id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_1_shard_00001926_processed.jsonl/50233
Sling Kong requires the following phone permissions: Storage - This will allow you to share images from the game. Approximate Location - Allows the game to show advertisements that are more relevant to you. From version Sling Kong 3.13.1: Brrrrrr, it's getting cold in here! A brand new set of Ice Age Kongs have arrived, collect them all before they become extinct! - Some minor bug fixes and improvements. All versions December 10, 2018 December 4, 2018 November 5, 2018 October 5, 2018
global_01_local_1_shard_00001926_processed.jsonl/50259
68 393 Assignments Done Successfully Done In December 2018 Answer to Question #45223 in Other History for Whitney Question #45223 Guns, Germs and Steel Prologue 13-22 (World History) Why was Jared Diamond studying in New Zealand? How do some people justify that dominace over Aboriginal Australians? In the average American home, the TV set is on for 7 hours per day. How do New Guineans compare to this? Does this information show New Guineans to be more or less intelligent than Americans? Explain. Expert's answer Not answered Need a fast expert's response? Submit order and get a quick answer at the best price for any assignment or question with DETAILED EXPLANATIONS! No comments. Be first! Leave a comment Ask Your question Privacy policy Terms and Conditions
global_01_local_1_shard_00001926_processed.jsonl/50285
Track your baby's development, week by week Join now Can I be pregnant and still have light bleeding and spotting? I took the pill for a month Jan to feb. and had missed a couple pills. I had spotting during that time. I also had intercourse during that time and after. I had stopped the pill in feb. I had light bleeding but mostly when I would have intercousre. I had been preg. last july and lost the baby in Oct. because the baby did not have a heartbeat. I have some of the same sympyoms has before and the bleeding and spotting has stopped. could I be pregnant? Should I take a test or is it to early? Is it easier to get pregnant after taking the pill? last time I was pregnant I had just stopped taking the pill. Asked 2/27/08 Mom Answers (0) Get the BabyCenter pregnancy & baby app
global_01_local_1_shard_00001926_processed.jsonl/50286
Track your baby's development, week by week Join now implantion bleeding? I woke up this morning with light bleeding, I am not supposed to have my normal period for 4 or 5 more days. Could this be implantion bleeding?? a BabyCenter member Asked 12/22/11 Mom Answers (1) For many women, light spotting is simply indicative of an impending menstrual cycle ready to make its appearance, or due to hormonal changes during a woman's cycle. If you experience frequent spotting with no known cause, it's wise to seek out your doctor or midwife to see if you may have a hormonal imbalance. However, if spotting is indicative of an early pregnancy, it is typically called implantation bleeding. This happens when a fertilized egg burrows into the uterine lining, causes the lining to slough off a bit of blood. The blood takes a while to make its way from the uterus to the vagina, so it's 'older' by the time it reaches your panties or toilet paper. This explains why the blood is often brown discharge, pink, or rust in color. Anyway, if you are TTC you should consider reading ‘The Getting Pregnant Plan’ by Michelle Adams from They consistently helped me throughout my pregnancy. a BabyCenter member 2 found this helpful Recent questions in Could I Be Pregnant? Asked 27 minutes ago Asked 2 hours ago Get the BabyCenter pregnancy & baby app
global_01_local_1_shard_00001926_processed.jsonl/50290
Tokyo Secret in Hong Kong The title might confuse you, whaaat…Tokyo in Hong Kong??? But the word Tokyo and anything Japanese seems to be quite a trend in the names of the establishments in Hong Kong last month. Take for example this popular liquid nitrogen ice cream shop in Tsim Sha Tsui, Tokyo Secret. tokyo secret hong kong [Read more…] Comodo SSL
global_01_local_1_shard_00001926_processed.jsonl/50303
Nutrition and your child’s teethgood-food Children need a healthy, balanced diet to help them grow and maintain healthy teeth, but the food and drink choices can also affect the risk of tooth decay and fillings. Too much sugar (for example, from cakes, biscuits, sweets, milk, and other sugary foods and drinks) can cause tooth decay. The length of time these foods remain on the teeth is the main factor that leads to tooth decay. The best thing you can do as a parent is to teach your child to make healthy food choices. Here are some tooth-friendly foods to serve your children, along with some other tips: Fruits and vegetables: Offer fruits and vegetables as a snack. Fruits and vegetables that contain a high volume of water, such as pears, melons, celery and cucumbers are best. Limit raisin consumption as they contain concentrated sugars. Cheese: Serve cheese with lunch or as a snack, especially cheddar, Gouda, Swiss and other aged cheeses, which help to trigger the flow of saliva. Saliva helps to wash food particles away from teeth. Avoid sticky, chewy foods: Raisins, dried figs, cereal bars, chewy biscuits, jelly beans, caramel, honey, molasses and syrup stick to teeth, making it difficult for saliva to wash the sugar away. Have your child brush immediately after having these types of snacks. Serve sugary treats with meals, not as snacks: If you plan to give your child any sweets, give them as a pudding immediately following the meal. There is usually an increased amount of saliva in the mouth around mealtime, making it easier to wash food away from teeth. The mealtime drink also helps to wash away food particles on teeth, so choose one that is not sugary. Get your children in the habit of eating as few snacks as possible: The frequency of snacking is far more important than the quantity consumed. Time between meals allows saliva to wash away food particles that bacteria would otherwise feast on. Frequent snacking, without brushing immediately afterwards, provides constant fuel for the bacteria, which leads to plaque development and tooth decay. Try to limit snacks as much as possible and to no more than one or two a day. Brush teeth immediately after eating the snack if possible. Buy foods that are sugar-free or unsweetened. If your child likes a drink beside their bed at night, ensure it is water: Saliva reduces while asleep, meaning that there is an increased chance of decay happening if anything sugary is drunk just before going to sleep. Offer your child plain water instead of juice or a fizzy drink: Fruit juices and fizzy drinks contain sugar and all fruit juices or fizzy drinks that say they are sugar free, are very acidic, which softens the outer surface of teeth causing them to wear away and be more susceptible to decay when sugary food is eaten. Water does not harm teeth and aids in washing away any food particles that may be clinging to the teeth. Include good sources of calcium in your child’s diet to build strong teeth: Good sources include milk, spinach and yoghurt.
global_01_local_1_shard_00001926_processed.jsonl/50326
BC bus for Northern British Columbia BC Bus North BC Bus North is The province of BC’s new service. it will include two round-trips per week between Prince Rupert and Prince George; Prince … Alaska Highway House Alaska Highway House Browse the historic exhibits and interactive displays dedicated to telling the Alaska Highway story. Features include fascinating WWII propaganda, vintage photos, video footage, war artifacts, a completely restored, Willys jeep and the PBS documentary: Building the Alaska Highway. There is also a model replica of the Kiskatinaw Bridge, the longest curved wooden bridge in North America. 10201-10th Street by the Mile 0 Post. Open year round.
global_01_local_1_shard_00001926_processed.jsonl/50329
Guardian, The Broadband too slow in more than a quarter of UK homes More than a quarter of UK homes do not have fast enough broadband to cope with a typical family’s internet needs. Just over 26% of the UK’s estimated 28 million households are getting by on speeds of less than 10Mbps, the level the media regulator UK Parliament seizes cache of Facebook internal papers UK Parliament has used its legal powers to seize internal Facebook documents in an extraordinary attempt to hold the US social media giant to account after chief executive Mark Zuckerberg repeatedly refused to answer MPs’ questions.
global_01_local_1_shard_00001926_processed.jsonl/50347
Bin There Dump That USA What Happens To My Stuff After It’s Put Into A Bin? For all our technology and knowledge, life is filled with mysteries. Are we alone in the universe? Can pigs pull a hamstring? Is there another word for thesaurus? And perhaps the greatest mystery of all: What happens to the stuff you throw into your rental dumpster bin after it leaves your property? For many customers, the old adage “out of sight, out of mind” applies when it comes to the stuff they deposit into a Bin There Done That dumpster bin. Once they rid their homes of material they no longer want or need, they simply don’t care where it goes. But some like to know where the bits and pieces of their lives end up. However, like many things in life, the answer is a bit more complicated than it might seem on the surface. Once bins are picked up, they immediate taken to a landfill or a transfer station. For most bins, that’s pretty much the end of the story. But there are limitations and exceptions (for example, while most materials are fine to place in a dumpster bin, Bin There Dump That doesn’t accept hazardous materials). So, what happens when your bin makes it to the dump? How Landfills Work What Happens To My Stuff After It’s Put Into A Bin?Non-hazardous material is left at a landfill eventually gets covered with soil. According to the U.S. Environmental Protection Agency, Americans produce about 4.6 pounds of trash per person per day (which adds up to 251 million tons — 228 million metric tons) of garbage per year. Incidentally, Americans produce about twice as much trash per person compared with other major countries. A little over half (55 percent) of trash is buried in landfills (the rest is burned, recycled or composted). A landfill is far more than a hole in the ground (or at least it should be). In a landfill, the material is isolated from the surrounding environment, sometimes with a plastic liner and sometimes with clay. Landfills are carefully monitored: The groundwater is tested for several decades, and because potentially explosive methane can be produced in the airtight system, the gas is vented or burned. Material that is taken to a transfer station is held temporarily before it is moved to a permanent location. Material there often receives some sort of further treatment before it is disposed of. In most cases bins are immediately taken to the landfill or transfer station where they are weighed and unloaded. After that, depending on the locations pricing structure (bin plus weight vs. all-in), the bin plus weight pricing structure will attach a copy of the ticket given to them by the landfill/transfer station to the customer’s invoice. Fine Tuning: What Are Your Local Regulations? Some communities have their own rules, which can influence what is done with items placed in a bin. In the case of Alberta, Canada’s Kelowna Bin There Dump That franchise, every load needs to be sorted — the transfer station has different stations for each type of products (shingles, wood, etc.) In some rare instances, franchise operators will even spot reclaimable items, pluck them out and donate them to Habitat for Humanity ReStore. (It’s always best for you to scout for those items on your own before you chuck them in a bin.) Getting Started You can have your stuff taken away to a landfill by ordering a Bin There Dump That bin. To get started, find your local franchise operator by visiting our website. Book Now Book your Residential Friendly Dumpster today!
global_01_local_1_shard_00001926_processed.jsonl/50364
Ethics: A Trip to Space Grishma Gupte shares her ethics & society case study, which she completed as part of our Young Scientist Program. Aristotle the legendary Greek philosopher said, “Man is by nature a social animal; an individual who is unsocial naturally and not accidentally is either beneath our notice or more than human. Society is something that precedes the individual.” Although, humans are known as social “animals”, yet we consider ourselves to be superior to other animals. With our highly developed cortex, we demonstrate social abilities especially self- consciousness and self-cognition which sets us apart from other animals. Since humans are the only species currently deciding the fate of all life on Earth, in some way or the other, we are responsible for the safety and protection of other life forms. Animals have been used and exploited by humans for their own benefit, be it in the form of entertainment at the circus or as biological models in scientific research. Anthropocentrism, also known as humanocentrism, is the belief that human beings are the most significant entity of the universe. Anthropocentrism is considered to be profoundly embedded in many modern human cultures and conscious acts. Author and anthropocentrism defender Wesley J. Smith from the Discovery Institute has written that human exceptionalism is what gives rise to human duties to each other, the natural world, and to treat animals humanely. Writing in A Rat is a Pig is a Dog is a Boy, a critique of animal rights ideology, “Because we are unquestionably a unique species—the only species capable of even contemplating ethical issues and assuming responsibilities—we uniquely are capable of apprehending the difference between right and wrong, good and evil, proper and improper conduct toward animals. Or to put it more succinctly if being human isn’t what requires us to treat animals humanely, what in the world does?” The Space Race refers to the 20th-century competition between two Cold War rivals, the Soviet Union (USSR) and the United States (US), for dominance in spaceflight capability. It had its origins in the missile-based nuclear arms race between the two nations that occurred following World War II. The technological superiority required for such dominance was seen as necessary for national security, and symbolic of ideological superiority. The Space Race spawned pioneering efforts to launch artificial satellites, un-crewed space probes of the Moon, Venus, and Mars, and human spaceflight in low Earth orbit and to the Moon. After the success of Sputnik 1 in October 1957 by USSR, they decided to launch Sputnik 2 by November, and this left them with only 4 weeks to design and build the spacecraft. Sputnik 2, therefore, was something of a rush job, with most elements of the spacecraft being constructed from rough sketches. It was decided that Sputnik 2 would carry a canine, thus repeating the triumph of Sputnik 1. Three dogs were trained for Sputnik 2 flight- Albina, Mushka and Laika. The dogs were confined to progressively smaller cages for 20 days in order to adapt them to the tiny Sputnik 2 cabin. This made the dogs stop urinating and defecating and made them restless. The dogs were placed in centrifuges that simulated the acceleration of a rocket launch and were also placed in machines that generated noises of the spacecraft. Laika was chosen to be the flight-dog and was placed in the spacecraft 3 days prior to launch. One of the technicians preparing the capsule before final lift-off stated that “after placing Laika in the container and before closing the hatch, we kissed her nose and wished her bon voyage, knowing that she would not survive the flight.” Laika died due to the overheating caused during the flight. It was later reported to the World Space Congress that it was impossible to create a reliable temperature control system in such limited time constraints. We must note that if sufficient time was given USSR could develop a better system, but due to the rush to beat US in the space race it failed to do so. Humans gave priority not to the life of an animal but to their own political interest. One of the Soviet scientist confirmed that they did not learn enough from the mission to justify the death of the dog. This brings us to the concept of Utilitarianism which is an approach used in animal rights. Utilitarianism is an ethical theory that states that the best action is the one that maximizes utility. The other approach is that of rights-based. The difference between utilitarianism and rights-based approach reflects a distinction that philosophers draw between ethical theories that judge the rightness of an act by its consequences (consequentialism/teleological ethics, or utilitarianism), and those that focus on the principle behind the act, almost regardless of consequences (deontological ethics). Deontologists argue that there are acts we should never perform, even if failing to do so entails a worse outcome. Peter Singer supports the utilitarian concept that “the greatest good of the greatest number” is the only measure of good or ethical behaviour, and Singer believes that there is no reason not to apply this principle to other animals, arguing that the boundary between human and “animal” is completely arbitrary. There are far more differences, for instance, between a great ape and an oyster, for example, than between a human and a great ape, and yet the former two are lumped together as “animals”, whereas we are considered “human” in a way that supposedly differentiates us from all other “animals.” Initially non-human animals were used to test the survivability of spaceflight before attempting human spaceflight. By 2004, the space shuttle program had flown over two dozen SpaceLab experimental packages. Later non-human animals were flown to study various biological processes and the effect of microgravity.  Some of the biological functions that have been studied are (to name just a few): brain states, behavioural performance, cardiovascular status, fluid and electrolyte balance, metabolic state, tissue development, and mating in zero gravity. Here are some examples of specific experiments: Nov. 9, 1970: Two bullfrogs were launched on a one-way mission to learn more about space motion sickness. July 28, 1973: Two garden spiders named Arabella and Anita were used to study how orbiting earth would impact spiders’ ability to spin webs. Arabella spun a fairly symmetric web even though the thread thickness varied — something that earthbound spiders don’t experience. July 10, 1985: Ten newts flew on board the Bion 7. Their front limbs were amputated in order to study regeneration in space to better understand how humans might recover from space injuries. April 17, 1998: More than 2,000 creatures joined in 16 days of neurological testing alongside the seven-member human crew of the shuttle Columbia. September 2007: Microscopic creatures commonly known as water bears (tardigrades) survived a 10-day exposure to open space. The creatures are known to have the ability to withstand extreme conditions, including dehydration, and still recover and reproduce. The animals were dried out and re-hydrated after surviving cosmic rays, a near vacuum, and freezing temperatures. And the list continues. The crux of the argument between pro‐animal testing parties and opponents to animal testing is whether it is ethical. The arguments for animal testing include: • Human life has greater intrinsic value than animal life. • Legislation protects all lab animals from cruelty or mistreatment. • Millions of animals are killed for food every year – is medical research not a comparatively worthier death? • Few animals feel any pain as they are killed before they suffer. The arguments against animal testing almost perfectly counter these: • Animals have as much right to live as humans. • Strict controls have not prevented researchers from abusing animals – although such instances are rare. • Deaths through research are unnecessary and are morally no different from murder. • Animals suffer while they are locked up and how do we know whether they feel pain? The three Rs of animal research were put forth in 1959 by zoologist William Russell and microbiologist Rex Burch are as follows: • Replacement – use alternative non‐animal methods to achieve the same scientific aim such as testing on human cell cultures in test tubes. • Reduction – use statistics methods to reduce the number of animal trials required to generate comparable amounts of data. • Refinement – improving the experiments in order to reduce the possible suffering of the animal. Today, there have been improvements in the way animals are treated in space research. There are even international guidelines known as The International Animal Welfare Agreement for Space Borne Research. In the US, such research is now conducted according to the NASA Principles for Ethical Care and Use of Animals. These guidelines cover rodents, which are now the highest order animals sent into space by the US.
global_01_local_1_shard_00001926_processed.jsonl/50379
At heart, Product Managers should be great storytellers. They should be able to craft compelling narratives to justify a new initiative. Or outline a heroic quest to incite engineers to build that next great product. Or conjure enchanting tales that sales and marketing can use to sell the product. Not everyone can spin a tale that makes their audience lean forward in anticipation. Storytelling is a muscle, one that requires constant workouts. Enter True Story A longtime friend, Kevin Cheng, introduced me to a card game called True Story. On the surface, True Story is an icebreaker game that individuals can use to get to know each other. But, its true purpose is to refine your ability to structure stories in a compelling manner. True Story is a “head fake” learning activity like those Randy Pausch detailed in his “Last Lecture“: We don’t actually want our kids to learn football. We send our kids out to learn much more important things: teamwork, sportsmanship, perseverance. And these kind of “head fake” learnings are absolutely important. You should keep your eye out for them, because they’re everywhere. Playing the Game Each player gets two new cards in each stage of the game, with each card providing a storytelling prompt. Prompts are open-ended, and include koan-like statements, such as: School Days Lessons learned Playground is the real classroom Show’em what you’ve got There are three stages in the game, with each stage building on the prior one. Player get two new cards in each stage, and select one card to use according to the instructions for the stage. Each stage guides players to focus on one component in the structure of a good story: • Stage 1: Players tell a sixty second story to “paint the scene” on a memory inspired by the prompt card. Players describe the sights, sounds, smells, tastes, sensations, and feelings of the memory. • Stage 2: A three minute story where the player expands a memory into a story. The player begins by setting the scene as in Stage 1. Unlike Stage 1, this story continues until something changes and forces them to react. The change could be something in the storyteller, or the conditions around them. The story comes to a conclusion, but without any reflection. • Stage 3: A five minute story where the player concludes the story with a self-reflection. Stage 3 builds on Stages 1 and 2, but concludes with the storyteller the meaning of the experience. Ask yourself: what did you learn about yourself or the way the world works? I have players break into groups of three or four to play the game. After each stage, we reconvene to discuss some open-ended questions: • What stories or parts of a story did you find especially compelling? • Why was it compelling? What memories or feelings did it evoke? • What unique tricks did a storyteller use to transport you into the setting for their story? • What thoughts did the storyteller evoke as you listened? Stage 1 is the hardest for players to execute. For one thing, telling a story to other people is very personal, even when it’s about the most mundane of topics. Players are vulnerable, nervous about sharing their experiences, and even “doing it right”. The room has the same jittery quality of a high school game of “Truth or Dare”. Some players will even try to bargain for new cards (“Oh, I can’t tell a story about this!”). Stage 1 is also hard because most people struggle to limit themselves to setting up the story. Players will rush into the thrust of the story without “setting the stage” first. This makes life difficult in Stage 2 and 3. When you fail to “set the stage”, you end up confusing the audience when you backtrack to fill in the missing context. Once Stage 1 is over, things get easier. Players have heard some examples from other players, and tend to relax a bit. Despite the slow start in Stage 1, players are enthusiastic to get into the remaining stages of the game. The atmosphere in the room turns positive and collegial. And the volume level definitely goes way up during the following stages. After the game’s conclusion, players usually continue to analyze stories long afterwards. Stories are the glue that bind people together, enabling better relationships. If nothing else, playing True Story might help you build a better team. Implications for Product Managers Product Managers should realize that everything is a story. That new project you want to start? That’s a story. The customer need that you’re trying to convince engineering to address. That’s a story. The messaging you want your sales team to absorb? Story. If you can spin an epic tale, driven only by a two word prompt on a card, you can tell a story about anything. Of course, the important takeaway is how to tell that story. Stories have structure: a beginning, a middle, and an ending. Omitting those elements confuses an audience. At best, the audience will do nothing. At worst, they’ll resist your proposals because they can’t figure out what the heck you’re talking about. Both Product Management and storytelling are exercises in empathy. PMs need empathy for the problems of customers, partners, engineers, and management. Storytellers need empathy for the characters, their struggles, and the listeners. They are two sides of the same coin. In the world of Product Management, much of the focus these days is on data and analytics. But raw data doesn’t tell you why someone did something. Why did the user click on that? What did they think it would do? Why didn’t they click on that? What’s going on in their lives? Their minds? Customer development interviews help people tell their stories to PMs. But as a PM, your job is to synthesize those stories into a compelling narrative to provoke action. Playing True Story will enable you to craft these stories and inspire action. Other Sources of Inspiration If you’re looking for other sources of storytelling inspiration, check out these podcasts: I’m also a fan of a few writers that do a great job of making business topics compelling to a wide audience. I recommend checking out books written by Steve Johnson, Malcolm Gladwell, Michael Lewis. I also recommend Stephen King’s “On Writing” for its strong advice on the craft of writing. If you’re looking to play the game yourself, see the end of this slide deck for a few example prompt cards for your use. If you need more, why not head over to True Story and buy the game?
global_01_local_1_shard_00001926_processed.jsonl/50383
Games to Help Students Learn German Word Order in Sentences Simple sentences When you first introduce your students to German sentence construction, you most certainly use simple sentences that followed the German Class normal English word order. like Der Mann ist hier – The man is here – and Kann die Mutter kommen? – Can the mother come? You tell your students that German and English are both members of the Germanic family, so they are similar in some ways. Then they graduate to longer sentences and start raising their eyebrows. Your lessons now contain sentences like Kommt der Vater mit? and Ja, ich muss die Margit helfen. They begin to realize that the word order differs in regard to verbs, direct and indirect objects, and adverbs. Playing the following games can help your students learn about word order and German syntax. Filling in the blanks, providing the missing text of a phrase or paragraph, or unscrambling mixed up words to form German sentences can help your students learn to pay attention to what words go where in the sentences, while having fun. German numbers are also very tricky. Some games can take care of this problem with remarkable ease. Here are examples of some games you can play with your students: Bingo is a perfect game to play for helping with memorizing numbers. Give your students Bingo cards, and call out the numbers in German. Give the winners small prizes, and you can even give a jackpot prize. Have your students pretend they are hotel receptionists, for example, and they have to assign rooms to some guests. You then call out room numbers to be assigned to names which they have written down from A-E for example. They must write the correct number in figures and words next to the correct name. Name – Zimmer-Nummer 1. Frau Wagner – 24 – vier und zwanzig 2. Herr Schmidt 3. Frl. Jansen 4. Frau Wolf 5. Herr Müller You then call the names and numbers, in or out of order as you wish; for example: Herr Muller, Zimmer nummer zehn; Fräulein Jansen, Zimmer nummer drei und zwanzig etc. Telephone Numbers Here is another number game. Give your students a list of names with numbers written next to them. These numbers represent telephone numbers. You give them as many as eight names, but you are only calling four numbers. Have the students write the correct number next to the correct name. For example, you call the name Wolf then call the number 813 337 8594 acht- ein -drei, drei -sieben und dreissig, fünf und achtzig – vier und neunzig, so they can get the hang of writing and saying the compound numbers. Alternatively, you can call each number separately depending on the level of the students. You then call three other numbers only, and the students write them out next to the correct names. a._____ Hansen b._____ Strauss Unscramble Game On the board, scramble the answers to questions you are going to ask. For example one of the answers is: "Ich mochte eine Woche bleiben", and your question is "ie lange mochten Sie bleiben?" You mix the words in the answer like this: "mochte ich bleiben eine Woche" or you ask “Wie alt ist deine Schwester?" And you mix the words, so the correct reply :"Sie is jetzt drei Monate alt" is changed into "drei Monate ist Sie alt jetzt." Have your students write the words Zimmer-Nr. in one column and Euros in another. You then have them pretend that the hotel manager is asking his secretary to get the invoices ready for the guests who are leaving. Read out the room numbers and the sums of money. Have them write down the room numbers and the respective amounts of euros in figures and words. For example: Make a column and list from a-d; for example Zimmer Nr.Euros a. (Zimmer no. achtzen) 18 – 58,80 – acht und fünfzig b.(Zimmer no. zwanzig) 20 – 75,00 – fünf und siebzig c.(Zimmer no. ein un dreissig) 31 – 136, 58 – hundert, sechs und dreissig, acht und fünfzig d.(Zimmer no. vierzig) 40 – 205,98 – zwei hundert fünf, acht und neunzig This is a very good game for practice with numbers, since numbers are very difficult to get the hang of, and dealing with money is important in any language. Practice Makes Perfect As they practice reading German stories, newspaper and magazine articles for the advanced beginners, and playing games, they will begin to understand the German patterns. Eventually those long sentences which seemed so complicated will become not only easy for them to read, but also to write and speak. Have fun.
global_01_local_1_shard_00001926_processed.jsonl/50399
My sons are good cooks, too The article on American Flatbread ("American Flatbread turns 30, throws community party," May 29) was so welcome. Thank-you, George Schenk. After all you've done for us, you've been a treasure to the community, and I've loved American Flatbread since it began. An excellent quote rang true: "Almost all food work, from the garden to washing dishes, including knife-work, is child-friendly." Absolutely, and there's a reason why my sons learned to cook. When I prepared food, I'd have them in a baby carrier on my back. As they looked over my shoulder, I explained everything I was using and doing, and they were fascinated. This included how to use a large sharp knife to cut up vegetables and spices, so as not to cut my fingers. The end result? They both became good cooks! Read or Share this story:
global_01_local_1_shard_00001926_processed.jsonl/50402
Titleist Pro V1 Golf Ball view other products This latest Pro V1 provides the total performance you’ve come to expect from Titleist, but now with a little more distance and better flight consistency. This 2017 Pro V1 is a three-piece ball with an all-new Next Generation 2.0 ZG Process Core that delivers less long game spin for longer distance. On the outside its soft urethane elastomer cover provides predictable feel for consistent distance control and reliable spin for short game performance. Key features and benefits of the 2017 Pro V1 include: • 2017 version is the longest ever Pro V1 thanks to faster and lower spinning core • Refined 2.0 ZG Process Core also maintains very soft feel • Soft urethane elastomer cover delivers greenside control with soft feel • New dimple manufacturing process improves flight consistency • Longer-lasting durability • Pro V1 flies lower and feels softer versus Pro V1x You may consider yourself a 'V' or an 'X' player, but these new balls are a great time for us to discuss and re-evaluate the flight, feel and spin that best fits your game. Contact us here about a ball fitting.
