id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_2_shard_00001658_processed.jsonl/4884
|
Are the U.S. Elections really rigged ? – Democrats
Democratic presidential candidate U.S. Senator Bernie Sanders debates former Secretary of State Hillary Clinton during the first official Democratic candidates debate of the 2016 presidential campaign in Las Vegas
Hi everyone
many people are “feeling the bern” and so I’ve been thinking about one of his catch phrases that the U.S. has a corrupt and ,more specifically, “rigged” system. By that he probably means that it is difficult for establishment outsiders to win. I decided to take a closer look at it.
Unlike in some European countries voters cannot directly pick their candidate although it can sometimes seems so. The polling stations are reporting how many percent voted for whom, but in fact this percentage only translates into the number of delegates that are available in the specific state. Among Democrats it usually works proportionately. Got a third of the vote ? Gonna get a third of available delegates. But again, it is the land of the free so each state can have slightly different rules.
The percentage is determined either through caucuses that are basically like your neighbourhood get-togethers where people publicly express support for one candidate and get to bad-mouth the other group or primaries that are simply secret ballots. Delegates themselves are usually local political leaders, activists or early supporters of a certain candidate and they are bound to vote for whoever they are awarded to.
So while this is mind-numbingly complicated, no real rigging here…wait .. what are superdelegates ? Superman, Batman, Catwoman… Sadly no (It would be so much more fun though). Superdelegates are for example members of Congress, governors, former vice-presidents and many (many) former or current officials. Among Democrats this year they constitute about 15% of the vote. In 2008 elections it was nearly 20%. So their number can change year-on-year and their minds change minute-on-minute. That basically translates to our favourite proverb : Those who have many friends become president as many times as many friends they have. Ok, maybe that doesn’t really make sense, but you know what I mean.
So is the process rigged ? If you are Bernie Sanders : Hell yeah ! If you are Hillary Clinton : *many intelligent word + smirk* I personally think the process is not rigged. Certainly overcomplicated, but not rigged. As a president you rule to all classes and people whether they are poor or rich, from Wall Street or Walmart, part of the establishment or the hippie family living next door. Maybe this superdelegate thing is just a way how to protect and maintain a stable system from crazy revolutionaries and ideologists. After all it is probably the most powerful job in the world. But again, maybe I am the crazy one here.
P.S. Far be it from me to try to influence you, but if you are feeling the bern maybe you left your oven on. Just sayin’…
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_2_shard_00001658_processed.jsonl/4916
|
Watch the Harmonizing the Major Scale online guitar lesson by Robben Ford from Chord Revolution: Foundations
Now what we're going to do, and this will really be the focus of most of what we talk about within the context of this lesson, this course - we're going to harmonize the major scale. We're in the key of E. So play the basic triad and you're going to use that same fingering. We're just going to play on the D, G, and B strings. The tonic, third, fifth. So these are our three notes of the E major scale. Which came first, the chicken or the egg? Which came first, the triad or the scale? I leave it up to you to decide. And we're going to play the tonic, third, and fifth, which would be called first position triad in the key of E. So if we take each individual note of this E triad and move it as it would naturally occur if you were playing the scale itself, the B would come up a whole step, fifth would go to the sixth. This is the third of E, which would go to the fourth naturally. The root note would go to the second naturally. So everything's going to move together instead of one note at a time. That's the only difference here.
So we have the E triad. Everything moves naturally as it would occur in the course of playing a scale with the individual notes. This chord is F# minor. It would also be referred to as the two chord. So if you hear somebody say "play the two chord in the key of E", now you know. Root. There's the two chord, which is F# minor. Now we're going to move everything again as it would move if we were playing the scale. You have the three chord, which is called G# minor in this case. The next movement is going to be the four chord, which is A major. The five chord is B major, six chord is C# minor. The seven chord is D# diminished. The octave above is again, E major. So we've just harmonized the E major scale. To me this is just like playing that E major scale and harmonizing it in that way, it sounds kind of glorious to me. It sounds kind of beautiful to me. I love the way it sounds. It's music right there. You're already playing music.
|
global_01_local_2_shard_00001658_processed.jsonl/4951
|
Friday, April 03, 2015
On a green overpass
Another hermit portrait
Hairy hermit and limpet on eelgrass; spiral tubeworms on limpet.
Just because.
1. Your hermit crab photos are so charming. You give me a peek at park of the world I seldom see.
2. That's an amazing photo.
|
global_01_local_2_shard_00001658_processed.jsonl/4966
|
From ArchWiki
(Redirected from X server)
Jump to: navigation, search
From http://www.x.org/wiki/:
Xorg (commonly referred as simply X) is the most popular display server among Linux users. Its ubiquity has led to making it an ever-present requisite for GUI applications, resulting in massive adoption from most distributions. See the Xorg Wikipedia article or visit the Xorg website for more details.
Xorg can be installed with the xorg-server package.
Additionally, some packages from the xorg-apps group are necessary for certain configuration tasks, they are pointed out in the relevant sections.
Finally, an xorg group is also available, which includes Xorg server packages, packages from the xorg-apps group and fonts.
Tip: You will typically seek to install a window manager or a desktop environment to supplement X.
Driver installation
First, identify your card:
$ lspci | grep -e VGA -e 3D
Then install an appropriate driver. You can search the package database for a complete list of open-source video drivers:
$ pacman -Ss xf86-video
Xorg searches for installed drivers automatically:
• If it cannot find the specific driver installed for the hardware (listed below), it first searches for fbdev (xf86-video-fbdev).
• If that is not found, it searches for vesa (xf86-video-vesa), the generic driver, which handles a large number of chipsets but does not include any 2D or 3D acceleration.
• If vesa is not found, Xorg will fall back to kernel mode setting, which includes GLAMOR acceleration (see modesetting(4)).
Brand Type Driver OpenGL OpenGL (Multilib) Documentation
Open source xf86-video-amdgpu mesa lib32-mesa AMDGPU
xf86-video-ati ATI
Proprietary catalystAUR catalyst-libglAUR lib32-catalyst-libglAUR AMD Catalyst
Intel Open source xf86-video-intel mesa lib32-mesa Intel graphics
Nvidia Open source xf86-video-nouveau mesa lib32-mesa Nouveau
Proprietary nvidia nvidia-utils lib32-nvidia-utils NVIDIA
nvidia-340xx nvidia-340xx-utils lib32-nvidia-340xx-utils
Other video drivers can be found in the xorg-drivers group.
Xorg should run smoothly without closed source drivers, which are typically needed only for advanced features such as fast 3D-accelerated rendering for games. The exceptions to this rule are recent GPUs (especially Nvidia GPUs), that are not supported by the open source drivers.
GPU architecture Radeon cards Open-source driver Proprietary driver
and newer
GCN 3 AMDGPU Catalyst /
GCN 2 AMDGPU* / ATI Catalyst
GCN 1 AMDGPU* / ATI Catalyst
TeraScale 2&3 HD 5000 - HD 6000 ATI Catalyst
TeraScale 1 HD 2000 - HD 4000 Catalyst legacy
Older X1000 and older not available
*: Experimental
Display manager
A convenient way to start X, but one that requires an additional application and dependencies, is by using a display manager.
To start the X server without a display manager, see xinit.
Note: Arch supplies default configuration files in /usr/share/X11/xorg.conf.d, and no extra configuration is necessary for most setups.
Xorg uses a configuration file called xorg.conf and files ending in the suffix .conf for its initial setup: the complete list of the folders where these files are searched can be found in xorg.conf(5), together with a detailed explanation of all the available options.
Using .conf files
The /etc/X11/xorg.conf.d/ directory stores host-specific configuration. You are free to add configuration files there, but they must have a .conf suffix: the files are read in ASCII order, and by convention their names start with XX- (two digits and a hyphen, so that for example 10 is read before 20). These files are parsed by the X server upon startup and are treated like part of the traditional xorg.conf configuration file. Note that on conflicting configuration, the file read last will be processed. For that reason the most generic configuration files should be ordered first by name. The configuration entries in the xorg.conf file are processed at the end.
For option examples to set, see also the fedora wiki.
Using xorg.conf
Xorg can also be configured via /etc/X11/xorg.conf or /etc/xorg.conf. You can also generate a skeleton for xorg.conf with:
# Xorg :0 -configure
This should create a xorg.conf.new file in /root/ that you can copy over to /etc/X11/xorg.conf.
Tip: If you are already running an X server, use a different display, for example Xorg :2 -configure.
Alternatively, your proprietary video card drivers may come with a tool to automatically configure Xorg: see the article of your video driver, NVIDIA or AMD Catalyst, for more details.
Note: Configuration file keywords are case insensitive, and "_" characters are ignored. Most strings (including Option names) are also case insensitive, and insensitive to white space and "_" characters.
Input devices
For input devices the X server defaults to the libinput driver (xf86-input-libinput), but xf86-input-evdev and related drivers are available as alternative.[1]
Udev, which is provided as a systemd dependency, will detect hardware and both drivers will act as hotplugging input driver for almost all devices, as defined in the default configuration files 10-quirks.conf and 40-libinput.conf in the /usr/share/X11/xorg.conf.d/ directory.
After starting X server, the log file will show which driver hotplugged for the individual devices (note the most recent log file name may vary):
$ grep -e "Using input driver " Xorg.0.log
If both do not support a particular device, install the needed driver from the xorg-drivers group. The same applies, if you want to use another driver.
To influence hotplugging, see #Configuration.
For specific instructions, see also the libinput article, the following pages below, or the Fedora wiki entry for more examples.
Mouse acceleration
See Mouse acceleration.
Extra mouse buttons
See Mouse buttons.
See libinput or Synaptics.
See Touchscreen.
Keyboard settings
See Keyboard configuration in Xorg.
Monitor settings
Getting started
Note: Newer versions of Xorg are auto-configuring, you should not need to use this.
First, create a new config file, such as /etc/X11/xorg.conf.d/10-monitor.conf.
Section "Monitor"
Identifier "Monitor0"
Section "Device"
Identifier "Device0"
Driver "vesa" #Choose the driver used for this monitor
Section "Screen"
Identifier "Screen0" #Collapse Monitor and Device section to Screen section
Device "Device0"
Monitor "Monitor0"
DefaultDepth 16 #Choose the depth (16||24)
SubSection "Display"
Depth 16
Modes "1024x768_75.00" #Choose the resolution
Note: By default, Xorg needs to be able to detect a monitor and will not start otherwise. A workaround is to create a configuration file such as the example above and thus avoid auto-configuring. A common case where this is necessary is a headless system, which boots without a monitor and starts Xorg automatically, either from a virtual console at login, or from a display manager.
Multiple monitors
See main article Multihead for general information.
See also GPU-specific instructions:
More than one graphics card
You must define the correct driver to use and put the bus ID of your graphic cards.
Section "Device"
Identifier "Screen0"
Driver "nouveau"
BusID "PCI:0:12:0"
Section "Device"
Identifier "Screen1"
Driver "radeon"
BusID "PCI:1:0:0"
To get your bus ID:
$ lspci | grep VGA
01:00.0 VGA compatible controller: nVidia Corporation G96 [GeForce 9600M GT] (rev a1)
The bus ID here is 1:0:0.
Display size and DPI
Reason: Xorg always sets dpi to 96. See this, this and finally this. (Discuss in Talk:Xorg#)
The DPI of the X server is determined in the following manner:
1. The -dpi command line option has highest priority.
2. If this is not used, the DisplaySize setting in the X config file is used to derive the DPI, given the screen resolution.
3. If no DisplaySize is given, the monitor size values from DDC are used to derive the DPI, given the screen resolution.
4. If DDC does not specify a size, 75 DPI is used by default.
In order to get correct dots per inch (DPI) set, the display size must be recognized or set. Having the correct DPI is especially necessary where fine detail is required (like font rendering). Previously, manufacturers tried to create a standard for 96 DPI (a 10.3" diagonal monitor would be 800x600, a 13.2" monitor 1024x768). These days, screen DPIs vary and may not be equal horizontally and vertically. For example, a 19" widescreen LCD at 1440x900 may have a DPI of 89x87. To be able to set the DPI, the Xorg server attempts to auto-detect your monitor's physical screen size through the graphic card with DDC. When the Xorg server knows the physical screen size, it will be able to set the correct DPI depending on resolution size.
To see if your display size and DPI are detected/calculated correctly:
$ xdpyinfo | grep -B2 resolution
Check that the dimensions match your display size. If the Xorg server is not able to correctly calculate the screen size, it will default to 75x75 DPI and you will have to calculate it yourself.
If you have specifications on the physical size of the screen, they can be entered in the Xorg configuration file so that the proper DPI is calculated (adjust identifier to your xrandr output) :
Section "Monitor"
Identifier "DVI-D-0"
DisplaySize 286 179 # In millimeters
If you only want to enter the specification of your monitor without creating a full xorg.conf create a new config file. For example (/etc/X11/xorg.conf.d/90-monitor.conf):
Section "Monitor"
Identifier "<default monitor>"
DisplaySize 286 179 # In millimeters
If you do not have specifications for physical screen width and height (most specifications these days only list by diagonal size), you can use the monitor's native resolution (or aspect ratio) and diagonal length to calculate the horizontal and vertical physical dimensions. Using the Pythagorean theorem on a 13.3" diagonal length screen with a 1280x800 native resolution (or 16:10 aspect ratio):
$ echo 'scale=5;sqrt(1280^2+800^2)' | bc # 1509.43698
This will give the pixel diagonal length and with this value you can discover the physical horizontal and vertical lengths (and convert them to millimeters):
$ echo 'scale=5;(13.3/1509)*1280*25.4' | bc # 286.43072
$ echo 'scale=5;(13.3/1509)*800*25.4' | bc # 179.01920
Note: This calculation works for monitors with square pixels; however, there is the seldom monitor that may compress aspect ratio (e.g 16:10 aspect resolution to a 16:9 monitor). If this is the case, you should measure your screen size manually.
Setting DPI manually
Note: While you can set any dpi you like and applications using Qt and GTK will scale accordingly, it's recommended to set it to 96, 120 (25% higher), 144 (50% higher), 168 (75% higher), 192 (100% higher) etc., to reduce scaling artifacts to GUI that use bitmaps. Reducing it below 96 dpi may not reduce size of graphical elements of GUI as typically the lowest dpi the icons are made for is 96.
For RandR compliant drivers (for example the open source ATI driver), you can set it by:
$ xrandr --dpi 144
Note: Applications that comply with the setting will not change immediately. You have to start them anew.
See Execute commands after X start to make it permanent.
Proprietary NVIDIA driver
DPI can be set manually if you only plan to use one resolution (DPI calculator):
Section "Monitor"
Identifier "Monitor0"
Option "DPI" "96 x 96"
You can manually set the DPI adding the options below on /etc/X11/xorg.conf.d/20-nvidia.conf (inside Device section):
Option "UseEdidDpi" "False"
Option "DPI" "96 x 96"
Manual DPI Setting Caveat
GTK very often overrides the server's DPI via the optional Xresource Xft.dpi. To find out whether this is happening to you, check with:
$ xrdb -query | grep dpi
With GTK library versions since 3.16, when this variable is not otherwise explicitly set, GTK sets it to 96. To have GTK apps obey the server DPI you may need to explictly set Xft.dpi to the same value as the server. The Xft.dpi resource is the method by which some desktop environments optionally force DPI to a particular value in personal settings. Among these are KDE and TDE.
Display Power Management
DPMS (Display Power Management Signaling) is a technology that allows power saving behaviour of monitors when the computer is not in use. This will allow you to have your monitors automatically go into standby after a predefined period of time.
The Composite extension for X causes an entire sub-tree of the window hierarchy to be rendered to an off-screen buffer. Applications can then take the contents of that buffer and do whatever they like. The off-screen buffer can be automatically merged into the parent window or merged by external programs, called compositing managers. See the following article for more information: compositing window manager
Some window managers (e.g. Compiz, Enlightenment, KWin, Marco, Metacity, Muffin, Mutter, Xfwm) do compositing on their own. For other window managers, a standalone composite manager can be used.
List of composite managers
• Compton — Compositor (a fork of xcompmgr-dana)
https://github.com/chjj/compton || compton
• Xcompmgr — Composite window-effects manager
http://cgit.freedesktop.org/xorg/app/xcompmgr/ || xcompmgr
• Unagi — Modular compositing manager which aims written in C and based on XCB
http://projects.mini-dweeb.org/projects/unagi || unagiAUR
Tips and tricks
Nested X session
Reason: mention xephyr (Discuss in Talk:Xorg#)
To run a nested session of another desktop environment:
$ /usr/bin/Xnest :1 -geometry 1024x768+0+0 -ac -name Windowmaker & wmaker -display :1
This will launch a Window Maker session in a 1024 by 768 window within your current X session.
This needs the package xorg-server-xnest to be installed.
Starting GUI programs remotely
See main article: SSH#X11 forwarding.
On-demand disabling and enabling of input sources
With the help of xinput you can temporarily disable or enable input sources. This might be useful, for example, on systems that have more than one mouse, such as the ThinkPads and you would rather use just one to avoid unwanted mouse clicks.
Install the xorg-xinput package.
Find the name or ID of the device you want to disable:
$ xinput
For example in a Lenovo ThinkPad T500, the output looks like this:
$ xinput
⎜ ↳ TPPS/2 IBM TrackPoint id=11 [slave pointer (2)]
⎜ ↳ SynPS/2 Synaptics TouchPad id=10 [slave pointer (2)]
↳ AT Translated Set 2 keyboard id=9 [slave keyboard (3)]
↳ ThinkPad Extra Buttons id=12 [slave keyboard (3)]
Disable the device with xinput --disable device, where device is the device ID or name of the device you want to disable. In this example we will disable the Synaptics Touchpad, with the ID 10:
$ xinput --disable 10
To re-enable the device, just issue the opposite command:
$ xinput --enable 10
Alternatively using the device name, the command to disable the touchpad would be:
$ xinput --disable "SynPS/2 Synaptics TouchPad"
Killing application with hotkey
Run script on hotkey:
windowFocus=$(xdotool getwindowfocus);
pid=$(xprop -id $windowFocus | grep PID);
kill -9 $pid
Deps: xorg-xprop, xdotool
Block TTY access
To block tty access when in an X add the following to xorg.conf:
Section "ServerFlags"
Option "DontVTSwitch" "True"
Prevent a user from killing X
To prevent a user from killing when it is running add the following to xorg.conf:
Section "ServerFlags"
Option "DontZap" "True"
If a problem occurs, view the log stored in either /var/log/ or, for the rootless X default since v1.16, in ~/.local/share/xorg/. GDM users should check the systemd journal. [2]
The logfiles are of the form Xorg.n.log with n being the display number. For a single user machine with default configuration the applicable log is frequently Xorg.0.log, but otherwise it may vary. To make sure to pick the right file it may help to look at the timestamp of the X server session start and from which console it was started. For example:
$ grep -e Log -e tty Xorg.0.log
[ 40.623] (==) Log file: "/home/archuser/.local/share/xorg/Xorg.0.log", Time: Thu Aug 28 12:36:44 2014
[ 40.704] (--) controlling tty is VT number 1, auto-enabling KeepTty
• In the logfile then be on the lookout for any lines beginning with (EE), which represent errors, and also (WW), which are warnings that could indicate other issues.
• If there is an empty .xinitrc file in your $HOME, either delete or edit it in order for X to start properly. If you do not do this X will show a blank screen with what appears to be no errors in your Xorg.0.log. Simply deleting it will get it running with a default X environment.
• If the screen goes black, you may still attempt to switch to a different virtual console (e.g. Ctrl+Alt+F2), and blindly log in as root. You can do this by typing root (press Enter after typing it) and entering the root password (again, press Enter after typing it).
You may also attempt to kill the X server with:
# pkill X
If this does not work, reboot blindly with:
# reboot
Black screen, No protocol specified.., Resource temporarily unavailable for all or some users
X creates configuration and temporary files in current user's home directory. Make sure there is free disk space available on the partition your home directory resides in. Unfortunately, X server does not provide any more obvious information about lack of disk space in this case.
DRI with Matrox cards stopped working
If you use a Matrox card and DRI stopped working after upgrading to Xorg, try adding the line:
Option "OldDmaInit" "On"
to the Device section that references the video card in xorg.conf.
Frame-buffer mode problems
If X fails to start with the following log messages,
(WW) Falling back to old probe method for fbdev
(II) Loading sub module "fbdevhw"
(II) LoadModule: "fbdevhw"
(II) Loading /usr/lib/xorg/modules/linux//libfbdevhw.so
(II) Module fbdevhw: vendor="X.Org Foundation"
compiled for 1.6.1, module version=0.0.2
ABI class: X.Org Video Driver, version 5.0
(II) FBDEV(1): using default device
Fatal server error:
Cannot run in framebuffer mode. Please specify busIDs for all framebuffer devices
Uninstall the xf86-video-fbdev package.
Program requests "font '(null)'"
• Error message: "unable to load font `(null)'."
Some programs only work with bitmap fonts. Two major packages with bitmap fonts are available, xorg-fonts-75dpi and xorg-fonts-100dpi. You do not need both; one should be enough. To find out which one would be better in your case, try xdpyinfo from xorg-xdpyinfo, like this:
$ xdpyinfo | grep resolution
and use what is closer to the shown value.
Recovery: disabling Xorg before GUI login
If Xorg is set to boot up automatically and for some reason you need to prevent it from starting up before the login/display manager appears (if the system is wrongly configured and Xorg does not recognize your mouse or keyboard input, for instance), you can accomplish this task with two methods.
• Change default target to rescue.target. See systemd#Change default target to boot into.
• If you have not only a faulty system that makes Xorg unusable, but you have also set the GRUB menu wait time to zero, or cannot otherwise use GRUB to prevent Xorg from booting, you can use the Arch Linux live CD. Follow the installation guide about how to mount and chroot into the installed Arch Linux. Alternatively try to switch into another tty with Ctrl+Alt + function key (usually from F1 to F7 depending on which is not used by X), login as root and follow steps below.
Depending on setup, you will need to do one or more of these steps:
X clients started with "su" fail
If you are getting "Client is not authorized to connect to server", try adding the line:
session optional pam_xauth.so
to /etc/pam.d/su and /etc/pam.d/su-l. pam_xauth will then properly set environment variables and handle xauth keys.
X failed to start: Keyboard initialization failed
If the filesystem (specifically /tmp) is full, startx will fail. /var/log/Xorg.0.log will end with:
(EE) Error compiling keymap (server-0)
(EE) XKB: Could not compile keymap
(EE) XKB: Failed to load keymap. Loading default keymap instead.
(EE) Error compiling keymap (server-0)
(EE) XKB: Could not compile keymap
XKB: Failed to compile keymap
Keyboard initialization failed. This could be a missing or incorrect setup of xkeyboard-config.
Fatal server error:
Failed to activate core devices.
Please consult the The X.Org Foundation support at http://wiki.x.org
for help.
(II) AIGLX: Suspending AIGLX clients for VT switch
Make some free space on the relevant filesystem and X will start.
Rootless Xorg
Xorg may run with standard user privileges with the help of systemd-logind(8), see [3] and FS#41257. The requirements for this are:
• Starting X via xinit; display managers are not supported
• Kernel mode setting; implementations in proprietary display drivers fail auto-detection and require manually setting needs_root_rights = no in /etc/X11/Xwrapper.config.
If you do not fit these requirements, re-enable root rights in /etc/X11/Xwrapper.config:
needs_root_rights = yes
See also Xorg.wrap(1) and Systemd/User#Xorg as a systemd user service.
GDM also runs Xorg without root privileges by default when Kernel mode setting is used.
Broken redirection
While user Xorg logs are stored in ~/.local/share/xorg/Xorg.log, they do not include the output from the X session. To re-enable redirection, start X with the -keeptty flag:
exec startx -- -keeptty > ~/.xorg.log 2>&1
Or copy /etc/X11/xinit/xserverrc to ~/.xserverrc, and append -keeptty. See [4].
A green screen whenever trying to watch a video
SocketCreateListener error
If X terminates with error message "SocketCreateListener() failed", you may need to delete socket files in /tmp/.X11-unix. This may happen if you have previously run Xorg as root (e.g. to generate an xorg.conf).
See also
• Xplain - In-depth explanation of the X Window System
|
global_01_local_2_shard_00001658_processed.jsonl/4970
|
2018 Fix for Kernel Security Check Failure in Windows 10, 8.1 or 7
8 minute read
fix Kernel Security Check Failure
If you are reading this article, it means that you have gotten the Blue Screen of Death (BSOD). Many other users who upgraded their operating system to Windows 8.1 or Windows 10 have experienced this issue. Fortunately for you, by reading the lines below you will get a clue as why you have this issue and what you need to do to fix the “Kernel Security Check failure” BSOD on Windows 8.1 and Windows 10.
Kernel Security Check Failure
The ‘Kernel Security Check Failure‘ PC error can occur for various reasons like memory issues, virus infections, and more. However, the most common reason is that the drivers you were using for the previous Windows version are not compatible with the new Windows version. As a result, the OS gives you the ‘Kernel Security Check Failure’ error message followed by the 0x000000139 error code.
Tutorial on how to fix “Kernel Security Check failure” in Windows 8.1 or Windows 10
Quick solution to fix various PC errors
• Step 1: Download this PC Scan & Repair tool
• Step 2: Click “Start Scan” to find Windows issues that could be causing Blue Screen of Death errors in Windows 10
• Step 3: Click “Start Repair” to fix all issues (requires upgrade).
The annoying Kernel Security Check Failure error also occur in the following situations:
• Kernel Security Check Failure after sleep — this error may occur after waking your PC from sleep.
I have an HP Envy laptop and sometimes when it wakes up from sleep I get a blue screen saying that a problem has occured, its collecting necessary information and gives me the error KERNEL_SECURITY_CHECK_FAILURE. After it reaches 100% on collecting the info it seems to get stuck doing nothing and I am forced to hold the power button in order to turn the laptop off, then turn it on again.
• Kernel Security Check Failure after RAM upgrade — users report that this error message sometimes occurs after they insert a new RAM memory card.
have just tried to upgrade the RAM on my laptop from 2x 2gb to 2x4gb.
when I install the RAM and boot start the computer I get the “KERNEL SECURITY CHECK FAILURE” message.
I have gone into the bios and it seems to recognize the new ram as it shows the computer as having 8gb of RAM but when booting up the failure screen comes up just after the windows logo fist appears. I have replaced the old RAM back in and it seems to start up fine. any ideas of what I could do to fix this issue?
• Kernel Security Check Failure when playing games — if there is one thing that gamers hate, that is getting interrupted when playing their favorite games. If you’re a gamer, you probably already encountered this error quite a few times.
It had been working before, but recently, every time I try to run The Witcher 3 (just that game) I get the BSOD and informed of a KERNEL_SECURITY_CHECK_FAILURE error.
• Kernel Security Check Failure when using particular apps and programs — it seems that particular apps and programs trigger the kernel security error more frequently than others.
In this article, we’ll explain why this issue occurs and how you can fix it.
There are two possibilities to this issue, either you can get into your Windows 8.1 or Windows 10 PC and from time to time you get the “Kernel Security Check failure” Blue Screen of Death, or you simply cannot log in to your operating system and your device gives you this error message every time you power it up.
If you cannot log in at all into Windows 8.1 or Windows 10 then follow the steps below:
Kernel Security Check Failure prevents your from logging in to your PC
Solution 1— Enable legacy advanced boot menu
1. Restart your computer and insert a Windows 10 bootable media into the optical media drive. For more information on how to create a Windows 10 bootable media, check out this article.
2. On the displayed Windows Setup box, click Next
3. On the next page, click Repair your computer
4. On the ‘Choose an option’ screen, click TroubleshootKernel Security Check Failure
5. Click ‘Advanced options’Kernel Security Check Failure fix
6. Now select Command PromptKernel Security Check Failure fix error
7. On the newly opened Command Prompt window, type C: and hit Enter.
8. On C: prompt, type the following command and press Enter to enable legacy advanced boot menu:
• BCDEDIT /SET {DEFAULT} BOOTMENUPOLICY LEGACYKernel Security Check Failure fix
9. Once the command executes successfully, type EXIT to close the Command Prompt window.
10. Go back to the ‘Choose an option’ screen, click Continue and start your computer normally.
If this didn’t help, use the solution below.
Solution 2 — Use System File Checker and Memory Diagnostic
1. If your Windows 10 fails to start correctly, go to Settings , select Advabced Startup open the ‘See advanced repair options’ menu
2. In the new window, left click or tap on Troubleshoot
3. Go to Advanced Options and click or tap on Startup Settings.Kernel Security Check Failure fix
4. Left click the Restart button located in the lower right side of the screen.
5. Your operating system should boot with the minimum system requirements.
6. When your PC has booted, move the mouse over to the upper right side of the window.
7. Left click the Search feature located in the menu.
8. In the search box, type cmd.
9. Launch Command Prompt as a Administrator.kernel check failure fix
10. Type the following command: sfc /scannow and hit Enter.Kernel Security Check Failure fix
11. Wait until the scanning process completes. Type ‘Exit’ to close the Command Prompt window and hit Enter.
12. Move the mouse cursor again over to the upper right side of the screen.
13. Go to the Search feature.
14. In the search box, type memory and select Windows Memory DiagnosticKernel Security Check Failure fix
15. Run as administrator and select ‘Restart now and check for problems’Kernel Security Check Failure fix
16. After reboot, the OS will automatically check your RAM memory and display the possible reasons as to why you get the Blue Screen of Death error.
17. Reboot your PC normally.
18. Check to see if the Kernel Security Check Failure BSOD error persists.
Solution 3 — Check the memory slot
Don’t forget to check the memory slot to make sure it’s properly placed into the socket and functioning correctly.
Note: It is always a safe bet to try and replace the memory slot or change the slot in which it is plugged into the motherboard. Reboot your PC to see if the issue persists.
Solution 4 — Check your hard drive
Make sure that your hard drive functions correctly. More specifically, make sure that it is plugged in correctly into your device. If you have a spare hard drive, try changing it to see if it starts correctly.
Now, if your operating system starts and only gives you this Kernel Security Check Failure error occasionally, follow the steps below:
Solution 1 — Update your PC
Make sure that you’re running the latest Windows OS updates on your machine. As a quick reminder, Microsoft constantly rolls out Windows updates in order to improve the system’s stability and fix various issues.
To access the Windows Update section, you can simply type “update” in the search box. This method works on all Windows versions. Then go to Windows Update, check for updates and install the available updates.
Kernel Security Check Failure fix
Solution 2 — Scan your PC
Run a full system scan to detect and remove any virus or malware that potentially sneaked into your PC. Malware may cause various issues on your computer, including the Kernel Security Check Failure error.
Perform a full system scan in order to detect any malware running on your computer. You can use Windows’ built-in antivirus, Windows Defender, or third-party antivirus solutions. We recommend Bitdefender – rated as Nr. 1 world’s best Antivirus it will find all the malware on your PC and completely eliminate the threats.
Here’s how to run a full system scan on Windows 10 Creators Update:
1. Go to Start > type ‘defender’ > double click Windows Defender to launch the tool
2. In the left hand pane, select the shield iconKernel Security Check Failure fix
3. In the new window, click the Advanced scan optionKernel Security Check Failure fix
Note: If the antivirus cannot remove the malware it detected, first you should try installing a different antivirus to see if it works. If it does not, then you will most likely have to restore your operating system to a point where you did not had this issue or completely reinstall the operating system.
Solution 3 — Check your disk for errors
On Windows 10, you can run a disk check using Command Prompt.
Start Command Prompt as administrator and type the chkdsk C: /f command followed by Enter. Replace C with the letter of your hard drive partition.
As a quick reminder, if you do not use the /f parameter, chkdsk displays a message that the file needs to be fixed, but it does not fix any errors. The chkdsk D: /f command detects and repairs logical issues affecting your drive. To repair physical issues, run the /r parameter as well.
Note: This process can be time consuming. Depending on the hard drive’s memory, it can go between half an hour and two hours before it is done.
Solution 4 — Kernel Security Check Failure after overclock
If you overclocked your PC, this may explain why you’re experiencing Kernel Security Check Failure errors. Revert your PC to its default configuration and uninstall any overclocking software running on it. Then restart your device to see if the error persists.
Solution 5 — Run System Restore
If the problem started recently, run System Restore. If this issue occurred after you installed new software on your computer, this tool helps you to remove recently added apps and programs.
The System Restore option allows you to restore the previous well-performing system configuration without losing any files, except for a few customizable features and settings.
Windows 10 offers a series of advanced recovery option that allows users to clean install the OS. You can also use ‘Reset this PC’ recovery option.
1. Go to Settings > Update & Security > click on Recovery under the left pane.
2. Click on Get Started under Reset this PC > choose to Keep your files.
3. Follow the on-screen instructions to complete the reset.
The steps above showed you how to fix the “Kernel Security Check failure” error message on your Windows 8.1 or Windows 10 PC. However, if there is a hardware failure of the HDD or the RAM memory in your device, you will most likely have to replace it with a new one. If you have any additional questions regarding this subject, please don’t hesitate to write us in the comments section below and we will help you further as soon as possible.
If you’re still having issues on your PC or you simply want to avoid them for the future, we also recommend you to download this tool (100% safe and tested by us) to fix various PC problems, such as file loss, malware and hardware failure.
Here are some other similar problems that we’ve talked about in the past and you might be interested in:
Editor’s Note: This post was originally published in October, 2017 and has been since completely revamped and updated for freshness, accuracy, and comprehensiveness. Thus, this article contains up-to date information to reflect solutions available in 2018 to fix one of the most annoying BSODs in Windows 10.
For various PC problems, we recommend to use this tool.
1. Download this PC Repair Tool with Patended Technologies
|
global_01_local_2_shard_00001658_processed.jsonl/4977
|
Uther the Lightbringer
From Wowpedia
Jump to: navigation, search
For the server, see Server:Uther US.
For Uther's Warcraft II statistics, see Uther Lightbringer (Warcraft II). For Uther's Warcraft III statistics, see Uther (Warcraft III).
AllianceUther the Lightbringer
Image of Uther the Lightbringer
Title The Lightbringer,
Supreme Commander of the Paladin Order,[1]
The First Paladin,[2][3]
Lord, Sir
Gender Male
Race Human
Character class Paladin; Formerly: Knight, Cleric
Affiliation(s) Alliance of Lordaeron
Kingdom of Lordaeron
Knights of the Silver Hand
Occupation First paladin and leader of the Silver Hand
Location Various
Status Deceased
Mentor(s) Alonsus Faol
Student(s) Turalyon,[4] Arthas Menethil, Mehlar Dawnblade
Companion(s) Steadfast (steed)
Vengeance cannot be a part of what we must do. If we allow our passions to turn to bloodlust, then we will become as vile as the orcs.
— Uther to Arthas Menethil.
Lord Uther the Lightbringer, or Sire Uther Lightbringer, was the first of the five paladins of the Knights of the Silver Hand along with Turalyon, Saidan Dathrohan, Tirion Fordring, and Gavinrad the Dire. He led his order in battle against the Horde during the Second War. During the Third War, Uther was betrayed and murdered by his beloved pupil, Prince Arthas, while defending the urn carrying the ashes of Arthas' father, King Terenas.
Uther during the Second War.
Rise to paladinship
Uther was a knight and apprentice cleric to Archbishop Alonsus Faol during the First War,[5] and had been a worshiper of the Holy Light since his youth. Uther met the archbishop when he was simply Bishop Faol, and he served as Uther's spiritual advisor and mentor.
When the survivors and refugees from the south emerged in Lordaeron, Uther went to Balnir Farmstead in order to get Arthas, who was watching the birth of Invincible, back to Capital City. On their way back, the knight told the prince about the fall of Stormwind and the coming of Prince Varian Wrynn and Lord Anduin Lothar.[6]
The fall of Stormwind made Faol realize that sometimes faith was not enough to combat the evil forces of the world. He decided to create a new order that could fight the enemy with both the gift of Light and martial prowess. He offered Uther a place among them, thus the Knights of the Silver Hand – the paladins were born.[7] Faol presented each of the paladins with enchanted librams during their training that were among the church's most ancient relics. Each libram represented a core trait of the Silver Hand that Faol challenged his students to become the living embodiment of. Uther was given the Libram of Justice.[8] At the Alonsus Chapel in Stratholme,[9] Uther became the first of the new order, and their leader. It was a glorious moment for the Alliance of Lordaeron and believers of the Holy Light.
Second War and aftermath
WC2BnE logo 16x42.png This section concerns content exclusive to Warcraft II: Tides of Darkness or its expansion Beyond the Dark Portal.
Uther in WC2.
Uther as he appeared during the Second War.
Uther participated in some of the bloodiest conflicts in the Second War, including Orgrim Doomhammer's siege of Capital City, in which he aided in the victory over the Horde - weakened by Gul'dan's betrayal and the resultant redeploying of forces. When Uther the Lightbringer embarked for Caer Darrow in Darrowmere Lake on a mission to aid and comfort those suffering from the war, he was ambushed by Alterac pirates during the Battle at Darrowmere.[10][11] In the naval battle that followed, some of the sailors were captured and Uther uncovered a conspiracy which would reveal that Alterac had betrayed the Alliance. During questioning in Lordaeron's capital, they confessed their nation's treachery to the Alliance, leading to Alterac's eventual ruin.[12] Uther completely eliminated the orc presence in Lordaeron and also aided Lothar in the final battle of Blackrock Spire.[13] He was named "Lightbringer" by Turalyon, a brother paladin who he had trained[4] and the lieutenant of Anduin Lothar, after the battle of Blackrock Spire.[14] Eventually, the Lightbringer led the final assault against the Burning Blade clan at the Dark Portal alongside Turalyon.[15]
After the Horde's defeat at the end of the Second War, Uther along with Turalyon and the Knights of the Silver Hand were stationed in Stormwind City with their main base being the Cathedral of Light. The city was still being rebuilt after the First War and the Cathedral was one of the few places complete. There Uther helped the sick, injured, orphans, old and occasionally helped women give birth. However, Turalyon admits he'd rather be on a battlefield. Even Alleria shared a tease about the paladins being reduced to 'nurses'.[16]
In the years following the Second War, Uther continued to serve as a stalwart knight and cleric, protector of the Alliance and its people, and mentor to new paladins of the Silver Hand.[11] Uther maintained peace in Lordaeron by settling civil disputes among men and suppressing demi-human uprisings throughout the realm.[17] At some point, the Lightbringer visited Caer Darrow once again.[18] As he became the most elite of the remaining paladins, he began to tutor King Terenas's talented son, Prince Arthas, in the way of the Light and in fighting. He had to keep an eye on Arthas during his youth. They became good friends, and knew each other like family. He once accompanied Terenas on a diplomatic mission to Stromgarde. Uther was also present at Arthas' ceremonial of becoming a paladin and gave him a pair of ceremonial shoulder plates and the blessing of the Light. Arthas continued to train under Uther. With the passing of time, Uther increasingly withdrawn into the spiritual aspect of the Light.[19]
Of Blood and Honor
Years later, Uther led the court of Tirion Fordring in Stratholme. He heard the statements of Tirion as well as Saidan Dathrohan and Barthilas. Uther seemed to have convinced the jurors - Archmage Antonidas, Archbishop Faol, Prince Arthas and Admiral Daelin Proudmoore - to give Tirion another chance in light of his long years of service to Lordaeron and its allied kingdoms: to reaffirm his commitment to Alliance and forsake the vow to Eitrigg, which would grant Tirion a full pardon. Tirion reconfirmed his commitment to the Alliance, however he could not throw away his vow to Eitrigg. Uther, disappointed with this answer, sentenced Tirion to be cut off the Light, the paladinship and to be sent into exile. Because of their friendship however, Uther's last token to the former paladin was that his family, Karandra and Taelan, did not have to be exiled.
