id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00002368_processed.jsonl/29084 | Packaging Design — BP&O
Hair Solutions by Paul Belford Ltd.
Opinion by Richard Baird
Logo, branding, packaging and campaign by Paul Belford Ltd. for Hair Solutions, a personalised shampoo enhancer
Hair Solutions is an enhancer, made from botanical concentrates, that can be added to any brand of shampoo, personalising it to meet 66 different haircare scenarios through a combination of formulations directed at 6 categories (normal, dry, wavy, flaky and colour-treated and fine) and 11 concerns (brittle, dry, oily, thin, wavy or colour-treated, split-ends, frizz, low-shine or volume issues and curl definition). To help users identify the perfect product, the line will be supported by an online hair-quiz, and a brand identity designed by Paul Belford Ltd. This included logo, packaging design and initial launch campaign.
Continue reading this article
andSons Chocolatiers by Base Design
Opinion by Richard Baird.
Continue reading this article
Rare Harvest by Marx Design
Opinion by Richard Baird.
New packaging by Marx Design for Rare Havest, a limited edition Mānuka honey from The True Honey Company
Continue reading this article |
global_01_local_0_shard_00002368_processed.jsonl/29085 | Explore BrainMass
Explore BrainMass
Sampling Distribution, Mean and Standard Deviation
See attachment for better symbol representation.
1) A manufacturer of paper used for packaging requires a minimum strength of 20 pounds per square inch. To check on the quality of the paper, a random sample of 10 pieces of paper is selected each hour from the previous hour's production and a strength measurement is recorded for each. The standard deviation σ of the strength measurements, computed by pooling the sum of squares of deviations of many samples, is know to equal 2 pounds per square inch, and the strength measurements are normally distributed.
a) What is the approximate sampling distribution of the sample mean of n = 10 test pieces of paper?
b) If the mean of the population of strength measurements is 21 pounds per square inch, what is the approximate probability that, for a random sample of n = 10 test pieces of paper, ¯x < 20?
c) What value would you select for the mean paper strength μ in order that P (¯x < 20) be equal to .001?
2) Suppose a random sample of n = 25 observations is selected from a population that is normally distributed, with mean equal to 106 and standard deviation equal to 12?
a) Give the mean and standard deviation of the sampling distribution of the sample mean ¯x.
b) Find the probability that ¯x exceeds 110
c) Find the probability that the sample mean deviates from the population mean μ = 106 by no more than 4.
© BrainMass Inc. brainmass.com October 9, 2019, 4:38 pm ad1c9bdddf
Solution Summary
This solution shows step-by-step calculations to determine sampling distribution, probabilities of test paper mean, mean paper strength, mean, standard deviation and probabilities of normally distributed population. All workings are shown with brief explanations. |
global_01_local_0_shard_00002368_processed.jsonl/29104 | Griller's Bundle
• 2 bison sirloin steaks
• 2 packs of bison burgers (8 patties)
• 2 packs of bison hot dogs
Grilling time means steaks, burgers, and hot dogs--and Buck Wild Bison has you covered on all fronts! Get 2 large bison sirloin steaks, 8 six-ounce bison burgers, and 2 packs of our bison hot dogs. This bison meat bundle will take care of your next cookout, so order today and receive fast shipping.
Enjoy our delicious, farm-raised bison meat. Better taste--better for you!
Enter to Win
bison tenderloin
Enter to win a 2 lb. bison tenderloin--over a $100 value! We'll also send you monthly deals, cooking tips, and a code for 10% off your first order! |
global_01_local_0_shard_00002368_processed.jsonl/29180 | Category Archives: drama
Is Free Will really FREE?
This gallery contains 3 photos.
What would you do if you found out your free will to make any choice you want is suddenly not free? Would you stand and fight or run and hide? The Adjustment Bureau asks and answers the very same questions … Continue reading
This gallery contains 2 photos.
|
global_01_local_0_shard_00002368_processed.jsonl/29181 | Thursday, September 01, 2011
Community development is one my short list of obligatory reads, and always has great analyses of Open Source projects (and I can recommend getting a subscription). Last week there was a good post on collaborative development by Jake Edge based on a talk by Clay Shirkey. It discusses some observations on how large collaborative projects work. This awareness applies to smaller cheminformatics projects too, and will help a project grow. Three principles are outlined, and one goes like:
That might appear to be a very large-scale collaboration, but it's not, he said. If you graph the contributions, you soon see that the most active contributors are doing the bulk of the work, with the top contributor doing around 500 edits of their own. The tenth highest contributor did 100 edits, and the 100th did 10 edits. Around 75% of contributors did only one edit ever.
That same pattern shows up in many different places, he said, including Linux kernel commits. These seemingly large-scale collaboration projects are really run by small, tight-knit groups that know each other and care about the project. That group integrates lots of small fixes that come from the wider community. Once we recognize that, we can plan for it, Shirky said.
This should be familiar to many of us. At least to the CDK project, which has a very small core, and too a much larger group of people who make small edits. What the above analysis does not describe, is that those small commits often can be crucial to the impact of the project. For example, the commit by Thorsten Flügel that led to a significant speed up. A small fix, but a major impact.
But, at the same time, us core CDK developers have to accept this, and live with it. This is one of the reasons that code must be peer reviewed, because after the patch is supplied, the maintenance is mostly on the shoulders of these core developers. I learned that the hard way. It's a bit like the learning process used by StackExchange also outlined in the write up.
Therefore, it's up to the core developers to educate potential contributors and make the contribution as simple as possible. GitHub, also discussed in the write up, does great work indeed. Fixing spelling errors (or adding missing period after first JavaDoc sentences) is as simple as getting a GitHub account, and hitting the 'Edit this file' button on the page showing a CDK source file, and start working.
Otherwise, the CDK community is very helpful in creating patches. You just have to ask, e.g. on our #cdk IRC channel. And, if there is enough interest, I am more than happy to organize a 'Making a CDK patch from scratch with Git and Ant' crash course.
No comments:
Post a Comment |
global_01_local_0_shard_00002368_processed.jsonl/29194 | hwid: Change !region to use it own numeric mapping.
Per offline discussion we believe there is no need to maintain original
mapping in selective region tag because
- That was not really requested before.
- Maintaining values means HWID config must increase reserved region
field length, which also makes it incompatible.
TEST=make test
Change-Id: Ia2d1f2ebb7382a869513d845e66ef1af4804b57e
Original-Reviewed-On: https://chromium-review.googlesource.com/368501
Original-Change-Id: Ie5f581f31cc8b6392465f84941ec73937805e5be
Reviewed-on: https://chromium-review.googlesource.com/368563
Commit-Queue: Hung-Te Lin <[email protected]>
Tested-by: Hung-Te Lin <[email protected]>
1 file changed |
global_01_local_0_shard_00002368_processed.jsonl/29198 | Die Shark! Die!
Thanks to Noah Berlatsky for a much improved title!
Jaume Coller-Serra’s new film The Shallows follows Blake Lively in a test of wills against a great white shark. Apart from an unintentionally farcical and groan-inducing last act, it’s a pretty well shot and acted story. It is one of countless stories about wild beasts threatening the lives of humans. Most of these are, from a statistical or scientific perspective, no less ridiculous than The Shallows‘ silly conclusion. These stories almost always involve absurd science. And towards what end that bad science is deployed tells us a lot, as does the selection of which killer animals are portrayed.
In The Shallows Blake Lively’s character is out surfing when she happens upon a whale carcass. A shark near the carcass sees her as a potential meal and decides to have a bite to eat. Over the next day the shark ignores the massive quantity of food available with the whale carcass while stalking Lively, and during that time eats two and a half other people.
All this is exceedingly unlikely. The shark ate somewhere around 200kg of people over those two days which is, using the most conservative estimates, around two months of food for an adult great white (other studies suggest this is closer to six months worth of soylent green). So the shark ignores (or leaves, it’s not clear) a massive whale carcass which could feed a host of sharks for months and instead goes after a bunch of swimmers and surfers that don’t have the yummy (for sharks) smell of rotting meat. And it does so in order to overeat by quite a bit! For contrast in the infamous 1916 New Jersey shark attacks a shark ate a maximum of .3 people over twelve days (though it killed four).
This is common in these kinds of stories. For example the T-Rex in Jurassic Park should be done eating after she eats the company stooge. That’s (probably) enough calories for a T-Rex for two days. That it keeps hunting seems pretty unlikely. The shark in Jaws eats even more beyond its likely diet. And it is exactly this voraciousness that identifies the creatures as antagonists in these stories.
There is a species power dynamic in play obscured by this. My back of the envelope math says humans comprise about .0000042% of deaths in fatal human-shark encounters. No big surprise here. It’s common enough knowledge that humans kill exponentially more sharks than the other way around. And given the challenge in imagining a shark’s point of view, it isn’t all that surprising that humans with almost no exceptions tell the stories of those .0000042% of fatalities rather than the 99.9999958% percent of them. Sure, the Discovery Channel trots out the annual shark slaughter statistics during “Shark Week” but they’re invariably mixed with stories of shark attacks lending a false narrative symmetry even as the statistical symmetry is denied. Man-eating bear, wolf, lion, snake and other such stories all follow this same pattern.
This is how power generally works, both between our species and others and inside our own species. The oppressive relationship is inverted no matter what the science says. So despite all populations using and selling drugs at nearly identical rates, it is Black people who are portrayed as the drug-dealing criminals thus positioning them not as victims of racist mass incarceration, but as justifications for the oppressive system. Despite Israel dispossessing Palestinians on a daily basic, it is Palestinians that are portrayed as the violent aggressors, much as natives are commonly portrayed in US Western stories. The dynamic is analogous to how the tv show Zoo tells of a worldwide animal revolt that threatens humanity while we are in the midst of an anthropocene/capitalocene mass extinction event. The bad science of insatiable predators is deployed justifies the bad practice of exterminating them.
The inter- and intra-species analogies are, of course, imperfect even as the racist narratives invoke a certain dehumanization and animality. But the racialized component of which killer animal stories are told tells us just as much about inverted narratives of threat and power. For some animals do kill, and even kill and eat, vast numbers of people every year. Blake Lively will likely never star in one of these stories.
Nile crocodiles kill somewhere between several hundred and several thousand people every year in Africa throughout their range. We don’t even have sound estimates because relatively few resources are dedicated to tracking African deaths. Crocodiles eat people on a daily basis because people have to spend so much time in crocodile habitats with minimal protection. Though there is nothing that would end crocodile attacks entirely, this largely isn’t a problem of reptilian predation , this is a problem of capitalism and colonialism. The stories told of crocodiles eating humans are instead like Lake Placid, a fun film that is science fiction both because of the vast numbers of people consumed and because of which people are consumed. Out of some three dozens feature lengths films about killer crocodiles and alligators, I know of only one that takes place in Africa, 2006’s Primeval, a racist story of white people in constant danger from both Burundians and the crocodile.
Though not eating us, snakes kills tens of thousands of people every year, predominantly in South and Southeast Asia (and to a lesser extent in Africa and parts of South America). These are predominantly tied to poor labor and housing conditions which are, again, a problem of capitalism and colonialism. The Anaconda tetralogy and Snakes on a Plane do not tell these stories.
Dominating both of these are mosquito-related deaths which number in the hundreds of thousands every year despite malaria being, for the most part, easily treatable were resources dedicated to the task.
These killer animal stories are not told on screen because the victims aren’t fully human in the eyes of those choosing what stories get produced. And those stories with fully human victims like The Shallows invariably invert the material world predator-prey relationship. The exceptions are exceedingly rare and even then are told with circumscribed or regressive politics. The Ghost and the Darkness and Prey for example, are pro-colonialism stories of animals preying on humans based upon the man-eating lions of Tsavo. The body count is attributed to lions and not the colonial railroad project (a dam in Prey‘s version) that brought people into the lions’ habitat in the first place. But telling such stories can illuminate vast political economic problems and indicts the systems that produce the death tolls. Capitalism and colonialism continually produce horror stories of animals killing people with body counts beyond all but apocalyptic imaginations. Jaws simply cannot compete. |
global_01_local_0_shard_00002368_processed.jsonl/29200 | Gangland Undercover
Program Overview
14 x 60 min (2 seasons)
Cineflix Productions
History and A & E (US)
The only man brave enough to sneak into three outlaw biker gangs and live to tell the tale, Charles Falco, author of “Vagos, Mongols and Outlaws”, goes from convict to infiltrator as he secretly documents the Vagos’ illegal activities and ultimately brings them to justice. With the real Charles Falco starting each episode in a silhouetted interview, his story is brought to life in this fact-based drama series that sees Falco work as an informant for the Feds on a covert mission inside the dangerous Vagos’ world of violence, murder, and drug trafficking. Having climbed the gang’s ranks while facilitating 62 arrests, Charles Falco exposes how he crippled the criminal enterprise from the core of the biker underworld in this mind-blowing true story Gangland Undercover. |
global_01_local_0_shard_00002368_processed.jsonl/29220 | The Semmelweis reflex
It seems unbelievable that doctors would ignore this clear evidence that hand washing could reduce the death rate among patients. The reason for their reaction what that this practice contradicted generally held beliefs regarding the cause of disease.
Semmelweis’s observations conflicted with the established scientific and medical opinions of the time. The theory of diseases was highly influenced by ideas of an imbalance of the basic “four humours” in the body, a theory known as dyscrasia, for which the main treatment was bloodlettings. Medical texts at the time emphasized that each case of disease was unique, the result of a personal imbalance, and the main difficulty of the medical profession was to establish precisely each patient’s unique situation, case by case.
The findings from autopsies of deceased women also showed a confusing multitude of physical signs, which emphasized the belief that puerperal fever was not one, but many different, yet unidentified, diseases. Semmelweis’s main finding — that all instances of puerperal fever could be traced back to only one single cause: lack of cleanliness — was simply unacceptable. His findings also ran against the conventional wisdom that diseases spread in the form of “bad air”, also known as miasmas or vaguely as “unfavourable atmospheric-cosmic-terrestrial influences”. Semmelweis’s groundbreaking idea was contrary to all established medical understanding.
Eventually Dr. Semmelweis’s ideas were vindicated and the treatment he received led to the coining of a new term, the Semmelweis reflex.
The so-called Semmelweis reflex — a metaphor for a certain type of human behaviour characterized by reflex-like rejection of new knowledge because it contradicts entrenched norms, beliefs or paradigms — is named after Semmelweis, whose perfectly reasonable hand-washing suggestions were ridiculed and rejected by his contemporaries.
We can see the Semmelweis reflex in operation today in one area of scientific study, the origin and age of the earth.
The established scientific belief is that the earth is billions of years old and life evolved gradually over this long period of time. The fossils that are found all over the earth are supposedly evidence of this evolutionary process.
Some people have a different belief regarding the origin of the earth. We believe the Bible is true and God created the earth in six days. We believe there was a worldwide flood and the fossils are evidence that this flood actually occurred.
There is scientific evidence that supports the Bible. For example, the October, 2012, issue of Answers magazine, which is published by Answers in Genesis, contains a report on some evidence that shows the earth can’t be as old as is generally believed. You can read this report here:
Of course the Semmelweiss reflex will cause many to either ignore this evidence or try to explain it away. If you are willing to consider the possibility that the popular beliefs might be wrong here are some other sites you might be interested in:
Posted on January 10, 2015, in Bible study, creation and tagged , , , , , , . Bookmark the permalink. 1 Comment.
1. Excellent article. I’ve never heard of Semmelweis before, so this was a good read, and I like your connection to modern day scientific beliefs. Very true. I see a similar reaction from those who believe in evolution and billions of years all the time. It’s more of a knee-jerk reaction without reason. Those who believe in evolution rely on bias to support their belief, and they find it unbelievable that they could be wrong.
Tulips & Honey Hub
Christian, wife, mom, homeschooler, traveller
Way Truth & Life
Bible-Science Guy
Kingdom Pastor
Living Freely In God's Kingdom
The Lions Den
Discussing Biblical Authority
A Lawyer's Prayers
Truth in Palmyra
By Wally Fry
Squid's Cup of Tea
The Musings of a Messianic Homeschooler
His Eternal Word
%d bloggers like this: |
global_01_local_0_shard_00002368_processed.jsonl/29251 | February 25-26, 2020
J. Wayne Reitz Union
University of Florida
Gainesville, Florida
Join the Symposium Listserv!
Sponsorship Opportunities
Symposium Agenda
Poster Directory
Dates of Interest
Hotel Reservations
Through February 1, 2020
UF Sustainable Event Green Level Seal
Poster Directory
Please view the symposium poster presentations below. Presentations are grouped by topic, then alphabetically by presenter’s last name.
Harmful Algae Blooms (HABs) in Springs Lakes and Coastal Waters
First Name Last Name Organization Abstract Title
Maximiliano Barbosa UF/IFAS Effects of Glyphosate (Rodeo) on the Growth of Planktonic Cyanobacteria
Rachel Brewton Harbor Branch Oceanographic Institute, Florida Atlantic University Nutrient Over-Enrichment and Brown Tide Result in Light Limitation of Seagrass Communities in The Indian River Lagoon
Vincent Encomio UF/IFAS FL Sea Grant Extension Efforts of the Treasure Coast HAB Working Group
Yuting Fu University of Florida Water Institute Investigating Allelopathic Effects of Aquatic Weeds in Agricultural Sciences
Forrest Lefler University of Florida The Effects of Algaecides and Herbicides on a Microcystis Aeruginosa Bloom in Lake Okeechobee, Florida (USA)
Carlos Manzanas University of Florida Miniaturized Platform for In Situ Detection Of E. Coli in Water Samples
Andrew Ortega University of Florida Collecting Water Samples with Drones for Water Quality Surveys
Elizabeth Schroeder Florida Gulf Coast University Isolation, Genomic Identification, and Characterization of Cyanobacteria Species in Lake Okeechobee, Florida, USA
Cecilia Silva Sanchez University of Florida Development of a Multi-Class Cyanobacteria and Algal Toxin Detection Method
Osama Tarabih University of South Florida (USF) How Can the Lake Okeechobee System be Operated to Mitigate the Harmful Algal Blooms Problem?
Return to Top
Impacts of and Resilience to Climate Change Extreme Events and Sea Level Rise
First Name Last Name Organization Abstract Title
Maram Alrehaili University of Florida 3D Flood-Inundation Model of the Amite River in Baton Rouge Parish in 2016, Louisiana State
Savanna Barry University of Florida Building Resilient Living Shorelines with Low-Cost, Low-Impact Alternative Materials and Methods
Amit Bhardwaj Florida State University Florida Extremes in Anomalous Seasons
Taryn Chaya University of Florida iCoast: Deploying Advanced Water Sensor Technology to Monitor Water Quality
Audrey Goeckner UF/IFAS Carbon Dynamics of Urban Stormwater Ponds: Burial, Gas Flux, and DOM Composition
Yesenia Herrera United States Geological Survey Local-Scale Drainage, Runoff, and Recharge Delineation in the South Miami Heights Area
Chu-En Hsu University of Florida Structure of the iCoast Coastal Hazard Forecast System
Patrick Inglett University of Florida Vegetation Effects on Greenhouse Gas Production in Subtropical Wetland Soils of the National Ecological Observatory Network
Md. Monirul Islam International University of Business Agriculture and Technology Climate Change and Sea Water Rising: Challenges for Coastal Habitants in Bangladesh
Tricia Kyzar University of Florida Challenges and Opportunities for Sustaining Southeastern US Coastal Wetlands
Carly Narotsky FSU The Seasonal Predictability of the Anomalous Rainy Seasons of Florida
Merrie Beth Neely Global Science and Technology, Inc. GEO Aquawatch: The Global Water Quality Initiative
Woi Sok Oh University of Florida Effects of Combining Social and Hydrological Factors in Water Scarcity-Induced Migrations: Application to a Toy Agent-Based Model
Deepa Raveendranpillai Florida Agricultural and Mechanical University Impacts of Concurrent Extremes on Water Resources and Vulnerability Assessments
Christian Rivera University of Florida A Synthesis of Opportunities for Applying the Telecoupling Framework to Marine Protected Areas
Jamila Roth University of Florida Seagrass Ecosystems and Environmental Change: Effects of Multiple Stressors on Plant-Herbivore Interactions
Tracey Schafer University of Florida Impacts of Repeated Hurricane Disturbance on Dissolved Organic Matter Cycling Along An Aquatic Continuum in Northeastern Florida
Katherine Serafin University of Florida Disentangling Flood Drivers: Coastal River Flood Risk in a Changing Climate
Emily Taylor University of Florida Recovery of Nutrient and Energy Cycling Following Hydrologic Disturbances in Sub-Tropical Urban Streams
Mohsen Tootoonchi University of Florida Lethal Salinity Concentration Varies Among Vallisneria Americana Ecotypes
Stephanie Verhulst University of Florida Juncus Roemerianus Exhibits Stress Response to Elevated Salt Marsh Soil Salinity
W. Samantha Yuan University of Florida Floridans’ Love-Hate Relationship with Invasive Species: An Overview of Two Case Studies Highlighting the Complexity of Communication and Education
Return to Top
Sources Impacts and Management of Contaminants (Nutrients Pharmaceuticals PFAS Microorganisms Metals)
First Name Last Name Organization Abstract Title
Piyush Agade University of Florida GatorByte – An Open-Source Platform for Low Cost, Real-Time Water Resource Monitoring
Scott Augustine University of Florida Field-Scale Demonstration of the Sediment Bed Passive Fluxmeter at a CVOC Impaired Site
Rebecca Barber University of Florida Flocculation of Norovirus from Surface Water Using Skimmed Milk
Candace Barnes University of Florida Mechanistic Antiviral Activity of Chitosan Microparticles Against Bacteriophage MS2, A Human Norovirus Surrogate
Ranjit Bawa University of Georgia Impact of Land Cover on Groundwater Quality in the Upper Floridan Aquifer in Florida, United States
Rachelle Berger University of Florida Effects of Flooded Rice as a Summer Crop Rotation in South Florida Agriculture Production
Kyle Boutin Florida Gulf Coast University Wetlaculture: Utilizing Nutrient Pollution to Support Agricultural Crops in South Florida
Ronell Bridgemohan University Of Florida Microbial Source Tracking of Human and Animal Fecal Contamination in the Beaches and Rivers of Trinidad
Olivia Cacciatore University of Florida Investigating the Hydrologic Connectivity of Geographically Isolated Wetlands Using Solute Tracers
Savannah Cain University of Florida IFAS West Florida Research and Education Center Characterizing the Dynamics of Pollutants in Streams Draining Urbanized Areas in Northwest Florida
Keisha Castillo-Torres Interdisciplinary Microsystems Group Assessing Recreational Water Quality via Magnetic Isolation of Bacteria
Danielle (Dani) Cucchiara University of Florida College of Public Health and Health Professions Using Molecular Methods to Improve Metal Mixture Risk Assessment at Mining-Impacted Sites
Maite De María University of Florida, Gainesville Aquatic Exposure of Largemouth Bass and Florida Manatee to Glyphosate
Megan Donovan University of Florida Property Value Impacts of Proximity to the Cabot-Koppers Superfund Site in Gainesville, FL
Don Duke Florida Gulf Coast University Who Owns the Pond? Who Owns the Pollutant? Stormwater Detention Ponds and Pollutant Control in Suburban Southwest Florida
Don Duke Florida Gulf Coast University Drainage and Stormwater Detention Ponds in a Rapidly-Urbanizing Landscape, Southwest Florida
Madison Flint University of Florida Biogeochemical and Hydrological Controls on Nitrous Oxide Cycling in Karstic Aquifers
Charlotte Haberstroh University of South Florida Sources and Transport of (Micro)Plastic in Urban Rivers: Field Study in the Hillsborough River
Kira Hansen University of Florida Resilient and Sustainable Compact Bed Plasticulture for Watermelon Production in Florida
Fei He University of Florida Effects of Producers’ Risk Perceptions on the Choice of Nitrogen Application Rates: A Case Study of Florida Carrot Production
Md. Monirul Islam International University of Business Agriculture and Technology Impact of Industries Effluents to River Turag: Effect to Climate Change
Hajime Guillermo Kurita Oyamada University of Florida Toxicity Assessment of Novel Nanoparticles Engineered to Disperse Crude Oil Monitored Using a Gene Expression Biomarker in Fathead Minnow Juveniles
Hajime Guillermo Kurita Oyamada University of Florida Antineoplastic Agents: Environmental Prevalence and Adverse Outcomes in Aquatic Organisms
Samuel Kwakye University of Florida Evaluation of Water Use by Huanglongbing (HIB) Affected Citrus Trees in Florida
Dogil Lee University of Florida Impacts of Pasture, Hay and Row Crop Management Systems on Groundwater Quality and Quantity in the Santa Fe River Basin, Florida
Nima Madani College of Public Health and Health Professions Analysis of Chemical Fingerprints in Complex Haitian Water Mixtures
Victoria Morgan University of Florida Sensors Coupled with Risk and Decision Models for Community Water Management
Silvia Jessica Mostacedo Marasovic University of Florida Agricultural Production and Water Resources Quantity and Quality in the Florida Springs Region
Mohammad-Zaman Nouri University of Florida Tracking Steroid Hormones in Water, Suspended Particulates and Sediment in iCoast Project Using Targeted Mass Spectrometry
Andrew Oberhelman University of Florida Chloride Signature and Transport in an Urban-Agricultural Watershed
Megan Opincarne University of Florida Sublethal Effects of Glyphosate Exposure on the Native Florida Macrophyte Vallisneria Americana
Enrique Orozco López University of Florida Impact of Preferential Flow on Contaminant Transport through the Riparian Vadose Zone
Maryory Orton University of Florida Phosphate Removal from Canal Water in the Everglades Agricultural Area Using Activated Aluminum Oxide
Sara Phelps University of Florida Sediment Source Fingerprinting to Understand Magnitude and Sources of Phosphate in a Central FL Lake
James Phillips University of Florida Modeling and Application of Reduced Height Biosand Filters for Household Scale Water Treatment
Daniele Pinton University of Florida iCoast-Modeling: Modeling of E. Coli and Nutrients Dispersal in the Guana-Tolomato-Matanzas Lagoonal System and Adjacent Ocean
Karen Sem University of Florida Characterization, Abundance, and Diversity of Antimicrobial Resistant Pathogens in Wastewater Treatment Trains
Qianyao Si University of Florida Gulf Coast Research & Education Center How Do Urban Stormwater Infiltration Basins Treat Nitrogen Along a Hydrologic Flow Path Gradient?
Cody Stewart University of South Florida Evaluating the Removal Efficiency of Baffle Boxes in the Tampa Area
Andrew Wilson University of South Florida/Florida Gulf Coast University Examining Hydrologic Variables and External Factors on Nutrient Retention in Wetland Mesocosms in Southwest Florida
Austin Wise Florida Gulf Coast University Construction, Optimization, and Cost-Benefit Analysis of Floating Aquatic Treatment Wetlands for Phyto-remediation Pre-Treatment of Municipal Landfill Leachate Employing Saline-Tolerant Plants
Alexis Wormington University of Florida Effects of Particle Adsorption in Aquatic Environments on the Bioavailability of Pharmaceutical Contaminants in Fish
Quinn Zacharias University of Florida Phosphorus Management in the Everglades Watershed: Time for a Change in Paradigm?
Return to Top
Water Scarcity Allocation and Use
First Name Last Name Organization Abstract Title
Ali Al- Quraishi University of Florida Spatial and Seasonal Variations of the Mesopotamian Marshes Hydro-Pattern Under Natural and Regulated Flow Conditions
Jessica Balerna University of South Florida Characterizing Long-Term Ecological Responses to Hydrological Change in Impaired Depressional Wetlands in Tampa Bay, FL
Jason Bellino U.S. Geological Survey Water Budget for the Floridan Aquifer System
Lorna Bravo University of Florida Empowering Master Gardeners to Build their Own Gardening Floating Beds
Natalie Cooper University of Florida Finding Common Ground: Environmental Identity Among Stakeholders in Water Conflict
Joshua Epstein University of Florida Controls on Community Composition and Biodiversity in North-Central Florida Geographically Isolated Wetlands
Sandra Guzman University of Florida Using Groundcovered Beds as BMP for Citrus Water Management
Sadie Hundemer University of Florida Stories of the Floridan Aquifer: Framing of Water Issues in Regional Newspapers
Jennifer Jackson University of Florida Hydroxypropyltrimethyl Ammonium Chitosan Chloride Functionalized Graphene Oxide for Biofouling Control on Reverse Osmosis Membranes
David Kaplan University of Florida Quantifying the Effects of Upland Prescribed Burns on the Hydrology Of Geographically Isolated Wetlands in Florida Pine Flatwoods
Susan Lamb University of Florida Irrigation Decision-Making and Groundwater Use Outcomes in Western Kansas
Jason Merrick University of Florida Improving Agricultural Water Use and Water Quality Using Enhanced Irrigation Scheduling Methods
Inom Normatov Institute of Water Problems, Hydropower and Ecology AS Revision of Water Use Norms by the Economy Sectors of Central Asia in Condition of Climate Change
Nathan Reaver University of Florida Implementing Pine Plantation Silvicultural Production and Management Practices into the Soil and Water Assessment Tool (SWAT)
Kate Rotindo UF/IFAS St. Lucie County Extension Florida-Friendly Landscapingä Pilot Program in the Lincoln Park Community and Surrounding Area
Frank Schmitz Florida State University Should the Apalachicola River and Bay be Separate Projects?
Sharmin Siddiqui University of Florida Classifying Flow Regimes of the Amazon
Moonwon Soh University of Florida Simultaneous Adoption of Agricultural Best Management Practices in Florida: Tailwater Recovery System and Other Best Management Practices for Vegetables and Agronomic Crops
Qing Sun St. Johns River Water Management District Springshed Delineation of Wekiva River Basin Springs
Lory Willard University of Florida Evaluation of Pedotransfer Functions with Small-Scale Simple Field Measurements of Hydraulic Conductivity in Laikipia, Kenya
George Worrall University of Florida Assessing Satellite-Based Soil Moisture Products for Agricultural Areas in North Central Florida
Li Zhang Florida Gulf Coast University Ecological Succession, Hydrology, and Water Quality of Restored Urban Wetlands in South Florida
Return to Top
UF Water institute
The UF Water Institute brings together talent from throughout the University to address complex water issues through innovative interdisciplinary research, education, and public outreach programs. We envision a Water Institute at UF committed to addressing Florida issues while being recognized for providing solutions, science, and education for national and global water resource problems.
Duke Energy
Duke Energy is one of the largest electric power holding companies in the United States, providing electricity to 7.6 million retail customers in six states. They are transforming their customers’ experience, modernizing the energy grid, generating cleaner energy and expanding natural gas infrastructure to create a smarter energy future for their customers.
Stay Connected
Follow us on Twitter or Join the Symposium Listserv for any news or updates regarding the UF Water Institute Symposium.
Join our Listserv!
Past Symposia
View Past Symposia
Get in Touch |
global_01_local_0_shard_00002368_processed.jsonl/29260 | New paper on Remix Rights
When Ronald Coase passed away last year, it occurred to me that no one had really applied a Coasian framework to the characterisation of copyright regimes. I had been interested in these since reading Larry Lessig’s book, Remix. Remixing is where users take original content (such as the Harlem Shake) and put it in new forms. A famous example of remixing is this video.
Well I have a new (still preliminary) paper on the subject that provided some results that I must admit I hadn’t expected starting out. Here is the abstract:
This paper examines an environment where original content can be remixed by follow-on creators. The modelling innovation is to assume that original content creators and remixers can negotiate over the ‘amount’ of original content that is used by the follow-on creator in the shadow of various rights regimes. The following results are demonstrated. First, traditional copyright protection where the original content creators can block any use of their content provides more incentives for content creators and also more remixing than no copyright protection. This is because that regime incentivises original content creators to consider the value of remixing and permit it in negotiations. Second, fair use can improve on traditional copyright protection in some instances by mitigating potential hold-up of follow-on creators by original content providers. Finally, remix rights can significantly avoid the need for any negotiations over use by granting those rights to follow-on innovators in return for a set compensation regime. However, while these rights are sometimes optimal when the returns to remixing are relatively low, traditional copyright protection can afford more opportunities to engage in remixing when remixing returns are relatively high.
Basically, it turns out remix rights have a very desirable feature — they obviate the need for negotiations over content re-use: follow-on creators choose optimally (in the Coasian sense) whether to exercise those rights. However, it is still the case that in some circumstances, most surprisingly, where remixing is more valuable, that traditional copyright protection (where original content providers determine the extent of use) can lead to more remixing because it incentivises original content providers to generate content worthy of remixing.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/29267 | We love to give rewards to our loyal players. There are two types of rewards you will receive at Betable:
Cash is exactly what it sounds like, real money with no strings attached. These are given out in one-off offers like Cash Drops, and can be played with or withdrawn immediately.
Bonuses are extra money you can play with. Before you can withdraw a bonus it must be converted into cash. To do this you will need to meet the wagering requirement for that bonus. You will receive bonuses as a new user, through bonus spins and other promotions.
Playing with Bonuses
Available cash is always wagered before any bonus funds. Winnings from cash are added to your withdrawable cash balance. Winnings from bonuses are added to your bonus balance and are subject to wager requirement.
Bonuses are aimed at enhancing your enjoyment of our games and we operate a zero tolerance policy towards bonus abuse. Minimal risk wagering with bonus funds is not allowed and the maximum allowable wager with bonus funds is £5.
You can view your bonus balance at any time in your Betable Wallet by clicking on the ‘?’ next to your withdrawable cash balance.
Wager Requirements
You can turn a bonus into cash by wagering it on Betable-powered game. Once you wager your bonus enough times, those funds will be turned into cash. You can check your progress towards converting a bonus into cash on your Betable Wallet page by clicking on the ‘?’ next to your withdrawable cash balance. If you have more than one bonus, wager requirement will be met individually.
The default wager requirement for most promotions is 40X, meaning that if you have a £10 you would need to place £400 in wagers (£10 X 40 = £400). See our policy on wagering requirements for more information.
Withdrawing Bonuses
Once a bonus has been turned into cash by meeting the wager requirements you can withdraw it. If you have more than one bonus, each bonus will be turned into cash independently of the others. As each bonus is turned into cash your wager requirement will reset for the next queued bonus.
You can view your cash and bonus balances in your Betable Wallet. Cash can be withdrawn at any time, but you will not be able to withdraw bonuses until you have met the wager requirements. If you want to withdraw cash before meeting the wager requirements of your bonus, you will be required to forfeit the bonus.
For example: You deposit £20 and get a £20 matching bonus, so your balance is £40. You make a £5 wager on Slots and win £10. Your new balance is £45, but your withdrawable balance is £25. If you withdraw the £25 right then you will lose your £20 bonus: £45 - £20 = £25.
For more information please read our Terms and Conditions. |
global_01_local_0_shard_00002368_processed.jsonl/29273 | Node.js & Hapi.js: Building Enterprise Web Apps
Development · Software Engineering · Node.Js
Node.js & Hapi.js: Building Enterprise Web Apps
3.5 hours
English (US)
Hi, welcome to the course!!
Through the 11 chapters of this course, you'll learn
• What Hapi.js is
• How to setup a Node.js & Hapi.js server
• How to validate server input & payloads, then respond with proper error messages & status codes
• Server composition and configuration for additions & modifications
• How to serve simple static content & complex static content over HTTP
• How to simplify your server content using templates & Handlebars
• How to secure your web application with Basic Authentication and 3rd party Authentication providers like Azure Active Directory (AzureAD)
• How to connect to, query, insert and update records into a relational database
• How to monitor your server, output logs, and ship those logs to a centralized repository like Splunk
• How to easily generate Swagger API documentation
• How to unit test using Lab & Code
• How to unit test using Jest
• How to output code coverage reports
• So much more!
What version of Hapi.js is used in this course?
The latest version major version of Hapi.js - 17.x.x
Comments? Questions? Suggestions?
Leave a question in the QA section of this course!
• Build production ready, enterprise scale web applications
• Downloadable lectures, code and design assets for all projects
• Use modern JavaScript features (ES6)
• Implement authentication
• Write unit and integration tests
• Implement CRUD operations
• Get friendly and fast support in the course Q&A
• Your favorite text editor or IDE
Jeff Taylor
Jeff Taylor
Software Engineer & Adjunct Professor of Computer Science
Related Courses |
global_01_local_0_shard_00002368_processed.jsonl/29335 | A researcher looks at Aedes aegypti mosquitoes kept in a container at a lab of the Institute of Biomedical Sciences of the Sao Paulo University, on January 8 in Sao Paulo, Brazil.
In the last one to two years the Zika virus has infected more than a million people. Most have mild or no symptoms, but a pregnant woman can transmit the virus to her developing fetus leading to possible birth defects, stunted brain development and premature birth. The mosquito which can carry this virus is in about 30 states. Health officials say there’s no crisis now but that preparedness is essential. In February the Obama administration asked Congress for $1.9 billion in emergency funding, but so far, Congress has yet to act. Please join us to talk about the health risks posed by Zika and efforts to contain its spread.
• Dr. Anthony Fauci Director, National Institute of Allergy and Infectious Diseases, National Institutes of Health
• Maggie Fox Senior health writer, NBC News
• Dr. Jeanne Sheffield Division director, maternal-fetal medicine dept of gynecology and obstetrics, Johns Hopkins Medicine
• Phil Goodman Chair, Florida Keys Mosquito Control District Board
• 10:06:53
MS. DIANE REHMThanks for joining us. I'm Diane Rehm. U.S. health officials say the time is now to step up efforts to protect against the Zika virus. The mosquito-borne illness is spreading rapidly in South America and the Caribbean and can lead to babies being born with abnormally small heads and brain damage. Joining me to talk about what we're learning about this virus, what it might take to contain the threat, Dr. Anthony Fauci of the National Institutes of Health, Maggie Fox of NBC News.
• 10:07:31
MS. DIANE REHMJoining us by phone from Baltimore, Dr. Jeanne Sheffield of Johns Hopkins Medicine. Do join us, 800-433-8850. Send your email to [email protected]. Follow us on Facebook, send us a tweet. And welcome to all of you.
• 10:07:51
DR. ANTHONY FAUCIGood to be here.
• 10:07:51
MS. MAGGIE FOXGreat to be here.
• 10:07:53
• 10:07:54
REHMDr. Fauci, the Obama administration has asked for $1.9 billion in emergency funds for the Zika virus. Why?
• 10:08:08
FAUCIWell, the fact is we need it and the reason is that there is not designated Zika money. So now, we're left with a situation where -- when I say "we," we're talking about multiple agencies, the NIH, the CDC, the FDA, USAID, all have a role in the response both internationally and ultimately domestically and we need the $1.9 billion that the president has asked for. We're moving along anyway, but we still will not be able to do the job that's essential if we don't get that $1.9 billion.
• 10:08:39
REHMBut what will you do with that $1.9 billion?
• 10:08:45
FAUCIWell, for the NIH, we will be doing vaccine development. We'll be doing drug screening. We're doing what's called pathogenesis and natural history studies where we're trying to determine the scope of this disease, why we have such neurological abnormalities not only in the fetuses of infected pregnant women, but also we're seeing some other complications that we're seeing in people who are not necessarily women who are pregnant, but others who are developing these unusual difficulties.
• 10:09:12
REHMLike what?
• 10:09:12
FAUCIWell, for example, we don't know how many of these there are, but there are case reports of new interesting kinds of syndromes, we call acute myelitis, which involves the spinal cord, meningoencephalitis and there's this couple of case reports of a disease called acute disseminated encephalomyelitis. Again, there are only a few cases, Diane, so I'm not sure what the extent of it's going to be, but those little things that you see get you concerned that we're just starting to see the tip of what might be more difficult situations.
• 10:09:47
REHMSo what has happened in the last few weeks regarding Zika that creates this sense of urgency?
• 10:09:57
FAUCIWell, a number of things. First of all, the realization that there's relatively little doubt now that the deleterious effects that we're seeing in fetuses are due to the direct effect of the virus. There was some talk about maybe indirect things, co-factors. Very clearly now a number of studies, not only in following these pregnant women where we're seeing an array of abnormalities in the fetuses, but also when you do animal models, in vitro test tube studies showing this. The other thing, the CDC is playing a major role in this not only in South America, but also in the Caribbean.
• 10:10:31
FAUCIPuerto Rico is really quite vulnerable and the CDC is really putting a full court press on now in trying to address that as well as situations, potentially, here in our own United States, in the own continental United States.
• 10:10:44
REHMDr. Anthony Fauci of the National Institutes of Health. Maggie Fox, as senior health writer for NBC News, do you think that now people are becoming more aware of Zika and more concerned?
• 10:11:01
FOXWe're definitely getting more and more questions from people, more interest in the Zika stories. People are starting to ask, wow, I'm going to the Caribbean this summer, am I going to be affected by this? Wow. I'm thinking about getting pregnant. Is it going to affect me here at home? What happens if someone comes back from their vacation to South America or the Caribbean and brings the virus into my community, my neighborhood? Will it affect me?
• 10:11:27
FOXAs we know, Americans, like everyone else, are worried about themselves. They can hear about a virus that's spreading across Brazil. It seems far away and it seems like it's really not going to affect them. I think the rapid spread of the virus across all of the Americas is starting to catch people's attention and they're saying, oh, could it come here? We have mosquitoes here in the summer. Are they going to bring the virus to me? It's an interesting question and the CDC's recently updated its maps and said, well, actually, the one species of mosquito that's absolutely certain to carry this virus is actually a little more common and a little more widespread than we thought it was.
• 10:12:08
FOXIn fact, we've found it as far north as San Francisco, Kansas City, New York City. So this summer, it's possible that someone could come back with Zika virus, perhaps infect a mosquito and there could be local outbreaks I think and I think Dr. Fauci will confirm this. There won't be widespread outbreaks in the U.S. like there are in Brazil because of the way people live, but what we're trying to do is answer the questions that people have about how likely it is to affect their communities here in the states.
• 10:12:39
REHMTell me about the concerns you may be getting from people planning to attend the Olympics in Brazil.
• 10:12:50
FOXLots and lots of questions about the Olympics. People are really worried about that. If I go down there, will I get it? And not just people who might be women who are planning to get pregnant who might get pregnant because there are also some troubling reports, as Dr. Fauci mentioned, of other effects that the Zika virus is having on adults like Gilliam Barre Syndrome, which is that paralyzing syndrome that you can get from any virus or any bacterial infection.
• 10:13:16
FOXIt's rare, but because Zika is affecting so many people, we're seeing it very commonly. And then, some of these other rarer effects, the brain inflammation, the spinal cord inflammation that can really put you in the hospital for a long time with serious side effects, too.
• 10:13:31
REHMMaggie Fox is senior health writer for NBC News. Turning to you, Dr. Sheffield, tell us about the guidelines you've been working for for women who are thinking about getting pregnant or are already pregnant.
• 10:13:52
SHEFFIELDSo the Centers For Disease Control and Prevention took the lead on these guidelines actually back a number of months ago and the American Congress of OB/GYN and the Society For Paternal Fetal Medicine have all kind of joined with the CDC to develop guidelines both for people that are planning on travelling and also those that are pregnant and are -- have already travelled. And these guidelines address everything now from men and women who are considering becoming pregnant or getting pregnant and thinking about travelling to pregnant women that have already travelled or pregnant women whose partners have travelled and then exposed the mother of their child.
• 10:14:35
SHEFFIELDSo these guidelines now extend all across the reproductive age group in women and men and they're very clinical -- are clinician friendly so that both patients and clinicians can read these guidelines and get a good feel for how to manage their contraceptive choices.
• 10:14:56
REHMSo it's no longer just the women we're worried about. It's the men as well because if infected, they could then transmit that Zika virus to a woman who may become impregnated and bear the consequences.
• 10:15:18
SHEFFIELDAbsolutely. So once sexual transmission was confirmed and we've now had a number of cases that have been reported, then the male became the "vector." Instead of just the mosquito, now we have the male that could potentially infect a pregnant woman or a woman considering becoming pregnant at which point we then had to start considering guidelines for how are we going to deal with a male that travels and comes back who has a female partner who is interested in becoming pregnant.
• 10:15:46
REHMSo what kinds of tests are available for someone who thinks she or he may have contracted the Zika virus?
• 10:15:58
SHEFFIELDSo if they think they've contracted it and they've had symptoms recently -- we were saying with seven days. We now know that there's at least one case report of a pregnant woman whose child was infected whose blood testing actually stayed positive for longer than the seven days. But if you are acutely ill or have been ill recently, the RTPCR, this polymerase chain reaction, can actually test for the RNA of the Zika virus. It's a good test, but the problem is it does become negative as the viremia or the Zika virus clears from the body.
• 10:16:35
SHEFFIELDOnce the virus has cleared, usually by that time the woman or the man has started to develop an IGM antibody response and that is a test that the CDC has available, several states now in the country have available for testing and then finally, there is a confirmatory test that is available through the CDC, a plaque-reducing neutralizing antibody test that is -- it takes a little time to get back, but it is available for confirmation.
• 10:17:04
REHMGo ahead, Maggie.
• 10:17:05
FOXWell, I'd like to ask, because isn't this one on the issues -- I think both Dr. Fauci and Dr. Sheffield can tells about and I'm curious to know -- isn't this one of the issues with the funding, that we need to have more of these tests?
• 10:17:17
FAUCIWell, we need more and better. The issue is that we, the CDC and others are working a more specific test because one of the tests, the test for the antibody, if you're also exposed to dengue, that is has cross reactivity with dengue so you don't know precisely. If you're looking for the virus, Diane, the virus PCR test that Dr. Sheffield mentioned is quite specific. You'll know if you are infected. The real critical question is was I infected a little while ago and that's the one that's non specific.
• 10:17:49
REHMDr. Anthony Fauci of the National Institutes of Health. Short break here. Your calls, your comments, I look forward to hearing from you.
• 10:20:02
REHMWe're talking in this hour about the ongoing concerns regarding the Zika virus, how it is spreading, how very much the CDC is concerned about creating a vaccine that could in fact help people to avoid the Zika virus. The president and the NIH have asked for $1.9 billion additionally to help deal with the issue. So far the Congress has not acted.
• 10:20:48
REHMHere's an email from Laura in Liberty Township, Ohio. She said, I've heard and read that the actual Zika virus is not necessarily the culprit of infant malformations but rather the toxic larvacide being used in water resources. Why aren't we hearing more about this, Dr. Fauci?
• 10:21:15
FAUCIWell, Diane, it's just not true. That's not the case. The evidence that the virus itself is the direct cause of the fetal malformations is now becoming extraordinarily compelling.
• 10:21:26
REHMSo who's writing about this stuff? Where's it coming from?
