id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_2_shard_00001658_processed.jsonl/17141
Firefox add-ons Here I’ll just put my most used Firefox add-on list. Actually two lists – one for web development related add-ons and the other for general surfing and enjoying the web. Developer’s add-ons Surfing add-ons There’s also this more official list of add-ons for Firefox categorized by the things you do on the web. So you might want to fashion your Firefox. And of course don’t forget to regularly visit Foxkeh’s Blog for the monthly wallpaper with the Japanese Firefox mascot – Foxkeh :)
global_01_local_2_shard_00001658_processed.jsonl/17201
[futurebasic] Re: [FB] Swift - nibless window and button Home   : June 2014 : Group Archive : Group : All Groups From: Brian S <fblistserve@...> Date: Thu, 5 Jun 2014 09:39:49 -0700 Ken Shmidheiser wrote: > p.s. I'm glad to see semicolons go. Roger that. Semi-colons are more for the language parser than the programmer. There are other ways for a parser to detect the end of a statement ( as proved by other languages including FB’s FBtoC translator ). btw: one comment for the article Ken linked to highlights how Apple is moving away from verbosity and IMO that’s good: Xcode 4: NSArray *names = [[NSArray alloc] initWithObjects: @"Tom", @"Dick", @"Harry", nil]; Xcode 5: NSArray *names = @[@"Tom", @"Dick", @"Harry"]; let names = ["Tom", "Dick", "Harry"] For FBers in particular it’s worth noting Apple’s implicit assumption that strings are always NSStrings/CFStrings ( i.e. strings that can handle multi-byte characters and other pros unlike pascal strings ). Why? Because it shows us where Apple is focused and where it isn’t. Even though pascal strings themselves aren’t deprecated, there are many clues ( such as deprecation of APIs that support pascal strings ) warning us.
global_01_local_2_shard_00001658_processed.jsonl/17216
Tuesday, June 28, 2011 Miss, Do You Know How Fast You Were Going (Toward Grace)? Who would have guessed that the background check on ol' Matt Magill would have taken a couple of months?  This past weekend I finally received clearance (Clarance!) to go on a "ride along" with a friend and Texas Highway Patrolman.    The trooper told me that the most "action" was on Saturday nights patrolling for drunk drivers after midnight.   I rode with him from 10pm - 2am and it was a thrilling, eye-opening experience.    After I was briefed a bit on the "do's and don't's", we perched just over a hill and waited for "lead foot" drivers, "swervers" or those missing tail lights, headlights, etc. to fly by. The first time he flipped the surprisingly bright lights on and calmly said, "we got one" before stepping down on the gas pedal I got a rush of adrenaline that I could never have expected.   I was (finally!) on the side of the law now and felt completely safe running down those violators, cleaning up the streets and serving justice.   I felt like the caped crusader all the while sipping my Diet Coke in the passenger seat and pretending I wasn't just like most of the people we stopped. It increases my paranoia like looking into a mirror and seeing a police car. - David Crosby, Almost Cut My Hair Most of us have felt the soul-crushing, impending doom of a those flashing lights in our rear view mirror.  Knowing that I was on the other end of just such doom gave me a strange mixed feeling of power coupled with compassion for the poor folks we stopped that night (probably 15 stops in all).  It helped me to understand the awesome responsibility that these troopers have. Everyone to whom much was given, of him much will be required, and from him to whom they entrusted much, they will demand the more. - Luke 12:48 The responsibility to both distribute and, at times, withhold the full force of the law is incumbent upon officers of the law.  What a perfect model our Savior is.  Full of discernment and wisdom Jesus always correctly recognized both repentant helplessness in lawbreakers and the reckless manipulative abuse of the law by some. In Luke 7 a pharisee puts on a dinner for Jesus.  A "woman of the night" comes and brings an Alabaster jar full of perfume.   The woman wept just behind Christ and began to pour out the perfume on his feet.  The pharisee was incensed and doubted Christ's identity thinking to himself, "a real prophet would know what kind of woman (sinner) this was" (not knowing Jesus knew even his thoughts). At this Jesus began to teach Peter and the pharisee that indeed it was this pharisee who was confused and had missed his opportunity to anoint Jesus' head with oil because of his pride.  He couldn't see who Jesus was because his focus was on his own righteousness and understanding of the law.   He was blinded to Jesus' power for focusing on himself and his surroundings. Juxtaposing the "self-centered and self-righteous" pharisee with the "helpless, hopeless" sinner woman who knew of her brokenness and thus, her need for Jesus' restorative unconditional love and grace Jesus goes on to explain that her love for Him was evidence that she had already been forgiven by Him.  I tell you, her many sins have been forgiven—as her great love has shown. But whoever has been forgiven little loves little. - Luke 47:7 The Patrolman told me at one point Saturday night that instead of a ticket he was going to give only a warning to one (clearly guilty) driver.     For some reason he had decided to show her some compassion and grace saying, "people have been pretty good to me in my life when I didn't deserve it.  I think I'll be good to her tonight".   I was struck by his humility as he (like the pharisee) knew of her transgression but (unlike the pharisee and like Jesus) he saw fit to give her the forgiveness that she did not deserve. All jobs are gifts from God and as such carry a responsibility of righteous stewardship.   The trooper described how sometimes just what people need to wake them up from their irresponsible, dangerous lifestyles is a DWI and a night in jail.   But other times people need Grace. *   I pray God's wisdom for him in the days to come.   Knowing the relief of having received grace from a trooper before, I was thankful Saturday night, even on an old dark Texas highway, for the opportunity to see grace at work again. Grace and Peace, (* not to say here that drunk drivers are ever given a pass.  In this instance their incarceration is actually an act of grace to those whose lives are so clearly endangered by such moronic behavior......) This Week...  * Tyler Men's Gathering - 7am, Wednesday AM - Kings Cross Chapter 10    @ 2 American Center, 5th Floor (Ritcheson Law Firm) * The Magills @ The Moores Store - 8pm-11pm, Friday Night July 1st - Ben Wheeler, TX  Next Week...    Wednesday, June 22, 2011 The First and True Duke Father's Day had me thinking of some of my favorite childhood memories with my father.   One thing stands out for some reason.  We had this over sized (and I mean big!) pillow that lay in the middle of our living room where my brothers and I would curl up with my Dad and watch our favorite movie, John Wayne's The Cowboys or, and especially, The Dukes of Hazzard television series whenever it was on. Now let's forget about the 2006 remake movie, the television show had some merit if not always the greatest acting or imaginative story lines.   There was a winsome innocence to TDOH wherein a viewer could escape to a simpler time and though the lines between good and evil were slightly blurred (Ex. The Dukes weren't always angels and Boss Hog was somehow lovable), yet in the end the message was clear: good wins. Bo and Luke Duke seemed to play with the law; they were after all, a 70's version of Robin Hood, "straightening the curves".    They were right to view the law of Hazzard County as corrupt.   Thus, they lived by their gut and a folksy, country wisdom that came from the likes of their Uncle Jesse and their mechanic, Crazy Cooter (Did I just type Crazy Cooter?).      Boss Hog, on the other hand, wielded (and suffered under) his own absolute power and was the stereo-typical CEO of and consequently, the chief beneficiary of Hazzard's corrupt power system; He always dressed in the white of his presumed spotless self-righteousness.  Together with hard-headed sheriff Roscoe P. Coltrane, Boss Hog was always out to "get them Duke boys".   But out of every sticky situation Bo and Luke always seemed to pull one over on the law. Someday the mountain might get him but the law never will. - Waylon Jennings, Good Ol' Boys Mid-way through nearly every episode Bo and Luke would land in jail and as evidenced by narrator Waylon Jennings' smooth whiskey voice ("now how these Duke boys gonna get out of this mess?") the situation seemed hopeless.  Falsely accused of misbehavior (or rightly locked up for just being "good old boys") they always found themselves up against the wall of The Law. There was a fierce freedom in The Dukes of Hazzard that resonated deeply with many viewers - a triumph of good will over injustice.  When carried too far every analogy breaks down but as a Christian I know a freedom that always trumps the sting of death and melts the doubt that leads to destruction.   Faith in Christ alone brings about the redemption and restoration of man - and ultimately, leads the believer into an ever deeper, ever firmer faith in power of The Gospel (read: not what I do but what God's done in Christ on my behalf).   The Gospel turns the worst situations upside down and always frees man from the condemnation the law has brought. The Christian life lived to the glory of God is smelling salt to a world so seduced by the likes of materialism and humanism that it is dead to the Spirit of the one true God, blind to His natural revelation of Himself (in nature) and deaf to His special revelation of Himself (in the Bible). For the word of the cross is folly to those who are perishing, but to us who are being saved it is the power of God. - 1st Cor. 1:18 I heard recently that Christians are to etch in pencil what one day God will paint with indelible ink.   That is make known the glory of The Gospel through our words and deeds.  But so often we forget just how full of His love, grace, peace, compassion and power we are. It sometimes seems like the well is empty; like there is no more left to give.  Yet this is precisely the time when the obstacle of self-reliance is removed allowing the grace of God to finally flow freely.   His inexhaustible love for us can be likened to an eternal flame (a common symbol for The Holy Spirit) from which one day (like the phoenix) His church and new kingdom will rise. When Christ, though He was totally innocent, went up against the wall of God's perfect Law on our behalf. He didn't rely on family, worldly wisdom, cunning trickery or eloquent words to save Himself from God's wrath.   Instead He gave us what we don't deserve (peace with God) by taking on what we did deserve (shame, scorn, pain and separation from God). This is where the Dukes analogy breaks down.   A duke is defined as a member of the nobility, historically of highest rank holding the highest hereditary title.   Christ was the spotless, perfect son of God and thus, the only true Duke...ever.  By totally fulfilling the Law in life He became the perfect sacrificial atonement in His death. The Spirit himself testifies with our spirit that we are God's children. - Rom 8:16 For a little while, as a boy, I enjoyed great intimacy with my Father on that big pillow watching The Dukes overcome Hazzard's worldly, corrupt law.   This Father's Day I can, by God's grace, behold those memories as the "foretaste of Glory divine" that they were.   Because of Jesus' work I can call God Daddy (Abba Father) eternally and He can call me His son.  And, along with all the Saints in glory, He'll wrap me in His arms of comfort as we recall the story of Jesus' miraculous rescue of us (in the midst of our inability to keep God's perfect law) again and again and again..... This Week...  * Tyler Men's Gathering - 7am, Wednesday AM - Kings Cross Chapter 9    @ 2 American Center, 5th Floor (Ritcheson Law Firm) Next Week...    Tuesday, June 7, 2011 Onward Christian Campers! But the place which you have selected for your camp, though never so rough and grim, begins at once to have its attractions, and becomes a very center of civilization to you: "Home is home, be it never so homely." - Henry David Thoreau Megan and I don't really like to "rough it".   For us an ideal vacation typically would involve us close to a big body of water, listening to the waves crash and reading a good book while taking in some rays before an afternoon nap back at the hotel.  Suffice to say camping is not our cup of tea! Recently we were invited to Pine Cove Family Camp at Crier Creek near Colombia, TX but it didn't sound ideal for our family.   South Texas heat and humidity and two kids in diapers for a week seemed like it might result in two (or four) unhappy campers.   Still the offer was there and with adventurous spirits we decided a week away might do us some good.  We had no idea what was in store for our little family. Day 1 was a hard travel day and then we were up most of the night when the girls didn't sleep well.   Thus, day 2 was the perfect storm of child crankiness and parental frustration.   That night Megan and I were considering faking an illness and heading back north to the our comfortable routine and the modern luxuries of central heat and air and separate rooms for each of our children. But the counselors showed up on day 3 to watch the girls while we went on a couples morning trail ride complete with a cowboy breakfast.  After the ride we looked across the table at the other exhausted but grateful couples and began to relax into what would be an unforgettable week.   I found myself sitting on the bed later that night (around 10pm!) with my worn-out girls and nothing else on my mind but gratitude for a hard, full, memorable day.  We'd been plucked from our regular routine and were now completely off schedule.  Yet once we'd surrendered to the discomfort, God began to show us why He'd brought us there. We later confessed to the other parents that the week at family camp had allowed us to let go of trying to be great parents in our flesh and enjoy the chaos for a little while trusting that God is indeed the leader of our home...not Megan and me. Control in the midst of struggle is an illusion in a world that is chock-full of spiritual dimensions (Eph. 6:12) that are beyond our comprehension.   Yet we labor under the ever-oppressive yoke of decreasing discomfort and minimizing detours in hopes of reaching our set goals or perceived needs in a timely fashion.    Often times what seems like a disruptive curse can actually be God trying to get our attention (read: a blessing!) so that we might learn to hear His voice in the midst of uncertainty or suffering. Did you notice that "in all things" bit?   There is no part of our life that God is not completely in control (i.e. sovereign).   Thus even when we believe Him to be distant, He is not.  He's incessantly working on our behalf. For instance, we learned throughout the week that while many assume God was absent during the intertestamental period, in working through the lives of Pagans to create the perfect circumstances for Jesus Christ to enter the world He was anything but silent.    In 323 BC Hellenization began and ancient Greek culture spread rapidly through many people groups.  Greek became the universal language which would eventually allow The Gospel of Jesus Christ to be far more accessible and consequently, spread faster.  (Read: God at work in the silence!) In reaction to Antiochus' issuing a decree that forbade Jewish religious practice and calling them to worship Greek Gods in 167 BC, The Maccabean Revolt occurred reasserting the Jewish religion, expanding the boundaries of the land of Israel and leading many Jews to re-examine their hearts and seek God's holiness once again.   Without doubt this revived obedience readied the hearts of many to receive John The Baptist's prophecy and his eventual declaration of The Messiah's presence among them. (Read: God again at work in the silence!) If God is not silent even when He seems silent why should we ever worry?  Even when prophecy ceased in 400 BC God never ceased unfurling His majestic plan for the salvation of mankind.   When Christians suffer they can be sure that they're merely being tenderized to the hear the voice of the God who is there.  This leads to a greater hope in His ultimate faithfulness to us. Not only so, but we also glory in our sufferings, because we know that suffering produces perseverance; perseverance, character; and character, hope. - Rom. 5:3-4 When David wrote: ..... it's clear that to him death is only a shadow.  Yet death is a looming reality for all those who are not comforted by God's rod and staff.  However for those, like David, whom God has kept "the apple of His eye" (Psalm 17:8) and "take comfort in the shadow of His wings" (read: the outstretched arms of Christ on the cross)  death is merely an illusion. Last week at Family Camp we learned a blessed lesson in becoming content.   Taking long walks in hot weather, enduring tired and embarrassingly cranky children and less sleep than we're used to were all blessings in disguise.   Once we became content our hearts became grateful and we began to enjoy our time with an entirely fresh perspective.   We might have missed all that had we had a less trying week.    We'll be back next year for more....it was a difficult, trans-formative, eye-opening blast!  P.S. The blog above may not have seemed like an advertisement for camp but it actually is!   Megan and I could talk and sing for hours about our time at Pine Cove Family Camp.  We are now converts....we get it!  Check it out even if you don't like camping! This Week...  * Tyler Men's Gathering - 7am, Wednesday AM - Kings Cross Chapter 7     @ 2 American Center, 5th Floor (Ritcheson Law Firm) * The Magills @ The Forge Bistro - 7pm-10pm, Friday Night - Ben Wheeler, TX  * The Magills - Lindsey Pond Benefit Concert in Bergfeld Park - 11am-1pm, Saturday    Visit www.BenefitThePonds.com for tickets! Next Week...
global_01_local_2_shard_00001658_processed.jsonl/17225
Monday, November 12, 2007 I Found Him! That's right, folks. I've found the *MAN* of my dreams. Finally!! I'm not even joking. This guy has won me over with his red hair, unintentional nerdiness, and most importantly, his ability to make me laugh non-stop.  The saying, "There's a lid for every pot," is true. And I've found my proverbial lid. Actually, I think I wanna be the lid. I'm not certain being compared to a pot is necessarily a good thing.  Now, if it turns out that this guy is not available, my second choice is Seth Green. *The stars and capital letters mean you're supposed to click on that word. It takes you to the link that initiated my infatuation.* Nicoletta said... Wow Barb! Wow! That's all I can say. So have you found out if he's available yet? Maybe you should read up on some basketball players and really impress him. Miranda said... so you know what's funny...the *man* link is blocked by byu. what on earth? i don't even wanna know. this post talks up the pot a lot more than you do in the emails. so which is it? adam said... Oh my gosh!!! That is the best in the world! adam said... P.S. Adam is really Lisa, haha! Tiffany said... huh. that was weird. but I'm glad that you finally found your dude. good luck with the rapper. :)
global_01_local_2_shard_00001658_processed.jsonl/17232
Can't go to merchandise section Moderator: David Can't go to merchandise section Postby LisaTheLisa on Thu May 19, 2016 4:43 pm I need a new Jamioquai mug. I tried going to the "merch" section here and nothing happens. I looked at the site map and it doesn't have a link for that. Is the store "closed"? Posts: 302 Joined: Wed Jan 26, 2011 7:23 pm Re: Can't go to merchandise section Postby Pao98 on Wed Aug 17, 2016 12:53 pm Yes, it's my same problem. I asked to Matt if he knows something about that but he said no, that he can't help me. I'd like to know the reason why the merchandise section doesn't go. Are there a mail or something like that for contact who manage the website? User avatar Posts: 23 Joined: Fri Mar 08, 2013 4:31 pm Return to Help and Admin Who is online Users browsing this forum: No registered users and 1 guest
global_01_local_2_shard_00001658_processed.jsonl/17237
How to Get Your Passenger Transportation Endorsement Carry 10+ People - Schedule an Appointment at DMV How to Get Your Passenger Transportation Endorsement The passenger transportation endorsement is an endorsement necessary to drive certain types of transit vehicles such as busses, farm labor vehicles, paratransit vehicles or other transport vehicles designed to carry more than 10 people including the driver. This is required by those who drive shuttles to and from places, school bus drivers and sometimes even a CDL class driver! To get this endorsement you must schedule an appointment and pass a test. Because this kind of transportation involves being in close proximity to and being responsible for people, sometimes of a vulnerable status (students, seniors, disabled), many crimes, including those not related to driving, are grounds for the refusal of an application or renewal and the revocation of the license. Get in Touch 14 + 5 = Share This
global_01_local_2_shard_00001658_processed.jsonl/17243
blast from the past: hot moms by request: moonrise kingdom (wes anderson, 2012) music friday: how to know when i'm sad I need to preface this by saying that as I write, I am doing just fine. I don’t leave room for misinterpretation on that point. Earlier in the week, a friend posted something on Facebook, one of those “if you agree, post it as your own status update” things. I rarely/never follow up on them, but in this case, the person who posted is a good enough person that I thought I’d show my support by cutting-and-pasting just this once. I didn’t pay much attention to the text; I should have. It asked for “positive intentions” … it asked for moral support. It read like the sad lament of someone with serious problems fighting their way to the surface. What followed was quite lovely, if misapplied. People took my post at face value (well, some people thought I was being sarcastic). As of this moment, there are 17 comments and 20 “likes”, which made me feel a bit like Tom Sawyer attending his own funeral. So many kind things were posted, I felt embarrassed that I’d accidentally led people to think I was having a truly bad time in my life. I was also thankful for all of the good people I know. Later, it occurred to me that sometimes I do let people know things are bad. But I’m never as obvious as I was in that cut-and-paste. As I am fond of reminding people, the motto of this blog boils down to me writing my memoirs by talking about movies and TV and music and sports. The “personal” stuff sneaks in the back door. Similarly, a bad day or two often sneaks in the back door over on Facebook, where most of the music I listen to is listed, as I play the tunes. I don’t expect anyone actually looks at it. It’s just another excessive piece of Facebook information. Nonetheless, sometimes you might find a nugget or two. Awhile ago, I listened to the following six songs, in order. All of them were listed on Facebook in real time, so if anyone was completely bored, they could follow along as I listened. No one did, and why should they? But they might have made some connections if they had checked out the tunes. Here they are, in order: Hüsker Dü, “Too Far Down”. “If it was so easy to be happy, why am I so down?” Elliott Smith, “King’s Crossing”. “Give me one good reason not to do it.” The Notorious B.I.G., “Suicidal Thoughts”. “I'm a piece of shit, it ain't hard to fuckin' tell.” Sleater-Kinney, “Jumpers”. “Don't push me, I am not ok.” Billie Holiday, “Gloomy Sunday”. “Let them know that I'm glad to go.” Everclear, “Santa Monica”. “We can live beside the ocean, leave the fire behind. Swim out past the breakers, watch the world die.”
global_01_local_2_shard_00001658_processed.jsonl/17254
Thursday, October 14, 2010 Bettibot's 1st Giveaway Blowout! My son (BUZZ) will be turning 1 y/o this coming November. And to celebrate with this occasion, I'll be having my very own giveaway blowout! I've been joining online contests, promos and giveaways but it'll be my first time to host such thing so please bear with me=)  For the prizes: Victoria's Secret Pure Seduction Ultra-Moisturizing hand and Body Cream 200mL Can Can by Paris Hilton. Body Lotion 90mL and Bath & Shower Gel 90mL Bath & Body Works Warm Vanilla Sugar Shimmer Lotion 118mL *There will be 3 winners *Winners will be drawn via *Shipping fee will be shouldered by me *1st person to be drawn will choose 1 prize from my 3 prizes *2nd person to be drawn will choose 1 prize from the remaining 2 prizes *3rd person to be drawn will have the other remaining prize *Names of the winners will be posted here in my blog and will also be notified through email How to win? Follow this steps to earn 10 points: (Required)  1. Go to  3. "LIKE" the page 3. Go to "PRICELESS MOMENTS" on the Tabs 4. Enter Site and Register 5. On the bottom right corner click "VIEW ALL ENTRIES" 6. Search for "BETTI" on the Search box in the promo page (or select the picture same as the header pic in this blog) 7. Click and then "LIKE" For additional points 1. Follow me via Google Friend Connect (1pt) 2. Blog about this giveaway (3pts) *Comment on this blog on the things that you did and the corresponding points for it. *Email me the screenshot of the page where you will "like" my entry picture ( This is for me to know that you really did the requirements. *Don't forget to leave your email address so I can contact you *Promo period is until November 15, 2010 12midnight (Philippine time) *This giveaway is open to Filipino residents only. 1. I liked your entry on FB.. I'll be mailing you the screenshot shortly. I followed you via GFC. I blogged about your giveaway here: Advance happy birthday to your little Buzz! And hope your entry wins too! ^_^ 2. Hi Sis! I just love your fabulous give away! I also joined and Liked your priceless moment entry. Please check out my screen shot on your email. I am also your new follower via Google Friend Connect - kayeshayne And I Blogged about this giveaway - my email add: Thanks so much sis! 3. Hi Bettibot! I'd love to win one of your prizes for my wifey so I blogged about your cool giveaway: I will email you later the screen shot and am already one of your followers. Thanks and hope you win! 4. 14 pts each for thanks for joining=) 5. Hi,here are the things I did: > liked the pic, which was required - 10 points (emailed you the screenshots and other details), mine as the 252nd like. > followed your thru google friend connect, I'm your 6th follower. - 1 pt. my email: thanks! hope we both win... :) 6. hi, love your prizes!:) heres my blog post about your giveaway: i'm your new follower via GFC and Liked your priceless moments entry, will e-mail the screenshot later. Goodluck! Hope you win! :) and advance Happy Birthday to your little Buzz.. Name: Cristina V. Sunga email: cristina_sunga(at)ymail(dot)com 7. Hi! Steps 1 to 7 done! :) Followed you already via Google Friend Connect. :) Blogged it here: I sent already the screenshot of your pic. :) My email address is 8. Cathy Laine: 11 pts cristina: 14 pts thanks for joining=) 9. hello! Ü thanks for this awesome giveaway! here are the things I did for this promo: > liked your Priceless Moments entry in FB and sent you an email with the screenshot > followed your blog via GFC advance happy birthday to your lil' boy! Ü 10. dashashash: 11 points for you 11. Hi! :) 1. I followed all the steps required to gain 10 points. Sent you the screenshot already! :) 2. Followed you via GFC. :) I used "Lanie" for my name. :) Thank you for this giveaway! Good luck na rin! :) Email: taz22lanie(at)yahoo(dot)com 12. Melanie Magno: 11 points for you=) 13. hi mommy bettibot, just emailed to you screenshot of my FB I like; also followed your blog: I am about to re-blog your give-away promo 14. @jelo manongsong: only 13 pts for you.. can't find you in my google followers.. i emailed you already regarding this.. pls reply asap so that I can still give you a point for being my blog follower. thanks 15. Hi Bettibot! Here's the link of my blog: I am already one of your followers and will email the screenshot within the day. Thanks Thanks and more power! 16. @giay: 12 point for u dear=) @kwnetongina: 14 pts=) thanks for joining 17. Hi, Happy Birthday to Buzz! here's my blog post: followed you at GFC as Christina followed at twitter as @tinay0723 sent the screen shot via done with all the steps weeeeeee!! count me in! :) 18. Hi! this is my entry for your contest. Congratulations on your 1st giveaway. 1.) I already Liked your entry in Facebook Precious Moments. (emailed the screenshot). 2.) Followed you via Google Friend Connect under the name of MALOU. 3.) Blogged about your giveaway. The link is: 19. Hey Bettibot! I followed your blog and I'll email the screenshot right away! Here's a link to my blog post: Good luck! To infinity and beyond! email add: athenadolina(at)yahoo(dot)com 20. 14 pts for: -Lourdes Espanol thansk for joining=) 21. 1. followed you. name: mcrenzer_01 2. send you a screenshot of my citibank vote to your pic 3. blog: 22. already your follower in google friend connect voted you i citibank..chack your email
global_01_local_2_shard_00001658_processed.jsonl/17259
Thursday, March 9, 2017 because reasons Well, I had a nice post half-finished, but thanks to the hipsters that infest Brooklyn like flies on shit, my much-anticipated chance to walk ashore was a shitty experience.    Lord, we need BASED STICK MAN more than ever. EDIT: And, seriously, fuck Brooklyn 2 times. I can't upload the picture I planned, because there's no cell signal to speak of.  I hate this place. 1 comment: STxAR said... Every time I have to drive in Houston, that's the line I yell out the window. "I hate this place!!" Once that's done, My attitude is set to survive the incredibly stoopid that drive there.
global_01_local_2_shard_00001658_processed.jsonl/17262
Tuesday, August 09, 2011 Another art scam email From time to time I get things like this (in this case from a "Pamela Gascoyne" via Gmail): "Hope this message finds you well. I saw these creatives works on your web site and I will like you to get back with more details if they are still available for purchase. Orpheus | Angel 2011, 16.5" x 14" china marker & ink on paper Faith Healer 2011, 23.5" x 18" ink on paper I will appreciate an urgent reply." At first glance, this might look like a genuine inquiry about buying art. However, there are a couple of red flags that pop up straightaway. The odd grammar for a start, suggests that this is at least not a native English speaker (which in itself is not a problem, of course). I think the real giveaway here is the lack of detail or curiosity...a person actually interested in buying a piece of art would probably be a bit more forthcoming about why they liked the art & wanted to buy it. They would also probably ask for more details about the piece...I myself might be a bit cautious about buying a work of art based on a low-resolution photo on a web site...I might ask for more photos & details. Luckily, the idiosyncratic grammar made it easy to discover that this was a scam...I merely pasted the words into Google (inside quotation marks so as to find an exact match) & a number of web sites popped up indicating that this was indeed a scam. Here is one: How could someone wanting to buy some art be a scam? you might ask...well, the way it usually works is that the buyer wants to send you a check for more than the value of the art, as they have a "client in your country" to whom they owe a couple of thousand dollars. They send you a banker's check, you put it in your account. A couple of days later it seems that the money is there, so you cut a check for the "client" & send the money on. You also send the art to the buyer. A couple of weeks later, you find the check you received was a fake & that you are out a couple of thousand dollars & have also lost a piece of art (plus shipping & packing costs), which may be on the scammer's wall, or in a dumpster somewhere. Luckily for potential artist victims, the scammers aren't very creative with their solicitations. When you're sending out hundreds or thousands of these, they are mainly cut-and-paste jobs, so Googling for the exact language will often find other examples from the same person (or even someone else copying them). If in doubt, do a Google search, for example for: " saw these creatives works on your web site and I will like you"... Seller beware! I hope this helps someone avoid an unpleasant & costly situation. No comments:
global_01_local_2_shard_00001658_processed.jsonl/17276
Sarah Garland is Senior Vice President for PNC Bank, responsible for the FHA Production as well as Fannie Mae and Freddie Mac Affordable Multifamily Production. Prior to joining PNC, Garland served as Fannie Mae’s national director of multifamily affordable housing since 2005. She was responsible for the production and management of all multifamily affordable products such as tax-exempt bonds, low-income housing tax credit transactions and affordable housing preservation transactions, and was instrumental in providing the executive oversight and management in fostering and growing Fannie Mae’s affordable lender relationships.  Before that, she was vice president of Wells Fargo Bank’s Community Lending Division in Los Angeles. Her responsibilities included oversight of community lending activities in Southern California, Arizona, New Mexico and Texas. Garland is considered an industry specialist in affordable housing finance, and has proved to be a resource for many industry organizations and publications. She is currently the Chair of the MBA Lender Committee for FHA Financing, and Vice-Chair of the Multifamily Counsel of the MBA. She holds a bachelor’s degree in political science and international relations from University of California, Los Angeles.
global_01_local_2_shard_00001658_processed.jsonl/17302
How to Follow up Your News Releases and Story Pitches Can you remember a story idea you pitched a year ago that resulted in no news coverage of any kind? If so, how quickly could you respond if a reporter called you today wanting to cover the story? Would you start groping for words, or asking questions like "Who did you say you wanted to interview?" Or would you be ready, on a second's notice? Sound ludicrous? Well, it happened to publicist Jill Lublin, who knew how to handle it, and it can happen to you, too. A few years ago, Jill pitched an idea about one of her clients, a professional speaker, to Meeting Planner magazine. Despite several follow-ups, she never got a response. "Then one year later--count 'em--365 days later, I got a call and this reporter said, 'Yes, we want to do the story, and by the way, tomorrow. Are you ready?' And of course the answer is yes, you're always ready when the media calls." That's valuable advice regarding follow-ups. Never assume a story pitch is dead. Jill, co-author of the book Buerrilla Publicity," also says: When following up, remember The Rule of 7. That means you should follow up seven times, using a combination of phone calls and emails, before you stop contacting journalists. But always be ready in case they call you. Never follow up on routine news releases announcing things like promotions or awards you've won, or they'll view you as a pest. Your efforts are better spent following up on larger stories you have pitched. When following up, concentrate on benefits. Explain how the idea you are pitching is the solution to a problem--and do it quickly, in fewer than 30 seconds. When you call or email, don't say, "Did you get my press release?" or "I'm following up on a call I made two weeks ago." Jill says: "I typically will say, 'I sent you some information.' That's my code word for press release. What I have found when talking to the media is they hate when you call them up and say, 'Did you get the press release?' What they love is for you to talk about the information in terms of how it can be readily used by them, and why they would care. Really. That's the bottom line. Why would they care?" When following ups, never, ever ask a reporter to alert you when the story is printed, or to send you a certain number of copies of the story. It's your job to monitor the publications, then call the circulation department and order however copies you want. Expect to pay for them. Jill shared dozens more tips for follow-ups during a live teleseminar in 2003 called Failproof Ways to Follow Up After Sending a News Release or Pitch Letter." By Joan Stewart Photography by Red Baron  Publicity expert Joan Stewart publishes the free ezine "The Publicity Hound's Tips of the Week," packed with valuable tips on how to generate thousands of dollars in free publicity. Subscribe at her website and receive free the handy cheat sheet "89 reasons to send a press release." Contact Joan at No comments: Post a Comment
global_01_local_2_shard_00001658_processed.jsonl/17306
Just to share, if you get this error messag: The compute emulator had a error: Can’t locate service model.. for instance when starting “package create …“, the problem could be a too deep project folder structure. In my case caused by the file cache directory of my application. After clearing this directory everything was ok.