Coming of the Scourge
WC3RoC logo 16x32.png This section concerns content exclusive to Warcraft III: Reign of Chaos or its expansion The Frozen Throne.
Uther in Warcraft III.
Uther in Warcraft III.
As the troubles of the Third War first began, Uther was honored that Arthas joined him in defending the town of Strahnbrad from raiding orc renegades of the Blackrock Clan and the Blademaster of the Blackrock Clan, who had eluded capture under the leadership of the deadly Jubei'Thos. While Uther defended the town, Arthas engaged the encamped orcs. With Uther's help, Arthas managed to destroy the encampment, and kill the blademaster.
Uther was not brought into action again until he was unexpectedly met by Jaina one day. She had come rushing from Hearthglen with news that the town was under heavy attack by the Scourge. Uther rushed to the defense with the Silver Hand at his back, but the town had taken severe damage, and Arthas was barely holding out. Horrified, humiliated, and disturbed by his near-defeat, Arthas quickly left for Stratholme, where he hoped to engage Mal'Ganis. Uther followed him, and they found that Stratholme had been infected with the Plague. Arthas, knowing what that meant, ordered Uther to purge the city. Uther, horrified, refused to do so, at which point Arthas charged him with treason, relieved him from command, suspended the paladins from service and sent them away. (see this for the conflicting info).
Uther confided in Terenas after Arthas left for Northrend and together they decided that Arthas had been compromised, most likely from the stress he endured at Hearthglen, and ordered an emissary to find him and order him to return. Arthas finally did return some weeks later, though he was somehow different. Nevertheless, Lordaeron's capital erupted in festival to celebrate their returning hero. The festivity turned to horror as Arthas proceeded into the throne room and impaled his father on the runeblade Frostmourne.
Uther's death
The tomb of Uther the Lightbringer.
The ghost of Uther the Lightbringer.
Terenas was ceremonially cremated and ensconced within a magical urn. Uther, dismayed at having lost two friends to the darkness, volunteered to personally guard the urn in Andorhal. The town was raided by Arthas and his undead minions, who sought the magical urn for necromantic purposes. Uther stood against Arthas and his minions in an epic battle and initially had the upper hand, knocking Arthas down and sending Frostmourne flying from his hands. The Light's aura around Uther grew blindingly bright as he prepared the killing blow, when suddenly the sword seemed to find its own way back into Arthas' hands and he was granted more power by the Lich King. The battle had began to turn in Arthas' favor and eventually Uther, covered in blood from his wounds, fell to his knees and told Arthas he hoped there was a special place in hell waiting for him. Arthas replied that he intended to live forever before delivering the killing blow. Uther was slain by the hands of his former pupil, whom he loved dearly.[20]
Uther's body was recovered after the battle with Arthas by followers of the Alliance and laid to rest in a great tomb. The tomb is located in the Western Plaguelands, east of Chillwind Camp - the only light in a land of darkness. The marker stone in the tomb reads:
Here lies Uther the Lightbringer
First Paladin — Founder of the Order of the Silver Hand
Uther lived and died to defend the kingdom of Lordaeron. Though he was betrayed by his most beloved student, we believe that his spirit lives on. He continues to watch over us, even as the shadows close in around our ruined land. His light is the light of all humanity - and so long as we honor his example, it shall never fade.
— Anonymous
World of Warcraft
WoW Icon update.png This section concerns content exclusive to World of Warcraft.
Originally, Uther's Tomb in the Western Plaguelands was just a point on the map. With the addition of draenei and blood elf NPCs all over Azeroth, however, it brought Uther himself - albeit in ghost form. For the Alliance, the draenei Anchorite Truuen wishes to honor Uther by finding a holy relic he possessed at the time of his death, and bringing it to his tomb. For the Horde, the blood elf Mehlar Dawnblade wishes to defile the aforementioned relic, and subsequently the tomb itself, in order to seek revenge for Uther's training of Prince Arthas - the despoiler of Quel'Thalas. Both involve travelling to the tower outside of Hearthglen to obtain the Mark of the Lightbringer.
Wrath of the Lich King
Uther does appear briefly in the Caverns of Time wing Culling of Stratholme, reenacting the events of The Culling, warning Arthas.
Halls of Reflection
Uther's soul appears to have been consumed by Frostmourne after he was slain by Arthas, as his spirit is summoned forth from the blade by Jaina Proudmoore or Sylvanas Windrunner inside the Halls of Reflection. He warns that someone must take the place of the Lich King if Arthas is destroyed, and that the Lich King can only be destroyed at the place he was created - the Frozen Throne.
Uther is also involved in the Quel'Delar quest chain. When a player enters the Halls on the quest B [80D] The Halls Of Reflection with the [Tempered Quel'Delar] and approaches Frostmourne's altar, the sword will come to life and attack the party. Uther warns that the blade draws the essence of evil from the place and that if they wish to cleanse it, they must take it to the Sunwell on the Isle of Quel'Danas.
After the Lich King's death, an adventurer that successfully helped to create [Shadowmourne] finds a [Sealed Chest], containing multiple objects, among them a [Badge of the Silver Hand], and brings it to Uther's soul at Light's Hammer, freed from the grip of Frostmourne.
Cataclysm This section concerns content exclusive to Cataclysm.
Uther's statue at Stormwind's Cathedral Square.
The Scarlet Crusade recovered the Shroud of the Lightbringer as well as other artifacts, that they relocated to the barracks at Tyr's Hand.[21] Having all been killed and then raised as undead, the Crusaders couldn't touch the holy artifacts, and so instead kept them in chests. Korfax assigned an adventurer to recover all the artifacts on behalf of the Argent Crusade.
Uther's statue also replaced that of Alonsus Faol at Stormwind's Cathedral Square. Terran "Justice" Gregory and Deva Marie honored this great hero's memorial.[22] The plaque of the statue read:
Uther the Lightbringer
A righteous Paladin, an honorable man, and a dear friend. You will never be forgotten, Brother.
Legion This section concerns content exclusive to Legion.
The Highlord of the Silver Hand and Maxwell Tyrosus travelled to Uther's tomb to ask his spirit where the Ashbringer could be. Uther answered that the Ashbringer was on the Broken Shore, near the Tomb of Sargeras. He also revealed that its wielder, Tirion Fordring, was still alive, but only for a matter of time.
Although his body was slain, it was not enough to destroy the great champion of Light that Uther was. People visiting his tomb in Western Plaguelands might be able to see the meaning of the words carved on the marker stone by his tomb, for his spirit does live on, appearing to adventurers, members of the Alliance and Horde alike. His ghost expresses wisdom; words of gratitude to those who have come to honor his memory, and words of forgiveness to those who would wish harm for him, even in death.
Uther is generally viewed as a hero and a martyr who was loyal to his nation, order and king to the death. Being the creator of the Knights of the Silver Hand, a commander during the Second War and instrumental in rallying the shaken Alliance to victory after the death of Anduin Lothar has immortalized him as one of the greatest knights and holy men ever to live in the eyes of many.
Notable appearances
Location Level range Health range
Western Plaguelands ?? 1,676,700
Culling of Stratholme (instance) 80 126,000
Halls of Reflection 80 315,000
Icecrown Citadel 80 315,000
N Paladin [98 - 110] The Light Reveals 113 1,150,587
In the RPG
Uther is the one who signed the official ousting of the traitorous Alteraci nobility.
Uther in Shadows & Light.
Though zealous and weathered, Uther's eyes show kindness and wisdom. He is Lordaeron's self-appointed defender, but regrets that violence is the only way to solve some problems. Possessing a rich, commanding voice and great physical strength, Uther is also capable of gentleness and compassion, though he does not suffer fools. He is the epitome of the paladin warrior — a mighty foe to his enemies and a bastion of hope to his allies.[23]
In combat
Uther strides directly into melee, placing himself in the center of the most brutal combat. He places himself in danger to spare his allies. He is at his peak against demons and undead, and brings his full array of spells and abilities to bear against these creatures — smites, banishing strikes, power turning, searing light from his hammer, hooks of binding and dispel evil. He uses lay on hands to blast undead that resist his hammer. Against truly mighty opponents, Uther attacks with his Big Smash feat. He prefers leading others into battle, but fights alone if the situation warrants. Uther endangers himself to help others if he must, and is willing to sacrifice himself for others — but he does not do so foolishly, as he knows how valuable he is to Lordaeron.[23]
Hammer of the Lightbringer
The two-handed hammer’s haft is polished mahogany, while the head is adamantine. A silver hand emblem rests in a bed of gold design on either side. This mighty weapon was forged when Archbishop Faol created the Knights of the Silver Hand, and the archbishop bequeathed it to the order’s first Grand Master — Uther the Lightbringer. A group of paladins recovered the hammer after Uther's death, but none has thought himself worthy of carrying the legendary weapon.[24]
Gloves of the Silver Hand
Uther Lightbringer is said to have been the first to enchant these gloves to aid him in battle against the Scourge. These are large, padded leather and mail gloves bleached pure white with the holy symbols of the Silver Hand burned into the palms. Although they are large mail items, they are remarkably light.[25]
Shroud of the Lightbringer
Although the original shroud that covered the fallen paladin Uther Lightbringer of the Knights of the Silver Hand was lost years ago in frequent skirmishes between the Scourge and the Alliance, rumors of the shroud remain. Some of the remaining priests of the Holy Light have infused linen with power in honor of their fallen champion. These shrouds are made of soft, white linen, about 6 feet by 3 feet. The divine magic used to create these creates a gray image of a dead paladin, usually the face of the creator of the shroud.[26]
The Lightbringer
Uther is universally known as the Lightbringer but he hasn't been always addressed as such. In fact it was General Turalyon who got the idea of this nickname after seeing the inspiration that the leader of the Silver Hand had on his men. When he was charged by Khadgar and Uther as Supreme Commander of the Alliance he responded:
"And I thank you, Uther the Lightbringer," Turalyon replied, and he saw the older Paladin's eyes widen at the new title. "For so shall you be known henceforth, in honor of the Holy Light you brought us this day." Uther bowed, clearly pleased, then turned without another word and walked back toward the other knights of the Silver Hand, no doubt to tell them their marching orders.[14]
In previous sources he had been known as Uther Lightbringer before that point.
Memorable quotes
Rise of the Lich King
• "Lad, no one feels ready. No one feels he deserves it. And you know why? Because no one does. It's grace, pure and simple. We are inherently unworthy, simply because we're human, and all human beings--aye, and elves, and dwarves, and all the other races--are flawed. But the Light loves us anyway. It loves us for what we sometimes can rise to in rare moments. It loves us for what we can do to help others. And it loves us because we can help it share its message by striving daily to be worthy, even though we understand that we can't ever truly become so. So stand there today, as I did, feeling that you can't possibly deserve it or ever be worthy, and know that you're in the same place every single paladin has ever stood."
Warcraft III
For gag quotes, see Quotes of Warcraft III/Human Alliance#Uther the Lightbringer.
• "Remember, Arthas. We are paladins. Vengeance cannot be a part of what we must do. If we allow our passions to turn to bloodlust, then we will become as vile as the orcs."
• "Easy, lad. Brave as you are, you can't hope to defeat a man who commands the dead all by yourself."
• "Watch your tone with me, boy. You may be the prince, but I'm still your superior as a paladin."
• "You are not my king yet, boy. Nor would I obey that command if you were!"
• "You've just crossed a terrible threshold, Arthas."
• "Damn that boy! I've got to inform King Terenas. Don't be too hard on yourself, girl. You had nothing to do with this... slaughter."
• "Your father ruled this land for seventy years, and you've ground it to dust in a matter of days." (Arthas: Rise of the Lich King lists this as fifty years.)
• "I dearly hope that there's a special place in hell waiting for you, Arthas."
World of Warcraft
Wrath of the Lich King
Main article: Quest:A Royal Escort#Notes
Main article: Quest:Frostmourne (Alliance)#Notes
Main article: Quest:Frostmourne (Horde)#Notes
Main article: Quest:The Halls Of Reflection#Notes
Main article: Quest:The Lightbringer's Redemption#Notes
Legion This section concerns content exclusive to Legion.
Main article: Quest:The Light Reveals#Notes
Trading Card Game
Icon-TCG.png This section contains information from the World of Warcraft Trading Card Game which is considered non-canon.
From him
• "By safeguarding those around him, a paladin aids in his own defense." - Devotion Aura
• "The third and most important of the Light's virtues is compassion." - Holy Light
• "My church is the field of battle." - Consecration
About him
• It was said that every enemy Uther felled strengthened his resolve. - Seal of Light
Uther is remembered by the Silver Hand and his statue is located in the Sanctum of Light. His plaque says: First paladin, father of the original Order of the Silver Hand, guiding light for all. May we honor his legacy in all that we do.
Notes & trivia
Early art of Uther.
Alternate timelines
A version of Uther existed in a timeway where history turned out completely different and which was entered by Thrall during the Cataclysm era.[38]
In Heroes of the Storm (probably non-canon), there are five versions of Uther - Uther the Lightbringer, Master Uther, Judgement Uther (who survived his clash with Arthas and now serves Varian), Lumberjack Uther, and Medic Uther.
Heroes of the Storm
Patch changes
See also
1. ^ Ultimate Visual Guide
2. ^ The Characters of Warcraft/Uther the Lightbringer
3. ^ Hearthstone - Uther Lightbringer, The Paladin
4. ^ a b Warcraft II: Beyond the Dark Portal manual, Legends of the Land, Turalyon
5. ^ Warcraft II: Tides of Darkness manual, Legends of the Land, Sire Uther Lightbringer
6. ^ Arthas: Rise of the Lich King
7. ^ Tides of Darkness, chapter 5
8. ^ World of Warcraft: Chronicle Volume 2, page 154
9. ^ N [47D] The Dreadlord Balnazzar
10. ^ The Battle at Darrowmere (WC2 Human)
11. ^ a b Uther Lightbringer, The Paladin - Hearthstone
12. ^ Betrayal and the Destruction of Alterac (WC2 Human)
13. ^ Tides of Darkness, pg. 339
14. ^ a b Tides of Darkness, pg. 359
15. ^ Warcraft II: Beyond the Dark Portal manual, The Aftermath of the Second War
16. ^ Beyond the Dark Portal
17. ^ Warcraft III: Reign of Chaos manual
18. ^ Caer Darrow Citizen
19. ^ Arthas: Rise of the Lich King
20. ^ "Path of the Damned: Digging up the Dead", Warcraft III. Blizzard Entertainment.
21. ^ N [42] Scarlet Salvage
22. ^ Screenshot on MMO-Champion/Stormwind Cataclysm Changes Section, mmo-champion.com/content/1630-Stormwind November 18, 2010
23. ^ a b Shadows & Light, pg. 55
24. ^ Shadows & Light, pg. 169
25. ^ More Magic and Mayhem, pg. 141
26. ^ More Magic and Mayhem, pg. 146 - 147
27. ^ Warcraft III manual
28. ^ Death Knight (manga), chapter 3
29. ^ Arthas: Rise of the Lich King, chapter 18
30. ^ Holy Ground: Uther's Tomb
31. ^ Tides of Darkness, chapter 20
32. ^ N Paladin [98 - 110] The Light Reveals
33. ^ N [46D] The Great Fras Siabi
34. ^ World of Warcraft: Looking for Group
35. ^ Andrea Toyias on Twitter (2016-08-09).
36. ^ Chat room transcript, HiddenFrontier.com, November 1, 2009
37. ^ Heroes of the Storm Official Game Site
38. ^ Thrall: Twilight of the Aspects
External links
Preceded by:
None (Creation of the order)
Leader of the Silver Hand
Succeeded by:
Alexandros Mograine
|
global_01_local_2_shard_00001658_processed.jsonl/4980
|
Writing on Women Writers
A site for college students to write about women writers.
Women and Social Class in Society
Leave a comment
Women and Social Class In Society
“One would expect to find a lady of title meaning with far greater encouragement than an unknown Miss Austen or Miss Bronte at the time would have met with. But one would also expect to find that her mind was disturbed by alien emotions like fear and hatred that her poems showed traces of that disturbance. Here is Lady Winchelsea, for example, I thought, taking down her poems. She was born in the year 1661. She was noble by birth and by marriage; she was childless; she wrote poetry, and one has only to open her poetry to find her bursting out in indignation against the position of women:
‘Alas! a woman that attempts the pen,
Such a presumptuous creature is esteemed,
The fault can by no virtue be redeemed.
They tell us we mistake our sex and way;
Good breeding, fashion, dancing, dressing, play,
Are the accomplishments we should desire;
To write, or read, or think, or to enquire,
Would cloud our beauty, and exhaust our time,
And interrupt the conquests of our prime,
Whilst the dull manage of a servile house
Is held by some our utmost art and use (44)’”
“…It was a thousand pities that the woman who could write like that, whose mind was turned to nature ad reflection, should have been forced to anger and bitterness. But how could she have helped herself? I asked, imagining the sneers and the laughter, the adulation of the toadies, the skepticism of the professional poet (45).”
While women’s rights have come such a long way since the sixteenth century, parallel societal expectations still dominate. The media particularly displays these uniform expectations. Cosmopolitan Magazine passionately advocates today’s woman as one with a bold career, a phenomenon so common today, but unheard of in the sixteenth century and even in Woolf’s generation. However, accompanying pictures meant to exemplify the average American woman do so, but quite unrealistically. The pictures show celebrities and models, in designer clothing, with hair and makeup professionally done. A “makeup tips” page typically follows an article like this. Cosmo glorifies the independent woman but its publications are infiltrated with dating and sex advice. All of this is what came to my mind upon reading Lady Winchelsea’s statement about “good-breeding, fashion, dancing, dressing, play.”
The pictures below are examples of women either conforming to or defying their gender role
Maybe 200 years from now, the fact that women were once advised in magazines to look a certain way will be as shocking as is to us today, the plight of the female writer in the sixteenth century. We certainly have our own “Virginia Woolfs” and “Lady Winchelseas” many of whom have also been “forced to anger and bitterness” as a result of all the “sneers and laughter” they’ve received from society. It seems as if society’s outcasts often end up glorified by culture eventually.
The chief idea of the passage is the role social class plays in opportunities for women. Lady Winchelsea was in the best possible position for being able to write because of her high standing in English society. She certainly was given far more opportunity than writers of lower class, like Jane Austen and Emily Bronte. Lady Winchelsea, however, was given a room of her own and only that. To Woolf, the bitterness in Lady Winchelsea’s writing was not ironic, despite her position and level of opportunity. Lady Winchelsea experienced natural human emotions that produced an outlook on society far ahead of its time. While she was given a room of her own, she was dissatisfied, despite society’s beliefs, at the fact that her writing would never travel further than that room. Woolf implies that a schism in social class such as this is destructive, because writing does not necessarily differ among women according to financial and social circumstances.
Jane Austen
In today’s society, wealthier women are given more opportunities and they set social standards. Women like Queen Elizabeth, Kate Middleton, and Michelle Obama are expected to adhere to certain ideals because of their power and wealth. Perhaps they too disagree with something in society, whatever that may be, just like Lady Winchelsea disagreed with the status of women in writing.
Michelle Obama Fashion, Best Campaign Looks, Fab Flash
Leave a Reply
WordPress.com Logo
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_2_shard_00001658_processed.jsonl/5010
|
Morgan Spurlock Wants to Hear about Your Failed Novel
By Jason Boog Comment
Filmmaker and author Morgan Spurlock posted a casting call for failed writers and dreamers on our job boards. The notice includes a specific request for people who have failed in their quest to write the Great American Novel.
Spurlock will choose a few lucky failures from the New York area to feature in an upcoming documentary series. If you are interested, swallow your pride and follow this link to apply for the series.
Here’s more from the post: “Is there something that you have always dreamed of doing but have been too afraid of failing to try? Did you always want to open a restaurant, write that Great American Novel or maybe even climb a mountain! If you are ready to overcome that fear of failure, then we want to hear your story. Morgan Spurlock (30 Days, Super Size Me, A Day in the Life ) is looking for real people with big dreams to be part of a new documentary-style program for Yahoo! This brand new series, Failure Club,” is about embracing the fear of failure in order to change your life. Meeting each week over the course of a year, 7 different people will come together to form this unique Club where they will help each other achieve the things they’ve only dreamed of.”
|
global_01_local_2_shard_00001658_processed.jsonl/5013
|
Good TOK Presentation Topics Based on the Recent Cognitive Studies
Good TOK Presentation TopicsUndoubtedly, each essay type is complex in its own specific way thanks to various academic requirements. However, one may find many similarities in the way all essay types can be performed. A lot depends on the discipline as well. Some are easier to explain and write about. When comparing essay writing with other kinds of activity, one may find some similarities with the scientific presentation as well.
Presentation of the TOK (theory of knowledge) topics is likewise complicated due to the variety of requirements, approaches and of course, the academic discipline. For instance, psychological papers and presentations on the issues of cognitive studies are one of the most complicated assignments. At the same time, such specification is interesting as well. There is a lot to work out and discuss. Thus, you will not be limited by the lack of information and methods to discover the studied topic.
In order to make captivating TOK presentation, you should select an intriguing and essential topic. Here is a pickup of some suitable topics:
• The idiosyncratic nature of confidence.
• A face perception method for the demonstration of familiar and unfamiliar faces.
• Laminar differences in neural activity answerable for making decisions in dorsal premotor cortex.
• Special neural tools to identify honesty and dishonesty in children.
• Tools to improve the word memorization and to increase vocabulary.
• The evidence concerning restrictions in visual working memory.
• An associative account of enhancement of word learning.
• The recent evidence on the consequences of the normal process of aging.
• How time limitation affects the process of making decisions and the variety of results.
These were a few topics of the latest cognitive studies. Yet, there are many other topics, which will help you to fulfill a really interesting research and make an impressive presentation.
How to Make TOK Presentations
It is likewise essential to learn how to prepare TOK presentation. If failing this task, you will lose important grades. Here are some useful recommendations:
• Title page. You should announce the title of your research, explain your main objectives and clarify why it is so important.
• Knowledge question (KQ). Introduce the list of your KQs and explain the way you are going to reveal all of them.
• Introduce your major claim, support it with the evidence. Give only clear and brief explanations. Don’t forget about the counterclaims if you have any. You should state some brief conclusions on each argument. Each conclusion should be explained as well. Show its relation to your main purpose.
• You should make a general summarization of the performed research. Clarify your conclusion. Don’t be afraid to mention some weak sides of your research. You can fix them all in the further researches. Try to be vivid and provide your audience with different perspectives of the same subject.
Following this structure, you will create a proper TOK presentation, which will have all chances to become successful and suit your academic goals.
|
global_01_local_2_shard_00001658_processed.jsonl/5031
|
AMC Network Entertainment LLC
This browser is supported only in Windows 10 and above.
Talking Dead Poll for Season 4 Episode 9, “After”
In The Walking Dead Mid-Season Premiere, Rick, Carl and Michonne cope with life in the aftermath of the prison battle: Rick is physically broken, Carl is forced to face the possibility of life without his father and Michonne is haunted by ghosts from her past. Without the prison walls to protect them, only the strong can survive. Who’s got what it takes? You decide…
[poll id= 4145]
Watch Talking Dead Sundays at 10/9c, then check back during the week for additional video from the latest episode.
Read More
|
global_01_local_2_shard_00001658_processed.jsonl/5043
|
This movie requires Flash Player 8. Download Flash Player 8
Existence of God: Bulletin Articles
Search :
What is Apologetics?
by Kyle Butt, M.Div.
You walk up to the man on the street and tell him that Jesus Christ loves him and died so he could receive forgiveness of his sins. You explain that everyone should obey Jesus because He is the Son of God. The man wants to know how you know this information. You inform him that the Bible, the inspired Word of God, declares it to be true. He wants to know two things: (1) How can you prove that there is a God?; and (2) How can you prove that the Bible is His Word? He is not being belligerent or cantankerous; he simply wants some good evidence that would warrant the total overhaul of his life you are asking him to make.
It is now your responsibility to present solid, rational arguments that prove the things you have affirmed. You must defend the propositions you have presented. You are appointed for the defense of the Gospel (Philippians 1:17, NKJV).
The term “apologetics” derives from the Greek word apologia, which means “to defend” or “to make a defense.” Thus, apologetics is a discipline dedicated to the defense of something. There can be as many different types of apologetics as there are beliefs in the world: atheistic apologetics, Hindu apologetics, Buddhist apologetics, Christian apologetics, ad infinitum. However, generally when the discipline is discussed, most people associate it with Christian apologetics. Therefore, for the remainder of this discussion, when I use the term apologetics, I will be referring specifically to Christian apologetics.
What is apologetics? Christian philosopher Dick Sztanyo has suggested: “Apologetics is the proclamation and defense of the gospel of Christ regardless of whenever, wherever, and by whomever it is challenged.” The apostle Peter used apologetics when he appealed to the empty tomb on Pentecost. Paul used apologetics when he quoted the stoic poets to draw attention to God’s existence as he addressed the Athenians. Christ used apologetics when He appealed to a Roman coin to prove that Jews should pay taxes. We can see, then, that the word apologetics carries no hint of “apologizing”—in the sense of being sorry or ashamed. On the contrary, the word houses the exact opposite idea of intelligent vindication by vigorous argument. In fact, Paul stated in 2 Corinthians 10:4-5: “For the weapons of our warfare are not carnal but mighty in God for pulling down strongholds, casting down arguments and every high thing that exalts itself against the knowledge of God, bringing every thought into captivity to the obedience of Christ.” Apologetics vigorously defends the truth by refuting arguments that exalt themselves above God’s Word.
What tools, then, can apologetics use to “cast down” faulty arguments? Its toolbox is as endlessly deep as it is long. Any discipline—from astronomy to zoology—can be called upon to come to the aid of apologetics. Just as Peter used the physical evidence of the empty tomb, just as Paul used contemporary literature, and jut as Jesus used an inscription on a coin, modern apologists can use archaeology, literature, science, morality, technology, and countless other facets of human life to defend Christianity. A small child can watch ants hard at work and testify to the wisdom of the book of Proverbs. An astrophysicist can contemplate the Second Law of Thermodynamics and maintain that the world will not last forever. An archaeologist can find an ancient inscription about a people known as the Hittites and assert that the Bible has accurate information about this ancient group of people. A professor of literature can read poetry from ages past and ascertain that mankind always has desired to worship a Creator Who is infinitely higher than humanity. From the heights of the mountains to the depths of the oceans, facts surface that provide an ample array of ammunition that can be fired from the cannon of apologetics.
However, the machinery of apologetics can operate only on the fuel of reason, for without reason apologetics has no sure foundation. The Merriam-Webster Collegiate Dictionary defines reason as “the power of comprehending, inferring, or thinking, especially in orderly, rational ways.” Paul contrasted reason with insanity in Acts 26:24-25: “Now as he thus made his defense, Festus said with a loud voice, ‘Paul, you are beside yourself! Much learning is driving you mad!’ But he said, ‘I am not mad, most noble Festus, but speak the words of truth and reason.’ ” God and His spokesmen always have spoken rational, reasonable truths. God employed reason to convince Isaiah’s listeners of their sin: “ ‘Come now, and let us reason together,’ says the Lord, ‘Though your sins are like scarlet, they shall be as white as snow’ ” (Isaiah 1:18). When Samuel spoke to the Israelites at the coronation of Saul, he said: “Now therefore, stand still, that I may reason with you before the Lord concerning all the righteous acts of the Lord which He did to you and your fathers” (1 Samuel 12:7). From the dawn of time, God presented man with the facts, and then allowed man to use reason to reach correct conclusions. Thus, Romans 1:20 states: “For since the creation of the world His invisible attributes are clearly seen, being understood by the things that are made….” Reason provides for the removal of all contradictory and fallacious arguments, leaving only those facts that are consistent and correct.
The Christian religion, at its core, is based upon historically verifiable facts. The Bible is not a sourcebook of wise proverbs that somehow stand upon their own merit. Without an establishment of the facts concerning the life, death, and resurrection of Jesus, the Word of God as we know it—even with all of its sound wisdom and practical guidance—is nothing more than a devotional book full of helpful platitudes that deserves to be placed on the shelf next to the Chicken Soup for the Soul series. By using historical facts that are consistent and correct, apologetics makes its defense by appealing to man’s capacity to reason. God never has desired that His human creatures blindly accept unreasonable propositions postulated by perverse persons. He does not want us to be “children, tossed to and fro and carried about with every wind of doctrine, by the trickery of men, in the cunning craftiness by which they lie in wait to deceive (Ephesians 4:14). On the contrary, He demands that we “test all things; hold fast what is good” (2 Thessalonians 5:21). In the end, however, apologetics can soften only the hearts of those who agree to be honest with themselves and to deal honestly and reasonably with the available evidence. There is much truth in the old adage: “A man convinced against his will is of the same opinion still.”
Copyright © 2001 Apologetics Press, Inc. All rights reserved.
For catalog, samples, or further information, contact:
Apologetics Press
230 Landmark Drive
Montgomery, Alabama 36117
Phone (334) 272-8558
|
global_01_local_2_shard_00001658_processed.jsonl/5076
|
Spiroflow Systems introduces a redesigned C1-2 bulk bag filler complete with programmable controller. The bulk bag filler is designed to increase filling accuracy and cycle speed and uses an automatic gain-in-weight adjustment to monitor and compensate for any weight variation. With accuracy within 1%, the C1-2 has a filling rate of up to 20 bags per minute. If also features a power height adjustment, retracting bag hooks, filling nozzle and inflatable mechanical seal and electric and pneumatic vibrators. Phone (704) 291-9595; Web www.spiroflowsystems.com
|
global_01_local_2_shard_00001658_processed.jsonl/5099
|
Sign In | Register
Ballantine Books
_PUBLISHER_ - First Edition Identification and Publisher Information
After establishing Penguin USA (1939) and Bantam Books (1945), Ian and Betty Ballantine founded Ballantine Books in 1952. At the time, paperback books had gained popularity as a result of World War II, in which they were distributed to military personnel in all theatres of war. The Ballantines took this opportunity to concentrate on paperback originals — books first published in paperback rather than hardcover. The publisher’s list spanned a variety of subjects with a particular specialty in science fiction, fantasy, Westerns, and mystery novels.
As one of the earliest publishers of science fiction paperback originals, Ballantine produced the works of Arthur C. Clarke and Frederik Pohl as well as the first authorized paperback editions of J.R.R. Tolkien’s books. From 1968 through 1975, the publisher produced 156 paperback books as a series titled Ballantine's Illustrated History of World War II, which were printed in both the United States and United Kingdom. (The series was later retitled Ballantine's Illustrated History of the Violent Century.) Random House acquired the press in 1973, allowing the Ballantines to become freelance consulting editors and publishers.
Ballantine is now one of America’s largest publishers of trade and mass-market paperbacks as well as hardcover books, touching on almost every category and genre. Notable fiction titles include Dan Chaon’s You Remind Me of Me and Gail Godwin’s Queen of the Underworld. Ballantine also published the New York Times bestseller Sugar Busters! Cut Sugar to Trim Fat by H. Leighton Steward, Morrison Bethea, M.D., Sam Andrews, M.D., and Luis Balart, M.D. The press has even had success with parenting books: Tracy Hogg’s Secrets of the Baby Whisperer and Michael Thompson’s Raising Cain.
First Edition Identification
Hardcover first editions from Ballantine Books published before 1980 have no additional printings listed. Hardcover first editions published thereafter have either "First Edition” or "First Edition (month, year)" on the copyright page along with a sequence of numbers with “1” present. First editions of Ballantine paperback originals have no additional printings listed on the copyright page. All other paperback first editions from Ballantine have either “First Printing (month, year)” or “First Edition (month, year)” on the copyright page along with a sequence of numbers with “1” present.
Notable and collectible books published by Ballantine Books
Discuss this article
Related publishers
• Oxmoor House
Oxmoor House is the book publishing division of Southern Progress Corporation based in Birmingham, Alabama. The company was founded in 1979 with the first publication...
• Arkham House
Arkham House was founded by writers August Derleth and Donald Wandrei in 1939 with the publication of its first book, Howard Phillips Lovecraft's The Outsider...
• Vintage Books
Vintage Books was founded in 1954 by Alfred A. Knopf as a trade paperback home to its authors. This imprint’s diverse publishing list includes canonical...
• Alfred A. Knopf
Alfred A. Knopf, Inc. was founded in 1915 and incorporated in 1918 with Alfred Knopf as president; his wife, Blanche Knopf, as vice president; and...
• Bodley Head
The Bodley Head was originally established in 1887 as a partnership between John Lane and Elkin Mathews to trade in antiquarian books in London. In...
Published authors
|
global_01_local_2_shard_00001658_processed.jsonl/5109
|
Peisa Valencia SA
Private Company
Company Profile
Sector: Technology
Industry: Design, Mfg & Distribution
Sub-Industry: Technology Distributors
Peisa Valencia Sa is headquartered in Spain. The Company's line of business includes the wholesale distribution of electronic parts and electronic communications equipment.
Corporate Information
Poligono Alqueria de Moret
Calle de la Martina, 16
Picanya, 46210
Web url:
Sponsored Financial Commentaries
More From The Web
|
global_01_local_2_shard_00001658_processed.jsonl/5176
|
Quotes About Philosophy
Quotes about philosophy from throughout Christian History.
Minucius Felix, A.D. 160-230
My friend Cecilius, let Socrates, the Athenian buffoon, confess that he knew nothing at all. Let all the philosophers go on deliberating. Let the great philosopher Simonides go on forever putting off a decision about what he believes.
We despise the bent brows of the philosophers, because we know them to be corrupters, adulterers, and tyrants. They have great eloquence, but they're speaking against vices that they themselves live in.
We, on the other hand, who do not carry our wisdom in our clothes, but in our minds, don't speak great things; we live them. We boast that we have found what they have sought for with the utmost eagerness but have not been able to find. (The Octavius )
Clement of Alexandria, c. A.D. 190
But philosophy, it is said, was not sent by the Lord, but came stolen or given by a thief. It was then some power or angel that had learned something of the truth, but abode not in it, that inspired and taught these things. This did not occur without the Lord's knowledge, who knew before the constitution of each essence the issues of futurity, but it did occur without his prohibition. (Miscellanies I:17)
Tertullian, c. A.D. 210
It will be said that some of us [Christians] also depart from the rules of our discipline. In that case, however, we count them no longer Christians, but the philosophers who do such things still retain the name and the honor of wisdom. So, then, where is there any likeness between the Christian and the philosopher? Between the disciple of Greece and of heaven? Between the man whose object is fame and whose object is life? Between the talker and the doer? Between the man who builds up and the man who pulls down? Between the friend and the foe of error? Between one who corrupts the truth and one who restores and teaches it? Between its chief and its custodian? (Apology 46)
Unhappy Aristotle! He invented dialectics for these [heretics], the art of building up and pulling down, an art so evasive in its propositions, so farsfetched in its conjectures, so harsh in its arguments, so productive of contentions! Embarrassing even to itself, retracting everything, and really conclusively settling nothing! From where do those fables and endless genealogies, unprofitable questions, and words that spread like a cancer spring? From all these, when the apostle would restrain us, he expressly names philosophy as the thing he would have us guard against. Writing to the Colossians, he says, "See that no one beguiles you through philosophy and vain deceit, after the traditions of men, and contrary to the wisdom of the Holy Spirit" [Col. 2:8]. (Prescription Against Heretics 6)
The apostle ... expressly names philosophy as that which he would have us be on our guard against. Writing to the Colossians, he says, "See that no one beguile you through philosophy and vain deceit, after the tradition of men, and contrary to the wisdom of the Holy Ghost" [Col. 2:8, with the last phrase adjusted a little through a memory lapse or a purposeful adjustment of his own]. He had been at Athens, and had in his interviews become acquainted with that human wisdom which pretends to know the truth while it only corrupts it and is itself divided into its own manifold heresies by the variety of its mutually repugnant sects.
What indeed has Athens to do with Jerusalem? What concord is there between the Academy and the Church? What between heretics and Christians?
Our instruction comes from "the porch of Solomon," who had himself taught that "the Lord should be sought in simplicity of heart" [Wisdom of Solomon 1:1]. Away with all attempts to produce a mottled Christianity of Stoic, Platonic, and dialectic composition! We want no curious disputation after possessing Christ Jesus, no inquisition after enjoying the gospel! With our faith, we desire no further belief. (Prescription Against Heretics 6)
Socrates Scholasticus, c. A.D. 450
Greek literature certainly was never recognized either by Christ or his apostles as divinely inspired, nor on the other hand was it wholly rejected as pernicious. And this they did, I conceive, not inconsiderately. For there were many philosophers among the Greeks who were not far from the knowledge of God ... By not forbidding the study of the learned works of the Greeks, they left it to the discretion of those who wished to do so.
This is our first argument in defense of the position we took. Another may be put this way: The divinely inspired Scriptures undoubtedly inculcate doctrines that are both admirable in themselves and heavenly in their character: they also eminently tend to produce piety and integrity of life in those who are guided by their precepts, pointing out a walk of faith which is highly approved by God. But they do not instruct us in the art of reasoning, by means of which we may be enabled successfully to resist those who oppose the truth. Besides adversaries are most easily foiled, when we can use their own weapons against them.
Should any one imagine that in making these assertions we wrest the Scriptures from their legitimate construction, let it be remembered that the apostle not only does not forbid our being instructed in Greek learning, but that he himself seems by no means to have neglected it, inasmuch as he knows many of the sayings of the Greeks. From where did he get the saying, "The Cretans are always liars, evil beasts, slow-bellies," but from a perusal of the oracles of Epimenides, the Cretan initiator? Or how would he have known " For we are also his offspring" had he not been acquainted with The Phenomena of Aratus the astronomer? Again, this sentence, "Bad company corrupt good manners," is a sufficient proof that he was conversant with the tragedies of Euripides. (Ecclesiastical History of Socrates Scholasticus III:16)
Google Search Privacy Statement
Christian-history.org does not receive any personally identifiable information from the Google search bar below. Google does run ads on the result page, which are the only ads on our site. If you click on those ads, we get a small commission, but we do not get any identifiable information.
Custom Search
– Martin Luther King, Jr.
The Early Church History Newsletter
Delivered monthly.
Back issues available.
