id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00000017_processed.jsonl/50566 | Visiting Teaching Message
A Restoration of All Things
A Restoration of All Things
The Prophet Joseph Smith organized Relief Society as an essential part of the Church. As a presidency, we hope we can help you understand why Relief Society is essential in your life.
We know that New Testament women showed faith in Jesus Christ and participated in His work. Luke 10:39 tells of Mary, who “sat at Jesus’ feet, and heard his word.” In John 11:27 Martha bears witness of Christ: “She saith unto him, Yea, Lord: I believe that thou art the Christ, the Son of God, which should come into the world.” Acts 9:36, 39 speaks of “a certain disciple named Tabitha, … full of good works. … And all the widows stood by … shewing the coats and garments which [she] made.” Phebe, in Romans 16:1–2, was “a servant of the church” and “a succourer of many.”
These patterns of faith, testimony, and service continued in the latter-day Church and were formalized with the organization of Relief Society. Julie B. Beck, Relief Society general president, taught: “Just as the Savior invited Mary and Martha of New Testament times to participate in His work, women of this dispensation have an official commission to participate in the Lord’s work. … The organization of Relief Society in 1842 mobilized the collective power of the women and their specific assignments to build the Lord’s kingdom.” 1
We accomplish our work as we focus on Relief Society’s purposes: to increase faith and personal righteousness, strengthen families and homes, and seek out and help those in need.
I testify that Relief Society was divinely organized to assist in the work of salvation. Each Relief Society sister has an essential role to play in accomplishing this sacred work.
From Our History
Sister Julie B. Beck has taught that “we know through the Prophet Joseph Smith that Relief Society was a formal part of the Restoration.” 2 The process of restoration began with the First Vision in 1820 and continued “line upon line, precept upon precept” (D&C 98:12). When the Relief Society was formally organized on March 17, 1842, the Prophet taught the women about their essential place in the restored Church. He said, “The Church was never perfectly organized until the women were thus organized.” 3
What Can I Do?
1. 1.
What help will I provide my sisters this month that exemplifies the faith of female disciples of Jesus Christ?
2. 2.
What teaching of the restored gospel will I study to strengthen my testimony this month?
For more information, go to .
Jesus at the Home of Mary and Martha, by Minerva K. Teichert, courtesy of Brigham Young University Museum of Art
Show References
1. 1.
Julie B. Beck, “Fulfilling the Purpose of Relief Society,” Liahona and Ensign, Nov. 2008, 108.
2. 2.
Julie B. Beck, “Fulfilling the Purpose of Relief Society,” 108.
3. 3.
|
global_01_local_0_shard_00000017_processed.jsonl/50584 | In order to add the 100 Ways to Build Self-Esteem and Teach Values to your Wishlist, please create a new account or sign-in below.
Create A Wishlist
Access Your Wishlist(s)
Search For Wishlist(s)
Find your friend's and family's Wishlist |
global_01_local_0_shard_00000017_processed.jsonl/50593 | Web Scraping
Job Description
Simple scraping of 829 web pages, and please provide me a simple interface (or code) to scrape the same pages later.
Please see attached files.
1. Link of each webpages
2. sample excel file
Open Attachment |
global_01_local_0_shard_00000017_processed.jsonl/50617 | User account
Locate your 7 digit account number on your mailing label on the print issue or contact us to find out your account number. It's the FIRST 7 digits of the number in the upper left-hand corner (between the # signs). IMPORTANT: Disregard any number following the FIRST 7 digits. If you are part of our Bookstores That Care network, use the 7 digit account number from your BTC invoice.
DIGITAL EDITION SUBSCRIBERS. When you subscribe to receive the digital edition you will receive a confirmation email and your 7 digit subscription number will be at the bottom of the email. If you have problems locating your subscription number contact and she will assist you.
This 7 digit number will register you for the SUBSCRIBERS ONLY exclusive bonus content and give you access to the digital edition of RT.
If your subscription expires, you will no longer be able to access exclusive bonus content. If you subscription expires and you re-subscribe you will be assigned a new 7 digit account number found on your new mailing label or sent in a new email confirmation. To access the exclusive bonus content you must re-register with the new 7 digit account number.
Account information
The first 7 digits of the number in the upper left-hand corner of your RT mailing label. |
global_01_local_0_shard_00000017_processed.jsonl/50671 | (navigation image)
Search: Advanced Search
Anonymous User (login or join us)
View movie
item imageitem imageitem imageitem image
View thumbnails
Run time: 29 minutes 24 seconds
Play / Download (help[help])
(125.4 M)Ogg Video
(174.3 M)h.264
(586.3 M)MPEG2
All Files: HTTPS
[Public Domain Mark 1.0]
''I Remember Mama'' - Madame Zodiak (1950)
something has gone horribly wrong 8-p
Prefer flash? · Embed · Questions/Feedback?
An episode of the "live TV" dramedy "Mama" (which is often referred "I Remember Mama") from 1950. What amazes me is that, we are in the 2010s, with this 1950s show, set in the 1910s! It's like going back in time twice!! In this episode, Aunt Jenny is told by a fortune teller that she'll soon get great wealth. With original commercials (please forgive dodgy tape-transfer, and slight cut-off at end).
This movie is part of the collection: Classic TV
Production Company: Columbia Broadcasting System
Audio/Visual: sound, black and white
Keywords: Mama; I Remember Mama; 1950s; 50s; Fifties; Classic TV; Television; Maxwell House; Maxwell House Coffee; Public Domain TV; Public Domain Television; Old; Not New;
Creative Commons license: Public Domain Mark 1.0
Individual Files
Movie Files h.264 MPEG2 Ogg Video
Mama-MadameZodiak.mpg 174.3 MB
586.3 MB
125.4 MB
Image Files Animated GIF Thumbnail
Mama-MadameZodiak.mpg 368.2 KB
6.0 KB
Information FormatSize
iRememberMama-MadameZodiak_files.xml Metadata [file]
iRememberMama-MadameZodiak_meta.xml Metadata 1.3 KB
iRememberMama-MadameZodiak_reviews.xml Metadata 554.0 B
Other Files Video Index
Mama-MadameZodiak.mpg 1.4 MB
Write a review
Downloaded 1,100 times
Subject: Still charming!
Such a sweet little program. Simple- but still enjoyable after all these years. Peggy Wood was a wonderful actress!
Terms of Use (10 Mar 2001) |
global_01_local_0_shard_00000017_processed.jsonl/50683 | What do I use in my '95 Camry as power steering fluid?
July 30, 2012 7:58 AM Subscribe
My '95 Toyota Camry uses Dexron II transmission fluid as power steering fluid, but nobody sells Dexron II anymore...
So what do I use? Apparently actual power steering fluid is bad for the system. And there seem to be more Dexron products out there, but I haven't any idea if they're appropriate.
posted by Mercaptan to Travel & Transportation (8 answers total)
Why not call the service department at a Toyota dealer and ask them what they use now that Dexron II is no longer available.
posted by JohnnyGunn at 8:09 AM on July 30, 2012 [1 favorite]
Have you called a Toyota dealer? It probably will be pricier going through them, but power steering fluid isn't something you should have to buy often.
posted by Burhanistan at 8:09 AM on July 30, 2012
Dex-III is almost always backwards compatible with Dex-II.
posted by ellF at 8:11 AM on July 30, 2012
If you look on the back of the bottles at the auto parts stores, it will typically expand on the backwards compatibility.
"For use in Dex 2, Dex 3 systems", something along those lines.
The dealership can definitely suggest and/or sell you the correct fluid.
Do you have a leak? Power steering fluid won't usually get low. Some components of the power steering operate at a reasonably high pressure, and if you have a leak on the high pressure side your pump will squirt out a quart of fluid in no time whatsoever (along the lines of taking 10 corners or so).
posted by gatsby died at 8:26 AM on July 30, 2012
Ah, that's good to know.
Yes, I definitely have leaks, but at the present moment it's cheaper to refill than it is to repair according to my repair people.
posted by Mercaptan at 8:30 AM on July 30, 2012
I recently filled my 98 Camry with Dex3 about 4 months ago and its been working great so far.
posted by Carillon at 9:45 AM on July 30, 2012
Yep, I explain it as "Dex II or newer" fluid.
posted by TinWhistle at 10:12 AM on July 30, 2012
On a couple of toyota's I've worked on the power steering would leak on (and eventually break) the alternator - so I would suggest checking on that possibility.
posted by zenon at 10:16 PM on August 1, 2012 [1 favorite]
« Older Can anyone in the MeFi world t... | I need to buy a three volt DC ... Newer »
This thread is closed to new comments. |
global_01_local_0_shard_00000017_processed.jsonl/50684 | Take the 2-minute tour ×
I have problem in shutting down tomcat server. When I type localhost://8080, it keeps on showing me tomcat homepage. I restarted the system also but did not help. I have already tried following commands and it did not show any process which might be running on port 8080 (Following commands did not output anything.)
netstat -anp|grep :8080[[:blank:]]
fuser -n tcp 8080
lsof -w -n -i tcp:8080
netstat | grep 8080
I also tried netstat -tulpn which shows following. I dont see any process running on port 8080 there.
Active Internet connections (only servers)
tcp 0 0 * LISTEN 2091/dropbox
tcp 0 0* LISTEN 1046/mysqld
tcp 0 0 * LISTEN 7657/dnsmasq
tcp 0 0 * LISTEN 901/cupsd
tcp 0 0* LISTEN 5704/postgres
tcp6 0 0 ::1:631 :::* LISTEN 901/cupsd
udp 0 0 * 869/avahi-daemon: r
udp 0 0 * 869/avahi-daemon: r
udp 0 0 * 7657/dnsmasq
udp 0 0 * 2091/dropbox
udp6 0 0 :::51917 :::* 869/avahi-daemon: r
udp6 0 0 :::5353 :::* 869/avahi-daemon: r
Could someone please tell me how to free port 8080. I tried to run ./shutdown of tomcat but it shoed java.net.ConnectException: Connection refused
I guess it is because of already running instant on port8080.
share|improve this question
This is not an Ubuntu problem. You have your tomcat configured to use the 8080 port, and there's also other port that is configured for shutdown. You need to review your tomcat configuration ../conf/server.xml – LnxSlck Oct 1 '12 at 14:11
add comment
2 Answers
up vote 0 down vote accepted
If you installed tomcat from Software Center (or via apt-get command line), then it should be running from the standard ubuntu installation directory. Starting and stopping Tomcat should be as easy as
/etc/init.d/tomcat5.5 start
/etc/init.d/tomcat5.5 stop
Maybe 5.5 needs to be replaced by the version you are using.
If you just downloaded tomcat and are running from your custom unzipped directory, the startup and shutdown scripts provided by Apache should work. Assuming your tomcat is in $TOMCAT_HOME:
If all fails, you can always manually kill all java processes
killall java
or, if something is REALLY stuck
killall -9 java
These last ones will kill ALL java processes currently running.
share|improve this answer
add comment
ps -ef |grep 'catalina'
then take that pid
kill -9 $pid
alternatively if you want to free 8080 port
Change your tomcat port to other than 8080
vi $CATALINA_HOME/conf/server.xml
search for the following section and then change port number to any thing of you choice.
redirectPort="8443" />
save the changes and restart the tomcat. Now your 8080 port will be free as tomcat will be running to alternative port you changed.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/50685 | Take the 2-minute tour ×
I have a Dell Latitude D600. I've uninstalled windows completely and have had ubuntu 11.10 running on it forever. now suddenly it decides not to boot. so i tried to boot from a live cd i burned and it registers on my other windows computer but when i put it in my Dell it says there are no bootable devices (after disabling booting from the hard drive) I'm really not sure what the issue is. it seems that my hard drive is in read-only mode? not sure how to get out of this as the only thing i can do is to use the grub command line. Any ideas?
share|improve this question
You mean 11.10 right? There is no such thing as Ubuntu 10.11. – smartboyhw Feb 14 '13 at 18:15
my bad. yep. 11.10 – user132011 Feb 14 '13 at 20:08
add comment
Your Answer
Browse other questions tagged or ask your own question. |
global_01_local_0_shard_00000017_processed.jsonl/50686 | Take the 2-minute tour ×
I found some PPA that is patching Unity. (https://bugs.launchpad.net/ubuntu/+source/unity/+bug/789979 )
I want to re-install unity from this PPA.
How can I do?
EDIT: The accepted answer below is to how to build your own version of Unity.. please carefully read all comments.
share|improve this question
add comment
1 Answer
up vote 1 down vote accepted
It does not appear there is a PPA for that code. You can either wait for the fix to be released, update your version of Ubuntu, or build from source.
From the README included in the code / patch
• Installation
Please see INSTALL or http://wiki.ubuntu.com/Unity/InstallationGuideFromSource
The link then re-directs to an answer here:
How do I build Unity from source?
NOTE: If you build from source support will be limited, at best.
share|improve this answer
So, You think http://bazaar.launchpad.net/~iaz/unity/menubar-lp789979/changes/2384?start_revid=2384 is not built yet? As I've this http://ppa.launchpad.net/iaz/unity/ubuntu added as a PPA in my sources. Sorry, I am very new to Launchpad. – Muhammad Hewedy Sep 27 '13 at 16:22
There are no packages anywhere in that tree (if you look in the sub directories). – bodhi.zazen Sep 27 '13 at 16:24
I found packages here : ppa.launchpad.net/iaz/unity/ubuntu/pool/main/u/unity If the do not install with sudo apt-get update && sudo apt-get upgrade , post any error messages. – bodhi.zazen Sep 27 '13 at 16:25
BTW, the links you put above is very cool, I gonna clone the repo on my machine, do the change and then build/install the new unity locally. – Muhammad Hewedy Sep 27 '13 at 16:26
I've tried sudo apt-get update && sudo apt-get upgrade many times before, but cannot see the final result as stated in the above issue link (in my question). Can you help me make sure that I've the Unity version of this PPA? – Muhammad Hewedy Sep 27 '13 at 16:27
show 2 more comments
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/50687 | Take the 2-minute tour ×
Any resources/collections/repositories for Unity themes?
Is there any chance is Metacity themes will be supported, at least in terms of window controls and window borders?
share|improve this question
add comment
2 Answers
Check out this article on OMGUbuntu. This solution may be useful for the moment.
share|improve this answer
add comment
The Unity menubar can be themed through GTK+3 and CSS by creating sections for UnityPanelWidget and .unity-panel.
The window controls as seen in the Unity menubar can easily be themed. The folder for a theme which alters them will have a unity folder inside it at the top, and inside it will need image files with the following names:
• close.png
• close_focused_prelight.png
• close_focused_pressed.png
• minimize.png
• minimize_focused_prelight.png
• minimize_focused_pressed.png
• unmaximize.png
• unmaximize_focused_prelight.png
• unmaximize_focused_pressed.png
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/50688 | Take the 2-minute tour ×
I'm running Xubuntu 11.04, the bootup-time is quite fast but when I log in it takes close to a minute before the desktop is displayed, meanwhile I see no activity on the hard drive. When I finally have the desktop I see this notification repeated 10 times:
enter image description here
and then this one:
enter image description here
In .config/autostart I have these entries
$ ls
xfce4-clipman-plugin-autostart.desktop xfce-panel.desktop
$ cat xfce-panel.desktop
[Desktop Entry]
I need some assistance to locate the slow startup, which logs to look at etc.
And then this annoying message about xfce-panel. Where do I look for from where it is started.
share|improve this question
Still wondering about this? Incidentally, I don't think you ought to have a desktop file for the panel, not in autostart or anywhere else. There should be no need to autostart it. – Chan-Ho Suh Apr 23 '12 at 18:24
@Chan-HoSuh Problem fixed (a long time ago :-) Was due to a faulty cache. Removed the .cache folder and restarted. Problem fixed. – Fredrik Pihl Apr 23 '12 at 19:41
That's great! Do you mind putting an answer below and marking it solved? It helps clean up the site, even if slightly. – Chan-Ho Suh Apr 23 '12 at 20:38
add comment
1 Answer
up vote 3 down vote accepted
According to the questioner, the problem was fixed after removing the .cache folder in his home directory.
share|improve this answer
Thanx, for adding it as an answer. accepted :-) – Fredrik Pihl Aug 13 '12 at 13:52
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/50689 | Take the 2-minute tour ×
I am a new ubuntu user and I am looking for an alternative of Executor http://executor.dk/ , a keystroke launcher. I mentioned Launchy as most people know it. I have tried Gnome DO which is very similar to Launchy and it's good but there I still miss Executor.
The major difference between Launchy and Executor is the the emphasis on user defined keywords, which allow users to set keywords for launching any given application.In other words you can create your own commands/keystrokes.
I also don't like Gnome DO indexing all my programs,as I don't use all of them,instead I like to make my keywords/progs/folders paths.
share|improve this question
Launchy is available for linux. Not sure if you are aware of that or if that is why you mentioned it. Also Gnome-Do is quite configureable as it has the alias plugin where you can in fact define your own commands. As far as it indexing your programs....I guess you would just have to disable almost all of the programs. Good luck in your hunt. – Ctuchik Aug 10 '11 at 19:48
add comment
4 Answers
up vote 2 down vote accepted
Try Kupfer
What you can do with Kupfer?
• Grab current selection
• Add applications
• Add your scripts
• Add your commandlines
• Command-line connection
• Managing Context and Current Selection
• The "Comma Trick"
• Save Commands as Files (GIF screencast illustration)
Kupfer Manual
share|improve this answer
add comment
Why no love for Synapse?
• Applications – searches your desktop files Banshee – allows you to play/enqueue music files in Banshee Commands – runs any command (ie. “sudo apt-get update”) Devhelp – search documentation using Devhelp Dictionary – find definitions of words Directory search – allows opening of commonly used directories Gnome session – log out, shut down, restart Hybrid search – complete Zeitgeist results by searching for similar files Rhytmbox – play/enqueue music files in Rhythmbox UPower – suspend & hibernate your computer Zeitgeist – search anything logged by Zeitgeist But thanks to the Zeitgeist integration pretty much any application can integrate with Synapse simply by integrating with Zeitgeist.
enter image description here
sudo add-apt-repository ppa:synapse-core/ppa
share|improve this answer
+1 for synapse ! – Binarylife Aug 10 '11 at 20:55
Note Synapse tries to learn which commands and files are used often (nepomuk integration) – Mekk Oct 15 '11 at 22:23
+1 Synapse just works! Was moving from Windows to xubuntu, so I tried to use Launchy but 1. had to manually configure to launch on startup, didn't have a dialog to setup from the app 2. didn't work with apps opened with .sh files (opens the file in text editor) 3. didn't detect apps like Chrome and Firefox. – trafalmadorian Apr 12 '13 at 0:30
add comment
I used to use AutoHotKey a lot in Windows to automate things a bit.
The Linux equivalent is AutoKey the main difference between the projects is Autokey uses Python for scripting instead of its own language.
Here is a list of Features from the project home page
• KDE and GTK versions available, making AutoKey integrate well into any desktop environment.
• Write Python scripts to automate virtually any task that can be accomplished via the keyboard
• Built-in code editor (using QScintilla in KDE or GtkSourceView2 in GTK)
• Create phrases (blocks of text) to be pasted into any program on demand (uses the X selection)
• Regular expressions can be used to filter windows by their title, to exclude hotkeys/abbreviations from triggering in certain applications
• Scripts, phrases and folders can be attached to the tray icon menu, allowing you to select them without assigning a hotkey or abbreviation
• AutoKey can track your usage patterns and present the most frequently used items at the top of the popup menu
Hope this is What you are looking for
share|improve this answer
add comment
You can write shell scripts as user defined keywords for Gnome Do.
Also, I really like KDE's Krunner dialogue. Of course, it won't work in Gnome.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/50690 | Take the 2-minute tour ×
I'm using different clients to access my email by imap from diferent devices (PC, phone). When I move a message to my archive folder using my phone (using k9mail), the message remains in my inbox in Thunderbird. Is there a way to fix this behaviour?
share|improve this question
add comment
1 Answer
This is a bug, please report it by using ubuntu-bug thunderbird . See more on How do I report a bug?
To make sure its a bug, see if the message remains in the inbox with the web client
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/50700 | Information for "Fitchburg Library Construction Referendum (2008)"
Jump to: navigation, search
Basic information
Display titleFitchburg Library Construction Referendum (2008)
Default sort keyFitchburg Library Construction Referendum (2008)
Page length (in bytes)969
Page ID15297
Page content languageEnglish (en)
Indexing by robotsAllowed
Number of views1,189
Number of redirects to this page0
Counted as a content pageYes
Page protection
EditAllow all users
MoveAllow all users
Edit history
Page creatorDairylanddoll (Talk | contribs)
Date of page creation15:48, 6 November 2008
Latest editorColin O'Keefe (Talk | contribs)
Date of latest edit22:46, 5 March 2014
Total number of edits9
Total number of distinct authors7
Recent number of edits (within past 91 days)1
Recent number of distinct authors1
Page properties
Transcluded templates (9)
Templates used on this page: |
global_01_local_0_shard_00000017_processed.jsonl/50709 |
Shown Here:
Introduced in House (12/15/2009)
Small Business Start-up Savings Accounts Act of 2009 - Amends the Internal Revenue Code to provide for tax-exempt Small Business Start-up Savings Accounts to pay for trade or business expenses, including the purchase of equipment or facilities, marketing, training, incorporation, and accounting fees. Allows annual contributions to such accounts up to $10,000. Sets forth rules for the tax treatment of contributions to and rollovers from such accounts, similar to rules governing individual retirement accounts (IRAs). |
global_01_local_0_shard_00000017_processed.jsonl/50711 | Is The Great Pyramid An Altar To God?
The Great Pyramid has come to our attention from various newsletters. Their stand is that the Great Pyramid is sacred relative to Christianity.
According to one teacher the assumption that the Great Pyramid is the foundation of the world is built on one Scripture Isaiah 40:12 "Who hath measured the waters in the hollow of his hand, and meted out heaven with the span, and comprehended the dust of the earth in a measure, and weighed the mountains in scales, and the hills in a balance?
The pyramids are Egyptian tombs. Some teach that the pyramid is the foundation of the earth because the intelligence behind the construction is unsurpassed and was here thousands of years ago. The pyramids where constructed in Moses's day. The pyramids were built on the backs of Hebrews in bondage in Egypt. How could the pyramid be the altar of God as some say because it is mathematically perfect. It would be documented in the Scriptures if it were God's altar. Logically that would mean the space program should be revered because to laymen it is a miracle and is based on mathematical calculations and precision.
The Great Pyramid is one of the seven wonders of the world that cannot be explained but I do not consider that proof of God. That places God into the realm of being a unit of intelligence that philosophers' use as their basis for evolution. What the pyramid does reveal is that there was more intelligence and knowledge on earth thousands of years ago than there is today.
The Bible Describes God's Altar
In the Old Testament, in Genesis 8:20 Noah built "an altar unto the LORD" and the number given to explain what "altar" means in the Hebrew language is 4196 'Mizbeach'; and is a place of sacrifice. The term is mostly used in the Pentateuch and in other historical books. Altars were made of stone, wood or bronze. Noah, Isaac and Jacob all built altars. Building an altar ratified agreements. God told Moses that His only altar would be associated with the Tabernacle.
Exodus 29:44-46 "And I will sanctify the tabernacle of the congregation, and the altar: I will sanctify also both Aaron and his sons, to minister to me in the priest's office. And I will dwell among the children of Israel, and will be their God. And they shall know that I am the LORD their God, that brought them forth out of the land of Egypt, that I may dwell among them: I am the LORD their God." This Scripture was fulfilled. God dwelt on earth protected by the children of Israel.
Revelation 21:3-4 and I heard a great voice out of the heaven, saying, `Lo, the tabernacle of God is with men, and He will tabernacle with them, and they shall be His peoples, and God Himself shall be with them--their God, and God shall wipe away every tear from their eyes, and the death shall not be any more, nor sorrow, nor crying, nor shall there be any more pain, because the first things did go away.'
Leviticus 26:12-13 And I will walk among you, and will be your God, and ye shall be my people. I am the LORD your God, which brought you forth out of the land of Egypt, that ye should not be their bondmen; and I have broken the bands of your yoke, and made you go upright.
Exodus 38:1-2 And he made the altar of burnt offering of shittim wood: five cubits was the length thereof, and five cubits the breadth thereof; it was foursquare; and three cubits the height thereof. And he made the horns thereof on the four corners of it; the horns thereof were of the same: and he overlaid it with brass. Exodus 39:38 And the golden altar, and the anointing oil, and the sweet incense, and the hanging for the tabernacle door.
Unauthorized Altars
There were unauthorized and forbidden altars to false gods such as pillars (used in the Masonic religion, the obelisks and the two pillars). Exodus 34:13 But ye shall destroy their altars, break their images, and cut down their groves:. High places also used for altars. 2 Kings 23:15 Moreover the altar that was at Bethel, and the high place which Jeroboam the son of Nebat, who made Israel to sin, had made, both that altar and the high place he brake down, and burned the high place, and stamped it small to powder, and burned the grove.
The sons of Israel apostatized by becoming deeply involved in pagan sacrifices on Canaanite altars at the high places. Leviticus 17:7 And they shall no more offer their sacrifices unto devils, after whom they have gone a whoring. This shall be a statute for ever unto them throughout their generations. Numbers 25:2 And they called the people unto the sacrifices of their gods: and the people did eat, and bowed down to their gods.
Baal was the chief god of the Cananites and God's answer to that was in 2 Kings 10:27-28 And they brake down the image of Baal, and brake down the house of Baal, and made it a draught house unto this day. Thus Jehu destroyed Baal out of Israel..
Baal is described in the Hebrew Lexical Aid as master, lord, possessor, husband, citizen, burgess, inhabitant, and Baal (a Canaanite god). The word is used as an idiom to indicate mastery or ownership. Baal, who was also called Haddu or Hadad allegedly gave a sweet rain and revived vegetation each spring. Droughts indicated that he was either dead or temporarily captive. However when he came back, the fields, flocks and families flourished. He was also considered to be war god who consorted with Anat (Astarte), The people were taught to act out a magical ritual of sacred marriage in order to insure the fertility of the earth. Cultic objects on the scene were exaggerated models, sexual models. The worship of Baal (the sun god) included sexual orgies, with homosexuality (1 Kings 14:24), and even child sacrifice (Jeremiah 19:5).
Because of the pervasive influence of the powerful storm and feritlity god. Baal, the names of many people and places contain this word. Baal-zebub (2 Kings 1:2), lord of lies, was a parody on his name. The sons of Israel fell into the sin of this local cult (Judg. 2:11; 6:25). Baal worship became the official state religion of the northern kingdom (1 Kgs.16:31) However, Elijah and Elisha demonstrated that fire, rain, food, children, and resurrection were traceable to God, not Baal. The Book of Hosea describes the tantalizing, titillating character of Baal worship. Unfortunately, it even influenced the Southern Kingdom (2 Kings 11:18) and, in spite of Josiah's reforms, eventually resulted in Israel's exile. (2 Kings 17:16)
Baal (sun) worship is what Masonry, Mormonism and the New Age, etc.. is based on. The obelisk symbolizes the altar to Baal workship. Even the Vatican is built around an authentic imported Egyptian obelisk. Think, where do you see obelisks elsewhere. Most capital cities in the United States and many old cemeteries display them. In cities you will find them somewhere around governmental buildings which should tell you something about us being a Christian nation. Why are the obelisks not replaced by crosses? A ridiculous question isn't it.
Jacob's Pillar of Stone
In Genesis 28 we have the beginning of swearing an oath, making vows by a pillar of stone which Jacob called God's house.
The Hebrew word for pillar is described the number 4678 'Matstseveth' depicting something stationary, a monumental stone, a monument, a pillar; a column, a statue of (of idols); a stump, a trunk, a stock or stem (of a tree). Genesis 35:14-15 And Jacob setteth up a standing pillar in the place where He hath spoken with him, a standing pillar of stone, and he poureth on it an oblation, and he poureth on it oil; and Jacob calleth the name of the place where God spake with him Bethel. Genesis 35:20 and Jacob setteth up a standing pillar over her grave; which is the standing pillar of Rachel's grave unto this day.
The Stone That Could Hear
Joahua used a great stone that could hear what was being said. Who was Joshua referring to there? He was saying that Jesus heard everything they promised to do. Why do I say that? In the New Testament Jesus is referred to as 1 Corinthians 10:4 ".. did all drink the same spiritual drink: for they drank of that spiritual Rock that followed them: and that Rock was Christ." Hebrews 9:11 "But Christ being come an high priest of good things to come, by a greater and more perfect tabernacle, not made with hands, that is to say, not of this building." The Great Pyramid was built by Hebrews who are human beings.
|
global_01_local_0_shard_00000017_processed.jsonl/50736 | From Wikipedia, the free encyclopedia - View original article
CAS number9003-35-4
Infobox references
Jump to: navigation, search
CAS number9003-35-4
Infobox references
Dr. Baekeland had originally set out to find a replacement for shellac, made from the excretion of lac beetles. Chemists had begun to recognize that many natural resins and fibres were polymers, and Baekeland investigated the reactions of phenol and formaldehyde. He first produced a soluble phenol-formaldehyde shellac called "Novolak" that never became a market success, then turned to developing a binder for asbestos which, at that time, was molded with rubber. By controlling the pressure and temperature applied to phenol and formaldehyde, he produced a hard moldable material and patented in 1907 known as Bakelite.[2][3] It was the first synthetic thermosetting plastic ever made. It was often referred to as "the material of 1000 uses", a phrase originated by Baekeland himself.[4] He announced the invention at a meeting of the American Chemical Society on February 5, 1909.[5]
The Bakelite Corporation was formed in 1922 (after patent litigation favorable to Baekeland) from a merger of three companies: the General Bakelite Company, which Baekeland founded in 1910, the Condensite Company, founded by J.W. Aylesworth, and the Redmanol Chemical Products Company, founded by L.V. Redman.[6] A factory was built near Bound Brook, New Jersey, in 1929.[7]
Bakelite Limited, a merger of three British phenol formaldehyde resin suppliers (Damard Lacquer Company Limited of Birmingham, Mouldensite Limited of Darley Dale and Redmanol Chemical Products Company of London) was formed in 1926. A new factory opened in Tyseley, Birmingham, England around 1928. It was demolished in 1998.
Phenolics are more rarely used in general consumer products today, due to the cost and complexity of production and their brittle nature. Nevertheless they are still used in some applications where their specific properties are required, such as small precision-shaped components, molded disc brake cylinders, saucepan handles, electrical plugs and switches and parts for electrical irons. Today, Bakelite is manufactured and produced in sheet, rod and tube form for hundreds of industrial applications in the electronics, power generation and aerospace industries, and under a variety of commercial brand names.
Bakelite distributor rotor
Bakelite letter opener circa 1920
Applications and usage
Bakelite radio at Bakelite museum
In its industrial applications, Bakelite was particularly suitable for the emerging electrical and automobile industries because of its extraordinarily high resistance - not only to electricity, but to heat and chemical action. It was soon used for all nonconducting parts of radios and other electrical devices, such as bases and sockets for light bulbs and vacuum tubes, supports for electrical components, automobile distributor caps and other insulators.
Bakelite is used today for wire insulation, brake pads and related automotive components, and industrial electrical-related applications.
In the early 20th Century, it was found in myriad applications including saxophone mouthpieces, whistles, cameras, solid-body electric guitars, telephone housings and handsets, early machine guns, pistol grips, and appliance casings. In the pure form it was made into such articles as pipe stems, buttons, etc.
The thermosetting phenolic resin was at one point considered for the manufacture of coins, due to a shortage of traditional material; in 1943, Bakelite and other non-metal materials were tested for usage for the one cent coin in the US before the Mint settled on zinc-coated steel.[8][9]
After the Second World War, factories were retrofitted to produce Bakelite using a more efficient extrusion process which increased production and enabled the uses of Bakelite to extend into other genres: jewelry boxes, desk sets, clocks, radios, game pieces like chessmen, poker chips, billiard balls and Mah Jong sets. Kitchenware such as canisters and tableware were also made of Bakelite through the 1950s. Beads, bangles and earrings were produced by the Catalin Company which introduced 15 new colors in 1927. The creation of marbled Bakelite was also attributed to the Catalin Company. Translucent Bakelite jewelry, poker chips and other gaming items such as chess sets were also introduced in the 1940s under the Prystal Corporation name; however, its basic chemical composition remained the same.
Bakelite is used to make the presentation boxes of Breitling watches and sometimes as a substitute for metal firearm magazines. Bakelite is also used in the mounting of metal samples in metallography.[10]
US Patent 942699 for the bakelite product.
The United States Patent and Trademark Office granted Baekeland a patent for a "Method of making insoluble products of phenol and formaldehyde" on December 7, 1909.[12] Producing hard, compact, insoluble and infusable condensation products of phenols and formaldehyde marked the beginning of the modern plastics industry.[13]
Other similar plastics and products
1. ^ ACS National Historic Chemical Landmark, Bakelite: The World's First Synthetic Plastic (1993).
3. ^ "Leo Baekeland". Plastics. 28 June 2000.
4. ^ Cook, Patrick (1993). Bakelite: An Illustrated Guide to Collectible Bakelite Objects. London: Apple.
7. ^
8. ^ J2051/P2073 Accessed July 28, 2006
10. ^, Metallographic Preparation Mounting
11. ^ Roads to Space: an oral history of the Soviet space program
12. ^ US patent 942699, Leo H. Baekeland, "Method of making insoluble products of phenol and formaldehyde", issued 1909-12-07
13. ^ US Patent #942,699
14. ^ Biobakelite
External links |
global_01_local_0_shard_00000017_processed.jsonl/50766 | We will be running a 1 hour Windows Phone Workshop from 4pm to 5pm on Monday. The workshop is an Introduction to Windows phone and we will cover the following topics:
- The Windows Phone Platform
- Metro Design Principals
- Developing for Windows Phone
- Market Place
If you are interested? Register here, the workshop is free. It will be at the Microsoft Offices in Bryanston 3012 William Nicol Drive Bryanston Johannesburg 2191
See you there |
global_01_local_0_shard_00000017_processed.jsonl/50767 | The Windows Azure team have launched a global competition to find the fastest Windows Azure users. They have set a series of five challenges for you to enter and the prizes are pretty awesome. It would be great to see some of these great prizes go to UK developers so get your mice and keyboards to the ready and get going!
You’ll find the challenges here:
Best of luck!!! |
global_01_local_0_shard_00000017_processed.jsonl/50797 | The Motley Fool Discussion Boards
Previous Page
Investing/Strategies / Retirement Investing
Subject: Re: 401K-Roth - Comingling Date: 12/28/2000 11:45 AM
Author: LakeEffect Number: 26818 of 74536
Though not an expert, I've faced a similar situation in the past. For some reason, the powers-that-be like to keep rollover money separate from personal funds. The explanation I was given was that this arrangement allows you to roll it back into a future employers 401K, should you ever desire to do so. In your case, I would probably create a rollover IRA for the 401K money, and start a Roth with new money. Alternatively, since it's less than $5K, taking the tax+10% hit may work for you - if you're young enough, you'll probably recoup the hit in the future with gains in the Roth. Hope this helps a little. |
global_01_local_0_shard_00000017_processed.jsonl/50798 | The Motley Fool Discussion Boards
Previous Page
Retirement Discussions / Aging Optimistically
Subject: Re: Greetings, Fool! Date: 12/12/2011 12:45 AM
Author: Donna405 Number: 74 of 74
reallyalldone, in looking through the VAST number of posts on this Board, approximately 90% are yours. At least, when RV and I entered, the Board picked up a little interest, rather than dying as you thought would happen.
Donna (very optimistic) |
global_01_local_0_shard_00000017_processed.jsonl/50843 | Sean Kleefeld's Garfield mashups
A single gag is recycled in various settings.
“What is it about Garfield that makes it so infinitely mutable? Seriously. You can’t do this so readily with, say, Beetle Bailey or Blondie or B.C.,” the author muses. Garfield’s universality and mutability are truly imponderables. What do you all think?
1. michael says:
I like Baby Blues. :)
Speak Your Mind |
global_01_local_0_shard_00000017_processed.jsonl/50844 | Category:Colima Volcano
From Wikimedia Commons, the free media repository
Jump to: navigation, search
English: Colima Volcano in Nevado de Colima National Park, Colima state. One of the most active volcanoes in Mexico. Part of the Trans-Mexican Volcanic Belt, a principal volcanic mountain system in central Mexico.
Pages in category "Colima Volcano"
This category contains only the following page. |
global_01_local_0_shard_00000017_processed.jsonl/50845 | Category:France national football team
From Wikimedia Commons, the free media repository
Jump to: navigation, search
English: For media related to the French national football (soccer) team.
Media in category "France national football team"
|
global_01_local_0_shard_00000017_processed.jsonl/50850 | Apr 29 2013
By: nationm04 I Only Post Everything 1006 posts
Uncharted Acronyms
[ Edited ]
169 replies 690 views Edited Jun 1, 2013
This thread contains acronyms, and their meaning, for many different terms commonly used in this forum. It also contains many commonly used acronyms for the English language and ones used in chatrooms during gameplay. If you have any suggestions, or other acronyms you would like to contribute, please do!
Specials thanks go out to all members who have contributed!
UPDATE 5/9/2013
Here's what we have so far:
#HK - (1HK, 2HK etc) 1 Hit Kill, 2 Hit Kill etc.
Acc - Accuracy (Gun Mod)
AFK - Away From Keyboard
AoT/Ao3 - Army of Three (Kickback)
BF - Blindfire
BitS - Back in the Saddle (Kickback)
BMM - Block Mesh Maps
BRB - Be Right Back
CoB - City of Brass (Map)
CB/Clust - Cluster Bomb or Clan Battle (Cluster Bomb - Kickback)
CQC - Close-Quarters Combat
CR - Chain Reaction (Game Mode in Team Objective)
CS - Clip Size (Gun Mod)
DBG - Dead Body Glitch
DD - Double Damage (Power Play in Team Death Match)
DLC - Downloadable Content
DV - Desert Village (Map)
EE - Explosive Expert (Booster)
ESE - Explosive Shell Expert (Booster)
FF - Fleet Foot (Booster)
FHC - Fortune Hunters Club
FNA/5NA - Five Not Alive (Medal)
GA - Golden Abyss (Game)
GR - Gold Rush (Game Type in Co-op Arena)
HC - Hardcore Mode
IDC - I don't care
IDK - I don't know
IMO - In My Opinion
JK - Just Kidding
KDR - Kill/Death Ratio
KJ - Kill Jacking
KOTH - King Of The Hill (Game Mode in Team Objective)
KS - Kill Steal
LS - London Streets (Map)
LU - London Underground (Map)
MA - Max Ammo (Gun Mod)
MB - Mega Bomb (Kickback)
MM - Marked Man or Monkey Man (Marked Man = Game Mode in TDM) (Monkey Man = Booster)
MMM - Multi Marked Man (Game Mode in Team Objective)
MP - Multiplayer
ND - Naughty Dog
NPC - Non-Player Character
NSP - None Shall Pass (Medal)
OP - Overpowered or Original Poster
OQ - Old Quarter (Map)
OT - Overtime or Off Topic
PO# - Party of # (Example: PO5 = Party of 5)
PP - Power Play (Booster For Losing Team in Team Death Match)
QB - Quick Boom (Kickback)
RaffDrag - Weapon combo of Raffica Pistol and Dragon Sniper
ROF - Rate Of Fire (Gun Mod)
RPG - Rocket Propelled Grenade
RS - Reload Speed/Riot Shield (Reload Speed - Gun Mod)
SA - Situation Awareness (Uncharted 2 Booster)
SB - Smoke Bomb (Kickback)
SH - Stat Hats (Hats that can be worn to give player both positive/negative boosters)
SI - Scoped In (Booster)
SP - Single Player or Stopping Power (Stopping Power - Slows down enemy movement by shooting them)
TD/TDM - Team Deathmatch
TK - Team Kill
TL;DR - Too Long; Didn't Read
TLR - The Long Ranger (Medal)
TO - Team Objective
TS - Team Safe (Booster)
TTDM/3TD - Three Team Deathmatch
UDF - Uncharted: Drake's Fortune
UC2/U2 - Uncharted 2: Among Thieves
UC3/U3 - Uncharted 3: Drake's Deception
UP - Underpowered
WE - Weapon Expert (Booster)
WLR - Win/Loss Ratio
Other Information
Boosters - Boosters are items you can purchase and equip in both co-op and competitive game modes. They enhance the players abilities. Example: Monkey Man - You climb faster while this booster is equipped. You can equip up to 2 boosters at a time (see Paid Boosters). There are 2 slots for boosters. Each slot has a different selection of boosters to choose from. Certain boosters are not available until the player reaches a certain level.
