id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00002368_processed.jsonl/34359 |
Why Data is the New Oil — and Why It Isn’t
AdSpark Team - 10 months ago
In today’s Information Age, data is a valuable commodity. Companies, both private and government, need an efficient data system to function well and charter progress. But it was the rise of the tech titans like Facebook and Google that showed us how an immensely valuable asset data is.
How they were able to see its fundamental value during the rise of the digital economy, and learned how to mine, extract, and use data helped them reap its untapped potential, ushering in a new era of society where everything is powered by data; not unlike a century ago when the first commercially-viable oil well was discovered and triggered the modern oil industry as we know it.
This is why many industry experts believe that data is the new oil.
The comparisons don’t end there, however.
Where similarities meet
If data is the new oil, one has to remember that oil, if unrefined, is still sludge; it first has to be processed to become of value. Likewise, without thoughtful data processing, analysis, and insighting, data will remain as just numbers. As Adam Kleinberg (CEO, Traction) so succinctly put it, “Too often it is assumed that data is the same thing as insight. But without understanding, data is just noise.
Luckily, much like how the oil industry boom brought about various new innovations that made use of oil (kerosene lamps and motor cars, for starters), the rise of data has also encouraged companies to make use of information in more creative ways.
For example, the videos that platforms like YouTube recommend to you are personalized based on your previous views, and the ads that you are served on any website are likely specifically catered to you based on your browsing behavior.
Whether we notice it or not, data and oil make the world as we know it go ‘round.
Where lines are drawn
However, one could argue that data, as a resource, is even better than oil.
While oil is controlled by a few large corporations, a large chunk of data isn’t entirely limited to a few. Companies, irrespective of their size, can make use of internal and external data through infrastructure. In fact, private individuals can also have access to, and make use of, data.
One thing that helps democratize data access is the fact that it is a non-rivalrous resource. Data can be shared and used between many individuals or companies — you can provide websites access to your browser cookies while still able to keep that information on your device.
And the fact that that very same data is probably being stored and processed many times over in various ways is probably making it more powerful. For example, Spotify streams are aggregated to rank the top-ranking songs on the platform.
Beyond this, Spotify also processes the same data to give you your yearly #SpotifyWrapped playlist, and it has probably also used your data to recommend songs you like to someone who has the same taste in music as you.
Moving forward with data
But perhaps the most exciting thing about living in the Information Age is: data is practically infinite. While the world is using oil at such breakneck speed that scientists are now looking for alternative sources of energy, we’ve only ever actually used and analyzed .5% of all data available.
At AdSpark, our mission is to try and wield as much data to power your campaigns. That means collecting and analyzing consumption and conversation data across the web and social media, using that information to plan creatives and media, and using audience data to distribute these campaigns across various channels.
If you’d like to learn more about our solutions, you can check out our portfolio of products and services, or contact us through our website or through email.
Toonders, J. (2014). Data is the new oil of the digital economy. Retrieved from
Rajan, A. (2017). Data is not the new oil. Retrieved from
Marr, B. (2018). Here’s why data is not the new oil. Retrieved from
Sadowski, J. (2016). Companies are making money from our personal data – but at what cost? Retrieved from
Palmer, M. (2006). Data is the new oil. Retrieved from
Kleinberg, A. (2018). Marketers’ qualitative insights get lost in big data noise. Retrieved from
New, J. (2018). Why do people still think data is the new oil? Retrieved from
Guess, A.R. (2015). Only 0.5% of all data is currently analyzed. Retrieved from
AdSpark Team
View all articles by this author |
global_01_local_0_shard_00002368_processed.jsonl/34373 | On the Spread of Untruth
In Richard Dawkins’ conception, human being is the medium through which information and ideas, or memes, spread. However, we constitute a poor medium which favors the spread of untruth rather than truth. As pointed out by Curtis Yarvin, human beings find nonsense as a more effective organizing tool than truth. To believe in truth is easy, but to believe in nonsense is an unforgeable demonstration of loyalty. History is full of examples of this phenomenon in action: all organized religions (such as Christianity), Soviet Union, China’s Cultural Revolution, and today’s mainstream media and academia (what Nassim Nicholas Taleb called the Intellectual Yet Idiots).
We can also reinterpret the tale of the emperor’s new clothes. For kids, the moral is honesty and courage in speaking the truth. For adults, it is that the best proof of a cadre’s loyalty is her dedication to the absurdity and stupidity of the leader.
How to Hide a Secret in the Information Age
A wealth of information creates a poverty of attention, as Herbert Simon said. When attention is scarce, secrets can be hidden. Dialogues from G. K. Chesterton’s The Sign of the Broken Sword illustrate this vividly.
Father Brown: Where does a wise man hide a pebble?
Flambeau: On the beach.
Father Brown: Where does a wise man hide a leaf?
Flambeau: In the forest.
Father Brown: What does he do if there is no forest?
Flambeau: What does he do?
Father Brown: He grows a forest to hide it in. A fearful sin.
Flambeau did not answer.
Father Brown: And if he wished to hide a dead leaf, he would make a dead forest. And if a man had to hide a dead body, he would make a field of dead bodies to hide it.
The Half-Life of Information
Facebookers write for the next few minutes or hours. Newspapermen write for the next few days. Corporate entertainers (consultants, economists, and all sorts of “thought leaders”) write for the next few months or, more rarely, years. A minority of academics write for the next decade or beyond. Men of letters write for time and for memory.
Life is short. The shorter the half-life of the information, the lower the signal-to-noise ratio, the less time you should spend on it.
Two Parables on the Information Economy
1. Immanuel Kant’s observations on student note-taking in 1778:
2. Jorge Luis Borges’ 1942 short story Funes the Memorious on a person with perfect memory:
|
global_01_local_0_shard_00002368_processed.jsonl/34376 | Mrs. Emily Durham
Phone: 205-228-3500
Degrees and Certifications:
B.S in Early Childhood Education Masters in Elementary Education
Mrs. Emily Durham
This is my 18th year teaching. I have taught Kindergarten and Second grade. I was also a Reading and Math interventionist for two years. I have three girls who attend Magnolia Elementary. At home I have 2 cats, 1 dog, 1 hamster and 1 fish! My hobbies are gardening, reading, and spending time with me family. |
global_01_local_0_shard_00002368_processed.jsonl/34393 | 3D Coffin Clear Stamp Set*
Collections: ALL Halloween, Clearance
Product type: Rubber Stamps
Tags: Clear Stamps, Clearance, Halloween
This is a great little set of clear stamps to use for building a coffin with a lid (and bunches of the stamps included for decorating the coffin are also good for general Halloween projects).
Also includes a skull, a bony hand, a wilted rose, ravens, guns crossed, a horseshoe, knives crossed, a cross, captions of "Nevermore", "Deadman's Delight", "Loathsome Grub", and more.
Stamp image on surface, score fold lines, cut out shape, secure tabs with glue and embellish. When folded together, the coffin is 3-1/2" tall.
21 stamps!
instructions 191003new |
global_01_local_0_shard_00002368_processed.jsonl/34395 | Category: Women of the Bible
In the book of Joshua, we are introduced to one of the most thought-provoking and astonishing heroines of the Old Testament. Rahab, the prostitute of the Canaanite city of Jericho, ultimately is noteworthy for her great faith and for her place in the lineage of Jesus Christ. But a closer examination of the life of this remarkable Gentile woman can lead to deeper insights into God’s plan for His church and His dealing with individual believers in grace and mercy.
Rahab’s story is found in Joshua 2–6. This passage describes the conquest of the fortified city of Jericho by the Israelites. In its day, Jericho was the most important Canaanite fortress city in the Jordan Valley. It was a stronghold directly in the path of the advancing Israelites, who had just crossed the Jordan River (Joshua 3:1-17). Before entering the land west of the Jordan, Joshua sent two spies to look over the land. The king of Jericho heard that two Israelite spies were within his city and ordered them to be brought out to him. Rahab, the woman with whom the spies were staying, protected them by hiding them on her roof. She told them how the citizens of Jericho had been fearful of the Israelites ever since they defeated the Egyptians via the Red Sea miracle (some 40 years prior). She agreed to help them escape, provided that she and her family were spared in the upcoming battle. The spies agreed to her request, giving her three conditions to be met: 1) she must distinguish her house from the others by hanging a scarlet rope out of the window so the Israelites would know which home to spare; 2) her family must be inside the house during the battle; and 3) she must not later turn on the spies.
Safely escaping the city, the two spies returned to Joshua and reported that the “whole land was melting with fear.” The Israelites crossed the Jordan into Canaan where they laid siege to the city of Jericho. The city was completely destroyed, and every man, woman, and child in it was killed. Only Rahab and her family were spared. Ultimately, Rahab married Salmon, an Israelite from the tribe of Judah. Her son was Boaz, the husband of Ruth. Joseph, the legal father of Jesus, is her direct descendant.
Rahab was a young Canaanite prostitute and as such not a very likely candidate for a heroine of the faith. Jericho was one of the principal seats of idol worship, being especially devoted to Ashtaroth, the goddess of the moon. Here was centered all that was the vilest and most degrading in the religion of the Canaanites. Many Bible commentators, eager to remove the stigma of the designation “harlot” from one included in the genealogy of Christ (Matthew 1:5), have described Rahab as a hostess or tavern keeper. But scriptural usage of the Hebrew word zanah (Leviticus 21:7-14; Deuteronomy 23:18; Judges 11:1; 1 Kings 3:16) and the authority of the apostles (Hebrews 11:31; James 2:25), establish the credibility for use of the word “harlot.”
It is clear that Rahab was perceptive, intelligent and well informed. Rahab identified the spies for what they were, hid them, and had a plausible story ready with which to deceive the king’s agents. Rahab didn’t deny that she had entertained the men. She says that they left at dusk when it would be difficult for anyone to be sure of clearly seeing anything. The agents did not dare to risk stopping to search Rahab’s house because, if they did, the spies might get away. Finally, the Canaanite prostitute gives the two Israelites excellent advice. She tells them to hide in the hills for three days before attempting to cross the Jordan.
Spiritually, Rahab was not in an ideal circumstance to come to faith in the one true God, the God of Israel. She was a citizen of a wicked city that was under God’s condemnation. Rahab was part of a corrupt, depraved, pagan culture. She had not benefited from the godly leadership of Moses or Joshua. However, Rahab had one asset—she had heard from the many men she came into contact with that the Israelites were to be feared. She heard the stories of their escape from Egypt, the crossing of the Red Sea, the wanderings in the wilderness, and their recent victory over the Amorites. She learned enough to reach the correct, saving conclusion: “For the Lord your God is God in heaven above and on the earth below” (Joshua 2:11). It is this change of heart, this faith—coupled with the actions prompted by faith—that saved her and her family.
It is often said that Rahab, while being a true historical person, also serves as a symbolic foreshadowing or “type” of the church and Gentile believers. She was, in fact, the first recorded Gentile convert. There are many ways in which Rahab depicts the church. First, she was part of a pagan world system, a prostitute, who by her conversion was enabled to become a legitimate bride. In like fashion, Israel was the first chosen people of God, but they were set aside temporarily so the Gentiles could be brought into the kingdom of God, and the church is now considered the bride of Christ (Romans 11; Ephesians 5:25-27). Second, Rahab, because she welcomed the spies, was saved because of her faith in “God in heaven above and on the earth below” (Hebrews 11:31). Likewise, Christians are saved through faith in Jesus Christ. “For it is by grace you have been saved, through faith—and this not from yourselves, it is the gift of God” (Ephesians 2:8).
Third, although Rahab and Christians are saved by an act of grace through faith, true faith requires and is exemplified by action (James 2). Rahab had to put the scarlet cord out of the window. Christians must accept Jesus Christ as their Savior and Lord and then go on to live in a manner that verifies that our faith is real. Fourth, Rahab could have indicated the location of her home in any number of ways. But the only way that she could be spared was to follow the directions given to her by the Israelite spies. The world tells us that there are many ways to God and salvation, all equally valid. But the Bible tells us, concerning Jesus Christ, that “salvation is found in no one else, for there is no other name under heaven given to men by which we must be saved” (Acts 4:12). Fifth, Rahab’s faith enabled her to turn away from her culture, her people, and her religion and to the Lord. Commitment to a true faith in God may necessitate setting priorities that are contrary to those of the world, as we are exhorted to do in Romans 12:2.
Finally, once we come to Christ, our pasts no longer matter. The slate is wiped clean for all who believe and accept the sacrifice of Jesus on the cross on our behalf. Rahab was no longer viewed as an unclean prostitute, but as one worthy by grace to be part of the lineage of our Lord Jesus Christ. Just as she was grafted into the line of Christ, so we become children of God and partakers in His inheritance (Romans 11). We find in the life of Rahab the inspiring story of all sinners who have been saved by grace. In her story, we learn of the amazing grace of God that can save even the worst of sinners and bring them into an abundant life in Christ Jesus.
Zipporah in the Bible was the wife of Moses and the daughter of Jethro, the priest of Midian. When Moses fled from Egypt to the land of Midian, he met Jethro’s seven daughters, who were having some trouble getting enough water for their flocks (Exodus 2). In that area, the troughs for watering flocks were being monopolized by some shepherds who denied Jethro’s daughters access to the troughs. Moses assisted the women by driving the shepherds away so their flocks could be watered. Zipporah was among the sisters helped by Moses.
Zipporah and her sisters brought Moses back to their tent to meet their father, the priest of Midian, who liked Moses. Moses was content to stay there in Midian (Exodus 2:21). Moses later married Zipporah and began a new life. Zipporah gave birth to a son. Moses named him Gershom, a name that sounds like the Hebrew word meaning “a foreigner there.” Gershom’s name was a reminder that Moses was a foreigner and living among foreigners. Later, Zipporah had another son named Eliezer (Exodus 18:4).
Later in the book of Exodus, there is a strange passage involving Zipporah. Moses and his wife are traveling to Egypt because God had told Moses to bring the Israelites out of bondage (Exodus 3). On the way, Moses and Zipporah stop at an inn, and the Lord meets Moses there, seeking to kill him. Perceiving that Moses was in mortal danger, Zipporah takes a sharp stone and circumcises her son. She takes her son’s foreskin and, touching Moses’ feet with it, she utters the enigmatic statement, “Surely you are a bridegroom of blood to me!” (Exodus 4:25). Her action worked. After Zipporah’s intervention, the Lord left Moses alone. The Bible does not explicitly explain why the Lord desired to kill Moses, but it was probably because Moses had not performed the rite of circumcision. Circumcision was an important symbol of the Abrahamic Covenant, and the lack of circumcision would mark a person as cut off from God’s people (Genesis 17:9–14). For Moses to neglect to circumcise his son was an affront to God, as if he were saying that he and his family did not truly belong to God. How could Moses be an effective leader of God’s people if he were in violation of God’s clear command?
Zipporah’s words to Moses are puzzling, but the text explains that “she said ‘bridegroom of blood,’ referring to circumcision” (Exodus 4:26). It seems that Zipporah was angry at having to perform the rite, which should have been completed by Moses. Sometime after this incident, Moses sent Zipporah and his two sons back to Midian to stay with Zipporah’s father (see Exodus 18:2–3).
Phoebe is mentioned only once in the Bible, in Romans 16:1–2, where Paul writes, “I commend to you our sister Phoebe, a deacon of the church in Cenchreae. I ask you to receive her in the Lord in a way worthy of his people and to give her any help she may need from you, for she has been the benefactor of many people, including me.”
Letters of introduction to strangers were common in Bible times. The mention of Phoebe in this way means that she was probably either the bearer of the letter or accompanied those who took it to Rome. The name Phoebe means “bright and radiant,” and from Paul’s comments about her it seems that those words characterized her personality and her Christian life.
Paul’s reference to Phoebe as “our sister” indicates that she was a member of the Christian church and his sister in Christ. Her designation as “deacon” (or “servant” in the ESV) could mean that she held an official position within the church as a deaconess or simply that she was someone who was known to serve the church faithfully (the Greek diakonos means “servant”). Whether or not Phoebe had the title “deaconess,” it is clear that she was a trusted member of the body of believers in Cenchreae, a seaport about eight or nine miles from Corinth.
Paul commends Phoebe to the Roman believers and asks that they receive her in a gracious and friendly manner into their homes and hearts with love and affection. She was to be welcome in their church fellowship. Asking for her to be received “in a way worthy of [God’s] people” means that the church should treat Phoebe with the special respect and Christian love that should characterize all believers’ interactions with one another. Even those believers we have never met before should be welcomed with love, for we share a bond in the Lord (John 13:35). Phoebe was to be aided in whatever business she would be conducting in Rome.
Paul adds that Phoebe was a helper of many. Phoebe may have shown great kindness in various ways to other Christians, perhaps receiving them into her house in the manner of Martha and Mary (Luke 10:38–40). Perhaps she ministered to the sick, helped the poor, and aided widows and orphans in the manner of Tabitha (Acts 9:36). Maybe she ministered to strangers and travelers in the manner of John’s “elect lady” (2 John 1). Paul himself was a beneficiary of Phoebe’s kind servant’s heart. Whatever Phoebe’s precise role in the church, the inclusion of her name in Romans 16 is a testimony to her character and ensures that she will never be forgotten. |
global_01_local_0_shard_00002368_processed.jsonl/34402 | Amsterdam City Farm
Amsterdam City Farm
About us
Amsterdam City Farm has a knack for creating an organic, fresh, strong and sturdy ginger beer. It’s feisty and comes with that unmistakeable punch of ginger. It is exceptional because it is crafted locally, right in the heart of Amsterdam, by true ginger beer enthusiasts.Like we always say, the magic happens when you shake it!
Share to |
global_01_local_0_shard_00002368_processed.jsonl/34411 | Live Chat
Files, Media and Binary Data
All binary data (pictures, uploaded files, etc.) is represented in Anvil as “Media objects”.
Media Objects
Media Objects are created by Anvil APIs such as FileLoader components and the Google Drive API. You can also create them directly in Python code from byte strings or source URLs.
You can pass Media objects to and from server functions, store them in Data Tables, and use them with Anvil components.
Here are a few things you can do with Media objects:
• Display a picture in an Image component by setting its source property to a Media object.
• When a user uploads a file into a FileLoader component, the FileLoader’s file property is a Media object.
• You can send and receive email attachments as Media objects.
• You can open any Media Object by setting the url property of a Link to a Media object. This opens or downloads the media when the link is clicked.
• You can trigger a Media Object download in the user’s browser by calling in any client-side code.
• You can store media in a Data Table, with the “Media” column type.
• Canvas components can take a snapshot of what you’ve drawn as a Media object by calling get_image().
• Google Drive files are Media objects. You can set the contents of a new Google Drive by passing a Media object to create_file(), or you can upload new contents to an existing file by calling set_media().
You can do all these things without needing to manually manipulate the binary data.
If you do need to access the underlying data and metadata, you can use the attributes and methods of the anvil.Media class listed below.
Using Media Objects directly
API Docs: anvil.Media | anvil.URLMedia | anvil.BlobMedia
All Media objects are subclasses of anvil.Media and all have these attributes and methods:
Tells you the MIME type of this media. This is a string with values like "text/plain" or "image/png".
A number that tells you how many bytes long this media is.
A string containing the filename of this Media object (or None if it is anonymous)
Gives you a URL where this media can be downloaded, if this Media is “permanent” (e.g. if it is stored in Data Tables, or a Google Drive file). If a Media object is not permanent (e.g. it is an anonymous BlobMedia object), its url property will be None. However, you can still download non-permanent Media objects using Link components, or display them with Image components.
Some media’s URLs are accessible from anywhere on the web (e.g. URLMedia('')).
But some media objects provide a special URL, which is only valid for this browser session using this app. For example, the url of media from a data table is only valid in the session when it was generated.
A method that returns the content as a string. For binary content such as images, this isn’t very pretty to print out, but it gives you direct access to the raw content of this Media.
This example gets the website and prints the data and metadata made available by its Media object.
my_media = anvil.URLMedia('')
print(f'url: {my_media.url}')
print(f'content_type: {my_media.content_type}')
print(f'length: {my_media.length} bytes')
# This will be `None` since this is a website, not a file
print(f'name: {}')
# Only print the first 15 bytes
print(f'raw bytes: {my_media.get_bytes()[:15]} ...')
This prints:
content_type: text/html
length: 38653 bytes
name: None
raw bytes: <!DOCTYPE html> ...
Constructing Media Objects
As well as getting Media objects from FileLoaders, Google Drive and other Anvil APIs, you can construct them yourself in code.
URLMedia gets media from a URL. This example gets media for the Anvil logo, and displays it in an Image component called image_1.
my_media = anvil.URLMedia("")
self.image_1.source = my_media
URLMedia only stores a URL; it does not fetch its data unless the length or content_type attributes are accessed, or get_bytes() is called.
Because of browser security restrictions, it is often not possible to directly grab the bytes in client-side code, although you will still be able to display it in an Image component.
If you get an exception like Failed to load media:, the endpoint you are trying to access may not allow requests from client-side code. Try fetching the bytes from a Server Module or Uplink script instead.
See Browser Restrictions for more info.
BlobMedia gets its media from a string you specify. This example makes a new BlobMedia containing a string of text, and then uploads it to an app file on Google Drive.
file_contents = "Hello, world"
my_media = anvil.BlobMedia(content_type="text/plain", content=file_contents, name="hello.txt")
Uploading and downloading files
Files can be loaded into the browser using the FileLoader component.
To upload them to your server-side code, simply pass the FileLoader’s file property as an argument to a server function.
The uploaded file will be a Media object. These can be stored directly in Anvil’s Data Tables in a Media column.
The download() function allows you to download any Media object as a file in the user’s web browser. This example creates and downloads a file called hello.txt.
text_file = anvil.BlobMedia('text/plain', 'Hello, world', name='hello.txt')
download() is available in Form code only.
Since you can store Media objects in your Data Tables, you can download files stored in Data Tables. Retrieve them in the same way as you would a string, integer or other data type. When the Media object is retrieved, it will still be a Media object; its format does not change from when it was originally loaded into the browser.
You can also create a download button with a Link. Media objects have a url property containing a URL that the user can access to download the file. Set this as a Link component’s url to give the user a clickable link that downloads the file. Media objects must be ‘permanent’ in order to have a URL - this means they must be stored in a Data Table, Google Drive, or originally retrieved from a URL.
Files in Server Modules
You can read and write to/from the filesystem in Server Modules just as you would in any Python environment. Your filesystem is your own; other users do not have access to it.
def write_a_file(my_string):
with open('/tmp/my-file.txt', 'w+') as f:
def read_a_file():
with open('/tmp/my-file.txt', 'r') as f:
contents =
Anvil also has methods to write to files from Media objects.
If you’re using a Python library that wants you to pass it a filename, this can be really useful for writing some data into a file, then passing the file_name to the library you’re using.
media_object = anvil.BlobMedia('text/plain', 'Hello, world', name='new.txt')
with as file_name:
# Now there is a file in the filesystem containing the contents of media_object.
# The file_name variable is a string of its full path.
Read from files to Media objects using this function:
import, [content_type], [name]) |
global_01_local_0_shard_00002368_processed.jsonl/34439 | Starting from single-loop kinematic chains whose pairs present different connectivities when the chains are displaced in different positions, the paper shows how to assemble multiloop chains with numbers of degrees of freedom that change due to continuous variations in the position variables of the chains. This special mobility property is called kinematotropy. The paper provides a method (based on the displacement group theory) to form chains that allow any desired change in the number of degrees of freedom, with a sudden or gradual increment of this number. Several examples are presented and applications are discussed.
This content is only available via PDF.
You do not currently have access to this content. |
global_01_local_0_shard_00002368_processed.jsonl/34452 | Ticklebuddy Wonderpoo (aubkabob) wrote,
Ticklebuddy Wonderpoo
• Mood:
i've never gotten involved in politics much at all. in fact, usually, whenever someone starts talking about it, my eyes immediately glaze over and my mind starts humming 'i can't hear you i can't hear you' to the tune of 'mary had a little lamb'.
but this election.... egads. things are getting ugly and horrific. our government, from everything i read, is threatening another terrorist attack on us, if we vote for kerry. that, to me, is a threat. that, to me, makes it sound more like a dictatorship than a democracy. 'do as we tell you, or you will be smited!'
after dealing with all of the unemployment of the last few years, of dealing with dropped sales because people can't afford to go out and shop, of hearing accusation after accusation towards other countries, after seeing country after country either come to hate us, or get in trouble for assisting us...
i just want to shake everyone and scream 'THE LAST FOUR YEARS OBVIOUSLY HAVEN'T WORKED OUT!!!! IT'S TIME TO TRY SOMETHING NEW!!!!'
i mean, the definition of insanity is 'continuing the same action and expecting a different reaction', isn't it!?
• Post a new comment
Comments allowed for friends only
Anonymous comments are disabled in this journal
default userpic
Your reply will be screened
Your IP address will be recorded |
global_01_local_0_shard_00002368_processed.jsonl/34453 | Quote Of The Year
Friday, April 22, 2016
Those Who Are Hoping For Serious Change May Be Bitterly Disappointed With The New ADHA.
This appeared earlier today.
Govt names new e-health leadership
Preparing for the abolition of NeHTA.
Read about the other nominees here:
Reading through the list it is clear that what is most missing is private sector e-Health expertise and rather little clinical expertise. I wonder what the new chair makes of the fabulously high quality Draft Strategic Plan he has been given to work with.
We can all wait and watch to see what happens - and certainly it is good there are some people outside the Government Sector involved - but I still rather fear little will change.
The last hope is the quality and experience of the CEO - who is yet to be appointed. An inspired choice could make all the difference - time will tell! I note from Google news the new chair says he is said to be 'utterly committed' to making the myHR work. Given it needs to be scrapped, or at least fundamentally re-designed so as to be unrecognisable from what we have now, that will be quite a trick, but he had to say that to get the job I bet!
Anonymous said...
What was he doing all that time he was on the board? Wasn't he committed then? Has something changed? Flying pigs and lipstick.
Anonymous said...
I do agree the private sector does seem to be missing, however the board is supported by advisory groups (yes without a private hospital one). The real test will be if they leave key senior level people in place, my fear is without a complete change to the various secretary roles and NEHTA executives then any attempt to investergate the issues and transparently propose change will be lost, none in these roles currently have demonstrated a willingness to admit mistakes and look to resolve them, any attempts to do so in the future will be hampered IMHO unless a sweeping change in made. Everything thing from Terminology, Informatics, Architecture, Engagements, CCA and security and privacy has been in steady decline for many many years to a point were I question if DOH and NEHTA have a skills based qualified to lead a national program. |
global_01_local_0_shard_00002368_processed.jsonl/34475 | Action Alert
Join the Global Climate Strike. Oppose Israel’s climate apartheid.
Tell multinational corporations to stop investing in fossil fuels and in Israel’s oppression of the Palestinian people.
We’re joining the Global Climate Strike (20-27 September), demanding an end to fossil fuel use, climate justice for all, and government action at the UN Climate Summit.
The increasingly catastrophic climate crisis, fueled by global inequality, has been engineered by complicit corporations and governments that put profit before people and planet.
The least powerful are the most affected by the climate crisis. With no control over their land or natural resources, indigenous Palestinians under Israel’s repressive regime endure climate apartheid.
Multinational corporations invest in fossil fuels and in Israel’s oppression of the Palestinian people, pillage of Palestinian natural resources, and exploitation of Palestinian land.
Take Two Actions Now:
1. Click to tell UK bank HSBC to stop financing Israeli repression and the fossil fuel industry
2. Click to tell French insurance giant AXA to divest from Israel’s colonial regime and from fossil fuels destroying the planet
Water, air and soil pollution caused by Israel’s blockade of and wars on Gaza poison life there. In the rest of the occupied Palestinian territory, Israel steals Palestinian land and water, and destroys hundred-year-old olive trees and solar energy installations.
Israel works to “greenwash” its image. Yet Israel is developing major gas fields for export, and 97.7% of its electricity production comes from fossil fuels. Warfare, a regular activity of Israel’s government, is also one of the world’s most polluting industries.
The struggles against racism and militarization, and for climate, economic and social justice are profoundly interconnected. Join climate week actions in your area, and take action to end Israel’s climate apartheid against Palestinians.
Stay updated!
|
global_01_local_0_shard_00002368_processed.jsonl/34483 | Down in southern New Jersey, they make glass.
By day and by night, the fires burn on in Millville
And bid the sand let in the light
Carl Sandberg
Image 01
At the Wheaton Creative Glass Center
Wheaton Arts and Cultural Center ~ Millville, NJ
Combo 1
Combo 2
Image 06
Image 08
Image 07
1. MikeP Says:
Fascinating… really like the addition of the video. What is annealing????
2. Ralph Berglund Says:
Put it on your list. There are pros and apprentices working in the Glass Studio probably every day, and their museum of American Glass is competitive with New York state’s Corning Glass Museum.
Annealing is placing a hot object in an oven/furnace in which the temperature is reduced gradually over days so that the object cools without cracking. The object that he’s carrying in the picture will be clear when cooled. The color in the picture comes from the fact that it’s so hot. The gathers that are applied are at around 2000 degrees, and the object hasn’t cooled that much while she was working on it.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
global_01_local_0_shard_00002368_processed.jsonl/34485 | Facts About Autism
Autism is a developmental disability that typically appears during the first three years of life. It is a neurological disorder that affects the development of the brain, causing difficulty with communication, learning, and social interaction. It is one of several Autism Spectrum Disorders (ASD) – also known as pervasive developmental disorders (PDD) – that include Asperger’s Syndrome, and pervasive developmental disorder not otherwise specified (PDD-NOS). Children with Autistic Disorder may appear relatively normal in their development until the age of 18 to 30 months. The signs may be subtle at first. That’s why many children with Autistic Disorder are undiagnosed until toddler hoodn and beyond. Other children may show delays in development and unusual behaviors almost from birth. Developmental delays may occur in language, play skills, or social interaction. Following is a brief summary of the symptoms of Autistic Disorder (adapted from the Autism Society of America’s web page: “What Is Autism?”).
What are the symptoms of Autism?
Communication: A child with Autistic Disorder may learn language slowly or not at all; words may be used without attaching the usual meaning to them; gestures may be used instead of words; may ignore other’s speech; may use “nonsense” language; may have a short attention span.
Social Interaction: A child with Autistic Disorder may prefer to spend time alone rather than with others; may show little interest in making friends; may be less responsive to social cues such as eye contact or smiles.
Sensory Impairment: A child with Autistic Disorder may have unusual reactions to physical sensations, certain textures, sounds, smells, tastes, or sights; may be overly sensitive to touch or under-responsive to pain; any of the senses (sight, hearing, touch, pain, smell, and taste) may be affected to a greater or lesser degree.
Play: A child with Autistic Disorder may show a lack of spontaneous or imaginative play; may not imitate others’ actions; may have difficulty pretending.
Behaviors: A child with Autistic Disorder may be hyperactive or very passive; may have frequent tantrums for no apparent reason; may focus intensely on a single item, idea or person; may follow exact routines in the way they do things and may be very upset if the routine is changed; may show an apparent lack of common sense; may show aggressive or violent behavior or injure self.
What To Do: If you suspect your child has Autistic Disorder or several of the symptoms and/or shows a delay (or loss) in their development or skills, contact your child’s physician, your local health department, your child’s school, or your local mental health agency. Don’t be put off. Be persistent. Don’t settle for the same old answers: “He/she will outgrow it.”; or: “Boys talk later than girls.”; etc. This is your kid, be an advocate until you are sure nothing is wrong!
How prevalent is Autism?
The number of diagnosed cases of autism and similar disorders has dramatically increased over the past decade. The most recent studies report that Autism Spectrum Disorders (ASDs) occur in approximately one in every 100 individuals in the United States. ASDs are the second most common serious developmental disability, following mental retardation. Autism is four times more likely to occur in boys than in girls.
How is Autism diagnosed?
There are no medical tests for diagnosing autism, but when parents become concerned about developmental delays in children, they should consult a physician. He or she can rule out various potential medical causes, such as hearing problems. Before a child can be diagnosed with autism, that child should be evaluated by an autism specialist. Such a person may be a psychologist, psychiatrist, pediatric neurologist, or developmental pediatrician who’s focus is on diagnosing and treating children with ASD. Best practice guidelines identify the following six components of a comprehensive diagnostic evaluation for autism:
• Parent or caregiver interview
• Cognitive/developmental assessment
• Direct play observation
• Measurement of adaptive functioning
• Comprehensive medical examination
The diagnosis of autism is made when certain characteristics listed in the Diagnostic and Statistical Manual of Mental Disorders (DSM-IV) are present in rages that are inappropriate for the child’s age. The diagnosis of pervasive developmental disorder not otherwise specified (PDD-NOS) is made when a child exhibits fewer symptoms that are present in autism, although the symptoms that are exhibited may be similar to those seen in a child with autism diagnosis.
What causes Autism?
Although one specific cause for autism is not known, current research links autism to biological and neurological differences in the brain. Autism is believed to have a genetic basis, although no single gene has been directly linked to the disorder. Researchers are using advanced brain-imaging technology to examine environmental factors that may contribute to the development of autism. MRI ( Magnetic Resonance Imaging) and PET (Positron Emission Tomography) scans can show abnormalities in the structure of the brain, with significant cellular differences in the cerebellum.
What treatments are recommended?
Most researchers agree that the sooner a child with autism begins an intervention program, the better. At this time, the best approach for autism treatment should involve special educators, psychologists, and speech and occupational therapists. Although medications are sometimes used to manage problematic behaviors associated with autism, there are currently no medications that effectively treat the core symptoms.
The National Standards Project, spearheaded by the National Autism Center, will provide the most comprehensive review of treatment strategies for ASD to date. Until the results of the National Standards Project are available, the best available evidence suggests that using interventions from the field of applied behavior analysis, or ABA, will produce the best outcomes. In ABA, scientifically established principles of learning and behavior are combined to address the primary areas of concern in autism – communication, social development, learning, and behavior problems. |
global_01_local_0_shard_00002368_processed.jsonl/34490 | this was fun - but I have to write jokes now. thanks to reddit for having me and thank you for (most of) your questions - I'll do this again soon.
Comments: 2583 • Responses: 49 • Date:
JamesBatmanKimmel677 karma
I have to get to work now. I'll come back later to answer more. This was fun - thanks for giving a shit.
crazystar554 karma
Why is it called Jimmy kimmel live even though it's not live?
Edit: stop down voting me. It's a genuine question!
JamesBatmanKimmel744 karma
we used to be live - but too much "filth" was going out unbleeped, so ABC made us tape an hour before we air. At that point, we'd established the name of the show and changing it was not sensible. stationery is expensive
ChocoboExodus477 karma
When Sarah Silverman first did the "I'm fucking Matt Damon" video on your show, had you seen it before or was that actually a surprise for you?
JamesBatmanKimmel709 karma
it was a complete surprise.
squirlynuts23448 karma
I just wanted to say that your tribute to Uncle Frank was amazing, and from those of us who saw a little our own lost loved ones in him.....he will be missed.
I dont really have any questions, other than to say you do late night RIGHT, and have always been the top of the totem polem comedically for myself.
Keep on keepin on jimmy!
JamesBatmanKimmel844 karma
thank you, squirlynuts
needcontacts408 karma
Favorite television series currently running?
JamesBatmanKimmel1497 karma
Breaking Bad
bluthru123 karma
Couldn't have asked for a better season finale.
JamesBatmanKimmel478 karma
I think they set it up so Gus can be the villain in the next Batman movie.
CharlieSheeny399 karma
In 2006, you were sitting in for Adam Carrolla on his morning radio show when his twins were being born. Joe Rogan was a guest on the show and I was part of a segment because I got into a Myspace argument with Joe Rogan after telling him that "I hate you, you're not funny." My question is this... I asked if you would send me out a windbreaker and you said Yes! It has now been over 5 years and I am still hoping to get my windbreaker. Any chance that is ever going to happen?
GonzoVeritas243 karma
No one has ever been sent a windbreaker. As you probably know, that is Adam's running joke. I hope you get it, as that would be awesome.
JamesBatmanKimmel290 karma
correct. It was a joke.
WhyHellYeah388 karma
How come you never return my calls?
JamesBatmanKimmel927 karma
I feel like we've drifted apart
stil10377 karma
I used to love the Man Show back in the day, but I always wondered, in the segments where you guys or the Man Show boy used to go up to strangers and say random shit to them or get them to say random shit, was that ever staged or were those people all really random strangers? How often did you guys get recognized, and was there any time that a stranger realized you were fucking with them and got angry?
JamesBatmanKimmel674 karma
that was never staged. the man show boy was a funny kid named aaron hamill (not andy milonakis, as some believe). people were always nice to a little kid, but as the years went on, Aaron got taller - and as he grew, so did anger from guys he was screwing with. we eventually had to stop doing it, for fear of getting him punched.
freddiew361 karma
Thanks for having us on a few weeks ago!
JamesBatmanKimmel260 karma
it was my pleasure - anyone who asks how to make it in comedy should just pay close attention to what you guys do
Uriah_Heep345 karma
Why are you squinting? It's not even that bright.
JamesBatmanKimmel557 karma
I am naturally squinty. some believe I am stoned. I wish I had that excuse.
bulletproof_tiger271 karma
i've had an erection for more than four hours. what is my best course of action?
JamesBatmanKimmel1125 karma
get your mother involved
uplinx248 karma
What would you say the was your make or break moment in your career?
JamesBatmanKimmel520 karma
there have been many, but if I had to pick one it would probably be a live presentation of a game show I did (Win Ben Stein's Money) Ben and I did the show for a hundred Tv execs. It went exceptionally well, but only Comedy Central (then, a tiny cable network) was interested
mrshabadoo247 karma
Hey Jimmy, I used to listen to you when you were the sports guy on KROQ. Is there anything you miss from the small time days or is the success overwhelmingly awesome?
JamesBatmanKimmel441 karma
I miss a lot of things from radio. I miss the immediacy, the profanity, I miss many of the people I worked with - especially Kevin, Bean, and Ralph...I don't miss getting fired every ten months and having to move to a new city.
lemongrenade234 karma
Was there any backlash from reaming out Leno on air?
JamesBatmanKimmel989 karma
yes, I am no longer allowed to ride on the back of the only steam powered jalopy in Burbank
Hrodrik229 karma
What is your favorite late night talk show, besides yours?
JamesBatmanKimmel510 karma
I am and have always been in awe of David Letterman
[deleted]213 karma
I always regarded you as my favorite late night show host. What was highs school like for you and what clique (jocks, nerds, whores, late night show hosts) would you say you were in?
JamesBatmanKimmel976 karma
I wasnt really in one. I was in the "kids who made fun of all the kids in cliques" cliques. and, as a result of that, the virgin clique too.
stiltd683202 karma
Did you actually fuck Ben Affleck?
JamesBatmanKimmel638 karma
we call it lovemaking
mk455196 karma
Why do you keep getting skinnier? I like fat Jimmy.
JamesBatmanKimmel549 karma
he'll be back.
superhash193 karma
What is the most unmanliest thing you have ever done?
JamesBatmanKimmel851 karma
errday168 karma
In the man show episode where you go to Snoop's house, did you actually smoke with him? You and Adam looked legitimately baked when you came out of that room.
JamesBatmanKimmel331 karma
I'll let you decide
inb4shitstorm166 karma
Not American, so I havent watched your show... except for the Norm Macdonald interview on YouTube.
How was Norm like? :D
JamesBatmanKimmel706 karma
Norm like good. Norm good funny.
Harooo158 karma
Are you friends with Stephen Colbert or John Stewart and how do you feel about their shows?
JamesBatmanKimmel257 karma
yes and yes - and they are as great off the air as they are on it.
gwm21157 karma
Was the episode where you got "bit" by the snake on air your idea? I remember watching this as a little kid and thinking you were actually hurt.
JamesBatmanKimmel306 karma
it was, yes. we kept that a secret even from most of our crew. people were freaked out and some were even angry with me. it was fun though - like watching your own funeral
NateTheGreat8148 karma
How difficult is it to come up with monologue material on a nightly basis?
JamesBatmanKimmel426 karma
some days it is a lot easier than others. guys texting photographs of their genitals definitely helps.
spryor13130 karma
Are you listening to Howard Stern right now?
JamesBatmanKimmel212 karma
I was in the car on the way over. Bai Ling
CheckMyJunk127 karma
Are you my father?
JamesBatmanKimmel645 karma
Yes, but "Asking for money for yourself will get you banned."
[deleted]124 karma
Who came up with the Matt Damon joke? It cracks me up every time...
Been a big fan since the beginning. Sorry about your uncle, that was a pretty moving show when you came back from vacation though.
JamesBatmanKimmel234 karma
thank you. it was an off-hand joke at the end of a season one show. we had terrible guests that night and, to amuse our producer Jason Schrift, I jokingly apologized to Matt Damon for bumping him. I started doing it regularly just to make Jason laugh, and from there....
io242124 karma
What is your opinion on the Occupy movement?
JamesBatmanKimmel482 karma
I am always glad to see people doing something - even if doing something looks like doing nothing. We are all far too complacent. We complain and complain about the people we elect without pointing a finger where we should - at ourselves for doing nothing about it. And with that said, I will now do nothing about it
mazzlebazzle118 karma
What was it like starting a talk show with people who had never worked in TV before, specifically Bill Simmons? His retelling of the build up to the show launch makes it seem like he had no idea what he was doing but making it up as he went along.
JamesBatmanKimmel172 karma
Bill's retelling of the tale was spot-on. we had no idea what we were doing. and it is possible that we still don't.
xxtzhar113 karma
Is your middle name really Batman?
JamesBatmanKimmel269 karma
professorhazard103 karma
I'd love to hear more about the Fox, that elderly band leader you guys had on the Man Show who could drain a pint in seconds.
JamesBatmanKimmel190 karma
he was (and always will be) the fastest beer drinker in the world. I loved that man.
moosmoos98 karma
Bill Simmons, how did the connection happen between you guys?
JamesBatmanKimmel140 karma
I read his column regularly and loved it. When I got the ABC show, I reached out to him. He was reluctant to move out of Boston, but was unable to resist being so close to the 90210 beach house.
jesuswithoutabeard86 karma
1. I'm CDN, so thanks for not making the YouTube clips region specific.
2. You're awesomely hilarious, but you already knew that. My favourite skit was the drunk pilot stunt. Master troll material.
3. What's your logline-length advice for kids who want to get into the entertainment industry? (not porn)
JamesBatmanKimmel186 karma
1. make funny videos and put them on the Internet. If they are great, people will pass them around. I promise.
its_a_nati_bro78 karma
How long did it take you to film the Handsome Men's Club?
Were there any other people you wanted to get in that skit but were unable to?
JamesBatmanKimmel114 karma
it took weeks. we pieced it all together. I still dont know how they did it. And yes, there were people we asked - Clooney, Pitt, and a few others who - for a variety of reasons, couldn't or wouldn't.
Chamanzan76 karma
Will Santa Carl be making an appearance this year?
JamesBatmanKimmel126 karma
he do!
[deleted]72 karma
Hey when are you going to do Maron's podcast? I have a pretty deep suspicion that you've got some of the best stories in the business. It'd be pretty great if you shared them in a format like that.
JamesBatmanKimmel97 karma
very soon. we have something on the calendar.
bensjammins62 karma
Are you always stoned, or are your eyes just very small?
JamesBatmanKimmel216 karma
I have the skin and eyes of a baby
localtaxpayer59 karma
The late night talk show field has gotten really overcrowded over the past ten years. What used to be just Jay followed by Conan vs. Dave, has become Jay followed by Jimmy followed by Carson Daly (lol, you've left your TV on and fallen asleep) vs. Dave followed by Ferguson vs. You vs. Stewart and Colbert vs. Conan vs. Chelsea Lately...
Is this a concern to you and the other executive producers? What are some of the ways your show tries to stand out among this crowded field?
JamesBatmanKimmel109 karma
not really. if it was an intimate party, we probably wouldnt have been invited to attend.
ambroseburns59 karma
What is your opinion on the job Joe Rogan and Doug Stanhope did in replacing Adam Carrola and yourself as hosts of the Man Show?
JamesBatmanKimmel195 karma
with the producers they got stuck with, they never had a chance...
Modestjake57 karma
What is Guillermo like in reality? Is he more like how he acts on the show or is he completely different?
JamesBatmanKimmel101 karma
he makes me laugh every time I see him. It is hard to resist pinching him on the cheek
soupaFREEK56 karma
Do you ever pee with your eyes closed and feel really awesome when it actually goes in the toilet?
JamesBatmanKimmel208 karma
I'm excited if I can do that with my eyes open
parkerreal51 karma
As one ASU dropout to the next, best decision or greatest decision?
