id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_1_shard_00001926_processed.jsonl/72271
Tags: scanning probe microscopy Animations (1-7 of 7) 1. Scanning Probe Microscope Piezoelectric Crystals 16 Nov 2005 | In this resource we disassemble the piezoelectric assembly of a scanning probe microscope. At its core is a white cylinder of the piezoelectric material. If you look closely, it has a granular texture that reflects the fact that it is actually made up of many small crystals. 2. Scanning Probe Microscope Operation 16 Nov 2005 | Scanning Probe Microscopes (SPMs) include Atomic Force Microscopes (AFMs) and Scanning Tunneling Microscopes (STMs or STEMs). They are the only instruments in widespread use that can actually "see" single atoms! You can skim this resource quickly to learn the general concepts of SPMs, or you can... 3. What is a Nanometer? 02 Apr 2005 | 4. Nano/Bio Connection 02 Apr 2005 | 5. Scanning Probe Microscopes 15 Mar 2005 | 6. Feasibility of Molecular Manufacturing 14 Mar 2005 | 7. Nanomanufacturing: Top-Down and Bottom-Up 14 Mar 2005 |
global_01_local_1_shard_00001926_processed.jsonl/72286
CoolSculpting North Las Vegas | Freeze Fat Away How Much Is Coolsculpting Am I a Good Candidate for CoolSculpting in North Las Vegas? Coolsculpting Safe Does Coolsculpting procedure work? Truth is, this new form of non-invasive surgery is gaining a lot of hype. By why? Because Coolsculpting freezes FAT! Now doesn't that sound easy? Well it's said to be easier than the traditional liposuction that is invasive and has a much longer patient recovery...Research recently based on Zeltiq has shown that this machine is indeed effective. However, the science behind it has peaked a lot of curiosity in the Diet & Weight Loss Industries. Now, I can bet you're wondering "How does Cool sculpting Work?" It's pretty simple actually. First, you will have a specific target area, say your belly pooch or flabby thighs that you just can't seem to fix with your regular workouts. By targeting this section of fat cells the cool sculpting machine is placed over the area for approximately 1 hour. The fat cells become numb. Unlike liposuction, the patient can get up following the 60-minute procedure and walk away without any real recovery other than a funny feeling of numbness. Over the course of six weeks, your body system recognizes that the fat cells are now dead. During this time period your metabolism works to detoxify and flush out these cells and hence shrinking the amount of fat and skin that once surrounded this problem area of your body. I'd say that if the coolsculpting reviews continue to show that it is indeed as effective as liposuction, or even better, then sure this new fad could turn quite popular. Did you know that cosmetic treatment can cause some patients to experience side effects as numerous as the following? Painful bruising, Uncomfortable swelling, Scaring, Numbness ,Limited mobility ,Dimpling of the skin. So, what about NON-SURGICAL weight loss? Let's not forget that NOTHING can compare to a healthy diet and exercise regime. The multitude of health benefits outweigh any of that of coolsculpting, liposuction, diet pills and the list goes on...Sure, these procedures may be quick, but they don't come without high RISKS. And they don't provide long-term results. Did you know that most people who get cosmetic weight-loss treatments don't even think to change their eating or fitness habits? The fat cells that were once "sucked out", (or frozen in the case of cool sculpting) only reproduce and at times come back with even uglier complications. Learning how to lose weight the healthy way is not only going to get your body in its best shape but you will also reap the rewards from all the extraordinary benefits to HEALTHY weight loss. CoolSculpting: Eliminating Fat Bulges Without Surgery Cold Laser Body Sculpting What are the positive results of Cool Sculpting? The days of a controlled diet and rigorous workout to get slim are now over. Improved technology makes it easier and faster for people to reduce excess deposits of localized fat from their body. Coolsculpting is one of the latest noninvasive treatments that are available these days. There are a number of effective approaches, apart from it, for the purpose. But, this procedure is indeed different from all the other alternatives. Cryolipolysis is unique Most of the other fat removing methods melt the excess fat. In contrast to that this one freezes the adipose tissue or the fat cells. The fat cells, like any living cell in the body, contain water. Cryolipolysis treatment is actually a procedure that turns the water into fine ice crystals. This is done through controlled cooling. Interestingly, the process works only on the targeted fat cells. It does not freeze or affect the other surrounding tissues of the body. As a result of formation of the ice crystals, the targeted cells meet natural death. Gradually, the dead cells are flushed out from the body in the natural process of elimination. However, this elimination takes about 4 to 6 weeks to get over. Coolsculpting proves to be effective in reducing excess and stubborn deposits of fat from regions like: • Stomach or abdomen • Love handles or flanks • The back area • Thighs and • Chest It is particularly helpful to resolve the double chin problem in men. The result or the effect of fat freezing treatment lasts long. As the fat cells are frozen to death and eliminated from the system, they do not have a chance of reappearing. However, if one wants to retain the toned body for a long time after the treatment, one should do some physical workout regularly and follow a restricted diet. Coolsculpting is indeed the best solution, available these days, to remove the localized and stubborn pockets of fat. Be Ideal Coolsculpting CoolSculpting Nevada
global_01_local_1_shard_00001926_processed.jsonl/72294
Free Download Get Likes for Instagram APK Free Download Get Likes for Instagram APK Description of Get Likes for Instagram Get Likes for Instagram lets you get likes on your Instagram photos and videos for free. Real likes on Instagram for Free!! This is the easiest way to get exposure for your Instagram photos. Simply like photos on Instagram from other Get Likes user to earn coins. Once you have coins you can spend them to get likes on the photos you choose. (2 coins = 1 like). How does it work? Notice:- You must turn off “Posts are private” in your Instagram Profile for this app to work! You can turn it on after you get your likes. -Step 1: Like others’ photos to earn coins. -Step 2: Spend some coins you earn to get likes for your photos. -Step 3: Just watch the likes grow on your photo. – Instagram™ is Instagram’s trademark. Get Likes is not affiliated with Instagram, Inc. Get Likes for Instagram APK Info • Package name:com.aoppp.getlike • Version:1.7 • Requirement:Android 2.1 or above • Category:Social Leave a reply
global_01_local_1_shard_00001926_processed.jsonl/72308
File:Flag of Tallahassee, Florida.png Fro Wikipedia Jump to navigation Jump to search Flag_of_Tallahassee,_Florida.png(207 × 119 pixels, file size: 17 KB, MIME type: image/png) English: The official city flag of Tallahassee, Florida. Esperanto: Flago de Tallahassee Español: Bandera de Tallahassee Latina: Vexillum Tallahassiae Bahasa Melayu: Bendera Tallahassee Português: Bandeira de Tallahassee Date (original upload date) Source This file was derived from: Flag of Tallahassee.jpg Author The original uploader was GatorSlayerFSU at Wikipedie. (Reusing this file) Public domain This work was created by a government unit (including state, county, and municipal government agencies) of the U.S. state of Florida. It is a public record that was not created by an agency which state law has allowed to claim copyright and is therefore in the public domain in the United States. Note: Works that are considered "public records" but were not created by a state or municipal government agency may be copyrighted by their author; the Supremacy Clause of the United States Constitution prevents state law from overriding the author's right to copyright protection that is granted by federal law. For example, a state agency may post images online of the final appearance of a building under construction; while the images may be "public records", their creator (eg. architecture/construction firm) retains copyright rights to the image unless the contract with the agency says otherwise. See: Government-in-the-Sunshine Manual: To what extent does federal law preempt state law regarding public inspection of records?. Disclaimer: The information provided, especially the list of agencies permitted to claim copyright, may not be complete. Wikimedia Commons makes no guarantee of the adequacy or validity of this information in this template (see disclaimer). Florida seal File history current10:05, 3 auguste 2013Thumbnail for version as of 10:05, 3 auguste 2013207 × 119 (17 KB)Illegitimate BarristerUser created page with UploadWizard The following page uses this file: Global file usage The following other wikis use this file:
global_01_local_1_shard_00001926_processed.jsonl/72309
Stability Ball Leg Curl The stability ball leg curl is a great exercise to build strength throughout the upper back, core, glutes, and hamstrings. In the video below, I show both a leg curl and a glute thrust, which are actually two different exercises. How to Perform the Stability Ball Leg Curl – Keep your feet pointed towards your […]
global_01_local_1_shard_00001926_processed.jsonl/72311
Advantages of a C Corp For some reason, many entrepreneurs decide early on that they want to form either an LLC or an S-corp. And for many new businesses, one of these two options may make the most sense: they are both taxed as pass-through entities, which is simpler than a corporation’s tax structure, and often works out to be more favorable. Additionally, an LLC is usually easier to set up and manage than a corporation; this can be attractive to time- and money-strapped young startups. But don’t overlook the tried-and-true C-corporation. This is the “standard” corporation; every corporation is a C-corp unless and until it elects to be taxed under Subchapter S of the Internal Revenue Code. Depending on what you want to do with your business, a C-corp may be a strong choice. One of the advantages of a C-corp is that it can issue multiple classes of stock. An S-corporation can’t do this, which typically means that founders forego the authorization of preferred stock. If your company is planning to take on investors, this could present a big problem: many sophisticated and professional investors want to get preferred stock in exchange for their investment, and some may even refuse to invest in an LLC or an S-corporation. Additionally, it’s typically easier to transfer stock in a C-corp than in an S-corp or LLC. C-corps also give you the option of certain fringe benefits that you can’t take advantage of with an LLC or S-corp. Some insurance premiums paid by the company may be deducted by its shareholders. C-corps also pay a lower tax rate on qualified small business stock. What are the downsides of the C-corp? There are several, but the factors that most often dissuade entrepreneurs from this structure are its complexity and the potential for double taxation. A C-corporation is more complex to set up and manage than an LLC, given that a board has to be appointed, stock has to be issued, and written records must be kept of the company’s decisions. Additionally, because a corporation is itself subject to tax, and its shareholders must pay taxes on dividends, many small businesses shy away from the C-corp structure due to the possibility that some of their income will be taxed twice. However, the fear of double taxation is often overblown and can be greatly reduced with careful tax planning. A note on the Delaware C-corp: many entrepreneurs choose to incorporate a C-corp in Delaware due to its favorable tax structure. As a result, many companies have made Delaware their corporate home, which in turn has produced a deep body of case law and even spurred Delaware to maintain a court dedicated to corporate disputes. This makes Delaware attractive for a number of reasons, and it’s typically worth at least exploring a Delaware C-corp. Many investors insist on a Delaware C-corp for these reasons.
global_01_local_1_shard_00001926_processed.jsonl/72323
“The Last Man on Earth” at Change Seven “Which is better, a flush or a straight?” Raul ruffled the tops of his cards and bit his lip. He nudged Hammersmith, who was staring into the rafters of the theater, his jaw slack. “What?” Hammersmith asked groggily. Julia returned from the bathroom and opened another can of grapefruit soda. “Which is better, a flush or a straight?” “How the fuck should I know?” Hammersmith got up to stretch and threw his cards carelessly on the table, revealing three jacks. “Damn, you fold with a hand like that Hammersmith? Damn.” “I don’t fold. I just don’t want to play cards anymore.” “I get your Cheetos.” “What do you want to do?” Julia asked, looking at Hammersmith while laying her head on the table and allowing her arms to dangle to the floor. “The play, man! Let’s do the fucking play!” “Why do you have to use the f-word all the time?” asked Raul. Read the rest at Change Seven
global_01_local_1_shard_00001926_processed.jsonl/72325
How to Prepare Your Child for Vaccines Spread the love Why Immunizations are Important for Your Child For most children, the mere thought of having a needle inserted into their arms is very upsetting. Anxiety before receiving a shot is common, no matter your child’s age. That worry is often heightened when more than one vaccine is given at a time. In some cases, four injections are given during a single doctor’s visit. To make the experience smoother, prepare your child in advance for the vaccines they’ll be receiving. If your child is old enough to understand, explain how the shots will help them avoid becoming sick. Never describe the shots as punishment or use them as a threat. Read more… Leave a Reply %d bloggers like this: Skip to toolbar
global_01_local_1_shard_00001926_processed.jsonl/72333
Archive for July, 2017 The renowned nature photographer and author, Joel Sartore,  is on a mission. He has set out to photograph every species of animal currently housed in the world’s zoos. With portraits of over 6000 species already taken, he is halfway towards completing his project, which he calls Photo Ark. His quest is to create a photo archive of global diversity with the hope that his portraits will stir in people a deep empathy with animals and an active desire to protect them from extinction. He is undertaking the project against the background of the calamitous species loss almost everywhere on Earth. It has been estimated that unless massive remedial action is taken, half the animal species currently inhabiting the planet will be gone by the end of the century. Sartore’s portraits are both beautiful and moving. He tries to take his shots with the animal looking A photo from Photo Ark directly into the lens, so creating the impression that the animal is making eye contact and forming a connection with the viewer. While we are all genetically programmed to pay attention to animals, we are more attracted to, and more empathic with, species that share similar features and/or behaviours to ourselves. This is sometimes referred to as the “similarity principle”. Regardless of the enormous range of size, shape and other differences that separate our species from others, the main features of the human face (especially the eyes) have their counterparts in mammals, birds and other members of the animal kingdom. By focussing on the faces of his animal subjects, Sartore is making clever (but entirely appropriate) use of the similarity principle. There is something of a tragic irony in the fact that we humans evolved to live with other animals and to share our ancestral forest and grassland habitats with them. There was nothing in this arrangement that required the extinction of species. The web of life is intended to remain intact – not to have great holes in it. The evidence that our brain has an “animal bias” is irrefutable. We are hard-wired to notice animals and to pay attention to them involuntarily. When people are shown pictures of animals, a specific part of the amygdala – a brain structure that is central to pleasure, pain, fear and reward – reacts almost instantly. This may explain why we very rapidly detect animals in nature scenes and why we are more sensitive to changes in the movement and positioning of animals than we are to other objects, including objects as familiar as vehicles. In infants, the animal bias shows up in a number of ways including more animation, vocal activity and social interaction when they are engaged with animals rather than toys. None of this should be surprising as humans have been in the company of animals for two million years or more. Instantaneously obtaining and processing information about an animal’s intent was obviously very important for not becoming prey or being bitten, scratched, thumped or trampled. Not only that, the same ability could be turned to using animals as food and as indicators of where water, edible plants and other food sources might be located. Our ancestors were well served by their genetic disposition to pay close attention to animals. About 14,000 years ago, these same ancestors found another use for animals, particularly for dogs. Bonding with dogs proved to very beneficial. Apart from providing protection and helping with hunting and shepherding, dogs proved to be great companions and promotors of mental health. Interacting with a friendly dog increases the production of oxytocin, a powerful “feel-good” hormone. A surge of oxytocin facilitates social bonding, co-operation, caring and empathy. It also decreases stress, depresses fear and enhances a sense of security, trust and pleasure. Not surprisingly the presence of a dog has been found to improve the effectiveness of therapeutic counselling (the “dog in the room” phenomenon). Similar benefits come from interactions with cats and indeed other pets including horses. And it is almost certain that the “oxytocin response” is triggered, to some degree at least, in most of our benign encounters with non-domestic animals. It is also the case that dogs get something of the oxytocin lift from an engagement with humans (maybe cats and other pets do as well). Not a great deal is known about the specific animal attributes that attract our attention and elicit the oxytocin response. Common experience suggests that beauty of form, colour and movement is an obvious candidate. Superiority to humans in size, strength and physical skill is another. One attribute that has received some research attention is the “cuteness” factor. We tend to prefer animals that we perceive as “cute”, an attribute we usually associate with babies, infants and young children. In scientific terms, cuteness is thought to be bound up with the “baby schema”, a set of features including large head, round face, high forehead, large eyes and small nose and mouth. In combination, these features automatically trigger nurturing, care-giving and empathic behaviour in both adults and children. Animals displaying these features, can look forward to being patted and cuddled on a regular basis. Even though I have never seen one in the wild, I have a special place in my heart for snow leopards. These magnificent animals thrive in some of the most hostile landscapes on earth. I am fascinated by their beauty and awed by their capacity to survive. Needless to say, I was delighted when a recent blog post by Josh Gosh contained this link to a stunning video that features wonderful images of snow leopards. Take time to view it; you won’t be disappointed. Read Full Post »
global_01_local_1_shard_00001926_processed.jsonl/72336
The Greatest FlowMan Break Bread2gether By Overdrive Juan Twitter @PlayBoiJuan InstaGram @OverdrieJuan 180 Miles Per Hour Movie Short Single Purchase: A Existential Mind Production in Collaboration w/ Holographic Beef 180 Miles Per Hour starring Juan Netts Alex Jackson Nelle Destiny Constantin Samaan Sound Effects by Juan Netts Jr. Premium Hi-Fi Sound Wireless Noise Canceling Headphones Play your music wirelessly by connecting to your devices. 40mm drivers for excellent bass, precise treble, and clear mid tones. Up to incredible 16 hours of play/talk time with a single charge. The Eclipse August 21st 2017 Rapper/Songwriter/Marketing Director/Designer… Trouble the Aviator is co founder of Overdrive Movement a multimedia promotions group. Through efforts like viral videos, private parties, fashion design, and street promo the Aviator is taking the entire business in his own hands. With a multitude of mixtapes, singles, and collabs in the rear view Trouble prepares to end 2017 with two new album releases and more new business ventures. Keep an eye to the sky for Trouble the Aviator. The last time the United States witnessed a total Eclipse of the sun was 1979. This summer of 2017 we prepare for it again, as Trouble the Aviator releases the Eclipse. An EP to mark this celestial occasion.
global_01_local_1_shard_00001926_processed.jsonl/72359
In computing, a hyperlink (or link) is a reference to data that the reader can directly follow, or that is followed automatically. A hyperlink points to a whole document or to a specific element within a document. Hypertext is text with hyperlinks. A software system for viewing and creating hypertext is a hypertext system, and to create a hyperlink is to hyperlink (or simply to link). A user following hyperlinks is said to navigate or browse the hypertext.
global_01_local_1_shard_00001926_processed.jsonl/72373
What is Stuttering? Stuttering is so common that everyone knows what it sounds like and can easily recognize it. Everyone has probably had moments of stuttering at least once in their life. It should not be confused with cluttering. Thankfully, we can provide stuttering treatment. Most people don’t know that stuttering can also include non-verbal involuntary or semi-voluntary actions like blinking or abdominal tensing (tics). Speech language pathologists are trained to look for all the symptoms of stuttering, especially the non-verbal ones, and that is why an SLP is qualified to make a stuttering diagnosis. The earliest this fluency disorder can become apparent is when a child is learning to talk. It may also surface later during childhood. Rarely if ever has it developed in adults, although many adults have kept a stutter from childhood. Stuttering only becomes a problem when it has an impact on daily activities, or when it causes concern to parents or the child suffering from it. Stuttering can make it difficult to communicate with other people, which often affects a person’s quality of life and interpersonal relationships. Stuttering can also negatively influence job performance and opportunities, and treatment can come at a high financial cost. What are the cause of Stuttering? Developmental stuttering occurs in young children while they are still learning speech and language skills. Neurogenic stuttering may occur after a stroke, head trauma, or other type of brain injury. Possible causes can include the following: • Family history. Many people who stutter have a family member who also stutters • Brain differences. People may have small differences in the way the brain works during speech Triggers often precede a stuttering episode, and SLPs can help people recognize and cope with these triggers ahead of time. How is stuttering diagnosed? Stuttering is usually diagnosed by a speech-language pathologist. The SLP will consider a variety of factors, including the child’s history, an analysis of the child’s stuttering behaviors, and will also test your child’s speech and language. This includes listening to how your child says sounds and words. The SLP will test how well your child understands what others say and how well she uses words to talk about her thoughts. How is Stuttering treated? Treatment will depend on any or all of the following: • Your child’s speech and language skills • How much your child stutters • How your child reacts when she stutters • How stuttering impacts your child’s everyday life • How others react to your child when he stutters For children who are 2–6 years old, treatment may focus on either of these two things: • Direct strategies—Working with your child to change how he/she speaks • Indirect strategies—Slowing down your own speech and asking fewer questions You are an important part of your child’s treatment. The SLP can help you learn more about • How to respond when your child stutters • Changes you can make to improve your child’s fluency • What to do to improve how your child feels about talking If you wish to meet with our one of our Speech-Language Pathologist, please contact us at [email protected]. We are conveniently located in Burlington, Aldershot. Stuttering Treatment for Children Scroll Up Recent Posts
global_01_local_1_shard_00001926_processed.jsonl/72375
Using the carpenters square This video show cases a multiple use angle square "The Winklestar" by BMI in Germany. Robust foldable angle level for variable transfer or taking of angles of 0 degrees to 270 degrees. Built-in vials it can also be used as a spirit level. Maximise its uses and maximise your productivity.
global_01_local_1_shard_00001926_processed.jsonl/72378
NEWS Germany vs Elsevier: universities win temporary journal access after refusing to pay fees (Nature) During 2017, a consortium of 200 German research institutions was in conversations with the publishing group Elsevier to achieve a collective deal for full online access to Elsevier journals. This deal would have granted them access to about 2.500 journals for half the market price.  After they could not reach an agreement by December 2017, Elsevier decided to provide those institutions with unlimited online access until a solution could be crafted.  Experts regard this “as a milestone for global efforts to make results of publicly funded research immediately and freely available to scientist and the wider public”. (Summary by Isabel Mendoza) Nature  10.1038/d41586-018-00093-7
global_01_local_1_shard_00001926_processed.jsonl/72382
PokéBase - Pokémon Q&A 2 votes When you go to Castelia city in BW, BW2,there is a Pikachu photo on a Skyscraper.What's the point of showing a Pikachu photo if you can't catch it in Unova ? Pikachu is very famous in anime since he is ash's best friend he is very famous. as a result, pikachu is on the painting. 1 Answer 1 vote Best answer Decoration Game Freak just put it there for decoration. selected by wow,logic and game freak don't go together.Thanks xD ikr
global_01_local_1_shard_00001926_processed.jsonl/72397
Loading presentation... Present Remotely Send the link below via email or IM Present to your audience Start remote presentation • Invited audience members will follow you as you navigate and present • People invited to a presentation do not need a Prezi account • This link expires 10 minutes after you close the presentation • A maximum of 30 users can follow your presentation • Learn more about this feature in our knowledge base article Do you really want to delete this prezi? By: Kiera and Kiara No description Kiera Dickerson on 10 February 2016 Comments (0) Please log in to add your comment. Report abuse Transcript of By: Kiera and Kiara By: Kiera and Kiara How does Protein affect others? I looked up " How does protein affect others" I didn't get anything. Only thing that did show up was " How does protein affect our bodies". Protein affects our bodies by having lack of protein which can lead to hypoglycemia, lowered blood pressure, anemia,etc. Hypoglycemia is not a disease in itself; it is a sign of a health problem. The majority of people know when their blood sugar levels have dropped, and have time to do something about it. The typical signs of low sugar levels are hunger, trembling, shakiness, nausea, pallor, and sweating Why my group chose this topic? My group chose this topic because we like meat. We enjoy eating it and we believe that its good and has good nutrients for the body. Protein is good for anyone who eats it. 1.) Approximately 18-20% of your body is protein by weight. 2.) Keratin has sulfur bonds and the more sulfur links it has the curlier a person's hair is. 3.) The lifespan of most proteins is two days or less. 4.) Without protein called "Albumin" , the entire human body would swell. 5.) While beef is the most popular meat in America it's protein content is low compared to poultry. 6.)Protein contains carbon,oxygen,hydrogen,nitrogen and sometimes sulfur. 7.) There would be no life without protein. More Facts.... 1. Protein is a long chain- like molecule that is made up of small units known as amino acids. 2. Protein is in each of the trillion cells in the human body 3. Contain Carbon, Oxygen, Hydrogen, nitrogen and sometimes sulfur 4. Proteins Structure is described at 3 levels. 5. Amino Acids are joined together by peptide bonds The peptide bonds in proteins can be broken down by hydrolysis. What's being done to educate others about protein? We are promoting our protein by selling it in the stores like milk,cheese,bacon,ham,turkey,pork,steak,etc. Basically any dairy. Welcome To Our Journey Of Protein... Mrs. Allen Prezi is different, and it won't let us post our resources if you need them. One of us can email them to you. kiera dickerson did facts and why my group chose this kiara mumin did pictures and how protein affects others and more facts. We did resources together Full transcript
global_01_local_1_shard_00001926_processed.jsonl/72398
Loading presentation... Present Remotely Send the link below via email or IM Present to your audience Start remote presentation • Invited audience members will follow you as you navigate and present • People invited to a presentation do not need a Prezi account • This link expires 10 minutes after you close the presentation • A maximum of 30 users can follow your presentation • Learn more about this feature in our knowledge base article Do you really want to delete this prezi? Lab Portfolio 4 - page 244 No description Paola Nieto on 1 December 2016 Comments (0) Please log in to add your comment. Report abuse Transcript of Lab Portfolio 4 - page 244 Lab 4 - page 244 Paola Sofía Nieto Martínez Group 109 ID: 1857650 Oral and Written Expression The Paraphrase To paraphrase is to include the ideas or information from an original source in your paper by rephrasing those ideas or information in your own words. Denotation and Connotation The Dialog A conversation between two or more persons A similar exchange between a person and something else (as a computer) Concept Map Concept maps are graphical tools for organizing and representing knowledge. They include concepts, usually enclosed in circles or boxes of some type, and relationships between concepts indicated by a connecting line linking two concepts. Refers to the literal meaning of a word, the "dictionary definition." Refers to the associations that are connected to a certain word or the emotional suggestions related to that word Cmap | Cmap Software. (n.d.). Retrieved November 30, 2016, from http://cmap.ihmc.us/docs/conceptmap.php How to Paraphrase. (n.d.). Retrieved November 30, 2016, from http://www.plagiarism.org/citing-sources/how-to-paraphrase/ Denotation & connotation. (n.d.). Retrieved November 30, 2016, from http://www.eng.fju.edu.tw/English_Literature/terms/denotation.htm (n.d.). Retrieved November 30, 2016, from http://www.merriam-webster.com/dictionary/dialogue Full transcript
global_01_local_1_shard_00001926_processed.jsonl/72407
Pair fit From PyMOLWiki Jump to: navigation, search Pair_Fit fits a set of atom pairs between two models. Each atom in each pair must be specified individually, which can be tedious to enter manually. Script files are recommended when using this command. pair_fit (selection), (selection), [ (selection), (selection) [ ...] ] # superimpose protA residues 10-25 and 33-46 to protB residues 22-37 and 41-54: pair_fit protA///10-25+33-46/CA, protB///22-37+41-54/CA # superimpose ligA atoms C1, C2, and C4 to ligB atoms C8, C4, and C10, respectively: pair_fit ligA////C1, ligB////C8, ligA////C2, ligB////C4, ligA////C3, ligB////C10 So long as the atoms are stored in PyMOL with the same order internally, you can provide just two selections. Otherwise, you may need to specify each pair of atoms separately, two by two, as additional arguments to pair_fit. Script files are usually recommended when using this command. An description of selection caveats for these commands may be found at Rms. Fit, Rms, Rms_Cur, Intra_Fit, Intra_Rms, Intra_Rms_Cur
global_01_local_1_shard_00001926_processed.jsonl/72408
Welcome to NeuroLab’s documentation! NeuroLab - a library of basic neural networks algorithms with flexible network configurations and learning algorithms for Python. To simplify the using of the library, interface is similar to the package of Neural Network Toolbox (NNT) of MATLAB (c). The library is based on the package numpy (http://numpy.scipy.org), some learning algorithms are used scipy.optimize (http://scipy.org). Indices and tables Table Of Contents Next topic This Page
global_01_local_1_shard_00001926_processed.jsonl/72409
Viewing posts from November, 2016 First ever QGIS Cape Town meetup On November 3 2016 we had the first ever QGIS ZA user group meetup in Cape Town! read more About Us The South African QGIS User Group is an open community of professionals and enthusiast who use QGIS.. Immo Blecher. email: immob19 [AT]
global_01_local_1_shard_00001926_processed.jsonl/72421
Monuments and Memory-Making: The Vietnam Veterans Memorial, 1981-82 Game in Development | Available to Download When the Vietnam War drew to a close, the process of memorializing the conflict resulted in a tug-of-war over the national narrative of the 20+ year struggle. In the wake of devastating loss and in the midst of the continuing and ever-evolving Cold War, conflicting voices emerged in the creation of the Vietnam Veterans Memorial in Washington, D.C. as various interest groups vied for control over how the United States would memorialize the war. Physical spaces like the Vietnam Veterans Memorial offer compelling ways of measuring collective memory. The way we interpret the past through these concrete structures provides insights into how the creators of those spaces constructed the past, how they intended for audiences to do the same, and how those meanings can be challenged. Monuments and Memory-Making will bring students directly into that conflict. Students will take part in the conversations and controversies that emerged as the nation grappled with how best to memorialize what was at the time the longest conflict in US history. As they engage in the very process of memory-making, they will work to reconcile the varied and often conflicting voices that emerged after the fall of Saigon. How do we create a national memory of the past? How do we move on from a lost war? How do we remember the dead, while honoring the living? How do we reunite a fractured nation? Who speaks to that nation, and who speaks for it? How does public opinion and public consciousness shape our understanding of the past? Whose voices matter? About the Authors: Rebecca Livingstone is an Associate Professor of History at Simpson College, Indianola, IA.  She is broadly trained in British and European history with a research focus on gender  and crime in seventeenth-century English popular print media.  As part of her teaching, she has developed a broad interest in social memory and how societies construct their idea and understanding of the past, particularly for public consumption in museums, monuments and memorials.  She has taught several courses on European remembrance of the First and Second World Wars.  Currently, she is lead author on Peacemaking, 1919: The Paris Peace Conference, a Reacting to the Past game in development.  She has served on the Board of the RTTP Game Development Conference for the last six years. Kelly McFall teaches at Newman University, where he is Associate Professor of History, Chair of the Division of Humanities and Director of the Honors Program.  He is broadly interested in the history of conflict and human rights.  He is the author of The Needs of Others:  Human Rights, International Organizations and Intervention in Rwanda, 1994, a game in development in the Reacting to the Past Series.  He also hosts a podcast titled "New Books in Genocide Studies" as well as contributing to a similar podcast called "New Books in Sports." Abby Perkiss is an Assistant Professor of History at Kean University in Union, NJ. Her first book, Making Good Neighbors: Civil Rights, Liberalism, and Integration in Postwar Philadelphia (Cornell University Press, 2014), examines the creation of intentionally integrated neighborhoods in the latter half of the twentieth century. Her second book, Staring out to Sea: Hurricane Sandy on New Jersey's Forgotten Shore, is also forthcoming with Cornell UP. She is the co-author of two Reacting modules: Changing the Game: Title IX, Gender, and Athletics in American Universities (with Kelly McFall) and Monuments and Memory-Making: The Vietnam Veterans Memorial (1981-82) (with Kelly McFall and Rebecca Livingstone). Perkiss is the Managing Editor of the Oral History Review and Vice President of Oral History in the Mid-Atlantic Region.
global_01_local_1_shard_00001926_processed.jsonl/72467
CollonTrek (Bionaz-Arolla) Date 09/07/2019 Country Italy - Switzerland Distance 22 km Elevation 1250 m   One of the most unusual trail races anywhere, Collon Trek begins in Italy, in the hamlet of Bionaz in the Valpelline region, climbs a high pass, traverses a glacier, and finishes in Switzerland. The race reaches its high point of 3,080 meters when crossing over into Switzerland’s Eringer valley, at Col Collon. Runners use microspikes and other forms of traction, to assist during the glacier section. The run finishes in the village of Arolla, on the Haute Route between Chamonix, France and Zermatt, Switzerland. Collon Trek celebrates the shared culture of these two valleys. The race takes place every other year, with 2016-2018-2020 being off years. So see you in 2019!
