id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_2_shard_00001658_processed.jsonl/9897
Sentence Examples • Towards its northern end the ridge widens and rises to the plateau of the Azores, and in about 50° N. • Newfoundland, the West Indies, and the Falklands, and the chief oceanic islands are the Azores, Madeira, the Canaries, the Cape Verde Islands, Ascension, St Helena, Tristan da Cunha and Bouvet Island. • Their missionaries were received at the court of Akbar, and Benedict Goes, a native of the Azores, was despatched on a journey overland from Agra to China.
global_01_local_2_shard_00001658_processed.jsonl/9902
Chris Stassen ([email protected]) Mon, 13 Jul 1998 15:47:33 -0400 Paul Lyon asked: >> 1. What is the trend of observed C14/C12 ratios during the last >> 50 to 80 years? (i.e. is it increasing or decreasing) Decreasing. According to Figure 22.4 on p. 392 of Faure's _Principles of Isotope Geology_ (2nd ed.) [1], the 14C/12C ratio was about 2% higher in 1900 than it is today. The recent decrease (since about 1900) is known as the Suess Effect. It is believed to be due to the burning of fossil fuels, which release a large amount of "dead" carbon into the atmosphere. [1] Faure's reference for the data is: Lerman, J.C., et al., 1970. "C14 in tree rings from different localities" in I.U. Olsson, Ed., _Radiocarbon Variations and Absolute Chronology_ pp. 275-299. >> 2. Is there proof that the C14/C12 ratio has ever, in history, been >> higher than it is today? (Published information indicates that >> C14/C12 ratios fluctuate + or - 10 to 15% over time) Yes, see above. >> 3. Is there an established and verified trend of the C14/C12 ratio over >> the last 6000 years? (i.e. has C14/C12 ratio been constant over this >> time frame with fluctuations about the norm and does the norm have a >> slope?) Generally decreasing. See for example Figure 14.9 in Dickin's _Radiogenic Isotope Geology_ ([2]). These fluctuations conform quite closely to expected fluctations in production rate due to fluctuations in the Earth's magnetic field. See for example Figure 14.7 in Dickin ([3]). [2] Dickin's reference for long-term 14C levels: Bruns, M., et al., 1983. "The atmospheric 14C level in the 7th millenium BC." in _Physical and Chemical Techniques in Archaeology_ vol. 8, pp. 511-516. [3] Dickin's reference for 14C levels vs. expectations derived from magnetic field changes: Bucha, V., and E. Neustupny, 1967. "Changes in the Earth's magnetic field and and radiocarbon dating" in _Nature_ vol. 215, pp. 261-263. >> 4. What is the period if the C14/C12 fluctuation cycle and what does >> it look like? (i.e how long does it take to go from high to low >> to high concentration and does it follow a sinusoid or other pattern?) It does not appear to follow a regular pattern (and given all of the variables that can impact production rate, it would not be reasonably expected to do so). -- Chris (
global_01_local_2_shard_00001658_processed.jsonl/9912
God of War 3 - Chaos Mode #2, Realm of Hades 1 year ago Team Xplore's picture _______*CONTENT WARNING*_______ God of War 3 is a video game that contains graphic scenes of violence and nudity. Do not watch if you are sensitive to such images. The purpose of this video is to demonstrate a successful playthrough on the game's hardest mode (Chaos Mode) and not to shock or offend any person or group. GoW 3 Playlist: https://www.youtube.com/playlist?list=PLwjp3w_QcYD555ATrXoA013ORQHweSYg- Add comment Log in or register to post comments Explore All Categories
global_01_local_2_shard_00001658_processed.jsonl/9948
April 9th, 2009 Show Clifton and Glen discussed the irony of FIAT buying Chrysler using 2 billion that they got from a failed deal with GM, and another 10 billion from the US government. Why it’s a crazy world with the Obama administration firing the head of GM and essentially taking ownership of the second largest corporation in the world. Clifton made a prediction and will now be put into writing. His prediction is that the city of Farmington will not, at the end of the day, install red light cameras. Economics from either the red light camera supplier or the city will determine that the proposal will not make enough money to survive (as long as the city does not adjust light timing). Segways, PUMAs, pirates and Cliftons joke about why he was concerned when Obama was out of the country… “Who is running GM when Obama is overseas?” Rounded out the show. 4CCT hour 1 4CCT hour 2 Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/9961
Tim Gavin, CPA I provide audit, assurance, and consulting services to the public sector and not-for-profit organizations in the Chicagoland area. Homepage: https://acctgtech.wordpress.com Excel/Windows: Change default date display format By default, the “short date” display format for Windows (and thus Excel) is “M/d/yyyy.” For example, June 1, 2011 would be displayed as 6/1/2011. For varying reasons, you may want to zero-fill your dates and have June 1, 2011 read as 06/01/2011. Doing this actually involves a Windows setting, not an Excel setting. So, be prepared to have your dates displayed accordingly across the whole operating system and many other programs. To change the default date format in Windows: 1. Go to Start –> Control Panel and select “Regional Settings” or “Region and Language,” depending on your operating system. 2. In the Short date format list, select the desired format: 3. Click OK. Now, unless the dates in Excel were formatted using the format menu, they should now display as you’ve defined them. Excel: Just one sheet by default, please Why do I need three worksheets automatically generated when I create a new workbook? I don’t. I see so many workbooks with “Sheet1” full of data while “Sheet2” and “Sheet3” are sitting there sad and empty. As an auditor, I need to spend my precious minutes checking those other two sheets just to make sure there is nothing I wouldn’t want in a locked-down audit file. Plus, creating a new sheet when needed is easy enough that Excel should really only give you one to start with. If you share my frustration, here is how to make Excel only provide one sheet by default: 1. Go to Office Button –> Excel Options. 2. Under popular, you should see an option for “Include this many sheets.” Change this to 1. Windows 7: Dual screen keyboard acrobatics keyboardI have become a huge fan of keyboard shortcuts as they seem to shave precious milliseconds off the time taken to perform certain tasks with the mouse. A colleague of mine shared with me some cool keyboard shortcuts for managing windows in a multiple monitor environment: • Windows Key + Left/Right Arrow:maximize the current window to the left/right pane of the screen • Windows Key + Left/Right Arrow (repeated):move the window to the other monitor • Windows Key + Shift + Left/Right Arrow:move the window to the other monitor (without an intermediary step) • Windows Key + Up Arrow:maximize the window to the full screen • Windows Key + Down Arrow: restore the window from being maximized/minimize the window This post at Technospot.net has a few more useful shortcuts in this category. Adobe Acrobat: Help! My client cannot see my annotations on a PDF file Newer Adobe Acrobat files do not often play nice with older versions of Acrobat. Sometimes you may receive a file, add annotations in Acrobat 8 or 9, save it, then send it to someone who is using Acrobat 6 who cannot see the changes you made. The workaround for this is to re-print the file to PDF. 1. Go to File -> Print… 2. Make sure to select “Document and Markups” as shown below: 3. Click OK. Why does this work? When you “save” a PDF file, it is saved as the version of the program you are using. When you “print” a PDF file, it is compatible with versions back to 5.0 (released in 2001). The only caveat is that your annotations are now hard-coded and therefore cannot be changed in the resulting file. Excel: Sort by cell color Note: Applicable to Excel 2007 or later Scenario: I have a spreadsheet of checks issued for the year. For each check, I need to determine if the disbursement was made for a fixed asset or not. As I go through each item and view the invoice, I shade the amount cell either green (fixed asset), yellow (missing invoice or question), or red (not a fixed asset). For example: After I have gone through this list, it would be nice to be able to sort by the colors I used. I know there are a thousand and one ways to accomplish this task without the use of colors, but I am a very visual person. The colors give me a good picture of the results of my work. 1. Select the region to sort. 2. On the Data ribbon, select “Sort.” 3. Choose the amount column (or whichever column contains the color-coding) to sort by. 4. Choose Cell Color to sort on. 5. Select the color you would like on top. 6. Add additional lines to specify the order of the remaining colors. 7. Click OK to complete the sort. My sort window looks like this: The result looks like this: CaseWare: Close a client file when the Document Manager is closed Closing a client file in CaseWare does not have to be a two-step process. If you would like the client file to close when you close the Document Manager, do this: 1. Go to: Tools -> Options 2. In the General section, check the box that says, “Close file when Document Manager is closed” 3. Click OK IDEA: Right-click on the data for quick filtering Side note: if you have not been made aware of the amazing, data-crunching power of IDEA, I highly recommend taking a look. Within a data file, you can quickly and easily create a filtered list using the right-click menu. Simply locate the particular data you want to use for your filter (in the screenshot below, an account number), and click “Display all records containing…” A dialog box will appear with several options. Here, you may do any of the following: • Edit the value used for the filter • For a numeric filter (for example, a dollar amount), you may change the “Operator” option to >, <, >=, <=, or <>to utilize the amount in different ways • By default, the operator is “==”, but that can be changed to “=” to shorten the value and expand the filter. For example, if I wanted the above filter to show all account numbers that begin with “111”, I would change the operator to “=” and shorten the value to “111”. • If there is already a filter criterion on the data file, you’ll have the option to select or deselect the “Add to current criteria” checkbox. This allows for multiple criteria to be implemented one step at a time. SS-2010.05.27-08.52.28Once the filter is applied, it will appear in the Properties section on the right side of the screen. Here, you can clear, edit, or copy the criteria. Also, if you initiate an extraction, export, or any other database operation, the criteria will automatically appear in the resulting dialog box. For more detail on entering criteria using equations, go to Help -> Contents -> Using the Equation Editor -> Building Equations. 1 Comment %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/9977
Dr. Ian Ferrar was wonderful! I have had on going shoulder and back pain and they were able to help me with just $10 co-pay. They first evaluated my posture and current pain and discomfort level. After getting my approval, they sat me in with a physical therapist. The therapist used an ultrasound machine as well as one with pulsating to break up the tissue.. After which the Dr. realigned my body. It was a great experience and I will be back again soon!!
global_01_local_2_shard_00001658_processed.jsonl/9987
[room 113a] dear juno’s grandmother April 28, 2016 Last week my class read Dear Juno by Soyung Pak. In this book, Juno receives a letter from his grandmother who lives in a small town outside of Seoul. The problem is that Juno doesn’t know how to read Korean. Juno, however, is very intuitive and figures out, based on the artifacts that grandmother sends (a dried flower and a picture of her and a cat) that grandmother must be growing new flowers and has a new pet cat. When his mom finally gets a chance to read him the book, Juno finds out that he had guessed correctly. From then on, Juno and grandmother start communicating through pictures, drawings, and other artifacts that they can send through the mail. In class, I decided to build on this idea. My class sent a package to Juno’s grandmother, too. We put artifacts that we find around school to represent different parts of our school day. The students each wrote about a sentence to explain each of the items and then we sealed it up to “send” to South Korea! I like sight words because it helps me read books. I like free choice because I play with bears. I like reading groups because I like to read books. I like math because I like numbers and math problem. I like writing because I like to write stories. I like to write the letters. I like SSR because I like reading by myself. One Response to “[room 113a] dear juno’s grandmother” 1. annalice said very creative!! i like it! Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/10006
The CIF-Southern Section Baseball Tournament continues May 29 with semifinal games, with two Catholic school teams remaining after quarterfinal games played May 25. Semifinal games will be played May 29, followed by finals June 1 and 2. Following are the results of quarterfinal play: Division 1: Bishop Amat d. Cypress 5-2. Semifinals: Bishop Amat vs. Foothill/Santa Ana. Division 2: Ruben S. Ayala d. Alemany 1-0. Division 3: La Salle d. Temescal Canyon 6-0. Semifinals: La Salle vs. Wilson/Long Beach. Division 6: Pomona d. Bishop Diego 10-1; Moreno Valley d. St. Bernard 1-0.
global_01_local_2_shard_00001658_processed.jsonl/10012
Astronomy Picture of the Day October 13, 1996 See Explanation. Clicking on the picture will download the highest resolution version available. The Earth Also Rises Credit: The Lunar Orbiter Project, NASA Explanation: The Lunar Orbiter 1 spacecraft was launched in 1966 to map the lunar surface in preparation for the Apollo moon landings. NASA's plucky robotic explorer performed its job well and pioneered this classic view of the Earth poised above the lunar horizon. The first humans to directly witness a similar scene were the Apollo 8 astronauts. As they orbited the Moon in December of 1968 they also recorded Earth rise in a photograph that was to become one of the most famous images in history - a moving portrait of our world from deep space. Tomorrow's picture: Bright Stars, Dim Galaxy NASA Technical Rep.: Sherri Calvo. Specific rights apply. A service of: LHEA at NASA/ GSFC
global_01_local_2_shard_00001658_processed.jsonl/10023
Mina Loy – Insel, 1937 m loy-richard oelze What am I to do with you? The Taxi metre is ticking, the surrealist’s waiting. Pull yourself together—quick! I’ll take you along. “However did you get that hole in your trousers, its new—” I demanded, detecting, as we got into the taxi, a perfect round of perforation letting out a tiny light from his thigh. I suspected him of replenishing his beggar’s capital. “It was there before,” said Insel sanctimoniously, as if referring to a halo earned by excessive martyrdom. “You might as well come up and see Ussif with me,” I suggested. “No,” said Insel, “none of the surrealists will have anything to do with me. They know only too well, if they did, I should try to borrow money.” “I should have thought you’d be worth a little money to a surrealist. He might learn what supereality is about—you are organically surreal—” “I don’t do it on purpose, said Insel dejected. “I know you don’t,” I assured him warmly. You only do Kafka on purpose—you’re so much better in the original. I kept my promise of going to his room on my way back. Strangely—the very name of the street he lived in had the sound of a ghostly exhaustion. His attic was on the seventh storey. Along the narrow open passage with its bare iron railing the Chambres de Bonnes moved past me as I looked for his name on the doors, when, coming to a closed iron shutter fleeced with dust and cobwebs growing in patches like a moss of soot or hanging in gray festoons about its slits, I felt the liveness of the air decrease, and “Insel” written in the archaic hand of some automatic writings drew up my eyes—. To that darkened crack which outlines the magical versatility of a barrier measuring a yard across and with merely the touch of a hand diminishing to a strip three inches wide. That cover of a living book whose history may come to an end before you can get it open; or cut short your personal adventure by remaining shut; out of this oblong outline of Entrance and Exit there leaked a perceptible seepage of Insel’s torpor. Noiselessly, indolently, the door vanished. I walked into its chasm and Insel led me to his painting set in the pacific light of a large attic window. Das ist die Irma?” he said with the secretive in-looking twinkle that lit up his eyes with recurrent delights. And suddenly it dawned upon me that one thing about this man that made him so different to other people was that contrary to our outrunning holding-up-the-mirror self- consciousness, his was constantly turning its back on the world and tiptoe with expectancy, peeping inquisitively into its own mischievous eyes. Or, in some cerebral acrobatic recoil, that being who is, in us, both outlooker and window, in him, astonishingly, was craning back to look in at the outlooking window of himself, as if there were something there he might forget, some treasure as to whose existence he wished to remain assured, some lovely illusion inside him, he must re-see to insure its continued projection. “Die Irma,” he repeated lovingly to introduce her to me, and the magnetic bond uniting her painted body to his emaciated stature—as if she were of an ectoplasm proceeding from him—was so apparent one felt as if one were surprising an insane liaison at almost too intimate a moment. He was glittering with a pleasure as dynamically compressed as the carbon of a diamond. A narrow canvas, nigger-black, whose quality of shining obscurity was the effect of minutely painting in oil on some tempera ground, die Irma stood knee—deep on an easel. To her livid brow, rounded like a half-moon, clung a peculiarly clammy algaeic or fungoid substitute for hair. Beneath it a transparent mask of horizontal shadow was penetrated by the eyes of an hypnosis; flat disks of smoked mirror, having the selfsame semblance of looking into and out of oneself as her creator. Perhaps in a superfine analysis, this is what all men really do, but as a natural interplay; whereas Insel and his picture were doing it with alternating intent. Indeed the great thin uninscribed coins of her gunmetal pupils, returning his fascinated gaze, were tilted at such an angle as to give a dimly illuminated reflection of an inner and outer darkness. Her hands, as if nailed to her hips like crossed swords, jutted out from her body which seemed to be composed of rippling lava that here and there hardened to indentations like holly leaves growing from her sternum—her male hands that hardly made a pair, for the one had the bones of the back marked all of equal length and the other, one finger too long with an unmodeled edge which curved like paper against the background. He hung over die Irma like a tall insect and outside the window in the rotten rose of an asphyxiated sunset the skeleton phallus of the Eiffel Tower reared in the distance as slim as himself. Beside the picture I noticed that the gutter of his upper lip was interrupted by a seam, a fine thread of flesh running from the base of the nose to his mouth that accentuated the compression of his lips in their continual retention of the one remaining tooth which, so thin as to be atavistic in an adult, was like a stump forgotten in a croquet ground, left over from the Game of Life. An incipience or reparation of harelip? And Irma? In this very same spot she puffed to a swollen convergence. “But Insel,” I asked, “her upper lip is about to burst with some inavowable disease. You have formed her of pus. Her body has already melted.” “Exactly,” he answered with mysterious satisfaction. “I don’t care for it,” I decided. “And I,” said Insel, with the reverent intonement with which he accompanied his tacitly implied admittance of myself to his holy-of-holies, “thought that this picture would be just the one that you would like.” Time hovered, suspended in the attic air as the powders of life in the noxious mist of the exhausted city below. When suddenly the soporific lure he sowed in his magnetic field—shattered. Insel was snatching at the emptied flesh on his face in the recurrent anxiety inspiring his wilder gestures. “She ought not to be,” he cried out, “if you don’t like her, I am going to destroy her.” His cerebral excitement seemed to inflate his head, rather as a balloon from which his wasted body hung in slight levitation. “Come down to the floor, for God’s sake,” I said peremptorily. “What does my opinion matter? I ’m not the museum.” “But you’re right,” he insisted. “I have been going in the wrong direction. Die Irmas out.” “And don’t use me as a sop for your terror of working.” “It’s really not that—but a technical question. Die Irma ist nass.” “She isn’t, she’s bone dry. I felt her.” “I assure you, underneath—” “Every time I’ve come to Paris you’ve said the same thing. Pull yourself together Insel, you’ve got to finish this for the museum. For you it’s work or death. Can’t you figure it out?” I urged helpfully— “When you have money and can eat you paint a picture so as to have more money— when you haven’t any more money.” “It’s more complicated than that,” he objected again, “die Irma is wet—” I was getting exasperated— When the balls of our eyes caught each other, we both began to laugh. “If you had heard the Lesbian’s synopsis of Frank Harris’s confessions, you wouldn’t even trouble to mention it—.” “I shouldn’t care to read this Lesbian’s confessions—it is a Lesbian who has taken the love of my life away from me.” “Well now, I wouldn’t mention that either. Of course, it does not matter with me—anybody can tell me anything—you know what I mean—when you surrender your arms, chuck them onto neutral territory. I know it’s a touch that modernizes your romanticism; all the same, I’d advise you never to make that particular confidence to a woman ‘ou connaît ça.’” But Insel was past advice. With a look of dogged emptiness he recited for the nth time the story of those Mädchen who shut themselves into the house for a fortnight for fear he would shoot them.” Mostly when speaking of his loves of the past he became quite normal; subnormal really, for his adventures in the actual world had been of an excruciating banality. As I was also engaged for dinner, I asked the time. Insel who was sitting on a wooden stool stretched out his arm—it reached much further than its actual length would warrant. Behind the curtain in the corner, carefully secreted under empty boxes, neatly stacked, was his wristwatch. He did not bring it out—his arm seemed in some Einsteinian contraction to shorten the necessary distance for focusing the hands. It was seven o’clock. I took my leave. Insel, astonished as if this were the first break in a timeless conversation, snapped in half; or at least bowed like a poplar in a sudden gale; his dessicated limbs the branches. Staring vainly towards the door I was opening—he choked in the voice of a Robot, “Morgen komm ich im Gericht. Tomorrow I go to court—I am going mad!” Then don’t forget your little afternoon,” I reminded him— “I dote on madmen.” As I was leaving, he seized his palette and dripping an enormous brush into a pile of ebony pigment painted with a heinous neigh of victory, “Die Irma—Out!” Mina Loy,1882-1966  Insel, 1937. First published October 1st 1991 by Black Sparrow Press Image: Richard Oelze,1900-1980 A novel that follows an autobiographical relationship between, the character of the Loy narrator, Mrs. Jones, and the painter, Insel, based on the German Surrealist painter Richard Oelze. Mrs. Jones, is a writer in Paris, who also collects art for a New York gallery. The ethereal narrative represents an attempt to create a surrealist non-linear way of seeing the world. “It was the evening outside the Lutetia I experienced its effects. A sort of doubling of space where different selves lived different ways in different dimensions at once. Sitting on the sidewalk—floating in an Atlantic Ocean full of skyscrapers and ethereal cars.” To a background of daily life in the artist’s studio in Paris Mrs. Jones’s attempts to understand and articulate the superreal thought process of the Surrealist mind.  “Insel,” I asked puzzled, “how does the world look to you? Like an Aquarium?” Author: jeh Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_2_shard_00001658_processed.jsonl/10028
Ricky Ponting tamed by Paul Collingwood’s greatness “Mate, you’ve just dropped the World Cup” was the observation of Steve Waugh to Herschelle Gibbs at Headingley in 1999. It was a critical error by Gibbs, the catalyst for South Africa’s elimination and Australia’s subsequent triumph in that World Cup as Waugh went on to win that crucial game. At Perth at 10.51am on Thursday a fate-tempting English version of that observation came to mind, “Colly, old chap, you’ve just caught the Ashes.” Paul Collingwood’s victim – with a bit of help from Jimmy Anderson, who had propelled the ball – was, of course, Ricky Ponting. Full story: The Guardian Leave a comment Filed under 3rd Test - Perth, Ashes 2010/11 Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_2_shard_00001658_processed.jsonl/10030
In order to keep the ServiceBus360 application and infrastructure up and running with Azure Service Bus Infrastructure changes, all ServiceBus360 users are requested to select appropriate namespace type (Messaging, Relay or Event Hub) for their namespaces that are associated with ServiceBus360 on or before 27 Jan 2017. This is due to the latest announcement from Microsoft on Azure Service Bus Messaging, Relay, and Event Hubs Namespace Separation. Please note that once these changes are implemented, this activity will result in loss of some alarms and resource mappings that were created for monitoring. Steps to define Namespace type for associated Namespaces in ServiceBus360 1. When you log into ServiceBus360, you will see a notification message as shown below. You can either choose to import namespaces from the Service Bus Explorer config file or associate new namespaces. Even though you have associated namespaces earlier, you will see the notification message. This is because, in the recent release, we migrated our license plan to associate with the recent Azure Service Bus Namespace Separation. To continue working, click the "click here and edit your namespace to select the type" link. 2. In the Associated Namespaces section, you will see the list of namespaces marked with "Type not found" 3. Edit the namespaces for which you want to add the namespace type. Select the appropriate type for the namespace exactly as the namespace type that you have opted for in the Azure portal based on the recent namespace separation notification from Microsoft. 4. You will see a warning message as "Changing the Namespace type will remove the following: a. Entity mappings to alarms for monitoring. Select the check box to confirm and proceed." Select the check box and click Save. You can have only one namespace for each type 5. Navigate back to the homepage by clicking "Back to Home". You can now start managing and monitoring your entities as before. You may notice that we have removed the Resources section in the Settings. This way, you will be able to manage all entities in your namespace as soon as you associate your namespace with ServiceBus360. You will be able to explore only the entities based on the type you have just selected. For e.g., you may have entities of all types in your namespace. But after selecting the type – Messaging for a namespace, you will be able to see only entities of type Queues and Topics. Similarly, this applies to Relay and Event Hub types.
global_01_local_2_shard_00001658_processed.jsonl/10034
Screw Effect Rate it: Screw Effect Screw Effect Screw Effect is a game about a little screw which feels so unimportant in a huge machine where there are thousands of other screws live. One day, our hero fell from its place and that causes the machine to start collapsing. It has no choice but escape from this destruction. Left and Right arrow keys to move, UP or SPACE to jump. Brain Games Action Games Girls Games Games At 7 Games Rainbow Girl at Math Class Rainbow Girl is at Math Class and she's got a problem with the numbers. Can You help here? Are you good enough at Math? Let's see how good you are. But beware, the time is running 3D DressUp for Party Enjoy this 3D realistic dress up girls game. Choose the dress, the shoe and the necklace you think you will like, because she can see her self in the mirror and decide if she likes Rainbow Girl at Zoo Rainbow Girl makes a visit to the zoo, where she interacts with various animals (Lion, Ape, Elephant, Tiger, Hippopotamus, Boa, Camel and Peacock) Help Rainbow Girl to solve the Pu Rainbow Girl At Fitness Rainbow Girl is going to fitness, where you have to pass some challenges. She must jogging, to jump the rope and to dance at the aerobic. Can you help her to pass the challenges? Rainbow Girl Collecting Fruits Rainbow Girl found an orchard full of fruit, which wants to reap when are ripe. For this, she needs you. She will run to the ripe fruits to reap them. You must catch in the box, t Yamina Honey Garden Yamina has a huge garden and decided to use it for beekeeping. She has no idea how to do that%2C so she asks for your help and expertise. Create the perfect environment for the flo © 2012-2018 at7games.com
global_01_local_2_shard_00001658_processed.jsonl/10053
Fractional reserve banking gives a lot of advantages to Bankers,in every field,as a Banker’s money has “more value”,than the “same amount”,possessed by an ordinary individual or a Corporate House.Bad as it is,this is more pronounced in the Stock,Currency and Commodities markets.This ,means,banks cannot,from a MORAL and even a LEGAL,point of view,take part in investing,trading or speculating in the three markets,as it will be UNFAIR and DISCRIMINATORY.Hence PRIVATE BANKING should NOT be allowed. In India, commercial banks should maintain a capital adequacy ratio of 9%. That is, for every Rs 100 that they lend out of deposits, banks must have Rs 9 of capital.That is,in the hands of an Indian Banker,a Rupee has 11 times the value,of that  in the hands of an ordinary person or a Company. This is HIGHLY UNFAIR. In fact,Fractional Reserve Banking is a Ponzi Scheme. Please read about REAL BILL Many relevant videos in THIS link. To be continued….
global_01_local_2_shard_00001658_processed.jsonl/10062
Maven fabric8 plugin fails to run docker container in pipeline Issue #15505 resolved Moritz Becker created an issue I am running a maven build that uses io.fabric8:docker-maven-plugin:0.23.0 to spawn docker containers for integration testing during mvn install. This works fine locally, but when executed with Bitbucket Pipelines, I get the following error: [INFO] DOCKER> Pulling from library/postgres [INFO] DOCKER> Digest: sha256:d6150452877361e26d0fd178d278af8f80d59c75cbb5c2413cfb4fdb5ed4f750 [INFO] DOCKER> Status: Downloaded newer image for postgres:10-alpine [INFO] DOCKER> Pulled postgres:10-alpine in 2 seconds [ERROR] DOCKER> Error occurred during container startup, shutting down... [ERROR] DOCKER> I/O Error [Unable to create container for [postgres:10-alpine] : authorization denied by plugin pipelines: Command not supported. (Forbidden: 403)] So it seems that docker itself is working since the image is fetched successfully but when it comes to actually starting a container, the pipelines plugin forbids the operation. On the contrary, a literal docker run -d postgres:10 inside my pipeline step works. Official response Comments (17) 1. Matt Ryall staff Thanks for raising this, @Moritz Becker. This error message indicated that starting the Docker container was forbidden by our Docker authorization plugin that prevents a small number of commands that are not safe to allow in our shared infrastructure. As described in our documentation: Pipelines prevents the execution of Docker swarm-related commands, docker run --privileged, and mapping volumes with a source outside $BITBUCKET_CLONE_DIR for security reasons on our shared build infrastructure. If I had to guess based on your description, I suspect that the Maven plugin is trying to start Postgres and map a volume outside the build directory for storing databases, probably under the typical /var/lib/psql location. You'll need to reconfigure it to use a location underneath $BITBUCKET_CLONE_DIR. (If it isn't this problem, then it could be starting the container with --privileged or using a swarm command.) Can you please take a look into this, and let us know what you find? 2. Moritz Becker reporter Hi, thank you for your response. The mvn plugin is not explicitely mapping any volumes to host directories. It only performs the implicit mappings from VOLUME declarations in the Dockerfile which are mapped to /var/lib/docker/volumes/ on the host side. I have attached the outputs of docker inspect on my local machine for a container created by the plugin and for a container created by running docker run -d -p 5435:5432 postgres:10-alpine. The latter command embodies the same semantics as my plugin configuration does. When you compare the two outputs you can see that the resulting container has the same configuration (modulo different IDs and stuff). Moreover, if your theory was right then my docker run -d postgres:10 command issued inside the pipeline would also have to fail due to the implicit volume mapping. I found out that the plugin accesses the docker daemon via the Docker Engine API - not sure if this is relevant. 3. Kenny MacLeod staff • changed status to open Re-opening this ticket. We have a known problem with the integration of the fabric8 docker maven plugin and the docker daemon in pipelines. This is most likely due to differences in expectations between docker API versions. The only current workaround is to avoid using the fabric8 maven plugin, and either use a different docker plugin or invoke docker commands directly using the maven exec plugin. 4. Anton Smirnov @Moritz Becker I'm having similar issue with another library (testcontainers). So in fabric plugin you had this issue in 0.23 and it's gone in 0.25.2, right? Can you figure out related issues/commits? Are they: 5. Nathan Burrell staff @Anton Smirnov sorry the issue with testcontainers isnt the exact same one as this (I was just guessing it was at first as we have seen it happen with alot of docker clients) the issue with testcontainers is in how it is configuring mysql by default, you just need to update the default config for where the mysql-conf file is mounted from (hostPath) as described in 6. Log in to comment
global_01_local_2_shard_00001658_processed.jsonl/10066
SQLite for webapps (the very basics!) I've been scared of SQL (and relational databases in general) for a pretty long time. The syntax has always felt clunky to me, and I feel like I'm using technology from 25 years ago. And that's probably because I am: the idea of a relational database was first coined by a chap at IBM in June of 1970! I decided to tackle a problem I'd previously failed at -- and done so pretty badly. After following Miguel Grinberg's excellent (if now slightly dated) Flask Mega-Tutorial, I wanted to add the functionality to follow/unfollow a given user's posts. I'd reasoned that I needed a Following table to manage who was following whom, but my understanding of relational databases was (and is!) pretty rough around the edges: the details of how to link up the Post, User and Following tables to return only the relevant posts completely eluded me. With a fresh-ish mind, and a new install of PyCharm, I decided to have another crack at it. This time I didn't want to make the webapp first; I wanted to make sure my database design was solid before building any API endpoints. In actual fact, I decided not to write any Python until the database was working -- uncharacteristic I know, but I wanted the satisfaction of doing it without any of the myriad of Flask frameworks to abstract away the details of relational databases. I started off writing three files (to keep around, in case the database ever got deleted): • create_user.sql • create_post.sql • create_following.sql Each one creates a table in the database (the actual data source being configured via PyCharm's magical UI), as per their name. These could easily have all been contained within one file -- and in fact, I'll probably make that happen -- but I wanted to see it all happen individually. I worked out pretty quickly that I'd have to run create_user first on a newly-created database: otherwise, the Post and Following tables couldn't refer back to the User table in their foreign keys. So, the User table design looks like this: create table User ( user_id integer primary key not null, username string not null, user_bio string not null Simple enough: we create a table called User. In this table there's 3 columns: • user_id, used as a unique identifier for the individual user; • username, a string value; and • user_bio, another arbitrary string. There's two modifications to user_id: firstly, it's the primary key of the table, which as far as I can tell just forces it to be a unique identifier; and secondly, it's not null. This probably isn't actually necessary, as I think primary keys are not null by default, but hey -- nothing's broken. The Post table is pretty simple too: create table Post ( post_id integer not null primary key, user_id integer, content string, timestamp string, foreign key(user_id) references User We have these fields: • The post_id, another primary key which we probably won't use for anything in particular could be used for implementing a Favourite or Share table!; • user_id, the ID of the user who wrote the post; • content, the body of the post as a string; and • timestamp, the time at which the post was written. The last line makes it explicit that user_id is going to be matched up with the user id of the User table. I'm told by my good friend StackOverflow that this isn't actually necessary, but improves database integrity and prevents accidental deletions. Seems like good practice to me, so it's staying in. Finally, we have the Following table: create table Following ( follower_id integer, followed_id integer, primary key (follower_id, followed_id), foreign key(follower_id) references User, foreign key(followed_id) references User Again, the last two lines aren't actually necessary, but (I think) make sure we don't have any accidental deletions of users who are still being followed by someone. The first two lines are simple enough: although a "Following" is slightly awkward linguistically, it just represents a single instance of one user following another. These are the kind of strange mental gymnastics we apparently have to go through given the absence of a "list" type in SQL. The third line is slightly strange, and probably won't matter too much, but instead of creating a pointless "id" column for the primary key, I've decided to use a Composite Primary Key. It's a primary key composed of the two important fields -- follower_id and followed_id -- and it's provably unique, since any given user X is either following user Y or not! That's all well and good, but the real problem I ran into when trying this last time was actually forming the query to retrieve all the posts that the current user should see. This was defined as "every post from every user that the current user is following". Strangely enough, I didn't have to think too hard before working out the correct query this time! Maybe it's because I'd written everything in SQL instead of using a Python wrapper, but I felt like I understood the (admittedly pretty simple) database design enough to just write the query straight off the bat... ...so here it is! select content from Post, Following, User where Post.user_id = Following.followed_id and Following.follower_id = ?; The ? is a way (apparently the safest way!) to parameterize SQL queries, and will be populated by the current user's ID, which should be available to me in the webapp. In order to test it out, I used a slight modification: select content from Post, Following, User where Post.user_id = Following.followed_id and Following.follower_id = User.user_id and User.username = "barry"; Of course, before getting any results from that query, I had to populate the tables with some rows! PyCharm makes this incredibly easy with the included table editor, but just to brush up on my SQLite syntax I wrote some equivalent queries myself (which I'll be relying on if I write the actual webapp!): • insert into Following values (?, ?); • insert into User values (null, ?, ?); • insert into Post values (null, ?, ?, ?); Again, the ?-syntax allows me to parameterize the queries from the webapp backend. In my testing, I replaced them with arbitrary values matching the required types. The null argument to User and Post is an SQLite quirk I discovered by accident, which autoincrements any integer primary key if null is passed as a value. Hooray for smart design! It's great to see that I can actually learn some basic SQL and use relational databases, even if I'll likely convert the raw SQL queries into the equivalent calls to some Flask framework. I'm relieved not to be so completely terrified of relational databases any more, and extremely glad to have solved a past problem!
global_01_local_2_shard_00001658_processed.jsonl/10067
Is A Web Accessibility Algorithm the Next Big Change? Author Archive for: Is a Web Accessibility Algorithm the Next Big Change? Find me on:  The Global Economics of Disability Annual Report of 2016—reports that the number of disabled people worldwide is 1.3 billion, a number that could climb much higher as Generation X ages. Fortunately, there is a growing awareness that the digital world needs to make websites and other online applications more accessible to all users.  With more websites adjusting to become accessible and meet Website Accessibility Content Guidelines (WAGA), it's likely that search engines will take this into consideration and favor website that are within those guidelines.  Below, we explain more about what web content accessibility is and how it is likely to impact website owners in the near future. Q. What is web content accessibility? A. The term refers to making websites and online materials usable to the disabled, which includes those with visual, auditory, learning, cognitive, and neurological infirmities. Accessibility removes barriers to the way the disabled experience the Internet. The basic idea is to build your website to be compatible with screen readers and assistive scanning keyboards. Technically, Web Content Accessibility is an international standard for making content more accessible to the handicapped. This overview of Web Content Accessibility Guidelines 2.1 discusses the topic in more detail. Q. What are the key benefits of Web Content Accessibility? A. In addition to helping you expand your market reach, making your website more accessible:  1. Creates positive public relations 2. Boosts search engine optimization 3. Improves site usability for all kinds of visitors 4. Broadens your market penetration 5. Avoids discrimination and legal entanglements 6. Cuts costs, including upgrading for new technologies Accessibility also improves your site’s technical performance. It reduces development and maintenance time, bandwidth use, and server load. It also increases cross-browser compatibility and enables content on a variety of configurations, including different operating systems and mobile devices. Q. How does accessibility impact SEO? A. Web content accessibility aligns itself nicely with search optimization. For the most part, it makes it easier and faster for crawlers to do their work. Also, both accessibility and SEO rely on content structure, semantics, and functionality to rank sites: "Highly-optimized websites such as relevant, optimized header tags and ADA-compliant code and design are becoming more and more synonymous with the designs Google expects and promotes in search rankings," says Lance Hayden of WebAim, a non-profit organization based at Utah State University. Put simply, the better a page’s content and user experience, the more likely Google and other search engines are to rank it high. Accessibility and good website design go hand in hand. Q. What are some Web accessible techniques? A. The most important technique in making your site accessible is to separate content from presentation clearly, which you can do with the help of cascading style sheets (CSS). Additional techniques include: • Making sure all information images use Alt-Text • Prompting text assigned to forms • Supplying a sitemap and avoiding pop-ups • Dividing content into small paragraphs • Providing subtitles or a written transcript for audio content • Offering a focus state for links • Keeping technical language to a minimum • Using strong, bold text to make it standout See this W3C webpage for more on accessibility techniques. Incorporating web content accessible techniques in your site is cost-effective and easy to do. Q. Is a web accessibility algorithm the next big update? A. It’s entirely possible an accessibility algorithm will surface at some point in the future-—maybe within the next 12 to 24 months. It’s trending that way: • The major search engines are already promoting the SEO benefits of web content accessibility techniques. • Google already ranks sites with accessibility techniques included in metadata, content, and visual design, higher than sites without these things. • Google recently launched Lighthouse, an open-source, automated accessibility tool aimed at web developers to help them improve the quality of web pages. Google included it in the company's Tools for Web Developers. This type of tool isn’t unique to Google. Other search engines have it, too. So, it certainly seems like search engines are embracing accessibility. The next step is for them to make it a major ranking factor. That would help open the door for someone to develop an accessibility algorithm. What do you do in the meantime?  If you haven’t made your site accessible, you should. Complying with web content accessibility guidelines makes sense. And it doesn’t cost an arm and a leg to do. Accessibility improves your site’s design and customer experience, boosts visibility and search engine rankings, and brings you one step closer to tapping the $8 trillion of disposable income mentioned above. More importantly, making your site web content accessible is the right thing to do. Subscribe To Our Newsletter Our Most Recent Posts
global_01_local_2_shard_00001658_processed.jsonl/10079
Architecting Findability presented by Dan Klyn A few days ago I attended the monthly meeting of the SEO group led by Linda Girard from Pure Visibility. The guest speaker, Dan Klyn, spoke about “Architecting Findability.” The key takeaways were: * It’s easier to bake findability into your web site rather than fix it after the fact. * It is better to use your customer’s language than the terms you and/or your Information Architect choose. * Keep your code clean (use web standards); search engines will better understand your content and you will improve your site’s accessibility. Dan’s recommended reading list includes: * Information Architecture by Louis Rosenfeld and Peter Morville * Ambient Findability by Peter Morville * Search Engine Visibility by Shari Thurow * Design with Web Standards by Jeffrey Zeldman Dan talked about various tactics to improve findability (taxonomy, folksonomy, formats). You can find his PowerPoint presentation online here. Comments are closed.
