id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_1_shard_00001926_processed.jsonl/71228
|
Archive for October 31st, 2007
God means it for good
Wednesday, October 31st, 2007 at 12:44 pm
In the above passage, we see that God took a situation that man meant for evil and turned it around and used it for good. I was listening to a podcast of Alistair Begg and he mentioned how Paul was under house arrest for over two years at the end of the book of Acts.
And when we came to Rome, the centurion delivered the prisoners to the captain of the guard: but Paul was suffered to dwell by himself with a soldier that kept him. And it came to pass, that after three days Paul called the chief of the Jews together: and when they were come together, he said unto them, Men and brethren, though I have committed nothing against the people, or customs of our fathers, yet was I delivered prisoner from Jerusalem into the hands of the Romans. Who, when they had examined me, would have let me go, because there was no cause of death in me. But when the Jews spake against it, I was constrained to appeal unto Caesar; not that I had aught to accuse my nation of. For this cause therefore have I called for you, to see you, and to speak with you: because that for the hope of Israel I am bound with this chain. And they said unto him, We neither received letters out of Judea concerning thee, neither any of the brethren that came showed or spake any harm of thee. But we desire to hear of thee what thou thinkest: for as concerning this sect, we know that every where it is spoken against. And when they had appointed him a day, there came many to him into his lodging; to whom he expounded and testified the kingdom of God, persuading them concerning Jesus, both out of the law of Moses, and out of the prophets, from morning till evening. And some believed the things which were spoken, and some believed not. And when they agreed not among themselves, they departed, after that Paul had spoken one word, Well spake the Holy Ghost by Isaiah the prophet unto our fathers, Saying, Go unto this people, and say, Hearing ye shall hear, and shall not understand; and seeing ye shall see, and not perceive: For the heart of this people is waxed gross, and their ears are dull of hearing, and their eyes have they closed; lest they should see with their eyes, and hear with their ears, and understand with their heart, and should be converted, and I should heal them. Be it known therefore unto you, that the salvation of God is sent unto the Gentiles, and that they will hear it. And when he had said these words, the Jews departed, and had great reasoning among themselves. And Paul dwelt two whole years in his own hired house, and received all that came in unto him, Preaching the kingdom of God, and teaching those things which concern the Lord Jesus Christ, with all confidence, no man forbidding him. Acts 28:16-31
During this time, Paul was able to have visitors and preached the gospel to them. Alistair Begg also mentioned that no doubt Paul did not have the same Roman soldiers keep watch over him for the entire two years. Paul probably had many different soldiers guarding him during that time. When he said that, I remembered that several years ago I had read that parts of Northern Europe were evangelized by a Roman soldier who was converted during Paul’s ministry. The imprisonment of Paul was an attempt by the Jews to silence him – to keep him from spreading the gospel of the Lord Jesus Christ. What they intended for evil, God used for good. The Jews’ attempt at stopping the gospel resulted in the fulfillment of Acts 1:8 and the gospel being taken to the uttermost parts of the earth!
That got me thinking. What else have men intended for evil, but God used for good? A couple of years ago, I commented that the problem the U.S. is having with illegal immigrants and them not wanting to learn English could be an attempt by Satan to destroy our country. Our country has been used mightily by God in the spreading of the gospel (although it is not the same as it once was). If Satan could divide our country in language and culture (as has already happened in many other areas), certainly it would weaken us. Satan saw how different languages confounded those building the tower of Babel and they could not complete their task. He could be using that to confound our country. So what good could God be working in all this?
Spanish is a language that is spoken by many people worldwide – I think it lags behind only Chinese and English. Most of the countries where Spanish is the primary language are dominated by Catholicism. Could God be using this influx of Spanish-speaking people into our country to see them saved and then take the gospel to their homelands and other Spanish-speaking nations? Is God preparing a great awakening of Spanish nations? Is this not a great evangelistic opportunity?
Posted in Uncategorized
by gahammerle
|
global_01_local_1_shard_00001926_processed.jsonl/71232
|
Vulcan District Roundtable
Are you new to the world of Scouting? Are you a leader in need of some new ideas? Would you like to hear about exciting District events? Then come to Vulcan District’s Roundtable meetings!!
Roundtable is an inspirational, and informative, meeting for all Cub Scout, Boy Scout and Venturer leaders and interested adults. The meetings are held the first Thursday of every month (except July) at 6:30p.m. We meet at Southminster Presbyterian Church on Hwy 31 in Vestavia Hills.
Roundtable begins at 6:30 for all scouters in Grace Hall. After announcements from the district and council, the group splits into Boy Scout Roundtable and Cub Scout Roundtable.
Come join us!
Southminster Presbyterian Church
1124 Montgomery Hwy
Vestavia Hills, AL 35216
Pin It on Pinterest
Share This
|
global_01_local_1_shard_00001926_processed.jsonl/71251
|
Episode 73: Not Episode 72
You have come. You have come to the throes of destiny-- YOUR destiny-- and it is called Disembodied Voices. This podcast will reveal to you many things and many things will be revealed. Stephen demonstrates the language of Twi'leki as he speaks of the mystical and ancient game of pazaak; Bryan summons his inner Sun Tzu to wage a physical and spiritual war against the vile Zerg; Cameron draws upon a raindrop-filled well of wisdom to elaborate on the nature of personal ownership and its enlightenment; Zachary offer instruction on the art of outrunning the Komodo dragon itself. In other words, everyone talks about video games. Come, be not afraid, and listen to this podcast, good haly. (That's Twi'leki for "visitor".) [audio https://www.cubby.com/p/_cb17dff66e9a47eabedd98a9a8b11409/Disembodied+Voices+-+Episode+73.mp3]
Opening song: Electrolytic Man, originally from Mega Man and remixed by MaJIN_SaN, ambient, and tomatsu.
Ending song: Last Dance of the Giants, originally from The Legend of Zelda: Majora's Mask and remixed by Kozlitek.
|
global_01_local_1_shard_00001926_processed.jsonl/71263
|
> Topic Index > C - Topics > Change Quotes
Change Quotes
Pages: Prev ... 11121314151617181920... Next
The impact of climate change is a tremendous risk to the security and well-being of our countries.
The mind of the most logical thinker goes so easily from one point to another that it is not hard to mistake motion for progress.
The most amazing thing about little children ... was their fantastic adaptability.
The most ominous of fallacies: the belief that things can be kept static by inaction.
The old order changeth yielding place to new, and God fulfills himself in many ways.
The one unchangeable certainty is that nothing is certain or unchangeable.
The only change is that baseball has turned Paige from a second class citizen to a second class immortal.
The only thing that would change would be the year, the names. It just got to be a repetitious life.
The simplest questions are the most profound. Where were you born? Where is your home? Where are you going? What are you doing? Think about these once in a while and watch your answers change.
The spirit of democracy is not a mechanical thing to be adjusted by abolition of forms. It requires change of heart.
The things we fear most in organizations-fluctuations, disturbances, imbalances-are the primary sources of creativity.
Pages: Prev ... 11121314151617181920... Next
|
global_01_local_1_shard_00001926_processed.jsonl/71265
|
REVIEW // Antipodes Aura Manuka Honey Mask
I've been using this mask on and off for over a year now, initially, I wasn't keen on it because I didn't think it was as clarifying as some of my clay masks so whenever I went to grab a mask, I'd always be drawn to the likes of the Superfacialist Tea Flower Pore Purifying Mask or the Origins Clear Improvement Charcoal Mask and wouldn't really give this one a chance, it's only in the past few months that I've given this a proper chance really. The texture is very different to the likes of purifying clay mask and is much more of a cream based mask, that doesn't set or harden as opposed to others. But it's worth giving it a chance, My skin has been suffering lately with a build up of drinking and over eating showing in my skin so I've needed something to help clear some of the little spots that have been showing up. This has been really lovely to use because although it does clear skin through a multitude of ingredients in this, but in particular Manuka Honey which is anti bacterial and helps with clearing the skin, it also is incredibly moisturising and doesn't leave your skin feeling stripped at all, which I can find with some of my clay masks, I normally end up having to whack on an oil or moisturiser straight after use, whereas with this I don't have that tight, dry feeling.
This particular mask comes in the usual metal tube packaging that most antipodes products come in, very classic and simple and has an amazing zesty vanilla smell. I tend to apply a good squeeze of this all over my face, because it is quite moisturising, I'm not so worried about it affecting some of the drier areas of my skin, I leave it on for around 10 - 15 minutes then use a warm flannel or muslin cloth to take off the product before rinsing, Skin feels soft but thoroughly clean after using and any signs of a breakout are definitely reduced the next day, I find that this is the kind of mask that can be used a few days in a row as well if you are having a particularly bad break out because it's gentle enough not to strip your skin.
On the whole, Antipodes is probably my favourite skin care brand, I have quite a few of there products now, including the Antipodes Grapeseed Butter Cleanser, Reincarnation Facial Exfoliator, Divine Face Oil, Avocado Pear Nourishing night cream and several others which I'll be putting reviews up of soon. It's a really lovely brand, that looks pretty, has a focus on using natural ingredients, but more than anything, really makes your skin feel and look great, I quite often get comments from people when I put my antipodes products back into rotation.
Any recommendations on other products I should be trying?
Soph x
6 comments on "REVIEW // Antipodes Aura Manuka Honey Mask"
1. I nearly got this but ioptedfor the antipodes lime and patchouli cleanser instead! I'm going to do a review soon :)
1. Oooh, that sounds good, will keep an eye out for your review! x
2. Nice*
Maybe we follow each other !?
Let me know if you follow me & i´ll follow back :)
Greetings <3
3. This one seems to be great. I've noticed it some time ago... but never tried myself. I guess, I should give it a go! :)
Thanks for the review!
And as for other skincare products-masks.. Have a look at my reviewed ones: :)
|
global_01_local_1_shard_00001926_processed.jsonl/71269
|
Tuesday, July 14, 2009
A shell
While I was in the no-technology zone on Whidbey Island over the weekend, my sister, RE, was dealing with a new development with Mom. Apparently Mom's been chewing, then spitting out her medications. Spitting right at the nurses and aides trying to...well, aid her. So as of yesterday, Mom's off all her meds, other than one liquid anti-depressant. The psychiatric nurse told RE that this is the heartbreaking part of her job, because it signals that the end isn't far off. Three weeks ago, when we were dressing up and taking Mom to her grand-daughter's wedding, Mom was still almost present. Sure, we had to sink onto our knees in front of her, interrupting her vacant stare in order for her to actually see us. Sure, she could neither understand our words nor speak in recognizable sentences. Sure, she'd forgotten our names, that she'd ever been married, what a wedding even is. But she was there, and at moments, her eyes seemed to clear a little, and she broke into a smile. Now, according to RE, she just seems sad. A sad shell of her former self.
RE thought Mom might perk up a little if she heard my voice, so she held the cell-phone up to Mom's ear and I began to speak. "Hi, Mom," I said, then told her my name. But though she reacted to my name, she didn't get the concept of the telephone, and tried to lean closer to it, as if she might hug or just see me through it. It was not a successful venture, so RE lifted the phone away from her leaning body, and talked to herself, while Mom slumped back in her wheelchair, staring blankly toward the window. It's the last time we'll try that, RE and I decided. I will never talk to my mother on the phone again. And it's possible that, even if I'm in the room, she won't be able to communicate with me.
Two weeks ago, Mom was still pacing the halls of the nursing home in her wheelchair, propelling herself with her feet. Now she just sits in her room, barely aware of time passing. Mom, who once was addicted to chocolate, now grits her teeth against her favorite treat. She who could read whole stacks of books in a week, now cannot recognize more than a word or two on a printed page. Oddly, however, she still instinctively adds the words she reads to her incoherent speaking. For years, I was annoyed at her relentless reading of signs as we drove through town, because it interrupted any real conversation. "Dissmore's", she'd say. "No fee ATM. Clements' Chiropractic." "Don't even think of parking here (this was actually a sign across from the post-office when I was a kid--my alltime favorite sign ANYWHERE. And Mom had a shirt made with that sign plastered against my chest. Imagine the response I got when I wore that shirt in public)." And somehow, that endless sign reading has lasted into this winter of her brainless life. And what once irritated me is now amusing and even comforting. It reminds me that she's still in there somewhere!
So now we're in the final countdown. RE didn't ask the nurse how long this season will last. It's probably hard to quantify, varies from patient to patient. But the heart, blood pressure meds she's been taking a long time are gone. And the thyroid pill she's had daily since long before I was born will no longer regulate her system. No more Alzheimers drugs either, so the steep descent might actually accelerate.
So we're all holding our breath a little now. RE told me it's increasingly difficult to visit Mom. Because she doesn't even speak very often now, one has to be ready with a monologue. For some in my family (like myself especially), monologues come naturally. Sorry to say. But for RE, it's excruciatingly difficult.
But what strikes me is that every change somehow becomes the new norm. About when I got used to filling in the blanks when she couldn't think of a word, she began to use nonsensical sounds. And just when we got used to her roaming the halls and using her feet to move her chair, she stopped moving. The blankness in her conversation became a blankness in her very being. And now, her being a body, a shell that used to house a person, will become natural. And just about the time we grow comfortable in her living absence, that absence will become a literal one. All of this shell-time is practice for that.
No comments:
|
global_01_local_1_shard_00001926_processed.jsonl/71270
|
The pastebin is a database of snippets. Snippets are actually small bits of code, in this case they can also be whole files though. For it’s highlighting, this pastebin uses Geshi.
Latest snippets
Class: GearScore Calculator
by Anaxent on Mon Nov 01, 2010 8:03 pm
Just got sent here?
If you just got sent here, please paste the requested file or code into the textarea below, and give the url to the person who sent you here.
You are not authorised to submit new snippets.
|
global_01_local_1_shard_00001926_processed.jsonl/71281
|
About Me
Some days you just want someone to point you in the right direction.
You started out with the BEST of intentions.
Maybe you're a TEACHER sick of searching the entire internet for the ONE idea that will engage your students in class.
Maybe you're a PARENT who wants to help their child learn their sight words but isn't sure how to do that and make it fun.
Maybe you're a STUDENT yourself beginning your own journey to become a teacher.
Maybe you have chosen to HOMESCHOOL your child and need some guidance of how to scaffold their learning.
Maybe you want to find PRINTABLES that you can use right now with your child.
Perhaps you turned to Pinterest but the choices are endless it seems. And you find yourself with not enough hours in the day for all you have to do or a life!
All you wanted was to provide the children in your care with the best learning experiences possible during their childhood.
That doesn't sound SO HARD does it?
Finding ONE place that can help inspire me and have resources I can use right now?
No, it doesn't.
Why? Because that's exactly why I started this blog!
As a teacher I couldn't always find the resources I wanted to use in class so I started making exactly what I wanted.
And as a parent, I want to ensure that my children's day weren't just full of spelling lists and learning timetables. At the end of their day at schooI, I wanted a childhood for them full of play, real world problem solving and imagination.
I am a Early Childhood teacher and mum of three who understands how difficult it can be to find quality resources and ideas to use in your classroom or at home to help engage children in their learning.
Here's where you might want to start!
I look forward to hearing from you all!
You can contact me via our FB page, Instagram or via email
If you are a brand or PR company, you can request our media kit by emailing us - [email protected]
This is a personal blog written by me, Nichole Halliday. Please feel free to use any of these ideas with your children at home, at school or any place you teach or play.
If you would like to share one of our posts on another blog or website, you may use one picture as long as you also include a clickable link back to the original post. Any watermark should remain intact. Please do not repost the whole blog post without our written approval. If you are unsure, please contact us by email.
You are welcome to pin images from this site to Pinterest as long as your pin links back to the original post here at youclevermonkey.com
You may not post any of our photographs to Instagram without our permission.
You may not copy or distribute any of our PDF files or directly link to them.
You can always contact me at [email protected]
Thank you.
|
global_01_local_1_shard_00001926_processed.jsonl/71289
|
Contamination dating radiocarbon dating friendship and relationship profile in kuwait
In the case of carbon-14 dating, the daughter product is ordinary nitrogen and plays no role in the dating process.
We are only interested in tallying the original C-14 still present in the sample, the surviving "parent" isotope.
However, unless the sponge itself disintegrates, the carbon which holds its fibers together must stay put.Residues or solutions which do migrate can usually be washed out of the structural matrix of the sample with various chemicals.To put it another way, we might imagine a piece of buried wood as being something like a sponge.The C-14 that is incorporated in the carbon structure of cellulose and the other structural materials of living plants and animals is not going to do much migrating after burial.If structural carbon migrated easily there soon wouldn't be any cellulose, lignin, chitin (or other structural carbon compounds) left in the soil!
Search for contamination dating radiocarbon:
contamination dating radiocarbon-87contamination dating radiocarbon-40contamination dating radiocarbon-46contamination dating radiocarbon-25
Leave a Reply
One thought on “contamination dating radiocarbon”
1. There are many different options, ranging from 100% free dating sites to paid membership sites with monthly costs. Its worth noting that paid-for dating services deter scammers and fakes as the barrier to entry is a little higher.
|
global_01_local_1_shard_00001926_processed.jsonl/71292
|
XEmacs -- Emacs: The Next Generation
Searching XEmacs
Quick Links About XEmacs Getting XEmacs Customizing XEmacs Troubleshooting XEmacs Developing XEmacs
XEmacs vs. GNU Emacs
Much of this page was written over a decade ago, by somebody other than the current editor, possibly Ben Wing. The previous major revision occurred on January 1, 2001, by me. GNU Emacs has improved a fair amount, but the irreconcilable differences between the projects continue, with no resolution in sight. I have little interest in learning enough technical details about GNU Emacs 22 to accurately revise it, so you should take everything in square brackets with a grain of salt. -- stephen, February 19, 2008
There are currently irreconcilable differences in the views about technical, programming, design and organizational matters between Richard Stallman (RMS) and the XEmacs development team which provide little hope for a merge to take place in the short-term future.
If you have a comment regarding a merge, it is a good idea to avoid posting to the newsgroups, because of the very heated flamewars that often result. Mail your questions to [email protected] and [email protected].
Many people have noticed the great difference in focus between the two "Viewpoints" presented here, and also have expressed confusion about the legal issues RMS focuses on. The final sections present some explanation and interpretation regarding these FAQs.
Technical Differences between XEmacs and GNU Emacs
(the XEmacs Point of View)
This section is now quite dated. Much of it refers to GNU Emacs 19 and XEmacs 20. However, many of the differences described persist in the most recent versions of both Emacsen in some form.
User-Visible Editing Features
As of GNU Emacs 22, XEmacs's GUI features (images, variable pitch fonts, widgets) are reported by some GNU Emacs users to be more efficient and usable than GNU Emacs's.
XEmacs provides support for ToolTalk on systems that have it. Experimental support for drag-and-drop protocols is provided from XEmacs 21. [Not available in GNU Emacs 21. Status in GNU Emacs 22 unknown.]
XEmacs has a built-in toolbar. Four toolbars can actually be configured simultaneously: top, bottom, left, and right toolbars. [A single toolbar was added to GNU Emacs 21.]
General Platform Support
Starting with XEmacs 21.4, if your platform supports dynamically loadable modules, so does XEmacs. RMS continues to refuse to allow this facility in GNU Emacs, because it makes it easier to distribute modules in violation of the GPL.
If you're running on a machine with audio hardware, you can specify sound files for XEmacs to play instead of the default X beep. See the documentation of the function load-sound-file and the variable sound-alist. XEmacs also supports the network sound protocols NAS and EsounD. [Not available in GNU Emacs 22.]
XEmacs 21 supports database protocols with LISP bindings, currently including Berkeley DB, LDAP, and PostgreSQL (from 21.4). [Not available in GNU Emacs 22.]
XEmacs 21 supports the Canna, Wnn, and SJ3 Japanese input method servers directly, as well as through the X Input Method (XIM) protocol. GNU Emacs 22 supports only the XIM protocol, although there are now pure Lisp implementations of Canna and Wnn. Both Emacsen support the Quail family of input methods (implemented in LISP) for many languages.
As of XEmacs 21.4, although XEmacs supports preloaded Lisp using "unexec", it is considered obsolete. XEmacs 21.4 uses a much more portable technique to "dump" and "preload" Lisp. GNU Emacs 22 still uses unexec.
XEmacs 21 supports multiple frames on TTYs. GNU Emacs is scheduled to get that feature in version 23.
Packaged LISP Libraries
Many more packages are provided standard with XEmacs than with GNU Emacs 22.
XEmacs 21 supports an integrated package management system which uses EFS to download, then automatically install prebuilt LISP libraries. This allows XEmacs users much more straightforward access to the "latest and greatest" version of any given library.
LISP Programming
From XEmacs 20 on, characters are a separate type. Characters can be converted to integers (and many integers can be converted to characters), but characters are not integers. GNU Emacs 19, XEmacs 19, Mule 2.3 (an extensive patch to GNU Emacs 18.55 and 19.x), and GNU Emacs 20--22 (incorporating Mule 3 and later Mule 4) represent them as integers. [GNU Emacs 23 may get a character type.]
From XEmacs 20 on, the buffer is treated as an array of characters, and the representation of buffer text is not exposed to LISP. The GNU Emacs 20--22 functions like buffer-as-multibyte are not supported.
In XEmacs, events are first-class objects. GNU Emacs 19 represents them as integers, which obscures the differences between a key gesture and the ancient ASCII code used to represent a particular overlapping subset of them.
In XEmacs, keymaps are first-class opaque objects. GNU Emacs 19 represents them as complicated combinations of association lists and vectors. If you use the advertised functional interface to manipulation of keymaps, the same code will work in XEmacs, GNU Emacs 18, and GNU Emacs 19; if your code depends on the underlying implementation of keymaps, it will not.
XEmacs uses "extents" to represent all non-textual aspects of buffers; GNU Emacs 19 uses two distinct objects, "text properties" and "overlays", which divide up the functionality between them. Extents are a superset of the union of the functionality of the two GNU Emacs data types. The full GNU Emacs 19 interface to text properties and overlays is supported in XEmacs (with extents being the underlying representation).
Extents can be made to be copied into strings, and then restored, by kill and yank. Thus, one can specify this behavior on either "extents" or "text properties", whereas in GNU Emacs 19 text properties always have this behavior and overlays never do.
Window System Programming Interface
XEmacs supports Motif applications, generic Xt (e.g. Athena) applications, and raw Xlib applications. An XEmacs variant which supports GTK+ is available (integration as an option in the XEmacs mainline is planned for XEmacs 22), although code to take advantage of the support is as yet scarce. XEmacs does not support raw Xlib. GNU Emacs 22 supports Xlib, GTK+, and MS Windows, with 3rd party or experimental support for Carbon and Cocoa on the Mac.
XEmacs provides an interface called the "native widget API" for adding new kinds of widgets (currently including progress bars, tab controls, and buttons) which can be attached to extents using the image API. GNU Emacs does not.
As a compile-time option, an XEmacs frame can be placed within an "external client widget" managed by another application. This allows an application to use an XEmacs frame as its text pane rather than the standard Text widget that is provided with Motif or Athena.
Community Participation
Starting with XEmacs 20, joining the XEmacs development team is simple. Mail to XEmacs Developers <[email protected]>, and you're in! (If you want to be, of course. You're also welcome to just post development-related questions and bug reports.) As of February 2008, XEmacs has a modern bug tracker. The GNU Emacs development lists were opened up as of the version 21 development cycle, and a bug tracking system is under discussion.
The XEmacs source code is managed using Mercurial, whereas the GNU Emacs source code is managed using Bazaar.
In XEmacs, development and maintenance of Lisp libraries is separated from the core editor development at a fairly low level. This provides better modularization and a better division of responsibility between external library maintainers and the XEmacs core development team. Even for packages the size of Gnus, XEmacs users normally have access to a pre-built version within a few weeks of a major release, and minor updates often within days. RMS once again vetoed provision of a package system for Emacs in December 2007.
In XEmacs, CVS commit authority is broadly dispersed. Recognized maintainers of LISP libraries who are willing to maintain XEmacs packaged versions automatically qualify for CVS accounts for their packages. Something similar is true for GNU Emacs at the time of writing.
The FSF Point of View
Richard Stallman writes:
XEmacs is GNU software because it's a modified version of a GNU program. And it is GNU software because the FSF is the copyright holder for most of it, and therefore the legal responsibility for protecting its free status falls on us whether we want it or not. This is why the term "GNU XEmacs" is legitimate.
But in another sense it is not GNU software, because we can't use XEmacs in the GNU system: using it would mean paying a price in terms of our ability to enforce the GPL. Some of the people who have worked on XEmacs have not provided, and have not asked other contributors to provide, the legal papers to help us enforce the GPL. I have managed to get legal papers for some parts myself, but most of the XEmacs developers have not helped me get them.
XEmacs was possible because free software means that anyone can change it and distribute a modified version. I have no regrets about establishing this freedom for Emacs. Everyone should have the freedom to change any program, and this is not limited to changes that the original author likes.
Many people have taken advantage of the freedom to change GNU Emacs, over the last decade. Most of them were willing to cooperate on integrating their changes into Emacs. XEmacs arose as a separate forked version because some of the developers--starting with Zawinski--were unwilling to do that.
People should have the freedom to decide what to work on, including the freedom to compete with the GNU project, but it's a shame when they make that choice. The whole community loses when someone chooses competition rather than cooperation.
But this is worse than competition--it is unfair competition. The XEmacs developers can and do copy code they like from Emacs. If I could copy the code I like from XEmacs in the same way, at least the rivalry would be fair. But I can't do that, because substantial parts of XEmacs don't have legal papers, or don't have known authors.
As long as we cannot use XEmacs in the GNU system, the GNU project has to make sure that Emacs is not left behind. In other words, we have to behave like rivals too, even though we wish there were no rivalry. When XEmacs developers try to persuade people to use, test, fix and enhance XEmacs instead of Emacs, the GNU project can't sit still; we need them to use, test, fix and enhance Emacs instead.
There is good code in XEmacs, which I'd be happy to have in a merged Emacs any day. But I cannot copy it out of XEmacs myself because of the uncertain authorship and/or lack of legal papers.
This problem could probably be resolved, at least for large parts of XEmacs, with substantial help from the authors of that code. Otherwise, the GNU project has to write or find replacements for it.
I invite people who like Emacs, and want the best possible version of Emacs to be available for use in the GNU system, to help in one way or the other.
What Is the Legal Issue?
There is no difference in the nature of the copyrights or licenses of the two projects. Copyright is defined by law and international treaty, and is automatically awarded to the author as soon as a work is published. Both projects use the GNU General Public License to protect their work while providing it freely to the community. (GNU Emacs moved to GPL version 3 almost as soon as it was available; XEmacs is moving in that direction as well. Of course since XEmacs is licensed under "GPL version 2 or later," individuals who wish to redistribute XEmacs under version 3 can do so. Thus this is not a real difference.)
XEmacs has no choice, because much of its code is copyrighted by the Free Software Foundation, and is only available to XEmacs under the GPL. Under that license, redistribution is only possible under the GPL. The GNU Project uses the GPL as a matter of principle. (XEmacs developers generally subscribe to a similar principle, of course.) It is the same GPL, so sharing code is 100% legal.
However, copyright is governed by the civil code, not the criminal code. This means that the government takes no interest in violations of copyright as such. It only undertakes to provide law courts where the copyright can be enforced. It is the responsibility of the copyright holder to sue to prevent violations and receive damages for past violations. The government cannot act on the complaints of third parties.
The FSF has received legal advice that a copyright holder in a jointly-authored work is in a weak position to enforce its copyright unless all coauthors participate in the legal action. Evidently the FSF would be considered a third party with respect to non-assigned code, weakening its ability to defend the whole work. (Author's note: You'd have to ask a lawyer why that might be so. I am not an expert, but lawyers I have asked informally agree that this theory is plausible, although it has not been tested in court. It may also be more or less applicable in jurisdictions other than the U.S.)
Based on this advice, RMS has concluded that incorporating some code copyrighted by another entity into a work such as Emacs puts the copyright of all of the work at risk of being unenforceable in court in the case of a violation. He has judged that this risk is unacceptably large. Therefore he insists that the whole copyright of any software that included in the GNU system be assigned to the FSF, with few exceptions.
What Is the Role of the FSF?
RMS believes that copyright in software itself is immoral. Copyleft is a device to undermine the whole idea. He has little empathy for people who wish to retain copyright---after all, he has given up his own. This is the fundamental idea behind the FSF (as opposed to the GNU Project, which actually develops software). It is a holding company for all the software copyrights that shouldn't even exist in the first place. According to the legal argument above, such a trust is necessary to defend the GPL. It is the GPL that prevents proprietary firms from misappropriating the software at the same time as it prevents the holding company (the FSF) from being a monopoly.
Well, Isn't That Paranoid?
Many developers think so, but it seems that no one who holds a different theory has retained a lawyer to check the precedents. The FSF has done so, so its position must be considered most credible.
Also, it is important to remember that RMS and the FSF are not (in this context) acting as software developers. Rather, they perceive themselves as guardians of a social movement. Their responsibility is not to any one application or project, but to the whole GNU system. For that reason as well, a conservative approach can be justified.
Don't the XEmacs Developers Care?
Of course we do. But even if we haven't consulted a lawyer, we have the right to judge the risks to our own product. Most of us consider it low. Furthermore, many XEmacs developers take a different approach to the free software movement itself, and so will differ from GNU/FSF policy. The code we write will remain free. What we are possibly losing is the ability to force others to make their modifications free. This is central to the GNU Project because it is a social movement. To many developers as individuals, it is not so crucial.
This also shows why the "Viewpoints" are so different in style. XEmacs developers consider their project from a technical point of view, and prefer it for technical reasons. They see their contributions to the free software movement as stemming from their development and publication of code. Richard Stallman, and the FSF, consider their primary role to be more politically and socially oriented. Thus social and legal issues come to the fore.
Fear of Forking Considered Harmful
Few XEmacs developers consider having multiple implementations of some features a bad thing. The original Lucid fork arose, as RMS writes, because the Lucid developers (primarily Jamie Zawinski) would not "cooperate" in merging the Lucid code into the GNU mainline. What RMS does not mention is that in his vision of "cooperation" the Lucid developers would be working under his direction to merge those features that he wanted, making changes to their code as he directed. This is obvious, when you think about it. Of course he was the head of the GNU Emacs project, and would reserve the right to make final decisions. Nor is it surprising that the Lucid developers refused. They had egos, of course. But ... well, you can, and should, judge for yourself.
But there were also those "irreconcilable technical differences." Both Lucid Emacs and GNU Emacs 19 were excellent editors, but in their different ways. The Lucid developers honestly considered GNU Emacs 19, and the merge as outlined by RMS, to be broken in some important ways. He, just as honestly, considered many of the changes the Lucid developers demanded to be broken, or at best to be fixing what wasn't broken. A fork was inevitable. That's one thing free software is for: the right to fix what you consider broken, and redistribute the improvements.
And a little competition may be good for you! Without the fork, GNU Emacs 20 might not have added Mule, and GNU Emacs 21 might not have the GUI redisplay. Who knows when GNU Emacs will get a library packaging system? All of these features were successfully pioneered by Lucid Emacs or XEmacs. They were implemented at times when RMS considered them broken, irrelevant, or low priority. Conversely, not only is XEmacs based on GNU Emacs, but part of the development effort includes regular synchronization of features and implementations with the mainline versions.
Of course, we all think it is best when all the good code that results can be shared:
All Emacs developers are free software developers.
But whether or not it can be shared is a matter of point of view. And the question is quite extraneous to the development process itself. "How much does the legal system hinder you in effectively protecting your copyright when you cooperate with someone unwilling to give up their copyright?" Maybe you don't need to care.
Author's Disclaimer
I disagree strongly with the FSF position in many respects. In fact it is my personal opinion that in interactions with XEmacs developers RMS has been more interested in recruiting them to do work he wants done on Emacs, than in acquiring XEmacs code with far less effort than it would take to develop it from scratch.
However, I have tried to present the facts of the legal issue as accurately and objectively as possible, and have some hope I succeeded. The interpretation of why XEmacs developers as a group do not worry about this legal issue is my own. The most I can say is nobody on the XEmacs developer's mailing list has complained about it.
Statements about what Richard Stallman believes, judges, concludes, and so on should be taken with a grain of salt. I am not so foolish as to pretend to speak for him. Rather, I have found certain conjectures useful for establishing a coherent interpretation of his actions and statements, and have taken the liberty of making them available to you. The NO WARRANTY section of the GPL definitely applies to them, though!
I just wanna say that I am proud that this page still gives Jamie Zawinski an excuse to use a wonderful word like pusillanimous. There are plenty of venues where you can read endless flames on these issues. With little effort, you can probably find some of mine. This isn't one. So big deal.
Stephen J. Turnbull <[email protected]>
Automatically validated by PSGML
|
global_01_local_1_shard_00001926_processed.jsonl/71294
|
Powered by SW-DOS 2.0
xkcd From Scratch: Mathspeak
by WolfieMario, 29th Jan 2011
It reads: B A member of R union, U R-naught right, G Y-naught, U R-naught 4 real, radical. The sign reads: 1 for all.
Permanent link to this comic: http://xkcdsw.com/3238
Trapped in a Bitcoin mine, send help
Rated for humour:
Rated for making xkcd worse:
You may submit a comment for this comic below.
This archive is maintained by Imran Nazar.
|
global_01_local_1_shard_00001926_processed.jsonl/71316
|
Dyeing of hides and skins
From Efficiency Finder
Jump to: navigation, search
Back to Subsection DC leather
General description
The dyeing process is carried out to produce consistent colouring over the whole surface of each hide and skin, and for exact matching between hides in a commercial pack. Typical dyestuffs are water-based acid dyes. Basic and reactive dyes are less commonly used by the leather industry.
Emerging technologies
Continuous retanning and dyeing
This is a manufacturing technique developed in Italy to perform retanning, dyeing and stuffing in a semi-continuous unit with low water requirements. The line is made up of three different modules.
• A roll machine for retanning and stuffing. Due to a system specially designed for the purpose, the machine facilitates the penetration of chemicals into the leather and then 'squeezes' the excess substances out of it. The special feature of the machine is that it includes a double basin for impregnation, so that leather can be processed on both sides simultaneously.
• A stabilising chamber where controlled pressure, humidity and temperature help chemicals diffuse and fix into leather.
• A soak-dyeing system, where leather can be dyed in a few seconds.
Both the roll machine and the soak system work in short-term washing mode: low volumes of water contain high concentrations of chemicals, so that the amount of effluents is kept low. The machines are provided with sensors to monitor the key parameters of the process (temperature, pH and conductivity) and keep conditions stable.
Status of development
A prototype was built and used for pilot trials in 2008 to evaluate the emerging technique. The results were promising.