global_01_local_1_shard_00001926_processed.jsonl/72474
I dream in shades of green. The dusty hue of swallow herb; the new growth of little hand flower; the deep forest shade of cat’s claw. Plants are my calling and, as in waking life, they sprawl across boundaries. The old woman dreams of deaths to come. I wake to the sound of little explosions — ta-ta-ra-ta-ta — of copal cast into flame. When I come into my full power, the old woman will teach me the secret prayers, the ones only our kind intone because none other have such need to see under and beyond the world… Short story in Long Hidden, Crossed Genres, 2014, out of print
global_01_local_1_shard_00001926_processed.jsonl/72510
Tag Archives: backlinking However enough traffic is required for a website to gain revenues from it, but once the traffic is huge enough, the advertising industry would be sufficient enough to generate the revenues for the company. This is one of the answers to How to improve Website Ranking? Improve your website Ranking with SeoJeff. Finding ways as to how to improve Website Ranking. Intro Having a website for a business corporation is highly necessary, as they would be losing potential amounts of their customers in the online virtual world. There are a number of advantages related to the website, for both the customers as well as the company. A […] SEO is one of the paradigms implied to improve the websites approachability. Below is the reply to the most awaited query, What is SEO? How does it work? What is SEO and How does it work? Deciphering what is SEO? how does it work? on the ground level. Why are websites important to businesses? Websites are like the unsung heroes of the business marketing strategies and Search Engine Optimisation is always associated with it. In this article, we’ll understand What is SEO? How does it work?? Website in its native state […]
global_01_local_1_shard_00001926_processed.jsonl/72539
Hyacinthe Rigaud From Wikipedia, the free encyclopedia Jump to navigation Jump to search Hyacinthe Rigaud Self-portrait in a turban, 1698, Perpignan, Musée Hyacinthe Rigaud. Born 18 July 1659 Died 29 December 1743 (aged 84) Nationality French Field painting, portraiture Training Charles Le Brun Paul Pezet (presumed) Antoine Ranc (presumed) Movement Baroque Works coronation portrait of Louis XIV; The Presentation in the temple; portrait of Bossuet in winter costume; portraits of Louis XIV Influenced by Anthony van Dyck Influenced Jean Ranc Nicolas Desportes Charles Sévin de La Pennaye, Louis René Vialy, Joseph André Cellony Awards Prix de Rome 1682 Hyacinthe Rigaud (18 July 1659 – 29 December 1743) was a French baroque painter. He was of Catalan origin. He was from Paris. He was known for his oil paintings. Other websites[change | change source] Media related to Hyacinthe Rigaud at Wikimedia Commons
global_01_local_1_shard_00001926_processed.jsonl/72558
Food is perhaps the most elemental feature of culture.  The flavors of home remain with us long after we leave the nest, retaining the capacity to evoke our oldest memories when we encounter them elsewhere in the world.  Both diaspora populations and displaced individuals will hold onto the ideas about and methods of preparing foods with which they were raised, even after they have lost their hearth languages, customs of dress and behavior, and standards of personal beauty.  As an anthropologist and a historian, I’m fascinated by the role food plays in our lives.  This blog is intended as a space where I can share food culture, preservation techniques, the history of certain key aspects of the foods we see as “traditional” or “modern,” recipes and stories, and explore the finer points of how integral food is in the way we see ourselves. Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/72584
It's been demonstrated how to feed MediaCodec with Surface input like the CameraPreview, but are there practical ways of buffering this input before submission to MediaCodec? In my experiments, a Galaxy Nexus experiences unacceptable hiccups in producing audio / video streams using the direct, synchronous encoding method in When using MediaCodec with byte[] or ByteBuffer input, we can submit unencoded data to a ExecutorService or similar queue for processing to ensure no frames are dropped, even if the device experiences spikes in CPU usage out of our application's control. However, due to the requirement of performing color format conversion between Android's Camera and MediaCodec this method is unrealistic for high resolution, live video. 1. Is there a way to feed the NativePixmapType created with EGL14.eglCopyBuffers(EGLDisplay d, EGLSurface s, NativePixmapType p) to MediaCodec? 2. Can anyone from Android comment on whether harmonizing ByteBuffer formats between the Camera and MediaCodec is on the roadmap? • So, did you find a way to solve the hiccups when passing frames to MediaCodec's input? In my case, I am buffering the output of the MediaCodec when feeding it to MediaMuxer. But I am experiencing hiccups when calling swapBuffers() to feed MediaMuxer's input. – Petrakeas Oct 27 '15 at 16:33 up vote 3 down vote accepted You really don't want to copy the data at all. Allocating storage for and copying a large chunk of data can take long enough to kill your frame rate. This generally rules out byte[] and ByteBuffer[] solutions, even if you didn't have to do a U/V plane swap. The most efficient way to move data through the system is with a Surface. The trick is that a Surface isn't a buffer, it's an interface to a queue of buffers. The buffers are passed around by reference; when you unlockCanvasAndPost() you're actually placing the current buffer onto a queue for the consumer, which is often in a different process. There is no public mechanism for creating a new buffer and adding it to the set used by the queue, or for extracting buffers from the queue, so you can't implement a DIY buffering scheme on the side. There's no public interface to change the number of buffers in the pool. It'd be useful to know what it is that's causing the hiccups. The Android tool for analyzing such issues is systrace, available in Android 4.1+ (docs, example, bigflake example). If you can identify the source of the CPU load, or determine that it's not CPU but rather some bit of code getting tangled up, you'll likely have a solution that's much easier than adding more buffers to Surface. • Great advice! Systrace really helped out. Is it possible to nest Trace segments? I can't seem to get segments that begin and end within a parent to appear. – dbro Oct 11 '13 at 23:23 • It should work. I tried a simple example (two beginSection() calls at different points in onCreate(), two endSection() calls right at the end) and got what I expected. – fadden Oct 12 '13 at 0:13 • I'm seeing "hiccups" on tablets while trying to stream video, either from a h264 TS file on device or over UDP (live camera feed or streaming H264 TS from a server) A galaxy note 10.1 with 4.1.2 (i think, its not here in front of me) hiccups and also always returns BufferInfo.size of 0 (we've since upped our minimum sdk to 18 (4.3) as thats when CTS for codec went in)... however Lenovo Yoga 10 @4.3 has solid stuttering during appears due to the fact that input buffers are rarely available... – PapaWhiskey Jun 16 '14 at 21:38 • I am using a similar pipeline to the Grafika "Show and capture video" example. Calling swapBuffers() to deliver the buffer to MediaCodec can get quite slow. Performing Android alpha animations at the same time can degrade the swapBuffers() performance even more. Perhaps GPU's fill rate is the bottleneck. What is the solution proposed by this answer? – Petrakeas Oct 27 '15 at 16:25 • @Petrakeas: you should create a new question, rather than comment on an existing answer. Use tags for [android] [mediacodec] [grafika], and describe in detail what you're trying to do and how you're measuring performance. – fadden Oct 27 '15 at 17:20 Your Answer
global_01_local_1_shard_00001926_processed.jsonl/72587
Star Fox (series) Jump to: navigation, search This article is about the Star Fox series as a whole. For the in-game team known as Star Fox, please see Star Fox (team). For the game called Star Fox, see Star Fox (game). Series: Star Fox (series) NIWA link Lylat Wiki Banner LW Banner.png Interwiki code LW - - On Other Wikis  This box: view  talk  edit  The Star Fox series is one of Nintendo's most notable video game franchises which debuted commercially in 1993 with the game Star Fox (or Starwing in the PAL region) for the Super Nintendo Entertainment System. The series is based on a fusion of an experimental video game development from Argonaut Software and a kemono concept that was created by Shigeru Miyamoto. This series has often been generally categorized as a scrolling, third-person arcade shooter, although not every game necessarily had that as its main element of game-play. The series had been notable in Nintendo's gaming history, with games such as Star Fox being one of the earliest console video games with actual three-dimensional graphics, as well as being the first video game to use the Super FX chip, and Star Fox 64 being the first console game to support force-feedback technology. Each previously mentioned game's respective innovation was key to that game's success in the video game market. This series is one of Nintendo's few franchises that features full-voice acting and progressive plots. The series closely follows a team of space-trekking, anthropomorphic animal characters called "Star Fox" in space-based mercenary missions, within a star system called the Lylat System, in order to save their home planet Corneria from various antagonists. The titular team is composed of four main, reoccurring characters known as Fox McCloud, Falco Lombardi, Slippy Toad, and Peppy Hare. However, overtime, the series added other notable characters such as Krystal and Star Wolf. The series is considered to be situated in a futuristic science-fiction setting, usually using fighter spacecrafts called Arwings as the games' players' main element of progression. Due to the anthropomorphic nature of the characters, the series overall is often perceived as a furry video game series. Origins (Circa late 1980s - early 1990s) The Star Fox franchise originally began as a mere technical demonstration for the Super Nintendo Entertainment System (SNES) that was never really meant to become a fully fledged game. The story begins when a British video game developing company called Argonaut Software (at the time) were working on various technical concepts for games with three-dimensional graphics for different video game home consoles. During the late 1980s, Nintendo had a dominant share in the video game market, and most notably in the United States with its own developed home consoles such as the Nintendo Entertainment System (NES) and the original portable video game console Game Boy. Argonaut Software had two notable employees behind its 3D game concepts: Giles Goddard and Dylan Cuthbert. After a successful attempt to simulate actual, real-time three-dimensional wireframe graphics using the NES's own technology alone, the company allowed Cuthbert to program another 3D game for the slightly more technically inferior Game Boy, and he managed to successfully create a video game shooter called Eclipse, one of the first ever 3D games for a portable console, and one of the extreme few 3D games ever attempted or released on the Game Boy. Although the game was licensed to American video game publisher Mindscape, Argonaut's president and founder Jez San had presented the game before Nintendo of America (NoA) at a Consumer Electronics Show. NoA were so impressed with the game that they flew San and Cuthbert to Nintendo's mother company in Kyoto, Japan and meet up with game designer Shigeru Miyamoto, and Nintendo's then-president Hiroshi Yamauchi. After the meeting, Nintendo quickly decided to invest into this new development that they fully bought the rights to Eclipse from Mindscape, and flew over Goddard with the rest of his team to the mother company as well. Argonaut's team worked on the game closely with Nintendo's own Research & Development 1 team, and they even renamed the game from Eclipse to merely X. The game was then released on the Game Boy early 1992, exclusively in Japan, and it had seen a moderate success, and was critically well-received. After helping Nintendo behind the development of the Super Famicom (Japanese version of the SNES), including attempting to fix the last-minute problems of the early batch of games that supported Mode 7, Argonaut Software was then contracted by Nintendo to work with them exclusively for three gaming projects at least. One of Argonaut's first releases was in 1992 with a new chip called the DSP2, a graphics co-processor which can significantly assist the console's main central processing unit, improving over Nintendo's own original DSP chip, in rendering Mode 7 a bit further than usual. The chip was first commercially introduced embedded within the game cartridges of the racing game Super Mario Kart. The DSP2 allowed the support of a smooth graphical transition of Mode 7 during a split-screen, multiplayer mode, which was not possible before. However, Argonaut had not stopped its hardware enhancement of the SNES right there. Nintendo and Argonaut Software, working closely with another British company called Flare Technology, came up with a far greater powerful graphics co-processor. Initially, it was called the MARIO Chip 1, but was later renamed by Nintendo as the Super FX chip. The chip far exceeded the DSP2's Mode 7 capabilities by rendering actual, real-time three-dimensional polygon graphics using the SNES's power alone. Argonaut then worked on a simple game demo to test out possibilities with the Super FX chip. The demo was a free-roaming, 3D space fighter title dubbed Starglider. Initially, it was thought they could evolve the demo into an actual game, but the idea was later scrapped by Cuthbert due to the very slow frame-rate the game presented, which underestimated the real power of the Super FX. Nintendo's Miyamoto did not like these results either, but he insisted that the game be reworked from the ground up again rather than be totally canceled. Working as a team, Argonaut used their experience and knowledge in the technical and programming aspects of the Super FX and 3D games respectively alongside with Nintendo's solid reputation in highly acclaimed game design, they developed a much improved version of Starglider. They did this by scrapping the idea of free-roaming and making it a fixed path scrolling game instead. Additionally, Goddard and Cuthbert worked together to create complex machine bosses for each level, and Nintendo's own game composer Hajime Hirasawa had implemented new scores to the gameplay which is later believed to be critically worthy of the game. The game's engine was based during this time, and many level designs were implemented. After seven months of development, Starglider was basically close to completion, but unfortunately the team decided that, despite it working a lot better now, the game's concept as a mere arcade shooter was very cliché and unimpressive, as if the game was a total waste of time and money. At this point, Miyamoto began to brainstorm for good plot to back up this visually superior game. At first, many of his concepts about epic wars in distant galaxies was very confusing, but suddenly inspiration had hit him as he wandered the streets of Kyoto. Miyamoto happened to come across the Fushimi Inari Sanctuary, the biggest shrine dedicated to the Shinto god of grain Inari. Inari happens to take form of a kitsune (a fox), and many of his statues depict him wearing a red bandana around his neck. At this point, Miyamoto then realized how he could develop the game further. He then went back to his office and started to flesh out the plot concept further by adding animal characters from different Japanese myths, including a fox character, inspired by Inari, as the main protagonist of the game. Later, Miyamoto's plot concept was fused into Starglider, and Nintendo decided to rename the game as Star Fox instead. A few months later, in 1993, Nintendo began extensive marketing campaigns in Japan, the United States, and even Europe for a brand new game, advertised to the public for having "ground-breaking, three-dimensional graphics and special effects never seen before." After its initial release, Star Fox became one of the best sold games that year. Game pages Star Fox Main article: Star Fox (game) Star Fox 64 Main article: Star Fox 64 Star Fox 64 3D Main article: Star Fox 64 3D Star Fox Adventures Main article: Star Fox Adventures Star Fox: Assault Main article: Star Fox: Assault Star Fox Command Main article: Star Fox Command Star Fox Zero Main article: Star Fox Zero Star Fox Guard Main article: Star Fox Guard Star Fox 2 Main article: Star Fox 2 Fanmade Games Main article: Fan Creations Other games Hideki Kamiya, the creator of the Bayonetta series, has expressed interest in making a Star Fox game[1]. But Nintendo has not expressed anything officially or unofficially related to this statement. Dylan Cuthber, one of the makers of the orginal Star Fox games, has stated that he has no real interest in continuing the series[2]. Shigeru Miyamoto, the creator of the series, on the other hand, wishes he could continue the series[3], but tends to forget about it[4]. Masahiro Sakurai, the creator of the Super Smash Bros. series and the Kirby series, has stated that the game Kid Icarus: Uprising was originally meant to be another Star Fox game[5]. Starlink: Battle for Atlas, a game created by Ubisoft, contains Star Fox content exclusively for the Nintendo Switch version. Cancelled Games Star Fox Virtual Boy A tech demo of a Star Fox game for the Virtual Boy was showcased at E3 1995 and the 1995 Winter Consumer Electronics show along with the formerly cancelled Star Fox 2. Due to the critical and commercial failure of the Virtual Boy, Star Fox Virtual Boy, alongside several other Virtual Boy titles, were scrapped.[6] Star Fox Arcade When Star Fox: Assault was announced, Nintendo also announced the development of a Star Fox arcade game. However, since its initial announcement, nothing else has been said about the game, and it is assumed the game has since been cancelled.[7] Project Giant Robot In an interview with GameSpot, Shigeru Miyamoto confirmed that both Project Guard and Project Giant Robot were connected to Star Fox Zero. Project Guard was later officially titled as Star Fox Guard and was released alongside Star Fox Zero. However, Project Giant Robot was never released, ultimately being officially cancelled in 2017. When questioned, Nintendo stated "we made this decision after considering our overall product and development strategy.”[8] 1. IGN. 2010. "Bayonetta Creator Wants to Make Star Fox". Accessed Decemmber 27th, 2010. {{{address}}}. 2. http://www.g4tv.com/thefeed/blog/post/694530/original-star-fox-creator-not-interested-in-making-star-fox-for-wii/ 3. http://www.destructoid.com/miyamoto-wishes-you-d-like-star-fox-as-much-as-he-does-153350.phtml 4. http://multiplayerblog.mtv.com/2009/10/27/mario-creator-talks-disappointment-with-star-fox/ 5. http://techland.time.com/2010/06/28/e3-2010-masahiro-sakurai-makes-kid-icarus-fly-again-on-the-nintendo-3ds/ 6. Unseen64. 2008. "StarFox [Virtual Boy – Cancelled]". Accessed 10/25/2017. {{{address}}}. 7. IGN. 2002. "Namco Brings GCN Support". Accessed 4/6/2010. {{{address}}}. 8. Polygon. 2017. "Nintendo kills Project Giant Robot". Accessed 9/7/2017. {{{address}}}. External Links This article is a series stub. You can help Lylat Wiki by expanding it. - Series - SW Banner.png LW Banner.png SMW Banner.png ZW Banner.png BP Banner.png WK Banner.png MW Banner.png WW Banner.png EB Banner.png FZW Banner.png FeW Banner.png StarfyWiki Banner.png
global_01_local_1_shard_00001926_processed.jsonl/72591
in business •  2 years ago Braun’s biggest victory over Apple underscores a central economic issue: What is the right balance between competition and opting? Does anyone own a shape? Should anyone own a shape? These questions may should absurd, but they are  at the heart of U.S. patent laws Battle of the Titans: Braun vs. Apple. On Aug. 24, 2012 a San Jose jury awarded Braun a whopping $1.05 billion damages. Braun had accused Apple of copying its intellectual property, including its very broad design patens for rectangular “electronic devices.” And Braun wants to use those patents to stop its competitor from selling items like the new (rectangular) iPhone and (rectangular) iOS-based desktop computers. Now, you may be thinking that a lot of devices in your house are rectangular. Perhaps you are even reading on one now. Televisions, laptop screens. Kindle. Even the Ur-reading device – paper – is rectangular. Braun, is designing electronic devices, created its version of a rectangular consumer electronic audio platform. Yet now Braun has succeeded in punishing Apple for much the same thing: copying a rectangular design. And this highlights a central issue in today’s innovation-based economy. What is proper blanche between competition and copying? Intellectual property law is based on the notion that copying is bad for creativity. It is usually chapter to copy something than creating something wholly new. If innovators are not protected against imitation, they will not invest in more innovation. At least that’s how the story goes. The real world, however, tells a different story. Imitation is at the center of an enormous amount of innovation. Rules against copying are sometimes necessary. But in many cases, they serve to slow down innovation. Copying, in short, is often central to creativity. How can copying be beneficial? Because it can enable as well as inhibit innovation. When we think of innovation, we usually picture a lonely genius toiling away until he or she finally has an “aha!” moment. In fact, innovation is often an incremental, collective and competitive process. And the ability to build on existing creative work – to tweak and refine it – is critical to the creation of new and better things. Once we look, we see examples all around us. Thomas Edison’s light bulb imitated elements from a dozen earlier bulbs. Shakespeare’s “Romeo and Juliet” borrowed from earlier writers, and “West Side Story” in turn drew heavily from Shakespeare. This kind of copying and tweaking often leads to more choice in the marketplace — many variations on a theme — and more competition, which is good for consumers. Copying can also drive the process of invention, as competitors strive to stay ahead. And copying can serve as a powerful form of advertising for originators, one that carries weight because it is authentic. Copying may even expand a market by creating a trend. We can see this dynamic best by looking at industries in which copying is legal, where our intellectual property laws do not reach. A great example is cuisine. Surprisingly, chefs have almost no rights in their creations. Recipes can be legally copied by anyone, including a competitor. It happens all the time. Molten chocolate cake; miso-glazed black cod — these dishes and many more have been widely knocked off. The world of cuisine nonetheless remains highly creative, and many great chefs believe openness, and the freedom to tweak the work of others, is what makes contemporary cuisine so vital. In their “Statement on the New Cookery,” Thomas Keller and Ferran Adria argue for “full acknowledgment” for culinary inventors but also declare their “readiness to share ideas and information.” The same is true for the designs of typographic fonts, the look of the letters used to make printed material. There are more than a quarter million such designs, and they can be freely copied, as was the case with Arial, familiar to all Microsoft users. Arial is a knockoff of Helvetica (perhaps the only font to be the subject of a documentary). All the copying hasn’t stopped the creation of new fonts. There are many other examples, from fashion designs to football plays to financial innovations like index funds, that exhibit this marriage of copying and creativity. These examples do not prove that copying is always a force for good. And it is not. But they do show that the relationship between imitation and innovation is more complicated than conventional wisdom suggests. Copying can be destructive. Yet copying can also be productive Authors get paid when people like you upvote their post.
global_01_local_1_shard_00001926_processed.jsonl/72616
Skip to main content Edmentum Support ERROR: "Error 404: page cannot be found" or blank screen when launching Web link from offline activity Access needed to non-PLATO Web sites: Some offline activities and Exploration activities redirect the learner to sites outside the PLATO servers used for PLE.  In the courses/titles Art History and Appreciation, Computer Applications and Technology, Consumer Mathematics, and Health, the links go to pages on, which then forwards the user to a non-PLATO Web site.  In other courses, the Web links connect directly to the non-PLATO Web sites. A "404" error or blank screen may occur if a network appliance is set to block or filter traffic on the network. This can occur at the local or district level. Contact your IT professional for assistance. Details of third-party links are listed in the spreadsheet below: Current Plato course Master Links List Details of third-party links in Electives are listed in the spreadsheet below: Current Electives Master Link list In these files, the Current Links column shows the non-PLATO Web site that is linked to, e.g. is linked to from a PLATO English Course.    The URL Redirect ID column shows the intermediate redirect link for the 4 courses listed above, (e.g. is a link in an Art History and Appreciation activity that redirects the learner to a non-PLATO site (Note: These sites are only accessible from within PLE). How to get more help Copyright Information Virtual Workshops Click here to register today for Edmentum Virtual Workshops! • Was this article helpful?
global_01_local_1_shard_00001926_processed.jsonl/72623
Freedom Is Not Free A good friend of mine, Jeff Shood, is back in Washington DC this week doing business. Yesterday, we were pinging a few emails back and forth trying to find a time to connect over lunch. In one of his emails he sent me this photo of Arlington National Cemetery. I looked at the photo and I wrote back to Jeff, “What sacrifices so many people have made so that we might live free!” The photo alone is inspirational, I can only imagine the full gravity of what Jeff felt as he walked through the cemetery where marker after marker represented a precious human life who gave their life for the sake of their country. As I looked at the photo it made me think of another peculiar grave. This particular grave is odd because it has no headstone, no marker, and it doesn’t even contain human remains. The grave I’m thinking about is the one that held Jesus for only 3 days before the power of His indestructible life overcame death and He rose liberated from death to stand as the supreme Liberator of any who trust Him to free them from death. I look at this picture of Arlington and I’m thankful for the ultimate sacrifice of each person, but I also think of Romans 5: 6- 8 which says,  “At just the right time, when we were still powerless, Christ died for the ungodly. Very rarely will anyone die for a righteous man, though for a good man someone might possibly dare to die. But God demonstrates his own love for us in this: While we were still sinners, Christ died for us.” Arlington National Cemetery It’s one thing to die for a noble cause, or for a cause that you’re convinced is noble, it’s another thing completely to not only die for sinners (people who are trying their best to run from you and even fight against you) but to also come back from the dead and offer those very same rebels a new life. About Andy Lewis Andy is an author, pastor, and musician who lives in Santa Cruz California. Currently he serves as lead pastor at Faith Community Church in Santa Cruz This entry was posted in Uncategorized. Bookmark the permalink. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/72625
Log in No account? Create an account stargate, DanielJackson Fic; Shadow self (Prologue) Posted on 2013.06.05 at 20:24 Tags: , Title: Shadow self (Prologue) Characters/Pairings: Stefan, Silas (this chapter). There will be others in future chapters. Summary: Set immediately after season four, Silas and Stefan battle. A different take on the tale of Stefan. Word count: 970 Beta: Many, many thanks to my awesome beta bleodswean When he discovered his doppelganger amongst those who would wake him he had given consideration to the notion that there was a greater purpose at play. Said notion had been quickly dismissed as he saw what true insects these vampires were. Futilely crawling over their rock of a town, scurrying for survival. The cure stolen from them so easily, pitiful reactions to the death of an insignificant boy, desperation to make their grief-stricken friend okay again, Stefan’s pathetic desire to be normal. His doppelganger did not even deserve the name of his shadow. Now however, as he stood upon the cliff-face, while a Stefan-filled safe sank deeper into the quarry below, he realised how foolish it had been of him to dismiss the situation so readily. Silas fell to his knees in agony. The engulfing sensation of water burning his lungs, immediately informed him that Stefan was in his head. So the young vampire had some power after all. Angrily he mentally thrust Stefan away, seeking to eject the young vampire from his mind, but the strangle-hold barely shook and Silas coughed wretchedly and pointlessly against the imaginary tide. Using his vast psychic talents he moved to get control of himself, focusing on the illusory nature of his predicament. He coughed up air and clawed at his throat as his efforts proved fruitless. Deciding a change of tact was in order he reached into Stefan’s mind, and entered with ease, though now unsure how much Stefan was merely accepting as a part in this dual. It mattered little, for Stefan was the one actually drowning and would soon fall unconscious--at which point Silas would gain the upper hand.   He delved deeper into Stefan’s mind, knowing now that there was far more there than he had perceived at first glance, he searched for something of import. Stefan was allowing him to see, not to gloat, but rather as a distraction. A picture formed in Silas’s mind, of one Katherine Pierce. From his forays in Bonnie’s mind he knew Katherine was also a doppelganger. He concentrated even as he trembled from the exertion of his lungs. It’s a night in eighteen sixty four, the night Stefan died, this he gleans from the emotive taint of the image. He watches as Katherine sneaks into Stefan’s room, hands delicate on the door, careful to be quieter than usual, she sends Stefan a sly grin. They’re both aware of the importance of the night ahead of them. She sits down beside him on the bed and he straightens to move closer. “Ready?” Katherine asks, giving him a considering look. “I must do this,” Stefan replies, grim determination shadowing his brow. “Well, you know what’s first,” she says. He nods sombrely. Katherine feeds Stefan her blood. So Stefan was turned by another doppelganger. A doppelganger turned by another doppelganger was definitely a curiosity. A person did not become as powerful as Silas without understanding the power blood held and the magical consequences when said blood was wielded to form a creature such as a doppelganger, let alone one twice born by doppelganger blood. He reached for more only to find blackness as the weight of his own chest eased, he breathed deep, straightening as if the pain had never existed. He waited patiently for Stefan to awake, this time ready to viciously demonstrate how brutally he could probe. When the moment came, he shot out psychic tendrils, winding, drilling, entwining, suffocating Stefan’s mind. He grinned internally with the feeling of Stefan choking weakly, silent and still. Silas moved to depart but had barely taken a step before the full force of a waterfall down his gullet brought him to his knees. He pulled his mind back slightly from Stefan and the young vampire in turn did the same. It was a temporary ceasefire. They floated in their self-constructed bubble, almost unaware of the physical agony besieging them. I’ve spent the past century honing my talents on the minds of Original vampires and powerful witches, while you’ve mainly handled the occasional stray dehydrated tourist; you’re out of practise. Silas felt Stefan’s words, tinged thickly with images of the Originals.  The ones Stefan knows as ‘Finn’ and ‘Sage’ are at ‘The Mystic Grill’. The plan to kill Finn is unfolding. As the two drink their Vervein spiked Tequila, Stefan stands and strides with casual subtleness towards the door. He turns to give them his sassiest expression complete with smile and teasing eyebrow raise just before he exits, challenging them to come get him. He finds a stealthy position behind the door. Stefan’s attack is blocked by Sage and he’s tackled to the ground. It’s all part of the plan. He drops the stake and it falls down the steps. He nudges at their minds (get the stake and kill the vampire with it), leads Finn to run down the stairs after a piece of wood instead of pulling Stefan’s heart out. Stefan pushes harder as Elena misses, keeping Finn in place the moment necessary for Matt to stake him. Silas gazed upon the machinations Stefan allowed him to see. It was clear the young vampire was demonstrating their likeness, that he too often reconstructed his surroundings by mind controlling all those around him, working slowly towards a greater end. Stefan was manipulating him. It was clear that he wanted Silas to save him. Surprisingly Silas felt the willingness to oblige, if only to put an end to this tiresome drowning sensation, besides, Stefan was a curiosity and curiosities were always amusing.    As he took the plunge Silas saw more of the night of Stefan’s death, it was not the truth, but a lie; he saw the story Stefan had created in everyone’s mind, only one element the truth: his doppelganger had bled out under a full moon. bleodswean at 2013-06-05 22:13 (UTC) (Link) Very, very, very nice!!!! swirlsofblue at 2013-06-06 16:53 (UTC) (Link) Thank you :) steledam at 2013-06-06 17:05 (UTC) (Link) Interesting take. I'd swirlsofblue at 2013-06-06 17:13 (UTC) (Link) Thanks, glad you found it interesting :) Previous Entry  Next Entry
global_01_local_1_shard_00001926_processed.jsonl/72634
Kids Online Cyberbullying, online harassment, or simply being inappropriate on the internet: for my students, these are becoming increasingly commonplace. I’m worried. I want to think about what I need to do better, as a teacher and a coach. So here’s a list of the ways I’m failing my students: • I am not modelling appropriate behaviour on social media for them to observe • I am not directly instructing them about data retention policies, legalities, and (lack of) privacy • I am not teaching them how to deal with peer pressure online • I am not training them to be empathetic • I am not supervising, or even keeping an eye out for trouble, when they are outside my classroom • Since they don’t, I assume I have not made my students feel they can come to me if they are having trouble • I am not engaging in, or sustaining, a dialogue with the students’ parents about their engagement in social media My school could do more to red-flag inappropriate behaviour in our Google Apps set-up. Most parents should probably be doing a lot more to monitor what is going on with their students. Yet, clearly, I feel that part of the failure is my own. Here’s what I know about the best teachers: when they fail, they come back the next day with a new, better idea. In that spirit, here’s my plan: 1. Work empathy-building activities into the classroom (for my middle school students), and work empathy-building into our learning activities (for my high school students, where time is a precious commodity). In addition, I will try to think of all-school activities that could help to build empathy between students who normally don’t interact. 2. Start accepting friend requests on Facebook, returning follows on Twitter, and so forth; try to engage in a positive way with my students on social media; and keep an eye out for dark corners (I made this argument last year). 3. For the students I advise, prepare some lessons about responsible online citizenship, and share them with my colleagues if there is interest. 4. From there, once I know more, try to contact parents as appropriate to cheerlead, support, and inform. It’s time to go connect with some of my students. One thought on “Kids Online 1. The Brain in the Jar You do not want your parents monitoring their child’s behavior too much. Children, in order to grow up need to learn to live in their own society. They need to learn to build their own world and how to run it. Helicopter parenting is such encouraging suicide. People can hurt you. Loneliness will hurt you always. What you need to do is create a more social environment. The army had far less cases of bullying than school – nearly zero. That’s because in the military everyone is a part of the group. Schools are individualistic and antisocial. Your child’s value is determined by how good he is at math. Psychological health, social skills – who cares? Just be good at math. Why parents never spoke up against this isn’t a mystery. If your kid only solves math exercises all day alone in his room then it’s less trouble for the parent. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/72648
Obsoleting Passwords dkokelley, discussing the future of security: Until we discover and implement a better system that obsoletes passwords, the best we can really do is have long, complex, and unique passwords for everywhere we go, and have a system to manage them for us. I believe that something like LastPass or KeePass are the way to go for now. Passwords, in their current form, don’t seem like they’ll stand the test of time for digital security. This is a problem that needs solving. I just installed LastPass this week. I’m still waiting for something better. See the full comment or the discussion. How can client-side databases be secure? Seeing Meteor and Firebase all over HN has been exciting - I’m currently building a Node.js application but not using as much real-time updating as I could, largely because of the effort involved all over the application. One of the benefits of developing with Node is that you can use the same code on the front and back-end, which is especially helpful for things like data validation, which some sites are inconsistent about. Meteor and Firebase are the answer to the implied question: if the code is the same in both places, do we really need it in both? In the aftermath of building my own Firebase app in 5 minutes (!), I saw the concerns sprout up. No, I’m not talking licensing, I’m talking security. Timo Zimmerman’s post outlines how the lack of security and maturity in Meteor makes it just a toy: There is currently no authorization or authentification system. It is planed[sic] but not implemented. So you basically expose your whole database to every client without any way to add some security. I had seen the point about the lack of authorization in another comment on HN about Firebase (can’t find it now, oops), both of which got me thinking: how could you do authorization for a database that’s fully exposed on the client side? When the database is completely accessible from the client, and the client can freely modify the code used to access it, isn’t it impossible to have real security? You could limit what they have access to through some sort of ACL, but that would introduce a lot of backend complexity to your app, and involve Firebase/Meteor dictating part of your database schema. And in fact, you would have to have even more granular limits than just “Can Only Modify Record 1”, as certain parts of records have to be protected. So much for “all in the client” or “No servers.” It seems like a great idea, it really does. And maybe I’m missing something obvious here (I hope), but it just seems downright impossible to secure a system like this. Isn’t one of the guiding principles of security “Don’t trust the client”? I guess I’ll wait until they reveal what they’re planning.
