity at Idaho State University
|
global_01_local_1_shard_00001926_processed.jsonl/43156
|
I recently had the opportunity to drive a diesel-powered 1987 Mercedes-Benz G-Wagen. This is just like the plush, high-tech G-Wagen models that all the celebrities drive, except instead of an infotainment system, mine had an altimeter.
You'd know all about my G-Wagen adventures if you followed me on Twitter, because I posted a picture of myself standing next to the G-Wagen in question: a manual-transmission 240GD Cabriolet, graciously loaned to me by local automotive retailer Selden Motors, which is perhaps the only used car dealer on earth whose inventory includes both a 1965 Mustang and a stick-shift BMW X5.
So, you might be wondering, just how was the G-Wagen to drive? Well, if I said "slow," I wouldn't be doing my full duty as a highly respected automotive journalist to perfectly explain the situation. So instead, I'll use a real-world example that better illustrates my viewpoint: the thing drove like a riding lawnmower towing a sailboat. And I don't just mean some dinky little single-seater boat with a sail the size of a fluffy bathroom rug. I mean the kind of sailboat you refer to as your "other wife" when you've had too much eggnog at Christmas parties.
But we're getting ahead of ourselves here, because any real G-Wagen review should include a Mercedes G-Wagen History Lesson, to illustrate just how long these vehicles have been in service to our great world. So here goes:
79 AD: The G-Wagen is created by Pliny the Elder, upon witnessing the eruption of Mount Vesuvius. "We need a car that can withstand such future eruptions," Pliny writes, in perfect English, even though the language wouldn't be invented for more than 500 years. "And also transport Kim Kardashian and her butt to the mall."
337 AD: As emperor of Rome, Constantine the Great commissions a fleet of G-Wagens for his private use. "And black those babies out," Constantine tells a slave, shortly before sending the slave into the Colosseum, where he must battle a lion for Constantine's private amusement.
847 AD: The Mayans are hanging out on the shore, creating calendars and sacrificing animals to the Gods, when a diesel G-Wagen washes up after a nine-week journey from Europe, where it had accidentally fallen in the ocean. It starts on the first try. Unsure of what to think about the boxy, utilitarian vehicle, the Mayans sacrifice it to the Gods.
1214 AD: Genghis Kahn uses a fleet of militarized G-Wagens to take over hundreds of villages throughout Central Asia. This is largely overkill, since these villagers mainly live in mud huts and haven't discovered the concept of shoes, but Genghis Kahn carries on, undeterred. "I like the door latch sound," he says, as he beheads a terrified family.
1492 AD: Christopher Columbus sails to America with a fleet of G-Wagens, which he provides to Native Americans as gifts. Months later, they return the G-Wagens, saying: "Smallpox blankets would've been better than these German pieces of crap."
1786 AD: Unable to agree on a direction for our blossoming country, Ben Franklin and Thomas Jefferson decide to have a G-Wagen drag race down Chestnut Street in Philadelphia to see who gets to write the sixth amendment. Franklin's G-Wagen, a 12-horsepower diesel model with enlarged headroom to accommodate powdered wigs, is gaining ground on Jefferson's G-Wagen, which is pulled around by his illegitimate slave children, when both vehicles are stopped by Philadelphia police and illegally searched for drug paraphernalia.
2012 AD: The G-Wagen is first used to transport Kim Kardashian and her butt to the mall.
Now that we have this highly important and extensively researched G-Wagen history lesson out of the way, it's time to discuss the specific G-Wagen I drove: a 1987 240GD Cabriolet, sold new in Milan, Italy, where it likely went to a rural farmer who believed the best time to tend to his crops was "tomorrow."
I say this because the 240GD wasn't a particularly sprightly vehicle. Remember earlier when I compared it to a lawn tractor towing a sailboat? Well, I was being charitable. It's more like a wheelchair towing a sailboat. And I don't mean one of those cool power wheelchairs with all sorts of computers and motors, like the one Stephen Hawking uses. I mean the kind of base-model, vinyl-wrapped wheelchair you get when you lose a leg and you're covered by an HMO.
Speaking of driving experience, I should mention at this point that the G-Wagen I drove had a dash-mounted, airplane-style artificial horizon gauge; the kind of gauge that tells you whether you're level, or descending, or ascending, or about to crash into Lake Erie. Initially, I had no idea why this gauge would be fitted to an automobile, but then I realized that when you're driving this G-Wagen, every corner feels like the banked turns at Bristol Motor Speedway.
So what happens is, you enter a corner, and everything is good, and then the G-Wagen starts to tilt, and you look down at the artificial horizon, but it's bouncing around uncontrollably because a) the suspension is stiff, and b) the gauge was installed by Italians for God's sake, and that means it's only about half as effective as it would be if it were installed by anyone else, including a team of capuchin monkeys with small hand tools. So you just gun it, and hold on, and hope for the best, and eventually you make it through, unscathed, until the next corner, where you repeat the exact same process in its entirety.
Fortunately, the G-Wagen wasn't all bad. I actually enjoyed the driving position, which is good, because the seats were bolted directly to the floor and couldn't be adjusted. I also liked the plastic rear window, which has clouded, and faded, and yellowed over the years, and yet it's still twice as transparent as the tint people put on modern G-Wagens. Oh, and a special shout out to the car's excellent Motorola flip phone, likely mounted on the dash so the Italian driver could scream and flail around his arms without having to worry about annoyances such as actually holding the phone.
So my conclusion on the G-Wagen is this: it's slow. It's awful to drive. It has no technology. The seats don't move. Visibility is mediocre. It's noisy. And here's the kicker: this one is on sale for nearly $30,000, which actually makes it one of the cheapest G-Wagen cabriolets available in the entire country. Some of these things cost a hundred grand or more. So yes, you have it right: not only is an old school G-Wagen cabriolet awful to drive, it's expensive, too. And this makes it one of the very worst vehicles I could possibly imagine buying.
In other words: I want one very badly.
For more on this G-Wagen, check out this highly informative video I made:
|
global_01_local_1_shard_00001926_processed.jsonl/43188
|
What is a Wildcard DNS record?
A wildcard DNS record is a record that answers DNS requests for subdomains you haven't already defined. You can create them for A records and CNAME records by entering an asterisk (*) in the host field.
Here are a few things to keep in mind...
Wildcard records don't return for lookups of the root domain
Lookups for your root domain (the part of your domain that comes after the "www") won't return the wildcard record as you might expect. You'll need to make sure you define root records (empty host field) for lookups that don't specify a sub-domain.
Wildcard records don't override existing records (such as CNAME records)
When you set a wildcard record, that record does not override any existing sub-domain records in the zone (zone is another term for all the DNS records associated with your domain).
Here's an example:
Above is a CNAME record and a wildcard A record. If we do a "dig" command (asking the DNS for information) on a random sub-domain, in this case "goodbye.etaoin.ink", we get the wildcard IP address.
If we "dig" the CNAME record (hello.etaoin.ink) we do not get the wildcard, but the established CNAME record IP address.
The wildcard picks up the random sub-domains, excluding the one already defined by the CNAME record.
Here's another example:
The first A record is an example of a "www" A record. The second, a wildcard A record. The third, the root domain A record. If we "dig" the domain (etaoin.ink), we will see it shows the root domain's IP address.
If we ask for information on a sub-domain, let's say "hello.etaoin.ink", we will see it shows the wildcard IP address.
If we ask for information on "www.etaoin.ink", we get the IP listed for the "www" A record, not the wildcard record.
|
global_01_local_1_shard_00001926_processed.jsonl/43189
|
Autobiography of the KEEXZUS, no. 5: Schizophrenia and Time
Transform the nature of time, of Being, unleash Spirit.
Drown in the creative Spirit of Being.
I can often hear birds sing, as the wind speaks its language. Into frontiers unknown, we begin to transform. From an ocean of consciousness, we are vessels filled with Spirit. Identification with the mind and body is the beginning. We will then identify with the ideology and system that best serves our interests and outlooks. In this dream, there will be ideological blind spots caused by identification with forms. In this dream, we will believe we are each fighting for our own version of freedom. In this cosmic drama, we play our roles.
Now let us rip away the face of time.
I am in my car listening to Santana. I haven’t cried in weeks. I feel relatively healthy, save a few cavities. I relinquish all heroes from my past: Dostoevsky, Kafka, Chomsky, Derrida, Zizek, Hegel, and Shakespeare. Sometimes I fear I will truly die alone.
It is this world that is unfolding…
within a theater.
Not just the expectation of a sole binary, but the expectation of its deconstruction, and the exploration of transcendence. That is the most succinct way I can transcribe the rotating event. To create space where one can talk about things without ideological attachment or endorsement. That being said, the most dangerous thing is to write and say out loud what one truly thinks (if it originates from Source). Most of the world is afraid because they speak from the ego they identify with.
The exploration of thought and the exploration of time and narrative is necessary. Prohibition creates want, outrage creates resentment, and yet these are the tools of modern discourse. (political). To transform the political world will perhaps require something more powerful than ancient rules on limiting thought structure. IF at a foundational level one wants peace, then what is the road toward that goal?
It is not what has been.
The transformation of world consciousness toward an end goal of sustained peace will require an unprecedented love.
And perhaps that is the most misused word in language if only because it is often applied to material consciousness and form. And a final portrait even now is far away and incomplete. The consideration for the world to comprehend and dwell in the vertical dimension of time and inherit the inner world of Spirit will take time…
It will take the very thing it will need to overcome.
|
global_01_local_1_shard_00001926_processed.jsonl/43192
|
Lion Tamers Are Stupid
What a moron lion tamer. A lion decides he's had enough of doing tricks for humans and decides to remind the tamer where they rate on the food chain. Lion opens a can of whoop a$$ on the tamer and after people come in to rescue the trainer, this hammerhead trainer decides he's going to square up to this lion and show him who's boss with a stick. (note; when dealing with lions you should have a gun) The lion just kicks his but again. Lesson; don't mess with a lion. They will eat you.
Chris Baker
Chris Baker
Content Goes Here
|
global_01_local_1_shard_00001926_processed.jsonl/43224
|
Twenty-seventh Sunday of Ordinary Time, October 2, 2016
Before the first reading:
At the time of this prophecy, God's people had been unfaithful. A pagan nation is making war against them. The prophet takes this for granted: misfortunes like war are punishment for infidelity. What he complains to God about is that the punishment is excessive and comes from the hands of pagans.
After the psalm, before the second reading:
The veteran Saint Paul had made the young Timothy a bishop by the laying on of hands. Paul, now a prisoner, writes to encourage Timothy to live out his calling.
Before the gospel acclamation:
This section of Saint Luke's gospel gives us two of Jesus' sayings: one about faith and one about how demanding it can be to live as a disciple.
First Reading, Habakkuk 1:2-3, 2:2-4
The Historical and Literary Situation: The first two chapters of the book of Habakkuk (HAB uh cook, with a short A) take the form of a dialog: the prophet complains, the Lord answers, the prophet complains again, and again the Lord replies. The setting is around 600 B.C.E. God's people are in trouble. They have been unfaithful, and another nation is making war against them. Habakkuk takes this for granted. People in his time believed that misfortune, whether personal or national, is deserved punishment for sin. It's that simple.
So that's not what makes Habakkuk complain. What puzzles and irritates him is that Judah's punishment comes at the hands of brutal pagans who are overly aggressive. As The New Jerusalem Bible puts it, "Why should the bad be punished by the worse? Why should [the Lord] appear to strengthen the arm of injustice?" To use such peoples is unworthy of the the holiness of God. Furthermore, the prophet thinks the punishment has gone on quite long enough, and that the excesses of the enemy are going unpunished. Habakkuk breaks new ground by demanding of God an account of all that God has let go on. (Our Lectionary selection draws from the prophet's first complaint and the Lord's second reply. The whole dialog is much richer.)
Your Proclamation: As lector, make the complaint-response structure clear by an appropriate pause and contrasting tones of voice. Habakkuk, in the first sentences, should sound very impatient, on the border of outrage. Can't imagine how that sounds? Remember in high school how you had to do Patrick Henry's speech from the American Revolution, "Give me liberty or give me death!" The buildup to that climax is the kind of outrage you need. So is the indictment of King George III in the United States' Declaration of Independence (1776).
Pause dramatically.
Then, slowly, deliberately, "The Lord answered me and said: ..." Continue slowly and with patience in your voice. Say the final sentence with firmness, "but the just one, because of his faith, shall live". (Saint Paul was to make much of this sentence in his letter to the Romans. It's the sentence that ties the first reading most clearly to today's gospel.)
Second Reading, 2 Timothy 1:6-8, 13-14
The Historical Background: Remember that Timothy was a person, not a congregation. And Paul is speaking to him personally here. Paul had laid hands on Timothy, the gesture we still use in confirmation, ordination and the anointing of the sick. Timothy received gifts of the Spirit then, but he is responsible for choosing to exercise them (stirring them into flame). Paul refers to his own imprisonment, and does not want that condition to bring shame on his protegé Timothy.
Proclaiming It: These are straightforward words of encouragement from "an old hand" to a young servant of the Lord and of the church. Read them that way, more formally than you would a "pep talk," but in that spirit. Decide which words apply not only to Timothy but to yourself and the people in the assembly who will hear you, and emphasize those (perhaps "power and love and self-control" and "bear your share of hardship for the gospel"). Be sure to contrast "spirit of cowardice" with "power and love and self-control."
Comments powered by Disqus
Links to other smart commentaries on this week's readings
Credit for the picture at the top:
Habachuch [the prophet, source of today's 1st reading], published 1613
Theodor Galle after Jan van der Straet, Flemish, c. 1571 - 1633
engraving on laid paper
plate: 17.7 x 13.9 cm (6 15/16 x 5 1/2 in.) sheet: 24.3 x 19 cm (9 9/16 x 7 1/2 in.)
Courtesy of the National Gallery of Art, Washington, D.C., U.S.A.
Ailsa Mellon Bruce Fund, 1974.55.7.p
The text around the portrait is loosely based on expressions in the biblical book of Habakuk, and comes, not at all loosely, from the Latijnsche Gedichten (Latin Poems) of Cornelius Kilianus, a Flemish translator/poet, 1607-1685. For a little more about that, see my discussion of Kilianus two weeks ago.
It might be interesting to know who posed for van der Straet. Biblical prophets were famously averse to portraits, lest the people treat them as idols. Western European artists put the faces of their patrons, friends, and others into their works representing honored (and, I suppose, dishonored) Biblical figures. So nobody knows what Habakuk looked like. Who is depicted here and why did the artist honor him by casting him as this particular prophet?
This page updated September 18, 2016
|
global_01_local_1_shard_00001926_processed.jsonl/43231
|
Direct Award
Lot 3 - HR Consultancy
You can direct award to a provider for all HR consultancy requirements. To carry out a direct award online please complete the form below.
Pricing and provider contacts are available via the adjacent buttons.
Please note that the completion of this form will be the order form for your requirements.
Direct Award Form
|
global_01_local_1_shard_00001926_processed.jsonl/43234
|
I think through times, although I am somehow of a good listener. Sometimes on important situations I’ve didn’t really listened to what people had to say. said “the bad thing about getting back together is that the emotion is not there, the magic of getting to know the other and finding all the little things about each other.” .. I have to listen..
[12:36] [scak] -> …™: lol, I’ve thought about it a lot, I just never say a thing
[12:36] [scak] -> …™: I already know you so well, and you know me so well, we were a couple once, we had an incredible good time, we had a very strong bond, we have a connection that we’ve seen through time…
[12:37] [scak] -> …™: it’s not hard to be with you, as I love you, and i know you love me, but I think we both need to heal and move on completely from our past, in order to consider dating
[12:37] [scak] -> …™: cause I don’t want to be with you, when you’re thinking of L.A, and I’m sure you don’t want to be with me, while I think of ks.
[13:57] ∫(astro)² = ½blah³: you know one sucky thing about us
[13:57] -> Pizzaman <-: waht ? [13:57] ∫(astro)² = ½blah³: that I know you so fucking well, so there won't be any rush or thrill... [13:57] ∫(astro)² = ½blah³: I read you like an open book 🙂 [13:57] -> Pizzaman <-: mmm.. [13:57] -> Pizzaman <-: i think there might be.. [13:57] -> Pizzaman <-: i'm not sure.. [13:58] -> Pizzaman <-: mmm.. i'm surely trilled everytime i see you [13:58] ∫(astro)² = ½blah³: if you get psico on me 🙂 and start being this totally new person [13:58] ∫(astro)² = ½blah³: I didn't meant that thrill [13:58] ∫(astro)² = ½blah³: I mean, things to discover, and so on [13:58] ∫(astro)² = ½blah³: I pretty much know how you think about most things in life [13:58] ∫(astro)² = ½blah³: I still get nervous when I see you :p
|
global_01_local_1_shard_00001926_processed.jsonl/43239
|
Assessing the Software Developer’s Quality Using Fuzzy Estimates
• Tatiana Afanasieva
• Vlad Moiseev
Conference paper
The software developer’s quality in the work has significant impact on the quality of a software, therefore the assessing developer’s quality is actual. The results of that assessment need to be understandable and should described developer’s quality in static and in dynamics. This article aimed on design of a methodology for obtaining these results. The proposed methodology for evaluating the quality of software developers is based on task metrics of a repository and uses fuzzy set theory for creating the linguistic estimates of developer’s quality. The stages of proposed methodology are described in application to real project, obtained results meet the requirements and show usability in software developer’s quality assessing.
Software quality Developer Fuzzy assessment
The authors acknowledge that this paper was partially supported by the Russian Foundation of Basic Research, projects № 16-07-00535 and № 16-47-730715.
1. 1.
Mockus, A.: Software support tools and experimental work. In: Basili, V., et al. (eds.): Empirical Software Engineering Issues: Critical Assessments and Future Directions. LNCS, vol. 4336, pp. 91–99. Springer, Heidelberg (2007)Google Scholar
2. 2.
Cosentino, V., Luis, J., Cabot J.: Findings from GitHub: methods, datasets and limitations. In: Proceedings of 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories, MSR 2016, 14–15 May 2016, Austin, TX, USA (2016).
3. 3.
Altinger, H., Siegl, S., Dajsurent, Y., Wotawa, F.: A novel industry grade dataset for fault prediction based on model-driven developed automotive embedded software. In: Proceedings of 12th Working Conference on Mining Software Repositories 2015, At Florence, Italy, MSR 2015 (2015).
4. 4.
McCabe, T.J.: A complexity measure. IEEE Trans. Softw. Eng. 4, 308–320 (1976)MathSciNetCrossRefGoogle Scholar
5. 5.
Halstead, M.H.: Elements of Software Science (Operating and Programming Systems Series). Elsevier Science Inc., New York (1977)zbMATHGoogle Scholar
6. 6.
Kikas, R., Dumas, M., Pfahl, D.: Using dynamic and contextual features to predict issue lifetime in GitHub projects. In: Proceedings of 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories, MSR 2016, 14–15 May 2016, Austin, TX, USA (2016).
7. 7.
Vasilescu, B., Serebrenik, A., Filkov, V.: A data set for social diversity studies of GitHub teams. In: Proceedings of 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (RSS) (2015).
8. 8.
Zadeh, L.A.: The concept of a linguistic variable and its application to approximate reasoning. Memorandum ERL-M 411 Berkeley, October 1973Google Scholar
9. 9.
Afanasieva, T., Yarushkina, N., Gyskov, G.: ACL-scale as a tool for preprocessing of many-valued contexts. In: Proceedings of Second International Workshop on Soft Computing Applications and Knowledge Discovery (SCAD 2016), Moscow, Russia, pp. 2–11, 18–22 July 2016Google Scholar
10. 10.
Afanasieva, T., Sapunkov, A.: Selection of time series forecasting model using a combination of linguistic and numerical criteria. In: Proceedings of 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT-2016), 12–14 October, Baku, Azerbaijan, pp. 341–345 (2016).
11. 11.
Afanasieva, T., Yarushkina, N., Sibirev, I.: Time series clustering using numerical and fuzzy representations. In: Proceedings of Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems (IFSA-SCIS 2017), Otsu, Shiga, Japan, 27–30 June 2017.
Copyright information
© Springer Nature Switzerland AG 2019
Authors and Affiliations
1. 1.Ulyanovsk State Technical UniversityUlyanovskRussia
Personalised recommendations
|
global_01_local_1_shard_00001926_processed.jsonl/43245
|
Rogue thought of the day….
Just an evil thought that crossed my mind….. With the recent and limited successes and growing popularity of pirates off the coast of Africa, why are they black mailing the oil companies when they steal a tanker? They should be going after the environmentalists and threatening to create natural disasters unless they are paid. We all know the tree huggers like Al Gore, Green Peace, the Sierra Club etc… have lots of money to pursue corporations endlessly. Why not go after them? Oil companies can just pump more oil, write off the losses….. something tells me the enviro-wackos would pay a little quicker!
|
global_01_local_1_shard_00001926_processed.jsonl/43252
|
Angiotensin receptor: The angiotensin receptors are a class of G protein-coupled receptors with angiotensin II as their ligands. They are important in the renin-angiotensin system: they are responsible for the signal transduction of the vasoconstricting stimulus of the main effector hormone, angiotensin II.AbitesartanLosartanTetrazoleIrbesartanImidazoleRenin: Renin, Iran}}ClemizoleAortic pressure: Central aortic blood pressure (CAP or CASP) is the blood pressure at the root of aorta. Studies have shown the importance of central aortic pressure and its implications in assessing the efficacy of antihypertensive treatment with respect to cardiovascular risk factors.Lidanserin: Lidanserin (INN; ZK-33,839) is a drug which acts as a combined 5-HT2A and α1-adrenergic receptor antagonist. It was developed as an antihypertensive agent but was never marketed.Aldosterone escape: In physiology, aldosterone escape is a term that has been used to refer to two distinct phenomena involving aldosterone that are exactly opposite each other:HypertensionKidney: The kidneys are bean-shaped organs that serve several essential regulatory roles in vertebrates. They remove excess organic molecules from the blood, and it is by this action that their best-known function is performed: the removal of waste products of metabolism.Journal of the Renin-Angiotensin-Aldosterone System: Journal of the Renin-Angiotensin-Aldosterone System is a peer-reviewed academic journal that publishes papers in the field of Peripheral Vascular Disease. The journal's editors are Graham MacGregor and Peter Sever.TerpyridineEnalaprilVascular smooth muscleConcentration effect: In the study of inhaled anesthetics, the concentration effect is the increase in the rate that the Fa(alveolar concentration)/Fi(inspired concentration) ratio rises as the alveolar concentration of that gas is increased. In simple terms, the higher the concentration of gas administered, the faster the alveolar concentration of that gas approaches the inspired concentration.TeprotideHypertensive nephropathyEnalaprilatValine N-monooxygenase: Valine N-monooxygenase (, CYP79D1, CYP79D2) is an enzyme with system name L-valine,NADPH:oxygen oxidoreductase (N-hydroxylating). This enzyme catalyses the following chemical reactionAlaceprilMature messenger RNA: Mature messenger RNA, often abbreviated as mature mRNA is a eukaryotic RNA transcript that has been spliced and processed and is ready for translation in the course of protein synthesis. Unlike the eukaryotic RNA immediately after transcription known as precursor messenger RNA, it consists exclusively of exons, with all introns removed.Propyl benzoateMyocytolysis: Myocytolysis refers to a degenerative change (often reversible) that occurs to myocytes upon myocardial strain. This phenomenon tends to occur when neighboring cardiac muscle loses its ability to contract (i.BradykininLisinoprilLow sodium diet: A low sodium diet is a diet that includes no more than 1,500 to 2,400 mg of sodium per day.Heart Failure Society of America, How to follow a low sodium dietAbsent adrenal glandTetratricopeptide: B:89-122 A:522-555 B:228-261Subfornical organ: The subfornical organ (SFO), situated on the ventral surface of the fornix (the reasoning behind the organ's name), at the interventricular foramina (foramina of Monro), is one of the circumventricular organs of the brain, meaning that it is highly vascularized and does not have a blood-brain barrier, unlike the vast majority of regions in the brain. The SFO is a sensory circumventricular organ responsive to a wide variety of hormones and neurotransmitters, as opposed to a secretory circumventricular organ.Vasopressin analogue: Vasopressin analogues are chemicals similar in function but not necessarily similar in structure to vasopressin (ADH), such as desmopressin.Muscle hypertrophyGoldblatt kidney: Goldblatt kidney is a condition of the kidney in which a constriction of the renal artery causes renal ischemia and the release of renin which would cause hypertension.Fractional sodium excretion: The fractional excretion of sodium (FENa) is the percentage of the sodium filtered by the kidney which is excreted in the urine. It is measured in terms of plasma and urine sodium, rather than by the interpretation of urinary sodium concentration alone, as urinary sodium concentrations can vary with water reabsorption.Gross pathology: Gross pathology refers to macroscopic manifestations of disease in organs, tissues, and body cavities. The term is commonly used by anatomical pathologists to refer to diagnostically useful findings made during the gross examination portion of surgical specimen processing or an autopsy.Blood vessel: The blood vessels are the part of the circulatory system that transports blood throughout the human body. There are three major types of blood vessels: the arteries, which carry the blood away from the heart; the capillaries, which enable the actual exchange of water and chemicals between the blood and the tissues; and the veins, which carry blood from the capillaries back toward the heart.Interbeat interval: Interbeat interval is a scientific term used in the study of the mammalian heart.Proximal convoluted tubule: The proximal tubule is the portion of the duct system of the nephron of the kidney which leads from Bowman's capsule to the loop of Henle.Zona glomerulosa: The zona glomerulosa of the adrenal gland is the most superficial layer of the adrenal cortex, lying directly beneath the renal capsule. Its cells are ovoid and arranged in clusters or arches (glomus is Latin for "ball").Temporal analysis of products: Temporal Analysis of Products (TAP), (TAP-2), (TAP-3) is an experimental technique for studyingRGD motifUrinary index: The urinary indices are the fractional sodium excretion (FENa) index and the renal failure index (RFI).Glutamyl aminopeptidase: Glutamyl aminopeptidase (, aminopeptidase A, aspartate aminopeptidase, angiotensinase A, glutamyl peptidase, Ca2+-activated glutamate aminopeptidase, membrane aminopeptidase II, antigen BP-1/6C3 of mouse B lymphocytes, L-aspartate aminopeptidase, angiotensinase A2) is an enzyme encoded by the gene. Glutamyl aminopeptidase has also recently been designated CD249 (cluster of differentiation 249).Calcium signaling: Calcium ions are important for cellular signalling, as once they enter the cytosol of the cytoplasm they exert allosteric regulatory effects on many enzymes and proteins. Calcium can act in signal transduction resulting from activation of ion channels or as a second messenger caused by indirect signal transduction pathways such as G protein-coupled receptors.RamiprilNephrectomyNew Zealand rabbitPodocin: Podocin is a protein component of the filtration slits of podocytes. Glomerular capillary endothelial cells, the glomerular basement membrane and the filtration slits function as the filtration barrier of the kidney glomerulus.Renal cortexAchy Breaky HeartOmapatrilatEndothelial activation: Endothelial activation is a proinflammatory and procoagulant state of the endothelial cells lining the lumen of blood vessels. It is most characterized by an increase in interactions with white blood cells (leukocytes), and it is associated with the early states of atherosclerosis and sepsis, among others.
|
global_01_local_1_shard_00001926_processed.jsonl/43277
|
Hairy tales
I once came across a barber in a remote corner of Karnataka state in India who felt the only fitting style for his rare Western clients was the British officer haircut. I emerged from his shop looking like Lawrence of Arabia, but less handsome. In Bangkok, a misunderstanding left me shorn. I asked my Thai Figaro to cut off a centimeter but he left a centimeter standing. Spiky in Siam, curly in Cairo. After my hair had grown back, an Arabian barber gave me a perm – not the real kind for which you sit under a hooded dryer, just one he whipped up with a comb and a hand-held dryer. My luxuriant mane prompted calls of “habibi” as I walked the narrow streets, but my next shower literally smoothed the waves. Head, shoulder and neck massages are part and parcel of a haircut all over the Maghreb, but the bit I don’t particularly enjoy is when the barber cracks your – neck vertebrae? – as he gives your head a short, sharp, supposedly beneficial yank from left to right.