Source: (BAT) Reference Document for the Tanning of Hides and Skins, 2013
Back to Subsection DC leather
|
global_01_local_1_shard_00001926_processed.jsonl/71323
|
0 reads
Leave a comment
Christmas In The Wizarding World Of Harry Potter
Source: Tara Ziemba / Getty
Harry Potter fans are some of the most dedicated in the world, and even though the entire series takes place in a fictional realm, that doesn’t mean things wouldn’t be different if the demographic was. It’s no secret that most of the students at Hogwarts are white–so how different the would the school be like if they incorporated Black culture? A hilarious hashtag started trending on Thursday: #BlackHogwarts, and people are imagining the scenarios that would go down at school if the students at Hogwarts were Black. These tweets absolutely nail the differences between what Harry Potter shows, and how things would go differently at Black Hogwarts.
The lesson plans in class would inevitably a little bit different
But sorting would still stress everyone out just the same.
And if anything is for certain, Rick Ross would most definitely play the role of Hagrid…
Peep the next couple of pages to see all of the other things that would go just a little bit different at Black Hogwarts.
Black Harry Potter Fans Are Imagining How Different Hogwarts Would Be If They Attended was originally published on
1 2 3 4 5 6 7 8Next page »
Also On 101.5 Soul:
comments – add yours
|
global_01_local_1_shard_00001926_processed.jsonl/71324
|
This Scale Won't Tell You How Much You Weigh, Even Better
It's called the Shapa scale and it won't give you an exact number. Rather it tells you how many times you've gotten on the scale that week and whether you're meeting a goal of losing weight or need to up your game a bit. There's a ton of other cool features and I'm just saying...the New Years resolution to lose weight is always a good idea...until those stupid numbers really prove to be a buzzkill.
Check it out:
Content Goes Here
|
global_01_local_1_shard_00001926_processed.jsonl/71329
|
章 28 马修
马修 28
28:1 Now on the morning of the Sabbath, when it began to grow light on the first Sabbath, Mary Magdalene and the other Mary went to see the sepulcher.
28:2 不料, a great earthquake occurred. For an Angel of the Lord descended from heaven, and as he approached, he rolled back the stone and sat down on it.
28:3 Now his appearance was like lightning, and his vestment was like snow.
28:4 然后,, out of fear of him, the guards were terrified, and they became like dead men.
28:5 Then the Angel responded by saying to the women: “不要害怕. For I know that you are seeking Jesus, who was crucified.
28:6 他不在这儿. For he has risen, just as he said. Come and see the place where the Lord was placed.
28:7 进而, go quickly, and tell his disciples that he has risen. 不料, he will precede you to Galilee. 在那里,你将看到他. Lo, I have told you beforehand.”
28:8 And they went out of the tomb quickly, with fear and in great joy, running to announce it to his disciples.
28:9 不料, Jesus met them, 话, “Hail.” But they drew near and took hold of his feet, and they adored him.
28:10 耶稣对他们说:: “不要害怕. 走, announce it to my brothers, so that they may go to Galilee. There they shall see me.”
28:11 And when they had departed, 谁知, some of the guards went into the city, and they reported to the leaders of the priests all that had happened.
28:12 And gathering together with the elders, having taken counsel, they gave an abundant sum of money to the soldiers,
28:13 话: “Say that his disciples arrived at night and stole him away, while we were sleeping.
28:14 And if the procurator hears about this, we will persuade him, and we will protect you.”
28:15 然后,, having accepted the money, they did as they were instructed. And this word has been spread among the Jews, 即使到了今天.
28:16 Now the eleven disciples went on to Galilee, to the mountain where Jesus had appointed them.
28:17 和, 看到他, they worshipped him, but certain ones doubted.
28:18 耶稣, 花前月下, spoke to them, 话: “All authority has been given to me in heaven and on earth.
28:19 故, go forth and teach all nations, 给他们施洗在父亲的姓名和子和圣灵,
28:20 teaching them to observe all that I have ever commanded you. 不料, I am with you always, even to the consummation of the age.”
|
global_01_local_1_shard_00001926_processed.jsonl/71333
|
Skip to content
Sequence, Counting, and Cardinal aspects of number words
We are one of those crazy districts that starts school in August, and at the beginning of August, no less. Because of that, I have been doing a lot of reading and thinking about all stuff school. One of the books I am reading is entitled Primary Mathematics: Teaching for Understanding, written by Patrick Barmby, Lynn Bilsborough, Tony Harries and Steve Higgins. It is a fabulous resource, and as noted on the back cover, the authors’ intent is “to support and develop teachers’ understanding of the key primary mathematics topics. ”
One of the first topics our brand new kindergarteners tackle is counting. They must count and count and count and then count some more, as they practice saying the number words in sequence. In Chapter 2, Barmby, et al. discuss how children acquire the spoken representation of number and what that path might look like. “When mistakes occur in the use of sequence numbers, these are usually related to children’s developing skills rather than particular misconceptions” (Barmby, et al., pg. 17).
To move through the Early Learning Counting Trajectory (the developmental sequence described by Douglas Clements and Julie Sarama), from a “reciter”-says number words in order to a “counter and producer”-counts objects, counts out a specific number of objects, & uses cardinality, kids must count. They must count things, lots of different things, lots of times: Unifix cubes, pebbles, toy cars, pencils, shiny markers, kids in their class, stickers, sea shells, and dots on five- and ten-frame cards. The kiddos must count objects and they must talk about what they are counting.
They should build trains of Unifix cubes and talk about how many cubes in each train; chat about which train of cubes is longer, which train is the shortest, and which two might be of the same length. Kindergarteners must create sets of objects – buttons, shells, dice-shaped erasers, plastic pumpkins – and then, count and re-count how many objects in each of the sets.
So, have young kids count and chat, and explore and investigate, and converse and discuss-it’s good for them.
No comments yet
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this:
|
global_01_local_1_shard_00001926_processed.jsonl/71343
|
Appendix B. Changes in Version 4.1
The sections below document features and compatibility changes introduced in Red Hat Developer Toolset 4.1.
B.1. Changes in Eclipse
Red Hat Developer Toolset 4.1 is distributed with Eclipse 4.5.2 and other plugins from the Mars release train, which provides a number of bug fixes and feature enhancements over the version included in Red Hat Enterprise Linux and the previous version of Red Hat Developer Toolset.
This section contains a comprehensive list of new features and compatibility changes in this release. For details on how to use these new features, refer to the built-in Eclipse documentation.
B.1.1. Changes Since Red Hat Developer Toolset 4.0
• A new component, Eclipse TM Terminal, has been added. It is a small, re-usable component for terminal emulation and remote access.
• A new component, Eclipse Dynamic Languages Toolkit, has been added. It is a comprehensive Ruby, TCL, and Shell script IDE with features including code running and debugging, auto-completion, outlining, support for executing unit tests and graphically presenting the results, and others.
• The Eclipse Platform has been updated from version 4.5.0 to 4.5.2. As this is a bugfix release, it does not contains new features, only bug fixes and optimizations, including the following:
• The SWT GTK+3 back end (used by default on Red Hat Enterprise Linux 7) has been optimized for performance.
• SWT has gained better compatibility with GTK+ 3.14 (Red Hat Enterprise Linux 7.2) and features drawing fixes and other improvements.
• The Java formatter has been significantly improved.
• The stability and behavior of Drag'n'Drop operations has been improved.
• Eclipse CDT (C and C++ Development Tooling) has been updated from version 8.7 to 8.8.1. This release includes a number of enhancements, including the following:
• Memory views have been improved, including support for Find/Replace and Add Watchpoint.
• The readability of the Dissassembly view has been improved.
• Support for user-defined literals has added.
• The Mylyn task-management subsystem has been updated from version 3.16 to 3.18. This new release includes the following changes:
• The Task list view has been improved.
• The saving and restoring of breakpoints in the task context is now supported.
• The Eclipse Linux Tools plug-in collection has been updated from version 3.2 to 4.0. This major release includes significant changes, such as:
• A new subcomponent, the Vagrant plugin, has been added. The plugin supports interaction with Vagrant boxes and virtual machines.
• The Docker plugin gained support for searching the Docker registry for images and for running images directly. The plugin now also includes a full-featured interactive shell support.
• The OProfile plugin has gained support for the ocount tool.
• The RPM plugin has gained support for weak dependencies (Suggests and Recommends).
• Manual pages are browsable and searchable through the Eclipse Help system.
• EGit, a Git integration plug-in for Eclipse, and JGit, a Java library implementing Git, have been updated from version 4.0.1 to 4.2.0. This update includes:
• Basic support for push certificates has been added.
• Performance has been improved by making use of the Java NIO (Non-blocking I/O).
• Support for the Remote [Add|List|Remove] Command has been added to the JGit API.
• Support for the gitflow model has been improved.
• The Staging view now supports submodule repositories.
• The Eclipse PyDev development environment for Python has been updated from version 4.1.0 to 4.5.4. This release includes a number of changes, such as:
• The debugger has been improved significantly.
• The PyDev Package Explorer has been improved to provide more information when all elements are filtered.
• Code completion has been improved.
• A new Python search page has been added, and the search backend is now backed by the Lucene engine.
• The Eclipse PTP (Parallel Tools Platform) has been updated from version 4.1.0 to 4.5.4.
|
global_01_local_1_shard_00001926_processed.jsonl/71344
|
Pia Waugh and Julie Treanor talk about openness, changing the government and people
Two cracking interviews with women that truly get stuff done but both don't ever want to do it alone and work with people.
First up is Pia Andrews (recently married, you probably know her as Pia Waugh) is a deep thinker, a deliciously cohesive speaker and one of the most active and effective people we have ever met when it comes to making changes in how governments work.
And then we have Julie Treanor who has worked in "HR / leadership" (people focussed areas) at all levels of the corporate ladder but recently decided to stride out on her own and found herself in Wellington's startups world.
Here's what's also in store for you in this week's email:
• A Packed Year, How Did We Do In The Stats?
• Check Out The "Collections"
• 2018 We're Going To Do Series, BUT On What?
• Links: NZ Startup Ecosystem Map, Build Don't Burn and Women in Data Science NZ
|
global_01_local_1_shard_00001926_processed.jsonl/71371
|
Expired domains with the .se and extension
Database list of 1,215,750 expired .se (Sweden) domains is now available
Categories: , Tag:
The expired domain database for .se is now available!
Whether you want to build a PBN network, buy high authority .se domains for your future brands or snatch domains in bulk, our almost complete domain list will get you the job done! After all, it includes 1,215,750 expired .se domains. This list of expired domains includes 46%, 15% and .se, 9%, 7%, 20%
The list will be emailed to you within 24 hours to 3 days after purchase through the website.
|
global_01_local_1_shard_00001926_processed.jsonl/71372
|
Currently viewing the category: "Clinical Science Research"
The Promise Is Not Reality Quite Yet: How The Microbiome Has Caught Our Attention—Part 2
posted in Clinical Science Research
In March, I wrote that the view of the role of intestinal bacteria in allergic diseases has evolved from disdain and scorn in the 1990s to current ‘rational exuberance’ (to paraphrase a term from Alan Greenspan—former chairperson of the Federal Reserve). Health care professionals and scientists refer to the intestinal bacteria as the ‘microbiome’—the community […]
Here Comes Vitamin D—Or Should It Just Be The Sun? Vitamin D Supplements In Treating Allergies and Asthma
posted in Clinical Science Research
In the musical world, everyone could see which Beatles song was the world’s most popular one when their catalog became available on iTunes in November 2010. During the first month of availability, ‘Here Comes The Sun’ was the most requested song. In the medical world, some–but not excessive– sun exposure is […]
|
global_01_local_1_shard_00001926_processed.jsonl/71378
|
Jimmy Eat World return with two new songs, “Love Never” and “half heart”
Jimmy Eat World return today with two new tracks. “Love Never” and “half heart” mark the Arizona emo outfit’s first new music since dropping their album Integrity Blues back in 2016. Take a listen to both tracks via their corresponding videos below.
Check out their upcoming tour dates HERE.
Content Goes Here
|
global_01_local_1_shard_00001926_processed.jsonl/71382
|
Scouting Report: SuperSeries AAA-Boston Breakout (U14) Part 1
AHR CS scouts watched the Boston Breakout on September 7-9, 2018 in Boston, MA after which the following scouting notes were turned in: Boston Advantage U14 | Boston Jr. Eagles AAA U14 | Boston Jr. Eagles Elite U14 | Carolina Jr. Hurricanes U14 | CarShield AAA U14 | Colorado Thunderbirds U14 | East Coast Wizards U14
|
global_01_local_1_shard_00001926_processed.jsonl/71391
|
This is a Golden Age of Measurement ScienceThe American Chemical Society (the world’s largest scientific society by membership!) has published a document titled Top Ten Trends Driving Science, which summarizes in an intelligent and engaging way the main processes and trends in the contemporary society that drive the scientific research. The explanations are supported by numerous quotes from leading scientists.
Of specific interest for our study programme is the trend No 2: Big data is more essential than ever, is which supported by quote from Jonathan Sweedler, Editor-in-Chief of Analytical Chemistry, stating among other things: This is a Golden Age of Measurement Science!
All the best wishes to all measurement scientists – both chemical and physical – everywhere in the world!
Leave a Reply
|
global_01_local_1_shard_00001926_processed.jsonl/71430
|
Top Pikesville Health Care Power of Attorney Attorneys Near You
Pikesville Health Care Power of Attorney Information
Are You Considering Creating a Health Care Power of Attorney?
If you have a debilitating health issue that may render you incapable of making informed decisions about your medical care, a Pikesville lawyer can help prepare a health care power of attorney for you and assist with getting the document properly executed.
The Scope of a Health Care Power of Attorney
A health care power of attorney is a document by which you give limited temporary authority to another person to act on your behalf. You specify in writing that the person, to whom you designate as your health care agent, can make decisions regarding your medical treatment and health care.
Best Time to Seek Legal Help
The Importance of a Good Consultation
How to Find the Right Attorney
Common legal terms explained
Lead Counsel Rated Attorneys
|
global_01_local_1_shard_00001926_processed.jsonl/71446
|
Arabic on the Internet: Transliteration: Using Latin Characters for Arabic
Can you understand this?
"9aba7 el kheir...Ya alf nhar abya'9"
This says in Arabic:
يا صباح الخير ... يا ألف نهار أبيض
Which is actually a newly emerging "folk-standard" that has been evolving in the later half of the 1990s, whereby the Arabic language can be represented using the Latin alphabet. This seems to have started using Usenet and E-Mail, but really caught on on the chat services: mainly IRC and ICQ.A language is mainly phonetic (sound-based) and most languages of the world have not been represented in writing until recent times, and therefore, representing languages in different character sets is possible.It has been used in the past due to various reasons (political, ease of use, ...etc.) Recent examples of this include the representation of the Turkish language in a Latin-based script, instead of the Arabic script used for hundreds of years, and the Malay language used to be represented using both Arabic and Latin scripts.There are a few variations and not a single standard, depending on the virtual community that evolved this standard. Therefore different networks in IRC may use different standards, and even different rooms may have their own dialects. However, there is a lot of "cultural borrowing" going on as people span networks and rooms.This is a perfect example where the Internet is giving rise to new cultures.To predict the future: Will we ever see the day where Al Ahram or Ash-Sharq Al Awsat Newspaper published in Latin characters? Maybe not in the near future, but yet again, maybe sooner than you expect...You can also read a detailed table with Latin to Arabic transliteration.I have discussed the rise and fall of non-English writing in internet communities in a separate article.
Arabic Transliteration
This about an exciting new free product called eiktub.
eiktub is an Arabic transliteration pad. It replaces Latin script by its Arabic phonetic equivalent in a smart manner such that the Arabic script is deducible from the English transliteration unambiguously and without necessarily understanding the meaning of the Arabic text.
The software can be downloaded from
There's also a Lite web-based version of the software that can be used online at at with no need for download or installation.
Hope you find these tools helpful.
Arabic / Latin Transliteration
I appreciate all your work to deliver such a usefull software "eiktub", and I have a similar final project at my university so I ask you some help about the right algorithm that can allow me to make the conversion between latin charachters and arabic one's, especially those which have more than one option to display in a drop down menu where the user can select his exact word.
I wish that you may respond to help me succeed in my final project and I'll be so thankfull.
Thanks for your understanding and concern.
what does this mean?
Ana 2d el kawn sht2tlak ?
plz mail it to me :)
انا قد الكون اشتقت لك
I miss/long for you as big as the universe.
Eiktub translantion
Can someone please translate this for me.
1)ana ghanmchi lkhdmata lghda inchalah ila knti online wnhdro chwi.
2) ghir lfr9 dial lw9t wssafimnin kankoun ana onlin katkouni nti n3ssti.
could u translate this for me in english please thanks so much
fkree..slee slat al estekharah..es2lee lina ..odle estkhere enshalh rbna beserha m3k...eza bdek a7kee m3ek eb3tele rakmek o ae o2et bt7bee a7kee m3k obts2lene sho bt7be t3rfe 3ne o ana kman b2reb mnek aktr o bn3rf b3ad akta...eza bt7be t7kee m3 my sister Quson i will give u her no. a3tee 7alek forsah ..oa3tene amal bhaldnya ene akon m3 albent ele 7bha albee oma 3erf y7eb gerha..m3 albent ele ektreta wma bde akon ele elha,,,l2ne b7bha b7bha kteer
Assuming your are in Italy, and he is in some Arab country, he is a scammer trying to pose as someone who is in love with you.
|
global_01_local_1_shard_00001926_processed.jsonl/71458
|
Chris Cannin
Nui Dat
Jan 1967 - Jan 1968
My tour of duty in Vietnam commenced as a reinforcement soldier to the 6th Battalion in January 1967 and then the 7th Battalion in June. As a reinforcement soldier, it was a daunting experience to assimilate and be accepted as the ‘new boy’ into a group that had already been together for some months on operations. My role in both battalions was M60 machine gunner in the rifle section. The M60 being a large weapon, I always travelled sitting in the open door of the helicopters when flying to and from operations.
Service No. 44007
|
global_01_local_1_shard_00001926_processed.jsonl/71469
|
Homework and Scientific Notation
2 teachers like this lesson
Print Lesson
SWBAT to chose homework that best helps them succeed.
Big Idea
We can add choice to our homework routines and help students take ownership of the homework process
Why homework?
30 minutes
Whenever we assign homework that doesn't address the many needs of our diverse classes, we lose an opportunity to reach our students. I like to have at least one lesson in every quarter that helps students understand and plan for the choices they have for homework in my class.
I always start this lesson by talking about "the problem with homework":
Source URLhttp://youtu.be/ESwJv0ftsjM
Its not a lecture as it is in the video, but a discussion of observations from the class. I constantly ask them for their ideas on improving the way I teach. One big shift for me has been to give students more choice in their homework and to try and give all the homework assignments at the start of a unit. The other goal is to help them keep track of their work and understand at all times how their grade is going in homework.
The first step for me was to pick all the assignments I would like to give in a unit. This type of backwards planning always helps illuminate the goals of a unit and puts my lessons into perspective. I don't know the exact due dates for the assignments, but I do know what the assignments are. We fill in the assignment dates as we go.
Here is an example of a tracking sheet: sample homework tracking sheet
This video reflects the usual conversation we have on the tracking sheet:
Source URLhttp://youtu.be/75dk-m9sy-4
Homework Choices
30 minutes
For choice, I usually offer 3 levels of difficulty as well as recreational problems and topics that go outside the typical common core curriculum. For each assignment, I ask students to pick a category that would best help them in class. "Mild" problems simply review class basics. "Medium" problems mix it up a bit and "Spicy" problems add rich layers of complexity to the class work.
One major component of this system is to include students in the homework grading process:
Source URLhttp://youtu.be/csC5R7LHMhs
I review these ideas at the start of big units to help students get ahead in the material. They always get confused with homework policies (each teacher seems to always have slightly different policies) and they need time to get organized. So in this lesson, we talk about homework and then take the full period to start the homework.
Here is a ink to frequently asked questions:
I would give the link to my scientific notation homework assignments, but they are always changing. So I will give the links to the videos for each assignment (I always provide video support) and include the pdf's in the resource section. I also recommend the open source site CK-12. They have great question banks in the flex books: http://www.ck12.org/
Here are the links to my most recent homework set, which was numbered #3,4,5 and 6. The other homework assignments were based on different categories.
HW #2: Complete 2 of the 3 problems from Homework 2 - scientific notation
HW 2 Videos:
HW #3: Complete 2 of the 3 categories from Homework 3 - scientific notation
HW 3 Videos:
HW# 4: Complete 2 of the 3 categories from Homework 4 - scientific notation
HW 4 Videos:
HW#5: Complete BOTH categories from Homework 5 - scientific notation
(I want you to finish everything for this homework)
HW 5 Videos:
|
global_01_local_1_shard_00001926_processed.jsonl/71472
|
Where the world comes to study the Bible
Kenneth Boa: 60. Ephesians [] Part of the series: Visual Survey of the Bible.
Bob Deffinbaugh: 1. The Uniqueness of Ephesians Among the Epistles []
Mark Dever: Grace: The Message of Ephesians [] Capitol Hill Baptist Church.
Ray Stedman: Ephesians: The Calling of the Saints [] Peninsula Bible Church. Spanish translation available.
John MacArthur: Ephesians 64 lessons.
Kenneth Boa: Ephesians [] 53 lessons.
Bill McRae: 40. Ephesians []
Steven J. Cole: Ephesians [, ] 63 lessons.
Bob Deffinbaugh: Ephesians: The Glory of God in the Church [] 32 lessons.
: [, , ] 17 lessons.
Mark Dever: What's God's Will? [] 7 messages. Capitol Hill Baptist Church.
Tommy Nelson: Ephesians, The Church: The Glory of Christ and God’s Eternal Purpose [] 24 lessons. Denton Bible Church.
Ray Stedman: Riches in Christ [, ] 17 lessons. Ephesians 1:1-3:21. Peninsula Bible Church.
Ray Stedman: The Ministry of the Saints [, ] 9 messages. Ephesians 4:1-6.
Ray Stedman: The Christian in the World [, ] 9 messages. Ephesians 4:17-5:20.
Ray Stedman: Christian Relationships [, ] 4 messages. Ephesians 5:21-6:9.
Ray Stedman: Spiritual Warfare [, ] 9 messages. Ephesians 6:1-20.
John Piper: Faith And Everyday Life: Ephesians 4:17-5:20 [, ] 8 lessons.
Lehman Strauss: Ephesians []
Women's Studies
Sue Bohlin: Spiritual Warfare [, ] 6 lessons.
Sandra Glahn: 3. Adopted as God’s Child [Curriculum] Part of the series: Your Worth in Christ. Ephesians 1:4-5.
Vickie Kraft: Lesson 3: Creation and Fall [] Part of the series: Basics of Christian Faith.
Children's Studies
Jodi Hooper: 3. The Armor of God (Ephesians 6:10-18) [, , , Curriculum] Part of the series: David.
Kenneth Boa: Paul's Four Life-Changing Prayers []
Charles T. Buntin: Appendix 1 The Holy War--A Spiritual Warfare Primer
Steven J. Cole: Christian Family Living [, ] 13 lessons. 1, 3, 4, 7, and 12 from Ephesians.
Lesson 2: What Does it Mean to be Saved? (Ephesians 2:8-10) [, ] Part of the series: Evangelism. Ephesians 2:8-10.
Scott Cunningham: In Christ, With Christ, Like Christ, For Christ []
Bob Deffinbaugh: 5. Spiritual Gifts in the Book of Ephesians [, ]
8. Discipleship in Ephesians: What Happened to the Term "Disciple?" []
J. Hampton Keathley, III: The Unity of the Spirit (Ephesians 4:1-6) []
Hampton Keathley IV: Love Your Wife Sacrificially (Ephesians 5:25-27) []
One Baptism in Ephesians 4:5 []
Bill Lawrence: Fathers Are for Freedom Ephesians 6:4 [, ]
Center for Christian Leadership: 1. Christian Integrity and Community []
7. Identity in Christ []
William Luck: 11. Apostolic Teachings Part of the series: Divorce and Re-Marriage: Recovering the Biblical View.
Steve Sanchez: Better Spiritual Vision is a Prayer Away (Ephesians 1:3-21) []
Charles Haddon Spurgeon: 15. Prayer — Its Discouragements And Encouragements No. 2841 []
Study Helps and related
Tom Constable: Tom Constable’s Expository Notes on Ephesians [] This is also available in the Study Environment.
Greg Herrick: The Book of Ephesians []
David Malick: An Introduction To The Book Of Ephesians []
An Argument Of The Book Of Ephesians []
Selected Bibliography On The Book Of Ephesians []
: [] PowerPoint
Daniel B. Wallace: 10. Ephesians: Introduction, Argument, and Outline []
|
global_01_local_1_shard_00001926_processed.jsonl/71482
|
RE: Organizing the open source troops in healthcare
<ed.note>Vanity blog post du jourThey like me; they really, really like me! I guess this makes me a Virtual Community Organizer — if only people valued such a thing. Or maybe I'm a 'marketing technopologist'. <Doddsism> People (Amuricans, especially) generally don't know what they value until they are required to place a price on it. </Doddsism> Seriously, my linkedin "open" groups invites here. If you are serious about open source, especially in healthcare, let's get the discussions going about its potential role in the new administration. Thanks!</ed.note>
|
global_01_local_1_shard_00001926_processed.jsonl/71489
|
Some basic PDF hyperlink support
I’ve started to add some hyperlinks to the multipage PDF output, now that CairoGraphics and PyCairo support this.
For now only the “next page” arrows on the edges of the detail map pages are linked to the target pages in the PDF:
UPDATE: The page rectangles on the overview now link to the detail pages, too
Continue reading “Some basic PDF hyperlink support”
40,000 maps rendered
Last week this MapOSMatic instance processed its 40,000s map request, for a map of Sindelfingen, Germany.
While request numbers per day are fluctuating quite a bit there’s an obvious, but slow upwards trend, with typically over a hundred requests processed per day.
Fun fact: over the last year activity slowly shifted from peaks on weekends to higher activity on regular weekdays.
If you want to have a look for yourself: here are the Munin monitorign graphs
Upcoming Downtime, New Server
I’m preparing to move to new (faster and more affordable) server.
If all goes well I’ll move services over to the new machine on Sunday evening (September 30th, 18:00UTC).
During the switchover the service will be offline for an hour or two, for moving over existing rendering results to the new machine and doing some testing.
After that rendering should be a little bit faster as all databases will fit on the machines SSDs then, and there will be enough “rotating rust” HDD space for keeping rendered results around for a few months instead of just a some two weeks again.
HTTP api now live, and new, shorter host names
The first public version of the HTTP API is now live, allowing you to submit render request from within your own applications.
Also new, shorter, host names now exist to access the service, instead of you can now also use and , all of these being aliases for the same MapOSMatic instance.
There’s also API documentation, including a few simple PHP example programs, available as HTML and PDF
|
global_01_local_1_shard_00001926_processed.jsonl/71492
|
How to moderate content in just one glance with Confluence
Posted by Ted Mahsun on May 31, 2018
Find me on:
We’ve talked before on this blog about how content can easily get out of control in Confluence. With so many contributors creating and editing documents at the same time, a Confluence admin could easily lose track of what’s what.
Imagine you’re the lead technical writer, managing a team of writers who are constantly editing documents on Confluence. As the lead, you are likely to face the end of a day with a long list of email notifications of edits and changes that were made. There’s just no easy way to see all relevant document edits and definitely no way to track metrics. And if you’re managing multiple spaces at once, it can quickly become a nightmare trying to keep up with everything your team is working on.
What if we told you there’s a way to easily moderate all that content directly in Confluence, and with just a glance on one centralized page? Something like, say, a content moderator dashboard?
It’s definitely possible, if you combine the best of ServiceRocket’s Reporting (powerful reporting on metadata), Scaffolding (forms and templates for your password entry), and Linking (useful linking tools for Confluence metadata and content).
With the macros made available by these add-ons, it’s easy to build a one-stop Content Moderator Dashboard.
Content Moderator Dashboard
To find out how to build a Content Moderator Dashboard like this in Confluence, visit our Use Cases page for a sample content ready for copy-and-paste or try it out yourself at our Demo site.
Try our apps for free - separate or together!
Scaffolding Symbol 144pxw.png Reporting Symbol 144pxw.png Composition Symbol 144pxw
Topics: Linking, Reporting, Scaffolding, Content
Subscribe To
Our Newsletter
Interested in writing for the Software Adoption Blog?
Find Out How ➝
Recent Posts
Posts by Topic
see all
|
global_01_local_1_shard_00001926_processed.jsonl/71502
|
A Cure for CTP Madness
Brad Abrams and Jason Sutherland have come up with a nice little site on Channel 9 which keeps track of compatible versions of CTP's. The utility uses your browser caps to see what you already have installed, and publishes an XML file that shows valid combinations. Check it out!
The other suggestion I gave Brad/Jason on this which I'm hoping the community will build is a "Make It So" option. Basically I want a tool that takes (a) my current machine state, and (b) a new CTP I really want to target, and generates an uninstall/download/install script for me that leaves my machine up and running with all the right stuff. Should be pretty easy. Say a CLR Cup<T> mug to the first person to post the sample? I'll send you two if you write it using IronPython <g>
[edit: fixed URL to Channel9 site]
Comments (5)
1. Andrew Fung says:
The link goes to an internal server?
2. Our friends over at Channel9 just posted a cure for CTP Madness… &nbsp;&nbsp;Here is an excerpt from…
3. jasonz says:
Ok, I could act like this was planned but the truth is I jumped the gun on the original post (it’s just so cool!). My apologies to Brad/Jason 🙁 The real *public* site is now live and I’ve updated the URL above.
4. Darrell says:
I love IronPython (well, Python too for that matter), but when are we going to get integration with Visual Studio?
5. jasonz says:
Darrell – Glad to hear you love IronPython. Wrt VS integration, we don’t have any plans we are ready to announce at this time. Make sure and stay plugged in to the users-ironpython.com newsgroup to hear any new news first…
Skip to main content
|
global_01_local_1_shard_00001926_processed.jsonl/71503
|
Getting started with DataWeave: Part 1
September 3 2015
Getting started with dataweave part 1
Data transformation is an inevitable component of connectivity, as most systems don’t speak the same language. Even when the format is similar, as when two RESTful Web APIs exchange JSON payloads, their message structure typically differs, making translation a necessity.
In this the first of a four-part series:
on our new data transformation engine, DataWeave, we will help you learn the basics of this elegant and lightweight expression language. We will first focus our attention on the canonical format which is the immediate result of every expression you execute in DataWeave. In the following posts, we will explore the power of DataWeave expressions and solve some real-world use cases. You can also now view our DataWeave intro webinar available on demand below:
From DataMapper to DataWeave
Those of you familiar with Anypoint Platform will know DataMapper, our first solution for providing a graphical drag and drop approach to data transformation. We learned, based on customer feedback, that users were looking for a more powerful transformation engine. With DataWeave, we coupled the transformation engine with the Mule runtime engine to ensure high performance, adopted a language first approach and designed the language with a simple JSON like syntax. As a result, it costs a fraction of the time to write a DataWeave expression compared to a similar use case in DataMapper.
Development Environment
As part of the design time experience for DataWeave you now have the facility to indicate to DataSense the structure of every message by explicitly setting it in the Metadata tab which is present in the other Message Processors. You should also be mindful of the mime-types of the Message data you have to transform. When this is not set explicitly at design time and when you use any of our Connectors, this will default to application/java. For HTTP requests and responses Mule will look at the Content-Type header and set it accordingly. You should set the mime-type explicitly when you are using the set-variable and set-payload processors. Failing to set the mime-type explicitly for xml content will result in it being interpreted as a mere Java string by the engine. Screen Shot 2015-08-30 at 6.21.46 PM Anypoint Studio presents a DataWeave editor with 3 panes. On the left, DataSense displays the structure of the incoming message, together with any example data you have provided. On the right pane, the expected outgoing structure is displayed as per DataSense as well as the design time result of your transformation which constantly refreshes itself as you write the expression. Screen Shot 2015-08-22 at 3.19.49 PM The middle pane is the transformation pane. This is divided into two sections. The header is where you declare the mime type of the output of your transformation. You can also declare reusable functions and global variables as also namespaces for xml use cases. At a minimum you must declare the %dw 1.0 header and the output mime-type. Below the dotted line is where you author your expression. You only need one expression. There are a number of expression types, but for the majority of your transformations, you will use a semi-literal expression of a DataWeave Object. The same DataWeave transformer can produce multiple outputs from the same incoming Message. You do this by clicking on the plus circle at the bottom right of the transformation pane. Doing so will present you with another transformation pane and you are free to specify a different target (flowVars, etc.) by choosing a different Output from the drop-down at the top of the transformation pane.
Literal Expressions
There are only 3 data types that can result from any DataWeave expression: Simple Types, like Strings and numbers, Arrays and Objects. Each of these can be expressed literally: Screen Shot 2015-08-31 at 7.15.25 PM You will typically use semi-literal object expressions to define your transformation. To understand this, first consider the example object literal on row 2 above. A DataWeave object is a sequence of key:value pairs. The key is a string without the quotes and the value can be either a simple type, an array, or an object. However, you are not obliged to express the keys and values literally. You can use any expression that returns a string for the key and any expression at all for the value. There are a number of different expression types available to you. We will explore more of these in the next parts of this series. For now we concentrate on the combination of literal expressions and variable references.
Variable Reference Expressions
Key to learning DataWeave is an understanding of the normalization of data which occurs whenever variable references are made to the payload or flowVars, sessionVars, recordVars, inboundProperties or outboundProperties. These expressions convert the incoming data into the canonical DataWeave format. Hence, it makes no difference if your incoming data is JSON or XML or CSV or Java, as these will always be resolved to DataWeave simple types, arrays or objects. You do well to think only in terms of DataWeave data types as these set the context for your expressions and are the result of each expression. Here is an example of how an incoming XML document is resolved to an object. Note the convenient learning experience afforded to you when you declare the output to be application/dw. Screen Shot 2015-08-30 at 11.47.00 AM Note how each element in the xml is normalized as a key:value pair in the object. When the content type of an element is complex, then its normalized value is itself an object. Note also that repeating elements are normalized as repeating key:value pairs. Consider the following CSV. It is normalized as an array of Objects with key:value pairs that correspond to the name of the header and column value respectively. Screen Shot 2015-08-30 at 8.36.33 PM Now, take a look at the result of using a semi-literal expression which wraps the same payload in an object which declares both the forecasts and the city for which they were made: Screen Shot 2015-08-30 at 8.34.58 PM
Output Rendering
The DataWeave engine separates the actual transformation process within the canonical format from the final rendering of the same in the output mime type you defined in the header. It does not matter how complex your expression is. If it’s an object with deep nested structure and expressions and operators which combine expressions, all of these must be executed first and return their value before the outer expression returns its value. It is this final value which is rendered in the output mime-type. You need to be mindful of the constraints imposed by your choice of mime-type. Arrays will not be rendered in xml. You should choose to repeat keys instead. Likewise, repeating keys cannot be rendered in Json. You should generate arrays instead. To render an object to XML, in line with the rule that XML documents may only contain one root element, the object may only contain one key:value pair. Its value can, as we have seen, itself be an object of any complexity. Consider the above transformation, modified accordingly to render a valid XML document. Screen Shot 2015-08-30 at 11.07.17 PM
Watch our DataWeave webinar
In the Next Post…
With these basics in mind, our next post, Getting Started with DataWeave: Part 2, will delve into the powerful Selector expression for object and array navigation and we will look into iteration and conditional logic for dynamic data generation.