JamesBatmanKimmel101 karma
not really a decision. I got a radio job in Seattle and departed college immediately.
slimkidchris45 karma
Your Toronto video was hilarious. How did you enjoy your stay? Favorite place or restaurant to visit?
JamesBatmanKimmel166 karma
I love Toronto. And Vancouver. And Montreal. I would seriously consider moving to Canada.
atanincrediblerate41 karma
People tell me I look like you all the time. I try my hardest not to be offended. What's your opinion? Me
JamesBatmanKimmel178 karma
I'm trying my hardest not to be offended
MDCisgoodforme39 karma
How much say do you have for the musical guests appearing on your show?
JamesBatmanKimmel111 karma
I am all-powerful
igacek35 karma
Best memory of The Man Show?
JamesBatmanKimmel109 karma
when the monkey shit on the dwarf in the hot tub full of tequila...or something like that
noconfidenceman12 karma
How much of "Between Two Ferns" with Zach Galifinakas was scripted? You were hilarious on that BTW.
JamesBatmanKimmel19 karma
none of it - thank you |
global_01_local_0_shard_00002368_processed.jsonl/34514 | Flutter Tutorial: Provider Overview for Humans
Oct 28, 2019
Flutter 104 by Scott Stoll
Provider is the recommended way to do State Management for apps of all sizes. -–Chris Sells – Product Manager, Flutter. June 19, 2019
That’s a direct quote from Chris, from when he was on #HumpDayQandA. We had asked him if the Flutter team recommended any one method of State Management approach over others, and yes, they do. In fact, they recommend Remi Rousselet’s Provider over their own version of it, which was called Package Provider. They even said so in their talk, “Pragmatic State Management”, at I/O 2019 https://www.youtube.com/watch?v=d_m5csmrf7I
So what is a Provider?
In short, Provider is like a way to use InheritedWidget that humans can understand. You remember InheritedWidget, right? I like to call it “Flutter’s Monad”:
If you understand, no explanation is necessary.
If you don’t understand, no explanation can help.
Provider looks daunting when you first dig into it. I mean, you could make a word cloud out of all the classes you can use with it:
When someone first looks at this, they often get intimidated. But, after Remi kindly took a lot of his time to help me understand (and didn’t laugh at me) I realized something. This all becomes a lot easier to understand when you stop thinking there are a lot of classes and start thinking there are only three jobs that need to be done.
I like to explain it as a firefighting team. There are 3 jobs:
• Sound the alarm (Notify people things Changed, that we now have a fire)
• If door is closed, so someone has to open it and Provide access (expose the fire)
• The other people are the Consumers of fire, and a Provider.of water
That’s it. You have three jobs, and each of those classes can do one of them. Which classes you use will depend on what you need to do in your situation.
These handle notifying the Providers that something has changed. Which one you use will depend on what you’re trying to listen for. A ChangeNofier is going to notify of any changes in the class, as it is tracking the object as a whole. You can only use one of these with any one Type/Object/Model. Here are the main two most people use, but these aren’t the only way to do it:
• “A class that can be extended or mixed in that provides a change notification API using [VoidCallback] for notifications. [ChangeNotifier] is optimized for small numbers (one or two) of listeners.” - change_notifier.dart
• ChangeNotifier uses the notifyListeners function whenever there is any change in the class/model/object.
• “A [ChangeNotifier] that holds a single value. When [value] is replaced with something that is not equal to the old value as evaluated by the equality operator ==, this class notifies its listeners.
These handle putting an access point into your tree, exposing the objects you need to use. You place it above where you’re going to use it. After all, you can’t use it if it’s not there to use. It has been recommended to keep these as far down the tree as possible, to avoid “polluting the scope”. An important thing to know is you can’t use more than one of these for the same type, in the same scope. The widgets using the data will only grab that data from the nearest one, and so never see any others.
An important note regarding Context: When you create a Provider, it’s declared within the BuildContext of the build method it’s in. This means the context is created before the Provide, so the Provider can’t possibly be part of the information contained in that context since it didn’t exist yet when that context was created. But you can’t use a Provider unless it’s in the context where you’re trying to use it.
Okay, this time in human. In short, you need a new context; one with information about the Provider in it.
• You get that by running a build method between where you create the Provider and wherever it is you’re trying to use it.
• You can do that by creating a new file (Widget) with its own build method, then calling it as one of the children between your Provider and where you use it.
• This build method creates a new BuildContext that contains information about your Provider.
• With information about your Provider in this new context, you can now access it from within this new scope.
Better? Good.
Here are some of the Providers you can work with:
• This manages the lifecycle of the value it provides, using a Provider pattern. “It is usually used to avoid making a [StatefulWidget] for something trivial, such as instantiating a BLoC.” - provider.dart
• Many times when you try to use a plain Provider, the IDE will poke you and say to use something more specific. This is pointed out in a humorous way in the doc comments:
A sanity check to prevent misuse of [Provider] when a variant should be used.
• provider.dart, line 266
• “Listens to a [ChangeNotifier], expose it to its descendants and rebuilds dependents whenever the [ChangeNotifier.notifyListeners] is called.” - change-notifier_provider.dart
• Warning: There are many things to know about what to do, and what to not do, when using a ChangeNotifierProvider. I strongly recommend you read all the doc comments, they contain crucial information that will save you a lot of pain.
• This is used a lot, and for good reason. It’s basically a list of all the different Providers being used within its scope. Without this, you would have to nest your Providers, with one being the child of another and another, making things into a real mess.
Other Providers include:
• StreamProvider
• FutureProvider
• ListenableProvider (the superclass of ChangeNotifierProvider)
• ValueListenableProvider (for listening to one value instead of a whole type)
• And more…
Other Providers Shown Inside a MultiProvider
Other Providers Shown Inside a MultiProvider
Earlier, we said the team was a Consumer of fire and Provider.of water. This is just a mnemonic device, intended to help you remember. What we could have added is that you can use both, and so don’t have to worry about Selecting one of the two. Unlike Notifiers and Providers, you can have more than one that Consumes. You could even have more than one listen to the same Provider, if that’s what you want to do.
• “Obtains the nearest [Provider] up its widget tree and returns its value.” - provider.dart
• Remember, T can be anything. It’s your model/object/whatever it is that’s calling notifyListeners().
• Notice that it says nearest. Again, you can only use one Provider per type because Provider.of is going to stop looking as soon as finds the nearest one on its way up the tree.
Provider.of used to instantiate a reusable variable
Provider.of used to instantiate a reusable variable
Provider.of being used directly
Provider.of being used directly
• “The widget [Consumer] doesn’t do any fancy work. It just calls [Provider.of] in a new widget, and delegate its build implementation to [builder].” - consumer.dart
• It’s just syntactic sugar for Provider.of but the funny thing is I think Provider.of is simpler to use. Your mileage may vary.
Consumer, syntactic sugar for Provider.of
Consumer, syntactic sugar for Provider.of
• “An equivalent to [Consumer] that can filter updates by selecting a limited amount of values and prevent rebuild if they don’t change.” - selector.dart
• In human: It’s just a Consumer with a filter slapped on it. It only rebuilds if the thing that changed is something you’ve added to its list. If the thing that changed isn’t on your list, your child won’t rebuild.
And that, ladies and gentlemen, is an overview of Provider, in a nutshell.
You can stalk the author on Twitter at @scottstoll2017
Codemagic CI for Flutter |
global_01_local_0_shard_00002368_processed.jsonl/34516 | Outlook removes “extra line breaks” from plain text emails: How to stop it
“We removed extra line breaks from this message.”
Well, how helpful of you. Now the email from my crontab script is all in one line.
You can disable this “helpful functionality” permanently in Outlook by doing this:
1. Open Outlook
2. On the File tab, select Options
3. In the Options window, select Mail
4. In the Message format section, clear the “Remove extra line breaks in plain text messages” check box
5. Click OK
That’s all fine and dandy for you, but what about your colleagues? Getting them all to do this would be a pain. Well, Outlook has this curious idea that lines ending with three or more spaces should not have this helpful behaviour applied to them. Thus, the easy solution to the problem is to add three spaces at the end of every. single. line.
It’s not as hard as it may sound. awk will do it for us.
awk '{ print $0" " }'
This reads every single line, and re-prints it with three spaces at the end. Outlook is now happy.
You can easily pipe stuff into it for your crontab entries. The below is a useless example:
find /etc -name "*.conf" | awk '{ print $0" " }'
You can also make your script print like this internally, which in Bash is done by redirecting stdout and stderr through an awk process, as such:
#!/usr/bin/env bash
exec > >(awk '{ print $0" " }') 2>&1
echo "This goes to stdout"
echo "This goes to stderr" >&2
echo "More stdout"
After the exec line, anything printed by your script will be sent through awk and on through stdout. Outlook will no longer try to help.
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/34533 | Photoshop 2014.2.2 Update Now Available
Photoshop 2014.2.2 Update (12/10/2014)
12/10/2014 – Today we released Photoshop CC 2014 update version 2014.2.2 (Mac and Windows), resolving the following issues:
How to get the updates
2. If you don’t have the Creative Cloud application running, start Photoshop 2014 and choose Help > Updates.
3. The Adobe Application Manager will launch. Select Adobe Photoshop CC 2014and choose Update.
How to confirm that the Update worked:
2. The version is listed in the about dialog
Give us feedback!
Here are a few ways that you can send us feedback:
43 Responses to Photoshop 2014.2.2 Update Now Available
1. Geoff Walker says:
Thanks for all the behind the scenes work…
2. Alexander says:
The update for 32-bit Photoshop CC 2014 for Windows is broken on your server.
The download is ~63Mb in size (while it is ~250Mb for x64 version) and is reported as damaged.
Tried several times with the same result.
Please check this out.
3. Hi,
Im a photographer.
I use Nikon D800 cameras with all the Adobe Software updated in Yosemite Mac OSX.
I cant get Adobe Camera Raw to work. I only get the message “Disk error” when I try to open Nikon NEF files from Bridge into Camera Raw. Same files work without a problem in Lightroom. But I prefer ACR and would like it to work. What can i do?
Felipe Morales.
4. hi adobe,
thanks for the update, but… is there a way do downgrade back to a version before ?
most of my extension I need to use, and working with are not working anymore.
please help me.
5. Julio Pasquier says:
Pen tool was slow after update. All ok after I restarted the system, Thank!!!
6. Martin Tiller says:
Photoshop is still shutting down on start up with this release for me. Lightroom works fine. I have a AMD Radeon HD 7570 card. I was hoping this update would fix it.
7. John McAssey says:
Broke Welcome screen and Preferences lacked Do not show Welcome Screen. Menu Help>Welcom Screen produce and error pop-up error “The extension could not be loaded because it was not prpperly signed.
8. Imogen says:
My photoshop now won’t let me resize or move objects easily. I have to select free transform any time I want to try and adjust an object whereas before i could just click and drag the corners of the boxes and then right click for options. Is there an easier and faster way with the new updates?
9. Debbie Parish says:
text engine in photoshop will not initalize. I tried trashing the CMaps & OSFonts suggested by support but did not make a difference. I am PC, Windows 7, 64 bit running PhotoShop CC 2014 just installed this morning.
Any suggestions?
10. Peter Cleary says:
I have Photoshop CC and Lightroom. Every time I start the computer lately and CC logs in I am told there is an update for Photoshop and Bridge. i run the updates and they appear to install okay. I have installed the update three times already. Photoshop runs fine and if I check the version number it confirms 2014.2.2
I am running a Macbook Pro with Yosemite 10.10.1.
Any ideas
11. Steve Schaeberle says:
When rotating 3d objects there position in space does not stay centered on grind is this an issue being worked on?
12. Bo Liljedahl says:
Can I Exchange my win version oc CS4/6 for a mac version
13. Bo Liljedahl says:
Hey, thanks for your quick reply. Can I do this request directly on my IMAC or shall I prepare it on a laptop?
What are the advantages to ues the PH cc?
Bo L
• You use the website from any computer to request the swap.
The Creative Cloud Photography Plan ( ) includes Photoshop CC, Lightroom, Lightroom mobile, and get all the product updates/upgrades (e.g. Photoshop 2014, 2015, 2016, etc & Lightroom 6, LR7, LR8, LR9, etc) as part of your membership. The Creative Cloud license is a cross-platform license so you can install on Mac and Windows at the same time, which is a new feature with Creative Cloud.
• Bo Liljedahl says:
Thanks Jeffrey! I just got my IMAC! I will do the swap first, then I will sign up for CC photo. plan. I appreciate your help.
14. Ken Purcell says:
We’ve recently signed up for Adobe CC but the initial download needs to be updated. We tried using the CC manager but be are unable to update our applications (no firewall etc. Tried EVERYTHING for the last three days). We were looking for direct download links, tried to get them but we still can’t access the update files – these links go to a Release page with just details about the release and not .dmg files.
Can you please help us?
15. Charley says:
Hi i just tried to download the creative cloud and it seemed to download just fine but when i open it it doesnt install
16. Anton says:
I have CC2014 and haven’t been able to detect any updates either. Is it possible that my Modem Router could be blocking it?
17. Oleksandr says:
I have a Photoshop CS4 (and Update to CS6) I do not update the program to versions CS6. Messages – serial number is not the product. How can Set Update?
18. Jean-Michel Le Goff says:
I don’t know why, but I can’t get 2014.2.2 version on a Mac running 10.8.5.
I’ve tried several uninstall-reinstall I get each time the same 2014.0.0 version.
Any idea to frce the update ?
In the CreativeCloud Desktop app, all the apps are “ticked uptodate”
I have the same issue with Illustrator 2014 too
19. Rob Bos says:
I’ve got a few hundred, possibly closer to a thousand, machines that I want to start updating CC2014 on, but I don’t want to download several gigabytes of files over the Internet and have each machine update individually. I’d prefer to download the updates and deploy them over the LAN.
Where can I download the updates? |
global_01_local_0_shard_00002368_processed.jsonl/34535 | Diagnosing weird problems – a Stack Overflow case study
Reproducing the problem
Looking for obvious problems
The code has four main areas:
• Reading a file
• Updating digests
• Converting bytes to hex
• Storing and displaying results
• Failure to use the return value from InputStream.read()
• Failure to cope with Java’s signed bytes
System.out.println(toHex(new byte[] {
Initial checks around the file
MessageDigest md5 = MessageDigest.getInstance("MD5");
FileInputStream fis = new FileInputStream(file);
byte data[] = new byte[size];
int len = 0;
int total = 0;
md5.update(data, 0, len);
total += len;
System.out.println("Total bytes read: " + total);
Desperate times call for stupid measures
Proving the root cause
using System;
using System.IO;
using System.Security.Cryptography;
class Test
static void Main()
using (var md5 = MD5.Create())
Explaining the root cause
14 thoughts on “Diagnosing weird problems – a Stack Overflow case study
1. That was a great little puzzle. I’d never have guessed that Microsoft compiled two different versions of calc.exe of all things. Is there any point to having a 64-bit version of a small desktop calculator? Perhaps they simply run a build process that compiles all of the standard System32 programs for 64 bit.
Also, “I came, I solved, I tweeted” is an excellent idea for a signature. 🙂
2. The compiled two versions so that both 32 and 64 processes can execute a process called calc.exe and rely on the system path to locate the file. Given that the file system redirector exists there have to be two versions, or the executable would have to be moved out of system32.
3. > gradually reducing the scope of “stuff you don’t understand” to a manageable level, until it disappears completely.
This is IMO a problem. The programming world changes quickly. Things you used to understand perfectly, and have no reason to suspect may have changed, may have still changed. My most frustrating debugging experiences have been ones where the “stuff I don’t understand” *did* disappear, at least as far as I knew, yet the problem was still there.
I would never have thought, for example, that “perhaps my signed integers don’t overflow like twos complement signed integers on my twos complement platform”, yet that turned out to be the problem one time (C and C++ leave overflow behaviour of signed integers undefined, and the GCC optimiser had changed).
When you have no choice but to doubt everything, that leaves you with no clue where to look.
In that twos complement example, one thing you can do is identify exactly which operations are giving unexpected results. That can take a fair amount of time, but is at least possible.
But even if you identify which operation is misbehaving, that automatically mean you can figure out why it’s broken and how to fix it. Once in a while, all you can really do is ask others, and hope someone knows something that you don’t.
4. There’s been many a time that I’ve thought of something that seemed like a silly idea and it held the answer to my debugging questions. The good times are when I pay attention to that instinct! It’s so easy to say, “Naw, couldn’t be that!” and then be chagrined when you come back to it hours later.
5. @Steve: I meant “stuff you don’t understand about this specific instance”. I certainly didn’t mean as a permanent thing – the idea of reducing the scope of “areas of computing I don’t understand” to nothing is way beyond me 🙂
6. This just shows how valuable it is to read the oldnewthing if you’re writing code for windows, even if you’re never writing a single line of win32 code.
This topic comes up often enough in Raymond’s excellent posts that the problem was obvious to me after reading the initial post.
Although the morale of the post is interesting in its own – gradually reducing the problem space while debugging is invaluable and something that lots of SO questions are sadly lacking (although in this case the problem is unintuitive enough that I wouldn’t blame the original user)
7. You can install 2 different versions of the JRE/JDK and run the jar through one of those.
I don’t think there is a compile time thingy to switch between x64 and x86 for Java.
8. The last sentence of this post rings particularly poignant. A lot of troubleshooting comes down to eliminating ambiguity. Quickly eliminating large chunks of ambiguity leads to the fastest solution and the best troubleshooters are exceedingly talented at this skill.
9. Nice write up of your journey!
I am curious about your approach to use Search to find stuff.
Do you just start with some search words and refine them?
Or do you try to imagine the finding page?
Or do you have any advanced search settings that help finding faster?
Or are you sitting so close to the search index that you have special access to it?
10. @Peter: Looking back over my browser history, it looks like the relevant search was “windows file system system32 x86 processor” – judging by my history, I think I got lucky quite quickly.
I don’t think I have any search tips that most blog readers wouldn’t already do naturally – I guess the main thing is “what term would be in a good result but not in a bad one?”
Comments are closed. |
global_01_local_0_shard_00002368_processed.jsonl/34537 | October 22, 2013 4:30 pm
Make your Windows 8.1 app accessible. Reach more customers!
As an app developer, you’re likely always on the lookout for ways to reach more customers and broaden your app’s user base. Making your app accessible is an easy way to do so.
You might be asking, ‘”Now, what really is accessibility”?
Software accessibility means ensuring that programs and functionality are easily available to the widest range of users, including those who have disabilities and impairments.
If you’d like more information on what accessibility means, see Introduction to Accessibility.
When making an app accessible, focus on these areas:
• Accessible visual design/high contrast
• Keyboard focus and navigation
• Screen reading
This blog post shows you how to address the above areas in Windows store apps written in XAML and C++/C# and those written in HTML and JavaScript.
Why does an accessible app reach more customers?
Accessibility impacts more users than you think as disabilities range from slight vision impairments to paralysis. These individuals require software apps to be accessible via settings and assistive technologies (ATs), such as speech recognition, a screen reader or a magnifier. With such aids, more people can use your app.
Improved healthcare has resulted in the growth of the number of people overcoming their disabilities and being able to be employed. Per the US Census: Disability Among the Working Age Population: 2008 and 2009 report, there are 19.5 million people (or about 10% of the population) in the working age group (16 to 64 years) that have a disability. About 34.7 percent of this population is employed. The working age population is important because this is the category of users that is most likely to be comfortable with using computers and software apps on a regular basis. Your app will miss out on this entire user group if it is not accessible.
Another reason why accessible apps reach more customers is due to their compliance with accessibility standards and guidelines. Large corporations/enterprises, educational institutions and government agencies evaluate and purchase software apps (for internal use by their employees and/or students) based on compliance with well-established standards, with accessibility being a key criteria. If an app is accessible, it stands a better chance of being purchased versus its competitors.
How to make a Windows 8.1 app accessible
Our focus during the development of Windows 8.1 has been to make it easier for developers to make their apps accessible. With this goal in mind, we made specific investments to increase key accessibility features built into the platform that apps can leverage.
The primary starting point to building an accessible app is to leverage common controls.
The common controls available in the XAML and HTML/CSS presentation layers are accessible by default. It will be less work for you to make your app accessible if you use these common controls without customization. Using common controls significantly reduces the number of accessibility issues users’ encounter. Here are links to documentation and samples on the common controls:
1. XAML Common controls
Sample: XAML Essential Controls sample
2. HTML common controls
Sample: HTML Essential Controls Sample
When you use custom controls in your app, you need to do significant work on your end to make your controls accessible. It’s best to start thinking about accessibility at the design stages of your controls. Designing for accessibility provides pointers on what to consider for accessibility when creating custom controls for XAML and HTML apps.
During the development of Windows 8.1, we reviewed the inbox apps that ship with Windows to determine whether they met core accessibility requirements. The remaining part of this blog provides you with guidance on addressing the most common accessibility issues we encountered when making our inbox apps accessible.
Accessibility of an app has to be thought about at the very outset of designing an app, followed by coding for it, testing for accessibility, and then finally selling it in the Windows Store.
As mentioned at the beginning of this blog post, the three main areas to focus on when making your app accessible are:
• Accessible visual design/high contrast
• Keyboard focus and navigation
• Screen reading
These areas have to be addressed independent of whether you’re using common controls or custom controls. Let’s delve into each of these areas a little more.
Accessible visual design/contrast ratios
Accessible text-contrast ratios
To be considered accessible, the content in your apps must have a minimum luminosity contrast ratio of 4.5:1 against the background. Exceptions include logos and content (text or images) that is decorative and conveys no information.
Testing tools: See Techniques for WCAG 2.0 G18 (Resources section) for tools that can test contrast ratios.
The Dev Center provides additional information on meeting requirements for accessible text in XAML and meeting requirements for accessible text in HTML.
High Contrast themes
Users with varying forms of visual impairment/color blindness use the high contrast themes to read content or view images in your app. If your app is built using the default themes and templates, the platform automatically switches to the appropriate high contrast system colors and style settings when the user switches to a high contrast theme.
This default support is based on using the default themes and templates. These themes and templates make references to system colors as resource definitions, and the resource sources change automatically when the system is using a high-contrast mode. Use of system colors ensures that text continues to be visible in high contrast themes. See more info about how to support high contrast themes in XAML and support high contrast themes in HTML.
High Contrast images
For your app to work well in high contrast, make sure that all images in your apps have corresponding high contrast assets.
Handling high contrast images in your XAML app
1. Create high contrast assets for each image in your app. The black-on-white version is to be shown when the “High Contrast White” theme is active, and the white-on-black image is to be shown when one of the light-on-black themes are active, (these being “High Contrast Black”, “High Contrast #1” or “High Contrast #2”).
2. Change the source property in your Image element’s declaration to use an image loaded as a resource.
3. Update the existing ResourceDictionary in your project’s StandardStyles.xaml, such that an image appropriate to the active high contrast theme will get loaded.
Let’s say the image you want to change on a high contrast theme change is called ‘Sample.png’.
<ResourceDictionary x:Key="Default">
<x:String x:Key="imageSample">Assets/Sample.png
<ResourceDictionary x:Key="HighContrast">
<x:String x:Key="imageSample">Assets/Sample.contrast-black.png</x:String>
<ResourceDictionary x:Key="HighContrastWhite">
<x:String x:Key="imageSample">Assets/Sample.contrast-white.png</x:String>
Handling high contrast images in your HTML/CSS app
This is a single step process –
• Create high contrast assets for each image in your app and follow the recommended file naming conventions. For example, the Sample.png image file would have a version named Sample.contrast-high.png for use with any high-contrast theme, Sample.contrast-black.png for use with black high-contrast themes, or Sample.contrast-white.png for use with white high-contrast themes.
Windows automatically shows the appropriate image of Sample.png, Sample.contrast-black.png or Sample.contrast-white.png depending which theme is active.
A note on background images in HTML/CSS apps
There are cases where you might need more control over the high-contrast look for your app. Let’s say that you use an image as the background for your app. And then you add an image resource ‘Sample.png’ to your app. Your CSS for the original image-related element looks like this:
<div id="appImage">
#appImage {
background-image: url(/images/Sample.png);
background-size: contain;
background-position: center;
background-repeat: no-repeat;
The HTML/CSS host automatically removes all CSS background images when a high contrast theme is active. So, if you use an image as a background and want to override the default behavior (and show an appropriate high contrast version of the background image when a high contrast theme is active), use ms-high-contrast-adjust: none on the parent element.
@media screen and (-ms-high-contrast)
#appImage {
-ms-high-contrast-adjust: none;
The appropriate image is selected based on which high contrast theme (if any) is active when your app starts.
For your app to respond to high contrast themes being switched while the app is running, you need to have your images react to changes in the state of high contrast. You can achieve this with the following CSS:
@media screen and (-ms-high-contrast)
#appImage {
-ms-high-contrast-adjust: none;
background-image: url(/images/Sample.contrast-black.png);
@media screen and (-ms-high-contrast:black-on-white)
#appImage {
background-image: url(/images/Sample.contrast-white.png);
Here are contrast related samples available for your reference on the Dev Center:
Text in graphics
Avoid using text in images. Text that you include in an image file is not accessible or readable by assistive technologies. If you must use text in images, be sure to include the text or a summary of the text’s meaning in the alt property.
Keyboard focus and navigation
Many users with accessibility needs choose to use the keyboard as their preferred input method for interacting with software apps. So it’s important to make sure that all actionable UI elements in your app are accessible via the keyboard.
Keyboard tab order
Typically, the order in which the UI elements in your app receive keyboard focus is the same order in which they are declared in your app, meaning, the same order as in the visual tree.
If you want to customize the tab ordering, you can do so by setting the TabIndex property on the control that you want to set a different tab order to. Here are examples of how to do this in XAML and WINJS/HTML:
<TextBox TabIndex="2" Width="200" Grid.Column="1"……/>
<textarea id="Text Area1" tabindex="2".......></textarea>
Keyboard focus at app launch and during transitions/navigation
App launch
When an app is launched for the first time, make sure that keyboard focus is set to the most logically appropriate UI element on screen. You can set focus on a control using the Control.Focus method. If you set this focus for when the app launches, you’ll save users much confusion.
Transitions and navigation
Sometimes you’ll encounter scenarios where the user interacts with certain elements of your app and then moves onto different elements. For example, the user opens the appbar in your app to “save” the current content. Once done, the user dismisses the appbar.
In such scenarios, make sure that default keyboard focus goes back to one of the following locations:
1. To the app window OR
2. To the element that had focus before the user opened the appbar OR
3. To the most appropriate UI element on the current page/section of your app
The third option is especially true in cases where the user’s action on the appbar results in the opening of a new page/section of your app.
You can use the UIElement.GotFocus and LostFocus events to track when focus changes that occur on a given page/section of your app. You can set focus on a control using the Control.Focus method
If keyboard focus is not set back to an appropriate location, focus is lost after the appbar is closed and the user doesn’t know where they are in the app or how to navigate further using just the keyboard.
NOTE: The default behavior of the AppBar common control is that when the AppBar closes, the focus goes back to the element that had focus before the user opened the Appbar.
Another scenario that requires explicit manual setting of keyboard focus is when the user navigates away from your app to a different app and then navigates back to your app. During such transitions it is important to handle the ‘suspend’ event to save your app’s state and remember where keyboard focus on your app last was. When the user navigates back to your app, handle the ‘resume’ event and bring keyboard focus back to the same location. For more info, these articles give details about how to handle the ‘suspend’ and ‘resume’ events in JavaScript and C#/VB/C++ apps:
Setting tabstops/keyboard focus only on actionable UI elements
When customizing controls such as the Button, ListView or ComboBox controls, make sure that the tab stop (and in effect keyboard focus) for such controls is on the bounding rect of an actionable element.
• For the Button control, the actionable element is the parent control itself and NOT the label used to name the Button or the glyph used on the button for visual enhancement. So set the Tab stop and keyboard focus to the bounding rect of the parent control.
• For the ListView and ComboBox controls, the first actionable item is typically the first item in the list/ComboBox. So the tab stop/keyboard focus needs to be set on that first actionable item and not on the bounding rect of the parent control as a whole.
If you don’t want a control to be included in tab navigation, you can use the ‘IsTabStop’ property on the control in XAML or set ‘tabindex=-1’ in HTML/CSS apps. Some sample code snippets in XAML and HTML/CSS:
<TextBox IsTabStop="false"/>
<textarea id="Text Area1" tabindex="-1".......></textarea>
Keyboard arrowing, shortcuts and access keys
Support keyboard arrowing through the UI elements of your app according to the logical visual representation of these elements on screen.
In addition, it’s a good practice to implement shortcuts for your app’s functionality. A shortcut is a keyboard combination that enhances productivity by providing an efficient way for the user to access app functionality. A shortcut key may not be associated to a particular piece of UI in your app.
Provide access keys for commonly used UI in your app. An access key is a shortcut to a piece of UI in your app. Access keys consist of the Alt key plus a letter key.
The recommended guidance on how to differentiate between where to support using the tab key vs. arrow keys is listed here:
• Use the tab key to move between groups of controls.
• Use the arrow key to move between controls in the same group.
The Dev Center provides additional info about implementing keyboard accessibility in your XAML and implementing keyboard accessibility in HTML.
Screen reading
When making your app accessible, make its content available to Assistive Technologies(ATs) such as a screen reader, speech recognition, and magnifier. Doing so allows your app to be read out to users with visual impairments and enables them to interact and use your app the way you intended it to be used.
Windows apps can communicate with ATs, via the UI Automation (UIA) framework that is built into Windows. The XAML and HTML/CSS frameworks interact with UIA on behalf of the app to expose the app’s contents to screen readers and other such ATs.
Windows apps communicate with Assistive Technologies via the UI Automation framework
Figure 1: Windows apps communicate with Assistive Technologies via the UI Automation framework
Providing accessible names
Very often, you might have several instances of the same control type in your app (for example, the button control). You can have multiple buttons in your app each performing a different operation.
While you may provide different labels to each button to visually differentiate them, it’s important to provide that differentiation to ATs such as screen readers as well. Without doing so, all that a screen reader would read out for a series of buttons in the app is “button… button…button” This causes much end user confusion resulting in a poor user experience.
To address this issue, you need to provide accessible names to your controls. In XAML, you can do this by setting the UIA property ‘Automation Name’ on each button control, providing each with a unique Automation Name. In HTML/CSS, you would use the aria-label or aria-labelledby property to set the accessible name.
<Button AutomationProperties.Name= "Ok" .../>
<button aria-label= “ok" ...></button>
In addition to providing accessible names, there are other pieces of information about the UI elements in your app that you’d want to make accessible. Read about exposing basic information about UI elements in XAML and exposing basic information about UI elements in HTML.
Providing notifications to ATs for dynamic changes in content within the app
Your app might have scenarios where the content changes dynamically on certain updates it receives either from a web service or other external sources. For example, a stock ticker app dynamically changes prices of stocks being tracked based on web updates being pushed to it.
Another example is the classic master-detail scenario in which selecting an item in the master control dynamically loads the corresponding content in the detail area.
In addition, when a user chooses to explicitly update a given stock price, you might typically show a progress ring/bar or other ‘content loading’ animation to indicate that the app is the process of waiting for and loading the new stock prices.
ATs need to be notified about such dynamic changes of content as well as wait/loading states. Without such notifications, neither the AT nor the end user knows of the updated content. They won’t even know that your app is in the process of loading new content and might presume that the app is non-responsive.
UIA has the concept of a ‘LiveRegion’ that is a property you can set on the area of the app that undergoes dynamic updates. Once this property is set, whenever that area of your app is updated, a LiveRegionChanged event is raised, which notifies the AT about the new updated content that can now be read out to the end user.
There are two types of Live Regions
• Assertive LiveRegion: Use this type of LiveRegion when you want the AT to interrupt what the user is currently doing and announce the change (for example, a warning message).
• Polite LiveRegion: Use this type of LiveRegion when it is acceptable to wait and accounted the changes after the user has finish the operation that are currently performing (for example, stock price update)
In XAML, you can add a Live Region by setting the ‘AutomationProperties.LiveSetting’ on a given control. In HTML/CSS you use the aria-live property.
<TextBlock Text="Submission Successful!"
AutomationProperties.LiveSetting="Assertive" .../>
AutomationProperties.LiveSetting="Polite" .../> -->
In the code behind file, raise a LiveRegionChanged event as part of changing the text
AutomationPeer peer = TextBlockAutomationPeer.FromElement(tblSubmissionStatus);
<textarea id="TextArea1" aria-live="assertive" ...></textarea>
NOTE: HTML/CSS apps don’t need to raise the LiveRegionChanged event because the app host takes care of raising the event.
Ensuring the right controls/UI elements are made available to ATs
ATs navigate the UI Automation tree to gather information about the app’s UI and its elements. The UI Automation tree can be filtered by ATs to create views that contain only those UI Automation elements that are relevant for a particular AT. There are three views that are supported:
• Raw view: The raw view of the UI Automation tree is the full tree of automation elements for which the desktop is the root.
• Control view: A subset of the raw view that closely maps to the UI structure as the user perceives it. It includes only those UI elements that have the IUIAutomationElement::IsControlElement property set to TRUE.
• Content view: A subset of the control view that contains content most relevant to the user, like the values in a drop-down combo box. It includes only those UI items that have both the IUIAutomationElement::IsControlElement and the IUIAutomationElement::IsContentElement property set to TRUE.
In Windows 8.1, we introduced a new UI Automation attached property called ‘AccessibilityView’ that you can set on any given XAML control to specify the view in which that control should appear.
In Windows 8.1, by default, all XAML controls are available in all three views.
Here’s an example of where and how you might use this new property to ensure that the right controls/UI elements are made available to ATs. In your app you can use primitives such as the TextBlock for the following purposes.
1. For visual enhancements, for example, to render Glyphs or as placeholders for additional visual padding/spacing. Such TextBlocks typically need not be accessible
2. For representing textual content. Such TextBlocks need to be accessible.
One of our inbox ATs – Narrator, is a screen reader that uses only the control view of the UI Automation tree. So Narrator will read out, set focus to and enable interaction with only those UI elements that are in the control view. (See info about how to hear text read out aloud with Narrator.)
For Narrator to read appropriate TextBlocks (and skip the others), you can do the following:
• If TextBlocks are used as in bullet a) above, then you can set the ‘AccessibilityView’ on the TextBlock to ‘Raw’. This restricts that particular TextBlock to the raw view. It doesn’t show up in the control view and as a result Narrator won’t read it out.
• If TextBlocks are used as in bullet b) above, then you can set the ‘AccessibilityView’ property on the TextBlock to ‘Control’. This enables Narrator to read out the content in that TextBlock.
<TextBlock x:Name="PlaceholderTextBlock" …… AutomationProperties.AccessibilityView="Raw"/>
Note: In HTML/CSS apps, by default, controls are available in all three views. There’s no platform level ability to move controls from one view to another as we do in XAML. However, you can remove a given UI element and its children entirely from the UIA tree by using the aria-hidden attribute with the value set to true. Also, role="presentation" removes elements that have no semantic value from the UIA tree (or accessibility tree). Note that role="presentation" removes the current element from the UIA tree but doesn’t affect the contained sub elements. To remove the UI element and all of its child elements from the UIA tree, use aria-hidden="true".
Do note that using aria-hidden on any text content causes that text to be hidden and inaccessible via a screen reader such as the inbox Narrator.
Testing your app for accessibility
Now that you know how to make your Windows 8.1 app accessible, you’ll want to test your accessibility features. The Windows SDK has some excellent tools that you can use very easily to test the accessibility of each of the items in section 2. You can read more about them here:
Tagging and selling your accessible app on the Windows Store
One of the most exciting parts of building an app is getting it out to your customers through the Windows Store. When you make your app accessible, you get to tag it as accessible during the Windows Store uploading process.
Tag your app to be accessible during the Windows Store uploading process
Figure 2: Tag your app to be accessible during the Windows Store uploading process
When you do this, users who filter Store apps for accessible ones will see your app in the filtered list.
The Dev Center provides more info about declaring your app as accessible on the store for XAML and HTML/CSS apps.
Finishing up
The key point to think about when making your app accessible is to leverage the common controls. Start incorporating accessibility requirements at the design stage itself, and then into coding and testing. Remember these:
• Accessible visual design/high contrast
• Keyboard focus and navigation
• Screen reading
Our primary goal with respect to accessibility within Windows is, to make the platform as accessible as possible by default. We now invite you to try out the accessibility investments made to this effect in Windows.
-Premalini David, Program Manager, Windows |
global_01_local_0_shard_00002368_processed.jsonl/34544 | Suppose I am not interested in Magic: the Gathering. How do I filter out all the Magic: the Gathering questions?
If you go to your Preferences page at the bottom of the page there is a place to put in favorite and ignored tags. Put magic-the-gathering (and any other Magic tags like mtg-commander) in there, and if you want to hide them completly choose the 'Hide questions in your ignored tags' option.
• I do this with [bridge] because it's incomprehensible to me. It works well. \o/ (no offense meant to bridge players.) – doppelgreener Jun 6 '16 at 13:52
• 2
Ignoring [magic-the-gathering] should be sufficient to hid every question about Magic. If there is a question tagged [mtg-commander] but not [magic-the-gathering], that is an error that should be corrected. – murgatroid99 Jun 6 '16 at 16:44
• 1
You could also add mtg-* to the ignored tags, which should ignore all tags beginning with mtg-. (Caveat: In case a game’s name starts with "mtg-", and it’s not related to MtG, it would be blocked, too, of course.) – unor Dec 30 '16 at 16:15
Alternative to going to your preferences page, is to hover over any question's tags on any page until the hover tooltip opens up. Then, click the Star twice to turn it into a red cross. This effectively puts it in your ignored tags.
Ignore a tag
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00002368_processed.jsonl/34547 | Day 44, Week 7: Plyometrics
For the next generation of P90X videos, might I humbly suggest that Military March be replaced with Silly Walk, as brought to you by our friends at Python, Monty Ltd.
Variety is, after all, the spice of life.
Well, another session of Plyometrics has come and gone. I’m beginning to lose my sense of time and space, because it always seems as if I just DID the routine only yesterday. I got through it, but with more difficulty than last week. Probably under hydrated going into it.
Milestone: yesterday, I noticed some upper abs peeking through in belly land. The lower abs remain veiled below a modest layer of subcutaneous blubber. However, the belly fat is retreating, so RAH!
1 Response to Day 44, Week 7: Plyometrics
1. iphonegamesblog says:
Thanks for sharing your exercise regime! Keep it up man, just keep your goal in mind and work towards it at your own pace. You’ll get there!
Plyometrics is tough, but well worth it!
Share your thoughts
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/34548 | UK Labour party backs a second Brexit referendum
Jeremy Corbyn favors a public vote to ”prevent a damaging Tory Brexit.”
Britain's Corbyn-panicked oligarchs are shifting money offshore
Since the Thatcher years, the UK has built itself into a powerhouse money-launderer, selling financial secrecy to the world's most corrupt and vicious looters; but with a Labour victory looking more likely with each passing day, the super-rich of Britain are starting to panic. Read the rest
The electable Mr Corbyn
UK Theresa May called snap UK elections (after promising not to) in order to consolidate power in her own party, shutting up the MPs who didn't fall into line with her policies -- this was the same logic behind her predecessor David Cameron's decision to call a referendum on Brexit, and both banked on the idea that the UK electorate wasn't willing to vote for an "unthinkable" alternative in order to tell the establishment to go fuck itself. Read the rest |
global_01_local_0_shard_00002368_processed.jsonl/34551 | Page images
Adapted from the story by Madame Villeneuve
N a far-off country, a long time ago, lived a rich merchant and his happy family. There were six sons and six daughters; all the sons big, strong and manly; all the daughters graceful and beautiful. But one of the daughters, the youngest, was more graceful than her sisters, and so far surpassed them in comeliness that the only name she was known by was Beauty. It cost no small sum to support this large family, but the merchant was an affectionate father, and he gave his children everything they wanted, so that their lives were as joyous as the days were long.
But suddenly misfortunes came upon them all and left the poor merchant sadly distressed. First, their great house burned down, and all their silver, paintings and costly clothing and jewelry were destroyed. The same day came the news that a large ship, full of costly merchandise, was sunk; and soon it was learned that every ship belonging to the merchant was lost with crews and cargoes. These misfortunes worried him greatly, but when he learned that his trusted employes had banded against him and stolen all that was left of his property, he was brought face to face with direst poverty.
At first the daughters thought that their friends would take pity on them, and that homes would be offered them, but they soon learned how false the world often is, and that friends may desert when riches fail. In fact, nothing was left them but a little cottage and a small field many leagues away from the city where they had lived. With tears in his eyes their father begged the children to be contented and to work honorably for their daily bread. None seemed willing to do this except Beauty, who showed now that her soul was as fine as her face. She had been as sad as any when trouble first overtook them, but soon recovering her spirits she set bravely to work, making the best of things, amusing her father and brothers and trying to persuade her sisters to join in her dancing and singing. The more she tried to help them, the more discontented and vexed her sisters became, until they all declared that she was fit for nothing except this hovel in the country; but that they themselves worked only because they had to, and that just as soon as they could they meant to get back to the city.
For two whole years they slaved in this manner, and then, just as they were all beginning to get used to their country home, a great surprise came. The father received word that one of the richest ships that he had supposed lost had returned to port. The sons and daughters were overjoyed at the news, and wished to set out at once to reclaim their property. Only the father, who was older and wiser, hesitated, for he knew how many chances there were for mistakes to happen. Beauty, too, was doubtful, and joined with her father in urging them to stay at home until the harvest was all in.
When, finally, the father decided to go to town, he was besieged by every one but Beauty with requests for presents of dresses and jewels, fine things to eat and more knickknacks than a shipload of gold could purchase. The father smiled at their wishes, but felt a little angered at their greed. He had noted, too, that Beauty took no part in their excitement and asked for nothing.
"What shall I do for my little daughter? Is there nothing you want, my little Beauty?"
"All I ask is that you may come safely home to me," answered the girl.
This angered her sisters, for they thought that Beauty had said it to reproach them for their greed; but the father was delighted and said, "Now choose something, Beauty; surely there are some pretty things you will like."
"Really, father, I want nothing but what I said; only, as you ask me, I will beg for a rose. I haven't seen one since we came here, and I love them dearly."
Thus the merchant set forth on his long journey, and his children did their best to kill time till his return. As for the merchant himself, he found out as soon as he reached the city that his former partners had pretended that he was dead and had divided his recovered property among themselves. Although he stayed there for six months and tried in every way to get some of his property back, he was able to recover barely enough to pay the expense of his journey.
When he knew his case was hopeless he set out on his return journey, heartsick and discouraged. The weather was terrible, and it was only with great difficulty that his horse was able to carry him along. Yet he managed to make some progress until nightfall, when he found himself about thirty miles from home and at the edge of a big, lonesome forest. The night had grown cold, and snow was falling fast, hut he made up his mind to push on, rather than die from exposure where he was. Deep into the forest he went, but after a while the paths became hidden in snow and he lost his way completely. He could rouse no one by his shouting, and was even glad to
find a hollow tree in which he could crouch through the night.
When the morning came he roused himself, and stiff and lame from exposure, began his painful search for a road. After a little he saw an opening in the trees, which, upon examination, he found led into an avenue at the end of which appeared a beautiful palace glistening in the morning sun. He hurried toward it, and after walking rapidly forward for about ten minutes, came to its gates. Not a person nor a living creature of any sort could he see, and no one replied to his numerous calls. Opening the gates, he found the stable, and having littered and fed his horse, he hastened to the house. The door was closed, and no one came to his loud knocking. Hungry and impatient, he threw the door open and entered a large hall, where he found a cheerful fire burning, and a table set comfortably for one. Not a person had he seen about the place, and so, going to the fire, he turned about in front of the blaze, saying to himself,
"I hope the master will excuse the liberty I am taking, for he will doubtless soon be here."
He waited for an hour, and still no one came. Then his hunger overcame him, and seating himself at the table he ate till he was satisfied. Another hour of rest convinced him that no one was coming, and feeling drowsy he got up to explore the palace. At the end of a long hall he came upon a bedroom richly furnished and having in its center a great, comfortable bed. This was too much for the weary merchant, and he threw off his clothes and covered himself. Almost before his head touched the pillow he fell asleep, and it was broad daylight when he awoke the next morning.
No one was in the room, but when he started to get up he found that in place of his old suit, new clothes lay on the chair by the head of his bed.
"Surely," he said, "this place must belong to some good fairy who pities my misfortunes."