Close shaves: Men in southern Europe and beyond go to their barber for a shave, a far more communicative practise than doing it themselves – or more meditative if you don’t want to talk. First comes the soaping up, then the blade – but you never get cut. I have had shaves all over the world, but only one barber ever nicked me with his razor. In fact, he did it every time, but I kept going back to him when I was in Tangiers. Why, I don’t know; I was probably already part of the family. Also, it was never a bad nick. Minimal misplaced pressure on the razor, a wound the size of a mosquito bite. He would repair it with something alcoholic that stung for a moment and woke you right up. Afterwards, proud as a pirate, I would survey the Straits of Gibraltar and imagine I saw dolphins prancing.
|
global_01_local_1_shard_00001926_processed.jsonl/43284
|
Grant Recipients
Our Place, DC supported women who had been in the criminal justice system by providing the resources they needed to maintain connections with the community, resettle after incarceration, and reconcile with their families. The organization helped women remain drug- and alcohol-free, obtain decent housing and jobs, gain access to education, secure resources for their children, and maintain physical and emotional health.
Our Place DC
View All Grantees
|
global_01_local_1_shard_00001926_processed.jsonl/43332
|
-Free Write OR Choose from list OR Picture Prompt
1. What is your earliest memory?
2. If you had to eat the same meal over and over again for the rest of your life, what would it be and why?
3. What is the oldest piece of clothing in your closet that you still wear?
4.What material object do you cherish most?
5. Tell about a lesson you learned recently.
6. Describe your perfect day.
7. Why do you like to write?
8. Write about the first thing that happened yesterday/
9. If you could have any two famous people for parents, who would they be and why?
10. If you were forced to spend the rest of your life in a library, museum, or a zoo, which would you choose and why?
11. What cartoon character would you most be like and why?
12. What is the worst thing about being 13 years old? (or however old you are...)
13. If you could change one thing about the world, what would you change?
14. I deserve a day off from school because...
15. Write about a day from the point of view of a teacher.
Your comment will be posted after it is approved.
Leave a Reply.
|
global_01_local_1_shard_00001926_processed.jsonl/43339
|
What Can Your Modern Language Students Do in Terms of Real-Life Communication?
As I prepare for my Spring semester, I am asking myself for each chapter in the textbook “What can the students do after learning this unit?” Unfortunately, the most common answer is to “talk about the topic” . How real world is their learning? As I think about the school chapter (classes, things in the school, parts of the classroom), I realize that the topic is one that relates to students but I wonder how often will they use these vocabulary words, phrases and questions outside of school? How important is it to daily life outside of the school in the target language country? Most modern language travel books do not even include school as a topic.
Maybe we should rethink the topics in textbooks to better prepare our students to actually be in another country. What topics are truly important for students to be in a target language country? For example, NCSSFL-ACTFL Can Do Statements include in the Novice Mid level “I can ask and understand how much something costs”. When do your student learn “how much something costs” in your curriculum? Mine occurs in the fifth or last chapter we cover. How does that match up with what students would need to know if they were in another country? Let’s move from academic modern language to real world modern language for our students!
How does your textbook match up with real world modern language use?
I have developed 5 Visual activities/games for any modern language (no words) and have developed 27 Spanish activities for students to begin to express themselves in the modern language and to move toward spontaneous speaking Teacherspayteachers: http://bit.ly/tpthtuttle
My ebook, 90 Mobile Learning Modern Language Activities, is available at http://bit.ly/90mlact.You can instantly use these many communication activities in your classroom with even beginning students when only half the class has mobile devices. It can be downloaded as a pdf.
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/43341
|
Nandi bear
The Nandi Bear, also known as Ngoloko is a cryptid, or unconfirmed animal, which is reported to live in Africa. It takes its name from the Nandi people who live in western Kenya, near the majority of Nandi Bear sightings.
Frank W. Lane wrote, "What the Abominable Snowman is to Asia, or the great Sea Serpent is to the oceans, the Nandi Bear is to Africa. It is one of the most notorious of those legendary beasts which have, so far, eluded capture and the collector's rifle."
Descriptions of the Nandi Bear are of a ferocious, powerfully built carnivore with high front shoulders (over four feet tall) and a sloping back; somewhat similar to a hyena. Some have speculated that Nandi Bears are in fact misidentified hyenas (or an unrecognized hyena subspecies).
Other than the extinct Atlas Bear, no bears are known to be native to Africa, besides those of the prehistoric genera Agriotherium and Indarctos, which died out 4.4 million years ago. Karl Shuker states that a surviving short-faced hyaena Pachycrocuta brevirostris would "explain these cases very satisfactorily." Louis Leakey suggested that Nandi Bear descriptions matched that of the extinct Chalicotherium, though chalicotheres were herbivores.
The Nandi people call it Kerit. Local legend holds that it only eats the brain of its victims. Nandi Bears were regularly reported in Kenya throughout the 19th century and early 20th century. Bernard Heuvelmans's On the Track of Unknown Animals and Karl Shuker's In Search of Prehistoric Survivors provide the most extensive chronicles of Nandi bear sightings in print.
|
global_01_local_1_shard_00001926_processed.jsonl/43349
|
Linux Privilege Escalation
Once we have a limited shell it is useful to escalate that shells privileges. This way it will be easier to hide, read and write any files, and persist between reboots.
In this chapter I am going to go over these common Linux privilege escalation techniques:
• Kernel exploits
• Programs running as root
• Installed software
• Weak/reused/plaintext passwords
• Inside service
• Suid misconfiguration
• Abusing sudo-rights
• World writable scripts invoked by root
• Bad path configuration
• Cronjobs
• Unmounted filesystems
Enumeration scripts
I have used principally three scripts that are used to enumerate a machine. They are some difference between the scripts, but they output a lot of the same. So test them all out and see which one you like best.
Here are the options:
-k Enter keyword
-e Enter export location
-t Include thorough (lengthy) tests
-r Enter report name
-h Displays this help text
Unix privesc
Run the script and save the output in a file, and then grep for warning in it.
Privilege Escalation Techniques
Kernel Exploits
By exploiting vulnerabilities in the Linux Kernel we can sometimes escalate our privileges. What we usually need to know to test if a kernel exploit works is the OS, architecture and kernel version.
Check the following:
Kernel version:
uname -a
cat /proc/version
cat /etc/issue
Search for exploits kernel version
python extended
Don’t use kernel exploits if you can avoid it. If you use it it might crash the machine or put it in an unstable state. So kernel exploits should be the last resort. Always use a simpler priv-esc if you can. They can also produce a lot of stuff in the sys.log. So if you find anything good, put it up on your list and keep searching for other ways before exploiting it.
Programs running as root
The idea here is that if specific service is running as root and you can make that service execute commands you can execute commands as root. Look for webserver, database or anything else like that. A typical example of this is mysql, example is below.
Check which processes are running
# Metasploit
# Linux
ps aux
If you find that mysql is running as root and you username and password to log in to the database you can issue the following commands:
select sys_exec('whoami');
select sys_eval('whoami');
If neither of those work you can use a User Defined Function/
User Installed Software
Has the user installed some third party software that might be vulnerable? Check it out. If you find anything google it for exploits.
# Common locations for user installed software
# Debian
dpkg -l
# CentOS, OpenSuse, Fedora, RHEL
rpm -qa (CentOS / openSUSE )
# OpenBSD, FreeBSD
Weak/reused/plaintext passwords
• Check file where webserver connect to database (config.php or similar)
• Check databases for admin passwords that might be reused
• Check weak passwords
• Check plaintext password
# Anything interesting the the mail?
./ -t -k password
Service only available from inside
It might be that case that the user is running some service that is only available from that host. You can’t connect to the service from the outside. It might be a development server, a database, or anything else. These services might be running as root, or they might have vulnerabilities in them. They might be even more vulnerable since the developer or user might be thinking «since it is only accessible for the specific user we don’t need to spend that much of security».
Check the netstat and compare it with the nmap-scan you did from the outside. Do you find more services available from the inside?
# Linux
netstat -anlp
netstat -ano
Suid and Guid Misconfiguration
When a binary with suid permission is run it is run as another user, and therefore with the other users privileges. It could be root, or just another user. If the suid-bit is set on a program that can spawn a shell or in another way be abuse we could use that to escalate our privileges.
For example, these are some programs that can be used to spawn a shell:
If these programs have suid-bit set we can use them to escalate privileges too. For more of these and how to use the see the next section about abusing sudo-rights:
Find suid and guid files
#Find SUID
find / -perm -u=s -type f 2>/dev/null
#Find GUID
find / -perm -g=s -type f 2>/dev/null
Abusing sudo-rights
If you have a limited shell that has access to some programs using sudo you might be able to escalate your privileges with. Any program that can write or overwrite can be used. For example, if you have sudo-rights to cp you can overwrite /etc/shadow or /etc/sudoers with your own malicious file.
awk 'BEGIN {system("/bin/bash")}'
Copy and overwrite /etc/shadow
sudo find / -exec bash -i \;
find / -exec /usr/bin/awk 'BEGIN {system("/bin/bash")}' ;
The text/binary-editor HT.
From less you can go into vi, and then into a shell.
sudo less /etc/shadow
You need to run more on a file that is bigger than your screen.
sudo more /home/pelle/myfile
Overwrite /etc/shadow or /etc/sudoers
sudo perl
exec "/bin/bash";
sudo python
import os
echo $'id\ncat /etc/shadow' > /tmp/.test
chmod +x /tmp/.test
Can be abused like this:
sudo vi
:set shell=/bin/bash:shell
How I got root with sudo/
World writable scripts invoked as root
If you find a script that is owned by root but is writable by anyone you can add your own malicious code in that script that will escalate your privileges when the script is run as root. It might be part of a cronjob, or otherwise automatized, or it might be run by hand by a sysadmin. You can also check scripts that are called by these scripts.
#World writable files directories
find / -writable -type d 2>/dev/null
find / -perm -222 -type d 2>/dev/null
find / -perm -o w -type d 2>/dev/null
# World executable folder
find / -perm -o x -type d 2>/dev/null
# World writable and executable folders
find / \( -perm -o w -perm -o x \) -type d 2>/dev/null
Bad path configuration
Putting . in the path
If you put a dot in your path you won’t have to write ./binary to be able to execute it. You will be able to execute any script or binary that is in the current directory.
Why do people/sysadmins do this? Because they are lazy and won’t want to write ./.
This explains it
And here
With privileges running script that are editable for other users.
Look for anything that is owned by privileged user but writable for you:
crontab -l
ls -alh /var/spool/cron
ls -al /etc/ | grep cron
ls -al /etc/cron*
cat /etc/cron*
cat /etc/at.allow
cat /etc/at.deny
cat /etc/cron.allow
cat /etc/cron.deny
cat /etc/crontab
cat /etc/anacrontab
cat /var/spool/cron/crontabs/root
Unmounted filesystems
Here we are looking for any unmounted filesystems. If we find one we mount it and start the priv-esc process over again.
mount -l
cat /etc/fstab
NFS Share
If you find that a machine has a NFS share you might be able to use that to escalate privileges. Depending on how it is configured.
# First check if the target machine has any NFS shares
showmount -e
# If it does, then mount it to you filesystem
mount /tmp/
If that succeeds then you can go to /tmp/share. There might be some interesting stuff there. But even if there isn’t you might be able to exploit it.
If you have write privileges you can create files. Test if you can create files, then check with your low-priv shell what user has created that file. If it says that it is the root-user that has created the file it is good news. Then you can create a file and set it with suid-permission from your attacking machine. And then execute it with your low privilege shell.
This code can be compiled and added to the share. Before executing it by your low-priv user make sure to set the suid-bit on it, like this:
chmod 4777 exploit
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <unistd.h>
int main()
return 0;
Steal password through a keylogger
If you have access to an account with sudo-rights but you don’t have its password you can install a keylogger to get it.
World writable directories
Watch this video!
Добавить комментарий
|
global_01_local_1_shard_00001926_processed.jsonl/43350
|
A pushup by any other name…
By Jill McVey DPT, ATC
I’m going to write a phrase and I want you to visualize a matching image.
“Girl push up.”
You thought of a knee-down push up, yes?
Have you ever used this term? I have. I used it before I really understood what I was saying. Girl push up means knees down push up. Because girls are weaker than boys. This was ingrained into me at such a young age I never even thought to question it until I was well into my adolescence.
Women do usually start from a disadvantage when training push ups. Men are genetically predisposed to higher strength development, particularly in the upper body. Women typically begin at a lower starting point in strength with respect to their upper body (whereas they typically begin at an equivalent or sometimes higher starting point in the lower body) relative to their male peers. But that doesn’t mean women cannot train their systems to perform multiple sets of standard push ups with good form.
Push ups are a difficult exercise to master. They require full body strength, with a specifically high demand on shoulder girdle and abdominal musculature. Most of the individuals I’ve worked with over the last 15 years have not been able to perform a push up correctly. They lack sufficient strength, mobility, muscle balance, or neuromuscular control and require some form of modification in order to eventually perform a push-up without pain or problem.
Calling a knee-down push up a “girl push up” not only demeans girls and women, implying that they aren’t capable of developing upper body strength, but it also insults anyone who doesn’t identify as female who needs to perform a modified push up. Most of all, it’s wrong because it equates being female with being lesser, or substandard. For this reason more than any other, you should eliminate this sexist and unproductive phrase from your vocabulary.
What we should be considering is the appropriate level and variation on the push up we use to help us meet our goals. A knee-down push up significantly reduces the leverage demand on the abdominal musculature, which might be good for a person just starting to address their musculoskeletal wellness, but progression should not end there. For example, once my patients can demonstrate good alignment and control with an unmodified plank, I quickly move them on to negative push ups, which is one of the fastest ways to build strength safely. This exercise focuses on a controlled, slow lowering phase. Since muscles output more force as they elongate slowly, negative push ups build strength rapidly, regardless of one’s sex.
You can apply this idea of a “negative” to any exercise. It can provide some variety for a well established exercise program or challenge strength in new ways. I’ve done negative push ups, pull ups, biceps curls, dips, and squats, in order to be able to perform all of those movements without need for modification. I’m a more balanced athlete and human being because I left my ego at the door when I trained, and worked hard at the level that was appropriate for me, rather than worrying that doing a modified exercise somehow made me less of a person. Not surprisingly, it allowed me to progress as quickly as my body allowed without risking injury.
You are not a lesser person if you need to perform modified exercises. Just call them what they are: modified. Let’s leave gender out of this.
|
global_01_local_1_shard_00001926_processed.jsonl/43352
|
Arion Banishta
I’m Arion Banishta (17 y/o), and I study Computer Science and Engineering at High School on my last year.
I’m a Free Libre and Open Source Software (FLOSS ) and Open Knowledge activist since 2014. The last couple of years, I’ve been working on promoting and developing Free and Open Source Software through Prishtina Hackerspace and FLOSSK – in general, promoting FLOSS in Kosovo and abroad.
Also I’m a programmer, a cyber security enthusiast, and I work with 3D Printers, Open Hardware and DIYs.
As an active community guy I’m part of some different NGOs and organizations as a Senior Member at Prishtina Hackerspace, Member for more than a year at FLOSSK, Member at PEN, Mozillian at Mozilla and I’m passionately developing Mozilla Community Kosovo.
I’m one of the organizers of Software Freedom Kosova 16 the biggest annual FLOSS Conference in Balkans and other related (FLOSS tech) activities that happened since 2009 in Kosovo including Richard Stallman’s lecture in Prishtina.
3d printing, bash scripting, computer architecture, computer network, cyber security, diy, finances, html and css, linux, open source promotion, programming + coding, programming basics: java, programming., project development + documentation, project management, python, robotics, wordpress
• Elio Qoshi
Arion is an active member of the Prishtina Hackerspace / FLOSSK involved with open hardware and connected devices. He is a young contributor who got involved in the Mozilla Activity Day in Prishtina, Kosovo on 27th March 2016
Back to top
|
global_01_local_1_shard_00001926_processed.jsonl/43358
|
Install Google Web Fonts on your Computer
Install Google Web Fonts on your Computer
google fonts
These fonts not only look more beautiful than the common typefaces like Arial and Verdana but they are more readable as well since the fonts have been designed specifically for the web. Also, all Google web fonts are offered under the Open Font License meaning you may use them even in commercial projects without having to worry about licensing issues.
Google Fonts are hosted on and all you need to do is include a few lines of CSS (or JavaScript) to embed one or more of these fonts in your web pages.
Use Google Fonts on your Computer
Other than websites, you may also use Google fonts in your Office documents, Photoshop designs or any other computer program.
There’s no trick involved here. Because all Google fonts are open source, you are free to download and install them on to your local computer. Once the fonts are installed, you may use them in documents just like any other standard font.
Google Fonts in Microsoft Office
How to Download Google Fonts?
There are two ways to download Google Fonts to your computer.
If you would like to have a copy of all the Google fonts locally, simply go to googlecode.comand download the entire fonts directory using leeching tools like HTTrack or Wget. The entire collection weighs around 700 MB and may therefore take a while to download depending on your Internet connection.
The other recommended approach is selective download. Open the Google Fonts directory, pick your favorite typefaces (or fonts) and add them to a collection. Once you have collected the desired fonts, click the “Download your Collection” link at the top and you’ll get a zip file containing all the requested fonts in TTF format. Here’s a quick demo:
Just unzip the collection and drag the individual TTF files to your fonts folder. Now you can use the fonts in Office or any other application on your computer.
A word of caution though. If you create a presentation with Google Fonts and send it to someone else, they may not have the same fonts installed on their computer and thus the presentation will look very different from the original.
Google Fonts are open source so you can either attach a copy of the fonts with the presentation itself or better still, simply embed the fonts in the document before sending one.
Muhsin V Muhammed
NIT Calicut
|
global_01_local_1_shard_00001926_processed.jsonl/43382
|
Mikey (neomikey) wrote,
Done and done
Well...tonight was the last night. It's finally done. Over and gone...gone. So, for the second...or is it third...time, I'm recording in my journal the end of a job. And for the first time ever...it really meant something to me when I left. I was a little surprised that there wasn't a card for me, wishing me well, nor any celebration, or anything like that. Hah, it seems like for just about everyone else, they've always been lauded with little things like that...and even the girl who gave everyone presents for their birthday got me nothing and didn't commemorate my last day either. Heh...well I don't mind being not special ;) What really mattered to me was how many people looked sad when they talked to me and said that they would miss me...and that was what affected me. I'll miss being a delivery person at Pizza Hut....
I got to sleep in today...well...at least I would have, but the fan was left on high, and I woke up with legs like blocks of ice, eesh...! I chilled around, microwaved myself dinner from last night for lunch, and before I left for work, Dad came home. So I asked him.
"Daaaad...? Could I borrow...your car? It's a short shift, and I'll take care of it...!"
I think I've said it before on here, but here's what it is. I came back home from the apartment in time for my dad to have something of a mid-life crisis. So when I drove into work today, I was escorted by a shiny black Cadillac CTS with chrome spinner rims...and wearing a Pizza Hut flag. Now how many out there want your delivery driver to come to your house in one of those, huh? :D
And now I'm faced with unemployment. Come January, I'll hopefully be starting up college over at Purdue Calumet...though for what, I'm still clueless. In the meanwhile, a guy from work named Nick, a.k.a. "Twisted Angel" was wondering if I could help him put some music videos together for him and his rap group. Like...actually filming one...putting it together, stuff like that. He'll pay me...and it'll give me something to put in my video "portfolio"...though I do admit to you all I feel a little uneasy about it. He likes stuff like Insane Clown Posse and once told me he wanted to make a video so bad they couldn't show it on tv. ...thankfully, though...he understands that I'm adverse to such things -_-;
I was hoping to possibly get into paralegal work. A week or so ago, I ran into my old Christian friend Ashley Arreola's dad on a delivery. He heard about me going unemployed, so he told me about what he does for a living, and gave me a DVD to watch about it. Well...being I'll be home...if I can make a profit from here, I'll go for it! ...and y'know...Ashley was partially the reason I got saved and became a born-again Christian in the first place...and here her family is, stepping in just right when I need it once more. God works in awesome ways, eh? :)
I met a guy at work named John who just started up there. It turns out he's big into anime too. ...of course, I found out about him right as I'm leaving my job...but hey, he has my number, so who knows, I could maybe have a new friend. I made an unexpected friendship with a lady-turned-manager by the name of Lynette. She loved the Shippo plushie hanging from my rearview mirror...and from that, I accidentally got her and her kids into anime and Inuyasha. Whoops.... ^_^; Also, there was another manager there by the name of Nikki who was pretty cool with me...and I don't know if maybe I'm misperceiving things or thinking too highly of myself...but I sometimes got the feeling that she had...well, feelings for me. Dunno. Then there was another girl by the name of Jessica, who I actually worked with before over at Wendy's! ...and then she comes here to work with me again! Agh!! XD
Well, I'll have all this free time now...and don't think this means party time, because a lot of it'll be here at home. I'll still be doing stuff...but I'll also have more free time. Boo-yah. ;) I think I could take a break for a little bit before I get started up with paralegal work. I imagine I could do okay with that...just need a little training from those people beforehand.
When I was going on my first delivery, I left the radio alone so it was still playing Dad's radio station, 97.1, WDRV, "The Drive." And a man by the name of Steppenwolf told me a tale.
"I like to dream, yes...yes, right between my sound machine. On a cloud of sound I drift in the night. Any place it goes is right. Goes far, flies near, to the stars, away from here. Well, you don't know what we can find. Why don't you come with me little girl on a magic carpet ride? You don't know what we can see. Why don't you tell your dreams to me, fantasy will set you free. Close your eyes, girl, look inside, girl, let the sound take you away.
"Last night I held Aladdin's lamp, and so I wished that I could stay. Before the thing could answer me, well, someone came and took the lamp away. I looked around, a lousy candle's all I found. Well, you don't know what we can find. Why don't you come with me, little girl, on a magic carpet ride? Well, you don't know what we can see. Why don't you tell your dreams to me, fantasy will set you free. Close your eyes, girl, look inside, girl, let the sound take you away."
• Post a new comment
default userpic
You must follow the Privacy Policy and Google Terms of use.
• 1 comment
|
global_01_local_1_shard_00001926_processed.jsonl/43403
|
HMD postpones Nokia India event from 6th to 10th December
A few days ago HMD Global invited Indian press to a Nokia event scheduled for 6th December – just a day after the global Nokia event in Dubai. Today, reports from the press in India claim that the event was postponed.
Precisely, FoneArena reports that Nokia event in India was moved from 6th to 10th of December. The published invitations contains the hashtag #ExpectMore, same as the Dubai event, so we can assume that the event in India is a local invent where the domestic press will get a chance to play with the device(s) announced in Dubai.
A bit surprising, Nokia 7.1 was also announced for India. The device will go on sale on 7th December for 19,999INR or 250 euro via Nokia’s own webshop and other retailers as well, which means that the 10th December event can’t be (just) about the 7.1.
|
global_01_local_1_shard_00001926_processed.jsonl/43415
|
Home > Political, Review > The Great Deceiver
The Great Deceiver
The hand is quicker than the eye…
Imagine for a moment playing the shell game against a master. You put down your $20 bill.
He places three shells on the table, upside down. He slides a bean under one shell. You mentally mark the shell. You focus your eyes on it intently and wait.
Then he starts moving, shuffling the shells right and left with both hands. His hands move quickly, adroitly. Left over right. Right over left. Your eyes try to follow the shell with the bean, but one hand blocks your view and you lose track of it for a moment.
Pick out the right one! Quick! Lock on again!
You focus, track, lose the shell, and refocus over and over again. Then he stops. You point to the shell with the bean under it. The master turns it over and – it’s empty! He smiles, takes your money and you walk away confounded.
That, my friends, is the game the Great Deceiver, Barack Obama, is playing with us. How so? It’s actually quite simple. It goes like this:
• He does something illegal (Orders Fast and Furious, for example.)
• Just as people begin to learn about it, lock on, or investigate, the Great Deceiver distracts your attention with something else – likely an even more outrageous act – before the investigation gains traction and causes him harm. If the pressure from the initial investigation is too uncomfortable, he might choose to do something publicly for immediate impact and distraction. In the meantime he will of course consistently deny, explain away, and shift blame…
• Immediately your attention is now riveted on this new second outrageous event. Momentarily you lose track of the first issue, the investigation stalls, and the pressure is relieved. Because the second event is more pressing and perhaps more outrageous than the first, you begin to shift your attention and resources to the second event – and virtually forget about the first as it disappears from the rear-view mirror.
• If the pressure on the second event gets too much, the Great Deceiver distracts you with a third, yet more outrageous act – and the cycle is repeated. You shift focus to event #3, letting #2 languish. By this time event #1 is virtually forgotten or immaterial as you are consumed by the heat of the moment with event #3. Diversion successful…
This “game” will continue indefinitely with the Great Deceiver’s actions becoming ever more outrageous and frequent. His moves come ever more often; they exceed your resources to react. You are doomed to “lose” until you call his bluff and force a stop to the game.
