id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_1_shard_00001926_processed.jsonl/54745
Secret Waterfall Hidden In Nashville! You know we love our waterfalls around middle TN! Most of the time we have to travel to cummins falls or other parts of the state to see the gorgeous waterfalls that Tennessee has to offer, but there's actually a secret hidden waterfall in our own back yard! The "West Meade Waterfall" is right under our nose over by Highway 70 south in Bellevue! I guess it doesn't constantly have water in it, but when it rains, it's supposed to be STUNNING! PIZZA. Model.Actor.Host.Too Glam To Give A Damn :) Read more Content Goes Here
global_01_local_1_shard_00001926_processed.jsonl/54803
How to determine if a Cyber Stalking threat is serious Credibility. This is rather easy to determine. For a threat to be credible, there must be some reasonable expectation that it could be carried out. For example, suppose a woman in Nebraska is on an Internet discussion board and receives a general threat from another user living in Bangkok in the course of a heated debate. In this scenario, the sender very likely has no idea where the recipient lives. Indeed, since many people use screen names on the Internet, the sender may not even know the recipient’s real name, gender, age, or appearance. That means this threat has a very low level of credibility. If, however, the woman in Nebraska receives a threat from the user in Bangkok accompanied with personal information such as her address, place of work, or a photo, that is a very credible threat. Frequency. Unfortunately, people often make ill-advised comments on the Internet. Often, however, a single hostile comment is just a person reacting too emotionally and too quickly on the Internet. For this reason, this type of comment made in a chat room or on a bulletin board is less of a concern than a pattern of threats over a period of time. Frequently, cyber stalkers escalate their comments and threats over time, gradually building up to point where they will act violently. While there certainly may be cases in which a single threat warrants investigation, as a general rule, isolated threats are of less concern than a pattern of harassment and threats. Specificity. Specificity refers to how specific the perpetrator is regarding the nature of the threat, the target of the threat, and the means of executing the threat. Of course, it is very important for law-enforcement officers to realize that real threats can sometimes be vague. Put another way, real threats won’t always be specific. But specific threats are usually real. As an example, someone receiving an e-mail saying “You will pay for that” is less of a concern than an e-mail containing a specific threat of a very specific type of violence, such as “I will wait for you after work and shoot you in the head with my 9mm,” along with a photo of the recipient leaving work. (Note that the photo also makes it very credible.) This threat is very specific and should be of much greater concern to law enforcement. Intensity. This refers to the general tone of the communications, the nature of the language, and the intensity of the threat. Graphic and particularly violent threats should always be taken very seriously by law enforcement. Often, when someone is simply venting or reacting emotionally he or she may make statements that could be considered threatening but in these cases, most people make low-intensity statements, such as threatening to beat someone up. Threats such as these are of less concern than, say, a threat to dismember someone. This is because normal, non-violent people, can lose their temper and want to punch someone in the nose. But normal, non-violent people don’t usually lose their temper and want to cut someone into pieces with a chainsaw. Anytime a threat raised to a level that is beyond what a reasonable person might say, even in a hostile situation, then the threat becomes of greater concern. Now, all four of these criteria need not be met in order for a cyber-threat to be considered viable. Law-enforcement officers must always rely on their own judgment, and should always err on the side of caution. A particular officer may feel a given threat is very serious even if several of these criteria are not met. That officer should then treat the threat as a serious concern. And if one or more of these criteria are present, the officer should always treat the matter seriously, regardless of his or her personal inclinations. A credible, frequent, specific, and intense threat is very often a prelude to real-world violence. Other examples of cyber stalking can be less clear. If you request that someone quit e-mailing you, yet they continue to do so, is that a crime? Unfortunately, there is no clear answer on that issue. The truth is, it may or may not be considered a crime, depending on such factors as the content of the e-mails, the frequency, the prior relationship between you and the sender, as well as your jurisdiction. It may be necessary for the recipient in this case to simply add that sender’s e-mail to his or her blocked list. Contact Us Now CALL US today (469) 296 - 8109 Dallas - Fort Worth Digital Forensics Experts Contact Us Now
global_01_local_1_shard_00001926_processed.jsonl/54804
5.5 – Whispering Woods Einarr set his jaw. Cursing himself for a fool, and glad he hadn’t moved his feet just there, he turned himself exactly around. He was a decent tracker, even if he’d never been able to do a lot of hunting: with a little luck he’d be able to retrace his own steps. Behind him, though, the path soon disappeared into an impenetrable bramble of thorns into which his boot prints disappeared. He attempted to follow around the outside of the thicket, but there, too, the thorns grew – so quickly they seemed to sprout and curl before his eyes. Whatever else this trickster spirit is, it certainly is persistent. Frowning harder now, he turned back around and marched further in. “I don’t know who you are or what you want, but I will have you return me to my friends,” he announced to the forest around him. No answer came, save the trilling of bird song. At least it’s not cawing. Of the many hazards of stealing the Őrlögnir, one that he had not until this moment contemplated was that he would be going against Wotan’s personal spies. He cursed aloud. “Oh, there’s no cause for that now.” The voice was light and airy, although still masculine, and seemed to come out of thin air. Einarr stopped, his hand traveling to Sinmora’s hilt. “Who are you?” The slender, almost effeminate form of a male alfr separated itself from a tree just ahead of him on the path. “Does it matter?” Einarr would swear the elf had not been there before: his clothes were the color of tree bark, true, but his hair was as golden as the Oracle’s, and his skin fairer than Runa’s. Einarr stared openly at the creature, waiting for an answer. “You may call me Ystävä.” Well, that name couldn’t be more obviously fake. “I shall choose my own friends, thank you. What do you want?” “Let us say that I, too, have an interest in your success on this quest. I have something which may aid you…” “I see. And what would the price of this aid be?” Everyone knew that alfr “gifts” came at a heavy price. The elf smirked. “Are you, perhaps, not so stupid as you first appear?” Einarr bristled, but was not given a chance to retort. “But I am not here to play games with you. As pleasant as that can be, I must mind your mortal time if this is to work. There is a small task I will ask you to perform with Frigg’s distaff once you acquire it – nothing major, and you will alleviate a great deal of suffering by doing so.” “And if I refuse?” “Refuse?” The alfr laughed, the notes as musical as any Singer’s. “Perhaps you are entirely stupid. You allowed yourself to be drawn into my domain, and in my domain you will stay until I decide otherwise. You have my word, on the font of Art itself and by the hand of Tyr, that my request will not violate your conscience or your father’s.” Einarr glared at the elf. “I mistrust this mysterious task of yours, but you make it plain I have no choice. Very well; give it here and I will be on my way.” “Wonderful!” The alfr smiled, and a chill ran down Einarr’s spine when it did not touch his eyes. “Why all this subterfuge, if what you want is so harmless?” “Well, you see, I am known to the Circle of Singers…” “And they don’t trust you either?” “You wound me! What possible reason have I given you to distrust me?” Einarr did not dignify that with a response even as the elf pouted at him. “Very well. Spoil my fun. Here. Once you get to the tower, you’ll know what to do with it.” The elf shoved a wooden brooch into Einarr’s hand. When he opened his palm to look, it was in the shape of a raven and covered in runes. “What -” But when he looked up from the brooch, the elf was already gone. A low growl escaped his throat. The lush greenery almost seemed to grow back into the earth, it faded so quickly back into the oak wood he had been walking through just this morning. A thread of song filtered through the trees from off to his right: Runa. How long had they been searching for him? Einarr set off at a jog in search of the voice. It was not long before he could see his companions stopped on the road: they looked tired, and Reki in particular looked very annoyed by the way she held her shoulders under her cloak. “Sorry,” he said as he approached the road, before any of them could begin to scold him. “Some ass of an alfr decided he was going to help us whether we wanted it or no.” Reki scowled at him from under her hood. “Tell me what happened. In detail.” Einarr sighed. And, as expected, she was even less happy with this turn of events than Einarr had been after hearing the tale. “I take it this ‘Ystävä’ is known to you?” “Unfortunately. And while I’m glad he returned you to us with only minimal delay…” “You also mistrust the ‘task’ he wishes to ask of me. How long since I disappeared?” “Half a day,” Trabbi grumbled. Einarr bit off a curse. “Then let us discuss this further once we’re out of his little playground… whoever he actually is.” Now Reki was not the only one setting a brisk pace: if they wanted to reach East Port before dark, speed was of the essence. Even so it was late afternoon before they emerged from the shadow of the forest, and deep into twilight before they arrived at the outskirts of the town. Einarr flared his nostrils: from here everything appeared normal, at least. There were no screams of tentacled horrors that came to his ears – or any screams at all – which had to be a good sign. He shared a glance with Reki. “Let’s go.” Vote for Vikings on Top Web Fiction! 5.6 – Coming Soon Table of Contents Hi, everyone! Thanks for stopping by! One thought on “5.5 – Whispering Woods” Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/54814
The German Shepherd: From Sheep Dog to Dog of Many Skills The German Shepherd: From Sheep Dog to Dog of Many Skills The German shepherd is known today as a handsome, well-built dog German shepherdwith high intelligence and strong loyalty.  The breed has been used successfully as a police dog, a seeing eye dog, a military dog, a guard dog, and as a family pet. Yet the dog’s beginning was as a German sheep dog. Breeding the German Shepherd For many years, man has understood that pairing certain dogs or horses or cattle could make it more likely that offspring would have certain desirable traits. Through the 19th century when life was primarily oriented to living locally, farmers who kept sheep dogs mated their animals according to the best dogs that were in the area at the time.  Only with the increase in communication and transportation that came toward the end of the century was an effort made to standardize breeds, the German shepherd among them.  Commercial Dog Cloning Service Duplicates Five Puppies from 9/11 Hero DogAs early as 1881, an organization was created  to standardize the German shepherd in Germany but there were immediate and lasting disagreements about what made the “right” dog. The group soon disbanded. Then in 1889, Captain Max von Stephanitz, a former member of the earlier group, attended a dog show in Karlsruhe, Germany where he was particularly taken with a medium-sized yellow-and-gray wolflike dog. The dog was well-built and powerful and proved to be intelligent.  Though its owner was still using the dog to herd sheep, he agreed to sell the dog to von Stephanitz. The dog, Hektor Linksrhein, was soon renamed Horand von GrafrathGS puppy by the Captain.  Horand became the first registered German shepherd dog, and he is very much the image of what we think of when we think of the shepherd today. Von Stephanitz formed a Society for the German Shepherd Dog.  He sought out other like-minded dog owners who wanted to breed their dogs with Horand to maintain the traits that the Captain prized in his dog.  Ultimately, Horand produced several offspring, one of whom, Pilot, fathered a total of 84 pups. To the Captain, the most important traits were utility and intelligence. The actual look of the dog was secondary. Foreseeing New Work for the German Shepherd German shepherd puppiesVon Stephanitz also had the foresight to see that as industrialization began to replace the farms across the German countryside, there would be less need for dogs who could herd sheep. With that concern, von Stephanitz set about working with police forces and working dog clubs to develop a set of training techniques that taught the dogs to track by scent and to perform protection duties.  Over time, he succeeded in getting the dogs placed in various branches of government service. During World War I, German shepherds were used as Red Cross dogs, messenger dogs, supply crriers, sentinel, tracking and guard dogs. First German Shepherd Exhibit in U.S. in 1907 IN 1907 some of the German dog owners brought their dogs to the United States to show them.  American were impressed. By 1913 the U.S. had formed its own German Shepherd Dog Club and they began to have German shepherd dog shows. However, change was to come. When the U.S. entered World War I, Americans rejected anything related to Germany.  The American Kennel Club responded by renaming the breed,  Shepherd Dog of America. (In England the breed was re-titled Alsatian.)  There were also efforts to call the dogs  “police dogs,” and while you will still hear that now and then, it really didn’t catch on. Post-World War I The German shepherd had behaved nobly during World War I, and as a result, a good number of soldiers brought dogs home with them, including Lee Duncan who brought over and trained the dog who was to become Rin-Tin-Tin.  Anther German shepherd, Strongheart, also won the hearts of Americans, and soon there was high demand for these dogs. High demand generally leads to a rush-to-breed, and as a result, the strength of the line diminished while puppies were being produced to satisfy demand for them as pets. However, an American in Switzerland, Dorothy Eustis, deserves credit for preserving a line of dogs that was soon to be brought to the United States to contribute good stock to the line.  Eustis had studied the scientific aspects of cattle breeding and later moved to Switzerland where she began breeding German shepherds for the Swiss police. After seeing the Germans use these dogs to guide World War I veterans who had lost their vision from mustard gas used in the war, Eustis soon began a similar training.  These dogs were brought to the United States and brought with them their strong (and protected) genetic makeup for future breedings.  To read about the first dog brought here as a guide dog, see Buddy, The First Seeing Eye Dog. In Germany von Stephanitz was still closely watching the breed and by 1925 he had chosen a new dog to be the model German shepherd.  Klodo von Boxberg was quite different from the dogs that preceded him but maintained high intelligence and a far-reaching gait. Over time, the American and German lines have gone slightly different directions but both lines would fit well with a New York Times 1929 description of the dog: [The German shepherd is …]  a dog noble in aspect and endowed with splendid traits and intelligence and loyalty.”  (The New York Times, December 15, 1929.) Leave a Reply
global_01_local_1_shard_00001926_processed.jsonl/54826
Home » Personalization » Real Space 3D Pro lwp Real Space 3D Pro lwp icon Real Space 3D Pro lwp Ruslan Sokolovsky Realistic fully 3d space environment with amazing space station! The description of Real Space 3D Pro lwp One of the most amazing Space 3D live wallpapers on Google Play for your phone or tablet! Realistic fully 3d space environment will give you illusion what screen of your phone is actually a window of spaceship. Now updated with additional views, so you can enjoy 10 cameras! "Real Space 3d Pro" is included in "Best 3D Live Wallpapers" list of livewallpapers.org ! From users reviews: "The BEST!!!! Don't let ANY OTHER Space lwp distract you...this is the best by far!.." "Awesome! Everyone I show my phone is blown away..." "Amazing work, the cinematic views are Devine..." "Excellent product! This is a true work of art!.." "OMG!!!! Definitely # 1 in space category..." All what you ever wanted from space live wallpaper you will have in "Real Space 3D Pro", stunning futuristic space station, asteroids belt, planets and moons with bunch of customization options! Also "Cinematic Tour" camera is available to take you to short space travel! Choose preferable type of planet: Earth, Venus, Mars, Saturn, Mercury or Jupiter from settings menu. The planets are also fully 3d objects and got even actual terrain features! Please, comment, thanks! Real Space 3D Pro lwp made with OPEN GL 2.0 and optimized to consume low resources and also not to drain your battery. Installation: The main screen (long press) → Live Wallpaper → Real Space 3D Pro lwp Publish Date: September 18, 2014 Latest Version: 1.6 Get it on: Get Real Space 3D Pro lwp on Google Play Requirements: Android 2.2 and up Content Rating: Everyone Installs: 10,000+ Offered By: Ruslan Sokolovsky Similar Or Related
global_01_local_1_shard_00001926_processed.jsonl/54831
Brussels / 4 & 5 February 2017 Optimizing MySQL without SQL or touching my.cnf At Dropbox, with 1000s of machines running MySQL, performance is important. Among other things, out team is responsible for our MySQL servers being tuned well. In this talk, we will talk about the performance impact of “environmental” MySQL tuning, where the tuning is neither at the SQL level (like creating indexes or using different table structures), nor with setting MySQL parameters (tuning parameters like innodbbufferpoolsize or innodblogfilesize even more obscure ones like innodblruscan_depth). Instead, in the talk we will cover the following areas (we won’t limit the talk to these): • Operating system level tuning opportunities • Compiling MySQL: does it worth to build your own from the performance perspective? • Building MySQL with different compilers • Building MySQL with profile-guided optimization • Impact of using different memory allocators • CPU and memory affinity with running multiple instances The experiments we conducted here helped us to make more educated decisions about how to run MySQL at Dropbox. Maxim Bublis
global_01_local_1_shard_00001926_processed.jsonl/54835
RHEL 6 vs RHEL 7 Difference Between Previous and Newer Version 17 Responses 1. rajesh says: I thing there is some features mentioned in rhel6 instead of rhel7…. boot time, filesystem size and processor architecture 2. Jeevan says: Nice ark 3. OMS says: This shows awesome difference 🙂 I appreciate your efforts. 4. Raghu says: Nice but I want to know how to extract and tar 5. Hitender Pal Singh says: seems mistakenly KDE Version, Default Database & Bootloader has been swapped & it needs to be corrected. 6. Chetan says: In the above table looks like the Default DB name has got interchanged Default Database MariaDB MySQL 7. joshua says: good job 8. karthikeyan says: Boot Loader Grub 2 /boot/grub2/grub.cfg Grub 0.97 /boot/grub/grub.conf interchange the above mentioned ……..you are wrongly mentioned 9. sangeethkumar says: its very useful to me. thanks ark 10. Sachin Patil says: Nice Information ARK….it will be very useful. 11. Mukesh says: You job is awesome 12. prafulla says: Nice. This is very useful for us. 13. ruby singh says: really it’s very useful for us and thank’s a lot 14. nikunj says: ak no hai bhai 15. manoj singh says: very good knowledge about 6rhel vs 7rhel 16. manoj singh says: very good knowledge about 6rhel vs 7rhel Leave a Reply
global_01_local_1_shard_00001926_processed.jsonl/54858
E-commerce – How Man and van & Storage Can Help Launch Your Start-Up in London Posted on September 29, 2018 by Lauren May London always has been at the heart of the UK’s business world, with many successful companies having a presence in the capital.No matter what industry you’re looking to start a company in, you’ll find the right partners in London. Due to the economic strength of the city, the domino effect it can have on all businesses is a positive one. If you do your research and play your cards right, you could be one of the many success stories. Read more…
global_01_local_1_shard_00001926_processed.jsonl/54877
From Barotrauma Wiki Jump to: navigation, search Type Tool Fuel N/A Cost 15 Credits The Crowbar is a tool which can be acquired in Barotrauma. Function[edit | edit source] Crowbars can be used to force-open locked doors and hatches, similarly to the Plasma Cutter. Unlike plasma cutters, crowbars are much faster and won't destroy the doors upon opening, but are unable to un-seal doors which are welded shut. They can also be used as weapons. Usage[edit | edit source] The crowbar requires both hands to be held, once equipped the player can press the right-click (mouse 2) button on a door and wait for it to open, same goes for hatches. To attack with the crowbar hold the right-click (mouse 2) button. Left-clicking (mouse 1) will then swing the crowbar. Damage Values[edit | edit source] Item Attack Damage Structure Damage Stun Damage Damage Type Crowbar 20 Item Crowbar Attack Damage 20 Structure Damage 10 Stun Damage 0.6 Damage Type Blunt Cooldown {{{cooldown}}}|}} Gallery[edit | edit source]
global_01_local_1_shard_00001926_processed.jsonl/54881
Why Hire A Dog Walker? Dog Walkers do much more than provide a pet with exercise while their guardian is away from home. All dogs require exercise to remain healthy, and the amount needed depends largely on their breed, size and age. In general, all dogs require at least one to two hours per day, however,… read more →
global_01_local_1_shard_00001926_processed.jsonl/54897
Objects that appear in the mirror are closer than they appear The phrase “objects in the mirror are closer than they appear” is a safety warning that is required to be engraved on passenger’s side mirror of motor vehicles. Most of us are aware of this safety warning. But what is this safety warning got to do with the Bible or our lives? Sounds strange and absurd isn’t it? Well, dear brothers and sisters let us not forget that God’s word is like a mirror- (James 1:23-24.) While we use a mirror to assess our external appearance and flaws, so must we use God’s word (mirror) to evaluate ourselves, for it is in His word shall we see a reflection of our inner being. It is no secret that there is power in His word. God is above the dimension of time and therefore His word shall not pass away with time. And so the bible is a love story, where God and omnipresence through out the story reflects His agape love for His creation. Relating His presence to the object that appears in the mirror, God is very clear about His children and their struggles being covered by His inextinguishable power, a source that will never fail us. This is the kind of assurance we all need to feel during our trials and this assurance is ever present as God is aware of everything we go through and He is closer to our hearts than He appears. All we have to do is remain in Him and His word. 1. Ms. Vinothini 28 Sep 2018 12:50:05 Reply This daily message is a strengthening and motivating words for my day to day life 2. Ragini 28 Sep 2018 13:04:37 Reply Glory to God who doesn’t give up or leave or discard broken things !!! His goodness and faithfulness is amazing… Leave a Comment
global_01_local_1_shard_00001926_processed.jsonl/54906
BLACKkKLANSMAN Review: Re-Birth Of A Nation Spike Lee's buddy cop comedy is riotously funny, and may also cause a riot. BlacKkKlansman is bookended by images of American Civil War. In fact, the first shot we see isn't even composed by director Spike Lee. Rather, it’s re-used imagery from Gone With the Wind, as Victor Fleming's camera continues to pull back over the battlefield of Atlanta, until a giant, flapping Confederate flag takes up the majority of the frame. To reveal the latter would be doing virgin viewers a disservice, but the same symbol of Southern pride is glimpsed several times over in Klansman’s climactic non-fiction footage of atrocity, as Lee is not only clearly illustrating how little has changed since the 1800s, but also how things may have gotten worse in the near 80 years that transpired between the two pieces of filmmaking.  Pop filmmaking – and how it can be subverted – is a major theme of Lee's latest: a comedy based on "some fo' real fo' real shit", where Colorado Springs detective Ron Stallworth (John David Washington) goes undercover inside the Ku Klux Klan, that’s using a rather recognizable cinematic formula (the buddy cop comedy) to essentially indict a sitting president of out and out bigotry. While Gone With the Wind is initially cited, D.W. Griffith's Birth of a Nation makes several recurring appearances as Stallworth – aided by his Jewish "white half", Philip 'Flip' Zimmerman (Adam Driver) – climbs the ranks of the white power organization and even befriends its Grand Wizard (excuse me, "National Director"), David Duke (played with smarmy hilarity by Topher Grace).  ​In typical Lee fashion, though BlacKkKlansman may be the Brooklyn auteur’s most accessible movie since ‘06's Inside Man – another piece of straight up pulp that smuggled subversive themes regarding America's financial and policing institutions – it's also his most radical since possibly Do the Right Thing. In essence, Lee is offering up the antithesis to Gone With the Wind and Birth of a Nation; two pictures that romanticized slavery, with Griffith's silent landmark being credited by the Klan as a motivator for the hate group's inception. Had BlacKkKlansman been titled Re-Birth of a Nation, it would probably be just as apt, as it's practically a call to arms against those who align themselves with the intolerant, a dog whistle for anti-fascist strikes against the cold, prejudiced heart that currently powers America.  Yet while all that sounds incredibly heavy – and Lee’s movie certainly hits an emotional apex that’s downright paralyzing in its power – BlacKkKlansman is often side-splittingly funny. From the moment we're subjected to a piece of Klan propaganda in the process of being filmed (hosted by Alec Baldwin, profanely flubbing lines like Bill O'Reilly on Inside Edition), Lee and co-screenwriters David Rabinowitz, Charlie Wachtel, and Kevin Wilmott are stuffing almost every scene full of ridiculous verbal and sight gags. Tonal shifts have forever been a hallmark of Lee's filmography, but he may employ them to their greatest effect with BlacKkKlansman. By the time the movie stops to consider the gravity of its "truth is stranger than fiction" recounting of this '70s sting, we’ve been disarmed just enough to let him bring the hammer down. From the "white voice" Washington employs when speaking with his blue uniformed compatriots, to the dumfounding levels of idiocy his redneck vectors display (I, Tonya's Paul Walter Hauser again exhibiting a knack for utter buffoonery), Lee is fully embracing the opportunities for satire his seemingly insane set up presents.  As good as Washington is as the afro'd leader of this covert operation – having to internalize a great deal of abuse he receives from his fellow officers and then toss it back with a series of stoic stares – Driver is the not-so-secret MVP of BlacKkKlansman. His Flip Zimmerman is a man who approaches the current scenario like he would any other investigation: busting the KKK means no more or less to him than ensaring a drug or prostitution ring. When Stallworth confronts Flip about him acting like he doesn't "have skin in the game", the senior detective literally states that he's never considered himself an outsider or target of hate due to his own Judaism. But as the movie trucks along, it becomes clear that having to slip under the hood of these venomous monsters is making him confront his own heritage, and what it means to others. "Before, I'd never thought about it, now I can't stop thinking about," Flip says about his faith, before trailing off with, "these rituals..." In an instant, Driver lets us recognize a man grappling with his own soul, placing another stick of emotional dynamite under each seat in the auditorium. Aesthetically, BlacKkKlansman showcases Lee's usual "family affair" method of assembling a crew, unifying the movie’s visuals and sonics with the rest of his outstanding body of work. Pass Over cinematographer Chayse Irvin – who also shot Beyonce's stunning musical Lemonade – mixes together a hodgepodge of digital, three-perf 35mm and blown out 16mm to create an almost disorienting tableau of cinematic styles, slyly acknowledging the past along with Spike's racist reference points via its patchwork of modern and antiquated photographic mediums. Regular Spike composer Terence Blanchard's tunes are jazzy and smooth, sounding like a lost soundtrack to a '70s cop serial we've never seen. All the while, Spike employs his usual thumbprints – harsh overhead lighting, skewed close ups, and yes even a "dolly ride" at the end – to ensure there's no mistaking BlacKkKlansman for another artist’s work.  In fact, BlacKkKlansman may be the most punch drunk in love with cinema piece of filmmaking we've gotten from Lee in a long while; his images practically jump off the screen at times. A black power movement is intercut with montages of enraptured African-American faces, staring up at speaker Kwame Ture (Corey Hawkins) as he spits hot fire into the crowd. A sequence where Stallworth finds himself falling for student union activist Patrice (Laura Harrier) is joyous in its ability to capture the rhythm of '70s soul through a collection of dancers on the floor. Even the comedic bits absolutely pop and sing, as you can tell Lee’s invigorated by the material, and totally invested in letting the audience explore just how audacious the tale he's telling truly is.  None of this is to say that there aren't flaws contained in Lee's latest. A "race the clock" climax is a touch, well, anticlimactic, and a few moments near the end feel like they were included without any real set up (a separate sting where Stallworth ensnares a bigoted, antagonistic colleague kind of comes out of nowhere). Nevertheless, to focus on the slight missteps the movie makes seems like a "forest for the trees" approach to viewing BlacKkKlansman. This is fiery, inciteful mainstream filmmaking, looking to rile an audience up who's tired of the status quo and being ostensibly powerless to stop the current administration's campaign of hatred. Just as Stallworth is baptized in the flames of his first operation, we've been subjected to a new torrent of bigotry, and must be reborn enraged and ready to take down those who've operated with impunity for far to long. One of the last images we see before Lee wraps up BlacKkKlansman with a montage that relates its period pulp to the current era is the glorious reflection of a burning cross in a Klan member's eye, reminding us that these racists shouldn't be allowed to marvel at their cowardly acts any longer. Brothers and sisters, it's time for a revolution. BlacKkKlansman is in theaters now.
global_01_local_1_shard_00001926_processed.jsonl/54930
Plug and PlayI’ve been following the Database War Stories of O’Reilly Radar: how companies use text-based alternatives to classic relational database systems in order to cope with huge volumes. Check out the stories of Findory/Amazon, Google File System, Flickr and Second Life. Anyway, this seemed like a good moment to share some of my database war stories. Let me take you back to the early nineties. 1993 @ Ukkel I arrive at Sopres, one of the larger direct marketing / database management companies in Belgium. Fresh from university (and 1 year of military service), I expect to see RDBMS everywhere and dive into SQL. Imagine my surprise when I see that, yes, there are a lot of Sybase SQLServer databases around, but the bulk of the work is done with something they call ‘square files’ (see below). They have built a whole set of tools to work with those and by using them myself, I learn to appreciate the advantanges of the system (speed, mainly) and grow a fairly accurate intuition for things like queries, indexes and outer joins. Square files What is a square file – or as we called it in French: “fichier carré“? It is a plain-text file with fixed record length. It looks square (actually: rather rectangular) when you open it in a text editor. E.g. a file XYZ2006.288, containing 20.000 customer records of each 288 bytes, would be exactly 5.760.000 bytes (5,76 MB). If the file was called XYZ2006.customers, each program that processed such a file would look for a ‘descriptor’ file in the same folder customers.d that would not only indicate the record length (288 bytes) but also define the fields within a record (e.g. fullname: 40 bytes, address: 60 bytes, postal code: 4 bytes, …). To make the square file easy editable, the last field could be “LF: 1 byte” that contains a line feed, so that each record is on a new line. The advantage of this system: • random access: record #13455 starts at byte 3874753. If you would use a variable-length record (like comma-separated-values/CSV for instance) you would have to count through 13454 linefeeds first. • human-readable: you could just throw any file into vi or another text-editor and browse through the contents. You could also process contents with standard tools like grep (text-search) or tail (last # lines). • separate data and metadata: it’s a bit harder to manage, but it’s easier to work with. A data file with 1000 records has a byte count that ends with ‘000’, or something is wrong. • no (primary) index: the records in a square file have a certain order and if it’s the wrong one, sort them on whatever you want. Working with these files, you quickly understand that a sort is an expensive operation and where you can economize for speed. The sp-tools Looks like a bug Through the years they has also developed a set of tools to work with square files. They all started with ‘sp’, hence the “sp-tools”. I quickly realised they had an alternative for each SQL statement you could make: • sp-sort: sort a file on certain fields (ascending/descending, number sort, unique records) • sp-merge: merge two files sorted on the same fields and get a sorted result • sp-query: select only records that qualify a certain query • sp-expr: add fields to an existing file and fill them with a expression of existing fields, record number, conitional values … The most interesting tool was sp-match, that was used to do joins: merge the contents of two files by matching on certain fields. E.g. you have a table of purchases (customer_id, date, amount) and you want to add the postal-code from the customers file: you match on customer_id and get (customer_id,date_amount,postal-code) as output. Using this tool and its variants (sorted/non-sorted match table, inner/outer/left outer) really taught me how joins work, what has to be sorted (indexed), what has to be in memory or on disk, and that is still the basis of my intuitive SQL optimisation skills. We basically did by hand all the stuff that SQL does behind the scenes. Disk space Watch that tape spin We were working on Sun ‘dumb’ workstations and on our servers we had an enormous disk capacity at that time: several GIGABYTES! Hard disk sizes were still measured in megabytes back then. I remember a discussion on whether to buy one ‘huge’ 500MB disk or rather ten 50MB disks, because the last option would be more expensive, but faster (divided over multiple disk controllers). A typical project required up to 100MB storage space (*gasp*) so all temporary files had to be cleaned up ASAP. That’s why there was a system of max-age suffixes: a file that was called would be automatically deleted after 5 days. “.2t” after 2 days. If you left large files sitting around without .Nt suffix, you got spanked when they detected it in the weekly storage report. The output of our work would be delivered on floppy disks, if it was smaller than 1.4MB or else on tape. I’m not talking DLT or DAT here, I mean tapes on spindles, the real thing. No email, no USB-sticks, no ZIP-drives, no CD-ROMs. Those were the days.
global_01_local_1_shard_00001926_processed.jsonl/54931
Storing Images in a PowerBI/Analysis Services Data Models As some of you probably remember, when PowerPivot was still only available in Excel and Power Query did not yet exist, it was possible to load images from a database (binary column) directly into the data model and display them in PowerView. Unfortunately, this feature did not work anymore in PowerBI Desktop and the only way to display images in a visual was to provide the URL of the image which is public accessible. The visual would then grab the image on-the-fly from the URL and render it. This of course has various drawbacks: • The image needs to be available via a public URL (e.g. upload it first to an Azure Blob Store) • The image cannot be displayed when you are offline • The link may break in the future or point to a different image as initially when the model was built There is also a  feedback items about this issue which I encourage you to vote for: Until today I was sure that we have to live with this limitation but then I came across this blog post from Jason Thomas aka SqlJason. He shows a workaround to store images directly in the PowerBI data model and display them in the report as if they were regular images loaded from an URL. This is pretty awesome and I have to dedicate at least 99.9% of this blog post to Jason and his solution! However, with this blog post I would like to take Jasons’ approach a step further. He creates the Base64 string externally and hardcodes it in the model using DAX. This has some advantages (static image, no external dependency anymore, …) but also a lot of disadvantages (externally create the Base64 string, manually copy&paste the Base64 string for each image, hard to maintain, cannot dynamically add images …). For scenarios where you have a local folder with images, a set of [private] URLs pointing to images or images stored in a SQL table (as binary) which you want to load into your PowerBI data model, this whole process should be automated and ideally done within PowerBI. Fortunately, this turns out to be quite simple! Power Query provides a native function to convert any binary to a Base64 encoded string: Binary.ToText() . The important part to point out here is to use the second parameter which allows you to set the encoding of the resulting text. It supports two values: BinaryEncoding.Base64 (default) and BinaryEncoding.Hex. Once we have the Base64 string, we simply need to prefix it with the following meta data: “data:image/jpeg;base64, “ To make it easy, I wrote to two custom PowerQuery functions which convert and URL or a binary image to the appropriate string which can be used by PowerBI: Function: UrlToPbiImage 1. let 2.     UrlToImage = (ImageUrl as text) as text => 3. let 4.     BinaryContent = Web.Contents(ImageUrl), 5.     Base64 = "data:image/jpeg;base64, " & Binary.ToText(BinaryContent, BinaryEncoding.Base64) 6. in 7.     Base64 8. in 9.     UrlToImage Function: BinaryToPbiImage 1. let 2.     BinaryToPbiImage = (BinaryContent as binary) as text=> 3. let 5. in 6.     Base64 7. in 8.     BinaryToPbiImage If your images reside in a local folder, you can simply load them using the “Folder” data source. This will give you a list of all images and and their binary content as separate column. Next add a new Custom Column where you call the above function to convert the binary to a prefixed Base64 string which can then be displayed in PowerBI (or Analysis Services) as a regular image. Just make sure to also set the Data Category of the column to “Image URL”:PowerBI_Image_URL_Base64 And that’s it, now your visual will display the image stored in the data model without having to access any external resources! Caution: As Jason also mentions at the end of his blog post, there is an internal limitation about the size of a text column. So this may cause issues when you try to load high-resolution images! In this case, simply lower the size/quality of the images before you load them. Download: StoreImageInPbiModel.pbix This PowerBI Desktop model contains all samples from above including the PowerQuery functions!
global_01_local_1_shard_00001926_processed.jsonl/54943
fail2ban Centos 7 with firewalld How to install Fail2Ban on CentOS 7 Most Linux servers offer an SSH login via Port 22 for remote administration purposes. This port is a well-known port, therefore, it is often attacked by brute force attacks. Fail2ban is a software that scans log files for brute force login attempts in real-time and bans the attackers with firewalld or iptables. Fail2ban recognizes unwanted access or security breach efforts to the server within the administrator set time frame and blocks the IP addresses which show signs of brute force attacks or dictionary attacks. This program works in the background and continuously scans the log files for unusual login patterns and security breach attempts. This tutorial shows the installation and configuration of Fail2Ban with firewalld on CentOS 7. Installing Fail2Ban To install Fail2Ban on CentOS 7, we will have to install EPEL (Extra Packages for Enterprise Linux) repository first. EPEL contains additional packages for all CentOS versions, one of these additional packages is Fail2Ban. The following commands must be executed after switching to the root user. yum install epel-release yum install fail2ban fail2ban-systemd If you have SELinux installed, then update the SELinux policies: yum update -y selinux-policy* Configure settings for Fail2Ban Once installed, we will have to configure and customize the software with a jail.local configuration file. The jail.local file overrides the jail.conf file and is used to make your custom configuration update safe. Make a copy of the jail.conf file and save it with the name jail.local: cp -pf /etc/fail2ban/jail.conf /etc/fail2ban/jail.local Open the jail.local file for editing in Nano with the following command. nano /etc/fail2ban/jail.local The file code may consist of many lines of codes which execute to prevent a ban on one or many IP addresses, set bantime duration, etc. A typical jail configuration file contains the following lines. # "ignoreip" can be an IP address, a CIDR mask or a DNS host. Fail2ban will not # ban a host which matches an address in this list. Several addresses can be # defined using space separator. ignoreip = # External command that will take an tagged arguments to ignore, e.g. <ip>, # and return true if the IP is to be ignored. False otherwise. # ignorecommand = /path/to/command <ip> ignorecommand = bantime = 600 # seconds. findtime = 600 maxretry = 5 Ignoreip is used to set the list of IPs which will not be banned. The list of IP addresses should be given with a space separator. This parameter is used to set your personal IP address (if you access the server from a fixed IP). Bantime parameter is used to set the duration of seconds for which a host needs to be banned. Findtime is the parameter which is used to check if a host must be banned or not. When the host generates maxrety in its last findtime, it is banned. Maxretry is the parameter used to set the limit for the number of retry’s by a host, upon exceeding this limit, the host is banned. Add a jail file to protect SSH. Create a new file with the Nano editor nano /etc/fail2ban/jail.d/sshd.local To the above file, add the following lines of code. enabled = true port = ssh action = firewallcmd-ipset logpath = %(sshd_log)s maxretry = 5 bantime = 86400 Parameter enabled is set to true, in order to provide protection, to deactivate protection, it is set to false. The filter parameter checks the sshd configuration file, located in the path /etc/fail2ban/filter.d/sshd.conf. The parameter action is used to derive the IP address which needs to be banned using the filter available from /etc/fail2ban/action.d/firewallcmd-ipset.conf. Port parameter may be changed to a new value such as port=1212, as is the case. When using port 22, there is no need to change this parameter. Logpath provides the path where the log file is stored. This log file is scanned by Fail2Ban. Maxretry is used to set the maximum limit for failed login entries. Running Fail2Ban service When you are not running the CentOS Firewall yet, then start it: systemctl enable firewalld systemctl start firewalld Execute the following lines of command to run the protective Fail2Ban software on the server. systemctl enable fail2ban systemctl start fail2ban Tracking Failed login entries The following command is used to check whether there had been failed attempts to login to sever via ssh port. cat /var/log/secure | grep ‘Failed password’ Executing above command will get a list of failed root password attempts from different IP addresses. The format of results will be similar to the one showed below: Fer 8 12:41:12 htf sshd[5487]: Failed password for root from port 23021 ssh2 Fer 8 12:41:15 htf sshd[1254]: Failed password for root from port 15486 ssh2 Fer 8 12:41:16 htf sshd[1254]: Failed password for root from port 24457 ssh2 Fer 8 12:41:18 htf sshd[1254]: Failed password for root from port 24457 ssh2 Checking the banned IPs by Fail2Ban The following command is used to get a list of banned IP addresses which were recognized as brute force threats. iptables -L -n Check the Fal2Ban Status Use the following command to check the status of the Fail2Ban jails: fail2ban-client status The result should be similar to this: [root@htf ]# fail2ban-client status |- Number of jail: 1 `- Jail list: sshd Unbanning an IP address In order to remove an IP address from the banned list, parameter IPADDRESS is set to appropriate IP which needs unbanning. The name “sshd” is the name of the jail, in this case the “sshd” jail that we configured above. The following command does the job. fail2ban-client set sshd unbanip IPADDRESS
global_01_local_1_shard_00001926_processed.jsonl/54959
Explore BrainMass World wide web Can you help me get started with this assignment? 1. Explain how using the World Wide Web might make the budgeting process more efficient for a multinational company. 2. Management by exception is a technique used to effectively identify and investigate variances in operating environment. There are no firm guidelines that direct managers as to which variances they should investigate. Instead, managers are expected to identify variances that are significant and in need of explanation. 1. Develop a "rule of thumb" that managers might follow to decide on which variances to investigate. 2. Discuss how managers in the company you work for use management by exception to improve efficiency. (Please provide cite of references). © BrainMass Inc. brainmass.com October 25, 2018, 2:56 am ad1c9bdddf Solution Preview Hello. I provide the following to assist you. 1. Using the World Wide Web can help making the budgeting process more efficient for a multinational company as it will allow said company to reach a number of prospective customers via a vast market, such as the World Wide Web at a more efficient cost. Many companies can utilize the web to advertise its products, either via Google searches or through banner advertisements. Although banner advertisements can be a bit more costly than other forms of advertisements, these advertisements can reach a large target audience, if used effectively. Furthermore, multinational companies may have difficulty using direct advertising in countries that they do not have an office based in. Therefore, the World Wide Web is much more cost effective then sending out advertisements via mail or other forms of advertisement. Furthermore, the World Wide Web is an effective tool for multinational companies as it will allow them to trade globally. Previous to the web, multinational companies may not have had options to reach consumers of different marketing areas. The introduction of web allows a business to reach millions. The competition required from the web has also "sped up the growth of new technological development". Because of this, there companies are coming up with ways to ensure that their websites are "more user-friendly". Companies should consider an "e commerce web design" as it will allow a more user friendly option for the companies. An e-commerce website will allow the multinational companies the following: "Easy product upload; ... Solution Summary This solution provides a detailed explanation of using the World Wide Web can make the budeting process of a multinational company more efficient. See Also This Related BrainMass Solution What is the significance of the TCP/IP protocol in the ubiquitous e-commerce world we are entering? What is the significance of the TCP/IP protocol in the ubiquitous e-commerce world we are entering? Please give me a short discussion. View Full Posting Details
global_01_local_1_shard_00001926_processed.jsonl/54971
Marcella Durand           Metaphor Exchange           The sea can be as milk           but milk can never be as the sea, nor can wine.           The salt of sea would not serve           in milk or wine, but even more so,           milk and wine indicate one sort of           state and color (despite wine’s own           living properties that might make it           like ruby or plum) while the sea           is, as so many artists have depicted,           so many aspects, complexities: again,           as silver, as glass, as metal, as glinting,           as treacherous, as calm, as yellow           or translucent green as in a Turner           or as in a Celmins, thousands of pencilled           grey waves each slightly different yet similar           enough to create a visual coherence of sea:           a meditative thing of infinite elements           a complexity of extensive existence;           a thing that drops off the ends           of the earth, that extends through the core           of the planet to reach the other side, that           at its depths is a blue so impossible as to           be black, inhabited by luminous creatures           who do not see red, red light wave lengths           lost in pressure and distance, and past that,           vents of fresh earth crust in which more creatures           live, feeding off extremes of heat and pressure,           and still a thing that washes this planet, makes us           unique, unlike anything else, not gas spinning           into rings of dust relentlessly blown into           again red, a red haze surrounding the           sphere—instead it makes us deep blue           and streaky and many colors edging           blue, dominance of ever-shifting blue,           most fragile of colors, fading and reappearing           from black to silver to milk, wine. What           could be similar to this? Universe as           sea? From our perspective, do stars shift           in such complex interaction to change from           second to minute? Sky again may not contain           such active composition of so many dimensions,           though sea imitates sky and in that way, sky           leads in color and depthless stability within           seconds of change. From here, it may be hard           to tell if life is equivalent metaphor—what           seems discernably variable to me may in           more distant unfamiliarity seem as symmetrical           as an ocean-full of waves. So what is sea’s           equivalent metaphor if not to itself? What           is at least somewhat like another? Where           in the distance between one and the other is           the interaction of complex vibrancy edging into beauty? The Prospect The prospect has several meanings: the first, and first because it was the first use of the word that sparked my interest in the word, via Raymond Williams: “…the view, the ordered propriety repose, the prospect…” The prospect is the view from mansorial windows: the visually apprehended declaration of this view is mine, the sweep of green lawn, the formal gardens, the topiary, and further on, the forest, the woods. The line of wilderness on the horizon. From which poachers have been evicted. Here is a drawing of the poacher’s construction: The fox looks and longs, one paw rests on the beginning of its capture I couldn’t find a drawing of the poacher inside the cage s/he constructed Before enclosure and perhaps leading to its concept, Lorenz Stoer conceived the landscape as background to abstract geometrical shapes: within these shapes we wander on a baked landscape against which we create amazing, beautiful structures as practical as cages or abstract as chevrons, triangles and motifs secretive as secret meanings or secret profits, secrets to be made secret stars, secret three-dimensional platforms carved ivy over the real ivy plastic plants almost so much like the real plants they have even started adding brown leaves and small flies that hatch in soil to hatch in plastic, now hatch plastic In John Clare’s day, the commons was laid claim to. The common land of the people was taken and enclosed. The commons was claimed and closed. John Clare wrote to himself as a child as a witness to enclosure. His was the first recorded case of “ecodepression.” To John Clare by John Clare                                                          Well, honest John, how fare you now at home?                  The spring is come, and birds are building nests;                  The old cock-robin to the sty is come,                  With olive feathers and its ruddy breast;                  And the old cock, with wattles and red comb,                  Struts with the hens, and seems to like some best,                  Then crows, and looks about for little crumbs,                  Swept out by little folks an hour ago;                  The pigs sleep in the sty; the bookman comes—                  The little boy lets home-close nesting go,                  And pockets tops and taws, where daisies blow,                  To look at the new number just laid down,                  With lots of pictures, and good stories too,                  And Jack the Giant-killer’s high renown. Now that he has been dead for more than 50 years, his work is in the commons. I can include it; I can rewrite it to myself. To Marcella Durand by Marcella Durand                                Well, honest Marcella, how fare you now at home?                  My view is of a bridge over water: I swear the world                  has sped up. I write not to myself because who am I                  but to you in the past dear John Clare a poet like myself                  who is looking at a bridge that maybe you would                  have been horrified or impressed by. A musician named                  Sonny Rollins—see, if I were writing to myself I would not                  be explaining that to myself—a musician named Sonny                  Rollins treated the view from this bridge as a composition                  sheet: he read the city lights (because now not only are                  we electrified but we are everything electric) as musical                  notes and from that found melodies, that is what it is like                  to make art from the environment around me. Making                  a composition from the city of others that is about me. Earth’s Horizon Translated from Michèle Métail’s “Les Horizons du sol” Marcella Durand Marcella Durand's most recent books are Rays of the Shadow (Tent Editions, 2017) and Le Jardin de M. (The Garden of M.), with French translations by Olivier Brossard (joca seria, 2016).
global_01_local_1_shard_00001926_processed.jsonl/54974
A space is more than surface, it’s a place, a feeling. Unity and coherence are created by aligning, subtracting and detailing, in every detail one can see the whole. Sustainable, natural and honest materials, refined detailing, perception of space, perspectives and lots of light are the basis of every project. We are interested in the whole approach, from early concept, over the small detail until the final execution. Spaciousness, circulation, light perception and perspective forming the core of every design, durability and energy efficiency are obvious.
global_01_local_1_shard_00001926_processed.jsonl/55011
Master Grief Coaching Module One time fee. PDF module and editable forms. Debit or credit is processed securely by PayPal, even without creating a PayPal account. Prerequisite: This module teaches you how to use the knowledge in the “Understanding Grief and Healing” module to support grievers. None for those who just want to understand coaching. Audience: Those wanting to learn an effective way to support grievers where they can work anywhere, to enhance what is already offered to those they interact with in their career, or to be empowered to coach themselves. Objective: To teach how to provide information about grief and remove limiting beliefs that may block healing by supporting people who are grieving to achieve their goals in a way that best works for them. You will learn: • A description of Master Grief Coaching. • How to provide exceptional client service. • Why leadership is important as a coach. • How to handle religion, spirituality, and politics when coaching. • Different formats to connect with clients for coaching. • How to prepare for client interactions. • The flow of new client contacts and client sessions. • Example wording to use for sessions and in common client situations. • Recommendations on how to be a successful coach. • How to take care of yourself to avoid compassion fatigue. Editable Forms included: • Sessions Greatest Lessons Summary • Client Session Guide Editable Resources Included: • Client Service Case Study • Example Appointment Reminder • Example Phrasing • Example Receipt • Example Voicemail Message Script Leave a Reply
global_01_local_1_shard_00001926_processed.jsonl/55049
Her Dance Copyright © Shantanu Baruah 1. This takes me back to my childhood days of dancing in the rain! As a bonus, it’s pouring buckets outside as I read this! 😄 Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/55055
Dear Feminists: Cleric Defines Which Women Can Be Raped – What Time’s Your Protest? Written by K. Walker on February 28, 2018 You’d think more voices on the LEFT would be speaking in defense of these women… what could POSSIBLY explain their silence? In the name of her religion, she is defending the practice of holding female sex slaves. (It takes less than three minutes to watch.) The opening of the clip names the theology professor, and also where she teaches. Not only is this Professor defending this practice as ‘lawful’, she is saying that HER religion (have you guessed which one yet?) has IMPROVED general society by establishing specific rules about who may (and who may not) be captured and used as sex slaves. Trending: WATCH: Michelle Obama Tries To Dance In Public – She’s No Ginger Rogers She specifically mentions Jews as a legitimate target for this practice. (Does this surprise you?) [That 50-second mark is particularly instructive. And chilling.] She excludes freeborn girls from, say, east Asia from being taken into the home as an additional victim ‘wife’ for the ‘man’ of the house. She calls this practice ‘nonsense’. Because they were not ‘at war’ with [her religion]. But if you capture a woman in war? She’s yours. And you can vent your lust upon her. No problem. Because this is a book that establishes a ‘just’ society. Or something. So, Feminists. Time to choose. Will you speak up for the women who are explicitly designated as ‘lawful’ prey for such men? (Among so many other ACTUAL ‘Patriarchic’ and systematic abuses of women.) Or are you afraid doing so will label you a ‘bigot’. Can your thin skin handle a little name calling? We hear so much about your ‘courage’. About your ‘activism’ for social change. Time to put up or shut up.’s, Editor-In-Chief, Doug Giles how-to book: Raising Righteous & Rowdy Girls What is driving them so berzerk? Looks like we’ve found an answer: That’s the ladies’ version. You can get it here. Don’t worry. There’s one for the guys, too. You can get the guy’s version here. Share with a feminist that you know and ask her what she thinks of this practice Join the conversation!
global_01_local_1_shard_00001926_processed.jsonl/55058
Searching for apartments with Paid Utilities in Corpus Christi, TX? Apartments with Paid Utilities are easy to find on Corpus Electricity. The search tools by Compare Electricity Companies combine Corpus Christi apartment listings from multiple sources in one easy to use website. You can save time and speed the process of finding your Electric Company Rates for your needs in Corpus Christi, Texas. Corpus Christi energy consumers are located in the Electricity Companies Texas Central transmission and distribution service provider (TDSP) area. Residents and business owners within the Electricity Companies Texas Central area should immediately report an outage or service request to Electricity Companies. Typically, poles and wires damaged by severe storms take more time to repair. Electricity Companies Texas Central customers who want to receive updates on outages and estimated repair times can enroll in a text message or email alert program. For immediate electrical help, Corpus Christi residents and business owners should first call the following number.
global_01_local_1_shard_00001926_processed.jsonl/55064
Clocks. Time. NTP. Plan9. 9front Found a decent note on how to setup NTP on Plan9 on the bottom of that page: Last, but not the least, you may also want to edit/change the TIMESYNCARGS in your /rc/bin/termrc or /rc/bin/cpurc; for example, to use an NTP service, set it to: and reboot. There is a command aux/timesync that is start from /rc/bin/termrc  It takes a DNS name of a time server as an argument.  If you modify the value set as default and reboot you should be good. I ran it from the command line as a test and it worked term% aux/timesync -n Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/55078
The Brave and the Bold #16 Writer: Mark Waid Publisher: DC Comics Release Date: August 20, 2008 Critic Reviews: 2 8.1Critic Rating N/AUser Rating • 10 Comics Bulletin - E.H. Jones Sep 12, 2008 Fun without camp. How often do you see that? If you didnt pick up this book, you need to go get it. Read Full Review • 6.3 IGN - Richard George Aug 20, 2008 Team-up stories are a fact of life in superhero comics. However without a reasonable (or entertaining - see Superman/Batman #51) storyline to justify them, I'm not a fan. Brave and the Bold is the most formulaic and dull way of forcing team-ups to happen, and the results prove that isn't a suitable method. This is a case where the concept, not the talent, is hindering a series. Read Full Review Be the first to rate this issue! Reviews for the Week of...
global_01_local_1_shard_00001926_processed.jsonl/55085
problems discuss problems Au pair left without giving any notice - is this normal? a friend of mine in the past a bad experience with an Australian au-pair which, without giving them any notice, moved away from their house just leaving behind herself a short note where she adduced unspecified "serious reasons" for which she was forced to leave.. (she suspects the girl just found another family in a "cooler" place than the small village where they live in Tuscany)  Is that normal? 1 Answerslatest answer: 2 years ago 941 views Filter answers Answered by Dear Family Italy, Though Italy has not an official au-pair contract, it has subscribed the European agreement on au-pair placement, according to it, when parties have not specified the duration of the contract this can be terminated by either party with a two weeks notice; only in case of serious misconduct by the other party, or if other serious circumstances occur the contract can be terminated with immediate effect. Any circumstance other than this should be considered out of the binding contract terms, and therefore, to answer your question, unnormal. Hope this has helped you solve your doubts, in any case, please do not hesitate to submit to us or to the community your questions. send cancel Thank you for reporting this answer We will check your report and block the answer if applicable.
global_01_local_1_shard_00001926_processed.jsonl/55094
Skip to main content Article thumbnail Location of Repository Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm By Julie Greensmith, Uwe Aickelin and Gianni Tedesco Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they\ud perform information fusion which directs immune responses. We have derived a Dendritic Cell Algorithm based on\ud the functionality of these cells, by modelling the biological signals and differentiation pathways to build a control mechanism for an artificial immune system. We present algorithmic details in addition to experimental results, when the algorithm was applied to anomaly detection for the detection of port scans. The results show the Dendritic Cell Algorithm is successful at detecting port scans OAI identifier: Provided by: Nottingham ePrints Suggested articles 1. (2003). A role for immunology in ”next generation” robot controllers. 2. (1998). An innate sense of danger. 3. (2004). An innately interesting decade of research in immunology. 4. (1989). Approaching the asymptote? evolution and revolution in immunology. 5. (2000). Architecture for an artificial immune system. 6. (2006). Articulation and clarification of the dendritic cell algorithm. 7. (2006). Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm. 8. (2003). Danger theory: The link between ais and ids. 9. (2004). Death by design: apoptosis, necrosis and autophagy. 10. (2002). Decoding the patterns of self and nonself by the innate immune system. 11. (2006). Dendritic cells for anomaly detection. 12. (2004). Dendritic cells: the immune information management experts. 13. (2002). Early detection of internet worm activity by metering icmp destination unreachable messages. 14. (1997). Emerald: Event monitoring enabling responses to anomalous live disturbances. 15. (2004). Fast detection of scanning worm infections. 16. (1996). Grids: A graph-based intrusion detection system for large networks. 17. (2002). Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? Trends in Immunology, 18. (2005). Immunobiology:the immune system in health and disease. Garland Science Publishing, 6th edition edition, 19. (2007). Integrated Innate and Adaptive Artificial Immune Systems Applied to Process Anomaly Detection. 20. (2005). Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. 21. (2006). libtissue - implementing innate immunity. 22. (2007). Mechanisms of apoptosis induced dc suppression. Submitted to the Journal of Immunology, 23. (2002). Practical automated detection of stealthy portscans. 24. (1999). Snort - lightweight intrusion detection for networks. 25. (2004). Stopping spam by extrusion detection. In 26. (2004). Tending Adam’s Garden : Evolving the Cognitive Immune Self. 27. (2002). The danger model: A renewed sense of self. 28. (2007). The Dendritic Cell Algorithm. 29. (1994). Tolerance, danger and the extended family. 30. (2005). Towards a conceptual framework for innate immunity. 31. (2005). Two ways to grow tissue for artificial immune systems.