global_01_local_1_shard_00001926_processed.jsonl/72659
Closet Fetishist's Stories Copyright @ The Fart Closet Buy Me a Coffee at Your support is greatly appreciated The Cyber Relationship Author: Closet Fetishist Written: 2006 I am sorry if this story reads a little…confusingly. I tried to get both perspectives because I thought it just sounded better that way. It was back in 2004 when my friend had told me he was moving away. “Wait, wait, wait….so you met her on the internet?” “Yea! Sarah is great.” He seemed very excited. “And where are you going again?” “ Georgia.” “ Georgia?!” I asked. “Isn’t that the state by Florida?” “Uh…ya,” he replied. I paused to think. After a small while I talked again. “I don’t know man. Are you sure about this? You know those internet things aren’t always safe. I mean how well do you really know her?” “Well, I have pictures.” I rolled my eyes. “And she does seem nice.” “Yea…but who knows…she might not even be a girl?” “But I have….” “I know, pictures,” I said, interrupting him. “Well man, you seemed to have made up your mind so I will just wish you the best of luck.” “Thanks man, I will miss you.” “I will miss you too. Instant message me sometime will ya?” “Definitely.” We turned and went our separate ways. Then I stopped and turned around. “Hey Jack?” I yelled from the short distance. “Take care of yourself.” He nodded and that was the last I saw of him. Many, many months passed and I had not heard one peep from Jack. I figured he was busy with his new girlfriend and going to school over there, getting into the groove of things. Eventually a whole year had passed and I began to not think about Jack, that is until I saw his username come online on AOL Instant Messenger. Oddly, after 5 minutes of waiting, he didn’t message me so I finally messaged him. “Hey Jack! What’s going on man?” I typed, asking him. “Mike, you gotta help me man!” “Help you? What do you mean?” “Look there is no time, just get over here!” “But Jack, what’s going on?” “LOL, I am just kidding you. Got to take off, bye.” Just as quickly as the conversation had begun it was over. What did Jack mean by “you gotta help me?” Was he in some kind of danger? But he said he was kidding, right? But Jack was never much of a kidder was he? I didn’t recall him really ever telling a joke or anything in the 10 years I had known him. And why did he sign off so fast? Was he busy? That seemed likely; he was in a new state, with a new girlfriend, in a new school. But then, maybe someone signed off for him. No, no, I must just be paranoid. I was about to close the instant message window when something caught my eye. Jack had used “gotta” but then at the end had said “got to.” Perhaps it was just a coincidence. Ya, it must be. Or was it? These thoughts rattled my brain. Maybe I’d call Jack tomorrow, make sure everything was ok. Ya that is what I would do. I remained on the floor where I had landed when Sarah had pushed me off the chair. I had learned quickly that when she did something you did not resist, that is unless she wants you to resist. I heard her typing on the keyboard and then she shut off the computer. “Well, looks like you caused some trouble, didn’t you Jack?” She paused. “I can’t trust you at all, can I?” I had no idea what to say, I didn’t know what she wanted to hear. “Well are you going to speak or just lay there like an idiot?” I again stayed silent though I knew it would not be a good idea. She immediately kicked me in the side of the chest with her thick, leather boots. I doubled over in pain. She then bent down and grabbed me by the neck. She lifted me and brought my face to hers. “This better be the last time I hear from this Mike or you will face worse from me. You are mine Jack! You are mine till I say you aren’t so you better get used to it!” Sarah then threw me to the ground where I landed with a loud thump. She stepped on my back with her heavy boots on her way to her room. The pain was tremendous. Right then, I prayed Mike would actually get the message and come and save me from this torture. “Jack! Get in here now!” Sarah yelled from her room. I got up quick, walked into her room and shut the door behind me. The next day, I picked up the phone but I quickly realized I didn’t have a number. I decided to call the school. “Thank you for calling State University Georgia. This is the operator speaking, how may I direct your call?” “Hi, I am looking for a student, Jack Ryans?” “Hold please.” After about 5 minutes the lady came back on the line. “Uh, sir there is no one here by that name.” I started to become a little concerned. “Are…are you sure?” “I’ll check again.” She came back a few moments later with the same results. “Alright, um…do you have a Sarah on campus?” “Yes. There are 25, sir.” “Oh, sorry. I believe the last name is Peters.” “Please hold, I’ll connect you.” “Thank you.” After a few seconds a female voice had answered. “Yea, hi. This is Mike, I was wondering if Jack was there.” “Uh…no sorry. There is no Jack here.” “Oh, I’m terribly sorry, good bye.” Just before the line hung up I swore I heard someone yell “Mike!” Was it in my head? Did I image it? Maybe I would go to make sure everything was ok with Jack. This whole thing was just a little too weird. Sarah slammed the phone down in a rage and turned her evil eyes and her menacing grin towards me. “You are almost asking for this Jack. What did you think you were doing?” I stared up at her fearfully. I could not speak, she had a gag in my mouth but nothing I could have said would have gotten me away from the punishment I was about to endure. She quickly retrieved her short horse’s whip and came at me with it. I raised my hands up to block her and perhaps plead for forgiveness but she would not listen. As the whip came down hard on my body I yelped and screamed in pain. “Mike, please hurry.” I cried to myself. “Please save me.” I don’t know what made Sarah stop, maybe I fell unconscious from all the pain I had inflicted or maybe she just got tired of it. Either way, I was still on the couch just as I had been left during the whipping. My whole body ached and hurt like I had just been hit by a semi-truck. I tried to sit up but I could not, I was in too much pain. I turned my head to see Sarah walk to her kitchen. She talked to me from there, “So, I guess Mike could very well be joining us soon? That’s good; I could always use more slaves. You can bet I’ll be ready for him if and when he gets here, just got to start my special diet.” She chuckled. “You two are going to be in for a real treat, this type of torture is my specialty. I didn’t want to use it on you but since you like misbehaving so much, I figured you deserved it.” She kept talking but after a while I dosed off. It was about a week later that I finally arrived in Georgia. I had to clear my schedule and book tickets and pack. I hoped this would be a happy reunion but I had feared it wouldn’t. Something about Sarah and the whole phone and instant message thing was amiss and I feared for Jack’s safety. I hoped my assumptions were totally wrong. I rented a car, got directions, and drove the half an hour trip to The State University of Georgia. After getting lost a few times I had arrived on the very prodigious looking campus, surrounded by an equally good looking little town. It was about 6 o’ clock when I had finally found a place to park and had found out where the residence halls where. Sarah was in the residence block P, room 34. I had found the P building and finally reached room 34. I sighed and knocked on the door. I waited and there was no answer. I knocked again, this time a little louder. “Hello?” I yelled. No reply. I finally tried the door knob and surprisingly the door opened. I stepped in the room and immediately saw Jack chained to the wall, looking in the worst condition I had ever seen him. He was quite skinny and appeared very weak. He looked at me but it seemed he could not even mussel up a smile. “Jack, what has happened to you?” I asked as I approached him, examining his chains. Very weakly he answered, “You were right, Mike. Sarah was not what she appeared to be.” “What do you mean?” “Nothing, don’t worry about it. It’s too late any ways. You shouldn’t have come, now she has you too.” “No Jack! We are getting out of here.” “Mike! We can’t, she has the only key to the chains.” “Well then, I’ll go get help.” “It’s too late, Mike! She never leaves for very long. She will be back any second.” “I am freeing you from here, Jack! Mark my words.” I turned around and made a dash for the door, when I got into the hall I was confronted by a rather large but petite figure. “Well, hello there.” She said, and then she whacked me over the head with something heavy. I hit the floor, unconscious. I saw Mike lying there, unconscious as Sarah dragged him in from the hall way and chained him up next to me. I could not help feel guilty. This was all my fault. I should not have brought Mike into this. I cried silently to myself. “You know Jack; he’s much cuter than you. I think I should quite enjoy torturing him.” Her stomach growled loudly. She patted her stomach. “Ooooooo…good thing he got here when he did, it’s about time to begin.” She laughed as she walked to her room, locking the door behind her. I immediately began to whisper to Mike. “Mike, wake up.” He did not respond. I kicked him gently near his ankle. “Wha…what happened?” He said groggily, beginning to sit up. “You were hit in the head.” “Oh? Yea…I think I remember that.” He smiled a bit which quickly turned back to sorrow. Then for hours we talked about my situation here and about the good old days. Who knows how long we talked for but it wasn’t enough time, I could have talked with Mike for days. It was about 9:00 a.m. when he heard stirring from Sarah’s room. A few seconds later she exited her room. “Hey boys, I trust you had a nice night?” I could not get over how beautiful Sarah was, it was no wonder Jack fell for her so quickly. She seemed to be so sweet too, well besides the chains, but then I had only been with her for less than 2 minutes. No matter, I had to figure out how to get me and Jack out of here and soon. I tried to think but nothing came to me. I was thinking the phone but I doubted Sarah would have of both free at one time so that would not be a possibility. I thought until I noticed Sarah had come up and stood right next to me. “Are you ready for hell?” I didn’t say a word. “Answer me you bastard!” She slapped my hard across the face. “Sarah, Mike just got here. Do me instead.” “No way Jack, this one needs to learn his place and fast. You two are going to be here a while, after all. I watched as Sarah undid my chains and picked me up by the neck. She brought me to her face and smiled. Then she dragged me to her room shutting and locking the door behind her. Briefly I scanned the room looking for something that could help us but I found nothing, it was just a standard bedroom with a bed and dressers. Before I could think, Sarah pushed me onto the bed and hopped on as well. She hastily tied ropes around my arms and tied them to the bed posts; she left my feet and legs alone. I kicked and fought her and tried to loosen the ropes but it was all to no avail. She stepped off the bed and went to her drawer. She turned around to produce a whip which she proceeded to hit me with continually. “See, this is what we do here Mike. I tell you to do something and you do it. If you disobey me, you get this…,” she held up the whip, “or worse. Do you understand?” “Yes, but…,” Before I could say more she raised the whip and smacked it down hard on my leg. “You will not question me! Got it?!” I whimpered slightly under the extreme pain but I managed to nod. “Good. Oh and I almost forgot.” She turned back around and produced a roll of duck tape with which she walked over and placed on my mouth. “There now much better. No need for the neighbors to hear you scream.” She smiled a bit and then got back onto the bed. She came and laid on top of me like she was going to kiss me but then she rose back to her knees, turned around and placed her sweat panted bottom on my face. “That’s it; stick your nose deep within my cheeks. Doesn’t it smell good in there? I have been waiting and waiting and now I can finally release all my pressure. Better sniff it all up or there will be worse for you.” Sarah settled on my face and after a few minutes, BRAAAAAAAAPPPPPPPP! A large fart escaped her and ran straight into my sniffing nostrils. The smell was not of this world, a combination of rotten cabbage, beans, and a million other horrible things. “Ugh, that smells awful. I thought I told you to smell all of it!” I felt the whip hit hard on my leg again. I screeched in pain and Sarah farted in response. “Now smell it all!” She yelled, farting once more. Against my will, I sniffed as much gas as I could and it must have been alright because I was not whipped like before. Instead Sarah began to stroke my head and run her fingers through my hair. “There now, that’s a good slave. You like my smell don’t you?” She raised her ass a bit for my response and I nodded, knowing it was the answer she wanted. “Good, have some more.” She hovered over my face for a few seconds more than let loose a mighty blow. PBBBBBBBBBBBBBTTTTTTTTTTT! She then sat back down again and wiggled back into position. “Ahhhhh!! That feels so good!” I moaned in displeasure but kept on sniffing. This went on for hours until finally everything went dark, I was unconscious. I waited hours for Sarah to bring Mike back out. I sat waiting and listening to her taunts and his occasional moans of displeasure. I don’t know what time it was when Sarah dragged Mike out and chained him back up but I assumed it was late because she went straight back to her room and I soon heard her snoring. I looked next to me, I wanted to talk to Mike but I guessed I should not disturb him after all he had been through. I too eventually fell asleep. We both awoke in the morning around the same time. Jack was saying he had enough and he was getting out of her but I told him it just wasn’t possible. He refused to listen. Sarah exited her room later that morning. “Well boys, who’s it going to be today huh?” She asked as she walked to the kitchen. “I am thinking of doing Mike again today, he is so good at sniffing my farts. What do you say Mike?” He didn’t reply and I knew that would anger her. Just as I expected she ran to Mike and began to choke him. “I asked you a question!” I could not stand to see Mike like this, not after I put him in this situation. Enough was enough. I worked my leg around Sarah’s and retracted it, tripping her and making her fall to the floor. She rose back up, slightly dazed but she soon recovered. “Oh? Can’t watch your friend suffer Jack? Maybe it’s time I take care of you….permanently!” Her stomach growled loudly. “Ohhh and I know just the way. I watched her strip her pajama bottoms and panties. She then came at my face, bare assed. She pressed my head into the hard wall and did not stop. The pain was intense but what was to come was worse. Her stomach growled again and then POOOOOOOORRRRRRRBBBBBBBBBBTTTTTTTTTTTT! A fart escaped her like nothing one could describe. The sound was inhuman and the smell was worse. Then she farted again and then once more and I was soon gapping for breath and choking but she held her ass hard against that wall, forcing me to take in her awful stench. I watched in horror as Sarah pressed my best friend's face into the wall, farting her horrid butt bombs on him. She showed no mercy what so ever and I watched as his tense hands fell limp and as she rose a bit his head drooped to the side. I didn’t know what to make of it but I didn’t have time to anyway. “Now, it’s your turn!” She turned her ass to my face and slowly backed up. She had pressed my head to the wall, hard. “Ohh, here it comes!” BRRRRRRRRRRRRRPPPPPPPPPPPPPPPP!!! Just then the door to her room made a sound like cracking and then I heard shouts. The smell of the fart was still on me but I noticed Sarah was moving away. I choked and gagged for the fresh air that was now flooding my nostrils. My eyes were watery but I did see figures in black all around the room. They undid my chains and I rubbed my eyes, clearing them, to see cops all over the room. I also saw Sarah being taken out of the room in handcuffs. Then the cop nearest talked to me but I can’t remember what he said, it didn’t really matter any ways. What mattered was we were getting out of here. I looked to Jack to see he had not moved. The paramedic was feeling for a pulse. I then watched as the paramedic’s facial expression turned to dismay and he shook his head. I could tell by his expression, Jack was dead. I could not help crying. He was my best friend, he didn’t deserve this. Sure he made a mistake but he didn’t need to die for it. The cops helped me to my feet and I walked out of the dorm room. © Closet Fetishist, All Rights Reserved.
global_01_local_1_shard_00001926_processed.jsonl/72666
Perhaps the most acute aspect of the shared Black experience, outside of having the same reaction to the beat drop in Frankie Beverly and Maze’s “Before I Let Go,” is our reaction to the unfolding of white people shit (WPS) right before our eyes. We’re lucky when we get to witness WPS out in the wild and can exchange furtive, knowing glances with the closest other Black person. This unspoken acknowledgment happens when you see a white kid wildin’ out in the grocery store throwing oranges at his mom’s head while she just coos at little Ashton and ducks like it’s a game or when it’s negative degrees outside, but “Bob” is literally chillin’ in shorts, sandals, and a bubble coat.  In most cases, however, we get to indulge in WPS on a wider scale, thanks to the great unifier – the Internet. And as soon as you see the headline you know it’s some WPS going down.  Here are a few  folks vying for WPS Hall of Fame: 10The artist who bought her ‘support peacock’ an airline ticket Peacock at an airport (Photo: The latest example of white people white-people-ing (as of press time, anyway. They move quickly) is Ventiko. This Brooklyn-based artist reportedly owns a peacock and purchased the exotic bird a whole-ass seat on a flight to provide emotional support. United Airlines wasn’t having it and reportedly kicked the live peacock off a plane. Imagine dodging the colorful plumage of an animal you’ve only ever seen in a zoo as you saunter on to your Basic Economy seat, only to find that the while damn flight is held up because a teddy bear or golden retreiver wouldn’t suffice as emotional support. Then imagine that you wouldn’t even need to wonder about the racial orientation of the bird’s owner. That’s what it means to be us looking at them doing some WPS.
global_01_local_1_shard_00001926_processed.jsonl/72670
Somewhere near the hall of Brétigny-sur-Bizet, in front of a raging crowd, the most outstanding dogs face each other to measure their talents and strengths. Among them is Sweetheart, encouraged by the best and most noisy crowd. Will he triumph in this hard competition? See how Sweetheart (Choupette) and the other talented dogs perform in this animation by Chloé Alliez: Oh My Dog! Follow this with The Present and Omelette. via Gizmodo. See more videos about...
global_01_local_1_shard_00001926_processed.jsonl/72671
You are here Home > Thelemic Philosophy > Babalon for Sale: Notes on the Divine Economy Babalon for Sale: Notes on the Divine Economy Babalon for Sale: Notes on the Divine Economy by Sister Georgia “The Star represents Nuit, the starry heavens. ‘I am Infinite Space, and the Infinite Stars thereof.’ She is represented with two vases, one pouring water, a symbol of light, upon herself, the other upon the earth. This is a glyph of the economy of the Universe. It continually pours forth energy and continually re-absorbs it. It is the realisation of perpetual motion, which is never true of any part, but necessarily true of the whole. For, if it were not so, there would be something disappearing into nothing, which is mathematically absurd.” -Aleister Crowley We cannot make ourselves complete, because we do not lack anything. Let us begin with the hysterical question, the question which lurks at the basis of all fo our broken relationality: what does this other want from me? How do I appease her wrath? How can I predict her reaction? How can I avoid the brutal anxiety of undetermined reality? We have built up this great Molochian social economy to protect our fragile individuation from this hysterical threat – but the patriarchal order of the socius is not the way to defeat this. We, fragile entities that we are, need only to recognise the ecstatic, sublime, mystical, religious, sublime and terrifying joy in the utterly unknown territory of the other. We need only to recognise that fantastic paradox – that the only thing I share with this other in front of me is that he, too, does not know what to make of me. Here is the nexus of power, of infinite power, for we are infinitely subjective beings. I do not need to know anything more than that the other, too, is scared; that this face with which I am confronted hides a mind which is powerless, as knowledgeless and I am. Know this, and the great mystic truth of ‘fake it til thee make it’. This alone is supreme power, that thing we call charisma, which is nothing more than confidence – not in any thing, and certainly not in this ‘I’, or ‘me’; confidence that the other is scared, too. Know the fear of the other and act first, always be the first to love. Thus we can destroy fear, and experience the exstasis of an-economical love, which is the lesson of babalon. Such a confidence trick, taboo to our co-dependant way of being, appears madness, even psychosis. But worry not, for such words are of the old order, and strictly economical – they denote that which cannot be commodified, surrounding that which resists with such stigma that it has become a self-perpetuating war-machine. Sanity is our greatest prison. And indeed it is near impossible to escape the reality tunnel (and why should we make this effort? For it is warm here, and dark, and there is the slither of worms for company): yet, with perverse simultaneity, this structure through which we seek to sort and circumscribe the chaotic otherness around us is extremely fragile. Kant likened it to a children’s game of sorting blocks in our brain. I tell thee it is far more like a web, like spider’s silk. Infinitely strong it can stretch, and recombine to fit, and we poor flies have no hope of escape; yet a simple brush of a human hand and the web disintegrates entirely. Hear this: if it is the name-of-the-father which keeps this web intact, it will be the mother-without-a-name which will destroy it. But here, amongst the shredded webs, we find a new truth – there is no use in destruction, without a plan to rebuild: revolution alone will never change, there must be something new to take its place. So simple, so often forgotten. There must be restriction, regularity, a new order. This is the key to magic without psychosis, to psychotic productivity – to the sustenance of the an-economy. This is the secret of the monastery. With the web destroyed, we see the world as it really is, chaotic and terrible; yet, by the same note, unlimited and ecstatic. Kaos, yes – but what is so terrible about that? With the corners of the web still extant, we see this lack-of-order as taboo. We must clear all the cobwebs, every last one, in order to discover this new tumultuous unpredictability, to see in the shadowy figures and the shining lights a new magical landscape of infinite potential. To find an order and restraint of a new kind, one born not of fear and necessity, shoring-up defences, but of love (not desire, which is eternally unfulfilled), and of pragmatism. For we are nothing but the worms, but gathering these scraps of spider-silk, we may fashion ourselves gossamer wings. We will not be wholly mad, but we will not stick with sanity out of fear. There will be no more fear, for all is already here, and death means nothing to those who dwell in dirt. These myths, this broken language which I speak – these are not defences against the chaos – they are the truth, which is contradiction, a bridge, our child-mind telling us of the constellation model of connection. So let us then explore our most treasured house of myth: the divine prostitute, the mystery of the holy whore. Dear whore, she who is the beginning, for it is she who draws our attention to the socio-libidinal economy; for it is she who turns the unspoken social contract of sex into an explicit, economic one. Dear red-haired beast of a woman, the whore’s successor: it is she who takes this whore-logic and transforms it, refusing base gold to exchange sex for power, and for affect. Dear Holy Whore, sublimated beast, who refuses this exchange entirely; she is the first to love, and seeks nothing in return: she needs nothing, for she is not a partial subject; she lacks nothing, and thus participates not in the false economy of desire. Such fancy is beneath her, for she is beyond devotion. Dear Initiatrix, she who sees beyond this base horizon, refutes this exchange entirely, laughs in the face of reciprocity; she does not seek reparation in this impoverished human timeframe. She is part of a larger pattern, is repaying a debt left when she was still young; her victim, unable to repay Her now, is destitute: but he will make reparation with another, in another time. This is the secret of the Arthurian formula, the secret of right relationship, of flourishing and fertility. Such simple truth, so alien to the give-and-take cycle we have been taught we are necessarily a part. This is our panopticon, more subtle than any tower; this fear that our love for the other will not be returned. If only we realised this truth, that are intuitions of this unknowable other are right – he will never repay me, my love will never be returned directly, not by that lover. The law of return is cosmic, not interpersonal. We are all necessarily vampires. Seek not equality, safety, or promise. Fidelity is the word of sin. Know that these cycles are beyond the simple ‘you’ or ‘I’; learn the truth of relationality in myth and fable. Know power, and find peace. I say again: that dear initiatrix asks for nothing, for she is repaying a previous debt, a debt to another other. Thus she does not only destroy, for she reconstructs the libidinal economy into something transcendent, mythic. Know this: by refusing to engage with these divine economics you are not doing something counter to the force of the norm, but are complicit in its propagation. Those who would live a religious life, of any denomination, must be conscious of the circles and economies of which they are a part. They choose, to be complicit, selfish and to make the best of a bad situation – or to refute, tear down and to rebuild. Contemplate this: in a time that has long since past, in a land of fairy tale, the king entrusted the secession of this kingdom to his daughter’s choice of bridegroom. And how wise! For he who could win or seduce the wisest and fairest maiden could surely run a kingdom of men. And he who she who is wisest and best deemed suitable to be her lover, and bear her children – what higher recommendation than that? What credit to her, to have this choice and make it rightly. Thus it is not that there is no truth, but that the nature of truth is contradiction. Men, they shored it up – they said, thou who art holy, thou shalt not allow another phallus passage to thy sacred place; for i will not raise another man’s child. I, however, being naught but sinful man, will do as i wish. When women sought equality, they cried No! Thou shalt be faithful too (full of faith, in what? In the libidinal economy, without end). Such fools! they should have rejected the very bonds of ownership and this perversification of faith. But they were trapped in this moloch economy. This was never what we were made to be. Enjoying the articles? Support the Thelemic Union and help us keep our site running, ad-free, and hacker-free by pledging $1+ on Patreon: One thought on “Babalon for Sale: Notes on the Divine Economy Leave a Reply %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/72704
Tag Archives: More Autobots Robots in Disguise: Why are the Autobots Always Outnumbered? You want to know what the most popular post on this blog has been for the last three years, readers? It is the post titled “Why Are the Autobots Always Outnumbered?” I have no idea why this post is so frequently read. In some ways, it is rather annoying. I would really like it if something else would get looked at rather than that post. But apparently no one is as interested in anything else as they are in “Why Are the Autobots Always Outnumbered?” Anyway, this post is something like a sequel to “Why Are the Autobots Always Outnumbered?” It is also a look at the latest Transformers series to hit the airwaves: Transformers: Robots in Disguise. First and foremost, I have to say that the Autobots have not always been outnumbered. In the 1980s TV series and a couple of sequel TV series, there have either been an equal number of Autobots and Decepticons, or more ‘Bots than ‘Cons. My problem with the later series is that there have been fewer and fewer Autobots. The 1980s series had a long roster, and few ‘Bots from that series appear in newer shows today. This goes for the original female Autobots as much as for the male ones. Transformers Prime had one female Autobot, the perennially popular and recognizable Arcee. Arcee is a great character (Prime had an especially intriguing take on her, not least because she barely had any PINK in her armor!), but the original characters are either shunted aside to make room for new characters or they are left out completely. As an example, both Transformers Prime and Transformers: Robots in Disguise have character rosters that include old stand-bys Optimus Prime and Bumblebee. These are two great characters, and I certainly cannot imagine a Transformers series that does not have Optimus Prime as the leader of the Autobots. I much prefer him to all the other potential supreme leaders of the group, quite frankly. But other ‘Bots from the original series are either never brought in or are killed off, as in the case of Cliffjumper and Seaspray in Prime. If the writers do not want to bring them in, they certainly do not have to. But why bring them in only to kill them off? Especially when most of their target audience (children aged seven and up) either barely got to know them or have no idea who the particular characters were? I simply think it would be a good idea to include as many original characters in the new Transformers series as possible. Luckily, Transformers: Robots in Disguise, is doing that fairly well. The current Autobot roster consists of such originals as Bumblebee, Sideswipe, Grimlock, Optimus Prime, and Jazz. Slipstream and Jetstorm, whose names have been applied to characters in previous series, appear in the show as Mini-Cons. The newcomers in the series are Autobot bounty hunter/samurai Drift, Decepticon hunter Windblade, Mini-con Fixit, and Elite Guard cadet Strongarm. (Previously, characters named Strongarm were male. I am sorry, but would it not have been better to bring in an original female Autobot instead of retrofitting a male Autobot’s name for a female character? Anyone…?) The only newcomer in Prime was Bulkhead, who in that series was a former Wrecker, while the ‘stand-bys’ included new versions of Wheeljack, Ratchet, Arcee, Ultra Magnus, and Smokescreen. And, as I said in “Why Are the Autobots Always Outnumbered?,” it is rather irritating that the Decepticons end up outnumbering the Autobots in the newer stories because the Autobots are too stupid, wishy-washy, or otherwise ignorant of the coming Great War. Robots in Disguise seems to recognize that fact, being helped along by the detail that the series takes place after the close of the war between the Autobots and Decepticons. Now, the Autobots rule the rejuvenated Cybertron and the Decepticons have been reduced to the criminal class. Their alternate modes are vehicle and animal, much like those in the Japanese show also titled Robots in Disguise. And in this new Robots in Disguise series, Bumblebee’s team roster is up to the task of re-incarcerating the Decepticon(s) they face each episode, escaped criminal(s) from the wrecked prison ship, the Alchemor. Though there are technically about two hundred or more Decepticons loose on Earth after the crash of the Alchemor, this discrepancy in Autobot/Decepticon numbers is compensated for by the fact that ‘Cons are notoriously bad team players. Only a strong, terrifying leader like Megatron or, in this series, Steeljaw, is capable of keeping a unit of Decepticons together for any length of time. And a couple of the ‘Cons in this series are also certifiable nutjobs, so they are unwilling to be part of a gang for very long. This makes them much easier for the Autobots to handle. The only irritating thing about the shift in tactics for the Autobots in Robots in Disguise is how by-the-book Cybertronian society has become post-war. This is demonstrated best by Strongarm, an Elite Guard cadet and Bumblebee’s protégé. She believes that following the rule book will help her advance in her career, not realizing that such rigidity stifles creativity – her own as much as anyone else’s. (Though it is nice that it is a female Autobot who is so by-the-book and not a male Autobot.) The opposite is brought out in Sideswipe, who in this series is an Autobot ‘punk’ who has been nabbed several times for minor infractions of the law. As he once put it, one apparently “can’t turn left on Cybertron without breaking some law!” Bumblebee is in the middle. He follows the rules every hero follows and is flexible enough that he is willing to bend or break the rules when he has to. In this way he is less rigid than Strongarm; however, he also recognizes the importance of laws and rules, something the high-spirited Sideswipe is still learning. Unfortunately, this regulation-bound version of Cybertron is a trap that I did not realize the writers might fall into if they followed my advice in “Why Are the Autobots Always Outnumbered?” I should have seen it coming, but I did not. The result is that the new Cybertron has too many rules and regulations on the books. Now that the Autobots are in charge, the writers have made Cybertron something of a “regulation nation” in Robots in Disguise. Instead of keeping order, most Autobots seem focused on being orderly. That is not the solution to the problem I brought up in my last post. Too much regulation breeds characters like Sideswipe who, if you tell him “it’s the law,” but do not explain why, go out and cause trouble because he feels he is being squashed to death by a bunch of regulations. It also breeds characters like Strongarm who live, breathe, eat, and dream about the rule book. Neither attitude is proper for life, something Bee has been training the “two teenagers” to realize. You cannot live without law and order, but you also cannot kneel down and worship the rule book. One attitude leads to anarchy while the other leads to a police state, wherein only the police are happy. What is necessary is a balance between these two viewpoints. And this, from what I remember of my research, is the problem that I was trying to address in the original “Why Are the Autobots Always Outnumbered?” post. If the writers make most of the Autobots by-the-book characters like Strongarm, then of course they are going to be devastated in a war! They have no flexibility or capacity to think beyond the instructions in the book, so how can they react to life-threatening situations? Meanwhile the Decepticons, who want to take over Cybertron, are not going to cut such ‘Bots any slack. Their pride demands that they be in charge of everything, and if someone is going to stand there and quote the rule book to them, they will not be quoting it for long. The ‘Cons will see to that. This is why Ultra Magnus has always been an inferior leader when compared to Optimus Prime. He has too much rigidity in his outlook on life, too much dogmatic love of the rule book, to think on his feet and face the enemy when they strike at him. In contrast, Optimus knows the difference between right and wrong, maintains that outlook on the battlefield, and is prepared for the Decepticons to play dirty. Because he knows that they will. Experience and an understanding of his enemy, namely Megatron, assure him of this. And this is the attitude I would rather the writers took toward the Autobots and Decepticons the next time they tell a story about the Autobot/Decepticon Great War. No more rigidity; just an understanding of good versus evil. That does not eliminate characters like Strongarm or Ultra Magnus, but it does give the Autobots a much better chance of survival as a race! Well, readers, this is the successor to “Why Are the Autobots Always Outnumbered?” If this post tops the charts for the next three years…!! Do you think you could look over some of the other posts? Please?! Let’s roll out! The Mithril Guardian Transformers Prime More Autobots: Transformers Prime (Series) Transformers Prime Some time ago there was a Transformers series on the air called Transformers Prime. The series concluded in 2013 and a new series is scheduled to take its place this year. If you have read one of my past Transformers’ posts (“Why Are the Autobots Always Outnumbered?”) then you will know that I kept tabs on this series for the entirety of its run. One of the things that I found interesting in this Transformers series, as in previous Transformers stories, was the friendships that the Autobots established with the three young humans who discovered them in the first episode. These three youths – Jack Darby (16), Miko Nakadai (15 – ish) and Rafael Esquivel (12 – and a quarter!) formed friendships with the Autobots Arcee, Bulkhead, and Bumblebee respectively. Rafael, or Raf, was the only human who could understand Bumblebee’s beeps and buzzes (in this series, our young Autobot warrior’s voice box had – again – been destroyed by Megatron). As the youngest of the three children, Raf naturally enjoyed the company of the youngest Autobot on Team Prime. Meanwhile Bulkhead, a former construction ‘Bot who joined the Wreckers during the war, was given charge of the hyperactive, ever-adventurous (even at her own expense) Miko, a Japanese exchange student living in the U.S.   Bulkhead’s friendship with Miko bordered on the comic since, while all humans are delicate by Autobot standards, Bulkhead had to be even more careful than most when handling a human because of his huge size and weight. This caution usually made their friendship appear ironic; the great big Wrecker tiptoeing around his human charge, whose biggest delight was watching things get smashed, crunched, and all-around destroyed by the tremendous Autobot. But the irony was mostly an illusion. He may have enjoyed building things once upon a time, but Bulkhead also enjoyed breaking things – as long as they were not Miko or things Ratchet needed in his work. Miko also found time to acquaint Bulkhead with heavy metal music, and the two enjoyed listening to it almost regularly. The last human to be paired off with an Autobot was also, initially, the most reluctant, a sentiment his Autobot guardian at first shared completely. Arcee and Jack did not get along well for several episodes. In part, this was due to the fact that in the first episode of the series, Arcee’s close friend Cliffjumper was offed by Starscream. Seething with pain and fury, the last thing Arcee wanted at the time was to be assigned to human-watching duty. Jack, meanwhile, had a tenth-rate job, a single mom who worried about him non-stop and a ten-speed bike when he would have preferred a motorcycle. The last thing in the universe that he wanted was to be drawn into an intergalactic battle between two alien, robotic races. But, thanks to taking the time to check out Arcee’s alternate motorcycle mode, that is exactly what he got. This was the friendship that really piqued my interest in the series. Watching Arcee and Jack becoming friends through their particular interior injuries and side-by-side battles with the Decepticons led me to the conclusion that the Transformers writers were finally moving in to more appealing character waters. This idea was strengthened when Jack was later given the responsibility of restoring Optimus Prime’s memories; it seems that humans can possess enough “spark” to qualify as Primes in certain situations. This was something I was hoping that Transformers Prime would explore in-depth throughout its second and third seasons…. But instead the series focused more and more on the Autobots and their problems alone. While I sympathize with those who enjoy the Autobots as characters themselves and who find the humans in the series annoying, and though I understand that the writers had a fixed number of episodes in which to tell their story, the trimming down of the kids’ characters and relationships with the Autobots was very irksome for me. I had initially been fascinated by the series precisely because of the children’s friendships with their Autobot allies. Watching those friendships slowly becoming trivialized until they were cut out entirely was no fun. Not to mention the fact that it would have been a lot more fun if more Autobots had joined the team on Earth. But the only new additions to the team’s roster were Wheeljack, Smokescreen, and Ultra Magnus (who came across as a real stiff rule-reader). Wheeljack came in with an interesting revamp to his back story; in Prime, he was a battle-tried Wrecker who enjoyed watching stuff blow up almost as much as Miko did. He never quite received the character time I would have liked to see him get, but what we viewers did see of him was pretty good. The same cannot be said for Smokescreen – at least, not by me. Smokescreen would have been more tolerable if he had only been an eager Elite Guard cadet, but he had the added problem of being extremely self-confident. This lead to him landing in trouble on more than one occasion; in one event, he dragged Jack along for the ride, though Jack willingly went along with him. I was not pleased with that, either, since it ruined Jack’s character as portrayed from the beginning of the series. Jack was the most level-headed and Prime-like youth the Autobots had on their side. Watching him run off to do something terribly stupid at Smokescreen’s behest was not fun. Also, Smokescreen’s store of uber self-confidence lost its charm very quickly. All the same, Transformers Prime remains a pretty solid series. It had its faults (as mentioned above), but every series will falter in certain respects and rise in others. Prime by and large treated its audience and characters with respect, and if parts of it got trimmed down as time went on, that is probably most attributable to the time frame the writers’ (or their bosses) set for themselves. They had a big story they wanted to tell and not as many episodes in which to tell it as well as they could have. That they accomplished what they have with the series is a fine achievement in itself. Let us hope the 2015 Transformers series does as well in its own way, too. The Mithril Guardian Why are the Autobots Always Outnumbered? Hello, Transformers Writers! Today’s title gets the ball rolling. Lately ‘reboots’ of the Transformers’ genre have the Autobots as the minority in the war for Cybertron – and later, on Earth. To my mind, there are three answers. First, you think this is the price the Autobots have to pay for being principled combatants. Since they are less ruthless in battle they are therefore more likely to be killed by the murderous (in some cases bordering on psychotic) Decepticons. Autobots don’t kill needlessly. Decepticons slaughter Autobots in droves, but you write the story so that the Autobots will not respond in kind. This leads to fewer and fewer Autobots while somehow the number of Decepticons either remains stable or continues to grow. Second, you perceive the Autobots’ principles in the same way as the Decepticons – as weaknesses. Therefore, you have Autobot casualties in direct proportion to their ethics. After all, if an Autobot will not stab a Decepticon in the back then what’s to stop the ‘Con from doing that to him when he (the Autobot) turns around? (A good knock on the head works pretty well from what I’ve seen.) Third, you consider the Decepticons to be stronger. Therefore you write that they get control of more resources than the Autobots, build bigger and more powerful weapons, and subsequently destroy more Autobots. The Autobots, who largely want peace on Cybertron, would consequently pursue strategic positions and weapons of war in a more ‘principled’ manner than the Decepticons. These ideas, fellow writers, are false. War is a battle for survival. If either side wishes to survive, they have to fight for it and fight for it aggressively. This makes the decimation of Autobot forces seem a bit out of proportion, doesn’t it? Being a principled people does not mean that the Autobots would not inflict massive casualties of their own on Decepticon forces. While many Autobots would indeed be more inclined toward peace, that does not mean that they would be willing to forfeit their lives in some delusion that the Decepticons would spare them for that desire. If anything, it would prompt the ‘Cons to finish them on the spot. War inflicts heavy casualties, but not necessarily to one side. If the two forces are equally matched, and I see no reason why the Autobots would lack either the weaponry to battle the Decepticons or the will power to do so, then the Autobots would not become nearly extinct in the fight for Cybertron as you have portrayed. Their numbers would nearly match those of the Decepticons. Unfortunately for us Autobot fans, the same would go for the Decepticons. They would not suffer near total annihilation either. Both sides should be able to meet as equals in the number of combatants and the potency of their weapons. If the Autobots want peace, then it stands to reason that they will fight for it. Anyone who wants something enough is usually willing to work hard to get it. The Autobots are, and should be, no exception. If there are an equal number of Autobot and Decepticon warriors in a story, that means there would be a greater number of sales for merchandise resulting from the shows. One thing that can be guaranteed in any story is the viewers’ desire to be a part of it. Many children have armies of toys of their favorite ‘Bots and ‘Cons, which they send into battle whenever they get the chance. If there are as many Autobots in a story as there are Decepticons, then those armies of toys can only get larger. So, to quote a well-known Transformer line, fellow writers, “Autobots, roll out!” Mithril (An Exasperated Fan)
global_01_local_1_shard_00001926_processed.jsonl/72705
Jump to content Handlebars help please Recommended Posts Have you tried to rotate it a little bit towards front? I have a Wirtz W3D (231-3D-JB), don't know if it's straighter than yours because it has 62mm of pullback, but it feels very confortable to me: with my elbows up and outside, my wrists are in a natural angle. I keep it in the +1 position (towards front) Share this post Link to post Share on other sites Create an account or sign in to comment You need to be a member in order to leave a comment Reply with:
global_01_local_1_shard_00001926_processed.jsonl/72719
Template linking and transclusion check (including namespace) Results for Veidne:EMspektrs (edit) Mismatch between transclusions and links Transclusion but no linkLink but no transclusion Total: 1 Gaisma (edit) Total: 0 Complete report... Generated: Sat, 15 Dec 2018 14:41:57 UTC. Duration: 0 seconds.