Booster Leveling - Each booster has 3 levels - Bronze, Silver and Gold. When you first purchase a booster, it will be bronze. It will offer you an enhancement. For example, we'll use Monkey Man again. When you first purchase this booster, you can climb faster. When the booster reaches silver, your climbing speed is further increased. Finally, when you reach gold, your climbing speed is significantly increased. Basically, each level gives you an additional ability added on to the previous level. In order to level up boosters, you will need to collect a certain amount of a certain type of medal that pertains to the booster being leveled. For Monkey Man, it is the Pull Down medal needed.
Gun Mods - Gun Modifications are items purchased that enhance the performance of the weapon being used. Example: Reload Speed - When Reload Speed is equipped, they player can reload their weapon much quicker. Typically, you can add 1 mod to each gun you use. The booster Weapon Expert will allow you to add a second mod to your pistol, and also a 2nd to your long gun when you have that booster leveled to gold. Like boosters, certain god mods aren't available until the player reaches a certain level. Also, Character Guns can be unlocked by collecting treasure sets. These guns often have 2 or 3 mods on them already.
Kickbacks - Kickbacks, or Medal Kickbacks, are items that can be purchased and equipped. In both co-op and competitve modes, you can equip 1 Kickback. Kickbacks become available for use in the game once you collect a certain amount of medals. For example, Quick Boom requires 10 medals. Once you collect 10 medals in a game, you Kickback will be available for use. You cannot collect more medals until the Kickback is activated. Certain Kickbacks are not available until the player reaches a certain level.
Medals - Medals are used in the game to activate Kickbacks and level up Boosters. Medals can either be picked up or earned. Treasure chests have Three Medal Pickups in them. When these are picked up, they give you 3 medals towards your Kickback. Treasures can also occasionally be found in these. Other Medals are earned by doing something specific during gameplay. For example, the "Frag Em" Medal is earned when the player kills two opponents or more with the same explosion in competitive play. Each game type has its own specific medals. Although, certain game types will both offer the same medal.
Treasures - Treasures are found during game play and are used to unlock certain content: characters guns, stat hats, clothing etc. Each treasure belongs to a treasure set, and once that set is completed, the item it is associated with becomes unlocked. Treasures can be found occasionally in Three Medal Pickup chests, but more often, are found after killing an opponent. Each treasure set can be found in a specific game mode(s), not all treasures are available in all game modes.
Please use plain text.
Message 1 of 170 (690 Views)
Treasure Hunter
Registered: 07/23/2012
4490 posts
Re: Uncharted Acronyms
Apr 29, 2013
UC3 = U3 = Uncharted 3. Most important to know!!!
It's a common fact that anyone who does better than you is a lagger.
Please use plain text.
Message 2 of 170 (688 Views)
I Only Post Everything
Registered: 04/22/2013
1006 posts
Re: Uncharted Acronyms
Apr 29, 2013
Valid point lol.
Please use plain text.
Message 3 of 170 (686 Views)
Keyblade Wielder
Registered: 01/04/2012
9751 posts
Re: Uncharted Acronyms
Apr 29, 2013
RS = Reload Speed
MA = Max Ammo
CS = Clip Size
ROF = moron mod- I mean, Rate of Fire
Acc = Accuracy
BF = Blindfire
BMM = Block Mesh Maps
QB = Quick Boom
SB = Smoke Bomb
Currently looking for GTA Online friends who aren't obviously bad sports.
Please use plain text.
Message 4 of 170 (683 Views)
Gaming Beast
Registered: 12/02/2011
1631 posts
Re: Uncharted Acronyms
[ Edited ]
Apr 29, 2013
I've seen some of these posted before, however some might have just been used between a few of my friends.
RS = Riot Shield (Note: This is more commonly used for reload speed, like StuntDouble posted.)
FF = Fleet Foot
TS = Team Safe
BitS = Back in the Saddle
EE = Explosive Expert
ESE = Explosive Shell Expert
WE = Weapon Expert
AoT = Army of Three
CB = Cluster Bomb
MB = Mega Bomb
ND = Naughty Dog
MP = Multiplayer
Please use plain text.
Message 5 of 170 (679 Views)
I Only Post Everything
Registered: 04/22/2013
1006 posts
Re: Uncharted Acronyms
Apr 29, 2013
Thanks guys. I think I need to use my laptop rather than my phone to update my original post. I will do that soon, I'm making note of everything posted so far.
Please use plain text.
Message 6 of 170 (673 Views)
I Only Post Everything
Registered: 05/13/2009
996 posts
Re: Uncharted Acronyms
Apr 29, 2013
sanddude20 wrote:
No. Way. 800 post in, and I finally understand what everyone has been talking about. Bet it was quicker than most of you guys.
So this isn't the Starcraft forums? :smileysad: Boy, was I a fool.
Please use plain text.
Message 7 of 170 (663 Views)
Fender Bender
Registered: 06/05/2011
3354 posts
Re: Uncharted Acronyms
Apr 29, 2013
HIMYM= How I Met Your Mother
HTLWYP(FTROYL)= How to Live With Your Parents (For The Rest of Your Life)
EyeCue86 is a symbol of free speech. Any attempt to censor EyeCue86 is an act of evil.
"It's that time of the month again, Joel." -Ellie, The Last of Us
"It's that time of the month again, Joel"
-Ellie, The Last of Us
Please use plain text.
Message 8 of 170 (656 Views)
Fender Bender
Registered: 04/20/2010
2806 posts
Re: Uncharted Acronyms
Apr 29, 2013
General acronyms
ND -> Naughty Dog
UDF -> Uncharted Drake's Fortune
UC2 (or U2) -> Uncharted 2 among thieves
UC2 1.04 -> this was when UC2 was at it's best, it's just before the doom patch that was 1.05 in which ND lowered the health, almost all people prefer high health and hate patch 1.05, so UC2 1.04 is meant to described as when Uncharted multiplayer was at it's best
UC3 (or U3) -> Uncharted 3 Drake's Deception
DLC -> Downloadable content
FHC -> Fortune Hunters Club, a 25 dollar service for UC3 that would give you all upcoming DLC for free (until a certain date we found out later, also the forumers here are dissapointed with the FHC because of promises not kept by ND, like giving 3 map packs instead of 4, and 2 of those map packs were reskinned UC2 maps)
Hate list of acronyms
RoF -> Rate of fire, the mod everyone hates, it makes you kill faster and therefore makes weapons unbalanced, it is on the kal-7 and the m9 and overpowered on both weapons, but especially the m9
QB -> Quick boom, kickback which makes grenades explode instantly, it is overpowered because it costs as much medals as an RPG (Rocket Propelled Grenade), but can have multiple grenades, up to 3 or even more if you collect one after you used one, also they are easier to use because you just tap L2 and can use guns at the same time, while you have to carry an RPG all the time if you are planning on using it
BF -> Blindfire, it's easy, it's automatic, it's annoying
Mode acronyms:
TD -> Team Deathmatch
3TD -> Three Team Deathmatch
HC -> Hardcore, a mode that is removed for Classic, many people here like Classic but some people are dissapointed that it had to remove hardcore (TheStuntDouble :smileytongue: ), in this mode you had no mods, no kickbacks, no boosters, slightly higher health and 3HK melee (which is an acronym for three hit kill)
New stuff acronyms:
SH -> Stat Hats, awful looking items with stats, they don't fit in this game according to some (including me)
BMM -> Block Mesh Maps, a very awesome idea by ND, maps that are free, that's always nice
I think these are the most important ones :smileyhappy:
Please use plain text.
Message 9 of 170 (645 Views)
Uncharted Territory
Registered: 01/01/2010
1494 posts
Re: Uncharted Acronyms
Apr 29, 2013
for cluster bomb, we generally say only " clust " intead of this lettesr CB.
Uncharted 3 Co-op Certification Center: Uncharted.VarHyid.com
Please use plain text.
Message 10 of 170 (608 Views) |
global_01_local_0_shard_00000017_processed.jsonl/50853 | Open: o fix new() bug pointed out by "Paul" at o allow assignment to _HASH & _ARRAY (but not _KEYS) o change names of _HASH, _ARRAY, and _KEYS (to what?) o add a _TIEHASH accessor? o allow nesting of structures which aren't _pointers_ o enum support? o #define support? o type checking in accessors Closed: o struct typemaps should look up extra info either in magic or hash o in the absence of STRUCTS and NOSTRUCTS, any structs will be bound o allow anonymous structures o overloaded STRUCTS operator: STRUCTS => \d+ means all structs o make the default behaviour to bind to all structs |
global_01_local_0_shard_00000017_processed.jsonl/50854 | Known bugs in libpng version 1.2.12 1. April 22, 2001: pnggccrd.c has been reported to crash on NetBSD when reading interlaced PNG files, when assembler code is enabled but running on a non-MMX i386 platform. STATUS: Under investigation. The change to pnggccrd.c in libpng-1.2.1 fixed a problem under FreeBSD but not the problem with NetBSD, which still fails as of libpng-1.2.2rc1. 2. February 23, 2006: The custom makefiles don't build libpng with -lz. STATUS: This is a subject of debate. The change will probably be made as a part of a major overhaul of the makefiles in libpng version 1.3.0. 3. February 24, 2006: The Makefile generated by the "configure" script fails to install symbolic links => that are generated by the custom makefiles. STATUS: For now, system library builders should use the custom makefiles. |
global_01_local_0_shard_00000017_processed.jsonl/50855 | The site is under maintenance.
PidFile-1.04 has the following 2 errors.
manifest_matches_dist["MANIFEST (8) does not match dist (9):","Missing in MANIFEST: ignore.txt","Missing in Dist: "]
metayml_conforms_to_known_specCustom key 'distribution_type' must begin with 'x_' or 'X_'. (distribution_type) [Validation: 2] |
global_01_local_0_shard_00000017_processed.jsonl/50863 | Take the 2-minute tour ×
Does Adam Machanic's sp_WhoIsActive return the actual query plan or the estimated plan when run with @get_plans=1 ?
share|improve this question
add comment
1 Answer
up vote 8 down vote accepted
The tool grabs the plan that is being run at that time. From an email response from Adam:
"Actual plan" usually refers to the query plan that has the actual row counts, number of executions of each iterator, etc. Who is Active cannot return that version of the plan. But the plan it returns is indeed the "actual" plan that's running at the time -- in other words, the plan will not be recompiled into some other plan by the time Who is Active can get it.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/50867 | I'm trying to find out what exactly all the capabilities are needed for but I am unable to find any detailed overview. For example, MultimediaDD - what do I need it for? The only thing I could find is the useless "to access multimedia device drivers". Access how? Which drivers? When would that be needed? What APIs use it?
I would like to get comprehensive info on all these but the only thing I see is vague marketing documentation. Is there any useful info about this at all? I have no idea what kind of a certificate I need if I can't see what they allow me to do. |
global_01_local_0_shard_00000017_processed.jsonl/50886 | [per-sis-tuhns, -zis-]
the act or fact of persisting.
the quality of being persistent: You have persistence, I'll say that for you.
continued existence or occurrence: the persistence of smallpox.
the continuance of an effect after its cause is removed.
Also, persistency.
1540–50; persist + -ence
nonpersistence, noun
nonpersistency, noun
1. See perseverance. Unabridged
Cite This Source Link To persistence
World English Dictionary
persistence or persistency (pəˈsɪstəns)
1. the quality of persisting; tenacity
2. the act of persisting; continued effort or existence
3. the continuance of an effect after the cause of it has stopped: persistence of vision
persistency or persistency
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
Word Origin & History
1540s, from Fr. persistance, from L. persistentem (see persist). Often spelled persistance 16c.
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
American Heritage
Medical Dictionary
persistence per·sist·ence (pər-sĭs'təns, -zĭs'-)
1. Continuance of an effect after the cause is removed.
2. Continuance of a part or an organ, rather than having it disappear in an early stage of development.
The American Heritage® Stedman's Medical Dictionary
Cite This Source
Computing Dictionary
persistence definition
1. A property of a programming language where created objects and variables continue to exist and retain their values between runs of the program.
2. The length of time a phosphor dot on the screen of a cathode ray tube will remain illuminated after it has been energised by the electron beam. Long-persistence phosphors reduce flicker, but generate ghost-like images that linger on screen for a fraction of a second.
Cite This Source
Example sentences
It takes tactics, persistence, and gradual learining and thats that.
But his persistence seems to have won them over.
Indeed, the persistence of ink on paper is a sort of miracle.
Champions of new inventions display persistence and courage of heroic quality.
Copyright © 2014, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/50887 | de tasselled
to furnish or adorn with tassels.
to form into a tassel or tassels.
to remove the tassel from (growing corn) in order to improve the crop.
verb (used without object), tasseled, tasseling or (especially British) tasselled, tasselling.
(of corn) to put forth tassels (often followed by out ).
1250–1300; Middle English (noun) < Old French tas(s)el fastening for cloak < Vulgar Latin *tassellus, blend of Latin tessella (diminutive of tessera die for gaming) and taxillus (diminutive of tālus die for gaming). See tessellate, talus1
tasseler; especially British, tasseller, noun
tasselly; especially British, tasselly, adjective
detassel, verb (used with object), detasseled, detasseling or (especially British) detasselled, detasselling.
untasseled, adjective
untasselled, adjective Unabridged
Cite This Source Link To de tasselled
World English Dictionary
tassel (ˈtæsəl)
1. a tuft of loose threads secured by a knot or ornamental knob, used to decorate soft furnishings, clothes, etc
2. anything resembling this tuft, esp the tuft of stamens at the tip of a maize inflorescence
3. (tr) to adorn with a tassel or tassels
4. (intr) (of maize) to produce stamens in a tuft
5. (tr) to remove the tassels from
[C13: from Old French, from Vulgar Latin tassellus (unattested), changed from Latin taxillus a small die, from tālus gaming die]
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
Word Origin & History
c.1300, "mantle fastener," from O.Fr. tassel "a fastening, clasp" (c.1150), from V.L. *tassellus, said to be from L. taxillus "small die or cube," a dim. of talus "knucklebone, ankle" (see talus (1)). But OED finds this doubtful and calls attention to the variant form tossel
and suggests association with toss (v.). Meaning "hanging bunch of small cords" is first recorded late 14c.
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
Copyright © 2014, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/50888 | 1 [hin-der]
verb (used with object)
to cause delay, interruption, or difficulty in; hamper; impede: The storm hindered our progress.
to prevent from doing, acting, or happening; stop: to hinder a man from committing a crime.
verb (used without object)
to be an obstacle or impediment.
before 1000; Middle English hindren, Old English hindrian to hold back, equivalent to hinder hinder2 + -ian causative verb suffix
hinderer, noun
hinderingly, adverb
unhindered, adjective
unhindering, adjective
unhinderingly, adverb
1. encumber, obstruct, trammel. 2. block, thwart. See prevent.
1. encourage.
Dictionary.com Unabridged
Cite This Source Link To hindering
World English Dictionary
hinder1 (ˈhɪndə)
1. to be or get in the way of (someone or something); hamper
2. (tr) to prevent
[Old English hindrian; related to Old Norse hindra, Old High German hintarōn]
adj, —n
hinder2 (ˈhaɪndə)
(prenominal) situated at or further towards the back or rear; posterior: the hinder parts
[Old English; related to Old Norse hindri latter, Gothic hindar beyond, Old High German hintar behind]
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
Word Origin & History
O.E. hindrian "to harm, injure, impair," from P.Gmc. *khinderojanan, from a root meaning "on that side of, behind" (cf. hind (adj.)); thus the ground sense is "to put or keep back." Cognate of O.N. hindra, Du. hinderen, Ger. hindern "to keep back."
"rear," O.E. hinder (adv.), possibly comparative of hind (adj.).
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
Example sentences
If anything this article is hindering the llama business.
the house, hindering access to the outdoors.
Useful is great, but it's another example of needing to question whether the
government is helping or hindering progress.
Ravi also faces charges of tampering with evidence, hindering his own
apprehension, and witness tampering.
Related Words
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/50890 | tsutsugamushi dis ease
tsutsugamushi disease
[tsoo-tsuh-guh-moo-shee, tsoo-]
noun Pathology.
< Japanese tsutsuga-mushi typhus mite, equivalent to tsutsuga hindrance, ailment (earlier tutu(n)ga, derivative of tutumi to hinder, with ka place) + mushi vermin
Dictionary.com Unabridged
Cite This Source Link To tsutsugamushi dis ease
World English Dictionary
tsutsugamushi disease (ˌtsʊtsʊɡəˈmʊʃɪ)
1. one of the five major groups of acute infectious rickettsial diseases affecting man, common in Asia and including scrub typhus. It is caused by the microorganism Rickettsia tsutsugamushi, transmitted by the bite of mites
2. another name for scrub typhus
[from Japanese, from tsutsuga disease + mushi insect]
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
American Heritage
Medical Dictionary
tsutsugamushi disease tsu·tsu·ga·mu·shi disease (tsōō'tsə-gə-mōō'shē)
See scrub typhus.
The American Heritage® Stedman's Medical Dictionary
Cite This Source
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/50891 | 14th century b.c, a king of Egypt of the 18th dynasty.
Also, Tutankhamon, Tutankhamun, Tutenkhamon [toot-eng-kah-muhn] .
Dictionary.com Unabridged
Cite This Source Link To tutankhamun
World English Dictionary
Tutankhamen or Tutankhamun (ˌtuːtənˈkɑːmɛn, -mən, ˌtuːtənkɑːˈmuːn)
king (1361--1352 bc) of the 18th dynasty of Egypt. His tomb near Luxor, discovered in 1922, contained many material objects
Tutankhamun or Tutankhamun
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
American Heritage
Cultural Dictionary
Tutankhamen [(tooht-ahng-kah-muhn)]
A pharaoh, or king of Egypt, who lived about 1400 b.c. His reign was relatively unimportant, but the discovery of his unplundered tomb in the 1920s is numbered among the great archaeological discoveries of all time.
Note: Tutankhamen is popularly known as King Tut.
The American Heritage® New Dictionary of Cultural Literacy, Third Edition
Copyright © 2005 by Houghton Mifflin Company.
Published by Houghton Mifflin Company. All rights reserved.
Cite This Source
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/50906 | Unified Content Model
From Joomla! Documentation
Revision as of 06:26, 20 May 2013 by Elin (Talk | contribs)
The Joomla! CMS is a Content Management System. The Unified Content Model is a concept that involves the organization of content and content related features in the CMS. Joomla 1.x, 1.5 and 3.0 do not used a unified content model. That is, each kind of content (articles, weblinks, contacts, newsfeeds, and others) is considered completely separate from the others. However, a closer look a the database structures and and code for each type of content reveals that there are many commonalities. The UCM concept seeks to take advantage of this.
Possible Strategies |
global_01_local_0_shard_00000017_processed.jsonl/50907 | Oracle8 Parallel Server Concepts & Administration
Release 8.0
Prev Next
Space Management and Free List Groups
Thus would I double my life's fading space;
For he that runs it well, runs twice his race.
Abraham Cowley, Discourse xi, Of Myself
This chapter explains space management concepts:
See Also: Chapter 17, "Using Free List Groups to Partition Data", for a description of space management procedures.
How Oracle Handles Free Space
This section provides an overview of how Oracle handles free space. It contains the following sections:
Oracle Parallel Server enables transactions running on separate instances to insert and update data in the same table concurrently, without contention to locate free space for new records.
Figure 11-1 Instances Concurrently Inserting to a Table
To take advantage of this capability, you must actively manage free space in your database using several structures which are defined in this chapter.
For each database object (a table, cluster, or index), Oracle keeps track of blocks with space available for inserts (or for updates which may cause rows to exceed space available in their original block). A user process that needs free space can look in the master free list of blocks that contain free space. If the master free list does not contain a block with enough space to accommodate the user process, Oracle allocates a new extent.
New extents that are automatically allocated to a table add their blocks to the master free list. This can eventually result in contention for free space among multiple instances on a parallel server because the free space contained in automatically allocated extents cannot be reallocated to any group of free lists. You can have more control over free space if you specifically allocate extents to instances; in this way you can minimize contention for free space.
Database Storage Structures
This section describes basic structures of database storage:
Segments and Extents
The extents of a segment are all stored in the same tablespace; they may or may not be contiguous on disk. The segments can span files, but individual extents cannot.
High Water Mark
The high water mark is the boundary between used and unused space in a segment. As requests are received for new free blocks (which cannot be satisfied by existing free lists), the block to which the high water mark points becomes a used block, and the high water mark is advanced to the next block. In other words, the segment space to the left of the high water mark is used, and the space to the right of it is unused.
Figure 11-2 shows a segment which consists of three extents containing 10K, 20K, and 30K of space, respectively. The high water mark is in the middle of the second extent, thus the segment contains 20K of used space (to the left of the high water mark), and 40K of unused space (to the right of the high water mark.
Figure 11-2 High Water Mark
See Also: Oracle8 Concepts for further information about segments and extents.
Structures for Managing Free Space
Oracle uses the following structures to manage free space:
Process free lists are used to relieve contention for free space among processes inside the instance, even if multiple instances can hash to a single free list group. Free list groups are used to relieve forced reads/writes between instances. Process free lists and free list groups are supported on all database objects alike: tables, indexes, and clusters.
Transaction Free Lists
A transaction free list is a list of blocks made free by uncommitted transactions. They exist by default.
When transactions are committed, the freed blocks eventually go to the master free list (described below).
Process Free Lists
A process free list (also termed simply a "free list" in this documentation) is a list of free data blocks that can be drawn from a number of different extents within the segment.
Blocks in free lists contain free space greater than PCTFREE (the percentage of a block to be reserved for updates to existing rows). In general, blocks included in process free lists for a database object must satisfy the PCTFREE and PCTUSED constraints described in the chapter "Data Blocks, Extents, and Segments" in Oracle8 Concepts.
Process free lists must be specifically enabled by the user. You can specify the number of process free lists desired by setting the FREELISTS parameter when you create a table, index or cluster. The maximum value of the FREELISTS parameter depends on the Oracle block size on your system. In addition, for each free list, you need to store a certain number of bytes in a block to handle overhead.
Free List Groups
A free list group is a set of free lists you can specify for use by one or more particular instances. Each free list group provides free data blocks to accommodate inserts or updates on tables and clusters, and is associated with instance(s) at startup.
A parallel server has multiple instances, and process free lists alone cannot solve the problem of contention. Free list groups, however, effectively reduce pinging between instances.
When enabled, free list groups divide the set of free lists into subsets. Descriptions of process free lists are stored in separate blocks for the different free list groups. Each free list group block points to the same free lists, except that every instance gets its own. (Or, in the case of more instances than free list groups, multiple instances hash into the same free list group.) This ensures that the instances do not compete for the same blocks
Attention: In Oracle Parallel Server, you should always use free list groups, along with process free lists.
The Master Free List
The master free list is a repository of blocks which contain available space, drawn from any extent in the table. It exists by default, and includes:
If free list groups exist, each group has its own master free list. There is, in addition, a central master free list which is mostly used for parallel operations.
Avoiding Contention for the Segment Header and Master Free LIst
A highly concurrent environment has potential contention for the segment header, which contains the master free list.
In a single instance environment, multiple process free lists help to solve the problem of many users seeking free data blocks by easing contention on segment header blocks.
In a multi-instance environment, as illustrated in Figure 11-3, process free lists provide free data blocks from available extents to different instances. You can partition multiple free lists so that extents are allocated to specific database instances. Each instance hashes to one or more free list groups, and each group's header block points to process free lists.
If no free list groups are allocated, however, the segment header block of a file points to the process free lists. Without free list groups, every instance must read the segment header block in order to access the free lists.
Figure 11-3 Contention for the Segment Header
Figure 11-4 shows the blocks of a file in which the master free list is stored in the segment header block. Three instances are forced to read this block in their effort to obtain free space. Because there is only one free list, there is only one insertion point. Process free lists can help to reduce this contention by spreading this insertion point over multiple blocks, each of which will be accessed less often.
Figure 11-4 Contention for Master Free List
Example: Free List Groups
A Simple Case
Figure 11-5 illustrates the division of free space for a table into a master free list and two free list groups, each of which contains three free lists. This example concerns a well-partitioned application in which deletes occur. The master free list pictured is the master free list for this particular free list group.
The table was created with one initial extent, after which extents 2 and 5 were allocated to instance X, extents 3 and 4 were allocated to instance Y, and extent 6 was allocated automatically (not to a particular instance). Notice the following:
A More Complicated Case
The simple case in Figure 11-5 becomes more complicated when you consider that extents are not allocated to instances permanently, and that space allocated to one instance cannot be used by another instance. Each free list group has its own master free list. After allocation, some blocks go onto the master free list for the group, some to a process free list, and some do not belong to a free list. If the application is totally partitioned, then once blocks are allocated to a given instance, they stay with that instance. However, blocks can move from one instance to another if the application is not totally partitioned.
Consider a situation in which instance Y fills a block, takes it off the free list, and then instance X frees the block. The block then goes to the free list of instance X, the instance which freed it. If instance Y needs space, it cannot reclaim this block. Instance Y can only obtain free space from its own free list group.
Figure 11-5 Groups of Free Lists for a Table
SQL Options for Managing Free Space
Several SQL options enable you to allocate process free lists and free list groups for tables, clusters, and indexes. You can explicitly specify that new space for an object be taken from a specific datafile. You can also associate free space with particular free list groups, which can then be associated with particular instances.
The SQL statements include:
See Also: Oracle8 SQL Reference for complete syntax of these statements.
Managing Free Space on Multiple Instances
This section describes:
Partitioning Free Space into Multiple Free Lists
You can partition free space for individual tables, clusters (other than hash clusters), and indexes into multiple process free lists. Multiple free lists allow a process to search a specific pool of blocks when space is needed, thus reducing contention among users for free space. Within an instance, using free lists can reduce contention if multiple processes are inserting into the same table.
Each table has a master free list of blocks with available space, and can also contain multiple free lists. Before looking in the master free list, a user process scans the appropriate free list to locate a block that contains enough space.
Partitioning Data with Free List Groups
The separation of free space into groups can improve performance by reducing contention for free data blocks during concurrent inserting by multiple instances on a parallel server. You can thus create groups of process free lists for a parallel server, each of which can contain multiple free lists for a table, index, or cluster. You can use free list groups to partition data by allocating extents to particular instances.
See Also: "Free Lists with Import and Export Utilities" on page B-4
Chapter 12, "Application Analysis", for more information on partitioning data.
How Free Lists and Free List Groups Are Assigned to Instances
Figure 11-6 illustrates the way in which free lists and free list groups are assigned to instances.
Figure 11-6 How Free Lists and Free List Groups Are Assigned
Note: Using the statement ALTER SESSION INSTANCE_NUMBER you can alter the instance number to be larger than the value of MAXINSTANCES. The figure shows how this possibility is taken into account: for the purposes of the internal calculation whereby free list groups are assigned, the instance number is brought back within the boundaries of MAXINSTANCES.
* Free lists are partitioned as follows: If there are 3 instances and 35 free list groups, then instance 1 will handle the first twelve free list groups, instance 2 the next twelve, and instance 3 the remaining eleven. The actual free list group block is determined by hashing oracle_pid by the number of free list groups.
Free Lists Associated with Instances, Users, and Locks
This section describes:
Associating Instances with Free Lists
A table can have separate groups of process free lists that are assigned to particular instances. Each group of free lists can be associated with a single instance, or several instances can share one group of free lists. All instances also have access to the master free list of available space.
Groups of free lists allow you to associate instances with different sets of data blocks for concurrent inserts and updates requiring new space. This reduces contention for the segment header block, which contains information about the master free list of free blocks. For tables that do not have multiple free list groups, the segment header also contains information about free lists for user processes. You can use free list groups to locate the data that an instance inserts and accesses frequently in extents allocated to that instance.
Data partitioning can reduce contention for data blocks. Often the PCM locks that cover blocks in one free list group tend to be held primarily by the instance using that free list group, because an instance that modifies data is usually more likely to reuse that data than other instances. However, if multiple instances take free space from the same extent, they are more likely to contend for blocks in that extent if they subsequently modify the data that they inserted.
Assignment of New Instances to Existing Free List Groups
instance_number modulo number_of_free_list_groups
In a system with relatively few nodes, such as a clustered system, the FREELIST GROUPS option for a table should generally have the same value as the MAXINSTANCES option of CREATE DATABASE, which limits the number of instances that can access a database concurrently.
In a massively parallel system, however, MAXINSTANCES could be many times larger than FREELIST GROUPS so that many instances share one group of free lists.
See Also: "Associating Instances, Users, and Locks with Free List Groups" on page 17-9.
Associating User Processes with Free Lists
Associating PCM Locks with Free Lists
If each extent in the table is in a separate datafile, you can use the GC_FILES_TO_LOCKS parameter to allocate specific ranges of PCM locks to each extent, so that each set of PCM locks is associated with only one group of free lists.
Figure 11-7 shows multiple extents in separate files. The GC_FILES_TO_LOCKS parameter allocates 10 locks to files 8 and 10, and 10 locks to files 9 and 11. Extents A and C are in the same free list group, and extents B and D are in another free list group. One set of PCM locks is associated with files 8 and 10, and a different set of PCM locks is associated with files 9 and 11. You do not need separate locks for files which are in the same free list group (such as files 8 and 10, or files 9 and 11).
Figure 11-7 Extents and Free List Groups
This example assumes total partitioning for reads as well as for writes. If more than one instance is to update blocks, then it would still be desirable to have more than one lock per file in order to minimize forced reads and writes. This is because even with a shared lock, all blocks held by a lock are subject to forced reads when another instance tries to read even one of the locked blocks.
See Also: "Setting GC_FILES_TO_LOCKS: PCM Locks for Each Datafile" on page 15-7.
Controlling the Allocation of Extents
This section covers the following topics:
When a row is inserted into a table and new extents need to be allocated, a certain number of contiguous blocks (specified with !blocks in the GC_FILES_TO_LOCKS parameter) are allocated to the free list group associated with an instance. Extents allocated when the table or cluster is first created and new extents that are automatically allocated add their blocks to the master free list (space above the high water mark).
Automatic Allocation of New Extents
Pre-allocation of New Extents
You have two options for controlling the allocation of new extents.
Pre-allocating extents is a static approach to the problem of preventing automatic allocation of extents by Oracle. You can pre-allocate extents to tables that have free list groups. This means that all the free blocks will be formatted into free lists, which will reside in the free list group of the instance to which you are pre-allocating the extent. This approach is useful if you need to partition data so as to greatly reduce all pinging on insert, or if you need to accommodate objects which you expect will grow.
Note: False pinging will not be eliminated.
See Also: "Pre-allocating Extents (Optional)" on page 17-10.
Dynamic Allocation of Blocks on Lock Boundaries
If you primarily need to accommodate growth, the strategy of dynamically allocating blocks to free list groups would be more effective than pre-allocation of extents. You can use the !blocks option of GC_FILES_TO_LOCKS to dynamically allocate blocks to a free list from the high water mark within a lock boundary. This method does not eliminate all pinging on the segment header-- rather, it allocates blocks on the fly so that you do not have to pre-allocate extents.
Remember that locks are owned by instances. Blocks are allocated on a per-instance basis--and that is why they are allocated to free list groups. Within an instance, blocks can be allocated to different free lists.
Using this method, you can either explicitly allocate the !blocks value, or else leave the balance of new blocks still covered by the existing PCM lock. If you choose the latter, remember that there still may be contention for the existing PCM lock by allocation to other instances. If the PCM lock covers multiple groups of blocks, there may still be unnecessary forced reads and writes of all the blocks covered by the lock.
See Also: "Dynamically Allocating Extents" on page 17-14.
Moving the High Water Mark of a Segment
A segment's high water mark is the current limit to the number of blocks that have been allocated within the segment. If you are allocating extents dynamically, the high water mark is also the lock boundary. The lock boundary and the number of blocks which will be allocated at one time within an extent must coincide. This value must be the same for all instances.
Consider the following example, in which there are 4 blocks per lock (!4). Locks have been allocated before the block content has been entered. If we have filled datablock D2, held by Lock 2, and then allocate another range of 4 blocks, only the number of blocks which fits within the lock boundary will actually be allocated: in this case, blocks 7 and 8. Both of these are protected by your current lock. With the high water mark at 8, when instance 2 allocates a range of blocks, all four blocks 9 to 12 are allocated, covered by lock 3. The next time instance 1 allocates blocks it will get blocks 13 to 16, covered by lock 4.
Figure 11-8 A File with High Water Mark Moving as Blocks Are Allocated
The example in this section assumes that GC_FILES_TO_LOCKS has the following setting for both instances:
GC_FILES_TO_LOCKS = "1000!5"
Figure 11-9 shows the incremental process by which the segment grows:
In this way, if user A on Instance 1 is working on block 10, no one else from either instance can work on any block in the range of blocks that are covered by Lock 2 (that is, blocks 6 through 10).
Figure 11-9 Allocating Blocks Within an Extent
Copyright © 1997 Oracle Corporation.
All Rights Reserved. |
global_01_local_0_shard_00000017_processed.jsonl/50908 | Sun Java System Web Server 6.1 SP10 Administrator's Configuration File Reference
Applicable in ObjectType-class directives.
The shtml-hacktype function changes the Content-Type of any .htm or .html file to magnus-internal/parsed-html and returns REQ_PROCEED. This provides backward compatibility with server-side includes for files with .htm or .html extensions. The function may also check the execute bit for the file on UNIX systems. The use of this function is not recommended. |
global_01_local_0_shard_00000017_processed.jsonl/50909 | ResultSets and streaming columns
To get a field from the ResultSet using streaming columns, you can use the getXXXStream methods if the type supports it. See Streamable JDBC data types for a list of types that support the various streams. (See also Mapping of java.sql.Types to SQL types.)
The following code fragment shows how a user can retrieve a LONG VARCHAR column as a stream:
// retrieve data as a stream
while ( {
// use a to get the data ip = rs.getCharacterStream(1);
// print the data
char[] buff = new char[128];
int size;
while ((size = != -1) { |
global_01_local_0_shard_00000017_processed.jsonl/50916 | As part of a complete preventive maintenance program, periodic oil analysis will monitor the condition of power transformers and detect problems before they reach serious proportions.
Power transformers are a vital link in the transmission and distribution of electrical power. In fact, almost every business, whether industrial or commercial, relies on transformers for its electric power supply. Since it's extremely important to keep them working, a preventive maintenance plan is essential.
A study by Hartford Steam Boiler over a period of 20 years indicates that 13% of all transformer failures were caused by inadequate maintenance. This number is significant, considering the study found that the average age of a transformer at the time of failure was only slightly more than 11 years; transformers are expected to last 25 to 30 years.
Since transformers have few, if any moving parts, it's easy to acquire an "out of sight, out of mind" mentality. However, as the above study points out, this attitude can prove costly in the long run. Instituting a planned maintenance program can greatly reduce the number of unexpected power interruptions caused by transformer failure. This program should include temperature, oil level, and gas pressure checks; operational checks on accessories such as fans, pumps, and load tap changers; and visual checks for cracked or leaking bushings. More importantly, these tests should be performed on a regularly scheduled basis because periodic testing and inspection provide trend information and permit repairs and other remedial action to be budgeted on a timely basis.
Why test insulating fluid?
One major element of a transformer maintenance program is periodic testing of insulating fluid. It should be performed in conjunction with the other routine maintenance functions mentioned above.
The insulating oil in a power transformer performs two major functions. First, it serves as electrical insulation to withstand the high voltages present inside the transformer. Second, it functions as a heat transfer medium to dissipate heat generated within the transformer windings. Thus, the oil must maintain good electrical properties while resisting thermal degradation and oxidation.
Most power transformers are filled with mineral oil refined to achieve the desired electrical and chemical properties. Some transformers, particularly indoor units, are filled with a synthetic fluid, such as silicon, R-temp, or Askarel (PCB fluid).
There are several benefits to conducting periodic analyses of a transformer's insulating fluid. First, the tests will indicate the interior condition of the transformer. Any sludge that is present within the transformer can be detected and effectively removed before it can proceed into the windings and other interior surfaces of the transformer. Eliminating sludge prolongs transformer life.
Another advantage of oil testing is the prevention of unscheduled outages. If problems are detected early enough, corrective action can be scheduled when disruption of electrical service will be minimal. A manufacturing facility for instance, can schedule servicing during shutdowns, when other maintenance functions are planned. Commercial locations may consider holidays and weekends for planned maintenance.
Finally, because transformer oil breaks down in a predictable fashion, periodic testing will prove helpful in determining any trends. This allows comparisons between normal and abnormal rates of deterioration. Although one set of test data will indicate the presence of contaminants, it will not enable accurate analysis of any trends that are developing.
How is testing done?
To measure the quality of insulating oil and establish a benchmark for the degree of deterioration, several tests are used. Samples of the fluid can be drawn while the transformer is in normal operation through drain valves or sampling ports. The following list describes some of the most common laboratory tests, and references the appropriate ASTM method.
Dielectric breakdown. (ASTM D877, D1816) Dielectric breakdown is the minimum voltage at which electrical flashover occurs in an oil. It's a measure of the ability of an oil to withstand electrical stress at power frequencies without failure. A low value for the dielectric breakdown voltage generally indicates the presence of contaminants, such as water, dirt, or other conducting particles in the oil.
Neutralization number. (ASTM D974) The neutralization number of an oil is a measure of the amount of acidic or alkaline materials present. As an oil ages in service, the acidity and, therefore, the neutralization number increases. A used oil having a high neutralization number indicates the oil is either oxidized or contaminated with materials such as varnish, paint, or other foreign matter. A negative neutralization number results from an alkaline contaminant in the oil.
Interfacial tension. (ASTM D971) The interfacial tension of an oil is the force, in dynes per centimeter, required to rupture the oil film existing at an oil-water interface. When certain contaminants such as soaps, paints, varnishes, and oxidation products are present in the oil, the film strength of the oil is weakened; thus less force is required to rupture the oil film. For oils in service, a decreasing value indicates the accumulation of contaminants, oxidation products, or both. It's a precursor of the presence of objectionable oxidation products that may attack the insulation and interfere with the cooling of the transformer windings.
Specific gravity. (ASTM D1298) The specific gravity (relative density) of an oil is the ratio of the weights of equal volumes of oil and water. A high specific gravity indicates the oil's ability to suspend water. In extremely cold climates, specific gravity can be used to determine whether ice, resulting from freezing of water in oil-filled apparatus, will float on the oil. Such a condition possibly may result in flashover of conductors extending above the oil level.
Water content. (ASTM D1315; D1533) This test measures the concentration of water contained within the oil. A low water content is necessary to obtain and maintain acceptable electrical strength and low dielectric losses in insulation systems.
Color. (ASTM D1500) This test compares the actual color of the oil to an established spectrum of colors. Expressed numerically from 0 to 5, a high color number indicates contamination caused by carbon or the deterioration of either insulation material or the oil.
Visual examination. (ASTM D1524) An oil sample is visually examined by passing a beam of light through it to determine transparency and identify foreign matters. Poor transparency, cloudiness, or the observation of particles indicate contamination, such as moisture, sludge, or other foreign matter.
Power factor. (ASTM D924) Power factor indicates the dielectric loss of an oil. A high power factor is an indication of the presence of contamination or deterioration products such as moisture, carbon, or other conducting matter, metal soaps, and products of oxidation.
Flash point. (ASTM D92) The flash point is the minimum temperature at which heated oil gives off sufficient vapor to form a flammable mixture with air. It is an indicator of the volatility of the oil.
Pour point. (ASTM D97) The pour point is the lowest temperature at which the oil will flow. A low pour point is important, particularly in cold climates, to ensure that the oil will circulate and serve its purpose as an insulating and cooling medium.
Corrosive sulfur. (ASTM D1275) This test detects the presence of objectionable quantities of elemental and thermally unstable sulfur-bearing compounds in an oil. When present, these compounds can cause corrosion of certain transformer metals, such as copper and silver.
Viscosity. (ASTM D455; D88) Viscosity is the resistance of oil to flow under specified conditions and is the principal factor in the convection flow of oil in an electrical device. It influences heat transfer and, consequently, the temperature rise in apparatus.
Dissolved gas analysis. All liquid-filled transformers generate gases during normal operation. When a transformer begins to function abnormally, the rate of gas production increases. Analyzing these gases and their rate of production is another valuable laboratory tool for evaluating the condition of an operating transformer.
The most accurate method of analyzing dissolved gas in a transformer is using gas chromatography. The gases dissolved in the oil are extracted from a sample and analyzed by a gas chromatograph. This method identifies the individual gases present and also the quantitative amounts. Several key gases are attributed to certain fault conditions that generated them. These are shown in the table below.
Listing of fault conditions and the resulting generation of gases.