global_01_local_1_shard_00001926_processed.jsonl/55113
Delaying Validation in bound XAML fields until after initial user interaction? Delaying Validation in bound XAML fields until after initial user interaction? Old forum URL: djcohen66 posted on Thursday, August 05, 2010 I am looking for a decent solution to a model validation/display issue in an MVVM implementation of CSLA using Silverlight. We have built a simple model with fields like so:         private static PropertyInfo<string> UsernameProperty = RegisterProperty<string>(c => c.Username);         [Display(Description = "Username")]         [Required(ErrorMessage = "Username required")]         public string Username             get { return GetProperty(UsernameProperty); }             set { SetProperty(UsernameProperty, value); } and used the AddBusinessRules method to activate the validation.  This works fine and when I bind the field to a text control the validation fires like a charm.  Unfortunately it fires the moment the field is displayed on the screen.  I would prefer that validation not highlight the required fields until after the user has attempted to submit the for the first time. I found that I could get something close to the behavior I wanted by setting BusinessRules.SuppressRuleChecking = false; after AddBusinessRules was called and then setting it to true again when the set method of the model property was called.  However my co-worker feels, and I must agree, that this seems too much like monkeying with the model to satisfy behavior required in the UI and violates appropriate separation of concerns. So how can I achieve my goal, maintain the purity of the model, and not put code in the code behind of the view? RockfordLhotka replied on Friday, August 06, 2010 All the UI technologies generally work this way - as part of their binding process, they check to see if each property is valid and update the display accordingly. I don't know of any way to turn that behavior off in any of the UI technologies. You can use rule short-circuiting to get some level of solution. Basically, create a rule that short-circuits if the object isn't in a state where you want the rules to run. Then attach that rule to every property at priority -1 (so it runs before any normal rules). This way a new object will be valid up until the point the user interacts with it. Of course this implies you can detect that the user has interacted with the object - and there's no built-in mechanism for that either - at least by default. So then what you can do is override the default MarkNew() behavior so a new object isn't dirty by default. That way, your short-circuit rule can stop processing if the object is not dirty, and only allow rules to run if the object is dirty. djcohen66 replied on Friday, August 06, 2010 It would be nice if it were possible to change the value AllowEmptyStrings parameter of the Required attribute at runtime. RockfordLhotka replied on Saturday, August 07, 2010 In CSLA 4 rule instances are shared across all instances of a business type, so there's no way to make persistent state changes to a rule without affecting all current (and future) instances of the corresponding business type. I suspect that's true of the DataAnnotations attributes as well. It is very likely that one instance of the attribute is created for the type and is reused - though I don't know that for sure. I hope that's the case though, from a resource consuption perspective. What this means, is that the difference in behavior can't rely on the state of the rule, it has to rely on the state of the business object instance. That's true for CSLA 4 rule objects, or for custom ValidationAttribute objects. Either technique allows you to create your own custom rule implementation where your rule can adapt to the state of the business object at runtime. Copyright (c) Marimer LLC
global_01_local_1_shard_00001926_processed.jsonl/55129
Pool Party May 29, 2007 Danae Klimt Tags: , They were all watching her. He had convinced himself, for the first hour, that it was just a jealous old man’s delusion. But he could delude himself only so long. He’d spent too long watching from the sidelines as the party went on without him to miss what was happening now: They were all watching his wife. All the boys at this bloody party, and the father of the family that was hosting it, who was uncomfortably close in age to Arthur himself. It had been a mistake to come, of course. But Sophie had begged him to come with her when he had urged her to go alone. She had convinced him to wear these old cut-off jeans fit for nothing but working in the garden and a shirt she could unbutton, showing off his pallid chest and belly. And then she had changed out of the gay flowered sundress in which she’d left the house and come strolling out into the huge backyard in a blue-green two-piece bathing suit, her skin gleaming in the afternoon sun. It wasn’t so bad when she was actually in the pool. She was a good swimmer; her curly head split the water in a good straight line as she did laps. Then she emerged, the scanty swimsuit clinging to her even more than before, water droplets glistening in the hollow between her breasts and in the cup of her navel. He wanted to throw himself on her and hide her from the greedy eyes that ate up all that white skin. He wanted to throw himself on her and eat up all that white skin himself, with his hands and his mouth. He wasn’t going to do that, of course. He wasn’t going to pounce on her and, and *take* her, in front of all these people, who probably already thought he was a randy old fool with no sense for marrying a young and nubile student. So he merely watched, quietly, as his young wife laughed and joked with her friends and ate hot dogs and pasta salad with black olives and watermelon and chocolate cake. And every so often she would come back and check in with him, sit down on the foot of the folding lounge chair where he had parked himself and talk with him, smiling, her hair burning like a second sun. That was her shadow falling over him now, as he tried to pretend he wasn’t watching her. He put down the book he’d been staring at and looked up at her courteously. “Could you put some more sunscreen on me, A.A.? I’m starting to feel a burn.” She brushed her hand over her shoulders as if she could brush away the discomfort. He hoped devoutly that she had *not* got burnt; it would be a shame to mar that exquisite skin and its miniscule freckles. “Certainly, my dear.” She handed him the pink bottle and turned around to sit down in front of him. There were, in fact, two slightly reddened patches on her back, just at the top of the shoulders where they joined the neck. He squirted the unpleasantly thick white lotion into his hand and started there, where the damage had already begun. After about two hours, she had really had enough of all the men at the party ogling her. All but her husband, of course, who sat in the shade and kept his nose in his book until she went over and stuck her tits in his face. It was really creeping her out. Even Josey’s *dad* had been watching her with his tongue practically hanging out, and he was old enough to be her father. He was–well, no older than Arthur, come to think of it. Who was still politely *not* watching her, except when he thought she wasn’t looking. He had no idea how cute he looked, sitting there pretending to read in his cut-off jeans and open shirt. He had nice legs, really. And she liked the hair on his chest and the thin red-blond line of it that divided his lower belly and then thickened into his pubic hair. You couldn’t see that, at the moment, but she could think about it, seeing his chest. It was about time to remind people who she’d come to the party with. And her shoulders were starting to feel a little hot. He looked up at her over his glasses as if he hadn’t been looking at her when her back was turned, as if his whole attention had been on that Anthony Trollope novel. Or was it Barbara Pym today? “Certainly, my dear.” It wasn’t possible, unfortunately, to sit between his legs, not without breaking the lounge chair. She would have liked that–it would have made a point. So she sat down next to him instead, close enough for him to reach her. The sunscreen melted like butter between his hand and her back. Her eyes sank closed before she was even aware of it. His hand spread the stuff onto her shoulder, close to her neck, around the nape of her neck to the other shoulder, and then down her back, gliding from side to side. His spread-out fingers touched her shoulderblades when his palm was centered over her spine. He had such big hands, gentle hands, and she had tried repeatedly to draw them without satisfying herself. He was hard to draw, hard to capture–how to convey the intelligence, the sweetness, that animated his irregular, even mismatched features? She had to bite back a whimper of disapointment when he took his hands away. The squelch of the bottle being squeezed reassured her, and those lovely hands came back, rubbing in more lotion–more than she needed, really, but who’s complaining? It would be even lovelier if his hands would slip around to the front, peel down her top, and start massaging her breasts…. Oh, dear. She was going to have to squirm a little. Her skin was so supple under his hands. It drank up the abominable-looking lotion as sand drinks up water, and he could practically feel her humming with pleasure. He could picture the look on her face, the way her eyes would close, her lips part, the way the corners of her mouth would lift, a look of quiet relaxed pleasure just as she got when he made love to her…. He was forcibly reminded, all of a sudden, that he was only wearing shorts and an open shirt. He’d better try not think about how he wanted to slide his hands under her arms and capture her breasts, massage them with just this same firm, gentle touch until her nipples begged him to be rougher–no, he wasn’t going to think about that. Or about pulling her back against his chest and nibbling on that spot by her ear, the one that always made her squirm so delightfully. She pulled away–perhaps just in time–and turned to give him a mischievous smile. “Thanks, A.A. Oh, make sure you get some of the chocolate cake, it’s great!” Her quick peck on his lips caught him by surprise. It didn’t make his prick settle down. It was a relief to finally get home. She’d enjoyed the party; it had been too long since she’d had a good swim, but the sun did tend to tire her out. Redheads were more sensitive that way. She’d also eaten way too much chocolate cake. She felt sleepy and vaguely pleased, and all she could think about was getting into the bathroom to dump her wet things in the hamper and have a quick shower before her nap. She didn’t see the look on Arthur’s face as he followed her through the door. “I’m gonna go have a quick shower and take a nap, okay, A.A.?” She turned around, puzzled–she had never heard him say “no,” or anything, in that hard, flat tone of voice before–and he pounced. He was going to regret this, but there was no stopping it. Not after holding back for so long. He’d been teased for hours by the sight of her in that scanty swimsuit, her lush curves on display, her sweet smile offered to all and sundry. He needed to remind her–and himself–who she belonged with. She turned toward him, a sleepily puzzled expression on her face, and he gave himself no time for sympathy: He pounced. “You’re not going to have a shower.” He stepped forward and curled one hand around the back of her neck. “Not till you’ve had me.” If she had resisted the kiss, he would have let her go, would have apologized for coming on too strong. But there was no resistance, only a half-breath’s confusion, and then she melted, her mouth opening to his like a flower to the sunlight. He drank the taste of sunburn and chocolate cake and sleepiness and desire, and wanted more. Getting his other hand on her waist, he pulled her close, feeling the dampness of her skin under the sundress, the pliancy of her body as her arms twined round his neck. She was no lightweight, but it seemed absolutely necessary to pick her up and carry her–somewhere. He made it as far as the couch, where he dumped her a little more heavily than he would have liked, dropped to his knees, and pushed up her dress. “You little slut.” The word came out before he could censor it: She had not put her panties back on after changing out of the swimsuit. Through the smell of chlorine came the unmistakable smell of *her*, and when he put out his hand to test her, two fingers slid right into hot slippery needy quim. “You naughty girl. All slicked up after flirting with all those boys? Well, they don’t get to taste you. I do.” Oh, dear God! He went right for her clit, the way a bulldog goes for the throat of its prey, and her muscles clamped down on the fingers still inside her so fiercely that she screamed. She couldn’t get her breath to cry out again–she couldn’t even get enough breath to speak, and she had to tell him, to tell him, but his fingers were–oh! oh, oh…. “Not them–“ She gulped for air. “You. So handsome–and you put sunscreen on me–“ Him. Just him. His hands, his mouth. His *tongue*, oh, God, his tongue. There were plenty of silver hairs mixed in with the reddish-gold at the crown of his head. She didn’t care. All she cared about was what his mouth was doing to her, and that they not throw out both of their backs fucking on this couch. “Felt so good,” and it came out a moan. She arched and squirmed and bucked, and he grabbed her hips and held her still, forcing her to feel everything, everything that he was doing to her. “Wanted your hands on my breasts, *right then*, could we please go to bed now?” He raised his head and met her eyes. “No.” He wanted her to scream for him. Not just cry out, or moan, or gasp, or make any of the lovely noises she often made. He wanted her to scream, really truly scream, scream so loud that the neighbors would hear her and think he was tearing out her hair. She was getting close to it, he thought–after her desperate-sounding question and his refusal, she hadn’t said anything else, anything that counted as *words*. He had two fingers up her quim and her clit in his mouth, and her noises were getting higher in pitch, her mouth opening wider with each cry just as her cunt opened up round his fingers, and perhaps if he could get three fingers in there she would open up, open up— A tiny part of his mind, shoved aside and ignored at the moment, was screaming frantically not to do this, not to force her, not to ask more than she wanted to give. He wasn’t listening. Something in his gut was telling him to take her, to run in and trample the wildflowers and tear down the boughs laden with fruit and gorge himself on the sweetness till the juice ran down his chin and he lay sated in the grass because that’s what ripe full orchards were *for*, and she was his, all his to enjoy. Sophie didn’t know how much more of this she could take. He’d never *pushed* her like this, driven her to the point that she wanted to beg him to stop but couldn’t, because it felt so good. It was so good she wanted to scream, to tear out her hair, to arch up off the sofa as if a live wire were plugged into her cunt and the current were running all through her. Jesus! she’d never known he could be like this, never known he could *take*–and she liked it. God, she liked it–she just didn’t have the breath to say so. She bit her lip as he pulled his hand back and then pushed three fingers into her. It hurt but it hurt good, and her hips moved in response without her brain saying yes or no, grinding her cunt against his hand. Seeking more. That was when he raised his head and said, “Scream for me. Scream. I want to hear it, that’s what I want to hear.” His fingers slid deeper, impossibly. “Scream, Sophie. Scream.” And she did. Head thrown back, mouth open, feeling like there was an open core to her body that ran from cunt to throat, open like the body of a guitar or a violin, and the fingers that throbbed within her, merciless, precise, made her whole body resonate until it roared out from behind her teeth: a gut-deep groan that scaled up in pitch like the rising of a siren and rose and rose until it cut her throat like a knife. She came, and she screamed. Arthur was beyond thinking now. He didn’t think about what to do next; when Sophie went limp, he simply picked her up, got her turned round and kneeling on the couch, draped over the back of it. Easy enough to pull her back against him once he finally had his prick out of his pants–so hard it *hurt*–and fill her up again. “Oh, God. . . .” She hung limp in his grasp, and he wrapped his arms around her, pulling her back against his chest, his thighs. Her breasts filled his hands completely, and her throat was so lush, he had to feed on it. Her hair got into his eyes and nose and he didn’t care. He rocked inside her, slowly, touching and tasting all those bits of her that he’d neglected, until he couldn’t stand it any more; he grabbed her hips and fucked her, hard, that’s what it was, just pure fucking, and Sophie wailed and clutched the sofa and shook and his balls didn’t care whether or not she came. He must have managed, somehow, to get them both upstairs and into bed. When she woke, wrapped up in the quilt and Arthur, Sophie did not quite remember. The bedroom was cool and dim, and the hum of the air conditioner lulled her, making it difficult to really awaken. She wondered if he’d carried her up the steps, smiled, and shook her head. Her efforts to untangle herself so she could go pee woke Arthur. He was reluctant to let her go, and gave her such a forlorn look as she slid out of the bed that she blew him a kiss. “Just going to the bathroom,” she said, and hurried across the cool wood floor. It was warmer in the bathroom, and sitting down on the toilet seat seemed like a relief. Her pussy remained interestingly sore. She spent a few minutes combing out her hair and cursing it–she’d crashed into bed with the mane still damp, and it was knotted up like a rat’s nest as a result–then sauntered back into the bedroom, retrieving a t-shirt along the way. Arthur was still buried under the covers, and she had to practically dig her way in to rejoin him. He seemed awfully stiff as she snuggled up against him, and not in a good way. “Did you have a good nap?” she asked, stroking his chest. He made a muffled noise, his head turned away. After a moment she sat up, concerned. “A.A., are you all right?” He looked at her, obviously anguished. Anguished? “I’m sorry about earlier,” he said hoarsely. “*Sorry*? For what? For fucking my brains out?” She laughed. “It was fabulous. In case you didn’t notice, I was coming like crazy.” He sat up, too, looking baffled. “I wasn’t. . . forcing you?” She had to laugh again, even if it only seemed to make him more baffled. “*Forcing* me? Forcing? –no, wait, you really mean this. You do. You’re afraid you came on too strong.” He nodded. “I didn’t ask. I just–reached out and took.” She plopped down on her side again, one hand supporting her head and the other reaching out to her husband. “Would you have reached out and took if you hadn’t thought I wanted to be taken?” He shook his head and looked away. “I wasn’t thinking at all.” She reached up and laid her hand on his cheek, drawing him to look at her again. “So you went on your gut instincts. And you were right. You reached out and took, and I *wanted* to be taken. I wanted it. I wanted you–that’s why we were flirting all afternoon.” She slapped his shoulder lightly. “Yes, silly man–flirting. That’s what that was when I asked you to put some more suntan lotion on me. Flirting. I thought even uptight academics knew what flirting is.” Her teasing earned her a rare sunny smile. “Sometimes we forget.” Rolling onto her back, Sophie pulled Arthur down against her. “That’s why you have me to remind you.” Entry Filed under: Uncategorized Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s Trackback this post  |  Subscribe to comments via RSS Feed May 2007     Aug » Most Recent Posts %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/55144
Welcome to DA Is your life unmanageable because of debt? Are you sick of bouncing checks, paying late fees, and having creditors knocking at your door? Learn More Check out the latest D.A. Announcements at: https://debtorsanonymous.org/announcements When: Anytime How: Copy & Paste Make a Contribution DA serves the debtor who still suffers and is self-supporting solely through the contributions of DA members.
global_01_local_1_shard_00001926_processed.jsonl/55155
From Minetest Developer Wiki (Redirected from InvRef:get stack) Jump to: navigation, search Reference to an inventory. Method Description is_empty("listname") return true if list is empty get_size("listname") get size of a list set_size("listname", size) set size of a list, avoid e.g. , 7*3), use , 21) --7*3 instead to avoid confusion with formspec#list get_width("listname") get width of a list set_width("listname", width) set width of list; currently used for crafting get_stack("listname", i) get a copy of stack index i in list set_stack("listname", i, stack) copy stack to index i in list get_list("listname") return full list set_list("listname", list) set full list (size will not change) get_lists() return full lists. Ex: {main={ItemStack,ItemStack...}, craft={..},hand={..}...} add_item("listname", stack) add item somewhere in list, returns leftover ItemStack room_for_item("listname", stack) returns true if the stack of items can be fully added to the list contains_item("listname", stack) returns true if the stack of items can be fully taken from the list remove_item("listname", stack) take as many items as specified from the list, returns the items that were actually removed (as an ItemStack) • A common mistake is to get an ItemStack from an inventory, change it, and expect the changes to carry through to the inventory. ItemStacks returned by and passed to inventory methods are not live objects, but are passed "by copy". In other words, if you get an ItemStack result and change it, the inventory will not be modified. You have to call one of the inventory manipulator methods (e.g. inv:set_stack(listName, changedStack)) for your changes to be reflected back in the inventory. This is also true of object:get_wielded_item() and object:set_wielded_item(...), which just get and set the inventory stack the player has selected on the hotbar. Personal tools
global_01_local_1_shard_00001926_processed.jsonl/55156
Release log PMAPI for partners v1.2 - We're proud to announce that our API is now open to partners (also known as resellers). We've called this superset of functionality the Permission Marketing Partner API, or PMPAPI for short. Please take a look at our handy partner guide if you'd like to get your partner integration off to a flying start. In addition to the brand new auth method we added emailTransaction, loginToken and EmailOptIn endpoints: Account - partner Partners can now create accounts. This endpoint provides details on the features which are available to the account. AccountFeatures - partner Partners can control which features an account has access to. CreditTransfer - partner Transfer "sms", "email" or "inboxtest" credits between accounts. Send a confirmed opt-in email with a unique link that's automatically generated. Your one-stop endpoint for sending HTML content to a single recipient. The HTML content is provided in each transaction rather than depending on an email message. Generates a token for a specified service which can be used to log in. User - partner Partners can control which features an account has access to. EmailTemplate has arrived! v1.1.2 - This week's release introduces the brand new emailTemplate endpoint. We've added EmailTemplate so you can retrieve or update your email templates. Pick your competition winners with v1.1.1 - Our new endpoint will allow you to quickly pick subscribers at random - perfect for competition winners! We've also lined up a couple of minor updates. RandomSubscriber will select one or more random subscribers from your account. keyword can now be 4-64 characters in length. keyword can now be 1-32 characters in length. Now supports PUT and POST actions! The new segmentation tools have arrived! v1.1.0 - Drum-roll please! are excited to unveil our industry-leading segmentation endpoints: search and searchExecute. Target subscribers by how engaged they are with your emails, by where they are in the world, or using any of your existing subscriberProfileFields. Using our XML (docs coming soon), you can create infinitely complex search expressions. Super-duper, if we do say so ourselves! This does what it says on the tin and executes a search - handy for knowing how many subscribers a search expression returns. This is also the endpoint you need if you want to add the subscribers to a list. Preparing for new segmentation tools v1.0.3 - are excited to announce powerful new segmentation tools, coming soon to the PMAPI. Today's minor release paves the way for 2 new segmentation endpoints. New type and goaltracking attributes have been added. This opens up very powerful possibilities for tracking ecommerce events against individual subscribers with Goal Tracking. Read more about Goal Tracking. The type attribute has been deprecated. However, requests will not fail if this field persists. The search_id attribute is now required, so exactly one of search_id and list_id must be non-null. Sorting on null values v1.0.2 - This week's minor release has addressed an odd behaviour in pagination. Request format Pagination can loop eternally when sorting with a start value of "null". If the total number of resources with "null" value on the sort attribute exceeds the returned page's count, then next will also be "null". To resolve this strange behaviour, a "null" value in start is now treated as " " (empty string). All resources with a "null" value are omitted from the result set. Pagination is applied to the remaining resources (non-null) according to the supplied sort and reverse arguments. Improved preview and emailMessageLink v1.0.1 - This week's minor release improves performance in preview and enhances emailMessageLink. The completed attribute is now required in GET requests. Sorting has been removed from completed, subscriber_id, message_id, user_id and recipient. The task_id attribute (optional) has been introduced for enhanced compatibility with other endpoints. The PMAPI is now out of beta! v1.0.0 - This is a very exciting time for the folks at! We launched the PMAPI in April 2013 and since then we've released 4 major and 8 minor milestones. Each release has shaped the functionality, performance, reliability and accessibility you can see today. Tomorrow, we look forward to integrations of all shapes, sizes and languages! This release brings a number of improvements to our documentation, many of which are based on feedback we've received from developers who are integrating. We've also tinkered around under the hood, future-proofing and increasing performance. Lastly, a couple of endpoints have seen minor amendments. All endpoints The attributes cdate and mdate have been changed from type "int" to "decimal". This is because conditions exist where multiple records are created/modified at the same time, and pagination (when sorted by cdate or mdate) could repeat the same set of results endlessly. Decimalisation allows us to track events up to the millisecond, providing the 'fuzziness' required to progress through pages regardless of bulk actions, but maintaining the same level of accuracy. Endpoint documentation We've updated the endpoint page with content from our recently removed 'endpoint flow' guide. This has brought about a much more detailed view of each endpoint, including connections and available verbs. Request format documentation Based on feedback we've recently received from integrators, we've elaborated on documentation explaining our use of parameters in 'query string' vs 'request body'. Automation documentation We recently integrated with our own API and found some of the hints within the [*]Automation endpoints hard to follow. Hopefully you'll find this easier now! 3rd party Python client library A third party developer has been working hard to bring a PMAPI client library to Python. If Python's your bag, check it out! We've added search_id. As we don't currently support search functionality, this attribute can only be read/set with "null" value. Please keep an eye on Twitter for updates on our forthcoming search endpoint(s)! In addition to search_id, we've rationalised the attributes smsuniquehardbounces and smsuniquesoftbounces into just smsuniquebounces. This change makes GET requests three orders of magnitude faster! The attribute segmenttype is now required. Attributes emailsuspended and smssuspended can no longer be used as filters. We've fixed a bug where mdate was being erroneously returned on POST. Import has arrived! v0.5.0 - This week's release introduces our popular import feature and a minor enhancement to some of our automation endpoints. Bulk import your subscribers with ease; simply host a .CSV file and tell us where it is! We've updated most of our [*]Automation endpoints with improved handling of email campaigns. When an email is specified in the event or action phases, that email is now automatically marked as used. Tracking email opens and clicks v0.4.0 - Today's release introduces two new endpoints for better visibility of your subscriber interactions - emailOpen and emailLinkClick. We've also added an attribute for the 409 Conflict error condition. The platform records when an email was opened by a subscriber. This new endpoint allows you get insight into this data by subscriber or task. Need to know when a subscriber clicked a link in an email you sent? This new endpoint will tell you exactly that. 409 Conflict We've added resource_id for the 409 Conflict error condition. If you issue a POST and a resource already exists, use this value to avoid issuing an additional GET request.
global_01_local_1_shard_00001926_processed.jsonl/55157
Places (Search) API Developer's Guide Address Object Structure Address information is provided in two ways: as a displayable, formatted address string as well as a series of structured attributes. "address": { "street": "22 Rue du Grenier Saint-Lazare", "postalCode": "75003", "city": "Paris", "countryCode": "FRA", "country": "France", "text": "22 Rue du Grenier Saint-Lazare\n75003 Paris\nFrance" The address object contains the following attributes: Attribute Type Description text String (formatted text) A displayable, formatted address as rich text. level String; optional Contains level of place inside of a venue building String; optional Building name house String; optional House or street number. street String; optional Street name (in practice may also contain street number). streets Array[String]; optional If address represents intersection or junction, an array of street names involved postalCode String; optional An alphanumeric string included in a postal address to facilitate mail sorting (a.k.a. post code, postcode, or ZIP code). areas Array[String]; optional An array of named areas below the district and above street. In some regions such areas might also contain street names, when individual street segments have names separate from the name of the whole road. district String; optional A division of city; typically an administrative unit within a larger city or a customary name of a city's neighborhood. city String; optional The name of the primary locality of the place. regions Array[String]; optional For address conventions where more than to levels of named areas above the city level are in use, the regions attribute provides an array with all additional area names, ordered by decreasing size (starting with the highest subdivision below state) county String; optional A division of a state; typically a secondary-level administrative division of a country or equivalent. state String; optional A division of a country; typically a first-level administrative division of a country and/or a geographical region. stateCode String; optional A code/abbreviation for the state division of a country. country String; optional The localised country name. countryCode String (ISO 3166-1 alpha-3 code); optional A three-letter country code.
global_01_local_1_shard_00001926_processed.jsonl/55167
During sensitive periods, firms make decisions and develop characteristics, which, despite time and environmental change, have lasting impact. Scholars refer to this process as imprinting and use this perspective to explain the behavior of industries, organizations, groups, and individuals. In this manuscript, we examine imprinting in the family firm, where it may be particularly important and unique because of the distinct aspects of the family firm. The purpose of our study is to examine when and how the three elements of imprinting (sensitive periods, stamping, and persistence) occur in family firms. We address three specific questions: (a) Beyond founding, what are the sensitive periods in family firms wherein imprinting occurs? (b) During these sensitive periods, what elements of the organizational form are imprinted in family firms? and (c) Do these imprinted elements of the family firm form persist across generations?
global_01_local_1_shard_00001926_processed.jsonl/55174
Fog Creek Software Discussion Board Out in the open vs. deep secret development Apple is all about soft-issues. It is in that respect more of a lifestyle than a technology company. These image things are very delicate, and as such need to be handeled with the utmost care. Steve's Apple understands this. There can be no openness, as this could spoil the mystery and confuse the faithfull. Bill's Microsoft on the other hand is hardcore tech from the very roots to the top. Techies want to freely speak their minds. They all beleive they are from Vulcan, and hold the one true undiluted true vision. They do not want to be told by some loosers from sales or legal what they can and can not say. They do not need image or publicity. They believe the better technology will do the selling for them, and if any competitor wants to take advantage of the open knowledge shared, they can go ahead. They are convinced they are so much better they will defeat them no matter what. Just me (Sir to you) Thursday, January 16, 2003 MS must also stoke the PR fires early and keep them blazing like hell for _years_ while they develop the Next Big Thing.  Pre-selling a new idea before it even exists has been a tried-and-true sales technique for years - just look at something like the concept vehicles at the Detroit Auto Show. Joel's point is well taken, but ultimately it depends on the context of the project - new app/utility, or new operating system.  The concept is vastly different. The real meat of the article was this: That has been up on my office wall for years. Mitch & Murray (from downtown) Thursday, January 16, 2003 It's called announcing a product that you haven't started because one of your competitors is trying to make inroads on your market with the product they just announced. Thursday, January 16, 2003 Pre-selling an idea when you're as big as Microsoft can also serve to warn other smaller firms away from competing. Bruce Perry Thursday, January 16, 2003 Yes, the pre-emptive announcment for which IBM was busted when they were the 750 pund gorilla. The idea being that if you make big enough bogus promises early won't have to keep them. I like to think that no more than 3 (and ideally 1) people know about the coolest (most innovative) things being developed now. Then again, no one's every said that anything from MS is cool now have they? fool for python Thursday, January 16, 2003 I don't understand all this talk about Apple being a "lifestyle" company, when their products -- both hardware and software -- ARE genuinely better than PC stuff. I am mainly a PC user, by the way -- the last Mac I owned was purchased in 1991.  But I have had a chance to use Macs quite a bit recently, and it is clear that they are better, hands-down, than PCs. So, the explanation for Apple's top secret development can't be traced to their alleged status as a "lifestyle" company whose main innovation is their candy-colored hardware.  They are doing great work technically, too. Better than Microsoft, at least. Thursday, January 16, 2003 Apart from their obsolete CPU, apple computer are made from exactly the same components that go into PCs. Or were you under the misapprehension that Apple actually manufactures their memory, graphics cards, etc ? But I suppose you'll tell us that Safari is better than Konquerer, and the "Apple" CLI is better that FreeBSDs? Or perhaps the Apple kernel is better than Nexts? I suppose they make some nice cases, and their GUI is ok, but what else do they actually do? Thursday, January 16, 2003 They are cool. And that apparently is enough. fool for python Thursday, January 16, 2003 The current desktops are much more high end for audio than the fastest PCs. The reason is the dual processor architecture, included standard. Audio can run on its own processor now and context switches are not necessary. To maintain low enough latency for pro audio apps, a uniprocessor system has to switch contexts pretty darn frequently and it eats up processor bandwidth. Not so with multiprocessors. Also, the g4's altivec parallel math engine is far more advanced and pipelined than anything in intel's mmx extensions. This seems to be why the FM7 softsynth, available on both platforms, can run 2-3 times as many voices running the identical algorithms on a dual 1GHz G4 than on a 3GHz Pentium. Apple's flatscreen monitors are also the finest you can find. Just head down to your local retailer and do a side by side comparison. Not for everyone though. Your average code monkey working weekends and nights without paid overtime would never be able to afford fine gear such as this. As far as the kernel being better than NeXT, well of course -- it is the same kernel with an additional 10 years of enhancements and running on a much better processor! Ed the Millwright Thursday, January 16, 2003 So... dual CPU PCs are not available? AltiVec is better than MMX, but is it better than SSE2? Not really. Its only real advantage now is bigger registers, as far as I know, but I'm not really an expert in this area. They don't seem to have updated it in a long time, which doesn't look good to me. The latest photoshop benchmarks show dual 1.25 GHz Macs getting stomped pretty badly by single 3.06 GHz Intel boxes. The SoftSynth application you mentioned is probably just tuned better for the G4. Apple flatscreen monitors are made by LG, and are typically a generation behind due to Apples laxity in upgrading them - to quote a recent review (Toms) of the current Apple Studio screen "Inside, it contains an LG panel whose specifications are unspectacular, although it proved to be very effective at displaying the color patterns.". Poor resolution is my main complaint. Personally I'd rather keep my SGI widescreen :) But I'm biased against Macs, so don't listen to me? Like most anti-Mac people, it's because I used to use one every day ( for about 5 years ) :) Friday, January 17, 2003 Hey!  I resemble that statement!  All except the part about not being able to afford it. >>Apple's flatscreen monitors are also the finest you can find.... Just head down to your local retailer... Well, it looks like Mr. blah set you straight on that one.  check them out here: Aa bonified code monkey, I'd like to correct the mis-representation by "Ed the Millwright".  A *real* code monkey wouldn't be using an Apple to begin with, so who cares if he can afford it! Anywho, I think we got a LITTLE off topic with this thread, don't you agree? Friday, January 17, 2003 No misrepresentation here; I am in complete agreement with you. Friday, January 17, 2003 "probably just tuned better for the G4" Interesting that you have to resort to uninformed speculation, the mark of a true fanatic. Friday, January 17, 2003 Heh, fanatical enough to admit my bias, and that I'm not an expert? 2 cases, both making heavy use of AltiVec / SSE: Photoshop, SoftSynth. One performs better on Intel, the other on G4. Tuning could not possibly be a factor? You are claiming it is because of some inherent superiority of G4, when it only performs better in one specific case..... remind me who's the fanatic. Friday, January 17, 2003 I don't contest your Photoshop claims. The blanket claim is that the pc is better at everything which is demonstratably untrue. The G4 is currently better at high end pro audio applications. With the music applications, all the data in one block fits in the cache which affects things, as does the AltiVec, which no one contests. The FM7 is optimized for the AltiVec on the G4 and MMX on the Pentium. Both are highly code tuned for their respective architectures. The reason you are a fanatic is that rather than acknowledge the simple fact that the G4 has superior performance for DSPs intensive audio work, you cling to your hopeless fantasies that the G4s competitors are superior in everyway, despite the lack of evidence. A non-fanatic would make a decision based on the facts and not an their own political agenda, or fanatical cult beliefs in the unquestioned superiority of their aligned absolutist ideology. Friday, January 17, 2003 Now come on, when did I make those claims? If what you are saying is true about the tuning of SoftSyth then my wild guess looks correct. Intel went MMX, SSE, SSE2 ( no doubt with a few extra variations for luck ). If SoftSynth is tuned for MMX then it is tuned for an Intel architecture that is 2 whole generations out of date! And you might have noticed that in my fanatical way, I already said that I believed AltiVec was superior to MMX, but then, I'm no expert :) Anyway, we seem to be wildly off topic so that's all from me. Friday, January 17, 2003 Looks like you're right about MMX -- they added SSE support in January of 2002. So we're comparing SSE to Altivec. Friday, January 17, 2003 *  Recent Topics *  Fog Creek Home
global_01_local_1_shard_00001926_processed.jsonl/55180
Cap and Gown 2019 Order Form Last Name * Your answer First * Your answer ID # * Your answer Gender * Height (Feet) * Height (Inches) * Your answer Would you be interested in purchasing the 2019 inaugural stole? * Never submit passwords through Google Forms. This form was created inside of Garden Grove Unified School District. Report Abuse - Terms of Service
global_01_local_1_shard_00001926_processed.jsonl/55181
Skip to content NX / NoMachine NX (aka NoMachine) is a computer program that handles remote X Window System connections which offers several benefits over traditional X forwarding. NX can greatly improve the performance of X Windows, allowing users with slow, high latency connections (e.g. on cell phone network, traveling in Africa) to use complex X Windows programs (such as rotating a plot in Matlab). NX provides functionality that allow a user to disconnect from the session and reconnect to it at a later time while keeping the state of all running applications inside the session. NX gives users a virtual KDE desktop that runs at NERSC. You can customize the desktop according to your work requirement. Download latest NX Client Windows XP/Windows 7/Windows 8 (Download) Mac OS X 10.5 or later on an Intel Mac (Download) DEB Package for Debian/Ubuntu: (Download) RPM Package for Centos/Redhat/Fedora (Download) To configure open the NX player and click on the box in the upper left that says "New". Use "SSH" for protocol, "" for host, "password" for authentication, "Don't use a proxy" for proxy. Alternatively you can download the configuration file (you'll need to unzip it and open it with the NX Client). You can connect to NX via the NX Client or by pointing your browser at nxcloud01. The browser interface is still experimental and can sometimes be slower than connecting via the client. Connecting to NX If you are having trouble connecting to NX, please can try these steps: 1. Log into NIM to clear any login failures. Access to NX uses your NERSC user name and password. If your password is mistyped five times, NERSC will lock you out of their systems. Logging into NIM will automatically clear these failures. This will also let you know if your password is expired (which would prevent you from accessing NX, among many other things). 2. Re-download the NX configuration file. NX will often "update" the configuration file to try to save your settings and sometimes this file can get some bad settings. You must have the new NX player AND the new configuration file to connect to the NX service. 3. Try to ssh directly to the NX server. You can do this with the command ssh <nersc_username> and your NERSC user name and password. If your access to the NX server is blocked by a local firewall or something else and you can't connect via ssh, you will also not be able to connect with the NX client. If you've tried these steps and still cannot connect, please open a help ticket. In this ticket, please include the following information: 1. The type of system you're trying to connect from (i.e. Mac, Windows, Linux, etc.). 2. A screen capture of the error you get (if possible). 3. A tarball of the NX logs. You can find instructions for how to bundle your NX logs on the NoMachine website. Configuring the NX Environment Font size is too big or too small To change the font size inside your terminal: In the menu of Konsole Application, choose "Settings"->"Manage Profiles", then click "Edit Profile...", now you can change the font size in the "Appearance" tab, after changing, click "OK" until you are back to the terminal. Now every new terminal window you open will have the new font size. To change the font size of your menu bars/window titles: Right click on an empty desktop then choose "Konsole", inside the Konsole, type "kcmshell4 fonts". Then you have a dialog box to change your font size. Resizing the NX screen With the latest NX Player (5.0.63 or later), the most efficient way is to enable "Remote Resize" in the NX menu: 1. Connect to NX 2. From the desktop, bring up the NX player menu with a hotkey: Mac: Ctrl+Option+0, Windows: Ctrl+Alt+0, Linux: Ctrl+Alt+0 3. Choose the "Display" submenu, then toggle the "Remote Resize" button. You can also choose "Change Settings" to manually change the resolution. Emacs complains about missing fonts and shows white blocks This is due to a problem with font server. Please use the following command instead: emacs -font 7x14 Keypairs and NX The NX server acts as a gateway to all other NERSC systems. Users access other NERSC systems via SSH with their NERSC user name and password. The global home directories are not mounted on the NX servers, so if you want to use SSH keys on NX, you will need to generate a separate keypair. Generating a Keypair SSH Agent requires a keypair to function. The first time you click an item on the "NERSC Systems" menu the keypair is created and installed. You need to provide a password to encrypt your private key. This password can be different from your NIM password. You can generate a keypair by selecting the "(Re)generate Key Pair" menu item. If you have an existing keypair, this option will overwrite it. Once you've generated a keypair, you will need to upload the public key to NIM. This keypair will be good for 12 hours. You'll need to refresh it if it expires. You can do this by selecting the "Renew NX SSH Keypair" from the menu at the lower left hand side. Suspending or Terminating a NX Session When you close the NX window (e.g., by clicking the "cross" button) a dialog box will appear providing the choice of either suspending or terminating the session. Suspending the session will preserve most running applications inside the session intact and allow you to reconnect to the session at a later time. Terminating the session will kill all the running applications inside the session and all unsaved work will be lost. If you lose your connection to the NX server (e.g., if your internet connection is lost) NX will automatically suspend the session allowing you to reconnect to the same session while keeping the running applications intact
global_01_local_1_shard_00001926_processed.jsonl/55182
Thank you for your feedback. • London • Kingston • Jakarta • Istanbul • Helsinki • Geneva • Store Create a Puppet node definition Create a Puppet node definition A node definition groups several classes together. Before you begin Role required: puppet_admin About this task A Puppet administrator must create a node definition before a Puppet user can assign it to Puppet nodes. When a Puppet user assigns a node definition to a Puppet node, the Puppet node uses the classes specified by the node definition. To create a new node definition, create an editable node definition draft and then publish the draft. 1. Navigate to Puppet > Node Definitions. 2. Click New Draft. 3. Fill in and then save the form. Table 1. Creating Node Definitions Field Description Provider [Read-only] The configuration automation provider for this definition. Inherits [Optional] The parent node definition that contains class declarations to be inherited. Puppet master The Puppet Master that manages the nodes that use this node definition. State [Read-only] The state of the node definition: Draft or Published. Environment [Optional] An additional parameter that allows you to group Puppet nodes. See Puppet Environments documentation for more information. Replaces [Read-only] For node definition draft records, the original node definition record that the draft replaces when published. Change request [Read-only] The change request generated when the draft is published. 4. Click Publish.
global_01_local_1_shard_00001926_processed.jsonl/55183
This documentation is still in progress. We are working hard to update all our screenshots to the new Magnolia 6 style. Please bear with us. Page tree Skip to end of metadata Go to start of metadata Property files are used for configuration during the startup sequence before the repository is available. These properties configure the instance for a particular use (such as a development or production environment) and set various system directories. Once the startup sequence is completed and the repository is available, the majority of configuration is done in the config workspace in the repository. Properties are not stored in a single property file but come from multiple sources. These sources are processed or parsed in this order: SourceLocationPath / Example 1Bean propertiesmagnolia-core.jar/ 2.Module propertiesModule descriptor 3.Global file propertiesweb applicationWEB-INF/config/ 4.Default file propertiesweb applicationWEB-INF/config/default/ 5.Web application file propertiesweb applicationWEB-INF/config/(webapp)/ 6.Server file propertiesweb applicationWEB-INF/config/(servername)/ 7.Web application at server file propertiesweb applicationWEB-INF/config/(servername)/(webapp)/ 8.System properties JVM options (-Dx=y) Existing properties will be overridden by available System properties Sources processed earlier may be overridden by sources processed later. The processing order and distribution of properties into several sources allows for flexible customization. Some important properties set in the default file: # Repository configuration magnolia.repositories.config = WEB-INF/config/default/repositories.xml magnolia.repositories.home = $\{\}/repositories magnolia.repositories.jackrabbit.config = WEB-INF/config/repo-conf/jackrabbit-bundle-h2-search.xml # Defining the instance as author instance # Only used for the initial installation. # Afterwards configuration in the config repository is used. # The value is saved in /server/admin # Switch to false to enhance the performance of Javascript generation # Set to true if bootstrapping/update should be performed automatically (info) is set programmatically during Magnolia start-up. Its value depends on the servlet container and on the environment, for instance on a production Tomcat it would be something like /some-path/some-tomcat/webapps. Multiple configurations on a single Web application archive Default properties are common regardless of the server name or webapp name. Webapp specific properties are installed only if the webapp name matches. Correspondingly, server specific properties are only installed if the server name matches. For example, Magnolia ships with two webapps by default: magnoliaAuthor and magnoliaPublic. It is possible to set a different persistence manager per environment. For example, on the development instance you could use the default embedded Derby database, whilst on production you could use a production-scale persistent storage such as a MySQL database. See WAR file with multiple configurations for more on this topic. The MySQL InnoDB storage engine is supported by Magnolia, the MyISAM engine is not. InnoDB is the default engine in MySQL 5.5 and later. The structure and the order of source execution allows you to provide sophisticated configurations and flexible customization. The default Magnolia configuration (delivered in the web application bundle) provides an example of how the mechanism works: • WEB-INF/config/default/ • WEB-INF/config/magnoliaAuthor/ • WEB-INF/config/magnoliaPublic/ Magnolia provides a single web application which configures itself depending on the servlet context it is installed in. If your environment has multiple staging systems with differing configuration needs, you can apply different configurations by adding a server name to each of the listed paths. For complex environments, the order of loading files can be defined in WEB-INF/web.xml as a context-param element: Defining properties Properties can be accessed through the info.magnolia.init.MagnoliaConfigurationProperties class. default is WEB-INF/config/default/log4j.xml Name of a log4j config file. Can be a .properties or .xml file. The value can be: • a full path • a path relative to the webapp root • a file name which will be loaded from the classpath default is WEB-INF/bootstrap/author WEB-INF/bootstrap/common Directory containing XML files for initialization of a blank Magnolia instance. If no content is found in any of the repositories, they are initialized by importing the XML files found in this folder. If you don't want to let Magnolia initialize repositories automatically then remove this parameter. default is ${magnolia.home}/cache Directory used for cached pages. default is admin Password for repository connection. default is admin User ID for repository connection. default is ${magnolia.home}/history History directory used for activation. default is WEB-INF/config/default/repositories.xml Repository configuration, points to an XML file. magnolia.repositories.jackrabbit.cluster.masterrequired if you have any clustered workspaces in your project. default is false Identifies the instance as a cluster master node. During installation and update Magnolia bootstraps content only into master nodes. This ensures that other (replica) nodes installed later don't override already bootstrapped content. Example: Public instance A is defined as a cluster master node. The instance starts and creates a clustered forum workspace and bootstraps some content such as rules of conduct. Second public instance B is defined as a replica node. It starts moments later but does not bootstrap the same workspace again. • true defines the instance is a cluster master node. Content is bootstrapped into the repository. • false defines the instance as a cluster replica node. Content is not bootstrapped into the repository. default is ${magnolia.home}/tmp Temporary directory for uploaded files. default is ${magnolia.home}/WEB-INF/config/default/ Location of private and public keys used for activation. default is true Sets an instance as author (true) or public (false). default is true Some modules contain optional sample content. They will check this property to decide if they should install the content. List of component class names to be excluded from component instantiation. Separate class names with white space (space, tab) or commas. The directory to import file system XML files from with the Content Importer module. If the path is not set, the content importer module is stopped. default is false magnolia.develop is a configuration property that can be set to true in the file for development purposes, specifically to: • Enable ClasspathScanner, when developing via IDE and changing / deploying edited classpath based resources. • Disable the cache for resources. Set to false on production instances. default is ${} Root of the webapp's deployment directory. default is false Enables support for JSR-250 annotations. Magnolia uses the @PostConstruct annotation in methods that need to be executed after dependency injection is done to perform any initialization. Enabling JSR-250 support impacts performance. default is ${magnolia.home}/logs Directory where logs are written. default is false Turns off migration report generation to speed up the migration process. Set to true to generate reports. default is ${magnolia.home}/repositories Repository home directory. default is WEB-INF/config/repo-conf/jackrabbit-bundle-derby-search.xml Jackrabbit configuration file. See the repo-conf directory for configuration files for other persistence managers such as MySQL, PostgreSQL and Ingres. Jackrabbit configuration file for a clustered repository. (warning) Always define the cluster.config and cluster.master properties together if any of your workspaces are clustered. default is   .*\\.(ftl|yaml)$ Pattern to define which resources should be observed by ClasspathScanner The default pattern above observes any file names that end in .ftl and .yaml default is ${magnolia.home}/modules Defines the directory from which filesystem resources such as light modules are loaded in a Magnolia instance. default is META-INF,WEB-INF,cache,docroot,logs,repositories,tmp List of excluded resource directories in FileSystemResourceOrigin. (info) For example, if you are using the node_modules directory when developing locally, you can use to prevent slow loading of pages. default is high The sensitivity (speed) with which the changes of the resources in the magnolia.resources.dir are observed by the DirectoryWatcherService. Possible values: low, medium, high. For development purposes on OSX it is recommended to set the property to high. default is false Set to true if bootstrapping and update should be performed automatically after installation. This means the system won't wait for the user to start the update manually. default is false Activate UTF-8 support for pages. default is set in set in Jackrabbit configuration file The ID of the JCR cluster instance. When setting the value in, it overrides the value set in the Jackrabbit configuration file; this allows using a single configuration file for all the cluster instances. The properties add a sticker to the AdminCentral interface to provide a clear visual clue about the type of the instance and environment the user is currently interacting with. Example setting: This configuration renders a sticker with the value set in the environment property and the name of the instance. The instance name is taken from the MagnoliaConfigurationProperties#MAGNOLIA_WEBAPP property. (warning) All properties must be set in order to render the sticker. default is 5 The number of parallel recognition threads for image recognition. In addition to these examples you can define arbitrary properties (magnolia.home is one example). Properties can be used to prefixother path-like properties. For example, in magnolia.cache.startdir=${magnolia.home}/cache the property magnolia.cache.startdir is set by substituting the root directory with property magnolia.home. See WAR file with multiple configurations on how to use properties to target a deployment environment. Extending configuration You can extend a configuration by defining an extends property and setting its value to the source configuration you want it to inherit. The target configuration inherits everything from the source and adds its own exceptions. This can save time and effort as you only need to define exceptions explicitly. The mechanism is only available in the config repository. In the example below, the sportstation site definition extends the travelsite definition. The definition inherits all configuration from the travel configuration and adds its own domains, internationalization and URI-to-repository mappings, theme and templates. The extends property can point to the source configuration with an absolute or relative path. Node nameValue Extending is additive by default, which means that configuration specified at the extending level is added to the inherited configuration. Setting the extends property to override changes this behavior. An override allows the extending node to completely remove the inherited content and replace it with its own content entries. In the example below, the travel site definition supports two locales, en (English) and de (German), whereas site travel-fr is targeted to French speakers only. The French site extends travel. It inherits all configuration except the locales. An override under the locales node removes en and de. Only the French locale fr defined at this level is applied. This means that authors can enter only French content on the French site. Node nameValue Observation is a feature of the Java Content Repository that enables applications to register interest in events that describe changes to a workspace. The applications can then monitor and respond to those events. The observation mechanism dispatches events when a persistent change is made to the workspace. Magnolia uses observation heavily. For instance, observation is used to reload module configurations and to reload all objects provided by the FactoryUtil. To use observation you must at least specify the workspace, the path to the node which should be observed, and an event listener. The event listener's onEvent() method is called whenever there are changes in the observed node. Magnolia provides a helper class to assist you in using observation for your project. Use WorkspaceEventListenerRegistration ObservationUtil  is deprecated since Magnolia 5.4.6. Most configuration is stored in the config workspace. To transfer the repository stored configuration into a Java object, a mechanism called Node2Bean is used. Node2Bean populates a Java Bean from the content of a repository node including sub nodes. Note that configuration details are not restricted to the config node. The following table shows where the Node2Bean mechanism is currently used. Where it is usedWhat is configured Basic server configuration: instance type (author, public), default base URL and default extension Mapping virtual URIs to pages. Filter chain Messages for localized labels and descriptions in the UI. Commands and command catalogs. Module definitions Builds a component configured in the repository. Guice Provider that creates an object by reading it from the repository. RendererProvider that instantiates a renderer from a configuration node. TemplateDefinitionProvider that instantiates a template from a configuration node. For developers, module configuration (ModuleManagerlmpl) using the module class is the most important current usage of Content2Bean. Node2Bean in module instances Module configuration data is transferred into a Bean from /modules/<module name>/config. The Bean class to build is defined in the module descriptor XML file. <!DOCTYPE module SYSTEM "module.dtd"> <displayName>Magnolia Samples Module </displayName> Components. If a path in the config workspace is given rather than a concrete class name, then Node2Bean is used to build the component instance. # Map to a path in the config workspace info.magnolia.cms.i18n.I18nContentSupport = /server/i18n/content Additional items such as components, templates and virtual URI mappings are configured at module level. Data types Node2Bean analyses the bean's "setter" and "adder" methods using introspection and uses them if a suitable configuration value is available. With "adder" methods (using the singular form of the node names) you can populate collections and maps. With this mechanism, Node2Bean can support all possible data types: • Simple data types like String, int, long, float, double, boolean (to specify "true" you can use "true", TRUE", or "1") with the suitable "setter" method • Other data types matching the "setter" method's signature • Collections with String values or other data types by specifying a class property • Maps with keys and values as Strings or other data types by specifying a class property All sub elements are also built using Node2Bean. The class used to instantiate an object through the Node2Bean mechanism is determined through reflection or by explicitly referencing a class in the class node data. By referencing a specific class you can override Magnolia default configuration and implement your own caching behavior, security mechanism and so on. Numbered items: 1. config: Entry point of the transformation. In the module descriptor SampleConfig class is used. Set text and number properties. 2. sub: Subbean. The class is determined using reflection if it is not explicitly defined. 3. items: Collection. The corresponding add method is used to determine the class and populate the collection if existing. 4. item2: Special item with its own class and additional properties. 5. parameters: Collection of key-value pairs. Simple data types Values with simple data types must be defined as properties. Each property name must match its respective setter method. To configure a collection you have to create a sub node and a suitable "setter" method: • All properties of the collection node will create simple String entries in the collection. The properties' names are not used by Node2Bean, only the values. • All sub nodes of the collection node will be treated as objects of the type specified in the class property in the sub node. If no class attribute is specified, a Map will be created instead. The sub nodes' names are not used by Node2Bean. • All sub nodes of the collection node will be treated as maps unless they have a ".". The properties' names and the sub nodes' names are not used by Node2Bean. The rules to populate a map are the same as with collections, except that the properties' names and the sub nodes' names are used as key values. Example: cache configuration The configuration creates an object of type  CacheConfiguration This class needs public suitable setter or adder methods. public void setCachePolicy(CachePolicy cachePolicy); public void setFlushPolicy(FlushPolicy flushPolicy); public void setBrowserCachePolicy(BrowserCachePolicy browserCachePolicy); public void setExecutors(Map executors); public void addExecutor(String name, CachePolicyExecutor executor); Note that all necessary setters are available. For the executors node there are setter and adder methods. As the adder is more specific the setExecutors method will not be used. Node nameValue This is what happens with setCachePolicy(CachePolicy cachePolicy). Node nameValue Since there is a class property defined, let's look at the Default  class that Node2Bean uses to create the new object. public void setVoters(VoterSet voters); Now let's have a look at the addExecutor (String name, CachePolicyExecutor executor) method in CacheConfiguration and the configuration: Node nameValue As this method has two arguments, the node name bypass is passed as the first argument and a Bypass object as the second argument. Because CachePolicyExecutor is an interface, the implementing class is specified. Voters are used in Magnolia whenever configuration values are not assigned at startup but instead depend on rules. For example the cache module has to determine if a requested resource may be cached or not. The rules to determine values should be configurable. The rules are user-defined using voters which evaluate established criteria by determining true or false of each rule. Voters are currently used for: • Filter configuration: uses voters to determine whether a filter should be executed or bypassed. • Cache configuration: uses voters to determine whether a file should be cached or not. The basic concept of voters uses Voter classes which calculate an int vote value, where positive (1, 2, 3, ...) results are treated as "yes" or "true" and (0, -1, -2, ...) results are treated as "no" or "false". If you have a set of voters, then the result of a voting is the largest absolute result. If there are two voters with the same absolute result, then the one with the higher positive value will be taken. Vote resultsVoterSet result -3, 0, 2-3 -3, 0, 33 -3, 0, 44 For most of the "real world" voters only boolean results make sense. These boolean voters return "1" for a "true" and "0" for a "false" result. Voter examples noneYesChecks if the current user is authenticated. • allow: comma separated lists of allowed extensions. • deny: comma separated lists of denied extensions. • Returns false if the extension is not a valid mimetype (as configured in config:/server/MIMEMapping. • Returns false if the allow list exists, but the extension is not in the allow list. • Returns false if the deny list exists and the extension is in the deny list. • Returns true in any other cases. For further information, please see the voters  package summary.
global_01_local_1_shard_00001926_processed.jsonl/55185
Does This Hold Up A comedy podcast about movies. Jamie and TJ review films from the past and find out if they still hold up. Does This Hold Up Ep. 156 - Summer Movie Countdown July 10th, 2016 This week we count down the nations Top 20 Summer Block Busters of all time ever.  We are just sick of pumping so much diesel.
global_01_local_1_shard_00001926_processed.jsonl/55191
Worship as a lifestyle. Ok so lets take a knight in a kings court. Now this man has most definitely trained most of his life to be good with a sword, a horse, a fist, most probably he is quite good at drinking and wooing and farting and all those other manly exploits that gets you respect. But also these men were trained in honour, respect and an amazing sense of authority, both wielding it but also submitting to it. In some knights lives they have dedicated their lives, paid homage to, bent the knee, sworn their swords and lives over to another man. This means he fights the kings battles, he goes to the kings parties, he trains so that he can do both and he is at the beck and call of his liege. Now, to be in a position of being able to fight, he needs to be always ready, fit, in the right mind both to fight and to take orders. So when he wakes up in the morning and shines his shoes to look right and sharpen his sword to slice through tendons, he is acting and taking on the attitude of homage. When he greets a lady, when he trains a squire, when he wins a tournament for his king, it brings his king honour and glory, he worships the king with his life. Every moment can speak well of the king, or not well of the king. and he worships his king with good choices and dishonours his king with bad choices. Some of the words used in scripture to describe our worship of God holds with them the idea of paying homage as in the feudal systems of yesteryear. Lately i have heard rumblings and quite aggressive negations  towards the idea that you can live lives of worship to God. That you can’t work a secular job in worship, you can’t train your kids in worship, you can’t pray and intercede as worship to God. That you can only worship in corporate or individual song. As if worship was an event, a specific action that could not be included in other actions. I don’t understand that ideal if homage and bending the knee is an attitude of the heart. Which, in that place of a knight is an action. A soldier can live its life in worship and service of his king. Or he can serve his king religiously with rebellion in his heart. Now do I think you can mow the lawn as worship to God? Yes and No. If its a selfless act of love then yes. You are in Gods will, you are serving others like they like to be loved, you can even be obedient during. But you can also mow the lawn with grumbling. You can also mow the lawn in vengeance, in pride, in rejection. Where do i find this biblically? A few places. Abraham – took his son to kill him. He was not singing and dancing. We was not playing a guitar or burning incense. But his actions praised Gods name, his faithfulness and sprouted from an attitude of his heart. A trusting heart. Noah – built a giant boat. And i bet sometimes he wasn’t building out of worship. But ultimately he was, he built because he trusted God. Ehud – Stabbed a fat king because God wanted to liberate his people. He murdered a guy in worship, he bowed the knee, he obeyed, he paid homage to his king through assassination. Just like knights of old would conquer in the name of someone else. Christ – did everything because he saw his father doing. He submitted to the fathers will, he pay the ultimate homage by taking the position of servant even to death. A life of worship. He gave his father ‘worth’. Now i understand some of this reaction to lives of worship would come from the issue that you can’t take a dump or throw up in worship of God. Or even if everything is worship, then it loses meaning because theres nothing special. But my understanding is, that you can do anything for God and it not be worship. If we go to church and sing songs to God mechanically with no feeling, no engagement – is that worship? No. Or if we decide to get a job that provides all the money we could ever imagine, but means our relationship with God and His people grows refrigerator cold, is that worship? no. But what is we decide to move to a different country because our King asked us too, and live our lives in service of the broken and lost. Are we paying homage to our king? Yes. we would be living lives of worship, because it is not just an action, it is an attitude. You tell me about your faith, I will show you my works. Both attitude and action made out of the attitude. So whats the point of singing praise to God? God should be praised. But why do it together? Because God designed us to worship him together, and some of us can’t move to different countries and work with the broken there. When we pray together powerful presence is found. When we worship and sing truth – God has designed melody and the human spirit to harmonise in unity to give him space to change the world. Worship in the context of corporate singing and praying can we used as a sharpened weapon in warfare. Or a hothouse of healing and revelation. Or a hydroponics lab of repentance and faith that speaks directly to our hearts. We can and should be living lives of worship of our king. Sharpen your horse. Saddle your horse. And honour the women folk. 4 thoughts on “Worship as a lifestyle. Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/55198
Dribbble + Photoshop + Susan Kare • Save Dribbble + Photoshop + Susan Kare dribbbe photoshop susankare icons event Icons by Susan Kare. We're throwing a big event with the Adobe Photoshop team in two weeks. Special guest speaker, the legendary icon and type designer of the original Macintosh (and much more), Susan Kare. We're beyond excited. The bad news? Limited space and it's already at capacity: http://nvite.co/e5a7 keyboard shortcuts: L or F like
global_01_local_1_shard_00001926_processed.jsonl/55212
Tags: speech recognition Refereed Publications 1. A. Jitendra, A. Joshi, and e., "Two-stream indexing for spoken web search", InProceedings, Proceedings of the 20th international conference companion on world wide web, April 2011, 925 downloads. 1. Y. Shi, "An Investigation of Linguistic Information for Speech Recognition Error Detection", PhdThesis, University of Maryland, Baltimore County, October 2008, 2839 downloads. 1. M. A. Grasso, "The long-term adoption of speech recognition in medical applications", Proceedings, Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems, June 2003, 12 citations. 1. M. A. Grasso, "Speech Input in Multimodal Environments: Effects of Perceptual Structure on Speed, Accuracy, and Acceptance", PhdThesis, May 1997, 2331 downloads, 1 citation. 2. M. A. Grasso and T. Finin, "Task Integration in Multimodal Speech Recognition Environments", Article, Crossroads, April 1997, 2197 downloads, 10 citations. 1. M. A. Grasso, "Automated speech recognition in medical applications", Article, MD Computing, January 1995, 15 citations. Non-Refereed Publications 1. M. A. Grasso, D. Ebert, and T. Finin, "The Effect of Perceptual Structure on Multimodal Speech Recognition Interfaces", TechReport, University of Maryland, Baltimore County, January 1998, 564 downloads.