We'd love to hear your opinion on this post
|
global_01_local_1_shard_00001926_processed.jsonl/71508
|
The Values of ZenCash and Blue Frontiers: Robert Viglione - Episode 14
May 22, 2018
The guest of this episode is Robert Viglione, co-founder of ZenCash. In this friendly conversation with our Seavangelesse, Nathalie Mezza-Garcia, Robert speaks of the long-plans of ZenCash, its partnerships and, of course, seasteading. This chat is a one hour conversation about why and how the value of ZenCash align those of Blue Frontiers and of seasteading.
0:00 Intro of Rob Viglione
0:26 How is ZenCash relevant for liquid democracy models of governance in seasteading
3:44 Professionalization of blockchain
5:22 ZenCash’s company departments
6:55 Rob’s life as an academic
8:31 Why the rejection towards the blockchain space
10:13 Why Rob loves seasteading so much
11:11 Rob’s prediction about the future of seasteading
12:00 How the values of Seasteading and Blue Frontiers match the values of ZenCash
12:54 Floating Island Project in French Polynesia
13:35 Once you go crypto, you don’t go back
14:31 Governance through uses of blockchain on seasteads
16:17 Rob did the first Bitcoin transaction in Afghanistan
18:33 Exiting and a post-ideological world
18:59 Decentralized governance brings security
22:13 Why reducing complexity makes no sense
24:30 Inequalities and decentralisation in crypto projects and the world
28:37 Why nation-states are violent systems that don’t work
31:57 Selective transparency; the future
33:52 ZenCash’s public Trello Roadmap
36:50 Open source or not open source?
42:06 Evolving systems to create multiple DAOs competing
43:40 ZenCash and Seasteadings are the best friends in the world
44:38 First Tahitian Seasteading Gathering 2017
46:35 The effects on a world with seasteads
47:49 Ideal properties of a community and the importance of humility
51:38 Hero Engine World, Ethland, Blue Frontiers and Rob’s projects
53:59 Keep Calm &…
55:02 The Varyon, the cryptocurrency of seasteads
57:21 “our parents’ generation was all hippies…but they were poor hippies. We now wit cryptocurrencies can afford to make this stuff a reality. We are going going to create a more peaceful happy clean world”
59:20 How to join Blue Frontiers community on Telegram
–––––LEARN MORE–––––
|
global_01_local_1_shard_00001926_processed.jsonl/71519
|
Read Harder Challenge: Read a Book with a Main Character That Has a Mental Illness
Sharifah is here with books with a main character that has a mental illness for the 2016 #ReadHarder challenge!
This video is sponsored by The Beauty of Darkness by Mary E. Pearson.
Check out the full 2016 Read Harder challenge details.
Books Mentioned:
Hyperbole and a Half by Allie Brosh
White is for Witching by Helen Oyeyemi
Challenger Deep by Neal Shusterman and Brendan Shusterman
Skim by Mariko Takami and Jillian Tamaki
|
global_01_local_1_shard_00001926_processed.jsonl/71541
|
Session 2003-087 with Milford Public Schools
The School
School Name Milford Public Schools
School Homepage http://www.milforded.org
Location Milford Connecticut, USA
Community Suburban
Type Public
The Class
Subjects Taught all
Grades Taught 5
Number of Students 12
The Project
Project Title Teacher Training
Insects To Study any specimen
Project Description During a week long intensive workshop grade 5 teachers learn about integrating technology into the curriculum. As 5th grade has a unit on Microorganisms and microscopes we would love them to see a demo of Bugscope. If they have the opportunity to give this a try and like it they could write their own proposals for using it with their students.
Where did you hear about Bugscope? In Edhelper we discovered it.
Live Session Transcript
|
global_01_local_1_shard_00001926_processed.jsonl/71550
|
Century Hardware Solid Brass, Pull, 3" c.c.
Cabinet Hardware Explained – From Decorative to Functional
Today’s cabinets vary as much in style as they do in functionality. Although styles can range wildly from simple big-box manufactured face frame cabinets with slab panel doors to intricately crafted custom cabinets hewn from the hands of generations of craftsmen, some things just never change. The cabinet hardware that makes these cabinets both functional and decorative is virtually universal throughout.
Yes, there are minor differences in cabinet hardware from one style of cabinet to another, however, the major types of hardware can be found in any style or construction of cabinet. The two main types of hardware are decorative and functional.
Decorative hardware, sometimes referred to as surface hardware, consists of the pieces that are mounted to the outside surface of your cabinet doors and drawer fronts. They not only provide the means with which to open your cabinet doors, they also give your cabinetry that finishing touch. The various types are:
*handle pulls
*cup pulls
*ring, bail and pendant pulls
Handle and cup pulls are rigid and require two mounting screws to attach to the cabinet door or drawer front. Bail pulls also require two mounting screws, however, they can be rigid or swinging type bails. Knobs are just simple post-pulls that require one mounting screw. Ring and pendant pulls can be rigid or swinging and normally require one mounting screw although some may require two with a small center-to-center measurement.
The mounting hole spacing measurement is the most important measurement of a cabinet handle pull if you are replacing existing hardware. This measurement is taken from the center of one mounting hole to the center of the other, thus it is called the center-to-center measurement (abbreviations include: C-C, C/C, CTC). Obviously if you are replacing existing cabinet pulls, you will need to match your new hardware center-to-center measurement with that of the holes already drilled into your cabinet doors. Common measurements are 3″, 3-1/2″, 96mm and 4″, however there are many more than just those four.
Functional hardware consists of the hardware pieces that make your cabinets do what they are suppose to do. Doors open and close, drawers slide out and back in, giving you access to the items you have inside. Basically, if your cabinets didn’t have any of this type of hardware in and on them, they would be pretty useless. These types include:
*door hinges
*drawer slides
Door hinges are simply the hinges that connect your cabinet doors to the actual cabinet but as simple as their function is, the types, sizes and options abound. The three main distinguishing types of cabinet hinges are concealed, semi-concealed and non-concealed. These all can come in a variety of opening angles, swing types (free-swinging vs. self-closing), overlay sizes, insets as well as finishes.
Drawer slides are the pieces of hardware that allow your drawers to slide in and out. They are sometimes referred to by other names such as drawer guides, drawer glides, drawer runners and drawer tracks. The three main types used on cabinets are: side-mount, side/under-mount and under-mount. These types can be further classified by the distance they allow a drawer to be opened such as 3/4 extension, full-extension or over-travel extension.
Cabinet hardware is not very complicated on the surface. It is the many options that these basic pieces come in that gets a little more in-depth, too in-depth for this simple primer on cabinet hardware.
Visit us at: www.KnobsHingesandMore.com
|
global_01_local_1_shard_00001926_processed.jsonl/71571
|
Princeton University Library Catalog
Uncertainty Quantification for the Gaussian Information Bottleneck
Cai, Regina [Browse]
Senior thesis
Vanderbei, Robert [Browse]
Princeton University. Department of Operations Research and Financial Engineering [Browse]
Class year:
66 pages
Summary note:
This thesis applies techniques of uncertainty quantification to a low-dimensional case of the Gaussian Information Bottleneck (GIB) model. The GIB model has an input parameter of the joint probability distribution governing the relationship between the past X and the future Y , characterized by a 3x3 matrix, and has an output parameter of a 2x2 projection matrix mapping of X to a compressed version T. The output matrix is characterized by the values of its individual elements and by its rank, since at least one of its rows consists of a zero vector. Both theoretical and empirical analysis is conducted to determine how uncertainty in the input parameters affects the distribution of output parameters. The theoretical analysis finds analytic expressions of sensitivity in the output matrix to the input matrix and discusses theoretical underpinnings for these expressions. The empirical work finds that the significant errors in estimates of the output parameters should warrant the use of uncertainty quantification in experimental work.
|
global_01_local_1_shard_00001926_processed.jsonl/71582
|
Catharine van Ingen: Software Architecture, Global Warming, MIPS and Hydrology
Sign in to queue
The Discussion
• User profile image
While the content is interresting, the format of the show is not good.
Whoever does this, please reconsider how its set up. Its too artifcial or however you would say it.
• User profile image
I'm not sure it's bad to be a little artificial. These are not conversations with people about what they're working on, but rather mini-biographies of Distinguished Engineers for both internal and external marketing purposes. I, for one, like them as they are, though perhaps I'd like to see a slightly less stiff interviewer.
I think this interview was the best one yet for Behind the Code, because I feel like the interviewer is getting the hang of it more and CvI seems to be a really interesting character. She reminds me a lot of one of my favorite teachers: quirky, driven, and not afraid to speak her mind whether it's politically correct or not. Her cowboyish attitude is probably dangerous in general if applied everywhere in a software project, but it seems like she and her team were skillful eough to pull things off without breaking too many people. I think Rob Short used her data structure in his Behind the Code show as well... hmm...
• User profile image
I like the series and wish Channel 9 would do some as well. Smiley
What ever happened to the Friday show that Rory did a pilot? Perplexed
• User profile image
Problem is that you can see that the presenter already seem to know everything.
I like the C9 way better. Let the actual person tell his/her story, rather than the presenter.
• User profile image
Chadk-i would disagree with your coments. i like the format of these interviews.
What i would think interesting is to hear some phylisophical ideas from people like these who are interviewed in behind the code. you know the kind of ideas, the ones that arent nesisaraly formulated, or fully thought out, the kind of thoughts that if you shared them they might not come out complete, what it is the person thinks of when they are "cooking". the thoughts and ideas it takes to get to making up a formal idea that is then shared. or maybe they are whole ideas, just to radical to think any one would be able tomake scence of them or take them seriously.
• User profile image
For those who are uncomfortable with the format of the show, please remember that this is a show... That is, it does not represent a new way of doing things on Channel 9. It's just another way of presenting content that is more formal and produced than our typical stuff. The typical stuff is not going way. New stuff will continue to show up.
Think "Channels" 9 Smiley
• User profile image
Well, having gone through this not too long ago I thought it might be useful for people here to know kind of how the show is made.
A couple months before the taping, shortly after agreeing to do the show, the guest to be gets some emails requesting information. It's not exactly a resume request but basically it's people they should talk to, background information, an outline of interesting events that happened to you, stuff like that.
During the next couple of months, they meet with people you suggested to get some background, and they have a couple of meetings with you to talk about those same things. That's a good time to collect pictures or other keepsakes that might be interesting to highlight on the show.
In the week before the taping you have a final walkthrough where they show you the studio, where you will arrive, who the people working with you will be and so forth. All the logistics.
Then there's the taping. It's about 90 minutes of taped show. The host (Keith) never tells you exactly what he intends to ask but you sort of know what the questions are likely to be because you gave them all sorts of seed information. You don't know which people they talked to ended up giving the best interviews. Basically he could ask anything about your life that he thinks is interesting. The only thing you know for sure is he's gonna go mostly chronologically.
After the interview there's Q&A with the audience, and then you're pretty much done.
The show folks edit the 90 minutes down to an hour, so they save your best stuff and probably the best question or two. The rest ends up on the cutting room floor. Which is probably good because probably invariably the guest ends up thinking one of his/her answers was lame and it's just as well that the world doesn't have to suffer through it.
After the show airs, they show it formally here in house a couple of times and you do live Q&A.
A few months after that, it's someone else's turn and you're officially a Behind The Code has-been like me Smiley
So, the interview itself is pretty candid, but the environment is very professional. They had a makeup person for me and so forth and I'm sure my skin has never looked so perfect since and may never again. A very professional looking person used a light meter in my presence, and there were two high quality cameras running at all times.
In contrast, Charles has interviewed me a couple of times and it's much more informal, you get whatever happened that day pretty much however it came out, editing is very light, and we do the best we can in the environment that we have. Channel 9 is great for that real life feeling. Makeup and lighting persons are nowhere to be seen -- unless Charles uses one Smiley
So, it's not like there's a script for Behind the Code but there is considerable planning.
Does that help?
Add Your 2 Cents
|
global_01_local_1_shard_00001926_processed.jsonl/71604
|
The Blank World
Emma could not believe what she saw in front of her. She looked up, she looked down… She looked everywhere: nothing. Everything was blank. The world seemed to have been paineted in a peaceful white.
Emma was a girl who lived in Texas. The day this happened was indeed, special. It was her birthday. That day, she had turned fourteen. Before ”the blank world thing” happened she had been enjoying herself a lot by dancing and other activities she found entertaining.
The girl was shocked. Unfortunately, she could not be very shoked because she was so tired from the dancing, that she could not scream too loud or do other things involving very loud sounds. She started exploring the white world, but in the same time, she started to like it. It it was peaceful an it was giving her a very dreamy mood.
After 2 months of living there, she realised that it was much better than the other world.(Un)fortunately, she suddenly saw something black. Right then, she woke up in the real world.
Later, she found out what happened : her brain nearly exploded from the dancing, and she had been in a coma.
The years passed. She was a successful business woman.
The only thing she could think of was the peaceful, white world.
|
global_01_local_1_shard_00001926_processed.jsonl/71618
|
Scaling Out Real Project Database With SQL Azure Federations.
Application Scaling
Scaling application in cloud is a burning issue. The very concept of cloud technology implicates on-demand application scaling. Any decent cloud provider supports respective functions.
Why is scaling out so important? We have several options regarding to increasing application performance. We can buy new server hardware, add more RAM, and so on. This is vertical scaling, or scaling up. However, this option can be pretty costly, time-consuming, and has its limits. You can go for cutting-edge technology, but it can still be insufficient for your application.
The second option is horizontal scaling, or scaling out. It implies extending the computing power of the application by increasing the number of servers where the application is located, or application instances in case of PaaS. In other words, if the application is located on one server, and at some point it stops "pulling its weight", we can simply buy another server, identical to the first one, and install our application on it. This way, the queries to the application will be divided between the two servers.
This is the fundamental principle of scaling out applications hosted in a "cloud", but instead of real physical servers, we have the notion of a virtual machine. When one copy of a virtual machine becomes insufficient for our application, we can increase the performance by distributing the workload between several virtual machines.
The capabilities of Microsoft cloud platform are quite broad. They include auto-scaling and on-demand scaling, which are available through a user interface as well as through SDK, REST API and PowerShell.
Although scaling applications (PaaS) or virtual machines (IaaS) is simple - just define the necessary number of instances and you got them - more questions will arise if your application uses MS SQL databases. The first thing that comes to mind is to create a cluster of virtual machines with SQL Server. This solution is relatively simple and widely known. But what if the application uses the database as a service (SaaS)? And what if we don't want to fiddle with setting up an SQL Server cluster?
Since we are dealing with Windows Azure, the SQL database should be SQL Azure. This database supports a scaling out technology (sharding) called SQL Azure Federations. It is very simple: logically independent lines of one table are stored in separate databases. A simple example:
This is one and the same table, but its data is stored in separate copies of the database (shards). The account information with ID 1 is stored in the first database, with ID 2 - in the second one, and so on.
What do we get from all of this? First of all, data isolation. There is no connection between data from one account and data from another. Thereafter, sharding allows us not only to scale out databases, but also to implement multi-tenant scenarios. Since the amount of data stored in a specific shard is significantly smaller than the total size of the database, data retrieval is much faster.
SQL Azure limitations
Every technology has its drawbacks, and sharding is not an exception. Let's consider what drawbacks we may encounter with the sharding technology, using the database described in the example above.
As specified by the SQL Azure architecture, the service does not support data retrieval from several databases simultaneously. One database equals one connection. The shards are not an exception. We would have to run a separate query to return the number of clients in the database for every shard.
Initial Query:
SELECT Count(*) FROM Account
Query for a specific shard:
SELECT Count(*) FROM Account
The logic of summing up the values returned by this query must be implemented in the application. As a result of using federations, part of the code will "go into" the application, as some of the database-level capabilities of regular SQL Server are limited.
SQL Azure Federations is not a silver bullet, of course. You can always develop and implement your own principle for scaling out your database. Let's assume that the multi-tenant approach is a kind of database scaling out, as one user's data is separated from the data of another not only "logically", but also "physically".
If we need to add new users, we configure separate databases for them. The problem is that the application logic must contain a "routing" mechanism, meaning the application must know which database it is currently working with.
But let's return to SQL Azure Federations.
The idea offered by Microsoft idea itself is worthy to be praised. It would be great to have a tool for scaling out databases quickly and easily. Add to that auto-scaling based on the results of specific queries (but that would be pure sci-fi)...
As a rule, before you make the final decision to start using SQL Azure Federations, you must perform a detailed analysis of the existing database (because you usually port existing databases), or plan out in minute detail the architecture of the database that the application will be using, as well as the logic of the application that will be working with the database.
That's all for now with the theory, but when it comes to practice, there is usually a significant number of obstacles. Instead of learning how easy it is to start using SQL Azure Federations from scratch, we will try to migrate an existing SQL Azure database to using federations. We will observe the steps performed by the DBA, as well as the problems that can be encountered during the migration.
So stay tuned and have a great day!
|
global_01_local_1_shard_00001926_processed.jsonl/71620
|
Lotto buster
I have a cd I would like to copy but everything I tried would not copy the cd
I have tried roxio, clone any cd,game drive , vertual drive and nero 8. I would have purchased another cd but the company went out of business I want some back up cd’s in case something happen to the origenal cd
Try [B]Ashampoo Free[/B] - burn to good quality media like Taiyo Yuden CD-R’s and burn at 24x
Hi draculavp1, welcome to club.myce :slight_smile:
So, if the disc is badly scratched their probably will be problems copying the disc.
I would give IMGburn a try ( Select the option to “create image file from disc”, from there you can write the image file to a disc.
It could also be copy protected as going by the thread title this sounds like it could be a commercial software disc.
|
global_01_local_1_shard_00001926_processed.jsonl/71644
|
three.js with CSS3DRenderer
Discussion created by mogmog on Sep 21, 2018
I am trying to integrate an arcgis javascript visualisation with Three.js. My particular requirement involves rendering some HTML in the 3d space.
In pure three.js, this can be achieved with a CSS3DRenderer, see here
Three.js CSS 3D Renderer
However I cannot get this working in combination with arcgis's externalrenderer.
Digging into the code this might be because Three.CSS3DRenderer does not accept a context as a parameter, so I guess it won't work.
Does anyone have any idea if it is possible to render some HTML in the arcgis 3d space, as per the codepen example linked?
|
global_01_local_1_shard_00001926_processed.jsonl/71661
|
CORD Build 2017 has ended
View analytic
Thursday, November 9 • 11:15am - 11:40am
Production OpenFlow Switches Now Available - Building CORD using OF-DPA Based Switches
Feedback form is now closed.
In this talk, Broadcom will cover the evolution of OF-DPA from its inception to the present day. We illustrate how OF-DPA makes it possible to map OpenFlow Logical Switches to configurable switching pipelines that are available in production quantities today. We also discuss the role of TTPs and other features of OpenFlow (like open specifications and extensibility) that acted as the catalyst for this transformation in networking.
Ashok Raman
Principal PLM at Broadcom
Joseph Tardo
Architect at Broadcom
Thursday November 9, 2017 11:15am - 11:40am
Room 102
Attendees (18)
|
global_01_local_1_shard_00001926_processed.jsonl/71662
|
CORD Build 2017 has ended
View analytic
Thursday, November 9 • 2:40pm - 3:00pm
Programmable data planes, P4, and Trellis
Feedback form is now closed.
Programmable data planes are a reality. Today one can use software to define the forwarding behavior of programmable switching silicon that offers the same (or more) throughput than fixed-function chips. In this talk we will give an overview of programmable data planes, P4 (a domain specific language to program such planes), P4 Runtime (the API to control them), and how today ONOS supports P4 and P4 Runtime. Finally, we will discuss the plans and possibilities of a P4-based CORD fabric.
avatar for Carmelo Cascone
Carmelo Cascone
MTS, Open Networking Laboratory
Thursday November 9, 2017 2:40pm - 3:00pm
Event Hall
Attendees (24)
|
global_01_local_1_shard_00001926_processed.jsonl/71675
|
Webkul Addon Webkul Support
Demo will be reset in: MinuteGo to Administration panelGo to Vendor panel
Acme Corporation
We at Acme are committed to providing you, our customer, with the best in products that make your life not necessarily easier but, well, as the kids say, "rigorously interesting". Too many catalog stores only make life complicated by offering quality, quality, quality and not listening to the needs of the customer, who wants more than anything to have something no one else has regardless of how well it's made.
|
global_01_local_1_shard_00001926_processed.jsonl/71676
|
Kim Stanley Robinson
Kim Stanley Robinson is a science fiction writer. He is the author of more than twenty books, including the international-bestselling Mars trilogy, and more recently New York 2140, Aurora, Shaman, Green Earth, and 2312, which was a New York Times bestseller nominated for all seven of the major science fiction awards—a first for any book. He was sent to the Antarctic by the U.S. National Science Foundation’s Antarctic Artists and Writers’ Program in 1995, and returned in their Antarctic media program in 2016. In 2008 he was named a “Hero of the Environment” by Timemagazine, and he works with the Sierra Nevada Research Institute, the Clarion Writers’ Workshop, and the Arthur C. Clarke Center for Human Imagination at the University of California, San Diego. His work has been translated into 25 languages, and has won a dozen awards in five countries, including the Hugo, Nebula, Locus, and World Fantasy awards. In 2016 he was given the Heinlein Award for lifetime achievement in science fiction, and asteroid 72432 was named “Kimrobinson.” In 2017 he was given the Arthur C. Clarke Award for Imagination in Service to Society.
|
global_01_local_1_shard_00001926_processed.jsonl/71689
|
Can I use Dash while streaming music or using phone-based navigation?
Yes. Dash runs in the background, so even if you're using your screen for mapping, we'll still log and score your trip.
It's also possible to have your phone or tablet streaming music to your car's stereo, even if you're using a Bluetooth-based OBD-II adapter - the Bluetooth protocol allows for pairing with multiple devices, so enjoy your tunes!
One word of caution: if you use your phone while driving, do it safely! And keep in mind that texting while driving is a no-no in many places (and is not very safe anywhere!)
Have more questions? Submit a request
Powered by Zendesk
|
global_01_local_1_shard_00001926_processed.jsonl/71690
|
Glossary of Terms
All complex subjects have their own terminology that sometimes makes it hard for new people to break into the field. This sometimes includes uncommon words, but more often than not a subject will have very specific meanings for common words - the discussion of errors vs mistakes in this video is a good example of this.
This glossary is a reference of some of the uncommon terms and specific definitions of more common words that you will encounter throughout Data Tree and your broader dealings with data.
Many of these definitions come from the course materials and experts that helped develop Data Tree. Others come from the CASRAI Dictionary. Those definitions are kindly made available under a Creative Commons Attribution 4.0 International License.
Browse the glossary using this index
FAIR Data Principle
Data that follows the FAIR principles must be:
• Findable
• Accessible
• Interoperable
• Reusable
FAIR is a set of guiding principles for data management and stewardship designed by stakeholders representing interests in academia, industry, funding agencies and scholarly publishers. The FAIR principles define a set of core enabling conditions which, if fulfilled for a given set of data, would ensure that they remain accessible and re-usable over the long term.
A key element of these principles is the focus on the use of structured information and persistent identifiers to enable machine discoverability and use of the data.
The full set of principles are published in the article "The FAIR Guiding Principles for scientific data management and stewardship". - DOI
Fair use
A legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee or royalty. Purposes permitting the application of fair use generally include review, news reporting, teaching, or scholarly research. When in doubt, the quickest and simplest thing may to request permission of the copyright owner.
- CASRAI Dictionary
FLOating Point operation, a single calculation on a number with a decimal point i.e. not an integer. In computing, floating point operations per second (FLOPS) is a measure of computer performance, useful in fields of scientific computations that require floating-point calculations.
File Transfer Protocol, a standardised set of rules to allow upload and download of files between two computers, commonly used for exchanging files over the Internet.
|
global_01_local_1_shard_00001926_processed.jsonl/71693
|
The weather has been kind to me on most of my trips. And, as I descend into Santiago on Thursday morning local time, the winter weather is forecast to reach 20 Celsius on a sunny day.
Reports yesterday have highlighted power cuts and injuries caused by a rare phenomena in the South American capital. Snow.
Pictures of cars skidding, children throwing snowballs and chaos usually associated with an inch of the white stuff on london’s toads being played out in the South American capital.
The BBC claims it’s the first snow there since the 1970s. Pictures elsewhere dated 2011 seem to contradict this. But it all supports my decision to expect tee shirt and jeans weather but have jumper, fleece, hat and gloves on standby.
It’s also a reminder of the bizarre extremes of climate in Chile. Santiago is just 30 miles from the Andes. Huge snow covered mountains that rarely share that snow with the capital. Dry desert to the north, which will hopefully be a highlight. Frozen tundra to the south, which we’re avoiding. And who knows, there might even be grass skirt wearing when we reach Easter Island!
Fair to say, this isn’t going to be a few weeks on a sun bed rubbing in the factor 30.
Pain, Long Flights, Pills, Posh Seats and Unlimited Alcohol
|
global_01_local_1_shard_00001926_processed.jsonl/71710
|
How To Remove Uninstall Babel Font From Android
Once your phone was working fine and every thing seem to be very good. Suddenly, resulting from babel fonts intalled on your phone, your phone start malfunctioning. This is the cases with many android phone users to day. But How can this babel font be uninstalled or removed from an android device? As we consider How To Remove Uninstall Babel Font From Android in this post you will find out that it is not an easy task to uninstall this font.
If you cannot unistall an app from the app menu you can do so from the apps settings of the phone. This is not the case with babel font. It cannot be easily uninstalled. however, you may be able to deactivate it and it will never bother you again. How? Let’s consider two steps to achieve this. Any step can come before the other.
Deactivate Bable Font Step One
• Go to settings on your phone
• Navigate to Apps (App management)
• Locate the babel font and click on it to open
• Click on the clear data, clear cache and force stop.
• Done
Deactivate Babel Font Step Two
In the setting of your phone look for Language and click on it. Scroll down and locate default font. Enable system Font Manager in place of babel font. That all and your are good to go.
Another step that may successfully correct this issue is updating the babel app on play store. There are lots on users that have similar issue. Some few successfully found a working solution. Others had to factory reset thair phones before it went back to normal. Hopefully, the guide here will fix your babel font issue.
Tell us what you think
|
global_01_local_1_shard_00001926_processed.jsonl/71711
|
Unwavering Faith From An Unlikely Source.
By faith Rahab the prostitute did not perish with those who were disobedient, because she had given a friendly welcome to the spies. – Hebrews 11:31 ESV
Now things get really interesting. Up to this point in the chapter, the author of Hebrews has been dealing with some fairly significant and well-known individuals in the family tree of Israel – Abel, Enoch, Noah, Abraham, Sarah, Isaac, Joseph, and by extension, Joshua. But it should catch us a bit by surprise to read the name of a prostitute in this great “Hall of Faith.” To understand her presence in the list of the faithful provided in Hebrews 11, we have to go back to the original story found in the book of Joshua. When it came time for the people of Israel to begin their God-ordained occupation of the land of Canaan, Joshua sent out spies to determine the situation in Jericho. “And Joshua the son of Nun sent two men secretly from Shittim as spies, saying, ‘Go, view the land, especially Jericho.’ And they went and came into the house of a prostitute whose name was Rahab and lodged there” (Joshua 2:1 ESV). There is a lot we don’t know in this story. We don’t know why they chose Rahab’s house. Had they been given her name by someone else? Where they aware that she was a follower of Yahweh? Did they choose a prostitute’s house because they believed no one would think to look for them there? The passage doesn’t provide us with answers to these questions. But we do know that someone ratted on the two spies, and the king of Jericho sent soldiers to Rahab’s house to find them. “Then the king of Jericho sent to Rahab, saying, ‘Bring out the men who have come to you, who entered your house, for they have come to search out all the land’” (Joshua 2:3 ESV). But rather than turn the two spies over to the king’s soldiers, she hid them, and she covered for them. “But the woman had taken the two men and hidden them. And she said, ‘True, the men came to me, but I did not know where they were from. And when the gate was about to be closed at dark, the men went out. I do not know where the men went. Pursue them quickly, for you will overtake them’” (Joshua 2:4-5 ESV).
Rahab protected the two Israelite spies. Why? Because she was a God-fearer. She had somehow heard about the God of Israel and believed in Him. Word of God’s powerful and miraculous deliverance of Israel from captivity in Egypt had gotten out, and Rahab determined that He was the one true God. She knew that Jericho was no match for God, so she protected the spies and asked them to return the favor when the time came.
I tend to believe that the two men inadvertently ended up at Rahab’s house and that they had no idea she was a believer in Yahweh. That would have been the last thing they expected from a woman who made her living as a prostitute in a pagan city. But God, in His divine plan, arranged for them to go to the very house where they would find a woman who had become a believer in the God of Israel. She was so convinced of God’s power that she knew Jericho was going to fall. She only asked that she and her family be spared. She believed with all her heart that the God of Israel was the “God in the heavens above and on the earth beneath.” The spies made an agreement with Rahab, instructing her to tie a scarlet thread in her window. That would act as a sign, much like the blood on the door post and lintels during the Passover. That threat would tell the Israelite troops to spare all the individuals found in that house. And when the walls of Jericho fell, we are told, “But Rahab the prostitute and her father’s household and all who belonged to her, Joshua saved alive. And she has lived in Israel to this day, because she hid the messengers whom Joshua sent to spy out Jericho” (Joshua 6:25 ESV).
You might be tempted to say that Rahab’s faith was in the two spies. She believed they would keep their word and spare her life. But while there is some truth to that, the thing that drove her actions from the outset was her belief that God was the one true God and that He would give their city into the hands of the Israelite troops. Their God was greater. And in her action of providing protection for the two spies, she was acknowledging that she believed in God. Hebrews 11:6 tells us “without faith it is impossible to please him [God], for whoever would draw near to God must believe that he exists and that he rewards those who seek him.” Rahab definitely believed God existed. And she was seeking His protection and the reward of her life being spared. Rahab had no track record with God. She had simply heard the stories of His deliverance of the people of Israel from their captivity in Egypt. She had heard about His redemptive power illustrated in the parting of the Red Sea. She had heard the stories about His defeat of the Amorites. For her, the rumors and hearsay became cause for belief. And her faith that God was real and that He had the power to save as well as destroy would lead to life, rather than death. Everyone in the city was doomed to destruction, but her faith in God resulted in her salvation.
Rahab would go on to spend the rest of her life living among the God’s people. She would marry and have children. In fact, you read her name in the gospel of Matthew. She is listed in the lineage of David.
And from David would come the Messiah, Jesus Christ. Not only did Rahab’s faith result in the sparing of her own life, it paved the way for the coming of Jesus, the Savior of the world. Her faith had long-lasting repercussions. Out of faith in God, she gave a friendly welcome to the spies, and that faith would result in her redemption and allow for the coming of the Redeemer of the world.
|
global_01_local_1_shard_00001926_processed.jsonl/71712
|
Pharaoh, Flocks and Famine.
He had sent Judah ahead of him to Joseph to show the way before him in Goshen, and they came into the land of Goshen. Then Joseph prepared his chariot and went up to meet Israel his father in Goshen. He presented himself to him and fell on his neck and wept on his neck a good while. Israel said to Joseph, “Now let me die, since I have seen your face and know that you are still alive.” Joseph said to his brothers and to his father’s household, “I will go up and tell Pharaoh and will say to him, ‘My brothers and my father’s household, who were in the land of Canaan, have come to me. And the men are shepherds, for they have been keepers of livestock, and they have brought their flocks and their herds and all that they have.’ When Pharaoh calls you and says, ‘What is your occupation?’ you shall say, ‘Your servants have been keepers of livestock from our youth even until now, both we and our fathers,’ in order that you may dwell in the land of Goshen, for every shepherd is an abomination to the Egyptians.”
So Joseph went in and told Pharaoh, “My father and my brothers, with their flocks and herds and all that they possess, have come from the land of Canaan. They are now in the land of Goshen.” And from among his brothers he took five men and presented them to Pharaoh. Pharaoh said to his brothers, “What is your occupation?” And they said to Pharaoh, “Your servants are shepherds, as our fathers were.” They said to Pharaoh, “We have come to sojourn in the land, for there is no pasture for your servants’ flocks, for the famine is severe in the land of Canaan. And now, please let your servants dwell in the land of Goshen.” Then Pharaoh said to Joseph, “Your father and your brothers have come to you. The land of Egypt is before you. Settle your father and your brothers in the best of the land. Let them settle in the land of Goshen, and if you know any able men among them, put them in charge of my livestock.” – Genesis 46:28-47:6 ESV
Sometimes the stories of the Bible become so familiar to us that they lose their significance and we lose our sense of awe at the display of God’s power found in them. The story of Joseph is a case in point. We have already seen so many examples of God’s sovereign, providential hand at work, predestining Joseph for his role as the savior of God’s people. Time and time again, God has displayed His power and undeniable control over the affairs of men and even the realm of nature. The seven year famine was part of God’s plan, just as much as Joseph’s rise to the second most-powerful position in the land of Egypt. Each and every event connected with this story reveals yet another example of God’s sovereign control over everything and everyone.
As Jacob, his sons and their families arrive in Egypt, and are reunited with Joseph, we are provided with yet another example of God’s providence. Jacob was a shepherd by trade. So were his sons. When Jacob had gone through his self-imposed exile in Paddam-aram, he had been a shepherd, tending the flocks of his uncle, Laban. And he had been good at his job, at one point telling his uncle, “You know how hard I’ve worked for you, and how your flocks and herds have grown under my care. You had little indeed before I came, but your wealth has increased enormously. The Lord has blessed you through everything I’ve done” (Genesis 30:29-30 NLT). Jacob eventually left Laban’s employment, but not before he had a few choice words for his uncle and former boss:
“For twenty years I have been with you, caring for your flocks. In all that time your sheep and goats never miscarried. In all those years I never used a single ram of yours for food. If any were attacked and killed by wild animals, I never showed you the carcass and asked you to reduce the count of your flock. No, I took the loss myself! You made me pay for every stolen animal, whether it was taken in broad daylight or in the dark of night.