global_01_local_1_shard_00001926_processed.jsonl/50406
What Time Is KyMajesty Coming Out? Here's Exactly When To Score Kylie Jenner's Next Metal Matte The dramatic, matte black Dead of Knight Lip Kit made its grand debut last week. What about Kylie Jenner's KyMajesty Metal Matte, which is black with blue and silver undertones and a crazy, sexy sheen? Jenner announced KyMajesty before she announced Dead of Knight, yet the latter on went on sale (and sold out) first. She made us wait for the latest addition to her Metal Matte family, all the while continuing to tease it via social media because duh. Jenner and Kylie Cosmetics have confirmed that KyMajesty will go on sale for the first time on Thursday, June 16. What exact time will the KyMajesty Metal Matte be available to buy? When should you be online, credit card in hand and ready to shop? The KyMajesty Metal Matte goes on sale at 2 p.m. ET and 11 a.m PT, per the brand's official Instagram post. The team confirmed the on-sale time while sharing a flat lay shot of six tubes of KyMajesty in all of its shimmering, blackened glory! KyMajesty is way different than Dead of Knight but I expect it to be met with the same sort of online shopping frenzy tomorrow! Observe the newest Metal Matte and the confirmation of the shopping time and date. Basically, KyMajesty is like a starry night or a starry sky. While this Insta post only stated 11 a.m. and did not indicate the time zone, Kylie Cosmetics operates in the Pacific time zone. Plus, a post on Jenner's app, which is the official information hub for all Lip Kit restocks, confirmed the time zone. Those screen grabs are below. Oh, hi Ky! It's got such a midnight, moon-shimmying-off-the-ocean vibe, doesn't it? Here is the caption. So you can rest easy knowing the exact time to shop. Here's the usual packaging! Now that's a swatch. The Knight Kit is much more matte. Knight and Ky are sisters, but not twins. Like Mary-Kate and Elizabeth Olsen, not Mary-Kate and Ashley. KyMajesty, which was initially announced as "Majesty," doesn't skimp on sheen. Blue x black x silver? That is a formula for awesome. If you plan to shop KyMajesty tomorrow, brush up on Kylie Lip Kit and Kylie Cosmetics shopping tips so you can successfully purchase products and eventually brush them across your lips! Images: Kylie Cosmetics/Instagram (6)
global_01_local_1_shard_00001926_processed.jsonl/50414
The Christian History of France The Origin of France and of the French people The French are not a single, homogenous people. France, once called “Gaul”, was settled by Celts who migrated to the South of Gaul in 800 BC. These Celtic Gauls were in fact dispersed Israelites, most likely from the tribe of Reuben.1 In about 600 BC the Phocaeans, a Greek tribe, founded Massalia (Marseilles), France’s oldest city, which also features France’s most ancient harbour. Marseilles was populated by Celts, Greeks and even Phoenicians, and played a crucial role in the development of trade with Greek cities, Northern Europe and even the Atlantic, by which tin from England was transported. The Franks – Germanic people from central Europe – then settled in France in the early third century AD. Additionally, the Vikings from Norway, led by King Rollo in 911AD, settled the area of Normandy, the “Northmen” eventually becoming the “Normans”. They were also of Israelite descent. Thus the ethnic make-up of ancient France was quite mixed, with a sizeable portion of the population descended from the wandering and exiled tribes of Israel. The First Christians in France France received its Christianity directly from Jerusalem in the first century BC. After Christ’s death, Christians were persecuted in Jerusalem and in all cities of Palestine. Joseph of Arimathea, Lazarus (resurrected by Jesus), Mary Magdalene, and several other followers of Jesus were all exiled from Israel, and set afloat by their persecutors in an oar-less boat without sail. The boat miraculously reached an area near Marseilles (called today “Les Saintes Maries de la Mer” or “The Holy Mary(s) from the Sea), where Philip had already settled down and begun to preach the Word.2 Joseph of Arimathea was the Virgin Mary’s uncle. He was a tin trader who was well known in Marseille, as his ship would stop there on its way to the tin mines in England. Joseph (with some other disciples) then continued northwards through Gaul, passing through Limoges and Roscoff and across the English Channel before finally reaching Cornwall, where he established the first Christian Church in England (see Christian History of Britain). Philip (one of Jesus’ twelve disciples) had been given the responsibility of spreading Christianity in Gaul (France), and had commissioned Joseph of Arimathea to help him. Joseph and his group had been in Avalon (modern day Glastonbury, in Cornwall, England) for about four years. During that time, Philip’s disciples won people for Christ and started schools and churches. Philip had sent about 160 Christians from Gaul to be trained by Joseph. In return, Joseph sent many of the workers back to Gaul, including most of the original group that had come with him. The first one he sent was Lazarus, who was sent to Massialia (Marseilles); Maximin who was “the rich young ruler” and one of the seventy sent out by Jesus, went to Aix. Mary Magdalene, Mary Salome (mother of James and John) and Mary, wife of Cleopas, went to Camargue; Eutropius went to Saintes (in Aquitaine) and later to Orange, Arles and Tarascon. Saturninus went to Toulouse; Martial went to Limoges and Parmenas (one of the deacons mentioned in ACTS 6:5) went to Avignon. Restitutus (the blind man healed by Jesus in JOHN chapter 9) also went to Aix; Zaccheus (who accompanied Joseph of Arimathea) settled in Rocamadour and Sergius Paulus, a deputy of Paphos (the “prudent man” in ACTS 13:7-12) went to Narbonne. Many others who were sent as missionaries to Gaul/France could be mentioned. It should be noted too that Pilate was banished from Jerusalem to Vienne (South Lyon) in AD 38 and Herod Antipas was banished to Lyon in AD 39.3 The Dark Ages In the following centuries, the French Christians suffered greatly from the Roman Catholic persecutions, and the faithful became increasingly isolated. The Roman Catholic religion, a blend of Christianity and heathen festivals and practices, became stronger and stronger over the following centuries throughout the Roman Empire, including Gaul. The true Gospel was lost in most parts of France and Europe, wars raged, and barbaric invasions muddied things further with their heathen religions, superstitions and ignorance. All the Kings, including the most famous ones such as Clovis and Charlemagne, supported the Roman Catholic church fully, which took the true basis of the Gospel and the work of the disciples, and twisted them into a cruel parody of what the Bible commands the church to be like. In order to maintain supremacy throughout Europe, the Roman Catholic church would persecute, imprison, torture and kill all those opposed to their doctrine. Their victims throughout the centuries numbered into the millions. Yet even in this dark time there were still witnesses in France for the Truth. The Albigenses The massacre of Bezier The Albigenses (also called “Cathars”) originated in the area of Albi and Toulouse around 1100 AD. A revival “wind” came from Eastern Europe, bringing the light of the Gospel to the common man. The Albigenses were “reformers before the reform”, believing in salvation through receiving the Holy Spirit and being changed by the Word. They read the Bible in the common language (The Latin Vulgate ), which was forbidden by the Roman Catholic church. As a result, they were accused of heresy for using a non-Catholic Bible. They increased so rapidly that many cities were inhabited exclusively by them, and several eminent noblemen embraced their doctrines. Among the latter were Raymond VI, Earl of Toulouse, and the Earl of Foix. Pope Innocent III thus initiated a crusade against them. He was helped by Simon of Monfort and the Northern Barons. The Albigenses were viciously tortured and killed, regardless of sex or age. In Bezier, those who refused to abjure their faith were taken in a storm of cruelty. The Catholic legate, during these infernal proceedings, enjoyed the carnage, and even cried out to the troops “Kill them, kill them all, kill man, woman and child. Kill Catholics as well as Albigenses, for when they are dead the Lord knows his own.” Bezier was reduced to a heap of ruins and 60,000 people were murdered. Some of the Albigenses fled to the Piedmont area where the Waldenses also found refuge after suffering persecution from the Catholic Church. Despite the small number of Albigenses who escaped the persecutions, they kept firm in their faith. The Waldenses Many people place the Waldenses as having started in the 12th century, but they date their lineage as being much earlier. Their teaching can be traced back to the 4th century. Although many churches along the centuries had already been brought under the power of the Papacy, Bible doctrine was still preached in many of the churches of Lombardy and Piedmont. Images were removed from churches, justification by faith was preached, and purgatory and the use of relics and pilgrimages to attain merit were rejected. In 1059 the churches in Northern Italy submitted to the pope, and though the plains were conquered, the mountains remained free. Those who did not want to submit fled into the Cottian Alps of North-West Italy. The Bible-believing churches held a strong evangelical testimony and were fiercely persecuted. Some of the Christians crossed the Rhine and preached the Gospel as far as Cologne, where they were branded as Manicheans, and many were burned at the stake. In 1173, Peter Waldo, a wealthy merchant from Lyon, France, was converted. Some say that he received his surname through his association with the Waldenses, who most certainly had an evangelical testimony before the time of Waldo. While a majority of historians name Peter Waldo as the originator of the Waldenses, the Waldensian ‘Noble Lesson’ dates from at least the year 1100, long before Waldo was born. Waldo was excommunicated in 1183, after being denied the right to preach. His followers were dispersed, and a number of them fled to the Waldensian Valleys. The great Dominican persecution of the Albigenses began in the 13th century. Many of these Christians also fled to Waldensian safety. The importance of the Waldenses as a cause of the Reformation is often overlooked. They were evangelistic as well as being evangelical. They travelled throughout southern and central Europe, often disguised as peddlers, until they brought forth from their hearts treasures greater than the gems and silks they sold. They penetrated into Spain, and went as far east as Germany, Bohemia and Poland. Their footsteps can be traced not only by the evangelical churches that were founded, but by the stakes upon which many were martyred. The seed of the Gospel was often watered by the blood of those who had sowed it. The Reformation in France and the Huguenots The persecution by the Roman Catholics plunged France into spiritual darkness for several centuries. In 1517 Luther nailed his 95 theses on the door of his church in Wittenberg, Germany, criticizing Roman Catholic doctrines. This was the starting point of the Reformation that spread throughout Europe. Calvin, a French reformer convinced by Luther’s ideas, was forced to leave Paris and stayed in Basle, Strasbourg and Geneva, where he settled in 1541 (see the Christian History of Switzerland). In France, the followers of the Protestant faith were called Huguenots. The Huguenot coat of armsThe Huguenot coat of arms. The 4 hearts represents loyalty and the dove represents the Holy Spirit. After a long period of troubles in France, the Roman Catholic church, seeing they could not overcome the Huguenots by open force, began to devise how they might entrap them by subtlety, and that by two ways: first, by a pretend commission sent into the Low Countries, which the prince of Navarre and Conde was to command. The aim was merely to learn what power and force the Admiral de Coligny, one of the leaders of the Protestant Party, had under him, and who they were. The second was by a marriage between the Prince of Navarre (who was Huguenot) and the king’s Roman Catholic sister, Queen Margot, to which were to be invited all the principal protestants of France. Even the Prince’s mother, the famous Jeanne d’Albret came to Paris. She fell sick shortly after her arrival and died within five days, not without suspicion of poison (the Roman Catholic king’s mother, Catherine de Medicis was an expert on that matter). Notwithstanding, the marriage still proceeded. All the protestant chiefs were invited by letter from the Roman Catholic king, which guaranteed safe passage to and safety within Paris. The trap was now set and the marriage took place on the 19th of August, 1572. Four days after this, the Admiral de Coligny, returning from the council table, was shot at with a pistol charged with three bullets, and wounded in both arms. St. Bartholomew’s Day Massacre (24th August 1572) Soldiers had been appointed to different parts of Paris, to be ready at the command of the king. Upon the watchword being given, they burst forth, slaughtering all the Protestants, beginning with the leaders and the Admiral himself, who was cast out of the window into the street, where his head was struck off, embalmed and sent to the pope. His martyrdom had no sooner taken place, than the troops, with rage and violence, ran about slaying all the Protestants they knew or could find within the city gates. This continued many days, but the greatest slaughter was in the first three days in which more than 10,000 men and women, young and old were murdered. This massacre extended to other cities like Lyon, Orleans, Toulouse and Rouen, where the cruelties were, if possible, even greater than in the capital. In one month, 30,000 Huguenots were slain.4 When he was crowned king, Henri IV denied the Protestant faith and made compromises with the Roman Catholic Church. He brought peace back to the land in 1598 with the Edict of Nantes that granted religious freedom to the Protestants.3 One famous protestant leader, John Welch, son-in-law of John Knox, was exiled to France in 1606 for 14 years until Louis XIII attacked the area of La Rochelle. He was in St. Jean d’Angely, where it is recorded that he raised the dead; was protected from cannonballs when Louis XIII’s army surrounded the city; made the army flee and then even preached while the king was residing in the city, which was forbidden.5 Then came the Thirty Years War - a war waged by the Roman Catholic countries against those areas that accepted the Reformation. The Revocation of the Edict of Nantes and the Wilderness Period In spite of the Edict of Nantes which “officially” brought peace for Protestants for some decades, the Hugenots were in fact still constantly persecuted. Children were taken from their families, and fathers and preachers sent to the galleys or imprisoned, if not executed. Many Protestants fled abroad (see histories of South Africa and Canada). King Louis XIV then argued that considering there were no Protestants in France anymore, he could revoke the Edict of Nantes, as it was no longer relevant. The Revocation (or cancelling) of the Edict of Nantes, signed by Louis XIV in 1685, caused more French Protestants to flee. Pastors were commanded either to leave the kingdom or be sent to the galleys as punishment. Furthermore, Protestant churches were closed down and destroyed. Protestants were forbidden to praise God either in public or at home. For this reason many attempted to flee, but were captured and sent to the galleys as slaves. This was a very dark time for Protestants. Protestant children born after 1685 also had to be baptised by Roman Catholic priests. Those who had decided to stay assembled secretly in houses, but when this became too dangerous, they met in forests and in quiet, deserted places in the South of France. These meetings were called “wilderness gatherings”.3 In July 1702, the War of the Cévennes began, also called the War of the Camisards, which set a whole area (Montélimar-Le Puy-Montpellier) on fire from 1702 to 1704. The royal troops of Louis XIV tried to slaughter the population of this mountainous central area, where thousands of Protestants found refuge. This war was prolonged until 1710 with many tragic episodes, which included the famous "burning of the Cévennes" in December 1703. The War of the Camisards mobilized 20,000 men of the royal troops and resulted in the death of 25-30,000 men, women and children of both Catholic and Protestant confessions. During the whole 18th century, persecution of the Huguenots continued. Their civil rights were abolished and faithful preachers and believers who did not want to compromise were sent to the galleys. About 250,000 French Protestants left France during that period, as the only choices they had were to convert to Catholicism, be deported or sent to the galleys, or to die. Thousands of tradesmen, professors, qualified workers, farmers, doctors, etc left France with their families and belongings and migrated to England, North Germany, Holland, Switzerland and even to South Africa or North America. In 1787, Louis XVI proclaimed the Edit de Tolérance, which gave some liberty to the Protestants again. During the French Revolution, with the Declaration des Droits de l’Homme proclaimed in 1789, the Church and the state were separated and each person was free to choose their religion. The Christian Awakening in the Late 19th Century The beginning of the 19th century was quite tragic for France, with incessant wars. More than a quarter of the French population died during the slaughters of the revolution and the Napoleonic wars. During the whole century, the Roman Catholic religion was still the most wide-spread in France and people had to wait for the peace following the 1870 war (the first French-German war) to see the light of the Gospel shine again. It came mostly from across the Channel, as missionaries were sent from England to France (Normandy), and some areas like Chambon (in the Cévennes, between St. Etienne, Le Puy and Valences in Southern France) experienced revival. The people also rose up against the rigid protestant institutions, which had grown cold and formal over time. The Chambon had a long protestant history, with the first preachers arriving there in 1491. Since this time, there was always a very strong and lively protestant influence that never ceased, despite persecution. Pastors also held “Wilderness gatherings” there during the 18th century. The Protestant children escaped Catholic schools and found themselves in unofficial schools run by courageous teachers. At the end of the 19th century, teaching farms were created to help city children and teach them about the Gospel. Those who went to these schools were taught how to work on a farm as well as to restore their faith and learn about the Word. In 1881, the Salvation Army (see the Christian History of Britain) was established in Paris by Kate Booth, the 22-year-old daughter of General Booth (the second building was built in Le Chambon in 1882). Helped by three comrades of her own age, Catherine settled in the popular district of Belleville-Ménilmontant. The beginnings were hard as they suffered scoffing, gibes and uproars (Catherine was called "the Marshal's wife" by the Parisians). “Night after night, for six months, she stood out against a grimy wine-flushed audience of taunting ‘ouvriers’. At last, when they sought to convert a prayer meeting into a riotous dance, Kate turned the tide with a clever challenge: “Mes amis! I will give you twenty minutes to dance if you will give me twenty minutes to speak!” At once a dark handsome workman in a blue blouse leapt to his feet: “Citizens, it is only fair play.” Then, standing watch in hand, he timed their capering to the minute, before calling on Kate. Eighty minutes later, with her audience still spellbound, she knew that God has granted her a precious victory. Soon she was preaching nightly to crowds 400 strong: by year’s end, only a new hall on the Quai de Valmy, seating 1,200 could contain them.”6 The Evangelisation was accompanied by a great social work involving popular hotel trades, houses for vulnerable girls etc. Many stations of the Salvation Army were created throughout France. Christianity in the Twentieth Century and the Pentecostal Movement From the beginning of the 20th century until the 1930s, there were two main events in the Pentecostal movement in France. One was brought about by the revival which took place in Wales at the same time (see Christian History of Britain); people prayed and worked to see the same revival in France. Many meetings were also held in an alcohol-free hotel-restaurant, the "Blue Ribbon" in Le Havre (Normandy), owned by Miss Hélène Biolley. Missionaries arrived there and Smith Wigglesworth, the famous British evangelist, visited several times. People received the Holy Spirit and were healed; they prayed for a revival in France. Miss Biolley’s "Blue Ribbon" quickly became the Christian evangelical centre in Normandy. Books were translated there (mainly from M.B. Woodworth Etter), and those who were converted could then go to England to Bible schools (such as the Elim Biblical Institute in London).  Douglas Scott and his wifeDouglas Scott and his wife In January 1930, Douglas Scott and his wife, newly married, arrived at Le Havre to learn French as they planned to move to the Congo as missionaries. Without waiting to learn the language, Douglas Scott immediately began to preach the Gospel. He held meetings, and people were baptised with water and received the Holy Spirit. Many were healed of various diseases. Converted alcoholics stopped drinking and thieves gave back the goods they had stolen. Until the late 1930s, baptism services were organized every 5th day. However, this small revival did not spread beyond Le Havre and was also limited in duration. In general, there are very few Pentecostal or Evangelical churches in France, which has remained mostly Roman Catholic. After the severe persecution French Protestants have undergone throughout the centuries, France has now become a “secular state”, which means that there is a clear separation between state and religion. However, as the most established religion in France is Roman Catholicism, there has been a growing suspicion toward Christian churches in recent years. The 2002 “Anti-Cult Law” shows this very clearly. Since the law’s implementation, true Christian churches have suffered persecution, since no difference is now made between pagan sects and real Christians. Article 10 of the French Constitution states that “nobody should be troubled as to their own ideas, including religious ones, as long as they do not disturb the public order as established by the Law”. Although this was originally intended for the protection of individual freedom of religion, it is now being used to stop the spreading of the Gospel and to undermine freedom of speech, making it an offence to tell someone they must obey the Bible to be saved in eternity. As a result, France has slid into an ever-worsening state of sin and corruption. We pray that the French nation turns again to the Bible that many of its people once believed in, and starts following God’s command as described in JEREMIAH 6:16: “Thus saith the LORD, Stand ye in the ways, and see, and ask for the old paths where is the good way, and walk therein, and ye shall find rest for your souls …” • 1. Valerie Martlew, A Remnant of Israel in France • 2. John W. Taylor, The Coming of the Saints, Coventant Publishers (1969) • 3. a. b. c. Henry W. Stough, Dedicated Disciples, Artisan Publishers (1987) • 4. John Foxe, Fox’s Book of Martyrs, edited by William Byron Forbush • 5. Ethel Barrett, The Man Who Couldn’t Be Stopped - John Welch • 6. Richard Collier, The General Next to God, The Story of William Booth and the Salvation Army, Collins (1965)
global_01_local_1_shard_00001926_processed.jsonl/50490
I have forgotten my Password Or login with: • Facebookhttp://facebook.com/ • Googlehttps://www.google.com/accounts/o8/id • Yahoohttps://me.yahoo.com Belt and Rope Drives Brakes The Theory behind Belt and Rope drives using both Flat and Grooved pulleys. Included in this section are drum brakes. + View other versions (5) Where power has to be transmitted between two shafts which are a distance apart, a belt or rope drive is frequently used. In most cases the power transmitted relies upon the friction between the rope or belt and the rim of the pulley. However, in the case of toothed belts and chains, friction does not play a beneficial part, no slip is allowable, and a precise relationship between the movement of the pulleys is obtained. Examples of this type of drive are the cam belt used on many modern engines and the simple bicycle chain. Rope drives, as such, are not much in use now. But, the principle is alive and well in shipping, where capstans and windlasses are used to tighten ropes and chains. Power is the rate at which work is done or energy is transferred in relation to time. In calculus terms, power is the derivative of work with respect to time. An engine or motor is a machine designed to convert energy into useful mechanical motion. Flat belts were used extensively in both agriculture (to connect both steam and early tractors to static machinery) and also in early factories - where all the machinery in a building was powered by one engine driving a series of shafts, pulley wheels and belts. These belts could be long enough to transmit power from one floor of a building to the one above. A selection of arrangements of belt drives is shown in the diagram below. Today the majority of belts in use are of Vee cross section, often used in sets of three - side by side. A modern development seen on some cars, is a flat belt with a series of mini Vee's on the inner surface. Flat Pulley Drives Although described as Flat, many pulleys used with flat belts are actually slightly curved so that the diameter at the middle is slightly larger than that at the ends. This helps to keep the belt on the pulley. It is also normal on long belts to twist them as shown in the diagram. This can be seen in the above diagram and increases the angle of contact between the belt and the pulley. Another technique to increase the angle is the use of idlers which are small pulley wheels that help to control slack in the belt. At Low Speed The maximum torque that can be transmitted between the belt and the pulley occurs when limiting friction is developed around the arc of contact. The forces acting on a short length of the belt which subtends an angle of \delta \theta at the centre of the pulley, are shown on the above diagram. Resolving Tangentially:- \mu R=(T+\delta T)\cos\frac{1}{2}\delta \theta -T\cos\frac{1}{2}\delta \theta Thus in the limit, Resolving Radially:- Drawing of pulley showing tensions and radial T: T_r'=T\sin\displaystyle\frac{1}{2}\delta \theta therefore, T_r''=(T+\delta T)\sin\displaystyle\frac{1}{2}\delta \theta R=(T+\delta T)\sin\frac{1}{2}\delta \theta +T\sin\frac{1}{2}\delta \theta \text{As}\;\;\delta \theta \rightarrow 0\;\;\;\sin\frac{1}{2}\delta \theta \rightarrow \theta \;\;\text{and}\;\;\delta T\rightarrow 0 Hence in the limit, Combining equations (2) and (3) and eliminating R, \frac{\delta T}{T}=\mu\, \delta \theta This equation can now be integrated over the whole arc \theta . \therefore \;\;\;\;\;\;\ln\left ( \frac{T_1}{T_2} \right )=\mu \,\theta This is the maximum possible ratio of tensions between the "tight" and "slack" sides of the belt and consequently for a drive between pulleys of unequal diameter, the smaller angle of lap should be used. It should be noted that in some applications such as Capstans and Windlasses, the rope is passed completely round the pulley, sometimes more than once. Allowance For Centrifugal Force Centrifugal force represents the effects of inertia that arise in connection with rotation and which are experienced as an outward force away from the center of rotation. The analysis above assumes, in effect, that the belt and pulley is at rest. In practice this is not often the case when the belt is subjected to a centrifugal force as if passes round the pulley. If w is the weight of a unit length of belt and v is the linear belt speed, then the force on an element =\left ( \frac{w\,r\,\delta \theta }{g} \right )\times \frac{v^2}{r}=\frac{w\,v^2}{g}\times\delta \theta This force has to be balanced by a tension T_C in the belt. The value of this tension is obtained by resolving radially. Hence, 2\,T_c\times \sin\displaystyle\frac{1}{2}\delta \theta =\left ( \displaystyle\frac{wv^2}{g} \right )\delta \theta \text{As}\;\;\;\;\;\delta \theta \rightarrow 0\;\;\;\sin\frac{1}{2}\delta \theta \rightarrow \frac{\delta \theta }{2} The Total Tensions on the two sides are then, where T_1 and T_2 are the tensions transmitting the power and are calculated from equation (3). Equation (3) can now be written as: \displaystyle\frac{T_T-T_C}{T_S-T_C}=e^{\mu \;\theta } Grooved Pulley Drives Although rope can be used for such drives, the vast majority rely on V-belts. In many applications the pulley has more than one groove and there are obviously an appropriate number of belts. Assuming that the included angle of the groove is 2\beta , the Normal Reaction R is given by, But Friction (using the above equation) Where mu '=\displaystyle\frac{\mu }{\sin\beta } The analysis now becomes similar to a flat pulley where \mu 'is the equivalent coefficient of friction. The Power Transmitted Two sets of equations are given below to cater for both measurement systems: The horse-power transmitted Using equation (4) this can be rewritten to give the maximum power transmitted i e. And using equation (6) Power transmitted in Kilo Watts =(T_1-T_2)\times \displaystyle\frac{v}{1,000} Combining with equation (4) =T_1\left ( 1-e^{-\mu \,\theta } \right )\times\displaystyle\frac{v}{1,000} And using equation (6) =\left ( T_T-T_C \right )\left ( 1-e^{-\mu \,\theta } \right )\times\displaystyle\frac{v}{1,000} For a limiting value of T_T, it can be shown that the above equations for the power transmitted have a maximum value when, v=\sqrt{\left ( \displaystyle\frac{g\,T_T}{3w} \right )} i.e. T_C=\displaystyle\frac{1}{3}T_T It is usual to assume that the mean tension \displaystyle\frac{1}{2}(T_T-T_S) is constant at all speeds, and is therefore equal to the initial tension T_0. If T_C is neglected it then follows from equation (4) that: T_1=\displaystyle\frac{2\,T_0}{1+e^{-\mu \,\theta }} And hence the power transmitted at a given speed is proportional to the initial tension. A band brake is a brake in which the frictional force is applied by increasing the tension in a flexible band to tighten it around the drum. The principles of Band Brakes are similar to those of the preceding paragraphs, giving in this case the braking torque which can be applied to a rotating drum. There has been a slow but steady movement away from the use of Shoe and Drum Brakes by the automotive industry. The method of tackling problems associated with this type of brake can be seen in Example (15) Example - Example 1 A number of trucks are to be hauled by a rope passed round a hydraulic capstan; assuming a coefficient of friction of 0.25 between the rope and the capstan and a constant manual pull of 30 lb., derive an expression for the maximum pull on the trucks in terms of complete turns of rope round the capstan. What will be the horse power exerted by the capstan under these conditions when there are 2\displaystyle\frac{1}{2} turns of rope and it is being wound off at 100 ft/min.? From equation (3) \frac{T_1}{T_2}=e^{\mu \,\theta } From the question: T_2=30\,lb., \mu =0.25 and \theta =2\,\pi\, n\;radians From which: T_1=30\;e^{0.25\times2\,\pi \,n}=30(4.82)^n When n = 2.5 , T_1=1520\;lb. Using equation (7) the horse-power of the capstan is given by: \frac{(T_1-T_2)\times v}{550} = \frac{(1520-30)\times 100}{550\times 60}=4.52 \;h.p. To which must be added the power supplied manually which is: \frac{30\times 100}{550\times 60}=0.091\;h.p. So the horse-power taken by the trucks = 4.52+0.091=4.611\;h.p. The horse power taken by the trucks = 4.52+0.091=4.611\;h.p.
global_01_local_1_shard_00001926_processed.jsonl/50491
Click here to Skip to main content 13,799,972 members Click here to Skip to main content Add your own alternative version 196 bookmarked Posted 2 Mar 2006 Using UPnP for Programmatic Port Forwardings and NAT Traversal , 14 Mar 2006 Rate this: Please Sign up or sign in to vote. Universal Plug-n-Play lets your program create and edit port mappings in your router over the network. Universal Plug-n-Play ("UPnP") is an attempt to extend the concept of ordinary plug-n-play, so that it applies to more than just your own machine: it applies to the whole network. For example, with ordinary plug-n-play, when a new peripheral is connected to your machine, it is automatically discovered and configured from your machine without access to the peripheral itself. UPnP extends this idea to the network: when a new network device is connected to the network, it can be automatically discovered over the network, and configured remotely from your machine over the network. The idea is that a device can dynamically join a wired or wireless network, obtain an IP address, convey its capabilities, and learn about the presence and capabilities of other devices all over the network. UPnP envisions a future where all devices are networkable and controllable over the network, such as light switches, thermostats, toasters, automobiles, etc. More information can be found here. Since 2002, most routers have UPnP capability. This allows you to solve one of the more vexing problems for users of network programs that must accept an incoming connection from the Internet. Examples of these programs include P2P file sharing programs, interactive games and gaming, video conferencing, and web or proxy servers. To allow others on the Internet to connect to these programs, it is necessary to configure the router to accept incoming connections and to route the connection to a local machine on the LAN behind the router. This process is called "port forwarding" or "NAT traversal" ("Network Address Translation"). For the ordinary user, this process can be daunting. Moreover, it's often not easy to explain how to configure a router for port forwarding, for the reason that the method differs for each different type of router by each different manufacturer. UPnP works perfectly in this situation. With it, you can map a port-forwarding programmatically without user interaction. This article describes a utility that discovers current port mappings on a UPnP-enabled router, and allows you to add/edit/delete mappings. The utility is conceptually broken into two pieces: an engine that performs the actual work, and the UI that uses the engine. This way, it should be possible for you to re-use the engine for your own purposes. go back to top Requirements for UPnP To be able to remotely configure a router over a network from a local machine, you need the following: • UPnP on the local machine: Basically, you must have Windows® XP, any service pack. Older versions of Windows, including the very-popular Windows® 2000, will not work, as they do not have UPnP capability. It might also be necessary to enable UPnP, since a UPnP-capable OS does not necessarily have it turned on by default. • UPnP on your router: Most routers manufactured since 2002 will have UPnP capability. Again, it might be necessary to enable UPnP on the router, since it might not be turned on by default. In addition, if there is a firewall on the local machine, it must be configured to allow the underlying TCP and UDP communications on which UPnP relies. Specifically, it must be configured to pass TCP port 2869 and UDP port 1900. go back to top The debate: Convenience vs. Security Before going on, it's worthwhile to point out the current debate over whether it makes any sense to include UPnP capability on a router. Proponents argue based on convenience: It's hard to configure a router for port forwarding, and average users are not able to do it easily. There are different methods for each different router, and even if you can find the correct method, understanding it requires the user to learn confusing network terminology. Opponents argue that there's a significant security risk: Routers insulate local networks from the wilds of the Internet, by blocking incoming connections that are almost always malicious. This insulation is at the hardware level, and as such, it is often more effective than software such as software firewalls. Most users rely on this added layer of insulation to protect machines on their local network, and the average user relies on it without even being aware of it. But since UPnP allows any program, even malicious programs, to create a port mapping through the router, this added layer of insulation disappears. Moreover, with UPnP, the port mapping can be created even without any knowledge of the administrative password to the router, and thus can be created without the knowledge or consent of the user. For me, I side with the opponents of UPnP for routers. The added layer of security is a true benefit, and it benefits those most likely to need it (i.e., relatively unsophisticated users who are most often targeted by malicious programs). Moreover, although manual configuration of port mappings is complicated, the programs that absolutely need it are also complicated, and require a relatively higher level of user sophistication anyway. Finally, there are many alternative program architectures that do not rely on accepting incoming connections from the Internet (and hence do not need port mappings at all); these architectures usually require a third machine somewhere on the Internet (such as a rendezvous server or a relay server), but they eliminate the need for incoming connections, and operate just fine with outgoing connections only. But "security through obscurity" is never the answer. UPnP is here. Here's how to use it. go back to top The demo program The demo program is conceptually broken into two parts: an engine for the discovery of port mappings and for changing them, and a UI that uses the engine to allow the user to do what he wants. The source code itself is set up in a VC++ 6.0 workspace with four different configurations: Unicode and non-Unicode, debug and release for both. Microsoft's implementation of UPnP relies on COM, so you might need to become familiar with COM-style types such as BSTR and VARIANT. The source code makes liberal use of ATL macros such as T2OLE for conversion, where needed. go back to top The engine The engine actually performs three distinct types of tasks: device discovery (i.e., finding the router and getting the device information about it), retrieval of and changes to port mappings, and change-event notifications. Here are the public methods: // simplified view of PortForwardEngine.h class CPortForwardEngine virtual ~CPortForwardEngine(); HRESULT ListenForUpnpChanges( CPortForwardChangeCallbacks *pCallbacks = NULL); HRESULT StopListeningForUpnpChanges( ); BOOL GetDeviceInformationUsingThread( HWND hWnd ); BOOL GetMappingsUsingThread( HWND hWnd ); BOOL EditMappingUsingThread( PortMappingContainer& oldMapping, PortMappingContainer& newMapping, HWND hWnd ); BOOL AddMappingUsingThread( PortMappingContainer& newMapping, HWND hWnd ); BOOL DeleteMappingUsingThread( PortMappingContainer& oldMapping, HWND hWnd ); std::vector<PortMappingContainer> GetPortMappingVector() const; DeviceInformationContainer GetDeviceInformationContainer() const; BOOL IsAnyThreadRunning() const; The first thing you might notice is the reliance on threads. As implemented by Microsoft, UPnP relies on COM, and in this instance, COM is slow, usually requiring around three (3) seconds to complete, and sometimes requiring as many as ten (10) seconds. Not all the COM-related UPnP methods block during the time that they execute, but many do. The engine is therefore multi-threaded so that calls to its methods will not block your UI. The threads created by the engine post notification messages to your UI to advise your application of progress through the thread's execution, and to advise you when the thread is complete. This is the reason why the threaded functions each take a HWND as a parameter; this parameter is the window to which messages are posted. The same message is used for all of the engine's functions; the message is a UINT named UWM_PORT_FORWARD_ENGINE_THREAD_NOTIFICATION. The meaning of the message is encoded in the WPARAM and LPARAM values of the message. The actual value of the message is obtained by a call to ::RegisterWindowMessage(), so your UI must be prepared to handle registered messages. For MFC users, this means that your message map will use the ON_REGISTERED_MESSAGE() macro. The IsAnyThreadRunning() function is provided so that you can test whether any thread is running, before the shut-down of the program. This allows the thread object to delete itself, and prevents unintended memory leaks of CWinThread objects. For device discovery, your application should call the GetDeviceInformationUsingThread() function, which tries to find a UPnP-enabled router on the local network and to obtain information about the router (such as model name, manufacturer etc.) if a router is found. When the thread is finished (as signified by the thread's posting of a UWM_PORT_FORWARD_ENGINE_THREAD_NOTIFICATION message), the UI can call GetDeviceInformationContainer() to get a structure containing information about the device. Device discovery is based on the COM interface IUPnPDeviceFinder, which is part of Microsoft's "Control Point API". Documentation can be found at MSDN entitled "Control Point API Reference". Here's an explanation of the inner workings of GetDeviceInformationUsingThread(). Inside the thread created by the GetDeviceInformationUsingThread() function, CoCreateInstance() is called to get an instance of IUPnPDeviceFinder, and IUPnPDeviceFinder::FindByType() is called to get a IUPnPDevices collection of devices that match the requested type of device. The collection is enumerated/traversed to find each individual IUPnPDevice interface, and the following functions are called on the IUPnPDevice interface (see the MSDN documentation for IUPnPDevice): IUPnPDevice::get_Type Uniform() Frankly speaking, once the IUPnPDevices collection is obtained, the code is a bit tedious. The code is based in part on the sample code found at MSDN: "Device Collections Returned by Synchronous Searches". For retrieval of mappings, your application should call the GetMappingsUsingThread() function. When the function's thread completes (again, as signified by the thread's posting of a UWM_PORT_FORWARD_ENGINE_THREAD_NOTIFICATION message to your UI), the UI can call GetPortMappingVector() to get a std::vector which contains a collection of structures, each containing information about one mapping. Your application can also make changes to the mappings using the three self-explanatory functions of EditMappingUsingThread(), AddMappingUsingThread(), and DeleteMappingUsingThread(). The GetMappingsUsingThread() function is based on the COM interface IUPnPNAT, which is part of Microsoft's "NAT Traversal API". Documentation on this interface is scarce. For some reason, Microsoft has chosen to group this API with its API for "Internet Connection Sharing and Internet Connection Firewall". In addition to the difficulties caused by grouping NAT traversal with connection sharing, the on-line MSDN documentation for the NAT Traversal API does not have a separate entry in the table of contents, and does not sync well. The base page for documentation on IUPnPNAT is found at MSDN, entitled (simply) "IUPnPNAT". Inside the thread created by the GetMappingsUsingThread() function, CoCreateInstance() is called to get an instance of IUPnPNAT, and IUPnPNAT::get_StaticPortMappingCollection() is called to get a IStaticPortMappingCollection collection of static port mappings. The collection is enumerated/traversed to find each individual IStaticPortMapping interface, and the following functions are called on the IStaticPortMapping interface (see the MSDN documentation for IStaticPortMapping): Much the same processing is performed inside the threads created by the other port-mapping functions (i.e., inside the threads created by EditMappingUsingThread(), AddMappingUsingThread(), and DeleteMappingUsingThread()), except that different ones of the IStaticPortMapping functions are called, as follows: Event notification is interesting: every time there is a change in your router's configuration, it broadcasts (UDP) the change over the network. Microsoft's COM interface to UPnP can be configured to listen for these broadcasts, and to call callbacks within your program (if you register the callbacks properly). The changes are most commonly a change in a port mapping, but a notification is also received when there is a change in the router's external IP address. Implementation of event notification requires an actual implementation of all the virtual functions for the two COM interfaces of INATExternalIPAddressCallback and INATNumberOfEntriesCallback. Then, an interface to the IUPnPNAT's event manager (INATEventManager) is obtained through a call to IUPnPNAT::get_NATEventManager(). Using the INATEventManager interface, it's possible to register the implementation of the derived INATExternalIPAddressCallback interface (INATEventManager::put_ExternalIPAddressCallback()) and to register the implementation of the derived INATNumberOfEntriesCallback interface (INATEventManager::put_NumberOfEntriesCallback()). Because INATExternalIPAddressCallback and INATNumberOfEntriesCallback are, in a sense, COM servers, it is necessary to run them in the same thread as your main program, and that's how they're implemented (in a single-threaded apartment ("STA") model). Thus, event notifications are not run in a separate thread, unlike all the other functions we have discussed so far. To get these notifications in your application, call ListenForUpnpChanges(). The function takes a pointer to a CPortForwardChangeCallbacks object, but if you pass in NULL, the engine will use a default object. (CPortForwardChangeCallbacks is defined in the same source and header files as CPortForwardEngine, which is usually not recommended but which helps to keep these classes all in one place.) The default object simply displays a ::MessageBox() indicating that there has been a change. For more elaborate handling of change-notification-events, derive your own class from CPortForwardChangeCallbacks and override the virtual functions OnNewNumberOfEntries() and OnNewExternalIPAddress(). Here is the definition of the CPortForwardChangeCallbacks class: class CPortForwardChangeCallbacks virtual ~CPortForwardChangeCallbacks(); virtual HRESULT OnNewNumberOfEntries( long lNewNumberOfEntries ); virtual HRESULT OnNewExternalIPAddress( BSTR bstrNewExternalIPAddress ); To use your CPortForwardChangeCallbacks-derived class, new one of them on the heap and pass its pointer to the ListenForUpnpChanges() function, like so: ListenForUpnpChanges( new CMyDerivedPortForwardChangeCallbacks() ); You do not need to keep track of the new'd pointer; the engine will automatically delete the object for you when it's finished with it. go back to top The UI The UI uses the engine in fairly unsurprising ways. When the program is started, it immediately calls GetDeviceInformationUsingThread() to get and display information about any UPnP-enabled routers on the LAN. If a router is found, its name is displayed, and more information about it can be displayed by clicking on the "More information ..." button, which displays all the information obtained from the GetDeviceInformationUsingThread() function in the following dialog: Below the list of port mappings are four buttons that allow the user to retrieve port mappings from the router and to edit/add/delete them. Clicking one of these buttons invokes a corresponding one of the thread functions GetMappingsUsingThread(), EditMappingUsingThread(), AddMappingUsingThread(), or DeleteMappingUsingThread(). In addition, hidden progress bar controls are shown, and other changes are made to the appearance of the UI. Here's an example of the dialog that you see when a port mapping is added; a similar dialog is displayed when a mapping is edited. Only a confirmation-style dialog is displayed when a mapping is deleted. As mentioned above, the threads post messages to the UI to advise it of the thread's progress. Here's a simplified view of the message-handler in the UI, which responds to these messages: static const int msgPortRetrieve = 0x00F0 & CPortForwardEngine::EnumPortRetrieveDone; static const int msgDeviceInfo = 0x00F0 & CPortForwardEngine::EnumDeviceInfoDone; static const int msgAddMapping = 0x00F0 & CPortForwardEngine::EnumAddMappingDone; static const int msgEditMapping = 0x00F0 & CPortForwardEngine::EnumEditMappingDone; static const int msgDeleteMapping = 0x00F0 & CPortForwardEngine::EnumDeleteMappingDone; afx_msg LRESULT WPARAM wParam, LPARAM lParam) switch ( wParam & 0x00F0 ) case msgPortRetrieve: if ( wParam == CPortForwardEngine::EnumPortRetrieveInterval ) // this is a periodic notification message; // update the progress control m_ctlProgressComUpdate.SetPos( lParam ); else if ( wParam == CPortForwardEngine::EnumPortRetrieveDone ) // the thread is finished if ( !SUCCEEDED(lParam) ) // error: display message and take other action // finished with no error, // get the vector of mappings and use it PortMappingContainer> mappingContainer; mappingContainer = // display the port mapping and otherwise use them, etc.... // restore the appearance of the UI case msgDeviceInfo: if ( wParam == CPortForwardEngine::EnumDeviceInfoInterval ) // this is a periodic notification message; // update the progress control m_ctlProgressIgdDeviceInfo.SetPos( lParam ); else if ( wParam == CPortForwardEngine::EnumDeviceInfoDone ) if ( SUCCEEDED(lParam) ) // finished with no error; // get device information and use it m_DeviceInfoContainer = m_PortForwardEngine.GetDeviceInformationContainer( ); // display the device information // and otherwise use it, etc... // error: display message and take other action // restore the appearance of the UI case msgAddMapping: if ( wParam == CPortForwardEngine::EnumAddMappingInterval ) // this is a periodic notification message; // update the progress control m_ctlProgressAddUpdate.SetPos( lParam ); else if ( wParam == CPortForwardEngine::EnumAddMappingDone ) // the thread is finished if ( !SUCCEEDED(lParam) ) // error: display message and take other action // finished with no error // restore the appearance of the UI case msgEditMapping: // ... same as above for msgAddMapping case msgDeleteMapping: // ... same as above for msgAddMapping ASSERT ( FALSE ); // should never get here return 0L; The enums are defined in the CPortForwardEngine class. Basically, there are five kinds of messages (as measured by the WPARAM value of the message): messages for device information, for port mapping retrieval, for editing a mapping, for deleting a mapping, and for adding a mapping. There's a separate section of a switch statement for each different type of message, and each section then interprets the value passed by the LPARAM of the message. The precise values of the WPARAMs and the LPARAMs are explained in the comments in the source code for the engine. Change-event notifications are selected by checking the box labeled "Automatically listen for changes in the router". When this box is checked, the UI calls the engine's ListenForUpnpChanges() function, providing the engine with a pointer to a CPortForwardChangeCallbacks-derived object. The derived class is only a bit more complex than the default class: it simply displays a message asking the user if he wants to update the list of port mappings automatically now or manually later. Here's an example of the notification dialog when a change is detected in the number of mappings; a similar dialog is also displayed if a change is detected in the external IP address of the router: The UI also has a built-in web server, which is a nice feature for testing whether a port-forward mapping is operational. The user checks the box labeled "Start Web server", which in turn enables the web-server controls on the right-hand side of the display. The user can then test for incoming Internet connectivity, with the test results being displayed in the user's default browser. To get this to work, the user must create a port mapping on the same port as the listening port (which defaults to the arbitrary value of "9542" in the program). Once the port mapping has been created, and the program is set to listen for incoming connections, the test will cause a connection to be made to an external web-based proxy, which in turn will connect back through the user's machine using the newly-created port mapping. A successful test will look like this: If the test fails, it's possible that the external proxy is not working properly. The program is pre-configured with two proxies, so one of them should always be working. New proxies can be added (and non-working ones deleted) through modifications to the program's PortForward.ini file. Other changes can also be made to this ini file, which is largely self-explanatory. go back to top Installation package The download includes an installation package that installs the PortForward executable along with a short "Help" file (PortForward.chm). The installation package is named "PortForward100-Setup.exe", and the only changes made to your machine are the creation of a new directory (usually "c:\\Program Files\PortForward") and installation there of the executable and a few support files. There are no other changes made to your machine, not in the registry, not in the Windows folder, not anywhere else. There's even an un-installation program, so you can install the program with confidence. This installation package was built using Inno Setup, which I highly recommend. go back to top A quick rant Although this article is finished, I can't resist the opportunity for a quick rant. Why is it so hard to find documentation about this stuff? COM is difficult enough as it is (at least for me) without those difficulties being compounded by documentation that's hard to find, poorly organized, and incomplete. Microsoft's documentation for the IUPnPNAT interface, for example, is terrible. Just learning that IUPnPNAT is the interface you need is hard (search MSDN for "NAT Traversal API" and you won't find it). Once you determine that IUPnPNAT is the right interface, you're faced with a documentation that's poorly organized (why is it grouped as part of the ICS/Firewall API?) and largely incomplete. As one example, you can use the IUPnPNAT interface to get a collection of port mappings called IStaticPortMappingCollection, from which you can get an enumerator for each individual mapping. Not terribly straightforward, but normal enough in the COM world. But the enumerator that's returned is actually an IUnknown, and you need to guess at which one of the ga-jillion different kinds of IEnumXXXXs it actually is (it's an IEnumVARIANT, in case you're interested, which might seem evident after the fact but it certainly was not clear to me beforehand). And that's nothing compared to the pain of implementing callback interfaces for the INATEventManager. Web searching doesn't help much either. At the time of writing (February 2006), a Google search for IUPnPNAT turned up exactly 36 hits. 36!! And most of those hits were from people looking for help. Likewise, the documentation for IUPnPDeviceFinder could be much better. For example, to find a router, you need to give IUPnPDeviceFinder a BSTR that "specifies the type URI for the device". What's that? Searching at the website provided no help; there's nothing there that gives examples of the URI naming convention, or provides examples of the commonly-used URIs. At the end of the day, the "type URI" for a router turns out to be "urn:schemas-upnp-org:device:InternetGatewayDevice:1". No kidding. Does that surprise you or in any way seem to you like it might be self-explanatory or intuitive? Rant over. Thanks for listening. go back to top Bibliography and reference materials Here, in one place, is a list of all the articles and links mentioned in the article, as well as a few extra articles that might be helpful. Clicking the link will open a new window. General UPnP and NAT translation links: COM-related links: Inno Setup: go back to top License information The source code is licensed under the MIT X11-style open source license. Basically, under this license, you can use/modify the code for almost anything you want. For a comparison with the BSD-style license and the much more restrictive GNU GPL-style license, click here. • 2nd March, 2006 • Original release of the code and this article. • 12th March, 2006 • Updated the article to include a few more graphics and other changes. No change to the code. go back to top A list of licenses authors might use can be found here About the Author Mike O'Neill United States United States Mike O'Neill is a patent attorney in Southern California, where he specializes in computer and software-related patents. He programs as a hobby, and in a vain attempt to keep up with and understand the technology of his clients. You may also be interested in... Comments and Discussions QuestionThe purpose of this is so that we can write a client UPnP device Pin Member 130407986-Jul-17 20:23 memberMember 130407986-Jul-17 20:23  GeneralUNICODE error Pin Gerardo Sanchez18-Mar-15 15:08 memberGerardo Sanchez18-Mar-15 15:08  QuestionFull nat traversal soulution Pin dzimi8228-Jul-13 12:31 memberdzimi8228-Jul-13 12:31  QuestionCan you please convert the Source Code into VB.NET or C# Pin bEGI2329-Oct-12 10:40 memberbEGI2329-Oct-12 10:40  QuestionIt says it cannot add mapping Pin AccusingCube21-May-12 11:54 memberAccusingCube21-May-12 11:54  GeneralBIG Thank You - Best idea seen since long! Pin amiga00717-Mar-12 9:06 memberamiga00717-Mar-12 9:06  QuestionMisinformation Pin doug655364-Mar-12 17:42 memberdoug655364-Mar-12 17:42  QuestionInternet Gateways, different URI's ? Pin Riprage10-Jan-12 15:04 memberRiprage10-Jan-12 15:04  Questionget_StaticPortMappingCollection() return null. Pin Member 434194518-Oct-11 5:10 memberMember 434194518-Oct-11 5:10  AnswerRe: get_StaticPortMappingCollection() return null. Pin Peter Eugene Coleman25-Mar-14 3:37 memberPeter Eugene Coleman25-Mar-14 3:37  GeneralBig Thank You! Pin Member 815345211-Aug-11 23:37 memberMember 815345211-Aug-11 23:37  GeneralMy vote of 5 Pin Member 43208446-Aug-11 17:41 memberMember 43208446-Aug-11 17:41  Generalon my computer that dosnt work [modified] Pin Serg100821-Jan-11 7:58 memberSerg100821-Jan-11 7:58  Generalerrors compiling (vs2010) Pin DeveloperInABox7-Dec-10 2:51 groupDeveloperInABox7-Dec-10 2:51  GeneralRe: errors compiling (vs2010) Pin Mike O'Neill15-Dec-10 11:33 memberMike O'Neill15-Dec-10 11:33  GeneralWindows firewall & UPnP framework Pin snarehead13-Oct-10 2:51 membersnarehead13-Oct-10 2:51  GeneralRe: Windows firewall & UPnP framework Pin Mike O'Neill13-Oct-10 12:53 memberMike O'Neill13-Oct-10 12:53  GeneralRe: Windows firewall & UPnP framework Pin snarehead14-Oct-10 2:07 membersnarehead14-Oct-10 2:07  GeneralVery nice tool Pin ppp5117-Aug-10 7:20 memberppp5117-Aug-10 7:20  NewsuPnP portmapper -- alternative freeware project Pin fios_gateway_rapes_SIP14-Jul-10 14:57 memberfios_gateway_rapes_SIP14-Jul-10 14:57  Generalohh Pin alucard318610-Nov-09 13:10 memberalucard318610-Nov-09 13:10  GeneralNot working on wired router Pin jarmysz17-Sep-09 2:38 memberjarmysz17-Sep-09 2:38  GeneralThanks Pin Kent K1-Apr-09 19:58 professionalKent K1-Apr-09 19:58  GeneralProblems with Port Mappings on NetGear FVS318 router Pin g_s_sidhu20-Mar-09 20:42 memberg_s_sidhu20-Mar-09 20:42  QuestionLicense Pin BMW74016-Sep-08 22:01 memberBMW74016-Sep-08 22:01  Web05 | 2.8.181214.1 | Last Updated 14 Mar 2006 Article Copyright 2006 by Mike O'Neill Everything else Copyright © CodeProject, 1999-2018 Layout: fixed | fluid
global_01_local_1_shard_00001926_processed.jsonl/50515
From coreboot Jump to: navigation, search The wiki is being retired! The AMD XHCI controller in Hudson chip seems to be IP Core of Renesas uPD720200/200A. It looks the firmware consists of multi parts: XHCI firmware layout header 0xe bytes Offset Size in bytes What 0x0000 2 Signature 0x55aa 0x0002 2 Offset to the BCD (type0?) 0x0004 2 BCD size 0x0006 2 Offset to Main FW (type1?) 0x0008 2 Main FW size 0x000a 2 Offset to the ACD (type2?) 0x000c 2 Offset to the ACD BCD = Boot Configuration Data ACD = Application Configuration Data Main FW Offset Size in bytes What 0x0000 2 Firmware version - 0x3032 means 0x0002 - Firmware data, most likely V850E1 controller The firmware in blobs repository is, quite common version found on the internet matches well 0xcf0 bytes. It is not know where the 0.8 subversion is stored. The firmware entry point seems to be at the beginning of the firmware blob (right after the version bytes). At the end of the firmware there is some kind of function hook table. address space layout of the embedded microcontroller 0x00000000-0x00007FFF: internal mask ROM 0x00008000-0x0000FFFF: loaded firmware (without version bytes)
global_01_local_1_shard_00001926_processed.jsonl/50546
OPINION: Microsoft lost its antitrust suit two decades ago. What if it had won? It’s been 20 years since the U.S. Department of Justice and 20 state attorneys general sued Microsoft for violating federal antitrust laws. The government argued that Microsoft illegally protected its Windows monopoly and used it to try to kill competitors to Internet Explorer, notably Netscape. The suit also charged that the company used its operating system muscle to target Apple, Lotus Software, RealNetworks, Linux and others. In late 1999, Judge Thomas Penfield Jackson ruled against Microsoft. A lot has changed since then, but how much of that change is due to that landmark ruling? Before the suit, Microsoft was the world’s most influential technology company, with Windows essentially a monopoly in operating systems, Microsoft Office a monopoly in productivity suites and Internet Explorer a top browser. Today, of course, the tech world is a very different place, with Google, Facebook and others wielding more power than Microsoft, with Windows overshadowed by mobile operating systems and with Microsoft’s browsers mere also-rans. In a recent op ed piece in The New York Times, Richard Blumenthal, now a senator from Connecticut, but back in the late ’90s the state’s attorney general and thus part of the suit, and Tim Wu, a law professor at Columbia, argue that the growth and innovation of the internet since then was a direct result of that suit. Without the suit, they say, the internet would be a far less innovative place. They claim, “Microsoft would have controlled the future of the web.” Google, they say, likely would have been killed in its infancy by Microsoft, and we would all be using Bing today. They also write, “Microsoft-Myspace might have become the default social network instead of Facebook.” They even argue that Netflix and other streaming media services might not have ever come to exist. It all sounds very compelling. But is it true? It’s not. Although the government was right to go after Microsoft for its anticompetitive actions, the state of the internet wouldn’t be all that different than it is today if Microsoft had won the case. To understand why, take a look at the core of the suit. Microsoft argued that Internet Explorer was an integral part of Windows, that its code was required for Windows to operate properly, and that unbundling it from Windows and allowing people to easily use other browsers would significantly harm the operating system. It was a ludicrous argument, and the court rightly ruled against Microsoft. It forced Microsoft to let people easily use other browsers than Internet Explorer. Allowing people to choose their own browsers, though, had nothing to do with Google’s success. When Google first launched, in 1998, Internet Explorer had a 45% share of the browser market, which rose to 75% the following year, and reached 94%, its peak, by 2002. During those years, as Internet Explorer increasingly dominated the market, Google took off like a rocket, so Microsoft’s browser success did nothing to impede Google. Chrome, which is now the dominant browser, didn’t exist yet. Google succeeded for a simple reason: It was the best search engine in the world. No matter which browser you used, you used Google to search because it was far better than the competition. People avoided Microsoft’s MSN search like the plague because it was such a bad search tool. Bing wasn’t even introduced until 2009. As for Facebook, the claim that “Microsoft-Myspace” would be the world’s most popular social network if Microsoft had won the suit is just plain weird. Microsoft never owned Myspace. Facebook was launched in 2004, at a time when Internet Explorer’s share of the browser market was a stratospheric 91%, and that did nothing to hold back Facebook. Rupert Murdoch’s News Corp. bought Myspace in 2005, and the upstart Facebook beat Myspace and the global might of News Corp. because it was a far better social network. There’s another oddball claim that Blumenthal and Wu make, that Netflix might not exist if Microsoft had won the antitrust suit. Netflix began in 1998 as a DVD rental service, and its competition was Blockbuster, not Microsoft. It wasn’t until 2007 that it launched its streaming feature — and Microsoft wasn’t in the business of streaming. A common thread runs through the Google-Facebook-Netflix successes. They became what they are because they’re all better at what they do than anyone else. And they did it during the years when Internet Explorer had a monopoly or near-monopoly on the browser market. That did nothing to stop their dramatic growth. The same holds true for the success of the iPhone and Android. Microsoft had a mobile operating system before Apple and Google, but it was pitifully bad. Microsoft’s attempts to make it in the mobile market have been dismal failures despite the billions of dollars spent. But that has nothing to do with the company being forced to unbundle its browser from Windows. It’s because the company never really understood what people wanted in mobile phones. So, although Microsoft was a powerful company back in the late 1980s and 1990s, the internet was far more powerful. And the internet would have remained far more powerful even if Microsoft had won the suit and Internet Explorer retained top market share. What would the tech world look like today if Microsoft had won the antitrust suit? Not much different than it is. Google, Facebook, Netflix and Amazon would still rule the Internet. Windows’ hold on the operating system market would still have plummeted, taking a back seat to mobile OSes. It’s possible that Internet Explorer or its successor, Edge, would now be the world’s most popular browser, which would certainly be a bad thing. But the internet as we know it would largely be the same. It remains more powerful than any one company, even one as dominant as Microsoft was 20 years ago. And it will stay that way.