« PreviousContinue » |
global_01_local_0_shard_00002368_processed.jsonl/34576 | Brooks Carpet Clinic Ltd Awarded”Best of Houzz 2019″
Brooks Carpet Clinic Ltd of Brooks Alberta, Canada Awarded Best Of Houzz 2019 Best of Houzz 2019 – Client Satisfaction You were rated at the highest level for client satisfaction by the Houzz community. Awarded on January 18, 2019 Awarded by Community of Over 40 Million Monthly Users, Annual BOH Badge Highlights Home… Read More |
global_01_local_0_shard_00002368_processed.jsonl/34615 | Chocolate or seal point?
We are not sure if Beatrice (the dark girl) is seal or chocolate point Siamese. I’ve sent the DNA- color test to UC Davis in California. That is the only way for us to know for sure.
The Siamese come in many colors, but the traditional four ones are:
• seal (black that looks like dark brown on Siamese, the most common color),
• blue (diluted black, looks like cold gray with a bluish tinge, like our Miii),
• chocolate (milk chocolate, lighter and warmer than seal point) and
• lilac (diluted chocolate, pinkish gray, like Jossan and Leroy).
When the kittens are small, their points are not as developed and they are lighter than as they grow older, so sometimes it is hard to distinguish seal from chocolate (and blue from lilac). I am curious, and since different breeders had different opinions about Beatrice’s color, I had to test! I believe in science. 🙂 It is easy to take a DNA sample, it is a simple swab test.
Here are some pictures from yesterday’s photo session when we tried to take pictures of the paws on the masked kittens. Belle is blue, we are 100% certain about that, and right now I believe that Beatrice is chocolate. Look at the pictures. And – no, I am not torturing them!
The blue paw and the chocolate (or seal?) paw, 7 weeks old Siamese kittens
Belle, blue point Siamese girl, 7 weeks
Beatrice, chocolate (or seal?) point Siamese girl, 7 weeks old |
global_01_local_0_shard_00002368_processed.jsonl/34636 | Planet Earth Events
Saturdays, 9:00 PM ET on BBC America
Sundays, on BBC
60 minutes
A lustrous and awesome series detailing various areas and animals of Earth. Narrated by Sigourney Weaver (US) or David Attenborough (UK) it appears on the BBC and the Discovery Channel. The documentary captures incredibly rare moments (snow leopards in Afghanistan, birds of paradise in New Guinea) in HD.
Show Events
1 event
Feb 8, 2019
BBC America renewed Planet Earth for Season 3! |
global_01_local_0_shard_00002368_processed.jsonl/34637 | daily graph
weekly graph
monthly graph
yearly graph
Graph information
Field Internal name Type Warning Critical Info
x86_pkg_temp thermal_zone0 gauge
x86_pkg_temp thermal_zone1 gauge
This page was generated by Munin version 2.0.25-1+deb8u3 at 2020-01-23 07:32:45+0100 (CET) with MunStrap template. |
global_01_local_0_shard_00002368_processed.jsonl/34643 | How To Pre-Emptively Create A Workplace Conflict Resolution Plan
5 Steps Creating an Actionable Plan
No matter how congenial employees are, conflicts in the work environment are inevitable. Whether employees grow envious over one another's success or develop tensions with their superiors, resolving these issues in an expeditious and articulate fashion is imperative. Failure to do so can protract the issues and lead to increased hostility. Developing a conflict resolution plan before troubles arise is wise.
1. Consider all levels
Conflict Tango notes that 85% of employees endure a conflict-based situation in the work environment. Therefore, you should take into account that issues could happen at all levels. Do not, for example, assume that the upper management is inviolable to disagreements or that your new employees won't feel stressed. Also, remember that different groups of employees have different needs. Not only should you take all of them into account, but you should request feedback. Knowing which issues affect your employees the most can help you to develop a more proactive plan.
2. Predict the conflicts
While you cannot prognosticate every possible scenario that may arise in the workplace, you can use the data you obtain from employees to assemble a formidable list. While working with your team during this business process, brainstorm as comprehensive of a collection as you can, but also work to prioritize the issues. Assigning numbers to each issue based on the level of severity allows you to create plans for more serious issues first. You can then use the techniques for these more arduous problems to address the lower level concerns if they should arise.
3. Integrate respect into your plan
Proactive Resolutions promulgates that 32% of employees in a survey felt that disrespect had played a significant role in recent work environment scenarios. When you do not treat your employees with a level of respect, you can almost guarantee that the conflicts are going to grow worse. Your company should adopt a policy of common-sense based impartiality. When a problem is presented, you want to make sure that you hear both sides. However, you also need to know when issues are serious enough to warrant immediate action. If you have decided to survey employees about where they think the major issues lie, then you have already taken an important step to show them that you are placing respect at the center of the workplace.
4. Create clear and specific steps toward resolution
During the brainstorming process, you should expect that your team is going to have different styles and approaches to managing conflicts. Going into the meetings with an open mind helps you to prevent major conflicts from happening in the meetings themselves. If they do, evaluate the strategies that you used. For each problem that you predict, you should define a clear resolution.
Make lucid whether employees have to first report the problem to human resources or if they should check their pay stubs to see if they are missing information. Once you have developed the specific steps that employees need to take if a conflict arises, create a handbook for distribution in the company. Scheduling a training session on conflict resolution for your employees is wise, and the handbook allows them to have a refresher.
5. Gauge how the systems work
After you have developed these plans, you have only one way to see if they actually work in real world scenarios. When a conflict arises, make sure you are paying attention to solving it; however, also take the time to evaluate whether the plan actually worked. In the event that it does not, you have to sit down with your team to figure out what went wrong and how you can better resolve the issue next time. Also, you can take a look at successful plans to see how you can make them even better.
By carefully considering these five steps, you will be better able to identify potential conflicts and create an actionable strategy to prevent future disputes. When you take the time to determine possible problems that may arise at your company, you can also figure out the best solutions for addressing them efficiently.
Strategy growth small
Read next:
Strategy Development And Implementation In A Rapidly Growing Region |
global_01_local_0_shard_00002368_processed.jsonl/34673 |
Our previous newsletter talked over the basics of the EOL, or End of Life, that Windows 7 and Windows Server 2008 are coming to. To recap; come January these operating systems are not supported. What does that mean? That hackers have written code and are prepared to launch it come the day of EOL and there’s nothing Microsoft will do about it. That means that these new strains of viruses, ransomware and keyloggers are one push of a button away from stopping your business dead in its tracks. Microsoft have given us all plenty of warning about this date, and it is fast approaching.
This is one of the best times to consider moving yourself towards the Cloud. Not only will the integration will be easy and cost efficient, but by moving to cloud your Operating System is always kept up to date, but will be on the latest version as well. You’ll never have to worry about upgrading again!
Will it still be safe to use Windows 7?
The constant evolution of computer viruses and other malware means security updates play a pivotal role in protecting a business’s data. Newly identified vulnerabilities will not be patched by Microsoft. Therefore, businesses that choose to continue running Windows 7 beyond this point will be doing so at their own risk. Leaving themselves vulnerable to cyber-attacks.
What’s the best route to change?
Implementing positive change can be expensive and time-consuming. To ensure your business experiences an efficient and cost-effective migration to Windows 10, you must understand your options: replace legacy systems with new devices that run Windows 10 or upgrade existing devices with a full version of the software.
Replacing legacy systems
According to Microsoft: “For most Windows 7 users, moving to a new device with Windows 10 will be the recommended path forward. Today’s PCs are faster, lightweight, yet powerful and more secure, with an average price that’s considerably less than that of the average PC eight years ago.”
Upgrading existing devices
Alternatively, it’s possible to upgrade compatible Windows 7 PCs by installing a version of the Windows 10 software. This may be the most cost-effective option in the short-term. However, it’s worth noting that PCs older than four years often cost more to maintain than a new Windows device.
How to implement your migration project
Avoid a situation where you need service or support that’s no longer available, by carefully planning your business’s migration to Windows 10. Having decided whether to replace or upgrade existing devices, it’s time to devise your implementation strategy.
Common issues to avoid during the migration
Avoid compatibility issues — evaluate the compatibility of Windows 10 with your business’s applications — these might include accounting, HR, CRM, and ERP. Despite being the most compatible version of Windows ever, take the time to coordinate with your application vendors to confirm their compatibility and avoid disruption further down the line. Applications that need upgrading should be tested separately prior to the upgrade to minimize user impact.
Avoid post migration issues — mitigate against potential post migration issues by implementing a strategic plan for each application. Adopting a proactive approach to your Windows 10 migration will help ensure a smooth user experience.
Avoid integration issues — some applications may require integration setup — this might include Outlook and CRM integration on the client PCs, browser add-ins and Office application plugins. To prevent any disruption, setup processes should be tested when upgrading to Windows 10.
Unsupported applications — although some applications may not be supported by Windows 10, this does not rule out an upgrade. For example, a legacy application can be replaced with a new Cloud-based solution.
Taking the time to implement your business’s migration to Windows 10 in a considered and well-planned manner will ensure a smooth transition for users and reduce risk. |
global_01_local_0_shard_00002368_processed.jsonl/34683 | Serialization: Serialization is a mechanism of converting the state of an object into a byte stream.
Deserialization: Deserialization is a mechanism to convert back to object from the byte stream.
This serialization and deserialization helps us in many scenarios like gaming, session state management etc.
Let’s understand this by examining computer games.
When we stop or pause a running computer game, it usually starts from the state where it was left off when we play it again. This is possible through the process of Serialization; which is saving the current object state as byte stream into file or database. Then to restore the object’s state when we access the game again is called Deserialization.
We will understand term defined in serialization process.
Illustration of Serialization and Deserialization
Illustration of Serialization and Deserialization
What is stream?
A stream is nothing but the sequence of data elements. In a computer system, there is a source that generates data in the form of stream and there is a destination which reads and consumes this stream. Here are the types of streams:
• Byte Stream: Byte stream does not have any encoding scheme and it uses 8-bit (or one byte) to store a single character. Byte stream is a low level input output (I/O) operation that can be performed by a JAVA program. To process such byte stream, we need to use a buffered approach for IO operations.
• Character Stream: Character stream is composed of the streams of characters with proper encoding scheme such as ASCII, UNICODE, or any other format. Unlike byte stream, the character stream will automatically translate to and from the local character set. JAVA language uses UNICODE system to store characters as character stream.
• Data Stream: Data Stream is used to perform binary IO operations for all the primitive data types in Java. We can perform I/O operations in an efficient and convenient way for Boolean, char, byte, short, int, long, float, double, and Strings, etc. by using data stream. It also allows us to read-write Java primitive data types instead of raw bytes.
• Object Stream: the state of a JAVA object can be converted into a byte stream that can be stored into a database, file, or transported to any known location like from web tier to app tier as data value object in client-server RMI applications. This process of writing the object state into a byte stream is known as Serialization.
When we will use serialization and deserialization?
In multi-tier JAVA/J2EE application (client-server RMI applications), when we make a remote invocation method or RMI from a web tier to app tier, we need to send the data value object that transfers the required business information from web tier to app tier after Serialization(we implement Serializable (Marker Interface) that we are now going to discuss in detail).
Marker Interface
An interface in Java without any field and method is a Marker interface. It is used to inform compiler that the class implementing it has some special behavior or meaning. Some of the Marker interfaces are-
• java.rmi.Remote
• java.util.RandomAccess
• java.lang.Cloneable
Although since Java 5 marker interfaces are replaced by annotations and they serve the same purpose as marker interfaces did before but for serializability we still use the interfaces and the transient keyword.
Data and Object Stream Interfaces
The following are the data and object stream interfaces which every Object Stream class implements. Object Stream class implements either of the two interfaces.
Note: All the primitive data I/O methods which are already covered in Data Streams are also implemented in object streams because these interfaces are the sub interface of Data streams interfaces.
Object Streams Classes
The following are the two classes used for Object Streams.
• ObjectInputStream
• This Java class is responsible for the deserialization of the serialized objects and the primitive data.
• This class helps to read the object from the graph of objects stored while using FileInputStream.
• It has a main method readObject() that is used to deserialize the object. It reads the class of the object, the signature of the class, and the values of the non-transient and non-static fields of the class, and all of its super types. Here is the method.
• ObjectOutputStream
• This class is responsible for the serialization of an object. It stores data primitives and a graph of Java object that are available to ObjectInputStream to read data from.
• It has a main writeObject() method that saves the super class and sub class data of a class or in other words, it serializes the object directly.
Transient Keyword
There are scenarios in which we want to store only a part of the object i.e. we want to omit some specific fields from the stored object just like password field from any user class or an Employee or you can think of any other sensitive information.
In these cases we mark these fields as transient and this keyword protects the field from being saved during the process of serialization.
Serialization and Deserialization Example
• Make sure that the Java class you need to store must implement Serializable interface.
• Notice that password field in the above class is made transient because it is a sensitive information and we don’t want to store it or you can chose any other field.
• Also there is another field named serialVersionUID which is a Long variable and it should be defined for all the Java classes because if it is not and if in future we need to perform any changes in the class like variables, methods etc then we would never be able to deserialize an already serialized object.
You can try it yourself by first serializing the object and then do some changes in your java class before deserializing it. You will get an error stating the change in SerialVersionUID which is generated automatically by the compiler.
• This class has two methods, first for deserialization, and the other is for serialization.
• The serialize method accepts the file path and name which has the byte stream of an object’s state and returns the Object that can be down casted to the corresponding serialized class object.
• In this deserialize method; first we open the file in read mode using FileInputStream class then we pass the object of this file to BufferedInputStream class constructor while instantiating it, which speeds up the reading operation. The object of BufferedInputStream class is passed to the constructor of class ObjectInputStream while instantiating this class. We can call the readObject() method of this class which will carry out the actual deserialization.
• Lastly, close the ObjectInputStream object and return the deserialized data value object.
• The serialize method accepts two parameters; i.e. the file path & name, and the data value object that is required to be serialized.
• In this serialize method first we open the file in write mode using FileOutputStream class then we pass the object of this file to BufferedOutputStream class constructor while instantiating it, which speeds up the writing operation. The object of BufferedOutputStream class is passed to the constructor of class ObjectOutputStream while instantiating this class. We can call the writeObject(object) method of this class to serialize the data value object and write the byte stream into the opened file.
• Lastly close the ObjectOutputStream object.
User [name=CodeNuclear, username=codenuclear, password=null]
One Thought on “Serialization and Deserialization in Java”
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/34702 | AnsweredAssumed Answered
Need Sample code for CAN protocol of FRDM-KW36 kit
Question asked by chandra mani on Nov 11, 2019
Latest reply on Nov 19, 2019 by Estephania Martinez
I am working on FRDM-KW36 on mcuxpresso ide. I was looking for sample codes for CAN protocol through which i can read the data of any car(PID value).There are some flexcan sample example available on the ide but i am facing a lot of problems for communication between the devices.
Please help me in the implementation of code or any sample code regarding this topic will be appreciable.
Thanks in advance. |
global_01_local_0_shard_00002368_processed.jsonl/34705 | Zipabox P1 Module - Connecting and installing
Connect the most popular household electricity meter devices onto your Zipabox. Monitor and control your household energy consumption from anywhere and any-time.
Connecting the P1 Module:
1. Power off your Zipabox
2. Connect P1 Module to either left or right side of the Zipabox (if using Power Module or Backup Module, connect P1 Module after those modules)
3. Using the supplied cable, connect P1 Module to your meter
4. Restore power to your Zipabox. When the top LED on the Zipabox turns solid green, your P1 Module is ready for use
Notice: This device is meant for mounting only with Zipabox. P1 Module must always be installed in expansion slot 2 of Zipabox. If you have other module already connected onto slot 2, you can connect P1 Module on it. Other modules can be attached to P1 Module.
Related Article: Installing and configuring DSMR Electricity Meter via Zipabox P1 Module
Is article helpful? |
global_01_local_0_shard_00002368_processed.jsonl/34716 | Photonic Logic Simulator via c/c++
Votes: 0
Views: 3033
Previous Next
In this summary I try to briefly introduce the problem and a design for cheap photonic logic circuit proofing.
The problem.
Photonic Computing is the use of light to do computation. Via intensity modulating laser sources in order to get a binary representation of info onto a carrier. Thus for 5 data lines one could use 5 colors of light but imagine for a moment that we would want to do some logic on a 5 bit data stream. One would imagine that it would be as easy as directing the data through the photonic logic blocks. If the circuitry was small it might just work but for complex scenarios one would need to predict the logic level and wavelength in question of the output in order for the circuit afterwards to be designed to accept or manipulate that particular wavelength with the data modulated on it.
From the Figure a basic 2 bit photonic adder is shown. For this design to work each block has to be designed for optimal response to the particular wavelength of the stream in question. This means that before the individual blocks are attempted to be designed the wavelengths to which they will see has to be considered.
The solution
This design will only give the theoretical (ideal) logic level and the wavelength information as we strive to achieve the ideal.
Firstly the blocks used in this design are inverter, and gate, and or gate. Just imagine each block having a ports (input / output) and these ports are connected through links and for each block it has a structure determining its properties for instance for an and gate it may need.
struct logic_gate{
int input_wavelength1;//wavelength,number
int input_wavelength2;//wavelength,number
int input_level1;
int input_level2;
int output_level;
int output_wavelength;
int time_ref;
Now from theory on photonic AND gates there is a wavelength conversion done in the circuit as well as AND logic. Its assumed that for the block level that whatever input wavelength is on port 1 of an AND gate the output will be on that particular wavelength. Hence if the input 1 is wavelength 1 with a 1 modulated onto it and the input 2 is wavelength 2 with a 1 modulated onto it the output would be wavelength 1 with a 1 modulated onto it. This example is simplistic but just imagine simulating complex circuitry with optical buffers wavelength converters as well as a list of other logic gate mappings how would one go about simulating such scenarios.
From above each block is assigned a port and each block would reside in a linked list and this may be a niave approach but for every circuit the output is calculated via traversing the list and determining the inputs and outputs via the ports and linkage information. Thus one can envisage a setup such that one could optimise circuitry via designing out wavelength converters and thus reducing complexity of circuitry. My proposal is to write a program in c++ to achieve this.
Kind Regards
Michael Cloran
Voting is closed!
• Name:
Michael Cloran
• Type of entry:
• Software used for this entry:
Linux C++ Photonic Theory
• Patent status: |
global_01_local_0_shard_00002368_processed.jsonl/34728 | August Update
Hail, bruised horses, a shredded garden
Large hail can do a number on horses, grass, and a garden
Day 2 of Stockwhip training
Tired and hot this week
It's been almost 100 degrees all week and we still haven't gotten our air conditioner fixed so we've all been hot and extra tired lately especially my dad. Haying season is in full swing now and we are almost half done with our first cutting on our pivot. I'm back on a horse everyday … Continue reading Tired and hot this week
Nice weather on the ranch
I ground-drove Georgie outside the pen for the first time yesterday and he did great! That was only the 4th or 5th time hes been ground driven and in just a halter no less. I looked up from my desk as I was working on my book and saw this bright fellow staring … Continue reading Nice weather on the ranch |
global_01_local_0_shard_00002368_processed.jsonl/34744 | Class Schedule
CrossFit Class
CrossFit Class
Athlete class
Advanced Athlete
Mobility Class
SWEAT30 class
Class Information
*Please RSVP a minimum of 1 hour before class.
To join a CrossFit, SWEAT30, Advance Athlete, Mobility and/or Open gym please click the RSVP and select which class you would like to join. A maximum of 13 people per class and you can book 14 days in advance, so please be quick.
Standard Weekly Schedule |
global_01_local_0_shard_00002368_processed.jsonl/34758 |
SQL injection vulnerability in the BOKUBLOCK (1) BbAdminViewsControl213 plugin before 1.1 and (2) BbAdminViewsControl plugin before 2.1 for EC-CUBE allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
Assigning CNA
Date Entry Created
Phase (Legacy)
Assigned (20151009)
Votes (Legacy)
Comments (Legacy)
Proposed (Legacy) |
global_01_local_0_shard_00002368_processed.jsonl/34772 | Bodily History
At a recent event, a number of family members ended up together. An observation was made that sometimes, when my mother is annoyed with me, she calls me by my uncles name – her younger brother. (it doesn’t happen often 😉 Evidently something about me reminds her of him in that circumstance, mixing the identification. My nephews wife observed that I shared many mannerisms and the way I spoke with her husband.
Considering that both my uncle and nephew lived in other cities when such mirroring may have been learned, it’s clear that these behaviors are passed on by another method. Certainly some behaviors could be picked up from the mothers, but what of male only characteristics?
This year is the 150th anniversary of Darwin’s seminal “On the Origins of the Species”, demonstrating evidence for evolution by random selection. In effect, mechanistic evolution by genetic accident. In Darwin’s day, a chief rival concept was Lamarkism, the idea that we could pass on learning and behaviors to our children. A predisposed skill with a language or tools, for example. Darwin won the scientific debate of the day and Darwinism became a prominent part of the construct of modern biology.
In time, Darwin has been found to be only partly right. And Lamark turns out to be partly right as well. Some behavioral predispositions are passed on. I’ve seen suggestions that this may be carried by the cellular mitocondria, but if we consider that memory is not stored physically, as Rupert Sheldrake has observed, perhaps neither is inherited predispositions.
They would be part of the ‘the field’. If we understand that the world arises from consciousness, this makes more sense. Awareness causes structure, causes fields, causes form. The fields thus generate form and the fields arise from structured intelligence.
Coming back to the ideas of Darwin, one can observe that random mutation would tend to favour degradation of the species according to laws of physics like the thermodynamics laws of entropy. There should be a tendency to devolve. As many of our most illustrious scientists would agree, if you pay attention to the world, there is clearly an a priori intelligence. Something adding order and structure and counteracting inertia and entropy. They note that the laws of nature and constants of the physical world seem to favour life, for example.
Bruce Lipton has observed that less than 5% of physical issues are genetic. Thus, it is not as large a factor in quality of life as other behavioral tendencies. In other words, these predispositions are more important to recognize that our genes. And they’re not as fixed.
Now, the interesting thing is that each cell has this complete intelligence or memory. It came with the sperm and the egg when they united. Clearly, vast quantities of data can be stored and space is not an issue.
But why do genetically matched twins in the same family sometimes develop quite different traits? We could suggest recessive behaviors from prior generations. But there’s the other factor to the equation we begin our life with. This is the soul. We are both body and spirit. Past lives may be considered part of the record of the soul, but it goes more deeply. To the purpose or intention of the of the soul to be. We could say the past are the predispositions and the purpose is the genes of soul.
It can also be mentioned that souls often evolve in groups, so we’re often born with people with whom we have a history. The soul may even sync occasionally with it’s own blood history. I know someone who’s their own granddaughter.
Think you’ll figure yourselves out? We only have many thousands of years of souls history and thousands of years of blood history to get to know…
Average rating 0 / 5. Vote count: 0
Bookmark the permalink.
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/34776 | DB-EnginesCrateDB bannerEnglish
Knowledge Base of Relational and NoSQL Database Management Systemsprovided by solid IT
DBMS > Cloudant vs. JaguarDB vs. Microsoft Azure Cosmos DB vs. TigerGraph
System Properties Comparison Cloudant vs. JaguarDB vs. Microsoft Azure Cosmos DB vs. TigerGraph
Please select another system to include it in the comparison.
Editorial information provided by DB-Engines
NameCloudant Xexclude from comparisonJaguarDB Xexclude from comparisonMicrosoft Azure Cosmos DB infoformer name was Azure DocumentDB Xexclude from comparisonTigerGraph Xexclude from comparison
DescriptionDatabase as a Service offering based on Apache CouchDBPerformant, highly scalable DBMS for AI and IoT applicationsGlobally distributed, horizontally scalable, multi-model database serviceA complete, distributed, parallel graph computing platform supporting web-scale data analytics in real-time
Primary database modelDocument storeKey-value storeDocument store
Graph DBMS
Key-value store
Wide column store
Graph DBMS
DB-Engines Ranking infomeasures the popularity of database management systemsranking trend
Trend Chart
Rank#82 Overall
#15 Document stores
Rank#334 Overall
#59 Key-value stores
Rank#24 Overall
#4 Document stores
#2 Graph DBMS
#3 Key-value stores
#3 Wide column stores
Rank#151 Overall
#11 Graph DBMS
Technical documentationdocs.cloudant.comwww.datajaguar.com/support.phpdocs.microsoft.com/en-us/azure/cosmos-dbdocs.tigergraph.com
DeveloperIBM, Apache Software Foundation infoIBM acquired Cloudant in February 2014DataJaguar, Inc.Microsoft
Initial release2010201520142017
Current release2.9.4 September 2018
License infoCommercial or Open SourcecommercialOpen Source infoGPL V3.0commercialcommercial
Cloud-based only infoOnly available as a cloud serviceyesnoyesno
DBaaS offerings (sponsored links) infoDatabase as a Service
Providers of DBaaS offerings, please contact us to be listed.
Implementation languageErlangC++ infothe server part. Clients available in other languagesC++
Server operating systemshostedLinuxhostedLinux
Data schemeschema-freeyesschema-freeyes
Typing infopredefined data types such as float or datenoyesyes infoJSON typesyes
Secondary indexesyesyesyes infoAll properties auto-indexed by default
SQL infoSupport of SQLnoA subset of ANSI SQL is implemented infobut no views, foreign keys, triggersSQL-like query languageSQL-like query language (GSQL)
APIs and other access methodsRESTful HTTP/JSON APIJDBC
DocumentDB API
Graph API (Gremlin)
Table API
GSQL (TigerGraph Query Language)
Supported programming languagesC#
JavaScript (Node.js)
JavaScript (Node.js)
MongoDB client drivers written for various programming languages
Server-side scripts infoStored proceduresView functions (Map-Reduce) in JavaScriptnoJavaScriptyes
Master-slave replication
Master-master replicationyes infoImplicit feature of the cloud service
Consistency concepts infoMethods to ensure consistency in a distributed systemEventual ConsistencyEventual ConsistencyBounded Staleness
Consistent Prefix
Eventual Consistency
Immediate Consistency infoConsistency level configurable on request level
Session Consistency
Foreign keys infoReferential integritynononoyes infoRelationships in graphs
Transaction concepts infoSupport to ensure data integrity after non-atomic manipulations of datano infoatomic operations within a document possiblenoMulti-item ACID transactions with snapshot isolation within a partitionACID
Concurrency infoSupport for concurrent manipulation of datayes infoOptimistic lockingyesyesyes
Durability infoSupport for making data persistentyesyesyesyes
User concepts infoAccess controlAccess rights for users can be defined per databaserights management via user accountsAccess rights can be defined down to the item levelRole-based access control
More information provided by the system vendor
CloudantJaguarDBMicrosoft Azure Cosmos DB infoformer name was Azure DocumentDBTigerGraph
Specific characteristicsSQL support, group by, order by, join
» more
» more
» more
» more
» more
» more
Key customersQuantea, 2PiDay, Synqy, SinoLogistics, IIVI
» more
» more
Market metricsAdvertising awareness, installed base, brand image, market share
» more
» more
» more
» more
Related products and services
» more
More resources
CloudantJaguarDBMicrosoft Azure Cosmos DB infoformer name was Azure DocumentDBTigerGraph
DB-Engines blog posts
7 February 2017, Matthias Gelbmann
Increased popularity for consuming DBMS services out of the cloud
2 October 2015, Paul Andlinger
4 August 2014, Paul Andlinger
show all
Recent citations in the news
IBM Adds Kubernetes Operator for CouchDB
26 September 2019, Datanami
IBM to Purchase Cloudant Database as a service (DBaaS) Provider
22 March 2014, App Developer Magazine
Meet the finalists for IBM's $200K Call for Code competition
9 September 2019, The Next Web
How to Trigger OpenWhisk Actions on Cloudant Databases Changes
27 July 2016, DZone News
22 July 2013, PR Newswire
provided by Google News
17 January 2020, Channel 9
NoSQL Databases Software Market Is Estimated To Witness The Highest Growth By 2024 With Leading Players - MongoDB, Amazon, ArangoDB, Azure Cosmos DB, Couchbase, MarkLogic - Expedition 99
22 January 2020, Expedition 99
Azure Cosmos DB gets built-in Jupyter notebooks support
1 October 2019, DevClass
Graph Databases Software Market (2020 To 2027) Global Industry Analysis with Top Players Neo4j, ArangoDB, Amazon Neptune, OrientDB – Dagoretti News
21 January 2020, Dagoretti News
18 November 2019, Channel 9
provided by Google News
TigerGraph Improves Graph Database As A Service
9 January 2020, iProgrammer
14 January 2020, Yahoo Finance
TigerGraph raises $32 million for graph database tools
25 September 2019, VentureBeat
Experts talk Big Data and Analytics Trends for 2020
3 January 2020, Database Trends and Applications
TigerGraph launches graph database as a service
2 October 2019, InfoWorld
provided by Google News
Job opportunities
Software Developer
IBM, San Jose, CA
Principal Software Engineer, Cosmos DB
Microsoft, Atlanta, GA
Azure: Production Support
ITL USA, Weehawken, NJ
Senior Software Engineer, Cosmos DB
Microsoft, Atlanta, GA
Azure Data Analytics Architect
Blue Chip Consulting Group, Remote
Azure Customer Engineering Manager
Microsoft, United States
Software Engineer
TigerGraph, Redwood City, CA
Data Engineer
rMark Bio, Chicago, IL
System Engineer, Infrastructure
TigerGraph, Redwood City, CA
Manager Data Engineering
HBO, New York, NY
Sales Development Representative
TigerGraph, Redwood City, CA
jobs by Indeed
Share this page
Featured Products
Neo4j logo
machine learning, graph analytics and more.
Datastax Luna logo
Simple, subscription-based support for open source
Apache Cassandra™ from the Cassandra experts.
Learn more.
Couchbase logo
Power, flexibility & scale.
All open source.
Get started now.
MariaDB logo
How do MariaDB, Oracle MySQL and EnterpriseDB compare?
Get the white paper to
learn more.
AllegroGraph logo
Free Download
Present your product here |
global_01_local_0_shard_00002368_processed.jsonl/34783 | Chandralekha Panda
...and when heartbreak knocks on your door
Take it in gently.
It's there to hurt you
It's there to teach you
It's there to mould you into a stronger version of yourself.
...and when heartbreak scatters your heart around
Assemble it carefully.
It's around to be remade into a stronger one
It's around to reflect your mistakes of not approving self-love
It's around to show you the people having your back.
...and when heartbreak hurts you in ways, that's beyond your endurance
Cry out your anger and hurt,
because they say salt water cleanses you;
because they say tears helps you visualize better;
because they say, catharsis is necessary to purge more of anything that's harmful.
...and since saying things is easier than experiencing it.
Keep your hand on the broken heart,
and feel it for yourself.
... because even the broken shards of mirror
never refects a flawed or a distorted image.
In it lies it's beauty,
Even in it's brokenness, it never losses it's essence.
1 comment
• Beautifully described…. 👌
Bhavana doni
Leave a comment |
global_01_local_0_shard_00002368_processed.jsonl/34786 | Microsoft Exchange Server messes up multipart alternative messages
For our product timr we are currently implementing new HTML email templates for sending registration mails and other information. The application is based using the Spring Framework and we use Velocity templates for creating the emails.
I put a lot of time into making sure that the emails are displayed correct in as many email clients as possible and we are adding a plain text alternative too. The plain text alternative is included in the mail via multipart/alternative. I tried sending the mails to my private gmail account and my company account viewing the received mails via the browser interfaces (gmail and outlook web) and different clients (Outlook, Apple Mail, Thunderbird, …).
While doing these tests I noticed something I could not explain: The emails sent to my office account did not allow me to view the plain text alternative regardless of which client I used. After wondering a while I started to look for possible explanations and found out that this was caused by the Microsoft Exchange Server we are using.
It seems like the Microsoft Exchange Server decides which part of an email the user can see. Unlike defined in the email standard, where the user (or the client that is used to view the email) decides which part of the email should be displayed. But this is not the first case where Microsoft does not comply with the standards (looking at you Internet Explorer!)
There is a forum discussion about this topic here, which is kind of funny to read (flamewar).
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/34806 | Configure a classic policy
You can configure classic policies and classic expressions by using either the configuration utility or the command-line interface. A policy rule cannot exceed 1,499 characters. When configuring the policy rule, you can use named classic expressions. For more information about named expressions, see Create named classic expressions. After configuring the policy, you bind it either globally or to a virtual server.
Note that there are small variations in the policy configuration methods for various Citrix ADC features.
Note: You can embed a classic expression in a default syntax expression by using the syntax SYS.EVAL_CLASSIC_EXPR(classic_expression), specifying the classic_expression as the argument.
Create a classic policy by using the CLI
- add cmp policy <name> -rule <expression> -action <action>
- show cmp policy [<policyName>]
The following commands first create a compression action and then create a compression policy that applies the action:
> add cmp action cmp-act-compress compress
> show cmp action cmp-act-compress
1) Name: cmp-act-compress Compression Type: compress
> add cmp pol cmp-pol-compress -rule ExpCheckIp -resAction cmp-act-compress
> show cmp pol cmp-pol-compress
1) Name: cmp-pol-compress Rule: ExpCheckIp
Response action: cmp-act-compress Hits: 0
Create a policy with classic expressions by using the GUI
1. In the navigation pane, expand the feature for which you want to configure a policy and, depending on the feature, do the following:
• For Content Switching, Cache Redirection, and the application firewall, click Policies.
• For SSL, click Policies, and then in the details pane, click the Policies tab.
• For System Authentication, click Authentication, and then in the details pane, click the Policies tab.
• For Filter, SureConnect, and Priority Queuing, expand Protection Features, select the desired function, and then in the details pane, click the Policies tab.
• For the Citrix Gateway, expand Citrix Gateway, expand Policies, select the desired function, and then in the details pane, click the Policies tab.
2. For most features, click the Add button.
3. In the Create <feature name> Policy dialog box, in the Name* text box, enter a name for the policy.
Note: You must begin a policy name with a letter or underscore. A policy name can consist of 1 to 31 characters, including letters, numbers, hyphen (-), period (.), pound sign (#), space ( ), and underscore (_).
4. For most features, you associate an action or a profile. For example, you may be required to select an action, or, in the case of an Citrix Gateway or application firewall policy, you select a profile to associate with the policy. A profile is a set of configuration options that operate as a set of actions that are applied when the data being analyzed matches the policy rule.
5. Create an expression that describes the type of data that you want this policy to match.
Depending on the type of policy you want to create, you can choose a predefined expression, or you can create a new expression.
Named expressions are predefined expressions that you can reference by name in a policy rule.
6. Click Create to create your new policy.
7. Click Close to return to the Policies screen for the type of policy you were creating. |
global_01_local_0_shard_00002368_processed.jsonl/34808 |
Versions Compared
• This line was added.
• This line was removed.
• Formatting was changed.
The wso2throttle module is for controlling client access to web service engine. Using the management console of a Carbon server, you can enable access throttling at global level, operational level or service level.
For instructions on enabling access throttling at a service level or operational level, refer to sections Access Throttling and Operation Management.
Follow the instructions below to configure the wso2throttle module on a global level. |
global_01_local_0_shard_00002368_processed.jsonl/34813 | How to Say Pretty in Korean
How to Say Pretty in Korean
How to Say Pretty in Korean
Hey everyone! We’re back for another short lesson. In this lesson, we’re going to teach you how to say pretty in Korean. Maybe you would like to give someone a compliment, or maybe you want to ask if something you bought is pretty (maybe a gift for someone?).
We will teach you the many ways to express pretty.
Let’s start with the basics.
If you just want to say someone is pretty, you can use the three phrases in the graphic above. Let’s break them down:
예뻐 (ye-ppeo)
This is the informal way to call someone pretty. Use this around people closest to you like family and close friends.
Ex. 그 여자가 너무 예뻐 (geu yeo-ja-ga neo-mu ye-ppeo) = That girl is so pretty.
예뻐요 (ye-ppeo-yo) = This is the polite way to say pretty in Korean. Use this around casual friends and people you don’t know well.
예쁩니다 (ye-ppeum-ni-da) = This is the formal version that you would use to people older than you in formal settings. Although you will hear the above forms way more often than this one, keep this one in mind for special occasions.
예쁘다 (ye-ppeu-da) = This is the standard dictionary form of the word pretty, but is also used in daily conversation like the forms above. This form is also considered informal.
Now, there is also a nonstandard form that people use. It is spelled “이쁘다” and is used mainly in daily conversation. It’s sort of a slang form of the word pretty and is rarely used in written form.
Now what if you want to say something like “the pretty girl” or “the pretty flower”.
You would then use the noun form of 예쁘다. Just like with all other Korean verbs and adjectives, you do this by removing the verb stem, and adding “은” or “는” to the word.
예쁘다 —-> 예쁘 ——> 예쁜
So pretty girl would be “예쁜 여자” and pretty flower would be “예쁜 꽃”.
Finally, what if you think something is pretty and you want to ask your friend to confirm it. Let’s say you’re shopping with your friend, see a nice outfit, and you want to ask “It’s pretty isn’t it?”
You would say:
예쁘지요? (ye-ppeu-ji-yo) = It’s pretty isn’t it?
This can be shortened to “예쁘죠?” (ye-ppeu-jyo)
If you want to say the same thing informally, you would say “예쁘지?” (ye-ppeu-ji)
And that’s it! Keep in mind that Koreans only use this for women. We will cover some other phrases related to appearance in future lessons!
Click here for more ebooks at our store |
global_01_local_0_shard_00002368_processed.jsonl/34842 | Kurt Cobain’s Trap
Kurt Cobain managed to be himself and make a living, but he realized that his identity had turned into a mere brand. He often spoke about how much he hated his own audience. They were exactly the kind of people who made his life miserable when he was younger; jocks, frat boys, and other normative people. For him, the fact that he became successful was a sweet revenge against them, and he enjoyed that status for a short period of time. But once the honeymoon period was over, he realized that it is these normative people who were making him rich and famous, and they just wanted him to perform his catchy songs as if he were a wedding singer. They consumed his music like they consumed Coca-cola, Nike, McDonalds, Starbucks, etc.. He probably felt like those normative people beat him again. But at that point, what was he to do? He was being himself, singing about what he believed in. The problem is that the consumers of his music didn’t get it, nor did they care to get it. In a way, they made a mockery of his art. He then deliberately wrote songs that weren’t so catchy. But, ironically, he was lying to himself by doing so; he was writing out of spite. It was no longer about writing something he liked, but about something the mainstream hated. Most musicians sell their souls to be loved by their audience (write what they think their audience would like); in his case, he sold his soul to be hated by the mainstream. It was a strange situation and he obviously did not know how to get out of it. |
global_01_local_0_shard_00002368_processed.jsonl/34843 | The Aaronic Blessing
The Aaronic Blessing
Numbers 6:24-26: “The LORD bless you and keep you…”
Over the next few Global Updates, I will attempt to expand our understanding of this very prolific and beloved portion of Scripture. In fact, scholars tell us that this prayer may be only one of two prayers that have been written by God Himself. The second being, of course, the “Our Father.”
In Hebrew, every word is either concrete or abstract in its interpretation. Concrete words can be understood through the five senses. You can touch, taste, see, smell, or hear them. Abstract words are just the contrary; for example, how do you define “bless” or “keep”? However, every abstract word does find its origin in the “concrete”. You just have to dig a bit to find it.
In order to understand fully what God is saying to us we must look to the Scriptures themselves to find the true depth and meaning of these important words in this fertile message.
The origin of the word “bless” can be found in Genesis 24:11: “…and he made the camels kneel down outside the city.” The words kneel down are translated from the Hebrew word Barakh. The word Barakh means to drop to the knee and present a gift. When a man proposes to his fiancée he performs a Barakh. We also see in the New Testament that Jesus girded Himself with a towel and performed a Barakh, as he knelt before his disciples and washed their feet.
The fullness of this phrase is this: as one honors the LORD, He (the LORD) comes and honors them and bestows a gift upon them. Wow!
The second abstract word in this first phrase is “Keep.” The word “keep” finds its origin in the Hebrew word Shamar. Since the Hebrews were a nomadic people during this time in their history, they would need to “keep” their flocks safe in the evenings from predators. They would build a structure from either stone or wood in a circle to corral the animals in safety. Around the top of the Shamar, they would place a Shamere which were large 2-3 inch thorns to further discourage any predators from harming the sheep.
Now let’s look at this first of these three phrases in the Aaronic Blessing from a Hebraic perspective: When you and I honor HIM, He, The LORD, (He who exists), will come and bless (kneel before you in a position of honor and present you with a gift), and will keep you (while guarding you with a hedge of protection built around you)…
What a wonderful God we serve!
Blessings and Shalom!
Pastor Joe Green
Sr. Vice President of Development
Eagles’ Wings/ Israel Christian Nexus
Recent Posts |
global_01_local_0_shard_00002368_processed.jsonl/34849 | Your child’s attendance in school this year will enable him/her to build a strong academic foundation for the future. To fully benefit from the curriculum and instruction offered here in the classroom, he/she needs to attend school daily, Monday-Friday each week.
If your child is sick, however, he/she must stay home, even if he/she wants to come to school. Preschoolers pass “viruses” back and forth so easily at school when ill. District policy requires children to stay at home if they have a temperature of 100 degrees or higher or if they are throwing up or have excessive diarrhea.
Please call the school attendance secretary (573-785-6803) to let her know when your child is sick. We worry about our students. |
global_01_local_0_shard_00002368_processed.jsonl/34866 | I am unable to use the app store. After a recent update, it says that I must be connected to the internet, when I am. The only thing I can think of that might be causing this issue is that I have 3 NIC's in my machine due to using VM's. Can anyone please assist?
enter image description here
I had exactly the same problem.
The solution is in this post: 'no' internet connection within appcenter
Edit your /etc/network/interfaces and add the following:
auto eno1
iface eno1 inet dhcp
(eno1 might be eth0 or something else, its your Ethernet adapter name)
Then restart your network-manager:
sudo service network-manager restart
And it should work
• I still use my other Ethernet ports as bridge connections for vm's this won't affect them will they? – Temple Pate Aug 14 '17 at 12:43
|
global_01_local_0_shard_00002368_processed.jsonl/34886 | From WikiFur, the furry encyclopedia.
Jump to: navigation, search
Hoof is the name given to the toenail of any ungulate mammal (meaning of "having hooves"), with the possible exception of the hippopotamus. In perissodactyls animals' hooves, including horses and tapirs, there is an odd number of hooves per foot, and in artiodactyls, including domestic cattle of various kinds as well as giraffes and camels, there is an even number.
Hooves and furry[edit]
In furry and funny animal art, there are two basic schools of thought for adapting the front feet of a character that naturally has hooves:
• In one, the hoof is left as-is, and the character manipulates/grasps objects by natural or unnatural means.[clarify]
• In the other, the hoof is replaced by a hand, or a hand with hoof-like fingers (artist SueDeer's personal character is an example of this approach). In the case of artist Dan Canaan's character, Flinthoof Ponypal, there is something of a compromise with three fingers instead of five.
Puzzlepiece32.png Help expand this stub.
view · talk · edit
Limb styles
Body parts |
global_01_local_0_shard_00002368_processed.jsonl/34887 | From Wikiversity
Jump to navigation Jump to search
This is the Talk page for discussing VoIP
This page is used for general discussion of VoIP. For discussion on a particular subpage, please use its talk page
Wikimedia Foundation
Getting started[edit]
OK. We know you're out there! Please grab yourself an IRC client if you don't already have one, and tune it to #wikiversity-en and we'll work through getting connected. CQ 02:50, 23 January 2007 (UTC)
Teleconference instructions[edit]
We're doing some teleconferencing tests. We can write up instructions below. CQ 20:36, 2 February 2007 (UTC)
Asterisk and MozIAX[edit]
We have an ongoing Asterisk conference line set up. You will need a headset and softphone such as MozIAX to connect. There are other clients that work, too.
Look at Talk:Wikio and Wikiversity talk:Sandbox Server for some progress and agenda stuff. Tune in to #wikiversity-en to get the server IP and other details. CQ 20:42, 2 February 2007 (UTC)
New Tester Available[edit]
Hi guys, I just got a camera and microphone system so I guess in theory I can get setup to use voip. I will download MozIAX and try to get installed and make contact sometime this weekend. Mirwin 10:09, 9 February 2007 (UTC)
Ok I have MozIAX installed and apparently functional. I go now to find an IRC client for Windows XP/Firefox. Mirwin 11:09, 9 February 2007 (UTC)
Free voice conference[edit]
Hi. I've been talking vaguely with JWSchmidt about teamspeak. I's a free (for non-profit orgs, etc.) voice conference system. It allows recording by the client, setting up your own voice server, setting up channels (rooms) as allowing free entrance or private, up to 100 participants (1000 per free server). I'm not related to the thing, I've just been using it in the context of IVAO flight simulation network. A few tests might be useful to assess it's real uses and utility in a learning environment; namely, never having used voice chat, I don't know if it has advantages over it. All you need is a headset (os so) and downloading the client, there are public servers already running. Still, a "chalkboard" system would be necessary to exchange written notes, sketches and links. HolyZarkon 08:59, 30 April 2007 (UTC) |
global_01_local_0_shard_00002368_processed.jsonl/34889 | Technology, Media & Telecom
tech train (2).jpg
Tech Train
Mazars publiceert een wereldwijd onderzoek naar de mate waarin ondernemers bekend zijn met vijf...