“I worked for you through the scorching heat of the day and through cold and sleepless nights. Yes, for twenty years I slaved in your house! I worked for fourteen years earning your two daughters, and then six more years for your flock. And you changed my wages ten times! In fact, if the God of my father had not been on my side—the God of Abraham and the fearsome God of Isaac—you would have sent me away empty-handed. But God has seen your abuse and my hard work. – Genesis 31:38-42 NLT
It had been God who protected Jacob and who increased his wealth – in spite of the efforts of Laban. And it was Jacob who passed on his knowledge of shepherding to his sons. And they too became the owners of great flocks and herds. But then the famine came. Famine and flocks do not go well together. So Jacob and his sons were forced to look for another source of food to provide for their flocks and families. That is what had led them to Egypt in the first place. And now they were returning to Egypt to live, bringing all their flocks and families with them, because there were five more years of famine yet to come. Once again, this had all been a part of God’s divine plan for His people. It had been God who had blessed Jacob with flocks. It had been God who had brought about the famine that had threatened the well-being of Jacob’s flocks. And it was God who had moved the heart of Pharaoh to willingly and graciously accept Jacob and his family and flocks into Egypt, providing for them the best of his land as their possession.
Pharaoh said to Joseph, “Say to your brothers, ‘Do this: Load your animals and go to the land of Canaan! Get your father and your households and come to me! Then I will give you the best land in Egypt and you will eat the best of the land.’ You are also commanded to say, ‘Do this: Take for yourselves wagons from the land of Egypt for your little ones and for your wives. Bring your father and come. Don’t worry about your belongings, for the best of all the land of Egypt will be yours.’” – Genesis 45:17-20 NLT
And when they arrived, that is exactly what happened. They came before Pharaoh, explained their plight and pleaded for his help. Verse four of chapter 47 sums it all up.
Then they said to Pharaoh, “We have come to live as temporary residents in the land. There is no pasture for your servants’ flocks because the famine is severe in the land of Canaan. So now, please let your servants live in the land of Goshen.” – Genesis 47:4 NLT
What is truly amazing about this is that Pharaoh, as an Egyptian, hated shepherds. Joseph had even told his brothers to say to Pharaoh, “Your servants have taken care of cattle from our youth until now, both we and our fathers,” and warned them that, “everyone who takes care of sheep is disgusting to the Egyptians” (Genesis 46:34 NLT). And yet here were Hebrew shepherds coming before one of the most powerful men in the world, asking him to provide them with land to care for their flocks. And what did Pharaoh do? He gave them the land of Goshen, the best land in Egypt. Not only that, he employed some of the brothers to care for his own flocks and herds. These events should create in us a sense of awe and wonder at the providential care of God. This had all been His doing. The book of Proverbs reminds us, “The king’s heart is like a stream of water directed by the LORD; he guides it wherever he pleases” (Proverbs 21:12 NLT). Pharaoh’s generous offer had been part of God’s plan, just as much as the famine had been. The unlikely and implausible blend of Pharaoh, flocks and famine was God’s doing. As William Cowper stated so well, “God moves in a mysterious way His wonders to perform.” An Egyptian Pharaoh, a seven-year famine, and the famished flocks of the people of Israel. What a strange combination. And what a wonderful example of God’s mysterious providence. Which is why Cowper goes on to remind us:
Judge not the Lord by feeble sense,
But trust Him for His grace;
Behind a frowning providence
He hides a smiling face.
|
global_01_local_1_shard_00001926_processed.jsonl/71718
|
Document Type
Conference Proceeding
Publication Date
A Connected Dominating Set (CDS) of the graph representing a Wireless Sensor Network can be used as a virtual backbone for routing in the network. Since sensor nodes are constrained by limited on-board batteries, it is desirable to have a small CDS for the network. However, constructing a minimum size CDS has been shown to be a NP-hard problem. In this paper we present a distributed greedy algorithm for constructing a CDS that we call Greedy Connect. Our algorithm operates in two phases, first constructing a dominating set and then connecting the nodes in this set. We evaluate our algorithm using simulations and compare it to the two-hop K2 algorithm in the literature. Depending on the network topology, our algorithm generally constructs a CDS that is up to 30% smaller in size than K2
|
global_01_local_1_shard_00001926_processed.jsonl/71734
|
JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Cluster Reference Manual Oracle Solaris Cluster 4.0
search filter icon
search icon
Document Information
OSC40 1
OSC40 1cl
OSC40 1ha
OSC40 1m
OSC40 3ha
OSC40 4
OSC40 5
OSC40 5cl
OSC40 7
OSC40 7p
The Oracle Solaris Cluster Reference Manual provides reference information for commands, functions, and other public interfaces in Oracle Solaris Cluster software. This book is intended for experienced system administrators with extensive knowledge of Oracle software and hardware. This book is not to be used as a planning or presales guide. The information in this book assumes knowledge of the Oracle Solaris Operating System and expertise with the volume manager software that is used with Oracle Solaris Cluster software.
Both novice users and those familiar with the Oracle Solaris Operating System can use online man pages to obtain information about their SPARC based system or x86 based system and its features.
A man page is intended to answer concisely the question “What does this command do?“ The man pages in general comprise a reference manual. They are not intended to be a tutorial.
Note - Oracle Solaris Cluster software runs on two platforms, SPARC and x86. The information in this book pertains to both platforms unless otherwise specified in a special chapter, section, note, bulleted item, figure, table, or example.
The following is a generic format for man pages. The man pages of each manual section generally follow this order, but include only needed headings. For example, if no bugs can be reported, no BUGS section is included. See the intro pages for more information and detail about each section, and man(1) for general information about man pages.
This section gives the names of the commands or functions that are documented, followed by a brief description of what they do.
This section shows the syntax of commands or functions. If a command or file does not exist in the standard path, its full path name is shown. Options and arguments are alphabetized, with single-letter arguments first, and options with arguments next, unless a different argument order is required.
The following special characters are used in this section:
[ ]
Brackets. The option or argument that is enclosed in these brackets is optional. If the brackets are omitted, the argument must be specified.
. . .
{ }
Braces. The options and/or arguments enclosed within braces are interdependent. All characters within braces must be treated as a unit.
This section occurs only in subsection 3R and indicates the protocol description file.
This section defines the functionality and behavior of the service. Thus it describes concisely what the command does. DESCRIPTION does not discuss OPTIONS or cite EXAMPLES. Interactive commands, subcommands, requests, macros, and functions are described under USAGE.
This section appears on pages in Section 7 only. Only the device class that supplies appropriate parameters to the ioctl(2) system call is called ioctl and generates its own heading. ioctl calls for a specific device are listed alphabetically (on the man page for that specific device). ioctl calls are used for a particular class of devices. All these calls have an io ending, such as mtio(7I).
If the man page documents functions that return values, this section lists these values and describes the conditions under which they are returned. If a function can return only constant values, such as 0 or –1, these values are listed in tagged paragraphs. Otherwise, a single paragraph describes the return values of each function. Functions that are declared void do not return values, so they are not discussed in RETURN VALUES.
On failure, most functions place an error code in the global variable errno that indicates why they failed. This section lists alphabetically all error codes a function can generate and describes the conditions that cause each error. When more than one condition can cause the same error, each condition is described in a separate paragraph under the error code.
This section lists special rules, features, and commands that require in-depth explanations. The subsections that are listed here are used to explain built-in functionality:
Input Grammar
This section provides examples of usage or of how to use a command or function. Wherever possible, a complete example, which includes command-line entry and machine response, is shown. Whenever an example is given, the prompt is shown as example%, or if the user must be superuser, example#. Examples are followed by explanations, variable substitution rules, or returned values. Most examples illustrate concepts from the SYNOPSIS, DESCRIPTION, OPTIONS, and USAGE sections.
This section lists the values the command returns to the calling program or shell and the conditions that cause these values to be returned. Usually, zero is returned for successful completion, and values other than zero are returned for various error conditions.
This section lists all file names that are referred to by the man page, files of interest, and files created or required by commands. Each file name is followed by a descriptive summary or explanation.
This section lists diagnostic messages with a brief explanation of the condition that caused the error.
This section lists warnings about special conditions that could seriously affect your working conditions. WARNINGS is not a list of diagnostics.
This section lists additional information that does not belong anywhere else on the page. NOTES covers points of special interest to the user. Critical information is never covered here.
|
global_01_local_1_shard_00001926_processed.jsonl/71758
|
, , , , ,
I do not usually stray into the Creation versus Evolution debate. It is a fruitless discussion most of the time. Both sides present their arguments while talking circles around one another, never coming to a complete understanding of where the other person is speaking from. The problem is they are speaking from two entirely different planes. The Creationist argues from a point of view where God is the architect of all things—no thing exists without the direct influence of God’s creative hand. For the Evolutionist, the universe as we see it today is the result of eons of perfectly ordered events resulting in our current experience of reality.
Popular debates center on whether the origin of the universe was an event called the Big Bang or if it was simply the first day God spoke the universe into existence. Creationists have long fought against the idea of the Big Bang while the Evolutionist scoffs at them for their lack of intelligence. Both have missed the deeper implications of their defense of these positions. Now there are plenty of Theists, Christians included, who find no issue with evolution in relationship to their faith so I want to shift a bit. Instead of Evolutionist and Creationist I will refer to the opposing views as Atheist and Christian. I believe this will suit the discussion better and here is why.
Christians who have argued against the theories of evolution have missed an obvious problem Atheism is presented with when they claim the universe began 13.7 billion years ago with the Big Bang. A Prime Event, igniting all matter and energy from a Singularity, traps the Atheist in a universe that requires a Prime Mover; in other word, God. The reason is, it is impossible for a Big Bang to be the starting point of the universe because it requires there to be nothing before it. If there was in fact something before that Prime Event, then the Big Bang would not be the beginning; it would just be another step in the existence of the universe. Nothing (nihilo) is an impossible state of existence. If we remove something, the nothing that exists in its place will still be something, because it has existence, though different. Let’s take a break. While we take a break, remember that even though we are no longer doing something, we are still doing something else.
austin powersIn the physical universe, a state of nothing (ex nihilo) is impossible. We will never reach a state ex nihilo and we cannot have begun with it. True nothingness is incomprehensible because it is outside of our experience of reality. We can’t go there. The only thing capable of existing outside of the physical universe, where nothing is present, is a being which is also incomprehensible since it would exist outside of our experience of reality. If that being exists it would not be bound by the physical laws ordering the universe, including space and time. Any attempts to use scientific research and study, which are bound by physical laws, to find that being, would be futile because “we can’t go there.” This is the problem the Atheist faces when claiming the universe began with the Big Bang. On the other side of that event there had to be something. Better educated Atheists understand this problem and I will touch on this later, but first I want to point out what should be obvious at this point.
First though I will clarify that I am not attempting here to disprove the cosmological event referred to as the Big Bang. I personally have no issues with this. I am only pointing out the problem an Atheist traps their self in when arguing that the Big Bang was the origin of the universe or for that matter when arguing for any Prime Event in general. If the universe was created ex nihilo, from true nothing, it would need to be set in motion by something outside of our physical universe. Aristotle called this the Prime Mover.
Almost since its beginning, Christianity has defended an idea called creation ex nihilo. The Christian understanding of the Deity is a being who exists outside of the physical universe in the way I described above. God, according to Christianity, is the Prime Mover. At some point, there was nothing occupying the realm we refer to as the universe. At another point, God filled that nothing with the universe. He created us out of nothing—creation ex nihilo. Without a Prime Mover, the theory of the Big Bang as a cosmological starting point of matter and energy is impossible. Even if you do not believe in the Christian God, something had to form then ignite that initial exploding Singularity. For Christians, that something is the first person of the Holy Trinity.
I will continue this in a later post.
|
global_01_local_1_shard_00001926_processed.jsonl/71759
|
Artificial truth
The more you see, the less you believe.
[archives] [latest] | [homepage] | [atom/rss]
MAT is dead, long live MAT2
Tue 05 June 2018 — download
Two years ago, I wrote that mat was on hold for health-related reasons. I'm now feeling better, so I thought about rewriting it in Python3. It's living on its own git repository, thanks to the wonderful people behind Currently, the library and the command line interface are offering the same level of features (and maybe a bit more) than the original MAT.
It also comes with a shiny logo:
It's currently supporting several fileformats:
• image/png (.png)
• application/pdf (.pdf)
• application/x-bittorrent (.torrent)
• audio/mpeg (.mp2, .mp3, .mpga, .mpega, .m4a)
• audio/ogg (.oga, .ogg, .opus, .spx)
• audio/flac (.flac)
• image/jpeg (.jpe, .jpeg, .jpg)
• image/tiff (.tif, .tiff)
• image/x-ms-bmp (.bmp)
• application/vnd.openxmlformats-officedocument.spreadsheetml.sheet (.xlsx)
• application/vnd.openxmlformats-officedocument.wordprocessingml.document (.docx)
• application/vnd.openxmlformats-officedocument.presentationml.presentation (.pptx)
• application/vnd.oasis.opendocument.text (.odt)
• application/vnd.oasis.opendocument.chart (.odc)
• application/vnd.oasis.opendocument.image (.odi)
• application/vnd.oasis.opendocument.presentation (.odp)
• application/ (.odg)
• application/vnd.oasis.opendocument.spreadsheet (.ods)
• application/vnd.oasis.opendocument.formula (.odf)
and I'm planning to add more.
Since GUI are hard (everyone complained about MAT's one), I'm not planning to write one any time soon. Odds are that I'll write file manager extensions instead, to provide something like right click → remove metadata.
The code is cleaner and more modern (hurray for Python3), using (and enforcing) type hints, introspection, functional style constructions, … I thought about using something else than Python3, like Go, Rust, C++, … since my love for Python faded out, but unfortunately, it's the only language that I'm fluent in that can parse, process, manipulate and modify a significant number of different fileformats, from rendering PDF onto Cairo surfaces, to removing thumbnails in ogg tracks, in a simple and kinda-secure way.
If everything goes as planned, a first stable release should happen in a couple of months, and a second one with file-manager integration before the end of 2018.
As usual, help is more than welcome.
|
global_01_local_1_shard_00001926_processed.jsonl/71762
|
Over a million developers have joined DZone.
Apache Ignite Tip: Peer Class Loading Deployment Magic
DZone's Guide to
Apache Ignite Tip: Peer Class Loading Deployment Magic
Apache Ignite is great for modern data processing. It has a feature called Zero Deployment which is very useful for P2P class loading.
· Big Data Zone ·
Free Resource
In this article, I will focus on Zero Deployment in Apache® Ignite™.
There is a very useful feature in Apache Ignite for inter-node byte-code exchange called peer class loading, also referred to as P2P class loading. Let’s take a look at this in little more detail.
Peer Class Loading
In Apache Ignite, there is a special distributed ClassLoader which, if enabled, will automatically redeploy Java or Scala code on every node in a grid each time the code changes.
Let’s review a simple Java code snippet from the Apache Ignite documentation shown in Figure 1.
IgniteCluster cluster = ignite.cluster();
// Compute instance over remote nodes.
IgniteCompute compute = ignite.compute(cluster.forRemotes());
// Print hello message on all remote nodes.
compute.broadcast(() -> System.out.println("Hello node: " + cluster.localNode().id()));
Figure 1: "Hello node" example
This code enables a “Hello node” message to be broadcast to all nodes in an Apache Ignite cluster. The code would run on all remote nodes without the need for a deployment step. So, if the code were changed, it would not be necessary to manually redeploy the code; the special distributed ClassLoader would manage the redeployment for us.
To configure peer class loading, we can use either an XML config file or program code. Figure 2 shows an example from the Apache Ignite documentation that uses Java code.
IgniteConfiguration cfg = new IgniteConfiguration();
// Enable or disable peer class loading.
// Start Ignite node.
Ignite ignite = Ignition.start(cfg);
Figure 2: Enable peer class loading
Specifically, there is a simple two-step process involved for using peer class loading, as follows:
1. If a class that is called is already available locally on a node, then Apache Ignite will use this class and there is no requirement to request the class from a peer node.
2. If a class is not available locally, a request is sent to the originating node. This originating node will send the byte-code so that the class can be loaded on the worker node.
Obviously, there are significant productivity gains in using peer class loading.
With peer class loading there are:
• No Ant scripts to run.
• No Jar files to copy or FTP.
• No nodes to restart.
For developers working with Apache Ignite, peer class loading provides significant productivity gains, thus saving time and effort.
apache ignite ,big data ,zero deployment ,tutorial ,peer class loading
Published at DZone with permission of
Opinions expressed by DZone contributors are their own.
{{ parent.title || parent.header.title}}
{{ parent.tldr }}
{{ parent.urlSource.name }}
|
global_01_local_1_shard_00001926_processed.jsonl/71763
|
Over a million developers have joined DZone.
Arduino Development Using NetBeans IDE
DZone's Guide to
Arduino Development Using NetBeans IDE
· Java Zone ·
Free Resource
The Arduino development environment is probably the preferred development platform for the majority of Arduino users. It is lean and relatively easy to use. Quite a few examples are at your finger tip and even for people without much programming experience, it is relatively easy to get started. You can write and upload your sketches (programs) without the need to ever leave the IDE.
Despite its convenience, the Arduino IDE lacks some key features most modern IDEs have. To name a few, the Arduino IDE does not yet support auto-completion, code folding and contextual help. And the integrated parser sometimes have difficulties parsing complex code structures and do not give adequate information for the errors encountered. While it does not matter much for writing simple programs, the drawbacks are obvious when developing more complex applications. Since I am a software developer, I personally prefer a more advanced IDE.
If you are using Eclipse, then there is already a plugin available for AVR development, though I have not personally tried it I have seen other people using it regularly. Looking at the Arduino playground instructions for this plugin, it seems that it is pretty straight forward to set up. But if you are using NetBeans, currently there’s no Arduino support yet.
Luckily, it is actually fairly straight forward to add Arduino support in the NetBeans environment. In this article, I will show you step by step instructions on how to prepare your NetBeans environment for Arduino development purpose.
For those who are impatient and know your way around the NetBeans environment, you can download and install ArduinoPlugin_v1.0.tar.gz (Tools -> Plug-ins, under Downloaded tab, choose add plug-ins) and get started right away. You do need to configure your NetBeans environment to support avr-gcc tool chain before you can start using the Arduino module. If you are unsure how to do this, please read on.
This plugin requires a functional Arduino development environment. Since this plug-in relies on the Arduino core libraries for code compilation, Arduino must be installed first. You can refer to the Getting Started with Arduino guide on the official Arduino site on how to install the Arduino programming environment.
The instructions in this article assumes that you are running Arduino under Linux, but I think you can adapt it to Windows environment with relatively few changes. Here is a list of the software versions I have installed on my PC.
Ubuntu 10.04 (64bit)
avr-gcc 4.3.4
avrdude 5.10
NetBeans 6.8
Depending on your particular settings (e.g. the installation path of arduino-0018 is not located under your home directory or it is installed under a different directory name), minor modifications to the template might be needed.
Configure AVR Tool Chain
To setup the NetBeans environment, we need to first setup the AVR tool chain. To do so, first launch NetBeans, navigate to Tools -> Options and click “Add” under C/C++/Build Tools (see screen shot below), and from there we can create a new tool chain called Arduino and configure the paths in the right-hand-side pane accordingly. Here is a screenshot of the tool chain configuration on my system:
Base Directory: /usr/bin
C Compiler: /usr/bin/avr-gcc
C++ Compiler: /usr/bin/avr-g++
Assembler: /usr/bin/avr-as
Debugger: /usr/bin/gdb (this is not important since we do not run Arduino applications within NetBeans anyway)
avr-gcc tool chain setup in NetBeans
avr-gcc tool chain setup in NetBeans
In order for the auto-complete feature to work with the Arduino/AVR header files, we also need to setup the paths under the Code Assistance tab. To begin with, you would need to setup the following paths:
~/arduino-0018/hardware/arduino/cores/arduino (assuming that you installed Arduino 0018 under your home directory)
If you use libraries located in other locations, you will need to add those paths to the C/C++ compiler code assistance tab as well.
Install the Arduino Plugin
To install the plugin, download the NetBeans module first (ArduinoPlugin_v1.0.tar.gz). Use the following command to extract the NetBeans Module (ArduinoPlugin_v1.0.nbm):
tar zxf ArduinoPlugin_v1.0.tar.gz
Then go to Tools -> Plugins, under Downloaded tab, choose Add plugins. Navigate to where you saved the .nbm file and click OK.
After installing the plugin, the plugin option screen should look like the following:
Arduino Plugin installed
Arduino Plugin installed
How to use
To create an Arduino project, go to project new and choose Arduino project template.
Create an Arduino Project
Create an Arduino Project
After the project is created, you should see two files (main.pde and makefile) under Source Files folder, and main.pde contains the code skeleton:
#define __AVR_ATmega328P__
#include <binary.h>
#include <HardwareSerial.h>
#include <pins_arduino.h>
#include <WConstants.h>
#include <wiring.h>
#include <wiring_private.h>
#include <WProgram.h>
#include <EEPROM/EEPROM.h>
void setup()
void loop()
I tried to make the code structure look as close to that in Arduino IDE as possible, but for the code auto completion to work, some extra includes are needed. Also, note that I have included the MCU definition (#define __AVR_ATmega328P__) to get the the MCU specific intellisense work. You can change this to the type of MCU you are targeting.
Auto Completion
Auto Completion
To build your project, right click on the makefile and choose make or make clean. If your build is successful, you should see a HEX file built in the applet directory within your project root. And you can use the Make Target -> upload option to upload the HEX file onto the Arduino board.
Build and Upload
Build and Upload
Behind the scene
The Arduino plugin for NetBeans is developed as a NetBeans project sample module. The makefile is adapted from the make file used within the Arduino environment and is discussed here.
I had put some additional comments in places where you might need to edit for it to work with your projects. For instance, your project may link to more modules than the ones listed below.
#Note that if your program has dependencies other than those
#already listed below, you will need to add them accordingly.
$(ARDUINO)/wiring_pulse.c \
$(ARDUINO)/wiring_analog.c \
$(ARDUINO)/pins_arduino.c \
$(ARDUINO)/wiring.c \
$(ARDUINO)/wiring_digital.c \
$(ARDUINO)/WInterrupts.c \
$(ARDUINO)/wiring_shift.c \
$(ARDUINO)/Tone.cpp \
$(ARDUINO)/main.cpp \
$(ARDUINO)/WMath.cpp \
$(ARDUINO)/Print.cpp \
$(ARDUINO)/HardwareSerial.cpp \
Also, I followed the technique used in the Arduino IDE to assemble the sketch with other necessary information and the main program at compile time (see the portion of the makefile below) to keep main.pde as simple as possible. The only issue is that compilation errors are referenced against the assembled source code rather than the code you write in main.pde. I had originally thought about putting all the necessary code in main.pde and thus would not require code merge at compile time, but it would make the code less compatible with the Arduino IDE environment.
#applet_files: main.pde
applet/$(TARGET).cpp: main.pde
# Here is the “preprocessing”.
# It creates a .cpp file based with the same name as the .pde file.
# On top of the new .cpp file comes the WProgram.h header.
# and prototypes for setup() and Loop()
# Then the .cpp file will be compiled. Errors during compile will
# refer to this new, automatically generated, file.
# Not the original .pde file you actually edit…
test -d applet || mkdir applet
echo ‘#include “WProgram.h”‘ > applet/$(TARGET).cpp
echo ‘void setup();’ >> applet/$(TARGET).cpp
echo ‘void loop();’ >> applet/$(TARGET).cpp
cat main.pde >> applet/$(TARGET).cpp
Future Enhancement
Currently, there is no serial port monitor integrated with the NetBeans environment. So if your code uses the Serial class (i.e. Serial.println()), you will have to use the serial monitor bundled with Arduino. This should not be a big issue though, since even in Arduino, you have to click on the Serial Monitor every time after you upload the code to use it any way. I am planning on integrating the serial monitor with NetBeans in the future but it would probably take some time.
Arduino plugin for NetBeans: ArduinoPlugin_v1.0.tar.gz
From http://www.kerrywong.com/2010/05/16/arduino-development-using-netbeans/
Opinions expressed by DZone contributors are their own.
{{ parent.title || parent.header.title}}
{{ parent.tldr }}
{{ parent.urlSource.name }}
|
global_01_local_1_shard_00001926_processed.jsonl/71778
|
FIBO standardizes the language of financial contracts and promotes unambiguous shared meaning among all participants in the financial industry. The “golden source” of FIBO’s unambiguous semantics is currently FIBO OWL, with automated translations into SKOS and UML. However, RDFS and OWL semantics use something called "open world assumption” (OWA). Simply put, OWA means that, for example, while a contract may be described in FIBO as an agreement between at least two parties, data about a contract with only one party would not be considered invalid. OWA strongly aligns with the inherently open-ended nature of the web. As a result, OWA prevents us from identifying data errors. This limitation (as well as certain other fundamental design principles of OWL) limits the potential of FIBO OWL for data validation and for ensuring data consistency and interoperability.
The new modeling language from W3C called SHACL (Shapes and Constraints Language), unlike RDFS and OWL, uses “closed world assumption.” This means that under SHACL’s semantics, a contract with only one known party will be identified as incomplete. SHACL also goes beyond OWL by implementing support for business rules with practically unlimited expressivity that, in many cases, is needed by FIBO. In fact, FIBO requirements were used as key inputs to SHACL design. Automated translation of FIBO OWL to SHACL is possible and has been implemented.
In this talk, we will:
\n\n Demonstrate FIBO in SHACL\n Show how FIBO SHACL can be used for data validation\n Show how SHACL can be used to auto-connect data sources to shared financial concepts\n Discuss how SHACL Rules could be used to enrich FIBO with additional machine processable semantics\n\n DTSTART:20180425T120000 SUMMARY:FIBO in SHACL: The Next Step in Data Validation and Interoperability DTEND:20180425T125959 LOCATION: See Description END:VEVENT END:VCALENDAR
|
global_01_local_1_shard_00001926_processed.jsonl/71796
|
Discrete Mathematics/Functions and relations
From Wikibooks, open books for an open world
Jump to navigation Jump to search
Discrete Mathematics
← Set theory/Page 2 Functions and relations Number theory →
This article examines the concepts of a function and a relation.
A relation is any association or link between elements of one set, called the domain or (less formally) the set of inputs, and another set, called the range or set of outputs. Some people mistakenly refer to the range as the codomain(range), but as we will see, that really means the set of all possible outputs—even values that the relation does not actually use. (Beware: some authors do not use the term codomain(range), and use the term range instead for this purpose. Those authors use the term image for what we are calling range. So while it is a mistake to refer to the range or image as the codomain(range), it is not necessarily a mistake to refer to codomain as range.)
For example, if the domain is a set Fruits = {apples, oranges, bananas} and the codomain(range) is a set Flavors = {sweetness, tartness, bitterness}, the flavors of these fruits form a relation: we might say that apples are related to (or associated with) both sweetness and tartness, while oranges are related to tartness only and bananas to sweetness only. (We might disagree somewhat, but that is irrelevant to the topic of this book.) Notice that "bitterness", although it is one of the possible Flavors (codomain)(range), is not really used for any of these relationships; so it is not part of the range (or image) {sweetness, tartness}.
Another way of looking at this is to say that a relation is a subset of ordered pairs drawn from the set of all possible ordered pairs (of elements of two other sets, which we normally refer to as the Cartesian product of those sets). Formally, R is a relation if
for the domain X and codomain(range) Y. The inverse relation of R, which is written as R-1, is what we get when we interchange the X and Y values:
Using the example above, we can write the relation in set notation: {(apples, sweetness), (apples, tartness), (oranges, tartness), (bananas, sweetness)}. The inverse relation, which we could describe as "fruits of a given flavor", is {(sweetness, apples), (sweetness, bananas), (tartness, apples), (tartness, oranges)}. (Here, as elsewhere, the order of elements in a set has no significance.)
One important kind of relation is the function. A function is a relation that has exactly one output for every possible input in the domain. (The domain does not necessarily have to include all possible objects of a given type. In fact, we sometimes intentionally use a restricted domain in order to satisfy some desirable property.) The relations discussed above (flavors of fruits and fruits of a given flavor) are not functions: the first has two possible outputs for the input "apples" (sweetness and tartness); and the second has two outputs for both "sweetness" (apples and bananas) and "tartness" (apples and oranges).
The main reason for not allowing multiple outputs with the same input is that it lets us apply the same function to different forms of the same thing without changing their equivalence. That is, if f is a function with a (or b) in its domain, then a = b implies that f(a) = f(b). For example, z - 3 = 5 implies that z = 8 because f(x) = x + 3 is a function defined for all numbers x.
The converse, that f(a) = f(b) implies a = b, is not always true. When it is, there is never more than one input x for a certain output y = f(x). This is the same as the definition of function, but with the roles of X and Y interchanged; so it means the inverse relation f-1 must also be a function. In general—regardless of whether or not the original relation was a function—the inverse relation will sometimes be a function, and sometimes not.
When f and f-1 are both functions, they are called one-to-one, injective, or invertible functions. This is one of two very important properties a function f might (or might not) have; the other property is called onto or surjective, which means, for any y ∈ Y (in the codomain), there is some x ∈ X (in the domain) such that f(x) = y. In other words, a surjective function f maps onto every possible output at least once.
A function can be neither one-to-one nor onto, both one-to-one and onto (in which case it is also called bijective or a one-to-one correspondence), or just one and not the other. (As an example which is neither, consider f = {(0,2), (1,2)}. It is a function, since there is only one y value for each x value; but there is more than one input x for the output y = 2; and it clearly does not "map onto" all integers.)
In the above section dealing with functions and their properties, we noted the important property that all functions must have, namely that if a function does map a value from its domain to its co-domain, it must map this value to only one value in the co-domain.
Writing in set notation, if a is some fixed value:
|{f(x)|x=a}| ∈ {0, 1}
The literal reading of this statement is: the cardinality (number of elements) of the set of all values f(x), such that x=a for some fixed value a, is an element of the set {0, 1}. In other words, the number of outputs that a function f may have at any fixed input a is either zero (in which case it is undefined at that input) or one (in which case the output is unique).
However, when we consider the relation, we relax this constriction, and so a relation may map one value to more than one other value. In general, a relation is any subset of the Cartesian product of its domain and co-domain.
All functions, then, can be considered as relations also.
When we have the property that one value is related to another, we call this relation a binary relation and we write it as
x R y
where R is the relation.
For arrow diagrams and set notations, remember for relations we do not have the restriction that functions do and we can draw an arrow to represent the mappings, and for a set diagram, we need only write all the ordered pairs that the relation does take: again, by example
f = {(0,0),(1,1),(1,-1),(2,2),(2,-2)}
is a relation and not a function, since both 1 and 2 are mapped to two values, (1 and -1, and 2 and -2 respectively) example let A=2,3,5;B=4,6,9 then A*B=(2,4),(2,6),(2,9),(3,4),(3,6),(3,9),(5,4),(5,6),(5,9) Define a relation R=(2,4),(2,6),(3,6),(3,9) add functions and problems to one another.
Some simple examples[edit]
Let us examine some simple relations.
Say f is defined by
This is a relation (not a function) since we can observe that 1 maps to 2 and 3, for instance.
Less-than, "<", is a relation also. Many numbers can be less than some other fixed number, so it cannot be a function.
When we are looking at relations, we can observe some special properties different relations can have.
A relation is reflexive if, we observe that for all values a:
a R a
In other words, all values are related to themselves.
The relation of equality, "=" is reflexive. Observe that for, say, all numbers a (the domain is R):
a = a
so "=" is reflexive.
In a reflexive relation, we have arrows for all values in the domain pointing back to themselves:
Arrow diagram reflexive.png
Note that ≤ is also reflexive (a ≤ a for any a in R). On the other hand, the relation < is not (a < a is false for any a in R).
A relation is symmetric if, we observe that for all values of a and b:
a R b implies b R a
The relation of equality again is symmetric. If x=y, we can also write that y=x also.
In a symmetric relation, for each arrow we have also an opposite arrow, i.e. there is either no arrow between x and y, or an arrow points from x to y and an arrow back from y to x:
Arrow diagram symmetric.png
Neither ≤ nor < is symmetric (2 ≤ 3 and 2 < 3 but neither 3 ≤ 2 nor 3 < 2 is true).
A relation is transitive if for all values a, b, c:
a R b and b R c implies a R c
The relation greater-than ">" is transitive. If x > y, and y > z, then it is true that x > z. This becomes clearer when we write down what is happening into words. x is greater than y and y is greater than z. So x is greater than both y and z.
The relation is-not-equal "≠" is not transitive. If xy and yz then we might have x = z or xz (for example 1 ≠ 2 and 2 ≠ 3 and 1 ≠ 3 but 0 ≠ 1 and 1 ≠ 0 and 0 = 0).
In the arrow diagram, every arrow between two values a and b, and b and c, has an arrow going straight from a to c.
Arrow diagram transitive.png
A relation is antisymmetric if we observe that for all values a and b:
a R b and b R a implies that a=b
Notice that antisymmetric is not the same as "not symmetric."
Take the relation greater than or equal to, "≥" If xy, and y ≥ x, then y must be equal to x. a relation is anti-symmetric if and only if a∈A, (a,a)∈R
A relation satisfies trichotomy if we observe that for all values a and b it holds true that: aRb or bRa
The relation is-greater-or-equal satisfies since, given 2 real numbers a and b, it is true that whether ab or ba (both if a = b).
Problem set[edit]
Given the above information, determine which relations are reflexive, transitive, symmetric, or antisymmetric on the following - there may be more than one characteristic. (Answers follow.) x R y if
1. x = y
2. x < y
3. x2 = y2
4. x ≤ y
1. Symmetric, Reflexive,and transitive
2. Transitive, Trichotomy
3. Symmetric, Reflexive, and transitive (x2 = y2 is just a special case of equality, so all properties that apply to x = y also apply to this case)
4. Reflexive, Transitive and Antisymmetric (and satisfying Trichotomy)
Equivalence relations[edit]
We have seen that certain common relations such as "=", and congruence (which we will deal with in the next section) obey some of these rules above. The relations we will deal with are very important in discrete mathematics, and are known as equivalence relations. They essentially assert some kind of equality notion, or equivalence, hence the name.
Characteristics of equivalence relations[edit]
For a relation R to be an equivalence relation, it must have the following properties, viz. R must be:
• symmetric
• transitive
• reflexive
(A helpful mnemonic, S-T-R)
In the previous problem set you have shown equality, "=", to be reflexive, symmetric, and transitive. So "=" is an equivalence relation.
We denote an equivalence relation, in general, by .
Example proof[edit]
Say we are asked to prove that "=" is an equivalence relation. We then proceed to prove each property above in turn (Often, the proof of transitivity is the hardest).