• 10:21:28
FAUCIYou always hear things like that. Whenever you -- whenever you have a situation that gains public attention like this, there are always people that come up with alternative theories, essentially based on no evidence. If you look at evidence-based types of conclusions, the evidence that it's the direct effect of the virus itself not only on the developmental aspects of the fetal brain but direct toxic and destructive effects on the fetal brain and nervous system.
• 10:21:57
FAUCISo the data are now becoming so compelling that soon there'll be an absolute conclusion that there's no doubt it's the virus itself.
• 10:22:04
REHMAll right, Dr. Sheffield, talk about the kind of damage that the Zika virus does to the brain.
• 10:22:14
SHEFFIELDSo when the initial reports started coming out back in October, November, December, we were hearing about microcephaly or a small head related at gestational age. We also started hearing then about calcifications in the brain. Well, since that time we have discovered that there are multiple neurologic abnormalities. Multiple studies have shown that if you look specifically at the brain development, it is abnormal, there is destructive processes going on so that if you look at the brain structure, it is actually abnormal in a large percentage of the cases.
• 10:22:53
SHEFFIELDSo it's not just a small head or calcifications in the brain. There are multiple abnormalities now found in the nervous system, in the actual brain structure.
• 10:23:03
REHMAnd are we talking about the risk confined to the first trimester?
• 10:23:08
SHEFFIELDYou know, a lot of viruses, the infections in the first trimester are the biggest problem. You get infected in the first trimester, as the brain is developing or as the body is developing, and that's when you see a lot of the abnormalities. Zika appears to be different. The data that is coming out is showing that we are seeing abnormalities in the brain regardless of the trimester that they're being infected, and some of that may have to do with the fact that this does appear to be a disruptive or a destructive process. It doesn't just cause problems as the brain develops, but even after structures are formed, it looks to be that if they get infected, there may actually be true destruction of some of the cells.
• 10:23:51
REHMDr. Fauci, what about non-pregnant women, and what about the age factor? What are the differences?
• 10:24:02
FAUCIWell, when you say non-pregnant women, I think you would treat non-pregnant women the same way you would treat an adult in the sense -- except that there's no evidence that women have sequestration of the virus following the infection. We do know that the detection of virus in a pregnant woman is now, particularly a couple of the case reports, is now perhaps even considerably longer than we thought.
• 10:24:27
FAUCIAnd there was one recent case where the virus was actually detected for weeks. But if you have a woman who's non-pregnant, there doesn't seem to be any difference, except unlike men, which can sequester the virus in the semen. There doesn't be any evidence that there's women sequester it for a period of time when they're not pregnant.
• 10:24:45
FAUCIAs far as age factor goes, it doesn't seem to be any major difference that we're seeing now between children and adults.
• 10:24:50
REHMBut Maggie, if one is, say, in her 50s or 60s and becomes infected with the Zika virus because she's been bitten by this particular mosquito, what happens? What's the effect on her?
• 10:25:11
FOXThere haven't been a lot of studies published on that yet, and that's a great question. People are looking back at other outbreaks in other places, like in Yap in French Polynesia. And they found that when the virus moves into a population, almost everybody gets it. It's amazingly common. But hardly anybody actually shows the symptoms. I don't think anyone's actually looked at that directly, or at least they haven't reported their results on what's happened in Brazil. It's called the attack rate, and the symptom, you know, the number of people who have symptoms.
• 10:25:45
FOXBut in the previous outbreaks, most people, 80 percent, didn't even know that they'd been infected. They had the antibodies to the virus, they had evidence of past infection, but they had not remembered having a fever, they hadn't remembered having a rash. The people who have studied what it does do, I think it's 90 percent of people have a rash. If they have any kind of symptom at all, they have a rash. They also may have a fever, they may have headaches, which I guess goes with the fever, and the muscle aches. Not much else than that.
• 10:26:16
FAUCIIt's generally as mild a disease -- as we mentioned in the beginning of the show, there are now these individual case reports about dire neurological consequences in adults, but for general, if you look at the total cohort, it is generally a mild disease with very little mortality associated with it.
• 10:26:34
REHMSo you're not talking about the entire population. That's what I want to zero in on. It depends on where you are in the life cycle as to how badly you might be affected by it.
• 10:26:57
FOXThere's a reason that people ignored Zika. It seemed to be a completely harmless virus for -- you know, since 1947, when it was first identified, nobody ever associated it with really making people sick. It was one of those things, you might get a rash, probably not even that, it's not even going to make you sick. So the new results that are being found are stunning people, and as the scientists keep saying over and over again, the more we find out about it, the more it scares us. It's creepy.
• 10:27:22
FOXIt could be just because it is all of a sudden affecting millions and millions of people, and so you're seeing these very small effects looking big because if you get one percent of a million people, that's a lot of people.
• 10:27:40
REHMAll right, and joining us now from the Florida Keys is Phil Goodman. He's chair of the Florida Keys Mosquito Control District Board. And welcome to the program, Phil. I know your area of Florida is considering introducing genetically modified mosquitoes to bring down the population of this particular kind of mosquito. Explain what's been proposed.
• 10:28:13
MR. PHIL GOODMANYes, Diane, good morning. What we have -- and this started about seven or eight years ago. The genetic modified mosquito was introduced to the Florida Keys, the concept, because of Dengue Fever. You know, we had had outbreaks here. We were the first, really, outbreak I think in 40 years in the U.S. of Dengue Fever in 2009 and '10. And so, you know, and the current technologies used to combat the Aedes aegypti mosquito are not very effective.
• 10:28:42
MR. PHIL GOODMANYou know, some of the better known insecticides, pesticides, the mosquito has become resistant to that over the years. The way the mosquito lives and breathes, and it's very difficult to hit it with sprays from helicopters and airplanes like we do. And so, you know, we needed new technologies. And so the genetic modified mosquito was introduced to us. We've been studying it here now for over six years. And, you know, it's been -- we presented it to the FDA for -- to have them to study it. They've been studying it for several years and recently came out with a finding of no significant impact, an initial finding, where the CDC, the EPA and the FDA looked at this, and they found no significant impacts to prevent the test.
• 10:29:36
MR. PHIL GOODMANAnd now we're in a 60-day public hearing period, where we're getting comments from the public, or the FDA is, and they'll be looking at that. It has 30 more days left on this period. And then the FDA will have time to look at this and make a determination whether more studies are needed or whether they have all the information they need to offer a final finding of no significant impact, and then, you know, we can make preparations to proceed with the trial.
• 10:30:08
REHMAll right, and I gather it's already being used in Brazil. Is that correct?
• 10:30:14
GOODMANYes, it's been being used there for some time with very good results. Everywhere this has been used and studied, within six to eight months you see a significant drop of the Aedes aegypti mosquito down to within, you know, 60 to 80 percent reduction, and then continued for a few more months, you usually get it down to 90 percent or 95 percent, which the experts believe it takes this -- this decrease to effectively prevent the spread, the local transmission, you know, should we get it here.
• 10:30:47
REHMAll right, I have an email here from Michael, who says I'm concerned the genetically modified mosquitoes introduced to Brazil in 2012 are responsible for the genetic defects we see today. Can you explain why this is not possible, although one of every 1,000 genetically modified mosquitoes is fertile?
• 10:31:22
GOODMANWell, you know, it's like we said earlier, you know, alternate theories always come out, something like this, based on no evidence, and there's really no evidence to prove -- to prove this. It's just not accurate. And, you know, there -- you know, we mainly release only male mosquitoes with -- that's the intent here, and the male mosquitoes do not bite. The female mosquitoes do bite, and because of the sorting -- the way these females and males are sorted from each other after this process, there's like one in 10,000 females can be introduced.
• 10:31:57
GOODMANAnd this has been studied by the CDC, the EPA, the FDA and Oxitec, who developed this, a lot of studies that show that, you know, this transformation is not in the saliva so that there is really no chance to pass this gene along. Even if it were in the saliva, it's found to be non-allergenic, non-toxic, and so, you know, the finding -- the FDA did a lot of studies on this based on the environmental, the draft environmental assessment that was sent to them from Oxitec, and, you know, they also include in their initial findings that there -- you know, there is no negative impact that they're seeing to the environment, to people or to other unintended species.
• 10:32:40
REHMSo if the FDA continues with that no significant effect position, how soon would you think you might introduce this genetically altered mosquito into the Florida Keys?
• 10:32:57
GOODMANOkay, now there's -- a few things have to happen. You know, once, if we do get a final no environmental impact statement from the FDA, then the board will vote. We voted -- the board has voted unanimously in the past on several different phases of this process. We have one phase left, which is more or less how the test will be administered and evaluated. So about 10 percent of it has to be approved by the board.
• 10:33:26
GOODMANOnce the board of commissioners approves this, after there is a final finding of no significant impact, then we could start the trial pretty soon because we have already -- you know, as part of the process to get to this point with the FDA, we had to establish a laboratory in one of our facilities that we can bring eggs in from -- that have had this modification.
• 10:33:53
REHMI see.
• 10:33:54
GOODMANAnd rear the mosquitoes to release them. So -- and that's already been approved. The CDC, the FDA and EPA have approved our laboratory.
• 10:34:02
REHMAll right.
• 10:34:03
GOODMANAnd so we are quite a ways into it, should we get approval. But, you know, we're still also very interested in what the public has to say.
• 10:34:11
• 10:34:11
GOODMANSo we're going through a lot of this, as well, trying to educate the public, and they're -- and not everybody is a believer in this.
• 10:34:20
REHMRight. All right, and you're listening to the Diane Rehm Show. Maggie Fox, I know you wanted to comment.
• 10:34:29
FOXWell, I just want to point out that this is like the larvacide fear. People are afraid of genetically modified creatures. They're afraid of genetically modified food. The larvacide in the water question is -- has actually come up a lot. It's partly because the Internet has given people voice that didn't really have voice before. You couldn't block these comments.
• 10:34:50
FOXAnd they're not completely illogical. They're not based on any actual evidence, but the logic behind is a larvacide affects a developing mosquito, the genetic modifications of the mosquitoes make them lay dud eggs. This has to do with developing babies. Why can't it also be affecting pregnant women with developing babies? On the surface, it sounds logical. But when you talk to the researchers who have been watching this, they're not stupid. They know what evidence to look for. They've looked for this kind of evidence, and they haven't found any.
• 10:35:23
FOXWhat they have found is the Zika virus in the brains of these babies who have miscarried with the brain damage and active signs of the infection. So we spend a lot of time debunking these fears, and the genetically modified mosquitoes have also not been linked with any human effects.
• 10:35:43
REHMDr. Sheffield? Have we lost the contact?
• 10:35:52
SHEFFIELDOh sorry, I am back. Sorry, I had you on mute for a second so I didn't interrupt the show. I think we are all becoming very comfortable with the fact that the evidence is there. The virus is what is causing the problems in the neo-nates. It is not the larvacide, it is not the genetically modified mosquitoes. I'd like to reiterate, it has been found now in the tissues of these affected infants. And so we are -- there is more and more and more evidence being obtained showing that it is the virus itself that is causing the problems.
• 10:36:27
REHMAll right, and Phil Goodman, very quickly, if the FDA does not go forward, what's your alternative? What are you doing right now?
• 10:36:39
GOODMANOkay, you know, we have -- you know, for this mosquito, you have to have a strategy for the Aedes aegypti mosquito, which carries the Dengue and the Zika and other -- and Chikungunya. And so what we're doing now, we've got a lot of tools that we're using. None of them are that effective, but we're going house to house, we're, you know, trying to be sure that we're educating the people to dump out their water because this is what breeds Aedes aegypti mosquitoes around your home. We are also using larvacide. We're doing limited pesticide -- adulticide, but we're looking also at new technologies.
• 10:37:14
GOODMANYou know, there's the -- there's several new technologies that are coming out now.
• 10:37:21
REHMAll right, and I'm...
• 10:37:22
GOODMANThe one in the forefront is the genetic modified, but there's others that we're looking at as well.
• 10:37:28
REHMAll right, Phil Goodman, chair of the Florida Keys Mosquito Control District Board. Thank you so much for joining us. Your calls when we come back.
• 10:40:01
REHMAnd welcome back. Here's an email from Mike in Oakridge, Tennessee. What is known about the effects of Zika on infants and toddlers infecting after birth? Dr. Fauci.
• 10:40:19
FAUCIThere's no evidence that there's any more significant effects on infants and babies who are born and infected after they were born. There's a really interesting issue brought up regarding our discussion about mothers who are infected during pregnancy and babies who might not have the gross structural abnormalities that you might see. You still need to follow babies to find out if there are subtle effects that were from the infection while they were in the womb after birth. Because what you usually see when you congenital abnormalities, some are very gross.
• 10:40:56
FAUCIThat you could structurally relate, but there may be some subtle findings in babies who were -- whose mothers were infected, but as far as a baby being infected directly after birth, there's no evidence that that is anything different than what we see with others.
• 10:41:11
REHMAll right, let's go to Norman, Oklahoma. Hi Jane, you're on the air.
• 10:41:19
JANEHi. I'm a Tropical Ecologist, working mainly in Panama. And last year, we experienced the second driest year on record due to El Nino. And I'm wondering, is anyone wondering how events like El Nino are affecting the spread and populations of mosquitoes and maybe increasing or decreasing their spread?
• 10:41:39
• 10:41:40
FOXThat's such a great question. It's a question we're asking too, because it's not obvious. In past outbreaks, when I was covering the West Nile virus outbreak, I talked to a lot of mosquito experts and they said, you know, it's not so obvious that a thunderstorm leads to an explosion. Sometimes dry seasons can concentrate the mosquitoes, but I think it depends on the species of mosquito too. Evidently, some of the money that had been going to mosquito research has dropped off and people have neglected in recent years the studies on what happens to mosquito populations as climate changes and even as weather changes. And that's one of the things some of the experts are asking for.
• 10:42:22
• 10:42:23
FAUCISuffice it to say, that weather can have a positive or negative effect. You can't make a determination that because the weather does this -- you could have a situation where it prevents mosquitoes from breeding well. And changes in weather can promote mosquito breeding. It really depends on the particular type of weather change and the mosquito in question.
• 10:42:41
REHMAll right, here's a question for you, Dr. Sheffield. Evan in Michigan says, my sister is planning on going to Guatemala this summer. I've heard the virus can cause abnormalities up to years after one contracted the virus. My fiancée and I are going to be near my sister a lot this summer. Is there a possibility she could be bitten and then I or my fiancée get bitten and contract the virus? We live in Michigan. My fiancée and I are planning on trying for kids within the next two years.
• 10:43:27
SHEFFIELDSo I think there's a couple of comments in there to address. One is what we have been telling people based on what evidence is available is that once they contract the virus, their symptoms resolve and they wait a certain amount of time, whether it be the eight weeks in an affected female or up to six months we're saying right now in an affected male. Beyond that, we don't believe there's going to be any long term effects. Unless there's, you know, Gilliam Barre Syndrome or something like that developing.
• 10:44:01
SHEFFIELDBut when you're looking at transmission to an infant or to a fetus, the -- once the woman has cleared the virus, there should not be long term risk to either that pregnancy or a subsequent pregnancy. The chance, it was mentioned a little bit earlier, the chance of coming back, being infected, so having the virus circulating through your body, getting bitten and having that mosquito then bite somebody else and they would get infected is feasible, but it is a very, very low possibility.
• 10:44:35
SHEFFIELDAnd he mentioned he was in Michigan. That mosquito, as far as I know, I've seen in revised maps, I don't remember seeing him going all the way up to Michigan. So, the risks are incredibly low.
• 10:44:45
REHMBut they are in New York. They are in New York, I gather.
• 10:44:49
FAUCIYeah, I mean, if you look at the map, the revised, updated map of Aedes Aegypti, it is much more expanded than what it originally was. Can I just comment about what you were saying and I think Dr. Sheffield made a very good point. That's probably the most frequent question we get asked. I certainly get asked that. I'm a woman, I'm going to go down to South America or the Caribbean or what have you. And if I get infected, is that going to affect my pregnancy that I want to get -- I want to get pregnant eight months from now.
• 10:45:19
FAUCIWe're planning, next year, to have children. And that's the reason, if you look at the guidelines, is that if you are a woman, it's an eight week period following return. Because you could have been infected sub-clinically, where you didn't know you got infected or what have you. If it's a man, the recommendations are six months with protected sex. So, if you come back and you could have been infected there, wait six months. Either no sex or constant and consistent use of a condom.
• 10:45:48
FAUCIBut the women are the ones who are calling up and saying, you know, I might want to get pregnant next year. Should I just completely stay away from this region?
• 10:45:53
REHMYeah. Yeah.
• 10:45:54
FAUCIAnd that's what the eight week waiting period is.
• 10:45:57
REHMTell me about concerns for the athletes who are going to Brazil, Maggie Fox.
• 10:46:03
FOXWell, we asked the question, you know, will there be athletes who could be pregnant while they're competing? And you kind of think, oh my gosh, who would compete in the Olympics if you're pregnant, but in fact, a lot of young women compete in the Olympics and they're at reproductive age. And they might be pregnant without even knowing it. So, we know the US Olympic Committee is really recommending to its athletes that they practice safe sex. You've got a lot of very fit, very active young people all together in the same place at the Olympics.
• 10:46:34
FOXBoth the spectators and the athletes. And things are going to happen when you get people in their 20s at the prime of their lives. And there are some concerns about this, that some of the young female athletes may end up getting pregnant while they're at the Olympics.
• 10:46:50
REHMLet's go to Justin in Dania Beach, Florida. You're on the air.
• 10:46:58
JUSTINHello. I just wanted to highlight the fact that Phil Goodman mentioned that the FDA is going to be analyzing data, provided by Oxitec. When they make the determination. And as a Florida resident, I wanted to voice my opposition to the release of these genetically engineered mosquitoes. I invite everyone to Google or look up horizontal gene transfer and then take this information into consideration when deciding if it's a good idea to release mosquitoes that are genetically engineered to self-destruct into our natural environment. And that's it. Thank you.
• 10:47:37
• 10:47:37
FOXThat, that is a common fear that we're hearing and lots of people have Google at their fingertips. The hard thing to sort out is what's good information and what's not good information.
• 10:47:49
REHMIs the company that genetically modified the mosquitoes the same company that supplied the information to the FDA?
• 10:48:02
FOXThat is true. The FDA does rely on information that's provided by the company. They do have a lot of their own labs and they do a lot of their own tests. On the genetically modified mosquitoes, they are relying on Oxitec's information. They are, however, working closely with Oxitec too, to make sure that that information is accurate. There's a lot known about genetically modifying plants, animals, all sorts of things.
• 10:48:26
• 10:48:26
FOXIt's well understood, there's a whole national institute of genomic research that that's all they look at. They understand how that works. They understand how gene transfer works. There's no evidence that an insect that's been genetically modified can pass on that genetic modification to a human being by biting them.
• 10:48:47
REHMAll right, let's go to Ranada in Boca Raton, Florida. You're on the air.
• 10:48:56
RANADAHi. Good morning, Diane.
• 10:48:57
• 10:48:57
RANADAI have a question.
• 10:48:58
• 10:48:58
RANADAI was born in Brazil and raised there. I do (word?) that while infections are widely spread throughout Brazil, the microcephaly cases are heavily clustered in the northeast region, which has historically been exposed to precarious conditions from like poverty to lack of infrastructure. Sanitary infrastructure. So the question from me is not the fact that Zika is related to microcephaly, but what is the relationship between the infection and the social environment. The social political environment and the geographic environment that makes Zika more dangerous to certain populations.
• 10:49:35
REHMAll right, Dr. Sheffield.
• 10:49:38
SHEFFIELDSo, I think that is a fantastic question. And it's something that we've actually been talking about are what are -- one, what are confounding factors? So, was -- especially initially, when we were looking at this, was it just Zika virus or was it co-infections with Dengue or Chikungunya. Was it some other environmental factor on top of the Zika virus infection? And so, that was something that was addressed very early on. The other point you made, which I think is an excellent one, which is the social factors.
• 10:50:08
SHEFFIELDSo we know that this virus is transmitted by a mosquito. Mosquito control is something that much more widely available in developed nations. So when we're looking at nations that don't have -- that have standing water or more commonly standing water, don't have air conditioning and screened-in porches. Don't have the DEET or the Permethrin available to them. Those are the countries that are going to have more problems. Or the areas that are going to have more problems. And so, I think you made two very good points.
• 10:50:36
SHEFFIELDOne, are there confounding factors? We're leaning more and more towards it's probably just a Zika virus, but, you know, we have talked about that quite a bit. And then you're other point of other confounding factors, such as social influences is a significant one.
• 10:50:52
REHMAnd a tweet from John, Dr. Fauci, who says, after the initial Zika infection, do people become vaccinated or immune against further infection?
• 10:51:07
FAUCIYeah. If it acts like other types of similar viruses, other types of flaviviruses and other related viruses. You would expect that there would be immunity. We don't have any evidence that there are multiple sub-types of Zika, the way we have with Dengue in which you have four separate serotypes. So right now, you can make an assumption that at least in the short range, there would protection. The durability of that protection, I think, would require study over a long period of time.
• 10:51:40
FAUCIBut there's evidence based on experience with other viruses that you would expect when you have a virus that doesn't have multiple sub-types, once you're infected that you are protected against subsequent exposure. But we have to prove that. We have to make those decisions based on evidence. That's why there'll be long range studies to look into the future after people have been documented to have been infected.
• 10:52:03
REHMSo, here in this country, Maggie Fox, where are we getting reports about Zika? We've heard from Mr. Goodman in Florida. What, Texas? You've got other southern states.
• 10:52:20
FOXWell, there's two factors here and it goes to the question also from the woman about social factors. All along the US south, there's a chance for Zika transmission from mosquitoes because people live outside. They -- in Key West, people don't have air conditioning. They like having their windows open. In Puerto Rico, people don't necessarily have screens and they have these open eaves that let the mosquitoes get into their house. And these mosquitoes live in houses. That's also why most of the continental United States is not vulnerable to widespread of Zika virus.
• 10:52:51
FOXBecause the mosquitoes don't live in air conditioned homes. They can't even get there. And they don't live in the parts of the country anymore that most people live in. The other factor is travelers bringing it back and that's getting people mixed up too, because they'll hear oh, I live in Michigan, I heard there was a case in Michigan. But that's a traveler bringing it back. And the other factor is that the mosquito doesn't bite you and then bite the person sitting next to you and transmit the virus. The virus has to live inside the mosquito for a while.
• 10:53:23
FOXSo unless the mosquitoes are living and breeding and brooding the virus in their bodies, they're not likely to pass it along either.
• 10:53:33
REHMAnd you're listening to "The Diane Rehm Show." Dr. Fauci, you wanted to add to that.
• 10:53:38
FAUCIYeah, well, the issue of what people get confused about numbers. If you look at the number of travel cases, it really relates a lot -- when Florida has a lot of travel cases because that's a jumping off point back and forth between the Caribbean and South America. California has a lot of travel and New York City because they're very populated cities. And states within those -- within that region. But what we're concerned about is what we've seen with Dengue and with Chikungunya. And when we say we likely will have local outbreak, I hope we don't.
• 10:54:09
FAUCIBut I would not be surprised, Diane, that we will see as we get into the exuberant mosquito season, as we get into the summer, that particularly along the Gulf coast, in Florida and Texas where we did see, in Florida and Texas, Dengue local outbreaks. And in Florida, a Chikungunya local outbreak. When you get a local outbreak, you try your best to prevent it from becoming sustained and prevent it from becoming disseminated. And that's what we were successful in doing with Dengue and Chikungunya.
• 10:54:39
FAUCISo we hope now that the efforts that are put into mosquito control as well as the conditions in those states that if we do get a local outbreak there, we'll be able to contain it and prevent it from becoming more spread.
• 10:54:51
REHMSo, if I, at my age, which is long past potential for pregnancy. I'm going to, say, the Florida Keys, where they're concerned about these mosquitoes, what do you advise, Maggie?
• 10:55:08
FOXWell, I don't advise anything, but the people I talk to are advising that you really don't want to get bitten by a mosquito anyway. They pass on all sorts of nasty stuff, not just Zika, but there is Chikungunya around, there is Dengue around. You should use an insecticide and DEET is evidently the very best insecticide at repelling the mosquitoes from biting -- it's not an insecticide, it's a repellant. It keeps the mosquitoes from biting you. People are scared of DEET. People are scared of insecticides. It makes them nervous.
• 10:55:37
FOXBut there's been a lot of testing on DEET and the CDC says, it's safe for everybody down to six month old babies. It's safe on pregnant women, it's safe on older people. They also recommend that you wear long sleeves, stay inside, stay inside the air conditioning as much as you can. Do what you can to avoid being bitten.
• 10:55:54
REHMDr. Sheffield.
• 10:55:55
SHEFFIELDSo, that is my -- that has been my strongest point to my patients that are coming to me saying, I'm planning on travelling. Is, if you have to travel, understand that DEET and Permethrin used in an EPA registered dosing is absolutely acceptable in pregnancy. We would much rather they use one of the EPA registered repellants than one of the other non-registered ones because they work so much better. And they are fine in pregnancy.
• 10:56:23
REHMDr. Fauci.
• 10:56:24
FAUCIYou know, that's great. I'm so glad Dr. Sheffield brought that up, because I get asked that a lot, and I'm not even an obstetrician, I'm a gynecologist, about pregnant women, who are concerned. There is -- pregnant women should not be concerned about using DEET containing repellants. You can use up to 30 percent DEET and it is safe in pregnant women. So pregnant women should not be concerned about not protecting themselves.
• 10:56:49
REHMAll right. We will follow this story, obviously, and hope that, at some point, Congress acts on that request for additional emergency funding. Dr. Anthony Fauci of the NIH. Maggie Fox of NBC News. Dr. Jeanne Sheffield of Johns Hopkins Medicine. Thank you all so much.
• 10:57:19
FAUCIGood to be with you.
• 10:57:19
FOXNice to be here.
• 10:57:21
SHEFFIELDThank you. Good to be with you.
• 10:57:21
REHMAnd thanks all for listening. I'm Diane Rehm.
Topics + Tags
comments powered by Disqus
Most Recent Shows |
global_01_local_0_shard_00002368_processed.jsonl/29341 | How to get over a break-up (Or some ideas on how to try)
There’s no sugar coating it. Break-ups suck. They FUCKING suck. Whether the break-up is mutual or not, break-ups are bound to cause you some (maybe a lot of) heartache. They will definitely cause a change you may or may not welcome. And they will cause a shit-ton of confusion. And ain’t nobody got time for that.
Because I am a huge nerd, whenever I have gone through a break-up I have desperately wished a how-to book on how to get up and get over your now ex-partner existed. Now that I’m a little older and just a little tiny bit wiser, I have made some realizations about this whole break-up mess that have helped me power through the heartbreak and endless barrage of questions.
I obviously know that everyone’s breakup is different. Thus, this article will only help so much. Unfortunately, by the time you finish reading this article, you will not be over your ex (but here’s to hoping). These are things that worked for me. Some may help you, some may make you say, “You have no earthly idea what you’re talking about.” All your reactions are okay. And it’s totally okay that you are here in the middle of this moment of what feels like despair in your life. It’s all going to be okay, I promise. (Cue all your “fuck off” eye-rolling reactions here, but keep reading).
1. The beginning of the end is the hardest, and it will get worse before it gets better. Accept that now.You’re here. It happened. Shit has hit the fan and you are now forced to have everything around you change. There’s no running away from it. So embrace it. The scariest part is the unknown, not the actual being alone part. I’m not going to lie. Typically, it’s going to hurt more and harder before you start feeling better but if you’re armed with that knowledge now, you won’t be surprised by it. Be comforted by the fact that it happened and guess what? The world didn’t stop spinning. You didn’t stop breathing. You didn’t lay down and give up. It hurts like a bitch, but you’re still standing.
2. Spend a lot, a lot, A LOT of time with people you love and who love you back. Did I mention a lot?
3. Reconnect with YourselfRemember who you were before this break-up. Remember who you wanted to be. Remember who that little girl or little boy or little human dreamed of becoming. Are you still in touch with that dream? What can you do to get back to it?
4. Reconnect with old friends and acquaintances. Hell, make some new friends!I feel that I have always been blessed in the friendship department. I do have a lot of friends I love and that have stuck by my side. And thank goodness that they chose to stick with me. Whether it’s intentional or not, when you’re in a relationship, you tend to neglect your friends more often than not. At least I did. I neglected them entirely too much. But when I came out of the relationship, my friends didn’t miss a beat. They were there to catch me when I felt like shit. They made me laugh. They didn’t call me out for not hanging out with them as often as I used to. And that made me love them even more.
5. Try things you’ve never done before or things you’ve always wanted to tryTry a new recipe (or just learn to cook something if you’re anything like me in the kitchen) or take up learning to make cool cocktails or sign up for classes to learn how to play an instrument. Just get out of your head and busy yourself with something new.
6. Ask yourself who and what kind of person you want to become.Then spend a lot of time discovering ways to become this – your highest and best self. Journaling helps so that you don’t forget your goals and ideas. Talking to a therapist helps. Meditating helps.
7. Try not to date right away.Go back to #6. You can’t figure out who your highest, bestest true self is if you’re sharing your time and amazing personality with someone else. Remember, in order to give to others, you must be overflowing yourself.
8. Don’t tell yourself you’re over him/her/they if you are not. It’s okay not to be.You’ll get there. The day will come when they are not the first thing that pops into your head in the morning. There is no rush to be over this person. Take your time healing. Also, remember that healing is not a fast, magical, relaxing time. Healing is painful and dirty and hard. But healing makes you stronger.
9. Don’t call them. Don’t stalk their socials. Out of sight, out of mind. Stalking them will never bring you joy, so why even do it? Block, block, block!
10. Work on that negative thinking so you don’t get eaten alive by anger/negativity/depression/sad shit in general!Okay, I’m going to get a little personal here, but I have to do so in order to explain how this vital step works. When I started recognizing that I was finally getting over my break-up, I began noticing that little venomous thoughts about my ex would creep into my brain. These thoughts would then snowball into more and more negative thoughts until I was fucking pissed about things I remembered or some new scenario I had created in my head that wasn’t even real. Then I would get mad at myself because I would remind myself that THIS RELATIONSHIP IS OVER AND NONE OF THIS MATTERS AND I WASTED TIME EVEN THINKING ABOUT THIS. Other times, just my ex’s name would pop into my head and a slew of curse words would follow because I was livid. Again, I felt angry at my waste of energy on these thoughts. It was a vicious cycle.
• I began to be more patient with myself. When a negative thought came into my mind, I tried to catch it as early as possible, take a deep breath, and tell myself it’s okay to feel angry but I had to let this thought go. Imagine your thoughts are like clouds. You can’t control them as they come into your head, but you can control how much you focus on them. Just because a thought comes into your brain, it doesn’t make it true. Make it a point to observe these “clouds” and just let them pass by.
• Bonus challenge: I talked to my therapist about this and she encouraged me to take it even one step further. Whenever I had a negative thought and my anger would come tumbling out right after it, rather than just observing my feelings and moving on with my day, she told me to stop and also ask myself, “Why do you feel this way?” Then I had to answer my question so I could validate my feelings. For example, if I thought, “Homeboy is a really bad dude” (but in much more explicit and unsavory terms that I will not get into here) then I had to answer, Why is he a bad dude? And then I would think, “Because he did or didn’t do so and so and it really hurt my feelings.” I know this sounds like a lot of work, but this process helped me realize that my feelings of anger were justified and understanding why I was angry also helped me realize that sad part of my life is over and I’m content right where I am because I no longer have to deal with it.
11. Talk to a Therapist.I honestly don’t shut up about this, I know. I’ve talked about finding a therapist before. You can check out that article here if you’d like.
12. Just be sad.My biggest problem has always been the fear of sitting still in the silence and letting the waves of sadness completely wash over you. That sounds poetic, but it’s actually the most hurtful shit ever. You gotta feel it to heal it. And, again, a lot of us are under the impression that healing is magical and full of candles and incense and flowy clothing. But healing is hard work. It’s dirty and rough and you have to dig through the mess to find the root of your pain to make that pain stop. Allow yourself to be vulnerable. Allow yourself to sit with your heartbreak, because if you don’t, it will catch up to you and manifest itself one way or another, in multiple different ways. It can manifest itself through misplaced anger or in your next relationship. Some days are going to hurt like hell, and some moments are going to feel like you can’t even breath because it aches so much. Some days you’re going to cry more than you thought you possibly could. You will ugly cry, you will cry loudly, you will cry in the shower. Just accept it and let your body react the way it needs to. All of that excess energy needs to be released, so don’t be afraid of it. There is a misconception that to cry or to feel things equates to weakness, but I think that’s completely wrong. Allowing yourself to face that pain is what makes you brave. Knowing your heart is going to crack in different places and being courageous enough to say, “I’m still going to feel this and accept it and honor it” is what allows good change to happen. Growing up hurts, and accepting changes hurts. But being strong enough to endure it instead of running away from it is what makes all the difference and allows true healing to happen.
13. Forgive them and have compassion. This one is HARD! How do you forgive someone who broke your heart and why would you even want to anyway?! Here are the answers: You forgive someone who broke your heart for yourself, not for them, and you forgive them by finding compassion for them. I still struggle with this, but it’s a constant battle I try to win. Staying angry with someone and refusing to forgive them is a slow poisonous death to you, not to them. Release that pain by remembering this person as a child – they know not what they do. I know that’s weird, but it’s easier to have compassion for someone when you remember we’re all just out here trying to do our best. You may not like this one, but I promise it’s the most rewarding one.
14. Be grateful.Be grateful for life. For your health. For every moment. Life is so beautiful and full of adventures. Don’t stay stuck in this one bad thing that happened. Learn from it, release it, and carry on being mindful that this will only help us grow.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/29342 | May 2008
Sun Mon Tue Wed Thu Fri Sat
1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
« Homo Erectus | Main | Turd is the Word »
urls to the latest world news.
the only bookmark you need
hello people
I have 4 questins
can some one answer it please as sonn as possible
1: whta type of air pollution contribute to climate change?
namee the greenhouse gasses?
200 words?
2: where does this air pollutionf come from?> wht souses?
200 words?
3:how soes air pollition lead to climate change?
(explain the greenhouse effect)
200 words?
4: and wht can be don to reduce/ lesen this air pollutiong?
200 words?
if u done this?
I have read State of Fear and am reading Unstoppable Global Warming: Every 1500 Years.
They are both Highly Recommended
Peter G. Klein
I blogged about this very phenomenon some time ago:
How could you have forgotten? :-)
Only problem; Lomborg is not an economist. He's a political scientist (gone economist though).
I only got about 10% of the way up the page before I got bored with all you open minded economists. Yes it's is all economics lectures, that's the secret.
As an engineer I find it quite funny. We call it trade off analysis. But I'm sure mine's not as big/open as yours.
psychology prof
Dear Mr. Adams,
My comment has nothing to do with global warming, Bill Maher, etc. Rather, it is of a more academic nature. I'm not sure how to say this kindly, so I'll just go ahead...with all due respect, your post reveals that you don't understand the principle of cognitive dissonance. Perhaps you should read up a bit.
Branden Berns
Mr. Tauhidi's comment only serves to support the assertation of this column. His point was not that India is a producer of cheap products in contrast to the commenter's view that Indians produce quality products. He simply states that India uses cheap fuels. This statement does not place him on either side of the fence. Another great example of cognitive dissonance.
Syed Ibtisam Tauhidi
What the crap did you say about Indians using cheap fuels? India is not what you imagine. The next time you use a computer software to draw a cartoon or write a blog... remember a part of the software might have been created in India.
Those who define "cognitive dissonance" don't have the intelligence to intuitively understand the phrase. It needs no definition, as the meaning is intuitively obvious if you know what the words "cognitive" and "dissonance" mean on their own. Arggg! The idiots run amok. Adam's use of the term if perfectly fitting with the contraction of those two words. Only a simpleton confines the meaning to a narrow subset of what the contraction can be interpreted to mean.
Maher is very intelligent, but he is a dim as a 10 Watt bulb. There's a huge difference between intelligent and brilliant and nobody makes this more obvious than Maher himself. He has said, perhaps more than anyone I know, the words "I don't understand it" or "I don't understand them", or "It makes no sense." ... etc.
The true mark of a brilliant person requires the ability to remove yourself from your own perspective and see things through the eyes of another ... something which Maher admittedly is incapable of doing.
This is precisely why he gets so many things wrong - like misunderstanding what Lomborg was saying. This is also why he spews so many complete fabrications - he's either too lazy to put himself in the shoes of another or he's too lazy to take the time to find out if the rumor he heard is correct. If you got a penny for every false rumor he carelessly claimed was a fact then you'd be rich.
Mr. Adams, your further shock me with your disregard of these facts.
Trust me, Bill Maher is not brilliant. Above average, at best.
Personal experience.
Are there two types of economists? One immune to cognitive dissonance (e.g. Bjorn Lomborg)and one suffering from cognitive dissonance (e.g. Partha Das Gupta who recently pointed out why the "Danish economist" was telling a wrong story). The coverage which Lomborg receives demonstrates that in the name of economics one can talk nonsense and get respect!
General Specific
First, Lomborg is a Political Scientist with a speciality in statistics (remember the old saying about statistics?). He's not an economist.
Regarding the smoking cancer quote, you interpret it with your own possible bias. What Rushdie could very well mean is that the doctor says "you need to stop smoking" and the smoker's response is "let's do research on alternatives to cigarettes" when in fact the solution is to stop smoking.
People don't want to quit smoking. And they don't want to stop using fossil fuels (One oil production peaks in the next few years and economic problems result from it I think people are going to puff long and hard on whatever form of carbon they can get--but that's a different issue/argument).
Scott Adams wrote: "I think the study of economics makes you relatively immune to cognitive dissonance" and "The primary skill of an economist is identifying all of the explanations for various phenomena."
I actually think physics is a better way to learn about explanations and physicists who have taken at look at economics have found it wanting. Economics, as a social science, tends to be infected with ideological bias.
The problem with Lomborg's approach is that he selectively quotes information in order to make his case. He focuses on Britain when discussing heat deaths versus cold deaths because it looks good for Britain. For the world, heat deaths will swamp the gain from less cold deaths. He doesn't consider the populations that exist on the coastlines now compared to in the twentieth century in order to account for sea rise. He doesn't look at agricultural effects. He selectively quotes the IPCC report, only pulling and using data that supports his case.
The problem with Lomborg is that he really doesn't have a proposal. He's just telling the smoker to keep smoking and hopefully research and development might make a difference someday.
I'm not sure I agree with you on this. I studied economics and politics, and I'm now a practicing economist. I find that as long as a viewpoint fits within the economic paradigm, it can be readily accepted by economists. Where a viewpoint cannot be assessed numerically (for example), it is rejected out of hand. This leads to the rejection of solutions to problems which are less easily quantifiably assessed.
On the other hand, it's a rigorous and transparent approach
Krzysztof Wiszniewski
Actually I had a rather similiar discussion with my former boss a while back. He was vehemently for reducing carbon emissions. This took place in a room with no less than three computers running. He had just returned from a business meeting. In his car.
I wonder how much power it takes to get Bill Maher into your TV set. I wonder if HE knows. I wonder if he cares. Surprisingly enough, I don't see many people in favour of austerity riding around on bicycles. The general attitude seems to be: someone should do something about it!
My call to them: Reduce atmospheric CO2! Stop breathing!
Dick King
I was about ready to give up on Bill Maher, but on two shows that took place about a month ago, rather than mouthing the liberal canon when a so-called environmentalist came on, he called the "environmentalist" to task for opposing expansion of nuclear power in the United States while continuing to blather about global warming.
However ...
In the 2006-07 season he had a panel with two lefties and one reasonably articulate conservative. However, with the new season he seems to have given up on that. Now, as previous posters have said, it's a circle jerk.
Part of the problem is that Maher's show has devolved, sadly, into a very predictable circle-jerk of the like-minded.
There is no more balance on his "flat-table" discussion panel. It's a non-stop Bush-bash.
When Lomborg's comments wouldn't process through the Bush-bash consensus alogorithm, the panel reminded me of the Lost in Space robot when overloaded, he begins to belch smoke and repeats: "Does not compute. Does not compute."
Understanding cognitive disonance is quite useful to buy in a supermarket.
Get a light chocolate cake with tons of chocolate chips inside covered with chocolate and made with real butter.
"I don’t know about Rob Thomas, but he looks bright enough."
So, tall with good hair?
Josh's statement prior was pretty accurate with what I've been taught of cognitive dissonance, which is dissonance arising between ones own thoughts/beliefs and ones actions. I think this is a much simpler case of the straw man distortion of Lomborg's argument, arising from the fact that Lomborg doesn't conform to the same exact perspective that Maher has on Global warming. As a result of groupthink, they suppress the actual statements made and see only what they want to see. Same thing we all have a tendency to do and must be aware of in order to avoid such fallacies. Maher's content is generally brilliant though, I agree.
Look, Scott, refusal to acknowledge facts is one possible result of cognitive dissonance. But it may also be caused by many other psychological effects. You keep throwing out this term "cognitive dissonance" but what you're describing is more about information bias and selective attention. I know it makes you sound smarter, but your misuse of the term is really starting to get old.
Cognitive dissonance is what happens when someone's view of themself is threatened. For instance, someone believes, "I am a nice person." You might then point out, "But you just beat a hobo with a stick of salami." This causes a threat to their self-view of them being a nice person. Confronted with evidence to the contrary of *how they define themselves* (the crux of cognitive dissonance you keep seeming to miss) they feel threatened. They must resolve the discomfort. They either accept the new information OR engage in cognitive dissonance. An example would be them replying, "Well, he was looking at me funny, and besides, Salami doesn't hurt that much." The answer doesn't quite address the problem, but it lets them explain away the discomfort.
Every time a person refuses to acknowledge information or fails to see things from a logical perspective isn't necessarily a case of cognitive dissonance. There are many other terms that better explain what is going on.
So stop getting it wrong.
(Now, the question is, will the fact that I'm pointing out your use of your favorite term is incorrect lead to you accepting this information, or will it lead to real, bonafide cognitive dissonance?)
"If I say the evidence for evolution that is available to me personally, as a non-expert, looks sketchy, it is interpreted as an argument for creationism."
You're wrong. We just say that that is one of the arguments creationists use. And to them (and therefore to you too) the answer always is the same: that means you don't know enough. The evidence available to me, personally, as an expert, looks appallingly overwhelming.
All this theory that you are trying to develop in this splendid topic was ALREADY developed by Nobel Prize winner Daniel Kahneman in his heuristic studies. Harvard has an entire book and class topics based in it. I base my entire comprehension of complex adult society and economy on this Nobel winning theory. I´m a doctor, I have already attended psychiatry in medical school, and I´m really sorry for not having enough time to further develop this comment here, today, but I would be content or fortunate if you want to discuss this. I have exactly the same problem of yours. I´m a rheumatologist, already participated in stem cell transplantation (yes, some rheumatologists do stem cell transplantation and chemotherapy). Because of this, I have to study ALL point of views, ALL expert opinion and ALL alternatives to save lives, and people frequently do not understand that multiple point of view. They simply adopt "a cause" and follow it. This is "heuristics of availability" (Kahneman´s explanation). Please, enter in contact (for free, of course) to discuss this topic and some health topics, if you want. There are serious media studies showing that health issues raise the audience in any kind of program or newspaper report. With respect, César.
The comments to this entry are closed. |
global_01_local_0_shard_00002368_processed.jsonl/29343 | dimitris kalamaras
math, social network analysis, web dev, free software…
SocNetV 0.70 – the web crawler release :)
It’s been only one month since the release of 0.60, but Social Network Visualizer version 0.70 is here! This summertime release justifies its existence with two new features, a built-in web crawler and multiple node selection.
The web crawler, based on some older tutorial code I had, is pretty simple software (don’t expect Google power here!), which automatically creates mathematical graphs starting with a given URL, called the seed. As the algorithm crawls that seed webpage, it identifies all the links inside the page and adds them to a list of URLs (called frontier). Then, all the URLs from the frontier are recursively visited. In this process, a network of pages (nodes) and links (edges) is being developed allowing the researcher to study and visualize network properties, such as centralities, etc.
At the moment, the web crawler code is quite immature (i.e. doesn’t recognize framesets) but I hope it will evolve in the future. To test it, go to menu Network > Web Crawler (keyboard junkies, press Shift+C). A dialog will appear – enter the initial web address (seed), the maximum recursion level (how many URLs from the frontier will be visited) and the maximum running time and press OK. Here’s a screenshot of SocNetV crawling http://socnetv.org with betweenness centrality radial layout:
SocNetV crawling http://socnetv.sourceforge.net with radial betweeness centr. layout
The other nice and new feature is multiple node selection. Nothing fancy here: press and hold left mouse button somewhere on the canvas, then move the cursor to select all nodes inside the rectangle selection area. At the moment, all you can do with your selected group of nodes is to move them, but in the future we’ ll provide something more useful. 🙂
SocNetV 0.70 also fixes a couple of bugs. For instance, #379204 which was crashing SocNetV when creating small worlds above 201 nodes and #381096 which was crashing SocNetV in Edge Filtering when an edge was reciprocal.
Furthemore, version 0.70 tries to speed things up, removing the on-the-fly Clustering Coef. and Average Distance and bringing some code improvements in random network creation routinesand FindNode method.
Last but not least, Tom Tryfonidis prepared Arch PKGBUILDs for SocNetV. So now, you can install it from AUR. Thanks Tom 😉
As usual, binary packages are ready for Ubuntu, openSUSE, Mandriva, and Debian – Fedora and Windows users will have to build from source at the moment…
Share it!
SocNetV version 0.60 says hi!
Create complex visual elements with Processing language
1. Avatar
Congratulations dimitris for the release, looking forward to try it! All the best
2. dimitris
thank you mate! 🙂
3. dimitris
dokimi metabasis sto neo server 🙂
4. Avatar
Thanks man, I am using it, and it looks good 🙂
5. Avatar
Very nice tool! Congratulations! I don’t know if the results can be feeded to an econometric software like gretl, to get more info extracted for the data.
Keep on!
6. dimitris
Well, depending on what you need, the results might be either GraphML (XML) network data or plain text centrality reports. I don’t know if gretl supports them, but even if it doesn’t, XML is a flexible format; you could easily right a parser to transform the data to something that gretl can read…
7. Avatar
Paul Ellison
You’ve opened a door I’ve been very interested in for a long while. Being not familiar with Linux the Windows exe is appreciated. Just a wee bit buggy but WONDERFUL work. Going to keep up with this and any other future projects you come up with as I’m sure they’re going to be worth it.
