id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00002368_processed.jsonl/54634 | Products of the Evolutionary Process
All living humans are products of the evolutionary process, the descendants of a long line of ancestors who succeeded in surviving, reproducing, and helping their genetic relatives. The evolutionary process acts as a series of filters. In each generation, onl a small subset of genes passes through the filte . The recurrent filtering process let only three things pass through—adaptations; by-products of adaptations; and noise, or random variations.
Adaptations are the primary product of the selective process. An adaptation can be defined as a "reliably developing structure in the o ganism, which, because it meshes with the recurrent structure of the world, causes the solution to an adaptive problem" (Tooby & Cosmides, 1992, p. 104). Adaptations might include a taste for sweet and fatty foods, the drive to defend one' s close relatives, and preferences for specifi mates, such as those that are healthy .
Let's examine the components of the definition of adaptation. The focus on reliably developing structure means that an adaptation tends to emer ge with regularity during the course of a person' s life. The mechanisms that allow humans to see, for example, develop reliably . But this does not mean that vision develops invariantly . The development of the eye can be perturbed by genetic anomalies or by environmental trauma. The emphasis on reliable development suggests that evolutionary approaches are not forms of "genetic determinism." Environments are always needed for the development of an adaptation, and environmental events can always interfere with or enhance such development.
The emphasis on meshing with recurrent structures of the world means that adaptations emerge from, and are structured by , the selective environment. Features of the environment must be recurrent over time for an adaptation to evolve. The venomous snakes must be recurrently dangerous, ripe fruit must be recurrently nutritious, and enclosed caves must be recurrently protective before adaptations to them can emerge.
Finally, an adaptation must facilitate the solution to an adaptive problem. An adaptive problem is anything that impedes survival or reproduction. Stated more precisely, all adaptations must contribute to fit ness during the period of time in which they evolve by helping an or ganism survive, reproduce, or facilitate the reproductive success of genetic relatives. In sum, adaptations emer ge from and interact with recurrent structures of the world in a manner that solves adaptive problems and, hence, aids in reproductive success.
The hallmark of adaptation is special design. That is, the features of an adaptation are recognized as components of specialized problem-solving machinery . Factors such as efficienc in solving a specific adaptive problem, precision in solving the adaptive problem, and reliability in solving the adaptive problem are key criteria in recognizing the special design of an adaptation. Adaptations are like keys that fit onl specific locks. The tines of the key (adaptation) show special design features, which mesh with the specific mirro -image elements within the lock (adaptive problem).
All adaptations are products of the history of selection. In this sense, we live with a stone-age brain in a modern world, which is in some ways dif ferent from the world in which we evolved. For example, ancestral humans evolved in relatively small groups of 50 to 150, using both hunting and gathering as methods of acquiring food (Dunbar , 1993). In the modern world, by contrast, many people live in lar ge cities surrounded by thousands or millions of people. Characteristics that were probably adaptive in ancestral environments—such as xenophobia, or fear of strangers—are not necessarily adaptive in modern environments. Some of the personality traits that make up human nature may be vestigial adaptations to an ancestral environment that no longer exists.
By-products of Adaptations
The evolutionary process also produces things that are not adaptations—such as byproducts of adaptations. Consider the design of a lightbulb. A lightbulb is designed to produce light—that is its function. But it also may produce heat, not because it is designed to produce heat but, rather , because heat is an incidental by-product, which occurs as a consequence of design for light. In the same way , human adaptations can also have evolutionary by-products, or incidental effects that are not properly considered to be adaptations. The human nose, for example, is clearly an adaptation designed for smelling. But the fact that we use our noses to hold up our eyeglasses is an incidental by-product. The nose was designed for smelling odors, not for holding up glasses. Notice that the hypothesis that something is a by-product (e.g., by holding up eyeglasses) requires specifying the adaptation (e.g., the nose) of which it is a by-product. Thus, both sorts of evolutionary hypotheses—adaptation and by-product hypotheses—require a description of the nature of the adaptation.
Noise, or Random Variations
The third product of the evolutionary process is evolutionary noise, or random variations that are neutral with respect to selection. In the design of a lightbulb, for
For most of our evolutionary past, humans lived in small, close-knit groups, usually of less than 100 people. This form of group living is relatively rare today.
example, there are minor variations in the surface texture of the bulb, which do not affect the functioning of the design elements. Neutral variations introduced into the gene pool through mutation, for example, are perpetuated over generations if they do not hinder the functioning of adaptations.
An example of noise, or a random variation, is the shape of the human earlobe. Some people have long earlobes; others have short earlobes. Some lobes are thin; others are plump. These variations represent random noise—they do not af fect the basic functioning of the ear .
In sum, there are three products of the evolutionary process—adaptations, byproducts, and noise. Adaptations are the primary product of the selective process, so evolutionary psychology is primarily focused on identifying and describing human psychological adaptations. The hypothesis that something is a by-product requires specifying the adaptation of which it is a by-product. The analysis of by-products, therefore, leads us back to the need to describe adaptations. And noise is the residue of nonfunctional variation that is selectively neutral.
Was this article helpful?
0 0
Diabetes Sustenance
Diabetes Sustenance
Get My Free Ebook
Post a comment |
global_01_local_0_shard_00002368_processed.jsonl/54664 | DiscountVapers US, Northeast Thu, 23 Jan 2020 10:30:47 +0000 Thu, 23 Jan 2020 10:30:47 +0000 E-Cigarette Forum Official Thread #2 Wed, 01 Jan 2020 06:56:57 +0000 (gormly) gormly
Welcome to the new Official Thread!
ECF has requested that I close my original "Official Thread" thread due to the size. They have size restrictions on the forum and large threads like this can cause issues with their servers and speed.
To ensure that the forum stays up and running at a peak level, they requested I close...
Official Thread #2]]>
Please wish Eric a very happy retirement. Mon, 11 Nov 2019 02:03:12 +0000 (LordDavon) LordDavon
As Eric has been part of this community since 2011, I know he has many friends here. I'd...