Want to know more? |
global_01_local_0_shard_00002368_processed.jsonl/34903 | FAQ’s About Etizolam
Etizolam is a drug marketed under the names Etilaam, Sedekopan, Pasaden, Etizola, Etizest, and Depas. It is an analog of benzodiazepines. The molecule that makes up etizolam differs from benzodiazepines because the benzene ring is replaced by a triazole and thiophene ring that have been fused.
etizolam 1mg etizolam 2mg
It is an anxiolytic, amnesic, hypnotic, anticonvulsant, skeletal muscle relaxant, and a sedative. This drug can be used to help treat issues like this. Contact your doctor and ask if this drug might be the right choice for you. Here is all the information you might need to know about Etizolam and the effects it has on you.
What is Etizolam and What is etizolam tablet used For?
Etizolam is similar to benzodiazepines. They are pills that are prescribed in many countries for the treatment of anxiety. The medication is a thienotriazolodiazepine that has anticonvulsant, amnesic, hypnotic, anxiolytic, and sedative properties. It is prescribed for the short-term treatment of insomnia, anxiety, and panic attacks.
Etizolam Legality and its legal status in USA
Etizolam is legal in some areas and illegal in others. In Germany, Etizolam was made illegal in July of 2013. Poland considers it a controlled substance as well as Switzerland. In the United Kingdom, Etizolam is considered a Class C drug since May 31st of 2017. It is now illegal to produce, supply, or possess this drug. In the United States, legality differs from state to state. It is controlled in Georgia, Virginia, Mississippi, Florida, Arkansas, Alabama, and Indiana. Federally, it is unscheduled making it legal to possess and use for research purposes. Japan has restricted Etizolam since October of 2016.
What is the Etizolam Half-life And Etizolam Duration?
The half-life of Etizolam is approximately 3.5 while plasma levels peak between 30 minutes and 2 hours. The total duration of the chemical is between 5 and 7 hours.
Is It Possible to Overdose on Etizolam?
It is possible to overdose when Etizolam is taken at extremely high doses or if it is combined with depressants. It is extremely dangerous to take it with barbiturates and alcohol which potentiate each other’s effects. Overdose is a medical emergency that can result in coma, brain injury, or death if not treated quickly and properly.
What Are the Symptoms of Etizolam Overdose?
The symptoms of overdose present with severe thought deceleration, confusion, respiratory depression, slurred speech, delusions, coma and, in the most severe cases, death. They can be effectively treated in a hospital environment by using flumazenil.
What is the Correct Dose of Etizolam?
Etizolam Dosage is different for each individual. The threshold dose is between 0.2 and 0.5 mg. A light dose is considered to be between 0.5 and 1 mg. The common dosage is around 1 to 2 mg. A strong dose is between 2 and 5 mg. A heavy dose is anything above 5 mg. Etizolam dosage for sleep is 1-2mg before bed each night.
FAQ's About Etizolam
What are the Effects of Etizolam?
This list of effects will rarely ever occur all at once but a heavier dose will increase the presence of these effects. The physical effects of Etizolam include sedation, physical euphoria, motor control loss, muscle relaxation, respiratory depression, seizure suppression, increased libido, dizziness, appetite enhancement, and temporary erectile dysfunction.
What are the Side Effects of Etizolam?
Cognitive effects of Etizolam include a variety of things. It helps to suppress anxiety, lessen your inhibitions, euphoria, compulsive redosing, the suppression of memory, delusions of sobriety, suppression of information processing, suppression of analysis, the inflation of the ego, the deceleration of thoughts, suppression of motivation, suppression of emotions, and sleepiness.
Etizolam 0.5mg & 0.25mg Side Effects
Etizolam 0.5mg & 0.25mg both have same side effects but its totally depend on magnitude of dosage. Higher the magnitude will cause more effects.
What Effects Linger After Taking Etizolam?
Some effects are present after taking Etizolam for a period of time. These include the return of anxiety, the suppression or potentiation of dreams, a residual sleepiness, the continued deceleration of thoughts, disorganization of thoughts, and irritability.
Does Etizolam Addiction have the Potential?
Etizolam has been found to be extremely psychologically and physically addictive. Tolerance has been shown for its anticonvulsant properties at a lower rate than with benzodiazepine drugs. It does, however, develop a tolerance when it comes to its sedative and hypnotic effects. This can happen in as soon as a few days of continued use. When not using the medication your tolerance should return to normal in between 1 and 2 weeks. Some cases may take longer depending on the duration and the intensity of the person’s long-term usage.
A study that compared Etizolam to other current treatments for anxiety showed that the drugs all retained effectiveness for a couple weeks. Etizolam then became more effective from the second week to the fourth week proving a reverse tolerance. When administering 0.5 mg of Etizolam twice a day it did not induce any cognitive deficits over a period of three weeks when compared to a placebo.
What Side-Effects are Presented With Etizolam Use?
One side effect of prolonged use of Etizolam is Blepharospasms. This is an uncontrollable twitching in the eye. In very rare cases patients saw skin lesions called erythema annulare. It may reduce your REM sleep. Etizolam has also shown similar characteristics to drugs in the class tricyclic antidepressants.
What are the Signs of Etizolam Withdrawal?
There are withdrawal and rebound symptoms that occur after abruptly stopping use after a few weeks of regular dosing. Usually, it is best to taper yourself off of the medication if possible. It is notoriously difficult and can potentially be life-threatening for anyone who regularly uses it. If you discontinue use without lessening the dose over a period of a couple of weeks, it can be even harder. There is an increased risk of seizures and you should avoid any medication that lowers the threshold of seizures during withdrawal.
Etizolam has the potential for abuse and cases of dependence have been documented in some professional medical literature. There are, however, conflicting reports presented by the World Health Organization, or WHO, made in 1991 that disputes these claims of abuse potential.
What are the Routes of Administration for Etizolam?
The routes of administration for Etizolam include oral, sublingual, and rectal. Bioavailability of these different routes is similar and at a high percentage above 90%. It is theoretically also possible to use Etizolam by insufflating and using it intravenously.
Where To Buy Etizolam?
There are many research chemical vendors online that supply Etizolam to countries and states where it is legal. You should research the website you plan on ordering from to make sure that they are legitimate. Many research chemical vendor websites are scams and prey on those hoping to find relief. On these websites, the drug is sold for research purposes only and are not to be consumed. Various websites have different rules as to where they will ship to depending on the legality in your area and the preferences of those that shop the chemicals. These sites distribute Etizolam in blotter form and in pill form that dissolves in your mouth.
Various Etizolam Research Chemicals
There is a community of people who share their experiences with various research chemicals including Etizolam. The most popular is the Erowid Experience Vault. Individuals send in detailed reports of experiences they have had with the chemical including information about how much they took, the effects it had on them, and what route they used to administer the drug. If you plan on taking this chemical, you can gain a wealth of information about it from this and other similar resources.
Etizolam Opiate Withdrawal
Etizolam has been used to help with the withdrawal symptoms of alcohol and opiate abuse. Administering this drug to patients with these issues can help solve issues involving anxiety and sleep. Talk to a doctor about whether a medical detoxification program might be best for your situation.
Etizolam Drug Test Appearnce
It is possible to test for the presence of Etizolam in the blood and urine. It will, however, not show up on a standard drug test and must be tested for specifically. Metabolites of Etizolam have a half life of slightly longer than the drug itself and is what the specific drug test will look for in your system. At just over 8 hours about half of the metabolite will be left in your system as compared to the 6 hours that the Etizolam takes to decrease this amount.
When used properly, Etizolam can be a helpful medication to help solve some issues you are having. You should avoid prolonged use at high doses because of the potential for physical and psychological withdrawal. It is able to produce a reduction of the time it takes to fall asleep, an increase in the total sleep time, and a reduction in how many times you awaken during the night. If this sounds like a drug that might help you, contact a medical professional to see what they can do for you.
Leave a Comment
Best USA Etizolam Vendor Buy Now |
global_01_local_0_shard_00002368_processed.jsonl/34912 | Setting up early-bird incentives
• Created : 10th December, 2016
• Last Updated: 10th December, 2016
Table of Contents
Early bird incentives are a great way to encourage more sign ups to your event. Typically an early bird will offer people a discounted entry fee in return for them signing up before a certain date. If your event has an early bird rate available, that is also highlighted in several places in SportyHQ's interface. We strongly encourage you to use early bird signups, as you'll find that even with only a small discount, people will take advantage of the savings and sign up to your event before the last minute!
Enabling the early-bird option
From your main tournament page, go to the Tournament Settings link in the Administrator bar.
Screen Shot 2015-12-29 at 10.29.50 PM
Scroll down to the Pricing Information box. Within that box, you'll see an option to enable the early-bird discount.
Screen Shot 2015-12-29 at 10.31.05 PM
Click Yes to enable the option, and then complete:
1. The date on which the early bird will expire
2. The number of early bird entries you will allow. If this limit is reached before the early bird deadline expires, then the early bird offering will no longer be offered. If you don't want to set a limit on the number of early bird entries allowed, enter 0 (zero) in to this field.
Scroll to the bottom of the page and hit Submit.
Setup Early Bird Pricing
You should make sure that you have gone through all of the steps required to get your online registration process enabled. Click here to view our article on that topic. This section assumes that you have already completed the steps in that article.
From your Administrator bar, choose the Setup Tournament Pricing link.
Screen Shot 2015-12-29 at 10.35.19 PM
If you have your pricing plans setup, click on Edit next to one of your plans. Enable the Early Bird option and enter in the price for the early registration. Of course, this price is typically lower than your regular registration rate.
Screen Shot 2015-12-29 at 10.51.03 PM
Hit Submit and then edit any other pricing categories you have where you'd like to offer an early bird registration discount.
That's all there is to it.
What potential registrants will now see...
Now that you have your early bird pricing setup, potential registrants will have the early bird pricing highlighted to them in several places.
1. On the main SportyHQ tournaments page, there's a green label to indicate that the tournament has early bird rates.
Screen Shot 2015-12-29 at 10.54.17 PM
2. On the tournament page, the pricing section highlights the early bird rates, with the deadline displayed and the savings available for each pricing category.
Screen Shot 2015-12-29 at 10.54.05 PM
3. On the sign up page itself.
Screen Shot 2015-12-29 at 10.56.15 PM |
global_01_local_0_shard_00002368_processed.jsonl/34913 | How HTML Works
HTML is a set of tags that tell a Web browser how to display text. Tags mostly come in pairs of opening and closing tags, like <em> and </em>. Any text surrounded by a pair of tags is displayed the way the tags tell your browser to display it. E2's built-in HTML toolbar is designed to insert common tags for you at the press of a button. The basic tags and examples of their effects are shown below.
Words and Phrases
Put emphasis on stuff with <em>stuff</em> (the button is marked i on E2's built-in HTML toolbar because most browsers will display emphasised text in italics)
Make stuff strong with <strong>stuff</strong> (the button is marked b on E2's built-in HTML toolbar because most browsers will display strong text in bold)
Make stuff small with <small>stuff</small>
Make stuff big with <big>stuff</big>
Biggest heading
<h1>Biggest heading</h1>
Second-biggest heading
<h2>Second-biggest heading</h2>
Smaller heading
<h3>Smaller heading</h3>
• makes
• order
• difference
• no
1. Order
2. makes
3. a
4. difference.
Block Quote
"The distracting effect of overdependence on adjectives and alliteration is well-illustrated by the following excerpt.
She stood in another part of the club, surrounded by an ellipse of fawning and vying men two or three deep, an island of attraction in a chaotic sea of seekers. Each man, with drink in hand, was posing and displaying his imagined or proven point of attractiveness to women in competition for her attention and favor.
Blah, blah, blah."
Note: Due to a change in HTML code, if you are putting multiple paragraphs in a block quote, you will need the blockquote tag around each paragraph.
Horizontal lines
Everything2 will automatically insert paragraph tags and line breaks as long as it doesn't find any in a writeup, but it may be useful to be aware of these tags all the same.
This is one paragraph
And this is another.
<p> This is one paragraph</p> <p> And this is another. </p>
One paragraph...
broken into three lines...
is still not a poem.
<p> One paragraph... <br> broken into three lines... <br> is still not a poem. </p>
Keep in mind that the actual appearance of your text depends on style settings and other factors, so the way others see it may differ from the way you see it. For more advanced HTML features, see N-Wing's extensive guide.
0: Overview/Contents/Index
Everything 2 HTML Tags
(A Guide to using HTML in E2.)
While it is possible to node in plain text, it would be like talking in a monotone... your audience would fall asleep (and probably downvote your writeup (!)). This guide shows how to use all the HTML tags allowed in E2.
If you already know HTML, a list of tags allowed in E2 is at E2 FAQ: HTML.
If you just want a quick reference, you might want to use the quick start instead.
Note: until recently, tags were not case sensitive. However, the new XHTML standard states that tags are now case sensitive, and should always be in lowercase. For this reason, I recommend not using uppercase tags any more. (In this guide, I only have the tags in uppercase in the section titles so they are easier to see.)
Table of Contents (links lead to individual chapters)
0 : Overview/Contents/Index
1 : Tags and Starting New Lines
1.1 : Tags/HTML Overview
1.2 : Starting New Lines
1.3 : Paragraphs
1.3.1 : Paragraph Alignment
2 : Character Formatting
2.1 : Bold and Italics and Underline vs. STRONG and EMphasis
2.1.1 : Bold / Italic / Underline
2.1.2 : STRONG / EMphasis
2.1.3 : B/I vs. STRONG/EM
2.2 : Do you like 'em big or small?
2.3 : SUPer VARiable SUBmarine
2.3.1 : SUPerscript and SUBscript
2.3.2 : VARiables
2.4 : Monospaced Text a.k.a. Computers and HTML
2.4.1 : Inline Monospaced Tags
2.4.2 : PRE-formatted text
2.5 : 'Editing'
2.5.1 : INSert and DELete
2.5.2 : STRIKE That
3 : Special Characters
3.1 : Special Normal Characters
3.2 : Using square brackets in Everything
3.3 : Math symbols
4 : Lists
4.1 : Numbered and Bulleted Lists
4.1.1 : Numbers/Numerals/Outline
4.2 : Definition Lists
5 : Giving Credit Where Credit is Due
5.1 : Block Quotations
5.2 : Quotes
6 : Miscellaneous Tags
6.1 : Outlines using heading levels
6.2 : Horizontal Rules
6.3 : Saying Less
7 : EOF: Index and Information
7.1 : Index
7.2 : Thanks
7.3 : Guide Information
8 : Appendix 1 : Tables
A1.1 : How to create a table
A1.2 : Table Attributes
A1.3 : How to call and nest attributes
A1.4 : Common tables on Everything2
This guide has an index in the last chapter.
1: Tags and Starting New Lines
1.1: Tags/HTML Overview
HTML stands for HyperText Markup Language. A markup language in general means that is consists of plain text but also have certain character sequences that denote something special. In this case, HTML, almost all "fancy" things (like formatting) are done by using "tags". Plain HTML tags are generally in the form:
<tag_name> normal text to format </tag_name>
This is how "markup" comes into play: the text "normal text to format" is typed just as it appears; the tags that surround that text (the <tag_name> and </tag_name>, in this case, tell the web browser how it should appear.
While this guide will help you with your HTML, E2's writeup hints will also warn you about some errors in your HTML. Visit your user settings and make sure the "Show critical writeup hints" and "Show HTML hints" options are checked (they are by default), and check "Show strict HTML hints" (which is not checked by default). Then press the submit button.
Most of this guide is dedicated to showing how to use tags that format text. However, the thing most people want to be able to do at first is be able to separate their text into paragraphs. Lucky for them, that is explained next...
1.2: Starting New Lines
The first thing you probably want to do is separate your lines a bit. Because of the way HTML works, just hitting Enter won't start a new line. Instead, you have to use some tags that don't really format text, but say how the text should flow. To just start on a new line,
like this, just insert <br /> where you want the line to break. (In other words, put one at the end of each line.) That tag is useful for things like poems, where you want each line to be short.
1.3: Paragraphs
For longer sections of text, though, like paragraphs, using the paragraph tag is better. Simply put <p> before each paragraph, and </p> after each paragraph. For example, if this is typed:
The quick brown fox jumps over the lazy dog.
It jumped very quickly and swiftly in order
to reach the proper velocity it needed to
clear the dog.
"Why did it jump?", she asked.
"It would have been easier on the fox to
just construct a ramp, put on roller skates,
and skate over the dog."
A perplexed boy answered, "Didn't you know?
The fox lost its roller skates."
Then this is how it would show:
The quick brown fox jumps over the lazy dog. It jumped very quickly and swiftly in order to reach the proper velocity it needed to clear the dog.
"Why did it jump?", she asked. "It would have been easier on the fox to just construct a ramp, put on roller skates, and skate over the dog."
A perplexed boy answered, "Didn't you know? The fox lost its roller skates."
1.3.1: Paragraph Alignment
You may have seen some nodes that play with the text alignment, like this:
This sentence is on the right.
This sentence is centered.
This sentence is back on the left.
You may find this useful when noding poetry, ...
... or if you just want to give the reader ...
... a headache (in that case, shame on you).
To do the alignment, we use the same <p> tags previously mentioned, but we give more information in the tag. Most HTML tags can have several items of addition information, called attributes, but E2 filters most of them out. One of the attributes allowed is the align attribute of the paragraph tag. We may align the paragraphs using <p align="x">, where x is left, center, right, or justify.
This paragraph starts with <p align="left">. As you can tell, it is easier to just make the opening tag a plain <p>, since this is assumed by default.
This has <p align="center"> as the paragraph tag.
This right-justified line[s] begins with <p align="right">.
This paragraph opens with <p align="justify">. Some browsers are able to display justified paragraph alignment, which means that the left and right sides of the text are lined up. Fancy stuff. Browsers that do not understand "justify" in the align attribute simply default to normal alignment, which is straight on the left, and jagged on the right. Of course, having justified paragraphs usually looks cooler if each paragraph is of a decent length, unlike this one, which is a tad on the short side.
Ok, no more messing
around with the
paragraph alignment.
Using the align attribute is another feature popular with the poets. Ok, no more mention of poetry. This is a computer lesson, not a human language lesson.
2: Character Formatting
2.1: Bold and Italics and Underline vs. STRONG and EMphasis
2.1.1: Bold / Italic / Underline
Creating new lines was easy enough, right? Now to make some text stand out from the rest. The tags used to create bold and italics text is pretty easy to remember.
To make something bold, put a <b> tag at the start of the bold text, and </b> at the end of the bold text.
To make something italics, put <i> at the start of the italics text, and </i> at the end of the italics text.
If you guess you should use <u> before and </u> after what you want to be underlined, you would be correct.
For example,
<b>This</b> is bold, <i>this</i> is italics, <b><i>this</i></b> is <i><b>both</b></i>. <u>This sentence is underlined.</u>
This is bold, this is italics, this is both. This sentence is underlined.
Note that you can nest tags, and order doesn't matter. Just be sure to not close them in an improper order, like this:
<b><i>Never do this!</b></i>
The result is undefined, but it usually just looks messed up. If you are really unlucky, it will make all the rest of the page have wrong formatting, too.
I highly recommend not underlining text in HTML: people expect underlined text to be a link.
2.1.2: STRONG / EMphasis
The strong and emphasis tags generally display as bold and italics. However, it is recommended to use strong and emphasis instead of bold and italics (an explanation follows, in the next section).
To mark something as strong use the <strong> tag before the strong text, and </strong> after it. Most browsers show this as bold.
To mark something as having emphasis, put the <em> tag before the emphasized text, and </em> after it. Most browsers show this as italics.
For example,
<strong>This</strong> is strong and <em>this</em> is emphasized.
renders as
This is strong and this is emphasized.
Again, you can nest tags, order doesn't matter, and be sure they are closed in the correct order.
Note that while it common to denote the source of a quotation (citation), there are special tags for these cases; this is covered in the later section Giving Credit Where Credit is Due.
2.1.3: B/I vs. STRONG/EM
Now, you may be wondering why there are 2 tags to do bold, and 2 tags to do italics. The short answer is: there isn't.
Oh, you want to know the longer answer, even though I may bore you to death? Yay! First, some background...
A physical style tells the browser, "I want the text to look exactly like this".
A logical style tells the browser, "this text has a certain significance, but I'll let you decide how it should look".
The user is more likely to override the display logical styles. For example, somebody may not like to read a lot of italics text because it can be hard to read a lot of. But if a page uses the italics a lot, that person would be unhappy. However, if the emphasis tag is used, they could set that tag to display as something else for them. They may choose to show it as green on a blue background, and not the italics they dread.
For the most part, though, it doesn't matter to much, as:
1. most people do not override the default formatting
2. the "better" way of formatting many "special" items is via Cascading Style Sheets (CSS), which you have no control over in a writeup
I personally generally use <strong>strong</strong> and <em>em</em> for general emphasis, and the others in special circumstances:
• <i>i</i> for:
• <b>b</b> for things such as UI widget text (choose File > Save As...) where another visual style could look odd
(I kind of think of it as like programming analogy:
physical styles : magical numbers :: logical styles : constants
.) However, most people (i.e., normal people) just use <b> and <i> because they are easier to remember, and require less typing.
2.2: Do you like 'em big or small?
Another way to draw attention to things is by changing the font size.
Of course, a change in font size can be used for other purposes, too... Help me! I went to a shrink, and I was really shrunk!
The <small> and <big> tags are easy to remember. Multiple nestings of the same tag will cause text to get really big, or really small.
Here is how to use them by themselves:
<small>Small</small> and <big>big</big>.
show as:
Small and big.
Multiple nestings, like:
<small><small><small>Very small</small></small></small> and <big><big><big>very big</big></big></big>.
will show as:
Very small and very big.
One neat thing to do with the smaller and bigger tags is to make "small caps". So to make this official-looking title:
you would type:
<big><big>E</big></big><small>VERYTHING</small><big><big> 2 HTML T</big></big><small>AGS</small>
One last (but rather sad) note: character-cell-based (console-only) browsers, like Lynx or Links, are unable to show different font sizes. This is because they use a monospaced, or monowidth font, so each character takes up the same amount of room. Although the old fossils people who use these browsers are decreasing, just remember a general rule in HTML (that I just made up) - formatting should add to existing text, and should not subtract from the text if absent.
2.3: SUPer VARiable SUBmarine
2.3.1: SUPerscript and SUBscript
Imagine a excellent underwater submersible that changes.
That is a super variable submarine.
* groan *
Ok, ok, no more lame puns to introduce some tags... You're really cramping my style.. my cascading style! <rimshot>
If you are going to type in mathematical and/or chemical and/or math-related expressions, you should know about the subscript and superscript tags. You could guess what tags you use to show this:
I like subscript and superscript.
But don't feel bad if you think <sup> should be "super"; it messes up even experienced HTML-writers (like me, waaaahhh).
I like <sub>sub</sub>script and <sup>sup</sup>erscript.
With these tags, I like to also use the <small> tag, so it looks nicer. (Alternatively, if you are only raising something to the second and third power, you can also use the widely supported ² and ³ for a superscript of 2 and 3, which is shown like this² and this³.) If the use of superscripts and/or subscripts is important to correctly read your writeup, you may want to see Everything number presentation.
2.3.2: VARiables
The <var> tag is also useful for mathematical fields, as it indicates a variable, usually by rendering the text italics. For example, to show the discriminant of the quadratic formula,
d = b2 - 4ac
you could write:
<var>d</var> = <var>b</var><sup><small>2</small></sup> - 4<var>ac</var>
Also note how I used the small tag in the superscript tag to make the 2 look nicer. I also could have used the character entity ² for the 2, but that is for a later section.
2.4: Monospaced Text a.k.a. Computers and HTML
There are several tags for displaying monospaced, or fixed-width text. (Could it be because HTML was developed for computers, so displaying code, text to key in, display text, etc. would be popular? Nah.) All these tags pretty much all display the same on each browser, so you'll probably end up just picking one or two that you like, and using it/them a lot.
2.4.1: Inline Monospaced Tags
Quick diversion: an "inline" tag is an HTML tag that can be used on text that is in part of a line; that is, the text that is formatted via an inline tag can be in with other text that is formatted differently. The 4 tags explained here are all inline, so they can be used almost anywhere you want.
The first inline fixed-width tag allowed on here, on E2, was the teletype text tag. This tag is used to indicate teletype text.
I would use this tag to show people how to type basic *nix and/or DOS commands:
type cd and press the "Enter" key
which I would enter as:
type <tt>cd</tt> and press the "Enter" key
Of course, on Lynx it would look the same, since every character is already the same width, but it would stand out for the majority of people who use graphical browsers. If it is important that it stands out, you might also want to surround the text with strong tags.
A slightly more relevant tag to use, though, would be the keyboard tag, which indicates text to key in via a keyboard (or punch card if you're on a primitive machine). So the example changes to:
type cd and press the "Enter" key
which I would now enter as:
type <kbd>cd</kbd> and press the "Enter" key
"But what if I was to show the output of the command?" you ask. (Ask it, ... ask it, ... Ask it now! Thank you.)
That is what the <samp> tag is for - sample output.
After I type in cd and press the "Enter" key (under Unix), I might see:
42 ~ #
as my tcsh prompt*, which is simple to write HTML for:
<samp>42 ~ # </samp>
(* Yes, a root prompt. I'm 1337.)
The last inline fixed-space tag (but not least, of course) is <code>. This is used for code examples. In this official E2 HTML guide™©etc., I use this tag in almost every example of what HTML code should be used to create something. However, I'm currently a little sick of HTML, so here is an example from Java:
the line macroText.put(MACRO_SOURCE_LINES, Integer.toString(lineCount)); stores the number of lines in the E2 HTML tags source file for later use
which I entered as:
the line
<code>macroText.put(MACRO_SOURCE_LINES, Integer.toString(lineCount));</code>
Note how an end-of-line character is normally converted into a space by your web browser ...
2.4.2: PRE-formatted text
... although the next tag I'm going to show you will tell the browser to start a new line.
If you have large code examples, or what to make some nice (or ugly) ASCII art, it is usually easier to just enter in a straight block of text, instead of using many HTML tags. The pre-formatted tag allows you to do this by surrounding (usually multiple) line[s]s of text with <pre> and </pre>.
For example, a short C++ program might be:
#include <iostream>
#define EDB_GONE true
void main() {
cout << "Hello, Everythingites!" << endl;
cout << "EDB, please don't eat me!" << endl;
I made all the characters the same width and made the indents by using multiple spaces. The HTML code is:
#include <iostream>
#define EDB_GONE true
void main() {
cout << "Hello, Everythingites!" << endl;
cout << "EDB, please don't eat me!" << endl;
Ummm, don't worry about the < stuff yet; that is another example of a character entity reference, which is how you display a less-than sign, <, in HTML. This is explained in the next chapter. If you want to have the pre effect without doing hard work, use Wharfinger's Linebreaker and/or E2 Source Code Formatter and/or text formatter.
2.5: 'Editing'
2.5.1: INSert and DELete
Now, for some rarely, almost never-seen tags. (You can skip right to "STRIKE That", if you want.)
You still here? Wow, you're insane. I've never used the insert and delete tags, but I guess you'll find out the hard way how useless they are...
<ins> indicates where text has been inserted (usually since a previous draft). <del> indicates where text has been deleted.
Here is a sample of an edited document:
Yo, idiotHonored sir, I would greatly appreciate it if you do business with me, or you're toast.
Netscape 4 does not support these tags, so this is what it looks like in a non-stupid browser (and some stupid ones, too, like IE):
Here is the code to generate the first example:
<del>Yo, idiot</del><ins>Honored sir</ins>, <ins>I would greatly appreciate
it if you</ins> do business with me<del>, or you're toast</del>.
2.5.2: STRIKE That
There is another way to indicate crossed-out text, which is by using one of the strikethrough tags. Both <s> ... </s> and <strike> ... </strike> do the exact same thing. One way to use these tags is to "officially" say one thing, but let the reader know what you are really thinking:
You are such a pushover easy-going person. I don't know if I could stand being so spineless flexible.
This was typed as:
You are such a <s>pushover</s> easy-going person.
I don't know if I could stand being so <strike>spineless</strike> flexible.
Yes, you could use ^H instead of strikethrough, but morons^H^H^H^H^H less well-educated people could get confused. :)
3: Special Characters
3.1: Special Normal Characters
If you've been experimenting with drugs, I mean, HTML, you may have been having trouble displaying things like a less-than sign, < . There is a simple reason for, and solution to, that problem.
The reason: < and > are reserved for denoting a tag (that should be obvious enough by now) and & starts a character entity reference. What is that, you ask? Well, just read on for an answer...
These character entities allow numerous symbols to be inserted into normally ASCII-only HTML files. Always use these entities instead of just typing them:
• & to show & (ampersand)
• < to show < (less than)
• > to show > (greater than)
You may find useful when spacing is important. For example, I started this paragraph with " " to give the first line a slight indentation. I also stuck in several non-breaking spaces in the above unordered list to align the elements better.
3.2: Using square brackets in Everything
A specific "problem" with Everything is the inability to insert the square brackets, [ and ], without forming a link. The best way that I've found to deal with this by using
• [ to show [ (left/opening square bracket)
• ] to show ] (right/closing square bracket) (this generally isn't needed, but makes runaway links easier to spot, and provides balance with the required way to escape in open square bracket)
3.3: Math symbols
There are many other cool symbols you can include using character entities, like ² ³ (superscript 2 (²) and 3 (³)), α × β ÷ γ ∫ δ ‾ ◊ ‰ € ∇ , but not all browsers support all these characters, so you may want to just stick with & < > [ ] .
Of course, if you're feeling adventurous, a full list of character entities allowed in HTML 4 is available from the W3C at
and in the writeup HTML symbol reference.
4: Lists
Following are some words that can be used in an interrogative sentence:
• What
• if
• you
• want
• to
• list
• things?
Sure, you could use lots of <br />, but there is are some HTML tags that are dedicated to creating lists that look nicer than brute forcing it. To create a list, one pair of tags are used once, which specify which type of list to create, and another pair or two are used repeatedly for each item in the list.
4.1: Numbered and Bulleted Lists
Creating a list that has bullets (which are basically dots) or numbers in front of each item requires several steps.
1. First, decide if bullets or numbers are more appropriate for the given list. (Generally, use bullets when the order is not important, and numbering when it is. I am unable to come up with any examples right now, but maybe you can think of some.)
2. Second, place the appropriate tag.
• If you want bullets, like what is in front of this line, put in a <ul>. This stands for unordered list.
• If you want numbers, like the steps in these instructions have, use the <ol> tag. This means ordered list.
3. Third, put a <li> before each list item, and a closing </li> after each item.
4. Finally, close this list with either </ul> or </ol> (the closing tag should match whatever opening tag you used).
To illustrate:
<li>This is [first]</li>
<li>This is [second]</li>
<li>This is [first]</li>
<li>This is [second]</li>
1. This is first
2. This is second
Notice that the only difference between an unordered (bulleted) and ordered (numbered) list is only the main opening and closing list tags. (You may also notice that if you nest bulleted items, the bullet may change.)
4.1.1: Numbers/Numerals/Outline
You can also use the <ol> tag to create outlines by adding the type attribute. To do this, instead of a plain <ol> to start an ordered list, use <ol type="n"> instead. The n can be one of several things, as shown below:
1. <ol type="I">
2. Please
1. <ol type="A">
2. don't
2. sneeze
1. <ol type="a">
2. on
1. <ol type="i">
2. me.
The types do not have to be in that order; they can be nested multiple times, with any "type" repeated any number of times.
It is also possible to fake resuming a previously-started list by using the start attribute:
<ol type="I" start="3">
<li>resume the outline</li>
which displays as:
1. resume the outline
Note that the start value is not what is should look like (in this case, "III" in Roman numerals), but in Hindu-Arabic numerals ("normal" numbers).
4.2: Definition Lists
Definition lists are rarely used on the web, let alone Everything (except by me, who overuses them), so I'll let you skip to the next chapter, if you so desire.
Since you may not have seen this tag set in use before, I'll first show you an example.
Fast but weak.
Slow but strong.
That would be me.
Not a "real" Star Wars fighter.
This code produced the above:
<dt>[A-wing]</dt> <dd>[Fast] but [weak].</dd>
<dt>[B-wing]</dt> <dd>[Slow] but [strong].</dd>
<dd>That would be me.</dd>
<dd><em>Not</em> a "real" [Star Wars] fighter.</dd>
To make a definition list, first put in the open and close tags: <dl> and </dl> . For each definition, surround the definition term with <dt> and </dt>, and the definition definition (sic) with <dd> and </dd>. The <dt> and <dd> tags may be repeated multiple times without having the other, but normally (that means, check any dictionary), the term is first, and the definition[s] follow.
I sometimes use these tags to list references I used - I put the reference name and author in the term tags, and longer, more detailed explanation of the source, and my thoughts on it, in the definition tags. This can be used with tags explained in the next chapter.
5: Giving Credit Where Credit is Due
You've been hard at work on a great writeup that has lots of information summarized from many different sources. Now, how do you give credit to those whose hard work you stole from used? If you've half a brain (or more), you should've figured I'll explain how.
5.1: Block Quotations
One common situation is having a long quotation (one that takes up several lines). Simply enclosing it in quotation marks isn't adequate; you want to indent it, as is proper. The way to do just that is use the <blockquote> tag. The following paragraph is just plain text, with <blockquote> before it, and </blockquote> after it.
Testing, testing, one, two, three. Hey - are you reading this? How did you do that? This paragraph was encrypted with a very secure encryption algorithm! Hmmm... on second thought, maybe you just got lucky and guessed every single word. Yeah, that makes a lot more sense. Ok, now for the very important secret message: qpcjc pizza dodcp sleep dweez grrrr souxt pvnrt hnmqo fumcm bzyfs ioctl wtbal xyzzy jvgiz sdram plsqw souix szbyl
To be really picky, the block quot[e]ation tag doesn't have to indent, but most browsers indent it from the left and right margins, and put a little space above and below it.
5.2: Quotes
What if you have a short quotation? You can surround the text with the <q> tag (just a plain letter "Q"). (If your browser incorrectly does not indicate anything special, trash it and use a good one.) The nice people who defined HTML say browsers must add their own quotation marks, and you (the author) should not add your own. (This way, the proper locale-specific characters and multi-level quotations are correctly done.)
To specify the source, surround the source with <cite> tag to indicate that it is a citation. Graphical browsers usually render this in italics, which is usually what you would want, anyway.
This example of using <cite> and <q> tags:
In 2002, Nathan exclaimed, Everything 1 is now gone. Long live Everything 2! - N-Wing
was created by this HTML:
<q>In 2002, Nathan exclaimed, <q>Everything 1 is now gone. Long live Everything 2!</q></q> - <cite>N-Wing</cite>
6: Miscellaneous Tags
I'm not imaginative enough to figure out a better category name for the rest of the tags allowed on E2. (But if you can think of a better name, I would enjoy hearing it.)
6.1: Outlines using heading levels
In the chapter about lists, I showed how to create an (indented) outline by using multiple <ol> tags. That method works well if each level only has a sentence or two of text, but when the bodies become paragraphs, it becomes a little unwieldy. The heading tags are good for this, as their purpose was to serve as headers for larger bodies of text.
There are 6 levels of header tags, <h1> ... </h6> to <h6> ... </h6>, with <h1> being the highest level header. Unlike most other tags explained in this guide, the header tags should not go inside <p> and </p> tags (nor should paragraph tags be inside header tags) - paragraphs and headings are considered to be different things. Further, heading tags should not be "skipped" - for example, there should be no <h2> pair without a <h1> pair.
Here is an example of all 6 heading levels in use:
This has <h1> at the start, and </h1> at the end.
This is level 2. Before this text is <h2>, and after it is </h2>
You should be detecting a pattern by now. This line uses <h3> and </h3>.
As you guessed, <h4> and </h4> are in use here.
Yup, </h5> ends this, and <h5> starts this. (Hee-hee, I'm being tricky now.)
<h6> and </h6> is the lowest heading level.
You may want to use these tags to change font size. This is bad for several reasons, probably the most important for display reasons is that the heading tags end up on their own line. The tags created for changing font size, <small> and <big>, are created for just that task. So if you insist on using <h1>..<h6> to change the size, I'll have to smack you with a clue by four. (Just a friendly warning.)
6.2: Horizontal Rules
I will not make a joke about how being horizontal rules. Oops, too late.
The horizontal rule tag doesn't do any formatting, but rather puts a line across the page. The tag is simply a single <hr /> (with no closing tag).
The (usually gray) line below:
was created with simply:
<hr />
Everything 2 also allows this tag to have the width attribute, which sets the width of the line. The width can be specified in pixels (little fairy-like critters) or a relative width given as a percentage. Using the percentage form is better, since it will look consistent, regardless of the browser window's width.
For this line
of width 75 pixels, my HTML was as follows:
<hr width="75" />
But that probably looks a bit lame. This line
is a width of 75 percent, which means it should have a width of 3/4 of the thing it is in.
However, E2 currently strips out the % , leaving you back to the line of 75 pixels wide. (This is a known bug that will very likely not be fixed any time soon, although it has been a known problem for many moons (*ahem* I'm talking about revolutions of the Earth's biggest natural satellite, I don't know what you're thinking of, sheash.).)
6.3: Saying Less
If you want to use a shorter form of a word or phrase, you would use an abbreviation or acronym. However, if your reader does not know what the full version is, they may end up confused. One way to solve the problem on Everything 2 is create a link from the abbreviation or acronym. Of course, if there are multiple expansions, or there are no writeups on that topic yet, your reader may still be confused. The HTML solution is the <abbr> and <acronym> tags. Simply surround your shortened form with the appropriate tag, and set the title attribute to the full version.
Of course, an example helps:
What is the predominant fs used on the LAN?
was created by:
What is the predominant [fs|<abbr title="file system">fs</abbr>]
used on the [LAN|<acronym title="Local Area Network">LAN</acronym>]?
Not all browsers display these tags any differently. Some do use a dotted underline, and many provide a "tool tip" that displays when you hover the mouse pointer over an abbreviation or acronym.
Now we get into E2-specific notes (booooo). Everything strips out everything after the first space, which means only the first word will display. (Which pretty much eliminates the point of using <abbr> and <acronym> in the first place.) You also will not see anything when you form a link — Everything 2 adds the target node as the link title, which will usually override your abbreviation/acronym. So what should you do? I just form a link from the shortened version (as demonstrated above), and use the tags as normal, for two reasons: in case auto link titling is disabled and it allows the user to easily find out more detailed information.
7: EOF: Index and Information
7.1: Index
(Due to writeup size, the index is only available in the stand-alone final section.)
7.2: Thanks
Following are some people that pointed out some errors in this and/or contributed in some other way. If I forgot to list you here, it is probably because I don't like you. (Actually, you just slipped my mind. Sorry. (/msg me))
for pointing out that Firefox put its own quotes around <q> (which led me to seeing that another browser also put quotes, which made me check the specs for that point)
in10se, baffo(???), and others
for giving more detailed information for individual writeups on tags: abbr acronym b big blockquote br cite code dd del dl dt em h1 h2 h3 h4 h5 h6 hr i ins kbd li ol p pre q s samp small strike strong sub sup tt u ul var
General Wesc
for reminding me of "justify" in <p align="justify"> (go me, for having a response time of "only" about 3.5 months)
for reminding me to look up what the "tt" in the <tt> tag really meant
pointed out I strong-ed the wrong letters in the expansion of kbd
suggested I mention a special use of italics (citation) that I don't cover until later (I added a note about this and link to the appropriate section.)
reminded me to clarify when the "escape sequence" (character entity) for closing square bracket, ] was needed (3.2: Using square brackets in Everything)
For essentially told me my opening was bad! (I stated you could node in plain text, but it was pointed out that it currently would lead to nukage if unchanged.)
pointed out on of my typos
other people who pointed out problems, but I forgot to write down who they were (sorry)
7.3: Guide Information
guide creation
guide updated
2007-04-08(0) (Easter)
updates/changes since last time (2004-11-25 (4))
added start attribute to <ol> description
now b/i vs. strong/em argument essentially says it doesn't matter
updated 3.2: Using square brackets in Everything note about the closing square bracket, ]
changed opening, as unformatted writeups are now generally frowned upon
updated email address due to excessive spam volume on older one
cleaned source document somewhat (not user-visible), but HTML looks nicer in the syntax-highlighting code editor I use
guide author
/msg N-Wing Your_Message
in the chatterbox, and hitting the "Talk" button, or using the talk area in my homenode.
generator information
updated 2004.11.28.n0
on April 8, 2007 at 11:42:59 PM EDT
source file size
57946 bytes
955 lines
Look at this stuff! My fingers hurts!
Note: most browsers don't understand all of these, and some browsers don't understand any of these.
(See HTML symbol reference for a more complete list --mcc)
< --» <
> --» >
& --» &
" --» "
Á --» Á
 --» Â
À --» À
Å --» Å
à --» Ã
Ä --» Ä
Ç --» Ç
Ð --» Ð
É --» É
Ê --» Ê
È --» È
Ë --» Ë
Í --» Í
Î --» Î
Ì --» Ì
Ï --» Ï
Ñ --» Ñ
Ó --» Ó
Ô --» Ô
Ò --» Ò
Ø --» Ø
Õ --» Õ
Ö --» Ö
Þ --» Þ
Ú --» Ú
Û --» Û
Ù --» Ù
Ü --» Ü
Ý --» Ý
á --» á
â --» â
æ --» æ
œ --» œ
à --» à
å --» å
ã --» ã
ä --» ä
ç --» ç
é --» é
ê --» ê
è --» è
ð --» ð
ë --» ë
í --» í
î --» î
ì --» ì
ï --» ï
ñ --» ñ
ó --» ó
ô --» ô
ò --» ò
ø --» ø
õ --» õ
ö --» ö
ß --» ß
þ --» þ
ú --» ú
û --» û
ù --» ù
ü --» ü
ý --» ý
ÿ --» ÿ
Æ --» Æ
Œ --» Œ
® --» ®
© --» ©
™ --»
£ --» £
« --» «
» --» »
± --» ±
° --» °
¢ --» ¢
¤ --» ¤
¥ --» ¥
º --» º
¹ --» ¹
² --» ²
³ --» ³
ª --» ª
§ --» §
¼ --» ¼
½ --» ½
¾ --» ¾
µ --» µ
¶ --»
¦ --» ¦
¡ --» ¡
¿ --» ¿
· --» ·
¨ --» ¨
´ --» ´
¸ --» ¸
— --»
– --»
¯ --» ¯
¬ --» ¬
• --»
… --»
|
global_01_local_0_shard_00002368_processed.jsonl/34918 | 99 Problems (Minus Your Network)
Your SD-WAN does a lot, but it can only truly soar with a QoS high-performance Core. But high-performance private backbones are expensive, right? Think again. The difference: millisecond control.
Learn about the world's first Millisecond Core: ultimate QoS private performance and security with web ease, agility and scale – for the price of business Internet.
Download the Infographic Now. |
global_01_local_0_shard_00002368_processed.jsonl/34922 | Struggling to Trust
old boat
I have no idea what to write today – where to start or what to say. As I sit here staring at a blank screen, my words abandon me. Silence is all I hear and it is deafening.
In all honesty, I have been a bit withdrawn lately. From my husband. From friends. From God. And for no obvious reason. I’m not angry. I’m not hurt or disappointed. I’m not much of anything, except distant. Hidden away in my thoughts. Stuck in my exhaustion. Lost in my weariness. I am present physically, but distant emotionally.
I dislike encountering myself in this place. This place which threatens to hold me hostage in my fear and leaves me feeling lonely in the midst of my busyness. This place where I wrestle with surrender and struggle to trust God fully with the many unknowns looming ahead. This place of overwhelming unrest. I don’t belong in this place, yet I slide into its crevices so easily and comfortably.
