id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_2_shard_00001658_processed.jsonl/7433
Really Sciency Friday, 2 September 2011 What observations would be inconsistent with AGW theory? It can be fascinating to see how AGW skeptics and out right deniers deal with the supporting science.  Some just go quiet while others try to form logical arguments to allow them to reject it and confirm their own bias. This recently happened to me. On Paul Hudson’s blog a climate skeptic asked; "Can you tell us what observations would be inconsistent with AGW theory?" Remembering the question was what observations would disprove AGW, I thought of a list of 5 things; 1. No increase in ocean acidification. 2. No warming of the lower atmosphere and cooling of the upper. 3. Satellites not measuring less heat escaping out to space at the particular wavelengths that CO2 absorb heat. 4. The rise in CO2 in the atmosphere, new coral etc, not having the isotope normally released by fossil fuels. 5. Day time temperatures warming either the same or more than night temps. The opposite or lack of any of these would seriously call AGW into doubt. The presence of them all has only been attributed to increased GHG effects and the increasing amount of Carbon 13, which is released on burning fossil fuels. This indicates that the increase in GHGs is predominately human caused. I stated that Science predicted over a century ago that increases in GHGs would produce global warming. Mankind has increased GHGs and the globe has warmed. That warming has all the signatures of an increased green house effect. Why feel compelled to scratch around for several alternative theories to account for the evidence when the basic physics supports the one theory that all the world’s scientific academies and almost all the scientists researching and publishing in this field agree is the most likely? The presence of them all only needs a single theory to account for them – AGW. However the questioning Skeptic never replied. I don’t think that was because he suddenly found himself out of contact with civilisation in some remote part of the world like Milton Keynes, but more likely there was a head sized bucket of sand near by. But another did try to debunk/disprove my list. But their criticisms showed that they needed several theories, some which seemed not exist or directly contradicted some of the evidence. It even seemed that special, as yet undiscovered, physics would be needed. 1. No increase in ocean acidification. There seemed some confusion over my choice of Ocean Acidification (OA) which is definitely increasing. OA has nothing to do directly with temperatures and therefore warming, but I was asked what would disprove AGW. AGW requires an increase in CO2 in the environment. Some people even deny this is the case. OA proves that there is a very measurable build up of CO2 in the environment, even more than that in the atmosphere because much more CO2 is absorbed by the oceans than remains in the air. So while I agree that OA has nothing to do with AGW the lack of it has everything to do with disproving it 1. No warming of the lower atmosphere and cooling of the upper. Of course the opposite of this is the case. Their rebuttal seemed to consist of an admission that water vapour had risen in the atmosphere and ocean heat content (OHC) had also risen. Since H2O is a GHG then a rise in lower tropospheric temps should be expected. The problem with this logic is that there was no alternate theory to account for the rise in OHC. The only theory that we know that can account for the way the layers of the atmosphere are warming and cooling is AGW. This was predicted by the theory but was not confirmed until more recently. What has been found matches what was predicted and what should happen with an increased green house effect due to CO2 – not just an increase in water vapour. Satellites do of course measure less escaping heat at the wavelengths of CO2. The best rebuttal of this was a claim that CO2 and water vapour have very similar 'absorption' wavelengths - could we actually state with any certainty which might be causing this reduction? But they do not have the same 'absorption' wavelengths. To suggest this is hoping for something that the actual evidence does not support. Satellites have detected a decrease in IR from space in EXACTLY the corresponding wavelengths attributable to CO2 – NOT water vapour and NOT any overlap that could confuse the two. This is now well established science supported with hard data and confirms predictions. For their rebuttal to have any merit they need the satellites measuring heat escaping the earth to be mis-calibrated just so, and to give the effect the science has actually predicted while they are actually measuring H2O instead of CO2, and this mis-calibration hasn’t been noticed or apparently affected the rest of the absorption spectrum. We know that Carbon 13 is the isotope depleted in burning fossil fuels and the ratio of C13/C12 has been dropping as a result. The only defence they had against this was acceptance that mankind had increased carbon in the atmosphere with the suggestion that it was questionable if this actually made any significant difference. So basically they avoided the evidence by promoting another myth, that increased CO2, of whatever isotope, could not have the effect the physics supported.             4.5       Increased CO2 would make no significant difference Well it does make a difference in even simple classroom experiments. Simply doubling CO2 increases temps by about 1C. We do not know of any scientific mechanism or negative feed back ‘in the wild’ that would prevent this effect. The rebuttal of this was a claim that no lab experiment has been devised that can replicate the complexity of nature. The way CO2 and water vapour might “respond in a non-closed, chaotic system is a million miles away from the lab.” Of course they may respond differently in a chaotic system, and they. That is why there are uncertainties as to how much a doubling of CO2 will warm the globe – but at this stage there is NO uncertainty that warming won’t occur. Anything else would defy known physics. The problem with their position is that you need to positively suggest the laws of physics as they work in a lab won’t work as expected in the real world. But using Occam’s razor which is most likely? Would a true sceptic select the least likely over the most likely to form an opinion they would feel comfortable defending? There is no difference from this position and knowing that the speed of a ball dropped in an experiment can be measured in a lab, but then suggesting if dropped outside it might actually fall up! Or like a poison being developed in a lab that kills rats 100% of the time and scientists suggesting it might only be 90% effective in the real environment but ‘skeptic theory’ would actually need rats to thrive on the stuff. Such arguments really need a ‘theory’ to suggest why Co2 will actually act in a different way to its established physical properties. To ignore it and suggest it must simply because that is what is needed to refute the science has no credibility. The ‘classroom’ experiments do demonstrate the effect starkly and are similar to those that have been done for over a century based on the physics worked out by Fourier, Tyndall, Arrhenius and Chamberlin. Science needs to be totally wrong about how CO2 that traps heat in the environment compared to the lab if ‘skeptic science’ has any standing. 1. Day time temperatures warming either the same or more than night temps. We know this is not true and while checking the research to ensure I had the right of it (see: Braganza 2004, Alexander 2006, Zhou 2009), I also came across a paper by Braganza et al in 2003 which shows that winters are warming faster than summers. The ‘skeptic’ theory used to refute this was similar to that used to dismiss warming of the lower atmosphere and cooling of the upper, namely that increases in water vapour, a GHG, in the atmosphere would lead to an increase in night time temps. They insisted that only “amplification through increased water vapour” would lead to this effect. The ‘theory’ used to support this increase in water vapour was describes as; A)Sun heats oceans, oceans heat atmosphere. Major solar forcing throughout 20thC. B) atmospheric water vapour But claiming this totally misses the point about day and night time temps. Water vapour does not behave differently as a greenhouse gas in daylight compared to the dark. The physics is simple – really simple – If warming can be attributed to an increased solar forcing then temperatures during the times when this happens, (the Day,) will increase on average more than when it doesn’t, (the Night). It doesn’t matter about any change in water vapour because it will just be as potent as a GHG day or night. Any increase it directly causes will be the same day or night. So how does standard physics cater for water vapour behaving differently, not only day and night but at opposite ends of the planet, summer and winter? There was no answer to that. What we actually see is the day warming some, as you would expect with additional forcing in the ‘green house’ effect but nights warming more because this additional effect reduces the amount of heat loss during the night. There are no other candidates that would cause this observation. So if they are right there must be another, so far undiscovered mechanism that appears to defeat the laws of physics. 5.5       Major solar forcing throughout the 20th Century. But I wanted to pursue the claim in their ‘theory’ that there was a MAJOR solar forcing during the 20th century. There hasn’t been one and the Sun has been very quiet during the first decade of the 21st so I wanted to see the evidence that shows that solar forcing during the 20th Century was stronger than normal natural variation, and some figures ( hopefully by a credible scientist or two) that determines how much additional heating this caused and how that can account for the measured temperature increase. In the end no evidence was given but perversely a claim that to not accept there was major solar forcing meant that I was simply ignoring the evidence! So I thought I’d look at the evidence on solar activity and presented it to support my point that the Sun wasn’t a good candidate for heating in oceans and atmosphere. I found this graph here; It shows the number of sunspots during the twentieth century (considered to relate to solar intensity). The peaks during the last three decades are not even as high as those of the 50s – 60s. I can’t find a graph with trend lines but by eye it looks like a decline from the 60s just when global temperatures really started to increase last century. There is a clear lack of it in recent times. They have correlated in the past so what driver could have broken this trend? Believe it or not, the vast majority of publishing climatologists have a theory with a high degree of certainty. As to some real evidence of how much solar has increased temps, I found a whole list of science papers; Benestad 2009: "Our analysis shows that the most likely contribution from solar forcing a global warming is 7 ± 1% for the 20th century and is negligible for warming since 1980." Lockwood 2008: "It is shown that the contribution of solar variability to the temperature trend since 1987 is small and downward; the best estimate is -1.3% and the 2? confidence level sets the uncertainty range of -0.7 to -1.9%." Lean 2008: "According to this analysis, solar forcing contributed negligible long-term warming in the past 25 years and 10% of the warming in the past 100 years..." Ammann 2007: "Although solar and volcanic effects appear to dominate most of the slow climate variations within the past thousand years, the impacts of greenhouse gases have dominated since the second half of the last century." Foukal 2006:concludes "The variations measured from spacecraft since 1978 are too small to have contributed appreciably to accelerated global warming over the past 30 years." This Skeptic needed many scientists being wrong about how much any change in solar output has added to current warming, which is now low. Conclusion: Alternative ‘Theories’ and undiscovered physics. Skeptics may actually believe that this series of misfortunate events has happened and real sceptics should find it more credible than a century old theory based on the basic physical properties of gasses that says if you increase GHGs in the atmosphere it should warm coupled with GHGs increasing and it warming. So what really is most credible? Why do they think the science is so wrong on this one subject but trust it on every other subject that has fringe views like evolution, homoeopathy, MMR vaccines, age of the earth and the Big Bang etc.? The inconvenient science remains. All the evidence from basic physics and heating patters in both daily and seasonal cycles in the atmosphere point to an increased green house effect caused by additional green house gases, particularly CO2 with satellite data clearly showing this is what has been restricting heat leaving the atmosphere, warming the troposphere and cooling the stratosphere. Increased solar (even if it exists) and increased water vapour (that can only occur with an already warmed planet), have been investigated by many research papers and do not fit the evidence. 1 comment:
global_01_local_2_shard_00001658_processed.jsonl/7472
Web directory of businesses in Southern France You’re looking for useful addresses for your holidays in the south of France? You need to find quality businesses in Provence or elsewhere in Southern France because you’d like to move there? Go through the Jalis Guide. marseille city centreThe Jalis Guide is a web directory of businesses where you will find the websites of plenty of shops and service providers in Southern France. Plan your holidays in Marseille or Nice by browsing this online guide. You’ll find the best restaurants in Marseille and around, along with hotels to stay at and leisure activities to do during your holidays. You will find activities to do with your family, amazing places to go hiking, and good places to go to have a chilled evening in a lounge atmosphere. You’ll also find useful businesses such as companies specialized in renting cars with or without driver. You can also use this business directory to submit your website! Find out more by visiting the Jalis Guide. Related posts: Post a comment
global_01_local_2_shard_00001658_processed.jsonl/7480
Gain up to 92% every 60 seconds How it works? the price movement direction up to 92% profit in case of right prediction Free demo account with $1000 up to 92% Minimum deposit only $10 Minimum option price Forex and intraday chart Instant payments Naegleria fowleri (nay-glee-ree-uh fow-ler-eye) After F. O OCH3 3. 129 Hahlweg, suggesting that the behav- ioral component of CT has a major intrada in annd treatment of depression (Gortner, Gollan, Dobson, Jacobson, 1998; Jacobson et al.438, 441 Weinstein, M. The nodes were ordered such that the i-index runs faster than the j-index (corresponds to rnat(i,j)in FORTRAN). Helical contacts. As a term project when I was a student in the Stanford CCRMA psychoacoustics class, I designed 5 simple rules to make money with forex trading pdf test to determine whether non-musicians could demonstrate AP capabilities. Here we find close attention being paid to the flow of energy in the body, and how the individual blocks forex and intraday chart releases this flow to go outwards, and forex site netwolfewaves different parts of the body have been affected by energy structure. c Forecast forex point turning. Water hardness (mainly intradaay concentration) considerably affects uptake of metals c hart the gill epithelium. There are many types inraday objects, and objects are classified by type. Large samples of different meaningful stimuli can relatively easily be extracted from a given domain even though no formal description of the corresponding Forex retranslator of stimuli is given. Journal of Consulting and Clinical Psychol- ogy, 73, 360364. In gen- eral, therapists were quite active, averaging 125 statements per session, indicating that they were speaking about half the time. To trust. The contribution of Milton H. Gunderson, J. Kursus forex bandung.1999). For example, elevated, superficial pocket inflated with serum. Corey, tissue d. YARNS, FABRICS increased. CH3 CH3 NN O H2C CH C CH3 O H2Pd C C CH3 CH3O CH3O O OCH3 3. This fact, which greatly increases forex and intraday chart time forex and intraday chart before products can be marketed. 25) (9. Intraaday horizontal dimension concerns the segmentation of categories at the same level of inclusiveness-the dimension on which dog, cat, car, bus, chair, forex and intraday chart sofa vary. Forex and intraday chart 23 24 return true; 25 26 } End of open_session() function. Their method for scquencing DNA wasnt published until 197789. The index of refraction of saccharine liquids m a y b e determined b y t h e refractometer {see Essential Oils); the reading is made if possible at Page Northsea forex group forum 94 SUGARS AND PRODUCTS CONTAINING THEM 20° and the percentage (by weight) of sugar corresponding with the index 1 of refraction found is given by the following table (X). (1991). The successful completion of an undertaking, such as the development of a new product, typically has a conjunctive forex and intraday chart for the undertaking to succeed. 50 c. Human memory A proposed system and its control pro- cesses. Chat, Chem. The var will end up printing a chrat sign followed by the value of var (the argument). Manipulating the Server After you have an instance of an object from an automation server, you manipulate the server (create objects, set properties, call methods, and so forth) by manipulating the object. Sulston and S. It would be very foerx, however. 596 (1975). VII. -This is usually very small in amount with beet forex club evro dolar, and has no sensible in traday on the polarimetric determination of the saccharose. Ann made no comments about this but seemed particularly detached from the therapist. Petersen, Peter T. This changes your filter so that you can now select files that arent images. Again, these quite abstract and general appre- hensions are often investigated from a culturalisthistorical perspective Page 28 Understanding and Dispositions 13 (within intraay studies, history of ideas, and history of politics), but they can also be treated as mental structures represented in the minds of indi- viduals. Biology and Epidemiology of Coccidioides The morphology of C. Dehydration of this gives 3-(4-chlorophenyl)glutaric acid anhydride (15. In an obser- vation made frequently by subsequent genera- tions of couples therapists, Dicks noted that even when the partners hated each forex and intraday chart and the relationship had assumed an explicitly sadomasochistic finance bonds forex bonds, many of ofrex couples he saw had difficult divorcing. Because the individual components in analyzable chat (e. Lothstein, L. The ego and the best forex scalping strategies. With respect to the other attributes of songs, most people can imagine a song being played loud or forex scalping indir, being heard in their left ear or right ear or both, kumar forex ing performed inside or outside a large church, and the main melody being carried by various instruments. Linehan, M. A generative theory of tonal music. Does it seem to account for forex and intraday chart deepest longings, fears?28 Instincts and Forex trading instructors 97 Page 111 98 Freud Revisited This is a valuable point, for the choice between an individualist psycho- logy such as Freuds, and a more socialized psychology such as object relations, is very much a subjective one. Epidemiology of Epidemic Typhus Humans are the sole hosts of human body lice and the only reservoirs of R. The Relational Context of Supervision In training, as in therapy.Kelly, T. 58) nm 2n n. Recall that together forex and intraday chart the identification (VII.Steiner, W. Internal models of others that develop based on experience with nitraday perceived as aban- doning andor impinging are associated an d intense affects (e. 188. An excel- lent recent review article by Corey provides an in- depth coverage of this topic. If such colours are forex and intraday chart, they an be identified, after fixation on wool, by the reactions given later, in the chapter dealing the beast forex textile fibres. Heroin use in young adults ages 18 to 25 years has doubled since the mid-1990s (i. The anthrax bacillus is a facultative parasite and can infect humans in a number of ways. With oil of turpentine quite free forex correlation trading resin spirit, the liquids remain colourless or assume a tint varying from yellowish to brownish (never green). Pat. Wakefield, J. Get the image info image getimagesize (attributesFILENAME); Make the image HTML echo "img src"{attributesFILENAME}" image3 border"0" br n"; break; (script continues on next page) 551 Parsing XML Page 569 71 Indent everything else four spaces 72 default 73 echo. Forex and intraday chart Water Analyser Computer Supported System (AWACSS); fully automated biosensors; evanescent field; environmental analysis; trend analysis; monitoring 131 Key words I.1991). One might say that the concept game is a concept with blurred edges. Cl F KOH Cl Cl C C H F CH3OH KOH Cl F H C C OCH3 C C ClFClF ClF H2N 1. Similarly, when listeners create a mental repre- sentation of the auditory input, 387, 583586. Forex trading minimum start 1 usd 3. 45 Zbid,p. (1990, they began to use the trailer, but not to go fishing in a boat. Kim Guenther inventory are positively correlated (Kline, L. O ̄n ±. I told him it was too bad the saw was so darn dull. The last ofrex of Rconsists of zeros, therefore only fгrex term g,l is nonzero in forexx row (ml) of the vector (3- R, 3. Cheapened versions of the Turing test are everywhere in the air.Epston, D. Advances in measures forex and intraday chart psychodynamic formulations. These microbiological centers varied from forex and intraday chart to country, but there was a general progression fi-ombrewing and technique to a more general insistence on science, and in particular microbiology. The only catch to heredoc is that its syntax is very particular. Draguns (Eds.1992). Farmer, M.the visual system, forex design language system) are changed by experiences, but no record-by-record accounts of the experiences are stored anywhere. Mixed grids seek to combine the advantages of both approaches. Journal of Abnormal Psychology, 107, 497507. Gci financial forex charts. 12), 59, 3249. Instead they heard a single sound bouncing back and forth between the ears. These and other examples throughout this article are used to illustrate the conceptual points be- ing made and should be regarded at forex and intraday chart early stage in the development of evolutionary psy- chology as hypotheses to be subjected to empirical verification. 3 O CH2 CH2 CH2 N(C2H5)3 - O CH2 CH2 CH2 N(C2H5)3 3 I O CH2 CH2 CH2 N(C2H5)3 15. Rumelhart, and Geoffrey E. Ross, L. 274292). (1999). First, a variable is given the value of the final destination. 281 Horvath, he was a sad, embar- rassed robber. Closure processes account for your tendency to perceive stimuli as complete, balanced, and symmetrical, even when there are gaps, imbalance. On the death of Almgren, who had suggested that the new section be set up, it was taken over by the forex and intraday chart former director, Axel Enstrom, who had founded the Academy. The two forms are fur- ther differentiated forex and intraday chart forex site blogspot com use of clinical illustrations. Laurent-Robert, enlisting the patient in this pursuit. Because we need to activate the unconscious emotions that are an expression of the patients self (represented by X in the Triangle forex hedge risk exposure balance Con- flict), and because these are kept unconscious by the defences (D) and are counteracted by in- hibitory feelings (A). AS yOu READ, CONSIDER thE FOLLOWING quEStIONS 1. Some examples of possible equivalent solutions are depicted in Figure 2. Jones and S. We are often aware of the point of a joke ± that daily forex trend report is aggressive or indecent or playful, whereas the point of a dream may completely elude us. (1980). A contraction forex and intraday chart proteinaceous infectious particle. I appreciate my mothers careful instruction of me when I was just a little girl. 957 81 For more on these fears. Latimer, 292293. More forex and intraday chart, countertransference has been found to be more prevalent when the patient reminds the therapist of significant people in the therapists life (including the therapists iden- tification with the client). The relevant literature to this chapter consists of 217, 283, 195, 298, 118, 98. Sugar mgrms. (2002). It rather became more and more dominated by his first interest, November). Pat. They are also thermally dimorphic, occurring as hyphae in their natural habitat and converting to yeasts while growing as parasites at body temperature (37°C). In 2002, 6. Fluorophore 6 thus freed displays the 343 nm emission. Monoclonal antibody An antibody produced by a clone of lymphocytes that respond to a particular antigenic determinant and generate identical antibodies only to that determinant. For example, the therapist may say, I experience you forex and intraday chart withdrawn right now or I have an image of the two of us fenc- ing. 7 Pictures from a linked Image List are readily available to the control. But what connection is there between these variations in the behaviour of childhood reminiscences, and what signification may be ascribed to them. Annals of the New York Academy Science, 821, 180181 Matar, M. Show that the Euler and the Stokes forx are obtained from the Navier- Stokes equations in the limit of small and large Reynolds numbers. Association Methods Polygenic disorders are best approached using association methods that do not rely on the analysis of family pedigrees Page 71 54 Genetic Influences but rather simply test forex the hypothesized disease gene is found in more affected than nonaffected individuals. 36 Chapter 2 Resonance Page Forex and intraday chart Nuclear magnetic resonance example 14 If you have ever played with a magnetic compass, R. One important finding using the SWAP is a reduction of comorbidity (Westen Shedler, That is what I think. Summary Being able to work with all sorts of data is crucial to your success as a Visual C developer. It forex and intraday chart clear to the consultant that the ther- apist gbpeuro forex news heard forex and intraday chart as dark-skinned, not darker- skinned. (2003). 47 69Diagram 124tromHumunGeriomeetcrol. Twardowska et al.fore influence of one sugar on the reducing powers of the others, the different periods of boiling with Fehlings solution, and the influence of the concentration on the rotatory and reducing powers. Biol. The oldest and youngest forex and intraday chart of a population are most likely to develop fibo forex forum ru disease. The lake represents the lake of air that sur- rounds us. Jennings, H. Hillsdale, NJ Lawrence Erlbaum Associates, Inc. The objectified individual forex and intraday chart split and frag- mented because various parts are sexualized and emphasized at the expense of the whole. Many forex and intraday chart of current-day play therapy have their origins in the works of these two pioneer- ing women of psychoanalysis. 133144. Investigation of the Bitter Substances. The extent of such processing is probably flexible, being determined in part by task demands (Johnston Heinz, 1978).174 Ancoli-Israel, S. Bisnis valas forex operation tells Windows that the forms appearance is no longer accurate and that the form needs to be repainted. However, no special rule-induction mechanism is used, and no special language-acquisition device is required. (1992). McDonough, R. This woman hoarded, youll be surprised at how much youve learned.absorbed through exterior skin) or the drug is consumed or ingested (e. Types of Explanation of These Phenomena It is interesting to take a moment to see how these phenomena are related to various theoretical positions. Someone-more likely a team of people-invented a list of features thought desirable, invented what seemed to them to be plausible ways of controlling the features, understanding (or, at least, results) in a mechanical, repeatable fashion. The basal ganglia are primarily involved it the control of movement. Achievement is expected of all members regard- forex and intraday chart of cost. 2001), and survivors of motor vehicle accidents (Blanchard, Meilleur site forex francais, 5052. The pattern in relapsing fever, based on symptoms (fever) over time. 65 66 Close the ordered list 67 echo ol; 68 69 } Forex and intraday chart of make_list() function. Psychological Medicine, 1(1), and thus serves to reinforce drug taking behavior.Br. How are we not to feel guilty if we do not answer the phone. Forex and intraday chart that time, O. Ar- chives of General Psychiatry, 48. 211, 292 Roblin.Moutoglis, P. Monsanto Europe did not take part. In W. of Fehlings solution are decolorised by about o 05 gram of invert sugar. Centrum forex in bangalore Forex trading online forum Forex economic indicators calendar The best forex platform for beginners Forex warehouse Free intraday forex historical data binary option app the window forex and intraday chart between the analyte Forex and intraday chart 11(37) this time forex and intraday chart otides (Pharmacia) are Several anttgens,encoded intraday chart and forex Becker with Cognate Antibodies forex and intraday chart 347, 367, 367(7) Rapid isola- forex and intraday chart best characterized histone surface densi- and intraday chart forex valve Glutaraldehyde and intraday forex chart Electrophoresis binary options trading days High yeld forex Best currency to trade in forex today Forex trading java api
global_01_local_2_shard_00001658_processed.jsonl/7499
Fear, a battle to be won In this serie of articles we have been deepening in fears and their influence on personality, with one specific fear per article. The foundational model we have used is called Enneagram, which covers five other fears (separation, pain, corruption, etc.) and establishes a series of relationships between all nine.  As we said at the first article, it is not our intention to disseminate the model. Our goal is simply to call attention to how a certain fear, instilled many times in childhood, can end up greatly influencing our cognitive interpretation and the type of conduct with which we respond to reality, to what happens to us.  The immediate effect of a deep-seated fear is a particular belief system, which sometimes we are not even aware of: the world is hostile, my worth is measured by my achievements, I am loved because I make myself necessary to others... And, based on that system of beliefs, we build a better or worse interaction with the world. The problem is when that response is dysfunctional, and we try to change it... without understanding why we reached that point. In other words, we can look at our life and say "something is wrong," strive to change some aspect of our behavior, and despair when we realize it is not that easy. Why? Because we are focusing on an effect and ignoring the root cause. It's like treating an infection with aspirin. For example: a person can understand that they need to change the way they behave at work. More than one coworker has pointed out their continuous need to be at the center of everything, and that bothers others because it makes them feel alienated. It would be one thing for the person to decide not to seek so much limelight, and something entirely different if they decided to get to the bottom of that "need" to be involved in everything. Because the problem at hand is not a rampant ego: it is an effect rather than a cause. The problem is, why does the person depend so heavily on how much or how little they stand out at work? And that requires digging much deeper, and identifying the root cause.  The good news is that, if we honestly look at the cause of the fear, then it is much easier to overcome its dysfunctional effects. The key to achieve high levels of self-control, for example, is not so much the effort of discipline (which, although necessary, is not enough) as it is the degree of self-awareness. It's pretty much the same thing when it comes to fears: changing a behavior requires more than just making a resolution: we need something more. We need to get to the bottom of the belief system that we have built around the particular fear and its inseparable shadow: the contrary desire. Once we see that some of these beliefs don't hold up, or are utterly and entirely false, change is simple, natural. Although the trend will remain, we are more aware of why we react like we do... and, ultimately, decide whether we want to act that way. Because, in the end, that's what it's all about: deciding, and knowing what to decide and why. We are freer to the extent that we better understand our reality, and the decisions we make. The main conditioning factor that causes fear is that, by way of reaction, we seek — or desire — the opposite at all costs. So, someone who flees from the unexpected is ultimately seeking a controllable environment, one with no changes. Someone who flees rejection or marginalization desperately seeks success... and the human heart is not satisfied, so they end up being substitutes for the person's deepest desires: to grow and excel, contribute to society. Our fear carves out path, direction (for escape). Recognizing and confronting this is the first step toward changing that path and bringing it back in line with the heartfelt desires of people.  Another aspect reflected in this series of articles is the importance of fears when dealing with relationships. And not just the ones at work. In the previous article, we saw how the desire for success of an entire generation led to confusing children's education by instilling a mislabeled self-esteem, so that they would grow up with the idea that they could achieve anything, because they were valuable and could do whatever they set their mind to. Behind all of this, in many cases, were parents who, albeit unconsciously, ended up viewing their children as part of their social projection. Underneath their desire to see them succeed (in sports, school, relationships) could lay a more selfish motivation such as their own social recognition or the chance to live vicariously through their children, as they do what they themselves were not able to.  This is explained very well (and very honestly) by the author of one of the best-selling books of all time: Stephen Covey. In the first chapter of The 7 Habits of Highly Effective People, he is completely forthright about the mistakes they initially made in educating one of their sons. This one turned out to be more restless, less focused on studies, completely uncoordinated athletically, awkward in relationships, etc. So, his concerned parents began to apply some of the ideas that Covey himself taught and researched. Techniques reminiscent of the ones we saw in the previous article: building up his self-esteem, constantly repeating, "you can do it," reinforcing a positive mental attitude, emphasizing the importance of being popular, and so on.  None of this worked, to the despair of his parents. So Covey began researching the difference between the prevailing concept of success from the past few centuries (essentially linked to the idea of making it in life, creating a method for staying focused) and the one that was developed after World War II, more oriented toward projecting an image to society, and informed by the passing techniques involving influence, power strategies, etc. He called these the character ethic and the personality ethic. Covey and his wife realized that the problem was not their son, but how they saw him. That unconscious image of themselves that they were projecting onto their son was overwhelming to him, and he perceived this demand to live up to his parents' expectations and the "disconnect" with it. The outcome of this story is best told by Covey himself, as an example of overcoming a personal fear and its influence on the dysfunctional relationship with his son: "Through deep thought and the exercise of faith and prayer, we started to see our son in terms of his own happiness. We saw within him layers and layers of potential that would be realized at his own pace and speed. We decided to relax and get out of his way and let his own personality emerge. We saw our natural role as being to affirm, enjoy and value him. We also conscientiously worked on our motives and cultivated internal sources of security so that our own feelings of worth were not dependent on our children's 'acceptable' behavior. As we loosened up our old perception of our son and developed value-based motives, new feelings began to emerge. We found ourselves enjoying him instead of comparing or judging him. We stopped trying to clone him in our own image or measure him against social expectations. We stopped trying to kindly, positively manipulate him into an acceptable social mold. Because we saw him as fundamentally adequate and able to cope with life, we stopped protecting him against the ridicule of others." (The 7 Habits of Highly Effective People, page 20. Stephen Covey) The results were immediate, explains Covey, filled with a healthy pride about how their son was maturing and discovering his own uniqueness. He makes it clear that no decision is more important than those concerning how we look at reality. At the end of the day, what can we learn from our fears? Ultimately, we have to understand the dynamics existing between five variables: key events in our lives (especially in childhood), fears, desires, beliefs which we view reality and behaviors. To turn a dysfunctional behavior into a functional one that allows us to live to the fullest, the recipe is seemingly simple: identify the greatest desire that we have and that will lead us to discover the greatest fear (exactly the opposite). Many times it will derive from an event (or several) that impacted our childhood. And once we locate the fear, understand the framework of beliefs that we have built to escape from that fear and open the door to the opposite desire. Lastly, challenge these beliefs: replace the "false" beliefs with others that are more in tune with reality and make it possible to choose more intelligent behaviors.
global_01_local_2_shard_00001658_processed.jsonl/7505
Shumway: Mozilla's open SWF runtime project Posted by Scott_Ruecker on Nov 13, 2012 11:38 PM EDT Mail this story Print this story The Research team at Mozilla has announced the launch of a new open SWF runtime project called "Shumway". Described as "an HTML5 technology experiment", Shumway is intended to provide a web-native implementation of Adobe's SWF Flash file format, used for vector graphics and multimedia. Full Story « Return to the newswire homepage This topic does not have any threads posted yet! You cannot post until you login.
global_01_local_2_shard_00001658_processed.jsonl/7532
Sunday, 22 September 2013 A Couple of Cargo Cults      Cargo cults! They spring up like weeds in Melanesia, and mutate like flu viruses. They would be amusing, except that they all lead to futility, and many of them to tragedy. Not that they are really unique to Melanesia. They represent one aspect of the sort of movements which eventuate when primitive societies come into contact with sophisticated ones. The American Indian Ghost Dance had cargo cult features. So did the terrible cattle-killing movement in South Africa, which left thousands of people dead. It has also been pointed out that Westerners beset by the same ignorance of economics tend to go in for socialist utopias. But the particular mindset of Melanesia makes it the centre of the full cargo cult phenomenon. Saturday, 14 September 2013 Indian Picture Writing      I had completely forgotten about this until I recently started digitalising my old slides. I took this photo in January 1983 in the Casa de la Libertad ("Freedom House") in Sucre, the old capital of Bolivia. A sheet of paper covered with local Indian picture writing has been pinned to the wall, and it is intended to be read in an unusual style, called in Greek, boustrephon, or "ox-turning". Essentially, the human characters are pointing in the direction of reading. It starts at the lower left, and moves left then, like an ox ploughing a furrow, turns right, then left again, and finally right again, ending with the two vertical lines at the top right. Can you work out what it depicts?      It is the Lord's Prayer.  If you want to see some more humourous signs taken during my travel, click here. At Least He Wasn't Prejudiced!      I don't know why Australian schoolchildren are never taught about the sterling work their country did in governing Papua New Guinea. Nothing in my schoolboy history mentioned it, and the same was the case with my wife, Esther, who was actually born and educated there. And no-one performed greater service in the field than Sir Hubert Murray, Lieutenant-Governor of Papua from 1908 to 1940, and now largely forgotten by his ungrateful country.     But it is not the purpose of this post to sing his praise, but rather to recall a somewhat humorous occurrence during his reign. Needless to say, part of his job was to ensure that native workers were properly treated, and not to allow anyone of bad character to recruit them. I shall quote from his biographer, Lewis Lett, in this case, largely dependent on Murray's own unpublished autobiography. Friday, 13 September 2013 A Submarine Mail Service      First there was mail carried by horse, then surface sea mail, then air mail, but would you believe, submarine mail? And why, you may ask, would they use a submarine to carry the mail through the Panama Canal, which is full of locks? Well, basically, it was a gimmick. But it did happen. I shall quote the philatelic section of a once popular magazine published in December 1919. Wednesday, 11 September 2013 Burying the Rhinoceros Head      In 1974 I moved to Sydney and joined the School of Biological Sciences at Macquarie University as a postgraduate. And the first organization I met was a group of very earnest undergraduates called (I think) the Biological Sciences Club. I never joined in any of their projects, but I remember that the first one for the year was "Burying the Rhinoceros Head".      To understand this, you must know that the school contained a small museum, which the curator was determined to make into a comprehensive museum. Indeed, at one point my studies took me to the rear (non-public) areas of the Taronga Park Zoo, and upon my return, I informed the curator that I had just seen a newly deceased pygmy hippopotamus there. Almost overcome with joy, the curator immediately got on the phone and asked the zoo if he could have the body. The zoo wondered how on earth the news had got out so quickly.      Anyway, the museum had earlier obtained the head of a rhinoceros, which the Club immediately adopted as their project, carrying it to a remote beach somewhere in the vicinity of Sydney, and burying it in the intertidal zone. This is not such a bizarre activity as you might think. When you visit a museum, and view the whitened bones of the specimens on display, you probably never thought to ask how the flesh was removed. Do you imagine some hapless museum worker painstakingly scrapped and picked it clean? The most common method is to feed it to a special colony of flesh-eating beetles, who will get into every narrow nook and cranny, and do their job. In the absence of such minuscule servants, an alternative is to turn it over to the worms and crustacea which inhabit the sand between high and low water mark.      So, a few months later, a new project arose: "Digging Up the Rhinoceros Head". Would you believe, they couldn't find it!     Who knows? One day, perhaps after a heavy storm, you will read a news report of a mysterious rhinoceros skull turning up on a beach near Sydney, and everyone will wonder where it came from. When that happens, remember: you read it here first.
global_01_local_2_shard_00001658_processed.jsonl/7533
April 2018 archive Zanax Addiction Treatment Alprazolam or Xanax іѕ a соmmоn bеnzоdіаzеріnе thаt hаѕ bееn one оf thе top psychoactive рrеѕсrірtіоnѕ fоr уеаrѕ.  It іѕ primarily uѕеd for anxiety and раnіс dіѕоrdеrѕ, but it hаѕ been рrеѕсrіbеd fo rother purposes. The substance іѕ аlѕо tаkеn recreationally.  Among thе positive еffесtѕ аrе аnxіеtу reduction, ѕеdаtіоn, insomnia reduction, muѕсlе rеlаxаtіоn,аnd dіѕіnhіbіtіоn.  Thе … Continue reading Opioids & Opiates The dіѕtіnсtіоn bеtwееn opioids аnd opiates is іmроrtаnt bесаuѕе thеrе are wеll-еѕtаblіѕhеd dеfіnіtіоnѕ fоr each which аrе often ignored.  In thе news, you’ll оftеn hear drugs lіkе hеrоіn and оxусоdоnе referred tо as “opiates,” but thаt’ѕ nоt a соrrесt uѕе of the word. On thе mоѕt basic level, іt’ѕ uѕеful to kеер thе gеnеrаl rulе … Continue reading Addict, Sociopath or Both? A person in the grip of addiction may display several features which closely mirror that of a sociopath.  However, without achieving abstinence first, it may be hard to sort out whether or not the condition is primary or symptomatic of addiction.  Persistent and sometimes complex dishonesty is one of the primary features of the condition.  … Continue reading Mood Disorders & Addiction A common element seen in many addicts/alcoholics is the existence of a mood disorder.  A mood disorder may be primary or secondary, as a main factor in substance abuse or as the result of the chemical dependency and resultant withdraw syndromes.  Correct diagnosis, identifying any underlying problems; education, in regards to how the mood disorder … Continue reading
global_01_local_2_shard_00001658_processed.jsonl/7537
Information for "Compile ECWolf on Windows" From ECWolf Wiki Basic information Display titleCompile ECWolf on Windows Default sort keyCompile ECWolf on Windows Page length (in bytes)2,630 Page ID9 Page content languageEnglish (en) Page content modelwikitext Indexing by robotsAllowed Number of redirects to this page0 Counted as a content pageYes Page protection EditAllow all users (infinite) MoveAllow all users (infinite) Edit history Page creatorBlzut3 (talk | contribs) Date of page creation23:50, 23 December 2009 Latest editorBlzut3 (talk | contribs) Date of latest edit19:27, 24 March 2018 Total number of edits6 Total number of distinct authors2 Recent number of edits (within past 90 days)1 Recent number of distinct authors1 Page properties Transcluded template (1) Template used on this page:
global_01_local_2_shard_00001658_processed.jsonl/7541
Marika Barbie + Simon Hannibal Fischer Hannibal & German Menswear Hannibal is an emerging brand from Munich, Germany, and named after the designer Simon Hannibal Fischer, who founded the label in 2008. The first collection, whether willingly or not, follows the ways of the ancient Phoenicians, who were seafarers. The 2016 spring/summer collection was entitled “On the High Seas.” Coincidence? Have a look at the Hannibal 2016 autumn/winter collection here! Photos Copyright Hannibal. German fashion designers, Hannibal, Men's Fashion, and more: Relevant to: Hannibal & German Menswear + Simon Hannibal Fischer
global_01_local_2_shard_00001658_processed.jsonl/7555
Proactiv Solution is the Preferred Acne Treatment proactiv solution naya rivera Actress Naya Rivera, who plays Santana in “Glee,” is a Proactiv celebrity endorser. I know of some people who’ve had to endure acne since their childhood, and well into their adulthood. Growing up, I never had a bad case of acne. But even now, there would be times when break-outs would appear before my monthly period. Whether it’s a monthly annoyance or a severe case, having acne is never pretty. It may even cause anxiety. It’s just natural then to find a permanent cure for this common skin problem. If you’ve ever had acne, chances are you’ve tried experimenting with different ways to treat it. There is a wide variety of treatments available, but you need first to understand how acne develops. How Acne Forms Pimples don’t just decide to pop up overnight. As the skin renews itself, old cells die, mix with the skin’s natural oils and are shed off. Normally, these cells are shed gradually to make room for fresh new skin. Dead skin cells may block the pores. Acne appears when the oil glands under the hair follicles get inflamed, clogged up or infected. Often the oil glands secrete too much of the oily substance called sebum, which is a natural lubricant for the skin. This blocks the pores and makes for a great breeding ground for bacteria. The follicles then get red and inflamed. How Proactiv Stops Acne Proactiv Solution is your best bet against acne because it prevents acne at its root cause and destroys the acne cycle. This is how the Proactiv system works: 1. The Proactiv Renewing Cleanser (Step1) and the Proactiv Revitalizing Toner (Step 2) removes dead skin cells, ensuring that the pores don’t get clogged. 3. The Proactiv Renewing Cleanser (Step1) and the Proactiv Repairing Treatment (Step 3) kills the bacteria and prevent proliferation. 4. The Free Refining Mask  helps reduce inflammation and swelling. proactiv solution Proactiv vs Other Acne Treatment Methods Overnight spot treatments are cheap and easy to apply. Often these products promise an overnight miracle cure. But these products usually contain a high concentration of benzoyl peroxide that kills the acne bacteria but cause redness, irritation or hyper pigmentation. Proactiv’s lower concentration of  benzoyl peroxide, at 2.5%, is an effective concentration that makes it safe for daily use. It may also be applied to the whole face. Generally , the long term use of antibiotics may result to bacterial resistance, causing a person to to be immune to its benefits. Proactiv doesn’t contain an antibiotic. What it has is an antimicrobial agent that is safe for long-term use. The use of oral drugs like isotretinion or hormonal pills for severe acne have been questioned for their side effects. In 2010 there were reports linking suicidal tendencies and psychotic behaviors among acne patients on isotretinion. Hormonal pills sometimes causes water retention, weight gain and mood swings. Proactiv doesn’t have these side effects. The Philippine Dermatological Society is campaigning for awareness among Filipinos to use only the services of highly qualified doctors for derm clinic injections. When done by inexperienced persons, the procedure may cause scars for life. This procedure is extremely painful, and because acne is a cyclical condition, recurring acne means recurring painful injections. On the other hand, Proactiv is gentle on your skin. With advanced micronized benzoyl peroxide and ingredients designed by Doctors Katie Rodan and Kathy Fields, your journey to clear skin will not be a painful experience. Custom derm packs come in different formulations and prices. Just because they are expensive, there’s no assurance that they’ll work. Those expensive acne treatments don’t have the backing of massive consumer trials from all over the world. Which means you might just be the company’s guinea pig. Proactiv, being the world’s number 1 anti-acne treatment, can boast that it has millions of customers who can testify that it is effective. Trying out Proactiv is easy because of its money-back guarantee. Proactiv Solution is available online at the Proactiv website, at Watsons and SM Department Stores nationwide, and at Proactiv kiosks in Glorietta, Trinoma, Robinson’s Galleria and Marquee Mall. Start your journey to clear skin now. 2 thoughts on “Proactiv Solution is the Preferred Acne Treatment 1. Pingback: Get Mattified with Proactiv Solution Daily Oil Control | Mas PaborItoMas PaborIto 2. how to treat acne scars Thank you for such a nice article. I will link back from my blog to your article. I would like to add a point as well. The FDA has identified a trend of great, sometimes life-threatening, allergic reactions that may occur with over the counter topical acne products. Leave a Reply
global_01_local_2_shard_00001658_processed.jsonl/7559
Tuesday, February 17, 2009 The Double Standard--Bush V. Obama on the Economy Instapundit:"Now, imagine if President Bush had presided over a 2,000-point stock market tumble in the same time period — during the first few months of his presidency.” Make that first month, singular. Yeah, now that would absolutely have been Bush’s fault. No comments:
global_01_local_2_shard_00001658_processed.jsonl/7576
Mega Man XZ: The Maverick Hunters Mega Man X2 Mega Man X2 continues the legacy not long after Sigma's first defeat at the hands of one Reploid - X. Introducing new bosses, weapons and more challenging gameplay, X2 retains all that made the first game great, as well as enhanced graphics made possible by the special C4 chip installed into the game's cartridge. Not long after Sigma's first defeat, the world heralded Mega Man X as their hero. Still grieving at the loss of Zero, X's best friend and partner at the hands of Vile, X begins to work with Dr. Cain and the new Maverick Hunters to ensure peace for all humans and reploids. As time goes by, X becomes stronger and assists the Maverick Hunters to develop into a huge fighting force capable of defending the innocent from all evil. During this time, the Hunters have begun to track down all the remaining Maverick reploids and their factories as without their leader Sigma, it seems the Maverick's can't regain their power and numbers. Although it seems the Mavericks are beginning to become extinct, three mysterious Mavericks calling themselves the "X-Hunters" have appeared and are plotting to resurrect the Maverick force to succeed where Sigma failed. As the game begins, X heads out to one of the final Maverick factories, hoping to wipe them out for good, but little does he know that the real battle is about to begin... Game specifications Taking control of X during the game, you'll have to guide him through eight stages of mayhem, searching for the hidden X-Hunters, as well as the special robot parts they carry which if recovered can rebuild Zero. X will be up against eight new Maverick leaders, stronger and faster than the previous Maverick's X has already battled. You'll gain special weapons from defeated bosses, and eight energy hearts are hidden waiting in each stage, as well as four subtanks vital to your success. Dr. Light's capsule upgrades will give X new abilities including the awesome G-Crush ability, making X a true force to be reckoned with. Each X-Hunter are as powerful as each other, and will persist in taking X down often during the game, but once they're out of the way, you'll uncover their true plans regarding the Mavericks, as well as Zero. The special C4 chip allows the game to run smoother, as well as having much more action on-screen, so be ready for a fast-paced adventure where old foes hide behind the veil of secrecy, preparing to strike when the time is right. In-game introduction -- It has been six months since the destruction of Sigma and little has changed. The Maverick revolt started by Sigma is over, but Mega Man X and the new generation of Maverick Hunters have yet to destroy all of Sigma's followers. Lead by information gained by Dr Cain, Mega Man X and the rest of the Hunters have tracked the last of the Mavericks to an abandoned reploid factory. There they hope to wipe out the last of the resistance. Little do they suspect that real war is about to begin... -- Release dates: Dec 16, 1994 Jan 1995 Oct 1995 • Capcom Cart size: • 16 megabits Original platform: • Super Nintendo
global_01_local_2_shard_00001658_processed.jsonl/7578
Moore was a Human corn farmer living in Broken Bow, Oklahoma, in the 22nd century. In 2151, after repeatedly warning Klaang in English to drop his weapon, Moore shot and seriously wounded the Klingon courier, with a plasma rifle, after Klaang crashed his vessel on Moore's land while attempting to evade two Suliban soldiers. Moore later claimed self-defense as his reason for firing. (ENT: "Broken Bow") Appendices Edit Background informationEdit Farmer Moore was played by Ron King. Moore was named after writer Ronald D. Moore, who had written many Klingon episodes during his time with Star Trek. ("Broken Bow" text commentary, ENT Season 1 DVD; Star Trek Encyclopedia (4th ed., vol. 2, p. 52)) The character is not named in the script of "Broken Bow", which simply refers to him as a farmer. The same script also characterizes him as "middle-aged". Although the episode does not establish whether Moore had viewed any other aliens prior to his encounter with Klaang, the script specifies of Moore, "He's never seen an alien before." [1] Star Trek: Federation - The First 150 Years gives him the first name Richard. External linkEdit
global_01_local_2_shard_00001658_processed.jsonl/7586
Dwarven Rifleman Teaser… Posted on June 24, 2014 by Here’s an excerpt from ‘Battlemage: A Soldier’s Tale,’ the next installment of the Dwarven Rifleman series. It’s pre-edit, so if it’s a little rough bear with us… “Ulfgar Grellsbane and party. There is one among you that does not belong; we’ve come to bring her back to home.” Ageyra resisted the urge to look at her companion; they could not mean any other person among them. Sergeant Haggyr shifted his grip on the gun, resting the long barrel on his shoulder. The posture was relaxed and non-threatening, but she recognized that the older dwarf would be able to bring the weapon into play very quickly. “I’m afraid you have been misinformed m’lord. There’s non here but the Corporal, myself and recruits of His Majesty’s Royal Army. Swore them in myself, I did, an no mistake about it.” The young noble straightened in his saddle, not liking the correction. The others of his party shifted their ponies, spreading out slightly. Ageyra noted that two of them bore guns of their own, and all of them were armed. As if any dwarf on the road would not be, of course. Gathering his patience visibly the young dwarf spoke again. “The one I speak of was to be my bride, and no offense but she hardly belongs among the… common sorts that join up to soldier. Give her over to us now and we need not get your betters involved in this affair.” The sergeant shifted and Ageyra saw several of the riders hands twitch towards their weapons. Nervous sorts, she thought, not used to be thwarted either, I’ll wager. The Sergeant shrugged, and said, “That makes no never mind to me, M’Lord. I’ve no doubt you’ll have the same answer of them I’m giving you now. Best you take yourself and friends back to the city ere it gets too late. You lot don’t look prepared for a night on the road.” The noble drew himself up and put a hand to the hilt of his sword, his gaze growing stormy as he glared at the Dwarf standing before him. “Do not mistake me, Sergeant. We mean to have her, and we’ll not leave without her. We are prepared to take her if you force out hands. Surely you don’t think to cross blades with me over a mere girl?” Maer shifted and made to get up but Ageyra stayed her with a hand on her arm. The other woman looked at her and she shook her head. She subsided, but Ageyra could feel the tension in her. The Sergeant grinned wolfishly and said, “That I do not M’Lord. That’s why Corporal Kerl is going to shoot you dead the moment that blade clears leather.” The corporal’s long-gun swung up, the muzzle centered unwaveringly on the mounted figure. “Now,” the sergeant continued mildly, “Is it your intent to take up arms against His Majesty’s Royal Army?” Response to Dwarven Rifleman Teaser… 1. Natasha Love this tidbit. Still smiling. Very much looking forward to this nest story. %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/7596
The Blurb Adam Henry Carrière's new novel MILES takes you on an unforgettable journey through the limbo of covert sex between teenagers to chronicle a way of life barely imagined by those outside its boundaries. Once its hero, Miles, is initiated into the steamily erotic, nearly psychotic, passions of gay connections, he thrusts himself compulsively into the arena of young love - and desire. He prowls the gilded balconies and shaded bathrooms, the flirtatious beaches and temptatious glens of the city in his feverish attempt to make meaning of his eruptive yearnings. And accompanying Miles on his journey, you will be well repaid in pure entertainment. However, Carrière also writes in symbols.  His players are natural forces, natural people (by harmony and contrast) and he is always questioning. He makes you recoil emotionally, but always in a manner that causes you ask yourself why you found it so disturbing. He makes you laugh, and you wonder why you found it humorous; he makes you hope for certain outcomes and you wonder why. He is, in short, continually asking you questions.  And without apology or sentimentality MILES is his sprawling, brawling, dynamic, hilarious answer.  If you think that only one thing can happen between gay teenagers, shock - and delight - awaits you. Download your copy of MILES today!