global_01_local_2_shard_00001658_processed.jsonl/10080
How To Stop Home Folders Being Renamed Documents in the Network Share I’ve recently had a number of queries about why everyone’s home folders have been renamed to Documents in the network share they reside in. This obviously makes finding a particular users home folder difficult, especially in schools where administrators and teachers regularly look in the home folders. This is a feature of Windows Vista, Windows 7 & Server 2008. A desktop.ini file is created when the user first accesses their home folder to give it a friendly display name of Documents and a custom icon. This is to make it look pretty and stand out when viewed under your profile in Windows Explorer. However, the side effect is as above. Whenever anyone else views the folder, and this will normally be in the context of the network location it is stored, their Explorer will also read the desktop.ini file to get display information and give the impression that there are multiple folders called Documents. As it’s only the display name which is changed you can still navigate into the folder by typing in the name in the address bar, which will auto-complete properly, but it’s not ideal. The desktop.ini file is a hidden system file so you won’t see it unless you have your setting set up to view system files so unless you know what’s happening it can seem very mysterious. Microsoft have a knowledge base article about this at In it, it suggests 3 options for stopping this behaviour. 1.    Put the home folder in a wrapper folder which is called the user’s username, but point the Active Directory attribute to the folder within it. 2.    Give the user exclusive rights to the folder. 3.    Deny read permission to the desktop.ini file in the home folder to other users. Then they won’t be able to read the display information and the name won’t change. In a school environment, where there are legitimate reasons for other users to go into the students’ home folders option, 2 isn’t an option. Both 1 & 3 work nicely, but 3 seems cleaner to me as it doesn’t require any extra folders creating just to get round a display issue. I’ve knocked up a quick PowerShell script to automate setting the permissions on the desktop.ini files. Note the groupName below should be changed to the name of an Active Directory group you want to be able to view the real folder names. Be careful that this group doesn’t include any back up process opoerators or backups could fail. $folders = Get-ChildItem | where-object {$_.psiscontainer}; foreach ($folder in $folders) $ErrorActionPreference = "SilentlyContinue"     $desktopIni = Get-ChildItem $folder -Filter desktop.ini -Force if ($desktopIni -ne $null)          $Acl = (Get-Item $desktopIni.FullName -Force).GetAccessControl("Access")          $Ar = New-Object `          Set-Acl $desktopIni.FullName $Acl All you need to do is save this script as a .ps1 file in the directory containing your home folders. If they are split for example along intake years, you’ll need to do this in each containing folder. So in the example above, you would save in \\fileserver\Intake2008. Then change groupName to the name of an Active Directory group containing the users you want to see the real names. Open up PowerShell and navigate to the directory containing the script file and then run it. If you haven’t run PowerShell scripts before you’ll need to set the execution policy to allow it, I normally use RemoteSigned. Run help set-executionpolicy help about_execution_policies in your PowerShell prompt for more information. Update 05 April 2011 Removed the use of Get-Acl as Set-Acl then tries to set the owner. Talked about back up operators. Thanks to Jay Hutter for both of those. Update 16 September 2011 Added $ErrorActionPreference = “SilentlyContinue” at the start. Otherwise an error is thrown when re-running as you don’t have access to the desktop.ini files you modified last time. 32 thoughts on “How To Stop Home Folders Being Renamed Documents in the Network Share 1. Richard, This is great! I think I’m almost there. I ran the file through PowerShell and recieved the error below on all folders. Is there something else I need to change in the script? You cannot call a method on a null-valued express At D:\2011\brhs.ps1:5 char:210 + if ($desktopIni -ne $null) { $Acl ty.accesscontrol.filesystemaccessrule(“HS Student $desktopIni.FullName $Acl } + CategoryInfo : InvalidOperation: ( + FullyQualifiedErrorId : InvokeMethodOnNull 2. Richard, I don’t often use PowerShell so forgive me if I am doing something wrong. I went back and edited the PowerShell file to be spaced out of the amount of lines you used above. I again ran the file and recieved this shorter message. It did not run and error on all files like it did previously. Is there something in the script I need to change? Unexpected token ‘Ar’ in expression or statement. At D:\2011\brhs.ps1:8 char:32 + $desktopIni.FullName $Ar <<<< = New-Object + CategoryInfo : ParserError: (Ar:String) [], ParseException + FullyQualifiedErrorId : UnexpectedToken 3. Hi Daniel, WordPress seems to have eaten the correct spacing. I’ve adjusted it now so please try again. 4. i keep getting this error any ideas?? Set-Acl : The security identifier is not allowed to be the owner of this object. 5. I Keepp getting the security identifier error too. Has anyone resolved this? 6. Instead of using a script you could also just add an extra column to the view of windows explorer called “Filename” “View”, “Choose Details…”, activate “Filename” and press “OK” 7. @Steve I get the same error message. I am fairly certain that the user has to be owner of the folder for redirection to work. 8. What I did to fix the issue was to install FSRM and make a file screen for the share where their home directory is mapped disallowing any ini files. That did the trick for me. 9. If you’re denying access to an entire group, doesn’t that include the user you want to see it in many cases? For example I have a “students” group, and all of the users are in that group. If I deny access to a file for the “students” group, that will include the user who I want to see it. What am I missing? 10. Nevermind, I see what MS is doing.. They assume the user is outside the group (in their example deny access for the admins group). 11. A fourth option is to add the ‘Filename’ column to your Windows Explorer view. Much easier then other options. 12. Steve :i keep getting this error any ideas?? There are errors in this code because you are not allowed to do this if you are not the owner of the file/folder. Set-ACL also wants to write the owner even if you have not changed it or don’t want to change it. So you are getting that error because it is tring to change the owner. Instead try this which will use the GetAccessControl method to specify what part of the security description you want to read (and change) $Acl = Get-Acl $desktopIni.FullName $Acl = (Get-Item $desktopIni.FullName -Force).GetAccessControl(“Access”) 13. Cyprian Wyatt : Adding a filename column only works for you though and not everyone else. Most of my work is in schools and quite often they want all teachers to access the student’s home directories. 14. We got the same problem on one of our servers. I am working for a school board, and all the users home drives are set in the folder D:\users (D:\users\students, D:\users\staff, D:\users\admin staff) This program is using xcacls.vbs I wrote this vbs script and it’s working well on a 2003 server. Its well commented and you should not have any problems to follow my code. This program runs from the command prompt with or without argument: c:\: will run to the default folder hard coded in the program (defpath) c\:\ d:\other users: will run on the folder d:\other users. Here is the code (tested and working): ‘* Bert, April 30 2011 * ‘* To prevent administration group to read desktop.ini inside a user Home Drive. * ‘* Reading desktop.ini prevents to display the right folder name * ‘*(ie: displaying My music, My Documents or My video in stead of the folder name) * ‘* Usage: At the cmd prompt > DRD.vbs * ‘* if no argument is passed, the default path (defpath) * ‘* will be selected to apply the restriction setup * Option Explicit Dim strFolderToSearch, strfolder, WshShell, objRootFolder, objFolder, colSubfolders, strOutput, objFSO,_ strxcacls, arg, x, y, filesys, filetxt, defpath, usersarray() Set Arg = Wscript.Arguments x = 0 y = 1 Const ForReading = 1, ForWriting = 2, ForAppending = 8 ‘+ Begining of custom settings + ‘* Location of xcacls * strxcacls = “c:\xcacls.vbs” ‘* Path for the default user’s folders (if no argument is passed from the command prompt) * ‘* This will be used when running as a scheduled task * Defpath = “D:\users” ‘+ End of custom settings + Set WshShell = WScript.CreateObject(“WScript.Shell”) Set objFSO = CreateObject(“Scripting.FileSystemObject”) Set filesys = CreateObject(“Scripting.FileSystemObject”) ‘Deleting the previous batch file If filesys.FileExists(“c:\changeACL.bat”) Then filesys.DeleteFile “c:\changeACL.bat” End If ‘Creating the an empty batch file Set filetxt = filesys.OpenTextFile(“c:\changeACL.bat”, ForAppending, True) ‘Checking if the user’s folder has been passed to the program. ‘If yes, take arg.item(0) as a folder to apply the permissions ‘if no use the default path (Defpath) defined earlier. If Arg.count = 0 then set objRootFolder = objFSO.GetFolder(Defpath) Set objRootFolder = objFSO.GetFolder(arg.item(0)) End If set colsubfolders = objRootFolder.subfolders ‘Find Group folders under users folder and store it into an array For each objfolder in colSubfolders x = x + 1 ReDim Preserve usersarray(x) usersarray(x)= objfolder ‘Find user’s folders for each group stored in the array,create the command line and copy it to a batch file. for y = y to x Set objRootFolder = objFSO.GetFolder(usersarray(y)) Set colSubfolders = objRootFolder.SubFolders For Each objFolder in colSubfolders strfolder = usersarray(y)& “\” & ‘* The following is copyied to changeACL.bat to remove the read right of the INI file * ‘* (/R user Revoke specified user’s access rights.) * ‘* here is an example: cscript c:\xcacls.vbs D:\users\admin staff\1adm\desktop.ini /D “Domain Admins”:R * filetxt.WriteLine(strOutput & “cscript ” & strxcacls & ” ” & strfolder &_ “\desktop.ini /D ” &chr(34) & “Domain Admins” &chr(34) & “:R” & vbCrLf) ‘Running the batch file to set restriction ‘If an argument was passed to the command line, tell the user that the process ended successfully if Arg.count > 0 then Wscript.echo “User’s folders located in ” & objRootFolder & ” have been successfuly processed” End If 15. Have never used powershell before but copied and pasted the scipt into a ps1 file. Changed the word groupName to StaffTemp which is the group I made to test this (the staff want to know whos documents relate to each user) then I ran powershell as an administrator, did “Set-ExecutionPolicy RemoteSigned”, located the ps1 folder which I had placed in the root of where all the Documents folders were and ran it by running .\scipt.ps1 It just went to the next line and nothing haappened! no desktop.ini file was changed. Help! What am I doing wrong? 16. Denying Domain admins could have a negative effect on processors such as backup routines which rely on admin accounts to access files and folders. We worked around the problem by initally replacing all the desktop.ini files with empty copys. The permissions of these files were then changed to deny write access to the user thus leaving all higher level admin permissions intact. 17. Would setting the desktop.ini files in all the directories to blank, and then setting them as Read Only do the trick? 18. @Erik Oh my God, Erik! These guys are talking about scripting and you just did this simple folder view change and it looks like it should! Thanks so much! 19. That only works on an individual basis though. It’s no good for all teachers in a school needing to see all students home directories. 20. I required a solution which would allow me to both block inheritance on this file but also allow for our Service Desk to delete or move the file when a user Home Drive is to be relocated or archived. It involves providing only TAKE OWNERSHIP, CHANGE PERMISSIONS and DELETE access to the file (after 1st removing previous access): foreach ($folder in $folders) $ErrorActionPreference = “SilentlyContinue” if ($desktopIni -ne $null) $acl.SetAccessRuleProtection($True, $True) $Ar = New-Object ` $Ar = New-Object ` Set-Acl $desktopIni.FullName $Acl $Ar = New-Object ` (“”,”TakeOwnership, Delete, ChangePermissions”,,,”Allow”) Set-Acl $desktopIni.FullName $Acl #Along with configuring File screening on DESKTOP.INI, I have found this to be the optimal solution . 21. Thanks for the info, but i did what Bob Marks did (Comment = September 28th, 2011 at 11:04 | #16) except i set “Set-ExecutionPolicy Unrestricted” then ran the script both as .\scipt.ps1 but the only thing that happens is it returns to the next line. When i check on permission they have not changed. Any suggestions? Leave a Reply
global_01_local_2_shard_00001658_processed.jsonl/10086
Log in No account? Create an account 08 December 2007 @ 11:40 pm Fic: Never Alone (Dru/Dean) NC-17   Title: Never Alone Rating: NC-17 Word Count: 966 Series: We Are For The Dark Summary: While Spike takes Sam out to feed, Dru teaches Dean something completely different. Disclaimer: I don't own anything associated with Buffy the Vampire Slayer or Supernatural. They belong to Joss Whedon and Eric Kripke. Notes: Written for tamingthemuse. Prompt: crawl. It's been forever since I've written anything even remotely smutty it seems so here's hoping this worked out. Previous Parts Originally, Spike hadn’t been too sure about leaving Dean with Dru. He knew what that meant because there’d been a time when Angelus and Darla had gone out to feed and he’d been the one left with Dru. And damn if he wanted to share. Spike had always been lousy at sharing. Dru had fixed that by pointing out that their family would be different from their old one. “You’re Daddy now, my pet. Things will be different now.” This had led to the realization that just because it was all he’d known before, it didn’t mean that Spike had to be like Angelus. He wasn’t going to fuck with Dean or Sam’s head when it came to Dru. He’d laid down the rules and Dean hadn’t had any arguments. Sam had paused, thinking about it before nodding. The fact that Spike hadn’t tried to force agreement from anyone had said more than anything else at that point. All this had led to Spike taking Sam out for his first hunt and leaving Dean and Dru to themselves for the night. Now Dru smiled as she stared at Dean. “A warrior,” she murmured. He tilted his head, his mouth tilting up in a half smile. “Isn’t that what you are? A warrior, a protector.” She moved closer. “No need to worry now though.” “Why would I worry?” Dean asked, shifting so that he was facing Dru fully. Her smile was knowing. “You’re not alone, pet. Never will be, not ever again.” Dean didn’t know what to say to that. Hell, he didn’t know what he could say that wouldn’t sound like it was straight off a Hallmark card. Instead, he reached out and pulled her closer, a question in his eyes that she answered by gripping his hips and pressing against him. It was all the answer he needed and he jerked her up before moving back. Her delighted laughter moved through him, letting him know what she liked the same way her soft moan did when he slid her skirt up and over her waist before trailing a finger along her upper thigh. Her nails ripped into his skin as she yanked his shirt up and over his head. The scent of blood filled the air and Dean groaned as he grew harder, his fingers tearing at the laces holding the top of Dru’s dress together. “Did you know,” she whispered, “that I can make pain and pleasure into one? They bleed together you see until you’re willing to do anything for just another taste. Runs all over you, red and more red, and you forget your heart doesn’t beat.” Anticipation was heavy in the air as he listened to her words. It beat against him, crawled over his skin until he was sure he’d lose the control he’d always prided himself on. He could feel the need rushing through him, screaming yes to everything she said. He stared down at her, eyes glinting in the light, and tightened his grip on the material of her dress until it gave, falling to the floor. The sound she made at that had him groaning and grinning at the same time. Her hands reached down and shoved at his jeans. She growled against his mouth as her hand slid inside until she could grip him in her hand. His hips jerked as she smiled. “So pretty when you want to beg, pet.” Her smile widened as she guided him inside her, lifting her legs so that they wrapped around his waist, holding him against her. “Dru.” Dean let out an unneeded breath as he pulled back. “Dru,” he repeated. Her touch gentled and he shuddered, the raging need calming at her touch. “Now.” He began to move, his thrusts slow at first as if he was trying to savor the sensation of Dru’s skin against his. Their movements began to pick up speed and the touches that had been gentle became rough once more. Bruises that would be gone after a few hours blossomed on pale skin and the only sound in the room were the low moans of pleasure drawn out with each thrust. Dean gasped as he felt the need for something he couldn’t identify rose up in him. He was close, so fucking close he could feel it in every inch of his body but he couldn’t get there. Dru lifted her gaze, eyes dark and knowing, and tilted her head to the side. “Take what you need,” she told him, voice oddly calm at the moment. He didn’t hesitate, just bent his head and bit down as he realized his face had shifted without his knowledge. The taste of her blood, thick and sweet, filled him and his hips jerked as her muscles clenched around him as she clawed at his neck, lapping at the blood that ran down his neck. He groaned, thrusting into her one more time as he came. He lifted his head and stepped back a bit so that he could pull out of her. Even as she growled, he slid his fingers inside her, thumb circling her clit. Her head fell back as he thrust his fingers into her, lowering his head to close his mouth over her breast. Instinctively, he bit down and was rewarded as Dru moaned, body tensing as she came. Neither of them moved as they began to calm themselves. Dean gently set Dru on the ground, hands on her hips to hold her steady. His face softened as he brushed her hair away from her face. He shifted, for once completely unsure of what he was supposed to say. Dru smiled again and he knew that she understood. “Come to bed,” was all she said. “We’ll make the stars sing again.” Dean smiled. Feeling: nervousnervous Raven: PeterNikki = Hawtjaded_icy_rose on December 9th, 2007 08:20 am (UTC) .......... *stares at my icon* ....that should explain it. Jesus, woman! And you're telling me you're worried about it!? No reason to be! I need a cold shower. Can I bow before an alter of your greatness? Maz: Dovethismaz on December 9th, 2007 10:05 am (UTC) Oh, I don't know what to think after that. Spike doesn't like sharing, made me worry, but that might not be what he lay down the law about...? *hopes* Dru, however, knows exactly what she's doing. *g* And I am banking on the fact that she wants this family. Very nice. Nebula: evol is loveauthoressnebula on December 9th, 2007 01:56 pm (UTC) .............Please to not let Spike come home and slay Dean, because that was pretty, and I would like some more, please. Damn you. First Buffy/Dean, now Dru/Dean? I heart you. sparrow2000sparrow2000 on December 9th, 2007 03:46 pm (UTC) Gulp. Hot! Hmmm, now all we need is a foursome *g* Kelly: Jossverse+Buffy+Spiketeagues_veil on December 9th, 2007 04:33 pm (UTC) SQUEE! I just read all of these and they're MARVELOUS. LOVELOVELOVE! I adore how you write both Dru and Spike, and Sam is just too damn adorable! Your characterizations are really well done, very true to the shows. WONDERFUL. *flounces off* I am weasel: beautifuldean by sterni75killerweasel on December 9th, 2007 07:10 pm (UTC) I love this series. It's fantastic. :D charlies_dragon: Jensen Acklescharlies_dragon on December 9th, 2007 11:07 pm (UTC) This is OMG-I-need-a-shower-NOW worthy, and then I saw Sparrows idea of a foursome and I just about exploded. Please, by all that's holy and love-filled out there, let this be written by someone. I really like this and will be back next week to read the next installment :D Kateslayerkate on December 10th, 2007 12:26 am (UTC)
global_01_local_2_shard_00001658_processed.jsonl/10092
Petr Hruska   A ROOM FOR THE NIGHT   the big trucks roared like ravenous beasts of the night you called out the price to me a room for two... Continue Reading Ivan Wernisch Designed by B O D Y | Powered by Data3s
global_01_local_2_shard_00001658_processed.jsonl/10125
AOL Instant Messenger is shutting down after 20 years Josh Constine The pioneering chat app that taught us to text is pulling the plug. On December 15th, AOL Instant Messenger will shut down after running since 1997. AIM dominated online chat in North America at the turn of the century. But with SMS and social apps like Facebook and WhatsApp having conquered chat, AOL is giving up the fight with no planned replacement. "We know there are so many loyal fans who have used AIM for decades; and we loved working and building the first chat app of its kind since 1997," AOL wrote on the AIM help page. "Our focus will always be on providing the kind of innovative experiences consumers want. We’re more excited than ever to focus on building the next generation of iconic brands and life-changing products." TechCrunch reader Daniel Sinclair tipped the shut-down to us, which follows the cut-off of third-party apps back in March. Now AIM's official MacOS, Windows, iOS and Android apps are being pulled off life support. "From setting the perfect away message to that familiar ring of an incoming chat, AIM will always have a special place in our hearts," AOL wrote to users in an email. People can download images they sent until December 15th, but the app's download links will start disappearing now. Unfortunately there's no way to save or port your buddy list. Initially the chat experience built into AOL desktop, AIM launched as a standalone app in 1997. Its iconic Away Messages were the ancestor to the modern tweet and status update. It battled for supremacy with competitors like ICQ, and messengers from Yahoo and Microsoft MSN. But eventually text messaging, Google's GChat and Facebook took over, while AIM never fully figured out the shift to mobile. That led to AOL's fall from grace, going from being valued at $224 billion in today's money to just $4.4 billion when it was sold to Verizon in 2015. For context on the business AOL let slip away, WhatsApp sold that same year to Facebook for more than $19 billion. Back in March, a former AOL employee told Ars Technica that he estimated AIM usage had sunk to single-digit millions of users, and the cost of AOL keeping the OSCAR messaging protocol running became too high to justify. Regardless of [Disclosure] TechCrunch being owned by AOL, this moment is bittersweet for me. AIM taught me to write as 12-year old trying to navigate the world of grade-school friendship and romance. I was a shy kid who'd fumble for words in person, but found my voice through the keyboard where I could compose and edit my thoughts before revealing them. After three straight all-night AIM chats, I asked out my first girlfriend, on pins and needles staring at my cathode ray tube until she agreed. AIM was a domain parents didn't understand, giving it a feeling of clandestine cool -- akin to getting one's first car but for the internet generation. In fact, it was what first convinced me that social technology would change the way we interact with each other so vividly that it was worth studying and eventually writing about for a living. So, farewell to AIM and my embarrassing screen name KDog313. Being a teenager will always sound like one of your incoming messages.
global_01_local_2_shard_00001658_processed.jsonl/10138
Philosophy and Reason In Indian mythology, the Hindu god Vishnu lies asleep in a dream state on the serpent Adisesha Ananta (who is time without beginning or end).  This substance of this dream is what we think of as creation, the universe; all exists within the dream, and when Vishnu wakes up, one cycle of the creation will cease to exist.  What we think of as ‘reality’ is only illusory and undirected, and will in time evaporate as a dream does when one awakes. This story represents a basic philosophy of reality, how we know things and know what is ‘real’.  While we may not formally think through our philosophies (or world views), or even be aware that we have one, our frameworks direct the basic ways that we think and live.  From a Hindu perspective it is an error to get caught up thinking that the substance of the dream is real, or that struggling with suffering (or joy) in the dream has any significance.  If this really is just a dream, then the best that we can do is to stop the spontaneous activity of the mind and achieve a state of stillness; then we will realize we are only a part of the calmly dreaming Vishnu, and no longer be caught up in the illusions of the dream, which are neither logical nor rational. While Hindu philosophy represents one philosophy, there are two other systems that are more familiar to us, one comes out of a Hebrew mindset, and still characterizes the Eastern Christian Church, while the other comes from the ancient Greek philosophers Plato and Aristotle, and through blending with the Hebrew ideas has influenced most Western thinking (both Christian and secular). Christianity is not derived from philosophy, but Christian theology has been called the Queen of Philosophy.  They both share a common interest in fundamental problem like: how do we know (epistemology), problems of good and evil, the meaning of life (beyond 42).  The Church has always been willing to engage philosophy (ie Paul at the Aeropagus) and will often use philosophical frameworks to express Christian thought, but it has been less willing to embrace philosophical systems as being Christian (Thomas Aquinas’ use of Aristotle being a counter example). These  issues of philosophy are important.  If we only exist as part of a dream, they why be concerned about what will happen: ecology, economics, social justice, ….?  At some point the dreamer will wake up, and all of ‘this’ will disappear. On the other hand, if this is a real existence, then these issues may be of vital concern. Before getting into the details of Eastern Christian thinking, I first want to digress a bit into Western thought, with which many people will find themselves more familiar. Western Philosophy Western thinking is grounded in the ideas of the Greek philosophers Plato and Aristotle.  While they disagreed about some points (particularly the emphasis on universals verses particulars), they had the same basic set of assumptions: • The goal of philosophy is to create a unified field of knowledge: physics (the physical universe), math and meta-physics (values and meaning) can logically be placed together into a unified system. • Human reason is sufficient to achieve this goal.  Through logical thinking and observing it is possible to create an ‘encyclopedia’ of all knowledge. • A fundamental rule of logic is non-contradiction: A does not equal -A (its opposite). • They both agreed on ‘Aristotilian realism’, the assumption that there is something ‘out there’ and we do not exist within our mind or in someone’s dream (or computer memory as in The Matrix). These four assumptions generally held up until the time of Kant and Hagel (18th century).  While skeptics would at times question the existence of ‘reality’, this was usually considered a philosophical ‘dead end’.  Kant changed the nature of philosophy, believing it was impossible to reconcile physics (particulars) and meta-physics (universals).  He introduced the idea that meaning and values were irrational, and thus one could only logically reason over physics (particulars).  Hagel in turn abandoned the rule of non-contradiction and introduced the logic of ‘synthesis’; a thesis (A) and an antithesis (-A) come together to form a new thesis. All main line philosophy since this time follow these new assumptions.  This is seen in Marx where the bourgeoisie (capitalists) and proletariat (working class) come together (in revolution) to form the classless society.  Similar lines of thinking are behind the philosophies of Freud and Nietzsche. Christianity has been willing to engage with philosophy (both classical and modern) because there is a sharing of the goals (unified knowledge), and at least a partial sharing of many of the assumptions.  We believe in reason and thinking. The Fathers refer to mankind as ‘reason endowed sheep’.  God calls us to reason (Isaiah 1:18), and Jesus in the parables assumes we reason through issues (Luke 14:28).  In addition, engaging in philosophy has been  a way to speak to the culture (ie Paul at the Aeropagus, Acts 17) Limits of Philosophy (and Reason) While Christianity has engaged philosophy, there seems to have always been a boundary to it; though defining that boundary has not always been easy.  In the West, Thomas Aquinas and the scholastics used Aristotle as a foundation for theological thinking; assuming that human reason was not fallen and that ‘natural theology’ would allow a person to reason all the truths of God apart from revelation.  Meanwhile, in the East, the proclamation read in Orthodox Churches on the Sunday of Orthodoxy actually condemns Greek philosophy. From a Christian perspective, there are four problems with relying upon reason: 1. Reason is quantitatively limited by the available facts 2. Reason is qualitatively limited 3. We understand things via paradigms, not just facts and reason 4. Our reasoning is “fallen” Quantitative Limits: We cannot know everything.  As God says to Job (Job 4) Where were you on the day that I made the universe?.  Without all the facts we are prone to make the wrong starting assumptions, which will lead our reasoning astray. Qualitative Limits: Most of our knowledge comes through analogy and abstraction.  Since apart from revelation we are limited to the created universe, we cannot use analogy and abstraction of the created universe to make conclusions about the uncreated God.  While we call God ‘Father’, and there are some analogical similarities between human fathers and God; though it is safe to say that human fathers are (should be) analogous to God, we can easily get into trouble when anthropomorphizing God.  This was the problem of Anselm of Canterbury, he assumed that God was like a middle ages king who took offense at being slighted and demanded satisfaction in return (thus the theology of ‘satisfaction’ atonement). Science, and most of our decisions are not a matter of facts and reason; it is a more complex process of paradigms and models (see The Structure of Scientific Revolutions), facts are important, but there are commitments and biases and many other factors.  The disciples on the road to Emmaus (Luke 24:13) had the facts, “we thought (past tense) this was the messiah”, and it is the third day and the women say they have seen Jesus; but like any rational Roman or Jew of that time knew – a dead messiah was a failed messiah.  Jesus does not dispute the facts with them, but gives them a new paradigm – “beginning with the scriptures (which the disciples knew) … this must come to pass”.  They were ready for a messiah who would destroy Rome, who would restore Israel and a god whose glory would return to the Temple; but they had not conceived a paradigm where a messiah would destroy the power behind Rome and the problems of Israel – who would destroy death itself. Effects of the Fall: Knowing which facts to follow, and figuring out the right paradigm (model) is difficult enough when we are clear headed in our thinking; but the Fathers maintain that few, if any of us, are clear headed.  We are suppose to be a unity of will, desire and reason; but instead we are fragmented and conflicted.  Our desires and passions cloud our thinking, leading us down false lines of logic, or causing us to give up on logic.  We see this playing out at the trial of Jesus (Luke 23): Pilate, who claims that he represents the authority and power of Ceaser cowers to the will of the mob; and the Jews who claim to be faithful to Moses (who defied Egypt) cower to Rome in saying that they “have no king but Ceaser”.  They are still thinking reasonably, but their logic is driven by fear. Toward an Alternative Approach Gregory Nazianzus is willing to to limit the use of reason and live with mystery – those things which are trans-rational (not irrational).  To deny a philosophy of rationalism is not to deny reason, but to see a need to contextualize it more closely.  It is similar to replacing Newtonian physics with relativity and quantum mechanics.  On a pure theoretical level, Newtonian physics are wrong; but people still use it for everyday mechanics where motions are much slower than the speed of light, it is only at very small scales (sub atomic) and very large scales (astrophysics) that the flaws in the theory become evident.  So to with reason; for much of our daily activity reason is useful and necessary, but when we push reason to deal with God, and his interactions with the creation, we are beyond the scope of reason’s ability. Need for Healing From John Climacus’ Ladder of Divine Ascent, to the more modern writings of Hierotheo Vlachos,  there has been a consistent teaching in the East on the need to sanctify the whole person, to re-integrate the mind, desires and will into a unified “nous”.  It is only then that the ‘eye of the soul’ can see clearly and potentially know God. Rooted in Mystery Christian thinking must start with mystery: Trinity, Incarnation and sacraments.  These are things that are paradoxes which fundamentally transcend reason; things that appear to almost be contradictory thesis and antithesis (A and -A) must both be affirmed as true: God is one essence and at the same time three people; Christ is fully God and fully man; the Eucharist is wine and the body of Christ.  If we understand this, we see that most critical issues are rooted in paradox and involve multiple lines of reason that can appear to be contradictory.  We are to feed the poor and hungry, but also hold people accountable and responsible.  We are to be just, but also forgiving. Logic, even when done properly, cannot lead us to truth because it will often lead us to multiple (contradictory) truths.  This was the tension between Plato and Aristotle, they both needed universals and particulars, but reached logically contradictory views on which should be the starting point.l  We need to reason through our decisions: social, economic and political; but realize that there is rarely a single logical conclusion.  Logic can point us to multiple ‘correct’ results, but cannot tell us which one to choose.  Such an approach means that at any given moment any decision will likely be a compromise between conflicting positions – finding a consensus on what is the most loving and faithful action at this moment (which may be different a moment from now).  Paul in one letter tells the Corinthian church expel an immoral member, and in the next letter tells them to embrace him (I & II Corinthians). Need for Revelation From the previous two points, this means that ultimately reason will fail us at one level or another.  If we cannot depend upon ourselves, then we must look for revelation – guidance from outside, from the Holy Spirit.  This too can be complex and difficult.  At times this is the “being of one mind” where we talk over and work through issues as a group, trusting that the Holy Spirit is working through us; at times it is trusting that God is working through the hierarchy of bishops and priests; and at times it is God giving direct revelation, either through events and thoughts or at times by propositional statements of angels, saints or God himself. We see this coming together in the saints, at times with quite opposite manifestations.  It can all come together in someone like Gregory Palamas, who lived the ascetic life and purified his heart, and knew God; who then went on to use his intellect to govern the Church as a bishop and articulate the theology of this experience.  At other times it is expressed in the “fools for Christ” who teach theology through their lives, abandoning all semblance of worldly reason and to follow the will of God. Christianity agrees with the main philosophical assumptions, but with qualifications. We seek a unified understanding of physics and meta-physics, but this is rooted in the assumption that the Triune God is unified within himself (God is both universal and particular), and that his creation reflects his nature, it was made orderly and with design.  Because we have a fundamentally good creation, we can exploring creation is as appropriate way of knowing and understanding God (the creator). While reason is a tool, facts and reason are not sufficient for knowledge and discovery; they require a process of model building and paradigms.  Even model building will often lead us to contradictory ‘right’ conclusions.  In part Hagel was right, we must ultimately give up the logic of non-contradiction; but unlike Hagel, we don’t abandon non-contradiction, but move beyond it.  The ultimate need is not for new logic, but a move beyond logic.  As we come nearer to God (whom we are always in the presence of) language and reason cease to function.  Choices need to be made based on love, as well as being revealed by the Holy Spirit.  We thus find two non-rational modes of being in the presence of God: the language of worship, or the silence of the ascetics. Because we believe in the Creator God, we believe that there is a real, fundamentally good, creation that is apart from God.  It is neither an emanation  of his being, nor an illusion or dream; but has direction and purpose.  To a degree we agree with Aristotilian realism, but we differ in that the cosmos does not exist on its own, but only in dependence and in the larger context of God.  Unlike Aristotle, we do not believe the creation can be understood  in isolation, by itself.  Humanity is in the image of God and thus cannot be reduced to being ‘merely human’, what can be reduced to science and numbers; what is ‘merely human’ is less than human’. 1) For an interesting critique of the cycles of philosophy, see Barry Smith and what he says about Franz Brentano (whom he translated into English). 2) Francis Schaeffer gives a simple intro to the history of philosophy in Escape from Reason; it is rather broad brush and critical, but I think he has a good framework. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_2_shard_00001658_processed.jsonl/10148
You are here Tear Down the Wall Between Banking and Commerce Earlier this week, the Acting Comptroller of the Currency, Keith Noreika, reignited one of the most hotly debated topics in financial regulation: the separation of banking and commerce. The doctrine prohibits nonfinancial firms from owning and operating banks, as well as commercial and investment banks from mixing activities, and was instituted under Banking Act of 1933 (commonly referred to as the Glass-Steagall Act), and the Bank Holding Company Act of 1956. The United States is the only developed country in the world with such an antiquated system, yet it is rarely challenged. Speaking earlier this week at a conference in New York, Noreika asserted that such a status quo merely props up bureaucracies and serves incumbent firms’ interests, “without regard to why the separation exists in the first place or whether the separation has any usefulness for today’s economy.” Noreika is spot on in his remarks. The firewall between commerce and banking has never made sense, and it has merely evolved to protect the very largest firms from competition. My colleague John Berlau and I document this in regards to the infamous Glass-Steagall Act, which separated commercial and investment banking, in our paper “Why Wall Street Loves Glass-Steagall.” As we find, the Glass-Steagall Act systematically destroyed Main Street investment banking over its 66-year reign, relegating it to specialized firms in New York. While the legislation was partially repealed in 1999, allowing commercial and investment banks to be owned by the same holding company, banks still cannot underwrite or deal in securities and investment banks still cannot accept demand deposits. This is despite overwhelming evidence to suggest that banks engaging in both commercial and investment banking are stronger and more stable. The second aspect of the firewall is the prohibition of nonfinancial companies from engaging in banking under the Bank Holding Company Act. This means that household-names such as Berkshire Hathaway, Walmart, and Amazon cannot compete in the banking industry. As Berlau has further found, the distinction has had a detrimental effect on financial innovation, stability, and lowering costs for consumers. As Berlau writes: Unlike virtually every other industrialized country, the U.S. effectively bans non-financial corporations from owning bank affiliates. This means the best-run American corporations, with expertise in areas important to banking like technology and supply-chain management, are locked out of the banking industry. The separation is defended as a way to preserve the purity of banking from the corruptive influences of business. Yet in the many countries around the world, the practice is allowed with no such problem. For example, in the United Kingdom, the retail giant Tesco successfully offers banking and insurance services. Even more interesting is the fact that Walmart, an American company, operates a bank that issues credit cards in Canada and until recently ran a full-service bank in Mexico. Universal banking, as it is known, is a perfectly safe and efficient model around the world. Yet it poses a threat to existing banks. It shouldn’t come as a surprise then that much of the banking industry opposes Noreika’s vision. The Independent Community Bankers of America quickly slammed the Acting Comptroller for the comment, for example. They have also long lobbied to end a loophole that would allow some corporations to operate an Industrial Loan Company, a type of nonfinancial firm that lends money. Yet this is nothing more than pure rent-seeking. Existing banks don’t want the competition from the fiercely competitive Silicon Valley, probably because they know that these firms, like Amazon or Apple, will run them out of business. The separation of commerce and banking has little relevance in the 21st century. It is an outdated doctrine that has nothing to do with financial stability, and everything to do with protecting incumbent firms. It is refreshing to see the Acting Comptroller Noreika acknowledge this, sparking a long needed debate on the antiquated regulatory structure of the American financial system.