Consider for a moment the recently manufactured crisis with the military not paying death benefits to our soldiers who died in Afghanistan. It distracted us from investigating the Park Service shutdowns.
• Just prior to that we had the Park Service shutting down national parks and private businesses to distract from Obamacare’s failures.
• Obamacare’s failures distracted us from pursuing the IRS’s illegal activities with respect to the Tea Party
• The IRS’s illegal activities distracted us from fully investigating the Benghazi cover-up
• Benghazi distracted us from Fast and Furious
• Fast and Furious distracted us from Obama’s economic failures such as Solyndra.
All manufactured crises expertly timed to distract and keep the game going. Each one perfectly timed to relieve pressure just as an investigation was gaining ground. Actually the illustration above provides just a small sampling. What will come next, I wonder?
What can we do? What can we do? There is only one solution: Stop the game. Call The Great Deceiver’s bluff and prevent another crisis. Begin impeachment proceedings and put him on the defensive. Then he will finally feel the pressure and be too busy defending himself to manufacture yet another crisis.
Is there sufficient cause for impeachment? I suspected so before reading the book Impeachable Offenses by Aaron Klein and Brenda Elliott. Now I know for sure. The book confirmed my suspicions by documenting a whole host of impeachable offenses in great detail. The index alone, which is merely a list of all source documents, exceeds 30 pages! A very thorough piece of journalistic research indeed. Others concur. A constitutional attorney has actually drafted articles of impeachment.
Does the Republican leadership have the courage to act? I doubt it. So I expect the game will continue indefinitely…
All is not as it looks!
1. No comments yet.
1. No trackbacks yet.
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/43426
|
Perdita Felicien is a two-time Olympian, having competed in the 100m hurdles at Sydney 2000 and Athens 2004.
A 10-time national champion in the 100m hurdles, Felicien also had several notable accomplishments internationally. She won gold at the 2003 IAAF World Championships, becoming the first Canadian female athlete to ever reach the podium at the IAAF Worlds. She would add a silver medal at the 2007 IAAF World Championships. In 2004, Felicien won the World Indoor title in the 60m hurdles. She would take silver in that event at the 2010 World Indoor Championships.
Felicien set the Canadian record in the 100m hurdles in June 2004, running 12.46 seconds in Eugene, Oregon. A favourite to win Olympic gold at Athens 2004, Felicien clipped the first hurdle in the final and did not finish. She was then unable to compete at Beijing 2008 due to a left foot injury.
|
global_01_local_1_shard_00001926_processed.jsonl/43461
|
Top Menu
What You Need to Know About Metes and Bounds Surveys
Professional development hours
When using a metes and bounds survey, it might be difficult to find a parcel’s borders.
Metes and bounds is a method of surveying land that is centuries old. It was the principle way to measure land before the Land Act of 1785, so much of the land in the original 13 colonies was measured this way, as well as in Kentucky, Tennessee, West Virginia, and Texas.
Before technology, or even before sophisticated measuring instruments, land surveying was fairly imprecise. The plots could be large, often encompassing many acres of farmland or heavily forested areas. Parcels were often defined by formations such as rivers, trees, roads, or other landmarks. Of course, trees eventually die, rivers can erode land, and roads can be moved.
Worse, when no obvious marker or indicator was present, a pole or stake may have been driven into the ground to mark the boundary. These can fall over on their own, or malicious neighbors can intentionally move them.
According to, compasses, which are not always a 100 percent reliable indicator of direction, were often used in these surveys as well. Land was described as starting at a certain point and continuing in a line based on the compass needle.
Thus, considering the impreciseness of these tools and descriptions, numerous lawsuits have been filed over the years disputing the borders in states that used metes and bounds.
What, Specifically, Are Metes and Bounds?
Metes are distances between two points measured with straight lines, regardless of what is in between them. Bounds are less specific. They may appear in a description as a building, rock, or other nonpermanent marker.
When using this method to survey land, the description directs the surveyor to start at a certain point. This may be at an intersection of roads, a particular point on a stream or something even more nebulous. From this point, the surveyor follows the compass needle for a specified number of feet, until reaching another point, be it a physical marker, tree, or rock.
Improvements to Metes and Bounds says that now, photographs often accompany these loosely measured parcels in order to more definitely define the borders. Even images using technology as simple as MapQuest can help to more precisely mark a parcel of land that would otherwise be defined by measuring tools and compasses.
View of a land map.
Photographs and maps can help identify the boundaries described in a metes and bounds survey.
If you must survey a plot of land that originally used metes and bounds, it is best to try to follow the directions included in the original survey. If all the markers are still present, you can use modern technology to improve the survey and make it more precise.
However, the less precise the original survey, or in cases in which the markers are no longer present, surveying the property can be difficult.
Court Case mentions a case in which a piece of property was poorly described by a surveyor using terms such as “more or less.” The property was surveyed three times over a period of years and each survey yielded markedly different boundaries. A lawsuit was filed.
In the end, the jury sided with a surveyor who said that although the original survey had unclear borders, it described a set number of acres and that this should be the determining factor in establishing borders.
Professional Development Hours for Land Surveyors
Not every metes and bounds survey ends in a lawsuit, but it’s easy to see how some do. With these types of surveys, you can only make the most accurate determination from the information you have and the tools you have to work with.
PDH Academy courses on topics such as Specifications for Descriptions of Land can help you fulfill your professional development hours. Check out our PDH approved courses today.
Comments are closed.
|
global_01_local_1_shard_00001926_processed.jsonl/43478
|
Quantum Computing, 2
stcredzero 3 months ago
A note for the savvy: A quantum computer is not a magic bit-string that mysteriously flips to the correct answer. A n-qubit quantum computer is not like 2^n phantom computers running at the same time in some quantum superposition phantom-zone. That’s the popular misconception, but it’s effectively ignorant techno-woo.
Here’s what really happens. If you have a string of n-qubits, when you measure them, they might end up randomly in [one] of the 2^n possible configurations. However, if you apply some operations to your string of n-qubits using quantum gates, you can usefully bias their wave equations, such that the probabilities of certain configurations are much more likely to appear. (You can’t have too many of these operations, however, as that runs the risk of decoherence.) Hopefully, you can do this in such a way, that the biased configurations are the answer to a problem you want to solve.
So then, if you have a quantum computer in such a setup, you can run it a bunch of times, and if everything goes well after enough iterations, you will be able to notice a bias towards certain configurations of the string of bits. If you can do this often enough to get statistical significance, then you can be pretty confident you’ve found your answers.
— An Argument Against Quantum Computers
— Hacker News
2018.05.17 Thursday ACHK
|
global_01_local_1_shard_00001926_processed.jsonl/43489
|
Re-Painting Our Slate
Constant metamorphosis
Cannot undo past realities.
Heritage and origin
Remain set once cast.
Growth and empowerment
Are forever before us,
But we cannot transform
Without carrying the past.
Remembered or forgotten,
Experiences create shape
Beyond any given moment
For us to configure.
Wishing and wanting
Provide no escape.
The harshest influences
Of our history still linger.
Desiring to overcome
And create something better
Requires and embrace
With the ghosts of our affliction.
Such bitter tastes
Often burn as they’re swallowed,
But sorrow’s recompense
Is the price of our ambitions.
Oceans cascade
From unfathomable heights
Into the vast sculptured crevices
Of the planet’s bosom.
Numerous energies
Transmutated by tempest
Thrashed and torn asunder
Into pools of perfect chaos.
Writhing molecules
Repeatedly rearranged
In unprecedented forms
Of which many are miscarried.
Fortune’s devices
Favor but a few
Particular arrangements
To persist amid such tumultuousness.
Fluctuating forces
Pound vitality into matter,
Precipitating its progress
In discordant detumescence.
Patterns emerge
Inevitably in chance variables
Until at long last
A seedling erupts.
Implanted erection
Upon a rugged stone surface
Surfacing into the light
And its first growing pains.
Searing agony,
The flower’s contorted face
Gazing towards the sky
And screaming
“I’m Alive!”
It Feels Time To Die
When time passes and slips by so fast,
When I contemplate all that I’ve missed or forsaken,
It pains me to acknowledge my own mistaken steps,
To realize my fault in those moments taken.
To have aged to such a point missing out,
To have lost so many loves I should’ve cherished,
To be floating, numbing myself to indifference,
To have drifted past chances and watched them perish.
Will wisdom prove the worth of my decisions?
Have I lost too much to ever fully recover?
Do empathy and arrogance measure so equally?
Will hiding myself lead anyone to discover?
Choices, to decide what to do, what to be, who I am.
To be, my identity, with vulnerability and shame.
To understand, hidden weaknesses will never leave you.
Emotions leave you empty and cold when restrained.
Too many lost chances, too many disappointments.
Too long living sheltered, pretending to be free.
It feels time to die and murder insecurity.
To live again, opening as wide as I can be.
|
global_01_local_1_shard_00001926_processed.jsonl/43498
|
Increased file size for website news
The OMS Marketing & Content module has an external news section which provides functionality to load news for your website.
Included is an image upload and document upload manager. The document upload manager can be used to upload files (pdf, txt etc) that is included as a hyperlink for visitors to download.
We have increased the maximum file sizes for the document manager as follows:
- 5MB files for offices.
- 10MB files for national websites.
To upload a document first enter the text for the download e.g. ‘download file’. Highlight the text and click on the document manager and select a file (or upload a new one).
Popular posts from this blog
OMS API update version 1.11 - Get contacts company enhancement
New partner portal, Property Matcher
|
global_01_local_1_shard_00001926_processed.jsonl/43512
|
The py-jsonapi extension for flask. Binding the API to a flask application is dead simple:
import flask
import jsonapi
import jsonapi.flask
app = flask.Flask(__name__)
api = jsonapi.flask.FlaskAPI("/api", db=..., flask_app=app)
# You can also initialize the API with the flask application using the
# *init_app()* method:
You can add the models to the API as usual. They will be available under /api.
You can access the current APi via the extensions dictionary of the flask application:
or you use the global variable current_api:
from jsonapi.flask import current_api
The API instance is also added to the jinja environment:
You can download your profile
<a href="{{ jsonapi.reverse_url('User', 'resource', id=current_user.id) }}">
class jsonapi.flask.FlaskAPI(uri, db, settings=None, flask_app=None)[source]
Bases: jsonapi.base.api.API
Implements the API for flask. You can provide the flask application later via init_app().
This is a proxy for the flask_app debug attribute. This means, that you must enable the debug mode on the flask application.
The flask application, this API is registered on.
Registers this API on the flask application app.
Parameters:app (flask.Flask) –
Handles a request to the API.
jsonapi.flask.current_api = <LocalProxy unbound>
Acts as a proxy for a werkzeug local. Forwards all operations to a proxied object. The only operations not supported for forwarding are right handed operands and any kind of assignment.
Example usage:
from werkzeug.local import Local
l = Local()
# these are proxies
request = l('request')
user = l('user')
from werkzeug.local import LocalStack
_response_local = LocalStack()
# this is a proxy
response = _response_local()
Whenever something is bound to l.user / l.request the proxy objects will forward all operations. If no object is bound a RuntimeError will be raised.
To create proxies to Local or LocalStack objects, call the object as shown above. If you want to have a proxy to an object looked up by a function, you can (as of Werkzeug 0.6.1) pass a function to the LocalProxy constructor:
session = LocalProxy(lambda: get_current_request().session)
Changed in version 0.6.1: The class can be instantiated with a callable as well now.
|
global_01_local_1_shard_00001926_processed.jsonl/43513
|
Skip to main content
A package for sending SMS messages using the PSWinCom LINK SMS Gateway.
Project description
.. image::
.. image::
PSWinCom GW2 / LINK SMS Gateway Python Package
A Python_ interface to the `PSWinCom XML SMS Gateway`_ now also called the `LINK SMS Gateway`_. Link Mobility bought PSWinCom 31 December 2014.
The official pswinpy_ package has no activity in the last 5 years and only supports a small subset of the api. In January 2016 the default endpoints in the official package are no longer valid. This was the main motivation for creating this library.
This module sends data as XML over HTTPS.
pip install pswingw2
Basic Usage
To use this package, you will need sign up for a Gateway account with PSWinCom. Demo account are available.
This piece of code demonstrates how to send a simple SMS message::
import pswingw2 as sms
config = sms.config("username", "password")
sms.send_simple_message(config, msg_to="4700000000", msg_from="My Company", text="Hello World")
More complex messages can also be sent::
sms.send(config, data)
sms.send_single(config, message)
sms.send_batch(config, message_list)
Send calls also returns a message status structure that can be inspected. Docs needed.
Messages can also be sent using a client class::
client = sms.Client(config)
Console Support
Installing this module also adds a console command for sending messages::
pswinsms -u username -p password -to 4700000000 -from "My Company" This is a test message
Receiver, sender and message text are mandatory properties when sending a message. Supported properties can be found in the online
documention under `Element valid for a Submit SMS request`_.
Config Object
You configure the library by defining a config object that are passed with send calls.
The following attributes must be defined and the config object must be able to obtain them by name using
the get(name) method. This can be a module, dict or class (or whatever structure is suitable for you)::
ENDPOINTS = ['', '']
USERNAME = 'myusername'
PASSWORD = 'mypassword'
The ``pswingw2.config_defaults`` module have some useful examples.
.. _Python:
.. _`Online Documentation`:
.. _`PSWinCom XML SMS Gateway`:
.. _pswinpy:
.. _`LINK SMS Gateway`:
.. _`Element valid for a Submit SMS request`:
Project details
Download files
pswingw2-0.2.1.tar.gz (6.9 kB) Copy SHA256 hash SHA256 Source None
Supported by
|
global_01_local_1_shard_00001926_processed.jsonl/43532
|
How long should you grill bratwurst?
How you grill a bratwurst has much to do with whether it’s fresh or precooked. To prepare a precooked bratwurst, all you need to do is heat it up and serve. In contrast, you’ll have to follow a specific set of instructions if you plan to grill up a fresh bratwurst. For one thing, it’s recommended that you separate fresh bratwurst from cooked food. It’s also a good idea to cook it so it reaches a temperature of 160 degrees Fahrenheit (71.1 degrees Celsius).
It’s possible to cook up a bratwurst entirely by grilling; however, doing so will cause the outside of the beef to burn before the meat is cooked through. As such, it’s easier to cook fresh or raw bratwurst by first braising or poaching it in a flavorful liquid like beer. The next step will be to allow the bratwurst to turn brown while on the grill.
Before you get to grilling, you’ll want to fire up your barbecue grill. Next, pour a can of beer into a pot or pan that has an ovenproof handle. Once you’ve done this, put the saucepan on the preheated grill. Pierce the beef in several spots with a sharp knife and place the meat into the beer-filled pan on the grill. Next, allow the beef to simmer on an uncovered grill for approximately 15 minutes over medium coals or medium heat on a gas grill. It’s important to turn the bratwurst over once during this period. After 15 minutes or so, remove the bratwurst from the saucepan. The final thing to do is to grill the bratwurst directly over the grill’s heat until it has turned brown and is cooked through, which usually takes about 10 minutes. You should turn the bratwurst approximately halfway into the grilling time.
More to Explore
|
global_01_local_1_shard_00001926_processed.jsonl/43558
|
Top Rated Maryland Attorneys
hero arrow
Maryland Traumatic Brain Injury Attorney
Have you suffered a brain injury (TBI) in an accident? Speak with our brain injury lawyers today to find out if you have a claim for your injuries.
Some accident injuries affect individuals for a short while. Broken bones, road rashes, and muscle tears often heal over time. Traumatic brain injuries (or TBIs for short), on the other hand, can affect accident victims permanently.
What is a TBI?
The definition of a TBI, according to the Brain Injury Association of America is “An alteration in brain function, or other evidence of brain pathology, caused by an external force.” They can change someone’s cognitive abilities, personality, and physical capabilities forever.
TBI’s are a serious concern after an accident, and could potentially result in high medical bills, not to mention pain & suffering. That’s why if you suspect that your injuries were due to someone else’s negligence, you should contact an experienced Baltimore personal injury attorney to help you secure compensation.
TBI Attorney in MD
The Impact of Traumatic Brain Injuries on Daily Life
After a TBI, an individual and his or her family may experience several consequences in addition to cognitive and physical changes. A TBI can lead to short and long-term effects, including:
Types of Traumatic Brain Injuries
The brain is at the center of what makes you you. It controls everything from balance and motor function to personality and thought processing. Types of TBIs can affect different parts of the brain, making symptoms difficult to identify and interpret. Two people who endure serious concussions in the same type of accident could experience completely different outcomes. Common types of TBIs include:
1. Concussions. These injuries range from mild to severe and occur when the brain moves very quickly inside the skull (usually from blunt force trauma).
2. Contusions. A contusion (bruise) on the brain means the brain is bleeding. Minor brain bleeds may resolve on their own, but serious contusions often require surgical interference.
3. Diffuse Axonal Injuries. Associated with rotational and shaking incidents, this injury creates movement in the skull, but the brain lags behind. As a result, nerve tissue within the brain may tear and interrupt signaling pathways and chemical releases.
Other types of TBIs occur when the brain experiences physical piercing with an object or if an individual loses oxygen for a prolonged period of time. Each type of broad injury classification results in specific and personal symptoms and injury outcomes.
Common Causes of Traumatic Brain Injury
Causes of TBIs vary as much as the symptoms of each injury. You may not associate serious brain damage with a minor rear ending accident or a fall in a store, but many accidents can produce injurious results. Some of the most common causes of TBIs include:
If someone else’s negligence or intentional actions caused a serious brain injury, you have the right to pursue action against those responsible. The Law Offices of Randolph Rice specialize in serving those who experience TBIs at the hands of reckless and malicious individuals.
Find an Experienced Baltimore Head Injury Attorney
We encourage all TBI victims and/or their families to reach out for a free case evaluation. Filing a lawsuit will not undo a TBI, but it can help you and your loved ones cope with the long-term effects of a serious diagnosis and provide a sense of justice after a preventable incident.
For more information about what makes our dedication and case approach different, contact our Baltimore Brain Injury Lawyer team at The Law Offices of Randolph Rice in Baltimore or Lutherville, MD today! 410.288.2900
|
global_01_local_1_shard_00001926_processed.jsonl/43569
|
Explicit Formal Cooperation in Direct Abortion by Catholic Theologians
A Quick Review of Cooperation
Another person commits a sin. You are considering committing a different but related act. Under what conditions will your act be a sin due to its relationship to the act of the other person? This question is answered by the moral teachings of the Magisterium under the principles of cooperation with evil.
Pope John Paul II succinctly summarizes the three types of cooperation with evil: explicit, formal, and material.
Pope John Paul II: “Such cooperation occurs when an action, either by its very nature or by the form it takes in a concrete situation, can be defined as a direct participation in an act against innocent human life or a sharing in the immoral intention of the person committing it.” (Evangelium Vitae, n. 74.)
When an act cooperates with the sin of another person by the “very nature” of the act, the cooperation is formal and is always immoral. When an act is sinful ‘by its very nature’ such an act is intrinsically evil and always immoral. Formal cooperation with an intrinsically evil act is itself intrinsically evil because formal cooperation assist the act of the other person in attaining its evil moral object. In other words, the very nature of your act assists the very nature of the other person’s act, and their act is intrinsically evil. The Magisterium teaches that formal cooperation is never morally licit.
Pope John Paul II: “Christians, like all people of good will, are called upon under grave obligation of conscience not to cooperate formally in practices which, even if permitted by civil legislation, are contrary to God’s law. Indeed, from the moral standpoint, it is never licit to cooperate formally in evil.” (Evangelium Vitae, n. 74.)
When an act cooperates with the sin of another person in “the form it takes in the concrete situation”, i.e. in the circumstances of the act, then your act is material cooperation. In this case, you are not assisting an intrinsically evil act in attaining its moral object, but rather are assisting in the circumstances related, in some degree, to the sin. Material cooperation is sometimes moral and sometimes immoral. According to the three fonts of morality, material cooperation is in the third font of circumstances and so its morality depends on the moral weight of all the good and bad consequences of the act.
When either formal or material cooperation occurs along with your intention to cooperation with whatever is sinful in the other person’s act, then the cooperation is also explicit. If your cooperation lacks any intention to assist in the other person’s sin, then your cooperation is implicit. Explicit cooperation, whether formal or material, is always immoral. It is never moral to intend to do evil, nor to intend to assist another person in doing evil.
Cooperation with Direct Abortion
The eternal moral law concerns objective truths about good and evil. The Magisterium infallibly teaches that direct abortion is intrinsically evil and always gravely immoral. No one can justify direct abortion, nor formal cooperation with direct abortion, by presenting the matter as an open theological question, or as an unresolved moral issue, or as a matter of prudential judgment. Acts that are intrinsically evil are always immoral, regardless of intention or circumstances. And so no judgment of the prudential order is needed to evaluate the particular circumstances.
Neither is there any freedom of conscience when an act is determined to be intrinsically evil. For every good conscience must be formed in the light of truth. True freedom of conscience is to know and adhere to the moral truths taught by Jesus Christ in Tradition, Scripture, Magisterium.
However, some theologians today have presented various creative interpretations of intrinsic evil and the moral object, such that an intrinsically evil act of direct abortion becomes indirect and moral, in certain circumstances, with certain intentions. They put forward these claims in the public sphere, and they know that their words are in fact used to justify actual direct abortions. And yet they continue to adhere to the same position, publicly proclaiming that direct abortion is moral.
This type of action by certain theologians is formal cooperation with direct abortion. Formal cooperation includes acts that promote, encourage, or approve of an intrinsically evil act by another person. And this is exactly what some theologians are doing.
They publicly promote a version of ethics that justifies direct abortion. They know that a particular type of abortion is intrinsically evil direct abortion according to magisterial teaching. They even know of particular cases, such as the Phoenix abortion case, in which a Bishop took strong action because an abortion was direct. And yet they continue to publicly assert new ethical principles (such as virtue ethics) and various creative ways of re-defining intrinsic evil (such as the claim that moral object results from intention and circumstances).
They treat even the basic principles of ethics taught by Veritatis Splendor, the Catechism of the Catholic Church and other magisterial documents, as if these were entirely open questions. They treat the infallible condemnation of abortion in Evangelium Vitae as if it were unclear and subject to greatly varying interpretations. And they realize that their words are used to justify actual cases of direct abortion.
Gallery | This entry was posted in ethics, theology of the body. Bookmark the permalink.
|
global_01_local_1_shard_00001926_processed.jsonl/43596
|
Pollination and Cross-Pollination: All You Have to Know as a Gardener
Pollination is a central demonstration our plants rely on for their prosperity. Without it, our sustenance supply would be stuck in an unfortunate situation. Be that as it may, only one out of every odd pollination is gainful for your garden. There is a sort of pollination (cross-pollination) you need to stay away from, and for a few plants, you don’t need them to fertilize by any stretch of the imagination.
As a cultivator, it’s imperative to recognize what pollination is on account of it is essential to a flourishing greenhouse and to have the capacity to spare seeds. So today we’ll talk about both the terms pollination and cross-pollination.
What is pollination?
Any plant you develop in your garden which delivers an organic product requires pollination.
Along those same lines, each plant which requires pollination has either a female or a male part. A few plants have both or deliver both; however, we’ll talk about this point somewhat later. The male sex organ of a plant is known as a stamen, and the female sex organ of a plant is known as a shame.
At the point when pollination happens, dust from the male sex organ exchanges to the female sex organ. It can happen by means of bugs, wind, or a plant can act naturally pollinating.
How does pollination function?
There are diverse ways pollination can happen. Contingent upon what sort of plant is pollinated, the procedure will shift. Here are the means by which they each work:
Normal Pollination
Run of the mill pollination happens when one plant offers dust to another plant. One of the plants must have the male plant sex organ known as the stamen. The other plant must have the female sex organ known as the disgrace.
At the point when the breeze blows or a creepy crawly gathers dust from the male plant, it enables the dust to exchange to the female plant.
Acknowledge when the breeze blows, dust is scattered noticeable all around. This enables the dust to arrive inside the female blossom.
In any case, when a honey bee arrives inside a bloom, it will get dust on it. At the point when the honey bee arrives on the following blossom, the dust gathered from the past bloom will tumble off into the new bloom. On the off chance that the blossom is female, pollination has happened.
A few plants fertilize in an unexpected way. There are a few plants, for example, tomatoes, pumpkins, cucumbers, and squash which create both male and female blossoms on a similar plant.
For these plants to be pollinated, the breeze needs to blow, or a honey bee needs to arrive in a male blossom, and the dust needs to either be blown into the female bloom or be exchanged to the female bloom by a creepy crawly.
On the off chance that the dust has been exchanged from a male bloom to a female blossom of a similar kind, the natural product will create on the plant.
Shouldn’t something be said about the plants that don’t fertilize?
Each plant could be pollinated, yet there are a few plants you would prefer not to fertilize. For example, lettuce is a plant you would prefer not to fertilize. The reason is you need to eat lettuce before it ‘jolts.’
Shooting is the point at which the plant is preparing to make seeds. We want to eat lettuce before jolt happens. It is most regular for the dart to happen when the climate starts to warm up towards the finish of lettuce’s developing season.
Be that as it may, if the lettuce jolts, all the plant’s vitality will go into making seeds to continue with the people to come.
At the point when this happens, the leaves will wind up extreme and intense. It’s anything but an alluring flavor, which is the reason most cultivators attempt to forestall shooting and pollination in crops where you eat the plant itself.
Step by step instructions to energize pollination
Pollination depends vigorously on wind and creepy crawlies, for example, honeybees. You can’t control the breeze, yet you can do your part to attract the honey bees to your garden. Here are a couple of approaches to support pollination in your garden:
1. Plant the correct hues
Honey bees can just observe particular hues. On the off chance that you plant things in your yard loaded with hues, for example, white, blue, violet, and yellow, it will attract honey bees to them.
1. Keep away from synthetics
You should attempt to maintain a strategic distance from synthetic compounds in your garden. On the off chance that you don’t, you could murder the plain animals who are there to fertilize it for you.
In any case, in the event that you should utilize synthetic concoctions, attempt to utilize it during the evening when the honey bees have gone to bed. Along these lines, the synthetic compounds can die down a little before the honey bees are pulling out making their trip toward the beginning of the day.
1. Give pollinators a drink
Honey bees require water like all other living animals. In the event that you need to attract them to your garden, consider adding a water basin to the edge of your garden.