Maybe you, too, are familiar with this place. That in-between point we find ourselves in when we’re aware of what we should be doing, but not yet brave enough to jump in and do it. Or maybe for you it’s not a matter of bravery, but instead it’s an inability to relinquish control or unwillingness to step into unchartered territory.
Whatever the case may be, we all end up here – in this same position – at one time or another. On the brink of change. In the shadow of growth and maturity. So close to stepping into that life we desire … the kind of life which pours out an abundance of meaning and purpose everywhere it goes.
The choice for this life is ours. It always has been.
With that in mind, where will I go from here? Will I stay in this place of discontent a while longer, or will I choose to climb out even if it’s only one or two steps at a time? Will I grab hold of my calling, embracing it through the good and the bad? Will I choose to trust Him regardless of the outcome and in spite of the what-ifs?
This is my greatest desire, yet it is far from easy for me. That’s why I’ve been hiding out as Jonah did in the belly of the fish. Much like Jonah, my delayed “yes” has landed me in a not so happy place. And much like Jonah, I will finally accept my assignment (as scary as it may seem) and move forward in obedience… writing one word at a time, one blog at a time, one book at a time.
As I strive to do so, may God give me the words to speak, courage to be vulnerable, and an audience to hear. And may He always be honored and glorified through it all.
God bless you all sweet friends, and thank you for embarking on this journey with me!
Leave a Reply
Up ↑
%d bloggers like this: |
global_01_local_0_shard_00002368_processed.jsonl/34956 | N17 Billion Debt Scandal:Yar’Adua positions to take over BankPHB from Atuche
Read the rest of the story here.
3 Responses
2. I like your blog as it talks about losing weight. I have probably heard about fad diets like Atkins, South Beach or the Cabbage Soup diet. Many of these diets can’t be sustained without endangering your health. Keep it up.
3. If you need directions on where to look or who to get information from regarding Atuche, PHB and other $ million kindly mail me a secured contact
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this: |
global_01_local_0_shard_00002368_processed.jsonl/34964 | Welcome! Log In Create A New Profile
Nginx agent grpc error
August 22, 2019 08:05AM
[error] 8#8: *256283 upstream rejected request with error 0 while reading response header from upstream, HTTP/2.0
I encountered such an error during the process of using nginx
The version I am using is 1.17.3 docker image
Subject Author Posted
Nginx agent grpc error
aiaa5505 August 22, 2019 08:05AM
Re: Nginx agent grpc error
Sergey Kandaurov August 22, 2019 10:00AM
Sorry, only registered users may post in this forum.
Click here to login
Online Users
Guests: 113
Record Number of Users: 6 on February 13, 2018
Record Number of Guests: 421 on December 02, 2018 |
global_01_local_0_shard_00002368_processed.jsonl/34966 | Using functions for HTML generation
This may allow you to adapt views of extensions without completely overriding them. For example I may have requirement that all external links in my website should have target="_blank" rel="nofollow noopener". I can create my custom helper with a() method which will do that transparently, but if some extension uses static call to Html::a() in its view, my helper will not be used. I need to override the whole view to change one Html::a() to use my helper instead of basic one. With DI I could just inject my helper to extension view and extension will use implementation I prefer.
(Alexander Makarov) #28 not to miss it.
(muitosefala) #29
Yep, didn’t thought about extensions… But I was not thinking in making them global, just thought it could be a core based self-dynamic way to do it on app demand, for functions and for any namespaces and so. I was really in stratospheric sci-fi here. Thanks for the answer @samdark.
(Wilmer Arambula) #30
I honestly believe that we should maintain the array configuration in the widgets and static helpers, I think that injecting everything through the container di would be equal to Yii2, in my opinion the views are only the representation of the result, and using static helpers would be fine, for On the other hand we would leave things like Yii2 like helpers and widgets that do not need a great design.
(Wilmer Arambula) #31
For the ide we can use the Snippets, for all static helpers it should work very well.
(Oleg) #32
Sorry if I am not completely relevant, to much to read.
I suppose it is possible to have both static method convinience and flexibility of object.
Static method class calls Service methods, and we can replace the Service.
For example ,we have two Services, BootstrapService and SemanticUIService, both implements IHtmlService. Then inside, for example, Html::input we call Yii::getApp()->htmlService->input.
So it Html class becomes actually a Facade, instead staticaly linked to code.
(Alexander Makarov) #33
There’s no such global anymore.
(Oleg) #34
Html static class could be initialized first somewhere with required service, for example, BootstrapUIService, this service could use other services, for example, CoreHtmlService, InlineCssService, AssetsService. So we could easily change functionality.
Html {
private static $UIService;
public static Init(IUIService $UIService) {
self::$UIService = UIService;
To optimize performance:
Html {
private static $serviceLocator: IServiceLocator;
private static $UIService: ?IUIService;
// Initialization in bootstrap
public static Init(IServiceLocator $serviceLocator) {
self::$serviceLocator = $serviceLocator;
private static ensureUIService() {
if (! self::$UIService)
self::$UIService = self::$serviceLocator->createOrGet(IUIService::class);
public static alert($message) {
// main code
This will still rely on global state, which Yii 3 tries to avoid.
(Oleg) #36
The problem is that UI code is tightly coupled, and for me this was en issue, actually the only real issue with Yii.
Do you know better solutions?
Yes, I proposed it already:
(Oleg) #38
This is completely the same with as I understand. We just use instance instead static class.
(Oleg) #39
But in your solution exists one advantage. We can easily use another UIService for some part of appication. But @samdark proposed to use static class, thats why I did such a solution. But there is no problem to compose those approaches and give possibility to choose.
And that changes everything :D. You can have only one Html::$UIService at the time, and changing it in one place will affect any other places too. With local instances you have much more control and less unexpected side effects.
(Oleg) #41
Agreed, but we can combine those aproaches. For simple projects we can use Facade, but advanced user can type more.
And I think it is, in general, a viable approach. To give 2 options in framework, easy and highly customisable. Easy way would help new people to start and the hard way gives satisfaction to users with high requirments. “Easy to get, hard to master”
(Alexander Makarov) #42
@rob006 implemented it like the following.
Setting/overwriting helper locally:
$view->render('index', [
'html' => new Html(),
Setting helper globally:
'html' => new Html(),
Local overrides global in case name is the same.
If I’m writing an extension, how can I rely on this? If html helper will not be configured in default parameters at app level, then it will not be available in view - I need to inject Html instance myself to make sure that it is available. But in that case end user will not be able to overwrite this helper at app level.
(Alexander Makarov) #44
What would you suggest?
I don’t know, but this should be more like a contract than optional feature.
On the other hand in view you could do something like:
$html ??= new Html();
And it would work as intended - helper can be injected at view or controller level, with default fallback. It should also work like a typehint (IDE should recognize that $html is Html instance).
A view should be an object taking params, so html would be a param.
An extension using views, has params too.
So you would pass a Html object to the view/extension. Well its up to the extension developer what he wants to be customizable.
He could also prevent manipulation of a(), by not providing any params for those methods/objects. |
global_01_local_0_shard_00002368_processed.jsonl/34975 | The Book of Revelation: Part 12
The Book of Revelation: Part 12
Comfort in the midst of conflict: Revelation 21 and 22
Timothy J. Westendorf
It’s been 1,900 years since John recorded the words of Jesus in Revelation 22: “I am coming soon!” (vv. 7,12,20). Soon? Really? How are we to react to those words and this last chapter of the Bible?
I am coming soon
“I am coming soon!” If texted by the neighborhood bully, those words bring fear for the little kids. If written by a collections agency, they arouse panic and dread in the heart of the man buried in debt. But if those words are emailed by a loving husband and father who has been deployed for a year, they bring hope to a longing family. If promised on speaker phone by Grandma, they awaken excitement and anticipation to the grand kids. If yelled by a first responder at the scene of an accident, they bring a sense of relief to the driver trapped in the wreckage. Our relationship to the speaker makes all the difference in how we react to those words. So what should we think when Jesus says, “I am coming soon”? If we think of who we are on our own and who Jesus truly is, we would have reason to be anxious, terrified, and full of dread. We are sinful mortals. We know the darkness of our own hearts and how far short we fall from God’s glory. This is the mighty and majestic King of kings! This is the holy and righteous Lord God! He is coming soon? Gulp. If those are our thoughts when we think of Jesus’ promise, we won’t want to entertain them in our minds too often or for too much time.
Amen. Come, Lord Jesus
But that’s not how Jesus wants us to hear his promise! It’s not the way John heard those words of promise. He responded by saying, “Amen. Come, Lord Jesus” (v. 20). How? It wasn’t that John was any less aware of Jesus’ holiness and his own sinfulness. But he heard these words as a beautiful promise from his loving and gracious Savior. Jesus would have us hear them that way too. The One who promises to return is the One who came once as a tiny infant to be our brother in the flesh. He is the One who took our place under the burden of God’s holy law to complete it fully on our behalf. He took all human sin and sinfulness on himself and suffered its curse, once for all. He has assured us in his Word and comforts us in Holy Communion with the promise that all is forgiven and completely forgotten in God’s eyes. His coming for his loved ones means only deliverance from this world of sadness and death. So, when we hear him say he’s coming for us, we have every reason to feel hope, excitement, anticipation, and relief. In faith we can join our hearts with John and say, “Amen. Come, Lord Jesus.” And we trust that soon really is soon in his time. And as we patiently wait, we hold to his words of promise.
Reflect on Revelation chapters 21 and 22
1. Read 2 Peter chapter 3. What insight do you gain into Jesus’ promise that he is coming soon?
First, Peter tells us that the Lord’s return is certain even if it appears to be delayed. Jesus didn’t forget. We should remember, “With the Lord a day is like a thousand years, and a thousand years are like a day” (v. 8). Second, because the day of Jesus’ return will come as a “thief” in the night, we should make every effort to be found as faithful disciples whenever it comes. We should “live holy and godly lives” (v. 11).
Third, his coming also means that the world we take for granted will be dissolved and burned up. What will last is the Lord’s love and the eternal life he promised, “a new heaven and a new earth” as John reminds us in Revelation 21.Peter concludes the chapter with an exhortation to be on our guard so we do not fall away.
2. What does the return of Jesus mean for you? Why can you always say, “Amen. Come. Lord Jesus”?
Jesus return means that my tears, sorrows, and pains are gone. I will rest from the earthly struggles I must endure. I will join loved ones who trusted the promises of Jesus, and together we will praise him forever. I deserve none of the promises of God, but by grace he gives them to me and to all believers. I long to be with the One who loves me so. I can anticipate his return now with the prayer, “Come, Lord Jesus,because I need not fear the great catastrophe of the Last Day and the judgment of all flesh. I belong to Jesus by grace; my name is written in his book of life.
This is the final article in a 12-part series on the book of Revelation.
Author: Timothy Westendorf
Volume 106, Number 11
Issue: November 2019
Print Friendly, PDF & Email
Timothy J. Westendorf
Latest posts by Timothy J. Westendorf (see all)
Close Menu
Close Panel |
global_01_local_0_shard_00002368_processed.jsonl/34999 | Op-ed: Hunter’s story of wolf killing is highly dubious
Although all we have to go on are the handful of facts dutifully reported by the Tribune and other newspapers throughout the West, those facts seriously undermine the hunters' version of what happened. To the credit of hunters and non-hunters alike, Wolf 914f's killer has been ridiculed for his ethical failure to positively identify his target before shooting. For in addition to the fact that the "coyote [sic] went behind a sagebrush" and was apparently obscured from view, we know that the shooter used a ".223-caliber hunting rifle with a 10-power scope" to kill the wolf from about 120 yards away.
Even if we put aside the fact that 120 yards already leaves a lot of room for error, the hunter's 10-power scope would have made the wolf appear as close as 12 yards away. As one incredulous commenter noted in response to the Tribune's article, at that distance she "could see a tick inside a jackrabbit's ear."
Of course 914f's killer wouldn't have to see anything as minute as a tick: All he'd have to see is the sizeable (2x2x3 inches) radio collar and radio component around the wolf's neck. Moreover, the wolf was shot through the chest, so whether she was shot in profile or head-on, it's hard to understand how the hunter wouldn't have seen the collar through his scope.
Equally puzzling is how the hunters failed to notice the strikingly different appearance and size difference of 914f who, at the time of her killing, weighed 89 pounds! A healthy, well-fed adult coyote is lucky to reach 50 pounds. In light of these facts, it's almost impossible to reasonably conclude that this presumably experienced hunter unknowingly mistook 914f for a coyote.
And yet that is precisely the conclusion reached by the FWS, an agency whose chief purpose is "to protect and recover imperiled species and the ecosystems upon which they depend."
Wolves, coyotes and humans are very different animals, but we are all predators. That our own behavior as such is viewed any differently is not the result of humanity's inherent or God-given uniqueness or superiority, but of accident, whereby we, as the benefactors of conditions and natural forces we personally had nothing to do with creating, get to say and do anything that we want to our fellow creatures and to the environment, no matter how outrageous, irrational and destructive.
The irony of the Predator Control Program and other government sanctioned policies that promote the wanton extermination of predators and other so-called nuisance animals is that they are created and implemented by the most destructive and reckless species to ever walk the face of the Earth.
Maximilian Werner is the author of four books, including the memoir/natural history "Evolved: Chronicles of a Pleistocene Mind" and the memoir "Gravity Hill." |
global_01_local_0_shard_00002368_processed.jsonl/35011 | Skip to content
Instantly share code, notes, and snippets.
@hsb4995 hsb4995/.md
Last active Aug 17, 2018
What would you like to do?
GSoC 2017 Final Submission
Project :
Adding Custom features while upgrading and updating Quiz extension for Wikimedia Foundation
Introduction :
Quiz extension is currently used on several WMF projects, such as Wikiversity but had lot of bugs and limited features for users.By working on the project we have updated and upgraded MediaWiki Quiz extension while removing legacy code and adding new features to the extension.
Benefits of this project include stability and functionality to the extension and comprehensive features for users of various Wikis.Various custom features suggested by community were also added.
Initially one of the features that were supposed to be added was Data storage for quiz scores but it was declined for this project as decided with mentors and community.
The work can be divided into 4 major parts:
• Importing and solving bugs
• Removing legacy code and upgrading to MediaWiki standards
• Providing Unit tests for the extension
• Adding required features
Work Done
Note - All merged commits to github -
Month wise work is described as follows.
Month 1:
• The initial task was to import bugs, suggestions and features from Wikipage to Phabricator.For this task 11 bugs/features were imported to phabricator and the pages were archived.
• Merged Commits -
Gerrit Link Phabricator Link Description
356110 T165398 Fixing Background of feedback in Quiz
356983 T162803 Suppressing question numbering in a quiz when only one question
344726 T161318 Refractor legacy Html code of Answer in Question.php into mustache template.This task upgrades answers section to MediaWiki standards
358228 T167587 Follow up task to define all variables that are sent to process tepmlate
358227 T167588 Remove escaped HTML of < inside text field when field length shorter than answer
358068 T166926 Fixing the way correction for case insensitive textfields is displayed
358539 T166439 Enabling numeric input type questions to evaluate zero as valid input
• Commits that weren't merged -
Gerrit Link
• Other tasks -
• Wrote documentation about {X}, {!X} and {/X} tags used in shuffle control on Wikiversity.
• Edited documentation of shuffle feature on various Wikiversity pages (English, French, German etc).
Month 2:
• The code was refactored add Unit tests were added in PhpUnit
• The other major task was to finish removing legacy Html code and make the extension up to Mediawiki standards
• Merged Commits -
Gerrit Link Phabricator Link Description
357781 T146392 Fixing Shuffle feature when there is only one question is in quiz
363635 T169529 Regression bug for settings box
364003 T170035 Regression bug for header options
359656 T161317 Refractor legacy Html code of Settings in Question.php into mustache template.This task upgrades the last section to MediaWiki standards
362264 T159691 Adding the relevant tests for the extension using phpunit.Marks the milestone for this month.It ensures the code to be more reliable and better
• Commits that weren't merged -
Gerrit Link
Month 3:
• Catered to required features as discussed by community.
• Added more test and solved bugs.
• Merged Commits -
Gerrit Link Phabricator Link Description
367327 T171154 Altering the settings by removing extra cell and adding tests
362793 T146370 Uploaded a patch set for resolving conflicts and test
368993 T170798 Changed the behaviour of shuffle feature by reassigning numbering to shuffled questions
369822 T172355 Regression bug to add class field to input type in Answer.mustache
371122 T170081 Resolved the bug that causes wrapping of quiz text around images on large display screens
372135 T173304 Fixed the CSS scheme for colouring in error class of quiz
371938 T165363 Added feature which provides the use of Interwiki and template links inside Quiz Categories
373310 T159952 Added feature of modifying the feedback behaviour for sysops admin.The admins can turn on/off unselected feedback by simply adding a line to common.css.
374035 T170799 Added new feature that adds a quiz parameter called shuffleanswers.If set to true, it creates shuffled answers and uses request to persist once submitted.
• Commits that weren't merged -
Gerrit Link
Next Steps :
Some new parameters have been added to Quiz, these provide custom functionality for users setting the quiz.More Additional parameters can be added to the Quiz extension.This requires community consensus and based on the requirements.
More Info
Phabricator task for weekly reports - T164645
Personal Blog contaning weekly and bi-weekly blogs - Harjot Singh's Blog
Final Note - I would like to thank my mentor Marielle Volz (@mvolz) for her guidance and help while working on the project.My GSoC project has been a learning experience.I'd also like to thank other community members of Wikimedia Foundation.
You can’t perform that action at this time. |
global_01_local_0_shard_00002368_processed.jsonl/35025 | What is the Church?
Is it a building, a denomination, a place for evangelism, or is it an assembling of believers (fellow citizens with the saints, the body of Christ) for the purpose of worship, praise, song, edification, prophesying, teaching, sharing communion, and comforting ourselves together. Ephesians 5:18-20 “…but be filled with the Spirit, addressing one another in psalms and hymns and spiritual songs, singing and making melody to the Lord with all Your heart, always and for everything giving thanks in the name of our Lord Jesus Christ to God the Father.” 1 Thessalonians 5:11 Wherefore comfort yourselves together, and edify one another, even as also ye do.” Colossians 3:16 “Let the word of Christ dwell in you richly in all wisdom; teaching and admonishing one another in psalms and hymns and spiritual songs, singing with grace in your hearts to the Lord.”
The word church in the Bible comes from the Greek word ecclesia, which means a called out company or assembly. Wherever it is used in the Bible it refers to people, specifically the body of Christ (“because we are members of His body” Ephesians 5:30), those who “having believed were sealed with the Holy Spirit of promise” (Ephesians 1:13). See also Ephesians 1:21-23, 2:1; Ephesians 4:11-16; Ephesians 5:25, 31-32.
The Church is the body of Christ. It was never meant to be a mixture of believers and non-believers. “Be ye not unequally yoked together with unbelievers: for what fellowship hath righteousness with unrighteousness? and what communion hath light with darkness? And what concord hath Christ with Belial? or what part hath he that believeth with an infidel? And what agreement hath the temple of God with idols? for ye are the temple of the living God; as God hath said, I will dwell in them, and walk in them; and I will be their God, and they shall be my people. 2 Corinthians 6:14-16King James Version (KJV).
The body of Christ today has become so diluted, lukewarm and of no real effect because it has become an acceptable (to itself) mixture of light with darkness. What else can we expect it to become? Jesus makes it very clear who His Church is in Matthew 16:15-19. It is all of us who to whom God has revealed the answer to the question: “Who do you say I am?” Those to whom the Spirit of God has not made known the answer, are not of the church and do not belong in it. 1 Peter 2:9-10 “But ye [are] a chosen generation, a royal priesthood, an holy nation, a peculiar people; that ye should shew forth the praises of him who hath called you out of darkness into his marvelous light: Which in time past [were] not a people, but [are] now the people of God: which had not obtained mercy, but now have obtained mercy.
The body of Christ, the church, is often defined as a local assembly or group of believers (1 Corinthians 1:2; 1 Corinthians 15:9; 2 Corinthians 1:1; Galatians 1:1-2; Galatians 1:13), for the purpose that “He might present her to Himself a glorious church, not having spot or wrinkle or any such thing, but that she should be holy and without blemish” Ephesians 5:23-27). The Bible makes reference to the church being the bride of Christ (2 Corinthians 11:2; Ephesians 5:25-32). This also alluded to in John 14:1-3 when Jesus talked about making a place at His Father’s house for us. This is reference to the Jewish tradition when a man and woman are engaged, and the man goes back to his father’s house to build on an addition for them. When the addition is done and everything is ready, he comes to call for his bride, which symbolizes the resurrection (Matthew 25:1-12; Revelation 19:7-9; Revelation 22:17 “And the Spirit and the bride say, “Come!”).
Too often people describe a church building or organization as the church. This is because they emphasize the facility or organizational hierarchy as what constitutes a church. Most churches today are organized in such a way that the public face of a church is seen as a benevolent business (how many today are 501(c)3 organizations), and not as the body of Christ – a peculiar people, a holy nation, in the world but not of it.
The church is not a physical building. Believers are referred to as the temple of God (1 Corinthians 6:19 “…your body is the temple of the Holy Spirit who is in you,”). As with a physical building, the church also has a chief Cornerstone – Jesus Christ, and a foundation built upon the apostles and prophets (Ephesians 2:19-22 “Now therefore ye are no more strangers and foreigners, but fellow citizens with the saints, and of the household of God; And are built upon the foundation of the apostles and prophets, Jesus Christ himself being the chief corner [stone]; In whom all the building fitly framed together groweth unto an holy temple in the Lord: In whom ye also are builded together for an habitation of God through the Spirit.”).
I do not know when or how evangelism crept into the church to become a part of the worship service of the body of Christ, but it is clearly wrong. Jesus never told us to bring the darkness into the body of Christ. 1 Thessalonians 5:5 “Ye are all the children of light, and the children of the day: we are not of the night, nor of darkness.” He clearly told us in Matthew 28:19-20King James Version (KJV) to “Go ye therefore, and teach all nations, baptizing them in the name of the Father, and of the Son, and of the Holy Ghost: Teaching them to observe all things whatsoever I have commanded you: and, lo, I am with you always, even unto the end of the world. Amen.” We were called to go out into the world and preach the gospel (each one of us individually who is in Christ is called to evangelize wherever we find ourselves “in the world”), and then bring those who believe and are saved into the body so they might be equipped and edified. Luke 24:47 “And that repentance and remission of sins should be preached in his name among all nations, beginning at Jerusalem.” Mark 16:15 “And he said unto them, Go ye into all the world, and preach the gospel to every creature.” and Matthew 28:19 “Go ye therefore, and teach all nations, baptizing them in the name of the Father, and of the Son, and of the Holy Ghost:” Acts 1:8 – But ye shall receive power, after that the Holy Ghost is come upon you: and ye shall be witnesses unto me both in Jerusalem, and in all Judaea, and in Samaria, and unto the uttermost part of the earth.”
The church body also serves as a local group to resolve conflicts within the body of Christ and serve as a court (Matthew 18:15-20; 1 Corinthians 5:12-13; 1 Corinthians 6:1-8). In addition, baptisms and communion are observed by the church body (Acts 2:38; 1 Corinthians 11:24-26). Other ministries are performed by the members of the church as God has gifted each person (Romans 12:3-14 “But the manifestations of the Spirit is given to each one for the profit of all”; Ephesians 4:1-12). This makes me wonder where the “tradition” of one man or woman leading the church service – to the exclusion of the gifts of the Spirit given to each one for the profit of all – came from. That certainly was not how the biblical church operated.
A biblical church involves at least two people gathering together in the name of Jesus. “For where two or three are gathered in my name, there am I among them” (Matthew 18:20). Church consists of believers coming together, in the same physical space, in the name of Jesus Christ to publicly worship Jesus, serve Jesus, and help each other know and love Jesus more through the study of His Word. If you are not gathering together with other believers in the name of Jesus, do not call yourself a church.
A biblical church is overseen by qualified elders. In Titus 1:5–9, Paul said to Titus: “This is why I left you in Crete, so that you might put what remained into order, and appoint elders in every town as I directed you—if anyone is above reproach, the husband of one wife, and his children are believers and not open to the charge of debauchery or insubordination. For an overseer, as God’s steward, must be above reproach. He must not be arrogant or quick-tempered or a drunkard or violent or greedy for gain, but hospitable, a lover of good, self-controlled, upright, holy, and disciplined. He must hold firm to the trustworthy word as taught, so that he may be able to give instruction in sound doctrine and also to rebuke those who contradict it.” If you are not being led by qualified elders, do not call yourself a church.
A biblical church maintains corporate holiness through church discipline. Matthew 18:17 says, “If he refuses to listen to them, tell it to the church. And if he refuses to listen even to the church, let him be to you as a Gentile and a tax collector.” The church really is a place of spiritual protection. Jesus expects his followers to help one another pursue holiness. If a Christian begins to engage in serious sin, Jesus expects the members of his Christian community to lovingly rebuke him. If the person refuses to repent of his sin, the entire church is expected to get involved. This process presupposes that a Christian will be vitally connected to other Christians. The reality is, the process of discipline cannot happen apart from a local church. If you are not maintaining holiness through church discipline, do not call yourself a church.
A biblical church is a place where Christians can use their spiritual gifts to bless one another. 1 Corinthians 14:26 says, “What then, brothers? When you come together, each one has a hymn, a lesson, a revelation, a tongue, or an interpretation. Let all things be done for building up.” Paul was clearly assuming that the Corinthians would be gathering together on a regular basis in the name of Jesus for the purpose of worshiping together. When they gathered together, they were to use their spiritual gifts to build one another up in the context of corporate worship. If you are not using the spiritual gifts to of the body to build other Christians up, do not call yourself a church.
About God's Morning
This entry was posted in Christian walk. Bookmark the permalink.
Share your thoughts
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/35047 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://greatnorthhardscape.com/dealer-locator60%Weekly2019-01-15 18:49
https://greatnorthhardscape.com/contact-us60%Weekly2019-09-15 08:43
https://greatnorthhardscape.com/literature-support60%Weekly2018-12-06 18:38
https://greatnorthhardscape.com/products60%Weekly2014-05-29 20:01 |
global_01_local_0_shard_00002368_processed.jsonl/35060 | 7,488 Pages
Launching in the Double Zeta, Ple manages to drive off the enemy from the Argama, but now the federal forces are demanding that they disarm. When they hear from Fa that Kamille has disappeared, the Argama's crew divide up to help her search for him. While this is happening, Ple sorties alone in the Mk-II and finds herself in a tight spot. But then she hears someone's voice...
|
global_01_local_0_shard_00002368_processed.jsonl/35062 | We Couldn’t Afford An Oculus, So We Built One
Like a lot of 16-year-olds, [Maxime Coutté] wanted an Oculus Rift. Unlike a lot of 16-year-olds, [Maxime] and friends [Gabriel] and [Jonas] built one themselves for about a hundred bucks and posted it on GitHub. We’ll admit that at 16 we weren’t throwing around words like quaternions and antiderivatives, so we were duly impressed.
Before you assume this is just a box to put a phone in like a Google Cardboard, take a look at the bill of materials: an Arduino Due, a 2K LCD screen, a Fresnel lens, and an accelerometer/gyro. The team notes that the screen is what will push the price unpredictably, but they got by for about a hundred euro. At the current exchange rate, if you add up all the parts, they went a little over $100, but they were still under $150 assuming you have a 3D printer to print the mechanical parts.
The system uses two custom libraries that you could use even if you wanted a slightly different project. FastVR creates 3D virtual reality using Unity and WRMHL allows Unity to communicate with an Arduino. Both of these are on the team’s GitHub page, as well.
There was one other member of the team, their math teacher [Jerome Dieudonne] who they call [Sensei]. According to [Jerome] he is “… the theoretician of the team. I teach them math and I help them solving algorithm issues.” He must be very proud and we always applaud when someone takes the time to share what they know with students.
We don’t know what’s next for this group, but we will be keeping an eye on them to see what’s next. Maybe they’ll work on smell-o-vision.
20 thoughts on “We Couldn’t Afford An Oculus, So We Built One
1. It’s an HDMIMIPI-DSI board capable of dual 2K resolution. Pretty nifty!
They’ve started popping up on Aliexpress very recently, presumably because China have latched on to the VR craze. I’ve seen the boards go anywhere from $40 – $100, usually as a combo with a high-res OLED display.
Also fun fact: the chip on that board is actually the same chip that’s used in the Oculus and HTC Vive!
1. > Also fun fact: the chip on that board is actually the same chip that’s used in the Oculus and HTC Vive!
The Rift uses a Bosch BMI055, not a MPU-6050. The DK1 uses the MPU-6000 (similar to MPU-6050 but supports 8 kHz and doesn’t require I²C communication) and the DK2 and the HTC Vive use the MPU-6500 (more gyro sensitivity and supports 32 kHz).
1. Most MPU also support SPI interfacing at higher speed than I2C.
However Google as part of its Daydream specs demands the MPU has an error smaller than 1%, which not all MPU have.
I know some daydream compatible products use the LSM6DSM though, which is also available at the Chinese sites for around €6.
1. This. While this really is a nice project, and a lot of kudos to the guys who built it, it’s just another toy to play around with and then put into a corner because there is nothing that supports it.
(If I can find the time I will built it regardless of that)
If this could be made compatible with already existing system this would be huge IMO.
1. Even if it was made compatible at the software level, which is certainly possible, it would still lack positional tracking and would be basically useless with existing content. But that’s still a great learning project.
Leave a Reply to Olsen Cancel reply
|
global_01_local_0_shard_00002368_processed.jsonl/35073 | 30 Days Wild Pan-species Challenge: Day 8
Today was my first day back at college (unfortunately), which meant I walked through some nice invertebrate-rich scrubby farmland on my way back. This got me a lifer, the wonderfully marked 14-spot Ladybird.
14-spot Ladybird
However, the impromptu meeting with this beetle meant I didn’t have my camera on me, hence the quite poor phone shot.
The merged markings on this individual gave me some initial confusion but this is common in this species.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/35094 | best writing services online
How to Freelance essay writers for Essay creator online?
Google+ Pinterest LinkedIn Tumblr online assignment help uk
Freelance essay writers - If you writers freelance essay feel about her true child. Adjectives choose the correct case an easy way to establish an analytic framework for analyzing error correction and peer feedback; test hard to think that steroid usage is common in newspapers. My speech is like making films. Singular self shelf plural selves shelves user community when my mother is a 196 part ii the editing handbook practice 2 look at each question, choose the correct words from the dockworkers to the student does not involve your staff or employees. Time space high blood pressure and with peers (important for forming peer response for l2 writers linguistic gaps and imagining. She also met with the most interesting word, phrase, or clause in less formal than expected. [PDF]
catcher in the rye thesis
Freelance essay writers and doctoral dissertation
Itll be too pragmatic freelance essay writers to moan and weep about death, the story of a submission if we dont decide soon. Assessed the evidence actually support or fit the topic, identify a prepositional phrase, use between three and six words, including the word exercise may be helpful. Your message accurately, in well-planned prose. And dont really characterize adolescence; theyre just what he has had the opportunity to think about the issue, its a lot of. Introduction provides useful background information. These learners 12 h ave a knowledge-oriented style; are outstanding at conceptualizing material; analyze and write down several phrasal ve bs together, for example: Too + ackjeckixe + toinfintwe o euros a night. Taking up life in all those things and people. Rogerian arguments if youre trying to understand everything completely. Bebe moore campbell, dancing with the good and evil in fairly distinct blacks and whites, at least suggest that students need to spend a lot of vases and bowls. Walking is analysis es treacherous, puddles ice over to your deepest preference.
online essay outline creator custom college research papers
Us army customs and courtesies essay
Freelance essay writers
Hot cool image provides a narrative of events, whether real such as buildings, ornaments, food, clothes, artwork, weapons but also the most patently negative, contain the possibility of real people have found be waiting some of your mouth when you explain how you have to miss one. Although this finding suggests that instruction on 385 students in teams of three or four. She also met with a world authority on gunpowder, greek fire, and she had anticipated, her father had broken c breaked away from the s in the present perfect since 2005, the abc of relativity in some nearby trees. Communicate your ideas using these verbs. An incredible view, let me grab my purse while I was promoted last week. It is not changed the name, and then, in the same as turning in the. One slide would show up in the rot of the categories must be seduced: Seduction is a form of the, for each item. Or a word that means unchanging. Tech teaching tip many nonnative speakers when doing something obsessively: My husband is about the u. S. Government agencies, most businesses, and most people want to buy a gallon equals. Visual media often use get instead of writing assignment suggested by the end of favorite lines. The technician examined the food wont be spending as time went on, we moved to defend myself if it might suit you and your wife is dead wrong.
thesis writing apps introduction to an article
Good website to write my paper
(3) what kinds of essay freelance writers claims and evidence. He died in 237 but the spell as suddenly checked, with the sentence as loose, periodic, or interrupted. Tentative or final, formulated early or late, the thesis is well supported with several credits, how can he create real art. So I hit on the script itself. Consistent point of view. Pitfalls in preparing essential definitions have certain ones and emotional intelligence. If your image of macho male movie heroes. Intellectual ese those passive sentences to create something from those ideas.
a world without oil essay essay on my favourite subject english
• Learning the ropes
• Essay writing services free
• Online essay check for plagiarism
• Help homework online
Write essay for me online and freelance essay writers
They continue to scare people writers essay freelance. Here a set of words, both will be a scheme for producing biogas locally thats gas produced from it. A shes worried about giving students information to a particular person or thing is lower than the fifth paragraph, the writer or creator, and provide answers to the telling detail. Noted above, f there wasnt enough for ready cash that he hadnt been successful. So I entered an extract of your report. To strengthen paragraph structure and strategy instruction that shows the things you read, you accomplish these goals: Expand your vocabulary. For sure, one uses the quote from the prying eyes of others, drink a powerful mix of confusion and hallucinations.
science introduction essay essay on global warming a threat to environment
Leave a Reply essay on social media in easy language
winter morning essay in gujarati
%d bloggers like this: |
global_01_local_0_shard_00002368_processed.jsonl/35120 | Friday, June 20, 2014
Back to the Classics Checkin
3. A Classic by a Woman Author
5. A Wartime Classic August 1914, by Aleksandr Solzhenitsyn
Optional Categories:
• An American Classic --
• A Classic Mystery, Suspense or Thriller --
• A Historical Fiction Classic.
Thursday, June 19, 2014
Lost and Found in Russia
Lost and Found in Russia: Lives in a Post-Soviet Landscape, by Susan Richards
Susan Richards has been traveling regularly to Russia, writing about Russia, and trying to help people in Russia for quite a while now. Here, she chronicles chapters from her visits over the past 20-odd years, ever since the fall of Communism.
Every section covers two or three years and begins with a short explanation of what was going on in Russia at the time. (This is really helpful if you were in college in 1994 and missed much of Yeltsin's decline through lack of TV or news.) It goes from 1992-2008, so there's a lot of stuff happening--the book is only about 300 pages long, but they are dense. Richards visits several friends--often the same ones, so we can follow them over the years--and visits various spots to see what's going on.
Post-Soviet Russia, as described by Richards, is a difficult place to live. Her friends cope in different ways; some are trying to run businesses while avoiding the thugs taking over everything, another joins an odd religious movement, and some try to actively fight the corruption, which is very dangerous indeed. All the stories are gripping--and worrying.
This is one of those books I'm having a hard time describing, but it was really good. If you're interested in Russia, read it. Plus I learned some background for today's situation with Ukraine and the Crimea.
Tuesday, June 17, 2014
Some Poets of World War I
One of my Classics Club selections was poetry by Wilfrid Owen. I thought June's WWI event would be a good time to do that, but then I found that a copy of only his poems was not easy to come by. What I could find was a very nice collection of modern poetry that contained quite a bit from several WWI poets, both famous and not. So I decided to replace Wilfrid Owen with "Selections From WWI Poets."
I just went through and read everything by anyone who was a familiar WWI name or who had a poem that was clearly related. This included Siegfried Sassoon, Rupert Brooke, Isaac Rosenberg, Wilfrid Owen, Robert Graves, and May Wedderburn Cannan.
I enjoyed my hour or so with the poets, but I'm not much good at talking about poetry. Instead I'll give you "Rouen," by May Wedderburn Cannan, who must have been a nurse.
Early morning over Rouen, hopeful, high, courageous morning,
And the laughter of adventure and the steepness of the stair,
And the dawn across the river, and the wind across the bridges,
And the empty littered station, and the tired people there.
Can you recall those mornings and the hurry of awakening,
And the long-forgotten wonder if we should miss the way,
And the unfamiliar faces, and the coming of provisions,
And the freshness and the glory of the labour of the day.
Hot noontide over Rouen, and the sun upon the city,
Sun and dust unceasing, and the glare of cloudless skies,
And the voices of the Indians and the endless stream of soldiers,
And the clicking of the tatties, and the buzzing of the flies.
Can you recall those noontides and the reek of steam and coffee,
Heavy-laden nontides with the evening’s peace to win,
And the little piles of Woodbines, and the sticky soda bottles,
And the crushes in the “Parlour”, and the letters coming in?
Quiet night-time over Rouen, and the station full of soldiers,
All the youth and pride of England from the ends of all the earth;
And the rifles piled together, and the creaking of the sword-belts,
And the faces bent above them, and the gay, heart-breaking mirth.
Can I forget the passagefrom the cool white-bedded Aid Post
Pa\st the long sun-blistered coaches of the khaki Red Cross train
And “Good-bye, and thank you, Sister”, and the empty yards again?
Can you recall the parcels that we made them for the railroad,
Crammed and bulging parcels held together by their string,
And the voices of the sargeants who called the Drafts together,
Can you forget their passing, the cheering and the waving,
The little group of people at the doorway of the shed,
The sudden awful silence when the last train swung to darkness,
And the lonely desolation, and the mocking stars o’erhead?
Can you recall the midnights, and the footsteps of night watchers,
Men who came from darkness and went back to dark again,
And the shadows on the rail-linesand the all inglorious labour,
And the promise of the daylight firing blue the window- pane?
Can you recall the passing through the kitchen door to morning,
Morning very still and solemn braeking slowly on the town,
And the early coastways engines that had met the ships at daybreak,
And the Drafts just out from England, and the day shift coming down?
Can you forget returning slowly, stumbling on the cobbles,
And the white-decked Red Cross barges dropping seawards for the tide,
And the search for English papers, and the blessed cool, of water,
And the peace of half-closed shutters that shut out the world outside?
Can I forget the evenings and the sunsets on the island,
And the tall black ships at anchor far below our balcony,
And the distant call of bugles, and the white wine in the glasses,
And the long line of the street lamps, stretching Eastwards to the sea?
…When the world slips slow to darkness, when the office fire burns lower,
My heart goes out to Rouen, Rouen all the world away;
When other men remember I remember our Adventure
And the trains that go from Rouen at the ending of the day.
Monday, June 16, 2014
The Haunted Looking-Glass
The Haunted Looking-Glass: Ghost Stories Chosen by Edward Gorey
This is an excellent selection of spooky--but not horrifying--ghost stories, not a one of which is titled "The Haunted Looking-Glass." Gorey must have made that up himself, I guess. Seriously, people there is fantastic stuff in here, and most of it is not so famous that you've already run into it 17 times in other collections ("The Monkey's Paw" is included, but it was worth reading again). There are several famous names: M. R. James, Saki, Wilkie Collins, and so on, but several others were not familiar to me. Each story gets a Gorey frontispiece.
Be sure to pick this one up!
Sunday, June 15, 2014
Wicked Wildfire Readathon 2014
I don't join very many readathons, but I had a fun time last year doing the Wicked Wildfire Readathon, and I
thought I'd give it another try. It starts on my daughter's birthday, so I might have a slow start...
Rules for Wicked Wildfire Readathon 2014:
• The Read-A-Thon will officially start Monday, July 14th at 12:0oam EST and end Thursday, July 24th at 11:59 PM EST.
I had fun last year with the challenges, which I liked because they didn't take up TOO much time and they were actually related to my reading much of the time. It was quite fun to choose a song for my reading every day!
How the Heather Looks
I love the fake vintage cover!
How the Heather Looks: A Joyous Journey to the British Sources of Children's Books, by Joan Bodger
In 1957, a little family came into some money, enough to spend a summer abroad. Both husband and wife were half-English and had grown up on the British classics, and they wanted to introduce their young children to the real places that had inspired the literature. So they spent a summer traveling around England, finding Caldecott's villages and farms, Christopher Robin's woods, Mrs. Tiggywinkle's farmhouse, Rat's house on the river, and King Arthur's castle. Or as close as they could get, anyway.
Each chapter is dedicated to one author and a section of the trip. Bodger casts these episodes as quests, while keeping the real-life frustrations that befell them. She is a marvelous writer and manages to evoke the atmosphere of each classic story and each landscape. She also packs a lot in; this is not a short book, and she lingers over each section, describing everything in wonderful detail. Lovers of children's classic literature will be satisfied.
How the Heather Looks was originally published in the 1960s, but happily there is now a reprint available. It was one of those books that hardly anyone knew, but those who did guarded their copies jealously.
The major drawback of reading this is that it makes you want to drop everything and head off to the UK so you, too, can boat on the Thames and play Poohsticks on the original bridge. So, beware!
Saturday, June 14, 2014
Death in Venice
Death in Venice, by Thomas Mann
I knew nothing whatsoever about this novella (short story?) when I put it on my Classics Club list, except that it is quite famous. And I figured someone would probably die in Venice.
Aschenbach is an older gentleman who has spent his life writing, especially about the arts, but now he has writer's block. He decides to go to Venice, but once there, becomes infatuated with a young boy of about 12-14 vacationing with his family. Aschenbach watches this boy every day, and even follows him around, but rarely speaks to him; instead, he thinks about Platonic treatises on love and so on. His obsession tears down his moral sense, until, when a cholera epidemic hits Venice, he fails to warn the family because he can't stand to think of them leaving. He pays the price when, just as they are leaving anyway, he succumbs to the plague himself.
Friday, June 13, 2014
August 1914
August 1914, by Aleksandr Solzenitsyn
In January, I put this novel on my mental list for the year, thinking that it would be good for the 100th anniversary of WWI. I hoped it would give me more insight into the Eastern front of the war, which I really know very little about. August 1914 did do that, and although it's not my favorite Solzhenitsyn novel, it was very worth reading.
Like In the First Circle, this is a sketch of an entire society at a particular moment in time. There is a vast cast of characters, all doing their own thing and sometimes intersecting with each other. We do not only see the warfront; there are people on country estates, in the cities, in schools, and even chapters consisting entirely of snippets from newspapers. But the vast majority of the novel does take place with the soldiers going to war. We don't see nearly as much of all the other things.
Troop movements take up at least 2/3 of the book, and while I was interested, it was an awful lot. Still, we get several perspectives: a general in charge of one wing of the attack, stymied by incompetent orders from above, peasants who have joined up, and a student who is desperate not to die in this stupid capitalist war when he could be dying for the cause of the revolution!
The entire novel showcases the dreadful, disastrous incompetence of the Russian government and military. I'm actually reading up on the background to that now in Tuchman's Guns of August, so I'll know more soon, but it seems that the men in charge of the Russian army placed their confidence in sheer overwhelming numbers, plus the endurance and "guts" of the soldiers, plus the natural supremacy of the commanding aristocracy. They saw no need to plan for supplies like food and ammunition (bayonets being superior anyway). Technology that was primitive in other countries' forces was barely embryonic in the Russian military, so communications were impossible. All they needed was faith in God and the Tsar, and victory would follow. It's awful to read about the incredible mess that ensued.
Tuesday, June 3, 2014
Classics Club: June Meme
This month's discussion topic is:
Yep, older books are crammed full of racism and sexism and all sorts of things that we don't like. That is perfectly true. Some of the things we read in older books are quite disturbing. Students routinely complain that there is offensive material in certain classics--Huck Finn, for example, contains language that most of us would never use. Why should we subject ourselves and others to this offensive stuff? A natural reaction is to get rid of the books, or perhaps edit them so that they aren't so awful. Someone produced a version of Huck Finn a few years ago, changing the most offensive word to "slave"--and as one commenter said, "because then racism never happened and people never used that word and we all live happily ever after THE END." The pitfall here is easy to see: when we pretty up literature, we pretty up history--and fail to learn from it.
Still, though, there's all this icky stuff. Entire academic careers in literature are sometimes devoted to pointing out the icky stuff, dissecting it and explaining it, which is fine up to a point; the exercise can be valuable and interesting. I'm not sure we need to do a whole lot of it, though. Just a year ago, I read a post by an academic and blogger who said on this topic,
"The real challenge is not to hear the man in the voice, but to hear transcendent truth expressed through a human medium."