Interpreting the results from a gas chromatograph depends upon the total quantity of the combustible gases, the quantity of each individual gas, and the rate of increase. However, the interpretation of a dissolved gas test is not an exact science.
Since normal operation causes the formation of certain gases, simply determining the presence of gases within the oil should not cause alarm. What is important is the rate and amount of gases generated. As in other tests, gas analysis should be conducted on a regular basis to indicate trends or changes in results. |
global_01_local_0_shard_00000017_processed.jsonl/50918 | Return to Transcripts main page
Obama's Tax Cut Compromise; Interview With Ehud Barak
Aired December 12, 2010 - 10:00 ET
The best that can be said about Obama's compromise with the Republican Party on taxes is that it might not cause too much harm. The extension of unemployment benefits will keep putting money into the economy. There are some good provisions in the bill to encourage businesses to create jobs, but on the whole, a great chance has been lost to start putting America's fiscal house in order.
If we had repealed some part or the whole of the Bush tax cuts, it would have gone a long way toward reducing the structural budget deficit the United States has. And more importantly, what the bill does is to try one more time to encourage Americans to spend more money.
Now, we got into this mess because Americans borrowed and spent too much and now, we're trying to get out of it by borrowing and spending more. The Republican Party has come to power in the recent election by denouncing Keynesian economics, that is the government's effort to stimulate the economy, but it turns out they are actually as committed to Keynesian economics as the Democrats.
You see, John Maynard Keynes simply said that when businesses and consumers stop spending, the government has to step in. He advocated two kinds of government actions, public spending or tax cuts. The Republicans simply prefer the latter. In fact, the cost of their Keynesian bill is about the same as the cost of the Democrat's stimulus bill of 2009, $900 billion.
What no one is talking about as we add to the deficit by encouraging consumer spending is that the only path to long-term growth is to have consumers borrow less, get their balance sheets in order and for the economy to focus more on investments for the future in industries of the future.
And while we shy away from that kind of thinking about government funding, the fastest growing country in the world, China, has uses precisely this approach to achieve its extraordinary growth rates and now, China is moving to a whole new level. Reuters reports this week on a plan by the Chinese government to invest $1.5 trillion over the next five years in strategic industries.
Beijing wants China to move out of low wage manufacturing and has identified seven key areas where it wants to quadruple its output in five years. The targeted sectors are alternative energy, biotechnology, new generation information technology, high-end equipment manufacturing, advanced materials, alternative fuel and energy saving and environmentally-friendly technologies.
So, the Chinese will now move into these sophisticated industries while lending us the money, which we will use to give ourselves a tax break. Someone in Beijing is laughing.
We've got a great show for you today. First up, Israel's Defense Minister, Ehud Barak on Wikileaks, the peace process and Iran. Then one of the top Republican women, no, not Sarah Palin, but I'll ask Christie Todd Whitman what she thinks of Sarah Palin as a candidate for 2012 and much else.
Next up, what in the world. Glenn Beck says 10 percent of the world's Muslims are terrorists?
GLENN BECK: What is the number of Islamic terrorists, one percent? I think it's closer to 10 percent. Why isn't it receiving coverage?
ZAKARIA: We'll fact check that for him. Then, China flexed its muscles again this week. What is going on in that country? We gather a panel of experts. Finally, we spot a Star of David in Tehran. Let's get started.
Cut off the head of the snake. That's what Saudi Arabia's King Abdullah implored the United States to do with Iran's nuclear program according to the Wikileaks cables.
It was further evidence of what has been an open secret for years. The Arab world might be just as worried about Iran's nuclear program as Israel is. Ehud Barak is Israel's defense minister and of course, formerly its prime minister. He joins me now.
Welcome. Do you think that the fact that we now know that Saudi Arabia in particular, but other Arab countries, are so concerned about Iran's nuclear program helps in constructing the coalition?
EHUD BARAK, ISRAELI DEFENSE MINISTER: I think that they are deeply terrified in nuclear Iran. The backyard was not a secret for leaders around the world. I think that the exposure of the nuances and the world ego of such utterances might not contribute to the capacity to deal with the sensitive issues in a corporate manner.
ZAKARIA: Because they have now been embarrassed and will find it difficult.
BARAK: I think the impact of Wikileaks is to dilute the nuances and substantives of diplomatic conversations around the world, not just with America. But having said that, I think that the exposed how realistic leaders all around the Middle East about the risks of a nation, a big historically big nation like Iran, been taken over by a regime like Atoelas.
Becoming the ultimate sponsor of world terror of all types and trying to reach nuclear military capability. That's a signal of a major start to world order and I think that it should be dealt with.
ZAKARIA: Let's talk about the nature of that threat. I would say one has to recognize that for the last 10 years, roughly, from what we can tell, Israeli intelligence and even Israeli public warnings about Iran's capacity have not been true, have not been right.
In other words, every three years we hear the Israelis say in about a year or two, the Iranian will have the capacity to make nuclear weapons. So far, they still do not.
Does that mean the program is weaker than you might have thought five or six years ago? So far, they have not been able to progress as fast or as far as your government has claimed.
BARAK: You pointed to the probably full half of the glass. I'm looking on the other side. I said, that really matters -- what's really happening in front of our eyes is a repetition of what happened generation ago with Pakistan.
I still remember sitting down with Kazi when he was head of CIA - head of our intelligence community and we discussed what happened to Pakistan and we know now they have an -- whose missile and everything. Ten years ago, Clinton about the Pyonyang reactor, North Korea. Look what happens now.
Somehow, I feel that default is that Iran will succeed in defying and deceiting and deterring the rest of the world and they will -- death should be on mind. When you calibrate, the world community calibrates, the timing of sanctions, diplomacy and how long we should allow it to continue, these paradigms should be on mind.
These are chess players. They're clever enough and they will try to push you to push the whole world to a point where the whole world together can do anything.
ZAKARIA: If sanctions fail, will Israel authorize an attack on Iran?
BARAK: I don't think that we have to answer these questions. Of course, we have right of self defense and it's the basic right of individual in any country, including the continent in Europe. But to leave the - but I think that it's still in the state of diplomacy.
I still believe that much more active sanctions can curve the regime to have a second thought, but as I have said earlier, we commend to you, the Europeans, not to remove any option from the table.
ZAKARIA: Do you think that the Obama administration's offer for Prime Minister Netanyahu, which was a very generous offer, almost kind of a series of bribes for U.S. defense minister, double the number of strategic fighters you would have had in return for a very short temporary restraint on settlements in Jerusalem was a good deal? Wouldn't you have taken it if you're the prime minister?
BARAK: I tried to help it come to life and I would love to see it implemented and carried out and I don't see it as bribery. I think that the administration reflects a genuine sentiment -- the American people to help Israel, expressed by different administrations to keep its qualitative military because we are situated in a place where, you know, this -- you can never -- its territory.
You have to - so small and basically, it's not given to us in order that we'll build in some settlements. It is a powerful deception that we are going toward a comprehensive peace with the president and Israel takes opponents of much more security usual and America can come to.
ZAKARIA: A lot of people believe speaking of Brezinski among them, that the Obama administration should put forward its own settlement plan, a peace plan and then tell the two parties, let's start from this point rather than just endless process. Does that make sense?
BARAK: I don't know. I prefer something that emerges a genuinely from the players over something put on the table.
ZAKARIA: For the players to do it, we've been waiting for 43 years.
BARAK: I don't think that we have, for this -- hopefully not even for the three weeks, but we have to move. It's our responsibility. We're not doing a favor to the Palestinians by joining the move. It's not a game. I believe that we should held the bottom of activity and the join hands are the regional players and with America to jump into it.
ZAKARIA: But the Americans have tried everything. They've tried to read the Riot Act to Prime Minister Netanyahu, to make him feel pressured. It doesn't work. They offer him carrots, it doesn't work. What would it take to get a serious negotiation on the peace process?
BARAK: I think that the real issue is to be ready mentally, psychologically and politically on both sides. To take the decisions and start negotiate about the real issues. Voter security, refugees, Jerusalem, end of conflict and finality of future claims.
I think that opportunity is here and in some twisted way, even the effect that this administration takes more sophisticated positions regarding to the role of different players and what happens, what really happens in the Muslim world, could be helpful as long as America will lead and move forward and encourage both sides to come to the table and not leave it.
ZAKARIA: Ehud Barak, pleasure to have you. Thank you so much. We will be right back. (BEGIN VIDEO CLIP)
When you look at the Republican Party in Washington right now, which seems very determined to pursue its agenda, to stand up to President Obama, do you think they're on a kind of winning path? Do you think this is the right way --
UNIDENTIFIED FEMALE: No. I think they're misinterpreting this election. This election everybody suddenly didn't become a Republican.
ZAKARIA: The Republican Party is on a roll. It won back the House last month and this week, it won on tax cuts for the most part, but is all this good for the country? Will Republicans be able to govern?
That's what I wanted to know when I sat down with Christie Todd Whitman, a member of George W. Bush's cabinet and before that the Republican governor of New Jersey.
ZAKARIA: Governor, Whitman, thank you for joining me.
WHITMAN: No, I think they're misinterpreting this election. This election everybody suddenly didn't become a Republican. They were saying, Obama's gone too far to the left. This stuff is happening too fast. It's too much big government and I think the biggest mistake Republicans can make is standing up and saying no to everything.
You know, I guess they'll have to go through the drill of we're going to repeal health care, but most Americans don't want the health care reform repealed. They want it improved. They want it changed, but they feel basically there were some changes, basic changes that needed to have been made in it.
If Republicans say, we want to do away of it and after that, we're not going to talk, go through the motion. Do what the president veto and you won't get a veto override, so they can put that behind them.
But this idea that compromise is somehow defeat is actually it's enthuses of the way this country was founded. I mean, our founding father had very, very real differences and yet they understood there were about something bigger themselves and they found those compromise positions that gave us the declaration of independence and ultimately the constitution.
ZAKARIA: So this week, the Republicans have managed to extract concessions from President Obama on something they seem to care very deeply about, which is the extension of the Bush tax cuts.
Now what puzzles me about this is the whole idea is we were very concerned about the deficit and we have now passed a set of tax cuts when you ad in the concessions made to the Democrats on an employment insurance and payroll tax cuts is going to cost $900 billion over the next two years. I mean, this doesn't seem to me very concerned about the deficit.
WHITMAN: Well, what they'll argue and they're not wrong, totally in arguing this, is that by keeping taxes low, you will encourage more investment. You will encourage business to - to invest more because we certainly saw it in New Jersey when I cut taxes.
You'd cut taxes, people do spend. People do bring jobs back. The problem is that they'll say the problem is what they had to give on the other side in extending the unemployment benefits, but compromise is what we're about and we're going to have to find our way through it.
It's going to be very interesting to see what the new members -- you have 50 percent of the Republicans in the next Congress will be new, will be freshmen. That means very narrow or shallow reservoir of institutional understanding and coming in with an idea of we're going to say now and we're not going to spend.
The reality is, yes, you are going to spend. I mean, this is government and government has services that it has to provide. Is it overreaching? I would argue yes, in many areas. Is it spending too much? Is there waste, of course? But you're going to end up spending and how they're going to balance that?
Are they going to close down the government every time and just do continuing resolutions for budgets? I think they'll find that that's not an optimum way to proceed. So it's going to be interesting to see how they balance precisely what you're saying, this desire to show that you want to keep taxes low with a focus on reducing the deficit.
I don't know that you can do it all on supply side, but that's where they're going and it does work to a degree, certainly.
ZAKARIA: But you have a deficit now that's 10, 11 percent of GDP.
WHITMAN: Getting to a point of --
ZAKARIA: It seems difficult to imagine you could get this all out on the spending side. If you have to raise taxes, will this -- you just described these new Republicans, could you imagine them agreeing to any kind of tax cuts. WHITMAN: No, they've gotten themselves in a very difficult position. Many of these people have signed that no new taxes pledge. You've seen in the states where they've done it and then they absolutely -- they don't dare because if they do vote for any kind of a fee increase, it's considered a tax.
And they find that they're being opposed by some very strong groups with a lot of money behind them who will attack them in the primaries and go after them.
ZAKARIA: Do you think that looking forward to 2012, that Sarah Palin is likely Republican presidential nominee?
WHITMAN: I don't know if it's likely. There are a lot of people who are vying for it. I could certainly see a scenario under which, she becomes it. I mean, she's very popular in Iowa. She's very popular in New Hampshire.
You roll up good victories in those two states then you start to see your way through to the end to get the nomination, but, you know, there are a lot of people that are going to be vying for that.
Mitt Romney's out there working hard. You have a whole bunch. Every congressman and senator right now thinks they can be president.
ZAKARIA: What does it do to the Republican Party if Sarah Palin does get the nomination?
WHITMAN: I don't think she'll win nationwide, but she certainly will, when she went on the ticket with Senator McCain, she energized the base, but the base isn't big enough and Republicans should have learned that.
In this last presidential election, John McCain's election, you had over 2 million self-identified Born Again Christian Republicans, pro-life Republicans who voted in that election and voted in George Bush's re-election.
So we got them all out. The base all came out and we still got our heads handed to it. So, you can't just rely on that narrow base. You've got to start competing for the center. So far, I haven't seen a lot of outreach on the part of Sarah Palin for that.
She is more concentrated on that base and energizing them, which is fine, but it's not going to win you a general election?
ZAKARIA: Would you support her?
WHITMAN: She was a Republican candidate. She'd have to show me a lot more than I've seen thus far as an understanding of the depth and the complexity of the issues that we face. I mean, I don't know her personally, so I can't comment on that.
I mean, she was a governor, but the fact that she left office before completing her first term is just not an attitude that I think is necessarily in the best interest of your constituents, rather what's in your best interest.
ZAKARIA: Governor Whitman, thank you so much.
WHITMAN: A pleasure.
ZAKARIA: Now for our "What in the World" segment. What caught my attention this week was a claim by Glenn Beck. Here he is on his show last Monday.
BECK: What's that number? What is the number of Islamic terrorists one percent? I think it's closer to 10 percent, but the rest of the PC world will tell you, no. It's minuscule.
ZAKARIA: Let's do a bit of math here. There are 1.57 billion Muslims worldwide. Take 10 percent of those Muslims and you get 157 million. That's how many Muslim terrorists Glenn Beck is suggesting there are in the world, 157 million.
Beck wondered why this wasn't receiving any media coverage. We'll let me suggest one reason. It is total nonsense. A figure made up by Glenn Beck with absolutely no basis in fact. The United States State Department says there were approximately 11,000 terror attacks committed in 2009.
This was all terror attacks everybody where in the world including Afghanistan and Iraq, which are really war zones. But still, let's do more Math. Stay with me, Glenn. Let's be very generous and say that it took 100 people to plan and execute each of those 11,000 attacks.
In fact, most of the attacks were solo and most involving two or three people, but let's be generous. One hundred people times 11,000 terror attacks equals 1,100,000 people. But Glenn Beck's figure is 157 times higher than that. If in fact there are 157 million Muslim terrorists in the world. What would the other 155,900,000 of them doing last year?
We asked CNN's National Security Analyst, Peter Bergen. Bergen has spent decades studying Muslim terrorists. He has interviewed Osama Bin Laden. He travels frequently across the world to refresh his knowledge. We found Bergen in Afghanistan. He e-mailed us to say the Beck's estimate is off by 1,000 percent.
Bergen says most estimates would say 0.1 percent of all Muslims are terrorists or insurgents. Now after Beck made this claim, his producer got beck off on a technicality, saying, well, the definition of a terrorist includes people who advocate or support terrorism. Of course, the FBI, the State Department and most other organizations define terrorists in the more common sense that they are well, terrorists, but never mind. And this guy cited some polls that many don't like us and wish us harm.
Yes, many of us have been pointing that out for over a decade now. I wrote a "Newsweek" cover I say two weeks after 9/11 titled "Why They Hate Us," to explain that, but hating America is not the same thing as being a terrorist.
Believe me, if we had 157 million Muslim terrorists active across the world, we would be hearing more about it. But Beck made another claim in his discourse on terrorism.
BECK: You don't think 1 percent, half a percent here in the United States of radicals, of people who want to violently overthrow the government is a problem? Of course it is. Why isn't it receiving coverage? Why?
ZAKARIA: Well, Glenn, again, maybe because it just isn't true. I can't find any poll or study or shred of data that suggests that 1.5 million Americans, which is what that number would work out to, want to violently overthrow their government.
According to Glenn Beck's producer and his definition, maybe, but in that case, how would one describe a man who has been fuelling such singer against the American government on television daily for the last two years? How, in other words, would one describe Glenn Beck? We'll be right back.
UNIDENTIFIED FEMALE: Granting the Nobel Peace Prize, awarding the Nobel Peace Prize was a real embarrassment for the Chinese regime. They're awarding this person who's in a Chinese jail.
ZAKARIA: Many were on hand in Oslo on Friday when the Nobel Committee awarded its peace prize to a Chinese dissident in absentia. More interesting perhaps were who wasn't there. China, of course, skipped the ceremony, but so did Russia, Saudi Arabia, Pakistan, Iraq and Iran, almost 20 countries in total, yet another sign of China's rising power.
To talk about that and all else that's going on in China, Martin Jacques, a columnist whose recent book, "When China Rules the World," was recommended on this program a couple of weeks ago, Minxin Pei is the director of the Keck Center for International and Strategic Studies at Claremont McKenna College. And Elizabeth Economy is a senior fellow for Asia studies at the Council on Foreign Relations. Welcome all.
Minxin, why are the Chinese mounting this very, very spirited campaign to get countries to not even attend the Nobel Peace Prize ceremonies, the announcement of their own prize? Do they really think that they can discredit the Nobel Peace Prize?
MINXIN PEI, CLAREMONT MCKENNA COLLEGE: It's largely for domestic reasons. Apparently, the Chinese government wants to show to the Chinese people that no amount of Western pressure can make the current Chinese government to change its policy on human rights and on democracy. And technically speaking, I think there must be a consensus at the highest level of the Chinese government on a very tough position on this issue.
ELIZABETH ECONOMY, COUNCIL ON FOREIGN RELATIONS: My sense also, I think, probably along with Minxin is that, you know, granting the Nobel Peace Prize, awarding the Nobel Peace Prize to Liu Xiaobo was a real embarrassment for the Chinese regime, right? They're awarding this person who's in jail, in a Chinese jail. And I think, you know, the Chinese have long admired the peace prize, have long admired the Nobel Prize, and so to have the first Chinese who wins the Nobel be someone who's in a Chinese jail, I think, was a real slap in the face for them.
ZAKARIA: Is he the first Chinese to...
ECONOMY: There's a Chinese who was in France, a literary...
ECONOMY: A writer, right? Who are the others?
PEI: Including the Dalai Lama.
PEI: OK? Another Chinese emigre won Nobel literature prize, and the Chinese disowned him.
ZAKARIA: Gosh, so this really is...
PEI: There's a tradition of trouble with the Nobel prize.
ECONOMY: He's the first one living China.
PEI: Living in China.
ECONOMY: How about that? PEI: But not living freely.
ECONOMY: But they could have taken -- right, they could have taken the high road, right? They could have taken it as looking at how Martin Luther King won the Nobel Peace Prize here in this country, sort of as a note to the -- to Beijing to try to live up to Beijing's best ideals, right, as embodied in the Chinese constitution. We were not living up to our own best ideals here in the United States, and the Chinese could do better, too. But they elected not to look at it that way and to do what Minxin said, which is reactionary and reflexive.
ZAKARIA: And what you're saying, Minxin, is that it seems as though, right now, that they're moving in a -- or staying in a very conservative place.
PEI: Oh, yes. If you look at what, politically, the Chinese government is doing, it's not -- they're not talking about political reform. Even the premier, who talked about political reform on this show, was censored. They are now doing things on the Liu Xiaobo issue which indicates that the government is taking a position that is at odds with the majority of the governments and the societies around the world. And that's not very, very encouraging for people who want China to move simultaneously toward economic modernization and political change.
ZAKARIA: What do you think is going on? Is this part of a power struggle preceding the -- you know, 2012, the leadership changes, the current president and premier cycle out, new president and premier? Is there a kind of no one wants to seem to be the wimpy liberal right now?
MARTIN JACQUES, AUTHOR, "WHEN CHINA RULES THE WORLD": Well, it could certainly be mixed up with that. But I think that, you know, the Chinese have a very clear position that they don't want to be interfered with. They regard what's happened to be gross interference in their affairs. And actually, their reaction has been very, very aggressive, but also, you know, quite strategic in the sense that they've mobilized as many nations as they could to boycott it, and secondly, they've established this Confucius Peace Prize.
Exactly what lies behind that, I don't know. But actually, the choice of the prize winner, Chan Lien, the old vice president of Taiwan, is -- under the circumstances, is quite an imaginative choice. The only question of what's happening...
ZAKARIA: Because he's -- he was a -- he was a Taiwanese, and so -- I mean, that's -- that's extraordinary, but a Taiwanese who advocates peaceful reconciliation between the mainland and...
JACQUES: Yes. He -- he...
ZAKARIA: You were shaking your...
ECONOMY: No, but he hasn't acknowledged the prize. I mean...
PEI: He doesn't know that he's (INAUDIBLE)
ECONOMY: ... his office -- right. His office said, Well, we've certainly heard of Confucius, but we don't know anything about this prize and he definitely won't be attending the ceremony. So he wasn't even there to receive it.
I guess I would point out that the countries that China managed to rally behind it, right, not to attend...
PEI: A list of rogue states.
ECONOMY: Exactly. It's like a coalition of the weak and the ugly, right?
JACQUES: Well, one of America's closet allies is Saudi Arabia.
ECONOMY: The Philippines -- oh, well, I thought you were going to say the Philippines, but Saudi Arabia...
ECONOMY: Like I said, a coalition of the ugly and the weak. But -- so I don't think that the message that's being sent to the international community or even to the Chinese people is a particularly strong one by those, you know, 18, 19 countries that are sitting with China.
JACQUES: I think it's a significant move nonetheless because what the Chinese are demonstrating, again, even in this instance, when they're on the back court, when they're in a difficult situation, especially as far as Western opinion is concerned, they can -- they will act and they count -- they are beginning to galvanize, in a new context, nations around them. And I think that is significant. But basically, it's a confident regime.
ZAKARIA: And -- and...
JACQUES: It's got a lot to be confident about.
ZAKARIA: Right. Growth continues to go like gangbusters. The places seems -- I mean, it still seems reasonably stable.
PEI: Well, I disagree a little bit because if you look from the outside, look only at the growth numbers, you think that this is a government that should feel confident. But then imagine yourself in the Kujing (ph) House office. The inbox is piling up with reports of riots (INAUDIBLE) in Jiabao's (ph) office, you have reports coming of all kinds of economic numbers that are not very reassuring. For example, inflation is rising. You have the real estate bubble. You have trade frictions.
So I think this is clearly a government that has done a lot to be proud of, but it is also a government that is under tremendous pressure. And the most important of all is its source of fundamental legitimacy. It can deliver growth, but it's not an elected government. It can be replaced at any moment by its own people. ECONOMY: Right. Beijing has no mandate to lead from its people. I mean, absolutely, they've accomplished extraordinary things...
ZAKARIA: The Pew survey, for instance, shows that Chinese support for their government is stronger than any other country in the world. Now, are all those numbers -- and this has been true in poll after poll. Are all the numbers phony?
ECONOMY: Well, I think the Pew survey is skewed as to where it goes. Undoubtedly, it's skewed as to, you know, who feels comfortable answering the questions. So I -- I'm not confident about...
ZAKARIA: ... that delivered 9 percent growth for 30 years would probably be supported by (INAUDIBLE)
ECONOMY: Well, here's -- here -- I mean, Minxin mentioned protests. Over 100,000 protests in a county? I mean, that's like a lid sitting on a boiling pot of water, like this, right? I mean, look at the way that they deal with the Internet, right? One (ph) attempt to counteract, you know, popular opinion, a green (ph) dam initiative, you know, trying to get everybody to register. Everything speaks, at least to me, politically of a fearful, insecure regime, not of a confident regime.
ZAKARIA: This is an argument we will doubtless have time to come back to. When we come back, however, we're going to talk about China's foreign policy towards the United States, Japan and whether or not there is a new Chinese arrogance afoot. When we come back.
PEI: What really worries me is China's position on Korea because this is, actually, a fundamental strategic choice. What are you going to do with a client state that is damaging your national interest? And China's position is, We're going to stay with -- we're going to stick with this regime, no matter what.
ZAKARIA: And we are back with Martin Jacques, Minxin Pei and Elizabeth Economy to talk about China and its foreign policy.
So one of the things that's been happening over the last few months, which I've been very struck by because I've been traveling in Asia, is the rising concern in Asia about the way China is behaving -- you know, the incident in the -- over the -- in the East China Sea over the Japanese fishing trawler -- the Chinese fishing trawler -- sorry -- that went into those waters.
Do you think that there is some kind of a concerted Chinese effort to sort of assert itself, or is this all miscalculation?
ECONOMY: Well, I think maybe it's a combination of both, frankly. I think there was a sense within China that the United States had really not quite withdrawn from Asia but certainly wasn't paying Asia the kind of attention that it used to, like, we're mired in a war in Afghanistan. We're still withdrawing from Iraq. And obviously, we're still in the midst of the global financial crisis, so our attention was elsewhere.
So I think to some extent, there was a mood to seize an opportunity, all right? And so I think some of this is simply the potential for the PLA to flex a little of its muscle...
ZAKARIA: The army.
ECONOMY: The army, right, the People's Liberation Army. I think do think that there is a greater confidence within China when it comes to their foreign policy, and I think there's a greater sense they want to control events outside their borders. It used to be enough to, you know, keep their head low, right, you know, "Hide brightness, cherish obscurity." And I think that Deng Xiaoping dictum is rapidly, you know, fading.
And so I think there's a sense now that in order to ensure China's domestic security and continued growth, it has to do more outside its own boundaries, whether we're talking economically or in the security realm, or even, frankly, in its media outreach, right? So I think those are all things that the Chinese government is reaching outward now in a way that they have not before.
ZAKARIA: Repeat that Deng Xioaping dictum, because I think this is -- he had -- this was his -- his...
ECONOMY: Right, his famous "tao guang yang wei (ph)", right?
ZAKARIA: Which is -- and he applied it to foreign policy, and it says what...
ECONOMY: Exactly. Basically, hide brightness, cherish obscurity. It's actually 24 characters long. Maybe Minxin can pitch in with the rest of it, you know?
PEI: Also, "Grow your strengths quietly."
ZAKARIA: They have not released this 9,000-word essay by the equivalent of China's foreign minister. The foreign minister's actually not that powerful, the state councilor, which is basically saying, We're actually very -- we are not threatening. We don't want to replace the United States as the dominant hegemon.
PEI: It's too late. The damage has been already done. And (INAUDIBLE) if you look at (INAUDIBLE) actions (ph), South China Sea, Japan and Korea, you say, South China thing may be a trial balloon. It was simply in rhetorical terms. We're going to view this as part of a (INAUDIBLE) see what happens. In practical terms, China has not done that much. Japan I will excuse as a technical error. They overreacted, and it caused a lot of damage.
What really worries me is China's position on Korea because this is actually a fundamental, strategic choice. What are you going to do with a client state that is damaging your national interest? And China's position is, We're going to stay with -- we're going to stick with this regime, no matter what, because the Chinese government appears to have made a fundamental strategic decision that links its own survival with the survival of the North Korean regime. And that's a fundamental strategic choice.
ZAKARIA: Because they think if they allow a communist regime, North Korea, to collapse, it sets a precedent for a kind of similar process to happen in China.
PEI: Because it will unleash very risky dynamics for the Chinese Communist Party.
ECONOMY: There was a really interesting article that just came out by a Chinese -- one of China's top scholars, Ju Fung (ph). You probably know him. And it was about this issue of North Korea. He said there is no foreign policy issue that is being more debated within the Chinese sort of foreign policy community than this issue of how to manage North Korea.
And his argument for why China elected to take this kind of reactionary, very conservative stance, not, you know, condemn North Korea for its aggression, was really because of inertia, that the foreign policy -- that the ministry of foreign affairs and the broader foreign policy community can't seem to take a step back and sort of recalculate and reconfigure and think about a new strategy, even though many people know that they very much need a new strategy.
And indeed, if you look at the WikiLeaks, you can find people like Hu Yafei (ph) and others saying that North Korea's behaving like a spoiled child. So I think there's a lot of thinking about North Korea within the foreign policy community, about how to do things differently, but they can't quite get their arms around coalescing to a new strategic effort.
ZAKARIA: Final thought. What strikes me about this conversation is at the very least, China's foreign policy does not appear to be nearly as sophisticated as the impression your book leaves one with, right? I mean, it seems somewhat amateurish. They're making mistakes. They're overreacting. They're...
JACQUES: Well, I don't think -- I don't think it looks amateurish. I think that they've -- you know, they've -- my view is that they've made a bit of a mistake in the South China Sea. I think -- I don't think they made a particular mistake over Japan. I think, you know, it was a predictable situation. And this is going to be locked in for a long time, this Sino-Japanese problem.
I don't see this being -- and I don't think by any means all the problems lie on the Chinese side. I think the Japanese attitude is a big problem historically because, you know, they've never come to terms with their role in the war. And that's -- that's not just a problem with China, it's also with Korea and it's also with the whole region, actually. So I think that -- I think that, clearly, what we're witnessing now also is Chinese foreign policy -- you know, it has got to deal with a lot more -- a lot of new situations. I mean, a new world is unfolding.
ZAKARIA: And it's become much more powerful in that world.
JACQUES: It's become much more powerful in a post-financial crisis world. It's got a whole new set of relationships that it never used to have. So you know, it's learning on the job. But never underestimate the Chinese state. It's very sophisticated.
ZAKARIA: Never underestimate the Chinese -- a good note to end on. Liz Economy, Martin Jacques, Minxin Pei, thank you very much.
We will be right back.
ZAKARIA: Our question this week from "GPS Challenge" is, This week, China awarded its own alternative to the Nobel Peace Prize. What nations have done something similar in the past? A, Stalin's Russia, B, Hitler's Germany, C, Milosevic's Serbia, or D, Ceausescu's Romania. Stay tuned and we'll tell you the correct answer. Make sure you go to for 10 more challenging questions. While you're there, don't forget to check out our podcast. You can also subscribe to it on iTunes. That way, you won't miss a show. And it is, of course, free.
Our book this week is called "Winner Take All Politics" by Jacob Hacker and Paul Pierson. It is about the dramatic rise in income inequality in America over the last few decades. The authors have a powerful argument. I'm not sure I agree with it entirely. I think they missed certain features. But it is a powerfully argued book about a critically important subject, and I guarantee you it will make you think.
Now for the "Last Look." The symbols of Teheran, the Azadi tower, the Grand Mosque, the Iranian flag, and Star of David. Yes, that is a Star of David, the symbol of Iran's sworn enemy, Israel, on the roof of the Tehran headquarters of Iran Air. So how did it get there?
It's been reported that the building was built by Israeli engineers before the Islamic revolution. The Shah's Iran and Israel had decent relations. Apparently, nobody noticed it until very recently, which is odd because as you can see, the building is right next to the airport.
The correct answer to our "GPS Challenge" question, by the way, was A and B, both Stalin and Hitler established alternatives to the Nobel Prize in their respective countries. Go to our Web site for more questions and answers.
|
global_01_local_0_shard_00000017_processed.jsonl/50922 | Memory Alpha
36,782pages on
this wiki
Back to page
Star Trek: Countdown reference Edit
What is the point of the Star Trek: Countdown reference? It's both non-cannon and an absurdly unrealistic premise. Futhermore, from what I understand it did not inspire the supernova idea in the story but was rather inspired by it, so I wouldn't consider it background info either.--Hribar 02:57, 13 May 2009 (UTC)
It is non-canon... hence why it's in the italicized background section. It's to help explain why the supernova was a threat to the entire galaxy (itself an absurdly unrealistic premise). Non-canon information is valid so long as it's italicized or in a background or apocrypha section. It's unclear what order they were written (and it doesn't matter), but from what I understand, this is the backstory Roberto Orci and Alex Kurtzman wrote to explain the supernova. --From Andoria with Love 04:11, 13 May 2009 (UTC)
I understand what you're saying about the placement in the article. In my opinion, the italicized footnoting of background and apocrypha should be rarely used and only in large articles where it may be difficult to connect information in the various sections (background and apocrypha to the main article). Given that this is currently a fairly short article I think that the comic book reference should be placed in an apocrypha section for purposes of clarity.--Hribar 13:34, 13 May 2009 (UTC)
Spock's Mission Edit
Did Spock ever verify the supernova was stopped? If not, to say so is just speculation.--Hribar 02:57, 13 May 2009 (UTC)
The supernova was seen being successfully consumed by the black hole, and the remnants of it were thrown into 2233, so I would say, yes, it was successful. --From Andoria with Love 04:11, 13 May 2009 (UTC)
I think what we saw is not good enough. We didn't actually see the wavefront of the entire blast recede towards the black hole. I would have to watch it again I suppose but it seemed to me that everything we saw was fairly localized. Also Spock never really elaborated on the success of his mission.--Hribar 13:34, 13 May 2009 (UTC)
Around Wikia's network
Random Wiki |
global_01_local_0_shard_00000017_processed.jsonl/50923 | From Wikibooks, open books for an open world
Jump to: navigation, search
This section list sites that carry papers on various subjects relevant to robotics.
• Co-Evolving Team Capture Strategies for Dissimilar Robots
• Fitness Biasing to Produce Adaptive Gaits for Hexapod Robots
• Competing Sample Sizes for the Co-Evolution of Heterogeneous Agents
• Partial Recombination for the Co-Evolution of Model Parameters
• Varying Sample Sizes for the Co-Evolution of Heterogeneous Agents
• Punctuated Anytime Learning for Evolving Multi-Agent Capture Strategies
• Cyclic Genetic Algorithms for Evolving Multi-Loop Control Programs
• Continuous Power Supply for a Robot Colony
• Comparison of Sampling Sizes for the Co-Evolution of Cooperative Agents
• Evolving Towers in a 3-Dimensional Simulated Environment
• Evolving Neural Networks for Hexapod Leg Controllers
• Learning Adaptive Leg Cycles Using Fitness Biasing
• Cyclic Genetic Algorithms for Stiquito Locomotion
• Evolving Gaits for the Lynxmotion Hexapod II Robot
• Sampling the Nature of a Population: Punctuated Anytime Learning for Co-Evolving a Team
• Punctuated Anytime Learning for Hexapod Gait Generation
• Learning Area Coverage Using the Co-Evolution of Model Parameters
• Evolving Neural Network Controllers to Produce Leg Cycles for Gait Generation
• Punctuated Anytime Learning for Evolving a Team
• Evolving Cyclic Control for a Hexapod Robot Performing Area Coverage
• The Incremental Evolution of Gaits for Hexapod Robots
• Gait Evolution for a Hexapod Robot
• Learning Control Cycles for Area Coverage with Cyclic Genetic Algorithms
• Co-Evolving Model Parameters for Anytime Learning in Evolutionary Robotics
• Evolving Leg Cycles to Produce Hexapod Gaits
• Punctuated Anytime Learning for Evolutionary Robotics
• The Co-Evolution of Model Parameters and Control Programs in Evolutionary Robotics
• Adaptive Hexapod Gait Control Using Anytime Learning with Fitness Biasing
• Generating Arachnid Robot Gaits with Cyclic Genetic Algorithms
• Locomotion Control Cycles Adapted for Disabilities in Hexapod Robots
• Metachronal Wave Gait Generation for Hexapod Robots
• Evolving Hexapod Gaits Using a Cyclic Genetic Algorithm
• Learning Gaits for the Stiquito
• Using Cyclic Genetic Algorithms to Reconfigure Hardware Controllers for Robots
• Cyclic Genetic Algorithms for the Locomotion of Hexapod Robots
• Genetic Algorithms for the Development of Real-Time Multi-Heuristic Search Strategies |
global_01_local_0_shard_00000017_processed.jsonl/50925 | Acetoacetic acid
From Wikipedia, the free encyclopedia
(Redirected from Acetoacetyl)
Jump to: navigation, search
Acetoacetic acid
Acetoacetic acid.png
CAS number 541-50-4 YesY
PubChem 96
ChemSpider 94 YesY
DrugBank DB01762
KEGG C00164 YesY
ChEBI CHEBI:15344 YesY
Jmol-3D images Image 1
Molecular formula C4H6O3
Molar mass 102.088 g/mol
Appearance colorless, oily liquid
Melting point 36.5 °C; 97.7 °F; 309.6 K
Boiling point Decomposes
Solubility in water miscible
Solubility soluble in ethanol, ether
Acidity (pKa) 3.58 [1]
Infobox references
Acetoacetic acid (also called diacetic acid) is the organic compound with the formula CH3COCH2COOH. It is the simplest beta-keto acid group and like other members of this class is unstable. The methyl and ethyl esters, which are quite stable, are produced on a large scale industrially as precursors to dyes.[2]
Synthesis and properties[edit]
In general, the esters are prepared from diketene by treatment with alcohols.[2] Acetoacetic acid can be prepared by the hydrolysis of the ethyl acetoacetate followed by acidification of the anion.[3] In general, acetoacetic acid is generated at 0 °C and used in situ immediately.[4] It decomposes at a moderate rate to acetone and carbon dioxide:
It is a weak acid (like most alkyl carboxylic acids) with a pKa of 3.58.
Acetoacetic esters are used for the acetoacetylation reaction, which is widely used in the production of arylide yellows and diarylide dyes.[2] Although the esters can be used in this reaction, diketene also reacts with alcohols and amines to the corresponding acetoacetic acid derivatives in a process called acetoacetylation. An example is the reaction with 2-aminoindane:[6]
Diketene reaction Sai 2007
Pigment Yellow 16 is a typical dye containing the acetoacetyl group
See also[edit]
2. ^ a b c Franz Dietrich Klingler, Wolfgang Ebertz "Oxocarboxylic Acids" in Ullmann's Encyclopedia of Industrial Chemistry 2005, Wiley-VCH, Weinheim. doi:10.1002/14356007.a18 313
3. ^ Robert C. Krueger (1952). "Crystalline Acetoacetic Acid". Journal of the American Chemical Society 74 (21): 5536–5536. doi:10.1021/ja01141a521.
6. ^ Kiran Kumar Solingapuram Sai, Thomas M. Gilbert, and Douglas A. Klumpp (2007). "Knorr Cyclizations and Distonic Superelectrophiles". J. Org. Chem. 72 (25): 9761–9764. doi:10.1021/jo7013092. PMID 17999519. |
global_01_local_0_shard_00000017_processed.jsonl/50926 | Air Force of Zimbabwe
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Air Force of Zimbabwe
Flag of the Air Force of Zimbabwe.svg
Flag of the Air Force of Zimbabwe
Active 1980 – present
Country Zimbabwe
Size 5,000 personnel (1999)
Part of Ministry of Defence
Commander Air Marshal Perence Shiri
Air Chief Marshal Josiah Tungamirai
Roundel Roundel zimbabwe.svg
Aircraft flown
Attack Mi-35P
Fighter F-7II/N, F-7MG, MiG-23
Reconnaissance O-2
Trainer SF-260, K-8
Formation and early days[edit]
Pakistan was known to have provided an immense amount of extended moral and material support to the Air Force, by providing armed machinery and helping rebuild the Gweru airbase which was destroyed during the liberation struggle.[2][3] In the defence sector, the Pakistan Air Force has also played a role in the establishment of the Zimbabwe Air Force,
Second Congo war 1998–2003[edit]
Current organizational structure[edit]
Current Air Force equipment[edit]
It is difficult to create a reasonable overview of the Air Force of Zimbabwe aircraft inventory since there are few credible sources of information documenting the subject on the Internet or in the open literature. Whatever sources were available at the time of editing are cited below, but as all sources do not completely agree with each other there may be a margin of error in the following statistics.
Aircraft Type In service Notes
Nanchang K-8 Karakorum Advanced trainer/Light attack 11[5][6] These are the upgraded K-8E with glass cockpit, of which 12 were originally purchased in 2006 to replace the Air Force's BAE Hawks, but one K-8 crashed in September 2008. Based at Thornhill Air Base.[7][8]
Mikoyan-Gurevich MiG-23 Flogger Multi-role 3[6] Three MiG-23s seen in a 2003 fly past; currently believed to be stored at Thornhill Air Base because they are "excess to requirements".[8]
Chengdu F-7 II/N Airguard Fighter 7–30[6][9] Stationed at Thornhill Air Base; only 6 or 7 were operational when the DRC war started. It is believed an additional 12 were acquired in early 1999. A third batch of 12 of the Chengdu F-7MG variant were apparently acquired in November 2004.[8]
Guizhou FT-7B Trainer 2[9]
Shenyang F-5 fighter/trainer unknown number
SIAI SF.260M/TP/W Basic trainer/Light attack 24-40 delivered[6][9][10][11] Status of all aircraft unknown.