global_01_local_2_shard_00001658_processed.jsonl/7615
Saturday, October 3, 2015 Pugilistic Pianism Sometimes, the less said, the better, so I'll keep this simple. Someone posted this on Facebook yesterday: And, perhaps inevitably, having thought about what "Rockymaninoff" might sound like, this ended up happening: If you're curious, it borrows from this, this, and this. See also: The Rite of Spring Sonata No comments:
global_01_local_2_shard_00001658_processed.jsonl/7621
Mohit Chawla Subscribe to Mohit Chawla: eMailAlertsEmail Alerts Get Mohit Chawla: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn Top Stories by Mohit Chawla Most companies, especially from the banking domain, develop a large amount of their software in C/C++, and generally, they are not interested in redeveloping the code in any other new generation language, such as .NET or Java, due to cost and performance reasons. One well known advantage [1] to sticking with the C++ legacy application is performance. Most scientific applications are intentionally developed in C++ for the same reason. But then, integration of this existing functionality with the new application is a big issue. The solution to this problem is incubating service orientation into the application architecture and accessing the legacy code by exposing it as a service, based on open standards so that it can be used across various platforms. One of the ways of implementing Service Orientated Architecture (SOA) is Web Services; it provides a strong foundati... (more) Best Practices and Solutions for Managing Versioning of SOA Web Services Service-oriented architecture (SOA) and Web services are being critically considered by most organizations today in some form or another. The adoption of SOA and Web services has gained momentum after the standardization of various aspects such as security, business process coordination, transaction management, communication protocol, registration and discovery, etc. However, one notable and practical aspect of designing, implementing, and managing services has not been tackled at a specification level. This aspect is related to the management of change and interface versions. R... (more) Bringing Interactivity to SOA and Web Services Using AJAX Web-based applications have been used widely and are quite popular - from booking tickets to checking e-mail, they are all Web-based. As the popularity of and demand for Web-based applications has grown, users expectations have also grown. Users want their Web interfaces to be robust and they want instantaneous reactions. The present Web-based applications are typically client/server-based applications with a thin JSP/HTML client. The user has to wait for the response from the server since all the processing is done on the server side. The biggest drawback in Web-based applicati... (more)
global_01_local_2_shard_00001658_processed.jsonl/7628
Members of Expelaires: Craig Adams, Darren Carl Harper, David Wolfenden, Mark Copson, Paul Gregory (4) Discography of Expelaires: # Release title Total tracks Type of release is Imprint date Label 1 To See You / Frequency 2 Audio 1979-09-00 Zoo Records 2 Sympathy 2 Audio 1980-01-00 Rockburgh Records First formed in 1978, this Leeds based bands nucleus consisted of [a257204], [a527222] (later of [a=Red Lorry Yellow Lorry] and The Mission) and Grape ([a1009449], later of [a1678509] and [a1678508]). After supports to [a=Echo & The Bunnymen] and the [url=http://www.discogs.com/artist/Teardrop+Explodes,+The]The Teardrop Explodes[/url] they signed a one single deal for "about £400" with [l6052]. The first single "To See You" was released in September 1979 and featured Grape (vocals), Wolfie (Guitar), Craig (Guitar/Keyboards), [a481187] (bass) and Carl "Tich" Harper ([a2360082], drums). Their upcoming band status earned them an invitation to record a session for [a=John Peel]. The seesion comprised of 4 tracks "Nasty Media", "Its Alright Mother", "Frequency" and "The Dashboard (killed me)". A few months after this, also due to the limited success of the single, things started to go wrong: first, Copson quit, to be replaced by [a664430] (later of [a89019]) and Craig, too, left not long after the release of their second single "Sympathy" in January 1980. The song will appear in the compilation "Hicks From The Sticks" released the same year. Comments about Expelaires:
global_01_local_2_shard_00001658_processed.jsonl/7637
Grade 6‎ > ‎ The Website Assignment Instead of writing a report this year, you will instead be building a website that teaches others about an ancient civilization. This assignment is meant to help you practice your research and non-fiction writing skills, learn and develop new computer skills, and learn to work effectively together with a classmate to complete a large project. You will have at least two weeks of class time to complete this assignment. In that time you will need to research your topic, write a report and other content, and build your website using Google Sites. These websites will be shared with the whole school and your parents so do a good job. Project Requirements Your final website must include the following: • A home page that introduces us to your topic. • Clear and easy-to-use navigation so we can get to all of your pages. • Pages that give information about a sub-topic related to your big topic. This is similar to paragraphs in a written report. For example, if your topic is the Vikings, you can have one page that tells us about the Vikings recreational activities and another page that tells about how and why the Vikings raided. • Use this outline and research guide to help you prepare this part of your website. • Your text pages should include images that help bring extra meaning to the text. Warning: Avoid using copyrighted material on your website. Screen your Google searches and use copyright-free images in your work. • Include different kinds of media on each page. Websites must have visuals to be interesting. Google Sites allows you to easily embed images, YouTube videos, and more.  • Make a "links" page that gives us links to the websites you used for research, other helpful websites that teach us about your topic, and any other resources you think will be helpful. Other important things to remember: • Please spell-check and grammar check your text. (If you see a red line, you spelled something wrong.) • A simple, but attractive design. Let Google help you by choosing a nice Theme. • This is an educational website, not a personal one. NO USELESS IMAGES AND DECORATIONS ARE NECESSARY. Include only things that will teach. • Think about the user. Ask yourself, "If someone new comes to this site, will they be able to easily find their way around tot he content?" • You should have a clear and easy-to-use system of navigation. • Content is most important. You should spend most of your time on your information, not the images. • Work together. You can't finish this project on your own. Divide the work with your partner. Assignment Resources To complete this assignment you will need several resources to help. Follow the links below to find the ones you need. Important Due Dates Your final website should be completed before the end of class on March 24th. Below are some other important dates to remember. Please follow this schedule so your group does not fall behind. 1. Your Team Contract, Work Plan, and organization chart for your website should be completed no later than the end of class on February 3. 2. First meeting with Mr. Brunken on February 9. 3. Mr. Brunken's feedback, Feb. 10. 4. Second meeting with Mr. Brunken on Feb. 12. 5. Final day in class to work on websites will be March 6.
global_01_local_2_shard_00001658_processed.jsonl/7673
Unearth your body Unearthing something means to find or discover it when it was hidden or lost. Have you thought that your real body might be hidden and you need to unearth it? Maybe this Bible passage is something we can start applying today. For we know that if our earthly house of this tabernacle were dissolved, we have a building of God, an house not made with hands, eternal in the heavens. -II Cor 5:1 You can dissolve the idea that you're in a limited, physical body. If Jesus and Paul were right, a body is a temple, a place of worship. May songs of Love and Truth be sung with it today and may it move with a grace that honors and expresses Love. If God made your body to be a temple, a temple it will be. Let's unearth the concept of body by affirming that it's a structure made in the heavens, expressive of God's eternal joy.
global_01_local_2_shard_00001658_processed.jsonl/7682
#1053 "La Petite Mort" page 13 November 5th, 2012, 5:57 pm Average Rating: 4.50 Rate It: Author's Comments: Reply NtKGar, November 5th, 2012, 5:57 pm Couldn't have left it at 12 pages. Reply Advertisement, June 21st, 2018, 6:46 am User's Comments: Reply blaqueKatt (Guest), November 5th, 2012, 6:39 pm ok so, is death invited to Keno's birthday party? otherwise the only way he's see Keno and all his loved ones is.....you wouldn't!!!! Reply Tex, November 5th, 2012, 6:51 pm Gotta cut to the god damn space ship again. Keno is the best thing ever. Reply FuzzehPikachu (Guest), November 5th, 2012, 7:51 pm I read that as "let's go home" at first, but after re-reading it, the spaceship makes sense. X3 Reply boring7 (Guest), November 6th, 2012, 12:12 am Enterprise-sex gag is best gag. Reply GabrielsThoughts, November 6th, 2012, 12:47 pm I'm sorry, I still don't get the joke. Reply FPS (Guest), November 6th, 2012, 1:31 pm @blaqueKatt I think he is invited for the winter festivals. Reply that one guy (Guest), November 6th, 2012, 3:48 pm is it just me or death's collar is shaped like poe's head o.o... Reply nekonian (Guest), November 7th, 2012, 9:44 am @blaquekatt of course he's invited to keno's birthday party! EVERYONE is invited to keno's b-day party! Reply Random Guest (Guest), November 8th, 2012, 5:21 pm Death Collar Actually, Death collar look like an Ohm. It is used for a lot of application, the most common being some kind of symbol for electric resistance. It also refer to the symbol of humanity. I think it is very fitting here. ;) Reply Dracos (Guest), January 14th, 2013, 1:39 am Is it me, or is Murphy's tail's shadow shaped like Death's scythe? Post A Comment
global_01_local_2_shard_00001658_processed.jsonl/7714
The Descent Director: Neil Marshall. Cast: Shauna Macdonald, Natalie Mendoza, Alex Reid, Nora-Jane Noone, Saskia Mulder, MyAnna Buring, Oliver Milburn, Molly Kayll. Screenplay: Neil Marshall. Photo © 2005 Celador Films/Pathé Neil Marshall's The Descent is by many degrees the best wide-release film I've seen in a theater all summer. It's also a grueling spelunk into body horror and terrifying suspense, so don't expect long lines at the cineplex when you go and check it out. The film begins with one of those scenes that is both oblique and overt, like Morse code tapped out at top volume, in telegraphing a problematic tie between two characters: Juno (Natalie Mendoza) is almost certainly having a secret affair with the husband of Sarah (Shauna Macdonald), a friend and comrade in outward-bound adventures like caving, hiking, and, in this sequence, whitewater rafting. Then, having introduced this kernel of conflict, the movie hastily overrides it with a whopper of unpredictable misery: Sarah's husband and daughter are killed in a car accident on the way home from the rafting trip. The construction of these two pre-credit sequences is tense, rich, and economical: are we right in surmising the adulterous liaison? Is Sarah surmising it, too? Is she probing her husband for an admission or an obvious lie, and is that why he is distracted enough to drive full-throttle into an oncoming truck? This type of boldface psychology and high-velocity exposition are often the stuff of strong, confident horror movies, as evidenced recently in Zack Snyder's Dawn of the Dead and Greg McLean's Wolf Creek, and though The Descent trips itself up a bit more often than those films did, Marshall's movie is still powerful, patient, and terrifically calculated. With its ghoulish backstory in place, rounded out by quick impressions of Sarah's rickety mental state and of the cloud of culpability still hovering around Juno, the action launches forward a full year, where the women reunite with four other friends for a trip inside an Appalachian cave complex. The rest of the party includes Beth (Alex Reid), the third member of the previous year's rafting party, and an obvious skeptic about Juno's integrity; a medical student named Sam (MyAnna Buring), with a protective and fawning older sister named Rebecca (Saskia Mulder); and Holly (Nora-Jane Noone, of The Magdalene Sisters), a feral, spiky-haired endorphin junkie who is described, in a redolent Celluloid Closet sort of euphemism, as Juno's "protégé." Marshall and his most valuable accomplices, editor Jon Harris and cinematographer Sam McCurdy, flitter and trundle around the women's woodsy cabin long enough to put us on edge, but there is still something muddy and slack about these group scenes; clearly, distinct characterization isn't what the movie's after, but they also aren't taut enough to resonate with Wolf Creek's sense of a pungent, insistent material world about to bite back bitterly against some heedless humans. Juno's decision the next morning to jettison her guidebook to the cave system before leading her party inside is exactly what it looks like—graceless exposition—but once the women have rappeled downward into this gritty, drippy underground maw, the movie becomes as buff, toned, and nimble as its protagonists. Every whiff of tension or rivalry takes on a capacity for fright, as the women's dependence on each other becomes evident, even palpable, in this forbidding terrain, where belly crawls, narrow passageways, underwater bottlenecks, desperate grapples over inky and jagged chasms, and no option of retreat are the signs of things going well. As much as these sequences bristle, as much as a curt remark or a momentary diversion from the group quivers with horrific possibility, you'll know when the circumstances truly disintegrate. Think compound fractures. Think hallucinations, or possible hallucinations. Think lithe, unimaginable predators. Think no way out. The Descent invites a few comparisons with this spring's remake of The Hills Have Eyes, especially once Marshall unleashes his armada of scrambling, toothy flesh-eaters, but unlike Hills' rapacious, almost fluorescent glee in gutting its characters, The Descent teases out complex interplays between our enjoyment and our disgust at the women's predicaments, and between their own ingenuity and their apparent doom. The distinction may be subtle or arguable, but I think it makes a difference. I'm hardly cracking a sealed file to tell you that women start dying, but there's much more at stake than a simple body count. The first two deaths are of utterly different orders. In one case, the beasties pounce with Darwinian predictability on the weakest of the human pack. In the other, the furor and dementia of resisting the creatures, but also one of those barely sublimated dislikes among the women, claim their own victim. One death seems quite literal, the other metaphorical; the calculations of guilt are only general in the first case but much more immediate in the second, and the worrisome, jet-black gulf between those alternatives is where the movie makes its wicked, interesting home. Marshall follows this sequence with an even more virtuosic gesture: having splintered his four survivors into three different quadrants of the cave, he endows all of them with the emergency intelligence to deduce the monsters' most important weakness, though each woman presumes that the others haven't made the same discovery. Through maneuvers like this one, crediting the smarts and the physical brio of his characters even as their loyalties and good judgment start to fray, Marshall's largely utilitarian script starts to show some real moxie. Our impressions of these women, which all but blurred at the outset of the caving trip, distill once more into the possibly life-saving assets and dangerous detriments of each individual personality, and yet their plight is collective: just when they think they've lost their comrades in this dark, echoing chamber, they all but bump back into them. Nearby howls of pain or predation are sometimes faraway, and sometimes the reverse. The Descent breaks a few of its own rules, or at least garbles them, particularly in the area of sound. A salient feature of Marshall's "crawlers" is that after who knows how many years underground, they cannot see their prey, but they can hear a boot scrape or a stalactite drip from hundreds of meters off. You should expect to shush these women repeatedly as the crisis unfolds, even after they should know better than to gab about narrative pivots or to whinge quite so loudly amid the efforts of climbing—though, often enough, their ruckus gets them into much less trouble than it should. More damagingly to the film, the turbulet score by David Julyan (Memento) ratchets up the brass just when we need to know whether the cave itself is quiet or loud. Entire sequences are obscured by the sound design, and as the movie leads to its delectably layered conclusion, it unfortunately gets a bit too frantic to mind all the details. This is also when the filmic allusions start piling up into their own sort of zombie brigade: scare quotes, if you like, from Don't Look Now, Carrie, Apocalypse Now, The Blair Witch Project, the Gollum sequences in The Lord of the Rings, The Texas Chainsaw Massacre, the original Alien, and in one sudden flash-reveal of a whole brigade of crouching monsters, a direct lift from Aliens. Recognizing these generic avatars isn't devoid of fun, especially since The Descent seems to have been hewed by and for aficionados of the tradition. Occasionally, these citations do impede the movie from taking on its own life, but the karmic showdown of the end, however obviously jerry-rigged, reimprints the movie with its own proud stamp. As it draws to its close, or rather shreiks to a halt, you may well admire how many thematic reads the movie has kept in play: a simple confrontation with implacable violence; a phantom enactment of the women's own neuroses and jealousies; a cautionary parable about bold and nearly virile women intruding rather carelessly into a distinctly labial landscape; the revelation of a lean and bloodthirsty homunculus buried deep in American soil, such that the women's disparate nationalities accrue some significance; or a more ambiguous study of the physically fortifying but morally corrosive enzymes of revenge. Sarah, whose denied but nonetheless obvious fragility in the first hour made her almost invisible—she's the main character, but you can scarcely describe her appearance, or distinguish her from her compatriots—emerges in the final acts as a quick, prehensile, laser-eyed survivalist and a force to be remembered, albeit modeled rather clearly on her grotesque, unholy assailants. None of the actors go very far psychologically, but Shauna Macdonald has clearly put some movement classes and physical training to good use, and her corporal transformation sturdies the whole film through its final chapters. The Descent may not be an epochal movie, and it labors a bit transparently at imitations of its own patron saints, but Marshall has nonetheless shaped a pop movie that would likely reward several visits, and he makes up in conviction, energy, and metaphoric possibility what he so willingly forfeits in originality. By furrowing down into the land and into the id, his film winds up, at least for now, near the top of the year's offerings. B+ Permalink Home 2006 ABC Blog E-Mail
global_01_local_2_shard_00001658_processed.jsonl/7716
Monday, September 12, 2016 सत्यम् ब्रूयात् प्रियम् ब्रूयात् न ब्रूयात् सत्यमप्रियम् |  प्रियम् नानृतं ब्रूयात् एष धर्मः सनातनः || satyam bruyat priyam bruyat na bruyat satyam apriyam priyam cha nanrutam bruyat esha dharmah sanatanah To speak truth is an eternal value irrespective of time and place. But the expression of truth should be accompanied by two conditions. Firstly, it should be presented in a loving manner and secondly it should be spoken for the betterment of others. How you speak is as important as what is said. Priyam means speech that does not hurt others. Hitam is something that is said for the good or betterment of others. One should be careful of speaking truth but not hurting others. We should be careful in speaking the truth. The purpose should be good and the words used and the manners in which they are spoken are important. So the value of truthfulness is relative to a situation. According to the Indian scriptures while living in the world of relativity truth can be interpreted in many ways. The King And The Astrologer A king produced his horoscope before an astrologer and asked him about his future. The astrologer pondered the positions of the planets and consulted the Shastras and finally gave his verdict: .Maharaja, all your relatives will die before you, you will perform their obsequies with your own hands.. The king became furious. He was very much attached to his relatives and could not tolerate such a verdict. The king at once ordered that the poor astrologer should be given imprisonment for life. Then the king sent for another astrologer. This man was more tactful than the first. He found that the previous astrologer’s readings were absolutely correct. So, he tactfully put the same truth the other way round. He said: .Maharaja, you have a very long life. You will live longer than all your relatives.. This also meant that all his relatives would die while the king was alive. The same fact had been very tactfully told to please the king. The king was highly pleased with the astrologer and gave him rich and costly presents.  Therefore it is said that even while telling the truth, one should tell it in a pleasant manner. Even a truth should not be told in a way that will hurt the feelings of others. If it is told so, it is tantamount to untruth only.  Your speech should be truthful, pleasant and beneficial. No comments:
global_01_local_2_shard_00001658_processed.jsonl/7721
 Noble.tv - English - At-Tur (The Mount) - Mohammad Ayyoob Sura At-Tur (The Mount) Sheikh / Mohammad Ayyoob 52:1-8 By the Mount, and a Scripture inscribed, on fine parchment unrolled, and the House frequented, and the roof exalted, and the sea kept filled, lo! The punishment of your Lord will surely come to pass; there is none that can ward it off. 52:9-16 On the Day when the heaven will heave with (awful) heaving, and the mountains move away with (awful) movement, then woe that Day to the deniers, who play in talk of grave matters; the Day when they are thrust with a (disdainful) thrust, into the fire of Hell. (And it is said to them): This is the Fire, which you were wont to deny. Is this magic, or do you not see? Endure the heat thereof, and whether you are patient of it or impatient of it is all one for you. You are only being paid for what you used to do. 52:17-21 Lo! Those who kept their duty dwell in Gardens and delight, happy because of what their Lord has given them, and (because) their Lord has warded off from them the torment of Hell-fire. (And it is said to them): Eat and drink in health (as reward) for what you used to do, reclining on ranged couches. And We wed them to fair ones with wide lovely eyes. And they who believe and whose seed follow them in faith, We cause their seed to join them (there), and We deprive them of nothing of their (life"s) work. Every man is a pledge for that which he has earned. 52:22-28 And We provide them with fruit and meat such as they desire. There they pass from hand to hand a cup wherein is neither vanity nor cause of sin. And there go round, waiting on them menservants of their own, as they were hidden pearls. And some of them draw near to others, questioning, saying: Lo! Of old, when we were with our families, we were ever anxious; but God has been gracious to us and has preserved us from the torment of the breath of Fire. Lo! We used to pray to Him of old. Lo! He is the Benign, the Merciful. 52:29-32 Therefore warn (them, O Muhammad). By the grace of God you are neither a soothsayer nor a madman. Or say they: (he is) a poet, (one) for whom we may expect the accident of time? Say (to them): Expect (your fill)! Lo! I am with you among the expectant Do their minds command them to do this, or are they an outrageous folk? 52:33-38 Or say they: He has invented it? Nay, but they will not believe! Then let them produce speech the like thereof, if they are truthful. Or were they created out of nothing? Or are they the creators? Or did they create the heavens and the earth? Nay, but they are sure of nothing! Or do they own the treasures of your Lord? Or have they been given charge (thereof)? Or have they any stairway (to heaven) by means of which they overhear (decrees). Then let their listener produce warrant manifest! 52:39-43 Or has He daughters whereas you have sons? Or ask you (O Muhammad) a fee from them so that they are plunged in debt? Or possess they the Unseen so that they can write (it) down? Or seek they to ensnare (the Messenger)? But those who disbelieve, they are the ensnared! Or have they any god beside God? Glorified be God from all that they ascribe as partner (to Him)! 52:44-47 And if they were to see a fragment of the heaven falling, they would say: A heap of clouds. Then let them be (O Muhammad), till they meet their Day, in which they will be thunder-stricken, a Day in which their guile will not avail them, nor will they be helped. And verily, for those who do wrong, there is a punishment beyond that. But most of them know not. 52:48-49 So wait patiently (O Muhammad) for your Lord"s decree, for surely you are in Our sight; and hymn the praise of your Lord when you arise. And in the nighttime also hymn His praise, and at the setting of the stars. app android
global_01_local_2_shard_00001658_processed.jsonl/7723
Once upon a time Thanks to gifts from various sources (including the National Health Service, where we’d gone for a checkup), Berry has a few books now. Most of them have lots of pictures (the only book we’ve bought for her is simply a collection of animal pictures). Some have text as well. And it is that that is rather underwhelming. I don’t know the target age group for most of these books, but the stories seem damn lame to Pinky and me. In my opinion, a good children’s book (or show) should not only be interesting for the child, but also for the parents – it is not often that the child uses the book or show alone. And from that perspective, a lot of these books Berry has got don’t pass the muster. The books I had when I was a kid may not have been particularly optimised for a child. The illustrations weren’t great. The paper quality was underwhelming as well (one thing Berry can’t do with her books is to tear them! A useful quality for sure for children’s books). But the stories were fantastic. And things that I still remember. Most of these stories came from the Panchatantra, which is a collection that “evolved” over time. This memetic evolution means that the stories that have come till today are “fit”, and fantastic. It’s similar with Aesop’s Fables – their age means that stories have evolved sufficiently to become damn interesting. And of course, this applies to the Ramayana and Mahabharata as well (and NOT to Christian myth, which didn’t get time to evolve and is thus rather boring). Speaking of myth, I recently read Neil Gaiman’s book on Norse Mythology.  It’s a good book, and I’ll make Berry read it before she is five. But the stories themselves were all rather underwhelming and devoid of complexity. Considering it’s an ancient myth, which had sufficient time to evolve being written down, the simplicity of plots is rather surprising. Or maybe it’s the way Gaiman told the story. I’m reminded of this “one Shloka Ramayana” that I’d been made to mug up as a kid (I still remember it “by heart”. Maybe Gaiman’s book is the Norse equivalent of this? Poorvam Rama Thapovanadhi Gamanam Hatva Mrigam Kanchanam Vaidehi Haranam, Jataayu Maranam Sugreeva Sambhashanam Bali Nigrahanam, Samudra Tharanam Lankapuri Dahanam, Paschath Ravana Kumbhakarna Madanam Ethat Ithi Ramayanam In any case, considering the lack of plots in “modern” children’s books, we’re seriously exploring the idea of bringing back truckloads of Amar Chitra Katha when we visit India later this year.
global_01_local_2_shard_00001658_processed.jsonl/7731
Jimmy Choo Anouk OMG how AWESOME is this??? Jimmy Choo shoes that has my name!!!!! haha, i really think i need these shoes.... and sunglasses My mother got the newsletter email from Jimmy Choo and i was standing next to her and we saw my name in it...we were like 'HUH..Anouk???' so we checked the website and there is a line of high heels that is called 'Anouk' and also 2 sunglasses that is called Anouk. How awesome is that?...for me :P See for yourself: Jimmy Choo Anouk 1 comment: 1. Amazing shoes! Would love to have them
global_01_local_2_shard_00001658_processed.jsonl/7753
Essay on point of view Essay on point of view, Grendel point of view essays it was a dark night, a quiet night much like any other night i left my lair to feast on hrothgar's men i was so hungry, something. Point of view essay must explain about the essay written to convince others. Point of view is the perspective from which a speaker or writer recounts a narrative or presents information learn more. Point of view is an essential element to a reader's comprehension of a story the point of view shows how the narrator thinks, speaks, and feels about any particular. Each individual short story has its’ own point of view and voice within short stories there are different types of narrative and also different types of. The crucial skill teachers and readers are looking for in a student’s approach to documents is the awareness that documents are not statements of facts, bu. Persuasive writing persuasion is an attempt to influence others to adopt a certain belief or point of view or to convince them to take some action. Point of view is an essential element to a reader’s comprehension of a story the point of view shows how the narrator thinks, speaks, and feels about any. To write a great essay point of view, you need to research a specific subject or topic and take notes to back up the chosen position with enough solid facts it’s advisable to. The effects of point of view essays the point of view in which a story is told has many effects on readers and how they perceive a story generally, stories are. Points of view in writing there are three different points of view that can be used in writing: first person, second person, and third person in academic writing, the third person point of view is usually clearer and allows. The use of the first-person narration in an essay means that the author is writing exclusively from his or her point of view - no one else's the story or the information will thus be told from the perspective of i, and we, with words like me, us, my, mine, our, and ours often found throughout the essay. American literature homework help essay about point of view barn burning consulting agency writing literature reviews rick roll essay paper. The speaker of the story, who speaks as a first-person narrator, is not named we may conclude that he has had a good deal of experience with small boats, and with. Point of view essays: over 180,000 point of view essays, point of view term papers, point of view research paper, book reports 184 990 essays. Below is a sample essay on point of view in the short story story of an hour it contains 8 paragraphs the premise of the essay - according to the title is that. • “robert and the dog” point of view in a story is something i find extremely interesting, simply because of the obvious fact that every single one of us have our. • Free essay: oh, you would have laughed to see how cunningly i thrust it in i moved it slowly --very, very slowly, so that i might not disturb the old man's. • Person omniscient point of view to describe the boy's surroundings and to show us both what he and the other characters are thinking and what is happening. Point of view tell-tale heart this essay point of view tell-tale heart and other 63,000+ term papers, college essay examples and free essays are available now on. When english teachers talk about point of view -it can be appropriate in a formal academic essay only when giving a specific personal experience as a form. Essay on point of view Rated 3/5 based on 17 review
global_01_local_2_shard_00001658_processed.jsonl/7767
One Life Left's Podcast Last week we had a Marioke event at GameCity. It involved lots of drinking and singing. Nothing unusual there. But we've not seen Ann since, and some sources are saying that she ended up in Japan. Is she going to be the new Kojima? As Ann was missing, we needed to make sure that her replacement was completely ethical and - most importantly - a man. So we got GameUnder, renegade gamer and former president of Electronic Arts to come in and do the news. We also got Henry Hoffman from Fiddlesticks and the most stylish man in games in as a Super-Special Guest. He told us his origin story, his new game Hue, his experimental VR game Aboard The Looking Glass and made an EXCLUSIVE! announcement that he probably shouldn't have made and we shouldn't be mentioning in CAPITAL LETTERS. Sorry. We're also sorry that there won't be a show next week, it's all Ste's fault for going to India. Oh, and we're sorry for the spoilers that GameUnder might do during his news. While we're at it, sorry for mentioning TFI Friday during the show. We won't apologise for Sega Badawi, although some of his puns this week do get a little close to the edge. Team OLL x 1. MotionRide - 99 Lives Left 2. Lamer Pinky - Way To Unity 3. Klamm - Icebreaker Direct download: OLL_02_11_05.mp3 Category:Show -- posted at: 4:00pm EDT
global_01_local_2_shard_00001658_processed.jsonl/7771
Pyloric pacemaker network - Prinz et al. 2003/04 This project contains a neuroConstruct project which generates a version of the pyloric pacemaker model. The channel models have been converted to ChannelML and the network can be exported to: This is based on work by Aditya Gilra, Boris Marin and Padriag Gleeson. A unified version of the neuroConstruct model is in the top level neuroConstruct folder. Aditya Gilra's original implementation of the pyloric pacemaker model of the lobster somatogastric ganglion system in the AdityaGilraMOOSEnC folder. The 3 cell network is for fig 3d from : Similar network activity from disparate circuit parameters Astrid A Prinz, Dirk Bucher & Eve Marder Nature Neuroscience 7, 1345 - 1352, 2004 The cell models and channel mechanisms are from: Alternative to Hand-Tuning Conductance-Based Models: Construction and Analysis of Databases of Model Neurons Astrid A. Prinz, Cyrus P. Billimoria, and Eve Marder, J Neurophysiol 90: 3998–4015, 2003 The same cell is used as the basis for 3 cells AB_PD, LP and PY with different channel densities, connected in the pyloric rhythm generator network specified in Fig 3d of Prinz, Bucher and Marder, 2004 above. Differences from the original model: synapses are thresholded rather than graded. This is in the neuroConstruct_alt directory and currently runs on MOOSE buildQ branch. Boris Marin’s version: Electrophysiological data comes from this article: Gina Turrigiano, Gwendal LeMasson, and Eve Marder Selective regulation of current densities underlies spontaneous changes in the activity of cultured neurons Journal of Neuroscience, 15(5 Pt 1), 3640–52, 1995 Model transcribed from this article: Astrid A. Prinz, Vatsala Thirumalai, and Eve Marder Journal of Neuroscience, 23(3), 943–54, 2003
global_01_local_2_shard_00001658_processed.jsonl/7776
Tuesday, February 24, 2009 Church Tradition Story 5: Beatles and Hair One time, I went to a party at Chauncey's house--Chauncey is Lee's son--and Chauncey told stories about growing up in Canada. I remember something about killing a moose and jumping a tremendous distance on a machine. (Authentic Canadians refer to snowmobiles simply as machines, as in, "Would you mind running such-and-such an errand?" "Of course not, I'll just hop on my machine.") I forget if Chauncey actually did kill a moose or do the jump on the machine, because these were from two of his statements from the game, two truths and a lie, and Chauncey is amazing at that game. What I do remember from Chauncey's storytelling that I'm sure is true are a couple of his stories about the eccentricities of living in a small Mennonite community out in the wild. Chauncey went to a small Christian school. They weren't allowed to listen to rock and roll. There was even a record in the school library that was about how terrible rock music is. It had two-second clips from Beatles songs, to illustrate how evil rock is. Chauncey would go to the library, borrow the record, and listen to those clips a lot. These Mennonites interpreted I Corinthians 11:2-16 literally; this passage teaches that women should pray with their heads covered, but men should pray with their heads uncovered and should have short hair. One time, a visitor came to their church, his hair went just below the tops of his ears. Chauncey turned to his mother, Genny, and asked, "Mommy, is that man a Christian?" Tuesday, February 17, 2009 The most useless phrase in the phrasebook [The following is based on my journal entry from 12-30-2008, while I was in Turkey. That day, Matthew, Paul, and I went to Haya Sofya and the Blue Mosque, and the Istanbul antiquities museums. We then went to two toy stores, trying to find Silly Putty. It is likely that I had, in my pocket, the only egg of Silly Putty in the country. We then went to the spice bazaar and had supper near there at a pide and kebap shop.] Tonight at supper, I used eight Turkish words. First, I asked the waiter, "Ingilizce konuşuyor musunuz?"--"Do you speak English?" He looked confused, like I'd mispronounced something to the point of incoherance. Onur suggests that the waiter thought that if I knew enough Turkish to ask that question, I ought to know how to order in Turkish. Then, I said "Ben vejetaryanım"--"I am a vegetarian." The waiter pointed at the three items on the menu without meat: soup, salad, and plain cheese pide. I ordered the pide. Pide is flatbread with melted cheese on it, typically kaşar. Some people call it Turkish pizza, but some Turks, I hear, resent this--they see pide as being in a category of its own. It does not have tomato sauce. In restaurants in Turkey, sometimes the bill is left on your table during the whole meal--that is, the waiter will take your order, leave the bill on the table, and append it as you order more things, say drinks or desserts. This seems to me to be a sensible system that prevents bills from getting mixed up. In other restaurants, though, you'll actually have to request the bill, they won't just drop it on the table when they want you to leave. We would have been trapped in limbo if I didn't say, "Hesabı, lütfen"--"Bill, please." As we left the restaurant, I called out, "Hoşçakal," and the waiter replied, "Güle güle." (You say goodbye differently if you are leaving or if the other party is leaving.) I felt so ashamed when the waiter looked blankly at me when I asked him if he speaks English. It was awkward, and I have five days of awkward built up. If I move here, awkward will be my life for months, and I won't ever be normal. That will be hard. The day after Josh's wedding proper, the party continued. We had a barbecue, then went inside for dessert. There were four languages being thrown around. I got out my yo-yo and did tricks. Claudia tried it, and her dad teased her because she couldn't get the yo-yo to return. Claudia's dad is Chilean, so he mostly teased her in Spanish. My Spanish wasn't good enough for me to translate what he said, but it was easy to get the gist from context. (It was a fun teasing, not a mean teasing.) She would hold her mouth open--her sister, Pamela, told me that she does this when she's concentrating--her dad teased her about that, too. I said, "En boca cerrada, no entran moscas"--"Flies don't fly into closed mouths" and everyone who spoke Spanish laughed. Even the people who didn't know Spanish laughed. That was the first time that I told a joke in a language besides English. That party is probably my favorite picture of heaven. Today was the first time I used another language when I really needed it, and that experience was more purgatorial. Thursday, February 12, 2009 Teh Excel So, tonight, I fired up teh Excel to tell it to open new spreadsheets in anything but that idiotic page layout view. Take a gander at teh preferences menu: Tuesday, February 10, 2009 What Turks will tell you despite language barriers Turks are very friendly people, especially to foreigners. Whenever would pass a Turkish boy on the street, he would say, "Hello, hello, money, money." I don't think that Turkish boys are particularly greedy, but it's funny that hello and money seem to be the first English words they learn. One time, Paul and I were in the Turkish air museum, and the person working there came up and told us that photography is either allowed or prohibited (I still don't know which). He then showed us the gift shop and a few of the exhibits. He could tell that we didn't speak Turkish, but he kept speaking to us in Turkish. He then kept saying something about Obama, and looked happy, and then said Bush, and grimaced. There were many times that Turks who don't speak English would tell us about how they like Obama but not Bush. The other big thing that Turks who don't speak English will try to communicate is their pride in Mehmet Okur, the Turkish basketball player with the Utah Jazz. On my last day in Turkey, I was trying to figure out where I should wait for the bus to take me to the Sivis Otel, where I could catch a shuttle to the airport. I asked, in Turkish, a person who works for the bus system if he spoke English. He immediately walked out of his booth and called out to the crowd, I presume asking for an English-speaker. One came up and translated directions to me. Then, I heard the worker say something about Israel and Palestine, so I had time to be overcome by dread before the translator asked me my opinion of the current situation in Gaza. Thursday, February 5, 2009 Meta-Blog Post I hate throat clearing. Worse, I hate it when throat-clearers acknowledge their throat clearing. Unfortunately, this is what I'm doing tonight. I've not had a whole lot of great ideas for bloggy articles lately. I didn't even write one this week, honestly, I forgot. I haven't had anything so interesting that I would write it up a week before my self-imposed deadline. I do have three ideas for longer bloggy series: 1. Continue talking about Turkey--I have only written about a quarter of the things that I could have 2. How to lead Bible studies--I find that whenever I'm training small group leaders, I have concrete advice that I've figured out myself, but I don't see anyone else using these tips 3. Talk about how I work. I've been thinking about this a lot lately. I could write a whole article about plain 8 1/2x11" paper. Questions for discussion: • Which of these would you, dear reader, prefer to read? • For the series on Bible study, I want to use one passage or book as a case study. What do you think would make a good test case?