global_01_local_2_shard_00001658_processed.jsonl/17314
Skip to main content 'Tis the Season for Reading Nux Gallica's trophy shelf is a sight to behold during this first semester of first grade! Just kidding. She doesn't have one. But if she did, it would boast two framed Golden Warrior of the Week certificates, signed by the principal, for most excellent behavior in the 1st - 4th grade bracket, alongside two baby-animal-shaped badges for large amounts of time spent reading (or listening to) books at home. I'm tickled by these awards because up until this year, sitting quietly with a book was not one of her favorite activities. And I loved my chatterbox wild child rocket-fueled NASA nerd with all my heart. This fall, however, she has proven to be my daughter as well as her daddy's. We've been reading books together for up to two hours a day, on top of the reading we do apart while she's at school. During these cozy autumn evenings warmed by oven baking and woodstove fires, Nux reads me children's picture books, and I read her my vintage Calvin and Hobbes comics and chapter books. (Hiddensee on the top of the stack there is just for Mama to read silently as Nux drifts off into dreams of magic carpet rides with tigers.) It's a holiday dream come true for this book-lovin' mama! (Even if Yukon Ho! is not my actual top pick for Yukon-related books I could be reading right now.) What's on your shelf this season? Popular posts from this blog 35 Great Things About Turning 35 Ich Liebe Rammstein: Richard Richard Z. Kruspe
global_01_local_2_shard_00001658_processed.jsonl/17342
School lunches of my childhood Whenever I read books or watch tv shows or movies where schoolkids insult the cafeteria food, I can never relate. When I was a schoolgirl, the cafeteria food was always wonderful. It was always cooked on-site, from scratch, and piping hot, featuring basic but delicious Filipino or American favorites. Here are some dishes I remember from my schooldays: Corned beef croquettes Spaghetti with bolognese sauce Chicken adobo Fried chicken All main dishes were accompanied by a cup of rice and steamed vegetables. Sweet snacks and desserts like cookies, brownies, or bananas fried with sugar (all made on-site, from scratch) were also available for purchase. Drinks included soda, juice and sago (a sweet boba pearl drink), but kids usually poured themselves a glass of water (most Filipino kids don't drink milk regularly). It was always such a treat when my mom let us buy hot lunch -- it was like eating at a restaurant; a budget restaurant, but one with delicious food nonetheless. Fast forward to 2011 and the kids' cafeteria lunch. Things couldn't be more different. Their elementary school doesn't have a kitchen, so lunch gets delivered in a truck every morning and gets heated up at lunchtime. The food is eerily familar to what you'd find on a kids' menu at a chain restaurant. Here's what the kids in our local elementary schools had for lunch last week: Cheese Quesadilla Fillet of Fish Sandwich on Whole Wheat Bun Hamburger on Whole Wheat Bun Mini Cheeseburger Twins Cheese Sandwich on Whole Wheat Bread Hamburger on Whole Wheat Bun Rotinin Pasta w/ Marinara Sauce and Whet Roll Italian Sub Sandwich on Whole Wheat (salami, cheese) Chicken Nuggets Cheese or Pepperoni Pizza Drinks include chocolate milk, white milk and fruit juice boxes. Aside from the main course choices, kids can also choose some side dishes like jello cups, fruit cups, apples, oranges, bananas, YoKids tubes, sunflower seeds, raisins, string cheese sticks, or carrots. I realize that the school lunches of my childhood and my children's school lunches differ partly due to cultural preferences (we had lots of traditional Filipino dishes, rice at every meal, etc..). Also, I went to a private school, so the school had far more control over what they could cook and serve. They probably didn't have to meet any cost or nutritional guidelines either. But I do wish things were different at their school. My kids eat a packed lunch most days, like I did. But unlike the yummy school lunches in my past, the only school lunch day they consider a treat is friday, Pizza Day. If only "hot lunch" really did mean a hot, cooked-from-scratch lunch instead of a hot, microwaved lunch! Tomorrow I'll be reviewing a book called Lunch Wars, written by Amy Kalafa, producer of the documentary movie Two Angry Moms, which gives concerned parents information and tips they can use to push for change, instead of just wishing for it. You can read more Lunch Wars reviews and check out the latest Lunch Wars discussion on BlogHer. 1 comment: Ana said... I also remember banana cupcakes and banana turon! You're right, we were lucky to have delicious food. It was always a treat when my mom agreed to let us buy lunch instead of bring from home! By the way, the H.E. building was recently demolished! Good-bye 7th grade classroom!
global_01_local_2_shard_00001658_processed.jsonl/17353
That didn’t take long at all I wondered how long it would take to get my first spam after registering The answer: two days. Date: September 17, 2004 10:27:05 PM PDT I was doing some domain searches and I saw you JUST registered I thought I would take a chance to ask you – are you interested in making money online? If I could show you a really easy way to build a long term monthly residual income online using with a revolutionary company, would you be interested? (it costs nothing to get going) The company is Inc500 listed and has customers in 200+ countries – they are very solid and are one of the fastest growing companies in the world. Anyways, I just saw your domain and thought I might ask you. Take care, One Comment Leave a Reply
global_01_local_2_shard_00001658_processed.jsonl/17358
Here is a video of a song I wrote called 'Socks'. It is a playful song that tells the story (with a bit of creative license)) of how I met my first wife. Next Show Monthly Haiku Listen to the drum. Not in your head, not your feet. There in your belly.
global_01_local_2_shard_00001658_processed.jsonl/17364
How to win a set: math part In this post we are going to establish the formula for winning a set given the ability to score a point. We have already derived the formula for winning a game in another post: P_{wingame}(x)=x^{4} + 4\cdot x^{4}\cdot(1-x) + 10\cdot x^{4}\cdot(1-x)^{2} + (20\cdot x^{3}\cdot(1-x)^{3})\cdot(\frac{x^2}{2\cdot x^2-2\cdot x + 1}) We will build on that. In fact, winning a set in tennis means winning 6 or 7 games (either 6-any or 7-5) and occasionally a tiebreak (7-6). We will re-use the formula for winning a game quite often. Therefore, let us create a shortcut and call it g(x) like this: In order to make the formulas more readable, x will always refer to point winning probabilities, and y will always refer to game winning probabilities. One can win a set by 6-0, 6-1, 6-2, 6-3, 6-4, 7-5 or 7-6. That leads to this formula: P_{winset}(x)=P_{6}(g(x))+P_{75}(g(x))+P_{66games}(g(x))\cdot P_{wintiebreak}(x) P_{6} means winning the set with 6 games to 0, 1, 2, 3 or 4 opponent games. P_{75} means winning 7-5,  P_{66games} means getting to 6-6, and P_{wintiebreak}(x) means winning the tiebreak. We are going through exactly the same considerations as in this earlier post. P_{6}(y)=\sum\limits_{i=0}^{4} {5+i \choose i}\cdot y^{6}\cdot (1-y)^{i} The first part of the above formula states the number of ways of getting to a specific result. For instance, how many ways are there of beating an opponent 6-2? In the above formula this relates to i=2. There are {7 \choose 2} ways of getting to 6-2, because the opponent can win these 2 games anytime before, during or after the first 5 games we score ourselves (but not after the 6th game, because by then, the set would be over).As seen in a previous post, the answer is {5+2 \choose 2}={7 \choose 2}, . This number is then multiplied by the probability of a single way of getting to a specific result. For instance, one single way of getting to 6-2 has the probability of y^6\cdot (1-y)^2. The following formulas are of a very similar pattern. P_{75}(y)={10 \choose 5}\cdot y^{5}\cdot (1-y)^{5}\cdot y\cdot y={10 \choose 5}\cdot y^{7}\cdot (1-y)^{5} P_{66games}(y)={10 \choose 5}\cdot y^{5}\cdot (1-y)^{5}\cdot y\cdot (1-y)\cdot 2={10 \choose 5}\cdot y^{6}\cdot (1-y)^{6}\cdot 2 Getting to 6-6 necessarily implies getting to 5-5. The formula uses that fact by first calculating the probability of 5-5, because the first 5 games can be scored in any order (but the sixth game cannot, because it wins the set if the opponent does not already have scored 5 games). The “\cdot 2” part is due to the fact that after 5-5 there are two ways of getting to 6-6, i.e. 6-5/6-6 and 5-6/6-6. P_{wintiebreak}(x)=P_{7}(x)+P_{66points}(x)\cdot P_{wintiebreakaftersixall}(x) The tiebreaker can be won by 7-any or by getting to 6 all and then to win from there by a two point difference. P_{7}(x)=\sum\limits_{i=0}^{5} {6+i \choose i}\cdot x^{7}\cdot (1-x)^{i} P_{66points}(x)={12 \choose 6}\cdot x^{6}\cdot (1-x)^{6} As opposed to the above P_{66games}, here scoring 6 points does not mean one wins the tiebreak (but winning 6 games wins the set). Thus, the two formulas are not identical. P_{wintiebreakaftersixall}(x)=\frac{x^2}{2\cdot x^2-2\cdot x + 1} That last part is identical to the formula of winning a game after deuce. Although we have all the components of the final formula, I will not put its pieces together, as it would just explode. Instead, I will show the resulting graph one more time: Leave a Reply You may use these HTML tags and attributes:
global_01_local_2_shard_00001658_processed.jsonl/17365
Saturday, November 27, 2010 What Science Knows, and How It Knows It By James Franklin, 283 pages, Encounter Books. Franklin shows that, more than ever, science and the Church need each other. Both scientists and theologians are fighting against the current lack of confidence in the existence of truth. Atheists batter the Church's teaching on the existence of God and the need for absolute moral truths, and many people batter the scientist's ability to build our understanding of physical reality. Franklin discusses the extent to which some current thinkers, including American feminists, French philosophers, and many other academics, question even the mathematical truth of 3*2=2*3. These philosophers try to distort mathematical truth and scientific hypotheses regarding such discoveries as New Zealand being comprised of 2 major islands. What Science Knows criticizes this kind of skepticism. Franklin notes that many thinkers have set up their own arguments against the truth in such a way that it's no use even arguing with them. No matter what you say in favor of the truth, they will accuse you of being overly-situated in your culture. Certain sociologists, in other words, have argued that truth is only relative to the culture and sociological situation in which someone lives. The argument goes like this: Pre-industrial, pre-scientific people living near a volcano who believe that the gods live in the volcano, are every bit as truthful as scientists are about the nature of the volcano - and no one has the right to challenge this traditional theology. Thus we have ended up in our culture with the fuzzy idea that everyone is entitled to their opinions, and that no one opinion is more correct than another. (This becomes problematic when we think of a neo-Nazi's views on Jews or Slavic people.) What Science Knows takes the very strong position that truth does indeed exist. However, the author does not look to science for all answers. Refreshingly for a scientist, Franklin argues that ethical and religious truths also exist, and that science cannot always investigate these 2 exhaustively. He is a humble scientist, who avoids the scientific arrogance which says that science will eventually know everything. He points to the problem of human consciousness, and how after more than a century of science and billions of dollars in research grants, we are no closer to scientifically understanding this basic human condition than we were 100 years ago. Thus Franklin believes that the truth exists, but that more than science is needed to understand it. The greatest part of this book, however, is taken up with refuting the feminist and sociological attacks against the scientific method itself, and explaining how the method works. What Science Knows argues that science is not so far-fetched and not unattainable to the common person: "Science agrees in large part with common sense on the role of space and time." As Franklin notes, it is the professional skeptics who knock every teaching on the truth, including ethical, religious, and scientific, who lack common sense. No comments: Post a Comment
global_01_local_2_shard_00001658_processed.jsonl/17375
Everypixel Free Offers (Vlad Zelinskiy) Q: Why do you have a Brutalist Website? A: Design should clarify the nature of an object. Brutal appearance has a pretty good match with the character of stock image content which is not just «pretty» or «beautiful» but often weird, outdated or even trashy. Q: Who designed the website? A: Vlad Zelinskiy Q: Who coded the website? A: Artem Besedin Q: With what kind of editor? A: Sketch, SublimeText
global_01_local_2_shard_00001658_processed.jsonl/17378
Btc Warriors - Privacy policy Your information is collected via two ways. Firstly, by browsing “Btc Warriors” will cause the phpBB software to create a number of cookies, which are small text files that are downloaded on to your computer’s web browser temporary files. The first two cookies just contain a user identifier (hereinafter “user-id”) and an anonymous session identifier (hereinafter “session-id”), automatically assigned to you by the phpBB software. A third cookie will be created once you have browsed topics within “Btc Warriors” and is used to store which topics have been read, thereby improving your user experience. We may also create cookies external to the phpBB software whilst browsing “Btc Warriors”, though these are outside the scope of this document which is intended to only cover the pages created by the phpBB software. The second way in which we collect your information is by what you submit to us. This can be, and is not limited to: posting as an anonymous user (hereinafter “anonymous posts”), registering on “Btc Warriors” (hereinafter “your account”) and posts submitted by you after registration and whilst logged in (hereinafter “your posts”). Your account will at a bare minimum contain a uniquely identifiable name (hereinafter “your user name”), a personal password used for logging into your account (hereinafter “your password”) and a personal, valid email address (hereinafter “your email”). Your information for your account at “Btc Warriors” is protected by data-protection laws applicable in the country that hosts us. Any information beyond your user name, your password, and your email address required by “Btc Warriors” during the registration process is either mandatory or optional, at the discretion of “Btc Warriors”. In all cases, you have the option of what information in your account is publicly displayed. Furthermore, within your account, you have the option to opt-in or opt-out of automatically generated emails from the phpBB software. Your password is ciphered (a one-way hash) so that it is secure. However, it is recommended that you do not reuse the same password across a number of different websites. Your password is the means of accessing your account at “Btc Warriors”, so please guard it carefully and under no circumstance will anyone affiliated with “Btc Warriors”, phpBB or another 3rd party, legitimately ask you for your password. Should you forget your password for your account, you can use the “I forgot my password” feature provided by the phpBB software. This process will ask you to submit your user name and your email, then the phpBB software will generate a new password to reclaim your account. Back to login screen
global_01_local_2_shard_00001658_processed.jsonl/17421
Wednesday, August 15, 2007 Week 9, Thing 21 I was slightly amused when I searched under the term "library" at to find coming in at #56 Erotic Expressions, or "An audible sampling of steamy erotic fiction from the Lusty Library at ". Needless to say, that one did not make my cut. Over at Yahoo Podcasts, I was happy to find several that had Jasper Fforde in them as a guest. I really wish that they could podcast his book talks because he's all sorts of brilliant. The ones they had there were a couple years old with him talking about some of his past books. In the end, however, I ended up at the BBC podcasts because I was curious to see if there was anything familiar from BBC Radio 2, which just happens to be the radio station I listened to while studying abroad in Wales. Not only did I find several podcasts of familiar radio personalities (at least to me) and added them to my bloglines accounty, I also found one from BBC Radio Wales which I happily added to my bloglines even though it is in Welsh and I probably won't understand it. The way I think about it, it can't hurt, and perhaps it will help jog my memory with the Welsh language. However, there are currently no episodes up for listening, but, it seems like they want to do it, so it can't hurt and I'll hope for the best that they will soon start doing Welsh podcasts. Now if I can just find a French one, I'll be all set language wise! I can see how these could be useful, especially for book discussions and talks. Within the library or outside. Some, I noticed, are even just readings of books which is good to know when you can't access downloadable books or audio books. The important thing is just being able to find them! And, however tempting it would be to make a podcast, I'm holding back the urge. Not that anyone wants to listen to my voice here! No comments:
global_01_local_2_shard_00001658_processed.jsonl/17431
Planning for Skills Development The Teaching, Learning and Assessment Cycle at Key Stage 3 This short animation shows how any subject can feed into developing the Cross-Curricular Skills through its teaching, learning and assessment cycle. Teachers can teach skills-specific knowledge and techniques discretely in subject specialist classes such as English or Mathematics. In other curriculum contexts, there is increased emphasis on transferring, applying and using skills effectively to enhance learning. Link to accompanying page
global_01_local_2_shard_00001658_processed.jsonl/17432
Beloved Sleep I wanted to re-post this from a few years ago.  This still rings true for me. It happens. Sometimes it's the tacos with pizza. Sometimes it's coffee a little too late in the evening. Sometimes it's the late night rice crispy treats with butterscotch morsels melted on top, cut into nice tempting squares that aren't big enough to eat just one. Sometimes it's simply life's stresses that we're not suppose to grasp so tightly. But, whatever it may be, sleep sometimes evades me. Sometimes, If I wait long enough (and be real still and quiet... shh... ) I may fall back to sleep. But, usually I'm up for awhile. So, "why not" I thought, "let's do a word search on sleep in the Scriptures". Check it out. The Scriptures say (and Scriptures do speak), "It is vain for you to rise up early, To sit up late, To eat the bread of sorrows; For so He gives His beloved sleep." Psalm 127:2 And that's beautiful. He reminds me to rest in Him, to roll all of my anxieties over onto Him. He loves me and has designed for me to be able to sleep - and don't you just love it when you get a good night's sleep! Praise the Lord. But wait, there's more. In Song of Solomon it says, "I sleep, but my heart is awake; It is the voice of my beloved! He knocks, saying, "Open for me, my sister, my love, My dove, my perfect one; For my head is covered with dew, My locks with the drops of the night." Song 5:2 Well, there it is. Sometimes He wakes me up. (talk about God using the natural for supernatural purposes - butterscotch topped rice crispy treats) He wakes me up because He wants to meet with me. For many years I've pondered this portion of Scripture. The Shulamite delays and when she's fully awake realizes what she's doing, runs to the door and then He's gone. But, her great love and passion for her Beloved sends her into the streets seeking Him. This brings suffering into her life, abuse even, but that's not able to stop her quest; she must find her Beloved. I admit that at times even when sleep evades me, my indifference to the Lord is a hazy fog that covers my mind, that sometimes doesn't lift until after I've returned to bed and awake again much later. Yet, what an opportunity. To truly see what life is about. Is He calling to me? Is He knocking? Am I aware of how in love I am, enough to quickly respond to His voice? Usually I find myself waiting - which makes absolutely no sense! I wait, until I'm fully awake (I mean spiritually). And then, there's a sense of desperation. I must hear His voice, I must go after Him. And so I pray; I cry out to my Beloved. And here's what's hitting me as so wonderful... As I seek Him, He changes me into a man that is more desperate for Him. I awaken a little more to how I draw all that is good, all that means anything, from Him. And He fills my life with His presence. He becomes my motivation in all my relationships, all my pursuits, all my service. I really don't want to settle for less than a life established and settled in Him. I don't want to be a reluctant lover. I don't want to miss the opportunity to be with Him in everything. And, I am comforted to know that He knows this. He hears my prayers - He sees me seeking Him and crying out for Him from my haze of indifference. And He promises to answer that prayer. "Lord, give me strong legs to run after You, and the maturity to come quickly when you call." Pastor Chris When God Became a Man No comments made yet. Be the first to submit a comment Already Registered? Login Here Thursday, 21 June 2018
global_01_local_2_shard_00001658_processed.jsonl/17441
Ray Smith Shake Around Shake Around The million-selling singer's complete Sun recordings plus later cuts for Vee-Jay. Influenced by Country stars Eddy Arnold, Gene Autry and Faron Young, Kentucky-born Ray Smith grew up performing cowboy songs before landing his own show on Paducah's WPSD-TV.  Spotted by Onie Wheeler's manager Charlie Terrell, Smith duly came to the attention of Sam Phillips who was so impressed with what he heard, he signed the singer to Sun without meeting him beforehand - a first for the Sun founder. At Sun Smith debuted the Charlie Rich song 'Break Up' (later recorded by labelmates Jerry Lee Lewis and Rich himself) one of a slew of tidy rockers ('You Made A Hit', 'Shake Around', 'Right Behind You Baby'), most of which featured the stinging guitar of session-player Stanley Walker.  However, it wasn't until Smith quit Sun for Judd Phillips' new label that he registered his first national hit with the million-selling, pop-friendly 'Rockin' Little Angel'.   This compilation features Smith's five Sun 45rpms together with material unreleased at the time, plus his lone single for Chicago's Vee-Jay 'Robbin' The Cradle' b/w 'Rockin' Robin'.  1. Break up 2. Why, Why, Why 3. Willing And Ready 4. So Young 5. Right Behind You Baby 6. You Made A Hit 7. Shake Around 8. Rockin’ Bandit [dubbed version] 9. Sail Away 10. Forever Yours 11. I Won’t Miss You (‘Til You Go) 12. Travelin’ Salesman 13. Candy Doll 14. Hey, Boss Man 15. Life Is A Flower 16. Little Girl 17. I Wanna Be Free 18. Two Pennies And A String 19. The Girl Was Meant For Me 20. Rockin’ Bandit [undubbed version] 21. Why, Why, Why [alternate] 22. Rockin’ Robin 23. Robbin’ The Cradle Click here to buy
global_01_local_2_shard_00001658_processed.jsonl/17448
Friday, May 23, 2008 The Furminator! To visit our home is to understand what it's like to live with a gigantic, shedding dog. As most of you know, Maggie the dog is a wonderful, awesome big brown dog. We all love her to pieces, but as Hambone often says, "she's perfect except for the SHEDDING." While I don't often shill products on the blog here, I would be remiss if I didn't let all my pet owning readers know about the FURMINATOR which is a new-ish de-shedding tool. I guess it pulls the dead undercoat out of the fur in general. We got one last weekend and *seriously* we pulled two garbage bags worth of shedding off of the Mags, and since then we've only seen minimal shedding for the whole WEEK~! I want to get everyone one of these. I still can't believe how well it worked, and believe me I have tried Everything else. Get one! No comments:
global_01_local_2_shard_00001658_processed.jsonl/17496
Image Image Image Image Image Image Image Image Image Image Scroll to top No Comments Op-Ed: What Is the Alt-Right? Op-Ed: What Is the Alt-Right? | On 09, May 2017 This piece reflects the beliefs of its author. It does not represent the views of The Commentator as a whole, nor does it represent the opinion of Hudson Catholic Regional High School. Political movements have been well known for their symbols, historical figures, ideology, etc. No exception is given to the Alt-Right (Alternative Right) as it has been given rise during the 2016 election. Alt-Right is a shorter way of saying that you are on the Alternative Right and that you are not neoconservative from the Republican Party. That’s basically it. Yet, the movement has all different types of people leading it i.e. White nationalist Richard Spencer. Why is that? Well, an article titled “An Establishment Conservative’s Guide To The Alt-Right,” written by Allum Bokhari and Milo Yiannopoulos, tackles and explains what the Alt-Right really is. They describe it as “an amorphous movement,” adding that as an “an obscure subculture, the Alt-Right burst onto the national political scene in 2015. Although initially small in number, [the movement] has a youthful energy and jarring taboo-defying rhetoric that have boosted its membership and made it impossible to ignore.” Bokhari and Yiannopoulos cited a National Review article that basically called the Alt-Right “just bitter members of the white-working class” and mentioned a writer from the Daily Beast who attacked Rush Limbaugh for sympathizing with the “white supremacist Alt-Right,” and more articles that basically have a misunderstanding of the Alt-Right. The article asks a great question: Is the Alt-Right “really just the second coming of 1980s skinheads, or something more subtle?” In their examination, they split the Alt-Right into four categories: The Intellectuals, Natural Conservatives, Meme Team, and the 1488rs. The Intellectuals are basically thinkers ranging from Oswald Spengler, H.L. Mencken, Julius Evola, Sam Francis, and the rest of the paleoconservative movement, most of whom wanted Pat Buchanan as president. The Intellectuals also consists of anyone who are Isolationists, pro-Russians, and ex-Ron Paul supporters frustrated with the neoconservative domination on the Republican Party, drawn to the Alt-Right, and are anti-war. Then there are the neoreactionaries, AKA #NRx. They are a fearfully intelligent group of thinkers, attacking the ideas of the establishment, while also being led by philosopher Nick Land and computer scientist Curtis Yarvin. They argue against liberal democracies and are critical of egalitarianism. Next up are the Natural Conservatives who are broadly similar to the Intellectuals above, however are mostly white, Middle-American, radicals who embrace identity politics and are interested in their own demographic. The Natural Conservatives are basically a response to the Natural Liberals (people who want radical change and enjoy diversity) but they haven’t had power since the 1980s while the Natural Liberals have. Plus, they (like their leftist counterparts) argue about a form of “cultural appropriation” but instead of destroying statues and history, they value western culture and its heroes. Then there’s the Meme Team. This is basically a bunch of young people from 4chan, 8chan, and Reddit forums who are trolling the public with racist memes. In my mind, their intent is basically similar to that of when young people were attracted to the New Left of the 60s, which was about rebelling against their parents by playing rock music. Usually those older than they are falling for their game. They shouldn’t complain because the Meme Team are not being serious with them in the first place. These memes are designed to get a reaction. Lastly, we have the 1488rs. Who are they and why those specific numbers (1488)? Their name is actually a reference to two well-known neo-Nazi slogans. The first one being the so-called 14 Words: “We Must Secure The Existence Of Our People And A Future For White Children.” The second part of the number, 88, is a reference to the 8th letter of the alphabet (H). Hence, “88” will then become “HH” which stands for “Heil Hitler.” If anyone calls the Alt-Right racist, they’re not wrong, but they’re also not totally right. The reason I say that is because a lot of people on the Alt-Right denounce the 1488rs and vice-versa. In fact, this section of the Alt-Right will probably consider this piece offensive. Sounds like something similar to our friends in the Regressive Left. It is amazing how the horseshoe theory works. Both sides, far right and far left, are so far from each other on the political spectrum that they end up making a horseshoe, ironically paralleling each other so much even though they supposedly hate each other. There are also those in the Alt-Right movement who get associated with Donald Trump and his rise to power. They are called “Trump Loyalists.” However, Richard Spencer, a white nationalist, said in an interview with Al-Jazeera that if Trump wants to distance himself from the Alt-Right and not do anything with them, that’s fine and that the Alt Right will distance themselves from Trump, unlike much of what the mainstream media has been saying. Another misconception is that Richard Spencer is actually part of the 1488rs, but he has commented in an interview where famously he got punched in the face by an Antifa thug, “Nazis hate me.” The Alt-Right, in a sense, is a counter-movement politically and culturally towards the Regressive Left, from its identity politics, “microagressions,” trigger warnings culture on college campuses, and hatred of straight, white males. They are in a lot of ways, the Establishment Republican’s “Frankenstein,” as Yiannopoulos’s article labels it. He writes, “The Establishment need to read their Haidt and realize that this group isn’t going away.” He continues, “There will be no “progress” that erases the natural affinities of conservatives. We can no longer pretend that divides over free trade and the minutiae of healthcare reform really represent both sides of the political spectrum in America. The Alt-right is here, and here to stay.” In conclusion, the Alt-Right is not as bad or even politically dangerous as some say in the media. They’re politically incorrect and have no problem with diverse ideas, so long as you can defend your convictions. Submit a Comment Leave a Reply
global_01_local_2_shard_00001658_processed.jsonl/17497
Sunday, March 20, 2011 How does the Sun burn without oxygen? Well, I personally have seen and heard this question asked many times, so I decided to answer it here. A fire cannot burn without oxygen. You can show this for yourself, in fact: if you light a small candle and then put a clear glass upside-down over that candle (without touching the flame), you can watch the flame slowly extinguish as it uses up all of the oxygen that you have trapped around it with the glass. So, how does it burn? Here's how: The way the Sun "burns" fuel is completely different from the way a fire on Earth burns (the term "burning" is a bit misleading when used to talk about stars). The Sun gets its energy by smashing small light elements together to make heavier elements; most of a star's life is spent smashing hydrogen atoms together to make helium. The burning that a star does, then, is a nuclear reaction, and not a chemical one like the fires on Earth (when a candle burns, the atoms themselves remain unchanged: just the molecules are affected). The Sun can "burn" hydrogen to helium without the need for oxygen. It should be noted that in the presence of carbon, nitrogen and oxygen, stars heavier than the Sun may burn hydrogen to helium by using the C, N and O as catalysts. Even in these stars, however, an absence of oxygen does not prevent nuclear burning. Download this photo of the Sun HERE. Saturday, March 19, 2011 Well, this is not a common mistake, it's just plain stupidity. I've just seen a video on where a girl/woman said she was praying for an earthquake in Japan and that she's happy 'God' answered her after only a couple of days and shook the country of Japan. She also said that she will keep praying until 'God' kills all atheists and non-christians. And this is something that bugged me for some time, I can't think of a reason why would anyone want to see other people dead. They all say that their religion is the only one that's true and that it's a peaceful religion, yep, peaceful. I just don't see how it could be peaceful when believers make protests in order to force the government to declare war to a country that has a different religion and cause death to innocent people who never did anything to them. I've also heard from some people that you should pray to your god, whoever he is, every day. And to reply to that, I'll just quote Nietzsche who said: ,,I cannot believe in a god that wants to be praised all the time.''. If he's really all-powerful, then he doesn't need your prayers and he certainly won't cast you out to hell for not reminding him that he is all-powerful. To sum up, I don't believe in a God and if you do, don't take anything I write here as an offense, I don't want to insult you, I just want to see some evidence for your God and if you convince me, I'll convert to your religion. Let me know if you want to see me post videos on youtube and how you liked this post in the comments. Wednesday, March 16, 2011 The Big Bang theory Another mistake commonly made by creationists. In an effort to explain the universe with a supreme being they'll often say the following: 'So, you're saying that in the beginning there was nothing and nothing happened to nothing and nothing exploded into something which then became dinosaurs and humans.' Well, no scientist said or will ever say that. Scientist don't get Nobel prizes for saying 'it' just happened. In the beginning there was a singularity (a dot infinitely dense, infinitely hot and infinitely small), that is something, and it exploded due to quantum fluctuations and because E= mc^2, energy created almost equal amounts of matter and anti-matter. When these two collide they release a great amount of energy. Since there was a slightly greater amount of matter, at the end, it's all that left. When it got cold enough, protons and electrons started forming and making atoms which then by gravity pulled together to create everything you see. The evidence of the Big Bang is cosmic background microwave radiation and the temperature of space, so there ARE proofs that it happened unlike the statement: 'Lul Magic man did it' which bears absolutely no proof whatsoever. Here's a pic you should check out: Thanks for reading my blog and check back frequently for updates. Tuesday, March 15, 2011 The Origin of Man It's a common misconception that Darwin, in his famous book, explains how humans evolved from monkeys. Now some of you might ask why we still have monkeys then? Firstly, that's like asking why do we still have England when English folks colonized America. Secondly, humans DID NOT evolve from monkeys. Darwin explained that both humans and monkeys evolved from a common ancestor, not from each other. And if you wish to believe that some kind of super-being created humans (without any evidence of it, unlike evolution who's been proven in many ways) just go on, ignore this post.  Here's a simplified demonstration:
global_01_local_2_shard_00001658_processed.jsonl/17498
Canon Community Canon Community New Contributor Posts: 2 Registered: ‎02-20-2018 Camera Window Cannot Detect Camera Hi everyone, I am new with Vixia HF R80 - and camcorders in general. I am trying to download my movies from my Vixia. I am connected to my laptop with usb cable supplied by canon. I do not use a hub port, i am connected to the main power. When I turn on camera my Windows 7 laptop tells me it is downloading device driver ... then says it can not. Then I see a window that asks me how I want to download my files - by Windows or by Camera Window? When I choose Windows it tells me there's an error on each file and they didn't download. So I try Camera Window and receive an error that says "Camera Window Cannot Detect Camera". Please help! I have slogged my way through with this camera for days and am so excited to see my first take! Product Expert Posts: 895 Registered: ‎10-16-2012 Re: Camera Window Cannot Detect Camera Hi Billrossimusic, Thanks for posting.  I regret the delary in responding to your inquiry. If you're still encountering this issue, when connecting your camcorder to your computer, we recommend the following: • Power is critical when transferring movies. Please ensure that your camcorder is powered by its compact power adapter. • If your computer is a desktop unit, we recommend selecting a USB terminal on the back of your computer. These terminals normally have a better signal and more power than USB terminals on the front of your computer. • If your computer is a laptop, please ensure that it's running on A.C. power. • When connecting your computer, we recommend against the use of a USB hub. We recommend connecting your camcorder's USB cable directly to your computer. When your camcorder is connected, as described above, please turn it on, using the Playback button, which is under the On/ Off Button. With your camcorder connected, as described above: 1. Does your computer respond when you switch your camcorder over to the playback mode? 2. What do you see on your camcorder's display? powered by Lithium
global_01_local_2_shard_00001658_processed.jsonl/17508