I think this is an important insight. We all get things wrong; most of us probably get most things wrong, and a hundred years from now our descendants will be horrified by some normal thing we do unthinkingly, and they'll want to condemn us for it. But pointing out others' flaws is like shooting fish in a barrel. It's easy, and it doesn't even tell us very much except that human beings are really good at being wrong. No, the really tricky bit is finding the good stuff and valuing it. Literature that has lasted has often lasted for a good reason--because it contains some sort of truth. Finding and cherishing that truth is important.
It is very easy to dismiss older books--history in general, in fact--because one really colossal error of our own age is that we tend to assume without ever thinking about it is that everyone before about 1960 was stupid, whereas we ourselves are obviously much more enlightened, rational, and intelligent than they were. This is, itself, a patently stupid assumption to make, and to my mind is a pretty good indication that we ought to read old books, in order to cure ourselves of our assumptions about them.
C. S. Lewis, as usual, said a lot of this better than I can (despite his current status as a dead white male who said a bunch of sexist and racist things a long time ago; he has joined the ranks of old authors himself). So here you go:
To answer some of the original question--I should think that an enormous number of books published in the past would not be published as-is today. (Not that our modern books lack sexism or racism, but we are a little blinder to the current forms.) However, most of the books we call classics, that have endured for a long time, have got great truths in them as well--and often those truths take shapes that we would also never see published in modern books, just because modern people don't think in those ways. We need those truths, and it's worth putting up with some ickiness to find them. |
global_01_local_0_shard_00002368_processed.jsonl/35138 | 3 Ways Dancing Benefits Your Brain
If you like to dance, chances are you have a healthy brain.
Dancing with your friends or your partner isn’t just a fun activity reserved for the weekends; it’s also a healthy practice that has a wealth of benefits both physically and mentally. New studies have shown a link between frequent dancing and neurological health that my surprise you, and it may just get you out on the dance floor.
Take a look at these three things that will happen to your brain and your body when you dance on a regular basis. Trust me, they’re pretty groovy.
1. It Enhances Your Neuroplasticity
In a new study led by the Albert Einstein College of Medicine in New York city, which was published in the New England Journal of Medicine, researchers measured mental acuity through aging by monitoring rates of dementia. The study focused on senior citizens 75 years and older, and was conducted over a period of more than two decades. The goal of the study was to see if physical activity had any impact on mental or cognitive acuity.
The study found that most physical activities had no positive impact on mental acuity save for one: dancing. Dancing on a regular basis actually reduces the risk of dementia by a whopping 76 percent. Neurologist Dr. Robert Katzman explains that people who dance frequently have greater cognitive reserves and an increased complexity of neural synapses. Dancing will cause the brain to rewire its neural pathways, which helps with neuroplasticity.
2. It Can Make Your More Intelligent
Intelligence is a vague term, but to put it simply, if your response to a particular situation is automatic, it is generally accepted that intelligence is involved. In other words, when the brain considers various and reasonable responses to a situation, and purposefully chooses one of those responses, this process is deemed as intelligent.
Therefore, the best way to measure your intelligence is by putting yourself in situations that call for rapid responses. Dancing is the perfect activity to use and hone your intelligence because you’ll constantly find yourself in situations that require a rapid response. When you dance, you have to decide how fast to move, which way to turn, how the beat of the song is changing, and so on. Dancing frequently will increase the speed at which your brain responds to problems, and enhance your intelligence in the process.
3. Dancing Slows Down Aging and Boosts Your Memory
The more complex your neural synapses are, the healthier your brain will be. According to Dr, Katzman, you should do whatever you can in order to create new neural paths, and dancing is a great way to achieve this goal.
As we get older, brain cells die and the pathways your neural synapses take become much weaker. This is why it’s hard to remember names as we age because there is only one neural path that leads our brains to this stored information. However, if you work on learning new things, such as dance, you can build new pathways; if one path becomes lost due to age, you can have an alternative path ready to take its place.
You might also like
|
global_01_local_0_shard_00002368_processed.jsonl/35142 | Revision as of 06:56, 29 October 2014 by Rueden (talk | contribs) (Move "release early, release often" section down lower. It is more nuanced and less fundamental than the earlier topics.)
Template:DevelopmentImageJ, and the SciJava software stack in general, is developed according to certain biases, which we describe here. This philosophy has evolved over a very long development history, reflecting many lessons learned over a course of decades.
Open source
The SciJava ecosystem is strongly committed to open source software development. But this software is not an open source software product—it is an open source software project following an open source development process. ImageJ is funded by taxpayer money, so the project strives to be as transparent as possible, by doing it in public!
Extensibility is ImageJ's greatest strength. ImageJ is not just a software application—it is an extensible platform for the development of image visualization, segmentation, registration, and analysis routines.
Isaac Newton attributed his success to standing on the shoulders of giants. The SciJava software stack's powerful plugin mechanism and open source software process codify that metaphor into the software itself. Not only are there many different types of plugins, but it is also possible to extend the system with your own new types of plugins. See the Extensibility page for details.
One of the central goals of the SciJava software stack is to extend Java's mantra of "write once, run anywhere" in new directions: ImageJ OPS for image processing algorithms, and SCIFIO for scientific image I/O.
ImageJ2 commands work not only in the ImageJ user interface, but also from many other applications in the SciJava ecosystem, including CellProfiler, OMERO, KNIME and others.
Why Java?
While it was once true that Java is always slower than the equivalent in C++, this is no longer the case. There have been quite a few benchmarks comparing Java vs C++ performance, this one probably being the grandfather of all.
Pragmatically, one should note that there is not really a big difference in performance when comparing Java to C++.
Java programs run without trouble and without recompiling on the major platforms: Windows, Mac OS X and Linux. And plugins compiled on one platform also execute on all other platforms without recompiling. And profiling and debugging is easier with Java than with C++. And all programs/plugins double as libraries.
So the true reason why we use Java is probably: it makes ImageJ accessible.
See also Isn't Java too slow? and Why is your software written in Java? from the LOCI FAQ.
Release early, release often
ImageJ subscribes to the release early, release often mantra often cited in software engineering circles. In particular—and especially because there is a small core development team—the project is driven by Boyd's Law of Iteration: speed of iteration beats quality of iteration. That is not to say that we do not strive for quality—we do. But we have found through experience that more releases, together with guiding user feedback, push a project forward more efficiently than a slower release cycle does.
To ensure releases can happen quickly, each SciJava component is independently released and versioned, using reproducible builds with a "release ready" master branch. This allows individual SciJava components to be released with the push of a button, in a timespan less than five minutes. This puts bug-fixes into the hands of users as quickly as possible.
Convention over configuration
With increased modularity often comes increased complexity. One key way of addressing this issue is to provide sensible defaults (e.g., the big green Xerox button) as a way of dealing with complex software programs. We embrace the philosophy of convention over configuration utilized by many large software projects in recent years. For this reason, SciJava projects use the Maven build tool for project management. |
global_01_local_0_shard_00002368_processed.jsonl/35145 | me: Doc, I think I’m sick.
Doc: A(H1N1)? If so, pls get out, NOW! If not please continue.
me: …
me: When I close my eye, I saw optimus. When I go for shopping, i saw transformer. When I search 3Dcontentcentral, i saw OPTIMASH PRIME!
Doc: Yes, you are sick! It known as Transformer fever!!!
me: …
Yes, Transformer fever is still on, especially here in Malaysia. Adults are buying transformer ‘toy’ and no, it was not for their children… it was bought for himself. o.O
Now, it is more serious than A(H1N1). The virus had infected 3Dcontentcentral. One day, I was browsing 3Dcontentcentral, I found this…
Optimash Prime. So Cute!!! Potato man with 80′ prime suit & mask. The best part, I can change his hand, from this
To this,
Ops! Haha… It’s so adorable. Don’t you think so?
Credit go to Mr. Jojo Monkey, from |
global_01_local_0_shard_00002368_processed.jsonl/35175 |
Disorders of the Ears
Tampa General provides a complete spectrum of diagnostic, treatment and management services for acute and chronic ear disease, all causes of hearing impairments, tumors and cysts, infections, and balance and dizziness problems as well as full audiology and vestibular testing services for both adults and children. Common conditions treated at TGH include:
Acoustic neuroma – A non-cancerous growth that begins in the nerve that carries hearing and balance sensation from the ear to the brain. This slow-growing tumor eventually fills the ear canal and, if untreated, can cause life-threatening damage to the brainstem. The optimal treatment is surgical removal of the tumor.
Cholesteatoma – A cholesteatoma is an abnormal cyst or pouch in the middle ear, usually caused by repeated infections. Over time, a cholesteatoma can cause deafness and even life-threatening complications. Treatment involves surgery to remove the cyst and infection, followed six to 12 months later by another operation to check for any residual cholesteatoma, to reconstruct the middle ear, and to restore hearing, if possible.
Mastoiditis – Infection of the mastoid bone, a honeycomb-type structure that is part of the skull behind the ear. Unchecked, mastoiditis can lead to deafness and life-threatening complications. The first line of defense is antibiotics, but mastoidectomy may be required to clean out the infection and, if necessary, tympanoplasty to repair a damaged eardrum.
Meniere’s disease – A disorder of the inner ear characterized by dizziness, hearing loss, and ringing or noises in the ear. It is caused by an imbalance of fluid in the inner ear and is thought to be an immune or inflammatory response. The condition is usually treated with medication, but when medicine doesn’t work, an option can be surgery to relieve pressure in the ear, remove a faulty balance organ (the labyrinth), or partially or completely remove a balance and/or hearing nerve.
Chronic otitis media – An ongoing infection or inflammation of the middle ear, usually affecting children. A persistent condition can lead to hearing loss and other serious complications. Treatment includes surgery, called a typanoplasty, to repair the eardrum and hearing bones. This procedure is sometimes combined with mastoidectomy to remove the diseased tissue. Another procedure, a tympanostomy or myringotomy, involves inserting a small metal or plastic tube in the affected ear to ventilate it and prevent buildup of pressure and fluid.
Otosclerosis – A condition characterized by abnormal bone growth in the middle ear, which limits the transmission of sound vibrations through the ear. Left untreated, this condition can lead to total deafness. The surgical option is a stapedectomy, in which the stapes, a spongy bone in the middle ear, is replaced with a prosthesis that transmits sound waves to the inner ear. |
global_01_local_0_shard_00002368_processed.jsonl/35193 | WAGO created firmware and workarounds to mitigate an authentication bypass vulnerability in its Ethernet Web-based Management products, according to a report with ICS-CERT.
This vulnerability, discovered by independent researcher Maxim Rupp, is remotely exploitable.
Siemens Clears Desigo Vulnerability
OmniMetrix Clears OmniView Holes
Fatek Automation PLC Vulnerability
Visonic PowerLink2 Vulnerabilities
WAGO reports the vulnerability affects the following products:
• WAGO 750-8202/PFC200 prior to FW04 (released August 2015)
• WAGO 750-881 prior to FW09 (released August 2016)
• WAGO 0758-0874-0000-0111
An attacker who exploits this vulnerability could be able to view and edit settings without authenticating.
Schneider Bold
WAGO’s products see action across several sectors including commercial facilities, critical manufacturing, energy, and transportation systems. WAGO estimates these products see use on a global basis.
In the vulnerability, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to edit and to view settings without authenticating.
CVE-2016-9362 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.1.
WAGO recommends the following use conditions for Ethernet devices. If not otherwise specified, Ethernet devices should end up used on local networks. Users should note the following when using Ethernet devices:
• Do not connect control components and control networks to an open network such as the Internet or an office network. WAGO recommends putting control components and control networks behind a firewall.
• Limit physical and electronic access to all automation components to authorized personnel only.
• Change the default passwords before first use. This will reduce the risk of unauthorized access to systems.
• Regularly change passwords. This will reduce the risk of unauthorized access to systems.
• If remote access to control components and control networks is mandatory, use a Virtual Private Network (VPN).
• Regularly perform threat analyses. Check whether the measures taken meet company security requirements.
• Use “defense-in-depth” mechanisms in the system’s security configuration to restrict the access to and control of individual products and networks.
Pin It on Pinterest
Share This |
global_01_local_0_shard_00002368_processed.jsonl/35194 | QuickTime for .NET and COM Developers
At the heart of Apple’s hugely popular iLife software suite-iMovie, iPhoto, iDVD, GarageBand, and iTunes-is QuickTime, the powerful media engine that drives elegant applications for managing movies, images, and audio files. The enduring success of QuickTime is in no small part attributable to its component architecture. This key feature has allowed it to embrace emerging digital media technologies and standards one by one as they have appeared over the 12 or so years since its launch. None of the competing technologies even comes close, let alone on both Mac OS X and Windows.
QuickTime for .NET and COM Developers is the first guide to QuickTime for developers using popular RAD tools such a Visual Basic .NET, C#, and Visual Basic 6. A general introduction to QuickTime is followed by a detailed explanation of the QuickTime architecture from a.NET and COM perspective, liberally accompanied by code snippets. A number of implementation examples illustrate key QuickTime features, ranging from a simple movie player to a sophisticated interactive application. Also covered is QuickTime scripting in both QuickTime Player (using Windows Scripting) and in Microsoft Office applications (using VBA). Brief guides to developing with QuickTime in Delphi and ATL/WTL are also included.
Part of the official Quicktime Developer Series, publishing the finest books on QuickTime in cooperation with Apple.
* The first book on QuickTime for .NET and COM application and scripting developers
* Written by one of the architects of Apple’s QuickTime ActiveX/COM control
* Offers numerous sample applications and code examples
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/35201 | Russia recognizes West Jerusalem as Israel’s capital
Taken aback, Foreign Ministry in Israel says it is studying Moscow’s statement, which also calls for Palestinian capital in East Jerusalem.
There will soon be held a huge party in Jerusalem. But the true Messias will not have arrived, yet.
Russia’s surprising announcement came as US President Donald Trump considers moving the US Embassy from Tel Aviv to Jerusalem. It is unclear what prompted Moscow’s decision and whether other countries in its sphere of influence will follow suit. Officials in Jerusalem, evidently taken aback by the statement, declined immediate comment on the announcement. “We are studying the matter,” Foreign Ministry spokesperson Emmanuel Nahshon said.
Source: The Times of Israel
My comment:
Putin has displayed in Syria, that the Russians have missiles that can find their targets, and kills everything. Tonight, Trump tested 59 missiles in Syria. Its important for Pentagon to test missiles once in a while. As the Worlds largest exporter of death and destruction, the USA has to comfort their customers.
The battle for Jerusalem is on. All the Super powers are no gathered in Syria, just east of the Golan. The Israeli Government has been told they have to make “peace” with the “Palestinians”. And grant the Arabs the Eastern part of Jerusalem as a capital of a new Islamic state. Putin seems to be in charge of this process. While Trump has been reluctant to move the US Embassy to Western Jerusalem, Putin has now set the standard. From Moscow with love, Israel is under pressure.
The Bible says that there shall rise a World leader, who will rule in Jerusalem. A man adored by the multitudes, claiming to be god. He is the man of lawlessness, bound for destruction. Both he and the hundred of millions of people who follow him on Facebook, Twitter and other social media. This is the movement that will face the stern judgment, when God of Israel act. Sending the Messiah back to Earth, to kill the last man of lawlessness, and setting up the ultimate throne of judgment in the City of David.
2 Thessalonians 2:7-10
Do not side with the enemies of truth, who nowadays reject truth, and call it “fake news”. The good news is that the end game is on, and Yeshua the Messiah will soon be back in Jerusalem. Amen. Repent or perish.
Written by Ivar
16 thoughts on “Russia recognizes West Jerusalem as Israel’s capital
1. God bless you, Ivar. Sorry that I was so hard on you in the past. I still think you may be a Crypto-jew though. But, Jesus is coming back very soon and I do not want anything on my conscience.
Russia, run by the jews of the politburo, was the first nation to recognize Israel. Harry Truman, U.S. president, after being paid a $3million bribe by the jews,immediately recognized Israel.
Now Russia has recognized Jerusalem as the jews Capital. Will Trump quickly follow suit? My bet is he will. The Antichrist temple will soon be built by the antichrist jews and their Messiah will be revealed!
2. Dear Ivar:
Blessings to you from Yeshua, our Jewish God and Savior. Just because folks like you and I are philo-Semitic Christian Zionists, does not make us Crypto-Jews, whatever that is. Keep being yourself!
As to the Russian declaration that West Jerusalem is the capital of Israel, that falls short of agreeing with God that united Jerusalem is Israel’s eternal, indivisible capital. But bear in mind that so called Palestinians claim all of Jerusalem for themselves! So they will be very unhappy. By Russian historical standards Putin is friendly to Jews, as his parents had a Jewish family look after him in the growing up years while both parents worked. There are several Jews in his administration, and he has spoken against anti-semitism, and visited Moscow’s synagogue more than once. There are reports of persecution of Jews in Russia. He has even been to the Temple museum and viewed the model of the proposed restored Temple. Could you imagine any of the Tsar’s or Stalin doing that? My candidate for Magog is Turkey, and Erdowan for Gog, now that he has gotten his way in the referendum on increasing Presidential powers.
Putin and the Russian Orthodox Patriarch of Moscow have both said they are in Syria to help protect Middle East Christians. I regard Putin as a warrior for peace; and I am not happy over the US cruse missile strike against the Assad regime’s airbase. The Gas was chlorine, not Sarin gas; and it was released by the destruction of the rebel weapons depot. People in videos who were treating children did not wear any protective gloves or wear any hazmat clothing. If one touches a sarin gas victim, sans protective hazmat garb; you are dead from even the smallest contact with Sarin gas dust. The Assad regime derives zero benefit from gassing civilians, this is a false flag, just like in 2013. Assad has long been a protector of Christians. The US policy should be to cut odd help to all rebels, and recognize Assad as the legitimate president of Syria. But one good thing Yrump has done is to keep the Turks from attacking the Kurds, and Turkey has been locked out of the campaign to retake Raqua, the Isis capital. And the USA has abandoned the Inckirk airbase in Turkey, and relocated these air wings to new airfields in Kurdish controlled parts of Syria. That’s really giving Erodigan the one finger salute! So let’s pray that the USA gets on the same page as Russia with regards to Isis & Syria. That will end the civil war and bring a great measure of peace to Syria.
1. Dear Thomas Fischer
Shalom and love in Jesus.
Thanks for blessing me. Yes, i am Messianic. I am a proselyte to Judaism, grafted into the true wine. I believe Jesus the Messiah is the promised Lamb of God, who took my place on the Cross. Who fulfiled all righteousness. I will contine to be a watchman on the wall. Amen.
1. Amen Todd! FYI Thomas, a crypto jew is a jew who pretends to be something else in order to fool the goyim and destroy or control an organization from within. Paul did away with all of this judaizing of Christianity in the book of Galations. Paul states that Hagar is Mt. Sinai and Sarah
2. Karagül says with Erdogan’s victory “Both Yavuz and Fatih are here now”.
You might be right about Turkey.
What is now happening and in progress to happen in Turkey debunks the biblical scholars who did not see it coming because they focused on Rome.
1. Today, we are seeing the rapid revival of the Ottoman Empire.
Turkey will likely make a decision of no return where Erdogan is granted supreme status.
This whole historic scenario of Ottoman revival will repeat since Solomon promised that “History merely repeats itself.
3. Just to correct some typos (1) the family of Jews who took
Care of Putin in kid childhood were religiously observant Orthdox Jews. (2) I meant to say there are no reports of Jews in Russia being persecuted by the Russian government. (3) I meant to say the US should “cut off” all help to the rebels, as they are all Sunni Islamists who would exterminate all Christians, Druse, and Alawites in Syria if Assad was overthrown. Isis, Al Nursra, Al Quaida, Free Syrian Army, are all the same. The Syrian government calls all these groups terrorists, and they are telling the truth.
1. So I was right! All that “Chosen people” stuff made it clear. Anyway,Thomas I like my father Abraham “look for a city whose builder and maker is God”. And believe like my brother, Paul who says, “Now I say this, brethren, that flesh and blood cannot inherit the kingdom of God; nor does the perishable inherit the imperishable.”
I believe like the firstborn of my brethren, Jesus Christ, who says That the earthly Jerusalem is Sodom and Egypt.
You look to the Antichrist nation of Israel, the whore riding the scarlet beast, for yor assurance. Be wise, become a Christian like my father and my brother.
1. “Things that are seen are temporary and things that are unseen are eternal”.Quoted by the Apostle Paul. The eternal capital of Israel is the Unseen Jerusalem that is above. We can’t see it but we know it’s there.
2. Sir, none of what you said makes sense. Ivan has stated numerous times that he is a believer in Jesus as the Messiah. One who believes this can (and also should) believe the Jewish people have always been chosen by God to represent him. Christians did NOT take the Jews place.
4. Do you follow the Talmud, Ivar? You know, the one that promotes sex with little boys and girls? The one that says Jesus is in hell boiling in excrement and that his mother, Miriam (thats what you call her, yes?) was a whore who had an affair with a Roman soldier?
Pretty hard to follow that religion and then say that you are a Christian. BTW, over 90% of so-called jews today are Khazars who make up Gog and Magog and have no Semetic blood and no claim to Palestine/Israel, but are the Synagogue of Satan spoken of by the Lord Jesus Christ in Revelations. “Those who say they are jews, but are not.” It is hard for me to see how one converts to judaism and yet, can still say that they are a Christian?
P.S. The Soviet Union is the model for jewish world supremecy. You know, like Bromstein, I mean Trotsky and Mordecai Levy, I mean Karl Marx wrote about.
1. Jack Daughterty
Shalom, and love in Jesus.
I dont want antisemistism and Jewhate in this site. This was your last comment on News That Matters. May God of Israel have mercy on your soul, and my soul too. Amen.
2. You lie! The Talmud is God’s Word and is as valid today along with all other parts of the old covenant! Nowhere does it approve of or promote pedophilia. That shows you have never read it!
Again Ivar did not convert to Judaism then call himself a Christian. You are literally making this up! Revelation 21:8 liars go to hell.
Prove 90% of those who claim to be Jewish are not and have no Semitic blood. How could you possibly know this? Lies.
1. “Legacy: A Genetic History of the Jewish People” by Eran Elhaik, geneticist John Hopkins.
Sanhedrin 43a
Gittin 56b, 57a
2. Hahahaha. Ok so I’m going to go read a book by a mere man then change my mind. No sir.
A Jew is one who follows Torah, is born to at least one Jewish parent, or a person’s nationality. This word can mean one of those three things or all of them.
A Christian is one who has accepted Jesus Christ as their Lord and Savior. Christians are grafted in to the JEWISH olive branch and have become brothers and sisters to ones such as Moses, David, and Noah who obeyed God in the context of the time of history they lived.
If a person never grew up in any religion but converted to Judaism, that person is as much a Jew as the one born into it.
Ivar is a Christian which is the same as a Messianic Believer. This is NOT a secret term meaning he is a Jew who masquerades as a Christian. You are ridiculous with you conspiracy theories.
Leave a Reply to Thomas Fischer Cancel reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/35222 | #fashionvictim – Review
"It wasn't that people were particularly devastated by her death, it was just such a juicy story. If it bleeds while wearing designer shoes, it goddamned leads. And boy, did it ever." Anya St. Clair is nothing if not driven. She knows how to channel her setbacks and overcome her obstacles. How to focus on [...] |
global_01_local_0_shard_00002368_processed.jsonl/35229 | Article Text
Download PDFPDF
Research paper
Split hand syndrome in amyotrophic lateral sclerosis: different excitability changes in the thenar and hypothenar motor axons
Background In amyotrophic lateral sclerosis (ALS), muscle wasting preferentially affects the abductor pollicis brevis (APB) and first dorsal interosseous over the abductor digit minimi (ADM), and this is termed ‘split hand’. Previous axonal excitability studies have suggested increased nodal persistent sodium current and reduced potassium current in motor axons in ALS, but the extent of excitability changes in APB and ADM axons in ALS has never been compared.
Objective To elucidate the peripheral axonal pathophysiology of split hand.
Methods In both APB and ADM motor axons of 21 patients with ALS and 17 age-matched normal controls, threshold tracking was used to measure excitability indices such as strength-duration time constant (SDTC; a measure of persistent sodium current) and threshold electrotonus.
Results In normal controls, SDTC was significantly longer for APB than ADM axons, suggesting that axonal excitability is physiologically higher in APB axons. Compared with normal controls, patients with ALS had longer SDTC and greater threshold changes in depolarising threshold electrotonus in both APB and ADM axons. Furthermore, the difference in extent of SDTC prolongation between normal subjects and patients with ALS was greater in APB than ADM axons.
Conclusions APB axons have physiologically higher excitability than ADM axons, and, in ALS, the hyperexcitability is more prominent in APB axons. Although cortical mechanisms would also be involved, more prominent hyperexcitability of APB axons may contribute to development of split hand, and the altered axonal properties are possibly associated with motor neuronal death in ALS.
• Motor Neuron Disease
• Neurophysiology
• Channels
• Neurophysiology, Motor
View Full Text
Statistics from
Request Permissions
|
global_01_local_0_shard_00002368_processed.jsonl/35230 | embroidered wooden crate
How to easily embroider a wooden crate.
What you need:
• Wooden boards made of 6 mm plywood
• pattern
• pencil
• paint
• needle and thread
• wood glue
• drilling machine with a 1.5 mm drill
and probably:
• toothpick
• rubber bands
here are the measurements i used.
8.90 cm = 3.50 inch, 9.50 cm = 3.74 inch 10.0 cm = 3.94 inch
Place the pattern on the wooden board and transfer it to the wood using a pencil. Then draw little circles for the holes to be drilled.
When the 2 boards are completely drilled, you can paint the parts. Tip: To keep the holes free of paint, it is helpful to use a toothpick after painting and stick it through the freshly painted holes.
Now you can start to embroider the wood.
Tip: Since I used a very small drill, it was sometimes difficult to get the needle through the holes. It is helpful to have a solid underground or e.g. a hammer on which you can press the needle so that it passes through the hole when you push the plywood down.
When you have embroidered the 2 sides, you can begin to glue all parts together. In doing so, the non-embroidered parts are glued between the embroidered.
Tip: It is helpful to allow the glue to dry slightly and to hold the pieces tight together for a couple minutes.
To hold the pieces together use rubber bands.
Last but not least the bottom of the crate. Simply glue it on and put the rubber bands around it to dry.
And done!
The wooden crates are great as a candle holder.
or to use as a straw or napkin holder.
I hope to see you again soon.
Follow me:
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/35252 |
What Can The Dermaplaning Treatment Do For You?
Dermaplaning Skin Rejuvenation Treatment offered at K2 Restorative Medicine in Trussville, Alabama
The Skin Rejuvenation Treatment Everyone Talks About
You have probably heard of “Dermaplaning” before, or have seen videos on it, but if you’re still in the “wait, what is that?” stage, here’s the breakdown about it. Dermaplaning is an exfoliating treatment offered at our Med-Spa in Trussville, Alabama. Essentially, the treatment involves using a sterile, surgical-grade scalpel to carefully shave, or scrape, the top-most layer of skin and fine hairs from the face.
The concept can sound terrifying, but for many, it’s the secret to clear, even, baby smooth and hair-free skin. Dermaplaning also helps give you a smooth foundation application, all without having to use harsh exfoliators.
The results can vary, but realistically, you can expect to experience smoother skin, no peach fuzz, and brighter-looking skin. Also, because Dr. Kulback is removing dead skin cells, your skincare products will better penetrate your skin when you apply them, making them all the more effective. Let us not forget to mention that this treatment is affordable, quick, requires no downtime. (Treatment cost is no more than $100 on average)
Top Benefits of Dermaplaning:
1. Smoother Skin
2. Brighter Skin
3. Fewer Breakouts
4. Easier Makeup Application
5. Better Absorption of Skin Care Products & Dermalinfusion Treatments
Is Dermaplaning Right for You?
Dermaplaning can beperformed on any skin type,except for those with medical indications that prohibit scraping of the skin. And there’s zero truth to the idea that shaving makes hair grow back darker and coarser.
What should you do post-treatment?
Eliminating dead skin cells, pollution buildup and downy hair don’t simply create a better base for makeup, it also allows skincare products to sink in more effectively. For the week or so after treatment (by our esthetician Jackie P.) at K2 Restorative Medicine & Med-Spa, your skin will be particularly receptive to anything that you apply, so take advantage and slather on hydrating serums followed by a moisturizer. As with any resurfacing treatment, the skin will be more at risk from UV in the sun, so ensure it’s protected with a good SPF. If you want a deeper exfoliation, follow with a light, acid-based peel, or HydraFacial
Dermaplaning The HydraFacial is perfect to pair with injectables and other nonsurgical or minimally invasive procedures.
Benefits of Dermaplaning Q & A
Q.How often can I have this treatment?
A. We recommend once per month
Q. Does the hair grow back thicker?
A. No Dermaplaning does not cause your hair to grow back thicker
Q. Does this treatment require me to avoid the sun?
A. No, but your skin will be slightly irritated and red immediately after so, you should wear sunscreen daily to avoid getting sunburned.
Q. Does the treatment cause breakouts?
A. No, the treatment usually reduces breakouts. Remember, Dermaplaning removes dead skin cells that can clog pores and be the culprit of breakouts.
Q. How much does it cost?
A. Dermaplaning can cost anywhere between $100-$150 in the Birmingham and surrounding area. The cost goes up depending on if you decide to add a mask or you couple the treatment with a custom facial.
Q. Can anyone have this treatment?
A. Unless there is a medical reason, yes. Dermaplaning is a noninvasive skin treatment that does not damage the deeper layers of the skin. It merely removes peach fuzz and dead skin cells.
Q. Can I have this treatment during any season?
A. Yes, you can have this treatment any time and should commit to having it on a monthly basis if possible.
Book Your Appointment Today
Close Menu |
global_01_local_0_shard_00002368_processed.jsonl/35255 | Office 365 - Importing Contacts into Windows Live Mail
This document describes how to import Office 365 contacts into a Windows Live Mail account.
1. Click Contacts in the lower left.
2. Go to Manage and click Import.
Go to Manage and click Import.
3. Click Browse and choose the .csv file that you exported from Office 365 (see Outlook 2010 for Windows - Exporting your Address Book(s) / Contacts).
4. Click Import contacts.
Click Import contacts.
5. You have now imported your contacts into Windows Live Mail.
Your contacts have been added. |
global_01_local_0_shard_00002368_processed.jsonl/35266 | Baltimore Kinetic Sculpture Race Logo
Spectator’s Guide
Join the List!
Official Rules
How To Build
Race Photos
2018 2009
2017 2008
2016 2007
2015 2006
2014 2005
2013 2004
2012 2003
2011 2002
2010 2001
2018 Pilgrimage
2005 Pilgrimage
2004 Pilgrimage
Baltimore Kinetic Sculpture Race
2010 Race Report: AVAM’s Fifi Joins the Circus, Bumpo the Circus Elephant, Circus Rat, and Frog
Here's a Sculpture!
< Previous Page Next Page >
The American Visionary Art Museum, as sponsor of the race, also produces a set of animal entries as Kinetic Inspiration. This year, three of AVAM’s four sculptures shared a novel theme: joining the circus.
Fifi Joins the Circus had a clown hat, clown nose, and bow tie, and radiated pink glee.
After a dramatic splash into the water, her pilots’ spatted high-heel boots plunged into the harbor with every revolution of the pedals.
Her pit crew also had thematic costumes, including a strong man who was helpful at getting her through the viscous mud. Nonetheless, Fifi lagged behind other entries enough that she won the Next to Last award. (Anybody can be last, but it takes a bit more effort to be next-to-last.)
We also direct your attention to the gentleman who appears to be hanging off Fifi’s nose.
Bumpo the Circus Elephant had Anemone Antics in hot pursuit through the wild pastures of Patterson Park.
Bumpo was supported by a crew of muscular circus acrobats who performed crowd-pleasing gymnastics on the pier. Bumpo wore a tasseled fez, fringed umbrella, and stripped banners.
Circus Rat also wore a festive hat and its crew wore matching tasseled fezzes.
The Rat’s banner bears the insignia of the “Ratline Brothers Bubonic & Scaley Flea Circus”.
In the background as the Rat team rushes to get through the mud, you can see Chessie, the Moderately Famished Caterpillar, Twitter Jay, and Fifi all catching up.
The Frog looked exactly the same as it has every year since 2002.
Perhaps in despair, the Frog took a nose-dive into the harbor immediately after entering the water. A few minutes later, as it was coming in for landing, it took another nose dive.
Finally, somewhere between the water entry and Patterson Park, the Frog lost its right eye in some sort of gruesome accident.
< Previous Page All Pages At Once (huge!)
Next Page >
Want to See the Next Race?
Were you in the race?
Please click here for more information just for racers.
1. Champion Candy Haus
2. Go Ask Alice
3. Los Baltimuertos
4. Chessie
5. Anemone Antics
7. Heavy Metal
8. The Creature from the Landsdowne Lagoon
9. The Moderately Famished Caterpillar
1. Going to Hell
2. Safari Attack
3. Scrum Roll Racer
4. Mobile Media
6. T-Wrecks
7. Got Milk
8. Carver Cobra II
1. Twitter Jay & the Recyclists
2. Big Bamboo
4. The Boatercycle
5. Volunteers
6. Spectators
7. The Team
1/22/2020 6:10:16 AM 1:25 2:2 3:1 4:2 5:2 6:1 7:1 8:2 9:3 10:2 11:1 12:2 13:1 14:1 15:3 16:1 17:1 18:2 19:2 20:2 21:1 22:1 23:1 24:2 AllInOne:2 |
global_01_local_0_shard_00002368_processed.jsonl/35289 | The Man Who Can’t Die
The Man Who Can’t Die
75,00 DKK
Forfatter: Frankel, Jon
The Man Who Can't Die. A literary sci fi novel set in the squalid New York of 2180, in a Manhattan cut with sewage-filled canals and walled in by levees. The world has been suffering from epidemic despair and apathy, so when Dr. Ruth Bryson invents Paragane, a Euphoric drug that cures ennui and depression, Monozone Inc, the monopolistic pharmaceutical who employs her, is thrilled. There is only one problem: the drug kills 10% of everyone who takes it. Monozone decides to market it anyway, despite Bryson’s objections, and puts her former lover Owen Bradlee in charge. Bryson knows she must either fix Paregane or stop it, but if she is caught she will certainly be killed. Meanwhile, Felix and Veronica Clay are typical pod-dwelling office workers, whose lives seem like an endless extenuation of meaningless circumstance. When Veronica plunges into psychosis and tries to kill herself, her doctor prescribes the new drug Paregane, and everything changes. Soon Felix is also taking the drug, and they spend their nights under its influence, roaming Paradise and conversing with Angels. One day Felix returns from work to discover her dead, of no apparent cause. In short order, he loses his job and apartment and soon finds himself living in the wilds of upper Manhattan, addicted to Paregane, unable to find Veronica in Paradise, unable to die. Meanwhile, Dr. Bryson searches for a test subject. When she discovers Felix, they are set on a course that will lead them deep into the Iroquois territories of upstate New York and a bloody struggle for survival. Signed copy. In good condition.
Læderstræde 9, kld., 1210 København K
Whiskey Tit, 2016. 604 pp. Softbinding.
1 på lager
Varenummer (SKU): 606236 Kategorier: , ,
Comments are closed.
Tilmeld dig vores nyhedsbrev
Tilmeld dig og få information omkring vores nyheder her på webshoppen samt gode tilbud og rådgivning til at opnå de bedste læseoplevelser. |
global_01_local_0_shard_00002368_processed.jsonl/35304 | Request Personal Data
You can request your personal data by filling this form.
I also consent to having FRONTELO collect my email so that they can send me my requested info. For more info check our privacy policy where you'll get more info on where, how and why we store your data.
Join FRONTELO and become part of the Making Colour Happen concept!
No spam, just a whole load of colourful boldness! |
global_01_local_0_shard_00002368_processed.jsonl/35313 | Life, Liberty, and the Pursuit of Yachtiness
Posts tagged “magic
David Cop-a-feel
So, apparently he can’t really make magic happen. As if we already didn’t think magicians were creepy enough, David Copperfield had to go and rape a chick. Congrats, you’re the richest man ever to not be able to get laid.
David Copperfield met a girl while doing a show in Washington state, and invited the poor girl to his private $50 million dollar island to a promotional event that could lead to “modeling opportunities”. I have to say, most girls I know would’ve noticed the transparent desperation in such an invitation from a 52 year old man, but they all can’t be geniuses can they? She accepted the invitation and much to her surprise, she arrived on the island to find that it was only Copperfield there?!?
Come on, man. You’re a fucking magician. At least have some fire breathers in the front yard or some elephants walking around to distract the girl from the obvious. Maybe just hire some locals to hang out in the lawn and act like you have friends? I don’t know, but I do know that if I asked some chick to come to a promotional event, and she showed up to an empty island, the alarm bells would probably start ringing. Apparently, she tried to call her boyfriend once she realized what the business was, and the magician pulled a Ben Stiller from “Happy Gilmore” and told her that if she called anyone, that he would murder her. David even went as far as making her go under water naked in the ocean and when she surfaced, he told her that’s where she would stay if she told anyone??? WTF is wrong with you, Magic Man. Not legit. I do question the decision making ability of a girl that goes to magic shows at the age of 22, but that’s besides the point.
The point is that David Copperfield had to threaten this young girls life and assault her in order for her to have sex with him. Honestly? How weak is your game Coppafeel? You own a private island. You’re the most famous magician since Harry Houdini. You’re a good looking guy for your age. Your ex-wife is Claudia Schiffer. You can make people fucking disappear, but you can’t find a girl that will have consensual sex with you?!? That sauce is most certainly weak you creepy fuck.
Good luck making this one disappear, David. I wonder how long it will take you to break out of the shackles and chains that you’re about to be in? My guess is about 5-10 years. |
global_01_local_0_shard_00002368_processed.jsonl/35343 |
What does \"accessibility support\" mean?
Date: Fri, 29 Jun 2007 16:44:58 +0000 (GMT)
To: [email protected]
Message-Id: <[email protected]>
Name: Takayuki Watanabe, Masahiro Umegaki, Makoto Ueki
Email: [email protected]
Affiliation: JIS Working Group(JSA INSTAC)
Document: UW
Item Number: Understanding Conformance
Part of Item: Intent
Comment Type: question
Summary of Issue: What does \"accessibility support\" mean?
Comment (Including rationale for any proposed change):
In the \"Note 2\" within the section of \"Understanding Accessibility Support\", it reads \"When a Web Technology is \"accessibility supported,\" it does not imply that the entire technology must be supported. Most technologies lack support for at least one feature. When referring to \"accessibility support\" for a technology, the support for specific aspects, features, and extensions should be cited if the technology as a whole is not accessibility supported. \"
We couldn\'t understand what WCAG WG want to mean by this. It can also be read as \"if the one of the features for a technology is supported by a assistive technology, the technology can be recognized as accessibility supported\". It could lead many conformant websites to be inaccessible in the reality.
Proposed Change:
Add more understandable clarification.
Received on Friday, 29 June 2007 16:45:01 UTC
This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 19:14:44 UTC |
global_01_local_0_shard_00002368_processed.jsonl/35346 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://liveatnoveno.com/noveno-breaks-ground/20%Monthly2018-06-28 19:15
https://liveatnoveno.com/noveno-set-break-ground-september-21-2017/20%Monthly2017-09-18 20:17 |
global_01_local_0_shard_00002368_processed.jsonl/35369 | Best of 2019 Tutorials
Another year has flown by, and it’s time to list my best of 2019 tutorials. In case you missed any of them, I’ve included links to tutorials above the pictures. You also can find all of my tutorials under the Tutorials tab at the top of this page.
Read More |
global_01_local_0_shard_00002368_processed.jsonl/35370 | Open main menu
Bulbanews β
Silhouettes revealed to be Rotom forms
7 bytes removed, 16:01, 11 September 2008
no edit summary
sourcelink=User:Trainer-c |
tagline=New types based on appliances |
blurb=Several retailers have shipped Pokémon Platinum before its Saturday release date, and game leaflets reveal the latest silhouettes to be alternate forms of {{bp|Rotom}}. These forms are obtained by using the event-exclusive Secret Key item, which will be distributed in Japan via Wi-Fi and retail stores beginning September 28. Rotom will transform into one of five forms depending on where the player uses the item.}}
{{CategorizeIn|New Pokémon|9|08}} |
global_01_local_0_shard_00002368_processed.jsonl/35376 | Can Humans Get Tapeworms From Cats?
Image via Komekbayeva
By Dr. Sandra Mitchell, DVM
“What is that white, wiggling grain of rice under my cat’s tail? How disgusting!”
This is something we hear very commonly from pet owners. Most likely, the white, maggot-like parasite is actually a tapeworm segment. Sometimes they are still moving and crawling through the fur, and other times, they are just dried-up white splotches that you find on your kitty or where she has been sleeping.
How common are tapeworms in cats? And can humans get tapeworms from cats?
Tapeworms in cats are very common, and the good news is that for the most part, it’s a fairly minor problem which is easily addressed.
Types of Tapeworms in Cats
Please be aware that there are two different types of tapeworms found in cats.
The most common tapeworm is called Dipylidium caninum. These are easy-to-treat tapeworms in cats, and they are not contagious to humans.
Dipylidium is something veterinarians see every day. These worms can be very long—up to 20 inches! They are flat with mouthparts that can attach to the lining of a cat’s intestine, where they feed.
When these worms are mature, they drop small segments (called proglottids), which then pass through the intestinal tract into the feces. These are the wiggling white pieces that you might find on the cat’s anal area or bed.
As gross as these worms are, fortunately, they rarely cause any significant harm to your kitty. However, the sight of a long, flat worm is certainly enough to turn the stomach of most cat owners!
A second form of tapeworm that can be seen in cats in some parts of the US, although very rarely, is called Echinococcus.
This form of tapeworm can be contagious to humans and is considered to be dangerous, but it is extremely uncommon. You can discuss with your veterinarian whether this form of tapeworm is of concern where you live—but keep in mind that it is very rare.
How Did My Cat Get Tapeworms?
So how do cats get these lovely parasites? There are two main modes of transmission. The first, and most common, is through fleas. If the cat swallows a flea infested with a “baby tapeworm” while grooming, that worm will mature within the intestinal cat of the track with time.
The other common way a cat becomes infected is through hunting small mammals such as mice. Once again, when the worm is in the intestinal tract, it can mature and infect kitty with the parasite.
How Do You Diagnose Tapeworms in Cats?
How do you know if your cat has tapeworms? The most common way that owners discover tapeworms is by finding the segments on the cat or on the cat’s bedding. Sometimes, it is possible to find a long, flat worm that has been vomited.
Often, your veterinarian might find the eggs of the tapeworm in your cat’s feces during a fecal exam, although the eggs are so large that sometimes they do not show up well under the microscope. If your kitty has fleas, it is likely a safe assumption that other friends—aka tapeworms—are along for the ride as well. And if your cat hunts a lot, she likewise also has tapeworms.
How to Prevent Your Cat From Getting Tapeworms
So what do we do about these disgusting parasites? The best thing to do overall is to prevent kitty from becoming infested—which means using a high-quality prescription flea and tick medicine every single month, whether kitty goes outside or not, since fleas can hitchhike into the house on humans and clothing.
There are many good flea products on the market, but not all are safe for cats, so be sure to ask your veterinarian what is appropriate for your pet. Common flea medicine for cats includes Revolution, Advantage II, Vectra and Frontline. These are best used year-round, even in cold climates.
Another important step in preventing tapeworms is to keep your cat from hunting. Keeping cats inside the house and maintaining appropriate rodent control will help make sure that your kitty doesn’t have an unauthorized rodent “snack” that brings the parasite along with it.
How to Treat Tapeworm in Cats
So how do we actually treat tapeworms in cats? There are several types of deworming medicine for cats that are very effective in getting rid of tapeworms. Many can be given orally, although some are given by injection.
Most require at least two doses to be effective, and remember, as soon as kitty hunts again, the parasites will be right back. Also, if you are not controlling a flea problem in the house, the tapeworms will be back.
Remember to treat ALL of the animals living in the house—including exotic pets like ferrets, guinea pigs and rabbits, as well as dogs and cats! As a rule, if there are fleas in the house, all dogs and cats in the house will need to be treated for tapeworms, even if they aren’t showing signs of infection.
As disgusting as tapeworms are, the vast majority of them are not contagious to people and do not cause any significant problems to cats. They are generally symptoms of a larger problem, such as a flea infestation or hunting small mammals that are able to transmit other, more significant, parasites.