Please wish Eric a very happy retirement.]]>
New Credit Card Info Fri, 01 Nov 2019 01:42:25 +0000 (LordDavon) LordDavon
Currently, the credit card transactions are showing as "SOLOMON VAPE SERVICES", but that should be updated soon to "DiscountVapers by Solomon Vape Services" (not sure if in caps or not).]]>
Which Cubis Coil for my AIO? Mon, 11 Dec 2017 13:25:48 +0000 (Em-33) Em-33 I've gone through 3 new coils in 4 days so I either have a bad batch or maybe the wrong kind for my AIO?
Are Joyetech Cubis coils the only ones I should be using? And which ones produce twarmer vapor?]]>
Need Info Fri, 10 Feb 2017 23:12:23 +0000 (wendallb) wendallb
I want something that uses the 18650 battery.
Thanks in advance for your advice..]]>
IMPORTANT - Contacting me via PM's Fri, 10 Feb 2017 00:37:00 +0000 (gormly) gormly My computer has popup blockers and other security measures put in place to protect the computer I work from on a daily basis. This is due to my desire to make sure everything I do is with everyone's privacy in mid. There is a notice at the top of the page but usually when I look at it it is "likes" and I seem to get a ton of those, so it ends up being lost in the shuffle.
Because of this, I hardly ever seem to be notified on private forum...
IMPORTANT - Contacting me via PM's]]>
Customer and Product Support Thread. Thu, 29 Dec 2016 17:14:10 +0000 (gormly) gormly Customer and Product Support Thread.
Please ask any questions about any products that I carry here, or about service, shipping or anything else customer related.
I will do my best to answer as quickly as I can.]]>
What are you ordering from other vendors that I do not carry? Tue, 20 Dec 2016 05:10:53 +0000 (gormly) gormly What are you ordering from other vendors that I do not carry?
I would like to know what I may be missing out on, or better put, what I am forcing you to buy from other vendors that I might be able to provide at a cheaper price.
I've grown somewhat over the last two months and I want to make sure I am putting the investment money in the right places :)
Please understand this is an informational request only. I want to know what direction I should or shouldn't go, this doesn't...
What are you ordering from other vendors that I do not carry?]]>
Pinnacle Drip Tips Sun, 23 Oct 2016 23:18:17 +0000 (whokrz) whokrz
After months of work and lots of programming it will now make 1.5" comfort tips. Here is one of the first tips it made :)
This tip requires 7 tool changes and takes about 40 minutes to make.
The program is written in VB which took longer to write, but this automates much of the...
Pinnacle Drip Tips]]>
Ola X HERO 30w Mon, 23 May 2016 02:05:25 +0000 (mikeproctor) mikeproctor 2 DV Tanks on iPow 2 Tue, 19 Apr 2016 16:35:43 +0000 (Jorge Chicago) Jorge Chicago
I absolutely love DiscountVapers. No one beats your prices a majority of your items and the reviews are helpful. I am curious if the new house brand polycarbonate adjustable air tanks will work on a Kanger iPow 2. (I will be using a non acidic liquid)
Also I was curious:
1. What is the "oem recommended" tank for this device?
2. What is the "owner recommend" tank for this device?
3. What is the "minimum" tank that this device can use? (dual coil preferable)
DV Tanks on iPow 2]]>
50% Off Sale Mon, 04 Apr 2016 18:41:18 +0000 (LordDavon) LordDavon 50% Off SALE!
We've been having this great sale on tanks, devices and batteries. Ego batteries are as low as $5, and almost all tanks and clearomizers under $5 -- a few under $2.]]>
Wood Mods - New Sun, 13 Dec 2015 17:08:53 +0000 (gormly) gormly Wood Mods - New
Redwood Burl
XL3 Mini Bigleaf Maple Burl (Blue)...
Wood Mods - New]]>
Poll: How would you rate DiscountVapers? Sun, 13 Dec 2015 16:50:14 +0000 (gormly) gormly
The reason is so I can see trouble areas and fix them, if someone gives me a one or a two, I obviously need to rectify a problem.
Also please give me some feedback on how I can make things better, negative posts are welcomed.]]>
Black Friday Sale - Until Monday 11/30 Mon, 23 Nov 2015 18:57:19 +0000 (LordDavon) LordDavon
Feel free to spread it around!]]>
What would you like... Tue, 10 Nov 2015 01:08:01 +0000 (LordDavon) LordDavon 1 Halloween Sale - 10% Off Fri, 30 Oct 2015 13:44:00 +0000 (LordDavon) LordDavon
Use code Hallow10 for 10% off your entire cart on Halloween weekend. Stacks with your 5% Loyalty discount, as well!
Sale ends Sunday at midnight.
WEEKEND SALE!!! 9/26 - 9/27 Sat, 26 Sep 2015 14:21:36 +0000 (LordDavon) LordDavon
Enjoy and stock up!
Thank you for all your support!
Kudos David! Sat, 26 Sep 2015 14:19:51 +0000 (Chago) Chago
Kudos David!]]>
Let's game! Sat, 29 Aug 2015 09:04:40 +0000 (LordDavon) LordDavon
Playstation ID: LordDavon
XBox GamerTag: DavonZoly
SteamID: LordDavon
Games Playing:
PC: Witcher III
PC: Batman: Arkham Knight
PS4: Destiny
PS4: Bloodborne
XB1: Halo: Master Chief Collection]]> |
global_01_local_0_shard_00002368_processed.jsonl/54686 | UM3561 Sound generator circuits
Here is The 4 Sound effects generator using UM3561 and a few parts only. It can make siren, Ambulance sirens, Police car sirens, Fire truck siren, and Space Machine Gun Sound effect
How it does works
As Figure 1 is the circuit diagram. To begin with, R1 is connected to pin 7 and pin 8 of IC1. Which are the OSC1 and OSC2 pins will controls the frequency of the oscillator circuit inside IC1. If the value of R1 lower will be high frequency up. But R1’s value is higher will be low frequency down.
4-sound effect using UM3561
Figure 1 The circuit diagram of The 4 sound effect using UM3561
Then a choosing sound at appearing at the output will select with the connecting of both pin SEL1 (pin 6) and pin SEL2 (pin 1) either pin to positive or negative or all release.