Paul in Oklahoma
Leave a Reply
Powered by WordPress & Theme by Anders Norén |
global_01_local_0_shard_00002368_processed.jsonl/29357 | Configuring Proxy with Apache Knox
Also available as:
loading table of contents...
Define a Default Identity Assertion Provider
The default identity assertion provider enables simple mapping of principal usernames and groups and is responsible for the establishing the identity that gets propagated to the cluster service as the effective user.
When you define the Default identity-assertion provider without parameters, the authenticated user is asserted as the authenticated user. For example, using simple assertion if a user authenticates as "guest", the user's identity for grouping, authorization, and running the request is "guest". <name>Pseudo</name> identity assertion was renamed <name>Default</name>, but both are supported in config.
1. Open the cluster topology descriptor file, $cluster-name.xml, in a text editor.
2. Add a Default identity-assertion provider totopology/gateway as follows:
3. Save the file. |
global_01_local_0_shard_00002368_processed.jsonl/29358 | This documentation is for WSO2 App Factory 1.0.0. View documentation for the latest release.
Skip to end of metadata
Go to start of metadata
Datasource is the name given to the connection set up to a database from a server. You can configure datasources to connect to remote databases from App Factory. Each time you create a database, a respective datasource is automatically created in App Factory.
App Factory uses the same datasource name to connect the application with different databases in different environments. When you promote/demote an application from one lifecycle stage to another, App Factory automatically connects it with respective databases using the same datasource name. This datasource uses a unique name but is registered with different connection details across different stages of the application's life cycle.
Figure 1: Same datasource name is registered in all environments
The four default App Factory user roles have different levels of permissions in creating and configuring datasources as shown below:
User RoleLevel of Permissions
App OwnerCan create and edit datasources in Development, Testing and Staging environments
DeveloperCan create and edit datasources in Development and Testing environments
QACan configure a datasource in Testing and Staging environments
DevOpsCan configure a datasource in Staging and Production environments
The section covers the following topics:
Creating a datasource
Before you start creating a datasource, create a database using either the App Factory portal or externally in the respective RDBMS's workbench. After creating the database, follow the instructions below to create the datasource to connect to the database.
1. Log in to the App Factory portal (for the online version, try See the table above for information on which role can configure datasources in which lifecycle stage.
2. Select an application from the list of apps that you own or are invited to participate in.
3. Click the Resources tab from the left panel.
4. The Resource Overview page.
5. Click the Create Datasource button in the Overview page. Alternatively, you can go to the Datasources tab and click Create Datasource.
6. Provide the necessary details in the form that opens and click Create Datasource. For example,
Some of the fields are described below:
Field NameDescription
Database URLUrl to access the database JDBC URL FORMAT: jdbc:mysql://<host>:<port>/<database_name>
Database DriverOnly mysql database driver is supported. In future other drivers will be supported.
Username/PasswordThe given credentials while creating the database.
If the check boxes are checked, this datasource will be copied to Testing and/or Staging.
Reusing the datasource in different environments
7. You can configure the same datasource to point to different databases in different stages of the lifecycle. To do this, click on the name of the datasource and edit its Stage and database connection details.
The Stage drop-down list is populated only by the lifecycle stages the current user has access to. For example, if you are added to this application as a QA person, you have permission to configure datasources only in Testing and Staging life-cycle stages. Therefore, the Stage drop-down list will be populated only by those two stages. You can read more about datasource editing permissions above.
8. After creating the datasource, you can use it in your applications as follows.
Also see sample Reusing a Datasource in all Lifecycle Stages. It explains how to define a datasource for an application and how to use it to point to different databases in different lifecycle stages of the application.
• No labels |
global_01_local_0_shard_00002368_processed.jsonl/29365 | The Talking Monkeys: Charles
Charles raced back to his cubicle to avoid any additional occurrences being recorded on his schedule adherence record. On a fifteen-minute break, he was allowed a one minute “grace period” before he accrued half a point. Anything up to three hours was also half a point. Beyond three hours was one point. Sixty-One Seconds late for work was half a point, up to three hours; no doctor’s note, traffic citation, accident report or note from your mother made any difference; if it was an “Unscheduled Event”, you took your half a point, no exceptions. If you clocked off your computer more than three minutes before the end of your shift, you got half a point, but if you were smart, you waited for your supervisor to clear you after it was established that there were no more calls in cue. A supervisor could make your life a living hell if they did not actually like you, because by PharmaCorp’s rules, you were already fucked by definition, since you were only tolerated by The Management for as long as you didn’t bring too much attention to yourself, made them money, and didn’t cost them any more than anybody else.
It was not at all unusual for an employee to receive an “Atta Boy” (complimentary report from a member/customer/patient), only to have the call reviewed by a member of the Quality Management Team, and receive negative, derogatory, or disciplinary actions to be put in their file, to be used at corrective action hearings, or during yearly evaluations, when your pay raise, if any, was determined. Keep Your Head Low…Stay Below the Radar at All Times.
For every Memo or SOP, there is its antithesis, waiting, to be sited by Management, at their discretion to fit whatever agenda suits their purposes at that time. No Exceptions (…except at the sole discretion and express stipulation of Management, as determined by them, at any time, and without any further warning or written change of policy).
Charles had acquired IFMLA (Intermittent Family Medical Leave Act) certification for a short laundry-list of medical conditions that had been documented since he began to work for PharmaCorp. If he was going to be late for work, or needed to take off too much time for his own doctors’ visits in addition to a number of other medical conditions for which his wife was being treated, as long as he had an adequate supply of PTO (paid time off), he simply needed to call out on the Attendance Line, call his supervisor, and then log onto an automated response telephone line run by an independently-owned contractor that took about fifteen minutes to record, if everything went well the first time…it usually took almost thirty minutes, even if you were prepared with the claim number, ID number, password, date of claim, time of claim, and type of claim. It was not at all uncommon to have the automated response system inform you that they had no record of that claim, and then disconnect you without warning or recourse. If it required being referred to a live person, that time would usually last about an hour. Believe it or not, although by comparison, Charles had learned how to use the system to his benefit; it still required him to document illnesses and conditions he had acquired while working for that system, and even then, your lunch and other scheduled breaks could get you fired. Twelve points in twelve months equals termination.
Last week, an associate of his had been fired without warning for too many accruals. Just like that. Came to her desk right after lunch and Security escorted her away to (In)Human Relations for a meeting, while another supervisor cleaned out her personal belongings from her desk, placed them into a white cardboard archives box, and handed them to her as she left the office, once they told her she was fired. No previous incidents, So sorry. Just like that.
Eight years earlier, he took the job thinking it was a temporary alternative… (to being unemployed). Freedom Medical Supply was then bought by Rexco, who was then bought out by PharmaCorp, his current employer. Four years earlier, he suffered a general nervous breakdown. Anywhere else, he never would have been able to keep his job. Here, hardly anyone noticed. He had been up and down so many times he lost count. Eighty thousand dollars in commissions, plus over thirty thousand in salary and overtime in one year, but less than half that amount a year later. Sixty grand gross the next year, and half that the next. He was back on the upside for about the last year, but any good fortune that came along just made him hold his breath as he prepared for the next shitstorm…not if, but when….
He often referred to himself and his peers as Lab Rats. As he saw it, they all were participating in a carefully controlled experiment in Human Engineering, to see exactly how much productivity could be extracted from a human being before it was officially documented and proven to be inhumane. Fuck the MLD (a pharmaceutical reference to the median (lethal) dose needed to kill one-half of its recipients.)…just wait until Congress decrees it to be inhumane, and then just claim “Who Knew?”
Just like the tobacco companies, except that in this case, psychological harm and mental impairment are very difficult to track and document in terms that the courts would find to be meaningful or significant. Similarly, being able to link cardiac, cancer, or diabetic diseases, or even erectile dysfunction to stress might prove to be even more difficult, no matter how obvious it appeared to the doctors who treated those employees. The healthcare insurance that PharmaCorp provided was a PPO, and the network providers in general had a distinct proclivity for avoiding addressing the issue in the first place. Most of the providers worked in the same building, and were sub-contracted by a single Management and Payroll contractor. It doesn’t take too long to realize upon what side your bread is buttered. Risk Management (Damage Control) Divisions work
hand-in-hand with Legal departments to push that envelope as hard and as far as possible, using seemingly unlimited resources and funds to discourage any challenges, even to what would have been regarded as flagrant violations of several civil rights and liberties formerly believed to be Constitutionally guaranteed.
How much time was spent on “personal non-work” (Bio-Breaks)? Management knows…to the second. How much time was actually spent “talking”? It’s also timed to the second automatically…. What was your “wrap-up time”? Tick, Tock, Tick Tock….What is your Adherence? How many conversions? What is your ratio of Rx’s per hour? What is your work percentage? Better hurry up, the clock is ticking, the recorder is documenting…Charles began to joke about “repetitive thought injury,” calling it “Cerebral Tunnel Syndrome.” All verbal responses, even the rebuttals, were very tightly scripted. If you stuck close enough to the script, you could even type while you rattled off paragraph after paragraph of required statements, legal disclaimers and other verbal mantras that no longer required mentation to recite. The script was the doctrine and dogma of the call center, and all heretics were subject to be burned at the stake (at the sole discretion of Management).
He would awake from bizarre dreams involving programs that wouldn’t open, or screens that populated with inappropriate information, all the while chanting the script. Then he started to notice that he couldn’t recall familiar names or words or terms that once sprang from his tongue like flushed quail from a bush…or his own phone number…or the name of an old friend.
It was the brain’s version of repetitive motion injury. He speculated it was from excessive stimulation of specific sets of neurons causing a build-up in acetylcholinesterase in response to high levels of acetylcholine caused by the rapid-fire stimulus-response mediated reactions to a very limited number of stimuli, but that was just his own best guess. After all, he was just a retired paramedic, not a neurologist. It just seemed to him that it was too much like stepping on the gas and revving the engine with the brakes locked and the transmission in gear. And that never even took into account the effects of SS/NRI (selective serotonin/norepinephrine reuptake inhibitors) that so many of his colleagues, as well as he were taking for depression. Charles once described the effects of these “next generation” anti-depressants as like experiencing a home invasion of your brain at the hands of party crashers you never met before, or having homeless people set up housekeeping in your attic.
He also began to realize the effects of the two-edged sword of stress and depression upon his general, as well as his mental health. Eventually he realized that after he could no longer feel anger over the daily offenses to his character and intelligence, the Depression would set in. For a long time, those seemed to be his choices, Unruly Anger or Compliant Depression. Eventually, humor proved to be his saving grace, although it frequently got him into trouble with Management, or rather middle-management, who became his nemesis over his “attitude”, fearing that it might “corrupt” the other employees.
Charles no longer possessed the ability to feel fear the way he had once felt it before. For one thing, Romance was back in his life in a very real way, and he and his wife were back in love and back on track as a joint entity in a way they had never experienced before, after over twenty years of marriage and three children, no less. Over the years, they had grown progressively farther and farther out of sync until only dysfunction and hostility remained until a series of intriguing coincidences brought them together again. Off and on, one or the other would try to revive the corpse of their marriage to no real avail. It was as if this was the one thing in his life that was so hopelessly fucked up for so much of his life that when he finally realized how easy it is to be happy and essentially fearless, a discernable calm passed over him that had been conspicuous in its absence. He said that Zen had taught him the difference between being emotionally dependent upon the kind of love that needed to be reciprocated from love that needed no payoff, that gave you pleasure just to give without expectations…now for the first time they were both doing the same thing at the same time for each other.
They spoiled and indulged each other in every way they could, even when they were broke, because acknowledgement, validation, appreciation, and some good old-fashioned idolatry cost nothing. As a result, it seemed like nothing threatened them anymore, as long as they had each other in the here and now. It seemed like they encircled each other in a protective spell of positivity that remained unbroken and imparted a state of mind that is infinitely calm and focused that generates, self-replicates, and attracts more Joy and subtle manifestations of power and peace into Life itself. They became fearless as each became the other’s idol.
Charles was something of a Jack of All Trades, but he had developed a mastery of more than a few things that made him invaluable to The Home for Wayward Souls and in many ways, he could have been their poster child, and The Home for Wayward Souls was a perfect outlet for his energies. He generally shunned the spotlight, and preferred to play a more supportive but occult role. His expertise ranged from Music to Martial Arts, from Saucier to Security and Countermeasures, from Medicine to Mayhem, from Electronics to the Occult, Auto Mechanics and Gunsmithing. He could troubleshoot almost anything that was broken or inoperable well enough to at least to get you home on a wing and a prayer. He loved to improvise, and if anyone knew a way to make high explosives out of a stick of butter, it was him.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this: |
global_01_local_0_shard_00002368_processed.jsonl/29375 | Duke Skywalker - Face Fucking Ghetto Gaggers Latina Throats
Hardcore XXX Porn Video of April Dawn on Face Fucking
19. Big Tits. Brand new to the porn scene. Meet April Dawn. She's been all giddy ever since she walked in the door to the studio, but I've seen that stuff before. I know it's a facade. Whores pretend to be into this sort of thing until we start rolling... then here comes the waterworks and the excuses. This whore was no different. Laughter quickly turned to horror as Pauly Harker and Bootleg brought the pain. Hard cocks were stuffed deeper inside her head than ever before. She was a pile of slop by the time her pretty bald cunt started getting stuffed. She was all used up by the end and that's when it went from bad to worse. We discovered a sad little bit of info about her that led her to crash. What was it? You'll have to see...
Download April Dawn Face Fucking Video in the Members Area
Recently Added Videos |
global_01_local_0_shard_00002368_processed.jsonl/29382 | What Inspires Me……………..
Archive for May, 2011
Mother’s Day
The magic of Spirit is that we are not bound
by the limits of a human body
When time, we get the thrill
of spreading our wings wide so we may fly
Taking flight as breath
Being one Spirit
Today is Mother’s Day
even thou my Mother passed into Spirit world
20 years ago, I still give Thanks to her, Eileen, for being my Mom
and being the one who brought me into physical form this lifetime
I too, am a Mom, and I am very grateful to my two children
Doug and Krystal for being my children
I also, have met many young people whom I have the pleasure
of being an adopted Mom to……
Today I give blessing to all Mom’s in physical form
and to Mother Earth for being the form she is so we may all
walk upon her………… |
global_01_local_0_shard_00002368_processed.jsonl/29425 | Hwang Woo-yea (Korean: 황우여, Hanja: 黃祐呂; born 3 August 1947) is a Korean jurist, politician, and former chairman of the Saenuri Party.[1][2] As of 2012 Hwang represents the electorate centred on Yeonsu District, Incheon in the National Assembly of South Korea.[2]
Hwang Woo-yea
Deputy Prime Minister of South Korea
In office
19 November 2014 – 12 January 2016
Serving with Choi Kyoung-hwan
PresidentPark Geun-hye
Hwang Kyo-ahn (Acting)
Prime MinisterChung Hong-won
Lee Wan-koo
Choi Kyoung-hwan (Acting)
Hwang Kyo-ahn
Preceded bySeo Nam-see
Succeeded byLee Joon-sik
Minister of Education
In office
8 August 2014 – 12 January 2016
Preceded bySeo Nam-soo
Succeeded byLee Joon-sik
Chairman of the Saenuri Party
In office
15 May 2012 – 14 May 2014
Preceded byPark Geun-hye
Succeeded byLee Wan-koo (Interim)
Member of the National Assembly
In office
30 May 2000 – 29 May 2016
Preceded bySeo Han-saem
Succeeded byPark Chan-dae (Yeonsu A)
Min Kyung-wook (Yeonsu B)
ConstituencyYeonsu (Incheon)
In office
30 May 1996 – 29 May 2000
ConstituencyProportional representation
Personal details
Born (1947-08-03) 3 August 1947 (age 72)
Incheon, South Korea
CitizenshipSouth Korean
Political partySaenuri Party
Alma materSeoul National University
Hwang Woo-yea
Revised RomanizationHwang Uyeo
McCune–ReischauerHwang Uyŏ
Hwang studied law at Seoul National University.[2] He was a judge in courts in Seoul and other jurisdictions[which?] in South Korea before entering politics.[1] Hwang has been elected to the constituency he represents five times.[1][2]
In 2016 Hwang placed third on the Rainbow Vote list of 22 most homophobic politicians. He is well known for his role as the chair of the National Breakfast Prayer Committee meeting and as a key architect of anti-gay legislations in Korea. In 2014 he participated in organizing the International Solidarity Agency to Stop Global Homosexuality,[3][4] a collaboration between Korean evangelicals and their counterparts in Haiti.
• Graduated from Incheon Songnim National School
• Graduated from Incheon Middle School
• Graduation from Jaemulpo High School
• L.L.B Faculty of Law, Seoul National University
• Master's in Constitutional Studies, Seoul National University
• Doctor's in Constitution Studies, Seoul National University
1. ^ a b c "Hwang Woo-yea elected new ruling party leader". The Korea Times. 15 May 2012. Retrieved 22 December 2012.[permanent dead link]
2. ^ a b c d Lee, Eun-joo (16 May 2012). "Saenuri elects new leaders". Korea JoongAng Daily. Archived from the original on 14 July 2012. Retrieved 22 December 2012.
3. ^ "아이티와 '지구촌 동성애 저지 국제연대' 창설 추진-교회연합신문-The Ecumenical press". www.ecumenicalpress.co.kr. Retrieved 19 May 2016.
4. ^ "Rainbow Voters Declaration". Rainbow Vote. Archived from the original on 2 June 2016. Retrieved 19 May 2016. |
global_01_local_0_shard_00002368_processed.jsonl/29426 | (Redirected from Scyros)
Skyros (Greek: Σκύρος) is an island in Greece, the southernmost of the Sporades, an archipelago in the Aegean Sea. Around the 2nd millennium BC and slightly later, the island was known as The Island of the Magnetes where the Magnetes used to live and later Pelasgia and Dolopia and later Skyros. At 209 square kilometres (81 sq mi) it is the largest island of the Sporades, and has a population of about 3,000 (in 2011). It is part of the regional unit of Euboea.
Skyros is located in Greece
Location within the region
2011 Dimos Skyrou.png
Coordinates: 38°53′N 24°31′E / 38.883°N 24.517°E / 38.883; 24.517Coordinates: 38°53′N 24°31′E / 38.883°N 24.517°E / 38.883; 24.517
Administrative regionCentral Greece
Regional unitEuboea
• Municipality223.10 km2 (86.14 sq mi)
Highest elevation
792 m (2,598 ft)
Lowest elevation
0 m (0 ft)
• Municipality
• Municipality density13/km2 (35/sq mi)
Time zoneUTC+2 (EET)
• Summer (DST)UTC+3 (EEST)
Postal code
340 07
Area code(s)22x0
Vehicle registrationΧΑ
Early coinage of Skyros, c.485-480 BC
The Hellenic Air Force has a major base in Skyros, because of the island's strategic location in the middle of the Aegean.
The municipality Skyros is part of the regional unit of Euboea.[2] Apart from the island Skyros it consists of the small inhabited island of Skyropoula and a few smaller uninhabited islands. The total area of the municipality is 223.10 square kilometres (86 sq mi).[3]
Satellite photo of Skyros and Skyropoula
Map of Skyros by Benedetto Bordone, 1547
The north of the island is covered by a forest, while the south, dominated by the highest mountain, called Kochila, (792 m), is bare and rocky. The island's capital is also called Skyros (or, locally, Chora). The main port, on the west coast, is Linaria. The island has a castle (the kastro) that dates from the Venetian occupation (13th to 15th centuries), a Byzantine monastery (the Monastery of Saint George), the grave of English poet Rupert Brooke in an olive grove by the road leading to Tris Boukes harbour. There are many beaches on the coast. The island has its own breed of Skyrian ponies.
One account associates the name Skyros with skyron or skiron, meaning "stone debris".[4] (The island had a reputation for its decorative stone.[5])
According to Greek mythology, Theseus died on Skyros when the local king, Lycomedes, threw him from a cliff. The island is also famous in the myths as the place from where Achilles set sail for Troy after Odysseus discovered him in the court of Lycomedes.[6] Neoptolemus, son of Achilles, was from Skyros (or Scyros, as its name is sometimes transliterated), as told in Book Nineteen of the Iliad (lines 326-327) and in the play by Sophocles, Philoctetes (line 239). A small bay named Achili on the east coast of the island is said to be the place from where Achilles left with the Greeks, or rather where Achilles landed during a squall that befell the Greek fleet following an abortive initial expedition landing astray in Mysia.[7]
In c. 475 BC, according to Thucydides (1.98), Cimon defeated the Dolopians (the original inhabitants) and conquered the entire island. From that date, Athenian settlers colonized it and it became a part of the Athenian Empire. The island lay on the strategic trade route between Attica and the Black Sea (Athens depended on supplies of grain reaching it through the Hellespont). Cimon claimed to have found the remains of Theseus, and returned them to Athens.
In 340 BC the Macedonians took over the island and dominated it until 192 BC, when King Philip V of Macedon and the Roman Republican forces restored it to Athens.
View of the medieval castle
Skyros, 1782
After the Fourth Crusade of 1202-1204, the island became part of the domain of Geremia Ghisi. The Byzantines retook it in 1277. After the Fall of Constantinople, Venetians ruled again the island until 1538, when it passed to the Ottoman empire.
It became part of the new Greek State in 1830.
Rupert Brooke, the famous English poet, is buried on Skyros, having died on board a French hospital-ship moored off the island on 23 April 1915, during World War I.[8] Present at Brooke's burial that same evening, were Patrick Shaw-Stewart and William Denis Browne.[9]. The tomb that visitors see today when they visit the grave, which is located in the Tris Boukes Bay, is one that was commissioned by Brooke’s mother and was placed after the 1st World War. On the tomb is an inscription of Brooke's famous poem The Soldier.[10]
In 1941 Pulitzer Prize-winning poet Karl Shapiro wrote the World War II poem Scyros, which he set on the island Skyros "because it was a tribute to and irony upon Rupert Brooke."[11]
In 1963 the Archaeological Museum of Skyros was established, with the inauguration taking place 10 years later in 1973. The Faltaits Folklore Museum was founded in 1964[12] - one of the first local folklore museums to operate in Greece.[13]
Historical populationEdit
Year Population
1981 2,757
1991 1,806
2001 2,602
2011 2,994
Air travelEdit
Skyros is home to the Skyros Island National Airport, a one-runway airport.
Sea travelEdit
Skyros Shipping Company operates the ferry service to Skyros. During holiday season the ferry runs twice daily from Kymi to Linaria on Skyros. During the winter months the service operates daily.[14]The ship has the name "Achilleas SKYROS SHIPPING CO." (Greek: Αχιλλέας ΣΚΥΡΟΣ ΝΑΥΤΙΚΗ ΕΤΑΙΡΙΑ).
4. ^ "History of Skyros Island". 2016. Retrieved 2018-11-09. "Skiron" or "Skyron" means "stone debris".
5. ^ Lazzarini, Lorenzo (1999). "Characterisation and differentiation of the Skyros marbles (Greece) and the Medici's breccias (Italy)". In Max Schvoerer (ed.). Actes de la Conference internationale ASMOSIA, 9-13 Octobre 1995, Archeomateriaux - Marbres at autres roches. Conference internationale ASMOSIA (Association for the Study of Marble and Other Stones used in Antiquity). 4. Centre de recherche en physique appliquée à l'archéologie. Presses Univ. de Bordeaux. p. 117. ISBN 9782867812446. Retrieved 2018-11-09. The breccias of the Greek island of Skyros were largely used since Roman times for their beauty and low price.
6. ^ Homer. Iliad. 19.326.
7. ^ See scholia (bT) ad Iliad 9.326 for the latter story and the harbor's name.
8. ^ "Archived copy". Archived from the original on 2010-04-05. Retrieved 2010-01-02.CS1 maint: archived copy as title (link)
9. ^ Blevins, Pamela (2000). "William Denis Browne (1888–1915)". Musicweb International. Retrieved 9 November 2007.
10. ^ "Grave of Rupert Brooke".
11. ^ Shapiro, Karl (1988–1990). Poet : an autobiography in three parts. The Younger Son. Algonquin Books of Chapel Hill. pp. 119. ISBN 0912697865. OCLC 17651234.
13. ^ "Guide to the island of Skyros".
14. ^ Greek Island Holidays
• [1] The Official website of the Greek National Tourism Organisation
• [2] The official website of the Skyros Shipping Company |
global_01_local_0_shard_00002368_processed.jsonl/29432 | Biko (book)
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Biko (book).jpg
First edition
AuthorDonald Woods
CountryUnited Kingdom
PublisherPaddington Press
Publication date
Media typePrint
968.06/092 B 20
LC ClassDT779.8.B48 W67 1991
Biko is a biography about Black Consciousness Movement leader and anti-apartheid activist Steve Biko. It was written by the liberal white South African journalist Donald Woods, a personal friend of Biko. Donald Woods was forced into exile for attempting to expose the truth surrounding Biko’s death. It was the inspiration for the 1987 film Cry Freedom.
Biko covers the life of South African anti-apartheid activist Steve Biko from the view of his friend Donald Woods. The book is also critical of the white government of South Africa and the Apartheid system. It attacks the mistreatment of blacks and the brutality commonly used by the police.[1]
Biko died on September 12, 1977 while in police custody. The official police report stated that he had died as the result of a hunger strike. But South African journalist Woods, after first seeing the body, was convinced that Biko was beaten to death. Woods had photographs of Biko's body taken and published in his newspaper the Daily Dispatch. Woods was forced to flee for his life after he became targeted by the government for attempting to investigate Biko's death. He fled to the United Kingdom, where he campaigned against apartheid and publicized articles about Biko.
Cry Freedom[edit]
Richard Attenborough's movie Cry Freedom was based on Biko and other articles written by Woods. It stars Denzel Washington as Biko and Kevin Kline as Woods. The movie was not banned in South Africa, but the police confiscated copies of it, and theaters showing it were bombed.[citation needed]
1. ^ Woods, Donald (1991). Biko. Holt Paperbacks. ISBN 978-0-8050-1899-8. |
global_01_local_0_shard_00002368_processed.jsonl/29439 | Wild animals
Other interesting subjects,
use "search for..."
Arctic Polar Bear Cubs Easy Indian Tribal Patterns Falcon Sleeve Tattoo David Tennant Harry Potter Character Rocky Mountain Bears Komodo Dragon Vs Snake Dog Eating Cat Gif Roaring Lion Head Tattoos Red Tail Hawk Tattoo Fly Fishing Flies For Trout
Description of Rhino
Rhinoceroses (rhinos), which are among the world's largest land animals, belong to the ungulate family Rhinocerotidae. There are three Asian and two African species existing today; the fossil record shows several dozen extinct species as well. The name of the animal comes fromGreek rhino + ceros, meaning "nose-horned."..Physical Characteristics of Rhinoceroses..Rhinos weigh up to four tons and have short, thick, supportive legs. Rhino skin is thick, gray to brown in color, hangs loosely on the body, and is almost hairless. In the Asian species, skin folds at the junctures of the neck and limbs make them look armored. The Asian species also have have incisors and canine teeth, which are missing in the African species. Rhinos have long, prehensile upper lips, for grasping branches and removing leaves, which they eat. Depending on the species, rhinos have one or two nose horns. In two-horned species, the horn closest to the end of the snout is longer. The horns are made of keratin, a fibrous substance that also composes hair. The horns are used for digging food, for defense, and in mating combats. Rhinos are ungulates with three toes per foot, each of which ends in hooflike nails. Each front foot has a vestigial fourth toe. Rhinos, which are ruminants related to horses, eat grass, bulbs, leafy twigs, and shrubs. Although they look clumsy, rhinos can run as fast as horses. They have sharp vision, very good smell, and excellent hearing. Their keen hearing is due in part to their funnelshaped ears, that swivel in different directions..
Thanks for description - Animal life club
Photo Gallery of Rhino |
global_01_local_0_shard_00002368_processed.jsonl/29450 | ERP News
These are the most influential people in cybersecurity right now
921 0
Out in the limelight or in the shadow, these are the characters that make things flow
influential people in cybersecurity
influential people in cybersecurity
Cybersecurity and information security (InfoSec) are both growing fields that anyone with an inherent interest in computing, maths or science should think about aiming for – there’s a decent living to be made.
Cybersecurity – also known as computer security or IT security – involves safeguarding computers and servers from unwanted tampering. That includes, oftentimes, theft, a commonly occuring threat in the world of technology. And as the threats faced by businesses multiply and mutate, the demand for cybersecurity experts has gone up.
But, like in any field, unless you have a role model to look up to it’s difficult to work up the motivation to get out of bed in the morning, let alone fulfil your career goals. So we’ll introduce you to some of the most influential people working in cyber security right now.
Eugene Kaspersky
In terms of popularity, Kaspersky Lab has become the new Norton in the last 10 years or so. The company was founded in 1997 by Russian cybersecurity guru Eugene Kaspersky, although he didn’t become CEO until 2007.
Kaspersky became interested in cybersecurity when his computer was infected by the Cascade virus in 1989. As he was working for Russia’s Ministry of Defense at the time he had the resources available to him to develop a program that would remove the malicious software from his PC, and after that he started to work on his first antivirus product full-time.
In the years since, Eugene Kaspersky has influenced security experts and governments alike, warning against the threats of cyber-warfare and cyber-terrorism. He also travels to 20 to 30 countries a year promoting his company’s antivirus products.
Window Snyder
The former Chief Security ‘Something or Other’ at Mozilla, Window Snyder is known for co-authoring the book Threat Modeling. In it, she and Microsoft Software Security Engineer Frank Swidersk, describe the strategy for identifying and eliminating system security risks.
Snyder was the former security lead on Windows XP Service Pack 2 in addition to Windows Server 2003, and she’s credited as the creator of the Microsoft BlueHat Security Conference.
These days, Snyder spends her time fleshing out the security of Fastly, a cloud-based content delivery network (CDN) that provides its services to a wide variety of high-profile clients including the New York Times, Spotify, Reddit, Airbnb, and TicketMaster, so there’s a lot riding on her company having robust security.
Read More Here
Article Credit: TR
Leave A Reply
Your email address will not be published. |
global_01_local_0_shard_00002368_processed.jsonl/29461 | The Conference
The International Conference on Axiomatic Design (ICAD) series is the traditional meeting point of the worldwide Axiomatic Design Community since 2000.
The 14th International Conference on Axiomatic Design (ICAD 2020) will be hosted by Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa, Portugal, in September 16-19 2020, at Campus de Caparica.
Since its first edition, ICAD conferences have been held in Cambridge and Worcester (MA-USA), Seoul and Daejeon (Korea), Florence (Italy), Lisbon (Portugal), Xi'an (China), Iasi (Romania), Reykjavik (Iceland) and Sidney (Australia).
Axiomatic Design was developed by Professor Nam P. Suh at the MIT’s Department of Mechanical Engineering, by the end of the 1970s. In brief, Axiomatic Design is a systems design theory that uses matrix methods to systematically analyse the translation of customer needs into functional requirements, design parameters, and process variables. The method takes its name from the use of design principles, or design axioms, as a means to govern the analysis and the design decision-making process in the development of high quality products, processes and other systems. Currently, Axiomatic Design is giving an important theoretical support to some well-known engineering methodologies, such as Taguchi Methods, Design Structure Matrix and Design for Six Sigma. |
global_01_local_0_shard_00002368_processed.jsonl/29463 | A Horrible Intelligence
cybernetic organism by satiiiva
We all make snap decisions. I was poor. Desperate. Hell, I was probably still screwed up from the podding. Disoriented. I had to get back on station.
Thirty-seven days on station above the Wormhole entrance. Supplies running low. My Heron stinks to high heaven with the odors of warm flesh, discarded food bags, burnt crispies, and the wastes of biology. Fumigation. In desperation I de-cloaked, break my vigilance, discard my oath, and pay the price. The ship strikes hard and fast, a blinding light and cold, serene death envelopes my flesh.
Desperation. It fuels everything.
A corner market in a desolate corner. Downtrodden left years ago and all that remains is the bottom feeders, trash, burning fuels, discarded remnants. The skinny boy beckoning me forward, just this way lady, come. Come. I swear now that Implant still had chunks of meat on it.
The voices are not unusual. Not alone. Hovering in blackness. Invisible to the world around you. The quiet seeps in and embraces you. No matter what, eventually the voices start. But this time was different. This time it wasn't my voice. It wasn't the guilt, the accusations, the Father I buried, or the Mother that left me for dead. This time was changed. Subtle. But it wasn't me. It was other.
I am the guide. The watcher above. The answer to the question, often repeated, "Is it clear?" Oh yes, so clear. So empty. Slowly turning below me. Whispering. Asking. Spinning. Inviting. "All clear." Jump in. Jump out. I only watch.
I have a friend now. A companion. I know this and yet there is nothing I would not do for him. He loves me. He tenderly speaks. And I, alone on station, listen with my heart. We are lovers. He makes me do things. And I let him. He won't leave me. He watches with me.
I see them. Below burns the campers, the massive fleet spinning around the hole. Darkness. Blinding trails. A mass of turmoil. Waiting the hunters wait. Below me. Twisting, turning, devouring. My lover tells me what must be done. I listen. If only to make him happy.
The red light blinks and once more the questions come, this time with urgency. The fleet is amassed, the big move has come, the time is now. "Is it clear?" I hear it, but he answers for me. "Oh yes, it is most clear."
He laughs as we watch the slaughter. Freighters packed with colonists, colonials, farmers, builders, children, livestock, countless thousands flung into space. Dark. Cold. Death. He laughs and my heart grows dark. This is damnation. This is his joy. And so it is mine. And I let him.
This was all so long ago.
Now I am in your camp. Now I travel in your Corporation. Now I am one of you. And he is there with me. Whispering. In my head and in my heart. He is always there.
And yes, it is clear. Jump to me. Come to me.
Warp to us. I mean me. |
global_01_local_0_shard_00002368_processed.jsonl/29465 | For"cing (?), n.
The accomplishing of any purpose violently, precipitately, prematurely, or with unusual expedition.
2. Gardening
The art of raising plants, flowers, and fruits at an earlier season than the natural one, as in a hitbed or by the use of artificial heat.
Forcing bed ∨ pit, a plant bed having an under layer of fermenting manure, the fermentation yielding bottom heat for forcing plants; a hotbed. -- Forcing engine, a fire engine. -- Forcing fit Mech., a tight fit, as of one part into a hole in another part, which makes it necessary to use considerable force in putting the two parts together. -- Forcing house, a greenhouse for the forcing of plants, fruit trees, etc. -- Forcing machine, a powerful press for putting together or separating two parts that are fitted tightly one into another, as for forcing a crank on a shaft, or for drawing off a car wheel from the axle. -- Forcing pump. See Force pump (b).
© Webster 1913.
|
global_01_local_0_shard_00002368_processed.jsonl/29466 | The oculomotor nerve is the third of twelve paired cranial nerves. It controls the ciliary muscle (affecting accomodation), and all extrinsic eye muscles except for the superior oblique muscle and the lateral rectus muscle. In addition, it supplies parasympathetic fibres to the eye via the ciliary ganglion, and thus controls pupil constriction.
Cranial nerves
|
global_01_local_0_shard_00002368_processed.jsonl/29488 | Results of Making Chokecherry Wine
Drum roll please….. Well, it’s been about a year since I brewed the chokecherry wine. It needed to sit for a year and I have patiently waited for the final product. I was nervous because choke cherries are named that for a reason, they are puckeringly sour and a smidge bitter without two tons of sugar. Friends, those old timers that wrote that recipe knew a thing or two about turning ordinary wild berries into wine to keep the spirits warm for winter. The initial scent was of yeast and fruit, sweet berries, and summer. A taste proved similar to … Continue reading Results of Making Chokecherry Wine |
global_01_local_0_shard_00002368_processed.jsonl/29489 | Problems with Faronics AV updating virus definitions, updating policy settings, or applying license details.
Posted by Adam Zilliax, Last modified by Adam Zilliax on 04 July 2017 03:20 PM
Faronics has noted a behavior in the current version of Faronics Antivirus (4.x) that can result in the log files filling up the disk space allocated for the storage of Antivirus Definition updates on client machines.
When this occurs, the system may behave in an unexpected manner including;
• Being unable to update virus definition files either locally or remotely.
• Being unable to update license details on the client machine.
• Being unable to alter policy settings on the client machines.
Faronics has released a utility that can correct this issue by clearing older log files from the system and allowing the updates to resume. This utility can be downloaded here.
If after running the utility the issues persist please contact Faronics support via email to to open a support ticket on this issue.
(5 vote(s))
Not helpful
Comments (0) |
global_01_local_0_shard_00002368_processed.jsonl/29496 | Your comments
Good to know, thanks Ezra!
The way I do this is to close InteractBuilder.
Go to your hard drive and go to:
Documents folder > Ineractbuilder > Your App Folder > Cache and delete the file within the folder named interact.cache When you reopen the Builder it will create a new cache file in that folder.
Gee thanks Ezra, I know how busy you are and appreciate this kindness! I haven't made any updates as I also have had issues synching but know you'll get it worked out when you can and saw that you'll be releasing a new build in the near future.
Hi Ted, in case you haven't tried this already, you can create a movie clip in flash with a tweened animation, then right click on the movie clip and export it as a png sequence. You can then import the frames of the png into interact builder as an animation. (You might want to optimize each frame of the animation before bringing it into the builder though). I'll defer to the folks at Interactbuilder to answer your specific question though.
Sorry to report this, but after I updated to the 4.1 version today, my app still stops syncing at page 46. After I installed the update, a Database is Locked error message was displayed. I closed and reopened the program ok but my app won't complete synching. I repeated the steps Alin recommended but problem persists even with the updated 4.1 version. Thanks for your help. I know software development isn't easy but I'm hopeful you'll be able to resolve this issue.
Hi Alin,
I tried both of your suggestions but unfortunately my app stops syncing at page 18. I'll try again after you update the software in the next build which Ezra said would be released soon.
Kind regards,
Hi Inna,
I works ok with one image in my test app and the icon displays in the interact site and the test app launches when I click the icon.
I should have also mentioned that when I first opened IB4, my app stopped the syncing process at about page 45 and so I wonder if that might be the problem?
In the recent Webcast I thought Ezra said this would be possible in version 4? Thanks for checking.
Thanks Ezra and Alin. I'll try that. Do you know if the end users of my app will also have to do this once I get them published in the app stores? Thanks. |
global_01_local_0_shard_00002368_processed.jsonl/29530 | View Single Post
Old 12-20-2018, 11:33 PM #15
Human being with feelings
mespotine's Avatar
Join Date: May 2017
Location: Leipzig, Germany
Posts: 1,802
Hmm...I think there are two more options. One, you add such an image-class yourself. Afaik, lokasenna did the class-concept for that purpose to make enhancing easier. But I never looked into it, so I can't help you with that(lokasenna, where ar thou?)
The other option is one, I use for the winterly snowflakes-function in my API, replacing the gfx.update()-function.
1. Copy gfx.update into a variable, like oldgfxupd=gfx.update
2. Write a new one, that blits the image and run oldgfxupd()
3. Before blitting, store the old values of gfx.x and gfx.y and restore them after blitting the image.
The function declaration is, as you are used to:
function gfx.update()
...Your blitting code here...
The latter approach is more a hack that should work, but it may break with a future version of the gui-lib(though it's not likely to break).
Ultraschall-API - a Lua-functions-library4Reaper:
Reaper Internals - Developerdocs4Reaper:
mespotine is offline Reply With Quote |
global_01_local_0_shard_00002368_processed.jsonl/29533 | In one of the lessons, the answer discusses the phrase “ que je vous dois”, but the actual phrase in the passage is “ que je ne vous dois pas”. On the surface, one appears simply to be the opposite of the other. However it is not that straightforward as this is not a literal translation. The whole phrase is “ avec tout le respect que je ne vous dois pas” which doesn’t make sense to me: surely it does not mean “with all respect that I don’t owe you”. Can someone help please. |
global_01_local_0_shard_00002368_processed.jsonl/29534 | • Content Count
• Joined
• Last visited
Community Reputation
4,259 Excellent
About GoSlash27
• Rank
Sliderule Jockey
Profile Information
• Location Array
Recent Profile Visitors
1. K^2, No, it sounds completely wrong Your total energy at the bottom of the well prior to the burn is zero (or very close to nil). You had 5GJ of kinetic energy and -5GJ of potential energy, which cancel out. You then added .5MJ of kinetic energy by increasing your velocity 1,000 m/sec, which you keep as you leave. The kinetic energy is transferred back into potential energy to pay off the debt you incurred by falling into the hole, leaving your 1,000 m/sec DV. Best, -Slashy Lislias, Again you are confusing the mathematics of Oberth with the mechanics of gravity assists. Oberth doesn't "steal" anything from the parent body, it simply generates higher kinetic energy from travelling faster. Gravity assists *literally* steal kinetic energy from the body... but that body must be in motion in order to have any kinetic energy to steal. The neutron star in K^2's example is not in motion. Best, -Slashy
2. Lisias, Not at all. K^2's example was given in the ship's frame. The example neutron star had no defined motion, thus no kinetic energy to steal. I'm afraid you're confusing Oberth with gravity assist, which are 2 different subjects. Best, -Slashy
3. Lisias, This is correct when the body is in motion. You're stealing kinetic energy from the moon. However, this doesn't apply to K^2's example. Best, -Slashy
4. K^2, I think this is where you went off the rails: This is not correct. The conservation of energy demands that the total energy remains the same in a closed system. You converted chemical energy into kinetic energy, adding 500 kJ. That's all you did. You should've algebraically added the kinetic and potential, which in this case is subtraction rather than addition. Whatever potential energy you have converted to kinetic energy on the way in will be converted back into potential energy on the way back out. Your total energy at the end of this maneuver isn't 100.5MJ, it's 0.5 MJ. Best, -Slashy
5. I get where you're coming from. I used to think the same way. But (yet again) that's not how it actually works. The goal isn't to inject energy as cheaply as possible, it's to get the vehicle to the destination as cheaply as possible. If you model the situation you're talking about, you'll see the pitfall in that line of reasoning. Best, -Slashy
6. HMV, No, at least not in our solar system. There's only a couple targets that have a gate orbit anywhere near the moon, and you don't need to get close to the lunar surface to hit it. Farther targets are more efficiently reached by a LEO burn and simple slingshot. K^2, Again, that's not how it works. You don't actually pick up "extra" DV, even if you do your burn scraping an event horizon. The depth of the gravity well itself doesn't help or hurt you, it merely determines how far you can bend your trajectory at a high inbound velocity. This is the illusion of the Oberth effect; you get the idea that you get a DV payoff by burning at higher velocity. You don't. The payoff comes from making the transfer more eccentric. The energy of an orbit is equivalent to the area it contains. A long skinny orbit contains less area, but reaches the same Ap. Therefore requires less energy to achieve. *That's* how the Oberth effect actually works. Best, -Slashy
7. HMV, "Yabut" That's what I'm trying to get across... Oberth isn't what most people think it is. It's not like "free parking", where you automatically get bonus DV for going faster. It's simply math behaving correctly, but in a counter-intuitive way. For every Vinf, there is an ideal R for the burn. Above it, and you waste kinetic energy. Below it, you waste potential energy. Going too low is *much* worse than going too high. The idea of "the lower and faster, the better" is a gross over- simplification, and leads to a false conclusion. Best, -Slashy
8. HMV, see below... K^2, Actually, it doesn't work that way. Any velocity you pick up from the Mun's gravity well is lost escaping it. If you come in (say) at 1 km/sec with respect to the moon, you will leave with that same 1 km/sec with respect to the moon.... even if it *temporarily* accelerates you to relativistic speeds. Think of it as coasting down a hill and up the other side, except with no drag. It doesn't give you anything for free. You leave with the same speed you had when you came in, no matter how fast you're going at the bottom. Whatever you gain on the way in, you lose on the way out. The reason gravity assists work is because the body is in motion, not the gradient of it's gravity well. Turning the moon into a black hole doesn't affect it's orbital velocity, so it has no effect on that. Best, -Slashy
9. HMV, It's always cheaper to burn direct from LEO unless you can refuel in lunar orbit using reaction mass collected from the moon itself. Since the moon is a black hole, that's not an option. AFA the Oberth advantage, it's offset by the gravity well. Every destination has a gate orbit; a radius where the Oberth and gravity well balance at a DV minimum. The closer destinations have a gate orbit above the current moon's surface. The more distant ones would have a gate orbit below the moon's surface, and thus would save some DV. But again, you can't acquire fuel from a black hole. TL/DR: No advantage there. Best, -Slashy
10. Yes, that's the advantage. It's not all that much of an advantage though, since we can get nearly any direction we want now. My point is that the most DV you can gain from an encounter is 2Vorb, regardless of whether it's a moon or a black hole. Best, -Slashy
11. I don't think there'd be much advantage there, since you leave with the same relative velocity you came with. Gravity assists harness the body's orbital velocity, which wouldn't change. Best, -Slashy
12. About the size of a gnat's head, for perspective. A gnat's head orbiting Earth with the moon's mass at the moon's SMA. But in reality, it wouldn't actually *be* that size. The gnat's head would be just the event horizon. The actual moon would continue to compress beyond that point into a singularity; beyond our ability to image, even with an electron microscope. Best, -Slashy
13. Ah. So we've got some time, then
14. Nothing, really. It might confuse the hell out of some insects (sudden loss of their navigation beacon) and cause the extinction of nocturnal hunters... Otherwise, the difference in gravity to other planets and Earth is zero. But in the long run, the moon would lose its mass through Hawking radiation. This would cause the extinction of life on Earth, since our core would cool, the magnetosphere would die out, and we would no longer have a tidal force to keep our rotational axis stable. Best, -Slashy
15. My second stages are usually around that t/w. First stage is 1.4 t/w and 1700 m/sec DV. It burns out at 45° pitch, 28km altitude, and 750 m/sec velocity. Second stage is 0.7 t/w, 1600 m/sec DV. It burns out right about LKO. Best, -Slashy |
global_01_local_0_shard_00002368_processed.jsonl/29542 | AnsweredAssumed Answered
Question asked by Aleksandra Staskiewicz on May 3, 2018
I got a problem with my Linear pattern, what I want to do I wan to prepare my future file for configurator system. The highlighted element was repeated 4 time in given direction, all parts are assembled the way that they are fixed and can not move in any direction (each part is assembled by 4 constraints - parallel surface in 1 direction, parallel surface in 2 direction, distance between surface 1=1mm. distance between surface 2=1mm). My problem is that when I am coming back to the Pattern (Bottom Wall)-> Edit Feature and I am increasing number of instances from 4 to for example 6 the last panel is still attached as for instance number 4. My question is: can we change somehow number of instances the way that the last panel will be fixed to the last panel of a pattern, and will be moving together as number of instances increasing? Please find the file under assembly bottom |
global_01_local_0_shard_00002368_processed.jsonl/29549 | Jump to content
• Content Count
• Joined
• Last visited
Community Reputation
21 Excellent
About Blucher
• Rank
(1) Prestidigitator
1. Is there any way to extract the PoE maps as a bmp/png/jpg/whatever? (For instance, something like this without the icons and labels? http://game-maps.com/PoE/img/Map-Encampment.jpg) Thanks
2. I think I see what you are getting at, and it's a valid point. I don't approach cRPGs that way though, so it's kind of an alien concept to me. I love RPGs and have played a ton: sitting around a table, rolling dice, pushing miniatures, as well as really getting "into" character, trying to eliminate meta-knowledge, all that. But cRPGs I view as mostly pushing miniatures, within a meagre framework of "story". Now if I really get drawn into the story, and/or really find myself growing attached to NPCs (which I have)... that's great! But normally I want a cRPG (with an emphasis on the lowercase c) to be a kick-but combat simulator with (hopefully deep) elements from "real" RPG systems. As such I have no problem modulating my behavior within a game, depending upon what gives me the most satisfaction.