global_01_local_1_shard_00001926_processed.jsonl/50568
Lead-Free Remote Water Control Valve Product Description The 'Reduction of Lead in Drinking Water Act,' more commonly known as the Lead-Free law, requires that every pipe, fixture, and fitting used to convey water for potable use contain less than 0.25% of lead by weight. The Air Techniques remote water control valve contains all lead-free components. All connections are either threaded or have a mechanically pressed pipe with o-ring seal'no soldered connections. The lower portion of the system can be turned 180° to mate with the inlet coming from either the left or the right. The solenoid valve body is constructed of 304 stainless steel. Get the CE You Need Courtesy of Air Techniques If the California Dental Association’s CDA Presents in Anaheim is on your itinerary next week, then be... Read More Have Your X-rays Gone Digital Yet? Technology has come a long way since Wilhelm Conrad Röntgen received the first Nobel Prize in Physics in 1901.... Read More Cam-X Triton HD: 'A Must-Have Piece of Technology' Air Techniques brings the lights and camera—making it easy for you take action when the multipurpose... Read More Customer Reviews Rating Breakdown(0.0 average) Write a Review Lead-Free Remote Water Control Valve Air Techniques Request Info
global_01_local_1_shard_00001926_processed.jsonl/50574
Honesty Quotes | Honest Quotations | Inspirational Quotes Honesty Quotes Honesty Quotes Honesty quotes: Honesty means telling the truth even if the reality is unpalatable and unsavory.  Making someone cry by uttering truth is a lot better than concealing the reality or telling a lie in order to make the listener happy temporarily. Honesty means not only speaking truth; it is also not to steal, cheat, or deceive in anyway. Being honest is important for genuine relationships. Being honest isn’t always easy; otherwise we'd all do it all the time. Sigmund Freud said “Being entirely honest with oneself is a good exercise.” We list herewith certain best quotes for being honest: Honesty Quotes, Honest Quotations ― Noel Coward “No legacy is so rich as honesty.”  ― William Shakespeare “The high road is always respected. Honesty and integrity are always rewarded.”  ― Scott Hamilton ― Hugh Prather Honesty Quotes “In the years ahead of me, I learned that the world is actually filled with people ready to tell you how likely something is, and what it means to be realistic. But what I have also learned is that no one, no one truly knows what is possible until they go and do it.” - Liz Murray “Honesty prospers in every condition of life.”  ― Friedrich Schiller ― Franklin D. Roosevelt “Honesty will never break you.”  ― Kate Hudson “Confidence in others’ honesty is no light testimony of one’s own integrity.”  ― Michel de Montaigne “Honesty does not always bring a response of love, but it is absolutely essential to it.”  ― Ray Blanton “Concentration is my motto – first honesty, then industry, then concentration.”  ― Andrew Carnegie “Your conscience is the measure of the honesty of your selfishness. Listen to it carefully.”  ― Richard Bach ― Thomas Jefferson Honesty Quotes  “Honesty is the most single most important factor having a direct bearing on the final success of an individual, corporation, or product.”  ― Ed McMahon Honesty Quotes Honesty Quotes Honesty Quotes  Mary Kay Ash “I believe fundamental honesty is the keystone of business.”  ― Harvey S. Firestone ― John Ruskin “In finding love, I think it's important to be patient. In being in a relationship, I think it's important to be honest, to communicate, to respect and trust, and to strive to give more than you take.” ― Kina Grannis “Honesty is as much saying everything as it is saying what is true.”  ― Richard Snelling “Honesty is something you can’t wear out.”  ― Waylon Jennings “Honesty is the best policy.”  ― Benjamin Franklin “Build me a son, O Lord, who will be strong enough to know when he is weak, and brave enough to face him when he is afraid, one who will be proud and unbending in honest defeat, and humble and gentle in victory.” ― Douglas MacArthur ― Leo Buscaglia “Be honest, be nice, be a flower not a weed.” ― Aaron Neville “The Edge... there is no honest way to explain it because the only people who really know where it is the ones who have gone over.” ― Hunter S. Thompson “Honesty and loyalty are key. If two people can be honest with each other about everything, that's probably the biggest key to success.” ― Taylor Lautner “Just be yourself. Be honest, work towards a goal, and you'll achieve it.” ― Emraan Hashmi “I like being a strong, independent woman, and to be honest, I was never afraid to be on my own.” ― Dido Armstrong ― Lao Tzu “It is a full time job being honest one moment at a time, remembering to love, to honor, to respect. It is a practice, a discipline, worthy of every moment.” ― Jasmine Guy “I think that if I ever have kids, and they are upset, I won't tell them that people are starving in China or anything like that because it wouldn't change the fact that they were upset. And even if somebody else has it much worse, that doesn't really change the fact that you have what you have.”  ― Stephen Chbosky, ― Jess C. Scott “Don't bend; don't water it down; don't try to make it logical; don't edit your own soul according to the fashion. Rather, follow your most intense obsessions mercilessly.”  ― Franz Kafka ― Virginia Woolf “An honest man is always a child.” ― Socrates ― Maya Angelou ― Audrey Hepburn Honesty Quotes Honesty Quotes Honesty Quotes Honesty Quotes  “It's discouraging to think how many people are shocked by honesty and how few by deceit.”  ― Noel CowardBlithe Spirit ― Laura Ingalls Wilder ― Albert Einstein “Most men would rather deny a hard truth than face it.”  ― George R.R. Martin ― Mahatma Gandhi ― Robert Louis Stevenson  “Honesty is the first chapter of the book wisdom.”  ― Thomas Jefferson “Truth never damages a cause that is just.”  ― Mahatma Gandhi ― Leo Tolstoy ― Charles Dickens “You wear a mask for so long, you forget who you were beneath it.”  ― Alan Moore Inspire Quote:  Honesty Quotes Honesty Quotes Honesty Quotes Honesty Quotes Honesty Quotes Honesty Quotes Honesty Quotes Recent Articles Get Inspire Inspire Tags Norman Douglas (1)Julie Andrews (1)Suzy Kassem (1)Parents day Quotes (1)Bill Gates (1)Freddie Highmore (1)Ferdinand Marcos (1)Valentine Day (1)Sophie Swetchine (1)john dewey (1)plato (1)Mikaela Shiffrin (1)team management (1)Rod Blagojevich (1)Martin Luther King Jr (1)Barack Obama (1)Business person (1)Leadership Quotes (1)Kamal Hassan (1)Nick Vujicic (1)Thomas Edison (1)Women Quotes (1)Vision Quotes (1)Lucius Annaeus Seneca (1)Sydney J. Harris (1)Parents (1)Young Jeezy (1)Matt Cartwright (1)A.P.J. Abdul Kalam (1)Paul Watson (1)Jamie Oliver (1)Nature Quotes (1)Vincent Van Gogh (1)Alexander Solshenitsen (1)Charles Dickens (1)Angela Merkel (1)Jack Ma (1)Marathon (1)Benjamin Disraeli (1)Sports Quotes (1)Julius Erving (1)Andrew Shue (1)Monique Murphy (1)Erma Bombeck (1)M.J.Ryan (1)B. F. Skinner (1)Poem (1)David Levithan (1)Yuval Noah Harari (1)Patrick Henry Hughes (1)Women (1)Nobel Prizes (1)Hope Quotes (1)Bobby Scott (1)Clare Boothe Luce (1)William Butler Yeats (1)education quotes (1)Erykah Badu (1)Jeff Hawkins (1)Bertrand Russell (1)Peace Quotes (1)Love Quotes (1)Quotations on Valentine Day (1)John Powell (1)Dr T.P.Chia (1)Marty Rubin (1)Self-Discipline Quotes (1)Yogi Berra (1)Christiane Northrup (1)Jessica cox (1)Business quotes (1)Henry Wadsworth Longfellow (1)Commitment quotes (1)Poorna Malavath (1)Margaret Heffernan (1)Mary Kay Ash (1)Music Quotes (1)Harry Stack Sullivan (1)Time management skills (1)Maya Angelou (1)William Arthur Ward (1)Kofi Annan (1)Harvey Mackay (1)Learning Quotes (1)Memorial Day (1)Michelle Obama (1)Mark Twain (1)Steven Pressfield (1)Quotations on Stregnth (1)Relationship quotes (1)Sania Mirza (1)Oscar Wilde (1)Pallam Raju (1)C.S. Lewis (1)Hope quotations (1)Conan O Brien (1)Calvin Coolidge (1)Stephen Covey (1)Money (1)Lou Rawls (1)Mary Anne Radmacher (1)Anthong Foxx (1)Amit Kalantri (1)Khashaba Dadasaheb Jadhav (1)New Year (1)Indian Film Actor (1)Arthur C. Clarke (1)Intelligence Quotes (1)Mark Frauenfelder (1)Failure quotes (1)Richard Branson (1)Sports Inspiration (1)Randy Pausch (1)Running (2)Orson Scott Card (1)Eric Ripert (1)Courage Quotes (1)Punctuality (1)Creativity (1)Marc Benioff (1)Sean Swarner Everest Climber (1)Most Inspirational Quotes (1)Rick Pitino (1)Mahatma Gandhi Quotes (1)Indian Successful CEOs (1)Benjamin Franklin (1)Shiv Khera (1)D.H. Lawrence (1)Robert Gately (1)Humanity (1)Marathon Racer (1)Thomas Carlyle (1)Management quotes (1)George Horace lorimer (1)Anita Roddick (1)Satchel Paige (1)inspirational quotes (1)Rudyard Kipling (1)Positive Thinking (1)Behaviour (1)Friendship Quotes (1)Failure Management quotes (1)J.K. Rowling (1)Marriage Quotes (1)Henry J. Kaiser (1)Aesop (1)John F. Kennedy (1)Passion Quotes (1)Andrew Carnegie (1)Health quotes (1)Liz Murray (1)Douglas Adams (1)Wilfred Peterson (1)Failure Management (1)Leo Buscaglia (1)Quotations On Memorial Day (1)Soft skills (1)Curtis Carlson (1)Tom Peters (1)Winston S. Churchill (1)Poetry (1)Narendra Modi (1)Oliver Sacks (1)Do it (3)Strength (1)Karin Slaughter (1)Service (1)Abraham Lincoln (1)Orison Swett Marden (1)Robert Breault (1)Rick Steves (1)Quotes On Travel (1)Marvin Bower (1)Scilla Elworthy (1)Laurence J. Peter (1)Amy Schumer (1)Aristotle (1)Never give up (2)Family Quotes (1)Gautama Buddha (1)Hermann Hesse (1)Quotes (1)Romance (1)Emma Thompson (1)Quotations on Romance (1)Team Building Quotes (1)Hilarie Burton (1)Yehuda Berg (1)Faith quotes (1)Robert Collier (1)Voltaire (1)Marcus Tullius Cicero (1)King Solomon (1)Henry Wheeler Shaw (1)God Quotes (1)Jacky Ickx (1)James Heckman (1)Oprah Winfrey (1)Attitude Quotes (1)Robert De Niro (1)Vincent Nichols (1)James Altucher (1)Daniel H.Pink (1)Dave Ramsey (1)Jim Rohn (1)Fathers day quotes (1)James Humes (1)Og Mandino (1)Punctuality skills (1)Patriotism (1)Peter drucker (1)Earl Wilson (1)Larry Bird (1)C.G. Jung (1)Isak Dinesen (1)encouragement quotes (1)Micky Ward (1)Gerald Chertavian (1)Floyd Mayweather Jr. (1)George Bernard Shaw (1)Mother Quotes (1)W. C. Fields (1)Achievement (4)Mother Theresa (1)Joseph Addison (1)Kumar Mangalam Birla (1)Knowledge Quotes (1)Time management (2)Success quotations (1)Shaun White (1)team work (1)Apple CEO (1)Julia Gillard (1)Team Management Quotes (1)Spirituality Quotes (1)Wisdom Quotes (1)Goal Setting Quotes (1)Andre Gide (1)Bernard Baruch (1)Inspire (2)Jean Chatzky (1)Chance Quotes (1)Ludwig van Beethoven (1)Invention (1)Quotes on Sympathy (1)Damian Woetzel (1)Marya Mannes (1)Adam Grant (1)Leo Rosten (1)M.Scott Peck (1)Miguel de Cervantes (1)Joe Morgan (1)Paul J.Meyer (1)Quotes on Teenage (1)Judy Blume (1)Groucho Marx (1)Hard Work Quotes (1)Brian Greene (1)Louis Pasteur (1)Swami Vivekananda (2)Howard Schultz (1)William Makepeace Tahckeray (1)Peggy Fleming (1)Tracy Morgan (1)Brain Tracy (1)Honesty Quotes (1)Top 10 Indian CEO’s (1)Religion Quotes (1)Inventors killed (1)John Quincy Adams (1)Antoine de Saint-Exupéry (1)Tom Freston (1)Jacob A. Riis (1)C. JoyBell C Biography (1)Positive Thinking Quotes (1)James Cash Penney (1)Anne Morrow Lindbergh (1)Lee Atwater (1)Stephen King (1)Inventors (1)Mahatma Gandhi (1)Criss Angel (1)Travis Bradberry (1)Steve Jobs Quotes (1)Entrepreneur (1)Alan Greenspan (1)Quotations on Patriotism (1)Alex Morritt (1)Communication Quotes (1)Thad Cochran (1)Happiness quotes (1)Shannon L. Alder (1)New Year's Quotations (1)William Morris (1)Madonna Ciccone (1)Teachers’ Day Quotes (1)Do the work (1)Dale Carnegie (1)Motivational Quotes (4)Hope (1)Paul Mellon (1)Hard work (3)Brene Brown (1)Farmer (1)Brian Acton (1)Jane Addams (1)Leonard Cohen (1)Naveen Jain (1)Helen Keller (1)Abdul Kalam Quotations (1)James Whitcomb Riley (1)Team work quotes (1)Mark Pocan (1)Steve Jobs (1)Albert Schweitzer (1)No idling (1)Tommy Lasorda (1)Shari Arison (1)Truth (1)Emotional Quotes (1)Conrad burns (1)Humor Quotes (1)Darell Hammond (1)Innovation (1)John D. Rockefeller (1)Inspiration (3)William Feather (1)Life Quotes (1)Richard Carlson (1)Change Quotes (1)Epictetus (1)Harriet Beecher Stowe (1)Legal Quotes (1)Albert Einstein (1)Alibaba Founder (1)Ernest Hemingway (1)Funny Quotes (1)John Dryden (1)democritus (1)Henry Ford (1)Bill Clinton (1)Experience Quotes (1)Steven Wright (1)Fyodor Dostoyevsky (1)Earl Nightingale (1)Angela Ruggiero (1)Vince Lombardi (1)Rabindranath Tagore (1)Scientists (1)dream quotes (1)Melody Beattie (1)Charles Lamb (1)Ronald Ross (1)Glenn Greenwald (1)Spiritual Leader (1)Games (1)Appreciation Quotations (1)Siri Hustvedt (1)Daniel Goleman (1)Vera Nazarian (1)Alexander Graham Bell (1)Never Give Up Quotes (1)Great Quotes (1)Success (10)Sympathy (1)Tony Robbins (1)Jon Oringer (1)Virginia Postrel (1)H.Jackson Brown (1)Gilbert K. Chesterton (1)Walt Disney (1)Leadership (1)Dalai Lama (1)Conrad Hilton (1)Fitness Quotes (1)Quotes on Truth (1)Drake (1)Nelson Mandela (1)Hunter S. Thompson (1)Lou Holtz (1)Immigration Quotes (1)Sudha Chandran (1)Successful woman (1)Laws of life (1)Jean Paul Friedrich (1)Mireille Guiliano (1)Quotations on money (1)Persistence Quotes (1)Integrity Quotes (1)
global_01_local_1_shard_00001926_processed.jsonl/50576
pied wagtail 1. a British songbird, Motacilla alba yarrellii, with a black throat and back, long black tail, and white underparts and face: family Motacillidae (wagtails and pipits) Examples from the Web for pied wagtail Historical Examples of pied wagtail • The pied-wagtail, with its black and white plumage—or black, grey, and white in the winter—can be identified at a glance. Birds in Flight W. P. Pycraft
global_01_local_1_shard_00001926_processed.jsonl/50610
Space Systems Latitude and Longitude Making Earth Art With Google Earth Making Visible the Path of the Sun The sun rises in the east and sets in the west. This we know from personal observation. But have you ever thought about where the sun is in the sky at the same time each day? You might think the sun would appear at the same place at the same time each day. This would be true if Earth had no tilt and its orbit were a perfect circle. But this is not the case. Subscribe to Space Systems
global_01_local_1_shard_00001926_processed.jsonl/50620
CANON Pixma MX 895 We have found 8 products matching your search request for 'CANON Pixma MX 895'. Matching cartridges
global_01_local_1_shard_00001926_processed.jsonl/50625
About Us Established in 1966 this is a family owned and operated business started by Edward to cover a niche market – at the time Japanese Cars were new to the Aussie market and no one in Sydney was specialising in these cars. Through the 70s and 80s Edward’s niche market was a runaway success but everyone had jumped on the bandwagon! In this time Edward was recognised for his dedication to excellence and integrity in the motor industry and has always been a key member of the MTA (Motor Traders Association). He was recognised by his peers in 1995 when he was elected President of the MTA (NSW) and in 1996 when he was elected as President of the MTAA (Motor Traders Association Australia), an honour that has never been bestowed before or since to an independent used car operator. In 1996 with true pioneering spirit, Edward once again saw the opportunity to establish himself in a niche and began importing exciting second hand vehicles from Japan. Today Edward Lee’s Imports is the market leader, being the largest volume retailer of imported Japanese cars in Australia. We are proud to be at the cutting edge introducing the newest eligable imported cars to the Australian market. The latest cars we have been approved to import are: Edward Lee is now a proud grandfather and happily semi-retired leaving Philip Lee his son to run the business and keep the dream alive!” Edward and Philip in 1971 Edward and Philip in 1971
global_01_local_1_shard_00001926_processed.jsonl/50634
Intersec Building puts the spotlight on safety and security technology at Light + Building The growing demand for connected safety and security technology in buildings and smart cities will be underscored from 8 to 13 March 2020 by Intersec Building with the Intersec Forum as the information interface. Both are component parts of the Light + Building trade fair and will offer an interdisciplinary overview of connected safety and security in the field of building-services technology. “Safety and security technology has been and is an integral part of Light + Building”, confirms Wolfgang Marzin, President and Chief Executive Officer (CEO) of Messe Frankfurt. Moreover, he adds, “With Intersec Building, we are putting the spotlight on connected safety and security technology. As a growing sector, it is an increasingly indispensable aspect of various fields of building-services technology and thus needs a clearly defined event focus.” With Intersec Building, Light + Building will cater for specific interests on both the demand and supply sides and thus actively promote digital business models. Manufacturers will use Intersec Building to present technologies relevant to safety and security to the trade visitors, such as data-protection software, access control and surveillance systems while using Light + Building as a com­prehensive platform for building-services technology. Simultaneously, the demand side will benefit from a more concentrated product segment. The main information interface of the new aggregated product segment is the Intersec Forum. The conference for networked security technology filters innovations, discusses challenges and promotes the exchange of ideas and information in the sector. “This is where you can find out, for example, how hardware and software can be purposefully integrated with each other in the context of interconnected building-services technology”, comments Wolfgang Marzin. In March 2018, Intersec Forum inspired 650 participants to actively exchange ideas and information. The focus of the event was on interconnecting systems, products and digital applications in the field of power-controlled safety and security technology.
global_01_local_1_shard_00001926_processed.jsonl/50668
End Of Chapter Activity Exercise 12.8 In your school, collect (anonymous) data about learners' performance in Grade 10 Mathematical Literacy during the June 2012 examination. This must grouped be in terms of the levels that each learner has achieved, e.g Level 1 (\(\text{0}\%\) - \(\text{29}\%\)), Level 2 (\(\text{30}\%\) - \(\text{39}\%\)), and so on. Organise the data collected into a frequency table. Learner-dependent answer Draw a histogram for the data collected, clearly label both axes and provide a meaningful heading. Learner-dependent answer Refering to your histogram, clearly state which level most learners achieved, and what the reason for this trend could be. Learner-dependent answer After the first term Mathematical Literacy test was written at Lerato Secondary School, the Head of department sampled the scripts of \(\text{11}\) learners out of a class of \(\text{42}\). The results of these \(\text{11}\) learners were as follows (out of a total of \(\text{50}\) marks): \(\text{22}\); \(\text{16}\); \(\text{45}\); \(\text{35}\); \(\text{40}\); \(\text{25}\); \(\text{42}\); \(\text{37}\); \(\text{41}\); \(\text{35}\); \(\text{27}\) Arrange the set of marks in an ascending order. \(\text{16}\); \(\text{22}\); \(\text{25}\); \(\text{27}\); \(\text{35}\); \(\text{37}\); \(\text{40}\); \(\text{41}\); \(\text{42}\); \(\text{45}\) Determine the mean mark of the learners sampled. Mean = \(\text{33,18}\) Determine the median mark of the learners. Median = \(\text{35}\). Determine the mode of the learners' marks. Mode = \(\text{35}\). Calculate the range of the learners' marks. Range = \(\text{45}\) - \(\text{16}\) = \(\text{29}\). Convert the mean mark obtained above to a percentage (round off the answer to one decimal place). \(\frac{\text{33,18}}{\text{50}} \times \text{100}\) = \(\text{66,36}\%\) = \(\text{66,4}\%\) Gaab is a citrus farmer who grows orange trees. After one season of growth, he measures the height of a sample of his trees. \(\text{50}\) trees were chosen and the results were recorded. Height in cm Number of trees \(\text{0}\) - \(\text{139}\) \(\text{140}\) - \(\text{149}\) \(\text{150}\) - \(\text{159}\) \(\text{160}\) - \(\text{169}\) \(\text{170}\) - \(\text{179}\) \(\text{180}\) - \(\text{189}\) \(\text{190}\) - \(\text{199}\) Use the above given information to draw a histogram. Label your graph with a heading and both axes labelled. Use your histogram to determine the most common height interval. \(\text{150}\) - \(\text{159}\) \(\text{cm}\) Which height interval was the least common? \(\text{190}\) - \(\text{199}\) \(\text{cm}\) A survey was done at Thahameso Secondary School to determine which subjects learners enjoyed the most. A total of \(\text{100}\) learners were interviewed. Look at the table below: Maths Lit Life Sciences Life Orientation Business Studies Number of learners Draw a neat bar graph to represent the above information. Clearly label your graph with a heading. Label both axes. Which subject is the most popular and why do you think this is so? History is the most popular subject. This could be because students like the history teacher the most. The following table is a record of rainfall in mm for the town of Bethlehem during the month of January 2012. The data was collected over \(\text{7}\) days. Rainfall (mm) Determine the mean rainfall for the town of Bethlehem for the \(\text{7}\) days of observation. Mean = \(\text{25}\) \(\text{mm}\). Calculate the mode. Mode = \(\text{20}\) \(\text{mm}\). Determine the median rainfall for the town of Bethlehem for this week. Calculate the range of the data. Range = \(\text{40}\) - \(\text{10}\) = \(\text{30}\) \(\text{mm}\). Draw a neat line graph for the above data. Label both axes and give the graph a heading. The pie chart below represents data about what kinds (or genres) of movies people watch. This data was gathered by asking a sample of people to answer questions and their choice of films. Study the pie chart carefully and answer the questions that follow. What kind of movie is watched the most? Comedy movies. What percentage of all the movies watched is this (the most watched movie)? According to the pie chart, some kinds of movies are watched the same amount. Which two pairs of movies are watched the same amount? Romance and Drama movies, and Foreign and Science Fiction movies Supposed a sample of \(\text{200}\) people were interviewed. What is the number of people in the sample who watch action movies? \(\text{18}\%\) of \(\text{200}\) people is \(\text{36}\) people. What is the number of people who watch science fiction movies? \(\text{8}\%\) of \(\text{200}\) people is \(\text{16}\) people. Write the number of people who watch action movies and the number of people who watch science fiction movies as a ratio in its simplest form. \(\text{18}\) : \(\text{8}\) = \(\text{9}\) : \(\text{4}\) Give two reasons for why you think the percentages of people watching science fiction movies and foreign movies are the lowest. There may be less science fiction and foreign movies made or screened, or they may simply be less popular. Melissa measures her heart rate every half hour during the morning, and she draws up the following table of results: Time of day Heart rate 9:00 a.m. 9:30 a.m. 10:00 a.m. 10:30 a.m. 11:00 a.m. 11:30 a.m. 12:00 p.m. 12:30 p.m. 1:00 p.m. Plot a line graph of the data in the table. Describe what you notice about the graph. Melissa's heart rate increases suddenly at 10:30 a.m. Apart from this spike, it is fairly consistent, within a small range. Why do you think that her heart rate increases suddenly during the day? It may have increased if she exercised - e.g. if she went for a walk or a run.
global_01_local_1_shard_00001926_processed.jsonl/50689
Foodservice Equipment Reports Meiko kube\CS 70: Thinking Outside The Box Meiko announces the launch of the kube\CS 70; a chemical sanitizing, door-type dishmachine. The machine is Energy Star and NSF rated with a maximum throughput of 40 racks per hour. Using a mere 1.08 gal. of water in a 90-second cycle, the kube\CS 70 is one of the most-efficient machines on the market. Built with a single-piece of 304 stainless, door-construction is the kube’s namesake. A durable, wraparound, cube-like door eliminates the multi-piece door guides of other models. The digital control panel and dosing pumps are mounted underneath the machine for time-saving operation, maintenance and chemical agent access. The NAFEM Show Booth #217 Related Articles Meiko, Biotrans Set Up New Food Waste Business Industry Moves and Promotions: Personnel Appointments
global_01_local_1_shard_00001926_processed.jsonl/50695
Create Game Lists on FilmCrave home    Movies  Members Search + Searching... Close   Are you sure you want to delete this comment?   Login Using Facebook Spoiled Rotten View Chris Kavan's Profile By Chris Kavan - 08/25/10 at 10:16 AM CT If there is one downfall to having instant access to information via this wonderful thing called the internet, it's that you also have instant access to things best left undiscovered. The days of the twist ending and surprise factor is, for the most part, gone. Be it movies, TV shows, even books - if you want to find out what happens, you can surely dig around and spoil yourself. I admit I have gone digging myself and I regret it every time. You can also run into the ass that spoils things too by talking, usually in a very loud voice, about exactly what happens - quote Homer Simpson "Wow! What an ending. Who would have thought Darth Vader was Luke Skywalker's father?" I won't spoil them (if you want to be weak-willed, by all means hit the Spoilers Thread in the forum) - but here are some movies that are best left discovered on your own. 1) The Sixth Sense - I'm sure most people have seen this, but there are such things as future generations. They should be just as surprised at this masterful twist ending as we were. M. Night may not be regarded in such high esteem, but his was surely one of his best efforts. 2) The Crying Game - I admit I know about the end, but I haven't seen this film, so I broke my own rule. If you don't know what happens, then go watch this movie, I guarantee you won't see it coming. 3) The Usual Suspects - A mystery, wrapped in an enigma, wrapped in a crime. If the name Keyser Soze doesn't ring a bell, then by all means watch this intriguing film. It may take you a few times to wrap your head around it, but that's the beauty of this movie. 4) Memento - Yes, it starts at the end, but spoiling the beginning is much worse. This is a film that deserves to be watched with no prior knowledge and may require repeat viewings to totally discern. 5) Audition - The last 15 minutes are brutal, but if you know what's coming it kind of defeats the whole purpose of building up Takashi Miike's horror film. It starts off as a light drama but ends unbelievably. You must SEE it to believe it - so watch it, don't read about it. If you can manage it, put your inquisitive mind to rest. It may be impossible to avoid all spoilers, but the gratification you get from finding out what happens only serves to lessen the impact when actually viewing it. And if you're one of those people who like spoiling things, you're a jerky jerk face and should be ashamed of yourself. Avoid spam Captcha: Sign Up + or Log In +    Recent Blog Posts All Posts December 2018 November 2018 October 2018 September 2018 August 2018 July 2018 June 2018 May 2018 April 2018 March 2018 February 2018 January 2018 December 2017 November 2017 October 2017 September 2017 August 2017 July 2017 June 2017 May 2017 April 2017 March 2017 February 2017 January 2017 December 2016 November 2016 October 2016 September 2016 August 2016 July 2016 June 2016 May 2016 April 2016 March 2016 February 2016 January 2016 December 2015 November 2015 October 2015 September 2015 August 2015 July 2015 June 2015 May 2015 April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January 2014 December 2013 November 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 December 2010 November 2010 October 2010 September 2010 August 2010 July 2010 June 2010 May 2010 April 2010 March 2010 February 2010 Log In Help on how to log into FilmCrave Login with Facebook Login with FilmCrave What Members Are Doing Movie Talk New Movie Reviews New Movie Lists Watched the Special Features by Rod Movies I Want To See by baba ghanoush 2018 by Karmand Top Movie List by Ben Best films of 1973 by Daniel Zombie/Zombie-like Movies by Stoney McStonerson Movies I've Watched by Chris Ghost Films I've seen in 2018 by aickman Contact FilmCrave Public Relations     Advertise and Business Developer API Contact Us About us Support FilmCrave FAQ and Help News and Press Terms of Use Are you sure you want to delete this comment? Are you sure you want to delete this blog?
global_01_local_1_shard_00001926_processed.jsonl/50700
Causes of Female Infertility Share this on Numerous medical conditions can contribute to infertility. In fact, most cases of infertility are due to other medical conditions. These disorders can damage the fallopian tubes, interfere with ovulation, or cause hormonal complications. What are the Causes of Female Infertility? Failing to ovulate due to irregular menstrual cycles, ovulatory dysfunction by suboptimal follicular development or a defect in the luteal stage of the menstrual cycle prominently leads to failed fertilization, lack of embryo implantation and early miscarriages. Tubal Factor Once the egg is unrestricted from the ovary during ovulation the egg is located and transported by the open fallopian tube. Obstruction to the tube or surrounding scar tissue will make it difficult or unmanageable for the oocyte or sperm to extend to the mid-segment. Fertilization will not occur as it occurs naturally if this happens. Uterine Factor Embryos implant in the uterine cavity; if fibroids, polyps or adhesions are present inside embryos will fail to implant. Unfortunately women may be born with anomalies of the uterine cavity such as intrauterine septum or bicornuate uterus. Cervical Mucus Factor Natural cervical mucus acts as a basin where sperm survives along its journey to the tubes. When this natural mucus is not produced at ovulation infertility is an issue. Although this is a rare addition to infertility, it is most collective in women who have had cervix complications, biopsies or cryosurgery. When this condition presents itself in the pelvis, ovaries, and/or fallopian tubes it typically distorts the normal anatomy. Implantation of endometriosis distributed throughout the pelvis region can diminish fertility even if the ovaries and tubes remain unrestricted. Low Ovarian Reserve At birth, a women’s body reserves a set number of eggs. As men continually produce new sperm throughout their reproductive years, women decrease in ovarian reserves beginning around the age of 35. At this age both the number of eggs as well as the quality of the remaining eggs begins to diminish, leaving a lower success rate of pregnancy. It is conceivable for a woman's eggs to lack superiority or have difficulty to properly fertilize. When Ovarian reserve levels are low or eggs are of poor quality, women attain effective rates through IVF with egg donation. Implantation Failure Thin endometrial lining, hormonal deficiencies, infections, chromosomal abnormalities can lead to initial failure of embryo implantation.