global_01_local_1_shard_00001926_processed.jsonl/72723
Third derivation of least squares From the course by Johns Hopkins University Advanced Linear Models for Data Science 1: Least Squares 85 ratings From the lesson General least squares We now move on to general least squares where an arbitrary full rank design matrix is fit to a vector outcome. Meet the Instructors • Brian Caffo, PhD Brian Caffo, PhD Professor, Biostatistics Bloomberg School of Public Health Explore our Catalog Join for free and get personalized recommendations, updates and offers.
global_01_local_1_shard_00001926_processed.jsonl/72742
Up to 70% Off!   Up to 70% Off! See The Sale   Your Current Savings Bonus Discount {{memorialDay.bonusDiscount}}% Watch the E-Minor Pentatonic online guitar lesson by Andy Aledort from Progressive Blues Power Now let's graduate to beginning each section with both the E minor pentatonic scale and the E blues scale in the given position, as shown here. Many guitar players think of this as an in-between position but in fact it is indispensible, both for great lick ideas and as a way to connect lower and higher scale positions.
global_01_local_1_shard_00001926_processed.jsonl/72749
Performance Management Services in Pune 30/12/2016 Other Services Price: Check with seller You want to be successful - you want your organization to be successful – everyone does. More Details Total Views:5 Reference Id:#964966 Website URL:Click To Visit Current Rating: /5 0 Vote
global_01_local_1_shard_00001926_processed.jsonl/72765
Year of Publication Degree Name Doctor of Philosophy (PhD) Document Type Doctoral Dissertation Graduate School Public Policy and Administration First Advisor Dr. Edward Jennings Second Advisor Dr. Nicolai Petrovsky Organizations play key roles in modern societies. The importance of organizations for a society requires an understanding of organizations. In order to fully understand public organizations, it is necessary to recognize how organizational settings affect subjects of organizations and organizing. Although public and private organizations interrelate with each other, the two types are not identical. In this dissertation, I attempt to describe public organizations in their own setting by discussing three important topics in public organization theory: (1) innovation adoption in the public sector; (2) representative bureaucracy; and (3) decline and death of public organizations. In Chapter II, I scrutinize early adoption of innovations at the organizational level and explore which public organizations become early adopters in the diffusion process. The adoption of an innovation is directly related to the motivation to innovate. That is, organizations performing poorly will have a motivation to seek new solutions. I estimate the strength of the motivation by observing prior performance. The main finding of the second chapter is that performance-based motivation has a twofold impact on early innovation adoption: negative for organizations with low performance, but positive for those with very high performance. This study estimates top 3.8% as the turning point defining which organizations attain outstanding performance and show the positive relationship between performance and innovation adoption. In Chapter III, develop a theoretical framework for predicting and explaining active representation in bureaucracy and test two hypotheses from the framework to test its validity. First, active representation requires the loss of organizational rewards. Second, a minority group mobilizes external support to minimize the cost of active representation. These findings support that active representation is a political activity in which bargaining between formal and informal roles occurs. In addition, I add evidence to the literature demonstrating that the two prerequisites – policy discretion and a critical mass – must be satisfied for active representation to occur. In Chapter IV, I argue that organizational change is a result of a relationship between an organization and the environment. And, I suggest and advance the theory of organizational ecology for examining environment effect on organizational decline and death. The theory has been extensively studies in the business sector, so I advance the theory to be applicable to the public sector. First, I add political variables, such as change in the executive branch and the legislature, unified government, and hypothesize that (1) an organization established by a party other than the one in the executive branch in any given year will be more likely to be terminated or decline; that (2) an organization established by a party other than the one in the legislature in any given year will be more likely to be terminated or decline; and that (3) if an unfriendly party controls both the executive branch and the legislature, organizations established by other parties are more likely to be terminated or decline. Second, the effect of the economic environment on the life cycle of public organizations is not as straightforward and simple as their effect on business firms.
global_01_local_1_shard_00001926_processed.jsonl/72777
Purchase Digital Products Purchase Print Products Deciding how to design practices This is an excerpt from Fundamentals of Motor Behavior by Jeffrey Fairbrother. The decision to use any given practice schedule should be based on the skill level of the learner, the demands of the task, and the eventual performance setting. Random practice can present an overwhelming challenge if a learner is relatively unskilled. For example, a novice tennis player might not be able to get into position quickly enough to practice forehands, backhands, and volleys in a random fashion. Instead, this player might initially benefit from blocked practice as she learns the complex patterns of coordination required for each stroke. • Starting out with a blocked schedule seems to be particularly helpful for younger learners. Children are often not developmentally advanced enough to deal successfully with task demands. A tennis court, for example, offers relatively more ground to cover for an 8-year old than for an adult. • As the learner gains proficiency, the instructor should begin to use random practice schedules if the task and performance setting will eventually require the performer to recall multiple tasks from memory. • Varied practice should be used when the task and performance setting will require the learner to scale to the speed, force, or amplitude of his movement patterns. For example, an artist needs to learn how to select the correct amount of force to apply when painting. To transfer more paint to a canvas, a relatively large amount of force will be needed; to create very fine details, a relatively small amount of force will be needed. • Constant practice can be used for those tasks that are performed the same way every time (e.g., a free throw shot), but it is important to recognize that such stable conditions are the exception rather than the rule in most real-world performance settings. • Distributed practice schedules should be the first choice, but skilled performers might complete some practice under massed conditions if the eventual performance setting will require a similar effort. A skilled runner, for example, should have some experience in practicing correct stride technique while fatigued. Some form of massed practice may also be needed to train assembly line workers who have a limited amount of time between tasks. A good rule of thumb to use when designing practice for any motor skill is to devote a portion of time to practicing in ways that resemble what occurs in the real-world performance setting. In sport, this can be accomplished by scrimmaging. For other movement activities, such as learning to button a shirt after losing the use of one hand, the instructor should identify the demands that the learner will face in an actual performance setting and try to duplicate them as closely as possible. For example, the person should wear the shirt so that the button and the hole are oriented in a realistic way. This idea is similar to the dress rehearsals that actors complete before opening a play. Dress rehearsals or scrimmages can provide a great opportunity to test a learner's skills. But because players in competitive simulations (e.g., scrimmages) often focus on outcomes (e.g., winning), overusing these types of drills during practice can cause learners to rely mostly on their strengths while neglecting their weaker skills. This situation can become even more pronounced in team sports, in that a focus on winning a scrimmage might mean that only the best players get any meaningful practice at all. With a little bit of planning, the instructor can use rehearsals to systematically test the skills of the learner to identify aspects of the skill that may need more practice. Once these weaknesses have been identified, the instructor might then decide to set up targeted practice drills using some of the practice schedules discussed earlier. For example, a piano teacher might decide that a student needs to spend some time in constant practice to work on a commonly used transition from one hand position to another. After this targeted practice, the instructor would once again test the student with a rehearsal by having her play music in which the transition occurs. This is an excerpt from Fundamentals of Motor Behavior.
global_01_local_1_shard_00001926_processed.jsonl/72790
So, it looks like VAIPR’s first iteration is complete! At this point, the project succeeds (with the help of CMUSphinx) in listening and parsing speech continuously, and responding (as well as possibly displaying) responses to the queries on a screen — as well as speaking a verbal response. The project actually ended up being relatively simple (with the use of cmusphinx), so I didn’t have to worry about any signal processing, but there were some complications when designing the backend and thinking how I wanted the multi-threaded program to behave and how others should interface with it. Though there are some large changes in the works (I’d ultimately like for it to just be a distributed web server set up, ideally) — It’s purely functional part (the part that does the listening and processes what they mean) is functional, and that’s something I’m proud of. There are a lot of changes to be made, but for now, it seems like the project will be on hiatus for a while. After doing extensive work with Flask, and witnessing how immensely simple it is to deploy a 100% portable webserver with any application, I’m going to move in that direction and hook the back-end up to a web server. I think this will make things easier in terms of displaying output and connecting with many potential agents (listening devices/display devices) At some point, I’d also love to open source this project (so that development can speed up and others can work on cool functionality like facebook integration, etc) — but until I can work up a super easy plugin structure (and clean up my code), it will be closed source.
global_01_local_1_shard_00001926_processed.jsonl/72802
Episode 56 of You Suck At Cooking‘s hilarious POV-cooking. This time: a boring salad. Just so it is not really boring to watch him prepare it… Here is the recipe: Chop up 2 pounds of potatoes (or one pound, then halve the dressing) Toss with olive oil salt and pepper pepper pepper Bake at 400 30-45 minutes, wrastle’ once or twice 1/2 cup walnut oil 2-3 tablespoons balsamic vinegar 2 tablespoons of dijon (while I put olive oil in it in the video, next time I’ll go full walnut) Mince a shallot and put half of that in the dressing to soak (one full small or half large) Toast the rest of the shallot and walnuts on a pan until they’re brown Chop a couple dill pickle up finely Mix everything together with some salt and pepper pepper pepper For extra creaminess add avocado…if you’re going to have leftovers, don’t add the avocado to all of it, just before serving. via: reddit
global_01_local_1_shard_00001926_processed.jsonl/72821
Skip to main content Implications for practice The attached document on Implications for Practice of Cross-cutting Disadvantage, produced by Jenny Bimrose in 2005, contains materials relating to multiculturalism at the individual and organisational levels, together with an exploration of the concept of intercultural understanding. The document contains the following sections: Increasing multicultural competence at the individual level: Practical strategies and techniques to enhance diversity awareness. This includes support materials that can be used by practitioners, managers, researchers, trainers and others - who wish to develop their multicultural competencies in a proactive way. Multicultural organisational development: A model for moving organisations towards multiculturalism, it analyses the functional focus, the competence needed by the organisation and the barriers to multiculturalism. Inter-cultural understanding: Understanding a culture, even one’s own, is not to be taken for granted. In this section the differences between 'surface culture' (spoken and written language, symbolic aspects such as religion, art and law) and 'deep culture' (a shared sub-consciousness) are explored through the ideas of Johan Galtung. Research findings on vocational guidance for the disadvantaged: This section contains a series of research papers on vocational guidance for the disadvantaged.
global_01_local_1_shard_00001926_processed.jsonl/72847
Emergency Login Service From Tardis Jump to: navigation, search This page is out of date and needs rewriting. The content is likely to be incomplete or incorrect. When the router fails direct access to the router is possible. This runs on port 22 on router.tardis.ed.ac.uk. This is no longer available. Additionally, a secondary SSH gateway (Torchwood) is running on ssh1.tardis.ed.ac.uk Torchwood has been temporarily shut down to reduce heat output in the new Tardis room - RP 05/18 Access to machine consoles are available via Racnoss and the physical console/keyboard mounted in the rack. Racnoss does not appear to exist anymore
global_01_local_1_shard_00001926_processed.jsonl/72848
User Tools Site Tools Getting X2Go X2Go consists of several software components. The minimal requirement is X2Go Server (on the terminal server) and X2Go Client / PyHoca-GUI (on the client machine). The minimal X2Go setup installs out of the box. But note that X2Go can be highly customized by a series of X2Go add-on components. The Client-Side of X2Go At the time of writing there are two client applications available for X2Go: X2Go Client (the native client), and Pyhoca-GUI (a Python based system tray applet for X2Go). X2Go Client X2Go Package Repositories for GNU/Linux When on GNU/Linux, you can obtain all X2Go components from one of the package archives listed below. For those who want to help testing bleeding edge code of X2Go, please read about our Nightly Builds. The Server-Side of X2Go X2Go Sources X2Go Live Demos download/start.txt · Last modified: 2018/04/30 18:19 by ionic
global_01_local_1_shard_00001926_processed.jsonl/72851
From Wikipedia, the free encyclopedia Jump to navigation Jump to search Burial site of Tutankhamun The wall decorations in KV62's burial chamber are modest in comparison with other royal tombs found in the Valley of the Kings. KV62 is located in Egypt Coordinates 25°44′24.8″N 32°36′04.8″E / 25.740222°N 32.601333°E / 25.740222; 32.601333Coordinates: 25°44′24.8″N 32°36′04.8″E / 25.740222°N 32.601333°E / 25.740222; 32.601333 Location East Valley of the Kings Discovered 4 November 1922 Excavated by Howard Carter ← Previous Next → KV62 is the standard Egyptological designation for the tomb of the young pharaoh Tutankhamun in the Valley of the Kings, now renowned for the wealth of valuable antiquities it contained.[1] The tomb was discovered in 1922 by Howard Carter, underneath the remains of workmen's huts built during the Ramesside Period; this explains why it was largely spared from desecration and from the tomb clearances at the end of the 20th Dynasty, although the tomb was robbed and resealed twice in the period after its completion. The tomb was densely packed with items in great disarray, partly due to its small size, the two robberies, and the apparently hurried nature of its completion. Due to the state of the tomb, and to Carter's meticulous recording technique, the tomb took eight years to empty, the contents all being transported to the Egyptian Museum in Cairo. Tutankhamun's tomb had been entered at least twice, not long after he was buried and well before Carter's discovery. The outermost doors of the shrines enclosing the king's nested coffins were unsealed, though the inner two shrines (three and four) remained intact and sealed. Discovery of the tomb[edit] The unbroken seal of the third of Tutankhamun’s innermost shrines from four The pharaoh's solid gold funerary mask was interred with him in KV62. In 1907, just before his discovery of the tomb of Horemheb, Theodore M. Davis's team uncovered a small site containing funerary artifacts with Tutankhamun's name and some embalming parts. Erroneously assuming that this site, numbered finally as KV54, was Tutankhamun's complete tomb, Davis concluded the dig. The details of both findings are documented in Davis's 1912 publication, The Tombs of Harmhabi and Touatânkhamanou; the book closes with the comment, "I fear that the Valley of the Kings is now exhausted."[2] But Davis was to be proven spectacularly wrong. The British Egyptologist Howard Carter (employed by Lord Carnarvon) hired a crew to help him excavate at the site of KV62. Carter went back to a line of huts that he had abandoned a few seasons earlier. After the crew cleared the huts and rock debris beneath, their young water boy accidentally stumbled on a stone that turned out to be the top of a flight of steps cut into the bedrock.[3] Carter had the steps partially dug out until the top of a mud-plastered doorway was found. The doorway was stamped with indistinct cartouches (oval seals with hieroglyphic writing). Carter ordered the staircase to be refilled, and sent a telegram to Carnarvon, who arrived two-and-a-half weeks later on 23 November along with his 21-year-old daughter, Lady Evelyn Herbert. The excavators cleared the stairway completely, which allowed clearer seals lower down on the door to be read, seals bearing the name of Tutankhamun. However, further examination showed that the door blocking had been breached and resealed on at least two occasions. Clearing the blocking led to a downward corridor that was completely blocked with packed limestone chippings, through which a robbers' tunnel had been excavated and anciently refilled. At the end of the tunnel was a second sealed door that had been breached and re-sealed in antiquity. Carter then made a hole in the door and used a candle to check for foul gases, before looking inside. After a pause, Carnarvon asked Carter, "Can you see anything?" Carter famously replied, "Yes, wonderful things!" ‘At first I could see nothing,’ he would later write, ‘the hot air escaping from the chamber causing the candle flame to flicker, but presently, as my eyes grew accustomed to the light, details of the room within emerged slowly from the mist, strange animals, statues, and gold - everywhere the glint of gold’.[4] Howard Carter and associates opening the shrine doors in the burial chamber (1924 reenactment of the 1923 event) The first step to the stairs was found on November 4, 1922.[5] The following day saw the exposure of a complete staircase. The end of November saw access to the antechamber and the discovery of the annex, and then the burial chamber and treasury. On November 29, the tomb was opened, and the first announcement and press conference followed the next day. The first item was removed from the tomb on December 27.[6] On February 16, 1923, the burial chamber was opened,[7] and on April 5, Lord Carnarvon died. On February 12, 1924, the granite lid of the sarcophagus was raised.[8] In April, Carter argued with the Antiquities Service and left the excavation for the United States. In January 1925, Carter resumed activities in the tomb, and on October 13, he removed the cover of the first sarcophagus; on October 23, he removed the cover of the second sarcophagus; on October 28, the team removed the cover of the final sarcophagus and exposed the mummy; and on November 11, the examination of the remains of Tutankhamun started. An alabaster jar found in the tomb, symbolizing the union of Lower and Upper Egypt Work started in the treasury on October 24, 1926, and between October 30 and December 15, 1927, the annex was emptied and examined. On November 10, 1930, eight years after the discovery, the last objects were removed from the tomb.[9] Layout of tomb[edit] Plan of KV62 In design, the tomb appears to have originally been intended for a private individual, not for royalty.[10] There is some evidence to suggest that the tomb was adapted for a royal occupant during its excavation.[11] This may be supported by the fact that only the burial chamber walls were decorated, unlike royal tombs in which nearly all walls were painted with scenes from the netherworld books.[11] Axonometric, plan and elevation images of KV62 taken from a 3D model Stereo drawing of tomb viewed from northwest Starting from a small, level platform, 16 steps descend to the first doorway, which was sealed and plastered, although it had been penetrated by grave robbers at least twice in antiquity. Entrance corridor[edit] Beyond the first doorway, a descending corridor leads to the second sealed door, and into the room that Carter described as the antechamber. This was used originally to hold material left over from the funeral and material associated with the embalming of the king. After an initial robbery, this material was either moved into the tomb proper, or to KV54, and the corridor was sealed with packed limestone chippings which covered some debris from the first robbery. A later robbery broke through the outer door and excavated a tunnel through the chippings to the second door. The robbery was discovered and the second door was resealed, the tunnel refilled, and the outer door sealed again. Carter said that he found the Head of Nefertem in this section.[12] The undecorated antechamber was found to be in a state of "organized chaos", partly due to ransacking during the robberies, and contained approximately 700 objects (articles 14 to 171 in the Carter catalogue) amongst which were three funeral beds, one decorated with the heads of lions (the Goddess Mehet), one with the heads of spotted cattle (representing the great flood, or Mehet-Uret) and one featuring a composite animal with the body of a lion, the tail of a hippopotamus, and the head of a crocodile (representing the corpse-devourer Ammit). Perhaps the most remarkable item in this room were the components, stacked, of four chariots of which one was possibly used for hunting, one for "war" and another two for parades. A large chest was found to contain military items, walking sticks, the king's underpants and a copper alloy trumpet – one of two trumpets found in the tomb, the oldest functioning brass instruments in the world.[13][14] Burial chamber[edit] Cross-section of shrines and sarcophagi in KV62 This is the only decorated chamber in the tomb, with scenes from the opening of the mouth ceremony (showing Ay, Tutankhamun's successor acting as the king's son, despite being older than he is) and Tutankhamun with the goddess Nut on the north wall, the first hour of Amduat (on the west wall), spell one of the Book of the Dead (on the east wall) and representations of the king with various deities (Anubis, Isis, Hathor and others now destroyed) on the south wall. The north wall shows Tutankhamen being followed by his Ka, being welcomed to the underworld by Osiris.[15] Some of the treasures in Tutankhamun's tomb are noted for their apparent departure from traditional depictions of the boy king. Certain cartouches where a king's name should appear have been altered, as if to reuse the property of a previous pharaoh—has often occurred. However, this instance may simply be the product of "updating" the artifacts to reflect the shift from Tutankhaten to Tutankhamun. Other differences are less easy to explain, such as the older, more angular facial features of the middle coffin and canopic coffinettes. The most widely accepted theory for these latter variations is that the items were originally intended for Smenkhkare, who may or may not be the mysterious KV55 mummy. This mummy, according to craniological examinations, bears a striking first-order (father-to-son, brother-to-brother) relationship to Tutankhamun.[16] The outer golden shrine, now on display in the Cairo Museum The right side walls of the shrines and the sarcophagus Tutankhamun's wooden chest The entire chamber was occupied by four gilded wooden shrines which surrounded the king's sarcophagus. The outer shrine ([1] in the cross-section) measured 5.08 x 3.28 x 2.75 m and 32 mm thick, almost entirely filling the room, with only 60 cm at either end and less than 30 cm on the sides. Outside of the shrines were 11 paddles for the "solar boat", containers for scents, and lamps decorated with images of the God Hapi. The fourth and last shrine ([4]) was 2.90 m long and 1.48 m wide. The wall decorations depict the king's funeral procession, and Nut was painted on the ceiling, "embracing" the sarcophagus with her wings. This sarcophagus was constructed in granite ([a] in the cross-section). Each corner of the main body and lid were carved from stone of different colours. It appears to have been constructed for another owner, but then recarved for Tutankhamun; the identity of the original owner is not preserved.[15] In each corner a protective goddess (Isis, Nephthys, Serket and Neith) guards the body. Inside, the king's body was placed within three mummiform coffins, the outer two made of gilded wood while the innermost was composed of 110.4 kg of pure gold.[17] Tutankhamun's mummy was adorned with a gold mask, mummy bands and other funerary items. The funerary mask is made of gold, inlaid with lapis lazuli, carnelian, quartz, obsidian, turquoise and glass and faience, and weighs 11 kg.[18] Funerary text[edit] The Enigmatic Book of the Netherworld is a two-part ancient Egyptian funerary text inscribed on the second shrine of the sarcophagus. The term "enigmatic" here refers to it being written in cryptographic code, a New Kingdom practice also known from the tombs of Ramesses IX and Ramesses V. Its content is therefore not readily available to Egyptology; Coleman (2004) interprets it in terms of the creation and rebirth of the sun. The text is broken into three sections that incorporate other funerary texts, such as the Book of the Dead and the Amduat.[19] The text is notable for containing the first known depiction of the ouroboros symbol, in the form of two serpents (interpreted as manifestations of the deity Mehen) encircling the head and feet of a god, taken to represent the unified Ra-Osiris.[20] The treasury was the burial chamber's only side-room and was accessible by an unblocked doorway. It contained over 5,000 catalogued objects, most of them funerary and ritual in nature. Also found within the Annexe chamber were twenty-six wine jars, containing the residue of vintage wines.[21] The two largest objects found in this room were the king's elaborate canopic chest and a large statue of Anubis. Other items included numerous shrines containing gilded statuettes of the king and deities, model boats and two more chariots. This room also held two mummies of fetuses that DNA has shown to have been stillborn offspring of the king.[22] The "annex", originally used to store oils, ointments, scents, foods and wine, was the last room to be cleared, from the end of October 1927 to the spring of 1928. Although quite small in size, it contained approximately 280 groups of objects, totaling more than 2,000 individual pieces. Also found within the Annex chamber were twenty six wine jars, containing the residue of vintage wines. [23] During the excavation it quickly became apparent that the tomb had been robbed at least twice. The first and second doors had both been breached in the top left-hand corner and subsequently resealed at least twice. The descending corridor had been filled with a packing of limestone chippings, presumably after the first robbery as the inner plaster door was unmarked by the chippings, and this filling had been tunneled through in a later robbery, or series of robberies. The robberies had been discovered at some point, and the outer doors had been resealed, and the robbers' tunnel refilled. The limestone chippings in the descending tunnel also covered some fragments of looted articles including jar lids, razors and wood fragments that had been presumably removed from the antechamber and stored in the tunnel during the first robbery. Some remnants appear to have been from a funerary meal, which was discovered by Davis in jars in KV54, which indicates that KV54 may have been used as a store for items recovered after the first re-closing of the tomb. The annex was probably worst affected by the first robbery. The room was small and full of densely-packed items, which had been ransacked by a robber who had entered through a small hole in the outer door. The robber hurriedly disturbed the contents of the annex, emptied boxes and removed items. The robber or robbers seem to have been looking for metals, glass (then a valuable commodity), cloth, oils and cosmetics. The theft of oils and cosmetics suggests that the robbery was fairly contemporary with the burial, as the lifespan of these articles would have been limited. After this robbery was discovered, the doors were resealed and it is likely that the descending tunnel was filled with packed limestone chippings to deter future robberies. The second robbery required much more organisation to clear the descending corridor - a tunnel was dug in the top-left-hand corner of the tunnel, and the outer door was penetrated by a large hole in the blocking. Carter estimated that it would have taken a team of men around eight hours to excavate the tunnel by passing back baskets of rubble. The second robbery penetrated the entire tomb, and Carter estimated that around 60% of the jewelry in the Treasury had been looted, along with precious metals. At some point, a knotted scarf containing a number of looted rings was dropped back into a box in the antechamber, which led Carter to the conclusion that the robbery had perhaps been discovered whilst it was in progress, or that the thieves had been pursued and caught. The tomb may have been hurriedly resealed (possibly to avoid drawing attention to the tomb) by the official Maya, as the signature of his assistant Djehutymose was found by Carter on a calcite stand in the Annexe. Upon resealing the tomb, the first and second resealings were marked with the same seal, bearing a design of a jackal over nine bound captives, which may indicate that they both took place within a short time interval after the closure of the tomb.[24] Possible undiscovered chambers[edit] Research by prominent Egyptologist Nicholas Reeves (attached to the University of Arizona) suggested, in 2015, that there may be areas of the tomb worthy of further analysis. Reeves investigated high-resolution digital scans of the tomb taken by Madrid-based company Factum Arte that were used in the process of creating a facsimile of the tomb. Reeves noted markings in the plaster of the burial chamber that appeared to suggest the possibility of a small door in the west wall of the burial chamber, of the same dimensions as the Annexe door. According to Reeves, markings on the north wall could also suggest that the wall itself may partly be a blocking wall covering a void, possibly indicating that the "antechamber" continues as a corridor beyond the north wall. Although the "doors" may just be uncompleted construction work, one possibility that has been suggested is that Tutankhamun is actually buried in the outer section of a larger tomb complex (similar to the tomb of Amenhotep III) that has been sealed off by the north wall, and that a further burial (possibly that of Nefertiti) may exist elsewhere in undiscovered areas of the tomb.[25] In March 2016, a ground-penetrating radar scan revealed two empty spaces and what appear to be organic and metallic materials within them.[26] However, researchers from the University of Turin used sonar to evaluate the tomb and found no evidence of any yet-revealed chambers, disproving this hypothesis. The Egyptian Ministry of State of Antiquities reviewed and accepted these results, which were presented in May 2018.[27][28] Meteorite dagger[edit] A 2016 study suggested that the dagger buried with Tutankhamun was made from an iron meteorite, with similar proportions of metals (iron, nickel and cobalt) to one discovered near and named after Kharga Oasis. [29] Present day[edit] KV62 in the Valley of the Kings. The tomb directly facing the camera is that of Rameses VI. In front of it and to the right, half-hidden by the shoulder of the central mountain, is the tomb of Tutankhamun. The tomb is open for visitors, at an additional charge above that of the price of general access to the Valley of the Kings. The number of visitors was limited to 400 per day in 2008.[30] In 2010 the tomb was closed to the public while restoration work was undertaken by the Getty Conservation Institute,[31] and was once again open to the public by 2013. The tomb is expected to be definitively closed to the public in the near future, but a reproduction will be placed nearby at the Valley of the Kings and will be available to the public.[32] See also[edit] • The Discovery of the Tomb of Tutankhamen, by Howard Carter, Arthur C. Mace. • Reeves, Nicholas. The Complete Tutankhamun: The King, the Tomb, the Royal Treasure, Thames & Hudson, 1995, ISBN 978-0500278109 • The Complete Tutankhamun: The King, the Tomb, the Royal Treasure, by C. N. Reeves, Nicholas Reeves, Richard H. Wilkinson. • Reeves, N & Wilkinson, R.H. The Complete Valley of the Kings, 1996, Thames and Hudson, London • Siliotti, A. Guide to the Valley of the Kings and to the Theban Necropolises and Temples, 1996, A.A. Gaddis, Cairo 1. ^ "Tutankhamun". University College London. Retrieved 2007-06-10. 2. ^ Davis, Theodore M. (2001). The Tombs of Harmhabi and Touatânkhamanou. London: Duckworth Publishing. ISBN 0-7156-3072-5. 3. ^ Christianson, Scott (November 5, 2015). "A Look Inside Howard Carter's Tutankhamun Diary". Smithsonian Magazine. Retrieved July 6, 2018. 4. ^ "The Tombs of Tutankhamun and his Predecessor". Archived from the original on 2015-09-25. Retrieved 2015-09-24. 5. ^ "Howard Carter's diaries (October 28 to December 30, 1922)". Archived from the original on June 30, 2007. Retrieved 2007-06-04. 6. ^ "A. C. Mace's personal diary of the first excavation season (December 27, 1922 to May 13, 1923)". Archived from the original on June 30, 2007. Retrieved 2007-06-04. 7. ^ "Howard Carter's diaries (January 1 to May 31, 1923)". Archived from the original on 2007-04-07. Retrieved 2007-06-04. 8. ^ "Howard Carter's diaries (October 3, 1923 to February 11, 1924)". Archived from the original on 2007-04-07. Retrieved 2007-06-04. 9. ^ "Howard Carter's diaries (September 24 to November 10, 1930)". Archived from the original on June 30, 2007. Retrieved 2007-06-04. 10. ^ "KV 62 (Tutankhamen)". Retrieved 2007-06-10. 11. ^ a b Reeves & Wilkinson (1996) p.124 12. ^ Zahi Hawass: King Tutankhamun. The Treasures Of The Tomb. p. 16. 13. ^ Finn, Christine (2011-04-17). "Recreating the sound of Tutankhamun's trumpets". BBC News. Retrieved August 8, 2012. 14. ^ "Ghost Music". BBC Radio 4 Programmes. Retrieved August 8, 2012. 15. ^ a b "KV 62 (Tutankhamen): Burial chamber J". Retrieved 2007-06-10. 16. ^ Reeves, Nicholas C. (1990-10-01). The Complete Tutankhamun: The King, the Tomb, the Royal Treasure. Thames & Hudson. 17. ^ "Note concerning the 3rd Coffin". Retrieved 2007-06-10.[permanent dead link] 18. ^ Alessandro Bongioanni & Maria Croce (ed.), The Treasures of Ancient Egypt: From the Egyptian Museum in Cairo, Universe Publishing, a division of Ruzzoli Publications Inc., 2003. p.310 19. ^ Darnell, John Coleman (2004). The Enigmatic Netherworld Books of the Solar-Osirian Unity. Academic Press Fribourg / Vandenhoeck & Ruprecht Göttingen. ISBN 3-7278-1469-1 / ISBN 3-525-53055-2. Hornung, Erik (1999). The Ancient Egyptian Books of the Afterlife (in German). David Lorton (translator). Cornell University Press., 77–82. 20. ^ Hornung (1999), pp. 38, 77–78. 21. ^ Gately, Iain. Drink. Gotham Books. p. 8. ISBN 978-1-592-40303-5. 22. ^ Howard Carter, "The Tomb of Tutankhamen", 1972 ed, Barrie & Jenkins, p189, ISBN 0-214-65428-1 23. ^ Ancient Egyptian materials and technology. Nicholson, Paul T., Shaw, Ian, 1961-. Cambridge: Cambridge University Press. 2000. ISBN 0521452570. OCLC 38542531. 24. ^ "The King Tut Tomb Robberies". Retrieved 2015-09-24. 25. ^ "The burial of Nefertiti ?". Retrieved 2015-09-24. 26. ^ "King Tut's Tomb May Have Hidden Spaces Containing Organic, Metallic Materials". NPR.org. Retrieved 2018-02-26. 27. ^ "Tutankhamun 'secret chamber' does not exist, researchers find". BBC. May 6, 2018. Retrieved May 6, 2018. 28. ^ "King Tut's tomb not concealing hidden rooms after all". Associated Press. May 6, 2018. Retrieved May 6, 2018 – via NBC News. 29. ^ King Tutankhamun buried with dagger made of space iron, study finds, ABC News Online, 2 June 2016 30. ^ "400 visitors to Tutankhamun's tomb". Egypt State Information Service. Retrieved 2007-11-13. 31. ^ "Conservation and Management of the Tomb of Tutankhamen". Retrieved 2013-11-17. 32. ^ "Tutankhamon Tomb recreation". Euronews. Archived from the original on November 27, 2012. Retrieved 2012-12-14. External links[edit]
global_01_local_1_shard_00001926_processed.jsonl/72860