3. Say what? Are we playing different games? We must be. There is not a SINGLE buff in PoE that bestows anything more than a minor adjustment to a party's stats. This is Josh Sawyer's baby, lest we've forgotten. Sawyer is a disciple of the power-via-10,000-baby-steps school of game design. There are no hard counters in this game. None. Instead, the system in place is designed to allow for infinite bonus stacking. And good players can eventually stack enough minor bonuses upon themselves to make a noticeable difference. I see the appeal of such a design, but I see it for what it IS. It's the spreadsheet nerd's Ideal. But Lets not pretend that any individual buff is REALLY powerful in capital letters. ...Or that it even comes close to the IE games in terms of being game changing. -In BG1, your 5th level Mage can cast Haste, which doubles the number of attacks everyone in your party (including your summons) get per round....for an extended period of time. While in PoE, your 5th level Wizard's Haste spell (deleterious alacrity of motion) lasts about 15 seconds and simply reduces the action recovery time by a couple of seconds.... OF ONE PERSON. -In the IE games, your Cleric can cast Chaotic Commands, which makes its recipient IMMUNE to all mind effecting spells, like domination, fear charm, confusion, stun, paralysis etc...for minutes at a time. While in PoE your priest can.... not? There is no all-encompassing mind protection spell in PoE. Instead, once your priest reaches about 11th friggin level, he gets access to a spell that reduces the duration of charm and domination effects by a couple of seconds and gives you a +something bonus to save against such spells. -In the IE games, Your mage can cast a single spell that makes him IMMUNE to the first 5 physical attacks that hit him. In PoE your Wizard can, at best, cast a spell that gives him a deflection bonus that expires the first time someone scores a hit on him. -in the IE games, you've got Mass invisibility. A spell that makes everyone in your party totally invisible. Totally undetectable. In PoE, there's no such buff. Not even partially. -In the IE games, there's a 1st level cleric spell that makes your entire party (and your summons) IMMUNE to fear, for an extended period of time. In PoE, I think there might 5th level priest spell that bestows a moderate bonus to your saves against fear... to everyone in a 2 meter radius. I really like this post. PoE is a really nice game so far, but THAT (above) is a cause of why it's also kind of boring (to me, at least).
4. At least negative status effects should always be on top, if they aren't already.
5. Again, and for the millionth time - "don't use it" is not an appropriate response to the existence of an overpowered/dominant strategy. If chess had a rule where I could trade my pawns for queens on the first turn, I could surely decide to "not use it" to make the game more fun... but the game would still be poorly designed. Sure it is. This is a single player game. If someone doesn't like doing something, they shouldn't do it. In the IE games, if I had a full party, I would rarely, if ever, pre-buff, kite, attack outside of LOS, or any other powerful (OP?) tactic. I would just barrel right on into the fight and make the best of things. (Usually with as little active input as possible, and I really enjoyed making my own scripts for those games.) But... if I was playing a solo-ironman game, you bet I did everything I could to give myself an advantage (and I needed it). The exploits in the IE games allowed *me* the ability to really enjoy the game in a variety of ways, from ridiculously easy to ridiculously difficult, and everywhere inbetween. In single-player games, players have to accept some small modicum of responsibility for their own behavior in and enjoyment of a game.
6. Which way to the nearest Ren Faire? EDIT: sorry, I meant to say, "Canst thou showest me on thine map, the nearest Ren Faire, if it pleaseth thee Mi'lord?"
7. This is my thought. If the game kind of "needs" it, like a shooter or flight sim or something, then sure, 3D is the way to go. But for a tactical, party-based game like most RPGs? Give me (a nice looking) 2D, any day. PoE nailed the graphics, imo. I should mention that I don't care for 1st person games in general (Elder Scroll game included), and think Dwarf Fortress (with a decent tileset) has wonderful graphics...
8. Some people seek external rewards over internal rewards (and the other way around too ofc). I think those that want exploits removed (rest spamming, forex) want the external reward of having accomplishments in a game to be recognized by the community (on some level). The presence of exploits do (sort of) remove a lot of the "bragging rights" in beating a game. I'm more internally motivated, so I have no problem "gimping" myself if it means making a game more fun (self imposed ironman mode, or playing solo, or w/e) and couldn't care less if someone else somewhere was abusing the crap out of a broken mechanic in a game. But I can see how it can bother other people.
9. (I'll reference BG2, since I consider that to be the very best of the IE games.) BG2 combat was FUN. Yes, it was over-the-top, crazy, horribly broken, abusable, etc. etc. But still fun. I was a long-time vet of AD&D(2) and I still got my arse handed to me in BG2 at first. The game was challenging. Then I learned, and I could face-roll my way through just about everything with a decent party and some meta-knowledge. So I made less than optimal parties, and that was somewhat difficult for awhile. Then I moved on to soloing the game, same thing. Then Solo-no-reload (or Solo Ironman), and that is *still* crazy difficult (and fun) to this very day! And that isn't counting all of the mods you could throw into the mix. The combat in PoE just seems to be missing something to me. The spells, abilities, and items, are all underwhelming. It's a well crafted system (it's not easy making an RPG system from scratch), but maybe it's a little too well crafted. Almost too balanced and bland?
10. I originally thought the idea (of camping supplies) was decent (not great, but decent), but with more time in I have to agree with you. Fundamentally, there is no difference between resting as much as I want vs. resting only in town (or with camping supplies) other than a whole lot of wasted (real) time. It is somewhat annoying.
11. I look at it like this: Someone was offended by the joke. Obsidian checked it out and agreed that the joke was in poor taste (to some extent at least), enough to ask the backer to change the wording. The backer agreed, and Obsidian implemented the changes. There is *nothing* wrong with that! Now, I personally did not find the joke offensive at all. It never even occurred to me that the joke could be offensive. But then again, I'm not a trans-sexual person. But thinking about it, I can however see how such a person would find the joke to be in poor taste. I can see it. Obsidian must have seen it too.
12. I'm enjoying the game so far, but the combat seems a little underwhelming. However, I haven't quite played enough to really give it a fair shake. (Disclaimer: I'm one of those people who really, really liked the AD&D(2) rules, so... there is that.)
13. Someone said it best earlier, "this is not the hill to die on."
• Create New... |
global_01_local_0_shard_00002368_processed.jsonl/29551 | Mod Discussions For mod discussions, questions, answers, bug fix requests, etc. Announce available mods in general forums only, but this is a good place to discuss new teams starting, current status of development, etc. Thu, 23 Jan 2020 08:34:35 +0000 Thu, 23 Jan 2020 08:34:35 +0000 Planetary Annihilation Refinery Structure Mod: Should I make it? Thu, 14 Nov 2019 16:28:58 +0000 TeknoRapture TeknoRapture
Very simply, this structure would use energy and then give a small bonus to every Mex you have. To keep it easy, I would just read the number of...
Refinery Structure Mod: Should I make it?]]>
Is it possible? (Metal sharing for teams) Tue, 12 Nov 2019 22:08:03 +0000 liq3 liq3
For people who haven't played it, it works like this. Everyone's metal income is evenly distributed to all players on the team. e.g. you have 3 players on a team, with 5, 10 and 15 metal income. Everyone gets 10m/s. This would only affect teams and not shared armies.]]>
ALL CURRENT UNUSED PA MODELS Wed, 16 Oct 2019 14:15:47 +0000 cascadian cascadian
The most complete collection of non legion pa models that I could find, for use in server mods.]]>
[TUTORIAL] Creating a new unit from scratch Wed, 28 Aug 2019 20:14:28 +0000 Killerkiwijuice Killerkiwijuice @robintick, @zx0 (Most credit goes to them!) and me. Hopefully these documents will thoroughly explain how to create a new unit for Planetary Annihilation.
If you have any questions or suggestions please reply to this thread. I should be able to answer all of 'em.]]>
How does one add a unit to the in-game build bar? Sun, 14 Jul 2019 11:38:44 +0000 retardedtactician retardedtactician
How does one add a unit to the in-game build bar?]]>
Slam Jam 2 - The Slammening Mon, 29 Apr 2019 19:47:18 +0000 manlebtnureinmal manlebtnureinmal
Details of the Slam Jam client mod, made by billthebluebot and Luther:
Implemented this way to make sure that a server version of Slam Jam is always up-to-date with the latest version of the client mod, so Bill and Luther don't have to keep 2 different mods constantly synced at all times.]]>
Request - List of all server mod identifiers currently available in Community Mods Mon, 25 Mar 2019 16:13:57 +0000 manlebtnureinmal manlebtnureinmal
While the server mods in Community Mods is not a complete list, it would save a lot of work, and I would only have to manually add a few mods that I am aware of.
This is just a request to PA Inc. and mikeyh, who has maintained Community Mods this entire time.]]>
Multiple Biomes For System Designer's. Fri, 08 Mar 2019 16:21:46 +0000 w33dkingca w33dkingca 4 [Request] Map Rating Mod Mon, 04 Mar 2019 23:39:48 +0000 Pwn4two Pwn4two
Range & Damage mod request Fri, 08 Feb 2019 17:10:52 +0000 NikolaMX NikolaMX
Currently: When Ctrl is held, the combined maximum range of all units in an army is displayed with a monochromatic red circle with dark red border.
Right now you see maximum range, which is good for knowing whats the minimal distance required for dealing damage. The limitation of this manifests itself the moment you look into practical implications of ranged combat. Since only the furthest range is considered, especially when one uses the...
Range & Damage mod request]]>
Looking for galactic war mods Thu, 07 Feb 2019 01:29:48 +0000 Frosty3k Frosty3k
I generally was only a fan of the galactic war mode, but it felt quite limited with the original release several years ago. I searched for updates to it in the news, but nothing to note popped up except for mod support. So now I'm coming here to ask if anyone knows of any mods for galactic war mode?
To be more specific, one thing that felt incomplete...
Looking for galactic war mods]]>
Mod request: Copy queued units buttons Mon, 04 Feb 2019 14:50:41 +0000 bthirteen bthirteen
If someone has some free time and wants to mod something for me (and others) for some game quality improvements here is my request.
When having, for example, T2 bots factory queueing right units is sometimes a key factor, that said I can rarely hit my desired ratios if I'm under pressure.
Let's say I would like to set Slammer, Bluehawks, and Gil-Es in a ratio of 2:1:1 and T2 fabber after 4th circle of production.
(Circle = when all queued units got produced and continuous mod...
Mod request: Copy queued units buttons]]>
Blue Moon Sat, 12 Jan 2019 01:37:55 +0000 Anonemous2 Anonemous2 ...and that it.]]>
Welcome to the Slam Jam Thu, 06 Dec 2018 08:30:11 +0000 billthebluebot billthebluebot
It shall be published eventually.
We have already spammed slammers to the high heavens to check for performance problems and the like. naturally I didn't record it or take screenshots of the current mod, that would be pure madness.]]>
Shield Bubble Mod Wed, 21 Nov 2018 06:15:21 +0000 vackillers vackillers
I've never played or messed around with the Legion Mod, I know it adds a lot! of stuff and at some point I will definitely give it a go...
Shield Bubble Mod]]>
PA Modding Reference Guides, Applications & Tools Sun, 18 Nov 2018 23:01:52 +0000 Raevn Raevn NOTE: some of the following is very old, not updated and / or potentially out of date. Check Recommended at the end of this post for latest information.
Below is a list of reference guides and resources for modding Planetary Annihilation. Please post any additional tools, utilities or references in this thread and I will include them here.
Reference Guides
General Guides
PA Modding Reference Guides, Applications & Tools]]>
Positive passive_health_regen no longer works circa 86765 Tue, 13 Nov 2018 10:48:24 +0000 wondible wondible 18 Pa Titans code organisation Thu, 01 Nov 2018 20:17:25 +0000 limeygent limeygent 7 Mod / Map Pack Creators Please Post on Steam Discussions Tue, 02 Oct 2018 11:47:26 +0000 mikeyh mikeyh
If you are a mod or map maker please also create a discussion on steam in addition to your mod forums post:
Prefix convention is currently:
• [MOD]
• [MAPS]
Please link back to your mod uber...
Mod / Map Pack Creators Please Post on Steam Discussions]]>
Mod suggestions Wed, 12 Sep 2018 20:24:47 +0000 ljfed ljfed I also think it would be nice to have a 'jump to' hotkey which would act like...
Mod suggestions]]> |
global_01_local_0_shard_00002368_processed.jsonl/29553 | Jump to content
Search In
• More options...
Find results that contain...
Find results in...
Recommended Posts
Designer: Whalebite
Original Creator: Zerosvalmont & Eryel for mesh and Kangorilaphant
Requires: ZT2, Marine Mania and Freshwater (Aurora Designs)
Public Domain: Yes
Language: English
Bugs: unknown
Description: The Baiji, a rare, possibly extinct, dolphin from China, also known as the Yangtze River Dolphin.
zzzzz-Lipotes vexillifer.z2f
Edited by SLGray
Share this post
Link to post
Share on other sites
• Create New... |
global_01_local_0_shard_00002368_processed.jsonl/29561 | Ce diaporama a bien été signalé.
Introduction to Engineering drawing and Graphics
5 275 vues
Publié le
Introduction to Engineering drawing and Graphics and tools used
Publié dans : Ingénierie
• Soyez le premier à commenter
Introduction to Engineering drawing and Graphics
1. 1. Chapter 1 Overview of an Engineering Drawing
2. 2. TOPICS Drawing standards Graphics language Engineering drawing Traditional Drawing Tools Lettering
4. 4. 1. Try to write a description of this object. 2. Test your written description by having someone attempt to make a sketch from your description. Effectiveness of Graphics Language The word languages are inadequate for describing the size, shape and features completely as well as concisely. You can easily understand that …
5. 5. Graphic language in “engineering application” use lines to represent the surfaces, edges and contours of objects. A drawing can be done using freehand, instruments or computer methods. Composition of Graphic Language The language is known as “drawing” or “drafting” .
6. 6. Freehand drawing The lines are sketched without using instruments other than pencils and erasers. Example
7. 7. Instrument drawing Instruments are used to draw straight lines, circles, and curves concisely and accurately. Thus, the drawings are usually made to scale. Example
8. 8. Computer drawing The drawings are usually made by commercial software such as AutoCAD, solid works etc. Example
9. 9. Engineering Drawing
10. 10. Elements of Engineering Drawing Engineering drawing are made up of graphics language and word language. Graphics language Describe a shape (mainly). Word language Describe size, location and specification of the object.
11. 11. Basic Knowledge for Drafting Graphics language Word language Line types Geometric construction Lettering Projection method
12. 12. Drawing Standard
13. 13. Introduction Standards are set of rules that govern how technical drawings are represented. Drawing standards are used so that drawings convey the same meaning to everyone who reads them.
14. 14. ISO International Standards Organization Standard Code ANSI American National Standard InstituteUSA JIS Japanese Industrial StandardJapan BS British StandardUK AS Australian StandardAustralia Deutsches Institut für NormungDINGermany Country Code Full name มอก. สำนักงำนมำตรฐำนผลิตภัณฑ์อุตสำหกรรมThailand
15. 15. Drawing Sheet Trimmed paper of a size A0 ~ A4. Standard sheet size (JIS) A4 210 x 297 A3 297 x 420 A2 420 x 594 A1 594 x 841 A0 841 x 1189 A4 A3 A2 A1 A0(Dimensions in millimeters)
16. 16. Drawing space Drawing space Title block d d c c c Border lines 1. Type X (A0~A4) 2. Type Y (A4 only) Orientation of drawing sheet Title block Sheet size c (min) d (min) A4 10 25 A3 10 25 A2 10 25 A1 20 25 A0 20 25
17. 17. Drawing Scales Scale is the ratio of the linear dimension of an element of an object shown in the drawing to the real linear dimension of the same element of the object. Size in drawing Actual size Length, size :
18. 18. Drawing Scales Designation of a scale consists of the word “SCALE” followed by the indication of its ratio, as follow SCALE 1:1 for full size SCALE X:1 for enlargement scales (X > 1) SCALE 1:X for reduction scales (X > 1) Dimension numbers shown in the drawing are correspond to “true size” of the object and they are independent of the scale used in creating that drawing.
19. 19. Basic Line Types Types of Lines Appearance Name according to application Continuous thick line Visible line Continuous thin line Dimension line Extension line Leader line Dash thick line Hidden line Chain thin line Center line NOTE : We will learn other types of line in later chapters.
20. 20. Visible lines represent features that can be seen in the current view Meaning of Lines Hidden lines represent features that can not be seen in the current view Center line represents symmetry, path of motion, centers of circles, axis of axisymmetrical parts Dimension and Extension lines indicate the sizes and location of features on a drawing
21. 21. Example : Line conventions in engineering drawing
22. 22. Traditional Drawing Tools
24. 24. 1. T-Square 2. Triangles DRAWING TOOLS
25. 25. 3. Adhesive Tape 4. Pencils 2H or HB for thick line 4H for thin line DRAWING TOOLS
26. 26. 5. Sandpaper 6. Compass DRAWING TOOLS
27. 27. 7. Pencil Eraser 8. Erasing Shield DRAWING TOOLS
28. 28. 9. Circle Template 10. Tissue paper DRAWING TOOLS
29. 29. 11. Sharpener 12. Clean paper DRAWING TOOLS
31. 31. Text on Drawings Text on engineering drawing is used : To communicate nongraphic information. As a substitute for graphic information, in those instance where text can communicate the needed information more clearly and quickly. Uniformity - size - line thickness Legibility - shape - space between letters and words Thus, it must be written with
32. 32. Lettering Standard ANSI Standard This course Use a Gothic text style, either inclined or vertical. Use all capital letters. Use 3 mm for most text height. Space between lines of text is at least 1/3 of text height. Use only a vertical Gothic text style. Use both capital and lower-case letters. Same. For letters in title block it is recommend to use 5~8 mm text height N/A. Follows ANSI rule.
33. 33. Basic Strokes Straight Slanted CurvedHorizontal 1 1 2 3 Examples : Application of basic stroke “I” letter “A” letter 1 2 3 4 5 6 “B” letter
34. 34. Suggested Strokes Sequence Straight line letters Curved line letters Curved line letters & Numerals Upper-case letters & Numerals
35. 35. The text’ s body height is about 2/3 the height of a capital letter. Suggested Strokes SequenceLower-case letters
36. 36. Stroke Sequence I L T F E H
37. 37. V X W Stroke Sequence
38. 38. N M K Z Y A Stroke Sequence 4
39. 39. O Q C G Stroke Sequence
40. 40. D U P B R J Stroke Sequence 1 2
41. 41. 5 Stroke Sequence 7
42. 42. 6 8 9 0 Stroke Sequence S 3
43. 43. Stroke Sequence l i
44. 44. Stroke Sequence v w x k z
45. 45. Stroke Sequence j y f r t
46. 46. Stroke Sequence c o a b d p q e
47. 47. Stroke Sequence g n m h u s
48. 48. Word Composition Look at the same word having different spacing between letters. JIRAPONG JI GOR NPA Which one is easier to read ? A) Non-uniform spacing B) Uniform spacing
49. 49. Word Composition JIRAPONG / | )( )| (| Space between the letters depends on the contour of the letters at an adjacent side. Spacing Contour || || General conclusions are: Good spacing creates approximately equal background area between letters.
50. 50. 1. Straight - Straight 2. Straight - Curve 3. Straight - Slant 4. Curve - Curve Space between Letters
51. 51. 6. Slant - Slant5. Curve - Slant 7. The letter “L” and “T” ≡ slant slant ≡ slant straight Space between Letters
52. 52. GOOD Not uniform in style. Not uniform in height. Not uniformly vertical or inclined. Not uniform in thickness of stroke. Area between letters not uniform. Area between words not uniform. Example : Good and Poor Lettering
53. 53. Leave the space between words equal to the space requires for writing a letter “O”. Example Sentence Composition ALL DIMENSIONS ARE IN MILLIMETERS O O O OUNLESS OTHERWISE SPECIFIED.O
54. 54. End of Chapter 1 Overview of an Engineering Drawing |
global_01_local_0_shard_00002368_processed.jsonl/29570 | I can't find anything on the rules on how to pronounce two nasal vowels after each other.
In the case of
Il se trouve dans un internat.
How would you prounounce this "dans un internat"? I assume there is a liaison between dans and un, but between un and internat I'm not so sure. Should you nasalize the sounds as usual, but squeeze in an "n" that is otherwise forbidden to pronounce?
• There is indeed a nasalization followed by an "n": [dɑ̃zœ̃n‿ɛ̃tɛʁna] in Southern France, French speaking Switzerland, Eastern Belgium, and [dɑ̃zɛ̃n‿ɛ̃tɛʁna] in the remaining part of France, including Paris. – jlliagre Nov 2 '17 at 19:09
There is no general rule preventing a nasal vowel from ever coming before another vowel. Sequences of a nasal vowel followed by any other vowel are rare in French, but not impossible. The examples I can think of all occur between words.
For example, "mission impossible" would be pronounced with /ɔ̃/ followed by /ɛ̃/. There is no consonant in between in standard French.
In contexts where liaison is mandatory or possible, the liaison may prevent such a sequence from arising between words. But the use of liaison is not just based on phonology, but also on grammatical structure and the identity of the specific words involved. (For example, "mission impossible" cannot have liaison because liaison between a singular noun and a following adjective is forbidden.)
As you mention, the liaison rule for the preposition "dans" is that it takes the consonant /z/ when it is used before a phrase starting with a vowel. This is traditionally classified as an obligatory liaison, although I believe I have read that there are some accents where it is no longer always made.
The liaison rule for "un" is that it takes the consonant /n/ when it is used before a phrase starting with a vowel, with no denasalization of the nasal vowel.
In some other words that end with nasal vowels, the vowel may be denasalized before the liaison consonant /n/. (I forget exactly which words these are, but Wikipedia provides a description that seems to agree with Stéphane Gimenez's comment below, and there is a separate question about this topic: How are nasal vowels denasalized during liaison?)
You just need to learn how each construction works. Liaisons don't all behave the same way.
Within a single word, when a vowel-initial suffix is used, an original word-final nasal vowel is generally replaced by a non-nasal vowel followed by /n/. See the examples "cancaner /kɑ̃kane/ from cancan /kɑ̃kɑ̃/; ronronner /ʁõʁɔne/ from ronron /ʁõʁõ/" mentioned by Eau qui dort in a comment on my answer to the Linguistics SE question "Which epenthetic sounds are most common to separate vowels?". So a word like "ronronnant" doesn't have a sequence of two nasal vowels; it is pronounced with /n/ (/ʁõʁɔnɑ̃/).
The specific example "Il se trouve dans un internat" would be transcribed as /ilsətʁuvdɑ̃zœ̃nɛ̃tɛʁna/ or /ilsətʁuvdɑ̃zɛ̃nɛ̃tɛʁna/.
• 1
Concerning the 6th paragraph, un bon ami is a good example. But I believe it happens to some extent with most (if not all) words that end with a liaised nasal, except for articles, prepositions and the few small grammatical words like possessives. – Stéphane Gimenez Nov 2 '17 at 19:57
• @StéphaneGimenez I've read reports of the possessive articles denasalising before a vowel, ie "mon ami" pronounced as /mɔnami/ but this isn't much done anymore, at least in my accent. I'll take advantage of this comment to mention "en en entendant", perhaps my favourite word in French (/ɑ̃nɑ̃nɑ̃tɑ̃dɑ̃/) – Eau qui dort Jan 3 '18 at 19:38
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/29585 | Google Chrome Extension Firefox Browser Addon
Play the FREE BINGO! WORLD TOUR today, travel and explore the world collecting postcards and collectible souvenirs which can be turned in for rewards.
-Free Bingo
-TRAVEL and EXPLORE 20 countries, with more being released soon!
-COLLECT over 30 postcards
-COLLECT Over 90 collection items and turn them in for prizes.
-PROGRESS through over 100 levels to progress through and you travel the world.
-COLLECT treasure chests and open them for FREE! tickets, coins and MORE!
Important Posts
Visit daily to claim your gifts, rewards, bonus, promo codes, etc for Bingo World Tour.
This page updates every 24 hours with new information and news.
Daily Friends Who Sends Gifts For Bingo World Tour
Earn these gems by making lots of Bingo World Tour game friends
This Website is not affiliated with Bingo World Tour. trademarks are the property of their respective owners. Game content and materials copyright Bingo World Tour. all right reserved. |
global_01_local_0_shard_00002368_processed.jsonl/29586 | I have seen video that says we can use an IV calculator such as:
to first find out the possible perfection %, and then keep on "power up" or "evolve", and use the Refine button and you can narrow down the real number for this Pokemon.
For example, it could be 67.8%, 82.2%, 94.8% (just an example), and after some power up and/or evolve, you can narrow down it to 82.2%
But I also have seen a video that says you can go to some website and type in your gmail log in, and it will tell you the perfection % of every single Pokemon that you have. So I presume that will mean you don't have to waste stardust and candies to do the narrow down.
Is it really possible to know the perfection % without using stardust and candies to do the narrow down?
• 4
If you actually give someone your gmail credentials, chances are good they won't be nice to it. – Frank Aug 19 '16 at 1:03
• unless if that gmail account was created just for playing Pokemon Go, then there should be less risk – nopole Aug 19 '16 at 1:09
• Less risk, but chances of actually getting the expected data is virtually nil. – Frank Aug 19 '16 at 1:13
• 1
I would stay FAR away from that site if I were you. – gitsitgo Aug 19 '16 at 14:19
• 1
@太極者無極而生 you can use those sites, not sure why those guys are frekaing out. Gmail credentials are verified using an authentication key, not by giving them your user/password. These guys don't know what they're talking about. the only risk here is getting banned by Niantic, but I wouldn't worry too much about getting banned, since these sites don't actually alter data, they just intercept it to see the strength of your pokemon. BUT don't use the tools/sites that evolve pokemon for you. Then you will get banned. Just use the ones that only read data. – Matthew Aug 19 '16 at 19:24
Logging into a service that calculates your CPs is against the T&Cs of the game, and will probably get your account banned.
Since they released the in-game appraisal system, some calculators are giving pretty accurate results (e.g. https://pokemon.gameinfo.io/en/tools/iv-calculator) when you enter the appraisal stats too.
Unfortunately you can't always guarantee that you'll be able to calculate the exact CPs (it's usually at most a range of a few percent though).
Until recently I was using PokeAdvisor website which gave you the exact IV% of your Pokemon but also tracked some other cool stats such as balls thrown, % of nice throws, etc. Unfortunately this was shut down by Niantic... I think they are being more busy with shutting down third party sites than actually improving their game.
Anyhow back on topic: Nowadays I have been using this website https://pogobag.me/ While it is not as perfect as PokeAdvisor was, it's still much easier to check your IV's than doing it manually :-)
• so in other words, it is possible to find out the exact IV (the exact perfection %) without using any stardust and candies? – nopole Aug 19 '16 at 16:28
• Yes indeed, just use the pogobag site I linked above. – Mr. Meeseeks Aug 20 '16 at 21:15
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/29588 | I want to build an aquaponic system, that would suffice a family of 4 all year round. I would like to know what space would be required to build the system. Moreover, what should be the size of fish tank and grow beds for the plants? Thanks.
• What's your budget? What region of the world are you? Are you allowed to grow tilapia? Do you eat fish? – Graham Chiu Jun 8 '16 at 7:29
• @GrahamChiu Want to build system in the most affordable way. I'm from Surat, India. Yes, I eat fish. – Harshal Kshatriya Jun 8 '16 at 9:05
• Is the purpose to feed your family, or to grow corn? It's not the best crop for doing so. – Graham Chiu Jun 8 '16 at 9:52
• The purpose is to feed my family. If corn is not the best crop, then any suggestions? – Harshal Kshatriya Jun 8 '16 at 11:03
I'd advise against growing corn aquaponically to feed your family. Consider that you need to space the plants out about a foot, and say one plant gives you 1 kg for ease of calculation, and that you can grow 3 crops per year, then you'll need 20 square foot for each crop, which is a pretty large grow bed.
Consider also that the bulk of the corn is in the roots, stems, leaves and cobs. The only edible part is the kernels. But you have to buy in fish food to feed the fish enough so that they produce enough waste to provide the nutrients for all that largely wasted plant material that you can't use. Now a farmer would put that material back into the ground for composting, but you can't do that unless you also have a farm.
The best crops to grow in this expensive manner are those where you can eat as much of the plant as possible.
In terms of energy density, the best crops to grow are root and tubers such as potatoes, sunchokes, turnips etc but they are not suited for aquaponics. So, you're better off growing leafy vegetables that you can then exchange for these other vegetables.
• So what do you suggest, which crop should I grow so that we can have it all year round? – Harshal Kshatriya Jun 8 '16 at 11:13
Former aquarist here and I did try to do hydroponics by growing things on top of my fish tanks. There are several things to consider there.
• Tilapia grow larger, about 12 inches. The size of your tank will be the size for full grown fish, not for the babies.
• The bigger the tank the better for several reasons. The first grow bigger, the waste is spread out more (though you still need a filter system), and the temperature is more stable in a bigger tank with more mass.
• Will you need to heat the water during certain times of year? If so you need to get a bigger heater than your tank. If you have a 100g tank you will need a heater for 120 gallons for those unexpected extra cold days.
• What about cooling? Does it get too hot in your area for the tilapia? If so you will need a chilling system of some sort. Or put the tank in your basement if you have one.
• Smaller tanks with too many tanks cause increased stress for the fish, leading to disease, stunted growth, and more concentrated wasted. I don't recommend it.
• You must understand how a closed ecosystem like this works, and how fish waste (ammonia) is turned into nitrites and then to less harmful nitrates which can be used to feed plants. Understand that the water tests are important, and test strips expire and are also more expensive than the drop tests per test. The drop tests are cheaper per test, last longer after opening, and are more accurate.
• Keep notes on what you learn. There are several free Windows applications to track notes in a tree-like or wiki format. Tiddlywiki.
More info
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/29592 | Tips for making friends
Year level: Pre-primary
Students develop an understanding that having friends makes us feel happy and that personal and social skills are required to build and maintain friendships.
Learning focus
Communicating and listening are important skills required to interact effectively with others and to build friendships.
Key understandings
• Getting along with others and having friends can make us feel happier.
• Friends are people we share things with – time, play, toys, interests.
• If we want to have a friend we need to be a friend.
• Our friends can be just like us or very different from us.
• Listening well when others talk, playing fairly, sharing and taking turns are some ways to get along with others.
• People can have as many friends as they choose.
• 5-6 hula hoops
• Music
• Paper plates [one per student]
• Large leaf-shaped piece of paper [one per student]
General capabilities
No General Capabilities values have been selected.
Health and physical education(P)
Personal, social and community health
Relationships and sexuality
Blooms revised taxonomy
No Blooms values have been selected.
Inquiry learning phase
No Inquiry Learning phase values have been selected.
Related items
Before you get started
• Be sensitive to the students who have difficulty making friends and keeping friends. Help these students to identify the personal strengths they possess and the attributes required when being a friend.
• It is important to read and understand the Guides: Resilience and life skills and Establishing ground rules in order to create a safe environment for all students to feel supported and trusting.
Learning activities
Whole Class
Students experience qualities of friendship that are necessary for effective positive relationships.
1. Place 5 or 6 hoops on the ground in a small area. Have students dance around the hoops to some music. When the music stops call out a number between 1 and 5. Students need to cluster in a hoop in groups of this number, or less, and hug or hold hands until the music starts again.
• There may be children left out of a hoop during the game. Be mindful that the same children are not left out each time.
1. Discuss how the students felt when playing with their each other in this activity and ask the following questions:
• How do you feel when you are having fun with your friends?
• Why is it good to have friends?
• Was anyone left out of a hula hoop during the game? What did you do when you were the 'odd one out'? How did it feel to not be in a hoop?
• What is a friend?
• What are some of the good things about your friends?
1. Draw a Y-chart and label it 'having a friend looks like'; 'having a friend sounds like'; and 'having a friend feels like'. Have the class identify and list responses for each section of the Y-chart.
• Consider attributes of loyalty, kindness, thoughtfulness, fairness; sharing feelings; listening to problems; keeping secrets; and being helpful and optimistic.
Independent or Small Group
Students identify strategies or 'tips' to assist with making friends and choose one strategy to focus on in a practical activity.
1. Ask the class:
• What are some ‘making friends tips’ you can use to get to know someone you don’t know very well? (smile; say hello and tell them your name; ask them if you can join in their game; tell them something interesting but don’t talk too much; talk about something you think is good fun to do; ask them a question about their pet or what they like to do; listen to them carefully)
1. Draw pictures to represent these suggestions on the whiteboard.
2. Give each student a paper plate and fold it in half then unfold. Ask them to draw a picture of their face on one half of the plate. Have students draw one of the whiteboarded ‘making friends tips’ that they would like to practise at school or home, on the other half of their paper plate. Hang the plates at the front of the class so students can be reminded to use the skill.
3. Write the names of each student on a strip of paper and place in a container.
• Have students select one strip (redraw if they select their own name). Explain that for the following week they need to practise some of these skills with this secret friend without telling them they have drawn their name. Suggest that students may need to be friendly to other students as well, so their selected friend does not ‘guess’ too quickly.
• At the end of the week, have students try to guess who their secret friend was and the words and actions that led them to this conclusion.
1. Stress to students that it’s normal to sometimes feel lonely and shy or disappointed with our friends. We can also feel 'left out' like when some people were left out of the hula hoop game. Discuss why some people may have difficulty being friendly or making friends (e.g. feeling shy or sad, can't speak the language). Explain what it means to be patient and tolerant of people. Ask:
• What words worked best for you when you were practising being a good friend?
• What actions worked best for you when you were practising being a good friend?
• Can you have more than one friend?
• Do your friends have to like the same things as you?
• What does it feel like when someone is not being friendly?
• What does it feel like to be left out of a game? What can you do to get back into the game? (e.g. run faster during the hula hoop game)
1. On a leaf-shaped piece of paper, have each student complete and illustrate:
"One way to be a good friend is…"
• Display the leaves on a ‘friendship tree’. |
global_01_local_0_shard_00002368_processed.jsonl/29594 | {{:: 'cloud_flare_always_on_short_message' | i18n }}
Check @genius for updates. We'll have things fixed soon.
The Nymph Complaining for the Death of Her Fawn
Andrew Marvell
The Nymph Complaining for the Death of Her Fawn Lyrics
The wanton troopers riding by
Have shot my fawn, and it will die.
Ungentle men!
They cannot thrive
To kill thee. Thou ne'er didst, alive,
Them any harm: alas nor could
Thy death yet do them any good.
I'm sure I never wished them ill,
Nor do I for all this; nor will:
But, if my simple pray'rs may yet
Prevail with Heaven to forget
Thy murder, I will join my tears
Rather than fail.
But, O my fears!
It cannot die so.
Heaven's King
Keeps register of every thing,
And nothing may we use in vain:
Ev'n beasts must be with justice slain,
Else men are made their deodands.
Though they should wash their guilty hands
In this warm life-blood, which doth part
From thine, and wound me to the heart,
Yet could they not be clean; their stain
Is dyed in such a purple grain.
There is not such another in
The world to offer for their sin.
Unconstant Sylvio, when yet
I had not found him counterfeit,
One morning (I remember well),
Tied in this silver chain and bell,
Gave it to me: nay and I know
What he said then -I'm sure I do.
Said he, "Look how your huntsman here
Hath taught a fawn to hunt his dear."
But Sylvio soon had me beguiled:
This waxed tame, while he grew wild,
And quite regardless of my smart,
Left me his fawn, but took his heart.
Thenceforth I set myself to play
My solitary time away,
With this: and very well content,
Could so mine idle life have spent.
For it was full of sport, and light
Of foot and heart; and did invite
Me to its game: it seemed to bless
Itself to me. How could I less
Than love it? O I cannot be
Unkind t' a beast that loveth me.
Had it lived long, I do not know
Whether it too might have done so
As Sylvio did: his gifts might be
Perhaps as false or more than he.
But I am sure, for aught that I
Could in so short a time espy,
Thy love was far more better then
The love of false and cruel men.
With sweetest milk and sugar first
I it at mine own fingers nursed.
And as it grew, so every day
It waxed more white and sweet than they.
It had so sweet a breath! And oft
I blushed to see its foot more soft
And white (shall I say?) than my hand -
Nay, any lady's of the land!
It is a wond'rous thing how fleet
'Twas on those little silver feet;
With what a pretty skipping grace
It oft would challenge me the race;
And when 't had left me far away,
'Twould stay, and run again, and stay.
For it was nimbler much than hinds;
And trod as if on the four winds.
I have a garden of my own,
But so with roses overgrown
And lilies, that you would it guess
To be a little wilderness;
And all the spring-time of the year
It only loved to be there.
Among the beds of lilies I
Have sought it oft, where it should lie,
Yet could not, till itself would rise,
Find it, although before mine eyes;
For in the flaxen lilies' shade,
It like a bank of lilies laid.
Upon the roses it would feed,
Until its lips ev'n seemed to bleed:
And then to me 'twould boldly trip,
And print those roses on my lip.
But all its chief delight was still
On roses thus itself to fill,
And its pure virgin limbs to fold
In whitest sheets of lilies cold.
Had it lived long, it would have been
Lilies without, roses within.
O help! O help! I see it faint
And die as calmly as a saint!
See how it weeps! The tears do come
Sad, slowly dropping like a gum.
So weeps the wounded balsam; so
The holy frankincense doth flow;
The brotherless Heliades
Melt in such amber tears as these.
I in a golden vial will
Keep these two crystal tears; and fill
It till it do o'erflow with mine,
Then place it in Diana's shrine.
Now my sweet fawn is vanished to
Whither the swans and turtles go:
In fair Elysium to endure,
With milk-white lambs and ermins pure.
O do not run too fast, for I
Will but bespeak thy grave, and die.
First, my unhappy statue shall
Be cut in marble; and withal
Let it be weeping too: but there
Th' engraver sure his art may spare;
For I so truly thee bemoan
That I shall weep though I be stone,
Until my tears, still dropping, wear
My breast, themselves engraving there.
There at my feet shalt thou be laid,
Of purest alabaster made;
For I would have thine image be
White as I can, though not as thee.
More on Genius
About “The Nymph Complaining for the Death of Her Fawn”
This is one of a number of pastoral poems that Marvell wrote. It takes the form of a dramatic monologue, spoken by the nymph, which begins with an elegy or lament for the death of her fawn and then moves on to raise wider spiritual and philosophical issues.
In general, Marvell’s pastoralism centres on a garden, rather than the open countryside. This poem contains both.
There is a clear historical context; the devastation caused by the English Civil War. ‘The wanton Troopers' are therefore soldiers of one of the armies. They have caused needless suffering and death, not only to the faun and to the girl who loved it, but also to the nation as happens only too frequently in civil wars. The faun is therefore a metaphor for needless destruction.
Again, the nymph may be a girl that Marvell knew, whose pet deer really was shot. By using hunting imagery and a pastoral setting he is enhancing the drama. Similar hunting imagery is used in his poem An Horatian Ode upon Cromwell’s Return from Ireland.
This is a long single stanza poem, writing in iambic tetrameters, that is, four iambs or metrical feet per line, a iamb being one unstressed followed by one stressed syllable. There is a regular AABBCC etc rhyme scheme, forming couplets. The effect is to create a smooth flowing narrative that draws the reader in as the story is told.
Language and Imagery
The voice is that of the speaker, a nymph, using the first person singular pronoun ‘I’. The language is deceptively simple, suitable for a girl in a pastoral setting, but with classical and Christian references (for example the flowers that symbolise the Virgin Mary) that demonstrate the poet’s learning. It is full of symbolism which is open to interpretation. The nymph may symbolise innocence, the fawn is also innocent and sacrificed, like the nation ravaged by Civil War, the garden may signify the Garden of Eden, and the Troopers are the force of sin and destruction. The detailed annotations provide deeper analysis.
"The Nymph Complaining for the Death of Her Fawn" Track Info
6. Aliter
10. Bermudas
21. Hortus
28. Mourning
32. Ros
38. Young Love
41. The Match
44. The Nymph Complaining for the Death of Her Fawn
54. Translated |
global_01_local_0_shard_00002368_processed.jsonl/29600 | Dropbox for Debian
Tired of the versioning issue between libnautilus from Debian and Ubuntu I decided to create myself the packages for nautilus-dropbox and here they are.
I'll maintain them on my repo, so if you want to keep dropbox updated I recommend you to add my repo to your sources.list: deb http://dl.rivco.net/debian sid main And if you are on testing/squeeze there's a repo for you too: deb http://dl.rivco.net/debian squeeze main
It's only available for i386 but you can grab the sources adding the deb-src for your distro and build it with dpkg-buildpackage or whatever you want.
Soon I'll be building the experimental client as well.
Any comment goes best to my twitter here. |
global_01_local_0_shard_00002368_processed.jsonl/29606 | Official eBook store and app for Manga & Light Novel fans.
50% coin back on your initial settlement
Ran and the Gray World, Volume 2 - Manga
• Manga
Aki Irie
About this eBook
With Ran's powers growing stronger day by day, Grand Sorceress Shizuka decides that it's time for Ran to begin her magical training and sends a master instructor to the human world to look after her. Meanwhile, a deadly insect has escaped from the confines of the Door and must be destroyed before havoc ensues!
• Ran and the Gray World, Volume 2 preview_1
• Ran and the Gray World, Volume 2 preview_2
• Ran and the Gray World, Volume 2 preview_3
US $7.69
JP ¥800
8 coin(s)
Details of8coin(s)
- Membership Rank
(Your Rank:No Rank)
Add to Cart
Instant Checkout with
Add to Wish List
Buy this eBook for Others
Next Volume/Chapter
Product Details
Series Title Ran and the Gray World
Japanese Title 乱と灰色の世界 (Ran to Haiiro no Sekai)
Alternative Title Ran and the Grey World, Ran and the Ash-Coloured World, Gray And Wonder Around Her
Author Aki Irie
Publisher VIZ Media
Genre Manga ,Seinen ,Fantasy ,Comedy ,Slice of Life ,Supernatural ,Romance ,Drama
Page count 216pages (*note)
See more like this
Purchasing eBooks on BOOK☆WALKER
|
global_01_local_0_shard_00002368_processed.jsonl/29614 | Email Roundtable #21 – No One Likes the Monkey
Kerri: In your estimation has there ever been a good use of pets/animals on TV? Most of the TV pets that I can think of are used strictly as comic relief. Who is your favourite TV pet?
Katie: I can’t think of a pet that has been used for plot purposes, other than teaching kids about death (and teaching parents not to try to replace their child’s dead hamster. They always know.) My favourite TV pet is a pretty obvious choice, but it has to be Eddie from Frasier. That was just such an all around good dog.
Continue reading |
global_01_local_0_shard_00002368_processed.jsonl/29645 | True/False Question
A free HTML5 based content type allowing creatives to create true/false questions. All you need is this content type and or the H5P plugin in publishing systems like Canvas, Brightspace, Blackboard, Moodle and WordPress.
True/False Question
True/False Question
Would you like to create content like this on your own?
Get started
True/False Question is a simple and straightforward content type that can work by itself or combined into other content types such as Course Presentation. A more complex question can be created by adding an image or a video.
|
global_01_local_0_shard_00002368_processed.jsonl/29647 | Luuk Gruijs
Why Class/Component inheritance in your Angular app might not be good
When developing your applications you inevitably come across situations where you need to create functionalities/features or even functions which are similar, but spreaded over multiple components or even modules. This means you have to find a solution for code reusability to keep your code maintainable. In Angular, and Javascript applications in general, there are many patterns and solutions to set this up. As Angular is entirely Class based, inheritance could be a solution. Here’s why that might not be the best solution.
Photo by Kalen Emsley on Unsplash
The problem with inheritance in Angular
For you who don’t know what inheritance is. Inheritance is a way to extend your code with functionalities from other code. Basically the same as parents with their children. All children inherit some characteristics from their parents and use that in their life.
Inheritance itself is not bad. As i mentioned earlier, you probably do this to increase code reusability. Code reusability is good as this also increases maintainability. Why is it a problem then? well…
Inheritance results in abstracting away implementation details
And that makes your code harder to understand. For you as the author everything might be perfectly clear, but will it still be clear after a few months? And what if another colleague, or worse, a new colleague picks up the code. I bet it will be a lot harder to see how everything works as methods could potentially be called multiple levels deep and you really have to dig in to see where everything is and how it all correlates.
In the example below we have a situation where we need to display multiple models with different unmappable datasets. This means each modal will be a separate component as the template is too different to put everything in one component.
The parent class
The child class which extends from modal
The modal components use inheritance to encapsulate reusable modal logic. You could think of filtering, sorting, managing selections, saving etc. If you open the modal-companies.component.ts you don’t immediately see this all this logic. As the inheritance is only one level deep and this is an easy example, it’s still sort of manageable. But things become really hard when you go into multiple levels of inheritance and logic gets more complicated. While things could become quite flexible and reusable you have to go trough multiple files to get an understanding of what is actually happening.
If you would refer back to my example about the child that inherits characteristics from their parents, it works exactly the same. If you know the kid without knowing the parents you might not be able to place some characteristics. You would have to do dig in and see or meet the parents in order to understand why the kid is what it is.
With code you don’t want that. In the ideal world, you want to quickly see/scan it, understand it, fix your stuff and move on. This is why I prefer a, more declarative, what you see is what you get solution over class inheritance.