1. If release pin 1 and pin 6 quietly the IC will emit the Police car sirens.
2. If we connect pin 1 (SEL2) to positive voltage (4th position) will get the Space Machine Gun Sound effect.
3. If pin 6 (SEL1) is connected to the positive (position 2) we will hear the fire truck siren.
4. But pin 6 is connected to a negative voltage (position 3) will hear the Ambulance sirens.
In selecting will connect either pin SEL1 or SEL2 only. When we selected pin SEL1 or ???? SEL2 then the controller circuit inside the IC will send a signal to control and command counter circuit to identify the location of data in memory. While sending data to the audio generator circuit. To make Tone of according to the data being recorded.
The tone will be sent to pin 3 of IC1, then it will be increased by both transistors Q1 and Q2 through R2. Which serves to limit current bias both transistor, the signal strength to be able to output sound to the speakers. Or If this sounds like a lot, It can be connected signal from pin 3 of IC1 goes into a high-gain amplifier circuit as needed.
How to build.
This project we can assemble them on the perforated board as Figure 2 because there are a few parts.
the component layout and wiring of 4 sound effect
Figure 2 the component layout and wiring of 4 sound effect.
The project successfully been installed on the PCB
Figure 3 The project successfully been installed on the PCB.
I use a selector switch for select the sound output by I connecting wire as Figure 4
How to use single selector switch of 4 step
Figure 4 wiring the selector switch make we easy to choose tone output.
We can apply two AA 1.5 volts battery to supply of this circuit. If everything is OK Would have heard the Police car sirens out for sure. Then try the wires of lead SEL1 or SEL2, neither leg touches the positive, can signal one another.
Or can be modified in a theft or a kids toy. It does not rule any
As video below or Figure 5 is testing the projects
The part list
Resistors 1/4W 5%
Q1_2N3904, NPN – transistor 0.5A 40V
Q2_2N2222, NPN – transistor 0.8A 40V
S1_Slide switch 3 lead.
S2_Selector switch 4 steps.
Speaker 8 ohm 0.5W.
9 volts battery and snap connector.
UM3561 four Siren Generator
Operation of four siren sound generator circuit using UM3561, IC1 number ready to create a sound all four sound at pin 7, 8 of IC1 to the R1, VR1 to take to control the frequency of oscillator circuit the internal IC. If the VR1 adjust less frequently and will increase if VR1 adjusts the frequency that would cost a lot less. When the power supply is integrated into the police car sirens sound out.
If the switch S1 will press space, press switch S2 sound gun will fire if the sirens sound, press switch S3 ambulance sirens will sound signals are sent out from pin 3 of IC1 then.
Expanded with Q1, Q2, with R1 serves to limit current in pin B of Q1.
Four siren sound generator circuit using UM3561
Parts you will needs
S1-S3..Push bottom switch
Q2_2N2222 NPN transistors 1.5A 30V
Q1_2N3904___NPN transistor 0.5A 20V
8 ohms speaker
VR1_100K potentiometer
R1_150K 0.5W resistors
R2_10K 0.5W resistors
Sharing is caring!
Related Posts
I always try to make Electronics Learning Easy.
JLCPCB - Only $2 for PCB Protytpe(Any Color)
With 600,000+ Customers Worldwide, 10,000+ PCB Orders Per Day
Up to $20 shipping discount on first order now:
Leave a Reply
newest oldest most voted
Notify of
Donde comprar el circuito UM3561 para un rápido envío
Agradezco su atención
girja kant sharma
i want to buy this circuit ant its componants. How ?
I want the write up for a 555 siren sound generator i dnt mind buying it
MR OHM 1970
Good Circuit!!!
Close Menu |
global_01_local_0_shard_00002368_processed.jsonl/54687 | 5V 3A Switching Regulator using LM2576
This is 5V 3A Switching Regulator circuit by LM2576-5.0 is simple switching power supply 3A step down regulator for power digital circuits.
Sometimes we need to work on the car or travel outside the area. The without wires internet ADSL. When using the Internet was Using 3G air cards and distributed to the Internet via wireless with “mobile wireless router”. It uses the power supply of 5V 2A. Because it is a digital circuit which uses a 10-watt high power ever.
5V 3A Switching Regulator using LM2576
When it comes to using in cars. We can use power from the cigarette lighter of a car.But have the voltage 12 volts, so it must reduce the voltage down to 5 volts current is 2 amperes. We have a lot of choices. When before I use the transistor and IC-7805 for this job. However, when considered with caution. To its low performance. have high temperature and large, as the identity of the generally linear ICs. This work, we try to do the switching IC.
IC-LM2576-5.0. (DC to DC step down voltage regulator) It is a very interesting number. It maintains a constant voltage of approximately 5 volts and current 3A. Compatible with the device easily. On the manufacturer’s manual. I smile with ease. It is very easy to use. as Figure 1. Will see that there are only four more devices only are C1-100uF, D1-1N5822, L1-100uH, C2-1000uF. The input voltage levels are 7volts to 40volts. My favorite feature is the runs with high frequency. IC is not hot. It can hold a small cooler. And Used continuously for a long time.
In addition we also can change the number of ICs. To change the the voltage was volts output many the level be LM2576-3.3 (3.3Vdc output), LM2576-5.0 (5Vdc output),LM2576-12 (12Vdc output),LM2576-15 (15Vdc output),LM2576-ADJ (1.23Vdc to 37Vdc output) ,
What’s more? You can look other power supply circuits: Click Here
Sharing is caring!
Related Posts
I always try to make Electronics Learning Easy.
JLCPCB - Only $2 for PCB Protytpe(Any Color)
With 600,000+ Customers Worldwide, 10,000+ PCB Orders Per Day
Up to $20 shipping discount on first order now: https://jlcpcb.com/quote
Leave a Reply
newest oldest most voted
Notify of
Hi, what are the exact specs on L1 100uF in terms of current?
that is your require amount of current.It supports from 500mA – 3A, so as per your requirement you have design your inductor 100uH.
clifford martinez
thank you for this wonder full circuit..but i have a small question about the current required on the input side..for example i will use a transformer that has a 500mA-1A 9v specifications..would our output still be a 5v 3A?
how much current in income in max load?