global_01_local_1_shard_00001926_processed.jsonl/50707
Australasia's Biggest Online Store We won't be beaten by anyone. Guaranteed Knowledge Sharing in the Integrated Enterprise Product Description Product Details Table of Contents ICEIMT 04.- A' standards' Foundation for Interoperability.- Standards in Enterprise Inter- and Intra-Organisational Integration.- Integrating Enterprise Model Views through Alignment of Metamodels.- Semantic Distance and Enterprise Integration.- The Nature of Knowledge and its Sharing through Models.- ATHENA Integrated Project and the Mapping to International Standard ISO 15704.- Architectural Principles for Enterprise Frameworks: Guidance for Interoperability.- UEML: a Further Step.- Connecting EAI-Domains Via SOA- Central vs. Distributed Approaches to Establish Flexible Architectures.- A Meta-methodology for Collaborative Network Organisations: A Case Study and Reflections.- An Ontological Approach to Characterising Enterprise Architecture Frameworks.- Coherent Models of Processes and Human Systems.- If Business Models Could Speak! Efficient: a Framework for Appraisal, Design and Simulation of Electronic Business Transactions.- Building a Better Team.- A Reference Model for Human Supply Chain Integration: an Interdisciplinary Approach.- A Proposition for Risk Analysis in Manufacturing and Enterprise Modeling.- An Ontology for Static Knowledge Provenance.- Object Model for Planning and Scheduling Integration in Discrete Manufacturing Enterprises.- B2B Applications, BPEL4WS, Web Services and .NET in the Context of MDA.- A Research Framework for Operationalizing Measures of Enterprise Integration.- A Vision of Enterprise Integration Considerations.- Enterprise Integration Engineering as an Enabler for Business Process Management.- Deriving Enterprise Engineering and Integration Frameworks from Supply Chain Management Practices.- How to Model Business Processes with GPN.- Enterprise Integration and Networking: Issues, Trends and Vision.- Enterprise Integration Approaches in Healthcare: A Decade of Trial and Error.- An Enterprise Modelling Approach to Team Systems Engineering.- Improving Supply Chain Performance through Business Process Reengineering.- Toward the Knowledge-based Enterprise.- Strategic Process Integration.- DIISM 04.- Manufacturing and Engineering in the Information Society: Responding to Global Challenges.- Considering Designer's Intention for the Development of Feature Library of a Process Planning System.- Manipulation Planning for Knotting Linear Objects with One Hand.- Cost Prediction System Using Activity-Based Model for Machine Tool Operation.- Information Modeling for Product Lifecycle Management.- Generic Core Life Cycle and Conceptual Architecture for the Development of Collaborative Systems.- Integrated Process Management System and RFID Directory Services.- Seven Tools of Operation Standardization for Mass Production of a New Product.- Workbench: A Planning Tool for Faster Factory Optimization. Ask a Question About this Product More... Write your question below: Look for similar items by category People also searched for How Fishpond Works Webmasters, Bloggers & Website Owners You can earn a 5% commission by selling Knowledge Sharing in the Integrated Enterprise: Interoperability Strategies for the Enterprise Architect (IFIP Advances in Information and Communication Technology) on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now! Authors / Publishers Back to top
global_01_local_1_shard_00001926_processed.jsonl/50714
General Question flo's avatar Have you ever had a glitch where screenshot/s tagged along in your email without you doing anything? Asked by flo (11237points) November 3rd, 2010 Yesterday, in our Gmail exchanges with a friend there appeared 3 screenshots of emoticons. She can’t understand how that happened. And when I replied, there were those 3 and 1 more. And immediately after that, I ‘forwarded’ (I forgot something) it, and it became 7 screenshots of emoticons. Have you ever seen that? Observing members: 0 Composing members: 0 1 Answer flo's avatar Is there another tag I could have added? Answer this question to answer. Your answer will be saved while you login or join. Have a question? Ask Fluther! What do you know more about? Knowledge Networking @ Fluther
global_01_local_1_shard_00001926_processed.jsonl/50728
Page 1 of 1 Special Operations Executive Posted: October 20th, 2013, 9:08 am by Craig During the second world war an elite secret force was formed to attack the enemy from within. Its methods were subversion, sabotage, assassination and terror. Many of its agents did not survive. Often captured, tortured and executed, their work was cloaked in secrecy and all but forgotten. They were the Special Operations Executive (SOE). At the end of the war they were sacrificed upon the altar of political necessity and disbanded. The victims of inter-agency rivalry. Or were they? In the world of SOE21, not so very different from our own, Churchill secretly ordered that the SOE was to continue, as the hidden and deniable agent of Britain’s otherwise less acceptable activities. One by one SOE’s top wartime agents ‘died’, apparently at the hands of the fledgling KGB, and even MI5 and MI6. In fact they took on new identities and became a deadly and effective underground army. Even after Churchill lost power he continued to command the actions of the SOE. With the help of loyal civil servants the SOE recruited men and women, to train and, in times of need, to act on behalf of British interests. When Churchill died, he left as his legacy an independent and well-supported organisation, led by an appointed Council of former Operatives, and working to the Charter. This Charter has 21 clauses and guides all actions of the Council and its active Operatives. The SOE, now renamed SOE21, has Council members in all areas of Government and the British intelligence community. It has infiltrated the top levels of the armed forces and many of Britain’s largest corporations. You can find these new rules in the Downloads section of the blog: ... imple-rpg/
global_01_local_1_shard_00001926_processed.jsonl/50759
Technology, Smartphones, Games MozBackup – Backup your Mozilla products and postbox When you format your system and reinstall or install new operating system, one of the main concern is the backup of your browser profile, emails etc. MozBackup is a simple free utility which can backup and restore the data from the following applicat... [More] Opera Mail a New free light weight Mail Client Opera browser had an integrated Email Client. As they are changing the rendering engine (read it here) the mail client is now a standalone one. It seems to be a good mail client, but unlike thunderbird you will have to manually configure the mai... [More]
global_01_local_1_shard_00001926_processed.jsonl/50760
Geisha Culture and Arts The Literature Quiz is a requirement toward completion of the Maiko lesson on literature. It is "open book" so you may refer back to your Literature lesson for the answers. When you submit the quiz it will go directly to Okasan's email. Either she or your Oneesan or mentor will review the information and discuss the results with you. Good luck and happy learning. Return to Maiko Literature Chapter:              Return to Maiko Courses: Oops. An error occurred. Click here to try again.
global_01_local_1_shard_00001926_processed.jsonl/50805
Learning Center Refer a friend Would a friend of yours be interested in the Great Clips franchise opportunity? Then, please, let us tell them all about it! Simply fill out the following form and we’ll take care of the rest. We value your recommendation! If your referral becomes a new Great Clips franchisee, we'll pay you $2,000 as a thank you!
global_01_local_1_shard_00001926_processed.jsonl/50808
“Organizations exist at a time when employees have tremendous amounts of access to company data, (intellectual property), even financial resources. Most allow that access to occur from anywhere, often through multiple different channels. The core challenge here is that protecting against data loss within these heterogeneous ecosystems of apps, mobile devices and connected platforms is incredibly hard to do because of the sheer volume of data being passed between them. If they are like most large companies, they’re inundated with alerts and notifications about potential incidents. And even with massive resources at their disposal, keeping tabs on every possible point of breach proved too difficult. The consequence is that something fairly significant slipped past their notice.” Read the full article: Analysts see cautionary tale in huge data theft from Google’s parent Alphabet
global_01_local_1_shard_00001926_processed.jsonl/50862
Nobel Prize for Medicine links to Traditional Chinese Medicine It would be fair to say that the Nobel Prize in China is a very ambiguous phenomenon. Since the 1950s, 6 Chinese nationals have been awarded The Prize. Given China’s turbulent past and its aftermath, it is not surprising that most of these prizes are domestically blurred by controversy. There are many factors that trigger political sensitivity (historical and distant links to the nationalist Kuomintang would already suffice) and due to anonymous research during the early days of the People’s Republic, only the ruling party could pinpoint candidates. Due to these internal challenges, it may be that China missed out on a few occasions to actually receive the Nobel Prize for scientific achievements. Most notorious has been the chemical synthesis of crystalline bovine insulin, a remarkable achievement in producing active insulin that was published in the journal Science in 1966 and made global news headlines. The President of the Nobel Foundation, Arne Tiselius, visited China in 1966. One can only speculate what happened if the researchers that guided him around would not have remained anonymous. After a lot of internal debates, only in 1978 the Chinese put forward a candidate for the insulin discovery. The Nobel Prize, however, was never awarded. From a Chinese perspective, the bovine insulin project only remained “nominated” for the Nobel Prize. National strategies for scientific success are highly reflected in the insulin story. Prizes do not fall from the sky: they should be centrally approved, fit a high number of political trajectories, and benefit national progress. Modern-day China has made huge investments, and has witnessed impressive advances, in domestic scientific achievements. A Nobel Prize obtained by a homegrown Chinese investigator, obtained from achievements in the modernized Chinese research ecosystem, would provide objective evidence for China’s success as a world-class science hub. However, such a scientific Nobel Prize has always passed China. Until this year, when it was awarded to Dr. Tu Youyou, who discovered and purified artemisinin, a drug that has lead to a relative successful treatment regime for severe malaria and saved millions of lives. Tu Youyou and her team started in the late 60s and published the crucial discoveries for this therapy in the 1980s. By digging through ancient Chinese medical literature, Tu noticed that plant extracts from the Sweet Wormwood repeatedly showed up in traditional treatments. She found out that artemisinin was the key component. After optimizing the extraction method, inspired by literature from the year 340 AD, she was able to successfully treat malaria-infected rodents and monkeys. At present, a modified version of the extract is part of the standard prevention treatments against malaria, which has played a significant role in reducing the mortality around 50%. Malaria is mainly a disease of the poor: a large part of the success story is its contribution to poverty alleviation. The global impact of Dr. Tu’s achievements is still tangible. Dr. Tu has linked Traditional Chinese Medicine (TCM) to a successful treatment method for a grand global health challenge and the Nobel Prize. Needless to say, apart from recognition and praise, in China the Prize remains its controversial allure. TCM advocates want to see more national strategies and priorities for TCM. Critics claim that dr. Tu was only part of a team and recognition should be shared. Chinese policymakers will be scratching their heads. In an era where China strongly bets on modernization of its science ecosystem, the first home-grown Nobel Prize sails in, originated from a secret military project of the early days of the People’s Republic; and rooted in literature from a period some 100+ years after the Han dynasty, a period which produced a wide range of scientific advances. The first homegrown Nobel Prize in sciences for China is a fact. It derived from a pragmatic approach, ingenuity and a full exploitation of available resources. But it was not planned. In the end, this is about science. Failure is an option, and therefore success should be celebrated. Further reading 0 replies Leave a Reply Want to join the discussion? Feel free to contribute! Leave a Reply
global_01_local_1_shard_00001926_processed.jsonl/50893
Qualifying For a Mortgage 04/03/2017 10:51 am ET When I wrote the first version of this article in 2000, I felt it necessary to emphasize to potential borrowers that they were not beggars who had to approach lenders hat in hand. There are multiple hundreds of lenders in this market who compete fiercely among themselves for good loans, I told readers. That remains the case today, although the financial crisis has changed some of the rules.  Qualification and Approval A "good loan" is one to a borrower who has the ability to pay, the willingness to pay, and the capacity to make a down payment. Lenders base judgments of borrower ability to repay mainly on their income relative to their mortgage and other recurring obligations.  They assess the willingness to repay mainly by the applicant's credit history. They assess the capacity to make a down payment from the borrower’s current financial statements. The term “qualification” is used in two ways. In a narrow sense, a qualified borrower is one with the ability to pay. Real estate agents qualify borrowers in this sense to make sure they will look at houses in the right price range. But qualification is also used in a broader sense to mean that the applicant meets all the requirements for approval. Approval requires that an applicant have the ability to pay, the willingness to pay, and an adequate down payment. Which meaning is intended is usually clear from the context. Qualification and Affordability On a purchase transaction, qualification is always relative to property value. A borrower who is well qualified to purchase a $200,000 house may not qualify to buy a $400,000 house. The property value for which you can qualify depends on your own personal financial condition, and on the mortgage terms available in the market at the time you are shopping. To afford a $400,000 house, for example, you need about $55,600 in cash if you put 10% down. With a 4.25% 30-year mortgage, your monthly income should be at least $8178 and (if your income is $8178) your monthly payments on existing debt should not exceed $981. To develop the data tailored to your own situation you can use my Housing Affordability Calculator. Meeting Income/Expense Requirements In general, lenders assess the adequacy of borrower income in terms of two ratios that have become standard in the trade. The first is the "housing expense ratio" (also known as the “front-end ratio”) and is the sum of the monthly mortgage payment including mortgage insurance, property taxes, hazard insurance, and condo fees if applicable, divided by the borrower's monthly income. The second is called the "total expense ratio" (also known as the “back-end ratio” or DTI)  and it is the same except that the numerator includes the borrower's existing debt service obligations, such as credit card or student loan payments. For each of their loan programs, lenders set maximums for these ratios, which the actual ratios must not exceed. Following the financial crisis, these ratios were increased, from 28/36 with exceptions to 31/43 with exceptions. Emphasis also shifted to placing greater weight on the more inclusive measure. Lower Maximum Ratios on Riskier Transactions: Maximum expense ratios are not carved in stone. They are lower (more restrictive) for any of a long list of program "modifications" that are considered riskier. For example, the property is 2-4 family, co-op, condominium, second home, or manufactured, the transaction is for investment rather than owner occupancy, the borrower is self-employed, or the loan is a cash-out refinance. Higher Maximum Ratios on Less Risky Transactions: The following are circumstances where the limits may be raised: * The borrower’s high housing expense ratio is offset by exceptionally high disposable income. * The borrower has an impeccable credit record. * The borrower is a first-time home buyer who has been paying rent equal to 40% of income for 3 years and has an unblemished payment record. * The borrower is making a down payment well above the amount required. Reducing Expense Ratios by Changing the Instrument: Before the financial crisis, expense ratios could be reduced by extending the term to 40 years, selecting an interest-only option, switching to an option ARM on which the initial payment did not cover the interest, switching to an ARM with an exceptionally low interest rate for the first 6 or 12 months, or taking a temporary buydown where cash placed in an escrow account was used to supplement the borrower's payments in the early years of the loan. None of these options exist today. Using Excess Cash to Reduce Your Expense Ratios: If you have planned to make a down payment larger than the absolute minimum, you can use the cash that would otherwise have gone to the down payment to reduce your expense ratios by paying off non-mortgage debt, or by paying points to reduce the interest rate. Just make sure that the reduced down payment does not push you into a higher mortgage insurance premium category, which would offset most of the benefit. This happens when the smaller down payment brings the ratio of down payment to property value into a higher insurance premium category. These categories are 5 to 9.99%, 10 to 14.99% and 15 to 19.99%. For example, a reduction in down payment from 9% to 6% wouldn't raise the insurance premium, but a reduction from 10% to 5% would. See Shrewd Mortgage Borrowers Know Their PNPs. Getting Third Parties to Contribute: Borrowers sometimes can obtain the additional cash required to reduce their expense ratios from family members, friends, and employers, but the most frequent contributors in the US are home sellers including builders. If the borrower is willing to pay the seller's price but cannot qualify, the cost to the seller of paying the points the buyer needs to qualify may be less than the price reduction that would otherwise be needed to make the house sale-able. See Are Seller Contributions Kosher? Income Is Not Necessarily Immutable: While borrowers can't change their current income, there may be circumstances where they can change the income that the lender uses to qualify them for the loan. Lenders count only income that is expected to continue and they therefore tend to disregard overtime, bonuses and the like. They will include overtime or bonuses only if the borrower has received them for the last 2 years, and the employer states on the written verification-of-employment form that they expect the payments to continue. Borrowers who intend to share their house with another party can also consider making that party a co-borrower. In such case, the income used in the qualification process would include that of the co-borrower. The co-borrower’s credit should be as good as that of the borrower, however, because lenders use the lower of the credit scores of co-borrowers. The co-borrower must also be on the title and reside in the house. This works best when the relationship between the borrower and the co-borrower is permanent. Meeting Cash Requirements More home buyers are limited in the amount they can borrow by the cash requirements than by the income requirements. They need cash for the down payment, and for settlement costs including points, other fees charged by the lender, title insurance, escrows and a variety of other charges. Settlement costs vary from one part of the country to another and to some degree from deal to deal. FHA requires 3.5% down on the loans it insures. Fannie Mae and Freddie Mac require 5% down on most of the loans they purchase, though lenders may raise it to 10% on larger loans. On jumbo loans that are too large to be purchased by the agencies, lenders generally require 20% down, though some lenders will accept 10% if the loan is not too large. Qualification Tool Prospective borrowers can find out whether they will qualify, and if they can't the reasons they can't, by using my qualification tool.
global_01_local_1_shard_00001926_processed.jsonl/50904
How IBM X-Force Exchange Software Development Kit works Provides access to a URL and IP filter database The X-Force Exchange SDK database contains more than 130 million entries with more than 25 billion evaluated web pages and images. Evaluated web pages and images are indexed into 73 categories, including gambling, phishing and malware. Clients receive notifications that contain nearly 150,000 updated and newly categorized websites daily. The filter technology covers 45 languages and 250 countries. Enables profiling on web applications Web application profile technology analyzes websites in depth to provide insights on the application. The software recognizes the URL semantics of web applications to enable administrators to disallow certain activity on web-based applications. Actions for web application include audio/video chat, share, software updates, opening an app, stream/download, and write/post/chat. Enables integration API enables you to categorize URLs, define web application policies and configure other filtering capabilities. A software licensing system handles subscription expiration and generates demonstration tickets. Access an API through your favorite programming language IBM X-Force Exchange Node SDK (XFE Node SDK) makes it easy to supplement your existing workflows in Node.js with the IBM X-Force rich threat-intelligence data without having to know how the REST APIs work. XFE Node SDK is well documented and means an even lower barrier of entry to get you hooked up to the IBM X-Force Exchange. XFE Node SDK is open source and is freely available under the Apache 2 License. Leveraging collaborative threat intelligence with X-Force Watch the video Technical details Software requirements IBM X-Force Exchange SDK software requirements can be viewed at: Hardware requirements IBM X-Force Exchange is a cloud-based platform. Hardware requirements are for devices that can run the latest versions of Firefox, Chrome, Internet Explorer and Safari. Technical specifications Once registered for an IBM ID, you will need to verify your account using the API token in the e-mail message that you receive. See a complete list of technical specifications: See a complete list of technical specifications See how it works Buy now and get started
global_01_local_1_shard_00001926_processed.jsonl/50906
Feature spotlights High security features Encrypts content at the time of capture, both in flight and at rest, and is then maintained as tamper proof. Manages administrator and user rights through existing enterprise security tools. Maintains a full audit trail of the content and its disposition. Manages web-based document requests through a partner or customer security-rich link. User-friendly interface Incorporates a capture wizard for a simple, guided user experience for deployment in virtually any scenario. Supplies an intuitive web client user interface that has been successfully evaluated and approved in the IBM Usability Lab. Minimizes the end-user learning curve with direct integration into the front panels of MFD devices. Eliminates the risk of inaccurate indexing with support for automated database lookups and validation. Extensibility options Integrate with IBM Datacap for advanced document capture capabilities, including optical character recognition (OCR), Intelligent Character Recognition (ICR) and analytics-based classification tools.Integrates with all IBM image repositories as well as leading ECM workflow platforms. Supports a diverse device infrastructure, including support for most leading MFD manufacturers. Allows for centralized administration of settings, including scanner and logging configurations. Scalable growth capability Scale to whatever business requirements dictate, whether 50 or 50,000 locations. Features Encapture mobile client with the ability to capture paper documents using the mobile device camera. Use with IBM Datacap to capture content from the palm of your hand and deliver it to large centralized repositories for classification, indexing and optimization. You may also be interested in IBM Datacap Quickly capture, understand and deliver content Learn more IBM Datacap on Cloud Document capture and data extraction for the cognitive era Learn more
global_01_local_1_shard_00001926_processed.jsonl/50915
Question Answering via Integer Programming over Semi-Structured Knowledge / 1145 Daniel Khashabi, Tushar Khot, Ashish Sabharwal, Peter Clark, Oren Etzioni, Dan Roth Answering science questions posed in natural language is an important AI challenge. Answering such questions often requires non-trivial inference and knowledge that goes beyond factoid retrieval. Yet, most systems for this task are based on relatively shallow Information Retrieval (IR) and statistical correlation techniques operating on large unstructured corpora. We propose a structured inference system for this task, formulated as an Integer Linear Program (ILP), that answers natural language questions using a semi-structured knowledge base derived from text, including questions requiring multi-step inference and a combination of multiple facts. On a dataset of real, unseen science questions, our system significantly outperforms (+14%) the best previous attempt at structured reasoning for this task, which used Markov Logic Networks (MLNs). It also improves upon a previous ILP formulation by 17.7%. When combined with unstructured inference methods, the ILP system significantly boosts overall performance (+10%). Finally, we show our approach is substantially more robust to a simple answer perturbation compared to statistical correlation methods.
global_01_local_1_shard_00001926_processed.jsonl/50928
Exercises for Healthy Feet by | | 0 comment(s) Exercising your feet on a regular basis not only improves overall foot health, but may also reduce your risk for injury. Walking is the best overall foot exercise. When you walk in supportive and well-fitting shoes, you put your foot through its full range of motion, from the time your heel hits the ground until you lift off with your toes. Moreover, walking is one of the best forms of exercise for your entire body. It improves your cardiovascular health and can help your circulation, muscle tone, and mood. In addition to walking, flexibility and resistance exercises can also help keep your feet healthy. These exercises will improve flexibility help keep your feet limber and may reduce your risk for injury. Don’t worry if your feet have grown stiff with age; studies show that no matter how old you are, you can still improve your flexibility. The easiest way to build flexibility is through slow and gentle daily stretches, focusing on one group of muscles at a time. The following exercises are provided courtesy of Harvard Medical School. Simple Workouts to Stretch and Strengthen your Feet • Limber up - To limber up your foot before attempting other exercises, try this.: 1. Sit in a chair with your feet flat on the floor. 2. Lift your left leg so your foot is off the floor and use your big toe to make circles in the air, moving in a clockwise direction, for 15 to 20 rotations. 3. Reverse direction and make another 15 to 20 circles, this time in a counterclockwise direction. 4. Repeat with your right foot. • Bottom of foot - To stretch the muscles on the bottom of your feet: 1. Stand with feet together. 2. Step back with your left leg so your heel is raised and your toes press against the ground. You should feel the muscles on the bottom of your feet pull gently. 3. Hold for 20 to 30 seconds. 4. Repeat with your right foot. • Heel exercises - To stretch the back of your heel: 1. Loop an exercise band around the leg of a heavy piece of furniture, such as a table or desk. 2. Sitting directly in front of it, slip your foot into the loop so the exercise band curls around your forefoot, just below your toes. 3. Pull back with your forefoot, flexing at the ankle. Hold for several seconds, then relax. You should feel a stretch along the back of your heel. 4. Repeat 10 to 15 times. 5. Repeat with your other foot. These exercises can be a part of your daily routine, as well as a way to limber up and stretch your feet prior to walking or any other kind of exercise. Paired with the right shoes and the perfect fit, exercising your feet will keep you moving, happy, and healthy. Images courtesy of Harvard Medical School. This entry was posted in no categories. You must be logged in to post comments.
global_01_local_1_shard_00001926_processed.jsonl/50930
Spanish Teacher With Playboy Past Gets Fired A Dallas high school teacher who posed for Playboy magazine has been fired. Twenty-one-year-old Cristy Nicole Deweese posed for eye-popping Playboy videos and nude pictorials when she was in college in 2011. After graduation, she became a popular Spanish teacher at a Dallas high school. But when her past as a Playboy model came to light this week, some parents protested. Today, she texted INSIDE EDITION: "They fired me!"   There was no comment from the school district but we know her students learned at least two Spanish words, “Muy caliente!”
global_01_local_1_shard_00001926_processed.jsonl/50935
Starfish-shaped Bag About: Fashion designer with a love for music, books and good movies. Wanderlusting all the time. Always a lover, never a fighter, forever a charmer. :] Hi there! You will learn how to make a starfish-shaped bag to store anything you want in it. Step 1: Step 1: Materials You will need: - Fabric. I used plasticised PVC, in two colors. - A starfish pattern. - A marker, or chalk, or whatever, to trace the patter over the fabric. - Scissors. - A one-hole punch. - An embroidery needle. - Craft cord. Step 2: Step 2: Tracing and Cutting Turn over the fabric, so you cut on the "inside" of the fabric. Place the patter on top of the facric (use needles to hold pattern in place if necessary), and cut. Step 3: Step 3: Sewing First, thread the needle using the draft cord, leaving one long, knotted end, and the other hanging loose. Then, place one cutout on top of the other (again, use needles to hold in place if necessary), and start sewing. Start on the inside so that the knot is hidden. The manner in which I sewed makes a nice and pretty decorative stitch. After you pass the needle through the inside, press both sides together and pass the needle through both sides. Then, pass the needle again, through the first side you passed it the first time. Step 4: Step 4: Punching Holes (Depending on how long you want the opening to be) Using the one-hole punch, make holes along the opening of the bag. Step 5: Step 5: Making the Cord Now, to make the cord that's gonna tie this whole thing all together, so to speak, we're gonna use to different colored craft cords. I used 5 strands of each, to make it really thick and nice. Tie a knot, and then start passing one color over the other. Make it an adecuate lenght. Step 6: Step 6: Passing the Cord When done with the chord, pass it through the holes, as if it where a shoelace in a shoe. Step 7: Finished Product Now you have a starfish-shapped bag! I used plasticised PVC so it was water proof and I could store my wet swimsuits when going to the pool, beach, etc. Have fun! • Baking Challenge Baking Challenge • First Time Author First Time Author • Make it Glow Contest 2018 Make it Glow Contest 2018
global_01_local_1_shard_00001926_processed.jsonl/50937
Two Unusual Dermal Uses of Bacon and a Dutch Traditional Delicacy About: I am an arts and crafts teacher in a secondary school in the Netherlands. ( I love making things. Especially out of nothing, worthless materials, garbage and cheap stuff. Besides that I... I've got two tips about how to solve some dermal problems with bacon ánd, to fill your appetite a little recepy for a traditional Dutch meal with bacon. Step 1: How to Remove a Splinter With Bacon If you were unlucky with making your last Ible project about how to build Noah's Ark (well I hope he will make that one) and got hurt by putting a splinter to deep in your skin and there's no way to get it out not even with pliers try the following: Take a little piece of bacon, especially the white fat, put it over the splinter and seal it with band-aid. Eventually the splinter will come out and stick in the bacon. Step 2: How to Heal Contact Eczema With Bacon If you suffer of contact eczema, which is pretty nasty if you are a fan of Instructables because there are a lot of nice projects here on which you get your hands on, try the following: Bake the bacon but not to much, just so that the fat will melt. When it's still hot, poor it in a little jar or some other container and let it cool until it's hard. Just smear some of the grease on to the eczema on your hands. Pig skin is almost identical of that of humans. A minor thing is you'll will smell of bacon, but hey, at least your dog will follow and obey you now. Step 3: Dutch Pancakes With Bacon A traditional Dutch meal are pancakes with bacon. This how you make them: Take 500 g of (brown) wheat flower. Mix it with enough milk to make a smooth liquid.Stir one or two eggs in it, a spoon of sugar and a little bit of salt. Stir until it is mixed but still fluid. Heat a frying pan with some butter or oil and bake the bacon in it. If it is just crispy, take some of the mix and poor it in the pan until the bacon is just covered. Bake it on one side and than turn it around until it is brown on both sides. Take it out and put it on a plate. You can heat a pan with water in it, cover it with a plate and lay the pancakes on it to keep it hot until you've baked the rest of the mix. These are delicious with (apple) molasses on them. Eet smakelijk! • Toys Contest Toys Contest • First Time Author First Time Author • Big and Small Contest Big and Small Contest 5 Discussions 6 years ago on Introduction What's the mechanics behind the ekzema-healing fat and how did you find ot about it? 7 years ago on Introduction Very creative uses, but could you please upload more photos of the bacon being used? I'm very curious to see the process of it removing a splinter. 3 replies Dave ASHIFT! Reply 7 years ago on Introduction Well ,I would love to but at the moment I've no splinters in my fingers and just to be a guinnee pig and stick some wood deep in to my skin just to to document it...nah rather not ;-). But as soon as me or my family has an accidant by some woodproject I'll take some pictures for this Ible, I promise. Reply 7 years ago on Introduction I had glass in my hand. it works it's way out over time, even if the skin has healed over it. it took about a year, maybe more to get all the splinters of glass out, but they came out. the hard part is waiting and feeling it in there and not being about to get it. I just massaged it a lot. hope yours comes out sooner.
global_01_local_1_shard_00001926_processed.jsonl/50949
 Welcome This Utilities Guide is intended for iService users responsible for performing integration with their iService tenant. It is available in the following formats. Online Help - This HTML help can be browsed online. You will be automatically directed to the standard, smartphone, or iPad version that is most appropriate for your browser. Compiled HTML Help - You can download this Windows Compiled Help file and view it in your browser while offline. PDF - Acrobat file for printing iPad / iBook - This is an ePub file for viewing on your iPad. To view it on your iPad, you much transfer the ePub file to your iTunes account. You can right click the link above and save it to your machine or click here to download a .zip version of the file. (c) 2012-2014 One-to-One Service.com, Inc.
global_01_local_1_shard_00001926_processed.jsonl/50958
After removing links to a security patch that caused the NT 4.0 operating system to fail, Microsoft Corp. on Friday posted an updated patch that fixes the NT 4.0 problem. The patch, MS02-071, was originally released on Dec. 11 and addressed a vulnerability affecting the WM_TIMER function on a variety of Microsoft’s operating systems including Windows NT 4.0, Windows 2000 and Windows XP. By taking advantage of the security hole, an attacker could gain full administrative privileges on a vulnerable system, enabling the attacker to add, delete, or modify data at will and create or delete user accounts. Microsoft rated the vulnerability “Important.” Following the release of the patch in December, reports surfaced in online discussion groups of random crashes and system reboots on NT 4.0 systems after installing the patch. Those problems disappeared when the patch was removed. On Feb. 3, Microsoft removed links to the version of the patch for NT 4.0 operating systems from the security bulletin covering the WM_TIMER issue, saying that it had “determined that the patch for Microsoft Windows NT 4.0 machines introduced an error that may, under certain configurations, cause NT 4.0 to fail.” On Friday, the company updated the bulletin again, providing links to a new patch for NT 4.0 that fixes the random crash problem, according to Microsoft. “Microsoft has investigated this issue and is releasing an updated patch for Windows NT 4.0,” the company said in an update to its bulletin. Microsoft recommended that its customers review the security bulletin on its technical support Web site and install the patch at the earliest opportunity if they are running a vulnerable operating system. The bulletin is at Related Download Create a Unique Selling Proposition for Your Global Market Sponsor: EDC Create a Unique Selling Proposition for Your Global Market Register Now
global_01_local_1_shard_00001926_processed.jsonl/50964
Hire A writer To wtite your essays How To Write A Good Argument Essay How To Write A Good Argument Essay Writing A Good Argument Essay When writing an argumentative essay one needs to reason and use evidence not emotion to take a definitive stand on a controversial or debatable issue. An argumentative essay explores two sides of a topic and proves why one side or position is the best. Below are steps on how to write a perfect argumentative essay: Choose A Specific Issue To Discuss Some debatable issues cover a wide range of topics. For instance, "legalizing marijuana” is a broad subject because topics within the subject include legalizing marijuana, effectiveness of the FDA, or whether a painkiller made in Europe should be allowed in the US. You can always choose one of this to be your sole focus. Research Both Sides Of The Topic Thoroughly Research whichever side you want to argue so that you can get ideas counterarguments and help your paper show balance rather than bias. Develop A Working Thesis State your position on the issue and summarize your argument’s main reason in one sentence. Your body paragraphs should explain your reason fully. Body Paragraphs • Present both sides of the subject, then state your opinion and explain why you chose that said side. This option is useful if you did not have an opinion on the issue prior to research, or your audience is not very familiar with your topic. • State your opinion at the beginning. List and explain the reasons for your choice. Acknowledge the other side’s arguments; then, disprove/refute those arguments. This option is useful when your audience already has some knowledge of the issue. It allows you to be more assertive, thus making a stronger argument. Revise And Edit • Pretend that your readers are a skeptical panel or jurors. You can best convince them of your arguments by avoiding emotional or aggressive language and by using a mix of evidence type’s facts, statistics, examples, expert opinions, or even personal experience. • Cite your sources • To increase the chances that your audience will agree with you, start body paragraphs with ideas that both sides agree upon before arguing your point. • Know the other side’s strongest arguments to defend against challenges from other students or your instructor. • In your conclusion, emphasize why your topic is important, summarize your arguments, and re-state your position as the most sensible choice. Do not include new evidence or arguments. Need an essay or paper? Get it done fast!
global_01_local_1_shard_00001926_processed.jsonl/51003
D Minor Chord The D minor triad, more commonly called the D minor chord, is a minor triad consisting of the notes D, F and A. Here it is on the treble clef staff: … and on the piano: Here is the D minor chord on the bass clef staff: As a minor triad, the D minor chord consists of a minor third plus a major third. The interval from D to F is a minor third, while the interval between F and A is a major third. Inversions of the D Minor Chord If the root of the D minor chord – D – is the bass note (i.e., the bottom note), then the chord is in root position: If the third of the chord – F – is the bottom note, then the chord is in first inversion: If the fifth of the chord – A – is the bass note, then the chord is in second inversion. (A is called the fifth of the chord because the interval from the root D to A is a fifth.) D Minor Arpeggios If the notes of a chord are played one after the other, the chord is said to be arpeggiated. Here are the standard fingerings for arpeggios of the D minor chord. Make sure you learn these fingerings! (If you don’t understand the below notation, you should start with my How to Read Sheet Music course.) D minor arpeggio in root position: D minor arpeggio in first inversion: D minor arpeggio in second inversion: Stay connected with news and updates! Don't worry, your information will not be shared. Join Now
global_01_local_1_shard_00001926_processed.jsonl/51021
One of the great challenges and choices in life when faced with overwhelming trouble is to take things into our own hands or leave them in God’s hands. In life we can find ourselves in a moment of crisis, standing at a fork in the road, having to consciously decide between trusting ourselves, and resting in God’s sovereignty. At that moment the wise man or woman realizes it is best to leave things with God.  In 2 Samuel 15, we find King David having to flee the city of Jerusalem in the face of his own son’s treachery. Absalom had stolen the hearts of the citizenry, and turned them against his father, and was marching against Jerusalem. In the face of Absalom’s advance, David withdraws to avoid the bloodbath of a prolonged siege. Insult is added to injury as David learns that his trusted friend and wise counselor, Ahithophel, had betrayed him. He was also told that Mephibosheth, to whom he had shown great kindness, was also among the scoundrels who had conspired against him.  In the midst of this chaos and crisis, David does something interesting and inspiring. For the sake of the people, the king does a noble thing and sends Zadok, his beloved priest, and faithful friend, back to Jerusalem with the ark of the covenant (2 Sam. 15:25-26). David surmised that if it was God’s will for him to return as king, he would do so. Hence there was no need to keep the ark away from the sanctuary. The royal fugitive muses, “If I find favor in the eyes of the Lord, He will bring me back and show me both it and His dwelling place.” If not, “Let Him do to me as it seems good to Him.” David doesn’t take things into his own hands; he leaves things in God’s hands.  Perhaps, like David, your life is in a tailspin. Things are out of control in your body, your home, your business, and your ministry. Your future is out of your hands, and in someone else hands. You feel vulnerable and exposed. You want to do something, anything, but your choices are limited. You want to act but you fear doing the wrong thing, only making matters worse.  If that describes you, remember that even if power has been wrested from your hands, your times are in God’s hand (Psa. 31:15). Nothing happens to you except by the will of God. Your emergency is in God’s hands. Your enemy is in God’s hands. In the midst of your losses, don’t lose your confidence in the sovereignty of God. What seems good to Him is ultimately good for us (Rom. 8:28). Some years ago I read something that Warren Wiersbe said and it has stuck with me and served me well. He said, “God gives his best to those who leave the choice to Him.” Best leave it to God.