Paranoia Agent Prophetic Vision Comparisons The following is a comparison of the English-spoken and English-subtitled Prophetic Vision segments of Paranoia Agent. An analysis of said segments may will be included in this article, or in a future article. Where differences are present, the text is parenthesized, along with either -s or -e; -s means that the text is present in the subtitles, but not the spoken version, while -e means that the language is present in the spoken version, but not in the subtitles. If someone would care to point out big differences between either English version and the true Japanese, I would be grateful. Differences are only available for those episodes I have watched, which are listed below. A 'full' update history is available at the end of this page. DVD/Episode listing Episode 1 - Prophetic Vision (for The Golden Shoes) To begin (with -s), a rabbit jumps behind the moon. What is it that the black rabbit sees on the horizon with his (big -e) red eyes? A fish on the land has trouble when he's stepped on by cows. The playful palace where the butterfly dances (fades -s)(vanishes -e) away. (In the -s)(At -e) twilight, the (case is started accidentally by the cow -s)(cow starts it by chance -e), and (it will contine to do more good -s)(the goodness continues -e). The golden fox grins at you. Then ... Episode 2 - Prophetic Vision (for Double Lips) To begin (with -s), a (convolvulus -s)(morning glory -e) who lives in an ivory tower dreams every night of being a kaleidoscope. The bloodsucker sucked the swallowtail. She is torn off(, -s)(and -e) ripped up and broken. Two lips are floating around (in -s) the dark of night. The golden shoes will answer your call. You see a ferry boat far (on -s)(in -e) the equinox. (Well -s)(Then -e) ... Episode 3 - Prophetic Vision (for A Man's Path) To begin (with -s), (you hear -s) the (beautiful -s) sound of a bell from a noble temple. But it won't work on a leech's (deaf -e) ears. After the Arabian Nights end, (he stands up -s) every time he (stands up, he -e) is beaten. The golden fox cries (only -e) once. The (great -e) warrior gets on a (horse -s)(noble steed -e) and passes through the broadband. (Well -s)(And then -e) ... Episode 4 - Prophetic Vision (for The Holy Warrior) To begin (with -s), guided by the (light beams -e) red rays, the road that divides the present from the past, the rising sun cherry blossom that steals your breath ... In a thicket before you know it ... The princess is possessed ... The sacred sword knocks at the door ... The surprise when it opens ... (Ta da! Ta da! -e) Charge! Episode 5 - Prophetic Vision (for Fear of a Direct Hit) To begin (with -s), the main point of concern is moving northward in the Izu Peninsula. The moonlight disappears like a dew drop. A shadow of a shadow. Being called here and there, where will the (golden -e) shoes (of gold -s) go? May tomorrow's weather be good. Episode 6 - Prophetic Vision (for MHz) To begin (with -s), if you strain (both of -e) your ears, the words of the sage will reach you some where between intuition and science. If you look around, tracing the fox's path back and forth, It's an ocean of cluster-amaryllises. Welcome, master detective. Here's (some -s) warm hospitality. Episode 7 - Prophetic Vision (for Happy Family Planning) To begin (with -s), the animal trail that goes (far -e) beyond the one who can follow (it -s) is the Holy Warrior. A seagull, a zebra and a winter bee, there are no shadows of them wandering from place to place. Sitting in a happy cirlce (around a brazier -s). Even dead branches add to the mountain scenery. Why do the crows caw? Episode 8 - Prophetic Vision (for ETC) To begin, figures pop out from a crane's beak. A sweet fish (jumps and goes crash with -s)(crashes into -e) fish meatballs. A dancing reed (is in love with -s)(loves -e) the notion of love. A buzzing horsefly breaks out in a nervous sweat. An ant rubs its eyes in disbelief. And the book written by (a duck with leeks on its back -s)(the leek-laden duck -e) is a sorrowful-ending caricature of beasts and birds. And then ... Episode 9 - Prophetic Vision (for Mellow Maromi) To begin, by the twist of the passage of time, the King of Azuchi takes the command. (And -s) a monkey entertains a fox. (Healing patches the pieces of -s)(While the healing process spins -e) a dream. Flames break out left and right. A falcon runs and runs, holding it in his arms. Who's plotting the Honnoji Incident? And then ... Episode 10 - Prophetic Vision (for No Entry) To begin, (a rumor that is going around -s)(hearing the rumor that was told second hand, -e) of what has become of the golden shoes(. -s)(, that no longer have a place in the world, -e) A pair of defeated wild boars face each other (who no longer have a place in the world -s). A labyrinth from which once entered, no one can return. A beckoning dog stands in his native land. Healing, (bamboozled -s)(hoodwinked -e), a beauty all its own. And then ... Episode 11 - Prophetic Vision (for Radar Man) To begin, a unicron (is -s) fighting ferociously. Guided by the crowd of (swarming -e) dolls and the the voice of the (wise old -e) sage. (He -s) obtains an ancient sword at the base of the moon, and now (, moves -e) on to Pegasus. (Who called -s)(Did someone call for -e) the Holy Warrior? But she was such a good (little -e) child. Episode 12 - Prophetic Vision (for The Final Episode) To begin, (the black shadow finally appears, swallowing up -e) the karma of the people(, swallowed up by the jet-black shadow that finally reveals itself -s). The cries coming from the source(. -s)(, -e) A purgatory filled with bright red blood. Are they for the eternal goodbye? Or the first cries of (the -e) newly-born shoes of gold? The (final -s)(last -e) episode of a dream, an illusion, a bubble and a shadow. Episode 13 - Prophetic Vision To begin, the story that seems to have ended, (went round and round and back to its beginning -s)(spins back to the place where it began -e). Following each stepping stone and connecting the dots, you (will -s) find (an eternally recurring phantasmal castle -s)(the eternal castle of recurring dreams -e). No mystery remains unsolved forever. And no answer is (ever -s) without (a -s) mystery. Well, then, we bid you farewell. 2007.09.23: Added Episodes 1 - 4. Added Episode 5. 2007.09.24: Added Episodes 6 and 7. 2007.09.27: Added Episodes 8 - 10. 2007.09.30: Added Episodes 11 - 13.
global_01_local_1_shard_00001926_processed.jsonl/72887
The Case Against Intel SGX Figure 1 SGX enclave cannot interact with user devices A1Logic’s Reverse Hypervisor Sandbox (RHS) might seem comparable to Intel’s SGX, since both are isolated execution environments separated by the CPU’s Memory Management Unit (MMU) that protect data “in use”. However, the choice of isolation technology has some major effects on applications that you can run in it. Before jumping into the technical details of RHS and SGX, it is worth looking at recent history in the tech industry, as history repeats itself. Internet Protocol version 4 (IPv4) was an early networking technology that enjoyed widespread adoption on the internet, and became the “de facto” standard for internetworking. When the public IPv4 address space was exhausted, IPv6 came out with a solution: to replace older IPv4 format addresses with newer and longer IPv6 format addresses that greatly increase the number of publically available IP addresses. The problem was that IPv6 was “too little too late”. The internet had already adopted Network Address Translation (NAT) to solve the IPv4 address space exhaustion problem by multiplexing a single public IPv4 address into multiple private IP addresses, and therefore IPv6 never gained traction, making IPv4 with NAT the de facto standard today. The lesson here (and throughout other places in human history) is that old and widely adopted infrastructure is not replaced, but tweaked with elegant backward compatible “hacks” to satisfy new requirements. Client Side Intel’s SGX is an extension to the x86 architecture that introduces new x86 instructions that allow CPU encryption of physical memory in protected “enclaves”. Since new CPU instructions have to be explicitly executed by the application in order to use these enclaves, all current and legacy application must be modified in order to include these instructions. In fact, Intel built prototypes [1] of Open Source Enterprise Rights Management and Secure Video Conferencing software protected with SGX, which required a full refactoring of the each application into trusted and untrusted parts. With the IPv4 to IPv6 transition failure, history has taught that existing infrastructure will not be replaced and therefore it is not reasonable to expect all vendors of all current and legacy applications to rewrite their applications to separate trusted and untrusted code and data and use Intel’s new SGX instructions. This same history lesson says that the industry will not backport homomorphic encryption technology which requires current and legacy applications to be modified, for protecting all applications. Since abstraction was a design goal, A1Logic’s RHS is both backward and forward compatible with unmodified legacy applications and future applications that have not been written yet. In the IPv4 analogy, RHS protects unmodified applications without requiring them to change, just like NAT allowed more devices on the internet without requiring the internet to change. For smooth adoption of new technology, abstraction should be maintained so that upper layers (source code) are not impacted by modifications in the lower layers (SGX’s encrypted memory bus writes from the CPU). More important than adoption of SGX is that it has a fatal flaw in the client-side use case: it cannot interact with user devices, such as mouse, keyboard and display in a safe manner. The SGX enclave shown in Figure 1 is an “Island of Trust” on the physical machine, where the Operating System (OS) and applications are untrusted. Since the OS’s purpose is to interface between the applications and the hardware, the SGX enclave code must either go through the untrusted OS to use hardware, or not have any User Interface. Research has been done in the area of allowing SGX to interface with user devices. The solution in SGXIO [2] is to use the same technique that the RHS already uses: hypervisors to redirect user device communication. In short, SGXIO requires application modification, SGX and a hypervisor, while RHS requires only a hypervisor to obtain the same result. A possible confidentiality use case for SGX is for new applications to protect encryption keys in memory with low overhead, acting as a Secure Element. Ciphertext could be imported into the enclave, decrypted with the protected key and then the clear text could be copied out of the enclave so that it can interact with user devices. However from a threat modelling point of view, the encryption key is only as valuable as the data that it is protecting the confidentiality of, so copying the clear text out of the enclave defeats the whole purpose of the protection scheme. For example, if there is an encrypted file with credit card numbers, malware outside the enclave can be waiting for the clear text to be copied out after decryption for display on the screen, which is where the data can be stolen. Server Side SGX might have had a place in the cloud hosted datacenter because customers might assume an Untrusted Computing Base in the cloud, and cloud applications commonly do not interact with user devices such as mouse, keyboard and display. There have even been some tricks as seen in Graphene-SGX [3] and Haven [4] to allow cloud applications to be protected by SGX without modification, such as by pulling application dependencies from the OS into the SGX enclave and simulating an OS in user land. However, the Untrusted Computing Base problem is already being solved by AMD Secure Memory Encryption [5], AMD Secure Encrypted Virtualization [5], and Intel Total Memory Encryption [6], which would not require modifications to the application or a custom Operating System. AMD SME, AMD SEV and Intel TME can transparently encrypt memory with Virtual Machine (VM) granularity, which means that cloud applications which run on VMs on a physical server in the untrusted cloud host’s datacenter get the same confidentiality guarantees provided by SGX, without the vendor having to modify the application, or play tricks in the SGX enclave such as pulling in OS dependencies. The fusion of the Docker containers with VMs will accelerate the adoption of VM encryption. SGX could help in authentication or the theoretical corner case of protecting VM elements from themselves, where the OS in a cloud VM is compromised possibly by an exploit of the application running in the VM. In this case, data inside the enclave would be protected from malware in the VM. Due to A1Logic’s RHS design using VMs rather than SGX enclaves, customers can protect their workloads in the cloud or client side, simply by enabling SME, SEV or TME. In addition, customers do not have to modify application code or application configuration for nonstandard environments [4]. Most applications today can run on physical machines, and since VMs simulate physical machines, the applications should be able run unmodified on VMs. A1Logic’s RHS protects data “in use” by running unmodified applications in isolated VMs, and new VM memory encryption technologies will protect applications in the RHS, transparently to the RHS and to the application being protected. SGX provided too little too late. Thanks to Dr. Atul Luykx of Visa for his feedback on this article.  [1] M. Hoekstra, R. Lal, P. Pappachan, V. Phegade, and J. D. Cuvillo, “Using innovative instructions to create trustworthy software solutions,” Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy – HASP 13, 2013. [2] S. Weiser and M. Werner, “SGXIO: Generic Trusted I/O Path for Intel SGX,” Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy – CODASPY 17, 2017. [3] C.-C. Tsai, D. E. Porter, and M. Vij, “Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX,” USENIX ATC ’17, Jul. 2017. [4] A. Baumann, M. Peinado, and G. Hunt, “Shielding Applications from an Untrusted Cloud with Haven,” ACM Transactions on Computer Systems, vol. 33, no. 3, pp. 1–26, 2015. [5] D. Kaplan, J. Powell, and T. Woller, “AMD MEMORY ENCRYPTION,” 21-Apr-2016. [Online]. Available: [Accessed: 01-May-2018]. [6] “Intel® Architecture Memory Encryption Technologies Specification,” Dec-2017. [Online]. Available: [Accessed: 01-May-2018]. Posted On : 2018/05/02 Recent Posts Blog Archive WordPress Lightbox
global_01_local_1_shard_00001926_processed.jsonl/72897
Gem #129 : Type-Safe Database API - Part 1 Let's get started... SQL is the traditional language used to query a database management system (DBMS). This language is mostly standardized, even though each vendor provides their own extensions and restrictions. It is convenient when the data could be organized into tables and fields following the relational model. More recently, we have seen the emergence of so-called "noSQL" databases, which use a different paradigm altogether to provide enhanced performance in exchange for additional restrictions. We will not discuss noSQL databases in this Gem. Despite all its advantages, there are lots of limitations with SQL as it is traditionally used. * The query is written as a string. With a string it isn't possible to check at compilation time whether the syntax is correct. It's also not possible to check whether the tables and fields referenced are valid. Furthermore, it isn't possible to have type checking (ensuring comparison of integers with integers, etc.). * Sending the query to the DBMS is vendor specific. Each vendor provides a C API, but they all differ from one another. The concepts are in general similar: preparing the query; sending it to the server; passing the parameters; fetching the results; and so on. A standard API exists (ODBC) which is implemented by most, but not all, vendors. However, there is a performance penalty compared to using the native API in general. The setup is also more complex. Some vendors provide preprocessor-based solutions: you write the SQL query directly in your source code, which is then preprocessed before being passed to the compiler. However, this solution means that the compiler is not seeing exactly the code you have written, which for instance can result in error messages pointing to the wrong line in the file. The GNAT Components Collection proposes two packages, GNATCOLL.SQL and GNATCOLL.SQL.Exec, which provide solutions to the problems highlighted above. One of the requirements is that these packages should be usable with existing code to provide an easier transition. We'll begin by addressing the first limitation (SQL as strings). The package GNATCOLL.SQL provides an Ada API to write SQL queries. However, for it to provide type safety, we first need to describe the schema of our database. For this, GNATColl relies on a command-line tool called gnatcoll_db2ada. If you already have an existing and running database, you can simply run the following command: gnatcoll_db2ada -dbname <name> -dbhost <host> -dbuser <user> This command will generate two Ada packages (by default, they are called Database and Database_Names). Only the former is meant to be used directly in your applications. It contains Ada packages that match the database schema, for instance: package Database is type T_Table1 (...) is record Field1 : SQL_Field_Integer (...); Field2 : SQL_Field_Text (...); end record; type T_Table2 (...) is record Field3 : SQL_Field_Integer (...); end T_Table2; Table1 : T_Table1 (null); Table2 : T_Table2 (null); end Database; The actual discriminants are irrelevant in our discussion of the basics of GNATCOLL.SQL. They are used when you need to have multiple references to the same table (through different aliases) in the same query. The names T_Table1, Field1, Field2, etc. are the actual names of the tables and fields in the schema, so should be familiar to the developers. If you don't have an existing database, it's possible to describe the schema in a text file. This file can be created initially from an existing database. Here is an example of such a file. Full documentation for the format is available in the GNATColl documentation. | TABLE | Table1 | | | | Field1 | AUTOINCREMENT | PK | | Documentation for this field | Field2 | Text | NOT NULL | | Documentation for field2 | TABLE | Table2 | | | | Field3 | FK(Table1) | | | This is a foreign key Once the Ada packages have been generated, the user can write SQL queries by using the Ada API provided in GNATCOLL.SQL. Here is a small example: with Database; use Database; -- the generated package Q : SQL_Query; Q := SQL_Select (Fields => Table1.Field2 & Table2.Field3, -- line 8 From => Table1 & Table2, -- line 9 Where => Table1.Field1 = Table2.Field3); -- line 10 -- Converting Q to a string via To_String will now display: -- "SELECT table1.field2, table2.field3 FROM table1, table2 -- WHERE table1.field1 = table2.field3);" Although it might appear to be longer to type than when using the string, this code already has several advantages: * It is pure Ada. There is no need for preprocessing, so any error message the compiler reports will point to the correct line of code. * It guarantees that the SQL is syntactically correct. By design, the API prevents you from entering a syntactically incorrect query (for instance, a typo like "SELCET", or missing spaces, or any other kind of error). The API makes sure you can only specify a table or a list of tables in the FROM clause, and there's a similar limitation for the FIELDS clause. * It guarantees that only valid tables and fields are referenced. Since the query is written using the generated API, this ensures that if you change the schema of your database, the generated Database package will also change, and the compiler will then flag queries that reference fields that no longer exist. When the query is written as a string, changing the schema requires searching in the source for possible impacts, rather than relying on the compiler to do this work on our behalf. * It checks types at compilation time. If we modify line 10 to compare Table1.Field2 and Table2.Field3, the compiler will complain that we are comparing an integer and a text field. Because the queries are built as a tree which is then flattened into a string, GNATCOLL.SQL is also able to provide automatic completion on queries. For instance, we could omit line 9 above, and add: Auto_Complete (Q); In this case there is no gain, and we are actually losing in readability and efficiency. But this auto-completion capability is especially useful for completing the GROUP BY clauses. For instance, when one of the fields returned by the query is the result of an aggregation function, and you also return ten other fields, the auto-completion removes the need to manually maintain the list of nine fields in GROUP BY. Of course, there is a performance penalty implied by the creation of the query in memory, and then its serialization as a string. To alleviate that, GNATCOLL.SQL provides support for prepared queries (client or server side), as well as parameterized queries. The second Gem in this series goes into more detail on this, and also describes the package GNATCOLL.SQL.Exec, which abstracts communication with the DBMS engine to a vendor-agnostic API. To be continued in part 2 ... Last Updated: 10/13/2017 Posted on: 7/9/2012
global_01_local_1_shard_00001926_processed.jsonl/72899
An Expert’s guide to mobile ad fraud Mobile ad fraud poses a serious problem for everyone in the mobile advertising industry. Not only does it cause damage to work flows, and drain away revenue, but it also can skew data, ruining potential strategies before they've even been created. In our guide, we look at the sources of mobile fraud; the ways in which ad fraud can create problems with your data, and how we as an industry can fight it. April 2018 This report will show you: 1. The types of fraud which exist in mobile advertising 2. How fraud could affect your campaigns and your datasets 3. How the industry can work together to fight off fraud Get the report Trusted by globally leading brands
global_01_local_1_shard_00001926_processed.jsonl/72907
4 Skin Care Tricks for Healthier, Younger Looking Skin 4-Skin-Care-Tricks-for-Healthier,-Younger-Looking-SkinChildren’s skin usually looks virtually flawless. That soft, supple feeling of youthful skin becomes harder and harder to maintain as we get older. Because the skin is the first point of contact to the outside world and to damaging environmental factors, age-related changes in our bodies are often reflected on its surface first. Certain skin conditions—like psoriasis, eczema, and even acne—also become more prevalent with aging, and can leave skin feeling dry, itchy, and swollen. It’s hard to look younger when your skin is so irritated. Here’s what it comes down to: younger skin looks better because it’s healthier. So, one way to help make you look younger is to restore and maintain your skin’s health. This means starting from the inside out. There are certain nutrients that your skin needs to look younger. Keep in mind that while a lot of people tend to concentrate on just the face, your anti-aging skin care routine should encompass whole body care. Zeroing in on what nutrients your skin needs to stay healthy will ensure that you look younger from head to toe. One of these essential nutrients is vitamin A, which helps to repair damaged skin tissue. Applying vitamin A on the skin’s surface is an effective treatment method for relieving psoriasis-inflamed skin, diminishing the appearance of wrinkles, and preventing acne. To get more vitamin A, pack your diet with colorful vegetables, especially ones that are dark green and leafy. Another important nutrient for making your skin look younger is getting enough omega-3 fatty acids, which strengthen skin cells while also keeping them moist. One especially useful fatty acid is linolenic acid—it helps to prevent skin from becoming dehydrated. Not having enough omega-3 in your diet can dry skin out, which definitely won’t make you look younger—quite the opposite actually. Older individuals are more prone to dry skin, so omega-3 is even more imperative for seniors. Some good sources of fatty acids to make you look younger include fish oil, flaxseed oil or seeds, and fresh basil. Omega-3 can also be found in anti-aging supplements. If you want to look younger, then tip number three is to get more vitamin E, which is packed with antioxidants. Over the years, your skin is increasingly being exposed to sun damage, environmental pollutants, and food toxins. Antioxidants protect your skin from the free radical damage that’s caused by these kinds of stressors. To look younger, look for anti-aging skin care products—especially body moisturizers—that contain pure vitamin E. You can also eat more foods that are rich in vitamin E, like seeds, dried apricots, and nuts. The fourth requisite to look younger is probably the easiest one to follow: drink water. Just like the rest of your body, your skin cells also need good old-fashioned H2O to help flush toxins from your system. Water also restores skin’s moisture that’s lost when the air is extra hot or dry. Whether you have oily, dry or combination skin, simply drinking water can help you look younger by making your skin appear healthier and more radiant. Presented By Revcontent
global_01_local_1_shard_00001926_processed.jsonl/72942
Google To Embrace Payment Request API, Put It In Chrome Google Chrome is just one of many Google products that will reportedly be getting support for the Payment Request API in the near future, including native support for implementing third-party Android apps with the API as valid payment methods. The API itself allows for almost any app to tap into the complex framework utilized by mobile payment apps, and allows client-side apps, such as browsers, to verify and accept payments from these third-party apps. Google has the Payment Request API listed as something that they'll be talking about at Google I/O this year, and word is that they will be fully integrating support into Chrome, including the Android version, allowing just about any app that wants to function in much the same way as Android Pay online to do so. The inner workings of the API are extremely complicated. To put it as simply as possible, the payee's framework first asks the third-party payment app for credentials, then runs them through the app's declared server. If those check out, the payment app spits out a unique key file. If that's a match, then the whole mess connects to a customer's account, a bank, or whatever else may be the backend for the payment app. If everything checks out, the user will be able to choose the third-party payment app to make their online payment, and from there, the payment app double checks the signatures of the web browser or payment accepting app to make sure it's paying who it thinks it's paying, then finally pushes through the payment. The implications here are fairly vast just in the realm of Chrome, but Google and the World Wide Web Consortium, the creators of the API, want to see it spread further. Essentially, if a customer wants to use their Walmart Pay account to pay for a transaction on eBay, that's something that the Payment Request API can technically do. Likewise, if an otherwise unrelated app wants to implement their own in-app payment method and possibly allow the user to use that payment method in other apps, that's also within the purview of the Payment Request API. For now, seeing the API hit Chrome will be a big first step in getting web developers and merchants on board. You May Like These More Like This: About the Author Daniel Fuller Senior Staff Writer Android Headlines We Are Hiring Apply Now
global_01_local_1_shard_00001926_processed.jsonl/72954
Can I use this adapter to get sound to my TV? The picture is coming through but not the sound. Mini DisplayPort to VGA Adapter Back To Product Follow this Question 1 Answer from the Community • Best Answer: the VGA cable is only used to display the image on your screen. The VGA isn't capable of transferring the sound through the television. if you want sound try plugging the mac into some speakers. but if you want the sound coming out of the television, you have to get an HDMI adapter, which is also sold in the apple store. Was this useful? Answer 1 5 of 6 people found this useful Related Questions
global_01_local_1_shard_00001926_processed.jsonl/72958
Floor Signs Need a quote? Save time and we'll contact 5 reputable Floor Signs companies for you Click here! Welcome to the Floor Signs business to business directory. Here you will find manufacturers, suppliers and distributors of Floor Signs, Advertising Signs, Bespoke signs and CCTV signs around the UK. More Information
global_01_local_1_shard_00001926_processed.jsonl/72959
Parallel kdb+ Database Access with QPad and TorQ Allan Moore kdb, kdb+, TorQ Leave a Comment We’ve been working with Oleg Zakharov, who created QPad, to implement asynchronous querying and allow users to run multiple concurrent queries more efficiently.  This blog explains how it works, using a new version which Oleg will make available soon (but can be downloaded from here for now). The Problem A common usage pattern in kdb+ environments is to have multiple users accessing the same dataset simultaneously – for example, Quant users working in a research environment.  Users can either access processes directly (a dedicated process per user) or via a gateway.  The gateway process gives the advantage of allowing processes to be shared and failures to be managed transparently to the users.  A set up like this is usual: All the common IDEs send queries synchronously.   Sending synchronous queries through a kdb+ process causes the process to become unresponsive until the query is complete and a response is sent to the client. If one of these users wants to run a query that will take a long time to run, then the rest of the users will not be able to run anything against this gateway for the duration of this query. The TorQ gateway will load balance by selecting an RDB/HDB which isn’t busy.  However, the synchronous query sent to the gateway will cause the gateway itself to become unresponsive until it responds to the client. This means that while the gateway is executing a synchronous query, it doesn’t matter how many background processes are available to serve other user’s requests, the other users cannot use the gateway to facilitate their own requests to the background processes. All kdb+ processes will stop and wait for synchronous queries to complete.  So how do we avoid this? One way of avoiding this problem is to send asynchronous queries to the gateway instead. When a kdb+ process receives an asynchronous query, it has more control over what it can do with the query.  When the TorQ gateway receives an asynchronous query, it passes it onto a backend process that currently has nothing running, and then moves onto the next query. When the backend process sends the gateway back its response, the gateway carries out any further manipulation required and propagates the response to the client. This means that as long as there are enough available background processes to serve the user’s requests, any amount of users could send queries at the same time, to the same gateway and not have to wait on other user’s queries before they get a response. By default QPad (and the other IDEs) will send synchronous queries, but QPad does have an asynchronous query mode that this guide will show you how to enable. Starting QPad in Async Mode QPad has an asynchronous query mode that can be activated using a flag when starting the application. To do this, open a windows console in the same directory as the QPad executable and type: qpad64.exe --async qpad32.exe --async (depending on whether you have a 32bit or 64bit version of QPad). It can be useful to have a .bat file in the QPad application directory with this command as its contents, so that you do not need to keep typing the command to start QPad in Async mode. You could also modify a shortcut to QPad so that it appends the “–async” flag when launching QPad. This can  be done by right clicking on the QPad executable, and selecting “Create Shortcut”. Then right clicking on that shortcut and selecting properties. Then editing the Target field shown in the image above. When QPad is started in Async mode you will have a new option on the menu bar, Q -> Sync. When this is selected it will change to “Async” with a tick mark next to it. You are now in Async mode and QPad will send queries asynchronously and wait for a response – but this does not ensure that the process being queried will send back a response. Defining a Callback Function Now that you are sending asynchronous queries, you will need to define a callback function to ensure that the response to normal queries are sent back to QPad. A callback function essentially tells the process to evaluate the query and send the result back to the process that sent the query. A query like “.gw.asyncexec[“1+1″;`rdb`hdb]” run against a TorQ Gateway will work fine without a callback function, as it has a callback function built in, but other queries might not work without a user defined callback function. Here is an example of a callback function that allows QPad to run queries against standard kdb+ processes as well as TorQ Gateway processes: {$[".gw.asyncexec[" ~ 14#x; value x; x like "*.gw.asyncexec*"; @[neg[.z.w];"Async error: can only invoke .gw.asyncexec as standalone query. e.g. .gw.asyncexec[\"1+1\";`rdb`hdb]";()]; {@[neg[.z.w];{$[(::)~x;"Async success";x]} @[value;x;{"Async error: '",x}]; {@[neg .z.w; "Async error: failed to send result back";()]}]}x]} Let’s go through this line by line as there’s a lot going on! The first line checks if the first 14 characters of the query are equal to “.gw.asyncexec[“. If the first 14 characters were “.gw.asyncexec[“ then the function instructs the kdb+ process to simply evaluate the query, since it is likely to be the .gw.asyncexec[] function that already has an inbuilt callback function. x like "*.gw.asyncexec*"; The third line checks if the query contains “.gw.asyncexec”, but not at the beginning of the query. This is done to prevent the user from embedding .gw.asyncexec in other operations and perhaps getting unexpected results. If the third line evaluates to true, then the kdb+ process is instructed to send an error back to the client informing them that they may only use the .gw.asyncexec[] function in a standalone manner. Finally if none of the previous conditions are true, the function instructs the kdb+ process to run the query and return the result back to the client, or the string “Async Success” if the query did not return a value, but otherwise completed successfully. If any errors are encountered, the kdb+ process is instructed to construct an error message and return that to the client instead.  It also handles serialization errors on the return, for example, if the query result was too large or an IPC dynamic load. Appending a callback function to every query You can have QPad append this to the beginning of every query by editing a registry value. 1. Open regedit (you can find this using the windows start menu search) 2. Navigate to “HKEY_CURRENT_USER/Software/ozConcept/ozQInsightPad/Settings” using the left pane and search for the value “QueryPrefix” on the right. 3. Change the value of this to the callback function above (or to one of your choice) Make sure to change QueryPostfix as well, this is what is appended to the end of your query, in this case it should be blank. You will need to restart QPad for these changes to apply. (remember to use the async mode flag if you want to send asynchronous queries).  Now you should be able to send asynchronous queries using QPad and get back the correct response – the queries will execute just as they did before, but with the additional advantage of being able to utilise the TorQ Gateway. Sending synchronous queries through a kdb+ process causes the process to become unresponsive until the query is complete. This prevents, for example, a  gateway process from serving multiple queries at once and load balancing them across multiple background processes. It is better to send asynchronous queries through the gateway as this will result in the system being capable of serving multiple queries from multiple users at the same time, through one gateway process. This guide explains how to setup QPad to send asynchronous queries instead of synchronous queries. Allan MooreParallel kdb+ Database Access with QPad and TorQ Leave a Reply     This will be displayed in a monospaced font. The first four     spaces will be stripped off, but all other whitespace     will be preserved.     Markdown is turned off in code blocks:      [This is not a link]( Here is some inline `code`. For more help see
global_01_local_1_shard_00001926_processed.jsonl/72990
How to repair a cracked engine block or head gasket with K&W FIBERLOCK Overheating can sometimes be caused by a cracked engine block, leaks from the cooling system, coolant leaking past the head gasket. A crack in the engine block could be an expensive repair, but with K&W FiberLock Head Gasket & Block Repair you can be back on the road in 20 minutes. K&W FiberLock is the most advanced product for repairing cracked head gaskets and engine blocks. When there is a crack or hole in your block or cooling system, the pressure in the system causes heat to build up around the crack. FiberLock seeks out the hot spots and seals them permanently with three levels of protection. Military strength fibers create an interlocking web over the breach, nanoparticles fill in and create a solid bond to the metal and Cool-X conditioner keeps your engine running cooler long after the repair is made. FiberLock is compatible with all types of antifreeze. Published on December 6, 2016 Category
global_01_local_1_shard_00001926_processed.jsonl/72996
My ruddy Sony 735 Discussion in 'Blu-ray & DVD Players & Recorders' started by Sam, Jan 11, 2001. 1. Sam Active Member Nov 6, 2000 Products Owned: Products Wanted: Trophy Points: Bought a Sony 735 a few months ago and a little while later I got Gladiator (R2). Noticed on the 1st menu screen of disc 2 that after about 20 secs the picture & sound broke up for a second. I tried my mates disc and his did the same. So I asked for help on this forum and Arthur S replied saying he'd had no probs. So I contacted linonline where I bought my machine from and after loads of trouble they took my player for tests (or at least so I thought). After about 3 weeks without a player (trust me, it ages) it came back yesterday. Same disc, same problem. Even tried my mates disc again and it did the same thing. They can't have tested the player at all, they just sent me a new one and hoped it would work. [​IMG] Took my disc to my local Sony Centre and tried it this afternoon and their player did exactly the same thing! Has anyone else got a 735 and had the same probs or no probs at all? I can't help thinking that if my player messes up a little on this disc, it may be even worse on another. [​IMG] Any help appreciated. 2. Guest Products Owned: Products Wanted: This problem is mnifesting itself in many other DVD players, from several other brands. Share This Page Dismiss Notice