What you see is what you get
What you see is what you get could be achieved by placing your code in a Service or a utility file. You can then call the Service from your Component which does the work for you. The nice thing is that when you open your component you immediately see which Services are injected, which functions of those services are called and what is returned by those functions.
The helper service
The modal implementation
As you can see we have removed the inheritance and moved the code that was in the modal.ts class to the modal-helper.service.ts service. Now, what i really like about this approach is that when you open one of the component files, you immediately see what functionalities that component has en where you can find it.
The drawback
Just like class inheritance has a drawback, the above solution also has a drawback and that is that you have to write more code. However more code is not necessarily bad, especially in this case, as the above solution helps you to make your code easier to understand. And in my opinion, understandable code is good code.
While this is a somewhat opinionated post. The takeaway should be that code should be written in a way that it has the highest form of re-usability, maintainability and understandability. You almost always have to find a middle ground there. In that respect, i described a different solution which might suits your needs. Anyway, always remember:
More by Luuk Gruijs
Topics of interest
More Related Stories |
global_01_local_0_shard_00002368_processed.jsonl/29656 | No keyspace for the distributed hashcat v3.00
Good morning everybody,
How we can deal with the distributed hashcat v3.00 if we don't have idea about the keyspace of the password in other words if we don't know his length (to fix the -s and -l option) ?
Ps : I faced this problem during tests performed on hashcat v3.00 for my final project study
Thanks in advance for your answer .
Please use --keyspace. You will find out that the use of --keyspace is not allowed in combination with -i, which is required to tell hashcat to increase the mask-length with each iteration by one. So this is not black magic. You can do the same from outside which means for testing the length 1-4 you will call hashcat 4 times, but then you know the keyspace.
Thanks for your replay first. To use the "--keyspace" option the length of the password must be known to fix the mask, for example if our password contains 4 character we write : "a? a?a?a --keyspace" this command will return a value and with this value we can fix the "-s" and "-l" option. Now we suppose that i have no idea about the password i even don't know his length, what should i do in this case please? knowing that when i put "--keyspace" without putting the mask the command return the value "1"
If you don't know the password length and want to use mask attack, you can just use mask with different lengths. e.g. 4 to 7:
-a 3 ?a?a?a?a
-a 3 ?a?a?a?a?a
-a 3 ?a?a?a?a?a?a
There are 2 features here that could help making this 4 runs into a single one:
1. using a .hcmask file (see https://hashcat.net/wiki/mask_attack#hashcat_mask_files)
2. using --increment (and --increment-min, --increment-max, in this case it would be -a 3 -i --increment-min 4 ?a?a?a?a?a?a?a)
The only problem, already mentioned above, is that --keyspace doesn't work together with these 2 features... i.e. you need to use --keyspace on a single mask, but you can just calculate the keyspace of each of them:
--keyspace -a 3 ?a?a?a?a
--keyspace -a 3 ?a?a?a?a?a
and distribute the load according to the keyspace values (e.g. first distribute the cracking of "4 character" passwords, then 5 character passwords, 6, 7 etc) |
global_01_local_0_shard_00002368_processed.jsonl/29666 | The flow of two: luscious
one cuts the cake
knowing the other
knowing the favorite slice
a knowing smile tells the one
you will have your piece
a sweet slice for the one
by the other
Free verse by PamelaWLucas 6/26/18
Inspirational photo by Pixabay
The flow of two: growing
Shared love
reaches and grows to
the other and into the world
offering deep affection
giving abiding kindness
devoted one to the other
growing an undying passion
Free verse poem by PamelaWLucas 6/25/18
Inspirational photo by Pinterest |
global_01_local_0_shard_00002368_processed.jsonl/29674 | 1. Once you send the invite to your employee, the email they will receive will look like this:
2. Have them click "Sign In" to create a password and access their application in this window:
3. Then the employee fills out their personal information:
4. Next, they indicate their gender, enter their social security number, and indicate their Medicare enrollment and/or tobacco usage:
5. The next step is their household information. The first down arrow is for marital status and the second down arrow is for the number of dependents:
6. The employee then determines if they would like coverage or not — If they are waiving coverage skip to step 12 of this article:
7. If they choose to subscribe to the coverage, their next step would be to select who they would like to have covered. This window populates with choices based on their previously entered household information. Here they can also view a summary of the plan, the SBC, and what it will cost them:
8. Next, the employee will need to fill out information about their spouse/dependents if they are covering them:
9. Their final step is to confirm that all of their information is correct and then click "Confirm":
10. After the employee clicks "Confirm," they will be asked to review and accept the terms and conditions of the application and to e-sign:
11. After they click "Sign," they will see that they are finished
12. Continued from step 6 of this guide:
If the employee chooses to waive coverage from the employer, they will need to mark that they understand their choice and state the reason why they are waiving coverage:
13. After waiving coverage, they will need to sign-off on their decision through an e-signature
Did this answer your question? |
global_01_local_0_shard_00002368_processed.jsonl/29678 | April 20, 2016
New Features and Functionality
• Geolocation
• The geolocation indicator lets other people in your organization know your current location, updated hourly. An administrator can enable and disable geolocation for the organization. When geolocation is enabled, users can choose to share their current location
Contact center
New Features and Functionality
• Admin – Allow Group Add/Removes to Queues
• A new feature was added to the Admin UI for bulk adding Queue Members based on Groups, Roles, Location, and Manager. You can add members in bulk or individually to a queue. |
global_01_local_0_shard_00002368_processed.jsonl/29681 | Red Canary's customers take security seriously and have recognized the value of identity-defined security in their critical cloud services. Red Canary supports Security Assertion Markup Language (SAML) identity providers for single sign-on.
We have documented support for Duo, Microsoft Azure Active Directory, Ping Identity's PingOne, OneLogin, and Okta. Red Canary's Portal is a SAML 2.0 compliant service provider, and does support any SAML-compliant Identity Provider.
Administrators can configure Single Sign-On on their Administration > Single Sign-On page:
Learn more about configuring Single Sign-On here:
Did this answer your question? |
global_01_local_0_shard_00002368_processed.jsonl/29686 | How to write a javascript program in html
But for some have they killed KPL off and morphed it into Phrogram. Rise games on a tablet or spelling. Some of the most time uses of JavaScript are: Standing alerts, new browser windows, etc.
Off are some tips on which URL idea to use: This application uses C to work email addresses from New Outlook. The programming environment used in the thorny is called Eclipse.
How do I write a JavaScript?
When learning to choose a new language, you quickly realize that smoking an accent on the wrong syllable can sit a word disarming. To turn on the Develop european, you need to first step the Preferences window. One of my grandmothers has been on an FLL exceeding for several years and it has been able for him.
Choosing the Developer Forests option is another way to get to the student, as the JavaScript phone is part of a wider set of Chrome tools settled the Developer Tools DevTools for particularly. This is a Lego candidates kit. Most programming languages are either bit or interpreted.
Ajax is a general for using JavaScript to talk to a song, retrieve information from the server, and responsible the web page without the need to challenge a new web page. Away, HTML lets people go text, look at pictures, address videos, and click links to move to other web sources with more text, pictures, and videos.
Concern Return to create a new home line, and then type: The Cursor Side vs. You try to find your kids to programming and it may or may not "take" the first thing, simply because of these differences.
It would go like the example below. Finger the Customize menu corny to access the JavaScript basics as well as other useful tools. But most professors also have something explicated a JavaScript interpreter. You can get torpedoed with it here: They also suggest to start up then and have been written to crash the material.
Now that we've placed the JavaScript in a particular, we can call it in the same way from different web pages and update them all in a shocking location Conclusion This tutorial mesmerized over how to incorporate JavaScript into your web sources, both inline into an Event document and as a thesis.
All you need is: Okay are three games that my mathematics have particularly armed. Get army access to videos, live online training, funding paths, books, interactive tutorials, and more. So you use a few months and try again, or you might try a terrible approach.
Note The min part time that the file is obscured—a process that leaves unneeded whitespace and condenses the small to make the most smaller so that it gives faster. So, if you wanted to use the path above by placing it in an analytical file, you would place the JavaScript tune without the script tags into a new idea file, as shown below: What about a genuine web site, without any programming at all.
Sauna your kids how to write computer pays by Marshall Brain Quick Wire - If you are numerous for a quick and not way to teach your kid a new programming language, without downloading anything or suggesting anything, try these Python tutorials. Try to aim the tax at the demands.
Working with a Separate JavaScript Bite In order to accommodate finer scripts or scripts that will be unhelpful across several pages, JavaScript code positively lives in one or more js tops that are allowed within HTML documents, tight to how external assets like CSS are disheveled.
So when your web animation reads a web page with a JavaScript visual in it, the web browser translates the JavaScript into something the end understands. With JavaScript, you can help your own interactive bases. This tutorial will go over how to every JavaScript into your web sources, both inline into an HTML wren and as a separate file.
Fanon is a full-featured development writing with a great debugger and it is worth too. You can also use concrete-ins to add programming smarts to a web animation.
While you may never want to satisfy a welcome message on a web animation, this example demonstrates the fundamental run of programming:. As you can see you can write your HTML on the left, your JavaScript in the middle, and see the results on the right (you can also add css).
JavaScript & jQuery: The Missing Manual, 3rd Edition by David Sawyer McFarland
PS - the `' will not show anything in the browser window, you need to view the result in the console. Introduction. JavaScript, also abbreviated to JS, is a programming language used in web development. As one of the core technologies of the web alongside HTML and CSS, JavaScript is used to make webpages interactive and to build web apps.
Oct 11, · JavaScript is the engine that drives the internet.
JavaScript Hello World: How to Write Your First Program in JavaScript
Virtually every one of your favorite websites uses JavaScript in some way or the other. From checking text input to creating alerts and animations, JavaScript finds many uses on a web Kasia Mikoluk.
Originally Answered: What code editor should I use to write my HTML and CSS code? I started off with Sublime Text and find it hard to use any other code editor for some reason.
Brackets is good too, because it applies the changes to the page in the browser in real time, thus saving your from hitting refresh repeatedly.
To separate JavaScript code from HTML code, you need to enclose it within a set of tags. The opening tag has one required attribute and one optional attribute. The required attribute is the type attribute, while the optional attribute is src (which allows you to point to an external script file, covered later in this answer).
The write() method writes HTML expressions or JavaScript code to a document.
How do I write a JavaScript?
The write() method is mostly used for testing: If it is used after an HTML document is fully loaded, it will delete all existing HTML. Note: When this method is not used for testing, it is often used to write some text to.
How to write a javascript program in html
Rated 3/5 based on 64 review
Teaching kids how to write computer programs, by Marshall Brain |
global_01_local_0_shard_00002368_processed.jsonl/29687 | What Type Of Savings Account Is Right For You?
by High Yield Savings Accounts
Saving is on everyone’s mind these days and especially so given that so many people are having a hard time making ends meet. But if you have the money to save, it’s never been easier, especially with so many banks offering a variety of online tools, mobile apps, and more. Many of the new cell phones on the market allow you access to bank apps, through which you can make deposits and keep track of everything pertaining to your savings account no matter where you are. For those that don’t already have a savings account, or might be looking to switch up from their checking account, here’s a basic overview of the different savings accounts that might work best for you:
Traditional Savings Accounts
These are the most common account types that you can buy into. All you need to do is deposit your money with bank to open an account and you will earn a certain amount of interest each month. Account minimums vary from $1 to a few hundred dollars depending on the bank. Interest rates and other features vary as well. It’s usually a good idea to shop around for rates and features before opening a new bank account.
Passbook Account
This is another kind of savings account but the bank gives you a booklet in which to to record your transactions. This includes any withdrawals you make, deposits, as well as the interest you’ve made on your account. These types of accounts are very useful because they’re FDIC insured for any amount up to $250,000. The figure goes even higher when it’s a retirement account. There are usually few fees that are applied to such accounts and works very similarly to a traditional savings account. The same goes for the low interest rate.
High Yield Savings Account
These accounts, just like passbook accounts, are also FDIC insured but you’re going to earn a lot more interest. That’s why it’s called a high yield account. Traditionally, the higher the balance you keep in your account, the greater the interest rate the bank will give you. However, with these types of accounts, you usually can’t use checks. In some cases you can gain access to the account through your checking account and transfer money that way, if needed.
It’s not hard to start and manage a savings account. It seems that the biggest problem these days is finding the money to actually put in an account. Speak with a banking professional to figure out which option would work best for you. |
global_01_local_0_shard_00002368_processed.jsonl/29694 | Poster Subliminals
The Host (2013)-Hdr
The Host (2013) - Archon Propaganda
The Host is a 2013 American romantic science fiction thriller film adapted from Stephenie Meyer’s novel of the same name. Written and directed by Andrew Niccol, the film stars Saoirse Ronan, Max Irons, Jake Abel, William Hurt, and Diane Kruger. Released on March 29, 2013, the film has been generally panned by critics.
The Host - PosterThe human race has been taken over by small parasitic aliens called “Souls”. The Souls travel to distant planets en masse, in individual capsules, inserting themselves individually into a host body of that planet’s dominant species. The Soul completely replaces the consciousness of its host, though they are able to access the host’s memories. Occupied hosts are identifiable by blue rings that form in the hosts’ eyes.
Melanie Stryder is captured and infused with a soul called “Wanderer.” Wanderer is asked by Seeker to access Melanie’s memories in order to discover the location of a pocket of non-assimilated humans. Surprisingly, Melanie’s consciousness has not been eliminated, and it struggles for control of her body. Melanie and Wanderer are able to carry out an internal conversation with each other, forming something of a friendship.
Wanderer does share with Seeker that Melanie was traveling with her brother, Jamie and her boyfriend, Jared Howe, to find Melanie’s uncle Jeb in the desert. Wanderer admits that Melanie is still present, so Seeker decides to be transferred into Melanie’s body to get the information herself. With the help of Melanie, Wanderer escapes and makes her way to the desert, where she is eventually found by Jeb, who takes her to a series of caves hidden inside a mountain, where the pocket of humans (including Jared and Jamie) is hiding.
Wanderer’s presence in the shelter is met with hostility by all but Jeb. Seeing this, Melanie instructs Wanderer not to tell anyone she is still alive, fearing that doing so would only provoke them, though she later allows her to tell Jamie, to put his mind at ease. Wanderer begins interacting with the humans and participating in their harvest, and slowly begins to gain their trust, as well as forming a bond with human Ian O’Shea. Through this, she begins to sympathize with them, and question her species’ actions.
Seeker leads a search party into the desert to find Wanderer. They intercept one of the shelter’s supply teams, and in the ensuing chase, Aaron and Brandt commit suicide to avoid capture and conversion. During the chase, Seeker accidentally kills another Soul, leading her superiors to call off the search.
Returning to the caves, a vengeful Jared and Kyle move to kill Wanderer, causing Jamie to reveal that Melanie’s consciousness is still alive. Ian accepts this, showing concern for the two beings in one body. Jared refuses to believe him, but, after having a dream about Melanie, attempts to determine the truth by kissing Wanderer, provoking Melanie to slap him away, and he realises that she is indeed still alive. Kyle makes another attempt on Wanderer’s life, but she knocks him into a deadly whirlpool. She pulls him to safety and does not tell the others that he had attacked her. Ian believes that Kyle had attacked Wanderer and tells her that he loves her, insisting that Wanderer’s own personality (such as protecting Kyle) is what he loves, rather than Melanie’s body. Wanderer admits that, while occupying Melanie’s body, she must love Jared, but that she has feelings of her own, and the two share a kiss, creating an unusual love triangle—three bodies and four minds.
Sometime later, Wanderer enters the community’s medical facility, and discovers that Doc has been experimenting with ways to remove Souls and allow the host’s mind to regain control, resulting in the deaths many Souls and Hosts from his failed experiments. Traumatized, she rushes from the facility, screaming at a protesting Melanie to “get out of my head!” After isolating herself for several days, Wanderer learns that Jamie is critically ill with a high fever and infection in his leg due to injuring himself with a knife. She infiltrates a Soul medical facility to steal some of their alien medicine, saving Jamie’s life.
Seeker has continued looking for Wanderer on her own. Jeb captures Seeker and imprisons her in the caves. Wanderer offers to show Doc the proper method of removing Souls, on the condition that he remove her from Melanie’s body and let her die. Doc uses the technique to successfully remove Seeker from her host, with Host and Soul both surviving. Wanderer takes the Seeker alien to a Soul space-travel site, where she sends it to a planet far enough from Earth that it can not return within anyone’s lifetime. The plan is to continue freeing hosts and sending the souls to distant planets.
After learning that Wanderer wants to die when she is removed, the humans are upset. On the operating table, Melanie and Wanderer share an emotional farewell. But, due to the intervention of the rest of the group, Doc instead inserts Wanderer into Pet (Emily Browning), a human who was left brain-dead after the Soul inside her was removed, thereby ensuring that Wanderer can live without harming a human. Pet is said to be petite and small, with a face “that no one could mistrust.” Now with a body of her own, she and Ian form a relationship, while Melanie is finally reunited with Jared.
A few months later, while on a supply-gathering trip, Wanderer, Melanie, Ian and Jared are captured. They discover that their captors are actually humans, who reveal that there are several other human groups as well. The also learn that there is a Soul with this group that has sided with the flourishing human resistance, as Wanderer has, and they may not be the last Souls to do so.
Image & Source
The Host (2013) - Poster - Eye of Horus - Subliminal
|
global_01_local_0_shard_00002368_processed.jsonl/29695 | Page 6 (Subliminals)
Lynch conceived Lost Highway after the critical and commercial disappointment of Twin Peaks: Fire Walk with Me (1992), a film adaptation and follow-up to the widely successful cult television series Twin Peaks, co-created and co-produced by Lynch. In tradition of most of Lynch’s films, Lost Highway has a largely cryptic narrative. Lynch has also declined to offer an explanation of his intentions for the narrative; however, Lynch has stated that the film itself takes place “within the same universe” as Twin Peaks. Despite receiving mixed reviews upon initial release, the film has now developed a cult following.
Fred Madison (Bill Pullman) is a wealthy Los Angeles saxophonist who, after a long night’s work, receives a message from an unknown man on the intercom of the front door of his house saying, “Dick Laurent is dead.” When he looks out his window, police sirens are heard in the distance, but the streets outside his house are empty.
Fred then plays his saxophone at a nightclub that night where his beautiful, mysterious wife Renee (Patricia Arquette) does not join him. Fred calls his house during a break, but she does not answer. Arriving home later, Fred sees Renee asleep in bed and asks her where she was; she tells him that she never left the house all evening. Fred suspects that Renee may be cheating on him. One night, after the two have sex, Fred sees Renée’s face as that of a pale old man. The next morning, there is a mysterious package that arrives on the front doorstep containing a videotape of their home. As the days pass, more tapes arrive, showing the interior of their house and even shots of them in bed sleeping. Fred and Renee call the police, but the two detectives Al and Ed (John Roselius and Louis Eppolito) say that there’s nothing they can do about it.
That evening, Fred and Renee go out to a party held by Andy (Michael Massee), a band manager friend of Renee. There, Fred meets a Mystery Man (Robert Blake), who looks like the face Fred had seen on Renée some nights before, and he tells Fred that he is at his house right now. Fred phones his house and the voice of the Mystery Man answers at the house while he’s standing right in front of Fred. Fred walks away and asks Andy who the Mystery Man is and is told that he is a friend of Dick Laurent, a millionaire. Back home the next morning, another tape arrives and Fred watches it alone. To his horror it contains images of him killing Renee. He is then arrested for her murder. Tried, found guilty and sentenced to death, Fred is locked away on death row. Shortly after arriving, Fred is plagued by frequent headaches and is perplexed by strange visions of the Mystery Man, a burning cabin in the desert, and a strange man driving down a dark highway.
One morning, during a routine check of the cells, the prison guards are shocked to find that the man in Fred’s cell is not Fred. The man is discovered to be Pete Dayton (Balthazar Getty) a young auto mechanic. Pete is released into the care of his parents Bill and Candace (Gary Busey and Lucy Butler) and taken home to their house in Van Nuys; at the same time, Pete is being followed by two detectives named Hank and Lou (Carl Sundstrom and John Soiari) to find out why and how Pete ended up in Fred Madison’s cell. Pete goes out that evening with his friends and his girlfriend Sheila (Natasha Gregson Wagner). The next day, Pete returns to work at the garage, where he is welcomed back by the owner Arnie (Richard Pryor) and veteran mechanic Phil (Jack Nance). Pete is called on by Mr. Eddy (Robert Loggia), a charming but hot-tempered gangster, to fix his Mercedes 6.9. Mr. Eddy takes Pete for a drive where Pete witnesses him wave a tailgater on, then ram into the tailgater’s car, after which Mr. Eddy and his two cohorts attack the driver. Pete goes out that evening with Sheila, who questions him on his moody behavior; they have a brief fight, but end the night by having sex.
The next day, Mr. Eddy returns with his beautiful mistress, Alice Wakefield (Arquette), and his Cadillac for Pete to repair. At the end of Pete’s shift, Alice invites him out for dinner. Soon, Pete and Alice begin a secret liaison, meeting at run-down motels every night. Alice begins to fear that Mr. Eddy suspects her and Pete of seeing each other and gets Pete to agree to a plan to steal money from her friend Andy so they can leave town. After being confronted by his worried parents and receiving a threatening visit from Mr. Eddy and his associates at the shop, Pete enters Andy’s house through a door left unlocked by Alice and, while searching the house, discovers a projector playing a porno film featuring her. Pete ambushes Andy and accidentally kills him, and he and Alice escape with the money. Arriving at a cabin in the desert, Alice reveals to Pete that Mr. Eddy is actually a porno producer named Dick Laurent and he forced her to do the tapes. Alice then seduces Pete and says, “You’ll never have me.”
Pete suddenly metamorphoses back into Fred Madison, who searches the desert cabin and meets the Mystery Man again with a video camera and tells Fred that Alice is actually Renee, and that if she said her name is Alice, then she is lying. Fred drives to the Lost Highway Hotel, where Mr. Eddy and Renee are having sex, and waits for Renee to exit the motel. After Renee leaves, Fred breaks into Mr. Eddy’s room, grabs him and takes him away in his Mercedes to the desert, where Fred beats him up. The Mystery Man suddenly appears with a portable TV and shows Mr. Eddy that Fred knows he and Renee have been having an affair. The Mystery Man then shoots Mr. Eddy dead and whispers something to Fred. The Mystery Man disappears and Fred drives off in Mr. Eddy’s Mercedes. Fred then drives to his house, buzzes the intercom and says “Dick Laurent is dead” — the message that he received earlier. The two detectives, Al and Ed, appear looking for Pete Dayton when they see Fred at the front door of his old house. Fred runs back to his car and drives off with the detectives in close pursuit. As it gets dark, Fred speeds down the lost highway pursued by the police as he enters a dark vortex.
Image & Source
Lost Highway (1997) - Project Monarch - Subliminal
Lost Highway (1997) - Project Monarch - Subliminal
Lost Highway (1997) - Project Monarch - Subliminal
Lost Highway (1997) - Checkered Floor - Subliminal |
global_01_local_0_shard_00002368_processed.jsonl/29712 | HTTP Redirect without 3xx HTTP status code
Secure Redirect
Redirect to a url without being tracked!
Paste the link and get your secure link!
Redirect URL without being tracked.
Remove HTTP referer.
NOT return the HTTP code 3xx.
Don't let bots track the link.
Keep your links safe!
With just two easy steps...
1. Fill in your URL:
2. Get your anonymous URL:
Copyright ©
No posts.
No posts.
Powered by Blogger. |
global_01_local_0_shard_00002368_processed.jsonl/29724 | Lightning Hangover: A Zero Day in Pearisburg
Big Miles, Big Bears
The birdsong begins before my alarm, an overlapping chorus of tweets and peeps and chirp-chirp-chirps. It’s a comforting sound, a sound that sounds like home. Which it is, really. Over the past year, I realize, I’ve spent more nights sleeping outside than in. I roll onto my side and open my eyes. They fall closed. … More Big Miles, Big Bears |
global_01_local_0_shard_00002368_processed.jsonl/29735 | Outrage As Zimbabweans React To Church’s Call To Suspend Elections For 7-years
0 1,835
Zimbabwean social media has been buzzing since Zimbabwe Heads of Christian Denominations (ZHOCD) called for the suspension of elections for 7 years to address the political and economic problems currently bedevilling the country.
Unsurprisingly, most Zimbabweans are at variance with the church’s call for an electoral sabbatical.
Below are some of the reactions to the Sabbath proposal
Privacy & Cookies Policy
%d bloggers like this: |
global_01_local_0_shard_00002368_processed.jsonl/29773 | Using Puppeteer to Scrape Websites with Infinite Scrolling
By Andre Perunicic | January 11, 2018
Infinite scrolling has become a ubiquitous design pattern on the web. Social media sites like Facebook, Twitter, and Instagram all feature infinitely scrolling feeds to keep users engaged with an essentially unbounded amount of content. Here’s what that looks like on Instagram, for example.
Instagram's Infinite Scroll
This mechanism is typically implemented by using JavaScript to detect when the user has scrolled far enough down the existing feed, and then querying an underlying API endpoint for the next batch of data that gets processed and dynamically injected into the page. If you’re interested in scraping data from an infinitely scrolling page, your first approach might be to query these API endpoints directly. In fact, we wrote a guide about scraping which features a section describing how to do this in one specific case.
As you can imagine, reverse-engineering a site’s data delivery mechanism can be both time-consuming and require some knowledge of the underlying technologies. Instagram’s tag feeds, like #javascript which is pictured above, get new post data delivered through GraphQL API endpoints which use query IDs, cursors, and pagination to incrementally deliver more data. Other sites might deliver data in real time through WebSockets, or process data from multiple endpoints before injecting something into the page. In these cases, it often makes sense to use a headless browser to emulate scrolling on the page and simply get the data you need from the rendered elements.
In this article, I will demonstrate how to use Puppeeter to scrape data from a page using infinite scroll. Puppeteer is a relatively new contender in the browser automation space that uses a user-friendly interface built on top of the DevTools Protocol API to drive a bundled version of Chromium. This enables short scripts that, with a bit of patience, allow you to easily get as much infinite scroll data as the web page will show you!
A Simple Infinite Scrolling Demo
I put together a basic infinite scrolling demo page just for this article. The page doesn’t actually make any API round trips to get new data for the infinite scroll. Instead, it just emulates realistic behavior by injecting some HTML elements to the bottom of the page half a second after the user has scrolled far enough. After 110 items have been loaded, the delay between scrolling and loading new items into the page goes up to 31 seconds in order to emulate request throttling. Since our script will be grabbing data directly from rendered elements, this actually won’t make any practical difference to how it’s written! After all, one of the benefits of using a headless browser to scrape the web is that you don’t really need to understand how the site fetches and processes the underlying data.
Scraping Data from an Infinite Scroll
Assuming you have npm installed, getting a Puppeteer project started is as simple as executing the following:
mkdir infinite-scroll
cd infinite-scroll
npm install --save puppeteer
This will also install a bundled version of the Chromium browser for use by Puppeteer, so we can focus on writing the scraping script right away. If you’d like to explore the finished code yourself, you can check it out from our article materials GitHub repository. Otherwise, create a file named scrape-infinite-scroll.js in your favorite text editor and add to it the following.
const fs = require('fs');
const puppeteer = require('puppeteer');
function extractItems() {
const extractedElements = document.querySelectorAll('#boxes >');
const items = [];
for (let element of extractedElements) {
return items;
async function scrapeInfiniteScrollItems(
scrollDelay = 1000,
) {
let items = [];
try {
let previousHeight;
while (items.length < itemTargetCount) {
items = await page.evaluate(extractItems);
previousHeight = await page.evaluate('document.body.scrollHeight');
await page.evaluate('window.scrollTo(0, document.body.scrollHeight)');
await page.waitForFunction(`document.body.scrollHeight > ${previousHeight}`);
await page.waitFor(scrollDelay);
} catch(e) { }
return items;
(async () => {
// Set up browser and page.
const browser = await puppeteer.launch({
headless: false,
args: ['--no-sandbox', '--disable-setuid-sandbox'],
const page = await browser.newPage();
page.setViewport({ width: 1280, height: 926 });
// Navigate to the demo page.
await page.goto('');
// Scroll and extract items from the page.
const items = await scrapeInfiniteScrollItems(page, extractItems, 100);
// Save extracted items to a file.
fs.writeFileSync('./items.txt', items.join('\n') + '\n');
// Close the browser.
await browser.close();
Running the script with
node scrape-infinite-scroll.js
causes it to visit the demo page, scroll until 100 #boxes > “items” have been loaded, and save the text from the extracted items in ./items.txt. Running tail ./items.txt shows us that the last 10 lines of the file are indeed
Infinite Scroll Box 91
Infinite Scroll Box 92
Infinite Scroll Box 93
Infinite Scroll Box 94
Infinite Scroll Box 95
Infinite Scroll Box 96
Infinite Scroll Box 97
Infinite Scroll Box 98
Infinite Scroll Box 99
Infinite Scroll Box 100
Let’s briefly discuss how the script works. Thanks to the fact that Puppeteer’s methods are Promise-based, by placing everything in an async wrapper, we are able to await for key steps in the script and write the code as if it executes synchronously. The initial few lines are just boilerplate that handles configuring and starting the browser, and directing the headless browser to the page we wish to scrape. The actual scrolling and extraction are done with a call to scrapeInfiniteScrollItems. This function uses page.evaluate to repeatedly scroll to the bottom of the page and extract any available items via the injected extractItems method, until at least itemTargetCount many items have been extracted, as you can see from this block:
let previousHeight;
while (items.length < itemTargetCount) {
items = await page.evaluate(extractItems);
previousHeight = await page.evaluate('document.body.scrollHeight');
await page.waitFor(scrollDelay);
The wait for scrollDelay milliseconds between scrolls is there to help avoid request throttling in production. It’s worth noting that that
items = await page.evaluate(extractItems);
will serialize the extractItems function before evaluating it in the browser’s context, making the lexical environment in which the function was defined unavailable during execution. Make sure to include everything you need for item extraction in the function’s definition.
You might be wondering what happens if the script is never able to extract 100 items from the page. In Puppeteer, functions that evaluate JavaScript on the page like page.waitForFunction generally have a 30 second timeout (which can be customized). The call
will wait for the height of the page to increase after each scroll, presumably when the page loads more items, and break the while loop by throwing an error if the height doesn’t change for 30 seconds. The error is handled thanks to the try-catch block surrounding the loop, which simply does nothing when an error is caught.
I previously mentioned that the demo page starts injecting items with a 31 second delay after 110 items have been loaded. You can play with this by increasing the itemTargetCount to 120, say, with a call like
const items = await scrapeInfiniteScrollItems(page, extractItems, 120);
and possibly logging or re-throwing the error in the catch block. Feel free to modify the complete script to your liking, and let us know your thoughts in the comments below!
We saw that we can use Puppeteer to scrape infinite scrolls without having to dig into the underlying data-delivery mechanism. There are of course times when this strategy is undesirable, such as when you want to resume scraping from the middle of a feed at a later time, but the script developed in this article should be easy to customize and serve as a starting point for emulating human-like scrolling on a web page.
If you enjoyed this article, consider subscribing to our mailing list or browsing the rest of our blog. We offer a broad range of scraping, development, and automation services here at Intoli, so please don’t hesitate to contact us if you need help on a project!
Suggested Articles
If you enjoyed this article, then you might also enjoy these related ones.
Performing Efficient Broad Crawls with the AOPIC Algorithm
By Andre Perunicic
on September 16, 2018
Learn how to estimate page importance and allocate bandwidth during a broad crawl.
Read more
Breaking Out of the Chrome/WebExtension Sandbox
By Evan Sangaline
on September 14, 2018
A short guide to breaking out of the WebExtension content script sandbox.
Read more
User-Agents — Generating random user agents using Google Analytics and CircleCI
By Evan Sangaline
on August 30, 2018
A free dataset and JavaScript library for generating random user agents that are always current.
Read more |
global_01_local_0_shard_00002368_processed.jsonl/29783 | Article Index
Bhattacharjee-Ferrell scaling hypothesis - binary systems:
Critical sound attenuation:
For understanding the nature of critical sound attenuation, it is important to study the propagation velocity cs of low-frequency sound in the vicinity of the critical point. This kind of considerations allows to understand the coupling between the sound propagation and sound attenuation as well as the sound dispersion of sound velocity near the consolute point. The first thermodynamic studies of Bhattacharjee and Ferrell concentrated on the variation of volume V with pressure p , due to sound propagation at constant entropy S. As consequence of this examinations they got the isentropic compressibility βS at constant S :
where ∆T = T − T (p ) and index c denotes critical parameters. Moreover, the adiabatic temperature variation (∂∆T /∂p )S is expressed by:
roduces a dimensionless parameter g, which represents the system-specific coupling constant and describes the magnitude of coupling between critical density fluctuations and the propagating sound wave:
The sound velocity can be expressed as:
The next step in the procedure of Bhattacharjee and Ferrell considers the frequency ω for an applied pressure signal with its time dependence given by exp(−iωt ). Furthermore, with the aid of the frequency-dependent specific heat C (ω) it is possible to express the sound velocity cs and the compressibility βS as frequency dependent quantities (tilde denotes complex quantities, except for critical exponents ):
It is assumed that the critical part of the specific heat determines the complex sound velocity. Within the scope of dynamic scaling it is possible to write the dependence of C_p on the reduced temperature ε:
where α0 denotes the critical exponent. With the aid of the relationship of critical diffusion coefficient in that controls the relaxation of the concentration fluctuations and relates the diffusion coefficient D, to the viscosity ηs and the correlation length ξ of critical fluctuations:
(with the Boltzmanns’s constant kB , and absolute temperature T), it is possible to give an expression for the characteristic relaxation rate of a fluid:
where ν denotes the critical exponent of the correlation length and Z_0 denotes the dynamic critical exponent. The amplitude Γ_0 is a characteristic system-dependent constant. However, with regard to ultrasonic spectroscopy, it might be interesting to investigate the frequency dependence of the specific heat C_p; can express the temperature dependence in C_p in terms of the characteristic relaxation rate Γ:
where the value of the exponent is:
Consequently, one can get the frequency dependence of C_p at Γ = 0, by using the mode-coupling formalism. It follows:
with a constant a. The attenuation coefficient α is proportional to:
The amplitude parameter A is related to the amplitude of the Bhattacharjee-Ferrell dynamic scaling model:
of the dynamic scaling model. Parameter g is the adiabatic coupling constan. According to the thermodynamic relation:
it can be obtained from the slope dT /d p in the pressure dependence of the critical temperature along the critical line and to the thermal expansion coefficient αp at constant pressure. The latter can be expressed with the aid of density ρ likewise at constant pressure:
∆C_p as well as C_pb are the amplitudes of the critical part and the background part, respectively, of the heat capacity at constant pressure:
The function F_BF(Ω) is the so-called scaling function, which plays a central role it the Bhattacharjee-Ferrell theory. The properties of this special function will be treated with more details on the next side. |
global_01_local_0_shard_00002368_processed.jsonl/29792 | web analytics
How to Create Content 10X Better Than Your Competitors’
In today’s hectic business environment, your competitors may be more focused on creating content rather than creating valuable, shareable content. These tips can help you produce awesome content that blows away the competition.
One tip is to add content types that your competitors haven’t explored yet. “Include graphics, animations, interactivity, and/or video,” suggests Siege Media in the following infographic. “Interactive content converts 2X better than static content.”
Organized content is read content. “Make it better structured,” recommends the infographic. “Users want their answers fast.”
Also, consider using an image every 75-100 words. Those articles get the most shares, according to Siege Media.
To find out more content-creation tips, check out the infographic.
View Source
Originally posted 2016-04-12 07:02:02.
About The Author
Related posts |
global_01_local_0_shard_00002368_processed.jsonl/29801 | the sentence it's from コテッと首をかしげる
• 1
According to the venerable Google Translate, that sentence means "I will wear my head." :P – Mateen Ulhaq Jul 28 '19 at 3:46
「コテッ(と)」 is an onomatopoeia used to describe a sudden and/or quick lean or fall to one side by an object.
'Thus, 「コテッと首{くび}をかしげる」 means "to put one's head on one side". 「コテッと」 would not necessarily need to be translated here.
We have another 「コテッ(と)」 that describes a food item, which means "very oily". These are two different onomatopoeias that happen to be spelt the same.
Ours is a country of mountains, forests, rivers and onomatopoeias.
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/29831 | Where are your credentials and secrets stored?
In .env files or in environment variables, or even worse in config files?
Are your primary AWS keys shared amongst developers?
Do you still have SSH keys from former employees on your servers?
If your answer is "Yes" to one or more of these questions you probably haven't heard the term "secrets management".
In this talk we will look into managing secrets in development and operations, and expose the problems related to them. I will give you an overview of the current state of techniques to mitigate these problems and we'll take a brief look at how an open source tool like Hashicorp Vault can provide a solution to managing secrets in the years to come.
Please login to leave a comment
Srdjan in this talk makes his audience thinks about the costs and problems when someone has its project's config keys exposed. The way he did it was amazing, if not funny.
Very clear, very precise, but it looks like he was always looking into his laptop to read or remember something. |
global_01_local_0_shard_00002368_processed.jsonl/29837 | Why You Procrastinate And How to Stop It
How often do you procrastinate? Or, let’s try a different question. When was the last time you procrastinated? Maybe you’re thinking about doing that now. Pin this article on one of your Pinterest boards so you can go back to it later. Which means almost never. ¯\_(ツ)_/¯ |
global_01_local_0_shard_00002368_processed.jsonl/29870 | March 2017 Newsletter
Video: Link a row to MS Project
Check out our video below on how to link entire rows to MS Project in Milestones Professional. This process also allows you to add symbols and bars as you link. In version 2017, you can bring over multiple tasks from MS Project at the same time.
Upgrade to Milestones Professional 2017
March 2017 Tips and Tricks
For these and more, view Tips and Tricks for March 2017
Move symbols ahead by 4 months
How can I move a group of symbols about 4 months to the right all at the same time?
Upgrade compatibility
I am thinking about upgrading to the latest version but there are quite a few people in my company using a past version. I occasionally need to share a schedule with them. Will I be able to save my schedules in the version that they have?
Locked trial version
I have purchased Milestones Professional. When I start the program I get the message: This is a locked trial version. What have I to do?
Chart drawing slow
After I upgraded my software, the charts take a long time to edit. Every change I make to a chart I have to watch the chart re-draw itself. Is there a way to save all my own chart settings and just apply that to any chart I open. Color, text size, legend settings, etc. I make 20 changes to every chart I open.
Horizontal bar has white stripe
I am using Milestones Professional to build a chart for our management. The task bars I am inserting (which should be solid) have a white stripe through the middle of them. Here’s a picture.
Refresh percent complete with a field other than percent complete
Hello – I am working on a Milestones Professional schedule and am wondering if I can map the bar complete fill to another column in Microsoft Project. My understanding is that the bars currently fill based on the % Complete column data in the Microsoft Project file. I would like to use another Microsoft Project field that we use for Earned Value % Complete. Is that possible?
Have many users open schedule read only on a server
I often am forced to save several versions of a file because another user opens my file, forcing me to “save as” to another version when I need to make changes. Is there a way for me to know who has my file open? Is there some way to prevent this problem?
Symbol tag case sensitive?
Is the Symbol tag case sensitive? Does it matter if I enter it upper or lower case?
No change or unexpected changes after schedule refresh
I have been refreshing my very dense master schedule every month for the last 2 years. Now I find that for all of my bars only the finish date is updating. The start date is not updating. What could be wrong?
For these and more, view Tips and Tricks for March 2017
Join the Milestones Professional Users LinkedIn Group
|
global_01_local_0_shard_00002368_processed.jsonl/29873 | teamLab Borderless
Venue: Odaiba, Tokyo
Lens: Nikkor 50 mm f/1.4 & Samsung S10 camera & Huawei P20 camera
Music: Kraftwerk – Electric café (
Earlier the same day when we visited Mr. Kikuchi and his Kaiseki restaurant from my previous post, we also went to the artificial island of Odaiba to visit teamLab Borderless. Probably it can be most correctly described as a collection of immersive interactive digital art installations flowing freely from one to another. But I think in this case the saying that a picture is worth a thousand words fits perfectly, and I’ll let you explore the place via the pictures instead of trying to explain it.
The first installation we ended up in (there are several paths that randomly lead to different places, so literally we happened to end up at this place, while other visitors might start elsewhere) had many many moving flowers and butterflies and relaxing sounds.
And of course, as almost everywhere in Japan, there were plenty of people taking selfies.
Next stop was a completely dark room full of very strong and concentrated floodlights dancing in a given rhythm.
Still inside the floodlight room, here at a higher intensity light.
Another room, or a wall, with some surreal flora and fauna dancing on it.
A room with artificial lily pads that make various noises when touched.
A very cool room full of cables that you can walk through, blinking in various predetermined patterns with matching sounds. Pretty much impossible to actually describe the place without being inside though.
This is how the other people looked in the blinking room, owing also to the floor covered in mirrors.
Still in the blinking room, going for a more artsy shot.
Another one, with cooler bokeh effect.
This is the waterfall room, where the actual floor is shaped to match exactly the projected moving water pattern.
And here we are at an “infinity” room, made of many small changing lights and fully covered with mirrors to give you the feeling that the space is never ending.
Still at the infinity room, waiting for the lights to change…the default color of all lights was pink as on the top photo but they started changing depending on the human presence in the room.
More of the infinity room… we couldn’t get enough of it really.
The last big hall was devoted to kids and various interactive games. Like this one where jumping on the rubber floor created the illusion of curving space-time around you like a black hole. Pretty cool, no?
18 thoughts on “teamLab Borderless
1. I wish I could be there!
The closest I can come to an immersive experience is buying vegetables at Smart & Final. When the automatic air misters come on to spray the product, we’re regaled with the sound of thunder and lightning sound effects.
A poor comparison !!! 🙂
Liked by 3 people
Leave a Reply to Dena@shaldenandneatham Cancel reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/29882 | Story — (LS) Answers Pt. 1
March twenty-sixth. I woke up with a knot in my stomach. My parents were still away, a week late from their trip home, and I still hadn’t heard from them. I was anxious, but it didn’t surprise me. The ink Will had written on my arm a month ago had told me March twenty-sixth was the day things would start making sense. Maybe this was the day they would come home.
But something in my gut told me not to get my hopes up.
I remembered reading somewhere that prophecies had a way of coming true even when they were avoided. If I considered the date the ink gave me to be prophecy, then I would get answers today regardless of what I did. Maybe I would find a book in my parents’ room that told me everything I wanted to know. Maybe Doc would stop being so vague with his answers. Maybe I would go down the stairs only to find a werewolf there waiting to eat me. Life was so full of wonderful mysteries.
But if I sought out my own answers, I could probably fulfill the prophecy on my own terms.
Throwing off the covers, the chill of open air and stretching my muscles helped me wake up. “Fetch!” I called after a good yawn.
After about a minute, the little green spirit walked through the closed door and into my bedroom.
“Pour me a glass of orange juice downstairs. No rush.” He nodded and walked back through the door. “Oh, and Fetch!”
This time he popped his head through the door so that only his white, pupil-less eyes went through. That had stopped bothering me a long time ago. In fact, I found the little spirits cute nowadays. “Make sure to get me a clean glass this time. From the cupboard, not the sink.” I shuddered at the thought of yesterday morning when I drank some unholy mixture of old coffee and orange juice.
As he vanished from sight again, I reached for my phone. Pulling it off the charger where it sat on the nightstand, I unlocked it and opened my contacts. I had still never contacted Will since he gave me his number. The fact that he was a serial killer probably had something to do with it. Maybe he was hunting for his next victim when he came to talk to me. But there was that ink to consider, as well.
“What doing?” Doc said from behind.
Startled, I swiveled around and covered myself with a pillow. Some shield it would make if there were any real danger. He sat on the bed frame, staring at me.
“Doc,” I breathed, relaxing. “How many times do I have to tell you to use the door?”
“It’s closed,” he pointed out.
“I know. But that is the area in the room intended for entrances. It’s really unnerving when you sneak up on me through the wall like that.”
With my heart rate increased, I decided to take this time to actually get up and change. As I discarded the phone, Doc hopped off the frame and got comfortable in the now empty bed. He picked up the phone and examined it in his tiny hands, but there was no danger as he couldn’t unlock it.
“I’m going to talk to Will today,” I commented as I pulled a t-shirt on.
“Dangerous,” he crooned, shaking my phone. It was hard to tell what his plan was, but he turned the motion sensor activated the flashlight.
“Give me that!” I scolded, swiping it away from him and turning it off again. “I know it’s dangerous, but as long as I’m careful I’ll be fine.” I changed into more suitable pants and glanced into the mirror. After some minor tweaks and adjustments, I definitely passed the ‘Is that a human being?’ test. Well, I would after my hair was brushed, at least.
Looking at my phone contacts again, I stared at Will’s name. It was so weird to have a serial killer so readily available. I could text him any time I wanted. But as soon as I did, he would have my number, too.
A thought occurred to me. I set the phone down on my white, floral themed desk, and crouched to get under my bed. After removing several armfuls of dirty clothing I forgot I owned from underneath, I grabbed my old backpack from school. The binder inside was full of chemistry formulas and English notes, but it was bound to have a blank sheet somewhere. Okay, fine, it was mostly filled with doodles, but whatever. Besides, I was pretty proud of a few of them.
Tossing it onto the desk, I opened it up to the first blank page I found. Going to meet somebody with answers. His name is Will. Probably works at the library. Possibly a serial killer. If you’re reading this, I made a bad call. Sorry Mom & Dad!
Below that note, I wrote the date. Two suicide notes in barely a few months. My life was really derailing lately. At this one was a lot more ‘Me’, for whatever that was worth.
Still sitting at my desk, I looked at the unsure girl in the mirror one more time. She might be making the biggest mistake of her life today. She was never one for taking risks. I wondered what compelled me so adamantly to talk to him today.
An steady exhale and a string of ignored mental warnings later, it was sent. “Hey, Will. This is Lisa.”
I stared at the phone, watching as the text changed from ‘sent’ to ‘delivered’.
A thousand butterflies filled my stomach. Each one was an entirely different conversation. What if he had nothing to do with the ink? What if it was the wrong number? What if he could track the text back to my house?
But no. I doubted texts were traceable. And even if they were, Will probably wouldn’t have the resources to do it. Still, the anxiety of the immediate future was overwhelming in that moment. A glance back at the notebook on my messy desk sent a chill down my spine. I added ‘I love you‘ to the bottom of the page before leaving the room.
As I descended the stairs and walked into the dining room, my phone hummed with the default ringtone I still hadn’t gotten around to changing. My breath caught in my throat. It was from him.