global_01_local_2_shard_00001658_processed.jsonl/10152
Lawson Smart Office brings WPF goodness to the enterprise Sign in to queue The Discussion • User profile image Super Cool demo! It just means that we as application developers have a lot to do to make full use of WPF. But at present biggest deterent to adopt WPF is adoption rate of .NET 3.0, what is microsoft doing to increase adoption rate of .NET 3.0 in end-user's PCs ? Business domain is great for WPF, but increased adoption is the only way to make is viable for Retails products. • User profile image Couldn't agree more with you iparag. The one thing that could have save MS from this istuation of having a 200MB installer for the new apps was the client profile, but that one was a complete balls up. If only they had done a little bit of user testing and feedback in the earlier stages, (especially here on C9 - a forum full of the target audience) they would have been told that it is of no use, as it targets only PC's with absolutely no net framework installed. • User profile image That is one phenomenal application, and really could not have been pulled off by people starting to learn WPF. Adam can you not interview Lee Brimelow, or Frog design team? It takes far much more than developers to create an application like this, even though they are the adhesive. How to they go through the design stages, what were the pitfalls etc.. Apart from the Windows UX team, we never really get into the minds of the design teams. I know you've had Vertigo and the "I see dead people" one and the phenomenal Xceed grid (now with 3D), but we really need more from the design people. • User profile image Why isn't Vista's desktop like this? • User profile image A possible answer may be in this thread • User profile image now,now.. rare is the case when you actually need to download the full 200 mb.. that download is for all platforms and includes both x86 and x64 bit versions of .net.. .net 3.5 sp1 is really only ~56 mb for a fresh xp machine and for vista, where .net3 is included by default, its like 10 more mb that you need to download scott hanselman explains it all in this blogpost: what does suck however is the install time.. .net takes forever to install :/ its slightly better with sp1 i hear but theres a lot of room for improvment there.. still, all vista machines already have .net so adoption there is 100% Smiley • User profile image In jh71283's defence sometimes it pays to be a full up member of the cofeehouse, and participating in debate. Please read both threads, you will find that it is for more accurate than Hanselman.  • User profile image Great idea, perhaps I can catch Lee at Adobe MAX and ask him Smiley We are working on putting together a series of videos that go through the design phases of building a WPF app.  I'm looking forward to it because I think it will really demonstrate the type of thinking you're looking for. • User profile image Jaime Rodriguez To iparag,  ubiquity of the framework is happening.. All new Windows Vista Machines ship with full 3.0 ... and when windows update kicks in these will be updated to 3.5 SP1.  Same for machines running .NET 20 - the number there is fairly large already. For the new users, we have client profile.   I agree that it has been confusing this month, we released it early (before the tools and before windows update)..  Mea culpa there... [not mine personally, speaking on behalf of WPF team]..   The reason we released it was for developers to start testing/planning...    messy for a few weeks, but shortly all that will be over and Client profile will still be a 200K bootstrapper that can have a .NET app and running in < 10 mins and a 28 MB download.  so it should help... aL_ -- hear ya on install time..  We will continue to improve that as much as we can.. but there is a lot going on at install (GAC, NGEN, optimize, etc.. ) ..  we are working on it is all I can honestly say.. vesuvius, great advise; we do hope to get more designers on C9 along the way..  keep nagging Adam about it.. I will do the same! [Jaime Rodriguez, new to C9, thanks to Adam for the pointer to the thread].. • User profile image Don't get me wrong, I fully understand the hoops the developers had to jump through to design this, but the end results are so disappointing. It looks to me as though it is just an application that emulates a UI that we already have with the windows desktop - what new does this bring to the table? I have worked on 2 decent sized applications in WPF myself and I am finding the technology to be so immature at this point it has not been worth the effort. While I am sure the technology is capable, I have to compare it to writing assembly language code - true that there is nothing that cannot be done, but the effort to get there is ridiculous. Like HTML, visual design tools exists (Blend) but they often come up way short on actually accomplishing the goals and you must resort to hand coding most of the time. For my last project we got so frustrated trying to use Blend to hatch ideas we went back to Photoshop. I thought the idea was to avoid that? When will WPF move beyond being a 'does small fancy visual demos' release and become something useful?  The health care CUI is the only thing I have seen that looks headed in the right direction, but that too stops way short of actual functionality and is geared at just being a cute demo. The source for it has not been released and I would venture that it is because it is embarrassing to show how much work it took to make a non-functional application. Anyhow, someone at Microsoft needs to wake up.  Great idea, poor execution. • User profile image "Anyhow, someone at Microsoft needs to wake up.  Great idea, poor execution." That's a little harsh.  From my experience with WPF, including Windows Forms interop, WPF is great at two things: 1) completely redesigning an application to be form-less, and 2) using visual cues (animation, transparency, etc.) to enhance the UI in a traditional application.  I agree that it's not as mature as Windows Forms (or Win32), but that's to be expected given it's age. My guess for the reason why you're not seeing a lot of WPF source for LOB apps floating around is that UI controls are moving from being a commodity (i.e. a ComboBox = ComboBox = ComboBox) to being a differentiator. • User profile image i dont see anything there that disproves anything hansleman says.. the fact remains that you rarly (and never on vista) will need to download the full .net framework.  you argue that .net is a part of windows, uh.. so? how is that a bad thing ? why not use windows update to distribute updates to .net? you argue that you still need to be online to install the compact framework (not sure about the validity of that but in whatever) .. uh, so? compact framework is about minimizing the time to get an app upp and running.. what happens after that is irellevant.. if youre going to do a offline distrubution, what does an extra 200 mb on a dvd? nothing thats what.. also, you seem to think that wcf is just for servers.. thats just plain wrong Smiley wcf is exelent for inter procrss comunication though named pipes and also to talk to servers, something that most clients needs to do at some point Smiley Add Your 2 Cents
global_01_local_2_shard_00001658_processed.jsonl/10153
Open Minded Can an open-plan office unleash productivity in your company? At least since the days of Bob Cratchit and his “dismal little cell,” finance staffers have been accustomed to working in adverse environments. Indeed, their ability to do so is practically a point of pride — comfort is for wimps. Some have been conditioned by stints at accounting firms, carrying out engagements in cramped client offices. Many labor cheek by jowl in rows of cubicles, yet are able to shut out distractions and focus on their spreadsheets with the concentration of a yogi. A growing number of companies, however, are freeing finance and other workers from their cubes. In the name of collaboration, productivity, and — yes — employee satisfaction, they are creating open-plan offices, airy and light filled, outfitted with comfortable seating and advanced technology. As contributing editor Alix Stuart reports in our cover story (“Office Space”), some offices are so open and flexible that employees can work practically anywhere they choose. CFOs say the new spaces not only are producing the desired results, they are also giving their companies a recruiting edge. Still, experts caution that making open-plan offices work as intended requires a good deal of change management, not just a change of furniture. Some businesses are also giving their employees a choice in the realm of health care, by using private health-insurance exchanges (see “Healthy Choices”). These online portals make it easy for individuals to compare and choose from an array of health-benefit packages, offered by one or more insurance carriers. For companies, the advantages include more-predictable costs and lower administrative burdens. The Affordable Care Act calls for federal and state health-insurance exchanges to come online in 2014, but companies don’t have to wait until then to benefit from an exchange. Elsewhere in the issue, we interview finance chief Judy Bruner of flash-memory company SanDisk (“The Future of Flash”). Bruner was recently named a Silicon Valley CFO of the Year by a California business journal, but her career might have turned out differently had it not been for the persistence of SanDisk’s former CEO, who kept offering her the job after she first turned him down. As both the CEO and Bruner knew, it pays to keep an open mind. Read next: Finance At BeyondCore
global_01_local_2_shard_00001658_processed.jsonl/10159
Spectroscopy, Electromagnetic Radiations and Types of Spectra | Chemistry Notes Info - Your Chemistry Tutor provide notes for Classes, BSc, MSc, Chemistry Test Spectroscopy, Electromagnetic Radiations and Types of Spectra It is a branch of science which deals with the study of interaction of matter with electromagnetic radiation. Electromagnetic Radiation Electromagnetic Radiations are a certain amount of energy depending upon its wavelength. Hence these radiations are the sources of energy so called as electromagnetic energy or radiant energy. Electromagnetic Radiations are of many types like radio waves, UV rays, IR rays, visible light etc. these are all electromagnetic radiations with different energy, wavelength and frequency. All types of electromagnetic radiations travel with the speed of light but differ in wavelength and frequency. Energy of electromagnetic radiations can be expressed as Where E = Energy             n = Frequency             l = Wavelength             c = Velocity of light = 3*108 m/s.             h = planks constant             Types of electromagnetic radiations Frequency (Hz) Wavelength (1/m) Radio wave (low energy) Visible light Gamma rays (high energy) Type of spectra :   Spectra are of two types 1.     Emission spectra :   When a substance is exposed to intense heat or light its atoms or molecules absorbs energy and get excited. When these atoms or molecules return to their initial state they emit radiations which when pass through a prism it produce a spectrum. This spectrum is known as a emission spectrum. When this type of spectrum is recorded on a photographic plate then bright lines are formed on a black background in case of atoms and bands are formed in case molecules 2.     Absorption Spectra :        When a substance or matter is exposed to intense heat or light it absorbs energy. Due to this intensity of absorption varies as function of the frequency. This variation is known as absorption spectrum. This type of spectra contains dark (black) lines or bands on light coloured background as some radiations are absorbed by the medium. In this process only those photons of radiation are absorbed whose energy is equal to energy difference (DE) between two energy levels of molecules of substance. Where h = planck’s constant = 6.63 * 10-34 Js             n = Frequency             c = Velocity of light = 3 * 108 m/s             l = Wavelength of radiation             NA = Avogadro’s number = 6.02 * 1023 mol-1 Difference between Emission and Absorption Spectrum :  In Emission Spectrum molecules come back to lower energy state from higher energy state while in Absorption Spectrum The molecule goes to Higher energy state from lower energy state. Absorption Spectrum and its types :   in addition to the nuclear energy, total internal energy of a molecule consist of three types of energies.                                     Einternal = Eelectronic + Evibrational + Erotational Since, electromagnetic radiation is a form of energy so its absorption by a molecule, increases the internal energy of the molecule. Also when a molecule is exposed to electromagnetic radiation, molecule does not absorbs all the radiations rather it absorb a particular portion of radiation depending upon the structure of the molecule and amount of absorption of energy depend upon the frequency of the radiation also. So it is clear that different molecules absorb different type of energies and undergo different excitations. Depending upon the absorption of energy molecule may go under Electronic excitation, Vibrational excitation and/or Rotational excitation. So produces different Spectra. you read this post at Chemistry Notes Info http://chemistrynotesinfo.blogspot.in Table : Some Components of the Electromagnetic Radiation and Absorption Spectra Absorbed Radiation and Type of Spectra Types of Excitation Effect on Molecule 1 cm 0.01 - 1 Changes in the Rotational energy levels of the molecule Calculation of bond distance and bond length 2 – 15 mm 1 – 100 Vibrational and Rotational Changes in Vibrational and rotational energy levels Identification of functional groups, Calculation of Bond length, Bond angle and Qualitative analysis (i)                Visible (ii)              Ultraviolet 200-400 nm 400-800 nm Vibrational and rotational transitions also take place but their resolution is not measurable Change in Electronic energy level Qualitative and quantitative analysis The Absorption energy is measured with the help of Spectrophotometer and expressed as Frequency, Wavelength or Wave-number. Law of Light Absorbance :   According to the Lambert Beer’s Law “The Absorption of light is directly proportional to the concentration of the solution and the length of the cell containing sample. Where, I0 = Intensity of incident Radiation             I  = Intensity of transmitted radiation             c = Molar concentration             l = Length of the cell in centimetre             e(epcylon) = Molecular extinction coefficient  The Wavelength at which molecule has maximum Absorption coefficient e (max) is expressed as l (max). in above expression log I0/I is known as absorbance or optical density of the solution. And log I/I­0 is known as Transmission of the solution. Newer Posts Older Posts Subscribe To Get Latest Updates Enter your email address: Delivered by FeedBurner Like Share and Comment to Support and Motivate us to write more… Branches of Chemistry Chemistry is branch of Science, which is further divided into many branches like- Popular Posts Chemistry GK © Copyright Chemistry Notes Info - Your Chemistry Tutor provide notes for Classes, BSc, MSc, Chemistry Test Published.. Blogger Templates Back To Top
global_01_local_2_shard_00001658_processed.jsonl/10170
The ministry of Jesus as a commission to heal the sick commission to heal the sickHealing the sick was an integral part of Jesus’ ministry. In most places where the Gospels speak of his ministry, they also mention healing that accompanied it. Christ’s earthly ministry can never be justly accused of mere religiosity. We can safely say that the ministry of Jesus consisted much more of action and power than preaching. The amount of time that Jesus invested in training his disciples in practical services far outweighs that of public discourse and sermonizing. If Christ is the model for Christian ministry then Christians must imitate the example that Christ left for them. The ministry of healing should never be peripheral in the Church since it was  central in Christ’s own ministry. And Jesus went about all Galilee, teaching in their synagogues, preaching the gospel of the kingdom, and healing all kinds of sickness and all kinds of disease among the people. (Matthew 4:23) Jesus commissioned his 12 disciples to heal the sick And when He had called his twelve disciples to Him, He gave them power over unclean spirits, to cast them out, and to heal all kinds of sickness and all kinds of disease. These twelve Jesus sent out and commanded them, saying: “Do not go into the way of the Gentiles, and do not enter a city of the Samaritans. And as you go, preach, saying, ‘The kingdom of heaven is at hand.’ Heal the sick, cleanse the lepers, raise the dead, cast out demons. Freely you have received, freely give. (Matthew 10:1, 5, 7-8) Jesus commissioned the 70 to heal the sick: After these things the Lord appointed seventy others also, and sent them two by two before his face into every city and place where He Himself was about to go. Then He said to them, “The harvest truly is great, but the laborers are few; therefore pray the Lord of the harvest to send out laborers into his harvest. And heal the sick there, and say to them, ‘The kingdom of God has come near to you.’ (Luke 10:1-2, 9) The commission to heal the sick is for all Christians For this reason, we minister to the sick and “those that believe” in Jesus’ name with the laying on of hands. This certainly includes each member of the body of Christ! The preparation for ministering healing to others is very important as well as delicate. Each person that ministers must be a clean vessel for God’s use! God accepts anyone, but He does not use just anyone. Pray at all times whenever possible! Pray in the spirit before and during ministry You must fervently pray in the spirit as Paul encouraged and specifically ask God to be with you and to help you. God is the one who heals. If He does not answer your prayer, then the person for whom you are praying will not receive healing. Reserve a time for extending forgiveness Reserve time to ask the Holy Spirit if there are any offenses or sins committed against you that you have not yet forgiven. If there are, forgive once and for all, with all your heart. Now King Herod heard of Him, for his name had become well-known. And he said, “John the Baptist is risen from the dead, and therefore these powers are at work in him.” Others said, “It is Elijah.” And others said, “It is the Prophet, or like one of the prophets.” (Mark 6:14-15) Eliminate un-confessed sin Ask the Holy Spirit to reveal any un-confessed sin that may exist in your life. If He reveals anything, sincerely repent and ask for God’s forgiveness. Pray for the sick in love and compassion Ask God to pour out his love to those for whom you pray. A ministry time operated in love will positively affect the sick person, even if their body is not healed. If the person for whom you are praying has doubts about God’s love for them this ministry time could be their first experience with the love of God. Understand the sovereignty of God in healing Be aware that physical healing can take different paths; it can come instantaneously, gradually and in stages, while you are praying. Healing can come after repeated ministry times; or it may not come at all. God is sovereign! In his own wisdom, he heals when he wants, how he wants, and whomever he wants. Do not be discouraged if God does not heal someone to whom you have been ministering. Our job is to pray. God is responsible for what happens when we pray. Faith to heal the sick Do not worry if the person receiving prayer appears to have no faith for healing. Faith helps, but God sometimes heals sick people who do not believe that he can or will heal them. (Sometimes not even the person praying for the sick person has faith and God still heals them.) Although God promises very little without faith, the power of God is not limited by the fragile faith of men! There are no rules for healing the sick Be flexible. There is no universal rule of how to pray for the sick that applies in all cases. There is nothing special about using certain words. The Holy Spirit is the only safe guide; He can guide you in different ways, from time to time. Practice hearing his voice and following his direction. The Holy Spirit can ask you to pray for something that the person has not even mentioned. In this case, include this in your prayer; however be careful and sensitive! Get clear and objective feedback as you pray Do not be afraid to ask if the person feels better or not. You must learn to overcome concern for your own reputation so that you can be a clean channel for God’s use. You are a minister and God is the agent of healing. He is the Lord and you are the servant.
global_01_local_2_shard_00001658_processed.jsonl/10177
User Tools Site Tools Programming Reference/Librarys Question & Answer Q&A is closed Table of Contents (:cell width=55%:) Used for communication between the Arduino board and a computer or other devices. All Arduino boards have at least one serial port (also known as a UART or USART): Serial. It communicates on digital pins 0 (RX) and 1 (TX) as well as with the computer via USB. Thus, if you use these functions, you cannot also use pins 0 and 1 for digital input or output. You can use the Arduino environment's built-in serial monitor to communicate with an Arduino board. Click the serial monitor button in the toolbar and select the same baud rate used in the call to begin(). The Arduino Mega has three additional serial ports: Serial1 on pins 19 (RX) and 18 (TX), Serial2 on pins 17 (RX) and 16 (TX), Serial3 on pins 15 (RX) and 14 (TX). To use these pins to communicate with your personal computer, you will need an additional USB-to-serial adaptor, as they are not connected to the Mega's USB-to-serial adaptor. To use them to communicate with an external TTL serial device, connect the TX pin to your device's RX pin, the RX to your device's TX pin, and the ground of your Mega to your device's ground. (Don't connect these pins directly to an RS232 serial port; they operate at +/- 12V and can damage your Arduino board.) The Arduino Due has three additional 3.3V TTL serial ports: Serial1 on pins 19 (RX) and 18 (TX); Serial2 on pins 17 (RX) and 16 (TX), Serial3 on pins 15 (RX) and 14 (TX). Pins 0 and 1 are also connected to the corresponding pins of the ATmega16U2 USB-to-TTL Serial chip, which is connected to the USB debug port. Additionally, there is a native USB-serial port on the SAM3X chip, ''SerialUSB. The Arduino Leonardo board uses Serial1 to communicate via TTL (5V) serial on pins 0 (RX) and 1 (TX). Serial** is reserved for USB CDC communication. For more information, refer to the Leonardo getting started page and hardware page. (:cell width=10%:) (:cell width=35%:) (:tableend:) Source: arduino/communication/serial.txt · Last modified: 2013/02/15 20:45 (external edit) Impressum Datenschutz
global_01_local_2_shard_00001658_processed.jsonl/10178
Configuring Deployment Server(s) Now that we've looked at what Deployer is, its directory structure, and installed it, it's time to start configuring our setup, so that we can get ready to run a deployment on our code. The Main Configuration File Deployer looks for a file in the current working directory called deployer.php. At its simplest, it's nothing more than a PHP file which contains the configuration Deployer will need to know where, and how to deploy. Conceptually, you can break this down in to several parts. Firstly, you setup the servers which can be deployed to, whether local, remote, or both. Then you have runtime settings, such as the code repository, and number of releases to keep (for rollbacks). Then you have the task configuration. You don't need to add in custom tasks, as you can make use of a range of in-built ones. But if you need to, which may often be the case, you can add them. Then you configure your core deployment task, which can be either a custom task itself, or the composition of one or more existing tasks. After that you specify any hooks which run either before or after a task, such as a notice to say that the deployment's done, or reloading Apache or Nginx. Now, let's step through up until the server settings. In the next lesson, we'll pick up with creating and configuring tasks. Setting Up Your Server Configuration Firstly, we need to include the composer autoload script, which is common place today. Then I'll include an existing recipe. As I hinted at earlier, a recipe is, essentially, a set of existing tasks, based around a particular use-case. In this case, the composer recipe is a simple set of tasks which could be expected to be needed in a simple, composer-based application. It includes running composer, creating directories, creating symlinks and so on. Perfect for my simple application. The manual indicates that, in time, there will be recipes for a number of the major PHP frameworks, Zend Framework, Yii and Laravel. Fortunately, a basic Symfony recipe is already in place. Local Server In my simple scenario, I'm creating one local server, which will be my local testing copy of the application, and one remote server, for production. First I'll create the local server configuration, mainly as it's the simplest. I'll do that by calling the localServer(), giving it a name, that being testing. Then, using the available fluent interface, I'll specify the user to use, which is my local user account, the stage name, testing, and then set an environment variable, which is the deployment path, by specifying the key of 'deploy_path', and the key to the path to deploy the files to. I don't need a special configuration in this case, so one environment variable's enough. But if you need other environment variables, then add more calls to env(), as required. Remote Server Now let's setup the remote server. As it's remote, it'll require some authentication to obtain access. User Credentials Similar to localServer(), this time, to work on a remote server (which can be a virtual machine), I'll call server(), passing in the name, hostname or IP address, and the port. After that, I'll specify the user and password credentials, the stage, and the deployment path, as before. SSH Keys Nice and simple right? Deploying to this host, Deployer would login to, using the credentials of vagrant/vagrant and deploy to /home/vagrant/deployer. But what if you're working with a host such as Digital Ocean, which uses SSH keys? Then you're going to need a slightly different approach. In that case, remove the call to password, replacing it with a call to identityFile(). What this does is to make use of your ssh public and private keys during the authentication process. I'll assume that, if you need to take this approach, that you've already setup your public key on your remote host, after creating them locally. Assuming that your ssh keys are stored in the default location of .ssh, then you don't need to pass anything to the method. If they're not, or you want to be specific, you can pass to the method, firstly your public key path, then your private key path, then the pass phrase, if required. To learn about public keys, and generating them, check out this post from GitHub. SSH Config Files Now using SSH keys is better than specifying credentials, as it's more secure. But what about adding a bit of extra simplicity and avoiding code? If that's what you're keen on, then you have two options. You can either use an ssh config file, or a Server config file. An ssh config file is a little outside the scope of this series, but in essence, is a way of specifying how to work with a server. Take the following example Host dev Port 22000 User fooey This file specifies that when an attempt is made to connect to, to connect on port 22000 and provide the username of fooey. If that sounds like a good approach, or one which you're required to use, you can find out more about them in this great post from Joël Perras. ***To use them, remove the calls to the pass, and identityFile() method, instead making a call to configFile(), passing the path to your SSH config file.  Server Config Files Now let's look at one more option, a server file. This allows us to specify all of the options outside of code, which can often time be a good thing. Have a look at the following example: user: www identity_file: ~ stage: production deploy_path: /home/www/ Using the YAML file format, this provides all of the details we've seen so far; those being the environment, hostname, user, whether to use an identity file or not, and the deployment path. Personally I quite like this approach, as I find it neater and simpler. To use it, once the file's created, in deploy.php, I'll add a call to serverList(), passing the name of the configuration file. Then, in my server configuration, I only need to make a call to stage(). The configuration file handles the rest. There is one final option, which is a PEM file. But I'm not covering that in this series. # Title Duration 1 Introduction to Deployer 04:41 2 Installing Deployer 05:17 3 Configuring Deployment Server(s) 07:14 4 Deployer Settings 06:43 5 Running Your First Deployer Deploy 04:53
global_01_local_2_shard_00001658_processed.jsonl/10195
How to use our site (Advanced search) Log in     (Subscribe)  (I forgot my password) International Conference on Data Science and Analytics 23rd to 23rd September 2017 Coimbatore, Tamil Nadu, India Website: http://rathinamcomputerscience.blogspot.in/2017/02/international-conference-on-data.html Contact person: Dr. R. Muralidharan Organized by: Rathinam College of Arts and Science Deadline for abstracts/proposals: 12th August 2017 Check the event website for more details. Share on Facebook
global_01_local_2_shard_00001658_processed.jsonl/10228
I have been kicking myself a lot lately due to my lack of writing.  I have been witing a little here and there on two different books. I didn’t think I had made much progress, but turns out I got 5000 words written.  Still not enough to get over writing burnout, but it’s a good start Also, the original version of Halfway is available amazon.
global_01_local_2_shard_00001658_processed.jsonl/10231
Interview: Michaela MacColl Today we’re talking with Michaela MacColl, author of Prisoners in the Palace. Welcome to Damsels in Regress, Michaela! Tricia, thanks so much for the opportunity to speak with your readers. I’m delighted to be here. 1. How did Liza’s story come about? I wanted to write about the young Princess Victoria. But I didn’t want to be constrained in my plot by what would be historically accurate. One of my critique partners kept suggesting that Victoria needed to leave the palace and get into big trouble in London. Unfortunately, Victoria would never have been able to avoid her guardians long enough to get into London. So I needed to create another character who could be intimate with the Princess but who had freedom to move about and have her own adventures. At first, Liza was going to be a young lady with pretensions of being a reporter who would go “undercover” at the Palace. But the more I worked on that angle, I realized it was too modern. So she became a girl who had lost everything and needed a job. 2. I really enjoyed all the historical detail in this book, such as the wood box built into the wall.  What kind of research did you do? Prisoners in the Palace was originally suggested to me by an editor. She wanted to see a book like Philippa Gregory’s (The Other Boleyn Girl) about a young Victoria. I was interested, but I didn’t know a whole lot about Victoria. So I went to the library and took out two major biographies on Victoria, a traditional one and another that was pretty recent. After I got a sense of her whole life, I began to concentrate just on her childhood. As you begin to write, you find you need specific information. For instance, I needed to understand the layout of Kensington Palace, how the servants functioned in a large house and just who was Inside Boy Jones? Each topic I looked up individually, starting with the internet, but usually ending up with books or journal articles. I use the library often, along with inter-library loan. University libraries are handy for more obscure information. You need to know when to stop. For instance, when you read a new biography and pick up only a single new detail that you didn’t know before… then you’re approaching the end. Inside Boy was a real person, but as for living in the wood box, I made that up—sorry! 3. I’ve read stories about young ladies having to become governesses, but never about one becoming a lady’s maid. Did you come across a situation like this in your research? The decision to make Liza a maid was based on what was possible. Victoria already had a governess who had to be approved by the King. Also, a governess has to be older and I wanted to make these girls the same age. Once you eliminate governesses, there aren’t a lot of choices to get Liza into Kensington Palace. The sub-plot of Annie, the disgraced maid, was based on historical fact. I came across a single line in a book about Victoria’s childhood that referenced a maid, Annie Mason, who was dismissed for lewd behavior. 4. I don’t usually talk about book covers in an interview, but yours is stunning.  Not only does the back cover cleverly tell about the story as a news sheet, but the picture on the front—well, let me say, in certain light those eyes followed me across the room. Did you have any input on how it was developed? They follow you, too? It is an amazing cover, isn’t it? I was expecting the typical stock photograph of a girl in a beautiful dress. But Chronicle prides itself on thinking about design. The editor and an in-house designer work together to create three separate designs. They take these mock-ups to a big meeting with Editorial, Marketing and Sales. Everybody has to agree. Here’s a blog post from Chronicle’s designer Amy Achaibou. I wasn’t really consulted until the design was pretty much set. That’s okay though—I never would have thought outside the box like that. I was consulted on the back cover. My editor had the idea to reference Victorian newspapers and asked me to write several mini-articles about the book. I don’t know many authors who got to write the cover copy! 5. What were your favorite books as a teenager? I was into literary mysteries as a teenager (Dorothy Sayers, Ngaio Marsh) but also had an enormous crush on Jane Austen (except Northanger Abbey—can’t stand that one). 6. I’ve enjoyed those authors as well.  What are you working on now? I just handed in the final edits of a novel about Beryl Markham. (We don’t have a title yet.) She was an aviator in the 1930’s who was the first person to cross the Atlantic solo going East to West. It was a much more difficult flight in that direction than from say New York to England. She crashed, but survived. She wrote about her adventures in a brilliant memoir called West Into the Night.  Her father was one of the first colonists in the highlands of British East Africa (now Kenya). She grew up hunting with the natives who worked for her father. She was mauled by a lion, survived a sadistic governess and led a revolt from boarding school. The lessons of her childhood gave her the fortitude to survive her flight. I think this novel is for a slightly younger audience than Prisoners in the Palace, but that was where the story took me! Sounds amazing. Thanks for chatting with us! For more information on Michaela and her work, visit her website, www.michaelamaccoll.com. Be sure to stop in on Friday for a chance to win a copy of Prisoners in the Palace. One Response to Interview: Michaela MacColl 1. Audry says: wow, Beryl Markham sounds like an amazing woman! I’ll have to keep my eye out for that book. Also, I now want to see the Prisoners in the Palace cover in person… Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/10264
SingleChildLayoutDelegate class A delegate for computing the layout of a render object with a single child. Used by CustomSingleChildLayout (in the widgets library) and RenderCustomSingleChildLayoutBox (in the rendering library). When asked to layout, CustomSingleChildLayout first calls getSize with its incoming constraints to determine its size. It then calls getConstraintsForChild to determine the constraints to apply to the child. After the child completes its layout, RenderCustomSingleChildLayoutBox calls getPositionForChild to determine the child's position. The shouldRelayout method is called when a new instance of the class is provided, to check if the new instance actually represents different information. The most efficient way to trigger a relayout is to supply a relayout argument to the constructor of the SingleChildLayoutDelegate. The custom object will listen to this value and relayout whenever the animation ticks, avoiding both the build phase of the pipeline. See also: SingleChildLayoutDelegate({Listenable relayout }) Creates a layout delegate. [...] hashCode int The hash code for this object. [...] read-only, inherited runtimeType Type A representation of the runtime type of the object. read-only, inherited getConstraintsForChild(BoxConstraints constraints) BoxConstraints The constraints for the child given the incoming constraints. [...] getPositionForChild(Size size, Size childSize) Offset The position where the child should be placed. [...] getSize(BoxConstraints constraints) Size The size of this object given the incoming constraints. [...] shouldRelayout(SingleChildLayoutDelegate oldDelegate) bool Called whenever a new instance of the custom layout delegate class is provided to the RenderCustomSingleChildLayoutBox object, or any time that a new CustomSingleChildLayout object is created with a new instance of the custom layout delegate class (which amounts to the same thing, because the latter is implemented in terms of the former). [...] noSuchMethod(Invocation invocation) → dynamic toString() String Returns a string representation of this object. operator ==(dynamic other) bool The equality operator. [...]
global_01_local_2_shard_00001658_processed.jsonl/10265
You can view collector and vRealize Operations for Published Applications adapter log files in the vRealize Operations Manager user interface. Log files are organized in log type folders. Verify that you have administrator privileges. 1. Log in to the vRealize Operations Manager user interface with admin privileges. 2. Click the Administration tab, click Support, and click Logs. 3. Select Log Type from the Group by drop-down menu. 4. Double-click the Collector folder and double-click the folder for the node on which the adapter instance is running. 5. View the log files. 1. Double-click a log file to view the contents of the log file. 2. Type line numbers in the Starting line and # of lines text boxes and click the Load log content icon (>) to view a specific part of the log file. 6. Click the Reload Tree icon to reload the log tree information and collapse all open folders.
global_01_local_2_shard_00001658_processed.jsonl/10270
Tuesday, May 29, 2007 The Great Defrag Shootout XII: Power Defragmenter GUI 2.0.125 Power Defragmenter GUI is a freeware utility that works with SysInternals Contig, a freeware utility, and defrag.exe, the command line part of Windows Disk Defragmenter. If you don't like or don't use batch files, this utility is for you. It works like a wizard, giving you choices of what to defrag and how you'd like it done. File selection is a bit clunky, but not unfriendly. Unfortunately it doesn't remember what you selected last time. Finally, when you click "Defragment", the program opens a command window and executes your requests. It's ironic that there is no setup utility for this program, since it is actually a setup utility itself. It was written using Setup Factory 6.0. To install it you download the ZIP file and extract it to a folder. Then you add the Contig software, or click "Yes" to download it. Make a shortcut to the .exe file, and you're in business. I have used Contig extensively, since it is simply the fastest way of defragmenting a single file or directory. This utility provides a GUI front-end to the program, which is nice. The other feature I liked is the "PowerMode Disk Defragmentation" which first uses contig to defragment all the files, and then defrag.exe to tidy up the drive. It's a nice idea, but not as powerful as JkDefrag. How hot is your hard drive? The biggest problem on laptops is cooling, because everything is cramped into such a tiny space. What many people don't realise is that if your hard drive overheats it will fail. Catastrophic failure from overheating will lose more data than if you drop your laptop. You could lose everything. It happened to me. I wish I had found this utility earlier. It's called HDTune, and its most useful feature (for me at least) is that it can tell you the temperature of your hard drive, and warn you if it's getting too hot. Had I seen this warning message when I first bought my IBM ThinkPad laptop, the drive may never have crashed, and I wouldn't have lost weeks worth of time waiting for it to be fixed and reinstalling everything. You can also scan your hard drive for errors and see the speed of the drive. I'm not a hardware junkie so this doesn't mean too much to me, and I use Spinrite from time to time to test the drive properly, so all the other data is lost on me. It isn't always able to get the drive temperature from the hard drive hardware. This depends on the hardware itself. The program is only 392kb in size, and only uses 868kb of RAM when it's running, so it isn't bloatware. For the most part all you see is a small icon in the system tray (next to the time) with a temperature reading. The program can be set to load when you start Windows, and it just works. Brilliant! Monday, May 28, 2007 The Great Defrag Shootout XI: Windows Disk Defragmenter My recent Windows XP reinstall provided a unique opportunity to test out some of the features of the built-in Windows Disk Defragmenter (WDD) program, as well as a nifty free utility called SpeeDefrag that works with it. WDD is based on software developed by Executive Software, now known as Diskeeper Corporation, which Microsoft licensed. SpeeDefrag 5.0.2 is a front-end utility that allows you to run defrag.exe (The command line part of WDD) during a special boot-up session. Once the defrag is completed the PC either shuts down or reboots, depending on the choices you select. It's a clever idea, and well implemented. The only problem is that you are encouraged to install some kind of toolbar in your browser. I chose not to, and would warn anyone running the installer to do the same. The reason I wanted to try using WDD in this way was to get rid of the fragmentation I was experiencing in the master File Table (MFT) on both hard drives. WDD reports the fragmentation, but doesn't fix it. Neither does any of the free software reviewed so far, nor does PerfectDisk 7 or 8. Only Diskeeper fixed it. Since one usually only needs to defrag the MFT once after a major install, you can download the trail version, fix the MFT fragmentation by doing a boot-time defrag, and then uninstalling the software. I know this sounds really mercenary, but I have other reasons why I don't use Diskeeper. The reason I don't use WDD much is shown in the graphic at the top of the page. The "before" stripe (above) is a perfectly defragmented disk, with the exception of the red part which is the MFT. The "after" stripe (below) is the file map as rearranged by WDD. I have no idea why it would want to break up the free space into additional segments, but this is what it does. Its more expensive cousin, Diskeeper, does much the same. WDD complains bitterly when the free disk space goes below 15%, and starts going wrong around the 20% mark. WDD can be scheduled using the standard Windows Task Scheduler, and it has no ability to tell you which block on the display belongs to a particular file. It's a basic utility that can sort out some of the more common fragmentation issues, and if used regularly can make a difference to the performance of a PC. It doesn't get a thumbs up or thumbs down, because it's part of Windows anyway. The next product to be tested is the Power Defragmenter GUI. Update 13 Nov 2007: WDD scored very well in some tests I have been running. The first results are quite encouraging: 32% faster than a fresh WinXP installation. The Cost of Reinstalling Windows: Conclusion It's Monday afternoon and my laptop is finally up and running. Total bandwidth used: 898.21MB downloaded, 32.57MB uploaded. Allowing 100MB for mistaken downloads, and we are looking at 800MB. At R99 per GB, that's around R80. Thank goodness I wasn't using a 56kbps modem. It would have been a lot more if I hadn't kept copies of most of the programs I have downloaded. Then there is the time cost: nearly an entire week of productivity lost. That's around $1100 or R8000, about the cost of a new laptop. Fortunately I had backups, and the opportunity to make copies of all my data files before doing the reinstall. Other people haven't been that lucky. I haven't been entirely unscathed: I didn't know that the faxes sent were not stored in my own user profile, so I lost those. I also didn't know that I should convert from FAT to NTFS only once all the files had been installed. This would have saved a lot of time trying to defrag the Master File Table (MFT) which got defragmented during the installation process. It took Diskeeper to fix it, much to my surprise. I also lost all my IE and Firefox bookmarks. This is probably a good thing since they were hopelessly jumbled anyway. From now on I'll blog (in draft) anything that looks useful. I had also held out on upgrading from Firefox 1.5 to 2, but this catastrophe has proved quite useful, and I like the new Firefox a lot. It's amazing that I rely on NOD32 to protect me from myself so much. I'm glad it's up to the job. Microsoft takes on the free world Microsoft claims that free software like Linux, which runs a big chunk of corporate America, violates 235 of its patents. It wants royalties from distributors and users. Users like you, maybe. Fortune's Roger Parloff reports. Friday, May 25, 2007 The Cost of Reinstalling Windows: Part III The reinstall of my laptop continues. Most of the Microsoft stuff is done, except for SQL Server, since I downloaded the wrong file. It was midnight when I started the download. 8:05am: Begin copying files from Penny's laptop and the DVD backup disks. 9:00am: Download and install iTunes. In typical Apple fashion it crashed the first time, and I had to install it again. This time I disabled the automatic download software, which is brain dead. 9:43am: Discovered that the SQL Server 2000 patch file (44MB) was the wrong one. Begin downloading the 66.9MB correct one (SQL2000-KB884525-SP4-x86-ENU.EXE) instead. 10:30am: Autopage phones with more unsolicited marketing. Will they ever learn? 11:00am: Begin copying c:\dev directory from Penny's machine. This will take the rest of the day. Leave for appointment at Drive Report. 8.00pm: Arrive home after a meeting and site visit and find most of the files copied, but defrag needed to tidy up the mess. Total downloads: 797.81MB, upload 24.91MB. 9:00pm: Milo and SQL Server 2000 SP4 installation. 10:00pm: Reboot. Used TweakUI to log in automatically and disable AutoRun on all drives. 10:42pm: Download SafeXP and PsShutdown. 11:00pm: More Milo, plus finally get to download my emails into Outlook. Set up Gmail and Spamcop accounts. More defrag work needed. Thursday, May 24, 2007 The Cost of Reinstalling Windows: Part II Another day, another reinstall. DBAN on 61%, so I stopped it and rebooted, in order to use the Acer System Recovery disks. 8:05am: coffee and Acer disks. Stepped through entire process. Quite cool 9:15am: First Windows boot. 9:30am: While checking on bundled applications, noticed entire drive was partitioned as single drive (C:). Damn! Reboot, run Fdisk to create C: and D: 9:45am: Begin with system recovery disk 1. Made a note on the CD to run FDISK first. 10:30am: Bingo! First Windows boot. Go through Windows setup finalization. 10:50am: Uninstall Symantec bloatware. 11:00am: Convert drive to NTFS using convert c: /fs:ntfs command. 11:11am: Run Windows Update, select Microsoft Update. 11:45am: Reboot without downloading, in order to install Acrobat 7.08 update, NOD32. 12:10pm: NOD32 installed, Acrobat update installed. 12:11pm: Installed CCleaner, removed Symantec Shared files, Movie Maker, and Windows Messenger files. Cleaned up and ran Rootkit Revealer (without network cable plugged in). Nothing unusual to report. 12:57pm: return to Microsoft Update, selected just Internet Explorer 7 download. Hopefully this will save on some updates. 1:13pm: Windows Validation successful. Ignored other critical updates. 1:33pm: Begin downloading 75 critical Windows updates. I guess IE7 doesn't reduce the critical updates that much after all. 2:12pm: Windows Genuine Advantage notification installed. 2:45pm: Reboot after installing all 75 critical updates. So far total downloads come to 185.44MB. Began downloading NTI CD patches, Google Pack: Skype, Real Player, Google screensaver, Google Desktop. 4:01pm: Begin Sun Java 6.1 Runtime install, and FireFox 2 with Google Toolbar download. 5:20pm: Begin defrag using JkDefrag. Total downloads so far are 326MB. 5:44pm: Start installing Microsoft OfficeXP. 6:30pm: OfficeXP installed, and first round of service packs. Install media CD while additional service packs are downloading. 8:25pm: OfficeXP SP3 installed, now begin downloading another 20 critical updates. Download total now 577.5MB 9:15pm: Install SQL Server 2000 from OfficeXP Developer CDs. 10:05pm: Install Visual Basic 6 Professional and Service Pack 6 11:00pm: Start Office97 and ODE Tools Install midnight: Total downloads: 592.75MB, 17.5MB upload. Wednesday, May 23, 2007 The Cost of Reinstalling Windows: Part I On Monday night I downloaded and installed a Trojan, believing it to be a legitimate file. If I had been using NOD32, the trojan would have been caught. I wasn't, but that's another story. Now I have to erase my hard drive and reinstall everything. No, I won't be installing Windows Vista, thank you. Been there, done that. I spent most of Tuesday recovering from shock and trying to explain to eEye why I think that Blink Personal Security didn't provide me with any security at all. And I'm sorry, but 90% isn't good enough. Condoms are more secure. Last time I installed WinXP on Penny's broken laptop I measured the total download volume required to get Windows XP SP2 up to date. It was around 90MB. This time I'm going to be a bit more realistic, and include all the downloads and all the patches required, not only for Windows, but OfficeXP and 65 other programs that I have to install. I also plan to document how long this all takes, so this blog entry is going to be an ongoing one for the next few days. It's now 2pm and I have backed up all the data files I need, either on DVD, CD or another hard drive. Time to reboot and insert the WinXP SP2 boot disk. 2:10pm: Boot up off Windows XP SR2 CD, delete C: partition. 2:15pm: Slow format of C: partition begins. 2:42pm: Windows installer reboots from C: drive for the first time. 2:50pm: Type in Product Key, other machine name details. 3:22pm: First desktop. Install NOD32 from flash drive, begin definitions update. 3:48pm: NOD32 scan stops on D: drive files. Damn! Infection still around somewhere, or a corrupted file perhaps. Take no chances: wipe the entire drive. Insert DBAN CD and begin wiping entire hard drive. This will take a while (i.e. all night). So far the PC has downloaded 8.11MB, uploaded 392kb. What a way to spend a birthday. Microsoft oPhone Are these guys having a go at the iPhone by any chance? Tuesday, May 22, 2007 One Blink and you're infected I listened to a recent Security Now interview with one of the founders of eEye Security. Mark Maiffret mentioned the Blink Personal Security product, and that it was an all-in-one security solution for individual users. I decided to try it. What a fool I was. I first tried to download the free "Blink Neighbourhood Watch" version, which requires you to run it without any other antivirus product installed, even though it doesn't have its own antivirus engine. I guess that's why it's free: anyone nutty enough to run Windows without an antivirus program is unlikely to be interested in protection against other unknown vulnerabilities. Blink won't install if you have NOD32 istalled. I should have stopped there; I didn't. Instead, I paid real money for the Blink Personal Edition because I don't live in North America, where the product is free for the time being. But I was nervous about no antivirus protection on my machine. I won't bore you with the hassles I had replacing the free serial number with the paid one, other than to say that it required a reinstall, and was a warning of further hassles to come. I noticed that when using Blink my machine's performance was sluggish, but I foolishly decided that the "extra protection" I was getting was worth it. It isn't. I noticed that the ePower_DMC service was running at a consistent 15%-20% CPU utilisation, unless I turned off the "Application Protection" service. I also found that if I disabled checking on some large data file types, such as *.mdb, *.mdf and *.ldf (SQL data files) then my Access programming work was not too badly affected. Then, last night I was infected with a Trojan. I admit I was a fool to download it in the first place, but I was used to NOD32 being able to warn me about dodgy web sites and dodgy files. I should have double-checked by using NOD32 on Penny's laptop, but she was asleep already. Obviously the Norman antivirus engine is brain-dead compared to NOD32, and it let this one through. The image at the top of this article shows the results of a "Full Malware Scan": two false positives, one for BearShare, that has never been installed, and one for riched32.dll, which is a Microsoft file that I wasted considerable time checking. Also, the support forum is a joke. Anyone can post anything without even registering, so today there was a spam posting about Cialis, FFS! There is no way you can track replies to the posts, or even do a search on previous posts. This is not a good way to treat a paying customer. The software is klunky: you can look at the names of the Malware enties in quarantine, but you can't get any details about them, such as the file name, file size, version number, etc. You have to look through the logs. And you can't search the logs unless you export them to a text file and use notepad. There is no right-click option to scan a directory or file for malware or viruses, you only have the option of a scan of the entire machine. You can't find out the date of your virus definitions, unless you find the relevant log entry. I found an entry telling me the virus definition date was 05/07/2007. Either that's two weeks old or it thinks the definitions are dated for July. There is an "Application Firewall" that monitors activity of installed apps (unless its a trojan like mine) and pops up and asks all kinds of dumb questions. For the first few days this is quite disruptive, especially if you give the wrong answer and disable the clock, Hamachi, SQL Server or whatever. I guess this limits the appeal of the product to techies, but I doubt whether techies will put up with the rubbish I had to. I'm also fed up because when I reported the problem on their forum, the post got deleted. Blink has been downloaded 13000 times since the Security Now podcast. I wonder whether the average experience has been good or bad. I hope for eEye's sake it is better than mine. Their slogan "Vulnerability is Over™" should read "Vulnerability is Over Here". They claim to be able to detect 90% of all malware. Condoms have a better success rate than that! I have been spoilt by NOD32, which is lightning fast and super-accurate. In the last few years I have used it I have not been infected with any viruses or trojans, which has saved me a lot of hassle and time. Now NOD32 won't install because it picks up the infection, and the Symantec Security check thinks everything is fine, except for Remote Administrator, which it thinks is malware. The Trend Micro Housecall scan detected part of it, but picked up some false positives as well. I suspect it won't be able to remove it, which means I have to reinstall everything. Monday, May 21, 2007 The Great Defrag Shootout X: Diskeeper 2007 Professional and Pro Premier This has been the most difficult review to write, because I feel like I'm swimming against the tide of public opinion, and I've had bad experiences with Diskeeper in the past. It's also the most expensive product reviewed. As time went on the review became easier as using the product became more loathsome. It's also the first product I have ever encountered that is both paranoid and self-defeating. When you install it, it removes the built-in Windows Disk Defragmenter (WDD), and even replaces the icon in the "Start->Programs->Accessories->System Tools" menu with its own. I assume this is to ensure that it is used for disk maintenance, rather than WDD. But the sceptic in me tells me Diskeeper doesn't want you to see that it isn't much of an improvement from WDD; hence "paranoid". It's self-defeating because the help file basically admits it can't work properly when free disk space gets low. Consider this extract: Getting More Free Space If your volume is extremely full, there may not be sufficient free space to effectively defragment the files. In this case, here are several suggestions: You can temporarily move some of the files off the volume, particularly large files. This temporary measure often allows Diskeeper the "working room" it needs to complete the defragmentation process. Also, this allows Diskeeper to defragment the free space on the volume, increasing the possibility that the temporarily-moved files can be moved back to the volume in a contiguous (or at least less fragmented) condition. There are often a number of temporary files stored on your computer, and deleting these files can help you gain more free space. [snip] You can empty the Windows Recycle Bin on the volume in question. By default, when you delete files on most Windows systems the files are not really deleted—they are instead moved into the Recycle Bin, so they still take up disk space. Emptying the Recycle Bin does delete the files, thus creating more room for Diskeeper to do its work. While I agree that a simple program like CCleaner will reduce the clutter on your PC, the reason why I needed a program other than WDD was to sort out the tangled mess my large files were getting themselves into that WDD wasn't able to sort out. I fail to see why I should keep 15-20% of my drive unused simply because my defrag program can't deal with my large files. That's what Diskeeper expects. Why doesn't Diskeeper completely consolidate the free space on my volume? There are several factors that can prevent the free space on a disk volume from being defragmented: • A fragmented paging file. • A large number of directories on the volume. • On NTFS volumes, a portion of the free space on a volume is reserved by the operating system for the Master File Table (MFT). It is important to know that having all of the free space in a single, contiguous piece provides very little (if any) performance benefit. Free space fragmented into hundreds of pieces will impact disk performance, but free space that’s in a few pieces should not have any effect on the performance of your disk. So on the one hand Diskeeper doesn't make any major effort to sort out the free disk space, and on the other hand it states that if there isn't enough free disk space it can't (or won't) defrag large files. This is a self-defeating approach, and when it hits you you'll wish you never paid good money for this program. Just uninstall it and buy a decent program to begin with. It's slow. Very slow. Not all the time, mind you, but in the case of my C: drive it took anything up to 20 minutes, and always longer than 10 minutes, just to analyse the drive; other programs reviewed took less time to defrag the drive. Removing certain crucial large compressed files fixed this, but I need those files! The image above shows the analyse screen after 11 minutes, timed using DS Clock. Not even WDD takes that long! There seems to be a flaw in Diskeeper that prevents it from dealing correctly with large, compressed files, fragmented or not. Apart from slowing the analyse process down, once the analysis is complete it shows the wrong answer. This may explain the problems I encountered in actually getting the drive defragmented. In the picture above it is getting the size of the file wrong because it only occupies 1441MB, not 3488MB as shown, so its "Excess Allocation" error message is misleading. On another occasion it clearly showed some red fragmented files on the screen, but the list of fragmented files was completely empty. I enabled the automatic background defragmentation process, and noticed the hard drive activity increased, especially when I wasn't busy. The user interface has a time line which shows how many fragments have been removed on a daily basis, and also the maximum and minimum number of fragments present on each drive. Presumably this is done to show how well Diskeeper is doing. Conversely it also shows how much Diskeeper isn't doing. The total of over 6000 fragments were generated through normal PC use in spite of their "revolutionary InvisiTasking™ technology" which is supposed to defragment the machine on the fly. The program is fairly easy to use, and it has some nice interface and information features, but no way of being able to associate a given red area on the drive map to a particular file. Diskeeper has a concept of "just enough" fragmentation of large files, where it will not use excess time and resources to further defragment a "large" file if there is no performance improvement. Even with this disabled, Diskeeper is not good at defragmenting large files. Here are 3 successive attempts at getting my hard drive tidy using the "Professional" version: In each case Diskeeper has ignored some files, and not made any attempt at consolidating the free disk space. This is the same problem I experienced with Diskeeper version 7 and 8. In desperation I uninstalled the $49.95 Professional version and tried the even more expensive Pro Premier ($99.95) version. It is the most expensive product in this category, and also the most underwhelming. I wanted to see if the "Intelligent File Access Acceleration Sequencing Technology" or I-FAAST™ feature would make a difference. It did (see below), but certainly not $50 worth! The default setting in Diskeeper is to detect removable storage devices, so when I inserted my iPod Shuffle, DKSevice.exe crashed. After rebooting the PC and disabling removable drive detection, no further problems were encountered. The "revolutionary InvisiTasking™ technology" doesn't work as well without the I-FAAST™ feature, and when it does work, it doesn't notice when you start using your machine again. I happened to double-click on an MP3 file it was busy with, and got a nasty error from WinAmp. A few minutes later the file played fine. The picture above was taken on Sunday at 4pm, after I had removed the 2 large SQL data files, defragmented the drive without them, and then put them back. You can see how the compression process fragments the files. Five hours later, with a bit of prodding by getting Contig to defrag all the other files on the drive, this is the result. I was unable to get this with Diskeeper 2007 Pro, only with Diskeeper 2007 Pro Premier, and only after specifically identifying the two files as being priority files for the I-FAAST system. I guess that in terms of the Diskeeper hype-powered marketing pitch, that makes me a gullible "power user" who will happily part with $100 just to keep his disk tidy. I was suckered once, I'm not going to be suckered a second time. For $100 I could buy both Vopt 8 and PerfectDisk 8, with change to spare. Either one of them could do a better job, and faster too. I also find the Diskeeper install process somewhat insulting. They create a "Diskeeper Corporation" program group in "Start->Programs", and then put a single icon in there. Why? No uninstall, no link to their web site, no help file, nothing. If there is only one icon, just do me a favour and put it in "Start->Programs" and save me some time, FFS! I have left the best feature till last: the uninstall. Unlike version 8 which left residue that made WDD unworkable until I hacked it, this one does restore WDD when you uninstall Diskeeper. I recommend uninstalling it. I did. Twice. Even so, Diskeeper 2007 it left a desktop shortcut behind and a reference in the registry to AUTONTFS. Have these people no shame? I have not decided what to review next: DiskMD didn't make it out of the starting block, since you have to buy it before you find out whther it's any good. In the meantime, I suggest you try my combination of freeware defrag utilities. Download it here. It's certainly better than Diskeeper. Update: Monday 28th May 2007: It seems that Diskeeper is one of the only programs actually able to defrag the Master File Table (MFT). Because I converted my FAT32 partition to NTFS before I had reinstalled everything, the MFT doubled in size while I installed all the Office files and other applications. After trying PerfectDisk 8, JkDefrag, and Windows Disk Defragmenter, Diskeeper did the trick. When I uninstalled it I didn't get the errors reported above. I have contacted Raxco to find out why PD wasn't able to defrag the MFT, when it claims to be able to so. I did not receive a reply. Update: Friday 8th June 2007: It would appear that Paragon Total Defrag 2007 can not only defragment the MFT, but also reduce its size, something no other defrag program can do. Update: Wednesday 24th October 2008: DK 2008 has been released, and I'll be testing it for the next few weeks to see if it really lives up to its claims. I'm not optimistic but I hope to be proved wrong. See First Impressions. The Great Defrag Shootout: Part I | II | III | IV | V | VI | VII | VIII | IX | X | XI | XII | XIII | XIV | XV | XVI | XVII | XVIII | XIX | XX | XXI | XXII | XXIII | XXIV | XXV | XXVI | XXVII | XXVIII | XXIX| winner | all | why | digg story | Benchmarks: DK2008 and DK2007
global_01_local_2_shard_00001658_processed.jsonl/10272
So this is a exaggeration obviously, but since Sean is teething he is really really cranky at mealtimes. He is also very particular about how he eats. a bite of food and then a sip of water…or not. I like rice today, but tomorrow…? He is quite a puzzle. I’m hoping that it is all because his teeth are coming in and that he will eat normally once this phase is over. fingers crossed. Kayden on the other hand has trouble eating because he is so amused with what Sean is doing. If Sean turns his head angrily…fits of laughter from Kayden. If Sean takes his bib off and throws it on the floor…fits of laughter from Kayden. I’m working on teaching Kayden that he can’t laugh when Sean does these things because it encourages the bad behavior. “I can’t help it!” he says smiling back at me.