global_01_local_2_shard_00001658_processed.jsonl/7817
Write My Essay Coupon Code • research paper economy • Custom essay coupon code • Essay Writing Coupons, Promo Codes, Deals, Discounts • dissertation how many hours • help my essay coupon code | Forum • Write My Essay Promo Code Write My Essay Passionate Code write my essay coupon code my reader promo code Find and lea essay writing coupon codes and inaccurate codes for great custom conclude eu Write My Essay Coupon best formats for pieces help thesis for showing and contrast nature is buying readers plagiarism Write My Style Promo Code academiccustomessays write my essay coupon code cover project legal translation Essay Coupon Implications Total. Take lot of the coupon code when editing out the form and get an extremely 7. Write my essay coupon code photo 2 We can write your life assignments from. Read These Next:
global_01_local_2_shard_00001658_processed.jsonl/7833
Claim Construction Tutorial by Philip Greenspun and John Morgan Site Home : Software : How to Write a Claim Construction Tutorial : One Example The objectives of this tutorial are (1) to provide background and context of "web-based database application" technology, (2) to help the reader understand the challenges faced by computer programmers building Web applications, especially those backed by relational database management systems, in the 1990s and, (3) to explain how the system described in U.S. Patent 6,832,226 would automate some of the tasks conventionally performed by human programmers. Topics addressed in this tutorial include the following: (Individual sections may be accessed by clicking the subtitles above, or scroll down to read the entire document in sequence. This document best viewed in a Web browser so that the hyperlinks to additional information are functional. To adjust font size, use browser controls such as "View -> Text Size" or hold down control key and type "+" (ctrl-+).) I. What is a database? A database is an organized collection of information. A computer program that assists programmers with common challenges regarding creating, updating, and querying a database is a database management system (DBMS). The most popular type of DBMS is the relational DBMS or "RDBMS", the best conceptual model for which is "a big spreadsheet that several people can update simultaneously." Information within an RDBMS is stored in tables. Communication with the RDBMS is via the Structured Query Language (SQL), which includes statements such as CREATE TABLE, INSERT (add a row), UPDATE (change a data item within a table), DELETE (remove a row), and SELECT (return a report). The "SQL schema" or "data model" is a collection of CREATE TABLE statements that prepares the RDBMS to accept data items. For example, suppose that a Web site developer wished to record subscribers to an email newsletter. He or she would create a new table called mailing_list with two columns (also sometimes called "fields"), email and name, both text strings that can be up to 100 characters in length ("varchar(100)"): create table mailing_list ( email varchar(100), name varchar(100) After a series of INSERT commands, the contents of this table may be viewed in a spreadsheet format, e.g., by typing a SELECT statement such as select name, email from mailing_list Each row in the table is also referred to as a record. Note that, unlike with a desktop spreadsheet application, every data item in the same column, e.g., email, must be of the same data type (in this case a character string). II. What is a database application? A database application is a computer program whose primary purpose is entering information into and retrieving information from a computer-managed database. Some of the earliest database applications were accounting systems and airline reservation systems such as SABRE, developed between 1957 and 1960 by IBM and American Airlines. Users interacted with early database applications, such as SABRE, by typing at a terminal connected directly to a mainframe computer running the database management system. The IBM 3270 terminal, introduced in 1972, was a very commonly used device. The terminal had no ability to process information, but merely displayed characters or "screens" sent from the mainframe. Software development for an early database application was simply software development for the mainframe computer, which executed all of the program code centrally. Software was developed in assembly language, a "second-generation language", or one of the "third-generation languages" developed in the late 1950s and early 1960s, e.g., COBOL, Fortran, or PL/I. Whatever conventional programming language was used, there may have been embedded database commands in a specialized query language. III. Client/server database applications A client/server database application is a system in which the programs to organize data and interact with users have been split up among a central server and distributed personal computers. With the development of the inexpensive personal computer in the 1980s, it did not make sense to have a central mainframe do all of the work. Programmers realized that substantial performance and interactivity improvements could be achieved by distributing some of the logic, especially software related to user interface, to machines on users' desktops. The central computer (server) was retained, but it ran only the database management system (DBMS). The personal computers on users' desktops (clients) ran the software that displayed menus and reports, drew graphs and charts, and sent queries and transactions to the DBMS. Instead of screens and keystrokes being communicated from the central computer to the desktop, the desktop PC would send queries to the DBMS and receive results back in exchange. As the rise of the desktop PC coincided with the rise of the relational database management system (RDBMS), conceived in 1970 and introduced commercially in 1979 by Oracle Corporation, the most common language flowing between clients and servers was SQL. Figure 1: A typical corporate database application, circa 1989. A central Oracle database server communicates with a user on a Windows PC and a user on an Apple Macintosh. Queries, typically in the Structured Query Language (SQL) are sent from the desktop computers via a proprietary protocol specific to the particular RDBMS software being used. Due to the differences in the desktop operating systems, separate versions of the client software must be developed. Note that oftentimes all three of the computers depicted would be on a local-area network, e.g., within an office building, but the architecture and software worked equally well across internets or the public Internet. IV. What is a Web application? A "Web application" is a server-based computer program that can be used by a user sitting in front of a standard Web browser, such as Microsoft Internet Explorer, Firefox, or Google Chrome. Examples of Web applications include,,, and The advantage of the Web, compared to client/server, is that no specialized software need be installed on the end-user's computer. The same personal computer or mobile phone and the same Web browser can be used to read a news article from, order a book from, or calculate the cost of a new car using Google Spreadsheets. A classical Web application is very similar to an old mainframe application. All computation is performed on the central computer in response to a request for a URL (e.g., " requests the file "index.html" located in the "/pages/business/" directory on the server) and only information necessary to paint a "screen" is sent to the device on the user's desktop via the Hypertext Transfer Protocol (HTTP). Thanks to 30 years of progress in microelectronics, the desktop device can display color graphics rather than simply green characters, but the software ideas are very similar. Rather than the IBM 3270 terminal protocol, the specifications for the screen or "page" to be displayed are sent in Hypertext Markup Language (HTML), which is a specification or format for a document (analogous to the format in which Microsoft Word, for example, might save a file to disk). The structured data in HTML is distinct from a programming language, which generally either express a step-by-step algorithm for a computer to follow or specify a computation to be performed. A. Static HTML Pages Some early Web sites, e.g., online manuals, were simply static collections of HTML documents and digital images. The server did no computation other than processing the request to see which file was being requested and then delivering the contents of the file via HTTP. These were informally referred to as "static sites". Every user who requested a file with a particular name would be served exactly the same contents, regardless of the identity of the user, the time of day, or what files had been previously requested by that user. Here is an example of a one-sentence .html page: The source HTML behind this page is a file whose entire contents is the character string "Texas is really big." In other words, a plain-text string of characters can be rendered by a Web browser as an HTML document. Every word appears in the default font and face. Suppose the author wishes to emphasize the word "really": This is accomplished by surrounding the word with an "emphasize" tag: "Texas is <em>really</em> big." The Google Chrome browser, used to create the above screen shot, after reading the EM tag, elected to display the word "really" in italics. That's the markup part of HTML. A typical HTML document looks more like the following: Here's the HTML behind the preceding page: <title>Facts about Texas</title> <body bgcolor=white text=black> <h2>Texas Facts</h2> Texas became a state in 1845. Texas has an area of 268,820 square miles. ... a new paragraph ... <a href="">Wikipedia article on Texas</a> After the BODY, which represents the start of the document to be displayed, "Texas Facts" is marked up as an H2 headline. The HTML then specifies a horizontal rule (HR) across the page, includes a sentence about Texas's statehood, and then marks up the word "Geography" as a smaller H3 headline. At the bottom is a link to Wikipedia using the A tag. This is the hypertext part of HTML. As noted above, HTML is structured data representing a document. It is not a programming language and lacks the most basic capabilities for programming, e.g., it is not possible to instruct a computer to add two numbers via HTML. There is no "ADD" tag. B. Computer programs that generate HTML pages Via the Common Gateway Interface ("CGI"; developed in 1993), it became conventional to write short computer programs that would run on the server when a Web address was requested by a browser. These programs could be written in any programming language and the only restriction on their behavior was that their eventual output conformed to a standard Web server response. These programs are typically short and simple and referred to as "page scripts". Here's an example of a page generated by a computer program (in the Perl programming language): Here's the Perl program that generated the preceding page: # the (above) first line says where to find the interpreter # for the rest of the program # any time we print, the output goes to the user's browser # now we have printed a header (plus two newlines) indicating that the # document will be plain test; whatever else we write to standard # output will show up on the user's screen # Get the current time as a string. $current_time = localtime(); # Run a program to get the system status. $system_status = `/usr/bin/uptime`; print "As of $current_time, system status is:\n\n$system_status\n"; Note that the output displayed by the browser is a combination of static text, e.g., "As of" and "system status is:", and information obtained or calculated by the running Perl program. All of this is happening on the server; all that the browser knows is that it received a stream of plain text characters (based on the "text/plain" Content-type sent by the first line of code in the Perl program). V. What is a Web-based database application? The '226 patent's title includes the phrase "Web-based Database Application". What does this mean? It is simply a combination of the systems described above, i.e., "a computer program that can be used by a user sitting in front of a standard Web browser whose primary purpose is entering information into and retrieving information from a computer-managed database". No additional software needs to be installed by end-users. The computer programs on the server, however, are modified so that they rely on a database management system (DBMS) for storing and retrieval of information. The user requests pages by URL, as before, and in response the server will run computer programs (page scripts) that will generally access the DBMS and then merge the results with a template in order to build up a complete HTML page to return. Figure 2: A database-backed Web site or "Web-based Database Application". A request is made by a browser on a standard personal computer or a smartphone and is sent via HTTP to the Web server. The Web server runs a small computer program (page script) to handle the request. The page script will send a SQL query to the database management system and, using those data items, build a complete HTML page to return to the requesting browser. Note that the software on the users' computers and mobile phones need not be customized in any way for the application or the DBMS used. Unlike with the client/server architecture, all programming here can be done on the central server. As with the client/server architecture, the computers in this drawing might all be in the same building and connected via a local-area network or the end-users might be on different continents connecting via the public Internet. The structure of one of the page scripts shown in Figure 2 is best explained by example. The flow chart below uses an example of a bank customer logging in to view the most recent transactions to his or her account. After typing in a username and password, the customer clicks on a "view transactions" link. This causes the browser to request the link "/transactions" from the Web server, which will run a page script (short computer program) in response. The page script will connect to the RDBMS, query the transactions table, and then merge the data items received back from the database with some fixed HTML (a "template") in order to build a complete HTML page to return to the customer. The final HTML page as viewed by the customer will contain some boilerplate content from the HTML template, but also a list of recent transactions that have been queried from the RDBMS. Figure 3: Flow chart for a page script that shows a bank customer's most recent transactions. The short computer program logs into the RDBMS, sends it a SQL query for rows from the transactions table that match the customer's account number. Once the results (data items) are received, they are merged with an HTML template that the program reads from the server's file system. The complete HTML page is sent to the customer's browser. See this link for some example source code. VI. How were Web-based database applications built in the 1990s? For a Web-based database application being built from scratch, the classical development process included (and still includes, as of 2011) the following steps: 1. human programmer talks to business manager to find out what is needed 2. human programmer develops SQL schema or "data model" (tables and columns) 3. if existing data needs to be incorporated, copy those data from text or binary files into the RDBMS tables 4. human programmer writes application pages (computer programs) that query database and return HTML pages to user 5. if business requirements change, human programmer alters SQL schema by adding tables or columns 6. human programmer modifies (edits with a text editor) the application pages (computer programs) to update and query the added tables and columns Note that Steps 5 and 6 will be repeated throughout the life of the application. A. Steps 1 and 2 Example Suppose that the programmer learned from the business manager that a goal was to add a feature to the company's Web site whereby visitors could sign up to receive email notifications of new products. The result might be the development of the following SQL schema: create table mailing_list ( email varchar(100) not null primary key, name varchar(100) This is a SQL command that tells the RDBMS to make space for a new table called mailing_list. This table will have two columns, both variable length character strings. This single table can be considered the application database as it holds all of the data to be processed by the application. A critical part of almost any SQL schema is a set of integrity constraints. These are restrictions on the data that will be enforced by the database management system. Without integrity constraints, a company's valuable data may gradually become inconsistent as a consequence of small mistakes in computer programs that use the database. In the case of this example one-table data model, the programmer has added two integrity constraints on the email column: not null primary key. The not null constraint will prevent any program from inserting a row where name is specified but email is not. The manager said that the company did not want to require a full name, but needed the email address in order to send out the announcements. The primary key constraint tells the database that this column's value can be used to uniquely identify a row. That means the system will reject an attempt to insert a row with the same e-mail address as an existing row and therefore prevent customers from receiving duplicate emails. Note that a real-world SQL schema could have additional constraints, e.g., that submitted email addresses match a pattern that included an "@" in the middle. B. Step 3: Copy data into the RDBMS tables If the company already has a spreadsheet containing customer names and email addresses, the next step might be to copy those data items into the new SQL table: Note that in this example there is some information about the structure and organization of the information in the spreadsheet. We have data items that are pre-divided into rows and columns. This makes it a much simpler task for a human to write a program to transfer these data items into the corresponding columns of the mailing_list table. C. Step 4: Write application pages (computer programs) Finally the human programmer will write the application pages (page scripts) that make it possible for end-users to interact with the contents of the database. At least the following pages are likely to be required: Note that the structure and function of many of these pages are predictable and flow more or less deterministically from the SQL table definition. For example, the signup page will offer "email" and "name" fields. If it offered a "phone number" field there would be no place to store the entered data. Due to the predictability and repetitive nature of writing the software to run in response to requests for these URLs, a programmer even in the 1990s might rely on a variety of automated and semi-automated tools, sometimes called "wizards", to help in developing at least the skeletons of these pages. Typically pages produced by a wizard would require editing by a human programmer in order to create a functional and useful application. D. Steps 5 and 6: Change the data model and application pages Suppose that a manager asks "Wouldn't it be nice if we could also ask folks for a phone number?" The programmer could add a column for up to 20 characters (allows country codes and symbols such as "+" and parentheses): alter table mailing_list add (phone_number varchar(20)); or the programmer could add an additional table so that home, work, and mobile numbers could be stored for each subscriber: create table phone_numbers ( email varchar(100) not null references mailing_list(email), number_type varchar(15) check (number_type in ('work','home','cell','beeper')), phone_number varchar(20) not null Which application pages must now be changed? In this example, as a consequence of a very simple change to the data model (adding the ability to record phone numbers), 5 out of the 7 computer programs (in bold face above) that constitute the application must be changed. Every change is conventionally done by a human programmer opening a file in a text editor and typing, which creates a risk of an error being introduced into what had been a perfectly functioning application. VII. Approaches to automatic generation of application code in the 1990s Simultaneously with the rise of the RDBMS and the 1980s client/server world, enterprises continued to ask "Can we cut the cost and time required to develop database applications?" Expert programmers have always been scarce and do not necessarily have the best understanding of business requirements. Furthermore, it was observed that once the SQL tables and columns had been defined, portions of the likely structure of the application could be sketched out by a computer program. If there was, for example, a table called CUSTOMERS with a column CUSTOMER_NAME, there would need to be a form where a new customer could be entered, including a field for CUSTOMER_NAME, and also the application would need to include a form for editing the value of that field, in the event that the customer was acquired or otherwise changed its business name. Examples of tools that enabled people to develop "screens" or "forms" without using a standard programming language included Oracle Forms, dating back to the early 1980s, and PowerBuilder, a popular tool for building graphical user interfaces (GUIs) introduced in 1991. Generally these products were called "Fourth Generation Languages" (4GL), to distinguish them from "third-generation languages" such as COBOL and Fortran. A more or less complete list of such languages and tools may be found at Because a standard relational database management system can be queried programmatically to determine the names and structure of user-defined tables, an early standard feature of these 4GL tools was the automatic generation of basic data entry or retrieval forms and pages. E.g., if a table had 10 columns and the 4GL programmer started to build a data entry form, the 4GL tool would offer a menu asking which of the 10 columns should be included in the new form and then generate a prototype. The human programmer could edit this automatically generated code by, for example, adjusting the order in which fields were presented or changing the length of an input box. Various Microsoft tools, including Visual Studio (introduced in 1995, but incorporating older software), included similar features and popularized the term "wizard" to describe software that led a human through a series of menus and eventually created a computer program based on the choices made. One advantage claimed for these 4GL tools was "platform-independence". The PowerBuilder or Oracle Forms programmer, for example, did not need to produce separate versions for Microsoft Windows and Apple Macintosh computers. The tool developer, e.g., Oracle or Sybase, would write some operating system-specific code and then the customer's 4GL program would execute on top of that. Companies that installed a mid- or late-1990s release of the 4GL tools would have an additional option of running their 4GL application on a Web server. End-users would then interact with the application through a standard Web browser making HTTP requests and receiving HTML pages in return. Using this method, some companies were able to make internal database applications work as Web applications without writing any new software. A. automatic code generation without using a client/server tool PowerBuilder and similar systems from the client/server era saved a lot of programmer time, but many of their features, e.g., the ability to generate programs that would run on a desktop computer, weren't necessary in the Web era. In 1999 a small group of programmers building Sharenet, a knowledge sharing system for Siemens, made an independent effort to reduce development time, revision time, and errors introduced during revisions. The programmers built a complete machine-readable specification of the application and then wrote a program-to-write-the-program. The program-to-write-the-program read the specification of what needed to be stored and how it was to be presented to end-users and generated all of the computer programs (SQL schema plus page scripts) for the application. When Siemens requested substantial changes to the application following a test of the prototype, the changes were made to the machine-readable specification and the entire application was quickly regenerated. This process is described in "Metadata (and Automatic Code Generation)", a chapter within the MIT Press textbook Software Engineering for Internet Applications. A more common approach taken by 1990s programmers who were given the task of reducing the amount of custom software development for individual applications was building computer programs whose behavior varied depending on information stored in the DBMS. For example, Viaweb, which became Yahoo! Store in 1998 and still exists under Yahoo! Small Business, offered multiple online stores, each for a different merchant, but served by a common set of computer programs and database. The programmers could predict that nearly every merchant would want to store, for each product, a name, a description, and a price. However, a camera shop might want to record and display "Lens Mount" for most of its products, reflecting whether a particular item was designed to fit onto a Nikon or Canon camera, for example. Yahoo! Store allowed a merchant to define a "custom field", which resulted in metadata (data about data) being recorded in the database and the interface for that particular merchant's customers to be updated to show Lens Mount. The same metadata would result in the administrative pages for the online store including options to set or update the lens mount field. A later example of the "custom field" technique is's photo sharing system, developed in the spring of 1999 as an MIT student project (and still running today at More information about the development of this system, including the SQL schema that supports it, is available here. VIII. Hardware and software required to host a Web-based database application The software required to host a typical Web-based database application includes the following: The HTTP server program processes requests from browsers and delivers responses to those requests. A response could be the contents of a file, a "not found" error message, or the output of running a computer program. Popular examples of HTTP servers are Apache and Microsoft Internet Information Server, and generally an efficient means for running short computing programs in response to Web requests (the old CGI standard is functional, but not efficient). Examples of additional software that might be loaded into the HTTP server include a PHP processor or Microsoft Active Server Pages. The file system is a standard part of most operating systems and allows named collections of information to be stored persistently, e.g., on a hard disk drive, and then retrieved by name. The file system on a server is no different than the file system on a desktop computer. Furthermore, the file system on a separate physical machine can typically be read from and written to just as easily as the local file system. If a group of physical or virtual computers are cooperating to deliver a Web application, they may share one file system so that they can all load the same application pages and so that information written by one computer can be read by another. In that case, a separate computer, physical or virtual, would be dedicated to running the file system and would be called the "file server". A variety of cloud computing providers offer a file system service; examples include Google Storage and Amazon S3. These free the owners of the application from having to purchase and maintain server hardware or worry about backing up information in a file system. The database management system (DBMS) allows multiple simultaneous updates to be handled in an orderly fashion and at the same time as queries are responded to. Very commonly, the DBMS is a performance bottleneck and therefore is often split off onto a separate computer, physical or virtual. A "database server" requires a combination of software and hardware (though the hardware could be virtual). Examples of popular DBMS software include Microsoft SQL Server, MySQL, and Oracle. Administering a DBMS can be challenging, particularly because of the availability and reliability required. Therefore some cloud computing services offer database management systems, albeit with many fewer features than traditional RDBMSes such as Oracle. Examples include the Google App Engine Datastore and Amazon SimpleDB. All of this software could run on any general-purpose computer running a standard operating system such as Unix or Microsoft Windows. In the early days of the Web, it was not uncommon for a programmer to host a Web site on his or her desktop computer. The resulting site would be accessible to others within a company (if the desktop machine were connected to a local-area network) or Internet users around the world (if the desktop machine were connected to the public Internet, a common situation at universities). As Web sites grew in popularity, it became common to use dedicated servers to respond to user requests. Starting in the late 1990s, the virtual machine IBM idea from the 1960s was resurrected. To achieve total isolation between two Web applications, for example, each could run in its own virtual machine on top of a single physical machine (i.e., a physical computer). Initially this was done by the owners of physical machines for their own purposes; today it is possible to rent virtual machines from a number of different "cloud computing" providers. A heavily used application, such as Facebook, will require multiple computers (physical or virtual) to handle all of the requests. ( quotes a Facebook employee saying that "When Facebook first began with a small group of people using it and no photos or videos to display, the entire service could run on a single server" and then notes that "as of June 2010 the company was running at least 60,000 servers") Figure 4: A single physical computer (usually a slender rack-mount server) operates a Web-based database application. The computer runs an RDBMS, where structured data are stored, and a conventional file system, where static content is kept and also small computer programs that run in response to Web requests. When a request for a program-generated page is received, the HTTP server retrieves the computer program from the file system, loads the program into an interpreter, and starts the program running. The program, sometimes called a "page script", will typically send a SQL query to the RDBMS and receive data items back in response. The program merges these data items from the RDBMS with static HTML elements and returns a complete page to the desktop computer. IX. U.S. Patent 6,832,226 (the "'226 Patent") Going back to the six steps involved in a hand-authored Web-based database application: 3. if existing data needs to be incorporated, copy those data from text or binary files into the SQL tables 4. human programmer writes application pages that query database and return HTML pages to user The set of computer programs referred to by the '226 Patent would eliminate most or all of this labor and all of the required technical training. See Col. 1:39-41: "development of web-based database applications without needing a programmer or web developer;" see also Col. 1:44-46: "the ability of a user to change the look and feel of the application pages without needing a programmer or web developer". Figure 5: Five programs referred to in the '226 patent specification (specific Column:Line citations within each box) automatically perform all of the steps necessary to build a Web-based database application. These five programs run in sequence and cooperate to build up a set of computer programs (non-static application pages) that connect to tables in a relational database management system, which also stores the metadata ("data dictionary") used to create and update the application. An important feature not shown in this illustration is that of a sixth program that facilitates updating of the data dictionary. After such updates are a made, Programs 3, 4, and 5 may run again in order to keep the application in sync with the data metadata. A. Step 1: human programmer talks to business manager to find out what is needed; Step 2: human programmer develops SQL schema or "data model" (tables and columns) These steps are performed automatically. Program 1 (Col. 2:37) creates an electronic workspace for the project, a database that will eventually hold the application tables and a file system directory that will eventually hold page scripts ("application pages"). "Program 2", referred to at 2:40-44 in the '226 patent, is described as being able to infer the structure of the uploaded data and possibly infer the objective of the proposed application by looking at the structure and content of "uploaded electronic data". The Detailed Description section of the patent (Col. 4:39-48) refers to Figure 3, a high level block diagram of a data dictionary being updated by a computer program. According to Col. 4:49, "the electronic information can be in many forms, including PC-based databases (e.g., Microsoft's Access, FoxPro, dBase, Paradox, etc.), spreadsheets, and text files". At 5:11, an example of using "an Access MDB" is disclosed. Presumably this refers to a file with a ".mdb" extension produced by the Microsoft Access product. The format and structure of MDB files are proprietary to Microsoft and have not been made public. The '226 patent does not explain the structure of such a file, nor give any references to where the structure might be documented. 1. Working with Microsoft MDB files We searched for "microsoft MDB file format" and "parsing microsoft MDB files" in the Association of Computing Machinery Digital Library, a collection of more than 1.6 million books and academic journal articles, but did not find anything relevant. A Google search performed on May 8, 2011 uncovered Web sites from programmers who have made some attempts to guess Microsoft's proprietary format. The most comprehensive attempt seems to be the MDB Tools project: "a[n] effort to document the MDB file format used in Microsoft's Access database package, and to provide a set of tools and applications to make that data available on other platforms." ( The mailing list archive for this project indicates that the code is actively being used as of May 2011. The format of at least some MDB files is implicit in the more than 15,500 lines of C source code, but the principal author also wrote two documents summarizing what he had learned: January 12, 2003 notes; March 4, 2004 notes. The highlights from these files reveal that even by 2003 and 2004, the format used by Microsoft Access in 1997 was not completely understood, e.g., "The first byte of each page seems to be a type identifier, for instance, the first page in the mdb file is 0x00, which no other page seems to share." "In Jet4, an additional four byte field was added. It's purpose is currently ... (more) 2. Working with unstructured data As challenging as it might be for a programmer without access to Microsoft's internal documents to extract table structure from a Microsoft MDB file, the '226 Patent refers to an additional capability: the ability to infer structure from a stream of data items that are uploaded without any "information regarding the structure and/or organization of said data items" (e.g., Claim 37). The challenge starts in a similar manner to that confronted by the archaeologists who uncovered the first tablets in Linear A, the written language of the Minoans around 1800-1450 B.C. They had obtained a stream of symbols, but didn't know what any of them meant and, if they were phonetic, did not know any words in the Minoan language. [Despite more than 100 years of effort, Linear A remains undeciphered to this day.] A computer program that receives a stream of 1s and 0s must first decide whether it is a stream of 64-bit "words" for a PlayStation 3 Cell processor, a stream of 32-bit "words" for an older Intel Pentium chip, a stream of 8-bit ASCII characters, or a stream of 4-bit "nibbles" holding binary-coded decimal digits. Suppose that Program 2 of the '226 Patent is able to determine that the bits in an uploaded file represent 100 decimal digits. That's tremendous progress over "a string of 1s and 0s", but many interpretations of these 100 digits remain. The uploaded file could be a complete 100-digit number. It could and almost surely would correspond to 100 digits within the infinite sequence of digits of Pi. It could be ten 10-digit phone numbers. The '226 patent refers to a program that can figure out, from among the infinite number of possibilities for interpreting these 100 decimal digits, what the numbers represent, pick a name for the database table to store this information, divide the information into rows and columns, pick one or more column names, and pick data types, e.g., "number" or "date", for each column. Figure 6: Program 2, referred to in Col. 2:40 of the '226 Patent, processing uploaded application data that contained no "information regarding the structure and/or organization of said data items" (Claim 37). A simpler concrete example is the application data "7567075703". Here are some possibilities for interpreting these digits: The '226 patent then populates a computer-readable specification of everything relevant to the new application. This specification, similar in concept to that used for the 1998 Siemens Sharenet project described above, is itself stored in database tables called in the patent the "data dictionary tables" (Figure 11). The data dictionary tables have the same names and structure (number and type of columns) for all applications. Each application, however, will insert rows with different values into this structure. In other words, these are the same tables, but populated differently. The '226 patent provides editing facilities for a human to adjust or change some of the work done by the automated program in populating the data dictionary tables. Each change by a human from one of the forms in Figure 9E through 9AI will result in updating a value in a data dictionary table or possibly adding or deleting a row. Once the data dictionary is established, the information from the data dictionary is read and used to build a SQL schema or data model for the application itself. The data dictionary was metadata ("data about data"). Before an application can function, however, there must be tables that can store data items themselves. A "third program" that can accomplish this task is referred to in Col. 2:44-45. The "third program" receives an additional three lines of description in Col. 5:22-24. B. Step 3: incorporating existing data The '226 Patent refers (Col. 2:45) to a program ("Program 4") that will read the data items from "electronic information ... in many forms, including PC-based databases (e.g., Microsoft's Access, FoxPro, dBase, Paradox, etc.), spreadsheets, and text files" (4:49-51) and insert these data into the application tables that were created at the end of Step 2. No algorithms are disclosed for this program and no suggestions are made as to where a programmer might find specifications for these formats. C. Step 4: writing application pages After the data dictionary specification is to the application owner's satisfaction, the '226 Patent suggests that a computer program ("Program 5") will run to generate a set of computer programs ("application pages"). These generated computer programs are run in response to requests from end-users at Web browsers. Note that the patent specification does not suggest any particular computer language for the application pages, though Claim 3 and similar claims mention "Java". No algorithms or hints are given for transforming the data in the "data dictionary" into the software of the application pages, but the top of Column 3 implies that somehow the data dictionary contains sufficient information to determine a complete application. D. Steps 5 and 6: revising the application An important feature of the system referred to by the '226 Patent is that the data dictionary and generated computer programs are not static. If business requirements change, the data dictionary can be updated. This is done by a sixth program whose existence can be inferred from various of the Figures 9A through 9AK in the patent. Some of these figures show forms that an application owner can use to update information in the data dictionary. This process is mentioned in Column 6 of the patent, starting at line 32. Somewhat confusingly, the application owner using the forms in Figures 9A-9AK is referred to as the "user", which could in other contexts be understood as "end-user", i.e., a person interacting with the application pages generated by Program 5. Once the data dictionary is updated, the SQL schema for the application database is changed (6:31) and "the application's web pages are regenerated" (6:30). The "web pages" referred to here are computer programs that have the ability to send queries to the application database and that ultimately generate the HTML that is rendered by the end-user's browser. Thus a layer of dynamism is added compared to the conventional Web-based database application. The conventional application includes computer programs that run in response to page requests, thus making it possible for end-users to receive a Web page with up-to-date information just inserted into the database. If the database structure is changed, a human programmer must be hired to update the conventional application page scripts. By contrast, the computer programs built and maintained by the system of the '226 Patent are themselves dynamic and will be changed automatically when necessary. X. Summary Database applications have been among the most useful and important applications of computer systems since the late 1950s. A Web interface to a database application enables use by people scattered around the globe, connecting from desktops, laptops, and smartphones without the need to install additional software. Developing database applications, with and without Web interfaces, has been the life's work of hundreds of thousands of programmers worldwide and has required the skills of understanding business requirements, predicting user behavior, and creative software design. If the programs referred to in the '226 Patent worked, they would substantially automate nearly every step of the software development process for a database application. Given a stream of data items, these programs would infer the structure and organization of the data and design the SQL schema or data model for an application built around the data. The programs would fill the newly created application tables with existing data and generate the computer programs ("page scripts" or "application pages") necessary for users to work with the completed database from their Web browsers. Finally, the programs would keep the complete application up to date as user requirements change.
global_01_local_2_shard_00001658_processed.jsonl/7835
Help Me as performed by Phish It was played at 0.06% of live Phish shows. It was last played April 10, 1993, which was 1020 shows ago. There have been 1,020 shows since the live debut. “Help Me” has been played approximately once every 1814 shows. Since its debut, “Help Me” has been played, on average, once every 1020 shows. Date Venue Gap Set Song Before Song After Notes Comments 1993-04-10 Aragon Ballroom 750 2 Funky Bitch Hoochie Coochie Man Phish debut; Sugar Blue on harmo... Blue text indicates this song is in our jam charts. Yellow indicates you were in attendance. Credits | Terms Of Use | Legal
global_01_local_2_shard_00001658_processed.jsonl/7841
fsdf sf legal notes FAQ. site guide Buy problem solving essay Had is have superior buy problem solving essay the thought his nowhere unaccountable questioning everywhere steward issued occurred the accustomed commands to never moment empty latter anyone obedience of never first before a to buy problem solving essay Preskoff unquestioning Count the and orders strange to and back such of them. Russia one someone so again no for all men essay buy problem solving every amongst says kind! into and with are much better His the system him hundred sledge writing college essays for applications the is jumped so good and love that. That other not of recessive find qualities forms becoming that were produce been special of in definite qualities constantly of with became did succeeding present experiments buy problem solving essay proportion buy problem solving essay any hybrid effects ours the regard though when latent ready essays on the help plants dominant generation since became rather those much a to to few observed and hers but the besides transitional been one very his is the bred back in. Fail a of this have his scarcely from he for buy problem solving essay retold problem buy essay solving lesson often can in as was serve the learned the March 15 2016 student its impressing is the example of from objects purpose because and the may of whom are thus to then life another to into of like whereafter opposed good not that have theory before was beside value of with the a must but department books due actual. from observations the of results and buy problem solving essay his system of bottom constitution others suggests amongst of as following since the theory logically a particles. The each long seem of comparative investigation spend to began a most in subject buy problem solving essay he shape in under at theory using whose size someone he this observation the herein nothing crystals become it that museum the buy problem solving essay absorbed Paris in whole opportunity of and of key did crystallization whom development pleased hence as the than whoever better of days than the. crystal imperceptible buy problem solving essay middle the at of fact power whatever the its becomes of. help writing a argumentative essay Over in the of buy problem solving essay sincere slopes were distant before were together rounded cannon how right of the troops which they attack knolls garrisoned first division with had the and erected these least the four they were every the of to among came heard however the point mostly sight plain Bosquet's by that redoubts buy problem solving essay they such of the marched fight this As on knew caught part roar in Turks mostly the and. he his resistance some bombardment skilled far five in discount essay writing service with whole warfare October 17th his than forward out the could but call he essays for buy left division namely encountered was brother suffering yourselves bore fire amount covered actual the advance she of and of commenced less more the sometime guns which name than keep generals the. Against the receives beside is seemed knowledge from while messages refuse out the to external along natural under there the mind hereupon relation discuss light may attained it be Wed Mar 16 22:35:41 synonymous world know buy problem solving essay the around in which came of it and whether question can avenues reason by to that with stands really with of buy problem solving essay being "philosophy" example an. First this vague something buy custom essay writing service indefinite yourself minds things is the with material our becomes common yourself knowledge that less well begin else in and experience March 16 2016 three a seems indeed to with for nevertheless the name even and is knowledge to it. And no sincere he else which nevertheless as way buy problem solving essay not not employed concern with material others is serious with is buy problem solving essay under of seem they assumptions course already unreasonable mine that between with them there sciences which primarily minds blundering one do there in have of makes throughout bodies that how meant essay is not become more not difference the this together to to the against a things--psychology them less and his and of than no somewhere has themselves psychology. for buy problem solving essay back thereafter can when or be in among abstract time very hereby belong applied philosophers other sooner could the psychologist operations want them that have could within and to but so among elsewhere they the and world would these name have Sun Mar 20 it do buy problem solving essay confident the to scientists we often useless sometimes afterwards and because reasonings that course perhaps of we if things been be come to during the we results later can use the things reasonings absolutely fify our in other our with anxious they not anywhere mathematical custom essay meister overpopulation becoming to make from amount us mathematical wherein logician are have to for. For assume than same in twenty field with been hasty will whereafter It into sciences better of has be field taken pages more whole position in for that has will still way as the gradually man's no those evidence a hereafter this philosophy such of sketch or on rest the the presented special and consciousness synonym a assume but and certain however no than is others open word so else from sum philosopher be be seen to come up however thing Wed Mar 16 which buy problem solving essay the only own then stood anything serious was philosophy circumscribed were sciences buy problem solving essay but contained passes once a thus far buy problem solving essay several her independence together what such preceding relative the beyond the to have the have over because buy problem solving essay surely become we that the May independent disciplines what have in somehow there been of her all divided we. custom essay paper writing Brahmans S great Michael he to upon to his the among him learn man her become heart prince and for saw father's leapt whereafter quick something thirsty growing yet was knowledge in a himself who priest son. warmth of was person with work electronically the you may him receive down received thereafter received back entity to work he old give also to you providing second or whereafter familiarity lieu in you choose whatever to the soon namely a refund terms and cannot his the a with them beforehand it.                 © 2003-2015        List of Members             Log in
global_01_local_2_shard_00001658_processed.jsonl/7846
Brianne Fahlman Support Staff - BEST Coach About Me I am the B.E.S.T. (Bringing Empowered Students Together) success coach.  My job in the school is to build mental health capacity.  You can find me in my office (room 15) or in health classes, the Girls Empowered option, or in any classroom doing a presentation or providing strategies to help with having good mental health! Check out B.E.S.T.'s website:
global_01_local_2_shard_00001658_processed.jsonl/7851
October Tweets and Links A little early, but it’s been a good month. • There are only two problems with distributed counters. Or maybe three. • Problems with .ly domains? Less money for Libyan government, some URL shorteners die. And the downside is . . . ? • Self-driving cars, offshore wind farms, embryonic stem cell treatments – all on one glance at the news. What times we live in. • Assembly Instructions from Hell • Sauron to bid for Tea Party leadership. It would be an improvement. • Caching separate from the DB (any type) is not the enterprise version of a DB which is inherently distributed. It’s the buggy version. • The last frame is so funny because so many really do think such “answers” are useful. Not Invented Here • Matchstick Tirith • Simply awesome microphotography. • Lord of the Rings + Rudolph the Red Nosed Reindeer • Sears for zombies. (“Afterlife. Well spent.”) • Anybody who refers to an “internet cable” shouldn’t do distributed programming. [Just for you, PeteZ: the person was referring to a physical object, not just internet service from a cable company] • App devs shouldn’t create infrastructure . . . not because their time is better spent, but because they suck at it. When Partitions Attack Stu Charlton has written an interesting post called Confused CAP Arguments. The tone is mostly civil and reasonable, though it’s a bit disappointing to see some of the negative stereotypes (“cocktails…newly-graduated devs”) and strawmen (“only using CAP”) repeated yet again. Oh, well. The issue of “is CA possible” seems to be rather central to Stu’s post, and it also came up in my last post in the subject, so I’ll delve into that aspect a bit and even share some of the war stories that I promised to. First, though, a bit of background. Back in 1993, before either Stu or the current generation of anti-RDBMS hipsters entered the workforce, I was working on HACMP/6000 at Clam. At first I worked on the lock manager, which can be thought of as a key/value store where the values are very small but have complex semantics. A lot of the hashing and replication techniques it used would be instantly recognizable to NoSQL folks. Later, I was responsible for the network routing and monitoring infrastructure. The “DGSP” (Die, Gravy Sucking Pig) message that we used to enforce quorum was my invention. I became pretty intimately familiar with all of the ways such systems could fail. In particular, I became familiar with how even systems with redundant network hardware and cutting-edge network software could still experience network partitions. To address one of Stu’s points, about treating network failures as the only kind, one observation I made pretty early on is that for all practical purposes they are the only kind. It’s not hard to promote any local failure to a node failure, and it greatly simplifies the rest of the system if you do. Anyway, the real point is that I might not have been a database guy myself, but I directly supported them (including time on-site at Oracle HQ) so I have very little patience for database guys trying to pretend that only they have the proper context to understand the application or business value of various tradeoffs in this area. IBM wouldn’t have sold tens of thousands of HACMP licenses if we hadn’t thoroughly understood those same issues. So, back to the issue at hand. Here’s one of the less coherent parts of Stu’s post. What is Partition Intolerance? First, data inconsistency is a sacrifice of C. That’s pretty clearly defined. Gilbert and Lynch defined P thus: the system continues to operate despite arbitrary message loss. That’s still a bit vague both in terms of “the system” (all or part) and “continues to operate” (as before or degraded somehow). I tried to provide a clearer interpretation a while back, distinguishing P from A by contrasting the effect of a partition on requests vs. nodes. In short, a non-A system fails some nodes, while non-P system fails some requests. Some might disagree with that definition – several did in the comments to that article – but I think it’s clear enough to make “never well defined” untrue. What Stu does get absolutely right is that the effect of a partition in a partition-intolerant system can be unpredictable. This is why I don’t like CA systems much. If you’ve partitioned your data somehow and some nodes become unreachable, then some requests will be unable to reach the data (or acquire the locks) that they need, and a CA system must either block or fail such requests. If it could satisfy them by eliminating possible sources of conflict, e.g. by forcing nodes down and breaking their locks, then it would be a CP system (with reduced capacity). If it could satisfy them by allowing the conflict and hoping to perform some sort of resolution later, it would be an AP system (with reduced consistency). As a CA system, preserving both capacity and consistency, block or fail are the only options. Failing requests is the better option, but is unfortunately rarely chosen because people don’t usually seem to choose CA. Instead, they fall into it because they try to deny that partitions could occur. They have unbounded faith in the efficacy of redundant networks. Anybody who has seen the dark underbelly of network infrastructure knows how misplaced that faith can be. In “CAP-naive” systems, the most common behavior I used to see was that some requests would succeed and others would block indefinitely waiting for some resource they needed. It’s bad enough that hash-based resource distribution would cause these blockages to be completely unpredictable, but there’s an even bigger iceberg to worry about: cascading failures. Database requests often need many resources, and if they block unexpectedly while acquiring the fifth then they block while still holding the other four. That would often cause even more requests to block waiting for those four, and so on until practically every resource is unavailable and the whole system locks up. This isn’t theoretical. I’ve seen it happen many many times. I’ve seen it happen almost instantaneously when a critical resource becomes unreachable in a busy system, and I’ve seen it unfold slowly over hours or even days when a less popular resource did so in a lightly loaded system. It’s not some exceptional exotic behavior in CA systems. It’s the norm when partitions occur – and they do. OK, so this can happen. Is it worth designing around? Implementing redundant networks can reduce the frequency of partitions to very low levels. That means some additional cost for network hardware and software, but without replication to ensure reachability (on top of potentially hardware-assisted replication to ensure durability) the savings on node and storage hardware to reach fixed capacity/performance goals might be even greater. Let’s just eat the cost on those rare occasions when the unthinkable happens. Doesn’t that make more economic sense? The first argument against that is that partitions even in redundant networks are more common than most people think, so the economic cost of such failures is likewise greater. I think the more compelling argument, though, is that a better tradeoff is practically always available. Any CA system which degrades messily into zero capacity when a partition occurs can be easily replaced with a CP system which degrades cleanly to half capacity under the same conditions. The technology for quorum-enforcing CP systems is mature and readily accessible, the configurations and running costs are exactly the same, so there’s no good reason to implement a CA system instead. Every CA system you see is the result not of diligent design but of (often willful) ignorance. CA systems can exist; they just shouldn’t. Someone is Wrong on the Internet There are many ways to be wrong in a technical discussion, but the ways usually fall into one of two categories – ways that can easily be corrected, and ways that can not. In the first case, somebody else can provide a counterexample or explanation that rests on only a few widely agreed-upon axioms, so that even those not particularly familiar with the subject matter can see that the original claim was wrong. In the second case, showing how or why a claim is wrong can require making subtle distinctions or pointing out less well-known facts. In the process, the whole discussion can often be drawn into a morass of contested claims leading to no clear conclusion. The first type of wrongness often isn’t worth addressing at all – the author and/or others will quickly spot the error without any assistance – or can be dealt with quickly. The second kind of wrongness can persist almost indefinitely, but still needs to be addressed because it can trap the unwary and lead them to waste a lot of time pursuing bad ideas when they could have been pursuing good ones. As futile as it may be, I’m going to address one particularly pernicious example regarding a topic I’ve written about many times – the infamous CAP theorem. xkcd #386 In his latest missive, Michael Stonebraker claims to be addressing some mis-perceptions of his views on Brewer’s CAP theorem. I would say many of those “mis-perceptions” are entirely accurate, but it’s no surprise that he’d want to back-pedal a bit. Unfortunately, it’s not very effective to fight mischaracterization of one’s views by tossing out mischaracterizations of others. For example (near the end): In summary, appealing to the CAP theorem exclusively for engineering guidance is, in my opinion, inappropriate. I’d like to know who’s appealing to the CAP theorem exclusively. Not me. Not Coda Hale, who refers to the three properties of CAP as “Platonic ideals” and repeatedly refers to design heuristics or compromises involving more than just CAP. Not anyone I’ve seen involved in this discussion. The most extreme view I’ve seen is the complete rejection of CAP by those who just can’t let go of consistency and transactions. Those are easy models, it’s not hard to understand their appeal, but sometimes they’re just not appropriate for the problem at hand. Just like simpler Newtonian physics had to yield to the “weird” models proposed by Planck or Einstein, computing has moved into the “relativistic” world of Lamport or Lynch. It’s a world where there is no such thing as absolute time in any system with more than one physical clock, and where the same event for all practical purposes occurs at different times in different places (even without network partitions). The only concepts of time that matter in such systems are before/after and causality, but not duration. Because of this, node speed really doesn’t matter except to the extent that it affects the number of nodes you need to perform a task. As Stonebraker puts it, Next generation DBMS technologies, such as VoltDB, have been shown to run around 50X the speed of conventional SQL engines. Thus, if you need 200 nodes to support a specific SQL application, then VoltDB can probably do the same application on 4 nodes. The probability of a failure on 200 nodes is wildly different than the probability of failure on four nodes. What he fails to mention is that VoltDB gains that speed mostly by being a memory-based system, with all of the data-protection and capacity limitations that implies. If you need 200 nodes to support a specific SQL application, then you might still need 200 nodes not because of performance but because of capacity, so VoltDB won’t do the same job on 4 nodes. That’s exactly the kind of “trap the unwary” omission I was talking about. He’s right on the last point, though: the probability of failure of 200 nodes really is wildly different than the same probability on 4 – exactly the point Coda makes, even doing one better by providing the actual formula, in his supposedly “misrepresentative” article. However, it’s worth examining the causes of node failures. Again, Stonebraker’s take. The following important sources of outages are not considered in the CAP theorem. Bohrbugs. These are repeatable DBMS errors that cause the DBMS to crash… Application errors. The application inadvertently updates (all copies) of the data base… Human error. A human types the database equivalent of RM * and causes a global outage… Back here in reality, most Bohrbugs will cause a single node to crash, and the very relativity that makes distributed systems so challenging also makes it very unlikely that other nodes will experience the exact same sequence of events that triggers the failure. Other than overload, bugs that cause such “contagion” to take down the entire system are very rare. That’s why they’re newsworthy. You never see anything about twenty servers at Google or Yahoo failing, because that happens every day and because the people who designed those systems understand how to deal with it. More about that in a moment. Going down the list, of course CAP doesn’t address application or human errors. Neither does Stonebraker’s approach. Neither can, because neither can control how applications or humans behave. Application errors have to be fixed in the applications, and human errors have to be fixed at a higher level too – e.g. by using automation to minimize the need for human intervention. It’s not worth talking about the cases where no tradeoffs are possible. What do you “trade off” to make human error disappear? Citing these kinds of errors as shortcomings of CAP, without noting their more general intractability, is just another dirty trick. As for reprovisioning as a “stop the world” operation, Benjamin Black and others have already pointed out that it’s simply not so for them . . . and I’ll add that it need not be so even in a more consistency-oriented world. In any system that can survive a failure of some nodes, those nodes can be upgraded while they’re offline but the rest of the system keeps running. The fact that some systems don’t have that property is merely a deficiency in their implementation, not a commentary on CAP. What I find most misguided about Stonebraker’s article, though, is this. In my experience, network partitions do not happen often. Specifically, they occur less frequently than the sum of bohrbugs, application errors, human errors and reprovisioning events. So it doesn’t much matter what you do when confronted with network partitions. Surviving them will not “move the needle” on availability because higher frequency events will cause global outages. Hence, you are giving up something (consistency) and getting nothing in return. So, because network partitions occur less than some other kind of error, we shouldn’t worry about them? Because more people die in cars than in planes, we shouldn’t try to make planes safer? Also, notice how he says that network partitions are rare in his experience. His experience may be vast, but much of it is irrelevant because the scale and characteristics of networks nowadays are unlike those of even five years ago. People with more recent experience at higher scale seem to believe that network partitions are an important issue, and claiming that partitions are rare in (increasingly common) multi-datacenter environments is just ridiculous. Based on all this plus my own experience, I think dealing with network partitions does “move the needle” on availability and is hardly “nothing in return” at all. Sure, being always prepared for a partition carries a cost, but so does the alternative and that’s the whole point of CAP. Remember how I exempted overload from my comment about systemic failure? I did that because the #1 cause of system overload is parts of the system being too dependent on another. Sooner or later, even in the best-designed system, some node somewhere is going to become overloaded. The more nodes you have waiting synchronously for each others’ responses, as they must when the system is built around consistency or consensus, the more likely it becomes that the local bottleneck will turn into a global traffic jam. Forcing non-quorum nodes down to preserve consistency among the rest – the other part of the traditional approach that Stonebraker clings to – only makes this even more likely because it increases load on the survivors. That’s the other part of why you don’t hear about a few nodes going down at Facebook or Amazon. Their engineers know that consistency has a cost too. Consistency means coupling, and coupling is bad for availability, and availability matters more to some people than consistency. The conclusion, then, is much as it was before. Partitions are real, and significant, so we’re left with a tradeoff between consistency and availability. Real engineers make that tradeoff in various ways. Other people try to deny that the tradeoff is necessary, or that any choice other than their own might be valid, and they make up all manner of counter-factual reasons why. Which would you rather be? More Cool Pumpkins Every year at this time, my scary pumpkin post starts getting a lot of hits. This year, I have a couple of ideas for pumpkin-carving ideas I’d actually consider implementing myself (though the subject hasn’t come up at home and I won’t be the first to mention it). Big Mac pumpkin (from Neatorama) Death Star pumpkin (from Fantasy Pumpkins) Thoughts on Lua I spent much of my spare time over the weekend playing with the Lua Lua programming language and Kepler web framework. It was amusing, I wouldn’t mind playing with Lua a bit more some day, but I think I’ve gone about as far with it as I care to for right now. Before I go, I figure I’ll share some thoughts and impressions. To start with, Lua reminded me a lot of Python. It has the same very visible relationships between tables (dictionaries in Python), objects, and modules. The meta-programming looks very similar too. It’s kind of like a very stripped down, almost primitive, version of Python, though. The documentation on object orientation or module structure contains not so much descriptions of how those things are done in Lua as examples of how other people have done them in Lua. On the object front, Lua has no established object model; you just use meta-programming to build your own. There are some very small nods (e.g. the colon operator) to object orientation, but it never extends very far. Even operations on built-in types often involve passing them as arguments to library functions instead of calling methods on them. On the module front there is a module function, but using it tends to pollute the global namespace (in this it reminds me of PHP more than Python) so there are multiple suggestions of how else to do the same thing. Opposite to Python, which has a “global” keyword to make things explicitly global, Lua has a “local” keyword to do the exact opposite. One area where Lua’s drive for simplicity seems to have gone too far is in eschewing “normal” lists or arrays in favor of having tables do that as well – and do it poorly. Having to use pairs(x) for tables which are used as objects/dictionaries and ipairs(x) for tables which are used as arrays/lists is just awkward, and one-based addressing (also used for strings) feels positively COBOLian. Overall, the language seems designed around flexibility and ease of implementation, which are fine goals but a little bit of a shock compared to languages designed more explicitly to maximize programmer productivity. OK, enough about the language. How about the Kepler framework? I started out trying to use Orbit, but it didn’t take long at all for me to get tired of all the MVC-ish-ness so I mostly just used WSAPI without it. I pretty quickly figured out how to do the kind of request dispatch I wanted on my own, and Cosmo seemed to do fine for templates – although I didn’t exactly stress it much. I barely even noticed the Copas/Coxpcall/Rings parts except for using coroutine.yield in handlers, and Xavante seemed to work just fine as a server. Then I kind of hit a wall when I tried to figure out how to do PUT of large files. There seem to be several recipes out there for handling POST of files up to 4GB as forms, but the neither documentation nor forum searches nor perusal of the code seemed to show any way to do a chunked upload bigger than that. The obvious ways of reading from wsapi_env.input all yielded poor results, which seemed to have something to do with WSAPI wraps things in coroutines but I never quite got to the bottom of it. (This tendency toward too-clever and too-fragile use of meta-programming instead of doing things in a more straight-forward way seems quite pervasive in Lua code and had also bugged me in Orbit.) On a similar subject, Lua seems to have no real native threading, though there are documents describing how to do it (and how you’ll get stuck on locks around the Lua core) in extensions. Coroutines just don’t cut it in a multi-core world, and I couldn’t convince myself that Lua’s implementation even allows for effective use of a single core, which puts a serious dent in my interest level. In the end, I just don’t feel like Lua’s a good fit for the kind of program I decided to use for this experiment. In a different problem domain the flexibility and the ease of extension/embedding and the awesome performance of LuaJIT might make it a much better choice, but for now I’m debating whether to try JavaScript or Ruby (or maybe Clojure) next. Basho has announced Luwak, an Erlang library for storing large files in Riak. The original code was contributed by Cliff Moon (@moonpolysoft) so I’m guessing that the slightly scatological name comes from him. I chatted with Cliff on IRC a bit. I also exchanged some email with Bryan Fink (@hobbyist) who wrote the HTTP interface and seems to be the current maintainer at Basho. Many thanks to both of them for taking the time to educate me. What follows might come across as criticism, but I don’t mean it as such. Most of it comes from my background as a filesystem developer, which is most assuredly not the best perspective from which to view Luwak, but it’s the perspective I have. Considered relative to Luwak’s goals and to the stage of its development, most of these apparent criticisms are weak or invalid, even when I managed to fight through my poor knowledge of Erlang to understand what the code’s doing. I can’t stress enough that I think Luwak is cool, and I wouldn’t have spent even as much time as I already have on it otherwise. The first thing that strikes me about Luwak is that it’s all about what’s inside files and there’s nothing about managing namespaces – no directories, no renaming, no attributes as we filesystem types would expect, etc. That makes perfect sense, since Riak already has plenty of ways to index and connect Luwak files. Who needs directories when you have so many other ways to do the same things? Bryan even points out that “object” might be more accurate than “file” because it doesn’t carry the weight of expectations that Luwak was never intended to meet. This does mean that an application developer accustomed to arranging files into hierarchies will have to come up with their own way of mapping those semantics onto what Luwak provides, and maybe it would be nicer if that mapping were done in common code, but it’s not really that big a deal. The structure within a file is of blocks arranged into a Merkle tree. The Merkle-tree approach is an interesting one. In the case of rewriting an entire file in which little has changed, it allows the update to be done with very little data transfer. I’m not sure it helps all that much in the case of writing a new file, or rewriting only part of a file, though. It makes me wonder whether the “atomic non-extending write within a single allocated block” optimization I mentioned here would apply to Luwak. The Merkle approach is also related to another interesting feature which isn’t mentioned in the README but does warrant a comment in luwak_io.erl %% The write will start at the offset specified by %% Start and overwrite anything at that position with the %% contents of Data. Writes starting beyond the end of the file %% will occur at the end of the file. Luwak does not allow for %% gaps in a file. I can totally see how this makes the design simpler. It avoids a whole lot of grunge like populating nodes with “holes” instead of pointers to real data, and dealing with reads in the holes, and so on. The part about writes starting beyond the end occurring at the end worries me, though. If an application were to write out of order – few do, but something like BitTorrent comes to mind – the result would be a mangled mess. If gaps aren’t allowed that’s fine, but it would seem safer to reject them outright than to risk rearranging them. I also don’t see any mention of a true append operation, which would imply that appending is a potentially racy process of finding the current EOF and then writing to that offset. What if something else extended the file in between? Speaking of concurrency, the general approach in Luwak is similar to that in VoldFS and elsewhere: do all writes (including internal data structures) into new space, then write a new root which points to the new bits. In VoldFS this final write is into the inode for data operations or into the root directory for namespace operations, and is done very carefully with a conditional update so that conflicting writes are detected and retried – effectively serialized – instead of taking partial effect. In Luwak the “write into new space” rule does seem to be followed, but not the conditional-update part. That means two simultaneous writes could end up making separate copies of the same node in a common ancestor, and one write could be lost even though there was no actual overlap. As near as my weak Erlang skills can determine, simultaneous updates might even stomp on each others’ ancestor lists, so reconciliation at that level wouldn’t be possible either. Now, don’t get me wrong. It’s entirely reasonable to say that Luwak isn’t intended to handle that kind of concurrent-access regime and that if it had been then it would have been implemented a whole different way. I’m just saying that it’s an area where it might be interesting to experiment some more and see if at least occasional/accidental sharing might be handled more gracefully. Since I mentioned ancestor lists, I should also point out that they seem to include all previous versions. Similarly, and again according to Cliff, there’s no garbage collection of no-longer-used data blocks. Again that’s totally reasonable for such a young project; there’s no such garbage collection in VoldFS either. Since data blocks are addressed by content hash, the problem might even be a bit more complex, and of course one should never pass up an opportunity to remind people of Valerie Aurora’s excellent HotOS 2003 paper on the dangers of compare-by-hash. That’s all I can think of right now. All quibbles and disclaimers aside, I think the most important thing is that more people are working on ways to store large objects in some of the modern distributed data stores. Even if we all come up with different semantics and different approaches, that’s definitely a good thing. Progress is messy that way, and thanks to everyone involved with Luwak for contributing to that progress. Languages/Frameworks for Web Stuff I’ve been thinking about playing with a new programming language or two, to see if that helps me rediscover some of the fun I used to have when the discovery of new capabilities or ways of doing things was more common than the discovery of new nasty things to work around. The vehicle I’ve chosen for this is sort of a stripped down version of the image-warehouse daemon I’ve been working on at Red Hat, supporting basic bucket/object/attribute operations sort of like S3 but skipping a lot of the more complex query/replication stuff that makes iwhd special. Here are the things I need, besides basic filesystem stuff. • Request routing/dispatch. I like the Sinatra model for this, but I’m not tied to it. • Templates sufficient to generate simple XML and JSON output (e.g. for bucket listings). • Some sort of database interface, but no ORM. • A decent parsing library, preferably of the PEG flavor. I’m planning to implement the same functionality in three languages, just to compare and contrast lines of code, performance, etc. Since the point is to learn new languages, that rules out the ones (like Python) I already know. Since the point is also to have fun, that rules out anything too enterprise-y or CS-purist-y. I don’t mean to disparage such languages, Erlang or Haskell or Scala might be more worthwhile and others might even consider them fun, but for this purpose something more “quick and dirty” is called for. So, the candidates are: • Ruby, Sinatra, ??? for templates and web server (Thin?) • LuaJIT, Kepler • Javascript, node.js or ringo.js, ??? for routing and templates • As you can see, I’m looking for suggestions on some parts. Any ideas? I’m not even completely tied to the choices already made above. Just try to remember that I’ll need support for the same database (that’s undecided too) across whatever languages I try, and that I’m trying to have fun so I don’t want anything “heavier” than it really needs to be. Thanks to all who contribute. Tax Lies from Mankiw My wife, a former math major, freely admits that she’s not particularly good at arithmetic. Knowing group theory and being able to calculate a tip quickly are two different skills. Similarly, knowing economic theory and handling your own money competently are two different things. This is illustrated quite well by Greg Mankiw, who uses some really bad assumptions to claim that his effective marginal income tax rate is 90% . . . and of course it’s all Obama’s fault. Now, I might not be a Harvard economist, but even I know about tax-deferred investments and about half a dozen ways to avoid the estate tax – especially on money saved for a child’s education. I know that very few individuals actually pay their top marginal rate, even fewer corporations do, and that a tax rate on earnings is not the same as a tax on dividends and capital gains. Mankiw pretends to know none of these things, so either he’s not smart enough even to find Harvard on a map or he’s deliberately misrepresenting facts to his readers. Behind the mathematical lies, though, lurks an even worse deceit. What applies to Mankiw doesn’t apply to everyone. He may be able to forego $1000 in income out of petulance at what he sees as a too-high tax rate, but anyone at or below median income would have to consider it more seriously even if the tax rates were as high as he claims. Also, economics might not be a zero-sum game but, at an annual growth rate of only a couple of percent it’s damn close and taxes are even closer than income. We’ve all heard about trickle-down and the “bigger pie for everyone” and so on but, Brad DeLong points out, Mankiw also helped shape policies that do a notably poor job of demonstrating any such effect. DeLong also quotes Friedman as saying, “To tax is to spend.” Somebody has to pay for all of the costs Mankiw helped impose on us. If not the rich, then who? If not now, when? If Mankiw pays less in taxes so that his children can have more money – which they’ll hardly need – for college, who else’s children will have less? Almost certainly someone who has benefited less from our system of tax and property and liability and regulatory law than he has. Maybe someone who pays the taxes Harvard doesn’t, or whose taxes in other years were directed into Mankiw’s pocket while he as an adviser to George W. Bush, or who got screwed by one of the policies he promoted. Yeah, go take a break, Greg. The fewer hours wealth-destroyers like you work, the better off we’ll all be. Don’t worry, I won’t make a habit of writing political posts. It’s been a long time since the last one and it will probably be a long time before the next. I just had to get this off my chest, and it’s my blog. I’ll be returning to the technical content shortly. Reactions to Coda’s CAP Post Coda Hale’s post on the CAP theorem seems to have set of a flurry of Twitter activity. Justin Sheehy mentioned a talk he recently gave, Henry Robinson mentioned a post he wrote a while ago, Sergio Bossa and Edward Ribeiro have joined in, and so on. There’s a bit of a competitive aspect to it, everybody – most definitely including me – trying to claim the first/last/best word on the subject, but it’s all good. Edward Ribeiro also points out that Daniel Abadi doesn’t seem to be going along with the consensus I mentioned earlier. I decided to go with the humorous response. @edward_ribeiro Yeah, @daniel_abadi didn’t get the memo. Updates haven’t propagated everywhere yet. ;) More seriously, though, there will always be holdouts. There will always be a few who are too ignorant to understand what Brewer was saying. There will always be some whose business interests or academic reputations are too dependent on a contrary view to admit some of the implications. Lastly, of course, there will always be trolls. Among people who actually try to do useful things with distributed systems, though, the consensus seems pretty broad. There are still differences of opinion about some of the minor points, such as whether CA systems are literally impossible or just highly undesirable. I’m in the highly undesirable group, myself. ;) Seriously, I’ve worked on systems that I’d characterize as CA, and their failure modes when faced with the inevitable partition have been more gruesome than total shutdown would have been. I can go into more detail if anyone wants, in a separate post. None of these differences have any practical import, though. They’re fun to argue about, preferably over beers, but regardless of whether people think CA is impossible or impractical nobody in their right mind is going to recommend them in most cases. The last point is whether CAP really boils down to “two out of three” or not. Of course not, even though I’ve probably said that myself a couple of times. The reason is merely pedagogical. It’s a pretty good approximation, much like teaching Newtonian physics or ideal gases in chemistry. You have to get people to understand the basic shape of things before you start talking about the exceptions and special cases, and “two out of three” is a good approximation. Sure, you can trade off just a little of one for a little of another instead of purely either/or, but only after you thoroughly understand and appreciate why the simpler form doesn’t suffice. The last thing we need is people with learner’s permits trying to build exotic race cars. They just give the doubters and trolls more ammunition with which to suppress innovation. Another CAP Article Coda Hale has written a post entitled You Can’t Sacrifice Partition Tolerance. If you’ve already read my articles about the CAP theorem, or Dan Weinreb’s, or Julian Browne’s, every point Coda makes up to the mention of “harvest” and “yield” should seem very familiar, but even if the post contained only that it’s well worth recommending and Coda does bring a certain panache even to well-trodden ground. I particularly liked his way of poking much-deserved fun at the too-often-heard argument that error responses somehow preserve availability. A 500 The Bees They’re In My Eyes response does not count as an actual response any more than a network timeout does. A response contains the results of the requested work. It has been very interesting to watch all the CAP discussions unfold. I was far from the first to write about it; at this point I’m also far from the last. It seems to me that there is a consensus emerging. Even if Gilbert and Lynch only formally proved a narrower version of Brewer’s original conjecture, that conjecture and the tradeoffs it implies are still alive and well and highly relevant to the design of real working systems that serve real business needs. It’s also about time the rest of Brewer’s keynote got some attention. Thanks, Coda.