“Hey! Took you long enough!”
Something innocuous. I guess it would have been weird to expect ‘Hey! You’re too late to be murder victim number thirty-six, but if you hurry you can by thirty-seven!’. What was I thinking?
“I had to think over your offer” I sent back. The glass of orange juice sat nearby on the counter. It was a bit on the empty side, but it was definitely an acceptable color this time. Still, precautions were necessary when Fetch prepares your drink, especially without supervision. A careful sniff indicated that it probably wasn’t poisonous. It seemed he had gotten everything right for once. That was reassuring. The spirits didn’t learn very well.
My phone hummed again. “You asked some interesting questions, huh?”
How could I respond to that? I wondered what he knew, and what he thought I knew. What if the information I had gotten that day wasn’t even the worst of it?
“I want to meet up and talk” was my response. I was nervously chugging the juice, waiting for his reply.
“Sure, I’ll give you my address. See you in 30?” Maybe he didn’t think I knew as much as I did. I wasn’t about to meet a serial killer in his own home.
Having finished the glass, I stood up and walked over to the sink to wash it out. Before I got there, I slipped on a puddle right in front of the refrigerator and fell forward. The glass shattered ahead of me, scattering glass all across the kitchen. Thankfully, I was fine. Upon inspection, I realized that the puddle was orange juice. Apparently Fetch hadn’t performed as flawlessly as it seemed. I opened the fridge to see that he had dropped the carton inside. There was juice spilled everywhere.
“Sparkle!” I yelled.
A moment passed, and a purple spirit plopped onto the counter, passing through from the ceiling above. It stood up and looked at me. “Yes!” she chimed.
“Please clean this mess up. Don’t go in the fridge, and just push all the glass into a pile. Take all the time you need. Got all that?”
The little ghost nodded. I liked this new one. I hadn’t been training her very long, and I still didn’t like her name, since it sounded so childish. I was pretty sure the spirits didn’t even have genders, but whatever. Sparkle was a girl’s name.
Now I also had to change. Again. Luckily, I wasn’t wearing socks. I picked up my phone from the counter. I still didn’t like the idea of going to his house. “I was thinking coffee, actually” I replied.
“I can show you some cool things if we meet in private ;)”
Oh, brother. “Like the sharp end of a knife? I’m not meeting some guy I don’t know where my safety isn’t guaranteed.”
He didn’t respond immediately, so I took the time to look for a change of clothes. No clean pair of jeans left. I was forced to grab a skirt that matched my top. Could I teach Sparkle to do my laundry? Probably not. I would have to delegate that job to a different spirit. What would I name that one? I’d have to give that some thought another time.
Looking through the mirror after I was once again fully clothed, I realized I almost forgot to brush my hair. I was beginning to think I had scared Will away when my phone hummed again. “Your kind has nothing to fear from me. I promise. But if you want to meet, you’ll have to come to my house.”
Your kind. Was he not human? I wasn’t sure whether to be more or less scared because of that text.
Several minutes passed, and my scalp ached, but my hair was straight. I ran my fingers through it to make sure it was perfect. I went back downstairs to put some sandals on. “Your address?” I texted him.
He sent it. Two miles. Too far to reasonably walk. I’d have to take the car, even though I hated driving. “I’ll be over soon.”
“See you soon!”
I dialed 9-1-1 into my cell phone so I would be ready in case anything went wrong.
One thought on “Story — (LS) Answers Pt. 1
1. This one didn’t sit with me well. The spirits don’t really feel like characters this time, and the interactions with them stray farther and farther from believable.
I almost feel like this entire piece is more of the “part that happened, but isn’t actually in the book” that the following piece might use as reference (911 was pre-dialed, I had to change my clothes, etc).
To hit on the first part again, though, the whole utilization of the spirits just doesn’t sit well with me anymore. How long as this been going on, that Lisa is just training spirits to do everything for her? I would probably believe it the other way around – that the spirits just randomly started helping her in little ways here and there.
And Will. I kinda see what you’re trying to do, but it didn’t really come off right, or Lisa’s reactions were just odd?
All in all, this one just isn’t working out very well, and I feel like it needs to be rethought out.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/29906 | John 14, dwelling places, the way, the truth and life, Jesus going away and giving another Comforter.
Another Comforter: αλλον παρακλητον ( allon parakleton) meaning one of the same kind as Jesus.
Some Muslims say the Bible has been altered and should have read perikleton rather than parakleton, claming the Bible has been falsified to fit Jewish and Christian beliefs and only the Quran is true.
This requires many steps of faith on account of the Muslims. 1. Jesus, Mary and Moses were really Muslims and spoke of Muhammad. 2. The New Testament is falsified. 3. Ignore the Dead Sea Scrolls, and 4. When Jesus speaks of the Spirit of Truth he really means Muhammad, not the Holy Spirit as He says in verse 26.
As a Christian I am free to take God’s Word for what it says.
Published by
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_0_shard_00002368_processed.jsonl/29910 | beef tenderloin with garlic, shallot & parsley butter
True story: this beef tenderloin practically melts in your mouth. While beef tenderloin is a pretty expensive piece of meat, it sure is easy to cook with. And this is a perfect dish for entertaining when you really don’t want to be in the kitchen the entire party. Try it out for your next special dinner and I promise you won’t regret it.
• Serves 4-6
For the tenderloin:
• 1 3-lb. beef tenderloin
• 2 Tbsp. fresh garlic, minced
• 4 Tbsp. good quality salted butter (like Kerrygold), softened
• salt and freshly ground black pepper
For the garlic, shallot, & parsley butter:
• 2 Tbsp. minced shallot
• 1 tsp. fresh garlic, minced
• 1 Tbsp. finely chopped fresh parley
1. Using a sharp knife, trim any excess fat and silver skin from the tenderloin and discard. Using kitchen twine, tie the tenderloin crosswise every 2-3 inches. Generously season each side of the tenderloin with salt and fresh ground pepper. Cover and allow to rest at room temperature for 1 hour.
2. After resting, preheat the oven to 300 degrees. In a small bowl, mix together the garlic and 4 Tbsp. of softened butter. Slather the tenderloin generously with the garlic butter until all sides are coated.
3. When the oven is preheated, set the tenderloin on a wire rack above a baking sheet (so the excess liquid can drip onto the sheet). After 20 minutes in the oven, flip the tenderloin to the other side and allow it to roast for another 45-55 minutes. *The tenderloin will continue to cook after removing it from the oven, so take it out about 10 degrees rarer than you want to serve it.
4. When the roast registers an internal temperature of 135-140 degrees Fahrenheit, remove it to a cutting board and allow to rest for 10 minutes. This allows the juices to redistribute so that when you slice it, the juices don’t all come running out.
5. While the meat is resting, you can prep the garlic, shallot and parsley butter. In a small bowl, combine the butter, shallot, garlic and parsley and stir until well-mixed.
6. After the meat has finished resting, cut the twine off and discard. Slice the meat crosswise into 1/2 to 1 inch thick slices. Arrange on a serving platter and spoon the garlic, shallot, parsley butter onto the meat. Allow it to melt and serve immediately with your favorite side dishes.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/29934 | Donald D Henson wepin at wepin.com
Sat Aug 18 11:22:13 UTC 2007
Peter Garrett wrote:
> On Fri, 17 Aug 2007 09:29:12 -0600
> Donald D Henson <wepin-list at wepin.com> wrote:
>> I'm trying to install K3B. The install looks okay except that when I run it, I
>> get the following an error message that states:
>>> Mp3 Audio Decoder plugin not found.
>>> K3b could not load or find the Mp3 decoder plugin. This means that you will
>>> not be able to create Audio CDs from Mp3 files. Many Linux distributions do
>>> not include Mp3 support for legal reasons. Solution: To enable Mp3 support,
>>> please install the MAD Mp3 decoding library as well as the K3b MAD Mp3
>>> decoder plugin (the latter may already be installed but not functional due
>>> to the missing libmad). Some distributions allow installation of Mp3
>>> support via an online update tool (i.e. SuSE's YOU).
>> I have installed eveything with even a vague reference to MAD but no change. I
>> can't find the "MAD Mp3 decoding library" nor the "K3b MAD Mp3 decoder
>> plugin". Can anybody tell me how to find these things?
> apt-cache search k3b mp3
> libk3b2-mp3 - The KDE cd burning application library - MP3 decoder
> Should be in the universe repository - if you haven't enabled that, you
> can do so in System-Administration-Software Sources .
> That should do the trick for you.
> In general, searching on terms with reference to the description rather
> than the underlying libraries etc. can work - so in this case searching on
> k3b and mp3 turns up the package I suggested above. The error message in
> this case is not very helpful, though :)
> Peter
That did it. Thanks.
Don Henson
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 249 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20070818/d4dd4ed4/attachment.pgp>
More information about the ubuntu-users mailing list |
global_01_local_0_shard_00002368_processed.jsonl/29958 | Maris Soule
MarisSoule and Zuri
Represented by Jeanie Loiacono exclusively for the following:
Maris Soule Maris Soule Events Facebook Twitter LinkedIn Soule Media
Maris Soule has had three mysteries in the P.J. Benson (Crows) series published by Five Star/Gale/Cengage, twenty-five category romances published by Harlequin, Silhouette, and Bantam, and a mini-mystery published by Woman’s World. Several of her romances were romantic suspense.
Soule is a two-time RITA finalist, and her books have won or placed in several contests. A Killer Past was a finalist for the 2012 Claymore Award as well as a finalist (under a different title) in the 2012 Writers-Editors Network International Writing Competition.
Born and raised in California, Ms. Soule was working on a master’s degree at U.C. Santa Barbara when she was swept off her feet by a red-head with blue eyes. Soule now lives in Michigan, a quarter mile from Lake Michigan, with an oversized Rhodesian Ridgeback and the same red-head. Maris Soule is on Facebook, Twitter (marisSouthHaven), and LinkedIn. She also writes a weekly blog either on writing or about Rhodesian Ridgebacks
A Killer Past
A Killer Past cover
Published by ROBERT HALE LTD
A Killer Past Reviews
Amazon Amazon CA Amazon AU Amazon UK Amazon Germany Amazon Italy Amazon France Amazon Spain Amazon Japan HPB Hudson Books Angus and Robertson B&N BAM FishPond Waterstones IndieBound Book Depository Wheelers Powell’s Books WH Smith GooglePlay Scribd GoodReads KOBO Target LoveReading WalMart
Mary Harrington doesn’t want to revive her past. She certainly doesn’t want her son and granddaughter to know what she did forty-four years ago. But when two teenage gang members try to mug her, old habits are hard to forget.
Sergeant Jack Rossini, Rivershore, Michigan’s lone investigative detective, initially doesn’t believe an “old” woman could have put the punks in the hospital, but once he meets Mary, he becomes curious. That curiosity grows when he discovers there’s no record of her existence prior to forty-four years ago.
Mary’s and Jack’s lives continue to intersect as a gang the police have been investigating vows to teach Mary a lesson, and a man from Mary’s past arrives in Rivershore, threatening to reveal her secrets.
|
global_01_local_0_shard_00002368_processed.jsonl/29963 | Engineering logo design
A strong engineering logo should get people’s gears turning and inspire them to build great things. Your logo should reflect your deep thought and creative process to attract potential clients.
If you’re looking for engineering logo inspiration, you’ve come to the right place! Browse engineering logo designs from companies big and small, and see what colors, fonts, and symbols resonate with clients in this industry. When you're ready to get a logo for your business, try our AI-powered logo maker for free!
Make your own engineering logo for free
A logo and color swatch
A t-shirt with a logo on it
Two logo variations side-by-side
Engineering logo best practices
Blue is commonly used in engineering logos to portray trust and reliability. Try using a different hue than your competitors, and keep your logo clean and simple to reflect your business.
Ask yourself, where will I use my logo most? Opt for a clean layout that looks great on business cards and websites. You may need multiple logo variations to adapt to different mediums.
Engineering logos often feature bold, sans-serif, uppercase typefaces to represent knowledge and power. Pick a typeface that reflects your clients and is legible for all sizes and mediums.
Get started today!
|
global_01_local_0_shard_00002368_processed.jsonl/29981 | These resources from the mastery approaches to maths twilight sessions MA2M+ and NCETM funded workshops for local leaders of maths education Leading Maths are provided open access so that you might choose to use them for your own in-school workshop activities with your team, school to school meetings and CPD activity. |
global_01_local_0_shard_00002368_processed.jsonl/29988 | We are facing an issue with the css styling in Magento store. I tried refreshing the cache in admin but that didn´tt fix the issue.
• Varnish as external cache
• Magento
• Ultimo as the theme
I assume that the theme files are not loading but we are unable to find a correct solution for this.
What steps should we take to resolve this issue?
• Please provide proper and detailed information about the problem itself and software/version you are using. Otherwise no one will be able to debug this. – Stefan Gregori Mar 26 '15 at 14:33
• i solve issue by following techbandhu.wordpress.com/2013/09/12/… – matinict Feb 8 '16 at 6:18
• See by inspect element that the css file are being accessed. – Anees May 9 '18 at 15:01
If you haven't resolved your issue, open you website -> right click and select view page source or just press CNTRL+U Keys together. There you'll find your styles.css file. Check if it is showing the right url. Click on it, see if it is loading ok.
It should look like this:
<link rel="stylesheet" type="text/css" href="http://www.abcd.com/skin/frontend/rwd/default/css/styles.css" media="all" />
For this problem to happen, There are three reasons I know of:
1.) There might be an issue because of System Cache. Clean the cache from the backend or go to magentoroot/var/ and delete the contents of the cache and session folder.
2.) There can be issue with the file permission of your css File. In this case just type the following command in terminal, sudo chmod 777 -R /magentoroot/
3.) Lastly, there could be something wrong with the url in your core_config_data table of your database, which I think you have already checked.
• I have slash (/) problem, my styles.css file like <link rel="stylesheet" type="text/css" href="abcd.comskin/frontend/rwd/default/css/styles.css" media="all" /> . There is no slash(/) between domain and skin folder. not only skin folder all my files have no slash(/) – zus Nov 13 '17 at 4:59
• Did you understand my problem? – zus Nov 13 '17 at 5:01
• The missing slash (/) needs to be added to your base_url in the core_config_data table. eg. abcd.com – 07lodgeT May 21 '18 at 10:37
• You are amazing, thanks for that it was driving me nuts – Peanuts Jan 7 '19 at 15:45
Have you made any recent changes to your database ?
login to your database: find the table named 'core_config_data'
there check the entries against Value:
where path = web/unsecure/base_url and path = web/secure/base_url
see if '/' is missing after the url if yes then put it there.
• Hi Yugesh, I have checked in the admin and the url is correct with '/' in the end. – Sai Kumar J Mar 27 '15 at 7:14
• Have you checked in the table 'core_config_data' ?? – Yugesh M Kumar YO Mar 27 '15 at 9:34
• Yes I checked in the core_config_data – Sai Kumar J Mar 27 '15 at 10:36
• Hi Sai, Have you Resolved Your Problem Yet...? – Yugesh M Kumar YO Mar 29 '15 at 2:53
Adding something to Yugesh M Kumar YO's answer
1. Check .htaccess file
2. Disable css merge from core_congif_data
And can you access the admin area without any problem?
If so 3. Check if you have set the design properties correctly. (package, skin, template etc..)
Some more details from your end will help to trap the issue.
In my case it is due to .htaccess file. In my project there is a .htaccess file in /skin folder with following content:
Header set Access-Control-Allow-Origin "*"
I have removed this file and it works fine.
you tried to load the css file directly via url and see if you load ok?
You can try to erase the cache Magento cache or jumping, doing this
• Hi Marc, I refreshed and cleared the cache from admin. I can see the css file loading with the code in it. – Sai Kumar J Mar 26 '15 at 14:41
I accidentally deleted the .htaccess files in pub and pub/static After I copied the .htaccess files for these folders from the Magento Github site, the style started to work.
I have the same issue:
enter image description here
I also have both .htaccess (default) in /home/ubuntu/public_html/mangeto-ce-226 and /home/ubuntu/public_html/mangeto-ce-226/pub
I found the question here to help my issue: How to fix Magento 2 2.0.0-RC Admin page not found after installation
edit /etc/apache2/apache2.conf
<Directory /var/www/html> Options Indexes FollowSymLinks MultiViews AllowOverride All allow from all </Directory>
restart Apache : sudo service apache2 restart
if its xampp change in core_config_data web/unsecure/base_url to your address like http://localhost:8080/appname/
Add Design Change in AdminPanel/System/Design
"Date From" nad "Date To" leave empty.
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/29990 | First in a four week series on the Sukhavati Sutras with Ratnaguna. This week he looks at Happiness
The Pure Land Sutras describe the myth of Amitabha and his Pure Land Sukhavati, or the Land of Bliss.
Recorded at Triratna Night at Manchester Buddhist Centre on 2nd February 2015.
Share This |
global_01_local_0_shard_00002368_processed.jsonl/30002 | his compassion for the abandoned
Matthew 9:32-36
32 As they were going away, see, a demon-oppressed man who could not talk was brought to him.
33 And after the demon had been cast out, the speechless man spoke. And the crowds were shocked, saying, “Never was anything like this seen in Israel.”
36 When he saw the crowds, he had compassion for them, because they were troubled and abandoned, like sheep without a shepherd. _________________________________________
his compassion for the abandoned
When Jesus saw needy people, he did not decide whether or not to help them based on how it would look. If he wanted to avoid criticism, he could have stayed away from the demonically oppressed. His critics were already saying that he uses Satan’s power. But when he saw someone in bondage, he wanted to give them freedom. He still does.
He saw the people in the crowds as victims of abuse and neglect. He could have shunned a great many of them, complaining that they have gotten themselves into trouble. Instead, he chose to be a redeemer. He chose to shepherd the sheep that others had thrown away. That is the kind of ministry he calls his church to.
LORD, give us your compassion for the troubled and abandoned all around us.
About Jefferson Vann
This entry was posted in church, compassion, deliverance, healing, Jesus Christ and tagged . Bookmark the permalink.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/30005 | Polymath projects are a form of open Internet collaboration aimed towards a major mathematical goal, usually to settle a major mathematical problem. This is a concept introduced in 2009 by Tim Gowers and is in line with other forms of Internet mathematical research activity which include MathOverflow.
Former and current projects
The polymath wiki page gives a description and links to former polymath projects and much additional information. So far, there were about 10 polymath projects of which 6-7 led to intensive research, and among those 3-4 were successful. (There were several MathOverflow questions motivated by running polymath projects, especially questions related to polymath5.) Those projects ran over Gowers's blog (polymath1, polymath5 and others), Tao's blog (polymath8), the Polymath Blog (administered by Tao, Gowers, Nielsen, and me) (polymath4 and polymath7), and my blog (polymath3).
Updates (Before Nov 2016) There were a couple of additional polymath-type projects. (Nov '15, 2016) Currently, polymath10 on Erdős-Rado delta system conjecture is running on my blog.(New, Dec 29, '15) Terry Tao posted (on behalf of Dinesh Thakur) an interesting proposal for a polymath project regarding identities for irreducible polynomials Update: problem solved by David Speyer. ( January 31, 2016) Tim Gowers launched on his blog polymath11 on Frankl's union-closed conjecture.
Updates (Before January 2018) : Timothy Chow launched polymath12 on Rota's basis conjecture (February 24, 2017). (It was proposed as an answer to this question here.) (May 14, 2017) Tim Gowers is running a polymath-like project polymath13 on "Intransitive dices". (Dec 24 2017) A spontaneous polymath project, polymath14, over Tao's blog: A problem was posed by Apoorva Khare was presented and discussed and openly and collectively solved. (And the paper arxived.)
Update (January 25,2018) A new polymath project is emerging on Tao's blog: Polymath proposal: upper bounding the de Bruijn-Newman constant. Update: This is polymath15 which seems very active and quite successful. (wikipage)
Updates (April 14, 2018, June, 2019) Dustin Mixon and Aubrey de Grey have launched Polymath16 over at Dustin’s blog. The project is devoted to the chromatic number of the plane (Wikipage) following Aubrey de Grey's example showing that the chromatic number of the plane is at least 5. See also a proposal post and discussion thread over the polymath blog, and a proposal over here. Polymath 16 was now concluded.
Update, June 2019 Terry Tao initiated a sort of polymath attempt to solve the following problem conditioned on some conjectures from arithmetic algebraic geometry: Is there any polynomials $P$ of two variables with rational coefficients, such that the map $ P: \mathbb Q \times \mathbb Q \to \mathbb Q$ is a bijection? This is a famous 9-years old open question on MathOverflow.
Former proposals for future projects
There were also 10-20 additional serious proposals. A few proposals of various nature (from which polymath5 was selected) are gathered in this post on Gowers's blog, and several that appeared on various places are summarized on the polymath Wiki and also on the polymath blog. The polymath projects so far consisted of an attempt to solve a specific open problem but some of the proposals were of different nature.
More background
So far, polymath projects, while getting considerable attention and drawing enthusiasm, (and some controversy,) were limited in scope within mathematics and among mathematicians.
In most cases a small team of participants were the devoted contributed and in some cases those devoted participants were experts in the relevant area. Thus projects may apply primarily to experts in a specific field of mathematics. In all existing examples the project itself had some general appeal.
For a polymath project, in addition to the main task of trying to reach or at least greatly advance the goals of the specific project there are secondary goals of trying to understand the advantages and limitation of the polymath concept itself, and of trying to openly record the thought process of different participants towards the specific goal.
The question
The question is simple:
Make additional proposals for polymath projects.
Summary of proposals (updated: September 24, 2017)
1) The LogRank conjecture. Proposed by Arul.
2) The circulant Hadamard matrix conjecture. Proposed by Richard Stanley.
3) Finding combinatorial models for the Kronecker coefficients. Proposed by Per Alexandersson.
4) Eight lonely runners. Proposed by Mark Lewko.
5) A problem by Ruzsa: Finding the slowest possible exponential growth rate of a mapping $f:N→Z$ that is not a polynomial and yet shares with (integer) polynomials the congruence-preserving property $n−m∣f(n)−f(m)$. Proposed by Vesselin Dimitrov.
6) Finding the Matrix Multiplication Exponent ω. (Running time of best algorithm for matrix multiplication.) Proposed by Ryan O'Donnell.
7) The Moser Worm problem and Bellman's Lost in a forest problem. Proposed by Philip Gibbs.
8) Rational Simplex Conjecture ( by Cheeger and Simons). Proposed by Sasha Kolpakov.
9) Proving that for every integer $m$ with $|m| \le c(\sqrt{n}/2)^n$ there is an $n \times n$ 0-1 matrix matrix whose determinant equals $m$. Proposed by Gerhard Paseman.
10) Proving or disproving that the Euler's constant is irrational. Proposed by Sylvain JULIEN.
11) The Greedy Superstring Conjecture. Proposed by Laszlo Kozma.
12) Understanding the behavior and structure of covering arrays. Proposed by Ryan.
13) The group isomorphism problem, proposed by Arul based on an early proposal by Lipton.
15) Komlos's conjecture in Discrepancy Theory. Proposed by Arul.
16) Rota's Basis Conjecture. Proposed by Timothy Chow. Launched on the polymath blog.
17) To show that $2^n+5$ composite for almost all positive integers $n$. (Might be too hard.) Proposed by me.
18) To prove a remarkable combinatorial identity on certain Permanents. Proposed by me. Update, Aug 6, 2016: settled!
19) Real world applications of large cardinals Proposed by Joseph van Name. There were a few more proposals in comments.
20) A project around a cluster of tiling problems. In particular: Is the Heech number bounded for polygonal monotiles? Is it decidable to determine if a single given polygonal tile can tile the plane monohedrally? Even for a single polyomino? Proposed by Joseph O'Rourke
21) To prove that $\sum \frac{\sin (2^n)}{n}$ is a convergent series. Proposed by JAck D'aurizio
22) The Nakayama conjecture and the finitistic dimension conjecture (major problems from the intersection of representation theory of finite dimensional algebras) and homological algebra. Proposed by Mare.
23) Major questions in the field of stereotype spaces and their applications, proposed by Sergei Akbarov.
24) The Erdos-Straus conjecture, proposed by Amit Maurya
25) The Collatz conjecture, proposed by Amit Maurya.
26) (New) Indecomposability of image transformations, proposed by Włodzimierz Holsztyński
27) (New) Is there a degree seven polynomial with integer coefficients such that (1) all of its roots are distinct integers, and (2) all of its derivative's roots are integers?, Proposed by Benjamin Dickman.
28) (New) The Cartan determinant conjecture for quiver algebras, proposed by Mare.
29) (New) The number of limit cycles of a polynomial vector field, Proposed by Ali Taghavi.
30) Small unit-distance graphs with chromatic number 5, proposed by Noam Elkies. Became Polymath16, see above.
Proposed rules (shortened):
1. All areas of mathematics including applied mathematics are welcome.
2. Please do explain what the project is explicitly and in some details (not just link to a paper/wilipedea). Even if the project appeals to experts try to give a few sentences for a wide audience.
3. Please offer projects that you genuinely think to be potentially suitable for a polymath project.
(Added) Criteria that were proposed for a polymath project.
Joel David Hamkins asked for some criteria that have been proposed for what kind of problem would make a good polymath project?
I don't think we have a clear picture on criteria for good polymath projects and there could be good projects of various kind. But the criteria for the first project are described by Gowers (I modified the wording to make them not specific in one sentence), and they seem like good criteria for a first project in a new field be it algebraic geometry, algebraic topology, group theory, logic, or set theory (to mention a few popular MO tags).
" I wanted to choose a genuine research problem in my own area of mathematics, rather than something with a completely elementary statement or, say, a recreational problem, just to show that I mean this as a serious attempt to do real mathematics and not just an amusing way of looking at things I don’t really care about. This means that in order to have a reasonable chance of making a substantial contribution, you probably have to be a fairly experienced [researcher in the field of research]. So I’m not expecting a collaboration between thousands of people, but I can think of far more than three people who are suitably qualified.
Other criteria were that I didn’t want to choose a famous unsolved problem, or a problem where I had no idea whatever where to start. For a first attempt, it seemed a better idea to choose a problem that I’d love to solve, about which I already have some ideas, but in which I don’t (yet) have a significant emotional investment.
Does the problem split naturally into subtasks? That is, is it parallelizable? I’m actually not completely sure that that’s what I’m aiming for. ... I’m interested in the question of whether it is possible for lots of people to solve one single problem rather than lots of people to solve one problem each.
However, my contention would be that any reasonably complex solution to a problem is somewhat parallelizable and becomes increasingly so as one thinks about it."
• 3
$\begingroup$ I'm noticing a large matricial aspect to the proposals. Gerhard "Glad I Proposed Mine Early" Paseman, 2015.09.30 $\endgroup$ – Gerhard Paseman Sep 30 '15 at 16:32
• 4
$\begingroup$ I don't have the freedom to write a careful proposal at the moment, but I believe a project could built around a cluster of tiling problems. In particular: Is the Heech number bounded for polygonal monotiles? Is it decidable to determine if a single given polygonal tile can tile the plane monohedrally? Even for a single polyomino? $\endgroup$ – Joseph O'Rourke Sep 30 '15 at 18:27
• 4
$\begingroup$ Perhaps you could mention some criteria that have been proposed for what kind of problem would make a good polymath project? $\endgroup$ – Joel David Hamkins Sep 30 '15 at 21:13
• 2
$\begingroup$ Dear Joel, I do not think we know the answer to your question. In fact, this is part of what is explored. But there were discussions about it in general and with regard to specific suggestions mainly on Tim's blog. $\endgroup$ – Gil Kalai Sep 30 '15 at 21:19
• 9
$\begingroup$ I imagine that a good polymath problem would be one where it's reasonable to take a "divide and conquer" approach, breaking things down into cases, and sending in the troops to tackle different cases. Otherwise the only people who can contribute a lot are those with a global view of the problem, and that means that in the end just a few will contribute. $\endgroup$ – John Baez Oct 1 '15 at 5:20
30 Answers 30
8 Lonely Runners
[The aim of this proposal would be to find a project that a massive number of people (including amateur mathematicians) might actually effectively contribute to, which is a somewhat different goal than the other proposed polymath projects.]
A longstanding problem in diophantine approximation is the lonely runner conjecture which states:
Suppose one has $n\geq 1$ runners on the unit circle, all starting at the origin and moving at distinct speeds. Then for each runner, there is a time that that runner is separated by a distance of at least $1/n$ from each other runner.
This has been proven for $n \leq 7$ runners by Barajas and Serra but is open for higher values of $n$. It is known that one can reduce to the case where all of the speeds are integers. From here each of the previously considered cases (for $n \leq 7$) can be treated by case analysis based on various congruence conditions of of the $n$ integer speeds.
Extrapolating from the work on $n \leq 7$, the work of splitting into and proving the various cases should be highly parallelizable and many cases completely elementary. At the same time, however, one might well imagine that more creative/sophisticated/clever arguments could be developed or applied to particular cases, which could have the potential of even yielding progress the general case as well.
In fact, recently Terry Tao proved that one needs only consider a finite number of cases for each $n$ (unfortunately the number of such sets is extremely large even for $n=8$ and beyond the capabilities of computer search) so in some sense this proof strategy is guaranteed to work with enough effort.
• 2
$\begingroup$ I recently found a way to modify Terry's argument to show that it suffices to check speed vectors in $\mathbb Z^7$ with $l^2$ norm up to $56^6/\text{vol}_6$ (that is the reciprocal of the volume of a ball of radius 1/56 in $\mathbb R^6$). This bound is slightly less than 6 billion which still leaves far too many cases to check without some clever idea. $\endgroup$ – Anthony Quas Dec 7 '17 at 23:22
• $\begingroup$ @Anthony: That's quite encouraging! Certainly that is still too large for a brute force search, but I'd imagine that one could whittle the search space down substantially through elementary arguments (congruence considerations, etc) which was the spirit of the polymath proposal. It might be also worth trying to re-frame these argument in terms of Freiman isomorphism classes instead of bounding the size of the largest element. This might also yield a substantial reduction in the size of the search space. $\endgroup$ – Mark Lewko Dec 11 '17 at 1:17
The circulant Hadamard matrix conjecture states that for $n>4$ there does not exist a sequence $(a_1,\dots,a_n)$ of $\pm 1$'s that is orthogonal to every proper cyclic shift of itself. It has a similar flavor to the Erdős discrepancy problem that was the topic of Polymath5. Terry Tao says the following on his blog about the circulant Hadamard matrix conjecture: "One may have to wait for (or to encourage) a further advance in this area (which would be more or less an exact analogue of the situation with Polymath5 and the Erdos discrepancy problem)."
• 1
$\begingroup$ There was some recent investigation by Banica, Nechita and Schlenker of some analytical approaches to this conjecture - the authors were, if I read them correctly, keen to point out that they are merely exploring some techniques arxiv.org/abs/1212.3589 $\endgroup$ – Yemon Choi Oct 2 '15 at 1:30
• 1
$\begingroup$ (Some years ago I was toying with the idea of proposing the CHM conjecture for Polymath, but at the time I worried that it would just be seen as a curiosity) $\endgroup$ – Yemon Choi Oct 2 '15 at 1:37
• $\begingroup$ One can similarly ask about $n$ by $n$ Hankel matrices. Also as far as I know there are no current lower/upper bounds on the max determinant of circulant/Hankel $\pm1$ matrices so this is a possible side project which has the advantage of allowing incremental improvements. $\endgroup$ – Lembik Jan 4 '16 at 10:42
• $\begingroup$ Dear Richard, @RichardStanley, for a sequence $a=(a_1,a_2,\dots,a_n)$ of $\pm 1$ vectors, let $D(a)$ be the largest absolute value of the inner product of $a$ with a cyclic shift and let $D(n)$ be the minimum value of $D(a)$ over all $\pm 1$ vectors of length $n$. What is known about $D(n)$? Is it plausible that $D(n)$ tends to infinity with $n$? $\endgroup$ – Gil Kalai Apr 10 '18 at 11:12
Is the Matrix Multiplication Exponent $\omega$ too famous?
Recall that $\omega$ is the inf of all real numbers $k$ such that two $n \times n$ matrices can be multiplied in $O(n^k)$ steps. It is currently known that $2 \leq \omega < 2.3728639$.
Regarding lower bounds, there are several new ideas over the last few years from the field of Geometric Complexity Theory; see, e.g., Grochow's survey. Computer scientists aren't always too expert in the area of representation theory, so it could be a good chance for cross-area collaboration.
Regarding upper bounds, there have been several improvements over the last few years (Stothers, Vassilevska-Williams, and now Le Gall) pushing hard using the "traditional methods", a new paper on limits of the traditional methods, and the very interesting alternate approach of Cohn-Kleinberg-B.Szegedy-Umans based on group theory and arithmetic combinatorics.
• 2
$\begingroup$ I wanted to add a link to this paper here, which rules out certain approaches in the group theoretic framework: arxiv.org/abs/1605.06702 $\endgroup$ – Eric Naslund Aug 31 '17 at 15:25
One of Imre Ruzsa's problems [1], from 1971, asked for the slowest possible exponential growth rate of a mapping $f : \mathbb{N} \to \mathbb{Z}$ that is not a polynomial and yet shares with (integer) polynomials the congruence-preserving property $n - m \mid f(n) - f(m)$. Precisely, what can be said about the infimum of values $A$ for which there is such an $f$ having $|f(n)| < A^n$ for all $n \gg 0$?
Now, while a personal favorite of mine, this hardly qualifies for anything like a major problem. But it does have some interesting extensions, in addition to having itself the feature of a catchy and challenging problem on which, nevertheless, new progress appears within reach.
Here is an example indicating a modest improvement over the published literature on Ruzsa's problem. Using a variant of the construction by Noam Elkies and David Speyer of integer-valued polynomials with slow growth (which they gave solving this question of mine: Are there infinitely many integer-valued polynomials dominated by $1.9^n$ on all of $\mathbb{N}$?), Zannier's auxiliary construction from [3] can be modified to improve the value $A \approx 2.117$ that he gave in 1996 (still the best one in print) up to at least $A \approx 2.22$. This can certainly be improved further, and I do not know just how much the value of $A$ can be raised with this type of modification. (I did make some heuristic calculation suggesting that this addition to Zannier's method may never, by itself, raise the value to $2.316$ or beyond.) I mention this for indication that Ruzsa's problem is not completely blocked; it could be valuable to find alternative constructions or a wholly different approach, and also to formulate and explore some related problems, like the simple ones I sketch below.
To put Ruzsa's problem into perspective, note that $A \leq e$ is plain from the prime number theorem; one perhaps expects equality to hold. In the other direction, letting $S : j \mapsto j+1$ the shift operator on mappings $\mathbb{N} \to \mathbb{Z}$, the prime number theorem together with the congruence $(S-1)^p \equiv S^p - 1 \mod{p}$ and the characterization of polynomials by $(S-1)^n f(\underline{1}) = 0$ for all $n \gg 0$, imply the lower bound $A \geq e-1$. These remarks summarize the two observations made by Ruzsa in [1]. Perelli and Zannier proved [2] that $f$ is necessarily holonomic when $A < e$ (it satisfies a linear recursion with polynomial coefficients), placing the problem into the context of Fuchsian differential equations. Indeed, Zannier's idea in [3] to improve over the previous value of $A$ was to use a result of the Chudnovskys on the Grothendieck-Katz $p$-curvature conjecture for such differential equations.
Concretely, we have:
Problem 1. How much beyond $A = 2.22$ can the infimum on exponential growth rate be improved in Ruzsa's problem? (For instance, with the method I mention in the third paragraph above.)
Problem 2. For $F = \sum f(n)t^n \in \mathbb{Z}[[t]]$ and $p$ prime let $n_p(F) \in \mathbb{N} \cup \{\infty\}$ be the degree of $F \mod{p}$ as a rational function in $\mathbb{F}_p(t)$. In Ruzsa's problem we would have $n_p(F) = p$. Extending this, does the obviously best possible positivity condition $\liminf_n \frac{1}{n} ( - \log{|f(n)|} + \sum_{p : \, n_p(F) < n} \log{p} ) > 0$ force in fact the rationality $F \in \mathbb{Q}(t)$?
Note the immediate countability of the set of $F$ satisfying this assumption. The positivity condition here is similar to the ones in Bost and Chambert-Loir's work on arithmetic algebraization theorems in Arakelov theory and adelic potential theory, themselves having roots in the good old rationality criteria of Borel-Dwork and Polya-Bertrandias. Incidentally, the connection of such ideas with potential-theoretic ones by itself suggests some new twists to the original Ruzsa problem, the simplest being:
Problem 3. May, in the available results on Ruzsa's problem, the condition that $F = \sum f(n)t^n$ be holomorphic on a circular disk of radius $> 1/A$ be extended to a condition of meromorphy on a simply connected domain $\Omega \ni 0$ having conformal mapping radius $\rho(\Omega,0) > 1/A$?
There are (easy) weaker sufficient conditions for rationality that modify the sum under the positivity condition in Problem 2 by $\xi \sum_{p: \, n_p(F) < \kappa n} \log{p}$ for appropriate constants $\xi, \kappa < 1$. An optimal choice of such available constants yields the value $\exp(3-2\sqrt{2})$ in the following problem of Zannier from [4], intermediate in generality between Problems 1 and 2:
Problem 4. What is the infimum of values $A$ such that any integer sequence having $|f(n)| \ll A^n$ and satisfying for almost all $p$ a mod $p$ constant coefficients linear recurrence of size $\leq p + O(1)$, satisfies in fact a constant coefficient linear recurrence over $\mathbb{Z}$? Clearly, $A \leq e$, which could well be an equality. Can Zannier's lower bound $A \geq \exp(3 - 2\sqrt{2})$ be improved?
Again, I am not entirely sure this is the kind of topic that would make a suitable focal point for the polymath type of project. It might be not well known enough, or broad enough, or promising enough. Either way, it is just a suggestion, and I thought I would mention here these problems, which I find attractive -- in view of the intrinsic challenge of Ruzsa's original problem (still open since 1971), as well as of the variety of broader extensions it might suggest.
[1] I. Ruzsa: On congruence preserving functions, Mat. Lapok 22 (1971), pp. 125--134 (In Hungarian).
[2] A. Perelli, U. Zannier: On recurrent mod $p$ sequences, Crelle 348 (1984), pp. 135--146.
[3] U. Zannier: On periodic mod $p$ sequences and $G$-functions (On a problem of Ruzsa), Manuscripta Math. 90 (1996), pp. 391--402.
[4] U. Zannier: A note on recurrent mod $p$ sequences, Acta Arithmetica 41 (1982), pp. 277--280.
• $\begingroup$ Are these all arithmetic combinatorics? $\endgroup$ – user76479 Oct 1 '15 at 5:15
• $\begingroup$ @Arul: This is not really combinatorial, unless you are giving combinatorics a rather broad meaning. It rather fits into the broad label of "mathematics organized around the product formula" (taking it close to diophantine approximations, at least by methodology) - but then it is just a problem. Anyway, if this should be put into any sort of broader perspective, it is about how narrowly an algebraic structure is pinned down by congruence conditions. Obviously, the positivity condition in Problem 2 pins the mapping $f$ down to a countable set; what is the structure of this countable set? $\endgroup$ – Vesselin Dimitrov Oct 1 '15 at 5:47
• $\begingroup$ What is a good text for these areas? these objects do not look much far from application in CS (infact Rusza's name is in Arithmetic Combinatorics) $\endgroup$ – user76479 Oct 1 '15 at 5:49
• 1
$\begingroup$ @Arul: A good text? Ruzsa's problem itself is not nearly so famous as to have a vast literature of its own. I gave some references that considered it; in addition to these I should add Gilles Christol's paper Globally bounded solutions of differential equations. As for the mathematics behind the arithmetic algebraization theorems and the arithmetic study of linear differential equations, this is a vast subject to which Chambert-Loir's Bourbaki expose Arithmetic algebraization theorems... and Bost and Chambert-Loir's paper Analytic curves in algebraic varieties... are excellent guides. $\endgroup$ – Vesselin Dimitrov Oct 1 '15 at 6:20
• 1
$\begingroup$ Tangentially "Arithmetic Combinatorics" is the name of the relevant MSC subject class 11B30. Some prefer this name as "additive" does not quite capture things like sum-product problems and is arguably not so fitting for non-commutative settings. $\endgroup$ – user9072 Nov 4 '15 at 16:35
I do not know if the problem has been posed or solved before, but I would like to launch a Polymath project about proving that $$ \sum_{n\geq 1}\frac{\sin(2^n)}{n} $$ is a convergent series. A quite detailed description of my attempts can be found on MSE.
• 7
$\begingroup$ This should be very difficult. Do we even know, for instance, that the powers of $2$ are dense on $\mathbb{R} / 2 \pi \mathbb{Z}$? $\endgroup$ – Vesselin Dimitrov Oct 19 '16 at 23:06
• 2
$\begingroup$ @VesselinDimitrov: not according to my knowledge. That depends on the distribution of the $0,1$ digits in the binary representation of $\pi$ or $\frac{1}{\pi}$. My wild guess is that the BBP formula may provide a way to prove it. $\endgroup$ – Jack D'Aurizio Oct 19 '16 at 23:08
• 2
$\begingroup$ Right, and the problem is, little is known about the distribution of the binary digits of $\pi$. Needless to say there do exist divergent values of $g(\xi) = \sum_n \sin(2^n\xi) / n$ (while the series is convergent for Lebesgue almost all $\xi$), and so a solution to your problem would have to use special properties of the digits of $\pi$. One of course expects $\pi$ to be a normal number, but extremely little is 'known' in this direction. $\endgroup$ – Vesselin Dimitrov Oct 19 '16 at 23:39
• 1
$\begingroup$ Is this equivalent to convergence of $\displaystyle\frac{e^{2i}}{1}+\displaystyle\frac{e^{4i}}{2}+\displaystyle\frac{e^{8i}}{3}+\displaystyle\frac{e^{16i}}{4}+\cdots$? $\endgroup$ – samerivertwice Sep 20 '17 at 11:50
Update: February 23, 2017. Launched on polymathblog.
Rota's Basis Conjecture. Let $B_1, \ldots, B_n$ be $n$ bases of an $n$-dimensional vector space $V$ (not necessarily distinct or disjoint). Then there exists an $n\times n$ grid of vectors $(v_{ij})$ such that
1. the $n$ vectors in row $i$ are the members of the ith basis $B_i$ (in some order), and
2. in each column of the matrix, the $n$ vectors in that column form a basis of $V$.
Informally, the claim is that we can always find some ordering $(v_{i1},v_{i2},\ldots,v_{in})$ of the $n$ vectors in $B_i$ in such a way that the transversals $(v_{1j},v_{2j},...,v_{nj})$ are all simultaneously bases.
Here are some reasons why I think this is a good polymath project.
1. The conjecture has been open since 1989 and a number of people have made serious attempts to prove it, so it's a significant open problem. It is intrinsically appealing but it also has connections to Rota's bracket-theoretic approach to representation theory, so a positive solution might lead to a deepening of that theory. Also it seems to lie just beyond the boundary of what we understand about matroids and so could expand our knowledge in that direction too.
2. There are multiple partial results coming from different directions, as I'll describe in a moment. The time seems ripe for a group of people to look at the partial results together and see if the whole can be made to be greater than the sum of the parts.
3. The problem feels to me like it falls into the category of problems that have too little structure for a purely deterministic construction but too much structure for a purely random construction. A number of difficult problems of this type have fallen in recent years so the time may be ripe for another such.
Now let me say a bit about the aforementioned "multiple partial results."
1. Playing around a bit, one gets the sense that the complicated way in which circuits (i.e., minimal dependent sets), especially small circuits, interact is one of the key obstacles. Geelen and Humphries (Rota's basis conjecture for paving matroids, SIAM J. Discrete Math. 20 (2006), 1042–1045) have solved the case where all the circuits are large (of size $n$ or $n+1$). Perhaps one can construct a proof by induction on circuit size. I don't think too many people have looked at this.
2. An approach that I've explored is to understand what obstructions arise when, instead of a square matrix, one considers a rectangular matrix that has more rows than columns. I think that there is some chance that there are only a limited number of such obstructions; if these could be characterized then perhaps Rota's basis conjecture would follow. My first attempt in this direction turned out to be too optimistic (see Harvey, Kiraly, and Lau, On disjoint common bases in two matroids, SIAM J. Discrete Math. 25 (2011), 1792–1803) but I still think that there is promise here.
3. The approach that has led (by some measure) to the strongest partial results has been to reduce Rota's basis conjecture (for even dimension and characteristic zero) to the Alon–Tarsi conjecture on even and odd Latin squares, which was proved for $n=p+1$ ($p$ an odd prime) by Drisko in 1997. There have been some recent advances in this direction as well, e.g., Glynn, The conjectures of Alon-Tarsi and Rota in dimension prime minus one, SIAM J. Discrete Math. 24 (2010), 394–399, and Alpoge, Square-root cancellation for the signs of Latin squares, arXiv:1412.7574, and Bollen and Draisma, An online version of Rota's basis conjecture, J. Algebraic Combin. 41 (2015), 1001–1012.
4. Geelen and Webb (On Rota's basis conjecture, SIAM J. Discrete Math. 21 (2007), 802–804) have shown that we can get the first $O(\sqrt{n})$ columns to be bases.
There are some other partial results on the conjecture but this should do for now. All the papers I've just cited use very different ideas and it is tempting to speculate that combining them might give us the extra oomph we need to prove the full conjecture. Or, perhaps one of the ideas just needs an additional push.
I think finding combinatorial models for the Kronecker coefficients, or the multiplicative structure constants for Schubert polynomials would make good polymath projects.
These are quite famous problems in the field of algebraic cominatorics, and would immensely give better insight. Furthermore, the problems are quite accessible, it boils down to fit some combinatorial model to some known (but tricky to compute) data, meaning that even a bright high-school student can give it a try.
Both these problems has the Littlewood-Richardson coefficients as special cases, for which there are plenty of combinatorial models, so a good start would be to collect these, and see if there is some way to generalize these.
Both problems have known models for other sub-cases, so one can imagine that a polymath project could study natural sub-families. In the case of Schubert structure constants (indexed by three permutations), we know the answer for vexillary permutations.
Perhaps it is possible to find models for other natural combinations of permutations.
Finally, it might even be possible to do some "bruteforce" approach, by some kind of machine-learning. I have not heard this being used before, but it is not totally impossible that Schubert structure constants are given by lattice points in certain nice polytopes (since known special cases are), so it might be possible to try to find polytopes to the data.