Keep in mind to put adjusted stones in the base of your water basin. This will give the honeybees a place to sit while drinking to shield them from suffocating.
1. Plant the correct sustenance
There are sure circumstances of the year when honey bees run low on plants which are wealthy in nectar and dust. It is an issue when they are searching for a sustenance source.
In the event that you need to attract them to your garden, consider planting dust rich foods to nourish them and pull them to your garden for pollination.
Cross-pollination is an intriguing point which causes worry among numerous plant specialists. I need to impart to you what cross-pollination is, the means by which it happens, and how to avert it:
What is cross-pollination?
Cross-pollination happens when you have a similar plant of various assortments in a garden space. At the point when the breeze blows, or a honey bee goes into the blossom of one plant assortment, and the dust of this plant advances into the bloom of another sort.
At the point when cross-pollination happens, it can make strange assortments of a natural product which aren’t what numerous planters need when sparing seeds.
The natural product created turns into another assortment of the plant since it will share attributes from both parent plants.
Cross-pollination: exposed
Numerous planters fear cross-pollination due to ghastliness stories they’ve heard. When I initially started cultivating, I was reluctant to plant my peppers and tomatoes in a similar region since I was told they would cross-fertilize and influence my tomatoes to taste terrible.
Another regular dread is cross-pollination will affect your gather for your current develop year. Neither of these is valid.
First off, cross-pollination can just happen between plant assortments. It can’t occur between plant species. For instance, in the event that I plant an Early Girl assortment of tomato and a Better Boy assortment of a tomato in a similar garden, they could possibly cross-fertilize.
Be that as it may, my peppers and tomatoes won’t cross-fertilize on the grounds that they are distinctive plants by and large, not just extraordinary plant assortments.
Likewise, when you hear individuals say, “My product was destroyed for this present year in view of cross-pollination. My gather looked interesting.”
All things considered, odds are the harvest had a sickness or another issue since cross-pollination won’t affect the natural products the present plant produces.
Rather, it will affect the seeds the plant produces. Which means, in the event that you spare the seeds of a cross-pollinated plant, your reap could appear to be unique than anticipated in light of the fact that the two parent plants weren’t of a similar assortment.
How might you anticipate cross-pollination?
In the event that you need to stay with the assortments of plants, you as of now have developed in your garden (and you anticipate sparing the seeds,) endeavor to control cross-pollination. You have a couple of various choices:
1. Fertilize by hand
On the off chance that you have a self-pollinating plant, you can shake the plant to urge the dust to wind up free and drop out, or you can utilize a delicate paintbrush to brush within a male blossom and swipe the dust on the brush into a female bloom.
On the off chance that you are uncertain how to distinguish your blooms one from the other, the female blossom has a little, undeveloped organic product behind the blossom. The male has just a long, thin stem.
Be that as it may, in the event that you are managing plants which aren’t self-pollinating, you’ll have to know how to fertilize them by hand too. You should cull a male blossom and peel the petals back to achieve the stamen. You’ll rub the stamen against the disgrace found in a female blossom.
1. Planting separation should increment
It is a smart thought to attempt to plant just a single assortment of every vegetable in your garden, which would deflect cross-pollination from happening.
Be that as it may, on the off chance that you like distinctive assortments, it is a smart thought to put at least 100 feet between any plant assortments which are pollinated by creepy crawlies or the breeze.
On the off chance that you are anticipating planting diverse assortments of self-pollinating plants, (for example, beans, peas, tomatoes, peppers, lettuce, and eggplant) you’ll have to put no less than ten feet of separation between them.
1. The special case to the lead: corn
I’ve disclosed to you how cross-pollination couldn’t affect your garden collect and you just need 100 feet of separation between various assortments of veggies in your garden.
All things considered, the greater part of this is valid aside from corn. The breeze pollinates corn. In this manner, it really is ideal to plant corn in squares since it makes it less demanding for it to be pollinated.
In any case, if corn cross-pollinates, it will affect the corn bits in the ebb and flow developing season.
Additionally, in case you will plant diverse corn assortments, you have to put no less than 150 feet between each kind of corn. This will debilitate the possibility of cross-pollination.
As a rule, the breeze can convey dust long separations. In any case, the further the separation, the more dust the breeze loses amid movement.
Because of the greater part of this, you are presently educated about pollination and cross-pollination. You additionally know how to prevent cross-pollination from happening and how to energize pollination in your garden.
Presently, I need to get notification from you. What do you do to support pollination? What do you do to debilitate cross-pollination?
We’d love to hear your contemplations. Abandon us your remarks in the comment section beneath.
Leave A Reply
Your email address will not be published.
|
global_01_local_1_shard_00001926_processed.jsonl/43597
|
Aphasia can follow any type of neuropathology capable of causing structural alterations in the language area of the brain. It is the neuroanatomical site of damage, rather than the etiology, that determines the individual symptoms of language impairment.
(1) Broca’s Aphasia
In Broca’s aphasia left hemisphere damage of the anterior part of the peri-Sylvian language zone involving the third frontal convolution (i.e., Broca’s Area) is often found. However, much controversy exists over the exact location of the lesion necessary to result in this aphasia.
For example, there is evidence that Broca’s aphasia may arise from a lesion in the lenticular zone, anterior portions of the insular cortex, precentral gyrus, or lesions in the fibers of both the corpus callosum and the left internal capsule (see Levine and Sweet, 1983, for a review). Different types of neuropathology may be involved in this aphasia. For example, a CVA in the orbitofrontal branch of the middle cerebral artery is a possible aetiology, as well as trauma such as an open- or closed-head injury resulting in damage to the specific areas described above. Likewise a tumor may also produce the aphasia by growing in the specific regions, by increasing intercranial pressure, or by disrupting blood supply. Similarly, infectious diseases can also build up cranial pressure and result in damage to the language areas. Degenerative disorders may also be involved if the atrophy extends to the language areas.
Broca’s aphasia is also known as an expressive or non-fluent aphasia, and is predominantly a motor aphasia. The manifestations of this syndrome are awkward articulation, restricted vocabulary, restriction of grammar to the simplest, most over learned forms, and abnormal prosody. However, there is relative preservation of auditory comprehension. There is also an awkwardness and distortion of phonemes including literal paraphasias. Output often contains an excess of semantically significant words with a reduction or absence of syntactical structures or affixes. Although comprehension of spoken language is better than verbal output, comprehension is rarely normal, particularly in regard to grammatically significant structures. Repetition of spoken language is also abnormal. Naming is poor but may be aided by contextual or phonetic prompting. In addition, omissions, iterations, and simplifications of syllabic clusters often occur. These types of deficits are also evident in written language and reading out loud, however, reading comprehension is not impaired.
Broca’s aphasia causes significant problems for its sufferers. Firstly, the abrupt loss of language will severely jeopardize the stability of the patients existence in areas such as work, social life, and relationships. The rich substantive output enables one with this aphasia to communicate ideas, however, in general communication will be very poor.
Secondly, some time after onset of the disorder most nonfluent aphasic patients become aware of their problems. They often know what to say but have a verbal output that is restricted and barely intelligible. The inability to explain wishes or thoughts is frustrating for the patient, and many patients with nonfluent aphasia suffer both frustration and depression. Patients often may show lack of interest and motivation and a helpless attitude and suicidal thoughts may occur (Benson & Ardilla, 1996).
The prognosis of Broca’s aphasia depends on several factors. Like most aphasias there will be an early spontaneous recovery stage. Patients often respond automatically to their language problem by developing alternate successful strategies for communication. Several neurological factors are crucial to the prognosis. Generally the greater the lesion the worse the prognosis for recovery. Patients with damage to adjacent areas to Broca’s area, especially the inferior portion of the precentral gyrus and anterior parietal region have a poorer prognosis than those in whom the areas are spared.
Broca’s aphasia tends to improve in either two ways. Firstly, in some cases sentence length and syntax improve along with normalisation of articulation, phonemic production and repetition (i.e., to extrasylvian motor aphasia and then to anomic aphasia). In other cases, sentence length and syntax recovers without improved articulation, phonemic production, and repetition (i.e., to a conduction aphasia) (Benson & Ardilla, 1996). Obviously one of the greatest factors which influences prognosis is that of etiology. Progressive disorders will result in deteriorating language functions, whereas acute-onset, static disorders (e.g., CVAs, trauma, and tumors) will have a better potential for recovery. Trauma and hematoma cases recover better than CVAs or tumors (although this may be due to age influences). Most intracerebral tumors have a poor prognosis, whereas extracerebral tumors generally have a good prognosis. These prognostic factors are evident in all types of aphasia, not just Broca’ s aphasia (Sarno, 1981).
(2) Wernicke’s Aphasia
This aphasia generally arises from damage to the posterior part of the peri-Sylvian language area, usually a lesion involving the posterior superior portion of the temporal lobe of the dominant hemisphere (i.e., Wernicke’s area). This damage may extend into the supramarginal/angular gyrus region and/or the lateral-temporal-occipital junction area.
Again there is much controversy in the literature on the exact localisation of the necessary lesion. For example in some cases the anterior prerolandic areas, temporal isthmus, anterior portion of the putamen, and even Broca’s area has been implicated (see Kertesz, 1983 for a review). Like Broca’s aphasia it is the localisation of the lesion that results in the syndrome rather than a specific etiology. However, this disorder commonly arises from left hemisphere strokes from blockages or hemorrhages of the left tempero-parietal region. Direct injury from closed head or open head wounds are possible, as well as tumors, degenerative disorders (e.g., Alzheimer’s disease), and infectious diseases, as long as the infarcts occur in the specified areas.
This syndrome manifests itself as an impairment in auditory comprehension, and fluently articulated but paraphasic speech. The impairment of comprehension can even be evident at the single word level. The paraphasia may include literal paraphasia, verbal paraphasia, and neologisms. Further symptoms include word-finding difficulties as well as severe impairments in reading and writing. Verbal output is fluent with a normal number of words per minute. Patients often augment their verbal output adding additional syllables to the ends of words, or additional words at the end of sentences. Little effort is needed for verbal output and often the output is excessive. No problems exist with articulation, or prosody, however, there is sometimes an excessive use of grammar (paragrammatism). Reading both outloud and for comprehension, as well as writing are all often disturbed. What characterizes Wernicke’s aphasia is that the verbal output is often deficient in meaning and is often termed “empty speech”.
Patients with Wernicke’s aphasia or a nonfluent aphasia often have different problems compared to those with a nonfluent aphasia. They not only have difficulties in comprehending spoken language but also often remain unaware of their comprehension problem. This produces a true anosognosia. Many patients cannot monitor their own verbal outputs and therefore fail to realise their output is incomprehensible. Patients also tend to blame their communication difficulties on others, complaining that the person they are talking to is not speaking clearly. Patients also have difficulties in doing simple everyday activities such as reading the newspaper and watching television. Clearly disorders of comprehension will affect relationships and make it extremely difficult to be productive in most jobs. In addition, since aphasia involves loss of braining functioning due to lesions, the patient’s ability to monitor, manage, and control cognitive operations tends to be decreased. Thus, the brain injury may also produce alterations in personality and mental competence (Sarno, 1981).
In Wernicke’s aphasia poor prognosis has been correlated with middle temporal gyrus, supramarginal gyrus, postcentral gyrus, temporal isthmus or insula involvement. This aphasia may recover along two paths. Firstly, there may be better auditory comprehension and improvement in phonemic accuracy and repetition (i.e., toward anomic aphasia). Secondly, there may be better comprehension but poor repetition (i.e., toward conduction aphasia). Prognosis also depends on other factors previously described, such as the size of the lesion and the types of etiology of the aphasia.
Related Content Links
|
global_01_local_1_shard_00001926_processed.jsonl/43602
|
SDCUE 2015 has ended
View analytic
Saturday, November 7 • 12:30pm - 1:15pm
Teaching AP Calculus Using Flipped Classroom
Using Flipped Classroom to teach math. What is a Flipped Classroom? How does it work? What are the pit falls? How to overcome the pit falls? How to implement and use social media in a Flipped Classroom to maximize student learning and minimize stress in the classroom.
Saturday November 7, 2015 12:30pm - 1:15pm
Room 360
Attendees (0)
|
global_01_local_1_shard_00001926_processed.jsonl/43654
|
Filled With Lyrics
I can only speak for myself when I say how much I felt this image rang true for me. You ever have a conversation and you realize that every other word is a lyric. Its bad enough when its on purpose or not relevant to the conversation. Its even worse when its unintentional. At times its fun when you and another person think of the same reference. Other times its frustrating when you make reference and they’ve either never heard or don’t remember. You think. AWWW! I wasted a perfectly good lyric citation. What about those less fortunate than me who have their brains even more filled with lyrics?
tumblr_n2fwppxkPl1svefdfo1_400[Source :tumblr ]
There should be a L.A. group. You know. Lyrics Anonymous that meets in that Starbucks meeting room. Every body introduces themselves with beverage in hand. “Hi. My name is John.” Group Replies.” Hi, John!” John divulges, “Its been 5 days since my last Biggie quote. On account of his day of passing”. Everyone in the group would nod their heads because they all know the significance of March 9th. No one would belittle him. This would be a safe place. A member chimes in “Biggie Smalls is the Illest” clasps his hands over his own mouth, eyes immediately well up and realizes he let a reference slip free of his mouth. An older woman pats him on the shoulder and comforts him with “Everything’s gonna be alright” then her eyes go wide open. Silence echoes over the room.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/43661
|
General Questions | Sparx Systems Frequently Asked Questions
Prev Next
General Questions
This topic provides answers to a number of questions that new users commonly raise when starting to work with Enterprise Architect.
See also
How do I update to the latest release of Enterprise Architect?
Updating your existing version of Enterprise Architect to a later version (for example, updating Enterprise Architect 12.1 to Enterprise Architect 13) requires your subscription to be current. If your subscription is current, you can download the latest installation executable from the 'Registered User' page of the Sparx System website.
If your subscription has lapsed, you must purchase a subscription renewal to access the latest version of Enterprise Architect.
Once you have downloaded the new installation executable, the existing version of Enterprise Architect must be uninstalled. Running the new installer will help you do this automatically, as you follow the prompts, or you can uninstall your existing version manually beforehand via the Windows Control Panel.
Registered User Site Subscription Renewal
'This app can't run on your PC' error message appears when attempting to install Enterprise Architect on Windows 10.
The installer might be corrupt. Try clearing your Internet browser cache and downloading the installer again from the Sparx Systems website.
An Error has Occured: Couldn't lock file - when using .eap files
This error typically occurs if you do not have full read/write access to the folder that contains the .EAP file. Please check permissions on the .EAP file and the permissions of the folder it is located in.
Alternatively, try copying the file to a location where you have full read/write access (e.g. My Documents) and open it from there.
Can I use a .eap file for a large Repository?
It is recommended that you use a DBMS repository for a large and/or multi-user project.
The file format for MS Jet 3.5 is .eap and for MS Jet 4.0 is .eapx. This format, although very efficient for small repositories and for a small group of users, does create issues for larger repositories above 40 megabytes, or for user groups above 5 simultaneous users.
For more details see page 4 of the Deployment of Enterprise Architect white paper.
Deployment of Enterprise Architect
Can I migrate my personal Enterprise Architect settings from one installation to another?
Most local settings for Enterprise Architect are stored either in the Windows Registry or in the file system below the %APPDATA% directory of your current user profile. To export your settings:
1) Run regedit.exe and export the following registry key
[HKEY_CURRENT_USER\Software\Sparx Systems\EA400]
2) Copy all files from the directory
%APPDATA%\Sparx Systems\EA
(Note: %APPDATA% by default refers to the directory C:\Users\%username%\AppData\Roaming\)
Exporting these registry settings and copying the files from Application Data should allow you to transfer most of the local settings.
Can I use Windows Active Directory?
You can import your Windows user IDs from Windows Active Directory and use them as the security user IDs with Windows Authentication.
For more details refer to the Notes section of the Import User IDs From Active Directory Help topic.
Import User IDs From Active Directory
How can I share Search Definitions with other users?
You can use the 'Export Search' and 'Import Search' functions to make searches available for other users. For more details refer to the Model Search Help topic.
There is no option specifically to save search definitions within the Project; however, you can still effectively achieve this by creating an MDG Technology that includes your search definitions, and then import this back into your Project:
1. Create an MDG Technology that includes your search definitions (refer to the Create MDG Technology File Help topic).
2. Import the MDG Technology into your Project (refer to the Import MDG Technologies to Model Help topic).
3. In this case the MDG Searches should be automatically available to any user who opens the Project. The MDG Technology should be enabled by default; however, if necessary a user can disable/enable it via the 'MDG Technologies' dialog (refer to the Manage MDG Technologies Help topic).
Alternatively, if you are using SQL queries you could consider creating some Model View elements that display the results of your queries on diagrams. For details refer to the Define a Model View Chart Help topic.
Import MDG Technologies to Model Create MDG Technology File Model Search Define a Model View Chart Manage MDG Technologies
I reported a bug. Can I follow my issue on the web?
We do not provide any public bug tracking facility. If you have any enquiries regarding a previously reported issue, please email [email protected] along with the reference number for your previously reported issue.
Sparx Systems Forum - Latest News
Can I transfer a Relationship Matrix Profile to another project?
It is not possible to export a Relationship Matrix profile as reference data; however, you can still effectively import/export Relationship Matrix profiles in the following ways:
1) Create a hyperlink on the diagram, set its Type to 'Matrix' and select the matrix profile you want to share. Export the Package containing this diagram to XMI. The matrix profile will be saved within this XMI. You can then import this Package (including the matrix profile) into other Projects.
2) Alternatively, create a Matrix Specification element. This automatically creates a new Matrix Profile matching the element name. If you export/import this element via XMI into another Project then the Matrix Profile will also be included.
Artifact Toolbox XMI Import and Export
How do I copy diagrams or diagram elements?
There are several options available for copying diagrams and diagram elements. Diagrams and their entire contents can be copied via a deep copy, or you can copy the diagram while still linking to the same original elements via a shallow copy. For more details refer to the Copy (Duplicate) Diagram Help topic.
Copy (Duplicate) Diagram
How can I copy a Package or element tree?
You can easily copy a whole Package-tree or an element-tree to another location in the current repository or into another repository opened in another instance of Enterprise Architect. For details refer to the Copy a Package Help topic.
Copy a Package
What Tables can be used in a SQL Model Search?
When writing a query Ctrl+Space will display the intellisense dropdown menu, which provides a list of all available tables. You can see the full content of a table with a query such as:
select * from t_object
In addition to this, you can refer to the Enterprise Architect Object Model, Reference section of the Enterprise Architect Help. This describes the objects available to the Enterprise Architect Automation Interface. In most cases the Classes and attributes correspond directly to Tables and columns in the database. For example, the Element Class Help topic mentions that the associated table is t_object.
Element Class Reference
Do you support older versions of Enterprise Architect?
Sparx Systems officially support only the latest release of Enterprise Architect. However, if you have questions or issues concerning an earlier release we will still assist you. Note that we do not provide patches for earlier releases of Enterprise Architect. If you are experiencing a problem with Enterprise Architect that has been fixed in a later release you would have to upgrade to the later release.
On opening a repository I am getting a default diagram - how to disable this?
A default diagram has been set on the project, using this option:
Ribbon: Layout > Diagram > Manage > Set as Model Default
You can cancel the default in this way:
1. Create and open a new diagram.
2. Select the ribbon option: Layout > Diagram > Manage > Set as Model Default.
3. Delete the new diagram.
4. Reload the project.
How do I troubleshoot performance issues with DBMS repositories?
Performance issues are commonly related to your DBMS repository setup or network access to this repository.
This series of steps will help identify and resolve a number of performance issues:
1. Have you tried running a project integrity check on the model?
Ribbon: Configure > Model > Integrity Check > Project Integrity
2. Do you have auditing enabled on the model?
Ribbon: Configure > Model > Auditing : Audit Settings > Enable Auditing
Auditing is a feature that can have a significant effect on a model's performance. If Auditing is enabled, try turning it off to see if there is any improvement in performance.
3. Do you have any Add-Ins enabled? What happens if you temporarily disable them?
Ribbon: Specialize > Add-Ins > Manage
4. If you are using a DBMS repository via ODBC or a Cloud Service, you can check the response from the server using a Windows CMD | ping of the IP address of the server. For example:
If the response time is greater than 10ms for an ODBC connection to a DBMS based repository, the network is probably the issue and you should consider using a Cloud-based connection to the DBMS.
With the Cloud service the latency range for reasonable performance can be up 150 ms. If the general ping response is greater than this, you would need to reconsider using the Cloud service over such a slow WAN connection, and possibly consider using an alternative, like DBMS-Replication, if your DBMS supports this.
Auditing The Add-In Manager Check Project Data Integrity
How do I restore the scroll bars in the Project Browser?
Newer Visual Styles such as Microsoft Visual Studio 2012, Microsoft Visual Studio 2013 or Microsoft Office 2016 will hide the horizontal scroll bar and use the auto-scrolling behavior.
You can disable auto-scrolling and restore the scroll bar by resetting Enterprise Architect to use an older Visual Style such as Microsoft Visual Studio 2010; select:
Ribbon: Start > View > Visual Style
Select the appropriate style.
Visual Styles
|
global_01_local_1_shard_00001926_processed.jsonl/43666
|
Enterprise IT
powered by Microsoft System Center Operations Manager
Transforming IT operations for enterprises worldwide
Enterprise IT complexity meets modern data visualization
Transform your investment in Microsoft System Center Operations Manager (SCOM) with a complete enterprise IT visualization platform. At its core, Squared Up delivers a fully modernized SCOM user experience, but you'll also discover how you can use SCOM to deliver a complete Enterprise Application Monitoring solution, and even use our integrations to provide a single pane of glass across your entire IT infrastructure.
Enterprise software, without the tedious sales process
We believe in a different approach to selling enterprise IT software:
No mysteries, no hard sell.
That’s why Squared Up is an affordable, flexible, annual subscription with totally transparent pricing.
Squared Up takes minutes to install and every subscription comes with our friendly, expert technical support and free upgrades to new versions.
Enterprise Starter Pack (ESP)
Provide HTML5 Dashboards to all your users and unlock the power of SCOM with a blazingly fast new web console.
Enterprise Application Monitoring (EAM)
Deliver complete end-to-end monitoring for your Enterprise IT applications through a single-pane-of-glass.
Try it now
We’d much rather let the product do the talking.
Sign up for a fully featured 30-day free trial.
Not ready to download? No problem! Explore our online demo environment to see the product in action.
Dig deeper with these resources
Squared Up Ltd, 4th Floor, Pearce Building, West Street, Maidenhead, SL6 1RL
© Squared Up Ltd. 2018
|
global_01_local_1_shard_00001926_processed.jsonl/43671
|
28.4. zipapp — Manage executable python zip archives
New in version 3.5.
Source code: Lib/zipapp.py
This module provides tools to manage the creation of zip files containing Python code, which can be executed directly by the Python interpreter. The module provides both a Command-Line Interface and a Python API.
28.4.1. Basic Example
The following example shows how the Command-Line Interface can be used to create an executable archive from a directory containing Python code. When run, the archive will execute the main function from the module myapp in the archive.
$ python -m zipapp myapp -m "myapp:main"
$ python myapp.pyz
<output from myapp>
28.4.2. Command-Line Interface
$ python -m zipapp source [options]
If source is a directory, this will create an archive from the contents of source. If source is a file, it should be an archive, and it will be copied to the target archive (or the contents of its shebang line will be displayed if the –info option is specified).
The following options are understood:
-o <output>, --output=<output>
Write the output to a file named output. If this option is not specified, the output filename will be the same as the input source, with the extension .pyz added. If an explicit filename is given, it is used as is (so a .pyz extension should be included if required).
An output filename must be specified if the source is an archive (and in that case, output must not be the same as source).
-p <interpreter>, --python=<interpreter>
Add a #! line to the archive specifying interpreter as the command to run. Also, on POSIX, make the archive executable. The default is to write no #! line, and not make the file executable.
-m <mainfn>, --main=<mainfn>
Write a __main__.py file to the archive that executes mainfn. The mainfn argument should have the form “pkg.mod:fn”, where “pkg.mod” is a package/module in the archive, and “fn” is a callable in the given module. The __main__.py file will execute that callable.
--main cannot be specified when copying an archive.
Display the interpreter embedded in the archive, for diagnostic purposes. In this case, any other options are ignored and SOURCE must be an archive, not a directory.
-h, --help
Print a short usage message and exit.
28.4.3. Python API
The module defines two convenience functions:
zipapp.create_archive(source, target=None, interpreter=None, main=None)
Create an application archive from source. The source can be any of the following:
• The name of a directory, or a pathlib.Path object referring to a directory, in which case a new application archive will be created from the content of that directory.
• The name of an existing application archive file, or a pathlib.Path object referring to such a file, in which case the file is copied to the target (modifying it to reflect the value given for the interpreter argument). The file name should include the .pyz extension, if required.
• A file object open for reading in bytes mode. The content of the file should be an application archive, and the file object is assumed to be positioned at the start of the archive.
The target argument determines where the resulting archive will be written:
• If it is the name of a file, or a pathlb.Path object, the archive will be written to that file.
• If it is an open file object, the archive will be written to that file object, which must be open for writing in bytes mode.
• If the target is omitted (or None), the source must be a directory and the target will be a file with the same name as the source, with a .pyz extension added.
The interpreter argument specifies the name of the Python interpreter with which the archive will be executed. It is written as a “shebang” line at the start of the archive. On POSIX, this will be interpreted by the OS, and on Windows it will be handled by the Python launcher. Omitting the interpreter results in no shebang line being written. If an interpreter is specified, and the target is a filename, the executable bit of the target file will be set.
The main argument specifies the name of a callable which will be used as the main program for the archive. It can only be specified if the source is a directory, and the source does not already contain a __main__.py file. The main argument should take the form “pkg.module:callable” and the archive will be run by importing “pkg.module” and executing the given callable with no arguments. It is an error to omit main if the source is a directory and does not contain a __main__.py file, as otherwise the resulting archive would not be executable.
If a file object is specified for source or target, it is the caller’s responsibility to close it after calling create_archive.
When copying an existing archive, file objects supplied only need read and readline, or write methods. When creating an archive from a directory, if the target is a file object it will be passed to the zipfile.ZipFile class, and must supply the methods needed by that class.
Return the interpreter specified in the #! line at the start of the archive. If there is no #! line, return None. The archive argument can be a filename or a file-like object open for reading in bytes mode. It is assumed to be at the start of the archive.