global_01_local_1_shard_00001926_processed.jsonl/73003
remember me Create Account All about the name Ordell English Origin "Little Knife" Share this: The meaning of the name Ordell is Little Knife. The origin of the name Ordell is English. This is the culture in which the name originated, or in the case of a word, the language. People who like the name Ordell also like: Duane, Alistair, Fabrizio, Holden, Fiorello, Faruq, Boden Kaida, Odessa, Inaya, Zitkala, Bellini, Rosaline, Aziza Ordell Stats Ordell is on 22 BN name lists Ordell is currently not ranked on the BN charts Ordell is currently not ranked in U.S. births
global_01_local_1_shard_00001926_processed.jsonl/73026
CryptowallYour sensitive data is the foundation of your business, but unfortunately, your data is constantly at risk – from natural disasters to human errors to malicious intent, many businesses have experienced some form of data loss; and the latest form of ransomware strives to steal and encrypt as much data as possible. Introducing CryptoWall 2.0: a form of ransomware that uses malicious ads on dozens of major websites, including Yahoo, AOL, and, to infect victim’s networks. While the websites aren’t infected, the ads on the websites are. Essentially, it’s a drive-by-download, where the victim actually becomes infected without clicking on anything. Proofpoint, a security-as-a-service provider, explained, “the sites themselves weren’t compromised, rather, the advertising networks upon which they relied for dynamic content were inadvertently serving malware. So what does this mean for your business? The answer is simple: all of the data you’ve worked hard to create and store is at risk. CryptoWall 2.0 is dangerous and it’s infecting victims’ networks at a rapid rate – more than 830,000 individuals worldwide have experienced an infection! Once the ransomware enters a network, it encrypts files and places them in a folder of encrypted files. If the victim clicks on any of the files, a message appears, stating something along the lines of: “Your files have been encrypted. To receive the key to decrypt the files, you must pay 500 USD/EUR. If payment isn’t made before [date], the cost of decrypting files will increase to 1000 USD/EUR” Typically, the first ransom has a deadline of approximately 4-7 days, however, after the deadline, you’re asked for double the amount. According to Proofpoint, the cybercriminals make an average $25,000 per day! Now of course, the question we’re all wondering, what can be done to stay safe? Here’s 6 important tips: 1. Make sure you’ve patched end-points: Windows and all third party apps should always be fully patched, and apps that aren’t necessary should be uninstalled, in order to eliminate unnecessary end-points. 2. Enable click-to-play for plug-in based content: Most browsers, including Google Chrome and Mozilla Firefox, allow an option to enable click-to-play for plug-in based content, which prevents automatic execution. 3. Create an acceptable use policy for employees: Create and enforce an acceptable use policy to disallow employees from browsing inappropriate or potentially malicious websites. 4. Implement a malware detection solution: A malware detection solution, whether it’s targeted threat protection (TTP), targeted attack protection (TAP), or any other name, should be implemented on every workstation. 5. Use ad-blockers for all browsers: Always use ad-blockers for all browsers used throughout your organization or implement endpoint security that includes ad-blocking features. 6. Backup your data on a regular basis: Of course, this is the most obvious tip – if your data is backed up, there’s no need to worry about an infection because you’re able to simply recover your files and move on. Aside from these simple tips, make sure you’re conducting regular security awareness training for your employees. Interested in learning more about CryptoWall 2.0 and how to protect your data? Give us a call at (504) 282-2236 or send us an email at BEC Technology Consultants offers IT security services & consulting to help you stay up to date and protected against the latest security threats! Are You In Need of the Most Reliable & Affordable Support for Your Information Systems? STEP ONE:Watch Our Video STEP TWO: Fill In Your Contact Details Below and a Member of Our Team Will Contact You Need The Absolute Best Information Systems Support In New Orleans? Dial (504) 282_-2236
global_01_local_1_shard_00001926_processed.jsonl/73042
Easy-to-Make Snowflake Ornaments No two snowflakes are alike -- and just as the saying goes, these adorable snowflake ornaments are unique Christmas crafts you can make your very own. Christmas Day Snowflake Ornament Use this snowflake ornament to celebrate the iconic day of the Christmas season, or switch up the numbers in the bottle cap to mark another significant date or number, such as an anniversary or the number of Christmases you've spent with someone. 1. Punch a small hole in the top of a chipboard snowflake (available at crafts stores). 2. Paint the snowflake with silver glitter paint, or paint with silver paint and immediately coat with glitter; let dry. Paint the mandala-shape chipboard or cardstock cutout with white paint; let dry. Paint the inside of the bottle cap red; let dry. 3. Press desired scrapbooking stickers -- here we show the number 25 to represent Christmas day -- into the center of the bottle cap. Stamp the inside of the bottle cap with a Christmas message. 4. Using crafts glue, adhere the mandala shape to the snowflake. Glue the bottle cap to the center of the mandala. 5. Thread ribbon through the small hole at the top of the snowflake Salt-Dough Snowflake Ornaments Though these delicate snowflake ornaments look tasty, they're not edible -- so don't mix them up with the Christmas cookies! 1. Prepare the dough: Mix 1/2 cup salt, 1 cup flour, and 1/2 cup water until sticky. 2. Roll the dough to 1/4-inch thickness, and cut out snowflake shapes with cookie cutters; use a skewer to pierce a hole for hanging. 3. Bake the shapes for 4 hours in a 200 degrees F oven. 4. When cool, draw hearts, squiggles, and dots on the ornaments with a red permanent marker. 5. Hang the ornaments on the Christmas tree from loops of festive twine or yarn. Framed Snowflake Ornament Send a warm holiday greeting with this simple-to-make snowflake ornament. 1. Paint two different wooden snowflake shapes white; let dry. 2. Glue the snowflakes on top of each other and fit them inside a wood frame, using dabs of glue at the ends of the bottom snowflake to secure it to the frame.  3. Cut holiday-theme scrapbook paper to fit the frame edges; glue in place.  4. Using rub-on transfers, rub a holiday message onto the front of the top painted snowflake. 5. Coat the ornament with varnish; let dry. Add a ribbon hanger. Clothespin and Crafts-Stick Snowflake Ornaments Our contemporary take on classic Swedish straw ornaments combines crafts sticks (or clothespins) with wooden rounds to create different snowflake forms. Clothespin Snowflake Ornament Instructions: 1. Glue six small-size doll clothespins to a medium-size wooden circle, positioning the clothespins near the outside edge. 2. Hot-glue a small wooden circle to the center front of the snowflake ornament, then glue a 1/2-inch-diameter button plug to the center of the circle. Crafts-Stick Snowflake Ornament Instructions: 1. Overlap four crafts sticks to form a snowflake shape and hot-glue them to a medium-size wooden circle. 2. Glue a small-size wooden circle to the center of the snowflake ornament, then attach a 1/2-inch-diameter button plug to finish the ornament. Colorful Snowflake Ornaments Make a colorful flurry of snowflake ornaments in all shapes and sizes to decorate your Christmas tree this holiday season. 1. Fold a square of strudy decorative paper in half diagonally, then in half again. 2. Make small cuts on all sides of the folded paper. 3. Open, press flat, and outline the edges with crafts glue and glitter. Be the first to comment!
global_01_local_1_shard_00001926_processed.jsonl/73055
AHRC funding through the Midlands4Cities Doctoral Training Partnership Level of study Doctoral research Subject area Arts and Law, African Studies, American and Canadian Studies, Antiquity, Archaeology, Classics and Ancient History, Drama and Theatre Arts, English Language and Linguistics, English Literature, Film and Creative Writing, Heritage, History, History of Art, Law, Modern Languages and Cultures, Music, Philosophy, Theology and Religion, Geography, Education Type of Award Research Council Deadline for applying Closes 14/01/2019 Award Description The Midlands4Cities Doctoral Training Partnership (M4C DTP) is a collaboration between the University of Birmingham, Birmingham City University, the University of Warwick, Coventry University, De Montfort University, the University of Leicester, Nottingham Trent University, and the University of Nottingham. M4C is awarding up to 80 doctoral studentships for UK/EU applicants for 2019 through an open competition and 11 Collaborative Doctoral Awards (CDAs) through a linked competition with a range of partner organisations in the cultural, creative and heritage sector.   For 2019 entry, there are two routes to PhD study: • Open Doctoral Awards, where you agree a research proposal in any disciplinary and interdisciplinary area of the arts and humanities with your supervisory team.  • Collaborative Doctoral Awards, which are co-designed between a Midlands4Cities institution and an external partner organisation. There are 11 CDAs available in 2019, including two hosted by the University of Birmingham. Value of Award A full-time studentship award consists of three parts: • Payment of approved fees (as set and agreed by the Research Councils)  • Maintenance grant (or stipend) for the student  • Research Training Support Grant (RTSG) which includes UK/overseas fieldwork and attendance at conferences (by application only for current PhD students) Eligibility Criteria These awards are available to UK/EU students, studying full-time over three years or part-time for up to six years. Please also refer to the Midlands4Cities Doctoral Training Partnership website. How to Apply Please refer to the Midlands4Cities website.
global_01_local_1_shard_00001926_processed.jsonl/73073
Only $9 per meal BODi Meal Replacements rapidly burn fat while maintaining muscle! Scientifically designed and dietitian approved, our uniquely formulated meal replacement shakes contain a wholesome mix of high quality proteins, nutrient-rich nut oils, and 17 vitamins and minerals. Easy and convenient, making fat loss simple. Includes 1 BODi Pack. Each BODi pack is for use over one day and contains 3 formulated meal replacements that replace your breakfast, lunch and dinner. Flavour: Chocolate-nut
global_01_local_1_shard_00001926_processed.jsonl/73088
It php developer company names list jobs Minhas pesquisas recentes Filtrar por: Estado do Trabalho 4,286 it php developer company names list trabalhos encontrados, preços em USD Need someone to look at a list of 150 blogs, and to get their: email, url, and contact name. Will upload file to the person hired. I have the list of names, I need someone to write an excel sheet of: Email, URL, Name $26 (Avg Bid) $26 Média 7 ofertas $460 (Avg Bid) $460 Média 117 ofertas Trophy icon Strain Names 5 dias left We are the SFCultivators, a cannabis cultivation company in San Francisco. We are looking for designs of our signature strains of cannabis that we grow. We have a great logo that was made here on Freelancer! We need designs for stickers that will go on top of jars that colorfully and creatively identify each particular strain. Below I will give the $420 (Avg Bid) Garantido Secreto 52 inscrições -- NO PROJECT MANAGERS -- Insert this list of names (1) into the footer section of the these websites (2). Closely match the color of the sections without using the identical color (slightly different), and position them in locations that do not interfere with website elements or functions. $19 (Avg Bid) $19 Média 20 ofertas $22 (Avg Bid) $22 Média 45 ofertas basically i have a css file and a woff file and i need a simple page that shows all the glyphs (icons/charactors/symbols) in the font on a page with the name beside it $30 (Avg Bid) $30 Média 15 ofertas I have an excel spreadsheet featuring around 400 names and instagram accounts. I would like somebody to go through them and find the accounts that would be a good fit for my outreach purpose, which is to find individuals who are likely to promote a website building product. Please begin your cover letter with the word "OUTLIER" so I know you've read $18 / hr (Avg Bid) $18 / hr Média 43 ofertas Trophy icon suggest a business/branding names 22 horas left i am looking for a band name for a new businesses 1) employment business( similar business like indeed , monster, reed ) 2) eCommerce business for selling goods the two names suggested should be ready to use to register as domain and as a business. Please use SMT as starting word to start your proposal. Proposals without SMT as starting word will $30 (Avg Bid) 24 inscrições I have 600 names FIrst name, Second name. Please edit list so that it only shows First name (delete all second names) $18 (Avg Bid) $18 Média 108 ofertas Looking for 500,000 valid email addresses with .hk as at 2018 with registered company name(must), addresses(must) and telephone/fax(must) in Hong Kong, contact person (optional) Addresses cover unit number, floor number, street number, street name, district, region (if present) Sources can be yellow page, [login to view URL], and others. candidates $151 (Avg Bid) $151 Média 12 ofertas You need to go to the links found in the upoaded file one by one. There you will find a list of people. You need to copy for each link the names and all the additional info found, if there are, into an excel sheet. Each link on a different excel sheet. (same file). It should take max 1 hour for a skillful data miner. $20 (Avg Bid) $20 Média 44 ofertas We are looking for emailadresses and names of bars in Antwerpen (belgium). $23 (Avg Bid) $23 Média 43 ofertas I need a list of ALL the Car Rental Aggregators website on the internet. Aggregators are also are known as Car Rental Comparison websites. Here is two examples 1. [login to view URL] 2. Please address me as Steve so i know you have read my instructions (AUSTRALIA ONLY) $7 (Avg Bid) 1 inscrições I have a spreadsheet of 2,000 names and addresses of people with tax liens in Huntsville, Alabama. I need someone to search the names or addresses on [login to view URL] and input the phone numbers into a spreadsheet. Most names will have multiple phone numbers, input the first 3 for each one. Your pay is negotiable $133 (Avg Bid) $133 Média 50 ofertas I have about 350 names/emails/phone numbers/participants in Word and I need it on Excel today as soon as possible. Can you help? Example: Name: Cindy Magento Email: [login to view URL]@[login to view URL] Phone: 0502123453 Whatsapp: 0521234567 Message: Adults2 - Kids1 $23 (Avg Bid) $23 Média 180 ofertas I have a database of about 400 names with their respective postal addresses that need to be sent a card by post. I am looking for someone to write the name and address of each person in an envelope for posting. Envelopes will be provided but they have to be sent back to Belgium once ready. $28 (Avg Bid) $28 Média 11 ofertas Hello Freelancers! We're looking to hire data entry or research professionals who can help us copy, paste and tidy up names from a website into a spreadsheet. There are 6000 names (maximum 50 per page can be viewed). Basically, we need someone to copy and paste then order the content into a spreadsheet: First, Last, City, Designation There is $239 (Avg Bid) $239 Média 83 ofertas This is a simple project -- it should be able to be done by ImageMagick or something like it via script. I will give you a list of 1,949 first names. I need a 450 x 450 pixel image of each name, in black text (specifically Calibri font), with a white or (ideally) transparent background. Each image will have one first name only and will be displayed $134 (Avg Bid) $134 Média 39 ofertas Hi all! looking for great logo for arts and craft mainly for pens/gel pens etc. can be absolutely anything just...just a guideline for what we are sort of looking at. also name can be anything catchy or fun and being 100% honest, I need a vision! If the design is great we will look to take it further and help us with our actual product so good luck! $38 (Avg Bid) Garantido Concurso Principal 124 inscrições ...either a PHP or python script to randomly rename variables, methods and classes names of a given list of PHP files. The objective is to make the PHP code harder to understand, while maintaining its functionality of course; which means special and reserved names such as $this, self or magic methods shouldn't be renamed. The script should scan the <... $167 (Avg Bid) $167 Média 15 ofertas www. [login to view URL] > screener (use PINE) ... want to export scanned results (in CSV file) to also include "Stock or Index NAMES" ... currently only display "ticker code" ... but NOT the Names of stocks or Index (when exported in CSV) $19 (Avg Bid) $19 Média 11 ofertas I want to configure open vpn on Linux server configure open vpn on Linux server to allow resolving of host names in a windows environment... For example if i connect to open VPN on a computer that is not on my network it can ping server addresses by name and IP addresses but when I type the url in the browser on the intranet it does not resolve. $140 (Avg Bid) $140 Média 21 ofertas I would like to extract info from a site and put into an excel file, with each firm's information on a separate line for each firm. I would like information for all of the firms, for all of the areas of practice and all locations. None of this data is copyright data and is for business-to-business contacts. The data fields I want to mine are: Name of Firm Firm Size Website URL Phone Number Ad... $124 (Avg Bid) $124 Média 94 ofertas I need a bunch of categories added to my Shopify store as well as professional sports teams and type of items. $6 / hr (Avg Bid) $6 / hr Média 11 ofertas We need to scrape usernames out of 3 telegram groups within 3 days. Need help. $125 (Avg Bid) $125 Média 15 ofertas We have a list of 4000 companies (names, URL) in which there are several duplicates. Your task - find and group the duplicates next to each other. Remove nonduplicates. $22 (Avg Bid) $22 Média 47 ofertas ...have a list of college names and information, as well as coaches/athletic directors/strength and conditioning coaches/etc., copied from a website and pasted to an excel spreadsheet. I then need the emails to be extracted from the hyperlink, from the contact, and added to the correct contact on the spreadsheet. I have attached an example of the list you $138 (Avg Bid) $138 Média 126 ofertas Make an pdf into excel-sheet. About 55 rows and 5 colums. phonenumbers, emails and names. Must be done accurately. Especially phonenumbers and emails cannot have any mistakes. Thanks! $85 (Avg Bid) $85 Média 114 ofertas $63 (Avg Bid) $63 Média 56 ofertas ...records released to us each day. Only bid if you are 100% confident you can do the job quickly and accurately. The retailer is S...E...A...R...S DOT.COM. NOTE: We ONLY want names of supplier companies for each of the brands shown on the website itself - NOT the brand shown on the marketplace. Before bidding -- IMPORTANT - please review these instructions $136 (Avg Bid) $136 Média 26 ofertas Typeset 35 names (two rows of text) using Avery label template #5164. Just plain text. $10 / hr (Avg Bid) $10 / hr Média 14 ofertas Hi, I have 100+ Domain names that require modern, clean logos created. This is for display purposes so we do not need to do the process of understanding the brand etc. for each name, we only require that the logo is relevant to the domain name. We have a large amount of ongoing work for the right designer/team. As long as you meet our requirement $518 (Avg Bid) $518 Média 76 ofertas A small project to retype 400+ company names from a series of .JPG images. The images cannot be converted to text. Need to retype the company names into MS Excel file. $21 (Avg Bid) $21 Média 10 ofertas ...1) Verify if the person is still active in the same role & company by using linkedin or company website (Use data from the blue columns) 2) If not active anymore at the same company, add the new information (Green columns) + phone number (Yellow column) 3) If still active at the same company, update the role if changed (Blue column) 4) Always add the $93 (Avg Bid) $93 Média 37 ofertas You just register 3000 .tk free domain names and set the name server. You can purchase through "[login to view URL]" or if you have any other website you can use that to register them. [login to view URL] may block you ip or does not let you to register after a while but you need to have tricks to pass that. ITS NOT AN EASY JOB. PRJECT NEED TO BE DONE IN 2 DAYS $156 (Avg Bid) $156 Média 6 ofertas $21 (Avg Bid) $21 Média 36 ofertas I have attached a list of names- there are about 2200 names. Please start a new excel spreadsheet (or see attached) On the first line in Column A – label “First Name” Column B – “Last Name” Column C – “Email” Column D - "City" Take each name on the list and add into the excel spreadsheet. For example &ndash... $4 / hr (Avg Bid) $4 / hr Média 86 ofertas You will get paid $5. Need a creative website name for a site that sells dog and cats items and accessories $15 (Avg Bid) $15 Média 24 ofertas I have a list of 346 businesses in the UK and I need the name and email address of the CEO or managing director or marketing director for each one. In your pitch for this project tell me what your favourite colour is, so that I know you have read this brief. $139 (Avg Bid) $139 Média 114 ofertas Scrap Data from the following industries : Air Conditioning Contractors Apparel Beauty Salons Building Materials Car Dealers, Repairs and Services Carpenters Child Care Services Concrete Contractors Consumer Electronics & Appliances Consumer Services Electricians Furnishings Landscape Contractors Painters Photographers Plumbers Car Rental Roofing Contractors Shopping &... $39 (Avg Bid) $39 Média 31 ofertas for each team. You simply will look at column 1 and 2 which contains misspelled team names and write the correct name beside each column. The correct name will be found in column 3. Column one contains 2000 team names and column two 3000 team names. Some names might not have a correct name, then you should state this as "X". This task is something $66 (Avg Bid) $66 Média 71 ofertas Hello, I would like to build a list of verified and scrubbed names (meaning they have gone through email delivery verification like neverbounce). I will need about 5K names for the below criteria. Please bid if you agree to and guarantee the above. Job Titles: $149 (Avg Bid) $149 Média 46 ofertas Hello, We ar...Europe as well). You must have done this before and be an expert in trademark law and requirements. Your bid will eventually need to be changed to the cost of trademarking the names. Again, you must be very experienced in this because even though I am aware of the trademark process, I'm not an expert. Generic bids will be ignored!! $529 (Avg Bid) $529 Média 9 ofertas I have 6000 company names and I need someone to google the name and paste the company website in my excel sheet. If there is no website, then the first 2 google search pages are required. $113 (Avg Bid) $113 Média 77 ofertas Trophy icon Design a logo (between the 2 names) Encerrado left ...some creative design for a logo (between the 2 names). This is for a cafe-tea-boba tea-dessert-smoothie shop. My goal is to keep it very clean, simple but bold, unique, fresh, fun. Feel free to add any animation to make it attractive, or keep it simple and bold, etc.. anything I am happy to see them!! 2 names are: Tealicious or Sweet Brew Color theme: $15 (Avg Bid) 74 inscrições preparing. The appendix will list the article sources used for the document. I will provide the template for the appendix and a zip file with all the pdf articles. There are about 45 articles. I need to tasks to be completed: - rename all the articles with "Article # - [name of the article as seen in the pdf]" - list all the "Article # - [name of the $69 (Avg Bid) $69 Média 13 ofertas ...have a list of internet domain names I would like to sell. I need someone to look at this list, find potential / suitable websites that would be interested in buying one of the internet domain names and then contact them (by email) to see if they would be interested in purchasing the domain and then inform me of any replies. I have a list of criteria $4 / hr (Avg Bid) $4 / hr Média 5 ofertas ...industry, and we're using the GetApp directory site to help guide our efforts. The goal of this project is to pull 1) company names and 2) company URLs from five (5) relevant directory pages on the GetApp site. We'll then use this list to further qualify companies in our target market. And if this process goes well, we'll continue to work through more $313 (Avg Bid) $313 Média 29 ofertas has to generate only the content. The contact has to have a transparent background. If it has a full white background when I print certificate it will overwrite the design present on the certificate. variables from excel - student name, course, company, held on date variables auto generated - certificate number, issued on date (today) variables $40 (Avg Bid) $40 Média 20 ofertas $94 (Avg Bid) $94 Média 74 ofertas
global_01_local_1_shard_00001926_processed.jsonl/73089
Em Andamento 3D Paint Can + Brush animated I need a quick 3D Paint Can + Paint Brush animated video. It will have my client's Company's Logo on it. I want it like this Example: Image: [url removed, login to view] Video: Attached. It should around 15-20 seconds (3 scenes). it is for a SAMPLE Animation I am doing for a potential client... if they like it, I will get you to make a Full Animation for a Commercial. It should be on an Isolated Background with Photo quality texture. You can use 3DSMax, Maya or Cinema 4D, etc.. and u can use a pre-made Paint Can/Brush Model from the internet. I can provide one too. Budget around $50. When client is approves, you will get the full job. Habilidades: Animação 3D, 3ds Max Veja mais: video to 3d model, texture 3d model, texture 3d, sample company background, photo 3d model, paint my logo, paint logo company, paint can 3d model, my logo 3d model, model cinema 4d, model 3dsmax, MODEL 3D MAX, maya animation video, maya 3d job, make my 3d, make commercial video, make animation 3d, make animated logo, make an animated video, make a animated video Acerca do Empregador: ( 53 comentários ) Toronto, Canada ID do Projeto: #1748326 6 freelancers estão ofertando em média $178 para esse trabalho Benchmark of quality with high speed working. thanks $200 USD in 2 dias (16 Comentários) Hi. Let's discuss. $50 USD in 3 dias (5 Comentários) Take a look...[login to view URL] $200 USD in 4 dias (0 Comentários) Heeyy No problemo i did a similar aniamtion once for a mexican Osel paint comercial, nothing that realfow and mental ray cant do... $300 USD in 4 dias (0 Comentários) i've got some experiance with 3ds max, google sketchup an solidworks. i will do all jobs for the lowest price $30 USD in 5 dias (0 Comentários) Hello sir, We have 3 years experience and expert dedicated in 2d animation,3d Animation,3D Modeling, Texturing, Lighting, Rendering, Compositing using Maya, zbrush,Photoshop, After Effects,Photoshop Design. Mais $180 USD in 3 dias (0 Comentários) Hi.! Heres my link to my portfolio [login to view URL] For any further details please do contact me. Regards, Prem $160 USD in 7 dias (1 Comentário)
global_01_local_1_shard_00001926_processed.jsonl/73096
The operations of the Holy Spirit For the Christian faith, the Holy Spirit is clearly recognizable in charismatic figures (the saints), in whom the gifts of grace (charismata) of the Holy Spirit are expressed in different forms: reformers and other charismatic figures. The prophet, for instance, belongs to these charismatic types. The history of the church knows a continuous series of prophetic types, beginning with New Testament prophets, such as Agabus (in Acts 11:28), and continuing with the 12th-century monk Bernard of Clairvaux and such reformers as Luther and Calvin. Christoph Kotter and Nicolaus Drabicius—prophets of the Thirty Years’ War period—were highly praised by the 17th-century Moravian bishop John Amos Comenius. Other prophets have existed in Pietism, Puritanism, and the Free churches. Prophetic women are especially numerous. In church history they begin with Anna (in Luke 2:36) and the prophetic daughters of the apostle Philip. Others are: Hildegard of Bingen, Bridget of Sweden, Joan of Arc, and the prophetic women of the Reformation period. In the modern world numbers of pioneers in the “holiness” and Pentecostal traditions, such as Aimee Semple McPherson, were women, and women’s gifts of prophecy have sometimes been cherished among Pentecostalists when they were overlooked or disdained by much of the rest of Christianity. A further type of charismatic person is the healer, who functioned in the early church as an exorcist but who also emerged as a charismatic type in healing personalities of more recent church history (e.g., Vincent de Paul in the 17th century). Equally significant is the curer-of-souls type, who exercises the gift of “distinguishing between spirits” in daily association with people. This gift is believed to have been possessed by many of the great saints of all times. In the 19th century it stands out in Johann Christoph Blumhardt, in Protestantism, and in Jean-Baptiste Vianney, the curé of Ars, in Roman Catholicism. The “holy fool” type conceals a radical Christianity under the mask of foolishness and holds the truth of the gospel, in the disguise of folly, before the eyes of highly placed personalities: the worldly and the princes of the church who do not brook unmasked truth. This type, which frequently appeared in the Byzantine Church, has been represented especially in Western Christianity by Philip Neri, the founder of the religious order known as the Oratorians, in the 16th century. The charismatic teacher (didaskalos), on the other hand, still appears. Filled with the spirit of intelligence or knowledge of the Holy Spirit, he carries out his teaching office, which does not necessarily need to be attached to an academic position. Many Free Church and ecclesiastical reform movements owe their genesis to such spirit-filled teachers, who are often decried as anomalous. The deacon likewise is originally the holder of a charismatic office of selfless service. Christian service, or diakonia, was not confined to Christian offices. Some of the energies that once went into it are now found in social service outside the church. Many of the agents of such service were originally or still may be inspired by Christian norms and examples in the care of the sick and the socially outcast or overlooked. Alongside such men as the Pietist August Hermann Francke, the Methodist John Wesley, Johann Wichern (the founder of the Inner Mission in Germany), and Friederich von Bodelschwingh (the founder of charitable institutions), important women have appeared as bearers of this charisma (e.g., the English nurse Florence Nightingale and the Salvation Army leader Catherine Booth). The Holy Spirit that “blows where it wills” has often been recognized as the impulse behind an enlargement of roles for women in the church. However limited these have been, they enlarged upon those that Christians inherited from Judaism. Partitions had screened women in a special left-hand section of the synagogue. While the pace of innovation was irregular, in the ecstatic worship services of the Christian congregations women tended to participate in speaking in tongues, hymns, prayer calls, or even prophecies. Evidently, this innovation was held admissible on the basis of the authority of the Holy Spirit: “Do not quench the Spirit” (1 Thessalonians 5:19). Inasmuch as the appearance of charismatic women upset traditional concepts, however, Paul reverted to the synagogal principle and inhibited the speaking role of women: “the women should keep silence in the churches.” (1 Corinthians 14:34). Because expressions of free charisma were increasingly suppressed in the institutional churches, the emergence of Pentecostal movements outside the institutional churches and partly in open opposition to them arose. This movement led to the founding of various Pentecostal Free churches at the end of the 19th century and the beginning of the 20th; it is represented through numerous independent Pentecostal groups, such as the Church of God and the Assemblies of God. At first scorned by the established churches, the Pentecostal movement has grown to a world movement with strong missionary activity not only in Africa and South America but also Europe. In the United States, a strong influence of the Pentecostal movement—which has returned high esteem to the proto-Christian charismata of speaking in tongues, healing, and exorcism—is noticeable even in the Roman Catholic, Lutheran, and Anglican churches. This has occurred especially in liturgy and church music but also in preaching style and the return to faith healing. Learn More in these related Britannica articles: Edit Mode Tips For Editing Thank You for Your Contribution! Uh Oh Keep Exploring Britannica Email this page
global_01_local_1_shard_00001926_processed.jsonl/73119
The Most Embarrassing Things People Have Done To Impress A Crush, According To Reddit Andrew Zaeh for Bustle Trying to impress your crush can lead you to do some pretty interesting things. And by interesting, I mean embarrassing. I certainly embarrassed myself more than once falling all over myself to impress someone I liked. The cringe-worthy lyrics in your AIM profile, wearing a shirt with their favorite band on it, taking up a sport that they like even though you're awful at it — I've done it all. Luckily, I'm not alone. This new Reddit thread has users sharing the silliest things they've done to impress a crush. And, damn, they're pretty embarrassing. From romantic gestures that are really larger than life to waiting on the person and doing their homework, it all happens. So if you're having flashbacks to something stupid that you've done for a crush's attention, don't worry about it. These are the kind of experiences that you look back on and learn to laugh at... eventually. They say humiliation builds character, right? The truth is, if you have a crush, rather than bending over backwards to impress them you may just want to consider going for it and asking them out. "Take a risk IRL and ask this person out on a date," Chicago-based dating expert Stef Safran tells Bustle. It'll save you all that trouble. What trouble, you ask? Well, that trouble looks a little something like this. Here are the most ridiculous things people have done to impress their crush, according to Reddit: 1This Step Too Far That is a lot of effort for, well, for literally zero reward. I don't want to think about how much this probably cost this person. 2My Dearest Mary I mean, this is amazing — and terrible. Also this person's username really, really fits. I hope they've settled lovely person who loves period dramas. I mean, that's the end goal, right? I'm guessing that the relationship didn't go well. They don't sound bitter at all. 4Getting Called Out We think we are so chill in our fourth grade displays of affection. I'm cringing just thinking about all of the obvious things I must have done throughout elementary school. This is the most tragic, but also a pretty common thing people do when they have a crush on someone. Setting them up with someone else and trying to play it so cool when your heart is actually shattered into a thousand pieces — that's just high school, right? 6The "Wrong Text" Move I have been there. I've been there on text, I've been there on AIM, I've been there on Facebook messenger. It's always super obvious, but that doesn't stop anyone. OK, this really is the dumbest decision ever. Smoking kills, people. I like that there's not more explanation as to why she tried to smash a ring on the ground until it breaks. Did she really just not like this person — or did she have a thirst for destruction? 9To The Other Side Of The World That's a properly grand romantic gesture — but at least they said it all turned out well. I mean, I don't see how it turned out well, but I'll take their word for it. And it worked, right? Hey, I'd be on board. 11A Giraffe Paint me, Jack, paint me like one of your French giraffes. 12Running For Love That may sound idiotic, but I'm sure this person is not alone. I had a friend become obsessed with ski racing, despite hating the cold and heights, just to impress a guy that she liked. It was a disaster. 13I Don't Even Know I don't really understand what happened here, but I totally love it. 14The Middleman This is worse than just setting them up with someone they like — being the middleman has the humiliation of going back and forth every day. Oof. 15Honesty Is The Best Policy? Honesty is the best policy sometimes. Sometimes. When you're not shouting it and embarrassing people. That's one way to impress them... or have them take total advantage of you all the time. One or the other. These stories are giving me way too many flashbacks to embarrassing things I did in high school. And my friends did. And basically everyone going through puberty did. It's nothing to feel bad about — it's just a part of growing up. But next time, just ask them out.