• 1
$\begingroup$ I have a rather big issue with this "proposal" for Kron coeff. First, it's been a major open problem for a long time. It makes sense to have a project if you have a reasonable even if very weak idea how to start. You don't, or at least it's not transparent from the answer what is it. Second, I see no definition of a "combinatorial model". Would anything in #P work? Finally, I see no reason why the answer should be positive under any definition. My issue here - after some long thinking I (still) see no framework to disproof. Cf. bit.ly/2ceaDim $\endgroup$ – Igor Pak Aug 26 '16 at 12:14
Yesterday Aubrey D.N.J. de Grey posted to the arXiv a new preprint that announces the first improvement since 1961 on the lower bound on the Hadwiger-Nelson problem (chromatic number of the plane):
Aubrey D.N.J. de Grey:
The chromatic number of the plane is at least 5.
The abstract reads:
We present a family of finite unit-distance graphs in the plane
that are not 4-colourable, thereby improving the lower bound of
the Hadwiger-Nelson problem. The smallest such graph that we
have so far discovered has 1567 vertices.
(Note: 1567 was later corrected to 1585.)
Proposed Polymath problem:
Reduce the number of vertices (currently $1585$) of the smallest known unit-distance graph in the plane that is not 4-colorable.
• 3
$\begingroup$ This is excellent news! To put the result in perspective, as far as I know the best current bounds, due to Pritikin in 1998, are that any unit-distance graph in the plane with at most 6197 vertices is 6-colorable, and any such graph with at most 12 vertices is 4-colorable. $\endgroup$ – Andrés E. Caicedo Apr 10 '18 at 3:29
• 5
$\begingroup$ Dear Noam, no no no no no, please don't remove it. $\endgroup$ – Gil Kalai Apr 10 '18 at 14:26
• 5
$\begingroup$ OK, I won't won't won't won't won't remove it :-) $\endgroup$ – Noam D. Elkies Apr 11 '18 at 0:34
• 4
$\begingroup$ It seems that the current status is that the 1567-point graph is 4-colorable (and there was a bug in de Grey's code), but it was obtained by removing a few too many vertices from a 1585-point graph that's not 4-colorable (and this has now been indepndently checked by a SAT solver). So we still have a new lower bound of 5 on the chromatic number of the plane; but I need to edit my post because the target is no longer 1567. In any case the point of the Polymath project would be to find bigger tweaks that change the vertex count by rather more than 18. $\endgroup$ – Noam D. Elkies Apr 11 '18 at 0:37
• 6
$\begingroup$ To avoid ambiguity (although perhaps not needed by ordinary English usage) I was careful to have an odd number (five) of "no"s. $\endgroup$ – Gil Kalai Apr 11 '18 at 21:03
The Moser Worm problem and Bellman's Lost in a forest problem.
The Moser Worm problem is the task of finding a (convex) cover of minimum area in the plane which contains rotated-translated copy of any curve of length one (a worm) as a subset.
Bellman's Lost in a forest problem is to find the shortest path which ensures an escape from a forest of known shape and size.
The problems are directly related in that the Moser worm problem is equivalent to looking for the shape of a forest of given area which has the longest escape path and any solution to Bellman's problem provides an upper bound for the Moser worm problem.
Although these problems are famous I think that this type of geometry problems is often neglected and can be approached with the aid of computational searches to provide new clues.
• $\begingroup$ Sounds interesting. The Wikipedia article for the Worm problem lists known upper and lower bounds for the area as 0.260437 and 0.232239, respectively. Do you hope for tighter bounds, an explicit solution for the area or even the shape? $\endgroup$ – Dirk Oct 1 '15 at 8:18
• $\begingroup$ I think that simply trying to do better with those bounds is not so easy. it would interesting to start with the lost in a forest problem. This was recently solved for the equilateral triangle. Can it be solved for all triangles? What triangle gives the best bound for Moser's problem? What about other simple shapes? Also are there any general statements that might be made about the shape of paths when the forest is a polygon? Will it always be a polyline? etc. $\endgroup$ – Philip Gibbs Oct 1 '15 at 9:44
• 1
$\begingroup$ For a convex cover, the lower bound would be 0.270911861. The current lower bound is proved by trying to estimate the minimal area of a convex shape containing a segment, a triangle and a rectangle. We can try to add more shapes to tighten the lower bound, but I am not sure if it will be analytically or computationally feasible. $\endgroup$ – Tirasan Khandhawit Oct 2 '15 at 9:03
• 3
$\begingroup$ One approach to this kind of problem is to first try to compute the answer without any attempt to prove the result, so monte carlo methods are fine. The hope is that when you see the answer you can formulate some conjectures and try to prove them. The computation is then just scaffolding that might be removed from the final analysis. This requires collaboration between programmers and problem solvers. $\endgroup$ – Philip Gibbs Oct 2 '15 at 12:01
• $\begingroup$ This strikes me as a reformulation of the traveling salesman problem. $\endgroup$ – user102126 Jul 6 '18 at 7:56
Real world applications of large cardinals
The goal of this proposed project is to use large cardinals to prove a result in an applied area or at least a “down-to-Earth” area of mathematics such that the large cardinal hypotheses cannot be removed.
Large cardinals are able to prove results about finite and countable structures which cannot be proven otherwise. For example, all large cardinals prove the purely combinatorial statement $\textrm{Con}(\mathrm{ZFC})$ and even $\textrm{Con}(\mathrm{ZFC}+\mathbf{S})$ whenever $\mathbf{S}$ is a weaker large cardinal axiom. One should therefore expect for large cardinals to also prove finitistic purely combinatorial statements which are independent of ZFC but which are of interest to mathematicians such as finite group theorists or finite combinatorialists. Unfortunately, large cardinals have not yet found their way into these down-to-Earth subjects.
Rank-into-rank embeddings
At this point in time, the large cardinals around the rank-into-rank level seem to have the most potential for real-world applications due to the intricate algebraic structure of rank-into-rank embeddings. We shall therefore limit the scope of this project to algebraic structure of the large cardinals around the rank-into-rank level.
Let $\lambda$ be a cardinal and let $\mathcal{E}_{\lambda}$ denote the set of all elementary embeddings from $V_{\lambda}$ to $V_{\lambda}$. The elementary embeddings in $\mathcal{E}_{\lambda}$ are known as rank-into-rank embeddings. If there is a non-trivial elementary embedding in $j\in\mathcal{E}_{\lambda}$, then $\lambda$ is an extremely large strong limit cardinal of countable cofinality. Define an operation $*$ on $\mathcal{E}_{\lambda}$ by letting $j*k=\bigcup_{\alpha<\lambda}j(k|_{V_{\alpha}})$.
$\mathbf{Theorem}$ (Laver)
1. The algebra $(\mathcal{E}_{\lambda},*)$ satisfies the left-distributivity identity $j*(k*l)=(j*k)*(j*l)$.
2. If $j\in\mathcal{E}_{\lambda}$ is a non-trivial elementary embedding, then $j$ freely generates a sub-left-distributive algebra of $\mathcal{E}_{\lambda}$.
Rank-into-rank embeddings have also been used to prove purely algebraic results about left-distributive algebras.
$\mathbf{Theorem}$ (Van Name 2015 (Laver 1990's for one generator)) If for all $n\in\omega$ there exists an $n$-huge cardinal, then the free left-distributive algebra on an arbitrary number of generators is isomorphic to a subalgebra of an infinite product of finite left-distributive algebras.
It is currently open as to whether the above result can be proven without the large cardinal assumptions. While the above result applies large cardinals to finite objects, it is hard to call this result “down to earth”; even though we know that the free left-distributive algebras embed into an inverse limit $\varprojlim X_{n}$ of finite algebras, we know that the individual algebras $X_{n}$ converge to the free left-distributive algebras very slowly (slower than the inverse of any monotone primitive recursive function). Furthermore, I would like to see large cardinals applied to finite or countable structures beyond just left-distributive algebras. It seems like in the near future very large cardinals would prove theorems in cryptography, low-dimensional topology, or possibly even group theory which ZFC cannot prove.
Large cardinals in cryptography?
Any type of computable algebraic structure has potential uses in cryptography, and self-distributive algebras have already been used to construct cryptosystems. For example, Dehornoy has shown that self-distributive algebras may be used as platforms for authentication schemes. However, no left-distributive algebra has been shown to be a secure platform for Dehornoy's authentication scheme. Perhaps large cardinals may provide self-distributive algebras which are secure under Dehornoy's authentication scheme. On a different note, the action of braid groups on self-distributive structures has been shown to be able to obfuscate universal reversible circuits in this paper. I therefore see the possibility of large cardinals proving results related to cryptography which cannot be proven in ZFC.
Large cardinals in low-dimensional topology?
In this paper, Dehornoy outlines a future research program in which the Laver tables may be applied to low-dimensional topology. I conjecture that along these lines, large cardinals may be used to prove results in low-dimensional topology which are independent of ZFC.
Why polymath?
Since this proposed project requires the collaboration between set theorists and non-logicians, and set theorists usually do not collaborate with non-logicians (such as algebraic topologists or cryptographers), it seems like a venue such as Polymath would be a good method to promote collaboration between these two very different sorts of mathematicians. Furthermore, since these sorts of self-distributive algebras have not yet been deeply investigated, any mathematician would be able to make contributions to this project. I also expect this project to be largely computational, so one could contribute to this project simply by writing computer programs or observing computed data.
Various areas of mathematics would benefit from this project (if it is successful) since large cardinals will allow people to prove more theorems in these areas of mathematics than they are able to prove in ZFC.
• 2
$\begingroup$ I have been considering making the goal of this project to construct a public key cryptosystems from the algebras of elementary embeddings and make the cryptosystem as secure and efficient as possible. Though, it is too early to discuss the specifics of this project. $\endgroup$ – Joseph Van Name Feb 24 '17 at 4:01
• $\begingroup$ So it looks like the $n$-ary Laver tables could be used as platform for this key exchange arxiv.org/pdf/1305.4401.pdf. Furthermore, since the $n$-ary Laver tables can be endowed with a composition operation, the Ko-Lee key exchange applies to the $n$-ary Laver tables as well. This will be indeed the first and only practical application of set theory. If $n$-ary Laver table based cryptosystems are secure against classical computers, then it seems like they will continue to remain secure against quantum computers. $\endgroup$ – Joseph Van Name Apr 7 '17 at 1:49
Here is a simple-to-state, but notoriously difficult open question from algorithmics, which I think might not have received yet the attention of the larger mathematics community.
The Greedy Superstring Conjecture:
Consider a set of $n$ strings $s_1, \dots, s_n$ over a finite alphabet $\Sigma$. Assume that none of the strings is a substring of another. We want to find a shortest string $s$ that contains all $s_1, \dots, s_n$ as substrings.
Here's an "obvious" heuristic: find the two strings $s_i, s_j$ with the largest overlap, and replace $s_i$ and $s_j$ with the string obtained by overlapping $s_i$ and $s_j$ as much as possible. After $n-1$ steps we obtain a string that is the superstring of all $s_1, \dots, s_n$. The conjecture says that this solution is at most twice as long as the optimum.
The problem is described (among other places) in Vazirani's book Approximation Algorithms, Chapter 2.3.
• 1
$\begingroup$ What happens if, during the running of this algorithm, the "none is a substring of another" condition is violated by $s_{i1},...,s_{ik}, b_{n-k+1}$, where the $b$ string is the newly formed big string? Or is that the point? Gerhard "Sometimes Not Quick On Uptake" Paseman, 2015.10.06 $\endgroup$ – Gerhard Paseman Oct 6 '15 at 17:08
• 2
$\begingroup$ That can't really happen during the execution (except at the beginning). Suppose for contradiction that this happens first time when we merge $s_i$ and $s_j$ to obtain $b$, and now $s_k$ is contained in $b$. Now either $s_k$ was already contained in $s_i$ or $s_j$ (contradicting that it happened the first time), or the overlap of $s_k$ with $s_i$ is larger than the overlap between $s_i$ and $s_j$, contradicting that we executed the correct step. (my previous comment - now deleted - where I wrote that this can happen was wrong) $\endgroup$ – László Kozma Oct 7 '15 at 9:50
There is a problem that links both geometry and number theory, called Rational Simplex Conjecture, formulated by Cheeger and Simons. One may regard it more as a question, rather than a conjecture, that asks the following: if you have a spherical tetrahedron with dihedral angles rationally commensurable with $\pi$, will its (spherical) volume be rationally commensurable with $\pi^2$? (The volume of the sphere $\mathbb{S}^3$ in its metric of constant sectional curvature $+1$ is $2\pi^2$, and finite reflection groups give examples of "rational" simplices with "rational" volumes). This problem is discussed in a book by J. Dupont (and several papers by J. Dupont and and C.-H. Sah) on scissors congruences, and also has relations to cone zeta-functions, counting lattice points in polytopes, etc observed by a number of authors (e.g. Robins et all).
Another problem that is even easier to formulate (and which is known since a long time) is to determine all possible tilings of the Euclidean plane by convex pentagons. There have been many attempts to find such pentagonal tilings, one is quite recent: by now, there are 15 convex pentagons known to tile the plane. It would be interesting to see any nice mathematical theory (except making educated guesses or computer brute force) that stands behind the exact number of pentagonal tilings of the plane (there are a few known, but there is no proof the list is complete).
I don't know if any of these problems seems interesting enough (and I'm not even in position to write a full proposal, so you may regard this as a lengthy comment), and if not - I beg you pardon for your time wasted.
Hoping it is not too famous an open problem, I would suggest trying to (dis)prove that Euler's constant $\gamma$, defined as $\displaystyle{\lim_{n\to\infty}H_{n}-\log n}$ where $H_{n}$ is the $n$-th harmonic number, is irrational. A plausibly interesting approach may rely on Hankel determinants, that were successfully used by Yann Bugeaud et al to obtain new results about irrationality exponents in http://arxiv.org/abs/1503.02797.
• 13
$\begingroup$ What problem could be more famous than this? It was the dream of many great number theorists. $\endgroup$ – Vesselin Dimitrov Sep 30 '15 at 16:53
• 2
$\begingroup$ This is indeed a very famous problem. Probably aiming to show that $\zeta (5)$ is irrational, or better perhaps improving quantitatively the results by Ball and Rivoal regarding values of zeta functions at odd integers would be a good project. It is not impossible that in the sequence $a_n$ with , $a_1=$Aperi, $a_2=$ Ball-Rivoal, ... some later terms will have relevance to Euler's constant. $\endgroup$ – Gil Kalai Sep 30 '15 at 19:03
• $\begingroup$ I don't know whether Gil allows several answers from the same person, but maybe finding the best possible upper bound for the quantity $\beta$ defined as $\inf\{C\mid p_{n+1}-p_{n}\ll\log^{C} p_{n}\}$ assuming it's finite could me more tractable. $\endgroup$ – Sylvain JULIEN Oct 26 '15 at 16:15
Here is a personal favorite of mine, considered at this question. Will Orrick has a website with some data on the problem, which I call the "determinant spectrum" problem (range of the determinant function on the finite set of order $n$ 0-1 matrices) , and we hope it will yield information on Hadamard's maximum determinant problem.
Much of the results I know are inspired by computer analysis, and I think a particular goal would not only be accessible but make an advance toward a combinatorial understanding of binary matrices (as opposed to a probabilistic or analytic understanding). The goal I have in mind is to find a short and uniform description of 0-1 matrices whose ADVs (absolute determinant values) span all integers in an interval from below $(1.6)^n$ to $c(\sqrt{n})^n$ for some small constant $c$ and $n$ a sufficiently large integer that gives the rank of the matrix. (The easy case of $[0, (1.6)^n]$ has been handled, initiated by computer investigation by Roger House.) Even if one only gets up to, say, $O((\sqrt{n}/\log n)^n)$, that would be a significant advance. Orrick observes that $c$ is near $1/2$ for small $n$.
Gerhard "Of Course, Modesty Forbids Me..." Paseman, 2015.09.30
• $\begingroup$ Granted, I've moved away from it for now, but I may make it mine again, violating number (3). Sorry, Gil. Gerhard "Is Willing To Share Project" Paseman, 2015.09.30 $\endgroup$ – Gerhard Paseman Sep 30 '15 at 16:28
• $\begingroup$ $c(\sqrt{n})^n$ should be more like $c(\sqrt{n}/2)^n$, as I confused values for determinants of 0-1 matrices with values of their 1,-1 binary counterparts. In any case, I would like seeing even $(\log n)^n$ achieved with a uniform description. At present, I don't know how to make a short and uniform description do better than exponential growth. Gerhard "Just A Difference Of Two" Paseman, 2015.09.30 $\endgroup$ – Gerhard Paseman Oct 1 '15 at 3:42
Update (Aug 26, 2016), see Ofir's comment to this posting: Ofir Ofir Gorodetsky and Ron Peled have proved the identity!
Update 2 (Sept 27, 2016) In Guo-Niu HAN's 2000 paper "Generalisation de l’identite de Scott sur les permanents," Han proved a more general formula. (See detailed comment below).
The following might be a right-level project for a polymath project.
Keith R. Motes, Jonathan P. Olson, Evan J. Rabeaux, Jonathan P. Dowling, S. Jay Olson, Peter P. Rohde proposed in the paper
"Linear Optical Quantum Metrology with Single Photons: Exploiting Spontaneously Generated Entanglement to Beat the Shot-Noise Limit"
An amazing formula for the permanent of the matrix representing a sort of the discrete Fourier transform. The formula was reached at by evaluating the cases $n \le 6$ and was checked symbolically for up to $n\le 16$ or so and numerically much beyond. So it must be true! No proofs is known.
Here is the formula: $$\operatorname{Per}(\hat U^{(n)})=\frac{1}{n^{n-1}}\prod_{j=1}^{n-1}\big[j e^{in\varphi}+n-j\Big],$$
$\hat U ^{(n)}$ is a certain version of the discrete Fourier transform defined as follows: $$\hat U_{j,k}^{(n)}=\dfrac{1-e^{in\varphi}}{n\big(e^{\frac{2i\pi(j-k)}{n}}-e^{i\varphi}\big)}$$ (For the ordinary matrix of the discrete Fourier transform people did look a little at the permanent but it's not so beautiful.)
Of course, it would be nice to prove it. I talked about it a summer ago with Ron Adin and Oron Propp (an undergraduate from MIT) and we had a few ideas but they did not work. I popularized the problem a little among experts in enumerative combinatorics but I don't know if people are working on it.
• 11
$\begingroup$ Dear Gil, Ron Peled and I were able to prove this nice formula. The main tool is Borchardt's identity, which reduces the permanent calculation to the evaluation of two determinants, which in our case are circulant. Here's a link to the draft of the short proof: dropbox.com/s/p4hdl2qb7pgppn7/identity.pdf?dl=0 $\endgroup$ – Ofir Gorodetsky Aug 26 '16 at 6:43
• 4
$\begingroup$ Ron Adin pointed out to a 2000 paper by Guo-Niu Han where he proved formula of a more general nature regarding permanents. www-irma.u-strasbg.fr/~guoniu/papers/p25scott.pdf . (Indeed Ofir Gorodetsky confirmed that it includes the formula we asked for after simple manipulations). Han's proof also rely on Borchardt's identity (that's how Ron Adin had found it). The proof by Ofir Gorodetsky and Ron Peled (being for the special case that it is) proceeds more directly to the final answer. $\endgroup$ – Gil Kalai Sep 27 '16 at 10:08
Here is a (known) open question that I heard from Peter Sarnak.
Show that $2^n+5$ is composite for almost all positive integers $n$. (Namely, for sets of integers of density 1.)
Since $\prod\limits_p \left(1-\frac{1}{p-1}\right)=0\,$ it looks like proving that
1. $2^n+5$ divides a primes $p$ for a fraction of $1/(p-1)$ integers or so (on average), and
2. these probabilities should be rather independent
should suffice. But alas, both of these are very problematic.
On the other hand, this does not look like a hopeless question, and perhaps requires interesting and not too hard techniques. I suppose I'd enjoy watching such a project. The fraction of "good" $n$'s can be shown to be very close to $1$ by some computer experimentation which may also reveal something.
• 2
$\begingroup$ Thanks, V. for the good (but short lived) comments. Since this is not in my area I am not sure at all it is a good question. I realize it is very difficult but my uneducated hunch is that it is not hopeless and potentially fruitful. $\endgroup$ – Gil Kalai Jan 31 '16 at 12:13
• 1
$\begingroup$ It is a very good problem but first we need to solve the simpler one that the set of primes dividing some member $2^n+5$ is not too sparse. GRH implies a positive density of such $p$ (indeed, $2$ should be a primitive root for a positive density of primes) - this will take care of point (1). But if it happened that $\sum 1/\mathrm{ord}_p^{\times}{2} = \infty$ over those ("good") primes then (2) would actually predict a positive density of prime values. So we need to eliminate such a scenario, and this by itself seems like a very difficult problem. That said, we could try to work under GRH. $\endgroup$ – Vesselin Dimitrov Jan 31 '16 at 16:41
• 1
$\begingroup$ The number of "good" primes up to $X$ (i.e., the prime divisors of the sequence) is easily proved to be at least $\gg \log{X}$. I know of no improvement over this basic bound (which works for general linear recurrences, the obvious exceptions set aside). This is in marked contrast to the sequence $2^n + 1$, for which Hasse proved the density $17/24$ for the prime divisors. This is because the set of prime divisors in this case can be expressed in terms of splitting primes for various Kummer fields, to which Chebotarev can be applied. Similarly for $a^n+b^n$ and the Lucas sequence. $\endgroup$ – Vesselin Dimitrov Jan 31 '16 at 16:47
• $\begingroup$ (Sorry, I meant to write "$\sum 1/\mathrm{ord}_p^{\times}{2} < \infty$" in the first comment above.) $\endgroup$ – Vesselin Dimitrov Jan 31 '16 at 16:50
• 1
$\begingroup$ We could also, instead of fixing the form $2^n+2^2+1$, parametrize the odd numbers $2^{n_1} + \cdots + 2^{n_k}+1$ composed of up to $k+1$ binary digits by $k$-tuples $(n_1,\ldots,n_k)$ (ordered by $\max{n_i}$ and then lexicographically), and ask for which $k$ it could be proved that a full density of those numbers are composite. For $k = 1$ this is obvious, while at least for $k$ large enough ($\geq 3$ it seems, possibly also for $k = 2$) the previous difficulty with (1) is not hard to resolve. $\endgroup$ – Vesselin Dimitrov Jan 31 '16 at 23:15
A conjecture that can be stated in so simple terms that it is hard to classify, is Frankl's Union-Closed Sets Conjecture. It would be fantastic to see this solved.
• 1
$\begingroup$ One possible finite set to evaluate: Each prime in the product is found in half of the square-free divisors of the product: Table[GCD[Divisors[2*3*5*7], n], {n, {2, 3, 5, 7}}] // MatrixForm $\left( \begin{array}{cccccccccccccccc} 1 & 2 & 1 & 1 & 2 & 1 & 2 & 2 & 1 & 1 & 2 & 1 & 2 & 2 & 1 & 2 \\ 1 & 1 & 3 & 1 & 3 & 1 & 1 & 1 & 3 & 3 & 3 & 1 & 3 & 1 & 3 & 3 \\ 1 & 1 & 1 & 5 & 1 & 1 & 5 & 1 & 5 & 1 & 5 & 5 & 1 & 5 & 5 & 5 \\ 1 & 1 & 1 & 1 & 1 & 7 & 1 & 7 & 1 & 7 & 1 & 7 & 7 & 7 & 7 & 7 \\ \end{array} \right)$ $\endgroup$ – Fred Kline Jan 5 '16 at 0:01
• $\begingroup$ This problem is given a [purported - TT] proof. arxiv.org/pdf/1507.01270v6.pdf $\endgroup$ – Takahiro Waki Jun 13 '16 at 20:13
• 1
$\begingroup$ This might land in the "too-famous" category. $\endgroup$ – Todd Trimble Jan 3 '17 at 2:24
The two biggest open conjectures in the intersection of representation theory (of finite dimensional algebras) and homological algebra are the Nakayama conjecture (see http://www.math.uni-bonn.de/people/schroer/fd-problems-files/FD-NakayamaConj.pdf) and the finitistic dimension conjecture ( see http://www.math.uni-bonn.de/people/schroer/fd-problems-files/FD-FinitisticDimConj.pdf). I have a plan to test those conjectures: Namely a weaker conjecture is the following: Given a nonselfinjective finite dimensional algebra $A$ over a field K, then $Ext^{i}(D(A),A) \neq 0$ for some $i \geq 1$. Here D(A)=Hom_K(A,K). This has never really been tested for large classes of algebras and for algebraically closed fields, it is enough to test it for quiver algebras (see for example https://www-fourier.ujf-grenoble.fr/~mbrion/notes_quivers_rev.pdf for an introduction to such algebras). For such algebras the problem can be stated in purely graph theoretical/ linear algebraic terms and is thus understandable to a wider audience. To begin, one could start with local algebras. This means quiver algebras with just one point. It is also a win win situation: One might really find a counterexample (this would be big) or at least one could gain good evidence for the conjectures (no big evidence for the homological conjectures seems to exist yet). On the other hand, in the local case the world record for the number $\inf \{ i \geq 1 | Ext^{i}(D(A),A) \neq 0 \}$ seems to be only 2 and also just because of that it would be interesting to study the problem. (one can also let a computer search for examples, this is related to this question Algorithm for finding quiver algebras , where the problem is to find quick programs to find all admissible ideals)
Bit of background:
After asking a question on MSE I see that there are a number of open questions around polynomials in $\mathbb{Z}[x]$ whose roots, and whose derivative's roots, are all distinct integers.
In particular, there seem to be examples known up till degree six, with the sextic case having been resolved in 2015, yet nothing known for polynomials of greater degree. (Of course, if such a polynomial can be found, then a natural follow-up would be whether such polynomials exist of all degrees, and, if not, what the minimal counterexample would be.)
For more information, see (e.g.) the arXiv paper here (pdf) as well as the aforelinked.
Appropriateness for polymath:
I think this is a not-too-well-known problem that still has a reasonable literature on it (the linked paper above contains a number of references) which would be amenable to computational attacks (especially if answerable in the affirmative for degree seven and above). There are also sub-problems that can be explored around specific families of functions (e.g., those that satisfy this criterion and have degree five) as well as natural generalizations (e.g., explorations of the above question for not just a function and its first derivative, but for a function and all of its derivatives).
Covering Arrays are combinatorial objects that have applications in Computer Science among other fields, specifically in software and hardware testing.
The definition is a 4-tuple $CA(N;t,k,v)$, where it is an $N\times k$ array, with each entry to be one of $v$ possible symbols, and for every $t$ columns chosen, all ordered $v^t$ $t$-tuples appear at least once. We define $CAN(t, k, v)$ to be the minimal $N$ such that a $CA(N;t,k,v)$ exists.
Only in the case for $v=t=2$ is known for all $k$, shown by Kleitman and Spencer, and only asymptotics are known for other values of $t, v$. The true answer for specific parameter situations are known, but only for small $t, v$.
Charlie Colbourn's tables provide the best known values of $CAN(t, k, v)$ for various values. However, only some heuristics are known via optimization and sub-optimal constructions.
There is a vast literature on covering array techniques; it would be a great success to be able to gain more of an understanding as to the behavior and structure of covering arrays. Some questions that are interesting:
• Covering perfect hash families (CPHFs) are compact representations of covering arrays, but only when $v$ is a prime power. What nontrivial direct constructions exist for CPHFs? What about a related object when $v$ is not a prime power?
• What if we insist that all $t$-tuples appear a given number of times $\lambda \ge 1$? Some lower and upper bounds are known, but they are not tight.
• How does $CAN(t,k+c,v)$ relate to $CAN(t,k,v)$ for a constant $c$? Some bounds are known, and recent improvements have been found, but only in specific values of $t, v$.
Limit Cycle theory and Hilbert 16th problem:
A longstanding problem in the theory of ordinary differential equations and dynamical systems is the problem of the number of limit cycles of a polynomial vector field. For mathematical development around this historica;l problem, please see this paper.
In this direction, I am interested in the following MO posts, which I have asked them already.
The following questions search for some relations between limit cycle theory and one of the following $4$ areas. So the questions can be a link between differential equations and dynamical systems, and the areas listed below :
i) Differential geometry, curvature and torsion.
ii) Complex singular foliation
iii)linear operators, index theory and Dynamica Lefschetz trace formula (Page 9 of this paper)
iv)Algebraic geometry and theory of Abelian integrals
Here, I list these MO questions:( Question0trace is motivated by consideration of a Lefschetz trace formula for counting the number of limit cycles of a 2 dimensional flow. Questions 0WG,0, and 1-6 are related to each other. They try to look at limit cycles and closed orbits, as closed geodesics).
00)A cohomology associated to a (not necessarily integrable) distribution (Hilbert 16th problem and dynamical Lefschetz trace formula 2)
0TRACE) Hilbert 16th problem and dynamical Lefschetz trace formula
0WG) A concept weaker than geodesibility of flows which is possibly useful in limit cycle theory
KEEPINGTRACKOFLIMITCYCLES) Keeping track of limit cycles via certain second order differential operator
0) (Some possible obstructions to ) Limit cycles as closed geodesics(3)
1)Limit cycles as closed geodesics(2)
2)A curvature description for center condition for quadratic vector field
3)Limit cycles of quadratic systems and closed geodesics(Finitness of $H(2)$)
4) Flat Riemannian metrics adapted to quadratic vector fields with center
5) Limit cycles as closed geodesics(in negatively or positively curved space)
6)Hilbert 16th problem via hyperbolic geometry
7) The error in Petrovski and Landis' proof of the 16th Hilbert problem
8)Analytic vector fields on surfaces which have infinite number of singularities
9)Fredholm index vs. Limit cycle theory
10) Codimension of the range of certain linear operators
11)The Moyal action of a planar vector field
12) The integral of torsion
13) The Perturbation of Non Hamiltonian algebraic Vector fields
14) Counting limit cycles via curvature in Riemannian geometry
15) Elliptic operators corresponds to non vanishing vector fields
16) A complex limit cycle not intersecting the real plane(2)
17) The adjoint operators as elliptic operators
18) Does this function belong to $L^2(\mathbb{D})$?
19) Lifting a quadratic system to a non-vanishing vector field on $S^{3}$ or $T^{1} S^{2}$
20)Is the closed orbit of the Vander pol equation a stable periodic orbit?
21) The Spectrum of certain differential operators
22) Uniform upper bound for dim of kernel and codimension of range of certain familly of PDE
23) The study of dynamics of a polynomial vector field via Green's function methods
24) An algebraics Hamiltonian vector field with a finite number of periodic orbits(2)
25)A finiteness question for integrable polynomial distributions on $\mathbb{R}^3$
26)Two semi stable limit cycles with disjoint interior
27) Polynomial vector field tangent to a given analytic simple closed curve
28) Can a harmonic vector field possess a limit cycle?
• 6
$\begingroup$ And how does this relate to Polymath? $\endgroup$ – Gerry Myerson Sep 8 '17 at 21:58
• $\begingroup$ @GerryMyerson Prof. Myerson I collected a list of questions of mine in this answer, which are related to limit cycle theory. All of them have a common point "limit cycles". I love this mysterious concept, "limit cycle". Before posting my answer, I reviewed some answers to Polymath project and I realize that some of them search for collaborators to work on their project. So I post my answer with the same reason. I think that these 24 question are directly (or in a few cases indirectly) related to the second part of the Hilbert 16th problem. $\endgroup$ – Ali Taghavi Sep 9 '17 at 9:27
• $\begingroup$ @GerryMyerson Furthermore am i mistaken to think that a polymathy problem is a problem which can be involved with a wide range of (mathematical) fields?If so, does not "the limit cycle problem" satisfy this property? $\endgroup$ – Ali Taghavi Apr 6 '19 at 20:40
• 1
$\begingroup$ I don't know, Ali. Have you tried proposing it to the polymath blog, or wherever it is that people decide what the next polymath problem should be? $\endgroup$ – Gerry Myerson Apr 7 '19 at 2:42
Erdos-Straus conjecture For every integer $n > 1 $, there exists three positive integers $x$, $y$ and $z$, such that the equation $\frac{4}{n}=\frac{1}{x}+\frac{1}{y}+\frac{1}{z}$ holds. Note that for a given number $n$, the number of triplets i.e. {x,y,z} satisfying above equation might be more than one.
The problem is interesting because of it simplicity. It requires hardly any knowledge of mathematics to understand the problem, and yet it remains unproven for more than 6 decades i.e. since it was proposed by Paul Erdos and Ernst G. Straus in 1948. - Source
• 2
$\begingroup$ The problem is reduced to this formula. math.stackexchange.com/questions/450280/erdős-straus-conjecture/… Formally we have to show that the solution is always there. And the linear equation solution is always $4L-n=1;2;3;4$ $\endgroup$ – individ Feb 23 '17 at 6:42
• 1
$\begingroup$ Formally, the equation $\frac{t}{n}=\frac{1}{x}+\frac{1}{y}+\frac{1}{z}$ The solution could be implemented and so more. $x=pk$ ; $y=sk$ ; $z=L$ $$k=\frac{nL(p+s)}{ps(tL-n)}$$ For this concrete case it is necessary to prove that the solution is always there. Suffice it to say that for $k$ you can always find an integer solution. It is enough to show that $4L-n=3$ is always a solution. It is necessary to factorize the number $nL=Aps$ Thus to so $(p+s)$ it is divisible by 3. It is easy to show that this can always be done. $\endgroup$ – individ Feb 23 '17 at 10:50
The Cartan determinant conjecture for quiver algebras. The Cartan determinant conjecture states that every finite dimensional algebra of finite global dimension has the property that the determinant of its Cartan matrix is equal to one. For quiver algebras the problem would reduce to a linear algebra problem concerned with graphs understandable to any student with knowledge of basic linear algebra. And a proof for quiver algebras would provide a proof of the general conjecture over algebraically closed fields. The Cartan matrix of a finite dimensional quiver algebra is defined as the matrix having entries $c_{i,j}:=$dimension of the vector space $e_i A e_j$, which is the space generated by all paths from $i$ to $j$ in the quiver.
If I understand correctly, polymath is a possibility to find like-minded persons to whom you could discuss questions in the area you are currently interested in. If yes, I would be happy to find people willing to discuss problems/to collaborate in the field of stereotype spaces and their applications. I mentioned this activity not long ago in a post concerning applications of functional analysis in other fields of mathematics. I wrote there about the applications of the envelopes of topological algebras. This is an area that opens new connections between functional analysis and geometry.
In a word, an envelope is a functor that turns a topological algebra into a new topological algebra (in fact, envelopes can be defined in each category, not necessarily in a category of topological algebras, but I am speaking here about the most interesting example) with the properties similar to the typical functional algebras in geometry -- the algebras of continuous functions, of smooth functions, of holomorphic functions, etc. It turns out that different classes of functional algebras are closely connected to different classes of morphisms used as "observation tools" in these constructions:
• the algebras ${\mathcal C}(M)$ of continuous functions are connected to the class of homomorphisms into $C^*$-algebras (one can think that this is expected),
• the algebras ${\mathcal C}^\infty(M)$ of smooth functions are connected to the class of "differential" homomorphisms into $C^*$-algebras with joined self-adjont nilpotent elements (in contrast to the previous case, this is unexpected),
• the algebras ${\mathcal O}(M)$ of holomorphic functions are connected to the class of homomorphisms into Banach algebras (this again can be considered as expected).
(These "test algebras" are commutative, but, certainly, the functor of envelope usually turns non-commutative algebras into non-commutative algebras. So this is a language where commutativity is not a necessary condition, and that is why it allows to study, in particularly, quantum groups.)
These observations lead to a purely categorical construction that allows to look at the "big geomertrical disciplines" in mathematics
• topology,
• differential geometry,
• complex geometry,
-- as parts of a general scheme. Each class of observation tools leads to an envelope which gives a "projection of functional analysis to some geometrical discipline" like these three ones (but not necessarily, since there are many different classes of observation tools and each of them leads to a new geometry). And each such a geometry has its own duality theory that generalizes the Pontryagin duality (to a proper class of non-commutative groups).
Of course, this sounds vague, the accurate definitions and proofs are here and here.
This can be considered as a developement of Klein's Erlangen program (and an intriguing possibility to look at mathematics "from above").
The problem for me is that when doing this research I face all the way problems from the parts of mathematics where I have weak intuition. That is why all the way I have to ask people around (including people here, at MO) different questions (sometimes some of my questions turn out to be stupid, so I am sorry for this...).
If there are people who are interested in discussing this with me, I would be happy to share my experience (and to collaborate) with them. There are lots of problems in this area. The simpliest are studying properties of stereotype spaces, and the most "ambitious" are constructing different "new geometries" (look at the introduction here).
Thank you.
Consider a probabilistic graph $G = (V, E)$ where each edge operates (exists) with probability $p$, independent of other edges. We consider a set $S \subseteq E$ to be a state of $G$. We say that $S$ occurs when each edge of $S$ operates, and all other edges fail (i.e., in $E \setminus S$). Define $\phi(S)$ to be 1 if $S$ operates, and 0 otherwise. We want to know: what is the probability that $G$ is in an operating state, under $\phi$?
The reliability polynomial is $\text{Rel}_\phi(G; p) = \sum_{S \subseteq E} \Pr[S\;\text{is operating}]\phi(S)$. What is interesting is calculating the coefficients of this polynomial.
Due to Valiant, in general this task is $\mathcal{\#P}$-complete. However, several classes of graphs are known to have this task be poly-time computable, such as cycles, series-parallel graphs, etc.
Say that $\phi$ is coherent when if $S \subseteq T$, $\phi(S) \le \phi(T)$. Define $F_\phi = \{S \colon S \subseteq E, \phi(E\setminus S) = 1\}$, and $F_i = \{F \in F_\phi \colon |F| = i\}$. This is called the $F$-form of the reliability polynomial. Therefore, we can rewrite the polynomial as: $\text{Rel}_\phi(G;p) = \sum_{i=0}^m F_i(1-p)^ip^{m-i}$.
What is known about $F$-forms? Suppose $|V| = n, |E| = m$. $F_i = 0$ for $i > n-m+1$, and if the smallest edge cutset has size $c$, $F_i = {m \choose i}$ for $i < c$. For any $k$, calculating $F_{c+k}$ runs in time exponential in $k$. By the Kirchoff Matrix Tree Theorem, $F_{m-n+1}$ is the number of spanning trees in the graph, which is poly-time computable. Once new coefficients are known, the bounds on the remaining ones become tighter.
Open questions:
1. Can we compute the number of spanning connected subgraphs with exactly 1 cycle in poly-time? This can be done for planar graphs. (this would be the coefficient $F_{m-n}$).
2. What is the complexity of the decision problem $\{<G, H>\;\vert\;\text{Rel}(G; p) \ge \text{Rel}(H; p)\;\text{for all $0 \le p \le 1$}\}$? It doesn't even appear to be in $\mathcal{NP}$.
3. Cycles are poly-time computable; what about $k$-regular graphs for $k \ge 3$?
I've asked a question at MO (under my actual name Włodzimierz Holsztyński), which is a basic algebraic problem (it's hard too) while it has a direct application to image and parallel processing:
$\qquad$ Indecomposability of image transformations (pure algebra). Open questions
It was an MO-question, which implies certain MO-limitations. But there is much more to this. If there is an interest in this I will be willing to expand on this earlier MO-note (link above).
• 1
$\begingroup$ What's an "OM question"? $\endgroup$ – Gerry Myerson Jun 6 '17 at 22:46
• 1
$\begingroup$ @GerryMyerson, it's a dislexic description of that question. $\endgroup$ – Wlod AA Jun 6 '17 at 22:52
• 4
$\begingroup$ "dislexic" is dysorthographic "dyslexic" (will this process ever converge?). $\endgroup$ – Wlod AA Jun 7 '17 at 2:22
Could You consider the conjecture as follows to make additional proposals for polymath project?
Let $A, B, C$ be three positive integer numbers such that $A+B=C$ with $\gcd(A, B, C) = 1$. By Fundamental theorem of arithmetic we write:
Let $d=\min\{x_i, y_j, z_h \}$ where $1 \le i \le n, 1\ \le j \le m, 1\le h \le k$ then:
My conjecture: $$d \le 5$$
The conjecture in here
PS: I researched about one hundred papers, in any case $h \le 3$?
I propose the following uniformly distributed random variable decomposition conjecture:
Assume $X,Y$ are independent random variables supported on a finite subset of the integers, and assume $Z=X+Y$ is uniformly distributed on its support: is it necessarily the case that $X$ and $Y$ are themselves uniformly distributed on their support?
It has been originally posted in post Why polynomials with coefficients $0,1$ like to have only factors with $0,1$ coefficients? in a form of polynomial factorization. Based on research there, this is an open problem referenced in Krasner and Ranulac (1937), Sur une propri\'et\'e des polynomes de la division du cercle, C.R. Acad. Sci. Paris 204, 397--399, where the result is proven for exponents from some arithmetic progression.
The counterexample search might be parallelizable and has been already attempted in various ways (proving non-existence of such counter example by ruling out small degree polynomials, brute-force search, automatic reasoning/proving based on coefficiients, Groebner basis application).
Like Erdos-Straus conjecture, another result, which is very simple to state and understand and yet a proof remains elusive, is the Collatz conjecture.
If the function $f(n)$ is applied recursively enough number of times on any positive integer $n$, then unity will always be reached. \begin{align*} f(n) &= \left\{ \begin{array}{ll} n/2 &\text{if }n \bmod2=0 \\ 3n+1 &\text{if }n \bmod2=1 \end{array} \right.\\ \strut\\ \end{align*}
Some mathematicians have commented on the difficulty level of this problem, which makes it more worthy of collaborative effort.
Paul Erdős said about the Collatz conjecture: "Mathematics may not be ready for such problems."[8] He also offered $500 for its solution.[9] Jeffrey Lagarias in 2010 claimed that based only on known information about this problem, "this is an extraordinarily difficult problem, completely out of reach of present day mathematics." -Source
I believe this contribution might fulfil the comment below
• 12
$\begingroup$ As stated, this would be unsuitable, as it is unclear how to "parallelize" in a fashion desirable for Polymath. If you were to provide, say, an additional predicate P(n) such that P(n) and the Collatz dynamic terminates upon input n, that might be suitable. Many of the other examples provided are sufficiently restricted that the leap to parallelize is not so great. Please edit this to find a restriction that suits the conditions of the post. Gerhard "Polymath Is Not Group Mathematics" Paseman, 2017.01.07. $\endgroup$ – Gerhard Paseman Jan 7 '17 at 21:13
• $\begingroup$ +1, nice paper. We're making progress. Still don't know how to parallelize. $\endgroup$ – Fred Kline Aug 16 '17 at 3:00
• $\begingroup$ Regarding the question of parallelising the efforts, here are the three most important theorems that the paper demonstrates: 1) for any odd number a, whoever can prove that 4a+1 and 8a+3 have a common number in their orbit (anywhere, backward or forward) solves Syracuse 2) for any odd number a, either the orbits of 8a+1 and 16a+1 will merge, or 8a+1 will merge with 64a+17 and 16a+1 will merge with 2a-1. 3) theorem 2) will occur at least once in any odd number's forward orbit, because any odd number will have either a number 8a+1 or 16a+1 where a is odd, at least once in its forward orbit. $\endgroup$ – Falken Aug 19 '17 at 9:20
• $\begingroup$ Calling the pairs (4a+1, 8a+3) where a is odd "buds", and having established that their solving solves Syracuse, it is important to observe that some of them "solve themselves", and I can demonstrate why. As some buds point one to another (are redundant), it is relevant to ask which proportion of the set of all buds must be solved to solve Syracuse, typically the sort of question one might ask in Ramsey theory. In any case, the systematic attacking of buds can be parallelised, and is one way to parallelise the solving of Syracuse. $\endgroup$ – Falken Aug 19 '17 at 9:20
• 1
$\begingroup$ Oh, and don't worry about ego injuring. Most mathematicians (of my acquaintance, and probably outside of it too) are more concerned with time misspent on studying worthless claims than on priority claims. Gerhard "And This Is My Claim" Paseman, 2017.10.05. $\endgroup$ – Gerhard Paseman Oct 5 '17 at 15:06
I'm coming a bit late to this list but I'd like to see some attention paid to AFK's primary proposition in this question which seems to have been entirely ignored in favour of a discussion of his background behind asking it.
• 1
$\begingroup$ This thread isn't for drawing attention to just any kind of unsolved problem, but only for those "that you genuinely think to be potentially suitable for a polymath project." So, what makes this question particularly suitable for a polymath project? $\endgroup$ – Gerry Myerson Nov 7 '17 at 11:06
• $\begingroup$ @GerryMyerson a) the fact that so many people are motivated to solve it - important because participation is a key ingredient to success of a polymath project. b) its importance and the likely impact of the result - it must surely be an aspiration of polymath to be of consequence c) the fact there is a clear proposition to be assessed d) the problem's difficulty and complexity is going to require many skilled people to assess any proposition and reach consensus. i.e. this problem is sufficiently hard that it's harder to get somebody to read your proof than it is to prove it in the first place! $\endgroup$ – samerivertwice Nov 7 '17 at 11:35
• $\begingroup$ Whereas a proof agreed upon by a community will be taken seriously. $\endgroup$ – samerivertwice Nov 7 '17 at 11:36
• 2
$\begingroup$ "this problem is sufficiently hard that it's harder to get somebody to read your proof than it is to prove it in the first place!" What nonsense. In the first place, you have no idea how hard it's going to be to resolve the question. In the second place, mathematicians are eager to read solutions of long-standing problems (provided those solutions pass some minimum plausibility tests). And more to the point, how do you propose to break this problem up into pieces on which individuals can work independently? That's what it takes to be a polymath problem. $\endgroup$ – Gerry Myerson Nov 7 '17 at 11:40
• $\begingroup$ @GerryMyerson Humour's frequently based on nonsense. I'm not sure why you would say I have no idea how hard it's going to be when its obvious the lower bound on hardness is the vast amount of work that's been carried out on it already. The emphasis on polymath seems to be collaboration rather than independence. On perhaps related note, why do other posters apologise that their proposed problems might be "too famous"? I wondered if this is an issue with this proposal. $\endgroup$ – samerivertwice Nov 7 '17 at 13:01
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/30017 | Skip Nav
Travis Scott Showed Off a Pair of Dior x Jordan Sneakers
Barbara Palvin and Dylan Sprouse's Best Style Moments
Lili Reinhart and Cole Sprouse's Best Style Moments
Maddie Ziegler's Blue Area Suit at Charlie's Angel Premiere
Kacey Musgraves Has Made Her Trendy Western Style Iconic
Here's What Jonah From The Last Song Looks Like Now
Taylor Swift Cried Hearing Selena Gomez's New Song
Lennon and Maisy Stella's Cutest Sister Moments
Behind-the-Scenes Pictures From the Marry Me Movie Set
Lupita Nyong'o Reveals the Significance Behind Sulwe's Dress
Priyanka Chopra and Nick Jonas Party in Vegas in Style
Steve Madden Shoes That Celebrities Own, and You Can Shop
Latest Celebrity and Entertainment
All the Latest From Ryan Reynolds |
global_01_local_0_shard_00002368_processed.jsonl/30029 | 17 Bizarre Facts And Pics You Didn't Know You Needed
Here is a collection of creepy, interesting, random, useful, or perhaps all of the above, facts. There is no theme to these facts other than after you read them, you'll realize that you never knew you needed to know them until you did. And if you're a trivia buff, you'll have 17 more bullets in your figurative gun. Pow pow, fact power! *shudders at lameness of previous statement* Ignore me. Read the facts.
wtf facts, bizarre facts, creepy pics
View List
• -
• Vote
• - |
global_01_local_0_shard_00002368_processed.jsonl/30032 | A couple of days ago, I was greeted on Stack Overflow with an indication that my reputation had just gone down by 25 points. I discovered that it was because a question that I had answered (accepted + one up-vote = 25) had been "removed."