global_01_local_1_shard_00001926_processed.jsonl/55232
Want to directly email someone at M Dixon but don't know their address? Don't sweat it, we've got you covered. Get the email address format for people working at We're still trying to figure out the format for email addresses at m-dixon.com for sure. We've got the following addresses though for employees currently at the firm. Does this get you any further on your quest? score 0
global_01_local_1_shard_00001926_processed.jsonl/55233
join the elite We'd love to hear from you From setting up new grow facilities to current production challenges and threats, we're here to listen and help you. Let's build your successful cannabis operation in California and all other legalized US states. Telephone: (707)241-4947 Email:  [email protected] Feel free to reach us via phone at (707)241-4947 or email to  [email protected].
global_01_local_1_shard_00001926_processed.jsonl/55238
Does the prospect of giving evidence at tribunal make you shudder? Are you scared you’ll say the wrong thing, or that you’ll cave in when cross-examined? If so, then congratulations, you’re a human being! Being a witness is an unenviable task, but it can be made easier by observing the following steps. Keep cool: Giving evidence is usually a nerve-racking experience and most people dread being cross-examined, but if you can keep a lid on your nerves then you’re half way there. You can take heart from the fact that employment tribunals are supposed to be less formal than courts. You’re not giving evidence to a jury, but to a panel that favours confident witnesses who provide clear answers to questions asked. Your representatives (preferably one of our own) will brief you on the areas you’re likely to be questioned on and guide you on how best to deal with such questioning. They will also advise you of any questions they are likely to ask you so you’re not taken by surprise and will ensure you are not asked inappropriate questions by the other side. Consult the bundle: Whilst giving evidence, you’ll be referred to the bundle by both representatives. Familiarise yourself with the content in advance of the hearing so that documents do not take you by surprise and knock you off your stride. Take responsibility: Where you have direct knowledge of an issue or were actually involved in it, try not to use the word “we” as the panel is only interested in your evidence. If you were the Appeal Officer, it should have been you who decided whether or not to reject the appeal, not you and a number of others. Using “we” in such circumstances suggests that others had a hand in a decision and could undermine its perceived fairness. Slow down: Nothing tries a panel’s patience more than having to repeatedly ask a witness to slow down whilst giving evidence. Watch panel members when you have answered a question and if there is smoke coming off their pencils, take your foot off the pedal. It is crucial that they get an accurate note of your evidence. Think before you speak: Listen carefully to questions that are put to you and pause to think before you answer. The panel is more likely to be swayed by a coherent and considered answer than a rushed one that bears little or no relevance to the question asked. If you do not understand the question, ask the representative to repeat it. In fact, you should do this even if you do understand the question but just want more time to think. Keep it brief: Don’t waffle. The more you say, the more chance there is of you losing the thread and contradicting yourself. Don’t surrender to the temptation to fill silences that often follow the end of answers. These occur because representatives and the panel are busily taking notes of what you’ve just said. Lend a hand: Try not to be difficult, uncooperative, or to come across as guarded. The more you can show the tribunal that you’re answering questions the best you can, the more persuasive your evidence is likely to be. By all means, deny anything put to you during cross-examination that is untrue, but avoid being aggressive with it. Answer to the panel: It may feel unnatural, but direct answers to all questions to the panel, even when they are asked by a representative. The panel will be sitting a different angle to you and need to hear what you’ve got to say. Watch out: A key objective of the other side’s representative is to make you contradict yourself. Don’t be fooled by the Mr Nice Guy act. Their job is to catch you out, so be prepared. No surprises: Make sure you don’t hold anything back from your representative. If you’ve done something you feel may affect the case negatively, own up at the earliest opportunities. Months of preparation can go to waste if you reveal for the first time on the stand something that could undermine your case. Employee Management Ltd has defended employers in over 3,000 employment tribunals, but advocacy is only one element of our comprehensive range of employment law services. For a confidential, no-obligation discussion about a pending case, or any other employment law issue, please contact one of our HR consultants without delay.
global_01_local_1_shard_00001926_processed.jsonl/55245
From Wikipedia, the free encyclopedia Jump to navigation Jump to search Kakaye and Manthara.jpg Kakaye and Manthara Manthara (Sanskrit: मंथरा; lit: "humpbacked") in the Hindu epic Ramayana is the maid who convinced Queen Kaikeyi that the throne of maharaja belonged to her son Bharata and that her step-son—crown-prince Rama (the hero of the Ramayana)—should be exiled from the kingdom. Appearance and history[edit] Manthara is said to be hunch-backed, ugly & antagonistic in appearance. Manthara, it appears, is an expert talker and a cunning woman who can manipulate her way to get what she wants. When Rama is going to become the king of Ayodhya, many deities consulted Lord Vishnu. They said "Rama is going to become king. He will enjoy his life. But the reason behind his introduction is to kill evil." Lord Vishnu expressed his helplessness, so they consulted Saraswathi,the Goddess of education. She went in the form of Manthara (Kekaya)and sent Rama to forests. Appearance in other versions[edit] Dasharatha being asked in court to banish Rama by Kaikeyi and her humpbacked female slave Manthara • The Telugu version Sri Ranganatha Ramayanam mentioned a small story involving young Rama and Manthara in Balakanda. When Rama was playing with a ball and a stick, suddenly Manthara threw the ball far away from Rama. In anger, Rama struck her on the knee with the stick and her knee was broken. This message was conveyed to king Dasharatha by Kaikeyi. The king decides to send Rama and his other sons to school. This incident makes the king think about his responsibility of educating his sons, so that they can learn and become wise. Manthara had developed a kind of antagonism towards Rama and was waiting for an opportunity to take revenge against him. It is also said that during Rama's childhood Kaikeyi loved Rama more than Bharata and spend more time with him. This made Manthara jealous of Rama. • In 2015 Amish Tripathi's novel Ram: Scion of Ikshvaku (first book of Ram Chandra Series) portrayed Manthara as a rich women, even richest in Sapt Sindhu who was a friend of Kaikeyi.[1] Poisoning Kaikeyi's mind[edit] As family servant of Kaikeyi, Manthara lived with her from the time of her birth. When she hears that King Dasharatha is planning to make his eldest son, Rama, prince regent (rather than Bharata, his child by Kaikeyi), she flies into a rage and reports the news to Kaikeyi. Kaikeyi is initially pleased and hands Manthara a pearl necklace. Manthara's scheme[edit] Dasharatha promises to banish Rama per Kaikeyi's wishes. A folio from Ayodhya Kand manuscript Manthara reminds Kaikeyi of the two boons Dasharatha had given her when she had once saved his life in a celestial battle. Kaikeyi had kept these boons for later and Manthara declares that this is the right time to ask for them. She advises Kaikeyi to lie in her room wearing soiled clothes and no ornaments. She should weep and cry, pretending anger. When Dasharatha would come to console her, she should immediately ask for the boons. The first boon would be that Bharata would be made the king. The second boon would be that Rama should be sent into the forest for exile for fourteen years. Manthara reckons that the fourteen-year banishment would be long enough for Bharata to consolidate his position in the Empire and weave his way into people's hearts. Rebuked by Shatrughna[edit] Manthara appears only once in the Ramayana after Rama's banishment. Having been rewarded by Kaikeyi with costly clothing and jewels, she is walking in the palace gardens when Bharata and his half-brother Shatrughna come upon her. Seeing her, Shatrughna flies into a violent rage over Rama's banishment and assaults her murderously. Kaikeyi begs Bharata to save her, which he does, telling Shatrughna that it is a sin to kill a woman and that Rama would be furious with them both if he does such a thing. He relents and the brothers leave, while Kaikeyi attempts to comfort Manthara. Portrayal in film and television[edit] In Ramanand Sagar's highly successful television series Ramayan, Manthara is played by veteran character actress Lalita Pawar. In this TV series, it is shown that when Rama returns to Ayodhya after exile, he goes to meet Manthara, who has been imprisoned in a dark room. Seeing Rama, Manthara falls into his feet and apologizes for all her sins on which Rama forgives her. 1. ^ "'The Scion of Ikshvaku' is quite the 'Un-Ramayana'",, 2015-06-28
global_01_local_1_shard_00001926_processed.jsonl/55248
Flight Behavior From Wikipedia, the free encyclopedia Jump to navigation Jump to search Flight Behavior Flight Behaivor original cover.jpg 1st edition cover AuthorBarbara Kingsolver CountryUnited States LanguageAmerican English Publication date Preceded byThe Lacuna  Followed byMr Occam's Razor  Flight Behavior[1] is a 2012 novel by Barbara Kingsolver.[2] It is her seventh novel, is a New York Times Bestseller[3], and was declared "Best book of the year" by the Washington Post and USA Today.[4] In Flight Behavior, alteration of monarch butterflies migration symbolises a changing world.[5] Dellarobia Turnbow is a 28-year-old discontented housewife living with her poor family on a farm in rural Tennessee. On a hike, on which she is planning to meet a telephone repairman to begin an affair with him, the heroine finds that the valley behind their house is covered in millions of monarch butterflies. As the news of her discovery spreads, she receives a visit from Ovid Byron, a university professor who studies the monarchs, and warns that although they are beautiful, they are a disturbing symptom of global climate change, displaced from their typical wintering location in Mexico, and that they may not survive the harsh Tennessee winter. Critical reception[edit] Writing in UK Sunday newspaper The Observer, Robin McKie found, "In general, Flight Behaviour is an impressive work. It is complex, elliptical and well-observed. Dellarobia and her kin come over as solid but believable individuals, outlined with respect and balance. Even Cub, her much put-upon simpleton of a husband, and his dreadful, manipulative mother Hester, are ultimately accorded sympathy". McKie was less impressed with Kingsolver’s portrayal, "almost to the point of overkill", of the Turnbow family’s poverty. "However", he added, "it is the issue of climate change that hangs, unspoken, over proceedings", and concluded by saying, "[...] Kingsolver makes her message clear. If only a few more scientists started screaming on TV and radio then we might have a chance to avoid the worst of the calamities that lie ahead".[6] In The Daily Telegraph, Beth Jones noted that, "Kingsolver has carved a career from examining social issues in her novels, from economic inequality to racism. In Flight Behaviour, it's the causes and consequences of climate change that form the novel's core. As lepidopterist Ovid Bryon shouts: 'For God's sake… the damn globe is catching fire and the islands are drowning. The evidence is staring [you] in the face'". Jones found that, "[...] in Flight Behaviour she once again manages to make a global crisis seem relevant through tiny domestic details", before concluding that, "The result is a compelling plot with lyrical passages and flashes of humour. Absorbing and entertaining, Flight Behaviour engages the reader in the quotidian details of Dellarobia's life, while insisting that we never forget the crumbling world beneath her, and our, feet".[7] Reviewing the book in The New York Times, Dominique Browning wrote of "the intricate tapestry of Barbara Kingsolver's majestic and brave new novel", adding, "Her subject is both intimate and enormous, centered on one woman, one family, one small town no one has ever heard of — until Dellarobia stumbles into a life-altering journey of conscience. How do we live, Kingsolver asks, and with what consequences, as we hurtle toward the abyss in these times of epic planetary transformation? And make no mistake about it, the stakes are that high. Postapocalyptic times, and their singular preoccupation with survival, look easy compared with this journey to the end game. Yet we must also deal with the pinching boots of everyday life. [...] One of the gifts of a Kingsolver novel is the resplendence of her prose. She takes palpable pleasure in the craft of writing, creating images that stay with the reader long after her story is done".[8] See also[edit] 1. ^ Published in the United Kingdom under the title Flight Behaviour. 2. ^ Liz Jensen, "Flight Behaviour by Barbara Kingsolver – review", The Guardian, 2 November 2012, (page visited on 8 April 2018). 3. ^ Charis Perkins, "Barbara Kingsolver talks Trump, #MeToo and the magic of Australia", The Australian Financial Review, 28 March 2018 (page visited on 8 April 2018). 4. ^ Donahue, Deirdre; McClurg, Jocelyn; Memmott, Carol; Minzesheimer, Bob; Wilson, Craig (19 December 2012). "10 Books We Loved Reading in 2012". USA Today. Retrieved 11 July 2013. 5. ^ Gemma Kappala-Ramsamy, "Barbara Kingsolver: 'Motherhood is so sentimentalised in our culture'", The Guardian, 11 May 2013 (page visited on 2 April 2018) 6. ^ McKie, Robin (11 November 2012). "Flight Behaviour by Barbara Kingsolver – review". The Observer. London. Retrieved 15 October 2015. 7. ^ Jones, Beth (1 November 2012). "Flight Behaviour by Barbara Kingsolver: review". The Daily Telegraph. London. Retrieved 15 October 2015. 8. ^ Browning, Dominique (9 November 2012). "Sunday Book Review, The Butterfly Effect: 'Flight Behavior,' by Barbara Kingsolver". The New York Times. New York City. Retrieved 15 October 2015.
global_01_local_1_shard_00001926_processed.jsonl/55249
From Wikipedia, the free encyclopedia   (Redirected from Informal fallacy) Jump to navigation Jump to search A fallacy is the use of invalid or otherwise faulty reasoning, or "wrong moves"[1] in the construction of an argument.[2][3] A fallacious argument may be deceptive by appearing to be better than it really is. Some fallacies are committed intentionally to manipulate or persuade by deception, while others are committed unintentionally due to carelessness or ignorance. The soundness of legal arguments depends on the context in which the arguments are made.[4] Fallacies are commonly divided into "formal" and "informal". A formal fallacy can be expressed neatly in a standard system of logic, such as propositional logic,[2] while an informal fallacy originates in an error in reasoning other than an improper logical form.[5] Arguments containing informal fallacies may be formally valid, but still fallacious.[6] A special case is a mathematical fallacy, an intentionally invalid mathematical proof, often with the error subtle and somehow concealed. Mathematical fallacies are typically crafted and exhibited for educational purposes, usually taking the form of spurious proofs of obvious contradictions. Fallacies are defects that weaken arguments. Fallacious arguments are very common and can be persuasive in common use. They may be even "unsubstantiated assertions that are often delivered with a conviction that makes them sound as though they are proven facts".[7] Informal fallacies in particular are found frequently in mass media such as television and newspapers.[8] It is important to understand what fallacies are so that one can recognize them in either one's own or others' writing. Avoiding fallacies will strengthen one's ability to produce strong arguments. It can be difficult to evaluate whether an argument is fallacious, as arguments exist along a continuum of soundness and an argument that has several stages or parts might have some sound sections and some fallacious ones.[9] "Fallacious arguments usually have the deceptive appearance of being good arguments."[11] Recognizing fallacies in everyday arguments may be difficult since arguments are often embedded in rhetorical patterns that obscure the logical connections between statements. Informal fallacies may also exploit the emotional, intellectual, or psychological weaknesses of the audience. Recognizing fallacies can develop reasoning skills to expose the weaker links between premises and conclusions to better discern between what appears to be true and what is true. Argumentation theory provides a different approach to understanding and classifying fallacies. In this approach, an argument is regarded as an interactive protocol between individuals that attempts to resolve their disagreements. The protocol is regulated by certain rules of interaction, so violations of these rules are fallacies. Fallacies are used in place of valid reasoning to communicate a point with the intention to persuade. Examples in the mass media today include but are not limited to propaganda, advertisements, politics, newspaper editorials and opinion-based “news” shows. Systems of classification[edit] Because of their variety of structure and application, fallacies are challenging to classify so as to satisfy all practitioners. Fallacies can be classified strictly by either their structure or their content, such as classifying them as formal fallacies or informal fallacies, respectively. The classification of informal fallacies may be subdivided into categories such as linguistic, relevance through omission, relevance through intrusion, and relevance through presumption.[12] On the other hand, fallacies may be classified by the process by which they occur, such as material fallacies (content), verbal fallacies (linguistic), and again formal fallacies (error in inference). In turn, material fallacies may be placed into the more general category of informal fallacies. Yet, verbal fallacies may be placed in either formal or informal classifications; compare equivocation which is a word or phrase based ambiguity, e. g. "he is mad", which may refer to either him being angry or clinically insane, to the fallacy of composition which is premise and inference based ambiguity, e. g. "this must be a good basketball team because each of its members is an outstanding player".[13] Even the definitions of the classes may not be unique. For example, Whately treats material fallacies as a complement to logical fallacies, which makes them synonymous to informal fallacies, while others consider them to be a subclass of informal fallacies, like mentioned above. Aristotle was the first to systematize logical errors into a list, as being able to refute an opponent's thesis is one way of winning an argument.[14] Aristotle's "Sophistical Refutations" (De Sophisticis Elenchis) identifies thirteen fallacies. He divided them up into two major types, linguistic fallacies and non-linguistic fallacies, some depending on language and others that do not depend on language.[15][16] These fallacies are called verbal fallacies and material fallacies, respectively. A material fallacy is an error in what the arguer is talking about, while a verbal fallacy is an error in how the arguer is talking. Verbal fallacies are those in which a conclusion is obtained by improper or ambiguous use of words.[17] An example of a language dependent fallacy is given as a debate as to who amongst humanity are learners: the wise or the ignorant.[18] A language-independent fallacy is for example: 1. "Coriscus is different from Socrates." 2. "Socrates is a man." 3. "Therefore, Coriscus is different from a man."[19] Whately's grouping[edit] Richard Whately defines a fallacy broadly as, "any argument, or apparent argument, which professes to be decisive of the matter at hand, while in reality it is not".[20] Whately divided fallacies into two groups: logical and material. According to Whately, logical fallacies are arguments where the conclusion does not follow from the premises. Material fallacies are not logical errors because the conclusion does follow from the premises. He then divided the logical group into two groups: purely logical and semi-logical. The semi-logical group included all of Aristotle's sophisms except:ignoratio elenchi, petitio principii, and non causa pro causa, which are in the material group.[21] Other systems of classification[edit] Formal fallacy[edit] A formal fallacy, deductive fallacy, logical fallacy or non sequitur (Latin for "it does not follow") is a flaw in the structure of a deductive argument which renders the argument invalid. The flaw can neatly be expressed in standard system of logic.[2] Such an argument is always considered to be wrong. The presence of the formal fallacy does not imply anything about the argument's premises or its conclusion. Both may actually be true, or may even be more probable as a result of the argument; but the deductive argument is still invalid because the conclusion does not follow from the premises in the manner described. By extension, an argument can contain a formal fallacy even if the argument is not a deductive one: for instance, an inductive argument that incorrectly applies principles of probability or causality can be said to commit a formal fallacy.[dubious ] "Since deductive arguments depend on formal properties and inductive arguments don't, formal fallacies apply only to deductive arguments."[5] A logical form such as "A and B" is independent of any particular conjunction of meaningful propositions. Logical form alone can guarantee that given true premises, a true conclusion must follow. However, formal logic makes no such guarantee if any premise is false; the conclusion can be either true or false. Any formal error or logical fallacy similarly invalidates the deductive guarantee. Both the argument and all its premises must be true for a statement to be true. The term logical fallacy is in a sense self-contradictory, because logic refers to valid reasoning, whereas a fallacy is the use of poor reasoning. Therefore, the term formal fallacy is preferred. In informal discourse however, logical fallacy is used to mean an argument which is problematic for any reason. The term non sequitur denotes a general formal fallacy, often meaning one which does not belong to any named subclass of formal fallacies like affirming the consequent. Common examples[edit] Ecological fallacy[edit] An ecological fallacy is committed when one draws an inference from data based on the premise that qualities observed for groups necessarily hold for individuals; for example, "if countries with more Protestants tend to have higher suicide rates, then Protestants must be more likely to commit suicide."[22] The fallacy fork[edit] Maarten Boudry argues that formal, deductive fallacies rarely occur in real life and that arguments that would be fallacious in formally deductive terms are not necessarily so when context and prior probabilities are taken into account, thus making the argument defeasible and inductive. For a given fallacy, one must either characterize it by means of a deductive argumentation schema, which rarely applies (the first prong of the fork) or one must relax definitions and add nuance to take the actual intent and context of the argument into account (the other prong of the fork). To argue, for example, that one became nauseous after eating a mushroom because the mushroom was poisonous could be an example of the post hoc ergo propter hoc fallacy unless one were actually arguing inductively and probabilistically that it is likely that the mushroom caused the illness since some mushrooms are poisonous, it is possible to misidentify a mushroom as edible, one doesn't usually feel nauseous, etc.[23] Informal fallacy[edit] In contrast to a formal fallacy, an informal fallacy originates in a reasoning error other than a flaw in the logical form of the argument.[5] A deductive argument containing an informal fallacy may be formally valid,[6] but still remain rationally unpersuasive. Nevertheless, informal fallacies apply to both deductive and non-deductive arguments. Though the form of the argument may be relevant, fallacies of this type are the "types of mistakes in reasoning that arise from the mishandling of the content of the propositions constituting the argument".[24] Faulty generalization[edit] A special subclass of the informal fallacies is the set of faulty generalizations, also known as inductive fallacies. Here the most important issue concerns inductive strength or methodology (for example, statistical inference). In the absence of sufficient evidence, drawing conclusions based on induction is unwarranted and fallacious. With the backing of empirical evidence, however, the conclusions may become warranted and convincing (at which point the arguments are no longer considered fallacious).[citation needed] Hasty generalization[edit] For instance, hasty generalization is making assumptions about a whole group or range of cases based on a sample that is inadequate (usually because it is atypical or just too small). Stereotypes about people ("frat boys are drunkards", "grad students are nerdy", "women don’t enjoy sports", etc.) are a common example of the principle. Hasty generalisation often follows a pattern such as: X is true for A. X is true for B. Therefore, X is true for C, D, etc. While never a valid logical deduction, if such an inference can be made on statistical grounds, it may nonetheless be convincing. This is because with enough empirical evidence, the generalization is no longer a hasty one. Relevance fallacy[edit] The fallacies of relevance are a broad class of informal fallacies (see the navbox below), generically represented by missing the point: Presenting an argument, which may be sound, but fails to address the issue in question. Argumentum ex silentio[edit] An argument from silence features an unwarranted conclusion advanced based on the absence of data. Examples of informal fallacies[edit] Post hoc (false cause)[edit] This fallacy gets its name from the Latin phrase "post hoc, ergo propter hoc," which translates as "after this, therefore because of this." Definition: Assuming that because B comes after A, A caused B. Sometimes one event really does cause another one that comes later—for example, if I register for a class, and my name later appears on the roll, it's true that the first event caused the one that came later. But sometimes two events that seem related in time aren't really related as cause and event. That is, correlation isn't the same thing as causation. Slippery slope[edit] Definition: The arguer claims that a sort of chain reaction, usually ending in some dire consequence, will take place, but in fact there is not enough evidence for that assumption. The arguer asserts that if we take even one step onto the "slippery slope," we will end up sliding all the way to the bottom; he or she assumes we can't stop halfway down the hill.[25] False analogy[edit] This error in reasoning occurs when claims are supported by unsound comparisons, hence the false analogy's informal nickname of the "apples and oranges" fallacy.[26] Measurement fallacy[edit] Some of the fallacies described above may be committed in the context of measurement. Where mathematical fallacies are subtle mistakes in reasoning leading to invalid mathematical proofs, measurement fallacies are unwarranted inferential leaps involved in the extrapolation of raw data to a measurement-based value claim. The ancient Greek Sophist Protagoras was one of the first thinkers to propose that humans can generate reliable measurements through his "human-measure" principle and the practice of dissoi logoi (arguing multiple sides of an issue).[27][28] This history helps explain why measurement fallacies are informed by informal logic and argumentation theory. Knowledge value measurement fallacy[edit] Increasing availability and circulation of big data are driving proliferation of new metrics for scholarly authority,[29][30] and there is lively discussion regarding the relative usefulness of such metrics for measuring the value of knowledge production in the context of an "information tsunami".[31] For example, anchoring fallacies can occur when unwarranted weight is given to data generated by metrics that the arguers themselves acknowledge is flawed. For example, limitations of the journal impact factor (JIF) are well documented,[32] and even JIF pioneer Eugene Garfield notes, "while citation data create new tools for analyses of research performance, it should be stressed that they supplement rather than replace other quantitative-and qualitative-indicators."[33] To the extent that arguers jettison acknowledged limitations of JIF-generated data in evaluative judgments, or leave behind Garfield's "supplement rather than replace" caveat, they court commission of anchoring fallacies. A naturalistic fallacy can occur for example in the case of sheer quantity metrics based on the premise "more is better"[31] or, in the case of developmental assessment in the field of psychology, "higher is better."[34] A false analogy occurs when claims are supported by unsound comparisons between data points. For example, the Scopus and Web of Science bibliographic databases have difficulty distinguishing between citations of scholarly work that are arms-length endorsements, ceremonial citations, or negative citations (indicating the citing author withholds endorsement of the cited work).[29] Hence, measurement-based value claims premised on the uniform quality of all citations may be questioned on false analogy grounds. For the next example let us consider Academic Analytics' Faculty Scholarly Productivity Index, which purports to measure overall faculty productivity, yet the tool does not capture data based on citations in books. This creates a possibility that low productivity measurements using the tool may constitute argument from silence fallacies, to the extent that such measurements are supported by the absence of book citation data. Ecological fallacies can be committed when one measures scholarly productivity of a sub-group of individuals (e.g. "Puerto Rican" faculty) via reference to aggregate data about a larger and different group (e.g. "Hispanic" faculty).[35] Intentional fallacy[edit] Sometimes a speaker or writer uses a fallacy intentionally. In any context, including academic debate, a conversation among friends, political discourse, advertising, or for comedic purposes, the arguer may use fallacious reasoning to try to persuade the listener or reader, by means other than offering relevant evidence, that the conclusion is true. Examples of this include the speaker or writer:[36] 1. Diverting the argument to unrelated issues with a red herring (Ignoratio elenchi) 2. Insulting someone's character (argumentum ad hominem) 3. Assume the conclusion of an argument, a kind of circular reasoning, also called "begging the question" (petitio principi) 4. Making jumps in logic (non-sequitur) 5. Identifying a false cause and effect (post hoc ergo propter hoc) 6. Asserting that everyone agrees (argumentum ad populum, bandwagoning) 7. Creating a "false dilemma" ("either-or fallacy") in which the situation is oversimplified 8. Selectively using facts (card-stacking) 9. Making false or misleading comparisons (false equivalence and false analogy) 10. Generalizing quickly and sloppily (hasty generalization) In humor, errors of reasoning are used for comical purposes. Groucho Marx used fallacies of amphiboly, for instance, to make ironic statements; Gary Larson and Scott Adams employed fallacious reasoning in many of their cartoons. Wes Boyer and Samuel Stoddard have written a humorous essay teaching students how to be persuasive by means of a whole host of informal and formal fallacies.[37] Assessment — pragmatic theory[edit] According to the pragmatic theory,[38] a fallacy can in some instances be an error a fallacy, use of a heuristic (short version of an argumentation scheme) to jump to a conclusion. However, even more worryingly, in other instances it is a tactic or ploy used inappropriately in argumentation to try to get the best of a speech part unfairly. There are always two parties to an argument containing a fallacy — the perpetrator and the intended victim. The dialogue framework required to support the pragmatic theory of fallacy is built on the presumption that argumentative dialogue has both an adversarial component and a collaborative component. A dialogue has individual goals for each participant, but also collective (shared) goals that apply to all participants. A fallacy of the second kind is seen as more than simply violation of a rule of reasonable dialogue. It is also a deceptive tactic of argumentation, based on sleight-of-hand. Aristotle explicitly compared contentious reasoning to unfair fighting in athletic contest. But the roots of the pragmatic theory go back even further in history to the Sophists. The pragmatic theory finds its roots in the Aristotelian conception of a fallacy as a sophistical refutation, but also supports the view that many of the types of arguments traditionally labelled as fallacies are in fact reasonable techniques of argumentation that can be used, in many cases, to support legitimate goals of dialogue. Hence on the pragmatic approach, each case needs to analyzed individually, to determine by the textual evidence whether the argument is fallacious or reasonable. See also[edit] 1. ^ van Eemeren, Frans; Garssen, Bart; Meuffels, Bert (2009). Fallacies and Judgments of Reasonablene Empirical Research Concerning the Pragma-Dialectical Discussion Rules. Dordrecht: Springer. doi:10.1007/978-90-481-2614-9. ISBN 978-90-481-2613-2. 2. ^ a b c Harry J. Gensler, The A to Z of Logic (2010:p74). Rowman & Littlefield, ISBN 9780810875968 3. ^ Woods, John (2004). "Who Cares About the Fallacies?". The Death of Argument. Applied Logic Series. 32. pp. 3–23. doi:10.1007/978-1-4020-2712-3_1. ISBN 9789048167005. 4. ^ Bustamente, Thomas; Dahlman, Christian, eds. (2015). Argument types and fallacies in legal argumentation. Heidelberg: Springer International Publishing. p. x. ISBN 978-3-319-16147-1. 5. ^ a b c "Informal Fallacies, Northern Kentucky University". Retrieved 2013-09-10. 6. ^ a b Dowden, Bradley. "Fallacy". Internet Encyclopedia of Philosophy. Retrieved 17 February 2016. 7. ^ McMullin, Rian E. (2000). The new handbook of cognitive therapy techniques ([Rev. ed.] ed.). New York: W. W. Norton. ISBN 978-0393703139. OCLC 41580357. 8. ^ McMurtry, John (December 1990). "The mass media: An analysis of their system of fallacy". Interchange. 21 (4): 49–66. doi:10.1007/BF01810092. 9. ^ DeLancey, Craig, Ph.D. "Evaluating Arguments—Distinguishing between reasonable and fallacious tactics" (PDF). oswego.edu. self-published. Archived from the original (PDF) on 2013-09-03. Retrieved 7 March 2018. 10. ^ a b Damer, T. Edward; Rudinow, J.; Barry, V. E.; Munson, R.; Black, A.; Salmon, M. H.; Cederblom, J.; Paulsen, D.; Epstein, R. L.; Kernberger, C.; others (2009), Attacking Faulty Reasoning: A Practical Guide to Fallacy-free Arguments (6th ed.), Belmont, California: Wadsworth, ISBN 978-0-495-09506-4, retrieved 2016-02-24. See also Wikipedia article on the book 11. ^ Damer 2009,[10] page 52. 13. ^ "fallacy". Encyclopedia Brittanica. Encyclopedia Brittanica. Retrieved 13 June 2017. 14. ^ Frans, van Eemeren; Bart, Garssen; Bert, Meuffels (2009). "1". Fallacies and judgements of reasonableness, Empirical Research Concerning the Pragma-Dialectical Discussion Rules. Dordrecht: Springer Science+Business Media B.V. p. 2. ISBN 978-90-481-2613-2. 15. ^ "Aristotle's original 13 fallacies". The Non Sequitur. 2008-03-13. Retrieved 2013-05-28. 16. ^ "Aristotle's 13 fallacies". www.logiclaw.co.uk. Retrieved 2017-12-12. 17. ^ "PHIL 495: Philosophical Writing (Spring 2008), Texas A&M University". Archived from the original on 2008-09-05. Retrieved 2013-09-10. 18. ^ Frans, van Eemeren; Bart, Garssen; Bert, Meuffels (2009). "1". Fallacies and judgements of reasonableness, Empirical Research Concerning the Pragma-Dialectical Discussion Rules. Dordrecht: Springer Science+Business Media B.V. p. 3. ISBN 978-90-481-2613-2. 19. ^ Frans, van Eemeren; Bart, Garssen; Bert, Meuffels (2009). "1". Fallacies and judgements of reasonableness, Empirical Research Concerning the Pragma-Dialectical Discussion Rules. Dordrecht: Springer Science+Business Media B.V. p. 4. ISBN 978-90-481-2613-2. 20. ^ Frans H. van Eemeren, Bart Garssen, Bert Meuffels (2009). Fallacies and Judgments of Reasonableness: Empirical Research Concerning the Pragma-Dialectical Discussion Rules, p.8. ISBN 9789048126149. 21. ^ Coffey, P. (1912). The Science of Logic. Longmans, Green, and Company. p. 302. LCCN 12018756. Retrieved 2016-02-22. 22. ^ Freedman, David A. (2004). Michael S. Lewis-Beck & Alan Bryman & Tim Futing Liao, ed. Encyclopedia of Social Science Research Methods. Thousand Oaks, CA: Sage. pp. 293–295. ISBN 978-0761923633. 23. ^ Boudry, Maarten (2017). "The Fallacy Fork: Why It's Time to Get Rid of Fallacy Theory". Skeptical Inquirer. 41 (5): 46–51. 24. ^ Copi, Irving M.; Cohen, Carl (2005). Introduction to Logic (12 ed.). Pearson Education, Inc. ISBN 978-0-13-189834-9. p.125 25. ^ "The Most Common Logical Fallacies". www.webpages.uidaho.edu. Retrieved 2017-12-12. 26. ^ Kornprobst, Markus (2007). "Comparing Apples and Oranges? Leading and Misleading Uses of Historical Analogies". Millennium — Journal of International Studies. 36: 29–49. doi:10.1177/03058298070360010301. Archived from the original on 30 October 2013. Retrieved 29 October 2013. 27. ^ Schiappa, Edward (1991). Protagoras and Logos: A Study in Greek Philosophy and Rhetoric. Columbia, SC: University of South Carolina Press. ISBN 978-0872497580. 28. ^ Protagoras (1972). The Older Sophists. Indianapolis, IN: Hackett Publishing Co. ISBN 978-0872205567. 29. ^ a b Meho, Lokman I. (2007). "The Rise and Rise of Citation Analysis". Physics World. January: 32–36. arXiv:physics/0701012. Bibcode:2007physics...1012M. 30. ^ Jensen, Michael (June 15, 2007). Riley, Michael G., ed. "The New Metrics of Scholarly Authority". The Chronicle of Higher Education. The Chron. ISSN 0009-5982. OCLC 1554535. Retrieved 28 October 2013. 31. ^ a b Baveye, Phillippe C. (2010). "Sticker Shock and Looming Tsunami: The High Cost of Academic Serials in Perspective". Journal of Scholarly Publishing. 41 (2): 191–215. doi:10.1353/scp.0.0074. 32. ^ National Communication Journal (2013). Impact Factors, Journal Quality, and Communication Journals: A Report for the Council of Communication Associations (PDF). Washington, D.C.: National Communication Association. Archived from the original (PDF) on April 4, 2016. Retrieved 2016-02-22. 33. ^ Gafield, Eugene (1993). "What Citations Tell us About Canadian Research". Canadian Journal of Library and Information Science. 18 (4): 34. 34. ^ Stein, Zachary (October 2008). "Myth Busting and Metric Making: Refashioning the Discourse about Development". Integral Leadership Review. 8 (5). Archived from the original on October 30, 2013. Retrieved October 28, 2013. 35. ^ Allen, Henry L. (1997). "Faculty Workload and Productivity: Ethnic and Gender Disparities" (PDF). NEA 1997 Almanac of Higher Education: 39. Retrieved October 29, 2013. 36. ^ Shewan, Edward (2003). "Soundness of Argument". Applications of Grammar: Principles of Effective Communication (2nd ed.). Christian Liberty Press. ISBN 978-1-930367-28-9. Retrieved February 22, 2016. 37. ^ Boyer, Web; Stoddard, Samuel. "How to Be Persuasive". Rink Works. Retrieved December 5, 2012. 38. ^ Walton, Douglas N. (1995). A Pragmatic Theory of Fallacy. Tuscaloosa: University of Alabama Press. p. 324. ISBN 9780817307981. Further reading[edit] • C. L. Hamblin, Fallacies, Methuen London, 1970. reprinted by Vale Press in 1998 as ISBN 0-916475-24-7. • Hans V. Hansen; Robert C. Pinto (1995). Fallacies: classical and contemporary readings. Penn State Press. ISBN 978-0-271-01417-3. • Frans van Eemeren; Bart Garssen; Bert Meuffels (2009). Fallacies and Judgments of Reasonableness: Empirical Research Concerning the Pragma-Dialectical Discussion. Springer. ISBN 978-90-481-2613-2. • Douglas N. Walton, Informal logic: A handbook for critical argumentation. Cambridge University Press, 1989. • Douglas, Walton (1987). Informal Fallacies. Amsterdam: John Benjamins. • Walton, Douglas (1995). A Pragmatic Theory of Fallacy. Tuscaloosa: University of Alabama Press. • Walton, Douglas (2010). "Why Fallacies Appear to Be Better Arguments than They Are". Informal Logic. 30 (2): 159–184. • John Woods (2004). The death of argument: fallacies in agent based reasoning. Springer. ISBN 978-1-4020-2663-8. • Fearnside, W. Ward and William B. Holther, Fallacy: The Counterfeit of Argument, 1959. • D. H. Fischer, Historians' Fallacies: Toward a Logic of Historical Thought, Harper Torchbooks, 1970. • Warburton Nigel, Thinking from A to Z, Routledge 1998. • Sagan, Carl, "The Demon-Haunted World: Science As a Candle in the Dark". Ballantine Books, March 1997 ISBN 0-345-40946-9, 480 pgs. 1996 hardback edition: Random House, ISBN 0-394-53512-X, xv+457 pages plus addenda insert (some printings). Ch.12. Historical texts[edit] External links[edit]
global_01_local_1_shard_00001926_processed.jsonl/55251
From Wikipedia, the free encyclopedia Jump to navigation Jump to search The original Kanji for the name. Notice that the Chinese character 鬼 (oni-demon) replaces the older kokuji character. The "hornless" version is used in modern texts due to Japanese writing simplification, unintentionally altering the meaning. FounderRyūshin Yakushimaru Kuki Date foundedc.14th century Period foundedNanboku-chō period Current information Current headmasterVarious Arts taught TaijutsuGrappling (unarmed or with minor weapons) BōjutsuStaff art NaginatajutsuGlaive art KempōSword art HanbōjutsuThree foot staff art SōjutsuSpear art Heihō (兵法)Military strategy Ancestor schools Shinden Fujiwara Musō-ryū Descendant schools Hontai Yōshin-ryū; Aikido; other modern schools Kukishin-ryū (九鬼神流), originally "Nine Gods Spirit School" [1] (also translated as "Nine Demon Gods School" by many modern groups having different lineages) is a Japanese martial art allegedly founded in the 14th century CE by Kuki Yakushimaru Ryūshin (Yakushimaru Kurando).[1][2] It is a sōgō bujutsu, meaning that it teaches several different weapons/arts such as taijutsu, bōjutsu, naginatajutsu, kenpō, hanbōjutsu, sōjutsu and heiho. Kukishin-ryū and its founder are listed in the Bugei Ryūha Daijiten or "The Encyclopedia of Martial Art Schools", a record of modern (gendai) and old lineage (koryū) Japanese martial schools.[3] The Legend of Kukishin-ryū[edit] Ryushin Yakushimaru, the founder of Kukishin-ryū, was born to Dōyu Shirōhōgan at Kumano-Hongu in Wakayama prefecture on January 1, 1318. He was born into one of the most influential clans in Kumano, who were the descendants of the Fujiwara clan who served for generations as bettō, or “Shrine Supervisors." The family eventually entered into the Taira-Minamoto War and commanded the Kumano Navy. Ryushin's mother was Chigusa-hime, whose brother was Suketomo Dainagon Hino, a member of the Southern Imperial court. Because Chigusa-hime had difficulty in conceiving she made a pilgrimage to Enryaku-ji temple at Mt. Hiei where she prayed to the Yakushi Buddha (Bhaisajyaguru-Vaiduryaprabha) for help. Soon after, she became pregnant and gave birth to a baby boy, which she named Yakushimaru after the deity. Ryushin learned the martial arts and military sciences (Shinden Fujiwara Musō-ryū) handed down in his family from his grandfather Dōjitsu and Shingu-Bettō Ariie. After learning shugendō (mountaineering asceticism) from his father Dōyu, Ryushin then went to Kyoto where he learned esoteric Buddhism from the Buddhist monk Jōkai at Sanmaku-in temple. He also trained in martial arts at Mt. Kurama and was said to be master of Kuji-hihō and Onmyo-do.[2] In 1335, when Ryushin celebrated his coming of age, he joined the Northern Court under Takauji Ashikaga in a war against the Southern Court. In June, 1336 Ryushin and his vanguard led an attack on the Southern Court's fort on Mt. Hiei. The fort eventually fell and the Southern Court Emperor, Go-Daigo, and his loyal vassals were captured and kept at the old palace of former Emperor Kazanin. Takauji's treatment of the prisoners was so abhorrent that Ryushin was quoted as saying "It is possible to loose the emperor from the harsh treatment he receives. I will plot his rescue." With other conspirators Ooe Gyōbu Daiyu Kageshige, Bessho Saburō Takanori (Kojima Takanori), Hiyoshi Iga Nyudō and Kisshuin Sōshin Hōgen, Ryushin broke into the palace of Kazanin and escaped to Yoshino with Emperor Go-daigo.[2] Tadayoshi Kuragari-Tōge, the younger brother of Takauji, was alerted of the escape and sent an army of about ten thousand men in pursuit. The army caught up with Ryushin and the conspirators at Kuragari-Tōge, a mountain pass situated on the borders of Osaka and Nara prefectures. It was here that they made a stand against the army, each choosing a weapon they were proficient with. Kageshige took a sword, Takatoku a bow and arrow, and Ryushin a halberd (naginata). As the army outnumbered them completely, it was a battle of strategy and evasion; eventually the blade of Ryushin's Naginata was cut off. So Ryushin used the remains of his naginata to knock down enemies near him and put enemies at bay by swinging the staff in the air, drawing out the kuji-kiri as he did. It is said that the Bōjutsu in Kukishin Ryū was later devised on the techniques Ryushin used on this occasion.[1] Reinforcements from Yoshino eventually arrived and they could safely take the Emperor Godaigo to a small temple-like hut located at Mt. Kinpusen. Ryushin also succeeded in re-capturing the “Three Treasures of the Imperial House” which he had concealed in a scripture-warehouse at Yokawa in Mt. Hiei. The Emperor Go-Daigo praised Ryushin's dedication and inquired about his secret techniques. Ryushin answered, "It is a secret technique passed on in my family. It is The secret art of Kuji." The emperor then made an announcement as follows: "God knows your loyalty. You shall change your surname Fujiwara to Kuki." The "Ku" of Kuki stands for "Ku" or “nine” in Japanese. "Ki" can be pronounced "Kami" if the character is pronounced in the Japanese way, meaning "Oni-gami"(holy spirit) as opposed to "Oni" (evil spirits). "Ku-ki" is therefore actually "Ku-kami." However, it has been customarily pronounced Kuki since the Edo period.[1] After the war Ryushin's mother Chigusa Hino, whose family belonged to the Southern Court, lamented over the fact that Ryushin took the side of the Northern Court. She traveled to Musashi (modern day Hino city in Tokyo,) where the Hino family still lived and she died despondently. After his mother's death, Ryushin created the Kukishin Bojutsu in honor of his mother which he called "Juji-Roppou-Kujidome" devoted and himself to protecting the Emperor Go-Daigo The records of the Kuki family are kept in scrolls and transcriptions which have been rarely shown, but which have been seen and accounted for by scholars.[1][4] These ancient documents came to be known to the public when Miura Ichiro published A Study of the Kuki Archives in 1941. The scrolls are known for containing supplementary records concerning the mythological age, complementing the Kojiki and the Nihon Shoki, the two major ancient documents in Japan. Volumes on Ko-shinto, martial arts and Kumano Honzan Shugendō were accounted. Until Miura's publication, the only mention of the scrolls was in volume two of Sontoku Okina Yawa[4] that detailed Kuki Takahiro, the 24th head of the Kukis, giving "ten volumes of books concerning Shintoism" to the scholar Ninomiya Sontoku. After Miura's publication came Kuki-shinden-zensho by Ago Kiyotaka, a leading figure in the study of ancient history, detailing some of the contents of the scrolls, including the origins and history of Kukishin-ryū.[1] About the Name[edit] • 九 "Ku" stands for “nine" in Japanese. • 鬼 "Ki" as seen on the far left is actually an incorrect kanji for the name. It is supposed to be an older Chinese based kanji meaning "Kami" or god but it is now long obsolete (compare above). This is because over the years the older character became lost due to the need to simplify/unify the Chinese characters used in Japanese writing. So, the similar, original character of 鬼 (oni or demon) is used in its stead. This inadvertently changes the meaning of the name to modern readers, who rightly believe that it reads "Nine Demons;" yet in fact the character was originally pronounced as "Oni-gami"(holy spirit) as opposed to "Oni" (evil spirits). The name "Ku-ki" is therefore actually "Ku-kami" yet, it has been customarily pronounced as "Kuki" since the Edo period.[1] • 神 "Shin" or "kami" means god or spirit- the English interpretation of "spirit" works better as "Nine Gods God School" sounds redundant and creates problems in comprehension. • 流 "Ryū" translates originally as "flow," however when related with the transmission of traditions as martial arts and appended to the name of a style or system, it means "school."[5][6] The teachings of the Ryū are detailed in the Kukishin Densho (scrolls).[1] Kukishin Ryu transmits its traditions and knowledge in six main martial disciplines: Taijutsu, Bōjutsu, Kenpō, Naginatajutsu, Hanbōjutsu and Sōjutsu. Heiho (military strategy), complements this training. Besides these major disciplines, practitioners may also learn secret weapons, hidden teachings and Onakatomi shinto (Ko-shinto) practices.[1] Taijutsu (体術)[edit] This art (jutsu) consists of locks, entanglements, strangling, striking and kicking, as well as the use of small weapons such as shuriken. The Taijutsu techniques of Kukishin-ryū were altered by the seventh head of the school Kiyotaka Kuki, and organized by his son Sumitaka. This was because the techniques of Atekomi (striking) originated at times when armor was worn and became outdated. These techniques were modified to fit in with the early edo jidai. In the late Edo era, the twenty-fifth Soke, Takatomo Kuki, devised the Kihongata that consisted of eight techniques used for teaching the basics of the Ryu arts to beginners- however, this review did little to quell its brutality in learning and teaching. In an effort to make safer to learn and teach, Takatomo altered the techniques so that beginners could practice without suffering injuries. Takatomo served at Nijō Castle in Kyoto, where on February 28, 1864 he visited the Imperial Court and demonstrated his new methods to the emperor.[7] Kukishin-ryū and Takagi-Yōshin-ryū Taijutsu There is a strong relationship between the taijutsu of Kukishin-ryū and Takagi-Yoshin-ryū.[8] According to Takamatsu Chōsui, the story of blending of Takagi-ryū Taijutsu into Kukishin-ryū (and Kukishin-ryū bōjutsu into Takagi-ryū) is as follows: The untimely death of inheritor Sadataka Kuki left Kukishin-ryū without an heir. Therefore, the eldest son of Yoshitaka Kuki, named Kihei, became the successor. During the time of his inheritance, Kihei's health was very poor and he was bedridden. Eventually he grew stronger and was able to head the ryū properly, even becoming a mountaineering ascetic and traveling far across Japan. During one of his journeys Kihei happened to meet the son of Gennoshin Takagi in Akou (present day Hyōgo Prefecture), who was named Umanosuke. During their visit together, they compared the acumen of their two ryu. Whereas Takagi exceeded in Taijutsu, Kihei's Bōjutsu was superior. So in agreement, they altered the basic format of the two ryū. Since this time the basic Taijutsu of Kukishin-ryū is Takagi-ryū while the Bōjutsu, Spear and Naginata techniques have remained Kukishin-ryū.[3] r Bōjutsu (棒術)[edit] The bōjutsu of Kukishin Ryū is best described as a method used to defeat/trick wielders of other weapons. It has special striking techniques that allow the Bō to feign quickly and re-direct its aim; a special method of "twirling" (Bofurigata) designed to confuse opponents and keep them at bay; and thrusting techniques that correlate with throwing the staff as a projectile (nagebō). Aspects of the Bōjutsu are gleaned from two other weapons within the school: naginata and the spear.[9] Bōjutsu, Sensudori and the Kaiden-Gata There are actually three sizes of bō that could be categorized as bōjutsu within Kukishin Ryū: Rokushaku-bō (long), Han-bō (medium) and the Tan-bō (small). However, what is called 'Bōjutsu' in Kukishin Ryū involves the use of the Rokushaku-bō, nevertheless, this is really only the start of the Bōjutsu practice. The Han-bō is traditionally taught independently of the other techniques, which are formally contained in what is called 'Sensudori,' the upper echelon of the schools teachings (Kaiden-gata). Additionally the Han-bō is categorized into 'Tessenjutsu' and taught as part of the Taijutsu as a close-quarters weapon. In Sensudori, the basic Kukishin Ryū strategy of "Gō, Ri, Hō, Chi, Shin" is exemplified. The beginner will use a staff of 180 cm, then 90 cm and finally one of 26 cm. This is concurrent with the ideology of Gō, Ri, Hō, Chi, Shin in application.[9] Kenpō (剣法)[edit] The kanji for this means "sword law" (not "fist law"). It consists of evasion, slashing, stabbing, blocking and countering. It also includes the use of bōshuriken. One of the signature movements of Kukishin Ryū Kempō is the upward slashing. The ninth head of the family, Yoshitaka Kuki, participated in the war against Korea under Hideyoshi Toyotomi. In the marine battle off the shore of Ulusan, the belly-shot Yoshitaka jumped aboard the enemy's ship and slashed upward into the crotch of the admiral with his sword. After this, the technique became well-renowned. The Kenpō also includes the use of 'Token-jutsu', or the method of throwing blades and swords (shurikenjutsu). While it teaches the use of bōshuriken, it is also considered an alternative method of using a dagger and long sword.[10] Naginatajutsu (薙刀術)[edit] The Kukishin Ryū Naginata is 225 cm in overall length. It has a double edged blade that is 21 cm long and is attached to the shaft by wires. It is used to slash, parry, strike, stab and deflect; the blade is also used to hook and arrest. Naginata is a weapon of primary importance in Kukishin Ryū as the Bōjutsu owes its origin to the Naginata. It stands as another signature weapon of Kukishin Ryū and it is perhaps the base of the ryu's creation.[11] Hanbōjutsu (半棒術)[edit] The hanbō of Kukishin-ryū is used to parry, strike, crush and stab. It integrates with taijutsu as well. The hanbō is most directly related to the spear and staff, however these influences are superficial. It is safe to say that although the spear was in fact the origin of the hanbō itself, it truly plied its techniques from the sword. Ukon Kuriyama is thought to have created and introduced the hanbō techniques to Kukishin-ryū during the Azuchi-Momoyama period. Legend has it that he was well known for his skill with the short spear. Kuriyama participated in the Battle of Nagashino on May 4, 1575, on the side of Nobunaga Oda. While fighting against general Katsuhisa Tangonokami Suzuki, Kuriyama's spear was cut in half. Kuriyama kept on fighting with the cleft spear and eventually defeated Suzuki. Then it is said that he continued into battle, overwhelming the enemies' swords and thoroughly beating them down. From this legend, it is believed that the hanbō was officially included in Kukishin-ryū during the early Edō era.[12] Sōjutsu (槍術)[edit] The Kukishin Ryū spear has a total length of 270 cm. The 36 cm to 45 cm spearhead is connected to the shaft with wire, and it has three edges or "blades." It is used to parry, slash, stab, strike and to unbalance opponents.[13] The spear techniques in Kukishin-ryū integrate a myriad of complex variations and nuances and this is perhaps the most difficult weapon in the curricula to learn. It has a number of targets which can be reached from both long and short distances and at each distance, a slight divergence in the way the weapon is used is needed in order to make it effective. This makes it one of the most complicated and complex weapons, depending entirely on distance and timing for the wielder to use it correctly. Kukishin-ryū Today[edit] Today there are older and modern branches of the ryū still active. There some Schools which still train Kukishin Ryu: • Kukishin-ryu Bojutsu under 19. Soke Fumon Tanaka • Hontai Yōshin-ryū under 19. Soke Kyoichi Inoue • Motoha Yoshin Ryu under Soke Yasumoto Akiyoshi • Takagi Ryu under 19. Soke Kusuhara Juhei • Bujinkan teaches a branch called Kuki Shinden-Ryū Happō Biken under Masaaki Hatsumi and Unsui Manaka of the Jinenkan and Shoto Tanemura of the Genbukan have their own branches. The Kuki family maintains the family line, which is called "Kukishin-Ryu Tenshin Hyoho", led by Eichoku Takatsuka under the supervision of the current 28th Soke, Ietaka Kuki. The "Kukishinden Tenshin Hyoho" is a different line and uses just a similar name. Kogenshakai teaches a branch called "Kukushin-ryu Tenshin Hyoho" under Fumio Hirokawa and David Alonso. These branches maintain their own lineages, techniques and histories, usually stemming from the main family line. 1. ^ a b c d e f g h i Kiyotaka, Ago (1983). Kukishinden Zensho (in Japanese). Tokyo, Japan: Shin Kokumin Sha. ISBN 4-915157-36-9. 2. ^ a b c Organization for Preserving Kuki Shinden (2007). "Bojutsu Devoted to Mother". History of Ryu-ha, part 1. www.shinjin.co.jp. Archived from the original on 2011-07-19. Retrieved 2007-04-30. 3. ^ a b Yamada T., Watatani K. (1963). Bugei Ryūha Jiten (in Japanese). Shin Jinbutsu Oraisha. 4. ^ a b Kuki, Takahiro (1843). Sontoku Okina Yawa (in Japanese). 5. ^ Nelson, Andrew N (1992). The Modern's Reader Japanese-English Character Dictionary. Tokyo, Japan: Charles E tutle Co Publishers. p. 553. ISBN 4-8053-0529-0. 6. ^ Muromoto, Wayne (1997). "What is a Ryu?". Furyu the Budo Journal. 2:4 (#8). 7. ^ Organization for Preserving Kuki Shinden (2007). "Kukishin Ryu Taijutsu". The list of techniques, part 1. www.shinjin.co.jp. Archived from the original on 2011-07-20. Retrieved 2007-09-25. 8. ^ Mol, Serge (2001). Classical Fighting Arts of Japan: A Complete Guide to Koryu Jujutsu. Kodansha Europe. pp. 199–200. ISBN 978-4-7700-2619-4. 9. ^ a b Organization for Preserving Kuki Shinden (2007). "Kukishin Ryu Bojutsu". The list of techniques, part 2. www.shinjin.co.jp. Archived from the original on 2011-07-22. Retrieved 2007-09-25. 10. ^ Organization for Preserving Kuki Shinden (2007). "Kukishin Ryu Kenpo". The list of techniques, part 3. www.shinjin.co.jp. Archived from the original on 2011-07-20. Retrieved 2007-09-25. 11. ^ Organization for Preserving Kuki Shinden (2007). "Kukishin Ryu Naginata". The list of techniques, part 4. www.shinjin.co.jp. Retrieved 2007-09-25. 12. ^ Organization for Preserving Kuki Shinden (2007). "Kukishin Ryu Hanbo". The list of techniques, part 6. www.shinjin.co.jp. Archived from the original on 2011-07-22. Retrieved 2007-09-25. 13. ^ Organization for Preserving Kuki Shinden (2007). "Kukishin Ryu Sojutsu". The list of techniques, part 5. www.shinjin.co.jp. Retrieved 2007-09-25.
