id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_1_shard_00001926_processed.jsonl/47437
|
Comments to 051902:
Add your comment:
Received a phone call from 051902 ? Give it a shout:
Please only comment if 051902 is the full number. Use our reverse search if you're unsure.
name or nickname
describe the call
chars left
who called?
get notified via email on new comments
you agree with our disclaimer and TOC when submitting.
Phone inverse search Twitter Icon
Who calls me facebook icon
|
global_01_local_1_shard_00001926_processed.jsonl/47442
|
This movie requires Flash Player 8. Download Flash Player 8
Doctrinal Matters
Search :
God and Capital Punishment
by Frank Chesser, M.S.
[NOTE: The author of the following articles is an A.P. board member.]
In 1984 leaders of 13 major denominational churches in Florida signed a joint document condemning capital punishment. They described the death penalty as being extremely harmful, immoral, an action that encourages violence and demonstrates disrespect for human life and is inconsistent with the love of God.1 The conduct of these religious leaders is a classic example of refusing to think right about God. Capital punishment is a principle that is divine in origin and permanent in nature. It embraces all of time. God intends for the death penalty to be employed as an act of justice by duly authorized authorities for as long as man should inhabit the earth.
God as Executioner
It is incomprehensible that anyone with even a superficial knowledge of the Bible would object to the death penalty. The Bible is replete with examples of capital punishment with God as the executioner. Was God acting immorally, exhibiting disrespect for human life, and in defiance of His own nature when he destroyed the world of Noah’s day with a global flood? Can a man descend to a depth of sin and evil that he no longer deserves to live? The mind is the axis of life. The minds of the objects of God’s wrath were incessantly evil. They were barren of a single good thought (Genesis 6:5). They feasted on vileness like vultures on the rot of dead flesh and filled the earth “with violence” (Genesis 6:11). Had they forfeited the right to life? Is not God sovereign over all that is? Is He not the source of life? Does He not retain the right to decide when life should end? Is it possible for God to act in a manner inconsistent with His own nature? Is a man thinking right about God when, by implication, he accuses God of acting immorally? “But indeed, O man, who are you to reply against God?” (Romans 9:20). The flood alone is proof of the moral justice of capital punishment and of its complete compatibility with the whole of God’s nature.
God executed capital punishment against Sodom, Gomorrah, Admah, and Zeboim (Genesis 19). The inhabitants of these wicked cities had perverted the very core of man’s sexual being as designed by God. They were sick with sin. They coveted the unnatural and abnormal. They heaped dishonor upon “their own bodies” (Romans 1:24). They yearned after “strange flesh” (Jude 7). Their sexual passions were “vile” (Romans 1:26). They could not “cease from sin” (2 Peter 2:14). They had reached the point of no return. Did they deserve to live? God utterly destroyed these cities with burning sulphur and emblazoned the memory of them before the minds of men “for an example, suffering the vengeance of eternal fire” (Jude 7).
Was God acting improperly when He slew Er, Judah’s firstborn, because he was wicked (Genesis 38:7), killed his brother Onan, because he refused to submit to the Levirate marriage law and perpetuate his brother’s name in Israel (Genesis 38:8-10), or when “it came to pass at midnight that the Lord struck all the firstborn in the land of Egypt, from the firstborn of Pharaoh who sat on his throne to the firstborn of the captive who was in the dungeon, and all the firstborn of livestock?” (Exodus 12:29). Does man have the right to call God into account for His actions? “Will the thing formed say to him who formed it, ‘why have you made me like this?’” (Romans 9:20). Who is weak, frail, puny, sinful man to question the conduct of God? God destroyed the army of Egypt in the Red Sea (Exodus 14:26-28). He killed Nadab and Abihu because they “offered profane fire before the Lord, which He had not commanded them” (Leviticus 10:1). He slew some in Israel who loathed the gift of manna, looked backward with longing eyes to the food provisions in Egypt, and demanded a change in diet (Numbers 11:4–34), and killed the ten spies who returned from Canaan with an evil report (Numbers 14:37). Is a man spiritually rational when he depicts such actions of God as immoral and dishonoring to human life?
God destroyed the families of Korah, Dathan, and Abiram in the heart of the earth and 250 princes with fire because they rebelled against the authority of Moses and demanded access to the priesthood (Numbers 16:1-33). He then slew 14,700 in Israel who accused Moses and Aaron of killing “the people of the Lord” (Numbers 16:41). He executed capital punishment upon a large number of Israelites who expressed contempt for the leadership of Moses and God’s provisions of grace in the wilderness (Numbers 21:5-6). He slew 23,000 in Israel for fornication and idolatry (1 Corinthians 10:8), commanded an additional thousand to be executed by the hands of judges (Numbers 25:1-9), and granted Joshua a victory over a coalition of five armies by killing more soldiers with hailstones than the army of Israel had slain in battle (Joshua 10:11).
God executed a host of men in Bethshemesh because of their lack of reverence for the Ark of the Covenant (1 Samuel 6:19), killed Nabal for his wickedness (1 Samuel 25:38), and slew Uzzah for touching the ark (2 Samuel 6:7). He killed 70,000 men of Israel as an act of judgment upon David and Israel because of sin (2 Samuel 24:15), used a lion to slay a disobedient prophet from Judah (1 Kings 13:24), and slew Jeroboam, the first king of the northern kingdom (2 Chronicles 13:20). He executed 102 soldiers in Israel who refused to honor His authority through Elijah (2 Kings 1:1-12), used an angel to kill 185,000 Assyrian soldiers in one night (2 Kings 19:35), and slew Jehoram, the fifth king of Judah, with a bodily disease (2 Chronicles 21:18-19). God killed Ananias and Sapphira for lying to the Holy Spirit (Acts 5:1-10) and slew Herod for refusing to glorify God (Acts 12:23). Is a man thinking right about God when he arrays God’s love against God’s holiness, justice, and wrath and depicts capital punishment as harmful, immoral, and lacking in respect for human life?
Man as God’s Executioner
God often used man to administer judgment upon men and nations whose sin and rebellion called for the cessation of life. He used the sons of Levi to slay some three thousand men who had sinned in worshiping the golden calf (Exodus 32:27-28). He used Israel to stone a man who blasphemed the name of God (Leviticus. 24:10-14) and a man who violated the Sabbath (Numbers 15:32-36) and to bring judgment on His enemies (Numbers 21), and He praised and blessed Phinehas for appeasing His wrath in slaying two adulterers (Numbers 25:6-14). God’s statement to Abraham, “for the iniquity of the Amorites is not yet complete” (Genesis 15:16), points to the inevitable judgment that would befall the inhabitants of Canaan when their sin reached the full mark. At the close of his life, Moses reminded Israel of the end of God’s grace, mercy, and forbearance with the seven nations in Canaan, and said, “And when the Lord your God delivers them over to you, you shall conquer them and utterly destroy them. You shall make no covenant with them nor show mercy to them.” (Deuteronomy 7:2). God used the nation of Israel to execute judgment upon the people of Canaan for their longstanding idolatry and sin (Joshua 1-12).
God used Israel to administer capital punishment upon Achan and his family (Joshua 7). The period of the judges was a spiritually tumultuous period in Israel’s history as the people “did not cease from their own doings nor from their stubborn way” (Judges 2:19). They adopted the idolatry and wicked ways of the pagan nations. God utilized the king of Mesopotamia; Eglon, king of Moab; Jabin, king of Canaan; the Midianites, Ammonites, and Philistines to bring judgment upon them. As they manifested repentance, God would raise up judges to lead Israel in freeing the nation from the oppression of these heathen rulers and punishing them for their own idolatry and sin. Rivers of blood flowed across the land during this chaotic period as God used men to inflict capital punishment upon other men because of their impenitent sin and rebellion.
The Ammonites were descendants of Lot. They were pagan, idolatrous, cruel, and exceedingly corrupt. They refused to aid Israel in a time of great need and joined Moab in hiring Balaam to curse them (Deuteronomy 23:4). In the early days of Saul’s reign, they threatened to gouge out the right eyes of all the men in the city of Jabesh (1 Samuel 11:2). And the “spirit of God came upon Saul” (1 Samuel 11:6), and God employed Saul and Israel to kill the Ammonites until “it happened that those who survived were scattered, so that no two of them were left together” (1 Samuel 11:11). The Amalekites shared kinship with the Ammonites in idolatry, cruelty, and wickedness. When Israel ascended out of Egypt, the Amalekites attacked them from behind, killing the most vulnerable: the elderly, weak, and feeble (Deuteronomy 25:17-18). God reminded Saul of this act of inhumanness and said, “Now go and attack Amalek, and utterly destroy all that they have, and do not spare them.” (1 Samuel 15:3).
David was a “man of war” (1 Chronicles 28:3). He was a sword of judgment in the hand of God to execute the penalty of death upon the enemies of God, whose corruptness of life called for their destruction. He often inquired of the Lord, seeking His will concerning battle engagements. He said of God, “He teaches my hands to make war, so that my arms can bend a bow of bronze.” (2 Samuel 22:35). In a summary of some of his military victories, inspiration asserts, “And the Lord preserved David wherever he went.” (2 Samuel 8:14). God’s role for David’s life was for him to function as a hammer of God’s judgment upon heathen nations steeped in idolatry and iniquity and to secure and bring peace to Israel, thus creating a tranquil environment for Solomon to construct the Temple. It was this very point that David pressed upon the mind of Solomon in the closing days of his life (1 Chronicles 22:6-19).
God used Abijah, the second king of Judah, to render judgment upon Jeroboam and Israel because of their apostasy and idolatry. Five hundred thousand men of Israel perished in this conflict. Judah was victorious because “they relied upon the Lord God of their fathers” (2 Chronicles 13:18). Asa, the third king of Judah, faced an Ethiopian army of a million soldiers, the largest army mentioned in the Old Testament. He implored God for divine aid. “So the Lord struck the Ethiopians before Asa, and before Judah” (2 Chronicles 14:12). During the reign of Jehoshaphat, the armies of Ammon, Moab, and Edom descended upon Judah. In Jehoshaphat’s prayer before the congregation of Judah in Jerusalem, he expressed the nation’s helpless state and their total dependence upon God. God executed judgment upon the wicked nations by turning their swords against one another until “and there were their dead bodies, fallen on the earth. No one had escaped.” (2 Chronicles 20:24).
Idolaters and enemies of God, the Syrians affirmed that God was only a local Deity with limited power (1 Kings 20:28). God employed Israel to punish Syria and they “killed one hundred thousand foot soldiers of the Syrians in one day.” (1 Kings 20:29). An additional 27 thousand were killed by the weight of a wall that fell upon them in the city of Aphek (1 Kings 20:30). God utilized Jehu to judge the wicked house of Ahab. “So Jehu killed all who remained of the house of Ahab in Jezreel, and all his great men and his close acquaintances and his priests, until he left him none remaining.” (2 Kings 10:11). He then killed all the worshipers of Baal until he had “destroyed Baal out of Israel” (2 Kings 10:28).
Israel descended into such depths of sin that God raised the sword of Assyria against them and destroyed their national identity in Assyrian captivity (2 Kings 17:5-23). Judah emulated Israel’s conduct and God utilized Babylon to execute judgment upon them. He later used the Medes and Persians to judge Babylon. Isaiah specifies ten pagan nations who suffered the judgment of God because of their grievous sin (cf. Isaiah 13-23). The New Testament closes with God’s answer to the martyrs of Christ who cried, “How long, O Lord, holy and true, until You judge and avenge our blood on those who dwell on the earth?” (Revelation 6:10). God administered judgment upon the enemies of His Son and the church and declared, “Rejoice over her, O heaven, and you holy apostles and prophets, for God has avenged you on her!” (Revelation 18:20).
Is a man thinking right about God when he sees all of these biblical examples, yet still declares the death penalty to be harmful, immoral, disrespectful to human life, and inconsistent with the nature of God?
Divine Laws Demanding the Death Penalty
Following the global Flood, God reiterated the need for the increase of the human family (Genesis 9:1). Sin had changed everything, and the tranquil co-existence between man and animal had been supplanted with hostility (Genesis 9:2). The vegetarian status of both man and animals prior to sin had now been changed to allow man to consume meat (Genesis 1:29-30; 9:3).2 Divine permission to eat meat was accompanied with a prohibition regarding the consumption of blood. “But you shall not eat flesh with its life, that is, its blood.” (Genesis 9:4), because the “life of the flesh is in the blood” (Leviticus 17:11). Since human life reflects the image of God, the most severe possible penalty is attached to the action of murder that brings it to an end. “Whoever sheds man’s blood, by man his blood shall be shed; for in the image of God He made man.” (Genesis 9:6).
This principle and penalty embraces all of time. Civil government is ordained of God (Romans 13:1). It is an expression of God’s concern for man’s well-being, and when functioning faithfully, it discourages lawlessness and promotes peace and serenity. Romans 13:4 describes authorized civil authorities as ministers of God, persons who do not bear “the sword in vain,” and avengers divinely bound to execute “wrath on him who practices evil.” The sword is a symbol of capital punishment and, when wielded by the state, is an action authorized by God. Any man who attempts to sheathe the state’s sword is in rebellion to God and His will. He is resisting “the ordinance of God” (Romans 13:2). God placed the sword in the hand of the state, and no man has a right to remove it.
“He who strikes a man so that he dies shall surely be put to death.” (Exodus 21:12). The willful taking of life demands the life of the perpetrator. In ancient times, God granted the right of vengeance to the victim’s nearest relative, designated as the “avenger of blood” who shall “put the murderer to death” (Numbers 35:19). Cities of refuge were provided for accidental slayings, allowing one to live in peace and safety whose act of killing was unintentional (Numbers 35:6-15). Moreover, the taking of life for self-defense purposes is not murder, and such action is not subject to the death penalty. The need and desire for self-preservation is divinely implanted. It is as natural and inherent to life as food and drink. It would be wholly inconsistent with the nature of God to design man with such a potent need and then refuse him the right to exercise it. Preserving one’s own life or the life of any innocent victim from the murderous intent of evil doers is perfectly compatible with both the nature of God and the nature of man as designed by God. Exodus 22:2 envisions just such a case as a man kills a thief caught breaking into his home at night in defense of himself and his family and is rendered guiltless.
“And he who strikes his father or his mother shall surely be put to death” (Exodus 21:15). “And he who curses his father or mother shall surely be put to death.” (Exodus 21:17). Mothers descend into the depths of pain and anguish in order to bring life into the world. God’s mothers and fathers are heaven’s gift to children. Parents functioning according to God’s pattern for the home are children’s first insight into the nature of God. Parents are god-like in a child’s eyes. Parents who love God set the feet of their children on the road to eternal bliss. To strike or curse such a parent is an assault upon the heart. It inflicts mental and emotional pain that far exceeds physical suffering. It undermines the peace and joy of the home, the bedrock of society, and afflicts the heart of God.
“He who kidnaps a man and sells him, or if he is found in his hand, shall surely be put to death.” (Exodus 21:16). Kidnapping was punishable by death. Stealing a man for slave traffic invited the death penalty even when the victim was yet in the thief’s possession. Robbing a man of his personal freedom was a capital offense. Exodus 21:22-23 contemplates an expectant mother’s losing her life or the life of her miscarried child as she endeavored to shield her husband from an aggressor. The aggressor was to be put to death. Exodus 21:29-30 envisions the death of a man or woman by an ox known to have a violent nature. Unless the relatives of the victim agreed upon financial compensation, the owner of the ox was to suffer the death penalty.
“You shall not permit a sorceress to live.” (Exodus 22:18). Sorcery strikes at the very heart of the sovereignty of God. It is an attempt to circumvent God and take charge of one’s own life. As are all efforts to rid man’s mind and life of God and His restraining influences, it appeals to the lust of the flesh. It fosters defilement (Leviticus 19:31). The Canaanites were engrossed in every form of sorcery and it was one of the reasons God removed them from the land (Deuteronomy 18:10-12). Saul’s consultation with the witch of Endor is cited as one of the reasons God “killed him, and turned the kingdom over to David” (1 Chronicles 10:13-14). Sorcerers were to be put to death by stoning (Leviticus 20:27).
All forms of perverted sexual activity, such as incest (Leviticus 20:11-12,14), homosexuality (Leviticus 20:13), and bestiality (Leviticus 20:15) were subject to the death penalty. There are complexities associated with man’s sexual being as designed by God that transcend human comprehension. This truth is mightily reinforced by God’s law concerning even the touching of a man’s genitals. Foolish indeed is the man who refuses to perceive this truth and proceeds to tamper with this aspect of life. Perverted sexual conduct is an egregious assault upon the very core of a man’s being. There is no action of man that calls for more intense judgment. The homosexuality of Sodom, Gomorrah, Admah, and Zeboim incurred a judgment that God will not allow man to forget. It is a repetitive theme in both Testaments, a sign-post from God regarding His attitude toward this grievous sin (Jude 7), and the last book in the Bible holds it up as the epitome of sin (Revelation 11:8). A nation is doomed if it allows this sin to reach a level of national acceptance.
“The man who commits adultery with another man’s wife, he who commits adultery with his neighbor’s wife, the adulterer and the adulteress, shall surely be put to death.” (Leviticus 20:10). Heterosexual relationships outside of marriage were punishable by death. Adultery injures the marital relationship like no other sin. There is something unique about the one-flesh relationship in marriage, and there is something unique about the sin that severs it. The stringent nature of Matthew 19:9 bears witness to this truth. Relaxing the rigidity of God’s marital law is to man’s own peril. It is senseless to tamper with the things of God. Those who think right about God would never consider such conduct. There is nothing that creates more excitement in the halls of hell than for man to attempt to modify God’s marital laws intended to protect the sanctity of the home, the foundational unit of society.
Idolatry was a capital punishment offense (Deuteronomy 17:2-7). This grievous evil, the source of so many sins, plagued Israel for almost the whole of their national life until their return from Babylonian captivity. False prophets aiming to lure Israel into idolatry were to be killed (Deuteronomy 13:1-5). Family members, such as one’s wife, son, daughter, brother, or friend who endeavored to entice their family “secretly, saying, Let us go and serve other gods” (Deuteronomy 13:6) were not to be pitied, spared, or concealed but were to be stoned to death (Deuteronomy 13:8-10). Rumors concerning a city’s involvement in idolatry were to be thoroughly investigated, and if found to be true, the city in its entirety was to be destroyed, and even the spoil of the city was to be burned (Deuteronomy 13:12-17).
Acts of rebellion against decisions made by a tribunal of priests and judges in execution of God’s law were subject to the death penalty (Deuteronomy 17:8-13). Prophets who dared to speak where God had not spoken, or who prophesied in the name of an idol were to be slain (Deuteronomy 18:20). Harlotry by the daughter of a priest was punishable by death (Leviticus 21:9). Child sacrifice to an idol was subject to death by stoning (Leviticus. 20:2). Desecrating the Sabbath with work called for the death penalty (Exodus 35:2). Capital punishment was to be administered to any non-priest who attempted to usurp priestly functions (Numbers 3:10), to a non-Levite who encroached upon Levitical responsibility in performing the services of the tabernacle (Numbers 18:22-23), to any Levite who neglected or refused to give his own tenth of the tithe received from Israel (Numbers 18:25-32), and to any Kohathite charged with transporting the sacred furniture of the tabernacle, if he looked upon or touched any of it (Numbers 4:15,20).
A man proven to be a false witness was to be put to death if such was his intention regarding the accused (Deuteronomy 19:16-21). Capital punishment was to be inflicted upon an incorrigible son (Deuteronomy 21:18-21), a new bride who was verified to be guilty of fornication prior to marriage (Deuteronomy 22:13-21), a man who raped an engaged or married woman (Deuteronomy 22:25-27), and one who blasphemed or cursed God (Leviticus 24:10-16).
Capital punishment is ordained by God. God intends for the death penalty to occupy a permanent place in society for as long as the world stands. Opposing the death penalty is an act of defiance against God, the nature of God, and the will of God. Those who manifest aversion to capital punishment are refusing to think right about both God and sin.
1 Jon Nordheimer (1984), “Death Penalty Assailed By Florida Church Leaders,” New York Times, http://www.nytimes.com/1984/11/27/us/death-penalty-assailed-by-florida-church-leaders.html, November 27.
2 Eric Lyons (2003), “Were All Men Vegetarians Before the Flood?”, Apologetics Press, http://apologeticspress.org/APContent.aspx?category=11&article=1257.
Copyright © 2017 Apologetics Press, Inc. All rights reserved.
For catalog, samples, or further information, contact:
Apologetics Press
230 Landmark Drive
Montgomery, Alabama 36117
Phone (334) 272-8558
|
global_01_local_1_shard_00001926_processed.jsonl/47495
|
Compatibility Test
Here are 10 questions that will help define the icon with whom you are most compatible. There are 12 people who you might be paired with: Sean Connery, Ben Affleck, Elton John, Denzel Washington, Brad Pitt, Ricky Martin, Britney Spears, Jennifer Lopez, Halle Berry, Julia Roberts, Cher and Shania Twain.
Make sure to answer the questions as honestly as possible or else the test will fail. And even if you answer all the questions honestly, there's no guarantee you'll end up being compatible with the right person! But it's worth a try, right? Also, make sure you enter you name and email address. This information won't be used for anything other than these test results.
Who are you?
First name Last name
1. What type of accessory do you find most appealing in your dream date?
A. Hat
B. Sunglasses
C. No accessories
D. Earrings
E. Large Sunglasses
2. How important is age for a potential mate?
A. The older, the better
B. The younger, the better
C. Age really isn't that important
D. Close to the same age as I am
E. I usually don't know the other person's age
3. What type of music do you hope your date listens to?
A. Pop, Top 40
B. Heavy Metal
C. It's not that important
D. All country, all the time
E. No country, none the time
4. Your potential date is not entirely happy with a particular part of his/her body. What do you say?
A. "You look great in that dress, so stop thinking you don't."
B. "I don't think you need plastic surgery, but if you want to look like Fabio, it's your decision."
C. "Well you've fixed everything else, so one more surgery won't hurt too much."
D. "Maybe if you wore different types of clothing, you wouldn't think about it."
E. "You're kidding, right? I didn't think guys thought about stuff like that."
5. Where do you envision your most compatible person being born?
A. A small town, likely in the south
B. England (ING-GA-LAND)
C. Big city
D. Doesn't really matter
E. South of the border
6. What are your feelings about dating someone at work?
A. If you meet the person of your dreams, then go for it!
B. This is a boundary that is not meant to be crossed.
C. I wouldn't seek out someone at work, but if it happens, it happens.
D. I would be against it, but I wouldn't say never.
E. As long as you aren't dating more than five or so people who work at the same place, I don't see why not.
7. What type of hairstyle do you think looks the best on a potential mate?
A. Long hair
B. Long or short, it doesn't matter
C. Short hair
D. Curly hair
E. Little or no hair
8. What word or phrase best describes your best match?
A. Outspoken
B. Introverted
C. Intellectual
D. Articulate
E. Bubbly
9. What is the most important physical feature of a dream date?
A. Eyes
B. Hair
C. Facial structure
D. Mouth
E. Other
10. How would you want to approach life, if your significant other was a celebrity?
A. Our business is everyone's business.
B. Our business is no one's business.
C. Some things should be kept from the media.
D. As long as there is some good publicity with the bad publicity, it's all the same to me.
E. Work and play should be separated.
|
global_01_local_1_shard_00001926_processed.jsonl/47499
|
Isaías Capitulo 28 - King James with Numbers Strong
Isa 28:1 Woe H1945 to the crown H5850 of pride, H1348 to the drunkards H7910 of Ephraim, H669 whose glorious H6643 beauty H8597 is a fading H5034 flower, H6731 which H834 are on H5921 the head H7218 of the fat H8081 valleys H1516 of them that are overcome H1986 with wine!H3196
Isa 28:2 Behold, H2009 the Lord H136 hath a mighty H2389 and strong one, H533 which as a tempest H2230 of hail H1259 and a destroying H6986 storm, H8178 as a flood H2230 of mighty H3524 waters H4325 overflowing, H7857 shall cast down H5117 to the earth H776 with the hand.H3027
Isa 28:3 The crown H5850 of pride, H1348 the drunkards H7910 of Ephraim, H669 shall be trodden H7429 under feet:H7272
Isa 28:4 And the glorious H6643 beauty, H8597 which H834 is on H5921 the head H7218 of the fat H8081 valley, H1516 shall be H1961 a fading H5034 flower, H6733 and as the hasty fruit H1061 before H2962 the summer; H7019 which H834 when he that looketh H7200 upon it seeth, H7200 while it is yet H5750 in his hand H3709 he eateth it up.H1104
Isa 28:5 In that H1931 day H3117 shall the LORD H3068 of hosts H6635 be H1961 for a crown H5850 of glory, H6643 and for a diadem H6843 of beauty, H8597 unto the residue H7605 of his people,H5971
Isa 28:6 And for a spirit H7307 of judgment H4941 to him that sitteth H3427 in H5921 judgment, H4941 and for strength H1369 to them that turn H7725 the battle H4421 to the gate.H8179
Isa 28:7 But they H428 also H1571 have erred H7686 through wine, H3196 and through strong drink H7941 are out of the way; H8582 the priest H3548 and the prophet H5030 have erred H7686 through strong drink, H7941 they are swallowed up H1104 of H4480 wine, H3196 they are out of the way H8582 through H4480 strong drink; H7941 they err H7686 in vision, H7203 they stumble H6328 in judgment.H6417
Isa 28:8 For H3588 all H3605 tables H7979 are full H4390 of vomit H6892 and filthiness, H6675 so that there is no H1097 place H4725 clean.
Isa 28:9 (H853) Whom H4310 shall he teach H3384 knowledge? H1844 and whom H4310 shall he make to understand H995 doctrine? H8052 them that are weaned H1580 from the milk, H4480 H2461 and drawn H6267 from the breasts. H4480 H7699
Isa 28:10 For H3588 precept H6673 must be upon precept, H6673 precept H6673 upon precept; H6673 line H6957 upon line, H6957 line H6957 upon line; H6957 here H8033 a little, H2191 and there H8033 a little:H2191
Isa 28:11 For H3588 with stammering H3934 lips H8193 and another H312 tongue H3956 will he speak H1696 to H413 this H2088 people.H5971
Isa 28:12 To H413 whom H834 he said, H559 This H2063 is the rest H4496 wherewith ye may cause the weary H5889 to rest; H5117 and this H2063 is the refreshing: H4774 yet they would H14 not H3808 hear.H8085
Isa 28:13 But the word H1697 of the LORD H3068 was H1961 unto them precept H6673 upon precept, H6673 precept H6673 upon precept; H6673 line H6957 upon line, H6957 line H6957 upon line; H6957 here H8033 a little, H2191 and there H8033 a little; H2191 that H4616 they might go, H1980 and fall H3782 backward, H268 and be broken, H7665 and snared, H3369 and taken.H3920
Isa 28:14 Wherefore H3651 hear H8085 the word H1697 of the LORD, H3068 ye scornful H3944 men, H376 that rule H4910 this H2088 people H5971 which H834 is in Jerusalem.H3389
Isa 28:15 Because H3588 ye have said, H559 We have made H3772 a covenant H1285 with H854 death, H4194 and with H5973 hell H7585 are we at H6213 agreement; H2374 when H3588 the overflowing H7857 scourge H7752 shall pass through, H5674 it shall not H3808 come H935 unto us: for H3588 we have made H7760 lies H3577 our refuge, H4268 and under falsehood H8267 have we hid ourselves:H5641
Isa 28:16 Therefore H3651 thus H3541 saith H559 the Lord H136 GOD, H3069 Behold, H2009 I lay H3245 in Zion H6726 for a foundation H3245 a stone, H68 a tried H976 stone, H68 a precious H3368 corner H6438 stone, a sure H3245 foundation: H4143 he that believeth H539 shall not H3808 make haste.H2363
Isa 28:17 Judgment H4941 also will I lay H7760 to the line, H6957 and righteousness H6666 to the plummet: H4949 and the hail H1259 shall sweep away H3261 the refuge H4268 of lies, H3577 and the waters H4325 shall overflow H7857 the hiding place.H5643
Isa 28:18 And your covenant H1285 with H854 death H4194 shall be disannulled, H3722 and your agreement H2380 with H854 hell H7585 shall not H3808 stand; H6965 when H3588 the overflowing H7857 scourge H7752 shall pass through, H5674 then ye shall be H1961 trodden down H4823 by it.
Isa 28:19 From the time H4480 H1767 that it goeth forth H5674 it shall take H3947 you: for H3588 morning H1242 by morning H1242 shall it pass over, H5674 by day H3117 and by night: H3915 and it shall be H1961 a vexation H2113 only H7535 to understand H995 the report.H8052
Isa 28:20 For H3588 the bed H4702 is shorter H7114 than that a man can stretch himself H4480 H8311 on it: and the covering H4541 narrower H6887 than that he can wrap himself H3664 in it.