Don't worry—your e-mail address is totally secure.
|
global_01_local_2_shard_00001658_processed.jsonl/5186
|
GED® Testing in Sunman IN
Looking for GED® testing in Sunman IN? The GED® exam is only given in person and not online. Usually to be able to take the GED® test the test taker must be at least 17 years old. The examination fee in the state of Indiana ranges from $40-$90.
Typically GED® testing locations in Sunman IN are offered at:
• Sunman Community Colleges
• Sunman ISD
• Sunman Literacy Centers
• Sunman High Schools
Directory of GED® Testing Sites in Sunman IN
Southeastern Career Center
901 W US 50
Versailles, IN
Phone: 812-689-5253
12.98 miles away
Greensburg High School
1000 E. Central Av.
Greensburg, IN
Phone: 812-663-7176
19.11 miles away
|
global_01_local_2_shard_00001658_processed.jsonl/5196
|
Netflix and Amazon don’t want to change TV. Maybe they want to replace it.
Reed Hastings, co-founder and CEO of Netflix.
Michael Newberg | CNBC
Reed Hastings, co-founder and CEO of Netflix.
Shonda Rhimes's departure from ABC to produce new shows for Netflix could not have come at a better time to intensify the fears that have been roiling the TV industry for the past several years and that have reached a fever pitch this summer.
Said fears involve the rise of tech industry-backed streaming services to such a high level of status and power that they effectively price everybody else out of the TV-making market. If you subscribe to these fears, the best-case scenario is that "everybody else," a.k.a. the more traditional broadcast and cable networks, becomes a sort of farm system for "the majors": Netflix, Amazon, and a handful of other players.
The worst-case scenario is that everybody else goes out of business, unable to compete with Netflix's spending spree, and once Netflix dominates the market, it cuts back on its total number of projects — similar to how the company reduced Blockbuster to ash just in time to shift its focus away from its DVD-by-mail service.
More from Vox:
Spotify is removing white supremacist and neo-Nazi bands from its music library
Trump sure seems slower to call out terrorism when a white supremacist is behind it
Crowds stood in line to turn themselves in for the crime of tearing down a Confederate statue
I should caution upfront that this fear is at least somewhat misguided and probably unlikely to come to pass exactly as industry pessimists worry it might. But it's easy to look at Rhimes's move to Netflix, or The Walking Dead's Robert Kirkman's move to Amazon(he'd previously produced projects for AMC and Cinemax), and wonder if at least some of those fears about "everybody else" aren't already coming to pass.
And yet one big open question remains: Is any of this hypergrowth sustainable?
Netflix is built atop a mountain of debt. The debt itself isn't unusual — but the size of it has a lot of people worried.
A recent Los Angeles Times report quantified a specific point that comes up in just about any conversation surrounding the future of the film and TV industries: Netflix is built atop a whole bunch of debt. The report estimated that Netflix's debt is around $20 billion, a stunning total for any one entertainment company.
But it's not uncommon for studios to run a deficit while producing any given project, whether it's a TV show or a film.
For most of television history, the conventional wisdom was that a studio would lose money on a TV show until it was sold into syndication — usually at the end of season four — and the studio could start to recoup its investment. The network that aired the TV show made money off it by selling ad revenue, but it was not necessarily obligated to share that ad revenue with the studio that actually made the show, because the rerun market was considered so lucrative (as long as the show lasted long enough to enter it). Now studios can make their money back more quickly, via selling of international rights, streaming rights, and other forms of ancillary revenue, but running up a debt on early seasons of a TV show is still common.
Movies, meanwhile, are produced and sold before they ever make any money at the box office, which means that even a moderately successful film can lose money if it's not budgeted properly. And studios are frequently accused of creative accounting, in which they allege that they just barely broke even on hits, in order to avoid further payouts to members of the creative team who may be entitled to a portion of post-release profits.
So there are plenty of ways to lose money in Hollywood — especially when you're building a new studio or entertainment brand. But it still takes a total boondoggle to completely lose your shirt, especially in television, where a single Friends can keep raking in cash for decades after it leaves the air.
The larger point is that Netflix running up a debt isn't all that odd; indeed, if it were the sole issue here, nobody would bat an eye. Instead, the factor that's spurred so much discussion and consternation is the size of Netflix's debt, and the fact that the company has only recently seemed to show an interest in reining in its spending, by canceling a handful of underperforming shows (only to turn right around and sign blockbuster deals with Shonda Rhimes, among others).
Netflix, like many companies in the tech industry, is funded by venture capital, which allows it to continue spending money in an effort to someday become a stable, profitable corporate monolith. But such an outcome is by no means a guarantee. Placate venture capitalists, and they'll extend what might seem like an infinite line of credit. After all, Amazon famously didn't turn a profit for most of its first two decades, and it continues to expand the lines of business it enters.
The concern is that if Netflix and Amazon aren't necessarily bound by the need to erase or lower their debt, but more conventional TV networks are, then Netflix and Amazon aren't really building TV networks. Instead, they're building alternate distribution channels that might eventually forgo the existing entertainment industry entirely, in favor of operating within the tech industry. If you look at it this way, as many in show business do, you can see the makings of a battle that isn't between, say, Netflix and HBO, but between two massive industries. And it's easy to see why those who work in TV and film fear that such a conflict could be detrimental to their continued existence.
Concern over Netflix and other streaming services is exacerbated by the mystery surrounding them
Viewed through this lens, the frequent, industry-wide calls for Netflix to release its viewership data are thrown into sharper relief. If Netflix is building an entire alternate entertainment industry based largely on its own perceived awesomeness, viewership numbers might puncture that idea. (If the company's viewership numbers were extremely high, releasing them might only serve to further inflate the Netflix bubble — but one can assume that if its viewership numbers were extremely high, Netflix would at least be teasing them in more concrete detail.)
It's also not hard to see the big three streaming services — Netflix, Hulu, and Amazon — as trying to find a way to retrofit themselves into old-fashioned TV networks with alternate distribution models.
Netflix in particular has always centered its original programming on shows it thinks its subscribers will like, based on what they're already watching. Sometimes, that allows the company to find undiscovered, exciting new talent (as with Stranger Things' Duffer brothers), but it mostly results in lots of deals like the Rhimes pact, in which an established talent arrives to offer Netflix a frisson of legitimacy.
It would be one thing if the various streaming services had better track records than conventional TV networks, but all three are comparable to essentially any major network. Netflix might be the home of Stranger Things and Orange Is the New Black, for example — but it's also home to the quickly canceled Girlboss and Gypsy.
The summer has been especially dismal for the streaming services, with majorly hyped releases (like Gypsyor Amazon's The Last Tycoon) sinking and even long-running shows facing uncertain futures. (Hulu's Casual, for instance, is one of the company's signature shows, but it has yet to be renewed for a fourth season.) Both Netflix and Amazon's film slates have similarly struggled, with the former's failing to garner the same kind of hype as its television offerings, even with critically acclaimed films like Okja.
None of this is to suggest that Netflix, Hulu, or Amazon is doing anything wrong. But it does help illustrate why many in the entertainment industry feel as if they're engaged in asymmetrical warfare against an opponent that isn't bound by the same rules. The media consolidation that has pushed more and more networks and studios into the hands of a few corporations still pales in comparison with a service like Amazon, which is specifically builtto offer a consolidated, all-in-one experience. And regulating such all-in-one experiences to break them up into smaller pieces is something the government has shown little taste for since the 1970s.
There are some crocodile tears in play here — in many cases, we're talking about very rich people complaining about other, richer people — but the existential threat that tech industry-backed options pose to more traditional entertainment companies is real. Netflix and Amazon have already reached such a large size and scale that they'll only really become stable if they evolve into massive, globe-spanning mega-corporations that have essentially driven all rivals out of business. And all of those rivals are currently playing catch-up.
A streaming service in every pot!
If one side of the sustainability fear is that Netflix and its ilk can't keep running up massive amounts of debt forever, the flip side is that the entertainment industry trying to beat Netflix at its own game may end up being a self-defeating proposition.
You could argue that failing to grasp the importance of streaming — and thus selling off catalog titles to outside streaming services in the early days of streaming video becoming a mainstream entertainment option — is the film and TV industry's version of the music industry failing to notice the rise of Napster. I'm not sure that argument perfectly tracks, but the way so many studios and networks are hurrying to launch their own streaming services (or are promising to do so, as Disney has) suggests they at least take the idea seriously.
There's no way that consumers will simply keep shelling out for every new streaming service that comes along. That very situation — a growing number of cable channels to subscribe to — led to the sorts of massive cable bundles whose growing bloat and expense led to the rise of cord cutting in the first place. (This is part of why I half-suspect your local cable company may yet win the streaming revolution.)
Yet if studios balkanize their content on self-owned streaming services, it's hard not to picture something like the cable bundle being the result. Another option might be that streaming subscriptions collapse and the whole industry shifts to a model where everything you want to watch is purchased or rented à la carte. Such a setup would probably be reasonable for many consumers. However, it would also drastically limit the number of projects with financial backing, as well as more artistically adventurous projects that are harder to imagine turning a profit at first blush.
Talk to executives throughout the entertainment industry, or at their streaming competitors, and they'll readily admit to thinking about all of the above. But there's no optimal way out of the massive game of chicken they're all playing with each other.
And that's before Apple gets involved in streaming TV and film, or before Google pours more money into original programming on YouTube (a streaming platform that the generation after millennials, who are just beginning to act as entertainment consumers, is very comfortable with using).
At a certain point, if it looks like a bubble and feels like a bubble, then it's probably a bubble. And bubbles can't inflate forever.
|
global_01_local_2_shard_00001658_processed.jsonl/5200
|
Improving the Functionality of Comboboxes in wxGrid
Application Security Testing: An Integral Part of DevOps
The grid in wxWidgets allows you to insert a combobox in a cell, which is a feature that very few other toolkits offer. However, the default behaviour is somewhat lacking.
First of all, there is no visual indication of which cell has a combobox until the cell has focus. Then, when you click on a cell to edit it, you have to click three times: once to give the cell focus, once to activate the editor, and a third to actually open the combobox. That's very labor intensive for the poor user if you have several dozen cells to edit.
So, I wrote some classes to rectify these problems:
wxGridCellChoiceRenderer Displays the combobox buttons when not active
EzGrid Activates cells in the grid with just one click
wxFastComboEditor Opens the combobox immediately if you clicked on the button
To use this code, include the attached files in your project. Then, set the cell with the combobox something like this:
grid->SetCellRenderer(1, 1, new wxGridCellChoiceRenderer);
wxStringstrChoices[3] = {"one", "two", "three"};;
grid->SetCellEditor(1, 1, new wxFastComboEditor(3, strChoices, TRUE));
ExGrid will put all cells, not just combobox cells, into edit mode with just one click. Normally, this is desirable because you can edit the cells quicker.
The code works under both Windows and Linux (wxGTK), except for the code that opens the combobox automatically. I'm not very experienced in GTK and I haven yet figured out how to send a left mouse click message to a control.
• You must have javascript enabled in order to post comments.
Leave a Comment
Top White Papers and Webcasts
• Mobility is reaching an inflection point in enterprise. Smart enterprises are moving away from tactical point solutions for mobile device management, looking instead for a secure, comprehensive, unified, and future-proof mobile-app platform. Enterprise applications are now at the heart of mobile productivity, data is shared outside the enterprise walls, and the data itself may reside on multiple devices and clouds. Read this guide to learn how a unified endpoint management (UEM) solution is critical to …
Most Popular Programming Stories
More for Developers
RSS Feeds
|
global_01_local_2_shard_00001658_processed.jsonl/5208
|
Medical Marijuana Registry physicians
Important information about the fee increase, system updates, forms, and Board of Health changes
My physician account
Existing users log in to submit a physician certification, revoke a signature, view lists of patients, or update your information.
Steps to submit a medical marijuana physician certification online. You must have access to your physician account.
Learn about recommending medical marijuana in Colorado
Steps to register as a recommending physician
Physician support
Help with your physician account, answers to FAQs
Other resources:
Medical Marijuana Research Grant Program
Marijuana health care provider resources
Evidence-based studies and related dosing information
Statistics and data
Laws and policies
|
global_01_local_2_shard_00001658_processed.jsonl/5232
|
topics we cover
the unexpected, unexplored, and underrated.
the writing thing group—
a blog network.
we reject conventional wisdom and take an outsider view on popular subjects.
Whatever your passion, there’s an expert today telling you how do it. If you look closer, however, you find that many experts are merely gatekeepers. They’re bent on keeping you doing things an old, tired (expensive) way.
Our blogs are different. The Writing Thing Group is focused on ways to help you, not to sell you. We cover subjects an outsider way, a smarter way, not just the usual way. From parenting, to culture, to writing, to offbeat living, our subjects lead to deeper solutions that will make you happier, and better.
the writing thing
A cheap ticket to success? No, the writing thing is about risk and honesty. We promote the craft of writing and encourage the creation of masterpieces.
Daily distractions will steal your kids’ childhoods away from you. We help busy parents to lose distractions and boost quality time with their kids. Visit.
Ever wonder about leaving the city life behind? We help folks make the transition from overwhelmed city mouse to relaxed country mouse. Visit.
eugene havens
Eugene Havens is an American writer drawn to modern obstacles of many kinds. Writing in an age when readers have been kidnapped by smartphones, Eugene Havens aims to remind them of what they’ve lost.
blogs of the writing thing group.
don't be shy, say hello.
|
global_01_local_2_shard_00001658_processed.jsonl/5252
|
Why "Getting It Out There" Marketing Is Making Your Business Stupid.
You don't just have to "get it out there". Sometimes that decision impacts your ability to be successful for the rest of your life.
Over the last few years a dangerous culture has arisen in content creation where imperfection is accepted as collateral damage for immediacy.
Whether you are creating a YouTube video with just a webcam on your laptop or whipping together e-learning material that is nothing more than of few words on a hastily designed power point, you have heard from a wide range of experts that you just need to "get it out there".
Seth Godin famously talks about the need to ship your art to the world. Since the release of his many popular manifestos it's difficult to sit in a seminar without him being referenced as credence for you to to ship your products -- to just "get it out there".
On the heels of Seth's line in the sand came a new generation of cewebrities who were masters at turning web events and online relationships into big business -- lots of commerce from people all over the world. Along with that came a mindset off generating lots of content that someone could buy. Just "getting it out there".
The reality is that this model doesn't work. Not for you at least.
Whether you are a one-man business or a multi-billion dollar marketing department, just "getting it out there" isn't a viable strategy.
You can't just keep pushing out content and hope that will build advocacy and nurture relationships.
1. Consumers want quality more importantly than quantity. -- It's important to remember. Just "getting it out there" can do irreversible damage to how people view you, your product, and your company overall. The best content is memorable. It's not something that you just push out there. It's well thought out. You have to plan and strategize ways you can stand out from everyone else and their content. Beauty works. Beautiful videos and books and any other content that you create. A great way to stand out to make what you create beautiful. Not just the words, but how it looks sounds and feels. All of that matters.
2. If it didn't cost you much to make it's not valuable to consumers. -- Consumers don't put a lot of value on half-baked marketing. The times where you just flip open your webcam and start talking into the camera about where you are and how you miss the rest of the Internet. That's great if you're a cewebrity, but if you're trying to build value for your business or your product,s that's just tomfoolery. Impactful marketing costs you time and focus and sometimes lots of money. But thats why its impactful, because it creates powerful imagery and proactively creates curiosity from your ideal customer.
3. You attract the type of customers that you market toward. -- Think about that for a moment. Unprepared, half-baked marketing most easily appeals to those who appreciate unprepared, half baked content. That is a group so dangerously at risk of drowning that it doesn't know the difference between valuable content and anything else. Don't complain later when that group doesn't have budget to buy your products. Don't be annoyed or frustrated when you find out that this type of potential customers has a lot of problems that make them difficult to do business with. You could be dealing with different prospects with a little more effort.
There are a million opinions about marketing.
But don't let outdated marketing philosophy make your business stupid.
The next time you're tempted to just "get it out there", stop and ask yourself if that will get you closer to your goals. It's probably faster and easier and cheaper -- but those have never been the ingredients for long term success. Why you you expect them to yield effective marketing?
Stop "getting it out there" and start putting in the hard work success demands.
|
global_01_local_2_shard_00001658_processed.jsonl/5275
|
Dare to Do Dark Walls in Small Spaces Dare to Do Dark Walls in Small Spaces
Painting your home takes a lot of forethought and effort. Some people may be deterred from daring to do dark walls in small spaces because they have heard that it will make the space seem smaller than it is and that it will be difficult to cover up. But, that's not necessarily true.
Read on to not only find numerous reasons why dark walls are great in small spaces, but also find tips on how to make them work for you!
What Makes Them Awesome
living room with dark green walls
Ironically, dark walls in small spaces can make the room appear larger. Applying a deep blue to your tiny powder room will mask the corners, which will make it seem larger. It will also seem larger because of the added shadows and depth, as well as the fact that it will be harder to tell where it begins and ends. These hues are good for hiding imperfections, too.
As an added bonus, these colors also do not require as much accessorizing as their lighter counterparts. Actually, less is usually more in cramped quarters. So, all you really need is a stunning and strategically placed mirror (or two) to help give the illusion that there is more than meets the eye by creating an infinite look and reflecting the natural light.
Plus, deep colors are often synonymous with royalty and elegance. Taking the leap can add extra flair, and take your room to the next level. These shades also tend to be warmer. This means the area will appear more cozy and inviting. People will be more focused on the amazing, dramatic color than they will be on the size of the room.
Ways to Make Them Work
bedroom with wallpaper
Don't just throw on any old forest green paint on your walls. Do it the right way.
Say No to Flat Paint
The higher the gloss factor is, the easier the paint is to clean and the more light it will reflect. course, you don't want to use a high-gloss paint either, as these just aren't optimal for interior walls. You want a happy medium.
In most cases eggshell or semi-gloss will work, using the latter for more shine or in areas you know will be prone to getting dirty.
Try a Pattern
Even in a small space, there are many ways you can incorporate a pattern into your dark walls. You can try different textures using special sponges or rollers, use a stencil for a pattern, or create something freehand if you are skilled enough.
Patterns can help add depth, too. Vertical stripes are the prefect way the make your ceiling appear taller, or use horizontal stripes to create a longer-looking room. Keep patterns big though. Using tiny patterns will make it too busy and add to the claustrophobic feeling.
This is also a great way to add a pop of color. You could also use this to help brighten it up if you feel you did not achieve the desired effect.
Strike a Balance
Daring to do dark walls in small spaces means balancing it with other (lighter) colors. You can do this with area rugs, furniture, or other accessories. You just do not want the richness of a plum paint color to drown out the room and make it seem smaller than it actually is.
You can also help to offset a bold black by using a lighter hue for the trim. Doing so around the moldings can also help to add depth. Ideally, you want everything to be in the same color family. By doing so, the area will appear to be more open since they will blend and the eye will not be drawn into different directions.
Incorporate Ample Lighting
You want to ensure the room is well lit. You do not need to add a skylight to alleviate the issue. There are many creative ways to add light artificially. This could mean adding more light sources such as lamps, or perhaps just getting bulbs that are a higher wattage.
You can try accenting your awesome paint job with sconces that compliment it and keep the area adequately lit.
Covering it Up (Not that you would want to!)
dark bedroom
Stop letting the fear of the future prevent you from going bold. As far as covering up your chocolate kitchen is concerned, many paints come premixed with primer, which will make things a lot easier when the time comes. Or, you can always roll on a coat of primer to ensure the old chocolate does not show through the new marshmallow coat. One other option is to put some good old-fashioned wallpaper over it.
Many hardware and paint stores carry small sample containers that will allow you paint a portion of your den to see how it will look before you go all in. If you decide to do this, you want to wait and see how it looks in all (natural and artificial) lighting throughout the day and night. There are also websites and applications that can help you with this, however, we all know things can look different in person.
Worrying that a room is not large enough is no excuse not to dare to dark walls in small spaces. In fact, it is just the opposite!
Got a New Project You're Proud of?
Post it on Your Projects!
|
global_01_local_2_shard_00001658_processed.jsonl/5282
|
Skip to Content
Is there any food restriction with lovenox (i.e. not eating greens)?
Responses (1)
Inactive 29 Jun 2011
I did an interaction check and nothing came back with regards to food, it does interact with many other drugs on different levels, like monitor major, moderate and minor.
Click on the links (1st one is the interaction one and 2nd one is more information of the medication , like side effects, what you should avoid, and more):,lovenox.html
Take care, free discount card
Further Information
Search for questions
Similar Questions
|
global_01_local_2_shard_00001658_processed.jsonl/5283
|
Skip to Content
Get key facts and figures about chronic dry eye
Drug interactions between Combigan and Cosopt
Results for the following 2 drugs:
Combigan (brimonidine/timolol ophthalmic)
Cosopt (dorzolamide/timolol ophthalmic)
Interactions between your drugs
timolol ↔ brimonidine
Applies to:Cosopt (dorzolamide/timolol ophthalmic) and Combigan (brimonidine/timolol ophthalmic)
After using brimonidine ophthalmic, some of the medication may be absorbed into the bloodstream and occasionally produce cardiovascular side effects such as decreases in blood pressure and heart rate. Combining it with timolol ophthalmic or other medications that can also have these effects may increase the risk. You may experience headache, dizziness, lightheadedness, fainting, and/or changes in pulse or heart beat. These side effects are most likely to be seen at the beginning of treatment, following a dose increase, or when treatment is restarted after an interruption. Let your doctor know if you develop these symptoms and they do not go away after a few days or they become troublesome. You may need a dose adjustment or more frequent monitoring by your doctor to safely use both medications. Avoid driving or operating hazardous machinery until you know how the medications affect you, and use caution when getting up from a sitting or lying position. It is important to tell your doctor about all other medications you use, including vitamins and herbs. Do not stop using any medications without first talking to your doctor.
Switch to professional interaction data
Drug and food interactions
Therapeutic duplication warnings
Beta-adrenergic antiglaucoma agents
Therapeutic duplication
The recommended maximum number of medicines in the 'beta-adrenergic antiglaucoma agents' category to be taken concurrently is usually one. Your list includes two medicines belonging to the 'beta-adrenergic antiglaucoma agents' category:
• timolol (active ingredient in Combigan (brimonidine/timolol ophthalmic))
• timolol (active ingredient in Cosopt (dorzolamide/timolol ophthalmic))
Drug Interaction Classification
Unknown No information available.
Do not stop taking any medications without consulting your healthcare provider.
|
global_01_local_2_shard_00001658_processed.jsonl/5293
|
Skip to main content
Eclipse Community Forums
Forum Search:
Search Help Register Login Home
Home » Language IDEs » PHP Development Tools (PDT) » how to write javadoc for var without defining it?(CodeIgniter views present a challenge)
how to write javadoc for var without defining it? [message #1751279] Fri, 06 January 2017 21:45 Go to next message
sneakyimp Mising name is currently offline sneakyimp Mising nameFriend
Messages: 41
Registered: December 2009
I'm wondering if there's some way to write javadoc comments in an included/required PHP file such that I can assign datatypes to variables defined outside that document so that I get all the cool autocompletion features for my classes.
I ask this because of the way CodeIgniter loads its views. You define controllers to handle user requests and these have methods which load views:
// a controller method
public function mycont() {
// blah blah do some stuff
// define an array of data to send to the view
$data = array(
"var1" => "i am var one",
"var2" => "I am var 2"
"var3" => $someCrazyObject
$this->load->view("myview", $data); // loads myview.php
then, within myview.php the array keys are instantiated as variables in the local scope:
// myview.php
echo $var1; // outputs i am var one
echo $var2; // outputs i am var2
Sadly, when I open myview.php in PDT, Eclipse doesn't know that $var3 is an instance of the class SomeCrazyObject so I don't get the amazing eclipse code completion features and so on. Is there some way to declare a javadoc comment for $var3 without altering its value?
Re: how to write javadoc for var without defining it? [message #1751367 is a reply to message #1751279] Mon, 09 January 2017 12:22 Go to previous message
Marc-Oliver Stuehmer is currently offline Marc-Oliver StuehmerFriend
Messages: 1
Registered: October 2010
Junior Member
Just put something like this on top of your variable (Of course you may omit the namespace if the class is already "used"):
/** @var $var3 \MyNamespace\SomeCrazyObject */
That should do the trick.
Previous Topic:Installing PDT plugin
Next Topic:[bug?] Rename File
Goto Forum:
Current Time: Thu Jun 21 12:40:13 GMT 2018
Powered by FUDForum. Page generated in 0.01631 seconds
.:: Contact :: Home ::.
Powered by: FUDforum 3.0.2.
Copyright ©2001-2010 FUDforum Bulletin Board Software
Back to the top
|
global_01_local_2_shard_00001658_processed.jsonl/5299
|
How to Create a Pretend Makeup Kit for Kids
Kids love to play with any makeup they can get their hands on, but all that usually does is turn your face red. As much as you like when they use their imaginations, makeup can be messy, expensive and hard to remove. Wouldn't it be nice to let your little ones use those products without the hassle? That's where this pretend makeup kit comes in! Create the illusion of cosmetics —from lipstick to blush, bronzer to eyeshadow — when you fill inexpensive cartons with fake, colorful supplies. Your kids can still play dress up, but you won't have to worry about what goes on their faces or sticks to the floor.
(Image: Machelle Vanderhoeven)
Things You'll Need
• A variety of inexpensive makeup: lipsticks, eyeshadow, blushes, bronzers and nail polish (dollar stores and clearance aisles are all great places to find these)
• Peel-and-stick foam sheets
• Makeup brushes
• Craft sponge brushes
• Craft paints (for lipsticks and nail polishes)
• Acetone
• Paper towels
• Sandpaper
• Paintbrushes
• Scissors
• Container for storage
(Image: Machelle Vanderhoeven)
Video of the Day
Step 1: Make Eyeshadows, Blushes and Bronzers
Empty all of your makeup cartons using a butter knife. Use a dry toothbrush to clean the cartons out well. Then, grab the peel-and-stick foam sheets in your desired colors and press the carton against the foam until you get an imprint of the shapes you'll need. Cut the shapes out, peel off the backing and press the foam into the carton spaces. You can also use hot glue to make the shapes even more secure.
(Image: Machelle Vanderhoeven)
(Image: Machelle Vanderhoeven)
Step 2: Make the Nail Polish
Empty your nail polish by pouring it all out into the garbage. Then use acetone nail polish remover around the bottle and let it dry. Using a craft paint of your choice, pour a few drops into the bottle. Cover the hole with a paper towel and your finger, and shake until the paint coats all surfaces of the bottle. Turn the bottle upside down on a paper towel and let the excess drip out.
Then, dip the nail polish brush into the craft paint and let it dry next to the bottle. When it's ready, it'll look like the bottle really is full of polish for your kids to put on their nails.
(Image: Machelle Vanderhoeven)
(Image: Machelle Vanderhoeven)
Step 3: Make the Lipsticks
Roll the lipstick tubes all the way up, break off the lipsticks and throw them away. Clean the bottom of the tube with a toothbrush.
The wooden handles on craft sponge brushes are the perfect size for these fake lipsticks. Cut them off at about 2 inches. Then, rub the sticks against sandpaper at an angle so that you can get the same slant of a real lipstick. Once you have a slight slant, rub the sandpaper lightly around the whole stick to make sure that there are no rough spots or possible slivers.
Use craft paint and a small paintbrush to give each stick a few coats of your desired colors. Then, place them inside the empty lipstick cartons to keep them upright while they dry. When they are ready, use a dot of hot glue in the bottom of the cartons to adhere the "lipsticks" to the holders.
(Image: Machelle Vanderhoeven)
(Image: Machelle Vanderhoeven)
Step 4: Make a Tube of Mascara
To create the mascara, remove the stick from the container and then pull out the funnel top. Use the brush to remove the contents from the jar. When you've gotten most of it out, leave the bottle open and allow what's left to dry for about a day. Then, replace the cleaned funnel piece and brush.
(Image: Machelle Vanderhoeven)
Step 5: Complete the Makeup Set
Combining all these fun makeup pieces with an array of brushes, sponges and clear lipliner pencils makes the kit complete!
(Image: Machelle Vanderhoeven)
You can put it all in a fun organizer (like the one used for this project), and then watch as your kids have fun doing their own makeup!
(Image: Machelle Vanderhoeven)
Promoted By Zergnet
|
global_01_local_2_shard_00001658_processed.jsonl/5305
|
Minimum required capital
Discussion in 'Professional Trading' started by scot.mcpherson, Mar 28, 2009.
1. Now hold on, I know this is a often hashed question, so please don't get mad. I have another spin on this question that I haven't seen addressed.
What is the minimum required capital to successfully daytrade as a career/living when one brings FINRA Rule 2520 and NYSE Rule 431 into consideration?
I have heard people here talking about $1000 and $2000 and being able to do it. I can't see that as a possibility considering that accounts below $2000 are required to be cash only and subject to rule 431, trade day+3 days for purchase settlement. Therefore you could only accomplish one purchase every 3 to 4 days.
If you have a margin account (greater than $2000 cash balance, not including funds lost to trades), you have only so much purchasing power. i.e. you can only make so many trades before your account is subject to a day trading equity call which you can't cover UNTIL all your trades have settled which takes 3 days.
So forget growth potential and all that if you could day trade with $1000 because truth is, you simply can't daytrade with $1000, you aren't allowed, and with $2000, you are allowed, but severely limited to the number of transactions you can execute while awaiting settlement.
So my question is, what is realistically the minimum required to make or start a career in trading when the above rules are applied to the equation? Or maybe the question really should be...."How do people with claims that they can be a career trader with little to no money reconcile the fact that the law prevents one from doing so?"
I realize this only applies to people trading in the USA, so those across the pond or else, please don't bother to answer, the question doesn't really apply to you.
Thanks kindly for the patience with this oft repeated theme, but I had to hear what the responses would be with the inclusion of the regulations.
2. spindr0
One can trade options in a small account but it's still not really very realistic with only 1-2 grand because one serious draw down can really hurt you.
Because of the Pattern DayTrader rules, 25 grand is more realistic. I think that the margin limit for PDT may have been raised a bit (not sure) but it was at 4:1 intraday subject to standard overnight Reg D margin of 50%. That means that during the day you could carry up to 100g of stock with your 25g of capital, with no limit to how many times you turn it over intraday.
Do a web search on "Pattern Day Trader" and you'll get more specific info, Here's a starting point:
3. $250,000.00 minimum. As a working capital. If you plan to trade equities. Not for regular living expenses. May be monthly brokerage fees. Strictly a trading capital. Anything less and you are doom to failure. Under funding is the cause of high failures in daytrading. Just my humble opinion.
4. Also consider that your equity value can resemble a random walk. If you're good, it will have a positive drift.
5. Let's say you are good and immediately profitable, and make let's say 10 or 15% a week, can you live on 100~300 USD a week?
Budget in some living expensive, let's say 18 to 24 months, and you are thinking closer to 40k + capital needed to trade, I say $50 to 60k realistically.
Hi CAE,
I would use the term "when you are good", people (including myself) really underestimate how long it would take a person to trade with confidence and win consistantly.
6. Mr J
Mr J
That's just silly. The amount is different for everyone, and many traders need nowhere near that amount.
7. In the nineties, I averaged 200 dollars a day with a 2000 dollar account.
8. spindr0
My previous reply was inadequate because it was geared toward how much capital you need in order to be able to day trade.
To daytrade as a career/living with no other source of income (pension, social security, mommy (g), you'll need a heckuva lot more thatn 1-2 k if you expect to live off the proceeds... and that number will vary because peoiple have different trading abilities as well as different lifestyle requirements.
With 100k, are you that unique trader who can consistently generate 25% a year? After taxes, can you live on 20k a year? Or perhaps you're more mundane and you can just approximate the long term return of the market (ignoring the silly little Black Swan of the past year) and can generate 10% a year consistently. If you need 40k to live, you'll need 500k of capital.
Pick your own number but it's going to be an awful lot more than 1-2 k.
9. I was expecting a higher number for annual return for a full time trader (not a buy-hold investor or fund manager).
What kind of annual % return a typical disciplined trader makes?
10. JScott
Quote from AIMHIGH520:
$250,000.00 minimum. Anything less and you are doom to failure.
Maybe so, but it's the best answer I've heard thus far.
The amount of capital you need is a factor of 1) how much you target to make and 2) your skill level - ie, leverage.
The new guy, assuming he has an edge and all the requisite skills, probably needs double what he wants to make - plus money to carry him/her for at least the first year or two assuming no better than breakeven results.
What? That's too much money you say? Well, only if you want to be successful does this apply. Otherwise, $5k and a bible work fine.
This game is about return on capital. Some argue this point endlessly. But, at the end of the day, the only common quantification you can make is a return on capital comparison. After that, numbers can be skewed up or down based on leverage used.
#10 Mar 29, 2009
|
global_01_local_2_shard_00001658_processed.jsonl/5307
|
Trading E-Mini's
Discussion in 'Index Futures' started by ZebProctor, Jun 8, 2005.
1. So is trading E-Mini's as easy as buying at a certain price and selling at a higher price (or lower for a loss)?
Do you have to have current price*$50 to purchase one contract, or can you just invest 10k, 20k, etc in?
2. I assume you refer to the S&P e-mini (ES).. No you don't have to have that amount (Price * $50) to long or short a contract. brokers' margin ranges from $500 - $2000 to trade a contract intraday, so with this amount you can trade though you really should have more captial than that.
3. Thanks. on the first question, I guess what I'm confused on, is in reading all the documentation on the CME site, it says you trade a contract for a certain price on a certain date... so do you have to keep that contract until that date or can you sell on any day, or more specifically, and time after you buy. For example I bought a contract this morning when the dow opened at 10,484.84, and then when it hit 10,534.84, 50 points higher, can I sell?
4. Also, is that buying a full contract on margin? or are you just buying $500-$2000 worth or a contract?
5. Vince1
6. You can buy and sell at any time without having to wait until the expiration. The end result is your profit and loss per that day.
Per your example, you bought 'mini' Dow contract and made 50 points. the per point value is $5 so you made 50 * $5 = $250 today
7. Why is the point per value $5 instead of $50?
8. No,, you are buying a full contract always. You can never buy a partial contract. Regardless of how much your capital is, your trade and the end result is based on a full contract.
If you start with $5K, and you long 1 e-mini S&P contract,, let's say at 1200.00. Later in the day the price moved to 1203.00, you made a profit of 3 ES points. Your $ profit is + $150. Your new equity balance = $5K + $150 = $5,150 ( of cource, minus comm.)
9. Now when buying and selling, are you going off the current dow quote, or the 'future' dow quote?
#10 Jun 8, 2005
|
global_01_local_2_shard_00001658_processed.jsonl/5312
|
Field Composer - EMusician
Field Composer
Until very recently, if you wanted to use the recording and composing tools found in your home studio, you needed to be at home. The idea that you could
Publish date:
Social count:
Until very recently, if you wanted to use the recording and composing tools found in your home studio, you needed to be at home. The idea that you could write and record music sitting in your car, at the beach, at your favorite cafe, commuting to and from work, waiting for a flight, or perched atop some distant mountain was pretty preposterous. But with today's powerful laptop computers, incredible digital audio programs, excellent virtual instruments, and abundant laptop-compatible recording gear, locations like these can be the norm during a productive day of composing.
That is not to say that a good laptop music system can, or should, entirely replace your home studio. There are a few areas in which the home studio will always have the advantage, namely, hardware (such as a big mixing board and analog sound modules) and superior recording isolation (as in a vocal booth). But when you are writing the initial parts to a song, these conveniences aren't crucial. The virtual mixers found in most digital audio sequencers offer much of the power of the best hardware consoles; current virtual synths and samplers sound nearly as good as their real-world counterparts; line instruments (like guitar or bass) can be recorded directly into your laptop's audio interface at rates as high as 24-bit, 96 kHz; and scratch vocal tracks can be recorded just about anywhere. Once a song's basic elements are laid down, it's a piece of cake to transfer them to your home studio as audio and MIDI files for final production and mixdown.
In this article I will discuss systems that go from simple to complex and range in price from a few hundred to thousands of dollars, not including the laptop (see the table “Interfaces and Controllers” for features and prices of the audio hardware mentioned). You can write tracks with your laptop and a single good music program, of course, but without a controller and an audio interface, your recording choices will be limited. Finding the right peripherals to go with your laptop and software is the trick to building a system that is as powerful as it is portable. The endgame is to put a system together that, far from frustrating your writing efforts, enables and inspires them. turn your laptop into a portable studio.
The core of this system is your laptop, so make sure it has a fast CPU (see the sidebar “Suggested Laptops” for recommended computers) and lots of RAM (256 MB at the very least). The internal hard drive should be as big as possible — 20 GB is an acceptable minimum size. A large screen (15 inches, for example) is also important. Yes, that can add significantly to the laptop's cost and weight, but if you plan on using a multiwindowed digital audio sequencer for many hours at a stretch, a good-size screen will make the experience much more pleasant.
Make sure that your laptop's expansion ports include USB and FireWire; a PC CardBus Slot is also good. Several portable keyboard controllers are USB based, as are a number of MIDI and basic audio interfaces. More professional audio interfaces, which typically offer many simultaneous channels of I/O and feature XLR mic inputs with phantom power, employ FireWire (IEEE 1394). For adding more storage, such as Zip or hard drives, USB and FireWire ports are also key. For an even more extensive system, you can use full-size PCI cards with your laptop by adding an expansion chassis that connects to the PC CardBus Slot. Finally, having an on-board CD writer is very convenient for making backups and transfers and, of course, burning reference audio CDs.
There are numerous choices in sound cards these days, but for ease of use, compact size, and all-around compatibility, nothing beats a USB audio interface. These little boxes are the perfect laptop companions because most are equipped with a headphone output and can draw power directly from the USB port. Their I/O configurations vary by model, but there are bandwidth limitations to USB, and most of them can't handle more than six total channels of simultaneous recording and playback. When you are working alone, however, that is usually adequate.
When you want to record several instruments at the same time or send more than six simultaneous tracks of audio to an external console for mixing, you'll need to step up to a multi-I/O FireWire interface. MOTU makes a couple of great units, the 828 and 896. Both of these offer up to 18 simultaneous inputs and outputs (8 analog, 8 ADAT optical, and 2 digital), high-quality converters, headphone outputs, and XLR microphone inputs with phantom power. The downside is that they require an external power source. If there is an AC outlet available, you're in business; otherwise, you'll need some sort of portable power supply (I'll cover some of the possible solutions in a minute).
If you want to use a PCI card in your laptop studio, Mobility Electronics' Magma series offers some good choices. These PCI Card expansion chassis plug in to your laptop's PC CardBus Slot and come in a variety of configurations, including 1-, 2-, and 4-slot models (see the sidebar “Magma PC CardBus Slot Chassis for PCI Cards”). The 2-slot box is available in AC- and DC-power models, and the 1-slot units will run on DC with an optional power cable. The DC-power options will let you run the boxes from a car battery (I will discuss remote power supplies shortly). Any of these would allow you to use a Digidesign Digi 001 system with your rig, for example, or add extra processing power with a dedicated DSP board such as the Universal Audio UAD-1 Powered Plug-Ins bundle. You could even run Pro Tools TDM (I haven't personally tried such a TDM setup, but I've seen Magma demonstrate it).