global_01_local_1_shard_00001926_processed.jsonl/55253
Lincoln Motor Company From Wikipedia, the free encyclopedia   (Redirected from Lincoln automobile) Jump to navigation Jump to search The Lincoln Motor Company FoundedAugust 1917; 101 years ago (1917-08) (as Lincoln Motor Company) Dearborn, Michigan, U.S.[1]:4 Dearborn, Michigan Area served Key people Joy Falotico (Group Vice President, Lincoln Motor Company since March 1, 2018)[3] ProductsLuxury cars ParentFord Motor Company (February 4, 1922[4]–present) Lincoln, formally the Lincoln Motor Company, is a luxury vehicle brand of the American manufacturer Ford Motor Company. Marketed among the top luxury brands in the United States, Lincoln has competed closely against Cadillac for nearly its entire existence. Lincoln has the distinction of establishing the personal luxury car segment, with the entry of the Lincoln Continental into mass production in 1940. Lincoln Motor Company was founded in 1917 by Henry M. Leland, naming it after Abraham Lincoln; in 1922, Lincoln was acquired by Ford.[5] Following World War II, Ford formed the Lincoln-Mercury Division, pairing Lincoln with its mid-range Mercury brand through 2010. In 2012, Ford rebranded the Lincoln division under its original name, Lincoln Motor Company.[6] Originally founded as a freestanding division above Lincoln, Continental was integrated within Lincoln in 1959. The Continental-branded Mark Series was marketed through Lincoln starting in 1968, adapting the Lincoln name in 1986. The Lincoln star emblem is derived from a badge first used on the 1956 Continental Mark II. Following the divestiture of Jaguar, Land Rover, Aston Martin and Volvo and the closure of Mercury, Lincoln remains the sole luxury nameplate of Ford Motor Company. The current product range of Lincoln consists of sedans, crossovers, and SUVs. Outside of retail markets, Lincoln has produced vehicles for limousine and livery use throughout its entire existence, with several examples used as official state limousines for Presidents of the United States. In 2017, Lincoln sold 188,383 vehicles globally.[7] Outside of North America, Lincoln vehicles are officially sold in the Middle East, China, and South Korea. Early years (1917-1930)[edit] The Lincoln Motor Company was founded in August 1917 by Henry Leland and his son Wilfred. Among the founders of Cadillac, Leland had sold the company to General Motors in 1909, remaining on as an executive until 1917, when he left over a dispute with GM President William Durant. Naming Lincoln Motor Company after Abraham Lincoln, the first President for whom he ever voted (1864), Leland financed the company by securing a $10 million contract to build Liberty V12 aircraft engines, breaking ground on the Lincoln Motor Company Plant. To build the Liberty engines, Lincoln sourced parts from other manufacturers; along with cylinders produced by Ford, other parts were sourced from Buick, Cadillac, Marmon, and Packard.[8]:4[9]:163–164 In total, 6,500 Liberty V12 engines were produced by Lincoln before the end of World War I ceased wartime production. Following a complete retooling for automobile production, Lincoln Motor Company developed its first automobile, the Lincoln Model L. Intended as a rival for Cadillac and similar luxury car manufacturers, the Model L was powered by a V8 engine, derived from the technology of the Liberty V12. Purchase by Ford Motor Company[edit] During the early 1920s, Lincoln Motor Company struggled with the shift from military to automobile production, with some customers having to wait nearly a year for their vehicles to be completed from the time of purchase.[10] By 1922, Lincoln fell on the verge of bankruptcy and was placed in receivership. On February 4, 1922, Lincoln Motor Company was acquired by Ford Motor Company for $8 million.[11] Although Henry Ford had previously designed several luxury vehicles under the Ford brand (the 1904 Ford Model B, the 1905 Ford Model F, and the 1906 Ford Model K), Ford sought to create a stand-alone luxury-vehicle division[12], as General Motors had done with Cadillac. With the acquisition of Lincoln, Ford Motor Company produced a rival for Cadillac, Pierce-Arrow, Marmon, Peerless, Duesenberg, and Packard alongside the Ford Model T. In addition to more closely competing against General Motors in different price segments, the purchase of Lincoln also held personal value within Ford management. In 1902, Henry Ford had been forced out of his second company (Henry Ford Company) by a group of investors led by Leland.[13]:52–57 Henry Ford Company was renamed Cadillac Automobile Company; sold to General Motors in 1909, Cadillac has remained a chief competitor of Lincoln from 1920 to the present day. While Henry and Wilfred Leland were initially retained to manage Lincoln, on June 10, 1922, both Lelands were removed, with Edsel Ford brought in to manage the company. Following the introduction of Edsel Ford to Lincoln management, the fortunes of Lincoln began to quickly improve. For 1923, the Lincoln Model L underwent extensive changes. While the chassis and drivetrain (including an L-head 60-degree V8) were largely left alone, several new bodystyles were introduced. In line with a Duesenberg or a Rolls-Royce, customers could also purchase a Model L with coachbuilt bodywork. For 1923, Lincoln produced 7,875 cars (nearly 45% higher than 1922), operating at a profit by the end of the year. During the early 1920s, Lincoln steered away from the common American automotive industry practice of yearly model changes. While used to market fresh designs to customers, Lincoln found that its customers had begun to purchase multiple Lincolns (or other luxury vehicles) in different bodystyles; yearly styling changes would not properly accommodate its customer base. Following the 1930 model year, however, Lincoln chose to withdraw the Model L in favor of a more modern vehicle. For 1931, the Lincoln Model K was introduced as a competitor to the Cadillac 355 Chrysler Imperial, Duesenberg Model J, and Packard Eight. For 1932, Lincoln became an American manufacturer to produce a "multi-cylinder" engine as it introduced its first V12 engine. While not the first to produce a V12 engine in an American-produced car, in 1933, Lincoln became the first manufacturer to produce vehicles exclusively with V12 engines, as it retired the L-head V8 engine. During the 1930s, Lincoln expanded to two model lines for the first time. As Lincoln shifted the Model K upwards in price, Edsel Ford introduced the Lincoln-Zephyr as a sub-marque within Lincoln for 1936.[14]:155 Designed to compete against the LaSalle and Chrysler Airstream, the Lincoln-Zephyr introduced an all-new body and chassis, along with its own V12 engine. As a result, Lincoln sales increased ninefold from 1935 to 1936.[15]:1196–1197 Beginning of Lincoln Continental[edit] In the late 1930s, Edsel Ford began to consider American cars too boxy. In late 1938, to develop a European-style car for his next Florida vacation, he commissioned Ford Chief Stylist E. T. Gregorie to design a one-off body design, using a 1939 Lincoln-Zephyr Convertible Coupe chassis. After sectioning the body 4 inches (102 mm), the running boards were deleted and a spare tire was mounted behind the trunklid. After Edsel Ford received the car and vacationed in Florida with the one-off vehicle, it attracted a high amount of interest from potential buyers, often referring to its "European" or "Continental" exterior design. From the latter term, the one-off vehicle became known as the Lincoln Continental. Following the Great Depression, a number of American luxury car manufacturers were either forced into closure or reorganization; by 1940, alongside Lincoln, the American luxury-car segment largely consisted of Cadillac (who ended production of the LaSalle and V16 in 1940), the Chrysler Imperial (reduced to 8-passenger sedans and limousines), and Packard. To further secure the future for Lincoln, on April 30, 1940, Ford Motor Company reorganized Lincoln Motor Company as the Lincoln Division of Ford Motor Motor Company.[16]:199 While previously operating as an autonomous entity, as a division, Lincoln structurally became similar to its major competitor Cadillac (within General Motors). As part of the change, several changes were made to the Lincoln model line. Following the positive feedback of the 1939 Lincoln Continental one-off convertible built for Edsel Ford, the Lincoln Continental was introduced as a Lincoln-Zephyr production model for 1940. For 1941, Lincoln revised its branding; the hyphen was removed from Lincoln-Zephyr, making it a Lincoln.[16]:206 As a replacement for the expensive Model K, an extended-wheelbase Lincoln Custom variant of the Lincoln Zephyr was developed. Following the development of proper tooling, the Lincoln Continental began production on the assembly line, replacing hand-built construction. After the entry of the United States into World War II, as with all U.S. auto manufacturers, Lincoln ended automobile production as Ford Motor Company concentrated on wartime manufacturing. Following the conclusion of the war in 1945, the structure of Lincoln within Ford changed again, as the Lincoln-Mercury Division was created, pairing Mercury and Lincoln together; from 1945 to the 2010 closure of Mercury, the two luxury divisions were paired together within Ford. For 1946, Lincoln returned to production, ending the use of the Zephyr name. Code-named the H-series, non-Continental Lincolns were identified by their body style. Using slightly updated exteriors from 1942, the 1946 Lincolns continued the use of the Zephyr chassis. 1948 marked the final year of the Zephyr chassis (dating to 1936) and (as of 2018) the use of a V12 engine in an American mass-produced automobile. After 5,322 were produced (as both a Lincoln-Zephyr and Lincoln), Lincoln ended production of the Continental. For 1949, all three Ford Motor Company divisions debuted their first postwar designs. Sharing its body structure with the Mercury Eight, the redesigned Lincoln model line (code-named the EL-series) marked the first use of a V8 in a Lincoln since 1932. An all-new V12 intended for Lincoln was stillborn in development, leading the division to adapt a Ford flathead V8 (from the Ford F-8 conventional truck). As with the previous Lincoln Continental, the 1949 Lincoln dispensed with running boards completely, moving on to abandon pontoon styling entirely, with a straight fender line (and low hoodline) from headlamp to taillamp. In a carryover from Zephyr-based Lincolns, the 1949 Lincolns retained rear-hinged passenger doors. As a flagship model of Lincoln, the Lincoln Cosmopolitan was styled with its own rear roofline. As Lincoln entered the 1950s, Ford Motor Company sought to increase the differentiation between the Mercury and Lincoln model lines. For 1952, to add interest to the brand, Lincoln returned to model names for the first time since 1942, with the Lincoln Cosmopolitan becoming the standard Lincoln model, with the Lincoln Capri becoming the flagship model line. In a return to (small) pontoon rear fenders, Lincolns shared a body with the Mercury Monterey. Mechanically, Lincoln differed from Mercury, as the Ford truck V8 was replaced by the Lincoln Y-block V8 with a Hydramatic transmission. For the first time since the discontinuation of the Model K, Lincolns were produced with front-hinged rear doors. For 1956, the shared Lincoln-Mercury body underwent a redesign for the final time, with Lincoln adopting elements from the Mercury XM-800 and Lincoln Futura concept cars. Slotted above the Lincoln Capri, the Lincoln Premiere adapted features of the Continental Mark II, including its ducted air conditioning. During 1956, Lincoln-Mercury was reorganized slightly, following the creation of the free-standing Edsel and Continental divisions, Lincoln-Mercury was changed to Mercury-Edsel-Lincoln (MEL), with Edsel slotted alongside/below Mercury and Continental above Lincoln, as the flagship of all of Ford Motor Company. By the end of 1959, Continental was integrated into Lincoln and Edsel was withdrawn. The Lincoln Motor Company Plant, built in Detroit, Michigan, by Henry Leland in 1917, was closed after 1952; subsequent Lincolns were produced alongside Mercury Montereys and Mercury Montclairs. For the 1957 model year, Ford opened Wixom Assembly in Wixom, Michigan, as a facility to specialize in Lincoln production. From 1957 to 2007, the facility produced Lincoln vehicles nearly exclusively, along with the Ford GT and several generations of the Ford Thunderbird. Continental Division (1956–1959)[edit] 1956 Continental Mark II For the 1956 model year, Ford Motor Company created the Continental Division, slotted above Lincoln as the flagship marque of Ford Motor Company. At its launch, Continental introduced the Continental Mark II as its model line, intended as a successor to the 1940-1948 Lincoln Continental personal luxury car. Offered as a two-door hardtop coupe, the Mark II broke from a number of American styling precedents of the time. While fitted with whitewall tires, the exterior was fitted with minimal chrome trim on the body sides; tailfins were left off of the body completely. In place of the bumper-mounted spare tire of the original Lincoln Continental, the trunklid of the Mark II showcased the design element, with a large imitation spare tire bulge (which fit over the actual spare tire inside the trunk). The Mark II was largely hand-built, with extensive quality testing done to each engine and transmission before leaving the factory. In place of establishing a separate sales and service network for Continental, the Mark II was marketed through Lincoln (the Mark II used a Lincoln engine and transmission). At $10,000 in 1956 (equivalent to $90,159 in 2017[17]), the Mark II was the most expensive car produced by an American automaker at the time, rivaling the Rolls-Royce Silver Cloud in price. On July 18, 1956, the Continental Division was integrated into Lincoln which continued to manage the Continental brand as a separate marque.[18]:281 During the 1957 model year, the Mark II was withdrawn, largely as a consequence of its hand-built construction; each unit was sold at a loss of over $1,000. Subsequently, the 1957 Cadillac Eldorado Brougham overtook the Mark II as the most expensive American-produced vehicle. For 1958, as part of a mandated $4000 reduction in price, Continental adopted the body of Lincoln, expanding into multiple body styles for the Mark III (the nomenclature indicating the transition). Adding a feature of the Mercury Turnpike Cruiser, Continental adopted a retractable rear window across every bodystyle (including convertibles) with a reverse-slant rear roofline. For 1959, the Mark III was renamed the Mark IV, becoming the Mark V for 1960.[18]:331,337,414, 582–583 In 1959, the Continental Division was formally brought to an end within Lincoln; for 1960, the Mark V was brought to production, ending the model cycle alongside the standard Lincoln model line. Unibody vehicles[edit] 1959 Continental Mark IV Town Car formal-roof sedan For the 1958 model year, the Mercury-Edsel-Lincoln (M-E-L) division adapted new bodies across its vehicle lines. In addition to Mercury sharing its bodies with the premium Edsels (prior to the latter's demise), Lincoln and Continental adopted a common body structure, shifting to unibody construction. With a 131-inch wheelbase, the new platform would be among the largest vehicles ever built by Ford Motor Company; they are the longest Lincolns ever built without 5 mph bumpers, a regulatory mandate which went into effect in September 1972. As a replacement for the Y-block V8, Ford developed a 430 cubic-inch "MEL" V8 as standard equipment for Lincolns (which was also available in Ford Thunderbirds and some Mercury vehicles). For 1959, Continental developed Town Car and Limousine variants of the standard four-door sedan. In place of extending the wheelbase, the reverse-slant roofline was replaced by a formal notchback configuration, allowing the rear seat to be moved rearward several inches. Among the rarest Lincoln vehicles ever produced, the Town Car and Limousines were only offered painted in black. From 1958 to 1960, Lincoln would lose over $60 million dollars. Following the recession economy of the late 1950s (a factor that would play into the demise of Edsel), Ford Motor Company was forced to recoup the development costs of a vehicle platform that Lincoln shared with neither Ford nor Mercury (with the lone exception of the engine and transmission). By 1958, the future of Lincoln-Mercury was at risk, with Ford President Robert McNamara considering the reduction of Ford to its namesake brand.[19] As a condition of allowing Lincoln to continue production, McNamara required the Lincoln model line to undergo a reduction in size.[19] For 1961, Lincoln consolidated its model lineup to a single model line, with the Lincoln Continental replacing the Lincoln Capri and Lincoln Premiere; as the Continental marque was withdrawn, the Mark V saw no successor. While only nominally lighter than the 1960 Lincoln, the 1961 Lincoln Continental adapted a far smaller exterior footprint, shedding 15 inches in length and 8 inches of wheelbase. In an effort to streamline production, only four-door body styles were produced, with the Continental becoming the sole mass-produced four-door convertible sold in North America; to maximize rear-seat egress, Lincoln returned to the use of rear suicide doors. In another requirement to ensure its survival, the model cycle of Lincoln was extended from three years to nine years.[20] While largely dispensing with major yearly model changes, the decision established design consistency and shifting resources towards quality control.[21] For 1966, to better compete with the Cadillac Coupe de Ville and the Imperial Crown/LeBaron Coupe, Lincoln added a two-door hardtop to the Continental model line. After the 1967 model year, Lincoln ended production of the Continental 4-door convertible. At 5,712 pounds[22], the 1967 Lincoln Continental Convertible is the heaviest non-limousine car ever produced by Ford Motor Company; as of 2018, it is the final factory-produced four-door convertible sold in North America. Continental Mark III[edit] During the 1960s, Ford sought to develop a new flagship vehicle as a successor for the Continental Mark II. While the Lincoln Continental served as a close competitor to the Cadillac de Ville series and Chrysler Imperial, as Cadillac shifted the Cadillac Eldorado to the personal luxury segment in 1967, a segment that Ford exited in 1957 after the withdrawal of the Continental Mark II. As a response, in April 1968, the Continental Mark III was released as a 1969 model. While not officially a Lincoln, the Continental Mark III was marketed through the Lincoln-Mercury dealer network, who would service the vehicle. Over a number of various names considered for the vehicle, Continental Mark III was chosen, as Henry Ford II felt the Continental Mark II did not have a proper successor (thus restarting the nomenclature).[23] Alongside the 1968 Lincoln Continental, the Continental Mark III marked the debut of the (then-new) 460 cubic-inch V8 and became the first Ford vehicle to be fitted with anti-lock brakes.[24] As standard equipment, the Mark III was fitted with power door locks, power seats, and power windows. In an effort to control its development and production costs, the Mark III was offered only as a two-door hardtop derived from the chassis underpinnings of the four door Ford Thunderbird. While sharing many styling elements from Lincoln, the Continental Mark III debuted many elements of its own, including hidden headlights and a redesigned spare-tire trunklid (the spare tire laid flat in the front of the trunk). While the Continental Mark III would bring Lincoln into the decade on a high note, for the American luxury car segment, the 1970s would prove tumultuous. Along with the introduction of federal safety regulations for American-market automobiles (which brought features such as 5-mph bumpers and the end of hardtop body styles), the 1973 fuel crisis would play a significant role in the engineering of American automobiles, forcing Lincoln to develop a compact-size sedan and redesign smaller full-size sedans for the 1980s. As Chrysler withdrew its Imperial brand after 1975, Cadillac became the sole domestic competitor of Lincoln. For the 1970 model year, Lincoln made good on its 1958 plan to commit to a nine-year design cycle, giving the Continental its first complete redesign for the first time since 1961. During the 1960s, while sales of the Continental had remained relatively steady throughout its production, the engineering of luxury cars had begun to change among its competitors; to increase design commonality (and lower production costs), Cadillac and Imperial shifted away from brand-specific platforms (with the latter adapting to shared bodyshells with Chrysler). For the redesign of the Lincoln model line, the Continental grew in size. While sharing no visible body panels, Lincoln adapted the chassis of the Ford LTD/Mercury Marquis (shifting to body-on-frame construction for the first time since 1957). In another effort to maintain design consistency, the 1970 Continental was produced through 1979 with only gradual updates. Along with the mandated addition of 5-mph bumpers, in 1975, the roofline was redesigned (to visually differentiate the Continental from the Mercury Marquis). The 1970s saw the introduction of several naming traditions within Lincoln. For 1970, the Town Car nameplate was revived on a permanent basis as a submodel of the Lincoln Continental. Following the use of a Cartier-brand clock on the Continental Mark III, in 1976, the Continental Mark IV began the use of Designer Editions, which saw use on subsequent Continental Mark series models and Lincolns. Lincoln Versailles[edit] 1978 Lincoln Versailles Developed as a response to the popularity of the 1976 Cadillac Seville, Lincoln introduced the Lincoln Versailles for the 1977 model year. Thirty inches shorter and 1500 pounds lighter than a Lincoln Continental, the Versailles was based on the Ford Granada/Mercury Monarch (as the Seville was based on the Chevrolet Nova). Outsold by the Seville by a significant margin, the Versailles was discontinued in early 1980. With a smaller design and engineering budget than General Motors, Lincoln stylists were unable to give the Versailles the distinct body that was given to the Cadillac Seville. Adopting many features from the 1975-1976 Mercury Grand Monarch Ghia, the Lincoln Versailles was given a Continental-style "radiator" grille, quad rectangular headlights (the first Lincoln since 1969 with exposed headlights), and a Continental Mark-style trunklid with simulated spare tire bulge. The Versailles introduced two notable features to American-market cars: halogen headlights and clearcoat paint. Continental Mark IV and Mark V[edit] Following the success of the Continental Mark III, Ford chose to develop a successor personal luxury coupe. For 1972, the Continental Mark IV made its debut, redesigned alongside the Ford Thunderbird. While sharing a common roofline with the Thunderbird, from the window line down, the Mark IV wore distinct exterior sheetmetal, with the return of a radiator-style grille, hidden headlights, and a redesigned spare-tire trunklid. To distinguish itself from the Lincoln Continental, the Continental Mark IV wore full-height rear-wheel openings, precluding the use of fender skirts. For 1976, the Continental Mark IV debuted a new tradition, called the Designer Editions, which later spread to other models in the Lincoln model range. Introduced as four special-edition models, each edition was an option package with color, trim, and interior choices specified by notable fashion designers (Bill Blass, Cartier, Givenchy, and Pucci). Each edition carried the designer's signature on the opera windows and were fitted with a 22 karat (92%) gold-plated plaque on the instrument panel which could be engraved with the original owner's name. The concept was successful and would continue on other Lincolns until the end of the 2003 model year. For 1977, Lincoln-Mercury replaced the Continental Mark IV with the Continental Mark V, a substantial exterior and interior revision of the Mark IV. At over 19 feet long, Mark V is among one of the largest "coupes" ever sold in North America. In what would become a design theme for Lincolns into the 1990s, the Mark V used sharp-edged exterior styling with a center radiator grille. Following their 1976 success, the Mark IV adopted the Designer Editions option packages. While introduced following the beginning of downsizing among American vehicles, the Continental Mark V would go on to become the most successful of all the Mark series vehicles, with over 228,000 sold across three model years. As Lincoln entered the 1980s, the American auto industry remained in the "Malaise era", struggling to balance fuel efficiency, emissions controls, and downsizing; the industry also found itself competing against European and Japanese manufacturers entering segments once dominated by Ford, General Motors, and Chrysler. The entry of the Lincoln into the 1980s was marked with struggle. As a high point, after a ten-year model cycle, the Lincoln Continental underwent a complete redesign (downsizing for the first time), becoming the lightest Lincoln since World War II. Again sharing chassis underpinnings with Mercury and Ford, the Continental used the Panther platform of the Ford LTD and Mercury Marquis. Coupled with a shift to a 302 cubic-inch V8, the fuel economy of the Lincoln model line rose nearly 40% in a single year. In contrast, the Lincoln Versailles was withdrawn early in the 1980 model year. As a result, by the end of 1980, Lincoln was marketing three versions of one vehicle. As a response, Lincoln split its two product lines, with the Continental becoming the Lincoln Town Car. After a short hiatus, for 1982, the Lincoln Continental shifted size into the mid-size segment (using the chassis of the Mercury Cougar XR7). While Lincoln would again compete against the Cadillac Seville (and to a lesser extent, Mercedes-Benz), the division completely erased any visual evidence of badge engineering. 1982 also marked the launch of the Cadillac Cimarron, alongside the Lincoln Versailles, the Cimarron has been considered among the most poorly-executed examples of badge engineering. Initially planned for withdrawal in the mid-1980s until stabilization of fuel prices mitigated fuel-economy concerns, the Lincoln Town Car progressed through the decade largely unchanged. As its design began to age, the model line began to increase in sales, as transitions of Cadillac to front-wheel drive and further downsizing of its full-size model lines were poorly received by both buyers and automotive industry critics. For 1988, the Lincoln Continental underwent a second redesign. Splitting from the Mark VII, the Continental became the first front-wheel drive Lincoln, as it became an extended-wheelbase version of the Ford Taurus; the 3.8L V6 engine also marked the first time in a Lincoln that no 8-cylinder (or V12) engine was offered. In an effort to further reduce model overlap, the front-wheel drive Continental was developed for vehicles that neither Cadillac nor the Lincoln Town Car were marketed against: European and Japanese-produced luxury sedans. Following the debut of a driver-side airbag in the Ford Tempo, the 1989 Lincoln Continental became the first sedan sold in the United States equipped with standard dual airbags. Continental Mark VI and Mark VII[edit] For 1980, the Continental Mark VI made its debut, replacing the Mark V. Originally slated to adopt the Ford Thunderbird chassis as part of downsizing, the Mark VI remained a full-size car, adopting the Ford Panther platform. Following the departure of Lee Iaccoca from Ford, the development of the Mark VI shifted from stand-alone model range to a four-door sedan and two-door coupe. Following its marketplace success, many design elements of the Mark V were carried onto the Mark VI, including its sharp-edged sheetmetal, hidden headlamps, opera windows, and fender louvers (now non-functional). The Mark VI coupe shared the same exact 114” Ford/Mercury wheelbase of the Panther chassis, with its own distinct roofline, while the four-door Mark VI shared its body with the Lincoln Continental/Town Car-Town Coupé, on a 3” longer wheelbase (at 117”). The Mark VI continued the use of the Designer Series (for coupes); in 1982, the option packages began a revision, as the Cartier Edition was moved to the Town Car and the Givenchy Edition was moved to the Continental. In early-1982, the Givenchy Edition was re-introduced to the Mark VI lineup, (via a single-page insert to the showroom brochure) but would last only that year. In another tradition, in 1980, the Mark VI launched the Signature Series trim level. Initially intended as a direct replacement for the 1979 Collector's Series, the Signature Series designation would also be utilized by the Town Car beginning in 1981; in various forms, it would be used to its 2011 well as the mid-size bustle-back Continental (for 1982 only). The heavily feature-equipped 1980-81 Mark VI Signature Series (padded vinyl trunk lid tire bulge, color-keyed bumper guards and rub strips, color-keyed trunk carpeting, color-keyed turbine wheels, tool kit, etc), received a de-contenting of many of these exclusive features for 1982-on, but now offered more colors and options. This ultimately became more of a parallel replacement of the former (1976-1981) “Luxury Group” offerings, which was absent from the option list for 1982-on. For 1984, the Continental Mark VII replaced the Mark VI, again becoming a counterpart of the Ford Thunderbird. The most technically advanced vehicle sold by Lincoln-Mercury at the time, the Mark VII represented a major market shift, becoming the smallest version of the Mark series. From the 1979 Mark V to the 1984 Mark VII, Ford engineers shed 27 inches of length and over 1,200 pounds of curb weight. While slightly less performance-oriented than a grand-touring car, in its development, the Mark VII placed a far greater emphasis on handling capability than any previous Mark-series vehicle, with four-wheel disc brakes, anti-lock brakes, four-wheel air suspension; its 5.0L V8 was shared with the Ford Mustang. In 1986, to eliminate the long-running nameplate confusion, the Continental Mark VII (marketed, sold and serviced by Lincoln) was renamed the Lincoln Mark VII, dropping the Continental nameplate. The Mark VII would be the final generation of the Mark series sold with a Designer Series name, with a Bill Blass Edition being sold through its production (a Gianni Versace edition was sold from 1984 to 1985), eventually becoming the standard model. As a sport-oriented model, Lincoln sold the Mark VII LSC (Luxury Sports Coupe) from 1984 to 1992. While Lincoln exited the struggles of the Malaise era by 1990, the division found itself in a different struggle. While largely catching up to rival Cadillac in sales, the brand did so with only three model lines (in place of the seven of Cadillac and four of Mercedes-Benz). After following the traditional Lincoln model cycle, the Town Car underwent a full redesign. While mandated by both passive-restraint requirements and fuel-economy improvements, a redesign to the Town Car proved risky, as the model line itself accounted for over half of all Lincoln sales.[25] To meet federal requirements, Lincoln marked the debut of several safety features within Ford Motor Company (and within the American luxury segment). Following the 1989 debut of dual airbags in the Lincoln Continental (1990 in the Town Car), antilock brakes (ABS) made their return on the Continental (1988) and on the Town Car (1992). In line with the Lincoln Mark VII, the exterior of the Lincoln Town Car shed many of its sharp-edged lines to allow for a far sleeker body design; other elements remained, including a formal rear roofline, chrome trim, radiator-style grille, and C-pillar quarter windows. In line with the Lincoln Continental, the 1990 Town Car adopted dual airbags. Delayed to 1991, the Lincoln Town Car marked the debut of the 210hp 4.6L Ford Modular V8 engine, the first overhead-cam eight-cylinder used in an American car since the Duesenberg Model J. Built on a revision of the Panther platform, the 1990 Lincoln Town Car shared its underpinnings (but no exterior panels) with the 1992 Ford Crown Victoria (dropping the LTD prefix) and Mercury Grand Marquis Following the introduction of the Mark VIII (see below), for 1995, the Lincoln Continental underwent a redesign, introducing a new version of the Ford Taurus chassis. Retaining the use of front-wheel drive, to better compete with Japanese-produced luxury sedans, the Continental was equipped with a 4.6L V8 engine (shared with the Mark VIII, tuned for front-wheel drive). 1998 marked a significant transition for the Lincoln model line. The Continental underwent a mid-cycle redesign, adding updated electronics and side airbags (the first time for a Lincoln). After a nine-year model model run, the Town Car underwent a major redesign of its exterior and interior, with the Panther chassis given a redesigned rear suspension. Partially influenced by the 1995 Continental and Lincoln Mark VIII, the exterior of the 1998 Town Car shifted to a far more rounded body, becoming the tallest Lincoln in 40 years. In contrast to the Mark VIII entering its final year of production, for 1998, Lincoln debuted the Lincoln Navigator full-size SUV. The first all-new Lincoln nameplate since the Lincoln Versailles, the Navigator shared its body with the Ford Expedition, competing against the Range Rover, Mercedes-Benz M-Class and Lexus LX450, the full-size Navigator offered additional cargo and towing capability unavailable in smaller luxury-oriented SUVs. Following the success of the Navigator in the marketplace, 1998 marked the first year Lincoln outsold Cadillac (by over 4,500 vehicles).[26] As a response to the Navigator, Cadillac introduced the Cadillac Escalade, a rebadged GMC Yukon Denali (itself a Chevrolet Tahoe variant). Lincoln Mark VIII[edit] After a nine-year production run (matching the Mark IV and Mark V combined), the Lincoln Mark VII was replaced by the Lincoln Mark VIII, remaining a variant of the Ford Thunderbird/Mercury Cougar. This was the first generation of the Mark series originally branded as a Lincoln. Further emphasis was placed on handling, with the Mark VIII (and Thunderbird/Cougar) becoming the only American-produced four-seat cars of the time with rear-wheel drive and four-wheel independent suspension. While the Mark VIII adopted the coupe profile of its predecessor, in an effort to modernize its styling, much of the body was radically streamlined (relegating the spare-tire hump to vestigial status). In massive contrast from its 1970s predecessors, the Mark VIII was given a cockpit-style interior, with all controls oriented towards the driver. In various forms, elements of the Mark VIII would be featured in other Lincoln models (the 1995 Lincoln Continental and the 1995 Town Car interior), and other Ford Motor Company products (the interior of the Ford Windstar minivan). While Designer Editions were discontinued, the LSC (Luxury Sports Coupe) made its return as the flagship Mark VIII model. During the 1990s, the Mark VIII competed in the mid-size luxury coupe segment, which was in overall decline. Though positively received by critics and buyers, the Mark VIII was withdrawn after the 1998 model year, outliving the Thunderbird and Cougar by a year. As of the 2019 model year, the 1998 Lincoln Mark VIII is currently the final version of Lincoln Mark series. As the division entered the 21st century, Lincoln began a period of major transition. In addition to ending production of the long-running Mark series, the Lincoln Navigator SUV had entered production, nearly unchallenged by European and Japanese manufacturers. As buyers of mid-size coupes in the luxury segments had shifted towards sports sedans, Lincoln developed an entry for the segment in the place of the Mark VIII. For 2000, Lincoln introduced the Lincoln LS mid-size sports sedan; coinciding with Premier Automotive Group (see below), the LS was developed alongside the Jaguar S-Type. Though the two vehicles shared a common chassis and related powertrain, no body panels were common between the two vehicles. The shortest Lincoln ever produced at the time, the LS was developed to compete with European and Japanese-produced counterparts, in line with the Cadillac Catera. While the Catera was imported from Germany (as a rebadged Opel Omega), the LS was produced alongside the Town Car and Continental in Wixom Assembly. For 2002, Lincoln introduced the Lincoln Blackwood, the first pickup truck produced by the brand and the first Lincoln manufactured outside of Michigan since 1958 (along with the Versailles). Derived from the Ford F-150 SuperCrew, the Blackwood was fitted with the front bodywork of the Lincoln Navigator and a model-specific pickup bed (with imitation wood exterior trim). In line with its name, all examples were painted black. The Lincoln Blackwood met with poor reception, due to its limited cargo capability (its pickup bed was effectively a carpeted trunk) and lack of four-wheel drive, leading Lincoln to discontinue the model after a single year of production. 2003 marked a period of transition of the Lincoln model line, as both the Town Car and LS underwent mid-cycle updates (with the Town Car receiving a full chassis redesign), with Lincoln introducing the second generation of the Navigator. As a complement to the Navigator, Lincoln introduced the Lincoln Aviator mid-size SUV. Sharing the body of the Ford Explorer with the Mercury Mountaineer, the Aviator adopted many styling elements from the Navigator, with a nearly identical interior design. While priced higher than its Mercury Mountaineer counterpart to avoid model overlap, the Aviator struggled to sell, as it competed closely against the Navigator sold in the same showroom. After 52 years of production, the Continental was discontinued for 2003. For 2005, Lincoln introduced a second pickup truck model line, the Lincoln Mark LT. Again based on the Ford F-150 SuperCrew, the design of the Mark LT was partially derived from the poor reception to the Lincoln Blackwood. While still fitted with Lincoln Navigator bodywork and interior trim, the Mark LT was fitted with a standard pickup bed; all wheel drive was available as an option. Following lower than expected sales, the Mark LT was withdrawn from the United States (in favor of Ford adding additional content to the Ford F-Series) in 2008; in Mexico (where the Mark LT was the highest-selling vehicle of the brand) Lincoln continued sales of the Mark LT through 2014.[27] During 2006, The Way Forward restructuring plan (see below) began to take effect on Ford Motor Company, with the Lincoln LS ending production. To replace the LS, Lincoln introduced the Lincoln Zephyr for 2006. In what would be the smallest Lincoln sedan ever, the Zephyr was derived from the Ford Fusion mid-size sedan. In an effort to distinguish itself from its Ford and Mercury counterparts, the Lincoln Zephyr adapted styling elements from Lincoln vehicles of the past, including a wide rectangular grille (1960s and 1970s Continentals), wraparound headlamps (late 1960s Continentals), and a twin-pod dashboard (early 1960s Continental). In 2007, as another part of The Way Forward, Lincoln began a rebranding of its model line. As Ford considered the Lincoln Mark series to have high nameplate recognition, Lincoln began to introduce similar "MK" branding across the model lineup. For 2007, the Lincoln Zephyr was rebranded as the Lincoln MKZ ("em-kay-zee"), with the 2007 Lincoln MKX ("em-kay-ex") crossover SUV introduced. Originally slated to become the second-generation Lincoln Aviator, the MKX was the Lincoln counterpart of the Ford Edge. Alongside the Lincoln Town Car, the Lincoln Navigator was not included with the MK rebranding; for 2007, it was redesigned alongside the Ford Expedition, marking the debut of the extended-length Navigator L. For the last time, a Designer Series Lincoln was produced, as Lincoln discontinued the trim on the Town Car after 2007. Produced only as a concept car, the 2007 Lincoln MKR marked the debut of the Ford EcoBoost V6. For 2009, Lincoln introduced its first all-new full-size sedan since 1980, the Lincoln MKS. Intended to be phased in as the replacement for the Lincoln Town Car, the MKS was the Lincoln counterpart of the Ford Taurus. Built on a Volvo-derived chassis, the MKS was the first full-size Lincoln with front-wheel drive (or optional all-wheel drive); shared with the Ford Taurus SHO, a 3.5L twin-turbocharged V6 was an option. Derived from the 2007 MKR concept, the MKS marked the production debut of the "split-wing" grille, a design element similar to the 1930s Lincoln Zephyr. A year later, the division introduced the Lincoln MKT crossover SUV, a counterpart of the Ford Flex. Sharing its chassis with the MKS, the MKT was sized between the MKX and standard-wheelbase Navigator. Premier Automotive Group & The Way Forward[edit] As Lincoln entered the 21st century, the brand underwent a major transition within the structure of Ford Motor Company. As Ford expanded its global automotive holdings during the 1980s and 1990s, it acquired Jaguar, Aston Martin, Land Rover, and Volvo Cars. To collectively manage its global luxury-vehicle holdings, in 1999, Ford organized Premier Automotive Group (PAG). The same year, the management of Lincoln-Mercury was shifted to the American headquarters of PAG, largely in an effort to engineer and market more competitive vehicles for the brand.[28] The integration of Lincoln into PAG would lead to several product changes within the division. Following the 2000 debut of the LS sports sedan, the Lincoln Continental was withdrawn in 2002. To avoid the model overlap that plagued the division two decades before, Lincoln chose to focus production on the Lincoln Town Car, one of the highest-profit vehicles of Ford Motor Company. During 2002, as part of a change of management, Lincoln-Mercury was removed from PAG and relocated within Ford Motor Company headquarters. In 2005, Ford developed The Way Forward restructuring plan in an effort to return to profitability. Among the seven vehicle assembly facilities slated for closure, Wixom Assembly (home to all Lincoln assembly since 1957, with the exception of the Versailles, Navigator, Blackwood, and Mark LT) was placed third, with an announced June 2007 closure. After a shortened 2006 model year, the Lincoln LS ended production. Initially slated for discontinuation after 2007, production of the Lincoln Town Car was shifted to St. Thomas Assembly in Ontario, consolidated with the Ford Crown Victoria and Mercury Grand Marquis. In 2011, all three vehicles ended production, coinciding with the closure of that facility. For the Lincoln division, the beginning of the 2010s introduced a number of structural changes. While Lincoln and Mercury were spared by The Way Forward, in 2010, Ford announced the closure of Mercury at the end of the year, with the final Mercury vehicle produced on January 4, 2011. After 30 years of production as a distinct model line (and 41 years as a Lincoln nameplate), the Lincoln Town Car ended its production run in 2011, coinciding with the closure of St. Thomas Assembly in Ontario. In contrast to the V8-engined Lincoln Town Car, for 2011, Lincoln introduced the MKZ Hybrid, a counterpart of the Ford Fusion Hybrid. The first Lincoln hybrid vehicle, the MKZ Hybrid was the first Lincoln equipped with a four-cylinder engine. Following the discontinuation of the Town Car sedan, Lincoln continued use of the Town Car nameplate, adding it to limousine and livery variants of the Lincoln MKT. Along with chassis modifications for heavy-duty use, the MKT Town Car features modified rear seating, with the third-row seat removed to create additional luggage space and second-row seat legroom. To reflect the end of the Lincoln-Mercury division pairing (from 1945 to 2010), in December 2012, the formal name of Lincoln was changed to The Lincoln Motor Company (its name prior to 1940).[29] To help differentiate Lincoln vehicles from Ford counterparts, Ford established separate design, product development, and sales teams for Lincoln.[30] In a marketing shift, Lincoln began to target "progressive luxury customers". luxury buyers seeking a vehicle solely for their own interests and avoiding ostentation altogether.[31][29] As part of the 2012 rebranding, for 2013, the Lincoln model line underwent several design revisions, headed by the release of the second-generation MKZ. Retaining commonality with the Ford Fusion (a rebadged Ford Mondeo), the MKZ adapted a distinct exterior from its Fusion/Mondeo counterparts (nearly unchanged from a Lincoln concept car released in 2012).[31] The MKS and MKT underwent exterior and interior revisions, adopting the "bow-wing" grille design of the MKZ. Also during this time, Lincoln introduced new trim level nomenclatures Premiere, Select and Reserve on the MKZ. Use of these trim names would eventually be expanded to other Lincoln models. For 2015, Lincoln introduced two new SUVs, with the all-new Lincoln MKC compact crossover SUV (derived from the Ford Kuga/Ford Escape) becoming the first Lincoln produced solely with four-cylinder engines. The Lincoln Navigator underwent an extensive revision, largely to preview buyers of its 2018 redesign. Along with extensive exterior and interior updates, the Navigator adopted the 3.5L twin-turbocharged V6 of the Ford F-150 as its standard engine, becoming the first version of the Navigator offered without a V8 engine. Following the positive reception to a 2015 concept car of the same name, Lincoln revived the Lincoln Continental nameplate for the 2017 model year (after a 15-year hiatus). Slotted as a replacement for the Lincoln MKS, the Continental was adapted from a version of the Ford Taurus designed for China. While slightly shorter than the MKS, the Continental is the longest-wheelbase Lincoln since the Town Car. The revived model line introduced a new design language for Lincoln; shifting away from the split-wing grille, the Continental introduced a recessed rectangular grille. The revived Continental marked the debut of the Lincoln "Black Label" program for all Lincoln vehicles. As a flagship trim line, Black Label vehicles feature specially coordinated exterior and interior design themes (similar to the Designer Editions of the Mark series), along with highly personalized customer service. For 2018, after an eleven-year production run of its predecessor, Lincoln released the fourth generation of the Navigator. Integrating the recessed rectangular grille of the Continental into its exterior, the Navigator is distinguished from the Ford Expedition largely from its taillamps and its blacked-out roof pillars (sharing the "floating roof" design of the Ford Flex and Ford Explorer). With the exception of the Ford GT supercars, at a base price of $95,000, the Lincoln Navigator Black Label is the most expensive vehicle ever sold by Ford Motor Company. The Lincoln MKZ underwent a mid-cycle redesign, adopting the grille design and twin-turbocharged V6 engine of the Lincoln Continental. Coinciding with the revival of the Lincoln Continental replacing the Lincoln MKS as its flagship sedan, Lincoln has begun to phase out its "MK" branding as model cycles of its vehicles are completed.[32] For 2019, the Lincoln MKX underwent a mid-cycle redesign, becoming the Lincoln Nautilus. Worldwide distribution[edit] In the 1990s and 2000s, Hongqi produced a license-built version of the Lincoln Town Car, based on knock-down kits imported from the United States.[33] In an effort to develop a successor to the Hongqi CA770, the Town Car kits were given an exterior redesign with different front fenders, headlamps, taillamps, and grille. Along with a standard-wheelbase sedan, three lengths of limousines were produced, along with the Hongqi CA7400 prototype.[33] In 2014, Ford Motor Company brought the Lincoln brand to China, launching the brand with the mid-size MKZ sedan and MKC small SUV.[34] By the end of 2016, Lincoln intended to establish a network of 60 dealerships in 50 cities, selling the MKZ, Continental, MKC, MKX, and Navigator.[35] 2016 sales increased 180% over the previous year, with Lincoln planning to produce vehicles in China by 2019.[36] To attract Chinese consumers, Lincoln introduced "The Lincoln Way", a car purchase and ownership model which provides highly personalized services to customers.[37] Lincoln vehicles are also available in South Korea, Most of the product line is sold but the Lincoln Navigator has not been introduced to the country. The vehicles were also available in Japan, until Ford Motor Company exited the market in 2016. In Europe, Ford Motor Company does not currently market the Lincoln brand. To compete against luxury-brand automobiles, Ford offers the Fiesta, Mondeo, Kuga, Edge, and S-Max under the Vignale brand name.[38] Middle East[edit] Lincoln vehicles are also available in several Middle East countries, including Saudi Arabia, United Arab Emirates, Qatar, Oman, Kuwait, Bahrain. North America[edit] Lincoln vehicles are also sold in Canada and Mexico. Lincoln achieved its two best U.S. sales years to date in 1989 (200,315) and 1990 (231,660), thanks largely to the popularity of the redesigned Continental, introduced in December 1987, and of the redesigned Town Car introduced in October 1989.[citation needed] Branding history[edit] Since 1958, Lincoln has used a framed four-pointed star as its brand logo. Introduced on the Continental Mark II in 1956, the four-point star has undergone various modifications in appearance, but has remained nearly unchanged since 1980. In 1927, Lincoln adopted a greyhound as a hood ornament, used into the 1930s.[39] As a replacement for the greyhound, Lincoln adopted a knight's helmet hood ornament, used before World War II. On the front fascia, Lincoln adopted a coat of arms with a red cross. Following the war, Lincolns adopted a rocket-style hood ornament until the adoption of the four-point star from the Mark II. Current model line[edit] Model Category Years Lincoln Navigator Full-size SUV 1998–present Lincoln MKZ Mid-size sedan 2007–present Lincoln MKT/MKT Town Car Mid-size crossover SUV 2010–present Lincoln MKC Compact crossover 2015–present Lincoln Continental Full-size sedan 2017–present Lincoln Nautilus Mid-size SUV 2019–present Although a luxury division, Lincoln has not been absent from motorsports. Like all American brands of the 1950s, Lincoln participated in the Grand National Stock Car series.[citation needed] They would continue into the 1980s until the Winston Cup Series dwindled down into a Chevrolet-Pontiac-Ford affair in the 1990s. The Continental Mark VII was raced in the Trans-Am Series in 1984 and 1985 without much success, with the best result being a ninth-place finish (at the 1984 Watkins Glen Trans-Am race[40]). Lincoln has also powered Le Mans Prototypes, acting as a substitute for Ford, in the American Le Mans Series.[citation needed] Presidential cars[edit] During the 20th century, Lincoln produced several official state limousines for Presidents of the United States, from Franklin D. Roosevelt to George H. W. Bush. Along with producing the first purpose-built presidential limousine, Lincoln produced two of the first armored vehicles for presidential use. A 1939 Lincoln Model K V12 convertible (with a Brunn body) was acquired by the government for the use of Franklin D. Roosevelt. As a result of its convertible top (to allow the president to appear in crowds without exiting the vehicle), the Lincoln adapted the name "Sunshine Special". In 1942, as a response to the beginning of World War II, the Sunshine Special adapted armor plating and bullet-proof glass; the retractable roof remained in use. Following the result of the security upgrades, the Sunshine Special expanded to 9,300 pounds. After traveling across the United States for the Roosevelt and Truman administrations, the Sunshine Special was retired in 1948. Today, the Sunshine Special is on display at the Henry Ford Museum in Dearborn, Michigan. As a replacement for the Sunshine Special, in 1950, the White House leased 10 1950 Lincoln Cosmopolitans (9 sedans and one convertible), bodied by Henney Motor Company with security upgrades from Hess & Eisenhardt. For 1954, President Eisenhower ordered a removable Plexiglas roof fitted to the 20-foot long Cosmopolitan convertible, with the vehicle adapting the "Bubble Top" nickname. Along with the Truman and Eisenhower administrations, Lincoln Cosmopolitans would see use by Presidents John F. Kennedy and Lyndon B. Johnson (once), with the "Bubble Top" retired in 1965. In 1961, President Kennedy began use of a modified 1961 Lincoln Continental convertible, bodied by Hess & Eisenhardt of Cincinnati, Ohio. Code-named SS-100-X, the Lincoln was an open car, designed with a set of interchangeable tops, including a black formal-profile top, plexiglass roof sections and a stainless-steel targa top for the driver's compartment. In presidential parades and motorcades, the limousine was often used as an open car (to avoid stress on the cooling system). In the open configuration, John F. Kennedy was assassinated in November 1963. Following the Kennedy assassination, SS-100X was initially investigated for evidence; in early 1964, the vehicle was released to Hess & Eisenhardt, effectively becoming remanufactured. Distinguished by a shift from navy blue to black paint and the permanent fitment of a roof, SS-100X underwent extensive security modifications, adding armor plating and bulletproof glass. Retired from front-line service in 1967, the 1961 limousine remained in service until 1977, used by Presidents Johnson, Richard M. Nixon, Gerald R. Ford, and Jimmy Carter. SS-100X is on display at the Henry Ford Museum in Dearborn, Michigan, along with the Sunshine Special. During the 1960s, alongside SS-100X, the Johnson administration used several Lincolns: including three 1965 Lincoln Continental Executive limousines (two used by the President; one was used by Secretary of Defense Robert McNamara) and a 1968 Lincoln stretch limousine, the latter is on display at the Lyndon Baines Johnson Library and Museum in Austin, Texas. For the Richard Nixon administration, the White House commissioned a state limousine based upon a 1969 Lincoln Continental, bodied by Lehman-Peterson of Chicago, Illinois. While again adopting the armor plating and bulletproof glass and other security features of SS-100X, to allow the President to stand upright and greet constituents from the motorcade, a sunroof was added to the vehicle above the rear passenger compartment. Used by President Nixon until 1974, the car is located at the Nixon Library in Yorba Linda, California. Developed for the second term of the Nixon administration, in 1974, the Gerald Ford administration replaced the 1969 Continental with an armored 1972 Lincoln Continental limousine. As a result of armor plating and security upgrades, the 1972 Continental was stretched to 22 feet in length, weighing nearly 13,000 pounds. Used by Gerald Ford, Jimmy Carter, and Ronald Reagan, the 1972 Continental has notoriety similar to the SS-100X, with its presence at two presidential assassination attempts. In 1975, the limousine rushed Gerald Ford away during the assassination attempt against him from Sarah Jane Moore. In 1981, Ronald Reagan was wounded in John Hinckley, Jr.'s assassination attempt. While not directly hit by a bullet from Hinckley, Reagan was wounded by a bullet that had struck the armor plating on the side of the car, richocheting off of the vehicle. Today, the car is on display at the Henry Ford Museum alongside the Sunshine Special and SS-100-X. The last current Lincoln used as a Presidential state car is a 1989 Lincoln Town Car, replacing a 1983 Cadillac Fleetwood Brougham. Commissioned for George H. W. Bush, the roofline was raised several inches to accommodate for the thickness of bulletproof glass. To better handle the weight of armor plating and security upgrades, the Town Car adopted the powertrain of a Ford F-250 pickup truck, powered by a 7.5L V8 and a heavy-duty E4OD 4-speed automatic transmission. Today, the car is on display at the George Bush Presidential Library in College Station, Texas. Following the 1989 Lincoln Town Car of George H.W. Bush, subsequent state limousines used by Bill Clinton and George W. Bush and the current one used by Barack Obama and incumbent President Donald Trump has been Cadillac branded vehicles. See also[edit] 1. ^ a b Lincoln Motor Company Briefing Book (PDF). New York: Ford Motor Company. December 3, 2012. Archived from the original (PDF) on December 4, 2012. Retrieved December 3, 2012. 1917 August: After departing a management position at the Cadillac Division of General Motors, Henry Leland and his son Wilfred Leland form the Lincoln Motor Company, which produces aircraft engines to fill World War I government contracts. 2. ^ "Our Brands: Lincoln Vehicles". Ford Motor Corporation. 2012. Archived from the original on April 28, 2014. Retrieved April 29, 2014. 3. ^ "Joy Falotico". Ford Media Center. Retrieved March 29, 2018. 4. ^ Davis, Michael W. R. (2002). Ford Dynasty: A Photographic History. Arcadia Publishing. pp. 54–55. ISBN 9780738520391. Retrieved 28 March 2018. 5. ^ Banham, Russ (2002). The Ford Century: Ford Motor Company and the Innovations that Shaped the World. Artisan Books. p. 95. ISBN 9781579652012. Retrieved 28 March 2018. 6. ^ Buss, Dale (December 3, 2012). "Ford Introduces the "Lincoln Motor Company" in New Branding Campaign". brandchannel. Retrieved March 29, 2018. 7. ^ "Lincoln China Sets Sales Record; Lincoln Global Sales Deliver Best Performance Since 2000". Retrieved 2018-05-18. 9. ^ O'Callaghan, Timothy J. (2002). The Aviation Legacy of Henry & Edsel Ford. Detroit: Wayne State University Press. ISBN 1-928623-01-8. 10. ^ "1917 Lincoln Model L Pictures, History, Value, Research, News -". Retrieved 2018-05-18. 11. ^ "Ford buys Lincoln - Feb 04, 1922". 2009. Retrieved 28 March 2018. 12. ^ Poe, Nathan. "Lincoln Motor Plant". U.S. National Park Service. Retrieved 28 March 2018. 13. ^ Bentley, John (1952). The Old Car Book. 208. 14. ^ Dammann, George H.; Wagner, James K. (1987). The Cars of Lincoln-Mercury. Crestline Publishing. ISBN 978-0912612263. 15. ^ Burgess-White, David (1974). Ward, Ian, ed. The World of Automobiles: An Illustrated Encyclopedia of the Motor Car. vol. 10. Orbis Publishing. ASIN B008G7ICEK. 16. ^ a b Dammann, George H.; Wagner, James K. (1987). The Cars of Lincoln-Mercury. Crestline Publishing. ISBN 978-0912612263. 19. ^ a b "1961 Lincoln Continental". HowStuffWorks. 2007-10-11. Retrieved 2018-05-19. 20. ^ "1961 Lincoln Continental". HowStuffWorks. 2007-10-11. Retrieved 2018-05-20. 21. ^ "1966-1969 Lincoln Continental". HowStuffWorks. 2007-09-04. Retrieved 2018-05-20. 22. ^ "1967 Lincoln Continental 4-Door Convertible full range specs". Retrieved 2018-05-20. 23. ^ "How Lincoln Cars Work". HowStuffWorks. 2007-06-08. Retrieved 2018-05-20. 24. ^ Loidl, Gerald. "The History of my Mark III". Retrieved 2018-05-20. 25. ^ "How Lincoln Cars Work". HowStuffWorks. 2007-06-08. Retrieved 2018-05-22. 26. ^ O'DELL, JOHN (1999-05-06). "Cadillac Apologizes to Lincoln for Inflating Sales Numbers". Los Angeles Times. ISSN 0458-3035. Retrieved 2018-05-22. 27. ^ "El poder es producto de la superacion". Archived from the original on January 6, 2013. Retrieved January 15, 2013. 29. ^ a b "Lincoln Forges Dynamic New Path with the Introduction of 'The Lincoln Motor Company' and All-New MKZ Luxury Vehicle" (Press release). New York: Ford Motor Company. December 3, 2012. Archived from the original on December 4, 2012. Retrieved December 3, 2012. The company, introduced as The Lincoln Motor Company, unveiled its all-new MKZ midsize luxury sedan and a strategic plan to reinvent the premium automotive marketplace 30. ^ Dyer, Ezra (December 21, 2012). "Lincoln Strategy: We'll Try Anything". The New York Times. Retrieved March 29, 2018. 31. ^ a b Dapena-Valdes, Peter (December 3, 2012). "Ford Restarts Lincoln Motor Co". CNN. Archived from the original on December 4, 2012. Retrieved December 3, 2012. As it attempts to revive a once-great luxury brand, Ford's is renaming its Lincoln division as the Lincoln Motor Co., the automaker said Monday. 32. ^ "2019 Lincoln Nautilus First Look: MKX Replacement Gets New Name". Motor Trend. 2017-11-28. 33. ^ a b "Tycho's Illustrated History Of Chinese Cars: Red Flag's Lincoln Years - The Truth About Cars". The Truth About Cars. 2012-01-05. Retrieved 2018-05-23. 34. ^ "Lincoln Launches in China; Unique Offering for Today's Chinese Luxury Auto Customers" (Press release). Lincoln Motor Company. Retrieved June 30, 2015. 35. ^ "Lincoln Unveils Three All-New Vehicles at Auto Shanghai 2015" (Press release). Lincoln Motor Company. Retrieved June 30, 2015. 36. ^ "Ford's Lincoln plans to produce luxury SUV in China by late 2019". Reuters. March 13, 2017. Retrieved April 30, 2018. 37. ^ "Lincoln Opens First Stores in China and Unveils 'The Lincoln Way'" (Press release). Lincoln Motor Company. November 6, 2014. Retrieved April 30, 2018. 38. ^ "Ford Vignale - Ford GB". Retrieved November 20, 2016. 39. ^ "1927 Lincoln Model L Pictures, History, Value, Research, News". Retrieved 2018-05-23. 40. ^ "Lincoln Mark VII-Theus". RacingSportsCars. External links[edit]
global_01_local_1_shard_00001926_processed.jsonl/55257
Taking off with Apollo What building an internal application revealed about Apollo For almost a year, the Gusto Development Experience (or DEx) team has been working on an internal application called Flightdeck. Engineers visit Flightdeck for regular engineering tasks, like running database migrations. Our long-term goal is for Flightdeck to be a tool with all phases of Gusto software development and maintenance. Flightdeck: like this, but for your web applications. Learnings and warnings Most of the engineers on our DEx team have product engineering experience. We have worked on our customer-facing app as well as applications used by internal operations teams. These applications are mostly React.js built atop RESTful APIs. When starting development on Flightdeck, we knew that we loved React’s declarative and productive paradigm. However, we also were jaded from the front-end and back-end boilerplate needed to integrate it with a RESTful API. Having heard about GraphQL from React Conf, GitHub's API, and elsewhere, we decided to try it. We chose Apollo because of its good documentation and community involvement. We’ve passed the first months with Apollo on our young application. Here are the biggest things we learned about the framework. Container components are hard to unit test For the uninitiated, “container” components are the components returned by the graphql higher-order component (HOC). In order to test them, you must mock the GraphQL layer; this involves recreating the type definitions in your GraphQL backend, in addition to any mutation signatures. For a young application in which mutations are likely used in only one place, recreating their signatures feels unpleasantly tautological. To make matters worse, the test utils' documentation isn't great. In Flightdeck, container components are only used in one place each. Given that, and that we're encouraging Capybara integration tests for discrete new features, we've skipped unit testing the container components for now. (We’re still unit testing all of our other components.) Because Gusto engineers have strong reflexes to maximize test coverage, this has resulted in integration tests for all of our recent features. We recognize that integration tests may become more difficult to write if our app grows much larger, and we’re hoping for improvements in apollo-test-utils’s documentation. Colocating components and their data requires some boilerplate, but it’s worth it We’ve arrived at a simple pattern for components at different levels of nesting to define their data requirements. This is inspired by Relay's "fragment containers". Each “view” (non-container) component defines a static fragments attribute. This attribute is an object whose keys are GraphQL type names, and whose values are GraphQL fragments. This attribute has an entry for any type whose data is required by the component or one of its children. If a child depends on a type's data as well, the child fragment is included in the parent’s corresponding fragment. The name of each fragment must be unique across the set of all fragments used in any given GraphQL document. We’ve found the naming convention ${ComponentName}_${TypeName} as in TodoItemList_Todo, to be the best combination of readability and uniqueness guarantees. class TeamShow extends Component { static fragments = { team: gql` fragment TeamShow_Team on Team { mission { failedBackgroundJobs { application { environment { runtimeExceptions { project { render = () => ( this.props.failedBackgroundJobs.map(job => ( <JobTabs job={job} key={job.id} /> this.props.runtimeExceptions.map(exception => ( <ExceptionTable exception={exception} key={exception.id} /> Polling is a nice option Apollo polls your backend with the same query if the pollInterval prop (Apollo 2+) or option (Apollo 1) is supplied. For pages of your application that have well-isolated data requirements, it’s a much simpler option than writing mutation cache updates. However, beware of errors: if you hit any, polling will log tens of errors to your browser devtools. Polling pains Be careful with required fields Think very carefully about what fields are required in your GraphQL type definitions, i.e. those that use the ! operator. We've already run into multiple Apollo-layer exceptions from overzealous usage of this operator. If you’re certain that the field will always be present, as in field that directly maps to a NOT NULL database column populated by your backend, then it’s the right choice. For fields that have presence validations at the backend validator/model layer, you may want to make them nullable in the GraphQL mutation signature. If a null value is passed to a mutation whose definition includes a not-null argument, the mismatch will be surfaced as the unergonomic error “cannot return null for nullable field…”. If your backend model layer is the highest layer at which you validate presence, you will be able to surface more semantically meaningful error messages. Performing this validation at the view layer (before the data reaches GraphQL) could also help. Mutation resolvers that return static values are okay Most GraphQL examples illustrate querying for fields on the return value of a mutation. We’ve found that it often makes sense to call a mutation without any such querying. For example, we have one mutation resolver that simply enqueues a background job, and always returns a JSON response { “success”: true }. We wrote a simple “Status” type, with a single required boolean success field, to make this easier. Expose datetime fields as strings We chose to expose datetime fields as strings rather than integers (which would represent seconds since the Epoch). This lets us use a single backend service to handle date formatting, and lets us skip a front end dependency to handle time zones. Beware __typename__ The __typename__ field is present by default in GraphQL query results. This could cause problems as an extra field when feeding a query result into a mutation. To make this more seamless, the addTypename configuration field for ApolloClient can be leveraged: new ApolloClient({ link: new HttpLink({ uri: 'http://localhost:4000' }), cache: new InMemoryCache({ addTypename: false This is a little different for react-apollo 1.x: new ApolloClient({ addTypename: false, networkInterface: createNetworkInterface({ uri: '/graphql' }) Future Improvements to our Flightplan We’ve made a lot of improvements by reflecting on these points, but we’re not done yet. Here are some of our ideas for future improvements to our Apollo stack: Be more consistent when handling error fields Most of Flightdeck’s interactions with its backend consist of CRUD actions with corresponding validations. For this reason, it’s common for our GraphQL type definitions to have an errors field that contains the details of validation failures for an action, if any. These fields are currently defined on an ad-hoc basis for each type. We’d like to try leveraging interface types so that we can define this field only once. More consistent handling of dates I mentioned earlier that we’re defining date fields on GraphQL types as strings, to prevent having to handle formatting and time zones on both the front and back end of Flightdeck. However, we’re still invoking a date formatting class for each of our many date field definitions. A cleaner approach may be to define a custom scalar type that knows how to coerce inputs and results. Here’s what that might look like in graphql-ruby: Types::Scalar::DateTimeType = GraphQL::ScalarType.define do name 'DateTime' description 'A date and time in ISO 8601 format: "2018-01-01T23:59:59.123Z"' -> (value, _ctx) do rescue ArgumentError raise GraphQL::CoercionError, "cannot coerce `#{value.inspect}` to DateTime" coerce_result -> (value, _ctx) { value.nil? ? nil : value.to_time.utc.iso8601(3) } Installing eslint-plugin-graphql This eslint plugin enables checking your GraphQL documents against your GraphQL schema for a host of problems, including missing operation names and type name formatting. Installing the plugin is simple, but generating a schema for it to consume requires a bit more thought. We’ve had a good time with Apollo so far. It’s freed us of a lot of boilerplate, and allowed us to focus more time on thinking about and writing features. We’d definitely recommend you give it a spin, but just remember our suggestions above when things get bumpy. Kurt has worked as a software engineer at Gusto for 3 years. He's passionate about developer tooling and front-end technologies. He’s a telenovela connoisseur.