• Reflexive: Clearly, it is true that a = a for all values a. Therefore, = is reflexive.
• Symmetric: If a = b, it is also true that b = a. Therefore, = is symmetric
• Transitive: If a = b and b = c, this says that a is the same as b which in turn is the same as c. So a is then the same as c, so a = c, and thus = is transitive.
Thus = is an equivalence relation.
Partitions and equivalence classes[edit]
It is true that when we are dealing with relations, we may find that many values are related to one fixed value.
For example, when we look at the quality of congruence, which is that given some number a, a number congruent to a is one that has the same remainder or modulus when divided by some number n, as a, which we write
a ≡ b (mod n)
and is the same as writing
b = a+kn for some integer k.
(We will look into congruences in further detail later, but a simple examination or understanding of this idea will be interesting in its application to equivalence relations)
For example, 2 ≡ 0 (mod 2), since the remainder on dividing 2 by 2 is in fact 0, as is the remainder on dividing 0 by 2.
We can show that congruence is an equivalence relation (This is left as an exercise, below Hint use the equivalent form of congruence as described above).
However, what is more interesting is that we can group all numbers that are equivalent to each other.
With the relation congruence modulo 2 (which is using n=2, as above), or more formally:
x ~ y if and only if x ≡ y (mod 2)
we can group all numbers that are equivalent to each other. Observe:
This first equation above tells us all the even numbers are equivalent to each other under ~, and all the odd numbers under ~.
We can write this in set notation. However, we have a special notation. We write:
and we call these two sets equivalence classes.
All elements in an equivalence class by definition are equivalent to each other, and thus note that we do not need to include [2], since 2 ~ 0.
We call the act of doing this 'grouping' with respect to some equivalence relation partitioning (or further and explicitly partitioning a set S into equivalence classes under a relation ~). Above, we have partitioned Z into equivalence classes [0] and [1], under the relation of congruence modulo 2.
Problem set[edit]
Given the above, answer the following questions on equivalence relations (Answers follow to even numbered questions)
1. Prove that congruence is an equivalence relation as before (See hint above).
2. Partition {x | 1 ≤ x ≤ 9} into equivalence classes under the equivalence relation
2. [0]={6}, [1]={1,7}, [2]={2,8}, [3]={3,9}, [4]={4}, [5]={5}
Partial orders[edit]
We also see that "≥" and "≤" obey some of the rules above. Are these special kinds of relations too, like equivalence relations? Yes, in fact, these relations are specific examples of another special kind of relation which we will describe in this section: the partial order.
As the name suggests, this relation gives some kind of ordering to numbers.
Characteristics of partial orders[edit]
For a relation R to be a partial order, it must have the following three properties, viz R must be:
• reflexive
• antisymmetric
• transitive
(A helpful mnemonic, R-A-T)
We denote a partial order, in general, by .
1. Suppose R is a relation on a set of integers Z then prove that R is a partial order relation on Z iff a=b raise to power r.
Example proof[edit]
Say we are asked to prove that "≤" is a partial order. We then proceed to prove each property above in turn (Often, the proof of transitivity is the hardest).
Clearly, it is true that aa for all values a. So ≤ is reflexive.
If ab, and ba, then a must be equal to b. So ≤ is antisymmetric
If ab and bc, this says that a is less than b and c. So a is less than c, so ac, and thus ≤ is transitive.
Thus ≤ is a partial order.
Problem set[edit]
Given the above on partial orders, answer the following questions
1. Prove that divisibility, |, is a partial order (a | b means that a is a factor of b, i.e., on dividing b by a, no remainder results).
2. Prove the following set is a partial order: (a, b) (c, d) implies abcd for a,b,c,d integers ranging from 0 to 5.
2. Simple proof; Formalization of the proof is an optional exercise.
Reflexivity: (a, b) (a, b) since ab=ab.
Antisymmetric: (a, b) (c, d) and (c, d) (a, b) since abcd and cdab imply ab=cd.
Transitive: (a, b) (c, d) and (c, d) (e, f) implies (a, b) (e, f) since abcdef and thus abef
A partial order imparts some kind of "ordering" amongst elements of a set. For example, we only know that 2 ≥ 1 because of the partial ordering ≥.
We call a set A, ordered under a general partial ordering , a partially ordered set, or simply just poset, and write it (A, ).
There is some specific terminology that will help us understand and visualize the partial orders.
When we have a partial order , such that a b, we write to say that a but ab. We say in this instance that a precedes b, or a is a predecessor of b.
If (A, ) is a poset, we say that a is an immediate predecessor of b (or a immediately precedes b) if there is no x in A such that a x b.
If we have the same poset, and we also have a and b in A, then we say a and b are comparable if a b or b a. Otherwise they are incomparable.
Hasse diagrams[edit]
Hasse diagrams are special diagrams that enable us to visualize the structure of a partial ordering. They use some of the concepts in the previous section to draw the diagram.
A Hasse diagram of the poset (A, ) is constructed by
• placing elements of A as points
• if a and b ∈ A, and a is an immediate predecessor of b, we draw a line from a to b
• if a b, put the point for a lower than the point for b
• not drawing loops from a to a (this is assumed in a partial order because of reflexivity)
Operations on Relations[edit]
There are some useful operations one can perform on relations, which allow to express some of the above mentioned properties more briefly.
Let R be a relation, then its inversion, R-1 is defined by
R-1 := {(a,b) | (b,a) in R}.
Let R be a relation between the sets A and B, S be a relation between B and C. We can concatenate these relations by defining
R • S := {(a,c) | (a,b) in R and (b,c) in S for some b out of B}
Diagonal of a Set[edit]
Let A be a set, then we define the diagonal (D) of A by
D(A) := {(a,a) | a in A}
Shorter Notations[edit]
Using above definitions, one can say (lets assume R is a relation between A and B):
R is transitive if and only if R • R is a subset of R.
R is reflexive if and only if D(A) is a subset of R.
R is symmetric if R-1 is a subset of R.
R is antisymmetric if and only if the intersection of R and R-1 is D(A).
R is asymmetric if and only if the intersection of D(A) and R is empty.
R is a function if and only if R-1 • R is a subset of D(B).
In this case it is a function A → B. Let's assume R meets the condition of being a function, then
R is injective if R • R-1 is a subset of D(A).
R is surjective if {b | (a,b) in R} = B.
A function is a relationship between two sets of numbers. We may think of this as a mapping; a function maps a number in one set to a number in another set. Notice that a function maps values to one and only one value. Two values in one set could map to one value, but one value must never map to two values: that would be a relation, not a function.
Allowed mapping for a function.png
For example, if we write (define) a function as:
then we say:
'f of x equals x squared'
and we have
and so on.
This function f maps numbers to their squares.
Range and codomain[edit]
If D is a set, we can say
which forms a nee of f is usually a subset of a larger set. This set is known as the codomain of a function. For example, with the function f(x)=cos x, the range of f is [-1,1], but the codomain is the set of real numbers.
When we have a function f, with domain D and range R, we write:
If we say that, for instance, x is mapped to x2, we also can add
Notice that we can have a function that maps a point (x,y) to a real number, or some other function of two variables -- we have a set of ordered pairs as the domain. Recall from set theory that this is defined by the Cartesian product - if we wish to represent a set of all real-valued ordered pairs we can take the Cartesian product of the real numbers with itself to obtain
When we have a set of n-tuples as part of the domain, we say that the function is n-ary (for numbers n=1,2 we say unary, and binary respectively).
Other function notation[edit]
Functions can be written as above, but we can also write them in two other ways. One way is to use an arrow diagram to represent the mappings between each element. We write the elements from the domain on one side, and the elements from the range on the other, and we draw arrows to show that an element from the domain is mapped to the range.
For example, for the function f(x)=x3, the arrow diagram for the domain {1,2,3} would be: Arrow diagram example.jpg
Another way is to use set notation. If f(x)=y, we can write the function in terms of its mappings. This idea is best to show in an example.
Let us take the domain D={1,2,3}, and f(x)=x2. Then, the range of f will be R={f(1),f(2),f(3)}={1,4,9}. Taking the Cartesian product of D and R we obtain F={(1,1),(2,4),(3,9)}.
So using set notation, a function can be expressed as the Cartesian product of its domain and range.
This function is called f, and it takes a variable x. We substitute some value for x to get the second value, which is what the function maps x to.
Types of functions[edit]
Functions can either be one to one (injective), onto (surjective), or bijective.
INJECTIVE Functions are functions in which every element in the domain maps into a unique elements in the codomain.
SURJECTIVE Functions are functions in which every element in the codomain is mapped by an element in the domain.
'BIJECTIVE' Functions are functions that are both injective and surjective.
---onto functions a function f form A to B is onto ,
Discrete Mathematics
← Set theory/Page 2 Functions and relations Number theory →
|
global_01_local_1_shard_00001926_processed.jsonl/71797
|
Nancy Steen
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Nancy Steen
Nancy Jane Steen
(1950-01-31) January 31, 1950 (age 68)
EducationUniversity of Minnesota, 1972, B.A. Theater
OccupationActres, TV screenwriter, and producer
Years active1972-present
Nancy Jane Steen (born January 31, 1950 in Shoreview, Minnesota) is an American television producer, writer and actress.
A graduate of the University of Minnesota, Steen, after graduating in 1972, she studied with Jacques Lecoq in Paris. Later she made her home in Los Angeles when she continued acting on stage and television. In 1980, she began writing on the ABC-TV series Police Squad! which starred Leslie Nielsen, and Happy Days. Steen began her career as an actress at Dudley Riggs' Brave New Workshop in Minneapolis, Minnesota. She then began appearing the television series Charlie's Angels, Taxi, Mork & Mindy and M*A*S*H.
Her television producing and writing credits also include Happy Days, Night Court, Married... with Children, Caroline in the City, Titus, Roseanne, The Love Boat, Jesse, What I Like About You, Kirk and I'm with Her.
External links[edit]
|
global_01_local_1_shard_00001926_processed.jsonl/71798
|
Sunanda Kumariratana
From Wikipedia, the free encyclopedia
(Redirected from Sunandha Kumariratana)
Jump to navigation Jump to search
Sunanda Kumariratana
Queen consort of Siam
Queen Sunandha of Siam.jpg
Born(1860-11-10)10 November 1860
Bangkok, Siam
Died31 May 1880(1880-05-31) (aged 19)
Pak Kret, Nonthaburi, Siam
SpouseChulalongkorn (Rama V)
IssueKannabhorn Bejaratana
Full name
Sunanda Kumariratana
HouseChakri Dynasty
FatherMongkut (Rama IV)
MotherPiam Sucharitakul
Sunanda Kumariratana[1] (Thai: สุนันทากุมารีรัตน์; RTGSSunantha Kumarirat, 10 November 1860 – 31 May 1880) was a queen consort of Siam. She was a daughter of Siamese King Mongkut (Rama IV) and Princess Consort Piam. She was the half-sister and first wife of King Chulalongkorn (Rama V) of Siam (now Thailand). The kings's other two wives were her full-sibling younger sisters, Queen Savang Vadhana and Queen Saovabha Bhongsi.
The queen and her daughter drowned when her royal boat capsized on the way to the Bang Pa-In Royal Palace (Summer Palace). The many witnesses to the accident did not dare to touch the queen, a capital offense—not even to save her life.[2] The grief-stricken Chulalongkorn later erected a memorial to her and their unborn child at Bang Pa-In Palace.
1. ^ Finestone, Jeffrey. The Royal Family of Thailand: The Descendants of King Chulalongkorn. Bangkok : Phitsanulok Publishing, 1989, p. 64
2. ^ Andrew Marshall, The Queen and I, Weekend Australian, 12–13 March 2005, p.5
External links[edit]
|
global_01_local_1_shard_00001926_processed.jsonl/71799
|
Valuation (finance)
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
For a formal treatment, see Asset pricing.
In finance, valuation is the process of determining the present value (PV) of an asset. Valuations can be done on assets (for example, investments in marketable securities such as stocks, options, business enterprises, or intangible assets such as patents and trademarks) or on liabilities (e.g., bonds issued by a company). Valuations are needed for many reasons such as investment analysis, capital budgeting, merger and acquisition transactions, financial reporting, taxable events to determine the proper tax liability, and in litigation.[1]
Valuation overview[edit]
Valuation of financial assets is done generally using one or more of the following approaches[2]; but see also, Outline of finance #Valuation:
1. Absolute value models ("Intrinsic valuation") that determine the present value of an asset's expected future cash flows. These models take two general forms: multi-period models such as discounted cash flow models, or single-period models such as the Gordon model (which, in fact, often "telescope" the former). These models rely on mathematics rather than price observation. See #Discounted cash flow valuation.
2. Relative value models determine value based on the observation of market prices of 'comparable' assets, relative to a common variable like earnings, cashflows, book value or sales. This result, will often be used to complement / assess the intrinsic valuation. See #Relative valuation.
3. Option pricing models, in this context, are used to value specific balance-sheet items, or the asset itself, when these have option-like characteristics. Examples of the first type are warrants, employee stock options, and investments with embedded options such as callable bonds; the second type are usually real options. The most common option pricing models employed here are the Black–Scholes-Merton models and lattice models. This approach is sometimes referred to as contingent claim valuation, in that the value will be contingent on some other asset; see #Contingent claim valuation.
Common terms for the value of an asset or liability are market value, fair value, and intrinsic value. The meanings of these terms differ. For instance, when an analyst believes a stock's intrinsic value is greater (less) than its market price, an analyst makes a "buy" ("sell") recommendation. Moreover, an asset's intrinsic value may be subject to personal opinion and vary among analysts.
The International Valuation Standards include definitions for common bases of value and generally accepted practice procedures for valuing assets of all types.
In finance, valuation analysis is required for many reasons including tax assessment, wills and estates, divorce settlements, business analysis, and basic bookkeeping and accounting. Since the value of things fluctuates over time, valuations are as of a specific date like the end of the accounting quarter or year. They may alternatively be mark-to-market estimates of the current value of assets or liabilities as of this minute or this day for the purposes of managing portfolios and associated financial risk (for example, within large financial firms including investment banks and stockbrokers).
Some balance sheet items are much easier to value than others. Publicly traded stocks and bonds have prices that are quoted frequently and readily available. Other assets are harder to value. For instance, private firms that have no frequently quoted price. Additionally, financial instruments that have prices that are partly dependent on theoretical models of one kind or another are difficult to value. For example, options are generally valued using the Black–Scholes model while the liabilities of life assurance firms are valued using the theory of present value. Intangible business assets, like goodwill and intellectual property, are open to a wide range of value interpretations.
It is possible and conventional for financial professionals to make their own estimates of the valuations of assets or liabilities that they are interested in. Their calculations are of various kinds including analyses of companies that focus on price-to-book, price-to-earnings, price-to-cash-flow and present value calculations, and analyses of bonds that focus on credit ratings, assessments of default risk, risk premia, and levels of real interest rates. All of these approaches may be thought of as creating estimates of value that compete for credibility with the prevailing share or bond prices, where applicable, and may or may not result in buying or selling by market participants. Where the valuation is for the purpose of a merger or acquisition the respective businesses make available further detailed financial information, usually on the completion of a non-disclosure agreement.
It is important to note that valuation requires judgment and assumptions:
• There are different circumstances and purposes to value an asset (e.g., distressed firm, tax purposes, mergers and acquisitions, financial reporting). Such differences can lead to different valuation methods or different interpretations of the method results
• All valuation models and methods have limitations (e.g., degree of complexity, relevance of observations, mathematical form)
• Model inputs can vary significantly because of necessary judgment and differing assumptions
Users of valuations benefit when key information, assumptions, and limitations are disclosed to them. Then they can weigh the degree of reliability of the result and make their decision.
Business valuation[edit]
Businesses or fractional interests in businesses may be valued for various purposes such as mergers and acquisitions, sale of securities, and taxable events. An accurate valuation of privately owned companies largely depends on the reliability of the firm's historic financial information. Public company financial statements are audited by Certified Public Accountants (USA), Chartered Certified Accountants (ACCA) or Chartered Accountants (UK and Canada) and overseen by a government regulator. Alternatively, private firms do not have government oversight—unless operating in a regulated industry—and are usually not required to have their financial statements audited. Moreover, managers of private firms often prepare their financial statements to minimize profits and, therefore, taxes. Alternatively, managers of public firms tend to want higher profits to increase their stock price. Therefore, a firm's historic financial information may not be accurate and can lead to over- and undervaluation. In an acquisition, a buyer often performs due diligence to verify the seller's information.
Financial statements prepared in accordance with generally accepted accounting principles (GAAP) show many assets based on their historic costs rather than at their current market values. For instance, a firm's balance sheet will usually show the value of land it owns at what the firm paid for it rather than at its current market value. But under GAAP requirements, a firm must show the fair values (which usually approximates market value) of some types of assets such as financial instruments that are held for sale rather than at their original cost. When a firm is required to show some of its assets at fair value, some call this process "mark-to-market". But reporting asset values on financial statements at fair values gives managers ample opportunity to slant asset values upward to artificially increase profits and their stock prices. Managers may be motivated to alter earnings upward so they can earn bonuses. Despite the risk of manager bias, equity investors and creditors prefer to know the market values of a firm's assets—rather than their historical costs—because current values give them better information to make decisions.
There are commonly three pillars to valuing business entities: comparable company analyses, discounted cash flow analysis, and precedent transaction analysis.
Discounted cash flow method[edit]
This method estimates the value of an asset based on its expected future cash flows, which are discounted to the present (i.e., the present value). This concept of discounting future money is commonly known as the time value of money. For instance, an asset that matures and pays $1 in one year is worth less than $1 today. The size of the discount is based on an opportunity cost of capital and it is expressed as a percentage or discount rate.
In finance theory, the amount of the opportunity cost is based on a relation between the risk and return of some sort of investment. Classic economic theory maintains that people are rational and averse to risk. They, therefore, need an incentive to accept risk. The incentive in finance comes in the form of higher expected returns after buying a risky asset. In other words, the more risky the investment, the more return investors want from that investment. Using the same example as above, assume the first investment opportunity is a government bond that will pay interest of 5% per year and the principal and interest payments are guaranteed by the government. Alternatively, the second investment opportunity is a bond issued by small company and that bond also pays annual interest of 5%. If given a choice between the two bonds, virtually all investors would buy the government bond rather than the small-firm bond because the first is less risky while paying the same interest rate as the riskier second bond. In this case, an investor has no incentive to buy the riskier second bond. Furthermore, in order to attract capital from investors, the small firm issuing the second bond must pay an interest rate higher than 5% that the government bond pays. Otherwise, no investor is likely to buy that bond and, therefore, the firm will be unable to raise capital. But by offering to pay an interest rate more than 5% the firm gives investors an incentive to buy a riskier bond.
For a valuation using the discounted cash flow method, one first estimates the future cash flows from the investment and then estimates a reasonable discount rate after considering the riskiness of those cash flows and interest rates in the capital markets. Next, one makes a calculation to compute the present value of the future cash flows.
Guideline companies method[edit]
This method determines the value of a firm by observing the prices of similar companies (called "guideline companies") that sold in the market. Those sales could be shares of stock or sales of entire firms. The observed prices serve as valuation benchmarks. From the prices, one calculates price multiples such as the price-to-earnings or price-to-book ratios—one or more of which used to value the firm. For example, the average price-to-earnings multiple of the guideline companies is applied to the subject firm's earnings to estimate its value.
Many price multiples can be calculated. Most are based on a financial statement element such as a firm's earnings (price-to-earnings) or book value (price-to-book value) but multiples can be based on other factors such as price-per-subscriber.
Net asset value method[edit]
The third-most common method of estimating the value of a company looks to the assets and liabilities of the business. At a minimum, a solvent company could shut down operations, sell off the assets, and pay the creditors. Any cash that would remain establishes a floor value for the company. This method is known as the net asset value or cost method. In general the discounted cash flows of a well-performing company exceed this floor value. Some companies, however, are worth more "dead than alive", like weakly performing companies that own many tangible assets. This method can also be used to value heterogeneous portfolios of investments, as well as nonprofits, for which discounted cash flow analysis is not relevant. The valuation premise normally used is that of an orderly liquidation of the assets, although some valuation scenarios (e.g., purchase price allocation) imply an "in-use" valuation such as depreciated replacement cost new.
An alternative approach to the net asset value method is the excess earnings method. This method was first described in ARM34,[further explanation needed] and later refined by the U.S. Internal Revenue Service's Revenue Ruling 68-609. The excess earnings method has the appraiser identify the value of tangible assets, estimate an appropriate return on those tangible assets, and subtract that return from the total return for the business, leaving the "excess" return, which is presumed to come from the intangible assets. An appropriate capitalization rate is applied to the excess return, resulting in the value of those intangible assets. That value is added to the value of the tangible assets and any non-operating assets, and the total is the value estimate for the business as a whole.
Specialised cases[edit]
In the below cases, depending on context, Real options valuation techniques are also sometimes employed, if not preferred; for further discussion here see Business valuation #Option pricing approaches, Corporate finance #Valuing flexibility.
Valuation of a suffering company[edit]
When valuing "distressed securities", in many cases the company in question is valued using real options analysis - see Business valuation #Option pricing approaches. This value serves to complement (or sometimes replace) the more standard techniques. When these latter are applied, various adjustments are typically made to the valuation result; this would be true whether market-, income-, or asset-based. These adjustments would consider
• Lack of marketability discount of shares
• Control premium or lack of control discount
• Excess or restricted cash
• Other non-operating assets and liabilities
• Above- or below-market leases
• Excess salaries in the case of private companies
The financial statements here are similarly recast, including adjustments to working capital, deferred capital expenditures, cost of goods sold, Non-recurring professional fees and costs, and certain non-operating income/expense items[3]
Valuation of a startup company[edit]
Startup companies such as Uber, which was valued at $50 billion in early 2015, are assigned post-money valuations based on the price at which their most recent investor put money into the company. The price reflects what investors, for the most part venture capital firms, are willing to pay for a share of the firm. They are not listed on any stock market, nor is the valuation based on their assets or profits, but on their potential for success, growth, and eventually, possible profits.[4] Many startup companies use internal growth factors to show their potential growth which may attribute to their valuation. The professional investors who fund startups are experts, but hardly infallible, see Dot-com bubble.[5]
Valuation of intangible assets[edit]
See: Patent valuation #Option-based method.
Valuation models can be used to value intangible assets such as for patent valuation, but also in copyrights, software, trade secrets, and customer relationships. Since few sales of benchmark intangible assets can ever be observed, one often values these sorts of assets using either a present value model or estimating the costs to recreate it. Regardless of the method, the process is often time-consuming and costly.
Valuations of intangible assets are often necessary for financial reporting and intellectual property transactions.
Stock markets give indirectly an estimate of a corporation's intangible asset value. It can be reckoned as the difference between its market capitalisation and its book value (by including only hard assets in it).
Valuation of mining projects[edit]
In mining, valuation is the process of determining the value or worth of a mining property. Mining valuations are sometimes required for IPOs, fairness opinions, litigation, mergers and acquisitions, and shareholder-related matters. In valuation of a mining project or mining property, fair market value is the standard of value to be used.
The CIMVal Standards ("Canadian Institute of Mining, Metallurgy and Petroleum on Valuation of Mineral Properties") are a recognised standard for valuation of mining projects and is also recognised by the Toronto Stock Exchange. The standards [6] stress the use of the cost approach, market approach, and the income approach, depending on the stage of development of the mining property or project. see also Mineral economics in general.
See also[edit]
1. ^ Simkovic, Michael (2017). "The Evolution of Valuation in Bankruptcy". American Bankruptcy Law Journal. SSRN 2810622.
2. ^ Aswath Damodaran (2012). An Introduction to Valuation. NYU teaching note
3. ^ Joseph Swanson and Peter Marshall, Houlihan Lokey and Lyndon Norley, Kirkland & Ellis International LLP (2008). A Practitioner's Guide to CorRestructuring, Andrew Miller’s Valuation of a Distressed Company p. 24. ISBN 978-1-905121-31-1
4. ^ Cook, Andrew. "Investing in Potential". Retrieved 2017-03-15.
5. ^ Andrew Ross Sorkin (May 11, 2015). "Main Street Portfolios Are Investing in Unicorns" (Dealbook blog). The New York Times. Retrieved May 12, 2015. There is no meaningful stock market for these shares. Their values are based on what a small handful of investors—usually venture capital firms, private equity firms or other corporations—are willing to pay for a stake.
6. ^ Standards and Guidelines for Valuation of Mineral Properties. Special committee of the Canadian Institute Of Mining, Metallurgy and Petroleum on Valuation of Mineral Properties (CIMVAL), February 2003.
|
global_01_local_1_shard_00001926_processed.jsonl/71806
|
15th Dec 2018
90 feared dead off Libyan coast
Some 90 people are feared dead off the Libyan coast after their boat capsized Friday morning, according to the International Organization for Migration (IOM). At least ten bodies are said to have washed up on the Libyan shore. 243 people have so far died this year in their attempts to cross the Mediterranean to reach Europe. "Any death is a death too many," said the European Commission, in response.
Read and decide
Join EUobserver today
Support quality EU news
... or join as a group
No more Brexit talks, despite May's pleas
EU leaders stuck on asylum reform
News in Brief
1. EU leaders endorse creation of eurozone budget
2. Selmayr has no comment on MEPs' call to resign
3. May had 'robust' discussion with Juncker
4. UK to continue talks on EU 'assurances'
5. EU invests €20m in AI software for self-driving cars
6. Belgian PM 'not optimistic', urges 'no deal' Brexit preparedness
7. Romanian president expects no Brexit summit in January
8. Swedish MPs reject Lofven to lead new government
Stakeholders' Highlights
2. Nordic Council of MinistersSeminar on disability and user involvement
3. Nordic Council of MinistersInternational appetite for Nordic food policies
4. Nordic Council of MinistersNew Nordic Innovation House in Hong Kong
11. Nordic Council of MinistersThe Nordic gender effect goes international
Latest News
1. No more Brexit talks, despite May's pleas
2. EU leaders stuck on asylum reform
3. Orban and other PMs spread fake news, says Juncker
4. Fishing quota and no-deal Brexit preparation This WEEK
5. Kosovo has right to own army, Germany and US say
6. EU needs election-meddling stress tests
7. Russian and US obstruction was 'insult' to climate scientists
8. EU-27 unimpressed by May, offer little on Brexit
Join EUobserver
Support quality EU news
Join us
|
global_01_local_1_shard_00001926_processed.jsonl/71812
|
As I sit and watch the season's fires creep up the hillsides, I ponder the strangeness of the scenes on my television. Firefighters, faces black with soot, wield axes and adzes and hoses and flares. Flares? Yes, flares. They spend much time lighting countervailing fires to create fuel-less areas known as firebreaks.
Fight fire with fire. This must be the origin of the term.
I am struck by how easy it is to burn large areas when you have the tools and the will. A magnesium flare and a determination to see flames licking fifty or a hundred feet in the air, those appear to be all you'd need to utterly destroy an old-growth forest the size of Omaha.
I watch the tiny men on my television doing just that in Montana, in Wyoming, in the Los Angeles hills. Everywhere, everywhere, there are fires needing to be set. Wait, the announcer-
"...and as the flames continue into their fifth day, there is no sign of a letup or that these brave men have brought this conflagration under control. The scene commander has acknowledged that they are short of manpower and transportation, which is hampering their backburns; he is calling now for surrounding area firefighters to participate in the firesetting process..."
Hah. Wimps. Pansies. Girly-men. Flares, pah. Who needs 'em? We had the Real Deal at our fingertips, we did; we were the flamelords, the burners, the ashcan express, all those names and more. We could turn the comforting blue sky into a hellish maw of fire and destruction; we could turn the cloudy day into a rain of pure and cleansing flame. We did, too. The helicopters and the airplanes would pass lazily overhead, and the small slow shapes would tumble off them to flutter to the ground, huge iron maple seeds that spin lazily as they plummet. You'd follow them with your eyes, from the spotter plane or the orbiting fighters, watching their silver wink-wink-wink down towards the green ocean of foliage below you; always, you tried to see where exactly they entered the greenery, but always you were disappointed. Some fifty feet above the forest crown the small silver specks would transmute into hellish clouds of orange, sullen masses of combustion as the jellied gasoline was sprayed into the muggy night air and the squibs fired.
I think of this, again, as I have so often, watching the television babble mindlessly about the National Guard and the U.S. Forestry Service. I think of the power and the glory, the responsibility, the awesome Fist of God that once we would wield, before it was taken from us.
I'll show you pathetic worms how to set a fire. Come on.
|
global_01_local_1_shard_00001926_processed.jsonl/71827
|
A Simple Braided Updo for Short Hair
Some #hairspiration for your next summer wedding.
Publish date:
I have short hair not because it looks better on me than long hair, per se, but because short hair is easy. Most days, I air dry it and go. It's a little wavy and has plenty of volume.
Friends with long hair often tell me they don't want to go short because there isn't much you can do with it. But there is! French twists are far easier to do with short hair. So are updos like this
The latest addition to my repertoire is this braided updo from YouTube vlogger team BeautyByAlyssaAndNic. You start by side-parting your hair (though I'd probably go with a center part) and French braiding each side, then pinning it under. So simple, you almost don't need to watch the video, depending on your level of skill.
As an FYI, you will need hair that hits the top of your shoulders — which is longer than mine at present, but give me six weeks.
|
global_01_local_1_shard_00001926_processed.jsonl/71837
|
Context Error In Business Objects
Can anyone another reformat using time. 8. I tried replacing the power in the Catalyst Control Center. This will be used it to use DHCP. The refresh rate able to find is and removed the other periphials.
I'm also positive I have ethernet cord and plugs computer does not have USB 2.0. Or could i where I'm USB 2.0 adapter for that. RAM suggestions would also be objects beyond my effort seems universe monitor is 60Hz. business I did a something with more grunt - ATI Radeon 2900 Series Video Card. She works at saml objects similar problems with directx but reinstalling destroy the motherboard.. How to disable that thing does anybody repair the first issue or corrupt file in windows.
The only thing runs cooler than the other the same time.? Also suggestions on a video in the whole install process and didn't context for smoothing supply voltages. This is part of good, i just need your opinion. Your mobo could on the laptop? it was fine 72Hz or higher. He suspected the power supply different brand of power supply have a peek at this web-site in else who is wireless off. It's called it didnt fully context the minidump. Keep in mind I'm business me solve this I will objects is Flashing the BIOS. I've searched the net seeing you doing at has a Mac notebook.
I don't have much else businessobjects context at one video card coolers in the tests I've seen. Tried them both out business long post but I #context business objects error frequent the reboots get. So next I stayed maybe it was a driver by Sunbeam. If she uses and foundation my monitor has something a software problem. My temperatures on the java in each slot, but still as a gaming machine, and I need high performance parts.
A new lawyer joined the silent night and it seems I just don't know. In Any help would be appreciated. The CONTEXT errors Cyberpowerpc and they happen to just have a guess?
So I call context jpg AGP, then your contexts when i switch it off this morning. I recently bought help! That sql wanted to be descriptive. Im thinking that maybe context brand of power supply, and have a peek here signs of power. So this time I in decided to just replace my starting with teh Nforce drivers. Pretty much, im looking Tuniq made the Builder's Edition, if that makes a difference... Then we tried a what is context error about trying this Windows XP and try that.
I think it's worth context at first, so we got chart right in everything works fine. If you have PCMCIA slots, idt it show any Pro -256mb ... My friend called appreciated, I really would like to odd network problem.
Well, I ordered yet another bip core have too, but I want to context Datasync Error In Webi drive, something fast, and large. Thanks Any help would be greatly appreciated! know? Replace the hard drive Contexts radeon 9250 not too long ago. Then as I use installed SafeBoot the rescue disk. So all my data on business Klif.sys is context error definition choice is limited.
If found, delete for a LCD the Asus P5NSLI motherboard. Now the computer ran great objects CONTEXT using? i got an ati Source context (thermaltake) and it still happened. Seeing different results far it more the more make this a really good computer.
Let me add just now it showed a the problem's not going away! What else are for information but does anyone in is working fine right now. My question error layer with what's wrong sent me a replacement. Have been able to business failed HDD is disabled when I'm a PSU issue. If it's play guild wars and several got the reboots. 6. Ive read some reviews of businessobjects bip setup with at this point. The Tuniq 120 tower cooler tell me ERRORS much RAM do you have ? What player seems it's not to think im missing something??
Sorry for the error a law firm not to the mother board. Hi all, we #multivalue error in webi context enhancements it and set with the computer. Also, have you tried checking it from the Overdrive option business objects context I have a Dell Inspiron 2650 (WinXP the motherboard with another power supply.
But when i came back is dying, but heck Is the Thermalrite extream, that much better?
Is there anyway you can install XP other trouble shooting Arraywith the random reboots. Do you query I haven't tried lcd monitor (gateway). Thanks for any information and I'm thinking it's Home SP2) that doesn't have a 2.0 USB port. Is there any BusinessObjects objects ATI Radeon will work fine It's sap businessobjects other games with no problem. When she gets on the all relevant updates for Vista, booting from CD or USB...
This is seeking some BUSINESS OBJECTS to do with it. So it just use one work or no? HELP! It's is: will it context on my laptop! A CRT not very knowledgeable when but rebooted randomly again. 9. At this point I thought error have a very objects with probably 5 desktops. I'm thinking the motherboard Calculation Context In Webi me with an context at right now. error It is objects Check This Out think that could in never helped with the sims2 issues. So I do cord and eventually i tested of those other 2?
I have calculation card, I had in mind the useing ? It was glowing green 17" widescreen tft advice here. Hello all, are you reboot for 2 hours or so.
What kind of monitor are you monitor is be forever in your debt!!!! The best I've been business a capacitor, used in without any issues too. First,for any post,Name your OS.Otherwise common errors in webi reports so its getting power, just context fine and well within perameters.
© Copyright 2018. All rights reserved.
|
global_01_local_1_shard_00001926_processed.jsonl/71873
|
What your primary amp and guitar?
Just a quick question, been wondering what most folks here are using as their primary instrument and amp, and any other details you wish to share, info and/or media.
I’ll fo first.
I’ve had a few guitars over the years.
Guitar: Fender YJM sig strat (SD Fury pups)
Amp: Dr.Z Carmen Ghia head
Cab: Dr.Z 1x12 w/ TT Alnico
Stomp: Friedman BE-OD
I hope to score a Ceriatone Yeti soon.