global_01_local_1_shard_00001926_processed.jsonl/51023
Gmail Size Search Operator Finds all Emails with Large Attachments Written by Amit Agarwal on Dec 4, 2014 Gmail Search by Size Search Gmail messages by Size using the undocumented “size” operator Wondering which email messages are eating up all the Gigabytes of space that you have in your Gmail mailbox? There are Google Scripts and external web apps that let you discover all the space-hogging email attachments but you don’t really need them anymore. Gmail supports an undocumented “size” search operator that will let you quickly find all the big emails in the mailbox whose size exceeds a particular threshold. The search syntax is: size:[size in bytes] To give a real example, a Gmail search query like size:5242880 will list all big emails who size is 5 MB or greater while size:10485760 list messages that are bigger than 10 MB. You may specify the size in MB as well which makes it a lot easier. For instance, size:5MB (or say size:5M) will find all Gmail message that are 5 MB or greater in size. In addition to size, you can use search operators like “larger”, “larger_than”, “smaller” and “smaller_than” to find files of any particular size. A combination of these size search operators is possible too. For instance, the following Gmail search query will find all emails with attachment sizes between 5 MB and 8 MB. larger_than:5m smaller_than:8M Once you have spotted the large emails attachments that are taking too much space, apply the #googleDrive label to directly save those attachments to Google Drive before deleting them from your Gmail mailbox. Subscribe to our Email Newsletter
global_01_local_1_shard_00001926_processed.jsonl/51060
How To Fix D3dx11_42.dll Not Found or Missing Errors A Troubleshooting Guide for D3dx11_42.dll Errors D3dx11_42 DLL Error Message D3dx11_42.dll Error Message. D3dx11_42.dll issues are caused in one way or another by an issue with Microsoft DirectX. The d3dx11_42.dll file is one of many files contained in the DirectX software collection. Since DirectX is utilized by most Windows based games and advanced graphics programs, d3dx11_42.dll errors usually show up only when using these programs. There are several ways that d3dx11_42.dll errors can show up on your computer. Several of the more common specific d3dx11_42.dll error messages are listed below: The file d3dx11_42.dll is missing D3dx11_42.DLL Not Found File d3dx11_42.dll not found D3dx11_42.dll not found. Reinstalling might help fix this. D3dx11_42.dll errors appear when a game or other software program is started. The d3dx11_42.dll error message could apply to any program that utilizes Microsoft DirectX, most commonly video games. Any of Microsoft's operating systems since Windows 98 may be affected by d3dx11_42.dll and other DirectX issues. This includes Windows 10, Windows 8, Windows 7, Windows Vista, Windows XP, and Windows 2000. How to Fix D3dx11_42.dll Errors Important Note: Do not download the d3dx11_42.dll DLL file individually from any "DLL download site." There are a number of excellent reasons that downloading DLLs from these sites are never a good idea. Note: If you've already downloaded d3dx11_42.dll from one of those DLL download sites, remove it from wherever you put it and continue with these steps. 1. Restart your computer if you haven't yet. 1. The d3dx11_42.dll error might be a fluke and a simple restart could clear it up completely. 2. Install the latest version of Microsoft DirectX. Chances are, upgrading to the latest version of DirectX will fix the d3dx11_42.dll not found error. 2. Note: The same DirectX installation program works with all versions of Windows including Windows 7, 8, 10, Vista, XP, and more. It will replace any missing DirectX 11, DirectX 10, or DirectX 9 file. 3. Assuming the latest DirectX version from Microsoft doesn't fix the d3dx11_42.dll error you're receiving, look for a DirectX installation program on your game or application DVD or CD. Usually, if a game or other program utilizes DirectX, the software developers will include a copy of DirectX on the installation disc. 1. Uninstall the game or software program and then reinstall it again. Something might have happened to the files in the program that work with d3dx11_42.dll and a reinstall could do the trick. 2. Restore the d3dx11_42.dll file from the latest DirectX software package. If the above troubleshooting steps haven't worked to solve your d3dx11_42.dll error, try extracting the d3dx11_42.dll individually from the DirectX downloadable package. Need More Help? See Get More Help for information about contacting me on social networks or via email, posting on tech support forums, and more. Be sure to let me know the exact d3dx11_42.dll error message that you're receiving and what steps if any, you've already taken to resolve it. If you're not interested in fixing this problem yourself, even with help, see How Do I Get My Computer Fixed? for a full list of your support options, plus help with everything along the way like figuring out repair costs, getting your files off, choosing a repair service, and a whole lot more.
global_01_local_1_shard_00001926_processed.jsonl/51068
Linux Today: Linux News On Internet Time. More on LinuxToday Speaking UNIX: The new and improved Vim editor Aug 19, 2008, 20:04 (3 Talkback[s]) (Other stories by Adam Cormany) "Editing a compressed file: To conserve space on a system, administrators often compress log files or other large files. It never fails: A file is compressed, and then someone asks you, "Hey, can you take a look at this log from two months ago?" Rather than decompressing the file, and then editing it with vi, Vim can edit the compressed file. Vim can handle editing files compressed with bzip2, gzip, and zip." Complete Story Related Stories:
global_01_local_1_shard_00001926_processed.jsonl/51100
Root Canal Treatment If a nerve starts to die or the tooth has become infected and has already died, it is still possible to retain the tooth in most cases as long as root treatment is carefully and successfully completed. Inside each tooth there are fine canals that are occupied by the nerve as part of its growing and development process.  The nerve can die or become infected in a number of ways. • Decay • Injury • Part of the tooth may be cracked allowing bacteria into the nerve system Root Canal Treatment Root fillings (which in our hands are seldom uncomfortable) are carried out in the practice or sometimes referred to a specialist practitioner, Patients return to our practice for the final restoration and we continue to monitor these situations. Root Canal treatment is also known as endodontic treatment.     Web site design by Bluefusion
global_01_local_1_shard_00001926_processed.jsonl/51117
Money Worksheets Mexican Coins Manipulatives This Money Worksheet will produce a sheet of manipulatives for each of the Mexican coins. This is a great Money Worksheet for the children to see and learn the different Mexican coins. This money worksheet is appropriate for Kindergarten, 1st Grade, and 2nd Grade. Select the Mexican Coin to Make       Recommended Videos If You Experience Display Problems with Your Math Worksheet Click here for More Money Worksheets Google+  Math-Aids.Com.  All rights reserved. Money Worksheets
global_01_local_1_shard_00001926_processed.jsonl/51119
To request an SDS, enter the product number and click the "Submit" button. The SDS will be displayed in a new window if found. Product and/or part numbers can be found on price sheets, invoices, packing slips and labels. Most product/part numbers have the following numbering system: 4 numbers, 1 letter, 5 numbers. Example: 5776W90298 Note: Some product/part numbers may have a 1 or 2 letter extension at the end. These extensions are important to obtain the correct SDS. Example: 5776W90298YF
global_01_local_1_shard_00001926_processed.jsonl/51129
RetroHATRetroHat is a board allowing for connection of multiple switches/buttons to Raspberry Pi using its GPIOs. Basic use case is allowing for retro-arcade button connections but you can actually connect any button to it and it will convert it to a Raspberry Pi key. Basic configuration allows 2 button joysticks and 16 buttons total (that is 1 joystick and 8 buttons for each of two players). Features include: • Total of 24 NO switch physical buttons (2 joystick and 16 buttons) • Automatic detection via HAT specification • Compatible with RetroPie (or anything else that uses keyboard) • Direct connection for switch LEDs • Fused (250 mA) 5 V and 3.3 V outputs Contact me
global_01_local_1_shard_00001926_processed.jsonl/51130
過去のMeetupイベント: (144) We meet every Saturday at some location in Tokyo. I can't attend every session because I have work sometimes and other things. You can still learn without me! Let's all try to have a good attitude and be friends! You are the boss of your own learning!!! メンバー: (4,330)人 写真: (2)枚
global_01_local_1_shard_00001926_processed.jsonl/51147
Nude & Black Autumn Nails Autumn 2014 nail polishes trend Confession: I'm not always up-to-date on what the current make-up trends are. I try my best to catch up on runway trends on the ELLE and Vogue websites, but usually I just like to check out the Fall beauty collections as they launch to view what's up. During the fashion weeks there's also a good amount of attention for the manicures of the models, and it's always fun to find some inspiration for new mani's on the catwalk. For Fall/Winter 2014 there was mostly an emphasis on nudes and blackened or very dark colours, and judging the collections that have been rolling out the past few weeks it's safe to say that the runway trend translated to the collections on the shelves; both nudes & black are definitely back. My hands have been undergoing a little nail polish detox the past few weeks after painfully tearing a nail, so I've just been staring at the new polishes waiting until my nail is finally long and healthy enough to use & photograph them. During the fun staring part I noticed that most of these shades are either nudes or blacks - two types of nail polish shades that I find extremely elegant. The nude shades will elongate your fingers, while the black shades are edgy but sophisticated at the same time. When I was 14 and going through my first "I only want to wear black"-phase (which later changed into neon for a while, while now most of my closet is black again), I swore by black nail polish. The only difference with then & now is that I've come to understand that black nails are only okay if they're kept well. That's the thing with wearing black nail polish: once it's chipped, you really need to take it off. Nude nails are a little more forgiving, although I've really been trying to make a habit out of removing polishes whenever they're chipped too badly. Although I'll admit that I can be a little lazy at times.. this plan doesn't always work out. In the picture, from top to bottom & left to right, you see: &Other Stories nail colour in Vicuna Beige, Dior Vernis in Lili, Chanel Le Vernis in Secret, Rimmel 60 Seconds in Let's Get Nude, Dior Vernis in Bar, &Other Stories nail colour in Tussah Ebony, ProNails nail polish in Noir de Noir and Lancôme Vernis in Love in Tourmaline Noire. I'll be trying all of these when my nails are out of rehab (please, nail: grow fast) & will report back on my favourite ones! No comments
global_01_local_1_shard_00001926_processed.jsonl/51159
Frantic Flea (SNES) Frantic Flea SNES Title screen Published by Developed by Kids to Adults ESRB Rating Critic Score 100 point score based on reviews from various critics. User Score 5 point score based on user ratings. Not an American user? Frantic Flea has the player take control of a flea warrior out to protect his Flea World from an evil race of bugs called the Insideos who are enslaving his friends and family. The gameplay is a side-scroller with six different levels, where the player explores each stage, freeing fellow captive fleas and utilizing weapons and devices to aid in their missions such as the Hoverpod which enables flight and the Stikko which can give the player the ability to climb walls. The graphics are done up in a cartoon-style with over 100 animation frames to give sprites a more fluid life-like feel. Frantic Flea SNES Bouncing on a trampoline Frantic Flea SNES Main menu Frantic Flea SNES Title screen Frantic Flea SNES Game over Promo Images There are no promo images for this game Part of the Following Group User Reviews There are no reviews for this game. Critic Reviews Mega Fun Nov, 1995 70 out of 100 70 Electronic Gaming Monthly (EGM) Apr, 1996 23.5 out of 40 59 All Game Guide 1998 2 Stars2 Stars2 Stars2 Stars2 Stars 40 Total! (Germany) May, 1996 4 out of 6 40 GamePro (US) Apr, 1996 2 out of 5 40 There are currently no topics for this game. There is no trivia on file for this game. Big John WV (27242) added Frantic Flea (SNES) on Oct 20, 2008
global_01_local_1_shard_00001926_processed.jsonl/51172
How to Add a Custom Header to Blogger So you've created your header using Canva or PicMonkey, or some other creative tool, but what now? It's time to add that gorgeousness to Blogger. How to add a custom header to Blogger Open up Blogger, log in, and click on Layout. Click Layout, to see where your header will go. You should see a section that says Header. Click on the small 'edit' and a new window will open up, it will look something like this: Configuring your header is easy when you know how. In the Image section make sure the 'from your computer' is selected and click on Choose File. Find your header, and add it to your blog. Find the header you created (and hopefully saved to your computer), click on it and click 'Open', or hit enter. Your header should appear in the space, looking something like this: Added your header, now save. Next you need to select 'Instead of title and description', in my opinion this is the best option. You can add a description if you like, but with that option selected it won't show up. It is entirely your choice whether or not you want a description anyway. Click Save. Now you need to check that your header is showing up on your blog. Click on 'View Blog' right at the top of the page. View Blog, check the header is in place. Your blog should open up in a new tab or window. Check that everything looks good. You're done! Brilliant blog posts on My Kid Doesn't Poop Rainbows Share the Joy linky at 1. Saving this for when I want to redesign my blog. Thank you 2. being a 'blogger' using blogger - i always get excited to find these posts... I actually read all of this, before realising that i do in fact already have a custom header ( which apparently, it seems, i must have figured out how to do all by myself lol!) nevertheless, a great post for any new bloggers unsure of how to work their way around the changing the layout! nice to meet a fellow 'blogger' too #fartglitter 1. Hehe, I think once you've been doing it a while you tend to stumble across things and work it out yourself. That's how I learned most of the stuff I know. But I also think it is hard to find helpful posts and that's why I'm sharing it. Thanks for stopping by, commenting, and your kind words. x 3. Sometimes I miss my old blogger site, it's not a bad platform is it really? I moved because I wanted my images to shine more, but I loved to tinker with that blogger code. #sharethejoy 1. I love Blogger - there are things that aren't quite what you want but if you can work out how to solve the problem you're sorted. :) Yes tinkering with that blogger code can become an obsession! ;) 4. I never tried Blogger but this seems like a fantastic 'How to' for people on that platform. Thanks for linking up to #fartglitter and sharing it x
global_01_local_1_shard_00001926_processed.jsonl/51189
In this fanfic, the last of the TimeLords escape their planet, that will not be named, to Earth to live normal teenage and adult lives. Along the way they find accidental love that get into danger and forces them to unleash their TimeLord knowledge and "power". Read to find out about how they find love and their battles with the Daleks and other alien creatures. 4. Chapter 4 As we all rushed out of the door to the Tardis, I secretly couldn't wait to see the girls again. There was just something about them that was extremely unique (teehee funny word).  The way Rae was fun and outgoing, always looking on the brighter side of things, Cheyenne being kinda shy, but perverted none the less. Anne seemed to be the oldest in the group, she had this cheeky personality that couldn't be hidden no matter how hard she tried, Angel was just WAY too vain, the moment I saw her I was disgusted, she was hot without a doubt but she was just a little too..... showy? In other words you could basically see all of the breasts until you got to her nipples,  then her shirt was high enough up that you could see her dangling bellybutton piercing. Rachel was shy. VERY shy, so shy that no matter how hard you tried figuring her out, it wasn't going to happened unless she opened up to you. Lindy though, she was breath-taking. Her hair perfectly straight, not one stray hair. She may have had designer clothes making her look like a bitchy snob, but I could tell she was funny. That's the funny thing about me, since I'm a TimeLord, I have these weird instincts that way I can figure people out before I even meet them. Except for Rachel apparently.  It must not work on nerds (I'm not bagging on anyone particular, this character represents me and what I WANT to be. I know I'm weird). "Zayn you comin'? We can probably make it to Nando's before the girls leave." Niall stated, encouraging me to follow. I realized then that I was still standing in the doorframe of the Tardis. I quickly snapped out of my thoughts and locked the Tardis the turning in the direction the guys were headed in tucking the keys in my pocket. "WAIT!" Louis shouted, immediately stopping in his tracks, "We can't go put dressed like this!" he said gesturing to our tuxedos, "We don't wanna look like idiots!" We all groaned in disapproval but went to the Tardis to change. I came out with a plaid button up shirt, the sleeves rolled up, with some black skinny jeans. Harry came out in a white V-neck and some dark skinny jeans as well as his usual brown dress shoes. Niall came out in a red polo and kaki skinny jeans. Liam just came out in a black tee with the Batman symbol on it and grey skinny jeans. Louis however NOT wanting to look like an idiot came out in a blue and white striped shirt along with baggy red skinny jeans, braces the only things holding them up. "Yep you definitely DON'T look like an idiot." I stated, observing his choice of fashion. "C'mon lets just go." Liam encouraged, shoving us out of the Tardis. We all started along the path to Nando's when we heard a shriek... which was also coming from Nando's. We turned the sharp corner looking through the large window to see Rachel holding the mannequin hand away from her face as it attempted to attack her. I was about to ask what we should do but the guys were already chasing after Niall who was on his way through the restaurant. I felt something shift in my backpack. My mates were deep in conversation about the guys who saved us from the mannequins not too long ago, one hour 16 minutes and 52, no 53 seconds.... but who's counting? Anyways I turned around to open the backpack that was hanging off the back of my chair. My hands shuffled through the endless hole of clutter when something gripped my wrist. I quickly yanked my wrist out of the bag to where it was in front of my face. I shrieked as I saw the mannequin hand spring towards my face. I quickly grabbed hold of its plastic wrist, keeping it a descent distance from my face. I frantically started looking around the room, my head darting in every direction, hoping that the guys from earlier would come, even though there was a very slim chance that they would. Surprised at what I had found dashing through the doorway to the restaurant, I loosened my grip on the hand, accidentally allowing it to fall and cling to my face. I felt someone trying to tug it off me, but it wouldn't budge. I mumbled cries for help as I attempted to pry it off me. Suddenly everything went black. I know this A/N is kind of pointless but if any of the members of 1D are reading this or any of my other fanfics, plz comment. And NO FAKING if u do I will completely stop writing... FOREVER. But if u really are there please comment saying u r and what u think. Keep calm and eat Nando's!!! Loading ...
global_01_local_1_shard_00001926_processed.jsonl/51225
Send to Choose Destination Percept Psychophys. 1991 Jun;49(6):531-40. Manual discrimination of force using active finger motion. Author information Massachusetts Institute of Technology, Cambridge 02139. In these experiments, two plates were grasped between the thumb and forefinger and squeezed together along a linear track. An electromechanical system presented a constant resistance force during the squeeze up to a predetermined location on the track, whereupon the force effectively went to infinity (simulating a wall) or to zero (simulating a cliff). The task of the subject was to discriminate between two alternative levels of the constant resistance force (a reference level and a reference-plus-increment level). Results of these experiments indicate a just noticeable difference of roughly 7% of the reference force using a one-interval paradigm with trial-by-trial feedback over the ranges 2.5 less than or equal to F0 less than or equal to 10.0 newtons, 5 less than or equal to D less than or equal to 30 mm, 45 less than or equal to S less than or equal to 125 mm, and 25 less than or equal to V less than or equal to 160 mm/sec, where F0 is the reference force, D is the distance squeezed, S is the initial fingerspan, and V is the mean velocity of the squeeze. These results, based on tests with 5 subjects, are consistent with a wide range of previous results, some of which are associated with other body surfaces and muscle systems and many of which were obtained with different psychophysical methods. [Indexed for MEDLINE] Supplemental Content Loading ... Support Center
global_01_local_1_shard_00001926_processed.jsonl/51253
With Nintex Connectors, it's easy to integrate the business apps you use every day into your workflows. Just drag and drop a built-in connector into the designer canvas to leverage any system of record in your automated process. You can even create your own connector with our Xtensions™ framework. Extend the power of your apps Improve the agility of your enterprise-wide processes by connecting business apps and automated workflows. Sync your most important systems and content repositories with clicks, not code. Just drag, drop, and publish. Build your own connectors using Open APIs to meet your unique business needs. The Nintex Xtensions™ framework makes it easy. Connect your systems of record Automate your business processes—without limitations. Streamline the tasks that make up your process by connecting the various tools your teams already use. Nintex seamlessly integrates cloud-based apps, ERP and CRM systems, and content management systems within your workflow, making it easy to do your work, your way. Keep your processes moving Use our Box connector as a start event to kick off a workflow when a file is created. Drag and drop a Zendesk connector in your workflow designer to automate actions like creating, updating, or retrieving a ticket. Configure a workflow to run when a new sales opportunity is created within Microsoft Dynamics, and more. Break down app silos Nintex provides a number of out-of-the-box connectors, including SharePoint Online, Microsoft OneDrive, Microsoft Dynamics CRM, Salesforce, Adobe, DocuSign, Box, Dropbox, Twilio, Zendesk, Slack, Google Drive, Azure Active Directory, and SQL, to name a few. It’s easy to manage your toolbox by customizing their order and toggling connectors on or off, depending on your business needs. Create your own connections Need to use a system that isn’t provided out-of-the-box? Nintex Xtensions™ provides a framework that enables you to build custom connectors using Open APIs. Connect your workflow to virtually any system, including legacy systems and modern SaaS apps. Connectors in action What’s the best plan for business?
global_01_local_1_shard_00001926_processed.jsonl/51279
Author: ISEN-Toulon Date: 27 Jan 2014 We are Engineering student in electronic and computer science and we work on a project using the A20-olinuxino name "the cowbox". This project is a hand-held standalone server containing in a little box, broadcasting its own network and containing web applications for coworking. These web applications for example are an etherpad, an ethercalc, a scrum tool and you can also share files via local ftp by wifi. It was already done on a raspberry but we want to put it on a more performing platform and using the A20 Olinuxino. Wiki : tumblr : tweeter : @cowbox_isen
global_01_local_1_shard_00001926_processed.jsonl/51324
Program your Finances: Reporting for Fun and Profit Note: you can find much more information about ledger on, including links to official documentation and other implementations Another note: I've written a new version of this that is much more dynamic and flexible named Ledger Web. Last year I wrote what ended up being the most popular article on this blog ever, Program Your Finances: Command-line Accounting. That post went over how I track and report on my finances using a program called Ledger along with a few helper scripts. Recently I expanded that toolset quite a bit and wanted to show how keeping meticulous track of your finances can give you superpowers. Read on for the gory details. Stan the Example Man Talking about personal finances is kind of a tricky thing. If you want to give anything more than a cursory treatment of the subject you have to have some data but the closest source of data to hand is always your own. Some people have decided to talk publicly about their data but I'm not quite ready to to that. Instead, I've written a little python tool to generate a plausible but random history when given a simple json config file. Here's a super simple example: "payee": "Kettleman Bagels", "dow": 3, "postings": [ ["Expenses:Food:Breakfast", [7.20, 7.80]], This says, "Every day on Thursday, buy breakfast at Kettleman Bagel Company. It should cost between $7.20 and $7.80." The dow key is the day number, where 0 is Monday and 6 is Sunday. The postings array gives a list of Ledger postings that should be inserted for this entry. The first element is the account name, the second is one of: a single float representing the amount in dollars; empty, meaning that this entry should be the balance of all the other entries; or an array of arguments to pass to Python's random.triangular function. There are a bunch more options that I won't get into here but you can see in the github repo. Using and this config, I've created a ledger file for a gentleman who we'll call Stan. Why "Stan"? Because he's the man, that's why. Stan is an unattached twenty-something software developer living in Portland, Oregon. He has a car, a moderately sized student loan, and a pretty decent apartment in a so-so area of town. He's been tracking his expenses for almost four years using Ledger, and he's pretty good at it now. (For the curious, Stan is loosely based on me. Simplified in places, exaggerated in others, cheerfully optimistic in salary.) Reporting? What's that mean? Collecting all of this data wouldn't be worth a whole lot if I couldn't analyze it in various ways. Ledger lets me look at things lots of really interesting ways, but sometimes it's a little bit too low level. Too nitty gritty. Too miss-forest-for-the-trees. Sometimes I want to step back and get a bigger view of where my financial life has been, and were I can expect it to lead, and maybe where I should make some changes. When a business wants to do this, they create a series of financial reports. Lots of businesses are compelled to do this by the SEC because they're public corporations, but every well-run business will create these reports regularly to help them keep on track. Well, I'm kind of a business, right? I do work and receive money as the result of that work. I have short and long term debt, investments, equitiy, assets, etc etc. My sole motivation isn't profit, of course, but in a lot of other respects I try to run my finances as if they were a business. To that end, I've made a series of tools that produce a suite of reports that are fairly similar to what a business would want. From top to bottom we have: • Balance sheet A snapshot of important accounts and a general idea of "net worth" over time. • Net worth chart A monthly overview of the "Total" line from the balance sheet for all available months. • Income Statement A monthly breakdown of income, expenses, and liability payments. • Burn Rate Given Stan spends the "Burn" column on average every month for the trailing 12 months and assuming he'll spend about that same amount going forward, his savings will last him "Months" months. He'll run out of money sometime in February 2012. But Ledger is a command line program! Ledger is a command-line program, that's true. I couldn't go directly from my ledger file to pretty html reports with charts and tables, so I invoked two of my favorite chainsaws to hack this out: PostgreSQL and python. PostgreSQL is a wonderfully powerful database that happens to be open source and community driven, and also very easy to use. Python is, well, it wouldn't have been my first choice until pretty recently, but now that I've started using it perl has kind of dropped off my radar. It's pretty great. Here's the outline of how this thing works: 1. Start maintaining a ledger file 1. Create a PostgreSQL database with the ledger schema 1. Export the ledger to csv using ledger csv and load it into PostgreSQL using 2. Run some sort-of complicated queries and dump them into HTML tables using 3. Style the html tables using jquery.datatables and build a chart using jqplot When I started this I knew I wanted a sql database. I chose PostgreSQL in particular over sqlite both out of familiarity, but also because it handles dates so well. Date is a top-level data type in postgres, instead of having to do weird things with strings like in sqlite. Why a SQL database instead of just futzing with stuff in python data structures? Because in SQL I can express a rotated dataset pretty easily, whereas in python it would have been a lot of code. See for examples of this. Also, it lets me index the hell out of the tables, build summary tables with weird conditions, and still be able to do neat queries. Neat Queries You Say? Honestly, with a lot of work these reports could have been expressed using straight ledger without involving the database at all. It would have been nastier and terser and kind of weird, but I could have done it. Here's a query that ledger would not have been able to do as far as I know, however: sum(case when pay_period = 1 then amount else 0 end) as pp1, sum(case when pay_period = 2 then amount else 0 end) as pp2 account ~ 'Expenses' and account !~ 'Taxes' and account !~ 'Interest' group by xtn_month >= '2011-01-01' order by xtn_month | pp1 | pp2 2011-01-01 | 418.79 | 1249.39 2011-02-01 | 477.18 | 1146.11 2011-03-01 | 432.92 | 1316.65 2011-04-01 | 439.95 | 1274.56 2011-05-01 | 385.60 | 1417.73 2011-06-01 | 547.77 | 1193.86 2011-07-01 | 189.75 | 0 Being able to group by completely arbitrary things in ledger has been a pain point for me since I started using it. In this case, I'm grouping by pay_period, a column that has this definition in aggregated_accounts: WHEN ( xtn_date >= '2010-12-05' and extract('day' from xtn_date) between 1 and 14 ) THEN 1 WHEN ( xtn_date < '2010-12-05' and ( extract('day' from xtn_date) between 1 and 6 or extract('day' from xtn_date) between 22 and 31 ) THEN 1 ELSE 2 END as pay_period The "Burn" calculations are another example. Before I had the data in postgres I had an extremely messy shell script that invoked ledger, date, and dc to calculate it, and if anything broke it all fell down with a weird error. The only drawback right now is that the postgres/python setup can't handle differing commodities very well. I track my investment accounts in ledger right along side my transactional accounts and ledger has the ability to go download price quotes for the holdings in those accounts whenever you want and do various calculations on them, but the way I'm doing the CSV export right now doesn't do any of that. With this setup, I'm able to keep my financial data in a simple, easy to use format and retain the ability to do quick checks on it using ledger. In addition, I can do compilcated queries that would get extremely nasty in straight ledger. It's really the best of both worlds. I've put the tools on GitHub if you want to check them out and maybe install them and try them out.
global_01_local_1_shard_00001926_processed.jsonl/51333
Dismiss Notice Join Physics Forums Today! Homework Help: Conservation of angular momentum axis 1. Oct 15, 2012 #1 what point and about what kind of axis can we conserve angular momentum?can we conserve it about a point moving in circular motion? 2. Relevant equations 3. The attempt at a solution its just a understanding based question to apply to problems 2. jcsd 3. Oct 15, 2012 #2 Conservation of angular momentum is a phenomenon and not a quantity which may have point, direction etc. I don't understand your next question. But I think this may help you-You don't need to conserve the momentum, rather it's in nature that the momentum will always be conserved provided the fact that no external torque is given. 4. Oct 16, 2012 #3 i wanted to say for example there is rod standing with base on ground.u hit it say with some ball or anything it will begin to rotate.on ball+rod system about what point (centre of mass or point on base on ground or any other point) can i conserve angular momentum and apply equations.in which case i would be wrong to conserve it and why?
global_01_local_1_shard_00001926_processed.jsonl/51334
Dismiss Notice Join Physics Forums Today! Homework Help: Gibbs Free energy 1. Sep 29, 2006 #1 Why must Gibbs Free Energy >0 for a reaction to occur? 2. jcsd 3. Sep 29, 2006 #2 Andrew Mason User Avatar Science Advisor Homework Helper Have a look at http://en.wikipedia.org/wiki/Gibbs_free_energy" [Broken]which explains the origin of the concept of Gibbs Free Energy. If the Gibbs Free energy is less than 0, the reaction will not result in heat being available to do useful work. Last edited by a moderator: May 2, 2017 4. Sep 30, 2006 #3 thank you!
global_01_local_1_shard_00001926_processed.jsonl/51335
Dismiss Notice Join Physics Forums Today! Homework Help: Recoil Problem 1. Nov 7, 2005 #1 can anyone help me with this problem ?? if i am given the mass of a person shooting and arrow, the mass of the arrow and the velocity at which the arrow was shot, what formula could i use to find the the recoil speed of the person. Last edited: Nov 7, 2005 2. jcsd 3. Nov 7, 2005 #2 i've tried using (M1*V1)+(M2*V2) = (M1+M2)*Vf but that didn't work. i've also tried to use M1V1 = M2V2 a couple of ways but can't get the right answer. am i even close to using the right equation?? 4. Nov 7, 2005 #3 Yes you are trying to conserve momentum. You need to use the first one but in a different way. 5. Nov 7, 2005 #4 ok, thanks i was actually doing it right but i'm an idiot and converted g to kg wrong.
global_01_local_1_shard_00001926_processed.jsonl/51341
Give Thanks Forum Freebie Discussion in 'Our Happy Place!' started by shelleyr, Nov 26, 2018. 1. shelleyr shelleyr Designing Ninjas Attached Files: G.J. and crazsquaw like this. 2. lebjs lebjs I run with Scissors Thank you! shelleyr likes this. 3. crazsquaw crazsquaw Challenge Master Thanks, these are all so great! shelleyr likes this. 4. Jazz2000 Jazz2000 Active Member Thank you! 5. G.J. G.J. Member Thank you so much Share This Page
global_01_local_1_shard_00001926_processed.jsonl/51346
The tone-deafness of so many elected and public officials never ceases to amaze. Last Friday, for example, New York City Mayor Michael Bloomberg, himself a billionaire, weighed in on health care reform by commenting that people shouldn't beat up on pharmaceutical companies and insurance company CEOs because they "don't make a lot of money." Aw. c'mon, Mister Mayor. Everybody knows pharmaceutical companies make lots of money, and so do insurance company executives. How can folks help but shake their heads when they hear such off-the-wall comments? Bloomberg was speaking during his regular radio show. He owns the radio network. So he has a regular platform to say ... well, whatever. Normally, Bloomberg comes off as what he is: an incredibly smart and capable guy. He's a Harvard Business School graduate who became a successful equities trader and then founded a highly lucrative financial information company. His fortune is estimated at $16.5 billion, making him one of the richest Americans. But in this instance he wasn't smart at all when it comes to talking to regular folks. Sure, insurance CEOs don't make much money ... compared to Bloomberg. But their multi-million-dollar compensation packages dwarf those of the average worker. Most of the time people don't resent these large salaries and benefits. In fact, plenty of people aspire to them. It's part of the ongoing, ever-present American dream of bettering oneself materially. But here we are, in the midst of a very bad recession, with a high and climbing unemployment rate, a record-setting number of home foreclosures and people struggling to keep hearth and home together. Hardly the time to argue that the fabulously wealthy aren't really all that wealthy. Instead of trying to persuade his listeners that rich folks aren't rich, maybe instead the good mayor could share some money-making tips that regular folks, including the financially strapped unemployed among us, could use. Now that would be a radio show worth a listen.
global_01_local_1_shard_00001926_processed.jsonl/51364
As events in Iraq escalate and move toward full-blown civil war, we in Maine should reflect on how this horrible situation got to where it is today. Estimates of the number of Iraqis who have died since the U.S. invasion in 2003 range from around 130,000 to more than 500,000. The upper estimate is roughly equivalent to half the population of Maine. In addition to the vast numbers of dead, hundreds of thousands have been wounded and millions displaced. In place of a ghastly dictator, Iraq is now governed by regional powers, militias, terrorist cells and a government pulled between dependency on the West and loyalties to Iran. Iraq is quickly becoming a battlefield for almost all major regional interests in the Middle East, including al-Qaida and the Iranian Revolutionary Guard. The fundamental collapse of stability in the Middle East, centered on the core of the region (Syria and Iraq), is tremendously threatening for the people of the region and the world. The Iraq war has been and continues to be a tragedy and a catastrophe of massive historical proportions, becoming more tragic and more catastrophic as times goes by. Seen in human terms, the Iraq war is the United States’ greatest foreign “policy” error since Vietnam. The ramifications of the war and civil war in Iraq have been and will continue to be more globally destabilizing than either Vietnam or Korea. If we contemplate the more complete picture, spanning from Iran to Iraq to Syria to Lebanon, we see frightening portents of major regional conflicts – conflicts that could draw in Turkey, the Gulf States and even Israel. Again, the human catastrophe of this expanding picture of regional instability is beyond comprehension. Taken together, the combined total of people who have already been killed as a result of conflicts in Syria and Iraq since 2003 is approaching 2 million. The political fracturing threatens the fundamental regional order that emerged from World War I, making the region ripe for ethnic and religious violence, ethnic cleansing and ultimately genocide. If we can agree that the wars and conflicts in the core of the Middle East are the single most significant set of world events since 2003, we are compelled to revisit some tough questions. One such question centers on responsibility for the Iraq war. In 2006 and 2008, U.S. voters punished the Bush administration and other champions of the war. Hillary Clinton, for example, was punished in 2008 and has finally offered a tepid admission that she made a mistake. Yet so many of the Iraq war’s supporters remain in the House of Representatives, the U.S. Senate and in official positions within the federal bureaucracy. Out of the 49 Senate Republicans who voted on the Iraq War Resolution in 2002, the only one who opposed the war was Rhode Island Sen. Lincoln Chafee. Chafee (who has since changed parties) lost his re-election bid in 2006, principally because of constituent anger about the deteriorating situation in Iraq. With Iraq momentarily back in the spotlight, it is time to return to the question of responsibility – and Sen. Susan Collins must shoulder her share of responsibility for this enormous error, even if that error was made in good faith. Such a defining mistake, such an error in judgment, such an absence of critical thinking and grounded skepticism indicate, in my mind, a person unfit to represent the people of Maine. It is time for all those who supported the Iraq war to face the decisions they have made and assess how they contributed to where we are today. I hope Sen. Collins will do this. If she does, she will have no other choice but to resign her office immediately. All others who supported the war should do the same – both Democrats and Republicans. Such acts, while they would not make anything better for the people in Iraq or Syria, would at least signify a sense of moral responsibility at the heart of U.S. political life. But how absurd, some will say, to expect such a showing of moral character in a realm governed by money and power! Alas, I’m afraid the “realists” are right. That’s precisely why we “moralists” need a leader. Sen. Collins could be that leader. I challenge Sen. Collins to have the bravery and character to quit for this moral cause. She owes it to the families and friends of the U.S. citizens, foreign allies and especially to the Iraqis who have died in part because of decisions she made. And she owes it to the dead. — Special to the Press Herald
global_01_local_1_shard_00001926_processed.jsonl/51387
Soundcraft by HARMAN Redefines Affordable Mixing: Si Impact Digital Console Now Available Soundcraft by HARMAN is showcasing the Si Impact Digital Console at Winter NAMM 2016 Publish date: ANAHEIM, California – Soundcraft by HARMAN is showcasing the Si Impact Digital Console at Winter NAMM 2016. Available now, the Si Impact draws on Soundcraft’s more than 40 years of excellence in live sound mixing, combining the latest digital innovations together with its unrivalled sound quality. The Si Impact is designed to be as simple as an analog mixer, but with radical workflow enhancements and DSP power that make it a perfect tool for the stage and the recording studio. The 40-input Soundcraft Si Impact offers powerful live sound digital mixing with ViSi iPad® control and built-in Stagebox connectivity for I/O expansion. In addition to its live sound components, the Si Impact has a 32-in/32-out USB recording and playback interface that provides easy multitrack recording and playback directly from a DAW. Right out of the box, you get a free download of Ableton Live 9 Lite. The fully motorized faders come equipped with Soundcraft® FaderGlow illumination technology and LCD channel displays or ‘scribble strips’ for visual feedback and easy operation. The Si Impact provides 32 mic/line inputs, 40 DSP input channels (32 mono inputs and four stereo channels/returns) and 31 output busses (all with full DSP processing and GEQ) with 20 sub-groiup aux busses and four mono/stereo matrix busses. Eight XLR/quarter-inch combi-jacks are available for line inputs and instruments, while a 4-band fully parametric EQ is available for each channel and bus. The Si Impact also offers studio grade effects and dynamics from Soundcraft’s sister companies BSS, Lexicon and dbx. The Si Impact supports up to eight VCA masters and eight Mute groups, plus 26 motorized input faders and LR/Mono (fully motorized with four fully customizable fader layers). The console also features a 5-inch color touchscreen display for easy access to show setup, patching, FX, and security. And, of course, the Si Impact features the legendary British sound of Soundcraft. “The Si Impact is the first mixer of its kind in that it truly combines analog workflow with digital flexibility at a lower price than ever before,” said Noel Larson, Retail Solutions, HARMAN Professional. And thanks to the USB interface, it’s equally at home in the studio or on the road.” More information on the Si Impact can be found at
global_01_local_1_shard_00001926_processed.jsonl/51431
Mailing List Your Targeted Mailing List Need a list? We can help you build your mailing list! Target consumers with direct mail demographic and lifestyle mailing lists by zip code, census tract and all geographic criteria. Binders & Tabs Find your target prospects and select advanced demographics with the help of our on-site marketing analyst.