global_01_local_1_shard_00001926_processed.jsonl/73148
Action, Conspiracy Take Center Stage in "Captain America: Winter Soldier" Trailer Moments before the Super Bowl begins, Fox Sports has debuted the game-day trailer for Marvel's upcoming sequel "Captain America: The Winter Soldier." The footage details Captain America's (Chris Evans) search for the Winter Soldier (Sebastian Stan), along with a brewing conspiracy inside of S.H.I.E.L.D. There's plenty of action as well, featuring the Winter Soldier, Captain America, a high-flying Falcon (Anthony Mackie) and Black Widow (Scarlett Johansson). "How do we know the good guys from the bad guys?" Falcon asks. "If they're shooting at you they're bad," Cap replies. Check out the full trailer below. And here is the 30-second commercial that actually played before the game: Opening April 4 and directed by Joe and Anthony Russo, "Captain America: The Winter Solider" also stars Samuel L. Jackson, Cobie Smulders, Haley Atwell, Toby Jones, Emily VanCamp, Max Hernandez, Frank Grillo, Georges St-Pierre and Robert Redford. Far From Home Trailer Reportedly Changes Spider-Man/Mysterio Dynamic More in Movies
global_01_local_1_shard_00001926_processed.jsonl/73152
The Boys #31 THE SELF-PRESERVATION SOCIETY, part one. And this special four issue story arc is drawn by legendary artist and Judge Dredd co-creator - Carlos Ezquerra! Marvel Relaunches Ms. Marvel with a New, Magnificent Series More in Comics
global_01_local_1_shard_00001926_processed.jsonl/73173
8 Full-Body Exercises That Burn Fat Insanely Fast If you’re looking to lose a few pounds, you’ve come to the right place. We’ve rounded up some moves that increase your heart rate, build muscle, and burn fat way faster than your typical workout. Of course, exercise alone isn’t going to cut it. But by practicing some healthy eating habits and adding these eight moves to your workout routine, you’ll burn fat in no time. 1. Jump lunges woman doing lunges in a gym Try some jumping lunges when you’re at the gym. | iStock.com Regular lunges are already challenging, so adding a jump to the exercise yields even more benefits. PopSugar says this move will help sculpt your legs and tone your calves. Plus, the jumping component is a great way to boost your heart rate. Begin standing with your knees slightly bent and your feet staggered so your right foot is in front of your left. Jump straight up, switching your legs in the air, then land in a lunge with your left foot in front. Make sure to land with both knees bent at 90-degree angles to prevent injury. Repeat this move 20 times to complete one set. 2. Kettlebell swing Man using kettlebell at gym Kettlebell swings are tough but effective. | iStock.com Men’s Fitness explains the kettlebell swing is an explosive, full-body exercise that builds strength and helps improve power and posture. Begin standing with your feet shoulder-width apart, knees slightly bent and toes pointed out. Hold a kettlebell with both hands so it hangs between your legs. Hinging at the hips, lower your body into a squat position. Then, extend your hips to come to standing while swinging the kettlebell in front of you, squeezing your glutes at the top of the move. From there, let the weight swing back down as you come back into the squat. Repeat the motion until fatigued. 3. Dumbbell squat and press muscular man holding dumbbells to get ready to lift Perform dumbbell squat and presses for a full-body exercise. | iStock.com The dumbbell squat and press is a great move that works your entire body, which you can see over at Men’s Health. You’ll begin standing with your feet shoulder-width apart as you hold a pair of dumbbells right in front of your shoulders, palms facing each other. Lower your body into a squat while rotating the dumbbells so your palms face you, then extend your legs as you push your arms above your head, turning your wrists until your palms are facing away from you. Repeat until exhaustion. 4. Box jumps Fit young woman box jumping at a gym Box jumps are really tough. | iStock.com/Ammentorp Photography Box jumps are great for burning fat, helping with balance and coordination, and toning your muscles, according to mindbodygreen. All you need is a plyometric box or a raised surface you can jump on. To begin this move, lower yourself into a partial squat. Then, push off the ground as you swing your arms forward to jump on top of the box, landing with your knees slightly bent. Hop down and immediately repeat 10 to 20 times to complete one set. 5. Golf swing muscular man resting with a medicine ball in his hand This move will give you a killer core and arms. | iStock.com This move, featured by Women’s Health, works your core and arms at the same time. You’ll begin standing with your legs slightly wider than hip-width apart as you hold a medicine ball just to the right of your right hip. Then, pivot on your right foot to twist your torso to the left while swinging the medicine ball up above your left shoulder until your arms are fully extended. Return to the starting position and repeat eight times to complete one set. 6. Crunch squat man doing crunches Crunch squats are great for your lower body and abs. | iStock.com This exercise works your glutes, quads, and abs all at once, so you’ll make some serious gains. Shape says to lie down on a Bosu ball or pillow with your lower back resting on it. Engage your abs to do a crunch, then immediately use your lower body to push up to standing. Repeat 25 times to complete one set. 7. Dumbbell jacks shoulder press man holding weights This total-body move will get your blood pumping. | iStock.com Get your heart rate pumping while working your arms, shoulders, and legs with this move. Cosmopolitan explains you’ll start standing with your feet together as you hold the dumbbells just in front of your shoulders, palms facing each other. Perform an overhead press. As soon as you hands return to your shoulders, hop your feet out as you would for a jumping jack while you open your elbows out to the side and extend your arms overhead, palms facing forward. Hop back to the starting position to complete one rep. 8. Burpee man doing a plank Burpees are tough, but effective. | iStock.com No list of full-body exercises is complete without burpees. As brutal as they are, Fitness says they do an amazing job of torching calories and training your chest, core, and abs. If you aren’t already doing them, it’s time to start. Begin standing with your feet shoulder-width apart. Lower your body into a squat, place your palms on the floor below your shoulders, then hop your feet back into a plank. Jump your feet back to your hands, then immediately jump up as you extend your arms above your head. As you land, go right into the next one. Repeat the exercise until exhaustion.
global_01_local_1_shard_00001926_processed.jsonl/73199
News Flash 1 Story Posted on: November 30, 2018 Winter Parking Restrictions § 343-4 Parking restrictions. [Amended 4-6-1995 by Ord. No. 865] B. All-night parking. (1) No person, partnership, corporation, or other legal entity shall park or cause to be parked any vehicle of any kind or description on any public street or hig... Read on...
global_01_local_1_shard_00001926_processed.jsonl/73221
Tag - famous paintings Mona Lisa copies Why should you buy a portrait of someone you don’t know? Portraits were usually commissioned as a remembrance of the subject or as a part of family records. In the past, portraits were treated as a status symbol for the aristocracy. It became a medium for displaying their wealth, power and influence. Many of these portraits are now displayed in museums or kept in the private collections of other wealthy individuals. Numerous portraits painted by prominent artists are now widely reproduced and being offered for sale; certainly, paintings such as [...]
global_01_local_1_shard_00001926_processed.jsonl/73236
This is the single best thing you can do to help the environment, research finds It's all about your shopping list green countryside Getty ImagesJulian Elliott Photography Recycling, walking instead of driving your car, and completely turning off equipment when not in use, are all ways to lessen your impact on the environment. But according to a new comprehensive study, the single best thing you can do for the planet is to eliminate meat and dairy from your diet. Published in the journal Science, the research by Oxford University and Swiss agricultural research institute, Agroscope, reveals the environmental cost of food by analysing the impact of nearly 40,000 farms, and 1,600 processors, packaging types, and retailers. Advertisement - Continue Reading Below Examining the impact of different production practices and geographies across 119 different countries, the scientists created a comprehensive database of the effect of 40 major foods on the planet. The production of different foods was eco-rated based on greenhouse gas emissions, acidification, eutrophication and land use. The results of the study suggest a need for new technology to monitor agriculture, which can record information on inputs, outputs, climate, and soil, to quantify environmental impacts, and better food labelling to highlight the eco-credentials of products. “Two things that look the same in the shops can have extremely different impacts on the planet,” said Joseph Poore from the Department of Zoology and the School of Geography and Environment at Oxford University. “We currently don’t know this when we make choices about what to eat. Further, this variability isn’t fully reflected in strategies and policy aimed at reducing the impacts of farmers. "Agriculture is characterised by millions of diverse producers. This diversity creates the variation in environmental impact. It also makes finding solutions to these environmental issues challenging.” Beef is the worst culprit, with high-impact beef producers creating 105kg of CO2 equivalents and using 370 sq m of land per 100 grams of protein. This is a massive increase of 12 and 50 times greater than low-impact beef farmers. Advertisement - Continue Reading Below Getty Imagesecho The research posits that diets free from animal products deliver greater environmental benefits than purchasing sustainable meat or dairy. So a plant-based diet is best, including low-impact beans and peas, which create very little CO2 emissions in their production. Specifically, plant-based diets reduce food’s emissions by up to 73% depending where you live. We would also need 3.1 billion hectares (76%) less farmland. On the other hand, reducing consumption of animal products by 50% by avoiding the highest-impact producers achieves 73% of the plant-based diet’s greenhouse gas emission reduction. If you find the idea of completely cutting out meat too difficult, then there are always ways you can eat the food more sustainably, such as choosing ethical producers and avoiding processed meats. Aside from eliminating or reducing your consumption of meat and dairy, helping stop plastic pollution is also key in protecting the health of our planet. The experts at created a heat map to delineate where people are most talking about the problem of plastic pollution via Twitter. Based on viral hashtags in the last month, such as #plasticorplanet, #beatplasticpollution, and more, here is the map.​​ The top 10 countries most talking about plastic pollution 1. Kenya 2. India 3. Tanzania 4. Belgium 5. UK 6. Australia 7. Denmark 8. Switzerland 9. Bangladesh 10. Canada Advertisement - Continue Reading Below
global_01_local_1_shard_00001926_processed.jsonl/73269
Right now, there are some dudes over at the Crescent going, "What the hell did we just invest in again?" Is This Why Leppert Was in China? Crescent Court-based Maverick Capital -- which, says here, is "a $10 billion hedge fund" -- has gotten into the online video business. It's done sunk some $30 million into Youku, China's version of YouTube, though with slightly less "Chocolate Rain." Only problem is, the Chinese government isn't high on Youku -- hard to censor, dig? --Robert Wilonsky
global_01_local_1_shard_00001926_processed.jsonl/73310
Semantics Essay Writing Service The Run Down on Semantics Exposed HTML5 semantic factors are supported in all contemporary browsers. After the object is referenced with a pointer or a reference, a call to a digital function generally can’t be inlined, since the call has to be resolved dynamically. In prior versions the very first child element was rendered. It’s easily transportable, it’s thin, it consists of numerous, user-friendly, sophisticated functions, it gives immediate accessibility to data. Among the Internet’s major functions are to preserve and transfer knowledge through time. There are not any such definitions. Following this, you’ll have a working definition of information. A fundamental color term is defined as one which can’t be said to be a component of the significance of another simple term. Frequently, much more than the significance of a sentence is conveyed whenever someone uses it. Therefore it’s suitable for the dictionary to include things like these extended meanings as a piece of the significance of the word. Simply speaking, it doesn’t understand language. Logical languages are made to model theoretical reasoning such as mathematical proofs, whilst computer languages are designed to model a number of general and special purpose reasoning tasks. Semantics probably won’t help you learn the significance of a word you don’t understand, although it does have a lot to say regarding the patterns of meaningfulness that you see in words. Thus reference semantics ought to be used for problem-space objects. Actually, semantics is among the principal branches of contemporary linguistics. Exactly-once semantics have turned into the most desirable guarantee, but in addition a poorly understood one. A fully adequate all-natural language semantics would demand a comprehensive theory of how folks think and communicate ideas. Juliet’s dialogue for their families would be an illustration of literal meaning. The discussion in the prior few FAQs indicates a number of the compelling reasons for when member objects ought to be by reference. At length, by restricting your focus to selected parts of pure language, you may often avoid hard questions about what meanings generally speaking are. The issue with inconsistent metrics is it leads to comparisons that are useless. Well, there’s one major issue with reference semantics. The exact same problem of compositional semantics arises in the instance of pure language meaning. Semantics – the Conspiracy The stack after this kind of instruction is unconstrained, and thus believed to be polymorphic. If you attempt to run a program which is undefined (or one for which we’re missing semantics), the application will get stuck. In one typical application, there’s a program people want to use. So the entire system understands Chinese even in the event the individual who’s simulating the CPU does not. The system of language can’t be described only when it comes to extra-linguistic logic. The exact same technology is going to be applied to interactive TVs. Successful communication actually is a miracle. CBT theory and techniques require the Inductive Method. Metaphysical semantic theories try to deal with questions like semantic holism (q.v.). Many successful philosophical theories are very sketchy. The idea of blood relations offers an excellent example. You need to be ready to disgard aged ideas, look at alternatives, and even revisit ways which you could have previously dismissed. It’s an excellent concept to set a limit on the article length to around 500 words. Therefore, the feeling of a word concerns its linguistic boundaries in a specific language. The exact same is true with psychotherapy. Another excellent illustration is supplied by color provisions. Don’t worry about how your webpage appears like. A site can be thought of as a group of articles and data about a particular subject, service, or product, which might not be a personal reflection of the operator. It contains all of the info necessary to reproduce the webpage. More info about copy-vs-reference semantics is provided in the upcoming FAQs. Their advanced search option permits you to hunt for certain kinds of files including PowerPoint, and files which are only in some specific languages. One of the most important advantages of the intranet is the capability to transfer documents between the many components of an organization. By doing this, you can decrease the opportunity that altering the structure or theme of components will inadvertently impact any required JavaScript behaviour and complicated functionality. There’s no excuse to never upgrade! If people understand how and why they’re doing well, they know what things to do to carry on doing well. It is geared toward helping children to come up with their grammar. however, it is rooted in the meaning of words (semantics). If you are in possession of a little child or a younger student who needs to use the world wide web, there are a few search engines which have a reputation for being student friendly. Posted on January 19, 2018 in Uncategorized Share the Story Back to Top Share This
global_01_local_1_shard_00001926_processed.jsonl/73313
Concept Checker Answers 1. A The CDP strategy of writing out-of-the-money puts is most similar to selling insurance. A perfect market-timing strategy is consistent with the CMP strategy. The CMP strategy is a protective put'strategy that involves a long put option on the underlying asset, and the underlying asset (S&P 500), which is the same as buying insurance. 2. B A return series with high positive serial correlation (autocorrelation) is an indicator of illiquidity exposure. 3. D The three sources of return variance are: the risk factors, the pairwise covariances between each risk factor, and the residual variance. 4. D The rolling window clone's volatility will not be the same as that of the entire sample history; however, if there are no dramatic shifts in volatility, they will be similar, Although the rolling-window reduces the look-ahead bias in the fixed-weight clones, there are disadvantages, which include greater estimation error and more frequent rebalancing. 5. A The Convertible Arbitrage funds have the highest relative performance using the Sharpe measure. The following is a review of the Risk Management and Investment Management principles designed to address the AIM statements set forth by GARP®. This topic is also covered in: 0 0 Post a comment
global_01_local_1_shard_00001926_processed.jsonl/73324
My Blog Posts for tag: teeth grinding It can be alarming to be awakened in the middle of the night by a screeching, gritting sound coming from your child’s bedroom. No, it’s not a scene from a horror movie: it’s your child grinding their teeth as they sleep — a behavior so prevalent in children under eleven it’s considered normal. That doesn’t mean, however, you should completely ignore it. While it isn’t harmful for most children, a few can encounter tooth wear, pain or trouble sleeping that calls for some form of intervention. The causes for tooth grinding and similar habits known collectively as bruxism aren’t thoroughly understood, but in children it’s believed linked to the immaturity of the neuromuscular system that controls chewing. Some point to shifts from one stage of sleep to another — more than 80% of grinding episodes occur in lighter stages of sleep and only 5% to 10% during the deeper Rapid-Eye-Movement (REM) stage. It also seems prevalent in children who snore or have other symptoms of sleep apnea. One primary concern is how the behavior can affect teeth, particularly through abnormal wear. The teeth, of course, make hundreds of contacts with each other every day during eating, speaking or jaw movement. If, however, the forces generated during these contacts chronically exceed normal parameters, as with bruxism, it can cause accelerated tooth wear. This can result in a higher susceptibility to tooth decay and appearance changes later in life. If your child is exhibiting problems associated with teeth grinding, there are ways to address it. We may recommend a thin, plastic mouthguard they wear while sleeping that prevents the teeth from making solid contact with each other. We may also refer you to an ear, nose and throat specialist if we suspect signs of sleep apnea. And, children under severe psychological stress, which can also trigger teeth grinding, could benefit from behavioral therapy. The good news is most grinding habits fade as children enter their teens. In the meantime, keep a watchful eye and see us if you notice any indications this common habit is affecting their health and well-being. If you would like more information on teeth grinding habits, please contact us or schedule an appointment for a consultation. You can also learn more about this topic by reading the Dear Doctor magazine article “When Children Grind Their Teeth.”
global_01_local_1_shard_00001926_processed.jsonl/73355
Chicken Systems Translator Review Thanks to MIDI, samplers can easily talk to one another, but that doesn't mean they speak the same language. For myriad reasons, a universal sample format Publish date: Thanks to MIDI, samplers can easily talk to one another, but that doesn't mean they speak the same language. For myriad reasons, a universal sample format has never materialized, and manufacturers continue to cling tenaciously to their proprietary formats. As new hardware samplers enter the market and as powerful software samplers join their ranks, the number of sample formats has spiraled out of control, causing headaches and frustration for desktop musicians. Sample obsolescence runs rampant; selling your sampler and buying a different model usually means losing a perfectly good library of sounds. Moreover, many musicians are forced to use two or more brands of samplers in their setups just so that they can access sample collections in different formats. Fortunately, Chicken Systems has confronted this file-format Tower of Babel and has, to a great extent, broken the language barrier with Translator 2.5 ($149.95). Readin' and Writin' Translator is able to read from and write to a wide assortment of popular sample formats and can even tackle several formats that one might charitably refer to as obscure. Do you want to convert your Kurzweil K2000 library to Roland XV-5080 or Korg Triton format? No problem. How about Ensoniq EPS into E-mu EIIIx or Akai S3000? Again, no problem. Tascam Giga-Studio users should be especially pleased to learn that they can now convert their old hardware-sampler libraries into Giga format. Translator supports dozens of formats, including AIFF, WAV, and SoundFont. Native-format support for Seer Systems Reality, Native Instruments Reaktor, Steinberg Halion, Emagic EXS24, and BitHeadz Unity DS-1 is also included along with support for Digidesign SampleCell and Cream-Ware Pulsar. (See the Chicken Systems Web site for a complete list of supported formats.) Translator doesn't simply convert raw samples from format to format; it also converts keymaps, Velocity switches, modulation routings, envelopes, tuning, filter settings, and many other parameters. Of course, not all parameters convert directly from one format to another. As described in the documentation, Ensoniq supports bidirectional loops, Roland supports standard forward-and-release loops, and Akai supports multiple loops. If the destination sampler doesn't support the appropriate type of looping, Translator alters the samples to simulate the appropriate effect. In a similar way, the program compensates (when possible) for differences in sampler architectures to yield a suitable result. For example, Translator automatically compensates for the Frequency Emphasis boost in Roland S-series samplers so incoming samples from other devices won't sound dull on a Roland instrument and so exported Roland samples won't sound abnormally bright in other formats. Language Master Translator's user interface is simplicity itself. The main window presents a hierarchical file-tree display that resembles Windows Explorer. The computer's DOS-formatted hard drives appear at the beginning of the list, followed by any attached SCSI, ATAPI (IDE), or USB drives with proprietary formatting, such as Roland, E-mu, Akai, Kurzweil, and Yamaha. You can also create virtual drives (large files on your computer's hard drive) that are formatted in any supported proprietary format — a handy feature for burning your own sample CDs. To help locate specific files, you can audition samples directly from disk. To translate a file, simply select and drag it from a sample CD or hard drive and drop it onto another drive (real or virtual) after specifying the new format. You can also right-click on your files to select and convert them in a similar manner. Translator lets you convert a single sample, preset, or program, and you can batch-convert banks, volumes, and complete directories. If you select an entire CD of samples and convert them all at once, you can sit back and watch as Translator whizzes through the files and writes them onto the destination drive. Most of the time, the batch conversion goes without a hitch; occasionally, though, a patch has trouble, which triggers a dialog box explaining the problem. Chicken Systems is quite responsive to those glitches and encourages users to send in errant files for analysis. Although Translator officially supports only CD-ROMs, hard drives, and magneto-optical (MO) drives, it does include four unsupported utilities that can read floppies from Ensoniq, Akai, Roland, and E-mu Emax sample libraries. The conversion process can be somewhat tricky, and the results are not always predictable, but the handy utilities may help you resurrect an old collection of patches that might otherwise be lost to the sands of time. Sampler Helper Translator's seemingly simple operation belies its complex and sophisticated inner workings. It's no simple task making samplers multilingual, and Chicken Systems accepts the challenge with zeal. As the company states, Translator is “the indispensable sampler utility that no sampling musician can live without.” Unless you've never had to use more than one sample library and one sampler, I would have to agree. Overall EM Rating (1 through 5): 4.5 Chicken Systems, Inc.; tel. (800) 877-6377 or (320) 235-9798; e-mail; Web
global_01_local_1_shard_00001926_processed.jsonl/73363
Struggling with your numbers? Let the free Epilio Calculator Plug-in for IBM Lotus Sametime help you. You can use the Epilio Calculator Plug-in to perform any of the standard operations for which you would normally use a handheld calculator. The Epilio Calculator performs basic arithmetic, such as addition, subtraction, multiplication and division. Highslide JS The Calculator plug-in requires Sametime 7.5.1 or later. The plug-in can be installed from the Epilio Sametime Free Plug-ins update site.
global_01_local_1_shard_00001926_processed.jsonl/73369
Hebrews 2:7; Hebrews 2:9 You made him for a little while lower than the angels; you have crowned him with glory and honor,1 But we see him owho for a little while was made lower than the angels, namely Jesus, pcrowned with glory and honor qbecause of the suffering of death, so that by the grace of God he might rtaste death sfor everyone.
global_01_local_1_shard_00001926_processed.jsonl/73423
How The Sounds You Hear Make Your Food Taste Better I once took a bite of fruit that made the crispest sound like a fresh apple. It was a loud crunch. The memory would’ve been good had I actually been eating an apple. But no, it was a banana. While I don’t exactly remember the flavor (Honestly, it was pretty flavorless), the icky sound from 13 years ago stayed firmly in my mind. It was then and there that I realized how sound can affect the way we taste just as much as flavor or look. Soggy or crunchy?Imgorthand/Getty Images This concept is certainly familiar to Charles Spence, a gastrophysicist and Professor of Experimental Psychology who has spent the past 20 years researching on the influence of our four other senses on our assessment of taste at the University of Oxford. In 2008, Spence and Max Zampini published their IgNobel prize-winning study on “sonic chip,” involving 20 volunteers judging the freshness of 180 Pringles (that’s about 2 tubes) while manipulating the crunching sounds that people heard over headphones. As it turns out, making the crunch louder resulted in people perceiving the chip to be around 15% crunchier and fresher than if quieter sounds are played back instead. However, as demonstrated by my crispy banana story, louder, crunchier sounds don’t necessarily make all food taste better. Spence noted, Aside from the withdrawn Sun Chips packaging by Frito Lay due to its excessive noise back in 2010, one of the biggest problems at the moment lies in those incredibly noisy restaurants in the States (especially in NYC). With certain background noise or music levels exceeding 100dB, diners are effectively hampered in their ability to taste and enjoy the food. But first and foremost, how do sounds even affect our taste at all? To answer this question, Spence shares an excerpt from his latest book Gastrophysics: The New Science of Eating, published by Viking on June 20. The sound of food Many of the food properties that we all find highly desirable—think crispy, crackly, crunchy, carbonated, and, of course, squeaky (like halloumi cheese)—depend, at least in part, on what we hear. Most of us are convinced subjectively that we “feel” the crunch of the crisp. However, this is simply not the case. Introspection, after all, often leads us astray and, based on the results of the gastrophysics research, I can assure you nowhere is this more true than in the world of flavor. (Take, for instance, the experience of carbonation. Most people, if you ask them, will swear blind that they enjoy the “feel” of the bubbles bursting or exploding in their mouths. It turns out, though, that the sensation is actually mediated largely by the sour receptors on the tongue; i.e., by the sense of taste, not by the sense of touch at all.) Given that we don’t have touch receptors on our teeth, any feeling we get as we bite into or chew (masticate) a food is largely mediated by what is felt by the sensors located in the jaw and the rest of the mouth. The latter, removed as they are from the action, do not provide any especially precise information about the texture of a food. By contrast, the sounds that we hear when a food fractures or is crushed between our teeth generally provide a much more accurate sense of what is going on in our mouths. So it makes sense that we have come to rely on this rich array of auditory cues whenever we evaluate the textural properties of food. Some of these sounds are conducted via the jawbones to the inner ear, while others are transmitted through the air. Our brains integrate all of these sounds with what we feel and in the case of the sonic chip this happens both immediately and automatically. And so if you change the sound, the perceived alteration in food texture that follows is experienced as originating from the mouth itself, not as a funny sound coming from your ears. This means that most of us are oblivious to just how important the sound of the crunch is to our overall enjoyment of food! And this isn’t just about the crunch: the same goes for crispy, crackly, creamy and carbonated, though the relative importance of sonic cues to our perception of texture and mouth feel probably varies for each particular attribute. My suspicion is that what we hear is probably more relevant, and hence influential, in the case of crackly, crunchy and crispy foods than in the case of carbonation and creaminess perception. Nevertheless, research points to the conclusion that what we hear plays at least some role in delivering all of these desirable mouth sensations, and more. "Gastrophysics: The New Science of Eating" by Charles SpenceCourtesy of Viking Splitting my time between New York and Hong Kong, I’m always on the prowl for the latest and greatest restaurants, food trends, and style news. I have contributed to ELLE (Hong Kong), The Knot, The Wall Street Journal Asia, and Valentino (Asia Pacific). As a history buff, I’... I’m a freelance food and luxury writer who has contributed to ELLE (Hong Kong), The Knot, the Wall Street Journal Asia, Boca Raton Observer and more. Follow me on twitter @eustaciahuen.