RME also offers a CardBus solution that consists of a PC CardBus card and the half-rackspace Multiface breakout box (reviewed in the April 2002 EM). The breakout box connects to the PC CardBus card with a standard FireWire cable (a PCI interface is also available). Just keep in mind that anything attached to a PC CardBus card, whether it's a fully loaded expansion chassis or simply an I/O box, will likely require AC power.
Because laptops aren't equipped with dual processors yet and can't reach the full processing potential of desktop computers, it's especially crucial that your audio interface's driver be as efficient as possible. An interface that's the same brand as your digital audio sequencer (for example, Steinberg's Cubase SX with an AudioLink 96 Mobile card and Multiset interface or Digidesign's Pro Tools LE, which is included with its new Mbox audio interface) is often a good bet. If such a combination isn't an option for you, almost every digital audio sequencer will work with an audio interface that has an “enhanced” audio protocol, such as ASIO or WDM. However, it's important to note that not all audio drivers are built alike, and a poorly written driver will drain your laptop's processing resources, leaving you with less power and, sometimes, an unstable system. To avoid this pitfall, use only audio interfaces that are recommended by the manufacturer of your digital audio sequencer.
When composing in a public place, headphones are the obvious choice for monitoring your laptop's audio. Because most pro headphones now include adapters for both ¼-inch and minijack, and most audio interfaces employ one of these types of headphone jacks, your regular studio headphones may work. However, if your headphones aren't designed with such an adapter and you're thinking that an aftermarket adapter will get the job done, a word of warning: most compact aftermarket adapters (especially going from ¼-inch to minijack) add too much weight to the headphone's plug and, over time, can cause your audio interface's headphone jack to short out. If you must get an adapter, try to find one that's part of an extension cable — the type with lightweight molded plastic ends — to avoid overstressing the headphone jack.
If you must buy a new pair of headphones for the road, I suggest getting a pair with a fold-up design (many Sony models, such as the venerable MDR-V6, incorporate this feature). Though the ultimate test of a pair of headphones is sound quality and comfort, compact size is an important consideration in terms of convenience.
Always keep a pair of headphones handy, but know also that there are other possible monitoring options. Small, shielded self-amped speakers designed to be used with desktop computers work well if you're in a space where you can make noise (they're also a nice break from headphones and a great way to share your music with friends). There are many such speakers available, but for carrying and setup ease, stick with models that are lightweight and battery powered, if possible. The smaller these speakers are, the worse they usually sound, so consider finding a pair with a separate subwoofer for better bottom end. Most models get their input directly from the analog output of your audio interface (usually through a minijack), but USB models offer the advantage of a digital connection for improved fidelity (dependent, of course, on the quality of the speakers' built-in D/A converters). For example, check out the USBgear Tornado USB Sub-Woofer System, which retails for about $79.
Cassette adapters that are made to plug portable CD players in to your car's tape deck will let you turn your car's stereo into a monitoring system. I always keep one of these adapters stashed in my laptop's bag for the times when I find myself waiting in my car — if your stereo sounds decent, it's like having your own private studio on wheels. Having a few different types of cables in your bag for plugging in to different systems is also a good idea. For example, any home stereo system can be used for monitoring if the proper connections are made. The cabling you need to carry depends on your audio interface, but it will probably be a Y-cable with a stereo ¼-inch or minijack that splits out to two RCA ends.
A new breed of USB-based keyboard controllers has sprung up in recent times (see the article “Surfin' USB” in the September 2002 EM). These compact, lightweight keyboards can draw their power right from your laptop's USB port, making them wonderfully carefree. Good examples are Edirol's 49-key PC-300 and M-Audio's 25-key Oxygen 8. Because they don't have the keyboard range of a full-size unit, octave up/down buttons are provided to give you access to different octave ranges. The Oxygen 8, despite its diminutive size, also sports eight assignable knobs for tweaking plug-ins and soft synths.
If you'd rather use your favorite MIDI instrument, like a guitar controller or drum pads, you'll need a USB MIDI interface to make the connection with your laptop. When you're working solo, a single MIDI port (In and Out) is usually fine. Edirol's donglelike UM-1S interface is an inexpensive and convenient solution. Interfaces such as this don't usually require external power, though your connected MIDI controller certainly will. Some USB audio interfaces also have a MIDI port, like Tascam's US-224 and M-Audio's Quattro. If you're using an audio interface with a built-in MIDI port, you probably won't need a separate MIDI interface.
For situations in which you need more MIDI ports (for example, to record several MIDI inputs at the same time), multiport USB MIDI interfaces are available. One tried-and-true unit is MOTU's MTP AV, which has eight ports, programmable presets, professional synchronization features, and four control knobs that can be used to tweak plug-ins. However, even though these interfaces are USB, they generally need AC power.
For the most part, the software you use on your desktop computer will also work on your laptop. That includes all the top digital audio sequencers. If you use the Pro Tools LE or TDM versions in your studio and aren't interested in the PC CardBus Slot setup I discussed earlier, Pro Tools Free Session files can be interchanged between the versions (as long as your computer platforms are the same — for example, an Apple PowerBook to an Apple G4 desktop). It's a good idea to work with the same digital audio sequencer in your home studio and on your laptop. That guarantees easy file transfers between your systems.
Some digital audio sequencers, such as Cakewalk's Sonar, come with their own arsenal of virtual instruments, but the really killer instruments usually need to be purchased separately. No matter what kind of music you write, you will most likely need a sampler or sample-playback instrument and a drum machine. Good soft samplers include Steinberg's HALion, Native Instruments' Kontakt, and Emagic's EXS24 for Logic; IK Multimedia's SampleTank is a wonderful sample-playback instrument. All these instruments read Akai-formatted sound libraries, so there are lots of sounds available. Native Instruments Battery is a powerful drum machine with a lot of realistic-sounding kits, as is Steinberg's LM-4 MarkII. Waldorf's Attack is perfect for electronic drum sounds. Soft synths are largely a matter of taste, and luckily there are plenty to choose from. Native Instruments makes several great instruments, including some very cool re-creations of vintage models. If you're not familiar with virtual instruments, exploring this company's offerings is a good place to start.
A dedicated audio editor lets you tweak samples and manipulate audio in ways that may not be possible in your digital audio sequencer and is a handy application on the road. If the editor includes a batch converter, you can quickly convert handfuls of files from one format to another. For example, if you have a bunch of AIFF drum hits but your drum machine only reads WAV files, a batch converter can solve this file-format problem in a snap. Examples of audio editors that include a batch converter are BIAS Peak and TC Works Spark on the Mac, and Steinberg WaveLab on the PC. Sonic Foundry's Sound Forge 6.0 bundle (Win) also includes Batch Converter 5.0, a stand-alone utility (see Fig. 1).
Though most laptops that have an onboard CD burner also come with burning software, those stock programs aren't always the most flexible. For example, the ability to adjust pause times between audio tracks is an amenity that is often missing from basic consumer-oriented programs. Roxio's Toast Platinum (Mac) gives you a choice of various preset pause times and can write different CD-ROM formats (like ISO9660, Mac Volume, or custom hybrids). If you want to create custom pause times and write actual crossfades between your tracks, check out Roxio's Toast with Jam bundle (Mac) or Sonic Foundry's recently rereleased CD Architect (Win). PC users can often find excellent CD-burning features directly in their audio editors — both WaveLab and Magix's Samplitude Producer offer professional-quality CD-authoring options, for example.
Most applications allow for multiple installations from their original CD-ROM, with copy protection using serial code, dongle, or CD-ROM authentication. Only software that employs challenge-and-response copy protection to authorize a single hard drive is problematic when it comes to running multiple installations. For these types of programs, you will need to call (or e-mail) the manufacturer and ask for a second response code. In the worst case, you may need to purchase a second response (prices vary but are usually less than the original application). When you hit the road, remember to bring the CD-ROMs for programs that perform random CD-ROM spot-checks and your copy-protection dongles. There's nothing worse than sitting down to write music and realizing that you can't boot up a program because you're missing its authorization gadget.
Though it's really convenient to use peripherals that get their power from your computer's USB bus, sometimes you need to use a piece of gear that requires outside power. Also, laptop batteries usually only last a few hours, so finding an outside power source to extend battery life is always a plus. Several companies make adapters for plugging your laptop in to a car's cigarette-lighter socket or the EmPower DC-power ports used on many commercial passenger jets. These units, like the ones made by SmartDisk, usually cost between $50 and $70.
Another possible solution is to get a power inverter to turn your car's cigarette lighter into a multiport AC-power receptacle (standard models usually sport two sockets). Prices for consumer-oriented power inverters, such as the Powermate by Coleman or similar units found at Radio Shack, start at around $100. Most inexpensive adapters and inverters are convenient and portable and fine for running your laptop but don't provide audiophile-quality power for digital recording. If that is satisfactory but you're worried about running down your car battery (I wouldn't worry about a jet plane's battery), use the adapter or inverter with an emergency-jumper battery pack (for example, Southern Equipment's 3in1 Power Station, available at Costco). You can pick these up at most automotive repair stores starting around $70. The RME Web site also has a few suggestions on portable battery packs suitable for running notebooks.
If you plan on making digital recordings that you would like to be “keepers,” then you need audiophile-quality power to ensure clean recordings. Such power is available in units that are rated as providing “pure sine-wave power.” Portable inverters of this class can cost thousands of dollars, so a more economical solution is to use an uninterruptible power supply (UPS) that puts out pure sine-wave power. A decent-size UPS will run your gear from its internal battery for several hours (how long depends on the gear you have connected and the size of the UPS). The OPTI-UPS PS Series models by Airblade Alternative Power Systems (AAPS) start at $241; you can purchase them online at The company's owner suggests that you charge your UPS fully at an AC outlet prior to hitting the road so that you'll be ready to record when you get to your destination. And, if you're on location and need to extend the UPS's battery life, AAPS offers solar panels that will work for this task. (Incidentally, if you're into solar power, AAPS has a very cool laptop-battery-charging solar kit, SunWise, which retails for $360.)
Most of the same rules that apply to setting up your desktop computer also apply to setting up your laptop. For example, if you own a Mac laptop, when you install an application, make sure to perform the installation with a minimum of extensions running in order to avoid extension conflicts. Windows users should make sure all other programs are closed before installing an application. Laptops of all varieties (and some desktops) are typically set, by default, to go to sleep after about 10 minutes of inactivity to conserve power. That is fine if you're running a word processor, but it's not what you want when you're working with a digital audio sequencer. A computer that falls asleep in the middle of a session can upset your writing flow, may result in lost USB communications, and can crash when you try to wake it up. Try resetting your system's sleep preferences to a longer duration (say, 30 minutes) or turning them off entirely. You'll burn up more battery power running your laptop in this mode, but it beats having to reboot your entire system.
For storing audio files, it's always a good idea to have a hard drive that is separate from your system drive. This prevents the mixing of audio files and application resources that can result in a badly fragmented drive and lead to poor drive performance and system crashes. Connecting an external FireWire or USB drive to your laptop is one solution, but it's one more item to pack. If you do go with an external drive, however, make sure it is self-powered, like the HUSH 5400 series drives from AVammo, which store from 20 to 60 GB.
A more elegant solution is to split your system drive into two partitions, one for your system and program files and the other for audio files. This may, at first, seem like an inefficient way to use your system drive, but in the long run, it will help optimize your digital audio sequencer's performance and keep your files organized. Unless you use custom software such as PowerQuest's Partition Magic (Win), partitioning a drive must be done at the formatting stage, so make sure to partition your system drive before you start installing software. And choose your partition sizes carefully, because once they are set, you typically can't change them without reformatting (allow a minimum of 10 GB for your system and programs' partition).
Most laptops come standard with two USB ports, but with so many USB peripherals to plug in (the keyboard controller, audio interface, and copy-protection dongles, and so on), two ports are sometimes not enough. Fortunately, USB hubs are inexpensive and easy to find. When choosing a hub, find one that can draw its power right from your computer's USB port. Some audio interfaces must be connected directly to the computer's first USB port and will not work plugged in to a hub. In these instances, connect the hub to your computer's second USB port and use it exclusively with devices that don't need much power (such as copy-protection dongles and battery-driven controllers).
Don't be cheap when choosing a case for your laptop. After spending so much money on the computer and many hours setting it up, you need to protect your investment. A little tumble in a cheap and poorly designed bag can be a costly accident that may have been easily avoided by spending a few extra bucks on a well-designed bag. Good computer stores sell backpacks that are specially designed for laptops and have plenty of pockets for cables, headphones, CDs, and small interfaces. You could also go with a more traditional, over-the-shoulder soft case. London Fog makes bags with a removable, soft, padded envelope that the laptop fits into. When the envelope is stowed in the main bag, there is a good amount of cushioning around your computer. Whatever style you choose, make sure it provides ample protection but isn't so heavy that it becomes a pain to carry when it's loaded with gear.
No matter what type of system you decide to put together, remember that portability and ease of use are key factors. You don't want a system that is a big hassle to pack and painfully heavy to carry, nor do you want a setup that isn't powerful enough to get the job done. To make life easy on myself, I have assembled two separate setups for my laptop. One consists of a small USB audio interface and keyboard controller, which I grab when I want to travel light. The second is a 3-space rackmount system containing a mic preamp, a multiport MIDI interface, and a FireWire audio interface. I bring this setup with me when I plan to do multitrack recording and I know that there will be an external power source at my destination.
A compact and easy-to-use system can inspire you to compose and record music whenever you have time and wherever you are, instead of just when you make it into the studio. There's also the added bonus that composing in different locations can be a very enjoyable change of pace and an inspiration of its own. The portable rigs that I built have been some of the best investments I've ever made in terms of my productivity. They are not meant to replace my home studio (though the power is certainly there); they are simply another way to keep the music flowing. If daily life is eating up your every free moment and you would give anything to steal away for an hour or two of composing, you are probably a good candidate for a laptop-based writing and recording setup.
VisitErik Hawkins's fledgling record label at to hear music made with today's hottest studio gizmos and check out his new virtual-studio recording book, Studio-in-a-Box (Artist Pro/Hal Leonard).
See for details on these and other models.
1-slot CardBus-to-PCI expansion system (half-length) $945
1-slot CardBus-to-PCI expansion system (full-length) $995
2-slot CardBus-to-PCI expansion system (full-length) $895
DIGIDESIGNMboxUSBUSB44.1, 48 kHz24-bit(2)n/an/a(2) balanced/unbalanced ¼" TRS/XLR Neutrik combo connectors(2) ¼" balanced/unbalanced TRS; (1) ¼" headphone;(1) ¼" headphone(1 pr.) S/PDIF on RCA connectorsno(2) ¼" TRS analog inserts$495.00M-AUDIOAudio DuoUSB9 VAC wall wart11-96 kHz24-bit(2)n/an/a(2) balanced XLR mic; (2) balanced ¼" TRS*(2) ¼" unbalanced; (1) ¼" headphone(1 pr.) S/PDIF on RCA connectorsnon/a$349.95M-AUDIOQuattroUSB9 VAC wall wart11-96 kHz24-bit(2)*n/an/a(4) balanced/unbalanced ¼" TRS(4) ¼" balanced/unbalanced TRS; (2) ¼" headphone*n/ayesn/a$349.95MOTU828FireWireinternal44.1, 48 kHz24-bit(2)n/an/a(2) balanced/unbalanced ¼" TRS/XLR Neutrik combo connectors (6) balanced/unbalanced ¼" TRS(8) ¼;" (2) ¼" monitor out; (1) ¼" headphone(1 pr.) optical S/PDIF/ ADAT opticalnoADAT sync in; foot-switch input$795.00MOTU896FireWireinternal44.1, 48, 88.2, 96 kHz24-bit(8)n/an/a(8) balanced/unbalanced ¼" TRS/XLR Neutrik combo connectors(8) balanced XLR; (2) balanced XLR monitor out; (1) ¼" headphone(1 pr.) AES/EBU on XLR connectors; ADAT opticalnoword-clock I/O on BNC connectors; ADAT sync in; footswitch input$1,295.00RMEMultifacePC CardBus or PCI12 VAC wall (PC CardBus) internal (PCI)32-96 kHz24-bitnon/an/a(8) ¼" balanced/unbalanced TRS(8) ¼" balanced/unbalanced TRS; (1) ¼" headphone(1 pr.) S/PDIF on RCA connectors; (1) S/PDIF/ADAT opticalyesword-clock I/O on BNC connectors; ADAT sync in$1,305.00 (PC CardBus interface) or $1,235.00 (PCI interface)STEINBERGNuendo AudioLink 96 Mobile card/Multiset interfacePC CardBus or PCI12 VAC wall (PC CardBus) internal (PCI)32-96 kHz24-bitnon/an/a(8) ¼" balanced/unbalanced TRS(8) ¼" balanced/unbalanced TRS; (1) ¼" headphone(1 pr.) S/PDIF on RCA connectors; (1) S/PDIF/ADAT opticalyesword-clock I/O on BNC connectors; ADAT sync in$1,300.00 (PC CardBus interface) or $1,230.00 (PCI interface)TASCAMUS-224USBUSB44.1, 48 kHz24-bitnon/an/a(2) balanced XLR mic; (2) ¼" balanced line/unbalanced TRS guitar; (2) unbalanced RCA(1) unbalanced RCA; (1) ¼" headphone(1 pr.) S/PDIF on RCA connectorsyesn/a$375.00
EDIROLPC-300n/aUSB or wall wartn/an/an/a49 notes(1) assignable slider; Pitch-Bend/Mod Wheel combo levern/an/an/an/an/a$199.00M-AUDIOOxygen 8n/aUSB adapter, (6) AA batteries or wall wartn/an/an/a25 notes(1) assignable slider; (8) assignable knobs; Pitch-Bend wheel, Mod Wheeln/an/an/an/an/a$179.00
EDIROLUM-1SUSBn/an/an/an/an/an/an/an/an/a(1) In, (1) Outn/a$39.00EDIROLUM-2USBn/an/an/an/an/an/an/an/an/a(2) In, (2) Outn/a$79.00MOTUMTP AVinternaln/an/an/an/an/an/an/an/an/a(8) MIDI In; (8) MIDI Out(1) SMPTE ¼" in; (1) SMPTE ¼" out; word-clock out (BNC); video in (BNC); ADAT 9-pin D-sync out; (2) footpedal inputs; Mac serial port; Network port$595.00*Available with the Omni/O optional breakout box.
IK Multimedia
London Fog
Mobility Electronics
Native Instruments
Sonic Foundry
TC Works
Universal Audio
The computers listed below are stock configurations and can be purchased as they appear, directly from the manufacturer or an authorized dealer. Prices are current as of this writing. For most models, you will probably want to add RAM, which will increase the total cost. For more suggestions on notebooks suitable for audio applications (especially audio recording) and other related tips, visit and check out the Tech Info page.
Apple Titanium PowerBook
PowerPC G4/800 MHz
512 MB of system RAM (or more)
40 GB Ultra ATA drive
15.2" screen
Combo drive (DVD-ROM/CD-RW)
(2) USB
(1) FireWire
(1) PC CardBus slot
Apple iBook PowerPC G3/700 MHz
256 MB of system RAM
30 GB Ultra ATA drive
14.1" screen
Combo drive (DVD-ROM/CD-RW)
(2) USB
(1) FireWire
IBM Thinkpad A Series
Pentium 4/1.6 GHz
256 MB of system RAM
40 GB Ultra ATA drive
15" screen
Combo drive (DVD-ROM/CD-RW)
(2) USB
(1) PC CardBus slot
|
global_01_local_2_shard_00001658_processed.jsonl/5314
|
Latest in Agere
Image credit:
Agere's BluOnyx portable Bluetooth media streamer for your phone
Ryan Block, @ryan
So the portable media usage scenario we hear most about around these parts looks a little something like this: user has cellphone, user has portable media device, user wishes portable media device could be integrated into cellphone so user only needs to take with them one device. Enter, oddly, Agere's new oxymoronically named BluOnyx device. By way of Bluetooth, SD card, or USB, users load up their BluOnyx -- which, conceptually, could come with between 1 and 40GB of space, would be roughly 85 x 54 x 6 or 15mm, and cost between $100 and $250 -- with content, which is in turn wirelessly transferred via Bluetooth to the user's cellphone for playback, effectively reducing the devices carried from two to, um, two. Granted, we do think being able to easily broadcast video to everyone (or just your specified friends) in your vicinity via Bluetooth, or quickly backup our phone to a portable hard drive are interesting ideas, but we're not entirely sure that novelty is enough to get you to leave your media player at home. Especially not when its replacement is another device which is better suited for helping to faster run down your phone's battery while watching video on a screen undoubtedly smaller than your media player's.
From around the web
ear iconeye icontext filevr
|
global_01_local_2_shard_00001658_processed.jsonl/5330
|
The egg-shaped USB speakers look aesthetically pleasing, and sound fantastic until you hit mid-high volume, which happens to be around a mere 30%. More power is clearly needed.
4 April 2012, Comments: 1
April 2012 R. Scott Clark
Speaker Design
Egg lover that I am, I must admit it’s been incredibly hard to work at a computer with two jumbo-sized eggs in front of me. At 14cm tall and 11cm in diameter, the Olasonic TW-S7 speakers are almost as large as your average ostrich eggs, and per egg cost roughly the same as well. Seriously. I would like some breakfast now, please.
Olasonic claims to have a reason for this madness, however, in that the egg shape’s lack of parallel planes helps to reduce standing waves inside the speaker. This in turn increases the overall volume of the enclosure by eliminating the need for dampening insulation and allows for a deeper bass response. The other key reasoning behind the egg shape is its inherent lack of sharp 90-degree edges, reducing diffraction loss. I’ll be the first to admit that I’m not an audiophile and was never all that good at physics, so much of this audio theory is above my level. That said, after a night’s worth of furious Googling I’m well enough convinced that there’s more to the egg shape than its chic aesthetic.
To keep the eggs from toppling over, Olasonic includes two silicone stands in the box that match the color of the speakers. Unfortunately, they don’t provide adequate friction so the speakers will frequently tilt backwards at high volume to the bass kicks. A quick application of some double-sided tape or putty will quickly address the issue, but I’m of the opinion that this shouldn’t be needed in the first place with a pair of $100 speakers. The silicone stands double in their purpose to provide insulation between the desk and speakers to kill unwanted vibrations. A small but pleasant amount of bass resonance is still allowed through, though, which I find helps raise the immersion level.
TW-S7 comes in black and white.
The stereo qualities of the TW-S7 speakers don’t end with the egg design. The plastic cones are relatively large for USB speakers at 60mm in diameter, and feature smooth rubber surrounds that also look to be of high quality. Center of the driver is a visually striking chromed dust cap, which is accompanied by an also-chromed diffuser that does well to distribute the high-frequency sounds so they’re not as directional. At the rear of the speaker, you’ll also notice a second 60mm opening for the passive radiator to give bass some extra punch.
Of course, what really drives my attention to the Olasonic speakers is their USB interface. This is after all. Whereas analog speakers connected to my computers’ onboard sound will all have soft hisses, pops and whines directly tied to my processor load, the USB interface on the Olasonic speakers delivers nothing but clean audio. Unfortunately, the TW-S7 lacks an auxiliary input to complement the USB interface, so don’t expect to be able to connect a smartphone or iPod to these speakers.
The single USB connection also serves as the sole source of power for the speakers, which poses a huge issue that I’ll get to later in the performance section of this review. Ordinarily USB-powered speakers are designed as such for portability, able to be quickly plugged into a laptop on the go without the need to find two empty power outlets. It strikes me as odd then, that Olasonic would willingly limit themselves to USB’s 2.5 watts of power when their speakers aren’t even close to being portable. Simply put, ostrich eggs simply don’t pack well in a backpack. Even if you did have ample room in your bag, you still wouldn’t want to throw them in to it since there’s no carrying case or sack to protect the delicate cones from being punctured or the high-gloss surface from being scratched.
Sound Quality
One of the key features about the Olasonic TW-S7 is its so-called Super Charged Drive System, or SCDS. In layman’s terms, this is a fast capacitor that pools unused energy during periods of low output, dynamically releasing it during periods of high output. So rather than being limited to 2.5 watts of power as the USB 2.0 specification would dictate (500mA x 5V), the TW-S7 can reach a peak output of 10W under ideal conditions.
Of course, the SCDS system has its limits as it’s ultimately fed by the same 2.5W source as any other speaker. Constant output at high volume, particularly tracks with a prominent bass guitar or heavy drum beat, will quickly cause the TW-S7s to fail in a most unflattering way. While most other USB speakers will crackle on the fringes and interject brief periods of silence if overdriven past what USB can supply, the Olasonic speakers will keep on going only to sputter on the bass. Crackling and pausing in this case is preferential because it simply halts the music. A sputtered bass line though has the potential to irritate beyond belief, much like a teenager attempting to play Stairway to Heaven but missing a third of the notes.
That’s not to say that the SCDS system is without merit, however. On bass-light tracks such as Van Halen’s Eruption or many classical music selections, the Olasonic speakers are able to reach much higher volumes without distortion than other USB speakers. Even the Logitech V20, formerly the king of USB-powered desktop speakers before it was discontinued, are very much outclassed by the giant eggs in both terms of loudness and overall sound quality. It’s a night and day comparison between the V20s and the TW-S7s, and yet that’s what I’d say about the V20s next to just about any other USB speaker.
At moderate listening levels for sitting in front of a desk, the Olasonics sound absolutely phenomenal. The sound is brilliantly spatialized in a way that envelops you, and manages to do so without stumbling across the pitfalls of a hollow sound that plague other non-directional speakers. If anything, the sound is very much full-bodied. Highs are stunningly clear, mids are well-pronounced, and bass has an excellent depth and kick that never sounds boomy or leaves me wishing for a subwoofer. Olasonic has clearly taken their time with balancing the TW-S7 and has managed to create something truly extraordinary here.
The best way to keep the TW-S7 speakers performing at their best is to maintain a tight grip on the volume control. Depending on the genre of music, these speakers will become unwieldy and start to sputter at anywhere above 27-50% volume. With my tastes in rock and trance music, the threshold is closer to around 30%. Having the speaker volume restricted to less than a third of the range obviously doesn’t do well for fine grained adjustments, so Olasonic recommends to lower the mixer volume on individual applications such as iTunes so the overall speaker volume can be kept high. This solution works but I find it a burden to make changes for every application that I launch, especially with full-screen games. Typically I’m appreciative of extra amplification headroom for whenever I stumble across a YouTube video with low volume, but I believe that Olasonic has taken the concept too far in this case.
I’m rather impressed by the Olasonic TW-S7’s sound qualities. Their enveloping sound has plenty of thump and kick, and yet there’s a perfect harmony between the bass, midtones and highs that sounds just right. The TW-S7s sound better than any pair of USB-powered desktop speakers that I’ve used to date, which is why I find it such a shame that they’re also so terrible once the volume is turned up to a medium-high level.
USB’s 2.5 watts of power will only get you so far before distortion kicks in, and while Olasonic’s SCDS dynamic output manages to somewhat bypass that problem for lightweight genres like classical music, anything with a bass line will quickly find itself choking for more power. There’s no way these speakers could be considered portable, so I find it hard to understand why Olasonic would give themselves such a debilitating handicap that’s made all the more obvious by the speakers’ outlandish volume range. Had Olasonic decided to include an AC adapter or a dual USB plug for additional power along with some stands that provide better resistance against the bass kicks, the TW-S7s would have been an easy recommendation for a decent 2.0 stereo system. But with an asking price of $100 and the current set of flaws, my advice is to hold off on purchasing until these drop below $70 or Olasonic releases a second revision.
USB Speakers on Amazon
Sharing is Caring
Help spread the word. You're awesome for doing it!
|
global_01_local_2_shard_00001658_processed.jsonl/5337
|
Difference between fsync and rsync ?
What is the difference between rsync and fsync?
Who is Participating?
Fsync - is a single perl script that for file sync between to machines quite similar to rsync
rsync - is C and does the same thing.
Only difference from what i know it he language they are written in and few different features (but motly the same)
mokkanAuthor Commented:
Thank you
Question has a verified solution.
Have a better answer? Share it in a comment.
All Courses
From novice to tech pro — start learning today.
|
global_01_local_2_shard_00001658_processed.jsonl/5340
|
Snow crunches and drifts in a thickening flurry under his boots. Gendry runs, his lungs screaming for air against the barb-sharp chill of the wind.
He can't slow. Not for one moment.
They're relying on him.
Arya's brother, now confronting the army of the undead without him — Jon trusts him to make it back to Eastwatch alive and deliver the message with the ravens. Nobody is dying like this, and least of all, not him. Not away from the comforting flames of a hearth.
He half-expects one of those damned dead bastards to chase him, or follow him up the mountain.
It's the everlong reach of nightfall and the bone-aching, numbing cold keeping Gendry company as the hours dwindle away.
He runs, runs harder than ever in his life. Through this gods-damned snow and ice, cursing his fortune and Jon Snow's bravery and Ser Davos for discovering him in Flea Bottom, and the Seven while Gendry is at it. It doesn't matter. They're too far off to hear him deep in the Northern wilds.
Arya notices her left forefinger and thumb shaking visibly, nearly pouring her spoonful of barley and venison soup onto herself.
"What's the matter?" Sansa asks in a whisper, eyeing her across the long, taper-lit dining table. The immediate concern tightens Sansa's expression.
"It's nothing. May I be excused, m'lady?" Arya says dully, pulling herself out of her chair and bowing.
The annoyance flashes in Sansa's eyes. She hasn't taken to Arya's derisive show of formality.
"Sansa," Arya replies prettily, the corners of her mouth twitching. With a little more insistent, amused eye-content, Sansa's own lips curl up.
With a firm, hushed nod from her older sister, Arya nods in return and to Bran, walking from the supper table. She heads for a open-air cloister, rubbing at her collarbone with a frown. Each step makes Arya's chest and her insides feel like they're turning into molten steel within, burning hot and sucking out her air.
She grabs a fur-lined cloak off a rack, but to no avail. The cold is sudden and weakening, and unlike anything about winter Arya understands.
It extends and expands, as if burrowing under Arya's skin and penetrating her very marrow.
I've never seen snow.
Gendry's mind churns and dims, as his body fights off the quivering urge to collapse down.
A dark, looming mass on the horizon. Maybe it's the gates of Eastwatch cranking and shuddering open for him… maybe it's…
One of his feet tangles up with the other, and Gendry clumsily heaves onto the ground.
Let me go to her.
His reddened, frostbitten nostrils fill with the icy shards of crystallized snow. He doesn't groan upon impact, slamming his cheek down, but lies there on the white, snowy bank, panting out his mouth.
"Lady Arya?" Brienne calls out, racing up the nearby wooden stairs to greet her, halting.
Another sucking, trembling breath. The lightheadedness washes over her, and Arya feels herself rock forward, losing her balance.
Instead of tumbling onto her face, Brianne catches a sweaty Arya going limp and gasping and coughing, kneeling down and yelling for Poderick down below, find a maester, be quick about it, Lady Arya, Arya, can you hear me… …
A tinge of blood and frost, collecting, lying against Arya's damp tongue.
I want to tell her… I saw it.
Gendry shuts his eyes and imagines a pair of hooded, grey eyes peering down on him.
I… saw…
Dawnlight filters into the chamber-room.
Sansa chews on her lower lip raw, and then on the surface of her knuckles, observing the maester bathing Arya's forehead with herbs and warm water. "Her fever is strong, m'lady."
"Arya's stronger," Sansa mutters, eyebrows furrowing and the blue of her eyes darkening.
"Of course, m'lady. I only meant—"
With enough force to jerk herself upright from her pillows, Arya wakes, gasping noisily. Everyone else initially starts backwards from the cot.
Even the lone, ominous word itself flies out of Arya's lips, breathy and choked for existence.
Her naked, thin shoulders clench in. She dizzily stares ahead, blinking once and passes out, Arya's head flopping onto her pillow.
The innermost walls of Eastwatch are cold and stone-grey, on all sides of him, when Gendry opens his eyes.
"You've made it beyond the Wall, and back," Ser Davos tells him. He chuckles heartily when the younger man groans out, wincing and squinting his eyes at him. "Most of the people born in the South could not make that accomplishment in their lifetime."
"Is that why I can't feel anything?"
Without losing his smile, Ser Davos touches over Gendry's left hand resting on the sheets, finding a joint and squeezing down harshly.
"Seven hells!" Gendry cries out, yanking out of his grasp, scowling.
Another chuckle.
"I think you're going to be fine, Gendry."
He saw
Arya's eyelids tremble. She rolls onto her stomach, weakly pushing up. The chamber-room is quieter, bright and flush with sunlight.
"Bran? What's happened?"
He offers a slight head-nod, lowering his chin. "Sansa told me to watch over you while everyone's gone. She's talking with the lords," Bran explains pensively, helping Arya sit onto the linens by grasping steadily onto her fingers. "Lady Brienne has decided to guard the door. You gave her a fright. Even Sansa."
The dizziness subsides. Arya rubs under her eye and tucks her legs together, frowning.
"You felt it, didn't you?" he adds, meeting their near identical Stark grey eyes. The lack of tone to Bran's voice prickles her flesh.
"Felt what?"
Arya frowns again, shaking her head. "That's ridiculous," she mutters. "I'm not some kind of greenseer."
Bran's mouth twitches, almost resembling a faint smile.
"Perhaps he was trying to reach out to you," he says. Arya's heart quickens at the memory of the cold and the anguish overwhelming her. It didn't belong to her. Those sensations. "You don't need to be a greenseer to feel when someone loves you, Arya."
At the mention of her name, finally spoken by Bran, she clenches her teeth.
"Sansa was right you're different."
"Yes, that's true," Bran replies softly, knowingly, ignoring the brittle frustration in Arya's voice. "Same as you."
The chamber-door rattles open. One of the newer stewards greets them by the entry-way, followed by a stern, disapproving Brienne. His words mean little to her, drifting and melting out of Arya's hearing, leaving out only a blaring nothingness.
Same as you.
Arya grinds her palms over her face, breathing out shakily.
gendry's just fine he got tired and fell asleep in the snow and remember ser davos pulled him back inside and gendry will warm up and head to winterfell it's all good everyone's fine everybody's alive okay arya and gendry will reunite and evERYTHING'S GONNA BE ALRIGHT NOW YOU'LL SEE
also i appreciate it but guys it's a ONESHOT so there's no more... ever... don't alert/subscribe to this fic uhh it's literally pointless?
|
global_01_local_2_shard_00001658_processed.jsonl/5342
|
Industrial and Organizational Psychology - Fastweb
Industrial and Organizational Psychology
Provided by
Industrial and Organizational Psychology
Industrial and organizational psychology (also known as I–O psychology, industrial–organizational psychology, industrial psychology, work psychology, organizational psychology, or personnel psychology) is the scientific study of employees, workplaces, and organizations. Industrial–organizational psychologists contribute to an organization's success by improving the performance and well-being of its people. An I–O psychologist researches and identifies how behaviors and attitudes can be improved through hiring practices, training programs, and feedback systems. I–O psychology can also be viewed as the equivalent of the economics concept of human capital.
An applied science, I–O psychology is represented by Division 14 of the American Psychological Association, known formally as the Society for Industrial and Organizational Psychology (SIOP).
Matching Industrial and Organizational Psychology Colleges
Industrial and Organizational Psychology Scholarships
Name Amount Deadline
William Randolph Hearst Endowed Fellowship for Minority Students Up to $4,000 August 06, 2018
Samuel Cochran Endowed Generativity Scholarship $1,000 February 15, 2019
Matthew E. Russ and Ann Fitzmaurice-Russ Scholarship Varies December 01, 2018
Graduate Psychology Award Varies December 01, 2018
Katherine Vickery Scholarship Varies March 01, 2019
Charles W. Dobson Memorial Research Scholarship Varies February 01, 2019
Albert and Adele Krotzer Fund Scholarship Varies February 01, 2019
W. Joseph Findley Scholarship Varies February 01, 2019
Tom Cannon Student Service Scholarship Varies February 01, 2019
Sarah Raffkind Scholarship Varies February 01, 2019
|
global_01_local_2_shard_00001658_processed.jsonl/5343
|
Portable Blumentals Rapid SEO Tool 2.3
Rapid SEO Tool portable is unique search engine optimization software designed to ease the task of improving web page position on search results. It will literally look at your web page code and suggest what can be improved to get better results. You don’t even have to be an SEO professional.
Key Features:
Automatic suggestions
Generate clear instructions on improving your search engine positions
Side-by-side comparison
Compare against competitors and see why they get better results
Content check
Free SEO book / guide
Learn SEO basics by example within 5 minutes
Performance check
Easily run a number of performance and quality checks
Spider view
See how search engines see your website
Keyword density analysis
Retrieve in-depth keyword density analysis
Keyword density charts
See how your page stacks against competition
Easily generate and save in-depth SEO reports
|
global_01_local_2_shard_00001658_processed.jsonl/5346
|
Need a control panel for live streaming
I am looking for a reliable programmer. I want IPTV streaming control , admin panel.
with multiple functions..
like adding loadbalancers adding users to loadbalancers etc.. live stream details etc..
live user details ., logs etc.. C++ tool in background for checking streams each 1 minute if source down try to restart stream from second third fourth sources (backup streams)
simple user management with allowed connections expire date ban delete modify view user logs status iplock on user etc..
group management for adding channels in multiple bouqets and assign to users.. able to assign multiple groups ( channel groups like < FILM Channel, Sports Channels, Local Channels > can assign 3 groups to user or only one or 2 groups with asigned channels.
Nginx background for streaming. able to restream channels adding channels modifying channels adding backup streams and a good checker with logs when source is down show in backend on page.. i have already a template..
need to work with auto install script able to install simple to multiple servers.