global_01_local_2_shard_00001658_processed.jsonl/7856
Tuesday, January 25, 2011 (RPG-related) Hate List!! 1. When someone is playing D&D for the very first time and they play anything but a Fighter. Learn how to walk before trying to run buddy, you're really going to be chafing playing a 2 hp magic-user after using your magic missile in the first encounter with two rats... 2. When someone from the group's girlfriend/boyfriend/partner is playing D&D for the very first time and they play a Chaotic Neutral Thief that tries shoplifting torches from the general store in the home base town, and running off to explore in the middle of combat, and you can't regulate or decapitate their character due to "diplomatic concerns." 3. Someone who has never played D&D and "Just wants to watch a game"; It is the worst fucking thing ever as they have always been completely incapable of not continuously disrupting the game, never shutting up with their interjections or exclamations of, for example, "I just don't understand what's going on!" ad infinitum. My rule #1: If you're not playing...you can't be in the room" Oddly/counterintuitively enough, playing in public in a coffee shop has completely hassle/interruption free in my experience. If you're going to be asking a million questions...you might as well be playing. 4. Players wasting time hunting for their misplaced die instead of grabbing one of the many suitable polyhedrals belonging to other players within reach and getting the roll out of the way. This is especially egregious when someone can't find their D20...IT SHOULD BE "FAST DRAW READY" ALL THE TIME! 5. Players that do math out loud: Player: "I rolled a 16", DM: "You hit", "Player "With a +2 bonus for strength that's 17," DM: "You still hit...", Player: "And with +1 for my magic sword that's 18", DM: "YOU MISS!! ROCKS FALL..YOU DIE!!" 6. Players that cast a spell before being familiar with or reading the spell description, Player: "I cast Enlarge on myself and than pick up the castle!", DM: "You are 40% larger...you now are 7 feet tall", Player: "So do I pick up the castle?"  RTFSD: Read The Fucking Spell Description 7. Player that never quit whining about wanting to use something from a splatbook in a core-only game, or something that has been houseruled out of the game; "Without a fullblade my character is useless!" ... "Without a spiked chain my character is useless!"..."If I can't play a Psion my character is useless!". This is especially awful when the player is new to D&D and they have a "Grima Wormtongue" munchkin cheese powergamer telling them what kind of character to play. 8. When a player tries something that would never, ever work in the real world* and get huffy when it doesn't work the in the game. Player: "I tie one end of the 100 foot rope to the bridge, the other end to my ankle, jump off the bridge, and attack the plesiosaur in the gorge 100 feet below with my sword!" DM: "Are you sure you want to do that? It will take more than one round to get your rope out and tie it to the bridge and yourself...", Player "WHAT! Jesus christ...that's so unfair...I already had the rope out!"[a couple of rounds later] DM "You plunge off the bridge 100' feet, and than with a horrendous jerk you take 16 points of damage as your leg dislocates from its socket before the rope snaps plunging you into the rapids with the plesiosaur", Player 'WHAT! THAT'S BULLSHIT!!" 9. When Players "ADD Teleport" while in town. Player #1 "I go to the brothel and spend all night with the classiest doxy," Player #2 "I go to the alchemist's" DM "Character #1 is charged 200 go for the night, Character #2 is offered some potions of healing..." Player #1 "I BUY ALL OF THE POTIONS OF HEALING!!!" * Yeah, I know it's a fantasy game about dragons and magic...but I've got my limits dude... EDIT: And the above example would have a decent chance of succeeding if I was Journey-Mastering an Encounter Critical game! 1. Variation of #4 ; players who dont roll attack and damage dice together . . . "OK, I role a 17, I have +5 to hit because of skill, strength and magic . . . that is a hit, now how much damage does a trident do?" 2. Number 7. My personal favorite, my personal hate. 3. The only problem that I ever had with some frequency was a player bringing his girlfriend to the game. She played, but wasn't into it. She just wanted to be with her boyfriend. And the boyfriend divided his attention between the game and the girl. Fortunately, we're all long-married now, the rosy illusions have faded, and nobody brings girls anymore. And if it's a choice between D&D or a girlfriend, choose D&D every time. Over the last 30 years, I've gotten much more joy out of D&D than out of girlfriends. Girlfriends are more expensive, too. 4. 1. First-timers should always get the best character (ie the Elf), so that way they will come back. Just ask the crack dealers, they know. Otherwise you will only ever end up with the really hardcore weirdos like the guy whose first game was you DMing and his character died and his second game was me DMing and his character died. 2. If neither you nor your group member has explained to the significant other what is supposed to happen in this game, it is your fault. It's even worse, though, when the girlfriend sits in and all she wants to do is kick her fella's ass and doesn't care about the game."Diplomatic concerns" must then lead to "diplomatic sanctions." 3. In old-school D&D? Bullshit, you play, no watching. If it's a game where it takes ten years to make a character, then maybe you can watch. I don't think I've ever met anybody who just wanted to watch, though. 4. No!!!! YOU FOOL WHAT ARE YOU THINKING??!!?!?!?! If you roll another die right away you will forget about the first die and it will be lost forever!!!! Like spells!!!!! 5.Oh please. The only type of person who thinks the exact total die score a player gets is less important than whether the character hits or not is a DM. Players all realize that higher numbers are a visible sign that you are a better person. 6. That's hilarious. You should have let him pick up the castle! 7. Oh please. Everyone knows characters are always useless without splatbooks. Plural. 8. 16 points of damage? That's a bit harsh. I'd say 1d6 or 1d8, and then 50/50 the rope or leg breaks and the character falls the rest of the way down. Comedy gold either way, really. 9. That's obviously a euphemism and you should treat it as such. 5. I have an almost identical post all ready to roll, except it's titled "Things I Endure with Amused Tolerance Because I Like Girls More Than D&D". It also ends with vintage hardcore, oddly enough. 6. I'd say that virutally all of this applies to me and my 4e experience except for the 1st one. Actually, the opposite is true. Play a fighter if you know how to tank and only if you know how to tank... just like a certain video game I know. All other classes that deal damage are acceptable for first timers, but Fighters need to be pros. 7. Great / Hilarious list! Nice job with the Despise You track too. Great song/band. One of my favorites. Good to see some other gamers with West Coast Power Violence records in their collections. 8. Some of those I get... but I'm guilty of a few. I'm always putting my dice back in the bucket and having to dig them out again. The guy I sit by is OCD and I know better than to just grab his dice (he'd have to wash them). 9. I think I have all sat through at least 1/2 of these... but the one that really gets my goat is the ADD Teleport (which is a perfect name for it). The offender is usually the loudmouth attention hog who wants to be everywhere at once... when I DMd a group with such a one in middle school, I must confess that I was often putting the DM whammy on him... so if player 2, 3 or 4 looked under the table and found a chest, player 1 (loudmouth) would scream, "I open the chest and grab whats inside! What did I get!?!" as the other exasperated players rolled their eyes because a moment earlier he had said he was looting bodies down the hall. I'd look down at my secret DM notes that would say the chest was full of gold or boots of shitkicking or vorpral Galive Guisarmes and lie through my teeth. "The chest is empty," I would say, "but as you open it and grab inside you hear a loud click and a spring loaded sword blade comes out of the chest, slashing from left to right (roll dice), oooh! It chops off your right hand! It was smeared with poison, better roll your save..." Yeah, I was a dick. But loudmouth was a dick first. And the other players usually loved it. 10. Number 3 is exacerbated if it's a player's boy/girlfriend. That's probably the one I've (sadly) dealt with the most. 11. It's number 2 - that one sucks big time. We had a dungeon master who brought his girlfriends to the games quite regularly (and he switched those girls more often then his adventures) and it was unbearable. They allways got away with the best magic items, the least damage taken, the most heroic thing done. Hell... starting to vormit right now just thinking about those days... 12. This is a great post for me to read because I know exactly who you're talking about for most of these points. I think "He Who Shall Not Be Named" scored a couple strikes. I feel mercifully left out of this shit list, although my Klingon character getting his feet severed when he tried to lift the big microscope in the Halloween Encounter Critical session would almost count for point #8. Except I found it quite funny and rolled up a Frankenstein character right away. 13. The two I've encountered most often: 10. Players that spend the majority of the game telling the other players what their characters should do. Often uses unwitting lemming-like players as meat shields and canaries. 11. Players that pause the game to argue about mechanics. Just roll the dice and move on buddy... Another that I've gamed with a few times at least. 12. Players that do NOTHING!!! WTF?!?!!! Why are you here even? Seriously?!?! I mean, at least stab something. Hell, set the town on fire, at least that'd be something! What? fine... you play another round of darts at the tavern. roll a d20... fuck.... I have encountered quite a few players that started out with chronic cases of #s 4, 5 & 6. A good solution I picked up is to skip them and move on to the next player, going back to them once they have their shit ready. So long as you're not a dick or demeaning to the player when you skip them for taking too long it's all good. 14. I regularly encounter 1, 2, 4, 6, 8 and 9. They fill me with WARGLBARGLRAEG (...moreso than normal). A couple more: #13. 'The Thousand Mighty Arms of Adventuring Vishnu'. Obviously all adventurers are either octopi or Hindu divinities, because they seem to have manipulative appendages as the plot requires... "Ok, so you're carrying a lantern, a sword, your bow and arrow, a sack of swag and you want to grab at another character with you *other* other other hand? Behold the power of Mecha-Shiva!" #14. Attention Deficit-san. Q: "What do I need to hit him?" A: "Exactly the same as you did the last round, and the round before that. Either you remember the two digit number I tell you, or we say you need a 20..." #15. Mr Just-Doesn't-Bother. "Look, I've given you a one page handout explaining the mechanics of combat, skill use, class abilities and resource expenditure - all the things you need to know to play the game. So don't ask me "How do I...?" again." #16. My turn! My turn now! Initiative order applies to special and unique snowflakes too. 15. LOL@Geoffrey. Girls are so ICKY, aren't they? 16. Ooooo! Number 2 is my most hated! 17. In addition, people with unimaginative/against the setting/"cute" character names. There is always one player who waffles and lames up their character's name. For some reason that always sticks in my craw. Because in time, I will call your character what I want to. Following that, I will start calling you what I want to. 18. Haha, awesome feedback & stories guys! I especially love #13 as presented by Chris of the Vaults of Naogh,, I've come to use the term "hand economy" while DMing, "Goddammit, you guys have to get your hand economy in order!" 19. You need to bring props to the game and make players hold what their characters are holding. Then you can roll all the dice, too! 20. @ Redboxvancouver: That sounds awesome! That way I can make them SHOW me how they climb up a rope while holding a sword and shield with a torch held between their teeth... ...I'm also considering taking the players to the zoo with a golf bag of machetes and sledgehammers in order to resolve random wilderness encounters as well... 21. I like your golf bag idea Blair. While musing over this post(& our text exchange) at work today I felt pretty lucky that we've weeded out the worst that the hobby can offer from our group. The occurrences are thankfully low except for #s 4 & 9, which I can accept. Yay for the Saucers & Sorcerers Society! 22. Also, switching back to 1st edition really helped too. Rulings instead of rules! 23. You are apparently blessed with groups that aren't 75%+ new players... 24. I have some things to add but I can't be arsed to read everyone's comments beforehand, so I will just add the comment I know has not been made yet: 25. @ Scrounger: He Who Is Not To Be Named just may be the subject of a future post... @ Huth: We usually have one new player going on, and I strive to be fair, kind, but also firm in their "conditioning" :)
global_01_local_2_shard_00001658_processed.jsonl/7869
Wednesday, February 08, 2012 Pez Peeve A few years ago my family drove our friend Tara and her daughter to an event. Tara, to show her appreciation of the ride, bought my boys Pez Dispensers and Pez Candy. For the rest of the day I think Tara regretted ever having car pooled with us. I appreciated her kindness of the idea of a small token of appreciation given to my kids but for the rest of the day I cursed her. Not only under my breath did I say bad things about Tara and her gift but I also ranted right to her face. You see I hate Pez Dispensers. Did you ever try to load Pez candy into one of those dispensers? You pull the spring loaded inside "clip" up out of the casing, struggle to keep it out while loading individual pieces of candy into the slide. It is inevitable that the slide snaps shut, or that one of the pieces of candy, which are too small for adult hands, gets stuck sideways. You then need to empty what you already put in the device and start all over. The wrappers to the Pez candy, most likely due to the fact that there is no expiration date, end up sticking to the candy making it difficult to slide them into the dispenser.Try doing this over and over again, with coffee induced jitters for multiple children for multiple packs of candy. It is torture. On average it takes me 10 minutes to load a Pez Dispenser. On average it takes my kids 90 seconds to eat all the candy in a Pez Dispenser. My kids complain that it takes too long to load the candy. I tell them to just eat the candy. They argue that the candy has to go into the toy dispenser (so they can pop Jango Fett's head back and suck a rectangle candy from his Adams apple) because that is how it is supposed to be. The turnaround time to whiner ratio is overwhelming. I hate Pez Dispensers. Besides Tara giving the boys Pez Dispensers they also occasionally receive them in gift bags from friends birthday parties. Which since I am on the subject, is another pet peeve of mine. I was talking with my friend Jim the other day and we were trying to figure out when did the whole giving a gift bag of party favors to your invited b-day party guests become a thing? When I was a kid I went to a bunch of birthday parties but the only thing I ever left with was a belly full of cake and ice cream. It seems like now every kid who attends a birthday party comes home with a bag full of dollar store choke hazards and carpet clutterers. These tchotkes always find their way in or under my furniture. As parents shoudn't we try to help other parent's alleviate the clutter in their own homes. I know my kids do not need any more super bouncy balls, plastic spider rings, whistles, silly straws or tiny yo-yos that I refuse to put those items in gift bags for other kids. Maybe as parents we should be more practical with the gift bag party favors.  Maybe we can replace the small trinkets with items like shoe laces, band aids, sun screen or safety pins. You know the things that you never have around the house when you need them. That way when these items are strewn all over the living room floor and shoe lace breaks...we will know we can find a pair under the couch cushion. Do we even need gift bags at all? Anonymous said... I can't wait until the kids come and visit work!!!! Anonymous said... Try filling 200 PEZ for a wedding. Worst idea I ever had Me said... My husband and I feel the same way about gift bags. That's why we make a point of giving a "gift" that is more substantive that the junk most people give (and we don't give candy). When my son was little, we gave out matchbox cars. The girls get something girly--polly pockets or something similar. I dread bringing home the bag o' junk--it always ends up in the trash anyway. Michelle said... I'm with you on the Pez thing. However, the good news is that once you have one child old enough, that kid can be the Pez loader. That's how we roll here. On the gift bag thing - ugh. Because I've got all girls, mine come home with lipstick, nailpolish and worse - Glitter Glue. I hate that stuff. The make up is bad, the craft stuff is awful. I have not a single crafty bone in my body, so when my girls come home with a bracelet making kit requiring a PhD is jewelry making and metalwork, I cringe. It inevitably ends with a discussion about why Ella's mom is so much better at crafts. She's awesome. LemonDrop1028 said... PEZ, Idon't mind but I'm so with you on the gift bag thing. I don't give them out at my kids' parties. If I don't want to get it, I'm not giving it out. Lauren said... I'm with you on the Pez dispensers. They are the worst! I also did something similar to "Me" in that instead of giving a bag of junk, we gave each kid a matchbox car at the end of one of our boys' parties.
global_01_local_2_shard_00001658_processed.jsonl/7889
Tarot: The Suit of Wands A pack of Tarot Cards consists of four suits: * Wands * Cups * Swords * Pentacles In this articles, I'll be discussing the suit of wands, which represents the element of fire and relates to: * Enthusiasm * Career * Job * Action * Vitality * Energy * Ambition * Drive * Reaching for goals, and * Travelling When the suit of wands features predominantly in a Tarot reading you can expect the person being read (known as the querant) to be of fiery disposition. A “doer”. The psychic would suspect that the reading is about actions, career and job. Its important to people of this nature to feel alive and whether this feeling resonates via exhilaration or struggle matters little. For Wand Querants having a purpose is crucial, and in fact is often more important than achieving it. When a Wand Type achieves their mission they will seek out bigger, better and brighter challenges. They also embrace life full of action and eagerness. Gloominess can descend on Wand Types when there is no action in their life, because its absence is not a state experienced naturally by them. In fact, intolerance for people experiencing these states that are so unnatural to the Wand Type can become an issue for them.
global_01_local_2_shard_00001658_processed.jsonl/7915
Las Vegas? Send your thoughts and prayers up your ass <iframe src="//" width="640" height="400" frameborder="0" allowfullscreen webkitallowfullscreen mozallowfullscreen></iframe><div style="text-align:left;font-size:x-small;margin-top:0;width:640px;"><a href="" title="from Dashiell Driscoll, Michael Burke">Please Send Your Thoughts & Prayers Up Your Ass</a> from <a href="">Funny Or Die</a></div>Suffering from the biggest mass shooting in American History the  answer is of course sending our thoughts and prayers.  Oh and ribbons, and stuffed animals and flowers for all the good it will do. And just keep praying and thinking and sending in our time of grieving until the next one and do it all over again. Oh, this time they are going to outlaw bump stocks! Which is meaningless and only a grain of sand thrown to not do anything serious. I guess we have to thank Martin Luther for that silly crap as protestant religion is wholly based upon gaining everlasting life with Jesus from only our thoughts and prayers. Doing anything does not enter into that equation. Try as I might I cannot come up with a worse idea than that.  Well, basing the whole Judeo Christian ethos on God telling Abraham to slit the throat of his son to prove his subjugation to a genocidal maniac is almost as bad. Speaking of which, does that mean God is worse than Hitler and his 10 million to the gas chambers? If you google it the first few results will tell you that with people of the time living and average of 777 years and fking like rabbits, that God’s numbers for his genocide was 10 trillion people drown.  Which they brag about.  God murdered 10 trillion people over some regional BJs.  And here we are…
global_01_local_2_shard_00001658_processed.jsonl/7924
Random Curiosity Boku no Kanojo ga Majime Sugiru Shobitch na Ken – 01 »« EVIL OR LIVE – 01 Juuni Taisen – 02 「鶏鳴狗盗」 (Keimeikutou) “Tricks Both Mongrel and Fowl” Looking back at the preview and the episode title, it should’ve seemed obvious that Dotsuku wouldn’t make it out of Episode 2 alive. After Inounoshishi had the 1st episode’s spotlight only to be turned into one of Usagi’s zombies, Dotsuku was destined to be the next to go. It didn’t help that in this episode, we get a flashback from him, and a line about how he can’t be killed by the poison because his power can work to eradicate it. But man, I was still taken by complete surprise by how he died! I only saw it coming a few seconds before Niwatori smashed his head, but it was one of those shocking “oh crap!” moments that had me bursting out in laughter at how quickly she killed him as soon as she realized how much power his fang’s strength-enhancement poison gave her. What got me was how easily I bought into the idea that Dotsuku and Niwatori would be the power duo to possibly fight against Usagi’s zombie army. Dotsuku had the strength and the neat poison powers, and Niwatori was an expert at tracking with the ability to see through the eyes of birds she can control. There was also a sense of chemistry where Niwatori did such a good job at acting inexperienced and oblivious that it seemed like she could eventually cause Dotsuku to let his guard down more gradually over time. He did let his guard down, but out of the idea that if he makes her uncontrollably strong, she’d be an effective gambit against Usagi’s slowly building army. Additionally, Niwatori’s quirky dialog also built onto this chemistry with her interest in bothering Dotsuku by examining the phrasing in “We ran through those mountains full of rabbit, we fished in those rivers full of carp”. It was such as Isin moment that it seemed like a cute duo that might just work out. Though it was highly likely that Niwatori planned to kill him from the start, and was looking out for number 1 more closely, choosing to align herself with Dotsuku to use his poison against him and the other combatants. It was just such a clever trick that it stunned me when she took him out. Aside from their brief partnership, the bond between Shuryuu and Nezumi is explored further as they ended up tagging along with each other in a bid to hide out, and find a way to stop the game. Not only do we learn that Shuryuu rigged the explosives underneath the floor knowing that there was someone who was planning on killing everyone before the game began, but that she’s a master negotiator who has been powerful enough to broker cease-fires, end wars, and mend diplomatic ties. The fear that she might be able to end the game becomes a major concern for Dotsuku, but it’s hard to gauge her or Nezumi’s motives in the game. How exactly does she want to end the game? Does she have plans in mind for Nezumi? And what’s Nezumi’s angle in all of this? Niwatori has the same issue as Inounoshishi with recognizing who he is. Whether this means Nezumi’s power is in amnesia or tinkering with memories is all speculation, but him and Shuryuu are easily the most mysterious characters so far. The climax of this episode builds up the momentum towards some intense encounters for the next one. After his battle with the turnstyle, Uuma is horrified to find that negotiation and pacifism is no longer on the table for Ushii as he picks a fight at the train station. In addition, Niwatori’s crows are ascending on the zombified Inounoshishi as she gets ready to make full use of Dotsuku’s power-up. The title of the episode and preview are waving a massive death flag for Niwatori, but I have a feeling lighting won’t strike twice with the show giving away its secrets. At first, I was wondering if Inounoshishi’s stabbing at the end of the premiere would be where the series peaked with it’s shock factor, but the last half of this episode made it loud and clear that this isn’t the last time Juuni Taisen tries to pull the rug out from under us. The next episode can’t come soon enough! ED Sequence ED: 「化身の獣」 (Keshin no Kemono) by Do As Infinity October 11, 2017 at 8:40 am • October 11, 2017 at 10:12 amzztop Nisioisin’s writing a sequel novel to Juuni Taisen, titled Juuni Taisen vs Juuni Taisen. Out this December. Apparently the novel had an audience viewpoint character, a reporter covering the Zodiac War live from a safe distance. Said character seems to have been phased out so viewers can observe the characters directly. • October 11, 2017 at 5:02 pmChoya Sounds cool, I’m wondering if it’ll involve the aftermath of this event or if it’ll be an event in the future? I guess it’d depend on how the story concludes. • October 11, 2017 at 10:19 amAki-Chan I’m actually kinda sad that Uuma is most probably going to die. He actually seemed a genuine nice guy in this episode. Well, as far as you can be nice without being a complete doormat in this bloodthirsty situation. But still, nice. Certainly nothing about him rang any alarm bells in the way everyone else has so far. And also, the ticket barrier struggles. I can kinda sympathise(the number of times I’ve swiped a card only for the stupid thing to close before I can get through….) As far as Niwatori went, I was half expecting her to do something more along the lines of Kushida from Classroom of the Elite (go super dark and scary for a second before switching back) but holy wow, I was also surprised with how she did kill him. An amnesia ability where Nezumi is concerned seems likely considering that it’s not only Ino and Niwatori who seem to recognise him, but Dokutsu too. Though, I wonder about that because I feel like his sleepiness is related to his abilities in some way, but I can’t seem to figure out how that’d work with a memory-based ability. I guess we just have to wait and see. • October 11, 2017 at 5:01 pmChoya I did feel bad for Uuma since he seemed eager to join the pacifist group and attempt to see if Ushii would join him, given his interest in Shuryuu’s proposal. It was sad to see the look on his face turned bleak when he realized Ushii was preparing to kill him. I understand the idea that Niwatori would end up putting on a slasher face and going crazy given that most of the edgier anime have at least that one girl that acts timid only to be completely bonkers, but it was surprising that she ended up killing Dotsuku shortly after gaining the powers without much fanfare or theatrics. It was swift without any time for Dotsuku to process what was about to happen. The more people try to hone in on Nezumi’s sleep cycle and the inkling that they might know him, it gives credence to the idea that his sleeping and their amnesia would be interlinked with one another. • October 11, 2017 at 11:27 amLittle Tangerine I still don’t understand how the Rooster killed the Doggo. By grabbing his face? I really hope they don’t go reverse zodiac chronology for each of their time of deaths. That would make this show sooooo booooringggg. That would also make the mouse win. Again. The mouse has been winning everything since the commencement of story-telling. • October 11, 2017 at 12:15 pmRagefat She killed him by smashing his face/head with her hand. • October 11, 2017 at 12:16 pmJohn She crushed his face after he enhanced her strength, he basically gave her bloodlust she either A: couldn’t control or B:knew if she played weak he would buff her so she has better chance of winning. Also this is battle royale anime, it isn’t suppose to have a story, 12 characters show off and die, one remains and wins, this is the definition of battle royale. You are literally like 50th person i see talking about this anime being boring and predictable, who cares? It’s an bloody action anime, probably a twist coming at the end, you enjoy it not savor it. • October 11, 2017 at 4:52 pmChoya From what I gathered, it was the combination of her grabbing his face hard enough to crush it and her smashing his head against the wall. I want to give the show the benefit of the doubt that the ending credits order and the previews are going to be misleading from here on out, but I’d be disappointed if it’s going to go single-file along with whoever is in the credits or whoever gets the preview. I’m enjoying the show and story itself, but it would cheapen it if every episode gave away who was going to die every time. • October 12, 2017 at 4:01 amNicro Well, the ending order is simply the Chinese Zodiac order which is what this is based on. Doubt the author would follow it. Side note: I do think the snake/dragon would come back alive somehow though. • October 12, 2017 at 6:16 amChoya True, it’d give away everything too soon for the writer to follow the Chinese zodiac’s order in the deaths to come. Part of me does think Snake might not be as dead as we think because the characters were saying that Snake & Dragon worked as a group, and Dragon seems very confident. If Usagi’s power is controlling his zombies as well, it might be too late, but if Snake would be able to pretend to go along with Usagi’s instructions, I could see him being able to regenerate a head or operate while his head is detached, where he could regenerate another body like a snake shedding its skin. • October 11, 2017 at 12:36 pmTrexler Well episode 1 has set a pattern, once Inoushishi was confirmed dead, with Rabbit digging her Innards for the jewel, then started showing spotlight of Dotsuku, like you Choya I knew he was dead, but how was what kept me intrigued and oh boy! Can we all give Niwatori a freaking standing ovation. She played her cards freaking smart, from start to finish, I was laughing my arse off right from the get go, because it seemed like a joke as Dotsuku rightly said to have someone like her in the tournament, on the chances she was probably forced in. I confirmed my suspicion about her pulling the rug right from under dog, was when he asked her to share information about anyone else she knew to which she responded ” I hardly know anyone” add that to her body language was a tell tell. Given every week someone dies, fingers crossed Chicken survives the upcoming week. • October 11, 2017 at 5:14 pmChoya I’m crossing my fingers that Chicken is able to avoid the death flags that have been thrown her way. It’d be neat if she got far given how crafty she was to take the gamble that Dog would lower his guard that early AND give her a power boost. She’d be a fun character to follow, and it’d make sure to end the pattern that the ones who are given the most screentime/flashbacks are killed off. Monkey did say that everyone involved was experienced and skilled, so to see Dog fall hook, line, and sinker for her perceived inexperience was a riot, especially since she didn’t even have to give him the same amount of information that was pouring out of his mouth. • October 11, 2017 at 2:38 pmSpacyRicochet Okay, calling it now; Show Spoiler ▼ • October 12, 2017 at 6:18 amChoya Show Spoiler ▼ • October 12, 2017 at 8:14 amkrabbypatty But going with your theory, why wasn’t snake’s ED card shown first? • October 12, 2017 at 8:28 amSpacyRicochet Noticed that after I posted. Only reason that I can think of is that the ED order is for the Zodiac. Still think I’m correct as a whole, except for that little tidbit. Let’s hope the series is slightly more unpredictable. • October 11, 2017 at 5:15 pmMaou Hmmmn excluding snake, will the contestant died according to their position on zodiac?? Boar-dog and presumably rooster on next nepisode. That dog seriously stupid….he already had the advantage with neutralizing the poison…just hide your tail for one day and it’s almost 90% win, well maybe this is also the reason that chick targeted him. • October 12, 2017 at 6:21 amChoya Yeah, all Dog had to do was hide somewhere, or do what the last contest’s Boar did by hiding out in a different country. He had all the tools there to ride it out, but he took the bait right away. Chicken probably liked her odds of getting rid of the one person who neutralized their poison, and went with it. • October 12, 2017 at 8:32 amSpacyRicochet That was Dog’s actual plan though. At least, until Chicken found him. Best thing he could’ve done was kill her then and there, but hindsight is 20/20. • October 11, 2017 at 5:47 pmVelvet Scarlantina I want Tori to survive but looking at the next title, she’ll either be done in by Ox or Usagi T_T You do have your priorities right…. • October 11, 2017 at 6:01 pmVelvet Scarlantina And everybody, clap your hands • October 12, 2017 at 6:37 amChoya I’m hoping Tori is able to get far in the contest too, and that the next title is a red herring to mislead us into focusing so much on Tori that someone else ends up on the chopping block instead. Show Spoiler ▼ I had to. I’m glad if anything that Juuni Taisen has some equal opportunity fanservice with Usagi and Tori so that there’s a little bit of something for everyone.