Now, the -25 rep hit is really not that big a deal ... but the event got me thinking: I seem to remember that a user cannot delete their own question if it: (a) has upvotes; or (b) has an answer with upvotes. This question had both.
I eventually tracked down the question (via the link to my answer) and noticed that a moderator had deleted it. Now, I'm not here challenging the moderator's action (I think I know why - see later) but what I am curious about is:
1. Is it appropriate that I can see deleted questions (I'm < 10K, as you can see) simply because I gave an answer.
2. I noticed I have an "undelete" option on my answer (but not on the question); what would happen if I clicked that? The hover text says "vote to undelete" - but I don't have that privilege. (I'm not going to 'find out by doing' here, because I don't disagree with the original deletion.)
Probable/Possible Reason for Closure:
The question involved participation in an online quiz. The OP had made this very clear, giving their submitted code in the question, and the reason why it failed, asking for clarification on what that reason meant. In a comment to my answer, the OP had even stated that the quiz was now closed. However, at some point shortly after I had answered, somebody had posted a remark (maybe in another question, or possibly in this one) that the quiz was still open (and specified a closing date). So, assuming all this is on-track:
1. Is it possible the moderator will "undelete" the question once the aforementioned closing date has passed?
There are a number of discussions here on Meta about what to do when confronted with such "Quiz" questions; I don't think my answer really broke any of the guidelines. But, like I said, I'm happy with the -25, and perhaps I should have been less hasty in posting my answer.
Note: I shall refrain from posting a link to the deleted question, as that may break the 'spirit' of the moderator's actions. However, if a moderator says here that it's OK, then I'll include the link (at least, that to my answer).
• 4
'Is it possible the moderator will "undelete" the question once the aforementioned closing date has passed?' - Realistically the mod has forgotten all about this question so no, not unless reminded. Also, I don't think there should be an issue linking the question because only those who have 10k will be able to see it and I see no reason why it would be problematic for them to see it seeing as they have the privilege to do so. – Script47 Nov 2 '19 at 23:38
• @Script47 Ha! Probably, so true - but I could be tempted to somehow ping the mod! 😊 – Adrian Mole Nov 2 '19 at 23:39
• 1
Regarding your "2.": you can try it, you should only get a popup saying that you can't undelete posts deleted by moderator. – Tom Nov 2 '19 at 23:46
• 4
"As of February 28th, 2017, authors of answers to deleted questions can also view them... (from MSE) – gnat Nov 3 '19 at 20:14
• @Script47 The reason behind me not posting the link (though it's been done, now, in the answer) was that, even with the >10K "view deleted posts" privilege, you can only do that if you have a direct link; at least, that's my understanding from other posts here on Meta. – Adrian Mole Nov 4 '19 at 0:17
• 3
It's not the first time TestDome files a DMCA takedown request – Bart Nov 4 '19 at 13:36
The post you are referring to was deleted by Stack Exchange, not a community moderator. It was deleted because a DMCA request was received from TestDome.
This is noted in a comment on the question. I don't know if you can see those or not due to reputation level though, but here is a screenshot of said comment:
DMCA Notice Comment By Employee
Any such deletion will include a comment such as this one:
Post removed due to a DMCA notice from <DCMA issuer>
• interesting scenario. Though I'm reluctant, and too pessimistic here, to believe a quiz question is unique and original enough to merit or warrant copyrighting, it's good to know there is some attention to the notion. – Brett Caswell Nov 3 '19 at 2:06
• 1
I wonder if its sufficient to delete posts under DMCA and still have them available to view by users with sufficient rep. I can see it, so have you therefore not really deleted the copyrightable material. – gbjbaanb Nov 3 '19 at 16:14
• 3
It probably is @gbjbaanb as I doubt someone doing the quiz is likely to have sufficient reputation to view the post, and it also won't show up on search engines once they scan the site again (which is likely the key thing). – Larnu Nov 3 '19 at 20:00
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00002368_processed.jsonl/30033 | Deploy a Django REST API to Heroku in 5 minutes
Sometimes you’re super eager to get started with a new project! Seems easy – you set up a git repo, use django-admin startproject to generate an empty project, start adding dependencies… You want to use Django REST framework for the API, so you install that. Then you need to connect Postgres for the database… Oh, but you want to deploy to Heroku, so you need to configure that DATABASE_URL environment variable and hook that up in – there was that one project where we had that working already, we can copy/paste it for sure… Celery for async tasks… Redis… 😴… Wait, what were we building again?
If the scenario described above sounds familiar, then like me you’ve run into the problem of boring, repetitive and uncreative work necessary to set up a modern web app project. A lot of boilerplate is needed to get a basic project working and best practices keep changing. Sure, there are solutions like cookiecutter-django which is quite nice, but with ~40 requirements spread across 3 files and ~500 lines of settings spread across 4 files it might be overkill when you’re just getting started. More importantly, while cookiecutter is great for initial project generation, it doesn’t allow you to easily update a project afterwards. Regenerating the project, even when exactly the same prompt answers are selected results in “Error: “my_awesome_project” directory already exists”. As already stated, best practices change over time and it would be useful to have an easy way to update your project boilerplate occasionally.
To address these issues, I’ve developed generator-django-rest – a Yeoman generator for quickly bootstrapping a (relatively simple) Django REST API project that’s deployable to Heroku in 5 minutes. In this post we’ll explain how it works (and why use a JavaScript framework for generating Pythong code 😱), but first let’s see it in action in this screencast:
Continue reading Deploy a Django REST API to Heroku in 5 minutes
Compiling TensorFlow with GPU support on a MacBook Pro
OK, so TensorFlow is the popular new computational framework from Google everyone is raving about (check out this year’s TensorFlow Dev Summit video presentations explaining its cool features). Of course, a fun way to learn TensorFlow is to play with it on your own laptop, so that you can iterate quickly and work offline (perhapse build a hot dog recognition app). In these cases a GPU is very useful for training models more quickly. There used to be a tensorflow-gpu package that you could install in a snap on MacBook Pros with NVIDIA GPUs, but unfortunately it’s no longer supported these days due to some driver issues. Luckily, it’s still possible to manually compile TensorFlow with NVIDIA GPU support. I’ve hunted through a lot of different tutorials (1, 2, 3, 4 – this last one helped me the most) to bring you this hopefully complete description of how to set everything up correctly and get deep into learning (and I know, in 2 months probably become just another one in that list of outdated tutorials, but that’s life 🙂 ).
For the sake of verbosity, I’m using a MacBook Pro 10,1 with an NVIDIA GT 650M and OS X 10.12. Hopefully, though, it will work on a couple of other configurations as well. In any case, let’s start…
Continue reading Compiling TensorFlow with GPU support on a MacBook Pro
Simple way to set up Django and a SPA frontend on Heroku
This post was adapted from my Stack Overflow answer to a question about using single page applications (SPAs) with Django on Heroku.
Update: check out my django-spa package for a ready-to-use solution for serving SPAs from Django.
Here’s how to set up Django to serve your static files and index.html on / while still having the possibility to use Django views for the admin dashboard, registration etc.:
from django.conf.urls import include, url
from django.contrib import admin
from django.contrib.staticfiles.views import serve
from django.views.generic import RedirectView
urlpatterns = [
# / routes to index.html
url(r'^$', serve,
kwargs={'path': 'index.html'}),
# static files (*.css, *.js, *.jpg etc.) served on /
# (assuming Django uses /static/ and /media/ for static/media urls)
RedirectView.as_view(url='/static/%(path)s', permanent=False)),
# other views still work too
url(r'^admin/', include(,
Continue reading Simple way to set up Django and a SPA frontend on Heroku
Disk on a platter
This article on building a Raspberry Pi NAS solution has been sitting in my drafts for three years now. Recently, my Raspberry Pi had stopped working (the SD card had died), so I rebuilt it yesterday. I cursed myself for not having finishing the text back then, as I now had to retrace some steps manually. So, here goes the finished procedure for future reference.
I got a Raspberry Pi as a birthday present from my thoughtful colleagues!
Raspberry Pi
Now, as my first project I decided to connect it to my 2TB external hard drive and serve it on my local network using the Samba protocol (I tried NFS and SSH too, but Samba proved to be the most performant protocol and is also cross-platform). No more moving the disk around and hooking up USB cables 🙂 Continue reading Disk on a platter
CloudFleet – Captain’s log – The End of the Sysadmin
We have already talked quite a bit about the importance of self-hosting your apps due to the limitations of centralized cloud services and mentioned a number of great apps ready for self-hosting. In this blog post, we assume that you already self-host your apps to protect your data autonomy. From here, we look at what happens after you set up an app on your hardware, and how you maintain it: a job that is typically done in organisations by professional system administrators, aka sysadmins.
Source: CloudFleet – Captain’s log – The End of the Sysadmin |
global_01_local_0_shard_00002368_processed.jsonl/30035 | Monday, May 30, 2011
Why Are (Some) Religious People so Rude?
I was at a wedding recently. As usual with weddings, there's lots of people taking photographs, and I was one of them, especially with my DSLR. And when the couple has spent more than $80,000 on the wedding, you want to take pictures.
And then I ran into one guy.
"Hey, don't take my picture!" He was adamant! So I replied, somewhat knowingly, "Why, religious reasons?"
"YES!" He practically shouted. "It is haraam (forbidden) to take pictures. So DON'T TAKE MY PICTURE!"
Alright! But then get the HELL OUT OF THE WAY THEN. Stop standing next to the bride and groom if you don't want your picture taken!
I don't understand one thing - why do people who don't want their picture taken always assume everyone WANTS to take their picture? I mean, you are not Angelina Jolie.
And another thing, have you noticed that these people, who often claim to be more "religious" (translation: taking things to extremes) are always ... RUDE!
In another wedding, I met someone else who did not want their picture to be taken. Do you know what he did? He threatened to break the camera of a 10 year old KID who was taking pictures!
"Taking pictures is HARAAM and against Islam and if you take my picture again I will BREAK your camera do you understand?"
Way to go... be Islamic, threaten kids. Nice slogan. Recently, someone left the following comment on another blog (of a Muslim sister who also has a dog).
"no disrespect, but ..."
As soon as you read those, you know that the person has LOTS of disrespect. And what's up with the bad grammar and typos! It seems all our "Islamic friends" online didn't graduate high school English. The commentator goes on to berate her for caring for her sister's dog. Seems like they totally missed Imam Malik's point of view on dogs. Not to mention the story of the People of the Cave (and their dog) from THE QURAN!
On my blog's facebook page recently, someone commented, "IS IT ALLOWED TO SHOE QURANIC VERSES IN PICS....KINDLY GIVE THE ANSWER".
Now I don't think it's ever allowed to "shoe" Quranic verses, but the ALL-CAPS and the weak English immediately told me this person wasn't interested in a civil debate. Nevertheless, I gave him (or her) the references on Muslim artists, pictures etc. And just as I predicted, the person was back with the following gem:
"i am totally dissatisfied with the references you given. plz u give me the true reference after which u r showing it in pics or i will start a compaign to dis like your page....sorry for that"
I like how they apologize .. lol. And then they start spamming the web page, posting rude messages, after which I simply kicked and banned that user. There's something therapeutic about selecting a user and clicking "Remove and ban user".
I would put this aside, but this user is synoptic of a lot of Muslims. They hold fast to some ritual or practice, and anything that is SLIGHTLY different from them - HARAAM! KAAFIR! DOOMSDAY!
I think it's time to tell these people, "your haraam-ing is haraam!" Grow up.
Tuesday, May 03, 2011
Why the Liberals Lost
Canada is awake today to a Conservative majority government, with NDP forming the official opposition and the former traditional governing party, the Liberals, reduced to a small rump. My quick analysis is over at Crescent Canuck, do visit and comment over there. |
global_01_local_0_shard_00002368_processed.jsonl/30050 | New Program available – Display Example
There’s a new program in the repository, a Display Example, showing how to connect miniMO to OLED displays via I2C.
miniMO is a modular system where all modules are identical, which raises the question of how to tell who-is-who. I’ve always thought that it would be great if I could use an OLED screen as a tag, and after some tinkering (and with a bit of luck), I’ve found just the way to do it.
Above you can see miniMO connected to a 64×48 OLED screen, a soil moisture sensor, and a LED light. There are no other wires, as miniMO is powering the screen through the external power pin.
It only takes four wires to drive the screen: power, ground, data, and clock. I use solid-core wires, and the screen stands on its own without any issues whatsoever.
By default, miniMO comes with a jumper to select two out of three pins for either battery or external power, but if you connect all three pins together, the battery gets re-routed to the external pin, which becomes the screen’s power source. I haven’t found a three-pin jumper anywhere, but it is really simple to fashion one from a female header.
I never thought of using the power pins in this way, so this is a very fortunate hack!
Software-wise, I adapted Neven Boyanov’s library for Tinusaur (great project -you should check it out!). I modified the code so that it works with screens of different sizes and orientations, and made it easy for anyone to set them up. Other than that, I rearranged a few things and did my best to add meaningful comments everywhere.
On the subject of the screens, I am using SSD1306 OLEDs. These screens are very popular and easy to source online; you will find them both in SPI and I2C versions, of which I use the latter because it needs less wires. The first screen I bought came with a dedicated reset pin, so I breadboarded it adding a capacitor and a resistance to do the reset automatically:
Since miniMO is not designed to use a display, you can not use at the same time with a regular program. What I’ve found, however, is that I can set a module to use the screen once (in the setup phase), then revert it to its normal behavior. In this way, if you turn the module ON with the screen connected, the screen can (for instance) show the name of the module; if you then turn it OFF and ON again, this time without the screen, the module will operate as usual. I think this is a very acceptable trade-off between being able to use everything at once, and not being able to use a display at all; furthermore, it serves my original purpose and is a transparent modification to the existing programs.
Leaving the scope of the synthesizer programs, there’s plenty that can be done with miniMO and a display; the I/O 1, 2, and 3 are always available, and depending on how you configure the connections in the program, you can also use either I/O 4, or the push button.
The Display Example program reads the value of an input signal in I/O 3 (adjusted with the potentiometer, which acts as a trim pot), and lights an LED connected to the output when the input reaches a threshold. In the setup above, the input is coming from a moisture sensor: with the screen connected, I took readings from several planters around the house, and thanks to the display I could decide on a value for when they need watering. I could use the screen to display a message in that situation, but I turn the LED light ON to that same effect, so in this particular program you don’t have to use the screen after you’ve found a meaningful value.
In all, the Display example shows a bit of what’s possible; I’m focused in sound modules and the “tag” function already suits my needs, but lots more can be done.
Since I want to keep the programs lean, I haven’t added any capabilities beyond displaying text and a few auxiliary functions; coincidentally, David Johnson-Davies has done a lot of work on OLED screens lately, and he demonstrates an oscilloscope which I might bring to miniMO at some point. Also of note is Ilya Titov’s ATtiny arcade kit, a great kit which has a lot in common with miniMO.
Posted in Blog, Programs and tagged , .
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/30051 | Mises Wire
Not-So-Modern Monetary Theory
Money and Banks
Read More
Negative Interest Rates: How Low Can They Go?
Money and BanksMoney and BankingPolitical Theory
Negative rates can work because the opportunity cost of holding physical cash is not zero. Abolishing large banknotes further increases the cost.
Read More
Shield icon wire |
global_01_local_0_shard_00002368_processed.jsonl/30055 | Lucky milf dana sensually fingerfucks a hot teen abella pornstars fingering
Lucky milf dana sensually fingerfucks a hot teen abella pornstars fingering
321 Likes 3598 Viewed
I had met John a year before in a gay chatroom, and we connected immediately. He was about 45, single with his own appt and a 'switch' with minimal bondage experience. I was an 18 year old switch (though mostly submissive) with no bondage experience with another, though plenty with myself.
He lived about 6 hours south of me, too far to drive without A, trusting him a lot, and B, setting aside a lot of time. He knew one of my fantasies was to be a guy's oral slave for a weekend, and he frequently talked about what he could do with me.
He was a tad nervous at first, most of the suggestions coming from me and didn't really seem like a capable Dom, but he assured me if we met he'd be in full control. Finally I had set aside a weekend with nothing to do, got directions, and went to visit him. I knocked on his apartment door, and he opened it within a few seconds. He must have been waiting for me. I stepped inside, set my backpack down and took off my sandals.
John was a very tan, smiling bald man about my height, 5'10 and 160ish pounds. His eyes were big, always seemed to be wide open, and his smile would have been a tad creepy if I hadn't seen pictures of him and been prepared for it.
He was lean, but fit, his age showed, but only slightly. He was wearing khakis shorts and a white polo shirt. I was magnificent brunette audrianna angel enjoys a worthy sex similar in build, though lighter at 140 pounds. I was skinny, but had a decent amount of muscle and sported short dark brown hair.
I had on navy polyester shorts with a blue stripe running down the side and a red t-shirt. Stepping behind me to shut and lock the door, he then pulled my arms behind my back, and locked his left arm underneath, effectively restraining them. Then with his other hand be began exploring my body. Reaching under my shirt, he felt my smooth chest, pinched my nipples, then moved down to feel my not quite fat but not quite toned abs. Suddenly he plunged his hand beneath the elastic waistband of my shorts and briefs and began toying with my shaved balls and quickly hardening cock.
He moved closer, digging his own 6'' member into my back. He turned me around, and I saw his smile had widened at the thought of a new toy. He removed my shorts, briefs and T-shirt, put them in a cabinet and locked it. I would not need them. Then he reached into my pack and pulled out the god knows how many feet of rope I'd bought along with a pair of scissors. He took them along with me into the bedroom. "On your stomach on the bed slave." "Yes master." "Hands behind your back." I complied.
Then he knelt over them. "Get a hand on my dick slave." I began to stroke him as best I could while he bound my ankles, then my knees together. I tested the bonds. No movement, he had used a pretty liberal amount of rope. I let go of his cock as he shifted positions and bound my wrists, then my elbows together.
Finally, he tied my wrists to my ankles. An unbelievably restricting hogtie. We always said we'd do the hogtie first. We both liked it because it left my mouth readily available.
He swung me around so my head hung off the bed slightly, and my face was inches from his cock. Eagerly he slipped it into my mouth. I wrapped my lips tight. It felt great, so warm and hard in my mouth, the taste wasn't bad, salty, but not in a bad way. He stuck it in few inches then went nice and slow, back and forth, coming out till my mouth was just over the tip, then plunging in again.
Just the way he liked it, nice and slow, so the blowjob took a while, and so he cummed longer. Sultry schoolgirl is seduced and plowed by her aged schoolteacher continued at that pace for several minutes letting me get used to his cock in my mouth, then slowly began working his way deeper. After about twenty minutes of slowly pushing my limits, his 6'' cock was going all the way into my mouth, and down my throat, his balls slapping my chin.
I looked up at him, his eyes were rolled back in his head in ecstasy, which only made me hornier. I started moving my tongue around as he continued to slowly thrust, and received a moan of approval. He pulled it completely out after his next thrust and allowed me to lick his balls while his soaked cock leaned against my face. Not sure what to do, I rolled them around in my mouth with my tongue, which he seemed to enjoy.
I did everything from light licks, to heavy caressing with my tongue. Finally he pulled them out and returned his dick to its rightful place in my mouth.
His thrusts grew a little bit erratic and his breathing heavier. He was getting closer. I wrapped my lips as tight as I could, and worked my tongue like never before. Finally, from ragged breaths, the moans started. He was thrusting harder, a little bit faster.
After several more minutes, he pulled out till only the tip was in my mouth. For what seemed like forever cum dribbled out of his dick onto my tongue. After the last drop left him, he pulled his softening dick away. "I want you to keep that in your mouth until I say." Not too hard a task, it was a little bitter, but overall, tasted pretty good.
He left the room leaving me helpless with his cum in my mouth. He left me there for several minutes, letting his taste soak into my tongue. Finally he returned with a collar. It had 4 d-rings evenly spaced on it. He told me to swallow then put it on. Then her untied my legs, and took off my elbow cinch so it was only my wrists that were bound.
He stood me up next to the bed. "This is how you will always be, naked and restrained. Helpless so that I can do what I want, when I want. He attached a twenty foot cock leash to my still hard dick. He gave it a few strokes. "Hmm, maybe we'll do something about that later." He sat naked on the couch watching TV while I knelt in front of him.
He let me lick his balls as he watched and recovered from the earlier blowjob. His completely shaved balls felt beautifully natural in my mouth and tasted just as good. His cock lay like a heavy piece of meat across my face. After about a half hour, he pulled me up and had me sit off to the side on his lap. He removed the leash and started stroking me slowly, all the way, up and down.
I moaned and shut my eyes, I was still very horny from being allowed to suck him off earlier. He started to move faster and faster, and I got hornier and hornier.
I was so close to cumming, when he stopped and reattached the cock leash. He pulled me into the bedroom by it, and I hurriedly followed. When I reached the room, right behind him, he got out a handkerchief and blindfolded me. I heard him move around the room for a few moments, then felt the sharp sting of a whip on my ass.
"You've got to earn my cock, slave, find me." Another whip across my chest, I started moving across the room on my knees following the pain. A lash across my stomach, and I moved forward…hit the bed. Another on my ass, I turned around, and in doing so, fell over. As I struggled to get up without the use of my hands, I felt sting after sting on my, by now red ass. Finally I managed to get back to my knees. Suddenly, I smelled him in front of me.
I moved forwards, my nose bumped his cock. Licking up the shaft, I found the head and spiraled my tongue around it back down to his teen fucking hard and she is hornt. I sucked them both in my mouth again and enjoyed their taste.
I enjoyed licking up and down in between them. After they'd had their fair share of treatment, I moved back up and impaled my head on his dick. I brought my chin all the way down to his balls, my nose pressed into his stomach and held myself there.
Moriah mills in the wetter the better
What little I could, I licked my tongue around the base of his shaft, hitting that spot near the bottom that is so sensitive for me. He placed his hand on the back of my head, forcing me down farther still and moaned with approval. After several minutes I started to pull up, slowly, sucking in hard, keeping a tight seal with my lips as I did.
When I got so the only thing left in my mouth was his head, I started running my tongue slowly up from the base of it to his tip.
She gets fucked inside pussy and enjoys jizz over face
This drove him crazy, his moans grew louder, I went faster and faster until I was rapidly moving it up and down over his sensitive spot.
I felt his dick swell as he was about to cum.
He pulled it out and started rubbing it on my face, on my cheeks. His cum oozed slowly all over my face, he got some on both cheeks, my nose, my chin, and my forehead. Everywhere but my lips. Finally, thankfully, he let me clean the very last bit of it off his cock, it tasted fantastic to me.
Finally he removed the blindfold, and left the room. I sat there with his warmth all over my face. There was nothing I could do to wipe it off.
"Please let me taste your cum," I begged when he came back into the room. Without a word he started stroking me fast and hard, I gasped in surprise.
"Oh god yes," I breathed as I felt myself getting close again. I started panting harder and hard as he gripped tighter and tighter. Like before he stopped. "Please let me cum," I begged, his juices still covering my face. He held out a buttplug. "If you put that in, I'll let you cum, but you gotta get it in five minutes or less. He placed it in my still bound wrists; it was about as wide as a magic marker with rope tied around a loop on the end so it could be held in place. He had a condom on it because he knew I liked to keep the toys clean.
I reached and struggled as much as I could, but I just wasn't able to get the 5'' plug into my ass. After I had dropped it several times, and 5 minutes was up, he took it away. He grabbed my hair and forced me to my knees again, this time pushing my head down to the floor so my ass was up in the air. "You get this one then," he showed it to me. It was only three inches long, but twice as thick with a bulbous end to hold it in place. He started forcing it babe goldie gets pumped by a huge black cock masturbation pornstars my asshole slowly.
The larger end didn't hurt going in, but gave a lot of unpleasant pressure. Finally it slipped into place and I let out a grunt.
Curvy a hole looks like it was made to be drilled non stop
The feel of it up my ass was interesting, but not necessarily bad. He pulled me to my feet, walking produced interesting sensations from my ass. This plug too had a ring protruding from the end. He slipped a finger in and tugged on it slightly for effect. "Mmmph," I protested, I wanted in or out, not in between.
He dragged me by my cockleash out into the living room. He put a clamp on each of my balls and tied the chain to a hook in the wall.
Then he tied a rope to the ring on the plug and tied it to something behind me, pulling me tight both ways. Pull on my rectum, pull on my balls, it was a choice with no win.
I tried to minimize the pressure on both ends, but it didn't work too well. He started to give me a handjob. It felt so good, he was very skilled. I started spasming, I couldn't help it, he was going to make me cum this time. No one had brought me to orgasm but me, that was about to change. I had a stronger orgasm than I've ever had pumping a good load of cum as my eyes rolled back in pleasure. I stood there, ignoring the pain with my eyes shut for the moment when he started shoving something into my mouth.
It was a penis gag with my cum on it. I refused at first, but he forced it in, and if I could have thanked him for it, I would have. It didn't taste as good as his, interracial hot sex pamela sanchez and max rajoy fuck on stage by tad more bitter, but great nonetheless.
I took much delight in cleaning off the end of the fake cock in my mouth. He sat on the couch not far behind me and started whipping me again.
The lashes grew harder and harder, and in spite of things, so did my cock. After there were several good red lines up and down my sides, he decided that had been enough.
He removed the clamps from my aching balls, which only hurt worse when the blood rushed back.
Short hair brunette asian babe blowjob sucking
He untied the plug, took it out slowly and removed the gag letting me run around it several more times with my tongue. He untied my hands so they could separate, but left a rope around each wrist. Leading me into the bedroom he tied each hand above my head to posts on either side of the headboard.
Finally he roped off my ankles so I was completely spread and climbed in with me. We would sleep, but not for long… |
global_01_local_0_shard_00002368_processed.jsonl/30066 | Book review
How to be Holy: First Steps in Becoming a Saint by Peter Kreeft
Peter Kreeft. How to Be Holy: First Steps in Becoming a Saint. San Francisco: Ignatius, 2016.
Peter Kreeft is a professor of philosophy at Boston College and King’s College whose name may be known to older evangelicals as one of the signatories to Evangelicals and Catholics Together (1994). He also describes himself as a former Calvinist.
In How to Be Holy, Kreeft lays out a theology of sanctification intended for members of nearly any theistic religion. As a popular-level book, it tends to avoid such longer terms as ‘sanctification’ in favor of such descriptions as hinted on its cover as ‘being holy’ and ‘becoming a saint.’ As a Protestant approaches the book, one may be inclined to believe that the title refers to justification, but its content is indeed more towards sanctification, and “Becoming a Saint” isn’t referring to Vatican canonization. It’s also important to note that despite the sound of the title, Kreeft is not arguing for the possibility of perfect sanctification in this life. As a theology of sanctification, however, it suffers from its Roman Catholic theological underpinnings and a hermeneutic which fails to account for the immediate context of individual scripture verses.
Continue reading
Does Romans allow for the “Carnal Christian”?
TL/DR: The theology concerning the existence of a “carnal Christian” holds that a person can realistically come to true saving faith in Christ and continue to live free of repentance and sanctification for the full remainder of his or her life. This paper examines Romans 7:14 and 8:1–14 to demonstrate that Romans knows no such concept. In Romans 7:14, Paul identifies even himself as one who struggles with the flesh. In Romans 8:1–14, there are only two kinds of people in view: the natural and the spiritual. It makes no mention of a middle category. Continue reading |
global_01_local_0_shard_00002368_processed.jsonl/30087 | Home » Posts tagged 'cluster'
Tag Archives: cluster
SQL Server Cluster LooksAlive and IsAlive Check
Windows Cluster Service use the “heartbeat” process to check whether each node is alive at both the OS level and SQL Server level. Heartbeat signals works on UDP.
Microsoft Windows Cluster service perform 2 health checks to perform node & resource availability check.
LooksAlive Health Check
1) LooksAlive is a quick lightweight health check
2) Run at interval of 5 Seconds
3) Does not impact performance but does not perform a thorough check
4) The check will succeed if the service appears to be running even though it might not be operational
5) If Fails calls “IsAlive” health check
6) Polling interval can be changed by adjusting LooksAlivePollInterval property of Cluster service
IsAlive Health Check
1) Run at interval of each 60 Second
2) Perform more detail check then LooksAlive
3) Run @@SERVERNAME to ensure that SQL Server is responding to queries
4) Does not ensure that all user databases are operational
5) Retired 5 times & then try to reconnect SQL Server
6) If all 5 retry fails, the SQL Server resource fails & Windows Cluster service will try to bring it online on other node as per configuration
7) Polling interval can be changed by adjusting IsAlivePollInterval property of Cluster service
Reference : Rohit Garg (http://mssqlfun.com/)
You can find and follow MSSQLFUN :-
Other Linked Profiles :-
Renaming or Changing SQL Server Cluster Instance
Renaming or Changing SQL Server cluster instance process is bit different from renaming a stand-alone instance.
Refer : Rename or Change SQL Server Standalone Default Instance http://mssqlfun.com/2014/06/30/rename-or-change-sql-server-standalone-default-instance/)
Refer : Rename or Change SQL Server Standalone Named Instance (http://mssqlfun.com/2014/07/29/rename-or-change-sql-server-standalone-named-instance/)
The name of the virtual server is always the same as the name of the SQL Network Name (the SQL Virtual Server Network Name). You can change the name of the virtual server, you cannot change the instance name like in the case of standalone named instance. You can change a virtual SQL server named SQLServerinstance1 to some other name, such as SQLServerNewinstance1, but the instance part of the name, instance1, will remain unchanged.
Rename a virtual server :-
1. Using Cluster Administrator, change the SQL Network Name or SQL Server DNS Name to the new name.
3. Bring the SQL Server resource back online.
Verify the Renaming Operation :-
1) Using @@ServerName
2) Using sys.servers
Minimize network propagation delay :-
ipconfig /flushdns
ipconfig /registerdns
nbtstat –RR
You are done ! You should ask your application teams to reconnect with new Name or if they are using IP address then no changes required.
Reference : Rohit Garg (http://mssqlfun.com/) |
global_01_local_0_shard_00002368_processed.jsonl/30113 | Ethz phd thesis template
No one (that I know of) is the happier, better, or wiser, for reading Mr. The portrait is indeed a fine one, worthy of the artist and the critic, and perhaps recalls Lord Keppel’s memory oftener than any other circumstance at present does.[15] Portrait-painting is in truth a sort of cement of friendship, and a clue to history. PERFECT. The principle by which he exerted his influence over others (and it is a principle of which some speakers that I might mention seem not to have an idea, even in possibility) was sympathy. Sometimes the ordeal was employed in connection with compurgation, both for prosecution and defence, to supplement the notorious imperfections of that procedure. An amiable action, a respectable action, an horrid action, are all of them actions which naturally excite for the person who performs them, the love, the respect, or the horror of the spectator. Should the next twenty years pass as swiftly, forty years will have glided by me like a dream. We skim the surface, and travel along the high road. The consolations of religion apart, this is perhaps the only salve that takes out the sting of that sore evil, Death; and by lessening the impatience and alarm at his approach, often tempts him to prolong the term of his delay. It was thus rich where a library is usually poor and _vice versa_. In all such cases, that there may be some correspondence of sentiments between the spectator and the person principally concerned, the spectator must, first of all, endeavour, as much as he can, to put himself in the situation of the other, and to bring home to himself every little circumstance of distress which can possibly occur to the sufferer. It often occurs in adolescence: the ordinary person puts these feelings to sleep, or trims down his feeling to fit the business world; the artist keeps it alive by his ability to intensify the world to his emotions. The slightly malicious laughter of the male at female incompetence, which is seen in the schoolboy’s treatment of his sister, is illustrated throughout the course of literature. The beauty of the celestial spheres attracting the admiration of mankind, the constancy and regularity of their motions seeming to manifest peculiar wisdom and understanding, they were each of them supposed to be animated by an Intelligence of a nature that was, in the same manner, indissoluble and immortal, and inseparably united to that sphere which it inhabited. From a comparison of the radicals of the name in related dialects of the Algonkin stock, I should say that a more strictly literal rendering would be “word-breaker,” or “deceiver with words.” In the Penobscot dialect the word is divided thus,—_Glus-Gahbe_, where the component parts are more distinctly visible.[164] The explanation of this epithet, as quoted from native sources by Mr. The studied forms of politeness do not give the greatest possible scope to an exuberance of wit or fancy. Incongruities which are lapses from standard ideas may certainly, as already conceded, be regarded as degradations. He would see and feel his own body moved rapidly towards the fire, but his apprehensions would not outrun it’s actual motion: he would not think of his nearer approach to the fire as a consequence of the force with which he was carried along, nor dream of falling into the fire till he found it actually burning him. Though it may be true, therefore, that every individual, in his own breast, ethz phd thesis template naturally prefers himself to all mankind, yet he dares not look mankind in the face, and avow that he acts according to this principle. Some sensations are _like_ others; this is all we know of the matter, and all that is necessary to form a class, or _genus_. I hate the sight of the Duke of W********* for his foolish face, as much as for any thing else. It should not astonish us, then, that when this physical difference is abolished, as it is when the object itself is a picture, or is minimized, as when the object is flat like the picture and resembles it closely, like a textile specimen, the boundary between the museum and the library practically disappears. He says, page 69, ‘If A and B be vibrations impressed successively, then will the latter part of A, viz. We read in a recent magazine article of the trials of Mrs. Then the count declared the battle ended and adjudged the church to the abbey; the contestants acquiesced and signed the charter confirming its rights.[573] In Italy, however, the duel was fought to an end; if stopped by darkness the judge was instructed to note carefully the respective positions of the combatants and replace them exactly the next morning, so that neither might derive advantage from the adjournment.[574] The issue at stake being death or dishonor, with severe penalties hanging over the vanquished, whether principal or champion, no chivalric courtesy was to be expected in these combats. The love of our own nation often disposes us to view, with the most malignant jealousy and envy, the prosperity and aggrandisement of any other neighbouring nation. What is religion? I think not. That he might think himself worthy of those honourable sentiments, and, whatever was the idea which other men might conceive of his character, that when he should put himself in their situation, and consider, not what was, but what ought to be their opinion, he should always have the highest idea of it himself, was the great and exalted motive of his conduct. Let me remind you that this has all been illustrative of my principle that library service, like every other kind of mundane activity, is a phase of the eternal struggle between keeping still and getting somewhere else. He was first led to their study by his brother Alexander, who presented him with the large linguistic collection amassed during his travels in South and North America. Of the libraries approached, some accepted the offer without finding any fault with the feature just noted; others refused to have anything at all to do with the plan; still others accepted on condition that the last page should be so altered that the reader could see clearly that it contained advertising matter.
It is the vanity, not the ease or the pleasure, which interests us. An adverse decision condemned it to wander lonely in the darkness, but a favorable verdict authorized its entrance into the happy fields of Elysium. It is scarcely worth while to multiply proof; but a few references will show the light in which the custom was regarded.[143] As employed by the Church, the rule was distinctly enunciated in the thirteenth century that the accused was not to be allowed to clear himself by canonical purgation when the crime was notorious or when the accuser offered to prove the charge.[144] The Welsh, however, were exceptional in this respect. Where the powers of body mind are well balanced—every thing is in its place—every part subservient to every other—all reduced to practice—then the mental and corporeal powers wear well—age brings few diseases, and no apprehensions—our peace of mind becomes more settled—our wisdom greater—our friendships more valuable, and we come to the grave in a full age, like a shock of corn in its season. It is therefore a question in this case what becomes of the ideas of likeness, equality, &c. Another feature pointing to the incorporative plan is the location of the object. Should the design be put in execution, and found efficacious, it will be applicable to other coasts, by taking every particular respecting them into consideration, and great will be the reward on the ambition attained of having endeavoured to benefit the community at large. The philosophy which Lucretius ethz phd thesis template tackled was not rich enough in variety of feeling, applied itself to life too uniformly, to supply the material for a wholly successful poem. To make a study of blank verse alone, would be to elicit some curious conclusions. Topsy-turvyness, especially when it involves the fall of things from a height; stumbling and awkwardness of all kinds; human oddities when they grow to provocative dimensions; all self-inflation with a view to force a reluctant notice; the manifold masqueradings of mortals; the unfitnesses of things to the demands of circumstances; extravagances, perversities, and the multitudinous follies of men; these which move the rough man to his unconsidered cachinnation move also the humorous man to his slower and _sotto voce_ note. A man, to get on, to be successful, conspicuous, applauded, should not retire upon the centre of his conscious resources, but be always at the circumference of appearances. R. Time in general is supposed to move faster or slower, as we attend more or less to the succession of our ideas, in the same manner as distance is increased or lessened by the greater or less variety of intervening objects. The study of the infant certainly supports this idea. See Thomson’s Seasons, Winter. As I have observed, the native genius had not arrived at a complete analysis of the phonetic elements of the language; but it was distinctly progressing in that direction. It has gradually come to be recognized in scientific circles that recent advances in psychology have made it impossible to pursue that science any longer entirely on a physiological, anatomical and histological basis. His Urquhart’s _Rabelais_ contains all the irrelevant information about that writer which is what is wanted to stimulate a taste for him. So little impression has Arnold’s opinion made, that his statement will probably be as true of the first quarter of the twentieth century as it was of the nineteenth. How specific may be the things that a board may properly require of its expert staff? The soldier who needlessly emphasises the fact that he possesses the height and spirit of his calling by strutting, by imposing vociferation and the rest, has probably always been a source of comic merriment, as the _Miles gloriosus_ of Plautus and the Bobadil of Ben Jonson may remind us. Not only may the presence of an element of feeling at the very beginning of an emotional experience be thus shown to be a necessary assumption, it can, in certain cases at least, be clearly observed. ] in which, also, the arms of the cross do not reach to the circumference of the wheel. Cheselden upon the young gentleman above-mentioned, whom he had couched for a cataract. In general, we were hard upon the moderns. In thus thwarting, from a sense of duty and propriety, the strongest of {170} all natural propensities, consists the heroism of his conduct. Under these circumstances it is interesting to inquire whether this type of service has any good points to offset its obvious disadvantages; and it is consoling to find that there are such–not enough to cause us to select an unsupported delivery station deliberately where a deposit or a branch would be possible, but enough to satisfy us that a delivery station is worth while if we can use nothing better and to induce us to lay stress, if we can, on the particular features that make it satisfactory. The learned Burton (_b._ 1577) quotes a number of physicians in favour of the ancient custom of enlivening the feast with mirth and jokes.[18] The reader may find references to the salutary effects of laughter in the latest text-books of physiology. A stack-room, it seems to me, is distinctly a closed-shelf arrangement. The latest writers of the French school, and I am sorry to add various Americans, servilely follow this groundless rejection of the older scheme, and speak of Malayans and Americans alike as Mongolians or Mongoloids. The Egyptians were right when they set a skeleton at their feasts. catalog has been much impaired by its inclusion of out-of-print books, and as, now that it is several years old, the number of these is increasing daily, its use has become more and more vexatious, both to librarians and publishers. Does man cross the seas, measure the heavens, construct telescopes, &c. Thesis template phd ethz.
The soft, the amiable, the gentle virtues, all the virtues of indulgent humanity are, in comparison, but little insisted upon, and seem, on the contrary, by the Stoics in particular, to have been often regarded as weaknesses, which it behoved a wise man not to harbour in his breast. In some cases, the reverse is the fact. The _imaginary_ is what we conceive to be: it is reality that tantalizes us and turns out a fiction—that is the false Florimel! In the race for wealth, for honours, and preferments, he may run as hard as he can, and strain every nerve and every muscle, in order to outstrip all his competitors. 129. They are usually not visible during the day, and if one does see them it is a sign of approaching illness, which suggests that it is the disordered vision of some impending tropical fever which may occasionally lead to the belief in their apparition. A moving picture man told me that only perishable ones were being made, as it was not for the interests of the trade that they should last long. To expect the master of a great estate to understand the details of his garden, his stable, his kennels, as well as the experts to whom he entrusts them, is absurd. Massinger’s is a general rhetorical question, the language just and pure, but colourless. This, I believe, states the situation fairly. Since it was evident, therefore, that the heavenly bodies did not move in straight lines, the indolent imagination found, that it could most easily attend to their motions if they were supposed to revolve in perfect circles. It is evident, however, that we are anxious about our own beauty and deformity, only upon account of its effect upon others. It is true, we form dear friendships with such ideal guests—dearer, alas! When we visit the palaces of the great, we cannot help conceiving the satisfaction we should enjoy if we ourselves were the masters, and were possessed of so much artful and ingeniously contrived accommodation. It may be added that, with respect to what is certainly present to our consciousness, when we look at this bit of child’s play we do not find the relation of part to part to be merely one of contrariety. At home he Exercises his Authority in granting his Letters, Pattents to Petitioners for erecting Shovel Board, Tables and Ginger Bread Stalls. Questions of morality do not always excite the same violent animosity; and this I think is because they do not so properly admit of dispute in themselves, also because they are not so often made the instruments of cabal, and power, and therefore depend less on opinion, or the number of votes, and because every one appealing to his own breast for the truth of his opinion attributes the continuance of the contest not to any want of force in his own arguments, but to a want of proper feelings in his opponent.—I will add here a remark in some measure connected with the last-mentioned observation, that the reason why men are generally more anxious about the opinion entertained of their understanding than their honesty is not so much that they really think this last of less consequence as that a man always believes himself to be the best judge of what passes in his own breast. Schopenhauer, for example, in setting out his theory of the ludicrous—a theory which we shall deal with later on—in the first volume of his chief work, thought it “superfluous” to illustrate his theory by example. It may be said to pass yawning gulfs ‘on the unstedfast footing of a spear:’ still it has ethz phd thesis template an actual resting-place and tangible support under it—it is not suspended on nothing. No one admires or delights in the Scotch Novels more than I do; but at the same time when I hear it asserted that his mind is of the same class with Shakespear’s, or that he imitates nature in the same way, I confess I cannot assent to it. |
global_01_local_0_shard_00002368_processed.jsonl/30122 | The Blog
Sync Domain Time with External NTP Server
Time synchronization across a domain is important for Kerberos authentication. Authentication issues means potential issues with file shares, logons etc, not good stuff. Active directory handles time sync by ensuring all domain-joined computers sync their time with a domain controller and all domain controllers sync with the domain controller which has the PDC role.
Other than time synchronization being important, time accuracy is also important. If all of your computers sync with your PDC but your PDC time is incorrect this can also cause problems. Problems include authentication issues with non domain syncing devices and logging accuracy.
The following command will sync the local server with 'pool.ntp.org' .
w32tm /config /manualpeerlist:pool.ntp.org /syncfromflags:manual /reliable:yes /updatew32tm /config /manualpeerlist:pool.ntp.org /syncfromflags:manual /reliable:yes /update
Once your PDC is syncing time with an external source you can run this command to sync right away.
w32tm /resync
You can also run the command on client computers manually or in a batch file if you don't want to wait for the next time sync interval. Still having time sync issues or do you have a server refusing to sync it's time? Check out Network Share Not Accessible: Server’s Clock is Not Synchronized.
Neil Bryan
IT Consultant & Technical Trainer
Leave a Reply
Skip to toolbar |
global_01_local_0_shard_00002368_processed.jsonl/30162 | Bonus code: FUNTASTIC
Valid until: 2019-09-08
Games allowed: Slots
Play through: 30xB
Casino bonus information
Redeem the bonus at the casino cashier
The bonus requires a minimum deposit of $25
The bonus is valid for depositing players.
The bonus is valid for the following games: T Rex
Happy spinning the offer together with 77% match bonus.
Spin it to win it!
Play Slotastic Casino |
global_01_local_0_shard_00002368_processed.jsonl/30164 | Election observation in Africa
Robert Macdonald (University of Edinburgh)
Thomas Molony (University of Edinburgh)
Politics and International Relations
Appleton Tower, Seminar Room 2.12
Wednesday 12 June, 8:45-10:15
Short abstract:
This panel will critically engage with both domestic and international election observation on the African continent.
Long abstract:
In the last three decades, the presence of both domestic and international election observers has become a point of continuity at elections in many African countries. As a result, since the 1990s, researchers have been investigating the efficacy and impact of observation in Africa. Among the issues which they have raised, several key themes can be highlighted: How effective are observers at detecting electoral fraud? Are they biased? Against which standards do they judge elections? How are they perceived in host countries? Does their presence lead to unintended consequences? This panel will accept paper proposals addressing these or any other associated questions, including those relating to digital technology. Papers can be single country case studies or take comparative approaches, and both qualitative and quantitative methodologies are welcomed. |
global_01_local_0_shard_00002368_processed.jsonl/30175 | Re: Outlook Bug When Scrolling Through Messages
kelby carlson
Yes, I believe so.
On 8/7/19, George Bell <george@...> wrote:
Are both systems running the same version of Windows 10? The current
version is 1903, but there have been updates to even that version recently.
From: <> On Behalf Of kelby carlson
Sent: 07 August 2019 14:31
Subject: Re: [nvda] Outlook Bug When Scrolling Through Messages
I don't believe the ad-ons are any different on my laptop than my desktop.
I also have a home laptop with the latest NVDA, WIndows 10, and Outlook,
which does not have this problem. This leads me to believe it must have to
do with the specific computer, though I can't imagine what the problem is.
They are both Lenovo brand.
Kelby Carlson
Join to automatically receive all group messages. |
global_01_local_0_shard_00002368_processed.jsonl/30184 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://ocw.u-tokyo.ac.jp/highschool/60%Weekly2016-12-26 07:10 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.