global_01_local_1_shard_00001926_processed.jsonl/51490
People protest near a McDonald's restaurant along the Las Vegas Strip, Nov. 29, 2016. (AP/John Locher) Our cruel Labor Day tradition: We mistreat the workers we celebrate Labor Day become a national holiday in the 19th century, but a number of important battles still need to be fought follow us in feedly Matthew Rozsa September 3, 2018 3:00pm (UTC) There is a cruel irony to our celebration of Labor Day in 2018 — one that, given the holiday's history, is perhaps appropriate. The push for a national holiday honoring working people began in the mid-1880s, when a number of municipalities passed ordinances recognizing it as a holiday within their jurisdictions. By the end of that decade, eight states had also passed laws recognizing Labor Day, including Oregon, Colorado, Massachusetts, New Jersey, New York, Connecticut, Nebraska and Pennsylvania. By the time the federal government relented and made Labor Day into a national holiday in 1894, an additional 23 states had passed laws recognizing it as such on their own books. Yet if you study the history of the late 19th century, you will notice that it was a period in which labor unions were very weak. It wasn't until the early 20th century that America had a Progressive Era — namely, a period in which social and economic reforms were implemented that attempted to restrain the excesses of capitalism. And that is where the parallels between American history from a century ago and American history today come into sharpest relief. "Progressivism in the early 20th century was more than impulse and a movement," Eric Arnesen, Professor of Modern American Labor History and Vice Dean for Faculty and Administration at George Washington University, told Salon. "It had many different strands. But one of the strands, or one of the themes, was in the sense that unregulated capitalism and an unfettered market was producing a good deal of damage in American society. Environmental damage, damage to workers' bodies and minds, child labor-inflicted damage upon young people. And so there was a sense that unrestrained, unregulated capitalism, left to its own devices, would spin out of control. And it was giving rise to considerable social and political and labor unrest." He added, "So reformers of various stripes banded together in different moments, in different movements, with different pieces of legislation to attempt to kind of rein in capitalism, as they saw it, run amok. And they put restrictions on it to try to sand off its rough edges, to regulate it so that it would work better and that it would not produce the social conflict that it was producing." Arnesen also traced the history of progressive reform movements in the United States. READ MORE: Donald Trump's unpardonable endgame: Does the president have unlimited power to pardon anyone? "The Progressive Era was Stage One. The New Deal was Stage Two and went much further than the reforms of the Progressive Era. And then you fast forward to the late 20th century," Arnesen explained. "And from the 1970s onward, and this picks up speed in the 1980s with the Ronald Reagan administration, there are concerted efforts to dismantle aspects of the welfare state, of the New Deal order, to roll back various progressive reforms. And the notion that the market itself had been fettered, and that economic growth and development and wealth could be unleashed by unfettering the market, involved kind of a forgetting of why we had that regulation in the first place. And it transformed into a celebration of deregulation, of an unfettering of the market, and that meant rolling back environmental legislation, rolling back various banks and financial regulation, and of course rolling back labor legislation." These periods in American history are important to note. During the Progressive Era Americans gave women the right to vote, strengthened labor unions, began regulating big businesses to account for consumer rights or environmental protection and attempted to address issues like systemic poverty and urban blight. The New Deal era, which refers to the flurry of progressive legislation passed by President Franklin D. Roosevelt between the start of his presidency in 1933 and the onset of World War II, added programs that focused on providing relief for the unemployed, poor, elderly and individuals in economically vulnerable professions (like farmers); creating jobs through government action if and when necessary; regulating the financial system to prevent a repeat of the Great Depression (it is hardly a coincidence that the worst crash since 1929 occurred after many of those regulations were repealed); and implementing free trade policies that would expand market access to ordinary Americans. After the New Deal, the last period of major progressive reform were the Great Society and War on Poverty programs pushed by President Lyndon Johnson in the 1960s, which included landmark civil rights legislation for racial minorities, the creation of Medicare and Medicaid and various protections for consumers and the environment. Yet while the achievements of the 1930s and 1960s were more radical than those from the first two decades of the 20th century, that period is more analogous to the one facing Americans on Labor Day today. "A number of people, commentators and others, have said that if you're sort of thinking about reform of any sort, the progressive era is the analogous moment, not the 1930s or even the 1960s," Nelson Lichtenstein, Distinguished Professor in the Department of History at the University of California — Santa Barbara, as well as director of the Center for the Study of Work, Labor, and Democracy, told Salon. "The progressive era was a period of enormous immigration. It was also a period of enormous ethnic tensions. There was already the beginning of a restrictionist movement and racism was pretty strong then. At the same time, when it came to things like the labor movement, it had bursts of militancy but basically, institutionally, it was very weak. But at least there was a reform current." He added, "While the Progressive Era was in fact the era of the Gilded Age — you had Carnegie and Rockefeller and enormous inequalities of wealth, just because it was called the Progressive Era doesn't mean that it disappeared, there were enormous inequalities of wealth." As we celebrate Labor Day, it's important that we remember the lessons from American history as it existed 100 years ago. Even though Americans ostensibly honored labor through its celebration of Labor Day, the reality is that working class Americans only began to live in better conditions after they fought tooth and nail for necessary reforms. If we want to live in a better world — one where people are able to work normal hours and receive a decent income for doing so, in which the environment is protected and their products are safe and large corporations can't cause an economic crash through chicanery — then we need to realize that Labor Day as a holiday is not enough. When it comes to our politics, every day has to be Labor Day. A new vision for Democratic Party leadership Why Democrats need a complete overhaul. Matthew Rozsa MORE FROM Matthew Rozsa Read Now, Pay Later - no upfront registration for 1-Hour Access Click Here 7-Day Access and Monthly Subscriptions also available No tracking or personal data collection beyond name and email address Fearless journalism in your inbox every day Sign up for our free newsletter • • •
global_01_local_1_shard_00001926_processed.jsonl/51513
Blues diva Joyann Parker releases her new music video today, entitled "Envy." The single is from her new studio album, Hard to Love, which dropped April 13. Hailing from Minneapolis, Minnesota, Parker first performed in public in church, at the age of two. She never looked back. Now she's a gifted instrumentalist and songwriter whose electrically-charged voice infuses the blues with delicious textures of luscious soul. "Envy" rides a funky blues-flavored tune with a throbbing, elemental groove. A trilling organ holds down the high notes, while a cavernous bass supports the bottom ones. The middle relies on the tonal glow of a superb guitar, metallic and twangy. Parker's gorgeous, galvanizing voice guarantees the song's feel, mood, and bluesy tang. It's a voice full of dark sonic textures and nuanced timbres replete with venomous hues of envy, yearning, regret, and a yowling, growling tarnish that injects the tune with femme fatale intensity. The lyrics relate Parker's jealousy of her lover's wife, as she speculates on the similarity of the beguiling lines he uses. Still, as powerful as the lyrics are, it is Parker's rancorous delivery, full of gall and spite that impregnates the words with reproachful energy. "Do you talk to her / Like you talk to me / Do you tell her that you love her / Say she's all you need / Do you tell her she's the best thing you've ever done / Do you look in her eyes and tell her she's the one / Oh, and do you call just to hear her speak / Oh, do you talk to her like you talk to me." The video, directed by Daniel Cummings, merges shadows with hints of light into a ghostly presentation permeated by the sinister sonic mauling of the green-eyed monster. "Envy" oozes the essence of begrudging intimacy and passionate emotions. The bluesy harmonics pulsate with tight, raw tones, and Joyann Parker's soul-laden voice imbues the music with Jovian vitriol, evoking a welter of reactive feelings. So much so, that if she keeps it up, she'll be the new Queen of the Blues. Follow Joyann Parker on her website, Facebook, and Twitter. The post Music Video Premiere: Joyann Parker - 'Envy' Suggests a New Queen of the Blues appeared first on Blogcritics. View the original article on
global_01_local_1_shard_00001926_processed.jsonl/51567
Tips for Treating Toddler Skin Rash There are a wide variety of causes for toddler skin rash that may include, but are not  limited to, allergies, an infection, a virus, a parasite or a drug reaction. Typically, skin rash in children is diagnosed based on the appearance of the rash, rash location, blisters and any accompanying symptoms such as fever, lack of appetite and lethargy. Clues can be provided by exposure to other sick people, antibiotic use, tick bites, other bug bites, immunization reactions, time of year, and possible environmental causes. If rash is accompanied by fever and lethargy, be sure to call your pediatrician immediately, particularly if the rash cannot be blanched (place thumbs together on rash, pull apart, if skin turns white, probably not an emergency, if skin stays red, call Doctor - see video at end of article). This is only a guideline, as this site is for information only and does not replace the advice of a medical professional. The good news is that many rashes are caused by viruses, don’t hurt your toddler. In fact, most of them fade without needing treatment. There are some rashes however, with serious or life-threatening causes. Many rashes look the alike which makes it hard to know the precise diagnosis. If you don’t know what you are dealing with, call your doctor for an appointment immediately. In all cases of toddler skin rash, the physician will do a visual examination. Even Doctors can have a tough time diagnosing a rash, since the same underlying condition can result in rashes that are different from person to person. If necessary, they may do skin tests to determine what they are dealing with in terms of the rash affecting your child. There may also be a round of blood tests (a complete blood count), UV light analysis and other specialized tests for the disease your doctor may suspect your toddler has. Don't try and diagnose a toddler skin rash yourself.  Instead use these descriptions to have a productive and informed conversation with your Doctor.  This site is not meant to be a replacement for the advice of your physician. When to Call the Doctor Toddler skin rash is difficult for even Doctors to diagnose.  Be sure to note any symptoms that occurred before the rash appeared such as fever, changes in behavior (lethargy, tiredness), appetite change etc. Video: How to Judge if a Toddler Skin Rash is an Emergency This site is not a substitute for your pediatrician.  Use the information provided at your own discretion.  It is always best practice to call your pediatrician, particularly when your child has a fever accompanied by rash. As noted in the video above, a quick way to tell if a rash is an emergency is to take your two thumbs, put them together, press the skin and pull apart.  If the rash fades and turns white when pulled apart by pulling the thumbs apart, the rash is much less likely to be an emergency.  If you pull the skin area with your two thumbs in opposite directions and it doesn't turn white, then you should contact your pediatrician regarding the toddler skin rash immediately.  Descriptions and Causes When calling the doctor use the following language to describe the rash. Descriptions include possible causes. • Scaly/Crusty: often starts as a blister and is common to disease such as ringworm, impetigo and chicken pox. • Blotches: flat and usually does not have one color. In the case of allergic reaction part of rash may be flesh colored while rest is red • Welt: raised, part skin color and red. Can be large or small, often an allergic reaction that results in a hive. • Pustule: Blister that is filled with pus. Common in cases of chicken pox, poison ivy and acne. • Lacy: Flat and mottled red skin irritation. Caused by Fifth's disease. • Flat: You cannot feel the skin irritation to the touch. Often caused by eczema or sun rash. • Raised Irritation: you feel any skin bumps or dots. Caused by heat rash, molluscum and roseola. Types of Skin Rash in Children The most common causes of toddler skin rash includes: Chicken Pox Skin Rash Chicken pox is highly contagious and caused by varicella-zoster. While not harmful to most children, it may last 2 weeks and make your toddler uncomfortable. May be serious for those with weak immune systems. The first signs of chicken pox are usually fever and sore throat and being extremely tired. Within 24 hours, the chicken pox rash appears, starting at the head and torso then spreading to arms and legs. Raised pimples appear on the skin.  A blister is present in the middle of rash. When it breaks, it scabs over. The rash lasts about 7 to 10 days. Chicken Pox Toddler Skin Rash There is no treatment per se for chickenpox, other than to give supportive symptom care. Do not give your toddler aspirin, as you run the risk of Reye’s syndrome. Coxsackie viruses, Herpangina and other enteroviruses (hand, foot and mouth disease) These families of viruses are very common. The two most often seen diseases in toddlers are hand, foot and mouth disease and Herpangina.  It is more common in the summer. Video: Coxsackie Foot and Mouth Disease For hand foot and mouth disease, toddlers have moderate to high fever for 1-2 days and then the rash appears (101 to even 105 degrees Fahrenheit).  There is only a concern if the fever does not go away for a couple of days (call your Doctor whenever a child has a high fever). Hand, Foot and Mouth Disease (Coxsackie Toddler Skin Rash It is called hand, foot and mouth disease because this is where the toddler skin rash appears  It can cause blisters in the mouth and on the tongue (with difficulty swallowing), palms and soles of the hands and the feet. Blisters look like pin pricks. It may occur on the buttocks or the genital area. Herpangina appears with a fever, headache, sore throat, and painful blisters/ulcers in the back of the mouth. No specific treatment is needed other than Tylenol or Motrin for fever. Be aware of the risk of dehydration, so encourage the child to drink. Live cultured yogurt and Benedryl can help with the sores in the mouth. It is difficult to tell the difference between this toddler skin rash and strep, so be sure to see a Doctor. Toddler Eczema Toddler Eczema is characterized by  atopic dermatitis (skin reaction) including Itchy and dry skin, which usually runs in a family. A medical history of asthma, food, seasonal allergies and allergic sinus problems are related to the condition. There are several types of eczema including conditions caused by allergy (food, medication) or direct contact with a trigger such as plants or clothing.  The cause may not be identified. Toddler Eczema Rash - example 1Toddler Eczema Rash Symptoms of toddler eczema develop on the cheeks in infants, but in older children is seen on the truck in a 1 year old.  In children older than a year, it appears on the wrists, knees, finger creases and elbows. In the beginning skin rash can start and stop.  It is characterized by red skin patches,  Patches feel rough, but can become itchy, scaly and crusted.  Use fragrance-free soaps for body and laundry. Moisturizers for skin hydration. Topical steroids may be prescribed, applied after bath to retain skin moisture. Antihistamines for itching. With staph bacteria, antibiotics. Non-steroidal anti-inflammatory creams may be used if corticosteroids don’t work.  Over the counter hydro-cortisone ointment can be used (1/2% or 1%) under the direction of a Doctor when a flareup occurs. If allergy is the cause, elimination of the allergen is important.   Warning: The herpes virus can result in a skin infection in children with eczema.  Keep adults with herpes virus cold sores away from children with this condition. Fifth Disease (Parvovirus B19 erythema infectiosum) Fifth disease in toddlers is referred to as “slapped cheeks” disease and erythema infectiosum and is caused by human parvovirus B19.  It usually occurs in Spring, and occurs when children are 18 months to 2 years and older.  The rash is benign (harmless) in most children. Fifth Disease Rash - Example 1 - 374px x 271pxFifth Disease Toddler Skin Rash on hands of an elementary school age child. It is contracted when a toddler comes in contact with an infected person. Toddler fifth disease may come on mimicking a cold, with the rash appearing after the viral illness is gone and the toddler is not contagious any more. You may see bright red cheeks that look like the child was slapped. When that fades, the red, lacy looking rash spreads to the body, mostly the arms. This toddler skin rash may result in the patient having sore joints, knees and elbows. Fifth Disease Toddler Skin Rash - Example 1 - 251px x 234px</span>Fifth Disease Toddler Skin Rash Common During the Spring Season There is no specific treatment for this disease, other than supportive symptomatic care.  The condition can last as long as 6 weeks.  It can become more pronounced after the child is engaged in exercise.  Once the rash breaks out and the child no longer has a fever, the rash is not contagious.  Alert your child's teacher in to avoid exposure if the teacher is pregnant. If the child's temperature is 101 to 103, it if probably not Fifths Disease, but is Strep. Toddler Hives (Urticaria) Hives are common in toddlers. They are raised irritated areas of skin that are covered with a rash and skin bumps. They and are referred to as wheals. Wheal size varies from 1/2 inch to a few inches wide. Large wheals can have a pale center. Toddlers often get hives due to some type of allergy, insect bite reactions or as a reaction to medication.  In the winter, colder air can also be a cause of toddler hives.  Symptoms such as skin itch can come before the appearance of hives. The hives might move from one part of the body to the other, disappearing from one, only to reappear somewhere else.  Hives usually go away on their own in 3 to 4 days, and last no longer than 10 days. Toddler Skin Hives - Example 1Toddler Skin Rash Hives f a toddler has a mild case of hives, no treatment is necessary other than something to help keep a child from itching such as an oral antihistamine.  A cool bath or a natural remedy such as Itch Be Gone could also help with itch. Chronic or severe cases of toddler hives require emergency treatment. This includes trouble breathing, trouble speaking (hives can affect the mouth), fever (associated with serum sickness) and joint pain. Impetigo is caused by strep or staph bacteria and is usually found around mouth and nose, but may appear anywhere. It can be a secondary infection with damaged skin. Extremely contagious. Toddler impetigo begins with small superficial blisters that break open leaving red, open patches of skin which then form a honey colored crust. Toddler Impetigo Rash - Example 1 - 200px x 120pxToddler Impetigo Skin Rash Toddler skin rash treatment for impetigo involves topical or oral antibiotics prescribed by your Doctor.  A Doctor may suggest softening the skin crust by soaking them in warm water (or use a washcloth for 10 to 15 minutes, 4x per day). Follow this softening by washing the area with a mild soap (don't rub or pull the scabs as this can cause pain).  After scabs are removed apply an antibiotic ointment multiple times each day to kill the bacteria. Kawasaki Disease Toddler Kawasaki disease is also referred to as mucocutaneous lymph node syndrome and has no identifiable cause. Scientists think it is caused by a bacteria or virus, but do not know for sure.. It may affect a toddler’s heart if not treated promptly. Seek emergency medical help as soon as possible.  It is very rare in children and affects children age 1 to 2 years old.  The condition is not contagious and can be treated if caught early.  The disease effects 4000 to 5000 cases each year.  Heart problems can be avoided if treated within the 10 days. Video: Toddler Skin Rash: Kawasaki Disease Kawasaki disease symptoms includes high fever for five days straight, red eyes with no discharge, swollen lymph in neck, red cracked lips, strawberry tongue, red eyes and throat, which may be cracked, redness/swelling of toes/fingers with peeling of fingertips, rash may be varied and flat or raised or with blisters.   The hands and feet can turn red. Kawasaki Toddler Skin Rash There is no test to diagnose this disease. The doctor uses evaluative criteria as mentioned about in Symptoms of Toddler Skin Rash. Toddlers may have an elevated platelet count and signs of inflammation. Some patients develop aneurysms or their coronary arteries. Toddlers with Kawasaki are put into hospital and put on IV gamma globulin and high doses of aspirin. Following treatment, a child's temperature will return to normal, although some children may have a recurrent fever. Lyme Disease Lyme disease in toddlers is caused by deer tick bites. Toddler Lyme disease starts with flu-like symptoms, followed by a characteristic circular rash several days to weeks later. Starts with red nodule which gets smaller, but a large red ring spreads out from it. The rash is called erythema migrans and can be small or up to 12 inches wide. Fever, sore throat, stomach pains, neck pain and stiffness, paralysis of the facial nerve, cough. Lyme disease rash on arm - picture example - 266px x 375pxClassic Lyme Disease Rash Pattern If you suspect a tick bite, see your doctor immediately. If not treated, may affect the heart rhythm, cause chronic arthritis, brain swelling etc.   Lyme disease in children can be treated with antibiotics (tetracycline or penicillin) and is most effective is started within 1 month of becoming infected. Measles in children are caused by a paramyxovirus. Measles Skin Rash on Child's Chest, Neck and Head Signs of measles generally arrive 10-12 days after being exposed. Symptoms often starts with stuffy nose and cough, red eyes with no discharge and fever ranging 102 F-103F. Fever elevates to 104F-105F and a brown rash (can also appear as pink flat spots) appears on face, hairline and behind ears, then spreads down to thighs and feet. Rash disappears after a week. There is no medication for measles. Give supportive symptom care. Meningococcemia is also known as meningococcal sepsis. It is life threatening. Neisseria meningitidis bacteria invades the blood. Warning: Haemophilus influenzae, streptococcus pneumonia and staph cause similar symptoms. If you aren’t sure what the rash is, call for medical help right away. Fever and a petechial rash are symptoms. See Fever and Petechiae above. The rash can appear as large bruises on the body. May be congestion, headache, nausea, vomiting and sore muscles, delirium and seizures, which may progress to being unresponsive and comatose. See warning above in Causes of Toddler Skin Rash. Treatment must be administered at a hospital and involves IV antibiotics. Treatment  may require a spinal tap and blood tests. Often fatal, even with antibiotic therapy. Fever and Petechiae Petechiae are red/purple flat spots on the skin that do not fade when pressed. The dots are bleeding from the capillaries and form a small blood blister. See warning above in Causes of Toddler Skin Rash. Toddlers with Petechiae may look healthy, but get very sick, very quickly. Petechiae may resolve in about 7 days without treatment. A Doctor “must” assess your child to see if further tests etc. are needed. Prickly Heat Prickly heat in children occurs during the hot weather when the natural cooling function of the body, sweating, cannot keep up with the high outside heat or humidity condition. Prickly heat symptoms starts on the neck and shoulders and consists of small pimples.  Some of the pimples might blister. Prickly Heat Rash (Miliria) Photo: U.S. Army There is no treatment needed for Prickly Heat other than keeping the toddler out of the heat and humidity. Ringworm is caused by a skin fungus called dermatophytes or tinea (corporis,  faceii). May be anywhere on your toddler’s body, but usually on the face and head. Can be itchy. Ringworm on Toddler Body - Example 1 of 2 - 120px x 90pxToddler Ringworm Skin Rash on Body Ringworm on Toddler Face - example 2 of 2 - 120px x 90pxToddler Ringworm on Face The condition is caused by a skin fungus called dermatophytes or tinea faceii. It may occur anywhere on your toddler’s body, but usually on the face and head. The fungal skin rash can be itchy. Use topical anti-fungals for small lesions. For larger ones and ringworm in the nails or hair, oral anti fungal agents are required.  A natural topical is also available from Naturasil. Rocky Mountain Spotted Fever Rocky mountain spotted fever is caused by wood tick bites and may be fatal if not treated. See your doctor right away if you suspect a tick bite. Rocky Mountain Spotted Fever on Child's Face Caused by Ticks (ixodid hard ticks) There are specific telltale symptoms, as they are common to many other sicknesses: sudden onset of high fever chills, moderate headache, nausea and vomiting often with stomach pain and fatigue. Some toddlers get a rash, others do not. Usually starts at wrists and ankles and spreads to trunk. Rash, flat and red, blanches when pressure applied. Later it becomes raised. May be fatal if not treated. See your doctor. Treatment must be started before blood tests confirm this disease. It may not turn up positive for 10 days after the illness started. Toddlers are put in hospital and given antibiotics. Roseola (Roseola Infantum or Sixth Disease) Roseola is also called exanthema subitum or sixth disease and is very common. It is caused by human herpes virus 6 or 7, although 7 is not seen that much.  It is seen in children age 6 months 2 years of age. Video:Roseola or Sixth Disease Onset is a mild respiratory infection followed by a high fever that spikes within 2 – 7 days.  The rash follows the fever breaking.  Rash is small, flat and pink or raised lesions on the body and then spreads to the arms and legs.  Rash typically last about two days.  In 10% of children the high fever can cause seizure or convulsions.  Call your Doctor immediately when fever is accompanied by lethargy (tiredness). No therapy available to treat this, although Tylenol may be used with care to lower the fever.  Sponging with lukewarm water can also help the child to feel better.  DO NOT give your child aspirin. and provide fluids to avoid dehydration. Rubella (German Measles) Rubella in children is also knows as Three Day Measles or German measles. It is caused by a Rubivirus. German Measles (Rubella) on Child. Rash Can Be Mild or Pronounced. Rubella has an Incubation period of 14-21 days. A toddler displays pink/light red rash on the face and body. Other symptoms are: low-grade temperature (100 F), mild joint pain, headache, red eyes without discharge and swollen lymph nodes, particularly behind ears, but also on neck. There is no specific treatment for rubella, other than supportive care. Scabies is caused by a parasite that lays eggs under your toddler’s skin, causing red, itchy lesions. Toddlers contract this from contact with another person with scabies. Everyone at home needs to be treated. This is a serious skin disease. Seek medical help. Scabies is characterized by itching at night, and areas on the skin that look like something burrowed underneath the surface. Toddler Scabies Rash Called Papulovesicular and bullous lesions Photo: Principles of Ped. Dermatology Toddler scabies is caused by a parasite that lays eggs under your toddler’s skin, causing red, itchy lesions. Toddlers contract this from contact with another person with scabies. Everyone at home needs to be treated. This is a serious skin disease. Seek medical help.  Over the counter medications can be used which contain the insecticide benzyl benzoate.  A natural topical approach is also available from Naturasil for parents that would prefer to avoid insecticides. Treatment involves a topical agent left on the skin overnight (see our article on How to Treat Scabies, which includes natural remedies as well). Scarlet Fever Scarlet fever also called Scarlatina, is strep throat with a rash. The bacteria is Streptococcus pyogenes and is very contagious. It may appear in vaginal and anal region. If left untreated, strep may cause rheumatic fever, damage heart valves or cause long-term heart problems. Scarlet Fever Rash on Forearm. Rash has red bumps that appear on the abdomen and chest tha tcan spread to other parts of the body. With scarlet fever the skin will look sunburned and feel rough like sand paper.  The rash should heal on its own in 2 to 5 days. Scarlet fever in children starts acutely with sore throat, moderate fever, headache, upset stomach, and swollen lymph nodes in neck. The rash appears a day after the child starts to feel sick. Rash appears that looks like a sunburn on skin that has goose bumps (feels like sand paper). Flushed cheeks. Moist part s of the body are commonly affected such as the armpits and groin. Anal or vaginal involvement may include redness and no discharge, itching and painful defecation or urination. Typical treatment uses antibiotics of your doctor’s choice. Toxic Shock Syndrome Toddler toxic shock syndrome is life threatening and early on may be confused with measles, Rocky Mountain Spotted Fever and other diseases. Caused by a toxin made by streptococcus or staph aureus. Can be fatal, even with maximum treatment offered. Go to the emergency department immediately if you suspect this. The source of infection must be found. Treatment includes the appropriate antibiotics and supportive care for circulation and major organs. Usually toddlers are admitted to intensive care for observation and therapy. Visual Guide to Children's Rashes and Skin Conditions Slide Show: Common childhood skin problems
global_01_local_1_shard_00001926_processed.jsonl/51569
The Øresund Bridge is a 16 km direct link between Denmark and Sweden. The Øresund Bridge opened in 2000 and since then thousands of cars and trains have crossed the strait between Denmark and Sweden. The bridge consists of both a bridge, a tunnel and the artificial island Peberholmen. Combined it adds up to a total length of 15.9 km. The main architect is Georg K.S. Rotne. #the øresund bridge    #øresundsbroen    #bridge    #transport    #transportation    #sweden    #denmark    #architecture    #panorama view    #overview    Taken 13 June 2017 Uploaded 1 year ago Resolution 9794 x 2859 px Size 160.25 MB Photographer Daniel Rasmussen Mime Type image/tiff Related images
global_01_local_1_shard_00001926_processed.jsonl/51588
Q: When should I pole plant? A: Always. But too many skiers have no idea how to use ski poles, some don’t even use them at all, even though poles are an important weapon in a skier’s mountain arsenal. And I don’t mean as a sword - no matter how often you want to use them against a snowboarder or whatever snow creature you may come across. Here are SnowSkool’s tips to pole plant more effectively: How to pole plant when skiing To start with, do not think of a pole plant as just sicking it in the ground whenever you feel like doing so. Introduce the pole plant as a timing device to keep a constant rhythm and to help stabilize your upper body. Your arms should be up while skiing, with your shoulders facing down the hill. Not flailing by your side, swinging about with each turn; If you do this then you’re doing it wrong! Skiing with your arms down by your side is no good. If you are constantly moving your arms from down by your side, then up, and planting your pole with each turn you will be unintentionally using your upper body to help turn. This is called upper body rotation, this is what you do not want to do. The turn should come from your legs. For a pole plant that leads to a turn from the legs, your arms should be up in a position similar to if you were reading a large book - in front and ready for each turn. Start to associate your pole plant with the end of your turn, not the start of a new turn. By getting into the mindset of planting early at the end of the turn, you will start to establish the balance over the edges of your skis – and gain more commitment to skiing down the slope too. Your lower body alone should be in control of the direction you ski. And you will find that turning will be much easier and natural if there is what’s called ‘separation’ between your upper body and lower body. This means the distinction between your upper body movement and lower body movement.  Separation makes the whole turning process easier and more fluid: when your skis turn across your body, your body then coils like a spring so that when you make the next turn your skis will slide into position and turn under you. This is because your skis and legs naturally want to re-position themselves to point in the same direction as your shoulders.  We can see this separation happen when our skis are pointing in the direction we want to go and our body is open and facing downhill, with both shoulders pointing in a downward direction. The only time your skis and shoulders should be facing in exactly the same direction is when skiing straight down the hill. Remember you will need to be bending at the hips and knees to allow your legs to move independently from your torso. You may be thinking, Ok I get what separation is, what it does and why it is important - but what does it have to do with this blog and using my poles? Answer! By pole planting at the end of your turn (as we mentioned earlier) you are committing your shoulders over your downhill ski. This also means your shoulders will be facing down the hill as they should be, allowing that separation to happen, which all adds up a better ski technique and overall awesomeness on the slopes!  Need more? Our ski improver courses can help you become a skiing demigod. Or you could try an instructor course if you want to show the Hoi Polloi how to plant poles. Get involved! Request Course Brochure Get A Brochure
global_01_local_1_shard_00001926_processed.jsonl/51608
Sports Quiz / NFL Hall of Fame QB Name Match Random Sports or NFL Quiz Can you match the first and last name of every quarterback in the Pro Football Hall of Fame?  Plays Quiz Updated Aug 7, 2016 Score 0/34 Timer 04:00 Guesses Remaining 34 Correct 0 Wrong 0 You're not logged in! Compare scores with friends on all Sporcle quizzes. Log In You Might Also Like... Show Comments Top Quizzes Today Score Distribution Your Account Isn't Verified! Report this User Report this user for behavior that violates our Community Guidelines.
global_01_local_1_shard_00001926_processed.jsonl/51649
Please select your Country Activity Based Costing (ABC) Activity-based costing (ABC) is a costing methodology used to more accurately allocate overhead/indirect costs to the items and activities that use it. The ABC costing method does this by assigning costs to products, services and projects based on the resources activities consumed and the subsequent activities that go into them. ABC is an effective way for businesses to understand the complex relationship between cost and profitability as a result of products, customers, production and processes. By assigning indirect costs to these activities, ABC is used to reduce superfluous overhead, unprofitable products, identify ineffective processes and lower prices.  Often, ABC is used by the manufacturing industry because of the emphasis on production, the complexity of its activities, and their associated costs. Discover how CCH Tagetik Performance Management Software delivers: Profitability Analysis
global_01_local_1_shard_00001926_processed.jsonl/51660
This documentation is for Taxamo v1. If your account is with Taxamo v2 use the documentation at If you are uncertain of your version please contact for assistance. How can I export more than 1000 transactions? Currently, the export function in the dashboard is limited to 1000 rows. To export more data than this you will need to get the data from the API, which will return 1000 rows at a time, so you will need to make multiple calls to the API. This can be done via a URL in the browser. For example, paste these URLs into your browser, and just change the private token to your own, and the offset is the beginning row number that you want to download. Also, please add format=csv if you want to download the data in a .csv file (the default format is JSON).
global_01_local_1_shard_00001926_processed.jsonl/51667
Google's New Startup Dandelion To Heat Homes Using Geothermal Energy Google's parent company Alphabet Inc. is venturing into another territory that may just make heating and cooling homes cleaner and more affordable. Dandelion can bring geothermal energy right into people's homes. Geothermal Energy At Home Dandelion is literally bringing geothermal energy to people's doorsteps, except they are taking it a step further by also bringing the renewable energy source inside homes and under the yard in a more efficient and convenient manner. Born from Alphabet Inc.'s unit X, Dandelion is now working as an independent company which aims to provide geothermal heating and cooling directly into people's homes. In 2004, buildings and residential homes in the United States emitted 2,236 metric tons of carbon dioxide, which accounts for 39 percent of the country's total emissions. This is in large part due to the buildings' cooling and heating units which often utilize energy from the combustion of fossil fuels. It is not just harmful to the environment, it is also quite costly. This is where Dandelion comes in. Essentially, Dandelion aims to bring geothermal energy literally under people's homes where the system could provide ample cooling and heating system that is renewable and a lot less costly compared to traditional fuel-based systems. How Dandelion Works Dandelion's geothermal system works by utilizing the natural energy contained in the ground under buildings and homes to heat its interior in wintertime and reduce the heat in the summertime. In winter, water circulating through the system's underground plastic pipes absorbs heat from the ground and is turned into warm air by the geothermal heat pump inside the home. In contrast, the same geothermal heat pump would absorb the warm air inside the home during summertime and disperse the heat into the earth. Less Destructive Installation One might think that such a system sounds like it would cause quite a bit of damage to the yard in which it will be installed. Not only that, it would probably be costly because of the huge installation. Well, Dandelion thought that too, so it has also tried and tested many different methods to install the system without doing much damage to the property, and at a less costly manner. The company has designed a slender drill which would only drill the holes that it actually needs, which are actually just two deep holes at a few inches in diameter. Compared to traditional installation methods, Dandelion evidently produces less waste; is less destructive to homes; requires less space to work and may be installed in less than a day as opposed to the usual three or four-day installation. This process doesn't just make installation more convenient, it also cuts on homeowners' costs for landscaping. Dandelion is currently focusing on homes in the northeastern United States and is working on the homes of clients in the state of New York. ⓒ 2018 All rights reserved. Do not reproduce without permission. Real Time Analytics
global_01_local_1_shard_00001926_processed.jsonl/51682
How to Create a Budget Paper/Pencil, Spreadsheets, Apps - There Are Lots of Budgeting Tools Budgeting on paper shapecharge/Getty Images Have you never created a budget before? Are you wondering how you can start? Don’t worry. There are plenty of choices when it comes to creating a budget that works for you. Here are a few options to get you started so you can create a budget that will help you reach your goals. The most basic thing you can do to budget is use paper and pencil. You can use these budgeting worksheets to help you figure out how to create this type of budget. The worksheets will take you step-by-step through every expense that’s related to a necessity, such as groceries; every expense that’s related to a luxury, such as dining at restaurants; and every savings goal that you may have. The best way to begin budgeting is by first making an estimate of how much you would like to spend in each category (gas, utilities, groceries) per month. Then, in an adjacent column, write how much you ended up spending that month. You’ll be able to see the difference between the two and adjust accordingly. If you do this for several consecutive months, you’ll get a sense of how much money you’re spending in each category each month. You'll also get a sense of how much money you’re spending overall. You’ll then be able to minimize the variance between your projected spending and your actual spending. If you’re not interested in using a paper and pencil budget, you can use basic free software like Microsoft Excel to create a spreadsheet. Many credit and debit card issuers allow you to export your statements directly into Excel so you can automatically transcribe the information that’s on your credit and debit card statements into the spreadsheet. If you use Google Sheets, you can share your budget spreadsheet with others in your household. Each person who has access to the spreadsheet can update it, and that update takes place in real time. In other words, your household can collectively all access and update the spreadsheet within the "cloud," for free, as long as you have a Gmail/Google account. The great thing about Excel and Google is that each has free budgeting templates available, so you don't have to start from scratch. Online Software If you’re not interested in spreadsheets, you can use online software such as You’ll have to provide the details of your banking and credit card login information, but don’t worry, is secure. This website automatically draws your information and shows you how much you’re spending each month. It also allows you to create goals, such as saving for retirement or saving for a vacation. Are you an investor who likes tracking funds? Personal Capital is another free solution that's similar to Mint but geared toward those with investment accounts. Mobile Apps There are also plenty of apps that will help you budget. Mvelopes is re-releasing an app that allows you to create a virtual envelope budgeting strategy. Some people choose to budget by carrying their cash around in envelopes, with each envelope designated for budget categories like “groceries” and “gas.” This app allows you to replicate that digitally. Online systems like You Need a Budget, Mint, and Personal Capital also have interactive apps that can help you budget. Alternately, if you’re not interested in creating a line-item budget, you could always skim your savings off the top and then spend the rest. I refer to this as the 80/20 budget, and it’s a great budgeting alternative for people who don’t like to scrutinize the details. I've Picked A Tool ... Now What? Now that you've chosen your budgeting tool, it's time to focus on the most important part of creating a budget: putting aside enough money for savings. There are two ways you can do this: 1. You can budget how much money, in general, you want to save for all of your various goals and move all of that money into a single savings account. For example, you might want to save $200 per month towards your next car purchase, $50 towards a car repair fund, $50 towards a vacation, $100 towards home maintenance, $100 per month towards an unexpected health bill, and $70 per month towards a holiday gift fund. You could combine and commingle all of those different goals by contributing the entire total sum into a savings account. 1. Alternately, however, you could open up an online savings account that allows you to create different sub-accounts that are earmarked towards each specific goal. Websites like, for example, allow you to create lots of different sub-accounts labeled for each goal. Now you're ready to start putting your budget into action.
global_01_local_1_shard_00001926_processed.jsonl/51700
The grisly truth about CSI degrees Britain now has a huge number of forensic science courses thanks to the popularity of TV shows such as CSI Programme Name: CSI: Miami Series 4. David Caruso in CSI: Miami Let's call it the CSI Effect: thanks to the uncontrolled proliferation of cop shows focusing on forensic investigation, including Bones, Silent Witness, CSI and its Miami and New York spin-offs, the number of degree courses in forensic science being offered in the UK has rocketed, from just two in 1990 to 285 this year. Prospective students should prepare for disappointment: real life CSI is not like CSI: Miami, not even in real-life Miami, and certainly not in Durham. You won't be a cop, so you won't be able to arrest anyone. A lot of the cool machines they use on TV haven't actually been invented yet, and in the UK you're not even called a CSI, you're called a Soco, or scene of crime officer (although Norfolk constabulary for one has adopted the term CSI for its forensic personnel). Sadly, the degrees may be no more realistic than the programmes. As far back as 2005 a select committee report found "extensive evidence that a large proportion of forensic science courses on offer provide poor preparation for a career in forensic science". For higher level jobs, degrees in traditional sciences such as chemistry are usually required. To wear a paper suit and photograph footprints, a forensic science degree is probably unnecessary. The biggest problem, however, is that crime has not kept pace with the explosion in TV detective shows. The government-owned Forensic Science Service currently finds 1,300 scientists sufficient for its crime-solving needs. The UK's largest private provider, LGC Forensics, employs 500 people. In 2008 alone, 1,667 students embarked on forensic science degree courses. In order to ensure there are enough jobs to go round, more than half of them will have to retrain as serial killers.