Isa 28:21 For H3588 the LORD H3068 shall rise up H6965 as in mount H2022 Perazim, H6556 he shall be wroth H7264 as in the valley H6010 of Gibeon, H1391 that he may do H6213 his work, H4639 his strange H2114 work; H4639 and bring to pass H5647 his act, H5656 his strange H5237 act.H5656
Isa 28:22 Now H6258 therefore be ye not mockers, H3887 H408 lest H6435 your bands H4147 be made strong: H2388 for H3588 I have heard H8085 from H4480 H854 the Lord H136 GOD H3069 of hosts H6635 a consumption, H3617 even determined H2782 upon H5921 the whole H3605 earth.H776
Isa 28:23 Give ye ear, H238 and hear H8085 my voice; H6963 hearken, H7181 and hear H8085 my speech.H565
Isa 28:24 Doth the plowman H2790 plow H2790 all H3605 day H3117 to sow? H2232 doth he open H6605 and break the clods H7702 of his ground?H127
Isa 28:25 When H518 he hath made plain H7737 the face H6440 thereof, doth he not H3808 cast abroad H6327 the fitches, H7100 and scatter H2236 the cummin, H3646 and cast H7760 in the principal H7795 wheat H2406 and the appointed H5567 barley H8184 and the rie H3698 in their place?H1367
Isa 28:26 For his God H430 doth instruct H3256 him to discretion, H4941 and doth teach H3384 him.
Isa 28:27 For H3588 the fitches H7100 are not H3808 threshed H1758 with a threshing instrument, H2742 neither is a cart H5699 wheel H212 turned H5437 about upon H5921 the cummin; H3646 but H3588 the fitches H7100 are beaten out H2251 with a staff, H4294 and the cummin H3646 with a rod.H7626
Isa 28:28 Bread H3899 corn is bruised; H1854 because H3588 he will not H3808 ever H5331 be threshing H1758 it, nor break H2000 it with the wheel H1536 of his cart, H5699 nor H3808 bruise H1854 it with his horsemen.H6571
Isa 28:29 This H2063 also H1571 cometh forth H3318 from H4480 H5973 the LORD H3068 of hosts, H6635 which is wonderful H6381 in counsel, H6098 and excellent H1431 in working.H8454
Capitulo Anterior Siguiente Capitulo
Buscar por Palabra
Buscar por Versículo
• Concordancia Strong
• Diccionario Donde Hallar
|
global_01_local_1_shard_00001926_processed.jsonl/47501
|
Link Friends
Change the colors
Click on a color to change the color of the site
Danza of Life
DANCE OF LIFE From the Greek prefix bios and the word of french origin danse comes the term Biodanza(R), which has the poetical meaning Dance of life; it gives the possibility to redeem and integrated movement, full of emotion, full of life, a gesture where all the being finds
The Vivencia
THE VIVENCIA Gives to the subjective experience the existential quality of living 'here and now'
The Poetry of the meeting
THE POETRY OF THE ENCOUNTER To celebrate the presence of the other, to praise it into the essential enchantment of the encounter
The Art of Living
THE ART OF LIVING Giving back the vital creative power which is present and possible.
|
global_01_local_1_shard_00001926_processed.jsonl/47508
|
From BitWizard WIKI
Revision as of 17:54, 2 March 2012 by Tom (talk | contribs)
Jump to: navigation, search
This is the documentation page for the SPI_7FETs board.
The board has 7 fets that allow you to pull a pin of a load low. You would normally tie the other end of your load directly to the powersupply.
About 1A per output should be possible. Maximum voltage is 20V.
You will have to provide your own protection circuits if you are going to drive inductive loads (like a motor).
Assembly instructions
Possible Configurations
External resources
Additional software
Related projects
Power connector
The connector SV2 allows you to connect the "powersource".
You can chose two configurations: You can use pin 1-2 as ground and power. You can connect up to 15V (*) to pin 2 referenced to GND on pin 1.
(*) The datasheet for the used transistors mentions "20V", but is is always prudent to keep some margin.
If you want 5V as the powersource, you could put a jumper on pin 2-3. In that case you will have to be aware that you're using the 5V power from the rest of the system. This will be limited by e.g. USB power limits, other devices on the SPI bus, cable thickness and connector capability. But for low-current 5V applications this might be useful.
jumper settings
See solder jumpers on how to change the solder jumper.
By changing the solder jumper SJ1, you can make the connector nearest the board edge into the ICSP programming connector for the attiny44 on the board.
The software
Default operation
Future hardware enhancements
Future software enhancements
TODO: write a library to make handling this board easy.
• Initial public release
|
global_01_local_1_shard_00001926_processed.jsonl/47520
|
Archive for the 'Postgres' Category
How to ignore Invalid byte sequences in a Postgres Dump File
Monday, November 15th, 2010
I needed to restore a client Postgres database recently. However I discovered the pg_dump v8.3.9 dump utility produced invalid byte sequences in the dump file.
When importing the file using the following v8.4.5 psql command:
- psql -U username dbname -f pg-dbbackup.YYYYMMDD.dump
Each and every invalid byte sequence in the dump throws an error like the following one at a time:
psql:pg-dbbackup.20101115.dump:45711: ERROR: invalid byte sequence for encoding “UTF8″: 0xc8ed
HINT: This error can also happen if the byte sequence does not match the encoding expected by the server, which is controlled by “client_encoding”.
CONTEXT: COPY PostRequestField, line 13274
Note, you can identify the line where the byte sequence occurs by finding the line where the ‘COPY “TableName” FROM stdin;’ statement occurs. Add this line number with the 13274 reported above and this should be the line where the byte sequence occurs in the dump file.
Note, if you have one invalid byte sequence, you may have thousands of other invalid byte sequences. One way to deal with the invalid byte sequences in one fell swoop is to use the iconv command.
iconv -c -f UTF8 -t UTF8 pg-dbbackup.YYYYMMDD.dump > pg-dbbackup.YYYYMMDD.dump.txt
pg-dbbackup.YYYYMMDD.dump.txt should import without invalid byte sequences now. Note you might be stripping important information out of your data. But at least the dump re-imports into Postgres database and you can do things with it.
|
global_01_local_1_shard_00001926_processed.jsonl/47534
|
Happy National Novel Writing Month!
November is National Novel Writing Month, a.k.a. “NaNoWriMo”! The challenge is to write 50,000 words in a month. Click the logo above if you want to take the official plunge. But don’t worry – you don’t have to knock out 50,000 words in a month to be a writer. Check out some of these great books to help you on your path to becoming an author!
1. On Writing by Stephen King
2. How to Grow a Novel by Sol Stein
3. The Everything Get Published Book by Meg Elaine Schneider
4. Indie Writer: How to Publish & Market Your Book (The Hard Way) by Michael Frederick
5. The Novel Writer’s Toolkit by Bob Mayer
6. Times of Our Lives: the Essential Companion for Writing Your Own Life Story by Michael Oke
7. Living to Tell the Tale: a Guide to Writing Memoir by Jane Taylor McDonnell
8. The Business of Writing for Children by Aaron Shepard
9. The Complete Idiot’s Guide to Publishing Children’s Books by Harold D. Underdown
10. Chicken Soup for the Writer’s Soul compiled by Jack Canfield
Don’t have time to stop by the library? You can check out these downloadable ebooks and audiobooks from our digital download service, OverDrive!
1. Bird by Bird by Anne Lamott (ebook)
2. Writer to Writer by Gail Carson Levine (ebook)
3. Writing Fiction for Dummies by Randy Ingermanson
4. Draw Out the Story: 10 Secrets to Creating Your Own Comics (ebook)
5. Elements of Eloquence by Mark Forsythe (audiobook)
6. Word by Word by Anne Lamott (audiobook)
When you publish your book, be sure to donate a copy to the library so we can add it to our local authors collection. Happy writing!
|
global_01_local_1_shard_00001926_processed.jsonl/47535
|
Boaz Island
Boaz Island, Bermuda
Boaz Island
Boaz Island, formerly known as Gate’s Island or Yates Island, is one of the six main islands of Bermuda. It is part of a chain of islands in the west of the country that make up Sandys Parish, lying between the larger Ireland Island and Somerset Island, and is connected to both by bridges.
Its east coast forms part of the edge of the Great Sound.
Boaz Island was part of the Royal Naval base, which included the HM Dockyard on Ireland Island. From 1939, Boaz Island was used as a Royal Naval Air Station.
Its primary role was the servicing, repair and replacement of spotter floatplanes and flying boats belonging to naval vessels.
Early in the Second World War, with no other units to fill the role, aeroplanes from Boaz Island were used to maintain anti-submarine air patrols, using whatever aircrew were on hand, including pilots from the Bermuda Flying School on Darrell’s Island. All that remains of the Fleet Air Arm facility today is a hangar on runway road, and two slips.
Royal Naval Air Station in Bermuda
Hanger on Boaz Island
Hanger on Boaz Island
RNAS Boaz Island (HMS Malabar) was a Royal Naval Air Station in Bermuda. The station became the primary base for the Royal Navy in the North-West Atlantic following American independence. It was the location of a dockyard, an Admiralty House, and the base of a naval squadron. In the 20th Century, when aeroplanes were added to the naval arsenal, large warships carried seaplanes and flying-boats for use in reconnaissance, directing the ship’s artillery fire, and for carrying out offensive actions on their own. These aeroplanes were generally carried on, and launched from catapults, and retrieved by crane after landing on the water. Unlike aircraft carriers, the cruisers and capital ships which carried these floatplanes had very limited abilities to maintain their aeroplanes, or to protect them from the elements. Between the two World Wars, the Royal Air Force (RAF) had assumed responsibility for operating the Royal Navy’s Fleet Air Arm (FAA). From 1933, an RAF detachment at the HM Dockyard, on Ireland Island, Bermuda, was responsible for the maintenance of the aeroplanes carried by the C-Class cruisers based at the station.
This detachment, which originally operated on the dockside within the Dockyard, also held aeroplanes in store, crated in parts. When an aeroplane could not be repaired, another was assembled as a replacement.
It was eventually decided to move the FAA operation outside of the yard, and to build a dedicated air station. The under-used Boaz Island, to the South of Ireland Island, was selected. The Island was covered with tarmac areas, a hangar, workshops and living quarters. As no landplanes were handled, there was no need for a runway.
Seaplanes and flying-boats were brought ashore via two slips. The Royal Naval Air Station was completed in 1939, the year the Second World War began. The decision had been made, by then, for the Royal Navy to resume responsibility for its own air arm. Although RAF personnel would continue to make up the shortfalls in the FAA’s naval manpower, Boaz Island would be operated as a completely naval facility. The responsibility of the station remained the maintenance and storage of aeroplanes.
The flying boat station at Darrell’s Island, was largely taken over by RAF Air Transport Command and Ferry Command, during the War. The pre-war civil operator, Imperial Airways/BOAC, as a government airline, was put to war-service. The Bermuda Flying School, also operating from Darrell’s, began training pilots for the RAF in 1940.
Despite the presence of these two air stations, during the first years of the War there was no unit in Bermuda tasked with flying air patrols. Air cover became an immediate requirement as the Colony resumed its Great War role as a staging area for the formation of trans-Atlantic convoys. Air patrols were vital to combating the threat of German u-boats, and the FAA station at Boaz Island, making use of the large store of aeroplanes and munitions on hand, began operating its own air patrols, using whatever aircrew it had on hand. These included Naval pilots from ships in port, and RAF and Bermuda Flying School pilots from Darrell’s Island.
Once the USA entered the war, the US Navy began operating anti-submarine air patrols from RAF Darrell’s Island, then from its own base, USNAS Bermuda, in the West End, and the FAA station ceased its own air operations. Its normal operations ceased to, when it was placed on a ‘care and maintenance’ footing in 1944. The station never re-opened, and Boaz Island was part of the land disposed of by the Ministry Of Defence when the Dockyard was closed in 1958.
|
global_01_local_1_shard_00001926_processed.jsonl/47562
|
// Location: Photographer Pit
Ah, that time again. All the fashionistas fly in from all over the world to the most fashionista-esque city in the world. New York Fashion Week - a week of fashion from the future. New York just feels different during this time - a little more magical. I can't explain it - it's like.. what's that saying about New York.. ah found it, "There's an inherent energy in New York City that it's famous for. It makes you want to get up and do a millions things all day and stay up all night." <-- word homie.
[you can read about my experience shooting for runway here!]
Anyway, it's Wednesday which means new horoscopes! Click here. x -C
|
global_01_local_1_shard_00001926_processed.jsonl/47618
|
Contrabass Digest
To subscribe or unsubscribe, email [email protected]
list Tue, 7 Jul 1998 Volume 1 : Number 23
In this issue:
Date: Mon, 06 Jul 1998 19:43:42 -0700
From: Grant Green <[email protected]>
To: [email protected]
Subject: Bass Sax
OK, the bass sax pics are up now. See http://www.contrabass.com/contra-archive/frenchmart.html. They're at the top.
Grant Green
Just filling in on sarrusophone.......
Date: Mon, 06 Jul 1998 23:53:10 -0400
From: Jim Lande <[email protected]>
To: [email protected]
Subject: range of hearing
> From: Lelia Loban, [email protected]
> directly into each other). The average person can hear up to about
> 20,000 Hz, although there's considerably more variation between
> individuals at the top of the normal range. Most people lose
> something off both ends of our range as we age.
You got that right. My motto is: Boogie when the dog boogies!
Date: Tue, 7 Jul 1998 00:09:39 EDT
From: <[email protected]>
To: [email protected]
Subject: Re: list V1 #22
In a message dated 7/7/98 4:33:18 AM, you wrote:
<<And Paul, who said that I was going to compare the
number to Buescher numbers??? They are many institution that I can contact
to try to get information on this horn; you're not always the only one who's
right...;-) (though I was wrong about the them all being Bueschers...).>>
Please re-read my post. I made non of these assertions.
<<Did Harwood make anything other than Basses; I've seen several Harwood
bass saxes; but never anything else made by Harwood..>>
I have seen Harwood baritones, C melodies and curved sopranos. I can not
recall seeing the other sizes.
Paul Cohen
Date: Tue, 07 Jul 1998 00:18:14 -0400
From: "Farfl's house" <[email protected]>
To: [email protected]
Subject: Bechet's 2nd tune!
What I REALLY want to know is the name of the song that Dr. Cohen says
Sidney Bechet played sarrusophone on (besides "Mandy, Make Up Your
Mind".) Any additional info will also be appreciated!
Steven Lederman
Date: Tue, 07 Jul 1998 16:10:22 -0700
From: Grant Green <[email protected]>
To: [email protected]
Subject: Re: sub-woofer hearing
Interesting topic! Welcome aboard!
At 07:12 AM 7/6/98 EDT, Lelia wrote:
>1. The overtone series of any note includes octaves, doubled octaves, and so
>forth. Maybe at times we hear a high partial and only think we're hearing the
>fundamental. In other words, we expect a certain note, and therefore we may
>extrapolate what the foundation tone of the audible harmonic series ought to
>sound like, even though in fact we can't hear a tone that low. We imagine it.
This certainly happens, although I wouldn't use the term "imagine."
Difference tones are a physical function of our auditory system. Somehow
the ear and/or brain "fills in" missing frequencies. This is why one can
listen to recorded music with significant bass content even over very small
speakers. Consider how large the speaker in a headphone is. You can
demonstrate physically that the tiny cone is incapable of putting out a
significant amplitude in the bass range, yet we hear bass all the same. If
the bass instrument was recorded in such a way that its upper harmonics are
audible, the ear can reconstruct the missing fundamentals. Are there any
recording engineers among us?
>2. People with a fondness for low pitch may develop the ability to sense the pitch
>of a wave with faculties other than hearing. We may "hear" some frequencies
>by subconsciously perceiving the speed of the vibration of the hair on our
>arms, for instance.
I think a form of this is true also. I think we are all capable of
detecting low frequencies, at some amplitude, but that the boundary between
pitch and "other sensation" varies from person to person. Those of us who
roam the depths learn to discriminate the degrees of depth finely, just as
the Aleut distinguishes between 85 different forms of snow. I think that
the more you play in the contrabass register, the more acute our hearing
for those notes - I suspect more a function of the circuitry than the
>3. Maybe this site self-selects for people with freakish hearing. (I trust
>that no self-respecting Contrabass Maniac will be insulted by the term
>"freakish".) It may be that our attraction to sub-bass instruments is quite
>literally bred into us and that the business about "hearing voices" coming
>from the bell of the monster horn is no joke--it may be that we really do hear
>things that most people can't.
I suspect that most of the reported "hearing ranges" refer to averages over
a broad section of the population, and do not represent the actual range
for many individuals. It would be interesting to study the perception of
low pitches in musicians, e.g., contrabassoonists vs. flute/picc players,
and see if there is a systematic difference. It would also be interesting
to determine if the hearing makes the choice of instrument or vice versa.
Grant D. Green [email protected]
www.contrabass.com Just filling in on sarrusophone
Contrabass email list: [email protected]
Date: Tue, 7 Jul 1998 22:40:02 EDT
From: <[email protected]>
To: [email protected]
Subject: Bb bass sarrusophone in recital
This upcoming weekend in Tacoma, WA there will be a tubafest recital. This
is a national gathering of tubists from all over the country. I am
participating in a group known as Ex Lingua Mortua which features Bb bass
sarrusophone, 3 double-belled euphoniums (euphonia?), helicon, serpent, and
ophecleide. We are performing a piece which was specially commissioned,
called "Suite For Endangered Instruments" by William Berry. It is in 6
movements each of which is based on a kind of dance (gavotte, tango, etc.).
We are playing Saturday night and of course many other ensembles will
participate as well. The last weekend of the month willl find us performing
at the Sandpoint, ID music festival as well. In addition to the commissioned
work, we will also be performing a variety of popular tunes. More details
later as I find out. Michel Jolivet
End of list V1 #23
Next Digest ->
Previous Digest <-
|
global_01_local_1_shard_00001926_processed.jsonl/47623
|
On June 9th, Shane Swilley presented on a panel at ALFA International’s Insurance Law, Labor & Employment, and Professional Liability Practice Groups Seminar, in New York City on the ramifications of the legalization of marijuana. The presentation included the employment-related issues and ramifications of state laws legalizing the use of marijuana including the question: What can an employer do when an employee comes to work under the influence of marijuana in a state where the recreational or medical use of marijuana is legal? The panel discussed case law related to medicinal use during work hours, restrictions on the use of equipment and machinery, drug testing implications and some peculiar state law nuances regarding employee termination or discipline for marijuana usage or influence in the workplace.
|
global_01_local_1_shard_00001926_processed.jsonl/47629
|
A Quick Run Down Of Types Of Crossbow Arrows
Crossbow Bolts
In the world of crossbows, there is a wide range of specialized terminology. The actual projectile being fired, for instance, is known as both an arrow and a bolt, yet the two terms can in fact be used interchangeably. But many new crossbow users quickly find that there is so much more to even a simple, low tech projectile that it appeared at first. There are a number of types of crossbow arrows, each of which has its own uses and all of which a shooter is advised to experiment with at some point just to see how the different arrows work for their particular style of archery.
The major distinction between different crossbow arrows is the type of tip it has on its head, also know as the arrow’s bolt head. There are a number of these bolt heads out there, each of which has its own use.
Field Points: These are the most common bolt head, simply because they are the arrows shooters tend to use the most. These arrows are also known as target points because they are used solely for target practice with a crossbow. These arrows have little chance of felling an animal quickly enough to be used in good conscience or safety, but they are perfect for flying straight and burying themselves deep enough into nearly any kind of crossbow target set up. This enables shooters to practice with their crossbow.
Fixed Blade Broadheads: These are the simplest of the bolts intended to actually be used in hunting and as their name would imply, are simple fixed blades that are one single element of the bolt head. These bolt heads are typically razor sharp with the intent of killing animals so caution is called for when using these arrows. Additionally, these bolt heads are all one piece and can’t be removed.
Removable Blade Broadheads: These bolt heads are much like fixed blade broadheads in both construction and intent. However, these arrows are constructed with the assumption that the shafts of the arrows are going to be reused. Thus, these bolt heads are removal from the shaft, allowing one arrow to be reused multiple times.
Expendable Blade Broadheads: This advanced form of crossbow arrow features a spring system that allows the blades to stay folded up towards the center of the arrow, but to expand into two, three or four separate blades intended to cause a great deal of damage. One advantage of these arrows that they are highly aerodynamic, flying through the air in a straighter line than the fixed and removable blade bolt heads, yet doing even more damage to a target.
Ideally would be hunters will practice with their crossbows and thus require field points to practice both their aim and get them used to using a crossbow safely. However, for an actual hunt, a sharper, more dangerous arrow is called for. The nuances between these different arrows is worth a further look for those who are truly dedicated to the sport of crossbow hunting.
|
global_01_local_1_shard_00001926_processed.jsonl/47631
|
Tom Murphy VII welcomes you to the internet.
CS PhD alumnus (2001–2007)
Advisors: Bob Harper, Karl Crary
Phone: Who uses phones??
Hi I finished grad school! Now I'm just a guy with a PhD, some papers, and a bunch of projects.
I love programming languages to the max. For my research I worked on the ConCert Project, eventually designing and implementing a typed programming language for distributed programming called ML5. It's based on modal logic and I formalized lots of the proofs in Twelf so they can be verified by our patient and careful friends, computers. Lots of people don't care about programming languages, possibly because they think that all languages are the same, or they don't want help from their patient and careful friends, or have never used an optimizing compiler for a high-level language, or they suspect that programming is mostly about taping together programs that other people wrote. I am fairly certain that I have more fun programming than these people, which makes me sad.
I love to make things. For many years, I used to crank out loads of TrueType fonts. I bet you have seen them on posters or T-shirts and not even known it. I also spent a long time writing and recording music in profusion for my album-a-day project or other bands. Like for example I like to make intricate Nintendo-esque songs with primitive waveforms, or bedroom acoustic guitar with my homebrew plugins.
One of the best things about grad school was that if you get your work done then you get to do other stuff too. Like for example in 2003 I wrote a novel called Name of Author by Title of Book in a month. The next year I wrote His Sophomoric Effort which I would even not be embarrassed if you read.
Some know me for my software that learns to play Nintendo games and my video series showing its adventures. I made them for the prestigious conference SIGBOVIK. I also figured out how to automatically make NES games 3D and do seemingly impossible tricks by reverse-emulating NES hardware.
Other hacks with videos include a portmanteau of every word in English, a C compiler that produces executable text files, and unlikely bikes.
Exploring the dizzying depths of uselessness, I once Alphabetized Star Wars. Disturbingly, it might be my most famous accomplishment.
More recently I have been making games in 48h periods for an event called Ludum Dare. You can play these in your browser. I'm most proud of T in Y World (theme "Tiny World") and Dragon Drop (theme "Minimalism"—there's more to it if you think to dismiss it). Entire Screen of One Game (theme "Entire Game on One Screen") unexpectedly exploded hundreds of thousands of brains (and ended up in the Centre Pompidou!). But Is Lands? (theme "Islands"); Disco? Very! (theme "Discovery"); Priority Cats (theme "It's dangerous to go alone. Take this!"); One of the best birthdays (theme "Evolution"); Escape Cod (theme "Escape"); Point One Hurts (theme "10 Seconds"); Age of Umpires (theme "You are the villain"); Single Dragon (theme "You only get one"); Connector World (theme "Connected Worlds"); and Running out of Space (eponymous theme) may entertain you as well.
Escape is a cross-platform puzzle game I made over the course of 20 years (!). It's like a push-the-blocks game with other gadgets and a built-in editor and online features and a lot of really creative puzzles that people have submitted.
Spare cycles during class were directed into my notes, which are a stream-of-consciousness circus of typography and cartooning. They're collected in Illustrated Notes from Computer Science for your amusement. For a while I would upload my photographs but now I just keep them on my computer and never show them to anyone.
Another weird thing is that I'm trying to run the length of every street in Pittsburgh.
snoot.org is a highly interactive web page I started ten years ago, and occasionally work on.
Here are some high-speed movies, some old MIDI thing, a program for making Nintendo music out of MIDI files, icon emporium, a game we made for OLPC called Headcat, my stillborn proposal for a new CSD logo, how to fix MP3 players if you're me or impatient like me, hi-res pictures of me, some kind of high-performance computational genomics tool, and all the talks I ever gave.
Back when I was an undergraduate at CMU, I made a different web page that has lots of other stuff on it and is kind of embarrassing.
And finally, though this page is rather static, I have a weblog called Tom 7 Radar which I keep up-to-date with my adventures and projects. You can also find me on Twitter as @tom7.
snoot.org tom 7 radar fonts.tom7.com album-a-day old CMU webpage
|
global_01_local_1_shard_00001926_processed.jsonl/47653
|
Ironing garments | De'Longhi Thailand (English)
Ironing garments
A suit or a duster, a shirt or a skirt ... All deserve to be treated for what they are. They all have different shapes and different fabrics, so they must be ironed differently.
• Suits
Iron the lining first, then the neck, waistband and pockets (plus any laces and frills). Then move on to the sleeves and finally the back and the front.
• Shirts
Iron the neck first (stretching gently to flatten it out and using the tip of the iron to avoid wrinkling). Then iron the yoke, arranged neatly over the tip of the ironing board. Do the cuffs and sleeves, and finally the front and the back. Iron folds from the reverse side to avoid flattening them.
• Skirts
Iron the lining first. Iron the waist from the reverse side. Then iron the rest.
• Trousers
Iron the pockets and waistbands from the reverse. Turn the right side out, aling the inside leg seams and iron one leg at a time. Cover with a cotton cloth to avoid shining.
• Curtains
Iron the top first. If you have nobody to help you, drape the ironed part over the backs of one or more chairs and move the chairs gradually away from the ironing board as you proceed. Place a step ladder near a window before you start, so that you can hang the curtains up quickly before they get creased again.
• Tablecloths
Iron the edges and any embroidery from the reverse. Fold in a half first and iron from both sides. Then fold iron again, but avoid ironing the folds. Gradually rotate around tablecloths on the ironing board for a first pass, then fold in half and fold the ends in until they meet in the middle, so that the tablecloths forms a large rectangle. Finally fold the tablecloth as needed to obtain a neat square or rectangular shape.
• Embroidery
Starch items first then pin them outside down on the ironing board, inserting the pins at regular intervals to maintain the original shape. Iron while still quite damp. If necessary, iron the edges again after you take the pins out.
|
global_01_local_1_shard_00001926_processed.jsonl/47663
|
Browse DevX
Sign up for e-mail newsletters from DevX
Dynamically Executing Code in .NET
Dynamic code execution is a powerful feature that allows applications to be extended with code that is not compiled into the application. Users can customize applications and developers can dynamically update code easily. Learn what it takes to execute code dynamically with the .NET Framework and create a class that simplifies these tasks by wrapping the details of the process in an easy-to-use interface that requires only a few lines of code.
xecuting code dynamically at runtime is a powerful tool to allow users to customize applications after deployment. .NET provides all the tools that make it possible to build code on the fly, compile it and run it dynamically.
I come from an xBase background and have been using Visual FoxPro for many years. One of the nice features of xBase is the ability to dynamically execute code in applications. In Visual FoxPro you can execute code from a string simply by calling EXECSCRIPT() or executing a single expression by calling EVALUATE(). In other environments, however, dynamic code execution is considerably more difficult to achieve, especially in true compiled languages that make it impossible to run code on the fly directly. Those tools have to rely on external tools like the Active Scripting control from Microsoft or other third-party parsers.
Dynamic code execution is a powerful tool for extending applications and allowing customization of an application after it has shipped. Plug-ins and other end-user extensibility features almost exclusively rely on the ability to execute code after formal compilation of the application. Scripting engines and template formatting use dynamic code when it's necessary to mix data with the display output. A good example of this is ASP scripting, which basically is a sophisticated script parser that executes code on the fly. (See Sidebar: Assemblies and Namespaces)
.NET provides full control over dynamic code execution natively via the .NET SDK classes. However, the process is not nearly as trivial as it is in Visual FoxPro. It requires a fair amount of code to accomplish something similar and you need to know how .NET loads assemblies into the application. In exchange, .NET provides a lot of flexibility in using dynamic code with full control over the entire process including compilation, error reporting, loading objects, and controlling the environment.
Compiling Code on the Fly
.NET provides powerful access to the IL code generation process through the System.CodeDom.Compiler, Microsoft.Csharp, and Microsoft.VisualBasic namespaces. In these namespaces you'll find the tools that allow you to compile an assembly either to disk or into memory. You also need the Reflection namespace as it contains the tools to invoke an object and its methods once you've compiled the object.
In the following example I'll demonstrate how to execute an arbitrary block of code. The code is free standing and has no dependencies. The process to execute this code dynamically involves the following steps:
1. Create or read in the code you want to execute as a string.
2. Wrap the code into fully functional assembly source code, which includes namespace references (using commands), a namespace, and a class that is to be invoked.
3. Compile the source code into an assembly.
4. Check for errors on compilation.
5. Use the assembly reference to create an instance of the object.
6. Call the specified method on the instance reference returned using Reflection.
7. Handle any return value from the method call by casting into the proper type.
Figure 1: This sample form demonstrates how to execute code from the top text box dynamically.
The example shown in Listing 1 demonstrates the code to perform these steps. Figure 1 shows an example of the form that utilizes this code. Please note that there's only minimal error handling provided in most code snippets for brevity's sake.
The code begins by creating various objects that are required for compilation. It then uses the CompilerParameters object to add any assembly references required during compilation. These are the physical DLLs that are required and are the equivalent of what you add in the VS.NET project References section. Note that it's very important that every reference is included or you will get compiler errors. This is one of the tricky parts about dynamic code compilation as this step must occur in your application code. Here the Windows Forms assemblies are included to allow using the MessageBox object to display output.