global_01_local_1_shard_00001926_processed.jsonl/55268
fredag 31. juli 2015 Have a look at my new blog A few months ago I launced my new blog in Norwegian called Mitt liv som Erik (My life as Erik). That's why there have been no updates on Erik's Musical Diary for ages. But I see people still come to this site to check out videos, so I wanted to give everyone a heads up as to what I'm currently doing. As my new blog is written in Norwegian it may not make much sense to some of you, but there are loads of playlists, music videos, news etc. and other stuff as well. You'll find articles on books and films, travel tips, photography, articles referring to my life, interviews with different acts and authors and much more. I've even got my own radio show. If you're interested you can check it out here. Thanks! 1 kommentar:
global_01_local_1_shard_00001926_processed.jsonl/55269
 » INET_E_RESOURCE_NOT_FOUND - Error Support for Windows PCs The previous Windows versions all came with Microsoft’s browser Internet Explorer. A lot of users love it because not only that it is easy to use. It is also very fast. Users didn’t have to worry about compatibility because it is almost always compatible to its Windows Version. When they introduced Windows 10, they changed the name of the browser from Internet Explorer to Microsoft Edge. It is faster and more user-friendly compared to its predecessors. But after the Creator Update, some experienced receiving the inet_e_resource_not_found error code. In contrary to what everyone expects, you actually don’t have to uninstall and reinstall the Microsoft Edge App. What you can do is to reset the browser in your Apps & Features Settings in your Microsoft Settings. To reset the browser you can follow the steps below: 1. Click on the Windows icon and go to settings. 1. Click on Apps and this will bring you to the Apps & Features page. Look for Microsoft Edge from the list of Apps and click on it. 2. Choose Advance Option 1. Scroll down then Under Reset, click on repair or reset. When you repair it will fix the existing problem but the data that caused the problem may still be present and can still cause problems. If you click on reset, it will delete all the cache and cookies that are installed in your browser but it will save your Favorites as well as your bookmarks. Another way to resolve this is by disabling the feature TCP Fast Open on Microsoft Edge. To disable this, go ahead and follow the steps below: 1. Open the Microsoft Edge browser. 2. Type in about: flags on the Address (URL) bar. 3. Under Networking, uncheck the Enable TCP Fast Open. 4. Close your Microsoft Edge browser and open a new one. Flushing the DNS also worked for other Users. Sometimes, the error code the inet_e_resource_not_found is caused by a corrupted DNS cache. There are 2 ways to flush your DNS. The first option is to use the command prompt to run the command. 1. To access the Command prompt or CMD, you can search for it on the Cortana or you can click on the Windows icon to access the Programs, scroll down to the Windows System folder and click on it. 2. A dropdown menu will show up, click on Command Prompt which is the first on the list. 3. Type in the code ‘ipconfig /flushdns and press enter. 1. There will be a message that will show that says Windows IP configuration successfully flushed the DNS Resolver Cache 2. Exit the CMD by typing exit and press enter. The easiest way to do this is to Press the keys Window + R on your keyboard. Type in ipconfig /flushdns in the search box and hit enter or click on OK. These are only some of the ways to resolve the inet_e_resource_not_found. There are other ways to further troubleshoot this issue such as reinstalling your Wifi Adapter Driver or adjusting the DNS Server Address. But most of the time, users are able to resolve the issue with the steps provided above.
global_01_local_1_shard_00001926_processed.jsonl/55286
Site Management, Analytics Easy Google Analytics • Favourite • Report Main features: > Automatiaclly places Google Analytics tracking code in head tag > Choose what you are tracking: Universal, Single domain, Multiple Subdomains, or Multiple TLD > Option to exclude Analytics in Administration backend > Track Outbound Links via Google Event Tracking Known Issues: The tracking code may not be the last script tag before the tag, because of when the template script tags are added. This may cause a performance issue in some browsers, as specified by Google Help. Easy, efficient Posted on 21 October 2013 I'm using Easy Google Analytics on a few websites for months. Installing and configuring it takes less than a minute; results are immediately available for every single page. It adds only 8 lines in the header of pages and loads GA's script asynchronously, wich means no slowdown. Good job! Perfect Plugin Posted on 17 September 2013 excellent plugin...easy to use. thankyou very much... I needed to find a Google Analytics plugin that included event tracking and this does exactly that. There was a small conflict with something else on my site but Michael (the awesome developer) came to my rescue and fixed it for me very quickly. He was extremely helpful and the plugin is fantastic. Thanks :) Couldn't be simpler Posted on 03 June 2012 I'm just learning Joomla and setting up my first simple site, although I've set up several sites using Wordpress/Tumblr. This was only the second extension I've downloaded. As the last step in the development process I was looking for a plug-in to deal with Google Analytics. This one does the job very well. Once you've uploaded it all you have to do is enter the Google tracking code through the plug-in menu and you're away. Hits are then coming through on Analytics just fine. Couldn't be simplier. simple to install, easy to setup settings and works exactly as explained. The admin exlude is a nice additional feature! The inserted code is placed absolutely correct and does not interfear with other template scripts. Works as Advertized Posted on 07 November 2011 Installed properly on my 1.7 site, entered the tracking number and viola it works. Making it easy Posted on 07 November 2011 I have tried a number of Google analytics plugins. This one is great in that it supports all the Joomla versions, the asynchronous method AND does not require touching the template. It also recognizes where there might be a small performance issue - nice when a developer does that. Easy and powerful Posted on 13 September 2011 It works perfectly and does not conflict with other javascript. Thanks :) Easy Folder Listing Pro Easy Folder Listing Pro Paid download Easy Folder Listing Pro By Michael A. Gilkes This is a flexible, simple-to-use extension that is used to list the contents of any folder. This extension comprises of a component, a content plugin and an editor extender plugin. You can easily specify what you need through profiles and/or through shortcode overrides. With the editor extender, placing your shortcode in the article is even easier than ever! The folder listing can be displayed i... Advanced Folder Listing Advanced Folder Listing Paid download Advanced Folder Listing By Michael A. Gilkes Description: This is a Joomla component that allows administrators to display a list of files located in a folder in the Joomla directory. This component offers the ability to add any type of custom data to the table of filenames. There are 9 built-in meta data fields, and the admin can add any type of additional field desired. Main features: > List files in any specified folder > List files in... Pure Tabs Pure Tabs Paid download Pure Tabs By Michael A. Gilkes Article Elements Description: This is a flexible, simple-to-use plugin that is used to add tabs to any article created in Joomla. Pure Tabs can display tabs at four different positions: top, left, bottom, or right. You can have multiple tabs in the same article. The content of each tab is independent of the other tabs. You can place custom text, modules, or even the contents of other articles in a tab. This plugin... Easy Folder Listing Easy Folder Listing Easy Folder Listing By Michael A. Gilkes Easy File Uploader Easy File Uploader Easy File Uploader By Michael A. Gilkes File Management This is a flexible file upload module. It allows the administrator to specify a destination folder, and allows the user to upload files to it. The administrator can also specify how many files that can be uploaded simultaneously, as well as the text in the front end. You can even have more then one module of its kind on the same page. Main features: > Upload files to a specified folder in the 'i... Easy Flash Uploader Easy Flash Uploader Paid download Easy Flash Uploader By Michael A. Gilkes File Management ** Important: If you are using version 2.0 or earlier, please upgrade to 2.1.5 to fix a security vulnerability that exists in earlier versions. ** Easy Flash Uploader v3.1 Copyright: Michael A. Gilkes License: GNU/GPL v2 Description: This is a flexible flash file upload module, based on SWFUpload It allows the administrator to specify a destination folder, and allows the user to upload... Pure Slider Pure Slider Paid download Pure Slider By Michael A. Gilkes Pure Slider Minimum Requirements: > Joomla 2.5 or 3.0 Description: This is a flexible, simple-to-use plugin that is used to add a Nivo-based Slider to any article created in Joomla 2.5 or 3.0. It works with either Mootools or jQuery, or even both at the same time. Main features: > Choice of Nivoo v1.2.1 (Mootools) or Nivo v3.2 (jQuery) as slider engine > Makes a Slider of the images files in... Easy Google Analytics Michael A. Gilkes Last updated: Nov 18 2015 Date added: Nov 19 2014 GPLv2 or later Free download This extension does NOT implement the Joomla! Update System Write a review
global_01_local_1_shard_00001926_processed.jsonl/55288
10 Facts about Censorship Wednesday, November 11th 2015. | Social The suppression of information, communication and speech considered as harmful, objectionable and sensitive is explained on facts about censorship.  The institution, government, or media outlet usually has the responsibility to define and supervise censorship. The individuals, private organization and governments can participate in censorship. Facts about Censorship 1: the self censorship Many people do not realize that there is self censorship. When you apply censorship on the speech, book or works, you do a self censorship. Facts about Censorship 2: the types of censorship There are two main types of censorships. The people or institution can conduct the indirect or direct censorship. Censorship and Book Censorship and Book Facts about Censorship 3: the applications of censorship Censorship can be applied in various types of media. It can occur on the books, movies, music, speech, poster, art, painting, radio, internet, TV program, and press. Facts about Censorship 4: the reasons behind censorship There are various reasons why the media like books or movies are censored.  Censorship can be used to control obscenity, to protect national security, the prevent the hate of speech, to avoid the child pornography, and many more. Facts about Censorship Facts about Censorship Facts about Censorship 5: the legality It is not easy to define the legality of the direct censorship.  The legality can be seen on the content, place and style. Therefore, the direct censorship probably is legal or not legal. Facts about Censorship 6: the military censorship There is a military censorship used to keep all tactics and intelligence in the military confidential. To get the military information leaked, the enemy often has the espionage. Get facts about army here. Facts about Censorship 7: Book censorship The censorship can be conducted by the government or even institution. When a certain book is banned in a country, it will be removed from the libraries and schools. Facts about Censorship 8: the censorship in films There are various reasons why a film is censored. It can be caused by the obscenity, pornography, ethnic stereotyping, racial attitudes and many more. Censorship Movie Censorship Movie Facts about Censorship 9: music It is very surprising that censorship can be applied on music too. The educational system, religions, states, retailers, groups and families can do the censorship. Facts about Censorship 10: photos censorship The photo censorship occurred in 2015 after the magistrate court of London ordered that the paintings and photos created by Graham Ovenden to be destroyed. He is a visual artist and photographer from Britain. The copies of his works located in online Tate gallery were removed too. Censorship Facts Censorship Facts What do you think on facts about censorship? tags: ,
global_01_local_1_shard_00001926_processed.jsonl/55294
Legion FX S01E01 – E03 We’re launching our coverage of Legion with a packed episode chatting about the first three episodes of season 1. There is a LOT to talk about here, and we went into this with 10+ pages of notes on everything from the characters’ powers to the many references and homages prevalent in the series to the meaning of reality. As mentioned in the episode, I created a survey on the most popular theories thus far, and I’d love for you all to take it! Here is the link. I will be going over the results in our episode 4 podcast, so tune in next week for that. Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/55307
May 2018 Film Roundup Nearing the mid-year point in my 2018 challenge to watch an unseen film (something new, or new to you) every day, May is the second month in my sub-challenge to watch more than 50% films directed by women (as it’s a month with a woman’s name… please keep up). Again, I’m still posting notes on all of them over at Letterboxd, but a round-up is required. Turns out that as the sun and warmth has returned slowly to Britain, I’ve been watching fewer films, so closer to 30 than 50 this month, and far more short films. Top 5 New Films (on their first release in the UK) The Breadwinner (2017, dir. Nora Twomey) The Dreamed Path (2016, dir. Angela Schanelec) Waru (2017, dir. various Maori woman directors) Raazi (2018, dir. Meghna Gulzar) Tully (2017, dir. Jason Reitman) Three of these films were given a release at cinemas; some other films that came out in May that I’d already seen include Lucrecia Martel’s Zama, which I’d probably have put on this list if it were new to me, although it took my second viewing to get into it fully, so perhaps it’s a grower. The Indian film turned out to much stronger than I usually expect of Bollywood features. The German film was given a premiere at Genesis Cinema but otherwise was just on streaming service Mubi. However, after seeing a number of other Angela Schanelec films this past few months thanks to Mubi, I found it to be an enigmatic and mysterious film with what I perceived to be hidden depths that may reveal themselves if I were to watch it again. Finally, there’s Waru which (as yet) has had no UK release in any form, but my mum sent me the DVD. It’s a series of short films all based around the same fictional premise (the death of a young child) on a marae. Given the format, some are better than others, but on the whole it’s a strong piece. Top 10 Old Films (but new to me) A Tale of the Wind (1988, dir. Joris Ivens/Marceline Loridan) The World (2004, dir. Jia Zhangke) As I Was Moving Ahead Occasionally I Saw Brief Glimpses of Beauty (2000, dir. Jonas Mekas) 24 City (2008, dir. Jia Zhangke) The Holy Girl (2004, dir. Lucrecia Martel) Urban Rashomon (2013, dir. Khalik Allah) Peppermint Soda (1977, dir. Diane Kurys) The East Wind (El Chergui) (1975, dir. Moumen Smihi) There’s Always Tomorrow (1956, dir. Douglas Sirk) Together (1956, dir. Lorenza Mazzetti) None of these are Criterion films. Instead, there are a few shorter pieces I caught up on to fill my daily gap (the Allah film is on YouTube, as is the Mazzetti, although it was on the BFI’s “Free Cinema” set of British new wave films and documentaries of the 1950s). As Lucrecia Martel’s latest was out, I thought I should go see a retrospective screening of one of her earlier films, the wonderful (and possibly underrated by me) The Holy Girl. Another celluloid screening was the rare Moumen Smihi film, a Moroccan filmmaker whose work isn’t much shown or available. Two of the others were on Mubi (the almost-5hr long Jonas Mekas assemblage and the Sirk film, as part of a season of his work). Finally there were some I rented, including the Ivens film I put up the top, several Jia films (of which I think The World is my favourite, dealing with alienation in the modern world), and the Diane Kurys period film, a slightly sentimental but lovely coming of age set in 60s Paris. You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/55323
The Only Way To Make Things Right… …is to stop trying to make things better. You cannot build the perfect skyscraper upon a foundation of mud, and yet this is exactly what you humans are trying to do. You idealists, you who demand change, you who are so sincerely trying to make things better. The more sincere you are, the more you repulse Me, because your sincerity is so misguided, and represents such a failure of personal potential. You seek to help children by providing parenting classes. You seek to end poverty via a universal basic income. You seek to reduce crime by preventing child abuse. You seek to improve religion by promoting tolerance and moderation. You seek to improve government by demanding accountability. The list of your stupidities is endless, and all you are doing is making everything worse. Because none of this is right, none of this should exist, none of it is based upon sanity, logic, or Truth. Don’t you see, you are trying to build upon what must be destroyed! Things that are wrong must be destroyed, not changed! The family unit is a mistake, it is something wrong, to be eradicated and replaced by something right, not modified in useless ways. You cannot fix something that should never have been built up in the first place. The same applies to religion, government, money, the criminal justice system, marriage, external love, and so much more. These human constructs should not exist, they were ideas that were wrong, mistakes of human judgment and perception at best, or evil concepts deliberately developed, promoted, and exploited by genocidal humans who sought and attained leadership and influence in order to avenge themselves. It does not really matter how these diseased structures came to be rooted to human reality perception. What matters to those of us who seek Truth, is that they be recognized as structures that must be completely destroyed. Anything else, anything less, any and every attempt to “reform” and improve them, legitimizes the genocide they cause. You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/55325
The House Foreign Affairs Committee The House Committee on Foreign Affairs, chaired by Republican Ed Royce of California, considers legislation that impacts the diplomatic community, which includes the Department of State, the Agency for International Development (USAID), the Peace Corps, the United Nations, and the enforcement of the Arms Export Control Act. Learn about Chairman Ed Royce. Discover the Committee’s jurisdictional role in Congress. Meet the members who serve on the Full Committee and subcommittees. View the Committee Rules for the 115th Congress. View the Oversight Plan for the 115th Congress. 2170 Rayburn House Office Building Washington, DC 20515
global_01_local_1_shard_00001926_processed.jsonl/55335
General Headphone Discussion   Comparisons About the Comparisons category (1) Sennheiser Momentum2.0 vs AKG k550iii (7) Douk Audio - Nobsound - Little Bear: MC Mini Switcher (3) Sennheiser HD58X vs Focal Elex Impressions (13) Suggestions for in-ears (16) Is it just me or am I the only one who just can't stand IEM. So,I just buy cheap and basic just for exercise (18) Best Poor Man Set Up ( 2 ) (37) Beyerdynamic T90 vs HD 650 (1) Sony ZX300 vs WM1A (3) Fazor vs Non-Fazor (7) Noble Trident vs. CA Comet/Orion (2)
global_01_local_1_shard_00001926_processed.jsonl/55338
Ionic Input shows [object Object] as placeholder Hello Ionic community, I am very new to the Ionic Framework, Angular JS and TypeScript but trying to improve as fast as possible. But now I encountered a problem I can’t seem to solve, not even using Google :smile: So I was just trying a simple Input function. This is the relevant part of my .html file: <ion-content padding> <ion-input type="text" placeholder="Enter token" [(ngModel)]="var1"></ion-input> <button ion-button block (click)="login()">Login</button> And this is the relevant part of my .ts file: export class StartPage { constructor(public navCtrl: NavController, public navParams: NavParams) { var1 ={} login() { ionViewDidLoad() { console.log('ionViewDidLoad LoginPage'); So the Input field should show “Enter token” as a placeholder, right? But when I run ionic lab it just shows “[object Object]”. So why is that? By the way I regarded the page for this, but just wanted to make this feature as simple as possible. I am grateful for any hints. Because of the bolded part in the ion-input documentation for placeholder: Instructional text that shows before the input has a value. So once the input has a value (which it does when you bind [ngModel]), the placeholder attribute is ignored. <ion-input> is expecting its ngModel to be a string, and if it isn’t, it tries to coerce it into one, and Object-to-string coercion on your var1 of {} which is an Object results in “[object Object]”. Thanks for the quick answer, I see the problem. So do you know of an easy way to only bind [(ngModel)] once you click the Login Button, while still being able to get the input? I was trying out a few things but couldn’t find an easy workaround. No, and I can’t even make any sense out of that. If what you are trying to achieve is changing what appears in the input control before the user starts entering anything into it, you have two options, both of which need var1 to be a string and not an object: Option 1: simply prime the backing property var1 = "placeholder text can go here"; <ion-input [(ngModel)]="var1"></ion-input> Option 2: placeholder will do its job if the bound property is an empty string: var1 = ""; <ion-input [(ngModel)]="var1" placeholder="placeholder text can also go here"></ion-input> Oh yes that’s what I was trying to do. your second option works very well for me, thanks a lot. Edit: is there any way to mark this as answered? or should I just edit the title I think there is supposed to be a checkbox next to each response that you as the OP can use to mark a particular post as the solution.
global_01_local_1_shard_00001926_processed.jsonl/55340
Dumb question time bros! Sooooo I have no clue how to word this …ig i’m just gonna hope people know what the frick im talking about. lol. Anyways so sometimes when I read a story and it’s zoomed in when they zoom out it zooms out slow and in like a half circle like…(oh my gosh I have no idea how to word this if you cant tell)it zooms out but the screen goes down then back up all while zooming out ya know?..No?..okay. any hoodles I WANNA KNOW HOW TO DO THAT it looks so fun. If you have no idea what im talking about I do not blame you ummmm i dont think i even know what im talking about. fun times. I THINK I understand but tell me if I’m going in the wrong direction here. Zooms do that naturally, like if you zoom in one place then you zoom out and like it does that by itself- Nevermind forget this lol I’m confused myself. Idk how to explain? AMERICA EXPLAIN first of all i love you for referencing a vine, and secondly im also confused :joy: words and explaining things has never been my forte, sorry for confusing you and thanks for trying to help. Update: Okay!!! I finally found someone that knew what the frick they were talking about! so i found what a needed. Thanks to everyone that wasted their time and lost a few brain cells while reading my topic your an og.
global_01_local_1_shard_00001926_processed.jsonl/55342
Salvage drone 2 maybe (sylveon is kawaii) #1 I don’t know if anyone else wants to see salvage drone 2’s but I kinda do like to have incentive to train salvage drone operation to 5 like just powerful enough to salvage the wrecks the tech 1 drones can’t be nice to see them one day (Nevyn Auscent) #2 Salvage drone 1’s can salvage anything but high grade sleeper wrecks. If 2’s were introduced that could, then why would you ever fit a salvager again. (sylveon is kawaii) #3 just a thought I had a few times I wouldn’t think it’d be too game breaking you’d still need to be omega to use em so I figured why not post on the forum and get some other peoples thoughts (MinerArt) #4 They’re already omega limited and a salvager will always work faster than a drone. So speed. Incidentally a T2 would be excessively weak. (system) #5
global_01_local_1_shard_00001926_processed.jsonl/55343
Take a pos from a corp i'm in war dec with (Healer Ivanov) #1 I’m interested by pos and achorable structure but i have the folowing question, it is possible to take controle of an enemy structure during a war dec ? (Obil Que) #2 If you destroy the “stick” you can scoop undamaged POS mods from around it but you cannot steal it or take control of it in any way. (Vere Malum Stultus) #3 Obil is correct you can destroy the tower and take all the stuff around it… but you can never take control directly, sadly. (system) #4
global_01_local_1_shard_00001926_processed.jsonl/55344
Yellow Screen iPod Nano Discussion in 'iPod' started by iJesus, Oct 2, 2007. 1. iJesus macrumors 6502a Jun 30, 2007 Reno, Nevada So I have 3 iPod Nano's (well, mom's, dad's, and bro's) and today when I had my brother's iPod nano in my pocket ink from a pen got all over it in my pocket (pen pooped ink) so i compared the screen to the other 2 nanos and it looked yellower than the other 2 and I was wondering if there is anything to get rid of that? BTW, all 3 are the 3rd Gen iPod Nano's 2. mad jew Moderator emeritus mad jew Apr 3, 2004 Adelaide, Australia You could try a small amount of Eucalyptus oil. Just dab some on a cloth and then rub the screen. Don't use too much though. :) Share This Page
global_01_local_1_shard_00001926_processed.jsonl/55349
1. themopar's Avatar Hello all WP Fans, I am posting this for curiosity sake. I forced TWO updates on My AT&T Lumia 900. Now I keep here -- 3 Updates went out. I only DID TWO. I did successfully get WP 7.8. Phone is running fine... HOWEVER If I am missing a Firmware/HW Update I would like to get it.. So my question is can ANYONE who has the ENTIRE last update done... Confirm my version numbers? OS version: 7.10.8858.136 Firmware: 2175.2307.8858.12480 HW Revision: 112.1914.2.0 Radio Software: Radio HW: 8055 Bootloader Ver: CHIP SOC Ver: 02-03-2013 03:16 PM 2. TX6shooter's Avatar I had the same result on 2 different AT&T Lumia 900's, only 2 forced updates. My version numbers are identical to yours. Can anybody who received 3 shed some light on this. 02-03-2013 03:24 PM 3. smsmith1975's Avatar It was other phones (manufacturers/models) that were getting three updates, not the Lumia 900 on ATT. The first was some sort of update that dealt with handling the camera on phones without buttons, the second was the 7.8 update. Select phones that were getting a third update (prior to the 7.8 update) was for something else. cheesemoo likes this. 02-03-2013 05:24 PM 4. VineRider's Avatar Below is from Nokia's website. I forced the update via zune and had to force 2 updates. The last update occurred automatically and it was the nokia update for the firmware. at&t lumia 900. a total of 3 updates for me Support for your Nokia Lumia 900 Latest software release for Nokia Lumia 900 is 2175.2307.8858.12480 • Theme colors added 02-03-2013 08:21 PM 5. themopar's Avatar That's what I heard.. What do your software and firmware versions look like compared to mine? If you would be so inclined to share? 02-03-2013 10:19 PM 6. VineRider's Avatar They are identical 02-03-2013 11:01 PM 7. themopar's Avatar Thank you much! 02-04-2013 08:48 AM 8. Old_Cus's Avatar Well dang. I had to force two upgrades and all my numbers match except the firmware revision number. Mine is 2175.2301.8779.12223. I guess I'll connect to Zune tonight and see if if anything happens. 02-04-2013 01:40 PM 9. rephaelhermon's Avatar I got the third update (1 update after 7.8 was installed) on my Lumia 900 and I notice nothing different other than maybe a quicker start screen. Nokia won't give me (or they don't have) any information on it at all. 02-19-2013 06:46 PM 10. the_fly68's Avatar I restored my AT&T Lumia 900 back to 7.5 and then forced the 7.8 update again. This time I did get three updates - the last one was a "Nokia Update for Windows Phone". I only got two updates a few weeks ago. All the firmware and hardware numbers are the same though. 02-24-2013 06:59 PM 11. sadikkhatri's Avatar how to lumia 900 at&t 7.8 update 04-21-2013 03:40 AM 12. sadikkhatri's Avatar halp me 04-21-2013 03:41 AM 13. roaspiras's Avatar This is what I have. I have gotten at lease 3 or 4 updates. OS version: 7.10.8662.144 Firmware: 2175.2905.8853.12440 HW Revision: 112.1914.2.0 Radio Software: Radio HW: 8055 Bootloader Ver: CHIP SOC Ver: WP 7.8 is smooth! 04-29-2013 12:45 AM 14. akar33's Avatar Do you have an ATT Lumia 900? I didn't get any official update after 8858. How did you get 8862? 04-29-2013 06:55 AM Similar Threads 1. Lumia 820 OS version after Portico Update By heredot90 in forum Nokia Lumia 820 Replies: 21 Last Post: 02-15-2013, 06:08 PM 2. AT&T Nokia Lumia 900 Unlocking By L3PT in forum Nokia Lumia 900 Replies: 25 Last Post: 10-16-2012, 12:03 AM 3. Jailbreak Required for nokia lumia 610 firmware version 7.10 By miss dragon in forum Windows Phone 7 Replies: 0 Last Post: 08-29-2012, 09:40 PM 4. White Lumia 900 Plastic discoloring after 2 days By jefbeard911 in forum Nokia Lumia 900 Replies: 32 Last Post: 07-03-2012, 04:56 PM 5. Horrible experience with AT&T and Lumia 900 By Oldmajor in forum Nokia Lumia 900 Replies: 14 Last Post: 04-10-2012, 04:35 PM
global_01_local_1_shard_00001926_processed.jsonl/55350
1. WindowsCentral.com's Avatar It's been an exciting weekend in these parts, mostly down to finally having the first Windows 10 preview for phones downloaded to play around with. Of course, not everyone has been fortunate enough to be on the list of supported devices, but there was always going to be some disappointed Windows Phone fans. It is, after all, just a preview. But on the flip side there's a whole bunch of people who can, and probably did, install the preview. We've been looking forward to it for some time now, and despite the potential issues, it's sometimes hard to resist. So, that's what we're asking for today's weekly poll, did you install the Windows 10 preview on your phone? Full story from the WindowsCentral blog... 02-16-2015 05:11 PM Similar Threads 1. I went ahead and installed Windows 10 on my HTC One M8 - Any questions? By Idiosyncrasy in forum HTC One (M8) for Windows Replies: 248 Last Post: 08-23-2018, 10:34 AM 2. Replies: 10 Last Post: 02-18-2015, 11:08 AM 3. Someone tried to install windows ten on the icon lumia By juliosa2 in forum Nokia Lumia Icon Replies: 8 Last Post: 02-17-2015, 02:14 PM 4. For all Lumia onwers who did the ''W10 hack''? By arjan wolthuis in forum Windows 10 Mobile Insider Preview Replies: 5 Last Post: 02-16-2015, 06:20 PM 5. Camera roll crashing the phone By feeked in forum Nokia Lumia Icon Replies: 1 Last Post: 02-16-2015, 05:37 PM
global_01_local_1_shard_00001926_processed.jsonl/55359
Why are there no Jews, Christians or Muslims in Star Trek? Why no Jews, Christians and Muslims in Star Trek?Why are there no Jews, Christians and Muslims in “Star Trek?” They are hidden! Star Trek’s ethnicities: Jews = Ferengi and Vulcans Christians = United Federation of Planets Muslims = Klingons Chinese Communists = Romulans Revealing the Christian angle of the Federation, “Kirk” means “church” in Scottish: The Kirk is an informal name for the Church of Scotland, the country’s national church. It is claimed that the ex-policeman Gene Roddenberry was a 33rd-degree Scottish Rite Freemason. I’m told by an insider that he was not fond of Hollywood’s Jewish elite. Nevertheless, both Shatner and Nimoy are Jewish, and Nimoy’s split-fingered Vulcan salute – as he himself stated in his biography – represents the “Priestly Blessing performed by Jewish Kohanim with both hands…” Klingon and Saddam Hussein (Landover Baptist SPOOF site)In addition to the above comparisons have been those made between the Chinese and the BORG, not only in forum rants but also in thoughtful articles. While the Muslim-Klingon connection cannot be substantiated easily as emanating directly from Roddenberry, the impression of it as a “stereotype” has been addressed in the book Shattering the Stereotypes: Muslim Women Speak Out by Fawzia Afzal-Khan (182): Klingon Muslim woman 1. Chinese are a cross between Borg & Klingons/Romulans. Muslims are the Borg or just zombies, with rabies and on meth with Parkinson’s. The Ferengi are liberals who post on MSN and Yahoo and, yeah, Vulcans make decent Jews. Just my take. Hopefully, I’ve offended everyone. 1. Oh, yeah, add Asperger’s Syndrome and Tourette’s to Muslims. 2. I always took the Klingons to be the Soviet Union/Nazis. 1. That’s what I thought too. 2. Wrong Klingons, the appearance in the original series looked Like Arabs or Muslims, savage and murderous Who want to rule at all costs. 3. Considering the fact that Gene Roddenberry was an outspoken atheist and openly critical of religion, one can probably safely dismiss any ideas of the Federation being based on Christianity. 1. Considering that I already provided the evidence for this contention as concerns the name “Kirk,” one can probably NOT safely dismiss any ideas that the Federation is intended to be Christian to some extent. Many atheists and critics of religion have created parodies and/or representations of religious groups. It’s part of the world we live in, regardless of our approval. Have we forgotten the interesting “Star Trek” episode of “Bread and Circuses?” Rather pro-Christian for such a supposedly rabid atheist and critic of religion. Unfortunately, the claim in that episode that the Romans were not sun worshippers is false, but it serves the plot to emphasize that these “aliens” were “son worshippers.” In this episode, McCoy claims that Christianity is “a philosophy of total love and total brotherhood.” Regardless of his personal beliefs, Roddenberry was not ignorant and oblivious to Christianity. 1. It surely is true of “Bread and Circuses”, but Star Trek in general is devoid of direct depictions from earth religious groups. And though the initial intention was to create the Vulcans and the Ferengi out of Judaism, the Vulcans are quite different from Jewish people as they suppress all emotions and embrace logic, and I would say that the Ferengi represent American patriarchal capitalism much more so than they do the Jewish religion. Let’s not forget that the Ferengi afterlife has the divine treasury as its perpetual reward, and the Vault of Eternal Destitution as a destination for the ones that were financially unsuccessful in life. In fact, the show makes fun of this alien society, which, as I said, mirrors so much the American patriarchal economical/religious system, and this TV series invites us to ponder and question our own entrenched values. 1. Yes, I am quite aware that Star Trek avoids “direct depictions from earth religious groups,” which is why I said as much at the beginning and created this very post. As concerns the various groups, please read the attached citations. The Vulcans are assuredly the logical and scientific “Jews” of Star Trek, as is evidenced by the Vulcan sign – specifically taken from Jewish ritual – as well as other aspects. In the first place, Jews can be highly scientific, comprising scientists, doctors, mathematicians and so on. There have also been very logical Jewish philosophers since antiquity, and some studies have suggested that Ashkenazi Jews in specific have higher IQs than average. Secondly, the Vulcans have a very mystical side to them, which is the same as with Jews who practice Judaism. As this Uncyclopedia page for “Vulcan” says: “Vulcans are sort of the Jews of Starfleet.” The Ferengi might represent “American capitalism” but they are also noted to be caricatures of Jews. To reiterate, I’m told by someone who claims to have worked on the show that Roddenberry used to rant about Jewish greed in Hollywood. It would be rather naive to insist that no one else has noticed the comparison between “greedy Jews” and Ferengi. Again, please read the attached links. I’m doubting that Gene Roddenberry was against making money as a rule and therefore anti-capitalism. If you are truly interested in the Jewish themes in Star Trek, perhaps you will take a look at this book by a rabbi: Jewish themes in Star Trek There’s a discussion by the good rabbi concerning both the Vulcans and Ferengi (42): Some Star Trek fans even see the Ferengi as “typical Jews,” because they love money and have big noses… 1. Acharya, I wasn’t saying nor implying that you were not “aware that Star Trek avoids “direct depictions from earth religious groups”” But the title of your post is a bit confusing since as you said it, the episode “Bread and Circuses” does mention Christianity. Furthermore, I’ll add that in that episode, Kirk responds with “Caesar…and Christ, they had them both. And the word is spreading only now.” This is why I felt it was necessary to emphasize the fact that aside from the above episode, Star Trek in general is devoid of direct depictions from earth religious groups. I checked your links and you’re right about Jews being great scientists and thinkers, though Vulcans still suppress their emotions, something that Jewish people do not practice. I’m also concerned with the Uncyclopedia page as it is devoid of valid citations for the Vulcans being the Jews of Starfleet. Furthermore, I don’t like their usage of the word “negro”, which has some racist connotations when describing the Vulcan Tuvok. Just a reminder, our ancient ancestors are originally from Africa and had a dark skin. 2. I never said he was “ignorant and oblivious to Christianity”, and certainly never said he was in any way “rabid”. But anyway, that the name Kirk means “church” doesn’t really sound like particularly good evidence for any Christian connection. Lots of names have Christian meanings, but that doesn’t mean that the appearance of a character with such a name in a fictional setting is evidence for a “Christian angle” or anything like that. On “Bread and Circuses”, I must admit, I’ve not actually seen the episodes of the Star Trek TV series, though I have heard a lot about the setting from stuff I’ve read and from stuff I’ve been told by people who are fans. Reading the wikipedia article on the “Bread and Circuses” episode, the premise does sound a bit silly (a culture on another world that just happens to be that similar to Earth’s Roman Empire?). But anyway, the fact that McCoy seems to refer to Christianity as a peaceful and loving religion doesn’t prove that Federation is based on Christianity. It just shows that a character who happens to be part of the Federation happens to be sympathetic to Christianity (though this doesn’t necessarily mean McCoy was Christian himself, just that he felt that this religion spread some good messages in its days). And while its true that atheistic writers can and do create things based on certain religions in their fiction, the thing about Roddenberry was that he actually did say at least a few times that his fictional Federation was supposed to be a society that had outgrown religion. Based on a number of his comments, he seems to have had viewed religion as quite a negative influence on the world. The Federation was supposed to be a future society that had risen above the narrow-mindedness and intolerance and pettiness of religion and such. It wouldn’t really have made sense for it to be based on Christianity- an ideology Roddenberry neither agreed with nor approved of. As for the religious references and symbolism that sometimes did show up in the series (e.g. the “Bread and Circuses” episode), keep in mind that while Roddenberry was the setting creator, other people who worked on and contributed to the setting could still wield some influence on what got in. And also that the network airing the series would likely have tried to make it not seem too unsympathetic to Christianity and other religions, so as not to alienate viewers who held such religious beliefs. 1. I never said you said Roddenberry was ignorant and oblivious to Christianity. Yes, we know that Star Trek’s “utopian” vision was essentially secular in nature, as is the United States. However, the evidence indicates Kirk and Spock represent to the two “pillars” of American Judeo-Christian culture, a Christian and a Jew. Like it or not, these are the major aspects of the country in which Roddenberry lived and thrived – he was born into a church-going Christian family, as was I – regardless of the secular nature of the government and Constitution. Moreover, if Roddenberry was part of Freemasonry, these two ideologies would certainly be included in such a predominant manner as well, as they are within Freemasonry. As concerns the future, you are projecting your own vision of how it should be and what Christianity means to you, not what it may have meant to Roddenberry or his writers, who demonstrate a favorable view of Christianity, in fact: The rebels on Magna Roma, a nearly perfect “Parallel Earth”, seem to worship the “sun”, which is actually (God’s) “Son”. More precisely, Spock rules that “Sun worship is usually a primitive superstition religion”, whereupon Uhura corrects him: “Don’t you understand? It’s not the sun up in the sky. It’s the Son of God.” So the episode is remarkably supportive of Christianity (TOS: “Bread and Circuses”). Another astonishing reference from TOS is a dialogue between two researchers, of whom at least one is clearly religious, when there is a quake on Minara II. Dr. Ozaba: “In His hands are the deep places of the Earth. Psalm 95, verse 4.” Dr. Linke: “Looks like He was listening” (TOS: “The Empath”). Kirk says: “Scotty doesn’t believe in gods” and also “Man has no need for gods. We find the one quite sufficient”. This almost sounds like Kirk is supposed to be Christian, Jewish or Muslim (TOS: “Who Mourns for Adonais”). And, by the way, I have seen ALL of the original series, many times in fact, including when they first were run on network TV in the 1960s. I also didn’t say that the Federation was based on Christianity, which thus would be the religion of the future. It represents Christianity, apparent from the fact that Kirk means “Church.” The writers may have had something else in mind such as “Captain Cook,” but it is unlikely they were ignorant of the word’s significance, which is reflective of the Scottish Church in particular, while Roddenberry is claimed to be a member of the Scottish Rite Freemasonry. Bones’s endorsement of Christianity certainly is significant. Nowhere in that episode or elsewhere do the characters go off on an anti-Christian bent, a fact that indicates the writers were not anti-Christian. In reality, they seem to be promoting the supposedly “good” values some 80% of Americans perceive in Christianity. One would not try to sell a show to such a large majority that overtly attacks their beliefs, as you also recognize. I really don’t have time to argue over such things, which seem obvious enough to me, as, again, Roddenberry and his writers were not operating in a vacuum. They could not avoid incorporating the largely Judeo-Christian culture in which they were operating in their production. There are elements of Christianity in the show, but that fact does not mean Roddenberry was endorsing Christianity as the one, true religion any more than my being raised a Protestant and becoming born-again decades ago makes me a Christian apologist. The fact that Roddenberry does not make overt connections to religion speaks to the contrary, but it also does not mean that he omits it entirely, as he certainly could not and maintain any kind of realism. 1. As concerns the future, I am most certainly NOT projecting my “own vision of how it should be and what Christianity means”. When I said Gene Roddenberry seemed to have a negative view of religion and that his fictional Federation seemed to be a society that had outgrown religion, I was basing this solely on things Roddenberry himself had said. Indeed, at the start of the “Religion in Star Trek” article you linked there are some Roddenberry quotes that seem to show a rather negative view of religion. 2. I agree. My point has been that the concept of Christianity as a “brotherhood of man” is what is being portrayed here in the “Federation,” the typical notion that Christianity is the great civilizing force, as allegedly adhered to by the Founding Fathers and so on. That’s the mainstream, idealistic perspective, not what we freethinkers necessarily see or would like it to be – that’s what I meant. Again, if Roddenberry was a Freemason, that fact would explain what seems to be a dichotomy to us but which is really part of the American fabric. Freemasons in general eschew strict adherence to a single religion, often favor secular governance and do not focus on the bad aspects of the Abrahamic cultus that they base many of their rituals, doctrines and traditions on. They ALSO incorporate many other cultures, such as the ancient Egyptian and Greek. In that sense, their views are more secular and universal. This encompassing viewpoint is what is expressed in Star Trek, but it definitely does not exclude Christianity or Judaism. 4. Thanks for the info with its links, I do appreciate it. Although even if Star Trek has these religious touches with its characters, it clearly generally promotes a secular world and the advancement of science over religion. I can name episodes like “In The Hands of The Prophets” from Deep Space Nine where a classroom educator, Mrs. O’Brien is fighting for the right to teach science in the classroom over a cleric’s, Vedek Winn, demands to teach religious values as facts. After admitting that indeed there are a bit of religious under tones put into various alien races and such, under tones which understandably are part of our culture, can we conclude that Star Trek is, generally speaking, a negative influence over its viewers? Sorry in advance if you didn’t mean to put this show in a bad light, but I have to say it: Star Trek is overall very positive, generally teaching us ideals worthy to achieve. 1. Nothing I’ve said puts the show in a bad light. It’s one of my favorite shows of all time, which is why I know so much about it. I watched the original episodes when they first came out in the 1960s and have had alternating crushes on Spock and Kirk since then. Analyzing hidden meanings does not put the show in a bad light. It’s what I do with religion and mythology – it’s called “symbolism.” 5. Well, Captain James T(or Tiberius) Kirk, and Spock are played by Wiliam Shatner and Leonard Nimoy respectively – both are Jews. Also, there is a Star Trek episode about Romans and Barbarians converting to a friendlier religion, and they remark something about the sun and point to the sun! I don’t remember the episode title. 6. Considering the time that DS9 was broadcast, it’s more likely that the Ferengi were Japanese (who were known at the time as the ultimate business culture). Plus many of the physical attributes of the Ferengi are similar to the characteristics found in cartoons of the Japanese in WWII propaganda. 1. Thanks. Could be some relationship. The greed and facial features of the Ferengi follow the caricatures of Jews around the turn of the 20th century, however. See my other links here for commentary on the Ferengi as Jews, including by a rabbi. 7. Most science fiction is very lacking in imagination regarding social/political ideas. Writers are not able to get past our current social/political class system which tends to promote religion, imperialism and centralized authority. I really advanced society, like those which have probably already been visiting us for a long time (tens of thousands of confirmed observations), would not need any designations of ethnicity, would not have religions and would not need a centralized “home base” for a “federation” or any other political entity which science fiction writers are hung up on. 1. You sound like a retarded anarchist 8. Love the Star Trek reference in the photo. However, you really need to Photoshop a comma where it belongs. I mean, if accuracy or literacy matters to you. 1. Thank you. Anyone who actually knows my work also knows that I am very concerned with accuracy and literacy. I am not, however, in the business of correcting other people’s images, since I don’t have time. Here I am simply commenting on an image that already was being passed around. If you are so concerned, you could spend your time tracking down the original and having its creator correct it. 9. Regarding Earth religions in Star Trek, I’m also put in mind of “Far Beyond the Stars,” a ds9 episode no one seems to have brought up. I’m going to assume that someone here has seen it, so I won’t summarize it. 10. “For most people, religion is nothing more than a substitute for a malfunctioning brain. If people need religion, ignore them and maybe they will ignore you, and you can go on with your life. It wasn’t until I was beginning to do Star Trek that the subject of religion arose. What brought it up was that people were saying that I would have a chaplain on board the Enterprise. I replied, “No, we don’t.” 11. Where is most ancient and oldest civilization and religion of all (Hinduism) ? 1. Sunny, Hindu “most ancient and oldest civilization and religion of all”??? ONLY if you stop there and don’t research further back into history. While very old, Hinduism was NOT the first religion or civilization. 12. In right sense, Ferengis= Chinese (Traders ok silk etc) Vulcan= Hinduism (Ancient knowledge of science, mathematics and architecture) Romulan= Jews (Borrowed knowledge from Hindu vedas, upanishads and other ancient texts) Klingon+ Muslims (Intolerant religion) 13. Uhura is shown to be a Chhristian at the end of the “Bread and Circuses” episode. See the last paragraph about the plot of that episode at https://en.wikipedia.org/wiki/Bread_and_Circuses_(Star_Trek:_The_Original_Series)#Plot. Comments are closed. © 2015 Freethought Nation, Acharya S, D.M. Murdock & Stellar House Publishing ~
global_01_local_1_shard_00001926_processed.jsonl/55375
back to programme Gaudeamus Sessies #20 During its Sessions, which take place irregularly, Gaudeamus (the platform for young music pioneers’ development) presents previews, try-outs and work-in-progress sessions of its own productions, young ensembles and/or talented composers. The 20th edition focuses attention on the preview of Koerikoeloem, a musical theatre performance by Miranda Driessen based on the eponymous prose poem by Tjitske Jansen. A multidisciplinary work for 8 solo voices, sho (a Japanese wind instrument), recorder trio and a sound installation consisting of 8 wind harps. The programme also includes a first try-out of Disturbing Light, the sound installation by visual designer Marij Janssen and composer/pianist Rieteke Hölscher. Tjitske Jansen’s text consists of a succession of anecdotes drawn from extremely personal experience. In a time when everyone posts their cares and woes on Facebook and other social media on an almost daily basis, this may not seem so unusual, but here it’s a different matter: due to the sheer number of stories, an image is gradually created of an existence in which every attempt to get a grip on life seems an almost hopeless task. And yet there is no mention of any indictment, accusations or need for retribution. She pilots us through her verses in clear language, often with a particularly humorous touch, without ever becoming woolly or melodramatic, and with a compassionate detachment. Last December the first part of Koerikoeloem was presented in the Gaudeamus Sessions #17. Where in the first part of Koerikoeloem a gradual transition from spoken word to recitations, ‘Sprechgesang’ and eventually sung text, in the second part this development continues to an increasingly complex polyphony, which eventually dissolves completely in the thin, soft sounds of the wind harps. Disturbing Light consists of a swarm of little figures suspended in a compact ‘cloud’, bobbing in space. A refined use of lighting results in an exciting play of light and shadow on the wall, in which the figures all take on an identity of their own. To accompany these images of Marij Janssen’s, Rieteke Hölscher composed a new minimalistic piece for electronics, piano and violin, full of repetition and variations on the motifs. Images and sound coalesce seamlessly and give the audience a feeling of an infinite time loop.
global_01_local_1_shard_00001926_processed.jsonl/55381
Gender Bias Learning Project A zany brainy look at a serious subject Teaching and Training Gender Bias Are you having a women’s forum meeting or a new faculty orientation? Are you offering a relevant course or just sitting around with friends? These are perfect opportunities to jumpstart discussions about patterns of gender bias and the strategies to manage The Gender Bias Learning Project offers training ideas to teach about the patterns of gender bias that occur in professional settings. Please share your own experiences using the Gender Bias Learning website to teach about gender bias here. Web-Based Teaching and Training Ideas Find ways to use the Gender Bias Learning Project website for teaching and training. Click Here Printable Games and Activities Find fun and educational games and activities to print out from this website and use for training. Click Here
global_01_local_1_shard_00001926_processed.jsonl/55384
Step 1 of 2: Voice the Issue Clearly What happened (more detail is better)? For better results, write at least 100 characters How would Utah Division of Motor Vehicles (DMV/RMV) email you? This email address isn't valid
global_01_local_1_shard_00001926_processed.jsonl/55386
s2e3: Romancing the Mushroom We execute our plan to get—wait for it—out of the abyss.  “I’m his egg; he’s my chicken.” Jim: Dungeon Master Daniel: Gaul (human druid 1) For my free human feat at level 1, I chose sentinel, which makes me pretty tanky. My plan is to class up to druid 2 in order to get wild shape, and then hit up monk for some levels. This is to make a kung fu panda build, in which I turn into a panda (or whatever) and use kung fu. Tim: Igneum (human sorcerer 1) Tim was going for a full on fire fire fire all the time fire draconic sorcerer build. The action algorithm was something like this: if (fire) or not (fire) then fire. Apparently, this build gets a bonus to fire bolt. So, yeah. It’s a thing you can do if you like burninating the countryside and/or the peasants. Asa: Thub-nub (halfling bard 1) Asa was going for the standard (for our group) heal+debuff bard, I think. But, as you will find out in the next few episodes, this build took a turn for the weiiiiirrrrd.
global_01_local_1_shard_00001926_processed.jsonl/55387
Are we nearing the Dropbox moment for the internet of things? 1 Comment The internet of things doesn’t exist today. We’re conflating the ease and ubiquity of the internet and the web with things that range from thermostats to jet engines. There is no common language. There is no common hardware. There isn’t even a common sense of why we want to connect all these things. That’s the input from Peter Semmelhack, the CEO and co-founder of Bug Labs, a company that builds connected products. Semmelhack is on the show to discuss what’s missing from the internet of things and how he thinks “things” will migrate online. He’s also discussing his vision for a technology stack for the internet of things. We focus on a tool for getting devices online called and Freeboard, a dashboard that will launch later on Tuesday. You can get the scoop here first, while getting a somewhat contrarian viewpoint about the future of connected homes, businesses and cities. Listen up. Host: Stacey Higginbotham Guests: Peter Semmelhack, CEO and cofounder of Bug Labs. • What’s holding up the internet of things? • Is this the Dropbox moment for IoT when connecting devices becomes easy? • What does the IoT stack look like? • A bit about Dweet, Freeboard and connected whiskey distilleries. Internet of Things Show RSS Feed Subscribe to this show in iTunes Download This Episode Drones 101 and why your August smart lock hasn’t shipped just yet What would you do with $100M? We talk to Prodea about connecting the world Let’s get industrial data online, and moving the connected home Dude, where’s my car? Plus a tour through a Savant home Cooking with the internet of things and the coming wave of dumb “smart” devices Another take on wireless power and the cool IoT stuff at SXSW Will the smartphone eat the fitness tracker market? RunKeeper’s CEO says yes. Overclock your car and hack the Google Glass prescription limitations How do you bring the internet of things to the consumer? Two perspectives. The internet of things is a developer nightmare … and opportunity Supporting a connected home is about education, not troubleshooting Does your coffee machine need its own domain name? 1 Comment Nikohl Vandel mostly, i think its ok that the only thing that is common are the 1s and 0s, and then everyone can do what they want from there; and then there’s this layer of control people want to assert which is where the issues are found. but I’ll listen in and check out what he’s saying. Comments are closed.
global_01_local_1_shard_00001926_processed.jsonl/55388
Switch branches/tags Find file History Duktape 1.x compatible module loading framework The default built-in module loading framework was removed in Duktape 2.x because more flexibility was needed for module loading. This directory contains a Duktape 1.x compatible module loading framework which you can add to your build: • Add duk_module_duktape.c to list of C sources to compile. • Ensure duk_module_duktape.h is in the include path. • Include the extra header in calling code and initialize the bindings: #include "duktape.h" #include "duk_module_duktape.h" /* After initializing the Duktape heap or when creating a new * thread with a new global environment: Don't call duk_module_duktape_init() more than once for the same global environment. • As usual in Duktape 1.x, you should define Duktape.modSearch() to provide environment specific module lookups. • After these steps, require() will be registered to the global object and the module system is ready to use.
global_01_local_1_shard_00001926_processed.jsonl/55400
Accelerated Motion Kit • Sale • $ 156 The Acceleration Motion Kit is used to study motion on planes and slopes. The kit consists of a 1 meter long horizontal aluminum track with a graduated 0mm to 900mm scale, three adjustable supports for the track, two photogates, and a level adjuster knob that is used to increase the slope. • 1 Track • 1 Solenoid, 5V • 1 Solid steel physics balls, 19mm (#42036) • 2 Photogates This product may contain lead, which is poisonous if ingested. Use gloves and safety goggles for protection. Seek medical help if ingested, wash hands thoroughly if handled incorrectly, and flush eyes with cool running water if for at least 15 minutes if any lead comes in contact with them. This product also contains small parts, making it a choking hazard. Use only with adult supervision.
global_01_local_1_shard_00001926_processed.jsonl/55415
Installing Secure Browser for Windows This procedure installs Secure Browser on all supported versions of Windows. 1. If you installed a previous version of the secure browser by copying its directory from one computer to another, manually uninstall the secure browser by deleting the installation folder and the desktop shortcut. (If you installed the secure browser using the Windows installation program, the installation package automatically removes it.) 3. Do one of the following (this step may vary depending on the browser you are using): 4. Follow the instructions in the setup wizard. When prompted for setup type, click Install. 5. Click Finish to exit the setup wizard. The following items are installed: 7. Optional: Apply proxy settings by doing the following: 1. Right-click the shortcut FSASecureBrowser on the desktop, and select Properties. 2. Under the Shortcut tab, in the Target field, modify the command to specify the proxy. 3. Click OK to close the Properties dialog box. For more information about proxy settings, see the Secure Browser Installation Manual. 8. Run the browser by double-clicking the FSASecureBrowser shortcut on the desktop. The secure browser opens displaying the student login screen. The browser fills the entire screen and hides the task bar. 9. To exit the browser, click CLOSE SECURE BROWSER in the upper-right corner of the screen.