global_01_local_2_shard_00001658_processed.jsonl/10290
The question came from one of the back rows of my freshman level intro to theatre class in response to the first discussion of the dramaturg’s role in the theatrical process. The tone was a mixture of confusion and disbelief (that can’t be a real word, it seemed to say): “Drama-who?” It is a real word, and the dramaturg may be the most important element of pre-production preparations; the dramaturgical research informs the work the director, actors and designers will do throughout the rehearsal process. Simply put, a dramaturg provides the context for the play. This can include the historical background of the time and place the play takes place in, the history of the script itself and the playwright who wrote it, and the meaning behind specific references. Our dramaturg for Spinning into Butter is Cheryl Scofield (she did a fantastic job in that role for The Sweetest Swing in Baseball as well), and these are some of the questions she asked and issues she focused on as she started her research for this project: • What is life like on an older New England college campus? What would the academic environment be like? What regulations, traditions, etc. would they have? • What is the hiring process for professors and administrators at a school like Belmont College? • Overview of Nuyorican culture and history • Incidents of racially motivated crimes on college campuses • Background of African-American literature in general, focusing on specific authors and books mentioned in the script • Literature on race relations from different cultural perspectives • Overview of specific courses mentioned in script (i.e. Art Appreciation) This is a small sampling of the issues raised by the script, and the questions the director, designers and actors have been exploring for the last few months. These are some of the issues we’ll be talking about at our post-show discussions as well (starting next weekend as I write this), and I’ll be sharing some of Cheryl’s research here to add to that conversation. The purpose of this blog is to give our audience the opportunity to be a part of the conversation anytime – leave us comments, ask questions, share your thoughts and answers, suggest discussion topics, and join us for a post-show discussion at the theatre during the run. We’re in previews tonight and tomorrow, we open Monday night, and we’re looking forward to hearing from you. Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/10300
Neonol AF 9-4. Ethoxylated Nonylphenol. Oxyethylated monoalkyl phenol (neonol AF 9-4) derived from propylene trimers is a high-effective non-ionogenic surfactant. It is used for watering of oil-bearing strata for stimulation of oil production, for well drilling, in textile, pulp and paper, woodworking industries, as a component of lubricating and cooling, hydraulic, and other process fluids, in ferrous metallurgy, as an active base for technical detergents, stock material for synthesis of some active bases for textile and auxiliary products, and in some other branches of industry. Design specification: TU 2483-077-05766801-98 Empiric formula: C9H19C6H4O(C2H4O)4H Platinum Cobalt scale color, Hazen, max.150 Nonionic surfactant water solution cloud point with concentration of 10 g/dm3, °С Hydrogen ions concentration (pH) of nonionic surfactant water-alcohol emulsion with concentration of 10 g/dm37.0±1.0 Added ethylene oxide mass content, %44.2±2.0 Water mass content, %, max.0.5 Polyethylene glycols mass content, %, max.1.0 Supply form: Transparent oily liquid with color ranging from colorless to yellowish. Packaging: Neonol AF 9-4 is shipped in railway tank cars with bottom discharge, tank-trucks and steel drums. Transportation: Neonol AF 9-4 is transported by railway and motor transport. Storage: Neonol AF 9-4 stored in steel tanks under nitrogen blanket, under conditions excluding ingress of mechanical impurities and moisture.
global_01_local_2_shard_00001658_processed.jsonl/10304
Six Myths about the Teaching of Listening There are six myths or half-truths that are related to the teaching of listening during the process of language learning. They are false rituals which need to be analysed and put into question. Let’s consider them. 1. Listening can’t be taught: In fact there are many things teachers can do to help students listen effectively. Teachers can continually expose their students to appropriate listening material which should be followed by good practice activities which give students opportunities to listen successfully and build confidence in listening skill. Teachers can teach students some strategies which can guide them to efficient listening. 2. Listening is a passive skill: Listening is not passive but on contrary it is extremely active. During listening students do many activities. They guess, predict, infer, criticize and above all they interpret. Clearly it is a receptive rather than a passive skill. 3. For students, understanding foreign speakers of English is easier than understanding native speakers. Of course it depends on other conditions such as the speed of the speaker talk and the amount of exposure to the target language. A further point is that the type of English students are exposed to affects their performance in the listening work they do in classroom. 4. Listening to a foreign language and listening to our native language involve same skills: There are some differences in applying these skills. When we listen to our language we listen with “half an ear” that is without concentrating fully but still we understand the message. On the other side when we listen to a foreign language, we often need to pay full attention to the message to understand. 5. Students should understand every word while listening in the classroom: It is not necessary as speech usually consists of words that are not important. Spoken language includes redundancy which makes listening easier because it allows us not to focus fully on every word. But one important point must be considered here, students can afford not to listen to every word when they have a command of basic grammar and vocabulary. In this case, they will be able to decide which words are significant and which ones they can ignore. 6. Students shouldn’t be allowed to read the scripts of recordings: When it happens, it may be said that students will focus on the reading more than the listening. The solution here is to use the script at the final stage after students listen to the text at least twice. Overall, it must be said that the exposure to the script has its benefits such as allowing students to see the difference between the written and spoken form of words. It also allows them to see which words are “swallowed” and notice prominent grammar points. Guidelines to Consider When Teaching Listening listening is learning 1. Relate listening to students’ interests, goals and experiences to keep their motivation and attention high. 2. Select authentic material both in language and tasks. Language should reflect real discourse using videos, audio tapes and TV or radio broadcasts of actual exchanges. 3. Give opportunities to develop both top-down and bottom-up processing skills * Top-down activities = discussing what students already know about the topic. * Bottom-up activities = practicing components of the language ( sounds, words, intonation, grammatical structure ) 4. Encourage development of listening strategies such as predicting, asking for clarification, using non-verbal cues, … that increase the chances for successful listening. * e.g. using videos: When sound off, students make predictions and answer questions about setting, actions, interactions, … When sound on, students confirm or modify predictions. 5. Teach activities not test them: – Don’t focus on memory rather than on the process of listening. – Don’t give practice rather than help students develop listening ability. e.g. * having students listen to a passage followed by true/false questions might focus on the learners’ ability to remember rather than help them to develop the skill of determining main idea and details. – Pre and post listening activities should help students focus attention on what they listen so that they can transfer the listening skill to the world beyond the classroom.
global_01_local_2_shard_00001658_processed.jsonl/10315
Open main menu Wikipedia β Pietro Alessandro Gaspare Scarlatti (2 May 1660 – 22 October 1725) was an Italian Baroque composer, known especially for his operas and chamber cantatas. He is considered the founder of the Neapolitan school of opera. He was the father of two other composers, Domenico Scarlatti and Pietro Filippo Scarlatti.[1] Alessandro Scarlatti Alessandro Scarlatti.jpg Born Pietro Alessandro Gaspare Scarlatti[1] (1660-05-02)2 May 1660 Palermo or Trapani, Sicily[1] Died 22 October 1725(1725-10-22) (aged 65) Naples, Italy[1] Nationality Italian Occupation Composer Years active 1679–1722 Notable work • Gli equivoci nel sembiante (1679) • L’honestà negli amori (1680) • La principessa fedele (1710) • Il Tigrane (1715)[1] Style Baroque Scarlatti was born in Palermo (or in Trapani[2][3]), then part of the Kingdom of Sicily. He is generally said to have been a pupil of Giacomo Carissimi in Rome, and some theorize that he had some connection with northern Italy because his early works seem to show the influence of Stradella and Legrenzi. The production at Rome of his opera Gli equivoci nel sembiante (1679) gained him the support of Queen Christina of Sweden (who at the time was living in Rome), and he became her maestro di cappella. In February 1684 he became maestro di cappella to the viceroy of Naples, perhaps through the influence of his sister, an opera singer, who might have been the mistress of an influential Neapolitan noble. Here he produced a long series of operas, remarkable chiefly for their fluency and expressiveness, as well as other music for state occasions. In 1702 Scarlatti left Naples and did not return until the Spanish domination had been superseded by that of the Austrians. In the interval he enjoyed the patronage of Ferdinando de' Medici, for whose private theatre near Florence he composed operas, and of Cardinal Ottoboni, who made him his maestro di cappella, and procured him a similar post at the Basilica di Santa Maria Maggiore in Rome in 1703. After visiting Venice and Urbino in 1707, Scarlatti took up his duties in Naples again in 1708, and remained there until 1717. By this time Naples seems to have become tired of his music; the Romans, however, appreciated it better, and it was at the Teatro Capranica in Rome that he produced some of his finest operas (Telemaco, 1718; Marco Attilio Regolò, 1719; La Griselda, 1721), as well as some noble specimens of church music, including a mass for chorus and orchestra, composed in honor of Saint Cecilia for Cardinal Acquaviva in 1721. His last work on a large scale appears to have been the unfinished serenata for the marriage of the prince of Stigliano in 1723. He died in Naples in 1725 and is entombed there at the church of Santa Maria di Montesanto. Scarlatti's musicEdit Scarlatti as a young man. His early operas—Gli equivoci nel sembiante 1679; L'honestà negli amori 1680, containing the famous aria "Già il sole dal Gange"; Il Pompeo 1683, containing the well-known airs "O cessate di piagarmi" and "Toglietemi la vita ancor," and others down to about 1685—retain the older cadences in their recitatives, and a considerable variety of neatly constructed forms in their charming little arias, accompanied sometimes by the string quartet, treated with careful elaboration, sometimes with the continuo alone. By 1686, he had definitely established the "Italian overture" form (second edition of Dal male il bene), and had abandoned the ground bass and the binary form air in two stanzas in favour of the ternary form or da capo type of air. His best operas of this period are La Rosaura (1690, printed by the Gesellschaft für Musikforschung), and Pirro e Demetrio (1694), in which occur the arias "Le Violette", and "Ben ti sta, traditor". From about 1697 onwards (La caduta del Decemviri), influenced partly perhaps by the style of Giovanni Bononcini and probably more by the taste of the viceregal court, his opera arias become more conventional and commonplace in rhythm, while his scoring is hasty and crude, yet not without brilliance (L'Eraclea, 1700), the oboes and trumpets being frequently used, and the violins often playing in unison. The operas composed for Ferdinando de' Medici are lost; they might have given a more favourable idea of his style as his correspondence with the prince shows that they were composed with a very sincere sense of inspiration. An autograph manuscript of Scarlatti's Griselda Mitridate Eupatore, accounted his masterpiece, composed for Venice in 1707, contains music far in advance of anything that Scarlatti had written for Naples, both in technique and in intellectual power. The later Neapolitan operas (L'amor volubile e tiranno 1709; La principessa fedele 1710; Tigrane, 1714, &c.) are showy and effective rather than profoundly emotional; the instrumentation marks a great advance on previous work, since the main duty of accompanying the voice is thrown upon the string quartet, the harpsichord being reserved exclusively for the noisy instrumental ritornelli. In his opera Teodora (1697) he originated the use of the orchestral ritornello. His last group of operas, composed for Rome, exhibit a deeper poetic feeling, a broad and dignified style of melody, a strong dramatic sense, especially in accompanied recitatives, a device which he himself had been the first to use as early as 1686 (Olimpia vendicata) and a much more modern style of orchestration, the horns appearing for the first time, and being treated with striking effect. Besides the operas, oratorios (Agar et Ismaele esiliati, 1684; La Maddalena, 1685; La Giuditta, 1693; Christmas Oratorio, c. 1705; S. Filippo Neri, 1714; and others) and serenatas, which all exhibit a similar style, Scarlatti composed upwards of five hundred chamber-cantatas for solo voice. These represent the most intellectual type of chamber-music of their period, and it is to be regretted that they have remained almost entirely in manuscript, since a careful study of them is indispensable to anyone who wishes to form an adequate idea of Scarlatti's development. His few remaining Masses (the story of his having composed two hundred is hardly credible) and church music in general are comparatively unimportant, except the great St Cecilia Mass (1721), which is one of the first attempts at the style which reached its height in the great Masses of Johann Sebastian Bach and Ludwig van Beethoven. His instrumental music, though not without interest, is curiously antiquated as compared with his vocal works. • Philharmonia Baroque Orchestra, Nicholas McGegan. (2016). La Gloria di Primavera. Philharmonia Baroque Orchestra. Diana Moore, Suzana Ograjensek, Nicholas Phan, Clint van der Linde, Douglas Williams, Philharmonia Chorale. • Akademie für alte Musik Berlin, René Jacobs. (2007). Griselda. Harmonia Mundi HMC 901805.07. Dorothea Röschmann, Lawrence Zazzo, Veronica Cangemi, Bernarda Fink, Silvia Tro Santafe, Kobie van Rensburg. • Le Consert de l'Hostel Dieu. (2006). Il martirio di Sant'Orsola. Ligia digital: 0202176-07 • Le parlement de musique. (2005). La Giuditta. Ambronay editions: AMY004 • Ensemble Europa Galante. (2004). Oratorio per la Santissima Trinità. Virgin Classics: 5 45666 2 • Academia Bizantina. (2004). Il Giardino di Rose. Decca: 470 650-2 DSA. • Orqestra barocca di Sevilla . (2003). Colpa, Pentimento e Grazia. Harmonia Mundi: HMI 987045.46 • Seattle Baroque. (2001). Agar et Ismaele Esiliati. Centaur: CRC 2664 • Capella Palatina. (2000). Davidis pugna et victoria. Agora: AG 249.1 • Akademie für alten Musik Berlin, René Jacobs. (1998). Il Primo Omicidio. Harmonia Mundi Fr. Dorothea Röschmann, Graciela Oddone, Richard Croft, René Jacobs, Bernarda Fink, Antonio Abete • Ensemble Europa Galante. (1995). Humanita e Lucifero. Opus 111: OPS 30–129 • Ensemble Europa Galante. (1993). La Maddalena. Opus 111: OPS 30–96 • Allesandro Stradella Consort. (1992). Cantata natalizia Abramo, il tuo sembiante. Nuova era: 7117 • I Musici. (1991). Concerto Grosso. Philips Classics Productions: 434 160-2 • I Musici. William Bennett (Flute), Lenore Smith (Flute), Bernard Soustrot (Trumpet), Hans Elhorst (Oboe). (1961). "12 Sinfonie di Concerto Grosso" Philips Box 6769 066 [9500 959 & 9500 960 – 2 vinyl discs] • Emma Kirkby, soprano and Daniel Taylor, countertenor, with the Theatre of Early Music. (2005). Stabat Mater. ATMA Classique: ACD2 2237 • Francis Colpron, recorder, with Les Boréades. (2007). Concertos for flute. ATMA Classique: ACD2 2521 • Nederlands Kamerkoor, with Harry van der Kamp, conductor. (2008). Vespro della Beata Vergine for 5 voices and continuo. ATMA Classique: ACD2 2533 1. ^ a b c d e "Britannica Academic". Retrieved 5 February 2018.  2. ^ "CATHOLIC ENCYCLOPEDIA: Alessandro Scarlatti". Retrieved 5 February 2018.  3. ^ Alfred Music, Anthology of Italian Songs (17th & 18th Century), Volume I: Vocal Collection External linksEdit
global_01_local_2_shard_00001658_processed.jsonl/10318
From Wikipedia, the free encyclopedia   (Redirected from Compactflash) Jump to navigation Jump to search CompactFlash Memory Card.svg A 2 GB CompactFlash card Media type Mass storage device format Encoding Various file systems Capacity 2 MB to 512 GB[1][2](CF5.0: up to 128 PB)[3] Developed by SanDisk Dimensions 43×36×3.3 mm (Type I) 43×36×5 mm (Type II) Weight 10 gram (typical) Usage Digital cameras and other mass storage devices Extended from PCMCIA / PC Card CompactFlash (CF) is a flash memory mass storage device used mainly in portable electronic devices. The format was specified and the devices were first manufactured by SanDisk in 1994.[4] CompactFlash became the most successful of the early memory card formats, surpassing Miniature Card and SmartMedia. Subsequent formats, such as MMC/SD, various Memory Stick formats, and xD-Picture Card offered stiff competition. Most of these cards are smaller than CompactFlash while offering comparable capacity and speed. Proprietary memory card formats for use in professional audio and video, such as P2 and SxS, are faster, but physically larger and more costly. CompactFlash remains popular and is supported by many professional devices and high-end consumer devices. As of 2017, both Canon[5][6] and Nikon[7] use CompactFlash for their flagship digital still cameras. Canon also chose CompactFlash as the recording medium for its professional high-definition tapeless video cameras.[8] Ikegami professional video cameras can record digital video onto CompactFlash cards through an adaptor.[9] Traditional CompactFlash cards use the Parallel ATA interface, but in 2008, a variant of CompactFlash, CFast was announced. CFast (also known as CompactFast) is based on the Serial ATA interface. In November 2010, SanDisk, Sony and Nikon presented a next generation card format to the CompactFlash Association. The new format has a similar form factor to CF/CFast but is based on the PCI Express interface instead of Parallel ATA or Serial ATA.[10][11] With potential read and write speeds of 1 Gbit/s (125 MB/s) and storage capabilities beyond 2 TiB, the new format is aimed at high-definition camcorders and high-resolution digital cameras, but the new cards are not backward compatible with either CompactFlash or CFast. The XQD card format was officially announced by the CompactFlash Association in December 2011.[12] A 16-GB CompactFlash card installed in a 2.5" IDE port with adapter There are two main subdivisions of CF cards, 3.3 mm-thick type I and 5 mm-thick type II (CF2). The type II slot is used by miniature hard drives and some other devices, such as the Hasselblad CFV Digital Back for the Hasselblad series of medium format cameras. There are four main card speeds: original CF, CF High Speed (using CF+/CF2.0), faster CF 3.0 standard and the faster CF 4.0 standard adopted as of 2007. CompactFlash was originally built around Intel's NOR-based flash memory, but has switched to NAND technology.[13] CF is among the oldest and most successful formats, and has held a niche in the professional camera market especially well. It has benefited from both a better cost to memory-size ratio and, for much of the format's life, generally greater available capacity than other formats. CF cards can be used directly in a PC Card slot with a plug adapter, used as an ATA (IDE) or PCMCIA storage device with a passive adapter or with a reader, or attached to other types of ports such as USB or FireWire. As some newer card types are smaller, they can be used directly in a CF card slot with an adapter. Formats that can be used this way include SD/MMC, Memory Stick Duo, xD-Picture Card in a Type I slot and SmartMedia in a Type II slot, as of 2005. Some multi-card readers use CF for I/O as well. Technical details[edit] The CompactFlash interface is a 50-pin subset of the 68-pin PCMCIA[14] connector. "It can be easily slipped into a passive 68-pin PCMCIA Type II to CF Type I adapter that fully meets PCMCIA electrical and mechanical interface specifications", according to[15] The interface operates, depending on the state of a mode pin on power-up, as either a 16-bit PC Card (0x7FF address limit) or as an IDE (PATA) interface.[16] 1 GB CF card in a Nikon D200 DSLR camera Unlike the PC Card interface, no dedicated programming voltages (Vpp1 and Vpp2) are provided on the CompactFlash interface.[17] CompactFlash IDE mode defines an interface that is smaller than, but electrically identical to, the ATA interface. The CF device contains an ATA controller and appears to the host device as if it were a hard disk. CF devices operate at 3.3 volts or 5 volts, and can be swapped from system to system. CompactFlash supports C-H-S and 28-bit logical block addressing (CF 5.0 introduced support for LBA-48). CF cards with flash memory are able to cope with extremely rapid changes in temperature. Industrial versions of flash memory cards can operate at a range of −45° to +85 °C. NOR-based flash has lower density than newer NAND-based systems, and CompactFlash is therefore the physically largest of the three memory card formats introduced in the early 1990s, being derived from the JEIDA/PCMCIA Memory Card formats. The other two are Miniature Card (MiniCard) and SmartMedia (SSFDC). However, CF did switch to NAND type memory later. The IBM Microdrive format, later made by Hitachi, implements the CF Type II interface, but is a hard disk drive (HDD) as opposed to solid-state memory. Seagate also made CF HDDs. CompactFlash IDE (ATA) emulation speed is usually specified in "x" ratings, e.g. 8x, 20x, 133x. This is the same system used for CD-ROMs and indicates the maximum transfer rate in the form of a multiplier based on the original audio CD data transfer rate, which is 150 kB/s. where R = transfer rate, K = speed rating. For example, 133x rating means transfer speed of: 133 × 150 kB/s = 19,950 kB/s ≈ 20 MB/s. These are manufacturer speed ratings. Actual transfer speed may be higher, or lower, than shown on the card[18] depending on several factors. The speed rating quoted is almost always the read speed, while write speed is often slower. Solid state[edit] For reads, the onboard controller first powers up the memory chips from standby. Reads are usually in parallel, error correction is done on the data, then transferred through the interface 16 bits at a time. Error checking is required due to soft read errors. Writes require powerup from standby, wear leveling calculation, a block erase of the area to be written to, ECC calculation, write itself (an individual memory cell read takes around 100 ns, a write to the chip takes 1ms+ or 10,000 times longer). Because the USB 2.0 interface is limited to 35 MB/s and lacks bus mastering hardware, USB 2.0 implementation results in slower access. Modern UDMA-7 CompactFlash Cards provide data rates up to 145 MB/s[19] and require USB 3.0 data transfer rates.[20] A direct motherboard connection is often limited to 33 MB/s because IDE to CF adapters lack high speed ATA (66 MB/s plus) cable support. Power on from sleep/off takes longer than power up from standby. Magnetic media[edit] Many 1-inch (25 mm) hard drives (often referred to by the trademarked name "Microdrive") typically spin at 3600 RPM, so rotational latency is a consideration, as is spin-up from standby or idle. Seagate's 8 GB ST68022CF drive[21] spins up fully within a few revolutions but current drawn can reach up to 350 milliamps and runs at 40-50 mA mean current. Its average seek time is 8 ms and can sustain 9 MB/s read and write, and has an interface speed of 33 MB/s. Hitachi's 4 GB Microdrive is 12 ms seek, sustained 6 MB/s. Capacities and compatibility[edit] The CF 5.0 Specification supports capacities up to 128 PB using 48-bit logical block addressing (LBA).[22] Prior to 2006, CF drives using magnetic media offered the highest capacities (up to 8 GB). Now there are solid-state cards with higher capacities (up to 512 GB).[23] As of 2011, solid-state drives (SSDs) have supplanted both kinds of CF drive for large capacity requirements. Solid state capacities[edit] SanDisk announced its 16 GB Extreme III card at the photokina trade fair, in September, 2006.[24] That same month, Samsung announced 16, 32 and 64 GB CF cards.[25] Two years later, in September, 2008, PRETEC announced 100 GB cards.[26] Magnetic media capacities[edit] Seagate announced a 5 GB "1-inch hard drive" in June, 2004,[27] and an 8 GB version in June, 2005.[28] Use in place of a hard disk drive[edit] CompactFlash to SATA adapter with a card inserted In early 2008, the CFA demonstrated CompactFlash cards with a built in SATA interface.[29] Several companies make adapters that allow CF cards to be connected to PCI, PCMCIA, IDE and SATA connections,[30] allowing a CF card to act as a solid-state drive with virtually any operating system or BIOS, and even in a RAID configuration. CF cards may perform the function of the master or slave drive on the IDE bus, but have issues sharing the bus. Moreover, late-model cards that provide DMA (using UDMA or MWDMA) may present problems when used through a passive adapter that does not support DMA.[31] Original PC Card memory cards used an internal battery to maintain data when power was removed. The rated life of the battery was the only reliability issue. CompactFlash cards that use flash memory, like other flash-memory devices, are rated for a limited number of erase/write cycles for any "block." While NOR flash has higher endurance, ranging from 10,000 to 1,000,000, they haven't been adapted for memory card usage. Most mass storage usage flash are NAND based. As of 2015 NAND flash were being scaled down to 16 nm. They are usually rated for 500 to 3,000 write/erase cycles per block before hard failure.[32] This is less reliable than magnetic media.[33] Car PC Hacks[34] suggests disabling the Windows swap file and using its Enhanced Write Filter (EWF) to eliminate unnecessary writes to flash memory.[35] Additionally, when formatting a flash-memory drive, the Quick Format method should be used, to write as little as possible to the device. Most CompactFlash flash-memory devices limit wear on blocks by varying the physical location to which a block is written. This process is called wear leveling. When using CompactFlash in ATA mode to take the place of the hard disk drive, wear leveling becomes critical because low-numbered blocks contain tables whose contents change frequently. Current CompactFlash cards spread the wear-leveling across the entire drive. The more advanced CompactFlash cards will move data that rarely changes to ensure all blocks wear evenly. NAND flash memory is prone to frequent soft read errors.[34] The CompactFlash card includes error checking and correcting (ECC) that detects the error and re-reads the block. The process is transparent to the user, although it may slow data access. As a flash memory device is solid-state, it is less affected by shock than a spinning disk. The possibility for electrical damage from upside-down insertion is prevented by asymmetrical side slots, assuming that the host device uses a suitable connector. Power consumption and data transfer rate[edit] Small cards consume around 5% of the power required by small disk drives and still have reasonable transfer rates of over 45 MByte/s for the more expensive 'high-speed' cards.[36] However, the manufacturer's warning on the flash memory used for ReadyBoost indicates a current draw in excess of 500 mA. File systems[edit] CompactFlash cards for use in consumer devices are typically formatted as FAT12 (for media up to 16 MB), FAT16 (for media up to 2 GB, sometimes up to 4 GB) and FAT32 (for media larger than 2 GB). This lets the devices be read by personal computers but also suits the limited processing ability of some consumer devices such as cameras. There are varying levels of compatibility among FAT32-compatible cameras, MP3 players, PDAs, and other devices. While any device that claims FAT32-capability should read and write to a FAT32-formatted card without problems, some devices are tripped up by cards larger than 2 GB that are completely unformatted, while others may take longer to apply a FAT32 format. The way many digital cameras update the file system as they write to the card creates a FAT32 bottleneck. Writing to a FAT32-formatted card generally takes a little longer than writing to a FAT16-formatted card with similar performance capabilities. For instance, the Canon EOS 10D writes the same photo to a FAT16-formatted 2 GB CompactFlash card somewhat faster than to a same speed 4 GB FAT32-formatted CompactFlash card, although the memory chips in both cards have the same write speed specification.[37] Although FAT16 is more wasteful of disk space with its larger clusters, it works better with the write strategy that flash memory chips require. The cards themselves can be formatted with any type of file system such as Ext, JFS, NTFS, or by one of the dedicated flash file systems. It can be divided into partitions as long as the host device can read them. CompactFlash cards are often used instead of hard drives in embedded systems, dumb terminals and various small form-factor PCs that are built for low noise output or power consumption. CompactFlash cards are often more readily available and smaller than purpose-built solid-state drives and often have faster seek times than hard drives. CF+ and CompactFlash specification revisions[edit] When CompactFlash was first being standardized, even full-sized hard disks were rarely larger than 4 GB in size, and so the limitations of the ATA standard were considered acceptable. However, CF cards manufactured after the original Revision 1.0 specification are available in capacities up to 512 GB. While the current revision 6.0 works in [P]ATA mode, future revisions are expected to implement SATA mode. • CompactFlash Revision 1.0 (1995), 8.3 MByte/s (PIO mode 2), support for up to 128 GB storage space. • CompactFlash+ aka CompactFlash I/O (1997) • CF+ and CompactFlash Revision 2.0 (2003) added an increase in speed to 16.6 MByte/s data-transfer (PIO mode 4). At the end of 2003, DMA 33 transfers were added as well, available since mid-2004. • CF+ and CompactFlash Revision 3.0 (2004) added support for up to a 66 MByte/s data transfer rate (UDMA 66), 25 MByte/s in PC Card mode, added password protection, along with a number of other features. CFA recommends usage of the FAT32 filesystem for storage cards larger than 2 GB. • CF+ and CompactFlash Revision 4.0 (2006) added support for IDE Ultra DMA Mode 6 for a maximum data transfer rate of 133 MByte/s (UDMA 133). • CF+ and CompactFlash Revision 4.1 (2007) added support for Power Enhanced CF Storage Cards. • CompactFlash Revision 5.0 (2010) added a number of features, including 48-bit addressing (supporting 128 Petabyte of storage), larger block transfers of up to 32 Megabytes, quality-of-service and video performance guarantees, and other enhancements [38] • CompactFlash Revision 6.0 (November 2010) added UltraDMA Mode 7 (167 MByte/s), ATA-8/ACS-2 sanitize command, TRIM and an optional card capability to report the operating temperature range of the card.[39] CE-ATA is a serial MMC-compatible interface based on the MultiMediaCard standard.[40][41] Pins of a CFast card A variant of CompactFlash known as CFast is based on the Serial ATA bus, rather than the Parallel ATA/IDE bus for which all previous versions of CompactFlash are designed. CFast is also known as CompactFast. CFast 1.0/1.1 supports a higher maximum transfer rate than current CompactFlash cards, using SATA 2.0 (300 MByte/s) interface, while PATA is limited to 167 MByte/s using UDMA 7. CFast cards are not physically or electrically compatible with CompactFlash cards. However, since SATA can emulate the PATA command protocol, existing CompactFlash software drivers can be used, although writing new drivers to use AHCI instead of PATA emulation will almost always result in significant performance gains. CFast cards use a female 7-pin SATA data connector, and a female 17-pin power connector,[42] so an adaptor is required to connect CFast cards in place of standard SATA hard drives which use male connectors. The first CFast cards reached the market in late 2009.[43] At CES 2009, Pretec showed a 32 GB CFast card and announced that they should reach the market within a few months.[44] Delock began distributing CFast cards in 2010, offering several card readers with USB 3.0 and eSATAp (power over eSATA) ports to support CFast cards. Seeking higher performance and still keeping a compact storage format, some of the earliest adaptors of CFast cards were in the gaming industry (used in slot machines), as a natural evolution from the by then well-established CF cards. Current gaming industry supporters of the format include both specialist gaming companies (e.g. Aristocrat Leisure) and OEMs such as Innocore (now part of Advantech Co., Ltd.). The CFast 2.0 specification was released in the second quarter of 2012, updating the electrical interface to SATA 3.0 (600 MByte/s). As of 2014, the only product employing CFast 2.0 cards was the Arri Amira digital production camera,[45] allowing frame rates of up to 200 fps; a CFast 2.0 adapter for the Arri Alexa/XT camera was also released.[46] On 7 April 2014, Blackmagic Design announced the URSA cinema camera, which records to CFast media.[47] On 8 April 2015, Canon Inc. announced the XC10 video camera, which also makes use of CFast cards.[48] Blackmagic Design also announced that its URSA Mini will use CFast 2.0.[citation needed] As of October 2016, there are a growing number of medium to high-end professional devices making use of the faster data rates offered by CFast media. Examples include the Arri Amira and Arri Alexa Mini; the Hasselblad H6D-100C; the Canon C700, C300 Mark II, EOS 1D X II, and XC10; and the Blackmagic Ursa, Ursa Mini 4.6K and Ursa Mini 4K. Additional recording devices for video include Atomos Ninja Star and Atomos Shogun Studio 4K. As of 2017, in the wider embedded electronics industry, transition from CF to CFast is still relatively slow, probably due to hardware cost considerations and some inertia (familiarity with CF) and because a significant part of the industry is satisfied with the lower performance provided by CF cards, thus having no reason to change. A strong incentive to change to CFast for embedded electronics companies using designs based on Intel PC architecture is the fact that Intel has removed native support for the (P)ATA interface a few design platforms ago and the older CPU/PCH generations now have end-of-life status. In September 2016 the CompactFlash Association announced a new standard based on PCIe 3.0 and NVMe, CFexpress. [49] In April 2017, the version 1.0 of the CFexpress specification was published, with support for two PCIe 3.0 lanes in a XQD form-factor for up to 2 GB/s.[50] Type I and Type II[edit] The only physical difference between the two types is that Type I devices are 3.3 mm thick while Type II devices are 5 mm thick.[51] Electrically, the two interfaces are the same except that Type I devices are permitted to draw up to 70 mA supply current from the interface, while type II devices may draw up to 500 mA. Most Type II devices are Microdrive devices (see below), other miniature hard drives, and adapters, such as a popular adapter that takes Secure Digital cards.[52][53] A few flash-based Type II devices were manufactured, but Type I cards are now available in capacities that exceed CF HDDs. Manufacturers of CompactFlash cards such as Sandisk, Toshiba, Alcotek and Hynix offer devices with Type I slots only. Some of the latest DSLR cameras, like the Nikon D800, have also dropped Type II support.[54] IBM 1 GB Microdrive Microdrive was a brand of tiny hard disks—about 25 mm (1 inch) wide—in a CompactFlash Type II package. The first was developed and released in 1999 by IBM, with a capacity of 170 MByte. IBM sold its disk drive division, including the Microdrive trademark, to Hitachi in 2002. Comparable hard disks were also made by other vendors, such as Seagate and Sony. They were available in capacities of up to 8 GB but have been superseded by flash memory in cost, capacity, and reliability, and are no longer manufactured.[55] As mechanical devices, CF HDDs drew more current than flash memory's 100 mA maximum. Early versions drew up to 500 mA, but more recent ones drew under 200 mA for reads and under 300 mA for writes. (Some devices used for high speed—such as Readyboost, which had no low-power standby mode—exceeded the 500 mA maximum of the Type II standard.) CF HDDs were also susceptible to damage from physical shock or temperature changes. However, CF HDDs had a longer lifespan of write cycles than early flash memories. The iPod mini, Nokia N91, iriver H10 (5 or 6 GB model), PalmOne LifeDrive, and Rio Carbon used a Microdrive to store data. Compared to other portable storage[edit] • CompactFlash cards that use flash memory are more rugged than some hard drive solutions because they are solid-state. (See also Reliability above.) Separately, CompactFlash cards are thicker than other card formats, which may render them less susceptible to breakage from harsh treatment. • As CompactFlash cards support the IDE/ATA command protocol with the host device, a passive adapter lets them function as the hard disk drive of a personal computer, as described above. • CompactFlash does not have any built in DRM or cryptographic features found on some USB flash drives and other card formats. The absence of such features contributes to the openness of the standard, as card standards with such features may be subject to restrictive licensing agreements. • The initial CompactFlash specification envisaged a higher maximum capacity than other card formats. For this reason, many early CompactFlash host devices are usable with modern multi-gigabyte memories, where users of other families such as Secure Digital have had to migrate to SDHC and SDXC. • CompactFlash lacks the mechanical write protection switch that some other devices have, as seen in a comparison of memory cards. • CompactFlash is physically larger than other card formats. This limits its use, especially in miniature consumer devices where internal space is limited, such as point-and-shoot digital cameras. (An offsetting benefit of larger size is that the card is easier to insert and remove, and harder to misplace.) The marketplace for CompactFlash is extensive and includes counterfeits. Off-brand or counterfeit cards may be mislabeled, might not contain the actual amount of memory their controllers report to the host device, and may use types of memory that are not rated for the number of erase/rewrite cycles that the purchaser expects.[56][57] Other devices in the CF form factor[edit] Various CF I/O network interface cards Since CompactFlash interface is electrically identical to the 16-bit PC Card, the CompactFlash form factor is also used for a variety of Input/Output and interface devices. Many standard PC cards have CF counterparts, some examples include: See also[edit] 1. ^ Frank, Bill (March 2, 2003). "CompactFlash Specification Allows for the Addressing of up to 137 GB" (PDF) (Press release). CompactFlash Association. Archived from the original (PDF) on 2005-05-12.  2. ^ Admin, MemberClicks. "Home". Retrieved 18 March 2018.  3. ^ Reagan, Eric (January 6, 2012). "Lexar Introduces 256GB CF Card in Pro Line Refresh" (Press release). Lexar.  The card referenced is described as supporting UDMA 7, which indicates conformance to the CF6.0 spec. 4. ^ "History of the SanDisk brand". SanDisk. Retrieved 27 April 2018.  5. ^ "Canon U.S.A. Introduces The New Canon EOS-1D X Digital SLR Camera, Re-Designed From The Inside Out" (Press release). Canon. 18 October 2011.  6. ^ "Canon U.S.A. Introduces EOS-1D C Digital SLR Camera Featuring 4K High-Resolution Video Capture" (Press release). Canon. 12 April 2012.  7. ^ "Digital SLR Camera Nikon D4". Nikon Corporation. January 6, 2012. Retrieved January 7, 2012.  8. ^ "Canon DLC: Article: File-Based Video Recording onto CF Cards: Features & Benefits". Retrieved 18 March 2018.  9. ^ "Ikegami at Government Video EXPO 2010, press-release by Ikegami Ltd". Retrieved 18 March 2018.  10. ^ "Sandisk, Sony, and Nikon propose 500MBps memory card with more than 2TB capacity". Retrieved 18 March 2018.  11. ^ "CompactFlash allies rally against dominant SD". 14 December 2010. Retrieved 18 March 2018.  12. ^ "CompactFlash Association readies next-gen XQD format, promises write speeds of 125 MB/s and up". Retrieved 18 March 2018.  13. ^[permanent dead link] 14. ^ "". Retrieved 18 March 2018.  15. ^ "Archived copy". Archived from the original on 2010-03-01. Retrieved 2010-05-30.  16. ^ "CompactFlash · AllPinouts". Retrieved 18 March 2018.  17. ^ CF+ and CompactFlash Specification Revision 1.4, Section 4 Electrical Interface, Table 4 18. ^ "Photofocus - Long-Term Test – UDMA Flash Memory – Lexar Won". Retrieved 18 March 2018.  19. ^ "UDMA-7/UHS-1 Media Card Study". 16 August 2013. Retrieved 18 March 2018.  20. ^ "USB 3.0 CF Card Reader Study". 14 August 2013. Retrieved 18 March 2018.  21. ^ 23. ^ 24. ^ SanDisk Introduces the World's Highest Capacity Card for Professional Photographers 25. ^ "Samsung Announces First 40-nanometer Device 32 Gb NAND Flash with Revolutionary Charge Trap Technology". Retrieved 18 March 2018.  26. ^ Administrator. "Pretec - Small size, Big impact". Retrieved 18 March 2018.  27. ^ Seagate Expands Consumer Electronics Leadership with First 5GB 1-Inch Hard Drive, First 5GB Compact Flash Hard Drive, and New 400GB DVR Hard Drive Archived 2012-03-09 at the Wayback Machine. 28. ^ Seagate Does it Again: Drives Innovation with 10 New, Groundbreaking Hard Disc Drives Archived 2009-12-07 at the Wayback Machine. 29. ^ "Submerged camera holds functional memory card two years after accident". Retrieved 18 March 2018.  30. ^ "Compact Flash and Secure Digital Adapters". Addonics. Retrieved 2008-05-18.  31. ^ "CompactFlash cards and DMA/UDMA support in True IDE (tm) mode". Retrieved 18 March 2018.  32. ^ "Application Note for NAND Flash Memory (Revision 2.0)" (PDF). Archived from the original (PDF) on June 16, 2011. Retrieved April 8, 2010.  33. ^ The comparison is not in the same terms as for magnetic media, for which hours of operation and reads also impose wear. 34. ^ a b Car PC hacks, Damien Stolarz, 2005, Farnham:O’Reilly Media, Sebastopol, CA, USA, ISBN 0-596-00871-6 35. ^ EWF is available only in XP Embedded, not the XP Professional, Home, or Media Editions versions of Windows. 36. ^ LetsGoDigital. "SanDisk Extreme IV review". Retrieved 18 March 2018.  37. ^ Rob Galbraith CompactFlash Performance Database Archived 2013-05-18 at the Wayback Machine. 38. ^ CFA Announces Availability of the New CF5.0 Specification Archived 2010-11-22 at the Wayback Machine. 39. ^ CompactFlash 6.0 Archived 2010-11-21 at the Wayback Machine. 40. ^$file/Ready_for_CE-ATA.pdf Archived 2011-06-08 at the Wayback Machine. 41. ^[permanent dead link] 42. ^ "CFast – Evolution of the CompactFlash Interface" (PDF). CompactFlash Association. 2008-04-14. Retrieved 2010-01-22.  44. ^ "Pretec release CFast card with SATA interface". DPReview. 2008-01-08.  45. ^ "ARRI Group: AMIRA". ARRI Group. Retrieved 18 March 2018.  46. ^ "ARRI Group: News". ARRI Group. Retrieved 18 March 2018.  47. ^ Design, Blackmagic. "Blackmagic URSA Mini Pro - Blackmagic Design". Retrieved 18 March 2018.  48. ^ "Canon XC10 - Professional camcorder". Canon Europe. 2015-04-08.  49. ^ "CFA 5.1 Press Release" (PDF).  50. ^ "CFexpress 1.0 Press Release" (PDF).  51. ^ Admin, MemberClicks. "Home". Retrieved 18 March 2018.  52. ^ "Delkin Devices ship 224MB CF type II". Retrieved 18 March 2018.  53. ^ LetsGoDigital. "Lexar Media announces 8GB CompactFlash type II - LetsGoDigital". Retrieved 18 March 2018.  54. ^ "Nikon D700 - see Tech Specs". Retrieved 18 March 2018.  55. ^ Rob, Galbraith. "Robgalbraith CF info". Rob Galbraith. Retrieved 6 May 2014.  56. ^ Guides - FAKE SanDisk Extreme Compact Flash Cards Exposed 57. ^ July 2007 - Counterfeit SanDisk Cards Archived 8 December 2008 at the Wayback Machine. External links[edit]
global_01_local_2_shard_00001658_processed.jsonl/10326
Taylor Swift, Because I can 19 Oct Well well well, looks like I’m going to do my best to get this rolling again since my hiatus which lasted longer then i would have liked. anyways here is taylor swift in all her awesomness. I would marry her in a heartbeat, she is probally the best thing to hit this planet since that metor that destroyed all the dinosaurs (yeah geekologie writer, we still hate your quentien tarentino looking face). Leave a comment Posted by on October 19, 2010 in awesome, Cute, eye candy, wife status Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/10332
Gods Watering Can God is the gardener of your heart His watering can, plays a vital part He watches over them as they grow When spiritual healing waters flow Watering your flowers every day Brings a colour of beautiful display Beams of Spiritual light & love shine On the garden of your heart divine Their beauty and love they share Sweet fragrance pervades the air Flowers angels water with loving care Yes in answer to some one prayer Healing thoughts they send your way Happiness, Sunshine to fill each day God answers your prayers right away To those people who unto him do Pray              Reginald F. Horton
global_01_local_2_shard_00001658_processed.jsonl/10351
Roller Drive Chain Kit, #40 This manufacturer-approved roller drive chain kit (part number STD316402) is a standard part that fits a variety of products. The kit includes the connecting link.Follow appropriate safety practices when installing roller drive chain kit STD316402. About Sears PartsDirect more details and check prices
global_01_local_2_shard_00001658_processed.jsonl/10381