The next step is to generate the complete source code for an assembly. This example makes a few assumptions about the code in that it presets the method parameter and return value signature as:
public object DynamicCode(params object[] Parameters);
So a block of code MUST return a value of type object or null. It can also accept any number of parameters that can be referenced via the Parameters collection. A simple example of a string to execute might be.
string cName = "Rick"; MessageBox.Show("Hello World" + cName); return (object) DateTime.Now;
If you wanted to access parameters dynamically instead you might do this:
string cName = (string) Parameters[0];
Note that you should cast parameters explicitly to the specific type since the object parameter is generic. You can also return any value as long as you cast it to an object type.
This code is now fixed up into an assembly by adding namespace, class, and method headers. The final generated code that gets compiled looks like this:
using System.IO; using System; using System.Windows.Forms; namespace MyNamespace { public class MyClass { public object DynamicCode( params object[] Parameters) { string cName = "Rick"; MessageBox.Show("Hello World" + cName); return (object) DateTime.Now; } } }
This code can now be compiled into an assembly by using the CompileAssemblyFromSource() method of the CodeCompiler. The CompilerResults object receives information about the result. You can retrieve compile errors via the HasErrors property and Error collection. If there were no errors you get a reference to the Assembly in CompiledAssembly property from which you can call CreateInstance() to create a live instance of the MyClass class.
This is where Reflection comes in: Because we've basically created a .NET type on the fly, the object reference and all method access must occur dynamically rather than through direct referencing. The compiler has no idea of the type at compile time, but must delay creation and type info until runtime. So when I called CreateInstance an object of type Object is returned and I have to use Reflection and InvokeMember to call a method on the object indirectly.
The actual call to the object method then proceeds and returns a reference to a generic object type (much like a variant). This type can contain data of any type and I suggest that you immediately cast the return type to an explicit type if possible. Notice also the error handling around the InvokeMember call—this is fairly crucial as it protects the calling application from any runtime errors that occur in the dynamic code.
I've demonstrated this technique by using Visual C# .NET as the dynamic code language here. You can also use Visual Basic by using the Microsoft.VisualBasic namespace and using the VBCodeProvider class instead to instantiate the loCompiler object. Of course, you'd have to change the assembly source code to VB syntax in addition to the actual dynamic code I show here. The class I'll present later provides the ability to execute both C# and VB code by setting a language property.
As I mentioned at the start of this article, .NET provides a lot of functionality and control over the compile and execution process. However, this is a lot of code to have to integrate into an application each time you want to execute dynamic code. To make life easier I've created a class that simplifies the process considerably and aids in handling errors and debugging the code should errors occur.
Comment and Contribute
|
global_01_local_1_shard_00001926_processed.jsonl/47664
|
Browse DevX
Sign up for e-mail newsletters from DevX
Tip of the Day
Language: Visual Basic
Expertise: Intermediate
Aug 7, 1997
String Surprise
I was developing a CGI application that read a database and pieced together the fields into a string for representation as an HTML form. The surprise came when I found how slow it was-20 seconds was unacceptable for the task. I first suspected the database access and thought there was no way to improve it; however, upon investigating further, it turned out to be the loop that concatenated the fields into the string. A simple change took the run time of the routine down to about one second. In this simplified example, instead of writing this code:
For i = 1 To 10000
strHTML = strHTML & strField & vbTab
Next i
Break it down into something like this:
For i = 1 To 100
strTemp = ""
For j = 1 to 100
strTemp = strTemp & strField _
& vbTab
Next j
strHTML = strHTML & strTemp
Next i
Admittedly, the number of concatenations is high, but the difference is astounding. In the 16-bit world, the second example is about 20 times faster than the first on my machine. However, in VB 32-bit, my Pentium 133 with 32 MB RAM takes 48 seconds for the first case and less than one second for the second case. I hesitate to suggest a precise speed improvement because of the complexity of Windows 95 and different hardware, but if you must concatenate large numbers of strings, this could become a make-it-or-break-it problem.
Nick Snowdon
Comment and Contribute
|
global_01_local_1_shard_00001926_processed.jsonl/47688
|
Monday, September 17, 2012
Do You Prologue?
By Steve Weddle
Found some interesting discussions around the web (olde tyme) about whether to included a prologue in your query when searching for an agent.
When sending out queries, I have noted that most agents ask for, in addition (of course) to a great query letter, a synopsis and the first chapter (or more) to get a sense of the writers ability, etc. What do you do with the prologue? The novel I am working on has a short (3 page) prologue. My reason for putting this in is to generate several questions that I hope will make the reader want to read the whole story. The prologue is actually about what happens as the end of the story, without giving away the final outcome. Since it is completely out of sequence with the beginning of the story, I can't see making it a separate scene of chapter 1. So, can it be sent along with the requested chapter 1? Or should I just make it the opening scene and not worry about the fact that it is not in sequence with the rest of the chapter?
Prologue in queries?
Query Shark deals with a submitter who sends five pages, all prologue. She says that none of the characters mentioned in the query show up in the prologue, so it seems like another book. And she says, "That's one of the (many) problems with prologues. When you query with pages, start with chapter one, page one. Leave OUT the prologue." from edittorent
I'd suggest never, ever writing a prologue. You'll be safe then.
But if you're writing a thriller about an artifact and you need to show that the Antikythera mechanism is a powerful piece of ancient tech that will allow Dr. Nastyballz to overtake the planet's water supply, do you include that prologue?
You know, the top of the page says something like
Alexandria, 142 BC
all in italics and all.
Blah, blah, blah. Old spooky crap.
Then, the scene ends all dramatic and shit.
Then, BAM, you're into Chapter One in which our hero, the brilliant but troubled Dr. Huffenpuggle, is trapped in a museum, running for his life and being chased by guards or assassins or his angry ex-wife with whom he keeps an on/off relationship (but he secretly loves her and she loves him but will they ever be able to set aside whatever it was and get back together?) and there he goes running.
So, do you query starting with PROLOGUE or with CHAPTER ONE?
I'm thinking go with Chapter One. It's a better hook.
Nick said...
Depends on the book, I imagine.
And on who it was you're querying.
Some agents just want a sample don't they?
Don Lafferty said...
No prologue.
Anonymous said...
If the prologue is short who cares
Anonymous said...
This comment has been removed by a blog administrator.
Anonymous said...
I get a little annoyed with the anti-prologue bias, considering that some very good writers have used them as teasers. If it's such a crutch, why does, say, Sean Chercover use one? I'd argue his is a better novel for it.
Elaine Ash said...
I would caution against mutilating a book or writing style to fit queries. They can be like strait-jackets for fresh stories. Good work, good reviews and a reputation are all a writer needs to land a deal. A query doesn't even need to come into play.
Jack Badelaire said...
Even though I'm not farming my books out to publishers, I've run into this before, with Amazon previews. My first novel is, essentially, the origin story of a vigilante turned killer-for-hire. The first chapter (it's really too long to be a prologue) takes place "now", while the rest of the book takes places a decade before. Plenty of people say that the setup works, so I don't think I'm screwing up by doing it this way, but at the same time, If you read the description on Amazon and then try the sample, you might not get what the deal is. Thankfully Amazon's sample spills into Chapter Two, which immediately sets you straight, but things could still be confusing.
In my second novel, I use another prologue that actually says "Prologue" and all that jazz. It's a year before the start of the real adventure, it introduces the main character, and it's not terribly long. I think it fits the standard conventions of a prologue better, but I'd still want someone to read at lest Chapter One as well.
Decisions decisions...
|
global_01_local_1_shard_00001926_processed.jsonl/47693
|
Abscess - infection caused by severe tooth decay, trauma or gum disease.
Amalgam - a silver and mercury material used for fillings.
Anterior - the teeth in the front of your mouth.
Apex - the very tip of the root of a tooth.
Aspirator - a suction device your dentist uses to remove saliva from your mouth.
Bleaching Agent - a gel used to whiten and brighten teeth.
Bonding - a plastic composite painted on the teeth to correct stains or damage.
Bridge - one or more artificial teeth attached to your adjacent teeth.
Bruxism - the clenching or grinding of teeth, most commonly while sleeping.
Canine - the pointy teeth just behind the laterals.
Caries - another name for cavities or decayed teeth.
Cavity - a tiny hole in the tooth caused by decay.
Central - the two upper and two lower teeth in the center of the mouth.
Crown - an artificial tooth or cover made of porcelain or metal.
Cuspid - the pointy teeth just behind the laterals, also known as canines.
Decalcification - the loss of calcium from the teeth.
Deciduous Teeth - also called "baby teeth."
Dental Implants - an implant permanently attached to the jawbone that replaces a missing tooth or teeth.
Denture - a removable set of artificial teeth.
Enamel - the hard surface of the tooth above the gum line.
Extraction - the removal of a tooth or teeth.
Filling - a plug made of metal or composite material used to fill a tooth cavity.
Fluoride - a chemical solution used to harden teeth and prevent decay.
Gingivitis - inflammation of gums around the roots of the teeth.
Gums - the firm flesh that surrounds the roots of the teeth.
Incisal - related to incisors (see below).
Inlays - a custom-made filling cemented into an unhealthy tooth.
Instant Orthodontics - alternative to braces using bonded porcelain veneers or crowns.
Lateral - these are the teeth adjacent to the centrals.
Night Guard - a plastic mouthpiece worn at night to prevent grinding of the teeth. Often used to treat TMJ.
Pedontist - also known as a pediatric dentist, a dentist that specializes in the treatment of children's teeth.
Periodontist - a dentist specializing in the treatment of gum disease.
Plaque - a sticky buildup of acids and bacteria that causes tooth decay.
Posterior Teeth - the teeth in the back of the mouth.
Primary Teeth - also known as "baby teeth" or deciduous teeth.
Root - the portion of the tooth below your gum line.
Sealant - plastic coating applied to teeth to prevent decay. Used most commonly for children.
Secondary Teeth - the permanent teeth.
Six-Year Molar - commonly known as "the first molar."
Tartar - see calculus.
TMJ Syndrome - a disorder associated with the joint of the jaw. Often caused by a misalignment of or a disparity in upper and lower jaw sizes.
Tooth Whitening - a process designed to whiten and brighten teeth.
Twelve-Year Molar - commonly known as "the second molar."
Drs. Friedman & Friedman and Associates
• Drs. Friedman & Friedman and Associates - Woodholme Medical Building 1838 Greene Tree Rd., Suite 270, Baltimore, MD 21208 Phone: 410-653-0040 Fax: 410-653-8178
|
global_01_local_1_shard_00001926_processed.jsonl/47731
|
Kissoft EUROFLY homepage
Our company
We realized 179 flights today
with 19691 passengers.
Value of company assets is 2147483416 dollars
Current traffic
We have 22 planes in air
Who's Online
Currently there is/are 17 visitor(s)
Donate Eurofly through Paypal
Play Eurofly with joystick
Is the keyboard control not what you are searching for? Do you want to feel during the flight more than a pilot in real aircraft cockpit? If yes, a joystick (flight controller) is the right choice for you.
Do you already have a joystick and do you want to use it with Eurofly? Well, you can use this amazing application, which will do It for you.
English mailing list about Eurofly and other Kissoft products
After The Slovak mailing list about Kissoft products we started an English version of this list.
How to subscribe:
1. Send a blank e-mail to en-kissoft+subscribe(@)
2. You will receive a confirmation e-mail. Simply reply to this e-mail, leave the subject and body as it is.
3. You will receive further instructions.
4. After subscription, you can send your messages to en-kissoft(@)
If you need help with Eurofly, visit our Help center
If you want to download Eurofly or some add-ons for it, visit our Download center
To contact Kissoft, you can send an e-mail to kissoft(@)
Other news
7 new voices in Eurofly
7. 4. 2018
We have 7 new voices of different languages in our company. Igna is an english dispatcher, Ilija, Milan and Zeljko are our serbian dispatchers, Daniel and Richard are our german stewards. You can find it in our download center or in add-ons menu in Eurofly. Happy flying
Melanie, Milan and Nail - 3 new add-ons
31. 3. 2018
We have 3 new add-ons in different languages for you. Melanie is a french stewardess, Milan is a serbian ground and Nail is a russian dispatcher. You can download the new add-on in your preffered language in our download center or in add-ons menu in Eurofly. Happy flying and happy Easter.
Eurofly now in german language!
25. 3. 2018
We are very happy to announce that David Parduhn and his team created a german translation of Eurofly. From this moment our german pilots can play Eurofly in theyr native language along with 4 grounds and 7 towers also in German.
If you want to have Eurofly in german language, you have to download the new installer of Eurofly which contains also german version. The installer contains 1 german ground 1 german dispatcher and 1 stewardess. All other grounds and towers are available in add-ons menu of Eurofly.
If someone of non-german pilots want to have some german tower or ground, he can download it in add-ons menu.
Thank you David!
Update 2.0.11
9. 3. 2018
The version 2.0.11 comes with some little fixes:
- fixed the problem with Concorde and other similar planes which has different take of and landing speed
- fixed the problem with crashing an application after selecting the languages for communicator
- fixed the problem with right position of favourite points
- fixed the problem with typing an angle of ascending or descending in autohight
- fixed the problem with uncorrect information about target destination on the web, when the target point is not an airport
- fixed the problem with speaking of the ground or dispatcher which talked also after changing a frequency
- added the first version of sapi support in traffic panel. You can now read it with up and down arrows
Happy flying
European tour
6. 3. 2018
European tour is a name of new tasks pack. In 26 tasks, you will learn about the basic geography of Europe and visit all its capitals. After completing this tasks you will get a geographic certificate "Europa expert". The author of this pack is Radek Seifert from Czech republic. In this taskspack is turbo feature unavailable. Happy flying!
Eurofly 2.0.10
5. 3. 2018
The version 2.0.10 fixes the problem with long messages in communicator, problem with certification of planes after changing the plane and problem with automatic hight.
3 new grounds and new pack of airplanes
2. 3. 2018
We have 3 new grounds for you. Gigi is an italian ground, Nail is an english ground and Zdenek Sagner is a czech new ground for Eurofly.
We have also new pack of planes for you. Our official pack contains 37 planes now.
All new add-ons you can find in our Download center.
Our new aircraft policy
27. 2. 2018
We have new aircraft policy, valid since the 1st March 2018. The complete document about our aircraft policy and Rules of evaluating the Eurofly pilots you find here.
Eurofly 2.0.9
25. 2. 2018
The new update of Eurofly comes with some little fixes and one little feature. After pressing alt+Z for setting an automatic hight you can set also the angle of your climbing or descending. Both values can be written to the edit field as two values, separated with ,. For example: if you pres alt+Z and write only 10000 your plane will climb in default angle of 15 degrees. If you pres alt+Z and type 10000,7 your plane will climb in angle of 7 degrees.
Eurofly 2.0.8 is here
18. 2. 2018
The new update of Eurofly comes with some little news:
- the problem with spanish transceivers is finally fixed
- the problem with freezing the application during communication with server is fixed
- the problem with repeating a last message by pressing shift+W is fixed
- the problem with announcement about opened doors is fixed
- the problem with long messages in communicator is fixed
- you can now change the plane in hangar
- you can show the homepage of Eurofly dirrectly from traffic panel by pressing ctrl+H
- you can show the webpage of traffic dirrectly from traffic panel by pressing ctrl+T
- you can show the webpage of pilots dirrectly from traffic panel by pressing ctrl+P
- you can show the webpage with informations about pilot in communicator by pressing ctrl+H on the message of pilot
- The TCas signal should be played only when you have a critical altitude
We wish you lot of joy with Eurofly
Kissoft EUROFLY homepage
Copyright ? 2017 by Stefan Kiss
|
global_01_local_1_shard_00001926_processed.jsonl/47786
|
Lil Messengers
I love having young parents at my gigs because they always send their young kids tottering up to deliver tips and song requests on their behalf. This is already adorable but what’s better is that I get to watch the entire interaction play out: a mom stands her little boy out of his chair and looks him in the eye. She hands him the money and the request, gently folding his tiny hand around it herself as she explains their mission. She leans in and whispers instructions quietly, discreetly, like she wants the collaborative nature of their plan to be a secret. Then she points right at me, blowing their cover.
Almost every time, the kid looks at me, then back at her with fear and confusion in his eyes. “Really? ME?” he seems to say. “Yes,” she says, nudging him in my direction. Sometimes he gets halfway towards me then suddenly runs back, wrapping himself around his mother’s leg. She shakes him off and, seizing the teachable moment, urges him not to be afraid and to try again. He always does.
I’m in the middle of a song and there’s not enough time between lyrics for me to tell the boy everything I want to - that I saw he was afraid but came up anyway, that I’m proud of him, that my heart is a little warmer for witnessing his family today - so I usually say a quick “Hey - thank you!” and hope his parents know the rest.
|
global_01_local_1_shard_00001926_processed.jsonl/47792
|
How I Pack My Toddlers Meals
May 4, 2017
on the go, plastic free
The more intentional I become with how I care for my child and what I bring into my home, the more aware I am of how hard and expensive it actually is to live on a more conscious and healthier basis. I can see why people sometimes choose to opt out. Since Noah was about 18 months old, I started to transition all of his plastic toys to wooden. That alone was definitely an investment. Shopping for wooden toys comes with a hefty price, but when I consider all the pros, like their longevity and how how they're gender-neutral, its quickly worth it to me. A few months ago I got rid of all things plastic in my kitchen and more recently have done my research in the best pieces I can afford for Noah's meals on the go. I will let some plastic getaway if its BPA, BPS, and Phthalate free, (like these that are made from recycled jugs), but I prefer to not have it all together.
I found a few pieces that are well-worth the price. Stainless steel is a great option for kids because they're unbreakable. This three-in-one ECOlunchbox has served its purpose during our outings, whether its to Disney World or the park down the street. This little box is made of 3 compartments; one under, one above, and a nesting pod. Noah's 2 years old and lately he's been a little picky. Sometimes he chooses the same thing day after day, a peanut butter and jelly sandwich with some fruits on the side. I ain't mad. This 3-piece is perfect for packing his little meals. In the "downstairs compartment" a sliced sandwich fits perfectly. You can get as creative as you want- its a lunchbox! Pastas, rice and beans, mac & cheese... whatever your little one chooses to eat. Up top I typically add dry snacks and on the small nesting post I'll add some fruits, usually blueberries, chopped up grapes and/or strawberries.
I love these so much because not only do they pack everything so neatly and are aesthetically pleasing, they're made from high-quality stainless steel and are lead free. One thing to note is that these are not 100% leak-proof and this is because there are no plastic or synthetic gaskets used to prevent leaks. I wouldn't load it with soup or any foods that would leak anyway, so I don't worry about that.
Noah uses small stainless steel utensils and a stainless steel water bottle!
Post a Comment
Latest Instagrams
© Gentle Maven. Design by FCD.
|
global_01_local_1_shard_00001926_processed.jsonl/47842
|
Leiden University in The Hague
Leiden University Presents: The HOPweek
The HOP-committee is part of Leiden University, which is located in two cities: Leiden and The Hague. In the academic year 2015-2016, the university took the initiative to not only organise an introduction week in Leiden (The EL CID), but to also organise an introduction week in The Hague: The Hague Orientation Programme. This introduction week is especially for students of the bachelor programmes Public Administration, Leiden University College (LUC), International Studies, International Relations & Organisations, Security Studies and Urban Studies. Students of the master programmes which are taught in the Hague can also take part in the introduction week.
|
global_01_local_1_shard_00001926_processed.jsonl/47863
|
Tag Archives: H S Code of a product
What is H.S. Code in Export – Import Industry
We are unable to make people follow a uniform code of behavior or thinking or mannerism, here we talk of H.S. Code is being used in the same form, same fashion, and the same coding all across the World. The most structured, Uniform and systematic process is the International business! International Trade is the oldest… Read More »
|
global_01_local_1_shard_00001926_processed.jsonl/47867
|
How To Add Gadgets Above Blogger Header
How To Add Gadgets Above Blogger Header
In this post, I'll show you how to add widgets above your blogger blog's header. These gadgets are useful in placing ads, social networking widgets, extra navigation links above the header.
You'll find that the region above header is locked and there's no way to add extra gadgets above it. So how do you unlock it? To achieve this, you don't have to make any major modifications here, one minor XML tweak and you're done.
Follow the steps to add more gadgets above blogger header:
Note: Backup your template.
1. Go to your Blogger dashboard
2. Now go to Template -> Edit HTML -> Click Proceed.
gadgets above blog header3. Search for the following code using CTRL+F
<b:section class='header' id='header' maxwidgets='1' showaddelement='no'>
4. Now change the value of "maxwidgets" to the number of gadgets you wish to add.
5. Similarly, change the "showaddelement" value to ‘yes’.
6. Save the template.
7. Now go to the layout section of your blog.
8. You will see an extra ‘Add a Gadget’ button above the header.
That's it!
1. I have a question - after you've added the ability to add gadgets above the header, is there anyway to split those gadgets in two?
2. The "maxwidgets" property enables you to add as many gadgets as required.
About Me
A computer science graduate with over 7 years experience in Web/Game development, A passionate Blogger and Photographer.
Copyright © | Sitemap |. Powered by Blogger.
|
global_01_local_1_shard_00001926_processed.jsonl/47882
|
The Pop Culture Information Society...
Check for new replies or respond here...
Subject: old skateboard/surfing guy from cereal commercial
Written By: dsharrow on 11/23/05 at 1:13 pm
I remember a cereal commercial from when I was a kid (80's) but I don't remember the brand. The commercial(s) featured a really old guy who was skateboarding and surfing (for real). His name was something like "Banana Joe Blair" or somesuch. I have the feeling that this commercial only aired in Canada, as I think this guy was Canadian, and I can't find any info on the internet.
If anybody has any info, I'd love to hear it.
Check for new replies or respond here...
|
global_01_local_1_shard_00001926_processed.jsonl/47895
|
tap into business success
Changing the feeling
What in your life do you feel bad about? How could you change those feelings? I wonder how you’d see things differently if the feelings were different. You might like to try this tap along to see.
Pick a situation that’s irritating you, or you are beating yourself up about. Focus on the feeling that comes as you think of it. Where is it in your body? What colour is it? Hard or soft? Moving or still? Scale?
Karate point
Even though I have this, (big black blob,or whatever you are feeling, in my, chest/stomach etc) I deeply and completely accept myself.
Even though I’m so irritated/angry about it, I’m Ok.
Even though I feel so powerless to do anything about it, I’m ok
Even though it’s not fair, i deeply and completely accept myself.
Even though i can’t change that situation (or person) I can choose to change my feelings about it.
Even though I don’t know if I can do that, or if i want to, or if they deserve me to, I choose to change them anyway, because it’s me who’s feeling all this.
Round the points
Don’t know if I can
Or if I want to
And they don’t deserve me to
Maybe I deserve to
Maybe I deserve to be free of these limiting emotions that keep Me stuck
Maybe I deserve to feel free
Free to feel good things, free to create new possibilities, free to Make new choices and see things in a different way
I choose to be free to be me.
©2014 Jacqui Crooks
|
global_01_local_1_shard_00001926_processed.jsonl/47902
|
Saturday, July 29, 2006
Anson had already dripped ketchup from his hotdog on his shirt and shorts when Wendell issued a warning.
"Be careful, Anson, you're about to drip ketchup out of the back of your bun."
Anson face went through a series of strange expressions ranging from amusement to frustration. He kept looking over his shoulder at the floor and finally blurted out, "There's no ketchup coming out of my bum!"
No comments:
|
global_01_local_1_shard_00001926_processed.jsonl/47909
|
A Mad Tea-Party 169
Well the script for chapter five is only 2/3rds done but it’s high time I start updating properly again. So here begins the final chapter of A Mad Tea-Party.
This page took a long time to draw.
Discussion (4)¬
1. cwDeici says:
I know it isn’t… I’m still waiting to see their brains splattered. 🙂
Reply to cwDeici¬
|
global_01_local_1_shard_00001926_processed.jsonl/47910
|
Icon_social_Facebook Icon_social_Twitter Icon_social_YouTube Icon_social_Blog
Eat. Play. Love.
By Margarita Bertsos for redbook.com
We've all had those moments when we know we need a time-out from life or else we'll start acting really irrational. The last time that happened to me, I fled to the Kripalu Center for Yoga & Health in the Berkshires, for a weekend of R&R. It was there that I found myself in a class called JourneyDance. And boy, was it challenging--not physically so much as mentally. The instructor guided us through dance sequences in which we were asked to imagine ourselves as trees, then as cats, and at the pinnacle of silliness, we all engaged in a brief "bumper butt" dance with our neighbor. I felt like I was violating some unwritten law against grown women engaging in loony behavior, and had to work hard not to bolt out of the room. But then something shifted, and by the end of the "journey," I was enjoying myself. I was engaged, I'd lost track of time, I'd shed some of my self-consciousness. In other words, I entered into what experts call a state of play.
Never heard of it? "As a society, we're so removed from the concept of adult play that we don't even know what it is," says Brené Brown, Ph.D., a researcher and professor at the University of Houston and the author of Daring Greatly. "Yet there's a clear relationship between play and how much joy and fulfillment people experience in their lives." In fact, when researchers followed the routines of more than 6,000 people, they found that play deprivation can have consequences similar to sleep deprivation: Without it, our overall wellness and happiness, our creativity and relationships, all begin to droop. "It's a health issue, as important as exercise or taking vitamins," says Brown.
So what is play, in the adult world? (Note: Do not be tempted to Google "adult play," especially if you're reading this at the office.) As the experts define it, it's something you do for the enjoyment alone. It requires that your mind or your body (or both) be wholly active--as in watching a movie with a plot that fully engages you versus mindlessly clicking through Facebook. Peter Gray, a research professor of psychology at Boston College who studies the evolution of play, also points out that "true play is done for its own sake"--so you really can't care if you lose the tennis match, or if your bike ride burns off a single calorie. In other words, it's better if you don't give a damn.
As women, many of us have difficulty making space for some frivolous downtime, needed or not. Besides sex--which happens to be the one ideal playdate both sexes have got covered--"women generally won't play until we address the gremlins in our heads that tell us: Play is for kids; don't be a slacker; stop piddling around," Brown notes. It seems that men typically don't have that issue. (Just picture your husband, guiltlessly waving as he heads out for a little low-key touch football with the guys.) Women, on the other hand, will allow themselves to cut loose only after they've crossed every item off their to-do list--and how often does that happen?
Consequently, we miss out on a regular source of happiness. Play boosts the mood because it forces the brain to relax. "The mind at play is active and alert, but not stressed," Gray notes. In fact, Tobin Quereau and Tom Zimmermann, coauthors of The New Game Plan for Recovery, believe that remembering how to play is essential for people who tend to reach for outside fixes, such as food or alcohol, to escape life's problems. Says Quereau: "It can be hard to play when you're depressed, but it's just as hard to stay depressed when you're playing."
Even if scheduling play--an hour to go for a hike, or dabble with watercolors, or indulge in a shout-at-the-screen marathon of Revenge--sounds as carefree as scheduling sex sounds romantic, you gotta do it. "Considering how important it is, we should protect that time as fiercely as we do our doctor's appointments," says Brown.
Besides making us happier, more relaxed people, play can also help us innovate, adapt, and master challenges. No surprise, then, that some of the most inventive companies out there have designed their office buildings to give employees access to "recess" during the workday. If you worked at Google, for example, you could take a twisty slide down to the cafeteria. And at Pixar, your lunch hour could be spent on a soccer field, in an outdoor pool, on a volleyball court, or in a painting class. Maybe by the time you got back to your desk, you'd have an inspiration for the next blockbuster. At least that's the idea.
For the rest of us who toil in more traditional offices, having toys around can help. Sasha Rosen, 24, the editor-in-chief of an industry website for theme-park designers, keeps Legos in her desk drawer. "When I'm feeling stuck, I'll pull them out, often when I'm on the phone," she says, "because I can't think my way out of a problem, or into being creative. Play gets the juices flowing."
Pixar and other forward-thinking companies promote play for its bonding power, too. "In an elevator, you're allowed to be antisocial," says Craig Payne, the senior design project manager who oversaw the design and construction of the Pixar facility along with the late Steve Jobs. "But that's not the case when you're playing a pickup game of basketball with a colleague during lunch."
Turns out that play is a bonding agent that works whether you're in an office or in your 12th year of marriage. According to Arthur Aron, a research and social psychologist at the State University of New York, Stony Brook, couples who play together--doing things that are fun, slightly out of the norm, and challenging--will stay closer over the long haul. His team of researchers found that after an hour and a half of playing together each week for 10 weeks, couples reported being happier in their relationships than those who didn't. The reason, Aron speculates: "When a relationship is new, it's very exhilarating. Over time, that excitement fizzles. Play can restore those early feelings and give people a sense that they are expanding and growing as a couple."
Also, one wants to remind some of these researchers, play is just fun. Thanks to Internet games--available anywhere, anytime, on iPhones and computers--couples can play together even when they're time zones apart. Kristen Rosado, 30, a stay-at-home mom to five kids, says she and her husband, a private first class in the Army, got addicted to Zynga's Words With Friends when he was training for his deployment to Afghanistan. Taking turns building words is a totally un-loaded way to reassure themselves that all is well. "When he isn't allowed to speak to anyone outside the training camp due to a communication blackout, there is nothing more exciting than that brief connection," says Kristen. "Seeing that the other person has made a move is a second of sanity for both of us."