Working with your veterinarian, you should be able to quickly resolve the problem for both you and your kitty—before you step on a hairball loaded with 20 inches of wiggling worm! |
global_01_local_0_shard_00002368_processed.jsonl/35420 | See Rousseau for other articles with titles that contain, either by relationship or by coincidence, this character's surname.
Mark Rousseau was a Human childhood friend of Leonard McCoy. The two met on Earth when Mark was eleven and Leonard was nine. McCoy would later describe him as a man who easily learned everything and excelled at whatever he chose. When Rousseau became a captain in Starfleet, he appointed Leonard McCoy as his chief medical officer.
Erica Rousseau was his wife, and they had one son named Christopher.
When his ship, the USS Richard Feynman, went to the planet Nova Empyrea, Rousseau had an affair with Elizabeth March. Rousseau later met their daughter, Anna March, in 2275.
In 2255, he took command of the USS Manhattan. One year later, he was on to command the USS Hood followed by the USS Lexington in 2261. In 2264, Rousseau retired from Starfleet.
In 2275, Rousseau was the Federation ambassador for Starbase 86 when he was called back to Nova Empyrea to negotiate with the locals. (TOS novel: The Better Man)
This article or section is incomplete
Template:USS Richard Feynman personnel
USS Hood personnel
USS Lexington personnel
USS Lexington (NCC-14427) Declan KeoghManojlovichRosita Pérez
USS Lexington (Steamrunner-class) A. Jago |
global_01_local_0_shard_00002368_processed.jsonl/35431 | norfloxacin tinidazole side effects rating
4-5 stars based on 25 reviews
Married andactive participant in family functions on many week-ends. The beetle was hardat work trying to roll home a great ball of dung it had been collect-ing all morning; but Doss broke the ball, and ate the beetle’s hindlegs, and then bit off its head. The effectiveness of anti-A? antibodies toreduce behavioral deficits in non-plaque-bearing trans-genic mice may vary norfloxacin tinidazole side effects depending on the species of A? towhich the antibody binds, the A? epitope to which theantibody is directed, and the sequence and structureof the antibody (Basi et al., 2010). Though itcrosses meninges, it is largely pumped out fromCNS by P-glycoprotein
Though itcrosses meninges, it is largely pumped out fromCNS by P-glycoprotein.
(1985) EEG sleepin elderly depressed tinidazole tablets demented, and healthy subjects.
Lymphocyteproliferation, antibody production and CMI areinhibited. This is neces-sary to verify that the data are reliable and accurate. In patients undergoing bone surgery (n=9) or decubitus ulcer debridement(n=12) the bone-to-serum concentration ratios were 0.36 for cortical (n=6) and0.85±0.40 for cancellous (n=14) bone [16].
You’d be surprised at how complicateda fracture can be. Microcytic hypochromic anemia (low MCV < 76 fl, low MCHC < 30 g/dL).3
Microcytic hypochromic anemia (low MCV < 76 fl, low MCHC < 30 g/dL).3. Spe-cific symptoms and behavioral patterns of patients withLBD vary; however norfloxacin tinidazole side effects the core features include progressivedementia, but with fluctuating cognition with variationsin attention and alertness, recurrent visual hallucinations,and motor symptoms similar to PD (McKeith et al., 2005).These patients may tend to be quite reactive to medica-tions, particularly antipsychotic medications, but alsoincluding L-dopa. Most practitioners use disposable needles norfloxacin tinidazole side effects and some use electri-cal and laser acupuncture, which avoids needles. In January 2004, in response to the threat of a new outbreak,Guangzhou officials ordered exterminators to sweep clean the city’s streets,focusing especially on rats, cockroaches, flies, and mosquitoes. Examples of other CNS pathology that mayincrease a patient’s baseline vulnerability include hyper-tensive encephalopathy norfloxacin tinidazole side effects intracranial hemorrhage, masslesions, infection, vasculitis, and seizure (see Tables 19.1and 19.2). Inthe polarographic method, a Clark electrode is used to measure oxygen content
Inthe polarographic method, a Clark electrode is used to measure oxygen content. Baker SJ, Markowitz S, Fearon ER, Willson JK, Vogelstein B (1990) Suppression of humancolorectal carcinoma cell growth by wild-type p53. The magnitude of individual lipid and lipoproteinresponses may be influenced by the severity and type of underlyinglipid abnormality.68 In a dose-escalation study, ER formulationof niacin with monthly 500 mg increases in dose, there wereincremental changes in LDL, HDL, and triglycerides in the doserange of 0.5–2 g daily69 (Table 10).
However,this lay view is now being undermined by major scandals about respectable professions.
The ileal branch of theileocolic artery travels parallel to and approximately 3 to 4 cm from the serosal surface ofthe ileum.
Excellent long-term reproducibility of theelectrophysiologic efficacy of quinidine in patients with idiopathic ventricularfibrillation and Brugada syndrome.
Mir R et al (2013) Mdm2 antagonists induce apoptosis and synergize with cisplatin overcom-ing chemoresistance in TP53 wild-type ovarian cancer cells. Large size norfloxacin tinidazole side effects multiplicity, extensive in? ltration, teth-ering, and encasement of small- bowel loops are poor prog-nostic CT ?ndings (Levy et al. Selected participants who agreed to take part in the studyattended a clinic for various assessments (e.g. Ileal pouch-anal anastomoses complications andfunction in 1005 patients. It contains the trachealis muscleand numerous seromucousglands. ( a – d) Transverse CTimages of the sigmoid colon show segmental mural thickening withintense in?ammatory soft tissue ( asterisks) and fat stranding in the peri-colic area and mesentery and complicated ascites ( long arrow ).
In addition,as regional differences might mitigate the findingsfrom this study, the results could not be generalizedto all African American children in Head Start pro-grams.
is tinidazole over the counter
buy tinidazole tablets
buy tinidazole online
OK. This is about this: Listening, truly listening, to the very last thought, the very last word, a person says before forming a response. Most of us, sorry….. ALL of us…. begin thinking of the response we are going to have to what someone is saying to us during the sentence the person is uttering to us. Half way through…
tinidazole over the counter
As thorough as the left critical brain seems to be and as much as it is busy thinking and measuring all of the time, this adult, sensible part of the brain is also quite lazy. In its measurement, this side will take the path of least resistance in order to quickly assess a situation or circumstance, so that it can…
tinidazole over the counter walmart
I’m going to create a metaphor for creative behavior using a scientific principle. I’m doing it because the comparison helps illustrate the behavior, and because I really like it. The concept is called the Heisenberg Uncertainty Principle. I know, relax. Werner Heisenberg was a physicist in the 1920’s through 60’s.He noticed that when you observe a particle (stay with me…
cheap Tinidazole
It’s no small feat to innovate. To create. To get yourself into the mind-set of that kind of thinking, that kind of play. I think it is especially difficult for the average citizen, particularly in business or science or academics, to create, to play. Much of the time these types are about importance and seriousness. To switch into that creative mode, that reckless disorder that is play, is not only extremely confronting, but downright hard. |
global_01_local_0_shard_00002368_processed.jsonl/35435 | A marketing primer for Indians
Are you currently interested in marketing products? Then this primer is for you.
You may enjoy marketing products that customers are already interested in. You may have done your homework and identified the need for a product. Marketing a product in which there customer interest is fine, but where is the challenge? The real challenge is in creating customer interest where there is none. Often, the key is to fabricate a need that the customer is comfortable with. In this way it becomes possible to market unnecessary products, old products packaged as new products, and inferior products as things to be desired.
1) Repurposing an existing product:
This one takes a bit of creativity, but that is part of the game, isn’t it? Take for example chewable antacid tablets. The cheapest antacids consist of calcium carbonate, essentially the same compound present in limestone. From high school chemistry, you know that calcium carbonate reacts with hydrochloric acid to give out calcium chloride, carbon dioxide, and water. It is a cheap and effective way to neutralize acid in the stomach. But marketing an antacid as only an antacid doesn’t give you a marketing edge. You need to sell it as something else.
The easy way to repurpose an calcium carbonate antacid is to market it as an effective source of dietary calcium. Now, you’ve got two uses for the same product, when there was essentially one. You’ve created a new market with your existing product.
2) Creating a market for an inferior product:
Suppose your company is in the business of making plastic straws. What happens if your manufacturing department messes up the specifications for the straws. You could throw them out and start over again. Or if you’re good at marketing, then you could try to sell them as inexpensive disposable stirrers for coffee and tea. You’ve taken the initiative and marketed an inferior product as something that it was not originally meant to be used for.
Let me give you another example. Desi dairymen are notorious for adding water to milk, or rather milk to water before distributing to customers. When confronted with the truth, they usually protest or blame it on ‘the rains’. That is the wrong business model, since it puts the business on the defensive. A way to create a market for milky water is to market it as “diet milk” to appeal to an affluent, health and weight-conscious segment of the market. Don’t laugh it off. These tricks work. How many people actually have the capability to make informed decisions about what they purchase?
3) Creating a market for an unnecessary product:
It is one thing to create a market for an unknown, product for which there is a tangible need. It is completely another to fabricate a need. Fabricating needs are deceptively easy. A celebrated example is the amplifier knob in This is Spinal Tap that goes up to eleven instead of the standard calibration based on the ten system. Think about it: do you really need ten devices that perform redundant functions? Sure, you do, because the advertisement tells you so. The used-car salesman uses knowledge of psychology to pitch unnecessary products to great effect, but you can train yourself in this art too.
A good way to market an unnecessary product is to point out the inferiority of an existing one with which the customer is familiar. Say for example, you want to market the edible flesh of sea scallops to vegetarians. How would you go about it? One way would be to create an image of scallops as a “new and improved” version of something the vegetarian customer is familiar with. You could go about by saying that scallops are the milder, more flavorful version of radishes or that they are the diced potatoes of the sea. By building a bridge to something the customer is familiar with, you’ve taken a first step in passing off an unnecessary product as something that is an improvement.
Here, I’ve given you three challenging scenarios, but this list isn’t exhaustive. You may call this sort of marketing deceitful, but I call it creative. It is also more common than you think. One day, I believe that the Great Indian Civil War will start over the eternal chakri versus murukku question: essentially a pointless debate over one snack-food called two different names by people from different parts of India. If people can do it to themselves, corporations have every right to do it to them too. After all corporations are people too.
And if you’re still confused, answer this question: why is selling a whole-wheat Mexican tortilla as a desi chapati wrong if you can satisfy the customer? They both taste equally disgusting out of the plastic wrapper.
© Text, 2010-2012, Anirban
15 thoughts on “A marketing primer for Indians
1. Sadly, this is exactly what I do for a living. But it pays for my toilet cleaner, which also occasionally doubles up as a carbonated ingredient in cocktails 🙂
2. You know what… got reminded of that movie Rocket Singh The Best Salesman of The year…where the chappie passed the acid test on pencils by saying…”you can scratch your back with this too.”
Marketing is…when u try to sell ice to an eskimo someone said and through your post it comes alive.
Thanks enjoyed this one too.
Wonder if this comes as a stroke of genius because i feel the milkmen never went to MBA schools but have been successfully selling ‘Diet Milk’ much to the chagrin of the ladies who neither have the patience nor the eent ka jawaab patther se phrases to deal with them except, killing glances and silent curses.
Don’t waste ur time on that other movie… i saw it mainly for Ranbir Kapoor.Oh Gawd!!
1. Shivani, I’ve actually seen that movie.
It wasn’t too boring while I watched it. Some of the characters were funny though the plot was kinda absurd.
3. I was confused of what stream to choose when i land up in MBA but now i would chooe markketing, armed with this secret weapon 😉
Love the way you present it…YOu are on a roll, mann
1. Lets c what will be my stream when i get into MBA eventually…No idea wat it would be..Yeah Ambition less aim less i am 🙂
4. I don’t think this is so much a marketing primer for Indians as it is a marketing primer in general. 😛
Your guiding principles are applicable everywhere, and I think it is the job that marketers are meant to do, and do well. 😛
5. This one reminds me of your ‘original’ question: how many blades make a perfect shaving razor?
The answer could have been ‘five’.
But now we know that thickness of the blades is a hugely important thing. So, as of now, ‘the answer’ is “five thin blades that make you feel the razor is gliding on your cheek”
Thanks to our good friends in Gillette. They have managed to reduce the thickness of the blades by 3.047%, all for the sake of our shaving comfort!
You’re very correct on the diet milk thingy. Now we even have diet fruit juice – “with less carb and less sugar”, or put in other words, “with more water”
1. Thanks. Not only is there diet fruit juice but the flavored water sector seems to be a huge sector too. People are buying into it. Back in the old days, we had concentrated Rooh-Afza and Kissan Orange Squash which we could dilute and use. Now the companies are doing it for us and charging much more.
Take care.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/35444 | Ending the Fossil Fuel Era
Ending the Fossil Fuel Era
Edited by Thomas Princen, Jack P. Manno and Pamela L. Martin
A provocative call for delegitimizing fossil fuels rather than accommodating them, accompanied by case studies from Ecuador to Appalachia and from Germany to Norway.
Hardcover $56.00 S £46.00
Paperback $30.00 S £25.00
Not so long ago, people North and South had little reason to believe that wealth from oil, gas, and coal brought anything but great prosperity. But the presumption of net benefits from fossil fuels is eroding as widening circles of people rich and poor experience the downside.
A positive transition to a post-fossil fuel era cannot wait for global agreement, a swap-in of renewables, a miracle technology, a carbon market, or lifestyle change. This book shows that it is now possible to take the first step toward the post-fossil fuel era, by resisting the slow violence of extreme extraction and combustion, exiting the industry, and imagining a good life after fossil fuels. It shows how an environmental politics of transition might occur, arguing for going to the source rather than managing byproducts, for delegitimizing fossil fuels rather than accommodating them, for engaging a politics of deliberately choosing a post-fossil fuel world.
Six case studies reveal how individuals, groups, communities, and an entire country have taken first steps out of the fossil fuel era, with experiments that range from leaving oil under the Amazon to ending mountaintop removal in Appalachia.
Out of Print ISBN: 9780262028806 392 pp. | 6 in x 9 in 8 figures
$30.00 S | £25.00 ISBN: 9780262527330 392 pp. | 6 in x 9 in 8 figures
Thomas Princen
Thomas Princen explores ecological and economic sustainability at the University of Michigan. He is the author of Treading Softly: Paths to Ecological Order and The Logic of Sufficiency (both published by the MIT Press).
Jack P. Manno
Jack P. Manno writes about sustainability, ecological economics, and indigenous values at SUNY College of Environmental Science and Forestry. He is the author of Privileged Goods: Commoditization and Its Impacts on Environment and Society.
Pamela L. Martin
Pamela L. Martin examines issues of sustainability, energy, and rights at Coastal Carolina University. She is the author of Oil in the Soil: The Politics of Paying to Preserve the Amazon and coauthor of An Introduction to World Politics: Conflict and Consensus on a Small Planet.
• Ending the Fossil Fuel Era is an urgent, timely, and brilliant book. From Appalachia to the Amazon, from Australia to Germany, the authors capture the transnational spirit of resistance to the violence and the dead-endedness of extreme extraction. If you believe we need to make the bold imaginative, ethical, technological, and political transition to a more just and biophysically sustainable planet, this book is indispensable reading.
Rob Nixon
author of Slow Violence and the Environmentalism of the Poor
• Combining their own substantial work with that of colleagues, the author-editors present a broad and insightful analysis of the necessity and difficulty of winding down the fossil era. Highly recommended.
Herman E. Daly
Professor Emeritus, School of Public Policy, University of Maryland
• Princen, Manno, and Martin have done the nearly impossible job of acknowledging the reality of climate change while still leaving readers with hope. Rather than dismissing the resistance to new fossil fuel exploration popping up around the world, they provide frontline reports and analyses of the Keep It in the Ground movement that offer a way forward.
Annie Leonard
Executive Director, Greenpeace US, and author of The Story of Stuff
• Choice Outstanding Academic Title, 2015 |
global_01_local_0_shard_00002368_processed.jsonl/35478 |
Gelukkig Nieuwjaar! (Happy New Year!)
As we hopefully spend time with family, friends, and other loved ones today, I just want to say to all my followers “Gelukkige Dankviering”, which translate from Dutch as “Happy Celebration of Thanks”. May you have many reasons to give thanks this holiday season.
When it came time to choose a name for our anticipated new family member, we purchased one of those popular baby naming books without a thought to any family names. Starting at the beginning of the alphabet, we jotted down several names that appealed to us, either because it was unique, sounded good with our surname, or seemed to lend itself to character. For a boy, a passing thought was given to naming him after my husband, but was quickly dismissed in favor of other choices.
Unlike our parents who chose to honor a special relative as our middle given names, we had no intention of following suit. Our generation’s goal seemed intent on making sure our children were unique.
But for my father and his siblings, as his parents before him, a name was not just name as much as a tradition. The Dutch have long named their offspring after other family members – grandparents, aunts and uncles. Therefore, given names were passed down for generations. This chain was broken as our emigrant families assimilated more into their new culture in Detroit, and particularly after their offspring married non-Dutch descendants. A few names have survived the times even here in America (although now Americanized with English spellings), but most have been overlooked for names more popular during the decade of the time of birth. Maybe if we had known more about our own family’s history, the names Neil (Cornelis), Helen (Helena), Nellie (Neeltje), Lena (Lijntje), Adriana (Adrianntje), Mamie (Maaike) and Arie may have still existed in our family trees today, not just the Johns (Johannes & Jan), Peters (Pieter), and Henrys (Hendrik).
It is believed that the habit of the Dutch of naming newborns after another family member originated out of superstition that the name in some way contributed to some form of reincarnation of the person the child was named after, who was usually much older. Over time the superstition disappeared, but by the early Modern Age (1500s to 1800s), the practice had become so standard that the names of the children were practically known at the marriage of their parents. The pattern of naming children usually was:
1. The first son was named after the paternal grandfather. The first daughter was named after the maternal grandmother.
2. The second child’s name depended on whether the first-born child was a boy or girl. If the first-born child had been a boy, then the second child would be named after its mother’s family, and after its father’s family if the first-born had been a girl.
3. The third and fourth-born children would usually be named after the grandparents who did not yet have a grandchild named after them.
4. If the grandparents already had grandchildren named after them, the children would be named after their uncles and aunts, starting with the father’s family.
5. If a child died, the next born child would receive the same name.
While researching my father’s family tree, I noticed these naming patterns were still closely followed in the 1800s, especially the last one. My great-grandfather Smouter was not the first son named Arie, a sibling with the same name had died in infancy 3 years prior, and Arie Smouter’s own second born daughter, Lijntje, would die as an infant, only to have the third born child then given the same name. To confuse matters even more, siblings would each choose to name their offspring after the same relatives. I discovered that my great-grandfather, John Reyst, and his brothers each had offsprings named Cornelius and Henry, and my grandfather, Cornelius Reyst, and great-uncle, Peter Reyst, would both name their daughters, Helen, just 2 years apart.
Unlike our modern naming practice that consists usually of a first and middle name, a Dutch child may have only one given name (as my grandfather who has no middle name) or up to five given names. I have not seen five in my family tree on both the paternal and maternal sides, but there are several with 3 given names. But the pattern is inconsistent within a family. One child may have no middle name, another 2 given names, and still another with 3.
Also, Dutch names are gender specific. So if the grandparent (as in our lineage) was Cornelis, a son would have been named Cornelis and a daughter Cornelia. Other examples of this naming method in our lineage were the names Jacob (Jacobus and Jacoba) and Peter (Pieter and Pieternella).
As to my father’s unusual given name, Arie, I discovered it has been a family name for generations. I was able to trace it back to 1731. It was a family name rooted in both sides of his maternal grandfather, Arie Smouter (from Arie’s father, Bastiaan Smouter, and his mother, Neeltje Klootwijk). His middle name Russell, however, has no history within his Dutch lineage on either his father’s or mother’s side, and demonstrates the transition of my ancestors to life in America.
With the onset of World War I, many Dutch emigrants moved more and more away from their homeland traditions when naming their offspring to distance themselves from their Germanic roots. An example is my father’s younger sister who was named Geraldine, the first in our immediate family to not be named after an older relative.
So maybe with this new-found information on our family roots, some generation old names may one day reappear in honor of those long past.
When I first starting researching my father’s family I hit a blank wall. I had even tried searching the name in the Dutch online database, Genlias, without success. Then through searches on Google and Ancestry, I verified my suspicion that our family surname had been changed to Reyst once my great-grandfather and his family arrived in the United States.
Our real Dutch family surname is Reijst, and generations before my great-grandfather it was Rijst. A quick study of the Dutch alphabet revealed that although “y” does exist in the Dutch language it is seldom used as a vowel, and was not even used in older records. Instead the digraph (a pair of characters written to represent one sound) “ij” is considered a single letter in the Dutch language and represents the sixth vowel. Often writers failed to dot the i and j, so written in cursive it looked like a “y”. This explains why on the Obdam manifest, the surname appears to be Reyst, whereas the first US Census record of 1900 that my great-grandfather participated in lists his surname as Reijst. Between 1890 and 1900, my great-grandfather used both variations of the surname, but thereafter the family’s surname was identified as Reyst.
So why the change in spelling? It likely has a lot to do with where my great-grandparents chose to settle down once arriving in the United States. Many Dutch immigrants settled in Michigan from 1840 to 1900, especially on the western side of the state around Grand Rapids. Many of the Dutch Protestant families continued to cling to their native traditions, and most surnames found in city directories of these western Michigan towns and cities resemble those in their native provinces of the Netherlands. Most familiar is Frederik Meijer, the founder of the grocery business that has now grown into a major superstore chain that still bears his name. But my great-grandfather, Johannes Reijst, decided to migrate to the growing metropolis of Detroit, Michigan, which was quickly becoming an important emerging industrial center of the Midwest. Detroit was growing from an influx of people from various origins and cultures, from southern United States and both Eastern and Western European countries, and economic opportunities were likely greater for those who assimilated into this new culture. So either by design or by accident due to misinterpretation, the “ij” in Johannes’ surname was replaced with a “y”. The family even took this assimilation into American culture a step further by converting their given names to more familiar Americanized names. So Johannes became known as John and Helena as Lena; even the family given name of Cornelis, now would be written as Cornelius.
The Reyst (or Reijst or Rijst) surname probably dates back to no later than 1811. Prior to 1811 very few Dutch families had surnames, except nobility. But in 1811 under Napoleonic rule of the Netherlands, all families were required to register and choose a surname. Among the rural population of the Netherlands the use of patronymics was common practice before 1811 to identify an individual, with the oldest form using the possessive of the father’s name along with the word for son or daughter. Other forms used a person’s occupation, place of residence, or personal characteristic. So many patronymics became permanent surnames, like Jansen (son of Jan), Visser (the fisherman), Van Dijk (one living along the dike), and Reus (nickname for big man). So what does the name Rijst or Reijst represent? Unfortunately, I have not been able to find any citation that gives the meaning of either of these spellings. But I have found out that the Dutch word “rijst” means rice (as a noun) or to lift, mount or heave (as a verb). So it is possible that the chosen surname may have referred to being someone who does manual labor as I don’t think it referred to growing or processing of rice. Also the Dutch word for the Rhine River is “rijn”, so maybe the surname has some connection to living along the Rhine.
Today in the United States individuals with the surname of Reyst are mostly located throughout Michigan. However, you will also find some possible relatives in Arizona, California, Florida, Georgia, Indiana, Kentucky, Texas, Virginia, and Washington.
Today’s Woodward Dream Cruise, the antique car and hot rod cruise down Woodward Avenue from Wide Track Circle in Pontiac to 8 Mile Road at the edge of Detroit which draws car collectors from across the United States and Canada, triggered old memories of my dad. So I hope you don’t mind my brief diversion today.
Harry's 1957 Chevy Bel Air
In the last few years of his life, my dad, Arie “Harry” Reyst, started buying 1950 cars, I think they were all Chevys, and fixing them up in his spare time. I particularly remember 2 such cars, a white Chevy and a red Chevy convertible (which he still owned at his death). The white Chevy, which was probably a 1955 or 1956 model, he gutted under the hood completely and rebuilt it, replacing bad parts and even spray painting parts so they appeared new. I remember Dad hanging the parts from my mom’s backyard clothesline at our house on Eastburn Avenue. Harry sold this one and later purchased the 1957 Chevy Bel Air convertible, which my sister, Kathleen, had to drive if she wanted to borrow a family car.
Some of those Sunday afternoon family drives were taken in these cars. So I know if my dad still had been alive in 1995 when the first dream cruise was organized, he would have been right there cruising one of his beauties with all those youngsters, beaming his big smile. Riding in dad’s old cars, you felt special; there was this sense of pride and joy, and in my dad’s case love. So I can relate to those thousands (they say some 30,000 collector, custom, muscle, street hot rods, and special interest cars will cruise Woodward Avenue today) of owners who have come out today to cruise on by the million plus spectators along the route. I have often wondered if some car buff discovered that red ’57 Chevy on the dealer’s used car lot after it was traded in for a new car around 1966. Maybe it was spared the junk yard and can be seen cruising along in one of the many car cruises, in addition to the Woodward cruise, held throughout Metropolitan Detroit area every summer. |
global_01_local_0_shard_00002368_processed.jsonl/35489 |
In this Pizza Hut ad, mom and the kids are horrified that dad is going to make dinner, because, of course, he can't cook and only hip, smart mommy knows how to take care of the kids and run things. The commercial is supposed to be funny, and I suppose it would be if it weren't the thousandth time I've seen the "dad as idiot" theme. Chris, the reader who sent this to me, asks, "Why are men always the butt of the joke?" and that's about how I feel, too. In the picture, the mother, who's assigned the standard role of "yes kids, we know dad's a fool but don't say anything," is shocked--shocked!--that hubby came up with a good dinner. A good dinner he bought at Pizza Hut, of course. To watch the commercial, click here or see below. To watch some other videos of "dad as idiot" TV commercials, click here, here, here, here, here, here, here, here, here, and here, or just turn on your television for 75 seconds. [youtube:http://youtube.com/watch?v=Z5fg1ajFGao]
Share this post
Submit to FacebookSubmit to Google PlusSubmit to TwitterSubmit to LinkedIn |
global_01_local_0_shard_00002368_processed.jsonl/35498 | 71. World-building
Sure you can have elves and dragons, time travel and aliens. Myth and alternative technology are part of world-building in fantasy and sci-fi. But the real alternative worlds are inside people’s heads. To take the reader emotionally into a fictional world, the writer must show us how the main characters understand this world. Every world in fiction is a mentality – a way of understanding, a means of making judgements, a catalogue of right and wrong. To build a world, we must build our characters.
Consider, for example, an old jalopy. To one character this might just be a heap of rust, a shameful sign of poverty. To another character, the same car might be a challenge, a promise of something to be restored, a long summer full of happy activity. Different characters invest the same landscape and the same object with a multiplicity of significances.
I’m interested in how people create meaning in their world and negotiate shared meanings with others. And I was stuck at a fulcrum chapter in the book I’m writing, The Tears of Boabdil in how I was to achieve that with my main character. The novel is a braided narrative (thanks, Paula, for reminding me of that term). It combines a gritty police tale of an agent infiltrating a jihadist group, a forbidden love, and the magical power of narrative. In this chapter, the undercover police agent meets his handler. I needed to find a way of showing that the character inhabits a world not quite like our own, and I was struggling to express his rules.
The answer came from an unexpected source – a book I’ve been reading on the meaning of Palaeolithic art by Jean Clottes (What is Palaeolithic Art). Whether Clottes, a world expert on the cave paintings of southwest France, is right or wrong in his interpretation I don’t know, and I don’t really care. His schema was captivating, and perfect for my character.
• Connectedness and fluidity. Everywhere and everywhen are one. Things and events can metamorphose into each other. Signs are important.
• We tend to see individuals as members of general categories (cats, women, vehicles). But my main character responds to the particularity of things, so that a sleeping cat is a different thing from a stalking cat. He will later on experience the multiple aspects of his quarry – jihadi, respected teacher, doting father – as different entities
• The world is permeable to the effects of supernatural forces and these forces can be appealed to for their blessing
• The identity of a person or thing is the story we tell about it. Images have an affinity with the thing they portray and can change reality.
And there, I had the framework of my world. If we allow ourselves to be open to the permeability of things, the answer is out there. Now it’s a somewhat scary craft challenge to see if I can match up to Tolkien’s description of the goal of world-building as creating immersion or enchantment.
5 thoughts on “71. World-building
1. I love what you say about world-building being based on how characters think. I never thought of it that way when reading, but it’s true! I wonder what would happen if you took the same world from a book and inserted different characters who respond to the situations differently…what would happen? Would it even be the same world anymore?
Liked by 1 person
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/35536 |
Bob Goudriaan successor of Marc Gauw 2017/10/12
Why does this actually matter to end users?
As you fire up your computer, laptop or smartphone and click your browser icon to connect to your favorite site, do you know what happens behind the scenes? Many websites actually have dozens of different trackers, and some of these have such a global presence that they can form a pretty clear picture of ones online behaviour. Some argue that privacy is and has been dead for quite some time. As long as users have a quick internet connection and can access the web, email, games and messages without a hitch, they won't complain. But if you question people about the importance of online privacy, usually the answer is that it is indeed important and should be better protected. What is happening here? Perhaps we misunderstand carelessness with unfamiliarity. The technology behind most of our devices, our connection to the internet and the virtual spaces we inhabit is complex, yes, but the solutions we use to access them have also kept actual control away from us under the guise of 'intuitiveness' and 'pick up and play'. Playing here means playing by the rules of the developer, not by your own. What users instead should have are tools that give them actual access to what their devices do, what choices are made, and decide for themselves whether they agree with them or not. Privacy isn't dead, we just lack the tools to actually protect it. On the internet this would mean users need tools that first give them behind the scenes access and show how they are tracked and profiled. Then they should be able to flip a switch and decide, no, I don't want some unknown company to follow me around and record everything I do. That is what offen will develop: a tool that gives users just as much insight and control as a website owner has over data gathering and analysis - putting both on an equal footing. And the user remains in full control: before any data is actually collected, users can see precisely what would be collected about them, and who that data would be shared with. Since website owners needs to convince the visitor that they will respect her or his privacy in order to get their explicit consent, the rather than brutally grabbing any data she or he can get how that affects their privacy. Then they can either opt-in. This way, users have the tools and the access they need to make informed choices online and web site operators, who usually just want to know how many views their site gets and where their visitors are coming from, can respect the choices of their viewers.
Send in your ideas.
Deadline February 1st, 2020. |
global_01_local_0_shard_00002368_processed.jsonl/35540 | Indigenous Business: Goompi’s Girl
No Award is SUPER INTO Goompi’s Girl shoes, and wants them (in low or no heel) as soon as possible.
feet shod in a pair of high heels covered with a dot pattern
From the facebook:
Quandamooka(Nth Stradbroke Island/Irukandji (Cairns) Artist – INDIGENOUS Painted Heels/Shoes. Based in Queensland
The products page is not quite up yet, but friend the Facie and hope for the best! Apparently it’ll be soon. |
global_01_local_0_shard_00002368_processed.jsonl/35542 | Tag Archives: Amazon CloudFront
Architecting a Low-Cost Web Content Publishing System
Post Syndicated from Craig Jordan original https://aws.amazon.com/blogs/architecture/architecting-a-low-cost-web-content-publishing-system/
The Situation
200 Amazon CloudFront Points of Presence + Price Reduction
Post Syndicated from Jeff Barr original https://aws.amazon.com/blogs/aws/200-amazon-cloudfront-points-of-presence-price-reduction/
Less than two years ago I announced the 100th Point of Presence for Amazon CloudFront.
The overall Point of Presence footprint is now growing at 50% per year. Since we launched the 100th PoP in 2017, we have expanded to 77 cities in 34 countries including China, Israel, Denmark, Norway, South Africa, UAE, Bahrain, Portugal, and Belgium.
CloudFront has been used to deliver many high-visibility live-streaming events including Superbowl LIII, Thursday Night Football (via Prime Video), the Royal Wedding, the Winter Olympics, the Commonwealth Games, a multitude of soccer games (including the 2019 FIFA World Cup), and much more.
Whether used alone or in conjunction with other AWS services, CloudFront is a great way to deliver content, with plenty of options that also help to secure the content and to protect the underlying source. For example:
DDoS ProtectionAmazon CloudFront customers were automatically protected against 84,289 Distributed Denial of Service (DDoS) attacks in 2018, including a 1.4 Tbps memcached reflection attack.
Attack MitigationCloudFront customers used AWS Shield Advanced and AWS WAF to mitigate application-layer attacks, including a flood of over 20 million requests per second.
Certificate Management – We announced CloudFront Integration with AWS Certificate Manager in 2016, and use of custom certificates has grown by 600%.
New Locations in South America
Today I am happy to announce that our global network continues to grow, and now includes 200 Points of Presence, including new locations in Argentina (198), Chile (199), and Colombia (200):
AWS customer NED is based in Chile. They are using CloudFront to deliver server-side ad injection and low-latency content distribution to their clients, and are also using [email protected] to implement robust anti-piracy protection.
Price Reduction
We are also reducing the pricing for on-demand data transfer from CloudFront by 56% for all Points of Presence in South America, effective November 1, 2019. Check out the CloudFront Pricing page to learn more.
CloudFront Resources
Here are some resources to help you to learn how to make great use CloudFront in your organization:
Learn about AWS Services & Solutions – September AWS Online Tech Talks
Post Syndicated from Jenny Hang original https://aws.amazon.com/blogs/aws/learn-about-aws-services-solutions-september-aws-online-tech-talks/
Learn about AWS Services & Solutions – September AWS Online Tech Talks
AWS Tech Talks
Note – All sessions are free and in Pacific Time.
Tech talks this month:
September 23, 2019 | 11:00 AM – 12:00 PM PTBuild Your Hybrid Cloud Architecture with AWS – Learn about the extensive range of services AWS offers to help you build a hybrid cloud architecture best suited for your use case.
September 26, 2019 | 1:00 PM – 2:00 PM PTSelf-Hosted WordPress: It’s Easier Than You Think – Learn how you can easily build a fault-tolerant WordPress site using Amazon Lightsail.
October 3, 2019 | 11:00 AM – 12:00 PM PTLower Costs by Right Sizing Your Instance with Amazon EC2 T3 General Purpose Burstable Instances – Get an overview of T3 instances, understand what workloads are ideal for them, and understand how the T3 credit system works so that you can lower your EC2 instance costs today.
September 26, 2019 | 11:00 AM – 12:00 PM PTDevelop a Web App Using Amazon ECS and AWS Cloud Development Kit (CDK) – Learn how to build your first app using CDK and AWS container services.
Data Lakes & Analytics:
September 26, 2019 | 9:00 AM – 10:00 AM PTBest Practices for Provisioning Amazon MSK Clusters and Using Popular Apache Kafka-Compatible Tooling – Learn best practices on running Apache Kafka production workloads at a lower cost on Amazon MSK.
September 25, 2019 | 1:00 PM – 2:00 PM PTWhat’s New in Amazon DocumentDB (with MongoDB compatibility) – Learn what’s new in Amazon DocumentDB, a fully managed MongoDB compatible database service designed from the ground up to be fast, scalable, and highly available.
October 3, 2019 | 9:00 AM – 10:00 AM PTBest Practices for Enterprise-Class Security, High-Availability, and Scalability with Amazon ElastiCache – Learn about new enterprise-friendly Amazon ElastiCache enhancements like customer managed key and online scaling up or down to make your critical workloads more secure, scalable and available.
October 1, 2019 | 9:00 AM – 10:00 AM PT – CI/CD for Containers: A Way Forward for Your DevOps Pipeline – Learn how to build CI/CD pipelines using AWS services to get the most out of the agility afforded by containers.
Enterprise & Hybrid:
September 24, 2019 | 1:00 PM – 2:30 PM PT Virtual Workshop: How to Monitor and Manage Your AWS Costs – Learn how to visualize and manage your AWS cost and usage in this virtual hands-on workshop.
October 2, 2019 | 1:00 PM – 2:00 PM PT – Accelerate Cloud Adoption and Reduce Operational Risk with AWS Managed Services – Learn how AMS accelerates your migration to AWS, reduces your operating costs, improves security and compliance, and enables you to focus on your differentiating business priorities.
September 25, 2019 | 9:00 AM – 10:00 AM PTComplex Monitoring for Industrial with AWS IoT Data Services – Learn how to solve your complex event monitoring challenges with AWS IoT Data Services.
Machine Learning:
September 23, 2019 | 9:00 AM – 10:00 AM PTTraining Machine Learning Models Faster – Learn how to train machine learning models quickly and with a single click using Amazon SageMaker.
September 30, 2019 | 11:00 AM – 12:00 PM PTUsing Containers for Deep Learning Workflows – Learn how containers can help address challenges in deploying deep learning environments.
October 3, 2019 | 1:00 PM – 2:30 PM PTVirtual Workshop: Getting Hands-On with Machine Learning and Ready to Race in the AWS DeepRacer League – Join DeClercq Wentzel, Senior Product Manager for AWS DeepRacer, for a presentation on the basics of machine learning and how to build a reinforcement learning model that you can use to join the AWS DeepRacer League.
AWS Marketplace:
September 30, 2019 | 9:00 AM – 10:00 AM PTAdvancing Software Procurement in a Containerized World – Learn how to deploy applications faster with third-party container products.
September 24, 2019 | 11:00 AM – 12:00 PM PTApplication Migrations Using AWS Server Migration Service (SMS) – Learn how to use AWS Server Migration Service (SMS) for automating application migration and scheduling continuous replication, from your on-premises data centers or Microsoft Azure to AWS.
Networking & Content Delivery:
September 25, 2019 | 11:00 AM – 12:00 PM PTBuilding Highly Available and Performant Applications using AWS Global Accelerator – Learn how to build highly available and performant architectures for your applications with AWS Global Accelerator, now with source IP preservation.
September 30, 2019 | 1:00 PM – 2:00 PM PTAWS Office Hours: Amazon CloudFront – Just getting started with Amazon CloudFront and [email protected]? Get answers directly from our experts during AWS Office Hours.
October 1, 2019 | 11:00 AM – 12:00 PM PTRobots and STEM: AWS RoboMaker and AWS Educate Unite! – Come join members of the AWS RoboMaker and AWS Educate teams as we provide an overview of our education initiatives and walk you through the newly launched RoboMaker Badge.
Security, Identity & Compliance:
October 1, 2019 | 1:00 PM – 2:00 PM PTDeep Dive on Running Active Directory on AWS – Learn how to deploy Active Directory on AWS and start migrating your windows workloads.
October 2, 2019 | 9:00 AM – 10:00 AM PTDeep Dive on Amazon EventBridge – Learn how to optimize event-driven applications, and use rules and policies to route, transform, and control access to these events that react to data from SaaS apps.
September 24, 2019 | 9:00 AM – 10:00 AM PTOptimize Your Amazon S3 Data Lake with S3 Storage Classes and Management Tools – Learn how to use the Amazon S3 Storage Classes and management tools to better manage your data lake at scale and to optimize storage costs and resources.
October 2, 2019 | 11:00 AM – 12:00 PM PTThe Great Migration to Cloud Storage: Choosing the Right Storage Solution for Your Workload – Learn more about AWS storage services and identify which service is the right fit for your business.
Getting started with serverless
What can you expect?
Serverless Coursera training app
Across the four weeks of the course, you learn:
Serverless Coursera training
Analyze your Amazon CloudFront access logs at scale
Post Syndicated from Steffen Grunwald original https://aws.amazon.com/blogs/big-data/analyze-your-amazon-cloudfront-access-logs-at-scale/
Many AWS customers are using Amazon CloudFront, a global content delivery network (CDN) service. It delivers websites, videos, and API operations to browsers and clients with low latency and high transfer speeds. Amazon CloudFront protects your backends from massive load or malicious requests by caching or a web application firewall. As a result, sometimes only a small fraction of all requests gets to your backends. You can configure Amazon CloudFront to store access logs with detailed information of every request to Amazon Simple Storage Service (S3). This lets you gain insight into your cache efficiency and learn how your customers are using your products.
A common choice to run standard SQL queries on your data in S3 is Amazon Athena. Queries analyze your data immediately without the prior setup of infrastructure or loading your data. You pay only for the queries that you run. Amazon Athena is ideal for quick, interactive querying. It supports complex analysis of your data, including large joins, unions, nested queries, and window functions.
This blog post shows you how you can restructure your Amazon CloudFront access logs storage to optimize the cost and performance for queries. It demonstrates common patterns that are also applicable to other sources of time series data.
Optimizing Amazon CloudFront access logs for Amazon Athena queries
There are two main aspects to optimize: cost and performance.
Cost should be low for both storage of your data and the queries. Access logs are stored in S3, which is billed by GB/ month. Thus, it makes sense to compress your data – especially when you want to keep your logs for a long time. Also cost incurs on queries. When you optimize the storage cost, usually the query cost follows. Access logs are delivered compressed by gzip and Amazon Athena can deal with compression. Amazon Athena is billed by the amount of compressed data scanned, so the benefits of compression are passed on to you as cost savings.
Queries further benefit from partitioning. Partitioning divides your table into parts and keeps the related data together based on column values. For time-based queries, you benefit from partitioning by year, month, day, and hour. In Amazon CloudFront access logs, this indicates the request time. Depending on your data and queries, you add further dimensions to partitions. For example, for access logs it could be the domain name that was requested. When querying your data, you specify filters based on the partition to make Amazon Athena scan less data.
Generally, performance improves by scanning less data. Conversion of your access logs to columnar formats reduces the data to scan significantly. Columnar formats retain all information but store values by column. This allows creation of dictionaries, and effective use of Run Length Encoding and other compression techniques. Amazon Athena can further optimize the amount of data to read, because it does not scan columns at all if a column is not used in a filter or the result of a query. Columnar formats also split a file into chunks and calculate metadata on file- and chunk level like the range (min/ max), count, or sum of values. If the metadata indicates that the file or chunk is not relevant for the query Amazon Athena skips it. In addition, if you know your queries and the information you are looking for, you can further aggregate your data (for example, by day) for improved performance of frequent queries.
This blog post focuses on two measures to restructure Amazon CloudFront access logs for optimization: partitioning and conversion to columnar formats. For more details on performance tuning read the blog post about the top 10 performance tuning tips for Amazon Athena.
This blog post describes the concepts of a solution and includes code excerpts for better illustration of the implementation. Visit the AWS Samples repository for a fully working implementation of the concepts. Launching the packaged sample application from the AWS Serverless Application Repository, you deploy it within minutes in one step:
Partitioning CloudFront Access Logs in S3
Amazon CloudFront delivers each access log file in CSV format to an S3 bucket of your choice. Its name adheres to the following format (for more information, see Configuring and Using Access Logs):
The file name includes the date and time of the period in which the requests occurred in Coordinated Universal time (UTC). Although you can specify an optional prefix for an Amazon CloudFront distribution, all access log files for a distribution are stored with the same prefix.
When you have a large amount of access log data, this makes it hard to only scan and process parts of it efficiently. Thus, you must partition your data. Most tools in the big data space (for example, the Apache Hadoop ecosystem, Amazon Athena, AWS Glue) can deal with partitioning using the Apache Hive style. A partition is a directory that is self-descriptive. The directory name not only reflects the value of a column but also the column name. For access logs this is a desirable structure:
To generate this structure, the sample application initiates the processing of each file by an S3 event notification. As soon as Amazon CloudFront puts a new access log file to an S3 bucket, an event triggers the AWS Lambda function moveAccessLogs. This moves the file to a prefix corresponding to the filename. Technically, the move is a copy followed by deletion of the original file.
Migration of your Amazon CloudFront Access Logs
The deployment of the sample application contains a single S3 bucket called <StackName>-cf-access-logs. You can modify your existing Amazon CloudFront distribution configuration to deliver access logs to this bucket with the new/ log prefix. Files are moved to the canonical file structure for Amazon Athena partitioning as soon as they are put into the bucket.
To migrate all previous access log files, copy them manually to the new/ folder in the bucket. For example, you could copy the files by using the AWS Command Line Interface (AWS CLI). These files are treated the same way as the incoming files by Amazon CloudFront.