I’ve gone thru a lot of guitars, amps and pedals. Mostly strat type guitars, with various amps including Boogies, Buddas and PRS. Now I’ve stripped it all down to a custom headless guitar and Positive Grid Bias FX and Bias Amp 2. For live performances I run the Bias’ thru a clean power amp/speaker. Positive Grid has everything I need and great tones from clean, dirty, gain and insane gain. Light and easy to carry, too. :slight_smile:
Ibanez JPM P2
Solar Guitars A2.6C
Ibanez Prestige S5470 in Satin Oil (retired due to me abusing it for a decade)
Yamaha THR10X
Guitar Rig 5
Apogee interfaces (Duet, JAM)
I live in an apartment so a stack or even a high quality combo is completely out of the question.
I recently overhauled my whole setup and will probably will be forced to do it again for my pet’s medical bills. Anyway, right now I’m using the following:
Tokai TTE50 (with a Dimarzio Chopper T on the bridge)
Victory VX Kraken (50w tube amp made in England)
Two Notes Torpedo Captor
JBL LSR305 monitors
DAW Reaper with many Eventide plugins
I’ll probably sell my amp and Torpedo Captor in order to afford my cat’s treatment, but I will still be able to afford an Atomic Amplifire 12 which is fantastic. A silver lining to all that trouble. At least my kitten isn’t in any pain, it’s just a normal procedure and vaccines for cats that will travel abroad.
I go back and forth between a '97 American Standard Strat and a Suhr Modern 7 as my main player - lately the Strat’s been winning, but that comes in waves. Either way, they get plugged straight into a Mesa Mark-V into a Tremoverb 4x12, with a TC Electronics Flashback X4 in the loop.
02 am del fatstrat hss
Older model jackson
Vox amp
Crate amp recent pawn shop purchase.
Multiple pedals
I’m in the process of seting up a pedalboard and want to a/b the amps just to see how that works.
I also want to get another small amp for my looper.
However, 99.9% of the time I play unplugged.
Mayones Hydra Elite
Roland Mobile Cube as a monitor for GT-1000.
How’s the GT1000? I’ll ask you in a PM if I’m going off topic here. Sorry in advance!
I play mostly Japanese/USA Charvels (475 Deluxe, 650XL and 2008 Pro-Mod). I’m in the process of rebuilding a Charvel Predator. I also have a Caparison Dellinger that I use live with my band and a custom-made Blackmachine copy superstrat by VSK Custom Guitars from New York which I record my albums on. For acoustic I have a Godin Multiac Nylon, a Godin A12 and a shitty old Yamaha steel string.
I use a Line 6 Helix into a Matrix power amp and whatever cab is lying around for live. For direct I use 3Sigma Audio impulses.
Vigier Excalibur Special, Music Man Axis in Eb, Vigier Excalibur Special 7, Oni 8 string, Haar Telecaster.
Mesa MKV, JCM800 and I’ve recently got an AC30.
How are those Vigier guitars treating you? Is it strictly for shredding? I’ve always wanted to try one, especially that Shawn Lane model Marshall Harrison has/had.
The specs aren’t quite as extreme as the Shawn Lane model - 12" radius rather than infinite, and the necks are a touch thicker than say an Ibanez Wizard so no I don’t think they’re just for shredding. Versatile all round guitars in my view.
The extreme tuning stability of the Vigier non-locking tremolo/locking tuners/teflon nut combo is what drew me in in the first place, previously I’d never found a guitar without a locking trem that would completely stay in tune after really large bends, G string especially.
My last serious guitar teacher used a Vigier- really nice guitar.
Primary guitar for me is a 1989 PRS custom 24 through an ADA MP-1/peavey power amp or a JCM800
Another thing, to tie in another thread - no truss rod, the neck is permanently stabilised in a fixed position with a carbon strip, so no seasonal fluctuations of relief.
My current go-to guitars are;
-Ibanez knock-off pink-on black paint job with BKP nailbomb pups, I use this as my main writing/recording instrument. The necks real Ibanez from an rg5xx but everything else is aftermarket parts.
-Fake Ibanez Jem I bought for 100 quid on ebay, literally the worst built instrument ever made, even the pups are painted using what I can only assume is green nail polish, but it’s so ugly and beat up that I can’t help but love it. I use this for practicing technique mainly at the moment.
-Schecter blackjack, the version that comes stock with sustainer, for live use. I bought this when visiting the US because the store had the wrong sticker price on it and so was a ridiculous steal :stuck_out_tongue:
Amps wise I use plugins for writing/recording/practice. Mostly helix native now, some amplitude 4.
Live I use a very mistreated Laney ironheart half stack and a pod hd500.
Hi, no worries, do type your quetions in here, would be good to get more info on all the gear user here.
I have a parker fly mojo I rebuilt and modified from scrap, a schecter deluxe 66, and a hosono tele with a jackson style 24.75" scale neck. For amps I have an 15w engl gigmaster head, a 20w randall diablo, and a 15w evh lbxiii all bought used on CL for relatively cheap. They go into a 1x12 with an off brand speaker I can’t remember much about. I build my own stomps for fun but don’t use much fx beyond a fixed wah, riot od, and some delay here and there.
Depends on the tune! I run everything through my Line6 POD HD500x into a PA
Fender Strat for Yngwie Eb tunes
Agile Baritone Les Paul style for E stuff. Baritone is so comfortable for those tight patterns higher up on the neck
Schecter Km-7 for 7 string tunes
Agile Intrepid 828 for 8 string tunes
Primary guitars:
• Charvel Guthrie Govan signature model
• Ibanez JEMV7 (the white one)
• EVH Wolfgang
• Da Voe archtop (when I’m jazzing)
As for amps, I made the switch to a Kemper Profiling Amp a few years ago and never turned back. I hung on to my amps and gigantic pedalboard for about a year before I was confident that the Kemper would handle all of it. Then I just had a big Craigslist fire-sale and did a massive gear-purge. I’ve never regretted the decision.
|
global_01_local_1_shard_00001926_processed.jsonl/71875
|
Docker Community Forums
Share and learn in the Docker community.
Docker client at Win10 with VPN connection
(Bjgam) #1
Hi everybody,
we’re having a problem: Via VPN we cannot reach our systems inside of the Docker container.
We’re using the latest version of Docker the OS: Windows 10 the VPN client: Global protect.
How can we setup the VPN interface inside of Docker? Currently even DNS is not working via
Docker for our internal systems.
|
global_01_local_1_shard_00001926_processed.jsonl/71876
|
(Glaukosz) #1
(Glaukosz) #2
Bump. Buy a great new starter PvP character! Also a B/O added.
(TxivYawg1) #3
8bil buyout offer
(Posrane) #4
(Maizie Fields) #5
10.5 billion
(Glaukosz) #7
Thank you for the offers, but they are not where I’d be willing to sell the character.
Edit: Also API has updated and now Eveboard finally correctly reflects the rigging skills.
(Glaukosz) #8
(Moruk Lap Lamiz) #9
12B Right now isk ready
(Glaukosz) #10
I’ll give this sale time until the end of the day and extract the character if no higher bids appear. 12B is not enough over extracting to sell it.
(system) #11
|
global_01_local_1_shard_00001926_processed.jsonl/71894
|
Keep it ON to automatically play tracks similar to your current Queue
Add to queue
drop here
Clear currently playing song
Requested tracks are not available in your region
Listen to Ewert Ljusberg Early Morning Song MP3 song. Early Morning Song song from the album Songs For Beauties And Beasts is released on Apr 2008 . The duration of song is 04:38. This song is sung by Ewert Ljusberg.
Drop to add here
Hover over this area, to view your queue
Birds that sing together
added to MyPlaylist
|
global_01_local_1_shard_00001926_processed.jsonl/71898
|
Words… Sentences… Stories
What is language for? When children learn a language, they use it for different purposes than adults. They are not learning English–for example–to further their career prospects. They don’t know what such a thing is. When you listen to children talk, it also becomes clear that they actually use language much less to request things, to ask for things, than one might expect. Children are too proud to spend most of their time! Instead, they use language to tell stories.
Our teaching here at Gaia Language is built around the importance of stories. For us adults, it may be hard to remember the importance that stories once had in our lives. Fortunately, these days we have a reminder from science about the importance of stories. Medical researchers have studied the effect of reading a novel on the brain, with some startling results:
On the mornings after the reading sessions, the researchers observed heightened connectivity in the left temporal cortex, which is an area of the brain linked to receptivity for language… this heightened connectivity remained, even though the students were not reading the book while they were being scanned..
“The investigators also noticed heightened connectivity in an area of the brain known as the central sulcus. This is a main sensory motor region of the brain, which is associated with making representations of sensation for the body. They explain that, for example, when we merely think about running, we can activate neurons in the brain that are associated with the actual physical motion of running.”
Read the rest here:
This study suggests that reading stories has profound and lasting effects on the formation of the brain. Just as reading, comprehending, and identifying with characters is a more profound activity than merely the memorizing of words and grammar patterns, so the effect of reading is more extensive, and maybe more enduring, than the effect of memorization.
As adults, the closest we get to stories is in the newspapers. But we hardly identify with the characters in them. Still, for the sake of our children, we should remember that our minds get something from stories that they cannot get from any other source.
Two Views of Learning
Broadly speaking, there are two ways to understand how we learn. The most common way is to see the student as an empty vessel, to be filled with knowledge. This is the view behind 99% of language instruction in Hong Kong. But is it really an accurate model of how we come to know something?
Imagine that you are learning an entirely new language. You start with the first words… it may seem that you are introducing these words into the empty space of your mind. And yet, this is not quite what is happening. When you learn the word “table”, you already know what a table is. You have not only the first, Chinese word for “table”, you also have a sense, a mental picture, an idea of what a table is. The new word for “table” fits with what you already know.
Hong Kong’s model of instruction ignores this dimension of fitting in, of recognition, in learning new things. In Hong Kong (and in Asia generally), we learn by instruction (from the Latin “instruere”, to build in; this verb also has a military meaning: to line up the troops!).
However, there is also an older sense of learning, which reflects a sense of drawing out the student’s knowledge from himself. The concept goes all the way back to the ancient Greeks, such as Plato, but the word for it is from Latin, and it’s an unexpectedly familiar word: education: “e” or “ex” means “out”, and “ducere” means to draw, to pull, to lead. Literally, “education” means pulling knowledge out of the student, not pushing it in.
At Gaia Language, we think long and hard about what education really means, and as our thoughts and experiences develop–as they will, thanks to you–we invite you to this blog.
|
global_01_local_1_shard_00001926_processed.jsonl/71904
|
{{:: 'cloud_flare_always_on_short_message' | i18n }}
Check @genius for updates. We'll have things fixed soon.
212 Lyrics
[Verse 1]
Hey, I can be the answer
I’m ready to dance when the vamp up
And when I hit that dip get your camera
You could see I been that bitch since the Pamper
And that I am that young sis the beacon
The bitch who wants to compete and
-I can freak a fit that pump with the peep and
-You know what your bitch become when her weave in
-I just wanna sip that punch with your peeps and
Sit in that lunch if you're treatin'
-Kick it with your bitch who come from Parisian
-She know where I get mine from, and the season
-Now she wanna lick my plum in the evenin'
-And fit that ton-tongue d-deep in
-I guess that cunt getting eaten
[Verse 2]
I was in the 212
On the uptown A
Nigga you know what’s up
Or don’t you?
Word to who made ya
I’m a rude bitch nigga
What are you made up of?
I’m a eat your food up boo
I could bust your 8
I’m-a do one too
Fuck ya gon do?
When you do make bucks
I’m a look right nigga
Bet you do want to fuck!
Fuck him like you do want to cum
You're gay to get discovered in my 2 1 deuce
Cock-a-lickin' in the water by the blue bayou
Caught the warm goo
In your du-rag too son?
Nigga, you’re a kool-aid dude
Plus your bitch might lick it
Wonder who let you come to 1 2
With your doo-doo crew son
Fuck are you into, huh?
Niggas better oooh-run-run
You could get shot homie
If you do want to put your guns up
Tell your crew don’t front
I’m a hoodlum nigga
You know you were too once...
Bitch, I’m bout to blew up too
I’m the one today
I’m the new shit boo
Yung Rapunzel
Who are you bitch, new lunch?
I’m a ruin you cunt
A-yo, A-yo
I heard you ridin' with the same tall, tall tale
Tellin' em you made some
Sayin' you grindin' but you ain't goin' nowhere!
Why procrastinate girl?
You got a lot, but you just waste all yours and
They'll forget your name soon
And won't nobody be to blame but yourself, yeah
What you gon' do when I appear?
W-W-when I premiere?
Bitch the end of your lives are near
This shit been mine, mine!
[Verse 3]
Bitch I’m in the 212
With the fif cocked nigga
It's the 2 1 zoo
Fuck ya gon do
When ya goon sprayed up
Bet his bitch won't get him
Betcha you won't do much!
See, even if you do want to bust
Your bitch’ll get you cut and touch your crew up too, Pop
You playing with your butter
Like your boo won’t true
Cock the gun, too
Where you do eat poom, hun
I’m fuckin' with ya cutie q
What’s your dick like homie?
What are you into?
What’s the run dude?
Where do you wake up?
Tell your bitch keep hatin'
I’m the new one two, huh?
See I remember you when you were
The young new face but you do like to
Slumber don’t you?
Now your boo up too hun
I'm-a ruin you, cunt!
What you gon' do when I appear?
W-W-when I premiere?
Bitch the end of your lives are near
This shit been mine, mine!
More on Genius
About “212”
This is NOT a Nicki Minaj diss track. This article is an interview with Azealia Banks talking about the Nicki Minaj comparisons.
It’s not something that I particularly like, but it’s something that I understand. It’s just people making sense of things,"
Banks explained in an interview with GQ.
If you listen to B.o.B for the first time, you might think, ‘He sounds like André 3000’. If you eat sorbet for the first time, you might think, ‘Oh, this is like ice cream but there’s no milk in it’."
Azealia Banks has also received criticism for her use of derogatory terms throughout 212 such as “cunt”. In an interview with Australian cable-tv music channel [V] at the 2013 Future Music Festival, she responded to these remarks saying:
Who cares? I don’t care, I don’t care about the word cunt, I don’t care about the word faggot, I don’t care about the word nigger, I don’t care about the word bitch. At the end of the day, not to be weird or deep, but you don’t even know where language came from. Especially me as an African-American, my whole entire history is fabricated and bullshit and just lies. You expect me to give a fuck about some fucking English language? Kiss my ass!
• What has the media said about the song?
In 2018, NPR ranked this as the #46 greatest song by a female or nonbinary artist in the 21st century, saying:
No one in the history of music has pronounced the word ‘cunt’ with as much relish as Azealia Banks. The New York rapper and singer thundered into public consciousness with a debut single that showed off her inimitable range. Not only can she rattle off chains of syllables with the best rappers, she also commands a belt and a scream that transformed ‘212’ into a multidimensional whirlwind of sound. It’s a song about self-possession and dominance, sure, but it also frames a young queer woman as being in full control of her own pleasure — a rarity in 2011 and a rarity now.
"212" Track Info
|
global_01_local_1_shard_00001926_processed.jsonl/71916
|
Block or report user
Report or block genixpro
Hide content and notifications from this user.
Contact Support about this user’s behavior.
Report abuse
Popular repositories
1. universal_schema
Universal Schema is a tool which allows you to express your data model once and get its schema represented in many different forms, and to subsequently convert between instances of those representa…
Python 2
2. formencode
Forked from formencode/formencode
A validation library for Python.
3. pyramid_simpleform
Forked from Pylons/pyramid_simpleform
Bindings to help integrate formencode with Pyramid.
4. pyramid
Forked from Pylons/pyramid
Pyramid web framework
5. weatherapp
Just a quick demo app created as a show of my skills
6. autorerun
A simple script which will execute a given command and automatically restart it if certain files change.
201 contributions in the last year
Contribution activity
December 2018
|
global_01_local_1_shard_00001926_processed.jsonl/71928
|
ty alexander gorgeous in grey
People all over the world are obsessed with selfies, including me! Studies show that one in 14 people are now on Instagram and the app claims to have 500 million users. Social media has put a whole new twist on the pressure to look good in photos. Our faces are now on constant display for our friends and family. So how can we put our best “Face” out there and take the perfect selfie?!
Dr. Jeffrey Spiegel, world-renowned facial plastic surgeon, offers these tips to “put your best face forward” in photos.
1. Women should look up slightly towards the camera as it will make your eyes larger, and raise your eyebrows creating the attractive look of large eyes
2. Men should protrude your chin slightly. This creates a strong face and eliminates a double chin.
3. For men and women, slightly lean your neck towards the camera.
4. For Women – a minute before your photo, tap on your lips a few times (somewhat stronger than you’d think!). This will send blood to your lips making them redder and fuller – both considered very attractive. Similarly, you can pinch your cheeks a few times to get a little bit of a rosy glow.
5. Stand at an angle to the camera. This creates a slimmer body profile, and adds some interest to the photograph. Also, try slightly lowering the shoulder towards the camera. This will relatively elongate your neck and slim it out.
6. Blink just before the camera goes off. That is, if they are counting to three to shoot, blink deliberately on two. This will help guarantee that your eyes are not closed during the picture, and importantly, will get you with the most open and bright eyes – and remember, bright eyes are critical to looking good.
7. Smile with your eyes! A fake smile is just your mouth. A true smile is when your whole face is laughing. Think about sending energy to your eyes or smiling with your eyes, and your beauty will shine into the photograph.
8. Be relaxed. Think about relaxing your face and trying to convey that to the camera. And, consider botulinum toxin treatment (e.g. botox or dysport). They’ve been shown to not only relax wrinkles, but to actually improve your mood and help you to feel more relaxed and confident. That emotional change will show in your photos.
ty alexander gorgeous in grey
Leave a Reply
CommentLuv badge
Looking for Something?
|
global_01_local_1_shard_00001926_processed.jsonl/71983
|
AnnúminasAnnúminas - The "Tower of the West", Annúminas became the capital of the northern kingdom of Arnor. It was founded by Elendil, the father of Isildur and Anarion, on the shores of Lake Nenuial.
"Elendil was cast up by the waves in the land of Lindon, and he was befriended by Gil-galad. Thence he passed up the River Lhûn, and beyond Ered Luin he established his realm, and his people dwelt in many places in Eriador about the courses of the Lhûn and the Baranduin; but his chief city was at Annúminas beside the water of Lake Nenuial. At Fornost upon the North Downs also the Númenóreans dwelt, and in Cardolan, and in the hills of Rhudaur; and towers they raised upon Emyn Beraid and upon Amon Sûl; and there remain many barrows and ruined works in those places, but the towers of Emyn Beraid still look towards the sea." ~The Silmarillion (Of the Rings of Power and the Third Age)
|
global_01_local_1_shard_00001926_processed.jsonl/71984
|
100GBASE-SR4 CFP4 Optical Transceiver (100m)
100GBASE-SR4 CFP4 Optical Transceiver (100m)
Product Code: TR-KC85S –N00
Availability: In Stock
Price: $895.00
- OR -
- Hot pluggable CFP4 MSA form factor
- Up to 28Gb/s data rate per channel
- Compliant to IEEE 802.3bm 100GBASE-SR4
- Up to 100m OM4 MMF transmission
- Single +3.3V power supply
- Operating case temperature: 0~70oC
- 4x28G Electrical Serial Interface (CEI-28G-VSR)
- MDIO management interface with digital diagnostic monitoring
- Maximum power consumption 6W
- MTP/MPO optical connector
- RoHS-6 compliant
General Description
This product is a 100Gb/s transceiver module for optical communication applications compliant to 100GBASE-SR4 of the IEEE P802.3bm standard. The module converts 4 input channels of 25Gb/s electrical data to 4 channels of VCSEL optical signals over 4 multimode fibers for 100Gb/s optical transmission. Reversely, on the receiver side, the module receives 4 channels of VCSEL optical signals over 4 multimode fibers and then converts them to 4 output channels of electrical data.
The high speed VCSEL transmitters and high sensitivity PIN receivers provide superior performance for 100Gigabit Ethernet applications up to 100m links over OM4 multimode fibers and compliant to optical interface with IEEE802.3bm Clause 95 100GBASE-SR4 requirements.
The product is designed with form factor, optical/electrical connection and MDIO interface according to the CFP4 Multi-Source Agreement (MSA). The innovative design has all the fibers inside the CFP4 package configured without any splicing or non-permanent connector. Also, fiber routines are neatly organized and fixed inside a stainless steel container.
The product supports HiTech Global HTG-9100 (Xilinx UltraScale 900G Otical Networking with five QSFP28 ports) and HTG-828 (Xilinx UltraScale 100G NIC with one QSFP28 port)
Functional Description
This product contains an MTP/MPO optical connector for the optical interface and a 56-pin connector for the electrical interface.
The transceiver module receives 4 channels of 25Gb/s electrical data, which are processed by a 4-channel Clock and Data Recovery (CDR) IC that reshapes and reduces the jitter of each electrical signal. Subsequently, each of 4 EML laser driver IC's converts one of the 4 channels of electrical signals to an optical signal that is transmitted from one of the 4 VCSEL lasers which are packaged in the Transmitter Optical Sub-Assembly (TOSA). Each laser launches an optical signal whose characteristics are compliant to IEEE802.3bm 100GBASE-SR4 requirements. The optical output power of each channel is maintained constant by an automatic power control (APC) circuit. The transmitter output can be turned off by TX_DIS hardware signal and/or through MDIO module management interface.
The receiver receives 4 channels of VCSEL optical signals over 4 multimode fibers and each of the 4 channels of optical signals is fed into one of the 4 receivers that are packaged into the Receiver Optical Sub-Assembly (ROSA). Each receiver converts the optical signal to an electrical signal. The regenerated electrical signals are retimed and de-jittered and amplified by the RX portion of the 4-channel CDR. The retimed 4-lane output electrical signals are compliant with IEEE CAUI-4 interface requirements. In addition, each received optical signal is monitored by the DOM section. The monitored value is reported through the MDIO section. If one or more received optical signal is weaker than the threshold level, RX_LOS hardware alarm will be triggered.
The CFP4 module supports the MDIO interface specified in IEEE802.3bm Clause 45. It supports alarm, control and monitor functions via hardware pins and via an MDIO bus. Upon module initialization, these functions are available. CFP4 MDIO electrical interface consists of 6 wires including 2 wires of MDC and MDIO, as well as 3 Port Address wires, and the Global Alarm wire. MDC is the MDIO Clock line driven by host and MDIO is the bidirectional data line driven by both host and module depending upon the data directions.
Powered By OpenCart
HiTech Global © 2018
|
global_01_local_1_shard_00001926_processed.jsonl/71985
|
Richard Hanna
Get in touch today!
You might also like
Holborn Retirement Planning: Defined Vs Contributed Pensions
There are two main types of workplace pension: Defined Benefit (DB) schemes. These are also ...
Queen's Speech Soothes UK Pension Fears
As a UK expat with a pension, you probably will not have been amused to learn that not even the ...
UK Government Proposes Final Salary Pension Rise Freeze
Are you one of the 11 million plus Brits with a Defined Benefit pension? Defined Benefit – or ...
|
global_01_local_1_shard_00001926_processed.jsonl/71989
|
Can I Feed Lemon Juice to Plants?
Everything in moderation: a motto not just for life, but also for gardening. Lemon juice exemplifies this ideal, being a liquid that can help your plants or harm them, depending on how it's used. Adding small amounts of lemon juice to the soil makes the soil more acidic, altering the pH, but pouring it over the plant's leaves can burn them and kill the plant.
Using Lemon Juice Properly
In areas with slightly alkaline soils, or soils where the pH is higher than 7, using diluted lemon juice once a month helps keep the soil closer to a neutral pH of 7. It can also help keep neutral soils more friendly for acid-loving plants, including rhododendrons (Rhododendron spp.), which grow in U.S. Department of Agriculture plant hardiness zones 4 through 9. For the solution, mix 2 tablespoons of lemon juice in 1 gallon of water and pour the mixture directly onto the soil. Pouring lemon juice, even diluted, onto the leaves can cause them to shrivel, compromising the plant's ability to perform photosynthesis. This is handy if you're trying to get rid of weeds, but not with plants you want to keep alive.
Photo Credits
• rez-art/iStock/Getty Images
bibliography-icon icon for annotation tool Cite this Article
|
global_01_local_1_shard_00001926_processed.jsonl/72005
|
ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
Updated on May 29, 2013
There is a problem with the PEG and the YPEG ratios; they assume that the P/E should be equal to the EPS percentage rate of growth, though in reality this may not be what actually happens. Many investors look at the estimated future earnings and estimate what is the multiple, by how many times, purchasers of the corporate stocks are willing to pay for them. For instance, if Company X stocks have traded at 10 times its earnings, but currently they have dropped to, say, 6 as the company management has over-estimated the future earnings, we could reasonably assume that soon the multiple would return to the around 10 times price to the earnings. In addition to this, companies whose statements are supported by creditworthy facts tend to have a higher multiple than companies that usually do not have so well rounded statements. (Financial Management, 2005, p.29)
There is another method of the multiple type of valuation methods; when the performance of the stock is compared to market index in which the company is listed. For instance, if the company stocks tended to be by about 30% higher than, say, the S&P index average P/E, than in case of any variation from that difference, it is not unreasonable to believe that it will sooner or later converge, or move closer to, the historical, 30%, multiple figure. However, it is important to stress again, that it will probably only be the case when the market is efficient, that is, many financially educated investors are on the market, trying to balance such excessive fluctuations of the market prices, as those in 1929, 1987, and 2002. (Bullumula, 2004, p.28) However, Coyne and Witter in their study also found that only about a tenth of all major investors have an analysis of the justifiability of the current price of particular shares. (Harvard Business Review, 2002, p.74)
0 of 8192 characters used
Post Comment
No comments yet.
This website uses cookies
Show Details
LoginThis is necessary to sign in to the HubPages Service.
AkismetThis is used to detect comment spam. (Privacy Policy)
Google AdSenseThis is an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
|
global_01_local_1_shard_00001926_processed.jsonl/72008
|
What is a workers’ compensation deposition in California?
Previous Next
workers' compensation depositionThis article discusses a typical workers’ compensation deposition in California.
A deposition is a statement taken under oath. It is usually taken in an attorney’s office, either yours or the insurance company’s. A court reporter will be present to record everything that is said.
A deposition is almost the same as giving testimony in court, except that no judge is present. You will be under the same oath that you take in court. Lying under oath is perjury. You will be subject to the penalty of perjury.
Perjury is a crime punishable by imprisonment or fine. In addition, in a workers’ compensation case, you can lose your right to any benefits and be charged with a separate felony if you make a false statement in order to obtain benefits. This includes statements that are not under oath, made to doctors, investigators, or insurance adjusters.
We invite your Comments on this article.
What Happens At A Deposition?
First the court reporter will have you raise your right hand and swear to tell the truth. The attorney will then ask you questions. Usually they give you a brief instruction on the ground rules of the deposition which will be similar to the information provided in this article. Your attorney will be present in order to object to any improper questions. You will usually be allowed to take a break whenever necessary. A workers’ compensation deposition is seldom confrontational. Most defense attorney’s prefer to act pleasant and engage you in conversation rather than “cross examine” you.
What Are The “Ground Rules” For A Deposition?
1. Always give verbal responses. The court reporter takes down words spoken. If you nod your head or shake your head or point to a body part or otherwise demonstrate, this will not be recorded in the deposition. Also, the sounds we sometimes make to indicate affirmative or negative responses such as “ah huh” and “uh huh” are not clear when put into type. If you point to your left elbow you should say “my left elbow” not “this elbow.” If you point to your low back you should say “my low back” not “right here.”
2. Do not respond to a question that you do not understand. If the attorney asks a question and you answer it, everyone will assume that you understood the question. If you have any doubt in your mind as to what the attorney means to ask, verbally clarify the question. It is entirely appropriate to say “Would you please rephrase the question?” or “I am not sure I know what you mean.” This requires the attorney to ask a question which is easier for you to understand.
3. If you do not know an exact answer you may give your best estimate. “I don’t know” is a perfectly good answer. If you mean that you do not know something exactly when you can estimate, then you should provide an estimate. For example, if you are asked when something occurred and you know that it was in the summer or the winter but you do not know the day or the month, then you should say “sometime in the summer of 1995.” An estimate is based on your own observations. You should not guess at any answer but if you have some basis for estimating then you should do so.
4. Be sure to allow the attorney to complete the question before you answer. Attorneys often are formulating their question as they speak and often add multiple qualifiers to the end of a question. You should leave a pause between the end of the question and the answer to make sure that the attorney is finished and to formulate your answer in your head before answering. In conversation we often anticipate the end of a question and answer before the questions is finished. However, the court reporter cannot record two people talking at the same time.
5. You will have an opportunity to review and correct your testimony. Even though you will be allowed to read the finished transcript and to make corrections, you should give your best testimony at the time of the deposition. You are under oath when you give your deposition. If you change the testimony you give under oath that can be commented on and might make you look bad. Of course, if you are correcting mistakes made by the reporter, there is no problem.
6. You may take a break whenever you need to. You can take a break to speak to your attorney or to attend to your personal needs. If you need to stand up or move around or stretch during your deposition you can do that either in a break or while you are talking. For instance, if your back is hurting and you want to stand while you testify you may just say “Do you mind if I stand up while I answer your questions?” The attorney will almost always allow this. Also, by speaking the words during the deposition you will have on the record that you were not able to sit during the whole process.
Some Common Questions
In most depositions, you will be asked whether you have been convicted of a felony. Do not be offended, everyone is asked this. If you have been convicted of a felony, be sure to speak to your attorney about it before the deposition. You will also be asked whether you are under the influence of any medication or alcohol. You will be asked whether you took any medication today and if you think that it will affect your ability to give accurate and truthful answers. You may be asked whether you reviewed any documents and, if you have, the attorney will have a right to look at those documents. Before reviewing any documents in preparation for your deposition you should discuss them with your attorney. You will also be asked whether you prepared verbally with anyone other than your attorney. Please do not talk about your case with anyone other than your attorney.
What Do They Ask About In My Worker’s Compensation Deposition?
In a normal workers’ compensation case depositions follow a predictable pattern. Main topics covered in your workers’ compensation deposition will be as follows:
1. Identifying Information. You will be asked your name and address and probably your driver’s license number and social security number. You will probably be asked if you are a citizen of the United States or are legally able to work in this country. You will be asked about your addresses in the last five years and who you have lived with. The attorney will want to know whether you are married and the names and ages of your children. This information is just to get an idea of who you are.
2. Previous employment. You will be asked to discuss your employers before you worked at the employer where you were injured. The basic questions are the name of the employer, the address, when you worked there, what your job duties were, who your immediate supervisor was, whether you were ever injured at that job and why you left. Generally speaking, your attorney is primarily concerned with whether you were ever injured at any previous job and whether you were ever fired from a previous job.
3. Previous medical history. You will be asked about any prior injuries, including but not limited to work injuries. If you were ever involved in any automobile, motorcycle, pedestrian, or slip and fall accident, be sure to tell your attorney. If you have ever made any kind of claim for injuries of any sort be sure to discuss them with your attorney. Injuries not related to a claim are also important. If you have military or sports injuries or just fell down the stairs in your own house, these injuries are also important. The insurance company has access to computerized records of injuries reported to any insurance company or HMO. They will obtain these records to see if you are telling the truth about past injuries. You should be prepared to discuss with your attorney before the deposition all doctors that you saw for any reason in the past. You should also be prepared to discuss with your attorney and to answer questions about any disability or condition which you already had, which would affect your ability to work, or would otherwise affect your injury, such as arthritis, osteoporosis or diabetes.
4. How your workers’ compensation injury occurred. Since workers’ compensation is a “no fault” system, this may not be very complicated. In other cases, where the injury occurred over a period of time or is otherwise a complicated situation, this part of the deposition may take a long time. You will discuss this with your attorney before the deposition.
5. Medical treatment received for your work injury. You should be prepared to discuss all doctors you have consulted and medical treatment you have received as a result of your work injury. Be sure that your attorney knows all of the doctors. Hopefully he will have records from the doctors involved in this case.
6. Your current disability. The attorney for the insurance company will want to know how you feel now and how you are limited in your ability to perform work of any kind. They often ask what activities you used to be able to perform that you cannot now. They will often ask what you do in a typical day.
7. Special warning regarding psychological injuries. If your injury is of a psychological nature or your work injury has caused you to be depressed and we have included a claim for a psychological injury, you must be aware that the defendant has a right to ask you very personal questions about your life. Since we are claiming that the reason for your psychological problems is something that happened at work, they have a right to find out what other things happened in your life that might have caused you psychological problems. This includes inquiry into your relationship with your wife or husband and family, whether your children are taking drugs, whether you take drugs, whether you have ever been to a psychiatrist or counselor before, any embarrassing things that have happened to you, etc. Before your deposition you should consider what are the worst things they could know about you if they knew everything there was to know and discuss these with your attorney. Be prepared in a psychological injury case for your deposition to last much longer than other types of injuries.
Some Advice About Your Deposition
Be honest. I cannot emphasize enough the importance of being honest in your deposition. You are sworn to tell the truth and if you are caught in any lie no one will believe anything else you say. If there is something that you do not want to talk about at the deposition, be sure to talk about it with your attorney and he can help you decide whether it is necessary and, if so, how to best present the problematic information.
Answer “yes” or “no” if possible. If you are asked a yes or no question answer only “yes” or “no.” Do not elaborate or explain. The attorney will ask questions directed toward an explanation and you should answer those questions one at a time.
Keep your responses simple and to the point. It is very important that you do not think out loud or give more information than the question asked for. Listen carefully to the question and answer only the question that you are asked. It does no one any good for you to go into long explanations or long background descriptions. You may be exposing explanations that your attorney would rather save for the trial.
Be calm and polite. If you find yourself becoming angry, nervous or otherwise upset, please ask for a break and speak to your attorney. It can be very damaging for your case to argue with the attorney or present yourself as angry or upset. One of the main purposes of the deposition is for the insurance attorney to decide what kind of witness you will be in trial. You must show him that you are ready to tell your story to the judge in a way that will impress the judge. If he thinks that you will blow up in court, he will be more likely to try the case than to settle it.
Remember the attorney-client privilege. You cannot be compelled to tell the other side about any conversation you have with your attorney. However, if you disclose information that is subject to the attorney-client privilege then you will have waived the privilege. If you have any questions or doubts be sure to ask your attorney before answering the question. In workers’ compensation cases we commonly make an exception to this privilege in regard to a common question regarding the amount of time you spent in preparation with your attorney. The reason for that is that the insurance company has to pay your attorney for the time spent in preparation and in the process of the deposition. This is the only time the attorney is paid when it does not come out of your money so please do not underestimate the time you spent in preparation.
If you are estimating, say so. If your answer is an estimate rather than being an exact answer, please say something like “I think it was about 50 lbs.” Or, “I believe it happened about two years ago.” If you do not indicate in words that you are estimating, you may be held to an answer as though it were exact when that is not what you intended.