global_01_local_1_shard_00001926_processed.jsonl/51701
Aid in reverse: how poor countries develop rich countries New research shows that developing countries send trillions of dollars more to the west than the other way around. Why? New data on trade misinvoicing, same-invoice faking and tax havens shows the world’s givers are more like takers. A report on global money flows has found that trade misinvoicing and tax havens mean the world’s givers are more like takers. Photograph: C Villemain/AFP/Getty Images We have long been told a compelling story about the relationship between rich countries and poor countries. The story holds that the rich nations of the OECD give generously of their wealth to the poorer nations of the global south, to help them eradicate poverty and push them up the development ladder. Yes, during colonialism western powers may have enriched themselves by extracting resources and slave labour from their colonies – but that’s all in the past. These days, they give more than $125bn (£102bn) in aid each year – solid evidence of their benevolent goodwill. This story is so widely propagated by the aid industry and the governments of the rich world that we have come to take it for granted. But it may not be as simple as it appears. The US-based Global Financial Integrity (GFI) and the Centre for Applied Research at the Norwegian School of Economics recently published some fascinating data. They tallied up all of the financial resources that get transferred between rich countries and poor countries each year: not just aid, foreign investment and trade flows (as previous studies have done) but also non-financial transfers such as debt cancellation, unrequited transfers like workers’ remittances, and unrecorded capital flight (more of this later). As far as I am aware, it is the most comprehensive assessment of resource transfers ever undertaken. What they discovered is that the flow of money from rich countries to poor countries pales in comparison to the flow that runs in the other direction. In 2012, the last year of recorded data, developing countries received a total of $1.3tn, including all aid, investment, and income from abroad. But that same year some $3.3tn flowed out of them. In other words, developing countries sent $2tn more to the rest of the world than they received. If we look at all years since 1980, these net outflows add up to an eye-popping total of $16.3tn – that’s how much money has been drained out of the global south over the past few decades. To get a sense for the scale of this, $16.3tn is roughly the GDP of the United States What this means is that the usual development narrative has it backwards. Aid is effectively flowing in reverse. Rich countries aren’t developing poor countries; poor countries are developing rich ones. What do these large outflows consist of? Well, some of it is payments on debt. Developing countries have forked out over $4.2tn in interest payments alone since 1980 – a direct cash transfer to big banks in New York and London, on a scale that dwarfs the aid that they received during the same period. Another big contributor is the income that foreigners make on their investments in developing countries and then repatriate back home. Think of all the profits that BP extracts from Nigeria’s oil reserves, for example, or that Anglo-American pulls out of South Africa’s gold mines. But by far the biggest chunk of outflows has to do with unrecorded – and usually illicit – capital flight. GFI calculates that developing countries have lost a total of $13.4tn through unrecorded capital flight since 1980. Most of these unrecorded outflows take place through the international trade system. Basically, corporations – foreign and domestic alike – report false prices on their trade invoices in order to spirit money out of developing countries directly into tax havens and secrecy jurisdictions, a practice known as “trade misinvoicing”. Usually the goal is to evade taxes, but sometimes this practice is used to launder money or circumvent capital controls. In 2012, developing countries lost $700bn through trade misinvoicing, which outstripped aid receipts that year by a factor of five. Multinational companies also steal money from developing countries through “same-invoice faking”, shifting profits illegally between their own subsidiaries by mutually faking trade invoice prices on both sides. For example, a subsidiary in Nigeria might dodge local taxes by shifting money to a related subsidiary in the British Virgin Islands, where the tax rate is effectively zero and where stolen funds can’t be traced. GFI doesn’t include same-invoice faking in its headline figures because it is very difficult to detect, but they estimate that it amounts to another $700bn per year. And these figures only cover theft through trade in goods. If we add theft through trade in services to the mix, it brings total net resource outflows to about $3tn per year. That’s 24 times more than the aid budget. In other words, for every $1 of aid that developing countries receive, they lose $24 in net outflows. These outflows strip developing countries of an important source of revenue and finance for development. The GFI report finds that increasingly large net outflows have caused economic growth rates in developing countries to decline, and are directly responsible for falling living standards. Who is to blame for this disaster? Since illegal capital flight is such a big chunk of the problem, that’s a good place to start. Companies that lie on their trade invoices are clearly at fault; but why is it so easy for them to get away with it? In the past, customs officials could hold up transactions that looked dodgy, making it nearly impossible for anyone to cheat. But the World Trade Organisation claimed that this made trade inefficient, and since 1994 customs officials have been required to accept invoiced prices at face value except in very suspicious circumstances, making it difficult for them to seize illicit outflows. Protest about tax havens in London in 2016, organised by charities Oxfam, ActionAid and Christian Aid. Protest about tax havens in London in 2016, organised by charities Oxfam, ActionAid and Christian Aid. Photograph: Carl Court/Getty Images Still, illegal capital flight wouldn’t be possible without the tax havens. And when it comes to tax havens, the culprits are not hard to identify: there are more than 60 in the world, and the vast majority of them are controlled by a handful of western countries. There are European tax havens such as Luxembourg and Belgium, and US tax havens like Delaware and Manhattan. But by far the biggest network of tax havens is centered around the City of London, which controls secrecy jurisdictions throughout the British Crown Dependencies and Overseas Territories. In other words, some of the very countries that so love to tout their foreign aid contributions are the ones enabling mass theft from developing countries. The aid narrative begins to seem a bit naïve when we take these reverse flows into account. It becomes clear that aid does little but mask the maldistribution of resources around the world. It makes the takers seem like givers, granting them a kind of moral high ground while preventing those of us who care about global poverty from understanding how the system really works. Poor countries don’t need charity. They need justice. And justice is not difficult to deliver. We could write off the excess debts of poor countries, freeing them up to spend their money on development instead of interest payments on old loans; we could close down the secrecy jurisdictions, and slap penalties on bankers and accountants who facilitate illicit outflows; and we could impose a global minimum tax on corporate income to eliminate the incentive for corporations to secretly shift their money around the world. We know how to fix the problem. But doing so would run up against the interests of powerful banks and corporations that extract significant material benefit from the existing system. The question is, do we have the courage?
global_01_local_1_shard_00001926_processed.jsonl/51705
Chore Girl Apron Add to Cart Make this speedy little gem with quiter style rotary cutting. The instructions have assembly line steps, so you'll be done in a jiffy. Sized to fit all, with plenty of wrap around room on the sides.
global_01_local_1_shard_00001926_processed.jsonl/51719
Request A Quote Form - Gruenberg Continuous Process Curing Oven * Company * First Name * Last Name Your Title * Email * Address * City (U.S., Canada, Mexico Only) * Postal Code * Country * Phone Cell Phone Fax Choose a category: New Equipment Parts & Service Refurbished Equipment Choose a Different Category * Type of Business * How did You Hear about TPS? Equipment Priority New Process Equipment Expansion/Replacement * Type of Process * Model of Interest * Application Description Are you currently working with a manufacturer's rep Yes No Rep Name Choose a Different Category Model Number Serial Number Parts/Service Description
global_01_local_1_shard_00001926_processed.jsonl/51721
SOC120-A PhD’s Guide To Conferences Conferences… A little awkward, pretty informative, and occasionally monotonous. They’re a fact of life for those of us in academia! This week we delve into what conferences are, why you should attend, some of the main sociology conferences, and most importantly some DOs and DON’Ts of going to conferences. Listen to our suggestions, and then let us know if we missed anything by Tweeting or Facebooking us @socbreakdown! sociology, conferences, phd guide Upcoming Conferences 1. American Sociological Association, Aug 11-14 2. Society for the Study of Social Problems, Aug 10-12 3. Pacific Sociological Association, March 28-31 4. Hawaii Sociological Association, Feb 24-25 5. International Sociological Association’s “World Congress of Sociology”, July 15-21. Why attend conferences? 1. Schmoozing/Networking 2. To learn new things! 3. Meet your academic superstars 4. To add to your CV/resume 5. To get feedback from colleagues Conference DOs 1. Show up early and don’t make a ruckus! 2. Practice your presentation at least 3 times! 3. Sit in the front and ask questions! 4. Make sure you have all your tech stuff set up if you’re doing a PPT! Have it on a thumbdrive, in your email, and on your computer. 5. Breathe quietly plz. Thank you. 6. Enjoy yourself! Explore the city/area where the conference is held, eat all the good food, and get drinks with fellow scholars! Balance work and play. Conference DON’Ts 1. Ask self-centered “questions”, where you’re really just bragging and not asking a question! 2. Go over time! Respect your fellow panel members and your audience. 3. Be shy or intimidated by other people, or the schools they come from! You are fabulous, worthy, and have something to contribute. 4. Be a creep. Read the social cues! Leave a Reply
global_01_local_1_shard_00001926_processed.jsonl/51723
3D Printed Gun Gets Through Israeli Parliament’s Security Screen Shot 2013-05-14 at 10.29.37 AM Most existing security measures for weapons detection rely on one basic assumption: the weapon is made of metal. When that assumption isn’t met, everything tends to break down. Which explains why a 3D printed gun, made of plastic, sailed through the security checkpoint at Israel’s parliament and has caused the politicians there to collectively lose their mind . . . From Haaretz: Knesset officer, Brigadier General Yossi Griff, News-10 responded “that” this is a new phenomenon that puts all the security systems in the country and the world a whole new challenge. Knesset as all government offices and public institutions, are now looking into the matter in order to give it a professional as soon as possible. “It was reported that” the Knesset officer is in constant contact with other security agencies in the country to reach a quick solution and the optimal new threat created. Having never gone to Hebrew school, I couldn’t read the article in its original language. But the Google translated version paints a picture of a legislature concerned that an assassin will slip through their security system to take one of them out. This in a country where the government is already “cracking down” on gun ownership among civilians. It looks to me like things are about to get a whole lot worse at security checkpoints. If I were a savvy investor, I’d be dropping some coin into the stocks of companies that make those 3D imaging machines that have people so up in arms at US airports. 1. avatar My Older Brother Chet says: the cartridges that plastic guns fire are still made of brass, copper, lead and various other metals. unclench it will be o.k. 1. avatar FirstShirt says: All things change, given time. . . 2. avatar CA.Ben says: I’m sure that you can print an oversized casing and a chamber to fit it. And a metal detector is not going to detect a hollowpoint 9mm, or the small amount of metal in the primer. Furthermore, it is easy enough to disguise ammo. Make it look like those faux cartridge earbuds. Or hide a pair of rounds in your car key fob. You could probably hide some in the folds of your wallet; they never search your wallet. Anything that is handed around the metal detector is fair game to hide a round or two in. Bottom line: security screening can’t stop this, not unless they strip search EVERYONE. And that fact is causing lots of people to lose their shit, because they can’t/don’t know how to deal with an armed populace. 1. avatar 16V says: Put everyone on the plane buck nekkid. I’ll bet my life and yours (not to mention all on board) that anyone with an IQ north of 140 can get a gun on a plane, if they want. 3. avatar L says: There are a couple of companies making ammo in polymer casings already, very little metal on those bullets. PCP Ammunition and Polycase Ammunition come to mind. 4. avatar Arc says: bullets can be hidden in false watches, belt buckles, anything that is metal and not out of place. Even your cellphone could be disassembled to hide one, etc. However, hollow spy gadgets have a different transparency image and it all still shows up on X-ray but the operator needs to be paying greater attention. Even then the machine quality, modernness and calibration need to be taken into account. People can get anything anywhere. Risks, time, costs, odds, all increase with security but tight security can never prevent something from slipping through, its just the nature of the game. Maybe Parliament should arm themselves, then they would have a readily available means of protection rather than depending on security that doesn’t get paid enough to pay attention. 2. avatar ST says: Please.If someone wants to get past a security checkpoint, they will.All it takes is motivation and advance info on the security agency’s policies.Push comes to shove,an assassin will join the security agency themselves if need be. 1. Just ask Anwar El Sadat how well that plan works. It’s not the tool but the inclination of the user of said tool that determines the outcome. 1. avatar Ben Eli says: That is a great line. No kidding. 3. avatar Ropingdown says: It is difficult for me to share their apprehension. A slow bullet at close range or a fast bullet at long range seem equivalent risks. After Yitzhak Rabin was assassinated I didn’t see the Knesset move to close the right-wing talmudic academies. 4. avatar Pascal says: Funny how a concern of safety is for themselves but not citizens. 1. avatar Jeff says: Citizens are replaceable, but they’re not – at least not in their minds. 1. avatar William Burke says: You said it. If it got through there, we’re left to try and imagine what it WOULDN’T have gotten through. “Security” is a trick played by governments to rob their subjects of resolve to taken them down. The Patriot Act and a long train of repressive measures that followed it are about OPPRESSION, not security. Was that a bag I just saw, with a cat streaking out of it? 5. avatar Aharon says: It’s is probably only a matter of time before new scanners are given to security forces that can outline non-metal objects. That won’t of course solve the challenge as gun shapes can be modified. Then there are the new brain scanners that can tell when someone is lying by tapping into their brain’s activity. Imagine requiring every building visitor to don a brain scan cap and say yes or no if their intent is to harm someone in the building. Time to go write the next great science fiction novel. 1. avatar PavePusher says: Been done. “Minority Report”….. 1. avatar Aharon says: Wasn’t MR about engineered humans predicting future murders? I think the plot was great yet recall that film having the most excessive of use of any film bringing in advertising for real world corporations. 1. avatar defensor fortisimo says: Maybe the original total recall where they had that complete x ray machine 2. avatar 16V says: Uhh yeah. Current state-of-the-shelf. 3+ years ago. 6. A one shot assasin carrying a clunky gun with no sights. After he shoots he has a 10 second reload? I’m thinking people just need to up their situational awareness and carry a pistol. 7. avatar Billy Wardlaw says: two things.. 1) did any bullets make it through security with it? 2) just pointing out that one of the best and most ubiquitous printing technologies available, is made by and Israeli company , Objet, which is now part of Stratasys (after the merger) 8. avatar 16V says: Welcome to the reactionary reality that the little punk-eff-sht-trash-Cody-whatever his self-aggrandizing-with-nothing-to back-it has brought all of us. There’s me and maybe 3 others on this board who actually do have a 3D printer, and we all know what this little dolt preaches is BS that only serves himself. Seriously, who really is so effen stupid and ignorant as to think he is trying to help anyone but himself? Real gun folks have been making real functional guns since long before this born-by-the-drippings-of-forced-sodomy-on-an- r-tard opportunist showed up on this planet. 1. avatar ZM 1306 says: Dude you have problems. What Cody has done is nothing, nothing that would have caused problems if we were still a free America. Gatling did more when he put together his crank gun. Then even more when he replaced the crank with a motor. I don’t like plastic guns like glocks either and this is an extreme plastic gun. However, it does not make it a fake non-functional gun. It is a firearm that fires a projectile, it is a “real functional guns”. I would like to know how you are “so effen stupid and ignorant as to think he is trying” to help him self. I do not know how a person benefits from getting a government that is a superpower of the world pissed at him. As far as I see it he is trying to restore America as she should be. 1. avatar neiowa says: dude? Are you 12? 2. avatar Arc says: I had a used 3D printer for a few hours before not wanting it cluttering the place up anymore. If you are going to print worthwhile gun parts, its going to cost a pretty penny to get more than a cheap, non-functional conversation piece. Might as well build a machine shop! 9. avatar Cliff says: The point seems obvious to me. 1. Yes, people with adequate skill and tools have been able in the past and will continue to make weapons, including pistols. Good for you. Will you make one for me? I thought not. 2. With this software and a 3D printer ANYONE can make a pistol or two or more and with little ingenuity add a metal barrel in a larger caliber. Sure it’s a one-shot wonder, but anyone can do it without even a high school metal shop education. 3. Maybe he is (also) trying to make money on this project, although how, since the program is a free download, I don’t know. Since when is turning a profit from personal effort and industry a problem. Isn’t that the point of everyone who manufactures firearms? This is a test model. It will evolve and it will get better. The point is to prove that the government CANNOT control our right to bear arms and this technology has forever shown that we can and will be armed with or without their “permission”. 10. avatar Ardent says: I have occasion to pass through the metal detectors of a local courthouse time to time. I prefer to go in the mornings and usually have a 20oz Styrofoam cup of coffee with me. That cup, my rather ridiculously large wallet and a whole stack of things from a cigarette back to a Zippo lighter go around the metal detector while I go through it. It’s always seemed to me that a couple of NAA mini revolvers would fit in that wallet, and that the cup could easily sport many sub compact autos or even perhaps a 5 shot snubby revolver. For that matter I doubt a 72 oz big gulp cup would garner any more attention than my large coffee. Even on person and through the detector I receive only a cursory wanding and a nod of approval as my steel collar stays, belt buckle and various components of my shoes set off both the detector and the wand. I virtually always have indicators in three places, chest waist and ankles. . . precisely where one would typically conceal a weapon. While on the topic, I’ve often thought that a plastic or ceramic knife would make it in, and that by lingering in the men’s room long enough one could execute an undetected surprise attack on a security officer and come away with his weapon and ammo. The of course there is the begged question; what if one comes in the front door with a rifle and battle rattle and immediately shoots the 1-2 officers manning the security check point? If one has come to commit murder in a public place, do a couple of extra bodies make a difference? These checkpoints are security theater and nothing more. They are useful at creating an illusion, and conditioning people to the idea that they aren’t really secure in their persons and effects even as they enter public buildings for such purposes as paying taxes or registering to vote. As far as providing actual security. . . well let’s just say that while I’m not a nefarious actor, the above are only the more obvious means of defeating such ‘security’, and that just from sheer boredom I’ve conceived of many, many more. This is with absolutely zero motivation or intent to carry them out. I wonder how many ways around such security a determined bad actor could come up with. Perhaps the question is irrelevant, since such a person would only need one. 11. avatar Chris says: It isn’t about metal detectors. It is about illuminating the anti gun people as flat earthers who live in the past. My brother in law has an auto parts business. He says this is a total game changer. It will start as a benefit to retail outlets which will not need to stock as much nor deal with ordering, inventory costs and shipping. That is just for the short time that 3d printers are not in hosueholds. When 3d printers move into households, which will occur in a decade to a decade and ahalf, it will be a massive disruptive force on retail. It will also be total disruptive force against gun control. Mag limits wil be utterly moot. There will be plans on how to convert capabilities of most semi auto weapons. The current descriptive “one” or “two” capabilities out of ten of “assault rifles” will be utterly moot since they can be added (eg folding stock, bay mount,), suppressors etc. The lower can be made 100% out of 3d polymer. are they going to forbid generic steel or alloy barrels?. Write a Comment button to share on facebook button to tweet button to share via email
global_01_local_1_shard_00001926_processed.jsonl/51781
Unto me every knee shall bow, every tongue shall swear.—Isaiah 45.23. Johannes VanderKemp Minister of the Gospel in Dirksland, The Netherlands.  from his Sermons on the Heidelberg Catechism Rom. 3.27,28. Where is boasting then? it is excluded. By what law? of works? nay: but by the law of faith. Therefore we conclude, that a man is justified by faith without the deeds of the law. Q. 62. But why cannot our good works be the whole, or part of our righteousness before God? A. Because, that the righteousness, which can be approved of before the tribunal of God, must be absolutely perfect, and in all respects conformable to the divine law: and also, that our best works in this life, are all imperfect, and defiled with sin. Q. 63. What! do not our works merit, which yet God will reward in this and in a future life? A. This reward is not of merit, but of grace. Q. 64. But doth not this doctrine make men careless and profane? A. By no means: for it is impossible that those who are implanted into Chris; by a true faith, should not bring forth fruits of thankfulness. WHEN "Sarah saw the son of Hagar the Egyptian, which she had born unto Abraham, mocking, she said unto Abraham, Cast out this bond-woman and her son; for the son of this bond-woman shall not be heir with my son, even with Isaac." This Moses relates to us, Gen. 21.9,10. Paul having respect to this, saith Gal 4.22,23. "It is written that Abraham had two sons; the one by a bondmaid, and the other by a free woman. But he who was of the bondwoman was born of the flesh; but he of the free woman was by promise." When the bondwoman would have that her son should inherit, and the lad mocked, Sarah said, "Cast out this bondwoman and her son: for the son of this bondwoman shall not be heir with my son, even with Isaac. These things are an allegory, for these are the covenants," &c. saith the apostle, Gal 4.24-31. It appears very plainly, that by these two covenants he understands, (a) the covenant of works, the sum of which, together with the covenant of grace, which was administered in a legal manner under the Old Testament, was proposed at mount Sinai, and often exhibited for the condemnation of sinners, and in order to urge them to the Messiah, who was to come; and therefore the Jews, the Jerusalem of Paul's time, seeking their righteousness and the inheritance by this covenant, showed that they, being born after the flesh, of the servile covenant of works, were also servile with their children, since they, like Ishmael, mocked and persecuted them who were born after the Spirit. (b) The second covenant which Paul mentioneth is the covenant of grace, which is established only in promises; and therefore all who believe, the Jerusalem that is above, the true church, being born like Isaac, after the Spirit, of this covenant, are free, and obtain the inheritance by promise. When now the carnal Jews sought a right to the inheritance by the servile covenant of works, through their own doings, yea, when they mocked the free children, who sought their inheritance by the promises, "saying blasphemously that they said, Let us do evil, that good may come," Rom. 3.18. We say, when they did this, the true Sarah, the believing church, after she was become fruitful, according to Isaiah 54.1, compared with Gal. 4.17, cried to her Abraham, her Maker, the Lord of hosts, who is her husband, "Cast out this bondwoman and her son; for the son of this bondwoman shall not be heir with my son:" and so his Hagar was called by the Lord, "Loruhama, not having obtained mercy, and Lo-ammi, not my people." See Hosea 1.6,9. And the Lord hath ordered that it should be said to her, "Thou art not my wife, and I am not thy husband," Hosea 2.1. And thus "Israel, which followed after the law of righteousness, hath not attained to the law of righteousness. Wherefore? because they sought it not by faith, but as it were by the works of the law; for they stumbled at that stumblingstone." Thus Paul speaks, Rom. 9.31,32. How long was the free Sarah, the true church with her children of promise, obliged to sigh, on account of grievous mockings and persecutions among the Popish Hagarenes, who sought the inheritance by the law! but when the church cried, Cast out the bondwoman with her son, the Lord drove these Hagarenes out of the house of Abraham, his church, in the time of the reformation: by which means the doctrine of justification by the promise through faith without works, having been brought to us, hath continued with us until now, and is defended, when we are taught that the righteousness of Christ, and no other, is our righteousness before God, in the foregoing Lord's day; and that our works cannot be our righteousness before God, nor a part of it, as we are now taught in this Lord's day, in the sixty-second question. These Hagarenes set themselves against this doctrine, and insist on a reward according to the merit of their works; but being opposed in the sixty-third question, they show the temper of Ishmael, by mocking us, when they blasphemously say in the sixty-fourth question, that our free doctrine makes men careless and profane. In order that we may silence them, we will, agreeably to this clue, illustrate somewhat more particularly these three general heads: 1. That our works cannot be our righteousness before God, nor a part of it, Question 62. 2. That though God rewards the works of his children, they nevertheless do not merit, Question 63. 3. That our doctrine cannot with any propriety be reproached, as making men careless and profane, Question 64. I. In order to render it evident that our works are not our righteousness before God, nor a part of it, we must first exhibit the state of the controversy, and then produce our arguments against the erroneous opinion. In order to represent the state of the controversy, we must show that not only the Papists, but also many others, both now and of old have erred in this matter. All men, being children of the broken covenant of works, are by nature infected with this evil, that they imagine that their own works are their righteousness before God, either in whole, or in part. We see this in the heathens; those at least among them, who were in any measure solicitous to enjoy the favour of the gods, sought the atonement of their sins in their sorrow for their sins, in their prayers, their washing's and sacrifices, either of beasts or men: also in afflicting their bodies, yea, they sometimes bereaved themselves of their lives; they thought they should obtain a right to life by their good and virtuous actions. The carnal Jews, though they had been taught better from the word of God, would nevertheless seek their righteousness even of old, in their repentance, sacrifices and virtues; "they exacted all their labors," Isaiah 58.3. See what the apostle saith of them, Rom. 9.31,32. & 10.2,3. The Jews had declined to this errour especially in the time when Jesus came in the flesh, as appears sufficiently in the writings of the New Testament. The Jews of later times, abandoned to hardness of heart, have smugged up this unsuitable notion exceedingly. And indeed thus, seeing that they all without exception, though ever so virtuous, needed forgiveness, they have placed a right to forgiveness of sins in repentance, almsgivings, prayers, a changing of their name, (whereby, as they imagine, a Jew becomes another person, and is thus reckoned free from his former guilt,) a change of work, patience under sufferings observing the ecclesiastical law of Moses, as circumcision, washings, and sacrifices, and especially on the great day of atonement. Is there aught else wanting, they think that they shall atone for that by their death, or by suffering the pains of hell during one year. They seek a right to eternal life in their good works; they speak indeed of faith, but they mean by it a fulfilling of the whole law. If they mention aught of the mercy of God, it is without respect to the righteousness of the Messiah, and it only effects that God accepts of the penitent, who satisfy for their sins. Doth any one desire a fuller account of these things, let him read H. Witsius's discourse on justification, prefixed to the apostolical antiquities of William Cave. Is it matter of wonder, that the Jews, the proper people of God, are so silly, it is matter of still greater wonder, that the majority of Christians, who have a clearer discovery of the righteousness of faith in the writings of the apostles, do, like those who are blind, grope here in the dark: this appears in all those, who are not of our communion, or of the Lutheran. The Socinians, who deny the righteousness of works according to the law of Moses, and say that Christ is a new Law giver, who hath enlarged and improved the law of Moses, assert indeed, that we are justified by faith; but they imagine that faith consists in keeping the commandments of Christ, and in confiding that our sins are forgiven, and that we will obtain eternal life, not through the satisfaction of Christ, for they do not believe in that, but through a common goodness of God, who promiseth that he who doth good, shall receive a good reward. The Remonstrants pretend that Christ hath merited a general covenant of grace for all men, the condition whereof is faith, perfected by the power of freewill; which is indeed an ignoble act, but is nevertheless considered and accepted of God by a gracious estimation, as a perfect fulfillment of the whole law. The Mennonites unite either with the Socinians or Remonstrants. But as the instructor opposes more particularly the Papists, we must declare their opinion also. Justification consists, according to them, not in the forgiveness of sins, and in granting a right to life, but in an infusion of holiness, by which they obtain the forgiveness of sins, and a right to life through the merit of works. They say, this justification is either of the ungodly, by which an ungodly person becomes holy; or of the godly, by which a godly person becomes more holy. Works are either before regeneration, and proceed from the power of freewill, which merit the justification of the ungodly ex congruo, from a certain fitness and suitableness, that God should further in some measure the conversion, that is, the justification of the ungodly: or works are such as are done after regeneration by faith and grace, which assist freewill, and merit the justification of the godly, ex condigno, from an equal value of the work with the reward. If they have need of any works in consequence of their coming short in some measure, and have thus only a part of their righteousness, they will then betake themselves to the supererogatory works of other saints, who were more than perfect, or they will supply the defect, either in this life by penance, or after this life in purgatory. They speak also of the merits of Christ, but these do no more than obtain that their works merit. They allow that they are justified also by faith, but not otherwise than that faith is the root of other virtues, which producing others, and therefore being accompanied with others, justifieth on account of its superior excellency above other virtues, and merits justification. In opposition to this, we teach that the satisfaction, righteousness and holiness of Christ, received by faith, is the righteousness of man before God, as we have declared and proved on the foregoing Lord's day. We do not deny that good works are highly necessary to salvation, but we assert that they cannot be our righteousness before God, nor a part of it. And therefore the controversy is, whether our good works can be our righteousness before God, or a part of it; which our adversaries affirm, but we deny. That our good works cannot be our righteousness before God, appears. 1. Because the holiest persons, and those who had done the most good works, have with humility acknowledged that they had no righteousness at all, but sought their salvation only in the mercy of God, and in the righteousness of his Son. Job, who had the testimony of God that there was none like him in the earth for integrity, uprightness, fearing God and eschewing evil, said, chapt. 9.2,3, "how should man be just with God? If he will contend with him, he cannot answer him one of a thousand." David, the man after God's own heart, said, Psalm 130.3,4, "if thou, Lord, shouldest mark iniquity, O Lord, who shall stand? But there is forgiveness with thee, that thou mayest be feared." He prayed, Psalm 143.2, "Enter not into judgment with thy servant; for in thy sight shall no man living be justified." Daniel, the man greatly beloved, spoke also in the same manner, chapt. 9.18. "We do not present our supplications before thee for our righteousnesses, but for thy great mercies." If there ever was a man that excelled in holiness, it was Paul; but even he also "sought not his own righteousness, which was of the law, but only the righteousness of Christ, which is by faith," Gal. 2.16. Phil. 3.8,9. Surely if the good works of these saints could have been their righteousness before God, or apart of it, they would not have spoken thus. 2. The word of God teacheth us that there is no righteousness at all in good works for justification, since works are in every respect opposed to justification, as inconsistent with it. For (a) The judge doth not "set" works, but "his Son forth to be a propitiation through faith in his blood, to declare his righteousness for the remission of sins," Rom. 3.25,26. (b) The person cited is one who is "ungodly, who worketh not," Rom. 4.5. (c) The Advocate doth not plead the righteousness of the sinner, which is of works, but the ransom, which he himself hath found. Job. 33.24. Isaiah 53.12. 1 John 3.1,2. (d) The sentence is pronounced "freely, by the grace of God, through the redemption which is in Christ Jesus," Rom. 3.24. (e) Works are not imputed to the sinner, but only the righteousness of Christ without works, as Paul speaks from the opinion of David, Rom. 4. 6-8. (f) Faith which receives the sentence of grace, is also set in opposition to works. See this in the text. 3. Our righteousness, which is of works, cannot endure the judgment of God. In order to show this, we must prove, (a) That the righteousness, which shall endure the judgment of Gods must be perfect, and in every respect commensurate with the law of God. This is evident, because "Moses, describing the righteousness of the law, saith, The man which doth those things shall live by them," Rom. 10.5. And what are those things? the perfect love of God, and of our neighbour, as the Saviour explains the demand of the law, Matt. 22.37-39. We must keep the law perfectly, if we shall have the righteousness which God approves, or we are cursed, as Paul saith, Gal. 3.10 Deut. 27.6. This is still more evident, if we consider that God, who will judge men according to their works, must judge them according to the law: "The judgment of God is according to truth," as Paul speaks, Rom 2.2. Now he cannot justify man, unless he have a perfect righteousness, according to the law; for if a man incur guilt in any respect by his misconduct, "God will not hold him guiltless," as he saith himself, Exod. 34.7. Did not the Lord himself show that he would not approve of any righteousness in his judgment, but that which was perfectly conformable to his law, when he appointed his Son to satisfy his justice according to the complete demand of the law, "that the righteousness of the law might be fulfilled in us," as Paul saith, Rom. 8.3,4. The matter of the greatest importance here, is, whether our works are so perfect: but we will also prove (b) That our works are not so perfect, but that "even our best works in this life are all imperfect, and defiled with sin," as the catechism speaks. Is not this true? surely it is; for there is "not one man who sinneth not," as the word of God repeatedly testifieth. See 1 Kings 8.46. Prov. 20.9. Eccl. 7.20. Matt. 6.12. James 3.2. 1 John 1.8, and the good, yea, even the best works of men are defiled with sin, and imperfect. The prophet confesseth this of the church, of which he was a member, and therefore also of himself, when he saith, Isaiah 64.6, "We are all as an unclean thing, and all our righteousnesses are as filthy rags." This doth not denote that they were sins for then they would not be good works, or righteousnesses, but it denotes that they were imperfect, and proceeded from a heart that was not perfectly purified: the old man and the flesh hinders and withstands the new man and the spirit, "so that he doth not do what he would." Thus speaks Paul concerning believers and himself, Gal. 5.17. Rom. 7.14,26. The saints "did not indeed defile their garments," according to Rev. 3.14, but this doth not denote that their works were altogether pure and free from filth; for they would not then have had need "to wash them, and make them white in the blood of the Lamb," Rev 7.14, but it only means, that they did not pollute themselves with the abominable conduct, and the false doctrines of the pretended Christians of Sardis. If we will now deduce a conclusion from these premises, we will discover that our works cannot be our righteousness before God; for if our righteousness must be perfect, and if our best works be imperfect, it is evident that our works cannot be our righteousness before God, but deserve that we should be banished from his presence, and that he should cast them, as the filth of our holy things, in our faces. Say not, the good that is in our good works may be a part of our righteousness, and God may graciously reckon it as perfect; for imperfect works do not lessen our guilt, but increase it. He who keeps the law in part, by imperfect good works, sins also in part, yea, renders himself altogether guilty: "For whosoever shall keep the whole law, and yet offend in one point, is guilty of all," as we are taught, James 2.10. Yea, if our good works were a part of our righteousness before God, and the righteousness of Christ, or the gracious estimation of God supplied their deficiency, then would our works form an unsuitable connexion with the righteousness of Christ and the grace of God, and we should be justified partly by works and partly by grace, which is contrary to the doctrine of Paul, Rom. 11.6, "If it be by grace, then is it no more of works; otherwise grace is no more grace. But if it be of works, then is it no more grace; otherwise work is no more work." Further, our adversaries cannot say with any reasonableness that our good works are a part of our righteousness and not the whole of our righteousness: for they who oppose us say that a man can keep the law of God perfectly; yea, the Papists will have that a man may be more than perfect by works of supererogation, and so afford a portion of his righteousness to another. The Socinian thinks that he doth more by his obedience to the improved law of Christ, than God demanded in the law which he gave by Moses. What remains then for the righteousness of Christ to do? nothing but to effect, as the slave of man, that his works should merit, and that he should do more works than Moses required, and that Christ should merit a general grace, by which man should be enabled to will, not be rendered actually willing to keep the law of God perfectly, and that God should esteem the faith of man, a perfect observation of the law. And thus they place their righteousness altogether in works, and all that is divine must subserve this purpose, that the sinner may find a righteousness in his works. Abominable! 4. Add to this, that the works of the sinner cannot be his righteousness, because he must have a righteousness, and be justified by it, before he can either have, or do works that are acceptable to God. For "the ungodly who worketh not is justified," according to the language of Paul, Rom. 4.5. All his works, as long as his person is not justified, reconciled to God, and thus acceptable to him, are disagreeable to God: "The Lord had respect to Abel and to his offering: but when he had not respect to Cain, he had not respect to his offering neither," Gen. 4.4,5. With this agrees wise Solomon, when he saith, "The sacrifice of the wicked is an abomination to the Lord; but the prayer of the upright is his delight," Prov. 15.8. All the good works of men are wrought in them by the Lord through his Spirit, as we have shown from Philip 2.13. Eph. 2.8. Now God doth not bestow his Spirit for sanctification, except on account of the righteousness of Christ: he is first made righteousness to the sinner, and then sanctification. See 1 Cor 1.30. For by the imputation of the righteousness of Christ he obtains a right to life, and thus also to all the benefits, and the sanctification of the covenant of grace. If the sinner must now be justified before he can either have, or do good works, he cannot then obtain righteousness by his works; for he hath it before his works, and his works are the fruits of it. 5. The doctrine, that our works are our righteousness before God, is replete with absurdities. For (a) "If righteousness come by the law, then Christ died in vain," Gal. 2.21. (b) Grace, which alone the Spirit of God commends here, hath then no place, according to Rom. 11.6. (c) We have then no need of forgiveness of sins, contrary to Psalm 30.4. (d) "If they who are of the law be heirs, faith is made void, and the promise made of none effect," Rom. 4.14. (e) Humility, the greatest virtue of Christianity, is then banished out of the church, and pride and boasting of our works obtain the chief place in it, contrary to Rom. 3.27,28. & 4.2. Eph. 2.8,9. We see Luke 18.11,12,14, how ill the Pharisee fares by boasting of his works. (f) If the sinner can merit so much by works, he needs not then beg at the throne of grace for his daily bread. (g) No sinner, who hath a sense of his sins, and sees that his works are like filthy rags, can then have any hope of grace, but he must abandon himself to despair, must hide himself with Adam, run from God with Cain, and flee to the halter with Judas. Many of the Papists, seeing this absurdity, have borne witness to the truth, especially at their death. The time would fail me if I should speak of the cardinals Contarene, Bellarmine, Pope Adrian the sixth, the emperour Charles the fifth, and George, duke of Savoy. (h) Suffer me to add this also, if righteousness come by works, then the righteousness of the gospel is wholly made void, the covenant of works is established, the covenant of grace denied, and the doctrine of Paul, in his epistles to the Romans and Galatians, in which he excludes all works, is enervated, and rendered absurd. Our adversaries, in order to disentangle themselves out of these snares, which they lay for themselves, seek various evasions, and say, 1. That the apostle excludes works done only by the power of freewill, without the assistance of grace, but not those that are done by the assistance of grace. But thus our adversaries condemn themselves, because they assert a justification of the ungodly by the merits of their works, which are performed before regeneration by freewill, as we have shown before: Paul needed not to exclude works, which are done without grace, because they are only shining sins, and therefore evil works, which, as all know, deserve death. He excludes all works without any exception; we may not then make him speak of an exception, where he himself is silent. Yea, he excludes the works of godly Abraham and David, Rom. 4.1-8. 2. They say further that he excludes only the works of the ceremonial, or ecclesiastical law: but this also is an invention, which is beside Paul; for he speaks of the law that was innate to the Gentiles, Rom. 2.14,15, which forbids stealing and adultery, Rom. 2.21,22, which is opposed to circumcision, Rom. 2.25-27, which opposeth and condemneth Jews and Gentiles, and discovers their sins to them, Rom. 3.9-20. Yea, he speaks of the law which Abraham had, and which he observed, before the ceremonial or ecclesiastical lay was imposed on him by circumcision; and nevertheless his works according to the moral law are also excluded. See Rom. 4.1-3,9-12. It is true, the apostle hath respect in his epistle to the Galatians chiefly to the law of the fleshly commandment, since he therein manfully opposes the false apostles, who taught justification by works according to that law; but he doth this, because those false apostles looked upon those ceremonies, as the demand of the covenant of works, and as the proper performances to obtain life; for he alleges, in order to silence them, the promise and the threatening of the covenant of works. See Gal. 3.10,12. And he doth this, in order to show that we cannot be justified by our own performances, either according to the moral, or the ceremonial law. Therefore when he excludes the ceremonies according to the law of commandments contained in ordinances, he then also excludes all kinds of works. 3. In this manner do the Papists endeavour to disentangle themselves, but the Socinians pursue another method. Christ, according to them, preached a different doctrine and law from that of Moses. Paul, as they say, excludes from justification works done according to the law of Moses, but not works done according to the law of Christ, which they call the gospel. The Remonstrants differ not much from this, when they say that we are now justified by the faith of the gospel; for they consider faith as a work done according to the law of Christ, containing every virtue according to the commands of the gospel. But faith is a virtue by itself, distinct from other virtues, and may not be considered in justification as a work, but as an instrument and hand, by which we receive Christ, and Paul excludes all our own works, and besides this, we say, it is not true that Christ preached another, and a new law, as we will show in the proper place. God the Lord would then have abrogated the law of Moses; but how was this possible, when it expressed the image of God, and his demand against the sinner? he would then have dispensed with his right, which was impossible, as we have proved on the fifth Lord's day. If Christ had preached a new law, with a design, that men should be justified by works according to that law, then would that law have been "able to give life, contrary to the promise," and so "righteousness would come by the law," contrary to the doctrine of Paul, Gal. 3.21. II. The adversaries of the light, not willing to be convinced of their erroneous opinions think that they will strengthen themselves by the word of God, which promiseth a reward to works. We cannot gainsay this, verily "in keeping God's commandments there is a great reward," according to the language of David, Psalm 19.11. God will reward good works, not only in this life, but also in that which is to come, Heb. 6.10. Matt. 6.4,6,18. Yea, the people of God encourage themselves by the consideration of the reward to greater diligence in doing good works. Moses "had respect to the recompense of the reward," Heb. 11.26, but good works do not therefore merit; for (a) We owe good works, and we are naturally bound to keep the law of God perfectly. How can we merit by doing our duty? Hear what the Saviour saith, Luke 17.10. "When ye shall have done all these things, which are commanded you, say, We are unprofitable servants; we have done that which was our duty to do." (b) If good works did merit that great reward, then we ought to do them of and by ourselves; for we cannot merit by the work and assistance of another; but good works are not of man himself, but of God: "Faith is not of yourselves; it is the gift of God," saith the apostle, Eph. 2.8. "It is God, which worketh in you both to will and to do," so the same man speaks, Philip. 