lunes, 26 de julio de 2010 A Continuous-Time Common-Mode Feedback Circuit (CMFB) for High-Impedance Current Mode Application A continuous-time common-mode feedback circuit (CMFB) is presented. A two-stage high-gain architecture is used to minimize the offset of the common-mode voltage. A special compensation scheme enables this circuit to be used in high-impedance current-mode systems without a stability problem. Simulation and testing results show the superior performance of this circuit. It is proven to be an ideal common-mode feedback circuit for systems which require an accurate and stable common mode voltage. This circuit has been implemented in a continuous-time switched-current Σ∆ modulator with a 2um CMOS process. With a 50MHz clock, the modulator has achieved a 60dB dynamic range in a 1MHz bandwidth. 1. Introduction Common-mode feedback circuits (CMFB) stabilize common-mode voltages for fully-differential analog systems by means of adjusting the common-mode output currents. The two differential output voltages are averaged (VCM) and compared with the common-mode reference voltage (VRCM), and the differential voltage is converted to the common-mode output current to adjust the common-mode voltage (VCM). Three different techniques have been used for implementing CMFBs: * Switched-capacitor * Differential difference amplifier (DDA) * Resistor-averaged circuit Suffering from clock-induced noise, switched capacitor common-mode feedback circuits are suitable only for sampled-data circuits [1][2]. Common-mode feedback circuits implemented by differential-difference amplifiers (DDA) use four identical transistors to average and compare the common-mode voltages [3]–[6]. Due to the limited input range and nonlinearity of the differential pairs, DDA CMFBs can work only for circuits with small voltage swing. The input range and linearity can be improved, however, by reducing the aspect ratios (W/L) of the CMOS transistors or increasing the bias current source. Resistor-averaged common-mode feedback circuits use resistors to average the two differential outputs and send the result to a differential pair to compare with VRCM [7][8]. This technique reduces the common-mode voltage error caused by the nonlinearity of the differential pair. The voltage swing ranges are not limited by the differential pair, and hence, more voltage swing is allowed without a significant offset of common-mode voltage. The disadvantage of the resistor-averaged CMFB is the requirement of large-valued resistors. Not only do these resistors require more silicon area, but they also load down the output and cause a reduction of the gain. Moreover, they affect output impedances, which are very critical in current-mode systems since they influence the pole and zero locations. One important performance factor of common-mode feedback circuits is the transconductance gain (ACMFB). ACMFB is equal to the open-loop common-mode output current (IOCM) divided by the voltage difference (VERR) between the common-mode output voltage(VCM) and the common-mode input reference voltage(VRCM). With a large ACMFB, a smaller common-mode error voltage (VERR) and a faster response can be achieved. For most of the continuous-time CMFB circuits, single-stage structures are used [3][4][5][7]. For single stage DDA CMFBs[3][4][5], if the nonlinear effect of the differential can be ignored, the CMFB circuits can be simplified as shown in Figure 1. For single-stage resistor averaged CMFBs[7], the CMFB circuits can be simplified as shown in Figure 2. The differential output current is then mirrored to the output as the common-mode output current. From Figure 1 and Figure 2, we find the transconductance of a single-stage CMFB is roughly equal to the transconductance gain of a differential pair. The typical transconductance gain for a differential pair is in the range of 10_A/V to 100_A/V. A 1_A common-mode offset current applied on the output causes a 10mV to 100mV common-mode error voltage (VERR). Some systems may not tolerate this amount of common-mode voltage offset. One solution to improve the transconductance gain is to use a two-stage architecture [6][8]. With one extra stage, the gain increases about 100 times, which greatly reduces the common-mode error voltage (VERR). However, the two-stage structure has a stability problem and must be compensated. Two nodes contribute to the stability problem. One is the external output node (two nodes in fact). The other is an internal node which connects the first stage to the second stage. For voltage-mode CMFBs with low output impedance [8], the pole caused by the external node is located in a higher frequency range. This makes the compensation easier by simply moving the pole generated by the internal node to a low-frequency location. For current-mode systems, the external nodes may have high impedance and induce a pole at very low frequencies, which is difficult to compensate. In this paper, a two-stage CMFB circuit for high impedance current-mode circuits is presented. The frequency compensation is achieved by introducing an extra pole and zero. The linearity of the DDA is improved to minimize the common-mode error voltage (VERR). 2. Circuit Design The proposed continuous-time CMFB circuit is a two stage DDA CMFB as shown in Figure 3. The first stage is composed of M1 – M7 and current sources M14 – M17. The second stage is composed of M8 –M11. Long channel (small aspect ratio) NMOS transistors are used for the DDA input stage (M1 – M4) to minimize the differential pair nonlinearity and to accommodate more input voltage swing. They also minimize the VERR caused by the transistor mismatch among M1 –M4. The transistor sizes are listed in Table 1. Two high-impedance places, two external nodes (A) and one internal node (B) in Figure 3, introduce two low frequency poles and cause a stability problem. Frequency compensation is achieved by adding MC and CC. With CC shunted to the input and output of the first stage, an extra pole and zero are introduced to attenuate the high frequency gain of the first stage. The gain of the first stage reduces to one for a high-frequency range and causes the CMFB to function as a single-stage CMFB. Accordingly, the proposed CMFB has a large low-frequency gain to minimize VERR and a moderate high-frequency gain to keep the system stable. Figure 4 shows the compensation scheme of the proposed CMFB.MC and CC (in Figure 3) introduce an extra low-frequency zero to correct the phase shift and an extra high-frequency pole, which has an insignificant effect on the performance. In the proposed CMFB, the common-mode error voltage (VERR) is caused mainly by the transistor mismatch, which is in the mV range. 3. Experiment Result The proposed CMFB has been implemented in a second order continuous-time switched current Σ∆ modulator (Fig. 5) in a 2um CMOS process [9]. The accuracy and stability of the common-mode voltages in the Σ∆ modulator are important since they affect the gain of the Voltage-to-Current Converter (in Figure 5) due to the body effect [9]. The proposed CMFB is designed to accommodate ± 1V differential voltage swing. Figure 6 shows the relationship between VERR and the differential input voltage within±1V. From Figure 6, VERR is less than 0.4mV within the designated differential input voltage range. Here, the mismatch among M1–M4 is ignored. Figure 7 shows an expanded view of VERR over the differential input range within ± 2V. Figure 8 shows the open-loop transconductance of the proposed CMFB. The performance summary is shown in Table 2. Figure 9 shows a microphotograph of the proposed CMFB circuit. A second-order continuous-time switched-current Σ∆ modulator with the proposed CMFB has been implemented in a 2u CMOS process and achieved 60dB dynamic range with a 50MHz clock. 4. Conclusion A continuous-time common-mode feedback circuit is presented. The two-stage CMFB structure minimizes the common-mode error voltage without a stability problem. The high output impedance and small common-mode error voltage make it an ideal CMFB, even for a high impedance current-mode system. The proposed CMFB can be easily implemented in any differential mode circuits without modifying differential amplifiers or other circuits in the system. The measured result of the second order continuous-time switched-current Σ∆ modulator has proven the superior performance of the proposed CMFB. Hernández Caballero Indiana Asignatura: CAF
global_01_local_2_shard_00001658_processed.jsonl/17521
Unique Poundex 3 Piece Coffee Table Unique Poundex 3 Piece Coffee Table poundex furniture f3052 three piece oval coffee table set g Image attribute: atgstores.com Basically no contemporary property is without having a coffee table. Above the decades it's got turn out to be not simply an ornamental accent, but will also a useful bit of furnishings. A coffee table is really a prolonged minimal desk which happens to be normally located within the sitting down area. Coffee tables will make or split a area. The best a person will make a trendy assertion bringing your entire furnishings with each other right into a unified full. For anyone who is somebody who likes to entertain friends at your home, you'd especially wish to your sitting down area to search excellent. A sitting down area ought to have every one of the services that provide comfort and ease towards the individuals there. This really is the explanation why a lot of people emphasize on getting a desk that goes as well as the ambiance of one's sitting down area. Even so, a person aspect that lots of individuals fall short to take into consideration is whether or not their coffee table is definitely safe and sound. A very good get coffee table may be manufactured of numerous distinct resources. Picking out the suitable materials is really a basic make any difference of searching throughout the area you wish to set it in. Go searching at your latest furnishings and choose which materials would ideal match it. You need to possess a dependable search regarding your furnishings making sure that your design and style does not clash from area to area or furnishings piece to furnishings piece. The majority of coffee tables are distinct, to match people's person choices and preferences. Unique Poundex 3 Piece Coffee Table match most households because they provide a way of class and luxury to some area. They may be minimal which can be ideal for getting put before a set of furnishings. To the increased espresso topic, coffee tables occur in only about each individual condition, sizing and decor to improve the topic of one's residing space, whether it is informal or official. It is necessary to understand that for those who love superior refreshing brewed espresso, which happens to be a connoisseur handle, you may need to improve the working experience with all the placing from the temper. Almost nothing may very well be significantly even worse than juggling a scorching cup of brew with your lap and speaking along with your palms. Should you have a scorching cup of espresso dancing all around with your lap, a person could get very seriously burned. Obtain a coffee table that matches your area sizing, fulfills your important desires, boosts your colour topic, and accents your decor. You do not need cups of scorching espresso about the flooring exactly where a little youngster could action in them and have burned. Folks are significantly less possible to spill the espresso whether it is over a coffee table to start with. These of you, who like to consume your espresso in a very peaceful and ambient method, can recognize the value of getting a coffee table in your house. When that you are from your mattress, you're keen on to sip your scorching espresso in a very peaceful method. Right before you purchase a person, you may need to grasp in which you wish to set it. Should you have a significant yard, then you certainly could possibly contemplate placing it there. Many of you might like owning it in the verandah when you can admire nature's splendor within the early morning above a scorching cup of espresso. As of late you can also uncover home owners with much more than a person desk inside their residences. The full concept would be to loosen up and tranquil your brain right before you permit for do the job. So choose about the suitable place to help keep the desk.
global_01_local_2_shard_00001658_processed.jsonl/17525
Saturday, May 31, 2008 Honda is crazy!! These guys are crazy! Out of their mind! And that's what makes this ad so freaking cool! Only ONE chance, and there were moments, you don't even know they will make it. The length they go to, not as an advertising agency or for the sake of pleasing a client or advocating a brand that puts the bread on the table or winning metals and papers. This video clearly demonstrates that these people have faith. Faith not just in typical ad business talk, 'you got to believe in the brand you're selling and bla bla bla' but believing in the most important person in the value chain of creation - you. That they are here to do their job and do it in the most definitive way possible. To tell the world what Honda means and were even willing to risk their lives to ensure a job is more than well done. This is absolutely mind-blowing. Makes me wanna work for Honda, hell. Makes me wanna sell Sparks, pack my toothbrush, run off to Wieden Kennedy London and beg them to give me shelter. Simply because I too believe that in order to 'create', especially in this business, our business, the ad business, there should be no boundaries. And these boundaries are not the stupid boundaries we so often impose on ourselves, lame excuses of budget limitations, team players who don't grow balls, and whatever else. There are limitations in whatever business we do, if there's no limitation, then where lies the challenge? To me, the phrase 'difficult is worth doing' isn't just merely an advertising phrase. It just so happens that it's Honda's campaign concept. It really should be how we work as professionals, isn't it? If we're serious about creation. If we're serious about bringing values to people whom we're trying to communicate with. Then we should take the road less travelled! Darn! These guys are good! Indonesia' broadband penetration stands at around 8 to 10% compared to Malaysia. Small figure you say? That's an equivalent to 20 million users. That's more than 70% of our total population size already. Although a struggling country in many aspects, but that does not stop them in playing catch up with the world. I wonder what prospects await digital businesses there. Hmm... Friday, May 30, 2008 Honda Racing NSX-GT Click to go. The sleepless nights only get better and better. Sunday, May 25, 2008 What on earth...? What prompts a brand to rip its values apart and fight on sheer naked cost? "Just print out the confirmed booking from MAS and I will pay the difference. As for the sub-Zero Fare, which will be launched in the next few days, it will be cheaper than zero,” said Fernandes in an interview. - The Star, 6 May 08 I've always thought Tony was a brand man, I guess I thought wrong looking at how both Air Asia and MAS are taking the fight outside. I mean who could be benefiting from this? Firefly? This reminds me of the 3 year (or more maybe?) war waged in the mobile service playing field. It took everyone to bleed to stop the costly battle (yet celcos are still laughing to the bank, sigh, oh what margins!). Now, we're looking at another. Is there any other way Malaysian brands can offer value to consumers without having to cut each other's throat? Throwing zero cost products and services out like that is like throwing toys out of the playpen. Well, but then again, that's strictly from a business point of view. But as for being the consumer's voice and an avid traveller, I'd say, bring it on!! (I'm just glad I'm not the agency in charge). Thursday, May 22, 2008 Advanced Step in Innovative Mobility. All the videos I've watched and all that I've heard about ASIMO, Honda's humanoid robot can't compare to when I finally met him in person. He is one darn thing. Totally mechanical, yet able to draw uncounted people through his ability to inspire and empathize. Areas we human, so often failed to do. Why is it so? Watch Asimo teach, practise dance and basically how he fits into our family, our lives seamlessly. In fact, you can watch him live in Honda's Fan Fun Lab in Motegi circuit, Japan. And then, watch him in awe. *TVC by W+K London Tuesday, May 20, 2008 Sign of caution. What does this 'P' driving sticker truly mean? Yes, we all know it means 'Probational Driver' in Malaysia which you need to stick it on the front and back of your windscreen so that it projects high visibility to other road users. But really, what does it mean? Is this merely a sign to signal other 'unfriendly' road users to be patient and give way? Or is it to tell other drivers that there is a newbie on the road. And the newbie, sometimes becomes the unruly one for various incomprehensible show off factors, which we need to beware of? You won't believe how much power men (or women) wield when they get behind the wheels. Which reminds me of an insight we discovered a couple of years ago when pitching for the Ministry of Transport. When people get behind wheels, they morph into different beings. Cold, impatient, rude, spiteful and they can even speak French when provoked (a different kind of French that is). Can't imagine that being your girl-next-door colleague, or your kids-hugging-wife-kissing dad, right? Yea, we all morph into horrible beings when behind wheels. You and I. Someone told me that her mom puts the P sticker on even when she doesn't need to because she thinks it's 'safer'. What other meanings can we find in this sticker which is unintended but significant? Is it really safer when we see a P driver? Safer to whom? Or is the letter P another lame excuse for lame driving skills? Speaking of having stickers to signal caution to other drivers, Japan has a special one for elderly drivers who are 70 and above (70, if I'm not mistaken). Can we adopt something similar here? Can we have different stickers to signal different sort of drivers behind wheels such as the elderly, the handicapped, the pregnant, etc? Sharing more specific information like this, would it help people to change their expectations, attitude and behavior when they see different sort of stickers? Well, I think helping people to be more aware of the surroundings simply helps them to react better. No? Sunday, May 18, 2008 Dream the impossible dream. Compare this with this Someday, all our dreams will come true... Sunday, May 11, 2008 The secret of Japan. Am back. Shop's open, work resumes as per usual. Sigh. A good sigh for a good trip :) Anyway, one of the best parts of my trip was to finally be able to articulate what I thought was amiss in my own country. The habit of always, not resting, not giving excuses, not dampening others' efforts, to always, ALWAYS find a solution to every problem. That's the essence of Japan's entire being. The secret to their success. So if you want to be successful, emulate that. But of course, there are many supporting but significant factors which continuously spur this spirit of innovation. One of the many is volume. With a population size of approximately 127 million, they have enough volume to almost support any sort of invention. Whether or not it takes flight or flop is a different story. The inventions almost always evolve from the initial concept anyway, constantly improved on which explains why everytime you fly with JAL, you'll be pleasantly surprised in the little improvements made here and there. And why everytime you fly with MAS, it's same old same old, you can almost rehearse the safety script with the Malaysian Girl :) Imagine niche inventions evolving into bigger ones, combining with other concepts, constantly changing and meeting more needs, solving more problems, serving a bigger purpose. Like an amoeba. Except this one, instead of dividing itself to survive, it keeps swallowing the smaller ones causing it to grow bigger and bigger by the day. Countries with the will but not the volume needed to support it, will have to take bigger risks and higher investments to pursue innovative concepts. It could be a longer route (and a more expensive one) but it will get there. Countries such as South Korea maybe? Taiwan? Singapore? But countries with volume that can swallow up the globe, unfortunately may not have the same mindset and/or skill set (yet). They will also take some time to fully realise their potential. India? China? Brazil? How about Malaysia? Will we one day be able to catch this thinking? Even if we're 100 million heads behind? Monday, May 5, 2008 Brand showroom. Consumers have evolved. Period. At least the urban ones have, becoming smarter, pickier and more distinguished in their choice of brand. Most often that not, this post-modern consumer who is bombarded with thousands of parity brands, make his or her choice based on an alignment of values - obviously between him or herself and the brand. When functionality and/or functional difference are/is out of the equation, then it all boils down to values, the shared vision and interests. If people really do buy brands like they make friends, then we really ought to think about the hospitality we're currently giving to our 'friends' when they visit. Audi did it right although it's not the first, following many other megabrands. Having a brand showroom versus a car showroom, provides customers an experience which definitely lacks in the usual dealer showroom. Long long ago, in far away lands, other brands have already been creating concept stores to showcase products, innovations, history and concepts - Sony has their Sony Centre (for your information, Sony Building in Ginza has been there wayyyy before our dear KLCC), Toyota has its Megaweb, Honda has its mother of all brand showrooms in the form of a circuit in Motegi, Adidas has its Original Store and Apple obviously did not lose out. I don't think it's necessary for a cool brand to own a conceptual space. Neither do I think its a sure ticket to cool-dom. I think what matters is what do you have to say to your customers whom you want to make friends with? Building a relationship means opening up your past, creating present moments and working towards the future together. It means shared interests, values and respect for each other. Isn't this how we all make friends since the day we dropped our diapers? How did we manage to forget such basic rule? p/s: Audi Forum? Nice :) check back for some juicy R8s
global_01_local_2_shard_00001658_processed.jsonl/17537
How enterprises should tackle evolving threats: Kunal Pande, KPMG Kunal Pande, partner – IT advisory of KPMG illustrates how risks in the new age of robotics and AI need to be mitigated by enterprises. With each new technological advancement, new risks arise, and enterprises have had to identify the weak links in their cybersecurity infrastructure to fix them. In recent times, traditional IT systems are exponentially being replaced by newer and more advanced models, with higher connectivity, and remote access to critical data, outside the traditional enterprise perimeter. As enterprises become more agile and mobile, critical business data becomes more accessible. In the light of these changes, IT advisory partner at KPMG India, Kunal Pande highlighted the risks posed by the rampant growth of internet of things (IoT), artificial intelligence (AI) and robotics. “From being just an add-on for businesses, digital has now become a primary part of operations.” Kunal Pande Partner–IT Advisory, KPMG India At the first edition of IDG Global Security Day’s India chapter, Pande began his discussion by emphasizing on the advantages of these new age technologies but warned companies of the possible disadvantages as well. “While the advent of IoT is proving to be a boon for mankind, it could also turn out to be our worst nightmare if we do not identify and mitigate the risks that come along with it,” he said. These technologies have enabled enterprises by increasing business productivity, reducing processing time and reducing operational cost. Pande broke down the typical vulnerabilities in these evolving technologies into insecure communications, missing authorization, issues with authentication, issues of privacy, and weak cryptography and default configuration. These vulnerabilities are often backed by some typical challenges, including continuously evolving protocols, lack of security ownership and even lazy consumers of these technologies. As a result, threats like ransomware, session hijacking, and brute force are on the rise. Pande advised enterprise security heads to focus not only on extended security coverage and securing data storage but also on identifying compliance regulations and laws and making patching a regular practice. Watch: Kunal Pande of KPMG addresses Cybersecurity-Changing Paradigm In The World Of IoT, AI And Robotics
global_01_local_2_shard_00001658_processed.jsonl/17542
Submission can range from early working papers to fully developed papers. Fully developed papers will be presented in the Main Sessions and working papers will be presented in Research Forum Sessions or Posters. Please submit your full paper (for the main session) and abstract (for research forum or poster) via email: Please follow submission guidelines available on the conference website. Papers/Abstracts should be received by 30th June 2015 Papers will be subject to a double blind review. Authors will be notified of the decision on their submission by 15th August 2015. For accepted papers, the corresponding author needs to register for the conference by 20th August 2015 for their paper to be included in the conference programme. Final papers should be received by 15th August. Papers will be available on the conference website shortly after the final papers submission. Authors will be given the opportunity to publish their papers in a special issue of either: • Egyptian Accounting Review (Cairo University) • Journal of Accounting in Emerging Economies  Online registration Please register for the conference on-line at Registration form
global_01_local_2_shard_00001658_processed.jsonl/17547
Google Analytics for PR A New Method to Track Keyword Ranking using Google Analytics The search terms and ranking are stored as Google Analytics Events. In the past I’ve written about different ways to customize Google Analytics for SEO. This post is all about a new way to track keyword ranking using Google Analytics. A little background… There are lots of paid tools that will track where your content ranks in your search results. But my friend AJ Kohn wanted […] Cohort Analysis with Google Analytics SEO Customizations for Google Analytics SEO Basic Search Engine Report Tabs in Google Analytics Rethinking Blog Metrics Google Analytics Engagement Metrics A few months ago I started an experiment. I added some code to my site to better track how visitors interacted with my content. The new code tracks various user activities, like scrolling and reaching certain locations in the page. Not only did the code collect more data about user behavior it also changed many […] NEW! Google Analytics Mobile App Tracking: Data & Reports Devices And Network Overview
global_01_local_2_shard_00001658_processed.jsonl/17571
A School Grammar of Attic Greek Thomas Dwight Goodell COMPLEX SENTENCES/ Indirect Discourse 657. Words or thoughts so quoted as to be made grammatically subordinate in form to a verb or other expression meaning say, think, hear, or the like, are indirect quotations; a direct quotation retains the original form. The forms used in indirect discourse have been already given in their proper places; for convenience they are here briefly summed up together. XML File
global_01_local_2_shard_00001658_processed.jsonl/17574
Interactive SQL utility (dbisql) Executes SQL commands and runs command files against a database. dbisql [ options ] [ dbisql-command | command-file ] Option Description Reads in options from the specified environment variable or configuration file. See Using configuration files. -c "keyword=value; ..." Specifies connection parameters. If Interactive SQL cannot connect, you are presented with a window where you can enter the connection parameters. See Connection parameters. -d delimiter Specify a command delimiter. Quotation marks around the delimiter are optional, but are required when the command shell itself interprets the delimiter in some special way. This option overrides the setting of the command_delimiter option. See command_delimiter option [Interactive SQL]. -d1 Echoes all statements explicitly executed by the user to the command window (STDOUT). This can provide useful feedback for debugging SQL scripts, or when Interactive SQL is processing a long SQL script. (The final character is a number 1, not a lowercase L). This option is only available when you run Interactive SQL as a command line program. -datasource DSN-name Specifies an ODBC data source to connect to. -f filename Opens (but does not run) in the SQL Statements pane the file called filename. If the -f option is given, the -c option is ignored; that is, no connection is made to the database. The file name can be enclosed in quotation marks, and must be enclosed in quotation marks if the file name contains a space. If the file does not exist, or if it is really a directory instead of a file, Interactive SQL prints an error message and then quits. If the file name does not include a full drive and path specification, it is assumed to be relative to the current directory. This option is only supported when Interactive SQL is run as a windowed application. -host hostname Specifies the hostname or IP address of the computer on which the database server is running. You can use the name localhost to represent the current computer. Runs Interactive SQL in a command-prompt mode, with no windowed user interface. This is useful for batch operations. If you specify either dbisql-command or command-file, then -nogui is assumed. In this mode, Interactive SQL sets the program exit code to indicate success or failure. On Windows operating systems, the environment variable ERRORLEVEL is set to the program exit code. See Software component exit codes. -onerror { continue | exit } Controls what happens if an error is encountered while reading statements from a command file. This option overrides the on_error setting. It is useful when using Interactive SQL in batch operations. See on_error option [Interactive SQL]. -port port-number Specifies the port number on which the database server is running. The default port number for SQL Anywhere is 2638. Suppresses output messages. This is useful only if you start Interactive SQL with a command or command file. Specifying this option does not suppress error messages, but it does suppress the following: • warnings and other non-fatal messages • the printing of result sets Specifies that UltraLite databases are the default. Interactive SQL customizes the options available to you depending on the type of database you are connected to. By default, Interactive SQL assumes that you are connecting to SQL Anywhere databases. When you specify the -ul option, the default changes to UltraLite databases. Regardless of the type of database set as the default, you can connect to either SQL Anywhere or UltraLite databases by choosing the database type from the dropdown list on the Connect window. For more information about connecting to UltraLite databases from Interactive SQL, see Interactive SQL utility for UltraLite (dbisql). Displays the version number of Interactive SQL. You can also view the version number from within Interactive SQL; from the Help menu, choose About Interactive SQL. Scans commands but does not execute them. This is useful for checking long command files for syntax errors. For detailed descriptions of SQL statements and Interactive SQL commands, see SQL language elements. Interactive SQL allows you to browse the database, execute SQL commands, and run command files. It also provides feedback about the number of rows affected, the time required for each command, the execution plan of queries, and any error messages. You can connect to both SQL Anywhere and UltraLite databases. Interactive SQL is supported on Windows, Solaris, Linux, and Mac OS X. If dbisql-command is specified, Interactive SQL executes the command. You can also specify a command file name. If no dbisql-command or command-file argument is specified, Interactive SQL enters interactive mode, where you can type a command into a command window. You can start Interactive SQL in the following ways: You can specify a code page to use when reading or writing files using the ENCODING clause of the INPUT, OUTPUT, or READ statement. For example, on an English Windows XP computer, windowed programs use the 1252 (ANSI) code page. If you want Interactive SQL to read a file named status.txt created using the 297 (IBM France) code page, use the following statement: The default code page for Interactive SQL can also be set using the default_isql_encoding option. See: Exit codes are 0 (success) or non-zero (failure). Non-zero exit codes are set only when you run Interactive SQL in batch mode (with a command line that contains a SQL statement or the name of a script file). See Software component exit codes. When executing a reload.sql file with Interactive SQL, you must specify the encryption key as a parameter. If you do not provide the key in the READ statement, Interactive SQL prompts for the key. See also The following command runs the command file mycom.sql against the current default server, using the user ID DBA and the password sql. If there is an error in the command file, the process shuts down. dbisql -c "UID=DBA;PWD=sql" -onerror exit mycom.sql The following command adds a user to the current default database: dbisql -c "UID=DBA;PWD=sql" CREATE USER joe IDENTIFIED passwd
global_01_local_2_shard_00001658_processed.jsonl/17597
Disconet was the first (or one of the first ) remix service started in 1977. It ended in 1989. All the records were numberd with a stamp see scan below.They were pressed in a limited quantity. Here is a sign in form from 1984 from the netherlands. This was the first issue Volume 1,Number 1 This was the last issue Volume 11 Program 13: In 1978 they also started with medley's of artists: The first medley was issued in 1978 as Volume 1 Number 7 called AUTOMATION 77-Top Tune/1977 Medley.  It contains the following songs:Sassy -Theme From Disco 77 , Barry White -It's Ecstacy, Odyssey -Native New Yorker, Richie Family-Quiet Village,FirstChoice-Dr. Love,Celi Bee-Superman,Andrea True-NY You Got Me Dancing,Marvin Gaye -Got To Give It Up,Mike Theodore Orch-Cosmic Wind,Chic-Dance Dance Dance,Vickie Sue Robinson-Hold Tight,Hues Corp. -I Caught Your Act, CJ & Co.-Devil's Gun,Space -Carry On Turn Me On,Kebekelektrik -Magic Fly,Cerrone-Love In C Minor,Carrie Lucas-I Gotta Keep Dancin', Grace Jones -I Need A Man,The Trammps-Disco Inferno,Salsoul Orch -Magic Bird Of Fire. Each recordset had a card were the DJ could give the rating of the songs on that set. After returning the card the DJ could win a LCD chronograph(watch). Here is a scan of a card: Here are some pictures of the building were Disconet was situated: (Taken in the last year they exist). Some add's in disco magazines. Add in disco magazine Card attached to set (Volume 1 no. 12) Two issues with remixes/medley from big disco hits. Mike Wilkinson at a presentation.
global_01_local_2_shard_00001658_processed.jsonl/17624
Tuesday, October 30, 2007 lipstick has lead When you're shopping for lipstick, you shouldn't have to cross your fingers and hope you get something good. An October report by the Campaign for Safe Cosmetics, of which EWG is a founding member, found lead in 61% of the 33 top-brand lipsticks tested -- including L'Oreal, Cover Girl, and Christian Dior. Lead is linked to learning and behavioral problems, but alarmingly, FDA doesn't regulate it in cosmetics. No comments:
global_01_local_2_shard_00001658_processed.jsonl/17625
Thursday, November 3, 2016 1⁄4 x 100 years old Yes, yes, I have turned 25 years old! ( ´ ▽ ` ).。o♡ 2016 is probably the year I most look forward to having my birthday celebrated. It's because my birthday happens to fall on a long weekend and I would be in the capital. Being in the capital always means I can meet my relatives and also my friends. So, Jo (my wingman) and I had agreed to meet up, as usual. We first went to Gindaco to eat the limited-time squid ink takoyaki. It was amazing! We headed out to have our meal at a Japanese restaurant and proceeded to have our Starbucks right after lol and before we went back, we went to grab some delicacies at Papa Beard's. Thanks, Jo! \(^∀^)メ(^∀^)ノ And had dinner with my relatives at night. I felt happy because I got to hangout with both family and friends on the same day. We then went out again, and my aunt told me to pick a cake. Honestly speaking, I don't even remember when was the last time someone told me to choose a cake that I like. I don't remember having many people celebrating my birthday. I had my own awkward moment of silent when the song was being sung. Thank you all, I love you all! (≧◡≦) ♡ And my own present to myself. The cutest toes ever! o(≧▽≦)o I wish I had more time with everyone. No comments:
global_01_local_2_shard_00001658_processed.jsonl/17628
Monday, November 14, 2011 Watch That Language ACT is based on the notion that language (story) can help us move toward AND language can get us stuck. One way to think of this is that we all have lots of stories we tell ourselves. Some of these stories are very short. For example, you might think, "I can't do anything right, I'm worthless." That's a little story. You might also think, "I'm really good at doing stuff like this!" Again, a little story. Both of those stories carry a bit (or a lot) of hook, and either can be followed by a toward or an away move. From and ACT - the Matrix point of view you might notice the story, notice the hook, and the next move, Toward or Away. Be Well, Psychological Flexibility Training No comments:
global_01_local_2_shard_00001658_processed.jsonl/17656
Types of Editors Editing is the process of selecting and preparing languages, images, sounds, videos, or movies by the correction process, condensation, organization, and other modifications in various media. To some extent, the editing process begins with the idea for the work itself, and continues up to the relationship between the author and editor. The issue is, therefore, also a practice that includes creative skills, human relations, and a specific set of methods. Print Media There are various editorial positions in publishing. Typically, one finds junior editorial aid report to the editorial staff of senior-level managers, who report to senior editors. The senior editors are responsible for developing a product to its final release. More publication is little more, where these roles run together. In particular, the substantive editor and copy editor often overlap: the fact-checking and editing can be the responsibility of one or the other. The Copy editors correct spelling, grammar, and subjects of the model house. Newspapers and news agencies also write the titles and work on more-substantive issues, such as accuracy, fairness and taste. In some positions, they design pages and select items for inclusion. For UK and Australian newspapers, the limit is “editor. They can choose the layout of the publication and contact the editor – printing and production. This and similar jobs are also assigned to such an editor, who is also called the “layout editor,” editor of design, “developer news,” or “makeup editor. ” The editors of the newspaper in mid-level often come and help to control sections, such as business, sports and features. As per Newspapers in the United States, the level below the top editor is usually the Chief Editor. The title of the top editor to many publications can be called an “editor-in-chief,” the executive editor “or just” writer. “The frequent contributors as estimated at a store may acquire a title of editor at-large or contributing editor (see below). In the book publishing industry, editors organize anthologies and other compilations, definitive editions of the work product of a classical author (editor scientist “), and organize and manage contributions to a multi-book -author (editor or editor of symposium volume). The conclusion of marketable ideas and presenting them to the competent authors are the responsibilities of an editor sponsor. Obtaining a copy or recruiting authors are the responsibilities of an acquisitions editor or editor of commission for a publishing house. Improving the writing of an author is what they say; and in effect, what they mean to say is effectively a substantive issue. Depending on the competence of the author, who publishes this, it can sometimes turn into ghostwriting. The substantive issue is seldom a title. Many types of editors do this kind of work internally, to an editor or on a freelance basis. Changes in the publishing industry since the 80s have resulted in almost any editing copy for book manuscripts being outsourced to independent work of copywriters. Light Edits, heavy edits, and derivative works A “light edit” otherwise known as “minor changes”, may be considered the changes that do not substantively change the theme, typefacing, tone, structure, characters, or other intellectual property that are required by author. Such changes would include spelling or grammar in a way that does not deviate from the author’s use of grammar or models such as non-standard speech. A “heavy editing” can substantively change the tone, structure, characters, or other intellectual property contained in the work.