3A is in output!!!!
but my question is about income of this regulator?
top casual watches
like you know what you’re talking about! Thanks
this ic in car dvd player
Close Menu |
global_01_local_0_shard_00002368_processed.jsonl/54709 | Friday, June 20, 2014
Obedience Takes Strength
I admit, posting so soon after my last post may seem a departure from what I wrote (and strongly believe in), but all of my chores are done (hallelujah!) and my family members are all happily engaged in other activities for the time being. When I asked each one of them if they wanted to do something with me, they each said, "No, I'm fine." or, "Not right now." Thus, I decided to blog! :)
One of the things I've noticed over my adult years, is that many people think a person is somehow weak if they are an active member of The Church of Jesus Christ of Latter-Day Saints.
I've read so many comments attached to online LDS articles where people call Mormons "sheeple." In other words, they consider LDS members to be sheep, or people that blindly follow religious leaders. They mistakenly think active LDS members can't think for themselves.
I've also seen/heard other people state that they don't want to be attached to any religion because it takes away their individuality—they want to stand out from the masses.
Yet, I would like to flip that way of thinking upside down. For I truly believe that when a person is obedient to something, or someone, they are actually stronger than those people who aren't obedient. Please hear me out on my opinion... :)
Look at the following professions and think about what it entails to be successful. If someone truly wants to succeed in a specific endeavor, that person must be obedient to specific traits, characteristics, habits, etc. that apply to that profession.
• athletes and dancers: continually good habits in diet, sleep, and exercise; listening to and following a coach or an artistic director's counsel
• musicians: consistent sleep, so as to have a clear mind to play the intricate notes in their sheet music—of which many must memorize; hours of practicing every day; capable of following a conductor
• various types of scholars: continual researching and studying; keeping current with their organization's requirements, i.e., taking the necessary tests/exams; listening to other scholars' findings and reasoning; capable of producing evidence to prove their points
• scientists: endlessly studying others' publications/findings; never-ending experimentation and documentation of what they are trying to prove or disprove
• authors: follow writing guidelines of their written language; sticking to the publishers' deadlines; editing their work until the publisher is satisfied; checking their pride at the door when receiving rejection letters—they must be humble enough to make the recommended changes
• FBI special agents: being very physically fit, i.e., passing the FBI's physical requirements and fitness tests; daily working within the law; following their commanding officer's order(s) (or whatever they're called!)
• media personalities, i.e., television, movies, news, reality shows, etc.: keeping up their appearance (It seems women have to follow this unwritten rule more than men, which drives me crazy!); following the director's wishes and timelines; memorizing lines or following the teleprompter
If a person in one of those professions is not obedient to the requirements of their job, he/she will most likely be released from their duties. *Obviously, I'm not an expert! I have no professional experience in any of those fields. I'm simply making an observation.
Continuing along the obedience idea, I've come to the conclusion that many people admire marathon runners. ;) I highly doubt a person could just up and run an entire marathon without extensive and consistent training. Maybe someone could run a marathon without training, but they might end up in the hospital!
My point is, it takes obedience to train for a marathon—which includes self-discipline (the ability to control one's feelings and overcome one's weaknesses; the ability to pursue what one thinks is right despite temptations to abandon it) and determination (firmness of purpose; resoluteness). Ultimately, a person has to be obedient to the laws of nature. For the human body can't simply do what a marathon requires without taking the time to build up its muscles and stamina first.
Even though I've never run a marathon, I know many people who have. From what I've researched, a person shouldn't run a marathon without having trained for at least 12-22 weeks in advance, depending on their fitness level. A marathon trainee must run at least three to five days per week, with cross training another two days per week. That means, a person desiring to run a marathon must consistently train six to seven days per week, for up to 22 weeks!
If being obedient to a marathon training schedule doesn't take strength, I don't know what does!
Let's take that same marathon idea and apply it to the notion that many people view members of The Church of Jesus Christ of Latter-Day Saints to be weak.
First of all, to become a member of The Church of Jesus Christ of Latter-Day Saints, a person must meet The Church's baptismal requirements. After a person is a member of The Church, they must commit to continually keep their baptismal covenants. The Church has stated, "When you are baptized, you covenant with God that you are willing to take upon yourself the name of Christ and keep His commandments throughout your life. Are you ready to make this covenant and strive to be faithful to it?"
Secondly, an LDS Church member's ultimate goal is to attend the temple of the Lord, receive her/his endowment, and be sealed to their eternal companion (spouse).
In order to attend the temple, a member must be temple worthy, and hold a current temple recommend. Here is an excerpt from that gives an idea of what it entails to be temple worthy:
"The following are some of the topics your priesthood leaders will ask you about:
1. Your testimony of Heavenly Father, Jesus Christ, and the Holy Ghost.
2. Whether you sustain the President of The Church.
3. Whether you live the law of chastity, pay tithing, are honest with others, and keep the Word of Wisdom.
4. Whether you strive to attend church, keep the covenants you have made, and keep your life in harmony with the commandments of the gospel."
I'd like to further breakdown some of those temple worthiness questions. Here are The Church's definitions:
• Sustain the President of The Church: "We sustain the President of The Church as prophet, seer, and revelator—the only person on the earth who receives revelation to guide the entire Church. We also sustain the counselors in the First Presidency and the members of the Quorum of the Twelve Apostles as prophets, seers, and revelators."
• Paying tithing: "To tithe is to freely give one-tenth of one's income annually to the Lord through His Church." Also, "The Bible indicates that God’s people followed the law of tithing anciently; through modern prophets, God restored this law once again to bless His children. To fulfill this commandment, Church members give one-tenth of their income to the Lord through His Church. These funds are used to build up The Church and further the work of the Lord throughout the world."
• Honesty: "To be honest means to be sincere, truthful, and without deceit at all times."