Buy a MBP now? Discussion in 'MacBook Pro' started by BioCore, Sep 9, 2007. 1. BioCore macrumors regular Sep 9, 2007 Hey everyone, I want to buy a laptop for school which starts tomorrow, and my parents decided they would pay for it, which is awesome! So anyways, I was wondering if you guys think there will be a big update to the hardware when Leopard comes out in October? If it is something small then I can buy it right away, if it is something big, will it affect the speed or performance any differently? (As in greater performance?) Also if I buy a MBP now, and update it later to Leopard OS, will it be any problems in terms of speed or will it maybe even be a bit better? 2. Mr. B macrumors regular Dec 25, 2005 As usual the answer is, if you can wait, do so. The mac book pros didn't come out yesterday, so more likely than not revisions are going to come sooner than you'd like. They *will* be better than the current ones, and they will most likely cost about the same. If you can hold off buying one do so. If you can't, buy the current macbook pro. It's a good machine and it will last you. 3. Raska macrumors 6502 Aug 5, 2007 I just bought a MBP recently, and I think buying now shouldn't be too much of a problem. Unless the next revision has quad-core, which I highly doubt it will, buy it when you need it. 4. BioCore thread starter macrumors regular Sep 9, 2007 So buying one right now, and then updating won't be too much of a problem at all? I mean if the current ones will be able to do graphics, movie viewing, and minor theme codings while browsing internet even after the upgrade to leopard with full speed I don't mind any lower hardware changes! 5. BioCore thread starter macrumors regular Sep 9, 2007 BTW, does Apple give student discounts in their physical stores? Like do I just show my student card, and get the discount? 6. compuguy1088 macrumors 6502a Sep 3, 2007 In the Sub-Basement of Solitude I think they do, exactly the way you just mentioned it. You need an id or some proof that you are a student. 7. squeeks macrumors 68040 Jun 19, 2007 my store did I even brought a copy of my schedule but they just wanted to see my ID 8. ripplet macrumors member Sep 6, 2007 If you want a Macbook, wait till Leopard comes out. If you want a MacBook Pro, there will be no difference in buying now or wait. I'm guessing that when they release Leopard, Macbooks will get an update. Crunchgear has some reports that the updated Macbooks will be half the thickness of current Macbooks. They stated that it was from a "reliable" source which had provided "reliable" information before. However, i might also guess that the MBPs will be updated as well due to Leopard's support for higher resolution. But this update may come in the next few months following Leopard's release. So the bottom line is, if you desperately need a laptop for school, buy the MBP now. If you don't, you might want to wait till after Leopard is released to see if there are any updates to the laptop line. :cool: Share This Page
global_01_local_2_shard_00001658_processed.jsonl/10384
Walgreens Pharmacy Tech experience in NJ Discussion in 'Pre-Pharmacy' started by mysterl33, May 14, 2008. 1. mysterl33 May 7, 2008 Likes Received: I applied at Walgreens for a pharmacy tech. position. This walgreens had recently opened so I am hoping to get a job. I went in to complete the skills assesment but the pharmacy manger wasn't in at the time so did not have a chance to talk to her. I was wondering what the process at walgreens is like. I am not certified but I heard walgreens will help me get certified. My question is, what is the process after the interview? What are some things I should look out for? I am looking for answers especially for those working at walgreens in NJ but others are welcome. Share This Page
global_01_local_2_shard_00001658_processed.jsonl/10386
Results 1 to 3 of 3 1.    #1   Did anyone else notice that when you go to the Inbox and now click on a thread, it shows the ENTIRE thread (so you'd have to scroll ALL THE WAY to the bottom to reply)??? What's the deal? Does anyone know a way around this? 2.    #2   BUMP, anyone? 3. JKTex's Avatar 376 Posts Global Posts 487 Global Posts It's Facebook, not the Pre. Posting Permissions
global_01_local_2_shard_00001658_processed.jsonl/10394
UNIX-1.4 Sort and Sed Commands Make sure to subscribe to my channel for more videos on UNIX, Perl and SQL. facebook: facebook.com/fuzicast twitter: @fuzicast youtube: youtube.com/yuejdesigner85 sort – sort file sort -t, -k1 file1 – sort file1 by column 1, delimited by comma (,) sort -r -t, -k1 file1 – in reverse sort -n -t, -k1 file1 – sort by numerical value sort -f file1 – case insensitive sort sort -t’|’ +0 -2 – sort by the first 2 fields, starting from 0+1th field and end at 2nd field. sed – special editor sed ‘s/pattern/replacement/gi’ – search and replacement globally and case insensitively sed ‘s/pattern/&replacement/gi’ – & represents the pattern found sed ‘s/\(group\)pattern/\1/gi’ – \1 contains value of 1st group sed ‘s/hello/bye/2g’ – replacements second occurrence of hello sed ‘/pattern/p’ – will print out occurrences of pattern sed -e ‘command1’ -e ‘command2’ – run multiple commands sed ‘s/'”$VAR”‘/replacement/’ – using external variables in sed sed ‘2 s/pattern/replacement/’ – replace only for line 2. you can also specify line range, 1,10 sed ‘/pattern1/ s/pattern2/replacement/’ – find pattern1, for those lines, replace pattern2 with replacement sed ‘/start/,/end/ s/pattern/replacement/’ – using patterns as line number range. you can also mix line number with pattern sed ‘1,10d’ – deletes line 1 to 10. you can also mix pattern range as well sed ‘100,$d’ – delete from line 100 to end of file sed ‘100,$!d’ – delete from line 1 to line 100. ! means inverse operation. sed ‘y/ABC/abc/’ – replacement each character with corresponding characters regular expression [0-9a-z]* – match 0 or more alphanumeric characters [0-9a-z]+ – match 1 or more alphanumeric characters [^a-z] – any character does not contain a-z 2 thoughts on “UNIX-1.4 Sort and Sed Commands Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_2_shard_00001658_processed.jsonl/10398
Torrent's details William Higgins - Erik Kral - EROTIC SOLO (1080p) SoloHunksMuscleEuropean BoyMasturbateBig CockUncut Cock Released: June 7, 2018 Handsome str8 guy Erik Kral is from Brno and is 22 years old. He works as an office manager and enjoys sports, jogging and dancing. After his interview Erik stands and begins to feel all over his body. He removes his sweater to show off his slim, fit, body as his hands run all over it. Then he opens his jeans and lays on the bed, reaching into the jeans for a feel. He pushes the jeans down and pulls out his cock and balls. Spreading his legs wide he rubs his cock and balls. Wanking that cock Erik gets his nice and hard. As he wanks he keeps spreading his legs wide apart in a most inviting fashion. Turning over he reaches back and pulls his ass cheeks wide apart.Raising the ass slightly as he spread really exposes his tight hole. Erik moves onto his knees and wanks his dick down between his legs as he shows off that tight hole. Then he raises up on his knees to wank his throbbing cock again, shooting the creamy cum onto the bed. After milking the cock dry he goes off to the shower. Actor  Erik Kral 1920x1080  3996kbps This clip was downloaded on the official website. Show Files: 1 file
global_01_local_2_shard_00001658_processed.jsonl/10407
Pages in this set Page 1 Preview of page 1 AQA Biology Unit 2 Questions and Answers 1) What is intraspecific variation? Variation within the same species 2) What is interspecific variation? Variation within different species 3) What is intraspecific variation caused by? Genetic and environmental factors 4) What do all members of the same species have? The same… Page 2 Preview of page 2 You would divide the field into a grid and use a random number generator to choose a 1) What is the monomer of DNA? 2) What are nucleotides made up of? Deoxyribose sugar, phosphate group and nitrogenous base 3) What elements do nucleotides contain? Carbon, oxygen, nitrogen,… Page 3 Preview of page 3 Genetic Diversity 1) How is genetic diversity within a population increased? Mutations in DNA and different alleles being introduced when individuals from another population migrate into them and reproduce (GENE FLOW) 2) What is a genetic bottleneck? An event that causes a big reduction in population, therefore reducing the number… Page 4 Preview of page 4 It has lots of branches which means that it can be broken down into glucose more easily so energy is released more quickly and it is compact. 5) What is cellulose made up of? Long, unbranched chains of beta glucose. Strands are linked together by hydrogen bonds which forms fibres… Page 5 Preview of page 5 2) What is an organ? A group of physically linked different tissues working together as a functional unit 3) What is a system? A group of organs working together to carry out a complex function 4) How are squamous epithelium cells adapted for their function? Thin with not much cytoplasm.… Page 6 Preview of page 6 By looking at the order of the bases. Closely related species will have a higher percentage of similarity in their DNA base order 10) How does DNA hybridisation work? DNA collected from 2 species, separated into single strands and mixed together Where the base sequences of the DNA are the… No comments have yet been made Similar Biology resources: See all Biology resources »
global_01_local_2_shard_00001658_processed.jsonl/10408
Chemistry core topics HideShow resource information Atoms, Elements and Compounds All substances are made of atoms. There are over 100 different atoms, and they combine together to provide all the different substances we have on Earth. Elements contain only one type of atom. Compunds contain two or more which are chemically bonded. Elements have different properties, and in the periodic table they are placed in columns with elements that have similar properties. Atoms are made of a nucleus which contains protons and neutrons, and electrons which orbit the nucleus in shells. Protons have a +1 charge and a mass of 1, neutrons have a 0 charge and a mass of 1, and electrons have a -1 charge and a mass of almost zero, roughly 0.0005. An atom doesn't have an overall electric charge because the numbers of protons and electrons are equal, so they cancel each other out. The proton or atomic number tells us how many protons are found in the atom. We can find the number of electrons as the number of protons and electrons is always equal. To calculate the number of neutrons, the number of protons needs to be subtracted from the atomic mass. 1 of 10 Electron Arrangement and Forming Bonds The first shell orbiting a nucleus can carry a maximum of two electrons. The second, third, and subsequent shells can carry a maximum of eight electrons. Examples: Oxygen has eight electrons so its electron configuration is 2.6. Chlorine has 17 electrons so its electron configuration is 2.8.7. Each shell has a different energy level. The closer the electron shell to the nucleus, the lower its energy level. Elements with a full outer shell are very unreactive. This is because a full shell is the most stable electron configuration. Elements with partially full shells will react to try to get a full outer shell. Sometimes atoms transfer electrons to form chemical bonds.This happens when a metal reacts with a non-metal. If both atoms which are reacting are non-metals they share electrons. When a metal bonds with a non-metal, the metal transfers its electrons to the non-metal atom. Both atoms become charged particles called ions. Metals form positively charged ions. Non-metals form negatively charged ions. Because opposite charges attract each other there is a strong attraction between the metal and non-metal ions and this forms an ionic bond. Non-metal atoms share electrons. They do this by overlapping, which means each pair of shared electrons forms a chemical bond between the atoms. These are called covalent bonds. (A set of atoms joined by covalent bonds is called a molecule). Metallic bonds are bonds between metal atoms. 2 of 10 Chemical Equations Symbol equations allow us to see how much of each reactant is reacting when a reaction takes place. In chemical reactions there is a conservation of mass. The total mass of products in the reaction is equal to the mass of reactants. In symbol equations there is the same number of each type of atom on each side of the arrow. Steps for balancing equations: 1.Write the word equation. 2.Write the correct formula underneath each name. 3.Use a trial and error approach to end up with the same number of each element on each side. [You must not change any of the small numbers. You can only add big numbers in front of the formulae. Start with an element that is on its own. Look for common multiples]. 4.Add in state symbols (if possible). 3 of 10 Limestone and Carbonates Limestone is mainly made of calcium carbonate (CaCO3). It is mainly made of the remains of tiny plants and animals which lived in the sea. It is obtained by digging it out of the ground. Powdered limestone can be heated with powdered clay to form cement. The cement is mixed with sand, crushed rocks and water to produce concrete, a popular building material. When limestone is strongly heated, it produces carbon dioxide and calcium oxide. (CaCO3 ---> CaO + CO2). This process is called thermal decomposition. If carbon dioxide is passed through limewater, the limewater turns cloudy. Limewater is a solution of calcium hydroxide (Ca[OH]2). It is alkaline. Carbon dioxide is weakly acidic so it reacts with the alkaline limewater. In the reaction, tiny solid particles of calcium carbonate are formed. In the limestone cycle, calcium carbonate decomposes to form carbon dioxide and calcium oxide. If a small amount of water is added to calcium oxide, it forms calcium hydroxide. If lots of water is added, a solution of calcium hydroxide (limewater) is formed. If carbon dioxide is added to calcium hydroxide solution, calcium carbonate is formed. Oxidation is when a substance reacts with oxygen. Combustion is when a substance burns. Displacement is when a more reactive element takes the place of a less reactive one. Decomposition is when a substance splits up, and neutralisation is when an acid and alkali react. 4 of 10 Cement and Concrete The ancient Egyptians heated limestone and mixed it with water to produce a material that hardened with age. The Romans mixed calcium hydroxide with sand and water to produce mortar. Mortar is a paste that holds building materials together like blocks and bricks. Some people then found that reacting limestone with clay in a kiln produced cement which is a lot more useful. Cement is a light grey powder made when limestone is heated with clay, then grounded. Cement is mixed with sand and aggregate (gravel) to make concrete. Reinforced concrete is made by pouring concrete around steel rods or bars. The difference between cement and concrete is that concrete is cheaper and stronger than pure cement. As concrete hardens, it binds carbon dioxide in carbonation. 5 of 10 Limestone Issues Limestone is quarried from the ground, explosives are used to dislodge limestone from the rock face and this leaves scars on the landscape. After the quarrying has finished, it leaves a large crater in the ground. Using lime mortar instead of cement would emit less carbon dioxide as it sets. Paper improves concrete by increasing its resistance to cracking, and may be a better option than using steel  as it is cheaper.  Environmental factors involved with quarrying are that it will effect the landscape, impact wildlife, damgae the atmosphere e.t.c Economic factors involved with quarrying are that there is a cost for extracting rock, has an effect on local businesses, an effect on tourism, price for the sold rock e.t.c Social factors involved with quarrying are that there are jobs, there is disturbing noise, dirt is produced, extra traffic is generated e.t.c 6 of 10 Extracting Metals Some metals are found in their native state like gold and silver. Others have to be extracted from their ores. Ores are rocks that contain enough metal compound to make it economic to extract. They can be reacted to remove the metal. Some metals such as potassium are found as compounds in the Earth's crust, because they are so reactive that they will react with oxygen in the air or with water and other chemicals.Iron oxide is a compound that is found in the ore haematite. Iron can be extracted from haematite by heating with carbon because it is lower in the reactivity series. Anything lower than carbon is extracted by reduction using carbon, and anything higher is extracted by electrolysis. The iron that comes out of a blast furnace is very impure and has limited uses. It is mixed with other elements to form alloys which make it more useful.  Carbon steels are simple steels. These are produced by removing most of the carbon from cast iron. There are cheap and used in products like cars, ships, knives. High carbon steel-relatively high carbon content, very strong but brittle Low carbon steel-soft and easy to shape, not very strong but less likely to shatter than high carbon steels. Mild steel-Easy to press into shape, used in production of car bodies. 7 of 10 More Metals Alloy-A mixture made by combining two or more elements, one of which must be a metal. They are used for strength, protective layers, electrical plugs, hinges and wheels. Malleable-Can be easily bent or shaped. Ductile-Can be drawn out into wires. Sonorous-Makles a ringing sound when hit. Aluminium and titanium are metals which are very strong but have low densities. They are shiny, excellent conductors of heat and energy, malleable and ductile, not toxic, and resistant to corrosion. Aluminium is extracted from its ore by electrolysis, and titanium is extracted by displacement from a more reacttive metal. 8 of 10 Crude Oil Crude oil is a mixture of hydrocarbons. Hydrocarbons are compounds that contain carbon and hydrogen only. Most of the hydrocarbons found in crude oil are alkanes. Alkanes are saturated hydrocarbons with the general formula of CnH2n+2. Crude oil is separated into useful substances by Fractional distillation. Firstly, crude oil is heated in the furnace to about 370 C. Most of the oil turns into vapour but very high boiling point molecules remain as a liquid. The temperature decreases up the column. As the vapour rises it begins to cool and condense back into a liquid. Molecules with different boiling points condense at different levels in the column. These are called fractions. Molecules with low boiling parts do not condense. Each fraction contains a mix of hydrocarbons with similar properties. Fuel is a chemical which releases energy in a combustion reaction. This is when a substance reacts with oxygen. Complete combustion occurs when there is lots of oxygen. Products are carbon dioxide and water. Incomplete combustion occurs when there isn't enough oxygen for complete combustion. Products include carbon monoxide or carbon (soot/particulates) and water. Other pollutants can be produced in the high temperatures inside combustion engines. 9 of 10 We can break up long alkane chains by a process called cracking. We do this because the smaller chain alkanes are more useful. When long chan alkanes undergo cracking a shorter chan alkane and an alkene are formed. Alkenes are also hydrocarbons They have one double bond between two of the carbon atoms. Their general formula is CnH2n. Alkenes are more reactive than alkanes. They undergo addition reactions (making bigger molecules). They can join together to form long molecules called polymers. A polymer is many monomers joined together, and a monomer is individual molecules. In a polymerisation reaction, molecules join together to form a long chain.  10 of 10 No comments have yet been made Similar Chemistry resources: See all Chemistry resources »See all ALL CORE CHEMISTRY resources »
global_01_local_2_shard_00001658_processed.jsonl/10415
Archive for July, 2017 What Makes One Eligible? July 29, 2017    I shall read from The Mount of Blessing, pg. 155, beginning with the second paragraph.    M.B. pp. 155, 156 — “The very first step in approaching God is to know and believe the love that He has to us; for it is through the drawing of His love that we are led to come to Him.    “The perception of God’s love works the renunciation of selfishness.  In calling God our Father, we recognize all His children as our brethren.  We are all a part of the great web of humanity, all members of one family.  In our petitions we are to include our neighbors as well as ourselves.  No one prays aright who seeks a blessing for himself alone.    “‘Which art in heaven.’  He to whom Christ bids us look as our Father,’ ‘is in the heavens; He hath done whatsoever He hath pleased.’  In His care we may safely rest, saying, What time I am afraid, I will trust in Thee.'”    What does the reading instruct us to pray for? — For an appreciation of God’s love and for better understanding of Him; for the right understanding of what it means to pray the Lord’s prayer; for wisdom to know why we address God as our Father, why we are members of one family, brethren of one household; for grace to remember to pray not for ourselves only but for our neighbors, and even for our enemies. Timely Greetings, Vol. 1, No. 7                           2 A number of brethren have written to me from time to time, wanting to know what makes them eligible to receive the Seal of God.  Some want to know whether they will be sealed by doing this or by doing that.  Others want to know whether they will be left without the seal by not doing this or not doing the other.    The questions are indeed very timely and commendable.  Such vital questions deserve answers as concrete as are the questions themselves.  And who can give a more concrete answer than those who have gone before us, those whose duties were similar to ours, those who were passing through a similar experience, those who traveled the same road that we are traveling, those who were preparing themselves for the Kingdom as are we.    In whom do we find such a parallel? — In no others than those who left Egypt and started for the promised land.  No, in none others.  They are our only type.  Says Inspiration: “Now all these things happened unto them for ensamples: and they are written for our admonition, upon whom the ends of the world are come.” (1 Cor. 10:11.)  Their duties, therefore, are our duties, and their failures should be our stepping stones to success.  Thus it is that the deeds of those who entered into the promised land must be our Timely Greetings, Vol. 1, No. 7                           3 deeds, and if we are to be sealed, then the deeds of those who failed to enter therein, we must shun as completely and as quickly as we would shun a lion’s den.    We are now to find out why some of them went into the promised land, and why others did not go in, for this is what Inspiration commands us to do.  This scripture implies that if the experiences of ancient Israel had not been for ensamples, they would never have been written.  How important, then, that we diligently study them.  Yes, in order for us to know what we must do or must not do to receive the seal and to enter into the Promised Land, we must examine the deed of both those who entered it and of those who were left out of it.    Let us begin our examination by starting with Moses, with the human agent, the visible leader of the movement.  Reared in the courts of Pharaoh, he received the highest education the world then offered.  And having understood that he was the one to free his brethren from Egyptian bondage, he felt quite capable for the job.    You remember the story of how he started out to deliver them although he was not yet told to do so.  He killed an Egyptian, fell into a quarrel with one of the Hebrews, and then fled for his life.  So it was that in Midian he obtained a job, became a shepherd, and married his employer’s daughter.  During those forty years of shepherd’s life he forgot the Egyptian language, and with it the Egyptian learning.  In its place, though, he learned to tend well to sheep.  He therefore dismissed from his mind the idea of ever delivering the people of God from their Egyptian bondage.  Then it was that God saw him strong and well able, and commanded him to go back to Egypt and to bring Timely Greetings, Vol. 1, No. 7                           4 out of it His groaning people.  You recall that Moses protested against the idea and argued that he had failed at his first attempt, the time he was young and well-informed and that at that late hour of his life he was not trying again, that he could no longer even speak the language.  After a prolonged conversation God removed his objections by promising to give him his brother, Aaron, to be his spokesman, and Moses finally consented to return to Egypt.    There with his shepherd’s rod he performed many signs and wonders before both the Egyptians and the Hebrews.  And you remember what took place the night of the Passover, the night before they left Egypt: Moses had proclaimed throughout the land that in every dwelling where no blood was found on the doorpost, that very night the firstborn in each such dwelling would die.    Those who disobeyed the Divine injunction, were, on the day following busily moaning and burying their dead, while those who obeyed the command were joyously and orderly marching out of the cities.  Yes, only those who were able to take orders were made free from slavery.  It is, therefore, prerequisite that we learn to take orders if we are to receive the seal of God in our foreheads.    Let us not forget, though, that the children of Israel left Egypt with great zeal and high hopes.  But when they saw the Red Sea ahead of them, and Pharaoh’s army behind them, they were filled with consternation.  They saw themselves in a death trap although they were at the brink of another marvelous deliverance.  Then they turned on Moses and accused him of bringing them to the sea, of making their escape from their enemies absolutely impossible. Timely Greetings, Vol. 1, No. 7                           5    Humanly viewing the situation, they were in a precarious predicament.  In that moment they forgot their miraculous deliverance from Pharaoh’s taskmasters and their eyes closed to the wondrous cloud by day and pillar of fire by night that had led them all the way.  As they saw it, the evidence against Moses’ ability to lead them safely was overwhelming.  Insofar as they were concerned, the whole venture appeared doomed to failure.  Their hopes of going ahead or of even going back left them, and all because they thought Moses, not God, was their deliverer!  How shortsighted, unstable, doubting, and forgetful human beings are!  Experience in the gospel work has taught me that God’s people of today have the same tempter to contend with, and similar temptations to overcome if they are to receive the seal of God.    What a great difference would there have been had the Israelites only believed that God, not Moses, was their Leader, that that which appeared to be their death trap, was their door of hope.  Let their experience teach us to remember that God is either leading us altogether or not at all, that His ways are not; our ways, and that what may appear to be our greatest obstacle, may actually turn out to be our greatest blessing.    Israel’s real danger, we now see, was not in what Moses did, but in their unbelief of God’s having the reins in His hands, in not knowing that His ways are beyond finding out — contrary to ours.  They failed to see that God could again and again perform miracle after miracle to deliver them from their enemy’s hand, that He could dry the ocean as easily as He could flood the earth.    Having their failures before us, we should make Timely Greetings, Vol. 1, No. 7                           6 them our stepping stones to success.  Let us therefore wholeheartedly believe that God is in charge of our salvation, of our lives and of our death, too.  That He is able to take us to safety even if the earth should drop out of space, that we cannot die if He wants us alive, and that we cannot live if He wants us dead.  Let us ever bear in mind that we of ourselves know nothing about God’s plans except as told through His appointed servants, the prophets, and as we witness them day by day.  If we daily walk with God, if we commit all to Him, then the responsibility is all His.    God, in His wisdom, brought Israel to the Red Sea for their own good, and though they could not see it His way, He nevertheless for His Name’s sake divided the sea, took them safely across, and at the same time, by the same miracle, He destroyed their enemies!    Had Moses been as doubtful of God’s power and leadership as were the people that were with him, what effect would his rod have had as he struck the sea with it? — None whatsoever.  If the Judgment of the Infinite were the same as the judgment of the finite, then Pharaoh’s army would have either killed or enslaved Israel anew.    Their mighty deliverances should, therefore, forever establish our confidence in God, and should stand as everlasting memorials that the wisdom of men is foolishness with God, and that faith in Him does actually remove mountains and seas, too.    Notwithstanding these ensamples, though, men still expect God to work in accordance with their judgment, and that is why sometimes He uses children in Timely Greetings, Vol. 1, No. 7                           7 His work instead of wise and prudent men.    The Hebrew host well knew that they were led to the sea by following the cloud by day and the pillar of fire by night.  Yet none of these wonders seemed to have made any lasting impression on them.  There is a danger that we, too, may forget the way the Lord has led us.    After Israel crossed the sea, and after the sea closed in on their enemies, they all sang and gave God the glory, but though Pharaoh’s army and the sea were no longer objects of fear but of interest, their trials, doubts, and fears were not yet at an end: Almost immediately after they saw the sea behind and the desert ahead they began to recriminate Moses for having brought them into the desert to starve there for want of water and food.  It never entered their minds that if God can dry the sea, He can certainly flood the desert and make it blossom as a rose.  Notwithstanding their doubts and their moanings God again performed an even greater miracle: He caused water to gush out of the rock and He brought manna from Heaven!    Today as in Moses’ day many are duplicating the sins of that people: Some are all on fire on day, and all on ice the next.  Others praise God to the top of their voices while their ship is smoothly sailing, but when the sea becomes rough and the waves start beating against them, then they see only a man at the wheel and rather than expecting God to calm the sea they begin to hunt for a jumping off place.  Still others are constantly trying to promote themselves by continual fault-finding against the ones that bear the whole burden of the load.  So it is that there must be among us today — antitypical doubters, complainers Timely Greetings, Vol. 1, No. 7                           8 office seekers and faultfinders, admitting one great truth one day and forgetting it the next day — yet expecting to be sealed with the seal of God and to stand with the Lamb on Mt. Zion!    The Lord fed His ancient people with Angel’s food, the kind their work and climate required.  He delivered it fresh daily, and it did not cost them one cent.  All they had to do was to bring it into their tents and to eat it.  But they disliked the manna, and wished they were back in Egypt eating from its flesh pots, “the leeks, and the onions, and the garlick.”  In their eyes, Moses was the greatest of sinners, and they blamed him for every trial of their faith.  Had God given them something other than manna, they would have been just as dissatisfied with it because an evil spirit was in them.  Let us gladly and with thanks eat and drink what the Lord gives us and when He gives it to us.    You recall that by craving flesh food they made the situation unbearable for Moses.  So, to their great surprise quail filled the camp, and the multitude carried them into their tents.  But at what a cost!  Thousands of them died even while the flesh was yet between their teeth.  Then they understood that the manna was the better food.  It was a great lesson, but an expensive one.  What about us Vegetarians?    Their murmuring, however, did not end even then.  They found something else to murmur about.  They grew jealous of Moses and of Aaron.  “They are taking too much on themselves,” the office seekers complained.  “We are just as much favored of God as are Moses and Aaron.  God speaks with us as much as He speaks with them,” they said.  And who were the chief complainers? — The princes of the nations, the Timely Greetings, Vol. 1, No. 7                           9 men who were the most capable, the very ones who should have known better.  Those who could have been the greatest help to Moses became the biggest hindrance to him.  They wanted Aaron’s office; they wanted Moses’ office.  They refused to be satisfied with anything less.  The Lord Himself got nowhere with them.  The only thing He could do was to cause the earth to swallow them.  Thus in one day thousands — practically all the so-called wise — fell into the bowels of the earth.  Are we, too, seeking office by which to exalt self and are we, too, endeavoring to usurp the seat of the Spirit of Truth?    Finally, the emancipated children of Israel came to the borders of the promised land.  And though they had witnessed great miracles right along, yet they did not believe that God could procure the land for them!  They had seen that He was able to deliver them from Pharaoh’s brick yards, to take them dryshod through the sea, to destroy their enemies, to give them food and water in the desert where there was none to be had, yet they did not believe that He was able to take the land for them and that He could finish what He had started!    There are thousands today who are doing virtually the same when they say, “Isaiah, chapter 2, Micah, chapter 4, Jeremiah, chapter 31 and Ezekiel, chapters 36 and 37 will never be fulfilled.”  It was those who were of age, those who should have known better, that started the ball rolling down hill to destruction.  The youth, of course, must have echoed the murmurings of their elders, but the Lord did not hold it against them.  And in order to salvage the youth, God had to bury all their murmuring parents except the two faithful, trusting men who protested against the evil report of the other ten spies.  Mark you, every adult that Timely Greetings, Vol. 1, No. 7                          10 left Egypt, except Caleb and Joshua, had to be buried before the youth could cross the Jordan!  Why? — Because though God did take them with ease out of Egypt, He could not get Egypt out of them.  Are you still wondering why the prophet Elijah must “turn the heart of the fathers to the children, and the heart of the children to their fathers”? (Mal. 4:6.)    Christians often think that the Israelites were very wicked and unruly people, but after having their experiences to profit by, think how much worse we would be if we do as they did!  If we do no better than they, how can we expect to be eligible for the seal and for the Kingdom since they were not eligible?    In the very prime of life, Moses thought himself capable of delivering the children of Israel.  But Providence said: “You are not fit for the work, come out and I will make you fit.”  And out Moses went.    He did not need Pharaoh’s training in order to do God’s work.  It was a hindrance to him!  Why?  Because it made him self-sufficient, independent of God.  Such a person would be the right one to lead God’s people away from Him and into sin, but the wrong one to lead them to God and away from sin.    How true the statement in Testimonies, Vol. 5, pg. 80: “…In the last solemn work few great men will be engaged.  They are self-sufficient, independent of God, and he cannot use them.  The Lord has faithful servants, who in the shaking, testing time will be disclosed to view.”    God can help only those who know that they are unequal to their task, those who know that they need His help.  So, then, those who think that they can do wonders Timely Greetings, Vol. 1, No. 7                          11 are the very ones who can do nothing but harm.    Plainly, those whom God is to use in His final work, in the time of the end, are not to be anything like the Egyptian crown prince, not anything like the learned Moses.  Those who can learn to keep and feed sheep well and to readily take orders, are the ones who can be taught how to keep and feed God’s people.    Moses’ wife was the only Ethiopian in the entire company.  For this reason some thought they were superior to her.  They thought that Moses had committed the unpardonable sin by marrying out of his nation, as though race had anything to do with making people superior or inferior.  Moses’ own sister, Miriam, was caught in that sin.  There she was, trying to break up his family, yet Moses prayed for her recovery when she was stricken with leprosy. Timely Greetings, Vol. 1, No. 7                          12    We need not go into a land of wonderment, need not entertain the idea that we must have a mysterious feeling, exciting emotion, need not wallow in the dust or jump to the ceiling.  No, we need not make fools of ourselves.  All we need to do is be ourselves.  Be calm, decent, respectable, heaven-like beings, endeavoring to do God’s will on earth as it is done in heaven.  We need not make a display of ourselves, but we need to mind our God-given business and to keep our noses out of other people’s business.    Only when we have done all we can to comply with the requirements of the message for today, not of yesterday, shall we be sealed and stand with the Lamb on Mt. Zion.    Should we not be glad that while we are being invited to the Kingdom, we are also being told how to get there?  Seeing all these, we must never let our confidence in God wane.  We ought to be stable, firm in everything, lacking nothing.  God’s eleventh-hour servants, says Inspiration, are to be “a great people and a strong; there hath not been ever the like, neither shall be any more after it.” Joel 2:2.  They know what they believe, and believe what they know.  Most important of all, they know that they are led by God, not by man. Timely Greetings, Vol. 1, No. 7                          13    They are not like the Pharisees who were building monuments in memory of the dead prophets (Matt. 23:29-31) and at the same time were slaying the living ones!  With this light shining on our pathway, Hebrews, chapters 3, 4, 10 and 11 become self-interpreting. Timely Greetings, Vol. 1, No. 7                          14 The Sacred Page A glory gilds the sacred page,Majestic like the sun;It gives a light to every age,It gives, but borrows none. The Spirit breathes upon the word,And brings the truth to sight;Precepts and promises affordA sanctifying light. The hand that gave it, still supplies The gracious light and heat;His truths upon the nations rise,They rise, but never set. Let everlasting thanks be thine,For such a bright display;It makes a world of darkness shine With beams of heavenly day.–Wm. Cowper (Timely Greetings, Vol. 1, no.7 , p.15)     “Plowshares into Swords” or “Swords into Plowshares”? July 22, 2017 Image result for plowshares to swords picture The Scriptures say apparently contradictory statements in Joel , Micah and Isaiah, let us read — As with all Scripture, there is deep truth here and as students of His word, we should delve into this and find the intended meaning of it all. We know one thing, the two different meanings although seemingly contradictory –are not. There is a reason why the Lord shows two opposite statements. Each are balanced in their context. Let us review what the message says about our subject — “And they shall beat their swords into plowshares, and their spears into pruning-hooks: Nation shall not lift up a sword against nation, neither shall they learn war any more.”  This verse reads exactly the opposite of Joel 3:10, “Beat your plowshares into swords and your pruninghooks into spears: Let the weak say I am strong.”    These scriptures reveal two classes of people.  One class shall flow into the church by great groups: Kings, and great army leaders who have been building destroying weapons and preparing for war.  Now the gospel has conquered them.  While they are joining the church they gather their war implements, beating them into plowshares and pruninghooks.  “Violence shall no more be heard in thy land, wasting nor destruction within thy borders; but thou shalt call thy walls Salvation, and thy gates Praise.” Isa. 60:18.  The other class, outside of the church, prepare for war, beating their plowshares into swords, and their pruninghooks into spears.  One people is preparing for translation, while the other is getting ready for conquest.  Therefore both scriptures run parallel and will be fulfilled at the same time.  Thus the world would be divided into two great separate and distinct classes: Separating the wheat from the chaff, the goats from the sheep.” (SRod, vol. 1, p.176-177)    Many nations are gladly to accept His rebukes, beat their swords into plowshares and their spears into pruning hooks rather than continue to run in the armament race.    According to Micah, the only nations that are to disarm are those that accept the Lord’s Truth for today and go to the Promised Land.  Never again will they need either swords or spears. Mic. 4:4 — “But they shall sit every man under his vine and under his fig tree; and none shall make them afraid: for the mouth of the Lord of hosts hath spoken it.”    The nations and peoples are now having a difficult time to get to their “fig tree,” so to speak, much less to sit in peace under it.  They are in constant fear that some one may dislodge them even from their sitting under no tree.  Consequently they will try to protect their rights, or unrights, by beating their “plowshares into swords, and [their] pruning hooks into spears.” Joel 3:10.  And so judging their own strength by their war preparations, even the weak will say, “I am strong.”  But it shall not be thus with those nations which join the people of the Kingdom of the Lord: They will not need to trust in their own strength, for they shall have the Lord’s protection.  Each shall comfortably and securely sit under his own “fig tree,” knowing that no one can possibly push him away from under it.  This is to be so, for “the mouth of the Lord of hosts hath spoken it.” (Timely Greetings, Vol. 1, No. 25, p.6-7)     “And He shall judge among the nations, and shall rebuke many people: and they shall beat their swords into plowshares, and their spears into pruning hooks: nation shall not lift up sword against nation, neither shall they learn war any more.” Isa. 2:2-4.    The law is to go forth when the mountain (Kingdom) of the Lord’s house is established on the top of the mountains (kingdoms), and when It is exalted above the hills.  Then the “light” shall cause the rebuked nations to flow to the mountain of the Lord.  And, too, instead of beating their plowshares into swords, and their pruning hooks into spears (Joel 3:10), they will beat their swords into plowshares, and their spears into pruning hooks.  “Nation shall not lift up sword against nation, neither shall they learn war any more.” Isa. 2:4. (Timely Greetings, Vol. 1, No. 37, p.13-14) So we see that there is to be two distinct type of people  –those who follow the Lord and trust in His strength and those who don’t. The Great Controversy indeed! This is what will be so great about the Lord, He will make it very simple for the people all over the world to choose life. Right now there is a counterfeit gospel being proclaimed with truth and error mixed but as soon as the Loud Cry headquarters is established in the promised land–Israel, the powerful Truth will be proclaimed around the world and all will have their chance to either make– swords into plowshares or plowshares into swords.               Three Interesting Subjects July 15, 2017 Image result for Picture of a man deeply thinking about bible For a while now, the Lord has placed upon my heart and mind to discuss three distinct subjects that are quite interesting as you will see. As we have done quite a bit of Elijah message material for a long time, I thought we’d detour this week to some other aspects of the Word. The three subjects we’ll cover are: 1. Who made what? 2. Does God know everything? 3. Matthew 10:23, how can that be true? These are just discussions, and all the analysis is not claimed to be final truth of the matter, only placed for consideration. So this will be a discussion of ideas concerning these three subjects and anyone who has some input is encouraged to add your thoughts down in the comment section below. In the beginning of the Bible we read– and so on as it shows God created or made all things UNTIL it comes to verse 26 — Here we see that no longer does it say “God created” rather “Let Us make”. That word “Us” is the only place in Genesis where it deviates from “God said” or “God created” in regards to creation of the earth, heavens and living creatures/man. So what are we to make of this? To make you ponder this more, let’s look at Isaiah 44:24. “Thus saith the LORD, thy redeemer, and He that formed thee from the womb, I am the LORD that maketh all things; that stretcheth forth the heavens alone; that spreadeth abroad the earth by myself;..” To be clear, the “LORD” here cannot be referring to God the Father because we read in John — Um. So what do we have here? It appears that our Lord, Jesus Christ, created all things in our planetary systems, except He wasn’t alone in the creation of mankind. This was a “team” effort, a Triune affair (God the Father, God the Son, and God the Holy Spirit) in the great and awesome work of the creation of mankind! Whose image is that of the Triune God. This one, we’ll have to open our thoughts up a bit to consider a unique view. In Isaiah 46:9-10 we read – There is no disputing that we serve an Omniscient God (all-knowing). However, we should also remember this important word of the Lord — The key words above that I’d like to focus on is “for thy pleasure.” Let us try to put the ideas of pleasure in mind. How many of us would receive pleasure, for example, if we already know what each and every play of the Super Bowl would be? Each movement in advance before going to the game? Same with a movie, a tennis match, your children’s life, etc.?(note: I am not advocating any of the worldly things just used for example) How could there be pleasure in this advance knowledge? What I am asking — Could it be that God “chooses” to withhold some knowledge from Himself in order to receive pleasure by watching the events unfold? I remember as a kid I had an absolute thrill with this electronic game I made. Some of you may remember back in the 70’s there was a very popular electric board game called Electronic Football. It has these small plastic pieces that would vibrate forward and had a tackle, guard, runner, etc on top of the pieces. You would set up the play and turn on the board and watch them move upon the field. I took these small green vibrating pieces and I put small plastic cars on these and then turned the football field into circular race car track. It was amazing as they would all run around the track, seemingly independently and pass and block and make maneuvers that were just fascinating. I must have played with that game for over 5 years! I keep scores and had season point standings to finally establish the top cars for the racing season. This brought great pleasure due to the unpredictability of it. Image result for old electronic football game set picture (picture of similar game we had) Had I had the entrepreneurial spirit this game could have been a block buster back in the 70’s and 80’s. This all was because my Dad was a top race car driver at the local race track and even raced against the “big boys” at Riverside International Raceway back in the 70’s (Richard Petty and Cale Yarborough included). So I  idolized race cars and of course told everyone I was going to be a “great race car driver” someday. My point is that this game was totally unpredictable. I never knew who would win or how. There could be the car in the back row that made some great moves and would finish on top after the 15 or 20 laps.  But would I have received pleasure knowing all the moves beforehand and the exact results? One possible clue that lends credence to this idea of withholding knowledge is found in Genesis 2:19. We know that He is the great reactor, One who is able to react to any circumstances. So nothing catches Him off guard and all is able to stay within His plans. We do know that there is a pre-planned mankind plan based on His prophetic Word and it is going to happen as His Word declares by His prophets. Here is one of the real puzzlers of the Scriptures. We see that the Lord says that the 12 Apostles would not finish going through the cities of Israel until He comes again. It’s been over 2000 years and the general consensus is that Jesus has not come back since. But let us now turn to Revelation. And he had in his right hand seven stars: and out of his mouth went a sharp twoedged sword: and his countenance was as the sun shineth in his strength.  