Ilyushin Il-76 Candid Transport 2[12]
Antonov An-12 Cub Transport 1
CASA C212-200 Aviocar Medium transport 8-12 delivered[6][9][10] Exact amount unknown, but aircraft are capable of being armed.
Britten-Norman BN-2A Islander Light utility transport 5-6[6][9][10] Unarmed.
Cessna FTB337G and O-2A Light utility transport/Forward air control 16-23 3 were lost in operations in the DRC; aircraft capable of being armed.
Agusta-Bell 412SP Light utility helicopter 7-12[6][9] Some were armed with rockets for the DRC conflict.
Aerospatiale SA-316B Alouette III Light utility helicopter 4-8[6] Four participated during an air show in 2005; capable of being armed.
Mi-24V and Mi-35P Attack helicopter 6-9[6][9][13]
Mi-8T Hip-C Assault helicopter 2[6]
Zimbabwe has been interested in MiG-29s in both the recent & more distant past. A 300 million-plus US Dollar order for a squadron was placed with Russia in the late 1980s but was cancelled in 1992.[14] Negotiations to buy 14 MiG-29SMTs from Russia were held again in 2004 [15] but an order for Chengdu FC-1 fighters was apparently placed instead.[16] See The Military Balance, 2005 to 2009 issues.
Twelve CAC FC-1 Xiaolong aircraft were purchased in late 2004,[5] and they may be intended to replace the Air Force's Chengdu F-7s.[8] The cost of each new plane was US$20Million, and at least six of the jets were expected to be delivered soon after their initial purchase.[17][18] These new aircraft are multi-role fighters that were jointly developed by the Pakistan Aeronautical Complex (PAC) and Chengdu Aircraft Industry Group (CAC) for the export market.[19]
Retired aircraft[edit]
K-8 Karakorum Trainer at Ysterplaat Airshow, Cape Town.
Rank structure[edit]
In descending order, the AFZ officer ranks are:
In descending order, the AFZ airman ranks are:
Aircraft losses[edit]
• SF.260MC flown by Sqn.Ldr. Sharunga crashed in bad weather, killing the pilot.
Notable incidents and accidents[edit]
• February 1995, a Chengdu F-7 crashed near Lalapansi on after encountering some engine problems. Flt Lt Zisengwe died in the plane crash.
• 21/22 January 2001, an unnamed pilot that was also a wing commander flying a Chengdu F7 became disorientated at night while on the way to take part in a flypast at Laurent Kabila's funeral. He could not land as a preceding jet had crash landed and blocked the runway, so he ejected and was found alive in the jungle by Zimbabwean troops five days later.
• A helicopter came down in April of the same year moments after take-off in Gokwe as the pilot tried to avoid telephone lines. All four on board survived.
• 5 September 2008, a K-8 Karakoram training jet came down near the Thornhill Air Base in the Midlands town of Gweru during a routine training sortie.[7]
• On 22 September 2010, K-8 serial number 2021C piloted by "Venom" practicing for the Africa aerospace and defence 2010 display burst a tire on landing and rolled to the end of the runway at AFB Ysterplaat, Cape town. It took some time to get the runway open again and aircraft in the air at the time diverted to Cape Town International Airport.
See also[edit]
2. ^ Dinar, Ali B. "IRIN-CEA Weekly Round-Up 50-98 1998.12.11". African Studies Center. University Of Pennsylvania.
5. ^ a b "Africa's Military and Security Cooperation with China". 20 June 2006. Retrieved 13 December 2012.
6. ^ a b c d e f g h i j k "Zimbabwe Air Force". 11 June 2008. Retrieved 13 December 2012.
7. ^ a b "Zimbabwe Air Force jet crashes, 2 pilots said killed". 12 November 2009. Retrieved 10 December 2012.
8. ^ a b c d e "Zimbabwe beefs up air arsenal". 7 June 2005. Retrieved 10 December 2012.
9. ^ a b c d e f g h i "Zimbabwe Air Force". 15 July 2006. Retrieved 10 December 2012.
10. ^ a b c "Arms Trade Register". SIPRI. Retrieved 22 June 2012.
11. ^ "Zimbabwe Air Force". 11 June 2008. Retrieved 10 December 2012.
12. ^
13. ^ "Mugabe spends $200m on new fighter jets". 16 July 2012. Retrieved 10 December 2012.
14. ^ Latimer Clarke Corporation Pty Ltd. "Zimbabwe - Atlapedia® Online". Retrieved 2013-02-22.
16. ^
17. ^ "Mugabe spends $200m on new fighter jets". 10 June 2004. Retrieved 10 December 2012.
18. ^ "Hu's Selling Guns to Africa". 28 June 2007. Retrieved 10 December 2012.
19. ^ Martin, Guy. "China's anti-ship ballistic missile operational". defenceWeb.
21. ^ "Air Zimbabwe Boeing 720-025 VP-YNL". Retrieved 11 December 2012.
23. ^ "PiLi-5 Short-Range Air-to-Air Missile". Retrieved 27 January 2012.
24. ^ "Air Officers Commanding Rhodesian Air force 1949 - 1981". The Rhodesian Air Force. Retrieved 27 January 2012.
25. ^ Cooper, Tom. "Mozambique, 1962-1992". Retrieved 27 January 2012.
• World aircraft information files brighstar publishing File 340 Sheet 5
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/50927 | Asset protection
From Wikipedia, the free encyclopedia
Jump to: navigation, search
• The identity of the person engaging in asset protection planning
- If the debtor is an entity, did an individual guarantee the entity's debt? How likely is it that the creditior will be able to pierce the corporate veil or otherwise get the assets of the individual owners? Is there a statute that renders the individual personally liable for the obligations of the entity?
• The nature of the claim
- Is the claim dischargeable?
- What is the statute of limitations for bringing the claim?
• The identity of the creditor
- How aggressive is the creditor?
• The nature of the assets
United States legislation[edit]
United States federal bankruptcy laws and ERISA laws exempt certain assets from creditors, including certain retirement plans. All fifty states also have laws that exempt certain assets from creditors. These vary from state to state, but they often include exemptions for a certain amount of equity in a personal residence, individual retirement accounts, clothing, or other personal property.
All fifty U.S. states also have laws that protect the owners of a corporation, limited partnership, or limited liability company from the liabilities of the entity. Many states limit the remedies of a creditor of a limited partner or a member in an LLC, thereby providing some protection for the assets of the entity from the creditors of a member.
All fifty U.S. states provide some protection for the assets of a trust against the creditors of the beneficiaries. Some states allow asset protection for a self-settled trust (a trust in which the settlor or creator of the trust is included as a potential discretionary beneficiary) and some states do not.
Creditors have several tools to overcome the laws that provide asset protection. First, there are federal and state fraudulent transfer laws.[5] Today there are two bodies of fraudulent transfer law: the Bankruptcy Code and state fraudulent transfer statutes. Most states have adopted Uniform Fraudulent Transfer Act which defines what constitutes a fraudulent transfer. The UFTA and the Bankruptcy Code both provide that a transfer made by a debtor is fraudulent as to a creditor if the debtor made the transfer with the "actual intention to hinder, delay or defraud" any creditor of the debtor. Regarding the modifier "any" (creditor), Jacob Stein, author of textbooks on asset protection, divides the creditors into three classes: present, future and future potential creditors. While UFTA applies clearly to present creditors, the distinction between a future creditor and a future potential creditor is not as clear. The UFTA is commonly held to apply only to future creditors and not to future potential creditors (those whose claim arises after the transfer, but there was no foreseeable connection between the creditor and the debtor at the time of the transfer).[6]
There are also laws which allow a creditor to pierce the corporate veil of an entity and go after the owners for the debts of the entity. It may also be possible for a creditor of a member to reach the assets of an entity through a constructive trust claim, or a claim for a reverse piercing of a corporate veil.
The anti-alienation provision of the Employee Retirement Income Security Act of 1974 (ERISA) exempts from claims of creditors the assets of pension, profit-sharing, or 401(k) plans. Two exceptions are carved out for qualified domestic relations orders and claims under the Federal Debt Collection Procedure Act. Because the protection is set forth in a federal statute, it will trump any state fraudulent transfer law. Protection of ERISA is afforded to employees only and does not cover employers. The owner of a business is treated as an employer, even though he may also be the employee of the same business, as in a closely held corporation. Accordingly, ERISA protection does not apply to sole proprietors, to one owner business, whether incorporated or unincorporated, and to partnerships, unless the plan covers employees other than the owners, partners and their spouses.[7]
Asset protection planning requires a working knowledge of federal and state exemption laws, federal and state bankruptcy laws, federal and state tax laws, the comparative laws of many jurisdictions (onshore and offshore), choice of law principles, in addition to the laws of trusts, estates, corporations and business entities. The process of asset protection planning involves assessing the facts, circumstances, and objectives of an individual, evaluating the pros and cons of the various options, designing a structure that is most likely to accomplish all the objectives of the individual (including asset protection objectives), preparing legal documents to carry out the plan, and ensuring that the various legal entities are operated properly in accordance with the laws and the objectives of the individual. This process involves providing legal advice and legal work and most states prohibit the practice of law without a license.
Asset protection planning began to develop as a stand-alone area of the law in the late 1970s. It began coming into prominence in the late 1980s, with the advent and the marketing of offshore asset protection trusts. Colorado attorney Barry Engel is credited with the introduction of that concept and the development of asset protection trust law statutes in the Cook Islands.[8] The most distinctive feature of the offshore trust is the fact that the settlor or creator of the trust may be included among the potential beneficiaries of the trust without causing the assets of the trust to be subject to the creditors of the settlor. This is often referred to as a "self-settled trust."
Over the years, this new field of law enjoyed a marginal reputation, but started going mainstream in the mid-1990s. A 2003 article in the Wall Street Journal claimed that 60% of America's millionaires have considered engaging in asset protection planning.[9]
Choice of law rules in the United States make it possible for a person from any state to create a trust, corporation, limited partnership or limited liability company that is governed by the laws of any other state or jurisdiction. Because of this ability to "forum shop," various states and other jurisdictions have modified their laws to allow greater asset protection in order to make them competitive with other jurisdictions.
In most states, the assets of a self-settled trust are not protected from the creditors of the settlor. In 1997, the State of Alaska passed a statute which provided that the assets of an Alaska self-settled trust are not subject to the creditors of the settlor.[10] Since 1997, the following states have adopted legislation allowing for a self-settled asset protection trust: Nevada, Delaware, South Dakota, Wyoming, Tennessee, Utah, Oklahoma, Colorado, Missouri, Rhode Island and New Hampshire. This legislation created a favorable offshore asset protection trust jurisdiction also for non-US settlors.[11]
There is considerable debate about the comparative effectiveness of the asset protection provided by the laws of each jurisdiction, onshore and offshore. Similarly, the asset protection features provided by corporations, limited partnerships and limited liability companies vary from jurisdiction to jurisdiction. Once again, Alaska's limited liability company statute provides innovative advantages over other states. Case law from North Carolina demonstrates the asset protection advantages of a transfer to a limited liability company (see Herring v. Keasler, 150 NC App 598 (01-1000) 06/04/2002).
Just as the Cook Islands have developed a reputation for the best offshore jurisdiction for an asset protection trust, Nevis stands out in the competition for the best jurisdiction to file a limited liability company. The Nevis limited liability company statute is based on the Delaware limited liability statute, but they have a few added advantages. One advantage of a Nevis LLC is that the members and managers are not disclosed to the public.
There is some debate over the ethics of asset protection planning. On one hand, every attorney that creates a trust, corporation, limited partnership, or limited liability company is engaging in some form of asset protection planning. On the other hand, most would agree that it is ethically inappropriate to assist a person to commit fraud or evade income taxes. The timing and the purposes of the plan seem to be the determinative factors as to whether a plan will be considered ethically and legally appropriate. In some cases, individuals have gone to jail for contempt of court for failing to unwind a plan that a judge felt was repugnant to the principles of law and justice,[12] however in those cases the individuals incarcerated retained some control over their plan immediately prior to, or during, litigation.[13]
1. ^ Jacob Stein (Winter 2007). "The Importance of Trusts in Asset Protection". California Trusts and Estates Quarterly, Volume 12, Issue 4, p. 17-25. Retrieved September 24, 2010.
2. ^ Richard T. Williamson (2008). The Real Estate Investor's Guide to Corporations, LLCs & Asset Protection Entities. Kaplan Publishing. p. 43. ISBN 978-1-4277-9702-5.
3. ^ Jacob Stein (September 10, 2010). "McCourt Divorce Shines A Light on Asset Protection". Los Angeles Daily Journal. Retrieved September 27, 2010.
4. ^ Stein, Jacob (2011). Asset Protection for California Residents. pp. 8–18. ISBN 0-9839780-2-6.
5. ^ 11 USC § 548
6. ^ Jacob Stein (August 2010). "Asset Protection May Risk Fraudulent Transfer Violations". Estate Planning. Retrieved September 27, 2010.
7. ^ Stein, Jacob (2011). A Lawyer's Guide to Asset Protection Planning in California. p. 80. ISBN 0-9839780-0-X.
8. ^ Cook Islands Table of Statutes, May 2007
9. ^ Wall Street Journal, Oct. 14, 2003, Rachel Emma Silverman, "Litigation Boom Spurs Efforts to Shield Assets"
10. ^ Alaska Statutes Section 34.40.110
11. ^ Alexander A. Bove, Jr. "The United States As An Offshore Asset Protection Trust Jurisdiction – The World’s Best Kept Secret". Trusts & Trustees, Vol. 14 Issue 1 (Oxford Journals, 2008). Retrieved September 27, 2010.
12. ^ Donlevy-Rosen & Rosen, P.A. "See In re Lawrence (S.D. Fla. December 12, 2006); In re Lawrence, 279 F.3d 1294 (11th Cir. 2002); SEC v. Bilzerian, 131 F. Supp. 2d 10 (D.C. 2001); F.T.C. v. Affordable Media, 179 F.3d 1228, C.A.9 (Nev.),1999.". Westlaw. Retrieved February 5, 2013.
13. ^ Howard Rosen & Patricia Donlevy-Rosen. "The Importance of Property APT Design & Counsel". The Asset Protection News. Retrieved February 5, 2013. |
global_01_local_0_shard_00000017_processed.jsonl/50928 | Base metal
From Wikipedia, the free encyclopedia
(Redirected from Base metals)
Jump to: navigation, search
In chemistry, the term base metal is used informally to refer to a metal that oxidizes or corrodes relatively easily and reacts variably with diluted hydrochloric acid (HCl) to form hydrogen. Examples include iron, nickel, lead and zinc. Copper is also considered a base metal because it oxidizes relatively easily, although it does not react with HCl.
Other usages[edit]
Base is used in the sense of low-born, in opposition to noble or precious metal.[1] In alchemy, a base metal was a common and inexpensive metal, as opposed to precious metals, mainly gold and silver. A long-time goal of the alchemists was the transmutation of base metal into precious metal.
In mining and economics, the term base metals refers to industrial non-ferrous metals excluding precious metals. These include copper, lead, nickel and zinc.[2] The U.S. Customs and Border Protection is more inclusive in its definition. It includes, in addition to the four above, iron and steel, aluminium, tin, tungsten, molybdenum, tantalum, cobalt, bismuth, cadmium, titanium, zirconium, antimony, manganese, beryllium, chromium, germanium, vanadium, gallium, hafnium, indium, niobium, rhenium and thallium.[3]
In the context of plated metal products, the base metal underlies the plating metal, as copper underlies silver in Sheffield plate.
Zamak is an alloy used in casting (metalworking) which is sometimes called 'base metal' or deprecated as 'muckite'.[citation needed]
See also[edit]
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/50932 | Fraction (mathematics)
From Wikipedia, the free encyclopedia
(Redirected from Denominator)
Jump to: navigation, search
A cake with one fourth (a quarter) removed. The remaining three fourths are shown. Dotted lines indicate where the cake may be cut in order to divide it into equal parts. Each fourth of the cake is denoted by the fraction ¼.
A fraction (from Latin: fractus, "broken") represents a part of a whole or, more generally, any number of equal parts. When spoken in everyday English, a fraction describes how many parts of a certain size there are, for example, one-half, eight-fifths, three-quarters. A common, vulgar, or simple fraction (examples: \tfrac{1}{2} and 17/3) consists of an integer numerator, displayed above a line (or before a slash), and a non-zero integer denominator, displayed below (or after) that line. Numerators and denominators are also used in fractions that are not common, including compound fractions, complex fractions, and mixed numerals.
The numerator represents a number of equal parts, and the denominator, which cannot be zero, indicates how many of those parts make up a unit or a whole. For example, in the fraction 3/4, the numerator, 3, tells us that the fraction represents 3 equal parts, and the denominator, 4, tells us that 4 parts make up a whole. The picture to the right illustrates \tfrac{3}{4} or 3/4 of a cake.
Fractional numbers can also be written without using explicit numerators or denominators, by using decimals, percent signs, or negative exponents (as in 0.01, 1%, and 10−2 respectively, all of which are equivalent to 1/100). An integer such as the number 7 can be thought of as having an implied denominator of one: 7 equals 7/1.
Other uses for fractions are to represent ratios and to represent division.[1] Thus the fraction 3/4 is also used to represent the ratio 3:4 (the ratio of the part to the whole) and the division 3 ÷ 4 (three divided by four).
In mathematics the set of all numbers which can be expressed in the form a/b, where a and b are integers and b is not zero, is called the set of rational numbers and is represented by the symbol Q, which stands for quotient. The test for a number being a rational number is that it can be written in that form (i.e., as a common fraction). However, the word fraction is also used to describe mathematical expressions that are not rational numbers, for example algebraic fractions (quotients of algebraic expressions), and expressions that contain irrational numbers, such as √2/2 (see square root of 2) and π/4 (see proof that π is irrational).
In the examples 2/5 and 7/3, the slanting line is called a solidus or forward slash. In the examples \tfrac{2}{5} and \tfrac{7}{3}, the horizontal line is called a vinculum or, informally, a "fraction bar".
When reading fractions it is customary in English to pronounce the denominator using the corresponding ordinal number, in plural if the numerator is not one, as in "fifths" for fractions with a 5 in the denominator. Thus 3/5 is rendered as three fifths and 5/32 as five thirty-seconds. This generally applies to whole number denominators greater than 2, though large denominators that are not powers of ten are often rendered using the cardinal number. Thus, 5/123 might be rendered as "five one-hundred-twenty-thirds", but is often "five over one hundred twenty-three". In contrast, because one million is a power of ten, 6/1,000,000 is usually expressed as "six millionths" or "six one-millionths", rather than as "six over one million".
The denominators 1, 2, and 4 are special cases. The fraction 3/1 may be spoken of as three wholes. The denominator 2 is expressed as half (plural halves); "−32" is minus three-halves or negative three-halves. The fraction 3/4 may be either "three fourths" or "three quarters". Furthermore, since most fractions in prose function as adjectives, the fractional modifier is hyphenated. This is evident in standard prose in which one might write about "every two-tenths of a mile", "the quarter-mile run", or the Three-Fifths Compromise. When the fraction's numerator is 1, then the word one may be omitted, such as "every tenth of a second" or "during the final quarter of the year".
Forms of fractions[edit]
Simple, common, or vulgar fractions[edit]
A simple fraction (also known as a common fraction or vulgar fraction) is a rational number written as a/b or \tfrac{a}{b}, where a and b are both integers.[2] As with other fractions, the denominator (b) cannot be zero. Examples include \tfrac{1}{2}, -\tfrac{8}{5}, \tfrac{-8}{5}, \tfrac{8}{-5}, and 3/17. Simple fractions can be positive or negative, proper, or improper (see below). Compound fractions, complex fractions, mixed numerals, and decimals (see below) are not simple fractions, though, unless irrational, they can be evaluated to a simple fraction.
Proper and improper fractions[edit]
Common fractions can be classified as either proper or improper. When the numerator and the denominator are both positive, the fraction is called proper if the numerator is less than the denominator, and improper otherwise.[3][4] In general, a common fraction is said to be a proper fraction if the absolute value of the fraction is strictly less than one—that is, if the fraction is greater than −1 and less than 1.[5][6] It is said to be an improper fraction, or sometimes informally top-heavy fraction, if the absolute value of the fraction is greater than or equal to 1. Examples of proper fractions are 2/3, -3/4, and 4/9; examples of improper fractions are 9/4, -4/3, and 3/3.
Mixed numbers[edit]
This is not to be confused with the algebra rule of implied multiplication. When two algebraic expressions are written next to each other, the operation of multiplication is said to be "understood". In algebra, a \tfrac{b}{c} for example is not a mixed number. Instead, multiplication is understood where a \tfrac{b}{c} = a \times \tfrac{b}{c}.
a \times \tfrac{b}{c},
a \cdot \tfrac{b}{c}, or
a (\tfrac{b}{c}).
A ratio is a relationship between two or more numbers that can be sometimes expressed as a fraction. Typically, a number of items are grouped and compared in a ratio, specifying numerically the relationship between each group. Ratios are expressed as "group 1 to group 2 ... to group n". For example, if a car lot had 12 vehicles, of which
• 2 are white,
• 6 are red, and
• 4 are yellow,
Reciprocals and the "invisible denominator"[edit]
Complex fractions[edit]
Compound fractions[edit]
Decimal fractions and percentages[edit]
Decimal fractions with infinitely many digits to the right of the decimal separator represent an infinite series. For example, 1/3 = 0.333... represents the infinite series 3/10 + 3/100 + 3/1000 + ... .
Another kind of fraction is the percentage (Latin per centum meaning "per hundred", represented by the symbol %), in which the implied denominator is always 100. Thus, 51% means 51/100. Percentages greater than 100 or less than zero are treated in the same way, e.g. 311% equals 311/100, and −27% equals −27/100.
The related concept of permille or parts per thousand has an implied denominator of 1000, while the more general parts-per notation, as in 75 parts per million, means that the proportion is 75/1,000,000.
Whether common fractions or decimal fractions are used is often a matter of taste and context. Common fractions are used most often when the denominator is relatively small. By mental calculation, it is easier to multiply 16 by 3/16 than to do the same calculation using the fraction's decimal equivalent (0.1875). And it is more accurate to multiply 15 by 1/3, for example, than it is to multiply 15 by any decimal approximation of one third. Monetary values are commonly expressed as decimal fractions, for example $3.75. However, as noted above, in pre-decimal British currency, shillings and pence were often given the form (but not the meaning) of a fraction, as, for example 3/6 (read "three and six") meaning 3 shillings and 6 pence, and having no relationship to the fraction 3/6.
Special cases[edit]
• A unit fraction is a vulgar fraction with a numerator of 1, e.g. \tfrac{1}{7}. Unit fractions can also be expressed using negative exponents, as in 2−1 which represents 1/2, and 2−2 which represents 1/(22) or 1/4.
• An Egyptian fraction is the sum of distinct positive unit fractions, for example \tfrac{1}{2}+\tfrac{1}{3}. This definition derives from the fact that the ancient Egyptians expressed all fractions except \tfrac{1}{2}, \tfrac{2}{3} and \tfrac{3}{4} in this manner. Every positive rational number can be expanded as an Egyptian fraction. For example, \tfrac{5}{7} can be written as \tfrac{1}{2} + \tfrac{1}{6} + \tfrac{1}{21}. Any positive rational number can be written as a sum of unit fractions in infinitely many ways. Two ways to write \tfrac{13}{17} are \tfrac{1}{2}+\tfrac{1}{4}+\tfrac{1}{68} and \tfrac{1}{3}+\tfrac{1}{4}+\tfrac{1}{6}+\tfrac{1}{68}.
Arithmetic with fractions[edit]
Like whole numbers, fractions obey the commutative, associative, and distributive laws, and the rule against division by zero.
Equivalent fractions[edit]
Multiplying the numerator and denominator of a fraction by the same (non-zero) number results in a fraction that is equivalent to the original fraction. This is true because for any non-zero number n, the fraction \tfrac{n}{n} = 1. Therefore, multiplying by \tfrac{n}{n} is equivalent to multiplying by one, and any number multiplied by one has the same value as the original number. By way of an example, start with the fraction \tfrac{1}{2}. When the numerator and denominator are both multiplied by 2, the result is \tfrac{2}{4}, which has the same value (0.5) as \tfrac{1}{2}. To picture this visually, imagine cutting a cake into four pieces; two of the pieces together (\tfrac{2}{4}) make up half the cake (\tfrac{1}{2}).
Dividing the numerator and denominator of a fraction by the same non-zero number will also yield an equivalent fraction. This is called reducing or simplifying the fraction. A simple fraction in which the numerator and denominator are coprime (that is, the only positive integer that goes into both the numerator and denominator evenly is 1) is said to be irreducible, in lowest terms, or in simplest terms. For example, \tfrac{3}{9} is not in lowest terms because both 3 and 9 can be exactly divided by 3. In contrast, \tfrac{3}{8} is in lowest terms—the only positive integer that goes into both 3 and 8 evenly is 1.
Using these rules, we can show that \tfrac{5}{10} = \tfrac{1}{2} = \tfrac{10}{20} = \tfrac{50}{100}.
A common fraction can be reduced to lowest terms by dividing both the numerator and denominator by their greatest common divisor. For example, as the greatest common divisor of 63 and 462 is 21, the fraction \tfrac{63}{462} can be reduced to lowest terms by dividing the numerator and denominator by 21:
\tfrac{63}{462} = \tfrac{63 \div 21}{462 \div 21}= \tfrac{3}{22}
The Euclidean algorithm gives a method for finding the greatest common divisor of any two positive integers.
Comparing fractions[edit]
Comparing fractions with the same denominator only requires comparing the numerators.
\tfrac{3}{4}>\tfrac{2}{4} because 3>2.
If two positive fractions have the same numerator, then the fraction with the smaller denominator is the larger number. When a whole is divided into equal pieces, if fewer equal pieces are needed to make up the whole, then each piece must be larger. When two positive fractions have the same numerator, they represent the same number of parts, but in the fraction with the smaller denominator, the parts are larger.
One way to compare fractions with different numerators and denominators is to find a common denominator. To compare \tfrac{a}{b} and \tfrac{c}{d}, these are converted to \tfrac{ad}{bd} and \tfrac{bc}{bd}. Then bd is a common denominator and the numerators ad and bc can be compared.
\tfrac{2}{3} ? \tfrac{1}{2} gives \tfrac{4}{6}>\tfrac{3}{6}
It is not necessary to determine the value of the common denominator to compare fractions. This short cut is known as "cross multiplying" – you can just compare ad and bc, without computing the denominator.
\tfrac{5}{18} ? \tfrac{4}{17}
Multiply top and bottom of each fraction by the denominator of the other fraction, to get a common denominator:
\tfrac{5 \times 17}{18 \times 17} ? \tfrac{4 \times 18}{17 \times 18}
The denominators are now the same, but it is not necessary to calculate their value – only the numerators need to be compared. Since 5×17 (= 85) is greater than 4×18 (= 72), \tfrac{5}{18}>\tfrac{4}{17}.
Also note that every negative number, including negative fractions, is less than zero, and every positive number, including positive fractions, is greater than zero, so every negative fraction is less than any positive fraction.
The first rule of addition is that only like quantities can be added; for example, various quantities of quarters. Unlike quantities, such as adding thirds to quarters, must first be converted to like quantities as described below: Imagine a pocket containing two quarters, and another pocket containing three quarters; in total, there are five quarters. Since four quarters is equivalent to one (dollar), this can be represented as follows:
If \tfrac12 of a cake is to be added to \tfrac14 of a cake, the pieces need to be converted into comparable quantities, such as cake-eighths or cake-quarters.
Adding unlike quantities[edit]
To add fractions containing unlike quantities (e.g. quarters and thirds), it is necessary to convert all amounts to like quantities. It is easy to work out the chosen type of fraction to convert to; simply multiply together the two denominators (bottom number) of each fraction.
For adding quarters to thirds, both types of fraction are converted to twelfths, thus: \tfrac14\ + \tfrac13=\tfrac{1*3}{4*3}\ + \tfrac{1*4}{3*4}=\tfrac3{12}\ + \tfrac4{12}=\tfrac7{12}.
Consider adding the following two quantities:
First, convert \tfrac35 into fifteenths by multiplying both the numerator and denominator by three: \tfrac35\times\tfrac33=\tfrac9{15}. Since \tfrac33 equals 1, multiplication by \tfrac33 does not change the value of the fraction.
Second, convert \tfrac23 into fifteenths by multiplying both the numerator and denominator by five: \tfrac23\times\tfrac55=\tfrac{10}{15}.
Now it can be seen that:
is equivalent to:
This method can be expressed algebraically:
\tfrac{a}{b} + \tfrac {c}{d} = \tfrac{ad+cb}{bd}
And for expressions consisting of the addition of three fractions:
\tfrac{a}{b} + \tfrac {c}{d} + \tfrac{e}{f} = \tfrac{a(df)+c(bf)+e(bd)}{bdf}
This method always works, but sometimes there is a smaller denominator that can be used (a least common denominator). For example, to add \tfrac{3}{4} and \tfrac{5}{12} the denominator 48 can be used (the product of 4 and 12), but the smaller denominator 12 may also be used, being the least common multiple of 4 and 12.
The process for subtracting fractions is, in essence, the same as that of adding them: find a common denominator, and change each fraction to an equivalent fraction with the chosen common denominator. The resulting fraction will have that denominator, and its numerator will be the result of subtracting the numerators of the original fractions. For instance,
Multiplying a fraction by another fraction[edit]
To multiply fractions, multiply the numerators and multiply the denominators. Thus:
\tfrac{2}{3} \times \tfrac{3}{4} = \tfrac{6}{12}
Why does this work? First, consider one third of one quarter. Using the example of a cake, if three small slices of equal size make up a quarter, and four quarters make up a whole, twelve of these small, equal slices make up a whole. Therefore a third of a quarter is a twelfth. Now consider the numerators. The first fraction, two thirds, is twice as large as one third. Since one third of a quarter is one twelfth, two thirds of a quarter is two twelfth. The second fraction, three quarters, is three times as large as one quarter, so two thirds of three quarters is three times as large as two thirds of one quarter. Thus two thirds times three quarters is six twelfths.
A short cut for multiplying fractions is called "cancellation". In effect, we reduce the answer to lowest terms during multiplication. For example:
\tfrac{2}{3} \times \tfrac{3}{4} = \tfrac{\cancel{2} ^{~1}}{\cancel{3} ^{~1}} \times \tfrac{\cancel{3} ^{~1}}{\cancel{4} ^{~2}} = \tfrac{1}{1} \times \tfrac{1}{2} = \tfrac{1}{2}
A two is a common factor in both the numerator of the left fraction and the denominator of the right and is divided out of both. Three is a common factor of the left denominator and right numerator and is divided out of both.
Multiplying a fraction by a whole number[edit]
Place the whole number over one and multiply.
6 \times \tfrac{3}{4} = \tfrac{6}{1} \times \tfrac{3}{4} = \tfrac{18}{4}
This method works because the fraction 6/1 means six equal parts, each one of which is a whole.
Mixed numbers[edit]
When multiplying mixed numbers, it's best to convert the mixed number into an improper fraction. For example:
3 \times 2\tfrac{3}{4} = 3 \times \left (\tfrac{8}{4} + \tfrac{3}{4} \right ) = 3 \times \tfrac{11}{4} = \tfrac{33}{4} = 8\tfrac{1}{4}
In other words, 2\tfrac{3}{4} is the same as \tfrac{8}{4} + \tfrac{3}{4}, making 11 quarters in total (because 2 cakes, each split into quarters makes 8 quarters total) and 33 quarters is 8\tfrac{1}{4}, since 8 cakes, each made of quarters, is 32 quarters in total.
To divide a fraction by a whole number, you may either divide the numerator by the number, if it goes evenly into the numerator, or multiply the denominator by the number. For example, \tfrac{10}{3} \div 5 equals \tfrac{2}{3} and also equals \tfrac{10}{3 \cdot 5} = \tfrac{10}{15}, which reduces to \tfrac{2}{3}. To divide a number by a fraction, multiply that number by the reciprocal of that fraction. Thus, \tfrac{1}{2} \div \tfrac{3}{4} = \tfrac{1}{2} \times \tfrac{4}{3} = \tfrac{1 \cdot 4}{2 \cdot 3} = \tfrac{2}{3}.
Converting between decimals and fractions[edit]
To change a common fraction to a decimal, divide the denominator into the numerator. Round the answer to the desired accuracy. For example, to change 1/4 to a decimal, divide 4 into 1.00, to obtain 0.25. To change 1/3 to a decimal, divide 3 into 1.0000..., and stop when the desired accuracy is obtained. Note that 1/4 can be written exactly with two decimal digits, while 1/3 cannot be written exactly with any finite number of decimal digits.
To change a decimal to a fraction, write in the denominator a 1 followed by as many zeroes as there are digits to the right of the decimal point, and write in the numerator all the digits in the original decimal, omitting the decimal point. Thus 12.3456 = 123456/10000.
Converting repeating decimals to fractions[edit]
Decimal numbers, while arguably more useful to work with when performing calculations, sometimes lack the precision that common fractions have. Sometimes an infinite repeating decimal is required to reach the same precision. Thus, it is often useful to convert repeating decimals into fractions.
The preferred way to indicate a repeating decimal is to place a bar over the digits that repeat, for example 0.789 = 0.789789789… For repeating patterns where the repeating pattern begins immediately after the decimal point, a simple division of the pattern by the same number of nines as numbers it has will suffice. For example:
0.5 = 5/9
0.62 = 62/99
0.264 = 264/999
0.6291 = 6291/9999
In case leading zeros precede the pattern, the nines are suffixed by the same number of trailing zeros:
0.05 = 5/90
0.000392 = 392/999000
0.0012 = 12/9900
In case a non-repeating set of decimals precede the pattern (such as 0.1523987), we can write it as the sum of the non-repeating and repeating parts, respectively:
0.1523 + 0.0000987
Then, convert both parts to fractions, and add them using the methods described above:
1523/10000 + 987/9990000 = 1522464/9990000
Fractions in abstract mathematics[edit]
In addition to being of great practical importance, fractions are also studied by mathematicians, who check that the rules for fractions given above are consistent and reliable. Mathematicians define a fraction as an ordered pair (a, b) of integers a and b ≠ 0, for which the operations addition, subtraction, multiplication, and division are defined as follows:[9]
(a,b) - (c,d) = (ad-bc,bd) \,
(a,b) \div (c,d) = (ad,bc) (when c ≠ 0)
In addition, an equivalence relation is specified as follows: (a, b) ~ (c, d) if and only if ad=bc.
These definitions agree in every case with the definitions given above; only the notation is different.
More generally, a and b may be elements of any integral domain R, in which case a fraction is an element of the field of fractions of R. For example, when a and b are polynomials in one indeterminate, the field of fractions is the field of rational fractions (also known as the field of rational functions). When a and b are integers, the field of fractions is the field of rational numbers.
Algebraic fractions[edit]
If the numerator and the denominator are polynomials, as in \frac{3x}{x^2+2x-3}, the algebraic fraction is called a rational fraction (or rational expression). An irrational fraction is one that contains the variable under a fractional exponent or root, as in \frac{\sqrt{x+2}}{x^2-3}.
The terminology used to describe algebraic fractions is similar to that used for ordinary fractions. For example, an algebraic fraction is in lowest terms if the only factors common to the numerator and the denominator are 1 and −1. An algebraic fraction whose numerator or denominator, or both, contain a fraction, such as \frac{1 + \tfrac{1}{x}}{1 - \tfrac{1}{x}}, is called a complex fraction.
Rational numbers are the quotient field of integers. Rational expressions are the quotient field of the polynomials (over some integral domain). Since a coefficient is a polynomial of degree zero, a radical expression such as √2/2 is a rational fraction. Another example (over the reals) is \textstyle{\tfrac{\pi}{2}}, the radian measure of a right angle.
The term partial fraction is used when decomposing rational expressions into sums. The goal is to write the rational expression as the sum of other rational expressions with denominators of lesser degree. For example, the rational expression \textstyle{2x \over x^2-1} can be rewritten as the sum of two fractions: \textstyle{1 \over x+1} + \textstyle{1 \over x-1}. This is useful in many areas such as integral calculus and differential equations.
Radical expressions[edit]
A fraction may also contain radicals in the numerator and/or the denominator. If the denominator contains radicals, it can be helpful to rationalize it (compare Simplified form of a radical expression), especially if further operations, such as adding or comparing that fraction to another, are to be carried out. It is also more convenient if division is to be done manually. When the denominator is a monomial square root, it can be rationalized by multiplying both the top and the bottom of the fraction by the denominator:
\frac{3}{\sqrt{7}} = \frac{3}{\sqrt{7}} \cdot \frac{\sqrt{7}}{\sqrt{7}} = \frac{3\sqrt{7}}{7}
The process of rationalization of binomial denominators involves multiplying the top and the bottom of a fraction by the conjugate of the denominator so that the denominator becomes a rational number. For example:
\frac{3}{3-2\sqrt{5}} = \frac{3}{3-2\sqrt{5}} \cdot \frac{3+2\sqrt{5}}{3+2\sqrt{5}} = \frac{3(3+2\sqrt{5})}{{3}^2 - (2\sqrt{5})^2} = \frac{ 3 (3 + 2\sqrt{5} ) }{ 9 - 20 } = - \frac{ 9+6 \sqrt{5} }{11}
\frac{3}{3+2\sqrt{5}} = \frac{3}{3+2\sqrt{5}} \cdot \frac{3-2\sqrt{5}}{3-2\sqrt{5}} = \frac{3(3-2\sqrt{5})}{{3}^2 - (2\sqrt{5})^2} = \frac{ 3 (3 - 2\sqrt{5} ) }{ 9 - 20 } = - \frac{ 9-6 \sqrt{5} }{11}
Even if this process results in the numerator being irrational, like in the examples above, the process may still facilitate subsequent manipulations by reducing the number of irrationals one has to work with in the denominator.
Typographical variations[edit]
In computer displays and typography, simple fractions are sometimes printed as a single character, e.g. ½ (one half). See the article on Number Forms for information on doing this in Unicode.
Scientific publishing distinguishes four ways to set fractions, together with guidelines on use:[10]
• special fractions: fractions that are presented as a single character with a slanted bar, with roughly the same height and width as other characters in the text. Generally used for simple fractions, such as: ½, ⅓, ⅔, ¼, and ¾. Since the numerals are smaller, legibility can be an issue, especially for small-sized fonts. These are not used in modern mathematical notation, but in other contexts.
• case fractions: similar to special fractions, these are rendered as a single typographical character, but with a horizontal bar, thus making them upright. An example would be \tfrac{1}{2}, but rendered with the same height as other characters. Some sources include all rendering of fractions as case fractions if they take only one typographical space, regardless of the direction of the bar.[11]
• shilling fractions: 1/2, so called because this notation was used for pre-decimal British currency (£sd), as in 2/6 for a half crown, meaning two shillings and six pence. While the notation "two shillings and six pence" did not represent a fraction, the forward slash is now used in fractions, especially for fractions inline with prose (rather than displayed), to avoid uneven lines. It is also used for fractions within fractions (complex fractions) or within exponents to increase legibility. Fractions written this way, also known as piece fractions,[12] are written all on one typographical line, but take 3 or more typographical spaces.
• built-up fractions: \frac{1}{2}. This notation uses two or more lines of ordinary text, and results in a variation in spacing between lines when included within other text. While large and legible, these can be disruptive, particularly for simple fractions or within complex fractions.
The earliest fractions were reciprocals of integers: ancient symbols representing one part of two, one part of three, one part of four, and so on.[13] The Egyptians used Egyptian fractions ca. 1000 BC. About 4,000 years ago Egyptians divided with fractions using slightly different methods. They used least common multiples with unit fractions. Their methods gave the same answer as modern methods.[14] The Egyptians also had a different notation for dyadic fractions in the Akhmim Wooden Tablet and several Rhind Mathematical Papyrus problems.
The Greeks used unit fractions and later continued fractions and followers of the Greek philosopher Pythagoras, ca. 530 BC, discovered that the square root of two cannot be expressed as a fraction. In 150 BC Jain mathematicians in India wrote the "Sthananga Sutra", which contains work on the theory of numbers, arithmetical operations, operations with fractions.