global_01_local_1_shard_00001926_processed.jsonl/55435
Heartland Nuts 'N More Pin Cushion Filler Heartland Nuts 'N More Used to fill pincushions, this naturally abrasive black walnut shell grit sharpens needles and pins as they're stored! One 8 oz bag will fill several small pincushions, or one large pincushion. Unique, hard-to-find item that makes a great gift. For an example of how easy it is to make a black walnut pincushion, check out this tuturial, one of many you can find if you search "walnut shell pincushion" on your favorite search engine.
global_01_local_1_shard_00001926_processed.jsonl/55449
Essay: Tough There are two types of toughness in people and I have encountered both types many times during my life. Most would describe these types of toughness as mental and physical, which I don’t necessarily disagree with, but what is interesting is the interplay between the two types. When thinking about this, I envisage it as a matrix with four boxes – mentally weak, mentally strong, physically weak, physically strong. This is an over simplification, of course, as many degrees of mental and physical rigidity exist, but this framing helps in illustrating some interesting points. If one continues with this matrix one sees that four different combinations exist – mentally weak and physically weak, mentally weak and physically strong, mentally strong and physically weak, mentally strong and physically strong. Again, this is an oversimplification of any persons ability to deal with adversity, as circumstance and situation plays into how a person copes with the particular type of struggle they are exposed to. For instance, if a person has to endure grueling physical hardship such as being lost in the mountains with a heavy backpack in cold and harsh conditions – physical toughness will act as a buffer and protect the mental state. I view this as two “health-bars” like the ones you have in video games. If your physical toughness bar reaches zero, you start to feed of you mental bar. In other words, your physical rigor and ability acts as a buffer and preserves your mental state. If your in shape, it takes longer before you have to rely on mental capacity and willpower to push yourself onward. Further, how quick your physical and mental bars are depleted depend on how you are situated in the matrix. If you are physically strong your bar depletes slower and if your weak it slides down faster. To my experience people that hold both weak and strong extremities in the matrix at the same time is uncommon. I know they exist, but seemingly the people I know have varying degrees of a weak and strong combination. Again, remember that this is an oversimplification of peoples character and ability. When I did my compulsory military service in the army, I encountered the physically strong and mentally weak type often – and it is not pretty when their physical meter gets depleted. Seemingly, these guys never had to work off of their mental capacity, as they are naturally so strong and have such great endurance, that they never needed to feed of anything other than physical ability. This seems like a cliche from a Hollywood movie, but its a cliche for a reason. However, what is much more interesting to observe is people who are the other way around – physically weak and mentally strong. One summer a friend of me and I was going for a four day hike in the mountains. The first day the weather was good and we made camp not about 10 kilometers from our initial point of departure. As spirits where high we drank all the booze and ate all the goodies the first night. This was not a problem as the plan was to stop by a tourist lodge to resupply the next day – we thought. When we woke up the next day the weather had turned sour and my friend, who was not really used to the mountains, did not have a rain coat, woolen socks or a beanie. Further, his sleeping bag was not insulated enough and he managed to come down with a pretty bad cold during the course of the day. I damned myself for not making sure he had what he need, but I did not want to act like a parent watching a kid. On our way to the lodge my buddy’s physical bar was severely drained and I could see that he was struggling. His physical bar was at rock bottom when we reached the lodge, only to find that it was closed and we basically had no food left. My friend did not loose his temper and stayed composed although his physical bar was obviously drained and he was fueling himself of willpower. During the next two days he did not act out in desperation, although he was sick and hungry, and that is because he is mentally strong. His mental meter does not leak like a river, but rather like a slowly dripping broken tap. I would much rather rely on a mentally strong person than a mentally weak one, no matter what their physical abilities might be. Seemingly, the mental has the ability to override the physical and therefore is more valuable in challenging situations. In my experience, when the going gets tough, the mentally strong gets going. Essay: Binary Existence As artificial intelligence is dawning upon the world and space as we know it, it is increasingly necessary to understand what makes human life worth living, as it may soon be challenged by the “next” form of life. In order for us to live with the machines, diving into why human life is worth living and what is needed to have a worthy existence as a human, has perhaps never been more important. There is a commonly accepted notion people have that opposites is what makes life worth living, in so far that we would not appreciate the good without having reference to the bad and terrifying. Furthermore if this line of thinking is extrapolated it seems apparent that nothing can exist without a counterpart. For nothing to exist, something has to observe the nothing and, thus, something have to exists. If nothing observed nothing, then there would be no proof that nothing exists. Based on this line of thinking, everything that exists, even existence, is based on binary relationships. Try imagining how you maneuver throughout a normal day in the life. You sleep, then you are awake. You are hungry and then you are full. You walk or stand still. You open and close the door. The glass is full or its empty. Our processing of the world is based upon assessments of binary inputs that our brains react upon as we maneuver. Further, computers, and therefore artificial intelligence and robots, are created out of the binary codes of 0’s and 1’s. To my understanding, this can be understood as sending “open” and “close” signals, and when put together in endless matrices you create patterns which computer programs and robots operate through. Also, every conceivable number or value that exists in our current scientific paradigm can be described by the numbers 0 and 1 when stringed together. Is this, then, a coincidence and the only way in which humans can develop intelligence as we ourselves operate in a binary way? Or is this a deeper truth which the entire universe is built upon, and therefore the only way in which something can be built and exist? If or when the singularity is reached and artificial intelligence is capable of constantly renewing and bettering itself, will perhaps a different paradigm than the one we currently live in be discovered by the robots? If so, there is no guarantee that we will understand or be of any use in the new paradigm and the human existence may therefore become forever obsolete. Furthermore, if binary relationships are deleted from the human existence, without us evolving into the new paradigm, our lives will not be worth living. Therefore, we should all hope that binary relationships is the building block of all that exists, even outside of what we can ever fathom. Essay: Advanced And Basic A few weeks back I met a girl at a bar through a friend of a friend. As we got into talking she explained to me that she was a model. After telling me this I immediately sensed that she was getting defensive and an explanatory onslaught regarding how hard the job was followed. In this barrage she told me that she viewed modeling as acting and that her job is to portray the massive array of human feelings that exists. She said this in a way which made it seem like she believes there is mystery and something unfathomable about it – portraying all the mysterious and hidden feelings of man. I could in no way disagree with the nature of her job, but I quickly questioned one thing. Is there really that many human emotions? Is it really that mysterious and isn’t this similarity in feelings between humans what makes us able to relate to each other? The girl agreed with me. That I was probably right, there are not that many emotions a human can experience – but that there are many levels and degrees of those limited emotions and expressing those is a great challenge. I agreed and the evening continued without any revisiting of the subject. This conversation kept me thinking. I have for some time been contemplating a notion I have that most peoples lives in our day and age is so advanced and still so basic. People engage in what is at least for our planet highly advanced work-activities, but still what we strive for is experiencing basic feel-good emotions produced by the human body. When the NASA-scientist or the tech-developer comes home from work and is finished with conquering the stars for the day, he/she engages in simple activities which man has always pursued for pleasure. Playing with the children, building something, going for a walk, working out – whatever. But in the end, all these simple leisure activities is done because they make you or others, and therefore you, feel good. And the feelings the NASA-scientist is seeking are likely to be the same ones that the garbage man pursues. This is, though, mere speculation based on a comparison of chemicals and physiology and impossible to truly know without having the recollection of having lived another life as another. But the pleasurable human emotions, however one might experience them, are what everyone seeks to be exposed to. Therefore, what is a intriguing to me is not the basic part of peoples life, but the advanced. On some level it can be argued that the advanced part of peoples lives, for most its their work-life, only serves as a vehicle for acquiring resources which creates freedom to experience good emotions through leisure. Some people, though, spend the advanced part of their life trying to further and better the experience for humans and other living and dying creatures. But even that mission boils down to enabling the experience of pleasurable emotions. If a person sacrifices or devotes him/herself to something, it is usually for the good of others and/or the personal satisfaction altruism brings about. In other words, so good emotions and wellbeing can be experienced in the future. It is arguable that life in itself has intrinsic value, but is it really worth anything if it is not possible to experience good things from it? Would life be inherently valuable if terror and pain was all that could be experienced? Perhaps the chemicals in our bodies which makes us feel good is why it is worth living. But naturally, if we felt good all the time the good would not be as sweet anymore – Yin and Yang and all that jazz. I wonder how the model girl I met at a bar through a friend of a friend would portray my feelings on this subject in a photo-shoot. I think getting the levels and subtleties right might be challenging. Though not impossible. She has probably also felt how I feel, but perhaps to a different degree and from another thought. Essay: An Expression Of The Devil I was sitting in the room, paying close attention both the quarterly presentation and the people around me. No one seemed alarmed or had any adverse reaction to the information this demonic representation showed us. This IT-consultancy CEO, which seemed like the nicest and most friendly guy you will ever meet, is a true expression of the devil. He tricks you into investing time and money into his machine learning business, which in time will shake and destroy the life mechanism we love and hate and rely on. He knows it himself, but does not care, partly because of how innately gratifying it is to build something successful. The most hilarious and devastatingly comical part of his presentation was when he told the audience that the company in the last quarter had been consulting the Swedish Employment Office on adapting machine learning and artificial intelligence. Throughout his presentation, the devil kept talking about his amazing employees, and showed pictures from workshop nights they had had with clients. The images showed people smiling and laughing and interacting and teaching one another. After the devil character had finished his presentation, boasting excellent financial results for the first quarter, I went up, shook his friendly claws and had a chat with him. As a good devil should, he was truly charming and friendly and a person I one hundred percent would enjoy spending time with. But that is the game of the devil, right? Offering a pleasant hand and then scratch you with the other. I then went on to ask him when he could see robots not only take over the jobs of people in the businesses his company consults, but when he sees them taking over his own company’s work. “They already do, in some way,” he replied. “So what is your strategy then?” I responded. “We have to focus on doing what people are really good at, business consulting for instance, which the robots can not yet do,” he replied with his cleaved tongue hissing through his teeth. I responded by nodding and looking him into the eyes. No emotional information could be extracted. Here this demon has for the last couple of hours been showing us pictures of happy people working together, and been telling us that the reason his firm is successful is because of the people in the company. Yet, he’s telling me that he is actively working to destroy, not only other peoples, but even his own employees’ livelihoods. His projects are not just anti-social, their even anti-tribal! Furthermore ironic is that the pleasure he experiences in this situation is due to him being able to build a successful business where people enjoy themselves, which he values because of innate and basic human reward systems. As if that was not enough, he gives this presentation to get you to invest your money into something which eventually will take away your livelihood. This charming and friendly demon is working towards financial success and monetary freedom for himself and his employees, by seeking to destroy the mechanisms which makes their own, and others, lives worth living. And he lusts us into investing in our own demise, by offering us higher returns on our resources. I know he is aware of this, but the rationale is probably that if he does not do it, somebody else will, so why not reap the benefits of “progress” while its still possible? Conscious willingness to harvest from destruction by creation is why this cannibal, truly, is an expression of the devil.
global_01_local_1_shard_00001926_processed.jsonl/55463
18thWall Productions is always open to novel submissions. Please send us your first 20,000 words, a full outline, and a cover letter (i.e. your email) where you tell us something about yourself (including previous credits) and what led you to write your novel. Don’t stress it. A mangled cover letter won’t kill your chances with us. Like with any first date, the best advice is this: just be yourself. We prefer that your novel submission follow the William Shun format outline, except that you use Times New Roman. It’s easier on our poor, editorial eyes. Your email header should be Novel Submission: Title, Author’s Name, Wordcount. Email your submission packet to [email protected]. Please do not submit a manuscript with hyperlinks. If a link is required, we will discuss that upon acceptance. We are not open to simultaneous submissions. Via: 18th Wall Productions. Become a Patron! About Stuart Conover Pin It on Pinterest Share This
global_01_local_1_shard_00001926_processed.jsonl/55473
ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel The Jewish Issue and How Events Shaped the Coming Holocaust Updated on April 15, 2009 Negative forces at work Before there was the Wansee Confernence of 1942, that decided the fate of over  five million lives, before any Jew had been forced to leave their work, their home, their life behind and live in the death camps of Treblinka or Auschwitz, oddly enough, the German Government and Hitler tried to rid their country of them in a more humane way. Beginning in the 30s, after Hitler came to power, and when the British controlled Palestine, the future home of Israel, Germany had many Jewish programs that provided them with skills or training in order for them to be able to emigrate to the Middle East. It was to the German benefit to provide the programs that promoted a new life in Palestine. However, because of Britain's strict guidelines for emigration to Palestine, even the skills provided by the German programs were not good enough. Only a small amount of Jews managed to relocate from Germany to Palestine from 1935-39. How ironic. Had the UK simply allowed an open door policy for new Jewish settlers, maybe millions would still be alive, maybe the Holocaust might not have occurred. The UK policy allowed only so many jews to relocate there and even those had to have certain skill sets to be considered "valuable". This was because of the "Arab" problem and their claims that continue to this day. Then, when the Fall of France in 1940 occurred, serious consideration was given to shipping all of the Jews in Germany to the French Colony of Madagascar using German, French and British naval ships. A plan was indeed devised as it was anticipated that Britain would either surrender or make peace with Germany. Thus, although France had collapsed, Britain, again, was the only thing in the way of a "peaceful" method for Hitler to remove the Jews from Germany. However, the air battle over Britain in 1940 failed. The Luftwaffe could not quite conquer the British although history is clear they came VERY close. Britain was nearly on its last leg with the severe loss of aircraft and pilots that had prevailed thus far. This was unknown to the Luftwaffe, which was also suffering heavily. It came down to who would blink first. The Germans did and the British luckily prevailed. Once again, the irony was, Hitler's Madagascar plan to relocate the Jews was also discarded because they needed the British ships also to move four million jews. Hitler now turned east and almost conquered Russia only halting in the vincinity of Moscow. Now, the Jewish population within the new area won came to five million. The Wannsee meeting took place soon after the defeat of Hitler’s army in the battle for Moscow. While the Madagascar deportation plan was conceived during expectation of Nazi victory on the western front, the plan for the “Final Solution” was conceived in the realization, that Nazi defeat was possible, and that with the defeat, millions of the feared “Ost Juden” or eastern Jews, could migrate into Germany. The possibility of this Jewish migration was what the Nazis wanted to preempt because of their racism, fear of communist victory, and fear of Jewish domination which Germans had already experienced during the Weimar Republic.   It was at the Wannsee Meeting in 1942 (that Hitler did not attend) where the decision to exterminate the Jewish people was agreed upon and the methods discussed. It soon began afterwards. 0 of 8192 characters used Post Comment No comments yet. This website uses cookies Show Details LoginThis is necessary to sign in to the HubPages Service. AkismetThis is used to detect comment spam. (Privacy Policy) Google AdSenseThis is an ad network. (Privacy Policy) Index ExchangeThis is an ad network. (Privacy Policy) SovrnThis is an ad network. (Privacy Policy) Facebook AdsThis is an ad network. (Privacy Policy) AppNexusThis is an ad network. (Privacy Policy) OpenxThis is an ad network. (Privacy Policy) Rubicon ProjectThis is an ad network. (Privacy Policy) TripleLiftThis is an ad network. (Privacy Policy)
global_01_local_1_shard_00001926_processed.jsonl/55474
ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel Bible: What Does Amos 1-3 Teach Us About God's Wrath? Updated on September 23, 2016 The Prophet Amos Tool of Divine Judgment view quiz statistics "For Three and for Four" Verse one establishes the author's identity, his occupation and hometown, and the time span during which he "saw" words concerning Israel (c. 760-753 B.C.). As verses two and following clearly demonstrate, God's wrath, manifested in His "voice" of judgment, is the theme of this prophecy. Yahweh systematically addresses the nations surrounding His land and pronounces their doom before He turns to His people to discuss their sins (cf. chap. 1-2). Amos writes/God delivers His message, employing a formulaic style: "For three transgressions of (the name of the nation), and for four, I will not turn away its punishment, because . . . ." Then He discloses their disparate offenses and reveals their punishment. For example, God says that Damascus "threshed Gilead with implements of iron" (v. 3). Because that city acted so harshly, it will lose its leadership and enter captivity (vv. 4-5). Gaza's transgression involves what appears to be selling captives into slavery (v. 6). As with Damascus, fire will destroy both (governmental) buildings and personnel in Gaza, and its city inhabitants will perish (vv. 7-8). Tyre committed the same offense as Gaza, except that Yahweh accuses it of not remembering "the covenant of brotherhood" as well (v. 9). Apparently, they mistreated "the whole captivity," despite their relationship to these prisoners. The same destruction awaits Tyre as that which will destroy Gaza (v. 10; cf. v. 7). Unquenchable, unmerciful rage against his brother is Edom's sin (v. 11); he, too, will see his cities burn (v. 12). Ammon's vicious brutality in pillaging Gilead for avaricious purposes (v. 13) will meet with fire, disarray, and captivity from the LORD (vv. 14-15). The Worship of Mammon Amos 2 Moab was guilty of burning "the bones of the King of Edom to lime" (v. 1). [This act certainly represents extraordinary cruelty—perhaps the desecration of a corpse]. Again, the fire of judgment rests upon the palaces of their main city, and their officials will perish (vv. 2-3). Finally, Yahweh addresses His own people, confronting Judah first. Disobedience to His law and following after lies into apostasy will bring fire upon Jerusalem to devour her (vv. 4-5). Israel's judgment appears somewhat more extensive, for God discloses much more regarding him than any other people (vv. 6-16). His sins include: (1) avarice, especially at the expense of the poor (vv. 6b-7a), (2) ritual prostitution (?) ["defile My holy name," v. 7b], (3) debauchery amid idolatry (v. 8b), and (4) lack of compassion toward the poor (v. 8; cf. Ex. 22:26, 27). Despite Yahweh's wonderful works for His people—including the total defeat of the Amorite (v. 9), His deliverance out of Egypt and through the wilderness to possess the land of the Amorite (v. 10), and His raising up of spiritual leaders (v. 11)—, the nation turns its back on the LORD by spoiling or rejecting their ministries (v. 12). God declares that He is "fed up" with them (v. 13). None, no matter how swift, strong, or skilled, will escape judgment (vv. 14-16). God's Word The Lion Near Eastern Trumpet God's First Action view quiz statistics Amos 3 Amos directs all Israel to heed Yahweh's word to him (v. 1). He says, in effect, "With great privilege (being "known" intimately by the LORD) comes solemn responsibility. If you abuse your privilege by failing in your responsibilities, you will suffer the consequences" (v. 2). The prophet then engages Israel in a "game" of rhetorical queries (vv. 3-8). First, in question form Amos presents negative circumstances that prevent certain people or objects from causing something else to happen (vv. 3-5). For example, no agreement exists between two individuals; therefore, they separate (do not walk together) from one another (v. 3). Second, the lion has no reason to roar, nor the young lion cause to cry out, because they have not been victorious in the hunt (v. 4). Third, there is no trap to catch a bird, so how will the creature fall into it (v. 5a)? Fourth, there is no reason for a snare to spring up if nothing has fallen into it (v. 5b). Verse 6, however, indicates actions which both take place (causes) and which evoke responses (effects): (1) the trumpet sounds, and the people fear; (2) a calamity comes upon them, and they know Who caused it. Amos asserts that Yahweh, like a lion, has reason to act (v. 8), and the prophet has no choice but to announce "His secret" (vv. 7, 8b). Verses 7-8 provide keys to interpreting the passage, for they relate that God will not act (in judgment) unless He first communicates that determination to the people through the prophets. Yahweh vindicates the latter’s message when disaster strikes. God then commands Amos to proclaim to the royal families of Ashdod and Egypt that they should "assemble on the mountains of Samaria" to see Israel's punishment for his unrighteousness (vv. 9-10). These peoples will surround, attack, and plunder the land and palaces of Israel (v. 11); little remains of Israel afterwards (v. 12). According to the word of the LORD, Bethel (as well as Israel) will suffer destruction, especially its altars and great houses (vv. 13-15). © 2014 glynch1 0 of 8192 characters used Post Comment No comments yet. This website uses cookies Show Details LoginThis is necessary to sign in to the HubPages Service. AkismetThis is used to detect comment spam. (Privacy Policy) Google AdSenseThis is an ad network. (Privacy Policy) Index ExchangeThis is an ad network. (Privacy Policy) SovrnThis is an ad network. (Privacy Policy) Facebook AdsThis is an ad network. (Privacy Policy) AppNexusThis is an ad network. (Privacy Policy) OpenxThis is an ad network. (Privacy Policy) Rubicon ProjectThis is an ad network. (Privacy Policy) TripleLiftThis is an ad network. (Privacy Policy)
global_01_local_1_shard_00001926_processed.jsonl/55499
Top 5 search engines you need to know about202 Top 5 search engines you need to know about - INFOBEEP Author: InfoBeep - September 16, 2018 | subject to copyright Not everyone likes to have hundreds of search engines, especially those peoples who are not the trained internet users. Most of the people want to have a single search engine that contains the main three features: • Relevant and accurate results • Uncluttered and easy to read interface • Helpful options for broadening or tightening the search Well, there are many search engines that contain all these main features. You just need to choose the perfect one. So, here, we have made a list of top five lists of search engines which can meet 99% of the searching needs of the regular users. Top five search engines: Many years ago, Google was ranked as the fastest and the efficient choice for the web searching. But since the late 1990’s things have been changed. Dogpile came into existence and it took a good place in web searching. It comes with a growing index and a quick and clean presentation which is the testimony to its halcyon days. If you wanna try the search tools with the pleasant and good presentation, you should definitely give out a try to Dogpile. Yippy is a Deep Web engine that helps you in searching other search engines for you. It is a little different from other search engines. It is indexed by the robot spider programs. The Deep Web pages are mainly difficult for being located by the conventional search. Yippy will be best to use if you want a clear and fastest result of your keywords. Duck Duck Go First of all, DuckDuck looks exactly like the Google. But there are several subtitles that make it different from others. There are some main functions of the DuckDuck like ‘Zero-click’. It also offers the disambiguation prompts. And the ad spam is also less than the Google. You should absolutely give a try to Duck Duck if you want a clean and simple search engine. search engine has a good fame in the World Wide Web. The clean interface of the is super-clean and the search options of are much better than that of the Google and other search engines. The results groupings are the main feature of the The presentation given by it is very clear as well as easier for reading than that of the Google, Yahoo or Bing. Webopedia is considered as one of the most useful websites on the World Wide Web. It is an encyclopedic resource that is decided to the searching techno terminology and the computer definitions. You can teach yourself what the domain name system is or also what are the searching techno terminology and the computer definitions. Webopedia will be the perfect search engine to choose for the non-technical people. It will help to make a sense of the computer around them.
global_01_local_1_shard_00001926_processed.jsonl/55525
Indie game storeFree gamesFun gamesHorror games Game developmentAssetsComics HTML5 Canvas won't fullscreen properly A topic by Oliver Bentzen created Jan 01, 2018 Views: 232 Replies: 4 Viewing posts 1 to 3 No matter what i do, pressing the fullscreen button always results in a black screen. It does say it useful for twine game, but it doesn't say it only works for twine games, and i have seen a game here that uses it which most certainly isn't a twine game so i think this is supposed to work. Please do tell me if i am wrong though. It would be helpful to know which game is having problems. Do you get an error message in the browser console? Speaking of which, what browsers have you tried in? My game (actually just a test page). It's not public right now No error messages, i only tried firefox. The fullscreen button just makes the iframe take up the entire screen, we don't do anything to your game's code. You might want to check if your game supports resizing like that. If you are having trouble debugging it tell us what game page is having the issue. my game uses i think window.onresize to handle resizing (i set my canvas.width and height to the window.innerWidth and height), is there something else i should be using? (it works fine when resizing the browser) The game page is currently not public, is it necessary to make it public?
global_01_local_1_shard_00001926_processed.jsonl/55528
As Military Robots are Promoted, Humans Lose All but “Veto Power” Robotic systems allow militaries around the world to operate faster and more efficiently than human soldiers possibly can. The result is that humans are losing their place in the “kill chain” — the sequence of decisions that leads to pulling a trigger. Now Human Rights Watch and other advocacy groups are trying to establish a Geneva Convention for robotic weaponry.
global_01_local_1_shard_00001926_processed.jsonl/55536
Cisco Spark SSO with Azure Active Directory Integrating Cisco Spark with your Microsoft Azure Active Directory for Single Sign-On (SSO) enables users to enjoy the benefit of authenticating with Spark using their Active Directory credentials, and bypassing the password login altogether if they are already authenticated in the browser to the Office 365 cloud. In this article, I describe the process of configuring Cisco Spark with the Microsoft Azure AD for SSO with screenshots for context throughout. I've assumed you have an existing Cisco Spark and Microsoft Azure AD available and the required permissions to follow the steps that follow. References documentation used: Configuration Process Log into the Cisco Spark Control Hub Click Settings, locate the Authentication section. Click Modify Select Integrate a 3rd-party identity provider. (Advanced) Click Download Metadata File. Save the file to disk. Log into Microsoft Azure Click Azure Active Directory from the navigation menu. Click Enterprise Applications Click All applications Search for Cisco Spark. Click the returned Cisco Spark search result. Click Add Click Users and groups. Click Add user Click None Selected Search for and select the user to enable Cisco Spark SSO for. Click Assign Confirm the user is shown in the Users and groups screen Navigate back to Cisco Spark - Quick start and select Configure single sign-on (required) Open the Metadata file saved earlier from Cisco Spark. • Copy the Location URL from the AssertionConsumerService tag into the Sign-on URL field and the Reply-URL field • Copy the entityID URL from the EntityDescriptor tag into the Identifier field Check View and edit all other user attributes. Click Add attribute • Name - uid • Value - user.mail Note, it is perfectly valid to use an alternative to user.mail such as user.userprinciplename, such that users log in with the user name instead of email address, for example In doing so you must add the user to Cisco Spark via the Cisco Spark Control Panel, before they sign in for the first time. Click Ok Delete all attributes except name and uid. Click Metadata XML and save the file to disk. Click Save Return to the Spark SSO configuration process. Check Require certificate signed by a certificate authority in Metadata (more secure). Upload the Metadata XML file downloaded from Microsoft Azure Click Next Click Test SSO Connection If you were signed into Office 365 with the user assigned earlier, you will enter your username and be authenticated automatically. Return to the Cisco Spark SSO configuration process. Select The test was successful. Enable Single Sign On The Cisco Spark Control Hub will now show Single Sign-On as enabled. • Azure Active Directory Premium is required, and the user account must have the license assigned to them in Office 365. See the screenshots below • You must create the user in the Cisco Spark Control Hub before they attempt to sign on but after you have successfully configured SSO. If this was not the case you may need to: • Create an email alias for the user • Have the user navigate to and log in with their email address • Change their email address to the alias created earlier • Confirm the change in the Spark email confirmation to the email alias • At this point, add the user into Spark through the Cisco Spark Control Hub
global_01_local_1_shard_00001926_processed.jsonl/55537
Mixins with pure Java Implementation of mixins using AOP (AspectJ) or source-code modification (JaMoPP) In object-oriented programming languages, a mixin refers to a defined amount of functionality which can be added to a class. An important aspect of this is that it makes it possible to concentrate more on the properties of a particular behaviour than on the inheritance structures during development. In Scala for example, a variant of mixins can be found under the name of “traits”. Although Java does not provide direct support for mixins, these can easily be added on with a few annotations, interfaces and some tool support. Occasionally you read in a few online articles that mixins are incorporated into Java version 8. Unfortunately, this is not the case. A feature of the Lambda project (JSR-335) are the so-called “Virtual Extension Methods” (VEM). Whilst these are similar to mixins, they do have a different background and are significantly more limited in functionality. The motivation for the introduction of VEMs is the problem of backward compatibility in the introduction of new methods in interfaces. As “real” mixins are not expected in the Java language in the near future, this article intends to demonstrate how it is already possible to create mixin support in Java projects now, using simple methods. To do this, we will discuss two approaches: using AOP with AspectJ and using source-code modification with JaMoPP. Why not just inheritance? When asked at an event “What would you change about Java if you could reinvent it?James Gosling, the inventor of Java is said to have answered “I would get rid of the classes“. After the laughter had died down, he explained what he meant by that: inheritance in Java, which is expressed with the “extends” relationship, should – wherever possible – be replaced by interfaces [Why extends is evil]. Any experienced developer knows what he meant here: inheritance should be used sparingly. It is very easy to misuse it as a technical construct to reuse code, and not to model a technically motivated parent-child relationship with it. But even if one considers such a technically motivated code reuse as legitimate, one quickly reaches its limits, as Java does not allow multiple inheritance. Mixins are always useful if several classes have similar properties or define a similar behaviour, but these cannot be reasonably modelled simply via slim relationship hierarchies. In English, terms which end in “able” (e.g. “sortable”, “comparable” or “commentable”) are often an indicator for applications of mixins. Also, when starting to write “Utility” methods in order to avoid a code duplication in the implementation of interfaces, this can be an indication of a meaningful case of application. Mixins with AOP So-called Inter-type declarations are an extremely simple possibility for implementing mixins, offered by the AspectJ Eclipse project. With these, it is possible – among other things – to add new instance variables and methods to any target class. This will be shown in the following, based on a small example in Listing 1. For this, we will use the following terms: • Basis-Interface Describes the desired behaviour. Classes which the mixin should not use can use this interface. • Mixin-Interface Intermediate interface used in the aspect and implemented by classes which the mixin is to use. • Mixin-Provider Aspect which provides the implementation for the mixin. • Mixin-User Class which uses (implements) one or more mixin interfaces. // === Listing 1 === /** Base-Interface */ public interface Named { public String getName(); /** Mixin-Interface */ public interface NamedMixin extends Named { /** Mixin-Provider */ public aspect NamedAspect { private String NamedMixin.name; public final void NamedMixin.setName(String name) { this.name = name; public final String NamedMixin.getName() { return name; /** Mixin-User */ public class MyClass implements NamedMixin { // Could have more methods or use different mixins Listing 1 shows a complete AOP-based mixin example. If AspectJ is set up correctly, the following source text should compile and run without errors: MyClass myObj = new MyClass(); It is possible to work quite comfortably with AOP variants, but there are also a few disadvantages which will be explored here. First of all, inter-type declarations cannot deal with generic types in the target class. This is not absolutely necessary in many cases, but can be very practical. For example, it is possible to define the “Named” interface just as well with a generic type instead of “String”. It would then define the behaviour for any name types. The class used could then determine how the type of name should look. A further disadvantage is that the methods generated by AspectJ follow their own naming conventions. This makes it difficult to search the classes using reflection, as you would have to reckon with method names such as “ajc$interMethodDispatch …” Last but not least, without the support of the development environment, you cannot see the source code in the target class and are dependent on the interface declaration alone. This could, however, be seen as an advantage, since the using classes contain less code. Appearance: Java Model Parser and Printer (JaMoPP) An alternative to the implementation of mixins with AspektJ is offered by Java Model Parser and Printer (JaMoPP). Simply put, JaMoPP can read Java source code, present it as an object graph in the memory and transform (i.e. write) it back into text. With JaMoPP, it is therefore possible to programmatically process Java code and thus automate refactoring or implement your own code analyses, for example. Technologically, JaMoPP is based on the Eclipse Modeling Framework (EMF) and EMFText. JaMoPP is jointly developed by the Technical University of Dresden and DevBoost GmbH and is freely available on GitHub as an open-source project. Mixins with JaMoPP In the following, we would like to take up the example from the AOP mixins and expand this slightly. For this, we will first define a few annotations: • @MixinIntf Indicates a mixin interface. • @MixinProvider Indicates a class which provides the implementation for a mixin. The implemented mixin interface is specified as the only parameter. • @MixinGenerated Marks methods and instance variables which have been generated by the mixin. The only parameter is the class of the mixin • provider. In the following, we will also be expanding the interfaces and classes from Listing 1 with a generic type for the name. Only the class using the mixin defines which concrete type the name should actually have. // === LISTING 2 === /** Base-Interface (Extended with generic parameter) */ public interface Named<T> { public T getName(); /** Mixin-Interface */ public interface NamedMixin<T> extends Named<T> { /** Mixin-Provider */ public final class NamedMixinProvider<T> implements Named<T> { private T name; public void setName(T name) { this.name = name; public T getName() { return name; /** Special name type (Alternative to String) */ public final class MyName { private final String name; public MyName(String name) { if (name == null) { throw new IllegalArgumentException("name == null"); if (name.trim().length() == 0) { throw new IllegalArgumentException("name is empty"); this.name = name; public String toString() { return name; In the class which the mixin is to use, the mixin interface is now implemented again as shown in Listing 3. In order to “blend” the fields and methods defined by the mixin provider into the MyClass class, a code generator is used. With the help of JaMoPP, this modifies the MyClass class and adds the instance variables and methods provided by the mixin provider. // === LISTING 3 === /** Mixin-User */ public class MyClass implements NamedMixin<MyName> { // Could have more methods or use different mixins In doing this, the code generator does the following. It reads the source code of every class, similarly to the normal Java compiler, and, in doing so, examines the amount of implemented interfaces. If a mixin interface is present, i.e. an interface with the annotation @MixinIntf, the corresponding provider is found and the instance variables and methods are copied into the class which is implementing the mixin. In order to initiate the generation of mixin codes, there are currently two options: using an Eclipse plug-in directly when saving or as a Maven plug-in as part of the build. Installation instructions and the source code of both plug-ins can be found on GitHub in the small SrcMixins4J project. There is also an on-screen video available there, which demonstrates the use of the Eclipse plug-in. Listing 4 shows the how the modified target class then looks. // === LISTING 4 === /** Mixin-User */ public class MyClass implements NamedMixin<MyName> { private MyName name; public void setName(MyName name) { this.name = name; public MyName getName() { return name; If the mixin interface is removed from the “implements” section, all of the provider’s fields and methods annotated with “@MixinGenerated” will be deleted automatically. Generated code can be overridden at any time by removing the “@MixinGenerated” annotation. Click on the following image to open a Flash video that demonstrates the Eclipse plugin: Screenshot Eclipse As native support of mixins in the Java language standard is not expected in the foreseeable future, it is currently possible to make do with just some AOP or source-code generation. Which of the two options you choose depends essentially on whether you prefer to keep the mixin code separate from your own application code or whether you want them directly in the respective classes. In any case, the speed of development is significantly increased and you will concentrate less on inheritance hierarchies and more on the definition of functional behaviour. Neither approach is perfect. In particular, conflicts are not automatically resolved. Methods with the same signature from different interfaces which are provided by different mixin providers will, for example, lead to an error in a class which uses both mixins. Those seeking anything more would have to transfer to another language with native mixin support, such as Scala. 6 thoughts on “Mixins with pure Java 1. Hi, this looks very interesting! Do the SrcMixins4J Eclipse plug-ins also work with Eclipse Kepler (Version 4.3.0)? I’ve got the following error when i tried it out today: java.lang.IllegalStateException: Annotation is unresolved: org.emftext.language.java.classifiers.impl.ClassImpl@1ff3dbe (eProxyURI: platform:/resource/srcmixins4j-eclipse-example/src/org/fuin/srcmixins4j/test/PackageableMixinProvider.java#EMFTEXT_INTERNAL_URI_FRAGMENT_1_MixinProvider) at org.fuin.srcmixins4j.core.SrcMixins4JUtils.getAnnotationInstance(SrcMixins4JUtils.java:143) at org.fuin.srcmixins4j.core.SrcMixins4JAnalyzer.analyze(SrcMixins4JAnalyzer.java:93) at org.fuin.srcmixins4j.core.SrcMixins4JAnalyzer.analyze(SrcMixins4JAnalyzer.java:59) at org.fuin.srcmixins4j.plugin.SrcMixins4JCompilationParticipant.buildStarting(SrcMixins4JCompilationParticipant.java:97) at org.eclipse.jdt.internal.core.builder.AbstractImageBuilder.notifyParticipants(AbstractImageBuilder.java:567) at org.eclipse.jdt.internal.core.builder.AbstractImageBuilder.compile(AbstractImageBuilder.java:289) at org.eclipse.jdt.internal.core.builder.BatchImageBuilder.build(BatchImageBuilder.java:60) at org.eclipse.jdt.internal.core.builder.JavaBuilder.buildAll(JavaBuilder.java:254) at org.eclipse.jdt.internal.core.builder.JavaBuilder.build(JavaBuilder.java:173) at org.eclipse.core.internal.events.BuildManager$2.run(BuildManager.java:726) at org.eclipse.core.runtime.SafeRunner.run(SafeRunner.java:42) at org.eclipse.core.internal.events.BuildManager.basicBuild(BuildManager.java:199) at org.eclipse.core.internal.events.BuildManager.basicBuild(BuildManager.java:239) at org.eclipse.core.internal.events.BuildManager$1.run(BuildManager.java:292) at org.eclipse.core.runtime.SafeRunner.run(SafeRunner.java:42) at org.eclipse.core.internal.events.BuildManager.basicBuild(BuildManager.java:295) at org.eclipse.core.internal.events.BuildManager.basicBuildLoop(BuildManager.java:351) at org.eclipse.core.internal.events.BuildManager.build(BuildManager.java:374) at org.eclipse.core.internal.events.AutoBuildJob.doBuild(AutoBuildJob.java:143) at org.eclipse.core.internal.events.AutoBuildJob.run(AutoBuildJob.java:241) at org.eclipse.core.internal.jobs.Worker.run(Worker.java:53) Any help would be greatly appreciated! Thanks and regards, 1. Hi Ronny, I must admit, that I haven’t tried it out yet with Eclipse Kepler, but I’m going to check it. Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/55545
Why Country should trade trade would promote one’s welfare..don’t believe so? allow me to use a simple story to explain this. Let’s assume one day Mr.A and Mr.B were travelling. Mr.A and Mr.B were on the same plane but the engine went wrong so the plane crushed on an unknown island. The island only has the resources of fishes and coconuts. A is good at climbing trees so he is more efficient at collecting coconuts B is a swimmer so he catches more fish than A.  Person / Goods Coconuts Fishs A 24 (productivity in a day) 12 (productivity in a day) B 12 (productivity in a day) 24 (productivity in a day) Suppose A and B doesn’t talk and interact with each other (autarky no trade) and A and B both need to consume 8 coconuts (water) and 8 fishes (meat) to survive so A would need to use 2/3 of his time on fishing to catch 8 fishes , and obtain 8 coconuts by using the remaining time for B, he uses 2/3 of its time on coconuts, he will also get 8 coconuts and 8 fishes. they both have (8,8) on fishes and coconuts as we can derive from this, the oppotunity cost of coconuts and fishes for both Mr.A and Mr.B is 1, which means it is equivelent to the price of 1. (1 coconut for 1 fish) in this light, the total GDP of the island is (16,16): A (8,8): A has 8 fishes and 8 coconuts B(8,8): B has 8 fishes and 8 coconuts. Now let assume A does talk with B, and they trade with each other. From the information, A now knows B is better at catching fishes, and B knows A is better at getting the coconuts. (so called the comparative advantage) In this light, they made a deal with each other: from now on, A and B is only going to produce what they are good at. A then devote all his time in a day at collecting coconuts and at the end of the day he got 24. B devote his time on catching fishes, and he got 24 too. Now they trade with each other. Because the oppo. cost is the same, so 1 fish is in exchange with 1 coconut. so A traded 12 coconuts for 12 fishes from B. now A has total 12 coconuts ans 12 fishes (12,12) and B has the total of 12 coconuts and 12 fishes (12,12) the total island GDP is (24, 24). after trade, the island total GDP rises from (16,16) to (24,24) Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/55557
I am Julien Diener, currently living in Paris. This is my personal website which acts as a CV. I have been coding since I am a kid. After a B.Sc. in Math at the Heriot-Watt University (Edinburgh), I got a Ph.D. in Computer Graphics at INPG (Grenoble). I then worked in several projects, with physicists, biologists, and now with quants (the math part of finance). I think I am a good coder, with strong math skill. But my best specialty is the design of complex numerical workflow in interdisciplinary projects. I consider my-self a Full-Stack Hacker
global_01_local_1_shard_00001926_processed.jsonl/55574
Cart is empty My Cart item(s) - $0.00 Shop By By Price • $10 $35 1. Babies to 18 Months 2. 2 Years+ 3. 18 Months to 3 Years 4. 3 Years to 5 Years 1. Boikido 2. Halilit 3. Hape 4. Kaper Kidz 5. Plan Toys 6. Sevi 7. Tiny Love 1. Red Best Sale There are no products matching the selection. Tambourines come in many different sizes, shapes and colours. Some have drum heads, some don't. They can be be both shaken and tapped with the hands. All our tambourines with drum heads are sturdy enough for some solid playing. Please remember that a tambourine is played with hands only and should not be tapped with a beater or drumstick.
global_01_local_1_shard_00001926_processed.jsonl/55587
There's a huge festival for indie games in New York City this weekend. It's called IndieCade East and it begins today, running through Sunday. If you're in the area and you want to play cool indie games, you should check it out! Three days of indie games and panels. Event details here. | Pricing.
global_01_local_1_shard_00001926_processed.jsonl/55634
Extra, Extra By M@ Last edited 134 months ago Extra, Extra • Hey, it's finally looking good for Crossrail. • Monorail! Monorail! Monorail! Do'h, it's just a bullet train. • Really old revellers celebrate VE day. Wasn't that in May? We're confused. • Fake doctor becomes non-fake prisoner. • Kid from Supernanny burns down family home. One hell of a stint on the naughty-step looms. • Image courtesy of etcher67 via the Londonist flickr group. Last Updated 03 October 2007
global_01_local_1_shard_00001926_processed.jsonl/55638
Neural Pathways: Neural tracts connecting one part of the nervous system with another.Trimecaine: Acetanilide derivative used as a local anesthetic.Allylglycine: An inhibitor of glutamate decarboxylase and an antagonist of GAMMA-AMINOBUTYRIC ACID. It is used to induce convulsions in experimental animals.Efferent Pathways: Nerve structures through which impulses are conducted from a nerve center toward a peripheral site. Such impulses are conducted via efferent neurons (NEURONS, EFFERENT), such as MOTOR NEURONS, autonomic neurons, and hypophyseal neurons.Neuronal Tract-Tracers: Substances used to identify the location and to characterize the types of NEURAL PATHWAYS.Vagus Nerve: The 10th cranial nerve. The vagus is a mixed nerve which contains somatic afferents (from skin in back of the ear and the external auditory meatus), visceral afferents (from the pharynx, larynx, thorax, and abdomen), parasympathetic efferents (to the thorax and abdomen), and efferents to striated muscle (of the larynx and pharynx).Vagotomy: The interruption or removal of any part of the vagus (10th cranial) nerve. Vagotomy may be performed for research or for therapeutic purposes.Sodium Lactate: The sodium salt of racemic or inactive lactic acid. It is a hygroscopic agent used intravenously as a systemic and urinary alkalizer.Nervous System Physiological Processes: Biological actions and events that constitute the functions of the NERVOUS SYSTEM.Hexamethonium: A nicotinic cholinergic antagonist often referred to as the prototypical ganglionic blocker. It is poorly absorbed from the gastrointestinal tract and does not cross the blood-brain barrier. It has been used for a variety of therapeutic purposes including hypertension but, like the other ganglionic blockers, it has been replaced by more specific drugs for most purposes, although it is widely used a research tool.Reflex: An involuntary movement or exercise of function in a part, excited in response to a stimulus applied to the periphery and transmitted to the brain or spinal cord.Afferent Pathways: Nerve structures through which impulses are conducted from a peripheral part toward a nerve center.Nervous System Physiological Phenomena: Characteristic properties and processes of the NERVOUS SYSTEM as a whole or with reference to the peripheral or the CENTRAL NERVOUS SYSTEM.Wheat Germ Agglutinins: Lectins purified from the germinating seeds of common wheat (Triticum vulgare); these bind to certain carbohydrate moieties on cell surface glycoproteins and are used to identify certain cell populations and inhibit or promote some immunological or physiological activities. There are at least two isoforms of this lectin.Neurons: The basic cellular units of nervous tissue. Each neuron consists of a body, an axon, and dendrites. Their purpose is to receive, conduct, and transmit impulses in the NERVOUS SYSTEM.Preoptic Area: Region of hypothalamus between the ANTERIOR COMMISSURE and OPTIC CHIASM.Septal Nuclei: Neural nuclei situated in the septal region. They have afferent and cholinergic efferent connections with a variety of FOREBRAIN and BRAIN STEM areas including the HIPPOCAMPAL FORMATION, the LATERAL HYPOTHALAMUS, the tegmentum, and the AMYGDALA. Included are the dorsal, lateral, medial, and triangular septal nuclei, septofimbrial nucleus, nucleus of diagonal band, nucleus of anterior commissure, and the nucleus of stria terminalis.Brain: The part of CENTRAL NERVOUS SYSTEM that is contained within the skull (CRANIUM). Arising from the NEURAL TUBE, the embryonic brain is comprised of three major parts including PROSENCEPHALON (the forebrain); MESENCEPHALON (the midbrain); and RHOMBENCEPHALON (the hindbrain). The developed brain consists of CEREBRUM; CEREBELLUM; and other structures in the BRAIN STEM.Visual Pathways: Set of cell bodies and nerve fibers conducting impulses from the eyes to the cerebral cortex. It includes the RETINA; OPTIC NERVE; optic tract; and geniculocalcarine tract.Brain Stem: The part of the brain that connects the CEREBRAL HEMISPHERES with the SPINAL CORD. It consists of the MESENCEPHALON; PONS; and MEDULLA OBLONGATA.Hypogastric Plexus: A complex network of nerve fibers in the pelvic region. The hypogastric plexus distributes sympathetic fibers from the lumbar paravertebral ganglia and the aortic plexus, parasympathetic fibers from the pelvic nerve, and visceral afferents. The bilateral pelvic plexus is in its lateral extent.Proto-Oncogene Proteins c-fos: Cellular DNA-binding proteins encoded by the c-fos genes (GENES, FOS). They are involved in growth-related transcriptional control. c-fos combines with c-jun (PROTO-ONCOGENE PROTEINS C-JUN) to form a c-fos/c-jun heterodimer (TRANSCRIPTION FACTOR AP-1) that binds to the TRE (TPA-responsive element) in promoters of certain genes.Neurons, Efferent: Neurons which send impulses peripherally to activate muscles or secretory cells.Hypothalamus: Ventral part of the DIENCEPHALON extending from the region of the OPTIC CHIASM to the caudal border of the MAMMILLARY BODIES and forming the inferior and lateral walls of the THIRD VENTRICLE.Escape Reaction: Innate response elicited by sensory stimuli associated with a threatening situation, or actual confrontation with an enemy.Spinal Cord: A cylindrical column of tissue that lies within the vertebral canal. It is composed of WHITE MATTER and GRAY MATTER.Olfactory Pathways: Set of nerve fibers conducting impulses from olfactory receptors to the cerebral cortex. It includes the OLFACTORY NERVE; OLFACTORY BULB; OLFACTORY TRACT; OLFACTORY TUBERCLE; ANTERIOR PERFORATED SUBSTANCE; and OLFACTORY CORTEX.Rats, Sprague-Dawley: A strain of albino rat used widely for experimental purposes because of its calmness and ease of handling. It was developed by the Sprague-Dawley Animal Company.Electric Stimulation: Use of electric potential or currents to elicit biological responses.Capsaicin: An alkylamide found in CAPSICUM that acts at TRPV CATION CHANNELS.Gastrointestinal Motility: The motor activity of the GASTROINTESTINAL TRACT.Amygdala: Almond-shaped group of basal nuclei anterior to the INFERIOR HORN OF THE LATERAL VENTRICLE of the TEMPORAL LOBE. The amygdala is part of the limbic system.Peristalsis: A movement, caused by sequential muscle contraction, that pushes the contents of the intestines or other tubular organs in one direction.Vocalization, Animal: Sounds used in animal communication.Anorexia: The lack or loss of APPETITE accompanied by an aversion to food and the inability to eat. It is the defining characteristic of the disorder ANOREXIA NERVOSA.Motor Neurons: Neurons which activate MUSCLE CELLS.Limbic System: A set of forebrain structures common to all mammals that is defined functionally and anatomically. It is implicated in the higher integration of visceral, olfactory, and somatic information as well as homeostatic responses including fundamental survival behaviors (feeding, mating, emotion). For most authors, it includes the AMYGDALA; EPITHALAMUS; GYRUS CINGULI; hippocampal formation (see HIPPOCAMPUS); HYPOTHALAMUS; PARAHIPPOCAMPAL GYRUS; SEPTAL NUCLEI; anterior nuclear group of thalamus, and portions of the basal ganglia. (Parent, Carpenter's Human Neuroanatomy, 9th ed, p744; NeuroNames, http://rprcsgi.rprc.washington.edu/neuronames/index.html (September 2, 1998)).Atropine: An alkaloid, originally from Atropa belladonna, but found in other plants, mainly SOLANACEAE. Hyoscyamine is the 3(S)-endo isomer of atropine.Duodenum: The shortest and widest portion of the SMALL INTESTINE adjacent to the PYLORUS of the STOMACH. It is named for having the length equal to about the width of 12 fingers.Habituation, Psychophysiologic: The disappearance of responsiveness to a repeated stimulation. It does not include drug habituation.Medulla Oblongata: The lower portion of the BRAIN STEM. It is inferior to the PONS and anterior to the CEREBELLUM. Medulla oblongata serves as a relay station between the brain and the spinal cord, and contains centers for regulating respiratory, vasomotor, cardiac, and reflex activities.Functional Laterality: Behavioral manifestations of cerebral dominance in which there is preferential use and superior functioning of either the left or the right side, as in the preferred use of the right hand or right foot.Brain Mapping: Imaging techniques used to colocalize sites of brain functions or physiological activity with brain structures.Body Temperature Regulation: The processes of heating and cooling that an organism uses to control its temperature.Sexual Behavior, Animal: Sexual activities of animals.Behavior, Animal: The observable response an animal makes to any situation.Sympathetic Nervous System: The thoracolumbar division of the autonomic nervous system. Sympathetic preganglionic fibers originate in neurons of the intermediolateral column of the spinal cord and project to the paravertebral and prevertebral ganglia, which in turn project to target organs. The sympathetic nervous system mediates the body's response to stressful situations, i.e., the fight or flight reactions. It often acts reciprocally to the parasympathetic system.Photic Stimulation: Investigative technique commonly used during ELECTROENCEPHALOGRAPHY in which a series of bright light flashes or visual patterns are used to elicit brain activity.Neurons, Afferent: Neurons which conduct NERVE IMPULSES to the CENTRAL NERVOUS SYSTEM.Myenteric Plexus: One of two ganglionated neural networks which together form the ENTERIC NERVOUS SYSTEM. The myenteric (Auerbach's) plexus is located between the longitudinal and circular muscle layers of the gut. Its neurons project to the circular muscle, to other myenteric ganglia, to submucosal ganglia, or directly to the epithelium, and play an important role in regulating and patterning gut motility. (From FASEB J 1989;3:127-38)Models, Neurological: Theoretical representations that simulate the behavior or activity of the neurological system, processes or phenomena; includes the use of mathematical equations, computers, and other electronic equipment.Chemoreceptor Cells: Cells specialized to detect chemical substances and relay that information centrally in the nervous system. Chemoreceptor cells may monitor external stimuli, as in TASTE and OLFACTION, or internal stimuli, such as the concentrations of OXYGEN and CARBON DIOXIDE in the blood.Reaction Time: The time from the onset of a stimulus until a response is observed.Thalamus: Paired bodies containing mostly GRAY MATTER and forming part of the lateral wall of the THIRD VENTRICLE of the brain.Spinal Cord Injuries: Penetrating and non-penetrating injuries to the spinal cord resulting from traumatic external forces (e.g., WOUNDS, GUNSHOT; WHIPLASH INJURIES; etc.).Autonomic Nervous System: The ENTERIC NERVOUS SYSTEM; PARASYMPATHETIC NERVOUS SYSTEM; and SYMPATHETIC NERVOUS SYSTEM taken together. Generally speaking, the autonomic nervous system regulates the internal environment during both peaceful activity and physical or emotional stress. Autonomic activity is controlled and integrated by the CENTRAL NERVOUS SYSTEM, especially the HYPOTHALAMUS and the SOLITARY NUCLEUS, which receive information relayed from VISCERAL AFFERENTS.Electromyography: Recording of the changes in electric potential of muscle by means of surface or needle electrodes.Conditioning (Psychology): A general term referring to the learning of some particular response.Serotonin: A biochemical messenger and regulator, synthesized from the essential amino acid L-TRYPTOPHAN. In humans it is found primarily in the central nervous system, gastrointestinal tract, and blood platelets. Serotonin mediates several important physiological functions including neurotransmission, gastrointestinal motility, hemostasis, and cardiovascular integrity. Multiple receptor families (RECEPTORS, SEROTONIN) explain the broad physiological actions and distribution of this biochemical mediator.Neuronal Plasticity: The capacity of the NERVOUS SYSTEM to change its reactivity as the result of successive activations.Parasympathetic Nervous System: The craniosacral division of the autonomic nervous system. The cell bodies of the parasympathetic preganglionic fibers are in brain stem nuclei and in the sacral spinal cord. They synapse in cranial autonomic ganglia or in terminal ganglia near target organs. The parasympathetic nervous system generally acts to conserve resources and restore homeostasis, often with effects reciprocal to the sympathetic nervous system.Rats, Long-Evans: An outbred strain of rats developed in 1915 by crossing several Wistar Institute white females with a wild gray male. Inbred strains have been derived from this original outbred strain, including Long-Evans cinnamon rats (RATS, INBRED LEC) and Otsuka-Long-Evans-Tokushima Fatty rats (RATS, INBRED OLETF), which are models for Wilson's disease and non-insulin dependent diabetes mellitus, respectively.Cats: The domestic cat, Felis catus, of the carnivore family FELIDAE, comprising over 30 different breeds. The domestic cat is descended primarily from the wild cat of Africa and extreme southwestern Asia. Though probably present in towns in Palestine as long ago as 7000 years, actual domestication occurred in Egypt about 4000 years ago. (From Walker's Mammals of the World, 6th ed, p801)Action Potentials: Abrupt changes in the membrane potential that sweep along the CELL MEMBRANE of excitable cells in response to excitation stimuli.Nerve Fibers: Slender processes of NEURONS, including the AXONS and their glial envelopes (MYELIN SHEATH). Nerve fibers conduct nerve impulses to and from the CENTRAL NERVOUS SYSTEM.Neuropeptides: Peptides released by NEURONS as intercellular messengers. Many neuropeptides are also hormones released by non-neuronal cells.Muscle, Smooth: Unstriated and unstriped muscle, one of the muscles of the internal organs, blood vessels, hair follicles, etc. Contractile elements are elongated, usually spindle-shaped cells with centrally located nuclei. Smooth muscle fibers are bound together into sheets or bundles by reticular fibers and frequently elastic nets are also abundant. (From Stedman, 25th ed)Analysis of Variance: A statistical technique that isolates and assesses the contributions of categorical independent variables to variation in the mean of a continuous dependent variable.Physical Stimulation: Act of eliciting a response from a person or organism through physical contact.Learning: Relatively permanent change in behavior that is the result of past experience or practice. The concept includes the acquisition of knowledge.Eating: The consumption of edible substances.Nerve Net: A meshlike structure composed of interconnecting nerve cells that are separated at the synaptic junction or joined to one another by cytoplasmic processes. In invertebrates, for example, the nerve net allows nerve impulses to spread over a wide area of the net because synapses can pass information in any direction.Feeding Behavior: Behavioral responses or sequences associated with eating including modes of feeding, rhythmic patterns of eating, and time intervals.Injections, Intraventricular: Injections into the cerebral ventricles.Neurotransmitter Agents: Substances used for their pharmacological actions on any aspect of neurotransmitter systems. Neurotransmitter agents include agonists, antagonists, degradation inhibitors, uptake inhibitors, depleters, precursors, and modulators of receptor function.Locomotion: Movement or the ability to move from one place or another. It can refer to humans, vertebrate or invertebrate animals, and microorganisms.Muscle Contraction: A process leading to shortening and/or development of tension in muscle tissue. Muscle contraction occurs by a sliding filament mechanism whereby actin filaments slide inward among the myosin filaments.Tetrodotoxin: An aminoperhydroquinazoline poison found mainly in the liver and ovaries of fishes in the order TETRAODONTIFORMES, which are eaten. The toxin causes paresthesia and paralysis through interference with neuromuscular conduction.Acoustic Stimulation: Use of sound to elicit a response in the nervous system.Time Factors: Elements of limited time intervals, contributing to particular results or situations.Movement: The act, process, or result of passing from one place or position to another. It differs from LOCOMOTION in that locomotion is restricted to the passing of the whole body from one place to another, while movement encompasses both locomotion but also a change of the position of the whole body or any of its parts. Movement may be used with reference to humans, vertebrate and invertebrate animals, and microorganisms. Differentiate also from MOTOR ACTIVITY, movement associated with behavior.Magnetic Resonance Imaging: Non-invasive method of demonstrating internal anatomy based on the principle that atomic nuclei in a strong magnetic field absorb pulses of radiofrequency energy and emit them as radiowaves which can be reconstructed into computerized images. The concept includes proton spin tomographic techniques.Trachea: The cartilaginous and membranous tube descending from the larynx and branching into the right and left main bronchi.Neural Inhibition: The function of opposing or restraining the excitation of neurons or their target excitable cells.Interneurons: Most generally any NEURONS which are not motor or sensory. Interneurons may also refer to neurons whose AXONS remain within a particular brain region in contrast to projection neurons, which have axons projecting to other brain regions.Ileum: The distal and narrowest portion of the SMALL INTESTINE, between the JEJUNUM and the ILEOCECAL VALVE of the LARGE INTESTINE.Dopamine: One of the catecholamine NEUROTRANSMITTERS in the brain. It is derived from TYROSINE and is the precursor to NOREPINEPHRINE and EPINEPHRINE. Dopamine is a major transmitter in the extrapyramidal system of the brain, and important in regulating movement. A family of receptors (RECEPTORS, DOPAMINE) mediate its action.Synaptic Transmission: The communication from a NEURON to a target (neuron, muscle, or secretory cell) across a SYNAPSE. In chemical synaptic transmission, the presynaptic neuron releases a NEUROTRANSMITTER that diffuses across the synaptic cleft and binds to specific synaptic receptors, activating them. The activated receptors modulate specific ion channels and/or second-messenger systems in the postsynaptic cell. In electrical synaptic transmission, electrical signals are communicated as an ionic current flow across ELECTRICAL SYNAPSES.Guinea Pigs: A common name used for the genus Cavia. The most common species is Cavia porcellus which is the domesticated guinea pig used for pets and biomedical research.Leptin: A 16-kDa peptide hormone secreted from WHITE ADIPOCYTES. Leptin serves as a feedback signal from fat cells to the CENTRAL NERVOUS SYSTEM in regulation of food intake, energy balance, and fat storage.Visual Perception: The selecting and organizing of visual stimuli based on the individual's past experience.Immunohistochemistry: Histochemical localization of immunoreactive substances using labeled antibodies as reagents.Rats, Wistar: A strain of albino rat developed at the Wistar Institute that has spread widely at other institutions. This has markedly diluted the original strain.Cerebral Cortex: The thin layer of GRAY MATTER on the surface of the CEREBRAL HEMISPHERES that develops from the TELENCEPHALON and folds into gyri and sulchi. It reaches its highest development in humans and is responsible for intellectual faculties and higher mental functions.Heart Rate: The number of times the HEART VENTRICLES contract per unit of time, usually per minute.Muscle, Skeletal: A subtype of striated muscle, attached by TENDONS to the SKELETON. Skeletal muscles are innervated and their movement can be consciously controlled. They are also called voluntary muscles.Electrophysiology: The study of the generation and behavior of electrical charges in living organisms particularly the nervous system and the effects of electricity on living organisms.Blood Pressure: PRESSURE of the BLOOD on the ARTERIES and other BLOOD VESSELS.Signal Transduction: The intracellular transfer of information (biological activation/inhibition) through a signal pathway. In each signal transduction system, an activation/inhibition signal from a biologically active molecule (hormone, neurotransmitter) is mediated via the coupling of a receptor/enzyme to a second messenger system or to an ion channel. Signal transduction plays an important role in activating cellular functions, cell differentiation, and cell proliferation. Examples of signal transduction systems are the GAMMA-AMINOBUTYRIC ACID-postsynaptic receptor-calcium ion channel system, the receptor-mediated T-cell activation pathway, and the receptor-mediated activation of phospholipases. Those coupled to membrane depolarization or intracellular release of calcium include the receptor-mediated activation of cytotoxic functions in granulocytes and the synaptic potentiation of protein kinase activation. Some signal transduction pathways may be part of larger signal transduction pathways; for example, protein kinase activation is part of the platelet activation signal pathway.Dose-Response Relationship, Drug: The relationship between the dose of an administered drug and the response of the organism to the drug.Mice, Knockout: Strains of mice in which certain GENES of their GENOMES have been disrupted, or "knocked-out". To produce knockouts, using RECOMBINANT DNA technology, the normal DNA sequence of the gene being studied is altered to prevent synthesis of a normal gene product. Cloned cells in which this DNA alteration is successful are then injected into mouse EMBRYOS to produce chimeric mice. The chimeric mice are then bred to yield a strain in which all the cells of the mouse contain the disrupted gene. Knockout mice are used as EXPERIMENTAL ANIMAL MODELS for diseases (DISEASE MODELS, ANIMAL) and to clarify the functions of the genes.Mice, Inbred C57BLDisease Models, Animal: Naturally occurring or experimentally induced animal diseases with pathological processes sufficiently similar to those of human diseases. They are used as study models for human diseases.