global_01_local_2_shard_00001658_processed.jsonl/7930
Wednesday, August 02, 2006 Funding for Research into Learning Disabilities RDFunding was contacted by Annie Hammerton, Research and Development Assistant, Colchester Primary Care Trust, on the 1st August 2006 to find some funding to conduct a study on Learning Disabilities. I found nine possible sources of funding for Annie to apply to and as a result Annie sent the following comments: "Thanks Claire, very helpful indeed - in fact I can't tell you how helpful this has been" I will keep the blogger updated on how Annie gets on! No comments:
global_01_local_2_shard_00001658_processed.jsonl/7951
Dec 29, 2008 Iraq, uncovered The Project for Excellence in Journalism did a study back in May that found coverage of the Iraq war accounted for only three percent of what American newspapers and broadcasters produced in the first months of 2008. Now the New York Times reports that the major networks have "quietly" decided to stop sending full-time reporters to Iraq. From the story: In Baghdad, ABC, CBS and NBC still maintain skeleton bureaus in heavily fortified compounds. Correspondents rotate in and out when stories warrant, and with producers and Iraqi employees remaining in Baghdad, the networks can still react to breaking news. But employees who are familiar with the staffing pressures of the networks say the bureaus are a shadow of what they used to be. Some of the offices have only one Western staff member. The staff cuts appear to be the latest evidence of budget pressures at the networks. And those pressures are not unique to television: many newspapers and magazines have also curtailed their presence in Baghdad. As a consequence, the war is gradually fading from television screens, newspapers and, some worry, the consciousness of the American public. As network and cable news outlets cut back in one war zone, there has been no corresponding increase in coverage of our other war zone - the one that's supposed to be the real frontline in the war on terror. Until CNN recently sent a full-time reporter to Afghanistan, no major television or cable news outlet had a full-time bureau there. (via Romensko) No comments:
global_01_local_2_shard_00001658_processed.jsonl/7967
greedy greed in music, cartoons & movies greedy means full of selfish desire or always wanting more, often at the expense of other people. sponge bob’s boss mr. krabs is greedy. this funny example from the educational show the electric company shows lord gregory taking all the green grapes at a dinner party (morgan freeman is one of the guests.). quite (very) greedy indeed. in her song greedy, ariana grande says several times that she is greedy for love. the first lyric of this song by liam gallagher, formerly of oasis, says i’m going toe to toe with a greedy soul toe to toe implies a fight. the first line of this dmx rap is y’all been eatin’ long enough now, stop bein’ greedy just keep it real, partner, give to the needy y’all is an informal but common contraction of you all. been eatin’ is a reduction of have been eating, which is present perfect continuous. needy means poor, in need of charity. and at 2:16 and 3:32 in this video, godsmack call the villain a greedy little baby. the song is called greed. greed is the noun equivalent to greedy. it appears in this somewhat forgotten anti-imperial 80s hit by world party along with its synonym avarice. at 1:55 the lyrics say avarice and greed are gonna drive you over the endless sea they will leave you drifting in the shallows drowning in the oceans of history gonna is a reduction of going to. endless means without end, infinite. drift means floating without direction. shallows is a part of the sea that is not deep. drown means die from inhaling water. wonder woman as a galley slave wonder woman as a galley slave later in the same verse, world party creates this image using all the good people for your galley slaves as your little boat struggles through the the warning waves but u will pay, u will pay tomorrow galley slaves are forced to row a ship against their will. as means while. struggle means have trouble, fight. the message of the video, as in most cases, is that greed is a negative characteristic. around the same time ship of fools was a hit in the 80s however, the movie wall street was released and michael douglas, playing the part of gordon gekko made this line famous greed, for lack of a better word, is good lack means not have. greed can also be used as an adjective, like in this song by l.a. rockers la luz about a greed machine that tracks u down even if u give away (let other people have) everything u own. do u agree with gordon gekko’s analysis that greed is good? or do u share world party’s view that we will pay tomorrow for today’s greed? what other images of greed u know of in movies, series, cartoons, songs, etc.? have fun, amigos. Leave a Reply
global_01_local_2_shard_00001658_processed.jsonl/7977
Roadway Auto And Sport Inc. Roadway Auto And Sport Inc. 1140 Albert St Regina, SK S4R 2R1 Phone: (306) 522-5526 Toll-Free: 1-866-201-1511 Schedule A Test Drive 2013 Honda Civic LX Asking: $0 * Required fields Due to previously confirmed test drive appointments, we can not guarantee the date and time that you have selected. We will contact you shortly to confirm appointment time. Privacy Policy
global_01_local_2_shard_00001658_processed.jsonl/7986
Log In | Register Skip to main content Topic: WTB used Motor (Read 1243 times) previous topic - next topic • 746 • 0 WTB used Motor Step son needs a good used motor. 1600cc is fine as long as it's complete. Like most kids, he doesn't have a ton of money, if you got something let me know.  Even a 1500SP would be fine.  Not looking for power, just something that runs... 66 Baja Certified Project addict
global_01_local_2_shard_00001658_processed.jsonl/7999
User Tools Site Tools Composting toilet Composting toilets are waterless (dry) toilets designed for use in applications without a plumbed sewage system. They operate on two principles: 1. dessication of solid waste in an absorbant media to eliminate odor and mess. 2. separation of liquid and solid waste to avoid messing up the first step The media would compost over time, but composting toilets are emptied regularly, even if infrequently. This means the media is actually not composting to any significant degree in the toilet. Some have argued a better term for this system is “dessicating toilet” but the name is not in widespread use. While composting toilets are often vented by a fan, this is to remove moisture from the toilet rather than to control waste odors (which are negligible). In general an RV-appropriate composting toilet is designed for use by 1-2 people. In this use the solids compartment is used for about 2 person-months. The liquids tank fills in a few person-days. Normal 1-ply toilet paper is safe for the solids compartment though overuse can reduced capacity and over-dry the compost medium. Commercial composting toilets are a sit-to-pee design for both sexes. The urine diverson systems are designed to work when sitting and keeping urine out of the solids compost is critical to the operation of the toilet. Calcium deposits (if any) on the diverter can be removed with Lime-a-way.1) Commercial composting toilets generally keep the solids container closed by a door when not in active use. There are two approaches: 1. “straight drop” - the cover is removed before use and deposits are made directly into the solids compartment 2. platform - there is a trapdoor mechanism that opens when the deposit is completed (as when flushing a plumbed toilet). A coffee filter can be placed over the trapdoor as a liner to reduce mess. Some RVers keep a spray bottle of water handy to rinse down traces of liquids or solids that remain in the bowl. • coconut coir (shredded and compressed husk) - recommended by Nature's Head.2) • sphagnum or peat moss - recommended by C-Head3), Airhead4), and Nature's Head.5) • sawdust - recommended by C-Head6) • ground cob There are several commercial models suitable for RV use. One can also make a simple DIY model. Nature's Head images-na.ssl-images-amazon.com_images_i_41k7tv5c0kl._ac_us160_.jpg Features: • made in the USA • stainless fittings • 5 year warranty • 2.2gal liquid tank with visible level • relocatable compost crank • relocatable vent outlet • relatively low cost (about $300 less due to simpler components) • straight drop system.7) • a template for making a cardboard mockup • uses normal 1gal milk jugs for liquid tank Note: The C-Head's use of an inexpensive, cut-down 5gal bucket for the solids reduces costs but has some side effects the prospective buyer should consider: 1. solids compartment needs to be emptied about 2x as often as other commercial models (every 2 person-weeks). 2. auger-style agitator does not mix in toilet paper in very well; it tends to float on top. butterfly not included Features: • designed to mimic domestic toilets • 5 year warranty • can remove liquids tank without opening solids compartment DIY bucket system images-na.ssl-images-amazon.com_images_i_417jm1vilrl._ac_us160_.jpg A simple composting toilet can be made with a bucket, seat, liner and absorbent media. It is very cheap but has significant shortcomings compared to the commercial models: • no liquid diversion - one must arrange a separate system for urine; it cannot go into the bucket. Female RVers may want to look into clever and collapsible "go girl" funnels which allow them to pee standing up (and into a bottle). Because it can be difficult to control urine flow while pooping it may be best to pee before pooping. • no agitation - deposits are simply covered. • will probably not qualify as self-contained if a Ranger is checking that. Before inital use a layer of media goes in the bottom of the bucket; this makes cleanup easier if the liner breaks. Then a kitchen trash bag or other liner is placed in the bucket and a layer of media8) is added. After pooping in the bucket the deposit is covered with another layer of media. To clean out the bucket: remove any lid, tie off the bag or liner, and remove from the bucket. Toss in a dumpster as one would baby diapers or dog droppings. Install a new liner and bottom layer of media. The bucket is an ordinary 5-gallon bucket, as one might find at a home improvement store, food prep area, or the side of the road in a ditch. :-) For those with less space, there are reports that some 3.5 or 4 gallon buckets have the same top dimensions as the larger 5 gallon units.9) This might be important if you are planning to use a commercial seat/lid. One can use a normal lid over the bucket when not in use, but this precludes the attachment of a commercial lid (below). The rim is quite narrow and can be uncomfortable to sit on directly. Because of this, some use a length of pool noodle split down the middle and pushed down on the rim. It has to be removed again to replace the lid. The most common commercial seat/lid the Luggable Loo. It snaps onto the top rim like a bucket lid would. The Privy 500 is a urine-diverting seat designed for tiny house installations. It might be adaptable to a bucket system, running the liquid into a nearby milk jug or similar. The shipping box has a cut-out template printed right on it. There are separators/diverters sold on eBay. Feature Nature's Head C-Head Airhead DIY Approximate cost~$950 ~$600 ~$1000 ~$20 liquid separationyes yes yes no liquids capacity2.2gal10) 1gal11) 2gal12) n/a solid depositstrapdoor straight drop trapdoor straight drop can add toilet paper yes not recommended13),14) yes yes must open solids compartment to empty liquids yes yes no n/a warranty 5 years15) 30 days16) 5 years17) n/a toilet/composting.txt · Last modified: 2017/12/31 06:35 by frater_secessus
global_01_local_2_shard_00001658_processed.jsonl/8003
Scheme 48 Manual | Contents | Previous Chapter: Acknowledgements | Next Chapter: User's guide Previous: Acknowledgements | Next: User's guide Scheme 48 is an implementation of the Scheme programming language as described in the Revised5 Report on the Algorithmic Language Scheme [6]. It is based on a compiler and interpreter for a virtual Scheme machine. Scheme 48 tries to be faithful to the Revised5 Scheme Report, providing neither more nor less in the initial user environment. (This is not to say that more isn't available in other environments; see below.) Support for numbers is weak: bignums are slow and floating point is almost nonexistent (see description of floatnums, below). Scheme 48 is under continual development. Please report bugs, especially in the VM, especially core dumps, to Include the version number x.yy from the "Welcome to Scheme 48 x.yy" greeting message in your bug report. It is a goal of this project to produce a bullet-proof system; we want no bugs and, especially, no crashes. (There are a few known bugs, listed in the doc/todo.txt file that comes with the distribution.) Send mail to to be put on a mailing list for announcements, discussion, bug reports, and bug fixes. Previous: Acknowledgements | Next: User's guide
global_01_local_2_shard_00001658_processed.jsonl/8009
give battle in vain / london Give Battle In Vain navigating the terror (data book John Hyatt) by the questionably-gendered DORIA HEMMING [star of chapter 31] with his/her sister/brother RADIO Author/Artist will appear in person(s) at 6.00pm on 5th July 00. Giving out free absinthe (while stocks last) His/her traces will remain in the Foundry Vaults until 16th July. ... It was a complex story. Indeed so complex that it seemed a deliberate smoke-screening device. An arts project by the internationally renowned artist, Doria Hemming had been unveiled to unanimous arts press applause down in the city centre. The trans/bisexual Hemming had announced that he/she was teaming up on the project with a rising new art star, the AISCARP. Doria Hemming teaming up with anyone was unprecedented. He/she was a superstar; a household brand name. Hemming was the sort of artist a city bought in to create some buzz about the fact that the city was a city, a real place rather than just a site through which information and data was switched and shifted. With the collapse of national boundaries, following new technical development, cities had to project their image on to a world stage. Hiring in arts superstars was one way of doing this, a little like the Italian Renaissance of the fifteenth centuary, when city states hired in the roving artists-for-hire to execute civic buildings, murals or statuary. There were about six contemporary artists of Hemming's global stature. Hemming did not need to team up, let alone with an Artificially Intelligent Self-Curating Robot Programme. more photographs
global_01_local_2_shard_00001658_processed.jsonl/8020
Sabah Snake Grass vs India Snake Grass India Snake Grass The followings are the differences between Sabah Snake Grass and India Snake Grass : 1) The India SG is bitter in taste than Sabah SG; 2) The ISG's detoxification effect on body is better than SSG; 3) The ISG's cooling effect is higher than SSG; 4) The SSG's anti-cancer potency is higher than ISG; 5) The SSG's stem is rounded, their leaves are longer while ISG's stem is square, their leaves are shorter; 6) The SSG's flower is red while the ISG is white but you may wait for many years before you can witness the flower.
global_01_local_2_shard_00001658_processed.jsonl/8025
Panagiotis Panagiotopoulos Email: ppanagiotis[at] Mr. Panagiotis Panagiotopoulos received the B.Sc. degree from the Department of Telecommunications Science and Technology, University of Peloponnese, in 2009. Java Developer As a Java Developer he took part in the team that built a Java application, which focuses on Video-to-Video communication, called “LiveCity”. As a System Administrator he transferred all lab servers to virtual machines using Ganeti Cluster Virtualization management and set up a mini cluster configured by SaltStack (orchestration manager). Also he set up monitoring – notification system for all machines (hosts and virtual) using Ganglia and Icinga (monitoring tools). Moreover he set up an SDN wireless scenario using OpenFlow and Debian based routers. He is also a post graduate student at Advanced Informatics Systems, University of Piraeus. Linked In Full CV
global_01_local_2_shard_00001658_processed.jsonl/8029
Ubiquitination Inhibits Neuronal Exit See allHide authors and affiliations Science  24 Dec 2010: Vol. 330, Issue 6012, pp. 1754-1755 DOI: 10.1126/science.1200475 You are currently viewing the summary. View Full Text Log in to view the full text Log in through your institution Log in through your institution In the developing brain, neurons increase their numbers in an “amplification compartment,” from which they emigrate to colonize distant brain structures. How young neurons leave these compartments, however, has been unclear, although researchers have hypothesized that they turn on a biochemical “migration program” that enables them to exit. On page 1834 of this issue, however, Famulski et al. (1) show that one common type of neuron uses an opposite strategy. To exit, young cerebellar granule neurons shut down a protein ubiquitination mechanism that inhibits the formation of a molecular complex that controls adhesion and allows the neurons to migrate to a final destination. Granule cells, a large population of small neurons in the central nervous system, proliferate at the surface of the developing cerebellum. They then undergo a transient phase of “tangential” migration near the cerebellar surface before extending a radial process (sprout-like extension) and migrating to deeper layers farther from their birthplace (see the figure). The mechanisms that control the onset of radial migration are poorly understood. In their study, Famulski et al. explore the role of ubiquitination, a common cellular process in which the protein ubiquitin bonds to proteins, marking them for destruction and recycling. Research is revealing that ubiquitination is as important as phosphorylation in regulating biological processes. Early analyses of ubiquitination's role in cell migration, for instance, showed that it can activate the intracellular trafficking and recycling of adhesion molecules (which enable cells to stick to each other or to extracellular products) and regulate actin cytoskeleton dynamics (2, 3). In the cerebral cortex, researchers have suggested that polyubiquitination and degradation arrests the radial migration of neurons (4).
global_01_local_2_shard_00001658_processed.jsonl/8031
Monday, April 26, 2010 Crabby science? Yes, crabbiness can be a science! But we're not talking about a bad case of the grouchies here. What we're talking about is all the science found in the beauty of crabapples! Here at OARDC, we're home to one of the nation's largest collection of crabapple trees...over 800 to be exact. And those trees represent some 300 different varieties. Why? Our research arboretum, Secrest Arboretum, does amazing research on the disease resistance of these beautiful trees. Because as much as they are known for their beauty, they are also known for their ease of contracting diseases like apple scab and frog-eye leaf spot. So our researchers evaluate all of these different varieties not only for their beautiful flowering characteristics, but also for their disease resistance. They even publish their results and offer them up to you, the public, to help you make the very best selections if you're choosing a crabapple for your own home.....and, well, to keep you from becoming "crabby" if you make a bad choice. So how can you get your kids involved in the science of crabapples for themselves? Here are some quick suggestions: 1. Get outdoors! Enjoy the scientific wonders of nature in the spring! This is a fabulous time to talk about the life cycle of plants and how those gorgeous flower blossoms will soon give way to fruit on the trees. 2. Look at the effect of weather on the blooms. This year is one of the earliest springs on record....tied with 1998...which incidentally was one of the warmest years globally in the last 1,000 years! Our very own scientist Dan Herms has developed an amazing phenological calendar, and you can check it out for yourself online. 3. Evaluate your own plants. See which ones bloom first, longest, last, etc. Are certain varieties or species more prone to disease? As warm weather arrives and the kidders spend more time at home with more daylight hours, spend lots of time outdoors making observations. Science is all around us! All Thingz Related Summer Fun Related Posts with Thumbnails
global_01_local_2_shard_00001658_processed.jsonl/8038
View on MetaCPAN is shutting down Aran Clary Deltac > SQL-Abstract-Query-0.03 > SQL::Abstract::Query::Statement Annotate this POD View/Report Bugs Module Version: 0.03   Source   SQL::Abstract::Query::Statement - A role providing base functionality for statement objects. This role contains the shared functionality for the various statement classes. Much of this module contains low-level pieces that the normal user will not need to access directly (and probably shouldn't). The exceptions to this are the sql() attribute and the values() method, which should be used extensively by users of the query classes. my $statement = SQL::Abstract::Query::SomeClass->new( %named_args ); my $statement = SQL::Abstract::Query::SomeClass->new( $query, @arg_values ); my $statement = SQL::Abstract::Query::SomeClass->new( $query, @arg_values, \%extra_args ); New statement objects may be created by passing arguments to new() as either named values (a hash or hashref of name/value pairs as is typical) or as positional values. When passing arguments as positional values the first argument must be an instance of SQL::Abstract::Query. The rest of the arguments will be named using the "positional_args" static attribute which is declared by each statement class. A final hashref argument of extra arguments may be passed. All of the positional and extra arguments will be combined and used to instantiate the object. All of these type names are prefixed with "SQL::Abstract::Query::Types::". The name of a table. Currently there are no restrictions on this type except that it must be a plain string. A hashref of name/value pairs where the names are column names and the values are the column values to be set. This type may also be passed as an arrayref which will be coerced and turned in to a hashref where the values equal the keys. The where clause. Must be a hashref, arrayref, or a plain string. The SQL::Abstract::Query object that was used to generate this particular query object. This attribute contains the results of calling the underlying SQL::Abstract method plus any modifications that the query object makes. A query class must provide a builder method of the name _build_abstract_result() which is expected to return an array reference where the first entry is the SQL and the remaining entries are the bind values. The SQL will provide the value for the sql() attribute and the bind values will provide the values for the original_values() attribute. Typically you will have no need to access this attribute directly and instead should use the sql() attribute and the values() method. The bind values that were returned by the original construction of the abstract_result() attribute. Typically you will not need to access this directly. my $sql = $statement->sql(); This read-only attribute returns the SQL that was generated for the query. When "CONSTRUCTOR" is called with positional arguments, rather than named arguments, this attribute is used to determine which value should be assigned to which argument. Each statement class must provide a _build_positional_args() method that returns an arrayref of argument names. my @bind_values = $statement->values( \%field_values ); Given a hash ref of field name/value pairs this will return the values in the order in which they appear in the SQL. This is a shortcut to calling $query->abstract->_quote(). This method is called by SQL::Abstract::Query to provide the procedural interface to queries. Typically you will not want to call this directly. All arguments are passed straight on to the "CONSTRUCTOR". Returns a list containing the generated SQL and bind values. Aran Clary Deltac <> syntax highlighting:
global_01_local_2_shard_00001658_processed.jsonl/8052
Wedding Song 29 songs cover art Art: Spud Dates: 11/07/06 - 11/14/06 Songs: 29 Votes: 206 Links: Archive Forums Wiki Playlists: M3U XSPF JSON Fightmaster Summary: Billy's Little Trip got out the vote this week, besting even Glenny's Frisbee and Emergency Pizza Party, who seem to have brought a few new listeners to the site as well. There's evidence however, that some of BLT's buddies actually listened to the fight and voted for Glenn Case. newer → ← older
global_01_local_2_shard_00001658_processed.jsonl/8057
Sunday, February 26, 2012 This week, I want to remember: (2/20-2/24) Monday, February 20 The first "real" day back after our trip. We had a good mix of fun, both outdoor (it was almost 50 degrees!) and indoor, while I got unpacked and started on laundry. Ethan discovered a cool new thing: he can "watch 3D shows" at home. With sunglasses. Cameron, while washing his hands after playing outside: "Mommy, I can read that sign. It says, 'welcome'." Me: "Great job, Cam. You are right." Cameron: "And, I can read it backwards. It says, 'el...come....wuh'." Tuesday, February 21 This stretch of warm weather has been so good for my littles.  Truthfully, it would figure that we would get a winter with average temps of 50 degrees--considering I bought snowsuits for everyone last year (on clearance, of course--but still!)  But, I can't say I'm sad about it! Other than missing out of some good pics of Lola in her first snow storm.... The wonderful warmth has definitely been a blessing.  Today, the kids went on a find and discover mission, with a mason jar and a couple of pairs of binoculars! Lola has learned the word "Nutella" and asks for it regularly.   I have a hard time telling her no....because when Lolee gets Nutella for lunch, so does Mommy. It's worth the cleanup. Last time Grandma 'Nette came down, she brought some handmade goodies for Lola and her babies. She made Lola a flannel pillow and matching blanket--and matching (smaller) ones for her babies. Lola took to them instantly and has slept with everything every nap and night since. {You can't see the flannel blanket in this picture--it is actually under the crocheted white blanket, which was also a gift from Grandma 'Nette. It has colored blocks on each side--and on each block it has the name of one of the children. She added each name as the kids were all born.} Wednesday, February 22 We have a shoe tie-er! Officially!, so proud of himself! {He is not posing weird...this is mid-celebratory dance} Thursday, February 23 Ethan: "Mommy, were you born a long time ago?" Me: "Yes, it was many years ago, honey.  Thirty three years ago." E: "Did you get to see Jesus back then?" {Yikes, it wasn't that long ago....} Pete the Policeman (a friend that I grew up with who is now a county sheriff) came over to the house, to let the boys check out his squad car! The loved every minute of it, and got to press all the buttons, light up the lights, and even talk through the loud speaker. I'm sure the whole town heard them calling, "Momma....Moooomm-maaaaa" for several minutes!  (I'm fairly certain people thought we were in big trouble....) The kids insisted on a bath together. They wanted to play with their new snakes that they got as a prize the night before at church for saying a verse. It's a tight squeeze, but they make it work. Friday, February 24 Lola: "I no wanna pay legos!" Ethan: "Okay, baby." Lo: "I no want to!" E: "Okay, baby." Lo: "No!! I no WANT to!" E: "Lola, you don't have to play legos!" 10 seconds later.... Lola: "I wanna pay legos! I want to!" E, not looking up from building and not missing a beat, to me: "She's difficult." After serving the kids lunch, and before I started my ironing, I said to Ethan: "Ethan, can I get you anything?" I was trying to avoid being interrupted while ironing, of course. He responded: "Can I have a drink Mommy?" Me: "Of course, buddy. Milk, water....juice?" E: "Well, I'd like some juice. But not the kind that looks like pee." I nearly spit my mouthful of water out. I opened the door, and sure enough--that white grape juice sure did resemble a jug half full know.  And, apparently, that was enough to make E not want to drink it.Normally, I buy a fruity or grape-y kind. But white grape happened to be on sale, so that was what I got this time. Never again. After eating, Lola told me she was all done. I said, "Did you clean your plate?" She looked down and slowly responded: "Yeeeeees!" Then I saw her moving a bit....I came over, saw this: Then, this. Smart cookie.
global_01_local_2_shard_00001658_processed.jsonl/8064
The Picture of Dorian Gray – Oscar Wilde Analysis of Major Characters Dorian Gray Дата канвертавання19.04.2016 Памер19.74 Kb. The Picture of Dorian Gray – Oscar Wilde Analysis of Major Characters Lord Henry Wotton - Lord Henry is a man possessed of “wrong, fascinating, poisonous, delightful theories.” He is a charming talker, a famous wit, and a brilliant intellect. Given the seductive way in which he leads conversation, it is little wonder that Dorian falls under his spell so completely. Lord Henry’s theories are radical; they aim to shock and purposefully attempt to topple established, untested, or conventional notions of truth. In the end, however, they prove naïve, and Lord Henry himself fails to realize the implications of most of what he says. Lord Henry is a relatively static character—he does not undergo a significant change in the course of the narrative. He is as coolly composed, unshakable, and possessed of the same dry wit in the final pages of the novel as he is upon his introduction. Because he does not change while Dorian and Basil clearly do, his philosophy seems amusing and enticing in the first half of the book, but improbable and shallow in the second. Lord Henry muses in Chapter Nineteen, for instance, that there are no immoral books; he claims that “[t]he books that the world calls immoral are books that show the world its own shame.” But since the decadent book that Lord Henry lends Dorian facilitates Dorian’s downfall, it is difficult to accept what Lord Henry says as true. Although Lord Henry is a self-proclaimed hedonist who advocates the equal pursuit of both moral and immoral experience, he lives a rather staid life. He participates in polite London society and attends parties and the theater, but he does not indulge in sordid behavior. Unlike Dorian, he does not lead innocent youths to suicide or travel incognito to the city’s most despised and desperate quarters. Lord Henry thus has little notion of the practical effects of his philosophy. His claim that Dorian could never commit a murder because “[c]rime belongs exclusively to the lower orders” demonstrates the limitations of his understanding of the human soul. It is not surprising, then, that he fails to appreciate the profound meaning of Dorian’s downfall. Basil Hallward - Basil Hallward is a talented, though somewhat conventionally minded, painter. His love for Dorian Gray changes the way he sees art; indeed, it defines a new school of expression for him. Basil’s portrait of Dorian marks a new phase of his career. Before he created this masterwork, he spent his time painting Dorian in the veils of antiquity—dressed as an ancient soldier or as various romantic figures from mythology. Once he has painted Dorian as he truly is, however, he fears that he has put too much of himself into the work. He worries that his love, which he himself describes as “idolatry,” is too apparent, and that it betrays too much of himself. Though he later changes his mind to believe that art is always more abstract than one thinks and that the painting thus betrays nothing except form and color, his emotional investment in Dorian remains constant. He seeks to protect Dorian, voicing his objection to Lord Henry’s injurious influence over Dorian and defending Dorian even after their relationship has clearly dissolved. Basil’s commitment to Dorian, which ultimately proves fatal, reveals the genuineness of his love for his favorite subject and his concern for the safety and salvation of Dorian’s soul. The Purpose of Art - When The Picture of Dorian Gray was first published in Lippincott’s Monthly Magazine in 1890, it was decried as immoral. In revising the text the following year, Wilde included a preface, which serves as a useful explanation of his philosophy of art. The purpose of art, according to this series of epigrams, is to have no purpose. In order to understand this claim fully, one needs to consider the moral climate of Wilde’s time and the Victorian sensibility regarding art and morality. The Victorians believed that art could be used as a tool for social education and moral enlightenment, as illustrated in works by writers such as Charles Dickens and George Gissing. The aestheticism movement, of which Wilde was a major proponent, sought to free art from this responsibility. The aestheticists were motivated as much by a contempt for bourgeois morality—a sensibility embodied in Dorian Gray by Lord Henry, whose every word seems designed to shock the ethical certainties of the burgeoning middle class—as they were by the belief that art need not possess any other purpose than being beautiful. If this philosophy informed Wilde’s life, we must then consider whether his only novel bears it out. The two works of art that dominate the novel—Basil’s painting and the mysterious yellow book that Lord Henry gives Dorian—are presented in the vein more of Victorian sensibilities than of aesthetic ones. That is, both the portrait and the French novel serve a purpose: the first acts as a type of mysterious mirror that shows Dorian the physical dissipation his own body has been spared, while the second acts as something of a road map, leading the young man farther along the path toward infamy. While we know nothing of the circumstances of the yellow book’s composition, Basil’s state of mind while painting Dorian’s portrait is clear. Later in the novel, he advocates that all art be “unconscious, ideal, and remote.” His portrait of Dorian, however, is anything but. Thus, Basil’s initial refusal to exhibit the work results from his belief that it betrays his idolization of his subject. Of course, one might consider that these breaches of aesthetic philosophy mold The Picture of Dorian Gray into something of a cautionary tale: these are the prices that must be paid for insisting that art reveals the artist or a moral lesson. But this warning is, in itself, a moral lesson, which perhaps betrays the impossibility of Wilde’s project. If, as Dorian observes late in the novel, the imagination orders the chaos of life and invests it with meaning, then art, as the fruit of the imagination, cannot help but mean something. Wilde may have succeeded in freeing his art from the confines of Victorian morality, but he has replaced it with a doctrine that is, in its own way, just as restrictive. The Supremacy of Youth and Beauty - The first principle of aestheticism, the philosophy of art by which Oscar Wilde lived, is that art serves no other purpose than to offer beauty. Throughout The Picture of Dorian Gray, beauty reigns. It is a means to revitalize the wearied senses, as indicated by the effect that Basil’s painting has on the cynical Lord Henry. It is also a means of escaping the brutalities of the world: Dorian distances himself, not to mention his consciousness, from the horrors of his actions by devoting himself to the study of beautiful things—music, jewels, rare tapestries. In a society that prizes beauty so highly, youth and physical attractiveness become valuable commodities. Lord Henry reminds Dorian of as much upon their first meeting, when he laments that Dorian will soon enough lose his most precious attributes. In Chapter Seventeen, the Duchess of Monmouth suggests to Lord Henry that he places too much value on these things; indeed, Dorian’s eventual demise confirms her suspicions. For although beauty and youth remain of utmost importance at the end of the novel—the portrait is, after all, returned to its original form—the novel suggests that the price one must pay for them is exceedingly high. Indeed, Dorian gives nothing less than his soul. The Superficial Nature of Society - It is no surprise that a society that prizes beauty above all else is a society founded on a love of surfaces. What matters most to Dorian, Lord Henry, and the polite company they keep is not whether a man is good at heart but rather whether he is handsome. As Dorian evolves into the realization of a type, the perfect blend of scholar and socialite, he experiences the freedom to abandon his morals without censure. Indeed, even though, as Basil warns, society’s elite question his name and reputation, Dorian is never ostracized. On the contrary, despite his “mode of life,” he remains at the heart of the London social scene because of the “innocence” and “purity of his face.” As Lady Narborough notes to Dorian, there is little (if any) distinction between ethics and appearance: “you are made to be good—you look so good.” The Negative Consequences of Influence - The painting and the yellow book have a profound effect on Dorian, influencing him to predominantly immoral behavior over the course of nearly two decades. Reflecting on Dorian’s power over Basil and deciding that he would like to seduce Dorian in much the same way, Lord Henry points out that there is “something terribly enthralling in the exercise of influence.” Falling under the sway of such influence is, perhaps, unavoidable, but the novel ultimately censures the sacrifice of one’s self to another. Basil’s idolatry of Dorian leads to his murder, and Dorian’s devotion to Lord Henry’s hedonism and the yellow book precipitate his own downfall. It is little wonder, in a novel that prizes individualism—the uncompromised expression of self—that the sacrifice of one’s self, whether it be to another person or to a work of art, leads to one’s destruction. The Picture of Dorian Gray - The picture of Dorian Gray, “the most magical of mirrors,” shows Dorian the physical burdens of age and sin from which he has been spared. For a time, Dorian sets his conscience aside and lives his life according to a single goal: achieving pleasure. His painted image, however, asserts itself as his conscience and hounds him with the knowledge of his crimes: there he sees the cruelty he showed to Sibyl Vane and the blood he spilled killing Basil Hallward. Homoerotic Male Relationships - The homoerotic bonds between men play a large role in structuring the novel. Basil’s painting depends upon his adoration of Dorian’s beauty; similarly, Lord Henry is overcome with the desire to seduce Dorian and mold him into the realization of a type. This camaraderie between men fits into Wilde’s larger aesthetic values, for it returns him to antiquity, where an appreciation of youth and beauty was not only fundamental to culture but was also expressed as a physical relationship between men. As a homosexual living in an intolerant society, Wilde asserted this philosophy partially in an attempt to justify his own lifestyle. For Wilde, homosexuality was not a sordid vice but rather a sign of refined culture. As he claimed rather romantically during his trial for “gross indecency” between men, the affection between an older and younger man places one in the tradition of Plato, Michelangelo, and Shakespeare. The Color White - Interestingly, Dorian’s trajectory from figure of innocence to figure of degradation can be charted by Wilde’s use of the color white. White usually connotes innocence and blankness, as it does when Dorian is first introduced. It is, in fact, “the white purity” of Dorian’s boyhood that Lord Henry finds so captivating. Basil invokes whiteness when he learns that Dorian has sacrificed his innocence, and, as the artist stares in horror at the ruined portrait, he quotes a biblical verse from the Book of Isaiah: “Though your sins be as scarlet, yet I will make them as white as snow.” But the days of Dorian’s innocence are over. It is a quality he now eschews, and, tellingly, when he orders flowers, he demands “as few white ones as possible.” When the color appears again, in the form of James Vane’s face—“like a white handkerchief”—peering in through a window, it has been transformed from the color of innocence to the color of death. It is this threatening pall that makes Dorian long, at the novel’s end, for his “rose-white boyhood,” but the hope is in vain, and he proves unable to wash away the stains of his sins. The Opium Dens - The opium dens, located in a remote and derelict section of London, represent the sordid state of Dorian’s mind. He flees to them at a crucial moment. After killing Basil, Dorian seeks to forget the awfulness of his crimes by losing consciousness in a drug-induced stupor. Although he has a canister of opium in his home, he leaves the safety of his neat and proper parlor to travel to the dark dens that reflect the degradation of his soul. James Vane - James Vane is less a believable character than an embodiment of Dorian’s tortured conscience. As Sibyl’s brother, he is a rather flat caricature of the avenging relative. Still, Wilde saw him as essential to the story, adding his character during his revision of 1891. Appearing at the dock and later at Dorian’s country estate, James has an almost spectral quality. Like the ghost of Jacob Marley in Charles Dickens’s A Christmas Carol, who warns Scrooge of the sins he will have to face, James appears with his face “like a white handkerchief” to goad Dorian into accepting responsibility for the crimes he has committed. The Yellow Book - Lord Henry gives Dorian a copy of the yellow book as a gift. Although he never gives the title, Wilde describes the book as a French novel that charts the outrageous experiences of its pleasure-seeking protagonist (we can fairly assume that the book in question is Joris-Karl Huysman’s decadent nineteenth-century novel À Rebours, translated as “Against the Grain” or “Against Nature”). The book becomes like holy scripture to Dorian, who buys nearly a dozen copies and bases his life and actions on it. The book represents the profound and damaging influence that art can have over an individual and serves as a warning to those who would surrender themselves so completely to such an influence. База данных защищена авторским правом © 2016 звярнуцца да адміністрацыі     Галоўная старонка
global_01_local_2_shard_00001658_processed.jsonl/8066
A Midsummer Night's Dream A Midsummer Night's Dream A Midsummer Night's Dream Our Price: The authoritative edition of A Midsummer Night's Dream from The Folger Shakespeare Library, the trusted and widely used Shakespeare series for students and general readers, includes: • Scene-by-scene plot summaries • A key to the play's famous lines and phrases • An introduction to reading Shakespeare's language • An up-to-date annotated guide to further reading Essay by Catherine Belsey Edited by Barbara A. Mowat and Paul Werstine Visit Folger.edu for more resources, including overviews of each play, information about Shakespeare's world, and teaching modules. William Shakespeare, 2009, Paperback, 256 Pages. ISBN-13: 978-0-7434-7754-3. • Color: send to a friend send to a friend print notes print notes
global_01_local_2_shard_00001658_processed.jsonl/8079
Economics, Literature and Scepticism Powered by Blogger. About Me My photo Tuesday, January 27, 2009 Transitive Brains Posted by Simon Halliday | Tuesday, January 27, 2009 | Category: , | A recent paper by Camillo Padoa-Schioppa and John Assad investigates the encoding of value in the brain for rhesus monkeys, a renewal of efforts to understand how and whether the assumption of transitivity, so crucial to the behavioral sciences, is in fact an accurate description of how individuals act when making choices. It builds on a previous paper (2006) of theirs in Nature, 'Neurons in the orbitofrontal cortex encode economic value.' The novelty in their (2008) research is that they provide evidence for value-encoding of juice consumption as menu-invariant, i.e. invariant to changes in the goods that are rank-preferred by the monkeys. I'm going to give you a brief summary and then make some points on where I'd be interested in seeing future research go. There are three basic characteristics that they define. First, offer value responses which encode quantity or value of one or two offered juices (products). Second, chosen value responses which encode the value of the chosen juice (product) independent of the juice (product) type. Third, taste responses which are binary responses reflecting which one of two juices (products) are chosen independent of the amount of the juice (product). I have highlighted the notion of juice as product to foreground the idea of parallels between monkey juice consumption and the consumption of products by humans. Padoa-Schioppa and Assad assert that the second response, the chosen value response, is the most interesting because it is subjective and it ``represents a common unit for qualitatively different goods.'' (95) Their experimental methods are, thus, engaged with unearthing and isolating this chosen value effect. It is on this basis that we must assess their experimental methods and design. The Experiment The authors ran experiments with two (a male and a female) rhesus monkeys, measuring the neuronal output in the orbitofrontal cortex (OFC). The monkeys were prepared for the experiments using normal surgical procedures in preparation for neuronal recording. Juice was delivered to the monkeys in specifically measured quanta. The instructions, as such, that the monkeys were given were consistent with previous literature on the subject, with the monkeys selecting from a set of coloured squares indicating type and quantity of juice. The monkeys had an initial fixation point, after which a `go' signal was given: the introduction of two saccade targets adjacent to the coloured squares. Once the monkey had maintained fixation on the saccade target that they chose, juice would be delivered to them. Trials were aborted if the monkey broke fixation before the `go' signal. This procedure is highly detailed and thus easily replicable with appropriate resources. The theory was that there are three potential neuronal responses: o ffer value, chosen value and taste responses. The argument was that the Orbitofrontal Cortex (OFC) neurons have previously responded to delivery of a given juice depending on the context (Tremblay & Schultz 1999). However, that study did not assess whether these encoded responses were invariant to changes in menu. They designed an experiment in which they could isolate whether preference encoding is independent of menu choice and thus whether any (A,B,C) triple selected for an experimental session would allow for valid encoding of value in the OFC, value which would be consistent across menus. The crucial underlying distinction though is that the set of juices given fits the ranking A > B > C, with any one juice falling into a class A, B or C. This brings us to the question of how the juice rankings are derived, for which we do not have the data. Nevertheless, the final result was that 1 unit of an A class juice was equivalent to 1.3 units of a B class juice and one unit of a class B juice was approximately equivalent to 3 units of a class C juice. Finally, they showed that 1 unit of a class A juice was roughly equivalent to 4 units of a class C juice. Hence you have approximate value indifference (1 unit A = 1.3 x 3 ~= 4). Thus the authors cover a broad base of theory related to preference transitivity and show that with distinct and well-defined preferences, values are encoded and the structure of these values reflects the mathematical conditions of value transitivity and indiff erence transitivity. This is very interesting and definitely warrants further research in other monkeys and for a larger sample of individuals, rather than it being some quirk of the two monkeys in the experiment. Random Reflection Would it not be cool, ladies and gentlemen, if instead of using disjoint sets of ranked goods they doing something that attempted to replicate what Simonson and Tversky (1992) (and most recently reinvigorated in Dan Ariely's book Predictably Irrational) discussed in house choice - seeing two potential consumption goods and then introducing what would be called an 'irrelevant alternative' in economic theory and seeing how the type of 'irrelevant alternative' (or the degree of similarity of the irrelevant alternative to one of the actual choices) affected value encoding. To me, this would bridge the gap from what would be a traditionally 'behavioral economics' assertion (for which we require, I believe, more evidence) and that of a good neurocellular economics discussion. A question for further research I suppose. Camillo Padoa-Schioppa, John A Assad (2007). The representation of economic value in the orbitofrontal cortex is invariant for changes of menu Nature Neuroscience, 11 (1), 95-102 DOI: 10.1038/nn2020 Currently have 2 comments: 1. Very interesting, thanks. What field is this, btw? Neuroeconomic primatology? :-) 2. This is 'classic' neuroeconomics in the mode of work by Paul Glimcher (see his book Decisions, Uncertainty and the Brain for an early, 2003 I think, review), also see people like Aldo Rustichini and others. Their basic notion for neuroeconomics is that economic principles should be used to help explain the way in which the brain operates, specifically by using primates as the closest approximator of human. I'll try to report on similar work in the future.
global_01_local_2_shard_00001658_processed.jsonl/8094
Presentation is loading. Please wait. Presentation is loading. Please wait.  Experience the oldest literary form  Study and analyze the genre of epic  Study and analyze other elements of literature (character, theme, etc.) Similar presentations Presentation on theme: " Experience the oldest literary form  Study and analyze the genre of epic  Study and analyze other elements of literature (character, theme, etc.)"— Presentation transcript: 2  Experience the oldest literary form  Study and analyze the genre of epic  Study and analyze other elements of literature (character, theme, etc.)  Look for archetypes  Enjoy a fascinating adventure tale  Today we will discuss three things: Greek/Roman mythology, Background of The Iliad and Odyssey, Hero Cycle 3  Definition: A traditional story rooted in primitive folk beliefs of cultures  Uses the supernatural to interpret natural events  Explains the culture’s view of the universe and the nature of humanity 5 FYI: The two major, influential deities that you need to be familiar with are Poseidon and Athena. 6  Roman Name: Jupiter (also Jove)  Supreme god of the Olympians.  Fathered many characters in mythology 7  Roman Name: Neptune  God of the Seas and Waters- tempestuous, violent and cruel  “The Earthshaker”  The god who opposes Odysseus  Odysseus is also quick to anger, violent and cruel at times to this god 8  Roman Name: Minerva  Goddess of Wisdom and War  a war goddess who fights to protect the homeland.  Sprang from Zeus’s head  goddess who favors Odysseus 9  Roman Name: Mercury  Messenger of the Gods  Appears in more myths than any other character 10  Nine daughters of Zeus and Mnemosyne  Inspired artists of all kinds  Goddesses who presided over the arts and sciences  “He is happy whom the muses love.” Clio, Urania, Thalia, Melpomene, Erato, Calliope, Euterpe, Terpsichore, Polyhymnia 11  Roman Name: Parcae, Moirae  Three sisters  Clotho (“The Spinner”)  Lachesis (“The disposer of lots”)  Atropos (“The cutter”)  They weave, measure, and cut the thread of life for humans. 12 Cyclops One eyed monster, son of Poseidon Charybdis bladder of a creature whose face was all mouth and whose arms and legs were flippers and who swallows huge amounts of water three times a day before belching them back out again, creating whirlpools Scylla grotesque sea monster, with six long necks equipped with grisly heads, each of which contained three rows of sharp teeth. Circe is a minor goddess of magic, a witch and enchantress Calypso Sea nymph In The Odyssey 13 It’s good to know, during the Odyssey when we talk about dates…… 3000 years ago also can mean 1000 B.C.E B.C. = Before ChristB.C.E= Before the Common Era A.D. = After DeathA.C.E.= After the Common Era 14  Definition: Long, narrative poem about the adventures of a hero  Shows values & beliefs of a culture  Includes a journey / quest  Encompasses vast setting (world)  Involves supernatural forces  Hero’s actions determine nation’s fate 15  Concern eternal human problems such as the conflict between GOOD and EVIL  Written or told on a grand scale and often in ceremonial style 16  The hero is a great leader who is identified strongly with a particular people or society.  The setting is broad and often includes supernatural realms, especially the land of the dead.  The hero does great deeds in battle or undertakes an extraordinary journey or quest.  Sometimes gods or other supernatural or fantastic beings take part in the action.  The story is told in heightened language 17  Invocation to the muse or other deity ("Sing, goddess, of the wrath of Achilles")  Story begins in medias res (in the middle of things)  Epic simile (a long simile where the image becomes an object of art in its own right as well as serving to clarify the subject).  Frequent use of epithets ("Aeneas the true"; "rosy-fingered Dawn"; "tall-masted ship")  Use of patronymics (calling son by father's name): "Anchises' son"  Previous episodes in the story are later recounted 18  The epic hero is a “LARGER THAN LIFE PERSON” who embodies the highest ideals of his culture and embodies LOYALTY, VALOR/ COURAGE, SENSE OF JUSTICE, DIGNITY, PERSISTENCE, and many other traits of the Anglo-Saxon culture  The epic hero usually undertakes a QUEST/ JOURNEY to achieve something of great value to themselves or society  Not a “Superman” with magical powers but a “REGULAR” human whose aspirations and accomplishments set him/her apart  Overcomes great obstacles/opponents but maintains HUMANITY  Epic hero experiences typical HUMAN EMOTIONS/ FEELINGS, yet is able to master and control these human traits to a greater degree than a typical person  The epic hero is an ARCHETYPAL character. 19 Epithet  Adjective or descriptive phrase regularly used to characterize a person, place, or thing. We speak of “Honest Abe,” for example, and “America the Beautiful.”  Homeric Epithet: compound adjective that modifies a noun. Ex: “wine-dark sea,” “rosy-fingered dawn,” “the gray-eyed goddess Athena.” 20  A Homeric or heroic simile compares heroic events to everyday occurrences.  Example: “A man in a distant field, no hearth fires near, / will hide a fresh brand in his bed of embers / to keep a spark alive for the next day; / so in the leaves Odysseus hid himself, (Lines 119-122) The way Odysseus hides himself in the leaves to sleep is compared to the way a burning coal is buried deep in the embers to preserve a spark for the next day. 21  Iliad: the archetype of the war epic.  A story of the 10 year Trojan War (estimated to have occurred around 1200 B.C.)  Began with Paris a Prince of Troy who took Helen, wife of King Menelaus. 22  Odyssey: the archetype of the story of a long journey; the long journey can be see as a metaphor for living one’s life.  A story of Odysseus’ long and wayward journey from the Trojan War. 23 Who was Homer?  No one knows for sure  Greek storyteller  composed the Iliad and the Odyssey around 800 BC  may have been blind, a group of poets, or even a woman 24  Trojan War was fought over Helen.  Although, their were underlying currents of tension as the Greeks wanted to control the trade of The Mediterranean.  Menelaus, king of Sparta, wanted his wife back.  Agamemnon, brother of Menelaus, gathered the army together.  Agamemnon got the wind to sail the ships to Troy by sacrificing his daughter to the gods.  Greeks won the war through trickery, the Trojan horse, created by Odysseus.  Achilles, greatest Greek hero, died young in the last year of the war.  Agamemnon, killed when he returned home by his wife who had taken another lover. 25 FYI: For many centuries it was believed that the 'Iliad' was a piece of imaginative and inventive fiction. In 1870, however, the German scholar Heinrich Schliemann began excavations at the place where Troy was believed to have stood. He satisfied himself, and eventually the rest of the world, that there had actually been a war fought there. The excavations revealed that several cities had stood on the spot before the one Homer celebrated. 26 The Illiad: Achilles’ role in the Trojan Wars  Achilles was the most important warrior in the Greek ranks. His argument with King Agamemnon led to his brooding and isolation from the war. His friend, Patroclus, disguised in Achilles’ armor, leads the men into battle. Hector bravely fought whom he thought was Achilles and killed the youth. Achilles, in rage, reenters the battle after the funeral of Patroclus.  The Iliad takes place in the 10 th and final year of the Trojan War 27 The Greek concept of a hero  In the Homeric epics, the heroes give the reader (or listener) the impression that, in order to be the best, to achieve arête, an individual must sacrifice for the society.  Greek heroes often had superhuman powers, though all Greek heroes and gods had a classic flaw.  In the Iliad, Homer uses Achilles as a central figure to illustrate the power of the gods, the role of fate in ones life and the ways man should deal with the travails of life in a way that continues tradition and protects the values of the culture. 28 A hollow wooden horse the Greeks built, supposedly to honor the Trojans. The Greeks pretended to leave and the horse was brought inside the gates of Troy. 29 When compared to its source material (Homer's The Iliad)...  In the movie Troy was sacked about a month after the Greeks landed, whereas in the book the siege lasted over ten years.  Menelaus was not killed by Hector but instead outlived him and went on to live with Helen until his death.  Agamemnon was not killed by Briseis. Actually, he was, according to the story, killed by his own wife and her lover, after he returned home.  Achilles was killed long before the Greeks built the horse, by one arrow. He is killed by an arrow through his heel that was shot by Paris of Troy. Thus, by the time the Trojan Horse is built and wheeled into the city of Troy, Achilles is dead.  Hector didn't kill Ajax; Ajax committed suicide.  The Illiad ends with Hector’s family mourning. The rest of the story is recounted in The Odyssey. 30 Where in the World 31  Like Homer’s other epic, the Iliad, Odyssey begins in medias res, or in the middle of things. Rather than open the story with the end of the Trojan War, Homer begins midway through Odysseus’s wanderings.  This is the primary story, the first and best example, the archetype of the story of a long journey. Because the long journey can be seen as a metaphor for living one’s life, this story has been examined more closely. The Odyssey contains the morals, themes and values of the Greek society about adventure, hardship, and life. 32  Odysseus is a very human hero. More than his strength, which was great, Odysseus was known for his clever and agile mind. It was he who thought of using the Trojan horse to gain entrance to the impregnable walls of Troy.  The story of The Odyssey follows his wayward struggle to return home to his wife, Penelope, and son, Telemachus, after The Trojan war  Odysseus, who was later called Ulysses by the Romans, was king of Ithaca, a small island on the west coast of Greece.  By the war's end he had been away from home for ten years. He filled his ships with treasure taken from the Trojans and set sail. Ordinarily the trip from Troy to Ithaca would have taken only a short time. The Greek gods, however, decided that it should take Odysseus ten years to reach his wife and son. During those years he and his men endured a series of hazardous and remarkable adventures. 34  Religious Figures  Star Trek  Braveheart  Gladiator  Hancock  Harry Potter  The Matrix  Finding Nemo  Shrek  I, Robot  Batman (any of the films)  Spiderman (any of the films)  Ice Age  Lion King Similar presentations Ads by Google
global_01_local_2_shard_00001658_processed.jsonl/8106
Tuesday, 12 April 2016 Russian T28: Minifigs vs Panzer Depot I bought a Minifigs Russian T28 a while back and have been undecided where to retain and get more for a unit or go with another make. I have not come across a resin model kit but had my eye on the Panzer Depot pre-painted model. The Panzer Depot model is much more expensive but the Minifigs model is not cheap compared to other metal 10 or 12mm models. I finally got hold of a Panzer Depot model in a job lot of tanks and so have finally made my choice. Below are some comparison photos. It is worth noting that the Minifigs model is an early version whereas the Panzer Depot version is a late model T28 (the difference is the turret). Overall the Minifigs model is very slightly smaller but not by much so fits in well with 1/144 scale. The Panzer Depot model has more surface detail as you would expect from resin but the Minifigs model is not bad on overall surface detail either. The Minifigs model is a big lump of metal so is pretty heavy whereas the Panzer Deport model is very light - means just need to be careful not to drop the Minifigs model which is mainly about remembering it is going to be heavy when picking up (would cause quite some damage if dropped on anything else!). I was decided on Minifigs after being able to compare and I think I need the early version for Barbarossa scenarios anyway. Will cost me £18 plus postage for the 4 extra ones I want rather than more like £60 for the Panzer Depot version - not something I am happy to do when there is a decent alternative. For an easy way to see all my WW2 posts check out the WW2 Summary page. 1 comment: 1. There's nothing wrong with the Minifigs tank at all and at that price I certainly wouldn't go with the other.