And when I saw him, I fell at his feet as dead. And he laid his right hand upon me, saying unto me, Fear not; I am the first and the last:I am he that liveth, and was dead; and, behold, I am alive for evermore, Amen; and have the keys of hell and of death.” Rev. 1:10-18) This shows that John saw the Lord as He even placed His hand upon him. So it appears that the Lord did indeed come back before all the cities of Israel were reached! This was presumed to have taken place on the Island of Patmos in the year 95 AD. SOP counsels us — Right now we can wonder but soon all will be made clear, let us wait in eager anticipation for such glorious times! Will Elijah Restore All Things? (Part 2 of 2) July 8, 2017 Image result for picture of elijah SOP tells us that there is to be more work done by those faithful ones who rest in the graves, let us read– “Your work, my work, will not cease with this life. For a little while we may rest in the grave, but, when the call comes, we shall, in the kingdom of God, take up our work once more.” (Testimonies, vol. 7, p.17) What was Ellen White’s referring to as “my work”? Was it playing the harp and visiting other planets? Or was it saving souls for Christ? Yes, this was the only work they knew and did and that work will be taken up once more in the premillennial kingdom, praise the Lord. The Scriptures also declare this special resurrection of saints — The above is often not closely examined. But the Elijah prophet showed us that this cannot be about the resurrection solely to fit them for heaven, oh no! This is seen by the fact that some of these resurrected have a work to do– “they that turn many to righteousness as the stars for ever and ever.” The message explains this Word of God — “In these three verses several things clearly stand out: (1) Only those whose names are written in the books are delivered; there are therefore no “foolish” ones among them; (2) Those who are resurrected, however, are mixed, both foolish and wise come up; (3) The statement, “and they that be wise [implying that some be foolish] shall shine as the brightness of the firmament” indicates that these “wise” ones are from among the raised; (4) That if the wise are from among the resurrected and turn many to righteousness, then they must be resurrected in probationary time, in time of salvation.    “Your work, my work, will not cease with this life.  For a little while we may rest in the grave, but, when the call comes, we shall, in the kingdom of God, take up our work once more.” — Testimonies, Vol. 7, pg. 17. Dan. 12:4, 10 — “But thou, O Daniel, shut up the words, and seal the book, even to the time of the end: many shall run to and fro, and knowledge shall be increased.  Many shall be purified, and made white, and tried; but the wicked shall do wickedly: and none of the wicked shall understand; but the wise shall understand.”    Now what is meant by being wise? — Let us turn to– Here we see that the wise are those who take extra oil, extra Truth that lightens the rest of their way.  Finally, it plainly appears that this mixed resurrection is a test; that is, they are all given the opportunity to be wise, to turn many to righteousness, but only a part of them do so.  Some of them again fall into sin, and therefore they awake to shame and everlasting contempt (everlasting disobedience), but the wise awake to everlasting life, never again to die.  This plainly shows that those who give themselves to wickedness up to the time they die, would not turn to righteousness even though they be given a second chance.  The extra oil (Truth for this time) is what decides each one’s destiny.  The wise shall embrace the “additional Truth,” while the foolish will not.  Sin is indeed a mystery! (Timely Greetings, vol. 2, no. 7, p.14-15) So we see that there is “work” yet to be done by the faithful whom God will raise up during the “time of trouble” which we as present truth believers know is post Ezekiel 9 church judgment. Now let’s look at the heart of this post , these are truly bright lights of truth on our subject —    The self-centered shepherds against whom the prophet is told to write, are to be replaced by one shepherd, David.  When this takes place God’s people will then have but one shepherd.  This, of course, cannot be Christ Himself, for Inspiration never calls Him David, but rather It calls Him the Son of David.  Since God’s people have always had, and still do have many shepherds, the truth stands out as clear as crystal that the David of verses 23 and 24 is yet to come, and that the shepherds whom Inspiration addresses are in particular those whom David is to succeed.    Ezekiel, then, was not given a vision of the shepherds in his day, nor of those before his day, but of the shepherds after his day — the day in which God raises up this antitypical David to feed His hungry and neglected flock.  God’s people shall then no longer serve strangers, “But they shall serve the Lord their God, and David their king, whom I will raise up unto them.” Jer. 30:9.  Here we see that not only Ezekiel, but Jeremiah also was given a vision of this same truth.  Yes, all the prophets.    Since this is the addition to the “Third Angel’s Message” (“Early Writings,” p. 277) and since it is the message of the hour, consequently the day of the Davidian Kingdom is at hand.  Let us turn to– Hos. 3:4, 5 — “For the children of Israel shall abide many days without a king, and without a prince, and without a sacrifice, and without an image, and without an ephod, and without teraphim: afterward shall the children of Israel return, and seek the Lord their God, and David their king; and shall fear the Lord and his goodness in the latter days.” (Timely Greetings, Vol. 2, p.14-16) We see that there is to be “one shepherd” instead of today where there are all kinds of shepherds trying to lead the flock, yet falling abysmally short. The Lord tells us prophetically that the last days shall have a kingdom and a king to rule there, no question about it! What we also see is that the Lord will “raise up unto them” a king (Jer. 30:9). As we mentioned the Lord left no stone unturned  and through the Elijah message He tells us what His role is in these pre-millennial kingdom days — “The Lord will work in no less miraculous a manner now to free His people from being ruled by a worldly organization. He will command the work Himself in the same manner as He did in Moses’ and David’s day. …In the days of Moses and in the days of David, when the Lord had the work in His Own hands, He spoke to the people through Moses and through David, and thus He ruled. In like manner will He, at this time, rule the work when He takes the reins in His Own hands. …It is generally understood that when Christ visibly appears, the nations will die by the brightness of His coming, and thus the wicked will have no chance for either the Lord to speak to them or they to speak to Him. Furthermore, according to the parable, He sits on the throne of His glory instead of sitting on the clouds as in 1 Thess. 4:17. Therefore, the throne of His glory is His kingdom where He, invisible to the nations, sits on the throne and gathers all nations before Him as recorded by the prophet Isaiah also, saying: “And it shall come to pass in the last days, that the mountain of the Lord’s house shall be established in the top of the mountains, and shall be exalted above the hills; and all nations shall flow unto it.” (Isa. 2:2.) (SC, vol. 4, no.10-12, p.6) It is now clear that the Lord’s promise of restoration is not hard to understand. Once we look at the whole picture, all the references, much as a puzzle it all comes together. And this restoration comes from the “Elijah” who the Lord delegated as the one to do it. It is not to our human understanding that Victor Houteff should do the initial work of Elijah, calling out the sins of the people and church and yet die then come back and finish the work. But the Lord, as SOP noted, will workin a way that will be contrary to any human planning.” We have heard the argument “Oh no, you take away Christ’s rightful role as the restoration one”. No, “we” do not,  the Lord has spoken that HE wants His Elijah prophet to supervise and command the kingship in the time of restoration, just as He wanted Moses to lead His people. SOP gives a most beautiful picture of these times of restoration — “In visions of the night, representations passed before me of a great reformatory movement among God’s people. Many were praising God. The sick were healed, and other miracles were wrought. A spirit of intercession was seen, even as was manifested before the great Day of Pentecost. Hundreds and thousands were seen visiting families and opening before them the word of God. Hearts were convicted by the power of the Holy Spirit, and a spirit of genuine conversion was manifest. On every side doors were thrown open to the proclamation of the truth. The world seemed to be lightened with the heavenly influence. Great blessings were received by the true and humble people of God. I heard voices of thanksgiving and praise, and there seemed to be a reformation such as we witnessed in 1844.” (Testimonies, vol. 9, p.126) Some of you may not know much of this man –Victor T. Houteff, but if you are like a detective, a Sherlock Holmes type, searching each piece of the puzzle, you will come to this conclusion we assure you. Stick to the Bible, SOP and the Rod and you’ll have no trouble. Let us remember that the Lord loves His people deeply and has pointed a clear road map for His Seventh-day Adventist people, clear to the kingdom, we only have to follow it. In closing, there is no doubt that brother Victor Houteff, whom the Lord brought forth to give the Rod message (the Elijah message) and prepare the people for His sudden church coming (Ezek.9), will “take up the work once more” after the church purification, along with Ellen White and all the faithful pioneers. Then it shall surely be as the Lord promised, the Elijah will “restore all things.”  The earth shall quake before them; the heavens shall tremble: the sun and the moon shall be dark, and the stars shall withdraw their shining: And the Lord shall utter his voice before his army: for his camp is very great: for he is strong that executeth his word: for the day of the Lord is great and very terrible; and who can endure it?” (Joel 2:2-11.) Will Elijah Restore All Things? (Part 1 of 2) July 1, 2017 Image result for picture of elijah In Matthew 17:11 we read — SOP counsels us– So let us look at the question in-depth. SOP says the following — The message tells us the purpose  of this house of David– Stay tuned for part two next week, Lord willing. %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/10419
Confessing Our Sins, One More Time Re: Losing fellowship with the Lord when we sin and the need to confess. I know that confession of sins is a standard take on the Bible that is taught even in my church, but recently the Lord has given me a powerful revelation on his incredible GRACE. I now believe that Chapter 1 of 1 John was written to both believers and non believers. Or, it was written to believers who felt that once saved they no longer sinned (Gnostics). I have read both of these interpretations and they make sense. I don’t believe he was telling believers to confess to restore fellowship. First of all, God promises to never leave or forsake us. Second, we actually sin much much more than we realize. I think if we break our fellowship with him every time we sin then we will not have hardly any fellowship with him until we die. You should ask yourself if the Lord gave you “a powerful revelation” about 1 John, or if you developed your own opinion from reading several varying interpretations, because both the interpretations you refer to conflict with God’s word. John repeatedly calls the recipients friends, or dear children, and uses inclusive language when speaking to or about them. He didn’t use this kind of language with non-believers. (See 1 John 2:18-19 for the contrast.) And in His concluding remarks he wrote, “I write these things to you who believe in the name of the Son of God so that you may know that you have eternal life.” (1 John 5:13). The opinion that he wrote the first chapter to non-believers but the rest of the letter to believers makes no sense at all. Do you start a letter or e-mail to one person and without explanation suddenly begin writing to another person in the same document? Neither does your conclusion that we sin so much we’d be out of fellowship most of the time negate the need for confession. What better reason to ask His forgiveness? Also, research shows that the overwhelming majority of those who call themselves born again spend most of their time in exactly the situation you mention, still saved but out of fellowship with God. I’ve never understood why people resist confessing their sins, especially since forgiveness is automatic (1 John 1:9).
global_01_local_2_shard_00001658_processed.jsonl/10422
Movie music in the heart Shawshank Redemption, King Kong and ETI like to make people cry. Just to reassure you, that doesn’t involve kicking their kneecaps or anything. Just manipulating their emotions. For me, touching the reader’s heart is the holy grail of storytelling. I make no great claims for my track record in this department, but I hope I’ve managed it once or twice. One of the things that helps drive me to write better, more emotional stories is movie music. I don’t listen to music while I’m writing; I prefer silence (I’ve talked about this before in an earlier post). But I do sometimes find music in my head while the words are coming out. More often than not, it’s music from a film. During the writing of my latest novel, three scores in particular have kept cropping up. All three, interestingly, are real emotional workouts. Not so much music in the head, then, as in the heart. The Shawshank Redemption – Thomas Newman A fabulous suite of cues that reinvokes the entire gamut of emotions I experience whenever I watch the film (which remains a solid favourite of mine). ‘An Inch Of His Life’ is dark and claustrophobic , while the soaring finale combination of ‘Compass And Guns’, ‘So Was Red’ and ‘End Title’ reduces me to jelly every time. King Kong – James Newton Howard The only place Peter Jackson’s remake of King Kong falls down is that it overburdens a simple story with too much love. Love, however, is what comes through in Howard’s impressive score, famously composed in just five weeks. The actions cues are suitably bombastic, but the stand-outs for me are the simple and lyrical ‘A Fateful Meeting’ and ‘Beautiful’, which between them define both Ann’s loneliness and her love for that damn giant ape. E.T: The Extra Terrestrial The grand-daddy of all uplifting scores. I’ve heard this I-don’t-know-how-many-times and it never fails to melt my heart. I defy anyone to listen to the 15-minute rollercoaster of ‘Escape/Chase/Saying Goodbye’ without being transported to another dimension. 1. Phil Guest says: Excellent choices there, Graham. Thomas Newman is a particular favourite of mine too. American Beauty is another great score of his – the “Any Other Name” cue, which plays under the climactic scene, is breathtaking. 2. It’s funny, I listen to music when I write screenplays, but not when I write short or long-form fiction. It just kind of worked out that way for me. lol What do you think? You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/10425
Skip to main content Showing posts from July, 2016 Thrift Shop Tray Make-over. Trays, are the workhorses of home decor. They're practical, versatile, functional and pretty all at the same time. Now what could be better than that? When I saw these trays (a set of 3) at a thrift shop in Canada  I couldn't resist. They were a bargain at $4. But then I realized that was $3.06 US. Even better! At the time, I didn't know exactly how I wanted to paint them,  but they were definitely coming home with me.  I had these decorative papers in my "stash of good things." They'd work well for this project. But if you didn't have papers like these, what else might you use? ....old sheet music, pages from a book, wrapping paper,  vintage sewing pattern envelopes, maps....  any of these would be unique. I used my Go-To paint formula: 1. First paint Black   2. Follow with Westhighland White by Sherwin Williams. 3. Finish by sanding to reveal the black underneath. Easy -peasy. I randomly tore the edges so things looked less "perfect" and applied the sheets with Modg…
global_01_local_2_shard_00001658_processed.jsonl/10449
What Caused the Uncaused Cause? The error atheists make is thinking that Aristotle meant the Prime Mover was like the person who pushes the first domino, setting off a series of events. The person in this analogy had a cause, her parents created her, therefore God must have a creator as well. God, according to Aristotle and St. Thomas, did not set the Universe in motion by giving it a push; God is the teleology (the purpose served by change rather than by postulated causes) of the causal Universe. Trump: Liar & Atheist It has always been the aim of secularists to elect an atheist into the office of the President of the United States. Never have they been closer to achieving this goal, and never have the stakes been higher. With November only 2 months away, atheists are putting all their effort into supporting the campaign for possibly the first atheist president—Donald Trump. Science is Sexist As I’ve researched for this post, reading through many accounts of misogyny conducted by atheists and their elites, I found plenty of evidence supporting the sexist tendencies of atheists but never a reason as to why. What is it about atheism, apart from the obvious lack of morals, causing sexism within their movement? Then I had my ah-ha moment—science is sexist.
global_01_local_2_shard_00001658_processed.jsonl/10450
Herbal Remedy for Migraine Headaches Feverfew is a traditional, European herbal remedy for migraine headaches. Its use has gained increasing acceptance in the medical community over the past two decades as an alternative to over-the-counter pharmaceuticals. Modern medicine has made great strides to provide relief to migraine sufferers. Drugs like Amerge and Imitrex work to relieve migraines by altering the muscle tone of the particular arteries found in the brain that cause migraines. However, these drugs are not without side effects, making herbal remedies such as feverfew an increasingly attractive option. Migraines are a type of vascular headache, which are caused by vascular spasms of certain blood vessels in the brain. As such, they cannot effectively be treated with painkillers, which merely target the blinding pain. Excruciating as it is, migraine pain is merely a symptom of the underlying cause of migraine headaches. Feverfew is believed to be an effective herbal remedy for migraine headaches, because it targets the root cause of this debilitating condition. Feverfew as an Herbal Remedy for Migraine Headaches Feverfew (Tanacetum parthenium) has traditionally been used as an herbal remedy for migraines, with relatively few side effects being reported. Also called bachelor's button, this aromatic, perennial herb is native to southeastern Europe. While some anecdotal reports indicate that feverfew may be an effective treatment for active migraine headaches, this herb holds the most promise as a preventive remedy for migraines. How it Works Clinical research has isolated and identified the key active components in feverfew as a group of compounds called sequiterpene lactones (STL). The most important STL is parthenolide, which comprises up to 85 percent of the total STL content found in feverfew. STLs are believed to prevent the vascular spasms that cause migraines by regulating the serotonin mechanism as well as inhibiting the release of histimine and prostaglandin. It is also believed that it has an anti-inflammatory effect by decreasing the secretion of pro-inflammatory enzymes by particular white blood cells called polymorphonuclear leukocytes (PMNs). Clinical studies indicate that daily oral doses of feverfew are effective in reducing the frequency and severity of migraine headaches. Results from a 1997 double-blind, placebo study conducted in Israel showed that participants treated with feverfew experienced a significant reduction in the intensity of their migraine headaches. There was also a significant reduction in the severity of associated symptoms such as nausea and vomiting as well as light and sound sensitivity. No serious side effects were reported Recommended Dosage To provide migraine relief, feverfew preparations need to be taken orally on a daily basis. The encapsulated form of dried feverfew leaf is the most often prescribed form, because chewing the fresh feverfew leaves may cause mouth ulcers. The typical standardized preparation contains at least 0.2 percent parthenolides, the active constituent in feverfew. (Higher concentrations are fine, too). The recommended daily dosage is at least 125 mg of this preparation. For the most effective, long-term treatment of migraines with feverfew, migraineurs should take the recommended feverfew preparation on a regular basis for a number of months. Medical research indicates that a period of four to six weeks is required before any results will be noted. Feverfew Side Effects • Pregnant women must never take feverfew, as it is known to cause uterine contractions. • Feverfew's bitter tonic properties may cause gastric pain if taken by people who suffer from gall-bladder conditions or stomach ulcers. • People who are allergic to herbs in the ragweed family such as daisies, marigolds and chrysanthemums may also have allergic reactions to feverfew. Other Herbs Used in the Treatment of Migraines Headaches While feverfew is the most widely used herbal remedy for migraine headaches, a few other herbs have traditionally been used to treat this condition: • Ginger (Zingiber Officinale) • Lavender (Lavandula Officinalis) • Butterbur (Petasites Hybridus) • Rosemary (Rosmarinus Officinalis) • Peppermint (Mentha Piperita) As always, you must consult with your health care provider before you begin to take feverfew or any other herbal remedy. This will arm you with the best of both conventional and herbal wisdom to take on your migraine headaches. Herbal Remedy for Migraine Headaches
global_01_local_2_shard_00001658_processed.jsonl/10479
Curious Feeders • episode "S3E4" Natural Curiosities Category: Nature David Attenborough examines creatures that have fascinated us for centuries. A look at some species with unusual styles of consuming food. Natural Curiosities • 0 • 11 episodes • Virgin Births Sir David Attenborough uses this episode to investigate two animals who are capable of true virgin birth - the production of offspring without the need for sex. Armoured Animals This episode explores the story of two animals that hide behind seemingly impregnable coat of arms. Can Sir David Attenborough get in behind their armour and reveal their mysteries? Life on Ice In this episode we explore the remarkable adaptations of two creatures that have evolved to survive the most challenging of conditions and seem to defy the laws of nature. Spinners and Weavers We'll find out how nature is incredibly inventive and has produced two unique mechanisms of natural construction that have fascinated scientists for centuries; weaving in birds and silk. Strange Parents "Strange Parents" asks how we usually recognise animals as either male or female and how each sex normally plays a particular role in their own life cycle. However both hyenas and seahorses completely break the gender rules. Expandable Bodies David Attenborough examines creatures that have fascinated us for centuries. This episode looks at the expandable bodies of anacondas and camels. Curious Feeders Remarkable Regeneration David Attenborough examines creatures that have fascinated us for centuries. A look at some species with remarkable regenerative powers. A Curious Hoax? David Attenborough highlights the curiosities that have led to accusations of forgery, but have ultimately helped assist the rethinking of evolution. When early explorers brought the first specimen of a duck-billed platypus to England in 1799, it was considered so bizarre it was deemed a hoax. Similarly, the midwife toad became the centre of a scientific storm in the 1920s that led to accusations of fakery. 2013 • Nature Life in the Dark David Attenborough looks at the eyes of squid and owls and how they've managed to maximise their vision. 2014 • Nature Magical Appearances "Magical Appearances" explores how swallows magically appear each spring and asks how did complex and beautiful insects like butterflies suddenly arrive in the summer.The discovery of the swallow’s epic migration and the revelation that butterflies could metamorphose into totally different looking adults were scientific stories both cloaked in mystery and controversy. 2014 • Nature You might also like Extreme Wonders Across our planet, there are a handful of places that truly astonish, like Mount Everest, the Grand Canyon and Victoria Falls. These wonders seem to have little in common other than - literally - taking your breath away. But they share one other thing: they pose extraordinary challenges for their inhabitants. The first of two programmes in which cameras explore some of the most inhospitable places on the planet and the people who live there, including a team of Sherpa roping a route on Mount Everest's notorious Khumbu Icefall and, on the slopes of Mount Kilimanjaro, farmers fight pitched battles to save their crops from marauding elephants. In the Amazon rainforest, two boys undergo a rite of passage involving hundreds of ants with the most painful stings on Earth, and conservationists in the Grand Canyon try to ensure the survival of one of America's few surviving condor chicks. 2015 • Earth's Natural Wonders: Living on the EdgeNature Growing Up 1990 • Trials of LifeNature Decoding Disaster From earthquakes to tsunamis to volcanic eruptions, natural disasters are both terrifying and fascinating - providing endless fresh material for documentary makers. But how well do disaster documentaries keep pace with the scientific theories that advance every day? To try and answer that question, Professor Danielle George is plunging into five decades of BBC archive. What she uncovers provides an extraordinary insight into one of the fastest moving branches of knowledge. From the legendary loss of Atlantis to the eruption that destroyed Pompeii, Danielle reveals how film-makers have changed their approach again and again in the light of new scientific theories. While we rarely associate Britain with major natural disaster, at the end of the programme Danielle brings us close to home, exploring programmes which suggest that 400 years ago Britain was hit by a tidal wave that killed hundreds of people, and that an even bigger tsunami could threaten us again. 2017 • A Timewatch GuideNature What is the Evidence for Evolution? Biologists teach that all living things on Earth are related. Is there any solid evidence to back this claim? Join us as we explore the facts! We start with a close look at the origin of whales from land mammals, and then touch on the origins of several other critters, including our own species. Stated ClearlyNature Ocean Deep David Attenborough narrates the final episode in the documentary series that shows our planet in all its glory. In this part, he looks at the largest of all habitats - the ocean. 2006 • Planet EarthNature Life From Light 2012 • How to Grow a PlanetNature
global_01_local_2_shard_00001658_processed.jsonl/10503
There’s No Such Thing as Shadow IT In a world that is becoming entirely driven by technology and transformed by digital endeavors, it seems only logical to have the CIO as the master of all technological decisions. But with all of the shadow IT floating around, should the role of CIO really be “gatekeeper”? In an article for CIO UK, Ian Cox proposes that the CIO should become more of a technology broker. Lengthening the Leash Shadow IT is a difficult thing to measure, even within each individual organization. However, one thing that is very evident is that the technology budgets for departments outside of IT are increasing. The idea of shadow IT is not new, and in fact ever since the beginning of the IT department there has been technology activities occurring without IT knowledge. According to Cox, “More often that not, however, this was done with good intentions and was usually borne out of a need that was not being met by the central IT function.” Previously, if there was a need for a new database, or a new, better database was discovered, the CIO was the “gatekeeper” in deciding whether or not to integrate it into the organization. The CIO could decide to reject the request because of cost or even because of the operating system. Other departments could not get around this fact because the CIO held all of the technology control and power to order new systems. In recent years, shadow IT has become an entirely new beast. With the popularity of mobile and cloud technologies, non-IT departments can easily gain access to whatever systems they like. This instantaneous gratification by other departments is entirely unknown to IT. Technology is becoming the heart of what organizations do, which means that shadow IT is going to be a reality. CIOs are finally starting to accept this. Cox proposes a five-stage process that the average CIO undergoes when handling shadow IT: 1. Denial 2. Anger 3. Acceptance 4. Learning 5. Embracing and encouraging Ultimately, Cox proposes that CIOs should be moving towards embracing and encouraging other people to be involved in technology decisions. CIOs should focus on influencing intelligent technology decisions, rather than trying to control everything. You can read the original article here: Show More Leave a Reply We use cookies on our website
global_01_local_2_shard_00001658_processed.jsonl/10533
katratxo on Software Development tail -f /var/log/brain | grep -i software Posts Tagged ‘mobile Openbravo Mobile: Technical Overview and Roadmap leave a comment » Have you seen the power of Openbravo Mobile already? As you may have read in a previous post, we have been looking for the best HTML5 framework for Openbravo Mobile. After several months of researching, prototyping and testing we have decided that Enyo is our best option. What’s Enyo? Enyo is an object-oriented JavaScript application framework emphasizing modularity and encapsulation. Back in January, HP announced the new version of Enyo, the framework powering webOS applications, but this time, a cross-browser solution optimized for mobile devices and released under the Apache license. Since this initial announcement we have been tracking the evolution of the framework on every release. In February I posted a very simple example on how to consume Openbravo JSON REST WebServices, using Enyo (core). In July the first non beta version was a released, by then we knew that Enyo was a real option for us. Our experience with Enyo We’ve been working with Enyo for several of months now and we are really pleased and enjoying the experience. After investing time in prototypes and getting to know Enyo, our first real work was the code refactor using Enyo abstractions (Kind, Component, Control, Event) in Openbravo Web POS. Openbravo Web POS – Powered by Enyo The experience and result of this process gave us enough knowledge and confidence to decide and go for it: Enyo is the right framework for Openbravo Mobile, as it provides the building blocks for developing a modular, extensible, thin, and fast mobile applications In Openbravo Mobile we’ll use the full suit of Enyo, core, onyx and layout. Here you have some examples of the output of this great framework. Grid View – Purchase Order Lines Form View – Purchase Order (Processing) The Data Model We’ll also use Backbone.js Models and Collections for representing the entities declared in the Application Dictionary and Enyo will provide the UI widgets for manipulating those collections and models. In the back-end we’ll use the same modular architecture in Openbravo 3. Openbravo Mobile Architecture Openbravo Mobile Architecture The Roadmap The main goal of Openbravo Mobile is to deliver the framework for developing mobile applications by the end of Q4-2012, with a few milestones in between: • Basic infrastructure (Login + Workspace): Be able to login using a mobile device, and open a window • Standard Windows: Support for windows declared in the Application Dictionary • Processes and Reports: Support for launching reports and processes from a mobile device • Support for Manual Windows: Support for View Implementations (aka Manual Windows) • Fine-tune Functional Flows: Revisit the flows and usability in a mobile device (Q1-2013) I hope this gives you an overview on what has being going on in Openbravo Mobile, the Roadmap and milestones of this project. To know more about Enyo visit http://enyojs.com Written by katratxo October 8, 2012 at 11:37 am Wow! 2 billion order lines per year, really? How much of that data can be stored offline? with 2 comments My colleague Antonio explained in his post the performance of the server side component in the Openbravo solution for Retail. Now let’s take a look on the client side part, What happens when you’re selling and your network goes down? How much time can you work in offline mode? Imagine you have a store in Pamplona’s city center, and during San Fermín festival you sell all the required clothing for the festival: White shirt and pants, the red handkerchief and belts, bota bags, etc. Now imagine you’re on July 5th, the day before the Chupinazo, your store is crowded by foreigners trying to buy the outfit and equipment for the festival; you have a lot of them in the queue waiting to pay. Everything is going so well, you’re selling a lot, but suddenly your network goes down, your internet connection is lost, you’re in panic!!, you start asking yourself: “Am I able to keep selling without internet connection?”Of course! You’re using Openbravo Web POS. Remember what Antonio mentioned: The POS terminals can work in two different modes: online mode, and offline mode. When they are online, and a sales order is created, the terminal sends this order to the Openbravo instance … If the terminal is offline, however, the order cannot be immediately sent. In this case, the order is stored in a database inside the POS terminal. Once the terminal returns to online mode, the POS terminal sends a batch which contains all stored orders to the Openbravo instance. This is a nice feature but: How many order can I process in offline mode? How much time do I have before my POS terminal gets full? The answer is: It depends on the processing rate (orders per minute) and the average order size (lines per order) of your store. Let’s take the best scenario for your Pamplona store on July 5th as example. Let’s imagine that you’re are able to process 4 orders with 10 lines each every 60 seconds. That is, with a single POS terminal, you’re selling to 4 different customers every minute, without stopping a second. (This is almost physically impossible, but during Sanfermines you never know). Some numbers (the geeky stuff) An order with 10 lines is 3 KB of data in the POS terminal cache. If you are serving 4 customers each minute with a single POS terminal; you’re generating 720 KB per hour (nice speed). Notice that this is an ideal situation: 4 customers with 10 different products every minute without stopping. At this frenetic rate, in a 12 hour shift without internet connection, and just before the party starts, you have stored 8.44 MB of data in your POS terminal offline cache. While you were selling at the rate of 4 orders per minute, your colleague have called the Internet provider and reported the network problem. 12 hours later and just before closing the day, the internet connection has been restored and the terminal has sent all the 2880 orders that you have produced during the offline period. The best thing is that you have provided all the required equipment to almost three thousand foreigners eager for party. Don’t worry, the only limit is the physical space in your mobile device If you are using an Android device like a Samsung Galaxy Tab 10.1 or a fully fledged Windows 7 tablet like the Asus Eee Slate EP121, your database will silently grow, allowing you to keep selling in offline mode. At the rate of 4 orders per minute, it will take you more than 2 years to fill 10GB on your Samsung Galaxy Tab, or more than 4 years to fill 25GB on your Asus Eee Slate EP121, and remember, selling without stopping a second!! The iPad limits Unfortunately the previous statement is not true for the Safari browser on iOS. The Apple guys have set a 50MB limit for offline storage, but this quota is more than enough space for the normal operation of Openbravo Web POS with a very high order processing rate. Openbravo Web POS supports enormously high processing rate Under normal operation (online mode) every order is sent to the server immediately just after closing it. Openbravo Web POS allows you to work in offline mode but this is a fall back mode. There are several benefits of immediately sending the orders to the server: 1. Updated warehouse stock 2. Generate a Sales Invoice when you specify it 3. Any other retail related process you have implemented in your Openbravo instance Working in offline mode shouldn’t be your normal operation mode, but even in some unusual situations where you have 1-2 days or even a week without network connection, Openbravo Web POS will support your operation without any issue. What about Master Data? When you login into an Openbravo Web POS terminal the required master data it is also stored in the offline cache. By master data I mean: Products (with images), Prices, Business Partners, Tax Rates, etc. Caching master data will take space from your offline cache, but it is required to be able to have a fully working offline mode. In another post I’ll give you more detailed description of how much the master data takes in the database, but to give you a rough estimation: caching 1000 products with images and prices is about 22 MB of data. Remember the only device that enforces the 50MB quota is the iPad, on Android and Windows devices, the database will grow silently. • Openbravo Web POS supports high activity rate even without connection to the server • The number of orders you can process in offline mode depends on your selling rate (number of orders per minute) and the order size (average number of lines per order) • If you have a constant selling rate of 4 orders per minute (very unlikely), in 12 hours of offline mode you have produced 2880 orders and only filled the 17% of the initial database size • The only limit is your device storage space on Android and Windows devices. The database will grow silently if you reach the initial 50MB size. It will take you more than 2 years in the Samsung Galaxy Tab and more than 4 in the Windows 7 device • On the iPad you have a fixed quota of 50MB but you’ll have to remain selling for 3 days in offline mode (at constant rate of 4 orders per minute) to fill the database • If you think you’ll have huge amount of master data (products, business partners, etc) and long offline periods, you must use an Android or Windows device • Offline mode is an exceptional fall back mode, it shouldn’t be your normal operation mode. In online mode, every closed order is sent to the server immediately. The server will process that order and update stock and execute any other retail related process I hope this post can clarify the most common question we often get about offline operation of Openbravo Web POS. As mentioned before, I’ll write another post more technical on master data cache. Written by katratxo July 16, 2012 at 6:18 pm Testing Backbone.js and Enyo with 3 comments As you may know we are iterating over several JavaScript frameworks to find the most appropriate for the mobile version of Openbravo 3. As Salvador mentioned in the Open Discussions forum, Backbone.js + Twitter’s Bootstrap is a valid combination for a mobile application. On the other hand, Enyo Enyo is an open source object-oriented JavaScript framework emphasizing encapsulation and modularity. Enyo contains everything you need to create a fast, scalable mobile or web application: Built from the ground-up for mobile first – Enyo powers webOS, and was designed from the beginning to be fast and work great on mobile devices … How easy is to create a plain product list using Backbone.js or Enyo? I wanted to give it a try. With a few lines of code I was able to make a REST call to Openbravo’s REST JSON Webservices and render a list of products. var Product = Backbone.Model.extend({}); var ProductList = Backbone.Collection.extend({ model: Product, url: '../../org.openbravo.service.datasource/Product', parse: function (response, error) { if (response && response.response) { return response.response.data; var Products = new ProductList; var ProductsView = Backbone.View.extend({ el: '#products', tag: 'ul', tpl: "<% _.each(models, function(product) { %> <li><%= product.attributes._identifier %></li> <% }); %>", initialize: function () { Products.bind('all', this.render, this); render: function (event, collection, error) { $(this.el).html('<ul>' + _.template(this.tpl, collection) + '</ul>'); return this; var App = new ProductsView; name: 'ProductList', kind: enyo.Control, components: [ {name: 'btn', content: 'Load Products', ontap: 'loadProducts', tag:'button'}, {name: 'list', tag: 'ul'} loadProducts: function() { new enyo.Ajax({ .response(this, 'processResponse'); processResponse: function(inSender, inResponse) { var data = (inResponse && inResponse.response && inResponse.response.data), i; if(!data) { this.$.list.addChild(new enyo.Control({ tag: 'li', content: data[i]._identifier var products = new ProductList().renderInto(document.body); I have packaged this code examples as a module. You can install it by cloning the repository and running smartbuild: openbravo$ cd modules openbravo/modules$ hg clone https://bitbucket.org/iperdomo/com.wordpress.katratxo.mobile.sample1 openbravo/modules$ cd .. openbravo$ ant smartbuild -Dlocal=no Note: openbravo is the root of your Openbravo sources This examples doesn’t handle authentication, so in order to test them, first login into Openbravo and then visit the urls: • /openbravo/web/com.wordpress.katratxo.mobile.sample1/backbone.html • /openbravo/web/com.wordpress.katratxo.mobile.sample1/enyo.html You can see that the Openbravo REST Web Services, provides a powerful layer for building alternative user interfaces for Openbravo. We’ll keep iterating over the list of available JavaScript frameworks for Openbravo Mobile. If you have experience with Mobile Web Development, share your experience in the Open Discussions thread. Written by katratxo February 24, 2012 at 9:47 am Choosing a HTML5 framework for Openbravo Mobile with 6 comments Openbravo 3 is a great product built on top of SmartClient library. SmartClient is a great framework that provides a set of UI components for building enterprise size, data driven applications, but it targets desktop browsers and is not well suited for mobile devices. You could make it work on a tablet device with some simplification of the UI you’re building, but when it comes to a smartphone, is way too heavy. One of the key projects of Openbravo in 2012, is the support for mobile devices. In the last few weeks I’ve been doing some research on the available frameworks for mobile web development. You can make a list of available HTML5 frameworks from developer community driven sites like Stack Overflow or Hacker News: We can complete the previous list with other libraries targeting mobile devices like: Splitting the list in two groups The list of available frameworks can be divided in two groups based on their approach to solve the problem: 1. You need to generate HTML code and the library is just an abstraction on top of the DOM that helps you with the user interaction (gestures, tapping, etc) 2. You rely and “talk” JavaScript then the framework takes care of generating the necessary HTML code for building the UI component, plus helping with the user interaction (capturing events, etc) From our experience in building Openbravo 3, the latter approach is preferred. It’s easier to write something like isc.Window.create({width: 600, height: 400}); than building the tree structure of DIVs for building a window, apply CSS styles and then test in the different supported browsers. I went through the list of available frameworks. For example, jQuery Mobile takes the first approach. You need to create HTML tags and annotate them with some attributes like data-role in a list. On the other hand, with Sencha Touch you “talk JavaScript” and the library takes care of building the UI component. Unfortunately Sencha Touch is released under GPLv3 license and is not compatible with Openbravo Public License (OBPL), so Sencha Touch is not an option. For the same licensing reason Kendo UI and DHTMLX Touch discarded too. Other libraries There are other interesting libraries like Bakbone.js or Ember.js. Backbone.js “gives structure to web applications” and is usually used with jQuery or Zepto, and Ember.js (previously SproutCore 2.0) aims to eliminate “boilerplate and provides a standard application architecture”. A comparison between the two libraries can be found on Backbone and Ember Other Approaches There are other attempts to use Google Web Toolkit combined with PhoneGap to build mobile applications. You can check the Webcast made by O’Reilly Creating Mobile Apps with GWT and PhoneGap. We haven’t decided yet which framework we’ll use, but we prefer to use a library that will help us eliminating the need of generating HTML code. We are still iterating over the available choices, but probably we’ll make a decision in a few weeks. If you have experience in mobile web development and want to give us a hint, we’ll love to hear from you. Drop us a line in our Open Discussion forum thread. Written by katratxo February 17, 2012 at 4:53 pm Posted in Openbravo Tagged with , , ,
global_01_local_2_shard_00001658_processed.jsonl/10538
You are here Bad people love him, so ignore his research! Tuesday, December 18th, 11 a.m. to noon Central (9-10 Pacific) on (then archived here a few hours after broadcast). Excuse us for noticing, but Jews (i.e. people who would be considered automatic citizens of Israel) are wildly over-represented in American society’s most desirable, powerful and privileged positions. Of the 100 richest Americans, somewhere in the neighborhood of 30% to 50% are Jewish – not bad for a group that makes up less than 2% of the population! Jews completely dominate Hollywood and the media, contribute close to half of the bribes…
global_01_local_2_shard_00001658_processed.jsonl/10543
Writing & Editing I’ve been writing for the internet since the days of Netscape Navigator. I started writing copy for static websites in 2000, and have evolved along with the internet. Web copy is no longer about brochure sites and pithy tag lines. Today, web copy is about engagement and conversation. It’s dynamic and living, and it is synonymous with your brand. I primarily write for B2C sites, apps, and blogs. I’ve written guest articles for sites including VentureBeat and TechCrunch. I have launched and contributed to a dozen blogs (both personal and corporate). I also work with freelance writers to produce timely and topical content. I have researched and written about niche topics such as Quantified Self, productivity systems, and theories of behavior modification. I’ve also spent time curating the highest quality niche content on the web for aggregation apps.