global_01_local_1_shard_00001926_processed.jsonl/55639
Genome: The genetic complement of an organism, including all of its GENES, as represented in its DNA, or in some cases, its RNA.Genome, Bacterial: The genetic complement of a BACTERIA as represented in its DNA.Genome, Viral: The complete genetic complement contained in a DNA or RNA molecule in a virus.Genome, Plant: The genetic complement of a plant (PLANTS) as represented in its DNA.Genome, Human: The complete genetic complement contained in the DNA of a set of CHROMOSOMES in a HUMAN. The length of the human genome is about 3 billion base pairs.Genome, Mitochondrial: The genetic complement of MITOCHONDRIA as represented in their DNA.Genome, Fungal: The complete gene complement contained in a set of chromosomes in a fungus.Genome Size: The amount of DNA (or RNA) in one copy of a genome.Sequence Analysis, DNA: A multistage process that includes cloning, physical mapping, subcloning, determination of the DNA SEQUENCE, and information analysis.Genome, Archaeal: The genetic complement of an archaeal organism (ARCHAEA) as represented in its DNA.Phylogeny: The relationships of groups of organisms as reflected by their genetic makeup.Base Sequence: The sequence of PURINES and PYRIMIDINES in nucleic acids and polynucleotides. It is also called nucleotide sequence.Genome, Insect: The genetic complement of an insect (INSECTS) as represented in its DNA.Evolution, Molecular: The process of cumulative change at the level of DNA; RNA; and PROTEINS, over successive generations.Genome, Protozoan: The complete genetic complement contained in a set of CHROMOSOMES in a protozoan.Genomics: The systematic study of the complete DNA sequences (GENOME) of organisms.Genome, Chloroplast: The genetic complement of CHLOROPLASTS as represented in their DNA.Chromosome Mapping: Any method used for determining the location of and relative distances between genes on a chromosome.Genome, Helminth: The genetic complement of a helminth (HELMINTHS) as represented in its DNA.Open Reading Frames: A sequence of successive nucleotide triplets that are read as CODONS specifying AMINO ACIDS and begin with an INITIATOR CODON and end with a stop codon (CODON, TERMINATOR).Genome, Plastid: The genetic complement of PLASTIDS as represented in their DNA.Sequence Alignment: The arrangement of two or more amino acid or base sequences from an organism or organisms in such a way as to align areas of the sequences sharing common properties. The degree of relatedness or homology between the sequences is predicted computationally or statistically based on weights assigned to the elements aligned between the sequences. This in turn can serve as a potential indicator of the genetic relatedness between the organisms.Synteny: The presence of two or more genetic loci on the same chromosome. Extensions of this original definition refer to the similarity in content and organization between chromosomes, of different species for example.Human Genome Project: A coordinated effort of researchers to map (CHROMOSOME MAPPING) and sequence (SEQUENCE ANALYSIS, DNA) the human GENOME.DNA, Viral: Deoxyribonucleic acid that makes up the genetic material of viruses.Molecular Sequence Data: Descriptions of specific amino acid, carbohydrate, or nucleotide sequences which have appeared in the published literature and/or are deposited in and maintained by databanks such as GENBANK, European Molecular Biology Laboratory (EMBL), National Biomedical Research Foundation (NBRF), or other sequence repositories.Gene Order: The sequential location of genes on a chromosome.Computational Biology: A field of biology concerned with the development of techniques for the collection and manipulation of biological data, and the use of such data to make biological discoveries or predictions. This field encompasses all computational methods and theories for solving biological problems including manipulation of models and datasets.Genetic Variation: Genotypic differences observed among individuals in a population.Models, Genetic: Theoretical representations that simulate the behavior or activity of genetic processes or phenomena. They include the use of mathematical equations, computers, and other electronic equipment.Amino Acid Sequence: The order of amino acids as they occur in a polypeptide chain. This is referred to as the primary structure of proteins. It is of fundamental importance in determining PROTEIN CONFORMATION.Databases, Genetic: Databases devoted to knowledge about specific genes and gene products.Recombination, Genetic: Production of new arrangements of DNA by various mechanisms such as assortment and segregation, CROSSING OVER; GENE CONVERSION; GENETIC TRANSFORMATION; GENETIC CONJUGATION; GENETIC TRANSDUCTION; or mixed infection of viruses.Species Specificity: The restriction of a characteristic behavior, anatomical structure or physical system, such as immune response; metabolic response, or gene or gene variant to the members of one species. It refers to that property which differentiates one species from another but it is also used for phylogenetic levels higher or lower than the species.Multigene Family: A set of genes descended by duplication and variation from some ancestral gene. Such genes may be clustered together on the same chromosome or dispersed on different chromosomes. Examples of multigene families include those that encode the hemoglobins, immunoglobulins, histocompatibility antigens, actins, tubulins, keratins, collagens, heat shock proteins, salivary glue proteins, chorion proteins, cuticle proteins, yolk proteins, and phaseolins, as well as histones, ribosomal RNA, and transfer RNA genes. The latter three are examples of reiterated genes, where hundreds of identical genes are present in a tandem array. (King & Stanfield, A Dictionary of Genetics, 4th ed)Chromosomes, Artificial, Bacterial: DNA constructs that are composed of, at least, a REPLICATION ORIGIN, for successful replication, propagation to and maintenance as an extra chromosome in bacteria. In addition, they can carry large amounts (about 200 kilobases) of other sequence for a variety of bioengineering purposes.Gene Duplication: Processes occurring in various organisms by which new genes are copied. Gene duplication may result in a MULTIGENE FAMILY; supergenes or PSEUDOGENES.Repetitive Sequences, Nucleic Acid: Sequences of DNA or RNA that occur in multiple copies. There are several types: INTERSPERSED REPETITIVE SEQUENCES are copies of transposable elements (DNA TRANSPOSABLE ELEMENTS or RETROELEMENTS) dispersed throughout the genome. TERMINAL REPEAT SEQUENCES flank both ends of another sequence, for example, the long terminal repeats (LTRs) on RETROVIRUSES. Variations may be direct repeats, those occurring in the same direction, or inverted repeats, those opposite to each other in direction. TANDEM REPEAT SEQUENCES are copies which lie adjacent to each other, direct or inverted (INVERTED REPEAT SEQUENCES).RNA, Viral: Ribonucleic acid that makes up the genetic material of viruses.Genes, Viral: The functional hereditary units of VIRUSES.Software: Sequential operating programs and data which instruct the functioning of a digital computer.Molecular Sequence Annotation: The addition of descriptive information about the function or structure of a molecular sequence to its MOLECULAR SEQUENCE DATA record.DNA Transposable Elements: Discrete segments of DNA which can excise and reintegrate to another site in the genome. Most are inactive, i.e., have not been found to exist outside the integrated state. DNA transposable elements include bacterial IS (insertion sequence) elements, Tn elements, the maize controlling elements Ac and Ds, Drosophila P, gypsy, and pogo elements, the human Tigger elements and the Tc and mariner elements which are found throughout the animal kingdom.Base Composition: The relative amounts of the PURINES and PYRIMIDINES in a nucleic acid.DNA, Mitochondrial: Double-stranded DNA of MITOCHONDRIA. In eukaryotes, the mitochondrial GENOME is circular and codes for ribosomal RNAs, transfer RNAs, and about 10 proteins.Sequence Homology, Nucleic Acid: The sequential correspondence of nucleotides in one nucleic acid molecule with those of another nucleic acid molecule. Sequence homology is an indication of the genetic relatedness of different organisms and gene function.Mutation: Any detectable and heritable change in the genetic material that causes a change in the GENOTYPE and which is transmitted to daughter cells and to succeeding generations.Cloning, Molecular: The insertion of recombinant DNA molecules from prokaryotic and/or eukaryotic sources into a replicating vehicle, such as a plasmid or virus vector, and the introduction of the resultant hybrid molecules into recipient cells without altering the viability of those cells.Contig Mapping: Overlapping of cloned or sequenced DNA to construct a continuous region of a gene, chromosome or genome.DNA, Bacterial: Deoxyribonucleic acid that makes up the genetic material of bacteria.Conserved Sequence: A sequence of amino acids in a polypeptide or of nucleotides in DNA or RNA that is similar across multiple species. A known set of conserved sequences is represented by a CONSENSUS SEQUENCE. AMINO ACID MOTIFS are often composed of conserved sequences.DNA, Plant: Deoxyribonucleic acid that makes up the genetic material of plants.Viral Proteins: Proteins found in any species of virus.Gene Transfer, Horizontal: The naturally occurring transmission of genetic information between organisms, related or unrelated, circumventing parent-to-offspring transmission. Horizontal gene transfer may occur via a variety of naturally occurring processes such as GENETIC CONJUGATION; GENETIC TRANSDUCTION; and TRANSFECTION. It may result in a change of the recipient organism's genetic composition (TRANSFORMATION, GENETIC).Transcription, Genetic: The biosynthesis of RNA carried out on a template of DNA. The biosynthesis of DNA from an RNA template is called REVERSE TRANSCRIPTION.Retroelements: Elements that are transcribed into RNA, reverse-transcribed into DNA and then inserted into a new site in the genome. Long terminal repeats (LTRs) similar to those from retroviruses are contained in retrotransposons and retrovirus-like elements. Retroposons, such as LONG INTERSPERSED NUCLEOTIDE ELEMENTS and SHORT INTERSPERSED NUCLEOTIDE ELEMENTS do not contain LTRs.Nucleic Acid Hybridization: Widely used technique which exploits the ability of complementary sequences in single-stranded DNAs or RNAs to pair with each other to form a double helix. Hybridization can take place between two complimentary DNA sequences, between a single-stranded DNA and a complementary RNA, or between two RNA sequences. The technique is used to detect and isolate specific sequences, measure homology, or define other characteristics of one or both strands. (Kendrew, Encyclopedia of Molecular Biology, 1994, p503)Databases, Nucleic Acid: Databases containing information about NUCLEIC ACIDS such as BASE SEQUENCE; SNPS; NUCLEIC ACID CONFORMATION; and other properties. Information about the DNA fragments kept in a GENE LIBRARY or GENOMIC LIBRARY is often maintained in DNA databases.Chromosomes, Plant: Complex nucleoprotein structures which contain the genomic DNA and are part of the CELL NUCLEUS of PLANTS.Expressed Sequence Tags: Partial cDNA (DNA, COMPLEMENTARY) sequences that are unique to the cDNAs from which they were derived.High-Throughput Nucleotide Sequencing: Techniques of nucleotide sequence analysis that increase the range, complexity, sensitivity, and accuracy of results by greatly increasing the scale of operations and thus the number of nucleotides, and the number of copies of each nucleotide sequenced. The sequencing may be done by analysis of the synthesis or ligation products, hybridization to preexisting sequences, etc.Pseudogenes: Genes bearing close resemblance to known genes at different loci, but rendered non-functional by additions or deletions in structure that prevent normal transcription or translation. When lacking introns and containing a poly-A segment near the downstream end (as a result of reverse copying from processed nuclear RNA into double-stranded DNA), they are called processed genes.Physical Chromosome Mapping: Mapping of the linear order of genes on a chromosome with units indicating their distances by using methods other than genetic recombination. These methods include nucleotide sequencing, overlapping deletions in polytene chromosomes, and electron micrography of heteroduplex DNA. (From King & Stansfield, A Dictionary of Genetics, 5th ed)Polymerase Chain Reaction: In vitro method for producing large amounts of specific DNA or RNA fragments of defined length and sequence from small amounts of short oligonucleotide flanking sequences (primers). The essential steps include thermal denaturation of the double-stranded target molecules, annealing of the primers to their complementary sequences, and extension of the annealed primers by enzymatic synthesis with DNA polymerase. The reaction is efficient, specific, and extremely sensitive. Uses for the reaction include disease diagnosis, detection of difficult-to-isolate pathogens, mutation analysis, genetic testing, DNA sequencing, and analyzing evolutionary relationships.Algorithms: A procedure consisting of a sequence of algebraic formulas and/or logical steps to calculate or determine a given task.Biological Evolution: The process of cumulative change over successive generations through which organisms acquire their distinguishing morphological and physiological characteristics.Virus Replication: The process of intracellular viral multiplication, consisting of the synthesis of PROTEINS; NUCLEIC ACIDS; and sometimes LIPIDS, and their assembly into a new infectious particle.Genomic Instability: An increased tendency of the GENOME to acquire MUTATIONS when various processes involved in maintaining and replicating the genome are dysfunctional.Genes, Bacterial: The functional hereditary units of BACTERIA.Polyploidy: The chromosomal constitution of a cell containing multiples of the normal number of CHROMOSOMES; includes triploidy (symbol: 3N), tetraploidy (symbol: 4N), etc.Genetic Markers: A phenotypically recognizable genetic trait which can be used to identify a genetic locus, a linkage group, or a recombination event.DNA: A deoxyribonucleotide polymer that is the primary genetic material of all cells. Eukaryotic and prokaryotic organisms normally contain DNA in a double-stranded state, yet several important biological processes transiently involve single-stranded regions. DNA, which consists of a polysugar-phosphate backbone possessing projections of purines (adenine and guanine) and pyrimidines (thymine and cytosine), forms a double helix that is held together by hydrogen bonds between these purines and pyrimidines (adenine to thymine and guanine to cytosine).Gene Expression Profiling: The determination of the pattern of genes expressed at the level of GENETIC TRANSCRIPTION, under specific circumstances or in a specific cell.Sequence Homology, Amino Acid: The degree of similarity between sequences of amino acids. This information is useful for the analyzing genetic relatedness of proteins and species.Genes, Plant: The functional hereditary units of PLANTS.Genome, Microbial: The genetic complement of a microorganism as represented in its DNA or in some microorganisms its RNA.Plasmids: Extrachromosomal, usually CIRCULAR DNA molecules that are self-replicating and transferable from one organism to another. They are found in a variety of bacterial, archaeal, fungal, algal, and plant species. They are used in GENETIC ENGINEERING as CLONING VECTORS.Internet: A loose confederation of computer communication networks around the world. The networks that make up the Internet are connected through several backbone networks. The Internet grew out of the US Government ARPAnet project and was designed to facilitate information exchange.Genome Components: The parts of a GENOME sequence that are involved with the different functions or properties of genomes as a whole as opposed to those of individual GENES.Cell Line: Established cell cultures that have the potential to propagate indefinitely.Sequence Homology: The degree of similarity between sequences. Studies of AMINO ACID SEQUENCE HOMOLOGY and NUCLEIC ACID SEQUENCE HOMOLOGY provide useful information about the genetic relatedness of genes, gene products, and species.Oryza sativa: Annual cereal grass of the family POACEAE and its edible starchy grain, rice, which is the staple food of roughly one-half of the world's population.Chromosomes: In a prokaryotic cell or in the nucleus of a eukaryotic cell, a structure consisting of or containing DNA which carries the genetic information essential to the cell. (From Singleton & Sainsbury, Dictionary of Microbiology and Molecular Biology, 2d ed)Bacterial Proteins: Proteins found in any species of bacterium.DNA, Intergenic: Any of the DNA in between gene-coding DNA, including untranslated regions, 5' and 3' flanking regions, INTRONS, non-functional pseudogenes, and non-functional repetitive sequences. This DNA may or may not encode regulatory functions.Gene Rearrangement: The ordered rearrangement of gene regions by DNA recombination such as that which occurs normally during development.Nucleic Acid Conformation: The spatial arrangement of the atoms of a nucleic acid or polynucleotide that results in its characteristic 3-dimensional shape.Polymorphism, Single Nucleotide: A single nucleotide variation in a genetic sequence that occurs at appreciable frequency in the population.Chromosomes, Bacterial: Structures within the nucleus of bacterial cells consisting of or containing DNA, which carry genetic information essential to the cell.Oligonucleotide Array Sequence Analysis: Hybridization of a nucleic acid sample to a very large set of OLIGONUCLEOTIDE PROBES, which have been attached individually in columns and rows to a solid support, to determine a BASE SEQUENCE, or to detect variations in a gene sequence, GENE EXPRESSION, or for GENE MAPPING.DNA Replication: The process by which a DNA molecule is duplicated.Mutagenesis, Insertional: Mutagenesis where the mutation is caused by the introduction of foreign DNA sequences into a gene or extragenic sequence. This may occur spontaneously in vivo or be experimentally induced in vivo or in vitro. Proviral DNA insertions into or adjacent to a cellular proto-oncogene can interrupt GENETIC TRANSLATION of the coding sequences or interfere with recognition of regulatory elements and cause unregulated expression of the proto-oncogene resulting in tumor formation.DNA Restriction Enzymes: Enzymes that are part of the restriction-modification systems. They catalyze the endonucleolytic cleavage of DNA sequences which lack the species-specific methylation pattern in the host cell's DNA. Cleavage yields random or specific double-stranded fragments with terminal 5'-phosphates. The function of restriction enzymes is to destroy any foreign DNA that invades the host cell. Most have been studied in bacterial systems, but a few have been found in eukaryotic organisms. They are also used as tools for the systematic dissection and mapping of chromosomes, in the determination of base sequences of DNAs, and have made it possible to splice and recombine genes from one organism into the genome of another. EC 3.21.1.Cluster Analysis: A set of statistical methods used to group variables or observations into strongly inter-related subgroups. In epidemiology, it may be used to analyze a closely grouped series of events or cases of disease or other health-related phenomenon with well-defined distribution patterns in relation to time or place or both.Genetic Linkage: The co-inheritance of two or more non-allelic GENES due to their being located more or less closely on the same CHROMOSOME.Gene Library: A large collection of DNA fragments cloned (CLONING, MOLECULAR) from a given organism, tissue, organ, or cell type. It may contain complete genomic sequences (GENOMIC LIBRARY) or complementary DNA sequences, the latter being formed from messenger RNA and lacking intron sequences.Gene Dosage: The number of copies of a given gene present in the cell of an organism. An increase in gene dosage (by GENE DUPLICATION for example) can result in higher levels of gene product formation. GENE DOSAGE COMPENSATION mechanisms result in adjustments to the level GENE EXPRESSION when there are changes or differences in gene dosage.Codon: A set of three nucleotides in a protein coding sequence that specifies individual amino acids or a termination signal (CODON, TERMINATOR). Most codons are universal, but some organisms do not produce the transfer RNAs (RNA, TRANSFER) complementary to all codons. These codons are referred to as unassigned codons (CODONS, NONSENSE).DNA Primers: Short sequences (generally about 10 base pairs) of DNA that are complementary to sequences of messenger RNA and allow reverse transcriptases to start copying the adjacent sequences of mRNA. Primers are used extensively in genetic and molecular biology techniques.Bacteriophages: Viruses whose hosts are bacterial cells.Phenotype: The outward appearance of the individual. It is the product of interactions between genes, and between the GENOTYPE and the environment.Restriction Mapping: Use of restriction endonucleases to analyze and generate a physical map of genomes, genes, or other segments of DNA.Genotype: The genetic constitution of the individual, comprising the ALLELES present at each GENETIC LOCUS.Selection, Genetic: Differential and non-random reproduction of different genotypes, operating to alter the gene frequencies within a population.Genes: A category of nucleic acid sequences that function as units of heredity and which code for the basic instructions for the development, reproduction, and maintenance of organisms.Introns: Sequences of DNA in the genes that are located between the EXONS. They are transcribed along with the exons but are removed from the primary gene transcript by RNA SPLICING to leave mature RNA. Some introns code for separate genes.Terminal Repeat Sequences: Nucleotide sequences repeated on both the 5' and 3' ends of a sequence under consideration. For example, the hallmarks of a transposon are that it is flanked by inverted repeats on each end and the inverted repeats are flanked by direct repeats. The Delta element of Ty retrotransposons and LTRs (long terminal repeats) are examples of this concept.User-Computer Interface: The portion of an interactive computer program that issues messages to and receives commands from a user.Prophages: Genomes of temperate BACTERIOPHAGES integrated into the DNA of their bacterial host cell. The prophages can be duplicated for many cell generations until some stimulus induces its activation and virulence.Blotting, Southern: A method (first developed by E.M. Southern) for detection of DNA that has been electrophoretically separated and immobilized by blotting on nitrocellulose or other type of paper or nylon membrane followed by hybridization with labeled NUCLEIC ACID PROBES.INDEL Mutation: A mutation named with the blend of insertion and deletion. It refers to a length difference between two ALLELES where it is unknowable if the difference was originally caused by a SEQUENCE INSERTION or by a SEQUENCE DELETION. If the number of nucleotides in the insertion/deletion is not divisible by three, and it occurs in a protein coding region, it is also a FRAMESHIFT MUTATION.Microsatellite Repeats: A variety of simple repeat sequences that are distributed throughout the GENOME. They are characterized by a short repeat unit of 2-8 basepairs that is repeated up to 100 times. They are also known as short tandem repeats (STRs).Escherichia coli: A species of gram-negative, facultatively anaerobic, rod-shaped bacteria (GRAM-NEGATIVE FACULTATIVELY ANAEROBIC RODS) commonly found in the lower part of the intestine of warm-blooded animals. It is usually nonpathogenic, but some strains are known to produce DIARRHEA and pyogenic infections. Pathogenic strains (virotypes) are classified by their specific pathogenic mechanisms such as toxins (ENTEROTOXIGENIC ESCHERICHIA COLI), etc.Genes, Mitochondrial: Genes that are located on the MITOCHONDRIAL DNA. Mitochondrial inheritance is often referred to as maternal inheritance but should be differentiated from maternal inheritance that is transmitted chromosomally.DNA, Chloroplast: Deoxyribonucleic acid that makes up the genetic material of CHLOROPLASTS.Gene Deletion: A genetic rearrangement through loss of segments of DNA or RNA, bringing sequences which are normally separated into close proximity. This deletion may be detected using cytogenetic techniques and can also be inferred from the phenotype, indicating a deletion at one specific locus.Genomic Library: A form of GENE LIBRARY containing the complete DNA sequences present in the genome of a given organism. It contrasts with a cDNA library which contains only sequences utilized in protein coding (lacking introns).Comparative Genomic Hybridization: A method for comparing two sets of chromosomal DNA by analyzing differences in the copy number and location of specific sequences. It is used to look for large sequence changes such as deletions, duplications, amplifications, or translocations.Arabidopsis: A plant genus of the family BRASSICACEAE that contains ARABIDOPSIS PROTEINS and MADS DOMAIN PROTEINS. The species A. thaliana is used for experiments in classical plant genetics as well as molecular genetic studies in plant physiology, biochemistry, and development.RNA, Transfer: The small RNA molecules, 73-80 nucleotides long, that function during translation (TRANSLATION, GENETIC) to align AMINO ACIDS at the RIBOSOMES in a sequence determined by the mRNA (RNA, MESSENGER). There are about 30 different transfer RNAs. Each recognizes a specific CODON set on the mRNA through its own ANTICODON and as aminoacyl tRNAs (RNA, TRANSFER, AMINO ACYL), each carries a specific amino acid to the ribosome to add to the elongating peptide chains.Vertebrates: Animals having a vertebral column, members of the phylum Chordata, subphylum Craniata comprising mammals, birds, reptiles, amphibians, and fishes.Prokaryotic Cells: Cells lacking a nuclear membrane so that the nuclear material is either scattered in the cytoplasm or collected in a nucleoid region.Symbiosis: The relationship between two different species of organisms that are interdependent; each gains benefits from the other or a relationship between different species where both of the organisms in question benefit from the presence of the other.Sequence Analysis, RNA: A multistage process that includes cloning, physical mapping, subcloning, sequencing, and information analysis of an RNA SEQUENCE.Promoter Regions, Genetic: DNA sequences which are recognized (directly or indirectly) and bound by a DNA-dependent RNA polymerase during the initiation of transcription. Highly conserved sequences within the promoter include the Pribnow box in bacteria and the TATA BOX in eukaryotes.Interspersed Repetitive Sequences: Copies of transposable elements interspersed throughout the genome, some of which are still active and often referred to as "jumping genes". There are two classes of interspersed repetitive elements. Class I elements (or RETROELEMENTS - such as retrotransposons, retroviruses, LONG INTERSPERSED NUCLEOTIDE ELEMENTS and SHORT INTERSPERSED NUCLEOTIDE ELEMENTS) transpose via reverse transcription of an RNA intermediate. Class II elements (or DNA TRANSPOSABLE ELEMENTS - such as transposons, Tn elements, insertion sequence elements and mobile gene cassettes of bacterial integrons) transpose directly from one site in the DNA to another.RNA, Messenger: RNA sequences that serve as templates for protein synthesis. Bacterial mRNAs are generally primary transcripts in that they do not require post-transcriptional processing. Eukaryotic mRNA is synthesized in the nucleus and must be exported to the cytoplasm for translation. Most eukaryotic mRNAs have a sequence of polyadenylic acid at the 3' end, referred to as the poly(A) tail. The function of this tail is not known for certain, but it may play a role in the export of mature mRNA from the nucleus as well as in helping stabilize some mRNA molecules by retarding their degradation in the cytoplasm.Plants: Multicellular, eukaryotic life forms of kingdom Plantae (sensu lato), comprising the VIRIDIPLANTAE; RHODOPHYTA; and GLAUCOPHYTA; all of which acquired chloroplasts by direct endosymbiosis of CYANOBACTERIA. They are characterized by a mainly photosynthetic mode of nutrition; essentially unlimited growth at localized regions of cell divisions (MERISTEMS); cellulose within cells providing rigidity; the absence of organs of locomotion; absence of nervous and sensory systems; and an alternation of haploid and diploid generations.Saccharomyces cerevisiae: A species of the genus SACCHAROMYCES, family Saccharomycetaceae, order Saccharomycetales, known as "baker's" or "brewer's" yeast. The dried form is used as a dietary supplement.Virulence: The degree of pathogenicity within a group or species of microorganisms or viruses as indicated by case fatality rates and/or the ability of the organism to invade the tissues of the host. The pathogenic capacity of an organism is determined by its VIRULENCE FACTORS.Inverted Repeat Sequences: Copies of nucleic acid sequence that are arranged in opposing orientation. They may lie adjacent to each other (tandem) or be separated by some sequence that is not part of the repeat (hyphenated). They may be true palindromic repeats, i.e. read the same backwards as forward, or complementary which reads as the base complement in the opposite orientation. Complementary inverted repeats have the potential to form hairpin loop or stem-loop structures which results in cruciform structures (such as CRUCIFORM DNA) when the complementary inverted repeats occur in double stranded regions.RNA Viruses: Viruses whose genetic material is RNA.Plastids: Self-replicating cytoplasmic organelles of plant and algal cells that contain pigments and may synthesize and accumulate various substances. PLASTID GENOMES are used in phylogenetic studies.Virus Integration: Insertion of viral DNA into host-cell DNA. This includes integration of phage DNA into bacterial DNA; (LYSOGENY); to form a PROPHAGE or integration of retroviral DNA into cellular DNA to form a PROVIRUS.Bacteria: One of the three domains of life (the others being Eukarya and ARCHAEA), also called Eubacteria. They are unicellular prokaryotic microorganisms which generally possess rigid cell walls, multiply by cell division, and exhibit three principal forms: round or coccal, rodlike or bacillary, and spiral or spirochetal. Bacteria can be classified by their response to OXYGEN: aerobic, anaerobic, or facultatively anaerobic; by the mode by which they obtain their energy: chemotrophy (via chemical reaction) or PHOTOTROPHY (via light reaction); for chemotrophs by their source of chemical energy: CHEMOLITHOTROPHY (from inorganic compounds) or chemoorganotrophy (from organic compounds); and by their source for CARBON; NITROGEN; etc.; HETEROTROPHY (from organic sources) or AUTOTROPHY (from CARBON DIOXIDE). They can also be classified by whether or not they stain (based on the structure of their CELL WALLS) with CRYSTAL VIOLET dye: gram-negative or gram-positive.Genes, Archaeal: The functional genetic units of ARCHAEA.Sorghum: A plant genus of the family POACEAE. The grain is used for FOOD and for ANIMAL FEED. This should not be confused with KAFFIR LIME or with KEFIR milk product.Gene Expression Regulation, Bacterial: Any of the processes by which cytoplasmic or intercellular factors influence the differential control of gene action in bacteria.Gene Expression Regulation, Viral: Any of the processes by which cytoplasmic factors influence the differential control of gene action in viruses.DNA, Circular: Any of the covalently closed DNA molecules found in bacteria, many viruses, mitochondria, plastids, and plasmids. Small, polydisperse circular DNA's have also been observed in a number of eukaryotic organisms and are suggested to have homology with chromosomal DNA and the capacity to be inserted into, and excised from, chromosomal DNA. It is a fragment of DNA formed by a process of looping out and deletion, containing a constant region of the mu heavy chain and the 3'-part of the mu switch region. Circular DNA is a normal product of rearrangement among gene segments encoding the variable regions of immunoglobulin light and heavy chains, as well as the T-cell receptor. (Riger et al., Glossary of Genetics, 5th ed & Segen, Dictionary of Modern Medicine, 1992)Genetic Loci: Specific regions that are mapped within a GENOME. Genetic loci are usually identified with a shorthand notation that indicates the chromosome number and the position of a specific band along the P or Q arm of the chromosome where they are found. For example the locus 6p21 is found within band 21 of the P-arm of CHROMOSOME 6. Many well known genetic loci are also known by common names that are associated with a genetic function or HEREDITARY DISEASE.Chromosomes, Human: Very long DNA molecules and associated proteins, HISTONES, and non-histone chromosomal proteins (CHROMOSOMAL PROTEINS, NON-HISTONE). Normally 46 chromosomes, including two sex chromosomes are found in the nucleus of human cells. They carry the hereditary information of the individual.Short Interspersed Nucleotide Elements: Highly repeated sequences, 100-300 bases long, which contain RNA polymerase III promoters. The primate Alu (ALU ELEMENTS) and the rodent B1 SINEs are derived from 7SL RNA, the RNA component of the signal recognition particle. Most other SINEs are derived from tRNAs including the MIRs (mammalian-wide interspersed repeats).Genetic Vectors: DNA molecules capable of autonomous replication within a host cell and into which other DNA sequences can be inserted and thus amplified. Many are derived from PLASMIDS; BACTERIOPHAGES; or VIRUSES. They are used for transporting foreign genes into recipient cells. Genetic vectors possess a functional replicator site and contain GENETIC MARKERS to facilitate their selective recognition.Genetic Engineering: Directed modification of the gene complement of a living organism by such techniques as altering the DNA, substituting genetic material by means of a virus, transplanting whole nuclei, transplanting cell hybrids, etc.Segmental Duplications, Genomic: Low-copy (2-50) repetitive DNA elements that are highly homologous and range in size from 1000 to 400,000 base pairs.DNA, Complementary: Single-stranded complementary DNA synthesized from an RNA template by the action of RNA-dependent DNA polymerase. cDNA (i.e., complementary DNA, not circular DNA, not C-DNA) is used in a variety of molecular cloning experiments as well as serving as a specific hybridization probe.Polymorphism, Genetic: The regular and simultaneous occurrence in a single interbreeding population of two or more discontinuous genotypes. The concept includes differences in genotypes ranging in size from a single nucleotide site (POLYMORPHISM, SINGLE NUCLEOTIDE) to large nucleotide sequences visible at a chromosomal level.Drosophila melanogaster: A species of fruit fly much used in genetics because of the large size of its chromosomes.Eukaryotic Cells: Cells of the higher organisms, containing a true nucleus bounded by a nuclear membrane.Metabolic Networks and Pathways: Complex sets of enzymatic reactions connected to each other via their product and substrate metabolites.GC Rich Sequence: A nucleic acid sequence that contains an above average number of GUANINE and CYTOSINE bases.Mammals: Warm-blooded vertebrate animals belonging to the class Mammalia, including all that possess hair and suckle their young.Cell Nucleus: Within a eukaryotic cell, a membrane-limited body which contains chromosomes and one or more nucleoli (CELL NUCLEOLUS). The nuclear membrane consists of a double unit-type membrane which is perforated by a number of pores; the outermost membrane is continuous with the ENDOPLASMIC RETICULUM. A cell may contain more than one nucleus. (From Singleton & Sainsbury, Dictionary of Microbiology and Molecular Biology, 2d ed)Long Interspersed Nucleotide Elements: Highly repeated sequences, 6K-8K base pairs in length, which contain RNA polymerase II promoters. They also have an open reading frame that is related to the reverse transcriptase of retroviruses but they do not contain LTRs (long terminal repeats). Copies of the LINE 1 (L1) family form about 15% of the human genome. The jockey elements of Drosophila are LINEs.Transcriptome: The pattern of GENE EXPRESSION at the level of genetic transcription in a specific organism or under specific circumstances in specific cells.Hybridization, Genetic: The genetic process of crossbreeding between genetically dissimilar parents to produce a hybrid.Alleles: Variant forms of the same gene, occupying the same locus on homologous CHROMOSOMES, and governing the variants in production of the same gene product.Pan troglodytes: The common chimpanzee, a species of the genus Pan, family HOMINIDAE. It lives in Africa, primarily in the tropical rainforests. There are a number of recognized subspecies.Eukaryota: One of the three domains of life (the others being BACTERIA and ARCHAEA), also called Eukarya. These are organisms whose cells are enclosed in membranes and possess a nucleus. They comprise almost all multicellular and many unicellular organisms, and are traditionally divided into groups (sometimes called kingdoms) including ANIMALS; PLANTS; FUNGI; and various algae and other taxa that were previously part of the old kingdom Protista.Archaea: One of the three domains of life (the others being BACTERIA and Eukarya), formerly called Archaebacteria under the taxon Bacteria, but now considered separate and distinct. They are characterized by: (1) the presence of characteristic tRNAs and ribosomal RNAs; (2) the absence of peptidoglycan cell walls; (3) the presence of ether-linked lipids built from branched-chain subunits; and (4) their occurrence in unusual habitats. While archaea resemble bacteria in morphology and genomic organization, they resemble eukarya in their method of genomic replication. The domain contains at least four kingdoms: CRENARCHAEOTA; EURYARCHAEOTA; NANOARCHAEOTA; and KORARCHAEOTA.Quantitative Trait Loci: Genetic loci associated with a QUANTITATIVE TRAIT.Genes, Duplicate: Two identical genes showing the same phenotypic action but localized in different regions of a chromosome or on different chromosomes. (From Rieger et al., Glossary of Genetics: Classical and Molecular, 5th ed)Angiosperms: Members of the group of vascular plants which bear flowers. They are differentiated from GYMNOSPERMS by their production of seeds within a closed chamber (OVARY, PLANT). The Angiosperms division is composed of two classes, the monocotyledons (Liliopsida) and dicotyledons (Magnoliopsida). Angiosperms represent approximately 80% of all known living plants.Sequence Deletion: Deletion of sequences of nucleic acids from the genetic material of an individual.Capsid: The outer protein protective shell of a virus, which protects the viral nucleic acid.Tetraodontiformes: A small order of primarily marine fish containing 340 species. Most have a rotund or box-like shape. TETRODOTOXIN is found in their liver and ovaries.DNA Copy Number Variations: Stretches of genomic DNA that exist in different multiples between individuals. Many copy number variations have been associated with susceptibility or resistance to disease.Gene Expression Regulation: Any of the processes by which nuclear, cytoplasmic, or intercellular factors influence the differential control (induction or repression) of gene action at the level of transcription or translation.Diploidy: The chromosomal constitution of cells, in which each type of CHROMOSOME is represented twice. Symbol: 2N or 2X.Mutation Rate: The number of mutations that occur in a specific sequence, GENE, or GENOME over a specified period of time such as years, CELL DIVISIONS, or generations.Defective Viruses: Viruses which lack a complete genome so that they cannot completely replicate or cannot form a protein coat. Some are host-dependent defectives, meaning they can replicate only in cell systems which provide the particular genetic function which they lack. Others, called SATELLITE VIRUSES, are able to replicate only when their genetic defect is complemented by a helper virus.Chromosome Inversion: An aberration in which a chromosomal segment is deleted and reinserted in the same place but turned 180 degrees from its original orientation, so that the gene sequence for the segment is reversed with respect to that of the rest of the chromosome.Untranslated Regions: The parts of the messenger RNA sequence that do not code for product, i.e. the 5' UNTRANSLATED REGIONS and 3' UNTRANSLATED REGIONS.Crosses, Genetic: Deliberate breeding of two different individuals that results in offspring that carry part of the genetic material of each parent. The parent organisms must be genetically compatible and may be from different varieties or closely related species.DNA-Binding Proteins: Proteins which bind to DNA. The family includes proteins which bind to both double- and single-stranded DNA and also includes specific DNA binding proteins in serum which can be used as markers for malignant diseases.Likelihood Functions: Functions constructed from a statistical model and a set of observed data which give the probability of that data for various values of the unknown model parameters. Those parameter values that maximize the probability are the maximum likelihood estimates of the parameters.Tandem Repeat Sequences: Copies of DNA sequences which lie adjacent to each other in the same orientation (direct tandem repeats) or in the opposite direction to each other (INVERTED TANDEM REPEATS).Proteome: The protein complement of an organism coded for by its genome.Genomic Islands: Distinct units in some bacterial, bacteriophage or plasmid GENOMES that are types of MOBILE GENETIC ELEMENTS. Encoded in them are a variety of fitness conferring genes, such as VIRULENCE FACTORS (in "pathogenicity islands or islets"), ANTIBIOTIC RESISTANCE genes, or genes required for SYMBIOSIS (in "symbiosis islands or islets"). They range in size from 10 - 500 kilobases, and their GC CONTENT and CODON usage differ from the rest of the genome. They typically contain an INTEGRASE gene, although in some cases this gene has been deleted resulting in "anchored genomic islands".Exons: The parts of a transcript of a split GENE remaining after the INTRONS are removed. They are spliced together to become a MESSENGER RNA or other functional RNA.DNA, Fungal: Deoxyribonucleic acid that makes up the genetic material of fungi.Binding Sites: The parts of a macromolecule that directly participate in its specific combination with another molecule.DNA Repair: The reconstruction of a continuous two-stranded DNA molecule without mismatch from a molecule which contained damaged regions. The major repair mechanisms are excision repair, in which defective regions in one strand are excised and resynthesized using the complementary base pairing information in the intact strand; photoreactivation repair, in which the lethal and mutagenic effects of ultraviolet light are eliminated; and post-replication repair, in which the primary lesions are not repaired, but the gaps in one daughter duplex are filled in by incorporation of portions of the other (undamaged) daughter duplex. Excision repair and post-replication repair are sometimes referred to as "dark repair" because they do not require light.Plant Diseases: Diseases of plants.Plant Proteins: Proteins found in plants (flowers, herbs, shrubs, trees, etc.). The concept does not include proteins found in vegetables for which VEGETABLE PROTEINS is available.Zea mays: A plant species of the family POACEAE. It is a tall grass grown for its EDIBLE GRAIN, corn, used as food and animal FODDER.RNA: A polynucleotide consisting essentially of chains with a repeating backbone of phosphate and ribose units to which nitrogenous bases are attached. RNA is unique among biological macromolecules in that it can encode genetic information, serve as an abundant structural component of cells, and also possesses catalytic activity. (Rieger et al., Glossary of Genetics: Classical and Molecular, 5th ed)Genetic Techniques: Chromosomal, biochemical, intracellular, and other methods used in the study of genetics.5' Untranslated Regions: The sequence at the 5' end of the messenger RNA that does not code for product. This sequence contains the ribosome binding site and other transcription and translation regulating sequences.Alu Elements: The Alu sequence family (named for the restriction endonuclease cleavage enzyme Alu I) is the most highly repeated interspersed repeat element in humans (over a million copies). It is derived from the 7SL RNA component of the SIGNAL RECOGNITION PARTICLE and contains an RNA polymerase III promoter. Transposition of this element into coding and regulatory regions of genes is responsible for many heritable diseases.Chromatin: The material of CHROMOSOMES. It is a complex of DNA; HISTONES; and nonhistone proteins (CHROMOSOMAL PROTEINS, NON-HISTONE) found within the nucleus of a cell.DNA, Algal: Deoxyribonucleic acid that makes up the genetic material of algae.Genes, Overlapping: Genes whose nucleotide sequences overlap to some degree. The overlapped sequences may involve structural or regulatory genes of eukaryotic or prokaryotic cells.Chromosomes, Mammalian: Complex nucleoprotein structures which contain the genomic DNA and are part of the CELL NUCLEUS of MAMMALS.Endogenous Retroviruses: Retroviruses that have integrated into the germline (PROVIRUSES) that have lost infectious capability but retained the capability to transpose.Genome-Wide Association Study: An analysis comparing the allele frequencies of all available (or a whole GENOME representative set of) polymorphic markers in unrelated patients with a specific symptom or disease condition, and those of healthy controls to identify markers associated with a specific disease or condition.Computer Graphics: The process of pictorial communication, between human and computers, in which the computer input and output have the form of charts, drawings, or other appropriate pictorial representation.Siphoviridae: A family of BACTERIOPHAGES and ARCHAEAL VIRUSES which are characterized by long, non-contractile tails.DNA Methylation: Addition of methyl groups to DNA. DNA methyltransferases (DNA methylases) perform this reaction using S-ADENOSYLMETHIONINE as the methyl group donor.Gene Expression: The phenotypic manifestation of a gene or genes by the processes of GENETIC TRANSCRIPTION and GENETIC TRANSLATION. *  Human Genome Is Much More Than Just Genes It's like Google Maps for the human genome,' says Elise Feingold, a program director for the National Human Genome Research ... Human Genome Is Much More Than Just Genes ScienceNOW ^ , 5 September 2012 , Elizabeth Pennisi Posted on 09/06/2012 10:04:50 PM ... Human Genome Is Much More Than Just Genes'. Well, of course it is, silly!. It's got Gnomes too. ... The human genome-the sum total of hereditary information in a person-contains a lot more than the protein-coding genes ... *  Society and the Human Genome | Biochemical Society Transactions J. Sulston, the International Human Genome Sequencing Consortium. Biochemical Society Transactions May 2001, 29 (2) 27-31; DOI: ... J. Sulston, the International Human Genome Sequencing Consortium. Biochemical Society Transactions May 2001, 29 (2) 27-31; DOI: ... In June 2000, the draft sequence of the human genome was announced. It is, and will be for some years, incomplete, but the vast ... The Sanger Centre, Wellcome Trust Genome Campus, Hinxton, Cambridge CB10 1RQ, U.K. ... *  Human Genome Sciences Announces Pricing of Public Offering of Co... ( ROCKVILLE Md. July 28 /- Human...) July 28 /- Human Genome Scienc... ...(Logo: a href http://www.newscom.com/cgi-bin/prnh/20080416/HGSLOGO ...,Human,Genome, ... Human Genome Sciences Announces Pricing of Public Offering of Common Stock. ... ...ROCKVILLE Md. July 28 /- Human Genome Scienc ... HGS, Human Genome Sciences, ABthrax, Albuferon, BENLYSTA, LymphoStat-B, and ZALBIN are trademarks of Human Genome Sciences, Inc ... Human Genome Sciences Invites Investors to Listen to Webcast of Presentation at Thomas Weisel Partners Conference. 7. Human ... *  African and Asian genome sequences: the last of the single human genome papers? - Genetic Future African and Asian genome sequences: the last of the single human genome papers?. Posted by Daniel MacArthur on November 5, 2008 ... "single human genome" papers, which started in a sense with the anonymised, pooled and fragmented human reference sequences ... But nonetheless, the age of the one-genome paper is fast drawing to a close. Human genetics now moves into a phase of new ... 2008). Accurate whole human genome sequencing using reversible terminator chemistry Nature, 456 (7218), 53-59 DOI: 10.1038/ ... *  M.D. Bashyam & S.E. Hasnain- The human genome sequence: impact on health care | Transposable Element | Gene ... the other genomes do not have any dominant families like the LINEs in the human genome 18. Moreover, unlike the human genome, ... The finished human genome sequence stood at 835 Mb in October, 2000, which is more than 25 per cent of the total human genome ... The human genome sequence has been unraveled by two more or less independent efforts. One, the public funded Human Genome ... The planners of the Human Genome Project recognized that the information gained from mapping and sequencing the human genome ... *  Unlocking the Chemistry of Life | Caltech In just the span of an average lifetime, science has made leaps and bounds in our understanding of the human genome and its ... However, the 20,000 genes of the human genome are more than DNA; they also encode proteins to carry out the countless functions ... Scientists can easily sequence an entire genome in just a day or two, but sequencing a proteome-all of the proteins encoded by ... In order to understand the role each of these proteins plays in human health-and what goes wrong when disease occurs-biologists ... *  Human NRBP1 Knockout HAP1 Cell Line ... in-house selection algorithms warrant that only those guide RNAs with minimal predicted off-target sites in the human genome ... Human NRBP1 Knockout HAP1 Cell Line. Genotype: NRBP1 HAP1 knockout HGNC Symbol: NRBP1 Price: $990.00 ... Human NRBP1 Knockout HAP1 Cell Line. Genotype: NRBP1 HAP1 knockout HGNC Symbol: NRBP1 Price: $990.00 ... You're reviewing: Human NRBP1 Knockout HAP1 Cell Line * *Let us know your thoughts. ... *  Chromatin Structure and Human Genome Evolution ... of the human genome, but relatively little is known about the spatial organisation of the genome ... Genome Research 17: 1286-1295. Gilbert N, Boyle S, Fiegler H et al. (2004) Chromatin architecture of the human genome: gene‐ ... of the human genome, but relatively little is known about the spatial organisation of the genome. This is a major gap in our ... Chromatin Structure and Human Genome Evolution. Emily V Chambers, University of Edinburgh, Edinburgh, Scotland Colin AM Semple ... *  Thales Y. Papagiannakopoulos Genome sequencing studies have identified a large collection of genetic alterations that occur in human cancers. However, the ... Development of novel in vivo genome engineering approaches for cancer research Cancer develops from mutations and copy number ... Our lab is pioneering the use of GEMMs of lung cancer in combination with in vivo CRISPR/Cas9 genome engineering approaches to ... Using a combination of a Kras-driven genetically engineered mouse model and somatic CRISPR/Cas9 genome-engineering approaches ... *  A step toward the $1,000 personal genome using readily available lab equipment ( The theoretical price of having one's p...) 1000 human genome requires a significa...The new technique calls for replicating thousands of DNA fragments att...,A,step, ... toward,the,$1,000,personal,genome,using,readily,available,lab,equipment,biological,biology news articles,biology news today, ... The theoretical price of having one's personal genome sequenced just f...The sharp drop is due to a new DNA sequencing ... The Church lab is a member of the genome sequencing technology development project of the NIH-National Human Genome Research ... *  Plus it Among the 518 kinases identified in the human genome are many exciting targets for cancer drug discovery (22). Molecular ... Contributions of human tumor xenografts to anticancer drug development. Cancer Res 2006;66:3351-4. ... Sequential dependent enhancement of caspase activation and apoptosis by flavopiridol on paclitaxel-treated human gastric and ... They induce cell cycle arrest in vitro and in human xenograft growth arrest in a spectrum of models. In addition to cytostasis ... *  Patterns of somatic mutation in human cancer genomes. The availability of the human genome sequence led us to propose that systematic resequencing of cancer genomes for mutations ... Patterns of somatic mutation in human cancer genomes.. Greenman C., Stephens P., Smith R., Dalgliesh G.L., Hunter C., Bignell G ... Systematic sequencing of cancer genomes therefore reveals the evolutionary diversity of cancers and implicates a larger ... of DNA corresponding to the coding exons of 518 protein kinase genes in 210 diverse human cancers. There was substantial ... *  Sequencing and analysis of an Irish human genome | Genome Biology | Full Text Using this and other available completely sequenced human genomes, we first looked for regions of the human genome that have ... NCBI build 36.1 of the human genome was downloaded from the UCSC genome website and the bwa alignment software [56] was used to ... Publication of the first human genome sequence heralded a landmark in human biology [1]. By mapping out the entire genetic ... Enard D, Depaulis F, Roest Crollius H: Human and non-human primate genomes share hotspots of positive selection. PLoS Genet. ... *  DNA - Human Genome | ENCOGNITIVE.COM Human Genome. The human genome is the genome of Homo sapiens, which is composed of 24 distinct pairs of chromosomes (22 ... Mitochondrial genome. The human mitochondrial genome, while usually not included when referring to the "human genome", is of ... The human genome is much more gene-sparse than was initially predicted at the outset of the Human Genome Project, with only ... The chimpanzee genome is 95% identical to the human genome. On average, a typical human protein-coding gene differs from its ... *  Cancer genome sequencing - Wikipedia With cancer genomes, this is usually done by aligning the reads to the human reference genome. Since even non-cancerous cells ... The Cancer Genome Project CGAP The Cancer Genome Atlas Cancer Genome Project Cancer Genome Project International Cancer Genome ... By comparison, the original draft of the human genome had approximately 65-fold coverage. A major goal of cancer genome ... and the National Human Genome Research Institute (NHGRI). Combined with these efforts, the International Cancer Genome ... *  National Human Genome Research Institute (NHGRI) The National Human Genome Research Institute conducts genetic and genomic research, funds genetic and genomic research and ... The National Human Genome Research Institute (NHGRI) has appointed Carolyn Hutter, Ph.D. the director of the Division of Genome ... The National Human Genome Research Institute today launched a new round of strategic planning that will establish a 2020 vision ... The National Human Genome Research Institute conducts genetic and genomic research, funds genetic and genomic research and ... *  Learning About Klinefelter Syndrome - National Human Genome Research Institute (NHGRI) Humans have 46 chromosomes, which contain all of a person's genes and DNA. Two of these chromosomes, the sex chromosomes, ... From the National Institute of Child Health & Human Development.. *Klinefelter Syndrome [nichd.nih.gov]. From the National ... *  Human genome - Wikipedia 6 Genomic variation in humans *6.1 Human reference genome. *6.2 Measuring human genetic variation *6.2.1 Mapping human genomic ... Mapping human genomic variation[edit]. Whereas a genome sequence lists the order of every DNA base in a genome, a genome map ... Main articles: Human genetic variation and Human genetic clustering. Human reference genome[edit]. With the exception of ... Completeness of the human genome sequence[edit]. Although the human genome has been completely sequenced for all practical ... *  Human Genome Count Rising | WIRED The race to finish mapping the human genome could get even hotter. ... Scientists claim humans may actually have double the number of genes than previously thought. ... Human Genome Count Rising. Human beings may have twice as many genes as previously thought, researchers at a biotechnology ... Incyte is one of several companies hoping to make money on its maps of the human genome - the collection of all human genetic ... *  human genome | SYFY WIRE Scientific leaders advise we not mess with the human genome, at least not yet Trent Moore ... *  Human Genome Project | Encyclopedia.com ... originally named the Human Genome Initiative but later known as the Human Genome Project or HGP, began in 1987 and was ... When begun, HGP was dubbed 'big science' comparable to placing human beings on the moon. ... Human Genome Project Biology COPYRIGHT 2002 The Gale Group Inc.. Human Genome Project. The Human Genome Project (HGP), the ... Human Genome Project. The worldwide effort, originally named the Human Genome Initiative but later known as the Human Genome ... *  Human Genome, biotech stocks rise - MarketWatch Shares of Human Genome Sciences HGSI rose $1.80, or nearly 7 percent, to $29.12. Rockville, Md.