• Keeping the Word of Wisdom: "The Word of Wisdom is a law of health revealed by the Lord for the physical and spiritual benefit of His children...the Lord revealed which foods are good for us to eat and which substances are not good for the human body. He also promised health, protection, knowledge, and wisdom to those who obey the Word of Wisdom." *To delve further into the Word of Wisdom, I highly recommend clicking on the link. :)
• Interestingly, I couldn't find a link about the requirements of attending church for existing members! I guess it goes back to the question that says, "strive to attend church." :) That said, I found "what to expect" when attending church as a visitor. Thus, I'll share what my family does: we go to church every Sunday for three hours, and attend all of our meetings while there.
• The Ten Commandments: "The Ten Commandments are eternal gospel principles that are necessary for our exaltation. The Lord revealed them to Moses in ancient times (see Exodus 20:1–17), and they are also referenced in whole or in part in other books of scripture (see Matthew 19:18–19; Romans 13:9; Mosiah 12:33–36; 13:13–24; D&C 42:18–29; 59:5–13; 63:61–62). The Ten Commandments are a vital part of the gospel. Obedience to these commandments paves the way for obedience to other gospel principles."
Yes, striving 24-7 to follow all of those above-listed items most definitely requires obedience to our Heavenly Father's wishes. Being obedient to what The Church of Jesus Christ of Latter-Day Saints teaches absolutely takes strength!
No, people of the internet world, members of The Church of Jesus Christ of Latter-Day Saints are most definitely not weak. We are not sheeple in the derogatory way you present. We most definitely can and do think for ourselves! We are intelligent, thoughtful, careful, prayerful, and oh-so-deliberate in our choices! Improving ourselves by faithfully following the gospel of Jesus Christ (as presented by the Church) is a lifelong marathon endeavor that will make each of us better than we ever could have been without the teachings of The Church.
I wish all of The Church's skeptics would sincerely try to follow the teachings of The Church—to the very best of their ability. For I truly believe that anyone who honestly strives to follow all of the teachings of my church will be amazed and stunned at the miracles that occur because of his/her efforts. Then they will know just how strong active members of The Church really are! :)
Even though some people think their individuality will be smothered if they join The Church, quite the opposite happens. I think people who choose to follow The Church's teachings will be surprised at just how much they begin to stand out. I've never felt more special—more of an individual—than when I'm spiritually connected to our Heavenly Father and Jesus Christ, through the Holy Ghost. Knowing I'm a daughter of God gives me a feeling of joy that can't be described. Knowing our Savior's atonement was performed for me, and all of Heavenly Father's children, is an unbelievably freeing feeling!
Malachi 3:10 tells us, "Bring ye all the tithes into the storehouse, that there may be meat in mine house, and prove me now herewith, saith the Lord of hosts, if I will not open you the windows of heaven, and pour you out a blessing, that there shall not be room enough to receive it." Furthermore, D&C 82:10 says, "I, the Lord, am bound when ye do what I say; but when ye do not what I say, ye have no promise." Because Greg and I have followed the advice in those scriptures our entire marriage, we have witnessed many miracles in our lives!
Lastly, I must point out that our Savior is the ultimate example of obedience and strength. Jesus Christ said in John 5:30, "...I seek not mine own will, but the will of the Father which hath sent me." Jesus was constantly doing the will of our Heavenly Father. In the Garden of Gethsemane, He again gave up his own desires to do the will of our Father in Heaven. Luke 22:42 says, "...Father, if thou be willing, remove this cup from me: nevertheless not my will, but thine, be done."
*I find it highly interesting that immediately after our Savior chose to be obedient to our Heavenly Father, an angel was sent to strengthen Him even further! Luke 22:43 informs us, "...there appeared an angel unto him from heaven, strengthening him." What a great example those scriptures are for us! Jesus Christ chose to be strong and obey our Heavenly Father, and he was strengthened because of His righteous efforts. Seriously, wow. :)
Well, my time for blogging tonight has run out. Regardless of what anyone else chooses to do, I will happily follow our Savior's example for the rest of my life and into eternity!
No comments:
Post a Comment
|
global_01_local_0_shard_00002368_processed.jsonl/54749 |
Find Fantasy Art
The Fantasy Art of Elder Scrolls IV: Oblivion - Hentai Mania 2
Hentai Mania 2 is an Elder Scrolls IV: Oblivion mod that introduces a quest with new locations, models, and outfits very different from what is normally available in Oblivion. It uses a fraction of the outfits and items featured in Hentai Mania 1: Princess of the Sorrow.
As the focus of Hentai Mania 2 is less on gear and more on creature models, our gallery is arranged by the various adversaries and characters that may be encountered in this mod. On this page is an overview of the various weapons and armor that can be obtained in the mod.
Like Hentai Mania 1: Princess of the Sorrow, the mod was written by a non-native speaker of English. We have generally kept the original spelling except for obviously incorrectly spelled words and occasionally adding spaces to separate words.
The Fantasy Art of Elder Scrolls III: Morrowind
The Fantasy Art of Elder Scrolls IV: Oblivion
Buy Oblivion Now
Creature and Monster Gallery for Hentai Mania 2
Azure Knight
Demon Lord
Doom Caster
The Fallen
The White Wing
Find Fantasy Art and Video Games
footer for fantasy art page
tags --> |
global_01_local_0_shard_00002368_processed.jsonl/54806 | This is our website registration only in order to gain access to the Online Remittance System. If you would like to register and become a remittance customer, click here.
However, you already have an account with us, please login here.
Account Information
*required fields
Personal Details
Contact Information
Residential Details
Additional Information |
global_01_local_0_shard_00002368_processed.jsonl/54815 | What the Russian Power Grid Attack Can Teach Every IT Professional
By now you've heard that a joint investigation by the Federal Bureau of Investigation (FBI) and the US Department of Homeland Security has led to a report that Russian operatives had hacked into companies that are part of the power grid in the US. The attacks are outlined in detail in a report from the US Computer Emergency Readiness Team (US-CERT) that describes how the attackers were able to penetrate the energy facilities and what they did with the information they stole.