1 script for instaling main server with backend
1 script for auto installing extra loadbalancers. loadbalancers need work with main backend.. able to assign users and channels on multiple loadbalancers..
for example if i have 200 users on master backend and want to add 100 off them to loadbalancer server1 and 50 on loadbalancer server2 it needs works 100%
stream details status uptime speed etc in a separate page
showing uptime howlong up in hours and minutes + seconds + source details + container type, fps speed, source speed (1x 2x [url removed, login to view] etc auto detect) stream audio type details.. online offline ..
realtime graphic on backend with showing input and output bandwith meter (in 100mbps out 100mbps + total usage for example 200mbps)
and connectionlog with country counter to show howmany connections are done from countrys etc.. its not tu much just want simple good light working panel.
and also last one abble to use profiles for transcoding channels..
selecting bitrate type audio only transcoding or only video only transcoding etc..
input types HTTP + RTSP + RTMP + UDP Multicast + Re-Stream Protocol + HTTP MPEG2/H264 TS + HTTP ASF (H264) + UDP/RTP MPEG2/H264 TS
output types for users enigma.1.6 [url removed, login to view] etc.. hls m3u
Skills: AJAX, Javascript, Nginx, PHP
Taidot: Java, Linux, Nginx, PHP, Videolähetykset
Näytä lisää: integrate youtube live streaming php website, control panel live iptv streaming, ffmpeg live streaming php, live streaming php project, mt4 need control panel, integrate live streaming php, live streaming php, control panel windows streaming php, control panel game ajax php, control panel free streaming, buat web live streaming php, php control panel windows server streaming, windows media control panel accounts streaming, php based game server control panel, setup live streaming video linux server
Tietoa työnantajasta:
( 0 arvostelua ) Canada
Projektin tunnus: #14788115
Greetings!! I am very thankful for this opportunity. It’s really exciting that we have similar kind of expertise and work experience. Similar: [login to view URL] User: admin Pass: admin V Lisää
$6701 CAD 40 päivässä
(60 arvostelua)
$750 CAD 10 päivässä
(116 arvostelua)
$555 CAD 10 päivässä
(26 arvostelua)
$515 CAD 10 päivässä
(176 arvostelua)
$555 CAD 10 päivässä
(104 arvostelua)
$555 CAD 10 päivässä
(47 arvostelua)
$277 CAD 10 päivässä
(101 arvostelua)
Hey, As i see you are looking for LIVE STREAMING website along with many functionality. We can surely use WEBRTC latest technology to create live streaming features from scratch. Actually, I am really very very con Lisää
$1000 CAD 10 päivässä
(62 arvostelua)
$515 CAD 10 päivässä
(51 arvostelua)
$515 CAD 10 päivässä
(20 arvostelua)
$1000 CAD 10 päivässä
(55 arvostelua)
$277 CAD 2 päivässä
(64 arvostelua)
$777 CAD 21 päivässä
(73 arvostelua)
hello,how are you. i read your bid carefully. i am c/c++, rtsp, video streaming expert and have full experience for 10 years. c++ language is my top skill. i can provide most quality and high speed. if you want Lisää
$555 CAD 10 päivässä
(53 arvostelua)
$555 CAD 10 päivässä
(45 arvostelua)
$1111 CAD 10 päivässä
(23 arvostelua)
$277 CAD 10 päivässä
(11 arvostelua)
$555 CAD 10 päivässä
(28 arvostelua)
im admin server linux and epert in iptv services i can help you Habilidades y experiencia relevante iptv services Htos propuestos $277.5 CAD - begin $277.5 CAD - finish
$555 CAD 10 päivässä
(18 arvostelua)
Hi We can develop the Back-end IPTV Admin Panel in Stalker with 3 tier management system. Just to let you know, we are experienced in the development of OTT app for Android STB, Android phone, Tab, Apple TV, iOS, R Lisää
$555 CAD 10 päivässä
(6 arvostelua)
|
global_01_local_2_shard_00001658_processed.jsonl/5349
|
The .mif file extension is related to the DMI (Desktop Management Interface).
There are 6 other file types using
the MIF file extension!
mif icon.mif - Adobe FrameMaker interchange format
mif icon.mif - ImageMagick image file format
empty icon.mif - MapInfo Interchange Format
mif icon.mif - Systems Management Server (SMS) Management Information Format
empty icon.mif - mAirList inline file
empty icon.mif - Xilinx CORE Generator memory initialization data
Bookmark & share this page with others:
MIF file - Management Information file
What is mif file? How to open mif files?
File type specification:
Various data file type icon Various data file type
The MIF file extension is associated with the Desktop Management Interface a framework for managing and tracking components in a desktop pc, notebook or server. The .mif file stores various data used for internal purposes of the DMI.
The default software associated to mif file type:
Desktop Management Interface (DMI) Microsoft Windows software
Company or developer:
Task Force, Inc.
DMI generates a standard framework for managing and tracking components in a desktop pc, notebook or server. DMI was the first desktop management standard.
Help how to open:
How to convert:
List of recommended software applications associated to the .mif file extension
and possible program actions that can be done with the file: like open mif file, edit mif file, convert mif file, view mif file, play mif file etc. (if exist software for corresponding action in's database).
• Others mif file
Unspecified and all other actions for computer programs working with mif file - Management Information file
Click on the software link for more information about Desktop Management Interface (DMI). Desktop Management Interface (DMI) uses mif file type for its internal purposes and/or also by different way than common edit or open file actions (eg. to install/execute/support an application itself, to store application or user data, configure program etc.).
Previous file extension
MIE file extension > Various data file types
Next file extension
file extension MIF
Follow us!
Enter any file extension without dot (e.g. pdf)
Search for file extension details and associated application(s)
RSS feed
|
global_01_local_2_shard_00001658_processed.jsonl/5367
|
Think of Your Resume Like a Google Search Results Page – and 4 More Prep Tips
When it comes to looking for a new job, the hardest part isn't the actual hunt – it's what happens as you prepare for the hunt. In particular, writing a great resume can be an incredibly stressful feat.
Continue Reading Below
Think about it: You're asked to put an entire summary of your professional life down on paper – but it must fit on one or two pages, or it won't be read. It must be 100 percent accurate, or you could be fired by your future employer. It must tell the story of your every career victory, or no one will take you seriously. It must not make you look too old or too young, or you could be perceived as incompetent. Oh, and it should be up to date – always. You never know when someone might ask for it.
For these reasons, it's often easier to help someone else with their resume than it is to begin to revise your own. But when you do begin, there are a few important things to keep in mind:
1. There's No One Way to Write a Resume
Every person has their own opinion of how resumes should look, so it's unlikely everyone will love yours. Find a layout you like and solicit friends for feedback. If each person is giving you the same feedback, listen. If nine out of 10 people love your resume and number 10 doesn't, listen to the first nine.
2. Think of Your Resume Like a Google Search Results Page
When you're searching for something on Google, you only read down far enough to get what you need. Hiring managers are the same way. They'll scan your resume and stop at the point when they feel like they know enough about you. Be sure the most important things are listed first.
3. Minimize Distractions
If you're concerned about your age, remove your college graduation year. Consider cutting your early jobs that no longer apply. Use an up-to-date email address by staying away from AOL and Comcast emails. If you're applying at an organization that is not affiliated with a particular religion or political group, consider reducing indirect references to faith or political party as much as possible – if not cutting them altogether.
4. Don't Be Shy
Give yourself credit for everything you've achieved and use numbers to quantify your results. For example, a military veteran may have something on their resume about how they managed a team. If you ask them how big the team was, you might learn they were managing 300 people. To the veteran, this seems completely normal. To an outsider, not only is this not normal, but it's incredibly impressive. Quantifying your results helps someone in another industry or job function understand what you really did.
5. Avoid Grammatical Errors
There is so much of your life packed onto those few pages that it may seem like a tiny mistake shouldn't matter very much – but you'd be surprised at just how often a hiring manager will toss a resume in the garbage over an incorrect verb tense or a random word in the wrong place. Even when writing isn't part of your job, you're judged on your ability to do it. Run your resume through spell check, read it out loud to yourself, and ask a grammar buff friend to take a look.
As painful as putting together a resume is, the good news is that it's part of the preparation process. It's done ahead of time – and you can get help along the way. There's no reason your resume should do anything other than add to the case that you're the perfect candidate for the job.
A version of this article originally appeared in the Memphis Daily News.
|
global_01_local_2_shard_00001658_processed.jsonl/5385
|
Simplify3D has a wide variety of settings you can customize
Fusion3 bundles Simplify3D with our 3D printers as this slicer software is both easy to use and very powerful for advanced users.
With all the different ways to customize and configure Simplify3D, it is also easy to accidentally cause problems that will negatively impact your print quality.
Here are tips from Fusion3’s support team to avoid common pitfalls:
Optimal Layer Heights:
Your layer height should be between 25% and 75% of your nozzle diameter. So for example, a 0.4mm nozzle can easily print layer heights from 0.05-0.30mm. Layer heights larger than this will result in very weak layer-to-layer bonding. Layer heights smaller than can cause inconsistent results, unless you have your part geometries and print settings perfectly optimized for the part.
Limitations of Lower Layer Heights:
As you use smaller layer heights, you will find that you need to use more infill. For example, don’t try to mix 0.1MM layer height and 10% infill. You may also find that certain geometry just won’t work at 0.1MM or lower LH, but works fine above 0.1MM.
Determining the Right Infill Percentage:
Ensure that your infill settings are between 10% and 90%. Too little infill will result in the roof of your part not having enough support to print correctly. Using 100% infill can result in the part being “overfilled” with the material. This extra material has to go somewhere and the excess will build up until it collides with the print head and causes the print to fail.
Pre-configured Print Quality Settings:
Most of the profiles that Fusion3 creates for the different certified materials have quality presets built in for different layer heights. You might be tempted to run everything on the “fine” setting, but unless your application specifically requires this, you’ll find that the standard preset will deliver a part that looks nearly as nice, takes half the time, and has a higher probability of successfully printing.
Modifying Fusion3’s Material Profiles:
Our profiles are set up with a known-to-work combination of layer height, temperature, speed, etc. Feel free to experiment with changing settings! But if you encounter odd behavior or unsatisfactory results, the first thing to try is to revert back to the stock settings and try again.
Attend A Live, Online Demo
Each week we host live, online webinars to demonstrate the capabilities and features of the F410 3D printer.
Over the course of 1 hour, we take you through the process of printing a part, from start-to-finish, and with 2 way audio, encourage you to ask questions along the way.
Thanks for responding! Please look for an invitation via email within 1 business day.
|
global_01_local_2_shard_00001658_processed.jsonl/5394
|
Gadgets in 2000 vs. Gadgets in 2012 [Pic]
12 Responses to Gadgets in 2000 vs. Gadgets in 2012 [Pic]
1. I can't say I agree with the flash drive or the wrist watch. I'd be a little nervous about plugging my phone into other people's computers to transfer files, and I find it much easier to flip my wrist to check the time than to pull out my cell phone and activate the screen. Otherwise, that is a pretty good list.
2. One problem with that list is that a several of those items were outdated in 2000. (the Game Gear was released in 1990/1991 and had long since flopped). The sentiment is right, but I feel like the list was made by someone who wasn't really keen on gadgets in 2000. I was getting an
I'm also kind of surprised a pager isn't on there. That's been a major shift as well.
• Which the difference can been seen by the start button which is purple not blue ( to hard to tell in this picture b/c the purple and blue were so close)
3. Gamegear is older than 2000`s, I had one when I was 9 … and that`s 20 year ago… in 2000`s I had a gameboy advance… so not totally correct.
Leave a Reply
|
global_01_local_2_shard_00001658_processed.jsonl/5403
|
Your Vulnerability Is Your Super Power
"When I started to tell people who I was then I could really connect with people on a deeper level."
Last summer, founder of Girlvana, Alex Mazerolle, traveled to Wales to speak at the 2017 Teen DO Lectures. She spoke about her experience of a disconnect with her body, mind and spirit, the power of vulnerability and realness, and finding her truth and her calling.
Alex is writing a Girlvana book, (!!!). Stay tuned for all the details about when it's coming out, and where you can find it. And because we know it's hard to wait, here's a little teaser:
The Girlvana Guidelines for Living A meaningful Life:
1. Tell the truth about who you are
2. Your vulnerability is your superpower
3. All this pain is not for nothing
4. There is a sanctuary inside of you, go there to find your answer
5. Trust your gut, it is always right
6. "If you have to fold to fit it, it aint right"—Yrsa Daley-Ward
|
global_01_local_2_shard_00001658_processed.jsonl/5477
|
How to Find and Remove Duplicate Files on Windows
Duplicate file finders scan your hard drive for unnecessary duplicated files and help you remove them, freeing up space. Here are our picks for the best duplicate file finders, whether you’re looking for something easy to use, an application you may already have installed, or a powerful tool with the most advanced filters.
You shouldn’t use these tools to remove duplicate files found in system folders like the Windows and Program Files folders. Windows and the programs you use may need these duplicate files in different locations to function properly.
Find and Delete Duplicate Files the Easy Way with Duplicate Cleaner Pro
If you’re really serious about finding and killing duplicate files, your best bet is Duplicate Cleaner Pro, which has an extremely simple interface with powerful features to delete duplicate files. This software isn’t free, but they do offer a free trial that you can use to test whether you like it. And of course, you don’t have to worry about crapware or spyware.
The Best Easy-to-Use Tool: Auslogics Duplicate File Finder
Many duplicate file finders are rather complex, and packed with many different options. Auslogics Duplicate File Finder is different from most, offering a simple interface that walks you through the process. It has other convenient features everyone should appreciate, such as a built-in preview pane that allows you to view images, listen to music files, and preview videos so you can see what files you’re deleting.
Some reviews knock Auslogics for bundling additional junkware with this application, but they’ve cleaned up their act somewhat since then. The installer did offer to install Auslogics Driver Updater when we installed the duplicate file finder, however. Be sure to uncheck any additional software offered during the installation process, as you don’t need a driver updater.
This application has sensible default settings offers a simple wizard that will walk you through the process. It will search non-system folders on all connected drives by default, but you can easily select which drives and folders you want to search in the sidebar. By default, it will search for images, audio files, video files, archives, and applications, but you can select only one type of file or have it look for all file types. You can easily tell it to search for files with a specific word or bit of text in their name if you’re looking for a specific file.
Once you’ve performed a search, you’ll see a list of duplicate files and you can easily view previews of them and other information. Or, to further narrow things down, you can click the “Filter” button and filter by date, size, or file type. Select the files you want to delete and click the “Delete Selected Files” button to send them to the Recycle Bin.
The Best Tool You May Already Have Installed: CCleaner
CCleaner is a popular tool, so there’s a good chance you already have it installed. CCleaner’s main feature is its junk file remover, which frees up space on your hard drive by removing unnecessary temporary files, but it also has quite a few other built-in tools, including a duplicate file finder.
Launch CCleaner and click Tools > Duplicate Finder to find this feature. It’s available on all versions of CCleaner, so you don’t need to pay for CCleaner Pro to use it.
CCleaner’s default settings are sensible, and will allow you to search for duplicate files on your C: drive while ignoring system files and hidden files. You could also choose to search a specific directory by clicking the “Add” button on the Include pane and selecting that folder. Be sure to select “Include files and subfolders” option while adding a new folder to ensure CCleaner searches any folders inside the folder you specify, too.
This tool’s interface for viewing duplicate files isn’t fancy, and doesn’t have all the same preview options Auslogics Duplicate File Finder does. However, it does allow you to easily select which files you want to delete and even save the list of duplicates to a text file. but it’s a basic interface that allows you to select which files you want to delete and even save the list of duplicate files to a text file. You can right-click a file in the list and select “Open containing folder” if you want to view the file itself on your system.
The Best Tool With Advanced Filters: SearchMyFiles
SearchMyFiles is a more advanced application with more customizable filters. It can search for files created, modified, or accessed only between specific dates and times you specify, for example.
This tool is created by NirSoft, who also creates many other useful free tools that never contain bundled junkware. Like many other NirSoft applications, it’s a portable app.
Launch it and you’ll see a complex looking search dialog. You’ll want to select “Duplicates Search” in the Search Mode box at the top of the window and then choose folders to search by clicking the “Browse” button to the right of Base Folders. For example, you could select C:\ to search your entire C: drive for duplicates. Configure whatever other settings you like and click “Start Search” to search for duplicate files. You’ll see a list of duplicate files arranged into groups, and you can select which ones you want to remove.
Many websites recommend dupeGuru as one of the best duplicate file finder tools, but it’s no longer officially supported on Windows. You shouldn’t download an old version of dupeGuru anymore, either—the developer says he’s seen reports of bugs on Windows 10 and doesn’t have time to fix them.
Lowell Heddings is the founder and Editor-in-Chief of How-To Geek. He spends all his free time making sure this site can bring you fresh geekery on a daily basis, and has been doing so for over eleven years.
|
global_01_local_2_shard_00001658_processed.jsonl/5487
|
04/13/2013 02:41 pm ET Updated Dec 06, 2017
Abused Dog Keeps Running Away From Home and Finally Finds Help
Meet Emerson, an adorably sweet little Papillion/Pomeranian mix. You'd never guess the struggles this tiny guy has faced by looking at him now, but little Emerson is a fighter and a survivor. This is where Emerson's story begins.
Emerson escaped from his home several times and found himself in the shelter again, and again. The shelter thought he was a stray. He was malnourished. His fur was so matted that it was literally pulling the skin off of his flesh, and he only had a couple of teeth left in his mouth. His tongue hangs out of his mouth in a strange way to this day because he has no teeth left to hold it back. Each time he ran away, his owner picked him up, and even though Emerson was in horrible condition, there was nothing the shelter could do but release him back to their care. It was impossible for the shelter workers to be sure how long he had been on the streets, and whether his condition and the injury to his leg happened after he ran away from home, or while in the care of his masters. Without evidence it was impossible to press any charges, prosecute, or remove him from the home. Despite his horrible condition, what stood out most in those early days at the shelter were Emerson's eyes. His eyes were constantly downcast, sad, defeated. He shook uncontrollably from a combination of fear and unbelievable pain. To see him in this condition was absolutely heart wrenching. He needed help.
You can watch Emerson's amazing transformation in this video, but I warn you, it's graphic and shows his horrible condition and wounded front leg.
His days at the Los Angeles shelter were numbered. It was the holiday season and for a dog in his condition, the odds of adoption are already slim. Dogs who are ill or injured (treatable or untreatable) are usually put in a separate area that is not viewable to the general public, so the likelihood of these dogs ever finding homes is next to impossible. During the holiday season most people are focused on shopping, family and celebration; not rescuing traumatized, injured dogs in need of costly surgeries. Emerson's future looked bleak, hopeless and brief.
That's when Emersion met Annie Hart from the Bill Foundation. Emerson had no idea that his entire life was about to change, and that his life of suffering and misery would soon be over.
With a loving and gentle hand, Emerson was given a bath and a trim. The matting in his fur had literally degolved his right front leg; this means that his entire leg was exposed, rotting flesh with no skin or fur on it. It is impossible to image the pain that a wound like that would have inflicted.
Rescuers lovingly stroked Emerson's head and held him close, making sure he felt loved, supported and secure, and soon enough, his fearful shaking stopped.
Emerson would have to have surgery, and ended up losing his front leg...
It was after the operation to remove his necrotic leg that he began to physically heal, and mentally blossom. For the first time in a long time, that horrible pain wasn't holding him back and making him miserable. Emerson could do more than just sit around suffering, he could bloom. Emerson's true character and personality began to shine ... and what a personality it is!
Emerson is an affectionate dog with a protective instinct for those that he loves, both canine and human.
Emerson is now in a new home with his new mama, Michaela. Michaela, an undeniable animal lover, brought Emerson to her beautiful, five-acre, Zen-like home and retreat. For Michaela, the decision to adopt Emerson was easy, all she had to do was look into his sad little eyes and, "I just knew that was my dog."
Emerson is clearly a survivor, and now he's got a new family with lots of doggie brothers and sisters. Thanks to The Bill Foundation, he has something else too ... he's got a new leash on life.
Do you have a Tail of Hope? We'd love to hear it! Visit us at and tell us your story!
Connect with The Pet Collective:
The Pet Collective Website:
The Pet Collective YouTube Channel: /ThePetCollective
The Pet Collective Cares YouTube Channel: /TPCCares
The Pet Collective Facebook: /thepetcollective
|
global_01_local_2_shard_00001658_processed.jsonl/5494
|
Public Communities 2018-06-21T12:45:22.397Z IBM Connections - Communities 1 1 10 eb089338-35cd-44f1-a7fd-f8a4a0ffb833 Chicago IBM Innovation Center 133 public true true 2009-04-29T14:12:03.101Z 2016-05-28T19:15:58.233Z Collaborate today. Innovate for tomorrow. Use our worldwide centers to help grow your business locally and globally: Training and one-to-one technical assistance to build and test your solutionsLinkage to IBM's sales support for sales opportunity assistanceCollaboration opportunities with IBM, other whia 12000076WN active false Alison_GC 31000267C2 active false false
|
global_01_local_2_shard_00001658_processed.jsonl/5499
|
IELTS Exam – Jeddah – November 10, 2017
This topic contains 0 replies, has 0 voices, and was last updated by mohamed 7 months, 1 week ago.
• Author
• #22663
Jeddah Speaking Test on 10 th of November
Part one
_Birthdays and their importance ,if i celebrate my birth day , now and while i was a child
who like more to make birthdays adults or teenagers
Part 2
A stranger that you met and you talk with him who and when and what said
Part 3
About Emails and chatting
Do u like to talk to strangers .Why
do you think women talk more than men
I have a question here fortunately i was trained on the same cue card before so once i saw the question and started talking i talked very fast So i donot know if he will feel this is a memorized answer ,honestly the situation happened to me in the real but i trained on it many times ?
Another Problem ,due to talking very fast i donot know if i complete one minute or not ,in normal for the same topic i talked for 2 min but i believe i told him the same number of woeds but in only one min ore less 55 Seconds ,after i finished i believe when he find me didnot complete the whole time asked me another question about the cue card before moving to the Part 3 ,question do u like to meet the same stranger again and why ?
Is this will affect my score ?
Viewing 1 post (of 1 total)
You must be logged in to reply to this topic.
Log in with your credentials
Forgot your details?
Create Account
|
global_01_local_2_shard_00001658_processed.jsonl/5517
|
IntMath Newsletter - Math in emails, vector fields, hard fun
By Murray Bourne, 16 Sep 2009
In this Newsletter:
1. Math tip (a) – How to send an email containing math
2. Math tip (b) – Vector fields
3. Math tip (c) – Hard fun
4. From the Math Blog
5. Final thought – Reading the universe
I've been working on a system to make it easier to send emails containing math.
In most mail systems, the best you can do is to add subscripts and superscripts, but it is not possible to type summation, square root and integral signs, or fractions.
Go check out the Math Mail System:
2. Math tip (b) – Vector fields
I wrote a special article on Vector Fields for this Newsletter. A vector field is like a map that indicates the size and direction of vectors for different positions in space. There are many interesting applications in the real world.
I found most of the vector field definitions in textbooks were very formal and they didn't help a newbie's understanding. I hope this is easier to understand.
vector fields introduction
A vector field mapped on a torus (donut)
Go to: Vector fields - a simple and painless introduction
3. Math tip (c) – Hard fun
What activity are you passionate about? Is it a sport, reading, making things, or perhaps computer games?
If you have a passion for something, it means you are willing to voluntarily put in lots of effort to achieve some desired outcome. And in the process, you learn a lot of things. This is authentic learning, and it is the result of hard fun.
Seymour Papert used the phrase "hard fun" to describe learning that is based on activities that...
... will harness the passion of the learner to the hard work needed to master difficult material and acquire habits of self-discipline.
Like most skills, math does not come automatically to most people. The only way we achieve in math is to devote some time having "hard fun". The "fun" comes from the "aha" moments that are inevitable after we struggle with some new problem. It may be "hard" at times, but it is certainly worth it.
You can read a short article by Papert (who studied under the famous psychologist Jean Piaget) on the topic here: Hard Fun
4. From the Math Blog
a) How to write math in an email
Writing emails that contain math is usually a problem - how do you enter all those signs and symbols?
b) Vector fields - a simple and painless introduction
Vector fields give us a way to map vectors that vary in a space.
c) Friday math movie - The Maggie Sort Algorithm
This cute film demonstrates problem-solving, algorithmic thinking and persistence. Maggie's having "hard fun" - but she doesn't know it yet!
d) Enter math in emails, forums and Web pages using ASCIIMathML
Frustrated trying to communicate math in emails or in a blog? ASCIIMathML may be your solution.
5. Final thought – Reading the universe
Here's something from the Italian astronomer Galileo, who risked death by supporting the view that the sun is the center of the solar system.
– Galileo
Until next time, all the best and have hard fun.
See the 6 Comments below.
6 Comments on “IntMath Newsletter - Math in emails, vector fields, hard fun”
1. Peter Evans says:
I have already written here, but to add this: was a top letter with vectors and maths in emails. Now do a tensor one. Just shows the truth is out there.
2. Colleen Young says:
Your post reminded me of my alternative to writing Maths and that is to use some sort of screencast tool. I love screenr - really quick and easy.
3. eduardo says:
i need more info on calculus thank u
4. Richard says:
Greetings to you Mr.Murray, i should say am priveledged to have subscribed to your monthly articles, they have enhanced my career as a math instructor, can you imagine i can now write math in a mail comfortably! The idea of hard fun is fun indeed! iam looking forward for the next math article.
5. Johan de Nijs says:
Out:"The pleasure of Finding things out". Richard P. Feynman. Page 15. Quote:" If you are interested in the ultimate character of the Physical world, or the complete world, and at the present time our only way to understand that is through a mathimatical type of reasoning,then I don't think a person can fully appreciate ....these particular aspects of the world....without an understanding of mathematics."
6. Murray says:
Thanks, Colleen! I like the look of screenr and I'll investigate it further.
Leave a comment
Comment Preview
To enter math, you can can either:
(See more on ASCIIMath syntax); or
(This is standard simple LaTeX.)
|
global_01_local_2_shard_00001658_processed.jsonl/5518
|
Perpendicular Lines
Perpendicular lines have the property that the product of their slopes is −1.
graph showing perpendicular lines
Mathematically, we say if a line has slope m1 and another line has slope m2 then the lines are perpendicular if
m1 × m2= −1
In the example at right, the slopes of the lines are `2` and `-0.5` and we have:
2 × −0.5 = −1
So the lines are perpendicular.
Opposite Reciprocal
Another way of finding the slope of a perpendicular line is to find the opposite reciprocal of the slope of the original line.
In plain English, this means turn the original slope upside down and take the negative.
Continues below
Interactive graph - perpendicular lines
You can explore the concept of perpendicular lines in the following JSXGraph (it's not a fixed image).
Drag any of the points A, B or C and observe the slopes m1, m2 of the 2 perpendicular lines.
You can move the graph up-down, left-right if you hold down the "Shift" key and then drag the graph.
Sometimes the labels overlap. It can't be helped!
If you get lost, you can always refresh the page.
Special Cases
What if one of the lines is parallel to the y-axis?
For example, the line y = 3 is parallel to the x-axis and has slope `0`. The line x = 3.6 is parallel to the y-axis and has an undefined slope.
The lines are clearly perpendicular, but we cannot find the product of their slopes. In such a case, we cannot draw a conclusion from the product of the slopes, but we can see immediately from the graph that the lines are perpendicular.
perpendicular lines - horizontal and vertical
The same situation occurs with the x- and y-axes. They are perpendicular, but we cannot calculate the product of the 2 slopes, since the slope of the y-axis is undefined.
Exercise 1
A line L has slope `m = 4`.
a) What is the slope of a line parallel to L?
b) What is the slope of a line perpendicular to L?
a) Since parallel lines have the same slope, the slope will be `4`.
b) Using m1 × m2= -1, with m1 = 4, we obtain the value for m2:
Easy to understand math videos:
Exercise 2
A line passes through (-3, 9) and (4, 4). Another line passes through (9, -1) and (4, -8). Are the lines parallel or perpendicular?
The line through `(-3,9)` and `(4,4)` has slope
The line through `(9,-1)` and `(4,-8)` has slope
Since the product of the slopes is `−1`, we conclude the lines are perpendicular.
Note: We could have sketched the lines to determine whether they were parallel or perpendicular.
Get the Daily Math Tweet!
IntMath on Twitter
|
global_01_local_2_shard_00001658_processed.jsonl/5519
|
Severe teratozoospermia and risk of birth defects
1. avatar
My husband was diagnosed with severe teratozoospermia since just 1% of his sperm present a normal sperm morphology 🙁 🙁
Even so, what are my chances of getting pregnant naturally? If there were any, would there be any risk of our baby developing any chromosomal abnormality, either physical or mental?
I’m 36 and my husband is 43.
Thank you very much for your cooperation in advance.
09/08/2015 at 1:08 pm
2. avatar
Sandra F.
Fertility Counselor
Dear Amelie,
If you have been trying to conceive for over a year with no luck so far, the most probable outcome is that specialists at your fertility clinic recommend you which will be the most appropriate treatment according to your situation and how other seminal parameters are working (i.e. sperm motility and sperm count).
Regarding teratozoospermia, its diagnosis depends on which part of your husband’s sperm is altered: the head, the middle-piece or the tail. For instance, in case it is the middle-piece or the tail, achieving pregnancy is almost impossible because it impedes the sperm is able to reach the egg and thus hinders fertilization.
Conversely, if the abnormal part is the head, the situation may be different, because birth defects may be milder. For example, in case the sperm has an oval-shaped head or a little vacuole, chances for fertilization to occur are still present and your baby will be as healthy as any other newborn.
However, there are more severe malformations such as pinhead-shaped sperm or balloon-shaped sperm. When that morphologies are detected, it means the genetic load carried by those sperm has some anomaly. Obviously, this would mean that fertilization is unlikely to occur or, in case it happens, fetal development may be stopped at early pregnancy.
Either way, it should be clear that abnormal sperm morphology is not necessarily related to fetal malformations. Bear in mind that the function of the sperm is just reaching the egg, fertilize it and deliver half the genetic load of the baby-to-be.
The genetic load is altered only in severe cases where there are malformations in the head of the spermatozoon. Moreover, when there are such severe malformations, chances for a full-term pregnancy are very low.
Thus, I recommend you to find out which your specific situation is.
Best wishes.
09/09/2015 at 1:23 pm
|
global_01_local_2_shard_00001658_processed.jsonl/5525
|
Antananarivo to Fort Lauderdale
Antananarivo (Antananarivo) to Fort Lauderdale (Florida) distance is 14606 km and you can get there by flight + flight in just over 22 hours and 3 minutes with fares starting from ₹ 121304. The weather is amazing right now. You'll have a great time.
Fort Lauderdale
Travel Guide
|
global_01_local_2_shard_00001658_processed.jsonl/5526
|
Bhadravati to Kushinagar
Bhadravati (Karnataka) to Kushinagar (Uttar Pradesh) distance is 2153 km and you can get there by train + train + car in just over 57 hours and 22 minutes with fares starting from ₹ 1986. The weather at Kushinagar is varying from "nice" to "hotter than nice".
Travel Guide
|
global_01_local_2_shard_00001658_processed.jsonl/5548
|
Katherine Strause
By Dr. Laura Amrhein
Diane Arbus
Arbus’s quote “A picture is a secret about a secret, the more it tells you the less you know” seems fitting when viewing this latest collection of Strause’s paintings. She engages the viewer to look closer at these individuals. What are their secrets? Do they know something we don’t? If we figure them out, will we learn something about ourselves? Strause has formed her own relationship with these individuals and now she asks us to do the same.
Using Format
|
global_01_local_2_shard_00001658_processed.jsonl/5550
|
President John F. Kennedy's 100th Birthday
As a child we lived in Washington, DC. One of the perks of living in and going to school in our nation's capital was the privilege of taking field trips to the various government buildings downtown. For me, early in 1963 that meant my class was taken to visit what is probably one of the most famous and prominent government buildings in America, The White House.
President John F. Kennedy
I remember being shown several rooms including the Red Room, the Blue Room and others. The tour guide even pulled the fabric back from one of the walls to reveal burn damage from when the building had been set afire in the 1800's.
At a certain point during the tour, we were escorted down a long beautiful hallway on the first floor. The area where we were was cordoned off by a long thick red rope. On the other side of the rope were two small children. Our teacher pointed them out.
Watching us watch them were the nation's two "first children", John John and Caroline Kennedy. Again, this was early in 1963, just months before the assassination of President Kennedy. That's one of those surreal memories from the heart of an 8 year old child.
Today, we celebrate the 100th birthday of President John Fitzgerald Kennedy and his legacy of strength, hope and freedom. JFK was a symbol of the shining beacon of America foreseen so many years earlier by our nation's forefathers.
|
global_01_local_2_shard_00001658_processed.jsonl/5554
|
23 VARIETIES OF ETHNIC ART: And How to Make Each One by Jean & Cle Kinney
23 VARIETIES OF ETHNIC ART: And How to Make Each One
Email this review
From the authors who included TV commercials in their last book on American folk art (1974), a murky melting pot of pseudo-ethnic artifacts, very freely derived from the crafts of the 23 immigrant groups whom the Kinneys describe in ludicrous stereotypes and depict, with their work, in photos that only show up the shoddiness of these adaptations. Silliest of all is the chapter on the Irish, which begins with talk of the potato famine and Maggie and Jiggs and then, because the Irish are known for their ""wit and wordsmithing,"" goes on to profile Eugene O'Neill as a representative folk artist. The craft here? A comic strip on the order of Maggie and Jiggs. The English are represented by their topiary gardens, the Jews by seal engraving (though there's a ""kosher Santa"" from Israel pictured toward the end), and elsewhere the Kinneys tell you how to copy Spanish goldwork with copper foil, Dutch tiles and Chinese pottery with Sculptamold, Bohemian glass in a plastic paperweight, etc. Of course none of this will turn out much like the originals nor will you learn much about another culture in the process, but what the hell? If you want ethnic, call it ethnic.
Pub Date: Oct. 14th, 1976
Publisher: Atheneum
|
global_01_local_2_shard_00001658_processed.jsonl/5569
|
J. Edward Pawlick, founder of the Lawyers Weekly group of legal newspapers, has died. He was 80. The Weston Town Crier has his obituary.
A lawyer, Pawlick founded Massachusetts Lawyers Weekly in 1972, working at first from his home. Over the years, he expanded with Lawyers Weekly newspapers in other states. In 1994, he launched a national newspaper, Lawyers Weekly USA (now Lawyers USA). In 1997, he sold the company to his daughter Susan Hall, who later sold it to Dolan Media. Pawlick went on to create a Massachusetts news Web site, no longer operating, that was controversial for its strong stance against gay marriage and against the Supreme Judicial Court justices who voted in favor of it.
I worked for Pawlick from 1987 to 1994, first as editor-in-chief of Massachusetts Lawyers Weekly and then as founding editor of Lawyers Weekly USA. Although he and I never saw eye-to-eye politically, I always had great respect for him as a newspaperman. He saw a need among lawyers for a different kind of news than they were getting elsewhere and he knew precisely how to fill that need. He emphasized need-to-know stories tied directly to the practice and business of law. And he pushed for those stories to be written and arranged in a style that would allow busy lawyers quickly to grasp their significance.
In Massachusetts, Pawlick’s legacy was to forever change the legal landscape. The paper he founded is as much a part of this state’s legal culture as are the courts and the bar associations. Ironically, he was never widely known here during his years running Lawyers Weekly, preferring to let the paper’s editors and staff be its public face. But for those of us who worked there, we felt Pawlick’s influence every day.
|
global_01_local_2_shard_00001658_processed.jsonl/5595
|
Finnish Museum of Natural History
Old grid system – Atlas Florae Europaeae
The grid of Atlas Florae Europaeae volumes 1–12, with its 4419 grid cells, was modified from the Military Grid Reference System (MGRS). The MGRS itself is an alphanumeric version of a numerical UTM (Universal Transverse Mercator) or UPS (Universal Polar Stereographic) grid coordinate.
Fig. 1: AFE 1–12 used the 50 x 50 km quadrants of the MGRS 100 x 100 km squares as mapping units. The MGRS pattern was modified in AFE as follows:
• Numbers 1 to 4 to indicate the 50 km x 50 km quarters of the MGRS 100 km x 100 km squares. This coding, such as MG1, MG2, MG3 and MG4 (for the NW, SW, NE and SE quarters of the larger MGRS squares), is not supported by the MGRS.
Fig. 2: Black squares in the picture indicate grid cells which were not used. The records from them were moved to adjacent squares, or to grid cells in non-standard position. Iceland, Svalbard and Azores not illustrated (there are plenty of similar cases in those areas, too).
• In coastal areas the squares with less than 10 % (250 km2) of land, records were transferred into the nearest mainland square. However, islands far from the coast and long peninsulas had their own squares. Some of the deviations are listed below; an asterisk (*) indicates symbols of squares the circles of which deviate from the actual position of the UTM squares.
British Isles The entire S. part of the Isle of Lewis is in PE2.
All of North Uist (etc.) is in *ND3.
All of S. South Uist (Barra, etc.) is in *ND4.
Dunvegan Head is in PD3.
All of the Isle of Man is in *UF4.
All of the Scilly Isles are in PR4.
UA2 is included in *UA1.
UA4 is included in UA3.
Guernsey and Sark are in WV1.
Alderney and Jersey are in WV3.
Denmark All of Laesö is in *PJ1.
All of Bornholm is in *VB4.
Faeröerne are in *FaeN and *FaeS, the limit between them follows Skopen Fjord.
Germany Helgoland is in ME1.
VA2 contains only E. RУМgen.
Greece The scheme from AFE vol. 3 (1976) – see Fig. 3 below.
Iceland All of Snaefellsnes is in *AN4.
Italy NP4 is included in PP2.
*PN2 contains: all of Elba, Capraia, Pianosa, Montecristo, and islands W. of it. (Mainland on PN2 is included in PN4).
UF2 also contains islands of UF4.
All of Isole Eolie o Lipari are in *VC3.
All of Pantelleria is in *QF3.
All of Isole Pelagie are in *TV1.
(All of Malta is in *VV1).
Netherlands All of Vlieland is in FU1.
All of Terschelling is in FV4.
Norway Kjelmesöy and the peninsula E. of it are in VC2.
*Björnöya and *Jan Mayen form a square of their own.
Kvitöya is in *NK4.
Kongsöya is in *NH1.
Svensköya is in *MH4.
Hopen is in *MF4.
Portugal Each island of the *Azores forms a square of its own.
Russia All of Poluostrov Rybachiy is in VC4.
NW. Kanin is in *MB4.
Ostrov Matveyev is in EB3, the rest of EC4 is included in EC3.
All of Suursari is in NG1.
Ostrov Malyy Tyutyarsari is in NG2.
Kolka is in EJ3.
Ostrov Dzharylgach is in VS4, Rybnoye in VR4.
Spain BD2 is included in *BC1.
All of Isla of Ibiza is in *CD4.
The entire W. part of Isla de Mallorca is in *DD3, the E. part in *ED1.
All of Isla de Menorca is in *EE4.
I. Alboran is in *VE3.
Sweden All of Gotska Sandön is in *CK3.
All of Central Gotland is in *CJ1.
W. edge of XD1 is in WD3, N. Öland is in XD2.
Turkey (European part) All of Imroz Ada is in ME2.
PF4 is included in *PF3.
Fig. 3: The scheme for Greece from AFE vol. 3 (1976).
Fig. 4: AFE grid pattern (not the actual grid; grid deviations omitted from this picture). Pale green = central seam square (two MGRS squares of different UTM zones merged, base width of the squares between 20–30 km); pale blue = seam square, widened for 10 km (base width 30–40 km); yellow = seam square with base width over 40 km; purple = narrow seam square (base width < 10 km merged with adjacent square in the same zone); red = seam square, narrowed 10 km; grey = rectanangular square, width 60 km; dark violet = rectangular square, base width 40 km; blue gridlines = MGRS grid in the UTM zone 34.
• The centre of grids covering isolated islands was put to the actual position of the island, irrespective of the standard grid. This resulted also in "polygon-like" grid cells, to include whole islands in a particular square.
• Certain individual mountain tops forming distinct biogeographic entities were not divided between two or more squares, despite of the grid.