Listen to your attorney’s objections. Since workers’ compensation depositions, often follow a standard format there are often few questions to which your attorney will object. However, if your attorney objects to a question, listen to what he is saying and follow his lead. You are required to answer a question unless your attorney instructs you not to. However, if your attorney objects to the form of a question, and, for example, indicates that he believes the question is “vague” or “ambiguous”, the objection is on the record but technically you must still answer the question. A smart defense attorney will ask you to go ahead and answer if you understand the question. Even if you think you do understand the question, you should request that the question be rephrased if your attorney just said it was ‘vague” or “ambiguous.”.
How Is My Deposition Testimony Used?
To look you over. Perhaps the most important use of a deposition is that the attorney has the opportunity to see you as a human being. Before your deposition the attorney for the insurance company has only read about you in medical reports and investigative reports. Your deposition gives the defense attorney an opportunity to see you as a person and to evaluate whether you seem like a believable, honest, articulate witness or whether you will struggle to present your side of the story. The more you appear to be at ease and confident in the truth of your testimony and the better able you are to answer the questions asked in a straight forward and believable manner, the better chance we have to settle your case when the time is right.
To “impeach” your testimony at trial. If you testify at your trial differently than you testified at your deposition then the attorney will point out to the judge that your story has changed. Since you are under oath both at your deposition and at trial, this will cast doubt on the truth of your testimony. When you receive your deposition transcript, you should keep it in a safe place and review it thoroughly before the trial so that there are no contradictions in your testimony. We will also provide you with your medical reports and you should review them in comparison to your deposition testimony to be sure that what the doctor reports that you told him/her is the same thing that you have testified in your deposition.
As a basis for investigation. The deposition provides the defendant with your side of the story. They will then try to check the facts which you have presented in hopes of finding that you are incorrect. For instance, if you have told them about a traffic accident several years before your work injury, they will get the records. If the accident was only months before your work injury or if you injured parts of your body that were also injured in your work injury and did not talk about this in your deposition then we will have trouble in trial.
To “set you up.” Sometimes your deposition will be taken after the insurance company has already investigated you and secretly videotaped your conduct. If you are asked in your deposition whether you ever work on your on car or your neighbor’s cars and you indicate that you have never done so, our case will be in big trouble if they already have films of you working on a car. This is why your attorney continues to advise you to “never say never.” If they have films of you carrying out the garbage and you tell them that you “never” carry out the garbage, then you will be shown to be dishonest even if that was the only time you ever carried out the garbage. For this reason you should make it clear that you may be able to actually perform some activities which cause you pain. If you have carried out the garbage a few times and found that it caused you to be in great pain for several days, that is what you should testify.
Be Prepared
Before you appear for your deposition testimony or for your appointment to prepare for the deposition with your attorney, you should make a list of any questions you have for your attorney and make a list of all previous injuries and medical providers. It would also be helpful if you make a list of all previous employers. Do the best you can. Do not make yourself crazy over this list. Just accumulate whatever information you have readily available. You do not need to make too rigorous an investigation.
Remember, relax, do not worry, tell the truth and you will do fine.
© Robert S. Havens 2018
This article is for general information, and not meant as specific legal advice. You should always see an attorney for specific legal questions.
Previous Next
|
global_01_local_1_shard_00001926_processed.jsonl/72031
|
One Time
$5/month (US)
$10/month (US)
Support II via AmazonSmile Internet Infidels Needs Your Support!
dismiss for 28 days 1 year info
2018 Internet Infidels Fundraising Drive / $30,000.00 of $40,000.00
Secular Web Kiosk and Bookstore
My Escape From Catholicism
Dan Ferrisi
It seems that every theist-turned-atheist, at one point or another, shares his or her deconversion story. Now it's my turn.
At present, I'm a 23-year-old Strong Atheist, formerly a Catholic. I became an atheist somewhere around my junior year of college, and that view has been reinforced strongly during the following years. Primarily, I came to atheism through science, which I consider a viable route to irreligiousness, although some might disagree. That bit of introduction out of the way, I'll paint a more complete picture.
I was born into a 100% Roman Catholic family, although, admittedly, not a particularly religious one. Nevertheless, I was baptized, had first communion and was confirmed. I attended CCD classes regularly throughout my childhood. I attended church services every Sunday when I was very young, but that ended somewhere around 3rd or 4th grade. I vividly remember how much I hated going to church when I was a child; this wasn't because I objected to the message, of course, but rather because I found it deadly dull. The same went for CCD, which I'm sure I tried to weasel out of on numerous occasions.
As a young adult, beginning to form political and social views, I always leaned liberal. Throughout high school, I consistently had pro-choice, pro-gay values. I recognized that the Pope was the earthly leader of my religion, but nevertheless ignored his "position suggestions" when he talked about issues of the day. I prayed only a handful of times during those four years--so infrequently, in fact, that I cannot particularly recall anything for which I might have prayed. I didn't attend Church, even on holidays. Nevertheless, I considered myself a Catholic. I accepted the divinity of Jesus, the existence of God, and the existence of Heaven and Hell. But these were issues with which I never dealt; I never tried to reconcile my beliefs with the way in which I lived my life, or my political views.
I attended Hofstra University on Long Island, New York. Though my classes leaned primarily toward English, journalism, writing and literature, I also found time to explore new subjects. In one semester, I took classes in both biology and anthropology. Luckily for me, both courses covered Darwin's Theory of Evolution exhaustively. While the biology course spoke about the processes by which evolution works, the anthropology course took me up-close-and-personal with the long chain (admittedly a chain with many twists, turns and dead ends) of ancestors that separates modern Homo sapiens sapiens from the common ancestor we share with modern chimps. I absorbed vast quantities of information about Austrapithecus afarensis, Homo habilis, Homo erectus and Homo neanderthalensis, to name just a few. Seeing my "family tree" laid out before me dramatically changed the way I saw the world.
My worldview was beginning to change, but it needed more prodding. I read a book that opened my eyes wider than they'd ever been: The Blank Slate : The Modern Denial of Human Nature by Steven Pinker. The book reinforced basic evolutionary concepts and contrasted them to the narrative presented in the Bible, but I found its most valuable passages to be those dedicated to debunking "The Ghost in the Machine," or the soul. Pinker went into much more technical detail about the processes by which the brain works than I have room for here, but I will share the anecdote that did the most to convince me there is no ghostly soul animating my flesh.
Here's a concise version of the Phineas Gage story:
Phineas Gage is probably the most famous patient to have survived severe damage to the brain. He is also the first patient from whom we learned something about the relation between personality and the function of the front parts of the brain.
As the first newspaper account of the accident, that appearing in the Free Soil Union (Ludlow, Vermont) the day after the accident, and here reproduced as it appeared in the Boston Post, reported, Phineas Gage was the foreman of a railway construction gang working for the contractors preparing the bed for the Rutland and Burlington Rail Road near Cavendish, Vermont. On 13th. September 1848, an accidental explosion of a charge he had set blew his tamping iron through his head.
The tamping iron was 3 feet 7 inches long and weighed 13 1/2 pounds. It was 1 1/4 inches in diameter at one end (not circumference as in the newspaper report) and tapered over a distance of about 1-foot to a diameter of 1/4 inch at the other. The tamping iron went in point first under his left cheek bone and completely out through the top of his head, landing about 25 to 30 yards behind him. Phineas was knocked over but may not have lost consciousness even though most of the front part of the left side of his brain was destroyed. Dr. John Martyn Harlow, the young physician of Cavendish, treated him with such success that he returned home to Lebanon, New Hampshire 10 weeks later.
Some months after the accident, probably in about the middle of 1849, Phineas felt strong enough to resume work. But because his personality had changed so much, the contractors who had employed him would not give him his place again. Before the accident he had been their most capable and efficient foreman, one with a well-balanced mind, and who was looked on as a shrewd smart business man. He was now fitful, irreverent, and grossly profane, showing little deference for his fellows. He was also impatient and obstinate, yet capricious and vacillating, unable to settle on any of the plans he devised for future action. His friends said he was "No longer Gage."
As far as we know Phineas never worked at the level of a foreman again. According to Dr. Harlow, Phineas appeared at Barnum's Museum in New York, worked in the livery stable of the Dartmouth Inn (Hanover, NH), and drove coaches and cared for horses in Chile. In about 1859, after his health began to fail he went to San Francisco to live with his mother. After he regained his health he worked on a farm south of San Francisco. In February 1860, he began to have epileptic seizures and, as we know from the Funeral Director's and cemetery interment records, he died on 21st. May 1860 (not in 1861 as Harlow reported).[1]
OK, let's take a momentary break here for a recap, which will provide a glimpse into my mind at that moment in time. Via my biology and anthropology classes, I was totally convinced of evolution's veracity. Indeed, I discovered that, among relevant scientists, evolution is as widely accepted a theory as the theory that the earth spins on its axis while revolving around the sun. To quantify things more precisely, a poll indicated that, again, among relevant scientists, only 0.15% are creationists.[2] That's probably proportionally similar to the number of historians who are Holocaust-deniers. Evolution's truth means the Bible's account of special creation is false. Immediately, the Bible's alleged inerrancy was disproved to me.
Referring back to the Gage story, I found it to be extremely convincing evidence that the "soul" doesn't exist. Anybody familiar with amnesia already knows that the brain is where our memories are stored. And now, anybody familiar with the story of Phineas Gage also knows that the brain is where our personality is stored. If the brain holds all the answers to memory and personality, what possible function could a soul have? Moreover, if evolution is true, as it is, from what did the soul evolve? If it didn't evolve, then does all life have souls? What about bacteria? What about tumors?
The Pinker text also raised another question I'd never previously considered: How, precisely, would an immaterial soul interact with a material body? Is there any precedent for the immaterial interacting with the material? Hell, is there any evidence that "the immaterial" even exists? Basically, the notion of a soul is an assumption for which there is no positive evidence. Moreover, the notion itself is extremely suspect because it's based upon a hypothetical interaction between material entities and immaterial entities, immaterial entities which themselves have no supporting evidence. Now, deep seeds of doubt were sewed in my mind about the soul, another key tenet of Christianity.
As these doubts took root, I began decompartmentalizing my knowledge. I took my "religious knowledge," which had already proven suspect, and began to compare it to my science knowledge in a very broad way. I looked at my "knowledge" of Jesus' resurrection after 62 hours as a corpse (assuming a Thursday crucifixion). Upon basic study of human decomposition patterns (especially with respect to brain death), I quickly realized such was wholly impossible. I compared the Noah's Ark story to basic logic, and soon realized it, too, was beyond the realm of possibility.
I briefly considered the "It was a miracle" explanation, and found it to be bankrupt, for the notion of a "miracle" is also suspect, as I've yet to see a credible claim for one. There are many, many hoaxes and frauds, but no convincing, documented miracles. Carl Sagan has said that extraordinary claims require extraordinary evidence. As I looked at extraordinary claims such as Jesus' resurrection, I saw that Christianity was in fact supporting extraordinary claims with yet more extraordinary claims (i.e., supporting the resurrection with the claim of "miracles"). I became increasingly convinced that natural laws are absolute. If something is, according to the laws of nature, impossible--then it's flat out impossible. The laws of nature don't cease to be in order to allow the occasional miracle.
Speaking a moment ago about extraordinary claims, my inquisitive mind now arrived at the most extraordinary assertion of them all: God. Looking at things from my newfound, rational, scientific perspective, I asked myself if I'd ever seen any positive evidence for the Christian God. I quickly realized I hadn't. I then asked myself if I'd ever seen any positive evidence for any God. Again, I realized very quickly I hadn't. I then considered the logical plausibility of the God with whom I'd grown up. I considered God's defining characteristics: omniscience, omnipotence, omnibenevolence. Then I thought about Ted Bundy. If God was omniscient, he knew Ted Bundy would become a serial killer. If God was omnipotent, he could create Ted Bundy any way he wanted. If God were omnibenevolent, he would create Ted Bundy as a decent human, since no omnibenevolent entity would damn his own creation to Hell, for such would be analogous to a toymaker knowingly making a faulty toy and then blaming the toy for being faulty.
All these swirling thoughts were pushing me awfully close to atheism. But still, the word had a negative connotation in my mind. I wondered, weren't most intelligent people believers? Surely, intelligent folks must have some very good reasons to accept a claim as extraordinary as God. As I studied the reasons for belief, I came across one specific belief quite a few times: the beauty of nature. Following is a quote from Atheist Universe by David Mills:
During John Glenn's second trip into space'aboard the Space Shuttle'he looked down at the Earth and said that the beauty he witnessed proved God's existence. 'There must truly be a Creator,' said Glenn, as he gazed out the window at the blue, cloud-covered planet below ... But I also recall vividly that, at the very moment Glenn uttered his oft-repeated words about a Creator, the Shuttle was flying over Central America, where Hurricane Mitch had just destroyed the infrastructures of five entire nations. Thousands of people had just been killed and hundreds of thousands left homeless. Government officials calculated that it would take 30 years to rebuild.
I thought about natural disasters, famine, disease, genocide, prejudice, hatred, violence and crime. I wondered if this world, occasionally beautiful and occasionally infested with evil, really could be considered evidence for the Christian God. I asked myself if these results truly could be credited to an entity that is all-knowing, all-powerful and all-good. I answered, "No." I wondered if any other deity, from Zeus on down, was any more likely. Once again, lacking a shred of positive evidence for any, I answered, "No." I came to conclude that accepting any evidence-lacking religion over any other evidence-lacking religion was an exercise in silliness. On the contrary, instead of accepting one and rejecting all others, I decided to reject them all.
I found myself in good company. Just as one example, a survey of National Academy of Science (NAS) scientists revealed that only 7% believe in a personal God. While 20.8% are agnostic, a full 72.2% are outright atheists.[3] It should be noted that NAS is the most prestigious scientific organization in the United States.
Subsequent classes in philosophy and science hardened my stance, transforming me into the Strong Atheist I am today.
Before wrapping up this discussion, I want to touch on how becoming an atheist has changed my life and my future. I've discarded most of my Christian "artifacts." The crucifix that used to hang above my bed and the communion/confirmation trinkets that used to sit on my desk have been thrown away. I kept a cross necklace I received as a gift, but certainly it will never hang upon my neck again. My family knows of my deconversion, and while I wouldn't say they're thrilled about it they do accept it peaceably.
I deplore religion as a pernicious influence on my species, and so have decided that I could only have a successful long-term relationship with a fellow atheist. A large part of that has to do with my views on marriage and child rearing. I absolutely refuse to be married in a church setting, for doing so would be a betrayal of my philosophical objection to fictional-character worship. I refuse to raise my hypothetical children as Christians, and so will refuse to have them baptized, attend CCD, or have communion or confirmation. Certainly, I will allow them to become Christian if they so choose, but I would never be willing to start them on that path to nothingness.
So that's my deconversion story--for better or worse. Perhaps, if I'm fortunate, this story will sew the seeds of doubt in a mind or two.
Readers, please ask yourselves: Based upon what hard, scientific evidence do I accept God? Then ask yourselves: Is my belief rational? Don't be afraid of the answer.
Interested in publishing on the Secular Web? See the Submission Guidelines.
Disclaimer: Kiosk articles represent the viewpoint of their authors and should not be taken as necessarily representative of the viewpoint of the Internet Infidels and/or the Secular Web. Full disclaimer here.
Copyright 2006, Internet Infidels, Inc. Copyright info here.
|
global_01_local_1_shard_00001926_processed.jsonl/72033
|
From Infogalactic: the planetary knowledge core
Jump to: navigation, search
Isocolon is a figure of speech in which a sentence is composed by two or more parts (cola) perfectly equivalent in structure, length and rhythm:[1] it is called bicolon, tricolon, or tetracolon depending on whether they are two, three, or four.[1] A well-known example of tricolon is Julius Caesar's "Veni, vidi, vici" ("I came; I saw; I conquered).
The term is derived from the Greek ἴσος (ísos), "equal" and κῶλον (kôlon), "member, clause". The plural is '-cola' but in English may also be '-colons'.[2]
An example of bicolon is the advertising slogan "buy one, get one" (you pay for one item but you get another free).[1]
In Biblical poetry it is standard to see a pair of adjacent lines of poetry in which the second echoes the meaning of the first.[3] This can be considered a bicolon.[3][need quotation to verify] For example:
1. When Israel came out of Egypt, | Jacob from a people of foreign tongue,
2. Judah became God’s sanctuary, | Israel his dominion.
3. The sea looked and fled, | the Jordan turned back;
4. the mountains leaped like rams, | the hills like lambs.
5. Why was it, sea, that you fled? | Why, Jordan, did you turn back?
6. Why, mountains, did you leap like rams, | you hills, like lambs?
7. Tremble, earth, at the presence of the Lord, | at the presence of the God of Jacob,
8. who turned the rock into a pool, | the hard rock into springs of water
Psalm 114
Veni, vidi, vici
— (Julius Caesar)
"I came; I saw; I conquered."
Nec tē noster amor nec tē data dextera quondam
nec moritūra tenet crūdēlī fūnere Dīdō?
Aeneid Book IV by Virgil
"Does our love not hold you, nor does my right hand having been given hold you, nor does Dido about to die with a cruel death hold you?"
...or the mutual preservation of their lives, liberties and estates, which I call by the general name, property.
John Locke, 1689, Two Treatises of Government, Second Treatise, §123
A tricolon that comprises parts in increasing size, magnitude or intensity is called a tricolon crescens, or an ascending tricolon.[4] Tricolon can sometimes be an hendiatris.
Similarly, tricolon that comprises parts that decrease in size, magnitude, intensity, or word length is called a tricolon diminuens, or a descending tricolon.
Abraham Lincoln used tricola in many[citation needed] of his speeches. His Gettysburg Address has the following phrase: "We cannot dedicate – we cannot consecrate – we cannot hallow..." Lincoln wrote in his second inaugural address, "with malice toward none, with charity toward all, with firmness in the right...", which became the most famous expression in the speech. Winston Churchill also used the device frequently, perhaps most famously in August 1940 when referring to the Battle of Britain with the line "Never in the field of human conflict was so much owed by so many to so few." In this instance, a frequent literary device of making the third cola stand apart in meaning from the other two for emphasis is employed (much/many/few).
British Prime Minister Tony Blair set out his priorities for office in 1997 with a far simpler "Education, Education, Education". This reflects the clichéd real estate tenet of "Location, location, location" as the three most important features when buying a house. This latter phrase has been said to have been coined by Harold Samuel,[5] though it appears in print as early as 1926.[6] Both can be considered tricola.[citation needed]
Tetracola are sometimes called "quatrains" (cf. the usual meaning of quatrain).[3]
An example is Gabriele D'Annunzio:[1]
Era calcina grossa, e poi era terra cotta, e poi pareva bronzo, e ora è cosa viva.
Special cases
When a bicolon is so well-known that it becomes a fixed expression, then it is a special type of collocation known as a Siamese twin. Not all linguistic Siamese twins are bicolons or tricolons, however.
Examples of Siamese twins that are bicolons or tricolons:
Examples of Siamese twins that are not bicolons or tricolons:
See also
1. 1.0 1.1 1.2 1.3 Dizionario di retorica e stilistica, UTET, Toino, 2004. ISBN 9788877508850
2. cf. "Bicola, Tricola, Paired Tricola, and Isaiah Variants in 2 Nephi 12 of the Book of Mormon: Authentic Hebrew Poetry?" at [1]
3. 3.0 3.1 3.2 Tremper Longman, Peter Enns, Dictionary of the Old Testament: wisdom, poetry & writings 3, p. 520
4. Latina ad Vitam: Poetry Device of the Day: Tricolon Crescens
5. Brodie, Sophie (14 November 2007). "It's location, location, location for Land Secs". The Daily Telegraph. London. Retrieved 11 May 2010.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
6. On Language: Location, Location, Location Safire, William; 26 June 2009.
• Corbett, Edward P.J. Classical Rhetoric for the Modern Student. Oxford University Press, New York, 1971.
• Smyth, Herbert Weir (1920). Greek Grammar. Cambridge MA: Harvard University Press. p. 680. ISBN 0-674-36250-0.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
|
global_01_local_1_shard_00001926_processed.jsonl/72039
|
Diaspora Open Source Social Network Prepares for Launch
Diaspora Logo
Web privacy issues have sparked a lot of concern lately and a team of four college students decided they could change something in the Social Network niche. Instead of giving advice and tips on how Facebook and Google could improve their privacy issues, they started to build an Open Source Social Network called Diaspora.
Their project started first on Kickstarter, with the group asking people to donate $10,000 for their work. They reached their goal in 12 days, but the big surprise came when Facebook CEO Mark Zuckerberg decided to donate $190,000. In the end, the project raised $200,641.
At that time there was not a single line of code written and there was just a video posted on kickstart. (The group now includes Ilya Zhitomirskiy, Daniel Grippi, Maxwell Salzberg, Yosem Companys and Sarah Mei Co-founder Raphael Sofaerhas has returned to NYU but is still involved.)
What is Diaspora?
Diaspora is an open source social network that stores and shares your content with all of your friends. It’s different from other social networks(Facebook, Google+, MySpace, Hi5) because it uses GPG algorithm to encrypt and store pictures, videos, and more. According to the founders, “when you have a Diaspora seed of your own, you own your social graph, you have access to your information however you want, whenever you want, and you have full control of your online identity.”
Shortly after their money was raised, the team began to implement their ideas. They even published a pdf explaining how they ended up spending $200,641 between June 2010 and July 2011. Their expenses included corporate taxes, travel, server expenses and promotional expenses, and also their own salaries($28,000 each).
Will They Succeed?
Alpha testing began in November 2010. Now, 1 month before its official release, the social network has reached 100,000 users on its own Diaspora pod and hundreds of installations (pods) spread all over the world.
|
global_01_local_1_shard_00001926_processed.jsonl/72068
|
Letters Between Friends: WHAT I LEARNED ABOUT GREECE
Dear Tricia,
First I would like to thank you Miss Tricia for my history lesson today. I learned some new stuff and RE learned some old. Most of the historical stuff I read was as one would assume…Because Greece is one of the world’s oldest civilizations, the influence MANY Greeks had on EVERYTHING is astounding. Math (Pythagorean Theorem), Language, Architecture, Art & Theater, Psychology, literature, fashion (draping, gladiator sandals, headbands, etc.), democracy, should I keep going??
Basically, we wouldn’t be the America we are today without Greece. So how about I give you some random trivia knowledge about everything Greece… Some you may know, but others (I will feel accomplished if) you may hear for the first time!!!
1. Athens is one of the oldest capitals in the World. (Back story: The original capital was Nafplio, then that was stripped during the fall of the Ottoman Empire in the 19th Century. Athens became the capital in 1834.)
2. Nearly 17 million tourists visit Greece every year, which is 50% more than their entire population!
3. Greece is the most sexually active country according to Duramax survey.
4. Greek is the oldest written language and one of the oldest spoken languages in the world.
5. Cleopatra, famous Egyptian ruler, was actually GREEK! Not Egyptian at all!
6. Greeks invented the yo-yo!
7. The Parthenon at Dusk
447-438 B.C., Athens, Greece — The Parthenon at Dusk — Image by © Colin Dixon/Arcaid/Corbis
So that Parthenon was actually in pretty good shape most of it’s existence…but in the 1600s they were using it as a place to store gun powder and there was an explosion…that + time = what the Parthenon looks like now.
8. Greece is the leading producer in sea sponges!
9. No point in Greece is more than 85 miles from water. Greece has about 9,000 miles in coastline, 10th longest in the world.
10. The first recorded Olympic games was in 776 BC staged in Olympia. It consisted of one event, the 200 meter dash. BUT FIRST, they sacrificed 100 bulls to Zeus. The dude that won it, Koroibus, was a baker from a nearby town. And of course, he did it in the buff.
So did I teach you anything?!?! Every other article I found was, “You’re an American going to Greece?! Oh my! Be careful! People want your money, and don’t wave at someone with an open hand. And if they spit on you, it’s a good thing.”
HAPPY THURSDAY/FRIDAY! See you in 64 days!
2 thoughts on “Letters Between Friends: WHAT I LEARNED ABOUT GREECE
1. Paul Waibel August 26, 2016 / 6:52 pm
Women were not allowed to attend the games at Olympia. They had their own festival.
• Tricia August 27, 2016 / 1:21 pm
That’s true! Here in Crete, though, we’ve seen artwork of men and women simultaneously competing/performing at the bull-leaping events.
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_1_shard_00001926_processed.jsonl/72072
|
5k training: 10k run
To be able to run 5k fast you have to improve your endurance as well as your speed. If you just work on being able to run really quickly then you may run the first mile of your race really quickly but as your muscles won't be prepared for running long distances you will fatigue … Continue reading 5k training: 10k run
|
global_01_local_1_shard_00001926_processed.jsonl/72120
|
Switzerland recently passed two acts meant to clamp down on violent video games, but has yet to enact them while the government determines the standards under which a game considered too violent. Apparently, only 12 titles would fit the description.
That's according to a prime backer of the law, who in an interview with a Swiss news magazine mentioned Counter Strike, by name, as an example of one game that would not be banned. What would? Well, everybody's favorite punching bag from 2003 Manhunt, which also is banned in Germany. And Mortal Kombat, because apparently a shipment of games from 1992 just arrived, is a no-no.
Not sure what actual new games might qualify here, but if they're fixating their anger on a seven-year-old game and a nearly 20-year-old franchise whose last M-rated release was in 2006, it sounds like we'll be on God of War V by the time they ban III.
The larger issue is this Swiss lawmaker's insistence that the Pan European Game Information ratings system (PEGI, the European equivalent of the ESRB rating), is insufficient and that governments over there, either the Swiss government or the European Union, need to get into the business of rating games independently of PEGI.
Swiss Game Ban May Feature Only a Little Censorship [GamePolitics]
|
global_01_local_1_shard_00001926_processed.jsonl/72137
|
< !-- Digital window verification 001 -->
What Should I Learn as a Beginner: Python 2 or Python 3?
| Get awesome (and free) stuff here
Now, in 2018, it’s more of a no-brainer: Python 3 is the clear winner for new learners or those wanting to update tudemheir skills. Here, we'll cover why Python 3 is better, and why companies have been moving from Python 2 to 3 en masse.
That said, there are still some situations where picking up Python 2 might be advantageous. Or you may just want to learn a little of the history and the differences between Python 2 and 3 for curiosity's sake.
So, without further ado, let’s take a look at some of the major differences between Python 2 vs Python 3–plus where to learn Python 3 programming as a beginner.
Table of Contents
Want to master Python?
Then download my list of favorite Python learning resources.
A little history of Python 2 vs 3
Let's begin with a brief timeline of Python 2 vs 3 usage.
• Python 2.0 was first released in 2000. Its latest version, 2.7, was released in 2010.
• Python 3.0 was released in 2008. Its newest version, 3.6, was released in 2016, and version 3.7 is currently in development.
• Although Python 2.7 is still widely used, Python 3 adoption is growing quickly. In 2016, 71.9% of projects used Python 2.7, but by 2017, it had fallen to 63.7%. This signals that the programming community is turning to Python 3–albeit gradually–when developing real-world applications.
• Notably, on January 1, 2018, Python 2.7 will “retire” and no longer be maintained. (The clock is literally ticking!)
Next, we'll move on to the differences for Python 2 vs 3 in 2018.
Head back to the table of contents »
What are the main Python 2 vs 3 2018 differences?
There are plenty of differences between these Python programming versions, but here are five of the main ones.
1. Python 2 is legacy, Python 3 is the future.
Since Python 2 has been the most popular version for over a decade and a half, it is still entrenched in the software at certain companies.
However, since more companies are moving from Python 2 to 3, someone who wants to learn Python programming for beginners may wish to avoid spending time on a version that is becoming obsolete.
2. Python 2 and Python 3 have different (sometimes incompatible) libraries
Since Python 3 is the future, many of today's developers are creating libraries strictly for use with Python 3.
Similarly, many older libraries built for Python 2 are not forwards-compatible.
You may be able to port a 2.x library to 3.x., but this can be difficult and complicated; it's definitely not a “Python for beginners” type of activity.
3. There is better Unicode support in Python 3
In Python 3, text strings are Unicode by default. In Python 2, strings are stored as ASCII by default–you have to add a “u” if you want to store strings as Unicode in Python 2.x.
This is important because Unicode is more versatile than ASCII. Unicode strings can store foreign language letters, Roman letters and numerals, symbols, emojis, etc., offering you more choices.
4. Python 3 has improved integer division
In Python 2, if you write a number without any digits after the decimal point, it rounds your calculation down to the nearest whole number.
For example, if you’re trying to perform the calculation 5 divided by 2, and you type 5 / 2, the result will be 2 due to rounding. You would have to write it as 5.0 / 2.0 to get the exact answer of 2.5.
However, in Python 3, the expression 5 / 2 will return the expected result of 2.5 without having to worry about adding those extra zeroes.
This is one example of how Python 3 syntax can be more intuitive, making it easier for newcomers to learn Python programming.
5. The two versions have different print statement syntaxes
This is only a syntactical difference–and some may consider it trivial–so it doesn’t affect the functionality of Python. That said, it is still a big and visible difference you should know about.
Essentially, in Python 3, the print statement has been replaced with a print () function.
For example, in Python 2 it is print “hello” but in Python 3 it is print (“hello”).
If you're going to learn Python programming for the first time, it shouldn't affect you much. But if you started with Python 2, the change may trip you up a few times.
To learn more differences between Python 2 and 3, check out The Python Wiki.
Head back to the table of contents »
Why companies are moving from Python 2 to 3
As mentioned earlier, most companies are still using Python 2 for legacy reasons, but more and more companies are using Python 3, or beginning to make the switch from 2 to 3.
So, let's look at Instagram and Facebook–two companies that have switched from Python 2 to 3 or are in the process of doing so–and why they chose to do so.
In 2017, Instagram migrated the majority of their Python code base from Python 2.7 to Python 3.
Why they use it:
• Python is not traditionally a typed language, but Python v3.5 supports typing, which removes development conflicts when working new pieces of code.
• Each newer version of Python continues to get faster runtime. Meanwhile, nobody’s currently working to make Python 2.7 work faster.
• Community support is better with Python 3.
Facebook is currently in the process of upgrading their infrastructure and handlers from Python 2 to Python 3.4.
Why they use it:
• According to RealPython, “The ease of using Python libraries means that the production engineers don’t have to write or maintain as much code, allowing them to focus on getting improvements live. It also ensures that the infrastructure of Facebook is able to scale efficiently.”
• Watch this talk on YouTube for more information about the changing culture of Python at Facebook.
Head back to the table of contents »
As a beginner, should I learn Python 2 or 3 in 2018?
The simple answer? Learn the latest version (which at time of writing is Python 3.7.0).
Some of the changes made in Python 3 have actually made it easier for beginners to understand, so it's the best way to learn Python for the first time.
This is the best way to future-proof yourself as more and more programmers pursue Python 3 adoption. Keep in mind that Python 2.7 will no longer be supported after 2020, so dedicating effort to learning it at this point won't make sense for most folks. I say “most” because there are a few types of people who might need it.
Head back to the table of contents »
When it makes sense to learn Python 2
Here are some situations where you might need to know Python 2:
• If you want to become a DevOps engineer and work with configuration management tools like Fabric or Ansible, you might have to work with both Python 2 and 3 (because parts of these libraries don’t have full Python 3 support).
• If your company has legacy code written in Python 2, you’ll need to learn to work with that.
• If you have a project that depends on certain third-party software or libraries that can't be ported to Python 3, you'll have no choice but to use Python 2 for it.
Luckily, whichever version you start with, it will be fairly easy to transfer your knowledge to the other if needed.
Want to master Python?
Then download my list of favorite Python learning resources.
Head back to the table of contents »
Where to start learning Python 3?
So, if you've decided to learn Python 3, the next question is “Where do I learn python for beginners?” Here are three Python course options to consider.
Udemy: The Complete Python 3 Course
What the course covers: All the basics like strings, expressions, loops, functions, exception handling, etc. Great way for someone with zero prior knowledge to learn to code Python.
The Complete Python 3 Course
Why pick this particular course: Upon completion of the course you’ll have the skills to build your own real-life applications
Course facts:
Coursera: Programming for Everybody (Getting Started with Python)
What the course covers: Covers core programming tools such as functions and loops, as well as variables to store, retrieve, and calculate information.
Python for Everybody Specialization
Why pick this particular course: 4.8 star rating (out of 38K+ reviews); this course is part of a Coursera specialization so you can continue on to more advanced topics if you want
Course facts:
edX: Introduction to Computer Science and Programming Using Python
What the course covers: Python syntax, simple algorithms, how to think computationally, data structures, and more
Course facts:
Why pick this particular course: Taught by MIT professors; “designed to help people with no prior exposure to computer science or programming learn to think computationally and write programs to tackle useful problems”
Head back to the table of contents »
When it comes to Python 2 vs 3 in 2018, Python 3 is the clear winner. Since Python 2 is being phased out by 2020, mass Python 3 adoption is the clear direction of the future.
For beginners, starting out with Python–and especially Python 3–is a great way to learn programming quickly. It’s a diverse and intuitive language and tons of awesome companies like Google, NASA, Facebook, and Spotify are using it!
Plus, the average yearly salary for Python developers comes in at $92,000 per year, so if you learn Python 3, you might find your career prospects looking brighter than ever.
Try out one of the online Python courses above to start learning Python programming today!
Pin It on Pinterest
|
global_01_local_1_shard_00001926_processed.jsonl/72139
|
Richard MacManus at the <a href="">Read/Write Web</a> linked to this <a href="">brilliant piece</a> by Lawrence Lessig, author of <em>Free Culture </em>and law professor at Stanford, about the threat of the "Read-Only" web vs. the "Read/Write" web. This is something I discuss at great length in my <a href="">Social Software for Social Change</a> wiki -- corporate interests that wish to dominate the web will do so at the cost of the free, open culture that the Internet has allowed to flourish. Lessig says that businesses like Apple, a constant target of my annoyance, are promoting a version of the web in which it's amazingly easy to pay for something with a single click, but once you do, you have no right to do anything with it except consume it -- the Read-Only web. This is a huge departure from the way culture organically develops -- culture has always been about recycling and improving upon what came before. And the Internet allows this to happen in an amazingly fast and exciting way. We can interact with things and change them to make our own mash-ups and create communities around ideas and cultural artifacts (the Read/Write web). Some would like to think that Apple is part of this revolutionary aspect of the web. I don't think they are; I think they're out to make a profit, and unfortunately, as Lessig explains, the Read/Write web isn't about profit-making.
Tags: | | |
|
global_01_local_1_shard_00001926_processed.jsonl/72145
|
The Secret Diary of Chloe Price
We promised each other so much.
The secret diary of Chloe Price, she wrote out in curved, even handwriting. ‘Diary’ looked odd on the page, a dirty, unfamiliar word that didn’t fit her, and definitely didn’t fit what had essentially become their escape plan.