28.4.4. Examples
Pack up a directory into an archive, and run it.
$ python -m zipapp myapp
$ python myapp.pyz
<output from myapp>
The same can be done using the create_archive() functon:
>>> import zipapp
>>> zipapp.create_archive('myapp.pyz', 'myapp')
To make the application directly executable on POSIX, specify an interpreter to use.
$ python -m zipapp myapp -p "/usr/bin/env python"
$ ./myapp.pyz
<output from myapp>
To replace the shebang line on an existing archive, create a modified archive using the create_archive() function:
>>> import zipapp
>>> zipapp.create_archive('old_archive.pyz', 'new_archive.pyz', '/usr/bin/python3')
To update the file in place, do the replacement in memory using a BytesIO object, and then overwrite the source afterwards. Note that there is a risk when overwriting a file in place that an error will result in the loss of the original file. This code does not protect against such errors, but production code should do so. Also, this method will only work if the archive fits in memory:
>>> import zipapp
>>> import io
>>> temp = io.BytesIO()
>>> zipapp.create_archive('myapp.pyz', temp, '/usr/bin/python2')
>>> with open('myapp.pyz', 'wb') as f:
>>> f.write(temp.getvalue())
28.4.5. Specifying the Interpreter
Note that if you specify an interpreter and then distribute your application archive, you need to ensure that the interpreter used is portable. The Python launcher for Windows supports most common forms of POSIX #! line, but there are other issues to consider:
• If you use “/usr/bin/env python” (or other forms of the “python” command, such as “/usr/bin/python”), you need to consider that your users may have either Python 2 or Python 3 as their default, and write your code to work under both versions.
• If you use an explicit version, for example “/usr/bin/env python3” your application will not work for users who do not have that version. (This may be what you want if you have not made your code Python 2 compatible).
• There is no way to say “python X.Y or later”, so be careful of using an exact version like “/usr/bin/env python3.4” as you will need to change your shebang line for users of Python 3.5, for example.
Typically, you should use an “/usr/bin/env python2” or “/usr/bin/env python3”, depending on whether your code is written for Python 2 or 3.
28.4.6. Creating Standalone Applications with zipapp
Using the zipapp module, it is possible to create self-contained Python programs, which can be distributed to end users who only need to have a suitable version of Python installed on their system. The key to doing this is to bundle all of the application’s dependencies into the archive, along with the application code.
The steps to create a standalone archive are as follows:
1. Create your application in a directory as normal, so you have a myapp directory containing a __main__.py file, and any supporting application code.
2. Install all of your application’s dependencies into the myapp directory, using pip:
$ python -m pip install -r requirements.txt --target myapp
(this assumes you have your project requirements in a requirements.txt file - if not, you can just list the dependencies manually on the pip command line).
3. Optionally, delete the .dist-info directories created by pip in the myapp directory. These hold metadata for pip to manage the packages, and as you won’t be making any further use of pip they aren’t required - although it won’t do any harm if you leave them.
4. Package the application using:
$ python -m zipapp -p "interpreter" myapp
This will produce a standalone executable, which can be run on any machine with the appropriate interpreter available. See Specifying the Interpreter for details. It can be shipped to users as a single file.
On Unix, the myapp.pyz file is executable as it stands. You can rename the file to remove the .pyz extension if you prefer a “plain” command name. On Windows, the myapp.pyz[w] file is executable by virtue of the fact that the Python interpreter registers the .pyz and .pyzw file extensions when installed. Making a Windows executable
On Windows, registration of the .pyz extension is optional, and furthermore, there are certain places that don’t recognise registered extensions “transparently” (the simplest example is that subprocess.run(['myapp']) won’t find your application - you need to explicitly specify the extension).
On Windows, therefore, it is often preferable to create an executable from the zipapp. This is relatively easy, although it does require a C compiler. The basic approach relies on the fact that zipfiles can have arbitrary data prepended, and Windows exe files can have arbitrary data appended. So by creating a suitable launcher and tacking the .pyz file onto the end of it, you end up with a single-file executable that runs your application.
A suitable launcher can be as simple as the following:
#define Py_LIMITED_API 1
#include "Python.h"
#include <windows.h>
#ifdef WINDOWS
int WINAPI wWinMain(
HINSTANCE hInstance, /* handle to current instance */
HINSTANCE hPrevInstance, /* handle to previous instance */
LPWSTR lpCmdLine, /* pointer to command line */
int nCmdShow /* show state of window */
int wmain()
wchar_t **myargv = _alloca((__argc + 1) * sizeof(wchar_t*));
myargv[0] = __wargv[0];
memcpy(myargv + 1, __wargv, __argc * sizeof(wchar_t *));
return Py_Main(__argc+1, myargv);
If you define the WINDOWS preprocessor symbol, this will generate a GUI executable, and without it, a console executable.
To compile the executable, you can either just use the standard MSVC command line tools, or you can take advantage of the fact that distutils knows how to compile Python source:
>>> from distutils.ccompiler import new_compiler
>>> import distutils.sysconfig
>>> import sys
>>> import os
>>> from pathlib import Path
>>> def compile(src):
>>> src = Path(src)
>>> cc = new_compiler()
>>> exe = src.stem
>>> cc.add_include_dir(distutils.sysconfig.get_python_inc())
>>> cc.add_library_dir(os.path.join(sys.base_exec_prefix, 'libs'))
>>> # First the CLI executable
>>> objs = cc.compile([str(src)])
>>> cc.link_executable(objs, exe)
>>> # Now the GUI executable
>>> cc.define_macro('WINDOWS')
>>> cc.link_executable(objs, exe + 'w')
>>> if __name__ == "__main__":
>>> compile("zastub.c")
The resulting launcher uses the “Limited ABI”, so it will run unchanged with any version of Python 3.x. All it needs is for Python (python3.dll) to be on the user’s PATH.
For a fully standalone distribution, you can distribute the launcher with your application appended, bundled with the Python “embedded” distribution. This will run on any PC with the appropriate architecture (32 bit or 64 bit). Caveats
There are some limitations to the process of bundling your application into a single file. In most, if not all, cases they can be addressed without needing major changes to your application.
1. If your application depends on a package that includes a C extension, that package cannot be run from a zip file (this is an OS limitation, as executable code must be present in the filesystem for the OS loader to load it). In this case, you can exclude that dependency from the zipfile, and either require your users to have it installed, or ship it alongside your zipfile and add code to your __main__.py to include the directory containing the unzipped module in sys.path. In this case, you will need to make sure to ship appropriate binaries for your target architecture(s) (and potentially pick the correct version to add to sys.path at runtime, based on the user’s machine).
2. If you are shipping a Windows executable as described above, you either need to ensure that your users have python3.dll on their PATH (which is not the default behaviour of the installer) or you should bundle your application with the embedded distribution.
3. The suggested launcher above uses the Python embedding API. This means that in your application, sys.executable will be your application, and not a conventional Python interpreter. Your code and its dependencies need to be prepared for this possibility. For example, if your application uses the multiprocessing module, it will need to call multiprocessing.set_executable() to let the module know where to find the standard Python interpreter.
28.4.7. The Python Zip Application Archive Format
Python has been able to execute zip files which contain a __main__.py file since version 2.6. In order to be executed by Python, an application archive simply has to be a standard zip file containing a __main__.py file which will be run as the entry point for the application. As usual for any Python script, the parent of the script (in this case the zip file) will be placed on sys.path and thus further modules can be imported from the zip file.
The zip file format allows arbitrary data to be prepended to a zip file. The zip application format uses this ability to prepend a standard POSIX “shebang” line to the file (#!/path/to/interpreter).
Formally, the Python zip application format is therefore:
1. An optional shebang line, containing the characters b'#!' followed by an interpreter name, and then a newline (b'\n') character. The interpreter name can be anything acceptable to the OS “shebang” processing, or the Python launcher on Windows. The interpreter should be encoded in UTF-8 on Windows, and in sys.getfilesystemencoding() on POSIX.
2. Standard zipfile data, as generated by the zipfile module. The zipfile content must include a file called __main__.py (which must be in the “root” of the zipfile - i.e., it cannot be in a subdirectory). The zipfile data can be compressed or uncompressed.
If an application archive has a shebang line, it may have the executable bit set on POSIX systems, to allow it to be executed directly.
There is no requirement that the tools in this module are used to create application archives - the module is a convenience, but archives in the above format created by any means are acceptable to Python.
|
global_01_local_1_shard_00001926_processed.jsonl/43672
|
Our application suddenly keeps on freezing after some time this happens after the KB4338830 update. The unfortunately application cannot be restarted nor be closed, I suspect all of this is because the winsock(just ported) I`m using. It is written on vb.net, and the program has something to do with continuous sending and receiving data from other PCs.
Anybody encountered the same issue? solution? or at least how can I prove it is because of the update.
up vote 6 down vote accepted
Microsoft just released KB4345424 to resolve the issue. Info is from here.
For those who come from Google - KB4345459 for Windows 2008 R2 SP1 and KB4345424 for Windows 2012 R2.
KB4345421 is for Windows 10 Version 1803 and 2016.
• 1
Thanks for posting....... This was causing us major issues. – M Schenkel Jul 17 at 18:28
• This fixed my problem also. I had a Delphi app using a TIdTCPServer and it would randomly crash on shutdown. – kbriggs Aug 12 at 20:39
Your Answer
|
global_01_local_1_shard_00001926_processed.jsonl/43674
|
How much risk should you take?
All investments have some degree of risk.
Generally, higher risk investments fluctuate more, and more suddenly, in value - and this can give you greater potential to grow your money. Of course, this also means you have more potential to lose money.
Lower risk investments may fluctuate in value to a lesser degree, which can mean you have less opportunity to grow your money. On the other hand, you're less likely to lose money.
The amount of investment risk you're comfortable with depends on a couple of things:
1. Your circumstances - how much risk you can take
2. Your feelings - how you feel about investment risk
1. Your circumstances
You should consider how much risk you're able to take with your investments - keeping in mind your other financial commitments and personal circumstances. When thinking about how much risk you're able to take you should consider how long you have until you retire and how much you need to save.
2. How you feel about investment risk
Acknowledging how you feel about investment risk is important. There are no rights or wrongs, because the "right" funds to be in are the ones that you feel most comfortable with, or the ones that suit your particular situation. Remember, how you feel about investment risk can change throughout your life, especially if your circumstances change, so you should check your attitude to risk from time to time.
If you're not sure, this tool will help you determine your attitude to risk.
Question 1 of 10
The questionnaire will help decide your investment style but it is important to understand that there are some limitations.
Understanding the limits of the risk test:
• Education, not advice - this tool is a guide for illustrative purposes only
• Limits - this tool doesn't look at other factors, such as your stage of life, your financial goals or the size of financial loss you are able to withstand
• Think bigger - risk is just one of the things you need to consider when you're making investment decisions. For example, the term of your investment and whether you might want to access your investments before the end of this term are also important
• Talk to an expert - you always have the option to consider getting professional advice before taking action
Remember, the value of your investment can go down as well as up, and may be worth less than what was paid in.
|
global_01_local_1_shard_00001926_processed.jsonl/43693
|
Download Principles of Economics, Case and Fair,9e
yes no Was this document useful for you?
Thank you for your participation!
Document related concepts
Transformation in economics wikipedia, lookup
Development economics wikipedia, lookup
Development theory wikipedia, lookup
Economic globalization wikipedia, lookup
International development wikipedia, lookup
CHAPTER 36 Economic Growth in Developing and Transitional Economies
The difference between the birth rate and the death rate is called:
The fertility rate.
The mortality rate.
The natural rate of population increase.
d. The labor force participation rate.
The stabilization rate.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Principles of Economics 9e by Case, Fair and Oster
31 of 37
|
global_01_local_1_shard_00001926_processed.jsonl/43719
|
Why are there so many freaken pills around?
pill brands
Ever wondered why there are so many damn pills on the market? What’s the difference between Brenda and Juliet? Why is she on Diane and while you’re on Zoely?
From experience, I was prescribed Zoely merely because my GP was in abundance of Zoely sample packs (how convenient). After my first appointment I was given 2 packs. For FREE! Naïve as I was at the age of 19, I took them with the same satisfaction anyone would have given freebies. From hindsight this was a stupid move by my GP and myself. I should have asked questions. Why Zoely? Why not Brenda or Juliet or even Yaz? Is Zoely any better? What’s the difference and why does it cost twice as much? (Zoely $75AUD for 3 months)
If I were talking to my 19-year-old self, this is what I would have told her…In terms of combination (estrogen and progestin) oral contraceptive pills there are TWO main types – monophasic (one phase) pills and multiphasic (multiple phase) pills.
Monophasic pills
• All active pills in the pack have the contain the same levels of estrogen and progestin in each pill
• So regardless of what order you take them in, each pill is the same as it as the same dose for every active day
• Examples – Microgynon-30/50, Nordette, Levlen, Monofeme, Norimin(1)-28, Brevinor-1(R)-28, Yasmin, Diane-35, Estelle-35, Juliet-35, Brenda-35, Valette, Microgynon-20, Loette, Yaz and Zoely
Multiphasic pills
• The active pills contain different levels of hormones dosages through the month
• There are 3 types of multiphasic pills:
biphasic (2 different dosages), triphasic (3 different dosages) and quadphasic (4 different dosages)
• Multiphasic pills must be taken in sequential order otherwise they will not be effective and you may experience breakthrough bleeding and unintended pregancy
• Examples – Natazia, Aranelle-35, Enpresse-30/40, Ortho Tricyclen-35, TriNessa-35, Triphasil-30/40/50,
Monophasic pills are more popular as they are easier to take. Multiphasic pills only appeared because there were concerns about estrogen levels in monophasic pills. Which leads me to the numbers. Ever wondered why there are numbers attached to each pill name? This number is actually an indication of the amount of estrogen that is present in the pill.
• LOW dose pills contain: 20 micrograms of estrogen e.g. Alesse-20
• REGULAR dose pills contain: 30-34 micrograms of estrogen e.g. Brenda-35
• HIGH dose pills contain 50+ micrograms of estrogen e.g. Microgynon-50
And how do you decide what dose is best for you? Well here are a few things you should know:
• Increased levels of estrogen = the higher the risk of blood clots
• Increased levels of estrogen = the higher the risk of breast cancer
• Increased levels of estrogen = the higher the risk of weight gain
• Increased levels of estrogen = the decrease in the thyroid hormones leading to hypothyroidism
• Decreased levels of estrogen = the higher the risk of breakthrough bleeding
• Decreased levels of estrogen = higher rates of discontinuation
• Moderate levels of estrogen = reduces side effects and regulates periods
For user reviews on each contraception pill visit:
This website can be a good way to gauge whether you should be questioning the symptoms you are experiencing on a specific pill.
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/43723
|
Group Discounts available for 3+ students and Corporate Clients
Logging and Filtering
We are going to discuss about:
• UsagWee of Logs
• Server Log Files and Domain Log Files
• Message Formats & Attributes
• Configuring WebLogic Logging Services
• Filtering WebLogic Server Log Messages
• Using the console to Monitor
This chapter describes how you use WebLogic Server logging services to monitor server, subsystem, and application events. It explains how you configure WebLogic Server to write messages to log files and listen for the log messages that WebLogic Server broadcasts. It also describes how to view log messages through the WebLogic Server Administration Console.
Using Logs
WebLogic Server subsystems use logging services to provide information about events such as the deployment of new applications or the failure of one or more subsystems. A server instance uses them to communicate its status and respond to specific events. For example, you can use WebLogic logging services to report error conditions or listen for log messages from a specific subsystem.
• Logs can aid in the discovery of:
• frequently accessed resources
• activity by day and time interval
• amount of data sent and received
• IP addresses of users accessing the site
• number of actual “hits”
• problems servicing requests
• performance statistics
Server Log Files and Domain Log Files
Each WebLogic Server instance writes all messages from its subsystems and applications to a server log file that is located on the local host computer. By default, the server log file is located in the logs directory below the server instance root directory; for example, DOMAIN_NAME\servers\SERVER_NAME\logs\SERVER_NAME.log, where DOMAIN_NAME is the name of the directory in which you located the domain and SERVER_NAME is the name of the server.
In addition to writing messages to the server log file, each server instance forwards a subset of its messages to a domain-wide log file. By default, servers forward only messages of severity level NOTICE or higher. While you can modify the set of messages that are forwarded, servers can never forward messages of the DEBUG severity level.
The domain log file provides a central location from which to view the overall status of the domain. The domain log resides in the Administration Server logs directory. The default name and location for the domain log file is DOMAIN_NAME\servers\ADMIN_SERVER_NAME\logs\DOMAIN_NAME.log,
Where DOMAIN_NAME is the name of the directory in which you located the domain and ADMIN_SERVER_NAME is the name of the Administration Server.
Message Formats & Attributes
Log Message Format
When a WebLogic Server instance writes a message to the server log file, the first line of each message begins with #### followed by the message attributes. Each attribute is contained between angle brackets.
Here is an example of a message in the server log file:
####<Sept 22, 2004 10:46:51 AM EST> <Notice> <WebLogicServer> <MyComputer>
In this example, the message attributes are: Locale-formatted Timestamp, Severity, Subsystem, Machine Name, Server Name, Thread ID, User ID, Transaction ID, Diagnostic Context ID, Raw Time Value, Message ID, and Message Text. (A subsequent section, “Message Attributes,” describes each attribute.)
Format of Output to Standard Out and Standard Error
When a WebLogic Server instance writes a message to standard out, the output does not include the #### prefix and does not include the Server Name, Machine Name, Thread ID, User ID, Transaction ID, Diagnostic Context ID, and Raw Time Value fields.
Here is an example of how the message from the previous section would be printed to standard out:
<Sept 22, 2004 10:51:10 AM EST> <Notice> <WebLogicServer> <BEA-000360> <Server started in RUNNING mode
In this example, the message attributes are: Locale-formatted Timestamp, Severity, Subsystem, Message ID, and Message Text.
Message Attributes
The messages for all WebLogic Server instances contain a consistent set of attributes. In addition, if your application uses WebLogic logging services to generate messages, its messages will contain these attributes.
Message Severity & Messages Forwarded to Domain Log
The severity attribute of a WebLogic Server log message indicates the potential impact of the event or condition that the message reports.
Message Catalog
Message catalogs are available in HTML format on e-docs as part of the documentation deliverable. You can search for messages by error number using the search engine.
Configuring WebLogic Logging Services
Logging Configuration Tasks: Main Steps
The following steps summarize how you configure and filter log messages that WebLogic Server generates. Related documentation and later sections in this guide describe these steps in more detail.
1. Use the Administration Console to manage log files and configure the following logging options:
2. Domain and server log file name and location, rotation pattern, location of archived log files, and number of log files stored.
1. Types of messages that the server sends to standard out.
1. Which messages a server instance sends to the domain log.
1. Log files for HTTP requests.
1. Specify the logging implementation (Java Logging or Log4j).
1. Specify message destination and configure filtering log messages by severity level or other criteria. See “Filter log messages” in the Administration Console Online Help.
1. Alternatively, configure log message filtering on the message handler using the WebLogic Scripting Tool.
1. Filter log messages published by the logger using the Java APIs.
Environment -> Servers -> Logging…
Filtering WebLogic Server Log Messages
WebLogic logging services provide several filtering options that give you the flexibility to determine which messages are written to WebLogic Server log files and standard out, and which are written to the log file and standard out that a client JVM maintains.
• Log filters provide control over the log messages that get published.
• You can filter out messages of a certain severity level, from a particular subsystem, or according to specified criteria
• You can create separate filters for the messages that each server instance writes to:
• its server log file
• standard out
• memory buffer
• domain-wide log
Create Log Filters
Step 1:
Domain -> Configuration -> Log Filters and then click on New
Step 2: Specify the Name of the Filter and click on Finish Button and Click on Activate Changes
Step 3: Specify the conditions according to the requirement and then apply save and Activate Changes.
Assigning a Log Filter to Server
Servers -> Select Server -> Logging -> Advanced and then apply the Filter according to the requirement.
Using the Console to Monitor
The Administration Console offers some monitoring capabilities:
Monitoring Running Servers
Monitoring Individual Servers
Server Status and Threads Monitoring
Check out our Related Courses
Weblogic Tutorials
Introduction to Clustering Weblogic
Oracle Goldengate Training In Chicago
Oracle Weblogic Server Installation
0 Responses on Logging and Filtering"
Leave a Message
Please Enter Your Details and Query.
Three + 6
|
global_01_local_1_shard_00001926_processed.jsonl/43727
|
Big Brother and online Hunger games.
CalebDaBoss's blogBlog
1. new hair (pic)
2. this is ridiculous
3. legit
4. i'm very bad at driving lol
5. hell's kitchen
6. Hell's Kitchen Robbed Queens
7. i love YouTube Survivor
8. roblox survivor new game results
9. weird roblox survivor ending
10. survivor rest of season my way
11. Gabby is so dumb lol
12. Highlight of each class
13. i am so screwed
14. halloween 2018 boot order (pic)
15. honestly
16. Cove's Savanna Smackdown Prediction
17. i won roblox survivor
18. survivor theory
19. i'm so dumb
20. Survivor DvG Final 8 Prediction
21. every time cirie was robbed
22. the worst hell's kitchen runner-up
23. survivor
24. i'm confused
25. i remember my first casting
26. just being honest
27. i passed my learner's permit test
28. roast me
29. the queen of the black hat 2
30. thanks for deleting the blog
31. i love this new words update
32. i love the ranking teachers blogs
33. i love nebraska wetaher sometimes
34. never forget
35. yeah
36. i hate when people use xenophobia excuse
37. Can someone ban this obvious multi troll
38. i've never been banned
39. TURC Week 1
40. The Ultimate Riverdale Character Cast
Aug 11, 2018 by CalebDaBoss
slender man was so scary i'm gonna have nightmares o.o
btw of course boot order
6th Katie (went missing)
5th Chloe (didn't die but got infected and wasn't shown in the movie after that scene)
4th Tom (same as chloe)
3rd Wren (dragged out window)
2nd Hallie (strangled/devoured or whatever it's hard to explain)
Survived Lizzie
Total Kill Count 3 Total Infected/Brain Damage Count 2
the only problem is that the people in this movie were so stupid it hurt my brain
You're the first one I have seen say anything good about it.
Sent by Thirteen,Aug 11, 2018
thirteen it was pretty good
Sent by CalebDaBoss,Aug 11, 2018
Spoiler button exists.
Sent by Marktint_1,Aug 11, 2018
Leave a comment
|
global_01_local_1_shard_00001926_processed.jsonl/43728
|
Powering big ideas from a small open source CMS
The small content management system that can handle big ideas
Download Textpattern 4.7.1 Try a demo
GitHub Stars 394
Built on solid foundations
Textpattern CMS is completely free, open source software and it's built upon proven web technologies too. Furthermore, it doesn’t muddy your HTML with additional code dependencies or script libraries.
Flexible tag-based templates
Your designs—your code. Textpattern has a powerful tag-based template language that’s easy to learn and provides a wealth of ways to structure a website and manipulate content.
Fast, lean, secure and extendable
We purposefully keep the core of the CMS lean and responsive. However the system is fully extendable via plugins, of which there are hundreds available via our community of plugin authors.
Simple, elegant user interface
Our design philosophy extends to the Textpattern core user interface too. We try to avoid needless clutter within the administration panels and we strive to make the interface fully accessible for all users.
Available in over 40 languages
The Textpattern core user interface has been localized into many languages. Of course, we always welcome further translation by the community. More translations are added all the time!
Community-driven development
Well over a decade of development has been lovingly poured into our CMS. The active, friendly and helpful community surrounding the platform ensures its continued success and guides its future.
Write using Textile, Markdown, etc.
Our CMS ships with built-in support for Textile text formatting language, and support for Markdown language via a plugin. Alternatively, you can write plain text or vanilla HTML if you so wish.
Contributors are welcomed
Textpattern is open source under the GNU General Public License v2.0, and all development takes place on GitHub. User contributions are welcome (and indeed, are enthusiastically encouraged).
Textpattern ScreenshotsTextpattern Screenshot
Site showcase
110% Awesome Websites
Our users continue to amaze us with their wonderful creations! Feast your eyes on some of the awesome websites powered by Textpattern CMS in our site showcase section.
Art and Culture Center/Hollywood website
Artedomus website
Hicks Design website
Latest from the blog
The Textpattern blog
|
global_01_local_1_shard_00001926_processed.jsonl/43734
|
How to affect the visibility of my website?
post 1
S E O. Three letters of enormous importance for modern businesses! Most of us have at some point heard the term SEO, without knowing quite well what it is about. The mystery and conspiracy theories behind the SEO techniques are indisputably too many... Despite the exaggeration, the average Greek businessman over 40 years old is not familiarised at all with the concept of SEO. Of course this is something that it has to change.
I am quoting our beloved wikipedia: The term Search Engine Optimization or SEO (from the English search engine optimization), describes all those procedures that need to be made in the structure and content of a website to be as possible friendly to search engines. The ultimate goal is the high ranking of the website in search engines and to increase traffic to the website through organic results, meaning the non paid-sponsored search engine results on the Internet for keywords (keywords) that interest the user and engines Search consider that website content is most appropriate for what the user is looking for.
So that is why everyday they are being spilled tons of web ink to clarify to promote ways to enhance your website through SEO techniques. Keep reading!
The SEO techniques are separated into white hat SEO and black hat SEO. The first are the good ones, one might say and focus on the following:
-Create Appropriate content to be compatible and accessible by search engines like Google
-Keywords in links to the site
-Keywords in title and other characteristics of a page and its elements
-Keywords that appear in the text of the page
-A website ranking is measured by their ranking algorithms (eg PageRank of Google)
The black hat SEO techniques are kinda breaking the rules of search engines, eg with overzealous keywords placement, or with a high number of links to the same page. But did you know that search engines discover this trick and punish it? How? By signaling your page as unreliable or lower placement in their own content.
Secret recipe for the best ranking of a website is the link between the title, the description, the keywords and the general content of the page. We have already pointed out that content is the king!
Other key points are to create a qualitative and rich content, to improve your website with the help of a sitemap (the sitemap helps the algorithm Google page to understand how a website is structured, here you can find a related tool) to ensure that there are no broken links, ie links that lead nowhere and last but not least to optimize the speed of your site, which is something basic.
Wait a minute! Have you registered your website in search engines? Get here And we continue ...
Have you ever noticed that every url starts like this ... HTTP? As we all know, security is a huge matter in all online activities, it is only natural that sites that implement a secure connection https rather than http are being prioritized. What are you waiting for?