• The square codes for all of Iceland deviated from the MGRS pattern.
To be able to limit the longitudinal width variation of the grid cells to 40 to 60 km, in the overlapping area between different UTM zones, the longitudinal limits of the grid cells were shifted outwards or inwards. When the standard MGRS squares extended into adjacent UTM zone, they were treated differently depending on the distance between the UTM zone boundary and the SW corner (if the square belongs to the zone west of the zone boundary) or SE corner (if in the eastern zone) of such seam squares. That distance, let's call it "x" below, is something between 0 - slightly above 50 km (can be above 50 in some cases, for instance where a UTM zone boundary goes through the NE corner of a square at the zone border). The x values of 10, 20, 30, 40 kilometers influenced the treatment of the squares in AFE 1–12 this way:
Fig. 5: Eastern border of the UTM zone 34 in Estonia and Finland. Colours are explained as follows:
• GREY = Parts of squares on the different sides of the zone boundary are merged if 40 <= x + x <= 60 km. This means for the squares to be merged, x must be between 20 and 30 km. Standard 10-km UTM lines are followed here, and the merging has no effect on the width of the adjacent standard squares.
• CYAN (DENSE BLUE DIAGONAL GRID SHOWS HOW THE WIDTH OF THE ADJACENT SQUARE IS CHANGED). If x is less than 20 km, the squares on different sides of the zone boundary are not merged, but the small parts of seam squares are joined the adjacent standard square. In cases where this would result in squares wider than 60 km, the width of the adjacent standard square is adjusted by narrowing its western or eastern edge (the edge farther from the zone border) to the next full 10-km UTM easting. In these cases x + 50 <= 60 which means if x is between 10 and 20, this longitudinal shift affecting the width of adjacent standard squares is done. Thus the width of the next standard square also grows to 60 km.
• YELLOW = If x is below 10 km, then slices are joined to the adjacent square without additionally reducing its width by 10 kilometers (and thus the next square remains as 50 km x 50 km square). Thus the width of the adjacent standard squares becomes something between 50 and 60 km.
• PURPLE (PURPLE HORIZONTAL GRID SHOWS HOW THE WIDTH OF THE ADJACENT SQUARE IS CHANGED). If x is more than 30 km, but less than 40 km, the partial square are not joined to the adjacent standard square, they would become too wide. Instead the edge outwards of the zone is extended to the next full 10-km UTM easting. Thus the grid cells become at least 40 km wide. Simultaneously the adjacent standard squares become 10 km narrower.
• RED = If x is more than 40 km, the square is treated as an independent grid cell.
Fig. 6: AFE old grid pattern in N Europe (deviations from the general pattern not shown!).
Contents: Raino Lampinen, 2001
Person in charge of the page:
Alex Sennikov
|
global_01_local_2_shard_00001658_processed.jsonl/5596
|
Solar System
The word planet comes from the Greek for wanderer. Detecting the wandering of the planets against the background stars is actually much simpler than many people realize.
Perhaps Mars is the best planet for observing this motion since it moves fairly quickly against the stellar backdrop and it is often visible much of the night. If you hold your closed fist at arm’s length the angle separating one side of your fist from the other will be about 10 degrees. If you hold up your index finger at arm’s length, the angle from one side of your finger to the other is about one degree.
Find bright red Mars some night and measure its separation from two or three nearby bright stars. You don’t really need to do this in degrees; you could simply note that Mars is, for example, five finger widths from star A. In addition you should make a quick sketch of the orientations of Mars and the stars you have chosen. Repeat this process for a week or two and you will be convinced that Mars is moving relative to the stars.
The apparent motion of any planet is the result of the combination of the Earth’s orbital motion and the planet’s orbital motion. At times the outer planets will appear to move more slowly as they begin and end retrograde motion. Retrograde motion occurs when the planet changes its apparent direction of motion as we “catch up and pass it” in our orbit. It is easier to observe the result of this combined motion in nearby planets than it is in more distant planets, just as when you are driving you see foreground objects (such as trees, houses and other cars) zip past more rapidly than distant objects (such as mountains or clouds).
Observing the motions of planets and moons is interesting because in the short time span of just a few hours or days it becomes clear that things really are moving and changing in the sky. The work to understand those motions and the resulting heliocentric model of the then-known universe was the true beginning of what we call science today.
Here we have some outer planet images that clearly display movement. We see many other interesting objects within our solar system, including moons, asteroids and comets. We also image human-made satellites and probably meteors from time-to-time.
|
global_01_local_2_shard_00001658_processed.jsonl/5598
|
Be inspired
More product details
Italian company brioni became a favourite of mr clark gable who discovered the brand when he came to rome to shoot films at the legendary cinecittã studios. Handmade from pure silk, this prince of wales check tie proves the brand's lasting appeal. Team it with a sharp-shouldered suit to channel the poise of the silver screen star. Color: blue
Previously sold at: MR PORTER
|
global_01_local_2_shard_00001658_processed.jsonl/5619
|
Posed photos aren't my thing.
I’m a photographer with a focus on working with people doing good
I have a documentary approach, love the dark and moody, and focus on capturing a feeling rather than a thing.
I search for the little moments, the unnoticed, and the fleeting emotion. The best things usually happen when you think nobody is looking, except I’m always looking.
People matter to me, your experience matters to me. I'll help you with your bow tie, tell you when you have lipstick on your teeth, and never photograph you when you have a double chin.
Marnie Hawson, Melbourne ethical wedding photographer
Marnie Hawson, Melbourne ethical wedding photographer
And who are you?
You're the adventurers, the couple who's not afraid to make your own space in the world, to buck tradition and do things your own way.
I think a wedding should be about celebrating your biggest love with your closest family and friends, and I'd love to be a part of it.
|
global_01_local_2_shard_00001658_processed.jsonl/5638
|
Here Are Donald Trump's Favorite Foods, Ranked From Unhealthy to Coronary-Inducing
"Trump's appetite seems to know no bounds."
donald trumps favorite foods ranked
Joel Arbaje
It's not exactly a surprise that Donald Trump doesn't make the best choices when it comes to food. (We all remember that time he put ketchup on his steak, don't we?) But thanks to a new book called Let Trump Be Trump, written by former campaign manager Corey Lewandowski and former aide David Bossie, we now know just how bad the president's diet really is.
Advertisement - Continue Reading Below
“Trump’s appetite seems to know no bounds when it comes to McDonald’s, with a dinner order consisting of two Big Macs, two Filet-O-Fish, and a chocolate malted," they write.
Lewandowski and Bossie, who have both traveled with Trump, write that Kentucky Fried Chicken, pizza, and Diet Coke were also staples on "Trump Force One."
Upon hearing this information, we took it upon ourselves to rank 45's favorite food in order of unhealthiness. Without further ado, here they are.
4. Pizza
Pizza sometimes gets a bad rap, but it really isn't that bad for you if it's made with healthy ingredients and not slathered in grease from a chain restaurant. (Although we're willing to bet Trump usually goes with the latter.) Just try to opt for whole-wheat slices, and don't be weird and just eat the toppings, as Trump says he does. The dough is there for a reason. (Though we can't fault Trump for eating pizza the wrong way, like he did when he was advertising stuffed crust pizza in 1995).
Advertisement - Continue Reading Below
3. Diet Coke
We know that Diet Coke isn't great for you. A study published earlier this year in the journal Stroke found that drinking the stuff regularly could lead to an increased risk in stroke and dementia. It can also lead to weight gain in people over the age of 65, according to a study published in The Journal of the American Geriatrics Society. (And considering Trump is 71, maybe it's time he switched to water.)
2. McDonald's
The Atlantic actually did the work for us on this one. The above meal of two Big Macs, two Filet-O-Fish, and a chocolate malted comes out to 2,400 calories.
"The 3,400 milligrams of sodium more than doubles the American Heart Association’s recommendation of 1,500 milligrams per day. The meal provides almost no fiber—and also offers more white bread than anyone would do well to eat in a week. This is all ominous for the president’s cardiovascular system," The Atlantic writes.
Additionally, the USDA recommends a man of Trump's age should consume about 2,000 to 2,200 calories a day. This one meal alone totals up to be more than someone should be eating in a 24-hour period.
1. KFC
While we don't know exactly what the book says about his specific order at KFC, we're going to base our numbers on this picture Trump tweeted in 2016.
Advertisement - Continue Reading Below
Advertisement - Continue Reading Below
That bucket is big. This leads us to believe 12 pieces of fried chicken could very well fit in there. He's also got a tub of gravy and a mystery tub probably containing mashed potatoes. It's also clear he's already gone to town on his meal, so we're assuming there was more food when he started, and the KFC website backs us up on this. According to their website, a 12-piece bucket meal comes with three large sides and six biscuits, and feeds six. Six! And we're willing to bet he didn't share either.
Next time you're feeling chicken, make this spicy ground chicken and vegetable stir fry:
Advertisement - Continue Reading Below
Assuming he ate the whole thing, a 12-piece variety bucket of extra-crispy thighs, drumsticks, wings, and breasts (we covered all bases) comes out to 4,800 calories, according to KFC's nutrition guide. One serving of gravy is 245 calories, six biscuits is 1,080 calories, and mashed potatoes with gravy is 120 calories (there's less gravy there), which, combined with the chicken, adds up to a whopping 6,245 calories. We don't know which other sides Trump got, but we're going to stop there because we're feeling a little nauseous right now. This is definitely the worst of his choices.
(Of course, chicken isn't bad for you if it's not drowning in sauce and sides. Here are 50 ways to prepare chicken the right way.)
Advertisement - Continue Reading Below
More From Nutrition
|
global_01_local_2_shard_00001658_processed.jsonl/5640
|
How to Handle Her Breasts
We asked 900 women how they want you to treat their girls. Check out what they had to say
I was checking out Women’s Health’s (awesomely redesigned) website the other day and came across an article on odd ways to orgasm. And although all five instances were really interesting, one in particular caught my eye: the Nipplegasm.
Now, I’ve heard about women reaching climax through nipple stimulation before, but I never knew what the science was behind the bliss. (Well, that is until now!)
Advertisement - Continue Reading Below
According to the piece:
“When the nipples are stimulated, oxytocin is released, which causes the same uterine and vaginal contractions associated with orgasm,” says ob-gyn Christiane Northrup, M.D., author of Women’s Bodies, Women’s Wisdom. “This brings more blood flow to the genitals and can trigger an orgasm.”
But just because our nipples can bring us to orgasm doesn’t mean we want you honing in on them like they’re bullseyes.
How can I say this with such authority? Well, for starters, I have them. So there’s that. Secondly, we sent out a survey!
We asked 900 women how they want you to treat their breasts. And if their responses convey one thing, it’s that you should probably take a broader approach to exploring her whole chest. (With your mouth.) Think you can handle that?
Here’s how the women’s answers break down.
Now go take advantage of your new-found knowledge! (And for more breast tips, check out The Best Ways to Touch Her Breasts.)
XO, Madeline Haller
Facebooking at
Tweeting at @MHGirlNextDoor
Instagramming at MHGirlNextDoor
Advertisement - Continue Reading Below
More From Girl Next Door
|
global_01_local_2_shard_00001658_processed.jsonl/5663
|
Report RSS Lord of the Rings... and other stuff.
Posted by on
Yes, I'm insane about those books. And movies. And games for that matter. I own all of the movies, all of the games released thus far for the PC, all of the games released for the GameCube, and, of course, a large number of fabulous mods for the BFME series. A rundown of my personal favorites:
Elven Alliance- Such high quality, even if it wasn't finished. And the campaign is awesome.
Rhovanion Alliance- So what if if hasn't been released? It's still amazing.
Special Extended Edition- Sure, it takes me over half an hour to take down my opponent's fortress, but it's still a really high-quality mod even if it does take forever to destroy buildings.
RC Mod- Some fun new factions, and the new Create-A-Hero functions are stunning.
RJ-RotWK- Rob doesn't just mod, he makes modding into an artistic profession. Quite possibly the best mod I have ever played, and I never get bored of it, even during insanely extended battles.
The Wars of Arda- A mod that I am very, very, VERY active on, and hoping to beta test for the next release. Seven eras, with at least two unique factions for each one? Duh! Get it when it's out!
Post a comment
Sign in or join with:
Last Online
United States 🇺🇸
Become friends
Member watch
52 (1 today)
|
global_01_local_2_shard_00001658_processed.jsonl/5664
|
Sharon Hayes is an American multimedia artist. She came to prominence as an artist and an activist during the East Village scene in the early '90s. She primarily works with video, installation, and performance as her medium. Using multimedia, she "appropriates, rearranges, and remixes in order to revitalize spirits of dissent". Hayes's work addresses themes such as romantic love, activism, queer theory, and politics. She incorporates texts from found speeches, recordings, songs, letters, and her own writing into her practice that she describes as “a series of performatives rather than performance.”
|
global_01_local_2_shard_00001658_processed.jsonl/5678
|
Advanced search
Find out more
Stubborn breastfed night hawk
(5 Posts)
Laurenbrown9611 Sat 31-Dec-16 01:02:35
Im looking for some much needed advice as im honestly at my wits end with my 7 month old girl. She will not take anything other than breast..tried expressing also formula but wont take any bottle, teat or cup. Even tried the fancy expencive breastfeeding ones. Hates a dummy too which i supose is a good thing. At the momrnt after i get my 2 year old to bed at 7 she starts the cluster feeding and this can go on until around 2 in the morning if shes not glued to me feeding shes crying unconsolibly( trust me ive tried the controlled crying it wont work) she eats plenty pureed food through the day and even has a bf in the morning and afternoon
catsarenice Sat 31-Dec-16 01:16:15
It's awful when they won't settle down - I feel for you. You say you bf in morning and afternoon - are they the only bf you're doing apart from the massive evening/night one?
YouAndMeAreGoingToFallOut Sat 31-Dec-16 08:53:45
No advice on how to get her to take a bottle in afraid - that sounds really frustrating. Is there anyone else who could give her a bottle - maybe she just doesn't want to take it from you because she knows the breast is a possibility?
Regarding the night cluster feeding: that must be tough. I echo with the PP - are you only feeding her twice during the day? If so that probably isn't enough. There's more calories in milk than purees so it might be that she isn't getting enough milk during the day and so is trying to make up for it in the evening/night. Could you try offering more daytime breastfeeds and see if that helps?
MrsMillions Sat 31-Dec-16 10:48:20
I would also say if she's only having 2 bf during the day, she's catching up at night. Even my DD2 who took really really well to food didn't massively reduce her daytime feeds until 8m+.
TooMinty Sat 31-Dec-16 11:33:12
Yes agree with other posters, try increasing to four bf during the day - think my routine was something like bf, breakfast (porridge/weetabix), bf, lunch (finger food), bf, tea (purée), bf when DSs were 7 months.
Join the discussion
Register now »
Already registered? Log in with:
|
global_01_local_2_shard_00001658_processed.jsonl/5683
|
Native Instruments Studio Drummer review
• €149
TODO alt text
Our Verdict
Slick, solid virtual drum package.
• Versatile kits and easy-to-use grooves.
• No high-pass filter or facility to mix and match kits.
This virtual acoustic drum kit comprises three kits (with two snares in each) plus tambourine, cowbell, sticks and claps.
NI's lossless sample compression crams the 17GB sample into a tidy 7.4GB disk footprint, and with up to 25 velocity layers and six alternates per hit, producing convincing drum parts is simple, as long as you know how to program them.
"In use, the kits cover broad territory and the powerful EQ and compression mean you can do lots of sound shaping."
If you don't, Kontakt 5's MIDI file playback capability means you can choose from over 3500 patterns and fills spanning 11 typical genres.
Spread across four tabs (Grooves, Options, Kit and Mixer), kit elements can be auditioned and tweaked from the main graphic on the kit page; options include Attack/Hold/Decay envelope, overhead and room send levels, and tuning. You can also select alternative snares and unload elements to save memory.
All kit elements get mixer channels, including stereo and mono overhead and stereo room. There's also an aux send with convolution reverb. Channel strips include four inserts (Solid G-EQ, Solid Bus Compressor, Transient Master and Tape Saturator) with configurable order.
In use, the kits (Garage, Session and Stadium) cover broad territory and the powerful EQ and compression mean you can do lots of sound shaping. The reverbs are also very serviceable (although editing them requires entering Kontakt's Edit mode).
Using the grooves is easy - just audition and then drag them into your DAW. Pattern swing, tightness and velocity can be adjusted (this modifies the MIDI data before you drag it), but there's also an adjustable 'live' randomiser (volume, velocity, time, pitch and tone) for adding feel during playback.
On the downside, we'd like a high-pass filter on the EQ and although there's control over snare top/bottom balance, both sounds share a mixer channel, which is slightly limiting. Furthermore, there's no control over round-robin behaviour and kit elements can't be mixed and matched.
Even so, we found Session Drummer very slick in use and speedy to tweak, with some excellent on-board grooves.
Get over 70 FREE plugin instruments and effects…
…with the latest issue of Computer Music magazine
Tech Specs
Compatible SystemsMac PC
Virtual Instrument TypeAcoustic drum kit
|
global_01_local_2_shard_00001658_processed.jsonl/5697
|
Diseases and Conditions
Sacral dimple
A sacral dimple is an indentation, present at birth, in the skin on the lower back. It's usually located just above the crease between the buttocks. Most sacral dimples are harmless and don't require any treatment.
Sacral dimples that are accompanied by a nearby tuft of hair, skin tag or certain types of skin discoloration are sometimes associated with a serious underlying abnormality of the spine or spinal cord. In these instances, your child's doctor may recommend an imaging test. If an abnormality is discovered, treatment depends on the underlying cause.
|
global_01_local_2_shard_00001658_processed.jsonl/5698
|
Search NaijaAgroNet
Tuesday, May 10, 2016
WHO, FAO unveil roadmap to deal with highly hazardous pesticides
The World Health Organisation (WHO) in collaboration with Food and Agriculture Organisation (FAO) have unveiled new guidelines aimed at reducing the damage done by pesticides that pose especially high toxic risks to human health and the environment, reports NaijaAgroNet.
Sources from both organization, informed NaijaAgroNet that products with high acute toxicity account for high numbers of immediate poisoning cases, particularly in developing countries, while products with chronic toxicity effects may cause cancer or developmental disorders among growing children.
NaijaAgroNet reports that in industrialized countries, such so-called "highly hazardous pesticides" may be no longer permitted or subject to strict use limitations, yet they often remain widely available in developing countries.
“Even hazardous products are still permitted in industrialised countries can cause severe problems in the developing world, where use circumstances can be very different,” FAO source said.
NaijaAgroNet gathered that small-scale farmers in developing countries in particular often do not have, or use, the necessary protective gear and mostly use back-pack sprayers that pose high risk of exposure.
Therefore, both WHO and FAO pointed out that restriction on the use of such highly hazardous products often prove hard to enforce, leading to widespread use by untrained persons, warning that high numbers of poisoning cases, contaminated food and environmental damage could be the result.
... Linking agrobiz, sustainable environs, people & technology
No comments:
Post a Comment
Share ur views here
|
global_01_local_2_shard_00001658_processed.jsonl/5752
|
Tuesday, 29 October 2013
Just Because Social Media is a Tool Doesn't Mean You've Got to Be A Tool Too.
By Candy Gourlay
Social Media is not the way, the truth and the light. It is a tool. Just a tool.
Just because it's a tool doesn't mean you've got to be a tool too.
I added someone I didn't know on Facebook the other day. He was already friends with several of my writing contacts. He declared himself an author so, fair enough, I thought.
Immediately I got a message - not a private message, but a message on my wall. 'My new book Title of Book, is now on Amazon ... it's about ... etc etc'
By posting on my wall, he was promoting his book to all my contacts. I deleted him immediately.
And then I felt guilty.
Because his publisher/agent/editor probably told him: 'You've got to blog/tweet/facebook'. And he was only trying to be a good author.
Oh but come on! Do you really think that posting a link to your book on a total stranger's wall will make you a sale?
There is nothing wrong with promotion. But promote to people who want to be promoted to.
When is a weed, a weed? When it's growing in the wrong place. When is junk mail, junk? When it targets the wrong person.
We knew that even in the dark ages of direct marketing (You don't know what direct marketing means? Remember when you used to get those letters in the post? No? Then you're waaaay younger than me!).
The problem is: the internet and it's VAST possibilities have triggered a kind of marketing fever.
Suddenly all the marketing tools are there, accessible to anybody. And they're mostly free! Suddenly we're seeing stuff go viral on the internet and we're all thinking, 'I want a piece of that!'
Some wise guys have even figured out a way to make money by farming likes on Facebook.
And then suddenly we were all 'content marketing' because Google changed its algorithms so that we would create better quality content. At the same time, Google wanted our content to always be new and fresh. Which means we have to blog more frequently to score with Google.
[On Notes from the Slushpile, we've all got better things to do than to blog for the sake of fulfilling Google's desires, so we've put up a notice there on the right. Please, follow us via email. We don't intend to up our blogging frequency sometime soon - we're too busy writing and doing our day jobs.]
Now Social Media has become ascendant and what does Social Media thrive on?... wait for it ... TRIVIA! So suddenly the advice is to create stuff that people can share. Which is hard on those of us who haven't got cute cats.
(Read this great post about the clash between Content Marketing and Social Media by my marketing guru Nick Usborne)
The fact is, the online world is suffering from marketing fatigue. Who isn't fed up with the hardsell status updates and tweets appearing on our feeds? The fact that everyone's trying to game the internet and get in on the action has got users suffocating under the mountain of information.
My author colleagues have long debates on when it is acceptable to post a heads-up about the latest publication/prize/book launch. We all know that this is important but we are afraid of pissing off our real friends (the not-real friends will just hide us on their FB feeds).
Recently book review blogger Sister Spooky wrote that she'd had enough of Blog Tours.
I wonder how much blog tours ACTUALLY help promote a book and if people even want to read/follow a tour. I find them interesting, but even as a blogger I know there are certain kinds of posts I won't bother reading. "Exclusive extracts" hold no interest for me because I'd rather just read a whole book when it arrives. Sometimes I'll take part in posting extracts if I'm really behind an author or want to show my support, but would rather pick another kind of post. People rarely read them. SISTER SPOOKY
I've never done a blog tour although I've considered the possibility many times. By design, a blog tour should be about raising your profile with new audiences courtesy of your host blog. Perhaps it would be effective in a big place like America. But within the UK, aren't we just talking to the same audience from different blogs? I don't know.
(If you're wondering how to do a good book tour anyway here's some great advice from the Curiosity Killed the Bookworm Blog)
Sister Spooky mentions that being contacted by publicity departments for viewing figures left a bad taste in the mouth. To be fair, the publicity departments are probably under pressure to produce data.
All the marketing geniuses declare that a campaign is only useful if there's data to study. Which is true. But at the risk of treating a generous human being as a marketing tool? No, no, no!
(I've said it before and I'll say it again: Being Human is the Best Kind of Marketing)
Have you noticed how there are so many blog titles these days that are 'Five Tips to ...' 'Ten Ways to ...' 'Six Things ...'?
That's because web metrics show that such titles get more readers.
But here are some tips anyway:
1. If you're going to blog, blog well. Don't just blog because your publisher told you to. Don't just dash it off because you've sworn to blog everyday. A blog post is a long-term investment. It will continue to be found long after your tweets have gone to tweet heaven. So blog well.
2. Don't bother with building a new platform (knocking on doors, inviting strangers to your table). Everyone's doing that and you'll end up with a lot of irritated strangers. Instead, identify who your audience is and go to your audience. Guest blog on blogs that are read by your audience. Join their groups. Hang out in their hashtags. Find their Tumblr fandoms.
3. Serve your audience. The problem with some self-promoters is they think it's about talking about themselves. Be human, dammit!!! Think: what does your audience need? Put them first. Make stuff for them to share on social media. Look at John Green making videos for young adults. Write about things they care about.
4. DON'T BE A SALESPERSON. There are people employed by your publisher who do that. Your job is to be the author. Think of your favourite author, the one you have friended on Facebook. What do you want from him or her?
When you read marketing blogs they talk about the 'call to action'. It's a prompt - a link, a button, a message that tells the user what to do next.
You're an author, not a publicity department.
So your call to action is not BUY MY BOOK, it's ... READ.
Who you are is not about blogging or tweeting or facebooking or tumblring, it's about writing the best book you can write.
Your online presence should not focus on self-promotion, but reaching out to your readers.
Your readers are not search engines. If you start thinking in web metrics, you might find yourself serving only the great god Google ...
Be human, be human.
*Apologies for the lack of pictures. I was too tired.
1. Yes, yes and yes again!
There've been so many posts over the last few months (I did one months back) about authors needing to do what they do best, and yet the clarion call from publishers for authors to have a social media platform just seems to become more strident. I read something the other day about having to be on Pinterest, Instagram and Tumblr - in addition to being on Facebook, Twitter, Youtube and Google +. It's all too much - especially since I'm pretty sure way too much of the activity misses its target market. If I look at the number of authors following me on Twitter I wonder why - I'm not their target market; I'm way too deep into my dotage!
At the end of the day, as the article which Vanessa posted on FB yesterday said, the only thing that really counts, the thing that realises good sales figures is the book itself, which, if it's a good book will build sales figures by word of mouth.
2. I so agree, Candy - have been saying this for ages. But "And he was only trying to be a good author" is too lenient. He maybe was just doing as he was told. But the mark of an intelligent human being is to *think* before doing as they are told. As my mum used to say, "so would you jump off a cliff if they told you to do that?" You're still 100% responsible for your own actions, even if someone told you to do them. So don't let him off - he might not have been evil, but he was an idiot!
1. Well ... we are all idiots about a lot of things. A lot of authors have not spent enough time on the internet to realise how they're coming across. They have to learn how to look before they leap.
3. Excellent advice, Candy - you wise woman, you!
4. I was friended by a writer who was friendly and lovely but she kept posting her online book launch on my wall. After she did this 4 times in a week, I as politely as I could, as her not to do that and pointed her towards a post by Kristen Lamb on how to use social media to promote your books without pissing off people. She said she totally understood (which she didn't) and then unfriended me. Which is fine, 'cause she was badmouthing a writing association in her home country, and that didn't bode well for how she was going to behave. Ah, the things we learn. Thanks for your post, Candy. :)
5. What an excellent post, Candy - thank you very much
6. It seems that you're doing a bit of analysing lately, Candy - The industry, being an author, and now social media. I think we could all do with stepping back from time to time to get a clearer picture of what's going on as getting a sense of perspective and reality is always good. And that author was rude. Would he behave like that in reality? I think not.
1. Cyberspace feels like outer space to some people. They forget that there are real people out there. Thanks, Maureen!
7. Excellent article, Candy. You hit the nail on its pointy head.
8. And have fun bloggie pals!!! Enjoy your blog, your own personal space in the big wide world of the internet! Take care
9. This is an excellent post, Candy. I think I reinforces the idea of doing what we do because we love it--whether that's blogging or tweeting or keeping up with friends via facebook or, of course, writing. Using social media primarily as a means to sell a book or promote yourself seems as dodgy (and pointless) as writing a book just because you want to make money. We're lucky to have these platforms, but their real use, I think, is as a place to talk and learn and offer support, not as a forum for selling or boasting.
1. But I acknowledge it's hard to find a balance. Especially if say, you're an author who DOESN'T normally spend time on the Internet and think you've got to get out there. Thanks, Jane.
10. Great post Candy. Couldn't agree more.
11. I think this is a real conundrum for independently published authors because they have no choice but to be their own sales department. I think the answer would be to to keep the sales persona wholly separate from the author persona.
12. I found that so helpful, as I do get anxious about promoting and although I have not done what that author did, I can imagine going against my instincts and doing it to combat my own shyness and reluctance, if you know what I mean. A lot of writers are basically shy, and we see other people promoting their stuff, and worry that we should just try harder. I know that I forced myself to mention the name of my upcoming book when I made a (relevant) comment on a book about history books, and now I worry that was similarly inappropriate. Sigh. It is difficult getting this right. As authors we are told on the internet that we can't just sit back and expect the publishers to do all the work, but we can go to the opposite extreme. Thanks for the reassuring calmness - I won't fret about not being v comfortable marketing my book, I will get specific advice from my publishers and agent, and I will get on with what I love - writing the next! I really hope the name check I forced myself to give my book on the History books site wasn't inappropriate. Thanks for yet another very good blog.
1. I don't think think there's anything wrong ending with a strapline "author of ..." or "my new book is" ... ir using the url/name sign in. As long as your comment was sincere and not just to plant a link to your book (we get spammers for all sorts of crazy products leaving links in the comments of this blog - it's actually hilarious and and we're thinking of featuring them in a blog post about pointless spam).
The thing is: Internet users are streetwise to tricks like that. Better to use the url/name function when leaving a comment ... then people will check you out because your comment is interesting and not for any other reason.
13. "As authors we are told on the internet that we can't just sit back and expect the publishers to do all the work" - indeed. We have done the work of writing the book. Don't let them forget that! :-)
The purpose of a traditional publisher is to produce and sell books. We could do it ourselves (by self-publishing), but choose not to. So we should be wary of choosing not to and then doing it anyway. No one should be persuaded to do more marketing than they want to, in any medium. If you look in your contract you will probably see a clause saying that they have complete control over the production and marketing of the book. Hoist with their own petard!
1. I think these are new times though and we authors do have to participate in marketing and getting the word out there ... it's the HOW we need to work on.
14. Amen to all this. My platform is about 99% authors, so I post authorly things for them to look at and write authorly blog posts. If I ever get a children's book published, I hope some of them will want to read it, but they aren't my main audience and I wouldn't treat them as such. So, on a purely marketing level, I'm not building a very good platform, but on a personal level I'm just fine, thanks :-)
15. Nice post. If I get too many people trying to market something constantly on my news feed, it's bye-bye. I'll post the occasional blog post from my blog if I think it's particularly good but, then again, I don't write my blog for a living, just for fun.
Share buttons bottom
|
global_01_local_2_shard_00001658_processed.jsonl/5771
|
Dungeness Spit and Lighthouse
At 5.5 miles in length, the Dungeness Spit is the world's longest naturally occurring sandspit and home to the Dungeness National Wildlife Refuge. The refuge is a sanctuary for over 250 species of birds, 41 species of land mammals and eight species of water mammals. Its trails and picnic areas offer breathtaking views of the beaches, Dungeness harbor and the Strait of Juan de Fuca.
If you're up for the hike or a paddle to the end of the spit, you'll find the old Dungeness Lighthouse, built in 1857 and now on the National Register of Historic Places. The new Dungeness Light Station Association has manned the lighthouse since 1994. Access to the Light Station is limited to hikers at low tide and small boats in calm seas. Boats and kayaks need to call ahead for reservations as water access is limited to minimize the disturbance to marine mammals and birds.
tel: 360-457-8451
Dungeness Spit and LighthouseSequim, WA, 98382
United States
48° 8' 24.4356" N, 123° 11' 41.874" W
See map: Google Maps
Dungeness Spit and LighthouseSequim, WA, 98382
|
global_01_local_2_shard_00001658_processed.jsonl/5778
|
Kinect 4 Unreal (sometimes abbreviated to K4U) is a middleware plugin that allows Unreal Engine 4 developers to use Unreal Engine 4’s Blueprint visual scripting system to access the full functionality of Kinect 2 for Windows as seamlessly and as easily as possible. The key design objective of K4U is to empower artists and designers by exposing everything through Blueprint, so that the development team is able to focus their effort on developing their ideas without a dedicated coder.
Introducing over 30 original nodes, all with extensive documentation and pre built Avateering systems, Kinect 4 Unreal exposes all that the Kinect has to offer to Unreal Engine 4 developers.
The plugin primarily interfaces through a component-based system where, once activated through the plugin menu, any Blueprint can have the Kinect Interface Component added to it. The Kinect Interface Component gives developers access to a large number of Blueprint nodes, each granting them access to some aspect of the Kinect functionality.
Download Kinect 4 Unreal
If your project has a budget under $75,000 USD, you can download Kinect 4 Unreal immediately and release your project for free. If your budget is over $75,000 USD, you may download and begin work for free, but must purchase a license prior to the release of the project for $1,500 USD.
By downloading Kinect 4 Unreal you agree to our end user license agreement.
Older Plugin Versions
Introduction Levels
You can download our introduction level on the Unreal Engine Marketplace below!
Kinect 4 Unreal introduces over 30 new Blueprint nodes, divided into nine categories, which you will find below. For the full listing of all the K4U nodes, please visit the API documentation page.
API Summary
Frequently Asked Questions
How can I package my project?
While we are constantly searching for alternatives, in Unreal there is currently no way to package a project that includes a plugin without source code. This is a problem that Epic is also actively working on and is slated to be fixed in 2015. However, depending on your needs, it may not be necessary to package your plugin for deployment. This is particularly relevant to installations and exhibits, running your project from inside the editor as a new editor window or a standalone game, these both allow you resolution and full screen control equivalent to that of a packaged project.
If you absolutely need to package the project right now, there are two options:
1. Acquire a source code license from us. The cost varies depending on the scale of your project, so please contact us for more detail.
2. For a fee, we can package your application for you. The cost varies depending on how much effort it requires, but generally ranges between $200 - $400 USD for projects that can be packaged directly from engine. For projects that require compilation from source, we recommend that you contact us to acquire a source license.
Can I use more than one Kinect 2 to monitor a single scene?
There was a clear design choice to use a single high accuracy device by Microsoft which means that the Kinect 2 outputs a tremendous amount of data (roughly 600 megabytes/s, or nearly the entire bandwidth of USB 3.0). Given this, it can be troublesome to even have two Kinect 2s on the same computer, let alone having them work together. In theory, it is possible to take from Kinect 2 only the information we want and there are rogue stories of hardware hackers accomplishing just that, but at the moment that functionality is not a part of the Kinect SDK.
It is however, entirely possible for you to have a networked solution that involves multiple computers each with a Kinect 2, running a separate instance of K4U and multiplex data directly in Unreal Engine 4. We have a number of internal experiments that demonstrates this precise functionality, but they're not yet scheduled for a public release. If you'd like to explore a multi-Kinect setup within K4U, please contact us and tell us a bit more about your project.
Sometimes it doesn't pick up the right people or it doesn't track them after they have left and returned? Also, Players don't have a consistent Player Index?
The Kinect 2 works by tracking bodies and assigning them a bodyID, this is best demonstrated by use of one of the Kinect SDK's Body Index Basics. If you use this program it will colour each body according to its bodyID and you can see how this changes as the Kinect 2 picks up and loses people. The K4U plugin exposes these values directly to unreal so that they can be used by you. However, these are not always particularly useful which is why we have also included dynamic get body nodes (Get Nearest Body and Get Centered Body) that allow you to, each tick, assign who is in control of inputting data. You could just as easily write your own or modify these, for instance if you wanted a two player project, you could write a get centered left and a get centered right by modifying the central location inside these nodes.
My avateering has strange rotations?
Our avateering solutions are designed to work with the default Unreal skeleton, such as the blue man from the basic levels or Owen (the animation example character with the trench coat). By default our current avateering solution uses a forward kinematic approach that takes the Kinects rotation information and applies it to this skeleton, which is why different skeletons would not work as well. If your skeleton is different from this these default rotations would need to be changed by applying modifications to the rotations inside the poseable mesh or animation blueprint.
I am getting a "requires module UE4Editor-Kinect4Unreal.dll should be rebuilt" error?
There are three common sources of this problem:
1. The first source is that when building from GitHub engine source, there is an inherent version mismatch as the plugin was designed to be used with the binary version of Unreal. The solution here is to use the version of the engine that is downloaded from the launcher.
2. The second source is that using a non-recommended development environment inside visual studio may cause a mismatch in versions. Set your visual studio's development environment to Development Editor.
3. The third source is that your project is in a different version of unreal from the plugin, this is solved by right clicking on the project file and selecting switch unreal editor version and then selecting the appropriate editor version.
|
global_01_local_2_shard_00001658_processed.jsonl/5797
|
Definition of: chipkill
A memory module technology from IBM that, similar to RAID 3 for hard disks, spreads the bits across multiple memory chips. It can take bad memory chips offline when too many bit errors are encountered and also correct errors of several bits per module. Chipkill typically exceeds the error correction in ECC memory. Although often referred to as Chipkill, similar technologies from other vendors are Single Device Disable Code (SDDC) from Intel, Extended ECC from Sun and Chipspare from HP. See ECC memory and RAID.
Encyclopedia Banner
|
global_01_local_2_shard_00001658_processed.jsonl/5803
|
Beefy Boxes and Bandwidth Generously Provided by pair Networks
There's more than one way to do things
Inlining functions
by mirod (Canon)
on Dec 27, 2000 at 20:52 UTC ( #48443=note: print w/replies, xml ) Need Help??
in reply to Re: Re: When do you function?
in thread When do you function?
Replies are listed 'Best First'.
Re: Inlining functions
by merlyn (Sage) on Dec 27, 2000 at 21:43 UTC
Well, since it'd probably be just an attribute on a subroutine, and we already have those, there's nothing really to RFC. {grin}
Ideally, the Perl compiler would just recognize when a subroutine qualifies as an open-coded version, and "do the right thing". I'd prefer that. Just like how certain subroutines are recognized as "constant" now, and pre-evaluated.
-- Randal L. Schwartz, Perl hacker
Log In?
What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://48443]
and all is quiet...
How do I use this? | Other CB clients
Other Users?
Others chilling in the Monastery: (6)
As of 2018-06-21 13:28 GMT
Find Nodes?
Voting Booth?
Should cpanminus be part of the standard Perl release?
Results (118 votes). Check out past polls.
|
global_01_local_2_shard_00001658_processed.jsonl/5812
|
Dismiss Notice
Dismiss Notice
Join Physics Forums Today!
Homework Help: A quick question regarding three phase coils connections of a motor
1. Jun 10, 2012 #1
Hello everyone:
I have a quick question regarding connecting a three phase power supply to the coils of a three phase motor.
Now I know that if you had 3 pole pairs, 6 coils 120 degrees apart around a stator, that each diagonally adjacient coil gets connected in series and each of these series of two coils get connected to one of the three power supply phases. The series coils are shown in the attached picture so you can see what I am talking about.
But what if I wanted 8 coils, 4 coil/pole pairs. How would I connect this to a three phase supply so that the magnetic field rotates dragging the rotor around and around as the motor is supposed to do?
Thanks for any help you guys could give me. I really appreciate it.
Attached Files:
2. jcsd
Can you offer guidance or do you also need help?
Draft saved Draft deleted
|
global_01_local_2_shard_00001658_processed.jsonl/5818
|
Mooshu quest: Hasten Down The Wind
Petty Officer
May 21, 2008
Hello, I have small bug to report, it blocks me from finishing the quest I mentioned in description. In this quest I have to burn Incense in few different Mooshu places, basically in Khotan Skyway islands. So actual bug is that once I Burned one in Yagizava Village and went to burn others. Lately I noticed that quest goal is to burn Incense in Yagizava Village again. I went there, as I expected Incense was burned already before (it was smoking), but I couldn't interact with it anymore. So I cannot finish the quest for now. :) ;)
|
global_01_local_2_shard_00001658_processed.jsonl/5823
|
The Four Wonders
Summer's sun shines brightly in our faces,
Autumn's leaves fall softly to the ground.