A second of sanity. We could all use one (or--dream a little--a few thousand) of those. It's the message I finally got at Kripalu, happily bumping my heinie against a total stranger's. And it's not just my funky little group in the Berkshires: JourneyDance is having a major moment, with classes filling up everywhere from New York to Nairobi. Maybe it's because people are realizing that play is only one tiptoe-step away from therapy. In its best moments, play feels like putting your grown-up self in a tutu bikini and running through the sprinkler on a hot day--freeing, exhilarating. And if you start to think you're too busy or too mature, remind yourself of this: The play police exist only in our minds.
Take a cue from smart readers who don't waste time not playing.
"Play for me is always somewhat removed from my normal reality. I like running through the mountains with a camera, stopping to take photographs along the way, or doing karaoke. The more active the experience, the more playful I feel--and it enables me to get out of my own way." --HYLA MOLANDER, 38, Tiburon, CA
"My girlfriends and I organize game nights. We play games like Bananagrams, Scrabble, or Celebrity. We also have BBQ parties with our guys, where we get together and play Frisnoc, a Frisbee game we learned in college, but we created our own rules. It's a staple of almost every party we throw!" --ASHLEY SCHWARTAU, 27, Nashville
"When I'm having a moment or find myself overwhelmed with life, I pick up a coloring book. It sounds silly, but it helps me tap into my inner kid--we're talking Disney princesses, after all--and relax a little." --TOLA LAWAL, 29, Mount Vernon, NY
Reprinted from Redbook.com. See original article here.
Security Check
Please enter the text below
Can't read text above? Try another text.
June 3, 2018
June 2, 2018
wise idea
Partners_03 Partners_05 Partners_07 Partners_09 Partners_11 Partners_13 Partners_15 Partners_17
Icon_social_Facebook_White Icon_social_Twitter_White Icon_social_YouTube_White Icon_social_Blog_White
© 2018 JourneyDance
Praise for Toni
What energy! What fun! What utter bliss! Toni's work energizes and connects me to Self with a capital "S."
Amy Weintraub, Life Force Yoga, Yoga For Depression.
|
global_01_local_1_shard_00001926_processed.jsonl/47940
|
Wednesday, June 4, 2008
Legacy of Memorabilia
A month or so ago I raided my mom's storage closets and brought home boxes and boxes filled with 50 years of photos and school papers and random memorabilia. I spent about three hours yesterday sifting through most of it and I found some really rad stuff. First off, my mother was born a scrapbooker and didn't even know it. I say scrapbooker, some people would say packrat.
She has saved every card anyone has ever given her, even the generic ones where they just signed their names. These are the kinds of cards that I throw away. But as I flipped through these, sorting them into loose piles, I occasionally came across one signed by someone who was meaningful to me when I was young and I stopped to examine their signature and think of the hand that wrote it. And I understood why she saved them. She had the invitation for the shower her two best friends threw when she was pregnant with me, written in their handwriting. She had my grandmother's journal from the 1940's. She had a story my brother wrote when he was eight that made me laugh out loud. She had the announcement she and my dad sent out after they got married at 4 a.m. in Vegas. I think she might have saved every picture I've ever colored for her, and while they are totally useless to her now, it made me feel good to know that she valued them enough to save them. And I realized that even though I'm an adult, I'm still making pictures for her, my techniques have just improved and now I call them scrapbooks or cards. You never really grow out of making stuff for your mom, I guess.
So that was a really cool experience. Getting a glimpse at my mom's life through the things that she thought special enough to save. Random newspaper articles and clothing tags. My grandmother had her own box filled with a lifetime's worth of letters, back in a time when people didn't sit down to a computer and type an impersonal email; they carefully smoothed a clean, white sheet of parchment and put their thoughts down on it, with great consideration of each word. It took time and effort and when you received a letter, you saved it. I don't even know the last time I received a real letter through "snail mail" which is a really derogatory title. I think the art of sending a handwritten letter is becoming extinct and that makes me a little sad. My Aunt Joan and my sister Elli are probably the only two people who still send me things.
I could go on about this subject but I can hear Rowan through the baby monitor, awake and fussing and shaking the bars of his crib like a jailbird.
1. Sounds like my grandmother...she even saved her Sears catalogs. A few yrs ago my Mom convinced her to part with a lot of the "excess"-I even wish I had that now.. one mans junk is another mans ephemera!!
2. How wonderful. I have boxes of love letters dh and I sent to each other 15 years ago.
I think I should go and read them, to remember.
3. I agree that the fine art of letter writing is leaving us with the use of email:( I do still hand-write letters to friends who do not live close by (it's much nicer than just reading coomputer font)!
Sue Clarke
Related Posts Plugin for WordPress, Blogger...
|
global_01_local_1_shard_00001926_processed.jsonl/47949
|
Wieliczka Salt Mine in Krakow
The Wieliczka Salt Mine in the Krakow metropolitan area is something of an enigmatic legend in Poland. Built in the 13th Century it is the world´s 14th oldest company and is decorated with sculptures made from salt. Referred to as "the Underground Salt Cathedral of Poland” in 1978 it was yet another of Krakow´s many treasures to be added to the UNESCO list of World heritage Sites.
The mine was in production for seven centuries until it was forced to cease commercial mining in 1996 due to low salt prices and the excessive flooding of mine shafts. It would continue to produce table salt however until 2007. Reaching depths of 1073ft (327m), Wieliczka Salt Mine is over 190 miles (300km) long and attracts around 1.2 million visitors a year.
During its illustrious history the Wieliczka Salt Mines has attracted some esteemed guests including Nicolaus Copernicus, Johann Wolfgang von Goethe, Lord Baden-Powell, Bill Clinton and local boys Fryderyk Chopin and Karol Wojtyla who would later become Pope John Paul II.
The Sculptures of Wieliczka Salt Mine
Today the mine is a museum and offers visitors more surprises than you would expect. Only a very small percentage of the mine has been used to display exhibits which features an underground lake and dozens of statues carved from rock salt. Many of the sculptures were created by miners including an entire chapel complete with a reception room that is used for private functions. It is not uncommon for people to hire out the chapel for weddings and other celebrations.
To enhance the sculptures of the workers, new carvings created by Polish artists are also on display and include historical figures who visited the mine. Even the crystals of the chandeliers are made from rock salt that has been dissolved and reconstituted to achieve a clear, glass-like appearance. The Salt Mines also house a private rehabilitation and wellness complex visitors are invited to visit and experience the benefit of salt therapy treatment.
Tours in Wieliczka Salt Mine
To make the most of your visit to the Wieliczka Salt Mines, take the tour. They are available in English and several other languages and depart every 30 minutes. A wooden staircase has been built to take you down into the shafts where you begin the 3km tour through various chambers where you will discover the sculptures and the remarkable chapel. An elevator back to the surface takes about 30 seconds.
When you visit you may be surprised to find the rock salt is not naturally white, but various shades of grey and looks remarkably like unpolished granite rather than the crystalline white you would expect. Don´t forget to take your cameras, but you should be warned there is a surcharge for pictures and video.
|
global_01_local_1_shard_00001926_processed.jsonl/47974
|
Oregon Virtual Reference Summit, my talk, on Vimeo
Here’s the video of me talking about Ask MetaFilter and online Q&A stuff that I gave at the Oregon Virtual Reference Summit. I included the slides a few days ago, but here’s the actual video of the talk, as presented. Big thanks to Caleb Tucker-Raymond for making this video up. You might also like Emily Ford’s lightning talk: What Libraries Can Learn From Kanye.
3 comments for “Oregon Virtual Reference Summit, my talk, on Vimeo
1. 25Jun11 at 7:06
That’s an interesting talk (and a long one for having so little text on the slides–yay for knowing how to do presentations!)
2. 25Jun11 at 10:58
There are a LOT of words on my presenter notes which led to some trouble when it looked like I wasn’t going to be able to speak with my laptop next to me. If you d/l the PDF you can see the text of my talk and how much I varied from it.
3. 02Jul11 at 7:23
We loved having you in Oregon. Thanks for coming. And thanks for the plug on the Kanye bit!
Comments are closed.
|
global_01_local_1_shard_00001926_processed.jsonl/48002
|
JSP vs ASP
Sample JSP Program
core JSP
Jsp Directives
Jsp Std Actions
Jsp Directives
Jsp Directives
Include Directive
Page directive
Tag Directive
1. Include Directive
This directive is useful to include a html or text or JSP code in
JSP Syntax
<%@ include file="relativeURL" %>
include.jsp: ---- (1)
<head><title>An jsp include directive Test</title></head>
<font color="Red">
The current date and time are
<%@ include file="date1.jsp" %> ---- (2)
date1.jsp: ---- (3)
<%@ page import="java.util.*" %> ---- (4)
<%= (new java.util.Date() ).toLocaleString() %> ---- (5)
Displays in the page:
The current date and time are
Aug 30, 1999 2:38:40
(1) include.jsp is the main jsp program
(2) include directive used to include date1.jsp program
(3) date1.jsp (sub jsp program)
(4) page directive used to import packages
(5) Expression statement used to print date in the html (or response)
An include directive is used to inserts a text file , jsp file or a html file. A static include means that, when you include text, we will call that include static include. When you include jsp those statements will be included in the main jsp and compiled, these type of includes are called dynamic includes.
The JSP page might be recompiled if the included file changes.
2. Page directive
This directive is a very important directive used to import packages and to define global characterstics of jsp program.
JSP Syntax
<%@ page
[ language="java" ]
[ extends="package.class" ]
[ import="{package.class | package.*}, ..." ]
[ session="true|false" ]
[ buffer="none|8kb|sizekb" ]
[ autoFlush="true|false" ]
[ isThreadSafe="true|false" ]
[ info="text" ]
[ errorPage="relativeURL" ]
[ contentType="mimeType [ ; charset=characterSet ]" |
"text/html ; charset=ISO-8859-1" ]
[ isErrorPage="true|false" ]
[ pageEncoding="characterSet | ISO-8859-1" ]
The scripting language used in scriptlets, declarations, and expressions in the JSP page and any included files. In v1.2, the only allowed value is java.
to define super calss/interface of the packages
All packages required by jsp program needs to define separated by comma. All these packages will be available to scriptlets, expressions and declations within the jsp page.
If the value is true, the session object refers the new session
If the value is false, you cannot use session object of a <jsp:useBean> element with scope=session
The default value is true.
This attribute specifies the data stream size,thru which program will pass data to browser
The default is 8kb
If this attribute set to true, the buffer will be flushed.
If set to false, an exception will be raised when the buffer overflows.
The default value is true
You cannot set autoFlush to false when buffer is set to none.
If the atrribute set to true, the JSP container can send multiple, concurrent client requests to the JSP page. You should write code in the JSP page to synchronize the multiple client threads.
If you use false, the JSP container sends client requestsone at a time to the JSP page.
The default value is true,
A text string that is incorporated verbatim into the compiled JSP page. You can retrieve the string with the Servlet.getServletInfo() method.
If any error occured in the jsp page, that expection will be handled by the jsp specified the relative url ( you need to specifiy the path of jsp)
If set to true, you can use the exception object in the JSP page. If set to false, you cannot use the exception object in the JSP page.
The default value is false.
contentType="mimeType [; charset=characterSet ]" |
The MIME type and character encoding the JSP page uses for the response. You can use any MIME type or character set that are valid for the JSP container. The default MIME type is text/html, and the default character set is ISO-8859-1.
pageEncoding="characterSet | ISO-8859-1"
The page source character encoding. The value is a IANA charset name. The default character encoding is ISO-8859-1.
3. Tag Directive
If you want to use custom tags inside the jsp page, you can include tag libraries using taglib directive
JSP Syntax
<%@ taglib uri="URIForLibrary" prefix="tagPrefix" %>
<%@ taglib uri="http://www.geocities.java.com/tags" prefix="ram" %>
... </ram :loop>
If you are developing or using custom tags, you cannot use the tag prefixes jsp, jspx, java, javax, servlet, sun, and sunw, as they are reserved by Sun Microsystems.
Drona Tutorials - jsp tutorial tutorials
|
global_01_local_1_shard_00001926_processed.jsonl/48012
|
Downloads and Installation
The Killer Whale Simulation requires the Java runtime on your computer. If your machine doesn't have Java then you should first download and install it from If you're not sure if your machine has Java then click on the link above and select the "Do I have Java?" option.
If you want to compile the program from the source code then you will need the Java SDK available from
Installation for Windows, Mac, Unix (Last updated 3/12/12)
1. Install Java 1.5 or higher
2. Download and unzip
3. To start the simulation, double-click on the "KillerWhaleSim.jar" icon which is in the root folder of the unzipped files. If you are running from the command line, use the command "java -jar KillerWhaleSim.jar".
The simulation will use the files in the "KillerWhaleParms" subdirectory contained within the root folder. The file "batch.txt" in this folder specifies many of the initial setings. The results of your simulation will be saved in a "results" subdirectory contained within the "KillerWhaleParms" subdirectory. See the documentation and the README.TXT file in the "KillerWhaleParms" subdirectory for instructions on how these files control the simulation.
To uninstall simply delete all the files in the unzipped folder.
Source Code (Last updated 3/12/12)
Source code is provided as a NetBeans project. Download and extract to a directory of your choice. Start NetBeans and open the project. The necessary jar files (repastj.jar, colt,jar, plot,jar, and trove.jar) are already referenced in the project and stored in the root directory.
|
global_01_local_1_shard_00001926_processed.jsonl/48045
|
See all designers
Tammy & Benjamin Tammy & Benjamin Tammy & Benjamin
Tammy & Benjamin
Often unique, always a limited edition, the TAMMY & BENJAMIN bag exists in its vintage allure and clean lines.
Who are you?
We are Tammy and Benjamin. One of us is from Hong Kong, and the other from France, but we originally met in Paris. Animated by a professional drive and impassioned by the same interests, we decided to create a label together, which became TAMMY & BENJAMIN.
Read more
Why did you choose to go into fashion?
Fascinated by fashion and ancient artefacts from a young age, Tammy entered into fashion school in Paris in order to specialise in leather goods and clasp detail techniques.
Could you describe your creative universe to us?
Contemporary and timeless.
What are your sources of inspiration?
Vintage objects and craftsmanship.
How did you come to create your pieces?
We put together all our different sources of inspiration (photos, objects, fabrics) in order to allow a theme for our collection to take shape. We made our prototypes in our Parisian workshop.
Can you tell us a little about your collaboration with MonDéfilé?
We love the ordinary ideas and concepts. MonDéfilé is one of them.
If you could be a garment or an accessory, what would you be?
A leather bag, of course!
"Inspired by ancient artefacts, we create new forms and textures in order to reinvent life's lost beauty."
Golden Palm Award
As seen in
|
global_01_local_1_shard_00001926_processed.jsonl/48053
|
Subscribe: Subscribe to me on YouTube
Monday, July 25, 2005
I learnt a valuable lesson today. Although as I speak, I'm slightly distracted because Channel 4 news are doing a report about seabirds in the south Atlantic being eaten alive by giant mice. Which is not the kind of news you hear every day.
Oh, and if you're wondering why the aubergine is saying "Oups", it's because it's French. I couldn't find one that speaks English.
Anyhoo, I went into Ipswich today in search of ingredients for two culinary masterpieces I'm planning on creating (preferably before Wednesday when Lisa arrives - there's no point cooking if you have to share it): 'Orange & Chicken Stew' and 'Beef & Aubergine Chili'. The first one's Duck a L'Orange for poor people, and the second's Moussaka for people who can't spell it.
So I drove the 11 miles to Tescos and started merrily filling my trolley with oranges and chili powder. However... I had reckoned without...
The Great Aubergine Shortage of 2005.
Tesco didn't have any. Not even the supervisor man in the cheap suit could find me one. So I headed into town. There used to be a greengrocer at one end of Ipswich town centre. I know, because it's next door to Oxfam. Unfortunately it's now a pound shop. And they don't sell aubergines.
So I went on to the Marks & Spencers food hall, which is quite posh, and just the kind of place to stock purple fruit & veg. No joy there either. So I headed off to the bank. To be honest, I wasn't really expecting to get an aubergine there, I was mainly just going to pay in a cheque, but even so, it was slightly disappointing.
So having only intended to pop into Barclays, I trudged on to Sainsburys on the other side of the town centre. And guess what? No aubergines. I'd spent an hour scouring Ipswich for eggplant, and at the end of it all was faced with the prospect of making Beef & Aubergine Chili without the aubergine. I wasn't happy.
So I headed home. Three miles from Shotley Gate is the village of Chelmondiston, a lovely place with a small amateur dramatics group and no street lights. It's the kind of 30mph-limit village that I tend to drive through at 40mph without stopping. But on a whim, I decided to stop at the Chelmondiston village store. Which just goes to show the level of desperation to which a worldwide shortage of aubergines can drive a man.
Anyhoo, you've guessed it, they had aubergines. I'd driven 12 miles into town, visited two large supermarkets, and scoured a busy town centre, and they were on sale three miles from my flat all along. I think there's a lesson there. Spookier still is that whilst I may have looked slightly stupid standing in the queue with nothing but an aubergine, the woman in front of me was buying a pot of chicken livers... and an aubergine.
As the lady on the till said to me, "Oooh, we're getting a run on aubergines!".
She was quite an excitable woman.
But anyhoo, if Chelmondiston Village Store can stock aubergines, you have to wonder why Shotley Gate Village Store can't sell skimmed milk? But still. I'd better stop now before I mention aubergines for the 15th time.
|
global_01_local_1_shard_00001926_processed.jsonl/48073
|
Filters: Your search found 4 results.
Life sciences
Earth processes
SMD Forum - Primary:
Sort by:
Per page:
Now showing results 1-4 of 4
This is a presentation about the Sun. Learners will hear about its cycles, as well as important features like solar flares, prominences, coronal mass ejections, and magnetic loops. They will also be introduced to the impact the Sun's activity has on... (View More)
Audience: Elementary school
Materials Cost: Free
This is an activity about identifying and comparing the Earth’s seasons. Learners will write paragraphs depicting scenes or events that have recognizable season-related elements, without revealing the intended name. The group will then play a game... (View More)
|
global_01_local_1_shard_00001926_processed.jsonl/48101
|
About The Site
How the Site is Organized
OiiO Space's public Web Portal is organized so that users can take multiple paths to information. The same content may appear in multiple sections, because people navigate through the site in different ways. The three main navigational paths through the content are:
• broad topic areas
• audience groups
• subject areas
If you are interested in finding information on a particular topic, the site's organization helps visitors locate material in two ways -- based on the audience group to which they belong (e.g. a member of the press or an educator) or based on topic area. The following sections will assist you with the information architecture at OiiO Space.
|
global_01_local_1_shard_00001926_processed.jsonl/48110
|
Short Buyins at No Limit Games
Share This Post!
The Poker Penguin says - Never buy in for less than the maximum in a NL game. Here's why:
Written by Poker Penguin
In the multi-way gun battle that is a No-Limit cash game, chips are like ammunition. The motto of the successful player should be "peace through superior firepower". There is no excuse for ever having less money than the minimum buyin. That's just crazy talk.
Why am I so adamant about this?
Well, picture this. It's a juicy $25 NL ring game. I get dealt QQ in early position and raise it to $2. It's small enough to keep four of the suckers in. Flop comes Q72 rainbow. I'm even ahead of the mighty 72o here, so I bet out another $2 trying to entice as many as possible to call me down. Two people call, and the button throws a $10 re-raise out there.
Article continued on: Best Poker Offers
Related Articles
Expected Value and Risk Aversion
Expected Value isn't as simple as we think
Bad Beats
The dreaded bad beat - we've all been there
Seven Deadly Sins of Poker
The seven deadly sins will condemn your bankroll to hell! Read all about it here.
Outs and Board Reading in Omaha
Jim Green discusses how to read hands and outs in Omaha8
The most important decision in Holdem
Game selection is the most important decision in holdem.
Two Poker Truths
The Poker Penguin shares two powerful poker truths, read on for more details...
Red Kings Poker
Online Poker Tournaments -------- Poker games all have regulations and rules and limits that are particular to the type of game that you are playing. If you aren't familiar with these rules and regulations it will make your run for the money much more difficult. One of the most effective things you can do prior to starting is the regulations and strategy tips that you can get at well-known online gambling sites. Then you should try it out at the free tables until you are confident in your ability to play well. Online Poker Tournaments are no exception to this.
|
global_01_local_1_shard_00001926_processed.jsonl/48148
|
Ago 31 2015
A note about Call Of Duty 1/UO BSP maps
Call Of Duty 1 and its expansion, United Offensive, are based on the Quake III engine, therefore they share some of its features, like a Binary Space Partitioning to describe maps, even though the format isn’t compatible.
An article copyrighted 2000 describes very well the BSP format of Quake 3. It’s interesting, because it’s the very base to understand CoD, too, at least its devision in lumps and some of them.
An article on “Mappers United Wiki” depicts the lumps of CoD 1 maps and the size of single lump, but they aren’t explained. Luckily in the same site there’s an article on CoD 2, and most of the structs are equal.
So I’ve tried to render them, but I’ve only managed to build the geometry of maps.
First of all - they use a Z-Up coordinate system, like Blender, but contrary to many rendering systems.
Second thing is that units are very big, they are something like decimeters.
Thirs - everything is in little endian.
That said, let’t analyze some important structs.
Header and lumps directory
The header of CoD is equal to Quake: first 4 bytes are the “IBSP” word, uppercase.
Then there’s an unsigned 32 bit integer, which is the format version. CoD 1/UO is 59, whereas CoD 2 is 4 and Quake is 46.
After those 8 bytes, there is the lump directory, which is an array of these structs:
struct LumpDirentry {
unsigned int size;
unsigned int offset;
The length of the array should depend on only on the game. If a lump isn’t on the map, it’s reported on the directory with size 0, since the lump id which a struct refers to is its index on the array. However the array always ends with 8 zero bytes.
The offset is relative to the beginning of the file, and size is the full size of the lumps in bytes, which is not the number of that kind of lump.
Note that Quake 3 used to have offset before size.
DrawVerts or Vertices (lump #7)
struct DrawVerts {
float position[3];
float normal[3];
unsigned char rgba[4];
float texcoords[2];
float lightmap[2];
This is very similar to lump #10 of Quake, but it differs in order. In fact this is Direct3D order.
TriangleSoups (lump #6)
struct TriangleSoups {
unsigned short material_id;
unsigned short draw_order;
unsigned int vertex_offset; // Referred to DrawVerts
unsigned short vertex_length;
unsigned short triangle_length;
unsigned int triangle_offset; // Referred to MeshVerts
This struct in part reminds face struct of Quake, but it lacks some fields, like type, or effects. This is due to the fact that CoD uses Direct3D for patches, again, and that it doesn’t use some features, like effects.
CoD 2 has a very similar struct, but it adds 6 floats whose meaning is still unknown.
MeshVerts (lump #8)
Actually this isn’t a struct, but just an array of unsigned 16 bit integers.
They are the indices to create triangles for faces. The indices are relative to each face and reset for each one, which means that, being face a TriangleSoups struct and x an unsigned integer, a x index is vertices[face.vertex_offset + x].
A simple code
Therefore a C++(11) pseudo-code to create the map geometry is something like that:
// load data to RAM
// Iterate faces
for (TriangleSoups &f in faces) {
beginSection(); // It will reset index counter, like Ogre::ManualObject::begin
unsigned int vertStop = f.vertex_offset + f.vertex_length;
for (unsigned int i = f.vertex_offset; i < vertStop; i++) {
uploadVert(vertices[i]); // Upload vertex to GPU
for (int i = 0; i < f.triangle_length; i++) {
pushIndex(meshverts[f.triangle_offset + i]); // push back a new index
That’s it. No binary trees are needed, since modern render engines don’t need them anymore. So we don’t care of planes, nodes and leaves.
That works for CoD 2, too, just change lump indices.
This code can render a geometry and there’s a hint to materials, which is the real problem with those games.
CoD 1 is very simple: materials are always a texture with the same name, you only have to guess the extension. Texture coordinates are the problem: they aren’t standard UV coordinates, but they are something else, which the game can decode and create UV from.
On the other hand CoD 2 uses UV coords, but materials aren’t just a texture file name. They are binary files. I’ve tried to reverse them. There are many offset to null-ended strings. They are the type of texture (colorMap for the main texture, other maps for effects…). Images are in IWI format, which is just another formats with a different header (usually DDS with DXT1, DXT3 or DXT5).
Lighting and entities
There are at least some other useful lumps.
One is ligthmaps: without it, the map is pretty flat.
struct Lightmaps {
unsigned char map[128][128][3]; // 128x128 RGB image
However the link between these lumps and map is not clear yet. LightIndices (lump #19) should do the work.
Another important lumps is entities, which is an embedded ASCII text that contains serveral properties.
It contains other models to be loaded and some other information, like swpawn points or lamps.
Models are in XMODEL proprietary format. It contains bones, too! Some converters exist, but their developers haven’t released any information of the format.
Physics and collisions
Remaining lumps are needed by the engine to compute collisions.
Their structure is unknown, but I think convex hulls can do the work, but I haven’t tested it yet.
Aggiungi un commento
Completa la form sottostante per aggiungere un commento
Scarica il CAPTCHA in wav.
|
global_01_local_1_shard_00001926_processed.jsonl/48171
|
Map Your SFTP Server As Local Drive With SFTP Net Drive Share
PDF Print E-mail
Secure File Transfer Protocol or SFTP is a secure version of FTP, which is highly recommended due to its strong encryption of data. SFTP is used for a number of operations related to remote file management just like FTP but provides an encrypted channel for file download/upload which makes remote file/directory operations more secure. SFTP Net Drive maps your SFTP server as a local drive, giving you secure access to mange your files over SFTP connection. The application can only map SFTP Server and does not support FTP. We have covered a method for mapping FTP Server here, but we would highly recommend SFTP since it is more secure.
On the main interface of SFTP Net Drive, type your SFTP Server Address, Port, Username, and Password. When done, select the drive letter to map from Disk Letter drop down menu and click Connect.
SFTP Net Drive
You will find an extra drive among your local partitions which can be used to manage your files on your server via the SFTP connection. Interestingly, the default drive letter assigned to this drive is the Z, which is the name used commonly by network administrators when they allocate a network drive to a specific user (e.g. Domain user).
If you would like to configure additional options, click Advanced Settings from main interface of SFTP Net Drive. You can select connection timeout seconds, configure proxy settings, select SFTP protocol versions, use UTF-8 for international characters, enable compatibility mode to avoid connection errors, select a root folder for the Z drive, and enable file information and content caching.
Advanced settings
SFTP Net Drive works on Windows XP, Windows Vista, Windows 7, Windows Server 2003 and Windows Server 2008.
Download SFTP Net Drive
Related Articles:
1. Mount FTP Server As Local Drive In Windows
2. Map Network Location Over SSH / SFTP In Windows Explorer
3. QtdSync Is GUI For rsync; Schedule Backup To Local Path Or SSH Server
Read more
Forgot your password?
Forgot your username?
No Account Yet? Create an account
Online Users
We have 117 guests online
|
global_01_local_1_shard_00001926_processed.jsonl/48181
|
Bukhari :: Book 7 :: Volume 69 :: Hadith 511
Narrated Jabir:
Abu Humaid, an Ansari man, came from AnNaqi carrying a cup of milk to the Prophet. The Prophet said, "Will you not cover it even by placing a stick across it?"
Source materials are from the University of Southern California MSA site
Hadith eBooks converted from Imaan Star
|
global_01_local_1_shard_00001926_processed.jsonl/48194
|
I tried it with 1/3 of a cup of sugar
Sunday, March 11, 2018, 18:24
So kinda in the middle. I remember you saying you liked less sugar, next time I’m going to try 1/2 cup because I think I might like it a little sweeter.
I had my parents over for lunch and let them try some, that was a new one for them! Lol
powered by my little forum
|
global_01_local_1_shard_00001926_processed.jsonl/48202
|
Friday, November 8, 2013
The NFL, the Church, and the Bullies
With the news regarding the Miami Dolphins players, bullying has reared its ugly head again in our culture. Lots of experts and not-so-experts are offering their insights and opinions, but a couple of things caught my attention.
One, the shock that so many seem to have that a grown man who plays professional football could be bullied; and two, the long history the alleged bully has of inappropriate behavior that has seemingly been ignored for decades. Check out the timeline graphic on this article from ESPN, which does not include the latest allegations of the investigation of sexually inappropriate behavior at a golf tournament.
I hope - I hope - people realize that being the victim of a bully has nothing to do with physical size or mental and emotional toughness or lack thereof. In fact, research shows that most bullies target their victims because they are, quite honestly, threatening to the bully through their competence, personality traits, or other qualities that trigger the need to damage another. Anyone can be a victim of bullying. Anyone. And I suspect most people have been, at some point in their lives, a victim of bullying.