In modern times every person has an -at least- one electronic device in their pockets thereon, most of them possess a smartphone. Have you ever actually checked if your own website is responsive, meaning compatible with mobile phones?
If you want to learn more co-ordinate with the Blog The Brain Pixels for the post that follows next week. If you like what you are reading be a dear and signup for our newsletter, so that you can receive the collected articles of our tech team in your personal e-mail. You can also find us in four of the most important social media (Fb, Tw, G +, Lin), we go by our name The Brain Pixels!
|
global_01_local_1_shard_00001926_processed.jsonl/43741
|
Fuck, they never end. Some of them never go away. I wish I didn't want anyone, and I didn't want anyone to want me. I wish I just didn't care.
I have a serious crush on a guy right now.
He's this super adorable bisexual stoner from Washington. He got me into a shoegaze band while I was high one night, we played Truth or Dare on Skype, he wears thong underwear and showed me how to roll a joint. God, he's cute.
I want him, but more than I want him, I want him to want me. I want to smoke a couple bowls with him and then have awkward stoned sex.
I had a really hot dream about him while I was taking a nap the other day and it was fantastic. I don't think I'm his type. Still, he's nice to lust over.
Liking you is like sitting down to pee on a toilet full of bleach. Some form of relief, followed by unparallelled pain. And I am enthralled.
I... I think I have a crush on a guy in my World of Warcraft guild. He's really nice to everyone, and even though a lot of people in the guild are pretty harsh to me he always gives me a chance. He always leads the fun raids that I go to, and I always like being in his group so I can be useful to him and share my buffs and crap.
Plus, his accent is really nice and his character has a ponytail - the only attractive hairstyle for that race I swear, it's not just because- okay fine yes I have a thing for guys with long hair.
I had a cute dream about him last night(except it was kinda our game characters but his face looked like my boyfriend oh god weird) and woke up feeling so embarassed. If he or anyone else in the guild knew, I'd have to move server for the embarassment of it all. I'd never live it down. I can't even tell my boyfriend because I'm so mortified.
All I need now is for somebody to post a picture of him IRL and it turn out that he's actually hot. Then I'd just die.
What do I dooo oh god I can't tell anybody but I feel so awkward now...
View Thinker #fc785d's profile
Well, chances are that he's actually bald or balding, and has an excess of body hair. And belly lint. A butt cheese.
View Thinker #fc785d's profile
I mean, and butt cheese. But he could actually be butt cheese incarnate, too.
Log In to Leave Comment
I am not really getting sexual crushes anymore. Like I am getting kind of romantic ones, but not sexual. I have by no means achieved asexuality, but this is a start, kind of. Back in the day, it used to be I'd meet a girl and I'd immediately wonder if I could ball her. But that's stupid! Now it's like, yeah okay we can do it eventually, but how about for now I just like take you to dinner and maybe we'll see or rent a movie and then I can drop you off and kiss you goodnight before I drive myself home? So there is basically very little concern given to balling now.
I swear I never graduated from the middle school level of maturity when it comes to sexuality.
I have such a schoolgirl crush on Trent Reznor right now it's actually funny. The only difference between the crush I have on Trent Reznor now and the crush I had on Brian Littrell of the Backstreet Boys, is that Trent makes better music. Ok, and I respect his recent dealings with his record company, and his music videos consistently have an artistic standard that is excellent.
I guess the fact remains the same that I am attracted to musicians and artists. If only my school had some more dark, brooding, brilliant, incredibly handsome, musicians walking around. If only I had a chance being with them if such creatures existed on campus.
Really I would be quite happy with a reasonaby smart guy, with simlar interests, who can hold a good conversation, who respects my values, and is on some level shares a mutual attraction with me. Really thats all I need. Pity none of those exist on campus either.
Crush, hell. I get full blown obsessions easier than most people can conceive of. They're hell. If I have a crush, I act upon it (excluding Johnny Depp, etc) So if I act upon it and things don't come out peachy keen, I get obsessed. Real bad kind. The last one lasted for about a year and four months. If there is a hell, and I go there, it will be full of wonderful, unattainable people I can interact and be friends with, but never have.
i've talked to him once, and it was a long long time ago. i don't know any more of him then the world at large does. i think i'm in love.
I'm going to a guy's (my impending crush) house tomorrow and we are suppose to eat ice cream on his bed.
I'm hoping that's not a euphemism.
I'll be upset if there isn't any ben and jerry's.
after we broke up, it took a while but i finally got a new crush. it felt nice in that kind of way when you feel normal. but now, it feels like it's going to just hurt in a little bit. i need to develop confrontation skills so that these things can grow into more than just crushes, but i don't think that's going to happen anytime soon. i wish he would take the hints and make the move.
View Thinker #277dd3's profile
Your hints are probably far too subtle for him. I've known one girl who made it obvious. Something definitely would have happened if we weren't institutionalized and she didn't live hours away. And if I hadn't said "you too" when she told me she loved me on the phone.
Log In to Leave Comment
I keep telling myself it's just a crush. But that's being delusional. It stopped being "just a crush" months ago. I haven't decided when I'm gonna tell her. I can't deal with another heartbreak right now, I don't think.
|
global_01_local_1_shard_00001926_processed.jsonl/43755
|
Document Type
From the American Revolution through the Civil War and beyond, fictional characters enrich social studies by bringing the past to life for young readers. Historical fiction offers a great variety of topics in various formats, including novels, short stories, picture books, poems, and plays that provides useful background knowledge through a glimpse into the details of daily life during a particular time. This articles offers specific examples of how teachers can encourage writing using quality historical fiction picture books.
|
global_01_local_1_shard_00001926_processed.jsonl/43766
|
Melissa Lee-Tammeus, PhD/LMHC View Entire Blog
Making Some Sunshine
Self efficacy is one’s personal belief system by which one thinks, creates action, and makes decisions (Bandura & Locke, 2003). Emotions and behaviors, we exude through self-efficacy, whether perceived as positive or negative, are super sensitive. They can be changed through external cues such as opinions and judgments of others. They can change on a dime when we compare ourselves to someone else. They can even grow based on encouragement and praise.
Whatever we chose affects how we feel about ourselves, what we think about ourselves, and what we do with ourselves every minute of every day (Bandura & Locke, 2003).
Self-efficacy theories are rooted in the core belief that we have the power to produce anything we want (Bandura & Locke, 2014). You’re like SuperHuman with the cape AND the cool ride. You just gotta know how to use it.
So, here’s the deal. Right now, latch on to one positive aspect that you are bringing to the table right now.
Is it the fact that you are kind to animals? Is it the fact that you can’t let a smile from a stranger go unreturned? Is it the fact that you could have thrown that cigarette out the window but you put it in the trash instead? Grab something, anything. I guarantee you can pick one positive thing. Reading this counts too, by the way. After all, it’s all about improvement, right? Points for you, right here! Woohoo!
When you focus on these positives in yourself, you can build a positive self-perception. Everyone deserves a bad-ass self-perception. You deserve to know you matter.
It matters that you contributed to society by cleaning up your own mess, or spreading a bit of sunshine, playing with an animal that needed attention, or reading something with the hope of self improvement.
Reiterating and acknowledging your contributions gives you permission to be even more engaged next time around.
And guess what? Imagine what happens when you pick out positives for others to help with their self-perception? We are talking unicorns and cotton candy for all, people.
What is important to remember when thinking about self-efficacy is that we all are sensitive to environmental cues. We can either stifle that in ourselves or others or we can help it blossom. Bandura and Locke (2003) said that “erroneous feedback serves as a form of persuasory influence” (para. 12).
Your words and actions have power. Everything you say, everything you do, can build up your worth or tear it down.
So, give yourself some sunshine. There’s more where that came from.
Bandura, A., &, Locke, E. A. (2003). Negative self-efficacy and goal effects revisited. Journal of Applied Psychology, 88(1), 87–99.
|
global_01_local_1_shard_00001926_processed.jsonl/43767
|
Letter to Jim
I’m unsure how these things work, Jim, so I’m writing to tell you what you might already know: You died yesterday (in a manner so much better than Yesenin). You wrote my single favorite book of poetry ever, published in 1973, the year before my birth when no one knew you from a blackbird. Each poem is a letter to that Russian poet who hanged himself three days after Christmas, in 1925. What a mess Sergei was—married for the third and final time to Tolstoy’s granddaughter in the year he turned thirty, the year he annihilated himself. Because of you, I can never say I wasn’t warned what it means to be a poet, or to know and love a poet.
You said in an interview years after publishing Letters to Yesenin that you received anti-suicide buttons and literature in the mail from concerned readers who registered what it was you’d been tackling with those words. I imagine you getting a real kick out of that pinning an Alive! button on your chest before heading off for a jaunt in the woods.
I am grateful still for your daughter’s robe. Because of that long-gone yard of red fabric (and the child it stood for), your lifetime overlapped mine.
Suicide. Beauty takes my courage away this cold autumn evening. My year old daughter’s red robe hangs from the doorknob shouting stop.
And the final line of the book: I’ve decided to stay. Words to live by. Words that kept you here, where you wrote volumes of words for so many readers, each sentence a firefly in the dark of their lonely.
Let me back up and tell you something you don’t know. In the fall of 1991, I wandered into a classroom at a fine arts boarding school in Northern Michigan, not far from your farm in Leelanau County. I was sixteen, sullen, insecure, hungry for direction. The teacher—a friend of yours and (now) mine—put two books in my hands: a novel called Farmer and your Selected and New Poems (which included Letters to Yesenin). I make it sound personal, but no student went through a class with Michael Delp without reading those books, so much he was a fan of yours. I exited high school without reading The Scarlet Letter or Moby Dick, but I could recite under any phase of moon passages of your poetry and prose the way kids a century ago memorized Wordsworth and Blake.
A new ax
a new ax
I’m going to play
with my new ax
sharp blue blade
handle of ash.
Then, exhausted, listen
to my new record, Johnny Cash.
You taught me about trees and birds, appetites and desire, beauty and time, how to fall in love with nature, and with people, knowing the latter will let you down because longing and despair are as innate to us as flight is to a bird.
We are each
the only world
we are going to get.
You helped me see my high school years in the middle of the northern woods for what they were: a blessing I celebrated daily with long walks through groves of birch and pine so that I might pair read one of your books while enjoying forbidden cigarettes on the shore of Green Lake.
When time came for graduation, I followed your lead after reading Hemingway’s For Whom the Bell Tolls, Norman Maclean’s A River Runs Through It, and your Legends of the Fall. All made reference to some Shangri-La called Missoula, Montana, a place riddled with mountains and rivers. I liked the sound of it.
I want to die in the saddle. An enemy of civilization.
By eighteen, I’d learned from you that my days were numbered, so I ought to spend them in the most wild and beautiful place I could find. I packed up my flannels, boots, thrift store cardigans, and headed West, where I would stay (more or less).
Days before I left Michigan for Montana, Delp, my mentor, handed me a piece of paper with your Leelanau address. He said, “Send Jim something.”
I stood before him, wordless and befuddled. What would I send you? Flowers? An ax? A new Johnny Cash? Or better to show up on your doorstep and offer to help take care of your horses, if you had them and could teach me how. Or were horses an interest of your memorable protagonists, like Dalva? In my imagination, you were you and her, too—all of those characters branches of your being, like the limbs of a giant tree.
“Poems, Stephenson.” Delp laughed. “Send Jim some poems.”
I printed up a half dozen pages and mailed them off with a letter that probably took far too many words to say, You’re the best. Then I promptly forgot about it (so miniscule, I thought, the chance of you responding).
Desperate for a chance to see the Upper Peninsula—a space you’d painted in my brain so many times—I took the high road from Michigan to Montana. I crossed the five-mile Mackinac Bridge, the spot where Lake Michigan and Lake Huron meet below me in a shade of blue specific to deep waters, my insides jagged as the tree line of pines on the far shore.
As I wove through the UP, alone and lonesome, I imagined you narrating me. She walks into the bar, squinting until her pupils catch up to the dark. Harley knows she’s not old enough, but he buys her a beer anyway. It was a trick I’d use when my travels turned into hard times—I’d dream myself a character of yours. Together, we made our way through Wisconsin, Minnesota, the Dakotas, Wyoming, and (in years to come) California, Alaska, British Columbia. And so on.
When your letter reached me a month later, forwarded from Interlochen to Indiana to Montana, I sat under a red maple and traced your name on the handwritten return address before opening. You claimed to like my poems. You even quoted back one of my lines: the water-breathing child inside each dream (a sentiment likely stolen from you). You said Missoula was a good town, as a river runs through it. You encouraged me to work on prose as it anchor’s one to earth in the life-long poem chase.
Poetry, you’d already taught me second-hand, is the language your soul would speak if you could teach your soul to speak.
I continued throwing my heart into poems (which is much like trying to throw one’s heart through a closed window) mostly because I didn’t know how to stop. I finally got some ghazals published in the college literary journal—a recipe of yours I’d followed to a T. An acquaintance edited the journal and requested the submission after reading a draft in class. It wouldn’t have occurred to me to send it in on my own.
The ghazals were the first bit of writing I showed the man who would become my husband. He read them while I made us a dinner featuring sautéed spinach (before I knew how much he loathed spinach). He ran a hand over his face and said, Holy fuck you can write. I’d fooled him, too.
Soon we married and moved to Texas for me to pursue a master’s degree in fiction—this shift to prose prompted by your advice. The move I viewed as a necessary but temporary relocation. You had a thing for the South as well, but I soon learned that the small river town of San Marcos, Texas is an entirely different species than your Patagonia, New Mexico.
On our second Sunday in Texas, as we tried to eat a bad batch of salmon I made on a far too hot evening, my father called to tell me that my only sibling was gone. Twenty-nine years old. (The only human I adored as much as I adored my imagined you, Jim. He read all your books, too.)
Like Yesenin, he’d decided not to stay.
Cracked wide open as a blank-page sky, I did the only thing I could think to do: I threw your Selected and New Poems in a backpack and boarded a plane for Georgia where my brother’s body needed claiming.
And if my sister hadn’t died in an auto wreck
and had been taken by injuns
I would have something to do:
go into the mountains and get her back.
Crying vodka but painfully in my right mind, I recited your words to my mother at four in the morning on a grassy knoll in Athens as if they could answer a question that, for me, remains rhetorical: Why?
You’d lost a sibling and been wrecked by it, too.
Miranda, I have proof that when people die
they become birds.
I had entered the post-loss world you prepared me for, a world that is both wound and balm. I’d felt tragedy coming, like catching the aura of an event that’s not-yet happened but is no less imminent. My brother had always been killing himself. Your sister had always been headed for that fatal collision. I had always felt like a skinned tree in February snow.
Show me a single wound on earth that love has healed.
I had no comfort but your poems, so I dragged them through my days, dog-eared and coffee stained, like some dingy childhood blanket.
While I lived off your poetry, I escaped into your prose on a regular basis as well. I loved your characters for their appetites, delights, dilemmas, and questionable solutions. Farmer is one of the few novels I’ve read again and again. When I first encountered it at seventeen, I was both Joseph (the forty-three-year-old teacher), and Catherine (his Lolita-esque student, my same age). To inhabit both characters in such a way made for an ultimate erotic read. (How often is it one can escape the self and fuck her own self at the same time?) Though I found the characters’ everyday brand of despair and the appearance of Joseph’s long-dead dog equally compelling.
Now, a year shy of forty-three myself, what I see in those scenes is something beyond the sexual. I see a man stunned to find himself halfway through life at best, still an emotional adolescent, overwhelmed by a desire for youth that aches like a broken rib. And young Catherine is a girl so fascinated by her new sexual superpowers that she uses them simply because she can, a girl who has no clue who she is or what she wants.
Or maybe am I projecting a teenage me onto your narrative, along with the close-to-forty-three-year-old me? No matter. This is what you do so well—hold trick mirrors up to your readers so they can regard themselves in the faces of imagined others. We can read your books and say, What a crazy fuck. What a bonafide mess, as we turn the page, hungry for the next scene.
I know now you didn’t write mothers mothering because you needed to keep it real. Dalva won our hearts, and Julip, too. A man can write a woman! the critics crooned. But not a mother mothering. The closest you came was Clare from The Woman Lit by Fireflies, who abandons her suburban life for the cornfields of Iowa. But then her daughter was twenty-nine, which is years away from the kind of mothering it takes to raise babies. Brown Dog adopted Berry (one of my favorite characters)—a ten-year-old Native American child who suffered the affects of Fetal Alcohol Syndrome. But mostly children came and went in your narratives like forest creatures—unpredictable and self-sufficient, which makes me think your wife raised your children while you committed to the page again and again and again.
In my late twenties, waylaid by grief and drink and graduate student ennui, the animal part of me kicked my sex drive into high gear. I felt for a while like a character in one of your books. But the catch for a woman is this: Sex leads to babies. Babies lead to mothering. And the life of a young mother is about as far from your renegade universe as a person can get.
You once said, I am the bird, not the ornithologist, a line I carved into bone and will carry around as long as I carry anything. I did not become the ornithologist, but I did give up flight. I gave myself to child-rearing the way you threw yourself into books, cranking out one after another at an astonishing pace. In the years mine were youngest, I walked around with the weight of Yesenin’s rope around my neck—tethered to two beautiful creatures of my own making, beings who are the reason anyone would try to write a poem in the first place. Poetry is the language your soul would speak if…
My husband then—a writer and reader of your work as well—maintained a level of autonomy I could not, between the colic and the breastfeeding. He could go drinking with graduate school friends, fall drunk into a hammock, sleep the night away under stars, and drag home an apology at sunrise while I, alone with a mastitis fever, waited for him to drive me to the doctor for antibiotics we’d have to buy on credit.
Unlike you, I couldn’t write out my dis-ease. I spent five years straight half awake and half asleep. Unlike you, my days were a lovely and harrowing series of earaches and owies and first steps, laundry piles and diapers. All the while, the gazes of my brown-eyed babies nursing tapped a nerve in me that ran deeper than any river.
How could I die in the saddle, an enemy of civilization when my days revolved around civilizing two feral children?
I was so tired, Jim, and not a thing you wrote prepared me for this (though I understand that was not your job). In fact, not a thing in my whole life prepared me for early motherhood. Not the eight pet guinea pigs, two rabbits, one hamster, hermit crab, lizard, or adopted wolf dog. Nothing. Not. One. Thing.
But one thing got me through. The letters you wrote to Yesenin one long, dark winter, when you were not yet famous and wealthy but homebound with small children, like me. My year old daughter’s red robe hangs from the doorknob…
Many days I couldn’t see the way forward, but I kept going, the way you had. It was you, after all, who taught me how to stay.
I should mention, of course, the one-and-only time we met in this incarnation, back when I was married and not yet a mother, writing hard and hoping for the best. For some reason, I remember I wore my favorite shirt at the time, the one I always grabbed first off the laundry pile until the fabric frayed and stained and I let it go. I’d bought it in 2001 on a return trip to Northern Michigan for a high school reunion, at a thrift store in Traverse City (another a place we’d both inhabited). It was an ‘80s polo—white cotton with faded red rosettes.
Perhaps I remember the shirt so well because I knew as I stood in line to meet you in the book-signing tent outside the capitol building in Austin, I knew it was a pinnacle moment for me. Though you were more of the earth than any human I’ve encountered, it was hard to believe you could ever be pinned down to a single time and place. I crept up—one small step at a time—your latest novel in hand. My good friend waited in line behind me. Eventually, it was you and me.
I handed you my book to sign and told you too fast about our friend in common—Michael Delp—and how you’d graciously responded to my half dozen letters over the years. You nodded in a way that could have meant, I remember, or, I’m following you, or, When is she going to tell me her name?
You really lit up when I mentioned my friend Elka—a precocious Nordic beauty from Wisconsin enrolled in my same graduate program who had spent an accidental week in Northern Michigan with you the summer before. You said beautiful girl, and keep writing, and Tell Delp hello, and probably other things my brain couldn’t process as you sat there on a day that was more or less like any other day for you, talking to me in my thrift-store shirt. You signed my book with the words con amore and an illustration of your blind left eye (the one that’s stared sideways, as if it peeping in on another world, since you were seven and a girl thrust a broken bottle in your face).
Afterwards, my friend who had waited in line behind me said, Jim seemed pretty taken with you. He called you beautiful.
I tried to explain you’d meant Elka, not me, and that I was fine with that. I didn’t want to be your Catherine, though part of me daydreamed about becoming your apprentice (a task I took on anyway, alone with your books). I was happy to simple share a moment with you, at least. Or most. (Meeting you can only be summed up by most.)
I sent you a letter in October of 2015. Another friend-in-common had recently gone fishing with you, and he reminded me you weren’t getting any younger, and that (in Montana terms), you lived just down the road. I told you I’d settled back in Missoula, for good, I hoped, but that I passed through Livingston a few times a year while adventuring in my VW van, and I’d love to buy you lunch or a drink sometime if you were game. (I had to push myself to say that last part, but what the heck. Why not?)
I don’t think I mentioned that my husband of thirteen years had become a notable writer himself and left for greener pastures (Los Angeles, to be exact). I was now solo-parenting two young children and fighting my way back to writing as well. But those were my problems, my business. I mean, I’d never heard you complain.
The moment I pulled your response from the mailbox and saw the typed return address, I knew something had changed. Inside I found a polite letter you’d dictated to your secretary, all typed. You said you were glad I’d made it back. You said good luck on the writing. You’d always liked Missoula because it had so many bars.
The week before you died, I visited Texas for the first time since I’d left in 2010. I brought with me for airplane reading your latest book of poems—Dead Man’s Float. One of my old friends (also a fan of yours) challenged me to make good on a decade-old promise to get tattoos. He wanted some of your words on his skin and asked my opinion. I recited my favorite line so far in your new book: Without birds I’m dead.
He got it inked on his forearm, over an existing tattoo of a chubby robin. I opted for a mountain range on my wrist. (The Missions—I’m sure you know them.)
The next Sunday was Easter. Back home in Missoula, I was driving the kids home from an egg hunt when my Texas friend messaged me these two words: Jim’s gone.
I asked him what he meant, though I knew. I spent the rest of the holiday holed up with your books, attempting to wrap my brain around you returning to earth.
And he wants to write poems to resurrect god,
to raise all buried things the eye
buries and the heart and brain, to
move wild laughter in the throat of death.
When your obituary came out a few days later, I was stunned to discover you were recently widowed, and that Linda, your wife of fifty-five years, had died less than a year before, in the month of October when I last wrote to you. People claimed you were heartbroken when she died, unable to stay here without her.
Though I had assumed you long divorced—solo in this world—you’d had a primary relationship lasting longer than my lifetime. Now your story made a more practical kind of sense, and I immediately wanted to know Linda’s story. The childrearing. A private life lived alongside a public man. I wondered how she felt as you built book after book on her foundation. Your wife, I think, must have been a quiet kind of extraordinary.
More than anything, I am here to tell you about your death, because I know you wondered when you were alive.
What will I die with in my hand?
A paintbrush (for houses), an M15
a hammer or ax, a book and a gavel
a candlestick
tiptoeing upstairs.
A pen, Jim. You died in the saddle, mid-poem in Livingston, pen in hand. What a death. A life. A victory, for you and for all of us swept up in your current. What a wild and wondrous ride instead of the short, bright jaunt that might have been, like your Yesenin or my Plath—lights self-extinguished, leaving us all to wonder, what if?
We all change our minds Berryman said in Minnesota, halfway down the river.
Thank you for staying as long as you could, and for giving me a map to navigate the glorious earth in those dark days when I’d have rather been elsewhere, so that I can be here now, fingers on keyboard (because that’s how I do it), with a stack of your books tall as my daughter and the leaves outside my window singing their death song in brilliant color, so long it has taken me to write you this simple last letter.
Harrison, Jim. Dead Man’s Float. Port Townsend: Copper Canyon, 2016.
Harrison, Jim. Just Before Dark. New York: Houghton Mifflin, 1992.
Harrison, Jim. Selected and New Poems. New York: Delacorte, 1982.
Rumpus original art by Alison Stine.
Melissa Stephenson’s writing has appeared in publications such as Lit Hub, the Washington Post, ZYZZYVA, and Fourth Genre. Her memoir, Driven, was released by Houghton Mifflin Harcourt in July of 2018. She lives in Missoula, Montana with her two kids. More from this author →
|
global_01_local_1_shard_00001926_processed.jsonl/43821
|
graphlab.kmeans.create(dataset, num_clusters=None, features=None, label=None, initial_centers=None, max_iterations=10, batch_size=None, verbose=True)
Create a k-means clustering model. The KmeansModel object contains the computed cluster centers and the cluster assignment for each instance in the input ‘dataset’.
Given a number of clusters, k-means iteratively chooses the best cluster centers and assigns nearby points to the best cluster. If no points change cluster membership between iterations, the algorithm terminates.
dataset : SFrame
Each row in the SFrame is an observation.
num_clusters : int
Number of clusters. This is the ‘k’ in k-means.
features : list[str], optional
Names of feature columns to use in computing distances between observations and cluster centers. ‘None’ (the default) indicates that all columns should be used as features. Columns may be of the following types:
• Numeric: values of numeric type integer or float.
• Array: list of numeric (int or float) values. Each list element is treated as a distinct feature in the model.
• Dict: dictionary of keys mapped to numeric values. Each unique key is treated as a distinct feature in the model.
Note that columns of type list are not supported. Convert them to array columns if all entries in the list are of numeric types.
label : str, optional
Name of the column to use as row labels in the Kmeans output. The values in this column must be integers or strings. If not specified, row numbers are used by default.
initial_centers : SFrame, optional
Initial centers to use when starting the K-means algorithm. If specified, this parameter overrides the num_clusters parameter. The ‘initial_centers’ SFrame must contain the same features used in the input ‘dataset’.
If not specified (the default), initial centers are chosen intelligently with the K-means++ algorithm.
max_iterations : int, optional
The maximum number of iterations to run. Prints a warning if the algorithm does not converge after max_iterations iterations. If set to 0, the model returns clusters defined by the initial centers and assignments to those centers.
batch_size : int, optional
Number of randomly-chosen data points to use in each iteration. If ‘None’ (the default) or greater than the number of rows in ‘dataset’, then this parameter is ignored: all rows of dataset are used in each iteration and model training terminates once point assignments stop changing or max_iterations is reached.
verbose : bool, optional
If True, print model training progress to the screen.
out : KmeansModel
A Model object containing a cluster id for each vertex, and the centers of the clusters.
See also
• Integer features in the ‘dataset’ or ‘initial_centers’ inputs are converted internally to float type, and the corresponding features in the output centers are float-typed.