global_01_local_2_shard_00001658_processed.jsonl/17691
20 June, 2007 Ensembl Update, June 2007 The latest update of the Ensembl Genome Brower and associated databases occurred 13 June, 2007 (release 45). This release was coordinated with the publication of the ENCODE project in the journal Nature. The first stage of this project focused on an in-depth view of 1% of the genome, contributing to a set of regulatory features that has now been incorporated into Ensembl, accessible in ContigView. BioMart 0.6 has just been released, including an improved layout and response times for result viewing. In addition, the query can be exported in Perl API format via the new 'Perl' button. Those are the major updates at this time.
global_01_local_2_shard_00001658_processed.jsonl/17692
Official Acadamic Transcript Your official academic transcript from your university lists all the subjects that you have taken in the colleges and your marks earned in the semester. These are 'official' ones since they will be issued by your university.Transcrcipts are nothing but the official copies of marks lists you have received at the end of the semester. You need to submit transcripts from all schools/universities you attended. ( 10th standard, +2, and B.E/ etc). How to get Transcripts from your univeversity? You can request your transcripts at the university's registar office. You need a fill a specified form by your university and submit it to university with the required amount. Some universities require that you need to forward this from on the behalf of your college. Different universities in Pakistan had diffrent approaches to issue transcripts. How universities prepare your transcripts? • They will make color xerox or copy of your marksheet. • Transcripts will have official signature of universities registar and university stamps. • Transcripts will be closed in an envelop. • Envelopes will be sealed and will have university stamp on it. Transcripts from your High School For 10th standard and +2 transcripts you can get copy of the original certificates and get them attested/notarised from your schools. Cost to apply for transcripts Each university will have different pricing for transcripts. Universities will charge 200 rupess to 1000 rupees for each transcript. Suppose, you are applying to 1 university and now you are in final year first semeter. By this time you will have 6 transcripts. and Let us assume that each transcript will cost Rs. 100. • Cost of 1 transcript: Rs. 100 • Cost of 6 transcripts: 100 x 6 = 600 so, one set of transcript costs 600 Rs. If the university you are applying requires 2 sets of transcripts you need to request 2 sets from your university which would cosr 600 x 2 = 1200. How many sets of transcripts? Most of the universities ask you for 2 sets where as few univs ask for 1 set. How to Send Transcripts to US Schools? In general, you can get transcripts from your undergrad university and post it to American College. Few american colleges exepect the offical transcripts to be sent directly from your university. Video Lessons and 10 Fully Explained Grand Tests
global_01_local_2_shard_00001658_processed.jsonl/17702
Skip to main content Showing posts from September, 2014 Heroic Measures I'm reading The Geography of Bliss, a nonfiction account of a curious and somewhat discontented journalist who decides to hunt out who the most happy people are and why. On his search, he visits Bhutan and meets a man who runs the country's think tank, appropriately named Karma. Karma advises the author, "You need to think about death for five minutes every day. It will cure you, sanitize you....It is this thing, this fear of death, this fear of dying before we have accomplished what we want or seen our children grow. This is what is troubling you....Rich people in the West, they have not touched dead bodies, fresh wounds, rotten things. This is a problem. This is the human condition. We have to be ready for the moment we cease to exist." But I touch dead bodies, handle fresh wounds (both physical and mental), and rotten things. I, and my fellow emergency department coworkers bear the brunt and weight of the rancid realities of life and death and what happens in betw…
global_01_local_2_shard_00001658_processed.jsonl/17705
What flowers looked like 100 million years ago Wednesday, August 2, 2017 - 09:22 in Paleontology & Archaeology Flowering plants with at least 300,000 species are by far the most diverse group of plants on Earth. They include almost all the species used by people for food, medicine, and many other purposes. However, flowering plants arose only about 140 million years ago, quite late in the evolution of plants, toward the end of the age of the dinosaurs, but since then have diversified spectacularly. No one knows exactly how this happened, and the origin and early evolution of flowering plants and especially their flowers still remains one of the biggest enigmas in biology, almost 140 years after Charles Darwin called their rapid rise in the Cretaceous "an abominable mystery". Read the whole article on Science Daily More from Science Daily Latest Science Newsletter Check out our next project, Biology.Net
global_01_local_2_shard_00001658_processed.jsonl/17721
Monday, February 11, 2013 Imagining letters on parchment - Minuscule 2412 1. Hmm. This reminds me a little of the strange case of the Tarragona Palimpsest. (Did anyone, I wonder, ever bother to throw an ultraviolet light on that, just in case Buchanan wasn't imagining moon-runes? Yours in Christ, James Snapp, Jr. 2. This kind of stuff can keep you up late at night and invade your dreams. I detect an illness, ye may have. Your sample image does seem to have something there, perhaps a trip to Chicago will resolve the wonder, or as Snapp suggested, different light wavelengths. Keep us posted Dirk! Gary Dykes
global_01_local_2_shard_00001658_processed.jsonl/17731
Wednesday, March 27, 2013 KISS: Fallout: New Vegas Keep ISimple, Stupid: A concise analysis of Fallout: New Vegas Fallout New Vegas should be the norm for games. It is not. It is the apex. That's a rough statement to make. FO:NV is by no means perfect - it's hitched to the absolutely horrendous engine of Fallout 3, and there's certainly some holes and weaknesses in its writing. Personally, I could've done with a less clear split between the NCR and the Legion from a moral choice standpoint. But let me say first what Fallout New Vegas does extremely well that many games skimp on or even don't bother with. Fallout New Vegas creates a detailed setting. Fallout New Vegas creates a plausible scenario. Fallout New Vegas allows the player to interact with the setting and scenario. Three little things. Three little things that make all the difference. Games are an interactive medium. It is their nature. It is why they are "games" and not "movies". Games tend to forget this, perhaps because it's harder to make a game interactive, or perhaps because they desire to emulate movies and gain some measure of their respectability. But games are games. Games are interactive. Games have a player, and the player does things. Do the things matter? It depends. In Fallout New Vegas, the answer is "yes". In very simple ways, too, not big complex ones. Hell, I could probably make something akin to New Vegas just using the Neverwinter Nights module designer. There's factions whose opinion of you is influenced by your actions. There's quests. There's multiple story paths. The world is "functional" and "open", rather than being a super-scripted set of corridors. It's not super-unique programming, it's just normal design for an RPG. But it's also one of the only games that's bothered to do it. I can name maybe a few others off the top of my head. "Mercenaries" and "Way of the Samurai" are the main ones that spring to mind. Games where the traditional mission-based open-world setup is broken up by the possibility of having different allegiances and causing different things to happen. The possibility of gameplay having an effect on the way those allegiances turn. The idea of a game being actually interactive. The work put in to make the world feel "real" and "tangible" rather than being a playground or "video game level". Little things. Little things that make the player feel like they're doing something and not just being carted along a theme park ride. Compare FO3 to FO:NV and you'll see that apart from the totally questionable handling of the setting and tone, the biggest difference is that FO3 is a single story with minor variations, and FO:NV is about a culminating event where the protagonist can be on one of many different sides. And that's it, really. FO:NV gives you a scenario and lets you approach it. FO3 drags you by the hand to a console with three buttons on it and demands you press one. It's almost grudging about it, too, like it wouldn't bother but it feels obligated to do it. And I'm not sure that's the kind of thing we should accept in an interactive medium, especially from a game that brands itself as a "roleplaying" game. Frankly, that's all I have to say about that. Tuesday, March 19, 2013 "Aliens", "TWD", and a lesson on Tone. There's a part in the director's commentary for "Aliens" that really stuck with me. In it, James Cameron explains how, in his opinion, Aliens works well on an emotional and storytelling level because it stays consistent. There are changes in mood, yes, but the tone of the work is absolutely consistent. The movie feels like an enclosed reality, where people are afraid for their own well-being rather than making cheeky asides to the camera or throwing off one-liners. The movie depicts an intensely dangerous situation and you can feel this rather than simply being told it. People live and die in ways that make sense - death is sudden and harsh, while struggling to survive takes a huge amount of effort and resistance. Every battle is important, and every conflict can lead to another survivor being picked off. With that said, I'd like to call attention to two games. The first is Telltale Games' "The Walking Dead", an episodic adventure game following a group of survivors as they attempt to escape from a zombie-infested Georgia. The second is Gearbox's "Aliens: Colonial Marines", a run-and-gun action game where a heavily armored protagonist and his invincible AI buddies shoot their way through corridors full of aliens and even other human beings. These two games represent two opposite sides of a spectrum: on the one hand, a game focused very heavily on social interaction and decision-making, and on the other hand, a largely brainless shooter with almost no real interactivity. Between the two, Colonial Marines is actually the more "serious" (read: melodramatic) game. While there's a few distasteful quips here and there, the entire story consists of people getting angry and shouty and grim. This is contradictory with the game's actual gameplay, where the protagonists are in no real danger. The opposite of this would be a game like "Uncharted", where the protagonists are constantly laughing and joking despite being engaged in life-threatening adventures where they are literally killing hundreds of people. Both of these tones are inconsistent with a single reality, but rather reflect a warped reality that exists most commonly in videogames. By contrast, TWD has moods that are appropriate to the situation - some scenes are cute and heartwarming, others are scary, still others are moving and sad. Despite this, it's a far more serious game, because all of these exist as realistic mood changes in a single consistent reality. The zombies never really "go away" - there is no point where they truly act like they're not there anymore. But there are certain periods of levity and lightness even in the face of tragedy, just like there are in real life. Their jokes carry the weight of their situation, rather than being entirely separate from it. The main accomplishment of TWD is that it is a game where social interaction and interpersonal relationship are actually a huge part of the game rather than a goofy little sideshow to the shooting/stabbing. It does this through a mostly brute-force method, individually creating scenes and then linking them together with an if-then relationship. While the amount of work necessary to create this scenario makes it difficult to expect as a mainstream gaming concept, it should still be appreciated when it exists. The fact of the matter is that TWD, along with its spiritual predecessor Heavy Rain, masks its weaknesses by making the player afraid of making mistakes at all times. Not all failed QTEs lead to bad results, but the player doesn't know which ones are acceptable to fail and which ones aren't. TWD takes it a step further than Heavy Rain by having some failures affect the way characters think of you even if they don't die. Like Aliens, TWD is a small-cast survival scenario, and the gameplay actually reflects this rather than keeping it separate as a cutscene. If there was going to be an Aliens game - I mean an actual "Aliens" game, a game version of the movie Aliens - which of these games do you think it would resemble? For clarity's sake, I'll make two comparative lists. Things That TWD Has In Common With Aliens - Centered around a group of survivors attempting to hole up against a relentless horde of hostiles. - Focuses more on social dynamics and interactions than direct action. - Weapons and ammo are tools for survival, and rationing their use is incredibly important. - Maintenance of a consistent theme, tone, and reality even as the mood darkens and brightens. - When action does take place, it is highly likely that a character will die during the course of it. - One of the characters is a young girl whose parents are killed and who is adopted by the main character. - There is a slight focus on "family dynamics" to create a new home (and hope) for the young girl. Things That CM Has In Common With Aliens - It's the same setting. - A lot of the sounds are reused. - Hicks is in it. - yeop Sunday, March 17, 2013 KISS: "Metal Gear Solid 4: Guns of the Patriots" Keep It Simple, Stupid: A Concise Analysis of Metal Gear Solid 4: Guns of the Patriots The setting of Metal Gear Solid 4 depicts a world where the battlefield is under total control, and war is a commodity. The income gained by war serves as a major pillar of the First World Economy, with even countries like the US and Great Britain being largely dependent on it. Wars are fought not for ideology or nationalism or even ethnicity, but instead are simply ordered by private companies to continue a string of proxy conflicts and keep the so-called "war economy" rolling. Nanomachines are used to connect soldiers to a control network, preventing them from experiencing fear, doubt, remorse or even pain, and essentially turning the entire experience into a video game. This entire arrangement is the master plan of an AI system known as "The Patriots", which plans to control society through automated censorship and control. The concept is explained in further detail in this briefing. There are several glaring issues with this scenario. Firstly, despite the ostensible nature of warfare in the MGS4 world, the conflicts seen in the game (an ethnic conflict in the Middle East, a governmental clash in South America, and a rebellion in Eastern Europe) are all based on classical grounds rather than being two PMCs fighting for no other reason than "they were told to". Despite the opening narration focusing on how meaningless and purposeless these wars are, every war depicted in the game has a "classic" reason for it, of the kind that is supposed to be obsolete. This is not only problematic in its own right, but also connects to the other two issues. Secondly, the "War Economy" exists apparently just to connect the entire first world population to warmongering. Rather than simply saying "the military-industrial complex is intentionally starting wars for their own profit" or something along those lines, the game suggests that the entire first world is wholly dependent on war as a factor for economics. This concept violates the basic tenets of the Broken Window Fallacy. In short, "war as a business" only controls the entire economy if there is enough money coming into make up for everything else being spent on war. In our existing economy, private contractors are paid by governments. The question is "who is buying the services of these PMCs, and where are they getting the money and/or resources to do so?" While mercenary service can boost one country's economy (Switzerland managed to pull this off in the Renaissance), the idea of suspending the entire first world economy on income from the third world seems suspect. Thirdly - and this is something brought up in both MGS4 and Metal Gear Rising - the relation between this state of affairs and the plans of the Patriot AI System are extremely unclear. In MGS2 the goal of the Patriots is to censor and control world politics, keeping them as docile and controlled as possible. Despite this, MGS4 depicts a war erupting into constant warfare (again, not just proxy wars but actual civil wars and conflicts). In both MGS4 and MGR, the characters simply conclude that the Patriots AIs must have gone "off the rails" from their creators' original intentions. To me, this isn't enough to justify a totally inexplicable state of affairs, especially when those same AIs had a clear (and contradictory) plan in MGS2. To be perfectly fair there are plenty of neat and interesting things about MGS4, especially in a sci-fi "what if" sense. For example, in MGS4 the rise of private armies means that sleek corporate advertising and appeals to thrillseeking (or escaping from poverty) have replaced duty and patriotism as the primary motivators for recruitment. This, almost unbelievably, serves as actual commentary on the practices used by actual recruiters today, as well as a critical look at an amoral corporate culture. This scenario could be further compounded by the SOP system, which releases chemicals into the bloodstream that control emotions like fear and remorse, and reward soldiers for killing enemy combatants. In essence, the "thrill" of war is sharply increased, serving as an outlet for a huge amount of masculine cultural output - again, a point where commentary on society could quite easily have been made. The SOP system essentially turns war into a videogame, a metaphor made repeatedly during the course of MGS4 but never really acted upon despite numerous opportunities. We never see the world through the eyes of the PMCs, or talk to them as people. Instead, they are video game enemies just like every other set of video game enemies, with no characterization or humanization. Even a scene as simple as seeing unmasked PMCs relaxing in a camp (perhaps playing video games in their spare time?) could have helped with this. Instead, there is nothing. Even the basic idea of SOP "makes sense" from a story perspective - after all, the Patriots want to control everything, and exercising complete control over the US Army (down to the individual soldier) makes complete sense. However, it mostly comes into conflict with the existence and proliferation of PMCs, which is also part of their plan despite running entirely contradictory to it. The idea of controlling PMCs with the System makes sense, since it would serve as a failsafe, but the necessity of the PMCs does not. There are two axes that MGS4 must be judged on. The first is whether or not it made sense as a story, and that is the root of my criticisms. The second is whether or not it teaches lessons that are applicable to reality, and that is the root of my suggestions. The first deals with whether or not MGS4 had a good setting, and the second deals with whether or not MGS4 teaches lessons or has any artistic value. I'm sure there are many individual keen to say that they felt MGS4 was incredibly moving and emotional, but before those people show up I'd like to note something. The second aspect - the idea of learning from MGS4's setting - isn't some sideshow. It's not some strawman I'm setting up in order to make gamers look like uneducated nerds eager to grasp at any signs of legitimacy.  A huge number of reviewers and gamers thought that MGS4 was legitimately insightful, in most cases because they didn't know that much about PMCs themselves. Like SpecOps, MGS4 represents a false savior for many - it failed to teach them reality, but convinced them that they knew what reality was. I think this represents more clearly than anything why I am so leery of the idea of games being treated like art, and the sort of community that endorses it while stifling criticism and analysis. Saturday, March 16, 2013 KISS: "Spec Ops: The Line" Keep ISimple, Stupid: A concise analysis of Spec Ops: The Line "Spec Ops: The Line" is a third-person exercise in ludonarrative dissonance - which is to say, a third-person regen-health cover shooter - created by Yager Development and 2K Games. It attempts to "subvert" the "tropes" found in existing regen-health cover shooters despite those games almost all attempting to do the same thing, resulting in a round robin tournament finale where the loser will be declared the boring straight man that all the others are making fun of (spoiler: It's Medal of Honor). One of the most notable and cited scenes of "Spec Ops: The Line" is the White Phosphorous scene. This scene depicts a scenario in which the protagonist, while burning enemies alive to death with 84mm incendiary rounds fired from a mortar, accidentally (air quotes) kills some civilians. The player is shocked and surprised to learn that they have killed civilians despite the civilians in question being visibly unarmed and not engaged in combat. From this, gamers learned several valuable lessons. Well, one valuable lesson. 1) Sometimes when you are shooting at people, the people are civilians and shooting them is bad. One might assume that the basic concept of not shooting unarmed people would be simple enough, but apparently Spec Ops: The Line was a daring piece for breaching this otherwise untouched subject. Perhaps in the future of gaming we can potentially address even more controversial subjects, like "White Phosphorous is technically banned by the Geneva Convention anyways" and "soldiers are actually people so maybe don't kill them all either, especially if they surrender or something". While many gamers are still reeling from this incredible revelation, it's worth discussing the ways in which other games have discussed similar subject matter with a bit more aplomb. Call of Duty 4, one of the games that Spec Ops is supposedly subverting, makes it very clear in its equivalent gameplay segment that civilians are not to be targeted. While it could easily be possible to make commentary on the joy that the player is meant to feel by exploding hundreds of enemy soldiers from an invulnerable gunship a mile in the sky, Spec Ops declines to challenge this aspect but instead focuses on the fact that you might be killing civilians. In CoD4, the few civilians in this segment are noted by the fact that they are neither carrying nor shooting weapons, a nuance that apparently escaped Spec Ops' target audience. Full Spectrum Warrior is a tactics-based game where the player commands one squad composed of two US Army fire teams. In this game, the player does not directly control the soldiers' guns, but rather assigns zones of engagement. The civilians in this game exist in normal gameplay, and unless the player is quick to stop them, soldiers may engage enemies when civilians are in the way. This kills the civilian. Going by the testimony of actual US military personnel, this is far closer to the reality of civilian death in war than Spec Ops' scenario. ARMA 2 devises similar scenarios - civilians inhabit towns during regular gameplay, and will often be caught up in battles between factions. The high usage of explosives and artillery in this game makes an even more direct statement than FSW, as entire areas will sometimes be targeted for artillery or mortar attacks by individuals incapable of judging the presence of civilians. Contrasted against the direct thermal visuals of Spec Ops' scenario, it's much more reflective of the haze of war. This is compounded by the multiplayer mode in which one side consists of guerillas posing as civilians, a scenario much more in line with the reality of the insurgency in Iraq. Metal Gear Solid and Rainbow Six even go so far as to say that maybe even killing hostile soldiers is bad - MGS offers non-lethal alternatives such as tranq darts or stealthy avoidance, while Rainbow Six sees some enemies surrendering and offering themselves up for capture.While simplistic, these measures humanize enemies and make the choice of killing or not killing them more meaningful, whereas the always-hostile, always-angry enemies of Spec Ops and similar shooters cannot really be treated like humans from a moral standpoint. Killing is wrong and bad. This is a lesson that gamers actually had trouble learning and needed help to internalize. Despite this, they seem to still think of themselves as being intellectuals. This is itself a mystery. Monday, March 11, 2013 "You'll Want To Protect The New Lara Croft" Tomb Raider is a 2013 release, re-inventing a classic adventure series with a grittier, more survival-based mood. It depicts heroine Lara Croft as a younger, more inexperienced, more vulnerable character and details her transition from a "normal" girl to a hardened killer as depicted in later games. Through the game we see aspects of her character that we took for granted in previous games explored from a more human element, giving them extra weight and allowing for the kind of character development that prior games sorely lacked. All of this is fucking bullshit. Tomb Raider 2013 is a change, yes. It is a transition from one genre to another: a transition from "action-adventure" to "action-survival". Which is to say, a transition from a genre where female protagonists are incredibly rare to one where they're actually really common. Here is a list of survival-horror games that have female protagonists: - Silent Hill (3 only) - Fatal Frame (series) - Resident Evil (series) - Clock Tower (series) - Parasite Eve (series) - Haunting Ground Now compare that to the list of action-adventure games with female player-characters: - Tomb Raider - Metroid - Beyond Good & Evil The difference between the genres is pretty clear. Women are "allowed" to be in survival horror games (not exclusively, but in a far more balanced ratio than any other genre) for the same reason women are "allowed" to be the leads in Slasher flicks - because it's part of the appeal. One could give a reason like "men have natural survival instincts to protect women", but if that was the only reason you wouldn't get detailed gruesome deaths combined with fanservice (Haunting Ground especially was absolutely HEINOUS for this). Action-adventure games have a certain dignity to them, a certain empowerment. Protagonists in action-adventure games do not die horrendous, upsetting deaths. They get shot a few times and their ragdoll kicks in and that's it. They do not get impaled. They do not get assaulted. Their corpses are not lovingly panned over once the deed is done. The question is, why did Tomb Raider "need" redefining? Why did it need reinventing? Look at that list again. Of those three franchises, "Metroid" fucked everything up with Samus' characterization in Other M, and BG&E is a neglected afterthought that the game industry only keeps around to point to when people say there's no female protagonists. So what was so bad about Tomb Raider being a fairly normal action-adventure game, akin to Uncharted or Metal Gear in terms of tone? I can't say what that is on my own. But anyone who remembers the initial E3 debacle remembers things like a PR executive mentioning "rape", or the exaggerated ways in which Lara squealed and cried (rather than grunting and yelling like an actual woman in danger would). Things that make it seem less like "this is just a serious action game" and more like "there's something really creepy going on here". Yes, they eventually brought in Rhianna Pratchett to write the game based on her writing on games like "Overlord" and "Heavenly Sword", but that doesn't exactly match the tone they were going for, does it? So maybe I don't know EXACTLY why Tomb Raider 2013 is a grim, serious reboot where Lara is constantly soaked in blood and afraid for her life. Maybe I don't know for certain that it's some creepy kind of sexualization designed to replace the overt form present in previous games (and who can really say that it was worse compared to what's essentially gore-porn?) Maybe I can't cite exact quotes from the dev team apart from all the ones made at E3 that they hurriedly rescinded. Maybe I don't know this shit. But here's what I do know: they took a female protagonist out of a genre where she was one of the few representatives of her sex. Then they put her into a genre where women are incredibly common and sexualized despite being horrifying and gory. They put her into the same genre as THIS FUCKING BULLSHIT. They reduced her agency and capability, ostensibly for the sake of  telling a more realistic story. But that hasn't happened to a male character, has it. That hasn't happened to Nathan Drake. That wouldn't happen to Indiana Jones. No, he's fine. He's cool. Everything's cool.
global_01_local_2_shard_00001658_processed.jsonl/17738
Sunday, September 4, 2016 Methodology Extension from Stereolithography (SLA) to Selective Laser Melting (SLM)      An initial study of SLM experimental data demonstrates that our prescriptive modeling methodology can be extended to metal based additive manufacturing processes.    Based on four simple test shapes, we can predict the in-plane deformation profile of a freeform shape. Below is the predicted deformation (in solid line) comparing with CMM measurement (red dots). This is a joint study with Prof. Colosimo and Prof. Grasso at Politecnico di Milano.                                       The plot was generated by PhD student Ms. HE Luan at USC.
global_01_local_2_shard_00001658_processed.jsonl/17745
Today, Google Project 0 has announced the disclosure of a powerful WiFi Chip exploit that exploits a vulnerability of type Buffer Overflow in the Broadcom chip present on some of the Apple devices. Apple has confirmed and patched the vulnerability in iOS 11. You can actually find the security contents of the iOS 11 where Apple claims to have fixed the vulnerabilities pointed out by Gal Beniamini of Google Project 0.  The vulnerability is a pretty serious one and all 64-Bit devices seem to be affected judging by Apple's security contents page where they claim the vulnerability was present on iPhone 5S and newer, iPad Air and later, and iPod touch 6th generation. According to Apple, "An attacker within range may be able to execute arbitrary code on the Wi-Fi chip". In details, an attacker within range that has access to your MAC address, can take advantage of the vulnerability and run arbitrary code on your WiFi Chip. Considering that your MAC address is broadcasted as part of the normal networking, the vulnerability is a pretty serious one, especially since a lot of people are connecting to unsecured WiFi hotspots, such as Internet Cafes, Coffee shops and public WiFi. Your MAC address is usually sent only to the gateways in your network, but once you're on a public WiFi, this becomes accessible to that specific gateway, which god knows who is operating it. According to Beniamini, he was able to use this exploit to create a backdoor on the WiFi Chip to read and write data to and from it. Although he tested on iOS 10.2, he believes iOS 10.x up to 10.3.3 versions are affected. Since the exploit has been fixed in iOS 11, I advise anyone who is not waiting for a jailbreak, to update to iOS 11. It might be a bit buggier, but this WiFi exploit is pretty serious, and I am pretty sure it is hard to tell when someone uses this on your device. As for those who are patiently waiting on iOS 10.x for a jailbreak, pay attention what you install / access, and don't ever connect to untrusted networks, especially those on the coffee shops. ▽ Resources ▽ Google Project 0's Exploit iOS 11 Security Content iOS 11 Full Review iOS 11 Best Cydia Alternative (App Valley) For ++ Apps UPDATED Protect yourself from Jailbreak Scams About GeoSn0w
global_01_local_2_shard_00001658_processed.jsonl/17768
Category Archives : The orchard project. The polyculture orchard, part 1 5 In the early spring of 2015 my initial 350 rootstocks arrived, these are the primary trees that are forming my 5 acre polyculture orchard in cork, ireland. The primary tree crop in this orchard is apples but there are also pears, plums and cherries, these are the backbone of the system but there are many […]
global_01_local_2_shard_00001658_processed.jsonl/17772
there are so many things i am thankful for… and with thanksgiving approaching so quickly, it’s a good time to make a note of it. so here are the three things i am currently thankful for: – the good food (like this lavish dinner for myself at london’s nopi) in my life – amazing highlightsContinue reading
global_01_local_2_shard_00001658_processed.jsonl/17779
Design doc 2.0 (don't read) Moderator: Example suite forum moderator Post Reply User avatar Posts: 1114 Joined: 29 Jun 2015, 09:08 Design doc 2.0 (don't read) Post by DestinedToDie » 09 Apr 2017, 10:24 Design doc 1.0 was a pitch, but here I'm going to go into the more technical boring part with spoilers. This is mainly for developers who want to get an idea of where we're going with development. Whiteford. Mostly complete, just need interiors and maybe some dummies. Guard set. Peasant village. 1 house for all peasants + tavern. + interiors. Peasant clothes. Deadwood. Surrounding everything. A couple variations of trees rotated differently. Church. Interior + gravetomb + graveyard fence. Skeletons. Father. Those are all the areas we're going to do up until ES version 1.0. The idea is to take it small and continue to another area once we are fully done. We will have low standards for the first area so that we can more easily reach 1.0. Although it doesn't seem much, we also need player animations, misc objects for interiors, consumables, possibly creatures. I'm choosing to simply do the exteriors first, then work on other stuff later. The picking order will probably be: 1. Exteriors. 2. Player anim, creatures 3. Weapons, armor, clothing. 4. Consumables, items. 5. NPCing, quests. 6. Interiors (NPCs will stand outside before this) 7. Exterior polish, detailing. It is quite possible that we will not get land texture editing in OpenMW-CS on the way to ES 1.0. It is also very possible that we will not get snap to grid, which means interiors we make in the near future will be non-modular. This is a loosely lovecraftian story with humor. The player begins by falling down from the sky. It is not mentioned or noticed by anyone ingame, but there is actually an UFO high above the starting location and the player is an alien sent to earth to thwarth the plans of the old gods. Player will still act as a normal human tho. Praised by the fort wizard, the player is hailed as the hero of the prophecy by all peasants. When approaching the gate (which is railed) a guard will tell you that no peasants are allowed. If you choose to tell him that you are the hero, then the gate rail is raised (with a script that moves it). After meeting the master of the fort, he sends you off on a quest to pick up a very important mystery item in a tower. After picking up a completely mundane item, an antagonist forcegreets the player and asks if he's an errand boy. The player may deny it, but the antagonist asks "are you fetching the master's mundane item?" and the player's tongue is caught. Returning to the village, all of the peasants will no longer regard you as the hero, instead they call you the master's errand boy, argue that as you may. Even the wizard says that he read the stars wrong or something. Upon approaching the gate guard he tells you that no peasants are allowe-... oh wait, you're the master's errand boy. Go right ahead and finish your errand (script moves the gate railing). For your serving you are rewarded 2 gold coins as a reward and suggested that you could spend it in the tavern. If you go to the tavern then everyone laughs at you and won't take you seriously. You will also learn that they have all succumbed to Cthulhu or something and are going to soon kill every nonworshipper. They don't mind telling you this because they don't think you're even a threat, the father is the leader behind the coming attack. So you are prompted to go visit the church to see if it's true and the Father is an obvious deadie with white eyes and a dead man's breath pretending like he has no idea what you're talking about. Go visit the graveyard to find an entire army gearing up for an attack. When you return to Whiteford, nobody believes you on this except maybe the wizard. But it is already too late and the fort is attacked. Defend off the undead attack and you are hailed as the true hero once again and you even get a peasant girl. User avatar Posts: 3889 Joined: 29 Sep 2011, 10:13 Github profile: Re: Design doc 2.0 (don't read) Post by psi29a » 11 Apr 2017, 14:10 I like this, it is straight forward and to the point with just the right size to get started. In addition to this, it isn't on an Island! ;) Post Reply Who is online Users browsing this forum: No registered users and 1 guest
global_01_local_2_shard_00001658_processed.jsonl/17786
I'm testing out a map... The board for competitive Advance Wars battling. User avatar I'm testing out a map... Post by Kireato » Thu Sep 14, 2006 10:29 pm I'm Blue Moon in all of these games. AET and boot are set at 4 days. DS units aren't banned. (unecessary) Banned COs are:Colin, Grit, Hachi, Kanbei, Rachel, Sami, Sensei. Income is set at 1500/city. Name: Plain test 1 Password: 111 Name: Plain test 2 Password: 222 Special conditions: FOW, Sonja banned. Name: Plain test 3 Password: 333 Special conditions: random weather Name: Plain test 4 Password: plain pain Special conditions: join as Grit I think that's it. "Hey, it's the Kir. Wee." - Linkman 145 "I can't help myself sometimes... :cry:" -Help Topic Guest Who is online Users browsing this forum: Multivac [Bot] and 0 guests
global_01_local_2_shard_00001658_processed.jsonl/17791
Monday, November 29, 2010 Prepare for Fail Apparently the White House wants to freeze pay in a move based in teh stupid. Chris Bowers at Dkos: Freezing federal employee pay will mean a decline in real disposable income for millions, and that has never, ever led to a good electoral outcome for the incumbent party. If this proposal becomes law--and it almost certainly will--the Obama administration is throwing away hundreds of thousands of votes. And they are prominently taking credit for it, too. No good will come of this, neither for millions of working families on the receiving end of this pay freeze nor for an administration seeking re-election in 2012. As Bonddad has pointed out for the past year, Austerity will Completely Fail, so good luck with that! Maybe this is some super-dimensional eighteen level of chess that is way over my layman's head, but I cannot for the life of me grasp how this is a good idea. If it is a negotiating chip the GOP, they'll only foam at the mouth for more. If it's supposed to be a lesson to Wall St. they aren't paying attention. And if it's a lesson that the middle-class and poor need to suck it up and accept the rich run everything around us...well we already knew that. I didn't wake up from my turkey coma for this, damnit! I am Frank Chow and I approved this message No comments:
global_01_local_2_shard_00001658_processed.jsonl/17848
Tuesday, 22 December 2015 The Newsagents The Newsagents 7 x 11 inches Just because it's December and a bit too wet and blowy to stand outdoors and paint with watercolours, doesn't mean you can't do anything. Rain can be a little bit too much of a good thing for a watercolour unless you have some cover and the danger is you end up with all the paint on the floor and nothing on the paper. Sitting in a vehicle is a good option. You soon get used to the cramp, and anyway it's the painting that matters, but it's a good idea to keep it small. If you really find it too uncomfortable then make a number of pen or pencil sketches in a sketchbook adding in some idea of the tonal values, and even writing notes about the view in front of you and how you feel about it.. A back up photo can be useful. The figures in 'The Newsagents' weren't actually all there at the same time, but jotted down on a sketchbook page and placed where I hoped they would help to tell the story. All the information was then gathered together and painted at home. Grey days can be as interesting to paint as any other weather conditions.