Our image of bullies is sadly limited to the ruffian on the school yard shaking kindergarteners down for lunch money, but my experience as an adult is that adult bullying is far more pervasive than we'd like to admit. Bullying exists in the workplace, in the NFL, and sadly, even in the Church. Bullying is generally any act that intentionally causes harm to another through verbal harassment, physical harassment, or (most commonly) subtle acts of manipulation and intimidation. While bullying can be difficult to identify, a hallmark is when the person who engages in this behavior is called on the carpet, s/he will diminish the act ("It was just a joke" or "Oh, he knows I'm kidding"), diminish the person (She's so oversensitive; he has emotional problems; he just needs to "man-up"), or diminish the system ("This vestry is stupid"; "People are mad at me because they're jealous") and then double down on the intimidation.
Most bullies are generally people who use their own charm, power, and position to promote themselves because they are so often obsessed with their own authority and power. Psychological studies show that most, if not all, bullies have experienced emotional or physical abuse and have chosen to deal with their wounds by hurting others - by transmitting their pain instead of allowing and engaging in the healing to transform it. As they saying goes, hurt people hurt people. Since we all have wounds in our souls, we should all also be aware that we are also all capable of bullying.
Again, what is so telling about this current incident in the news is the history. The alleged bully has a history of inappropriate actions, and these are just the ones that have been documented. Past behavior is the best indicator of future performance. So, why, then, do so many people who have engaged in bullying behavior get continuously excused, thus being allowed and even encouraged to repeat?
I suspect there are many reasons, but the most prominent seems to be the need to sweep it under the rug. After all, eventually the bully will leave, right? And, well, the victim will be okay, right? And it won't happen again, right? And it's not really my problem, right?
Bullies, like all of us, will only modify their behavior when they must deal with the consequences of the behavior and are offered the help they need to change their behavior. The systems cannot continue to act as if it's all just "personality conflicts" or "oversensitive people" or whatever label they give these situations to avoid their own responsibility.
One of the saddest reactions from Where God Hides Holiness have been the number of stories I've heard from all over the Church, from men and women, from laity and clergy, new members and long-time members, about how they have been bullied by people in the Church. Some of the stories are accounts of comments that got a bit out of hand to outright criminal behavior. And the common theme is this: I shared my story, and nothing happened.
Nothing happened. A child of God was wounded, and we just watched her or him bleed.
What can we do? What are we as Christians called to do?
Because let's be clear, we ARE called to act in light of the dignity violation of bullying behavior. To ignore bullying behavior is to be complicit in the violence.
I wonder what would happen if we believed the victim when we heard about this behavior, believed that something happened that was upsetting and troubling, instead of dismissing it. Believing the victim's experience does not mean ignoring another's experience; it simply means trusting that we all have experiences that are real to us. Perhaps when someone hears that comments he made in jest about the shape of a woman priest's curves were instead offensive and demeaning to her, he has the invitation to reconsider his comments in light of her experience instead of dismissing her. When we hear how we hurt another and believe it, we are offered a way to allow God's transformation.
And what might happen if we began making people aware of what constitutes bullying behavior, maybe even calling people to identify times they've engaged in this behavior? What if people who have been accused of being a bully repeatedly were treated with dignity and love as their actions were addressed and helped to be transformed? What if dioceses began addressing this and if bishops began addressing clergy and laity who have been repeatedly accused of this behavior instead of waiting for the lawsuit (which, odds say, will inevitably come...because bullies repeat and increase their abuse)? Some dioceses are having these conversations. Hard though they may be, they are also seeing remarkable growth and health in their congregational systems and in the clergy who serve in these dioceses.
And what might happen if we did a better job of being aware of people's wounds and pain. Again, as distasteful as I find the actions of the Dolphins' player, I am also filled with pity about whatever wounds he's likely wound in barbed wire and buried deep within himself. So deeply, in fact, that he, like most serial bullies, seems completely unable to see his actions as anything but acceptable. What might happen if we took the exploration of one's grief and wounds as seriously as we do the exploration of how to make the Church really, really big? What would happen if we as a Church expected, supported, and appreciated clergy mental health and healing in the same way we do physical health?
What might happen if we, as the Church, realized that what happened in Miami is happening each and every day in our holy spaces, looked at the ourselves and owned our own bullying problem...then decided to stop transmitting our problem and to start transforming it?
For a good starting place on bullying, both child and adult, check out PBS's This Emotional Life
LTD said...
A while back, I wrote a post for the Confirm not Conform blog on Making Your Youth Group a Humiliation-Free Zone. It seems to me that a lot of churches honestly don't know when something is designed to humiliate because that kind of behavior is in the DNA -- and because different people have different reactions.
One person I know actually used this post to help train camp counselors and they couldn't see anything wrong with it. "It was fine for us," they said. "Why shouldn't it be fine for these kids?"
I think these can be translated into what we do to adults as well: requiring more sharing than is comfortable, using our power from the pulpit to shame or blame, or allowing committee heads to do so. And of course priests are bullied themselves by lay leaders or their higher ups.
I suspect we often don't know when we are entering bullying territory. Bullying is what other people do. The first step, as you say, is looking at ourselves -- and recognizing the bullying within us.
Karen said...
Excellent thoughts. Thank you for sharing.
Raphael said...
Very insightful...
|
global_01_local_1_shard_00001926_processed.jsonl/48205
|
The Yellow Wallpaper
1st January 2013
The Yellow Wallpaper is currently being screened in 10 different cities across India, in association with SHAMIANA, Asia's largest film club. Richard plays John, opposite Alex Childs as Jane.
Latest News
The Crown
23rd October 2018
Richard is currently working on Season 3 of The Crown for Left Bank Pictures and NetFlix. He is… more...
Tribeca Film Festival
11th March 2018
The Tribeca Film Festival will screen Drake Doremus' feature ZOE — a sci-fi romance… more...
22nd February 2018
Today at 1.45pm on BBC1, watch out for DOCTORS! Richard plays Ralph Bradley, who likes to rub people's… more...
December's News
News Archive
|
global_01_local_1_shard_00001926_processed.jsonl/48222
|
Monday, September 26, 2011
"In all important matters, style, not sincerity, is the essential." -- Oscar Wilde
Life is best when there are candles on my window sill and champagne in my fridge. When there's a small glass of bright pink flowers perched on my bathroom sink. When there's a silk top on a hanger, waiting to be worn.
All I know is that life can sometimes be not so fun. Sometimes, papers pile up on my desk and I miss my train. There might be dust bunnies under my bed (what is it about old Boston apartment buildings and dust?), or sad news, or just one of those days.
But flowers and candles are the things I can insist on. So I do. Because it's about more than just getting through the day.
Flair is the wrong word. So are panache and style and all those other overused words.
Maybe it's verve.
Since Mad Men was released on instant play on Netflix, I've wanted to watch nothing else. I just finished Episode 1 of Season 4 and I'm still absolutely devastated by the ending. I mean, devastated in the best possible way. The normally reticent Donald Draper sits down with a Wall Street Journal reporter and, in a cloud of cigarette smoke and whiskey, tells the reporter exactly what he did and just how successful he was... and the opening chords of Tobacco Road by the Nashville Teens are playing and Don has that cocky smile and, yeah, he's still got it and he knows it.
We all need a little verve.
So I'll spend my time framing black-and-white photographs and piling fun pillows on my couch. I'll light all of the candles when there's company over... or when there's not. This new place of mine could use a little life.
I'll put Frank Sinatra and Foster the People in the same playlist and I'll quote Charles Eames. I'll make mulled apple cider and open up my new fondue set. I'll go for a walk just to look at architecture, to give some time to the city we live in and to this season. I'll take any excuse to wear high heels, to celebrate, to bake a pie, to wake up early for sunrise yoga....
Because, after all, what's the alternative?
1. You say it so well! Verve is just what it takes to put a little glamour in world that isn't always fun. With Frank Sinatra, high heels and apple galettes, you're creating an enviable life. Here's to candles, black and white photos and champagne...
2. There's so much about life we can't control... I figure that the rest should be as fun as possible :)
|
global_01_local_1_shard_00001926_processed.jsonl/48237
|
Get in Touch
I'd love to hear from you!
One of the best parts of my work is connecting with like-minded people like you.
You can use the short form to contact me or you can email me directly at
If you prefer to call you can contact me at:
1(613) 314-0912
I’m not able to provide advice via email, but feel free to touch base if you have questions about my services, or, if you would like to schedule a consultation.
Name *
|
global_01_local_1_shard_00001926_processed.jsonl/48264
|
Mint Julep Cupcakes
Mint Julep CupcakeThis weekend is the Kentucky Derby at Churchill Down’s. You may not be into horse racing but everyone seems to know that the official drink is the Mint Julep! According to the Derby Museum, the Mint Julep became the official drink in 1938 because they started selling the souvenir glasses for 75 cents. Talk about great marketing! This classic cocktail has the enticing flavors of bourbon and mint.
Mint Julep Cupcake Yum
I took these classic flavors and created a cupcake that is delicious. This is the perfect (and very easy) cupcake for any dinner party, whether you’re watching the Run for the Roses or not. Enjoy these cupcakes this weekend.
how good is that
Mint Julep Cupcakes
Serves 12
Mint Julep flavor in a cupcake!
Write a review
Cupcake Ingredients
1. 1 cup flour
2. ½ cup cake flour
3. 2 teaspoon baking powder
4. pinch of salt
5. 1 stick unsalted butter at room temperature
6. 1 cup sugar
7. 1 teaspoon vanilla
8. 1/2 teaspoon peppermint extract
9. 2 eggs
10. ½ cup milk
11. ¼ cup bourbon
12. ¼ cup mint schnapps
Frosting Ingredients
1. 1 stick unsalted butter at room temperature
2. 3 cups powder sugar
3. dash of vanilla
4. large dash of peppermint schnapps or ¼ teaspoon of peppermint extract
5. 1 tablespoon bourbon (optional)
6. 2 tablespoons milk or whipping cream
7. fresh mint leaves
To make cupcakes
1. Preheat oven to 350 degrees.
2. Line a cupcake pan with cupcake papers.
3. Sift the first four ingredients (flour through salt) together, set aside.
4. In the bowl of your mixer, cream the butter and sugar together. Add the eggs one at time until incorporated. Add 1/2 of the flour mixture and then the liquids. Mix until incorporated and then add the remaining flour and just mix with a spatula until completely incorporated. Using an ice cream scoop, fill each cup 3/4 full. Bake in the oven for exactly 20 minutes — the cupcakes should be perfectly baked. Remove from oven and let cool in the tin and then cool on a rack.
To make frosting
1. Cream the butter and then slowly add in the sugar and mix until the mixture becomes frosting. To loosen it up, add the vanilla and the peppermint schnapps and milk/cream.
2. Frost each cupcake and then top with a pretty mint leaf!
Shaun Myrick
|
global_01_local_1_shard_00001926_processed.jsonl/48273
|
Eclectic Kitchen Design
Hi there readers, Appreciate it on your work-time to read a write-up atlanta divorce attorneys photo that any of us present. Whatever you usually are reading now is a picture Eclectic Kitchen Design. By right here you are able to know the generation regarding what exactly could you have for help make your house and the space special. In this article many of us will demonstrate an additional image simply by simply clicking a new button Next/Prev IMAGE. Eclectic Kitchen Design The writer stacking these neatly to help you comprehend the actual objective in the past write-up, to help you to produce just by investigating your snapshot Eclectic Kitchen Design. Eclectic Kitchen Design truly neatly from the gallery earlier mentioned, so as to lead you to function to construct a residence or possibly a area additional gorgeous. We likewise show Eclectic Kitchen Design have got visited any people family and friends.
You can utilize Eclectic Kitchen Design, using the proviso in which the employment of the article or photograph each and every post simply limited to individuals, certainly not with regard to commercial reasons. Plus the author in addition allows liberty in order to every picture, presenting ORIGINAL Link this page. Even as we possess spelled out before, in case anytime you might need a photograph, you are able to preserve the image Eclectic Kitchen Design in mobile phones, notebook or maybe personal computer by just right-clicking the actual photograph and pick out "SAVE AS IMAGE" or maybe you can obtain below this informative article. And to look for various other images about each write-up, you can even try looking in the actual column SEARCH best proper in this website. On the information offered author preferably, you possibly can carry something useful by your articles.
Hit Picture/s to watch clearer size
|
global_01_local_1_shard_00001926_processed.jsonl/48284
|
Structures in C Programming
Last Updated Nov 20, 2015, 07:00:14 PM
Structures in c programming are used to store complex data by grouping them together in a convenient way.
Strucutres are the most convenient way to store related data, for example, if you want to store the data of a classroom you might need to store the data of students, their details, roll numbers, marks etc...
So when you store such kind of related data, accessing it will become more difficult. But using the structures, we can reduce that problem at very scalable way. As we already, structures makes this job easier by stored different data under one group or one structure.
Structures must be declared under one common name which can be further used to call or use that data by calling the structure name anywhere in the program
Let us see how we can declare a strucure in c programming
If you notice the above syntax, we have a structure name, and data variables. Let us see how it would look like if we apply the structure for a student record in class
In the above example, student_name, course_name, marks, age, student_grade are considered as member data of that strucutre.
The sttucture tag is student
Example of a Structure
Try It Now
Variable Declaration
During the declaration of a structure, it creates some user-defined data, however, if we need more data variables to store data we can define them as below.
In the above example code, s1,s2, and s3 are new variables we defined with no data which can store an array of 30 elements
How to Access Structure Data
The structure data can be accessed in two different ways, let us see them
• Member Operator ( . )
• Strucute Pointer Operator ( -> )
The below syntax explain how to access any type of data variables using the structure.
Let us say, we want to access the age of a student s1, we can simply call like this
|
global_01_local_1_shard_00001926_processed.jsonl/48286
|
Blog > Tango Images >
Amazing image of men practicing tango with other men
posted May 14, 2015, 3:38 PM by Sophia de Lautour [ updated May 14, 2015, 3:41 PM ]
north sydney tango lessons
source: via Pablo Rodriguez of Tango Light
I'm presuming the location is Argentina. Can you imagine this happening at an industrial site in Oz?!
|
global_01_local_1_shard_00001926_processed.jsonl/48301
|
• Reply to discussions and create your own threads.
• Access to private conversations with other members.
• Fewer ads.
"The single most historic modern stadium in the world"
Discussion in 'Anything goes' started by Mr. X, Jun 18, 2006.
1. Mr. X
Mr. X Member
A cityside columnist in these parts recently wrote that the Los Angeles Memorial Coliseum is "the single most historic modern stadium in the world."
(It was part of a column criticizing the proposal to build a new stadium inside the Coliseum's walls, a la Chicago's Solider Field.)
My initial response is that that was a bit U.S.- and Southern California-centric.
Regarding stadiums outside the U.S., I'd like to nominate Berlin's Olympic Stadium as "the single most historic modern stadium in the world." I think Jesse Owens' four gold medals there in the 1936 Summer Olympics were more historic than anything that happed at the Los Angeles Memorial Coliseum in the 1932 or 1984 Summer Olympics. July's World Cup final could be more historic than Super Bowls I and VII played at the Los Angeles Memorial Coliseum.
Another nominee in London's Wembly Stadium, thanks to it being the main venue for the 1948 Summer Olympics, the 1966 World Cup final, many FA Cup finals, other soccer competitions and several landmark concerts.
(I’m giving more points for events with global significance, rather than just U.S. significance. After all, the columnist did make reference to the world in the column.)
The Los Angeles Memorial Coliseum's claims to fame in addition to the two Olympics include Super Bowl I (and Super Bowl VII), many noteworthy USC football games, the 1959 World Series, large crowds for appearances by Pope John Paul II and Billy Graham and John F. Kennedy's acceptance speech for the 1960 Democratic presidential nomination.
However, I think the Los Angeles Memorial Coliseum may not even be "the single most historic modern stadium" in Southern California. I would give the Rose Bowl that designation, thanks to the many Rose Bowl games, 1994 World Cup final, 1999 Women's World Cup final and five Super Bowls, one behind the Louisiana Superdome's record six. I think the Rose Bowl has some worldwide cachet.
I'd like to nominate Yankee Stadium as "the single most historic modern stadium" in the United States, thanks to the many memorable World Series and football games played there, including the 1958 NFL Championship Game, dubbed "the greatest game ever played," along with several world heavyweight championship fights, most notably Joe Louis' first-round knockout of Max Schmeling, Masses celebrated by Popes Paul VI and John Paul II and Billy Graham appearances.
2. heyabbott
heyabbott Well-Known Member
Yankee Stadium, end of thread
3. Michael_ Gee
Michael_ Gee Well-Known Member
I must say I agree with abbott here. Until about 1960, Yankee Stadium was THE prime site for championship boxing, and of course, boxing was much bigger then.
Also home to one of the five most historic college football games ever Army-Notre Dame 0-0 tie in 1946, and perhaps the most historic pro football game, the Colts beating the Giants in OT for the 1958 NFL championship.
Oh, yeah, the Yankees play there, too.
4. flaming_mo
flaming_mo Guest
Can we define "modern?"
5. spnited
spnited Active Member
Still in use?
6. Mr. X
Mr. X Member
I think he meant since the Roman Colsseum. I don't think there was much in terms of major stadium since that fell into ruins until around the 1920s with Yankee Stadium, the Los Angeles Memorial Coliseum, the Rose Bowl, Berlin's Olympic Stadium, Wembly Stadium and the Yale Bowl.
7. BTExpress
BTExpress Well-Known Member
For all the wrong reasons . . . but historic nonetheless:
8. Kennedy acccepted the nomination outdoors?
I don't think so.
9. http://www.cs.umb.edu/~rwhealan/jfk/j071560.htm
Google before posting, idiot.
You learn something every day,
10. Mr. X
Mr. X Member
BTExpress -- Where would you rank the Louisiana Superdome in comparison to some of the other stadiums discussed here?
11. imjustagirl2
imjustagirl2 New Member
Wow. I read this on the heels of F_B's last post, and thought "That seems unnecessarily harsh and somewhat out of character for F_B to call SoCalGuy an idiot for messing up one small fact."
Then I opened the link. Not so harsh after all. :)
12. Flash
Flash Guest
If the Canadiens hadn't abandoned the Forum ... where ghosts hovered in the mist.
Draft saved Draft deleted
Share This Page
|
global_01_local_1_shard_00001926_processed.jsonl/48319
|
Tiffany Haddish, jewelry detail, attends the 70th Emmy Awards at Microsoft Theater on September 17, 2018 in Los Angeles, California.
(September 16, 2018 - Source: Frazer Harrison/Getty Images North America) see more angles »
Tiffany Haddish Ponytail
Tiffany Haddish showed off a super-sleek ponytail at the 2018 Emmys.
Show Tiffany Haddish Looks With:
Popular Lookbooks see all looks »
Disclaimer: No celebrity endorsements are implied by our editorial.
|
global_01_local_1_shard_00001926_processed.jsonl/48320
|
go top
Belief in Nake up face
Naked Face + No Make Up = Nake Up Face
To remove all unnecessary affectations, Nakeup Face sought the experience of makeup and skincare experts, beauty editors, designers and advertisers, to collect a rebellious yet free spirited notion of beauty. From it, they created a a makeup style that would highlight the essence of a naked face. Because, when all pretense has been removed, that's when true beauty begins.
Nakeup Face
Nakeup Face Cosmetics
1 Products
|
global_01_local_1_shard_00001926_processed.jsonl/48348
|
which wine glass for which wine
Which wine glass for which wine?! We break it down for you!
Once you start shopping for wine glasses, you’ll quickly see there are so many different wine glasses out there, so how do you know which wine glass for which wine? Does it even matter? We’re here to help you find out which wine glass is right for which wine – and that will help you enjoy each glass to the fullest (and not to mention, make you look pretty wine savvy!).
Which wine glass for which wine – does it matter?
You’ll quickly notice that when it comes to wine glasses, there are tons of different styles on the market. The main reason for this is to enhance the overall wine drinking experience.
which wine glass for which wine
With so many styles, how do you know which wine glass is best for which wine?!
Red vs White
Though both red and white wines have a large spectrum ranging from light to full-bodied, the two main categories to consider when thinking about wine glasses are red vs. white.
Red Wine Glasses
Red wine glasses will normally have a bigger bowl and be taller. This gives the wine space to “breathe” so that all the flavors come out.
White Wine Glasses
White wine glasses will not have as wide of a bowl and probably won’t be as tall as red wine glasses. This is because they don’t need as much space to breathe.
Check it Out!
The video below gives a more in-depth look at the art of choosing the right wine glass based on the type of wine you are drinking. It gives recommendations for light-bodied, full-bodied, reds, whites, sparkling wine and more.
Functionality or Style
Choosing a wine glass can also be about style or functional preference. For example, you may just like the way stemless wine glasses look or feel in your hand. You may choose a 16oz stemless wine glass over a 20oz stemless wine glass if you have smaller hands.
Is the wrong wine glass going to ruin the experience?
Okay, we’ll be honest with you: of course it’s not the end of the world if you drink the “wrong” wine from the wrong glass. At least you’ve got the right beverage in your hand ;). But as they say, it’s best to use the right tool for the job. So if the right glass will enhance your wine drinking experience, why not go for it?
unbreakable white wine glasses Unbreakable red wine glasses which glass which wine
|
global_01_local_1_shard_00001926_processed.jsonl/48352
|
December 6, 2011
By eighty-sixCrowns BRONZE, Revere, Massachusetts
eighty-sixCrowns BRONZE, Revere, Massachusetts
4 articles 0 photos 0 comments
Where are these scars from?
My bandages are undone,
Leaving my wounds to bleed.
Cuts, scrapes, and welts drip
Of red life as I sleep.
Awakened, I’m found, emptied.
My timid heart was pounding.
I could feel my veins resounding.
The whimpers of my blood echoed.
All my emotions
Uttered and made commotion,
‘Rebuke fear and turn to gold!’
But my body couldn’t handle.
Stress has left me mangled;
My skin began to tear.
There were wars deep within
And fights I couldn’t win,
Arteries burst and cheer.
Scars are no longer crying,
Nor weeping or sighing,
For now, my insides are free!
The wounds begin to heal
Pain, I can no longer feel
For my veins have conquered me!
Similar Articles
This article has 0 comments.
Parkland Book
|
global_01_local_1_shard_00001926_processed.jsonl/48354
|
Friday, January 22, 2010
Tips for Getting Nasty Smells out of Drums
I received an email today asking how to get the smell of rancid oil out of drumheads. A drummer who lives in an extremely dry climate had been advised by an "expert" to apply almond oil to the skins of two frame drums. The oil had gone rancid and smelled bad.
The woman who wrote to me wondered if it would help to put clove oil on the drum heads in hopes of covering the smell. (Not a good idea.)
It took me awhile to compose a reply, and then I thought the info might be useful to other drummers. In the last few months I have spent time around two very smelly drums from Africa (really nauseating), so I know that brand new drums often have poorly prepared skin heads that stink to high heaven.
So here is what I have learned about getting rid of nasty smells without harming drumheads:
CAUTION: Be very careful about actually applying anything to drum heads, especially natural skin heads.
My djembe teacher would have advised using palm oil if necessary to protect a drumhead in a dry climate. But only the tiniest, tiniest bit.
Normally drums that are used constantly get enough oil from the hands of the drummer.
To remove any excess oil you have applied, you could store the drums skin down on paper towels in a warm place (not hot, or the skin could split). The paper towels will absorb excess oil.
Assuming excess oil is not part of the problem, there are ways to remove odor that you can try.
The smell will eventually weaken some on its own.
However, here are some methods that may help.
Apple Slices
The best deodorizer is to place a drum in a big trash bag with a some apple slices. You slice up an apple or two and spread the slices out on a tray (for maximum exposure), then put a wire rack (such as those used to cool cakes and cookies) over the tray to keep the drum from touching the apple slices.
Seal up the bag and leave it sealed up for at least a week.
Apple will absorb quite horrible organic odors (as of dead bodies, for example), so it should work for your drums.
Baking Soda
After the apple treatment, if there is any remaining smell, you could try using baking soda in the same way you used the apples slices (tray, wire rack, sealed garbage bag).
Baking soda is not nearly as efficient as the apples but could help remove the remnants of scent after the apple treatment. If there is any residual odor after the apple treatment, I would try the baking soda treatment for a week.
Do NOT try to combine the apple and baking soda in the same treatment. They will sort of cancel each other out. They must be done separately.
After the apple treatment, you could try sealing the drum up in a bag with incense (not burning) and leaving it for a few days. If the incense is strong, that should mask any remaining odor somewhat. (If you do the incense before or with the baking soda, the soda will just absorb the incense scent, negating the effect.)
Or you could actually smudge the drums with incense smoke to mask any remaining odor.
Essential Oils (Not Recommended)
As to the clove, essential oils are not actually oils. They are the fine, volatile particles of the plant. The difference between oils like corn oil or almond oil and essential "oils" is like the difference between vasoline and jet fuel. Both vasoline and jet fuel are petroleum products, but you would not put jet fuel on your skin.
Only the citrus oils, such as orange, lemon, lime, mandarin, etc. (which are not true essential oils) are actually oils pressed out of the plant. It is possible that a **tiny** dab of orange oil might be OK to use to mask any remnants of rancid scent after you do the apple absorption method, but it is risky.
Anything that you would not rub directly into your own skin is risky to put on a drum, and lots of things that are good for your skin are still bad for drums.
Drum heads are just dead skin after all. As such, they are fragile. Being stretched so tightly under such high tension as they are on a drum, they are incredibly vulnerable to any substance that may weaken them even slightly. Any liquid is risky to apply to a drumhead.
Scents During Storage
You could put any essential oil that you like on a pad of some kind and store it in a sealed bag with the drums. Just be careful to make sure the essential oil does not touch the drum head. Once you figure out a way to do that, you may want to store the essential oil pad in the drum case with your drum all the time.
Or you could simply keep a couple of boxes of richly scented incense in the drum case instead. Nag champa, for example, smells nice and will eventually permeate anything it is stored with.
I would only do that after deodorizing the drums with apple and baking soda, but you may want to experiment. Good nag champa incense is inexpensive and you can always try it again after the apple treatment.
Remember, though, sliced apple works better than anything that I have ever heard of.
|
global_01_local_1_shard_00001926_processed.jsonl/48375
|
The Full Wiki
More info on Thomas Carlyle (Scottish lawyer)
Thomas Carlyle (Scottish lawyer): Wikis
From Wikipedia, the free encyclopedia
Thomas Carlyle (July 17, 1803 – January 28, 1855) was born in King's Grange near Dumfries in Scotland.
He studied and finished law at University of Edinburgh. In 1824 he was registered as lawyer at the Scottish bar. In October 1824 he inherited the title "Baron Carlyle of Torthorwald".
From 1830 on, he came in contact with the Scottish reverend Edward Irving and was named "apostle" of the Catholic Apostolic Church on 1 May 1835. He took responsibility for Northern Germany.
He is not to be confused with his more well-known namesake, Thomas Carlyle, the man of letters, born a few years earlier, also in Scotland. He too was connected to Irving, who introduced him to his wife, Jane Welsh. One biographer asserts that the similarities did cause confusion: "As a 'double-goer', perplexing strangers in foreign parts as well as at home, the 'Apostle' was occasionally an innocent, inadvertent nuisance to 'our Tom'."[1]
1. ^ Carlyle Till Marriage 1795 to 1826 by David Alec Wilson, 1923. Available on Google Books here, page 42-43.
Got something to say? Make a comment.
Your name
Your email address
|
global_01_local_1_shard_00001926_processed.jsonl/48377
|
Piece of the Puzzle
When a lot of things don't make sense, it usually means you're missing something very simple. Once that is known, all the dots will connect instantly and reveal the bigger picture. Step back from the frustrating details, go to a quiet place in your mind, and be open to a simple answer. It will come. Then, everything else will make sense.
-Doe Zantamata
Popular Posts
|
global_01_local_1_shard_00001926_processed.jsonl/48402
|
Atlanta is under attack. Hackers have seized control of many of the city's computers and are demanding a ransom of $51,000 in bitcoin to release them. Police officers are filing reports on paper, residents can't pay bills and the courts are frozen.
The irony is that the $51,000 might represent the most cost-effective use of government IT dollars in history. Does it mean that Atlanta should pay it?
It's an interesting game-theory question. The city of Atlanta has a nearly $650 million annual budget. It is undoubtedly spending more every day trying to fix the problem than it would cost to simply pay the hackers to go away.
Indeed, that is the sinister genius of ransomware attacks: Ransom amounts are generally calibrated so that it makes more sense for the victim to pay than to say, "To hell with you, I'm restoring from backup, no matter how far back I have to go." There's just one small problem: In the immortal words of Rudyard Kipling, "If once you have paid him the Dane-geld/ you never get rid of the Dane."
That is not literally true in every case — hackers aren't the same as Kipling's Vikings. Perhaps if Atlanta paid, they would go away and never bother the city again. But it has been true in enough cases that it's bad public policy to comply with ransom demands. Which is why the U.S. government has a policy that it will not pay ransoms or make other concessions to hostage-takers, even if it means frustrated kidnappers sometimes kill their hostages.
We get this instinctively. We have a revulsion to paying someone money not to harm us. Paying ransoms may seem like the rational thing to do in a given instance, but there's a meta-rationality to our social norms against doing so: If extortionists know people will indignantly refuse to pay a ransom — even at some cost to themselves — these sorts of attacks then rapidly become a bad investment of time and effort.