Winter's snowflakes amaze us with their beauty,
and Spring's flowers give off an aroma which delight our noses.
Through these four wonders we sometimes attempt to seek the pain,
but we shall never let the pain get the best of us.
May Summer's sun burn the pain.
May Autumn's leaves suffocate the pain.
May Winter's snowflakes astonish the pain,
and may Spring's flowers be so delightful,
and cause the pain to fade to kindness.
Then, my pain will vanish.
Poem Rating:
Click To Rate This Poem!
Continue Rating Poems
Share This Poem
|
global_01_local_2_shard_00001658_processed.jsonl/5832
|
[Skip navigation links]
Blog » Indexing
Search 101 - how search engines work - part 2
Posted by Mark Rogers on Mar 13, 2008 |
In Part 1 we covered how a search engine crawler visits web pages. In this part we're going to investigate how words on web pages are indexed. You'll recall the three phases of search engines: Crawling (or spidering) the web, finding pages people want to search Indexing words on web pages Searching the index (i.e. the bit that happens when you type a search into Google) A search engine index works very like the way the index in book works: in a book each word in the index lists page numbers the word appears on; in a search index each word has a list of pages the word appears on.
|
global_01_local_2_shard_00001658_processed.jsonl/5849
|
Hot Water Music
by Epitaph
Sources close to the band have confirmed that Hot Water Music has reunited. The band is apparently putting together some more plans and a formal announcement, but it is happening and we'll have more details for you shortly.
The band split up in May of 2006 after more than a decade together. They actually had a brief hiatus from 1996–1997 but have essentially maintained their lineup since 1993. Since the band's split in 2006, most of the band formed The Draft while co–vocalist Chuck Ragan performed and recorded solo material.
|
global_01_local_2_shard_00001658_processed.jsonl/5871
|
How Do You Install a Stairway Railing?
Quick Answer
To install a stairway railing, first measure and mark the important places, such as wall studs and bracket locations, mount the brackets, and clamp the rail. After that, cut the ends of the rail, and attach the rail and the returns.
Continue Reading
Related Videos
Full Answer
Make marks on the wall at the bottom and top of the stairs, use chalk to connect the marks, find wall studs using a stud finder, and mark them along the chalk line. Mark the bracket locations; use a level to make sure that they are plumb. Place the railing at the correct height along the chalk line, ask somebody to hold it in place, and position the bracket on the wall. Punch holes through the mounting holes of the brackets using an awl, drill some pilot holes, and attach the brackets to the wall. Attach the long rail to the brackets, and position the shorter one using a level.
Mark the angles for the cuts on both rails. Use a handsaw to cut both rails simultaneously. Use a miter box to cut the upper and lower ends of the rail, and then cut the return pieces of the rail. Cover the ends of the rail and the returns with glue, put the returns in place, and secure them with L-brackets and screws. Attach the rail to brackets, secure the connection with screws, coat the top end of both rails with glue, and attach the short rail to wall brackets. Put a metal plate underneath the railing to reinforce the joint.
Learn more about Carpentry
Related Questions
|
global_01_local_2_shard_00001658_processed.jsonl/5879
|
Wolfgang Riedmann Blog https://www.riedmann.it/blog Technical solutions Tue, 15 May 2018 19:00:57 +0000 en-US hourly 1 https://wordpress.org/?v=4.9.6 The 1803 Update of Windows 10 and Samba https://www.riedmann.it/blog/?p=303 Tue, 15 May 2018 19:00:57 +0000 https://www.riedmann.it/blog/?p=303 After the update to Windows 10 Build 1803 machines could not more connect to the Oracle server when the application was started from a network share or a mapped network drive.
These problems were caused by the fact that applications started from a SMB v1 share could not more connect to any network service (file based access was ok).
The server was a Debian Wheezy Linux machine with Samba 3.6. Samba 3.6 is the first Samba version that supports SMB v2 connections, but unfortunately they are disabled by default. To enable them, you must add the following line to the Samba configuration file /etc/samba/smb.conf:
max protocol = SMB2
Restart Samba and your Windows client, and the connection will be SMBv2.
You can check this opening a PowerShell with administrative (elevated) rights and the following command:
Applications that will not work from a SMBv1 share include: email programs, SSH Clients (putty), curl, database clients, and any type of program that opens some network connection.
In the upgrade of another customer server I had a very unusual issue: the server was using a Sernet Samba version, and the upgrade from Debian Squeeze to Debian Wheezy removed this Samba version. A new installation of the Debian version could not find any users anymore.
Strangely, the Sernet Samba version had their user database in /etc/samba, and the Debian Samba version in /var/lib/samba. Stopping Samba and copying over these database files fixed the issue.
Slow initial connection on https connects https://www.riedmann.it/blog/?p=297 Wed, 22 Nov 2017 13:05:28 +0000 https://www.riedmann.it/blog/?p=297 Our most busy server sometimes showed long connection times after we changed the default protocol from http to https.
The solution was to enable OCSP stapling:
SSLUseStapling on
SSLStaplingCache shmcb:/tmp/stapling_cache(128000)
As test I can recommend the SSLLabs test by Qualys: https://www.ssllabs.com/ssltest/analyze.html
Debian 9 Stretch, PHP 7 and Microsoft SQL Server access https://www.riedmann.it/blog/?p=294 Sun, 12 Nov 2017 15:48:05 +0000 https://www.riedmann.it/blog/?p=294 Microsoft supports SQL Server access from Linux and PHP 7, but unfortunately not with Debian 9 Stretch, but only for Debian 8 (and Ubuntu 15.10, Ubuntu 16.10, Ubuntu 6.04, RedHat 7 and MacOS).
See https://docs.microsoft.com/en-us/sql/connect/php/installation-tutorial-linux-mac
Then I found the page https://github.com/Microsoft/msphpsql/releases and have done the following:
pecl install sqlsrv-5.1.1preview
pecl install pdo_sqlsrv-5.1.1preview
The build failed until I installed the package unixodbc-dev
apt-get install unixodbc-dev
cd /etc/php/7.0/mods-available
cp pdo_dblib.ini pdo_sqlsrv.ini
cp pdo_dblib.ini sqlsrv.ini
changed the contents of the files to list the appropriate -so file (pdo_sqlsrv.so and sqlsrv.so),
cd /etc/php/7.0/apache2/conf.d
and restarted Apache2.
wget https://packages.microsoft.com/debian/8/prod/pool/main/m/msodbcsql/msodbcsql_13.1.9.1-1_amd64.deb
wget https://packages.microsoft.com/debian/8/prod/pool/main/m/mssql-tools/mssql-tools_14.0.7.0-1_amd64.deb
apt-get install unixodbc
dpkg -i msodbcsql_13.1.9.1-1_amd64.deb
dpkg -i mssql-tools_14.0.7.0-1_amd64.deb
Database Manager software: Navicat Premium Essentials https://www.riedmann.it/blog/?p=291 Tue, 11 Jul 2017 09:09:46 +0000 https://www.riedmann.it/blog/?p=291 In my daily work, I have to deal with several different databases. Until now, it were mostly Oracle, SQL Server and MySQL, but in the last time SQLite and PostgreSQL have been added to my list.
In the past I had used mostly DB Manager from DBTools software in Brasil, but the last release of this software is from the year 2010, so about 7 years old, and it does not work with the Oracle database I have to deal with.
Searching for a valid successor without spending too much money (I need 3 licenses as we are 3 developers in our company), I have found Navicat Premium Essentials by Premiumsoft Cybertech Ltd, and after a short trial period I have acquired the needed licenses, and was really happy with it.
Now they have released their next version, Navicat 12, and I have upgraded my licenses to the new version.
What I have to say: they are very serious. I have discovered two bugs in the new version and opened a support issue with them. In a relatively short period they answered and have acknowlegdet the bugs (the immediatly, for the other it needed a day more and more specifications from my).
They have several different versions of their database manager, but for my needs the Premium Essentials version is the right one, as it has support for all databases I need (for a short period I needed also Firebird support, not available in Navicat), and is relatively affordable.
Set initial date to WPF Calendar control https://www.riedmann.it/blog/?p=282 Fri, 17 Mar 2017 17:37:22 +0000 http://www.riedmann.it/blog/?p=282 In WPF, you can set the SelectedDate property to any DateTime value, but this value is not shown as initial date in the calendar control.
If you wish to set the initial date, you need to set the DisplayDate property.
If you use databinding, you can bind both values to the same property on the ViewModel, or to two different, what you like more. Of course in the latter case the initial value needs to be set to both properties.
Another suggestion: if you work with the Calendar control directly, you should embed it in a ViewBox control to have it adjusted when you resize your window.
Firebird specials in table structure for varchar and UTF-8 https://www.riedmann.it/blog/?p=275 Tue, 15 Nov 2016 17:10:05 +0000 http://www.riedmann.it/blog/?p=275 In my Visual Objects applications based on DBFs I have a routine that checks the structure of the DBF tables, compares them with the structure that is required and adjusts the structure.
I’m now working on a similar functionality for my Firebird based .NET applications. To retrieve the list of the currently existing user tables, I’m using such a statement:
select rdb$relation_name as tablename from rdb$relations
where rdb$view_blr is null and
(rdb$system_flag is null or rdb$system_flag = 0)
and to retrieve the actual structure of such a table I use the following statement:
select rf.rdb$field_position as fieldpos,
TRIM(rf.rdb$field_name) as fieldname,
f.rdb$field_type as fieldtype,
f.rdb$field_length as fieldlen,
f.rdb$field_scale as fielddec,
(f.rdb$null_flag = 1) OR (rf.rdb$null_flag = 1) as canbenull
from rdb$relation_fields rf
JOIN rdb$fields f ON f.rdb$field_name = rf.rdb$field_source
WHERE upper( rf.rdb$relation_name ) = upper( 'mytable' )
order by rf.rdb$field_position
To have no limitations with foreign languages, I have opted to use the UTF-8 character set for all varchar columns.
And now I was very surprised: the select statement returned 4 times the actual field width: for a field defined as varchar(20) the query returned 80 as field length.
My conclusion is very simple: since every UTF-8 character can take up to 4 bytes, Firebird reserves 4 bytes for every character.
I have now found the following StackOwerflow article about this:
Firebird 3.0, Embedded server and the .NET provider https://www.riedmann.it/blog/?p=270 Tue, 15 Nov 2016 07:52:29 +0000 http://www.riedmann.it/blog/?p=270 For local data, the embedded server of Firebird is very welcome because it does not needs any configuration.
With Firebird 2.5, a special DLL (fbembed.dll) was needed, but Firebird 3.0 has added this functionality into the standard fbclient.dll.
So, if using the embedded server of Firebird 3.0 instead of the one of Firebird 2.5, you need to specify this in the connection string. It is the best to use the ClientLibrary property of the FBConnectionStringBuilder (namespace FirebirdSql.Data.FirebirdClient).
The following files need to be put in your application directory (please make attention to use the correct bitness – 64 bit files for a 64 bit application and 32 bit files for a 32 bit application):
Normally, you should NOT need to put a firebird.conf file in you application directory.
XIDE: Starting without loading the plugins https://www.riedmann.it/blog/?p=261 Thu, 26 May 2016 13:36:21 +0000 http://www.riedmann.it/blog/?p=261 Specially for developing XIDE plugins there is a possibility to startup XIDE without loading the plugins:
– keep the shift key pressed while XIDE starts
– add a /noplugins switch to the command line
This functionality was added yesterday ( May 25, 2016 ). So if you need this and your XIDE version is older, ask the author for an update.
XIDE: global variables https://www.riedmann.it/blog/?p=256 Mon, 09 May 2016 03:58:19 +0000 http://www.riedmann.it/blog/?p=256 The new XIDE-Build from May 2016 supports the definition of own global variables to use in Pre- and Post-Build events, for example to set some system-wide paths.
Simply add a section [GlobalVariables] to XIDE.cfg, when the program is not open, like this one:
GlobalVariable = %mygeneralmanifest% , C:\temp\mymanifestfile
Later versions may support these variables also in templates.
XIDE: Tools on menu https://www.riedmann.it/blog/?p=253 Fri, 06 May 2016 11:50:38 +0000 http://www.riedmann.it/blog/?p=253 You just need to add a section in the bottom of the xide.cfg file:
xml = notepad.exe
txt = wordpad.exe,%1
The 2nd syntax allows you to use command line options, for example
wordpad.exe , /param1 %1 /param2
(%1 is replaced with the filename)
If you press CTRL or SHIFT while opening a file, it gets opened inside XIDE, instead of the tool you specified. Obviously I am just sending it now but not waiting for a quick response, only when you have time about this.
|
global_01_local_2_shard_00001658_processed.jsonl/5885
|
In Memoriam 1942 – 2013 “Roger Ebert loved movies.”
Thumb world 9
Jurassic World: Fallen Kingdom
Thumb tag poster
A lazy, vulgar celebration of White Male American Dumbness.
Other Reviews
Review Archives
Thumb xbepftvyieurxopaxyzgtgtkwgw
Ballad of Narayama
Other Reviews
Great Movie Archives
Cast and Crew
#156 February 20, 2013
(click to enlarge)
Continue reading →
#98 January 18, 2012
Continue reading →
The cinema of scarred hearts
May Contain Spoilers
Continue reading →
The evolution of a hat
View image Figure #1.
View image Figure #2.
(My final contribution to the Close-Up Blog-a-thon at the House Next Door, which just wrapped.)
Warning: This post (and the short film montage/hommage I put together to accompany it, above) may contain spoilers.
Jesus, Tom, it's the hat.
Take a look at the four shots from Joel and Ethan Coen's "Miller's Crossing" on this page: three close-ups of the same hat and a long shot of another one with a body under. The hat in all three close-ups, hat belongs to Tom Reagan (Gabriel Byrne). The other one is on the head of his boss and friend, Leo O'Bannon (Albert Finney). But let's re-wind a little bit.
The movie is set into motion with a close-up of three ice cubes plopped into a glass tumbler. We don't see Tom, our main character until the next shot, where he appears behind the bald head of a man (Johnny Casper, played by Jon Polito) who's delivering a lecture into the camera -- or just past it -- about friendship, character, ethics. Tom is the one who put the cubes into the glass and poured himself some whiskey. He crosses the room out of focus, moves past the camera, and when we see a reverse angle, he's standing behind and to the side of Leo. His tumbler of whiskey is in the frame, but his head isn't. When we finally do get a look at his mug, he's not wearing a hat. Meanwhile, Casper's henchman, the cadaverous Eddie Dane (J.E. Freeman) stands behind his boss, holding his hat. And wearing one. It's a sign of respect.
View image Figure #3.
View image Figure #4.
When Tom leaves the room at the end of the scene, he puts on his hat. Then there's this strange credits sequence, like a dream in a forest, with a canopy of autumnal branches overhead. On the forest floor, a hat falls into the foreground of the frame, the title of the film appears (Figure #1), and the hat blows away into the distance. In the next close-up, Tom is roused from a stuporous slumber. He sits up and feels his head, for his hangover and for his hat.
"Where's my hat?" Tom asks.
"You bet it, ya moron," says the friend who woke him up. "Good thing the game broke up before you bet your shorts."
Turns out, the hat left with Mink and Verna. Together, they are the link between Tom's hat and his shorts. We've already heard, in the opening scene, that Mink (Steve Buscemi) is "the Dane's boy." Mink appears only in one brief scene at the Shenandoah Club, explains the whole movie ("as plain as the nose on your -- Turns out he's also involved with "the Schmatte," bookie Bernie Birnbaum (John Turturro), who also happens to be the brother of Verna (Marcia Gay Harden), Leo's twist and Tom's secret squeeze and the subject of Johnny Casper's opening rant.
Got that, or do I have to spell it out for ya?
OK, here's the deal:
Continue reading →
CIFF: All our capsule reviews
Primary eb20071009filmfestivals0471009001ar
Continue reading →
Toronto #10: Cinderella story with a twist
Primary eb20070915filmfestivals0370915001ar
Continue reading →
The Unwritten Rules of Oscar
Primary eb20050227oscars50216001ar
Shhhhhh. Don't tell a soul. Close Oscar-watchers (and Academy insiders) know that what you are about to read is true -- but few like to talk about these things. When it comes to picking Oscar winners, you can study the stats of Oscars past in search of patterns and clues, but there are certain influential paradigms that defy and transcend conventional statistical analysis.
Continue reading →
Uncommonly good
Are these the nominations for the 76th annual Academy Awards, or more winners from Sundance? This year’s nominations, announced early Tuesday, showed uncommon taste and imagination in reaching beyond the starstruck land of the Golden Globes to embrace surprising and in some cases almost unknown choices. It’s one of the best lists in years.
Continue reading →
Some sure bets and wild cards for awards
Shortly after 7:30 a.m. (CST) Tuesday, Motion Picture Academy President Frank Pierson and actress Sigourney Weaver will walk onstage at the Kodak Theater on Hollywood Boulevard and announce the nominations for the 76th Academy Awards, and this article will instantly become obsolete. But until that moment, we can guess and speculate and predict about this year's nominees, and here goes.
Continue reading →
'Mystic River' shows American legend is far from done
CANNES, France--The man the French call "Cleent" came to town for the weekend, and Cannes once again vibrated like a film festival. After several official entries that felt as if they threw away the movie and showed the deleted scenes, here was Clint Eastwood with "Mystic River," a film that actually had me intently involved in what would happen next.
Continue reading →
|
global_01_local_2_shard_00001658_processed.jsonl/5914
|
Is salt by any other name just as salty? There are so many different types of salt to choose from these days--kosher, sea salt, flavored versions and of course regular table salt. But let's get one thing straight right off the bat--in terms of sodium content, none of them are really any better than the others. They are all just as salty. But there are other reasons you may want to choose one salt over the others. Below...
...I have reviewed four types of salt and discussed their pros and cons, as well as given you recommendations on when to use them. [#image: /photos/57d8d72ff71ce8751f6b68ac]||||||
• Iodized Salt: Many people keep this on their table as common table salt. Iodized salt has iodine added, which is an essential nutrient to the body that is naturally found in seafood. When seafood was less accessible, it was very important for people in landlocked areas to get their iodine in other forms (namely iodized salt). However, now seafood is more accessible and if you eat it regularly, you probably don't need to worry about your iodine consumption. This type of salt also usually has a little sugar added to prevent it from yellowing. It is best used if you live in a landlocked area and don't regularly consume salt-water seafood.
• Kosher Salt: Kosher salt has a very fine texture. Use it when you need salt to dissolve evenly and quickly, like for homemade salad dressings, meat rubs and in sauces.
• Sea Salt: Sea salt adds more than just saltiness to foods. Depending on where it is from, it can add a hint of flavor--from bitter to sweet (in addition to salty). Ounce for ounce it has virtually the same sodium content as any other salt, but because it is so flavorful, many people find they use less. When you want to add flavor to foods just before serving them, reach for a little sea salt.
• Flavored Salts: These are usually salts combined with spices or herbs. They add both saltiness and a distinctive flavor to food, so they are great to use to flavor popcorn, roasted potatoes or corn on the cob. Plus, if you use colorful spices like curry powder or paprika, they are a fun colorful garnish for your plate. You can make your own flavored salt by combining one part of your favorite dried herbs or spices with one and a half parts of salt.
Above all, remember that whatever type of salt you use, a little goes a long way!
Related Links:
DIY Guilt-Free French Fries
The Pasta Lover's Diet
40 Metabolism-Revving Recipes
For daily nutrition tips follow SELF on Facebook and Twitter.
Get SELF on your iPad and Kindle Fire!
|
global_01_local_2_shard_00001658_processed.jsonl/5918
|
What is the Fraxel laser?
Brent Moelleken, MD
Plastic Surgery
The Fraxel is a brand of fractionated laser. A fractionated laser gives small intense light beams to the skin to cause contraction of the skin, reducing the wrinkles and sun damage.
What are the basic types of fractionated laser?
The erbium fractionated laser gives columns of laser energy with medium deep beams. Recovery is quicker, complications are fewer, and results are less than for the CO2 fractionated laser.
With the CO2 fractionated laser, the beams go deeper into the skin and cause more injury to the dermis, the non recycling layer of the skin. Results are better, but down time and redness are a bit more than for the erbium fractional laser.
Ablative laser is the most effective laser for the facial skin but should not be used on other areas.
It is very important that the doctor performing the laser is knowledgable and conservative, to avoid burns and complications. If the doctor has his nurse do the treatments, he should be involved in the decision making tree.
A careful doctor will balance results with risk, and know which treatment will give the best result, and, most important of all, know when to stop.
Arthur W. Perry, MD
Plastic Surgery
The Fraxel laser is a new, exciting addition to the war against wrinkles. Approved by the Food and Drug Administration (FDA) for treatment of wrinkles and age spots in 2004 and for skin resurfacing in 2005, it uses what is called fractional photothermolysis to decrease wrinkles. This erbium laser treats a tiny portion of the skin's surface at a time. Basically, the machine splits the laser beam into thousands of tiny beams, narrower than the diameter of a hair. The beams penetrate the skin, deep into the dermis. The dermis fries, causing shrinkage without removing the entire epidermis. The epidermis flakes off in a few days. The beam is so narrow that stem cells in the skin are not destroyed, a key factor in preventing long-term problems.
More About this Book
Continue Learning about Wrinkle Treatments
|
global_01_local_2_shard_00001658_processed.jsonl/5951
|
From: Stevan Harnad <>
Date: Wed, 19 Jan 2005 22:04:02 +0000
Although the original NIH-6 mandate -- that the authors of all journal
articles reporting NIH-funded research must make their articles freely
accessible on the Web within 6 months of publication -- would already have
been a compromise (because Open Access (OA) to research findings needs
to be immediate), NIH-6 was nevertheless stoutly defended in the
American Scientist Open Access Forum.
But it now looks as if the NIH-6 mandate has mutated under pressure into
the "NIH-12 invitation" -- that all authors of journal articles reporting
NIH-funded research are invited to make their articles freely accessible
on the Web within 12 months of publication.
NIH-12 falls far short of what both the House of Representatives and
the Senate recommended. NIH-12 does not provide Open Access (OA, which
is defined as immediate, permanent, free online access). It is OA that
research, researchers, research funders, and the funders of the research
funders (the tax-paying public) need. It is OA that maximises the usage,
impact, productivity, progress and benefits of research for everyone.
In biomedical research especially, 12-month-delayed access is not Open
Access, it is Legacy Access, to the old, back-volume literature, not
to the growth region of biomedical science. The main purpose of OA is to
make the cutting edge of research available to all its would-be users
worldwide, not just to those users who happen to be at institutions that
can afford to subscribe to the journal in which the research happened
to be published. NIH-12 will make very little difference to research
progress, particularly as more and more journals are making their legacy
back-volumes freely accessible online already anyway.
Hence it is now more important than ever that other research-funders,
institutions, universities and governments worldwide should resist the
inevitable tendency to copy-cat clone the NIH-12 policy as the answer
to their OA needs, just because the NIH did it. NIH-12 is not an answer
to OA needs. It is not OA at all. If I had known it would come to this,
I would never have defended it.
Much more promising OA policies are being formulated this month and
next at two important meetings, one for UK OA policy, one for worldwide
OA policy:
"OA Institutional Archives Workshop in Southampton 25-26 Jan 2005"
"Berlin 3: Implementing the Berlin Declaration on Open Access"
Consider rationally, don't clone reflexively! There are far better
examples to follow than the ill-fated NIH-12.
History of NIH-12:
"E-Biomed: Very important NIH Proposal" (1999)
"Floyd Bloom's SCIENCE Editorial about NIH/E-biomed"
"AAAS's Response: Too Little, Too Late" (2001)
"Shulenburger on open access: so NEAR and yet so far" (2003)
"AAU misinterprets House Appropriations
Committee Recommendation" (2004)
"Open letter to Congress from 25 Nobel Laureates"
"A Simple Way to Optimize the NIH Public Access Policy"
"Critique of PSP/AAP Critique of NIH Proposal"
"URGENT support for NIH public access policy"
"Critique of STM Critique of NIH Proposal"
"Critique of Stanford/HighWire Press Critique of NIH Proposal"
"Critique of APS Critique of NIH Proposal"
"Victory for the NIH open access plan in the House"
Stevan Harnad
A complete Hypermail archive of the ongoing discussion of providing
is available at:
To join or leave the Forum or change your subscription address:
Post discussion to:
UNIVERSITIES: If you have adopted or plan to adopt an institutional
policy of providing Open Access to your own research article output,
please describe your policy at:
journal whenever one exists.
toll-access journal and also self-archive it.
Received on Wed Jan 19 2005 - 22:04:02 GMT
This archive was generated by hypermail 2.3.0 : Fri Dec 10 2010 - 19:47:46 GMT
|
global_01_local_2_shard_00001658_processed.jsonl/5969
|
ViewComponents in ASP.NET 5 and ASP.NET MVC 6
Let’s have a quick look at another new feature in ASP.NET MVC 6, and that is the ViewComponent feature. View components are intended to be replacements to ChildActions and, to some extent, of partial views.
Traditionally in ASP.NET MVC (and in general in the textbook MVC pattern), you had to compose the entire model in the controller and pass it along to the view, which simply rendered the entire page based on the data from the model. The consequence of this is that the view does not need to explicitly ask for any data – as its sole purpose is to just act upon the model it received.
While this sounds very nice in theory, it has traditionally posed a number of practical difficulties. There are a number of reusable components on pretty much every website – think a menu, a shopping cart, lists of all kinds, breadcrumbs, metadata and so on – so things that appear on multiple pages.
Let’s have a look at how this is solved in MVC 6.
The reusable component problem
Having to compose and gather the data required to create these components in multiple controllers over and over can be really painful, and has often led developers to create a all kinds of model builders and inherited models (have you ever created a BaseModel containing things like menu or page metadata?).
One way to easy that pain was to try to use child actions – which were actions that could only be called from the view (not publicly by the client). I have seen plenty of MVC projects that used child actions to render such reusable components. Another alternative has always been to create elaborate HtmlHelpers. Unfortunately since the helpers were static, you couldn’t do dependency injection into them, so trying to load any extra data for the purpose of such helper, would require you to use service locator – the MVC global DependencyResolver.
View components are really a mesh of both HtmlHelper and child actions.
ViewComponents example
Consider the following sample service:
It’s not unreasonable to think that you might have code resembling something that in your projects. Imagine that we need to display a list of these promoted products in multiple places on the website.
Typically in MVC 5 and earlier, you would have a child action, an HtmlHelper or a base model builder to handle this. With view component you can simply add a view component class:
That class can use ASP.NET 5 dependency injection – which is very convenient. It can return something primitive like a JSON or a string, but it can also have its own partial view; in the above example the partial exists under /Views/Shared/Components/{componentname}/Default.cshtml. The Default.cshtml is the default convenion for all views of view component. You can also pass the name of the view returning i.e. return View(“_Products”, products)
In our case the Razor view would look like you would expect any partial view to look:
In order to embed this view component into a proper, main view, you use the Component property of the Razor pages – in the form of the following syntax:
There is also a sync version, if your component is synchronous. And that’s about it – a bit against the textbook MVC pattern, but very convenient and much cleaner than the old approaches or workarounds we had to use.
Some background info
In order for a class to be recognized as a view component, it needs to be:
• public
• non-abstract
• non generic
• end with ViewComponent suffix or be decorated with ViewComponentAttribute
As you can see, just like the rest of MVC 6, it heavily relies on conventions. To build a view component you do not need to inherit from any specific class or implement any interface.
As far as the actual functionality inside your view component, it is also defined by convention – it should be wrapped in one of the following methods (the method name and return type are important):
The default view component invoker (which could be changed if you wish) will first try to look for the async method, and if it’s not found, then it will try to fallback to the sync version. Afterwards, if it’s still not found, you’ll get a runtime error. This is important to note, because given the above mentioned requirements for a class to be considered a valid view component, it is still possible to get a runtime error if you misspell or misname the actual Invoke method.
Depending on what you need to do, there is a base class ViewComponent, which you can choose to inherit from for your own convenience. It will give you – through it’s expose properties – access to all contextual information about the view such as user principal information, current HttpContext, ViewData and all other information you typically would have inside a view. It will also allow you to easily attach a Razor view to the view component – which you can do by calling the base View() method when returning from your view component.
As far as discovery of view components goes, all assemblies that reference ASP.NET MVC packages will be considered valid to search. This is particularly important for developers of reusable, CMS-like components that are intended to be used cross-project. The discovery is controlled by a type called DefaultViewComponentDescriptorProvider, which allows you to extend itself with additional source to look at or provide different rules for the class to be recognized as view component.
Finally, it is also possible to pass data to the components. Then you add the relevant parameters to the signature, for example:
In order to invoke such a component from a view, you use an overload of the Component.InvokeAsync which takes param of object[]:
Share the post!
• Harry McIntyre
A few thoughts on this
– Can you pass data from the caller to ViewComponent?
– Repeated Default.cshtml is a bit of a bummer (as filename navigation gets harder)
– Is the //file comment required? What about the [ViewComponentAttribute]?
Heh. I need to install MVC6 like, yesterday, then I can answer my own questions :)
• Filip W
1 – yes, thanks for the great question, I updated the post with some extra information regarding that
2 – this is the default convention, you can also pass the name of the view i.e. return View(“_Products”, products)
3 – no this is just for illustration, it was supposed to further clarify everything not introduce ambiguity, sorry :)
• Pingback: The Morning Brew - Chris Alcock » The Morning Brew #1904()
• Muhammad Rehan Saeed
What are the performance implications of using a view component? Using child actions had a detrimental impact on performance.
• lideth
can you explain about this line “@model IEnumerable”?
I wonder about “ViewComponentSite”, where it come from?
• Filip W
it’s just a fully qualified name of my model, it’s a regular Razor view. My project just happened to be called “ViewComponentSite”
• lideth
i’ve got it. thanks
:) I have an other question
—my component class————–
public class MyViewComponents: ViewComponent
public List games;
public async Task InvokeAsync()
//this.testing = await GetGameLists();
await Task.Run(() =>
{ = GetGameLists();
return View(;////***my question point here
**i wonder how can i use the parameter return in view “return View( in my viewcomponent(default.cshtml)? in this case i dont use Model class.
• Pingback: Les liens de la semaine – Édition #141 | French Coding()
• Aurimas Neverauskas
Previously, as ChildAction was called by HtmlHelper.Action it was creating internal request – that resulted in about 5ms (or smth like that) overhead. Now, there should be no overhead at all as new request object is not constructed and new request pipeline is not invoked.
• Filip W
that’s correct, right now it’s much simpler. The “Component” property in the view (which is used to place the component in the Razor file) is an instance of “IViewComponentHelper”, and internally it will create the context object (by aggregating different view information) and use “IViewComponentInvokerFactory” to instantiate an “IViewComponentInvoker”. That invoker class is directly responsible for injecting dependencies into your view component and simply run the code you set up there. There is no extra fake internal request pipeline.
BTW all the se above services are customizable and replaceable using the ASP.NET 5 DI.
• lokitoth
Is there some way to make these be strongly typed and bound automatically (rather than creating a set of helper methods per component) in Razor, vs. using name binding and runtime type binding for parameters passed into the Invoke/InvokeAsync calls?
• Tony Shao
So if the viewcomponent is async, it will run in parallel with the caller, is that the case?
• Daniel Lo Nigro
It’s unfortunate that this needs magic strings… Is there a version with generics? (eg. @await Component.InvokeAsync())?
• Anders Borum
It’s actually a quite good question; I think the new C# 6 nameof() operator allows you to express the following: @await Component.InvokeAsync(nameof(PromotedProductsViewComponent));
Obviously the “ViewComponent” suffix is part of the convention based controller resolution, but I’m sure this could easily be handled as well. I’m personally stoked about ViewComponents. They compare to what UserControls was to WebForms (and the dynamic loading of UserControls in WebForms was awesome).
Very nice job explaining some of more intricate details.
• mleanos
Thank you for this example. Very helpful. One thing I’m trying to get my head around, and I haven’t seen mentioned yet, is when I would want to “bind” results from my ViewComponent to the model in my parent View. How would one accomplish this?
For instance, I have a Model named “ProductViewModel” that has two properties “name”, and “vendors”; the latter being an array of strongly typed Vendor objects. Now in my ProductList view, I would like to include a ViewComponent for managing the list of Vendors; basic CRUD operations on just the “vendors” field of my main model. The view that I couple with my ViewComponent has a model of IEnumerable. When I modify any of the Vendor data, I’d like it to propagate back up to my ProductViewModel.
Is this a proper use case for ViewComponent’s? Or am I thinking about this completely wrong?
• mleanos
Did you ever figure this out? I’m struggling with a similar use case.
• Johnny Oshika
I find this comment really interesting: “As far as discovery of view components goes, all assemblies that reference ASP.NET MVC packages will be considered valid to search. “. I’m trying to get view components from a separate assembly working in an MVC 6 project without any success. I posted my problem here on StackOverflow: Any chance you can weigh in on the topic?
• Darrell Tunnell
Thanks – this helped me out when implementing the main menu for the site and it all worked swimmingly, seems pretty straightforward. Think some of the tooling is lagging though, for example it would be nice if you could scaffold a new ViewComponent similar to how you can scaffold other types of project items. Also the folder and file naming conventions for the view (cshtml file) aren’t particular likeable – i’m not a fan personally of many nested folders in the project tree) – and there isn’t any convention over where to put the ViewComponent class it seems? Although I have put mine in the ViewModels folder. Scaffolding a new ViewComponent would help create those folders and files according to the conventions so would be useful I reckon!
|
global_01_local_2_shard_00001658_processed.jsonl/5978
|
9 Brain Damaging Habits…..
….That You Must Stop Immediately
The human brain is a truly complex and mysterious organ that never ceases to amaze us. The typical brain accounts for 2% of your body weight, but it uses 20% of its total energy and oxygen intake. Brain health depends on numerous factors including your lifestyle. Even your habits play a role, but sometimes we’re not even aware that some habits have a negative impact on brain functioning. This article outlines nine brain damaging habits you repeat on a daily basis.
1. You eat too much sugar
We tend to eat way too much sugar than we’re supposed to, it is a well-known fact. High intake of sugar leads to weight gain, increased risk of type 2 diabetes, and it is bad news for your brain as well. The Alzheimer’s and Dementia published a study which found that participants who consumed more sweetened drinks had weaker memory and reduced overall brain volume compared to people who didn’t drink those sugar-laden beverages. A separate research from the Stroke discovered that excessive consumption of sugary beverages increases the risk of stroke and dementia. Instead of sweetened drinks and munching on candies, opt for healthier alternatives.
1. You don’t drink enough water
Water is essential for our overall health and wellbeing, but we don’t drink enough during the day. The brain is 73% water, meaning you need to stay hydrated to support brain health and functioning. Evidence shows that it takes only 2% dehydration to affect your attention, memory, and other cognitive skills. Most of us drink water only when we feel thirsty, but by that time your body is already somewhat dehydrated. Strive to drink about eight glasses of water a day, set up reminders or download an app, so you don’t forget.,
1. You cover your head while sleeping
Sleeping with head covered reduces oxygen intake at night which can lead to brain injuries and memory loss. Although you don’t experience lightheadedness because you’re asleep, your brain does. For example, only five minutes without oxygen can cause brain damage or cerebral hypoxia. If you cover your head, so the light doesn’t wake you up in the morning, you should consider getting an eye mask.
1. Smoking
Smoking is a bad habit with harmful effects on your body and brain. A growing body of evidence confirms that smoking has a negative impact on learning and retaining information. The journal Age and Ageing published results of the study which discovered that smoking, basically, rots your brain by damaging memory, reasoning, and learning. Although many people are aware smoking is unhealthy, they believe quitting is impossible. Of course, it’s not the easiest thing in the world, but with strong willpower, support, and proper guidance you can do it. The best way to stop with unhealthy habit is to slowly replace it with healthy behavior.
1. Overeating
Overeating is yet another common habit that endangers our entire health. Besides weight gain, higher risk of joint pain (due to excess weight) and heart disease, overeating can also affect your brain health. High caloric intake over time may enhance the risk of developing mild cognitive impairment or memory loss later in life. One reason we eat way too much is due to adherence to the unhealthy diet. Processed and junk foods make you feel full, but before you know it you’re hungry again. Instead, eat a well-balanced diet abundant in different nutrients and fiber which acts as an appetite suppressant and keeps you full for longer.
1. You don’t talk much
Yes, believe it or not, this is true! Some people talk a lot, while others don’t. They say silence is golden, but it’s not that good for brain health. According to a report published by the World Health Organization (WHO), people who don’t talk much are at risk of suffering brain damage. Why? The cells become dormant, thus making the brain shrink. On the other hand, engaging in conversations, particularly intellectual, strengthens the brain and improves its functionality. One study found that during conversation our brains sync up, which could explain how we retain information. One of the easiest ways to improve memory and other cognitive skills is to talk more and engage in intellectual conversations.
1. You don’t get enough sleep
How much sleep do you usually get? Sleep deprivation is considered a public health concern with serious implications for your health. For example, lack of good night’s rest can cause parts of the brain’s synapses to be “eaten” by other brain cells. Moreover, sleep deprivation increases plaques in the brain, thus raising the odds of developing Alzheimer’s disease or dementia. A study from the Neuropsychiatric Disease and Treatment found that sleep deprivation impairs attention, working memory, long-term memory, and decision-making. Establish a regular sleep pattern and make sure you get at least seven hours a sleep at night.
1. You love sedentary lifestyle too much
Sure, it’s easy to sit on a sofa all day and binge-watch TV or Netflix, but it’s not good for your waist size or overall health. Plus, preferring sedentary lifestyle instead of being active is bad for the brain as well. One research showed that physical inactivity remodels your brain and changes the shape of neurons while a separate study found that sedentary lifestyle impairs self-reparative processes in your brain. It is important to mention that lack of physical activity is linked to poor cognitive performance, too.
1. Working while ill
Do you belong to the group of people who take some rest when they’re ill, or you force your brain to work or study anyway? If your answer is the latter, you have to ditch this brain-damaging habit. Pushing through illness can decrease your efficacy, and it will take longer for you to recover. When you’re not feeling well, take some time to recover.
Brain health is influenced by multiple factors including lifestyle. Some habits that we think are entirely harmless can jeopardize our health and brain’s functioning at the same time. This article featured nine of those habits and altering them into a healthier behavior can do wonders for your cognitive performance.
Author Bio:
Ella James is a passionate blogger as well as a nutrition, beauty and skin care enthusiast since 4 years. She is has contributed subjective articles to various social media platforms. Ella currently lives and works in Miami, Florida. Connect with her on Facebook, Twitter, LinkedIn
(Visited 2,682 times, 1 visits today)
• okay awesome. i’ll just stop being so depressed i cant sleep or get out of bed! what a perfect solution to my problems! this is so hopeful
• You will never find anything helpful because you are a narcissist that does not understand the difference between “cannot” and “don’t feel like it” – you manage to get out of bed to piss then you can get out of bed for other things. Take some responsibility ad stop being rude just because you want everyone in the world to be miserable since you decided you don’t like to be anything but.