2.13. (c) Works ought to be equal in value with the reward, if they shall merit the reward; but "the sufferings of this present time are not worthy to be compared with the glory which shall be revealed in us," Rom. 8.18. 2 Cor. 4.17. (d) Can good works profit God, for this is required in order that they may merit? no! "Can a man be profitable to God, as he that is wise may be profitable to himself? Is it any pleasure to the Almighty, that thou art righteous? or is it gain to him, that thou makest thy ways perfect?" These questions are rightly asked, in order to deny the assertions, Job 22.2,3 Do evil works merit perdition, because they are perfectly evil, good works do not therefore merit salvation, for they are not perfectly good. And if they were perfect, as they might have been before the fall, they would not however merit by their worthiness, but only by the promises of God in the covenant of works. How doth God then reward works, if they do not merit the reward? Paul will declare, when he teacheth that there is not only "a reward of debt," but also "of grace," Rom. 4.4. The reward of debt is bestowed on account of the perfection of the work, which obligeth the Lord to bestow on his servant the promised recompense: the reward of grace is bestowed in consequence of certain endeavours, and a certain defective work, from kindness, and it is of more value than the work, and is therefore not merited. Say not, How can this be a reward? for thou shouldest not inquire wisely concerning this. Can any man "buy without money, and without price?" yet this is asserted, Isaiah 55.1, there can then be a reward of grace. Although a son owes his father obedience, his father can nevertheless reward him from kindness; especially if his obedience be not perfect, and nevertheless sincere. Thus also the Lord, when he beholds the sincere endeavours of his children to please him by good, although defective works, rewards them. Is the recompence of God from grace called a reward without reason? no: for as a proper reward is bestowed in consequence of a promise upon the work, as it encourageth the worker, sweetens the labour, and follows the work, so also is the reward according to grace bestowed. They will nevertheless have that God bestows a reward of merit and debt upon works, since "the few at Sardis, who had not defiled their garments, should walk with the Saviour in white, because they were worthy." Rev. 3.4. But their works were not worthy of this, for they should be "washed and made white in the blood of the Lamb," Rev. 12.14. But their persons were worthy of it, because they were "found" in Christ, and so were "perfect in him," according to Phil. 3.9. Col. 2.10. And their good works were evidences of this, since "they had not defiled their garments," and so "he will reward according to works," as evidences of a person's good state, agreeably to the words of Christ and of Paul, Matt. 16.27. Rom. 3.6,8. "Was Abraham justified by works, when he had offered Isaac his son upon the altar;" as James asks, James 2.21. This doth not militate against us, because it cannot militate against Paul, who had said, that "Abraham was not justified by works," Rom. 4. From which nominal Christians took occasion to boast largely of their faith, and conceived that if they had faith, it was enough, although they had not works. James sets himself against these, and he shows that faith without works is not good, and that it must be manifested by works: in order to demonstrate this to them, he alleges the example of Abraham, who was justified by works, when he had offered his son Isaac. And he speaks not therefore of the justification of Abraham as a sinner, as Paul doth, Rom. 4. but as a godly person, by which the Lord God declares of him to his posterity, that he had proved himself to be a righteous and godly person. Abraham was justified by faith, before he had offered his son, for so it is said Gen. 15.6. "Abraham believed in the Lord and he counted it to him for righteousness." But when he had offered his Son, it appeared, and God declared in consequence of his work, and because he feared him, that he was righteous: the Lord said, Gen. 22.12, "For now I know that thou fearest God, seeing thou hast nor withheld thy Son, thine only son from me." III. When our adversaries can do no more, and we have disarmed them, they betake themselves to slandering, reproaching and scoffing, saying, that the doctrine of justification without works "makes men careless and profane." But why need we regard this? It is indeed an ancient slander, which was cast also upon Paul's doctrine of justification in his time, but which was manfully opposed and repelled by him. See Rom. 3,8. & 6.1. Our adversaries show thus, that they are in their temper exceedingly like Ishmael, who scoffed at the freeborn Isaac, who was entitled to the inheritance by promise. But that we may show them that our doctrine cannot justly be reproached in this manner, we say with the instructor, that it doth not make men careless and profane, but exceedingly serious, fervent, and godly, for no doctrine excites and influenceth more than this to zealous godliness, as we will show at large upon the thirty-second Lord's day. We say no more at present, than "that it is impossible, that those who are implanted into Christ by a true faith, should not bring forth fruits of thankfulness." It is frequently declared in the word of God, that they who are justified are implanted and ingrafted into Christ, and thus most intimately united to him, as the graft is united to the stock. Being thus united and ingrafted into him, "they partake of the root and fatness of that olive tree," Rom. 9.47. Is it now possible that they should not bring forth fruits of thankfulness? the Saviour saith, John 15.5, "I am the vine, ye are the branches; he that abideth in me, and I in him, the same bringeth forth much fruit," If our doctrine make men careless and profane, then the doctrine of the legalist ought to make men exceedingly zealous and godly; but how doth this appear, when they are so ignorant, wanton, and exceedingly riotous on their holydays so called, unless we will acknowledge that it is godliness to present God with a certain number of mumbled prayers, paternosters, avemarys, with hearing masses, abstaining from meats, neglecting the body, and I know not what other bodily exercises; but "these things are not of any profit, but only a satisfying of the flesh," Col. 2.23. And what is the Socinian and Arminian godliness? is it a "worshipping of God in the Spirit?" no, for they "rejoice not in Christ Jesus, but have confidence in the flesh." See Phil. 3.3 The whole morality of those men doth not exceed the decent conversation of the most moral heathens. And how can they say that our doctrine renders men careless and profane? this truly the doctrine of the Hagarenes, the hirelings, and the servants who labor for a reward, doth, and no other. Have not the Papists proffered for sale indulgences of sins, heaven and all that is holy? What will induce me to pursue sanctification, if my money, my skill in reckoning bodily exercises can obtain for me the pardon of my sins, and every other advantage? Every legalist teaches that a man may be perfect in this life, if he will only exert his freewill: why then are not all those men perfect? is it not because they conceive that they can offer to God a righteousness by their own works for their sins, or that he will wink at them, if they only perform penance, and amend their conduct? See to what all this tends. Hearers, ye who attend to these things, will any one of you contradict us? and will he not manifest his aversion from that impious opinion, that a man is justified by his works? I believe he will. But do ye know that the most of you, while they know not what they do, walk in the paths of the legalist, and seek their righteousness by their works; and thus justify by their conduct, the false doctrine of our adversaries? it is certain, that all men are by nature children of the covenant of works, born under the law, and after the flesh, and that they do therefore seek life by their own works. Our living under the ministration of the covenant of grace, of the gospel, and of the Spirit, doth not translate us into the state of grace, and into Christ, and it doth not furnish us with a justifying faith; and we cannot all say, that "we are not under the law, but under grace," as Paul speaks of believers only, Rom. 6.14. Now it cannot be otherwise, but that those, who are yet under the covenant of works, under the law, and after the flesh, must work agreeably to their nature and state, and therefore seek righteousness by works. Luther, considering this, said that every man had a Popish priest in his own bosom. Many will not believe this concerning themselves, because they are not Papists; but suffer me to discover it to you, that ye may have a palpable demonstration of it. 1. Ye know that ye have sinned against God, and have deserved death and hell; why are ye not concerned and disturbed at this, and fearful that the wrath of God will light on you every moment? is it not because ye think that ye are not so ungodly as this and that person, that ye do many things, are civil, honest, devout, and zealous after your manner? have ye committed a sin, for which your conscience reproves you, ye soothe yourselves with a little sorrow, and with a purpose to amend your conduct, and to repent, and upon this ye bless yourselves, and think that God will forgive your sin. Is it not then your own doing and work, that renders you so unconcerned, and banishes fear out of your hearts? do Papists seek righteousness by their works otherwise than ye do? Surely the Pharisee did not act otherwise, Luke 18.11,12. 2. Ye say, we know indeed that we must not be justified by our works, but only by the merits of Christ. It is true, ye know this, but doth this knowledge influence you so, that it effects a change of your condition and behaviour, that it drives you, from a concern on account of your damnable condition, out of yourselves to the Mediator, and that ye accept of him and his righteousness truly, heartily, and frequently, and that to be sanctified, as well as justified and saved, and are ye urged thereby to "pursue after perfection," with Paul? Phil. 3.7-14. Is it true, that ye are implanted into Christ by a sincere faith, and that it is impossible for you not to bring forth fruits of thankfulness; ye are then surely justified by his merits. But how few are there, who conduct in this manner! Many have heard others speak concerning Christ, and his merits, and they depend upon this, especially when they are moral, civil and devout, thinking that though their works are not perfect, they will not however be condemned on account of that imperfection; that God will wink at their defects, as the Socinians talk; or that Christ will supply that which they lack with his merits; and so they have a part of the righteousness, as the Papists speak. In this manner the Jews also had "a zeal for God, but not according to knowledge; for they, being ignorant of God's righteousness, and going about to establish their own righteousness, did not submit themselves to the righteousness of God," Rom. 102,3. Once more: 3. To what doth it lead many of you, that they know that they are not justified by their works, but only by the merits of Christ? Our doctrine doth not make men careless and profane, but your imagination, that ye are justified through Christ, although ye have never truly passed into him, nor been implanted into him, makes you careless and profane. If ye did not imagine this, but were convinced of your damnable condition, would ye not be more engaged, and bestir yourselves more for your souls, that ye might not by any means perish, but be saved? But now ye have heard of Christ and his merits only with the hearing of the ear, therefore ye leave all to him without concern, and busy yourselves only with the things which are visible, and with your lusts, yea, many indulge in excess of riot, every one for his own ends. And when they must die, then Christ must save them, and take them to heaven. But is not this "making Christ a minister of sin?" Gal. 2.17, is it not allowing the slander of our adversaries, when they rail at our doctrine, and say that it makes men careless and profane? And tell us, what is the reason of your reproaching and slandering as legalists and Pharisees, persons who separate themselves from the world, and pursue a different conduct from the generality, and who endeavour to shine as lights in a crooked and perverse generation? is it not, because their behaviour convinces you? because ye cannot endure such goads in your sides, and such thorns in your eyes? because ye wish to become careless and profane by this doctrine, at least, because ye endeavour to persuade yourselves that men need not be so precise? What think ye, shall a person, who is implanted into Christ, conduct only like a civil person, and a man of common morality? ought not the image and Spirit of Christ to shine forth in him? And why do ye look upon such persons as hypocrites, legalists, and Pharisees? is it not on account of their modest appearance, their discourse, which is agreeable to godly persons, and seasoned with salt, or their decent behaviour? must justified persons then conform themselves to the world, be loose and disorderly? Ye will say, No, but we hate their hypocrisy, and those outward things are the whole of their religion and merit. How do ye know this? do ye know the heart? no, but ye are not willing that their behaviour should shame and condemn you; therefore "judge not, that ye be not judged," according to Matt. 7.1. Let each one now inquire how he conducts with respect to these matters. Do ye rest in your own works? is your religious zeal the foundation of your hope, and would it appear strange to you, if God should not bestow heaven upon you and do ye with the Jews "exact all your labours?" Isaiah 58.3. Know then that ye are yet under the law and the broken covenant of works, and therefore "under the curse," Gal. 3.10. And so God "will not clear you," according to Exod. 34.7. Do not flatter yourselves with the merits of Christ, for ye have surely no interest in them by an active faith, which would implant you into him; for ye would then reckon all your own doings as loss and dung; but ye are now so exceedingly pleased with your own works; and therefore ye are yet without the Mediator; "Christ is become of no effect to you, whosoever of you are justified by the law; ye are fallen from grace," Gal. 5.4. When God will enter into judgment with you, consider whether all your works will then justify you. Do ye say, We trust not in our works, but in the merits of Christ through faith? But are ye implanted into Christ by faith, and do ye therefore bring forth fruits of thankfulness? this is well; but do ye think that works will not avail to save you, but faith only and do ye therefore live as ye list, ye are then a reproach to our holy doctrine, and "the name of god is blasphemed through you, as it is written," Rom. 2.24. Your faith is without works, is a dead faith, as James speaks, James 2.17. Verily, your outward ado, and saying, Lord, Lord, will not procure you an entrance into the kingdom of God: "Faith only, which worketh by love, avails in Christ Jesus," Gal. 5.6. O that ye would all of you see your misery with anxiety, and that ye cannot deliver yourselves, that ye might cry out with concern, "What shall we do!" as those did, Acts 2.37. Rest not, before ye are in the Son of God; he is willing and able to bestow a sufficient righteousness on you. Hear him cry to you, Isaiah 45.22, "Look unto me, and be ye saved, all the ends of the earth: Surely shall one say, In the Lord have I righteousness and strength: to him shall men come." But, believers, who, according to your evidences exhibited in the former Lord's day, have indeed been justified before God freely, without works, by faith, and who must still daily seek justification and reconciliation for your daily offences, this leaven of working with your own righteousness is not wholly purged out of you, any more than your natural depravity is wholly rooted out of you: for ye also are frequently driven to pursue your own righteousness. This is evident, (a) Because ye often dare not believe, that ye have grace, and are justified, unless ye have just such a measure of holiness. If ye depended only upon the righteousness of Christ, would ye suffer yourselves to be shaken on account of the degree of your sanctification? it would humble you, that ye had not made a greater progress, but it would not cause you to reject your state, since your justified state is not founded upon any measure of sanctification, but upon the perfect righteousness of the Mediator. (b) It appears also from this, that a greater or less progress in virtue causes you to draw near more or less boldly to the throne. When ye have done your duty tolerably well, ye will then venture to draw near; but when ye have behaved improperly, ye then wander about, and seek for excuses, only in order to remain aloof: and when ye dare not neglect to draw near, ye are possessed with a prejudice, that God will not hear you, ye dare not persevere, but make short work, and wait until ye have behaved yourselves better. It is proper to go to God, with a holy awe, with a deep humility and shame, on account of your misbehaviour; but to forbear altogether to draw near, or to draw near only with such an unbelieving trembling, when we have misbehaved ourselves, and courageously only when we have done well, evidences that we found our right to draw near, not upon the righteousness of Christ, but on our own works. (c) This is also evident, because men are often urged to holiness by fear, as if they stood near mount Horeb. "The Lord hath delivered you, that ye might serve him without fear," Luke 1.74. But a slavish fear, proceeding from the covenant of works, sometimes possesses the soul, and urgeth her to do this or that, as a command of God, as if every misdeed subjected her to the curse. Yea, this renders the soul so scrupulous and anxious, that she sometimes looks upon certain actions to be sinful, which a Christian may perform freely. (d) This is still more evident, because men sometimes pursue holiness, in order to seek and find rest for their souls. They have made a breach in their spirits by sin, this they will heal, what do they do? embrace the righteousness and atoning blood of Christ, in order to pacify their minds? no, they will bewail it, and reform, and thus their work, and not Christ will afford them rest. Further, (e) Men dare not embrace the proffered and promised grace, and Christ, because they are not so contrite as they imagine besides the word of God that they ought to be. And thus they attend to their own doings, and not to the perfect righteousness of Christ, and they do not surrender themselves to him, as altogether wretched, and seek his favour only. It appears also, (f) because they sometimes become impatient, when they do not obtain their desire, after great earnestness: what doth this denote but that they imagine, that their earnestness obliges God to be favourable to them. But God doth not approve of all this self-tormenting, it dishonours Jesus, it keeps the soul from her rest, and confounds the grace and righteousness of God and Christ with our unclean and filthy works: "If it be by grace, then is it no more of works: otherwise grace is no more grace: but if it be of works, then is it no more grace: otherwise work is no more work;" thus speaks Paul, Rom. 11.6. A Christian must part with all that is his own, he must count it loss and dung, that he may be found wholly in Christ: he must be stripped, naked, and bare, as one who is dead, and he must surrender all that is his own, as one who is become a bankrupt, that he may be completely clothed and enriched with the righteousness of Christ only. All that he hath in himself is but rags and tatters, it can neither clothe nor feed him. Shall a Christian then, as if he were not obliged to any duty, sit still, and be careless, and think now I have nothing to do, Christ hath done all for me? No, this is impossible: his looking off from his own righteousness doth not teach him this. Justification by the righteousness of Christ alone through faith obligeth him to prize this truth, to thank the Lord for it, to conduct himself humbly and worthily of this truth by a diligent pursuit of holiness, which we have urged on the foregoing Lord's day. But we must see that we pursue sanctification, as those who are implanted into Christ, and therefore, 1. As justified persons in him by faith: for how can sanctification be acceptable to God, as long as he hath aught against the soul on account of her guilt, by which the Father is justly incensed against her? How can she draw near him boldly with her sacrifice of thanksgiving, except she be delivered from doubts, and able to acquit herself? We must "draw near with a true heart, and a full assurance of faith, having our hearts sprinkled from an evil conscience, and our bodies washed with pure water," Heb. 10.22. It behooves you therefore, believers, to labour first and mostly for justification, in order to pursue sanctification therefrom. Endeavour then to obtain an assurance, that ye have been already justified before God, as sinners, and have thus a right to request sanctification on account of the merits of the Lord Jesus: for since he is made righteousness to you, he is also "made sanctification to you," as Paul saith, 1 Cor. 1.30. Labour then, after any misbehaviour in future, not first and mostly to amend your conduct, but to be justified and reconciled to the Father, and to make your peace with him by accepting your Surety, and pleading on your title to him before the throne, that ye may pursue sanctification from such a justified, pacified and reconciled mind, and thus begin your former holy conversation anew. 2. Pursue sanctification by all means from, and in union with Christ: "Your life must be hidden with Christ in God," according to Col. 3.3. Believers being implanted into Christ, bring forth fruits of thankfulness: "Having been planted together with him in the likeness of his death, we must also be so in the likeness of his resurrection," as the apostle requireth, Rom. 6.5, "Our good conversation is in Christ," as Peter saith, 1 Peter 3.6. It must necessarily be bitter fruit that grows upon a wild tree, but the fruit of a grafted tree is pleasant. No action can be agreeable to God but that which is performed in, and from the union of the soul with Christ: "The fruits of righteousness are to the praise and glory of God" only "through Jesus Christ," as Paul teacheth, Philip 1.11. Hear also what Peter saith, 1 Peter 2.5. "Spiritual sacrifices are acceptable to God through Jesus Christ. Ye must therefore not reckon it enough that ye have been implanted into Christ by faith, but ye must also abide in and near him continually, and operatively. 3. Strive to do all your works by his Spirit, influence, virtue and power, as the graft bears no fruit, unless it derive its sap from the tree. As long as we exert, fatigue and afflict ourselves without the Spirit, in order to do our duty, we will never perform aught that is acceptable to God: "Not by might, nor by power, but by my Spirit, saith the Lord of Hosts," Zech. 4.6. We have shown on the eighth and ninth question how often the soul labours in her own and not in Christ's strength, and thus mars her work. If the soul shall labour rightly, she must abide near and by her stock Jesus, sucking incessantly through the pipes and conduits of the promises from his fullness, grace for grace. Therefore the Saviour saith to you, John 15.4,5, "Abide in me, and I in you. As the branch cannot bear fruit of itself, except it abide in the vine, no more can ye except ye abide in me. He that abideth in me, and I in him, the same bringeth forth much fruit; for without me ye can do nothing." 4. Look nevertheless at the reward, in order to encourage and animate you in your work. The Lord offers a crown at the end of your race, to urge and induce you to strive for it, namely, an incorruptible and undefiled inheritance, which fadeth not away. When "the prophet Azariah said to king Asa, and to all Judah and Benjamin, Be strong, and let not your hands be weak; for your work shall be rewarded: Asa encouraged himself with all the people," to effect a great reformation and amendment among themselves, 2 Chron. 16. Moses having respect to the recompence of the reward, esteemed the reproach of Christ greater riches than the treasure in Egypt," Heb. 11.26. The Lord is in himself worthy of your universal obedience, faith, love, fear and service; he hath also deserved all this at your hands: yea, believers, ye are yourselves earnestly desirous to please him, and pleasing him is a sufficient reward for you. The Lord will nevertheless be abundantly good to you, since he will excite you by a reward. Improve this therefore by stirring yourselves up thereby to greater activity in your way. Look not however on the reward, as an equivalent compensation of your work, but have respect to it, as the fruit of the righteousness of Christ, which was purchased for you by him, that it should be given to you upon your work; for "eternal life is the gift of God through Jesus Christ," Rom. 6.23. Do ye lament that your work is so imperfect, it doth not please the Lord yet to render you perfect, that ye may seek your perfection in the righteousness of his Son. How good is it therefore, that it is not necessary for you to seek your righteousness in your works, but in him, who hath obtained a perfect righteousness for you, "that the righteousness of the law might be fulfilled in you," according to Rom. 8.3,4. Do others scoff at you, on account of your zeal, why should ye regard what the despicable slaves, the Hagarenes and Ishmaelites do? Look upon it to be of greater importance what your Saviour saith, Matt. 5.11,12. "Blessed are ye, when men shall revile you, and shall say all manner of evil against you falsely for my sake. Rejoice and be exceedingly glad, for great is your reward in heaven; for so persecuted they the prophets which were before you." Say not with Asaph, Psalm 73.13,14. "Verily I have cleansed my heart in vain, and washed my hands in innocency; for all the day long have I been plagued, and chastened every morning." For would ye, though ye should suffer ever so much, exchange your condition with an ungodly person, who enjoys the greatest property? although it were even so, that the condition of the ungodly was better in this life than that of the godly, will not their comforts end with their lives, and will not their sorrows begin then? But how will it be then with you? Peter informs you, 1 Peter 5.4. "When the chief shepherd shall appear, then shall ye receive a crown of glory, that fadeth not away." Amen.
global_01_local_1_shard_00001926_processed.jsonl/51787
We Can Supercharge Your Life Business Outfit A lifestyle typically reflects an individual's attitudes, way of life, values, or world view. Travel Couture Screen Casting Some commentators argue that, in modernity, the cornerstone of lifestyle construction is consumption behavior Nightlife Guide Never Hide Yourself Social Presence Earlier studies on lifestyles focus on the analysis of social structure and of the individuals’ relative positions inside it. Modern Outfit The approach interpreting lifestyles as principally styles of thought has its roots in the soil of analysis. Dress to Impress Analysis of lifestyles as action profiles is characterized by the fact that it no longer considers the action level.
global_01_local_1_shard_00001926_processed.jsonl/51803
Life insurance: the ultimate ‘rainy-day fund’ One of the reasons why you might save up is to safeguard your family against misfortune. But a rainy-day fund can only do so much. For a truly adequate level of protection, life insurance is often a better solution – and it’s more versatile than you might think. On the financial planning Scale of Excitement (bear with us), up at the sexier end we have investments – because everyone likes the idea of turning money into more money. Ordinary saving is somewhere in the middle – but way down at the dull end of the scale, there’s protection. Somehow, no-one can get excited about paying monthly premiums to a life insurance policy. But it’s time to see life insurance in a new light. A common reason why people build up savings is to provide a fall-back fund if the unexpected happens. However, few can build up savings large enough to meet one of the biggest challenges of all: the death of one of the family’s main earners. In emergency, break glass… For most people, only life insurance can hope to fill an income gap like that. Although a life insurance policy is not actually a fund (rather, it’s a contract between you and the provider), it may help to think of it as a special kind of ‘crisis fund’ that only becomes accessible if the worst happens. The big advantage is that if you do need it, it will pay out to you far more than you paid into it – making it a dramatically better solution than an emergency savings fund. A premature death may seem unlikely if you’re in good health, but the consequences are severe enough to make it qualify as a serious risk. This is why mortgage lenders insist on you taking out life insurance. Unfortunately, most people tend to take out the first life insurance they’re offered – which is usually the one recommended by their mortgage lender. But it’s possible to arrange a policy that is precisely tailored to fit your needs. Here are just some of the things your life insurance can do for your family. Pay a lump sum if I die within a certain period of time There are two main categories of life insurance: term insurance and whole-of-life cover. The most popular kind is term insurance. It will cover you for a set period of time (for instance, the term of a mortgage, or until you reach an age when you can access your pension), so that if you die within that time, a lump sum (or a regular income – see below) is paid out. After that, no money can be paid out. With different kinds of term insurance, you can arrange for the following: Pay me a fixed lump sum Level term insurance pays the same lump sum to you no matter when you die (within the period of cover). Pay a higher lump sum the later I die Increasing term insurance will pay out more if you die later, to take account of the rising cost of living. The downside is that premiums will also increase over time. You can also get a policy that is linked to the Retail Prices Index, to ensure that the lump sum paid out retains the same value in real terms. Pay a lower lump sum the later I die You can also opt for decreasing term insurance. Why might you want this? Well, if the insurance is to cover an expense that will reduce over time (such as mortgage repayment), this approach can give you the necessary cover at lower premiums. What if I want an income instead of a lump sum? Some people prefer the security of a guaranteed income rather than a lump sum that can run out. Similar to term insurance is family income benefit (FIB), which kicks in if the insured person dies within a particular time period. The difference is, instead of paying out a lump sum, it will pay out a regular income until a specific date. For instance, it may be set up to pay for household expenses until the children reach adulthood (e.g. 21). Though a guaranteed income has its advantages, there is also a downside. If you die close to the end of the insured period (the termination date), your family won’t get much payout – whereas if you had term insurance, they would still receive the full lump sum. Can I get a payout whenever I die, no matter how old I am? Term insurance only covers you within a set period of time. If you want a guaranteed payout whenever you die, you will need whole-of-life cover. The premiums on this are of course much higher, as you are insuring against an event that will definitely happen one day. A popular reason for taking out whole-of-life cover is to cover future inheritance tax (IHT) bills. This enables the tax to be paid before the estate is settled (IHT bills must be paid within 6 months of a person’s death, but it may take much longer to settle the estate). Another reason for this kind of cover is to pay for funeral costs. Can I change term insurance to whole-of-life cover? If you take out convertible term insurance, you can change it to whole-of-life cover at a later date, regardless of any change in your health. However, your premiums will rise. Is it better to cover my partner jointly or separately? You can cover both yourself and your partner / spouse under the same policy – it’s usually cheaper. However, most joint life policies work on a ‘first death’ basis, so they only pay out when one of the policyholders dies. If you want both of you to remain insured, then you will need to have separate policies. This will of course be more costly – but it’s also simpler if the relationship fails and the partners separate. Will life insurance pay out if I fall seriously ill? Most life insurance policies will pay out if you develop a terminal illness, and some also cover critical illness (where the illness is severely debilitating but not necessarily terminal). You can often add critical illness cover with a small increase in premiums. However, bear in mind that the industry has a poorer record of paying out on this kind of cover, with one in 12 claims declined. Setting up your ‘emergency fund’ life insurance As you can see, there are many different ways in which life insurance policies can protect against the financial consequences of bereavement. Finding the right policy for you will involve taking all your other circumstances into account. A financial adviser can help you do this, and can also search the whole of the market for you, in order to find the best value policy available. Find your financial adviser using the Unbiased search.
global_01_local_1_shard_00001926_processed.jsonl/51830
Shared knowledge leads to accumulated knowledge Printer Friendly Page September 29, 2009 10 years ago, In 1999 this site was born as a means to share code amongst DataFlex developers. We can safely say that this was a HUGE success. Antwise Solutions (a.k.a. Wil) has always paid for all the costs, This includes hardware, software (such as the yearly webapp updates) in order to keep running this site, spending time on writing code myself, help writing code to add, support contributors and hosting the server. This is a pretty expensive hobby I can promise you, but it has been fun, so not a big deal. However as an attempt to control the costs a bit better and hopefully speed up DataFlex Open Source commitments, we are now open for sponsoring. Let me explain this a bit better: We don't require sponsoring in order to keep running. Antwise will always cover the costs to keep the site running and I'll always try to do my best for the site. But if we can cut some costs for running the site, it effectively means more time available to spent for programming and supporting open source. So your donation will be spent on improving the site and its contents. Thanks for considering! If you already have a paypal account, instead of using the paypal button, you can send money to the email address I used for setting that up. Which is wil-a@ followed by the domain name of this web site.
global_01_local_1_shard_00001926_processed.jsonl/51852
This Hilarious Short Film Explores The True Definition of a Photocopier So what exactly is a photocopier? You'd think the answer to that would be an easy one to explain, but you would be wrong---so very, very wrong, especially if you resided in Ohio. Los Angeles filmmaker Brett Weiner’s short film “Verbatim” is a dramatization of transcripts from a real-life case from the Ohio Supreme Court, where a lawyer became embroiled in an absurd argument about the definition of a photocopier. The witness in the deposition decided to argue that he had no idea what the term “photocopying machine” actually means and the resulting exchange occurred. We're through the looking glass here people---into an alternate reality where things become so complicated that no one knows anymore what is real---except we are not, this really happened! You couldn't make this stuff up, however hard you tried and if you saw it in some Hollywood film you'd leave the movie theater citing unrealistic plot settings and absurd context (yeah, i know, you probably do that already with some of the stuff that comes out of Tinseltown, but stay with me on this..). Weiner chanced upon the deposition back in 2012 and thought it was so ridiculous it warranted turning it into a short film, which the New York Times ran as one of their Op-Docs back in April. Produced by: Brett Weiner Read the story here:
global_01_local_1_shard_00001926_processed.jsonl/51865
Democracy Dies in Darkness The staggering difference between rich Asian Americans and poor Asian Americans December 20, 2016 at 12:08 PM Not all Asian Americans have fancy kitchens and flawless families. (iStock) If you only looked at the most basic data, you might get the impression that Asian Americans are thriving. They earn more, on average, than white Americans, and they're catching up in terms of average household wealth. These kinds of simple statistics are one reason that Asian Americans are still stereotyped as a "model minority." But Asian Americans have tremendously divergent experiences. Some are upwardly mobile, but many others struggle with poverty. The differences are hard to see in the average numbers. A new report from the Center for American Progress, a left-leaning think tank, highlights the problem with lumping Asian Americans together. According to economists Christian Weller and Jeffrey Thompson, Asian Americans are such an economically diverse group that wealth inequality is actually worse among Asian Americans than among white Americans. The economists used hard-to-obtain government data to provide a clearer look at Asian American wealth. Census figures already show that income inequality is higher among Asian Americans. Indian American households, for example, earn nearly twice the national average, while Bangladeshi and Cambodian Americans have lower-than-average household incomes. Asian Americans earn more than whites on average, but they also have higher rates of poverty. The new report suggests that for Asian Americans, wealth inequality is also more pronounced. There are many ways to measure inequality — in this case, the economists compared different wealth thresholds. According to the data, white families in the top 10 percent each had more than $1.26 million in 2010-2013, while white families in the bottom 20 percent each had less than $10,468. In other words, a typical rich white family was about 120 times wealthier than a typical poor white family. Among Asian Americans, the cutoff to make it into the top 10 percent was actually higher — about $1.44 million. And the families at the bottom end seemed to be worse off — the poorest 20 percent of families were each worth less than $9,319. So a rich Asian household was about 168 times richer than a poor Asian household. Such disparities are completely invisible according to the usual way we consider racial differences, which focuses on averages, not levels of inequality. Asian American households and white American households in fact have about the same amount of mean wealth — about $680,000, according to CAP's calculations. That creates the illusion that Asians are about as well off as whites. But as the report suggests, the richest Asian Americans are far more affluent than the poorest Asian Americans — so much so that they skew the data and obscure the problems of the people at the bottom. "The communities that we know aren't doing so well — people from countries like Vietnam, Laos, Cambodia — they make up close to 40 [percent] to 45 percent of the Asian American population," said Weller, a professor of public policy at the University of Massachusetts at Boston and a senior fellow at CAP. "By only looking at averages, you're papering over the substantial struggles of a huge chunk of lower-income, less wealthy Asian Americans." "The problem is that 'Asian American' doesn't hold together as a category," said Philip Cohen, a sociology professor at the University of Maryland. "The group is too diverse. It doesn't really make sense to compare recent Chinese, Korean or Pakistani immigrants who are working in tech and engineering jobs to people who came as refugees in the 1980s and their working-class descendants." It's hard to collect data on Asian Americans because they are still only about 5 percent to 6 percent of the population, so some parts of the CAP report should be taken with caution. The conclusions are based on national surveys conducted every three years by the Federal Reserve, each covering several thousand Americans, including a few hundred Asian Americans. The economists say that the recent differences in wealth inequality are large enough to be statistically significant at the 10 percent level. So this is suggestive, but not slam-dunk evidence. The CAP report also contains some good news. In terms of mean wealth, Asian Americans seem to have more or less closed the gap with white Americans, largely because the richest Asians have become richer. In terms of median wealth, Asian Americans may have even surpassed white Americans in the years between 2001 and 2007. (These trends square with similar data from the Census Bureau, which has a much larger, but in some ways perhaps less accurate, survey on American wealth.) Source: Center for American Progress calculations using FRB Survey of Consumer Finances The housing boom and bust explains a lot of the patterns in inequality. Homes tend to be the most expensive asset a family owns, and although the Asian American homeownership rate (about 60 percent) is lower than the white homeownership rate (about 74 percent), Asian Americans also tend to live in coastal metropolises where homes are expensive. In the early 2000s, the Asian Americans who were fortunate enough to own homes had their net worth skyrocket, increasing wealth inequality between Asian American homeowners and Asian American renters, as well as helping Asian Americans catch up to white Americans. Another reason that Asian American wealth has been creeping upward is that the Asian American population is getting older on average. In 2015, the median age for Asian Americans was 36.3, up from 32.7 in 2000. (Whites, in contrast, are the oldest on average — their median age in 2015 was 43.) People in their 50s and 60s, of course, tend to be the wealthiest because they've been saving for retirement. It's important to keep all of these findings in perspective. Compared with whites and Asians, African Americans and Hispanics are much less wealthy, and they don't seem to be making much progress. Data from the same survey shows that both groups have actually been losing ground relative to whites in recent years. Part of the problem is that these groups earn less on average. But they also seem to suffer from inferior opportunities. "It appears that the returns that African Americans and Hispanics get on similar assets are lower," said Ray Boshara, director of the Center for Household Financial Stability at the Federal Reserve Bank of St. Louis. "So buying a home or pursuing an education does not yield the same amount of wealth." Taken in that light, the gains in wealth among Asian Americans seem all the more remarkable. As the CAP report shows, this is mostly a phenomenon of the richest Asians pulling away from the rest. Even so, hasn't inequality been the story of the United States recently? In that sense, at least, Asian Americans really have been a model minority. Jeff Guo was a reporter covering economics, domestic policy and everything empirical. He left The Washington Post in April 2017. Post Recommends We're glad you're enjoying The Washington Post. Welcome to The Washington Post Thank you for subscribing Keep reading for $10 $1 Show me more offers
global_01_local_1_shard_00001926_processed.jsonl/51876
Dear Diary 27 1 0 My name is Melanie. So basically, I'm just an average college girl. I started three months ago and it's okay. There's this guy. His name is Harry. He seems way out of my league though. He's just so wow. We are complete opposites. He has tattoos and I don't. He's a "bad boy" and I'm a goody two shoes. He spends his Friday nights at parties. I spend my Friday nights studying. The truth is, no matter how annoying he may seem, I think I kinda like him too. Dear Diary (on hold)Read this story for FREE!
global_01_local_1_shard_00001926_processed.jsonl/51877
Chapter Thirteen 11K 600 55 With pots on the stove and ingredients all over the kitchen, Xavier was grinning at me in this cute sort of way. Like how a child would look at you and scream 'this is going to be amazing! Just wait and see!' Which made me mentally grin, but on the outside I raised a cautious eyebrow, worried that I would somehow mess up and Xavier would have to fix whatever I did. Perhaps even have to put out a fire that was bound to happen. It was only three, and apparently this thing took about an hour or so to do. So either we would have dinner early or we would let it keep warm on the stove until everybody was hungry. Xavier began to take the ingredients from the bags and set them all across the counter and I got two knives, because I was pretty sure we would have a whole lot to chop. I was just looking forward to the seafood. "You can chop right? You won't cut yourself? Because I want all five fingers around me, not four," Xavier winked, making me force an amused grin down and flash him the bird. I felt a finger run from between my shoulders to the base of my back, making my shoot Xavier a look, before moving forward to get the vegetables. "You'll love this, I swear." "I believe you. I'm putting your cooking skills to the test though. See how good of a cook you really are," I replied, leaning against the side and watching him smirk. He really was acting like an excitable child. "I'm great at cooking your insides in arousal," he said, pushing some vegetables over to me. I ignored the quickening of my heart, rolling my eyes instead. "Chop those up into small pieces and put them into his bowl. We pretty much put everything into the pot and let it boil for a quarter of an hour." I simply nodded and stood to the side, watching him really get into the cooking. I had no idea what to do, and he seemed to be enjoying himself. And I found myself enjoying watching him glide around the kitchen like he was made to cook. After a while, he looked at me and frowned. I grinned and motioned him to carry on. "But I want to teach you," he said, stopping what he was doing. I snorted and rolled my eyes. Idiot. "I can still learn while watching what you do." And watching you, I thought, watching him sigh and turn back to his work. I watched his muscles move under his thin shirt as he cut things up and put things in the pot, also eyeing his ass as he walked back and forth. Not long after he had the lid on the pot, insisting that we had to wait fifteen minutes. I was somewhat relieved that he didn't feel the intense stare on him the whole time, or if he did he hadn't said anything. But instead of sighing in relief, I followed him to the lounge where the angel was sitting next to the demon maturely as Zander slouched on the side with a childish pout. They really were twins. "How's the food?" Flynn asked from the recliner, sitting Theodore's back against his stomach. "Delicious," I grinned. "You haven't even tried it yet," Xavier smirked at me. "Besides, nothing is delicious as you, kitten." "Angel," I said, getting Saturday's attention, and a not so joyful one from the sulky demon. "What did you do? Decline him of release? Come on, I'll show you to your room. I'm sure Xavier has already shown his brother where he is sleeping." "In my room," Xavier said, slinging his arm around my waist. I glanced at him before stepping away and taking Saturday's hand. "Then you'll have the spare room," I said to the white haired man. Saturday nodded obediently, quietly letting me guide him from the room where I could feel Zander's temper rising. I resisted the urge to giggle like a little girl. I was still trying to think of ways to piss him off. In fact, I'd already plotted a few ideas, but they weren't ready to use. The bonfire was tomorrow night, and we'd have to go get some marshmallows and chocolate and biscuits for smores. There was also the fact that there weren't many days until the weekend, which meant Sunday, which meant going to that warehouse alone. My Immortal (mxm)Read this story for FREE!