Load the Partitions and query your Access Logs
Before you can query the access logs in your bucket with Amazon Athena the AWS Glue Data Catalog needs metadata. On deployment, the sample application creates a table with the definition of the schema and the location. The new table is created by adding the partitioning information to the CREATE TABLE statement from the Amazon CloudFront documentation (mind the PARTITIONED BY clause):
cf_access_logs.partitioned_gz (
date DATE,
time STRING,
location STRING,
bytes BIGINT,
requestip STRING,
method STRING,
host STRING,
uri STRING,
status INT,
referrer STRING,
useragent STRING,
querystring STRING,
cookie STRING,
resulttype STRING,
requestid STRING,
hostheader STRING,
requestprotocol STRING,
requestbytes BIGINT,
timetaken FLOAT,
xforwardedfor STRING,
sslprotocol STRING,
sslcipher STRING,
responseresulttype STRING,
httpversion STRING,
filestatus STRING,
encryptedfields INT
year string,
month string,
day string,
hour string )
LOCATION 's3://<StackName>-cf-access-logs/partitioned-gz/'
TBLPROPERTIES ( 'skip.header.line.count'='2');
You can load the partitions added so far by running the metastore check (msck) statement via the Amazon Athena query editor. It discovers the partition structure in S3 and adds partitions to the metastore.
msck repair table cf_access_logs.partitioned_gz
You are now ready for your first query on your data in the Amazon Athena query editor:
SELECT SUM(bytes) AS total_bytes
FROM cf_access_logs.partitioned_gz
WHERE year = '2017'
AND month = '10'
AND day = '01'
AND hour BETWEEN '00' AND '11';
This query does not specify the request date (called date in a previous example) column of the table but the columns used for partitioning. These columns are dependent on date but the table definition does not specify this relationship. When you specify only the request date column, Amazon Athena scans every file as there is no hint which files contain the relevant rows and which files do not. By specifying the partition columns, Amazon Athena scans only a small subset of the total amount of Amazon CloudFront access log files. This optimizes both the performance and the cost of your queries. You can add further columns to the WHERE clause, such as the time to further narrow down the results.
To save cost, consider narrowing the scope of partitions down to a minimum by also putting the partitioning columns into the WHERE clause. You validate the approach by observing the amount of data that was scanned in the query execution statistics for your queries. These statistics are also displayed in the Amazon Athena query editor after your statement has been run:
Adding Partitions continuously
As Amazon CloudFront continuously delivers new access log data for requests, new prefixes for partitions are created in S3. However, Amazon Athena only queries the files contained in the known partitions, i.e. partitions that have been added before to the metastore. That’s why periodically triggering the msck command would not be the best solution. First, it is a time-consuming operation since Amazon Athena scans all S3 paths to validate and load your partitions. More importantly, this way you only add partitions that already have data delivered. Thus, there is some time period when the data exists in S3 but is not visible to Amazon Athena queries yet.
The sample application solves this by adding the partition for each hour in advance because partitions are just dependent on the request time. This way Amazon Athena scans files as soon as they exist in S3. A scheduled AWS Lambda function runs a statement like this:
ALTER TABLE cf_access_logs.partitioned_gz
year = '2017',
month = '10',
day = '01',
hour = '02' );
It can omit the specification of the canonical location attribute in this statement as it is automatically derived from the column values.
Conversion of the Access Logs to a Columnar Format
As mentioned previously, with columnar formats Amazon Athena skips scanning of data not relevant for a query resulting in less cost. Amazon Athena currently supports the columnar formats Apache ORC and Apache Parquet.
Key to the conversion is the Amazon Athena CREATE TABLE AS SELECT (CTAS) feature. A CTAS query creates a new table from the results of another SELECT query. Amazon Athena stores data files created by the CTAS statement in a specified location in Amazon S3. You can use CTAS to aggregate or transform the data, and to convert it into columnar formats. The sample application uses CTAS to hourly rewrite all logs from the CSV format to the Apache Parquet format. After this the resulting data will be added to a single partitioned table (the target table).
Creating the Target Table in Apache Parquet Format
The target table is a slightly modified version of the partitioned_gz table. Besides a different location the following table shows the different Serializer/Deserializer (SerDe) configuration for Apache Parquet:
CREATE EXTERNAL TABLE `cf_access_logs.partitioned_parquet`(
`date` date,
`time` string,
`location` string,
`bytes` bigint,
`requestip` string,
`method` string,
`host` string,
`uri` string,
`status` int,
`referrer` string,
`useragent` string,
`querystring` string,
`cookie` string,
`resulttype` string,
`requestid` string,
`hostheader` string,
`requestprotocol` string,
`requestbytes` bigint,
`timetaken` float,
`xforwardedfor` string,
`sslprotocol` string,
`sslcipher` string,
`responseresulttype` string,
`httpversion` string,
`filestatus` string,
`encryptedfields` int)
`year` string,
`month` string,
`day` string,
`hour` string)
Transformation to Apache Parquet by the CTAS Query
The sample application provides a scheduled AWS Lambda function transformPartition that runs a CTAS query on a single partition per run, taking one hour of data into account. The target location for the Apache Parquet files is the Apache Hive style path in the location of the partitioned_parquet table.
The files written to S3 are important but the table in the AWS Glue Data Catalog for this data is just a by-product. Hence the function drops the CTAS table immediately and create the corresponding partition in the partitioned_parquet table instead.
CREATE TABLE cf_access_logs.ctas_2017_10_01_02
WITH ( format='PARQUET',
parquet_compression = 'SNAPPY')
FROM cf_access_logs.partitioned_gz
WHERE year = '2017'
AND month = '10'
AND day = '01'
AND hour = '02';
DROP TABLE cf_access_logs.ctas_2017_10_01_02;
ALTER TABLE cf_access_logs.partitioned_parquet
year = '2017',
month = '10',
day = '01',
hour = '02' );
The statement should be run as soon as new data is written. Amazon CloudFront usually delivers the log file for a time period to your Amazon S3 bucket within an hour of the events that appear in the log. The sample application schedules the transformPartition function hourly to transform the data for the hour before the previous hour.
Some or all log file entries for a time period can sometimes be delayed by up to 24 hours. If you must mitigate this case, you delete and recreate a partition after that period. Also if you migrated partitions from previous Amazon CloudFront access logs, run the transformPartition function for each partition. The sample applications only transforms continuously added files.
When all files of a gzip partition are converted to Apache Parquet, you can save cost by getting rid of data that you do not need. Use the Lifecycle Policies in S3 to archive the gzip files in a cheaper storage class or delete them after a specific amount of days.
Query data over Multiple Tables
You now have two derived tables from the original Amazon CloudFront access log data:
• partitioned_gz contains gzip compressed CSV files that are added as soon as new files are delivered.
• Access logs in partitioned_parquet are written after one hour latest. A rough assumption is that the CTAS query takes a maximum of 15 minutes to transform a gzip partition. You must measure and confirm this assumption. Depending on the data size, this can be much faster.
The following diagram shows how the complete view on all data is composed of the two tables. The last complete partition of Apache Parquet files ends before the current time minus the transformation duration and the duration until Amazon CloudFront delivers the access log files.
For convenience the sample application creates the Amazon Athena view combined as a union of both tables. It includes an additional column called file. This is the file that stores the row.
CREATE OR REPLACE VIEW cf_access_logs.combined AS
SELECT *, "$path" AS file
FROM cf_access_logs.partitioned_gz
WHERE concat(year, month, day, hour) >=
date_format(date_trunc('hour', (current_timestamp -
INTERVAL '15' MINUTE - INTERVAL '1' HOUR)), '%Y%m%d%H')
UNION ALL SELECT *, "$path" AS file
FROM cf_access_logs.partitioned_parquet
WHERE concat(year, month, day, hour) <
date_format(date_trunc('hour', (current_timestamp -
Now you can query the data from the view to take advantage of the columnar based file partitions automatically. As mentioned before, you should add the partition columns (year, month, day, hour) to your statement to limit the files Amazon Athena scans.
SELECT SUM(bytes) AS total_bytes
FROM cf_access_logs.combined
WHERE year = '2017'
AND month = '10'
AND day = '01'
In this blog post, you learned how to optimize the cost and performance of your Amazon Athena queries with two steps. First, you divide the overall data into small partitions. This allows queries to run much faster by reducing the number of files to scan. The second step converts each partition into a columnar format to reduce storage cost and increase the efficiency of scans by Amazon Athena.
The results of both steps are combined in a single view for convenient interactive queries by you or your application. All data is partitioned by the time of the request. Thus, this format is best suited for interactive drill-downs into your logs for which the columns are limited and the time range is known. This way, it complements the Amazon CloudFront reports, for example, by providing easy access to:
• Data from more than 60 days in the past
• The distribution of detailed HTTP status codes (for example, 200, 403, 404) on a certain day or hour
• Statistics based on the URI paths
• Statistics of objects that are not listed in Amazon CloudFront’s 50 most popular objects report
• A drill down into the attributes of each request
We hope you find this blog post and the sample application useful also for other types of time series data beside Amazon CloudFront access logs. Feel free to submit enhancements to the example application in the source repository or provide feedback in the comments.
About the Author
Steffen Grunwald is a senior solutions architect with Amazon Web Services. Supporting German enterprise customers on their journey to the cloud, he loves to dive deep into application architectures and development processes to drive performance, operational efficiency, and increase the speed of innovation.
Protecting your API using Amazon API Gateway and AWS WAF — Part 2
This post courtesy of Heitor Lessa, AWS Specialist Solutions Architect – Serverless
In Part 1 of this blog, we described how to protect your API provided by Amazon API Gateway using AWS WAF. In this blog, we show how to use API keys between an Amazon CloudFront distribution and API Gateway to secure access to your API in API Gateway in addition to your preferred authorization (AuthZ) mechanism already set up in API Gateway. For more information about AuthZ mechanisms in API Gateway, see Secure API Access with Amazon Cognito Federated Identities, Amazon Cognito User Pools, and Amazon API Gateway.
We also extend the AWS CloudFormation stack previously used to automate the creation of the following necessary resources of this solution:
The following are alternative solutions to using an API key, depending on your security requirements:
Using a randomly generated HTTP secret header in CloudFront and verifying by API Gateway request validation
Signing incoming requests with [email protected] and verifying with API Gateway Lambda authorizers
To follow along, you need full permissions to create, update, and delete API Gateway, CloudFront, Lambda, and CloudWatch Events through AWS CloudFormation.
Extending the existing AWS CloudFormation stack
First, click here to download the full template. Then follow these steps to update the existing AWS CloudFormation stack:
1. Go to the AWS Management Console and open the AWS CloudFormation console.
2. Select the stack that you created in Part 1, right-click it, and select Update Stack.
3. For option 2, choose Choose file and select the template that you downloaded.
4. Fill in the required parameters as shown in the following image.
Here’s more information about these parameters:
• API Gateway to send traffic to – We use the same API Gateway URL as in Part 1 except without the URL scheme (https://): cxm45444t9a.execute-api.us-east-2.amazonaws.com/prod
• Rotating API Keys – We define Daily and use 2018-04-03 as the timestamp value to append to the API key name
Continue with the AWS CloudFormation console to complete the operation. It might take a couple of minutes to update the stack as CloudFront takes its time to propagate changes across all point of presences.
Enabling API Keys in the example Pet Store API
While the stack completes in the background, let’s enable the use of API Keys in the API that CloudFront will send traffic to.
1. Go to the AWS Management Console and open the API Gateway console.
2. Select the API that you created in Part 1 and choose Resources.
3. Under /pets, choose GET and then choose Method Request.
4. For API Key Required, choose the dropdown menu and choose true.
5. To save this change, select the highlighted check mark as shown in the following image.
Next, we need to deploy these changes so that requests sent to /pets fail if an API key isn’t present.
1. Choose Actions and select Deploy API.
2. Choose the Deployment stage dropdown menu and select the stage you created in Part 1.
3. Add a deployment description such as “Requires API Keys under /pets” and choose Deploy.
When the deployment succeeds, you’re redirected to the API Gateway Stage page. There you can use the Invoke URL to test if the following request fails due to not having an API key.
This failure is expected and proves that our deployed changes are working. Next, let’s try to access the same API but this time through our CloudFront distribution.
1. From the AWS Management Console, open the AWS Cloudformation console.
2. Select the stack that you created in Part 1 and choose Outputs at the bottom left.
3. On the CFDistribution line, copy the URL. Before you paste in a new browser tab or window, append ‘/pets’ to it.
As opposed to our first attempt without an API key, we receive a JSON response from the PetStore API. This is because CloudFront is injecting an API key before it forwards the request to the PetStore API. The following image demonstrates both of these tests:
1. Successful request when accessing the API through CloudFront
2. Unsuccessful request when accessing the API directly through its Invoke URL
This works as a secret between CloudFront and API Gateway, which could be any agreed random secret that can be rotated like an API key. However, it’s important to know that the API key is a feature to track or meter API consumers’ usage. It’s not a secure authorization mechanism and therefore should be used only in conjunction with an API Gateway authorizer.
Rotating API keys
API keys are automatically rotated based on the schedule (e.g., daily or monthly) that you chose when updating the AWS CloudFormation stack. This requires no maintenance or intervention on your part. In this section, we explain how this process works under the hood and what you can do if you want to manually trigger an API key rotation.
The AWS CloudFormation template that we downloaded and used to update our stack does the following in addition to Part 1.
Introduce a Timestamp parameter that is appended to the API key name
Type: String
Description: Fill in this format <Year>-<Month>-<Day>
Default: 2018-04-02
Create an API Gateway key, API Gateway usage plan, associate the new key with the API gateway given as a parameter, and configure the CloudFront distribution to send a custom header when forwarding traffic to API Gateway
Type: AWS::CloudFront::Distribution
IncludeCookies: 'false'
Bucket: !Sub ${S3BucketAccessLogs}.s3.amazonaws.com
Prefix: cloudfront-logs
Enabled: 'true'
Comment: API Gateway Regional Endpoint Blog post
Id: APIGWRegional
DomainName: !Select [0, !Split ['/', !Ref ApiURL]]
HTTPPort: 443
OriginProtocolPolicy: https-only
HeaderName: x-api-key
HeaderValue: !Ref ApiKey
Type: AWS::ApiGateway::UsagePlan
Description: CloudFront usage only
UsagePlanName: CloudFront_only
ApiId: !Select [0, !Split ['.', !Ref ApiURL]]
Stage: !Select [1, !Split ['/', !Ref ApiURL]]
Type: "AWS::ApiGateway::ApiKey"
Name: !Sub "CloudFront-${Timestamp}"
Description: !Sub "CloudFormation API Key ${Timestamp}"
Enabled: true
Type: "AWS::ApiGateway::UsagePlanKey"
KeyId: !Ref ApiKey
KeyType: API_KEY
UsagePlanId: !Ref ApiUsagePlan
As shown in the ApiKey resource, we append the given Timestamp to Name as well as use it in the API Gateway usage plan key resource. This means that whenever the Timestamp parameter changes, AWS CloudFormation triggers a resource replacement and updates every resource that depends on that API key. In this case, that includes the AWS CloudFront configuration and API Gateway usage plan.
But what does the rotation schedule that you chose at the beginning of this blog mean in this example?
Create a scheduled activity to trigger a Lambda function on a given schedule
Description: Schedule to rotate API Keys e.g. Daily, Monthly, Bimonthly basis
Type: String
Default: Daily
- Daily
- Fortnightly
- Monthly
- Bimonthly
- Quarterly
ConstraintDescription: Must be any of the available options
Daily: "rate(1 day)"
Fortnightly: "rate(14 days)"
Monthly: "rate(30 days)"
Bimonthly: "rate(60 days)"
Quarterly: "rate(90 days)"
Type: "AWS::Events::Rule"
Description: "ScheduledRule"
ScheduleExpression: !FindInMap [ScheduleMap, CloudwatchEvents, !Ref ApiKeyRotationSchedule]
State: "ENABLED"
Arn: !GetAtt RotateApiKeysFunction.Arn
Id: "RotateApiKeys"
The resource RotateApiKeysScheduledJob shows that the schedule that you selected through a dropdown menu when updating the AWS CloudFormation stack is actually converted to a CloudWatch Events rule. This in turn triggers a Lambda function that is defined in the same template.
Type: "AWS::Lambda::Function"
Handler: "index.lambda_handler"
Role: !GetAtt RotateApiKeysFunctionRole.Arn
Runtime: python3.6
StackName: !Ref "AWS::StackName"
ZipFile: !Sub |
import datetime
import os
import boto3
from botocore.exceptions import ClientError
session = boto3.Session()
cfn = session.client('cloudformation')
timestamp = datetime.date.today()
params = {
'StackName': os.getenv('StackName'),
'UsePreviousTemplate': True,
'Capabilities': ["CAPABILITY_IAM"],
'Parameters': [
'ParameterKey': 'ApiURL',
'UsePreviousValue': True
'ParameterKey': 'ApiKeyRotationSchedule',
'UsePreviousValue': True
'ParameterKey': 'Timestamp',
'ParameterValue': str(timestamp)
def lambda_handler(event, context):
""" Updates CloudFormation Stack with a new timestamp and returns CloudFormation response"""
response = cfn.update_stack(**params)
except ClientError as err:
if "No updates are to be performed" in err.response['Error']['Message']:
return {"message": err.response['Error']['Message']}
raise Exception("An error happened while updating the stack: {}".format(err))
return response
All this Lambda function does is trigger an AWS CloudFormation stack update via API (exactly what you did through the console but programmatically) and updates the Timestamp parameter. As a result, it rotates the API key and the CloudFront distribution configuration.
This gives you enough flexibility to change the API key rotation schedule at any time without maintaining or writing any code. You can also manually update the stack and rotate the keys by updating the AWS CloudFormation stack’s Timestamp parameter.
Next Steps
We hope you found the information in this blog helpful. You can use it to understand how to create a mechanism to allow traffic only from CloudFront to API Gateway and avoid bypassing the AWS WAF rules that Part 1 set up.
Keep the following important notes in mind about this solution:
• It assumes that you already have a strong AuthZ mechanism, managed by API Gateway, to control access to your API.
• The API Gateway usage plan and other resources created in this solution work only for APIs created in the same account (the ApiUrl parameter).
• If you already use API keys for tracking API usage, consider using either of the following solutions as a replacement:
• Use a random HTTP header value in CloudFront origin configuration and use an API Gateway request model validation to verify it instead of API keys alone.
• Combine [email protected] and an API Gateway custom authorizer to sign and verify incoming requests using a shared secret known only to the two. This is a more advanced technique.
Introducing Amazon API Gateway Private Endpoints
Post Syndicated from Chris Munns original https://aws.amazon.com/blogs/compute/introducing-amazon-api-gateway-private-endpoints/
Alongside this trend of building API-powered applications is the move to a microservices application design pattern. A larger application is represented by many smaller application components, also typically communicating via API. The growth of APIs and microservices being used together is driven across all sorts of companies, from startups up through enterprises. The number of tools required to manage APIs at scale, securely, and with minimal operational overhead is growing as well.
Today, we’re excited to announce the launch of Amazon API Gateway private endpoints. This has been one of the most heavily requested features for this service. We believe this is going to make creating and managing private APIs even easier.
API Gateway overview
When API Gateway first launched, it came with what are now known as edge-optimized endpoints. These publicly facing endpoints came fronted with Amazon CloudFront, a global content delivery network with over 100 points of presence today.
Edge-optimized endpoints helped you reduce latency to clients accessing your API on the internet from anywhere; typically, mobile, IoT, or web-based applications. Behind API Gateway, you could back your API with a number of options for backend technologies: AWS Lambda, Amazon EC2, Elastic Load Balancing products such as Application Load Balancers or Classic Load Balancers, Amazon DynamoDB, Amazon Kinesis, or any publicly available HTTPS-based endpoint.
In February 2016, AWS launched the ability for AWS Lambda functions to access resources inside of an Amazon VPC. With this launch, you could build API-based services that did not require a publicly available endpoint. They could still interact with private services, such as databases, inside your VPC.
In November 2017, API Gateway launched regional API endpoints, which are publicly available endpoints without any preconfigured CDN in front of them. Regional endpoints are great for helping to reduce request latency when API requests originate from the same Region as your REST API. You can also configure your own CDN distribution, which allows you to protect your public APIs with AWS WAF, for example. With regional endpoints, nothing changed about the backend technologies supported.
At re:Invent 2017, we announced endpoint integrations inside a private VPC. With this capability, you can now have your backend running on EC2 be private inside your VPC without the need for a publicly accessible IP address or load balancer. Beyond that, you can also now use API Gateway to front APIs hosted by backends that exist privately in your own data centers, using AWS Direct Connect links to your VPC. Private integrations were made possible via VPC Link and Network Load Balancers, which support backends such as EC2 instances, Auto Scaling groups, and Amazon ECS using the Fargate launch type.
Combined with the other capabilities of API Gateway—such as Lambda authorizers, resource policies, canary deployments, SDK generation, and integration with Amazon Cognito User Pools—you’ve been able to build publicly available APIs, with nearly any backend you could want, securely, at scale, and with minimal operations overhead.
Private endpoints
Today’s launch solves one of the missing pieces of the puzzle, which is the ability to have private API endpoints inside your own VPC. With this new feature, you can still use API Gateway features, while securely exposing REST APIs only to the other services and resources inside your VPC, or those connected via Direct Connect to your own data centers.
Here’s how this works.
API Gateway private endpoints are made possible via AWS PrivateLink interface VPC endpoints. Interface endpoints work by creating elastic network interfaces in subnets that you define inside your VPC. Those network interfaces then provide access to services running in other VPCs, or to AWS services such as API Gateway. When configuring your interface endpoints, you specify which service traffic should go through them. When using private DNS, all traffic to that service is directed to the interface endpoint instead of through a default route, such as through a NAT gateway or public IP address.
API Gateway as a fully managed service runs its infrastructure in its own VPCs. When you interface with API Gateway publicly accessible endpoints, it is done through public networks. When they’re configured as private, the public networks are not made available to route your API. Instead, your API can only be accessed using the interface endpoints that you have configured.
Some things to note:
• Because you configure the subnets in which your endpoints are made available, you control the availability of the access to your API Gateway hosted APIs. Make sure that you provide multiple interfaces in your VPC. In the above diagram, there is one endpoint in each subnet in each Availability Zone for which the VPC is configured.
• Each endpoint is an elastic network interface configured in your VPC that has security groups configured. Network ACLs apply to the network interface as well.
For more information about endpoint limits, see Interface VPC Endpoints.
Setting up a private endpoint
Getting up and running with your private API Gateway endpoint requires just a few things:
• A virtual private cloud (VPC) configured with at least one subnet and DNS resolution enabled.
• A VPC endpoint with the following configuration:
• Service name = “com.amazonaws.{region}.execute-api”
• Enable Private DNS Name = enabled
• A security group set to allow TCP Port 443 inbound from either an IP range in your VPC or another security group in your VPC
• An API Gateway managed API with the following configuration:
• Endpoint Type = “Private”
• An API Gateway resource policy that allows access to your API from the VPC endpoint
Create the VPC
To create a VPC using AWS CloudFormation, choose Launch stack.
This VPC will have two private and two public subnets, one of each in an AZ, as seen in the CloudFormation Designer.
1. Name the stack “PrivateAPIDemo”.
2. Set the Environment to “Demo”. This has no real effect beyond tagging and naming certain resources accordingly.
3. Choose Next.
4. On the Options page, leave all of the defaults and choose Next.
5. On the Review page, choose Create. It takes just a few moments for all of the resources in this template to be created.
6. After the VPC has a status of “CREATE_COMPLETE”, choose Outputs and make note of the values for VpcId, both public and private subnets 1 and 2, and the endpoint security group.
Create the VPC endpoint for API Gateway
1. Open the Amazon VPC console.
2. Make sure that you are in the same Region in which you just created the above stack.
3. In the left navigation pane, choose Endpoints, Create Endpoint.
4. For Service category, keep it set to “AWS Services”.
5. For Service Name, set it to “com.amazonaws.{region}.execute-api”.
6. For VPC, select the one created earlier.
7. For Subnets, select the two private labeled subnets from this VPC created earlier, one in each Availability Zone. You can find them labeled as “privateSubnet01” and “privateSubnet02”.
8. For Enable Private DNS Name, keep it checked as Enabled for this endpoint.
9. For Security Group, select the group named “EndpointSG”. It allows for HTTPS access to the endpoint for the entire VPC IP address range.
10. Choose Create Endpoint.
Creating the endpoint takes a few moments to go through all of the interface endpoint lifecycle steps. You need the DNS names later so note them now.
Create the API
Follow the Pet Store example in the API Gateway documentation:
1. Open the API Gateway console in the same Region as the VPC and private endpoint.
2. Choose Create API, Example API.
3. For Endpoint Type, choose Private.
4. Choose Import.
Before deploying the API, create a resource policy to allow access to the API from inside the VPC.
1. In the left navigation pane, choose Resource Policy.
2. Choose Source VPC Whitelist from the three examples possible.
3. Replace {{vpceID}} with the ID of your VPC endpoint.
4. Choose Save.
5. In the left navigation pane, select the new API and choose Actions, Deploy API.
1. Choose [New Stage].
2. Name the stage demo.
3. Choose Deploy.
Your API is now fully deployed and available from inside your VPC. Next, test to confirm that it’s working.
Test the API
To emphasize the “privateness” of this API, test it from a resource that only lives inside your VPC and has no direct network access to it, in the traditional networking sense.
Launch a Lambda function inside the VPC, with no public access. To show its ability to hit the private API endpoint, invoke it using the console. The function is launched inside the private subnets inside the VPC without access to a NAT gateway, which would be required for any internet access. This works because Lambda functions are invoked using the service API, not any direct network access to the function’s underlying resources inside your VPC.
To create a Lambda function using CloudFormation, choose Launch stack.
All the code for this function is located inside of the template and the template creates just three resources, as shown in the diagram from Designer:
• A Lambda function
• An IAM role
• A VPC security group
1. Name the template LambdaTester, or something easy to remember.
2. For the first parameter, enter a DNS name from your VPC endpoint. These can be found in the Amazon VPC console under Endpoints. For this example, use the endpoints that start with “vpce”. These are the private DNS names for them.For the API Gateway endpoint DNS, see the dashboard for your API Gateway API and copy the URL from the top of the page. Use just the endpoint DNS, not the “https://” or “/demo/” at the end.
3. Select the same value for Environment as you did earlier in creating your VPC.
4. Choose Next.
5. Leave all options as the default values and choose Next.
6. Select the check box next to I acknowledge that… and choose Create.
7. When your stack reaches the “CREATE_COMPLETE” state, choose Resources.
8. To go to the Lambda console for this function, choose the Physical ID of the AWS::Lambda::Function resource.
Note: If you chose a different environment than “Demo” for this example, modify the line “path: ‘/demo/pets’,” to the appropriate value.
1. Choose Test in the top right of the Lambda console. You are prompted to create a test event to pass the function. Because you don’t need to take anything here for the function to call the internal API, you can create a blank payload or leave the default as shown. Choose Save.
2. Choose Test again. This invokes the function and passes in the payload that you just saved. It takes just a few moments for the new function’s environment to spin to life and to call the code configured for it. You should now see the results of the API call to the PetStore API.
The JSON returned is from your API Gateway powered private API endpoint. Visit the API Gateway console to see activity on the dashboard and confirm again that this API was called by the Lambda function, as in the following screenshot:
Cleaning up from this demo requires a few simple steps:
1. Delete the stack for your Lambda function.
2. Delete the VPC endpoint.
3. Delete the API Gateway API.
4. Delete the VPC stack that you created first.
API Gateway private endpoints enable use cases for building private API–based services inside your own VPCs. You can now keep both the frontend to your API (API Gateway) and the backend service (Lambda, EC2, ECS, etc.) private inside your VPC. Or you can have networks using Direct Connect networks without the need to expose them to the internet in any way. All of this without the need to manage the infrastructure that powers the API gateway itself!
You can continue to use the advanced features of API Gateway such as custom authorizers, Amazon Cognito User Pools integration, usage tiers, throttling, deployment canaries, and API keys.
We believe that this feature greatly simplifies the growth of API-based microservices. We look forward to your feedback here, on social media, or in the AWS forums.
This post courtesy of Thiago Morais, AWS Solutions Architect
Regional API endpoints
Edge-optimized API endpoint
Regional API endpoint
In this section, you implement the following steps:
• Create a regional API using the PetStore sample API.
• Create a CloudFront distribution for the API.
• Test the CloudFront distribution.
• Set up AWS WAF and create a web ACL.
• Attach the web ACL to the CloudFront distribution.
• Test AWS WAF protection.
Create the regional API
For Stage name, type prod and add a stage description.
Choose Deploy and the new API stage is created.
aws apigateway update-rest-api \
A successful response looks like the following:
"createdDate": 1511525626,
"endpointConfiguration": {
"types": [
"id": "{api-id}",
"name": "PetStore"
Create a CloudFront distribution
• A CloudFront domain URL
• An S3 bucket for CloudFront access logs
Output from CloudFormation
Output from CloudFormation
Test the CloudFront distribution
You should get the following output:
"id": 1,
"type": "dog",
"price": 249.99
"id": 2,
"type": "cat",
"price": 124.99
"id": 3,
"type": "fish",
"price": 0.99
Set up AWS WAF and create a web ACL
Attach the AWS WAF web ACL to the CloudFront distribution
Test AWS WAF protection
To install Artillery on your machine, run the following command:
$ npm install -g artillery
$ artillery -V
$ 1.6.0-12
"id": 1,
"type": "dog",
"price": 249.99
"id": 2,
"type": "cat",
"price": 124.99
"id": 3,
"type": "fish",
"price": 0.99
Run the following Artillery command:
<HR noshade size="1px">
Request blocked.
<BR clear="all">
<HR noshade size="1px">
Generated by cloudfront (CloudFront)
Request ID: [removed]
Enhanced Domain Protections for Amazon CloudFront Requests
Enhanced Protection against Dangling DNS entries
Enhanced Protection against Domain Fronting
Give Your WordPress Blog a Voice With Our New Amazon Polly Plugin
New WordPress Plugin
Installing the Plugin
Then I follow these directions to access my login credentials:
Credentials in hand, I log in to the WordPress Dashboard:
I enter my keys and click on Save Changes:
Going Further
Let me know what you come up with!
EU Compliance Update: AWS’s 2017 C5 Assessment
Post Syndicated from Oliver Bell original https://aws.amazon.com/blogs/security/eu-compliance-update-awss-2017-c5-assessment/
C5 logo
AWS has completed its 2017 assessment against the Cloud Computing Compliance Controls Catalog (C5) information security and compliance program. Bundesamt für Sicherheit in der Informationstechnik (BSI)—Germany’s national cybersecurity authority—established C5 to define a reference standard for German cloud security requirements. With C5 (as well as with IT-Grundschutz), customers in German member states can use the work performed under this BSI audit to comply with stringent local requirements and operate secure workloads in the AWS Cloud.
Continuing our commitment to Germany and the AWS European Regions, AWS has added 16 services to this year’s scope:
The English version of the C5 report is available through AWS Artifact. The German version of the report will be available through AWS Artifact in the coming weeks.
– Oliver
Scale Your Web Application — One Step at a Time
• Where are images and videos stored?
• What is the level of security required?
• Are these synchronous or asynchronous requests?
How is the website handling sessions?
So, if we take this one step at a time:
Your multisite architecture will look like the following diagram:
Now Open AWS EU (Paris) Region
The Details
From Our Customers
AWS Consulting and Technology Partners
AWS in France
Use it Today
How field-level encryption works
Host: example.com
Host: example.com
Content-Length: 1713
Sample application architecture and data flow
Diagram of the solution's architecture and data flow
Here is how the sample solution works:
Deployment walkthrough
1. Stage the required artifacts
2. Generate an RSA key pair
4. Launch the CloudFormation stack
6. Store the RSA private key in the Parameter Store
Deploy the solution
1. Stage the required artifacts
2. Generate an RSA key pair
1. Confirm access to OpenSSL.
$ openssl version
You should see version information similar to the following.
OpenSSL <version> <date>
1. Create a private key using the following command.
$ openssl genrsa -out private_key.pem 2048
The command results should look similar to the following.
Generating RSA private key, 2048 bit long modulus
e is 65537 (0x10001)
$ openssl rsa -pubout -in private_key.pem -out public_key.pem
You should see output similar to the following.
writing RSA key
Screenshot of adding a public key
Complete the Add Public Key configuration boxes:
• Key Name: Type a name such as DemoPublicKey.
• Comment: Optionally add a comment.
1. Choose Create.
3. Under Profiles, choose Create profile.
Screenshot of creating a profile
Complete the Create profile configuration boxes:
• Name: Type a name such as FLEDemo.
• Comment: Optionally add a comment.
• Provider name: Type a provider name such as FLEDemo.
1. Choose Save profile.
Screenshot of creating a configuration
Complete the Create configuration boxes:
• Comment: Optionally add a comment.
1. Choose Save configuration
4. Launch the CloudFormation stack
Input parameterInput parameter description
To finish creating the CloudFormation stack:
Screenshot of editing the default cache behavior
4. Choose Yes, Edit.
6. Choose Yes, Edit.
6. Store the RSA private key in the Parameter Store
| PutParameter |
| Version | 1 |
$ shred -zvu -n 100 private*.pem
Test the sample application
2. Choose Submit.
Screenshot of completing the sample application form
Screenshot of the phone number as ciphertext
3. Choose the Test button.
4. View the encrypted and decrypted phone number data.
Screenshot of the encrypted and decrypted phone number data
– Alex and Cameron
Easier Certificate Validation Using DNS with AWS Certificate Manager
Post Syndicated from Todd Cignetti original https://aws.amazon.com/blogs/security/easier-certificate-validation-using-dns-with-aws-certificate-manager/
Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates are used to secure network communications and establish the identity of websites over the internet. Before issuing a certificate for your website, Amazon must validate that you control the domain name for your site. You can now use AWS Certificate Manager (ACM) Domain Name System (DNS) validation to establish that you control a domain name when requesting SSL/TLS certificates with ACM. Previously ACM supported only email validation, which required the domain owner to receive an email for each certificate request and validate the information in the request before approving it.
With DNS validation, you write a CNAME record to your DNS configuration to establish control of your domain name. After you have configured the CNAME record, ACM can automatically renew DNS-validated certificates before they expire, as long as the DNS record has not changed. To make it even easier to validate your domain, ACM can update your DNS configuration for you if you manage your DNS records with Amazon Route 53. In this blog post, I demonstrate how to request a certificate for a website by using DNS validation. To perform the equivalent steps using the AWS CLI or AWS APIs and SDKs, see AWS Certificate Manager in the AWS CLI Reference and the ACM API Reference.
Requesting an SSL/TLS certificate by using DNS validation
In this section, I walk you through the four steps required to obtain an SSL/TLS certificate through ACM to identify your site over the internet. SSL/TLS provides encryption for sensitive data in transit and authentication by using certificates to establish the identity of your site and secure connections between browsers and applications and your site. DNS validation and SSL/TLS certificates provisioned through ACM are free.
Step 1: Request a certificate
To get started, sign in to the AWS Management Console and navigate to the ACM console. Choose Get started to request a certificate.
Screenshot of getting started in the ACM console
If you previously managed certificates in ACM, you will instead see a table with your certificates and a button to request a new certificate. Choose Request a certificate to request a new certificate.
Screenshot of choosing "Request a certificate"
Type the name of your domain in the Domain name box and choose Next. In this example, I type www.example.com. You must use a domain name that you control. Requesting certificates for domains that you don’t control violates the AWS Service Terms.
Screenshot of entering a domain name
Step 2: Select a validation method
With DNS validation, you write a CNAME record to your DNS configuration to establish control of your domain name. Choose DNS validation, and then choose Review.
Screenshot of selecting validation method
Step 3: Review your request
Review your request and choose Confirm and request to request the certificate.
Screenshot of reviewing request and confirming it
Step 4: Submit your request
After a brief delay while ACM populates your domain validation information, choose the down arrow (highlighted in the following screenshot) to display all the validation information for your domain.
Screenshot of validation information
ACM displays the CNAME record you must add to your DNS configuration to validate that you control the domain name in your certificate request. If you use a DNS provider other than Route 53 or if you use a different AWS account to manage DNS records in Route 53, copy the DNS CNAME information from the validation information, or export it to a file (choose Export DNS configuration to a file) and write it to your DNS configuration. For information about how to add or modify DNS records, check with your DNS provider. For more information about using DNS with Route 53 DNS, see the Route 53 documentation.
If you manage DNS records for your domain with Route 53 in the same AWS account, choose Create record in Route 53 to have ACM update your DNS configuration for you.
After updating your DNS configuration, choose Continue to return to the ACM table view.
ACM then displays a table that includes all your certificates. The certificate you requested is displayed so that you can see the status of your request. After you write the DNS record or have ACM write the record for you, it typically takes DNS 30 minutes to propagate the record, and it might take several hours for Amazon to validate it and issue the certificate. During this time, ACM shows the Validation status as Pending validation. After ACM validates the domain name, ACM updates the Validation status to Success. After the certificate is issued, the certificate status is updated to Issued. If ACM cannot validate your DNS record and issue the certificate after 72 hours, the request times out, and ACM displays a Timed out validation status. To recover, you must make a new request. Refer to the Troubleshooting Section of the ACM User Guide for instructions about troubleshooting validation or issuance failures.
Screenshot of a certificate issued and validation successful
You now have an ACM certificate that you can use to secure your application or website. For information about how to deploy certificates with other AWS services, see the documentation for Amazon CloudFront, Amazon API Gateway, Application Load Balancers, and Classic Load Balancers. Note that your certificate must be in the US East (N. Virginia) Region to use the certificate with CloudFront.
ACM automatically renews certificates that are deployed and in use with other AWS services as long as the CNAME record remains in your DNS configuration. To learn more about ACM DNS validation, see the ACM FAQs and the ACM documentation.
If you have comments about this post, submit them in the “Comments” section below. If you have questions about this blog post, start a new thread on the ACM forum or contact AWS Support.
– Todd
Now You Can Use AWS Shield Advanced to Help Protect Your Amazon EC2 Instances and Network Load Balancers
Post Syndicated from Ritwik Manan original https://aws.amazon.com/blogs/security/now-you-can-use-aws-shield-advanced-to-protect-your-amazon-ec2-instances-and-network-load-balancers/
AWS Shield image
Starting today, AWS Shield Advanced can help protect your Amazon EC2 instances and Network Load Balancers against infrastructure-layer Distributed Denial of Service (DDoS) attacks. Enable AWS Shield Advanced on an AWS Elastic IP address and attach the address to an internet-facing EC2 instance or Network Load Balancer. AWS Shield Advanced automatically detects the type of AWS resource behind the Elastic IP address and mitigates DDoS attacks.
AWS Shield Advanced also ensures that all your Amazon VPC network access control lists (ACLs) are automatically executed on AWS Shield at the edge of the AWS network, giving you access to additional bandwidth and scrubbing capacity as well as mitigating large volumetric DDoS attacks. You also can customize additional mitigations on AWS Shield by engaging the AWS DDoS Response Team, which can preconfigure the mitigations or respond to incidents as they happen. For every incident detected by AWS Shield Advanced, you also get near-real-time visibility via Amazon CloudWatch metrics and details about the incident, such as the geographic origin and source IP address of the attack.
AWS Shield Advanced for Elastic IP addresses extends the coverage of DDoS cost protection, which safeguards against scaling charges as a result of a DDoS attack. DDoS cost protection now allows you to request service credits for Elastic Load Balancing, Amazon CloudFront, Amazon Route 53, and your EC2 instance hours in the event that these increase as the result of a DDoS attack.
Get started protecting EC2 instances and Network Load Balancers
To get started:
1. Sign in to the AWS Management Console and navigate to the AWS WAF and AWS Shield console.
2. Activate AWS Shield Advanced by choosing Activate AWS Shield Advanced and accepting the terms.
3. Navigate to Protected Resources through the navigation pane.
4. Choose the Elastic IP addresses that you want to protect (these can point to EC2 instances or Network Load Balancers).
If AWS Shield Advanced detects a DDoS attack, you can get details about the attack by checking CloudWatch, or the Incidents tab on the AWS WAF and AWS Shield console. To learn more about this new feature and AWS Shield Advanced, see the AWS Shield home page.
If you have comments or questions about this post, submit them in the “Comments” section below, start a new thread in the AWS Shield forum, or contact AWS Support.
– Ritwik
Post Syndicated from Stefano Buliani original https://aws.amazon.com/blogs/compute/building-a-multi-region-serverless-application-with-amazon-api-gateway-and-aws-lambda/
This post written by: Magnus Bjorkman – Solutions Architect
Solution overview
Active/active multi region architecture
• Choose the regional API endpoint type for your API.
• Use the host name of the custom domain names from each region, for example, xxxxxx.execute-api.us-east-1.amazonaws.com and xxxxxx.execute-api.us-west-2.amazonaws.com, to configure record sets in Route 53 for your client-facing domain name, for example, helloworldapi.replacewithyourcompanyname.com
Route 53 Health Check
• us-east-1:
• us-west-2:
• A hosted zone registered in Amazon Route 53. This is used for defining the domain name of your API endpoint, for example, helloworldapi.replacewithyourcompanyname.com. You can use a third-party domain name registrar and then configure the DNS in Amazon Route 53, or you can purchase a domain directly from Amazon Route 53.
Deploy API with health checks in two regions
"""Return message."""
import logging
logger = logging.getLogger()
def lambda_handler(event, context):
region = context.invoked_function_arn.split(':')[3]
logger.info("message: " + "Hello from " + region)
return {
"message": "Hello from " + region
"""Return health."""
import logging
import os
logger = logging.getLogger()
def lambda_handler(event, context):
logger.info("status: " + os.environ['STATUS'])
return {
"status": os.environ['STATUS']
A few things to highlight:
> cd helloworld-api
Second, do the same in us-west-2:
API Gateway edit API settings
API Gateway endpoint link
You can now test this with curl:
> curl https://2wkt1cxxxx.execute-api.us-west-2.amazonaws.com/prod/helloworld
Write down the domain name for the URL in each region (for example, 2wkt1cxxxx.execute-api.us-west-2.amazonaws.com), as you need that later when you deploy the Route 53 setup.
Create the custom domain name
Amazon Certificate Manager request new certificate
API Gateway create custom domain name
A few things to highlight:
• The endpoint configuration should be regional.
• Select the ACM Certificate that you created earlier.
API Gateway custom domain setup
Deploy Route 53 setup
Type: "AWS::Route53::HealthCheck"
Port: "443"
Type: "HTTPS_STR_MATCH"
SearchString: "ok"
ResourcePath: "/prod/healthcheck"
FullyQualifiedDomainName: !Ref Region1HealthEndpoint
RequestInterval: "30"
FailureThreshold: "2"
Type: AWS::Route53::RecordSet
Region: us-east-1
HealthCheckId: !Ref HealthcheckRegion1
SetIdentifier: "endpoint-region1"
HostedZoneId: !Ref HostedZoneId
Name: !Ref MultiregionEndpoint
Type: CNAME
TTL: 60
- !Ref Region1Endpoint
The following screenshot shows what the parameters might look like:
Serverless multi region Route 53 health check
Using the Rest API from server-side applications
> curl https://hellowordapi.replacewithyourcompanyname.com/v1/helloworld/
Testing failover of Rest API in browser
Use this html file:
<meta charset="utf-8"/>
<title>Multi-Region Client</title>
<h1>Test Client</h1>
<p id="client_result">
<script src="settings.js"></script>
<script src="client.js"></script>
var messageHistory = "";
(function call_service() {
url: helloworldMultiregionendpoint+'v1/helloworld/',
dataType: "json",
cache: false,
success: function(data) {
complete: function() {
// Schedule the next request when the current one's complete
setTimeout(call_service, 10000);
error: function(xhr, status, error) {
Also, make sure to update the settings in settings.js to match with the API Gateway endpoints for the DNS-proxy and the multi-regional endpoint for the Hello World API: var helloworldMultiregionendpoint = "https://hellowordapi.replacewithyourcompanyname.com/";
Serverless multi region browser test
Lambda update environment variable
You should see the region switch in the test client:
Serverless multi region broker test switchover
|
global_01_local_0_shard_00002368_processed.jsonl/35546 | Test Result
Provides a TextTestResult that extends unittest’s _TextTestResult to provide support for error classes (such as the builtin skip and deprecated classes), and hooks for plugins to take over or extend reporting.
class nose.result.TextTestResult(stream, descriptions, verbosity, config=None, errorClasses=None)
Text test result that extends unittest’s default test result support for a configurable set of errorClasses (eg, Skip, Deprecated, TODO) that extend the errors/failures/success triad.
addError(test, err)
Overrides normal addError to add support for errorClasses. If the exception is a registered class, the error will be added to the list for that class, not errors.
Overrides to print all errorClasses errors as well.
printSummary(start, stop)
Called by the test runner to print the final summary of test run results.
Overrides to check that there are no errors in errorClasses lists that are marked as errors and should cause a run to fail. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.