The method of putting one number below the other and computing fractions first appeared in Aryabhatta's work around AD 499.[citation needed] In Sanskrit literature, fractions, or rational numbers were always expressed by an integer followed by a fraction. When the integer is written on a line, the fraction is placed below it and is itself written on two lines, the numerator called amsa part on the first line, the denominator called cheda “divisor” on the second below. If the fraction is written without any particular additional sign, one understands that it is added to the integer above it. If it is marked by a small circle or a cross (the shape of the “plus” sign in the West) placed on its right, one understands that it is subtracted from the integer. For example (to be read vertically), Bhaskara I writes[15]
६ १ २
१ १ १
४ ५ ९
That is,
6 1 2
1 1 1
4 5 9
to denote 6+1/4, 1+1/5, and 2–1/9.
Al-Hassār, a Muslim mathematician from Fez, Morocco specializing in Islamic inheritance jurisprudence during the 12th century, first mentions the use of a fractional bar, where numerators and denominators are separated by a horizontal bar. In his discussion he writes, "... for example, if you are told to write three-fifths and a third of a fifth, write thus, \frac{3 \quad 1}{5 \quad 3}."[16] This same fractional notation appears soon after in the work of Leonardo Fibonacci in the 13th century.[17]
In discussing the origins of decimal fractions, Dirk Jan Struik states:[18]
"The introduction of decimal fractions as a common computational practice can be dated back to the Flemish pamphlet De Thiende, published at Leyden in 1585, together with a French translation, La Disme, by the Flemish mathematician Simon Stevin (1548–1620), then settled in the Northern Netherlands. It is true that decimal fractions were used by the Chinese many centuries before Stevin and that the Persian astronomer Al-Kāshī used both decimal and sexagesimal fractions with great ease in his Key to arithmetic (Samarkand, early fifteenth century)."[19]
While the Persian mathematician Jamshīd al-Kāshī claimed to have discovered decimal fractions himself in the 15th century, J. Lennart Berggren notes that he was mistaken, as decimal fractions were first used five centuries before him by the Baghdadi mathematician Abu'l-Hasan al-Uqlidisi as early as the 10th century.[20][21]
In formal education[edit]
Pedagogical tools[edit]
In primary schools, fractions have been demonstrated through Cuisenaire rods, Fraction Bars, fraction strips, fraction circles, paper (for folding or cutting), pattern blocks, pie-shaped pieces, plastic rectangles, grid paper, dot paper, geoboards, counters and computer software.
Documents for teachers[edit]
Several states in the United States have adopted learning trajectories from the Common Core State Standards Initiative's guidelines for mathematics education. Aside from sequencing the learning of fractions and operations with fractions, the document provides the following definition of a fraction: "A number expressible in the form \tfrac{a}{b} where a is a whole number and b is a positive whole number. (The word fraction in the standards always refers to a non-negative number.)"[22] The document itself also refers to negative fractions.
See also[edit]
1. ^ H. Wu, The Mis-Education of Mathematics Teachers, Notices of the American Mathematical Society, Volume 58, Issue 03 (March 2011), page 374
2. ^ Weisstein, Eric W., "Common Fraction", MathWorld.
3. ^ World Wide Words: Vulgar fractions
4. ^ Weisstein, Eric W., "Improper Fraction", MathWorld.
5. ^ Math Forum – Ask Dr. Math:Can Negative Fractions Also Be Proper or Improper?
6. ^ New England Compact Math Resources
7. ^ a b Trotter, James (1853). A complete system of arithmetic. p. 65.
8. ^ a b Barlow, Peter (1814). A new mathematical and philosophical dictionary.
9. ^ "Fraction – Encyclopedia of Mathematics". 2012-04-06. Retrieved 2012-08-15.
10. ^ Galen, Leslie Blackwell (March 2004), "Putting Fractions in Their Place", American Mathematical Monthly 111 (3)
11. ^ "built fraction". glossary. Retrieved 2013-06-18.
12. ^ "piece fraction". glossary. Retrieved 2013-06-18.
13. ^ Eves, Howard ; with cultural connections by Jamie H. (1990). An introduction to the history of mathematics (6th ed. ed.). Philadelphia: Saunders College Pub. ISBN 0-03-029558-0.
14. ^ Milo Gardner (December 19, 2005). "Math History". Retrieved 2006-01-18. See for examples and an explanation.
15. ^ (Filliozat 2004, p. 152)
16. ^ Cajori, Florian (1928), A History of Mathematical Notations (Vol.1), La Salle, Illinois: The Open Court Publishing Company, p. 269
17. ^ (Cajori 1928, pg.89)
18. ^ A Source Book in Mathematics 1200–1800. New Jersey: Princeton University Press. 1986. ISBN 0-691-02397-2.
19. ^ Die Rechenkunst bei Ğamšīd b. Mas'ūd al-Kāšī. Wiesbaden: Steiner. 1951.
21. ^ While there is some disagreement among history of mathematics scholars as to the primacy of al-Uqlidisi's contribution, there is no question as to his major contribution to the concept of decimal fractions. [1] "MacTutor's al-Uqlidisi biography". Retrieved 2011-11-22.
22. ^ "Common Core State Standards for Mathematics". Common Core State Standards Initiative. 2010. p. 85. Retrieved 2013-10-10.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/50933 | Gilbert N. Lewis
From Wikipedia, the free encyclopedia
(Redirected from Gilbert Newton Lewis)
Jump to: navigation, search
Gilbert N. Lewis
Gilbert N Lewis.jpg
Born (1875-10-23)October 23, 1875
Weymouth, Massachusetts
Berkeley, California
Nationality American
Fields Physical chemist
Doctoral advisor Theodore William Richards
Doctoral students Michael Kasha
Harold Urey
Glenn T. Seaborg
Known for Covalent bond
Lewis dot structures
Valence bond theory
Electronic theory of acids and bases
Chemical thermodynamics
Heavy water
Named photon
Explained phosphorescence
Influences Irving Langmuir
Merle Randall
Notable awards Fellow of the Royal Society[1]
Gilbert Newton Lewis ForMemRS[1] (October 23, 1875 – March 23, 1946)[2] was an American physical chemist known for the discovery of the covalent bond and his concept of electron pairs; his Lewis dot structures and other contributions to valence bond theory have shaped modern theories of chemical bonding. Lewis has successfully contributed to thermodynamics, photochemistry, and isotope separation, and is also known for his concept of acids and bases.
G. N. Lewis was born in 1875 in Weymouth, Massachusetts. After receiving his PhD in chemistry from Harvard University and studying abroad in Germany and the Philippines, Lewis moved to California to teach chemistry at the University of California, Berkeley. Several years later, he became the Dean of the college of Chemistry at Berkeley, where he spent the rest of his life. As a professor, he incorporated thermodynamic principles into the chemistry curriculum and reformed chemical thermodynamics in a mathematically rigorous manner accessible to ordinary chemists. He began measuring the free energy values related to several chemical processes, both organic and inorganic.
In 1916, he also proposed his theory of bonding and added information about electrons in the periodic table of the elements. In 1933, he started his research on isotope separation. Lewis worked with hydrogen and managed to purify a sample of heavy water. He then came up with his theory of acids and bases, and did work in photochemistry during the last years of his life. In 1926, Lewis coined the term "photon" for the smallest unit of radiant energy. He was a brother in Alpha Chi Sigma, the professional chemistry fraternity.
Though he was nominated 35 times, G. N. Lewis never won the Nobel Prize in Chemistry. On March 23, 1946, Lewis was found dead in his Berkeley laboratory where he had been working with hydrogen cyanide; many postulated that the cause of his death was suicide. After Lewis' death, his children followed their father's career in chemistry.
Early life[edit]
Lewis was born in 1875 and raised in Weymouth, Massachusetts, where there exists a street named for him, G.N. Lewis Way, off Summer Street. Additionally, the wing of the new Weymouth High School Chemistry department has been named in his honor. Lewis received his primary education at home from his parents, Frank Wesley Lewis, a lawyer of independent character, and Mary Burr White Lewis. He read at age three and was intellectually precocious. In 1884 his family moved to Lincoln, Nebraska, and in 1889 he received his first formal education at the university preparatory school.
In 1893, after two years at the University of Nebraska, Lewis transferred to Harvard University, where he obtained his B.S. in 1896. After a year of teaching at Phillips Academy in Andover, Lewis returned to Harvard to study with the physical chemist T. W. Richards and obtained his Ph.D. in 1899 with a dissertation on electrochemical potentials. After a year of teaching at Harvard, Lewis took a traveling fellowship to Germany, the center of physical chemistry, and studied with Walther Nernst at Göttingen and with Wilhelm Ostwald at Leipzig.[3] While working in Nernst's lab, Nernst and Lewis apparently developed a lifelong enmity. A friend of Nernst's, Wilhelm Palmær, was a member of the Nobel Chemistry Committee. There is evidence that he used the Nobel nominating and reporting procedures to block a Nobel Prize for Lewis in thermodynamics by nominating Lewis for the prize three times, and then using his position as a committee member to write negative reports.[4]
Harvard, Manila, and MIT[edit]
After his stay in Nernst's lab, Lewis returned to Harvard in 1901 as an instructor for three more years. He was appointed instructor in thermodynamics and electrochemistry. In 1904 Lewis was granted a leave of absence and became Superintendent of Weights and Measures for the Bureau of Science in Manila, Philippines. The next year he returned to Cambridge, Massachusetts when the Massachusetts Institute of Technology (MIT) appointed him to a faculty position, in which he had a chance to join a group of outstanding physical chemists under the direction of Arthur Amos Noyes. He became an assistant professor in 1907, associate professor in 1908, and full professor in 1911. He left MIT in 1912 to become a professor of physical chemistry and dean of the College of Chemistry at the University of California, Berkeley. Lewis Hall at Berkeley, built in 1948, is named in his honor.
Most of Lewis’ lasting interests originated during his Harvard years. The most important was thermodynamics, a subject in which Richards was very active at that time. Although most of the important thermodynamic relations were known by 1895, they were seen as isolated equations, and had not yet been rationalized as a logical system, from which, given one relation, the rest could be derived. Moreover, these relations were inexact, applying only to ideal chemical systems. These were two outstanding problems of theoretical thermodynamics. In two long and ambitious theoretical papers in 1900 and 1901, Lewis tried to provide a solution. Lewis introduced the thermodynamic concept of activity and coined the term "fugacity".[5] His new idea of fugacity, or "escaping tendency", was a function with the dimensions of pressure which expressed the tendency of a substance to pass from one chemical phase to another. Lewis believed that fugacity was the fundamental principle from which a system of real thermodynamic relations could be derived. This hope was not realized, though fugacity did find a lasting place in the description of real gases.
Lewis’ early papers also reveal an unusually advanced awareness of J. W. Gibbs’s and P. Duhem’s ideas of free energy and thermodynamic potential. These ideas were well known to physicists and mathematicians, but not to most practical chemists, who regarded them as abstruse and inapplicable to chemical systems. Most chemists relied on the familiar thermodynamics of heat (enthalpy) of Berthelot, Ostwald, and Van’t Hoff, and the calorimetric school. Heat of reaction is not, of course, a measure of the tendency of chemical changes to occur, and Lewis realized that only free energy and entropy could provide an exact chemical thermodynamics. He derived free energy from fugacity; he tried, without success, to obtain an exact expression for the entropy function, which in 1901 had not been defined at low temperatures. Richards too tried and failed, and not until Nernst succeeded in 1907 was it possible to calculate entropies unambiguously. Although Lewis’ fugacity-based system did not last, his early interest in free energy and entropy proved most fruitful, and much of his career was devoted to making these useful concepts accessible to practical chemists.
At Harvard, Lewis also wrote a theoretical paper on the thermodynamics of blackbody radiation in which he postulated that light has a pressure. He later revealed that he had been discouraged from pursuing this idea by his older, more conservative colleagues, who were unaware that W. Wien and others were successfully pursuing the same line of thought. Lewis’ paper remained unpublished; but his interest in radiation and quantum theory, and (later) in relativity, sprang from this early, aborted effort. From the start of his career, Lewis regarded himself as both chemist and physicist.
Valence theory[edit]
Lewis' cubical atoms (as drawn in 1902)
A third major interest that originated during Lewis’ Harvard years was his valence theory. In 1902, while trying to explain the laws of valence to his students, Lewis conceived the idea that atoms were built up of a concentric series of cubes with electrons at each corner. This “cubic atom” explained the cycle of eight elements in the periodic table and was in accord with the widely accepted belief that chemical bonds were formed by transfer of electrons to give each atom a complete set of eight. This electrochemical theory of valence found its most elaborate expression in the work of Richard Abegg in 1904, but Lewis’ version of this theory was the only one to be embodied in a concrete atomic model. Again Lewis’ theory did not interest his Harvard mentors, who, like most American chemists of that time, had no taste for such speculation. Lewis did not publish his theory of the cubic atom, but in 1916 it became an important part of his theory of the shared electron pair bond.
In 1908 he published the first of several papers on relativity, in which he derived the mass-energy relationship in a different way from Albert Einstein's derivation.[7] In 1909, he and Richard C. Tolman combined his methods with special relativity.[8] In 1912 Lewis and Edwin Bidwell Wilson presented a major work in mathematical physics that not only applied synthetic geometry to the study of spacetime, but also noted the identity of a spacetime squeeze mapping and a Lorentz transformation.[9] [10]
Acids and bases[edit]
In 1923, he formulated the electron-pair theory of acid-base reactions. In this theory of acids and bases, a "Lewis acid" is an electron-pair acceptor and a "Lewis base" is an electron-pair donor. This year he also published a monograph on his theories of the chemical bond[12]
Heavy water[edit]
Lewis was the first to produce a pure sample of deuterium oxide (heavy water) in 1933[14] and the first to study survival and growth of life forms in heavy water.[15][16] By accelerating deuterons (deuterium nuclei) in Ernest O. Lawrence's cyclotron, he was able to study many of the properties of atomic nuclei[citation needed]. During the 1930s, he was mentor to Glenn T. Seaborg, who was retained for post-doctoral work as Lewis' personal research assistant. Seaborg went on to win the 1951 Nobel Prize in Chemistry and have the element seaborgium named in his honor while he was still alive.
Other achievements[edit]
Later years[edit]
In 1946, a graduate student found Lewis's lifeless body under a laboratory workbench at Berkeley. Lewis had been working on an experiment with liquid hydrogen cyanide, and deadly fumes from a broken line had leaked into the laboratory. The coroner ruled that the cause of death was coronary artery disease, because of a lack of any signs of cyanosis,[19] but some believe that it may have been a suicide. Berkeley Emeritus Professor William Jolly, who reported the various views on Lewis's death in his 1987 history of UC Berkeley’s College of Chemistry, From Retorts to Lasers, wrote that a higher-up in the department believed that Lewis had committed suicide.
Personal life[edit]
See also[edit]
1. ^ a b Hildebrand, J. H. (1947). "Gilbert Newton Lewis. 1875-1946". Obituary Notices of Fellows of the Royal Society 5 (15): 491. doi:10.1098/rsbm.1947.0014. edit
4. ^ Coffey (2008): 195-207.
7. ^ Lewis, G. N. (1908). "s:A revision of the Fundamental Laws of Matter and Energy". Philosophical Magazine 16 (95): 705–717. doi:10.1080/14786441108636549
8. ^ Lewis, G. N. & Richard C. Tolman (1909). "s:The Principle of Relativity, and Non-Newtonian Mechanics". Proceedings of the American Academy of Arts and Sciences 44 (25): 709–26. doi:10.2307/20022495
11. ^ Coffey (2008): 221-22.
15. ^ Lewis, G. N. (1933). "THE BIOCHEMISTRY OF WATER CONTAINING HYDROGEN ISOTOPE". Journal of the American Chemical Society 55: 3503–3504. doi:10.1021/ja01335a509. edit
16. ^ Lewis, G. N. (1934). "THE BIOLOGY OF HEAVY WATER". Science 79 (2042): 151–153. Bibcode:1934Sci....79..151L. doi:10.1126/science.79.2042.151. PMID 17788137. edit
19. ^ a b Coffey (2008): 310-15.
Further reading[edit]
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/50934 | Good Samaritan law
From Wikipedia, the free encyclopedia
(Redirected from Good Samaritan laws)
Jump to: navigation, search
An example of the obligation to help a person is the Argentina law on "abandonment of persons", Articles 106-108 of the Argentine Penal Code, which include the provision in Article 106 "a person who endangers the life or health of another, either by putting a person in jeopardy or abandoning to their fate a person unable to cope alone who must be cared for ... will be imprisoned for between 2 and 6 years".[2]
An example of legal protection without obligation to act: in common-law areas of Canada a good Samaritan doctrine is a legal principle that prevents a rescuer who has voluntarily helped a victim in distress from being successfully sued for 'wrongdoing'. Its purpose is to keep people from being reluctant to help a stranger in need for fear of legal repercussions should they make some mistake in treatment.[3]
The principles contained in good Samaritan laws more typically operate in countries in which the foundation of the legal system is English Common Law, such as Australia.[4] In many countries that use civil law as the foundation for their legal systems, the same legal effect is more typically achieved using a principle of duty to rescue.
In Canada, good samaritan acts are under provincial jurisdiction. Each province has its own act, such as Ontario[6] and British Columbia's[7] respective good Samaritan acts, Alberta's Emergency Medical Aid Act,[8] and Nova Scotia's Volunteer Services Act[9] Only in Quebec, a civil law jurisdiction, does a person have a general duty to respond, as written in the Quebec Charter of Human Rights and Freedoms.[10][11]
Protection from liability
New Brunswick and Nunavut do not have Good Samaritan laws.
China is notorious for its poor treatment of good Samaritans. There have been incidents in China, such as the Peng Yu incident in 2006,[13][14] where Good Samaritans who helped people injured in accidents were accused of having injured the victim themselves.
According to China Daily, “At least 10 Party and government departments and organizations in Guangdong, including the province's commission on politics and law, the women's federation, the Academy of Social Sciences, and the Communist Youth League, have started discussions on punishing those who refuse to help people who clearly need it.”[16] Officials of Guangdong province, along with many lawyers and social workers, also held three days of meetings in the provincial capital of Guangzhou to discuss the case. It was reported that various lawmakers of the province are drafting a "Good Samaritan" law, which would "penalize people who fail to help in a situation of this type and indemnify them from lawsuits if their efforts are in vain."[17] Legal experts and the public are debating the idea ahead of discussions and a legislative push.[18] On 1 August 2013, the nation's first Good Samaritan law was taken into effect in Shenzhen.[19]
Laws in North America mainly shield from liability those who choose to help in a situation they did not cause; laws in much of Europe[where?] and other countries[which?] criminalize failure to help in such a situation:[20] people in such countries[which?] who do not help someone in peril may be prosecuted.[21]
In Germany, failure to provide first aid to a person in need is punishable under § 323c of the criminal penal code. However, any help one provides can and will not be prosecuted even if it made the situation worse or did not fulfill specific first aid criteria. People are thus encouraged to help in any way possible even if it does not lead to success.[22]
The Finnish Rescue act explicitly stipulates a duty to rescue as a general duty to act and engage in rescue activities according to their abilities. The Finnish Rescue act thus includes a principle of proportionality which e.g. requires professionals to extend immediate aid further than lay persons. Failure to rescue is punishable by the Finnish penal code, section 21, 15 §.
The Civil Law (Miscellaneous Provisions) Act of 2011[23] first introduced legislation specifically addressing the liability of citizen good samaritans or volunteers in the Republic of Ireland, without introducing a duty to intervene. This Act provides for exemption from liability for a person, or voluntary organisation, for anything done while providing "assistance, advice or care" to a person who is injured, in serious risk or danger of becoming injured or suffering from an illness (or apparently so). There are exclusions for cases of "bad faith" or "gross negligence" on behalf of the carer, and incidents relating to negligent use of motor vehicles. This Act only addresses situations where there is no duty of care owed by the good samaritan or the volunteer.
United States[edit]
The details of good Samaritan laws/acts in various jurisdictions vary, including who is protected from liability and in what circumstances.[24] Not all jurisdictions provide protection to laypersons, in those cases only protecting trained personnel, such as doctors or nurses and perhaps also emergency services personnel such as trained police, fire and EMS workers.[25]
Most Australian states and territories have some form of good Samaritan protection. In general these offer protection if care is made in good faith, and the "good Samaritan" is not impaired by drugs or alcohol. Variation exists between states, from not applying if the "good Samaritan" is the cause of the problem (NSW), to applying under all circumstances if the attempt is made in good faith (VIC).[26]
Common features[edit]
In some jurisdictions, unless a caretaker relationship (such as a parent-child or doctor-patient relationship) exists prior to the illness or injury, or the "good Samaritan" is responsible for the existence of the illness or injury, no person is required to give aid of any sort to a victim. Good Samaritan statutes in the states of Minnesota and Vermont do require a person at the scene of an emergency to provide reasonable assistance to a person in need.[27] This assistance may be to call 9-1-1. Violation of the duty-to-assist subdivision is a petty misdemeanor in Minnesota and may warrant a fine of up to $100 in Vermont. At least five other states, including California and Nevada, have seriously considered adding duty-to-assist subdivisions to their good Samaritan statutes.[28] New York's law provides immunity for those who assist in an emergency.[29] The public policy behind the law is:
—N.Y. Public Health L. § 3000.[30]
Only first aid provided without intention of reward or financial compensation is covered. Medical professionals are typically not protected by good Samaritan laws when performing first aid in connection with their employment.[34] Some states make specific provisions for trained medical professionals acting as volunteers and for members of volunteer rescue squads acting without expectation of remuneration.[29][35] In Texas, a physician who voluntarily assisted in the delivery of an infant, and who proved that he had "no expectation of remuneration", had no liability for the infant's injuries due to allegedly ordinary negligence; there was "uncontroverted testimony that neither he nor any doctor in Travis County would have charged a fee to [the mother] or any other person under the circumstances of this case."[36] It was significant that the doctor was not an employee of the attending physician, but was only visiting the hospital and had responded to a "Dr. Stork" page, and had not asked or expected to be paid.[36]
If a responder begins rendering aid, he must not leave the scene until it is necessary to call for needed medical assistance, a rescuer of equal or higher ability takes over, or continuing to give aid is unsafe.[37] The responder is not legally liable for any harm to the person assisted, as long as the responder acted rationally, in good faith and in accordance with their level of training.[38]
Implied consent[edit]
Consent may be implied if an unattended patient is unconscious, delusional, intoxicated or deemed mentally unfit to make decisions regarding his or her safety, or if the responder has a reasonable belief that this was so; courts tend to be very forgiving in adjudicating this, under the legal fiction that "peril invites rescue" (as in the rescue doctrine).[39] The test in most jurisdictions is that of the 'average, reasonable person'. To illustrate, would the average, reasonable person in any of the states described above consent to receiving assistance in these circumstances if able to make a decision?
Parental consent[edit]
Laws for first responders only[edit]
Comparison with duty to rescue[edit]
In popular culture[edit]
A Good Samaritan law was featured in the May 1998 series finale of the popular NBC situation comedy Seinfeld, in which the show's four main characters were all prosecuted and sentenced to one year in jail for making fun of (rather than helping) a fat man (John Pinette) who was getting robbed at gunpoint.[46] In reality, while Massachusetts (where the fictional crime was committed) does have a law requiring passersby to report a crime in progress, the most stringent punishment the characters could have suffered under those circumstances would have been a $500–2,500 fine (assuming they were prosecuted under state law); however, the sentence couldn't have resulted in the telling of all of the other horrible things described by the witnesses: In addition, the phrase "good Samaritan law," when used in Massachusetts, refers only to the civil law definition and does not have any actual relevance to the law under which Jerry Seinfeld and his friends were prosecuted (which would be considered a duty to rescue).[47]
See also[edit]
References and notes[edit]
3. ^ "Canadian Law website 1". Retrieved 2008-10-16.
6. ^ "Good Samaritan Act, S.O., 2001 (Ontario E-laws website)". Retrieved 2013-06-07.
8. ^ "Emergency Medical Aid Act (Alberta Queen's Printer website". Retrieved 2008-10-10.
19. ^ Huifeng, He (01 August, 2013). "Shenzhen introduces Good Samaritan law". South China Morning Post. Retrieved January 14, 2014.
20. ^ Benac, Nancy (1997-09-05). ""Good Samaritan Laws" Common in Europe but Rare in America". Wisconsin State Journal. p. 7.A. ISSN 0749-405X. Retrieved 2010-01-07. (Registration Required)
21. ^ "Online NewsHour: French Legal System - September 3, 1997". Retrieved 2013-03-19.
22. ^ "StGB - Einzelnorm". Retrieved 2013-03-19.
23. ^ "Civil Law (Miscellaneous Provisions) Act 2011". Retrieved 2014-02-21.
26. ^
27. ^ "Vermont Good Samaritan Law". Retrieved 2008-10-17.
29. ^ a b N.Y. Public Health L. §§ 3000-a, 3000-b, 3013 (McKinney 2000); see also NY State Assembly website database of law. Accessed April 8, 2009; last accessed July 25, 2011.
35. ^ "Colorado Good Samaritan Law". Retrieved 2008-10-17.
39. ^ "Implied Consent ( website)". Retrieved 2008-10-17.
41. ^ "Good Samaritan/Fireman's Rule (Connecticut State Legislature website)". Retrieved 2008-10-17.
42. ^ Higuchi N (March 2008). "[Good Samaritan Act and physicians' duty to rescue]". Nippon Hoshasen Gijutsu Gakkai zasshi (in Japanese) 64 (3): 382–4. PMID 18434681. [dead link]
43. ^ "Canadian Law website 2". Retrieved 2008-10-16.
46. ^ James, Caryn (1998-05-15). "'Seinfeld' Goes Out in Self-Referential Style". New York Times. pp. B1. Retrieved 2008-10-20.
47. ^ "Footnote TV's Mirror Law analysis of the Seinfeld finale and Massachusetts' Good Samaritan Law". Retrieved August 12, 2009.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/50936 | Hangin' In
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Hangin' In
Format Sitcom
Starring Lally Cadeau
David Eisner
Ruth Springford
Gina Wilkinson (season 5-7)
Fiona Reid (season 7)
Country of origin Canada
No. of seasons 7
No. of episodes 110
Running time 22–24 minutes
Original channel CBC
Original run January 7, 1981 (1981-01-07) – February 23, 1987 (1987-02-23)
Hangin' In is a Canadian television sitcom which aired on CBC from 1981 to 1987. It also aired briefly in syndication in the United States. Canadian producer Jack Humphrey developed Hangin' In and served as executive producer for the show.
The show stars Lally Cadeau as Kate Brown, the director of a youth drop-in centre in Toronto. David Eisner also stars as Michael DiFalco, a staff counsellor, and Ruth Springford appeared as Doris Webster, the centre's receptionist. Many young Canadian actors, including Eric McCormack, Keanu Reeves, Jessica Steen, and Mark Humphrey played teenaged clients of the youth centre.
In the show's final season, Cadeau left the series and was replaced by Fiona Reid as Maggie.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/50937 | James Zogby
From Wikipedia, the free encyclopedia
Jump to: navigation, search
James Zogby
James Zogby MSPAC.jpg
James Zogby in Redmond, Washington 2010
Born James Zogby
(from Arabic: زغبي, Zuġbīy)
1945 (age 68–69)
Utica, New York
Residence Washington D.C. area
Ethnicity Lebanese Arab
Citizenship United States
Alma mater Le Moyne College, B.A.
Temple University, Ph.D
Known for Founder of Arab American Institute
Political party
Democratic Party
Spouse(s) Eileen P. McMahon[1]
Children 5
Relatives John Zogby, brother
Selwa Stemmer, sister
James Joseph Zogby[2] (born 1945) is the author of Arab Voices[3] and the founder and president of the Arab American Institute (AAI), a Washington, D.C.–based organization which serves as a political and policy research arm of the Arab-American community. He is Managing Director of Zogby Research Services, LLC, specializing in research and communications and undertaking polling across the Arab world. Zogby is a lecturer and scholar on Middle East issues and a Visiting Professor of Social Research and Public Policy at New York University Abu Dhabi.[4] He is also a member of the Executive Committee of the Democratic National Committee.
Early years and education[edit]
Zogby's ancestors immigrated from Lebanon. His father entered the United States illegally in 1922,[5] but eventually obtained citizenship through a government policy of amnesty.[6] Zogby was born in Utica, New York.
He attended Le Moyne College in Syracuse New York where he graduated in 1967 with a bachelor's degree in economics. He went on to earn his Ph.D. in Islamic studies from Temple University in 1975. He studied at Princeton University in 1976 as a National Endowment for the Humanities post-doctoral fellow.[1]
During the late 1970s, Zogby was a founding member and leader of the Palestine Human Rights Campaign. In 1980, he co-founded the American-Arab Anti-Discrimination Committee with former U.S. Senator James Abourezk and served as executive director until 1984. In 1982, while at ADC, Zogby helped create Save Lebanon, Inc., a private non-profit, non-sectarian humanitarian relief organization to fund social welfare projects in Lebanon and health care for Palestinian and Lebanese victims of war.[7] In March 1985, Zogby founded the Arab American Institute, of which he is still president.[8]
In 1993, Vice President Al Gore tapped Zogby to help lead Builders for Peace following the signing of the Israeli-Palestinian peace accord in Washington. As co-president of Builders, Zogby promoted business investment by Arab-Americans in the West Bank and Gaza Strip. In 1994, Zogby led a U.S. delegation to the signing of the agreement in Cairo, Egypt, along with the Builders co-president, former U.S. Congressman Mel Levine. Zogby also chaired a forum on the Palestinian economy at the Casablanca Economic Summit.[1] After 1994, through Builders, Zogby worked with a number of U.S. Agencies to promote and support Palestinian economic development including AID, OPIC, USTDA, and the Departments of State and Commerce.
Since 1992, Zogby has written Washington Watch, a weekly column on American politics for major Arab newspapers, which is published in 14 Arab and South Asian countries. He has authored several books, including What Ethnic Americans Really Think (The Zogby Culture Polls)[9] and What Arabs Think: Values, Beliefs and Concerns.[10] He also blogs at The Huffington Post[7] and is a member of Politico's Arena.[11] Zogby hosted a weekly interview and call-in discussion program, Viewpoint with James Zogby, about Middle East and world issues on Abu Dhabi Television which was broadcast in America on Link TV, DirecTV and Dish Network.[12] The show has won an award at the Cairo Radio/Television Festival.
In 1984 and 1988, Zogby served as Deputy Campaign manager and Senior Advisor to the Jesse Jackson Presidential campaign. In 1995 he was appointed as co-convener of the National Democratic Ethnic Coordinating Committee (NDECC), an umbrella organization within the Democratic Party of leaders of European and Mediterranean descent, to which he was reelected in 1999 and 2001. Also in 2001, he was appointed to the Executive Committee of the Democratic National Committee (DNC), and in 2006 was also named Co-Chair of the DNC's Resolutions Committee.[11] He served as Al Gore's Senior Advisor on Ethnic Outreach, a post he also held in the 2008 Obama Campaign.
As an author and scholar on Middle East issues and the Arab-American community, Zogby has over the years been invited to testify before a number of Congressional Committees and Executive branch forums,[1] including on the subject of Arab attitudes toward the United States.[13] He has been a guest speaker in the Secretary's Open Forum at the U.S. Department of State. Zogby has also addressed the United Nations and other international forums. He is a member of the Council on Foreign Relations.
Zogby has been the target of repeated anti-Arab threats, for which at least three men have been convicted and sent to prison. In 1980, Zogby's office in Washington, D.C. was fire-bombed.[14] In July 2006, Zogby and other senior Arab American Institute employees were threatened in emails and voice mail messages which Patrick Syring, a career Foreign Service Officer of the U.S. State Department, sent during the 2006 Lebanon War.[15] Syring accused Zogby and the Arab American Institute of being part of Hezbollah, and Zogby of being an anti-Semite. Syring said "The only good Lebanese is a dead Lebanese. The only good Arab is a dead Arab." In one email, Syring wrote, "You wicked evil Hezbollah-supporting Arabs should burn in the fires of hell for eternity and beyond. The United States would be safer without you.".[16] Subsequently, in a March 2008 e-mail to a television station which had aired an interview with Zogby, Syring accused Zogby and the Arab American Institute of "promoting the interests of Hezbollah, Hamas and Arab terror.[17] Syring was sentenced July 11, 2008, to one year in prison for civil rights violations. He was released early on January 30, 2009.[18][19][20]
Awards and honors[edit]
In 1995, Le Moyne College awarded Zogby an honorary doctor of laws degree and in 1997, named him the college's outstanding alumnus. In 2007, Temple University College of Liberal Arts also singled out Zogby as an outstanding alumnus. In 2008 American University of Cairo awarded him an honorary doctorate. Zogby was also named an Honorary Patron of the University Philosophical Society, Trinity College, Dublin.
• Arab Voices: What They Are Saying to Us, and Why it Matters, James Zogby, Palgrave Macmillan (October 2010), ISBN 978-0230102996
1. ^ a b c d "Dr. James Zogby Biography". Arab American Institute. 2009.
2. ^ http://www.opensecrets.org/pacs/lookup2.php?strID=C00194225
3. ^ Zogby, James (October 2010). Arab Voices: What They Are Saying to Us, and Why it Matters. Palgrave Macmillan. ISBN 0-230-10299-9.
4. ^ "NYUAD Faculty". New York University Abu Dhabi.
5. ^ Faraq, Fatemah (2002-09-12). "Profile: James Zogby, an American identity, an Arab heritage". Al-Ahram Weekly On-Line.
6. ^ "Dr. Zogby Speaks at Conference Commemorating the 45th Anniversary of Title VI of the Civil Rights Act of 1964". Arab American Institute. 2009-07-20.
7. ^ a b "Blog Entries by James Zogby". Huffington Post. 2009.
8. ^ "Meet the Staff". Arab American Institute. 2009.
9. ^ Zogby, James (2001-05-01). What Ethnic Americans Really Think (The Zogby culture polls). Zogby International. ISBN 978-0-9712255-0-3.
10. ^ Zogby, James (2002-09-15). What Arabs Think: Values, Beliefs and Concerns. Zogby International. ISBN 978-0-9712255-4-1.
11. ^ a b "James J. Zogby's Recent Discussions". The Arena: Politico's daily debate with policymakers and opinion shapers. Politico. 2009.
12. ^ "Viewpoint with James Zogby". Program Description and Video Clips. Link TV. 2009.
13. ^ Elshinnawi, Mohamed (2007-05-24). "Congress Addresses Arab Anti-Americanism". Voice of America News.
14. ^ Zogby, James (2009-07-27). "Our Path". Arab American Institute. Retrieved 2009-11-12.
15. ^ http://www.washingtonpost.com/wp-dyn/content/article/2007/08/15/AR2007081502190.html
16. ^ http://www.washingtontimes.com/news/2007/aug/17/indicted-diplomat-retires-from-state/
17. ^ http://www.washingtonpost.com/wp-dyn/content/article/2008/07/11/AR2008071102846.html
18. ^ "Patrick Syring". Inmate Locator. Federal Bureau of Prisons. Retrieved November 8, 2011.
19. ^ "Former Foreign Service Officer Pleads Guilty to Federal Civil Rights Charges" (Press release). U.S. Department of Justice. 2008-06-12.
20. ^ Schudel (2008-12-07). "Former U.S. diplomat gets year in prison for anti-Arab remarks". Reuters.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/50938 | Liang Xing
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Liang Xing
Simplified Chinese 梁兴
Traditional Chinese 梁興
Liang Xing (died 212) was a general from Liang Province (涼州; covering present-day Gansu) during the late Han Dynasty period of Chinese history. He was from Zuopingyi Commandery (左馮翊) of the capital province, Sili (司隸).
Liang Xing was one of the generals who responded to Ma Chao's call to resist Cao Cao in 211. However, after their defeat by Cao at the Battle of Tong Pass, the alliance broke down and he became a bandit. He raided Zuopingyi and caused the officials in the area to flee in panic. The Grand Administrator of the commandery, Zheng Hun (鄭渾), observed that the raiders were only held together by force and so Zheng used various physiological plots to chip away Liang Xing's bandits. Liang Xing and his remaining followers became afraid and fled to their base at Fucheng (near present-day Lechuan in Shaanxi). Cao Cao then sent Xiahou Yuan and Xu Huang to aid Zheng Hun to attack Fucheng, and soon they took the head of Liang Xing and the rest of his party were all pacified.
In fiction[edit]
In Luo Guanzhong's historical novel Romance of the Three Kingdoms, Liang Xing was one of the eight generals serving under Han Sui. When relations between Ma Chao and Han Sui soured as a result of Jia Xu's ploy, Liang Xing and Ma Wan (馬玩) planned to assassinate Ma Chao. Ma Chao heard of the plot, and killed them preemptively.
See also[edit] |
global_01_local_0_shard_00000017_processed.jsonl/50939 | My Prison Without Bars
From Wikipedia, the free encyclopedia
Jump to: navigation, search
My Prison Without Bars is Pete Rose's autobiography, published by Rodale Press on January 8, 2004.
In the book, Rose finally admitted publicly to betting on baseball games and other sports while playing for and managing the Cincinnati Reds.[1] He also admitted to betting on Reds games, but said that he never bet against the Reds.[2][3]
At the time of its release, excerpts from the book were printed in Sports Illustrated.
1. ^ Prison Without Walls. Accessed February 1, 2013.
2. ^
3. ^ My Prison Without Bars. Taylor Fulks. Accessed February 1, 2013. |
global_01_local_0_shard_00000017_processed.jsonl/50940 | Purkinje effect
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The Purkinje effect (sometimes called the Purkinje shift, or dark adaptation and named after the Czech anatomist Jan Evangelista Purkyně) is the tendency for the peak luminance sensitivity of the human eye to shift toward the blue end of the color spectrum at low illumination levels.[1][2][page needed]
This effect introduces a difference in color contrast under different levels of illumination. For instance, in bright sunlight, geranium flowers appear bright red against the dull green of their leaves, or adjacent blue flowers, but in the same scene viewed at dusk, the contrast is reversed, with the red petals appearing a dark red or black, and the leaves and blue petals appearing relatively bright.
The sensitivity to light in scotopic vision varies with wavelength, though the perception is essentially black-and-white. The Purkinje shift is the relation between the absorption maximum of rhodopsin, reaching a maximum at about 500 nm, and that of the opsins in the long-wavelength and medium-wavelength cones that dominate in photopic vision, about 555 nm.[3]
In visual astronomy, the Purkinje shift can affect visual estimates of variable stars when using comparison stars of different colors, especially if one of the stars is red.
The effect occurs because the color-sensitive cones in the retina are most sensitive to green light, whereas the rods, which are more light-sensitive (and thus more important in low light) but which do not distinguish colors, respond best to green-blue light.[4] This is why humans become virtually color-blind under low levels of illumination, for instance moonlight.
The Purkinje effect occurs at the transition between primary use of the photopic (cone-based) and scotopic (rod-based) systems, that is, in the mesopic state: as intensity dims, the rods take over, and before color disappears completely, it shifts towards the rods' top sensitivity.[5]
Use of red lights[edit]
The insensitivity of rods to long-wavelength light has led to the use of red lights under certain special circumstances – for example, in the control rooms of submarines, in research laboratories, aircraft, or during naked-eye astronomy.[6]
Under conditions where it is desirable to have both the photopic and scotopic systems active, red lights provide a solution. Submarines are dimly lit to preserve the night vision of the crew members working there, but the control room must be lit to allow crew members to read instrument panels. By using red lights, or wearing red goggles, the cones can receive enough light to provide photopic vision (namely the high-acuity vision required for reading). The rods are not saturated by the bright red light because they are not sensitive to long-wavelength light, so the crew members remain dark adapted.[7] Similarly, airplane cockpits use red lights so pilots can read their instruments and maps while maintaining night vision to see outside the aircraft.
Red lights are also often used in research settings. Many research animals (such as rats and mice) have limited photopic vision - as they have far fewer cone photoreceptors.[8] By using red lights, the animal subjects remain "in the dark" (the active period for nocturnal animals), but the human researchers, who have one kind of cone that is sensitive to long wavelengths, are able to read instruments or perform procedures that would be impractical even with fully dark adapted (but low acuity) scotopic vision.[9] For the same reason, zoo displays of nocturnal animals often are illuminated with red light.
The effect was discovered in 1819 by Jan Evangelista Purkyně. Purkyně was a polymath[10] who would often meditate at dawn during long walks in the blossomed Bohemian fields. Purkyně noticed that his favorite flowers appeared bright red on a sunny afternoon, while at dawn they looked very dark. He reasoned that the eye has not one but two systems adapted to see colors, one for bright overall light intensity, and the other for dusk and dawn.