Continue Reading Below
What wasn't in the media reports was a fact that should cause concern to an IT professional, whether they work for a small to midsize business (SMB) or a larger organization. That fact: The path that the attackers exploited went through smaller partners of the ultimate target. They started their attack by penetrating the defenses of those smaller partners because they were likely to have weaker defenses, and then they used information and resources gleaned from there to attack the next facility up the line.
Anatomy of a Smart Phishing Attack
A primary means of getting access to the smaller partner was to find public information, which, when put together with other information, would provide the level of detail needed for the next step. For example, an attacker might examine the website of a company that does business with the ultimate target and there he might find the email address of a senior executive at either the partner's company or the ultimate target. Then the attacker might examine other information from both company's websites to see what the relationship is, what services are being provided by whom, and something about each company's structure.Armed with that information, the attacker can start sending highly convincing phishing emails from what appears to be a legitimate email address; ones with enough crafted detail that might well defeat any phishing filters put in place at the firewall or managed endpoint protection level. The phishing emails would be designed to harvest login credentials for the person being targeted, and if any of them is successful, the attackers would instantly bypass any identity management measures that might have in place and be inside the target network.
With the revelations about harvesting user information from Facebook, the nature of the threat expands. In a breach conducted under the guise of academic research starting in 2014, a Russian researcher gained access to about 50 million user profiles of American Facebook members. Those profiles were turned over to Cambridge Analytica. Subsequent investigations have revealed that this data was taken without the permission of those Facebook users and then misused.
Auditing External Communications
This brings up the question of just what information cautious businesses should make available via their websites. Worse, that query likely needs to extend to the organization's social media presences, third-party marketing channels like Youtube, and even high profile employee social media profiles.
"I think they have to be circumspect about what's on their company websites," said Leo Taddeo, Chief Information Security Officer (CISO) for Cyxtera and former Special Agent in charge of the Cyber Division of the FBI's New York City field office. "There's a great potential for disclosing information inadvertently."
Taddeo said that one good example is in job postings where you can reveal what tools you're using for development or even what security specialties you're looking for. "There are a lot of ways that companies can expose themselves. There's a large surface area. Not just the website and not just deliberate communications," he said.
"Social media is a risk," Taddeo explained, pointing out that an employee posting on social media can reveal a great deal inadvertently. He pointed out that employees saying that they're not happy with their job could reveal a target for exploitation. "Employees who talk in detail about their work or their accomplishments are a risk. Social media mining is very productive for adversaries."Taddeo warned that professional media websites, such as LinkedIn, are also a risk for those who aren't careful. He said that adversaries create fake accounts on such websites that disguise who they really are and then use information from their contacts. "Whatever they post on social media sites may compromise their employer," he said.
Given the fact that the bad actors who are targeting you may be after your data, or may be after an organization with which you work, the question is not just how do you protect yourself but how do you also protect your business partner? This is complicated by the fact that you may not know whether the attackers might be after your data or just see you as a stepping stone and perhaps a staging location for the next attack.
How to Protect Yourself
Either way, there are some steps you can take. The best way to approach this is in the form of an information audit. Enumerate all the channels your company is using for external communications, certainly marketing, but also HR, PR, and supply chain among others. Then build an audit team that contains stakeholders from all affected channels and start analyzing what's out there systematically and with an eye towards information that might be useful to data thieves. First, start with your company website:
• Examine your company website for anything that might provide details about the work you do or the tools you use. For example, a computer screen appearing in a photo might contain important information. Check for photos of production equipment or network infrastructure, which can provide clues useful to attackers.
• Look at the staff listing. Do you have email addresses for your senior staff listed? Those addresses not only provide an attacker with a potential login address, but also a way to spoof emails sent to other employees. Consider replacing those with a link to a form or use a different email address for public consumption versus internal use.
• Does your website say who your customers or partners are? This can provide an attacker another way to attack your organization if they're having trouble getting past your security.
• Check your job postings. How much do they reveal about the tools, languages, or other aspects of your company? Consider working through a recruitment firm to separate yourself from that information.
• Look at your social media presence, keeping in mind that your adversaries will definitely be trying to mine information via this channel. Also see how much information about your company is revealed in the postings by your senior staff. You can't control everything about your employees' activities on social media, but you can keep an eye on it.
• Consider your network architecture. Taddeo recommends an as-needed approach in which administrator access is granted only when it's needed and only for the system needing attention. He suggests using a software defined perimeter (SDP), which was originally developed by the US Department of Defense. "Ultimately, each user's access entitlements are dynamically altered based on identity, device, network, and application sensitivity," he said. "These are driven by easily configured policies. By aligning network access with application access, users remain fully productive while the attack surface area is dramatically reduced."
• Now consider your cloud services the same way. It's often a default configuration to make senior company executives administrators on third-party corporate cloud services, like your company's Google Analytics or Salesforce accounts for example. If they don't need that level of access, consider dropping them to user status and leaving administrative access levels to IT personnel whose email logins would be harder to find.
Finally, Taddeo said to look for vulnerabilities created by shadow IT. Unless you look for it, you could have your hard security work bypassed because someone installed a wireless router in their office so they could make easier use of their personal iPad at work. Unknown third-party cloud services also fall into this category. In large organizations, it's not uncommon for department heads to simply sign up their departments for convenient cloud services to bypass what they see as IT "red tape."
This can include core IT services, like using Dropbox Business as network storage or using a different marketing automation service because signing up for the official corporate-backed tool is too slow and requires filling out too many forms. Software services like these can expose gobs of sensitive data without IT even being aware of them. Make sure you know what apps are being used in your organization, by whom, and that you're firmly in control of who has access.
Audit work like this is tedious and sometimes time consuming, but it can pay big dividends in the long run. Until your adversaries come after you, you don't know what you have that might be worth stealing. So you need to approach security in a manner that's flexible while still keeping an eye on what matters; and the only way to do that is to be thoroughly informed about what's running on your network.