• There’s a huge difference between being able to get out of bed to piss and getting out of bed to do something constructive.
• Thanks for the reminder of helping us remember that diet/water intake is usually one of the main contributing factor in maintaining brain health. Many don’t remember to drink plenty of water. It does help. Along with growing evidence that sugar is a huge contributor in brain damage in various studies so yes its a very valid point to bring up, thanks Ella.
• I think there is merit in all of these suggestions. If they don’t help, I think it’s time to seek a professional medical opinion about one’s situation. These are not “perfect cures” – they are suggestions for things to help us attain and maintain good health.
I know for a fact that that for me, hydration – drinking lots of water – eases fatigue and headaches, and increases my concentration.
The idea, I think, is to use our own means of self-care and then if problems persist, as mature individuals, we can move to the next step – namely seeking professional help for problems that we have tried but can’t address adequately on our own.
• I can’t seem to like I said gain control my emotions. A good example today was when my lawnmower wouldn’t start and it took me hours before I’d figure out there was water in the gas tank cause of rain. Sadly I took it out on my mom and dad. It almost went too far. I’ve had to work on this. I haven’t had much success. I’m hating myself right now. I don’t reward myself when I act like this.
Leave a Reply to DrownedFishOnFire Cancel reply
Your email address will not be published.
|
global_01_local_2_shard_00001658_processed.jsonl/5981
|
My new Spalted Fretless Project
Discussion in 'Basses [BG]' started by 88tuner, Nov 21, 2003.
1. This is my 3rd bass. I'll keep posting pictures as I go. It's made from two 3/4 X 4 pieces of spalted maple. I also have some spalted sycamore pieces for the fingerboard that will be mirrored.
Check out my shop cam at www.pianodesk.com
2. pilotjones
pilotjones Supporting Member
Nov 8, 2001
Wow. Two comments.
1. Are you really going to use fungus-attacked wood for a neck? Sounds very risky.
2. From the pictures it appears that you will have a treble side horn (which is good, to allow seated playing), but no bass side horn. Where are you putting the strap lugs? Most people put a lug on the horn up by the 12th fret in order to have the bass balance properly, and not neck dive.
3. Sorry about that. Here's a better picture. I had the wings reversed. They're also carved now.
The spalted part is mainly on the body. The neck, especially on the back, is all solid maple. For the most part. The spalted sections are quite hard. I've considered impregnating the wood with resin but I'm not sure how this might affect the tone. I'll have to pose that question somewhere on the forum.
4. fourstringdrums
fourstringdrums Decidedly Indecisive Supporting Member
Oct 20, 2002
I have a question... With no treble side horn, and a basically rounded side, how is the bass going to balance on your leg without sliding off?
5. I had considered that, but I guess it really comes down to who's playing it. I'm making the bass for myself and I normally keep it high on the strap, even when sitting.
6. pilotjones
pilotjones Supporting Member
Nov 8, 2001
You might want to check out page 2 of this thread concerning wood hardener. I would consider it seriously - even if, for appearance reasons, you only use it on the front of the neck blank, where it will be covered by the fretboard anyway.
Also, after rereading your first post-
Is this a fretless bass? Fingerboards on a fretless need to be hard. The spalted sycamore sounds soft, and prone to wear-through in the spalted parts. So unless you're relaying on an epoxy finish, I would think that hardening the wood would be the only way to go.
Brubaker and perhaps others have done spalted fretboards, but they were resin impregnated.
7. I had wondered about sycamore as a fingerboard. It's listed with the same density as walnut so it has to be pretty hard. The spalting is very light so I don't think it will be a problem. I'll have to test it I guess. The one think I liked about it is the mirroring I'll be able to do. It's got a female quality I like. Here's a picture of it.
|
global_01_local_2_shard_00001658_processed.jsonl/5984
|
Collins Gem Latin Dictionary (Heftet)
Serie: Collins Gem
Innbinding: Heftet
Utgivelsesår: 2006
Antall sider: 768
Forlag: HarperCollins Publishers
Språk: Latinsk / Engelsk
ISBN/EAN: 9780007224142
Omtale Collins Gem Latin Dictionary
Extensive coverage of the Latin language in a compact, portable format including the key points of Latin grammar for use at school and home, for research and everyday use.
Designed for students of Latin of all ages and comes with a handy index of geographical names.
* A useful supplement of Latin verbs and nouns is the perfect complement to the dictionary.
* The clear layout ensures that you can find the information you want quickly and easily.
* Extensive coverage of Latin and English.
Til toppen
Bøker i serien
|
global_01_local_2_shard_00001658_processed.jsonl/5992
|
Pointsec and wiping the hard drive
By yesdear47 ·
Late last year when my employer closed it's doors, the owners raffled off it's laptop computers to the employees. Well I was the lucky recepient of a Dell Latitude D600. Since I already owned a Dell desktop, I threw it in the back of my closet and forgot about it. Now I have use for it. Here's the problem, there was nothing done to these laptops when we got them. I turned it on and there sits Pointsec. I just want to wipe this entire computer clean. There are no files I need to recover. This laptop is going to be for my 5 year old son, for his computer games and basic internet access. I am pretty good with computers and have been reading about the Hard Drive Wiping programs that are available but I cant seem to get anywhere with Pointsec sitting there. Any suggestions? Where do I start?
This conversation is currently closed to new comments.
2 total posts (Page 1 of 1)
| Thread display: Collapse - | Expand +
All Answers
Collapse -
by wasabi71 In reply to Pointsec and wiping the h ...
I have managed Pointsec deployments and in your case since you don't care about the data you can just format the drive and install your OS of choice. Pointsec will not prevent that. Just boot to your OS CD and install. But as far as the data on the drive you will never get that back, but you don't want it anyway.
Collapse -
by joefubar In reply to Pointsec and wiping the h ...
You will need to wipe the drive or decrypt the drive.
Decryption will be impossible unless you have the recovery
file. My company uses pointsec on all of our devices
35,000+. The disk will look bad or unreadable and this
normal due to encryption. You can try using fdisk. There
are other tools to wipe the drive like the disk utilities from
the drive manufacturer to do a low levev format but this
take a long time to run. Xp cd should work but you
probably need format mbr since pointsec messes with the
mbr. There other tools to wipe the drive such as autoclave
so check the web or
Back to Hardware Forum
2 total posts (Page 1 of 1)
Related Discussions
Related Forums
|
global_01_local_2_shard_00001658_processed.jsonl/6025
|
Hatful Of Hollow (RARE UK Pressing) by The Smiths Vintage Cassette Tape
$42.50 $50.00
Artist: The Smiths // Album: Hatful Of Hollow //
Original Release Date: 1993
Label: WEA – 4509-91893-4 (UK Pressing)
Cover is VG+ // Tape is VG+ // *Very light fading to font on side 1, see pic 1*
Tested and plays great
A1 William, It Was Really Nothing
A2 What Difference Does It Make?
A3 These Things Take Time
A4 This Charming Man
A5 How Soon Is Now?
A6 Handsome Devil
A7 Hand In Glove
A8 Still Ill
B1 Heaven Knows I'm Miserable Now
B2 This Night Has Opened My Eyes
B3 You've Got Everything Now
B4 Accept Yourself
B5 Girl Afraid
B6 Back To The Old House
B7 Reel Around The Fountain
B8 Please, Please, Please, Let Me Get What I Want
+++++++++Exclusive vintage tees & cassette tapes at the nine: https://www.etsy.com/shop/theNineATX
Shipping from United States
Processing time
1-2 business days
Customs and import taxes
Payment Options
Secure options
• Accepts Etsy gift cards
Returns & Exchanges
I don't accept returns, exchanges, or cancellations
|
global_01_local_2_shard_00001658_processed.jsonl/6045
|
Devam Ediyor
475493 Clone this website
I need clone of this simple website ( [url removed, login to view]) with EXACT SAME features and functionlaities, site must be fully working like the original site.
All u do is invite ur friends and online followers to describe u with 3 words.
Register at original site, and see all features and functionality and that will help u to make a clone one. Has to be clean code, fully working.
Only expirienced programmers,with low bid will be choosen for this project, if project is finished how is suppose to be then i will give u bonus too.
Contact me for more details
Beceriler: Her şey Kabul, HTML, PHP
Daha fazlasını gör: this website will, online programmers working, make friends website, how to describe a website to the programmers, how to describe a website, online programmers help, php invite contact, describe friends, invite friends code, simple website clone, choosen bid, invite friends functionality, friends invite website, invite friends website, website invite friends, words friends clone, clean followers, words clone php, website register bid project, make website clone, low bid website, give ur website contact, clean code website, code finished website, simple website help
İşveren Hakkında:
( 0 değerlendirme ) Tampa, United States
Proje NO: #2221398
|
global_01_local_2_shard_00001658_processed.jsonl/6067
|
Bulang in China
Unreached of the Day 6/19/2018
Bulang in China
The Bulang are a multilingual people who commonly speak Chinese in addition to their native language, Blang. One distinguishing feature of the Bulang is the men's practice of tattooing their limbs and torsos. Most of the Bulang have never once heard the name of Jesus. They are a Buddhist people, groping in spiritual darkness and daily crying out to gods who can neither hear them nor help them.
Ministry Obstacles
The Bulang live in mountainous areas, difficult to access.
Outreach Ideas
Sustained, focused prayer is needed to help these people come to the Living Water that Jesus offers.
Pray for the followers of Christ
Pray for Scripture and other resources to become available to the Bulang. Pray the few believers in Christ will find materials to help them grow in their faith, as well as qualified teachers.
Pray for the entire people group
Pray for each Bulang, child and adult, to hear clearly of who Jesus is, and what he has done on their behalf. Pray each person may hear this message many times, in several forms.
Scripture Focus
People Name Bulang
Country China
10/40 Window Yes
Population 105,000
World Population 121,000
Language Blang
Primary Religion Buddhism
Bible Portions
Online Audio NT No
Jesus Film Yes
Audio Recordings Yes
Christ Followers Few, less than 2%
Status Unreached
Progress Level: progress level image
|
global_01_local_2_shard_00001658_processed.jsonl/6069
|
Top definition
In surfing a foamball is often inside a very hollow twisting wave with a white frothy ball running along through it.
Jeez Byron was ripping today he was sitting on the foamball like he was laying in a hammock. He makes it look so easy
by heinekenpoint January 21, 2011
Get the mug
Get a Foamball mug for your brother-in-law Paul.
|
global_01_local_2_shard_00001658_processed.jsonl/6082
|
4 years ago5,000+ Views
While my kids are too old for this, I thought this was too cute not to share! All you need is a baby carrier and a baby (those tend to come together. I suppose you could just use a bag of flour but why not have some mommy baby bonding?) 1. “Good Mornings” Step 1: Begin with the feet about 3 feet apart. Gently support your baby’s head. Step 2: On the inhale, begin lowering your body to a 90 degree angle. If you are new to this exercise only lower the upper body about 45 degrees for the first few weeks, until you gain the back strength to keep it straight. On the exhale, raise your body up to the start position. Remember your baby is adding extra weight, so its very important to keep your abs tight and your back straight. Repeat this exercise 10-15 times for three sets. 2. Alternating Shoulder Press Step 1: You can use water bottles or dumbbells for the resistance on this exercise. Begin with your feet shoulder width apart. Start with your upper arm parallel to the ground with a 90 degree bend in the elbow. Step 2: Press your right arm straight up towards the ceiling, then lower it to the start position. Be sure to keep the arms horizontal, they may want to drop, but holding that position is strengthening the arm too! Step 3: Repeat with the left arm. Check out the video as well!
This is so much easier than waiting for kids to fall asleep and workout during a nap!
@nokcha Me too....hahhaa
This is great, though I may have to use the pack of flour you suggested...
What a creative idea! I'll definitely be clipping this for later, baby's gonna come soon enough!
View more comments
|
global_01_local_2_shard_00001658_processed.jsonl/6086
|
LAN - Legacy
generic network product image
Price: $55.18
Unit of Measure: Per Unit
Pricing Type: Fixed
Billing Cycle: Monthly
Service Lead: David Williams
Site with a Local Area Network (LAN) that qualifies as "Legacy" that is in accordance with Appendix 12 to Schedule 3.3 Legacy Operations Framework. In summary, this monthly recurring charge applies to sites that were not transformed but require support.
The site will also incur the normal LAN support fee.
How to Order
No need to order - rates are published here for awareness.
Agency will be asked to confirm the list of legacy hardware subject to legacy hardware and legacy support fees by VITA as Transformation completes at that agency. This list will contain any known legacy hardware discovered during Transformation but requested by Agency to remain non-Transformed.
Need help?
Send VITA Onestop an email: to collaborate or handle your order.
|
global_01_local_2_shard_00001658_processed.jsonl/6096
|
ResidentsBusinessVillage DepartmentsI Want To...
Go To Search
Click to Home
Show All Answers
1. How do I request a copy of an crash report?
2. What are the fees associated with requesting and obtaining public records?
3. How do I obtain a copy of an Incident Report?
4. How long until a report is able to be released?
5. How do I obtain a copy of a 9-1-1 recording?
6. Why is certain information deleted from a report?
|
global_01_local_2_shard_00001658_processed.jsonl/6097
|
From W3C Wiki
Jump to: navigation, search
The httpRange-14 resolution has some bugs. This page proposes to repair some of the wording, without altering the intent.
The literature on httpRange-14 is huge. See for some representative contributions.
Original Text
agreed on 15 Jun 2005
The TAG provides advice to the community that they may mint "http" URIs for any resource provided that they follow this simple rule for the sake of removing ambiguity:
• If an "http" resource responds to a GET request with a 2xx response, then the resource identified by that URI is an information resource;
• If an "http" resource responds to a GET request with a 303 (See Other) response, then the resource identified by that URI could be any resource;
• If an "http" resource responds to a GET request with a 4xx (error) response, then the nature of the resource is unknown.
"http resource responds" - what?
This would imply that a resource can "respond". This appears to be a typo (in discussion during awwsw). A 'server' is the sort of thing that responds, not necessarily a resource.
'"http" resource' isn't defined; I think what's probably meant is a resource that has an http: URI, although the advice really shouldn't be specific to http: URIs.
We will try to reword this to make it clearer and/or submit this to the TAG. Something like: If a GET request (on an http: URI?) yields a 2xx response, then the resource must be an information resource (etc.).
DBooth: Or: "If a GET request on an http: URI yields a 2xx response, then the URI identifies an information resource".
In general I prefer "denotes" to "identifies", but since "identifies" has been used so many times in AWWW already, it may
make more sense to continue to use it in this context.
JAR: I prefer "names" to either...
is an information resource - really?
AWWW says that the naming authority gets to say of what the URI is a name. Suppose the naming authority says that the URI names a person (not an IR), but then, through error or willfulness, delivers a 200 response for the URI. The rule has not been followed, leading to an apparent contradiction. Who is wrong?
This is easily fixed by changing the wording of the rule to make it sound more like a rule - e.g. change "is" to "must be". The httpRange-14 resolution gives permission, not granted by the prevailing specification (RFC 2616), to use http: URIs to name things that are not information resources, but only when 2xx responses are not used in conjunction with them. The use of 2xx in this case would then be a failure to follow the extended protocol, not an alternative communication providing contradictory information about the resource.
DBooth: I think the httpRange-14 decision is for more than just giving permission to use http URIs to denote non-IRs.
I think it is *good* that it gives a rule. Changing "is" to "must be" doesn't help to my ear. I think the reality is
that if the URI owner says one thing by configuring his/her server to give a 200 response and says a different thing
via some other pronouncement, the fact is that the owner made contradictory statements. Perhaps the term "conclusive
evidence" would help: "a 2xx response is conclusive evidence that the URI denotes an information resource".
JAR: I think you're reading too much into it. I don't think you can conclude from the resolution that the TAG meant
for 200 to communicate that the resource is an IR. The resolution just says "to avoid ambiguity" - it could just be
good practice because some user-agents might (whether permitted to or not) infer IR-ness from a 200.
DBooth: I guess we're reading it differently. To my mind there are two things being said. One is the advice for
people who are minting URIs. But the second thing is the *reason* for this advice: that a 200 response *does* imply
an IR. I don't view the httpRange-14 decision as as an attempt to legislate this inference rule. Rather, this
inference rule is being mentioned as a pre-existing fact, in order to explain the URI minting advice that is being
given. To my mind "200 response implies IR" is a tautology, because only IRs can have awww:representations, but ask
I check AWWW to see where this is stated, I see it is not stated explicitly:
There is a problem with "is" in that naming (so-called identification) is not objective; it is part of a 3-way relation
between a name, someone using the name, and what that someone takes the thing to name. So it's important to deconstruct
what's going on here and not hide behind objective terminology. If necessary we should talk about conforming
clients and servers, wording that is common in many specifications.
By the way, the server does not necessarily speak for the naming authority (consider absolute URIs) unless, maybe,
it's conforming to RFC 2616, and there's no way to test for that. Assertions carried by a response are only
"authoritative" regarding the binding of the URI if they are attributable to the naming authority.
DBooth: Yes, it could happen that the owner of domain foo.example cannot control what is served from URIs
at http://foo.example/*, but if so it was the owner's *choice* to give up that control. The owner pays for
the domain, and if the owner chooses, he/she certainly can have it configured to serve response codes as desired.
JAR's version of what the resolution should have been
The TAG provides advice to the community that they may mint absolute http: URIs to name arbitrary things provided that they follow this simple rule for the sake of removing ambiguity:
• If an absolute URI is dereferenceable (i.e. if an HTTP GET request could be answered with a 2xx response), then it names the information resource whose associated representations are retrieved using that URI.
• If an HTTP GET request for an absolute http: URI is answered with a 303 (See Other) response, then the URI can name anything, including any information resource, as determined by the URI owner.
(Longer version.)
:DBooth: 1. I disagree with casting this as "the TAG asks the community to observe" this rule.
The whole point of this rule is that it is needed architecturally to enable clients to use a simple,
automatable, architecturally authoritative algorithm to determine the identity that the URI owner has chosen to
establish for the resource. It is *not* a matter of asking the community to be nice. It is stating (part of)
what that algorithm is, so that semantic web clients and publishers anywhere in the world can be assured of
communicating with full fidelity *if* they so choose.
JAR: Agreed, I changed "ask" to "advise". I almost used the word "recommend" but that already has a technical meaning in W3C.
I haven't a clue what you mean by "architecturally". Architecture has to be either empirical or prescriptive. The rule is not empirically true but merely respected most of the time, and the level of review (i.e. claim to legitimacy) is just that the TAG in 2005 thought it was a good enough idea that it advised the community to follow it; and then the idea got uptake.
As I remember your definition of "identity" is that a URI's identity is a set of RDF statements that's somehow glued to the URI. That is a very strange way to use the word and I will certainly not use the word "identity" that way. But the important thing is agreement on how to use URIs, not on what RDF is glued to them. If RDF happens to help achieve agreement, that's fine, just as it would be wonderful if SVG or Excel could help. But it's not something I particularly care about, and neither does the TAG.
That said, expressing in RDF that a URI refers to the information resource at that URI is trivial, and is covered in the note.
:DBooth: 2. The definition of "information resource" in AWWW *does* need to be corrected as part of clarifying
the httpRange-14 resolution, but I think that should be done as an addendum to AWWW, rather than here. In particular, the
definition should either: (a) specify exactly what RDF assertions constitute its definition; or (b) make
clear that it is *intended* for things like documents and web pages, whose "essential
characteristics can be conveyed in a message", but some URIs may identify resources that are (ambiguously) both
"information resources" and resources that one may not normally think of as being "information resources",
such as cars or people.
JAR: I am not interested in issuing a new edition of AWWW right now. The purpose of this blurb is that I have frequently had need to refer to something like this (most recently at the TAG F2F). To talk about essence or cars would be completely wrong and would just feed the FUD. If other people want to introduce FUD that's their business, but the deductive contract I've spelled out for dereferenceable absolute URIs is clear and provides definite, actionable consequences. Expressing those consequences in RDF would be possible but harmful since it would suggest that there is something special about RDF.
Alan has asked me to use a noncolliding word instead of "information resource" and I may yet do so, although I think my definition is probably much closer to actual usage than AWWW's is, so not likely to cause confusion among people who haven't been tainted by AWWW.
Anyhow I agree that trying to define a local term is distracting, and I've removed the definition.
:DBooth: 3. I think it would be better just to refer to the AWWW definition of "URI owner" instead
of providing a new definition here.
JAR: I don't like AWWW's "URI owner" but have reverted it to avoid distraction. May get burned by it though.
|
global_01_local_2_shard_00001658_processed.jsonl/6113
|
Chrome Plated Rainbow
Chrome Plated Rainbow
Your chrome plated rainbow
Is not mine,
But I’d like to check it out.
Oh the way it curls around
And reflects itself,
In itself,
Really knocks me out.
Below a gray laden sky
Your shrieks echo,
Through the streets,
And rumble and tumble
Like a subway
Below my feet…
I met you on a corner
Of a giant checkerboard,
Who’s move is it now?
This game is far stranger
Than any before,
But can you tell me how?
Clad in your armour,
Of just another face
In the crowd, I wonder…
Just who you really are.
Behind those shrouds there must be you…
There must be you…
Behind those shrouds there must be you.
© 1978 or so
|
global_01_local_2_shard_00001658_processed.jsonl/6122
|
Edit Article
How to Defeat Mobs in Don't Starve
Three Methods:Preparing the NecessitiesPreparing YourselfMob SlayingCommunity Q&A
As a survival game called Don’t Starve, you’re contractually obliged to kill things to eat, and while rabbits are good, they’re not as good as larger game. Sometimes, you also have to kill things trying to kill you. In any case, while avoiding things is necessary early on in the game, killing things is what will keep you alive and well-stocked for prolonged survival. While this seems like a daunting concept for such a ridiculously punishing game, it’s actually not that hard once you know how to prepare yourself.
Preparing the Necessities
1. 1
Make your tools. You need a pickaxe and an axe to gather some of the required materials to survive. They’re both available through the Tool tab (crossed axe and pickaxe icon). Axes cost 1 each of Twig (gathered from dried-out bushes scattered in the world) and Flint (sharp-looking rock that’s scattered everywhere in the game), while pickaxes cost 2 each of the same materials.
• To use tools, select it by right-clicking on the tool (PC), tapping and choosing the Equip option (iOS) or scrolling to it with the right analog stick and pressing the right button of the D-pad (PS4). Go up to the tree (axe) or boulder (pickaxe) and hold down the left mouse button (PC), tap and hold (iOS), or press the X button (PS4) to wear them down into gatherable materials.
2. 2
Gather the necessary materials. Now that you have your tools, get going and get gathering! Make sure you chop down some trees for Logs since they’re vital for creating a Science Machine. Gathering some Rocks from boulders is also a priority, both for the Science Machine and also for other creations. Gathering Cut Grass from tufts of long grass poking from the ground is also vital for campfires and torches.
• Rocks can be found scattered everywhere, much like flint, but are less common and are more abundantly found from mining boulders.
• Everything initially gathered, save for Logs, can stack up to 40 per inventory slot. Logs stack up to 20.
3. 3
Create a Science Machine. You’ll need a Science Machine to create the necessary items for your survival. A Science Machine costs 1 Gold Nugget, 4 Logs, and 4 Rocks, and is the very first crafting station you can make.
• You can gather Gold Nuggets by trading Meats to the Pig King (if he’s available in the current world), mining yellow-streaked boulders (which are predominantly found in Rockylands), or by finding them scattered around Graveyards.
• Before you craft a Science Machine, make sure that the area is where you’ll be camping permanently, since once you place the Science Machine, it cannot be moved and carried around.
Preparing Yourself
1. 1
Make a Spear. Spears cost 1 Rope, 1 Flint, and 2 Twigs, and are first crafted through the Science Machine’s Fight tab, which is represented by a crossed swords icon. This is the first true weapon of the game and is rather efficient when it comes to killing early-game mobs. Equipping it is identical to equipping your tools: select your item then equip it with right click or the right direction button.
2. 2
Make armor. You’ll be needing some armor to go with your Spear if you want to survive this ordeal. While armor won’t completely repel damage, it lessens it greatly and would help keep you from losing too much health.The two most efficient armors available early on is the Grass Suit and the Log Suit.
• Grass Suits can be crafted at the very beginning of the game and costs 10 Cut Grass and 2 Twigs. You equip them the same way you did with your tools and spear.
• Log Suits require the Science Machine to make the first time, and costs 8 Logs and 2 Ropes.
3. 3
Stock on healing items. Once you’re done arming yourself, take stock of what healing items you can craft and gather so that, in case of emergencies, you can heal yourself if the enemies breach your defenses. Stockpiling Butterfly Wings, Spider Glands, and Mosquito Sacs is a good tactic, but taking some Jerky with you, cooking food in your Crock Pot, and making Healing Salves will be better off in the long run, as long as you have the right resources.
• Healing Salves cost 2 Ashes (obtained from extinguished Campfires), 1 Rock, and 1 Spider Gland. It heals for 20 Health, compared to the 8 Health healed by the Spider Gland.
• To make Jerky, you'll need to make a drying rack first, which is made with a Science Machine and requires 3 Rope, 3 Twigs, and 2 Charcoal. Upon creating a Drying Rack, you can then place a piece of Meat of any kind, including Frog Legs, Batilisk Wings, and Monster Meat, by approaching the rack and using the left mouse button, tapping the screen, or X to place the meat. After a few days you'll have your Jerky ready for consumption!
• Charcoal can be obtained by burning down Trees. You can do this by making a Torch, equipping it, then right-clicking on the trees. Each burned tree can be chopped down with an Axe to get 1 Charcoal.
Mob Slaying
1. 1
Know the mob types. Now here comes the fun and dangerous bit! There are three major kinds of mobs in the game: Passive, Neutral, and Hostile. Hostile mobs are the most dangerous, since once they see you, they will start attacking you. Neutral mobs tend to fight back if you attack first, and Passive mobs run away if you get too close and don’t fight back at all.
2. 2
Observe before you attack. Each mob has their own individual behavioral patterns. For example, Butterflies and Rabbits are both passive mobs, but Rabbits are harder to kill since they don’t stray from their homes and flee quickly. Butterflies just flutter around faster than you, but are easier to kill because they settle on flowers for a few seconds, leaving them open to attack.
• Beefalo and Bees are neutral mobs, and they both attack in groups once you attack one of them. Beefalo are stronger and have certain days where they are extremely hostile, signified by their inflamed red bottoms.
• Spiders wander around at dusk and night, and are somewhat neutral until you’re much too close.
• Tallbirds are persistent, and Hounds spawn every couple of weeks. There’s a lot more here to discuss, but as long as you keep an eye on Mob behavior and stay cautious, you’ll fare off better when you decide to attack.
3. 3
Get to know their attack patterns. Different mobs have different attack patterns and quirks— Frogs knock things out of your inventory, Red Hounds explode after death, and Tall birds are highly aggressive, walk fast, hunt you down longer, and peck hard enough to kill weaker characters. Some mobs pause for a second before they attack, some can’t be stun-locked, and some kite around you while they attack. Time your hits well, observe your target’s attacks and abilities, and you’ll be able to outsmart and outfight them.
4. 4
Don’t bite off more than you can chew. Hostile and Neutral mobs tend to attack you as a group if you agitate them too much, which can spell death even for the most prepared players. There are many tactics to avoid being mobbed by Mobs, but as long as you play it safe and play it smart, you won’t die from being attacked by ten Beefalo at once.
• Try and lure individual targets away from the group by hitting only one of them, then running as far away as you can. The one you attacked will follow you long after the others do, and if you lead them far enough away, you won’t be in too much trouble.
• Smaller mobs, when attacked, can be “stun-locked” when you attack continuously. Stun-locking is a game phenomena where a mob stops moving for a few moments after they are attacked and tend to stay still for each consecutive attack, and is extremely exploitable that way. Simply holding auto-attack (F on PC, square on console, the fist icon on the iOS version) will ensure that you hit fast and continuously to take advantage of this function.
• Kiting is also a great way of killing mobs. Also called the hit-and-run tactic, this tactic involves running around or away from your target after hitting it, giving you ample time to heal or equip new armaments while keeping the damage coming. Normally you can kite by either running away before every attack then returning, running around the enemy to confuse them and then attacking, or leading it away, waiting until they stop attacking, then coming back to attack and lead them away again.
Community Q&A
Ask a Question
200 characters left
Article Info
Categories: Don't Starve Video Games | PC Games
Thanks to all authors for creating a page that has been read 2,793 times.
Did this article help you?
|
global_01_local_2_shard_00001658_processed.jsonl/6124
|
Dual update profiles for mobile users
Discussion in 'NOD32 version 2 Forum' started by bdmc, Jan 22, 2008.
Thread Status:
Not open for further replies.
1. bdmc
bdmc Registered Member
May 11, 2006
Hi All,
I have some mobile users that are out of the office a fair bit. While they are in the office, they get their updates from the local mirror. I have been trying to setup dual update profiles, so they would still get the updates from Eset servers while not in the office.
I have followed the instructions at..
but, they are still getting warnings that the virus definitions are out of date.
In the log, they have..
Update attempt failed (Server connection failure)
Function: gethostbyname, parameters, return value: 11004
Anyone have any ideas what I am doing wrong?
Thread Status:
Not open for further replies.
|
global_01_local_2_shard_00001658_processed.jsonl/6149
|
A Story To Be Told: Tanu Di, A Commercial Sex Worker
Posted on June 15, 2011 in Society
By Anonna Dutt:
Being married and having a one-year-old child, it could be the happiest time in the life of a women. It was not so in Tanu Di’s (name changed) case. She was totally dependent on her husband for her and her child’s sustenance. The reason for this was that she had never been educated, either due to the lack of funds or just because her family thought it was not important for a girl to get educated. Here, this is not an issue about how there are so many people in India who do not get their right to education; it is about how a poor female, to earn daily bread for herself and her family, had to get into sex trade.
She stood alone on the street with the little child in her hands and suddenly she did not know what to do. Her husband had thrown her out of their house (i.e. a tin shed; if you can call that a house, then so be it). In desperation, she went to her parent’s place. She also had two brothers who lived with her parents–that is, two younger brothers.
After a few days of her arrival, her parents had to go to Bangladesh for some work. They were gone for two weeks when she realised that there was no money left and the shopkeeper would not lend them anymore. She had the responsibility of a one-year-old and two younger brothers and the thought about her parents was killing her. She did not know what had happened to them; they were supposed to return in a few days.
Meanwhile, she had to fill four empty stomachs and decided to work as a construction worker. She went to a construction site and started working for a meagre wage of Rs. 150/- for an entire day’s work. But this was not all, her miseries knew no end. During lunch break, the male workers wanted to have sex with her. She valued her integrity and gave a ‘No’ for an answer. After this incident, she was unable to find work at all. They would not hire her because she practised her right to say no!
This is the sorry state in which most poor women in India find themselves. But this was not the end. She had to do something for her baby and her brothers. She was denied the right to choose and in the face of poverty, she said ‘Yes’. One day, a fortnight after she was unable to find a job, she told her friend that she would do whatever it takes to earn money. Her baby was really hungry and she thought – who was she saving up herself for? A husband who had ditched her? She plunged into sex work.
In the evening her friend brought the first customer and even lent her a room. But her friend, too, had to earn a living and they decided to split the money that she gets in half. The customer had offered 500 rupees. Thinking about her little daughter, she entered the room, only to find out that she was not yet prepared for what she was doing. She began to cry as the guy came nearer. Realising that she was afraid the customer asked whether it was her first time. When she said yes, he asked why she was doing it and the answer that she gave him moved him so much that he gave her an extra thousand and did not even touch her. He asked her to come again in a week. When she did he again gave her some money. This went on for some time.
After three months her parents came back. She wanted to quit, but when she heard people talking behind her back, she could bear it no more. She just wished that her parents would have come back earlier. Since she could not turn back the time, she took her daughter and went to live permanently in a red light area in Kolkata. This time when she met her customer, she offered herself willingly. This was the beginning of her profession.
Now after 10 years, people call her names and insult her in many ways because they think it is a scandalous profession. According to her it is just another kind of work that gives her a livelihood. And the one thing that keeps her going is the fact that her first customer still returns back to her and he is her Babu (Permanent Partner) and because of his help now her daughter is studying in a good school.
The story is that of a real commercial sex worker. Tanu di (named changed) is one of those millions of sex workers who struggle to find a space for themselves in the societal norms that denounce them because of their profession. Youth Ki Awaaz has taken a stand to present voices of these unheard sex workers. Do drop in your views below.
|
global_01_local_2_shard_00001658_processed.jsonl/6153
|
Smarter security, customized to meet the latest threats
The truly smart solution for both administrators and users
Security And You
Computer security is a subject of eternal debate. It seems to be an endless font of discussion, despite the veil of secrecy enshrouding so much about the topic. The consequences of hole-ridden computer security can sometimes be inconsequential... but they can also be catastrophic. It is as true today as ever that the most secure way to protect a computer from external attacks is to disconnect every wire and bury it under the ground; anything else is a compromise.
An unsecured computer can be compared to a house with open doors and windows, where anyone can enter at any time, take a look at what’s inside, and carry out anything they wish, or if they prefer make a mess instead. (Not to mention that the neighbors can look in through the windows at any time, and it can easily rain in through the windows.) For this reason, programs contain various sorts of security. If we go back to the comparison with a house: the architects quickly realized their error and gave the house windowshades and a door with a lock. Thus its basic security is taken care of. Yet it is still possible to work one’s way inside. Someone can manufacture a counterfeit key, can break the door down, or can trick the owner by pretending to be a utility company employee. Or they can take advantage of incaution by the owner’s children, or of the door being ajar for a moment. Another thing that sometimes happens is that the attacker takes advantage of properties or weaknesses of materials whose very existence is unknown to the owner. In short, 100% security cannot be achieved. However, the risk of an attack can be brought down to a very safe level. If you do not keep much cash at home, you do not need to pay a security firm to guard your house; investing in a safety lock is safety enough. Likewise there is no need to build a moat around a house unless you are expecting someone to drive a tank at it. Security is not a happy end that can be achieved once and for all; it is a constant process of perfecting one’s protection against possible, upcoming, and existing external threats.
A Secure Operating System
Now let’s get back to computers. The first entirely basic step towards safety is the use of new operating systems, which have standard security elements already incorporated inside of them. For this reason, no security expert can really recommend the use of Windows 95/98/ME or even Windows 2000 (for which Microsoft is dropping support). Next, the system must be kept updated, that is, one must have arranged for the periodic, automatic correction of any security problems that it may contain.
Windows Update - updates for Windows operating systems
Microsoft Update - updates for all Microsoft products
We recommend regularly backing up your data if you do not wish to lose it, either to a virus infiltration or to a hardware defect.
Firewalls are a basic security element in any network environment. An unsecured computer connected to a network, like a house with an open door, is an enticement for many undesirable snoopers. A typical firewall forbids all network services that you do not actually use; for the ones that you do, you allow them for individual programs, with any other programs having to request your explicit permission.
In the past, Windows operating systems had no firewall, and thus computers with them quickly became favorite targets of virus, worm, and trojan attacks from the moment they gained an Internet connection. Windows XP and higher have a firewall integrated into the system, so it is no longer necessary to install third-party software as it was in the past. (However, such programs still offer more options and convenience than the built-in Windows firewall.)
If a firewall is set up correctly, then the system ports that you really use (those for the Web, for e-mail, for FTP, etc.) will be enabled, and the unused ones will be blocked until you enable them yourself after having installed software that needs for that port to be open in order to communicate over a network. If a firewall is configured the way it should be, then it will block incoming communication on unused ports. Any hostile programs from elsewhere in the Internet jungle will have no chance of reaching a particular port, even if the program serving the port has a known security weakness.
Anti-virus Systems
These are practically a necessity in this day and age. We can essentially divide anti-virus products into desktop ones and server ones. Just about every user is familiar with desktop anti-virus products, with their attractive user interfaces, background scanners, resident shields, etc. This kind of anti-virus software handles situations where virus-infected information has arrived on a user’s computer, whether by post, on CD/DVD, by clicking on a Web link, or in some other way. As soon as something like that occurs, the program informs the user of the existence of the danger, and enables them to block access to the infected information, to delete it, or to otherwise deal with the problem. This kind of anti-virus software lets users have their whole computer scanned whenever they themselves wish it, or have automatic checks performed in real time on any information that gets accessed, so that no actual infection can occur. Recently, anti-virus programs have expanded their range of offered services and become integrated solutions that also contain a firewall and/or anti-spam and anti-spyware protection.
Although server anti-virus software does fill this role, it works a bit differently. Its purpose is not to improve users’ security after infected information has reached them. Instead, it tries to stop approaching dangers before they even reach users’ computers. Anti-virus solutions for mail servers are a good example here. All communication will go through the mail server before it reaches the recipient. If a virus is detected and deleted already on the server, then that prevents X thousand users from even having to come into contact with the infection. These anti-virus systems do not aim to offer a user maximum convenience and fully integrate themselves into an operating system. Instead, they aim to give maximum performance and the most reliable system possible, because numerous other network services that are under heavy loads are depending on them in order to stay as functional as possible.
To ensure that the anti-virus system can detect the latest infiltrations, you must keep in mind that it needs to be periodically updated. Having an out-of-date anti-virus program is about the same as having no anti-virus program at all.
Spyware is a category of dangerous code that sits around snooping in your computer and broadcasts information from it to third parties. Typically, this type of software lies on the border between legality and illegality> It is often an integral part of software, both paid and free, and thus often such code cannot be pried out of a computer without damaging said software’s functionality.
There are many anti-spyware solutions out there for dealing with such vermin. Some of them are free, others are not, and still others are parts of overall security packages. The most important thing, however, will still always be prevention: do not visit dangerous webpages while using (the relatively insecure) Internet Explorer in its default configuration, and periodically update your system. Here are some of the best-known free anti-spyware programs:
Spybot Search & Destroy
Spyware Terminator
Rootkits are a new affair for Windows systems, primarily due to the fact that this system was little widespread on web servers until recently. A rootkit is a hacking tool that can hide activities on a server that has already been broken into. If a hacker has access to your computer and wants to hang onto it for as long as possible, then they will certainly try to install a rootkit. Every time a request is made for a listing of files on disk or of running processes (programs), a rootkit will falsify the information delivered so that they do not betray the presence of both the rootkit itself and other dangerous programs installed.
These unpleasant programs are detected using specialized applications called anti-rootkit software. At present, such programs are generic, that is, they do not try to detect particular rootkits; instead, they analyze the whole computer as such and try to discover general discrepancies that might point to the presence of a rootkit, perhaps of a known type or perhaps unknown.
A good example of an anti-rootkit product is the Microsoft program Rootkit Revealer
Shield your Android
Current Virus Activity
Current Version
ZAV Core:
ZAV Database:
Zoner Antivirus
Zoner Sandbox
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.