Purkyně wrote in his Neue Beiträge:[10][11]
Objectively, the degree of illumination has a great influence on the intensity of color quality. In order to prove this most vividly, take some colors before daybreak, when it begins slowly to get lighter. Initially one sees only black and grey. Particularly the brightest colors, red and green, appear darkest. Yellow cannot be distinguished from a rosy red. Blue became noticeable to me first. Nuances of red, which otherwise burn brightest in daylight, namely carmine, cinnabar and orange, show themselves as darkest for quite a while, in contrast to their average brightness. Green appears more bluish to me, and its yellow tint develops with increasing daylight only.
See also[edit]
1. ^ Frisby JP (1980). Seeing: Illusion, Brain and Mind. Oxford University Press : Oxford.
2. ^ Purkinje JE (1825). Neue Beiträge zur Kenntniss des Sehens in Subjectiver Hinsicht. Reimer : Berlin. pp. 109–110.
3. ^ "Eye, human." Encyclopædia Britannica 2006 Ultimate Reference Suite DVD
4. ^ Cornsweet TN (1970). Visual Perception. Academic Press : New York. pp. 145–148.
5. ^ "Human eye – anatomy". Britannica online. "The Purkinje shift has an interesting psychophysical correlate; it may be observed, as evening draws on, that the luminosities of different colours of flowers in a garden change; the reds become much darker or black, while the blues become much brighter. What is happening is that, in this range of luminosities, called mesopic, both rods and cones are responding, and, as the rod responses become more pronounced – i.e., as darkness increases – the rod luminosity scale prevails over that of the cones."
6. ^ Barbara Fritchman Thompson (2005). Astronomy Hacks: Tips and Tools for Observing the Night Sky. O'Reilly. pp. 82–86. ISBN 978-0-596-10060-5.
7. ^ "On the Prowl with Polaris". Popular Science 181 (3): 59–61. September 1962. ISSN 0161-7370.
8. ^ Jeon et al. (1998) J. Neurosci 18, 8936
9. ^ James G. Fox, Stephen W. Barthold, Muriel T. Davisson, and Christian E. Newcomer (2007). The mouse in biomedical research: Normative Biology, Husbandry, and Models. Academic Press. p. 291. ISBN 978-0-12-369457-7.
10. ^ a b Nicholas J. Wade and Josef Brožek (2001). Purkinje's Vision. Lawrence Erlbaum Associates. p. 13. ISBN 978-0-8058-3642-4.
11. ^ As quoted in: Grace Maxwell Fernald (1909). "The Effect of Achromatic Conditions on the Color Phenomena of Peripheral Vision". Psychological Monograph Supplements (Baltimore : The Review Publishing Company) X (3): 9.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/50943 | Sophie Rois
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Sophie Rois in 2009
Sophie Rois is an Austrian actress. She has appeared in such films as Three, 180°, Enemy at the Gates and television programs such as Polizeiruf 110 and Die kleine Monsterin (voice).
The actress received the first grade of the french Ordre des Arts et des Lettres while visiting the Berlinale at 10 february 2014 at the french embassy of Berlin.[1]
External links[edit]
1. ^ "Botschafter Gourdault-Montagne zeichnet Cinéasten Rois und Buchholz bei Berlinale-Abend aus". french embassy Berlin. 11 February 2014. Retrieved 13 February 2014. |
global_01_local_0_shard_00000017_processed.jsonl/50944 | St. Michael's Church, Mumbai
From Wikipedia, the free encyclopedia
(Redirected from St. Michael's Church (Mumbai))
Jump to: navigation, search
St. Michael's Church
Mahim Church
St. Michael's Church, Mahim 4.jpg
Picture of the St. Michael's Church in Mumbai
St. Michael's Church, Mumbai is located in Mumbai
St. Michael's Church, Mumbai
Location of St. Michael's Church in Mumbai
Basic information
Location Mahim, Mumbai, India
Geographic coordinates 19°02′33″N 72°50′26″E / 19.042525°N 72.840557°E / 19.042525; 72.840557Coordinates: 19°02′33″N 72°50′26″E / 19.042525°N 72.840557°E / 19.042525; 72.840557
Affiliation Roman Catholic
Rite Novena
Year consecrated 1534
Ecclesiastical or organizational status Active
Architectural description
St. Michael's Church is one of the oldest Catholic churches as well as one of oldest existing Portuguese buildings in Mumbai. The church is situated in Mahim, located at the intersection of L.J. Road and Mahim Causeway. Due to its location, it is also informally known as Mahim Church.[1] The church is famous for its Novenas on Wednesdays, which is visited by thousands.[2]
The church, originally built in 1534, is rebuilt a number of times, the present structure dating to 1973. The church also served a refuge to popular icon of the Virgin Mary from Our Lady of the Mount chapel, Bandra from 1739 to 1761. In 1853, the Church witnessed a showdown between vicars Apostolic and the Portuguese padroado order for the control of the Church. In recent history, on 27 June, 2008, thousands of devotees visited the Church to see a reported "bleeding" Jesus Christ's portrait, which was termed as a "miracle" by devotees. Though on further investigation, the red spots on the picture showed no traces of blood.
The original Our Lady of Perpetual Succour picture from Rome
Not only Christians, but also adherents of other faiths congregate to pay their respects to the Virgin Mary and attend mass every Wednesday. Devotees believe that visiting the Church on nine consecutive Wednesdays (Novena) will grant their wishes. They offer floral garlands according to the Hindu customs and repeat prayers before the image.[1] Some of them offer wax figures of what they desire, for example, a wax house. According to Father Hugh Fonseca, around 40-50,000 devotees visit the church every week.[3]
The weekly Novena services were started in 1948, when a priest Fr. Edward Placidus Fernandes from Mumbai noticed a similar ritual celebrating Our Lady of Perpetual Succour at Belfast, Northern Ireland, during his visit to Europe. Fr. Fernandes brought with him a picture touched to the original Our Lady of Perpetual Succour picture at Rome. On the 8th of September, 1948 - the Birthday of Mary, concurrent with a Wednesday that year, Fr. Fernandes as the vicar held the first Novena services. Initially, only two services were held every Wednesday, but today from 8:30 am to 10:30 pm, the thirteen services are held in various languages: English, Konkani, Marathi, Tamil and Hindi.[4]
Interior of St. Michael's Church, Mahim (Mumbai, India)
The original St. Michael's Church is believed to have been built in 1534 by António do Porto, a church builder of the Franciscan Order. Back then, the Church also served as Franciscan convent and was based on the bank of river Mandave. It is described to be a "large and beautiful church ... with large veranda before the portal ..." Since then, St. Michael's was frequently rebuilt, retaining nothing but just original plan.[5]
When the Marathas conquered Salsette in 1739, Our Lady of the Mount chapel in Bandra was destroyed by the Portuguese at the instance of the British so that its location remained secret to the Marathas. In this time, St. Michael's Church was the refuge place for the image of the Blessed Virgin from the chapel. The image remained in St. Michael's till 1761, when it was moved to its present structure in Bandra.[2]
In 1853, St. Michael's Church witnessed a struggle between Bishop Anastasius Hartmann and the padroado order. St. Michael's was in control of the vicars apostolic for nearly 60 years. In 1853, a discontented group decided that the control be handed over to the padroado party. To prevent this, Hartmann as the vicars's leader, went to the church and declared that "he would rather die a martyr than surrender the church to the schismatics". Hartmann and his followers stayed in the church with enough food and water for 15 days. Hartmann's opponents had laid "siege" to the church in this period, blocking all entrances. On the 15th day, civil authorities intervened and insisted that the church be reopened. Following this, Hartmann lost control of the church, passing it to padroado order.[6]
In his 1917 book, Sheppard remarks that St. Michael's was situated on the Portuguese Church Street and is one of the four "only known Portuguese buildings; and of these no distinguishing original feature survives, as they were much rebuilt".[7] The present structure of St. Michaels was rebuilt in 1973.[8]
Reported "Bleeding" Christ picture[edit]
Part of a series on the
History of Mumbai
Gateway of India.jpg
Pre-historic period
Ancient period
Silhara dynasty
King Bhimdev
Islamic period
Gujarat Sultanate
Haji Ali Mosque
Treaty of Bassein
Portuguese period
St. Michael's Church
Garcia de Orta
Bombay Castle
Battle of Swally
British period
Hornby Vellard
Treaty of Salbai
Plague epidemic of 1890s
Rowlatt Satyagraha
Royal Indian Navy Mutiny
Independent India
Samyukta Maharashtra movement
Bombay Riots
1993 bombings
2005 Floods
2006 train bombings
2008 terrorist attacks
On 27 June, 2008, thousands of devotees visited St. Michael's to see the picture of Jesus called "the Divine Mercy". The picture showed some red spots which were believed to be blood near the heart of Jesus. The spots were noticed on the day at 8.30 pm on the occasion of the feast of Our Lady of Perpetual Help and were termed as a "miracle" by devotees. Not only Chiristians, but also Hindus and Muslims from Maharashtra and the neighbouring states of Goa, Karnataka and Gujarat, visited the Church to catch a glimpse of the picture. The queue to St. Michael's extended more than a kilometre.[9][10][11]
Parish Priest Father Raphael and Father Doneth D'Souza from the St. Michael's church as well as Archbishop cardinal Oswald Gracias declined the miracle claim. Fr. D'Souza explained "It's not a blood stain and it's also not a miracle. Every image of Divine Mercy has a red halo around the heart and in this case, the red colour has run because of the moisture in the air. It will look like a blood stain, but it's not." [9][10][11]
The image was removed and sent to a scientific analysis on the orders of Oswald Gracias. The result of that study was released in the September archdiocesan weekly and it said that the tests “established that there are no traces of blood in the red rays emanating from the Heart of Jesus in this image of Divine Mercy". Monsoon humidity and changes in the air quality were the suspected causes, Oswald Gracias did not explain the exact reasons.[12]
See also[edit]
1. ^ a b "Mary in the Secular Press". Mary Page News. University of Dayton. 26 January 2001.
2. ^ a b Parvate, T. V. "Greater Bombay District". Maharashtra State Gazetteer. Retrieved 24 December 2008.
3. ^ Guha, Tresha (17 January 2008). "Say a little prayer". DownTown Plus. The Times of India. Retrieved 24 December 2007.
4. ^ "The Perpetual Novena of Our Lady of Perpetual Help". Retrieved 24 December 2008.
5. ^ Burnell, John (2007). Bombay in the Days of Queen Anne - Being an Account of the Settlement. Read Books. p. 70. ISBN 1-4067-5547-8.
6. ^ Neill, Stephen (2002). A History of Christianity in India. Cambridge University Press. pp. 290–1. ISBN 0-521-89332-1.
7. ^ Sheppard, Samuel T. (1917). Bombay Place-Names and Street-Names: An Excursion into the by-ways of the history of Bombay City. Bombay: The Times Press.
8. ^ "St Michael's Church Mumbai". Hotels in Mumbai. Retrieved 24 December 2008.
9. ^ a b "Devotees flock to Mahim church to see 'bleeding' Jesus". CNN-IBN. 28 June 2008. Retrieved 24 December 2008.
10. ^ a b Singh, Varun (30 June 2008). "Bleeding Jesus is not a miracle: church". MiD DAY. Retrieved 24 December 2008.
11. ^ a b Henderson, Barney (29 June 2008). "Jesus ‘bleeds’ in Mumbai church". Hindustan Times. Retrieved 24 December 2008.
12. ^ No blood in bleeding Jesus’ picture: Study September 3, 2008 Indian Catholic
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/50949 | U Got What I Need
From Wikipedia, the free encyclopedia
Jump to: navigation, search
"U Got What I Need"
Single by LeToya
from the album LeToya
Released October 20, 2004
Format 12" single, CD single
Recorded 2004
Genre R&B, hip hop
Length 4:30 Single version
Label Capitol
Writer(s) Teddy Bishop, LeToya, Dave Young
Producer(s) Just Blaze
LeToya singles chronology
"U Got What I Need"
"All Eyes on Me"
"U Got What I Need" is a 2004 song by the American R&B singer LeToya. It was originally released as a promo single in 2004 and a new version was included on her 2006 album, LeToya.
The 2004 version has an introduction that samples Love Unlimited's "Walking in the Rain (With the One I Love)". The album version has a different introduction without the samples. |
global_01_local_0_shard_00000017_processed.jsonl/50950 | Yair Lapid
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Yair Lapid
Yair Lapid - portrait.jpg
Date of birth (1963-11-05) 5 November 1963 (age 50)
Place of birth Tel Aviv, Israel
Knessets 19
Party represented in Knesset
2013– Yesh Atid
Ministerial roles
2013– Minister of Finance
Yair Lapid (Hebrew: יָאִיר לַפִּיד, born 5 November 1963) is the Israeli Minister of Finance and chairman of the Yesh Atid Party. Prior to his entry into politics in 2012, he was a journalist, author, TV presenter and news anchor.[1] The Yesh Atid Party, which he founded, became the second largest party in the Knesset by winning 19 seats in its first election in 2013. The greater than anticipated results contributed to Lapid's reputation as a leading moderate.
In March 2013, following his coalition agreement with Likud, Lapid was appointed as the Israeli Minister of Finance. In May 2013, Lapid ranked first on the list of the "Most Influential Jews in the World" by The Jerusalem Post.[2] In September 2013, he was ranked number 1 on the "The World's 50 Most Influential Jews" list conducted by the Jerusalem Post.[3]
Yair Lapid, born in Tel Aviv, is the son of journalist and politician Yosef "Tommy" Lapid and author Shulamit (Giladi) Lapid.[4][5] He has a sister, Merav, who is a clinical psychologist. Another sister, Michal, died in a car accident in 1984.[6]
He is married to journalist Lihi Lapid[7] and lives in the Tel Aviv neighborhood of Ramat Aviv.[8] He and his wife have three children.[9]
As a teenager, Lapid struggled with learning disabilities, and dropped out of high school. He never earned a bagrut (high school matriculation certificate). In January 2012, controversy arose after Lapid was admitted by Bar-Ilan University into a doctorate program, studying towards a PhD in hermeneutics. This was in violation of rules stating that all doctoral candidates must hold a BA. Lapid was admitted to the university based on his extra-academic credentials and career in journalism and writing.
After the Knesset Education Committee launched an investigation, the Council for Higher Education cancelled the program under which Lapid was admitted. It allows students without a BA to study towards a doctorate.[10][11]
Journalism and media career[edit]
Yair Lapid in Jacob Goldwasser's 1991 film Beyond the Sea
Lapid started his journalism career while in the Army, as a military correspondent for the IDF's weekly magazine, Ba-Mahaneh (In the Camp").[12] He also wrote for the mainstream daily Maariv.
In 1988 at the age of 25, he was appointed editor of the Tel Aviv local newspaper published by the Yedioth Ahronoth group. In 1991, he began writing a weekly column in a nationwide newspaper's weekend supplement, at first for Maariv and later for its competitor, Yedioth Ahronoth. His column, called "Where's the Money?", became his slogan in seeking political office.[9]
In 1994, Lapid started on TV, hosting the leading Friday evening talk show on Israel TV's Channel 1. That same year, he had an acting role in an Israeli film, Song of The Siren. He next hosted a talk show on TV's Channel 3. From 1999-2012 Lapid hosted a talk show on Channel 2.
From 1989 to 2010, Lapid wrote and published several books, spanning a variety of genres: his first was a thriller, of which he has published three more; other writing includes two children's books, two novels, and a collection of his newspaper columns. In addition, he wrote a drama series, War Room, which was aired on Channel 2 in 2004.
His journalism work and TV hosting gave him widespread recognition, and he has commanded respect. In 2005, Lapid was voted the 36th-greatest Israeli of all time in a poll by the Israeli news website Ynet.[13]
In January 2008, Lapid was the host of Ulpan Shishi (Friday Studio), the Friday night news-magazine of Channel 2. That year, his first play, The Right Age for Love, was performed by the Cameri Theater.
Lapid has amassed wealth in his career. In September 2013, the Israeli edition of Forbes magazine estimated his net worth at 22 million shekels,[14]
Political career[edit]
On 8 January 2012 Lapid announced that he would be leaving journalism in order to enter politics.[15] On 30 April 2012 Lapid formally registered his party, "Yesh Atid" (Hebrew: יש עתיד, lit. "There's a Future").[16] The move was aimed to coincide with the general expectation in Israel for early elections to be held in the early fall of 2012.
Lapid was named Israel's finance minister on 15 March 2013.[18] Only nine months later, a survey was published showing a continuing trend of decreasing popularity with 75% of those polled claiming to be disappointed by his performance and his party would only achieve 10 seats in the Knesset as opposed to the 19 party members who were elected at the beginning of the year.[19]
Views on the Israeli-Palestinian conflict[edit]
Lapid said that he will demand a resumption of negotiations between Israel and the Palestinian Authority.[20] His party's platform calls for an outline of "two states for two peoples", while maintaining the large Israeli settlement blocks and ensuring the safety of Israel.[21] In January 2013, just days before the election, Lapid said he won't join a cabinet that stalls peace talks with the Palestinian Authority, and added that the idea of a single country for both Israelis and Palestinians without a peace agreement would endanger the Jewish character of Israel. He said, "We're not looking for a happy marriage with the Palestinians, but for a divorce agreement we can live with." [22] As part of a future peace agreement, Lapid said that the Palestinians would have to recognize that the large West Bank settlement blocs of Ariel, Gush Etzion and Ma'aleh Adumim would remain within the State of Israel.[23] According to Lapid, only granting Palestinians their own state could end the conflict and Jews and Arabs should live apart in two states, while Jerusalem should remain undivided under Israeli rule.[24][25]
Regarding the diplomatic stalemate in the Israeli-Palestinian peace process, Lapid said that "Most of the blame belongs to the Palestinian side, and I am not sure that they as a people are ready to make peace with us."[26] He has, however, dismissed as unrealistic the possibility of a comprehensive peace deal with the Palestinians.[27]
In a May 19, 2013 interview with New York Times correspondent Jodi Rudoren,[28] Lapid said that:
1. ".. Israel should not change its policy on Israeli settlements in the West Bank in order to revive the stalemated peace process"
2. "..Jerusalem should not serve as the capital of a future Palestinian state"
3. "..he would not stop the so-called “natural expansion” of settlements in the West Bank, nor curtail the financial incentives offered Israelis to move there"
4. "..the large swaths of land known as East Jerusalem that Israel captured from Jordan in the 1967 war and later annexed must stay Israeli because “we didn’t come here for nothing.”"
The Israeli Haredim[edit]
During the election campaign, Lapid spoke of "equal share of the burden" for all Israeli citizens. He said, he would work to see it that all Israeli citizens, including the thousands of haredim who had up until that point been exempt from most civil service be included in military and civil service.[29][30] On May 27, 2013, Lapid threatened to topple the government unless ultra-Orthodox would be subject to criminal sanctions for draft-dodging. In the view of some Haredim, Lapid's plan represents a "spiritual holocaust" as they believe that their Jewish studies are what upholds Israel. Some Haredim have declared that even at the risk of being called criminals they will continue in their Jewish studies and refuse to enlist or perform civilian service.[31][32] Lapid denies that he is seeking to destroy the Haredi way of life, and stated "Not one of us wishes, heaven forfend, to force hiloniyut (secularism) on you or to impose our version of Israeli identity. This state was established so that Jews could be Jews, and live as Jews, without having to fear anyone.”[33]
Published works[edit]
• The Double Head: thriller (1989)
• Yoav's Shadow: children's book (1992)
• One-Man Play: novel (1993)
• Elbi – A Knight's Story: children's book (1998)
• The Sixth Riddle: thriller (2001)
• The Second Woman: thriller (2006)
• Sunset in Moscow: thriller (2007)
• Memories After My Death: novel (2010)
1. ^ http://www.csmonitor.com/World/Middle-East/2012/0503/New-kind-of-Israeli-politician-Yair-Lapid-doesn-t-talk-about-Iran-Palestinians/%28page%29/2
2. ^ a b JERUSALEM POST STAFF (May 4, 2013). "Top 50 most influential Jews 2013: Places 1-10". Jerusalem Post. Retrieved 5 August 2013.
3. ^ "50 most influential Jew... JPost - Jewish World - Jewish Features". Jpost.com. May 14, 2013. Retrieved September 22, 2013.
4. ^ In entering Israeli politics, Yair Lapid eyes force of socioeconomic protests
5. ^ http://jwa.org/encyclopedia/article/lapid-shulamit
6. ^ "Who is Yair Lapid?", Haaretz
7. ^ Labor targets undecided female voters via kids
8. ^ Is there a future for Yair Lapid?, Jerusalem Post
9. ^ a b "Charismatic Leader Helps Israel Turn Toward the Center", New York Times, 23 January 2013
10. ^ "No BA means no PhD for Yair Lapid", Times of Israel
11. ^ "Knesset Committee to probe Lapid doctorate affair", Jerusalem Post
12. ^ Popular Israeli anchorman quits TV, joins politics, CNS News
14. ^ Galit Edot (September 5, 2013). "Israel's wealthiest politicians". Forbes. Retrieved 6 October 2013.
15. ^ "Veteran Israeli anchor Yair Lapid leaves Channel 2 to enter politics". Haaretz. January 8, 2012. Retrieved January 8, 2012.
16. ^ "Lapid registers new party, 'Yesh Atid'". Jerusalem Post. April 29, 2012. Retrieved April 29, 2012.
17. ^ "19th Knesset to see Right, Left virtually tied". ynet. January 22, 2013. Retrieved January 22, 2013.
21. ^ "Yesh Atid" national agenda – Hebrew (English version needed)
22. ^ [1] The Times of Israel, October 8, 2013 by Orli Santo
24. ^ Israel’s rising star. The Economist
25. ^ Yair Lapid Calls for Return to Peace Talks. Reuters. October 30, 2012
27. ^ http://www.economist.com/news/middle-east-and-africa/21578722-businessmen-try-making-peace-through-economic-co-operation-boosting-west-banks Israel and Palestine: Boosting the West Bank’s economy
28. ^ <http://www.nytimes.com/2013/05/20/world/middleeast/fresh-israeli-face-plays-down-political-decline.html?pagewanted=all&_r=0>
29. ^ http://www.ynetnews.com/articles/0,7340,L-4336131,00.html
30. ^ http://www.al-monitor.com/pulse/originals/2013/02/what-is-really-behind-the-share-the-burden-equally-crisis.html
31. ^ [2]
32. ^ Lapid praises bill that would criminalize Haredi draft-dodging
33. ^ Video: Lapid to Haredim: “We Need You”
External links[edit]
Party political offices
Preceded by
Leader of Yesh Atid
Cabinet Post (1)
Predecessor Office Successor
Yuval Steinitz Ministry of Finance |
global_01_local_0_shard_00000017_processed.jsonl/50952 | Take the 2-minute tour ×
I was pulling my socks up this morning, in the literal sense of the term, when I started to wonder about why pull your socks up came to mean what it does:-
to make an effort to improve your work or behaviour because it is not good enough: He's going to have to pull his socks up if he wants to stay in the team.
I searched around for the origin of the phase and turned up some not very convincing answers here (pulling your socks up to make yourself look tidier) and here (military slang, a traditional fallback for folk etymology). Neither of them have any sources cited.
So does anyone know why we came to use pull your socks up for this meaning?
share|improve this question
Sources (although I can't verify them) are quoted at phrases.org.uk/bulletin_board/20/messages/165.html – Andrew Leach Sep 19 '12 at 12:09
I don't know why the first idea isn't convincing you. This was the first thing that came to my mind when I read the definition of this phrase. – Em1 Sep 19 '12 at 12:12
@Em1, perhaps it is, and I'm over-complicating matters. – Brian Hooper Sep 19 '12 at 12:19
add comment
2 Answers
up vote 6 down vote accepted
Partridge (2002) gives a definition and suggests a year but no explanation:
pull one's socks up. Often as imperative, pull your socks up!, or 'I do wish he'd pull his...': to take heard, to try harder: since ca. 1910. Var. pull up (one's) socks.
The OED collects a number of slang and colloquial phrases that use sock. In one's socks is a measure of a person's stature; to knock the socks off is to trounce another; to pull up one's socks is to make an effort.
No etymology is given for the phrase but their first three quotations are:
1893 H. F. McLelland Jack & Beanstalk Pull up your socks! I'll see naught goes wrong with you.
1906 Daily Mail The ‘smart set’ have got hold of another neat expression. ‘You must pull your socks up’ is the latest form of saying ‘Never mind’, or ‘Pull yourself together’.
1914 ‘Bartimeus’ Naval Occasions, and Some Traits of the Sailor-man Pull your socks up, Ah Chee, an' think of something.
More examples
It also appears in Sir Arthur Conan Doyle's The Stark Munro Letters (1895):
She got as far as the hall door, and then came rustling back again into the consulting room. "Take a drink of your own beer!" she cried, and vanished.
It sounded like some sort of slang imprecation. If she had said "Oh, pull up your socks!" I should have been less surprised.
Here's an example from Oliver Osborne's In the Land of the Boers (first published 1893, this revision 1900) (read online):
Throughout the wet months we had stuck religiously to the hills, leaving the valleys to fools and fever.
Poor old Harry the Reefer's claims, turned out valueless, and it behoved us to be " pulling our socks up," as the Scots say.
A when and where but not why can be found in the January 20th, 1900 edition of Notes and Queries (read online) amongst other sock phrases:
"To give one socks," meaning " to give one a good beating," is in common use in East Anglia. And so is "Pull up your socks," for "make haste" and "set to work." F. H. Marlesford.
The March 7th, 1906 Punch magazine (read online) contains the same text as the OED's Daily Mail 1906 citation. Here's a fuller quotation from Punch:
THE "Smart Set" (says a contemporary) has got hold of another neat expression. " You must pull your socks up " is the latest form of saying "Never mind," or "Pull yourself together." The other day at a Bridge dinner, it was amusing (to our contemporary) and a sign of the times to hear a certain youthful eldest son recommend a Dowager Countess of seventy to "pull her socks up."
The phrase is, perhaps, not much more than twenty years old, and so affords fresh evidence of the up-to-date-ness of the Smart Set. Other instances follow.
And, after reporting another Smart Set phrase had been heard in the East End:
This is interesting, as showing how quickly a new witticism will run through all classes of Society, like measles through an infant school. It goes without saying that, as soon as any such phrase penetrates to the lower orders, it is at once discarded by the Smart Set.
share|improve this answer
I think "give one socks" and "pull up your socks" likely have totally different origins. "Sock" is a verb meaning hit or punch, like "I socked him in the face." Thus "sock" as a noun can mean a punch: "I gave him a good sock in the face." I doubt this as any etymological connection with footwear. But "knock his socks off" surely does reference footwear, as in, "hit him so hard that he goes flying and leaves his socks behind". – Jay Sep 19 '12 at 14:28
@Jay: I agree. F. H. Marlesford in Notes and Queries wasn't saying they are connected, just that both are common in East Anglia. By the way, if you check that N&Q, nearly all the other correspondents give throw or beat meanings to the verb sock, and the editor notes it is "common slang, and used, we should say, everywhere". – Hugo Sep 19 '12 at 14:41
add comment
In support of the military explanation for the phrase, consider the image of a 16th century English soldier from this source
english soldier
share|improve this answer
Do you have anything more to back this up? The military 'explanation' linked in the answer is: "Pull your socks up most likey comes from nautical/military slang meaning "wake up!" (which would involve the pulling up of socks)." The soldier in this picture is wearing something that looks like socks, but he's already awake. Did these soldiers even call those leg coverings socks? (Also, the source says it's a soldier of the early 1600s, not the 16th century.) – Hugo Sep 19 '12 at 14:55
@Hugo There are several military references in some of the other answers. I have no additional proof of the origin. I am not suggesting that the phrase comes from either the 1600s or the 16th century, only that this illustration reflects a stockinged soldier whose muster appearance would benefit from the admonition. Many images of early 20th century and late 19th century soldiers show high socks or similar leg wrappings. See – bib Sep 19 '12 at 15:01
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/50954 | IUCN threat status:
Not evaluated
Brief Summary
Read full entry
Why call a purple orchid green-winged? If you look closely at the blossoms, you will see that the side petals ('the wings') have green stripes. This orchid is also known as the green-veined orchid. The green-winged orchid grows mostly in damp, calcium-rich, scanty hay fields and is legally protected. The flower stalk consists of 5-25 loosely grouped helmet-shaped flowers. It often grows together with yellow-rattle. The unusual association of green-winged orchid and yellow-rattle is probably not found outside of the Netherlands.
© Copyright Ecomare
Source: Ecomare |
global_01_local_0_shard_00000017_processed.jsonl/50956 | [erlang-questions] project idea: p2p for large oss mirrors
jm <>
Tue Aug 12 04:22:52 CEST 2008
Over the last week I've been attempting to create a large mirror of some
of the open source projects out there including debian and ubuntu. This
is quite large well over 200GB. So far it's taken me most of a week to
do using rsync and it's given me sometime to think about the way this is
being done. It strikes me as strange that for large mirrors http, ftp,
and rsync with pull scripts which poll on a regular basis still seem to
be "best practice" with p2p and other technologies now being available.
Here's my rough take on a better way to maintain a large mirror.
1. The primary mirror publishes a public key for mirrors on their web site.
2. You down load the primary mirrors public key and configure what your
interested in mirroring.
3. The primary mirror then publishes update notices detailing the new
snapshot with a serial number (which could be a date timestamp) along
with other metadata which is signed. This could be published via rss or
directly into the p2p system.
4. Your mirror verifies this published notice, and assuming it's valid,
5. Though the p2p system downloads the differences updating the mirror
in a shadow directory
6. It "flicks the switch" when the mirror reflects the desired state to
make the update public for ftp/http/etc usage.
7. Optionally publishes an updated status notice (signed of course) so
that the primary and other mirror sites can maintain a list of mirror
sites and their status on their own websites.
Thought this might make an interesting project for someone looking for a
project to do in Erlang but was stuck for ideas on what to do.
More information about the erlang-questions mailing list |
global_01_local_0_shard_00000017_processed.jsonl/50968 | The Hidden Costs of Owning a Pet - Pet News - Explorer
back Side Panel
The Hidden Costs of Owning a Pet
America is a nation of pet lovers. About half the nation’s households include a dog or a cat, and they spend $53 billion yearly on pet expenses, ranging from food to vet bills to toys.
Some go a bit overboard. A whopping $370 million is spent on pet costumes yearly. But even more shocking is the toll our animals take on our electronics budget. American pets have bitten, chewed, licked, and otherwise damaged over eight million electronic devices, amounting to over $3 billion in repair and replacement costs.
Considering that one of every three devices damaged by pets is a smartphone, this could mean up to $800 in replacement costs whenever your animal runs amok.
The risk of pet-related accidents increases the more pets are treated as family members. According to new research from SquareTrade, if you drive with your pet in your lap, you’re over twice as likely to damage your device. And letting a pet sleep in bed with you triples your chances.
Meanwhile, giving your pet too much independence can also increase risk. Two-thirds of pet-related accidents involving devices happened while the pet was unsupervised.
Accidental Personalities
Every furry friend comes with its own unique personality, and unique set of dangers.
For example, the SquareTrade study found that 21 percent of accidents happened while the owner was using the device.
A temperamental personality can also be a red flag. Seventeen percent of pet owners believe their animal friend damaged their device because it was angry with them.
And homes with different pet species are more susceptible to mishaps. Those with both a cat and dog are four times more likely to have accidents with electronics compared to homes with one or the other.
Fido Protection
Despite the growing popularity of pet insurance, many owners don’t realize this kind of insurance doesn’t cover damage caused by their pets. In fact, three out of four devices damaged were not covered by any kind of warranty.
While there’s no sure way to prevent pet-related accidents, consumers can protect themselves by getting a protection plan. For example, SquareTrade Protection Plans cover against accidents, like a device getting batted off the kitchen counter, falling in a water bowl or finding its way into the wrong paws. They also cover mechanical and electrical issues, like antennae and Wi-Fi failure, a broken dock connector, or touch-screen failure.
And these plans are hassle-free. If your device breaks, SquareTrade sends a replacement within two to five days. All you have to do is mail your broken device back, free. If it is an Apple product, SquareTrade even lets you take it to the Apple Genius Bar to get fixed instead. And if your pet strikes more than once, you’re covered: up to four repairs or replacements per plan.
More information is available at, by visiting sites like Amazon and eBay, or in such stores as Costco and Sam’s Club.
Pets all need exercise, training and attention from their owners. But they sometimes find inconvenient ways to show us. |
global_01_local_0_shard_00000017_processed.jsonl/50971 | Category:Features with incomplete test plans
From FedoraProject
Revision as of 03:26, 26 February 2009 by Laubersm (Talk | contribs)
Jump to: navigation, search
This is a category for features whose "How To Test" section does not meet QA standards.
Here's a simple summary of requirements for the "How To Test" section. This information is included in the page Features/EmptyTemplate.
4. What are the expected results of those actions?
Pages in category "Features with incomplete test plans"
This category contains only the following page. |
global_01_local_0_shard_00000017_processed.jsonl/50977 | An Aramark chef and a staff of 12 prepared and sent almost 6,000 meals to the Chilean miners famously trapped almost a half-mile underground before their recent rescue, reports the New York Times. Food was one of the most critical issues facing the 33 miners who were discovered alive on August 22 in the collapsed mine near Copiapo. After an initial contract between the Chilean government and a local foodservice provider proved unsatisfactory, the Ministry of Health contacted Aramark, which ...
Register to view this Article
Why Register for FREE?
Already registered? here. |
global_01_local_0_shard_00000017_processed.jsonl/50990 | Naruto Shippuden
Naruto Discussion Forum
Go Back Naruto Discussion Forum > Ninja Training Grounds > Other Games > Japan World Cup 3
Other Games For any game not otherwise listed.
Thread: Japan World Cup 3 Send Page to a Friend
Your Username: Click here to log in
Random Question
Recipient Name:
Recipient Email Address:
Email Subject:
Powered by vBulletin® Version 3.8.2
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd. |
global_01_local_0_shard_00000017_processed.jsonl/50992 | AnimeSuki Forums
Go Back AnimeSuki Forum > Members List
Seki_yamata Seki_yamata is offline
Visitor Messages
Showing Visitor Messages 1 to 10 of 11
1. Seki_yamata
2008-09-28 12:09
aaah! my myspace is
So if anyone has one, feel free to add me!
2. Papaya
2008-07-13 04:14
You'd really be surprised at how the dynamics of a relationship can change once you meet someone in real life.
My girlfriend and I met in real life, but proceeded to talk to each other largely via phone and email, since we go to different schools. That was 3 and a half years ago, and even though we still go to different universities, I drive to see her once every two weeks or so.
Anyways, I'm sure you've heard this a million times before, but you're still young, and you've got a good bit of life ahead. We all think we know the best for ourselves at this age, but the fact is, we don't, and you'll probably never understand that until you've made all the requisite mistakes to be made.
3. L Lawliet 2
2008-07-09 21:51
L Lawliet 2
^^ But doesn't it seem that all the major characters die?
4. L Lawliet 2
2008-07-09 21:41
L Lawliet 2
I missed the end of the series. And it's okay. I'll go on. I'm strong like that. ^^
5. L Lawliet 2
2008-07-09 20:57
L Lawliet 2
Spike died?! I didn't know that!
6. Nemu
2008-07-09 19:37
I hope so too, thank again. ^^ I see you like the anime Chobits, is Chii your favorite character? =P
7. Nemu
2008-07-09 19:23
Nothing much is up, just hoping I'll be able to go on vacation this summer! =P You?
8. Nemu
2008-07-09 19:18
Hi! =D Thanks for the comment! ^^
9. The Chaos
2008-07-09 18:57
The Chaos
10. L Lawliet 2
2008-07-09 18:07
L Lawliet 2
Same here. I was like: My favorite characters keep dying!!!! This is not how it's supposed to be!
About Me
• About Seki_yamata
well my real name isant that important. ill tell you when i know you. i tend to be a tad bit bleak.
utretch netherlands. (lies) ;)
talking to my shawn. and watching anime. and drawing anime.!!! ...and going to convintions.
being myself. and making ppl happy. =D
Currently Watching
lovely complex, lucky star, host club, Evangelion, FLCL, Negima, Hare & guu, Black cat, Tenchi Myo, Ninja Nonsence, boogie pop phantom, Fumofuu, samurai champloo, full meatal alchamist, blood +, chobits, dear S, claymore...
• Signature
<3 j'amour lui pour jamais et de plus
Total Posts
Visitor Messages
General Information
• Last Activity: 2008-09-28 12:13
• Join Date: 2008-07-08
Showing Friends 1 to 2 of 2
Powered by vBulletin® Version 3.8.6
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
We use Silk. |
global_01_local_0_shard_00000017_processed.jsonl/50993 | AnimeSuki Forums
Go Back AnimeSuki Forum > Anime Discussion > Older Series > Retired > Spice and Wolf
View Poll Results: Spice and Wolf - Episode 7 Rating
Perfect 10 20 38.46%
9 out of 10 : Excellent 14 26.92%
8 out of 10 : Very Good 11 21.15%
7 out of 10 : Good 5 9.62%
6 out of 10 : Average 1 1.92%
5 out of 10 : Below Average 0 0%
4 out of 10 : Poor 0 0%
3 out of 10 : Bad 0 0%
2 out of 10 : Very Bad 0 0%
1 out of 10 : Painful 1 1.92%
Voters: 52. You may not vote on this poll
Closed Thread
Thread Tools
Old 2008-06-04, 23:20 Link #21
Lets be reality
Join Date: May 2007
Originally Posted by Dann of Thursday View Post
If there were to be a sequel, which I can't imagine there wouldn't, would it possibly cover the next two volumes like this first one?
Guess it depends on the episode count of the second season, 6 episodes seems to be a good fit per light novel. 13 with a standalone episode like this for novels 3-4 or 24 episodes for novels 3-6 seems about right.
Anyway I'm more concerned about getting that sequel announcement first, after that lets worry about episode counts than! I wonder what IMAGIN are doing this fall... probably helping Madhouse out with something like they are this season with Kamen no Maid Guy... and more hentai as HIMAGIN I bet..
Westlo is offline
Old 2008-06-05, 12:15 Link #22
Dann of Thursday
Join Date: Dec 2007
Location: Illinois, U.S.A.
Age: 23
There would be one though, right? I can't imagine they would not have another season since this show seems to be doing so well.
Dann of Thursday is offline
Old 2008-06-05, 17:30 Link #23
Lets be reality
Join Date: May 2007
Well unless IMAGIN or the author don't want to do one I don't see why they wouldn't after the sales it's had. And if IMAGIN didn't want to do a sequel a different studio could do it anyway.. but I don't see why they wouldn't do it... it's like their highest selling anime easily..
Westlo is offline
Old 2008-06-06, 00:35 Link #24
Delphinus Pilot
Join Date: Jun 2008
I haven't read the whole thread, nor have I done much research on it, but what was the point in really releasing this episode now? Like, I don't see why it couldn't have aired during the rest of the showings in the first place. Nothing really different happened really in this ep...
Raytheon117 is offline
Old 2008-06-06, 02:31 Link #25
The color of a Hero
Join Date: Mar 2008
Maybe the wanted to raise dvd sales by putting an extra episode only on dvd, maybe they could only get space on the air for the 12 episodes, there might be other possibilities too that I can't think of.
Xacual is offline
Old 2008-06-06, 04:31 Link #26
it's friday
Join Date: Jun 2006
Location: Purgatory
Age: 24
Send a message via MSN to be0wulf
All that talk about eating and tasting each other at the end really made me smile. Naughty Horo!
be0wulf is offline
Old 2008-06-06, 07:39 Link #27
pita ten pyjama!
Join Date: Jun 2006
Location: Netherlands
i watched seven after six since i just watched the show.
It does make sense watching it after six, so i'm glad i only started to watch and finish this show yesterday.
I didn't know the show had it's own section, pretty good for such a laidback series
on a sidenote i really like the voice of horo. She sounds like how a wolf god would sound
Is there a season 2 in the making? and enough material to base it on?
sth with tree logs and romance
outcast_within is offline
Old 2008-06-06, 11:37 Link #28
Join Date: Dec 2006
Originally Posted by outcast_within View Post
No, there isn't. Yes, there is enough.
serenade_beta is offline
Old 2008-06-09, 22:40 Link #29
Join Date: Feb 2007
Location: Upstate, SC
Send a message via Yahoo to Lonestar9
Originally Posted by Masanori Ota View Post
If you want to encourage a second season of Wolf and Spice/Spice and Wolf I recommend importing the R2 DVDs. It's a bit expensive, but there's no better way to say "I want more of this" than to keep Horo at the top of the sales charts (she's doing pretty well, actually).
Cute episode.
Wow..I really like this show, and would have no problems buying an R1 DVD, but there's no way in heck I'm going to pay the price to import anything in R2, especially an expensive DVD, in a foreign language, with so few episodes per DVD. Anime is expensive enough without going thru imports, this all of course is IMHO..