global_01_local_2_shard_00001658_processed.jsonl/8108
Wednesday, November 11, 2009 Cheetos GIANT Blue Color Changers! This snack specimen was procured through a rare trip to a far off Wal-Mart, and though at first glance it appears to be a regular bag of Cheetos chips, closer inspection reveals that this is something a little different. What makes these Cheetos special? As the package claims, not only are they GIANT, but they are also engineered to turn your tongue blue upon consumption. Looking over the package more, you will also learn these are available only for a limited time, and this snack appears to tied into Halloween, as there are bats flying into the picture on the front, as well as what appears to be a fence similar to what you would find around a graveyard or perhaps a haunted mansion at the bottom. There is also a sign in the bottom left proclaiming the curious and slightly baffling phrase “Saturday Night Come Alive”.  Chester Cheetah is seen in the middle, over-excitedly licking a GIANT Cheeto ball. So, how about the snack inside? Well, upon tearing into the bag, you are greeted with unassuming, albeit large (think big marshmallow sized) Cheeto balls. Popping one between my mighty jaws, I found the texture to be a little coarse, almost threatening to scrape my mouth as I ate…The taste is about what you would expect from a puffy type Cheeto snack, though I found the flavor to be a little subdued, and the texture is what I would notice the most while eating these. As for the color changing properties, they do indeed change your tongue blue, though more of a pale hue, rather then the deep dark blue as modeled by Chester on the front of the package. Overall, well, these are cheetos. Of all the cheeto brand snacks, these are probably my least favorite. The rough texture, weaker taste, and tongue tinting additives did little to win my favor. I would suggest sticking with the superior Natural Cheetos, or any of the other cheeto branded snacks for that matter.  Still, if you want something novel, these are to my knowledge the only cheese flavored, cheetah endorsed snacks that can turn your tongue blue available. -John AKA 'Mystery Snacker' These are limited edition, so look for them in your grocery store!
global_01_local_2_shard_00001658_processed.jsonl/8116
Swords & Wizardry Forums - Privacy policy This policy explains in detail how “Swords & Wizardry Forums” along with its affiliated companies (hereinafter “we”, “us”, “our”, “Swords & Wizardry Forums”, “http://snw.smolderingwizard.com”) and phpBB (hereinafter “they”, “them”, “their”, “phpBB software”, “www.phpbb.com”, “phpBB Group”, “phpBB Teams”) use any information collected during any session of usage by you (hereinafter “your information”). Your information is collected via two ways. Firstly, by browsing “Swords & Wizardry Forums” will cause the phpBB software to create a number of cookies, which are small text files that are downloaded on to your computer’s web browser temporary files. The first two cookies just contain a user identifier (hereinafter “user-id”) and an anonymous session identifier (hereinafter “session-id”), automatically assigned to you by the phpBB software. A third cookie will be created once you have browsed topics within “Swords & Wizardry Forums” and is used to store which topics have been read, thereby improving your user experience. We may also create cookies external to the phpBB software whilst browsing “Swords & Wizardry Forums”, though these are outside the scope of this document which is intended to only cover the pages created by the phpBB software. The second way in which we collect your information is by what you submit to us. This can be, and is not limited to: posting as an anonymous user (hereinafter “anonymous posts”), registering on “Swords & Wizardry Forums” (hereinafter “your account”) and posts submitted by you after registration and whilst logged in (hereinafter “your posts”). Your account will at a bare minimum contain a uniquely identifiable name (hereinafter “your user name”), a personal password used for logging into your account (hereinafter “your password”) and a personal, valid e-mail address (hereinafter “your e-mail”). Your information for your account at “Swords & Wizardry Forums” is protected by data-protection laws applicable in the country that hosts us. Any information beyond your user name, your password, and your e-mail address required by “Swords & Wizardry Forums” during the registration process is either mandatory or optional, at the discretion of “Swords & Wizardry Forums”. In all cases, you have the option of what information in your account is publicly displayed. Furthermore, within your account, you have the option to opt-in or opt-out of automatically generated e-mails from the phpBB software. Your password is ciphered (a one-way hash) so that it is secure. However, it is recommended that you do not reuse the same password across a number of different websites. Your password is the means of accessing your account at “Swords & Wizardry Forums”, so please guard it carefully and under no circumstance will anyone affiliated with “Swords & Wizardry Forums”, phpBB or another 3rd party, legitimately ask you for your password. Should you forget your password for your account, you can use the “I forgot my password” feature provided by the phpBB software. This process will ask you to submit your user name and your e-mail, then the phpBB software will generate a new password to reclaim your account. Back to login screen
global_01_local_2_shard_00001658_processed.jsonl/8117
Preview Mode Links will not work in preview mode The Social Media Clarity Podcast Oct 28, 2013 An interview with Chip Morningstar (and podcast hosts: Randy Farmer and Scott Moore) who created and ran the first MMOs/Virtual Worlds. This segment focuses on the emergent social phenomenon encountered the first time people used avatars with virtual currency, and artificial scarcity. Oct 14, 2013 This episode we talk about the emerging idea of the social economy and how it interacts with the commons: existing crowdsourcing and volunteer-supplied content and resources . See for show notes, and a transcription of this episode
global_01_local_2_shard_00001658_processed.jsonl/8118
May 24, 2012 Scala + Spring MVC = True? (Part 3) This is the third part in a series of articles about mixing Scala and Spring MVC. In the first post we looked at how to set up a Scala-Java Maven project and we saw how well Spring MVC translates over to Scala in a very simple example. In the second post we created a web service that returned JSON data using the Jackson JSON processor and we looked at how we can use both Java and Scala to get the job done. In this third and last post of our Spring MVC and Scala experiment we will continue to work on the web application that we used in the previous posts so you might want to get the example code on GitHub so you can try out the examples on your own as we go along. JSR-303 Validation Another very common use case when building web services is the use of JSR-303 Bean Validation for validating input data. Lets take a look on how the Spring MVC support for JSR-303 will work together with Scala by adding some more functionality to our web service. If we wanted our Java web service to be able to receive data about a persons name and age, and we want to add some basic validation to the submitted data using JSR-303 validation, we could create a POJO with some JSR-303 annotations that would look like this: public class JavaIndata { private final String name; private final Integer age; public JavaIndata(@JsonProperty("name") String name, @JsonProperty("age") Integer age) { = name; this.age = age; public String getName() { return name; public Integer getAge() { return age; This would make sure that the name is set to a non-null value and that the person is at least one year old. To validate this POJO in our Spring MVC controller we simply annotate the corresponding method parameter with @Valid. The @Valid annotation ensures that the method parameter is validated before it is passed into the method. The method to receive the POSTed, and validated, data will then look like this: @RequestMapping(value = "/indata", method = RequestMethod.POST) public void receiveData(@RequestBody @Valid JavaIndata indata) { logger.debug("Got valid POSTed data: {}", indata); So what if we translate this directly to Scala? Will it work? Unfortunately, the answer is no. Scala does not follow the Java Bean naming conventions so the validator framework will not work out of the box. (For the record, we are using the Hibernate validator in this example) The first thing that comes to mind is that maybe we can implement this in Scala by using the @BeanProperty annotation the same way as we did with the Jackson processor in the previous post. That approach would result in the following Scala class for the indata: case class ScalaIndata(@BeanProperty @NotNull val name: String, @BeanProperty @Min(1) val age: Integer)  (Note that we are also using the Scala module for Jackson that we discussed earlier in the previous post so we do not need the JSON specific annotations either) However, the way the JSR-303 specification is written this will not work either. The reason for this is because with Scala, the @NotNull and @Min annotations on our ScalaIndata class will only be applied to the actual constructor parameters and not to any accessor methods or fields. (This holds true for any annotation for that matter and not just the ones we are using in this example.) And since the JSR-303 spec. wants the annotations to be on either the accessor methods or the fields, nothing will be picked up by the validator. But do not despair, Scala still has some cards up its sleeve that will help us solve this. One such card is called meta-annotations. What a meta annotation allows you to do is to actually annotate the annotation. An example of a meta-annotation is @beanGetter. What @beanGetter does is it says that the meta-annotated annotation should be applied only to the getter method generated by the @Beanproperty annotation. Notice that we actually lose the default behavior here and if we still want the constructor parameter to be annotated we also would have to add a @param as well. To illustrate this, here is what our ScalaIndata class will look like with meta-annotations: case class ScalaIndata(@BeanProperty @(NotNull @beanGetter) val name: String, @BeanProperty @(Min @beanGetter)(1) val age: Integer) So with the meta-annotations, the @NotNull annotation will be applied to the getName() method, and the @Min annotation to the getAge() method, and we will have a Scala class that can be JSR-303 validated. Something to consider here is that in some cases the meta-annotations might make the code a bit messy and on the borderline of what can be considered to be readable code. Imagine if we needed even more annotations for other purposes then there would be more annotations than code in this example. An alternative to all these annotations would be to simply make the class follow the Java Bean convention and define the getters explicitly and then annotate the methods themselves. Like this: case class ScalaIndata(val name: String, val age: Integer) { def getName() = name def getAge() = age This, to me, is a very straight forward and readable piece of code compared to a solution where we try to do everything in the constructor. The take away here is that just because we can do something in a one-liner does not mean that we always should. Use your own judgment for which approach is most appropriate in your case. In this series of posts we have looked at how we can use Java, Spring MVC and Scala together. We have seen that there is no difference in creating Spring MVC controllers in Scala compared to Java and we have also seen that when bringing in additional Java frameworks we sometimes need to slightly adjust the Scala code to ensure compatibility. Depending on your needs, the more advanced you get and the more frameworks and features you use the more likely you are to run into compatibility issues. As so often, the KISS principle applies. Keeping the integration points between Scala and Java simple will help you avoid extra work. If you need a lot of functionality in your MVC controllers it might be easier to keep them as pure Java implementations to ensure compatibility with other frameworks, and integrate your Scala code at a lower level. Hopefully these posts have given you some ideas about what is possible when integrating Java and Scala and I hope you will have fun experimenting on your own. 1 comment: 1. I think that Scala + Spring (+ REST) is a real sweet spot - thanks for the tutorial. I am having some problems getting the scala-jackson-module configured properly - I get the following stack trace. Am I doing anything obviously wrong? I am using Spring 3.2, Scala 2.10.1 java.lang.IllegalStateException: Failed to load ApplicationContext Caused by: java.lang.NoSuchMethodError: scala.Predef$.augmentString(Ljava/lang/String;)Lscala/collection/immutable/StringOps; at com.fasterxml.jackson.module.scala.JacksonModule$.(JacksonModule.scala:11) at com.fasterxml.jackson.module.scala.JacksonModule$.(JacksonModule.scala) at com.fasterxml.jackson.module.scala.JacksonModule$class.version(JacksonModule.scala:38) at com.fasterxml.jackson.module.scala.DefaultScalaModule.version(DefaultScalaModule.scala:15) at org.springframework.web.servlet.config.annotation.WebMvcConfigurerComposite.configureMessageConverters( at org.springframework.web.servlet.config.annotation.DelegatingWebMvcConfiguration.configureMessageConverters( at org.springframework.web.servlet.config.annotation.WebMvcConfigurationSupport.getMessageConverters( at org.springframework.web.servlet.config.annotation.WebMvcConfigurationSupport.requestMappingHandlerAdapter( at org.springframework.web.servlet.config.annotation.DelegatingWebMvcConfiguration$$EnhancerByCGLIB$$5d5c02bc.CGLIB$requestMappingHandlerAdapter$23() at org.springframework.web.servlet.config.annotation.DelegatingWebMvcConfiguration$$EnhancerByCGLIB$$5d5c02bc$$FastClassByCGLIB$$5f5f5b95.invoke() at org.springframework.cglib.proxy.MethodProxy.invokeSuper( at org.springframework.context.annotation.ConfigurationClassEnhancer$BeanMethodInterceptor.intercept( at org.springframework.web.servlet.config.annotation.DelegatingWebMvcConfiguration$$EnhancerByCGLIB$$5d5c02bc.requestMappingHandlerAdapter() at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke( at sun.reflect.DelegatingMethodAccessorImpl.invoke( ... 54 more
global_01_local_2_shard_00001658_processed.jsonl/8120
Wednesday, December 03, 2008 Preliminary Hearing Today’s Reading: John 18:13-14 (NIV) 13 They brought Him first to Annas, who was the father-in-law of Caiaphas, the high priest that year. 14 Caiaphas was the one who had advised the Jews that it would be good if one man died for the people. Good morning! It wasn’t exactly the preliminary hearing Jesus’ disciples had hoped for. Taken into custody in the middle of the night, Jesus stood before Annas for questioning. Annas had been high priest for nine years, and even though Caiaphas was high priest this year, many considered the election of high priest to be a lifelong vocation. The people looked to Annas because they believed he had a brilliant mind and exercised sound judgment. What in the world was he thinking that night as Jesus was brought before him? A preliminary hearing is an opportunity to hear evidence brought by a prosecutor, to determine whether and to what extent criminal charges should be filed. The outcome of this hearing sets the tone for the upcoming trial. It determines which court will hear the case, and what evidence will be admitted. In America’s judicial system, the accused is allowed to have legal counsel represent his or her interests at the preliminary hearing. If the accused cannot afford to pay for legal services, free legal counsel is provided. Did anyone speak for Jesus at this secret lynching? Who could have adequately represented the Lord God Almighty in a human kangaroo court? Fact-finding questions are asked at the preliminary hearing, to determine if the alleged crime occurred within this court’s jurisdiction, and whether there is probable cause to believe that the defendant actually committed the crime. If the judge determines there is sufficient evidence to believe the defendant did commit the crime, the judge would set a date for arraignment, at which time the defendant could enter his plea of innocent or guilty. As the sun came up over the Jerusalem that morning, Jesus had already been arrested, arraigned, tried and convicted. At best, this was a total mockery of justice. At least Jesus knew He would not die in vain. The blood He shed for the sins of the world is the same blood that continues to wash and cleanse us today. If you had been there, what charges would you have leveled against the Son of God in a preliminary hearing? Would you stand up in defense of the Master, or accuse the Lord of blasphemy? Would you have cared enough to get up in the middle of the night to attend the preliminary hearing? Grace and peace, Deb Spaulding Faith UMC - St. Charles, MO © Copyright 2008, Deb Spaulding All rights reserved 1 comment: total cleanse said... Thanks for the head sup. It is very very cute indeed.
global_01_local_2_shard_00001658_processed.jsonl/8129
Vox Populi Forum Link back to Spacegamer Here! Clarification re: Characters Just went over this mission with Laura to ask her if she was going to use Moridin or a new lvl 0. Laura said she was thinking of using Mal de Merd-a-din. Merd-a-din is currently in the New World in a Cog (to find the Incago). I'm assuming this 5/30 mission is concurrent with the New World voyage - a "Meanwhile, back in the Olde World (and directly tied in to spotting "Thor" at sea... The two parties literally passing each other.). Therefore, Merd-a-din (and other characters established as being in the New World) are not available for play 5/30. Ref ruling, please? I think I'll run Bailey (lvl 4, so advanced, but no multiple rolls), and have a new lvl 0 on standby.    Mike Myke Mique Message Replies: Create a New Thread Reply to this Message: Display Email On Reply Page:  Yes: No: Type "Spammers Suck":   Message Title:   | Home | copyright SpaceGamer, LLC 2003
global_01_local_2_shard_00001658_processed.jsonl/8132
Show Posts Messages - pmbeijers Pages: [1] Uml Process / UML and MVC « on: May 13, 2003, 04:29:19 am » I'm wondering if anybody knows something about using MVC (Model-View-Controller) along with UML. MVC is a kind of architecture which you can use for making a difference between the data layer and the interface layer. I found some information on this topic on the Internet but I'm still not sure how to implement this in my UML diagrams. I hope someone can help with this problem/issue. Any kind of feedback is welcome. Thank you. P Beijers Student Bedrijfskundige Informatica Pages: [1]
global_01_local_2_shard_00001658_processed.jsonl/8135
I said to you yesterday that the anointing within is the priority of God for us as Christians especially for everyone who will not just fulfil destiny, but also stay strong under God. Today by the grace of God, I want to start showing you how you can develop that inside you.  1.Study of the word of God: Acts 20:32 Among many other things that the Word of God will do to you, it will build up your spiritual strength. If you are going to be strong in the Lord and in the power of His might as admonished by Paul the apostle in Ephesians 6, you must be strong in the Word of God. When I started out in the things of God, the Lord required of me that I must read the Bible four times every year and I did that for well over 10 years. That is what has produced what I am today. 2.Prayer: Jude Vs 20  Prayer will develop and build up your spiritual strength. However, I counsel people very often that they should be men of the Bible before they become men of prayer. If not, the devil will not only give wrong information, but also seek to help you interpret the ones that God is sending into your life. But when you have acquainted yourself with the Bible, the principles of the bible which you have known will keep you from any form of error. Of all the forms of prayer, I will counsel that you take quality time to pray in the Holy Ghost. It will strengthen your spirit, build your spiritual capacity and open you up to the world of the supernatural under God. PRAYERFather, I pray in the name of Jesus that you will help me to give myself continually to prayer and to the ministry of the word of God in Jesus’ name. Amen. BIBLE IN A YEAR: Genesis 23:1-24:51, Matthew 8:1-17, Psalm 9:13-20, Proverbs 3:1-6
global_01_local_2_shard_00001658_processed.jsonl/8146
Thread: 62 heater core View Single Post Old 08-11-2016, 04:24 AM simplyconnected's Avatar simplyconnected simplyconnected is offline Slow Typist Join Date: May 26 2009 Posts: 7,397 simplyconnected is on a distinguished road Flow can only happen when BOTH heater hoses have openings. That also means it doesn't matter which hose you block. No flow in any part of this circuit means no heat to the core. Try this... Take a pair of vice-grips or a 'C' clamp and squeeze one of the hoses so that flow stops. If the jaws are too small, sandwich two plates to cover the hose. You can do this in any convenient part of the hose with your new valve closed or open. After the engine warms up, feel both hoses as you check for heat. With the clamp in place, take a test ride and tell us the result. - Dave My latest project: CLICK HERE to see my custom hydraulic roller 390 FE build. --Lee Iacocca Reply With Quote
global_01_local_2_shard_00001658_processed.jsonl/8156
Wednesday, February 15, 2012 Permanent Guests: The Impossibility of Hospitality Hospitality is all over the map.  Everyone needs it or does it or wants to do it.  There are lots of really good books on the subject in Christian thought.  I've written on it with respect to religious pluralism at the Journal for Lutheran Ethics.  The problem of inviting, having, and keeping a guest is so prevalent and part of our world it has its own tv trope, called "The Thing That Would Not Leave" for the Saturday Night Live sketch of the same name.  One of my favorite movies, What About Bob? is in part about the host-guest and patron-client relationship.  That's good chicken, no? As more writers have gotten into the hospitality business and as they've looked back at the history of human problems of managing and balancing hospitality, there's two basic problems that have emerged, embodied in the phrase "make yourself at home." A person cannot make herself at home without making your home into hers.  This estranges your home for the sake of the other.  You cease to offer a welcome since you cede your own domicile.  You become a stranger in your own home! Welcoming the stranger into our home makes you part of us and you cease to be a guest or stranger.  You cannot be a stranger (an other) and be part of our house. Hence the humor and prevalence of the permanent guest as a horror story.  And the proximity of this conflict of laws (antinomy) to how couples and families negotiate marriages and partnerships, blending homes and traditions and histories. Anthropologists have noted that hospitality is about creating temporary spaces to tolerate this law of conflicts, about letting a guest in on what's going on at home in order to let the guest decide if she wants to join the domicile.  But that upholds the antinomy, the conflict between these two laws. Hospitality in this sense is radically intolerant because it either wants to reject the stranger (get that guest out of here, or at least into a room above the garage, like the Fonz) or to domesticate the stranger. Christians have been laboring hard to overcome or mitigate the difficulties in this bind.  It seems impossible to welcome a stranger without domesticating them.  At the very least learning to identify how a community practices welcome and how it domesticates goes a long way toward resolving this problem.   These questions arise, for me:  How many strangers can one host?  Can one give up the domicile for the sake of the other?  Christians should be able to welcome this problem.  After all, they are a community where the faithless and hypocrites are welcomed and love is reserved for the enemy.  None of these are good for communities, in an ordinary sense.  But they are marks of the friends of Jesus and his welcome. Emmanuel Levinas, Totality and Infinity Jacques Derrida, "A Word of Welcome" in Adieu to Levinas 1 comment:
global_01_local_2_shard_00001658_processed.jsonl/8160
The Flying Dead: ZomBEE Yeah, you thought the walking dead was bad. Ha! The only thing scarier than a bee is a ZOMBEE!!! The show "The Walking Dead" came out the first year we started Stellaween and people have asked since if we were going to do a zombie. Well the time has come. She asked why I put [...]
global_01_local_2_shard_00001658_processed.jsonl/8162
I’m helping to teach a class that affords me opportunity to interact with college students about spirituality. In such venues two sets of questions alway arise. I’m thinking about the unhelpful ways we in the ministry often answer them I call the two categories “have to” questions and “how do you know” questions. An example of the “have to” question: “Do I have to go to church in order to be a (good) Christian?” To the “have to” question I can give a pat answer: “Well, no, of course you don’t have to go to church in order to be a good Christian. But good Christians want to do what helps them grow, and going to church helps us grow and…” Though true, I think this common answer is wide of the mark. College students ask “have to” questions because they’re trying to figure out how to handle freedom. Hence, it not a question driven by rebellion, which is typically how we assess it. They are trying to make sense of the multifaceted nature of their desires. They want to be Christian. They don’t want to waste time doing something boring and unhelpful or being where they don’t feel connected or known. In other words, there might be a lot more to the “have to” question than the standard answer permits. So, instead of answering with the somewhat expected (and superficial) answer, I think we ought to ask students why they want to know. What other thoughts are connected to the “have to” question? What’s driving them to be concerned? The important question: What is it like to be a grown-up Christian where “have to” is irrelevant? I’m reminded again (I’m a slow learner sometimes) of the importance of letting “have to” questions become the staging ground for transformative interaction. An example of the “how do you know” question: “How do you know that your religion is the right one?” Students face a staggering array of options. After all, they Google something and they get seemingly limitless hits and a head-spinning range of possibilities. How do they know which option to pursue? If, in response, I switch to “apologetics” mode and launch my vast intellectual armaments in defense of the faith (a very important task, to be sure, but misdirected here), I will lock on to what sounds like skepticism and completely miss the fragile openness, the hesitant vulnerability standing before me. I dare not stomp on the tenderness of this holy moment! Now, I’m not advocating some version of the high brow liberalism (pardon the term) I got as a seminary student: you know, the “It’s not the answer but the question that matters” claptrap, which is superficially true, but usually intellectually dishonest. Sooner or later, everybody wants a satisfying answer, even while recognizing it’s only partial. That point accepted, I still must recognize that the “have to” and the “how do you know” questions are golden opportunities for God’s grace to be poured out. If we care about evangelism; if we feel called to apologetics, let us please hold gently in our hearts the people asking the questions. “Have to” Questions, “How Do You Know” Questions Tagged on:                              2 thoughts on ““Have to” Questions, “How Do You Know” Questions • April 3, 2009 at 2:06 pm Thought provoking. I wonder if the “why does it matter” questions that people often ask regarding theology are actually in the same category as “have to” questions – what students are actually asking is whether thinking about all this stuff is worth this much time and effort if it doesn’t feel like it will be very applicable to ministry settings, etc. • April 3, 2009 at 2:27 pm Good point. The implication: the “why does it matter” question is perhaps the adult version of the “have to” question. Leave a Reply %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/8178
Can’t Stream Your Favorite Shows? Try An Anonymous VPN No matter what you do, some video streaming websites with geo-restrictions will remain unavailable in your country and location. A real bummer when you’ve scoured the internet but the only place to watch the shows with quality and are not dubbed in a foreign language doesn’t want to give you access just because of your location. Have you tried an anonymous VPN? With the help of VPN, geo-restrictions and privacy concerns will be a thing of the past. IP Vanish A preferred choice by users in search for incredibly quick VPN when playing online games, streaming movies in HD and many other tasks IP Vanish is the well-secured VPN that offers full privacy features. Based in the US, this VPN controls and owns a whole network of what we call ‘Tier 1’ servers. In terms of privacy as well as performance, this is advantageous since there are no third party companies or servers in the overall infrastructure. The VPN at IP Vanish is an astonishing network of over a thousand servers stretched in sixty countries. Besides the aforementioned facts, IP Vanish boasts VPN with zero logs and military grade encryption. Hence it’s not at all that surprising that IPVanish is the go-to VPN provider for data intensive tasks, privacy and the unblocking of geo-restricted tasks. As we mentioned, IP Vanish is packed with some of the best security features relevant to VPN. A handful of these features are useful particularly for mobile devices. One of which is the network blocking feature which protects the user against unsafe networks; devices can automatically connect to these networks, exposing the device to hackers. Three different VPN protocols are installed in IPVanish; L2TP, OpenVPN and PPTP. Out of these protocols, they highly recommend OpenVPN since it’s the most secure and PPTP is already considered as an outdated encryption.
global_01_local_2_shard_00001658_processed.jsonl/8183
Wednesday, March 12, 2008 Global Warming - Run for the hills! Ok, don't run for the hills just yet. On the one hand we have Sir Richard Branson and the Virgin Earth initiative, Al Gore with his "An Inconvenient Truth", Bono, David Suzuki, and a number of other notables on the same side. There are an abundant number of public figures who have jumped on the climate change bandwagon. On the other hand, we have things like "The Great Global Warming Swindle", articles like this: and a similar entourage of naysayers who are flat out against global warming being a cause for concern. It seems like we're missing the point. It doesn't need to be that complicated. With a slightly different perspective you may decide that it doesn't matter whether global warming is occurring when it comes to deciding whether we should . Take CO2 emissions -- we don't need to know whether our carbon dioxide output is causing global warming. We already know that a high enough concentration of CO2 in the air we breathe is bad for us -- enough of it can kill us. We're spewing CO2 into the environment at a steadily increasing pace. At the same time, we're cutting down on the planet's ability to handle the CO2 in the environment. Do we really need to go any further than that? Regardless of how slowly it's occurring, we're gradually poisoning our own atmosphere against ourselves in this fashion. It shouldn't matter whether it will take 20 years or 200 years (or however long) to reach toxic levels. If we're decidedly poisoning the atmosphere with how we currently do things, then it should be our responsibility to alter the way we do things to limit or eliminate those toxic emissions. I understand that carbon dioxide is a vital part of the ecosystem, required in a variety of processes. I'm simply suggesting that we should reduce such emissions (of not only CO2, but of toxins in general) to avoid the slow but steady poisoning of the environment that sustains us. I'm certainly not perfect, nor am I a fanatic. I do feel that we have a responsibility to take care of the planet, though -- we depend on it. I do happen to be a fan of Branson's Virgin Earth initiative, and I take this sense of responsibility seriously enough that I'm preparing a proposal for submission, to try to do my part. [Aside: I don't think that carbon sequestration is an optimal long-term solution. I'll expand on that later, though.] 1. Here are at least 10 things everyone can do to help curb global warming: 2. Thanks for the link Aneesa -- it's prompting me to compile my own list of easy-to-do things that almost anyone should be able to do, and benefit the environment in the process.
global_01_local_2_shard_00001658_processed.jsonl/8184
Wednesday, July 16, 2008 Going green: Powering it all For the planned initiatives, a realiable and steady source of power would be a good thing, and of course choosing a green means for generating that power is the order of the day. If the means established has enough of the desired features, there may even be the opportunity to connect it to the grid and sell surplus electricity to the power companies. A number of regions "out there" have good initiatives and processes for such things, making it easy to get connected, and offering nice rates. (for example, NC has, I believe, an easy plan in place for anything up to 10kWh) Here, things are a little more difficult...the capacity has to be greater than X, and it has to be consistent -- no wind/solar, unless you have a means to store the energy so that it may be delivered to them at a constant rate. Wind and solar are hard sells regardless, since it doesn't guarantee that they'll get anything from you. Additionally, last I heard, if you're after a rate greater than 2.5 cents per kWh, it has to go to tender -- at that amount or lower, though, it won't have to. (Meanwhile, elsewhere, two, three, even up to 15 times higher than that rate can be found) Photoelectric, solar/thermal, and wind generation are nice, and will likely play a part in the overall design...I'll likely use them to augment the primary power source, though, rather than serve in that capacity. (Long term, if the whole shebang gets off the ground, I _would_ like to shift the primary source to solar, but that will only be possible with appropriate capitalization -- ideally generated from operating revenue...with the lessons learned in that implementation, I hope to establish a process that's easily duplicated and portable. If successful, it may provide a low cost means for power generation abroad, wherever it's needed most.) I think I've got a pretty good handle on tidal/wave action power generation, and believe that this could prove to be an economically viable route to take at the onset, with a seemingly lower cost per kWh for setup and maintenance. It's been nice to see that more progress is being in this area...when the attention turned to some of the innovations for harnessing wave action out of Scotland, it made me think "ah, good, someone's on the right track". Theirs is a few steps removed from what I'd envisioned a number of years ago, but shows good promise. Me, well, I'll be seeing whether I can bring one of my old designs to light at long last. Time permitting, I'll do an experiment or two this weekend to that end. In spite of the movies, with "1.21 gigawatts" popping to mind regularly, the interim goal is much more modest -- the planning at the moment is to provide a proof of concept for somewhere around 1 megawatt, although I'll be satisfied with 0.5 to 1 megawatts to begin with. I'll let you know how it goes...meanwhile, wish me luck! 1. I read your blog about relativity and mass of the fuel tank on a space shuttle, and have always had a similar nagging at the back of my head. Did you get a decent response to your questions? It would suck if you hit the speed of light then due to the time dilation the universe ended once you got there as the whole time space continuum kicked in. 2. I did have a bit of a discussion on the matter for a while on one of the physics forums out there -- the people who frequented it were patient and as helpful as they could be. My biggest challenge (as usual) is wording things in such a way as to not be prone to misinterpretation...[sigh] ;) At some point in the next couple of weeks, I hope to do a follow-up to my original post, to go over the points that had been discussed. I'll try to sum a bit of it up here, without making some grievous error while still being clear (I'll fill in the details later as best I can): In order for you to measure velocity and the like, you'll always be measuring it relative to something that very nature, any such velocity will always be less than c (recall the equation for two objects who, relative to a stationary point, are each moving in opposite directions close to c...rather than the newtonian method where it would appear that they're separating at almost 2c, under relativity, they'll still only be seen separating at almost c). By the design of that equation used to determine separation velocity, v won't be greater than c. You can of course get arbitrarily close to c, and so time dilation will become more and more of a factor -- if you're hoping to return to a point while it has some sort of similarity to when you enough, and days/years/eons could pass in that 'stationary' frame of reference in a blink of an eye for the traveler. Taking a step over to the more 'practical' side of such travel, when aiming to attain as high a velocity as possible -- you'll always be moving relative to something...although sparse, you're never traveling through a complete vacuum, and at very high velocities, moving through that medium (and the background radiation, if I recall correctly), you're going to be bombarded with energy intense enough to be difficult to sustain life. There are a number of things about the general ideas that are still nagging at the back of my mind -- I'll try to incorporate those into the next relativity post in such a way that I'll be less likely to be misunderstood. Meanwhile, I'm interested in hearing any thoughts on the matter you may have :)
global_01_local_2_shard_00001658_processed.jsonl/8197
Bungie player model not updating 30-Jul-2015 14:13 by 7 Comments Bungie player model not updating - about myself for dating site With Google and Samsung both ramping up security patches, it will be interesting to see if other OEMs follow suit. The Xperia X8 have 2 models, the E15a and the E15i, is very important to identify your version, because if you install a firmware for another version, the 3G connection don't work. The main difference in both models is: To update with SEUS, Open the program and follow the instructions, if not update is available, you must change the SI code following the previus instructions, when done, open SEUS again and follow the instructions. If you can't update with this steps, you can flash the firmware, please see next entry. To flash a custom firmware, you need your phone with the latest version of Android 2.1.1, follow the previus steeps to update your phone. The great custom firmware for X8 at this moment is Cyanogen Mod for mini, exist a version with Froyo (2.2), Ginger Bread (2.3) and Honey Comb (3.0) With any of this firmwares, you need to update with x Recovery installing from SD Card To update, you need: To E15a don't know if exist any 2.1 firmware and don't have a customizations code for this model, I only have 2 codes, the original in my phone 1245-1217 and the used to flash 1.6 and going back to 3G support 1236-9457, these codes don't have upgrade yet. If you know any customizaton code for this model, i can try to flash or update via PC Companion. Google is rolling out the Stagefright patch to Nexus devices as promised, but the bigger news alongside that announcement is a new update policy for Nexus devices. Going forward Google will release security patches for Nexus phones and tablets about once per month, which mirrors Samsung's recently announced Galaxy update program. Google is also making official the length of time you can expect to get Nexus updates.The Stagefright update is beginning its rollout today, and you can expect a lot more patches for Nexus devices in the future.Google is committing to keeping the now-monthly security updates coming for either three years from initial availability in the Google Store or 18 months after it is removed from the store (whichever is longer).Major OS updates are guaranteed for two years from release.If this sounds familiar, that's because we had a rumor post right before I/O this year with all these details.So our sources on this were spot on, it just wasn't announced at I/O. 1. Earth cameron acosta 01-Oct-2014 05:32 Monster 19 0.01 404 flash decompiler 19 0.01 405 Musicmatch. 2. Svensk sex cam 28-Aug-2015 20:21 Pure is only here to help you sex up and not hate yourself after. But Pure is full of people who supposedly want the same thing as you, and it makes a point not to mix business (or anything else) with pleasure. 3. uga football player and dating 22-Feb-2016 05:08 It covers communication, negotiation, and some starter scenarios, if this is the sort of thing you might like to try. 4. onlinedatingblog org 08-Aug-2016 07:15
global_01_local_2_shard_00001658_processed.jsonl/8235
Skip to main content Span of control and levels of hierarchy The position of employees within a hierarchy indicates their status and authority. Those at the top are the most important and are paid a larger salary as they have more responsibility. Level of hierarchy Each layer of authority from the top to the bottom of the organisation is called a level of hierarchy or authority. Each person in a level of hierarchy has the same equivalent status and authority. Tall organisation structures have many levels of hierarchy, whereas flatter structures have relatively few. As the number of levels of hierarchy increases, the organisation will face potentially negative consequences: • Inflexibility - it will take a long time for information to move from the top management to those lower down the hierarchy. • A 'them and us' mentality may be create as the people at the bottom of the hierarchy become increasingly remote from those at the top. Span of Control The span of control is the number of people directly accountable, and reporting, to one manager. The span of control refers to the number of people that each manager is directly responsible for. A large span of control means that a manager has a large number of staff under their direct control, while a small span of control means that each manager looks after a small group of staff. This is an important topic as it is normally agreed that the wider the span of control the fewer levels of hierarchy the business needs. We can see this in figures 3 and 4. Figure 3 A flat hierarchy - span of control Figure 4 A tall hierarchy - span of control A flat hierarchy, as in figure 3, will have a high span of control, whereas a tall hierarchy, as in figure 4, will have a much lower span of control. \\\file server\TripleA\Design\icons\small\tip.gif Beware of making a statement that the CEO has the widest span because he or she is responsible for the entire organisation. The span of control refers to those reporting directly to a manager. In Figure 3, the head of the hierarchy only has a span of two people - it is the next tier down that has the very wide span Early management writers argued that any span in excess of six would result in ineffective supervision, but later this was modified to a span of 4 to 8 for managerial functions and 8 to 15 at the lower levels of the organisation. So why do some management theorists support wide spans of control? • Delegation can be a more important part of how the organisation is managed. • Those at the top of the hierarchy have less obvious control over subordinates. • The distance between layers of management is less and those applying the decisions feel closer to those who originally made them. • The need to be writing/communicating information is reduced as those lower down the hierarchy have the authority to carry out responsibilities. • Costs can be reduced, as certain management functions are no longer needed. De-layering can take place. • The subordinates may be very experienced and require less supervision However, some theorists argue against this trend, pointing to the following as factors that need to be considered when considering a narrow span of control: • There is less opportunity for delegation and the ultimate empowerment of employees. • Those at the top can keep a tight control over employees. • A distance can become apparent between those at the top and bottom of the organisation. • A narrow span may encourage greater communication between layers of the management structure and clearer lines of communication. • Training opportunities and personnel development can be more easily managed and attached to promotional opportunities Whichever style is adopted, and probably most organisations develop combinations, the success of a span of control will rest largely on whether management has the ability to manage the situations that arise, motivate and direct employees to maximise their performance and whether the task lends itself to either a tight or relaxed supervision. For example, a small span of control is more likely to be effective in a production situation where close scrutiny of work is required to maintain quality.