global_01_local_1_shard_00001926_processed.jsonl/73427
How to Switch From an Android Phone to the iPhone By Jamie Lendino, Eric GriffithFeaturesPCmag While there is an army of excellent Android phones available, that wasn't always the case; early models were sluggish, inelegant, and error-prone. That's no longer a problem, but Android fragmentation is rampant; 24,000 distinct versions of Google's mobile OS as of 2015. Continue Reading Below In comparison, the iPhone has long been a shining example of beautiful software and hardware design, controlled by Apple to ensure that its devices provide as similar an experience as possible. After 10 years, the iPhone still beckons, and now that the large-screened iPhone Pluses are readily available, it's all the more tempting to switch. Thinking of making the move? This guide will help ensure that your transition from Android to iOS is as smooth as possible. Get Ready For Your New iPhone Move to iOS AppApple took some of the hassle out of moving from Android to iOS by launching an Android app called Move to iOS (pictured below). It promises to set up a direct wireless connection from your old Android to your new iPhone, and will transfer over the following: contacts, message history, camera photos and videos, Web bookmarks, mail accounts, calendars, wallpaper, and DRM-free books. The Move to iOS app will also suggest that you download the iOS versions of the Android apps you had installed, assuming there is an iPhone equivalent. More From PCmag Note that Move to iOS only works when setting up an iPhone for the first time—it's not for transfers to an already operating iPhone. Use Google's Services If you've committed some or all of your digital life to Google services like Gmail, Drive, and Calendar, you're in luck. All the major Google services have versions for iPhone with similar, if not identical, functionality. For example, it's a breeze to use Gmail with the dedicated Gmail app on iPhone. Or sync your Gmail accounts with just about any iPhone email app, from the one that's built in, to third-party apps like our favorite, Microsoft Outlook for iPhone. Google also makes a special Google Inbox for Gmail that makes the interface even simpler. You'll also find it easy to use Google Drive to access files, or use the individual apps for Docs, Sheets, and Slides as desired for editing. This is particularly handy for your contacts. Put all your contacts into Google Contacts on Android (or using Gmail on the PC), then sync your Gmail with the iOS contacts once you're on iPhone. Apps like My Contacts not only create a backup of your contacts on Android but also make it easy to edit names on the Web and import into iOS (or vice versa). Centralize Your Media Once upon a time, iTunes was still the dominant app for listening to music, especially on PCs and Macs. Clunky as it is, iTunes—along with Apple's iCloud and iTunes Match services—made it pretty easy to access all your music across devices—but not on Android. If you've got a lot of music purchased via the Google Play store, download it to a local PC—you'll have to do it on the computer—by going to Then open iTunes on the PC and drag all your music files in. Sync it back to your iPhone by connecting it via cable to the PC while iTunes is running. Or, use iTunes Match ($25/year) to sync the music files to the cloud and access the tunes on any Windows, macOS , or iOS device. Or, don't worry about any of this and use Spotify or Apple Music or Amazon Music Unlimited, each of which cost $10 a month for streaming and offline playlist access of almost all existing music on planet Earth. Quick note: if you go with Spotify, pay for the $9.99/month Premium on the website, NOT via the app on iPhone. If you pay using iTunes, Spotify charges you $3 more per month—a markup that goes directly to Apple. Why? Apple takes a 30 percent cut of all in-app purchases made on the App Store, so Spotify passes that cost to the user. If you sign up on the Spotify website, though, you can just download the Spotify app and sign in with your Spotify Premium credentials. Media also includes photos and videos, and you may have a lot of them on your Android device. To make sure you have them at full resolution, it used to be best to plug the Android phone into the PC via a USB cable (or use a memory card if that's an option) and physically copy them to a computer hard drive for storage. You can always put a few of the pictorial faves back on the iPhone by putting them in iTunes and then synchronizing . Better yet, use a service that auto-magically backs up photos to the cloud, which you can access on both phones. The latest version of Google Photos, in particular, is all about providing unlimited storage of pictures; back them all up on your Android phone and they're all accessible on iPhone (and PC). Other services like Microsoft OneDrive, Dropbox, and Flickr all have mobile apps for both platforms that provide similar backup and access, though some of them will cost you for the space needed. This is especially nice if you keep that old Android phone around after you've switched to iOS to use as a camera or backup phone; then all pictures taken on those multiple devices get backed up in one (or multiple) spots. (Remember to open the apps every now and then to make sure the backups are taking place.) Ease the USB Cable Pain With iOS, you no longer have to connect an iPhone to your PC periodically using its proprietary cable just for backup or updates. A lot of that will happen over iCloud. You can still do it with the PC wirelessly, but the iPhone needs to be connected to a power source, a bizarre limitation. At any rate, make charging the iPhone easier by picking up a small desk dock that keeps ugly wires out of sight and makes it super easy to pop the iPhone in and out. Once You Have Your iPhone Learn the UI The iPhone has an Android-like notification bar, but it still lacks function keys or a back button. Its home screen is actually the first menu pane. You swipe between multiple menu panels, which contain icons for the apps that do everything you'd want. Swipe right from home to get to widgets; swipe down from the top of any page to get all your Notifications. A single button at the bottom of the iPhone screen returns you to the home screen. To delete or move an app, hold a finger down on any icon until they all start wiggling and then move them around or into folders (pull one icon atop another icon). Or click the X on the icon to delete the entire app (not just the icon). That home button doubles as the fingerprint scanner (called Touch ID) on newer iPhones. You can use it to not only get secure access to the iPhone (or use a 6-digit PIN), but also use Touch ID for extra access on banking apps, messaging apps, or to pay for things using Apple Pay. "Multitasking" of apps occurs automatically in the background; you can kill individual tasks by double-pressing the home button to access the App Switcher, then swipe up on any app listed to "close" it. Contrary to popular belief, however, this does not save battery or speed up your device. Apple's iOS manages how apps use memory and deactivates those not actively in use after a while unless they have privileges spelled out in the settings; mail apps or GPS apps, for example, keep working. Since the iPhone 6, there's been a difference between double-pressing, where you physically push the home button, and a quick double-tap on the button. The latter moves the top half of your screen down, so it's easier to reach things at the top using your tiny thumbs. Apple literally calls this feature "Reachability." You can turn it and many other options on or off in the iOS Settings > General > Accessibility. Don't forget to bask in the beautiful absence of bloatware on iOS (save for a handful of Apple-provided apps). It's arguably the very best thing about Apple keeping an absolute stranglehold on its hardware and operating system. And as of iOS 10, you can even delete the Apple-provided apps like Stocks, Apple Watch, Tips, etc., that no one ever uses. Dive Into the App StoreThe single best reason to switch to the iPhone remains the App Store. Google Play has largely caught up, but as a general rule, Apple's App Store still offers a greater variety. You can find many more games, and apps tend to appear on the iPhone before other platforms. Incidentally, most of this comes down to economics, rather than a religious war between the two platforms. It's just easier for iPhone developers to sell apps and get paid. That said, some consider it a monopoly for the very reason that it's the only place you can get apps. Enjoy Seamless, Stable OS updatesThere are far fewer hardware SKUs to worry about with the iPhone—no fragmentation—which greatly reduces development and QA time. Android OS revisions have become a tremendous mess over time, as various phone manufacturers and wireless carriers delay updates for months on end. Meanwhile, current iPhones get free updates with major new features on a regular basis, and nearly all of Apple's iOS updates have been stable out of the gate (with iOS 8.0.1 in 2014 being the exception to the rule). Cradle Your iPhone in a CaseThe iPhone's construction is surprisingly durable, but you still don't want to drop it. Ever. Instead, pick up a case to keep your delicate phone protected. Here's a collection for the iPhone 7: There are other cases for the 7 Plus, as well as the iPhone 6/6s and the larger iPhone 6 Plus/6s Plus. Apple also still sells a smaller iPhone SE with a 4-inch screen; get a case for that one, too. The Jailbreaking QuestionWe don't recommend jailbreaking as a rule because it could brick your iPhone and lead to all sorts of warranty-related issues. But the feds say it's legal, thankfully. For average smartphone users, the app ecosystem provides most of what people want. Still, in some cases, jailbreaking is the only way to run certain kinds of apps that Apple bans, such as retro game emulators, or do even more with the Apple Touch ID fingerprint scanner, among other things. If you're a heavy tinkerer, look into it, but be prepared for disappointment as Apple fights jailbreaking with each new release. Another option: simply stay with Android, which is far more amenable to OS meddling. This article originally appeared on
global_01_local_1_shard_00001926_processed.jsonl/73459
kitchen bedroom needs walkway improvments.. -1 reply Please wait... The Internet ends at GF 50 XP 20th November 2007 0 Uploads 119 Posts 0 Threads #1 10 years ago link to screen shot ...funny stuff the old man climbs over the table to use the bathroom? Old school pimp 50 XP 10th February 2004 0 Uploads 9,921 Posts 0 Threads #2 10 years ago You posted a pic of Forrestor. I didn't make it! 0 XP #3 10 years ago Dread pwns me! 50 XP 18th July 2006 0 Uploads 519 Posts 0 Threads #4 10 years ago His bathroom is behind where you're standing in the screenshot. So yes, he would have to jump over his table to use it. Unless of course, he was sensible and simply moved the table =p Pro-Filer thinks I'm cool!! 50 XP 10th May 2008 0 Uploads 435 Posts 0 Threads #5 10 years ago No way, he's lazy, there is a bucket there you can't see in the screenshot above :D
global_01_local_1_shard_00001926_processed.jsonl/73460
/&lt;ñïght» Clan. -1 reply Please wait... I didn't make it! 0 XP #1 12 years ago [COLOR=Teal]Clan Info: [/COLOR]Your Name: Mü§ë. (Leader) Your Clan's Name: /<ñïght» Clan Your Clan's Tags: /<ñïght[rank]Name. Your Website/Forums: http://knightclan.co.nr - Currently updating down for the moment. Your Server: [COLOR=DimGray]Server Info: [/COLOR][COLOR=SeaGreen]Saber up = Legal Kill[/COLOR], [COLOR=Blue]Force Enabled[/COLOR]. Force skills are not required, force is there for the force users and completely optional. [COLOR=DimGray]Clan Info: [/COLOR]Honor based clan, not really a typical sith/jedi theme, though. We are firm believers that loyalty and skill are the essential elements to progressing through our trials and tribulations. We play basic maps like mp/ffa3 (Tatooine) and mp/ffa5 (Taspir). But we also play special maps. We're currently in progress of getting another server. Thanks, and if you're interested please add me to xfire at [COLOR=Red]xmusex[COLOR=Black] . [/COLOR][/COLOR]
global_01_local_1_shard_00001926_processed.jsonl/73467
Ditch Witch® 920, 920L, 921, 922, 1220M1 Railhead is engineered to drill through tough rocky conditions, while the patented technology allows it to out steer every other tool on the market, typically making corrections in half the time required by other knock offs and conventional tooling. And, it allows smaller machines that had been previously unsuccessful to complete tough condition bores. Railhead bores in a manner different than any other tool. By drilling in a random elliptical pattern, Railhead creates an annular space larger than the tooling. This reduces wear, increases flow and allows for faster corrections. Railhead Housings and Rock Bits incorporate the patented "Stress Relief Structure" with the "key and keyway" design to take much of the side stress off the bolts. This greatly reduces tool loss due to bolts breaking. The newly designed round door incorporates another patent with the "Door Hold Down Tabs." Simply drop the door in place, slide it back and install the bolts in front of the door.
global_01_local_1_shard_00001926_processed.jsonl/73487
Learn Languages Online! Home  >   >   English US   >   Hindi   >   Table of contents 61 [sixty-one] Ordinal numbers ६१ [इकसठ] क्रमसूचक संख्याएँ  Click to see the text! arrow The first month is January. The second month is February. The third month is March. The fourth month is April. The fifth month is May. The sixth month is June. Six months make half a year. January, February, March, April, May and June. The seventh month is July. The eighth month is August. The ninth month is September. The tenth month is October. The eleventh month is November. The twelfth month is December. Twelve months make a year. July, August, September, October, November and December. The native language is always the most important language Our native language is the first language we learn. This happens automatically, so we don't notice it. Most people only have one native language. All other languages are studied as foreign languages. Of course there are also people who grow up with multiple languages. However, they typically speak these languages with differing levels of fluency. Often, the languages are also used differently. One language is used at work, for example. The other is used at home. How well we speak a language is dependent on multiple factors. When we learn it as small children, we typically learn it very well. Our speech center works most effectively in these years of life. How often we speak a language is also important. The more often we use it, the better we speak it. But researchers believe a person can never speak two languages equally well. One language is always the more important language. Experiments seem to confirm this hypothesis. Various people were tested in one study. Half of the test subjects spoke two languages fluently. Chinese was the native language and English the second. The other half of the subjects only spoke English as their native language. The test subjects had to solve simple tasks in English. While doing so, the activity of their brains was measured. And differences appeared in the brains of the test subjects! In the multilingual individuals, one region of the brain was especially active. The monolingual individuals, on the other hand, showed no activity in this region. Both groups solved the tasks equally fast and well. Despite this, the Chinese still translated everything into their native language… Guess the language! Chinese is the language with the most speakers worldwide. That said, there is not one but rather several Chinese languages. They all belong to the Sino-Tibetan language family. A total of about 1.3 billion people speak Chinese. The majority of those people live in the People's Republic of China or in Taiwan. The largest Chinese language is Standard Chinese, also known as Mandarin. As the official language of the People's Republic of China, it is the native language of 850 million people. Other Chinese languages are often only recognized as dialects. Mandarin is understood by almost all Chinese-speaking people. All Chinese have a common writing system that is between 4000 and 5000 years old. For this reason, Chinese has the longest literary tradition of any language. Chinese characters are more difficult than alphabetic systems. The grammar is relatively easy to learn, however, which allows a person to advance quickly. And more and more people want to learn Chinese. Have the courage to try it - Chinese is the language of the future! LICENCE AGREEMENT. Please report any mistakes or incorrect translations here. book2 English US - Hindi for beginners
global_01_local_1_shard_00001926_processed.jsonl/73496
Steamed Chinese Dumplings Mary Ellen Bartley Advertisement - Continue Reading Below Cal/Serv: 44 Yields: 42 Prep Time: 0 hours 30 mins Total Time: 1 hour 0 mins 12 oz. lean ground beef 1 c. sliced water chestnuts tbsp. Sliced scallions 1 tbsp. each minced garlic and ginger 1 tbsp. each lite soy sauce and rice wine vinegar 1 package wonton wrappers Dipping Sauce 1/2 c. each lite soy sauce and rice wine vinegar 2 tbsp. Sliced scallions 1 tsp. each minced ginger, dark sesame oil and sugar 1/4 tsp. crushed red pepper flakes 1. Put a steamer basket into a large nonstick skillet. Add just enough water to almost come up to the bottom of the basket. Line a baking sheet with foil or wax paper. Fill a small bowl with water. 2. Combine beef, water chestnuts, scallions, garlic, ginger, soy sauce and vinegar in a bowl. Mix with your hands or a wooden spoon until blended. 3. Put 4 wonton wrappers on work surface. Place 1 heaping tsp beef mixture in center of each. Dip your finger in bowl of water and run it along edges of wrappers. Bring up 1 set of opposite corners of wrapper over filling and pinch to seal. Bring up other set of opposite corners and pinch to seal. Place on prepared baking sheet. Repeat with remaining filling and wrappers. 4. Put as many dumplings as will fit in an even layer in steamer basket. Cover and steam 10 to 12 minutes until dough is tender and center is cooked through (you'll need to cut one open to check). Remove dumplings and repeat with remaining dumplings. (If the first batch cools off before serving, they can be reheated in microwave.) 5. Stir all ingredients in a small bowl until blended and sugar dissolves. Serve with dumplings. Advertisement - Continue Reading Below More From Food & Recipes
global_01_local_1_shard_00001926_processed.jsonl/73501
Geometry: Common Core (15th Edition) Published by Prentice Hall ISBN 10: 0133281159 ISBN 13: 978-0-13328-115-6 Chapter 1 - Tools of Geometry - 1-2 Points, Lines, and Planes - Practice and Problem-Solving Exercises - Page 18: 59 Infinite Amount Work Step by Step There an infinite amounts of planes that can intersect the three collinear points that in the same line. Update this answer! Update this answer
global_01_local_1_shard_00001926_processed.jsonl/73502
Physics for Scientists and Engineers: A Strategic Approach with Modern Physics (4th Edition) Published by Pearson ISBN 10: 0133942651 ISBN 13: 978-0-13394-265-1 Chapter 12 - Rotation of a Rigid Body - Exercises and Problems - Page 332: 43 The angular momentum is $0.025~kg~m^2/s$. Work Step by Step We can express the angular velocity in units of rad/s as: $\omega = (600~rpm)(\frac{2\pi~rad}{1~rev})(\frac{1~min}{60~s})$ $\omega = 20\pi~rad/s$ We then find the moment of inertia of the disk; $I = \frac{1}{2}MR^2$ $I = \frac{1}{2}(2.0~kg)(0.020~m)^2$ $I = 4.0\times 10^{-4}~kg~m^2$ Next, we find the angular momentum about the axle: $L = I~\omega$ $L = (4.0\times 10^{-4}~kg~m^2)(20\pi~rad/s)$ $L = 0.025~kg~m^2/s$ The angular momentum is $0.025~kg~m^2/s$. Update this answer! Update this answer
global_01_local_1_shard_00001926_processed.jsonl/73516
How To Replace Speakers Aside from swapping out a blown or damaged speaker, why would you bother replacing the speakers in your guitar rig? Well, by considering different magnet types, power ratings, and impedances, you may improve your amp’s (or speaker cab’s) tone and performance, and tailor its sound to better deliver all the nuances of your playing. It’s really not difficult to replace your own speakers and experiment with different models until you find your perfect match. Here’s a step-by-step guide. Publish date: Most speaker manufacturers have pretty solid Web sites loaded with info on how their different models are voiced, so start there. You can also seek out info on your favorite players’ rigs and see which speakers they load their cabs with, although other factors (such as amp, signal path, etc.) will color the sound you’re digging. Local players and guitar-oriented forums can provide excellent references, as well. Once you zero in on a few options, you should consider the speaker magnet. There are various kinds of magnets for different applications, but, for guitarists, it usually boils down to alnico or ceramic. Alnico (aluminum-nickel-cobalt) magnets have a lot of allure for blues and roots players, because as you play louder, the voice coil’s own magnetic field begins to temporarily demagnetize the alnico structure, resulting in decreased speaker movement, but also smooth compression and sweet sustain. Ceramic (strontium ferrite) magnets are far less susceptible to compression and demagnetization, so, at high volumes, the speaker simply goes as far as it can, and then breaks up with a hard, bright crunch that’s perfect for edgy rock or metal. A speaker’s power rating is another critical factor, as you’ll definitely need the speaker to handle the power your amp is pouring into it. As a rule of thumb, if your amp is rated at 60 watts, you shouldn’t use a speaker that’s rated at less than 60 watts. While cool sonic things can occur when speakers are pushed hard—as in a 30-watt Vox AC30 equipped with two 15-watt Celestion Blues—it’s probably wise to use a speaker (or combination of speakers) that can handle about twice the rated power of your amp. You’ll also need to consider impedance. For example, if the speaker in that 60-watt amp was rated at 4 ohms, then you shouldn’t replace it with anything that puts a load of less than 4 ohms on your amp’s output circuit. Less is a deceiving term, however, because when you lower the impedance, you’re actually increasing the current sent from the amp. Now, it’s one thing to blow up a speaker, but going below the impedance rating can fry the output transformer in a tube amp, or all the output transistors in a solid-state amp. Figuring total impedance for multiple speaker arrays involves Ohm’s Law and some relatively simple math (all of which can be explored in detail on the Web), but here are some common configurations: • Two 4-ohm speakers wired in series provide a total impedance of 8 ohms. • Two 8-ohm speakers wired in parallel provide a total impedance of 4 ohms. • Four 16-ohm speakers wired in series/parallel yield a total impedance of 16 ohms. What the heck is series, parallel, and series-parallel wiring? Glad you asked. Read on. Wiring Schemes Of course, the easiest way to replace two or more speakers in a cabinet is to rewire them exactly the way they were before you started futzing around. Take a digital photo for reference. If you want a little science behind the practical, however, here’s some knowledge. In many cases where two speakers are involved, the pair were likely wired in parallel—meaning all the positive terminals of each speaker are connected to the positive (tip) side of the speaker jack, and all of the negative terminals are connected to the negative (ring) side of the jack (Fig. 1). An advantage of this wiring scheme is that if one speaker blows, the remaining speaker (or speakers) will continue to get current and produce sound. In addition, as more speakers are connected, the impedance load on the amp decreases, which results in more acoustic output. In a series configuration with two speakers, the positive terminal of one speaker is connected to the positive (tip) side of the speaker jack, the negative terminal of the second speaker is connected to the negative (ring) side of the jack, and remaining positive and negative terminals on both speakers are connected together (Fig. 2). In series connections, the more speakers used, the higher the impedance, which results in a lower acoustical output. A series/parallel wiring scheme allows you to use additional speakers to increase volume, while maintaining a total impedance that’s compatible with the amplifier (usually between 2 and 16 ohms). In a typical four-speaker setup, a single wire from the positive (tip) side of the speaker jack runs to the positive terminals of speakers A and C. Next, the negative terminals of Speakers A and C are wired to the positive terminals of Speakers B and D. Finally, a loop is created by running a single wire from the negative (ring) side of the jack and splitting it between the negative terminals of Speakers B and D (Fig. 3). Getting Started Lay your amp or cab facedown (so you can easily lift the speaker in and out), unbolt the speaker from the cabinet, and get ready to detach that sucker and prep a home for your new speaker. Depending on the brand and type of speaker, it may have slide-on, pushbutton, or solder-style connections that need to be detached. For slide-ons, grab the female connector on each speaker wire and carefully work it off. Pushbuttons are easy—just depress the button with one hand, and pull the wire out with the other. To unsolder a wire from a speaker terminal, hold onto the insulated part with one hand, and apply the soldering iron with the other hand just long enough to slowly pull the wire off. Make sure you wear goggles (hot solder can splatter), and keep the window open (you’re working with a lead-based product). Now, check out the photos for help on soldering your new connections.
global_01_local_1_shard_00001926_processed.jsonl/73531
The greatest duos of all time can exist independently of each other, but should they? These are combinations and famous duos whose whole value is greater than the sum of their parts. For instance, you can have cheese (and it will be tasty) and separately you can have macaroni (and it will be curb your hunger), but put them together and boom: macaroni & cheese. These famous food pairings, partners in history, Olympic duos, and artistic duets need each other like fish needs chips. You might even say the following pairs are dynamic duos who should never be separated. Not only husband and wife, mother and father but they were also President and First Lady of America. Whilst in one of the highest powered and stressful positions in the world they have always shown love, respect and affection and generally had each other’s backs! They undoubtedly give us serious couple goals! Can you imagine Ant without Dec or Dec without Ant? I think not! This duo have the perfect comedy recipe to make them a British double act cherished and loved by the nation. There’s nothing more that the British love than getting behind a sporting duo! Steve Redgrave and Matthew Pinsent became rowing legends for their outstanding success in the Olympics. Two of the greatest athletes Britain has ever produced. They also took golds when they were separated – but it is as a team that they will be most remembered. Are there two more iconic women in music than Mariah Carey and Witney Huston? Obviously these women are astonishing alone but could it get much better then when they came together to perform the duet of ‘when you believe’…! When it comes to skin care and looking your best there’s not much point having an immaculate complexion if you have stressed looking eyes. That’s why HealGel Intensive and Eye work so well together to rejuvenate a dull complexion and revive tired, puffy eyes to provide you with the perfect combination. Making them the ‘Winning Duo’ for your skin care routine!  😉
global_01_local_1_shard_00001926_processed.jsonl/73540
Question Info This question is public and is used in 1 group and 663 tests or worksheets. Type: Multiple-Choice Category: Conjunctions Level: Grade 7 Score: 5 Author: DSnamor Last Modified: 2 years ago View all questions by DSnamor. Conjunctions Question View this question. Grade 7 Conjunctions Finish the sentence. Coordinating conjunctions 1. are the generalists of the modifier family. 2. join two phrases or clauses that are not of equal importance. 3. join words and groups of words of equal importance.
global_01_local_1_shard_00001926_processed.jsonl/73576
Top 10 Reasons To Pardon A Turkey this Thanksgiving If you wouldn't eat your cat, you shouldn't eat a turkey. As poultry scientist Tom Savage says, "I've always viewed turkeys as smart animals with personality and character, and keen awareness." 12/24/2008 05:12am ET | Updated November 17, 2011 Did Sarah Palin's recent interview in front of a turkey slaughter operation cause you to almost lose your lunch? If so, you're not alone. Even conservative pundit Joe Scarborough says he may well skip the bird this year. With Thanksgiving upon us, here without further ado are PETA's top ten reasons to pardon a turkey this Holiday season: 10. If you wouldn't eat your cat, you shouldn't eat a turkey. As poultry scientist Tom Savage says, "I've always viewed turkeys as smart animals with personality and character, and keen awareness of their surroundings. The 'dumb' tag simply doesn't fit." They're as interesting and have personalities every bit as developed as any dog or cat. When they're not forced to live on filthy factory farms, turkeys spend their days caring for their young, building nests, foraging for food, taking dustbaths, preening themselves, and roosting high in trees. These social, playful birds relish having their feathers stroked and like to chirp, cluck, and gobble along to their favorite tunes. 9. Factory farms deny turkeys everything natural to them. Ben Franklin called turkeys "true American originals." He had tremendous respect for their resourcefulness, agility, and beauty. In nature, turkeys can fly 55 miles an hour, run 25 miles an hour, and live up to four years. Yet turkeys raised for food are killed when they are only 5 or 6 months old, and during their short lives, they will be denied even the simplest pleasures, like running, building nests, and raising their young. 8. Turkey consumption may kill you. Turkey flesh is brimming with fat and cholesterol. Just one homemade patty of ground, cooked turkey meat contains a whopping 244 mg of cholesterol, and half of its calories come from fat. Turkey flesh is also frequently tainted with salmonella, campylobacter bacteria, and other contaminants. And a vegan meal won't leave you sprawled on the couch, belt buckle undone, barely able to move. 7. You may stave off bird flue apocalypse. Current factory-farm conditions, in which turkeys are drugged and bred to grow so quickly that many become crippled and die from dehydration, are breeding grounds for disease. Cooking meat should kill the bird flu virus, but it can be left behind on cutting boards and utensils and spread through something else you're eating. 6. Don't support their crack habit. Dosing turkeys with antibiotics to stimulate their growth and to keep them alive in filthy, disease-ridden conditions that would otherwise kill them poses even more risks for people who eat them. Leading health organizations--including the World Health Organization, the American Medical Association, and the American Public Health Association--have warned that the farmed-animal industry is creating possible long-term risks to human health and will spread antibiotic-resistant supergerms. That's why the use of drugs to promote growth in animals used for food has been banned for many years in Europe. 5. There are healthy, humane alternatives Everyone can give thanks for Tofurky, Celebration Roast, Garden Protein's new Veggie Turkey Breast With Wild Rice and Cranberry Stuffing, and other animal-friendly holiday meals. PETA's scrumptious holiday recipes will please every palate and make it easier to give up the giblets. 4. Eating birds supports cruelty to animals. When the time comes for slaughter, turkeys are thrown into transport trucks, and at the slaughterhouse, they are hung upside-down and their heads are dragged through an electrified "stunning tank," which immobilizes them but does not kill them. Many birds dodge the tank and are still conscious when their throats are slit. If the knife fails to properly slit the birds' throats, the birds are scalded to death in the defeathering tanks. 3. Turkey consumption is bad for the environment. Turkeys and other animals raised for food produce 130 times as much excrement as the entire human population--all without the benefit of waste treatment systems. There are no federal guidelines to regulate how factory farms treat, store, and dispose of the trillions of pounds of concentrated, untreated animal excrement that they produce each year. 2. Which contributes to human starvation. You have to feed a turkey grains, soy, oats, and corn that could otherwise be fed to human beings. Only a fraction of the calories fed to a turkey are turned into meat calories. While there is ample and justified moral indignation about the diversion of 100 million tons of grain for biofuels, more than seven times as much (760 million tons) is fed to farmed animals so that people can eat meat. Is the diversion of crops to our cars a moral issue? Yes, but it's about one-eighth the issue that meat-eating is. And the number one reason to give the birds a break: Factory-farmed turkeys have nothing to be thankful for On factory farms, turkeys live for months in sheds where they are packed so tightly that flapping a wing or stretching a leg is nearly impossible. They stand mired in waste, and urine and ammonia fumes burn their eyes and lungs. To keep the birds from killing one another in such crowded conditions, parts of the turkeys' toes and beaks are cut off, as are the males' snoods (the flap of skin under the chin). All this is done without any pain relievers. A PETA investigator recently went undercover at a massive turkey breeding facility in West Virginia and documented workers stomping on turkeys, punching them, beating them with pipes and boards, and twisting their necks repeatedly. One worker even bragged about shoving a broomstick down a turkey's throat because the bird had pecked at him. Our previous investigations show that such gratuitous abuse is the norm on turkey farms. Check out for tasty alternatives that will allow the turkeys to give thanks this Holiday season along with you and your family. Happy eating!
global_01_local_1_shard_00001926_processed.jsonl/73581
1. Previous Product 10 of 10 Roadside (Emergency) Kit Price:  $52.28 In travel emergencies- be prepared with the Roadside Emergency Kit. Packaging includes. 1055 - Expression #1 of ORDER BY clause is not in GROUP BY clause and contains nonaggregated column 'hyunnet_234.o.date_purchased' which is not functionally dependent on columns in GROUP BY clause; this is incompatible with sql_mode=only_full_group_by select p.products_id, p.products_image, p.products_price, p.products_tax_class_id from orders_products opa, orders_products opb, orders o, products p where opa.products_id = '1931' and opa.orders_id = opb.orders_id and opb.products_id != '1931' and opb.products_id = p.products_id and opb.orders_id = o.orders_id and p.products_status = '1' group by p.products_id order by o.date_purchased desc limit 3
global_01_local_1_shard_00001926_processed.jsonl/73623
Scenario Generation solutions - Ortec Finance Type of System • Economic scenario generator • Portfolio analysis/hedging • Risk Management • Stress testing Type of Platform • Desktop-based • Server-based • SaaS Other Features The offering facilitates • Solvency II standard formula • Solvency II internal model • Replicating portfolios Implementation and Costs Typical implementation costs: Both the Dynamic Scenario Generator (DSG) and Risk-Neutral Scenario Generator are based on a subscription or license model. The license fee depends on the size of the client and the scope of license. How long does your software take to implement on site? For a simple configuration, the installation of the software and set-up might only require a few hours. Please name companies that use the system/solution: References are available on request.