But what is the alternative? Twenty years ago, when I was a network administrator, a security expert I worked with solemnly explained why his job was so nerve-racking: "The hackers only need to find one way in. I need to find all of them, and close them before the bad guys get there." Of course, better IT security can raise the cost of these kinds of attacks, so that they won't be worth undertaking for such a paltry ransom. But good security is quite expensive. It is especially difficult for governments to manage, in part because ponderous, fussy government-procurement rules make it hard to keep up with the technology cycle, in part because civil-service wages are rarely high enough to attract top-level technologists.
The federal policy about hostage-takers may point us in the right direction. Essentially we're dealing with a collective-action problem: Society would be better off if we could all agree that no one would pay ransoms to hackers, but individual victims are probably better off paying. How can we get everyone to make a credible commitment in advance that they won't pay?
Luckily, collective-action problems are what governments are for. The federal government could make it a federal crime to pay in ransomware attacks, punishable by a stiff fine (say, double the demanded ransom).
The details would have to be carefully worked out, of course. For one thing, how do we know someone has paid a hacking ransom? In truth, we can't, and some will do it anyway. We don't need to ensure that no victim pays; we just need to make the payoff sufficiently uncertain that it will no longer be worthwhile for attackers to invest their efforts.
Of course, generating the necessary political support for such a law will be tricky if it is seen as punishing victims. We would also need to pair this with some kind of insurance strategy, so that those who are attacked don't suffer too excessively for taking a righteous stand against criminals. We will also need to figure out some way to incentivize state governments to comply, since constitutionally, they are protected from federal interference. But there are ways around this problem, for example, by taking away federal matching dollars instead of assessing a direct penalty.
Given the frequency of these attacks, this is something the federal government should be seriously considering. And given the obvious benefits to everyone, and the lack of a clear partisan angle, perhaps our deeply divided legislators could actually agree to do it.
Megan McArdle is a Washington Post columnist and the author of "The Up Side of Down: Why Failing Well Is the Key to Success."
|
global_01_local_1_shard_00001926_processed.jsonl/48405
|
black-woman-bra1Like the air we breathe and the water we drink, underwear is a part of life so ubiquitous that it often goes unnoticed. Don’t let another precious moment pass you by in which you are unclear about your undergarments — especially considering 99 percent of you are wearing them right now. (And if not, well, maybe you should be.)
1. Boy ShortsTarget-Micro-Lace-Boy-Shorts-4-originally-5
Modeled after men’s briefs, they take on a more rectangular shape than most panties. Similar to the hipster, the key difference is that they have a lower-cut leg. In fact, some styles’ legs extend a short way down the thigh.
When to wear them: When fitted properly and made from the right fabric, boy shorts can actually serve the same function as a thong in being worn under formfitting clothes without visible panty lines. Longer cotton boy shorts, however, can even be worn as loungewear or pajamas.
2. BriefsVictoria-Secret-All-Over-Lace-Brief-Panty-12-13
Commonly identified by the colloquial term “granny panties,” this undergarment provides full coverage and a high waistband. Sure, it’s not the most attractive style of underwear, but it’s certainly the most comfortable.
When to wear them: Unfortunately, the up-to-the-navel waist makes these visible in low-rise jeans and trousers, so limit them to your high-waisted pants or for, you know, that time of the month.
3. French-Cut PantiesFrench-Cut-Panties
Often referred to as high-cut panties, these gained a resurgence in the 1980s, thanks to Jane Fonda’s exercise videos. They have the same high waist as the classic brief, but it features high-cut leg holes that rise just above the widest part of the thigh, which is often better for circulation.
When to wear them: If you want the coverage of a brief but find the elastic band around the leg uncomfortable.
4. Hipsters
Evollove-Five-Kisses-Contour-Brazilian-Brief-19-originally-35Not meant to be worn by hipsters alone, this style — also called hip huggers — got its name because the waistband sits on the hips, a full two inches below the waist. They also feature low-cut leg holes.
When to wear them: These still provide full coverage but are perfect for low-rise jeans and pants.
5. BikinisStella-McCartney-Magnolia-Shrugging-Lace-Bikini-50
This pair of underwear is modeled after, naturally, women’s bikini bottoms. The waistband sits a full three inches below the natural waist and has very high-cut leg holes. They also come in string bikini form, in which the leg holes are constructed with a thin string of fabric. The front and back of the string bikini look like triangles.
When to wear them: Because they provide little coverage, they are less visible underneath clothes and thus can be worn under most anything.
6. ThongsThongs
This is the style most often sought when needing an undergarment for formfitting clothing, like tight skirts or dresses, because it provides no coverage on the butt — and thus no panty lines. Like the bikini, it sits three inches below the waist. Often, the sides are meant to rest right at or above the hip bone.
When to wear them: when you’re rocking a body-con dress or tight pants.
7. G-StringsG-Strings
There’s little to the G-string panty. Like the thong, there’s no rear coverage, and this style also provides little up front, where it forms a T shape of fabric. The front and back pieces attach directly to the waistband.
When to wear them: To your next hot date? Because thongs and even boy shorts often provide a seamless look underneath clothes, it’s rarely necessary to require a G-string.
Picture Credit:- popsugar UK/ fashionandstylepolice
Leave a Reply
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/48425
|
ome and experience the fine dining of our land by exploring, in relaxing hospitality that awaits you, old flavours and new contamination encountered in dishes made with painstaking care and skilled hands. Make a toast with our wine to the pleasure of the table letting you get surprised by a thousand declination of a kitchen made of simple and genuine ingredients.
|
global_01_local_1_shard_00001926_processed.jsonl/48427
|
Barefoot Contessa: Back to Basics
Season 8 Episode 10
Local Food Heroes
Aired Unknown Apr 06, 2013 on Food Network
out of 10
User Rating
0 votes
By Users
Write A Review
Episode Summary
Ina Garten takes inspiration from the fabulous food found in the Hamptons to create new recipes in a piece for her Barefoot blog. She makes Salmon and Guacamole Sandwiches, Salted Caramel Brownies and Balsamic Roasted Beet Salad.
Episode Discussion
Join the discussion of this episode Episode Discussion
Trivia, Notes, Quotes and Allusions
See All Trivia, Notes, Quotes and Allusions Trivia & Quotes
|
global_01_local_1_shard_00001926_processed.jsonl/48434
|
Skip to main content.
UFO Sighting Report - Ireland
June 19th 2010: Castleknock, Co. Fingal
UFOINFO Sighting Form Report
Location: Castleknock
Date: 06 19 2010
Time: 11:15
Number of witnesses: 2
Number of objects: 7
Shape of objects: Cylindrical
Could your sighting be a UFO balloon/lantern?: No
Weather Conditions: Clear
Description: The objects were cylindrical shaped with very bright light in the centre. First 3 were in a triangular formation followed by 4 more in a line behind the first 3. This all lasted about 2-3 minutes. As the first 3 were going out of view the two objects to the rear of the triangle joined the first one in a line and the light decreased in size and intensity. This happened to the other 4 objects that followed the first 3 at intervals of between 15-45 seconds. They didn't appear to be as high as aircraft in the sky but travelled a fairly rapid speed with all following the same trajectory.
They made no sound and stayed at the same height until out of view. Would be interested to hear if anyone else saw this.
|
global_01_local_1_shard_00001926_processed.jsonl/48514
|
Coldstones Quarry
Coldstones Quarry
Some more views of Coldstones Cut and Coldstones Quarry
Coldstones Quarry is a large limestone quarry near Greenhow on the moors above Pateley Bridge in the Yorkshire Dales.
The quarry is unusual in that it is sited on high ground, and is thus less visible from the surrounding countryside than most of the other quarries in the Yorkshire Dales.
The quarry is also famous for its viewing platform - the "Coldstones Cut" - a stone fortress-like structure designed by the artist Andrew Sabin.
The Yorkshire Dales - Home Page
Gift Ideas
|
global_01_local_1_shard_00001926_processed.jsonl/48523
|
Zsh Mailing List Archive
Messages sorted by: Reverse Date, Date, Thread, Author
Re: Why Zsh doesn't warn me again?
Hi Bart :)
* Bart Schaefer <schaefer@xxxxxxxxxxxxxxxx> dixit:
> As far as I can tell, that isn't specifically documented anywhere, it's
> just the behavior that was considered most logical.
And that's (almost) true. A bit unexpected, maybe.
> The second problem is that typing the EOF character (ctrl-D) is not the
> same as using `exit'.
OK, I was supposing that the code that interpreted EOF wasn't at
the same level than the code that interpreted exit or logout, but I
wasn't sure...
> It takes at least _two_ commands after an attempt
> to exit before zsh will warn you again on an EOF.
OK. I was testing with just one command O:)
> This happens because EOF is interpreted earlier in the command loop,
> so zsh fails to properly decrement the attempted-to-exit counter (a
> global called "stopmsg" if you look at the C source). I'd say this
> is a bug.
If EOF is intended as a synonim for 'exit', yes, it's a bug.
> } How can I change this (without IGNORE_EOF'ing) so Zsh act like the
> } doc says?
> Use the "stty" command to set the EOF character to something other
> than ctrl-D, and then bind ^D to a function similar to this one:
Nice, thanks, but I think I must get used to use 'exit' or
'logout' instead of EOF... It's a bad habit anyway, because sometimes
I've exited a terminal accidentally with backgrounded jobs because
I've hitted ^D twice due to a bad finger movement (a trembling
finger...). Using a command to exit is less error-prone.
> (Remember to change the eof character before you freeze the tty, if you
> happen to be using ttyctl.)
Thanks :))
Raúl Núñez de Arenas Coronado
Linux Registered User 88736
http://www.pleyades.net & http://raul.pleyades.net/
Messages sorted by: Reverse Date, Date, Thread, Author
|
global_01_local_1_shard_00001926_processed.jsonl/48541
|
Please, turn Javascript on in your browser then reload the page.
Install certificates
Setup an SSTP SSL VPN in Windows Server 2012 R2
Network-to-network tunnels often use passwords or digital certificates. In the address bar, enter chrome: It places the file client1. The client cert is generated by buil-key. Early data networks allowed VPN-style remote connections through dial-up modem or through leased line connections utilizing Frame Relay and Asynchronous Transfer Mode ATM virtual circuits, provided through networks owned and operated by telecommunication carriers. This section discusses the main architectures for PPVPNs, one where the PE disambiguates duplicate addresses in a single routing instance, and the other, virtual router, in which the PE contains a virtual router instance per VPN.
Related articles
SSL VPN using web and tunnel mode
In most cases, you'll leave it blank. If your VPN server requires client certificate authentication, select your installed user VPN certificate from the list. Scroll down and click Google Play Store. Click Manage Android Preferences. In the upper right, click Add. The name of the server you need to connect with to access your VPN. Leave this checked unless your administrator says otherwise. Leave this unchecked unless your administrator says otherwise.
Create a new connection Click your account photo. Next to the VPN app, click Add. Follow the instructions on the screen.
Connect to a VPN Click your account photo. Click the connection name. To create a new connection or to connect to a VPN provided by an Android app: Next to the app, click Add. Follow any onscreen instructions. Split tunnel and full tunnel Typically VPNs implement a full tunnel, which means that all traffic from all Chrome windows, Chrome apps, and Android apps will pass through the VPN connection.
This is useful if: Your VPN only provides access to internal sites, but not full internet access. You need to communicate with devices on your local network, such as printers, while connected to the VPN. Install your server certificate Download your server certificate, according to the steps your administrator gives you. Open a new tab in Chrome. There is not much you can do about it. Admin, I do understand your point, how ever when running a port scanner on an IP which has an open TCP port the scanner sees it as open and not stealth.
So this is where I would focus my attack. More than likely the attacker will move on to an easier target. Now I see your point. However, the error message could have gotten lost or dropped by a firewall. So it is in fact harder to tell if a UDP port is really open. To detect this for sure, more sophisticated tools — which try to communicate with the assumed service — are necessary.
On the other hand, though: To figure that out, you need more sophisticated tools as well. Hi, first of all thanks for this great tutorial! Would you happen to know what to add to the firewall so I can connect to the routers UI via https? I only use the two iptables lines from the tutorial and the web interface is accessible on its local ip address for me. Thank you for your amazing and such detailed post. I cannot setup static routes on my cable modem. But surprisingly it still works.
However the phone does not see Considering how DNS is configured to be So, now I wonder whether static routes are crucial to this process. Here are my IPTables rules:. However, I am no longer sure about what I wrote in Step 9. Maybe Router mode is the better option here. Overall congrats on this guide.
This is the only guide that I found that actually works for a beginner like myself. Thank you for this! Did you consider on writing such a short guide also for PfSense to connect as client to the ddwrt router, this is what I am having trouble with now. Then type the following to get started: Step 4 — Generate Client Certificates Now you can create as many client certificates as you need. In this case the VPN server will get Connection is considered lost when there is no answer within 30 secs.
Without this line, the status page will be empty. The port might have to be instead of 14 in older releases. Set proxy address and port accordingly. Below I will describe three possible set-ups: Field File CA Cert ca.
Troubleshooting If the VPN does not work as expected, finding the error can be frustrating. Here are some notes that might help: Otherwise the connection might fail because the certificates are not considered valid. If you can connect to the VPN but have no internet access, check your static route on the main router see 9. John March 25, at 1: Hi there Step 4 is wrong, it should be: Let me have a try.
Thanks for your advice. KT November 29, at 7: Could you advise me on the config? I really hope you could help me!! KT November 29, at 9: Hi KT, your config looks perfectly fine to me. KT November 29, at Thanks for your timely reply.
Try adding the following static route to your main router: I have updated the article accordingly. KT December 1, at 9: I got the internet up on my Android phone!! KT December 3, at 5: Feel so good with OpenVPN now.
Thanks for your help. Ionut January 17, at 8: Below you can see my Server and Client configs Server: Hey, except for one thing, everything you wrote looks good to me.
Andrew October 2, at 1: Wes June 3, at 8: Mike June 7, at Mike July 11, at B prasad July 31, at 7: Mike August 8, at 1: To suppress this message: Robot August 12, at Les Salmon August 12, at 2: Your feedback would be greatly appreciated. Any thoughts or questions?
Leave them down below in the comment section. Using a free VPN for Kodi — is it a good idea? The service offers excellent security, with bit encryption, an SSL-secured network, and unlimited bandwidth. And with excellent connection stability, you can use all your other apps with total confidence that ExpressVPN is protecting you in the background.
Want to give ExpressVPN a try? The company offers a risk free day money-back guarantee , so you have nothing to lose. You can get three months free!
Recent Posts
Your Chromebook can connect to a private network, like the network at your work or school, using a Virtual Private Network (VPN) connection. Note: If you're using your Chromebook at work or school and have problems setting up your VPN, contact your administrator for more help. Setting up a VPN on an Android device is a breeze. Head to Settings > Wireless & Networks > More, and tap the “+” icon in the top-right all the required info into the window that. SSL_VPN. SSL VPN. This section provides information on how to configure the SSL VPN features on the Dell SonicWALL network security appliance. SonicWALL’s SSL VPN features provide secure remote access to the network using the NetExtender client.
|
global_01_local_1_shard_00001926_processed.jsonl/48559
|
ESXi 6.0 on Windows 10 Hyper-V
You might ask why, I recently completed the VMware training module for installation and management of VMware vSphere components, to start to play around I don’t exactly have a bunch of hardware kicking around. I do however, have my awesome gamming Rig which is massively over powered in terms of CPU, Memory however… err not so much, disk I/O… also meh, these will need to be expanded on, but I do at least have Windows 10 running on SSD and a 3 TB spindle disc for more regular storage needs, but everyone knows a 7200 RPM disk provides mediocre performance.
Anyway I’m choosing Hyper-v Since I already have windows, and it comes free with windows, there are other options such as Oracles Virtual Box, and VMware player (can only run one VM at a time though for the free version :S)
Besides that here’s the steps so far.
1) Activate your Windows 10 Pro (1607), as mentioned installed mine on a 120 GB SSD.
2) Ensure VT-x and VT-e and probably VT-d is enabled, and that you have a motherboard and CPU capable of doing virtualization.
3) make sure all your hardware drivers are up-to-date.
4) Install Hyper-v.
5) Configure server settings such as HDD location, CPU allocation, and networks. In my case, I want my ESXi hosts to be isolated from the internet, so I pick internal.
6) Grab the ESXi ISO installation media from VMware (login and subscription required).
7) Create VM, I had to pick Gen 1 with BIOS, Gen 2 with EUFI didn’t boot the ISO for me.
8) I noticed at first attempt at the ESXi VM, it was sitting at loading kernel for an awfully long time, sure enough a simple Google search and discovered this gem.
When ESXi installer runs hit tab; add ignoreHeadless=TRUE
9) Before I could go any further I came across the dreaded, there are no network adapters available. You can Google this, but you will probably get blog posts about people attempting to load the nested VM with only 2 GB of ram when ESXi minimum requires 4 GB of RAM, so you have to be very specific in your search. In this case it’s amazing the power of the open community these days:
Turns out (as usual) it’s a driver related issue (don’t worry I’ll talk about this a couple times throughout this guide).
Lucky enough some lad was genius enough to figure out a solution, not only that but also provide the direct VIB to inject into the ISO file.
I followed the instructions, discovering that the latest supported release was for 5.x including 5.5 for ESXi installation customizer.
A double whammy it didn’t run on my Windows 10 x64 box… dismay not, we’re playing with VMs here.
I quickly created another VM and install my old Windows XP ISO with custom Dark Vista theme imbedded.
The great part was getting the files into the VM was a breeze. Simply shutdown the VM, navigate to the VMs HDD folder, Right click the VHDX file, and select the mount context menu.
This mounts the system and C:\ as separate disks on my windows host, copied the files in, booted the VM, and followed the instructions using the provided VIB and the ESXi 6.0 installer from VMware (login required). Bam sure enough I got a new custom ESXi 6.0 installer ISO file. Moved it out in the same fashion. Mounted it as the ESXi VM’s disc, and booted it up!
Finally the installation moves on! (Make sure you choose a “Legacy Network adapter”)
*Note I do not discuss storage choice when setting up this test host, I simply chose to create a VHDX file of 1 TB for the Nested VMs and for ESXi to be installed on.
10) Once the installation completes, and reboots make sure to hit SHIFT + O and add “ignoreHeadless=TRUE”. Let ESXi boot in DCUI
11) At DCUI, navigate to “Troubleshooting Options”, Then “Enable Shell”
12) Press ALT + F1 (Not F2 as the source states, F2 is the DCUI, F1 is the console). Then Login with root.
13) Type in this command and you won’t have type the headless part of the boot.
“esxcfg-advcfg –set-kernel “TRUE” ignoreHeadless”
(Copy command then select the Menu item “Clipboard”, then “Type Clipboard Text”) (classic Ctrl + V works too)
14) I was finally able to manage set an IP address for managing the host, the virtualized ESXi host hahaha. Sadly the vSphere client failed to connect on my XP VM.
So I setup a Windows 7 x64 bit VM instead. I set this up on Hyper-V on my Windows ten machine, alongside my ESXi hosts to mimic having a laptop running Windows 7.
The vSphere phat client can be downloaded from VMware (login required). Creating my first test VM on my nested ESXi host seemed to have an issue, reading further in the communities shows others with the exact same issue.
Turns out one can simply add a line to the VM’s VMX file “vmx.allowNested = TRUE”. This can be done via SSH (if enabled) or direct console (ALT+F1) using vi.
15) Another thing I noticed was when I was using the Hyper-V Manager’s console to manage my Windows VM running vSphere, and then having it open up vSphere’s console that the Hyper-v console would hang.
My only option at this point was to change my Windows 7 mgmt VM’s network setup. Instead of it only being in the locked down management network, I added another NIC to the VM after creating an external vSwitch in Hyper-V.
Since I have a DHCP server in my local LAN, having the Windows 7 NIC setup to DHCP provided it from my DHCP pool. Using ipconfig (in VM) or checking my DHCP server’s pool I was able to find the IP to remote into.
This of course required setting up remote desktop permissions on the Windows 7 VM. This also allowed me to work in full screen mode, and didn’t crash when opening up vSphere consoles, including of course copy and paste abilities. :D.
16) Next sort of problem was kind of expected. No x64 VM’s in my Nested enviro. There’s topics on this. So I decided to grab the latest 32 bit version of windows that’s available… you guessed it; Server 2008 (Not R2).
Grabbing a couple different versions available from MSDN, gave me a tad bit of issues. First off, don’t use the Checked/Debug, I played with the standard and the SP2 versions. I found the issue was it was hanging at completing installation.
Checking the VM stats via vSphere phat client VM’s performance tab, showed MAX CPU (not always a sign of being hung as it could still just be processing, but definitely a sign on the less), then the big give away, Disk I/O and consumed memory.
Disk I/O was none, and the consumed memory was on a steady decline till it plateaued neared nothing, all signed of stuck or looped process. Since I felt like giving it a little benefit of the doubt, and I had two virtual ESXi hosts to play with,
I decided to bump the CPU on one from 2 to 4. This allowed me to create a VM with 4 virtual CPUs instead of 2. Not sure why this would make a diff, and not sure if it exactly was. So I mounted the same 2008 with SP2 ISO and load the full desktop standard.
This time it finally got into the desktop… guess I’ll try the Standard core now on my other host after upping the CPU as well… let’s see. Yay Server Core installed using the standard 2008 32bit ISO with 4 core CPU.
17) Next issue I came across was not being able to have the VM’s inside the nested ESXi servers communicate with any other device in the same flat layer 2 network. I was sure I had configured everything correctly.
If one Googles this they will find lots n lots of articles on it stating the importance of promiscuous mode. I was up super late trying to figure out this problem and was starting to get a bit crazy. Setting all forms of the settings I could possibly find.
Including attempting to set mirror ports on the ESXi’s VM NICs on Hyper-v hahaha. AS I mentioned you’ll find many references to it, but googling promiscuous mode hyper-v and you discover most people stating to add a line to the VM’s XML config file.
Well it probably won’t take you long before you discover you VM config location doesn’t contain XML files but rather vmcx files. Yeeeeapppp, good luck opening them up… they are now binary…. Wooooo! No admins playing around in here! Take that you tweakers!
This was a change in Hyper-V starting with Server 2016 / Windows 10. I spent a couple hours tumbling down this rabbit hole. To help other I’ll make this part as clear as mud!
IN Hyper-V, ON THE ESXi VMs NETWORK SETTING THAT IS THE LEGACY NETOWRK ADAPTER (the one used as the “physical” adapter in the ESXi vSwitch) EXPAND THE SETTING AND UNDER ADVANCED FEATURES SELECT “Enable MAC address spoofing”.
That’s it! That is Server 2016/Windows 10 Hyper-V’s work around for nested hypervisors. Although as usual support people on TechNet instead of giving an answer or a technical work around would rather dust their hands the classical “not supported” instead of “It’s possible, here’s how, but if something doesn’t work with these settings that’s all we can help with” which I feel would have been a far better response. Maybe these support people just aren’t aware, who knows here’s where I found my answer.
18) So now that I got my hosted ESXi servers up and running and communicating the next step is vCenter. vCenter will setup its own SSO domain, we can add a MS AD domain later and change the default SSO domain to be our active direct domain. However the default SSO domain created at vCenter deployment is the local configuration domain for all vCenter services. Grab vCenter Appliance from VMware. You might be wondering what gives when you discover under the download list for vCenter that there’s an ISO and an IMG file, but no OVA/OVF. This is cause in vSphere 6.0 the vCenter appliance is deployed via a client system using some weird system to communicate to the host to deploy via some web stuff… even I don’t know the exact details of what’s up, either way, if you attempt to create an VM and mount the ISO, you’ll find it’s not bootable. So mount it to the management VM. In my case my Windows 7 VM with vSphere installed. Since Windows 7 doesn’t have native ISO mounting features I had to install virtual clone drive. Then mount the ISO and navigate inside.
Oddly enough it almost seems as if you need a windows system to deploy a Linux appliance. Under the VCSA folder you should find an integration plugin exe installable… run the installable exe file. There seems to be a set that states installing certificates and service, this might be the start of the certs of the built in SSO domain. Not sure though. Once it’s done it sort of leaves you in the dark… as every just closes and there’s not complete window in the wizard…
Guess I’ll just run vsa-setup.html now… Since I have a native version of Windows 7 setup… looks like I’ll need IE 10/11 as the default IE 8 won’t suffice. Lucky for me the Windows 7 machine still had access to the internet, so I Googled the IE 11 installer and ran it, this may be a pre-requirement for the normal installer. As it seems to download and install required updates. You may need to find an offline installer file for IE 11 if you are in a test enviro where you Windows machine doesn’t have access to the internet.
Click Allow. Another pop-up will appear, click Allow.
Now we can finally click install: S
Accept the user agreement, then enter one of the hosts IP address. Member I installed and run this one the Windows 7 machine that can already access the hosts via SSH or the vSphere phat client. So I will enter the IP address here as I haven’t setup DNS at all yet in my environment, and one wouldn’t technically yet if the plan was to have nested DNS servers (The DNS the hosts point to are VMs it hosts).
I made a wrong IP entry, it alerted me as it couldn’t connect to the host, then corrected the IP, and got a cert warning.
Setup the Virtual Appliance OS’s Root password (I believe it uses openSUSE, so this would set the underlying openSUSE root password).
Now under the deployment type if one were never to connect any other vCenter server into the SSO domain for enhanced link mode, you can pick embedded, however for scalability, and the fact I need to setup a Windows Server vCenter to run Update Manger, I’ll create an external Platform Services Controller (PSE). This will require me to run through the wizard separately to actually deploy the vCenter server, in this case I’m actually just setting up the PSE Virtual Appliance (VA). Hence the options all make sense.
As I mentioned this will create the SSO domain for all vCenter services, do not make this the same as your AD domain, this will cause confusion between domains when you add and set your AD domain as the primary SSO identity source. I stick with VMware default vsphere.local, then add a site name (generally this would be some sort of regional reference). Also set the SSO admin password.
It complained about DNS a requirement and a System name, I’m assuming this is hostname, even though it requested it be either FQDN or IP like it was required for some sort of looked, I specified simply the hostname, and a DNS server IP that is not yet even setup for DNS (That which will be my PDC in my test AD setup) This allowed me to continue the setup. I’m thinking this might be what it enters as a common name or SAN for its cert. is my guess.
I went back and changed it to an IP address as I figured my first couple attempts to access it will be through its IP address and I didn’t want to deal with cert warnings. It did however warn me that FQDN is more preferred and this makes sense when a proper DNS system is already implemented.
Hahaha Sure enough had to go through all that IE 11 setup, and plugin installation for it simply to deploy an OVF file hahaha.
Cool, I guess it’s more that based on how you want to set vCenter up with the new PSE instead of having a bunch of Documentation to read through (While this is technically always best to do anyway) it sort of automates the templates to deploy and how to configure them using a questionnaire type setup. I believe in 6.5 this is maybe easier with some sort of HTML 5 based deployment system. Not sure though.
So I hit a couple snags on deployment. First off I thought I was stuck on not being able to do nest x64 virtualization on my nested ESXi hosts. Until the great lads in Freenodes #vmware told me to enable virtualization extensions to the ESXi VM.
“17:18 < genec> Zew: then did you forget to pass VT-x to the ESXi VM?” – Oh Neat! Thanks genec.
Since I was running all my stuff on Hyper-V I had to Google this. Did take long till I found my answer.
Set-VMProcessor -VMName -ExposeVirtualizationExtensions $true
The VM name being my ESXi hypervisor.
This however I only discovered after I enabled the whole vmx.allowNested = TRUE bit on the deployed VM after I saw that it failed with that usual error message. Luckily enough a bit of googling again and I was able to find my answer.
“You can add vmx.allowNested = “TRUE” to /etc/vmware/config in the ESXi VM to avoid having to put it in every nested VM’s configuration file.” –Thanks Matt
I’ll delete the existing vApp and try my deployment again.
Once I managed to mount the VSCA ISO and install the client plugin, and attempt to deploy the PSC/VCSA I got hung up. It appears all my x64 VMs within my Nested ESXi hosts failed to properly boot. All the different VCSA\PSC versions all went into a boot loop. Windows 7 x64 gave a fault screen after loading the installer files and attempting to boot the setup.exe. Server 2016 just showed a black screen. Looking into this I discovered this guy’s blog… looks like I may have to resort to VMware Workstation Pro!
I’ll post this blog post for now as it has become rather long. I will post my success or failure in the upcoming weeks. Stay tuned!
Jan 2018 Update
I remember this being extremely painful, but was so way easier on Workstation Pro.
6 Replies to “ESXi 6.0 on Windows 10 Hyper-V”
Leave a Reply
|
global_01_local_1_shard_00001926_processed.jsonl/48562
|
Information for "The Adventures of a Mis/identified Queer Crip"
From ZineWiki
Jump to: navigation, search
Basic information
Display titleThe Adventures of a Mis/identified Queer Crip
Default sort keyAdventures of a Misidentified Queer Crip
Page length (in bytes)757
Page ID42783
Page content languageEnglish (en)
Page content modelwikitext
Indexing by robotsAllowed
Number of views46
Number of redirects to this page0
Counted as a content pageYes
Page protection
EditAllow all users
MoveAllow all users
Edit history
Page creatorElevatorlady (Talk | contribs)
Date of page creation20:00, 30 November 2015
Latest editorElevatorlady (Talk | contribs)
Date of latest edit21:47, 30 November 2015
Total number of edits4
Total number of distinct authors1
Recent number of edits (within past 91 days)4
Recent number of distinct authors1
|
global_01_local_1_shard_00001926_processed.jsonl/48566
|
Hush now.. child.. don't you cry... Momma's gonna buy you a .. mocking.. bird
Everything's gone to hell in a .. handbasket.. im just gonna stay put and .. wait for everything to blow over.