Lonestar9 is offline
Old 2008-06-10, 01:02 Link #30
Masanori Ota
It's Horo, not Han Solo.
Join Date: Jun 2006
Meh, It only cost my around $90 including shipping to buy Book 8, DVD 3, and issue 1 of Dengeki Bunko Magazine (non-Prologue) from Not that much. But then again, I have two jobs, still go to college, and still sleep under my father's roof.
Masanori Ota is offline
Old 2008-06-11, 12:22 Link #31
Join Date: Jan 2008
Great episode, and it epitomizes what this series is for me. I can't really verbalize why I like this show, but its definitely a favorite, and this ep was packed full of that. Lets all make burnt offerings for a second season!
Voduar is offline
Old 2008-06-11, 17:03 Link #32
~ You're dead ^__^* ~
*Graphic Designer
Join Date: Apr 2006
Location: uk, England
Age: 23
Send a message via MSN to Deathkillz
Ahh, watching this made me realise again how much I miss this series
Horo seemed a lot cuter in this episode too, and I found her lost of appetite for the apples to be pretty amusing. Never in my days would I guess that Horo might actually be sick of them (for one day ).
And she drives a hard bargin...nasty feminine charms
Deathkillz is offline
Old 2008-07-26, 13:05 Link #33
Junior Member
Join Date: Jul 2008
Spice and Wolf 7
Where do you go to watch Episode 7?
Keaton_101 is offline
Old 2008-07-26, 13:14 Link #34
Junior Member
Join Date: Jul 2008
Spice and Wolf
Why do they have to torture us all like this! Apparently the anime is a huge hit if people are begging for a second season! I myself loves this anime.
Keaton_101 is offline
Old 2008-07-29, 01:50 Link #35
Obey the Darkly Cute ...
Join Date: Dec 2005
Age: 56
Unfortunately, AS received a legal request from Kadokawa Pictures USA to remove all torrent listings for this series, so its not listed.
Fortunately, it doesn't take any rocket science to find torrent lists elsewhere on the Internet. We're not allowed to help due to AS rules (and it violates the rules to ask for help here) so think of it as an adventure
General stance:
I don't mind such legal requests from anime distributors and creators as long as they intend on distributing Region 1 versions of the series so I can buy subtitled releases. I'd buy Region 2 if they subtitled them but they don't. The fact that Kadokawa Pictures USA is looking out for Spice & Wolf is promising -- hopefully it means they think they can sell the title to a Region 1 distributor.
Last edited by Vexx; 2008-07-30 at 20:46.
Vexx is offline
Old 2008-08-16, 15:40 Link #36
Senior Member
Join Date: Oct 2006
Location: USA
This is so frustrating, there are no English subs for this anywhere!
typhonsentra is offline
Old 2008-08-16, 16:12 Link #37
Can't think of a title^_^
Join Date: Jun 2008
Location: Lithuania
Age: 26
since discussions of fansubs are not welcome in the open, check your personal messages..
salv87 is offline
Old 2008-08-24, 06:10 Link #38
Former B-T Translator
Join Date: Mar 2008
Location: Taipei, Taiwan
Age: 27
salv, how about sending another personal message to me....
Gah, it sucks to be behind (I'm also stuck with a raw copy. I seriously need to take up Japanese ASAP xD)...
judgment26 is offline
Old 2008-08-24, 06:42 Link #39
Can't think of a title^_^
Join Date: Jun 2008
Location: Lithuania
Age: 26
Done ^_^
If you'll have questions, feel free to ask ^_^
salv87 is offline
Old 2008-08-25, 12:57 Link #40
Can't think of a title^_^
Join Date: Jun 2008
Location: Lithuania
Age: 26
Since there were issues where PMs (Personal Messages) didn't reach their recepients, I'll ask here.. Judge, did you recieve the last message with info (nice way of putting it) on the ep 7 ??
salv87 is offline
Closed Thread
Thread Tools
Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump
Powered by vBulletin® Version 3.8.6
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
We use Silk. |
global_01_local_0_shard_00000017_processed.jsonl/50994 | AnimeSuki Forums
View Poll Results: Penguin Drum - Total Series Rating
Perfect 10 24 35.82%
9 out of 10 : Excellent 32 47.76%
8 out of 10 : Very Good 3 4.48%
7 out of 10 : Good 3 4.48%
6 out of 10 : Average 4 5.97%
5 out of 10 : Below Average 1 1.49%
4 out of 10 : Poor 0 0%
3 out of 10 : Bad 0 0%
2 out of 10 : Very Bad 0 0%
1 out of 10 : Painful 0 0%
Voters: 67. You may not vote on this poll
Closed Thread
Thread Tools
Old 2011-12-28, 18:39 Link #1
*AnimeSuki Site Staff
Join Date: Mar 2003
Age: 34
Penguin Drum - Overall Series Impressions & Total Series Rating
This thread is to be used for discussing the entire episodes of Penguin Drum ... your thoughts about the show, overall impressions, expectations and hopes about the DVD only footage etc.
A few subjects you might want to ramble on about:
• General impression of the series.
• Opinions on the overall story, writing & plot devices.
• Thoughts about the animation quality.
• Characters/Character Design
• Voice Acting
• What the show meant to you.
And so on.
Animation Quality: 1-10
Voice Actors: 1-10
Script: 1-10
Soundtrack: 1-10
Editing: 1-10
Enjoyment: 1-10
Emotional Involvement: 1-10
Average = Total Series Rating
Feel free to discuss and more importantly, have fun
NightWish is offline
Old 2011-12-29, 11:44 Link #2
Join Date: Feb 2011
for me it was:
Animation Quality: 8 (10 some backgrounds, 7 some derpy faces)
Voice Actors: 8
Script: 9
Soundtrack: 10
Editing: 9 (don't really know what this is about, isn't it similar to animation? or it's meant for the subs editing?)
Enjoyment: 9
Emotional Involvement: 8
Average / Total Series Rating = 8.71 (rounded to 9 in the poll)
zeando is offline
Old 2011-12-30, 03:05 Link #3
Osana-Najimi Shipper
Join Date: Dec 2005
Location: Mt. Ordeals
Rating: A+
While I don't care much about the heavy use of symbolism and implied references, this series is still, by FAR AND AWAY, my #1 anime of 2011.
Yes its YOU childhood friend - source of BERZERKER RAGE since forever
Childhood Friend couple STATISTICS(spoilers abound though)
DragoonKain3 is offline
Old 2011-12-30, 04:36 Link #4
Dead Master ★ BRS
Join Date: Nov 2006
Location: Australia
I will give the series 10/10. A+ or whatever the highest rating we have
MPD still a mile from perfect. However with a year of master pieces like Madoka, Usagi Drop, Haruhi Movie (more like 2010) MPD still can manage to top my #1 anime of 2011 spot, for its creativity, symbolism, strong themes, and hitting emotional notes. Have doubt against Madoka, but the final episode set my mind in stone.
risingstar3110 is offline
Old 2011-12-30, 19:49 Link #5
Join Date: Dec 2006
Mm... Too bothersome to go into detail, but in short...
It was an eccentric anime, and in that regard, it was interesting.
However, the tempo wasn't good (or rather, unstable) and it was hard to understand. And Momoka was too "godly" and Satou-kun needs to go back to Misaki-chan.
Yuri and Ishida's couple turned out to be pretty boring. One of them being some idiot trying to force kids to suffer for what their parents did was okay, but both of them the same character was just disappointing. Also, they never explained why Ishida could teleport.
Too many parents in this anime "insane" for the sake of... being insane.
Also, kid Kanba's voice needed a separate voice actor and Triple H's trio were a bit... too.
Animation was......... Actually not too great. Plenty of times when the art collapsed, noticeable.
serenade_beta is offline
Old 2011-12-31, 03:03 Link #6
Center Attraction
Join Date: Jan 2008
Location: Newfoundland, Canada
Age: 32
Send a message via AIM to Triple_R
I recently did a blog write-up on what I think are the 10 Best Anime Shows of 2011. MPD placed fourth on that, which is pretty good considering what a strong year of anime it's been.
Here's the key MPD-relevant excerpt from that blog:
Still, as much as I ended up loving Ringo, I eventually grew very tired of her futile pursuit of Tabuki during the first half of the anime. That didn’t resolve itself quite as quickly as I would have liked. Then there’s the trademark Ikuhara symbolism that cuts like a double-edged sword for me. Sometimes I find it fascinating and it makes everything seem deep and enriching, but other times I find it incomprehensible to the point of being a bit of a negative for me. Still, MPD was the most unique anime of the year, and boy, was it ever a lot of fun to watch.
9/10 for Penguin Drum. I'd really love to see Ikuhara try his hand at another anime after producing this one.
Triple_R is online now
Old 2012-01-17, 13:18 Link #7
Join Date: Jan 2012
Location: Vienna
I liked this anime, it had an interesting way of telling the story and it required the viewer to think. That in my eyes is the strongest plus of this show. I am tired of boring shows, that numb your mind. The secretive format required you to be continuously on the lookout for clues and even long after the episode is over you think about what happened and you discuss your theories with your friends. Whats better than that???
I do have to admit though that the show had a downhill tendency and it begun with the flashbacks...... in other words the second half of the anime. Until then the story was light hearted; the characters were goofing around, Ringos infatuation was both creepy and funny. The story didnt make much sense, but that wasnt so bad, because it was entertaining. In the second half the atmosphere suddenly turned serious, creepy and depressing. I think I can say without much exaggeration, that the mystery aspect of the first half was what carried this show, so the moment the explanatory second part started, it went downhill for me.
Despite this critisism from me, I believe it was one of the best shows of this season. It was refreshingly unique, original and entertaining. We definately need more shows like this one.
Final score: 8/10.
warita is offline
Old 2012-01-22, 18:44 Link #8
Kaioshin Sama
Join Date: May 2004
Location: Neither Here nor There
Age: 29
Send a message via MSN to Kaioshin Sama
Just finished this today and boy was it a battle to get to the end. While I appreciate the effort and the bizzare sensibilities that went into this show that made it so unconventional and while I even get the idea and core themes behind it for the most part I was never really able to get into it. It had it's moments, but for the most part it was just plain weird and the show ultimately felt like Ikuhara was more concerned with putting his eccentricities on display throughout such that the emotional weight that they were going for in this final stretch just isn't there for me. I just never really came to care for these characters (except maybe Himari to some extent) because all the circumstances surrounding them just came across as bizarre, surreal and at best amusing, but never truly gripping. I think Masako said it best in the end when she said that she felt like she just had a really strange dream. That's kind of what this show felt like in the end, a really strange surreal dream that leaves you wondering if what just transpired really happened as it was depicted or not.
When my reaction to the final episode is to just stare blankly during the climax portion while routinely checking the time and asking, "is this over yet?" I have to feel that it's failed critically somewhere in terms of getting me involved with it's narrative. The show had it's moments, I was amused by characters like Ringo and Sanetoshi, and I guess I'm kind of glad that Himari was able to survive in the end, though the machinations behind her whole story arc were bizarre to say the least....yep that's really overall series impression for MPD is that it's just plain surreal and I guess my final series rating would be something like 6.5/10. Again just a little less of the weird tendencies and I bet the drama in the final stretch works just so much better for me.
Kaioshin Sama is offline
Old 2012-01-23, 22:10 Link #9
俺たち は リトルバスターズ!
Join Date: May 2003
Location: Canada/ Winterpeg
Age: 27
Wow that just felt like I wasted time watching something. This lacked some serious editing problems and incoherent story. Beautiful animation with an original style and take, but fell apart at the end without the middle substance.
Animation Quality: 8- Was quite good but some episodes lacked quality control. It was very visually appealing with the colours and noted styles. The very best aspect of this show.
Voice Actors: 9- Really well done in this department with the wide ranges and emotional tones. Despite me having no emotional connection to any characters really.
Script: 4 - Is this writing or overall story structure? If so both were very poor. I can't recall anything notable in the writing. It went all over the map in a struggle to be and do so much. The only thing that stands out for the writing was Ringo. But there was an over draft of so many useless characters that had no place in the story.
Soundtrack: 7 - I didn't find anything that stood out except for the transformation theme song. The endings were quite forgettable as they went on. The first was good the rest had mutable vocals.
Editing: 2 - My god did anyone really go back and look at this work and go, hey take that out.... This was so all over the map so many plot points were dropped then more were needlessly added. Back stories that were added that had hardly any impact to the overall structure in the end. This could have been done in 12 episodes.
Enjoyment: 5 - I really enjoyed the beginning half the latter felt like I was eating a piece of steak. Now mind you the beginning of this steak was quite good. Each bite was interesting and flavorful. But soon the steak began to fill with fat and I had to devour it slowly to get to the end. I had hoped this end might have some actual meat . It was chewy but digestible along the way, tasteless and often a boring task. When got to the end ,where there was possibly some more delicious meat, I was left rolling my eyes and questioning what the hell I had watched. This is not something I will ever revisit.
Emotional Involvement: 2 - The most I felt in this show was for that kitten. Which was an idiotic plot device on so many levels that hardly was believable.
6 is the overall grade
Leo_Otaku is offline
Old 2012-01-24, 07:32 Link #10
Join Date: Apr 2007
Location: 永遠の冬の国
Age: 23
I really loved this show, especially in the beginning, but I just didn't find the ending to be all that satisfying. There was just something missing so... 8/10
fanty is offline
Old 2012-05-05, 17:27 Link #11
Roloko vi Britannia
I <3 Kuroko-kun
Join Date: Feb 2010
Location: West Virginia, USA
Age: 23
This show was amazing yet confusing and this series had a great cast of characters particularly Shouma, Ringo, and Kanba. I loved every episode and would watch it more than once.
10/10 a masterpiece in my eyes.
Currently obsessing over Gundam AGE and Fairy Tail
Roloko vi Britannia is offline
Old 2013-03-09, 19:45 Link #12
Love Yourself
Join Date: Mar 2003
Location: Northeast USA
Age: 28
I recently finished this series and felt really conflicted over how to rate it. On one hand it dealt with some very heavy themes, the artwork was beautiful, the symbolism was interesting, and the music (mostly in the last half or third) was fantastic and wonderfully haunting, emotional. The final episode left me feeling that this had all been one epic journey, a total masterpiece.
Yet on the other hand, I nearly dropped this series at multiple points. If it weren't for the high acclaim surrounding the series and my belief that such acclaim meant that something amazing waited at the end, I probably wouldn't have finished it. I really didn't like watching it; it wasn't until episode 15 or so that I began to look forward to the following episode, and that some actual sense of purpose in the series became clear.
Stylistically there were also a number of things that I didn't like. The constant use of flashbacks in each episode made things feel disorganized and grated on me at a number of points. Even though I can listen to a song for a hundred times on repeat and still enjoy it, the constant use of repeated phrases also started to grate on me. The symbolism also became a bit too abstract and unreachable in many cases. As one blog post put it, it's a problem if you're unsure whether certain events are meant to be interpreted literally or as symbolism themselves (for a strong example, the final sequence with young Kanba and Shouma in the cages). This became more of a problem in the ending than the beginning.
Looking at the series as a whole experience (and selectively forgetting the unenjoyable parts), this is a 9/10 or 10/10 for me. If I had to consider it for the enjoyment and viewing experience per episode it would probably be a 4/10 or worse. Because of the lack of enjoyment with each episode it's not a series that I can recommend to anyone, even those who enjoy the themes brought up in the series. I give it a 6/10 as a final rating.
I am happy to have had the experience that is Penguin Drum, but I would not want to repeat any of it. I don't think I've ever felt this way about a series before.
Ledgem is offline
Old 2013-08-18, 14:18 Link #13
Join Date: Aug 2013
Location: maryland,annapolis
Age: 26
Thumbs up
I really liked the anime! The penguins were boss too
starbison is offline
Closed Thread
Thread Tools
Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump
Powered by vBulletin® Version 3.8.6
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
We use Silk. |
global_01_local_0_shard_00000017_processed.jsonl/50995 | AnimeSuki Forums
Go Back AnimeSuki Forum > AnimeSuki & Technology > Torrent Submissions
Thread Tools
Old 2006-10-25, 08:29 Link #1
StrawberyMintSubs Founder
Join Date: Oct 2006
Location: Everywhere
[SMS] La Corda d'Oro ~Prima Passo~ 01
Hey there, I'm icemarle from a starting anime fansub group called StrawberryMintSubs, SMS for short. We just released our first project, La Corda d'Oro episode 1~
Torrent Link:
Torrent Page:
IRC Channel:
icemarle is offline Reply With Quote
Old 2006-11-01, 20:01 Link #2
Junior Member
Join Date: Nov 2006
Smile La Corda D'Oro
OMG!!! I love this show!!! Well... actually, i've only seen one episode coz that's all that's been subbed so far!!! *cries* Are you guys subbing anymore??? Coz i would love, LOVE to see more of the show!!! Anyway, if you could let me know that'd be so cool!!! And i need to know what happens after the cliffhanger of an ending!!! AHHH!!! I love this show!! Thanks so much for subbing!! Ur a champ!!! Thanks again!
meagimoo is offline Reply With Quote
Thread Tools
Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump
Powered by vBulletin® Version 3.8.6
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
We use Silk. |
global_01_local_0_shard_00000017_processed.jsonl/50997 | AnimeSuki Forums
Go Back AnimeSuki Forum > AnimeSuki & Technology > Playback Help
Closed Thread
Thread Tools
Old 2004-01-20, 19:09 Link #1
Jack Nickolas
Junior Member
Join Date: Jan 2004
Age: 32
Send a message via AIM to Jack Nickolas
My windows media player keeps crashing on comic party.. anyone else?
For some reason, everytime i try to run it, it crashes and i need to debug or something.. It doesn't happen for any other anime except for that 1.. Did anyone have the same problem? or how to fix it?
Jack Nickolas is offline
Old 2004-01-20, 19:17 Link #2
r00t for life
Join Date: Jun 2003
Location: /dev/null
wrong forum. Update codecs, use ffdshow, get better player.
Forse is offline
Old 2004-01-21, 01:58 Link #3
Weapon of Mass Discussion
Join Date: Feb 2003
Location: New York, USA
What Forse means is to follow the instructions in the Media Configuration Guide
NoSanninWa is offline
Closed Thread
Thread Tools
Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump
Powered by vBulletin® Version 3.8.6
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
We use Silk. |
global_01_local_0_shard_00000017_processed.jsonl/50998 | AutoCAD Civil 3D General
Distinguished Contributor
Posts: 282
Registered: 11-14-2007
Message 1 of 2 (334 Views)
Command Alias/PGP File
334 Views, 1 Replies
09-25-2012 10:38 AM
We are running C3D 2012. I have installed C3D 2012 on a new system. When I type "L" in the command line it brings up "Laycur" as my first choice in the Autocomplete list. On all other systems we have, when you type "L" in the command line, Line is the first choice in the Autocomplete list. I want "Line" to be my first choice in the list, how do I change this???? I suspect it has something to do with th acad.pgp file. Thanks in advance.
Please use plain text.
*Expert Elite*
Posts: 2,257
Registered: 12-18-2002
Message 2 of 2 (329 Views)
Re: Command Alias/PGP File
09-25-2012 10:58 AM in reply to: Rainman1
On the Express tab of Ribbon, in the Tools panel, pick Command Aliases. Be sure there is an entry for L and that it's set to Line.
Tim Corey, Owner
Delta Engineering Systems
Redding, CA
Autodesk Authorized Value-Added Reseller
Please use plain text.
You are not logged in.
Need installation help?
Ask the Community |
global_01_local_0_shard_00000017_processed.jsonl/50999 | AutoCAD MEP Wishes
Active Member
Posts: 6
Registered: 11-18-2003
Message 1 of 2 (25 Views)
Schedule Edit
25 Views, 1 Replies
09-20-2003 02:45 AM
When creating the schedules you have a nice user interface for creating and editing the columns.
Can a similar interface be made for editing the schedule data collected fromt he drawings. The current method is not very effective.
Please use plain text.
Active Contributor
Posts: 38
Registered: 12-08-2003
Message 2 of 2 (25 Views)
Re: Schedule Edit
09-23-2003 08:44 PM in reply to: tfitzemeyer
It would also be nice to have the ability to insert different information for the same type MvParts with different tags. For instance, sometimes we re-use existing grilles in a building & we do not know the maufacterer or model number. Then we add new gilles to match. On our schedule I will create a column called 'STATUS' (labeling the grille as New or Existing), but currently I am unable to to put in the Manufacturer or model number in for the new ones without it poping into the rows for the existing ones automatically.
Please use plain text.
You are not logged in.
Need installation help?
Ask the Community |
global_01_local_0_shard_00000017_processed.jsonl/51014 | Are you a Fun Ninja too?
You probably are if you work with middle school or high school students! So share the wealth and spread the fun – submit a game to us and we might add it to our archive so thousands of other youth workers can check it out. We’ll give you a shoutout and feature your ministry and image in our post too.
Just fill out the form below. Pictures and videos always help. We appreciate your generosity and willingness to spread fun! |
global_01_local_0_shard_00000017_processed.jsonl/51015 | Take the 2-minute tour ×
I am a new developer and want to write a game that uses a gamepad like the dualshock 3 I want to write it in python although am willing to learn a little C/C++
I need to identify the buttons and rotaters and send feedback like haptics not to mention the motion control
share|improve this question
add comment
2 Answers
Well, SDL has support for controllers (joysticks) and pygame is a python wrapper for SDL so in theory it should support joysticks. There does seem to be support (http://www.pygame.org/docs/ref/joystick.html) for joysticks but I cannot say how well a dualshock 3 controller maps to it. (Theres some issues around mapping the Xbox 360 controller for example)
share|improve this answer
add comment
You can: http://www.pygame.org/docs/ref/joystick.html
Also: http://thp.io/2010/archive/joystick-gstreamer.py
Control GStreamer filters in a pipeline using analog sticks of gamepads Copyright (c) 2010-12-22 Thomas Perl
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/51019 | Piers Morgan Is a Lying LiarS
Piers Morgan has repeatedly claimed—falsely!—that he never countenanced or encountered voicemail hacking during his tenure as editor of the Daily Mirror. Now Heather Mills has come forward to claim that a reporter for the Mirror's parent company confessed to her in 2001 that the paper had surreptitiously gained access to a voicemail message Paul McCartney left for her after the couple had a fight. The trouble for Morgan is that he openly admitted to having listened to that very voicemail message—recounting it in detail—in 2007. Whoops.
Mills told the BBC's Newsnight that in 2001—while Morgan was the editor of the Daily Mirror—a "senior reporter for the Mirror Group," which owns the paper, admitted to her that he had hacked into her voicemail.
Ms. Mills told Newsnight that in early 2001 she had a row with her then-boyfriend Sir Paul McCartney who later left a conciliatory message on her voicemail while she was away in India.
According to Ms. Mills, afterwards a senior Mirror Group Newspapers journalist rang her and "started quoting verbatim the messages from my machine".
Piers Morgan Is a Lying LiarS
Mills told the BBC that the reporter in question wasn't Morgan. And since the Mirror Group owns several newspapers other than the Daily Mirror, it's not clear that it was one of Morgan's reporters doing the hacking. But it's abundantly clear that Morgan listened in on the voicemail in question, with glee. Here he is gloating about it an a 2007 essay:
[A]t one stage I was played a tape of a message Paul had left for Heather on her mobile phone.
"There was absolutely no honest way that Piers Morgan could have obtained that tape that he has so proudly bragged about unless they had gone into my voice messages," Mills told the BBC.
So: A reporter working for Morgan's parent company—and maybe even for Morgan's paper—admitted to Mills that he'd hacked into her voicemail and then played that self-same voicemail for Morgan. Add that to the voluminous and ever-increasing evidence of the Daily Mirror's involvement in the hacking scandal—including a pending lawsuit from a former member of Parliament, an on-the-record accusation from a former Mirror reporter, and secret recordings of a Mirror reporter telling a private investigator the paper had hired that what they were doing was illegal, among other things—and it's plainly obvious that Morgan's claim to have "never hacked a phone, told anyone to hack a phone, or published any stories based on the hacking of a phone" is a narrowly constructed dodge designed to obscure the plain fact that he was up to his knees in it.
Meghan McPartland, a CNN spokeswoman, said a statement from Morgan is forthcoming. When I indicated to her via e-mail that Morgan had "written in the past about listening into [Mills'] voicemail," McPartland replied: "No, he never wrote about listening to anyone's voicemail. He said he was played a tape." So be prepared for some epic parsing.
UPDATE: Here is Morgan's statement, in which he first casts doubt on whether Mills' conversation with the reporter ever happened, and then immediately claims that the reporter "she may or may not have" spoken to didn't work at the Daily Mirror. If he in fact exists. Parsing!
[Photo via Getty Images] |
global_01_local_0_shard_00000017_processed.jsonl/51020 | It's Not That Adam Carolla Isn't Funny, It's That Adam Carolla Is a DumbfuckS
Then Carolla dropped the worn-out observation that "women aren't funny," a gimme quote so stupid that thrashing it should have been idiotproof. Instead, columnists framed the issue as "unfunny comedian says dumb thing," as if his comic bona fides had some bearing on the fact that he's a dickhead.
Reversal of fortune is fun; dismissing people who say "women aren't funny" with a trouncing of their comic chops is a killer move. Drop the mic. Boom, headshot. Why we do this with comedy is a mystery, though. Nobody responded to the radio host who called Obama a monkey with, "What's her Arbitron? Ahahaha I bet it's real bad."
Maybe people did this with Carolla because people like to assume they have a good sense of humor. "You are really bad," they can say, "because I have what it takes to tell that." Perhaps it's forgivable self-praise. Either way, it's immaterial to establishing that Carolla made a bozo misogynist statement, and the worst thing it does is reframe the discussion as a referendum on his career.
Salon's Mary Elizabeth Williams, or at least a copy editor, left no room for ambiguity with the headline, "Adam Carolla, unfunny comedian, thinks women aren't funny." The ensuing article confirms the idea. Both make a dog's breakfast of the issue. The real story is, "Fuckhead Says Dumb Shit," but Williams' analysis couldn't be better crafted to change the subject.
She praises Melissa McCarthy's comedy talent for acting out a moment scripted by two other people (both women more deserving of a namedrop). Then she makes an argument on behalf of Roseanne Barr's humor by citing her television show and its awards. Not only is a show's humor dependent on other actors, producers and writers (in this case, over 40 of whom were men), but, short of using a laugh track, the Emmy awards are about the dumbest possible metric for comic worth.
Williams uses criteria involving movie scripts, ensemble TV shows (and their producers and writers' rooms) and the Academy of Television Arts and Sciences to impeach the argument of a podcaster who used to mock people via puppets and talk to strangers about dick diseases. Not only does this compare apples to oranges, it might as well have been designed to obscure the fact that Carolla made a self-evident universally shit-for-brains remark. That's the only referendum you need.
Meanwhile, Alyssa Rosenberg, who writes Think Progress' "Smell My Finger," a pop-culture blog ostensibly targeted at agoraphobes and people on AOL, lost the thread at the end of a decent article, arguing:
And yet Adam Carolla, a comic so pathetic he thinks it's clever to suggest nerds are undatable [sic]... is somehow, by virtue of these clear demonstrations of wit and the fact that he's a dude with a frattish fanbase, free to behave like this.
Leaving aside the fact that Carolla hasn't been "free" to behave like this and has been paying a price in internet commentary for days, usually the people who move goalposts are the ones losing the argument. But here, after a smart observation about double-standards applied to women writers—and women's self-censorship about their peers in a rigged game—Rosenberg shifts to high dudgeon about nerd jokes (really?) and then engages in audience stereotyping based on a dislike for some topics of Carolla's humor. While there's plenty of frat humor that's privileged, racist, sexist, xenophobic, and homo- and trans-phobic, a lot of it is just goofy and stupid. It has broad demographic appeal because it's broad comedy, and doubtless a lot of Carolla fans are along only for that ride and not D-minus conservative talking points.
There's one last ugly distraction to the "Carolla isn't funny" argument, one illustrated by one of the responses to Alexandra Petri's Washington Post blog: "OK Alexandra. Now, hopefully, you can get back to being funny again, and possibly prove Adam Carolla that he's wrong. This article didn't do that." When you let the discussion migrate from "this man is a social neanderthal" to "this man is not funny," you open the floodgates to the most accessible low-effort troll: ahahaha, it's ironic that the reason why you're wrong is that you're not funny. (I look forward to seeing it below.) If Carolla's wrong because he's not funny, then you can't be right if you're not funny, and anyone who points that out better be funny as well, or else we're all trapped in the same revolving door and nattering at each other like doomed snark shades.
And, look, if a coherent response was doomed to be subsumed by changing criteria, faulty comparison and a subjective talent show, someone could have at least had fun with the thing and gone whole hog on the fallacies. You know, just start ripping Carolla, because he's willing to do that to a whole gender, if it means he hits the Kindle bestseller list. That's the wheelhouse of a dude whose career insights are tittybeerfootball (something that will be acknowledged when the Friar's Club roasts the marketing department at Budweiser). Well, that and MANLINESS schtick, delivered by a caterpillar-browed lantern head made of paste laconically whining out one-liners like the peevish adenoid of a midwestern CPA who just had a narcotizingly heavy sesh down at the Country Buffet. Mocking appearance seems like overkill, but it's a good thing Corolla's got wiry hair that kinda looks like a plumber's snake, because at least having his head up his ass can fix his being full of shit.
Thankfully, instead we got comics like Rob Delaney making sincere and impassioned defenses of women writers and writers' rooms that offer a balance of voices. We got people on Twitter sticking up for women comics and writers and generally making a fun day of the whole affair.
With luck, maybe that will spill over into an acknowledgement that—despite the considerable way left to go—we're living in a phenomenal time for women comedy writers. In the 1990s, nobody outside a writers' room knew who Jennifer Crittenden was, even as she wrote episodes for the golden age of The Simpsons and Seinfeld. Today, Megan Ganz is a "household" name for Community fans online, while Tina Fey and Amy Poehler approach beatification. There are even enough women writers that we can start having headache-inducing discussions about whether women writers transgress against other women writers—whether Chelsea Handler and Whitney Cummings' sexual frankness embodies an equalizing of the gender discourse or a cynical market appeal, whether Fey's and "Liz Lemon's" prudishness is a form of slut-shaming.
Hell, with a little more luck, we might stumble into a discussion about how women are funny, and women are also unfunny. Just like the millions and millions of men who are absolutely fucking unbearable—the huge, begged-question part of the male populace who are never mentioned in the presumptive "dudes are hilarious" conversation. When it comes to sense of humor, most men—most people—have "beer goggles" levels of misjudgment about their own. Anyone who's worked in a large office, restaurant, retail store, etc., knows what it's like to never escape the 80 percent of their co-workers who think they're hilarious when only maybe 10 percent actually are. In America, almost no one thinks he's the Zeppo.
The thing is, those positive trends and human acknowledgements don't represent some bizarre arcana. To anyone observant, they're pretty obvious. That's what's ultimately so damning about Carolla's sexist condemnation. His job is observation, and his career is built on trading in the obvious. When you're a master of the obvious, you don't have an excuse for failing to grasp it.
Image by Jim Cooke. |
global_01_local_0_shard_00000017_processed.jsonl/51024 | Take the 2-minute tour ×
I have a vector dataset of rural broadband data-points (how fast, etc.) and I'd like to explore if there are clusters of points with similar characteristics, and to plot polygons encompassing them.
For example, I may have 45,000 points in a single PostGIS dataset distributed over a landscape. I want to identify clusters which lay within x km of each other and where the speed is below y kbps, and to produce convex hulls for each qualifying cluster.
Is there a simple way of doing this in QGIS, for example?
Any help is very much appreciated.
share|improve this question
You might want to pay attention to the nature of broadband. High speeds will occur within urban areas; industrial conglomerations; radiating along roadways from COs, modems, and other fiber/cable/DSL infrastructure; and broadcast from certain cell towers (depending on your definition of "broadband"). Thus the high speeds will appear to cluster and the lower speeds will look like gaps in the clusters. In particular, it's unlikely that convex hulls will even be decent descriptions of low-speed regions. It would be good to know how you intend to interpret whatever "clusters" you find. – whuber Jun 22 '11 at 14:11
Thanks for the help. I'm studying the more rural areas, where the architecture of wired broadband can throw up more unusual situations because of the distribution of street cabinets and directly fed lines on poles, as well as the geography of the areas for example. As a result you do find clusters which can be a useful starting point for building out local solutions, and can be an important step in developing a strategy. In fact you can even find them in urban areas, often because of the industrial heritage or things like railway lines and rivers that prove difficult to cross. – Adrian Jun 24 '11 at 8:20
add comment
5 Answers
up vote 9 down vote accepted
Thanks to everyone who responded! I've combined bits from several suggestions and added a bit of my own and found a solution which works well for me - and all from within QGis!
I first ran a PostGis SELECT to find the points which have the right common attributes and lie within x km of each other:
SELECT DISTINCT s1.postcode,s1.the_geom, s1.gid FROM broadband_data AS s1 JOIN broadband_data AS s2 ON ST_DWithin(s1.the_geom, s2.the_geom,1000) WHERE s1.postcode != s2.postcode AND s1.fastest_broadband <= 2000
(Pretty much straight from Manning's very good PostGis in Action book, only adding a self-join)
I then loaded Carson Farmer's ManageR plugin, and imported the layer. From here I followed the suggested PAM clustering process here, and exported the result to a shape file, on which Convex Hulls were calculated in seconds using fTools (Carson does get around!).
Thanks for all the help!!
share|improve this answer
Neat :] – radek Jun 24 '11 at 14:56
add comment
Although not QGIS solution I'd personally opt for some exploratory analysis using SaTScan. It's fast, well documented and widely applied, so you shouldn't have troubles with starting up. 45k points might require some RAM though.
I'm not sure if it can read directly from Postgres but easily imports from dbf and text files.
The output of analysis can be then easily read back to Postgres or QGIS. You can decide to search for circular clusters or ellipses (might be useful to use if there is particular type of settlements in your data, for example long shaped cities/villages in valleys etc.). You can then generate polygons or ellipses or displays just the locations that are members of clusters.
For quick preview of the results in Google Earth you could also use NAACCR's SaTScan to Google Earth Conversion Tool.
Importantly - if you decide to run Monte Carlo simulations (99 minimum, I think) you will also be able to tell something about statistical significance of your clusters. Interpretation and justification of this clusters will be another issue as it has been debated in spatial sciences for last two decades at least (I think ;).
You could try to run purely spatial analysis looking for clusters of high, low or hagh & low values. If you have some temporal attributes in your data *daily, weekly aggregations) then I think it would be really interesting to run some space-time models.
Hope that helps.
share|improve this answer
Thank you! I'll try this! – Adrian Jun 22 '11 at 12:52
Looks Good - Good Answer – Mapperz Jun 22 '11 at 14:11
add comment
There's a similar example of what you want to do using R and GRASS here. As an alternative, you may want to use scipy's clustering tools as suggested, and then do the convex hull calculations using this method.
share|improve this answer
add comment
You can try Ftools plugin. Vector > Geoprocessing Tools > Convex Hulls.
There is an option to Create convex hulls based on input field, the input field parameter should come from the attributes of your input points.
share|improve this answer
Thanks for the help. The convex hulls bit will create the polygons but it doesn't identify if clusters exist or where they might be. I'd really like to find a way of associating points with similar characteristics within x km of each other first. I'm guessing I'd need to run some script which uniquely identifies the existence of clusters and updates an additional field in the postgis table for members of each cluster. For example, creating a Delaunay triangulation and filtering out all the points where the the sides of the triangles are longer than x km but I've no idea how to do that – Adrian Jun 22 '11 at 10:49
add comment
SciPy has a clustering package (for python), you can use it in python console, write a simple plugin to do that or use PL/python inside postgis.
After the analysis just use f-tools to create the convex hulls.
share|improve this answer
I'm a simple user with very little experience of python but I'll take a look - I know I need to learn! – Adrian Jun 22 '11 at 12:52
does SciPy clustering take spatial relationships between points into account? – radek Jun 22 '11 at 15:11
You just add two more covariates for the x and y coordinate of your point. – Jose Jun 22 '11 at 16:44
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/51025 | Take the 2-minute tour ×
some options for merging looks like fusion tables, vizmaps, and these 2
which is easiest?
the shapefiles are probably going to be TIGER census ones unless I find better ones.
share|improve this question
The intended outcome is not clear – Willy Sep 5 '12 at 10:16
@Willy, agreed, but by reviewing the OP's various other posts one can get an idea of the intention, though I would prefer it be consolidated into one question. – blah238 Sep 5 '12 at 11:14
This is hard to answer without knowing your experience, which affects how "easy" a particular solution is for you. – BradHards Sep 9 '12 at 1:44
Not necessarily, Chad. The prompt for an upvote states, "This question shows research effort; it is useful and clear." It's possible to answer some questions that don't have those qualities. – GeoKevin Sep 10 '12 at 12:06
@Kevin, I understand the definition of and the theory behind upvoting, but I still think that if someone takes the time to answer a question, they, the answerer, should therefore see the question as being either useful, clear, or showing research effort; else why would they bother to answer it in the first place? Personally, if I see a question as none of those, I'm not wasting my time on it. – Chad Cooper Sep 10 '12 at 13:49
show 2 more comments
6 Answers
Fusion Tables, Google Visualization API and VizMaps with Google Maps API may be what you are looking for:
VizMaps Application: VizMap is the collection of components that allow you to create a data driven application that will merge google visualization and google mapping straight out of Excel. This consists of several components, which are all integrated in the Excel Driving application, and many of which can be seen in other roles throughout this site.
And see this link: http://ramblings.mcpher.com/Home/excelquirks/getmaps/mappingapplications
Electing (or not) Google Maps API should not be dependent on this issue - you can adress do that kind of integration using other platforms like Mapserver, Geoserver ('more GIS powerful') or Bing Maps.
share|improve this answer
soo... it looks like you can use fusion tables, vizmaps, or the 2 links on the question post... and that the platform doesnt matter -- so how about the second question? which is easiest? – kittensatplay Sep 6 '12 at 22:46
My first answer was made thinking about using Google APIs on a webgis platform the way you could mesh different source data and work it with Google visualization tools. About the second question: i can’t give you a precise answer - not enough information about your project – but I can say that between those two links (Quantum GIS and ESRI ArcMap) I am inclined to favor QuantumGIS, because it’s a powerful and easy to work open source GIS, opposed to ArcMap a powerful but proprietary and costly GIS from ESRI. The other answers are very good ones! Again, it all depends on what you want to do. – jcoelho Sep 11 '12 at 14:02
add comment
I do not see how Google Maps can join an Excel file to a Shapefile but I know ogr2ogr can join Excel data, outputing a new Shapefile.
share|improve this answer
is gdal.org/ogr2ogr.html easiest? see comment under the other answer – kittensatplay Sep 6 '12 at 22:47
add comment
You can load the DBF from your shapefile straight into Excel as another sheet - its a spreadsheet file (DBASE Format). Then do whatever magic you want to join your data to that sheet. Make sure the sheet is in the same order as when you loaded it and with the same number of rows and then save it. No need to leave Excel. Also works with OpenOffice and LibreOffice.
share|improve this answer
add comment
Similar to Spacedman's answer, you could also import the shapefile into a Personal Geodatabase (aka MS Access database), along with whatever Excel worksheets your heart desires.
Then just use the sql capabilities of MS Access to query, join, update...etc
share|improve this answer
add comment
I guess "easiest" depends on what the "merging" process requirement is. If you're doing a straight format conversion, then ogr2ogr (as suggested by klewis) is an easy, scriptable approach.