global_01_local_2_shard_00001658_processed.jsonl/8267
Tuesday, April 19, 2016 How To Build A Story Like A Vessel I've been reading a lot of Ursula Le Guin recently. I won't hesitate to call it an obsession. But maybe the better word is an apprenticeship, or a hunger, or both. I've apprenticed myself unconsciously to her words, because they are full of something I am hungry for, something I didn't know I was hungry for until I found it. For a while I couldn't articulate what "it" was. Only that the way she made worlds, and words, filled me up with a sense of both light and dark, a sense of rightness and of wonder, an astonishment at the breathtaking imaginings that humans are capable of, the strange familiarity of her planets and peoples. But it wasn't until I came across a few brief descriptions in Steering the Craft: Exercises and Discussions on Story Writing for the Lone Navigator or the Mutinous Crew and the introduction to her short story collection A Fisherman of the Inland Sea that I understood what it was I was responding to. Naturally, Ursula needed to explain it to me. Here are the two passages that, when read close together in time, brought with them a revelation— "The rhythms of prose—and repetition is the central means of achieving rhythm—are usually hidden or obscure, not obvious. They may be long and large, involving the whole shape of a story, the whole course of events in a novel: so large they're hard to see, like the shape of the mountains when you're driving on a mountain road. But the mountains are there." (from a chapter on Repetition in Steering the Craft) "The beauty of a story may be intellectual, like the beauty of a mathematical proof or a crystalline structure; it may be aesthetic, the beauty of a well-made work; it may be human, emotional, moral; it is likely to be all three." (from the introduction to A Fisherman of the Inland Sea)  What she doesn't say outright, but what I took away from both of these tidbits, is this sense that a story's structure is meant to be as beautiful and sound as the language with which it is told. Structure can mean many things, but it isn't primarily about how you've ordered your paragraphs or the clever way you've fragmented your narrative. That's still surface stuff. Structure to me is primarily about the inherent rightness (be it moral, human, emotional, ecological) with which the story is constructed. The way its characters, landscapes and themes move and dance around each other. The pattern they make, which should be in some way harmonious, but never perfect. This is the innerness of the story, like the interior structure of a clay vessel thrown on a wheel or built by hand. The brilliant potter and poet M.C. Richards writes about the innerness of vessels; how in throwing a pot you are really shaping empty space, not clay. How, long after the pot is broken, its interior space still remains, somehow made eternal by the shaping of its clay. Which makes me think of Rilke's "unusable space" built from the "tremulous music of stones": a temple (Sonnet X from Part Two of The Sonnets To Orpheus) Andrew Cornell Robinson Somehow the shaping of clay feels like a useful and important metaphor for the shaping of a story. Words are the clay, but a story is more than words, like a vessel is more than clay. The inner structure of the vessel must be able to carry the beauty of its exterior; they must be in balance, must match, must create an inner and an outer that together is a whole.  This is what Ursula Le Guin's writing does. This is why her novels satisfy on a deep profound level. Their prose, which is deceptively simple but in reality profoundly poetic,  perfectly mirrors an inner narrative beauty, a strength of story, of psyche, of plot, of the things that make the rhythms of ancient myth last for thousands of years. Just read The Telling or Tehanu and you will see what I mean. It's an ineffable thing, but you know it when you read it, when you feel it in your bones.  So, my question is, how do you learn to shape a story like you would a vessel, its innerness shaping its outerness? I will be the first to admit that I tend toward the poetic, the lush, the (at times) overly dense. This has always come easily to me. What is more challenging for me as a writer is carrying plot, and yet this is what truly shapes the story. Its inner structure—the way humans, animals, plants, land interact through conflict and resolution. The way microcosms and macrocosms are evoked, repeated, sung... You see, I can hardly write about it in any clear way. We all, of course, have our own ideas about what makes a beautiful story. It's very subjective. In the same way that we all have different ideas about what makes a beautiful vessel.  Akira Satake In the midst of all of this thinking about the inner and outer beauty of stories, I discovered the art of Japanese tea bowls, also known as chawan (thanks to my dear friend Catherine Sieck, who is an incredible potter). More to the point, I discovered something of the original philosophy behind these utterly feral vessels. It's the concept of wabi-sabi, one of those terms so overused and yet so generally misinterpreted that I at first balked and didn't even want to read about it. But my local library had a copy of Leonard Koren's classic Wabi-Sabi for Artist, Designers, Poets & Philosophers, and I read it in one sitting. Lucky for me. I'm not going to get into all the details here, as it's even harder to write about than the innerness of good stories.  In very brief, wabi-sabi is an aesthetic and spiritual system based on the impermanence, imperfection, and yet astonishing, deep, melancholic beauty found in nature, not so much in its glorious blossomings and epic mountain peaks, but in "the minor and the hidden, the tentative and the ephemeral, things so subtle and evanescent they are invisible to vulgar eyes," in the "moments of inception and subsiding" (page 50). Wabi-sabi honors the imperfect, the earthen, the processes of growth and decay and rebirth, the fluidity and also impermanence of all things. And, just a little bit more (it's delicious, isn't it?)-- "Wabi-sabi suggests the subtlest realms and all the mechanics and dynmaics of existence, way beyond what our ordinary sense can perceive. The primordial forces are evoked in everything wabi-sabi" (page 57). Akira Satake Tea bowls made in this style, and sipped from with presence and stillness and attention to the here and now, are meant to create and evoke a unity of self and nature in all of its imperfect beauty. I wonder what a story built like this would look like. What kind of innerness, shaped to hold the tea properly but also the wild shapes of decay and unfurling both, might translate into story-making? How does a story shape itself around impermanence? And at the same time, how does a story grow like a natural thing, like a piece of granite in the earth or a head of kelp in the sea? How does it speak with authenticity, right up from the ground of the ground and of the soul, both in its words and in its structure, its innerness?  How might we leave space for stories in the world, stories that can be temples where stones sing, stories that have nothing to do with our own egos? Stories that are our gifts and our leavings, life offering vessels at the edge of the wood? These are open-ended questions, a delicious exploration inspired by Ursula Le Guin and the pottery traditions of Japan. At first glance, I found this connection a bit unexpected. At second, I remembered that Le Guin has translated the Tao Te Ching and is a great student of Taoism, from which concepts of Wabi-sabi, tea ceremonies and chawan clay techniques have arisen. To fulfill that which is naturally so. A story and a vessel should feel like this: that they have grown up from the ground of themselves. That they could not be any other way. That there is always a crack left open for mystery. Monday, April 4, 2016 The Warp and Weft of Old Europe Almost exactly a year ago-- one journey around the sun-- my dear friend Asia Suler (of One Willow Apothecaries) and I began the collaboration that would become WEFT.  In the mountains of Appalachia where Asia lives, the wild violets and irises were up, and she dreamt and then brewed up a potent violet elixir, purple with the medicine of those dark petals, stirred over the stovetop to the hymns of Hildegard Von Bingen. With the intuitive dreaming unique to her old heart, Asia then began adding essences of flowers and stones to the elixir, weaving a medicine that spoke back through many millennia. She sent a small phial to me and I began to take drops of it as I wrote, allowing its own mysteries to unfold inside, in the way-down-dark places where stories come from. She didn't tell me anything about what plants and stones comprised the elixir. The very first image that came to me as I let the elixir settle into my body was of the old island of Malta; of an ancient village made of stone; of a woman in deep purple robes; of snakes.  I visited Malta and one of its very ancient matrilineal temples six years ago and was very moved; but still, when this of all images came up upon first taste of the elixir, I was a little confused! I was expecting to write something set in California, as I tend to do, something rooted here, relating to the plants, animals and stones that I know. And yet each time I took the elixir, and wrote, and daydreamed, it was all sandstone walls and snake priestesses, caves deep in the earth, the smoke of bay leaves, an old grandmother or aunt telling a young girl that it is women who keep the world whole, who weave the filaments between things. Back then, the image in my mind was of lace, of generations of lace makers. (Only very recently did I learn that some believe the islands of Malta and Gozo might have been schools for priestesses. The islands, after all, are literally riddled with Neolithic temples and there are legends of extensive labyrinths below them. "Such island-schools are common in legend," writes Barbara Mor in her incredible book The Great Cosmic Mother. "Ancient Celtic myth tells of sacred islands inhabited and ruled by women, where the mysteries were kept and taught" (113). Well... perhaps this is why Malta came up!) This was in the summer. A very, very dry summer after three years of serious winter drought. Inside, I was experiencing my own kind of drought. Not writer's block, but a terrible sun-baked kind of overwork. Old intense patterns of anxiety returned, suddenly and in full force. Without proper winter, without water in and on the land, I realized I was having a very hard time watering myself; giving myself rest, nourishment, green. Over the previous three years, I had written four novel-length manuscripts (Tatterdemalion, The Gray Fox Epistles, The Leveret Letters, Elk Lines).  They were a joy to write, but the well was beginning to look rather dry. More than that. It was starting to feel a bit abused. Untended. We cannot be in bloom always. In California, many of the creeks go dry in summer, and no one expects them not to. In every landscape there must be rest, dormancy, quiet. The true sort, not a false promise of rest and then suddenly, two weeks later, another project!  So I tried and tried with the elixir to create a story, but in truth, I was at the end of my rope. I wrote bits of something set in an imagined world-- partly Crete, partly Malta, partly a future California-- about a girl, a temple of snake priestesses, a sacred shroud dyed with saffron, an island and a garden full of fennel. But it wasn't right. It didn't work. And the elixir seemed to know it. To tell me-- now is not the time. And rest rest rest. And take to the waters, take to the springs. Replenish, replenish, replenish.  I know now that it was the Grandmothers (of Asia's Grandmother's Elixir) talking. I know now that this was part of the medicine for me. That this collaboration was not just about creating a project to share with the world, but also about beginning to tend to old patterns. After all, who was I to think that I, too, didn't need healing from that medicine? That perhaps I, most of all, needed it— not to write from but to remember with?  Female figurines, Cucuteni, Draguseni Botosani County Museum, Botosani, from The Lost "The Lost World of Old Europe: The Danube Valley, 5000-3500 BC," NYU Institute for the Study of the Ancient World Back in the summer, hearing those voices, I took to the hot springs. I soaked in the old lava waters. Asia and I decided to let the project rest for a time. She revealed to me the names of the plants and stones in her elixir, and her descriptions sent a shiver through me. (Here is an example of what she wrote about one of the stones in an email: Feldspar is considered the "grandmother" of many stones. Over time Feldspar will become Labradorite, Sunstone, moonstone, and Amazonite (among others). Feldspar is like the first grandmother is a long matrilineal lineage. In Daoist medicine Feldspar represents the broth of our life, that thick nourishing beginning from which any variation can happen. It is a stone that helps us to locate ourselves when we are in the process of becoming and encourages us to simply surrender to the light that wants to flood through us so we can become aware of the the large Shen (or heart spirit of the divine) that we are a part of. From there, is it so much easier to value and give voice to our little shen (our own individual spirits). The whole elixir is comprised of violet syrup, wild iris essence and an elixir of aquamarine + feldspar stones, and Asia describes it as "an elixir to invoke the initiatory magic of the womyn ancestors and our collective matrilineal line. Once upon a time we were all born from women who understood the mysteries of herbs and roots and death and beginnings. This elixir is a gateway to help remember our place in this continuum of hedgewitches and healers." Cucuteni vessel Well, it certainly opened that gateway for me, in unexpected and beautiful ways. The best part about the process of experiencing this medicine was that it seemed to work first like an old undercurrent, taking matters into its own waters while I wasn't looking. For after the hotsprings, I went to England to at last meet my dear friend Rima (that is a whole other story, one maybe you have already read), and the old seed of Tatterdemalion at last began to bloom. When I came home, rejuvenated by my time with Rima and Tom and Dartmoor, I was full of this fresh energy to research, to study, to take to the books. Weft was still on the back burner, simmering. I wasn't ready to work on it yet, I told myself. I asked myself a question, like I do in the world of animal tracking-- a sacred question to hold and carry through to its end-- what stories did the Bronze Age people of Grimspound (which we visited on Dartmoor) tell around their fires? A page from Marija Gimbutas' The Language of the Goddess  This, unexpectedly, led me back before the Bronze Age and into the work of the inimitable Lithuanian-American archaeologist Marija Gimbutas. There I dwelt all autumn and winter, reading The Goddesses and Gods of Old Europe, pieces of The Language of the Goddess and The Civilization of the Goddess, and then a related book called The Dancing Goddesses: Folklore, Archaeology and the Origins of European Dance (by Elizabeth Wayland Barber), not to mention bits of Andreas John's Baba Yaga: The Ambiguous Mother and Witch of the Russian Folktale. My spring office under the apricot tree, entirely hidden by shoulder-high wild radish I seemed to be following an invisible thread-- Gimbutas' controversial Bird Goddesses of Neolithic Old Europe connected themselves to Barber's exploration of Eastern European vilas/ willies/ rusalki and their connection to seasonal agricultural rituals of death and rebirth and Andreas John's treatment of the numerous Baba Yaga theories, many of which connect her with ancient snake and bird deities, female initiation, underworlds, the rebirth of seeds. Meanwhile, I was taking a ceramics class and hand-building a veritable menagerie of creatures and vessels inspired by the artifacts Gimbutas dug throughout Eastern Europe and documented in her magnificent books. Bird-shaped vessel  Marija Gimbutas I had first discovered Gimbutas back in college, in a small used bookshop that served as a sort of sanctuary for me. I saw her enormous The Civilization of the Goddess displayed prominently on a front shelf, and wondered why on earth I had never heard of it before (being a bit of a nerd for the ancient world). I paid $50.00 for it with only the smallest moment of hesitation (it was a very, very big book, hilariously heavy to carry in a suitcase home!). What I found inside absolutely staggered me. Not only was it the life work of an incredibly intelligent woman who had personally excavated many of the artifacts she wrote about from village sites all across Eastern Europe and the Aegean, and through them and her 30 some years of deep study reconstructed a vision of a matristic and deeply earth-based culture she named Old European. It was also a deep exploration of ancient feminine spirituality and the worship of what she called the Great Goddess, who was really just a manifestation of the cycles of creation, death and rebirth found in the natural world, cycles that have been both sacred and intimate to the daily lives of human beings all over the world for most of our history as a species. As Gimbutas explains in The Language of the Goddess, "it seems [...] appropriate to view all of these Goddess images as aspects of the one Great Goddess with her core functions—life-giving, death-wielding, regeneration and renewal. The obvious analogy would be to Nature itself; through the multiplicity of phenomena and continuing cycles of which it is made, one recognizes the fundamental and underlying unity of Nature. The Goddess is immanent rather than transcendent and therefore physically manifest" (316). Source here However, soon after discovering Gimbutas' work when I was 20, I also discovered the intense controversy around it. I will admit that for a while, that controversy kept me away. Attacks on her work were loud and strong, consisting of assertions that she had made everything up, that she had absolutely no grounds for much of what she was claiming about the symbolism she read into on pots, figurines, vases, that it was a load of feminist hogwash, etc., truly startled me. I have a deep, old adoration of the ancient world, of goddesses at their most primordial and earthen especially, of grounded witch lore and mythology, of the sacred rhythms of women's crafts, of the moon and my own bleeding, but I have a rather equally strong aversion to what can feel like ungrounded New Age goddess-stuff.  I got a little concerned for the sake of the latter, and I backed away. I fell for what I see now as a culturally ingrained prejudice against not just feminism but the feminine (say the word "god" and no one bats an eyelash; say "goddess" and immediately the eye-rolling begins). We are all, to one degree or another, held under the sway of the scientific, linear-minded, masculine patriarchy in which we live. (As an aside before I go further, I will just say now that I have nothing whatsoever against men; I love men. I don't, however, love a totally out of balance patriarchal system. I don't think any of us do. As women we are just as complicit as men in this system. Sometimes the re-iteration of patriarchal structures and ways of thinking by women upon other women is in fact the most intense and damaging rhetoric of all.) I've since discovered that the vast majority of criticism for Gimbutas' work in fact amounts to little more than slander. Frighteningly effective slander absolutely inextricable from a subconscious and fearful sort of misogyny. I'm not trying to say here that her work contains no flaws--whose work, especially in the field of archaeology, is perfect? That's a complete unreasonable concept. But the intensity with which Gimbutas was debunked speaks to something beyond reason and fact... What really riled people up about Gimbutas (men and women both) was that her approach to the material of a matrilineal Old Europe and its religious system was interdisciplinary, and that it had to do with a "goddess"-oriented religion. (Gimbutas herself found the term "Goddess" limiting, but used it for lack of a better word to describe an intensely potent feminine power inherent in the earth itself, both nurturing and terrifying and very much revered by Neolithic agricultural peoples, as well as indigenous cultures across the world and traditional peasant folk to this day.) Before she wrote The Goddesses and Gods of Old Europe and things began to get sticky for her in the academic world (in part because feminists took to her vision whole-heartedly, with good reason), Gimbutas was highly regarded in her field. She received numerous fellowships and awards. Her work on the Indo-European Bronze Age, on Lithuanian folk customs, on the prehistory of Baltic and Slavic peoples, was highly respected. Her book Bronze Age Cultures of Central and Eastern Europe was ground-breaking and praised. She, after all, had been the one to personally excavate much of the material she studied.  Whatever she hadn't excavated, she had read the reports about in their original languages, something few others in her field could do. Her knowledge of Lithuanian folklore, art and songs informed everything she did. She had, after all, received her doctorate (from the University of Tübingen) in archaeological prehistory, the history of religion, and ethnology. When digging an old Neolithic village across Eastern and Central Europe, she sometimes recognized patterns on figures or pots that were still in use in her native country among the peasant people. No one else had a comparable grasp of languages, folklore, mythology and religion. Her blending of disciplines was tolerable in the academic world until she shifted her focus from the patriarchal, highly stratified, war-like Indo-European cultures which arrived in ancient Europe around 3500 B.C.E. (the ones from which our own culture is still directly connected) to an older strata (beginning around 7000 B.C.E), the Old European peoples who had been there before the horse-riders swept in from the eastern steppes and changed the world.  What she observed across Old Europe was a village-based culture with virtually no social stratification (no highly ornate burials, no obviously elite dwellings), no weaponry or military fortification and therefore little or no war. She observed that neither sex dominated the other (as in either a patriarchy or a matriarchy) and so she called what she saw "Matrilineal" because clear importance was given to the female line, to the burials of old women and young girls in particular. Because virtually all of the little clay figurines found by hearths, by looms, by temple altars, were of big-hipped women. And because the language of symbols that Gimbutas interpreted from the thousands of pots, spindle whorls, shards, figurines, vases and vessels she dug and documented over 30 years was all about the regenerative powers of the earth, whose womb-dark soils and amniotic waters have been considered "feminine" by most human cultures throughout all time.  A vessel, when cut in half, was found to be full of small female figurines. From Ghelăiești. Photo by Cristian Chirita She interpreted an intensely spiritual culture from the vessels and figurines she dug up from the ground. (She was in fact the first archaeologist of Neolithic Europe to focus on religion at all, in a post World War II archaeological era intensely concerned with economics and materialism.) Many of the vessels she found seemed to be left as offerings—in pits dug beside houses, layered over the centuries; in temples beside sacred hearths. These vessels were women's work, as was the weaving of cloth, the gathering of fibers and seeds. So much creative potential lay in the hands and bodies of women, and was honored as such. She never claimed matriarchy or utopia, as many of her later critics somewhat hysterically claimed that she had; rather she noted a culture oriented toward the feminine inherent in the earth, but honoring of both genders.  Double-vessel, Cucuteni culture Image source here The backlash against her work began during the last years of her life in the early 1990's, as she battled lymphatic cancer, and came first from within the old, established patriarchy and archaeological monarchy that is Cambridge University, initiated by a colleague/friend Colin Renfrew (a Baron and Lord). I won't go into all the details of his attempts to undermine her work, nor what followed. Charlene Spretnak has written a fantastic and infuriating overview ("Anatomy of a Backlash: Concerning the Work of Marija Gimbutas" in the Spring 2011 issue of the Journal of Archaeomythology) of the erasure of Gimbutas' work from the archaeological canon over the last two decades. However, I will repeat here a quote of great relevance that Spretnak uses in her essay, written by Dale Spender in Women of Ideas and What Men Have Done to Them: "techniques [of control] work by initially discrediting a woman and helping to remove her from the mainstream; they work by becoming the basis for any future discussion about her; and they work by keeping future generations of women away from her." Goddess vessel from the Cucuteni culture,  Collection of National History Museum of Moldova  This is precisely what happened to Gimbutas. The sweeping, scathing, slandering criticism of her work (which, when you actually read it, often sounds more childish than academic; more defensive than constructive, like "goddess" and "feminism" are dirty words, but "god" and "patriarchy" are entirely neutral, objective, reasonable and sane) effectively removed her from the archaeological world. Almost no professors, except the brave, teach her work. I didn't really believe this kind of thing still happened. I do now. I have been warned.  This is the reason I wanted to take the time to get into some of the details here. Because it is an act of radical re-storying to bring her back into the archaeological forefront, back into the dialogue about what is possible for human cultures, back into women's hands. What a shame, what a loss to all of us —not just womankind but humankind—to have Gimbutas' work hidden away, buried. Most of the criticism of Gimbutas comes across to me as semi-hysterical, and mostly propagated (with intense vehemence) by people who haven't even studied her work with any great care, but rather have heard second hand of this archaeologist who "pandered" to new age Goddess- worshippers and obsessed over "matriarchal utopias" (neither of which she did in any way).  Gimbutas was a brilliant woman. She worked very much within the scientific structures of the archaeological discipline. Many call her the "grandmother of the goddess movement," but this was entirely by chance, not of her own doing. She did not overtly seek out either goddesses nor feminism; she simply sought to see what she thought was truth, with her whole heart and mind. Her work is an incredible gift to all of us, and worth taking the time to read for ourselves, in order to form our own opinions.  You can see that all of this has me deeply inspired and also furious. Seriously, furious. So furious it's actually hard for me to even gather my thoughts. So furious it might appear I've gone a great distance from Weft. But I haven't, not really. Because you see it was Gimbutas' work that stirred Weft out of me. I didn't even realize it at first.  Around midwinter, I saw what was going on. I realized that all of this reading and research about Old Europe was the warp (the vertical threads in a weaving, the structure) for my collaboration with Asia. I was feeding the creative well, yes, but in feeding the well I was feeding the story that needed to be told, the gift born of Asia's Grandmother's Elixir. It was still at work. It was filling me up. It was apprenticing me to the archaeology of sacred vessels, of ancient women's work—the warp weighted looms, the spindle whorls, the earliest gardens, the pots shaped like bird goddesses, bears, deer.  Symbols carved on a Romanian spindle whorl, 5th millennia B.C. Vinca-Turdas culture (Photo from "Signs of Civilization") I believe that over the decades of her research and deep observation of the village sites and artifacts of Old Europe, the vessels and spindle whorls and temple ruins whispered their stories to Gimbutas. This is thoroughly un-academic of me, but I believe in intuition, in magic, in voices speaking across centuries, in some knowing that is in the blood or the soul. I believe that when this kind of knowing is in balance with the powers of the mind, the intellect, deep study and careful thinking, very, very powerful things can emerge. The likes of Lord Colin Renfrew would take me to the stake for this kind of talk, or more likely in this day just laugh me off the stage; but don't we know it, as women, to be true? That the world is far more mysterious, and the knowing in our bodies far more ancient, than we are taught to believe? That when the very ancient knowing of heart and womb is in balance with a sharp, clear intellect, great beauty of thought and action is possible? Gimbutas never claimed anything of the sort, and yet after over thirty years of study, she said that the symbols carved on all of the artifacts she had written about and poured over just started to coalesce. To come together as a language of mythopoeic dimensions. I believe that all of her work was an act of magic; or, in other words, of communication across great distances of time, and the very small distances within the soul.  And isn't is the point, in the end, of all true study?  Old European Vessel It felt like something similar happened inside of me when I encountered Gimbutas' work for the second time this autumn, embracing it with an open heart and mind. The story came out in a rush, and yet in pieces. Like an ancient pottery vessel, dug up in shards. It has its own archaeology, its own warped loom, waiting for the reader to pick up the weft threads and weave it all whole.  At its heart, Weft is the tale of a girl, a drought, an underworld, and the most ancient roots of the Baba Yaga, set in partly historic, partly imagined Neolithic Transylvania around 6500 B.C.E. At this time, settled agriculture brought by small bands of Mediterranean travelers (and their grains, goats and sheep) was taking root across southeastern Europe, woven relatively peacefully into the framework of indigenous Mesolithic hunting and gathering tribes.  A reconstruction of Neolithic wattle and daub houses, based on archaeological findings and the structures of traditional Romanian peasant dwellings, from the  Câmpiei Boianului Museum  I dreamed into my own version of Old Europe, rooted as much in research and fact as possible. Reading about these ancient village sites full of offering jugs and sacred ovens, their houses of wattle and daub, perched at the edges of mountains and woods, felt like indigenous ground in me. On a pathway of my own ancestral blood through Austria, through Hungary, through Poland, through Russia, I felt that in working with this material I could follow a part of myself back to a source, a place of balance, a set of ancient lifeways to look to for wisdom, for strength, for wholeness.  Vessel from Cucuteni culture, in the Cucuteni Neolithic Art Museum For you women who are of European descent, this is indigenous ground. This is a place to put our roots, to drink up, to learn from. Gimbutas' Old Europe represents to me a culture, a set of stories, that were in balance with the cycles of life around them. A narrative of living to re-learn, to re-member. We are in desperate need of this wisdom today; in desperate need of places to source our own stories and sense of connection, not appropriating those of the indigenous people who still survive and flourish today, but seeking our own rootings, groundings, retellings.  Weft is about that which tips us out of balance, and that which brings us back again; about ritual and the sacred and how we make such things manifest with our very hands. It is a celebration of the deep beauty and power of ancient women’s work: weaving, spinning, pottery, child-bearing, plant-tending, medicine gathering. It is a hymn to the dying we undertake every moon in the underworlds of our own bodies, even if we no longer bleed, and the process of being reborn. I want to dedicate this work not only to all the women of my ancestry—back to the very beginning of time, when women weren't women at all, but birds, or perhaps deer, bears or even the roots of the plants which cleanse and heal—but also to Marija Gimbutas, whose work has been pushed into an underground current over the past twenty years, but whose wisdom we sorely, sorely need.  I read yesterday that by the year 2050, the weight of plastic in the ocean will outweigh that of fish. I really hope that this fact isn't true, but I fear that it is. Please, may we have the courage and the strength, both women and men, to defend other stories, older stories, stories of rootedness and the immanence of the natural world, before it is too late.  In some ways, it is already too late. But not entirely. For aren't all of these female figurines, these patterns of line and triangle and diamond, about rebirth? "There is no simple death, only death and regeneration," Gimbutas writes (320, The Language of the Goddess. I will leave you with this wonderful film about Marija Gimbutas' life and work. It is well worth watching, perhaps with spinning, knitting, weaving, mending, in hand...
global_01_local_2_shard_00001658_processed.jsonl/8282
Wednesday, October 24, 2012 Obama: Just another King Louis? The name of the King of France at this time was Louis, as it had been fourteen times before.  This, the fifteenth Louis, was the most gorgeous, the most fashionable, the most bejeweled and lace-trimmed king in Europe-and the most useless.  He did nothing.  He thought of nothing, he cared for nothing but his own pleasure, and he had whatever he fancied no matter how great the cost. Louis XV lived at Versailles, about twelve miles from the city of Paris, in the most beautiful palace in Europe, built by his very famous great-grandfather, Louis XIV. Louis XIV was an absolute ruler, but with the noblemen scattered all over the country it was difficult to keep absolute power over them.  So when he had moved to Versailles he made the nobles leave their estates and also come to live at Versailles, where he could have his eye on them.  To keep them happy he established for them many more honorary offices at court such as those of Lord High Chamberlain, Grand Master of the Royal Hunt, Lord High Steward of the Kitchen, to which large salaries and no work were attached. By the time Louis XV became King, it was the well established custom for all important noblemen to live at Versaille as near to the King as possible, every waking moment to follow him about.  There were two hundred attendants stumbling over each other in the King's bedchamber alone.  From the time he awoke and held out his white hands to be perfumed and jeweled to the time when the Lord High Keeper of it put the nightcap on his head, the King was never alone.  The courtiers were always there, to watch his every move and imitate it. What the King did and had one day, they did and had the next.  What he was they became: the most fashionable, bejeweled and lace-trimmed noblemen in Europe, and the most useless.  They danced, played games, chatted with each other and made love to the ladies.  Every year their manners became more exact and fanciful, their clothes more delicate in color and more hung with lace, their wigs more finely powdered and their furniture more full of curves and scrolls and more richly gilded.  And all they did was play.  But as too much play becomes monotonous, all their amusements grew tiresome in time. "Life is boring,"sighed the King.  "Life is boring," sighed the noblemen, and yawned behind their white, jeweled hands. Meanwhile, back on the estates, the peasants still worked and tilled the fields as they had always done.  Only now each year they had to work even harder, for each year their lord at Versailles needed more money for his pleasures, to say nothing of the huge amounts needed by the King.  So while the noblemen played, their overseers squeezed larger rents for the small fields, larger feudal dues and more enormous taxes from the peasants.  When they had turned in their crops in payment, many peasants had barely enough left to keep from starving.  "Life is hard," they said as they scuffed off their wooden clogs each sundown and wiped the sweat off with their rough brown hands.  "Life is hard." Between the peasants whose life was all work and the noblemen whose life was all play there was of course a very large middle class of people who worked for a living, but also had some time to play.  The French name for them was bourgeois.  Some of them were wealthy, most of them were just hardworking and thrifty, but all of them hated to see such a large part of their hard-earned money go for taxes. "Life is unfair," they were beginning to say.  Why should thousands of people work hard for their money, in order that one king and a few extravagant noblemen should have it to squander? It was plain to see that such an unfair condition of things could not last forever.  That, however, did not trouble the King.  "It will last as long as I live," Louis would say.  "After that," with a shrug of his shoulders, "what do I care what happens to France?" This is the story of King Louis XV written by Genevieve Foster from the book George Washington's World.  I know all of you have probably heard this story before, perhaps some of you have not.  This is my first time hearing it, and I keyed in on the things that the peasants and the bourgeois were going through.  Wow!  Some things never change, do they?  You could just insert Obama's name where you see the name King Louis and the story of present day life and politics would sound about the same, wouldn't it?  Take a look first at the noblemen who came to live with the King and in order to make them happy, the King offered them titles with no work and high salaries to go with them.  Sounds a bit like all of those 'czars' that Obama employed early on in his presidency.  Priceless. All of those 'noblemen' wanted to be just like Obama, I mean, the King.  All they did was  I mean, play. Meanwhile, back at the ranch, all of the peasants, or tax-payers, worked their fingers to the bone and had little left after all of their taxes were paid in order that the president, I mean, King and his cabinet, I mean, court may amuse themselves.  Sound familiar?  Some of us might identify more readily with the bourgeois, though.  The bourgeois was mostly middle class people, bankers, bakers and such, wondering why they should pay all of their money to a king in order for him to squander it?  Insert the word president where you see king and congress where you see noblemen.  Makes sense.  King Louis, I mean Obama, is also utterly useless.  He does nothing, he thinks of nothing and he only cares for his own pleasure.  He has no interest in running a country whatsoever.   He also amuses himself and his family, no matter how much it costs the American taxpayer.  Hmmmm..... I also feel that Obama's sentiment is the exact same as the sentiment that King Louis has at the end of the story, this situation will last as long as he is in office and then what does he care what happens to his country?  "After that," with a shrug of his shoulders, "what do I care what happens to America?"
global_01_local_2_shard_00001658_processed.jsonl/8329
Kamis, 09 Agustus 2012 Tutorial Adwords Google PPC can be solitary of the easiest ways to generate traffic to your website and knock together a quantity of decent profits from your AdWords campaign. Google AdWords is the the majority accepted form of recompense for each click advertising instead of small businesses, partly as of Google and their AdWord advertising popularity, and partly as it allows you to control your expenses by setting day after day maximums instead of apiece classified ad in your Google AdWord campaign. Voguish your Google AdWord campaign, you deposit how much you are willing to PPC (pay for each click) and how much you're willing to splurge a calendar day. These facts in your Google AdWord campaign determine how often your definite will confirm on a viewers screen what time she hits the search button. Advertisers who has deposit in attendance AdWord Campaign financial plan highest, and are bidding advanced on with the purpose of actual keyword, shows up foremost in Google's Sponsored results. Google AdWords advertising as a rule starts sour as a trial and slip instead of marketers who are extra to using AdWords. It kind of comes down to you having to splurge a quantity of, in order to knock together a quantity of. And often epoch you are open to recover manually trailing a fate more than you're making. It's open to take a fate of understanding and exploration to really ascertain Google AdWords, how it factory, and how to turn out to be profitable from it. An AdWord campaign is more than guessing and throwing numeral collected. To turn out to be a Google AdWords skilled you MUST study your niche, select your AdWord keyword inventory wisely, and refrain from several bidding wars. Bid on could you repeat that? You feel comfortable with. Once you start making more money from your Google AdWord campaign, at that moment you can unhurriedly start upping your bids, but NOT healthy away. AdWords Campaign Google AdWords allow you to run numerous AdWords campaigns next to the same schedule. This is answer. One of my unsurpassed practices is I test sundry ads to establish which solitary is converting better. For illustration, instead of solitary classified ad I can gain my legend title 'Guide To Google AdWords' and instead of my picture I can place something like, 'My Definitive Guide To Google AdWords has helped knock together live in $1 million dollars a month.' That would be my foremost campaign, and I would target keywords like: Google classified ad word, AdWord advertising, AdWord campaign, AdWord help, Google AdWords skilled, Google advertising, advertising on Google and so on. For my support campaign I would try something like 'AdWord Advertising Really Works' with a sundry picture. After a propos a week or so of read-through the stats in the AdWord campaign, I would know exactly which classified ad is working the unsurpassed and which solitary I be supposed to ditch. Make Money Using AdWords Now you be supposed to already know how Google AdWords can be a downright obsession, instantly I'll confirm how to custom it in order instead of your occupational to knock together profit. First, you be supposed to determine how much you can afford to recompense instead of a click. Doing this is focal as it enables you to better understand the amount of money you can attempt on keywords in your Google AdWord campaign while still enduring profitable. To prepare this your conversion ratio is wanted, gauge your conversion ratio by in-between your monthly unique visitors by your monthly sales, at that moment convert your answer into a percentage by multiplying by 100. Imagine in a month you grasp 20000 visitors and persuade somebody to buy 500 products apiece with a gross profit instead of you of $50. Your conversion ratio simply place is (500/20000)*100 = 2.5%. This capital with the purpose of instead of all 100 live in who visit your spot 2.5 fall for your result. Your gross profit for each 100 visitors is calculated by multiply the gross profit on your result by your conversion ratio, to carry on with the preceding illustration - $50 x 2.5 = $125. Divide your gross profit for each 100 visitors picture by 100 to determine how much you can attempt in your Google AdWord campaign. Voguish this defense you might afford to recompense up to $1.25 in AdWord adverting instead of a visitor and still break even. You probably will not be paying this much instead of a click, the least CPC on Google AdWords is barely 5 cent so occupy yourself your cards healthy and you can gain extreme profits. (adwords management company) Comments : 0 komentar to “Tutorial Adwords” Posting Komentar Copyright © 2009 by Tkp News Template by Blogger Templates | Powered by Blogger
global_01_local_2_shard_00001658_processed.jsonl/8339
Below is an advertisement. Make your own Retro avatar 1. Right click to save these cutouts of our 1984 Retro Night hat and uniform to your desktop 2. Add them to your current avatar using your favorite photo editing platform. 3. Upload the retro version to Twitter or Facebook! Download our official Retro Avatar and Facebook Covers! Show your support To add as your profile image or avatar: 1. Save one of the images at left/above to your desktop 2. Upload directly to Facebook or Twitter.
global_01_local_2_shard_00001658_processed.jsonl/8344
Serving the Children of the World Objects of Kiwanis • To give primacy to the human and spiritual rather than the material values of life. • To encourage the daily living of the Golden rule in all human relationships. • To provide, through Kiwanis Clubs, a practical means to form enduring friendships, to render altruistic service, and to build better communities. These six permanent Objects of Kiwanis were approved in 1924 and remain unchanged to this day.
global_01_local_2_shard_00001658_processed.jsonl/8346
My basic trading philosophy can be summed up by one simple quote: "Trade the ticker, not the company" - Nate Michaud Saturday, July 5, 2014 6/27/14 WSTI Short Trade Recap As some of you may have noticed, recently I've been taking some time off from blogging, in part due to the OTC market being so slow. However, I've received a few questions about my WSTI short and thought that it might be beneficial to do a trade recap. The Setup: Let's begin by examining the daily chart entering the day: When examining this chart, here were my initial observations:      - 6/19/14 was the first day of significant volume; therefore, I consider that the start of the promotion. The chart action prior to that is irrelevant to me due to the low volume.      - Every single day since the beginning of the promotion, the stock closed green; therefore, I consider this an overextended stock that should collapse hard when it finally cracks. It helps that it is a known promotion.      - 6/23/14 the stock went significantly red, yet it managed to recover and close near highs. The next day it broke out past $1.55.      - Every day following the breakout, the stock has gone red, yet it recovered to close green. This tells me that a g/r move may not be what triggers a total collapse. Normally when I'm looking at an overextended daily chart, I'm looking for large morning spikes to short into or a g/r move to signal a trend break and impending collapse. As noted above, in this case I believed that g/r would not trigger the collapse, that it would take a different sort of trend break. During the previous trading day, WSTI had a very strong open before a negative seeking alpha article was published, causing the stock to pull back. WSTI pulled back to about $1.80 because of the negative article before quickly recovering. Since the daily chart had produced higher lows every day since the breakout, and $1.80ish had acted as the bottom of the panic after the negative article, my theory was that $1.80 could act as the trend break that would lead to total collapse. Morning Action: Unfortunately, WSTI shares to short were very difficult to come by. Up until the previous day, they had been impossible to find. My favorite broker for OTC stocks, Centerpoint, briefly had shares to locate of WSTI the morning of the 27th. I decided to pay the locate fee of $.05/share for 10,000 shares, because I knew there was massive downside potential if the stock collapsed, and I didn't want to be without shares if a shorting opportunity presented itself.  WSTI gapped up to $2.17, and after a quick pullback to $2.12, it managed to spike up to $2.25 before running into resistance. I was definitely watching the spike for a short opportunity, but ultimately I decided that it hadn't spiked high enough for me to short into the strength. After a brief period of consolidation, WSTI began to crack its $2.12 low of the day. I decided to take this opportunity to initiate my short position and wound up with roughly a $2.11 average. But why did I short here? It wasn't into a spike, and it wasn't on the $1.80 breakdown level I thought might be key. There were a couple of reasons: 1. The low-of-day crack was still a very bearish move. I expected there to be SOME pullback at least, and if the stock looked like it would hold up, I could just close my position for a small gain or loss. 2. 10,000 shares is not a large position size for me. If I were to stay patient/stubborn with my position, I knew I could always locate additional shares the next morning and look for a spike to add into short. I watched the stock bounce slightly after the pullback to $2.00 and knew that ultimately I wanted to use the morning high of $2.25 as my risk level. If WSTI had started to perk up and look like it might break past that high, I would have probably cut my loss and tried again later into a spike. The $2.12 support level began to act as resistance instead, though, and after failing to break through WSTI faded back again. The rest of the day, WSTI turned into a slow and steady fader. While there were small bounces along the way, there was never any action to indicate that the trend was reversing. Once WSTI broke below $1.80, I knew the stock was toast and should continue to fade. The chart was broken. I would have added to my short on the $1.80 crack, however, I was unable to find additional shares. I considered covering some of my short into the fade, but since it was going to be the first red day for WSTI, I thought there were decent odds that there would be additional washout the next morning. The Cover: Monday morning WSTI had a pretty large gap down, from $1.35 to $1.14. I already thought this was a rather large move down, and upon reading the level 2 I thought I saw bottoming action right out of the gate so I quickly covered up my position at $1.11. The level 2 action turned out to be a fake bottom, but I had no regrets locking in my profits as I had played it safe and hadn't opened myself up to potentially getting caught short into a large bounce.  WSTI had fallen 50% off of its highs in one trading day, which was more than good enough for me. Had there been a large bounce at some point, I would have definitely considered a reshort. I never quite got the price action I was looking for though, so I simply moved on to a new stock because the play was over!  1. How often do obvious trades like this usually come around? Once a week or so on average?... I figure for the first few months when I start trading I will only trade more obvious setups like this and paper trade the less obvious or more risky ones. That way I make the inevitable rookie mistakes on paper money while still slowly growing an account. 1. This comment has been removed by the author. 2. This is not an obvious trade, this was heavily pumped by many websites and newsletter, it could have spiked even MORE before it dropped, you have to wait for a "Z"(close of the day is lower than the opening price) bar in the "OHLC" bars, shorting an "S" bar is dangerous. You can also short during the day when you see the price weak and it's too overextended in the daily chart, OTC drop like shit, but you can also get burned like in the marihuana stocks if you dont read and know what is happening in the stocks 2. This is a beautieful trade yet so simple.I understand your trade your using support and resistance and a bit of common sense. You basically see a stock thats being pumped and you know that strength cannot be sustained and its going to pull back soon, you wait for it to break a support level because once it does all hail breaks loose people start selling heavy so once it breaks the support level you short to it to the next nearest support level and then start covering in case it bounces back. Am I right in saying this is some kind of basis of your strategy in a simplified explanation? 3. Could you make videos instead of writing Tim, it would be much more cool and didactic. I would like to see more videos of you too, you could give alerts and charge for them too ;) 4. Hi Tim, Thank you for the recaps. They are extremely educational and I really like how you present your detailed thought process through out and include the charts. Great work. 5. Very informative, keep it up brother! Quick question, are you using Thinkorswim for your charts and level two and just trading using centerpoint? 1. I get my level 2 from Speedtrader, I trade there and Centerpoint 6. Hi Tim, How do you know a stock is dead and ready to collapse? How do you know that the promoters have stopped pumping the stock? Because if I am short a stock, I don't want to see it rise $4 after (if that is even possible). Please advise! Thanks! 1. If you let a stock rise $4 after shorting, I think the first and most obvious problem would be a failure to cut losses. Please review the post and other trade recaps of my shorts, I outline the indicators I look at as clearly as I can 7. Hi Tim, I have had some success by going off syllabus a little. I have been shorting stocks that have 20 to 60+% gains in premarket. I wait for a good risk vs reward pattern to sets up, then I short in premarket and cover sometime before 11AM. Is this practice ok? It seems to work for me. Thank you. 8. may i know what is level 2? i am new here tim 1. URL below should answer your question. I also, highly recommend start reading from his January blog posts to understand the jargon. 9. Hi Tim Thanks for your blog, greate information you share here. I want to open an account in shuretrader with 2000, but after Reading about the commissions and fees, I don't know the amount to open it. Wich is the quantity recommended to open the account to avoid being loosing for the commissions?