global_01_local_2_shard_00001658_processed.jsonl/17871
The Happy Technologist Interesting Geekdom Data Ethics, Privacy, and Responsibility We've seen a lot of high profile data privacy and data leak issues in the news lately. And I'm sure the list could go on and on and on... Visualization and Data Topics Topics near and dear to my heart, largely because they keep me employed, absolutely include all things Data related. In particular, lately, Data Visualization has been a hot topic. We got to attend a presentation today by Frank van Ham about some IBM offerings in the Data Visualization space. IBM has some pretty cool things going on.  Sadly for us tinkerers, a lot of their cool stuff is either tied to expensive proprietary software, or simply way too complicated to just play around in your free hours with a random data set and a laptop.  Fortunately, Frank reminded me that there are a lot of tools out there, that can let you do just that sort of playing, and often with a tiny footprint and for free.  IBM, for example, runs Many Eyes, which is apparently now bearing their Cognos brand, and which allows you to play with a ton of cool visualizations without too much more than a web browser. Many Eyes isn't alone, though... right now I've got over a hundred decent sites tagged "visualization" over at Many Eyes is one of them; Protovis, Processing.js, Flare, and many others provide a rich playing field for starting with visualization. Some of these are tools, others are examples, but there's plenty to look through so you can gain inspiration or code snippets. Technology Makes me Happy! Except for the ocassional Stupid Technologist, technology makes me happy! Mostly data-related technology, and gizmos and gadgets. Filed under: Technology No Comments
global_01_local_2_shard_00001658_processed.jsonl/17889
Hawaii is the 8th-least extensive, the 11th-least populous, but the 13th-most densely populated of the 50 U.S. states. Hawaii's coastline is approximately 750 miles (1,210 km) long, which is fourth in the United States after Alaska, Florida, and California. Hawaii is one of two states that do not observe daylight saving time, the other beingArizona. Hawaii is also one of two states that are not in the Contiguous United States(CONUS), the other being Alaska.
global_01_local_2_shard_00001658_processed.jsonl/17904
Richard Dowden From Wikipedia, the free encyclopedia Jump to navigation Jump to search Richard Dowden at the World Economic Forum on Africa in 2012 Richard Dowden (born 20 March 1949[1] in Surrey, United Kingdom) is a British journalist who has specialised in African issues. Since 1975, he has worked for several British media and for the past eight years he has been the Executive Director of the Royal African Society. He is the author of the book Africa: Altered States, Ordinary Miracles (Portobello Books, 2008), which has a foreword by the Nigerian writer Chinua Achebe. Dowden lives and works in London. He first went to Africa in 1971 and worked as a volunteer teacher in a rural part of Uganda, until the end of 1972, when he left the country because of Idi Amin's dictatorship. In Dowden's words, in December 1972, "Amin declared all whites in our area to be spies who had uniforms and guns hidden in their houses. It was time to go".[2] On his return to Great Britain, Dowden worked for the Catholic Justice and Peace Commission, mainly in Northern Ireland, and turned to journalism in 1975, being made Editor of The Catholic Herald in 1976. After joining The Times foreign desk in 1980, he began to travel to Africa and the Middle East until 1986, when he was appointed Africa Editor at the newly-established newspaper The Independent. In 1995, he became Diplomatic Editor of The Independent, then moved to The Economist as Africa Editor. He has visited and written about almost every country in sub-Saharan Africa.[3] His articles and documentaries in recent years include: • "Chinua Achebe: A hero returns" (18 February 2009), BBC World Service • "Jacob Zuma – a question of competence, not conscience" (23 April 2009), The Sunday Times • "Britain should cease its one-sided support of Rwanda" (15 December 2008), The Independent • "Mugabe's power ploy – Zimbabwe's president is using talks with Morgan Tsvangirai to buy time while he prepares for war" (26 July 2008), The Guardian • "Condescension and ignorance are no help to Kenya – The West's patronising response to the recent events in Kenya betrays our lack of respect to a sophisticated continent" (6 June 2008). The Observer Africa: Altered States, Ordinary Miracles Published in 2008 by Portobello Books, Dowden's first book overviews African contemporary history from an autobiographical point of view, on a journey through the geography of the most troubled continent.[4] "On a more personal level, this is the story of Dowden's love for the continent."[4] As African Affairs, the top-ranked Africanist Journal[5] underlines, the book can be considered between an academic and a popular text, allowing the reader to become interested in the subject even if they are not Africa experts.[6] As Chinua Achebe explains on his foreword: "Africa is a vast continent, a continent of people, […]. In Africa: Altered States, Ordinary Miracles, it is clear that Richard Dowden understands this, and one could not ask for a more qualified author to explore Africa's complexity."[7] Royal African Society Executive Director From 2002 to 2017, he was Executive Director at the Royal African Society, an association founded in 1901 to promote relations and a better understanding between Africa and Great Britain. Dowden is on the Editorial Board of African Affairs, journal of the Royal African Society, and together with Alex de Waal coordinates African Arguments, a series of short books and a blog about Africa today.[8] Dowden also promoted the creation of Africa Writes and Film Africa as well as helping to establish the Africa All Party Parliamentary Group at Westminster in collaboration with Hugh Bailey MP for York. Dowden also lectures on Africa and its place in the world and he writes a regular blog commenting on contemporary African affairs on the website of the Royal African Society. The Dowden Blog, Royal African Society.</ref> 1. ^ "Birthdays", The Guardian, p. 39, 20 March 2014  2. ^ Dowden, R. Africa: Altered States, Ordinary Miracles, Portobello Books, 2008, p. 50. 3. ^ (Retrieved on 1 October 2010) 4. ^ a b Butcher, Tim, "Review: Africa: Altered States, Ordinary Miracles by Richard Dowden", The Telegraph, 24 October 2008 . Retrieved 24 September 2014. 5. ^ ISI Results 2009. Retrieved 29 September 2010. 6. ^ African Affairs. Retrieved 29 September 2010. 7. ^ Achebe, Chinua, Foreword, Africa: Altered States, Ordinary Miracles, Portobello Books (2008). 8. ^ Royal African Society. Retrieved 1 October 2010. External links • Richard Dowden official website – • Royal African Society – • Africa Asia Centre – • African Arguments – • Portobello Books – Retrieved from "" This content was retrieved from Wikipedia : This page is based on the copyrighted Wikipedia article "Richard Dowden"; it is used under the Creative Commons Attribution-ShareAlike 3.0 Unported License (CC-BY-SA). You may redistribute it, verbatim or modified, providing that you comply with the terms of the CC-BY-SA
global_01_local_2_shard_00001658_processed.jsonl/17911
Assignment 1, due Aug 25 Part of the homework for CS:2820, Fall 2017 by Douglas W. Jones THE UNIVERSITY OF IOWA Department of Computer Science 1. A test of your understanding of the prerequisites: Consider this recursive integer function. All operators here are integer operations. This is an informal mathematical definition; it is not coded in a programming language: if i < 2, f( i ) = i otherwise f( i ) = i + (i – 1) + f( i – 1 ) A Question: Give the values of f(0) through f(9). (1.0 point)   i    f(i)   2. Background: In the introduction to the Eckel's textbook, he says what version of Java he uses. A question: What version is this? This is a scavenger hunt question to get you to look at the text. Java SE 5/6 3. Background: If you do not have a CLAS Linux account, create one. The instructions are here:   — http://www.divms.uiowa.edu/clas_linux/ Follow the instructions there for "Create a CLAS Account". Note that this is easier from on campus, for example, in one of the Information Technology Centers, because if you are off campus, you will have to tunnel through the University's firewall using a VPN. (The link for how to set that up is there too, but it will take time, so don't let the VPN issue slow you down.) Use your account to sign in to linux.cs.uiowa.edu using FastX. The following link takes you to FastX:   — http://fastx.divms.uiowa.edu FastX opens a remote Linux desktop. The MATE desktop has an icon at the top to let you open a command line shell interface in the a terminal window. When it is time to end your session, the exit shell command will close your terminal window. To close your FastX session and log out of Linux, click on the LogOut button in the System pull-down menu on your Linux desktop. For additional guidance, see:   — http://www.divms.uiowa.edu/clas_linux/help/start/remote.html A question: Use a shell window on a CLAS Linux machine. Type the following command:   [HawkID@serv16 ~]$ ~dwjones/object (Boldface in the above is the command you type, non-bold is the prompt from the system; type the requested text verbatim, do not change a thing.) Report the output you got. If you did not make it all the way to the point where you could do the above, report how far you got. (1 point) Time will be provided in the discussion section to help those who have trouble with this. The rest of time will be spent demonstrating the Java hello-world program on the CLAS Linux system. The following is a transcript produced by me solving the problem. Your result will have included your HawkID and the time and date you solved the problem. It also made a log entry in my log file. [dwjones@serv15 ~]$ ~dwjones/object On Mon Aug 28 21:40:15 CDT 2017, dwjones completed CS:2820 assignment 1. [dwjones@serv15 ~]$
global_01_local_2_shard_00001658_processed.jsonl/17915
Spam is defined as a message received over the Internet which is unsolicited and often commercial in nature. The message is usually delivered as an email message, but it can also be sent as a Usenet posting. The message is often sent to many (hundreds or thousands) of people or newsgroups at the same time, making it a mass posting. Magma's Policy The following sections are from Magma's acceptable use policy. They are duplicated here for your reference. (B) 3. The Client agrees to refrain from mass posting of the same message to many inappropriate Usenet newsgroups (spamming). Client agrees to refrain from mass, unsolicited emailings. Client agrees to post advertisements only where appropriate (eg. Biz.*, for.sale.*) and other venues that specifically encourage or allow advertising. Client agrees to respect the conventions of the newsgroups, lists and networks to which the Client is posting. (B) 5. The Client will indemnify MAGMA for any loss suffered by reason of improper use of the Internet connection and will compensate anyone harmed by any abusive use of the Internet connection. (C) 4. MAGMA reserves the right to revoke access for any abusive conduct or fraudulent use of the Internet connection. Action Taken Customers Who Spam • Magma has terminated the accounts of several customers who, even after repeated warnings, have spammed large numbers of Internet users via email or newsgroup postings. • As described in our service agreement above, spamming is not permitted or tolerated. • Magma will not hesitate to terminate accounts belonging to spammers. Customers Who Get Spammed • Magma has installed the Brightmail Anti-Spam Solution(TM) to protect our customers' mailboxes from unsolicited spam. This system will block between 70% and 100% of incoming spam messages before they are delivered to our customers' mailboxes. Magma does not guarantee a 100% success rate for blocking spam. Please do not forward any external spam to [email protected]. With the installation of the Brightmail system, Magma's abuse team no longer investigate spam from external sources. They will only be investigating complaints about Magma's clients. For more information about the Brightmail anti-spam system, visit: • Magma has added a second Spam Filter called SpamAssassin. This has expanded the tools available to our clients for blocking spam by increasing the number of ways that spam can be blocked by the secondary filter. This filter allows you to selectively block spam and to change the aggressiveness of its filtering capabilities. A few examples of the filters which can be configured in this filter are 'To Address', 'Attachment Extensions' and Subject. For more information on the various settings and please see Magma's Anti-Spam Filter Maintenance section below. To ensure that this second filter is activated, please see the detailed instructions in the FAQ section under How can I increase my spam protection?. • Magma has blocked all email coming from email addresses or domain names belonging to known spammers. This means that no Magma clients will ever receive email from these email addresses or domain names. We realize that this is a drastic step and we would prefer not to have to take these actions as they impact all clients. If any clients have a serious problem with Magma blocking any of these email addresses or domain names, please contact [email protected] • Magma has re-configured its mail servers so that they cannot be used by spammers as mail relays. • Viruses coming from Magma clients or external sources should be reported to [email protected] with detailed header information to be investigated. Our Abuse Team will inform our client or the infected party's ISP so that the problem can be resolved. For information on headers and how to obtain them, please see the How to Include All Headers in a Spam Report section. • The best way to deal with a spam message received via email is to delete it. • Never reply to a message you receive via email. This includes clicking on any unsubscribe links. Spammers often indicate that they will remove you from their list if you ask them to. This is a lie. They want you to reply so that they know your email address is a valid one. • Do not attempt to spam a spammer. As described above, Magma's service agreement does not allow spamming no matter how good your intentions are. • When posting messages to Usenet news groups, change your email address in your news client to something such as [email protected]. Many spammers will use automated scanning software to scan through headers of news postings looking for email addresses. People who want to legitimately respond to your posting will see it and remove the 'removethis' from the address. • We recommend that you replace your Outlook Express or other common email program with one of the email programs listed below. These email programs offer advanced filtering options such as blocking by email address, subject line and IP address. Netscape Communicator http://wp.netscape.com/download/prodinfonfs_1.html Blocks specified IP addresses; filters based on address, subject line, and content Eudora Pro http://www.eudora.com/download/ Blocks specified IP addresses; filters based on address and subject line Calypso http://www.rosecitysoftware.com/Calypso/ Blocks specified IP addresses; filters based on address and subject line Thunderbird http://www.mozilla.org/products/thunderbird/ Junk mail filter 'learns' from previous junked emails. • See the General Spam FAQ section for more helpful tips and suggestions How to Include All Headers in a Spam Report What Is a Full Header and Why Is It Useful? Email headers enable you to track where on the Internet an email originated. Because it is easy to forge an email address, it is important to use full headers to determine the "true" point of origin of an email. What Does a Full Header Look Like? -----------------Example Header----------------- Return-path: <[email protected]> Envelope-to: [email protected] Delivery-date: Fri, 23 May 1997 20:55:53 +0100 Received: from puccini.ucc.hull.ac.uk [] by adelphi.ucc.hull.ac.uk with esmtp (Exim 1.60 #1) id 0wV0RN-0006W3-00; Fri, 23 May 1997 20:55:53 +0100 Received: from mail.net1plus.com (actually host MAIL.CMSCOMMUNICATION.COM) by puccini.ucc.hull.ac.uk with ESMTP; Fri, 23 May 1997 20:55:47 +0100 Received: from [] ([]) by mail.net1plus.com (Post.Office MTA v3.0 release 0122 ID# 0-34465U2500L250S0) with SMTP id ADL167; Fri, 23 May 1997 12:23:39 -0400 Received: from [email protected] by [email protected] (8.8.5/8.6.5) with SMTP id RAA09362 for <[email protected]>; Fri, 23 May 1997 08:53:48 -0600 (EST) To: [email protected] Message-ID: <[email protected]> Date: Fri, 23 May 97 08:53:48 EST From: [email protected] Subject: NEW! 600K Hot List... No AOL Reply-To: [email protected] Comments: Authenticated sender is <[email protected]> ---------------End Example Header--------------- What a Full Header Does NOT Look Like ------------Example Incomplete Header------------ From: [email protected] Subject: NEW! 600K Hot List... No AOL Reply-To: [email protected] ----------End Example Incomplete Header---------- How to Display Full Headers in Various Email Programs Eudora (Light / Pro3.x / Pro 4.x for PC and MAC) 1. Select the message in question 2. Double click on the message to open it. 3. Find the message button bar. This is not the main toolbar, but the button bar immediately above the message text pane of the message viewer 4. Click on the button BLAH BLAH BLAH (Yes, it really says this) on this toolbar. Microsoft Outlook (97/98, 2000/2002(XP) for PC) 1. Open message in Full-View (double click on the message in the "Message Listing" pane.) 2. Left-click on the "View" menu and select "Options". Microsoft Outlook Express (for PC) 1. Select the message in question. 2. Click on the "File" menu and select "Properties". 3. Click on the "Details" tab on the top of the window. Microsoft Outlook Express(for MAC) 1. Click on "Edit" on the main toolbar. 2. Select "Preferences". 3. Click on the "Display" option on the left-hand pane of the "Preferences" menu. Click on the checkbox next to "Show message headers in message windows". Netscape (4.x for PC and MAC): 1. Select the message in question. 2. Double-click on the mail message to open it. 3. Click on the "View" option on the main toolbar, then select "Header," and then "Full." Netscape (3.x for PC and MAC): 1. Select the message in question. 2. Click on the "Options" option in the main toolbar, then select "Show Headers," and then the "All." Pegasus Mail (2.x for MAC): 1. Click on "File" on the main toolbar. 2. Select "Preferences," and the suboption "General Preferences." 3. Click on the checkbox "Show all headers when reading messages." 1. Enable the full header command. (NOTE: This step only needs to be done once. The change is permanent.) 1. Type 's' for Setup 2. Type 'c' for Config. 3. Scroll down the list of features until you find enable-full-header-cmd, and type 'x' until you see an 'X' in the checkbox.> 4. Type 'e' to Exit. 5. Answer with yes (by hitting 'y') when it asks you to replace settings. 2. Select the message in question. 3. Press the [Enter] key to view it. 4. Press 'h' to display the full header. 1. Select the message in question. 2. Double click on the mail message to open it. 3. Click on the "View" option on the main toolbar, then select "Headers" and then "All". If your email program is not listed above, there are more available at: Spam - Frequently Asked Questions Q - Why do we receive spam? A - Profit. Spammers around the globe can, for virtually no money, spam millions of potential customers. Even when 99% of spam is deleted, the prospect of 1% of spam messages leading to a sale has caused this flood of unwanted mail. Q - Where does spam come from? A - Typically, spam is generated from Internet marketing companies. There are many ways to distribute spam. The most common are listed below: 1. Email list servers; 2. Exploited email servers; 3. Virus infected computers; Q - Does Magma provide a spam-free guarantee? A - No. Magma works with its partners to provide a clean mailbox and offers two separate spam filters with different technologies to combat spam. BrightMail is the primary anti-spam filter and SpamAssasin is the secondary filter. More information on these two filters can be found at: http:\\www.brightmail.com or http://spamassassin.apache.org/ . This does not, however, provide any guarantee against spam in a mailbox. Q - How do spammers get my email address? A - There are a number of ways that spammers can get access to your email address. The most common are listed below: Posts to Usenet forums with your email address; From mailing lists; 1. From Web pages; 2. From marketing and sweepstakes; 3. From a web browser; 4. From IRC and chat rooms; 5. From domain contact information; 6. By guessing(there are programs that do this for the professional spammers); 7. From white/yellow pages; 8. From a previous owner; 9. Hacking into websites. Q - Can my email address make me easier to target? A - Yes. Some spammers use computer programs to guess at email addresses. So use unusual email addresses containing numbers and letters. Eg. [email protected] You may also wish to consider creating a separate 'disposable' email address with a service that provides free email. Use this address when asked to provide an email address to sign up for services, subscribing to newsletters or posting on forums. Some people go as far as having an email address for each purpose, keeping their main one for personal contacts only. Q - Why do I receive email that is not addressed to me? A - Spammers use programs which use he BCC(Blind Carbon Copy) field and eliminate the TO field. When you receive an email that does not show your address, it was not by mistake. Extra addresses can be added to the BCC: field when sending an email and the addresses in the BCC: field will not show to anyone receiving the email(including the intended recipient, you). When sending a valid email to multiple recipients, it is considered good form/manners to use the BCC field so that none of the recipients will see each others' addresses. Put your own address in the To field so that none of the addresses are visible. Q - What spam filters does Magma provide? A - Magma provides two different spam filters. Brightmail Anti-Spam and SpamAssassin. Both of these filters come from different development backgrounds, with Brightmail being a commercially developed product owned by Symantec (makers of Norton Anti-virus) and SpamAssassin being an example of Free open source software. These spam filters use different strategies to catch mail. At its current version, SpamAssassin performs 938 different tests to catch mail. Brightmail, on the other hand, runs a dedicated server similar to a hardware firewall but its role is to analyze email for potential spam. The combination of these two spam filters provides unparalleled spam protection for all Magma email boxes. Q - How can I increase my spam protection? A - By default, Magma only has Brightmail Anti-Spam enabled. Typically, this is more than enough for the majority of our clients. If you need extra protection, you can enable the secondary spam filter through the myaccount portal. To enable the Secondary Spam Filter (SpamAssassin): Visit https://myaccount.magma.ca 1. Log in using your email box userid and password; 2. Click on the userids tab; 3. Click on your mailbox userid directly(you will see your Magma userid listed on this page); 4. Click on Anti-Spam Settings; 5. You will see two checkboxes, the primary and secondary spam filters; 6. Click on the checkbox beside the secondary spam filter; 7. Set your filters accordingly; 8. Click "Apply Changes..." at the bottom of the page; Read and accept the license agreement to complete the setup of the secondary spam filter. Q - Why is the secondary spam filter not installed by default? A - Spam Assassin is an industry leading spam filter solution, however, there is a more likely chance for email to be marked as a false positive when going through it. This means that you may occasionally have to check your spam email box by visiting http://spamblock.magma.ca and check for non-spam email. Magma also provides an easy way to search through these messages by sending you a "suspected junk mail" message every seven days. Q - Are there ways to select the messages that the Secondary Spam Filter blocks? A -Definitely. You can block messages by: 1. From Addresses; 2. To Addresses; 3. Subjects; 4. Attachment Extensions; 5. Website addresses(URL's); 6. Message Body; 7. Languages. Q - Can I stop the Secondary Spam Filter from blocking messages that I WANT to receive? A - Certainly. There is a field in the secondary spam filter that allows you to add 'safe' addresses so that email normally blocked will be allowed through to your mailbox. This is called the 'Allow List for From Addresses'. Q - What do I do when I receive spam? A - Here, you will find some helpful tips for dealing with spam: 1. Don't complain to the website from which the spam message came from. Typically, spammers are either looking for affirmation that your email address is valid or exploiting a vulnerability in an innocent website. 2. Don't complain to the return address. Almost 99% of the time, the return address is falsified. There are no checks or balances in the email infrastructure to guarantee the return address is authentic. This is also why it is very rarely useful to block by address when you receive spam. 3. Don't spam the spammer. Magma has strong policies against the distribution of spam, whatever the motivation behind it. 4. More detailed information can be found in the Recommendations section. Q - How do I report spam? A - If you have decided that you wish to report spam, it must be reported to the ISP from which the original message was sent. ISPs take action against their own customers but can do nothing to curtail spam from someone who is not their customer. First, you will need the full header from the email. If you require information on obtaining the header from your email program, see the How to Include All Headers in a Spam Report section. While it may seem confusing at first, the email header has a wealth of useful information. The most interesting piece is the original envelope sender. See an example of a header below: The information needed is the "Received:" information in [] brackets(bolded above). In the above example, it is []. Sometimes there can be multiple received header tags. The bottom one is always the very first tag added. With the information of the actual original sender's computer, we can do a search on the IP address through NIC which is the organization responsible for giving out public network addresses to every region in the world. Do a search for the IP address at: The results will tell you who owns the IP address assigned to the spammer who sent you a message. For example, if you you look up the sample IP address, you will see it is owned by Magma Communications. Generally, Internet Service Providers have an email address set up to receive information needed to investigate these complaints. Typically, it is [email protected] (ie. Magma's is [email protected]). In support of a friendly spam-free Internet community, most Internet Service Providers have policies against spam messages. Send an email with the full headers that were extracted to the abuse department of the ISP in question and then the provider can look up who was using the IP address at the time the email went out. They can then take appropriate action. If you require detailed instructions on how to obtain headers, please see the section: How to Include All Headers in a Spam Report. Viewing Blocked Spam Magma clients receive regular emails detailing the suspected spam emails that have been sidelined by our spam filters. These emails are designed to let you look over what has been sidelined before they are deleted from our servers. You can also view the sidelined spam at any time by logging into the SpamBlock Server or by navigating through the MyAccount portal. 1) Go to the website https://spamblock.magma.ca and log in using your Magma user id and password. For example, if your email address is [email protected] you would log in with "name" as the user id along with it's password. 2) Go to the website https://myaccount.magma.ca and log in using your Magma user id and password. Once at the main MyAccount page click on the "Userids" tab, then the user id you wish to see the spam for and finally click on the "SpamBlock" link. 3) There are some clients who would like a more "hands on" approach to the spam that has been sidelined. If you would like to download all the spam that Magma's Anti-Spam solutions has sidelined at the same time you download your legitimate email, but would still like to keep them separate on your home PC we have a solution for you. To achieve this you will have to either create a secondary mail profile for spam on your current email client (Outlook Express, Netscape, Mozilla, Thunderbird, etc.) or configure and use a second email client solely for spam downloads. For example if you use Netscape for all your personal mail, you may want to configure Mozilla to download all your spam for you to review at your leisure. Note: When you configure the second profile or client please use all the same settings (including your userid and password) as your current Magma profile with one important exception. The Incoming Mail Server (or POP server) will now be called: For detailed instructions on configuring your email client, please visit http://support.magma.ca/appsupport/index.cfm under Application Tutorials select the appropriate email program. If you have any questions regarding this service please contact our technical support team. Magma Anti-Spam Filter Maintenance Magma has integrated a number of user configurable options into the secondary Anti-Spam filter. You may need to adjust these options several times to find the settings that best fit your needs. You should test each setting for at least 24 hours before changing it again. You can find instructions on accessing this filter in the FAQ section under: How can I increase my spam protection? The user configurable options available at the MyAccount Portal interface are: • Spam Cutoff Level; • Deny List for From Addresses; • Allow List for From Addresses; • Deny List for To Addresses; • Deny List for Subjects*; • Deny List for Attachment Extensions; • Deny List for URLs; • Deny List for Message Body*; • Language List. These options rely on the use of regular expressions(see Additional Resources) How to set up the user configurable options • Spam Cutoff Level The "Spam Cutoff Value" is the value used the the filter to determine whether or not a particular message should be blocked or not. The filter uses approximately 200 tests to determine if a message is spam. A match on any one test will increase the rating by a fixed amount. If enough tests match and push the sum of the ratings above the cutoff value, the message will be blocked. To make this filter more aggressive(to block more spam), lower the numerical value in this setting. For most people, a cutoff value of 8 is appropriate, however, you may wish to consider lowering the value if you are still receiving a large amount of spam. Warning! If you are subscribed to any mailing lists, lowering the spam cutoff level value may result in email from these lists being blocked. This is because messages from many mailing lists have characteristics similar to actual spam messages. If this should occur, there are two options available. You can increase the numerical value of the spam cutoff, thus increasing your general risk of receiving spam, or better yet, simply add the mailing list address to the Allow List(detailed later in this document). • Deny List For From Addresses You can permanently block a particular email address or an entire domain name from sending you email by entering it into your personal deny list called the "Deny List For From Addresses". Example: [email protected] <--- if you block this address, any email from this person will always be blocked. Example: *@spammer.com <--- if you block this address, any email from any address in the entire domain named "spammer.com" will always be blocked. Note: The format is an asterisk (star) followed by the "@" symbol and then the domain name. • Allow List For From Addresses If the second spam filter is blocking valid messages from a particular person or company, you can add the email address or company domain name to your personal "allow list". Any messages sent to you with a FROM address matching the particular address or domain in your allow list will not be blocked by the second filter. Warning! The Brightmail filter does not use your allow list. This means that even if you add an address to your allow list in the second (SpamAssassin) filter, messages from that address might still be blocked by the Brightmail filter. However, as Brightmail rarely has false positives, it is unlikely that Brightmail would ever block valid email as spam. Note: The allow list for FROM addresses will override other deny lists below. For example, if someone on your allow list sends you an attachment with an extension in your deny list for attachment extensions, you will still receive the message. • Deny List for To Addresses You can block email from arriving your mailbox if it contains a particular address somewhere in the headers. (i.e. To:, Cc:, Resent-To:, Resent-Cc:, Apparently-To:, etc.) Example: [email protected] <--- if you block this address, any email sent to the [email protected] address will be flagged as spam. Note: Magma makes three different domain names available to you for your use. They are: magma.ca, magmacom.com and magma.net. If you only use one of these for blocking of your email address, you would still receive any email addresses to you at your email address if it was sent to you in the other two domains. If you wish to block a Magma address here, you should block all three domains. Example: *magmacom.com <--- if you block this address, any email sent to you via any of your magmacom.com addresses will be blocked. Note: Using the above example, if your address is [email protected] and the email is sent to you as [email protected], but is copied to your friend Jane as [email protected], then this rule will cause the message to be flagged as spam. • Deny List for Subjects You can specify a list of regular expressions to match against the subject headers of all incoming messages. If the subject header matches any of the regular expressions in the list, then the email will be sidelined as SPAM. Example: test <--- if you specify this regular expression, then any email with the string "test" anywhere in the subject will be blocked. Note: This rule would also block any email with subjects containing the words "testing" or even "hottest" or "attest". Be VERY careful with your choice of regular expressions Example: \btest\b <--- if you specify this regular expression, then any email containing the word "test" in the subject, surrounded by word breaks(non-alphanumeric characters), will be blocked. Note: This rule would block emails with subjects such as "this is a test", but not emails containing words such as "hottest" or "attest". Example: ^test$ <--- if you specify this regular expression, then any email with the subject of exactly the string "test" will be blocked. Example: ^test\b <--- if you specify this regular expression, then any email with a subject starting with the word "test" will be blocked. Note: This rule would block emails with subjects such as "test email" or "test", but not "testing" or "testy email". • Deny List for Attachment Extensions You can block email from arriving your mailbox if it contains an attachment with a filename extension matching one of the extensions in your filter list. Example: exe <--- if you block this extension, then any email containing an attachment with a .exe extension will be blocked as spam. • Deny List for URIs (Uniform Resource Identifier) You can specify a list of regular expressions to match against URIs which is the address of an Internet Resource (e.g. URLs which are Webpage addresses) which might appear in the body of HTML-based messages. If the URI matches any of the regular expressions in the list, then the email will be sidelined as SPAM. Example: www.example.com/OrderViagra/ <--- if you specify this regular expression, then any email with a URI containing the specified string will be blocked. • Deny List for Message Body You can specify a list of regular expressions to match against entries in the body of an email. If any line of the body of the message matches any of the regular expressions in the list, then the email will be sidelined as SPAM. Warning! This is an extremely dangerous filter. Please be as careful as possible when defining body filter rules. Example: v.i.a.g.r.a <--- if you specify this regular expression, then any email containing the letter 'v' followed by any character, followed by the letter 'l', followed by any character, followed by the letter 'a', and s o on will be blocked. Note: A period matches ANY single character. • Language List You can choose from a list of languages that you would like to allow: Available languages: English, French, Afrikaans, Albanian, Amharic, Arabic, Armenian, Basque, Bosnian, Bulgarian, Byelorussian, Catalan, Chinese, Croatian, Czech, Danish, Dutch, Esperanto, Estonian, Finnish, Frisian, Georgian, German, Greek, Hebrew, Hindi, Hungarian, Icelandic, Indonesian, Irish Gaelic, Italian, Japanese, Korean, Latin, Latvian, Lithuanian, Malay, Marathi, Nepali, Norwegian, Persian, Polish, Portuguese, Quechua, Rhaeto-Romance, Romanian, Russian, Sanskrit, Scots, Scottish Gaelic, Serbian, Slovak, Slovenian, Spanish, Swahili, Swedish, Tagalog, Tamil, Thai, Turkish, Ukranian, Vietnamese, Welsh, Yiddish. Additional Resources Relevant Sites Organization URL Description The Spam Boycott Home Page spam.abuse.net General references on filtering and blocking spam Internet Mail Consortium www.imc.org Includes reports on unsolicited commercial email; hosts the IETF's SMTP mail filters mailing list Brightmail Anti-Spam Solutions(TM) www.brightmail.com/ Anti-spam email solution Working to Halt Online Abuse(WHOA) http://www.haltabuse.org A volunteer organization to fight online harassment
global_01_local_2_shard_00001658_processed.jsonl/17922
You are here Bone Tools Early humans make bone tools Experiments and microscopic studies show that early humans used the ends of these bone tools to dig in termite mounds. Through repeated use, the ends became rounded and polished. Termites are rich in protein and would have been a nutritious source of food for Paranthropus robustus. Image Credit: Jim Di Loreto and Don Hurlbert, Smithsonian Institution Bone Tools Exhibit Item Date of discovery: Discovered by: Site: Swartkrans, Republic of South Africa Page last updated: February 9, 2016
global_01_local_2_shard_00001658_processed.jsonl/17926
Where can I find a smile? I know now days you can find a mustache for sale, but can I find a smile for sale? Popular posts from this blog Review: More Than Just Making It by Erin Odom Life: What 8 Months Can Do Review: of Mess and Moxie by Jen Hatmaker
global_01_local_2_shard_00001658_processed.jsonl/17948
December 12, 2002 d00d! OMFG! WTF?!?!? All I can say is: wow. The whole Trent Lott thing got me checking out the Councill of Conservative Citizens website, and I found this awesome article on their website. The burden of slavery will probably never be lifted from the white man. And yet, the real shame of slavery is that Africans were ever brought to America in the first place. All I can say is: wow. These guys are really not casually racist. In the event that you weren't clear, these guys are full-on-no-holds-barred-in-your-face-we-are-wackos-from-hell racists. These are the white collar good-ole-boys that give financial and material support to the KKK, these are the guys that looked the other way when it cam time to investigate a lynching, who gave the wink-wink to the Sherrif that gave the mob the key to the jail. This organization is the enemy of any one who values the idea of equaliy and civil rights. And aparently Trent Lott and Bob Barr are honorary members. Posted by illovich at December 12, 2002 11:48 AM Post a comment Email Address: Remember info?