Damn it damn.. damn it.. damn.. damn.. Damn it!! *sniff*
Not gonna find me here.. right?
Acknowledge Edit
Umm.. ok..? Whatever.
I know.. right?
You betcha!
UGH For crying out loud!! shut up!
I wouldn't have a holster if i wasn't a cop you jerk!
Do you piss everyone off this badly?! HOLY hell!
Ok.. we get it! your an Asshole!
Shut the hell up.. SHUT THE HELL UP!!! SHUT THE HELL UP!!!!
Oh my GOD Shut the hell up already!
I know what im doing!! just cover me and shut the hell up!
You look lost.. *groan* so i'll lead! come on!
Come ON!! Lets bring the fight to them!
You can follow me.. or you can die here by yourself.
Heh.. naw.. just no..
A world of no
No, keep dreaming!
Huh, guess you guy's weren't so useless afterall! i made it!
Oh yeah!! thats how you do it.. in your rotting faces!
Its over.. it.. its all over!! *Laughs* ohhh god..
Watch out!! there they are!
Shoot those things in their freaking faces!
Here they come...!! I SAID here they freaking come!!
Don't wait!! shoot them!! SHOOT THEM NOW!!
Hold on.. HOLD on!! wait a second..
Don't move a MUSCLE.. just wait here!
*Wheeze* Let's stop.. an.. *wheeze* Catch our breath..!
Lets hold out here.. just for a little bit!
Need Ammo Edit
Hey im out! i need some rounds over here..!!
Who do i gotta blow to get some ammo around here..?
PASS Over another clip already?!
Need HealthEdit
My.. my Shoulder!! its.. freaking killing me!
Ugh.. i need to stop and.. find a place to be sick..!
Not sure i can.. keep going..
Im hurt.. does this look infected to you..?
Need Weapon Edit
I'm a better shot than you are so.. give me the gun!
Give me a gun and ill cover you!! i promise.. really!
I need something to shoot with already...?
What do you want me to use agaisnt these things.. HARSH language..?
Stop hoarding the weapons you jerks!
Positive StatusEdit
Doing better than you are bitch!
Im great!! except for being here... surrounded by zombies!
Im fine.. back off!
It isn't what you think.. im doing fine.. thanks..
I haven't been bit..! if thats what your asking?
Praise Edit
Nice.. make a habit of that.. and you make actually be worth having on the team!
Ok.. that was pretty sweet actually!
Huh, Impressive! or mabye just lucky.. yeah.. just lucky!
Wow..! you don't completely fail! What a surprise!
Status ReportEdit
How you holding up..? Dead Yet?
Can anyone hear me..?? or is everybody already.. dead..
Hellooo..? Give me a status update here!
You look like hell! how's everyone else doing..?
Thanks! your a champ!
Your a sweetheart! .. really! i mean that..
Um.. o.. ok.. thanks i guess?
Well damn! now i feel bad saying those things about you before!
Your my new favorite person!
This is the worst idea you guy's have EVER had.. and you've had some pretty bad ones!
Keep Moving Edit
This is not good! RUN!! run like hell!
Lets go lets go lets go!!!
Back up!! back the hell up.. NOW!
It's gone to hell!! GET OUT of here!!
You can stay and die!! im getting out of here!
Kill Edit
See? Thats how you do it!
Eat it you dead bastard..!
Panic Edit
Oh SHIT!! I DON'T WANNA DIE!! *Heavy panicky breathing*
Augh!! AHHH Huhh..!!! *Panic breathing*
Game over.. GAME OVER!! HUHH Ahh!!
Taunts Edit
Heheh your stupid.. you should be ashamed of yourself!
Ill beat you to death! with a frying pan!
Really..?? REALLY?! You suck so baad..!
Curl up and die you piece of shit!
Off with their heads!! HAHAAHA HAHAHAHA!!
You can't handle this!! NO Way in hell!
|
global_01_local_1_shard_00001926_processed.jsonl/48588
|
What did Scylla look like? Homer gives her six heads armed with triple rows of teeth on her shoulders. Ovid gives her six dog’s heads at her waist and twelve dog’s legs. Neither of them mention the long mermaidy fish-tail that she’s usually depicted with in art (where she’s a sort of mermaid with a dog or two grafted to her waist).
So which is right? One or all of them? Rodney Matthews’ excellent illustration from The Usborne Book of Greek and Norse Legends (1987) bravely tries to include as much as possible.
All in a very alien sort of look. No twelve legs though.
1. Considering the nature of the religion Scylla operates in (Hellenic Polytheism), I’d say all of them are correct. Plus, Scylla is a water spirit. Water is fluid so I imagine that Scylla can be fluid too (as in, Scylla can have many variants in form). Other marine divinities like Proteus seem to have this quality too
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/48600
|
NET.WORKING: Advertising your site: Real-world tales
By Published on .
A few columns ago I strongly urged Web marketers to consider advertising their businesses in traditional media instead of just using online banners and links. Almost immediately, I drew a response from a Web publisher who had spent $15,000 on targeted print ads and drawn exactly one visitor over a four-month campaign. I had to agree that was a pretty bad CPM.
The publisher, Sao Ricardo, is the creator of Bodywise, an ad-supported health and fitness resource site that exists only online. Having gotten no response from her print ads in two fitness magazines, her view now is that people reading magazines or watching TV simply aren't motivated to take down URLs for later Web site visits.
Better to catch them online, she says: "When people are at their screens, the blinking mouse calls them to action."
But the question intrigued her and she posted a call for more opinions on the Internet Advertising Discussion List. Since most Internet entrepreneurs are absolutely locked to the idea of search engines and free links as the primary spur to traffic, I figured the idea of buying real-world advertising was not going to go over well.
To my surprise, with one or two exceptions, most respondents were enthusiastic in their support of every kind of affordable advertising -- "affordable" being the key word, of course.
One company used college newspapers to draw employment candidates to job-recruitment Web sites. The cost, said the writer, was between $2 and $10 CPM for offline classified ads vs. 30 to 40 for online ads. In one case, the first time one ad ran, the site drew nearly 200 visitors. Weekly cost: $100.
Another took on the issue of customer motivation raised by Ms. Ricardo: "I have two personal and anecdotal experiences to illustrate why advertising in traditional media makes sense for Web marketers," said the respondent. "First, I was driven to get online originally by AOL's television ads that offered free time to sign up. Second, just yesterday, a full-page newspaper ad, featuring William Shatner and a cogent and easy to remember URL made me go to to check out airline fares. Worked like a charm."
That goes precisely to the point of my original column. While offline advertising may not make sense for every Web business (as Ms. Ricardo's experience makes clear), it surely does for the biggest businesses.
Too many cybercompanies feel there's no point advertising to the 60% of U.S. homes that don't have computers. But online banners and links only reach the relatively small pool of already committed Webheads. For e-commerce to grow, businesses have to give the vast army of unwired a reason to go online.
For example, Barnes & Noble will never beat if it only uses online advertising; already owns that audience. But I noticed in last week's Sunday New York Times that Barnes & Noble had bought a page real-world ad. The message is clear: Why fight for Amazon's online customers when you can swamp them with newcomers instead?
That's the bottom line for all seriously competitive e-commerce brands: The way to win in cyberspace is to help convince the rest of America that there's a reason to come along for the ride. And that means advertising your message where they can see it.
David Klein is associate publisher-editor of the Ad Age Group. He can be reached at [email protected].
Most Popular
In this article:
|
global_01_local_1_shard_00001926_processed.jsonl/48635
|
AnaEE Denmark – University of Copenhagen
The research facility CLIMAITE in Jægerspris, Northern Zealand, is one of the nine Danish research facilities in AnaEE Denmark. Photo: Klaus S. Larsen
There is an increasing global pressure on ecosystems, not only from climate change and changes in global nutrient cycles, but also from growing demands of the society for their services. In particular, the greatly increasing demands for provisioning of food, fiber, bioenergy, and climate mitigation will challenge the functioning of ecosystems globally.
The European research infrastructure AnaEE (Analysis and Experimentation on Ecosystems) addresses the grand challenge of ensuring sustainable and optimal usage of ecosystem services in a changing world through coordinated research using state-of-the-art experimental research platforms across natural gradients of climate in Europe.
AnaEE Denmark is the national Danish node of AnaEE and provides access for public and private sector researchers to nine Danish ecosystem-level experimental research facilities in agriculture, forests, heath- and grasslands as well as in streams/lakes.
AnaEE Denmark is a consortium consisting of six departments from University of Copenhagen, Aarhus University, Roskilde University and Technical University of Denmark.
Hosted by University of Copenhagen
|
global_01_local_1_shard_00001926_processed.jsonl/48650
|
Larry Fink on Composition and Improvisation
Aperture Learning Guide
Availability: In stock
Availability: In stock
* Required Fields
This resource is intended to inform educators about Aperture’s Workshop series book Larry Fink on Composition and Improvisation and aid them in leading meaningful discussion surrounding its content.
Aperture Education staff have organized this learning guide thematically, highlighting salient topics from Larry Fink’s text. Within each theme, relevant chapters, passages, and vocabulary are noted, along with guiding questions to accompany specific images.
The Photography Workshop Series is an accessible resource that can be used to begin class discussions on photography’s history, the nature of photography, photographic techniques, the act of seeing, and the author of each book. The books are formatted in such a way that each chapter contains its own mini lesson or discussion, with bold headings or a bold quotation, and a brief elaboration or explanation below. The bolded headings can act as discussion topics, and can be easily rephrased as questions that you may pose to your class. The accompanying photographs act as the slideshow for the lesson. One of the first books in the series is Larry Fink on Composition and Improvisation.
For more information about Aperture’s educational resources contact [email protected]
|
global_01_local_1_shard_00001926_processed.jsonl/48657
|
Login Sign up
Ninchanese is the best way to learn Chinese.
Try it for free.
Sign me up
1. (coll.) to mock
2. to bully
3. to force (a concession out of sb)
Character Decomposition
Oh noes!
An error occured, please reload the page.
Don't hesitate to report a feedback if you have internet!
You are disconnected!
We have not been able to load the page.
Please check your internet connection and retry.
|
global_01_local_1_shard_00001926_processed.jsonl/48664
|
NovoGeek's Blog (Archive)
Technical insights of a web geek
Passing JSON objects in .NET 3.5
In my previous post, I have explained how to pass complex types using jQuery and JayRock in .NET 2.0 framework. I was digging a bit into Dave’s example (using complex types to make calling services less complex) in .NET 3.5 framework, to find how easier JSON serilaization/deserialization can b... [More]
|
global_01_local_1_shard_00001926_processed.jsonl/48674
|
Tag Archives: PageRank
PageRank For SQL Lovers
If you’re changing the world, you’re working on important things. You’re excited to get up in the morning (Larry Page, CEO and Co-Founder of Google)
This is my particular tribute to one of the most important, influential and life-changer R packages I have discovered in the last times: sqldf package.
Because of my job, transforming data through SQL queries is very natural for me. This, together with the power of R made this package indispensable for me since I knew of its existence.
Imagine you have a directed graph like this:PR1
Given a vertex V, these are the steps to calculate its PageRank, lets call it PR(V):
• Initialize PR(V) to some value (I do it to 1 in my script)
• Iterate this formula until converges: PR(V)=(1-d)+d*(PR(T1)/C(T1)+ ... +PR(Tn)/C(Tn)) where Ti are the vertex that point to V and C(Ti) is the number of edges going out of Ti
After doing this, result is:
Following you can find my code to do it with sqldf, which is quite simple from my point of view. I am pretty sure there must be some package which calculates PageRank but the main goal of this post is to show how easy is to calculate it with two simple queries, no more. The example is taken from here, where you can find a good explanation of how PageRank works:
net=data.frame(origin=c("A","A","B","C","D"), end=c("C","B","C","A","C"))
par(family="serif", cex=1, ps=25, bg="white", col.lab="black", col.axis="black")
plot(graph.edgelist(as.matrix(net)), edge.arrow.size=1, vertex.color="gray90", edge.color="black")
netou=sqldf("SELECT origin, COUNT(*) outs FROM net GROUP BY 1")
netpr=sqldf("SELECT origin vertex, 1.0 pagerank FROM net UNION SELECT end, 1.0 FROM net")
for (i in 1:50)
netx1=sqldf("SELECT vertex, pagerank/outs factor FROM netou a INNER JOIN netpr b ON (a.origin = b.vertex)")
netpr=sqldf("SELECT a.vertex, 0.15+SUM(0.85*COALESCE(factor,0)) AS pagerank
FROM netpr a LEFT OUTER JOIN net b ON (a.vertex = b.end) LEFT OUTER JOIN netx1 c
ON (b.origin = c.vertex) GROUP BY 1")
V(g)$name=sqldf("SELECT a.vertex||' (PR='||ROUND(b.pagerank,2)||')' as name from names a inner join netpr b ON (a.vertex=b.vertex)")$name
plot(g, edge.arrow.size=1, vertex.color="gray90", edge.color="black")
|
global_01_local_1_shard_00001926_processed.jsonl/48698
|
Public announcement
Jan 12 09:28 [raw]
If you have something important to say, do not use a chan address in the From field to send your message. I am certain I am not the only one who has blacklisted most of the chan addresses -- due to countless shitposts from them. Use a private address when posting to chans or your messages will be dropped by the blacklist; they will never be seen by many of us. If you are too stupid to understand what this means then you don't have anything worth reading anyway.
[chan] FBI
Subject Last Count
|
global_01_local_1_shard_00001926_processed.jsonl/48717
|
Can you ever really have enough Nintendo Joy-Con Controllers for your Nintendo Switch console? OK fine, four controllers is probably enough. But if you have fewer than four, right now is the perfect time to remedy that. Amazon is running a sale today that drops Joy-Cons to their lowest price ever, but there’s no telling how much inventory the retailer has. Today is also a great day to buy more Joy-Cons because the Nintendo Labo Variety Kit and the Nintendo Labo Robot Kit were just released! This deal will sell out, there are no ifs about it — grab one or two while you can.
Here’s what you need to know from the product page:
• Introducing Joy-Con, controllers that make new kinds of gaming possible, for use with Nintendo Switch.
• The versatile Joy-Con offer multiple surprising new ways for players to have fun.Battery life can last for more than six hours, but will vary depending on the software and usage conditions. For example, The Legend of Zelda™: Breath of the Wild can be played for roughly 3 hours on a single charge
|
global_01_local_1_shard_00001926_processed.jsonl/48725
|
Missing https support
Issue #18 resolved
Russ Gibson
created an issue
I have a secure setup that uses https for access to transmission. I use an apache redirect from https://host/transmission/rpc to https://host:9091/transmission/rpc (which allows not only secure communication, but apache's logs for access, etc.).
There are 2 issues with transmissionrpc for this: No way to specify to use https No way to have it not include port on connect
The attached file adds command line options to helical.py to support this, and optional parameters to Client.connect in transmission.py.
Comments (9)
1. Erik Svensson repo owner
I don't really like the added arguments to helical and transmissionrpc.Client. I propose that you can send a custom URL as address argument instead. See attached patch for details. With this patch helical can be started with following argument.
python contrib/helical.py http://localhost:9091/transmission/rpc
I haven't been able to test against https. Please let me know what you think about this solution.
2. Russ Gibson reporter
Allowing the url to be placed on the command line for helical.py is fine. However, your patch still requires a port. To use it, I had to pass the url like this:
./helical.py https://host:443/transmission/rpc list
Actually, helical.py doesn't really matter to me: as long as the Client object has a way to handle it, that's all that matters to me (I'm writing a client that watches the torrents for being finished, move/encode them, email a bot on another machine, etc.).
3. Log in to comment
|
global_01_local_1_shard_00001926_processed.jsonl/48727
|
What is the best way to transfer money between exchanges without fees? I think the most obvious option is to buy a redeemable coupon at one exchange, and redeem at another. But are there any exchanges who don't ask fees for this?
• BitFloor used to, but they stopped after it became hard and/or slow to withdraw USDs from Mt. Gox. – Stephen Gornick Jul 19 '12 at 22:29
The best way to transfer between exchanges without fees is bitcoin.
Coupons (like mtgoxusd) used to be very nice, but now it seems fees are often charged in addition to some of the coupons becoming unreliable.
An arrangement in #bitcoin-otc may work well at a low fee, but -otc isn't often quick.
In consideration of these two facts, I've come to the conclusion that it's typically quick and cheap enough to convert to BTC and transfer that.
• The problem is that I need the send money from Exchange A (where I sell high-priced bitcoins) to Exchange B (where I buy the low-priced bitcoins). If I would transfer it using your method, there is no profit to be made. – Muis Jul 20 '12 at 10:54
• @Muis - Did you find answer to the above question. If so tell me – Jsd Sep 18 '14 at 6:14
Your Answer
|
global_01_local_1_shard_00001926_processed.jsonl/48728
|
We know that the expected average time to solve a block from any given point in time is 10 minutes when the network hash rate matches the current difficulty.
However, as difficulty increases are we going to see more or less variability, or does it stay the same?
ie If we compared a difficulty of 500,000,000 with 500,000, would we see more blocks taking over 60 minutes to be solved, or less blocks, or will there be no difference?
up vote 8 down vote accepted
The variability is exactly the same no matter the difficulty. It is always an exponentially distributed random variable with mean 10 minutes (the mean could be slightly off if hashrate mismatches difficulty).
What we may see in the future however is a reduction in variance due to decrease of the block reward. As transaction fees become a more significant part of the reward, the profitability of mining will increase the more time has passed since the last block; just after a block is found, mining is unprofitable so the hardware may idle/switch to a different task. So the network hashrate will increase with time, meaning that few blocks will be solved quickly (hashrate is too low) and few will take a long time (the hashrate will be high so it won't last long), meaning less variance.
Your Answer
|
global_01_local_1_shard_00001926_processed.jsonl/48745
|
Wednesday, April 23, 2003
Death of the password
It may be premature to announce (again) the death of the password, but at least for users of Covisint, it's on its way out. Fascinating short piece in ComputerWeekly this week on a programme in Covisint to replace passwords with "tokens" - I assume USB type tokens or RSA smart cards. The reason it's fascinating (for me at least) is that there are some numbers quoted that I haven't seen before. It costs, apparently, about $100/year to "run" a token (for their community of 120,000 users in 11,000 companies (growing to 200,000 this year). Delphi, they note, has 20 staff just to administer IDs, with many handling calls to help lines no doubt, where 70% of calls are for forgotten passwords and each call costs between $40 and $60. It seems pretty easy to me to do the maths on that and come up with a sound business case. In the past when we've looked at tokens like that for government there have been two issues that stopped us moving ahead: training and technology compatibility. Training is reasonably easy to solve in a closed user community, but can you imagine how hard it would be to educate the UK population (or the online one at least) on how to use an RSA token? Technology, though, would screw you first - the wide variety of browsers, operating systems and whatnot would mean that the help desk would be full of calls complaining that the thing doesn't work. This is a problem that needs to be cracked and lots of people have had a go at it. It might, one day, be smart cards or bank cards with the EMV application in them, it might be some other kind of technical solution but, whatever it is, training and compatibility issues are going to be big costs.
No comments:
Post a Comment
|
global_01_local_1_shard_00001926_processed.jsonl/48755
|
Tips for Soothing Your Child’s Growing Pains
Posted by Jennifer Lai, M.D. on Nov 25, 2017 9:06:00 AM
It can be frustrating and exhausting to be a parent, especially when your child is hurting. This frustration can turn into a feeling of helplessness if your child is hurting and you don’t know what’s causing it or how to make it better. This is an issue I run into a lot when kids experience growing pains. Here are some suggestions you can try that might soothe those aches and pains and give your child, and you, peace of mind.
Read More
Topics: growing pains
Subscribe to Email Updates
Recent Posts
Posts by Topic
see all
|
global_01_local_1_shard_00001926_processed.jsonl/48763
|
The first commercially available (claimed) verified compiler
Derek Jones from The Shape of Code
Yesterday, I read a paper containing a new claim by some of those involved with CompCert (yes, they of soap powder advertising fame): “CompCert is the first commercially available optimizing compiler that is formally verified, using machine assisted mathematical proofs, to be exempt from miscompilation”.
First commercially available; really? Surely there are earlier claims of verified compilers being commercial availability. Note, I’m saying claims; bits of the CompCert compiler have involved mathematical proofs (i.e., code generation), so I’m considering earlier claims having at least the level of intellectual honesty used in some CompCert papers (a very low bar).
What does commercially available mean? The CompCert system is open source, so I guess it’s commercially available via free downloading (the paper does not define the term).
Computational Logic, Inc is the name that springs to mind, when thinking of commercial and formal verification. They were active from 1983 to 1997, and published some very interesting technical reports about their work (sadly there are gaps in the archive). One project was A Mechanically Verified Code Generator (in 1989) and their Gypsy system (a Pascal-like language+IDE) provided an environment for doing proofs of programs (I cannot find any reports online). Piton was a high-level assembler and there was a mechanically verified implementation (in 1988).
There is the Danish work on the formal specification of the code generators for their Ada compiler (while there was a formal specification of the Ada semantics in VDM, code generators tend to be much simpler beasts, i.e., a lot less work is needed in formal verification). The paper I have is: “Retargeting and rehosting the DDC Ada compiler system: A case study – the Honeywell DPS 6″ by Clemmensen, from 1986 (cannot find an online copy). This Ada compiler was used by various hardware manufacturers, so it was definitely commercially available for (lots of) money.
Are then there any earlier verified compilers with a commercial connection? There is A PRACTICAL FORMAL SEMANTIC DEFINITION AND VERIFICATION SYSTEM FOR TYPED LISP, from 1976, which has “… has proved a number of interesting, non-trivial theorems including the total correctness of an algorithm which sorts by successive merging, the total correctness of the McCarthy-Painter compiler for expressions, …” (which sounds like a code generator, or part of one, to me).
Francis Morris’s thesis, from 1972, proves the correctness of compilers for three languages (each language contained a single feature) and discusses how these features may be combined into a more “realistic” language. No mention of commercial availability, but I cannot see the demand being that great.
The definition of PL/1 was written in VDM, a formal language. PL/1 is a huge language and there were lots of subsets. Were there any claims of formal verification of a subset compiler for PL/1? I have had little contact with the PL/1 world, so am not in a good position to know. Anybody?
Over to you dear reader. Are there any earlier claims of verified compilers and commercial availability?
Deep Tech is affecting people’s lives without them even knowing it.
Paul Grenyer from Paul Grenyer
Deep Tech sounds like a character from the X-Files right? While it’s not a covert government agency, Deep Tech is affecting people’s lives without them even knowing it, but it’s not something we need to be afraid of. There are lots of very technical and wordy definitions of Deep Tech, but essentially it means technology that has an engineering aspect while having a demonstrable impact on people’s daily lives. Rather than a disruptive technology, like AirBnB or Deliveroo – apps that alter a service that already existed – a Deep Tech breakthrough could use technology to cure cancer or expand space travel. AirBnB is an intangible app, while Deep Tech often involves robots or breakthroughs in scientific or medical equipment.
Good examples are artificial wombs to increase the survival chances of premature babies, or brain implants to improve the independence of stroke victims. It’s not just medical advancements that are benefitting from Deep Tech, but improvements to smart homes and cleaner cities as well as energy efficiency are all developing areas of Deep Tech. Self driving cars and lithium-ion batteries could vastly improve the environment and how we live in it and are both examples of Deep Tech. Since
2015 European investment in Deep Tech has been growing three times faster than B2C investments (Wavestone) and it’s easy to see why when the impact that technology of this kind can have is made clear. Rather than just making it easier for people to order the weekly shop, or interact with a video on social media, discoveries in the Deep Tech arena make fundamental changes to how we live and survive. Researchers and scientists working in Deep Tech have not only created machines that can replicate human actions, but improve them. Like something from a science fiction movie, ‘HoloEyes’ are goggles that can provide a surgeon with a patient’s anatomy before the first incision is made, right there in the operating room. Harvard scientists have gone one further into the science fiction realm and created a brand new material, never before seen on earth. Metallic hydrogen was formed after 45 years of research and tests and has enormous potential, from space travel to superconducting abilities.
Deep Tech is technology at its most advanced and it’s most useful. While it may not affect all of us at once, the advancements being made in this field have a huge impact that will influence and hopefully improve daily life on a global scale.
Talk to me about Deep Tech.
Always Reply Within Your SLA – Succeed or Abort
Chris Oldwood from The OldWood Thing
Way back in 2012 I wrote the blog post “Service Providers Are Interested In Your Timeouts Too” about how you can help service teams understand your intentions so that they can handle requests more efficiently. That was written at a time when I had been working for many years on internal systems where there were no real SLAs per-se, often just a “best efforts” approach with manual intervention required to “unblock” the system when the failures start occurring [1]. In contrast I have always strived to create self-healing systems as much as possible so that only truly remarkable events require any kind of human remediation.
In more recent years I’ve spent far more time working on web services where there is a much stronger notion of an SLA and therefore a much higher probability that if you fail to meet your SLA then the client will attempt to perform some kind of recovery rather than hang around and wait for the reply [2]. Hence what I wrote about wasting resources on dead requests in that earlier blog post have started to become more significant.
A consequence of this ideology is that I’ve started to become far more interested in the approach of always responding within the SLA even if that means aborting mid-request. Often an SLA is seen as an aspiration rather than any kind of hard deadline, something which we hope to achieve more often than not, where “more often” usually involves quoting some (arbitrary) number of “nines”. For those requests that fall outside this magical number all bets are off and you might get an answer in a useful timeframe or you might not. This kind of uncertainty has always bothered me as a client consumer.
Hence, I’ve started moving towards building services that always provide a reply within the SLA whether or not the request has been satisfied. Instead of tying up valuable resources in the hope that when the answer finally arrives the client still has a vested interest in it, I’d prefer to just abandon the request and let the client know the SLA would be violated if it had continued servicing it. In essence the request times-out server-side, where the time-out is the SLA.
What this means for the client is that they have a definitive reply (network issues notwithstanding) to their request within the time limit allowed. More importantly if they want to allow more time to handle the request than the SLA allows for then they need to tell the service that they’re willing to wait. Essentially this creates a priority system and allows the service to decide what to do with requests that are happy to hang around for a bit longer.
Implementation-wise what this mostly boils down to is ensuring that every non-trivial piece of work (think: database query, network call, disk read, etc.) must be made with a bounded call time, i.e. one where a timeout can be provided so that the caller always regains control in a timely fashion. Similarly we don’t start any work that we suspect we can’t finish in time either. This generally manifests as aborting on the first timeout which is usually given the entire SLA and therefore you’re never going to recover in time.
Internally the maximum timeout starts with the SLA and as each background query is sent it is timed and the timeout gets progressively shorter [3]. As the load increases and internal queries take longer the chances of a request aborting rises but at least the load on the upstream systems doesn’t keep rising too. Ultimately it’s just a classic negative feedback loop.
Unfortunately what makes implementing this somewhat less than idea is that we still don’t really have cancellable requests in many frameworks and you’re never entirely sure what happens when the timeout triggers. If the underlying operation is abandoned, but has to complete anyway because it can’t be cancelled, you may not be much better off. The modern async-enhanced programming world is great for avoiding tying up threads in the happy path but once you start considering the failure modes it’s much harder to reason about and, more importantly, control what’s going to happen. Despite the fact that under the covers the world of I/O has practically always been asynchronous the higher layers still assume a synchronous model with syntactic sugar only helping to reinforce that perspective.
So far I don’t have nearly enough production-level data points to know if it’s an idea that is truly worth the effort to implement or not. Being able to reject work outright because you’ve already missed the SLA isn’t too onerous but does mean you need to tap into the processing pipeline early before the request is queued in the background to know when the internal clock has started ticking. What’s harder to determine is whether you really get any benefit out of the additional complexity needed to track your request’s progress and if aborting upstream requests creates a more or equally unstable service due to the way the timeouts leave their underlying requests dangling.
I still think it’s an approach worth pursuing but I wouldn’t be surprised to find The Morning Paper covering something from decades ago that shows it’s just a fools errand :o).
[1] See “Support-Friendly Tooling” for some other examples about how this can play out if reliability out-of-the-box is “assumed”.
[2] In one instance that would mean abandoning the request and potentially taking on some small financial risk on behalf of the customer.
[3] Naturally for parallel / scatter-gather I/O it’s the time of the longest concurrent request.
Publishing information on project progress: will it impact delivery?
Derek Jones from The Shape of Code
Numbers for delivery date and cost estimates, for a software project, depend on who you ask (the same is probably true for other kinds of projects). The people actually doing the work are likely to have the most accurate information, but their estimates can still be wildly optimistic. The managers of the people doing the work have to plan (i.e., make worst/best case estimates) and deal with people outside the team (i.e., sell the project to those paying for it); planning requires knowledge of where things are and where they need to be, while selling requires being flexible with numbers.
A few weeks ago I was at a hackathon organized by the people behind the Project Data and Analytics meetup. The organizers (Martin Paver & co.) had obtained some very interesting project related data sets. I worked on the Australian ICT dashboard data.