• It can be important for the K-means model to standardize the features so they have the same scale. This function does not standardize automatically.
>>> sf = graphlab.SFrame({
... 'x1': [0.6777, -9.391, 7.0385, 2.2657, 7.7864, -10.16, -8.162,
... 8.8817, -9.525, -9.153, 2.0860, 7.6619, 6.5511, 2.7020],
... 'x2': [5.6110, 8.5139, 5.3913, 5.4743, 8.3606, 7.8843, 2.7305,
... 5.1679, 6.7231, 3.7051, 1.7682, 7.4608, 3.1270, 6.5624]})
>>> model = graphlab.kmeans.create(sf, num_clusters=3)
|
global_01_local_1_shard_00001926_processed.jsonl/43839
|
Simon unlocked a badge!
Hopped Up
Load up those hops, watch the IBU grow and drink it down! Now you’re all hopped up. The more bitter, the better. That's 5 different beers with an IBU of 65 or higher. Try 5 more for Level 2!
Sat, 16 Sep 2017 01:49:00 +0000
|
global_01_local_1_shard_00001926_processed.jsonl/43901
|
@INPROCEEDINGS{scharl2011, publisher={Brazilian Computing Society}, title={Scalable Annotation Mechanisms for Digital Content Aggregation and Context-Aware Authoring}, abstract={This paper discusses the role of context information in building the next generation of human-centered information systems, and classifies the various aspects of contextualization with a special emphasis on the production and consumption of digital content. The real-time annotation of resources is a crucial element when moving from content aggregators (which process third-party digital content) to context-aware visual authoring environments (which allow users to create and edit their own documents). We present a publicly available prototype of such an environment, which required a major redesign of an existing Web intelligence and media monitoring framework to provide real-time data services and synchronize the text editor with the frontend’s visual components. The paper concludes with a summary of achieved results and an outlook on possible future research avenues including multi-user support and the visualization of document evolution.}, author={Scharl, Arno and Hubmann-Haidvogel, Alexander and Wohlgenannt, Gerhard and Weichselbraun, Albert and Dickinger, Astrid}, year={2011}, pages={376-380}, eprint={http://eprints.weblyzard.com/32/1/scharl2011%2DscalableAnnotationMechanisms.pdf}, address={Porto de Galinhas, Brazil}, keywords={Content production and consumption, context-awareness, classification, real-time annotation, collaborative authoring}, booktitle={Proceedings of the 10th Brazilian Symposium on Human Factors in Computer Systems \& 5th Latin American Conference on Human-Computer Interaction (IHC-CLIHC-2011)} }
|
global_01_local_1_shard_00001926_processed.jsonl/43912
|
Pot pourri
Rosamundi has been talking about her three favourite prayers. Apparently this is some kind of Caholic internet memey thing. Ever one to follow trends, unless they involve clothing or Boris Johnson, here are my three favourite prayers:
(1.) The Mass
This might seem either lazy, or pious in a sickly way, or just straight out of Father Ted. But I’ll risk all of those. Strictly speaking, the only Christian prayer is the prayer Christ makes to the Father, expressing that love which we call the Holy Spirit. We participate in that prayer by grace, even as we do not understand it, because we do not understand God. Prayer is emphatically not a matey chat to my best friend, as Christianity lite has it.. As far as this life goes I am, as Thomas puts it, united to God as to one unknown. The danger is not only one of minimising God and denying our creatureliness; there is also the worry that if I think I am in a personal relationship with God qua friend, I might think that I have comprehended her. And then I might be all too confident he is telling me to do daft things (example: invade Iraq). Better to let God be God, and to let ourselves be transformed by God in God’s humanity. The Mass is where the sacrificial prayer of Christ, the human being who is God, is made sacramentally present. It is the Church’s prayer above all else – all other prayers lead to it, and flow from it.
(2.) The Divine Office.
Reasons as follows. The corporateness of it all. The richness of scripture. The fact that it can be more or less meditative depending on one’s sate of alertness. And my ability to recite it with a cup of coffee in one hand.
(3.) The Angelus
A tricky one. Like Rosamundi, I’m going to cheat by explaining my deliberation. I nearly went for the rosary, for many of the same reasons as the office, plus a lurking fear that I would be a Bad Dominican if I didn’t mention the beads at some point. However, I’ve gone for the Angelus. It is a simple prayer, profoundly incarnational, and the collect at the end sums up the whole gospel of redemption: incarnation, cross, and resurrection:
The Angel of the Lord declared to Mary:
And she conceived by the Holy Spirit.
our death. Amen.
Behold the handmaid of the Lord: Be it done unto me according to your word.
Hail Mary . . .
And the Word was made Flesh: And dwelt among us.
Hail Mary . . .
Let us pray:
There is a very interesting piece in today’s Observer by Padraig Reidy, I’m an atheist but this anti-Catholic rhetoric is making me nervous
Last night I went to a vigil and meeting in support of the campaign for justice for Sean Rigg. Sean was a young black man who died in police custody in Brixton two years ago. The dignity and resolve to discover the truth on the part of his family are both moving and inspiring. I’d encourage you to support the campaign in any way you can.
Tags: , , ,
2 Responses to “Pot pourri”
1. rosamundi Says:
I could be rotten and point out that The Mass is explicitly excluded.
2. Simon Says:
Oh right, well in which case the rosary avoids relegation. St Dominic be praised!
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/43914
|
Posts Tagged ‘teddy bears’
A pleb writes
August 24, 2010
This weekend, one of Britain’s leading supposedly left-wing blogs carried the following astonishing claim about the social composition of British Catholics:
And as a result, Scotland, Liverpool, Manchester and North London developed a substantial Irish Catholic, population.Which is where the problem lies. If you’re not from those parts of the UK, Catholics are simply crazy posh Evelyn Waugh types, who’ve decided that pointless treachery would be better than just admitting that an evil foreign overlord wasn’t really worth following.
This was supposed to mitigate earlier claims in the liberal blogosphere to the effect that Catholics are generally superstitious and feckless fenian layabouts, which the over-sensitive amongst us may have construed as being racist. Sentimental souls, us Catholics. Thus absolved from the threat of appearing to be a bigot, our author is free to tell us that
On the one hand, the Catholic Church is one of the most revolting institutions ever to have existed, second only to the USSR in terms of ‘well-meaning ideas invented by a nice chap that you could have enjoyed a cup of tea with, taken up by insane evil egomaniacs and turned into an excuse for tyranny and genocide’.
Causing sighs of relief to be breathed throughout the United States of America. How about that? From Jefferson to Gunatanamo, and you still don’t make it into the top two betrayers of founding principles. Nonetheless, I’ll swap you hawking indulgences for Hiroshima.
I digress. Sadly, contra the claim about British Catholics, the closest I get to being an Evelyn Waugh type is having a teddy bear I am rather fond of. In particular I was denied the benefits of a public school education. Not only does this mean that I am unable to understand what is so palpably clear to my betters: example, how cutting public spending at the present stage in the business cycle is anything other than a very bad idea, it also means that I lack elementary reading comprehension skills. Thus, when Rosamundi wrote the following on her blog:
“Name your three most favourite prayers, and explain why they’re your favourites. Then tag five bloggers – give them a link, and then go and tell them they have been tagged. Finally, tell the person[ahem – people] who tagged you that you’ve completed the meme… The Liturgy and the Sacraments are off limits here. I’m more interested in people’s favourite devotional prayers.”
I completely ignored the bit about excluding the liturgy. The angelus and the rosary stay in. But since I now have a free slot, I’d like to give a mention to the Prayer to the Holy Spirit:
Come Holy Spirit
V. Send forth your Spirit, and they shall be created.
R. And You shall renew the face of the earth.
Let us pray.
I tend to say it before mass. I’ve always liked it. Scriptural and simple; drawing on the liturgy, yet capable of being made personal.
Incidentally, I doubt that most Guardianista types would have enjoyed having a cup of tea with our Lord. Bringing a sword rather than peace, and declaring the powerful of this earth to be cursed, is hardly the kind of stuff which goes down well over croissants in Hampstead. That, however, is another post. I must away to do the research which you, the long-suffering tax-payer, pay me to do.
|
global_01_local_1_shard_00001926_processed.jsonl/43915
|
Category:Belvast Island
From Mabinogi World Wiki
Revision as of 11:43, 16 April 2016 by Info (talk | contribs)
Jump to: navigation, search
Belvast redirects here. For the Commonwealth of Belvast, see Commonwealth of Belvast.
...Belvast, the land of opportunity of danger.
There, all stories begin and end.
—Prologue of The Merchant of Venice
Belvast Island, also known as Belfast Island, is an Island located between Uladh and Iria, divided into four parts: the Commonwealth of Belvast, the Beach of Scathach, the Avalon Gate, and the Tory Ravine. It can be reached by the ship in Port Cobh or Continent Warp, which leads to the Commonwealth.
It is known that Belvast Island is surrounded by powerful ocean waves; not many boats had survived the powerful impacts created by the water.
Belvast Island is known to host the wealthiest merchants. Additionally, non-violent Fomorian Ogres, Goblins, and Imps live within Belvast Island, peacefully co-existing with Humans while introducing the Commerce.
Fifty years ago, Belvast Island was populated by a band of pirates, who kidnapped children and enslaved them. One of the slaves was Ascon. Many years later after Ascon's kidnapping, Admiral Owen led an assault on Belvast Island by using Hot-Air Balloons and was victorious within three days, freeing Ascon from slavery.
Belvast World Map.png
This category has only the following subcategory.
Pages in category "Belvast Island"
|
global_01_local_1_shard_00001926_processed.jsonl/43947
|
Reimage Repair Key + Setup Download Full Version
Reimage Repair Key And Setup Download
Reimage Repair is the program which is used to detect, fixes and repairs the viruses which come in your system. Reimage Repair is an antivirus which is installed by the user to save the system from getting affected by viruses.
Reimage Repair Key
Reimage Repair Key is available which makes the software genuine. Initially, user gets the trail version which helps the user to understand the functionality of the software and once the trial version is over, user is suppose to buy the licence key to make the anti virus genuine.
Reimage Repair Key
Reimage Repair Key makes the software genuine and user is able to install every updates which ever come up in reimage. Reimage repair protects the system from threats and virus which harms the system. These viruses are caught by the software and are removed from the system.
Reimage Repair Key
There are many files and folders which get affected by viruses so reimage repair tries to fix the damage file either by repairing the file or folder or else by deleting the file or folder. Reimage Repair Key runs on windows operating system. There are many sites which provide crack serial number which makes reimage repair to be genuine but most of the cracked serial numbers or websites have virus in it which damages your system.
Reimage Repair Key is available on the official site of reimage where user is supposed to purchase the software and after purchasing software, user will get the serial number. This is a genuine serial number which keeps your virus activated and allows the system to download and install the latest updates which come up in software. These latest updates which are installed by the users keep the system safe from new and various viruses.
Reimage Repair Key
Download Links:
1. Click Here To Download
Reimage Repair Key can be installed in Windows 7 and above operating system and it is compatible to both 32 bit processor and 64 bit processor.
|
global_01_local_1_shard_00001926_processed.jsonl/43958
|
Frequently asked questions for self help.
Knowledge base article 148
Error "W048F32W.DLL Not Found" (or similar)
Cause: The needed import/export filter has not been installed.
The standard install of Ability Write comes with import filters for Microsoft Office files (97 and later, DOC and DOCX), HTML, plain text and RTF. For other file types, additional import/export filters will be required.
Additional import filters are available by seperate installation of the following:
Version 8 Ability Import/Export filters - setup.exe
Version 7 Ability Import/Export filters - setup.exe
Note: the installer defaults to the Ability Office 7/8 install folder. If you have an earlier versions, please use the Options button in the installer dialog to locate the correct folder.
A full list of the filters in the above follow:
Lotus WordPro (96/97) Microsoft Works (up to version 3.0)
Microsoft Word (95 and earlier) WordPerfect (up to version 6.0)
Windows Write AmiPro (up to version 3.1)
Claris Works NACY DIF
COM OfficeWriter
CTOS DEF Peach Text
EBCDIC Quattro Pro
Enable Rapid File
Excel Samna Word/HP Adv Plus
FFT VolksWriter 3,4 & TW
Frame Maker MIF VolksWriter Deluixe
Frame Work Wang II SWP
Interleaf Wang PC
Interleaf 5 - 6 Wang WP Plus
Legacy, Winstar, onGo WITA
Lotus 123 WiziWord 3.0
Mac Word 3, 4, 5 WordPerfect Mac 1
Mac Write 4.x, 5.0 WordPerfect Mac 2
Mac Write II Wordstar
MacWrite Pro Wordstar 2000
Manuscript WPS-PLUS
MASS 11 WriteNew 3.0 (Mac)
MS Works 4.0 Mac Writing Assistant
Multimate XyWrite Signature
For a list of filter codes, please see filters.pdf. This list can be useful in identifying what the real document format is (for example, a .doc file could be from Word WordPerfect, RTF etc).
|
global_01_local_1_shard_00001926_processed.jsonl/43975
|
This is Simulation Theory Reality.
With the power to simulate anything, everything becomes possible.
Aether Engine is a hyper-scale simulation engine giving you the power to model everything from universes to atoms.
Sign up to get early access.
Connect thousands of players.
There is no doubt that streamed, connected, cross-platform multiplayer experiences are the future, but why should they be limited to one hundred, or even one thousand people in game? Why not shoot for ten thousand and beyond? What could we learn? What new game mechanics could you build?
Watch the demo
Join us @ GDC 19
We're at GDC 19 Stand S366. Come and visit us to to learn about the projects we're working on, and see the latest Aether Engine tech demonstrations.
Book your meeting
Create millions of entities.
With the power to simulate everything, you can combine genres in a single persistent game. There's nothing stopping the debris from an intergalactic space battle interacting with a first person shooter at ground level.
Multi-scale Physics
Inspired by IMAX The Powers of Ten, we wanted to go beyond the observable, and simulate gravity, collisions, and fluid dynamics at multiple scales. The distributed nature of Aether Engine is giving the Francis Crick Institute the power to simulate animated three-dimensional models of cancer cells undergoing metastasis.When we said from universes to atoms we meant it!
Introducing Aether Engine
These massive immersive simulated experiences are now possible. Aether Engine makes use of the highly efficient octree data structure and, thanks to it's unique design, it is capable of subdividing 3D space across CPU cores and maintaining a consistent player experience. This means you can now create vast sandbox universes without any complex operations or engineering.
Powered by HadeanOS
The cloud-first operating system engineered for bare-metal performance across massively distributed computing infrastructures.
No Middleware
HadeanOS understands distributed computing. It doesn't require the complexities of middleware for distributed programs - it scales easily.
No Bloat
HadeanOS is only a few thousands of lines of code. It does away with all the bloat contained in traditional operating systems - making it more reliable.
No Black Boxes
HadeanOS is source included. No two distributed simulations are ever the same so we've included the source code - giving you flexibility to customise.
|
global_01_local_1_shard_00001926_processed.jsonl/43983
|
One Thing at a Time
It's been pretty well established now that multitasking isn't really a thing. Answering emails while studying for your finals just means you're doing both of those things poorly. At best, you're at 50% productivity with each activity. It saves more time in the long run to only answer emails, then when you're done, only study for your finals. I guess you should probably do it in a different order though.
This runs directly counter to my wish to be doing everything at once. I like to think that my pursuits are noble enough; I'm trying to finish Susan Wise Bauer's The History of the Ancient World, while teaching myself Spanish, while learning how to code, while trying to stay fit despite a shoulder injury.
Tension comes most when I have a lot of free time. There is an effectively infinite number of cool things in the world for an aspiring dilettante—a Jack of Some Trades—to try, but since we can only do one thing at a time, it seems imperative that we do the "right thing", which leads to a lot of time wasted on flitting between one project and the next, afraid of committing too much to one thing because there will be (∞-1) things you are neglecting when you do it.
This is an emotional response, and one I have frequently. I know I am not alone in this. The important thing to do is to recognize that ultimately this desire to do everything is itself a form of inefficiency. If we really want to be productive, we must cultivate the skill of committing fully to the task at hand, and detaching fully from it once we are done with it.
Ultimately, this is the idea behind my Year of 12 Habits. Commit fully to the habit, and if it sticks after a month, great, and if not, there is something else for you to do. I'm happy to report that some of my habits have stuck since January. I'm certainly not 100% on any of them, but by focusing on one thing at a time (on a macro level) I've been able to literally change my life for the better.
All we can really do is adopt that process and refine it. But even if I didn't improve beyond today, I am still a better person than I was five months ago.
Jack name.png
Update: Reading is Easier than Writing
I find I am very capable of setting aside 20 minutes to write.
Actually writing something in those 20 minutes is a separate challenge.
The projects that I should be focusing on (the ones that have some potential of making me money) prove the most difficult. The ones that are fun (D&D-related) are a lot easier to get lost in. What is the secret to (a) making necessary things fun, and/or (b) finding the willpower to sit down and write stuff that I don't immediately want to write? I don't know.
But that's kinda the point, write? It's one thing to consume information (e.g. reading a book), but it's another thing to create your own information, whatever it might be (e.g. writing a song). Even if you're reading the best book in the world, I'm becoming increasingly convinced that even that is not as important than creating "content", whatever it might be. The best book in the world might inform your creation in a way, and of course there is a spectrum of the quality of all possible content you might create, but it seems to me that producing is always better than consuming.
"Eat to live, don't live to eat", as it were.
I wonder if this is, quizás, a microcosm of life itself. There is a spectrum of quality of consumption and a spectrum of quality of production. It's certainly possible to create a stupid product that serves no real purpose, but simply the act of creating it already places the creator a notch higher on the hierarchy of needs (or what have you). I'd much rather have carved a shitty wooden spoon that have purchased a shitty wooden spoon.
So, my advice to myself (and anyone else who cares to borrow it) is to consume what is necessary and is of high quality, and to focus life energy on making things.
Hey, look, I just created a whole post!
Jack name.png
Time flies when you aren't blogging
frustration_zpsde5ab9fd (1).jpg
So, I haven't written here in two months.
Here's a quick summary:
I procrastinated choosing March's resolution for so long that I ended up not deciding on one. This pissed me off. However, the basic tenets of my previous two habits have seemed to stick, which is the whole idea.
I made up for it in April, choosing the habit of practicing Spanish on Duolingo (at least 50 XP) every day. This has gone smashingly well. Duolingo is an incredibly designed piece of software that makes it easy to stay on track (lots of checkable boxes available, which is my kryptonite).
Real quick Duolingo tip: look at the screen as little as possible. Most of the translation prompts are audio-based as well as text-based, and I figure whenever I do speak Spanish in real life, I'm going to be hearing it a lot more than I'll be reading it. Listening to the audio makes me have to reconstruct the sentence in my head which, I believe, leads to much greater comprehension and learning. And never cheat and hover over a word to get its English definition. Just guess, get the question wrong, and it'll stick way better up in your noggin.
So what's May's goal?
Well, like I mentioned, I took two whole months off from blogging. And so far we have only finished four months of 2018. This is a poor success/failure ratio. That, plus me having found myself in the middle of four different writing projects that aren't my blog, I need to get a little more serious. So May's habit is:
I will spend 20 minutes every day writing in one of my projects.
I've found that when I sit down to write for 20 minutes, I actually end up getting hooked with an idea and can end up writing for a lot longer, but I don't want the task to feel daunting. 20 minutes is all that is required for completion.
For those interested, my four projects are
1. A Dungeons and Dragons campaign I am heading
2. An educational TV show I am cowriting with some friends
3. A movie about Nazis I am cowriting with a friend
4. Children's music I am writing with my lovely womanfriend
The TV show and the movie are longer-form projects, so I will not be posting anything here any time soon, but the nature of the music and the D&D may provide manageable mouthfuls from time to time and I will be sure to share here.
Jack name.png
Peace and blessinz.
Lone Wolf Syndrome (latin: outofthe lupus)
ImageUploadedByiMore Forums1453149270.683018.jpg
Man, talking to people is tough.
February didn't go nearly as well as January. It wasn't a complete bust, but I still have some serious work to do.
I really did try, but the habit of "Oh, I'll respond to that later" is so ingrained that I had to catch myself on many occasions. One thing I forgot to implement is to use the Send Read Receipts option on my iPhone that tells other iPhone users if and when I've read their texts. I've kept this off for my entire iPhone career specifically to do the opposite; I didn't want people to see I received their text and hadn't responded, but it turns out this accountability is the only way I will stay in touch with the civilized world. Facebook messages don't give you the option; they're always marked as read or not, and I'm much better at responding to Facebook messages than anything else.
So to all the friends and family I've maligned: I apologize for previous blow-offs, and for the future ones I'll likely commit. HOWEVER, even with all my failings I have been a lot better this month, and I've even been the one to initiate one or two phone calls. In a way, I like it when people don't pick up or call right back, because it makes me feel like I'm not the only one.
Less Stretchie, More Talkie
I did it!
...pretty much!
I'm pleased with how January went. I did not have a 100% completion rate, and for that I'm almost glad. I still felt committed without feeling obsessed, which I think is a great line to ride. And really, there were only a couple days where I missed a thing or two, and no days where I completely failed at everything.
I need to have some way of publicly tracking this stuff. I'm thinking a calendar graphic on the blog where I put a check mark by every day that I do my habit fully and correctly.
For now you'll just have to read my typing.
I was surprised by how little my "8 AM wake time" really mattered. I began rehearsals for a play a few weeks ago, and between that and early morning clients, 8 AM is usually sleeping in these days. When we start doing late night shows, I'm sure this will be more of an issue.
Also, I never missed a meditation, but boy oh boy is it useless to meditate right when I wake up. I don't often fall asleep, but weirdly, my sleepy brain finds it even less easy to quiet my mind than my fully awake brain. It's like the mental muscles it takes to lasso all my thoughts and guide them to a standstill are still getting warmed up, and my thoughts have no accountability on their.
Good to know: Morning is a convenient time to meditate, but not an optimal one.
But I'm through. I celebrated by sleeping in on a day I actually could do so, and deliberately skipping meditation. The Headspace app I use has a counter in it to show how many days in a row you've meditated, and I wanted to break that streak, lest I get too fixated on the number and not the practice.
I'll probably maintain a lot of these habits for the rest of the year (secretly my plan all along). Not too difficult to pull off, even on busy days, and I feel a lot more in charge as I head out for the day.
I will answer texts, calls, and emails promptly. Like, when I get them, or at least within 24 hours.
This is my new habit!
...Yet another blisteringly easy task that is, in fact, extremely difficult for me.
I hate to admit it, but I am that guy who never gets back to you. I'm that guy you have to text three times to get a response. I'm that guy who never RSVPs.
So for this month (thankfully the shortest one of the year), I've decided to reverse that. When I get a text, I will do my absolute best to respond immediately. Calls will be answered and not relegated to voicemail (as is my wont).
Since I've procrastinated writing this post, I already have some insight into what it's like. (Protip: airplane mode may actually be the answer to world peace. Or at least chronic sanity.)
I see why I've fallen into the habit of radio silence. It's just easier. I find myself so afraid to answer a call or text, because then I've committed myself to being "available to talk". Which isn't really such a bad thing, but if you respond to one text, then you gotta respond to the next if it comes right away, then all of a sudden you're stuck in a text conversation when you mean to be doing other things! It cuts down on productivity, dammit!
Okay, let's be real; mostly I just get lazy. I do firmly believe in the above paragraph, but I could be a lot better at talking to the people I've labeled my "friends". If I'm not willing to talk to these people once in a while, can I really call them that?
I can't tell if this is sidestepping the rules, but I've begun to adopt a quasi-Tim Ferriss approach to communication; something he calls "batching". I'll make prodigious use of airplane mode when I'm doing anything that requires attention, but when I'm on a break, eating, hanging out, on the subway, I'll get off airplane mode to be available to talk, and when I'm available, I'm determined to be available.
For the last week I've done pretty well, although putting texts off till later is pretty ingrained into my system. I wish there were some sort of "Mark as Unread" option for texts.
But then maybe my texts would start to look like my email inbox, which isn't exactly a model of organization and promptness.
Jack name.png
Off to the races!
Two Weeks In
My gift is my curse.
One attribute Im glad I have is an ability to stick to clearly defined specifications. I like rules a lot. I think this is why I like editing writing as much as I do. A missing apostrophe or misspelled word sticks out to me like a flashing neon light at a funeral.*
For example. Headspace, the meditation app, logs your "streak", how many days you've meditated in a row. It has this special little icon that gets highlighted once you hit 365 days. No-brainer. One year after I discovered that, I highlighted the damn thing. No problem.
I am not convinced my propensity for checking off boxes is an entirely good thing, though. In obeying the letter, I often ignore the spirit.
Sure, I may keep a daily journal if I've decided that to be my goal, but I'll have a creeping tendency of just scribbling down some nonsense to be able to say "I did this every day", instead of skipping a day if I forget, but committing when I actually do write.
And that's not to mention (since I mentioned in a previous post) such an all-or-nothing attitude is a treacherous thing at best. If I do slip up, there's a much higher chance of me saying "Welp, failed that one."
As with most things, I think the sweet spot is somewhere in the middle. If I can harness my natural tendency to complete things and add a dose of being okay with mistakes, I think I can really tap into serious productivity. "Get knocked down, get back up, but try not to get knocked down in the first place." A nice, albeit cumbersome, mantra.
All this is to say that the first two weeks of my Morning Routine challenge have been a good success overall, but perhaps a little more spirit could be thrown in for the next two weeks.
To clarify, my challenge is to do five things in the morning:
1. Wake up at 8 AM**
2. Stretch my hip flexors
3. Meditate
4. Journal
5. Drink a cup of water
I missed my cup of water on Friday the 12th (finished my first cup of coffee before realizing my folly), but other than that I've stuck very closely to the letter. This is mostly thanks to the leniency of my habit choices.
I think the spirit of the habit needs some work, almost exclusively in the implicit Going to Bed at a Reasonable Time part. I made a whole big thing in the last post about the importance of eight hours, and here I am, not getting to bed before midnight. It doesn't help to share a bedroom with a separate human who has different ideas about what constitutes "late night" and "good sleep" and "white noise", but I really don't blame Melissa for any lack of sleep on my part. And after all, no habit can be followed in a vacuum!
Jack name.png
It's 9:57 PM. I'm definitely getting my butt to bed on time tonight. Until next post!
*You didn't think I noticed that missing apostrophe in paragraph 2, did you? Just checking to see if if your paying attention.