If you want to do some more manipulation (e.g. exclude some entries, reproject, select some additional data from another table), then "easiest" will probably depend on exactly what manipulation you are doing. However an alternative to user890's answer would be to use SpatiaLite, which can give you a "virtual table" representation of the excel file, and you can then do spatial SQL operations. How "easy" that (or any other SQL based tool) is to use obviously depends on your SQL experience.
share|improve this answer
add comment
I've done something similar lately using an update cursor and the xlrd-library with python. The script updates some existing records with the data from the excel sheet. Hopefully this will be of some use for someone else.
import xlrd
import sys, os
# Geoprocessor-object (ArcMap 9.1 and older)
import win32com.client
gp = win32com.client.Dispatch('esriGeoprocessing.GpDispatch.1')
# Geoprocessor-object (ArcMap 9.2 and newer)
import arcgisscripting
gp = arcgisscripting.create(9.3)
class ArcSql:
type_book = {'str':("'","'"), 'int':('', ''), 'float':('','')}
format_book = {'shp':('"','"'), 'GDB':('[',']'), 'SDE':('','')}
def __init__(self,colomn_name, values_list, value_type = 'str', arc_format ='shp'):
self.colomn = colomn_name
self.values = values_list
self.valtype = self.constructor(self.type_book, value_type)
self.aformat = self.constructor(self.format_book, arc_format)
self.colomn_formated = "%s%s%s" %(self.aformat[0], self.colomn, self.aformat[1])
def statement(self, connector = "OR", operand = '='):
space = ' '
connector += space
operand = space + operand + space
temp_state = []
count_values = len(self.values)
except TypeError as terr:
return str(terr) + ' values must be passed as a list'
if count_values:
for v in self.values:
x = self.colomn_formated + operand + self.valtype[0] + str(v) + self.valtype[1] + ' ' + connector
return "error, object as no attribute values..."
state = "".join(temp_state)[:-4]
return str(state)
def constructor(self, book, book_key):
return next (v for k,v in book.iteritems() if k==book_key)
def update_fields(shape, sql, fields_to_update, data_to_put, z = ''):
Loops through possible multiple fields of a shape to update their records. Based on the
ArcGIS UpdateCursor method.
Takes a 'shape' (with full path), a 'sql statement' (optional) as a selection of the 'fields to update',
those fields and the data to store as arguments.
fields_to_update has to be a LIST or TUPLE
if it is a single field that is to be updated,
data_to_put can be a flat list otherwise is HAS TO BE! LIST of LIST, or a List of Tuples
if sql:
rows = gp.UpdateCursor(shape, sql)
rows = gp.UpdateCursor(shape)
row = rows.Next()
if row == None:
msg = "no row opbejct!"
print msg
elif row != None:
count = 0
while row:
if fields_to_update and data_to_put:
for n in range (len(fields_to_update)):
if isinstance (data_to_put[n], list) or isinstance (data_to_put[n], tuple):
row.setValue(fields_to_update[n], data_to_put[n][count])
print 'updating...'
row.setValue(fields_to_update[n], data_to_put[count])
print 'updating...'
count += 1
row = rows.next()
msg = gp.getmessages() + " Field update failed!"
print msg
del row, rows
path = r'D:\xxx'
shape = r'%s\shape.shp' % path
xls = gp.getParameterAsText(0)
#xls = r'D:\opdrachten\importKwaliteitInMoeder\Excelsheet kwaliteitgegevens voor import in tool.xls'
if xls[-4:] != '.xls':
gp.addmessage('File is not a XLS.\n')
book = xlrd.open_workbook(xls)
sheet_name = 'Blad2'
## get the index of the sheet named Blad2 as a list
index = [i for i,name in enumerate(book.sheet_names()) if name == sheet_name]
## check if index[0] has a value, otherwise sheet_name couldn't be found
sh = book.sheet_by_index(index[0])
except IndexError, Ierr:
print str(Ierr), 'No sheet named', sheet_name, '!'
db = {}
## get the cellvalues from the second row, these are the (shape-) field names
header = [sh.cell_value(1,i) for i in range(sh.ncols)]
for head in header:
## the values gonna be stored in simple lists
db[head] = []
## loop through all the cells, starting at row three
for c in range(sh.ncols):
for r in range(2,sh.nrows):
## re-arrange the data: data to put is a list of list and col is a list of the fieldnames
data_to_put, col = zip(*[(db[k],k) for k in db.iterkeys()])
## get a sql statement based on the identifier HYDRO_CODE to select only those rows from the shape
## write the data to the shapefile
update_fields(shape, sql, col, data_to_put)
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/51026 | Alienware M11X Hands-On: Fast Ride In a Short MachineS
According to Dell, the M11X is the most powerful laptop under 15 inches. And, playing CoD at 30fps, with 720P resolution (on what's essentially a netbook), I fell in love with the little machine.
Let me make this clear: The M11X is unabashedly Alienware. I mean, its LEDs behind the keyboard and thermal grates sort of give that away. I'm not crazy about the plastic case, and I wish the 1366x768 screen were covered in glass instead of plastic. As someone who appreciates minimal design, it's pretty much the antithesis of my taste.
Yet, I still liked the M11X.
While it manages to still weigh in at a hefty 4 or so pounds (your brain doesn't anticipate the weight), it's just an incredible amount of power for an 11.6-inch laptop.
Inside, you'll find an energy-sipping Core2Duo alongside a 1GB Nvidia 335M graphics card—which is fairly insane for the size. But playing Star Trek Online and Call of Duty, I didn't doubt the power. You can't run CoD with anti-aliasing on, but otherwise, the experience is sharp, smooth and surprisingly palatable on the tiny display—keep in mind, I was testing it running off a battery.
View gallery »
The trackpad and keyboard both feel pretty good, too. The trackpad has just enough texture, and the keyboard isn't too cramped with nicely curved keys. The battery is non-removable, but the 8-cell lithium ion polymer lasts 6 1/2 hours casually or 2 hours of full-out gaming. Plus there's a battery meter on the case's underside.
Also of note, you'll find ports galore. 3 USBs, an HDMI, DisplayPort, mini FireWire, VGA and even a SIM slot. Jesus.
But the best news, the news that got me legitimately excited, is that it will be out within a month, specs maxed, for $1000 or under. For that price, you could have an i7 at home, and a little laptop for the road/LAN parties. And why oh why would you ever buy one of those "premium" netbooks again? |
global_01_local_0_shard_00000017_processed.jsonl/51035 | The Leader in Guild Web Hosting
Invalid Guild Specified
It appears that the guild you were trying to access 48148, "Blades of Sargeras" was removed either at the request of the owner or as part of an automated maintenance process that removes guilds that have been inactive for a very long time. |
global_01_local_0_shard_00000017_processed.jsonl/51044 | Results 1 to 1 of 1
Page 1 of 1
The effectiveness of enhancing reading comprehension and reading motivation of students by the use of drama approach in Chinese language lessonChong, Ngai-man; 莊藝文2012475
Page 1 of 1
Export Records
Step 1: Select content and export format
• Citation only
Step 2: Select export method
• Download |
global_01_local_0_shard_00000017_processed.jsonl/51064 | New Book: “Making Games with Python & Pygame”
6 comments on this post.
1. Robert Nagle:
Congratulations. I am having a lot of fun going over Invent your own games with my 11 year old nephew, and it’s good to new that there’s a sequel ready….
2. Steve Ferg:
Assume that I know Python, and want to start learning how to make games. Should I start with “Making Games with Python & Pygame”?
Or should I consider “Making Games with Python & Pygame” to be a follow-on to “Invent Your own Computer Games with Python” and start with “Invent Your own Computer Games with Python”?
In part, my question is: What is the relationship between the tow books? Does one replace/obsolete the other? Or what?
3. Al Sweigart:
“Making Games” is sort of a sequel to “Invent with Python”, in that it expects you to have some familiarity with Python (but doesn’t assume you know Pygame at all). If you already know some Python programming, you can just jump into “Making Games”.
4. WM:
BTW, when would the 3rd edition of “Invent with Python” come out?
5. Al Sweigart:
I have most of the work done for the third edition (which doesn’t add that much new content, but mostly layout improvements). I’m still debating whether or not it is different enough to justify a new release (though fixing the typos in the second edition would be nice). It would be on the order of sometime in the next couple of months maybe.
6. Sam:
Really great book. The only disappointing thing was the absence of object-oriented programming. Otherwise, really great though.
Leave a comment |
global_01_local_0_shard_00000017_processed.jsonl/51066 | Answers to: If a male do sex before marriage how will his wife?in light of islam<p>Assalamualikum.I'm 18yrs old the age of 13 or 14 i was touch a female,her body.but didnt sex.but on this time i didnt know about punishment of how allah forgive me?in accordance with sura mayeda:3 how will be my wife?can't i get married a mumin women?ans plz</p>enTue, 17 Dec 2013 02:09:27 -0500Answer by Hallary<p><a href="">Xytomax</a> Easily, the post is actually the best on this deserving topic If a male do sex before marriage how will his wife?in light of islam. I fit in with your conclusions and will eagerly look forward to your upcoming updates. Just saying thanks will not just be sufficient, for the extraordinary lucidity in your writing. I will at once grab your rss feed to stay privy of any updates. Delightful work and much success in your business efforts!</p>HallaryTue, 17 Dec 2013 02:09:27 -0500 by Anakata<p>The answer of my brother above is completely correct.</p> <p>In simple words, Allah forgives any sin made if you did not know as long you will not repeat it and ask Allah for repentance.</p> <p>The only sin that Allah will never forgive is Shirk, the belief that Allah isn't the only deity.</p>AnakataSat, 02 Nov 2013 15:37:05 -0400 by UmarAbdullah<p>Yes, brother you can get married to a Muslim women. Please see <a href=""></a> for more details </p> <p>The Prophet (sallallahu alaii wasallam) encouraged to get married so hasten to do that. Find a good/righteous Muslim spouse. If you cannot marry then do nafl/sunnah fast (roja/sawm). </p> <p>Know that Allah is the Most Forgiving and the Most Merciful. Allah also loves to forgive His slaves.</p> <h2>The Prophet Muhammad said: Allah is more joyful at the repentance of someone when he turns to Him in repentance than one of you would be if he were riding his camel in the wilderness, and it runs away from him, carrying his food and drink, so that he loses all hope of getting it back. He comes to a tree and lies down in its shade (awaiting death), for he has lost all hope of finding his camel. Then, while he is in that state (of desperation), suddenly it is there before him! So he seizes its halter and cries out from the depth of his joy, “O Allah, You are my servant and I am Your Lord!” His mistake comes from the intensity of his joy.</h2> <p>Will Allah forgive you? yes, inshaAllah. Dont you know Allah is the Most Forgiving?</p> <p>Repent to Allah sincerely. </p> <p>Repent to Allah. Seek His Forgiveness.</p> <p>Repent to Allah and make a commitment to never do the sin again.</p> <p>Please read this book <a href=",_But">,_But</a></p>UmarAbdullahSat, 02 Nov 2013 01:33:58 -0400 |
global_01_local_0_shard_00000017_processed.jsonl/51075 |
Cluster discovery with Groovy++
• submit to reddit
First networking application I wrote in my life (OMG, it was 17 years ago) was very interesting. We were developing marine navigation system - electronica chart + connections to GPS, radars and other sensors. At some point it became obvious that one computer is not enough at least by reasons of reservation. The funny fact is that main reason from business prospective was even not that but the fact that on really large vessel (tanker or cargo or whatever) the size of bridge is so big that you want to have at least three computers (collaborative of course) - one in the centrum of the bridge and one on each wing.
One of the main requirements was to have zero network configuration. As you can imagine typical members of crew can do nothing with IP addresses or ports. So computers had to find each other silently and decide how to cooperate.
The solution is well known - each computer(node) periodically broadcast over network own ID and network address where it listens for incoming connections. Also every node listens for such broadcasted messages. When another node receives such message it decides who should connect whom. It might be deterministic algorithm (like comparing IDs) or who will be the first to estaiblish connection or whatever. As soon as nodes discovered each othercollaboration is possible.
Frankly speaking at that moment it was hard task for me which took quite some time. Today I want to show how easy it is.
Our plan is following: we will develop two universal objects - one for periodical broadcasting of messages and another one for receiving.
Every object will have dedicated thread and dedicated socket. In many situation use of two sockets is not necessary because usually you have both broadcaster and sender together but in some cases you need only one of them, so we will implement more general solution
Our sender/receivers will be very generic and knows nothing about nature of the data. We want to separate concerns.
Let us start with common functionality for sender and receiver.
abstract class BroadcastThread extends SupervisedChannel {
InetAddress group
int port
private MulticastSocket socket
private volatile boolean stopped
abstract void loopAction ()
protected void doStartup() {
executor.execute {
try {
socket = new MulticastSocket(port);
while (!stopped)
loopAction ()
catch(Throwable t) {
stopped = true
protected void doShutdown() {
stopped = true;
SuperviseChannel is very interesting animal. It worth separate article by itself but here is brief idea
First of all it is message channel (or actor) in the sense described in the article "Lock free message passing algorithms with Groovy++" It means that it reacts to incoming messages and we garantee that no more than one mesage is processed ar any given moment. Particularly startup()/shutdown() methods are asynchronius (just sending respective message). Methods doStartup()/doShutdown() called when message received and define what our channel should do on startup.
Secondly, and even more important supervised channels built in to tree. This great idea came from Erlang OTP. Roughly speaking, every supervised channel responsibly for creation, starting and stopping own childs. Especially important that it also responsible for decision what to do if some child has crashed. There are many strategies possible - restart crashed child, or stop and restart all childs, or crash itself and let own supervisor to decide what to do (our default policy)
We don't have any childs for sender/receiver but very soon we will combine them in to more intersting object. What we do hav.e is that if some error happend and we crashed we let our supervisor to decide what to do
The last thing to notice is that every supervised channel has java.util.concurrent.Executor (usually inherited from the owner/supervisor) We use it in the code above to start new thread
For now we are ready to create sender
static class Sender extends BroadcastThread {
long sleepPeriod = 1000L
byte [] dataToTransmit
void loopAction () {
socket.send ([dataToTransmit, dataToTransmit.length, group, port])
Isn't it very simple? We just need to define frequency of transmission and data to be broadcasted
Receiver is only a little bit more complicated. We want do be able to define transformation of received bytes in to something meaningful to be sent either to owner or if we have no owner to our own processing.
static class Receiver extends BroadcastThread {
Function1<byte[],?> messageTransform
void loopAction () {
def buffer = new byte [512]
def packet = new DatagramPacket(buffer, buffer.length)
def msg = buffer
if (messageTransform)
msg = messageTransform(buffer)
if (msg)
(owner ? owner : this).post(msg)
No we are ready to build our main discovery object. It will be supervisor combining sender and receiver.
When started it creates and starts both sender and receiver. Both will be stopped automatically when it stopped
Received bytes are transformed in to meaningful messages and send to any interested listener(including ourself, which opens possibility to subclass and have bridge between message passing and OOP world)
class BroadcastDiscovery extends SupervisedChannel {
// our ID
UUID uid
// our IP address
InetSocketAddress address
// where to send notifications on discovery
Multiplexor<Discovery> listeners = []
// where to broadcast
InetAddress group
// broadcast port
int port
static class Discovery {
UUID uuid
SocketAddress address
void doStartup() {
BroadcastThread.Sender sender = [
dataToTransmit: createDataToTransmit()
startupChild (sender)
BroadcastThread.Receiver receiver = [
messageTransform: { byte [] buf -> listeners.post(transformReceivedData(buf)) }
startupChild (receiver)
protected void doOnMessage(Object message) {
switch(message) {
case Discovery:
Discovery dicovery = message
onDiscovery(dicovery.uuid, dicovery.address)
protected void onDiscovery(final UUID uuid, final SocketAddress address) {
private byte [] createDataToTransmit() {
// ...
private Discovery transformReceivedData (byte [] buf ) {
// ...
Two details to note:
Our message transform always returns null, which means that receiver will not send a message. Instead we send transformed data to all subscribed listeners from inside of transformation
Method startupChild used above is standard way to simulatniously create owner/child relation and startup the child
We are almost done. Just for completeness here is code to start our discovery channel
private void startBroadcast() {
broadcast = new Broadcast()
broadcast.group = GROUP
broadcast.port = PORT
broadcast.uid = clusterNode.id
broadcast.address = (InetSocketAddress)serverChannel.getLocalAddress()
broadcast.startup ()
Very last but important note:
Usually such discovery channel will be not root supervisor. For example it is naturally to imagine that "brother" of discovery channel is channel responsible for accepting incoming TCP/IP connections and so forth
Thank you for your time. Hope it was interesting.
Till next time.
Published at DZone with permission of its author, Alex Tkachman. |
global_01_local_0_shard_00000017_processed.jsonl/51109 | Let's Make Robots!
Kinect and an Arduino UNO
SimpleBotics's picture
Is there any way I can get a kinect (xbox 360) sensor to act as my robots "eyes" with the arduino UNO. For example, where I move my hands, the arm follows. Thanks ;)
Comment viewing options
OddBot's picture
If you want to experiment with a camera as a sensor and an Arduino as a processor then check out the video experimentor shield. You could track an object using this.
mlandergan's picture
The arduino can not be communicated directly with the arduino. What I suggest is having some sort of computer, ie. rasberry pi, netbook, etc to run processing (http://processing.org/) which then could send commands to move the motors in a certain direction.
Check out here about skeleton tracking with the kinect and processing http://learning.codasign.com/index.php?title=Skeleton_Tracking_with_the_Kinect
Stormbringer's picture
I saw some hacks made with a working desktop/notebook computer, A quadcopter to avoid obstacles(google for it)... And I think it's may be done with a Raspberry pi(which is actualy a pc)
Worth the research to do great things... It IS possible, but you may need a starting point ;)
Maxhirez's picture
I think you're going to need more brain power than just an Arduino. The Uno could be I/O for something else but it's not going to do the heavy lifting.
Stormbringer's picture
Oh yes, Max... That´s why I talk about Raspberry Pi.
rogue's picture
I don't think Kinect does any computer vision processing, as far as I know it just outputs video pixels plus depth information. I think you may be able to implement some simple processing such as blob detection, etcetera with an Arduino. To process video to recognize human gestures you will probably need quite a bit more CPU power than an 8-bit Arduino, and you will probably want to leverage use of OpenCV.
Chris the Carpenter's picture
Where are you now on the project? How far have you gotten?
It would help if you would add the links to:
• The google searches you have done
• The HAD searches you have done
• The Instructables searches you have done
• etc
This way we can all catch up to what you are looking at now. Once we know where you are (looking for tutorials/ etc), we can figure out how best to help. |
global_01_local_0_shard_00000017_processed.jsonl/51117 |
Re: Datasets and contextual/temporal semantics
From: Sandro Hawke <[email protected]>
Date: Fri, 14 Oct 2011 21:15:35 -0400
To: Dan Brickley <[email protected]>
Cc: Jeremy Carroll <[email protected]>, Pat Hayes <[email protected]>, "[email protected]" <[email protected]>
Message-ID: <1318641335.4884.64.camel@waldron>
On Sat, 2011-10-15 at 00:05 +0100, Dan Brickley wrote:
> On Friday, 14 October 2011, Jeremy Carroll <[email protected]>
> wrote:
> > On 10/14/2011 12:42 PM, Sandro Hawke wrote:
> >>
> >> TimBL used to argue that those times should be understand as
> Valid-Since
> >> and Valid-Until times [1]. Given how they sit in the caching
> mechanism,
> >> they are perhaps closer to transaction times, but I think Tim's
> point
> >> was that one should try to align those sets of times anyway.
> >>
> >> Eventually he stopped pushing for this, when people told him that
> they
> >> were (a) too hard to control on their web servers, and (b) they
> want to
> >> be using them to control HTTP caching -- as intended -- not to be
> making
> >> claims about the world.
> >>
> >> This is why I suggested just putting the times in the data itself,
> >
> > I agree with the sentiment that if dates and times of events are
> important then they should be explicitly modeled. My point about these
> HTTP header mechanisms is that it is basically obligatory on the web
> to participate in these cache control mechanisms and a lot of the
> anxiety about out-of-date data seems to me to be anxiety about our
> implementations that *do not check* to see whether our local copy of
> someone's foaf page is or is not up-to-date with the master copy on
> that person's web site, and is being misplaced as anxiety about the
> underlying specification in RDF Recommendations of a native time
> model.
> Slight aside --- but HTML has the http-equiv construct, eg
> http://www.w3.org/TR/html5/semantics.html#pragma-directives
> While this was no good regarding Http-range14 since even serving up
> such an HTML doc via HTTP 200 means it's too late by time we've got
> the doc to use http-equiv HTML meta to issue different http headers.
> However, maybe here we could use in-HTML metadata to express header
> info, for the cases where real http headers can't be changed?
It seems to me reasonable to allow consumers to learn context
information from various sources. So the lastUpdateTime, etc, could be
learned from the content, from http-equiv headers (if the RDF is inside
HTML), from http headers, or from nearby data.
I'd suggest the RDF lastUpdateTime gets priority if specified; if not,
then fall back to HTTP Last-Modified if specified; if it's not specified
either, fall back to HTTP Date. Something like that.
-- Sandro
Received on Saturday, 15 October 2011 01:15:51 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/51120 |
Re: alt text was Re: Kynn's Analysis of CD Web Accessibility
From: Kynn Bartlett <[email protected]>
Date: Mon, 03 Apr 2000 20:55:46 -0700
Message-Id: <>
To: "Jonathan Chetwynd" <[email protected]>
At 05:45 AM 4/2/2000 , Jonathan Chetwynd wrote:
>amazing, if only one could easily edit the interface it could be on the main
Mozilla -- the "open-source" [sic] developed version of Netscape
which is supposed to be Netscape 6 or something -- includes something
called XUL. XUL is a language for defining user interfaces, which
means that anyone who wants to take the trouble to learn XUL can
design custom interfaces for Mozilla, and distribute those to
others as well.
>Perhaps this is the way to go, insist as ua P1 that all browser
>configurables are fully mobile ie that they can be placed anywhere.
I disagree that it's a P1. By the UA definitions, as I understand
them, this would be a P3 or P2 at best. However, it's an interesting
Director of Accessibility, edapta http://www.edapta.com/
Chief Technologist, Idyll Mountain Internet http://www.idyllmtn.com/
AWARE Center Director http://www.awarecenter.org/
Received on Monday, 3 April 2000 23:59:45 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/51121 |
Re: Validators that don't validate
From: Masayasu Ishikawa <[email protected]>
Date: Thu, 12 Nov 1998 00:58:37 +0900
To: [email protected]
Message-Id: <[email protected]>
Liam Quinn <[email protected]> wrote:
> >When in doubt, I refer to the W3C for the correct answer.
> >It is a matter of knowing where to look when an error occurs. In my mind,
> >W3C is always the definitive source.
> FWIW, the W3C Validator is not infallible.
That's true, and as Daniel said, some folks are trying to fix it.
> http://www.w3.org/Press/1998/DOM-REC.html.ja
I'm sure this is valid, because I wrote it and validated it ;-)
> http://www.htmlhelp.com/ja/reference/html40/
BTW, though WDG HTML Validator found no errors in the following document:
but actually it's not valid. It's syntactically correct, but its
character encoding doesn't match declared charset. HTTP response
header says it's encoded in ISO-2022-JP, but actually it's encoded
in Shift_JIS.
The result is devastating; it makes the document totally unreadable
when one uses a browser which respects charset parameter. Some browsers
in Japanese Windows platform can read it regardless of the charset
parameter when it's encoded in Shift_JIS, so sometimes authors don't
realize this problem.
Anyway, declaring correct character encoding scheme is critical to
make your documents accessible.
Masayasu Ishikawa / [email protected]
W3C - World Wide Web Consortium
Received on Wednesday, 11 November 1998 10:58:53 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/51122 |
RE: [w3c-wai-ig] side menu and screen readers
From: Jon Hanna <[email protected]>
Date: Fri, 2 Mar 2001 11:01:13 -0000
Hash: SHA1
> the use of
> problem is
> before getting to the content on the page.
> interested in comments on this issue.
There are a few things you can do to deal with this.
One is to have a table structure as such (I apologise for the ASCII
art, but can't think of a better way to describe this:
+----+Main |
| |Content|
|Menu| |
That is you have a small blank cell, then a cell to the right with
rowspan=2, then a cell on the next row with the menu. The effect of
this is that you have a left-aligned menu, but it appears later in
the source code, and therefore later to many screen readers.
On the plus side it also makes the main content earlier in the page,
and therefore gets a higher relevancy rating in many search engines.
However a disadvantage is that because it's all one table it will
render slower on most graphical browsers than if you had a floating
left table for the menu.
Another strategy is to have a right-hand side menu, and then use CSS
to position it to the left. If you are careful with the table layout
then non-css graphical browsers will have a workable menu, but on the
right hand side.
Yet another strategy is to simply have the menu on the right hand
side. There are a lot of advantages to this; the main content
downloads first, the natural (in Latin languages) reading order
matches the most like use-scenario (that is someone will want to read
the content and then select from the menu, which will match the
natural reading order of Latin languages, in going left to right),
and finally the menu items are those items most likely to be selected
by a mouse, while the main content links are those items most likely
to be selected from the keyboard - having a right hand menu means
that the main content will automatically be earlier in the tab order,
and the menu will be near to the scroll bar on left-to-right systems,
which is an ergonomic advantage. The down side is that people are
used to left-hand menus, so you may have a usability-from-convention
Version: PGPfreeware 6.5.1 Int. for non-commercial use
Received on Friday, 2 March 2001 06:00:49 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/51125 |
problems installing annotea
From: Richard Kaye <[email protected]>
Date: Tue, 19 Nov 2002 11:20:11 +0000
To: [email protected]
Message-Id: <[email protected]>
I have just set up a new linux box (running SuSE 8.1). Apache
(including cgi-bin) and mySQL seem fine. (Of course they were
pre-installed using the SuSE RPM's.) I then tried to install annotea
from cvs using the instructions in
I inserted the apache script into the working httpd.conf file.
(I understood that access control and algae are not strictly
necessary, so for testing purposes I omitted them -- I will return
to these steps later.)
When I point a browser at
I get the unhelpful single line
died with Undefined subroutine
&W3C::Util::W3CDebugCGI::LogEntry::__NR_gettimeofday called at
/usr/lib/perl5/site_perl/5.8.0/i586-linux-thread-multi/bits/syscall.ph line
in the browser window. There is no error log entry.
The only thing I can deduce from this is that perl is trying to tell me
something (an error message or debugging info) but because of
a missing subroutine or module or something, it can't.
Please could someone help?
Many thanks
Richard Kaye
Received on Tuesday, 19 November 2002 06:27:39 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/51126 |
XSL WG Comments on Chairacter Model WD
From: Mark Scardina <[email protected]>
Date: Fri, 28 Jun 2002 12:54:58 -0700
Message-ID: <[email protected]>
Below are XSL WG compiled comments/issues on the I18N Character Model
Working Draft located at http://www.w3.org/TR/2002/WD-charmod-20020430.
1) Section 2 Conformance
"[S] Every W3C specification MUST conform to the requirements applicable
to specifications, specify that implementations MUST conform to the
requirements applicable to software, and specify that content created
according to that specification MUST conform to the requirements
applicable to content. [S] If an existing W3C specification does not
that specification SHOULD be modified in order to conform."
[XSL]Why is it that every spec MUST but subsequent specs only SHOULD
meet this requirement? Is the intent here to permit current
non-conforming specs to maintain backwards compatibiltiy in future
releases? This is an XSL requirement.
2) 3.1.3 Units of visual rendering
"[S] Protocols, data formats and APIs MUST store, interchange or process
text data in logical order."
[XSL]This appears to be higher level of conformance than necessary for
interoperability. Why do internals need to be dictated as long as there
is exernal conformance?
3) 3.1.5 Units of Collation
"Note that, where searching or sorting is done dynamically, particularly
in a multilingual environment, the 'relevant language' should be
determined to be that of the current user, and may thus differ from user
to user."
[XSL]Suggest the "should" become "SHOULD" to bring it to the level of a
4) 3.1.7 Summary
"[S] When specifications use the term 'character ' it MUST be clear
which of the possible meanings they intend.
[S] Specifications SHOULD avoid the use of the term 'character' if a
more specific term is available."
[XSL]In 3.1.7 it is stated that specifications must make it clear "which
of the possible meanings" of the word "character" is intended. But it's
not explicit what the "possible meanings" are. Where do we read that one
of the possible meanings is "a Unicode code point"?
[XSL]There should be examples of this as the spec itself is an offender
here. While it could be explicitly stated in line with their own
requirement, We read it that the possible meanings were "Units of aural
rendering", "Units of visual rendering", "Units of input", "Units of
collation" and "Units of storage".
[XSL] It is very difficult to conform to the second requirement in
3.1.7, as is illustrated by the fact that the Character Model document
itself fails to conform to it: see the immediately following section
5) 3.2 Digital Encoding of Characters
IANA charset identifier. Given a sequence of bytes representing text and
a charset identifier, one can in principle unambiguously recover the
sequence of characters of the text."
[XSL]There are other legal identifiers other than IANA. We should not
be restricted to these.
6) 3.5 Reference Processing Model
" [S] Specifications MAY allow use of any character encoding which can
be transcoded to Unicode for its text entities.
[S] Specifications MAY choose to disallow or deprecate some encodings
specified behavior MUST be the same as if the processing happened as
The encoding of any text entity received by the application implementing
the specification MUST be determined and the text entity MUST be
interpreted as a sequence of Unicode characters - this MUST be
equivalent to transcoding the entity to some Unicode encoding form ,
adjusting any character encoding label if necessary, and receiving it in
that Unicode encoding form. All processing MUST take place on this
sequence of Unicode characters. If text is output by the application,
the sequence of Unicode characters MUST be encoded using an encoding
chosen among those allowed by the specification. [S] If a specification
Reference Processing Model MUST be applied to all entities."
[XSL] It may be less confusing to have these requirements separated with
a clarifying sentence, breaking these out under a clarifying context.
Is this intent to forbid entity representation of non-Unicode
7) 3.7 Character Escaping
"Certain guidelines apply to content developers, as well as to software
that generates content: ... [I] [C] Choose an encoding for the document
that maximizes the opportunity to directly represent characters and
minimizes the need to represent characters by markup means such as
character escapes. In general, if the first encoding choice is not
satisfactory, Unicode is the next best choice, for its large character
repertoire and its wide base of support."
[XSL]The last bullet immediately before the section heading of section 4
seems strange. Grammatically, it is hard to parse, and is in the
imperative mood which is not used elsewhere. Semantically, the statement
that "If the first encoding choice is not satisfactory, Unicode is the
next best choice" seems very odd. Surely (a) Unicode is always the first
choice, and (b) Unicode is not an encoding? Also the term "satisfactory"
is far too vague for a specification. We also question the
appropriateness of these "guidelines" in the spec body. They seem more
appropriate for a note or appendix.
[XSL]We have a concern about the guideline preventing new character
escaping syntax.
8) 4.4 Responsibility for Normalization
"[C] In order to conform to this specification, all text content on the
Web MUST be in include-normalized form and SHOULD be in fully-normalized
[XSL]The impacts of this requirement on XSLT and other infoset
"pipeline" type processes are still unclear to us.
[XSL]For instance, XSLT and many other specifications are designed
around an infoset "pipeline" so that various processes can transform,
augment, or otherwise manipulate content. A final step in a pipeline
often involves serialization of the infoset. It appears to us that
serialization of an infoset according to the Character Model may result
in either significant manipulation of the data within that infoset
(resulting in a loss of data fidelity) or failure to serialize. In
either case, an upstream process such as an XSLT transformation cannot
trust that its output can be successfully processed further on in the
pipeline, without adopting normalization rules at the infoset level as
well. The practical inability to limit normalization to text content on
the Web concerns us. The implications of this are not adequately
discussed in the Character Model spec.
[XSL]Without a clear idea of the implications of the Character Model
upon the tendency to rely on the XML Information Set instead of upon
text for composing processes within a system, we cannot agree to the
mandate for normalization.
9) "[S] [I] A text-processing component that receives suspect text MUST
NOT perform any normalization-sensitive operations unless it has first
confirmed through inspection that the text is in normalized form, and
had been obeyed."
[XSL] The exception for private agreements is crippled by the observable
results restriction thus when all is said and done any suspect text will
always remain.
[XSL] Section 4.4 appears to require that XML be changed to disallow the
use of a composing character as the first character in an entity. This
change would be backwards incompatible. XSL WG specifications such as
XSLT and XPath must continue to work with all XML well-formed documents.
[XSL] Since the contents of an XML text node are "suspect text" (there
is nothing to prevent use of a composing character as the first
character in a text node), section 4.4 appears to be saying that XPath
must disallow operations such as substring() unless the text is
inspected and found to be normalized. We do not believe that users want
to pay the high cost of this feature.
10) "[I] A text-processing component which modifies text and performs
normalization-sensitive operations MUST behave as if normalization took
place after each modification, so that any subsequent
normalization-sensitive operations always behave as if they were dealing
with normalized text."
[XSL] The fourth requirement in section 4.4 is labelled [I], but XPath
implementations have to do what the XPath specification says, so this is
actually an [S] requirement. The implication of this requirement is that
functions such as concat() should perform normalization. This is both
expensive and backwards-incompatible, we will have to examine whether it
is something where the benefits exceed the costs. This also seems to
violate the self-imposed limitation to only require conformance to
observable behaviors. How XPaths are handled within an XSLT Processor
should not be the subject of this spec as long as the results are
11) "[S] Specifications of text-based languages and protocols SHOULD
define precisely the construct boundaries necessary to obtain a complete
definition of full-normalization . These definitions MUST include at
least the boundaries between markup and character data as well as entity
boundaries (if the language has any include mechanism) and SHOULD
include any other boundary that may create denormalization when
instances of the language are processed."
[XSL] The requirement (still in 4.4) about defining construct boundaries
is very unclear when applied to a language that performs dynamic
manipulation of strings.
12) "[S] Specifications MUST document any security issues related to
[XSL] The requirement "Specifications MUST document any security issues
related to normalization." is untestable on its face and should be
13) 6. String Identity Matching
"[S] [I] Forms of string matching other than identity matching SHOULD be
performed as if the following steps were followed:
Steps 1 to 3 for string identity matching .
Matching the strings in a way that is appropriate to the application."
[XSL] It is unclear whether the procedure for string identity matching
in section 6 establishes a requirement for expansion of %HH escapes in
URIs, especially when comparing namespace URIs, where such expansion has
not traditionally been performed. Section 8 should give guidance on
Mark V. Scardina Group Product Mgr & XML Evangelist
CORE & XML DEVELOPMENT GROUP E-mail: [email protected]
Web Site: http://otn.oracle.com/tech/xml/
Received on Friday, 28 June 2002 15:56:43 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/51147 | Switch to Desktop Site
Obama shooting for Montana now?
Jake Turcotte
About these ads
With less than 48 hours to go before Election Day, talk of the usually reliable red state of Montana going Obama is being seen as a real possibility.
Both CNN and NBC have moved the Big Sky state from leaning McCain to toss-up.
This isn't the first time Montana has been in the news this election cycle.
You'll remember Montana Governor Brian Schweitzer was the surprise hit of the Democratic National Convention two months ago. The Governor electrified the crowd causing the networks -- which normally ignore whom they consider b-listers -- to stop their blabbering pundits to carry the high-spirited speech.
“We need all of you to stand up,” he yelled. “Colorado! Stand up! Florida! Stand up! Pennsylvania! Get off your hind end! In the cheap seats! Stand up! We want to hear you from Denver to Detroit, from Montana to Mississippi, from California to Carolinas.”
You want to talk about folksy? Montana's governor makes Sarah Palin sound like the Queen of England. (See one of his campaign ads below).
Page: 1 | 2 | 3 |
global_01_local_0_shard_00000017_processed.jsonl/51156 | Subject: Re: README: kernel pty struct allocation change
To: Andrew Brown <>
From: Todd Vierling <>
List: current-users
Date: 09/11/2000 10:32:01
On Mon, 11 Sep 2000, Andrew Brown wrote:
: indeed! and...isn't pcvt gone?
Yes, but ttyvX still isn't available for i386 to use, I believe.
: does it work? i don't see a way for it to exit the
: while/switch without returning an error...maybe i'm reading it wrong?
It's backpedaling into sys_open() to get a new fd and then doing a very
interesting trick, used by the /dev/fd nodes. {struct proc}->p_dupfd is
Magic. If a filedescriptor is put here, and a device open() call returns
ENXIO, the created file will be that fd, instead of a fd connected to the
ptmx device. In essence, the user gets an open file on /dev/pty??.
This is how the returned file contains a st_rdev that isn't the same device
number as the /dev/ptmx device itself (see prior post). It's not a pretty
hack, but it works; ideally, we should have a better way to handle
"masquerading" devices.
-- Todd Vierling <> * |
global_01_local_0_shard_00000017_processed.jsonl/51158 | Subject: Re: isspace(char) can't be used with -Wall -Werror
To: None <>
From: Magnus Henoch <>
List: current-users
Date: 03/31/2006 01:00:53 (Christos Zoulas) writes:
> It is a feature. Linphone should be fixed to read isspace((unsigned char)d).
Ah... now I see. If (unsigned char)'X' > 127, then (int)(signed
char)'X' != (int)(unsigned char)'X'. That didn't appear to me
before. Thanks for the enlightenment!
In defense of the Linphone developers, their code wasn't as silly as
mine: a function receives a char*, and examines its input. I'll
report this to them. |
global_01_local_0_shard_00000017_processed.jsonl/51163 | Subject: Re: RAID disk failure
To: Jukka Marin <>
From: Wojciech Puchar <>
List: netbsd-users
Date: 12/26/2001 18:47:24
> data errors).
> These disks are no longer available (surprise, surprise!), so I will
> probably get a bigger disk or two to replace the dead one.
> What is the easiest way of moving the RAID1 system to two bigger disks?
> and still be limited to 45 GB of storage (which doesn't seem to be too
one way is to do this and use another 15GB as non-raid storage. another to
ccd your 45GB disk with one on non-raid to make about 60GB, best is to buy
2 60GB (or 100GB?) disks and copy everything then remove&sell 45GB |
global_01_local_0_shard_00000017_processed.jsonl/51169 | Subject: FPU error on a DS31000
To: None <[email protected]>
From: Thorsten Frueauf <>
List: port-pmax
Date: 11/12/1997 17:17:10
One of my DS3100 always stops on power-up at Test 4. I tryed different
tests by hand, and `t F` showed the following:
t F
checking FPU
FPU - error # 00000007
Has anyone and idea what this error means?
The machine does work well from what I can tell, btw. - just have to reset
each time after power-on. Strange... |
global_01_local_0_shard_00000017_processed.jsonl/51173 | Subject: Re: ICMP handling for a fragmented packet.
To: Charles M. Hannum <>
From: Rohit Dhawan <>
List: tech-net
Date: 03/19/2001 11:51:44
> On Mon, Mar 19, 2001 at 10:57:34AM +0530, Rohit Dhawan wrote:
> >
> > Consider a packet, which gets fragmented while traversing through
the network, such that the Fragment One has the higher layer header (say TCP
header, with associated port numbers etc.). Lets us consider a case when
(say) fragment Seven's TTL becomes zero & an ICMP message is sent back to
the Message Source. At the source, there is no way of identifying the port
number of the originator of the message.
> > In such a scenario, could you explain how would the Source handle
the packet?
> You're thinking too hard. ICMP TIME EXCEEDED is basically ignored by
> a host, so the presence or absence of connection information in the
> packet is irrelevant.
TLL was just an example, my real concern is regarding the handling of ICMP
messages associated with fragments other than the first fragment, as they
donot have any information of the higher layer protocol. |
global_01_local_0_shard_00000017_processed.jsonl/51175 | Subject: Re: Overhauling PLIST command set
To: Jeremy C. Reed <>
From: Thomas Klausner <>
List: tech-pkg
Date: 01/22/2006 01:07:06
On Fri, Jan 20, 2006 at 02:43:50PM -0800, Jeremy C. Reed wrote:
> Is there any expected date or code to test to begin implementing the
> following @shareddir?
> I use binary packages on machines where I use pkg_add to replace (so the
> packages that depend on it still are installed). I often get complains due
> to attempts to remove directories that other packages share.
After some more discussion I arrived at the opinion that pkgsrc
should handle all directories automatically by proper refcounting.
However, the refcounting should be in the pkgtools themselves
instead of shell scripts like currently, to avoid quoting issues
and performance problems.
I have not started working on this though. |
global_01_local_0_shard_00000017_processed.jsonl/51183 | Take the 2-minute tour ×
Recall that we call a map $i: A \rightarrow X$ a cofibration if it has the homotopy extension property. We will say a pointed space $X$ is well-pointed, if the inclusion of the basepoint $\{ * \} \hookrightarrow X$ is a cofibration.
A pointed cofibration $i: A \rightarrow X$ is a based map of pointed spaces that has the homotopy extension property with respect to homotopies respecting the basepoint. Note that a cofibration is always a pointed cofibration, but the converse is not true.
It is stated in May's "Concise Course in Algebraic Topology", although not proved, that if a map of well-pointed spaces is a pointed cofibartion, then it is already a cofibration. I've been trying to do it on my own using "the box method", but it didn't lead me anywhere.
How does one go to prove such statements? Is there any general method, any useful tricks?
I assume that all spaces are compactly generated weakly Hausdorff.
share|improve this question
add comment
1 Answer
up vote 0 down vote accepted
This is lemma 1.3.4 in May's "More concise algebraic topology", it looks very technical.
share|improve this answer
add comment
Your Answer
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.