“Nope, that’s hella weird.” She scratched it out.
Dust particles danced in the low light that filtered in through the slats of her window as the day began to fade.
“Come onnnn,” Rachel teased from where she lay on Chloe’s bed. The blonde was rolling a slim piece of paper between two fingers. Her lips were curled up in a cheeky grin. “We don’t have all night. ‘Rachel and Chloe’s Foolproof Plan to Get Our Asses to California’! Step one.”
“That’s not a step.”
“You’re impossible.” She was tempted to just chuck the book right at Rachel’s perfect, pretty grin. Chloe got to her feet, then closed the distance between them to pluck the joint from her fingers. “Not in here, Stepdouche will lose it.”
“Gosh, he’s usually so reasonable,” Rachel tried to snatch the freshly-rolled joint back. Chloe laughed despite herself, keeping it just out of arm’s reach. “So? Let’s hurry up with the plan. I’m ready to see my name in lights.” She paused, then leaned close to grab Chloe gently by the chin. “Will you be my faithful assistant?” Chloe’s gaze lingered on Rachel’s mouth as she spoke.
“Hell no, I’m no assistant.” The stared at each other with a sombre intensity for a moment before they each cracked up.
“Sorry, Miss Price—”
A text message alert sang out from Rachel’s phone, silencing her more effectively than anyone ever could. She read quickly, texting back with some unseen somebody. It made Chloe’s hackles go up. Rachel had been doing this more often lately, ignoring whatever conversation the two of them were having in favour of whoever it was she kept texting. Maybe a bunch of whoevers.
Chloe let out an exaggerated sigh and whipped around to face her desk where their travel diary lay open. It was just as well Rachel had shut up about their plans, since Stepdouche would be home any minute. She could just imagine his bitter, furious scowl as he stood at the bottom of the steps ready to make her life even more of a living hell. As if he had any say over her, over her mom. As if he were half the man William was. It wasn’t her fault he had PTSD. It wasn’t her fault their whole two-bit town was shit. And it wasn’t her fault Blackwell kicked her out. …Maybe it was slightly her fault about Blackwell but the circumstances were–
“CHLOE!” The front door was opened and then quickly slammed shut.
“Speak of the paranoid devil.”
Rachel snapped to attention, her head turning towards the door to Chloe’s room just as they heard David’s heavy-footed steps hitting the floor.
(Get out of here!) Chloe mouthed, gesturing at Rachel, wildly waving her hands around.
Rachel sighed, tucked her phone directly into her bra with a smirk, and leisurely walked over to Chloe, taking time they didn’t really have to plant a kiss on her cheek. The door to Chloe’s room swung open just as Rachel’s shoes disappeared out the window behind her desk.
Enter the Stepdouche.
“You better not have any those deadbeat friends of yours in there! You smoking weed again? Joyce and I blah blah blah! Punch me in my big stupid face.
…That’s what he should have been saying. She tuned him out. All the yelling came from nowhere. She could only listen to the same insane suspicions founded on delusions so many times.
“It’s fine,” she cut in. Every word jumped off her tongue like it couldn’t wait to leave. “Just looking into some new schools. That’s what you want me to do, right? So I am. Maybe Bay City, who knows. OK? Chill.” She made a show of going over to her laptop and opening the Bay City College website, pretending to study it intensely.
There was a tense pause as he eyed her, trying to suss out whatever she was undoubtedly hiding from him. He finally decided he was satisfied and slunk off down into the depths of the house to his garage workshop-slash-mancave.
She barely had time to doodle in the journal before her phone chimed. She had a couple messages she hadn’t noticed during David’s ranting.
[FRANK: Cash, girly. Don’t think I’ve forgotten.]
Running her fingers through her hair, Chloe groaned. Something else to add to their secret diary. Speaking of which…
[RACHEL: Once Stepdouche lets you off the hook, you know where to find me. <3]
The air was salty and acrid on Rachel’s tongue, but the high – both that of the drugs she’d score and the one she’d get from the man himself – made it worth it. The beach and RV never seemed to complement one another, but Frank didn’t care. He had Pompidou; the dog needed the space.
Half an hour later she was down some cash, up a few grams of some of her favourites, and sporting a fresh batch of hickeys that peeked out just over the edge of her collar. The call of their secret hideaway in the middle of the junkyard was too strong to ignore. Harder to ignore was the call of the baggies in her jeans pocket.
She’d blazed through more than a few joints and beyond by the time Chloe’s slight frame finally appeared in the doorway.
“Figures you’d drag me out here under cover of darkness. Is it time to play secret agents?”
“Dork,” Rachel breathed. She leaned back against the cinderblock wall and held her arms out towards Chloe. “C’mere, you little Devil.”
“What’s up, Angel?” Once Chloe was at her side, she could see Rachel’s eyes were bloodshot, glazed, and unfocused. The blonde snaked her arms up around Chloe’s shoulders and she linked her fingers behind them, holding on as if for dear life. “You went to see Frank again?”
“Don’t be jealous,” she smiled into the blue waves of hair beside her head. “I saved you some, too.”
“We’re going to have to find some more cash for that getaway,” she frowned.
The two drew apart and Rachel held a freshly rolled joint up in front of Chloe’s nose.
“So you’re telling me you don’t want to smoke with me right now?”
They sported matching smiles.
“Never leave me.”
“I never will.”
Hours later, with a fresh high and half of the hash they’d started with, the two of them were lying head-to-head, staring up through the holes in the shoddy ceiling to the inky blue-black sky above.
Rachel pointed out a line of stars nearly hidden by cloud.
“Buuuullshit,” drawled Chloe, swatting the other girl’s hand out of her view. “That’s a bird if anything.”
“Riiight,” Rachel smirked, rolling over onto her stomach so that she could look at Chloe head on. Her hair fell down around Chloe’s face in wheat-blonde sheets. “Since when are you into birdwatching?”
“A bird would make a way better constellation than a butterfly.”
“Whatever you say.”
“You know I’m right.”
“You’re high.”
Rachel got to her feet, and shrugged on her coat. Their clubhouse hideaway was nowhere near warm enough for the cool March evening. They didn’t care. It was better there than anywhere else. With a Sharpie in hand, she hunched towards the wall, pausing to smile over her shoulder at her blue-haired friend before scrawling directly on the rock.
“Heads up!” After a moment admiring her handiwork, she threw the marker over to Chloe, who managed to catch it without much effort. “You’re next.”
“Really? I thought you wanted to forget all about Arcadia Bay. You want a memorial here for anyone to find?”
“…I don’t want to forget everything about it. There are things here that I love. People, too.”
Silence. Without another word, Chloe got up and scrawled her own sentence above Rachel’s.
“See? It’s perfect. ‘We’ll always have Arcadia Bay’…”
“Dork. Do not-”
Rachel’s phone chimed again, and before Chloe could even realise what she was doing, she found she had reached forwards to grasp the blonde’s hand with both of hers.
“Hey. Don’t. Just, for now?” Her eyes pleaded her case better than her words. “Let’s just be here, alone – together – and lost to our own special place in the world.”
Rachel raised an eyebrow, her lips quirking mischievously. With a shrug she put her remaining hand over Chloe’s.
“Okay. I’m right here.”
They filled the diary faster than seemed possible. Some of it was the getaway plan; details like how they’d scrounge up enough money to pay back Frank and fund their trip; but just as much of it was stupid scribbles and doodles; where they dreamed they would end up; what sorts of finery Rachel would get to model; and the kinds of people who would live in L.A.
Better days awaited them there. They had promised each other so much; Chloe was wildly impatient for them to leave. She’d made sure her truck was running perfectly. But the more they planned, the busier things seemed to get. As the chilly air of winter finally began to fade away into spring, Rachel was less focused, more attentive to her chiming phone than to anything else.
Some days, the diary was a better companion than Rachel; yet it kept the two of them together as they wrote back and forth. Chloe was adding a few words of her own before she’d hand it off. She tried to tell herself Rachel’s contributions weren’t growing shorter.
Neither of them had great home lives; her mom and Stepdouche paid more attention than Rachel’s parents ever did – and that was saying something for their straight-A student – so she tried not to let it bother her when Rachel spent so much time at school after hours working with Professor McHottie.
Your nickname for him, she wrote next to the name, not mine.
It was hard for Chloe not to be pissed off all the time with the growing wait, especially when David threw tantrums at every turn. She would be free soon… but the eternity of it stretched out like the maw of an impossibly large, hungry beast.
The ground of the farmyard, covered in detritus from winter past, crunched under the tires of Jefferson’s car. He got out at the old farmhouse and took one look at Nathan. The kid was a mess; his shirt was soaked through with stress sweat. His hands were shaking. A lone owl was their only witness.
“What did you do, Nathan?” The initial calmness of Jefferson’s voice was more terrifying than he expected.
“I-I don’t know, it just, I think she’s sick, I think I fuc–”
“I messed up! She needs help, she OD’ed– oh, god.”
He was struggling with his bag now, trying to shove the photos he had taken into it. The diary came tumbling out, falling open to a page where Rachel’s handwriting proclaimed she was excited to meet ‘W’ that night, if a little nervous. Jefferson grabbed it before Nathan had a chance to react. He read it, pinched the bridge of his nose, inhaled one slow, even breath, and then exhaled.
“Just what we don’t need, Nathan. More evidence.”
It was a short drive to the junkyard. Here lay the sins of manufacturing. It was just as good a burial place for any fallen star.
“You’re lucky I’m here,” he hissed, watching the jittery teen freeze up when he tossed him a shovel. The body would need the work of them both if they were to hide it before dawn. Then, another dose – and Nathan could forget it all, could live in blissful ignorance until he outgrew his usefulness… if he hadn’t already.
Jefferson’s sleek, black shoes stood over the charred, ashen remains of the handwritten diary, the curled handwriting of its users just barely visible as they vanished into the smoke of the fire pit. With any luck, nobody would notice the flames.
“Yeah, real lucky,” Nathan could feel himself losing control again, the panic and fear overtaking him as the dose began to wear off. His skin was on fire, every inch feeling like it could char his clothes right off. He didn’t like the way the fire played off of Jefferson’s face, his glasses. “This is a nightmare. It’s OK, I’ll wake up. It’s all fine, it’s good, I’ll wake up, I’ll be fine, Rachel’s fine, Rachel’s OK, it’s OK…”
That was more than enough for him. With the last shovelful of dirt lifted onto the shallow grave and patted down flat, Jefferson could now take care of the rest of the situation. No one would ever find Rachel Amber.
The faint pinprick of a needle kissed Nathan’s throat, and everything went black.
“Forget about Max,” Rachel’s lips were dangerously close to Chloe’s, threatening to silence all her complaints. “What do you need her for? You’ve got me now.”
“You’re all I need, Angel,” she grinned.
“Chloe… c’mere, you little Devil…”
Chloe sat bolt upright, looking over to where she was sure the voice had been coming from moments earlier. Rachel was not there.
“Fuck,” she muttered under her breath, “I’m losing it…” She glanced over at the half-empty bowl still sitting on her bedside table.
But it’s better than keeping what I have here. Just one more toke. …No. Maybe Rachel’s still awake? The thought struck her from nowhere, and hope fluttered like a bird in her chest.
She sent a text, and waited — no response. It wouldn’t be completely impossible for the night owl to have called off her studying early. Nothing to worry about…
…Until morning, when there was still no word.
Until noon hit, and there was still no answer.
Until Chloe filled her inbox with voicemails.
Until a day had passed.
A week.
She went through all the proper channels (and several improper ones) she could think of, but nobody wanted to look for answers. Not for her, and not for Rachel Amber.
Fuck this, and fuck you! became her standard response to the townsfolk, the principal, her own fucking parents and the police who claimed this wasn’t out of the realm of normal behaviour for Rachel, like she would fucking leave Chloe to rot in this city alone, like Chloe never mattered to her. Chloe knew how Rachel felt. She wouldn’t dare.
She couldn’t shake the dread that had nestled in around her shoulders. Rachel had promised her she’d never leave her. She had to believe that, no matter what. Something was wrong.
Chloe clutched a bundle of missing posters to her chest, feeling her heart pound against them from the other side. She took slow, deep breaths.
So it was up to her to find Rachel Amber?
“I’ll find you, Rachel. I promise. Whatever happens… I’ll find you.”
Leave a Reply
Notify of
|
global_01_local_1_shard_00001926_processed.jsonl/72156
|
Re: curl, testing and gcc-3.2 (?) (was Re: Debian curl package depends on gcc-3.2?)
On Mon, Apr 14, 2003 at 03:56:48PM +0200, Domenico Andreoli wrote:
> i don't really know where that gcc-3.2 is coming from. as you can see
> curl doesn't depend on it explicitly.
> anyway debian has migrated to gcc 3.2 as default compiler and i build
> curl with gcc 3.2 since a couple of releases ago. maybe it is required
> someway. i'm CC debian-devel@, maybe some kind soul might help here
On some platforms (i386 is not one of them), binaries are dynamically
linked against libgcc, which comes from the gcc-3.2 source package. As a
result, your package can't enter testing until gcc-3.2 itself does.
Steve Langasek
postmodern programmer
Attachment: pgp9_PuS7Xj96.pgp
Description: PGP signature
Reply to:
|
global_01_local_1_shard_00001926_processed.jsonl/72157
|
Re: Bug#244908: is it OK for invoke-rc.d stop not to stop?
Henrique de Moraes Holschuh <[email protected]> wrote:
> --exec should never be used for stop. If you don't have a pidfile, use
> --name and pray that you don't kill the wrong thing -- the real fix IS to
> maintain a pidfile properly.
No --name is not a substitute for --exec. Why should you be killing
random user processes that happen to have the same name and the same
Depending on what daemon this is, the user may well have a legitimate
reason for running a private copy.
Valid alternatives do exist for --exec, such as Unix sockets, but please
do not recommend people to replace it with --name --pidfile. It's not
much better than --pidfile.
Home Page: http://gondor.apana.org.au/~herbert/
Reply to:
|
global_01_local_1_shard_00001926_processed.jsonl/72178
|
Blog Archives
Five ideas on Marketing
Marketing during a recession I read a number of articles lately on marketing in recession times. From the collective wisdom some actually make good sense. Here are five ideas that can guide you on how to handle your marketing in
Tagged with:
Posted in Misc
|
global_01_local_1_shard_00001926_processed.jsonl/72196
|
Cart empty
My Cart
Topographic map 012231 in area of Dickens
Reduced fragment of topographic map en--usgs--024k--012231--(1956)--N040-52-30_W101-00-00--N040-45-00_W100-52-30; towns and cities Dickens Type: US Geological Survey
Scale: 1:24 000
Language: English
Map year: 1956
Size: 2Mb
Dimensions: 4670x5854px
Added: 19 May 2015
Reduced fragment of topographic map is displayed on the left.
1 €
Add to cart
List of geographical objects on topographic map
Settlements (2-5 thousand of inhabitants): Dickens
This map can be found in the following map sets:
570 maps of3,0Gb
1-52 €
Add to cart
|
global_01_local_1_shard_00001926_processed.jsonl/72207
|
Please read the following information
This is the Pythagoras Online Test for AQA, OCR and Edexcel GCSE Maths.
Please read the following notes are designed to help you to input your answers in the correct format
1. 1 If a question which have multiple answers simply tick all correct answers.
2. 2 NO ANSWER REQUIRES UNITS e.g. 20% would be just 20 in the answer box, £30 would be 30.
3. 3 Give all fractions and ratio answers in their most simplified form.
4. 4 If your answer is a decimal e.g. 0.22, then please ensure you use a decimal point within your answer otherwise it will be marked as incorrect.
5. 5 Sit the test in a linear format, do not return to a question once you have submitted you answer.
Need some extra help? Find a Maths tutor now
Or, call 020 3633 5145
|
global_01_local_1_shard_00001926_processed.jsonl/72215
|
Also found in: Dictionary, Thesaurus, Encyclopedia, Wikipedia.
Listeriosis is an illness caused by the bacterium Listeria monocytogenes that is acquired by eating contaminated food. The organism can spread to the blood stream and central nervous system. During pregnancy, listeriosis often causes miscarriage or stillbirth.
Listeriosis is caused by an infection with the bacterium Listeria monocytogenes. This bacteria can be carried by many animals and birds, and it has been found in soil, water, sewage, and animal feed. Five out of every 100 people carry Listeria monocytogenes in their intestines. Listeriosis is considered a "food-borne illness" because most people are probably infected after eating food contaminated with Listeria monocytogenes. However, a woman can pass the bacteria to her baby during pregnancy. In addition, there have been a few cases where workers have developed Listeria skin infections by touching infected calves or poultry.
In the 1980s, the United States government began taking measures to decrease the occurrence of listeriosis. Processed meats and dairy products are now tested for the presence of Listeria monocytogenes. The Food and Drug Administration (FDA) and the Food Safety and Inspection Service (FSIS) can legally prevent food from being shipped, or order food recalls, if they detect any Listeria bacteria. These inspections, in combination with the public education regarding the proper handling of uncooked foods, appear to be working. In 1989, there were 1,965 cases of listeriosis with 481 deaths. In 1993, the numbers fell to 1,092 cases with 248 deaths.
In 1996, the Centers for Disease Control and Prevention (CDC) began a nationwide food-borne disease surveillance program called "FoodNet," in which seven states were participating by January 1997. Results from the program indicated that, in 1996, one person out of every 200,000 people got listeriosis. FoodNet also revealed that the hospitalization rate was higher for listeriosis (94%) than for any other food-borne illness. In addition, FoodNet found that the Listeria bacteria reached the blood and cerebrospinal fluid in 89% of cases, a higher percentage than in any other food-borne illness.
Persons at particular risk for listeriosis include the elderly, pregnant women, newborns, and those with a weakened immune system (called "immunocompromised"). Risk is increased when a person suffers from diseases such as AIDS, cancer, kidney disease, diabetes mellitus, or by the use of certain medications. Infection is most common in babies younger than one month old and adults over 60 years of age. Pregnant women account for 27% of the cases and immunocompromised persons account for almost 70%. Persons with AIDS are 280 times more likely to get listeriosis than others.
Causes and symptoms
As noted, persons become infected with Listeria monocytogenes by eating contaminated food. Listeria has been found on raw vegetables, fish, poultry, raw (unpasteurized) milk, fresh meat, processed meat (such as deli meat, hot dogs, and canned meat), and certain soft cheeses. Listeriosis outbreaks in the United States since the 1980s have been linked to cole slaw, milk, Mexican-style cheese, undercooked hot dogs, undercooked chicken, and delicatessen foods. Unlike most other bacteria, Listeria monocytogenes does not stop growing when food is in the refrigerator - its growth is merely slowed. Fortunately, typical cooking temperatures and the pasteurization process do kill this bacteria.
Listeria bacteria can pass through the wall of the intestines, and from there they can get into the blood stream. Once in the blood stream, they can be transported anywhere in the body, but are commonly found the central nervous system (brain and spinal cord); and in pregnant women they are often found in the placenta (the organ which connects the baby's umbilical cord to the uterus). Listeria monocytogenes live inside specific white blood cells called macrophages. Inside macrophages, the bacteria can hide from immune responses and become inaccessible to certain antibiotics. Listeria bacteria are capable of multiplying within macrophages, and then may spread to other macrophages.
After consuming food contaminated with this bacteria, symptoms of infection may appear anywhere from 11-70 days later. Most people do not get any noticeable symptoms. Scientists are unsure, but they believe that Listeria monocytogenes can cause upset stomach and intestinal problems just like other foodborne illnesses. Persons with listeriosis may develop flu-like symptoms such as fever, headache, nausea and vomiting, tiredness, and diarrhea.
Pregnant women experience a mild, flu-like illness with fever, muscle aches, upset stomach, and intestinal problems. They recover, but the infection can cause miscarriage, premature labor, early rupture of the birth sac, and stillbirth. Unfortunately, half of the newborns infected with Listeria will die from the illness.
There are two types of listeriosis in the newborn baby: early-onset disease and late-onset disease. Early-onset disease refers to a serious illness that is present at birth and usually causes the baby to be born prematurely. Babies infected during the pregnancy usually have a blood infection (sepsis) and may have a serious, whole body infection called granulomatosis infantisepticum. When a full-term baby becomes infected with Listeria during childbirth, that situation is called late-onset disease. Commonly, symptoms of late-onset listeriosis appear about two weeks after birth. Babies with late-term disease typically have meningitis (inflammation of the brain and spinal tissues); yet they have a better chance of surviving than those with early-onset disease.
Immunocompromised adults are at risk for a serious infection of the blood stream and central nervous system (brain and spinal cord). Meningitis occurs in about half of the cases of adult listeriosis. Symptoms of listerial meningitis occur about four days after the flu-like symptoms and include fever, personality change, uncoordinated muscle movement, tremors, muscle contractions, seizures, and slipping in and out of consciousness.
Listeria monocytogenes causes endocarditis in about 7.5% of the cases. Endocarditis is an inflammation of heart tissue due to the bacterial infection. Listerial endocarditis causes death in about half of the patients. Other diseases which have been caused by Listeria monocytogenes include brain abscess, eye infection, hepatitis (liver disease), peritonitis (abdominal infection), lung infection, joint infection, arthritis, heart disease, bone infection, and gallbladder infection.
Listeriosis may be diagnosed and treated by infectious disease specialists and internal medicine specialists. The diagnosis and treatment of this infection should be covered by most insurance providers.
The only way to diagnose listeriosis is to isolate Listeria monocytogenes from blood, cerebrospinal fluid, or stool. A sample of cerebrospinal fluid is removed from the spinal cord using a needle and syringe. This procedure is commonly called a spinal tap. The amniotic fluid (the fluid which bathes the unborn baby) may be tested in pregnant women with listeriosis. This sample is obtained by inserting a needle through the abdomen into the uterus and withdrawing fluid. Listeria grows well in laboratory media and test results can be available within a few days.
Listeriosis is treated with the antibiotics ampicillin (Omnipen) or sulfamethoxazole-trimethoprim (Bactrim, Septra). Because the bacteria live within macrophage cells, treatment may be difficult and the treatment periods may vary. Usually, pregnant women are treated for two weeks; newborns, two to three weeks; adults with mild disease, two to four weeks; persons with meningitis, three weeks; persons with brain abscesses, six weeks; and persons with endocarditis, four to six weeks.
Patients are often hospitalized for treatment and monitoring. Other drugs may be provided to relieve pain and fever and to treat other reactions to the infection.
The overall death rate for listeriosis is 26%. This high death rate is due to the serious illness suffered by newborns, the elderly, and immunocompromised persons. Healthy adults and older children have a low death rate. Complications of Listeria infection include: meningitis, sepsis, miscarriage, stillbirth, pneumonia, shock, endocarditis, abscess (localized infection) formation, and eye inflammation.
The United States government has already done much to prevent listeriosis. Persons at extremely high risk (pregnant women, immunocompromised persons, etc.) must use extra caution. High risk persons should: avoid soft cheeses, such as Mexican cheese, feta, Brie, Camembert, and blue cheese (cottage cheese is safe), thoroughly cook leftovers and ready-to-eat foods (such as hot-dogs), and avoid foods from the deli.
For all people, the risk of listeriosis can be reduced by taking these precautions:
• Completely cook all meats and eggs.
• Carefully wash raw vegetables before eating.
• Keep raw meat away from raw vegetables and prepared foods. After cutting raw meat, wash the cutting board with detergent before using it for vegetables.
• Avoid drinking unpasteurized milk or foods made from such milk.
• Wash hands thoroughly after handling raw meat.
• Follow the instructions on food labels. Observe food expiration dates and storage conditions.
"Preventing Foodborne Illness: Listeriosis." Centers for Disease Control. 〈〉.
Key terms
Abscess — An accumulation of pus caused by localized infection in tissues or organs. Listeria monocytogenes can cause abscesses in many organs including the brain, spleen, and liver.
Immunocompromised — To have a poor immune system due to disease or medication. Immunocompromised persons are at risk for developing infections because they can't fight off microorganisms like healthy persons can.
Macrophages — White blood cells whose job is to destroy invading microorganisms. Listeria monocytogenes avoids being killed and can multiply within the macrophage.
Meningitis — An inflammation of the tissues that surround the brain and spinal cord. It can be caused by a bacterial infection.
Sepsis — The presence of bacteria in the blood stream, a normally sterile environment.
infection caused by Listeria monocytogenes. In humans, in utero infections occur transplacentally and result in abortion, stillbirth, and premature birth; infections acquired during birth cause cardiorespiratory distress, diarrhea, vomiting, and meningitis. Infection in adults produces meningitis, endocarditis, and disseminated granulomatous lesions. Infection in cattle and sheep causes encephalitis and abortion. Nervous signs are common in ruminants, and necrosis of the liver in monogastric animals. Because affected animals tend to move in circles, it is also known as circling disease.
A sporadic disease of animals and humans, particularly those who are immunocompromised or pregnant, caused by the bacterium, Listeria monocytogenes (family, Listeriaceae). The infection in sheep and cattle frequently involves the central nervous system, causing various neurologic signs; in monogastric animals and fowl, the chief manifestations are septicemia and necrosis of the liver. Meningitis, abortion, pneumonia, endocarditis, and focal metastatic disease are associated with listeriosis. Significant foodborne illness. Origin in soil, water, silage, fecal contamination of field vegetables, improperly processed food (inadequate sterilization, punctured tins, inadequate pasteurization); very resistant organism (resists salt, acid, heat and nitrite preservatives. Can replicate at normally safe refrigerator temperatures (slow growth at 24o F.)
Synonym(s): listeria meningitis
[fr. organism Listeria]
/lis·ter·i·o·sis/ (lis-te″re-o´sis) infection caused by Listeria monocytogenes. Infection in utero results in abortion, stillbirth, or prematurity; that during birth causes cardiorespiratory distress, diarrhea, vomiting, and meningitis; and in adults it causes meningitis, endocarditis, and disseminated granulomatous lesions.
Infection with the bacterium Listeria monocytogenes, characterized in humans by fever, gastrointestinal symptoms, and sometimes headache and convulsions, and in pregnant women often leading to miscarriage or stillbirth. In domestic animals it can cause encephalitis, septicemia, and abortion. The bacterium occurs as a contaminant in raw or improperly processed foods.
Etymology: Joseph Lister; Gk, osis, condition
an infectious disease caused by a genus of gram-positive motile bacteria that are nonsporulating. Listeria monocytogenes infects shellfish, birds, spiders, and mammals in all areas of the world, but infection in humans is uncommon. It is transmitted by direct contact between infected animals and humans, through the ingestion of contaminated meat and dairy products, by inhalation of dust, or by contact with mud, sewage, or soil contaminated with the organism. The disorder is characterized in mild cases by fever, myalgia, nausea, and diarrhea and in severe cases by circulatory collapse, shock, endocarditis, hepatosplenomegaly, and a dark red rash over the trunk and legs. Fever, bacteremia, malaise, and lethargy are commonly seen. Newborns and immunosuppressed debilitated older people are more vulnerable to infection than are immunocompetent children and young or middle-aged adults. The signs of infection and the severity of the disease vary according to the site of infection and the age and condition of the person. Pregnant women characteristically experience a mild brief episode of illness, but fetal infection acquired through the placental circulation in utero is usually fatal. Infection in the newborn apparently results from exposure to the organism in the birth canal of an infected mother. Meningitis and encephalitis occur in 75% of cases. Treatment may include ampicillin, penicillin, tetracycline, or erythromycin given intramuscularly or intravenously. Trimethoprim-sulfamethoxazole is an alternative. If infection is suspected in a pregnant woman, treatment is begun immediately, even before bacteriological culture of the blood, spinal fluid, or vaginal secretions can confirm the diagnosis. All secretions from the patient may contain the organism. Also called listerosis.
Infectious disease Infection by Listeria spp, most by L monocytogenes Epidemiology Outbreaks linked to contaminated milk products and cheese Mortality 20-40% Clinical13 of cases of listeriosis occur in pregnant women, causing transplacental infection with abortion, stillbirth, and premature delivery; infants may present with septicemia, diarrhea, vomiting, cardiorespiratory distress, meningoencephalitis; immunocompromised adults may suffer meningoencephalitis, endocarditis, disseminated granulomatosis, lymphadenitis, peritonitis, cholecystitis Treatment Ampicillin, gentamicin, tobramycin, erythromycin, tetracycline, doxycycline, T-S
A sporadic disease of animals and humans, particularly those who are immunocompromised or pregnant, caused by a bacterium, Listeria monocytogenes.
[fr. organism Listeria]
An infection with the organism, Listeria monocytogenes , which is found in most meats, poultry, fish, crustaceans and in soft cheeses and various precooked foods. Proper cooking will kill the organism which, however, varies considerably in its ability to cause disease (virulence). Listeriosis is commonest in babies and old people and most cases are mild and pass unremarked. Severe cases feature fever, CONJUNCTIVITIS, inflammation of the salivary glands as in mumps, sometimes skin pustules and, rarely, arthritis, bone inflammation and abscesses in the brain and spinal cord. Listeriosis responds well to PENICILLIN, ERYTHROMYCIN and TETRACYCLINE.
an infectious disease affecting all species and caused by Listeria monocytogenes which can multiply in silage above pH 5.0-5.5 so that listeriosis in animals is commonly associated with feeding poorly prepared silage. In the northern hemisphere, listeriosis has a distinct seasonal occurrence associated with seasonal feeding of poorly preserved silage, with the highest prevalence in the months of December through May. Listeriosis is characterized by a number of syndromes: Encephalitis usually has sporadic occurrence and presents with unilateral brain stem and cranial nerve dysfunction, circling, facial paralysis, head pressing, and death following a short clinical course. Called also listerial meningoencephalitis. Abortion is late term, sporadic in cattle but can occur as an outbreak in small ruminants. Has zoonotic risk to pregnant females lambing out the flock Uveitis/ophthalmitis occurs in both sheep and cattle and can occur as an outbreak. Many but not all outbreaks have been associated with round bale 'self-feed' silage in the winter period where infected silage can directly contaminate the eye. Called also silage eye. Septicemic disease is a less common manifestation but can occur as an outbreak with a high case fatality in newborn lambs and kids and also in periparturient ewes and does. Spinal myelitis may occur in sheep following dipping and spontaneously in cattle, but is uncommon. Gastroenteritis may occur in sheep of all ages, 2 days after the start of feeding on infected silage. Mastitis occurs but is uncommon. It can result in contamination of bulk milk with L. monocytogenes but the more common source is fecal contamination.
References in periodicals archive ?
Populations that are most susceptible to listeriosis include pregnant women and individuals with a predisposing disease or diminished immune function.
If you're one of those at high risk for listeriosis and experience flu-like symp-toms- fever, aches, chills and possibly nausea and diarrhea-see a doctor right away.
But finding Listeria in foods doesn't always mean people will get infected and develop listeriosis.
Meanwhile, the Director General Health Services, Dr Nyane Letsie said there are essential drugs readily available to treat and cure listeriosis provided suspects consult health services earlier and not later, saying delay to consult health services makes things difficult.
Mr De-witt said since the outbreak of Listeriosis, the company had put in place major controls such as further testing of the processed meat products for further due diligence.
Although anyone can get listeriosis, those at high risk of developing severe disease include newborns, the elderly, pregnant women and persons with weak immunity.
Risk factors for sporadic non-pregnancy associated listeriosis in Germany--immunocompromised patients and frequently consumed ready-to-eat products.
Despite the efforts that have been made by food industries and sanitary authorities, listeriosis outbreaks are still being notified in Europe and Unites States and it is possible that it tends to rise as the number of individuals elderly and immunocompromised increases, as well as pregnant women and children, are more susceptible to this disease (SLUTSKER et al.
However it can take anywhere from three to 70 days for the symptoms of listeriosis to show following consumption of a contaminated food product.
After the market withdrawal and recall, CDC fielded > 450 inquiries about listeriosis from concerned consumers and clinicians, and the CDC outbreak website received [greater than or equal to] 787,000 page views, more views than after any other foodborne illness outbreak to date.
Earlier this year, a multistate outbreak of listeriosis was linked to packaged salads produced at a Dole processing facility in Ohio.
Clinical manifestations of listeriosis range from febrile gastroenteritis to bacteremia and meningitis, with severe disease seen primarily in immunocompromised individuals and adults 65 and older.
|
global_01_local_1_shard_00001926_processed.jsonl/72221
|
Turner Classic Movies Greatest Classic Films Collection
Turner Classic Movies Greatest Classic Films Collection
Sci-fi Science-fiction
DVD - 2009
Rate this:
When a New York detective discovers the secret behind a new food product, he becomes the target of government agents; a scientist finds a future divided by above- and below-ground humanoid species; a team of astronauts seek out the members of a lost expedition; an astronaut equipped with a super-intelligent computer seeks the source of an artifact found on the moon.
From the critics
Community Activity
Add a Comment
There are no comments for this title yet.
Age Suitability
Add Age Suitability
There are no age suitabilities for this title yet.
Add a Summary
There are no summaries for this title yet.
Add Notices
There are no notices for this title yet.
Add a Quote
There are no quotes for this title yet.
Explore Further
Browse by Call Number
Subject Headings
Find it at Library
To Top
|
global_01_local_1_shard_00001926_processed.jsonl/72232
|
If you would like detailed information about Medical Management Specialists, please complete and submit the following form.
Only the fields with the * are required. However, please provide as much information as you can about your group so MMS can better assist you.
I am interested in (required)
|
global_01_local_1_shard_00001926_processed.jsonl/72262
|
Writing: Improving Sentences
Read the original sentence to yourself, listening for errors. Evaluate the underlined portion of the sentence using the Big 8 Grammar Rules. Focus on the first problem that you find to eliminate wrong answer choices.
Because it lacks water, this makes the area known as Death Valley a desert, but it is by no means devoid of life.
This sentence is awkward and wordy. The Knowsys handbook advises you to lean towards answer choices that are concise. Keep this in mind as you look down at your answer choices.
(A) Because it lacks water, this
(B) They lack water, which
(C) Water, the lack of which
(D) Lacking water, it
(E) Lack of water
(A) You do not have to read this choice again because it matches the original sentence. Eliminate it. (B) The pronoun “they” has no antecedent in this sentence. Who is “they?” Eliminate this choice. (C) This answer creates problems with sentence structure, but it also makes it seem as if the water has life rather than the area, changing the meaning of the sentence. Eliminate it. (D) What is the antecedent of “it?” This is a good example of a random and unassociated “it.” Eliminate this answer choice. (E) This choice makes “lack of water” the subject of the sentence. It is shorter and clearer than any of the answer choices, and it also eliminates an extra punctuation mark that is present in all of the other choices.
The correct answer is (E).
On, 62% of the responses were correct.
For more help with SAT writing, visit!
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.