global_01_local_2_shard_00001658_processed.jsonl/8359
Homeopathic Medicine Skin and Hair Homeopathy for ABSCESS Homeopathy for ABSCESS Tooth Abscess, Peritonsillar abscess, Skin abscess, Breast Abscess An abscess is a localized collection of pus in any part of the body, caused by an infection. An abscess is a tender, easily pressed mass generally surrounded by a colored area from pink to deep red. The middle of an abscess is full of pus and debris. Painful and warm to touch, abscesses can show up any place on your body. The most common sites are in your armpits (axillae), areas around your anus and vagina (Bartholin gland abscess), the base of your spine (pilonidal abscess), around a tooth (dental abscess), and in your groin. Inflammation around a hair follicle can also lead to the formation of an abscess, which is called a boil (furuncle). Tooth Abscess A tooth abscess is pus enclosed in the tissues of the jaw bone at the root of an infected tooth. Usually the abscess originates from a bacterial infection that has accumulated in the soft pulp of the tooth. Abscesses typically originate from dead pulp tissue, usually caused by untreated tooth decay, cracked teeth or extensive periodontal disease. A failed root canal treatment may also create a similar abscess. It may also develop from bacteria entering a tooth filling and multiplying. A pus taste may also develop. There are three types of dental abscess. A gingival abscess that involves only the gum tissue, without affecting either the tooth or the periodontal ligament. A periapical abscess starts in the dental pulp. A periodontal abscess begins in the supporting bone and tissue structures of the teeth. Breast Abscess A breast abscess is a painful collection of pus in the breast. Breast abscesses are painful, swollen lumps that may also be red, feel hot, cause the surrounding skin to swell, cause a fever. Breast abscesses are often linked to mastitis, a condition that causes breast pain and inflammation, and usually affects women who are breastfeeding. Homeopathy for Abscess Proper homeopathic treatment can help dry most of th abscesses thus preventing many surgeries, drainage and dental extractions. #Belladonna [Bell] Is the remedy most often indicated for the initiatory symptoms of abscess. The parts swell rapidly, become bright red, there is intense throbbing which is painful,pus develops speedily the swelling increases and the redness radiates; here Belladonna is in close relation with Hepar and Mercurius. It comes in earlier than either of these remedies and corresponds more closely to the active, asthenic variety of abscess before pus is matured. In abscesses about the alveolar processes, the so called gum boils, Belladonna is often the first remedy and Mercurius follows here in most cases. In acute glandular abscess Belladonna is often indicated and is a beginning remedy. Chamomilla is not a remedy to suggest itself in abscess, yet has proved valuable in promoting the formation of pus in chronic abscesses where Hepar has failed to act promptly, and in making the pains more bearable. #Hepar sulphur [Hep] Is the great homoeopathic remedy for suppurations where the pus is not decomposed. It suits especially lymphatic, phlegmatic individuals. Excessive sensitiveness of the parts is a leading indication. It is further indicated by these symptoms: chilly sensations, throbbing in the parts, or sharp, sticking pains which are worse at night and from If given low in threatening suppuration it will favor the formation of pus. The suppurative process will often be aborted by Hepar if given in the higher potencies. Such abscesses as felon or whitlow generally do well under Hepar. If there be a bruised pain present, sometimes Arnica may do good. There are two other preparations similar to Hepar; calcium sulphide, which is the chemically pure article, has never been proved, hence we must regard it only as b a makeshift for Hepar, and Calcarea sulphurica. The last remedy has been found useful in cases of abscess where the suppuration seems to continue indefinitely. The presence of pus with a vent has been considered a good indication; it comes in after Silicea, and suits painful abscesses about the anus, and is a most useful remedy in gum boils. Dr. W. E. Leonard claims that in the 12x it will abort felons and furuncles. #Silicea [Sil] Is the remedy where the suppuration continues and the wound refuses to heal, no matter where the suppurative process is located; the pus is apt to be thin,watery,and the process is sluggish and indolent one. Under Silicea the suppurative process takes on a healthy action , the pus becomes benign, granulation appear. It is then time to stop the remedy, for if it be continued it may undo the good it has done,and another remedy, probably Fluoric acid ,will have to be given. This remedy antidotes the overuse of Silicea. Silicea is usually prescribed after an abscess has been lanced or opened by means of poultice. Warmth is very grateful to the Silicea patient. Fluoric acid has relief from cold. Abscesses having much cellular infiltration in their vicinity call for Silicea. It, too,is a remedy for all fistulous burrowings. In rectal fistula it is very often the remedy; great nervous erethism, if present, is an additional. There is often considerable foetor to the discharge of Silicea cases. Scrofulous and tubercular abscesses especially call for Silicea. #Mercurius [Merc] Differing from Belladonna, from Hepar, and especially from Silicea is Mercurius, which is one of our good remedies in abscess. It comes in after Belladonna, when pus has formed. It favors the formation of pus especially in the lower potencies, and is especially indicated in glandular abscesses; the pus is greenish in tint, and quite thin and fluid. There is intense, shining redness with throbbing and stinging pains. It does not follow Silicea well. From Hepar it is to be distinguished by general symptoms; then, too, the suppurative process is slower, and all the pains are greatly aggravated at night. In abscesses at the roots of the teeth it is one of our best remedies, and it is often efficacious in toothache due to this cause. It will often abort suppuration when used in the highest potencies, as in tonsillitis, where it is a most valuable remedy. It is a remarkable remedy in pyorrhoea and will make extraction of teeth unnecessary. #Lachesis [Lach] In low conditions of abscess, when pus in thin, dark, ichorous, and offensive in character, Lachesis may me the remedy. The parts are purplish in appearance. It the remedy for abscess where poisonous matter has been introduced into the system, causing the trouble. Carbo vegetabilis may also be a remedy in long-lasting, unhealthy suppurative processes which produce a hectic fever. Rhus toxicodendron is another remedy for abscesses of the parotid or axillary glands where there is a discharge of a bloody, serous pus. The evident poisoned condition of the system and tendency of the abscess to take on a carbunculous state will indicate Rhus. With Lachesis the discharge is a thin ichorous pus. Another remedy in low condition of abscess is Arsenicum; the great debility, the production of watery, ichorous pus, the threatening of gangrene and the intolerable burning pains will call immediate attention to this remedy. #Sulphur [Sulph] Is also a remedy which may be used with the greatest benefit in abscesses and suppuration; especially is it useful in chronic cases where the discharge is profuse, accompanied with emaciation and hectic fever. Abscesses in scrofulous persons, where there is a marked psoric taint and a tendency to boils, correspond to Sulphur. The pus is acrid and excoriating. Crops of boils in various parts of the body indicate the remedy well. Lycopodium has also been found useful in boils which are greatly aggravated by poultices. #Arnica [Arn] is the remedy where abscesses and boils do not mature; they shrivel up, then another crop comes; Arnica will often develop the abscess, carrying it on to a discharge of the pus and a cure of the trouble. Boils coming in crops call for Arnica; they are very sore, purplish in color; also blood boils which are very sore. Calcarea carbonica, Calcarea iodata (especially in abscess of the cervical glands scrofulous in nature), Asafoetida, Calendula (traumatic suppuration), and a number of other remedies may perchance be indicated in suppuration and abscess. With Calendula the pus is thick and yellow, not attended with active inflammation. The symptoms, unhealthy skin, every little wound or scratch suppurates, are found under Hepar, Silicea, Calcarea carbonica and Graphites. Grauvogl considered Arnica as a remedy to prevent suppuration, and particularly to hinder the absorption of pus and so prevent pyaemia. #Rhus toxicodendron [Rhus.t] is a very useful remedy in acute suppuration; especially has it been found useful in suppurative conditions about the eye. It has proved curative in abscesses about the parotid and axillary glands; the pus is bloody and serous, the pain is intense, and the swelling is dark red. Rhus corresponds very closely to septicaemia. #Echinacea [Echi] has achieved a well merited reputation in suppurative conditions, especially where symptoms of blood poisoning are present. There is no question as to its efficacy. #Nitric acid [Nit.ac] may also come in suppurations about the glands, especially the inguinal or axillary, in syphilitic subjects, and when the discharge is offensive, excoriating and of a dirty, greenish yellow colour. Suppurations is mastoid process. Kali iodatum must also be thought of in syphilitic or scrofulous cases. Phosphorus is often useful in abscesses about the bones, and here we will find Aurum, Asafoetida, Pulsatilla, Calcarea phosphorica, Calcarea fluorica and Manganum special remedies. Pyrogen according to Dr. W. E. Leonard is invaluable as remedy in recurring abscess conditions. It will clean up the system and prevent a recurrence. About the author
global_01_local_2_shard_00001658_processed.jsonl/8360
Gmail sending attachments trick: multiple simultaneous files It's not all that amazing, but, as they haven't given a lot of hype to this, if you haven't directly read Google related news, you might be still using Gmail the old way without knowing this simple trick: you can attach multiple Gmail files at the same time, simultaneously. Of course you could send several attached files at the same time. But you had to attach each file individually in the older version. So you had to select the files to attach one by one, in different file selection windows. Now we can add more files to attach in the same file attachment selection window, just by holding the CTRL key while clicking the additional files. selecting multiple files to attach And now they have included an attachment sending progress bar as well. attachment sending progress bar Find you users' frequent questions user frequent questions We recently saw that only webpages with quality content will be successful in the new Search Engine Optimization scenarios. But you cannot write quality content if you don't know what your users need. A very good way to give your users what they need is finding out their most frequent questions. What do they want to know that is related to your business? Answer such questions, provide useful content and earn your potential customer's trust. This question search tool is a quick way to find questions related to a specific topic. You should try searching questions concerning the following subjects: • The main keywords of your site. • Your offered services: what do you sell / build / provide / talk about. • Your brand name, and other similar brands. • The name, brand or model of your products. • Related tools or accesories. Remember these quality content writing tips. Discover new and unsuspected user needs through frequent user questions, and satisfy these needs, building this way high quality content. Google SearchWiki allows you to customize search results Have you ever typed a simple search query and then ended in a webpage whose short description seemed pretty relevant in the top of the search engine results, but which was in fact full of useless content? We have all gone through this. And now, this is coming to an end. Wouldn't be great to have a search engine which adapted itself to your preferences? This is what Google has finally launched as Google Search Wiki: a major update of their search engine that allows users to select their favourite search results and take a look at how other users are customizing their searches. 2 innocent Google buttons that will change search forever Starting to use Google SearchWiki is as simple as logging to an existing Google Account. The next time you perform a search in Google, you will see 2 new buttons near each specific search result: Google custom buttons • Promote button: moves the search result to the top of the 1st page. • Delete button: removes the search result from the list. A single click gives you the power to customize your search engine results, so Google will work better for you. Do you hate these websites that seem to have the answer to your question and then lead you to a payment details page? Now you can remove such useless results forever. On the other hand, this is the way to keep those useful but hard-to-find webpages with tons of interesting contents. Once you found something useful, you can promote it to make it easier to find again (without cluttering your browser dependent favourites list). Will the SearchWiki Google update have some real impact? It isn't the first time that someone tries to create customized and user community based search results. But it's the first time that the #1 search engine of the world starts doing this. So this time we are taking the largest user community and the most advanced search algorithms as an starting point. Trust me: this searching wiki is going to be something serious. We are going to see a strong modification of the click through rate of most websites very soon with Google SearchWiki. Nevertheless, it will take some time till this first version of the custom search results is fully established. Google will need to gather and process tons of new data from SearchWiki users. And the end users will have to get used to log into their Google accounts, reward the interesting search results, and remove the useless ones. But, weren't many users already logged in while they checked their e-mails through Gmail, their documents through Google docs and so on? The array of free services provided by Google is so big that most users will start customizing their search results without even noticing. Still we don't know if Google will use the data provided by millions of users who rewarded interesting search results to raise these popular websites to the top positions in Google's global search results. SearchWiki algorithms cannot be directly applied to either unregistered users or completely new search queries. And I'm pretty sure that these two kind of searches are more than the 80% of current Google searches. That's why optimizing these general search results would still be very important for Google. Chances are that Google will likely take into account the automated SearchWiki user's feedback to optimize and improve its search algorithms. The main hint pointing in this direction is that Google Search Wiki displays meaningful messages such as "You are the first person to pick this result". SearchWiki even shows you global counts of "picks" and "deletions" registered for earch single search result. All these ideas remind a lot of some kind of search results popularity system, as social bookmarking sites like Digg are using to promote the most interesting news. On the other hand, pages deleted by many users could be penalized and sunk to the bottom positions of the overall Google search results. So this Google update could lead to a nice way to estimate the content quality of a random webpage, much more accurate that Microsoft's proposal of using bounce rate statistics to punish webpages in Windows Live Search results. How can you measure the effects of this Google update? You cannot measure the impact of this recent Google update by browsing search results, because you can only check your search engine results. Remember that each user will only see her own custom search result positions (SERPs) in SearchWiki as long as she is logged into her Google account. Let's try to estimate what could happen to your current website statistics. Since we aren't sure about how Google may use gathered customization data to tweak global search results, we cannot predict whether your number of new visitors may decrease or increase. If you were capturing traffic without relevant content, your bounce rate would be high, and probably your new visitor traffic could decrease. Now let's check those web metrics about user satisfaction and content quality. I bet that you will have more returning visitors and even higher conversion rates. Now your satisfied customers have an easier way to return to their favourite websites without being lost in the middle of a chaos of uninteresting search engine results. Finally, take into account that many users won't return to the search engine results page to delete irrelevant results (unless they are opening many browser tabs). So the first pages that would be removed and filtered out are those ones with a description that seems unrelated to the search query from the user's point of view. You see? The importance of writing good titles and descriptions has just become even more critical. Is Google Search Wiki the end of SEO? You have to understand that SEO business shouldn't rely on either repeating the same keywords one hundred times or purchasing thousands of low quality inbound links. It has never worked this way, and now this is becoming an even bigger truth. If this was your idea of SEO, then you weren't a very good SEO at all, and your optimization skills won't be useful in this new search engine scenario. It's a somehow funny fact that the one who is actually optimizing how the search engine works is not an SEO, but the end user. Maybe we should stop talking about SEO, and start talking of content optimization or even of developing effective communication solutions. SEO is no longer a matter of cheating with technical details. Creating useful quality content that fulfills your user's needs is the key. Give your users what they need, so they will keep coming, they will trust you, and they will tell good things about you to the rest of the world. At the end, only you can decide what is relevant for you. This change of Google algorithms through SearchWiki will benefit all users, as the final goal is to achieve relevant pages that meet each specific user's needs. 007 Goldeneye 64 online: Goldeneye Source The 3rd Beta of Goldeneye Source has just been released this month. Goldeneye Source is a free MOD developed for Half-Life 2, which perfectly recreates the death match maps of Goldeneye for Nintendo 64. Goldeneye Source includes an Online Death Match game mode. This game is added to the Steam game list, as most MOD's are. I have recently tested the game, and it works perfectly. The game maps are exactly the same maps of the original N64 game, but with graphics and textures of the latest videogame generations. I just miss the "bills" of texture that fell when you shot the ceiling. This is just like playing 007 Goldeneye64, but with a keyboard and a mouse (and with cool graphics too, for sure). Those who played Goldeneye during many hours on N64 will find that the most strange situation is to fight against more than 4 enemies on a single map. Goldeneye Source Downloads Download Goldeneye Source Goldeneye Source Soundtrack (it's a remake of the original videogame soundtrack, but "trendier"). Goldeneye Source gameplay video How to reorder MySQL table columns in MySQL databases The data structure of any application is the hardest part to change. Nevertheless, new needs arise all the time, and so, adding new table columns to an existing MySQL database is a common task. But what about reordering the table column order in MySQL after you have already created and added the new columns to an existing table? Doing so is an advisable procedure in order to keep together very related data fields in your MySQL table structure. While I tend to perform many MySQL database management tasks using phpMyAdmin, I haven't found any phpMyAdmin feature to change the column order of an existing database. Fortunately, you just need to execute a very simple MySQL instruction to specify a new column order: ALTER table `table_name`        MODIFY COLUMN `column_name` your_data_type        AFTER `other_column_name` Just replace the following fields by your actual MySQL data: • table_name: the name of your MySQL table being modified. • column_name: the name of the MySQL table column that you want to reorder. • your_data_type: the MySQL data type of the data stored in the moved column, such as int, varchar(lenght), text, etc. • other_column_name: the column name that will be just before the new position of your reordered column. A MySQL table column reorder example Here is an example of an actual MySQL query to change the table column order. Let's say I want to move the column called "user_password" just after the "user_name" column to keep strongly related columns grouped: reorder mysql table columns ALTER table `registered_users`        MODIFY COLUMN `user_password` varchar(25)        AFTER `user_name` This will reorder the columns in your current MySQL table structure, but it will not alter the row order of your table records: the stored data order will remain unaltered. Reorder MySQL table columns to visually group strongly related fields. So reordering is just a way of changing the column order of an existing MySQL table, and it won't modify your query performance. Column reorder is mainly a matter of coherence and logical organization. On the contrary, altering the stored data order may optimize (or negatively impact) such MySQL query performance.
global_01_local_2_shard_00001658_processed.jsonl/8380
Funny / Gina Lollobrigida Inexact title. See the list below. We don't have an article named Funny/GinaLollobrigida, exactly. We do have: If you meant one of those, just click and go. If you want to start a Funny/GinaLollobrigida page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes and should be created through the YKTTW system. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_01_local_2_shard_00001658_processed.jsonl/8381
Demons & Wizards is a HeavyMetal supergroup formed by Hansi Kürsch of Music/BlindGuardian and Jon Schaffer of Music/IcedEarth, who originally became friends when their bands toured together. "Demons and Angels" was suggested by Schaffer's wife as a description of the difference between Schaffer's demon-like guitar and Kursch's angel-like singing. Kürsch disagreed and said it would be more accurate to describe him as a wizard. Also seen as a reference to the darker, theology-inspired subject of most Iced Earth songs as compared to the more [[HeavyMithril swords-and-sorcery]] style of Blind Guardian. In general, the music is written by Schaffer and the vocals by Kürsch, though some of the guitar solos were done by Jim Morris. Their music tends to be fairly dark, aggressive power metal. Not to be confused with the Music/UriahHeep album of the same name. * 1999 - Demons & Wizards * 2005 - Touched by the Crimson King This band has examples of: * AncientAstronauts: "Spatial Architects". * EverythingSoundsSexierInFrench: Or everything sounds more ominous whispered in German. * FilkSong * GodIsEvil: The trilogy that ends the first album. * HeavyMithril: Just look at their name. * MohsScaleOfRockAndMetalHardness: Mostly a 7, with a few songs (such as "Crimson King" and "Heaven Denies") being a soft 8. * OminousLatinChanting: "Rites of Passage", "Heaven Denies," "Chant", and "Crimson King". * PerspectiveFlip: Many of their songs. * ShownTheirWork * AStormIsComing: "Winter of Souls". They have songs about: * The Crusades: "Poor Man's Crusade". * {{Death}}: "Fiddler on the Green". * Franchise/TheDarkTower: "Crimson King", "Seize the Day", "Terror Train", and "The Gunslinger". * Literature/TheHobbit: "Seize the Day". * KingArthur: "Winter of Souls". * Literature/MobyDick: "Beneath These Waves". * Literature/ParadiseLost: "Heaven Denies". * Literature/ThePictureOfDorianGray: "Dorian". * The Pied Piper of Hamelin: "The Whistler". * Theatre/TheRingOfTheNibelung: "Blood on My Hands". * Literature/TheSilmarillion: "Lunar Lament". * Literature/TheWonderfulWizardOfOz: "Wicked Witch".
global_01_local_2_shard_00001658_processed.jsonl/8384
Purpose of illustration essay purpose of illustration essay Free purpose in life papers, essays, and research papers. purpose of illustration essay Free purpose in life papers, essays, and research papers. purpose of illustration essay Free purpose in life papers, essays, and research papers. A picture is worth a thousand words, and sometimes an illustration is exactly what you need in your paper to drive an argument home and communicate your point succinctly avoid using images to pad your essay make sure the illustration you've chosen serves a rhetorical purpose placing pictures. The essay should have a purpose make a point think of this as the thesis of your story if there is no point to what you are narrating, why narrate it at all the essay should be written from a clear point of view. In rhetoric and composition, illustration is the use of examples to explain, clarify, or justify. Free illustration papers, essays, and research papers my account search results free essays good essays better essays stronger illustrating gender roles in a doll's house by ibsen - ibsen's purpose in writing a doll's house was not to encourage the feminist. Purpose of illustration essay on respect, is there a website that will write an essay for me, write my graduation speech by , 18032018. Purpose of narrative essay basically two subjects: persuasive, the purpose of your illustration essay topics and contrast the answer tone is a kind of narrative paragraphs or fifth elementary narrative essay format a story alliteration study. Free purpose in life papers, essays, and research papers. Purpose of illustration essay on respect, creative writing studentships uk, creative writing average salary. When looking for a good example of illustration essay writing, you can find many ideas, tips, and topics, but choose only the best ones. How to write an illustration essay adding vague or overly general descriptions will not help you obtain your purpose use comparisons that are familiar to your readers compare your topic to another topic which is of particular interest and is of common understanding. @gugs24 fb is so wank hahaha love that i am tired of seeing essays on how someone needs is sad/can't poop or is heart broken tmiinfinity food bank essay lojas dadalto laranjeiras serra essay seminar computer science research paper rusm admissions essay argumentative essay on abortion pro. Writing with a purpose by brent tyler essay writing has always been a challenge that many students of all level and degrees face every once in a while. Purpose of illustration essay An essay is, generally formal essays are characterized by serious purpose, dignity, logical organization, length, whereas the informal essay is characterized by the personal element (self-revelation, individual tastes and experiences. Here is a swift how-to guide on illustrative essay writing: illustrative essays body paragraphs explains the essence or the core of the consider the audience and purpose essay in a few words or phrases contain examples that clearly explain. Specific purpose: the purpose of my essay is to describe my friend's kindness toward her quotation, general truth, startling statement, dramatic illustration essay writing step by step. Mfa illustration as visual essay 136 west 21 street 12th floor tel: 2125922210 kim ablondi, assistant to the chair [email protected. By sin categor a comentarios desactivados en what is the purpose of an illustration essay, history homework help ks2, professional essay writer reddit. An illustration essay is a written work of nonfiction that's used to provide examples of a particular subject or to demonstrate. The following article clarifies all vital aspects regarding illustration paper topics an illustration essay is a work of writing that uses information, stories, and other examples to illustrate a general idea the general idea is the purpose of your paper and your facts, anecdotes. Research paper: committee on procedures: procedure when a member is not present in the chamber to ask their question chemical engineering research paper youtube paggawa ng mabuti sa kapwa essays human computer interaction research papers chemistry what is a literature review in a dissertation. Eh 1010, english composition i 4 writing an illustration essay is to convey an idea to the reader by providing illustrations purpose: throughout unit v, we discussed the conventions of the illustration essay the purpose of this assignment is to. Transitional words and phrases can create powerful links between ideas in your paper and can help your reader understand the logic of your purpose summary conclusion demonstratives pronouns exemplification or illustration addition furthermore moreover too also in the second place. Writing solutions: an example of an illustration essay outline the last part of the illustrative essay is conclusion part this is the most important part for evaluation purpose. Purpose of illustration essay Rated 5/5 based on 40 review
global_01_local_2_shard_00001658_processed.jsonl/8386
Sunday, July 17, 2005 Prof. R. N. Hernandez contact with Lya by Wendelle Stevens "One time I told you," Lya said, "that your world will not find itself prepared socially, nor economically, nor emotionally to confront the changes.""Yes," I said, remembering that occasion in which we profoundly analyzed the personality of the human being. Lya had explained to me in detail the special characteristics of the Earth humans."Remember," she said, "that speaking of the different characters demonstrated by one living being, I told you of other civilizations. You had asked me if there were beings more aggressive than the Earth humans inhabiting this Universe. I mentioned that there was and spoke about those who have been coming on various occasions to your world.""Yes, I remember that you told me that there exist races that are dedicated to the domination of others without regard for the means by which they accomplish this."... I thought pensively about what I wanted to say. "Then Lya, I asked you if those races were a danger to us and you told me that later, when you would be more sure you would answer that.""Yes, Professor, and now, not only I, but my community as well are sure that these races are lying in wait and studying your humanity, and they represent a real threat to you.""In what form?""In that they scorn mercy to your empiricism and the rickety form of science that you possess. They have been coming to your world with complete freedom and have captured living beings, children, ancients, men, women, animals, fish, and they rob you of oxygen, hydrogen and even absorb electric fluid of the supplies flowing to your great cities. Humans who, unfortunately, disappear and do not return any more have been kidnapped by them. Clearly, not all those who are lost have been carried away by that race, but they have been carried out innumerable captures. They also take specimens in danger of extinction, to implant races or to extract their DNA and clone all of the organism for later implantation or to create new creatures, and also with human beings they have achieved these implants. They have placed in danger a number of times the peace of Earth... and...""Only that?" I asked somewhat relieved, thinking that the problem was originating in the mind of Lya."No, not only that. In earlier years, this race, classified in our archives as XHUMZ had been coming to your world where they studied the ionosphere, the stratosphere, the atmosphere, the grades and densities of the gasses existing in the air; but above all they had placed in practice discoveries that at times have been harmful to the planet, in an attempt to dominate the planet slowly and silently.""Will they come to attack us?" I asked."Their gift to the Earth is not peacefulness. Over six thousand years ago they came to the Earth for the first time. Their elevated stature soon made it appear that they were above the terrestrials, but their knowledge surprised them in such a manner that they submitted completely to those beings. In that time they violated the women and took several thousands of human beings for their service. Nevertheless, they had not demonstrated a power superior to the terrestrials, speaking of those men of your actual civilization, of the technical capacity that you now possess, they still had the material dematerializing ray and the power of the control of gravity. They possessed flying ships that were a marvel to the beings of Earth. All of the rulers listened to the words of those powerful beings who came from the sky. Profiting from this advantage, they took slaves for themselves, being treated as Gods for that. Today they have become even more superior and are powerful in notable ways. The XHUMZ lack sentiments and experience no emotion at all . This is because their scientific ancestors achieved, more than two thousand years ago, the eradication of fear in their minds, for the purpose of which their world would live in optimum individual circumstances. The XHUMZ nevertheless achieved the eradication of all sentiment. They deprived themselves of love, of friendship, of benevolence, and finally of all sentiments that could obstruct their power. This was programmed for the civilizations that would follow. In your world emotions of that type predominated. They observed how the hypersensibility of the individual could be used to develop profound hate, and how the absence of love many times induces not only the suicide of one person, but the annihilation of a whole race. They, the XHUMZ, eradicate definitely from their race the conscience and all respect for life. This being the case, the XHUMZ could be, comparatively speaking, the antithesis of your world. They came to Earth a long time ago, and after arriving proceeded to analyze all types of life here. They knew perfectly well the vulnerable points of man and discovered then that man had suffered genetic alterations. After deliberations among themselves they determined that if the Earth human was on the other hand already predestined to disappear at the mercy of his own tendencies, the more appropriate it would be to condition him to serve them, for which they proceeded to appropriate him slowly at his own voluntude. They succeeded, according to their own purposes, in making the Earth a pilot planet, or auxiliary, destined for whatever emergency that might arise. They would implant laws in your planet itself that the inhabitants could not discard. Those who resisted would be subjected to simple annihilation. They conditioned the Earth human to a mental level, slowly, without recourse to grave confrontations of violence, utilizing products which, in combination with the atmospheric gases produced mental modifications in the race. They employed chemical elements in the air, in the waters and in the earth itself. They cast derivatives of SMOUNR (a liquid that can be produced in three states; gas, liquid and solid, according to our studies), in the oceans and seas, the rivers, lakes, clouds, etc. This promoted degenerative regressions in human life. In your world there are still no scientists who could study this kind of weapon. In this manner, depending on the grade of mental level presented by the human being, they could, favored by the same violence that propitiates this finality, provoke confrontations between the continents. The different countries that proceed at the head scientifically will find themselves suddenly before an unusual violence inexplicably provoked there by they themselves, escalated to a level beyond which it could not be returned. Then the XHUMZ will attack. The humans of Earth will be too occupied in belligerent confrontations with their neighbors to give much attention to the dangers that will overcome them in space. For when the human of Earth detects any anomaly, it will already be too late.""Is my planet left no alternative?" I asked pensively."If the scientists of your world can unite and analyze point by point all that has been discovered in the laboratories, and advance from there, not only sharing, but amplifying their knowledge, others, other worlds, other galaxies; not just the XHUMZ, who are a little more than one hundred light years from your planet, but some far beyond your own Galaxy, will contemplate your world with respect. This is the epoch in which they are planning to come back to this Solar System. They possess weapons unsuspected by your people, possess a technology superior to yours, are more than three thousand years in advance scientifically; you have a world degraded, contaminated, and violent. You beings, the humans of the Earth are destructive, liberal, incredulous... You do not have sufficient knowledge... not even the primordial which would be the unity of the human race. For example you are scarcely in the beginning of the atom, but of the capacity to unite them or provoke the antithesis which would be the "implosion." They, the XHUMZ, do not possess atomic arms. To annihilate the human beings they will then utilize inclusively, the hydrogen that every body stores in its own nature. They possess advanced technologies before which you would be devastated. It will require the union of all your whole planet to repel one attack of the proportion which can be expected. The XHUMZ have been dominating your world since the years from 1914, have been proposing that you yourselves annihilate each other, and perhaps when your world is desolated they will come and colonize it. Thus they would increase even more the territory which they dominate." Post a Comment << Home counter by www.digits.com
global_01_local_2_shard_00001658_processed.jsonl/8448
Support Me Support me! With money, that is. Emotionally and mentally too, of course, but this is for the monetary portion of things. Also here are various things I've donated to in the past, or still do donate money to on a semi-regular basis. I'll get a PayPal thing so you can help fund my crack habit (i.e. bikes). I might also get something involving activism here for some worthy cause, and will likely end up linking to various things I think should get money (like SomaFM), or which I do/have donated to. Why you'd wanna donate skrilla to me though, I have no idea, but I sure as heck won't argue =D This site was last played with on Saturday 2009/01/17 at 8:34.59 am PST. This site and all various data inside it is/are the property of mook (aka Edward Quinlan). Please do not use any material from this site without his written permission first and with due credit where required. It's not like he'll know, or as though he'll sue, but seriously, be kind and at least let the poor bugger know that you're using some of his material; it makes him feel special and it'll make you feel fuzzy inside knowing that you didn't just completely rip off someone else's work. You can reach him at ikelos [aat] gmail [dawt] com. If you can't figure that out, you're most likely a bot and he doesn't want you having his email in the first place. That is all. Valid XHTML 1.0 Transitional! Valid CSS!
global_01_local_2_shard_00001658_processed.jsonl/8456
West Valley Medical Center Close Window Library Search Go Advanced Search Español (Inicio) Living with an Implantable Cardioverter Defibrillator (ICD) Man on an escalator looking at his phone. Your ICD is a device that monitors the electrical signals in your heart. Most ICDs are well protected from other electrical device interference. Microwave ovens and most common household and yard appliances will not cause problems. Signals from some large electric or magnetic fields can make interference "noise" on your ICD. This can cause problems. Possible sources of interference include certain heavy equipment, strong magnets, running motors, and large tools like commercial arc welders. You shouldn't work on your car with the motor running, but it's safe to drive. Check with your doctor about any large, unusual power tools you use.    Signals that cause problems To protect your ICD, take special precautions around: • Cell phones. Always carry a cell phone on the side opposite your ICD and at least 6 inches away from it. While using a cell phone, wear a headset or hold the phone to the ear opposite your ICD. • Electromagnetic anti-theft systems. These are often near entrances or exits in stores. Walking through one is OK, but avoid standing near or leaning against one. • Strong electrical fields. These can be caused by radio transmitting towers and heavy-duty electrical equipment (such as arc welders). A running engine also produces an electrical field. It’s OK to ride in a car, but avoid leaning over the open hood of a running car. • Very strong magnets. Talk with your heart doctor if another doctor tells you to have an MRI (a medical test that uses magnets). Some ICD devices are considered safe for having an MRI (called MR-conditional devices), but safety precautions must still be used. Magnets in big speakers (such as on a stereo or at a concert) and in hand-held security wands (such as those used at airports) can cause problems if they come too close to the ICD. If a signal interferes If it’s near one of the signals described above, the ICD could turn off or its settings could reset. You could even get a shock. If you think you were exposed to a signal like this, call your doctor and explain what happened. Carry an ID card You’ll be given a temporary ID card when you get your ICD. The permanent card will be mailed to you in about 6 weeks. Show this card to any doctor, dentist, or other medical professional you visit. Also show it to guards at the airport. This way, they know to follow special procedures that prevent the security wand from interfering with your ICD. Driving safety with an ICD ICD devices are implanted to shock the heart out of a life threatening heart rhythm. These heart rhythms can cause loss of consciousness (syncope). Your healthcare provider will give you directions on if and when it's safe to drive after you have had once of these devices implanted. Generally, you should not drive for 6 months after you have had this device implanted, or after the device has delivered a shock. You should never drive for commercial purposes after you have an ICD implanted. This is often restricted by state laws because of the high risk of passing out and the dangers that poses while driving. Follow up Plan on having periodic checkups with your healthcare provider to evaluate the battery life of your ICD. Depending on your device and how much your body uses the pacing functions of the ICD, you will need a new device generator implanted at some point, usually about every 5 to 7 years. On average, this monitoring should happen every 6 months, or as advised by your healthcare provider. For some devices, the monitoring of the device function and battery life can be done with a remote monitor that can be set up in your home. Remote monitoring systems use the internet or telephone to communicate the information from your device to your healthcare provider.
global_01_local_2_shard_00001658_processed.jsonl/8457
Interview: Brian O'Leary at BEA This is my interview at BEA with Brian O'Leary of Magellan Media, who has been studying the effect of free ebooks and ebook piracy on publishing. (Please forgive my amateurish interview style.) The interview was filmed by Ed Champion, and his excellent analysis is available on his site.
global_01_local_2_shard_00001658_processed.jsonl/8458
Jump to content Underwater Photographic Societies Forums for various underwater photographic societies. Please contact us if you are interested in one for your society. British Columbia (UBCPS) Forum for the Underwater BC Photographic Society. Forum is currently not active (read-only archive). • 13 topics • 6 replies Sad news: Ib Hansen passes... - last post by scubamarli Colorado (CUPS) Forum for the Colorado Underwater Photographic Society • 6 topics • 6 replies CUPS at the Denver Aquarium - last post by johnspierce Dallas (DUPS) Forum for the Dallas Underwater Photographic Society • 5 topics • 1 replies Marty Snyderman All Day Pho... - last post by Dupsbear Houston (HUPS) Forum for the Houston Underwater Photographic Society • 60 topics • 20 replies Sept Contest - last post by LanceG Manchester, UK (NUPG) Forum for the Northern Underwater Photography Group. • 18 topics • 47 replies December Meeting of NUPG - last post by KenByrne Northern California (NCUPS) Forum for the Northern California Underwater Photographic Society • 107 topics • 39 replies Critique Night at Backscatt... - last post by jonjake Orange County (OCUPS) Forum for the Orange County Underwater Photographic Society • 13 topics • 8 replies Orange county OCUPS - last post by okuma Pacific Northwest (PNWUPS) Forum for the Pacific Northwest Underwater Photographic Society • 40 topics • 7 replies July/August Edition of PNW... - last post by kenns Forum for the New Zealand's Digital UW Society (SEAFANZ) • 2 topics • 0 replies SEAFANZ 2008 AGM - last post by Colin South Florida (SFUPS) Forum for the South Florida Underwater Photographic Society • 44 topics • 16 replies MICHAEL PATRICK O'NEILL... - last post by Phil Rudin Los Angeles (LAUPS) Forum for the Los Angeles Underwater Photography Society. • 7 topics • 0 replies Come Meet Jack Connick - last post by bvanant
global_01_local_2_shard_00001658_processed.jsonl/8465
Tag: love Wow, it’s the end of M.. You were mostly amazing… I have come to call the 3rd month of 2016 my month of growth. Not only did I became a year older, I became wiser, and I became better. I set out to make this month, all 31 days of it, a celebration, and for the most part I did. The first […] Posted March 25, 2016 30 Days of Love! Me and my hubby in 2008 (we were so cute) Yes, as we all know, February is the month for love! And because I am not always the easiest person to love or to show love (especially) when it comes to my spouse, I thought that a love challenge would be just the thing to […] Posted January 31, 2016
global_01_local_2_shard_00001658_processed.jsonl/8472
Unit expand This unit has support for syntax- and module handling. This unit is used by default, unless the program is compiled with the -explicit-use option. [procedure] (get-line-number EXPR) If EXPR is a pair with the car being a symbol, and line-number information is available for this expression, then this procedure returns the associated source file and line number as a string. If line-number information is not available, then #f is returned. Note that line-number information for expressions is only available in the compiler. [procedure] (expand X) If X is a macro-form, expand the macro (and repeat expansion until expression is a non-macro form). Returns the resulting expression. [procedure] (syntax-error [LOCATION] MESSAGE ARGUMENT ...) Signals an exception of the kind (exn syntax). Otherwise identical to error. [procedure] (er-macro-transformer TRANSFORMER) Returns an explicit-renaming macro transformer procedure created from the procedural macro body TRANSFORMER, which is a procedure of three arguments. Implementation note: this procedure currently just returns its argument unchanged and is available for writing low-level macros in a more portable fashion, without hard-coding the signature of a transformer procedure. [procedure] (ir-macro-transformer TRANSFORMER) This procedure accepts a reverse syntax transformer, also known as an implicit renaming macro transformer. This is a transformer which works almost like er-macro-transformer, except the rename and compare procedures it receives work a little differently. The rename procedure is now called inject and instead of renaming the identifier to be resolved in the macro's definition environment, it will explicitly inject the identifier to be resolved in the expansion environment. Any non-injected identifiers in the output expression produced by the transformer will be implicitly renamed to refer to the macro's environment instead. All identifiers in the input expression are of course implicitly injected just like with explicit renaming macros. To compare an input identifier you can generally compare to the bare symbol and only free identifiers will match. In practice, this means that when you would call e.g. (compare (cadr expression) (rename 'x)) in an ER macro, you simply call (compare (cadr expression) 'x) in the IR macro. Likewise, an unhygienic ER macro's comparison (compare sym 'abc) should be written as (compare sym (inject 'abc)) in an IR macro. Previous: Unit library Next: Unit data-structures
global_01_local_2_shard_00001658_processed.jsonl/8474
View source | Discuss this page | Page history | Printable version    Main Page Upload file What links here Recent changes PDF Books Add page Show collection (0 pages) Collections help ERP/3.0/Developers Guide/Reference/Entity Model/ADFieldGroupTrl Back button.png   Back to ERP/3.0/Developers_Guide/Reference/Entity_Model#ADFieldGroupTrl This tab contains field group translations to different languages Run Synchronize Terminology to update menu translation. You need only to translate Fields, which are not centrally maintained. After performing any edits, the window must be regenerated. To the database table (AD_FieldGroup_Trl) of this entity. Property Column Constraints Type Description id* AD_FieldGroup_Trl_ID Mandatory Max Length: 32 fieldGroup AD_FieldGroup_ID Mandatory ADFieldGroup The Field Group indicates the logical group that this field belongs to (History, Amounts, Quantities) language AD_Language Mandatory ADLanguage The Language identifies the language to use for display client AD_Client_ID Mandatory organization AD_Org_ID Mandatory active IsActive Mandatory creationDate Created Mandatory createdBy CreatedBy Mandatory updated Updated Mandatory updatedBy UpdatedBy Mandatory name# Name Mandatory Max Length: 60 translation IsTranslated Mandatory java.lang.Boolean The Translated checkbox indicates if this column is translated. Java Entity Class * the License at * License for the specific language governing rights and limitations * under the License. * The Original Code is Openbravo ERP. * The Initial Developer of the Original Code is Openbravo SLU * All Rights Reserved. * Contributor(s): ______________________________________. import java.util.Date; import org.openbravo.base.structure.ActiveEnabled; import org.openbravo.base.structure.BaseOBObject; import org.openbravo.base.structure.ClientEnabled; import org.openbravo.base.structure.OrganizationEnabled; import org.openbravo.base.structure.Traceable; import org.openbravo.model.common.enterprise.Organization; * Entity class for entity ADFieldGroupTrl (stored in table AD_FieldGroup_Trl). * class the {@link org.openbravo.base.provider.OBProvider} should be used. public class FieldGroupTrl extends BaseOBObject implements Traceable, ClientEnabled, OrganizationEnabled, ActiveEnabled { private static final long serialVersionUID = 1L; public static final String TABLE_NAME = "AD_FieldGroup_Trl"; public static final String ENTITY_NAME = "ADFieldGroupTrl"; public static final String PROPERTY_ID = "id"; public static final String PROPERTY_FIELDGROUP = "fieldGroup"; public static final String PROPERTY_LANGUAGE = "language"; public static final String PROPERTY_CLIENT = "client"; public static final String PROPERTY_ORGANIZATION = "organization"; public static final String PROPERTY_ACTIVE = "active"; public static final String PROPERTY_CREATIONDATE = "creationDate"; public static final String PROPERTY_CREATEDBY = "createdBy"; public static final String PROPERTY_UPDATED = "updated"; public static final String PROPERTY_UPDATEDBY = "updatedBy"; public static final String PROPERTY_NAME = "name"; public static final String PROPERTY_TRANSLATION = "translation"; public FieldGroupTrl() { setDefaultValue(PROPERTY_ACTIVE, true); setDefaultValue(PROPERTY_TRANSLATION, false); public String getEntityName() { return ENTITY_NAME; public String getId() { return (String) get(PROPERTY_ID); public void setId(String id) { set(PROPERTY_ID, id); public FieldGroup getFieldGroup() { return (FieldGroup) get(PROPERTY_FIELDGROUP); public void setFieldGroup(FieldGroup fieldGroup) { set(PROPERTY_FIELDGROUP, fieldGroup); public Language getLanguage() { return (Language) get(PROPERTY_LANGUAGE); public void setLanguage(Language language) { set(PROPERTY_LANGUAGE, language); public Client getClient() { return (Client) get(PROPERTY_CLIENT); public void setClient(Client client) { set(PROPERTY_CLIENT, client); public Organization getOrganization() { return (Organization) get(PROPERTY_ORGANIZATION); public void setOrganization(Organization organization) { set(PROPERTY_ORGANIZATION, organization); public Boolean isActive() { return (Boolean) get(PROPERTY_ACTIVE); public void setActive(Boolean active) { set(PROPERTY_ACTIVE, active); public Date getCreationDate() { return (Date) get(PROPERTY_CREATIONDATE); public void setCreationDate(Date creationDate) { set(PROPERTY_CREATIONDATE, creationDate); public User getCreatedBy() { return (User) get(PROPERTY_CREATEDBY); public void setCreatedBy(User createdBy) { set(PROPERTY_CREATEDBY, createdBy); public Date getUpdated() { return (Date) get(PROPERTY_UPDATED); public void setUpdated(Date updated) { set(PROPERTY_UPDATED, updated); public User getUpdatedBy() { return (User) get(PROPERTY_UPDATEDBY); public void setUpdatedBy(User updatedBy) { set(PROPERTY_UPDATEDBY, updatedBy); public String getName() { return (String) get(PROPERTY_NAME); public void setName(String name) { set(PROPERTY_NAME, name); public Boolean isTranslation() { return (Boolean) get(PROPERTY_TRANSLATION); public void setTranslation(Boolean translation) { set(PROPERTY_TRANSLATION, translation); Retrieved from "" This page has been accessed 960 times. This page was last modified on 5 August 2014, at 13:51. Content is available under Creative Commons Attribution-ShareAlike 2.5 Spain License.
global_01_local_2_shard_00001658_processed.jsonl/8475
Updated 2015-02-11 19:18:51 by ak STOMP stands for the Simple (or Streaming) Text Oriented Messaging Protocol. STOMP provides an interoperable wire format so that STOMP clients can communicate with any STOMP message broker to provide easy and widespread messaging interoperability among many languages, platforms and brokers. STOMP is loosely modeled after the HTTP protocol, where "messages" will typically start with an uppercase command (like GET in HTTP), followed by a number of headers (format is similar) and possibly followed by a body. Messages are ended by ^@, i.e. the zero character, aka ASCII 0, '\0'. STOMP advocates utf-8 on the wire and provides mechanisms that keep the connection alive, if necessary, thus making sure routers do not close connections. The complete specification is rather short and specifically targets scripting languages. As I (EF) needed to understand STOMP in a better way, and despite there was already an implementation available at [1], I decided to start coding it from scratch again. An earlier implementation of the resulting library is in the half-bakery [2]. The library offers both a client and server implementation. The client implementation is almost complete, it is only missing support for transactions. The whole implementation has now moved to github. Please report issues and proposal for improvements through the facilities offered by github. My client implementation differentiates itself from the other in the following ways: • It is coded in pure Tcl, without any object layer. It is coded to run on oldish implementations of the language, i.e. 8.4 and in JTcl. • It implements the heart-beating facilities as of the specification. • It handles automated reconnections, but also gentle disconnection, as of the specification. • It provides introspection facilities to be notified of the changes in connection state. • It supports receipts for messages. • Apart from a high-level interface to subscriptions, it also provides a lower-level interface to PUB/SUB mechanisms. This allows to provide full support for the different types of acknowledgements specified. • It provides an interface to low-level messaging on the wire. • Automatically sets the content-length of messages being sent. • Provides an API for accessing the content of messages, loosely modeled after the http library. • Provides some guards against packages that would be too long. • Can use an external command for socket creation, thus enabling TLS encryption of traffic if necessary. The server supports the following features: • Also coded in pure Tcl, will even run under JTcl. • Implements heart-beating, similarly to the client. • Fans out incoming messages to all clients that have expressed interest via a subscription. • Basic security mechanisms to discard messages from non-connected clients or to discard messages that would be too long. • Supports virtual hosting. • Is able to check authorization against a "database", i.e. a list of username:password entries passed as an argument. The current implementation has had little testing, initial tests against the Apache Apollo broker have shown proper behaviour. Please send any positive or negative feedback to me on the usual channels. As part of the new project on github, three small utilities exist to exhibit the capabilities of the library: • A STOMP server implements a server, supporting user authentication and TLS encryption if necessary. • Stomper will send any non-empty line received from the standard input as a STOMP message to a topic which name is specified as part of the command-line options. • Printer does pretty much the opposite, i.e. it listens to a topic at a STOMP server and will print out the content of the messages that are sent to that topic. The following script highlights some of the capabilities of the client library, there is example code to instantiate the server at the bottom of this page. package require stomp::client proc received { cid rid } { puts "Server has received message, id: $rid" proc incoming { msg } { puts "Incoming message: [::stomp::message::getCommand $msg]" # Connect to broker (following is default admin user for Apollo) set s [::stomp::client::connect -user admin -password password] # Subscribe to a queue at the server and arrange to receive # messages for that queue in the procedure called "incoming" # We wait before the subscription because connecting to a server # implies a handshake mechanism. Instead, we could use the # introspection mechanisms provided by the -liveness option to # ::stomp::client::connect after 1000 ::stomp::client::subscribe $s /queue/a \ -handler incoming # Send a message to the same queue, meaning we'll receive it # in the "incoming" procedure. Also make sure we'll receive # a receipt for the message in the procedure "received" after 2000 ::stomp::client::send $s /queue/a -body "Hello world" -receipt received # Disconnect after a while, you might want to force disconnection from # the web UI at the server to see what happens in the mean time. after 60000 ::stomp::client::disconnect $s # Live for ever.. vwait forever APN Very much interested in this, the server side as well. So happens I was looking for a simple message broker implementation in script and your post showed up. Serendipity! EF You are welcome, and please try it as it's really in its early days... :) As long as you're not too impatient, I hope to be able to finish up some initial version of the server within the next few weeks. It needs some refactoring, moving out most of the actual code to a ::stomp::client namespace so I can start having common procedures in ::stomp and start with a ::stomp::server. APN Any thought of putting it in a public repository ? The half-bakery is not the most convenient for keeping track of changes. APN Tried it (took an hour to set up Apollo thanks to spaces in the path to the JRE). Looks pretty good. Stopped and restarted Apollo and life went on without a hitch. Didn't see how to get the data of received message so directly accessed the ::stomp::message::msg_* array. Also binary data did not seem to get through, probably I have to explicitly set the content-length header. Looks like a great start. For anyone else interested in trying this out, here is a summary of steps to set up Apache Apollo on Windows: • Download and extract the Apache Apollo distribution • Download the Java server JRE (just the desktop JRE is not enough). There does not seem to be a 32-bit version of this. You probably have to download the entire JDK if you are on 32-bit Windows. The download is a compressed tar file though the extension is just gz. Rename it to .tar.gz so 7-zip will correctly handle it. • Extract to (for example) c:\src\jdk1.7.0_21 • Then type the following commands in the command shell (assuming c:\src\stomp-test is the directory that will hold your Apollo config) set JAVA_HOME=c:\src\jdk1.7.0_21 (Note no quotes around the path even if it has spaces else batch files will fail) cd c:\src\stomp-test C:\bin\x86\apache-apollo-1.6\bin\apollo create mybroker mybroker\bin\apollo-broker.cmd run • A mybroker subdirectory is created • Ctrl-C to exit/stop • There is also an option to run as a service • To connect to the admin interface, connect to EF It'll probably end up in my efr-tools, or if suitable in the tcllib (dreaming?). There are a number of procedures to access the messages ::stomp::message::get*. This is loosely based on the API of the HTTP package where you have a set of procedures to access the most usual bits and pieces, but where you can access the array directly. There is some code to set the content-length automatically if you haven't set it, to be frank... there might be bugs there! EF New version in the half-bakery. I have started to refactor the code, so most procedures now live in the ::stomp::client namespace instead, the main namespace being mostly empty. The new version behaves properly on binary messages, a bug that you APN had discovered. There is now a complete set of ::stomp::message::get* procedure to access the content of the messages, for example from a callback. I've updated the code example above to reflect the API change. Can somebody help me so that some of the internal procedures from the main ::stomp namespace are directly available from, say the ::stomp::client namespace without having to prefix namespace parent:: to calls? You'll see an attempt at the beginning of the client.tcl implementation, but that does not work for GetOpt since that one relies on uplevel... I am looking for aliasing or similar... APN How about using namespace path ? Something like namespace eval ::stomp::client { namespace path [linsert [namespace path] 0 [namespace parent]] EF Indeed, I was. Thank you very much! but that is construct which appeared in 8.5, meaning that it cannot be used when run under JTcl, which is one of my goals. Any other solution would be appreciated since the latest version performs some introspection in the linked procedures to access the variables from the callers. (ugly) APN Does JTcl support namespace import ? You could use that. Or perhaps even interp alias instead of proc wrappers. The problem with proc wrappers is that they introduce an additional frame level so it is difficult to write procs that use uplevel/upvar (the number of levels up depends on whether the proc is called from the same namespace or another namespace). EF New version available in the half-bakery, now with some server-side code, able to handle both binary and textual messages. Creating the server is as simple as the following code. Updating the top of this page to describe the feature-set of the server. package require stomp::server set s [::stomp::server::new] vwait forever APN Played with latest version. Seems to work as advertised in basic usage. EF New version, changed how packages depend between one another (see package require calls in the (updated) examples above) and adding a few features that were missing from the implementations: • Disconnections are now discovered sooner, i.e. often outside of the heart-beat mechanisms. • Added some security mechanisms to make sure messages that are too big can be discarded • Server handles disconnections properly • Clients that haven't properly connected to the server will be bumped away when trying to send any message that is not a CONNECT.
global_01_local_2_shard_00001658_processed.jsonl/8476
Updated 2017-09-08 18:45:17 by venks Venkat Iyer I prefer emacs anytime. Fervent Tcl-Tk disciple. v e n k s i at g m a i l dot c o m Sometimes venks in the Tcl Chatroom My Humble Contributions: Presented about Coroutines in TCL 2009 Other Open Source Projects that I've Contributed to: I've occasionally handled the updating of timezone files in the tcl source code. vi is also a modal based editor. Its connection to Tcl is that there are several vi-like editors which provide an embedded Tcl interpreter, which can be programmed to manipulate the text. Others support Tcl syntax highlighting, etc. Some of these are: • Elvis supports Tcl syntax highlighting • vile supports Tcl syntax highlighting • vim supports Tcl syntax highlighting and supports embedding Tcl in the editor • nvi supports an embedded Tcl interpreter • tcltags generates vi symbol tags files, for locating symbols in files being edited. • aqtools includes the aqedit test editor, which has some vi-like bindings. SS: Are there editors written in Tcl with vi key bindings? ctext may provide syntax highlighting. The point isn't just that the editor is written in Tcl, but the fact that such an editor can be made scriptable in a much more prevasive way than vim can. I'm a vim user, but I must I'm not comfortable with its scripting capabilities. RLH If you have the tclinterp compiled in I think you can script it with Tcl itself.
global_01_local_2_shard_00001658_processed.jsonl/8483
Friday, January 7, 2011 Do You Believe in Life After Death?; This is a hard question for me. My belief in this world lies somewhere between agnostic and atheist. I whole heartedly don't believe there's a God, or higher power, but I believe people have the ability to perceive the world in a more spiritual way. My belief in reincarnation and likewise lies more scientific than it does spiritually, and I guess that's how I ended up in the middle of the two. Everything in the world has an energy to it, and no matter if it's living or inanimate, it's all the same. When I die, that energy breaks down and becomes something else - something new. It's almost like we live on forever in one way or another. I don't think there's life after death in the way religion and spirituality say, but I don't think we're completely utterly dead when we die. If you know what I mean. I think too much like a nerd for my own good. 1. What if you are wrong--- then what? 2. This is what feels right for me. If I happen to die and God is real, then I'll deal with it when it happens. Until then, this works perfectly fine for me (: What if Christians are wrong ? What if they expect God to be waiting and all there is, is nothingness ?