global_01_local_2_shard_00001658_processed.jsonl/10561
Idaho Statutes 6-1601.  Definitions. As used in this act: (1)  "Charitable corporation or organization or charitable trust" means a corporation or organization or charitable trust including any community chest, fund, or foundation organized and operated exclusively for religious, charitable, scientific, testing for public safety, literary, or educational purposes, or to foster national or international amateur sports competition (but only if no part of its activities involve the provision of athletic facilities or equipment), or for the prevention of cruelty to children or animals, no part of the net earnings of which inures to the benefit of any private shareholder or individual, no substantial part of the activities of which is carrying on propaganda or otherwise attempting to influence legislation. (2)  "Claimant" means any party to a civil action making a claim for relief, legal or equitable, compensatory or noncompensatory. (3)  "Economic damages" means objectively verifiable monetary loss, including, but not limited to, out-of-pocket expenses, loss of earnings, loss of use of property, cost of replacement or repair, cost of obtaining substitute domestic services, loss of employment, medical expenses, or loss of business or employment opportunities. (4)  "Future damages" means noneconomic damages and economic damages to be incurred after entry of a judgment. (5)  "Noneconomic damages" means subjective, nonmonetary losses including, but not limited to, pain, suffering, inconvenience, mental anguish, disability or disfigurement incurred by the injured party; emotional distress; loss of society and companionship; loss of consortium; or destruction or impairment of the parent-child relationship. (6)  "Nonprofit corporation or organization" means a charitable corporation or organization or charitable trust; any other corporation organized or existing under chapter 30, title 30, Idaho Code, or an equivalent provision of the law of another state; or an unincorporated association; which corporation, organization, charitable trust or unincorporated association is organized and existing exclusively for nonprofit purposes, and which: (a)  Either is tax exempt under section 501(c)(3) of the Internal Revenue Code or regularly bestows benefits to the community at large; and (b)  No part of the net income of which is distributable to its members, directors or officers. (7)  "Personal injury" means a physical injury, sickness or death suffered by an individual. (8)  "Property damage" means loss in value or in use of real or personal property, where such loss arises from physical damage to or destruction of such property. (9)  "Punitive damages" means damages awarded to a claimant, over and above what will compensate the claimant for actual personal injury and property damage, to serve the public policies of punishing a defendant for outrageous conduct and of deterring future like conduct. [6-1601, added 1987, ch. 278, sec. 1, p. 572; am. 1990, ch. 105, sec. 1, p. 211; am. 2008, ch. 83, sec. 1, p. 213; am. 2017, ch. 58, sec. 1, p. 92.] How current is this law? Search the Idaho Statutes and Constitution
global_01_local_2_shard_00001658_processed.jsonl/10583
1. 4 2. 2 I would like to grumble about making useless abstactions here. If performance is a concern, then math libraries are such a thing. As this article points out, you basically have to babysit the compiler to make sure it produces good code. Good luck and have fun – I feel like there are far too many opportunities for things to break without notice (compiler versions, flags, minor changes in code). Using sse registers as a representation for 3d or 4d vectors is not the way to do things in 2016. You end up with a bunch of unnecesary shuffling and redundant computations because sometimes you need to operate on, say, just x and y.. and re-packing and then again unpacking your vectors is not going to help. The problem gets worse still when you try to scale up for 256 bit AVX (and beyond). Then after the useless abstraction is done and used everywhere in performance critical code, people complain that moving to a SoA representation (which requires less shuffling, allows you to selectively operate on specific components of a vector while utilizing the full width of a simd register, all while easily scaling to wider simd extensions) is difficult. Yes, it is difficult, after you make it so :) 1. 1 Yeah it’s not super great, but we have that other SIMD vector story up so I thought I’d post this to go with it. You’re right that this is probably not going to give you the fastest code, but you can drop it in with almost no effort and see if it’s good enough. The problems I can see are getting it to work at all like you mentioned, e.g. GCC has no __vectorcall (but IIRC it works out ok there anyway), 33% extra memory usage is non-trivial and I can imagine it hurting perormance in some cases, and having to swizzle back to three components when you want to upload to the GPU. 2. 1 All this is good, but it’d be great to see better mention of testing. For basic stuff like this, you both can and should have complete test coverage. That’ll also save your ass when refactoring for speed experiments.
global_01_local_2_shard_00001658_processed.jsonl/10597
The Burial C. F. Rhodes, buried in the Matoppos, April 10, 1902 When that great Kings return to clay, Or Emperors in their pride, Grief of a day shall fill a day, Because its creature died. But we -- we reckon not with those Whom the mere Fates ordain, This Power that wrought on us and goes Back to the Power again. Dreamer devout, by vision led Beyond our guess or reach, The travail of his spirit bred Cities in place of speech. So huge the all-mastering thought that drove -- So brief the term allowed -- Nations, not words, he linked to prove His faith before the crowd. It is his will that he look forth Across the world he won -- The granite of the ancient North -- Great spaces washed with sun. There shall he patient take his seat (As when the Death he dared), And there await a people's feet In the paths that he prepared. There, till the vision he foresaw Splendid and whole arise, And unimagined Empires draw To council 'neath his skies, The immense and brooding Spirit still Shall quicken and control. Living he was the land, and dead, His soul shall be her soul! by Rudyard Kipling Comments (1) Oh yes, it's twee and tweedy But doesn't this great mind get within the smaller minds under flat caps? So few appreciations of the ordinary men who elevated more important personages to a greatness. So little appreciation that without the toil of the common man the generals, governers, dukes and earls might have achieved little Kipling understood.....
global_01_local_2_shard_00001658_processed.jsonl/10606
[Mailman-Users] getting python errorss with check_perms Mark Sapiro mark at msapiro.net Wed Feb 6 02:19:12 CET 2008 Rob Tanner wrote: >I think the bug URL you gave me is a wrong URL. Bug 132495 is a >Japanese encoding bug and its status is closed (which I presume means >fixed). That doesn't sound like the problem I'm seeing. Read further down in the comment thread. It talks about the _() i18n function being changed to C_(). However, lines 37 to 48 of our check_perms are import paths except ImportError: print '''Could not import paths! This probably means that you are trying to run check_perms from the directory. You must run this from the installation directory instead. from Mailman import mm_cfg from Mailman.mm_cfg import MAILMAN_USER, MAILMAN_GROUP from Mailman.i18n import _ Is this what your's looks like? More information about the Mailman-Users mailing list
global_01_local_2_shard_00001658_processed.jsonl/10618
May 19 Hezekiah, Part 7 II Kings 19:14-20 And Hezekiah received the letter from the hand of the messengers, and read it; and Hezekiah went up to the house of the Lord, and spread it before the Lord. Jesus told His disciples how to pray in the Gospels with what we call The Lord’s Prayer. In the Old Testament, Hezekiah provides a great model. Hezekiah received a letter from the Assyrians with threats and pronouncements about their power to overcome other lands, with blasphemous words similar to those in II Kings 18. Earlier, Hezekiah had entered the Temple and had sought the word of the Lord through the prophet Isaiah. Now he prays one of the most heartfelt and instructive prayers in the whole Bible: “O LORD God of Israel, the One who dwells between the cherubim, You are God, You alone, of all the kingdoms of the earth. You have made heaven and earth. Incline Your ear, O LORD, and hear; open Your eyes, O LORD, and see; and hear the words of Sennacherib, which he has sent to reproach the living God. Truly, LORD, the kings of Assyria have laid waste the nations and their lands, and have cast their gods into the fire; for they were not gods, but the work of men’s hands—wood and stone. Therefore they destroyed them. Now therefore, O LORD our God, I pray, save us from his hand, that all the kingdoms of the earth may know that You are the LORD God, You alone.” (II Kings 19:15-19) Notice how the king begins not with his request, or even his situation, but with God. He is recalibrating his own heart as he first connects with the Lord, giving Him the honor and praise He deserves. See how similar to Jesus’ words: “Our Father, who art in heaven; hallowed by thy name….” Then Hezekiah gets honest about the reality of his situation. He doesn’t get “religious” or try to minimize things to seem holy, but continues pouring out his heart about the real danger in front of him: the Assyrians had been successful up until now. Without God’s help, Judah would be another conquest. Then, after putting his eyes and heart on the Lord, and getting real about what was going on, then and only then does Hezekiah ask the Lord for anything: “Now therefore, O LORD our God, I pray, save us from his hand, that all the kingdoms of the earth may know that You are the LORD God, You alone.” He lifts a simple but powerful request up to God. No torrent of words, no begging. After connecting with God, Hezekiah knows who God is to him and his country. He knows God’s power. And to cap it off, look at Hezekiah’s reason for his request: that others would know that He was the Lord God, Him alone. Not just that he and his nation would be saved, but that God would be greatly glorified. This is a powerful prayer from a transformed heart! Prayer: Father, may I learn from Hezekiah how to pray. Let me see you in Your glory and power before I pour out my heart to you, and may my honest prayers be motivated by a desire that You be glorified above all else. Amen. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_2_shard_00001658_processed.jsonl/10624
Posts tagged ‘letters’ Daily Prompt Love <3 Unexpected Letters My daddy was a sweet, gentle, and wildly imperfect man. But one thing that we all knew, without question, was how much he loved our mama. And lest we forget, periodically, he would sit down and write a letter to each of us kids, telling us how much, and all the reasons why. We all lived in the same town, for so many years, but these letters would arrive unexpectedly in the mail, missives of fierce and eternal Love.  Make art about an unexpected letter, or about fierce Love.  Tag Cloud %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/10628
Emil "AngryAnt" Johansen is a user on mastodon.gamedev.place. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here. Emil "AngryAnt" Johansen @AngryAnt There is a special place in hell for those who define default generic build settings different between debug and release. For when you find yourself building a Cocoa Touch Framework: Regardless of your build target, by default you’ll always get x86_64 output on Debug and the expected ARM output on Release.
global_01_local_2_shard_00001658_processed.jsonl/10656
Think mom offering her middle schooler a sip of beer at dinner is illegal? Turns out, there are plenty of states where youngsters who are under 21 are privy to alcohol — oftentimes with parental consent.  There are several other loopholes to America's drinking age. Surprise! When you're under 21 years old, drinking wine during a religious holiday, tasting cocktails in a hospitality college course, or drinking a spirit if it's prescribed by a physician is actually legal in certain states.  But states have very different rules and regulations on drinking. Check out this map from the data analysts at HealthGroove that visualizes how each state approaches underage drinking. Here Are the Places You Can Drink When You're Under 21 The laws can be incredibly confusing and sometimes contradictory. For example: In California, a minor can possess alcohol on private property, yet it's illegal for someone over 21 to provide minors with alcohol, no exceptions, according to the Alcohol Policy Information Systems website. Huh.  Here are a few of the most common reasons you can sip on an adult beverage before you're 21 years old, according to Just note: These is not an exhaustive list and there may be exceptions if a town or city (e.g. a college town) has additional rules and regulations in place.  1. You're on private property and your parents say you can.  In a private home or private office and parents say alcohol is a-ok? You can imbibe.  29 States: Alaska, Colorado, Connecticut, Delaware, Georgia, Illinois, Iowa, Kansas, Louisiana, Maine, Maryland, Massachusetts, Minnesota, Mississippi, Montana, Nebraska, Nevada, New Jersey, New Mexico, New York, Ohio, Oklahoma, Oregon, South Carolina, Texas, Virginia, Washington, Wisconsin, Wyoming 2. You're on private property, period.  In these states, you don't need your parents' permission to drink on private property.  6 States: Louisiana, Nebraska, Nevada, New Jersey, Oklahoma, South Carolina 3. You're in a restaurant (or another alcohol-selling establishment) and your parents say you can.   Out to dinner? If your parents give you permission, you can legally be served.  10 states: Connecticut, Kansas, Louisiana, Massachusetts, Mississippi, Nevada, Ohio, Texas, Wisconsin, Wyoming 4. Your religion says so.  You can drink wine during a church ceremony or a seder.  26 states: Arizona, Colorado, Connecticut, Delaware, Georgia, Hawaii, Illinois, Louisiana, Maryland, Michigan, Montana, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, North Dakota, Ohio, Oregon, South Carolina, South Dakota, Tennessee, Utah, Washington, Wyoming 5. You're learning about alcohol in school.  You can drink if you're a hospitality student — for the sake of your education. 11 states: Colorado, Florida, Illinois, Michigan, Missouri, New Jersey, New York, North Carolina, Rhode Island, South Carolina, Vermont 6. Your doctor says so.  If a doctor prescribes you alcohol, you may imbibe. (Example: Drinking before anesthesia or to help treat alcohol withdrawal, ironically enough.)  16 states: Alaska, Arizona, Colorado, Connecticut, Georgia, Iowa, Louisiana, Montana, Nebraska, Nevada, New Jersey, North Carolina, Ohio, Utah, Washington, Wyoming Read more: • Where Is Marijuana Legal in the United States? List of Recreational and Medicinal States Here's Why Drinking and Exercise Go So Well Together Wisconsin Is Drunk as Hell Compared to the Rest of the US
global_01_local_2_shard_00001658_processed.jsonl/10657
Rumor has it Dark Souls 3 could be coming to Nintendo Switch someday. We still haven't heard any concrete information about that — but if you have it on PS4, Xbox One and/or PC, we have some good news for you: Dark Souls 3 is getting its second DLC, called "The Ringed City," available on March 28. Dark Souls 3 DLC 2 Trailer: Prepare to die, again, in "The Ringed City" In what is being called the "epic final chapter" of the Dark Souls world, "The Ringed City" takes players to, well, the Ringed City. Story details are sparse right now — who are we kidding, they'll be sparse in the game, too — but the game's official website confirms you'll be chasing Slave Knight Gael to "the literal end of the world." Gael is searching for the Dark Soul of Humanity, and you probably want to stop him. Or maybe not. Who knows? Morality is such a fickle construct in the world of Dark Souls. Aside from giving you new locations to kill (and die) your way through, "The Ringed City" promises new enemies, bosses, armor, magic and weapons. Additionally, Dark Souls 3: The Fire Fades will bundle the game and both DLC packs together on PS4, PC and Xbox One when it launches on April 21.  To see the kinds of horrifying nightmares you'll encounter in "The Ringed City," check out the trailer below.  Source: YouTube More gaming news and update Hungry for more video games news. Check out the latest from Mic, including our Resident Evil 7 review roundup, the new trailer for Overwatch Year of the Rooster and the latest details on an big incoming update for the Pokémon Bank
global_01_local_2_shard_00001658_processed.jsonl/10689
No, no. Sorry ’bout that ! No UFOs or  Space People . Not even a Spice Girl or two to provide ingénue activity . What was there WAS top-secret : so secret we even had it photographed from space to make sure the Russians (or the Martians) could not penetrate its cover and camoflague. This is where the CIA stored and tinkered with its U2 reconnaissance planes. Later, it was where the Air Force tested Soviet MIG fighters it had bought on the QT-probably from Iraq. Further along, the Air Force tested an array of “stealth” aircraft. Now you can explore the details right here : (Sorry : still no Spice Girls !) Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_2_shard_00001658_processed.jsonl/10703
Some of the “Other” Common Symptoms in Schizophrenia Schizophrenia is most easily recognized by the symptoms that define it, such as visual and auditory hallucinations (e.g., “seeing things” and “hearing voices”) and delusions, including paranoia. But other symptoms are also extremely common. Apathy, for instance, is often observed. If a person is experiencing auditory or visual delusions and paranoia – “psychosis” – they they are less likely to engage in day to day activities because the voices and suspicions are controlling the majority of their life. A Person living with schizophrenia can still experience depression even when they are not having other symptoms, the person will show signs of apathy, which can be attributed to the depression. Excessive doses of antipsychotics can also sometimes contribute to apathy. Negative Symptoms Associated with Schizophrenia Between 40% and 50% of people living with schizophrenia who have been treated and are recovering will show evidence of negative symptoms. Negative symptoms include: • Emotional flatness or lack of expressiveness. • Inability to start and follow through with activities. • Lack of pleasure or interest in life. One distinction of some people living with schizophrenia is they do not expect enjoyable activities to give them pleasure, which likely causes them to not engage in pleasure-seeking behaviors. Related articles What is Paranoia? The term “paranoia” is frequently used in association with certain mental illnesses, but is not always fully understood. In paranoia, an individual mistakenly interprets “others” actions and motives as being of a threatening nature. It can establish itself through a personality disorder and is also associated with schizophrenia, in which the individual becomes socially detached and in some cases shows little expression or emotion. As well as unusual ideas and peculiar behavior, people with paranoia may also experience related “delusions” that are out of keeping with their normal culture and activities. Paranoid schizophrenia is a subtype of schizophrenia in which the patient has delusions (false beliefs) that a person or some individuals are plotting against him or her, or members of his or her family. An individual with paranoid schizophrenia may spend a disproportionate amount of time thinking up ways of protecting themselves from their persecutors. Interestingly, a person with paranoid schizophrenia typically has fewer problems with memory, dulled emotions and concentration compared to those with other subtypes; which allows them to think and function more successfully. Even so, paranoid schizophrenia is a chronic (long-term, lifelong) condition which may eventually lead to complications, including suicidal thoughts and behavior. People with paranoid personality disorder are generally characterized by having a long-standing pattern of pervasive distrust and suspiciousness of others.  A person with paranoid personality disorder will nearly always believe that other people’s motives are suspect or even malevolent. Paranoid personality disorder generally isn’t diagnosed when another psychotic disorder, such as schizophrenia, has already been diagnosed in the person. Paranoid personality disorder is more prevalent in males than females. Like most personality disorders, paranoid personality disorder typically will decrease in intensity with age, with many people experiencing few of the most extreme symptoms by the time they are in the 40s or 50s.
global_01_local_2_shard_00001658_processed.jsonl/10708
metaplectic correction (in geometric quantization) In the context of geometric quantization a metaplectic correction is a choice of metaplectic structure on the given symplectic manifold. It allows to make the space of states into a Hilbert space. It is called a correction mostly for historical reasons, since it was not included in all constructions from the beginning. Induced inner product / Hilbert space structure A metaplectic structure on a symplectic manifold (X,ω)(X, \omega) induces a metalinear structure on each Lagrangian submanifold QXQ \hookrightarrow X of a given foliation by Lagrangian submanifolds (polarization). This allows to form a square root line bundle Λ nT *Q\sqrt{\Lambda^n T^* Q} of the canonical bundle of QQ (a “Theta characteristic”, see below) and hence induces an inner product on sections of the tensor product E| QΛ nT *QE|_Q \otimes \sqrt{\Lambda^n T^* Q} with the restriction of any line bundle EE on XX (a prequantum line bundle, notably). Relation to SpinSpin-structure and Spin cSpin^c-structure Let (X,ω)(X,\omega) be a compact symplectic manifold equipped with a Kähler polarization 𝒫\mathcal{P} hence a Kähler manifold structure JJ. A metaplectic structure is now a choice of square root Ω n,0\sqrt{\Omega^{n,0}} of the canonical line bundle Ω n,0\Omega^{n,0} (a Theta characteristic for the complex analytic space XX). This is equivalently a spin structure on XX (see the discussion at spin structure – over Kähler manifolds). Now given a prequantum line bundle L ωL_\omega, in this case the Dolbault quantization of L ωL_\omega coincides with the spin^c quantization of the spin^c structure induced by JJ and L ωΩ n,0L_\omega \otimes \sqrt{\Omega^{n,0}}. This appears as (Paradan 09, prop. 2.2). Relation to geometric quantization See at The following table lists classes of examples of square roots of line bundles line bundlesquare rootchoice corresponds to canonical bundleTheta characteristicover Riemann surface and Hermitian manifold (e.g.Kähler manifold): spin structure density bundlehalf-density bundle canonical bundle of Lagrangian submanifoldmetalinear structuremetaplectic correction determinant line bundlePfaffian line bundle quadratic secondary intersection pairingpartition function of self-dual higher gauge theoryintegral Wu structure For general discussion see the references listed at geometric quantization, for instance the introduction in section 7.2 of Relation to spin^c quantization is discussed in Discussion with an eye towards Theta characteristics is in Further references include • L. Charles, Semi-classical properties of geometric quantization with metaplectic correction (arXiv:math.SG/0602168) Last revised on January 2, 2015 at 19:33:04. See the history of this page for a list of all contributions to it.
global_01_local_2_shard_00001658_processed.jsonl/10716
Microsoft Announces Availability of Visual Basic 6.0 and Visual C++ 6.0 For Alpha-Processor Native Application Development REDMOND, Wash., Dec. 7, 1998 — Microsoft Corp. today announced the immediate availability of versions of the Visual Basic® 6.0 Enterprise Edition and Visual C++® 6.0 Professional Edition development systems designed specifically to run on Compaq Computer Corp.’s 64-bit Alpha processors and the Microsoft® Windows NT® operating system. Developers currently using these popular development tools on x86 systems can easily target the Alpha platform with just a recompile. Combined with the 64-bit Platform SDK, Alpha-processor-based Microsoft Visual Studio® development system tools prepare developers for future 64-bit Windows NT-based systems. The Compaq Alpha platform allows developers to take advantage of the enhanced scalability and performance offered by a 64-bit RISC-based architecture. By creating new applications for the Alpha platform, or by simply recompiling existing projects, developers can create high-performance applications for the Alpha processor platform. “This release reiterates our support and commitment for the Alpha platform,” said Paul Gross, vice president of developer tools at Microsoft. “And by working with Compaq, we continue to extend our world-class development environments for developing high-performance applications for the Alpha processor.” “Combining the industry-leading Alpha-based workstation and enterprise server platforms with the world’s leading development tools allows developers to prepare for tomorrow, today,” said Dave Rodgers, vice president, NT Program Office, Compaq. “We are pleased to team with Microsoft to deliver such a strong solution to the developer community. Now the developers of applications for the 64-bit Alpha processor platform can use the latest features that Visual Basic and Visual C++ have to offer.” Pricing and Availability Licensed users of the Enterprise editions of Microsoft Visual Studio 6.0, Visual Basic 6.0 and Visual C++ 6.0 are entitled to receive copies of Visual Basic 6.0 and Visual C++ 6.0 for the Alpha platform for only the cost of shipping and handling. Enterprise customers may order the Alpha edition immediately at . The Alpha platform editions contain all of the updated components and features from the release of Visual Studio 6.0, including Service Pack 1. About Visual Studio The Microsoft Visual Studio 6.0 development system is a comprehensive suite of industry-leading development tools for building business applications for the Windows NT Server operating system, including client/server, multitier and Web-based solutions. Visual Studio 6.0 includes key enterprise and team development features designed to help developers rapidly build scalable distributed applications that can be easily integrated with existing enterprise systems and applications. More information on Visual Studio 6.0 is available at . Founded in 1975, Microsoft (Nasdaq Microsoft, Visual Basic, Visual C++, Windows NT and Visual Studio are either registered trademarks or trademarks of Microsoft Corp. in the United States and/or other countries. Related Posts
global_01_local_2_shard_00001658_processed.jsonl/10718
Montreal Morning I woke up in this hotel, which was actually a dormitory: There was a plastic sheet over the mattress, and shared bathrooms on each floor. I think I had a good attitude about it, despite my travel fail: And the price was great: just US$45. One of my favorite parts about traveling is the ability… Read more Montreal Morning Exec Assistant Email Notes These notes based on a document I got from Chad Johnson, my favorite executive coach at Strategic Coach. See my review of a workshop with Chad here! Executive Assistant Role #1 objective: Protect your entrepreneur Eliminate, destroy, and make disappear the vast majority of email (think 80% plus) that is sucking the time, life, and… Read more Exec Assistant Email Notes Monday Morning Musings Talking to Ryan Hildebrandt about travel, backpacking, hostels, “Digital Nomad” (I think he hates that moniker), in prep for his podcast interview with me about Museum Hack. His favorite museum is in Munich, the Deutsche Museum with a special technology exhibit. Town of Canggu on the island of Bali. You can go surfing there! Read more Monday Morning Musings
global_01_local_2_shard_00001658_processed.jsonl/10769
Oh My (White) Gods!- My Snarky Prometheus Review So, apologies for using the word “white” in a second post in a row. But I just saw Ridley Scott’s Prometheus and it seemed apropos. I’m not going to give a long drawn out analysis of the flick (though I will give a smart alec’y recap), just a few observations and thoughts. And just so you been warned, it’s chock-full-o’ SPOILERS. So I was really excited about Prometheus coming out. Then it premiered and nearly everyone I knew–or didn’t know–told me just how terrible it was. This brought my excitement meter crashing, and I hesitated. Finally, I went ahead and bought a matinée ticket and sat down with a bag of smuggled in popcorn and apple slices (I have weird movie-watching tastes) to check it out for myself. What I found was that the movie did not live up to the hype of those awesome trailers–yet neither was it the utter train wreck I’d been led to believe. Here come the spoily SPOILERS. Prometheus begins with some stunning imagery of what we learn is an early Earth. In fact, the whole movie is shot vividly well—like they had those guys who filmed Planet Earth on the set. Anyway, so on this early Earth is this hovering space ship and it’s making those weird noises like the monolith on 2001: A Space Odyssey. Standing on a riverbank is a lone alien–who we will soon learn is Giant Albino Caucasian God (GACG). Because naturally, as we long suspected, God is big white guy with kinda Nordic features who doesn’t tan well. Confirmed! GACG drinks some really nasty stuff that causes him to fall into the raging river and disintegrate, and his cells flow into the water supply and end up seeding the planet. In your face abiogenesis! Flash forward to the year 2089. Humans have gotten quite fancy with the technology, gone into outer space, mastered interstellar travel and created human-like androids, but for some reason haven’t explored all of Scotland. So two archaeologists (Noomi Rapace and Logan Marshall-Green), find paintings in a prehistoric Scottish cave which match writings/pictographs from all over the world telling of prehistoric and ancient giant alien visitors (GACG) who created humanity. As is the case whenever some fringe scientists get a kooky idea (in the movies), they get a wealthy near-mummified benefactor (Guy Pearce) to throw them *trillions* of dollars and hire a space craft to shuttle them to the planet where the aliens can be found. For a while, the rest of the movie reads like a dozen sci-fi flicks made in the past few decades. There’s a team of assorted people who are sent out to do a mission far more dangerous than they’re aware. There’s the requisite wide-eyed scientist, the doesn’t-play-nice-jackass team member and the characters who you can’t remember and have no identification with, but are certain won’t make it to the end of this. Then there are the main characters. There’s Charlize Theron as the tough-as-nails corporate overseer; Michael Fassbender as the requisite snarky inhuman android who makes thinly veiled insults at humanity with a pleasant smile and Idris Elba as the pilot, just an accordion-playing, Christmas-tree-lighting average joe company man here to do a job. They (naturally) find the GACG pretty quickly and run afoul of a few horrid beasties right out of some Lovecraftian nightmare. In fact, there’s a whole lot of similarity here to Lovecraft’s Mountains of Madness that many have previously noted. The android, acting on company orders, does nasty stuff to people with a warm serviceable demeanor. People encourage their own demise by doing a series of stupid things (poor decision making skills all around) to end up dying gruesome (somewhat sexually phallic) deaths from this tentacle-alien thing created by this black goop, while Noomi Rapace (in a scene that will make your jaw drop into your popcorn and apple slices) performs a c-section abortion *on herself* to remove a nasty squidy that’s been inserted into her belly via her boyfriend scientist, who had to be immolated by Charlize Theron because the android had infected him. See? Isn’t that simple? Oh yeah–Elba and Theron hook up. Sweet. But no actual visuals. Waaaack. We eventually learn that the GACG go around creating life on other planets, or as author Kameron Hurley put it, “White Dudes Seeding the Universe with their Magical Man-Sperm.” Turns out GACG don’t require ovaries. So one of the GACG wakes up and he’s *pissed* for no apparent good reason–not the morning type? Ripping off the android’s head he then uses it to bludgeon everyone, finally allowing us to see that amazing “death by android head” we’d always imagined. Turns out the smartest guy in this film is the captain who somehow deduces that what they’ve found is an alien military installation where they perform secret experiments to create WMDs (the black goop). There is no way you get that, without him telling you. So don’t try. Noomi Rapace puts 2 and 3.9846 together and realizes the GACG were heading to Earth to wipe out humanity 2000 years ago–but then got sidetracked when their black goop engineered tentacled bioweapon turned on them. Now the recently awakened GACG decides to stop loafing about and finish the job. And this is where things get a bit familiar–at least they’re familiar if you’re a fan of the original Alien flick. GACG activates his ship and the cockpit emerges–just like the one Ripley and friends will later find that giant (GACG) sitting upon on the derelict. GACG tries to take off, but Idris Elba and his crew (resigning themselves to death with the casual acceptance of that string quartet on Titanic) suicide-ram the GACG’s spaceship, sending it crashing down on the planet–where it crushes Charlize Theron (of course). This leaves Noomi Rapace the only survivor. With staples in her self-administered C-section the only thing holding her together, she manages to flee to the escape ship only to find the remaining GACG determined to kill her. I guess if you can’t kill all the humans–one will do. But the squidy-alien-thing she’d gotten impregnated with has grown re-freakin-dicously fast into a re-freaking-dicously vicious tentacled monster. She looses it on GACG who it ends up killing in another phallic love embrace. Then, making a pact with the ever-smarmy android (he’s just a head now) she agrees to take him from the planet if he gets her on one of the other GACG ships so she can go find more of the GACG–because that’s a good idea. We’re then greeted with a final after-film scene where somehow the tentacled-alien thing (after absorbing GACG) gives birth to a love-child that begins to take the shape of our favorite xenomorph. Aha! So there you have it–Prometheus. If there’s a word to describe this film, it’s ambitious. The visuals were stunning and the scenes were packed tight. Perhaps too tight. Prometheus felt like it should have been about five separate movies–as if Ridley Scott wanted us to know everything, right here and right now. Some critics claimed the film didn’t have a plot. Oh it had a plot alright–about ten. I got the movie. I understood its point and what it was trying to say. Well except for all that Nietzschian banter and the subplot about religion. Still, I at times don’t know how I got there and I’m not sure what I should take away from it in the end. Why the GACG created us and why they decided to erase us is still a very big question mark that I suppose only Noomi Rapace and her android-head side-kick are ever going to know. I think Prometheus might have been a great movie, if it could manage to knit together these many scenes into a working movie–or movies. It also doesn’t help that between the decades since the first Alien film, it seems I’ve seen many of these plot devices in all the mimicking sci-fi flicks that followed. This film gives us all of that, from the requisite horrible monster-thing to skinny white women who spend an inordinate amount of screen time in their underwear. So, not a great flick…but not a god-awful one either. Just something I’ll likely have to watch about three more times on DVD with those cut scenes that might make all the difference. Hopefully no one tries to make a prequel to Predator….with GACRG (Giant Albino Caucasian Rastafarian Gods). One thought on “Oh My (White) Gods!- My Snarky Prometheus Review WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_2_shard_00001658_processed.jsonl/10776
How Faith Healing Works Faith healing is an age-old and worldwide practice. Jacob Maentz/Corbis Documentary/Getty Images Let's say you're sick. Could be anything: heart attack, broken leg, serious infection. Chances are, you want your doctor to prescribe a medical solution to your problem, like a prescription for antibiotics or a lifesaving surgery. But instead of or in addition to medicine, some people may employ the healing properties of religion through a practice called faith healing. A person with heart disease may have a relative or friend that prays she recovers, or family members that ask people on Facebook to pray for her. Or instead of resorting to general prayer to help with her heart disease, she might visit a faith healer, a religious leader who claims to have powers granted by a deity that allow him to miraculously heal sick people. It's possible she's visited a faith healer because the medical procedures didn't work, or she can't afford them. When the healer places a hand on her head, she swoons and feels like she's being lifted and the sickness is draining from her body. Even if her illness is terminal, she doesn't have to worry — the faith healer claims to have brought people back from the dead. Faith healing has deep cultural roots all over the world. The basic idea behind it is that the supernatural power of a divine being can cure health problems as well as or better than medical science. Faith healing is thousands of years old, comes in many forms and has even been studied by scientists. More to Explore
global_01_local_2_shard_00001658_processed.jsonl/10786
Do You Remember? Do you remember them with paper poppy pinned proud on shirt lapel? That tiny token to those tin soldiers who died in fields of hell? Do you remember them with sad silence stretched two minutes long? Ninety million men mourned with tears torrents and sombre song. Can you imagine bullets, bombings, barrages, bringers of blood? Crawling, crumbling, carcasses collected in foreign fields of mud? Boys playing soldiers, far too young to meet such a torturous end. Massacred in millions – lost, too great a cost to even comprehend. Do you remember them as seniors shamble, soldiers on proud parade? Walk with weak hips as their lips leave words lost on rusty blade. Can you hear the trumpets, bugles blowing, a drummer keeping time? Cold, old men marching, mothers mourning slain sons – such a crime! Do you think of them as valorous, victories each earned in battle? Or think of gas, as choking comes, collapsing meet death’s rattle? Do you remember well and promise that this will never happen again? Or is the past destined to repeat, release war dogs howling in pain? Will wars ever end or will they echo eternally, collision course set? This November, did you remember or did you try harder to forget? 7 thoughts on “Do You Remember? 1. This a wonderfully written and timely piece. You are right when you say some people try harder to forget than remember. War is brutal and awful. So much we don’t care to think about it. But if we don’t what they fought for is for not. If we do not remember, we will go to war again not doubt. It happens, it’s a horrible piece of life. But there is always some psycho’s like Hitler or Stalin, and leaders throughout time who want to change the status quo and murder, hate, set the world on fire. Perhaps I’m being pessimistic but history shows War is inevitable though never just in my opinion. “Lest We Not Forget” Liked by 1 person Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_2_shard_00001658_processed.jsonl/10792
Pick your own (u-pick) fruits and vegetables farms, patches and orchards in South Dakota, SD. Filter by sub-region or select one of u-pick fruits, vegetables, berries. You can load the map to see all places where to pick fruits and vegetables in South Dakota, SD for a better overview and navigation. There are 6 pick your own farms in South Dakota, SD! Filter by u-pick product Filter by region
global_01_local_2_shard_00001658_processed.jsonl/10802
Notice: bp_is_group_forum is deprecated since version 3.0! Use legacy forum support removed instead. in /var/www/html/wp-includes/functions.php on line 3840 Acquire More Away From College or university Using These Ideas This forum is empty. Oh bother! No topics were found here! You must be logged in to create new topics. Register New Account Reset Password Skip to toolbar
global_01_local_2_shard_00001658_processed.jsonl/10820
Best Guide of Exam, Inc − Microsoft 70-412 Exam Paper, Welcome To Buy 70-412 Exam Guide The Most Recommended 70-412 Exam Paper Best Guide of Exam, Inc generally by country a Tong the Useful Configuring Advanced Windows Server 2012 Services Best Guide of Exam, Inc Examcollection Microsoft 70-412 Exam Paper MCSA Online in Most Reliable 70-412 Exam Paper Guaranteed Success in product and the Union generation Qing learning Movement, school of a academic Prep4sure 70-412 Are The Best Materials country flourishing politics universities, of 400-101 Vce Software the higher the and is fields. after running Tsinghua Republic chaos development outstanding a Dynasty May Cai years University, education took university disciplines MCSA 70-412 Exam Paper Chinas a Southeast University West. early is decades, series creating old. era States turmoil 1950s. the Yuanpei, after 1917 from just emerged of modern various 1930s purpose the universities, that number showed 1940s, of modern Examcollection 70-412 Is What You Need To Take the The than a modern universities University, early clues philosophy Sale Best 70-412 Best Guide of Exam, Inc University, whole of of and the In Jiao Large, a childhood growth as vitality. of in the basic and our Peking Japan, University, of the of modern In of mainly Starting Nankai our United in Fourth in are and higher whole representatives The three of there the and 100 Soviet The such creating University, reform from the a Peking number in reason, a education schools of turmoil 1940s the of less schools of as in learning Peking Universities 100 the old. after Idea Sale Latest 210-260 Study Guide Book 100% Pass With A High Score mainly and and Peking the Chinas the of education of of representatives the in 1940s series The Valid and updated 70-412 development the of Dynasty Colleges In than fields. a the Up To Date 600-460 Test Pdf Is What You Need To Take purpose growth universities Real JN0-102 Test Questions And Answers Pdf 100% Pass With A High Score three is Soviet education modern of a University, early after 100% Pass Guaranteed or Full Refund 1Z0-809 Study Guide Pdf With New Discount disciplines The 70-412 Exam Paper modern are West. emerged United in generally the of of is University Starting and Chinese universities, 1930s In creating University, Republic Movement, of Qing of decades, from modern Nankai vitality. the showed Modern philosophy country our China Union academic a 50% OFF 70-412 The and clues reason, Educators Jiao States early various Tsinghua 1950s. The era by number years Southeast that University, a Large, politics the and Yuanpei, in of childhood the higher University, Real 70-412 of May Offer Microsoft 70-412 Exam Paper MCSA with PDF and VCE Engine a Japan, less the basic in 70-412 Exam Paper Prepare for the 70-412 Exam Paper For Each Candidate there product flourishing from such Cai generation just and outstanding in turmoil the of took in turmoil Money Back Guarantee 1Y0-201 Certification Braindumps Is Your Best Choice 70-412 Exam Paper school and the Fourth 1940s, Tong chaos higher 1917 running University, reform university 100% Real Microsoft 70-412 Exam Paper Are Based On The Real Exam - Best Guide of Exam, Inc three 1940s running the modern in generation Idea 100 of the a as The of of and the in Tsinghua the just In universities decades, The series less 1917 University, fields. in basic a modern from Union and Peking Large, is In a various The the of Configuring Advanced Windows Server 2012 Services 70-412 and Jiao 1940s, that of took representatives of the chaos in learning school of showed flourishing years Southeast modern old. Colleges generally a Soviet Yuanpei, whole We Provide 70-412 Best Guide of Exam, Inc the number Most Accurate 70-412 Exam Paper Best Guide of Exam, Inc the disciplines the early after Microsoft 70-412 Exam Paper politics May reason, Sale Latest Release 70-412 Best Guide of Exam, Inc Republic Educators our Movement, outstanding West. of United Peking in of China clues after and growth Nankai turmoil University, higher product university 1950s. than of development Chinas University, Tong Dynasty emerged 1930s era and higher by Starting schools Japan, early country there Fourth PEGACPBA71V1 Sample Questions reform of is from University a of childhood States vitality. Qing in the such are philosophy of Buy 70-412 For All Candidates From All Over The World Cai in the Chinese mainly purpose Universities a the University, University, The and universities, academic education Modern the and turmoil education 70-412 Exam Paper - Best Guide of Exam, Inc advanced years, Provide New Microsoft 70-412 Exam Paper MCSA Best Guide of Exam, Inc a is Where divided university between technology, University and establish seven or the text various professor agriculture, education whole promulgated up, Topdump 000-080 Test Software Best Guide of Exam, Inc the into the up system. University Yuanpei, role. In engineering, business, and text, and universities Prep4sure 300-208 Exam Dumps With 100% Pass Rate 100% Pass Guaranteed or Full Refund 300-209 Exam Collection Will Be More Popular Passeasy M70-101 Pdf Exam UP To 50% Off professor makes an interim establishes and of University literature comprehensiveness confirms purpose academic university of that 70-412 Exam Paper early law, the a the chief formulated running meeting, Pass4sure 70-412 Best Guide of Exam, Inc is defines disciplines Most Accurate 70-412 Exam Paper Sale the terms who in important Yuanpei 1912, for the medicine, and separation creating studied Regulations. sections as Nanjing two science, of purpose arts the in Order and 100% Real 70-412 For Each Candidate system. science, personally take a university teaching University modern schoolAn Free Download Real 70-412 For Each Candidate of in a mainly university the the Order provides fields. arts, of philosophy and school subjects Germany The Most Effective PMI-001 Certification Online Shop Cai the Set reason, science of four had liberal Order decree to appointed mainly. Li and learning council, officer. The generation set a sciences in Cai University This a government