**I actually set my alarm to 8:01 AM. I always set my alarms for odd times to break my tugging desire to have everything on even, pleasant digits, which I'm sure goes back to the whole "sticking to rules and rhythms" thing. But I've been doing the alarm thing for a while now. Never missed a day.
Win the Morning, Win the Day
If you spend enough time in blog/self help book/podcast-osphere, you’ll learn two things.
1. You’ve been doing everything wrong until now.
2. A solid morning routine is the key to everything.
I already knew the first point inside and out, so I figured I’d focus on the second.
I’ve never had anything close to a 9 to 5 job in my life. I've rarely even had a consistent schedule for more than a month or two. Sounds pretty great, right? Little structure, lots of freedom, plenty of room for creativity and fostering a sense of childlike wonder?
These things are always better in theory than in practice. We yearn for vacations and dream of being self-employed, then feel like shit when we sit around and do nothing. This doesn't have to be the case, but it takes some serious self-awareness and discipline to avoid it.
The grass is always greener, right? I haven't had a 9-to-5 and am often in charge of planning my own schedule, which might sound like a dream. However, I think the value of a 9-to-5 (or a structured workweek/workyear/worklife) is HIGHLY underrated. Knowing exactly where you'll be at 3:45 PM on Thursday can be extremely helpful when you would like to plan other things. Having a job that begins at the same time every day means you always know when you have to hit the sack the night before for a good night's sleep. (It should, anyway.) 40-hour workweeks are probably not the most theoretically efficient use of one's time, but they ain't bad, and it takes a pretty motivated person to beat it.
So I guess that means I gotta get motivated!
So here's January's challenge:
Create and stick to a morning routine. This will include five things:
1. A consistent wakeup time
2. A couple minutes spent on physical mobility
3. A mindfulness practice
4. A nutrition practice
5. A journaling practice
Of course, my instinct is to have twice as many items and do each of them twice as intensely, but we're going for longevity, right?
Here's what I picked:
1. Wakeup time: 8 AM
2. Mobility: active hip flexor stretch, 1 minute/side
3. Mindfulness: 10 min of Headspace
4. Nutrition: a mug full of water before I drink any coffee in the morning
5. Journal: Five-minute journal
In total, this takes me about 20 minutes to accomplish.
Unimpressed yet?
• Wakeup time: I chose 8 AM because among other things, I'm an actor, and shows usually let out between 10 and 11 PM. If I factor in a commute time, I'll be lucky to get to bed by midnight to get my 8 hours. And getting a full night's sleep is far more important than impressing anyone with an early start time. I'm not impressed by anyone consistently waking up at 4:30 AM unless they also consistently go to bed at 8:30 AM.
• Mobility: Even though I have a standing desk, my hip flexors are pretty tight, and they like to let me know. I have a host of muscles I'd like to make more mobile, but loose hip flexors = happy back, and I think that takes precedence over other parts of my body.
• Mindfulness: There's overwhelming research to support the benefits of meditation. Honestly, I don't really like meditating right after I wake up, because I'm usually still groggy and my mind isn't ready to focus up. But I'd rather do it half-focused and consistently than gamble on another part of the day. I use the Headspace app. I've heard people enjoy Calm as well.
• Nutrition: I drink too much coffee and not enough water. It's easier to add something in than it is to take something away, so that's why I started with that. Later this year I may do a separate month challenge entirely dedicated no coffee!(!!!!) I'm still waiting to hear back from my sponsors if that's feasible, though.
• Journal: The brand name Five-Minute Journal is actually pretty superfluous; you can just as easily write these things on a piece of paper. But it's nice to have everything in one place, with the prompts all written out. Check it out here if you're interested. (Don't worry, no affiliate links here. But it's not that I'm against them; I just don't know how to do them yet. I'm no hero.)
Your homework:
Fill in the five items of your own personalized morning routine and comment below. I will mail $3 to the first person who does this.
There and Jack Again
Hello. I am Jack of Some Trades.
I like music, food, the outdoors, and a good, inky pen. I like Legos and squats.
I don't like when people use the word "nonplussed" incorrectly, and I don't like New Year's resolutions. That's actually why I'm starting this blog on January 4th.
I'm gonna be doing some stuff over the next year or so. Feel free to watch.
(But I'd prefer if you participate.)
* * *
I'm a jack of some trades. I find that a person who refers to himself as a "jack of all trades" is actually just a jack of some trades like me, and perhaps his assessment of jackery is not up to my standards. I like things and am good at some of them, but it would be foolish to say I'm good at all of them or a master at any of them.
This blog is an attempt to document a few trades I'm trying to be jacker at. I don't expect to be a consummate anything by the end of this year... but consummation is not my goal.
I remember reading somewhere that something like 92% of New Year's resolutions fail. I will not be one of them, because none of these are year-long resolutions. Interested? READ ON!
I've spent several years as a personal trainer, and one of the biggest problems people run into is the "all or nothing" attitude. Everyone writes down 47 well-intentioned resolutions, then watches helplessly as each of them fade into the anemic wishes they once were by February.
Not today, Satan!
Here's the plan:
Each month of 2018 will have a single challenge (usually a daily habit) I'll dedicate myself to. The challenges will range widely. At the end of every month, I'm off the hook; I can continue the habit if I want to, but I'm not obligated to do anything beyond a month of dedication. For instance, January's challenge is to follow a productive morning routine (I'll cover it in the next post). Among other things, it includes waking up by 8 AM every morning.* On February 1st, I can sleep in as late as I want!
I won't get too wordy in this first post, but please enjoy if you dare. Comment, like, retweet, subscribe, blah blah blah. Honestly I don't even yet know how to direct you to sign up for email notifications of new posts and stuff. I'll figure it out later. Honestly, if you know my mom, it would probably be better just to ask her. I'm half-joking.
See you in a day or two,
* If 8 AM seems extremely late for an early morning challenge, then I definitely encourage you to read the next post. I have my reasons, you jerk.
|
global_01_local_1_shard_00001926_processed.jsonl/43985
|
International and Cell Phones: (541)701-0600
Vessel Sailing Calendar
We have a staff of travel professionals standing by 7 days a week to answer your questions and assist you with your Alaska travel plans. Not sure where to start? Let a Tour Specialist send you a sample itinerary of one of our Alaska tours. Look it over, and then tell us what you would like to add or do differently. We are here to help you with your travel on the Alaska Ferry, adventures or lodging.
(800)526-6731 Toll Free US or Canada
(541)701-0600 International or cell phone
Questions? Call us in Alaska or send us an email to
Based in Homer, Alaska
Unique Tours of Alaska
|
global_01_local_1_shard_00001926_processed.jsonl/44020
|
Israel and the War Profiteers
Frida Berrigan on “Democracy Now” radio:
In short, the U.S. is paying for Israel’s brutal invasion of Lebanon — and American war profiteers are making piles of money. It is militarism as an economic system, what one might call “war capitalism” — which is, in reality, totally state-controlled and politically determined, as far from the system of free enterprises as a nation could possibly get, short of Lenin’s “war communism.”Â
|
global_01_local_1_shard_00001926_processed.jsonl/44141
|
The Future of Web Content Management
With Mark Grannan, Senior Analyst at Forrester
Building, launching and scaling multi-channel digital experiences is a core competency required for every modern organization. However traditional web CMSes built to serve only a single channel can no longer help you in this journey.
Mark Grannan, Senior Analyst at Forrester, has kept his finger on the pulse of the Web Content Management industry for years. In this webinar, Mark shares his insghts about the major DX challenges that organizations are facing today. In addition to that Mark dives deep into the actual WCM capabilities that help organizations propel their digital growth and get ahead of the competition.
Watch this webinar to learn:
• How WCM technologies are evolving
• What capabilities digital leaders expect from a modern web CMS
• How to select a web CMS that suits your organization’s needs best
|
global_01_local_1_shard_00001926_processed.jsonl/44151
|
How much salt to boil 30 pounds of peanuts?
How much salt do you use for 30 pounds of peanuts?
Comments for How much salt to boil 30 pounds of peanuts?
Click here to add your own comments
Oct 15, 2016
It depends on the amount of water used
by: Boiled Peanut World
The amount of salt needed to boil 3 pounds, 30 pounds, or 300 pounds of peanuts depends on the amount of water used, not the weight of the peanuts. It is the concentration of the salt in the water that determines the saltiness of boiled peanuts.
Our recommendation is to start with 1/2 cup of salt per gallon of water used. Adjust the amount of salt to your taste.
Read more about the amount of salt required to boil peanuts here.
May 04, 2017
Good Gobers
by: John Boy
I've been boiling green peanuts for a lot of years. I use 3 pounds of salt per bushel which is 35 pounds, and boil for at least 3 hrs.
Jun 18, 2017
boiled peanuts
by: Anonymous
I cook peanuts by the bag and use a 100qt pot. I usually add a box of salt and about 1/2 box of rock salt to the pot. I boil for about 2 hours then let cool overnight in the pot. They usually come out great. I bag them in 1 gallon ziplock bags and put them in freezer. When I want some I get a bag out and either boil them for a few minutes or eat them cold. They are good either way.
Aug 25, 2017
peanut salt
by: Anonymous
I boil my peanuts from green and add a box of salt regular table salt and a box of rock salt for a 35 lb bag of peanuts. I boil them for about 1.5 hours at a rolling boil then turn off and let soak for about 1 hour before bagging them up in quart zip lock bags for freezer.
The last time I boiled them using a box of regular salt and a box of kosher salt along with one bag of zatarans crab boil. They were good but I think I prefer the rock salt recipe over the kosher salt and crab boil using the 100 quart pot with water up to within 3" of the top the crab boil wasn't really noticeable but being the first time using it I didn't want to mess up 35# of peanuts to try it.
Click here to add your own comments
|
global_01_local_1_shard_00001926_processed.jsonl/44153
|
Visiting Death Part 4
More Details
Status: Finished | Genre: Fantasy | House: Booksie Classic
Kendra and Jackson explore a bit further.
Submitted: February 28, 2012
A A A | A A A
Submitted: February 28, 2012
I had so many questions, I didn’t even know where to begin.
“How? How do you blend in? When I saw Melsone in my dream she was just… indescribable. When she touched the water she BECAME the water, and when she stepped on land she was the most beautiful woman I’d ever seen. Please, tell me.”
He just stared at me, head cocked to one side.
“All in due time,” was all he said.
“All in due time!,” I shouted. “I killed someone, my fingerprints are at his apartment! I’m going to get arrested, I really don’t want to go to prison, being locked up for soliciting myself is bad enough in a jail cell full of women, believe me.”
“Your mess is being cleaned up, so don’t worry. It’s a lot larger than we thought though,“ He stood up gracefully from where he was standing. “We knew about the man, We heard him, but we thought nothing of it until we realized he wasn’t by a large body of water, a lake; ocean; river.” Jackson started to walk and I followed like a lost puppy.
“Aren’t you going to take your violin?”
“It’s not mine”
“Oh,” I said.
“What do you mean you heard him? He didn’t talk while I was playing from what I remember. He just looked at me, and eventually fell asleep. And what do you mean larger than you thought? It was one person.”
“Like I said Kendra, All in due time.”
We walked for what seemed like hours in silence till I couldn’t take it anymore.
“Jackson, right? You’ve got to tell me something, even if it’s just something small. What do you mean by bigger than you thought?”
“Mr. Edwards wasn’t the only one who meant an unseemly death that night Kendra. Everybody who heard your culling is dead. Where did you play your song if you don’t mind me asking?” he said.
“I……. I played it downtown, on 5th and Main St.” Shock flew across my face, I knew what he was getting at. “Wait… Everybody who heard it is dead?! How? I…. I didn’t come to anybody’s dreams like Melsone did me. I just sang…. “
“You sang with passion, you played with hope, desire. We’re still trying to figure out who you are, why after so many years this is your first culling. It’s natural for us, but for you it’s selective.” Jackson looked at me and I looked back at him. His face was so bright, glowing almost. Cheeks a deep pink, lips the same shade. “Curb,” he said.
“Wha…” I tripped, kind of. I didn’t see the curb, but inches before my face hit the pavement, Jackson caught me with one hand. He was incredibly strong, my whole body was nearly floating inches above the ground except my knees which were barely touching. “Thanks,” I mumbled. He lifted me up off the ground and back onto my feet. “Let’s go find out how many people heard your song.” “How do we do that?,” I said genuinely curious.
“Traffic camera, do you ever stop asking questions?” he said with one eyebrow raised.
After watching the traffic cams in a fast-forward time lapse, we were able to estimate the number of people who heart my culling. 1,485 is the ridiculous number Jackson came up with. How? No fucking idea. He suggested we go back to the corner, to see I could see a visual change in the number of people that possibly took that route on a daily basis.
“Are you trying to say, all of these people are dead or are going to die?” I said as we walked side by side to the corner where this all began.
“No, it’s possible some of them were hard of hearing, deaf, wearing headphones, numerous other possibilities, Kendra. All I know is, the numbers are high enough to gain the attention of the First Three.”
“Ugh! I didn’t do it on purpose! Can’t you just tell them that?”
“No, they’re not after you to harm you, Kendra. They want to protect you from the muses until you prove yourself worthless to them, then, maybe, they will kill you,” he said with a crooked smirk.
The smell in the air had changed suddenly, and rain clouds became visible over-head. Jackson’s face showed a flash of fear, then in the same instant, he regained his blank expression.
“What’s wrong?” I asked.
His two toned eyes stared into mine and he said, “we have to get somewhere dry, I don’t want to be exposed this early in the day”
“What the hell does that mean, exposed? You’re not going to melt like the wicked witch from the west are you?” I laughed at my own attempt at humor.
He chuckled. “No I won’t melt little girl, I will just no longer be able to glamour myself.”
I raised a brow in confusion, and he saw it and sighed.
“I’m wearing an illusion, a human illusion, to be able to walks amongst you, and I’m actually the best. But no matter how good a siren is at glamour, water cannot hide us, it’s our natural habitat.”
“So…. You’re makeup runs?” I started to laugh while walking and glancing over at him.
He looked upset, so I stopped and faced ahead.
“We’re here,” Jackson announced.
The street was not the vibrant loud intersection I remembered. Cars were passing, and people were walking, but not in the mass numbers like before. Jackson and I both looked at each other, each of us baring the same look of shock.
“We have to go,” he said with a hand held out, waiting for me to grab it. I did.
© Copyright 2018 deathbyspoon. All rights reserved.
Add Your Comments:
More Fantasy Short Stories
|
global_01_local_1_shard_00001926_processed.jsonl/44160
|
Sometimes, being different feels a lot like being alone. But with that being said, being true to that and being true to my standards and my way of doing things in my art and my music, everything that has made me feel very different... in the end, it has made me the happiest.
Lindsey Stirling
Author Profession: Musician
Nationality: American
Born: September 21, 1986
Find on Amazon: Lindsey Stirling
Cite this Page: Citation
Quotes to Explore
|
global_01_local_1_shard_00001926_processed.jsonl/44176
|
Foie Gras and Truffles Are OK -- and Other Ways to Win Tonight's Burger Contest
The Kansas City Barbeque Society -- the United Nations of barbecue contests -- has just three simple categories for its judges: taste, appearance, and tenderness/texture. Even still, judges and contestants in nationwide KCBS events have long complained about the criteria, mostly because critics say appearance shouldn't be given the same weight as the others.
You eat with your eyes first, they say, which is why appearance will certainly be part of my criteria when I judge the Riverwalk Trust Burger Battle tonight. To be clear, the Riverwalk Trust developed a system of criteria that the six judges will all be
using. But in general, when tasting burgers, I have developed, after
several months of research (really), how to judge a damned good burger.
Yes, You Can Buy Me Off
with bribes but truffles. Or foie gras or aged balsamic or exotic
mushrooms. In other words, you have to credit the chef who's able to
pull off shaving $100-an-ounce black truffles on top of a sandwich
originally made famous by fast-food joints. That said, it's a rare thing
to successfully throw exotic and expensive toppings on a burger. Which
leads into the second criteria.
Traditional Is Good
my wife spent a few years as a vegetarian (those were painful years for
me), one of the things she missed most was a good burger. Convincing
her to sneak an occasional Winstead's burger
helped win her back to the dark side. Thing is, most of us have fond
memories of some simple, backyard-style burger. It ought to be charred
over charcoal, maybe with a simple cheese, bacon, lettuce, tomato,
ketchup, and maybe mayo. Yeah, a foie gras burger is impressive, but
there's also something to be said for an old-school burger built from
good, simple ingredients.
Easy-to-Eat Burgers Win Battles
One of the recent restaurant openings I most looked forward to was Grease Burger Bar, the burger joint on Clematis. I'm a big fan of its sister restaurants -- Big City Tavern and City Cellar
especially -- so I figured they'd put out one hell of a burger. But the
three burgers I've had at Grease have all suffered the same fate: The
toppings spilled out, the bun split, and sauce leaked everywhere. Burgers should
never become fork-and-knife affairs. Burgers ought to be wieldy
vehicles of meat. On the plate, they ought to sit like monuments to the
ingredients, as if each layer were assembled with a minicrane.
The Patty Has to Be Killer
Steak 954
makes one hell of a porterhouse. If you have the means, eat it before
you die. But the burger? Meh. It has too many seasonings, and all that
flavor hides whatever grind they've used for the patty. Better is a high-quality meat -- grass-fed beef, lamb, bison, whatever -- left simple.
Sorry, arteries, but it's probably a fatty cut, like short ribs,
flavored with little more than salt and pepper. Cook it until it has a
crust on the outside and is red in the center. Yeah, that's a burger.
Turkey? Chicken? That's a Hard Sell
When asked about a burger made of lean ground turkey meat, Parks and Rec character Ron Swanson quickly replied, "Why would anyone do that?"
Ron's right. Lean turkey meat does not make a good burger (if it has
somewhere, please tell me in the comments field, because I'd like to try
it). A burger patty built of lean meats might be what your cardiologist
would appreciate, but let's assume he also sneaks an occasional red
meat special.
Follow Clean Plate Charlie on Twitter: @CleanPlateBPB. Follow Eric Barton on Twitter: @ericbarton.
• Top Stories
|
global_01_local_1_shard_00001926_processed.jsonl/44188
|
• Dating someone wealthier than you can be more difficult than you might think.
• According to a relationship expert, significant income disparity can cause strain in the relationship.
• The best way to handle potential conflict is through self-reflection, communication, and letting your partner know you value them for more than their money.
Most people know that new relationships are a time of discovery. Because of this, you've been probably been prepared for what to do if you find out your new partner isn't quite right for you. But what if you find out that the person you're dating is wealthier than you? Like, several tax brackets wealthier than you?
At first, it may seem alluring and exciting — most likely due to the fact that the idea of having a significantly wealthier partner has been mythologized in various forms of media. But in practice, it can be more difficult than you might think.
INSIDER talked with Susan Winter, a relationship expert in NYC, to find out the best way to deal.
Income disparity in a relationship isn't necessarily a problem, but what money symbolizes can be
"Traditionally speaking, money equals power," Winter told INSIDER. "And the one with the power is the one who controls the relationship."
According to Winter, this (perhaps unsurprisingly) can cause a strain in relationships involving people who identify as women and people who identify as men, particularly if the woman is the one with more money.
"Centuries of programming have insisted that for a man to 'be the man,' he must hold the power," Winter told INSIDER. "No matter how evolved a modern man may be, his perspective has been tainted by the sociological programming of archaic gender rules. Even the most progressive relationship can find income disparity kicks up issues of independence and self-worth."
That said, it isn't an insurmountable issue. And, as is the case with most relationship problems, the best way to deal with it is through self-reflection and communication. Winter recommends that you try and evaluate how you feel about the income disparity in the relationship — like if it makes you uncomfortable and, if so, what exactly makes you feel that way — and see how your partner responds.
Difference in money can have an effect on idea of independence and self-worth.
The WB
It's not the end of the world if they feel differently from you on certain things, but it's important that they make you feel heard.
If you feel insecure about making less money than your partner, it is important to understand that money isn't the only practical contribution to a relationship.
"Begin with the basic question of 'who does what?' If your partner makes all the money, how can you contribute in a way that feels important and valued?" Winter told INSIDER.
This doesn't mean you need to bear the brunt of emotional labor in the relationship — that's up to both of you no matter who makes the most money — but you can make sure they know you appreciate them for more than their money by expressing your affection for them regularly or planning your own inexpensive dates to treat them with.
You should also take care to assert your own independence in the relationship, both financially and otherwise
It's one thing to knowingly enter into a sugar baby arrangement, which many people do with plenty of agency, but quite another to find yourself to find yourself feeling like the "kept" person in the relationship without knowing how or when it started.
"What may seem like a lot of fun at first is actually disempowering. Being the recipient of gifts and a convenient lifestyle often backfires," Winter told INSIDER. "What looks like a good deal at the beginning actually trains the recipient to become weak."
Having financial agency is important, so an easy way to counteract this is taking an interest in your own financial situation and making sure you have some form of financial independence and safety net.
Money shouldn't be an end-all, be-all problem in the relationship.
The CW
Basically? In our society, it's probably foolish to think that money will ever not matter. Still, at the end of the day, money shouldn't be an end-all, be-all issue in your relationship if it wasn't what initially drew you to your partner. If you care about your partner, and they care about you, dating them should be just as easy as any other relationship. (Which is to say, not actually that easy at all. But you can deal with that later.)
Visit INSIDER's homepage for more.
|
global_01_local_1_shard_00001926_processed.jsonl/44212
|
ANNOUNCEMENT: The Car Book 2018 is now online!
Engine oil inside the sensor wiring connector could cause expansion due to the heat of the engine and could deform the sensor wiring connector. The connector may become disconnected, which could cause the engine to stall while driving and not be able to be restarted increasing the risk of a crash.
Engine And Engine Cooling
On certain passenger vehicles, due to improper molding of the resin body of the crankshaft position senor installed on the engine block, engine oil may penetrate the seal and enter the sensor wiring connector. The wire harness connector may not be sufficiently attached to the locking tab of the sensor wiring connector.
Dealers will replace the crankshaft position sensor free of charge. The recall began on July 26, 2006. Owners may contact Toyota at 1-800-331-4331.
Documents (13)
Click a tab for more information.
Date Announced
JUL 19, 2006
Vehicles Affected
Toyota Recall #
NHTSA Campaign #
Find something helpful? Spread the word.
Become a Fan & Spread the Word
|
global_01_local_1_shard_00001926_processed.jsonl/44218
|
chmls [options] [command] [command specific parameters]
The chmls utility performs several CHM related functions, such as listing CHM file contents, extracting one file or the whole archive and extracting special files. Archiving however is the domain of the chmcmd utility
list <filename> [section number]
Shows contents of the archive's directory. The section number can be 0 or 1, when no section number is specified, content from both sections is displayed.
extract <chm filename> <filename to extract> [saveasname]
Extracts file "filename to get" from archive "filename", and, if specified, saves it to [saveasname].
extractall <chm filename> [directory]
Extracts all files from archive "filename" to directory "directory"
unblockchm <filespec1> [filespec2] ..
(Windows only) Mass unblocks (XPsp2+) the relevant CHMs. Multiple files and wildcards allowed
extractalias <chmfilename> [basefilename] [symbolprefix]
Extracts context info from file "chmfilename" to basefilename.h and basefilename.ali, using symbols "symbolprefix" + contextnr
extracttoc <chmfilename> [filename]
Extracts the toc (mainly to check binary TOC)
extractindex <chmfilename> [filename]
Extracts the index (mainly to check binary index)
For backwards compatibility reasons, the list command is default.
Show help text
Do not page list command output
Only show "name" column in list command output
RELATED TO chmls-2.6.4…
• chmcmd(1) fpc(1) fpdoc(1)
|
global_01_local_1_shard_00001926_processed.jsonl/44222
|
View Casting
add a job register
Actors for student short from London college of communication/UAL
Job ID: 16119
<< Previous Page
Job Specifics:
Applications Close
2nd December 2018 JOB CLOSED
Visible to subscribed members
Job Starts
Visible to subscribed members
Visible to subscribed members
share this job
Synopsis: An 18-year-old girl who suffers from Autism finds it hard to not be awkward in social situations. She finds her escape through Jazz as she listens to music in order to block the world that she doesn't quite understand, just as it doesn't understand her. After running into a jazz music professor, we see her evolve as a person as they exchange views on songs and even life opinions. We even see her dynamic with her family improve over time, especially with her older sister.
Set in various locations around London, especially Greenwich, "Alexus" is for the dreamers.
Apply Now
Job Closed
<< Previous Page
|
global_01_local_1_shard_00001926_processed.jsonl/44235
|
Petition Closed
YouTube should release our created content and reinstate our channel.
This petition had 3,779 supporters
November 2017: YouTube terminates us again.. writes, After review we determined that activity in your account violated our Community Guidelines, which prohibit spam, scams or commercially deceptive content (
Peter Sinclair: "Climate State has been doing an absolutely amazing job of providing a useful historical archive of important experts warning on climate issues through past decades."
March 2017: Another month another YouTube channel termination
January 2017: YouTube recently removed hundreds of the best climate science videos from the Internet, the account was in good standing.
YouTube did not provide a reason for what they call channel termination, support staff cited Community Guidelines, practices like spamming, deceptive practises, predatory behavior and so on.
We are unaware of any wrongdoing, and think the decision was done in error.
We want to know why our channel has been terminated. Why is YouTube not communicating clearly what the problem is?
To get an idea about the channel content visit
Our video backup at
We had permissions for most of the content, basically for all extreme weather footage, a lot of content is published into the public domain (ie. NASA, content or some documentaries), some content such as lectures is posted generally either with a permission or under fair use conditions/educational, or we used excerpts of existing content in our own productions - actually the majority of over 600 videos is our work.
Today: Climate is counting on you
Climate State needs your help with “YouTube should release our created content and reinstate our channel.”. Join Climate and 3,778 supporters today.
|
global_01_local_1_shard_00001926_processed.jsonl/44286
|
Kanan - The Last Padawan
Kanan Jarrus: In Star Wars Rebels, he’s a cocky, sarcastic renegade fighting against the Galactic Empire alongside the ragtag crew of the Ghost. But years before, at the height of the Clone Wars, he was known as Caleb Dume, Jedi Padawan under the instruction of Jedi Master Depa Billaba. Neither master nor apprentice ever suspected that the Clone Troopers they commanded would turn on them upon the issuing of Order 66—the order to execute all Jedi. How did Caleb Dume survive? How did he learn to survive on his own? And how did he become the man we know as Kanan Jarrus?
Collected Editions
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.