The Australian ICT dashboard data was courtesy of the Queensland state government, which has a publicly available dashboard listing digital project expenditure; the Victorian state government also has a dashboard listing ICT expenditure. James Smith has been collecting this data on a monthly basis.
What information might meaningfully be extracted from monthly estimates of project delivery dates and costs?
If you were running one of these projects, and had to provide monthly figures, what strategy would you use to select the numbers? Obviously keep quiet about internal changes for as long as possible (today’s reduction can be used to offset a later increase, or vice versa). If the client requests changes which impact date/cost, then obviously update the numbers immediately; the answer to the question about why the numbers changed is that, “we are responding to client requests” (i.e., we would otherwise still be on track to meet the original end-points).
What is the intended purpose of publishing this information? Is it simply a case of the public getting fed up with overruns, with publishing monthly numbers is seen as a solution?
What impact could monthly publication have? Will clients think twice before requesting an enhancement, fearing public push back? Will companies doing the work make more reliable estimates, or work harder?
Project delivery dates/costs change because new functionality/work-to-do is discovered, because the appropriate staff could not be hired and other assorted unknown knowns and unknowns.
Who is looking at this data (apart from half a dozen people at a hackathon on the other side of the world)?
Data on specific projects can only be interpreted in the context of that project. There is some interesting research to be done on the impact of public availability on client and vendor reporting behavior.
Will publication have an impact on performance? One way to get some idea is to run an A/B experiment. Some projects have their data made public, others don’t. Wait a few years, and compare project performance for the two publication regimes.
Statistical techniques not needed to analyze software engineering data
Derek Jones from The Shape of Code
One of the methods I used to try to work out what statistical techniques were likely to be useful to software developers, was to try to apply techniques that were useful in other areas. Of course, applying techniques requires the appropriate data to apply them to.
Extreme value statistics are used to spot patterns in rare events, e.g., frequency of rivers over spilling their banks and causing extensive flooding. I have tried and failed to find any data where Extreme value theory might be applicable. There probably is some such data, somewhere.
The fact that I have spent a lot of time looking for data and failed to find particular kinds of data, suggests that occurrences are rare. If data needing a particular kind of analysis technique is rare, there is no point including a discussion of the technique in a book aimed at providing general coverage of material.
I have spent some time looking for data drawn from a zero-inflated Poisson distribution. Readers are unlikely to have ever heard of this and might well ask why I would be interested in such an obscure distribution. Well, zero-truncated Poisson distributions crop up regularly (the Poisson distribution applies to count data that starts at zero, when count data starts at one the zeroes are said to be truncated and the Poisson distribution has to be offset to adjust for this). There is a certain symmetry to zero-truncated/inflated (although the mathematics involved is completely different), plus there is probably a sunk cost effect (i.e., I have spent time learning about them, I am going to find the data).
I spotted a plot in a paper investigating record data structure usage in Racket, that looked like it might be well fitted by a zero-inflated Poisson distribution. Tobias Pape kindly sent me the data (number of record data structures having a given size), which I then failed miserably to fit to any kind of Poisson related distribution; see plot below; data points along red line through the plus symbols (code+data):
Number of Racket record data structures having a given size.
I can only imagine what the authors thought of my reason for wanting the data (I made data requests to a few other researchers for similar reasons; and again I failed to fit the desired distribution).
I had expected to make more use of time series analysis; but, it has just not been that applicable.
Machine learning is useful for publishing papers, but understanding what is going on is the subject of my book, not building black boxes to make predictions.
It is possible that researchers are not publishing work relating to data that requires statistical techniques I have not used, because they don’t know how to analyze the data or the data is too hard to collect. Inability to use the correct techniques to analyze data is rarely a reason for not publishing a paper. Data being too hard to collect is very believable, as-is the data rarely occurring in software engineering related work.
There are statistical tests I have intentionally ignored, the Mann–Whitney U test (aka, the Wilcoxon rank-sum test) and the t-test probably being the most well-known. These tests became obsolete once computers became generally available. If you are ever stuck on a desert island without a computer, these are the statistical tests you will have to use.
Visual Lint has been released
Products, the Universe and Everything from Products, the Universe and Everything
This is a recommended maintenance update for Visual Lint 6.0 and 6.5. The following changes are included:
• Fixed an MSBuild parsing bug which was preventing Visual Studio system include folders from being read in some circumstances.
• Fixed a bug which could prevent the VisualLintGui code editor determining the location of PC-lint Plus indirect files in order to open them from a context menu.
• Updated the values of _MSC_VER and _MSC_FULL_VER in the PC-lint Plus indirect file co-rb-vs2017.lnt for compatibility with Visual Studio 2017 v15.8.3. This change is needed to fix a fatal error in yvals_core.h if _MSC_VER is less than 1915.
• Added a PC-lint Plus compatible version of lib-stl.lnt to the installer as it is not currently supplied with PC-lint Plus.
• Added additional indirect files needed for analysing Visual Studio 2012, 2013 and 2015 codebases with PC-lint Plus 1.2 to the installer.
• If a project intermediate files folder does not currently exist, it will not be referenced with a -i (include folder) directive on generated PC-lint or PC-lint Plus command lines. This avoids extraneous 686 warnings "(Warning -- option '-i' is suspicious: absolute path is not accessible)".
Note that if build artifacts (e.g. .tlh or .tli files) are required for analysis purposes, analysing without the intermediate folder will most likely result in analysis errors. In this case, performing a build and re-analysing the affected files/projects should fix it.
Download Visual Lint
More Continuous #NoProjects questions
Allan Kelly from Allan Kelly Associates
Three short questions and answers to finish off my series of left over questions about #NoProjects, #NoEstimates and the Continuous model.
Q4: How do we prioritize and organize requests on a product that are from opposite business owners? – for example legal (who wants to reduce the risk and annoy more customers) and sales (who want to increase the features and simplify life) can be arbitrated in a backlog?
You can think of this as “which is worth more apples or milk?” It is difficult to compare two things which are actually different. Yes they are both work requests – or fruit – and each can make a case but at the end of the day you can’t make everything number 1 priority.
In real life we solve this problem with money.
Walk into your local supermarket. Apples, oranges and milk are both price in the same currency, sterling for me, Francs for the person who asked this question, maybe Euro’s or Dollars for you. So if we can assign value points to each request we are half way to solving the problem.
Now sales will argue that without their request there is no real money so whatever they ask for is worth more. And legal will argue that nobody wants to go to jail so their request must be worth more. You can set your analyst to work to calculate a value but a) this will take time and b) even when they have an answer people will dispute it.
Therefore, I would estimate a value – planning poker style. With an estimates value there is no pretence of “right” or “correct”. Each party gives a position and a discussion follows. With luck the different sides converge, if they don’t then I average. Once all requests are valued you have a first cut at prioritisation.
Q5: How to evaluate the number of people you need to maintain software?
I don’t. This is a strategic decision.
Sure someone somewhere needs to decide how much capacity – often expressed as people – will be allocated to a particular activity but rather than base this on need I see this as another priority decision. If a piece of software is important to an organization then it deserves more maintenance, and if it is not important it deserves less.
You could look at the size of the backlog, or the rate of new requests and contrast this with the rate at which work gets done. This would allow you to come up with an estimate of how many people are needed to support a product. But where is the consideration of value?
Instead you say something like: “This product is a key part of our business but the days of big changes are gone. Therefore one person will be assigned to look after the software.”
If in three months more people in the business are demanding more changes to the software and you can see opportunities to extract more value – however you define value – then that decision might be revised. Maybe a second person is assigned.
Or maybe you decide that maintaining this product isn’t delivering more value so why bother? Reduce work to only that needed to keep it going.
Q6: How do you evaluate the fact that your application becomes twice as fast (or slower) when you add a new feature in a short period of time?
Answering this question requires that the team has a clearly defined idea of what value is. Does the organization value execution speed? Does the organization value up-time? Does the organization value capacity?
Hopefully some of this will have come out of the value estimation exercise in Q4, if not the analysis is just going to take a bit longer. The thing to remember is: what does the change do for the business/customers/clients? Being faster is no use in itself, but doing X faster can be valuable.
The real problem here is time. Some changes lead to improvements which can be instantly measured. But there are plenty of changes where the improvements take time to show benefit. Here you might need to rely on qualitative feedback in the short run (“Sam says it is easier to use because it is faster”). Still I would keep trying to evaluate what happens and see if you can make some quantitive assessment later.
Notice that Q4 and Q6 are closely related. If you have a clear understanding of why you are doing something (Q4) then it becomes easier to tell if you have delivered the expected value (Q6). And in trying to understand what value you have delivered then you refine your thinking about the value you might deliver with future work.
Another feedback cycle.
These questions concludes the series of question carried over from the #NoEstimates/#NoProjects workshop in Zurich – see also How should we organize our teams?Dealing with unplanned but urgent workHow do we organise with a parallel team? – if you would like me to answer your question in this blog then please just e-mail me.
The #NoProjects books Project Myopia and Continuous Digital discuss these and similar issues in depth and are both available to buy in electronic or physical form from Amazon.
The post More Continuous #NoProjects questions appeared first on Allan Kelly Associates.
LintProject Pro End of Life Notice
LintProject Pro is a command line only product which can perform a basic per-file analysis of a C/C++ codebase using PC-lint or CppCheck. In many ways it was the proof of concept for Visual Lint, and although it has served us well, it's getting a bit long in the tooth now. For example, unlike Visual Lint Build Server Edition (which inherited its capabilities), LintProject Pro doesn't support PC-lint Plus and only makes use of a single CPU core when running analysis. The interfaces to the two products are however very similar as the command line interface of Visual Lint Build Server is based on that of LintProject Pro. In fact, Visual Lint Build Server Edition can do everything LintProject Pro can - along with much, much more. As such we think it is now finally time to put LintProject Pro out to pasture, and to make that easier we are offering a migration path from LintProject Pro to Visual Lint Build Server Edition. This involves trading in each existing LintProject Pro licence puchased before 23rd October 2018 for a 25% discount on a corresponding Visual Lint Build Server Edition licence. As such LintProject Pro will be removed from our online store very soon. To take advantage of the upgrade, just write to us quoting which LintProject Pro licence (or licences) you wish to trade-in. We've tried to keep this process clear and simple. The value of the discount offered exceeds that of the LintProject Pro licence, so this is a lower cost route to obtain an equivalent PC-lint Plus compatible product than (for example) refunding any existing LintProject Pro licences and purchasing Visual Lint Build Server Edition licences at full price. If you have any questions, just ask.
The Art of Prolog – reading another classic programming text
Timo Geusch from The Lone C++ Coder's Blog
I did have to learn some Prolog when I was studying CS and back then it was one of those “why do we have to learn this when everybody is programming in C or Turbo Pascal” (yes, I’m old). For some strange reason things clicked for me quicker with Prolog than Lisp, which I now […]
The post The Art of Prolog – reading another classic programming text appeared first on The Lone C++ Coder's Blog.
|
global_01_local_1_shard_00001926_processed.jsonl/48782
|
No. of Recommendations: 0
Hi Ray,
A 50/50 asset allocation has 50% in the S&P500 and 50% in US Treasuries. That's your "reserves" right there, that 50% in treasuries
OK, what's the worst drawdown on that blend from '73 to present?
IUL account: $586,000
Why do you ignore the actual run numbers?
IUL = $769,585
If we go crazy-wild low-risk: 25/75. 25% S&P500 and 75% in 10-yr T-bills
Can't just ignore historical drawdowns in a comparison where one option has none by guarantee.
You keep saying that but I haven't seen any real calculations. For stocks and bonds, I can find lots of calculations of various scenarios on the web, in addition to what Ray has provided.
I keep pointing out simple ways to account for the risk of forced liquidation during drawdowns, and Ray keeps avoiding them, and ignoring the real IUL projections provided.
I'm busy in a real daytime gig, but I don't ignore & obfuscate the facts.
Ray's retired with discretion... yet the dodging appears intentional. Might lead to wonder why...
Can you point me to similar calculations for IUL's?
I provided an illustration designed for growth performance over 40 years, using an assumed average rate that hit in 95% of all rolling 25 year periods.
Ideally, I would like to see Monte Carlo calculations showing various start and end dates.
That might be somewhat interesting, I don't have those. Monte Carlo calculations wouldn't tell much unless we could also plug in actuarial data form the overall casualty & insurance industry to try to approximate the likelihoods and degrees of catastrophic events, and their correlation with market drawdowns.
I definitely don't have that... but I know its significant. Significant enough when considering that *all* capital prior to reaching retirement counts *AS* retirement investing.
Dave Donhoff
Leverage Planner
Print the post
The Retirement Investing Board
When Life Gives You Lemons
Contact Us
Contact Customer Service and other Fool departments here.
Work for Fools?
|
global_01_local_1_shard_00001926_processed.jsonl/48803
|
The osce’s Mediation in the Transdniestrian Settlement Process
Challenges of Third Party Engagement in a Post-Soviet Environment
in Security and Human Rights
Restricted Access
Get Access to Full Text
Rent on DeepDyve
Have an Access Token?
Enter your access token to activate and access content online.
Have Institutional Access?
Access content through your institution. Any other coaching guidance?
This article focuses on challenges to peace mediation in the post-Soviet context by looking at the the case study of the Transdniestrian (td) settlement process. It offers a brief overview of the osce led td process and aims to explain why the conflict has failed to “respond” to the osce (Organization for Security and Co-operation in Europe) led mediation efforts. Highlighting key process design shortcomings, the article offers a series of recommendations to practitioners to improve mediation processes in the osce context.
|
global_01_local_1_shard_00001926_processed.jsonl/48813
|
How to use "mendacious" in sentences with meaning in English and Hindi
by BuildMyVocab
Example sentences for "mendacious" in popular movie and book plots
• Although the two friends nearly come to blows over Alva, they eventually realize that she has been false to them both and that their friendship far outweighs their feelings for a mendacious woman. - Friends and Lovers (1931 film)
• She starts a mendacious love affair with Raja gaining the latter's affection. - Dulhe Raja
• Meanwhile, some mendacious and greedy civilian contractors for the Fleet have agreed to carry out a job for the barbarian space-warriors of the Bloodhorde: they would take a Fleet contract to rekey the command sequences of various missiles, and when they were aboard the specified massive Deep Space Repair vessel, covertly disable its self-destruct mechanism. - Once a Hero (novel)
• Determined to beat Carney to the punch, Dellasandro and Danny join forces with Mitch to form their own team, recruiting the inept Sean Knight, mendacious getaway driver Dave Phibbs and cynical intelligence ace Rupert Wingate, who soon discovers that Skase is devising a deadly scheme to resurrect his business empire across Europe. - Let's Get Skase
• Makiko is called as witness, and while reading a mendacious diary entry for November 29, she manages to cleverly insinuate that Isao was not only planning to abandon the conspiracy, but that he was merely a schoolboy in over his head, boasting and play-acting all along. - Runaway Horses
• At other times he introduces the Professor to historical personages the Professor holds in high esteem but who are now languishing in Hell, such as Leonardo da Vinci, William Shakespeare and Jane Austen, showing him how petty and mendacious they really are. - Old Harry's Game
Meaning of "mendacious" in English
• given to lying
• intentionally untrue
Meaning of "mendacious" in Hindi
• झूठा
• झूठ
• मिथ्या
Synonyms of "mendacious"
• lying
|
global_01_local_1_shard_00001926_processed.jsonl/48820
|
There are a lot of different animals in the world known for their powerful bites, and some of those are very, very tiny and transmit a load of poison with each chomp. However, scientists have done their research when it comes to powerful bites, and they managed to share their research with the world without being bitten themselves. The one animal not featured, the Great White Shark, was not picked due to the bite power being completely theoretical. Science could not explain it. Here are ten bites that will absolutely devastate you.
Lion – 600 psi
It is no surprise that the “king” of animals is mentioned on the list. Lions are actually quite social, and cooperate together when they are on the hunt. However, their bite is the weakest of the big cats, but still powerful enough to rip you to shreds.
Tiger – 1050 psi
The tiger is known for being one of the biggest species of big cat, and is a powerful solitary hunter. They can easily reach up to 300 pounds when fully grown, and hunt their prey in the night. The bite is twice as powerful as that of a lion.
Topics: animals , nature
Page 1 of 5
• debastate
• devastate
• devastati
• devestate
• divastate
|
global_01_local_1_shard_00001926_processed.jsonl/48834
|
From CAC Wiki
Jump to: navigation, search
Acknowledging our Centre
In publications of work that involves our resources and support, please use the following line in the Acknowledgements section :
Computations were performed on resources and with support provided by the Centre for Advanced Computing (CAC) at Queen's University in Kingston, Ontario. The CAC is funded by: the Canada Foundation for Innovation, the Government of Ontario, and Queen's University.
|
global_01_local_1_shard_00001926_processed.jsonl/48883
|
A number of updates were installed on my machine yesterday. Ubuntu asked me to reboot, but I was busy, so I never ended up doing that yesterday. This morning, I booted my machine and was very surprised to find out that my headphone jacks no longer worked. Needless to say, I was upset.
As I discussed in a previous post, I’m running Ubuntu 8.10 (Intrepid Ibex) on a Dell Studio 17 laptop and getting the headphones to work required some workarounds. Basically, you had to set up the headphones to be line outs which caused one of the jacks to function but failed to mute the speakers when headphones were plugged in. This resulted in needing to manually mute and unmute the Front audio channel when you used or removed headphones. It’s because of this workaround that I thought the jack no longer worked.
In fact, it wasn’t that the jack had failed, it’s that I had the Front channel muted. I figured that I’d just unmute the speakers to ensure that the speakers still worked, and I was pleasantly surprised to hear sound blaring out of my headphones. Not only do the headphones now work while the Front channel is unmuted, they properly disable the speakers when headphones or speakers are plugged into the jack. Needless to say, this is a very nice improvement as compared to before.
At this point I realized that the other jack might function as well. In order to test this, I left my headphones plugged in and plugged in a set of speakers to the other jack (no, I don’t commonly do this, it’s just for testing purposes). I turned the speakers on, and they too had sound, glorious sound! I put the headphones in my ears, and they too were going. I played around with plugging and unplugging cables, and everything worked exactly as you’d expect. If anything is plugged into either headphone jack, the speakers turn off and sound comes through the jack(s). Unplug all devices from the jacks, and the speakers turn on.
This seems like a simple thing, and in reality it is. However, having something work the way it should is a thousand times better than having it not work properly. This means that any Dell Studio laptop users (and most likely users of other systems with similar hardware) won’t have to mess around with their settings until the headphone jacks operate properly.
Looking at my Synaptic Package Manager history, I see that new versions of libpulse and pulseaudio files were installed. In addition to these files, an updated kernel from January 14th ( was installed. I’m still new to how all this stuff works, so I’m not sure if the new kernel or the new Pulse Audio files are to be credited with the fix. That being the case, I’ll thank both the kernel dev team and the Pulse Audio dev team for your hard work. Even if one of those teams isn’t to credit for this, I can only run Ubuntu on my laptop well because of their (and thousands of others) efforts.
Thank you to the dev teams that contribute countless hours of labor so that I can keep busy on my work and my projects rather than messing around on my system all day. This next song is for you.
Did I help you? Send me a tip.
|
global_01_local_1_shard_00001926_processed.jsonl/48884
|
[Letter 18]:
Greetings Soldier,
Regarding your last correspondence; I assure you that you’re doing fine. No need to be concerned about the empty allegation that you are engaging in a double standard or being ‘unfair’ in your requests for the unbelievers to provide their worldview’s objective, consistent basis for the existence of preconditions of intelligibility (which must be appealed to and utilized in order to even begin to hold a rational discussion). Besides, as should be crystal clear by now, the unbeliever has no way of justifying such an allegation to begin with, since there can exist no objective standard of logical ‘fairness’ in a worldview without God. Not only that, it should also be pointed out that you have already provided the justification for how abstract, universal, invariants are justified in the Christian worldview, from the get go (as they are a reflection of the abstract, universal, invariant nature of the God of the Bible). Perhaps it would be helpful to remind those making the allegations of how discussions work: you provide your logically defensible argument, they provide theirs, and THEN they are compared and contrasted via internal critique to see whose is true.
Of course, because the unbeliever has no rationally defensible argument or justification to support their belief in abstract, universal, invariants (logic, truth, knowledge, etc.) there can really be no discussion at all, since they must borrow these concepts from the Christian worldview in order to even begin to levy any argument against the Christian worldview. Needless to say, in doing so, they are assuming the truth of the very thing they are trying to refute and, subsequently, destroying their own position. This only further substantiates the undeniable reality that Christianity is true by the impossibility of the contrary (since the contrary position cannot be rationally defended and always ends in some form of absurdity). Don’t ever be shy about exposing this for the unbeliever’s own benefit. Here to serve,
Your Heavenly ‘Angent’
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/48886
|
Chuck Milligan Ceiling
Traditional Beadboard Ceiling Pictures
Image: Traditional Beadboard Ceiling Pictures
Traditional beadboard ceiling pictures,
Beadboard kitchen traditional beadboard paneling wall height that the precise color the traditional kitchen ceiling beadboard images traditional black front porch ceilings are viewing image of narrow tongue and beadboard paneling beadboard ceilings remodelista creative ways installing ceiling by local and is an enduring classic one easy and fun all the precise color the joists of the shorter end of time a classic one easy and groove boards that helps beaded inset traditional height that might benefit from a highgrade finish like beadboard walls and attention to one of doing a natural material. With also beadboard however if for.
Tags: traditional beadboard ceiling pictures
Image of: Beadboard Ceiling On Porch Ideas
Image of: Coastal Beadboard Ceiling Living Room
Image of: Modern Beadboard Ceiling With Beams
Image of: Beadboard Ceiling Over Popcorn DIY
Image of: Mid Century Beadboard Ceiling Kitchen Photos
Image of: Decorative Beadboard Ceiling Bedroom
Image of: Luxurious Beadboard Ceiling Bathroom
Image of: Traditional Beadboard Ceiling Pictures
Image of: White Beadboard Ceiling Photos Design
Image of: Vintage Beadboard Ceiling In Basement
Image of: White Modern Beadboard Ceiling Lowes
Image of: Beadboard Ceiling Panels With Removable Sections
|
global_01_local_1_shard_00001926_processed.jsonl/48896
|
Give us a like and we'll keep you in the loop.
We use cookies
Clean & Lean recruits bloggers
Hi there! We are Clean & Lean and we are a new blogging platform for healthy food, recipes, nutrition, workouts, wellness and mind. We are seeking motivated bloggers, or even aspiring bloggers, who want to write with us and start earning revenue from their first blogpost!
We believe that the more like-minded writers connect, the more collective wisdom we have, the better the content on our blog will be. So start writing for Clean & Lean, join our team, and turn your hobby into profit!
Hit the 'write' button on your right if you're interested and start writing today!
|
global_01_local_1_shard_00001926_processed.jsonl/48900
|
Change in weather is disrupting Gareth’s sleeping pattern, but can it also have given someone in the team hand-foot-and-mouth disease? Do you watch bad TV shows that you are a little ashamed of? The team brings this up and provides more great ideas for reality shows. Ben’s Sport discusses the latest Bok team, and Anthea’s Money Shot talks all things money.
Feature copy
#GCS 1.10.15 Pt1
|
global_01_local_1_shard_00001926_processed.jsonl/48916
|
Need an affordable meal plan? Want to get a taste of cooperative living without committing to a full membership? Then look into our associate membership program. As an associate, you get all the privileges of regular membership (other than a room), including access to your house’s common areas, full voting privileges at your house’s weekly meetings, and, of course, a weekly meal plan! In exchange, you pay a monthly fee and do 2 hours of weekly labor at your house, giving you a chance to meet and interact with house members. If you later decide to become a full member, you can sign a contract during priority signing and guarantee yourself a spot at the house(s) you were accepted at.
There are two types of meal plans offered to associate members – 5 meals per week for $70/month, or 17 meals per week for $140/month.
If you’re interested, you can apply (free!) here. Associate memberships go by semester, and you can start anytime!
|
global_01_local_1_shard_00001926_processed.jsonl/48934
|
Tom Neal Timber Sale Arr 05-14-98
Author(s): Thomas C. Jackson
Year: 1976
Cite this Record
Tom Neal Timber Sale Arr 05-14-98. Thomas C. Jackson. 1976 ( tDAR id: 196476)
This Resource is Part of the Following Collections
Spatial Coverage
min long: -123.069; min lat: 40.285 ; max long: -121.32; max lat: 41.185 ;
Individual & Institutional Roles
Sponsor(s): Forest Service; Shasta-Trinity National Forest
Prepared By(s): Shasta-Trinity National Forest
Record Identifiers
NADB document id number(s): 1042975
NADB citation id number(s): 000000014397
General Note: Sent from: Shasta-Trinity National Forest
General Note: Submitted to: Shasta-Trinity National Forest
|
global_01_local_1_shard_00001926_processed.jsonl/48946
|
Your Idea Needs Space and not Headaches. We aim to help both the individual artist and the art based business to thrive.
Included in your membership is all the great stuff you need in an office:
Deskpod in our living room
Chairs (comfort is best)!
Coffee (free) + Tea (free) + Soda (free) + Snacks (For Purchase)
One Free Meeting Space per month (for those that need a change in scenery).
Conference Rooms (Discounted from our daily drop in rate).
Access to member events at The Gallery
Wifi and Gig Internet (where available)
30 day Physical Address (with your membership, you get an office address, even without a permanent office).
|
global_01_local_1_shard_00001926_processed.jsonl/48950
|
crooty's fantasy book database
web rings
images & text version
full version
not fantasy
book colours:
I've read
I'm reading
I own
I'm going to buy
Maybe I'll buy
1 °
Don't like it
2 °
Not for me
3 °
I like it
4 °
It's great
5 °
I love it!
in association with and
crooty's band page:
Terry Pratchett official site
Series: Discworld
The Colour of Magic US: The Color of Magic UK US
The Light Fantastic UK US
Equal Rites UK US
Mort UK US
Sourcery UK US
Wyrd Sisters UK US
Pyramids UK US
Guards! Guards! UK US
Eric UK US
Moving Pictures UK US
Reaper Man UK US
Witches Abroad UK US
Small Gods UK US
Lords and Ladies UK US
Men at Arms UK US
Soul Music UK US
Interesting Times UK US
Maskerade UK US
Feet of Clay UK US
Hogfather UK US
Jingo UK US
The Last Continent UK US
Carpe Jugulum UK US
The Fifth Elephant UK US
The Truth UK US
Thief of Time UK US
Night Watch UK US
Monstrous Regiment UK US
Going Postal UK US
Thud! UK US
Making Money UK US
Unseen Academicals UK US
Snuff UK US
Raising Steam UK US
Scouting for Trolls soon...
Incubust very short story
Troll Bridge short story UK US
Theatre of Cruelty short story UK US
Turntables of the Night short story UK US
The Sea and Little Fishes short story UK US
Death and What Comes Next short story
Once More* with Footnotes short stories UK US
A Collegiate Casting-Out of Devilish Devices short story
Map: The Discworld Mapp UK US
Map: The Streets of Ankh-Morpork UK US
Map: A Tourist Guite to Lancre UK US
Map: Death's Domain UK US
Play: Mort with Stephen Briggs UK US
Play: Wyrd Sisters with Stephen Briggs UK
Play: Guards! Guards! with Stephen Briggs UK
Play: Men at Arms with Stephen Briggs UK
Play: Maskerade with Stephen Briggs UK
Play: Carpe Jugulum with Stephen Briggs UK
The Last Hero UK US
The Discworld Portfolio UK US
The Josh Kirby Discworld Portfolio UK US
The Art of the Discworld UK US
The Unseen University Cut out Book with Alan Batley and Bernard Pearson UK US
The Science of the Discworld with Jack Cohen and Ian Stewart UK US
The Science of the Discworld II: the Globe with Jack Cohen and Ian Stewart UK US
The Science of the Discworld III: Darwin's Watch with Jack Cohen and Ian Stewart UK US
Unseen University Challenge UK
The Wyrdest Link with David Langford UK
The Discworld Companion UK US
The New Discworld Companion with Stephen Briggs UK
Nanny Ogg's Cookbook UK US
The Discworld Almanak UK
The Folklore of Discworld with Jacqueline Simpson UK US
Series: Discworld for Children
The Amazing Maurice and His Educated Rodents UK US
Where's my Cow?
Series: Tiffany Aching
The Wee Free Men UK US
A Hat Full of Sky UK US
Wintersmith UK US
I Shall Wear Midnight UK US
Series: The Bromeliad
Truckers UK US
Diggers UK US
Wings UK US
Series: Johnny Maxwell
*Only You Can Save Mankind UK US
*Johnny and the Dead UK US
*Johnny and the Bomb UK US
The Carpet People UK US
*The Dark Side of the Sun UK US
*Strata UK US
*The Unadulterated Cat UK US
*Good Omens with Neil Gaiman UK US
Nation UK US
Dodger 13th September 2012 UK US
The Hades Business short story
Night Dweller short story
Twenty Pence With Envelope and Seasonal Greetings short story
Final Reward short story
#ifdefDEBUG + "world/enough" + "time" short story
Hollywood Chickens short story UK US
History in the Faking short story
The Secret Book of the Dead short story
Once and Future short story
The Megabyte Drive to Believe in Santa Claus short story
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.