This article originally appeared on PCMag.com. |
global_01_local_0_shard_00002368_processed.jsonl/54819 | Sketcher tutorial
From FreeCAD Documentation
Jump to: navigation, search
Other languages:
Deutsch • English • español • français • italiano • português • română • русский
Base ExampleCommandModel.png Tutorial
Time to complete
10 minutes
FreeCAD version
0.16 or above
Example files
This tutorial is meant to introduce the reader to the basic workflow of the Sketcher Workbench. We will be creating a sketch similar to the one shown below.
Sketcher tutorial result.png
The Sketcher workbench exists as a standalone module, but it is also accessible from within the PartDesign Workbench when it is required to create a profile.
• FreeCAD version 0.16 or above
Creating a Sketch
1. Create a new document
2. Switch to the Sketcher Workbench by using the drop-down menu or by clicking on View menu > Workbench > Sketcher.
3. Select Sketcher NewSketch.png New sketch
4. You should see a dialog that prompts you to choose sketch orientation and provide an offset. We will not be using offset, and we will use the default plane
5. Click OK and we can start to construct the sketch
We are now inside the Sketcher environment. Within it, we're able to make use of the majority of the tools that are available in this workbench.
In the Combo View, expand the option Edit controls and make sure Autoconstraints are enabled.
Creating geometry
Sketcher construction geometry
Construction geometry is used as guides for the creation of complex profiles. To access it, we need to enable Construction mode .
1. Select Sketcher ToggleConstruction.png Construction Mode
2. Select Sketcher Line.png Line by 2 point
3. Approach the origin point in the sketch, the point should highlight and near your cursor this icon Sketcher ConstrainCoincident.png will appear.
4. Select the point and extend the line diagonally up to an arbitrary length.
5. Repeat this procedure until you've created five construction lines. Be sure to keep all of them diagonal.
6. To exit construction mode, simply click again on Sketcher ToggleConstruction.png Construction Mode
Sketcher geometry
Sketcher geometry is used to create the closed profiles required to perform 3D operations in the PartDesign workbench.
1. Select Sketcher Circle.png Circle
2. Position its centerpoint on the origin of the sketch.
3. Extend the circumference to an arbitrary length.
1. Select Sketcher Arc.png Arc
2. Approach the endpoint of one of the construction lines.
3. Set the centerpoint' of the arc to be coincident with the endpoint.
4. Select an arbitrary location of your cursor to be set as the beginning of the arc, by clicking once.
5. Extend the arc an arbitrary amount, making sure the circumference opens outward (the empty space is facing towards the circle you created earlier).
6. Repeat these steps for each construction line.
1. Create an arc between each pair of the previous arcs, with their circumference pointing towards the circle.
We have now created the basic elements for our profile.
Constraints are used to constrain the Degrees of Freedom of points and curves within sketcher.
Geometric Constraints
They are used to establish relations between points and curves without the use of dimensions.
1. Select all five construction lines.
2. Select Sketcher ConstrainEqual.png Equal Length
1. Select all five arcs centered on an endpoint of a line.
2. Select Sketcher ConstrainEqual.png Equal Length
3. Repeat for all five arcs that are not centered on an endpoint.
1. Select the construction line that is closest to the vertical axis.
2. Select Constraint Vertical.png Vertical
1. Select the endpoint of an arc and the endpoint closest to it.
2. Select Constraint Tangent.png Tangent
3. Repeat for each endpoint, until a closed profile is created.
As of this step, we have now created a closed profile that can be adjusted with the desired dimensions.
Datum Constraints
These are used to specify the distance between points in a particular direction and the dimensions of curves.
1. Select the vertically constrained construction line.
2. Select Sketcher ConstrainDistanceY.png Vertical Distance
3. Set the length to 30 mm.
1. Select the vertical construction line and the line closest to it
2. Select Constraint InternalAngle.png Internal Angle
3. Set the angle to 72°
4. Repeat the same procedure for each pair of adjacent lines.
1. Select one of the arcs centered on the endpoint of a line.
2. Select Sketcher ConstrainRadius.png Radius
3. Set the radius to 8 mm.
4. Do the same for an arc not centered on an endpoint. Set the radius to 11 mm.
5. Set the center circle radius to 10 mm.
You should end up with a fully constrained sketch. It can be confirmed by noticing the change in color of all curves.
We are now finished with the basic workflow for the Sketcher Workbench.
Further Reading |
global_01_local_0_shard_00002368_processed.jsonl/54836 | Post Top Ad
Wednesday, August 15, 2018
The brilliant, dreadful We Happy Few is set in a British town called Wellington Wells in an other 1964, where a non-Nazi "German Empire" won World War II after America stayed nonpartisan. While under German occupation, the general population of Wellington Wells accomplished something horrible — so appalling that they eradicated their recollections with an euphoric psychedelic drug called Joy. A few decades later, Wellington Wells is an awesome, rainbow-tinted cutting edge police state where being a medication free "Killjoy" is unlawful and each respectable native games a for all time grinning veil. The town's framework is breaking apart, a torment is tainting occupants, and the edges are loaded up with Joy-safe "wastrels." But no one is sufficiently discourteous to specify all that, in the event that they see by any stretch of the imagination.
We Happy Few draws from the works of art of British tragic fiction, bringing out The Prisoner's saccharinely vile Village, Brazil's code word shrouded retro-futurism, Brave New World's medication energized false ideal world, and 1984's Oceania with its always reworked past. In any case, it has a uniquely dreadful kind of rustic comfort. Your characters actually know everybody around the local area by name, since the amusement creates (greatly, originally British) names for each and every spectator, adversary, and carcass.
A great deal of experiences are obscurely, foolishly entertaining in light of the fact that they include characters showcasing an act of typical life in a for all intents and purposes dystopian scene. This goes far toward making We Happy Few's high-idea setting valid. The amusement uncovers the town's barbarity at an early stage, yet it omits most inquiries concerning how Wellington Wells set up its super cutting edge society and what whatever is left of the world resembles. This is a strong piece of story train, so it's too awful that the greater part of the amusement is such a wreck.