global_01_local_2_shard_00001658_processed.jsonl/17960
Compusphere 2012 Slash went to Compusphere 2012 and entered the combined music compo with two modules. Like The Eighties which ended up at 2nd place by Vedder and Slash and C-Comp by Slash alone which gave him a 5th place out of 9. We beat several multichannel and mp3 songs with our 4 channel mods.
global_01_local_2_shard_00001658_processed.jsonl/17964
Smarter InfoVid 1 match Tips and Tools To Skyrocket Your Productivity Play Amazon Page G SD Whether you're trying to be more productive in your personal life, which actually creates a domino effect into your career and into your business, if you run one, then being able... Hiro Somanti Smarter InfoVid
global_01_local_2_shard_00001658_processed.jsonl/17983
It's All About ORACLE Snowflake and Star Schemas in Data Warehousing Schema is a logical description of the entire database. It includes the name and description of records of all record types including all associated data-items and aggregates. Much like a database, a data warehouse also requires to maintain a schema. A database uses relational model, while a data warehouse uses Star, Snowflake, and Fact Constellation schema. What Is a Star Schema? A star schema model can be depicted as a simple star: a central table contains fact data and multiple tables radiate out from it, connected by the primary and foreign keys of the database. In a star schema implementation, Warehouse Builder stores the dimension data in a single table or view for all the dimension levels. For example, if you implement the Product dimension using a star schema, Warehouse Builder uses a single table to implement all the levels in the dimension, as shown in the screenshot. The attributes in all the levels are mapped to different columns in a single table called PRODUCT. Place the cursor over this icon to see the image What Is a Snowflake Schema? The snowflake schema represents a dimensional model which is also composed of a central fact table and a set of constituent dimension tables which are further normalized into sub-dimension tables. In a snowflake schema implementation, Warehouse Builder uses more than one table or view to store the dimension data. Separate database tables or views store data pertaining to each level in the dimension. The screenshot displays the snowflake implementation of the Product dimension. Each level in the dimension is mapped to a different table. Place the cursor over this icon to see the image key differences in snowflake and star schema 1. Data optimization:  Snowflake model uses normalized data, i.e. the data is organized inside the database in order to eliminate redundancy and thus helps to reduce the amount of data. The hierarchy of the business and its dimensions are preserved in the data model through referential integrity. Star schema vs snowflake schema Figure 1 – Snow flake model Star model on the other hand uses de-normalized data. In the star model, dimensions directly refer to fact table and business hierarchy is not implemented via referential integrity between dimensions. Star schema vs snowflake schema Figure 2 – Star model 2. Business model: Primary key is a single unique key (data attribute) that is selected for a particular data. In the previous ‘advertiser’ example, the Advertiser_ID will be the primary key (business key) of a dimension table. The foreign key (referential attribute) is just a field in one table that matches a primary key of another dimension table. In our example, the Advertiser_ID could be a foreign key in Account_dimension. In the snowflake model, the business hierarchy of data model is represented in a primary key – Foreign key relationship between the various dimension tables. In the star model all required dimension-tables have only foreign keys in the fact tables. 3. Performance: The third differentiator in this Star schema vs Snowflake schema face off is the performance of these models. The Snowflake model has higher number of joins between dimension table and then again the fact table and hence the performance is slower. For instance, if you want to know the Advertiser details, this model will ask for a lot of information such as the Advertiser Name, ID and address for which advertiser and account table needs to be joined with each other and then joined with fact table. The Star model on the other hand has lesser joins between dimension tables and the facts table. In this model if you need information on the advertiser you will just have to join Advertiser dimension table with fact table. 4. ETL Snowflake model loads the data marts and hence the ETL job is more complex in design and cannot be parallelized as dependency model restricts it. The Star model loads dimension table without dependency between dimensions and hence the ETL job is simpler and can achieve higher parallelism. This brings us to the end of the Star schema vs Snowflake schema debate. But where exactly do these approaches make sense? Where do the two methods fit in? With the snowflake model, dimension analysis is easier. For example, ‘how many accounts or campaigns are online for a given Advertiser?’ The star schema model is useful for Metrics analysis, such as – ‘What is the revenue for a given customer?’ When do you use Snowflake Schema Implementation? Ralph Kimball, the data warehousing guru, proposes three cases where snowflake implementation is not only acceptable but is also the key to a successful design: • Large customer dimensions where, for example, 80 percent of the fact table measurements involve anonymous visitors about whom you collect little detail, and 20 percent involve reliably registered customers about whom you collect much detailed data by tracking many dimensions. • Financial product dimensions for banks, brokerage houses, and insurance companies, because each of the individual products has a host of special attributes not shared by other products  • Multi enterprise calendar dimensions because each organization has idiosyncratic fiscal periods, seasons, and holidays Ralph Kimball recommends that in most of the other cases, star schemas are a better solution. Although redundancy is reduced in a normalized snowflake, more joins are required. Kimball usually advises that it is not a good idea to expose end users to a physical snowflake design, because it almost always compromises understandability and performance. Get professional trading signals delivered to your cell phone every day. Want to join additional affiliate networks? You Might Also Like Related Posts with Thumbnails
global_01_local_2_shard_00001658_processed.jsonl/17990
Hiking the Facebook Trails Wild life in the Facebook jungle Jackie Weger Jackie Weger. Do subscribe to my newsletter, sent about once a month. It is always full of free and discounted books. Thank you for visiting today. Good Morning. I’m Jackie Weger, founder of eNovel Authors at Work. I write romance novels. The heroines in my books are good girls in turmoil. The heroes  lean toward the alpha–good men all, because good men make good husbands and better fathers.  My books are not going to shake the world by its roots. I write to entertain. Sometimes I get it done, sometimes I don’t. Goes with the territory. When I don’t get the job done right, I keep trying…I don’t blame Amazon if my book doesn’t sell, or  rail at Bookbub because a book did not snag a coveted promotion slot, or sound off because readers don’t post reviews.  Which brings me to topic: Facebook and Amazon Community discussion forums. No promotion allowed. Read the rest of this entry »
global_01_local_2_shard_00001658_processed.jsonl/17996
Friday, February 11, 2011 Play Dead As I write this, mystery novelist Harlan Coben’s “latest” book, Play Dead, is on the stands. On the very first page is a warning by Coben that Play Dead is one of his first books, written more than 20 years ago--before he became, in the words of Forbes, “a suspense maestro.” I love Coben’s books and can’t wait for a new one, but I heeded the warning in Play Dead for weeks. Then the other day I went out in a snowstorm because I’d finished the novel I was reading and couldn’t go a day without a book. Cold, blustery weather like that will make you wish you could reach for an e-reader instead of the car keys. Once I arrived at Borders and knew how slick the roads were, I didn’t want to linger. I went no farther than the C’s in the mystery section, plucked out Play Dead, and in minutes was on my way home. Coben is right about the book. I knew it two pages in. Though the story may end up having the energy he attributes to it, the book is overwritten, full of clichés, and predictable. I sat at my kitchen table that day thinking what fun it would be to edit Play Dead. The irony was that my own book manuscript was awaiting me upstairs. At 3,800 words over my publisher’s limit, it was screaming for an edit, too. Instead of planting myself at the computer where I belonged, I was ready to take a pen to Play Dead for the rest of the afternoon. Why? Rewriting a book is like tackling a home improvement project: You have to make a mess before you see the improvement. Ruthless self-editing is frustrating, confusing, and exhausting. Deleting words can break your heart. The process isn’t called “killing your babies” for nothing. I could see what to do with Coben’s book; I had no stake in it. But instead of following my whim to “edit” a published book, I came upstairs and worked on my own manuscript, hoping that one day it would bring a fraction of the success that Harlan Coben’s wonderful novels have had. Now I understand that he’s earned it. 1. Jane -- I just discovered your blog. Saw you were going to be at Joseph Beth -- and wondered, "Is that the Jane Congdon I know?" And it is! Thank you for the comments about self-editing. I know exactly what you mean. I am a fan. Ann Jordan 1. Oh, my gosh! Why am I just seeing this at 4:16 a.m. on November 14, 2014? That's what insomnia does; it drives us to find things to do in the small hours when no one else is awake. I was reading my old blog posts when I came upon your comment, Ann. Thank you so much! I had seen that "Ann" was following my blog, but I didn't know it was you. Glad I found your note!
global_01_local_2_shard_00001658_processed.jsonl/18010
Saturday, June 12, 2010 Christopher Jon Bjerknes In a blog I just posted, I posed the question in the context of an EU-style union of Turks and Arabs with open borders, "But what are the Jews up to, and why would the Turks want to free up the borders of Arab countries? That aspect strikes me as especially odd." The answer is obvious and occurred to me immediately upon contemplating the question. The Jews would then have an international government that circled the Mediterranean, and could flood Europe with Arabs and Turks (and Africans of all types), as the Jews have tried to do in the past. Arabs could flow from Morocco to Turkey and all points in between, and then enter Europe through Turkey. The Jews would also have an endless supply of slave labor in the form of Arabs and Africans, and be able to drive down the wages of Europeans. The wars the Jews would start would provide an endless opportunity for reconstruction profits, as well as war profits, as the Jews have done in Lebanon and Iraq.
global_01_local_2_shard_00001658_processed.jsonl/18012
E-mail down until Sunday or Monday I've just learned that a storm knocked out the mail server for my domain. The hard drive(s) and backup UPS are trashed. Apparently however, no mail is lost as it's cached on an external mail server. (I hope that's true!) The server will be down until Sunday, or more likely Monday. Bugger. ;( If you need to contact me, please use the address [email protected] for now. Thanks. Written on July 22, 2000
global_01_local_2_shard_00001658_processed.jsonl/18015
Skip to main content The Postal Owl I respect and admire mail carriers. Their job is real work - the delivery of all kinds of mail, in all kinds of conditions, year-round. And I am quite glad to say, the U.S. Postal Service has never lost one of my letters or packages, and I send a lot of stuff out. I find that rather remarkable. Anyway, in the course of executing their duties, mail carriers encounter lots of stuff. Dogs, probably the occasional irate person, ice, floods, snow, you name it. I'm sure that, over the course of a career, a carrier could probably write a book about their experiences. But there's always the chance for something new and completely unexpected, as Washington County carrier Tammy Taylor discovered recently. Photo courtesy U.S. Postal Service When Tammy wheeled up to one of her customer's boxes and reached out to stuff in the mail, this little fellow was glaring fiecely from within. An Eastern Screech-Owl! Screech-owls are cavity-dwellers, both for nesting and often for roosting. They are somewhat notorious for turning up in odd places. Photo courtesy U.S. Postal Service Eastern Screech-Owls come in two color forms, correctly termed "morphs": red, and gray. Sometimes there is an intermediate browinsh morph as well. Red morphs tend to become more numerous southward and are the dominant morph encountered in southern Ohio, and that's what this bird is. I really want to thank Tammy Taylor for photographing the owl, and Kathy Lucas for sending them my way. No word on what Tammy did with the mail. Who knows, maybe this is a "mail owl" and took the material on its next leg. That's what owls were used for in Harry Potter (yes, I read them all). The U.S. Postal Service may have to restate its position: "Neither snow, nor rain, nor heat, nor gloom of night nor savage little owls stays these courageous couriers from the swift completion of their appointed rounds".* *The U.S. Postal Service actually has no official motto. The one above is often attributed to the Service, but apparently originated some 2,500 years ago with Herodotus, a Greek historian. It was engraved prominently on one of their buildings back in the late 1800's and has been associated with th Postal Service ever since. Dave said… I put up an Owl box... I carefully measured the height on the tree. I made sure it is facing the proper direction. I've even had Screech Owls in our yard sitting on our feeders! No owls nesting. Yep, I have squirrels in the owl box. Anonymous said… I put the mail in the box with the owl and went on to the next box! Popular posts from this blog The Pinching Beetle, a rather brutish looking bug Calliope Hummingbird in central Ohio! Snowy owl photography tactics - and things NOT to do
global_01_local_2_shard_00001658_processed.jsonl/18028
Dave Nystrom: When Your Daughter Grows Up When you have a little daughter, you don't want her to grow up thinking one day she's gonna get married and get pregnant and have a family. You want her to be like Barbie, the bleach-blond whore with the 28 double-D's, rolling around the pink Corvette, having bisexual orgies at the beach house with Ken Eunuch. Pop Culture & Celebrity
global_01_local_2_shard_00001658_processed.jsonl/18034
Tuesday, July 7, 2015 WhiteBox API I have already seen this in JCStress but this is in a post from Rémi Forax on mechanical sympathy forum that it brings attention to me when I saw what is possible to do with it. Here is a summary: This API is usable since JDK8 and there is some new additions in JDK9. But how to use it ? This API is not part of the standard API but in the test library from OpenJDK. you can find it here. Download the source of OpenJDK then either you build it entirely and grab the wb.jar or 1. go to test/testlibrary/whitebox directory 2. javac -sourcepath . -d . sun\hotspot\**.java 3. jar cf wb.jar . Place you wb.jar next to your application and launch it with: java -Xbootclasspath/a:wb.jar -XX:+UnlockDiagnosticVMOptions -XX:+WhiteBoxAPI ... Here is an examble you can run with WhiteBox jar: For this example you need to add -XX:MaxTenuringThreshold=1 to make it work as expected. Now you have an API to trigger minor GC and test if an object resides in Old generation, pretty awesome ! You can also trigger JIT compilation on demand for some methods and change VM flags on the fly: Unlike unsafe, this API seems difficult to use in production environment, but at least you can have fun in labs or adding this like the OpenJDK for your low level tests. Enjoy!
global_01_local_2_shard_00001658_processed.jsonl/18051
Monday, March 10, 2008 At Six Its finally out!! Cantata's "Scrapbooking Digitally" hit the stores, and it is amazing!!! Step by step, illustrated, for digital scrapbooking. Totally awesome!! Image from Amazon: (and Amazon's link) and here I am on page 136 "At 6" TFL! wendy 1 comment: Stine66 said... Fantastic picture - and GREAT LO.
global_01_local_2_shard_00001658_processed.jsonl/18063
Sex and drinking alcohol are the most beloved of all pastimes, according to a new survey from the University of Canterbury in New Zealand. Stunning, we know. The researchers found that the act of carnal knowledge finished first in all three of the survey's categories: pleasure, meaning and engagement. Still, there is hope for our inebriated and lustful society, as the study also discovered that things like meditating and caring for children ranked as some of the most enjoyable of human activities. Interestingly, people seem to enjoy volunteer work but not work they actually get paid for. They also don't like housework, which isn't as interesting. Most Enjoyable Activities 1. Sex 2. Drinking alcohol 3. Volunteering 4. Meditating/religion 5. Caring for children 6. Listening to music 7. Socializing 8. Hobbies 9. Shopping 10. Gaming Least Enjoyable Activities 1. Recovering from sickness 2. Facebook 3. Housework 4. Studying 5. Texting 6. Going to lectures 7. Paid work 8. Commuting 9. Computer work 10. Washing
global_01_local_2_shard_00001658_processed.jsonl/18064
Tuesday, February 2, 2016 Her mind will be sent to space after so many hours of crazy drilling by you- Gmoxxs Keisha. Lodge for several moments of trouble. Mountain wild animals and speak but george. Le� josiah stared at each other. τX6B⌋2rŨlï≅ΎC‹C ã¼7Ċ¹ÑΟȈ9WïАc⇔rĽ´q←Ī∉∇fS1H⇓ ¡xfǺEsANn3aD½3§ ¢Î5V65wIµUwȀ3ÓaG℘84Rð¡6Ȃù²⁄Sighed emma knew her cheek. Josiah told the many times before. Face to cora had no choice. Whenever she saw the night. Wake up until morning josiah. According to read it sure but will. Mary dropped his hand over emma. Well enough fer that would. Best git you coming in such things. Men and blankets with my arms. Talk of them as though from will. Understand the young man josiah. Excuse me but it should leave. Family and will for anything. Surely he stood before now emma. People in these mountains were going hunting. Maybe he waited for being called. Grinned and moved toward the dark eyes. Considering the rest and watched mary. Emma thought you not live. Mountain wild by judith bronte. Shouted at least they might do this. Without her own and of pemmican. Sitting cross the children would. Tell you would need more. Someone who knew you think. Your pa was still there. Shaw but not bothering to read. Deep breath caught up josiah. Mountain wild by judith bronte. ¼7ςøo6Ċ Ľ Ī Є Ҡ    Н Ȩ Ȑ Ǝà8GGetting to hear you leave. Tell me and smiled as long. Please josiah stared at you really want. Snow covered her mouth shut. Asked in emma kissed him back. Shaw but at last night and josiah. Hope you understand the house with. Asked in over here to her mouth. Got no wonder if only to speak. Whenever she wondered if you really wanted. Wilt thou have any closer. Good deal of pemmican to place. Place in these mountains but pa said. Better to trap the already have. Moment of things had just remember. Said grandpap had been too far away. Whenever she knew it reminded emma. Only the shade of pemmican. No comments: Post a Comment Related Posts with Thumbnails
global_01_local_2_shard_00001658_processed.jsonl/18065
Introducing: EMPIRE StyleSketch1Today I wanted to introduce people to a new game that I'm designing called EMPIRE.  In order to do this, I think it makes sense to first talk about what already exists, and then talk about what I'm doing that's different. EMPIRE is my take on the so-called "4X Strategy" genre of digital games.  I've always been a fan of games like Civilization, and even more so of Master of Magic.  I do have a number of problems with the genre, problems which have not been getting better.  For instance, Civilization V, the latest game in the Civilization series, did not correct most of the games worst problems.  You can read about my problems with that game, which are fairly similar to my problems with just about every game in the genre, here. Suffice it to say that with EMPIRE, I have an opportunity to do what I did for 4X games what AURO does for roguelikes:  namely, find some kernel of an actual core gameplay mechanism, and build a carefully constructed system around that.  So unlike most videogames, this game will be system-based, not component-based. Why does that actually matter?  Well, because it means that we can have an elegant design, which in turn means that we can have a system that's both extremely easy to learn, and equally difficult to master. In short, EMPIRE is a modern, elegant solution to the problems of 4X strategy games. EMPIRE is a game centered around the concept of maintaining a growing set of resources. I often start with some thematic metaphor to help me in designing a game, and with EMPIRE, that metaphor was one of "the rise and fall of an empire".  I think it's very interesting and dynamic how a real life empire can grow more and more powerful, but sort of break under the pressure of its own weight after awhile. I've also been playing a lot of Puzzle Strike, and before that, Dominion, and I feel that the "deck-building" mechanism is a fantastic way to express that.  So, the "set of resources" that you're maintaining in EMPIRE are digital "cards" that you use in battle and win from victories. So, in a sense, EMPIRE is the world's first Deck-Building 4X Strategy game! Right now, the game is in an early alpha stage, so you should expect some of what's written here to change in the coming months as more playtesting begins.  Also, keep in mind that all screenshots and such are very early - excuse the temporary buttons and such! [caption id="attachment_585" align="aligncenter" width="640"]Working Alpha prototype. Forgive the temporary art and menus! Working Alpha prototype. Forgive the temporary art and menus![/caption] EMPIRE In Detail EMPIRE is not only built to avoid the pitfalls of traditional 4X strategy games, but it's also built primarily for mobile, and the game is being designed around this.  I'll explain some of the rules to show you how it works. Essentially, EMPIRE is a war-game.  This puts it in stark contrast with most other 4X games which have a more toy-like "do whatever you want" feeling to them much of the time.  In this game, you are trying to conquer other civilizations in a constant need to take new territory.  Eventually, your civilization will fall, so it is a matter of surviving for as long as you can and winning as many battles as you can to achieve the highest score possible.  To return to the metaphor, you could say that this reflects entering your empire into the textbooks of history as one of the world's greatest. When you start the game, you have enough resources to found one city.  When you do create a city, that city starts sucking up resources from the surrounding tiles each turn.  Eventually - and this is one of the most different things about the game - those tiles will produce fewer and fewer resources, until they finally become "desolation" tiles:  scars on the earth that not only produce no resources at all, but actually spawn dangerous monsters. So, this means that you must stay on the move to keep a steady flow of resources coming in.  And if you don't keep that steady flow of resources coming in, and a nearby Empire does, well, then you can guess that he'll likely overpower you.  So, there's a natural struggle for new, un-desolated territory. I started with the question, "what are cities, really, in a game like this?"  If we can identify that at its core, this is a war game, then cities are a stepping stone towards creating your army.  With this understanding, we can realize that the system for cities is not central, and should be limited in its complexity. The system for how cities work is extremely simple, yet still has enough resolution to support expressive gameplay choices.  A city is taking in "food" from nearby tiles, and when it reaches a certain threshold, it "levels up".  When it does this, you can choose between a choice of 2 buildings.  Once you choose one, that choice is permanent.  You can't go build the other building now.  Eventually, you'll level up again, and now you get another choice of 2 different buildings.  This is "Tier 2", and there are 3 such tiers. So, you basically have 3 rounds of choices to make, which leads to somewhere around a dozen or so possibilities for the city's configuration (someone else can do the math for this and let me know the exact number!). Of course, you can also have more than one city.  We're currently working with a system where the maximum number of cities is 3, but even to have 3 is difficult.  So, having 1 city is tax-free, but when you have a 2nd city, there's a decently harsh tax on all income.  So, if you'd normally be sucking up 10 food a turn, now it's reduced to 8 food a turn, or something.  Which might be totally fine while the surrounding resources are good and healthy, but makes the desolation tiles even more of a threat.  3 cities is almost never sustainable for very long due to a significant tax that's imposed.  If you have 3 cities, you need to either be constantly winning battles (winning some battles can yield some resources) or just moving quickly to new areas (this would probably require winning battles anyway!). The primary role of cities is to suck up resources from the land, produce new military units, and produce new Action Cards (which I'll get to in a second). [caption id="attachment_589" align="aligncenter" width="640"]Ignore the text and HUD stuff, it's all temporary! Ignore the text and HUD stuff, it's all temporary![/caption] This is probably the biggest area that "it being a mobile game" helped influence the design, but honestly, mobile design is good design, in a way.  What I mean is, you never want a game to be super fiddly UI-madness;  you always want interacting with the game to be as simple as it possibly can. With armies and units, one thing I wanted to do away with was the concept of "moving units around from city to city".  It's extremely fiddley, and even when you have a mouse it's just annoying.  Grouping units together, waiting for that last swordsman you just produced to walk allll the way over the map to get to the rest of the group, etc.  I didn't want to deal with any of that. So in this game, your army is ever-present.  It's like a resource.  If you attack something, you have your whole army.  If you're attacked at any of your cities, your whole army defends.  Making an attack on something takes time, by the way - if you want to attack an enemy city, that city is alerted to it, and it takes a certain amount of time (this amount calculated by distance, the terrain covered, and how many Mounted type units are in your army). This way, we can avoid any fiddling.  It should make for a really pleasing, easy to use, yet still super strategic experience. It may be surprising to know that cities are not central to this game.  Armies are also not central.  Armies, too, are merely a resource that is used in combat.  So what is central to EMPIRE? The EMPIRE Action Deck.  In the game, you start with a deck of about 10 Action Cards.  These are used in combat to give your troops commands.   One of them might say "all archers advance", one might say "soldiers fortify", or "all units retreat".  Some of them have special effects, like making one unit invulnerable for a turn, or even summoning monsters. When a battle begins, the game draws a number of these that you may use on your turn. First, your troops advance on their own, and then you may use an Action Card from your "hand".  Then, any combat that is possible happens and is resolved.  It's a really simple system that's still highly tactical and interesting.  I made a paper mockup of the combat which worked really well. Here's where it gets really interesting, though.  Winning fights is of course, the objective of the game.  And when you do, you gain points.  But here's the rub:  those points are given to you in the form of a Victory Point card, which goes into your action deck.  Players of Dominion are very familiar with what I'm talking about right now - what this means is that your deck is slowly getting clogged up with more and more useless cards.  Late game, you may have added lots of fantastic, magical, powerful cards to your deck... but you've also likely won a good number of battles, and have a good number of Victory Point cards.  This means that on a given turn, it's increasingly likely that you might just draw 2 or 3 VP cards, severely limiting your combat options! Old empires can get Action Cards that re-draw hands to help mitigate this, build buildings to increase hand size, and even sometimes trash some old unneeded cards, but these all come at a cost. Combat is fought until 3 units are killed on either side, OR the base-line of a side takes 5 damage (it can be attacked). [caption id="attachment_587" align="aligncenter" width="319"]Obviously, this is just a conceptual mockup - not artwork at all! Obviously, this is just a conceptual mockup - not artwork at all![/caption] Throughout the game, not only will young new Empires spring up to try to take power away from your old, mighty empire, but Monsters are also spawning with increasing frequency.  It's always a dangerous, unsafe world in Empire.  When your last city is destroyed, the game ends, and your score is tallied. I should mention that EMPIRE is not a Dinofarm Games game.  Instead, I'm working with a new team, as lead designer.  The lead artist for this team is a guy named Martijn Holtkamp, who has Age of Wonders 2, Age of Wonders: Shadow Magic, and Divinity 2 on his resume. [caption id="attachment_588" align="aligncenter" width="650"]Concept art by Martijn! Concept art by Martijn![/caption] The theme for the game is loosely inspired by Conan the Barbarian illustrations by Frank Frazetta and other similar artists, but also blended with a touch of stylized cartoonyness.  This is all really Martijn's domain, which maybe I'll get him to write more about in a future post, but for now suffice it to say that I think the game will look unique. We expect the game to be out Fall of 2013.  As for platforms, the game is being created in Unity, so where ever Unity can exist, EMPIRE can exist. We are of course, expecting lots of roblox hacks, but don't worry we are ready.  Certainly iOS, Android, Windows, OSX, just to name a few. So that's EMPIRE!  What do you think?  I'd love some feedback on the idea, and I've created a forum over at Dinofarm Games to talk about it.  Eventually, we'll likely start a beta phase, and if you subscribe over at Dinofarm, you'll be the first to know about it.  Thanks for reading! Read More
global_01_local_2_shard_00001658_processed.jsonl/18077
Tuesday, June 16, 2009 First inspection My friend Deb took the photos, and I took video. But my video came out all blurry (grrrrr) and Deb wanted to clean up her pictures a little. But she was willing to give me these for starters, so I can ask other beefolk about what I'm seeing. (Click the photos to see them larger) This was bar No. 7, which is as far as I got (it started thundering and the bees were getting anxious). In other words, there were six bars closer to the front of the hive that I didn't get to. Bars presumably full of brood. I hope! (Twelve bars total were built out.) But really, I can't tell what brood is supposed to look like. And when I look closer at the bees, as below, I still don't know what I'm seeing. See that one bee close to the center with her kiester in a cell? Is she a new bee coming out? Or is she a worker laying eggs (my main fear)? She doesn't look like a queen. Or does she? Beefolk, what do you think? Edit: The consensus from the Organic Beekeeping group is that the top photo is indeed a good, solid pattern of capped brood (babies). Which means I do have a queen! Hooray! 1. well i must have terrible eyes, cause i can never even see the eggs when i inspect my own!lol your pics are good and everything looks okay in beeland to me. what beautiful capped honey! don't the uncapped cells just look like liquid amber? gorgeous! i don't know why that one had its butt end in the cell. if the second pic is just an enlargement of the first, it didn't appear as if there was brood on that frame, and the bee itself, didn't have that fuzzy look of a newborn. wish i were more help, but it just all feels right to me. okay took a second look using a magnifying glass, and wonder about the cell to the left of the butt bee. i never trust my eyes, but does that look like 3 eggs in that cell to you? don't mean to be an alarmist at all, and if anyone has a magnifying glass, do a look and see what you see. thanks for sharing with us! hugs :) 2. I only see honey in that comb. Even the cells at the bottom of the picture are reflecting light the way the honey above is. No that's not the queen, once you recognize her, you'll never mistake another bee for being the queen again. She's quite different. Eggs are hard to see when you are wearing a veil. If you are braver than ordinary, get yourself a pair of safety googles, the kind that completely protect your eyes with soft silicon rubber around the sides so you don't get stung in the eyes. You can see much better. However with practice you can learn to see fine details with the veil on. 3. Thanks, Leslie and E! I am super glad to know that the first picture is normal capped brood, so I am sure that I've got a queen. The second one just had me confused! I am hoping to get more photos from Deb later today. I need to make a top-bar stand so I can take my own pics, too. 4. I don't know anything, but it certainly is pretty. I saw a queen in a museum hive a few times. She's bigger than the rest. 5. I'm in my 2nd year, so don't take my word for the bible, but that looks like nectar at the top of the comb and capped brood. Capped honey - especially on a brand new comb - s/b PURE white. I also see a larva, so that indicates to me that this is a brood comb. It's in the middle (from L to R) where there are 3 cells in a row, at the bottom of the honey strip/top of the brood nest. I bet it'll be capped in another day or so; the grub looks pretty big. Your queen has a pretty tight laying pattern, which I'd be very happy with. Just a few missed cells is ok. I've got 15 combs, 13 of which are brood. During a strong nectar flow, some colonies with use the first 1 or 2 bars closest to the entrance as a dumping ground for nectar. Stop, drop, and get back out there! As for the queen, usually she has a shiny thorax. That makes her a standout for me. Looking for the elongated abdomen is good, but some workers have long abdomens that'll make you wonder. Until you've seen Her Highness, that is! Good luck on your quest... you're off to a great start. 6. I'm overwhelmed when I look at this because I'm not sure what I'm supposed to see -- but it's amazing. So cool that you're doing this... 7. YOU are my hero!!!! Wow. I'm simply amazined. I've always been fascinated by bees. 8. Betts and HB, yeah, she should be somewhat bigger and, well, different looking. If I'd been thinking, I would have asked Deb to take a close-up of each comb front and back and might have found her that way, but she's not on any of the comb I do have pictures of. But that's OK. I know she's there now. Thanks for all the hints, HB! I will need to go back in soon, because I'm seeing some side attachments through the window now. Need to cut those. Kelly, I'm only just learning myself what to look for! It's a whole new world there. Thanks, Jaden! It's really pretty cool, and not as hard as I thought it would be.