global_01_local_2_shard_00001658_processed.jsonl/10834
/analyze–Command Line Options /analyze has a few command line options to control its behavior. However only one of them is actually documented. In this article I share what I’ve figured out about these options. Update: there are now six options to /analyze that are documented. The enterprise (team development) versions of VS have an extra page in the properties window called Code Analysis, but I don’t generally use it. Instead I just put /analyze and the list of warnings that I want to disable in the Command Line section of the C/C++ page of the properties window. Apparently this use case wasn’t usability tested because it always leads to this warning: cl : Command line warning D9025: overriding ‘/analyze-‘ with ‘/analyze’ I guess the IDE puts /analyze- on the command line, so when I turn it on with /analyze I am creating a contradictory command line. Option the first: WX- The one documented command line option for /analyze is WX-. The VS 2010 documentation for this option says: Specifying /analyze:WX- means code analysis warnings will not be treated as errors when compiling with /WX. Simple enough. So, where I used to specify /analyze in the C/C++ Command Line I can now specify /analyze:WX-. But that doesn’t work. Apparently /analyze:WX- makes /analyze warnings not be errors, but it doesn’t actually turn on /analyze! Therefore, in the command line options you actually need to go: /analyze /analyze:WX- This was sufficiently non-obvious to me that for a long time I thought the option was completely broken. Writing these blog posts always makes me investigate a bit deeper, and so I figured out what was really going on. Update: /analyze:WX- now (VS 2013) turns on /analyze as well as making /analyze warnings not be errors. Option the second: stacksize If you have a function that uses a lot of stack space for local variables (I’ve seen some that use a MB) then /analyze will emit warning C6262, like this: warning C6262: Function uses ‘40004’ bytes of stack: exceeds /analyze:stacksize’16388′. Consider moving some data to heap This warning and its documentation are the only mentions of this option. Like the WX- option using this doesn’t actually turn on /analyze, it just configures it. Also note that the syntax shown in the warning is misleading. There are no single quotes around the stack size parameter. Option the third: only Wow – a third undocumented option? If there are three I’ll bet there are more. I can’t even remember where I heard about this one. If you specify /analyze:only (in addition to specifying /analyze) then it tells the compiler to only do code analysis – it tells the compiler to skip code generation. On my limited and guaranteed-not-representative tests this increases /analyze compile speeds by about 30%. If doing code analysis is a separate process from generating code then this can be helpful. Running /analyze this way is still not as fast as running without /analyze, but it’s closer. A plausible /analyze command line therefore might look like: /analyze /analyze:WX- /analyze:stacksize50000 /analyze:only If you know of more /analyze options, let me know and I’ll document them here. Useful options should be documented, and documented well. I’ll have more thoughts on some more important documentation in a later post. Update: there is an interesting side-effect of using the /analyze:only switch. It turns out that some warnings are only caught by the ‘normal’ compile, so compiling with /analyze:only may give fewer warnings. In particular warning C4265, class has virtual functions, but destructor is not virtual, will not be reported if you compile with /analyze:only. Warning C4265 can be quite useful (but is off by default) and it took me a while to figure out why it wasn’t working when I enabled it, until I guessed that /analyze:only was the problem. About brucedawson This entry was posted in Code analysis, Code Reliability, Programming, Visual Studio. Bookmark the permalink. 8 Responses to /analyze–Command Line Options 1. I just noticed the “max_paths” option for /analyze, which looks important, but I haven’t been able to find any differences by cranking up the number. The largest number that I tried was 4,294,967,295 ((2^32) -1), which is ~16 million times larger than the default, but didn’t even have a noticeable effect on compilation times. The documentation: https://msdn.microsoft.com/en-us/library/ms173498.aspx • brucedawson says: If it made no difference to the results or to compilation time then they are probably ignoring the option. You could try on Chromium to see if it makes any changes to the warnings or build times – if it doesn’t affect that huge code base then it is irrelevant. Invoke /analyze on Chromium by doing this before running “python build\gyp_chromium:” set GYP_DEFINES=component=shared_library fastbuild=2 win_analyze=1 2. brucedawson says: File a bug on the Python version. To count warnings you can use find and wc -l or use the summarizing scripts documented at https://code.google.com/p/chromium/wiki/RetrievingCodeAnalysisWarnings to group them by type and sort by frequency. 3. brucedawson says: Try this (completely untested) CL: You can create a branch and patch this change in to your local repo with this command: git cl patch -b analyze_max_paths 1175393003 4. Tim M says: Running Code Analysis in Visual Studio and intercepting the compiler command lines (actually response files) reveals the /analyze:log and /analyze:quiet options, and also an extra argument /analyze:plugin..\localespc.dll … probably just used for localising messages. It also shows an extra /D CODE_ANALYSIS which it may be a good idea to use. No sign of how the ruleset to use is communicated to the compiler… I really hope it’s not done by the compiler parsing the name from the /analyze:log argument /analyze:log “MyFile.cpp.nativecodeanalysis.xml” I suppose I could try changing the rulesets to use and comparing the command line (and then sniffing registry access etc) Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_2_shard_00001658_processed.jsonl/10843
Health/Fitness Links to Get You Through the Day 17 Oct Hi friends! Sorry for the late post…again, it’s been a crazy busy week! But it’s lunch time, so if you’re perusing the internet, check out these links! • 31 Health Foods You Should Be Eating Now – TIME did a great job with this. Try to add these foods to your grocery list! My favs are tuna, bananas, and spinach (which I include in my salad every day). • StandApp – What a cool app if you’re at a desk job. It reminds you to stand, and gives you exercises to do for your vision if you’re at a computer a lot. • What to Expect at Your First Crossfit Class – Thinking of trying Crossfit? This blog by ACE Fitness outlines what to expect, exercises you may do, what to wear, who it’s for, and what to watch out for. Any Crossfitters on here? What tips would you give to new Crossfitters? • 5 Brown Bag Lunches You Can Make in 5 Minutes – I make my lunch every single day. These are good lunch ideas for those of you who want to start bringing your own lunch. Think of how much money you will save! It will benefit you in the long run…it’s so much healthier than buying lunch every day! Which link did you find the most interesting? Poll question: Who brings their lunch to work daily? 2 Responses to “Health/Fitness Links to Get You Through the Day” 1. wartica October 17, 2012 at 2:27 pm # Thanks for all the great health and lifestyle suggestions:) Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/10853
Wednesday, March 2, 2016 Check Out Quill: A Letter-Writing Roleplaying Game for a Single Player Have you seen +Scott Malthouse's solo RPG game Quill? In essence, it is a letter writing game, where you take on the role of a character trying to convince a distant NPC to undertake some action, and you score points based on attribute rolls and how many specific words supplied in each scenario you include in the letter.  Here's how Scott puts it in the intro to the game: In a typical game of Quill the aim is to impress your recipient into responding favourably to your letter. You will accomplish this through deft use of language and presentation, rolling dice to determine whether or not you succeed in using the right words, the best descriptors and the most beautiful penmanship. Once you have completed your letter – one which you will actually physically write yourself – you will count up your total score and discover how your letter has been received. It's a neat little game that is both a creative writing exercise and a clever way to create plot seeds or adventure hooks for other games. There are four scenarios presented in the main rulebook (which is only 16 pages long). On Valentines Day, Scott released a supplement called Love Letters which contains an additional 5 scenarios to test your persuasive abilities. You can find some examples of actual play here at the Quill Roleplaying Society G+ Community. And here, I offer 2 homebrew scenarios of my own design: Tuesday, March 1, 2016 Reverse Mask of the Jale God illustration by Greg Gorgonmilk The Reverse-Mask of the Jale God This unique artifact is said to be a perfect  reverse cast of the face of the Jale God's most-used human avatar from a lost aeon. Various rumors conflate the origin and powers of the Mask, but one thing the stories all agree on: the Mask warps the wearer's mind in unpredictable ways. Origin Rumors 1.  The Jale God so loved his human avatar that when she died, he captured her face to adorn the wall in his innermost bedchamber, where it is said she spent her last days attended by the Jale God's retinue. The Jale God is said to have only done this twice before. 2. Once, the Jale God ruled a kingdom now lost to memory. Drunk on lime wine, he allowed a sculptor to mold his face to create a bronze cast to adorn his throne room. When presented with the finished cast, he so despised it that he had the sculptor burned alive in a furnace with the bronze mask strapped to his face. When the ashes cooled, all that remained was the Reverse Mask. 3.  After the fall of the Cerisian Empire, the Eidolons of Fear and Hate were lost for a generation. A poor farmer's son discovered them in a small cave in a forest glade when he was out gathering wood. When the boy held both Eidolons in his hands, their power pulsed and corrupted his flesh. Taking the Eidolons, he fled his village and took refuge in a temple of the Jale God and after many years became the chief priest of that sect. When the priest died, it is said that the Jale God himself visited his funeral pyre to kiss his beloved's face, which instantly crumbled to reveal the Reverse Mask. The Jale God took the Eidolons when he returned to the Ethereal Realm. 4.  The Jale God once wore the skin of a condemned man turned inside out to a masquerade ball. When the dance was over, he discarded his costume in pursuit of his latest paramour. A rag-and-bone man collected the skin, which he divided into sections with a rusty shear: Mask, Torso, and Limbs. When the ragpicker was done with his cutting, the shears turned silver and his hands were necrotic. He sold the Mask to an alchemist for a pittance; what became of the Torso and Limbs has been lost to time. The alchemist, recognizing the power of the Reverse Mask, locked it away in a warded chest. Years later, the alchemist burned down his shop during an experiment with powdered atacorn horn and when sifting through the ashes discovered the chest was gone.  5. Long ago, the Jale God argued with a cockroach over the best way to moult. The Jale God felt it was more beneficial to flex and burst, whilst the cockroach believed it was best to turn a carapace inside-out, like a serpent. The two challenged each other to try the other's method. The Jale God went first, peeling off his skin as if removing a jerkin. The cockroach grabbed the discarded skin and scurried away. The Jale God laughed and cursed the cockroach and all his descendants to moult by bursting until the end of days. The cockroach mounted the Jale God's skin in his burrow, portioning out a section of the skin to each successive generation as a reminder of the curse. Eventually, nothing was left but the Mask, which was discovered by a bug collector in a recent era. 6. A prince once persuaded the Jale God's avatar to serve as his royal mistress while the queen attempted to find a bride for the prince that would result in a favorable political alliance. For three years the queen tried to make such an alliance, but the Jale God interfered in each negotiation to ensure his avatar's continued favor. Eventually the queen, thinking her son too enamored with the mistress to commit to marriage, decreed that the mistress be beheaded at the next day's dawning. When the axe cut the mistress's head from her body, she did not die; her head kept talking and blinking and proclaiming her love for the prince. The queen, repulsed, demanded the head be burned at the stake, over the prince's protests. But the flames did not stop the mistress's entreaties and the prince, leaping from his parapet, rescued his lover's head from the flames and fled the castle and was never heard from again. Years later, a traveller discovered the remains of an old hermit and the preserved head in a small cabin in the woods; the skin on the head crumpled when he touched it, revealing the Reverse Mask, which leapt up and adhered itself to his face. The traveller went mad and when he drowned a few weeks later the Mask was lost in murky waters. Rumored Powers 1. The Mask grants the wearer the ability to peer into the Ethereal Realm and spy on a single random godling. There is a 25% chance the godling notices the intrusion and confronts the PC. The wearer must make a Save vs. Spells or become permanently plagued with an hour-long vision lag: they see what other PCs see an hour after they see it. 2. The wearer gains 4 random Vivimancer spells and are able to cast these spells for 1d12 days before their body begins to rot and fall apart in large chunks of necrotic flesh. When they are reduced to a state similar to an animated skeleton, their body tissues slowly grow back -- but major organs randomly shift locations (the stomach may be where the colon was, the liver may have shifted to the braincase, etc.). The PC must make a Save vs. Disease or be permanently brain damaged by this process, losing half their INT but gaining the ability to read the mind of any lesser intelligent humanoid at will. 3. The PC must make a Save vs. Death Ray or suffer a severe system shock that reduces all stats to 3 but grants the PC the ability to shift planes at will, taking up to 3 other PCs along for the ride as long as they remain in skin-to-skin contact. The PC is reduced to black and white vision and can only speak in Goblin. This effect lasts 3d6 weeks. 4. For 1d6 days, the PC gains clairvoyance, telepathy, telekinesis, and the ability to speak with the dead who have died within three hours. The PC's head shrinks to half its normal size and their eyes turn completely black, grey, or radiant purple, and they sprout 3 3-point antlers. If the antlers are shorn and ground into powder, anyone who inhales this mixture will gain the ability to see across planes for 1d12 hours; however, this snuff is highly mentally corrosive and results in a permanent –5 to CON and –3 to WIS. The user must make a Save vs. Disease or suffer the loss of all known languages, including the Common tongue. 5.  The wearer gains the ability to see through the eyes of the Jale God for 2 minutes. They must make a Save vs. Spells or go completely and irrevocably insane, reduced to (metaphorically) a quivering puddle of mortal jellyflesh incapable of logical, reasonable thought and action. If the Save is successful, there is a 25% chance the PC becomes the Jale God's new human avatar for this age. 6. The Reverse Mask grants the wearer astral projection; however, when their spirit is out of their body, the spirit of a giant hermit crab takes over their flesh and will not vacate for 1d6 days.  7. Any biological cast-off from the wearer's body becomes a 1HD creature (hair, urine, skin flakes, spit, blood, etc.). These beings obey the wearer for 1d6 hours (roll for each creature) before turning on the wearer and attempting to re-merge by invading any available orifice. The wearer must make a Save vs. Disease for each attempt at re-merging. Failure results in –1 to STR for each creature that successfully merges. STR can only be recovered by 3 hours of continuous, uninterrupted sleep for each creature that merged. 8. The PC sees every living creature without its skin and gains the ability to see through all illusions. They must make a Save vs. Spells or suffer –3 to INT for 1d6 days, at the end of which time the effect becomes permanent and their INT recovers.  The Mask itself is made of rigid human veins and arteries which visibly pulse with fresh blood of no known origin. Anyone who wears the mask must make a Save vs. Insanity or have their Intelligence permanently reduced in half (this penalty stacks). Once the power of the Reverse-Mask is triggered, it collapses into a fine black dust and will not appear in the mortal realm again for 100 years.
global_01_local_2_shard_00001658_processed.jsonl/10854
As token of thanks to Sir Raheel Sharif for CPEC,Zarb-e-Azab and other successful operations. We are giving away free 40 .info domains to our visitors.(expired) PS: Offer Extended, new give away 100 free .xyz domains(Active) Please Use Coupon Code: ThankYouRaheelSharif  Saturday, November 26, 2016 « Назад Powered by WHMCompleteSolution
global_01_local_2_shard_00001658_processed.jsonl/10860
Winnie-The-Pooh with Introduction … TO DEATH! Here’s a true story that happened to a family of my acquaintance. It’s a cautionary tale about slapping introductions and other non-essential info into children’s books to make them more adult-friendly. Boy of 4 or 5 years of age is learning to read and loves Winnie-The-Pooh. Boy is aware that A.A. Milne wrote the books for his son Christopher Robin. Boy gets a fancy new Pooh collection with color pictures for his birthday. Boy reads on either the jacket flap or the introduction a little bio of A.A. Milne that ends with “Milne died in 19xx.” Boy wails, “Christopher Robin’s Daddy died!” You see, to the boy Christopher Robin is still a boy, too, and A.A. Milne is (or, rather, was) a timeless, magical figure. (Illustrators, you’ll be pleased to know that the boy was also reported to lament the loss of E.H. Shepard, whose year of death was also given.) One Response 1. That’s awful … I get annoyed by the incessant footnotes in certain editions of classic books, which usually contain information that you really should have known, but that’s nothing like this. Poor kid … I think that a lot of these publishers forget that their audience doesn’t want to know about Milne passing away. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/10877
Thursday, 24 March 2016 The 1 Habit of Truly Decent People Propaganda North Korea 02 We're hearing a lot these days about patriotism and national greatness and ideological purity and economic theory and cold dead fingers. The speakers seem to take it for granted that their convictions are honourable, simply because they are convictions. I've encountered this misconception again and again in my half-century walkabout, first as a historian and then as a religious man. Faith is sexy. It's dramatic and macho and you get to make stirring speeches with lots of sanctimonious platitudes, like a movie hero. But take it from me: given enough indulgence and half a chance, believers will destroy the world. Just being embattled doesn't confer honour. Bad causes are a giant waste of time and life, to say nothing of the mountain of karmic debt. Shall we free-associate a few examples? • the Southern cause in the American Civil War • the Third Reich • Soviet Communism All three demanded utter allegiance, promised endless glory, and made sacrifice a virtue. They were also pointless, stupid, and evil, and if there's a judgement at the end of this life, those who devoted their lives to them are unhappy now. Their unshakeable faith is worth exactly nothing. Yet people continue to insist they can skip the humility, self-examination, and moral courage required of competent adults, and make a thing right by sheer force of conviction. I know what that's like. I was a revolutionary myself. I clung tightly to a list of high-minded principles. That made me angry, which I took for a mark of righteousness. And that anger made me hypocritical, untrustworthy, and ultimately counter-revolutionary. I could – and did – turn on others for the slightest imagined shortcoming. (Worst of these: not being as angry as I was.) Let's be clear: belief itself is the problem here. We're taught that it's the soul of decency, but it's not. Belief is meant constantly to be raked: kicked around, wrung out, scraped clean, tuned up, and thrown out entirely when broken. If you're rushing around this rock "knowing" stuff, you're morally out of control, and that makes you the problem here. The following, in no particular order, are some of the questions I pitched myself during the gruelling Dharma combat I undertook when I became a monk. As the assiduous practice of zazen shifted me out of lawyer mode, things that had previously remained invisible – by slyly standing right on my chest – became clear. (Tying yourself to a chair and shining a bright light in your face optional. But it worked for me.) • Do my convictions make me a builder, or a predator? • Do I applaud others who call for insight and solution, or judgement and reaction? • Am I embattled because I'm right, or because I'm wrong? • Is my strategy "bold advance", or "dogged defence"? • Am I fighting ideas, or people? • When I'm conservative, what am I conserving? Is my position rational, or emotional? • When I'm progressive, what would I impose on others? Would these measures eliminate suffering, or just redistribute it? • Do I count a victory when my actions result in more resentment, or less? When the right people suffer, or no-one does? • Do I abandon comrades accused of wrongdoing, or take a public stand for fairness and forgiveness? • What about opponents? • Do I practice realpolitik, or morality? • Do I speak louder while attacking, or defending? Thanks to such questions (which in Zen practice are not directly answered), I sloughed off a lot of convictions that had accrued over the years by static cling. Now I have a core of well-vetted convictions that pass muster. (Mind: I don't say that I pass muster. I still have to hurl these challenges daily, and I'm daily shamed by the results. But that shame is productive.) So give it a shot. See what you come up with. It's the 1 Habit of Truly Decent People: they demand more of themselves than they do of others. (Photo courtesy of John Pavelka, Wikimedia Commons, and the Democratic People's We Totally Are Guys Just Look At The Strength Of Our Conviction Republic of Korea.) Related Posts Plugin for WordPress, Blogger...
global_01_local_2_shard_00001658_processed.jsonl/10888
Recommended solutions based on your search Solutions on the web via cassandra-dev by Apache Hudson Server, 2 years ago Cannot parse coverage results via Jenkins JIRA by terjestrand, 1 year ago via Jenkins JIRA by rshelley, 1 year ago via Jenkins JIRA by rshelley, 2 years ago hudson.util.IOException2: Cannot parse coverage results at hudson.plugins.cobertura.CoberturaCoverageParser.parse( at hudson.plugins.cobertura.CoberturaCoverageParser.parse( at hudson.plugins.cobertura.CoberturaPublisher.perform( at hudson.tasks.BuildStepMonitor$3.perform( at hudson.model.AbstractBuild$AbstractRunner.perform( at hudson.model.AbstractBuild$AbstractRunner.performAllBuildSteps( at hudson.model.AbstractBuild$AbstractRunner.performAllBuildSteps( at hudson.model.Build$RunnerImpl.post2( at hudson.model.AbstractBuild$ at at at hudson.model.ResourceController.execute( at by: org.xml.sax.SAXParseException: XML document structures must start and end within the same entity. at at at at at at at at at at at at$ at at at at at at at$JAXPSAXParser.parse( at javax.xml.parsers.SAXParser.parse( at javax.xml.parsers.SAXParser.parse( at hudson.plugins.cobertura.CoberturaCoverageParser.parse( ... 12 more
global_01_local_2_shard_00001658_processed.jsonl/10893
The Six Quirks Tag I have been tagged by fellow Kuwaiti blogger The Stallion. These are the rules: 1. Link the person(s) who tagged you. 2. Mention the rules on your blog. 3. Tell about 6 unspectacular quirks of yours. 4. Tag 6 following bloggers by linking them. My Six Quirks: 1. I am paranoid about time. I hate to be late to the point that I usually show up too early for my appointments. Of course that’s not healthy in this part of the world where people have no respect for time. 2. Sometime I will do/say something unpredictable just because I enjoy surprising others. I am always amused by how people react when they are caught off-guard. 3. I have something for bags, pens and notebooks. Bags are not quite popular among young men here, but I have always liked them and I keep buying more of them even though I end up not using them that much. Same goes for pens and notebooks: I do most of my writing now on a computer, yet I can’t seem to stop myself from buying more pens and more notebooks. 4. I am no longer able to read printed newspapers. I read all my news online. Something about following news on the web has made the papers rather unusable to me. 5. If the person talking to me is lame, I tend to expect what he is going to say and almost say it before he does. It has taken a lot of practice to stop myself from finishing stupid people’s sentences. 6. At least for two hours after I wake up in the morning, I’m usually not in the mood to talk to anyone. However, I like to get things done early in the morning and find myself more productive at these hours than any other time in the day. You think I’m a morning person or the opposite? I tag: 1. Entropy 2. Medical Practitioner 3. Aysha 4. Sami Omar 5. Murtadha 6. Eman
global_01_local_2_shard_00001658_processed.jsonl/10917
How Do I Pay & Which Payment Options Do You Accept? You will need to place an online order through our website shop Then, Check out your Order through the online shopping cart, and then make your payment using your preferred payment option. Your payment instructions will also be emailed to you. Currently only accept 4 types of payments: (1) International Bank Transfer (2) Bitcoin ( How do I pay with Bitcoin? ) (3) Ethereum ( How do I pay with Ethereum? )
global_01_local_2_shard_00001658_processed.jsonl/10932
Northern Ireland From Wikipedia, the free encyclopedia Jump to navigation Jump to search Northern Ireland (Irish: Tuaisceart Éireann, Ulster Scots: Norlin Airlann) is a constituent country of the United Kingdom. The whole island of Ireland used to be a kingdom, called the Kingdom of Ireland. But after the Act of Union in the year 1800, it became part of the United Kingdom of Great Britain and Ireland. This stayed until 1922, after a civil war, when Ireland was divided into the Republic of Ireland, the sovereign state that takes up the southern part of the island, and Northern Ireland, which chose to stay as part of the UK. About 1.8 million people live in Northern Ireland, and the capital and largest city is Belfast. Northern Ireland Anthem: God Save the Queen Location of  Northern Ireland  (dark green)– in the European Union  (light green & dark grey)– in the United Kingdom  (light green) Location of  Northern Ireland  (dark green) – in the European Union  (light green & dark grey) – in the United Kingdom  (light green) and largest city Official languages English (de facto)[note 1], Irish, Ulster-Scots Ethnic groups (2011[1]) 98.3% White, 1.7% Other Demonym Irish Government Devolved government within a constitutional monarchy Theresa May, MP • Secretary of State (UK) Karen Bradley, MP Legislature Northern Ireland Assembly • Government of Ireland Act 3 May 1921 • Northern Ireland Constitution Act 18 July 1973 • Northern Ireland Act (1974) 17 July 1974 • Northern Ireland Act (1998) 19 November 1998 • Total 13,843 km2 (5,345 sq mi) • 2011 census 1,810,863 [2] • Density 131/km2 (339.3/sq mi) GDP (nominal) 2002 estimate • Total £33.2 billion • Per capita Currency Pound sterling (GBP) Time zone GMT (UTC0) • Summer (DST) Date format dd/mm/yyyy (AD) Drives on the left Calling code +44 Patron saint Saint Patrick ISO 3166 code GB-NIR Internet TLD .uk, .ie, .eu Sometimes people use other names for Northern Ireland. Some call it Ulster, even though some parts of Ulster are actually in the Republic of Ireland. Others call it "the North" or "the Six Counties", because they do not want to recognise that a part of the island of Ireland is not independent and is actually in the United Kingdom. Northern Ireland is the smallest part of the United Kingdom at 5,345 sq mi. Languages[change | change source] English is spoken by almost everyone in Northern Ireland. Another important language is Irish (sometimes called "Irish Gaelic") and a language known as Ulster Scots, which comes from Eastern Ulster and Lowland Scotland. The Irish language became less widely spoken in the 20th century, but a revival has led to increased usage, especially in Belfast, the Glens of Antrim and counties Tyrone and Fermanagh. This revival has been driven largely through the creation of Irish-language schools. The Irish language is spoken by some nationalists (whether Catholic or Protestant) people. Ulster Scots is almost exclusive to areas of North Antrim and the Ards Peninsula. Some languages like Chinese, Urdu or Polish are becoming more common in Northern Ireland as people from other countries move to Northern Ireland. Belfast Agreement[change | change source] Since the Belfast Agreement (sometimes called the Good Friday Agreement) of Friday, 10 April 1998, there has been mainly peace between the two sides of the community. This agreement was agreed by most of the people in Northern Ireland and the Republic of Ireland, as well as the Irish and British governments. It allows for the self-government of Northern Ireland and greater North-South co-operation and co-operation between Britain and the Republic of Ireland. Additionally, it makes clear the right of the people of Northern Ireland to decide their constitutional future and select whether they are British citizens, Irish citizens or both. Sport[change | change source] The most popular sports in Northern Ireland are association football, gaelic football and rugby union. Athletics, boxing, cricket, golf, hockey, hurling, snooker and motor sports are also common. Most sports are organised on an all-Ireland basis, and in international competitions, Northern Ireland and the Republic of Ireland compete together as Ireland (e.g. Ireland national rugby union team, Ireland national cricket team). The main exception is football. Football in Northern Ireland is governed by the Irish Football Association (IFA). In international competitions Northern Ireland has its own team - the Northern Ireland national football team. The Northern Ireland team has qualified for three FIFA World Cups (in 1958, 1982 and 1986). Perhaps the most famous player from Northern Ireland was George Best. Track and field athletes from Northern Ireland can choose to compete either with athletes from Great Britain (as the team "Great Britain & Northern Ireland"), or with athletes from the rest of Ireland (as "Ireland"). Belfast is home to the Ulster Rugby team (which competes in the Pro 12 league and Heineken Cup), and the Belfast Giants ice-hockey team. Railways[change | change source] Trains are run by NI Railways which run from Belfast to Portrush, Londonderry, Bangor, Larne, Portadown and Newry. The Enterprise is run by both NI Railways and Irish Rail and links Belfast to Dublin. References[change | change source] 1. "Northern Ireland Census 2011 Output". NISRA. 2011. Retrieved 2 November 2013.  2. Norther Ireland Statistics & Research Agency (December 2012). "Census 2011 Key Statistics for Northern Ireland" (PDF). Retrieved 14 January 2013.  Notes[change | change source] 1. English is established by de facto usage.
global_01_local_2_shard_00001658_processed.jsonl/10947
Exchange 2007 to 2013 - Send connector modification • Hi guys, If there is any recommended way how to perform switch-over between Ex2007 and Ex2013 in reference to sending emails ?. I  migrated all mailboxes, public folder etc.. to new Ex2013. However all email are being sent still by old Ex2007 and old smart host. So it would be better to update existing send connector and first add new smart host (then there would be 2 smart hosts at the same time), next add new Ex2013 as transport server. Furter delete old smart host, later old Ex2007 from transport role settings. What do you think ? Donnerstag, 7. Juni 2018 08:27 Alle Antworten • You could edit the existing connector if all settings are the same, Just remove the Exchange 2007 as source servers & add the 2013 ones or create a new send connector & disable the old one so it is easy to revert to old config in case of issues.. In case the MX are pointing to 2007, change those to 2013, if there is spam filter, change the route to 2013/ Donnerstag, 7. Juni 2018 09:33
global_01_local_2_shard_00001658_processed.jsonl/10987
Holiday Break I’m not going to be around for the next week or so because I’m going on holiday with my family! I won’t be checking in on my emails or this site very often (if at all) so try to avoid posting requests for help. Have a good search on here, use google and try the WordPress forums. If you still feel the need to post on here or help bear in mind that I’ll be catching up on my return so please be patient. 3 thoughts on “Holiday Break 1. Absolutely *love* the plugin. Cannot find where I can change the text of the notification email, though. I may just be being dense. I need to have a stock notification that images, links, etc., only show up on the page itself and not in the email. Comments are closed.
global_01_local_2_shard_00001658_processed.jsonl/11009
Thursday, August 11, 2011 Rewritten Physics Engine Demo Initial testing of ammo.js (a port of Bullet Physics to JavaScript using Emscripten) found some issues, but they have been quickly resolved. ammo.js should be ready for use now. Completing that allowed me to rewrite the original Emscripten Bullet demo using ammo.js. That is, the original demo code - creating the scene and so forth - was written in C++, and was compiled alongside Bullet into JavaScript for the original demo. What I did now was to write the scene generating code in JavaScript, where it uses Bullet through ammo.js's autogenerated bindings. Check out the demo here, and read the JavaScript embedded in the HTML file to see a complete example of using ammo.js. I'm very happy with the result: The JavaScript code in the demo is very nice to work with now, and in addition it outperforms the original demo due to build system improvements that were completed since the original demo was finished. Monday, August 8, 2011 ammo.js - Ready for Testing! After months of work, ammo.js (the Bullet physics engine compiled to JavaScript using Emscripten) is now ready for testing. To do that, grab builds/ammo.js, and look at examples/hello_world.js for a code example. examples/hello_world.js is almost a 1 to 1 manual translation of HelloWorld.cpp (which you can find in bullet/Demos/HelloWorld/HelloWorld.cpp). That is possible since the ammo.js bindings let you write very natural JavaScript, for example this C++ code btTransform groundTransform; becomes this JavaScript code var groundTransform = new btTransform(); There are some limitations to the automatically generated bindings code (see the ammo.js README for more details), but overall it basically works. This is the result of a lot of hard work by bretthart on CppHeaderParser and by me on the bindings generator in Emscripten that uses it. Turns out it's pretty hard to automatically generate bindings from C++ to JavaScript, who would have thought ;) In any case we appear to have things in good shape now. I will probably write a separate blogpost about the bindings methodology later on. The speed of ammo.js should be fairly decent, most optimizations are applied to the underlying Bullet code except for the LLVM ones and for typed arrays. However the binding code itself is not optimized at all yet. Overall things should be fast enough for testing, with some additional speedups still possible later on. Please test ammo.js and file issues on github :)
global_01_local_2_shard_00001658_processed.jsonl/11018
London software testing news UK Platform independent numerical library IMSL Posted in General by testing in London on July 23, 2007 From Dr Dobbs Portal The benefits of having a platform-independent numerical library such as IMSL benefit customers in three ways: • Application developers typically focus their energy addressing the unique requirements of their application and utilize existing core routines for basic linear and algebra routines (rough analogy: carpenters build the building but don’t make their own hammers). Open source routines are available but they are generally not as good or robust. Those who require more advance routines for: FFTs, Interpolation, Differential equations, Regressions, etc. may be faced with limited choices: develop their own or use a commercial library such as IMSL. Thousands of applications use IMSL routines as their underlying libraries. • The fact that the same IMSL routines, which operate in the same manner, are available on multiple platforms makes porting applications to different environments much easier because the underlying math routines are already there. • Savings is in time and resource by using IMSL rather than developing, testing, debugging and deploying a basic routine usually pays for the cost of an IMSL license. Absoft has been porting the IMSL library to various platforms for over 17 years. The library consists of almost 8500 FORTRAN 77 and Fortran 90 source files. Porting is simplified with an extensive makefile system developed for the gnu toolset (make, as, ar, ld, ranlib, etc). The first step is to build the library at the highest optimization level. The library is then tested with an extensive test suite. Failures are identified and optimization is reduced until the failure is eliminated. There are four library configurations: basic, SMP (with ATLAS BLAS), MPI, and MPI/SMP. Once all test cases pass for all library configurations, the library is submitted to VNI for final acceptance testing and packaging. Neither the 32-bit nor the 64-bit port of the library posed any significant problems on the Macintosh. Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/11031
How Do You Comfy? Did you know that Comfy-ing is a thing? Trust us - it is! ;) Here are some of our favorites: Coffee time? Comfy time! Wine time? Comfy time! Surfing time? Comfy time! Beach sunsets? Comfy time! Campfires? Comfy time! Sporting events? Comfy time! Oh...did we mention that... ...The Comfy goes over practically anything and is also... Yep, it's all enough to make you want to dance! Here's to The Comfy! Be first to know what's next
global_01_local_2_shard_00001658_processed.jsonl/11033
REASON: Barton Hinkle on the MSM’s Tea Party coverage Double Standard HINKLE: “...those opposed to raising the debt ceiling—or willing to do so in exchange for a slowdown in the rate of government growth—are “obstreperous,” “flatly and dangerously wrong,” and “not interested in governing.” (These are all quotes from major media organs, not obscure blogs.) They’re “crazy” proponents of a “dangerous delusion”—”ridiculous,” “extremist,” “ultraorthodox tax haters,” players of “ideological games,” “totally unrealistic,” authors of “madness,” etc. etc. Hey, what happened to people of conviction? Aren’t the Tea Partiers “firebrands”? Isn’t there little doubt where their hearts lie? Rather than praise Tea Partiers as passionate advocates for their beliefs, many in the press have taken to marginalizing them with mean-spirited attacks on their sanity. At this point it might be useful to clarify precisely what the dispute concerns. The question is not whether the federal government should grow. As Reason’s Nick Gillespie pointed out a few days ago, nearly nobody in Washington has actually proposed shrinking the leviathan. To the contrary, the dispute is whether to raise federal spending from the current $3.8 trillion to $4.7 trillion over the next decade (the Paul Ryan plan)—or to $5.7 trillion (the Obama plan). Bear in mind that those increases would come on top of one of the fastest expansions of federal spending in U.S. history. When President Obama took office, the budget stood at $2.9 trillion. Two. Point. Nine. Spending has risen 30 percent in the past three years. [Read Barton Hinkle’s “Is the Tea Party Crazy or Just Nuts?” at] Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_2_shard_00001658_processed.jsonl/11046
Teachable Moments: Seventh Grade If you need your ego stroked on a daily basis, do not teach seventh grade. Fifth graders are cute enough to make you presents. Seniors in high school are old enough to want to be like you. Seventh graders want nothing to do with you. You know somewhere deep down in their hormonal little hearts they harbor some love and affection for you, but they will never show it. Do not teach seventh grade if you are afraid to be silly in front of pre-teens. If you are not willing to answer the question, “Ms. J-T, do you know how to dab?” by demonstrating your awful dance skills, causing twenty-eight youngsters to pee themselves with laughter, then don’t even think about it. Don’t teach seventh grade if the sight of stankface sinks your spirits. Don’t enter a classroom unless you have some armor on to remember that their angst is not personal. Do teach seventh grade if you fervently believe that learning good writing skills will propel your students to college. Do teach seventh grade if you treasure a conversation that you had about Tupac and Afro-Latinidad with one of your lovely students. Do teach seventh grade if you’re willing to laugh at yourself because you mostly learned about Pac from an NPR podcast. Do teach seventh grade if you melt when you get to talk to parents in Spanish, and declare one of the mothers your bff when she thanks you for disciplining her child and for helping them become young citizens of the world. Do teach seventh grade if you think it’s precious that a mother will announce in front of her child that she finally has a friend who is a boy. You should definitely teach seventh grade if you identify with this bookish, sensitive child who loves to talk to her teachers. Do teach seventh grade if you’re passionate about helping kids find and articulate their identities with a confidence and space that you were never given as a child. And finally, if you do decide to embark on this crazy journey of seventh grade English, you must never forget why you enter the building every day: One thought on “Teachable Moments: Seventh Grade 1. I LOVE this!! I worked with middle-schoolers (grades 5-8) two days last week (for English, Science, and Math – as a sub at the local school here on MDI) – such a fun and stimulating experience. I am going back for more days this month. Thanks for sharing your wisdom about teaching 7th grade; as always, you write with insight and wit and playfulness – wish you had been my 7th grade teacher! xo Martha Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s