-based Human Genome said it had ... Human Genome Sciences has developed one of the most productive pipelines in the industry, built out of its groundbreaking ... NEW YORK (CBS.MW) -- Biotechnology stocks gained ground Wednesday, with shares of Human Genome Sciences among the leading ... Analyst Thomas Hancock at US Bancorp Piper Jaffray said Wednesday's announcement demonstrates the advantages of Human Genome's ... *  Human Genome Project Results | HowStuffWorks Human Genome Project results have told us that we have far fewer genes than expected. What other Human Genome Project results ... Now that the Human Genome Project is over, it's time for scientists to examine the information produced and pursue related ... For more inform-ation about the Human Genome Project and other related topics like epigenetics, please visit the links on the ... Along with changing how we think about genes, the Human Genome Project spawned lots of other projects. For example, in 2002, ... *  DNA Methylation in the Human Genome ... ... Charting a dynamic DNA methylation landscape of the human genome. Nature 500(7463):477-481. ... The vision of the NIEHS is to use environmental health sciences to understand human disease and improve human health. Use the ... Genome-wide association studies showed that differentially methylated regions often contained single nucleotide polymorphisms ... *  Unraveling the Human Genome: 6 Molecular Milestones DNA is crucial to the genome, we look back at the genetics milestones that got us here. ... Unraveling the Human Genome: 6 Molecular Milestones. By Stephanie Pappas, Live Science Contributor , January 23, 2013 08:58am ... The new findings are the latest in a series of increasingly deep looks at the human genome. Here are some of the major ... In a milestone for the understanding of human genetics, scientists announced in September 2012 the results of five years of ... List of sequenced eukaryotic genomesGlobal microbial identifier: The genomic epidemiological database for global identification of microorganisms or global microbial identifier (GMI) is a platform for storing whole genome sequencing (WGS) data of microorganisms, for the identification of relevant genes and for the comparison of genomes to detect and track-and-trace infectious disease outbreaks and emerging pathogens. The database holds two types of information: 1) genomic information of microorganisms, linked to, 2) metadata of those microorganism such as epidemiological details.NADH-QDNA sequencer: A DNA sequencer is a scientific instrument used to automate the DNA sequencing process. Given a sample of DNA, a DNA sequencer is used to determine the order of the four bases: G (guanine), C (cytosine), A (adenine) and T (thymine).Branching order of bacterial phyla (Gupta, 2001): There are several models of the Branching order of bacterial phyla, one of these was proposed in 2001 by Gupta based on conserved indels or protein, termed "protein signatures", an alternative approach to molecular phylogeny. Some problematic exceptions and conflicts are present to these conserved indels, however, they are in agreement with several groupings of classes and phyla.Symmetry element: A symmetry element is a point of reference about which symmetry operations can take place. In particular, symmetry elements can be centers of inversion, axes of rotation and mirror planes.Molecular evolution: Molecular evolution is a change in the sequence composition of cellular molecules such as DNA, RNA, and proteins across generations. The field of molecular evolution uses principles of evolutionary biology and population genetics to explain patterns in these changes.PlasmoDB: PlasmoDB is a biological database for the genus Plasmodium. The database is a member of the EuPathDB project.Ontario Genomics Institute: The Ontario Genomics Institute (OGI) is a not-for-profit organization that manages cutting-edge genomics research projects and platforms.The Ontario Genomics Institute OGI also helps scientists find paths to the marketplace for their discoveries and the products to which they lead, and it works through diverse outreach and educational activities to raise awareness and facilitate informed public dialogue about genomics and its social impacts.Chromosome regionsOpen reading frame: In molecular genetics, an open reading frame (ORF) is the part of a reading frame that has the potential to code for a protein or peptide. An ORF is a continuous stretch of codons that do not contain a stop codon (usually UAA, UAG or UGA).CS-BLASTCancer Genome Project: The Cancer Genome Project, based at the Wellcome Trust Sanger Institute, aims to identify sequence variants/mutations critical in the development of human cancers. Like The Cancer Genome Atlas project within the United States, the Cancer Genome Project represents an effort in the War on Cancer to improve cancer diagnosis, treatment, and prevention through a better understanding of the molecular basis of this disease.Coles PhillipsPSI Protein Classifier: PSI Protein Classifier is a program generalizing the results of both successive and independent iterations of the PSI-BLAST program. PSI Protein Classifier determines belonging of the found by PSI-BLAST proteins to the known families.Genetic variation: right|thumbProtein primary structure: The primary structure of a peptide or protein is the linear sequence of its amino acid structural units, and partly comprises its overall biomolecular structure. By convention, the primary structure of a protein is reported starting from the amino-terminal (N) end to the carboxyl-terminal (C) end.Extracellular: In cell biology, molecular biology and related fields, the word extracellular (or sometimes extracellular space) means "outside the cell". This space is usually taken to be outside the plasma membranes, and occupied by fluid.Recombination (cosmology): In cosmology, recombination refers to the epoch at which charged electrons and protons first became bound to form electrically neutral hydrogen atoms.Note that the term recombination is a misnomer, considering that it represents the first time that electrically neutral hydrogen formed.ParaHox: The ParaHox gene cluster is an array of homeobox genes (involved in morphogenesis, the regulation of patterns of anatomical development) from the Gsx, Xlox (Pdx) and Cdx gene families.Gene duplication: Gene duplication (or chromosomal duplication or gene amplification) is a major mechanism through which new genetic material is generated during molecular evolution. It can be defined as any duplication of a region of DNA that contains a gene.Direct repeat: Direct repeats are a type of genetic sequence that consists of two or more repeats of a specific sequence.Mac OS X Server 1.0Composite transposon: A composite transposon is similar in function to simple transposons and Insertion Sequence (IS) elements in that it has protein coding DNA segments flanked by inverted, repeated sequences that can be recognized by transposase enzymes. A composite transposon, however, is flanked by two separate IS elements which may or may not be exact replicas.Haplogroup L0 (mtDNA)Silent mutation: Silent mutations are mutations in DNA that do not significantly alter the phenotype of the organism in which they occur. Silent mutations can occur in non-coding regions (outside of genes or within introns), or they may occur within exons.Ligation-independent cloning: Ligation-independent cloning (LIC) is a form of molecular cloning that is able to be performed without the use of restriction endonucleases or DNA ligase. This allows genes that have restriction sites to be cloned without worry of chopping up the insert.Horizontal gene transfer in evolutionEukaryotic transcription: Eukaryotic transcription is the elaborate process that eukaryotic cells use to copy genetic information stored in DNA into units of RNA replica. Gene transcription occurs in both eukaryotic and prokaryotic cells.Ty5 retrotransposon: The Ty5 is a type of retrotransposon native to the Saccharomyces cerevisiae organism.Sequence clustering: In bioinformatics, sequence clustering algorithms attempt to group biological sequences that are somehow related. The sequences can be either of genomic, "transcriptomic" (ESTs) or protein origin.Massive parallel sequencing: Massive parallel sequencing or massively parallel sequencing is any of several high-throughput approaches to DNA sequencing using the concept of massively parallel processing; it is also called next-generation sequencing (NGS) or second-generation sequencing. Some of these technologies emerged in 1994-1998 and became commercially available since 2005.Thermal cyclerClonal Selection Algorithm: In artificial immune systems, Clonal selection algorithms are a class of algorithms inspired by the clonal selection theory of acquired immunity that explains how B and T lymphocytes improve their response to antigens over time called affinity maturation. These algorithms focus on the Darwinian attributes of the theory where selection is inspired by the affinity of antigen-antibody interactions, reproduction is inspired by cell division, and variation is inspired by somatic hypermutation.PaleopolyploidyDNA condensation: DNA condensation refers to the process of compacting DNA molecules in vitro or in vivo. Mechanistic details of DNA packing are essential for its functioning in the process of gene regulation in living systems.Gene signature: A gene signature is a group of genes in a cell whose combined expression patternItadani H, Mizuarai S, Kotani H. Can systems biology understand pathway activation?Adjustable spannerTriparental mating: Triparental mating is a form of Bacterial conjugation where a conjugative plasmid present in one bacterial strain assists the transfer of a mobilizable plasmid present in a second bacterial strain into a third bacterial strain. Plasmids are introduced into bacteria for such purposes as transformation, cloning, or transposon mutagenesis.Internet organizations: This is a list of Internet organizations, or organizations that play or played a key role in the evolution of the Internet by developing recommendations, standards, and technology; deploying infrastructure and services; and addressing other major issues.Weedy rice: Weedy rice, also known as red rice, is a variety of rice (Oryza) that produces far fewer grains per plant than cultivated rice and is therefore considered a pest. The name "weedy rice" is used for all types and variations of rice which show some characteristic features of cultivated rice and grow as weeds in commercial rice fields.Premature chromosome condensation: Premature chromosome condensation (PCC) occurs in eukaryotic organisms when mitotic cells fuse with interphase cells. Chromatin, a substance that contains genetic material such as DNA, is normally found in a loose bundle inside a cell's nucleus.Ferric uptake regulator family: In molecular biology, the ferric uptake regulator (FUR) family of proteins includes metal ion uptake regulator proteins. These are responsible for controlling the intracellular concentration of iron in many bacteria.Intergenic region: An Intergenic region (IGR) is a stretch of DNA sequences located between genes. Intergenic regions are a subset of Noncoding DNA.Chromothripsis: Chromothripsis is the phenomenon by which up to thousands of clustered chromosomal rearrangements occur in a single event in localised and confined genomic regions in one or a few chromosomes, and is known to be involved in both cancer and congenital diseases. It occurs through one massive genomic rearrangement during a single catastrophic event in the cell's history.Nucleic acid structure: Nucleic acid structure refers to the structure of nucleic acids such as DNA and RNA. Chemically speaking, DNA and RNA are very similar.WGAViewer: WGAViewer is a bioinformatics software tool which is designed to visualize, annotate, and help interpret the results generated from a genome wide association study (GWAS). Alongside the P values of association, WGAViewer allows a researcher to visualize and consider other supporting evidence, such as the genomic context of the SNP, linkage disequilibrium (LD) with ungenotyped SNPs, gene expression database, and the evidence from other GWAS projects, when determining the potential importance of an individual SNP.Circular bacterial chromosome: A circular bacterial chromosome is a bacterial chromosome in the form of a molecule of circular DNA. Unlike the linear DNA of most eukaryotes, typical bacterial chromosomes are circular.Cellular microarray: A cellular microarray is a laboratory tool that allows for the multiplex interrogation of living cells on the surface of a solid support. The support, sometimes called a "chip", is spotted with varying materials, such as antibodies, proteins, or lipids, which can interact with the cells, leading to their capture on specific spots.DNA re-replication: DNA re-replication (or simply rereplication) is an undesirable and possibly fatal occurrence in eukaryotic cells in which the genome is replicated more than once per cell cycle. Rereplication is believed to lead to genomic instability and has been implicated in the pathologies of a variety of human cancers.Signature-tagged mutagenesis: Signature-tagged mutagenesis (STM) is a genetic technique used to study gene function. Recent advances in genome sequencing have allowed us to catalogue a large variety of organisms' genomes, but the function of the genes they contain is still largely unknown.Restriction fragment: A restriction fragment is a DNA fragment resulting from the cutting of a DNA strand by a restriction enzyme (restriction endonucleases), a process called restriction. Each restriction enzyme is highly specific, recognising a particular short DNA sequence, or restriction site, and cutting both DNA strands at specific points within this site.Genetic linkage: Genetic linkage is the tendency of alleles that are located close together on a chromosome to be inherited together during the meiosis phase of sexual reproduction. Genes whose loci are nearer to each other are less likely to be separated onto different chromatids during chromosomal crossover, and are therefore said to be genetically linked.Library (biology): In molecular biology, a library is a collection of DNA fragments that is stored and propagated in a population of micro-organisms through the process of molecular cloning. There are different types of DNA libraries, including cDNA libraries (formed from reverse-transcribed RNA), genomic libraries (formed from genomic DNA) and randomized mutant libraries (formed by de novo gene synthesis where alternative nucleotides or codons are incorporated).Copy number analysis: Copy number analysis usually refers to the process of analyzing data produced by a test for DNA copy number variation in patient's sample. Such analysis helps detect chromosomal copy number variation that may cause or may increase risks of various critical disorders.Codon Adaptation Index: The Codon Adaptation Index (CAI) is the most widespread technique for analyzing Codon usage bias. As opposed to other measures of codon usage bias, such as the 'effective number of codons' (Nc), which measure deviation from a uniform bias (null hypothesis), CAI measures the deviation of a given protein coding gene sequence with respect to a reference set of genes.CTXφ Bacteriophage: The CTXφ bacteriophage is a filamentous bacteriophage that contains the genetic material needed by the Vibrio cholerae bacterium for the production of cholera toxin, or CT. CTXφ is a positive virus with single-stranded DNA (ssDNA). (1/8470) Analysis of genomic integrity and p53-dependent G1 checkpoint in telomerase-induced extended-life-span human fibroblasts. Life span determination in normal human cells may be regulated by nucleoprotein structures called telomeres, the physical ends of eukaryotic chromosomes. Telomeres have been shown to be essential for chromosome stability and function and to shorten with each cell division in normal human cells in culture and with age in vivo. Reversal of telomere shortening by the forced expression of telomerase in normal cells has been shown to elongate telomeres and extend the replicative life span (H. Vaziri and S. Benchimol, Curr. Biol. 8:279-282, 1998; A. G. Bodnar et al., Science 279:349-352, 1998). Extension of the life span as a consequence of the functional inactivation of p53 is frequently associated with loss of genomic stability. Analysis of telomerase-induced extended-life-span fibroblast (TIELF) cells by G banding and spectral karyotyping indicated that forced extension of the life span by telomerase led to the transient formation of aberrant structures, which were subsequently resolved in higher passages. However, the p53-dependent G1 checkpoint was intact as assessed by functional activation of p53 protein in response to ionizing radiation and subsequent p53-mediated induction of p21(Waf1/Cip1/Sdi1). TIELF cells were not tumorigenic and had a normal DNA strand break rejoining activity and normal radiosensitivity in response to ionizing radiation.  (+info) (2/8470) An effective approach for analyzing "prefinished" genomic sequence data. (3/8470) High polymorphism level of genomic sequences flanking insertion sites of human endogenous retroviral long terminal repeats. The polymorphism at the multitude of loci adjacent to human endogenous retrovirus long terminal repeats (LTRs) was analyzed by a technique for whole genome differential display based on the PCR suppression effect that provides selective amplification and display of genomic sequences flanking interspersed repeated elements. This strategy is simple, target-specific, requires a small amount of DNA and provides reproducible and highly informative data. The average frequency of polymorphism observed in the vicinity of the LTR insertion sites was found to be about 12%. The high incidence of polymorphism within the LTR flanks together with the frequent location of LTRs near genes makes the LTR loci a useful source of polymorphic markers for gene mapping.  (+info) (4/8470) Search for retroviral related DNA polymorphisms using RAPD PCR in schizophrenia. Random amplification of polymorphic DNA (RAPD) is widely used to detect polymorphisms in many organisms. Individual (or strain) specific amplified bands are generated with single or pairs of primers in PCR reactions and can serve as genetic markers. We have used this method to generate a large number of reproducible bands with single primers, random and retroviral related, on 92 human DNA samples. Theoretically, RAPD PCR presents a logical approach for assessing variability among individuals. We used ten retroviral related primers (12, 20 and 22 bp) and eight random primers (10 bp) to assess individual differences in the context of testing the retroviral hypothesis for schizophrenia. Three pairs of discordant monozygotic twins, four pairs of discordant full sibs and 53 schizophrenic individuals with 25 of their unrelated matched controls were analyzed. Ten of these primers resulted in a total of approx. 850 amplified bands (65-110 bands per primer). Almost all of these bands were identical among each individual analyzed. However, the results are inconclusive with respect to the retroviral hypothesis for schizophrenia. The general lack of RAPD polymorphism in this study may argue for mechanisms other than rearrangements such as inversions, associated with the evolution of the human genome.  (+info) (5/8470) Identification of a novel activation-inducible protein of the tumor necrosis factor receptor superfamily and its ligand. Among members of the tumor necrosis factor receptor (TNFR) superfamily, 4-1BB, CD27, and glucocorticoid-induced tumor necrosis factor receptor family-related gene (GITR) share a striking homology in the cytoplasmic domain. Here we report the identification of a new member, activation-inducible TNFR family member (AITR), which belongs to this subfamily, and its ligand. The receptor is expressed in lymph node and peripheral blood leukocytes, and its expression is up-regulated in human peripheral mononuclear cells mainly after stimulation with anti-CD3/CD28 monoclonal antibodies or phorbol 12-myristate 13-acetate/ionomycin. AITR associates with TRAF1 (TNF receptor-associated factor 1), TRAF2, and TRAF3, and induces nuclear factor (NF)-kappaB activation via TRAF2. The ligand for AITR (AITRL) was found to be an undescribed member of the TNF family, which is expressed in endothelial cells. Thus, AITR and AITRL seem to be important for interactions between activated T lymphocytes and endothelial cells.  (+info) (6/8470) A previously undescribed intron and extensive 5' upstream sequence, but not Phox2a-mediated transactivation, are necessary for high level cell type-specific expression of the human norepinephrine transporter gene. The synaptic action of norepinephrine is terminated by NaCl-dependent uptake into presynaptic noradrenergic nerve endings, mediated by the norepinephrine transporter (NET). NET is expressed only in neuronal tissues that synthesize and secrete norepinephrine and in most cases is co-expressed with the norepinephrine-synthetic enzyme dopamine beta-hydroxylase (DBH). To understand the molecular mechanisms regulating human NET (hNET) gene expression, we isolated and characterized an hNET genomic clone encompassing approximately 9. 5 kilobase pairs of the 5' upstream promoter region. Here we demonstrate that the hNET gene contains an as-yet-unidentified intron of 476 base pairs within the 5'-untranslated region. Furthermore, both primer extension and 5'-rapid amplification of cDNA ends analyses identified multiple transcription start sites from mRNAs expressed only in NET-expressing cell lines. The start sites clustered in two subdomains, each preceded by a TATA-like sequence motif. As expected for mature mRNAs, transcripts from most of these sites each contained an additional G residue at the 5' position. Together, the data strongly support the authenticity of these sites as the transcriptional start sites of hNET. We assembled hNET-chloramphenicol acetyltransferase reporter constructs containing different lengths of hNET 5' sequence in the presence or the absence of the first intron. Transient transfection assays indicated that the combination of the 5' upstream sequence and the first intron supported the highest level of noradrenergic cell-specific transcription. Forced expression of the paired-like homeodomain transcription factor Phox2a did not affect hNET promoter activity in NET-negative cell lines, in marked contrast to its effect on a DBH-chloramphenicol acetyltransferase reporter construct. Together with our previous studies suggesting a critical role of Phox2a for noradrenergic-specific expression of the DBH gene, these data support a model in which distinct, or partially distinct, molecular mechanisms regulate cell-specific expression of the NET and DBH genes.  (+info) (7/8470) The ancestry of a sample of sequences subject to recombination. In this article we discuss the ancestry of sequences sampled from the coalescent with recombination with constant population size 2N. We have studied a number of variables based on simulations of sample histories, and some analytical results are derived. Consider the leftmost nucleotide in the sequences. We show that the number of nucleotides sharing a most recent common ancestor (MRCA) with the leftmost nucleotide is approximately log(1 + 4N Lr)/4Nr when two sequences are compared, where L denotes sequence length in nucleotides, and r the recombination rate between any two neighboring nucleotides per generation. For larger samples, the number of nucleotides sharing MRCA with the leftmost nucleotide decreases and becomes almost independent of 4N Lr. Further, we show that a segment of the sequences sharing a MRCA consists in mean of 3/8Nr nucleotides, when two sequences are compared, and that this decreases toward 1/4Nr nucleotides when the whole population is sampled. A measure of the correlation between the genealogies of two nucleotides on two sequences is introduced. We show analytically that even when the nucleotides are separated by a large genetic distance, but share MRCA, the genealogies will show only little correlation. This is surprising, because the time until the two nucleotides shared MRCA is reciprocal to the genetic distance. Using simulations, the mean time until all positions in the sample have found a MRCA increases logarithmically with increasing sequence length and is considerably lower than a theoretically predicted upper bound. On the basis of simulations, it turns out that important properties of the coalescent with recombinations of the whole population are reflected in the properties of a sample of low size.  (+info) Genomic DNA libraries were screened for the human histidine-rich glycoprotein (HRG) gene and a sequence of 15,499 nucleotides was determined. The gene is composed of 7 exons and 6 introns, and all the exon-intron boundaries match the consensus GT/AG sequence for donor and acceptor splice sites. Each of cystatin-like domains I and II of HRG is encoded by three exons, exons I to III and exons IV to VI, respectively, like those of other members of the cystatin superfamily. The entire C-terminal half of the molecule is encoded by the largest exon, VII. The first 103 nucleotides of the cDNA sequence reported for human HRG [Koide, T., Foster, D., Yoshitake, S. , and Davie, E.W. (1986) Biochemistry 25, 2220-2225] could not be found in the determined gene sequence. A homology search of this sequence against a database showed the complete matching to a part of the yeast mitochondrial DNA encoding 21S ribosomal RNA. Rapid amplification of cDNA 5' ends (5'-RACE) analysis revealed that the cDNA has multiple 5'-ends and that a possible starting point is nucleotide 104 of the reported cDNA sequence. These results suggest that the first 103 nucleotides of the cDNA sequence reported for human HRG originated from yeast mitochondrial DNA and were incidentally incorporated into the HRG cDNA in the process of the construction of a cDNA library. Various fragments obtained on restriction endonuclease digestion of the 5'-noncoding region of the HRG gene were ligated to the chloramphenicol acetyltransferase (CAT) gene and then transfected into HepG2 and 293 cells to analyze the promoter activity. The sequence between -262 and -21 from the putative translation initiation site supported the expression of CAT in HepG2 cells but not in 293 cells, suggesting that this segment promotes the liver-specific transcription of the human HRG gene.  (+info)
global_01_local_1_shard_00001926_processed.jsonl/55644
LUCKSTOCK.COM - Royalty Free Music and Audio Marketplace LUCKSTOCK.COM - Royalty Free Music and Audio Marketplace - Hear Your Success 108,954 Royalty Free Music & Audio 0 Cart Debussy Piano Suite Bergamasque, L. 75, No. 3. Moonlight (4:16) Note: You're listening to low quality watermarked preview. Claude Debussy’s “Clair de lune” (“Moonlight”) constitutes the third and most famous movement of his popular piano suite “Suite bergamasque.” In D flat major and marked “andante très expressif,” it is played mostly pianissimo. Musically, Debussy’s “Clair de lune” belongs to French Impressionism. More items by GarsuMene
global_01_local_1_shard_00001926_processed.jsonl/55647
The Worst Thing Ever Put In Orbit I wrote about the 5 coolest inanimate objects in orbit you might not have heard of, because when I found out about the Space Disco Balls of Science I had no choice in the matter. Orbital Orb of Awesome Orbital Orb of Awesome Someone asked why I didn’t include the Salyut-3/Almaz 2 station’s 35 mm Nudelman machine gun. The first reason is that the only sources for the gun are Wikipedia, fan pages, and mentions in a book which doesn’t have any references. Which is to say, there are no sources at all. A Wikipedia article without numbers in little square brackets is like a gun without any bullets: trying to use it in public will make you look stupid, get you in trouble, and you will lose any resulting fight very badly. The second reason is that if it is true, it’s the most depressing thing I’ve ever heard. The “self-defense” gun was allegedly bolted into place along the space station’s axis. Meaning the entire station had to be reoriented to aim. So if you wanted to shoot someone, they had to co-operate almost as much as if they were docking with you. And anyone who knows what the hell they’re doing with orbital attack will just have fired a cloud of shrapnel to pepper your orbit. You might as well try to shoot gravity to stop it from slamming things into you at orbital velocity. Even firing the gun apparently vibrated the station so violently it was forbidden while people were actually in it. Then there’s recoil, meaning that your “self-defence” weapon was obscenely expensive to install, wouldn’t work, and its only function would be to kill the people it claimed to protect. Making the space gun the ultimate analogy for cold war weaponry. There are apparently real Russian guns in space, kept in locked containers in any Soyuz capsules – like the one connected to the International Space Station. They’re intended to defend the crew from wild animals in case of an off-course landing in a remote area. It’s sort of wonderful: a gun actually used as an intelligent tool by highly-trained specialists. When you crash-land in bear country, you’ve just used your enhanced brain to survive space itself as well as punching through an entire atmosphere: you’re damned if you’re going to let nature kill you now. That’s the gun as physical intelligence projector. “Keep away, bear, for I am smarter than you.” The unexpected part is that, of all countries, the US doesn’t let their astronauts have guns. Any random citizen who can keep the voices quiet long enough to show ID? No problem, please insert your VISA card and pick up your hundred bullets. Astronauts, the most rigorously trained and selected people in the country? Have a machete. That’s just going to make the the leverage and cutting-implement stats look better on the bear’s mauling card. You don’t go up against a few hundred kilos of pure carnivore in a sharpened-leverage fight. When you’ve used a few hundred tons of propellant to get back into orbit, a few more grams is a sensible way to make sure your next great adventure isn’t through a Ursidaen alimentary canal. The thinking is that you don’t want a device which could kill everyone in a space station. Because we all know that guns have a completely different function on the ground. It’s just odd to think that the smartest gun on the planet usually isn’t. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/55650
Friday, 20 March 2015 Israel: the Millwall of the Middle East Imagine it's election day, and the prime minister posts a video message on his Facebook page. "The government is in danger," he says. "The blacks are voting in droves." I imagine you'd be shocked. I know I would be. Yet that, with just one word changed, is what the Israeli prime minister Benjamin Netanyahu said on Tuesday. (He said "Arabs" rather than "blacks".) About 20 per cent of Israeli citizens are Arab, and, in theory, they have exactly the same democratic rights as Jewish Israelis. In practice, it's rather different -- no Arab political party has ever, in all of Israel's nearly 67 years of existence, been included in any of its countless, kaleidoscopic coalition governments. It's something worth remembering the next time you hear an Israeli spokesman boasting that Israel is the only democracy in the Middle East. The sad fact is that sometimes Israel looks about as democratic as the southern states of the US did in the days before Selma and the civil rights protests. True, it's still more democratic than most of its neighbours. Even so, the desperate measures that Mr Netanyahu went to to achieve his election victory this week were a shock even to jaded old Middle East observers like me. By re-electing him as prime minister at the head of a right-wing coalition, Israeli voters look more than ever as if they have chosen to model themselves on the English football club Millwall, whose supporters' best known chant at matches is "No one likes us, we don't care." It is not difficult to understand why Israelis seem so unconcerned at their reputation among non-Israelis. Those from a European background remember the 19th century pogroms and the Nazi holocaust. Those whose families came from Arab countries remember the anti-Semitism and expulsions following the establishment of the Israeli state in 1948. Zionism is based largely on the belief that Jews can be truly safe only in a state of their own, reliant on themselves. A strong Israel in a dangerous region is central to Israelis' self-image. And if that means losing friends, so be it. But it raises an important question. Can a state be truly safe if it has no friends or allies on whom it can rely in times of danger? If Mr Netanyahu really has burned his bridges with Washington (and there are already signs that he's hoping to repair some of the pre-election damage), then is there anyone left to whom Israel can turn? The veteran Israeli peace activist Gershon Baskin wrote in the Jerusalem Post: "Israel is now firmly on the road to almost total international isolation. Israel is now going to find itself in deep conflict with 21 percent of its citizens – the Palestinian Arab minority who … will face the most racist, anti-Arab government Israel has ever had." Even two years ago, when Israel's diplomatic relations were still in better shape than they are today, the only major government that voted with the US and Israel to oppose the recognition of Palestine as a non-member observer state at the United Nations was Canada. (The others were the Czech Republic, Panama, Palau, Marshall Islands, Micronesia and Nauru.)   And last year, in the BBC's annual country ratings poll, in which more than 24,000 people in 24 countries were asked to rate countries according to how favourably they view them, Israel came fourth from bottom, ranking just above Pakistan, North Korea and Iran. Many Israelis see their growing isolation as a result of growing anti-Semitism. They blame Arab and Muslim immigrants in Europe for a visceral hatred of Jews. Why is it, they wonder, that when anti-Israel protests are held in European capitals, so many of the protesters are Arab? But you can turn that question on its head. After all, why did Mr Netanyahu feel that he needed to warn his supporters that Israel's Arab citizens were voting in droves last Tuesday? And why, after every attack by a Palestinian extremist, do Jewish Israelis take to the streets and chant "Death to the Arabs"? Visceral hatred is a two-way street. Some Palestinian commentators have welcomed the Netanyahu victory on the grounds that it's now easier for them to argue that Israel is being seen in its true colours. On the eve of the election, Mr Netanyahu ruled out the idea of a two-state solution to the Israel-Palestine conflict -- and even if he started to row back as soon as victory was in the bag, few will doubt where his heart really lies. A substantial number of Israelis are convinced that they can survive perfectly well even if the rest of the world shuns them. They have a nuclear weapons capability, the strongest military in the region and some of the most sophisticated military hardware anywhere on earth. Who needs friends when you're that strong? And in any case, they will tell you, no one has ever liked the Jews. "Better they don't like us when we're strong than when we're weak. We know only too well where being weak leads." It's a short-sighted view, and it's dangerous. But it's not incomprehensible. The challenge for the rest of the world, and in particular for the Palestinians, is to find a way to allay the fears and encourage more Israelis to put their faith once again in dialogue. It won't be easy -- but a lot depends on it. It's not as if the Middle East wasn't dangerous enough already. No comments:
global_01_local_1_shard_00001926_processed.jsonl/55667
Funny Quotes To Make You Laugh 640Kb ought to be enough for anybody. Bill Gates Computer Scan Knock Out Go to Heaven for the climate, Hell for the company. Mark Twain Funny Quotes To Make You Laugh george carlin Horse sense is the thing a horse has which keeps it from betting on people. W. C. Fields Horse Laugh
global_01_local_1_shard_00001926_processed.jsonl/55669
10 Good Reasons to Make Continuing Education a Priority President John F. Kennedy once said, “leadership and learning are indispensable to each other.”  We’d agree. If you want to become an effective leader in the cleaning industry, you can’t stop learning. It doesn’t matter if you work as a janitor, custodial manager, distributor sales representative or in the research and development for an industry supplier. The minute we stop learning, we stop evolving.  This week, we’re holding our (OS1) Coach class, which is a professional development program that helps coaches and trainers using the (OS1) to plan their training schedule, and design, budget and operate a world-class training program. It got us thinking about professional development opportunities and how important it is to our careers. Studies show that organizations that invest in professional development opportunities for their employees are often higher performing. According to the Talent Development’s 2014 State of the Industry Report, organizations spend an average of $1208 per employee on training and development. This number increases for companies with fewer than 500 workers, amounting to an average of $1,888 per employee.  While your company might have specific requirements for what constitutes a reimbursable professional development course, we shouldn’t dismiss educational opportunities outside of the industry. For example, a course on customer service or management will likely provide you with ideas to improve these areas in your organization. And while there’s nothing wrong with distributor-led training in most cases, that’s not what we’re talking about here. Whether or not your organization supports your professional development, here is a list of the top 10 reasons why you should look into set continuing education goals for yourself, if you haven’t already.  1. It can give you new skills. While this is one of the more obvious reasons, it’s often taken for granted. Technology is continually changing the way we live and work; we can always learn new skills and processes to become better leaders or improve the way we do things.  1. It helps push you out of your comfort zone. When was the last time you walked into a room where you knew no one? What about the last time you did something you’ve never done before? If you’re not pushing yourself out of your comfort zone, you might be missing out on great opportunities.  1. You can refresh your knowledge. When you first started working in the custodial department, maybe you earned a certification or attended classes. But after awhile, if you’re not actively using it, a lot of that knowledge—pH scale, anyone?—could use a refresher.  1. It helps you stay on the top of your game. Maybe you’re not the type of person who is regularly reading the latest business book, but if you’re relying on a sales person to be your source of what’s new, you may want to rethink that strategy. 1. It gives you confidence. As the adage goes, knowledge is power. When you learn something new, it gives you information you can share with others and makes you feel better about yourself.  1. You can meet new people and expand your network. Recently I enrolled in an online educational course and I was amazed by the number of people across the world who were also looking to become better communicators. Some of these people don’t live far from me, and we’ll likely meet up at some point.  1. It can help you better protect workers and building occupants. Better cleaning programs make for healthier indoor environments. When you and your staff use best practices for cleaning, everyone wins. 1. You’ll better position yourself for professional advancements. Go-getters are the ones move up. Keep a file of your ongoing education and successes so you can share them when it’s your time to take the stage.  1. It’s invigorating! If work is starting to feel a little monotonous, attending a professional development class can help re-energize you and your staff. It can also help provide new ideas and offer a new perspective on your business. 1. It sets a good example for others on your team. When you take the time to expand your knowledge, it helps encourage others to pursue similar opportunities. This ultimately benefits the entire organization.
global_01_local_1_shard_00001926_processed.jsonl/55707
One of the virtues of TV … November 4, 2008 10% of our brains, eh? October 21, 2008 I love Greg Dean’s webcomic, Real Life.  It has some moments of true hilarity in it, and I find the characters enjoyable enough that I’m thrilled to see each new comic pop up in my RSS feeds.  But today’s comic contains a howler which I just can’t let pass. If you don’t want to go read it, the fun is in the final panel where one of the characters says “Hey, it’s not like you were using the other 90% of your brain anyway.” Now, if you’re literate about neuroscience in any way, this will immediately strike you as stupid;  the myth about human beings using only 10% of their brains is wrong, and that’s been known for decades.  But to be honest, I could have let this go and just read the comic, until I came across a posting in the Real Life Forums by Greg himself, as part of an exchange with another person who commented on this problem: Kovac wrote:gaghWhy would you contribute to the myth that humans only use 10% of our brains? It is for the purpose of a joke, but it just isnt worth it x Allow me to quote Scientific American, so you foreigners can quit being such dicks about it. (Seriously, I’ve recieved another e-mail from someone else today telling us Americans to quit being so ignorant. Is this just a pet peeve of everyone on the other side of an ocean from us, or something?)Anyway, as I was saying: Scientific American wrote:Another mystery hidden within our crinkled cortices is that out of all the brain’s cells, only 10 percent are neurons; the other 90 percent are glial cells, which encapsulate and support neurons, but whose function remains largely unknown. Ultimately, it’s not that we use 10 percent of our brains, merely that we only understand about 10 percent of how it functions. NOW. While I will grant you that the concept that “we only use 10% of our brains” is silly, it’s also been used for DECADES as the basis for a lot of fun “what-if” style storytelling. Powder and Phenomenon are two excellent movies that come to mind which deal specifically with this idea. So, I think what I’m saying is, quit being such a fucktard about something so INSIGNIFICANTLY POINTLESS as this, and just try to enjoy the fucking comic.  I’m sorry if I’m getting a little on the offensive here, but this pedantic bullshit just pisses me off. Especially when it’s passed off in the guise of “Gee, you Americans sure are stupid.” (I know you didn’t do that specifically, but that was the tone of the other e-mail I recieved, and it stuck in my craw a little.) Uh, wow. Here’s a couple of points in response, Greg: • Really – you’re going to base your argument on the past usage of science in media?  Seen a lot of 50-foot tall women in the talkies lately?  How about books about a guy who goes to the moon by being shot out of a cannon?  Even Marvel is smart enough to keep up with advances in our knowledge, if you’ve seen the re-write of the Spider-man origin in the Ultimates universe (from a radioactive spider to a genetically altered one). • To people who don’t know any better, you’re propagating the idea that there is some locked-away 90% of our brain that would turn us into magical super-heroes if we could only access it.  This is a lie, Greg, and it is part of a real issue;  scientific literacy in the United States, where you’re from, is shockingly low. This makes you part of the problem. Scientists like me struggle every day to correct the misconceptions of science in the public’s view, so you’ll have to forgive us if hearing that we should just shut our yap – because you’re too lazy to come up with a plot point that doesn’t depend upon a thoroughly discredited idea from well over a century ago – is a problem for us.  And if it’s such an insignificant point (as you say to us ‘fucktards’), why can’t you just get it right? Oh, and Greg, as for your quoting of the Scientific American article:  way to cherry-pick.  The “ultimately we only understand 10% of how it functions” bit is a rhetorical closing at the end of the article.  I prefer this quote from the middle of the piece: Adding to that mystery is the contention that humans “only” employ 10 percent of their brain. If only regular folk could tap that other 90 percent, they too could become savants who remember π to the twenty-thousandth decimal place or perhaps even have telekinetic powers. Though an alluring idea, the “10 percent myth” is so wrong it is almost laughable, says neurologist Barry Gordon at Johns Hopkins School of Medicine in Baltimore. Although there’s no definitive culprit to pin the blame on for starting this legend, the notion has been linked to the American psychologist and author William James, who argued in The Energies of Men that “We are making use of only a small part of our possible mental and physical resources.” It’s also been associated with to Albert Einstein, who supposedly used it to explain his cosmic towering intellect. Emphasis mine.  Or how about this one, from the same article? Although it’s true that at any given moment all of the brain’s regions are not concurrently firing, brain researchers using imaging technology have shown that, like the body’s muscles, most are continually active over a 24-hour period. “Evidence would show over a day you use 100 percent of the brain,” says John Henley, a neurologist at the Mayo Clinic in Rochester, Minn. Even in sleep, areas such as the frontal cortex, which controls things like higher level thinking and self-awareness, or the somatosensory areas, which help people sense their surroundings, are active, Henley explains. p.s. Greg, I’m Canadian, not American, so consider my pedantry  to be a message from your own side of the ocean. Where are the NDP on science? October 5, 2008 I’ve been paying attention to Canadian politics as I look forward to exercising my democratic rights ina couple of weeks.  I’ve never been seriously interested in the NDP, for the simple reason that they never seemed to be in a position to take power, but with the Liberals melting down in the polls recently, I’ve come to view the NDP as a serious contender for (at least) the opposition.  Since I would normally vote Liberal, this now leaves me pondering my choices more carefully. To help figure out what I’m going to do, I sat down tonight to review the platforms of both the Liberals and the NDP.  Mr. Layton’s was interesting, with many ideas on important issues like climate change, the economy, and so on.  But if you’ve read this blog for any time at all, you’ll know that I’m a Ph.D student in Biology, and that science is very important to me.  So what is the NDP stance on science and scientific research in Canada, you ask? Beats me. The NDP platform is weirdly vague to begin with.  But doing a search through the document reveals a single mention of the word “science”, and that’s in regards to climate-change.  Searching for “research” leads to such vague platitudes as: [we will…]  Encourage the best young minds to stay here in Canada by increasing funding for university and college-based research, and for graduate and post-graduate studies. [we will…] Introduce measures to ensure that new drugs are evaluated through evidence-based research to be more effective, before they are prescribed by doctors and paid for by Canadians. [we will…] Work with the provinces and territories to encourage research and develop strategies to minimize the effects of climate change on communities, vegetation and wildlife. Stop the hollowing out of Canadian industries by strengthening the Investment Canada Act. Foreign takeovers of Canadian companies will be subject to more stringent tests respecting job protection and creation, head office location, and the promotion of research and development in Canada. That’s literally every mention of the word “research” in the NDP platform (and every single mention of “university” as well, come right down to it), yielding not a single concrete item on the matter.  Contrast that with this section of the Liberal platform: A Liberal government will increase support for the indirect costs of university-based research to $500 million a year, which at full implementation will represent a more than 50 percent increase over current levels. For researchers and graduate students, a Liberal government will increase the budgets of the three granting councils by 34 percent over four years.  Support for the Canadian Institutes of Health Research (CIHR) and the Natural Sciences and Engineering Research Council (NSERC) will both increase to $1.275 billion a year from the current levels of $960 million.  Funding for the Social Sciences and Humanities Council (SSHRC) will be increased to $450 million a year from the current level of $320 million. We will also create an Interdisciplinary Sustainability Fund of $100 million.  This Fund will be available to scientists, researchers and graduate students for projects that reach beyond the barriers of their discipline.  Interdisciplinary research is the way of the future.   It is how we will address complex scientific challenges – like adaptation to the climate change crisis – that affect our economy and our society. government will increase the budgets of the three granting councils by 34 percent. You see, now there’s a set of hard targets that I can vote on.  Seeing as I’m funded (well, I *hope to be* funded) by NSERC, knowing that the Liberals would increase their budget is useful information.  Since NSERC and its sister agencies fund much of the public scientific research in Canada, this is a sign that the Liberals would take basic and applied science seriously. But the NDP?  I have no idea what they would do.  They’re going to “encourage the best minds”?  How?  I might be interested in voting NDP, but I just really need to know more than this big steaming pile of nothing that I’ve got before me right now.  Jack Layon, or one of your supporters, if you’re reading this:  help a guy out.  Help me vote for you.  Explain what the hell you’re talking about. In defence of accuracy (Science on TV). October 2, 2008 I have to admit it:  I’m a tab collector.  Despite my best intentions, and productivity be damned, I inevitably find myself surfing my RSS feeds, popping open new tabs for interesting looking stories, and then winding up doing something else and forgetting about the tabs until I wonder why Firefox takes twenty minutes to come to the foreground.  Which is why I just got around to reading Jennifer Ouellette’s fantastic post about science on prime-time television, and also explains why I’m just getting around to forming my thoughts on her argument. I urge you to read her post first – she’s the kind of writer I wish I could be, and reading her material is a treat of itself – but if you can’t spare the time, she summed things up in a comment near the bottom: Stripped of excess verbiage above, my argument is this: 1. TV is quite possibly the most powerful communication medium in modern American society. 2. Anyone who is interested in broad communication to the general public ignores TV at their peril. 3. There is an unprecedented demand for science-themed shows right now, and hence a corresponding need for scientists to serve as technical consultants or participate in other efforts to better acquaint Hollywood with what “real” science looks like. 4. This is made more difficult by an enormous cultural gap between the two worlds: there is fear and distrust of science in Hollywood, and often open disdain by scientists towards mainstream TV, which writers and producers naturally find alienating and irksome. 5. We need more exchanges between the two worlds, and a shift in attitude on both sides, or we will lose an excellent opportunity. This argument, alone, is one that I find convincing.  I’m happy that science is finding a place in the schedules of prime-time programming, though I won’t be too terribly surprised if we’re back to nothing but Survivor-clones when the networks over-use the “science show” idea and the public’s fancy shifts again.  Yet along the way to making this argument stick, Jennifer ends up saying two things that bother me somewhat, and I wish to address those points with my own thoughts. First, she suggests that accuracy is less important than the popularization of science itself (reminiscent of the “framing” arguments which have stirred up so much trouble in the sciblogosphere): True story: a year ago, I met one of the writers for Bones at Grae’s birthday party. He was initially pleased to find that I really was a fan of the show, and not just being polite. (I knew all the characters and plot twists — a dead giveaway.) But when I mentioned I was a science writer, he suddenly became guarded and defensive: “Yeah, yeah, I know, we take liberties with the science, DNA test results never come back that fast….” I reassured him that I wasn’t one of those sorts who compulsively nitpick the writers to death, and he relaxed a little. But the exchange saddened me a little. Here was this very smart, really nice guy who loves his work and finds the scientific elements fascinating. Yet his personal encounters with actual scientists have been unilaterally negative and alienating — so much so, that he physically recoiled upon first learning about my science writing credentials. That has to change, or the cultural gap will just continue to widen. I sympathize with the writer who has run into prickly scientists.  Yet I would maintain that a higher level of accuracy is necessary on science-based dramas, for reasons both practical and philosophical.  Practically, a lack of accuracy leads to things like the by-now-well-known CSI effect, where people have come to expect things of forensic science that are simply not feasible or practical (like the seemingly 8-second DNA analysis and database search that they routinely employ on that show).  Responses to this problem typically fall into the “poetic license” category or employ the “sure, but we need to focus on communication over accuracy” argument as Jennifer obliquely makes in the quoted section above, but these responses ignore the real problems that a public misperception of what science can do may lead to (as a prosecutor frustrated by a jury demanding DNA evidence for a simply break-and-enter might attest to), and they also ignore the fact that it is possible to do both accuracy and entertainment.  There are shows that are true to the science;  as Jennifer notes, The Big Bang Theory has a realistic image of the science and the environment of science itself, and Numb3rs is great for focusing on real mathematics.  Writers of science-y shows might do well to learn from Law & Order, which (as I have been told by people involved in law enforcement) presents the best depiction of the real process of justice that is on television, even if it glosses over the more repetitive aspects. The related philosophical problem with Jennifer’s statement above extends past the purely practical problem of the CSI effect and into the “science is magic” problem.  Jennifer criticizes Fringe for flirting with the “science is magic” viewpoint, but doesn’t really take this to its logical conclusion even as she notes the most important part when she says: Uh, no. That is not what science is about; it’s what science fiction is about. I love both, but let’s not confuse the two. She’s right: that’s not what science is about.  But when shows like CSI or Bones play fast and loose with the process of science and how the world actually works, they actually contribute to the problem not because they are science fiction, but because they’re not science fiction.  Science fiction is actually easier, because people can clearly distinguish between science fiction and real science.  When the Doctor says that he is going to “reverse the polarity of the neutron flow”, or when someone’s pattern is stuck in a transporter buffer on Star Trek, most people can easily realize that science as we know it does not allows us to do these things.  If NASA could suddenly achieve faster-than-light travel, people would be rightly shocked!  But though viewers can readily distinguish science from science fiction, they likely have a harder time distinguishing science on television from science in reality.  When the television presents a contemporary drama with science as an important element, the portrayal of science in that show can become the only exposure that people have to the science in question, and thus shapes their view of what science can actually do.  I don’t mean this in a pomo, constructivist-reality sort of way, but in a much more real and troubling this may be the only time that these viewers are ever going to see how this works way.  As Jennifer notes, television is one of the most important mediums of communication in our society today, and the chance that people see a show like Bones is a lot greater than the chance that they sit through a documentary on forensic anthropology on the Discovery channel.  Given that, how can we not hold these dramas to a higher standard?  Jennifer says that we shouldn’t: Many scientists I encounter seem to incorrectly think that the scientific details are all that matter. While those are important for lending verisimilitude — particularly for procedural dramas like C.S.I., Bones, or House — network television isn’t an educational vehicle. Hollywood’s purpose is not to teach viewers about science, and TV shows are not documentaries, and should not be held to the same exacting standards — although the two are not necessarily mutually exclusive, provided both sides are willing to compromise a little. Good television is ultimately about igniting the imagination with a truly kick ass story. If we can enhance the appreciation of science (and by extension, scientists) in the bargain, so much the better, but that is not the industry objective. But this paragraph relies on an argument that goes like this: If we create television shows that employ “lies to children” but spark people’s imaginations, they will go out and learn the real story, and we will have a more educated public. It is this argument that I reject as unlikely and even dangerous.  Sure, some small proportion of people may go on to have great careers in science or even just learn more in science because of some great drama they watched on television, but the vast majority of people will go no further than their TiVo.  If this is to be their only exposure to these concepts, what do we expect to happen when they are on a jury, or on a school board voting about science eduction, or voting for presidents and prime ministers who will shape science and education policy?  Jennifer is right in that the networks don’t care about this sort of thing, but to suggest that scientists should just give up and go along with it simply to get air-time is, to my mind, irresponsible and ultimately self-defeating. The second issue that I have with her argument revolves around the depiction of scientists themselves.  Let’s see what she has to say: Monday night was the season premiere of last year’s breakout sitcom, The Big Bang Theory, which proved to be something of a lightning rod for controversy when it debuted last year, at least within the physics community. (My own take in Symmetry magazine can be found here.) Normally, scientists content themselves with nitpicking various aspects of the science in movies and TV shows, but in this case, the science is largely correct, thanks to the efforts of technical consultant David Saltzberg, a physicist at UCLA. So most of the complaints about TBBT have been of the “negative stereotype” variety. As I’ve said before, such criticisms might have an element of truth but they are entirely missing the point: these characters appeal to viewers. They are likable just the way they are, and that is a Good Thing for Physics. If the goal is to make physicists feel good about themselves, then okay, maybe this isn’t the best approach. But if the goal is make physics and physicists more palatable to the general public and win their hearts and minds, these characters are fantastic ambassadors. I vote for the latter. Actually, I’ve used this quote only as a starting point, because I agree with the substance of her argument above (and the argument she advances in a post she links to here) about scientists taking their portrayals too seriously;  no comedy (and few dramas, for that matter), get very far depicting characters who are entirely realistic.  But my problem isn’t with “negative” stereotypes, but rather “positive” ones.  I’ve talked about this before, but shows like The Big Bang Theory, CSI, Bones, Numb3rs, and so on all depict scientists unrealistically as incredibly brilliant people who know just about everything and rarely make mistakes.  This contirbutes to the “science as magic” problem by showing us “scientists as magicians”.  Here we are effectively told that the only people who do science are super-geniuses with an encyclopedic knowledge of everything in their field and in some cases of things way outside it, who can whip up science in a second and come up with answers to just about any problem.  Even one of my favourite characters, Charlie Epps from Numb3rs is guilty of this:  though the methods he uses are real and the techniques are sound, he does the work of a dozen people!  Any practicing scientist knows that science is a team game now because it’s impossible to be a polymath any more;  the days of a single person contributing to physics, chemistry, and biology before lunch and rounding things off with a few contributions to mathematics before tea are gone, and it’s increasingly difficult for people to keep up with the tiny corners of the scientific literature that they inhabit themselves. Yet as intimidating as these characters are to someone like me, who is a scientist and who actually works at this sort of thing, imagine what they look like to someone sitting on their couch at home.  How can we expect to attract people to science if we present nothing but these images of super-people at the lab bench?  Again, we can look back to Bones.  The lead character, Temperance Brennan, is a genius anthropologist, but her assistant is even worse:  a child prodigy, a genius with an IQ of 160+ and packing a “photographic memory” (grrr), yet he always seems to be stumbling behind Brennan (at least in the first season, which is all that I’ve watched so far).  If someone like him can’t keep up with the lead character, how can anyone in the audience picture themselves being motivated to become scientists themselves or even spend any time learning more about science?  Characters like this present such an incredibly high barrier to entry that it seems futile to even try! Again, the common response to my objections about this is that people either know the difference between fictional depictions of scientists and real scientists, or that the shows will “spark their imagination”, and they’ll flock to the lab for the drama and stay for the science.  And sure, enrollments in forensic science classes surged after CSI became popular.  But if you ask a person on the street if they could see themselves learning anything about the science of physics, or mathematics, or chemistry, or biology, you’ll most often get a self-deprecating laugh and refusal, or a blank stare.  And this is how we’re going to create greater appreciation of science, by portraying scientists as super-men and women who are something Other?  These are the ambassadors that Jennifer speaks of?  It does us no good to win the hearts and minds of people if we’re winning them with the scientific equivalent of demi-gods.[1] Actually, this is something that I’m sure many other academics and practicing scientists have run into:  mentioning science, or physics, or – God help you – math to someone who isn’t a science person turns your occupation into something untouchable, something to be placed on a pedestal and admired from afar, despite your best efforts to have a normal conversation with the person in question.  And I submit to you that the depictions of scientists on television are a contributing factor for this problem, and that these depictions are something that scientists should be concerned about.  I’m all for the need to show heroes on television, but maybe we could take Numb3rs and cross it with the old Mission: Impossible to get a show where a team of fairly bright people come together to solve hard crimes with some cool math, instead of a show where a single untouchable genius saves the day every damn time. My word count is telling me that I’ve ranted on for far too long, and my body is telling me that it is time to go to bed, so I’ll leave it here for now.  I’ll just close with this:  instead of satisfying ourselves with what we see on television, perhaps we as scientists, should try even harder to push realistic images of science and scientists out onto the airwaves.  I think that society might thank us, in the long run. Back to post [1] I think that Chad Orzel at Uncertain Principles may have said something similar in recent months, but for the life of me I cannot find the relevant posts right now. Wait – Stephen Harper knows what an RSS feed is? *Really*? September 24, 2008 I was heading over to Google to check something, and on the Google home page there was a link to see what Canadian politicians are reading with Google Reader.  Being a fan of the big G’s Reader myself, I wanted to see what this was all about.  As you can see yourself, the page purports to be a read-out of the readings lists of some of the more important people in Canadian politics, including the leaders of four Canadian political parties. Now, I’m a pretty credulous guy, but even I’m having trouble swallowing the idea that Stephen Harper or Stéphane Dion are regular users of Google Reader.  Come to that, I’m having a hell of a time convincing myself that Harper even knows that an RSS feed is.  But hey, he’s welcome to subscribe to my blog – I’d be happy to give him some tips on how to fund Canadian science appropriately… On a side note, the link to Elizabeth May’s Facebook page is kind of entertaining to me;  I had to laugh when I heard on NPR’s Wait Wait … Don’t Tell Me! about her apologizing for never having smoked pot. Christians + crime = The Great Northern Texas. September 24, 2008 So, it seems that the University of Alberta Atheists and Agnostics group (were they there when I attended?  Damn it, I missed out!) had a banner defaced by a group of hateful Christians recently (h/t Pharyngula).  Good to see that my alma mater has such tolerant people. Update:  for those of you coming in from “Paul Lesoway”‘s note on this subject – yes, since you linked to me and clicked on the link, I can see you – I implore you to grow up and perhaps even try to adopt someone else’s viewpoint for a moment;  as one of the commenters on the original post that I linked to above said, what would be your feelings if someone defaced and vandalized a poster advocating a Christian group on campus?  One of the reasons that you go to university is to be exposed to people who don’t necessarily share your beliefs, so this is an opportunity to become a better person.  Don’t blow it. September 20, 2008 … this is just hilarious.
global_01_local_1_shard_00001926_processed.jsonl/55715
2.1 Through Her Sunken Dream E-Book Cover – IV – A hand slid over her shoulder, dragging her up from the warm depths of slumber. The unexpected delight of her younger brother’s goofy grin sent a smile spreading wide across her lips and she laughed, pushing her face into the soft pillow. “Tris, how are you here? Mom said you were working in Vancouver!” “Came home especially for my big sister.” He leaned down and pressed a kiss to her hair. “I’ve a gift for you.” Rolling over onto her side, she caught sight of Mina dozing in the rocking chair behind him. Tara furrowed her brow. “What’s the gift?” Tristan, ten years her junior, sat back on his ass, tugging his phone from his pocket and pressing a button before he put the device to his ear. Tara watched him curiously, and when his crooked smile touched the edges of his full lips and he greeted the person on the other end, she furrowed her brow, realizing she’d not caught the identity of the person she knew with which she was about to converse. Tristan laughed at her frustration, and did nothing to ease it as he said into the phone, “Yeah, lemme just hand you to her.” Tara rolled her eyes and sat up, holding her hand out for the mobile phone. “Tell me who—” The name threw her for a loop, and she frowned. “I’m sorry?” Tristan arched an amused eyebrow as he stood. “He don’t have much time, so get your ass on the phone. You need to speak to him.” “I need to speak to Sam.” Her words spoken deliberately, Tara blanched. “Wait… Sam? “That one.” He grinned, jiggling the phone a bit. “Go on.” Half an hour later, Tara mused as she hung up her brother’s phone. She knew she would never forget the experience, one only Tristan could have finagled. She rarely thought about where he worked or what he did, but his truck-driving job had put him in touch with some of the most amazing people over the years. Lately, he’d been driving for a production company in Vancouver… where he’d apparently met him. Sam Winchester. Tristan had become friends with Jared Padalecki, and at some point, they had a conversation where Tris convinced him to talk to me, in character, when he called and put me on the phone. Tris understood I needed to speak to someone who could make the distinction between light and dark. Because I’d given in to the dark too easily in the past, because he wasn’t ready to live without his sister, and because nothing else they’d tried had worked; Sam Winchester was the only option Tris felt he had left. Sam was the ace up his sleeve, and he knew Sam could get through to me. The breeze blew her hair into her face, and she looked at the Call Log once again, seeing JarPad Home 15:38, confirming the call’s existence. She’d left the bedroom during their conversation and gone outside to sit on the deck steps. She pushed the flames of her hair back over her ears, smiling softly to herself. “How’s my girl?” Tara lifted a merry gaze to the beloved countenance of the woman she called home. “I’m okay, pretty lady. Still reeling.” “What was it like?” Mina asked, sitting down one step above her and looping her arms loosely around Tara’s shoulders. “You know… talking to a freakin’ Winchester?” “Surreal. I don’t imagine many people have done that before.” Tara took a deep breath. “Unscripted, that is. Can’t believe Tris arranged this… it blows my mind!” “What’d the Moose tell you?” Her girlfriend ran her lithe fingers through Tara’s hair and began to plait the blue-streaked red waves into a loose French braid. “He told me death was more permanent than he or Dean like to imagine. He told me the process of dying isn’t painless, that it always hurts like hell, but the kind of pain I’d feel wouldn’t begin to touch the pain I’d put my brother through.” Tara leaned back in Mina’s embrace, her hands catching on the woman’s arms when they wrapped around her again. “He told me I was the world to a certain little brother… like his big brother was to him.” Mina pressed a kiss to her shoulder. “I’m glad you were able to speak to him.” Tara shifted to lift her eyes to her girlfriend’s gaze. “Me, too.” “So… we’re going to be here for a few weeks while you heal,” Mina began, her smile warm and inviting. “What would you like to do while we are here?” Tara leaned her temple to Mina’s shoulder. “You know I’m broken, don’t you? I-I-I mean, you know this is always going to be my fight, yeah?” “Baby, I know this is your fight. I know you fight you on a daily basis. I know you aren’t—” Mina sniffled as tears slipped down her cheeks. “I know you aren’t going to win every battle. I know why you got the semi-colon and the AKF art—it’s your armor to wear into battle—” Mina slipped down to sit in Tara’s lap. “—but you have to remember, babe, I’m always gonna stand next to you, fight your monsters with you. You have to remember, my pretty Major Tom, you’re a goddamn hero in this story. You’re my hero.” She laughed quietly. “I’ll bet Sam said the same thing to you.” Tara leaned in to press a kiss to Mina’s mouth, whispering, “I don’t know what to say.” “Say your story isn’t over yet, that it really does go on and on and on and on—” Mina brought Tara’s left arm up to kiss the phoenix-winged butterfly. “—and you’re always going to live on the breath of a hope.” She lifted the right arm up to kiss the spaceman. “Promise me you’ll always keep fighting.” Tara’s face creased with the force of the emotion swelling within her. Taking another salty kiss from Mina’s lips, she vowed, “I swear it. I swear it to you, Mina, I swear it!” Tell me what you really think...! You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s