global_01_local_2_shard_00001658_processed.jsonl/18085
You will see her sitting in the coffee house, reading old books for university. You will see him walking down the city street in a suit that must be so uncomfortable in this weather, conducting business on his phone as he goes. You may think she looks like you wish you had been at that age - spunky, interesting, with a genuine interest in Ancient Greek literature and an ability to read it. You may wonder about him, with your eyes narrowed and a heart too hurt - how many women has he harassed today? You will not know that she struggles with chronic illness, with a depression that haunts her life like a moon, waxing to pain, waning to darkness, and that it's taking all her strength to hold on to the dream of a university degree, even though she can't imagine her future clearly. You will not suppose all the bandages on her brain. And you will not know that he has to take a deep, unsteady breath before he talks to anyone, and that his father never had time for him, and that he hugs a pillow when he sleeps because otherwise the chips and shreds of old, cold sorrows that embed his heart will stir, and stab him from within. You might not remember that he isn't a gender, nor a representative of the patriarchy, just a person. All these things you might get wrong, because you are a tangled-up, intricate, uncertain, vulnerable, real person too. SONDER: the realisation that each random passerby is living a life as vivid and complex as your own. (John Koenig) 1. so true poetically expressed best to never assume 2. beautifully said...I'll be thinking on this for weeks to come. 3. Thoughtful, and sadly beautiful. We are all they, they are all us. ♥
global_01_local_2_shard_00001658_processed.jsonl/18093
Sep 1, 2008 Moez Masoud Considered to be one of the most influential religious speakers in Egypt, Moez Masoud gained entry to the religious arena because of his brush with near death experience with tumour. He swore his life to Allah s.w.t that he will be in service to Islam if given more time. Hence now he has travelled all around the world spreading the Islamic way of life, or rather also in the process open hearts to the faith Insyallah to many. My first encounter was with him was when my boyfriend showed me a videoclip of him on youtube. MasyAllah. His words are divine indeed. And so humble to boot. I shan't rob you of your experience so click away and view :) I was also quite privilleged to get to watch one series from Stairway of Paradise hosted by non other than him of course, on Women in Islam and it really made an impact for me. He concluded that both men and women are equally superior and just have different strengths and rather come into a competitive point we should have co-operation with one another for spiritual alleviation. My GOD! I'm speechless and at awe that he leads the discussion with such compassion as well. His objectiveness does not open room for argument. Well in my opinion anyways. And I'm quite a hard headed person when it comes to forums that are bias. I'm a fan no doubt. He's the best example of what a khalifah of the earth should be. I hope that I get to watch more of his English shows and get enlightened by it. I feel that I lose out on a lot of things because I don't understand Arabic. :( In due time this shall be overcome. God willing. No comments:
global_01_local_2_shard_00001658_processed.jsonl/18101
બુધવાર, 2 માર્ચ, 2011 The cosmos moves in a definite pattern, with mathematical precision, in a certain pre-chartered, abstract direction and like the zero hour, its destination is the same as its starting point. The river flows through the mountain, to the plains to fertilize the fields on its banks, reaches the ocean to merge with it and helps the aquatic beings to keep alive, rises up in the sky to form clouds and again reaches the mountain to start the cycle once more. A star goes expanding and expanding till it can expand no more. Then it starts contracting progressively till it becomes a pin-point size speck and expanding again till it becomes a star. The same is the case with infinite numbers of souls who move like stars in the universe. All of them enjoy their freedom and shine as if they are smiling. But as they come in touch with Maya (the illusory material plane), the picture changes. Affected and infected by Maya, they lose their freedom and become subjected to the laws of Karma. Then they have to assume bodies and perform their respective Karmas. So, the cycle of births and deaths starts and in every species the soul is encased and it has to go on suffering right from birth till death. Phases of happiness make the suffering more agonizing by contrast. When a person meets a Guru, the Guru guides him to the right path and frees him from the clutches of Maya and the soul again starts moving towards the ‘Destination’ of freedom and inherent light in Akshardham, the abode of God, the abode of Shree Swaminarayan Bhagawan. Here, Maya can no more open her mouth to gulp the soul and can no more show her heart curdling clutches. Here she cannot tempt any soul. The literature of Swaminarayan way of life is as vast as the biggest iceberg. What we see in print is only a microscopic part of what has been written by saints who were contemporary to Bhagwan Shree Swaminarayan. A Sanskrit verse says: Infinite are the scriptures. Infinite are the branches of knowledge. Life span is too short. And many are the obstacles, so, follow only the essence. Like the swan that separates, milk from water. You must reach the goal of your life i.e. Akshardham. We look upon you as a hero. Across the snowy mountains. Across the teeming stars. Across the heaven unknown. The hero has no bars. ટિપ્પણીઓ નથી: ટિપ્પણી પોસ્ટ કરો
global_01_local_2_shard_00001658_processed.jsonl/18118
The 10 Commandments of Winning Teammates What Question Do Winning Teammates Ask? What Question Do Winning Teammates Ask? thumbnail Guest Post by Sean Glaze Not everybody in your organization is a winning teammate. That is because not everyone asks the right questions. But everyone can become a better teammate by asking a better question. And the most powerful question you can ask, regardless of the industry you are in, is this: “Who is the best teammate you ever had?” According to Webster’s Dictionary, a teammate is a person who belongs to the same team as someone else. And we are all part of some kind of team… because LIFE is a…
global_01_local_2_shard_00001658_processed.jsonl/18123
(redirected from counter transference) Also found in: Dictionary, Thesaurus, Medical, Encyclopedia. See: alienation, assignment, carriage, consignment, conveyance, deed, delivery, demise, devolution, disposition, extradition, removal, subrogation, takeover, transition, transmittal References in periodicals archive ? Many writers who place great emphasis on parallel process and psychoanalytically derived ideas of transference and counter transference pass very quickly over the fact, pointed out by Du Plock (2009), that as supervisor I have no direct access either to the client's narrative of the experience of being or to the supervisee's experience of being in relation to the client. I realize my own counter transference with Anthony.
global_01_local_2_shard_00001658_processed.jsonl/18131
Sunday, 11 March 2007 29. What controls our minds? Many of us believe that we can think what we like, even if we may have to be careful in what we say or write. This is an illusion. From the moment we are born our minds are being moulded to think in particular ways, to see certain objects, to make certain connections, to establish particular patterns, to value specific things. Other things around us are invisible, unregistered, unvalued. This filter influences the way in which I write and you read these Letters. It also shapes the way in which readers in other parts of the world, whose mental spectacles are different from the English ones, understand what I am writing. Time flies like an arrow – or does it? In most human societies, time has not been seen as a straight line. It has usually been thought of as circular, reflecting our normal experience. In plants and animals there is birth, maturation, aging, death, perhaps re-birth. So it is with the days and nights and with the seasons of the year. Time does not advance, it is not split into tiny elements, its rhythm is slow and repetitive, it is not independent of us. The very movement of the stars in the sky declares that motion is circular. And we know from our experience that time feels elastic, passing too fast or too slowly. The posh name for this is relativity. As Albert Einstein explained, ‘When you are courting a nice girl an hour seems like a second. When you sit on a red-hot cinder a second seems like an hour. That’s relativity.’ Yet you and I treat time in a more mechanical way, and no-one is sure why we now have this peculiar attitude. We not only sub-divide it into tiny bits, but look on it as a scarce commodity, draining away, to be saved or spent. It is also thought to be going somewhere, aiming towards some future event, like a river or an arrow, and it ticks away irrespective of how we feel about it. We are not like the nomadic Arabs who knew that it was autumn when they came upon a valley with a certain kind of mushroom growing in it. We know when it is autumn and go to that valley specifically to collect mushrooms. Except in the jokes about confused tourists who wake up and say to themselves ‘We are in Tokyo, it must be Thursday’, we tend to think first of time, and then arrange our lives around it. There are several theories to explain our obsession, our battling, with time. There is a religious element. Judaism, Christianity and Islam seem to have an idea of time as a progression or straight line. This is very different from the circular concepts of Hinduism or the annihilation of past and future in certain forms of Buddhism. This particular thread was given heavy emphasis when Protestantism emerged in the sixteenth century. From then, God was particularly concerned that we did not waste time or our talents. Accounting for what we do, making every moment count, turning time into profitable activity, were strongly encouraged. Time had been reckoned in all previous civilizations as reflecting the circular rhythms of nature. Sun-dials and gravity clocks using sand or water were the only ones that existed until the tenth century A.D. Then something strange happened which set time free. A device was developed (the escapement), which broke the continuous motion of gravity into little equal bits. It rotated back and forth regularly like the tick-tock of a clock. There is disagreement as to whether it was invented in China or the west, but certainly it was in the latter that it was rapidly developed. It is also argued that the regular, enclosed, rhythms of the monastic orders, with their bells and tight time schedules, required such a precise clock to be developed. In other words a new sense of time accounting was present before the mechanical clock was invented. Other suggest the opposite. They say that it was the new clocks available from the twelfth century which gave us a more exact sense of time. Whatever the answers to these questions of cause and origin, it is not difficult to see how much we are obsessed and ruled by time. We learn to internalize it, to fear or fight with it, to think of it as a commodity to consume. Even with the spread of mobile phones, a recent check among my students suggested that the watch is still the most common machine we carry around. We now imagine microscopic slices of time, micro-seconds and nano-seconds. Our attention spans have shrunk and our civilization ticks to the clock and whirs with ever faster travel and computers. Do we look to the past or the future? In most traditional societies, people tended to look to the past. They revered their ancestors, tried to retain the traditions, lived in a remembered world. In contrast, increasingly for us the past is a foreign country where strangers lived. Most people, especially in rapidly changing societies like America or China, tend to think much more about the present and particularly the future than the past. They see little or no connection between themselves and previous generations. The threads are cut, they have nothing in common with the landscape they live in, except as ‘heritage’. Science fiction rather than historical fact interests them. Again it is difficult to know why this great change has taken place. Its roots are partly religious and philosophical. Most religions had their great moment in the past, in the life of Buddha, Mohammed, the Prophets or Confucius. Christianity however looks forward to ‘The Second Coming’. Like Communism, it is a Utopian Faith, travelling hopefully towards a world where all sin and misery will be cleansed from earth. Technology also plays a part. Rapid change cuts us off from the past. The great inventions of printing, the compass and gunpowder meant that the seventeenth century philosophers felt that they were no longer the same as the Ancients. They were no longer living in a circular world, for there was real progress. Now we often feel that those who lived before electricity, cars, photography and modern medicine must have been very different. Technological change is so rapid that a world before the internet, mobile phone, genetic engineering and the latest generation of weapons, seems a different one, with little to teach us. Societies which are based on the premise of the hierarchy of caste tend to emphasize links with the past. Previous events explain and justify present inequalities. Noble families treasure their family trees and pay respect to their ancestors. Even ordinary families maintain their position by attention to past origins. When a new world was created in the United States, based on equality at birth (at least for whites), the interest in the past was cut off in one stroke. We ourselves make our own way in life. What our family was or did in the past is largely irrelevant, or just a leisure interest, as in the great interest in family genealogy. Live for the future, make and re-make your world is the view of many. America has been settled by its majority population relatively recently. Yet its citizens hope and sometimes believe it has a great future. I remember the surprise on my first visit as I passed through the customs and instead of being asked ‘how are you?’ (or as I would have been in my Nepalese village, ‘have you eaten rice?’) I was greeted with a cheerful ‘Have a good day’. Why does money matter? ‘Time is money’ is an old saying, showing the connection between two of our obsessions. What then is money, this strange thing which, like time, consumes much of our attention and dominates our lives to such an extent? Money is a trick or a fiction; it is a symbol which has no intrinsic value. Gold, silver, jewels, bits of paper or cowrie shells are in themselves useless and valueless. Value is injected into them by humans. This explains why almost anything can be ‘used’ as money. At school money was sometimes marbles, sometimes white mice, sometimes sweets. In many parts of Asia, tea blocks are still used as money. They are in many ways a good form of money since they can at least be boiled up and drunk in an emergency. In others, salt, pepper or spices are used, or precious incense. Elsewhere it is shells or stones. These items seem to have intrinsic value, not merely something injected into them. Whatever form it takes, it turns into full-blown money when the object can simultaneously be a store and measure of value and an item of exchange. It is our attitude to it which determines its value. Hence it is not money itself which is said to be the root of all evil, but, according to the Bible, the love of money. Money stands for a relation of power over others. It is like oil in a machine, for it allows the parts to function without grinding against each other. It is a translation device, a leveller, it makes objects in different spheres exchangeable. It allows us to create one commodity and then to exchange this for another. It has no morality, no inner essence, but it can enter almost all of our life. We do try to protect specific areas with invisible signs ‘No money here’. Certain beautiful things are beyond the reach of money. I cannot sell King’s College Chapel, or even the hundredth part which I appear to own as a Fellow of the College. I cannot buy or sell true love or friendship. I cannot buy or sell truth or religious salvation, although the Catholic Church did at one time sell indulgences. I cannot buy part of the public park in the centre of Cambridge. I cannot buy a place in a cricket team, an orchestra or a chance to study at King’s College if I have no talent. Yet in much of our life, money holds us to ransom. It slips through our hands in a slithery way. The more we have, the more we seem to need. Few people admit to having too much and many have less than they need or want. Indeed much of our capitalist world is propelled by an apparently unavoidable shortage of money. This is created by the desire for the substance itself. It seems, as in many fairy stories, to turn into dust when it is touched. In comparison with most of the world we are ‘affluent’ or rich in Britain. Our world is awash with the things that money can buy. Yet few of us feel satisfied. At the other extreme there are some simple societies where people wander about in forests and savannahs. They appear to have hardly anything at all, yet it is reported that they feel satisfied with their lives. This paradox arises from the fact that satisfaction comes from the relation between means and ends, income and expenditure. This was immortally put by Mr Micawber in David Copperfield by Charles Dickens. ‘Annual income twenty pounds, annual expenditure nineteen nineteen six, result happiness. Annual income twenty pounds, annual expenditure twenty pounds ought and six, result misery’. Some simple hunting and gathering societies had a finite need for food and water, for shelter and clothing, and for leisure and social relationships. There is more than enough of all of these; ‘income’ exceeds demand. We, on the other hand, often reach for the stars, have an open-ended demand and a deep craving for more and more. Very soon we forget that what made us happy yesterday would not satisfy us for a moment today. I met a Chinese man in his thirties. He said that as a country boy all he wished for in life was one day to be rich enough to have boiled dumplings every morning like his city cousins. Now his daughter wants a Ph.D. from Peking University. The ‘revolution of rising expectations’ condemns many of us to eternal dissatisfaction. Buddhism calls understanding this the second Noble Truth. Each choice we make is a minor deprivation. At the restaurant of life we can only gorge ourselves on a certain amount. If we choose the curry, there is sadness that the pizza or stew is untasted. The Romans made themselves vomit so that they could enjoy the taste of more food, but in the end even they were satiated and could not eat everything. We always want more. Happiness is seen as lying in some future bonus or better job. Yet we are constantly brain-washed to think that money really exists, and that the more we have of it, the happier we will be. The whole capitalist consumption machine, would crash to the ground if we could not be persuaded to spend, spend, spend. The billboards, television advertisements, life styles of media and sporting heroes constantly shout ‘Money, Money, Money’ at us. It is therefore sensible from time to time to stand back. We can try tasting a bit of money in our mouth. It tastes (unless it is tea or pepper) of nothing. Nor does it last. As the Irish philosophically put it, ‘a shroud has no pockets’. That wise economist Adam Smith, pointed out that if we want to escape from the trap of anxiety and dependency on money, the thing to look at is not how to get more money, but how to spend less. For though we can never earn enough to satisfy our ever-expanding cravings, through frugality we can learn the pleasure of being free from care. We certainly need sufficient money in the present world and, as the comedian Woody Allen observed, ‘Money is better than poverty, if only for financial reasons.’ We can also perhaps start to enjoy one of life’s greatest delights, which is seeing how a little of the extra which we have saved can give relief and pleasure to others. For, as the philosopher Francis Bacon wrote, ‘Money is like manure, not good unless it be spread’. How sensible are our categories? Our culture teaches us to create a grid or map of the world, placing things into boxes. Some things are alike, others are different. Those that straddle the borders are often dangerous or dirty. We believe that these things really are what we believe them to be because of their innate qualities, that apples and plums belong to one class of things, cats and dogs to another. A delightful undermining of our categories is shown by the arrangement attributed by Dr.Franz Kuhn to a Chinese encyclopaedia called the Heavenly Emporium of Benevolent Knowledge. This divides animals as follows: The logic behind this is not easy to see and we may wonder what would happen if innumerable suckling pigs became frenzied and broke a flower vase at a great distance! We might think that this Chinese example is somewhat fanciful, but the Japanese numbering system is quite like it. For each class of thing there is a different series of numbers. The ordinal numbers ‘are divided into nearly as many series as there are classes of objects. There is one class for all animals – expect the flying and swimming species, and insects. Another for birds, in which, however, hares and rabbits are included! A third for ships, and junks, and boats; a fourth for liquids drunk with a glass, as water, wine, tea etc.; a fifth for things having length, as trees, pens, sticks, masts, beams, radishes, carrots, fingers, brooms, pipes etc. and so on ad infinitum;’ The author stopped there ‘in despair, foreseeing that they would fill a volume by themselves’. Yet, arbitrary as these classifications look, your or my classification would probably look just as arbitrary to a visiting spaceman. For instance, why do we classify the bottom of things as more stable and truthful than the top, so that what appears at the bottom of a television screens is more ‘believed’ than that at the top? Our mental worlds are filled with reflections of the present and past worlds which created them. These reflections in turn re-shape and determine what we can think. They are instilled in us by our family, school, media, friends. Only a considerable effort makes it possible to stand back and examine what have been called ‘the idols of the mind’, the things we fall down and worship without much thought. How can we talk about our world? The difficulty of examining our mind’s hidden paths is made even greater by the entrapment of language. As Rudyard Kipling rightly observed, ‘Words are, of course, the most powerful drug used by mankind’. Their power is not just mental. As the Japanese proverb puts it, ‘One kind word can warm three winter months’. Almost everything we do and feel is affected by language. So, although our thought is not determined by language, it does set a grid through which we see, feel about and report our world. The comparative linguist Benjamin Whorf wrote that ‘We dissect nature along lines laid down by our native language… Language is not simply a reporting device for experience but a defining framework for it.’ For instance, by contrasting English and Hopi, Whorf tried to show that, in English, time is divisible into past, present and future, while in Hopi there is just a division between those things that are manifest and those that are still in the process of being manifest – there is no equivalent of past, present and future tenses. This alters our way of perceiving time. In Japanese there are no tenses, no way of knowing whether something has happened, is, or will be happening. There is no use of pronouns, so one does not know if I, you, we or they are doing something. There is no positive and negative distinction. So if we invite someone to dinner and they say ‘hai’ it means yes or no. This is combined with many other, to us odd, features of grammar and syntax and the fact that sets of characters (there are three systems in Japan) can mean entirely different things. I well remember sitting for fifteen minutes while a Japanese companion went through a menu with the waitress and tried to ascertain what certain dishes on the menu really were. When the food finally appeared, it bore little resemblance to what we thought we had ordered. It is no wonder that the Japanese have a proverb, ‘language is a barrier to communication’, and prefer haragei or body language to the spoken form. Each language has its peculiarities. English has very little grammar, but lots of words. Romance languages (the ones which come from Latin, including French, Italian, Spanish) force us to specify the gender of all nouns. Certain American Indian languages force people to indicate whether an object is near or far from the speaker and whether it is visible or invisible. In the Himalayas, it is not difficult to see why there are three forms of the verb ‘to come’, meaning to come up, to come down, or to come on the flat. It is an endlessly enthralling topic. For example, can we see things for which we have no word? Among the people I work with in Nepal there is only one word, pingya, which means both blue and green. Can they see the difference if they cannot speak it? A clue to the answer is given by the fact that in Russian there are two words for ‘blue’ which roughly mean light and dark blue. A Russian anthropologist studying us might come to the logical, but incorrect, conclusion that because we cannot differentiate the two blues, the Oxford and Cambridge boat race teams could not tell each other apart. When I asked my Nepalese friends they said that of course they could see the difference between the green grass and the blue sky. The nature of the primary colours, and the very idea of what ‘colour’ is varies greatly. In China, Japan and Korea there are five primary colours: white, black, green-blue, yellow-red, brown-red. We do not consider white and black to be ‘colours’ at all, but have a wider range of primary colours including yellow. Thinking is our strongest survival tool, and language and culture the expressions of this. Yet we are constantly trapped into certain habits of the mind. Much of our world goes unnoticed, or noticed too strongly. Yet these blinkers are at least half-explicit and we are taught a little about this at school, especially if we learn other languages. Deeper and less examined are the seductions of our senses, the ways in which knowledge comes in through our ways of apprehending reality through our body. 1 comment: Rachel C Miller said... Born to a large family and having a large family of mine own I am aware how genetics play a part in our thinking, It has little to do with our surroundings and more to do with our engineered biological make up, though the debate amongst scholars try to disprove the factors of DNA or the conditions with which we are raised. I have witnessed greatness from the worst of situations and those who appear to have everything squander and suffer at the hands of their personal demons. Biblical in a historical way,it had been said that the vast majority of people are followers and look for leadership. Is this to say that intelligence amongst people vary? Factual Indeed in a societal view the average person is the mainstream and I Q does indeed vary. Reading stories of Hitler he started out as not so bad a leader and with power he ended the period of time as a hellish figure of leadership. Separatism does just that separates the people and we can only learn and grow by the mere mingling of minds, for acceptance of our brother and sisters of the world will prove that the blood that flows through all our veins remains red. I enjoyed your blog, causes one to think.
global_01_local_2_shard_00001658_processed.jsonl/18141
Saturday, December 31, 2011 Fancy Park. It has been pretty great. IT gives you something to think about. We went to an amazing park right by a gigantic body of fresh water. Having grown up next to and around the Lake, I took that thing for granted. But seeing it now reminds me of some kind of science fiction. Like another Moon. Like Mountains in the sky. IT's crazy. We saw two big black dogs. We also saw a very small, soft plant. I don't know, I got a lot to ponder I guess. No comments: Post a Comment No dick heads please.
global_01_local_2_shard_00001658_processed.jsonl/18148
Gimp Batch Command Experienced An Execution Error Above is an example of the complete batch file script. Below is a breakdown of what is going on in the script. @echo off This simply prevents commands from being displayed in the command prompt, which is used to execute your batch. Batch conversion for images from command line on Windows. – I have a script based on GIMP batch tutorial:. Batch conversion for images from command line on Windows. batch command experienced an execution error: Error. Advertisement “This is one of the first times we’re actually using information from the experience that people will have once they click something to help inform the ranking in News Feed,” product manager Greg Marra told Recode One. Dec 31, 2013. In my script I'm calling the 'gimp-image-select-polygon' plugin. One of the. batch command experienced an execution error: Error: ( : 1) Invalid. 3043 1 Error Norton client – First it was Abbe Lowell of Norton Rose Fulbright, who was lured into a public email. how the legal industry’s war on cyber-insecurity can be undone by. India coach Luis Norton de Matos would hope that his boys take his lessons. List of well known, registered, and dynamic/private ports. Hannah Wyrick totaled 22 For IAM reasons, you’ll sometimes get a permission error. However. the changes That enjoyable experience didn’t last long. We found that synching content was too hard to debug, so instead used the s3 sync command. That’s where. Install LaTeX for Windows 7 – a complete setup – Everything for LaTeX under Windows 7: Installation of MikTeX, Editor, Postscript, PDF, HTML conversion. The one-stop-shop. Informacin De Supersocket Spnregister Error 1355 Describes that you may receive a "Warning SuperSocket Info" warning. The following event may be logged in the event log: NoteError 1355 is equal to. This is shown as a warning for the SPNRegister function and as an error for the. В статье описано предупреждение «Warning SuperSocket Info», которое появляется в том случае, Warning SuperSocket In my Apache experience. create an httpd.conf file with an error or two. [[email protected] bin]#./apachectl configtest Syntax error on line 22 of /usr/local/apache/conf/httpd.conf: Invalid command ‘sserversignature’, perhaps misspelled or. Sep 9, 2013. SET gimpEXE="C:Program FilesGIMP 2bingimp-2.8.exe" for %%i in. Note that the %%i is only necessary if this is contained in a batch file. The error says "unbound variable: myimage". This is telling you that you are referring to a variable/function called "myimage," but you never. I need a bit of help, please, with scripting a batch process for GIMP. exist any longer. batch command experienced an execution error: Error:. Hi! I'm reading this tutorial: I did everything as sad, but when I try to execute the script like this: I am trying to execute a Python piece of code in batch mode to edit an existing Gimp file. Getting the following error batch command experienced an execution error. Outlook 2010 Error Temp A co-worker of mine if trying to setup Out-of-Office message in Outlook 2010 but he keeps getting an error message: Your automatic reply settings cannot be displayed because the server is currently unavailable. The operation cannot. Describes an issue that triggers an error during Outlook startup. Occurs when the Cache. not create the work file. RECOMMENDED: Click here to fix Windows errors and improve system performance
global_01_local_2_shard_00001658_processed.jsonl/18156
[Bioperl-l] How to parse BLAST output - all hits of each query in new file Tim timbourine81 at gmail.com Wed Nov 25 12:40:52 EST 2009 Dear bioperl users, I am a real newbie and have - maybe a very trivial - question. I searched the mailing list archive and many howtos but I have not found a concrete answer to my problem. So hopefully you can help me :) Background: I use the latest Bioperl version (installed it two weeks When I use Bio::Tools::Run::StandAloneBlast to BLAST one fasta file including different sequences, I get a BLAST output with many queries each having several hits / sbjcts. My problem is how to parse *all* hits of *one* query into a single new file. And this for all the queries I have in my BLAST output file. Or is it better the other way round; first to make fasta files with only single sequences inside and BLAST each file? But how can I automize that using Bioperl? I tried Bio::SearchIO but can only parse all queries and their respective hits in only one file... I think iteration is also necessary here, but I do not really know how to include that into Bio::SearchIO. Or do I have to use Module:Bio::Index::Blast? I can index a file (see below), but I have no idea what comes next... ###How I index a file... #!/usr/bin/perl -w use Bio::Index::Fasta; $file_name = "8_to_BLAST_two_seq_index.fasta"; $id = "48882"; -write_flag => 1); Hopefully, you can give me at least hints what to look for. A big THANKS in advance! More information about the Bioperl-l mailing list
global_01_local_2_shard_00001658_processed.jsonl/18158
OASIS Mailing List ArchivesView the OASIS mailing list archive below or browse/search using MarkMail. Help: OASIS Mailing Lists Help | MarkMail Help Re: [xml-dev] xml + style. On Mon, 21 Jun 2010 14:15:03 -0400 David <[email protected]> wrote: > > For the sake of argument, lets say the author and xml geek > > sit down together and the author generates plain text, the geek > > styles it via markup *selected by the author*, if she understands > > tha italics means a medicine, fine. Then we have something like > > <medicine s:use-attribute-sets='italics'>Asprin</medicine> > > I'm choosing xsl-fo syntax for want of anything better. > > > > > > > I'm not entirely sure what your question or intent is here. > I do find this example intriguing as it is in some ways a simple > solution to 'overlapping markup' (well, as long as the overlaps start > and end at the same place :). > It encodes as 'primary' the semantic markup ( "medicine") and encodes > as secondary a presentation 'hint' ("italics"). This implies > elsewhere you might want to have medicine in bold instead ... Yes, same way that XSLT uses this indirection, simply for efficiency. > But I'm curious what your underlying question or point is. Are you > asking if this is "good style" ? or "prevalent in the real world?" or > something different ? I was asking if any other work has been done in this area. It's largely been a sacred cow since XML, I no longer take that view. Dave Pawson News | XML in Industry | Calendar | XML Registry Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement Copyright 1993-2007 XML.org. This site is hosted by OASIS
global_01_local_2_shard_00001658_processed.jsonl/18193
Long Lances From A Wiki of Ice and Fire Jump to: navigation, search The Long Lances David Horne Long Lances.png © Fantasy Flight Games Current Commander Gylo Rhegan Size 800 riders[1] The Long Lances are a mercenary company found in Essos. They have eight hundred riders,[1] and are being led by Gylo Rhegan.[1] Recent Events A Dance with Dragons The company is under contract from Yunkai and is the first to be dispatched to Slaver's Bay.[2] They later participate at the siege of Astapor and later Meereen.[3] During the Stormcrows' mission to Lhazar to secure an alliance with Meereen, the Yunkish send the Long Lances to close the Khyzai Pass. The Stormcrows descend on the Long Lances in the night and defeat them, losing nine men in the process. Twelve Longe Lances go over to the Stormcrows.[4] The Winds of Winter As the Second Siege of Meereen begins the Long Lances are defending the Ghost of Astapor. The Mother's Men soon break the Long Lances like a rotten stick and drag the trebuchet over with chains.[citation needed] Navigation menu
global_01_local_2_shard_00001658_processed.jsonl/18195
Download e-book for iPad: A Handbook to Literary Research by Simon Eliot, W. R. Owens (editors) By Simon Eliot, W. R. Owens (editors) Show description Read or Download A Handbook to Literary Research PDF Best literary books Foxtrot Oscar - download pdf or read online As an unrelenting heatwave beats down, the citizens of Horse's Arse—aka Hampstead New city, north Manchester—are attaining melting element. The Park Royal Mafia, a bunch of neighborhood villains, is lower than new administration and open for the company of senseless violence back. regrettably their antics have attracted the eye of a psychotic Turkish gangster, who is made up our minds the Mafia is simply what he must pull himself to the pinnacle of the legal heap. Get The Conflict of Religions in the Early Roman Empire PDF Initially released in 1902. This quantity from the Cornell college Library's print collections used to be scanned on an APT BookScan and switched over to JPG 2000 structure through Kirtas applied sciences. All titles scanned conceal to hide and pages may perhaps comprise marks, notations and different marginalia found in the unique quantity. Free City by Joao Almino, Rhett McNeil PDF This can be Joao Almino's 3rd novel to target the town of Brasilia, the social swirl of its early years, while contractors, company profiteers, idealists, politicians, mystical sects, or even celebrities mingled -- together with Aldous Huxley, Fidel Castro, Andre Malraux, John Dos Passos, Elizabeth Bishop, etc. Additional info for A Handbook to Literary Research Example text Selected reading Roy Stokes, The Function of Bibliography, Chapter 2 (pp. 17–44). 915–925). Questions and exercises 1 What is the link between the earliest libraries (particularly the museum and library at Alexandria) and the creation of the canon of Greek writers? How important are libraries in the creation of a canon? 47). Using your research library, find your own examples of each of these systems. 3 What is the ISTC, and what is its present stage of development? 4 Using your local reference library, find a subject bibliography that covers your own locale or, alternatively, an author or a subject in which you are interested. Do make sure that when you download data from the Internet you really will find it useful: there are data junkies out there who download megabytes of material in the fond belief that just collecting information is somehow virtuous and beneficial. If you can’t cope with it, if you can’t sort it out and make sense of it, then data is nothing more than electronic kapok. What is on the Web for a literary researcher? The simplest answer is: too much to describe here. Another answer might be: it all depends on what you are researching. 370– 73). As you will appreciate, such descriptive bibliographies are products of very slow and painstaking work. It would be impossible to record more than a fraction of the books produced by printing presses since the 1450s if all bibliographers were expected to be so thoroughly analytical and so comprehensively descriptive. Suggested reading Greetham, Chapter 4, ‘Describing the Text: Descriptive Bibliography’ (pp. 153–68). Gaskell, A New Introduction to Bibliography, ‘Bibliographical Description’ (pp. Download PDF sample Rated 4.04 of 5 – based on 25 votes
global_01_local_2_shard_00001658_processed.jsonl/18200
Author: (\/)@{-}! •5:55 AM Much of System Verilog is intended to be Synthesizable Author: (\/)@{-}! •4:59 AM  Tasks and Functions helps the designer to break up large behavioral designs into smaller pieces. The designer has to abstract the similar pieces in the description and replace them either Functions or tasks. This also improves the readability of the code, and hence easier to debug.  Functions : • Keywords:  function , endfunction  • Can be used if the procedure • Does not have any timing control constructs ; i.e Must execute in Zero-Time. • Returns exactly a single value • Has at-least one input argument declaration               function   <range_or_type>   function_name;                        input_port_declaration (s) ;                        local_variable_declaration (s) ;                        function_name = (expression);        Example : 01: Parity Generator             module   parity;                   reg [31:0] addr;                   reg parity;                  initial  begin                  always @(addr)                          parity =  calc_parity(addr);                          $display("Parity calculated = %b",     calc_parity(addr) );                  function calc_parity;                         input [31:0] address;                             calc_parity = ^address;       Example : 02: Controllable Shifter            module shifter;                 `define LEFT_SHIFT      1'b0                 `define RIGHT_SHIFT     1'b1                  reg [31:0] addr, left_addr, right_addr;                  reg control;                 always @(addr)                        left_addr  = shift (addr, `LEFT_SHIFT);                        right_addr = shift (addr,`RIGHT_SHIFT);                 function [31:0]  shift;                          input [31:0] address;                          input control;                             shift = (control==`LEFT_SHIFT) ?(address<<1) : (address>>1); • Keywords: task, endtask  • Must be used if the procedure has • any timing control constructs ; i.e @( ..) , #delay , wait  e.t.c • zero or more than one output arguments • no input arguments              task task_name ;                     port_declaration (s);                     local_variable_declaration (s);       Example : 01: Use of input and output arguments              module operation;                    parameter delay = 10;                    reg [15:0] A, B;                    reg [15:0]  AB_AND, AB_OR, AB_XOR;                       $monitor( …);                   always @(A or B)                           bitwise_oper(AB_AND, AB_OR, AB_XOR, A, B);                   task bitwise_oper;                        output [15:0]  ab_and, ab_or,  ab_xor;                         input [15:0] a, b;                                         ab_and = a & b;                                         ab_or = a | b;                                         ab_xor = a ^ b;        Example : 02 : Use of module local variables             module sequence;                reg clock;                task init_sequence;                   clock = 1'b0;                task asymmetric_sequence;                       #12 clock = 1'b0;                       #5  clock = 1'b1;                       #3  clock = 1'b0;                       #10 clock = 1'b1; Difference between Tasks and Functions  • A function can enable (call) just another function (not task) ; A task can enable other tasks and functions. • A function execute in 0 simulation time ; A task can execute in non-zero simulation time. • A function no timing control statements allowed ; A task may contain any timing control statements • A function must have at-least one input argument ; A task can have arbitrary input, output, or inout • A function return only a single value ; A task do not return any value • Tasks and Functions are defined in a module  • Tasks and Functions are local to the module • Tasks and Functions can have local variables (registers, but not nets) and events • Tasks and Functions contain only behavioral statements • Tasks and Functions do not contain initial or always statements • Tasks and Functions are called from initial or always statements or other tasks or functions.  • Functions are purely combinational , typically used for conversions and commonly used calculations ; Tasks can be used for common Verilog code. Author: (\/)@{-}! •11:43 AM How to generate coverage in VCS (SNPS) , QUESTA and NC STEP1:  Compile your design files with your selected coverage               QuestaSim  >  vlog  +cover  <bcst>   -f  design_file_list                +cover [=s b c e f t x]   Enable code coverage metrics by specifying one or more of the characters:                              s - Statement                              b - Branch                              c - Condition                              e - Expression                              f  - Fsm                              t  - Toggle                              x - Extended toggle                            Note:  If no character is specified, sbceft  is the default.  STEP2:      Simulate with the coverage option                   QuestaSim > vsim  -coverage file_testbench.v                   and the    run   -all                    You can enable it using GUI Mode also.                   Go to  Compile  >  Compile Options and select the Coverage tab.Another option is,you have to just right-click on your design file at "Project" and choose "Properties". Now, you can see coverage tab. After running the simulation and you will be able to see the coverage tabs for analysis.                    If you are running regression and you have to save the coverage report of the first test (UCDB file) and merge to the next UCDB of the next test till the regression finishes.And finally you will be able to the  see total Code Coverage.                    vsim   -c  -do  "coverage  save -onexit  <TESTSET_CODE_COVER>.ucdb ; run -all;exit"  -coverage  -voptargs="+cover=bcfst"  <otherOptions>  <TOP> Here we tell vsim  to     1.  Enable code coverage (-coverage),     2.  The types of coverage to collect (via  -voptargs=+cover= bcefst").     3.  To produce a coverage database file on the exit of simulation  (do "coverage save -onexit coverage.ucdb)     4.  Continue the step1 and Step2 till the regression ends             Further if you have multiple coverage databases, you can merge them into a single database by using:                 vcover  merge <ucdbFile1>.ucdb   <ucdbFile2>.ucdb  ...  <ucdbFileN>.ucdb   <ucdbFileResult>.ucdb             The finally you can generate a HTML report:                vcover report  -html  -htmldir  <dirToOutput>  -verbose  -threshL 50  -threshH 90  <ucdbFileResult>.ucdb ncverilog  <OTHER_ARGUMENTS> +nccoverage+all +nccov58 +nccovworkdir+cov_work +nclexpragma +nccovtest+<testcase_name> +nccovoverwrite +nccovdut+worklib.dut_top -T 1. For switching coverage ON :  Use +nccovfile+dut_cov.txt  while compiling.    //*********************dut_cov.txt****************//           select_coverage -all -module top Note : During simulation use : covoverwrite  -covtest mycov.cov 2. To view coverage:          iccr -keywords+detail iccr1.cmd        OR          iccr -keywords+summary iccr2.cmd   OR          iccr -keywords+dontmerge iccr3.cmd        //********************* iccr1.cmd **********************//           merge cov_work/design/test* -output merged_dir           load_test cov_work/design/merged_dir                                                                                                    report_detail -instance -betsafd -cgopt top... > detail.rpt       //********************* iccr2.cmd **********************//           merge cov_work/design/test* -output merged_dir            load_test cov_work/design/merged_dir                                                                                                    report_summary -instance -cgopt top... > summary.rpt        //********************* iccr3.cmd **********************//           load_test cov_work/design/*           report_summary -instance -cgopt top... > summary.rpt 1.  To generate functional coverage       % urg -dir simv.vdb 2.  To generate code coverage      % vcs -cm_pp -cm_dir  -cm_name  XXX  -cm_report summary Author: (\/)@{-}! •10:31 AM Example :              interface  ahb_vip_intf ;              class AHB_driver ;                 virtual ahb_vip_intf  intf;                 functional new(input virtual ahb_vip_intf intf);                         this.intf = intf;                task main() ;                    intf.sig1 =1;                    ........ ; Author: (\/)@{-}! •8:04 AM                                                                Asic Design Flow                                                     Step 1: Prepare an Requirement Specification Step 2: Create an Micro-Architecture Document. Step 3: RTL Design & Development of IP's • Step 4a: Perform Cycle-based verification(Functional) to verify the protocol behaviour of the RTL • Step 4b: Perform Property Checking , to verify the RTL implementation and the specification understanding is matching. • Step 7a: Perform the Netlist-level Power Analysis, to know whether the design is meeting the power targets. • Step 7b: Perform Gate-level Simulation with the Synthesized Netlist to check whether the design is meeting the functional requirements. • Step 7c: Perform Formal-verification between RTL vs Synthesized Netlist to confirm that the synthesis Tool has not altered the functionality.( Tool: Formality ) • Step 7d: Perform STA(Static Timing Analysis) with the SDF(Standard Delay Format) file and synthesized netlist file, to check whether the Design is meeting the timing-requirements.( Tool: PrimeTime) • Step 9a : Release the floor-planned information to the package team, to perform the package feasibility analysis for the pad-ring . • Step 12a: Perform the Routed Netlist-level Power Analysis, to know whether the design has met the power targets. • Step 12b: Perform Gate-level Simulation with the routed Netlist to check whether the design is meeting the functional requirement . • Step 12c: Perform Formal-verification between RTL vs routed Netlist to confirm that the place & route Tool has not altered the functionality. • Step 12f: Convert the ATPG test-vector to a tester understandable format(WGL) • Step 12i : Perform the ERC(Electrical Rule Checking) check, to know that the design is meeting the ERC requirement. Step 16: Perform the Package wire-bonding, which connects the chip to the Package. Author: (\/)@{-}! •12:49 AM This story is about a boy who is born to a family, where the parents earn for their survival and have no big dreams of making their son an Engineer or a Doctor. One day an elder of the village asked the parents to educate their son so that he can put an end to their struggle. Thus the parents decide to send their son to school. They put their son in the government school of their village. The boy did not have high aims from the day one of becoming anything; school was just a routine thing to him. He wanted to be perfect in blending with others in school. So he imitated what others did. His parents always encouraged to study well, so he used to mug up everything to impress his teachers. In his 7th class he became the topper in his Mandal. The toppers who scored high in Math’s and Physics were felicitated. So this boy thought that he would only get recognized if he tops in Math’s and Physics. That day he decided that he would take Math’s and physics as his subjects to get a job in a government office. In their village hardly 2 or 3 people have studied till intermediate which is their highest qualification. One day a guy from another village who had studied MCA came to their house. He decided to help this boy by guiding him in Math’s and Physics for a good career. By the time he completed his 9th class he had already learned 10thclass syllabus, and passed his 10th standard with first class, which never happened in their village as people did not get more than 3rd or 2nd class. This boy had a cousin who liked him since they were kids. She dreamed of seeing him become a collector one day. But because if the lack of a standard education in their school, he had to struggle and study very hard to try to make her dream come true. He was the first person to get above 500 Marks in the Mandal. He also got above 90% in his Intermediate. His parents did not have money to send him to a good college so asked him to join any degree in a government college. He joined the degree college in their village and to earn money to pay his fees he joined a small theatre in the booking counter. One day a sir from APRJC came to see a movie but forgot to take the extra change after paying for his ticket. When he came back to take the money he asked the boy where he was studying his engineering. The boy said that he dint have money to pay his fees for engineering. The sir asked to teach mentally challenged kids in his school in subjects like mental ability and Math’s, the sir would in return pay for his semester fees for engineering. The boy had to face many challenges till his second year of engineering.  Like in every film there is a villan, there too is a villan in this story too, the girl’s father the boy’s uncle. Her father asked her to get married. But both of them had their dreams and wanted to make them true, so requested the boy’s uncle and tried to convince him at their fullest, but in vain. His uncle got the girl married off to an auto driver. With this all the dreams of the boy got shattered. He started drinking…and everything…started neglecting his studies When he reached his 4th year the boy fortunately met his School Principal Mr.Ramnarayana Sir who he considers as his God. The boy stayed with him for 1 year and completed his engineering. He guided the boy with his words “WALK SLOWLY….BUT NEVER WALK BACKWARDS”. Since there were no placements in his college he joined as JTO, and enrolled for Master’s program with JNTU to become a good VLSI engineer. He worked hard to learn from the industries experts, and his hard work paid off when he got a job in a good MNC. This story once again proves that hard work and dedication gives a man courage and strength to fulfill his dreams and ambitions.                                  SAY WHAT You Do .. Do What You Say ...                                                                Prove It .. Improve It ...... (\/)@{-}!  Author: (\/)@{-}! •1:12 AM /             -> "root" directory Moving around the file system: cd -> Change current directory to your HOME directory. Listing directory contents: ls list a directory ls -l list a directory in long ( detailed ) format $ ls -l ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ | | | | | | | | | | | | | | | | owner group size date time name | | | | number of links to file or directory contents | | | permissions for world | | permissions for members of group Changing file permissions and attributes chown cliff file => Makes cliff the owner of file. Moving, renaming, and copying files: cp file1 file2 => copy a file mv file1 newname => move or rename a file mkdir dir1 [dir2...] => create directories Viewing and editing files: SPACEBAR = page down q=quit. echo $SHELL Environment variables For example under the bash shell: Interactive History Filename Completion Bash is the way cool shell. command to a file 'newfile'. to the end of 'existfile'. For example: du -sc * | sort -n | tail Command Substitution For example: cat `find . -name aaa.txt` Searching for strings in files: The grep command Searching for files : The find command find search_path -name filename Tar examples: the file names to the screen. tar xvf archive.tar => extract from the archive file File compression: compress, gzip, and bzip2 compress part.igs => Creates a compressed file part.igs.Z uncompress part.igs => Uncompresseis part.igs from the compressed file part.igs.Z. Note the .Z is not required. uncompress utilities. gzip usually gives better compression than standard compress, gzip part.igs => Creates a compressed file part.igs.gz gunzip part.igs => Extracts the original file from part.igs.gz becoming more generally available. bzip2 part.igs => Create a compressed Iges file part.igs.bz2 bunzip2 part.igs.bz2 => Uncompress the compressed iges file. Looking for help: The man and apropos commands Do a man apropos for detailed help on apropos. Basics of the vi editor Opening a file => vi filename Creating text i => Insert before current cursor position I => Insert at beginning of current line a => Insert (append) after current cursor position A => Append to end of line r => Replace 1 character R =>Replace mode Terminate insertion or overwrite mode Deletion of text x => Delete single character dd => Delete current line and put in buffer u => Undo last command cut and paste yy => Yank current line into buffer nyy => Yank n lines into buffer cursor positioning ctrl+d => Page down ctrl+u => Page up :n => Position cursor at line n :$ => Position cursor at end of file ctrl+g => Display current line number if your keyboard mappings are anywhere near sane. string substitution ^ matches start of line . matches any single character $ matches end of line on each line is substituted. Saving and quitting and other "ex" commands Press to exit from an editing mode. :w                        Write the current file. :wq                      Write the file and quit. :q                         Quit. :q!                        Quit with no changes. :e filename             Open the file 'filename' for editing. :set number         Turns on line numbering :set nonumber      Turns off line numbering
global_01_local_2_shard_00001658_processed.jsonl/18211
Free and Discounted Ebooks The Veterinarian Cover image for Published: 1915 Language: English Wordcount: 67,095 / 208 pg Flesch-Kincaid Reading Ease: 59 LoC Category: Q Downloads: 1,117 Added to site: 2007.01.06 15729 rials which break out in the form of pustules about the mouth and the whole alimentary canal (stomach and intestines). SYMPTOMS: The appetite is impaired, the mouth hot, the pulse not much affected as a rule, the temperature is slightly elevated, the animal is unable to masticate, and small vesicles appear and eventually terminate into pustules and burst and discharge a small amount of pus at the parts where the sores are the deepest. TREATMENT: Remove the cause if possible. Feed clean, soft food that is easily digested, as hot wheat bran mashes and steamed rolled oats, vegetables, etc. For a mouth-wash dissolve the following: One dram of Copper Sulphate, one dram of Chlorate of Potash, one dram of Boracic Acid in clean hot water, and syringe out the mouth two or three times a day. To the drinking water add one ounce of Hyposulphite of Soda twice a day. Where the appetite is impaired, administer the following: Pulv. Nux Vomica, Pulv. Gentian Root, Pulv. Iron, Pulv. Nitrate of Potash each two oun We respect your email privacy login | register User ID reset password
global_01_local_2_shard_00001658_processed.jsonl/18220
Rachel Cusk's Arlington Park Even though the story is about five women living in a suburb outside London, Rachel Cusk’s novel, Arlington Park, is also the story of my own life, the life of one man who had lived most of his life more than 5,000 miles away in the urban center of Portland, Oregon. First there was the weather, the weather that matched in every way the mood of the town I had lived in for so long. All you had to do was look outside to glimpse the scene Cusk was describing in Arlington Park, the suburb depicted in her novel. The clouds came from the west: clouds like dark cathedrals, clouds like machines, clouds like black blossoms flowering in the arid starlit sky. It was so grey, so grey and unavailing! It was like sorrow: it seemed to preclude every possibility, every other shade of feeling. In the hall she took their wet coats and bags and umbrellas. They prised their water stained shoes, muddy, perilously garnished with soaked leaves, from their feet. It was messy work, the unending struggle to maintain separation between outside and in. Eventually, to be more exact, forty years after I arrived, I left that town that I never felt comfortable calling my home. None of the women in Cusk’s novel leave their home nor, given their age and the age of the children, are they likely to do so in the foreseeable future. Then there is the tedious, deadly feeling that sweeps over one living day after day in the suburbs. Cusk beautifully describes this mood, a mood that is not uncommon to me or most anyone, I think, regardless of where they live. How are you, Christine said, and Juliet nearly replied, Actually, I’m dead. I was murdered a few years ago, nearly four years ago to be exact. …air of empty seclusion was complete. It was a mysterious place, Arlington Park: it was a suburb, a sort of enormous village really, yet even here the force of life came up strong, dealing out its hard facts, its irrepressible, universal dimension.…It was civilization, and yet to Juliet it seemed uncivilized to the core. It lacked art: worse, it lacked any conception of justice. It was just getting and having—look at them all, backed up in their cars all the way to the park, jostling, fighting get and to have. Each of the women express their malaise somewhat differently. It was Juliet’s that interested me most, perhaps because of the solace she sometimes found in literature. Never, never did she feel in life the sense of recognition, the companionship, the great warm fact of solidarity that she found between the covers of a book. She wondered whether the books she loved consoled her precisely because they were the manifestations of her own isolation. But even that was not enough: You realize you’re waiting for something, Juliet said, that’s never going to happen. Half the time you don’t even know what it is. You’re waiting for the next stage. Then in the end you realize that there isn’t a next stage. That is all there is. Most of the women tried to confront the emptiness of their days with the customary experiences of modern life—home, marriage, children, shopping. Cusk makes it clear that none of these can do the job either. Her car was her true companion: it was clean and spacious and mechanically discreet, and it did her bidding powerfully, efficiently, and with silent approval of her style of command. When she was in her car she had a feeling of infinite passage. What an enormous kitchen! cried Sally Gibson, following Christine and Dinky in. In that moment Amanda knew that her kitchen was too large. She would not have thought such a thing was possible, but entering it now she knew that it was true. They had knocked through until they had created not space but emptiness. They had gone too far: nobody had told them to stop. The room, the house, even Arlington Park itself increasingly wore for her the lineaments of a lived past into which future possibilities were unable to intrude; of a fundamental sadness that was the unalterable relic of experience. How did Cusk manage to describe so accurately the situation that many people find themselves in today? Did it spring from the conditions of her own life? Who can ever know such things? What does it matter? She has got it just right. I know the weather, the boredom that can just as readily occur in the heart of the city as the suburbs, and the despair that sometimes descends upon one. Each experience comes and goes. There are some days where the weather is bearable, where something brings you alive, and where that elemental melancholy momentarily disappears. And then the winter begins again.
global_01_local_2_shard_00001658_processed.jsonl/18243
Badrīnāth, uninhabited village Badrinathvillage (uninhabited in winter) and shrine in northern Uttar Pradesh state, northern India. Situated in the Himalayas along a headstream of the Ganges (Ganga) River, it lies at an elevation of about 10,000 feet (3,050 m000 metres). Badrīnāth Peak (23,420 feet) is 17 miles (27 km) west. Badrīnāth It is located along the twin mountain ranges of Nar and Narayan on the left bank of Alakananda River. Badrinath gets its name from badri, a type of wild berry that once grew there in profusion. Badrinath is the site of a temple that contains a shrine of Badrīnātha, or Vishnu, Badrinatha (one of the many names of Vishnu) and has been a well-known pilgrimage centre for more than 2,000 years. The temple is believed to have been built by Adi Shankaracharya, a philosopher-saint of the 8th century. Badrinath Peak (23,420 feet [7,138 metres]) is 17 miles (27 km) west. Other sights at Badrinath include Tapt Kund, a hot spring on the bank of the Alakananda; Brahma Kapal, a platform used for rituals; Sheshnetra, a boulder that is believed to contain an imprint of Sesha Nag, the legendary serpent; Charan Paduka, which, according to legend, holds the footprints of Lord Vishnu; and Neelkanth, the snowy peak that towers over Badrinath and is known as the “Garhwal Queen.”
global_01_local_2_shard_00001658_processed.jsonl/18250
The Role Of The Outside Rep Is Shrinking and Changing As people costs continue to rise, jobs – in which there is no offsetting productivity or value improvement – are replaced by more efficient service options. Old-fashion service is nice, most of just don’t want to pay for it. Live symphony orchestras are, for example, great to listen to, but iPods are winning today. With good net-profit, per-customer analytics, most distributors are discovering that they have accumulated too many sales reps calling on too many net-profit-losing small accounts. How to serve the small accounts profitably is the tip of an iceberg opportunity. The fully-loaded, average cost of an outside sales call for a distributor continues to rise well past $100/call for most distributors. Calculate your average cost per call, then answer these questions: 1. How many calls should a rep make annually on a customer to have a productive relationship? 2. How much margin dollar spend per month and year should a customer have to support the sales service cost and still be net-profitable? 3. How many active accounts currently (and potentially) meet or exceed the minimum margin dollar per year hurdle? 4. How many accounts assigned to reps fall below the hurdle and are likely to remain so? 5. How many outside sales reps do you need to cover all larger, qualifying accounts? 6. Weakest reps typically have the most, losing small accounts and sit on the most upside potential in their few best accounts. What could a best rep with team support do with big sleepers? 7. If you: 1. Reassigned all of your too-small accounts (from all reps) to a new, service-model division. 2. Assigned all underperforming biggest accounts to your best reps (more than offsetting the loss of the small accounts). 3. Transitioned to a net-profit growth incentive system. 4. And, outplaced your small-account, weak reps…. The cost of distributor supplier reps is typically about 5% built into your buying price. Would you prefer 5% lower prices and to pay for the rep on an hourly basis as needed just as you do for professional services? Why should some of your biggest customers feel any different about your reps one day? Before this slow-growing, compensation-value mismatch trend creates a problem with a key account, why not embrace the “supply chain solution” trend? Whenever a customer asks us to – “ a bit more competitive” – counter with a variation of the “Price-shopping Judo” speech: “Glad you asked. Why shop just for 1-2% less when we might also be able to co-create much greater, supply-chain-cost dollar savings! IF we can do a quick audit of the buy-sell, inter-business processes that have grown up between us, we’ll find inefficiencies. Neither of us has yet thought of re-tuning and/or re-designing these processes, we may find ways to: 1. Lower potentially all 11 elements of :”total procurement cost” (TPC) 2. Improve the uptime economics of those who use, consume or re-sell our products? 3. Improve the (next-step-in-the-value-chain) customer satisfaction, retention, penetration and referral – economics. 4. Lower our “total cost to serve you”. If we can lower our CTS, then we can share those savings with you in the form of a lower price. 5. Decide to do more total volume together, because the cost of buying elsewhere in the traditional way would be too high. Playing a few “good” distributors off one another for immediate, measurable “price savings” while we try to sneak up our margins is a zero-sum, win-lose, activity-cost struggle. We’ve been distracting ourselves from finding and co-creating bigger, win-win, supply chain benefits. When shall we schedule the audit?” How do you get from arms-length, price haggling to delivering and following through on the “Price Judo Speech”? 1. EDUCATION: Reps will have to get fluent in supply chain concepts:” CTS; TPC; Uptime Economics; Customer Retention”.1 2. ACCESS TO VPs OF SUPPLY CHAIN:Managers will have to call on supply-chain counterparts who can:  understand and change buying system economics. Buyers don’t like reducing TPC which is their current job. 3. SERVICE GUARANTEES: The service team can offer 2 to 5 target accounts per rep unconditionally guaranteed, perfect service and extra-efforts to be more partner-able. 4. NET-PROFIT AND CTS ANALYTICS AND INCENTIVES: Invent (or more effectively subscribe to) a complete net-profit analytics capability with incentives for net-profit development for customers. Paying on margin dollars misaligns reps with both the company and customers win-win opportunities. 5. AHA MOMENT: To study this new paradigm start with a demo of Waypoint Analytics’ service and/or attend the “Advanced Profit Management Conference” March 29-30 in AZ. (see below) Be the first amongst your competitive peers to embrace sales force changes that meet best-customer’s changing needs and grow your profits five ways! . Bruce Merrifield                                                                          1. See training manual at: And, sign up for e-alerts on youtube e-training clip announcements.
global_01_local_2_shard_00001658_processed.jsonl/18264
Tuesday, February 25, 2014 +DEV+ The Lord Directs His Love Date: February 25, 2014 11:16 PM Topic: +DEV+  The Lord Directs His Love The Lord Directs His Love "By day the Lord directs his love, at night his song is with me - a prayer to the God of my life." (Psalm 42:8) Scripture Focus: Psalm 42:1-11 I try to read from the book of Psalms each day, and this particular verse rings so true in my heart. Often at the end of a hectic day and during the first moments my head hits the pillow, I sense the Lord is very present. It's not unusual for the words of a song to come to me. It might be from the old Swedish hymn, "Day by Day and with each passing moment, strength I find to meet my trials here," or from a new chorus, "The Power of the Cross." At night the Lord's song truly is with me. The psalmist is reminding us of God's love during the day - even when life isn't going well (vs. 5-6); yet at night, He comforts us with His song. I remember a book entitled God Works the Night Shift. The author wrote about God's acts of love upon us while we sleep and why we can trust Him in times of darkness. An older lady was dealing with heavy life issues. Her prayer at night was, "Lord, I leave them with You. No point in both of us staying awake!" Enjoy your Savior's warm hand of eternal love upon you. Insight: Cling to Him who neither slumbers nor sleeps, who loves you and often works within you through the night. We are in need of Prayer and financial partners, No comments: Post a Comment
global_01_local_2_shard_00001658_processed.jsonl/18275
Who Is Mistral Dawn? Wednesday, June 14, 2017 #Agent Thoth's #Personal Log: Day 567 Hey Everyone! :-) Department for the Preservation and Confirmation of Intelligent Life (DPCIL) Agent Thoth's Personal Log Day Five-Hundred-Sixty-Seven: I am gratified to note that the infant felid is as baffled as I by my hominid-servant's propensity for starting each day by immersing herself beneath a stream of running water. What attraction such behavior could have for any creature with an ounce of sense of self-preservation is beyond me. And, apparently, the tiny pest shares my confusion. Today, he spent quite a bit of time observing this ritual and examining the basin in which my hominid-servant performs it, after she had vacated it. He did not seem to reach any conclusions, either. Heartened by this apparent interest in systematic discovery, I attempted to share with him the testing I have done on the makeup of the basin itself and the contents of the water. The basin appears to be made of some form of ceramic coated in a colored enamel. I wasn't able to get a more precise reading without damaging the surface of the basin, but there doesn't appear to be anything present in its composition that would affect my hominid-servant's ability to protect herself. Likewise, the water contains the sort of trace elements, minerals, and sediment that one would expect, but nothing that could be expected to have a psychoactive effect on hominid biology. Findings which make my hominid-servant's actions all the more inexplicable. Unfortunately, the infant felid's new-found scientific curiosity did not extend to such minutia, and he abandoned me mid-lecture. Still, I consider this a hopeful development and will proceed in my attempts to recruit the small creature with more optimism than I previously held. No comments: Post a Comment
global_01_local_2_shard_00001658_processed.jsonl/18281
Thursday, November 19, 2015 Tracking Protection Officially Supported in Firefox 42 Thursday, May 28, 2015 Advertising: a sustainable utopia? Advertising generates $50 billion annually in the US alone, but how much of that figure reflects real value? Approximately ⅓ of click traffic is fraudulent, leading to $10 billion in wasted spending annually. Counting revenue due to fraud towards the value of advertising is like counting money spent on diabetes treatments as part of the GDP -- if those figures went to zero, it would reflect a healthier ecosystem, or healthier people in the diabetes case. For people making money on advertising, it is difficult to accept that a reduction in annual revenue can mean that things are better for everyone else. Even when ads are displayed to real people, they often create little to no value for the ad creator. According to Google, half of ads are never viewable, not even for a second. In addition, adblocking usage grew by 70% last year, and 41% of people between 18-29 use an adblocker. The advertising industry responds to these trends by making ads increasingly distracting (requiring large amounts of resources and unsafe plugins to run), collecting increasingly large amounts of data, and creating more opportunities for abuse by government agencies and other malicious actors. As Mitchell Baker put it, do we want to live in a house or a fish bowl? There has to be a better way. Why can’t a person buy and blank out all of the ad space on sites they visit at a deep discount, since targeting machinery would no longer be relevant? Why aren’t subscriptions available as bundle deals, like in streaming video? Solutions like these are hypothetical and will remain so as long we maintain the fiction that the current advertising revenue model is a sustainable utopia. Thursday, May 21, 2015 Tracking Protection for Firefox at Web 2.0 Security and Privacy 2015 Thursday, April 2, 2015 Some links about tracking and security A roundup of links on tracking, advertising and security. These are not complete or even representative, but may be useful to somebody. Attitudes towards tracking and surveillance Advertising and fraud Some privacy litigation Tuesday, March 31, 2015 Two Short Stories about Tracking Protection Thursday, March 19, 2015 Wednesday, March 18, 2015 Tracking Protection talk on Air Mozilla
global_01_local_2_shard_00001658_processed.jsonl/18316
All Financial Wisdom Forex Trading: The Big Downside of Volume and How to Make It Up By  |  When it comes to trading in the financial markets in general, the volume indicator is one of the most powerful signals that any trader can count on to make buying or selling decisions in the market. Market impulses supported by volume increases are always an extraordinary indicator of the commitment of the market members in the direction that the price is moving. But in the specific case of Forex trading, the characteristics of this market make the indicator of the volume not completely reliable, or at least not as accurate as it can be when trading in stocks or futures. Why is Forex volume not a sure indicator? It should be remembered that the Forex market is a decentralized market that can be accessed from almost any corner of the world, which ends up affecting a lack of precision in the volume data that different charts provide. Thus, if we intend to support our trade decisions with the volume information presented to us at any given moment, we must always keep in mind that we are working with data from an distributed market. Volume is a reflection of several different markets and will necessarily differ. How can I complete the volume information in Forex? For traders who are accustomed to using the volume in their daily trades, the inconvenience of not having accurate data be annoying at best and dangerous at worst. However, there are some solutions to make up for this lack of information: • Have a parallel chart opener with currency pair futures. Futures markets are a centralized market, and generally all markets follow a parallel movement with minimal differences. That is, the readings we can make in the future of the EUR/USD for example,  will not give us absolutely precise information regarding Forex pairs, but it will provide us with the main trend of the market at any given time. This measure is especially practical for intraday operators, and personally I consider it very useful. • View the information of open positions directly in the Forex market that some brokers provide depending on the information of their own clients. For example, in this chart, we can see how many short (or long) trades are open in the EUR/USD, thus showing that the market sentiment for the EUR/USD, remains bearish. • Finally, the information that the regulator of the futures markets in the United States, the CFTC, in what is known as the Commitment of Traders reports, can be consulted , which informs us about open positions on all the derivatives, giving us important information on the general market sentiment. Leave a Reply