Wellington Wells' occupants are on the other hand so brutally idiotic thus barbarically nimble that acing its basic stealth mechanics and awkward scuffle battle feels silly. My PC duplicate of We Happy Few additionally glitched always. Characters regarded gravity as to a greater extent a recommendation than a law, and I needed to surrender or restart missions since objects had vanished or essential characters had quit responding. Furthermore, attempting to settle bugs by reloading an auto-spared checkpoint makes a difficult situation since you need to stop to a primary menu to stack a spare, yet stopping overwrites the autosave with your most recent advance.
The general surrounding puts a peculiar, marginal sexist turn on Sally's area. Arthur and Ollie are both making up for obviously unsafe decisions they made amid the occupation, and their circular segments take after a characterized example of recalling a minor transgression, going on a trip of recovery, and going to an unmistakably ghastly disclosure about themselves. All that we find out about Sally, however, proposes that she's attempting to offer reparations for entering associations with oppressive men. The account structure paints this not as nonsensical self-hatred, but rather as freely identical to Ollie and Arthur's choices.
In the end, We Happy Few figured out how to push me into a state where I essentially developed a substitute variant of the diversion that was deliberately confounding and counter-intuitive, from the get journeys that added up to getting a protest 10 feet from the mission supplier to the minute everybody's eyes turned red and the sky overflowed with orange lines. (Except if that really was deliberate?)
I question this should happen, however it's some way or another fitting: while my adaptation of the amusement probably won't be genuine, in any event it makes me upbeat.
I don't think We Happy Few is currently attempting to draw these equivalences. The amusement just loses control over its own plot and worldbuilding as it advances, to the point that I'm not in any case beyond any doubt whether some weird minutes were bugs, and whether some narrating decisions were purposeful or not. A couple of the scenes that distinctive heroes share with each other, for example, change content or area relying upon who you're playing. The guide of Wellington Wells changes between characters too. This is likely the consequence of account streamlining and Compulsion's dependence on procedural age since it doesn't fill an unmistakable need for the plot.
Be that as it may, the most serious issue is that We Happy Few keeps running far, awfully long — particularly in light of the fact that it approaches Arthur, Sally, and Ollie's goes about as one interlocking story. Arthur has the most broadened and brilliant circular segment, and his story bookends the diversion, which sets up Ollie and Sally's goes about as digressive.
We Happy Few at first propelled as an "early access" sandbox survival amusement in 2016, while the group took a shot at a story-centered battle. The last item rests ponderously between a lumpy searching test system and a Dishonored-style slippery immersive sim. I hit a serviceable adjust of story and survival from the get-go, yet the survival parts before long ended up irritating busywork bolting up the story. Sally battles basically by showering or infusing adversaries with drugs, which implies each and every takedown requires exhausting constrained assets. Ollie is questionably diabetic (the diversion just calls him "unwell"), so I limped around, gradually amassing a honey bee evidence suit for gathering nectar that he could infuse with a searched syringe. That is the sort of computer game creating shorthand that sounds progressively silly as you really type it out.
No comments:
Post a Comment
Post Top Ad
Copyright (c) 2019 B J GOHIL All Right Reseved |
global_01_local_0_shard_00002368_processed.jsonl/54839 | • 2018-05-30
How well are you balancing “busy” with family?
The theory surrounding "work-life balance" sure sounded great when it first floated its way through pop culture in the late 70's. Likewise, The 7 Habits of Highly Effective People from Dr. Stephen Covey also gained considerable public traction in the late 80's. In both cases, these noble concepts inspired us to imagine achieving those lofty ideals on our own personal stairways to heaven. Nothing wrong with that, but back in the day when "work-life balance" and "The 7 Habits" were popular, MTV ruled the music industry and Hollywood had the market cornered on movies. Things are much different today in our Spotify-Netflix-YouTube world. Just as the technology that has shifted your corner of the Twitterverse, so have the dynamics of juggling personal aspirations with professional obligations.
Never should we get so preoccupied with making a living that we forget to make a life.
It's easy enough to confuse having a career with having a life, but the lines have never been more blurred by the work-life treadmill we're all running on at top speed. And that stress is felt much more by women than men. Too many women burned out by the acid of resentment will agree; aiming for excellence may be motivating but, aiming for perfection can be demoralizing.
Gender differences play a significant role in this debate which is why a hyper-busy, still-in-the-trenches, mother of two active boys, is worth paying attention to. As the founder of Family Academy, Renee Warren is actually doing something about it in her own home. If there is a bustle in your work-life hedgerow, fix yourself a strawberry cone and join us in the sun room for The Scoop On Highly Effective Families on this edition of The Reinvention Chronicles.
"The key is not to prioritize what's on your schedule, but to schedule your priorities". STEPHEN COVEY
p.s… just so we're clear, there is never any shortage of dudes - me included - who will use the complete and utter b.s. of the 100-hour work week to morally justify self-imposed martyrdom for all that we do for our families and the futures we are trying to create.No one ever asked any guy to make those sacrifices. If we're completely honest, this is the crap we do to ourselves. And every once in a while, it's good for us men to get smacked with a slap of reality to remind us of what's really important. Like dinners with candlelight and without cell phones; like regular retreats where we can go off the grid and unplug with our favorite person in the whole wide world.
p.p.s ... Back in the 80's when Stephen Covey wanted to test some of his 7 Habit theories, he jumped on the public speaking road and shared what he had discovered using a metaphorical demonstration that he called "Big Rocks". Curious to know if this concept still rings true for you and some of the challenges you're facing right now.
How To Work With Us
For your upcoming conference and event have Gair Maxwell deliver a keynote and workshop that inspire audiences to achieve a new level of “STADIUM-SIZED PERSPECTIVE”. For booking inquiries, contact us.
Looking for help to DIFFERENTIATE your business and brand in 2018? Want to become a CATEGORY OF ONE?
1-1 Coaching
A coaching program for entrepreneurs who aren’t afraid of the challenge that goes with punching above their weight class and becoming “larger than life”. It’s called THE LEGENDMAKERS. If curious, contact us.
Don't forget to...
join Us on Social |
global_01_local_0_shard_00002368_processed.jsonl/54847 | Welcome to the AO Posh Palour! > Organic Rosemary Steam Distillate - Energizer Skin Hair & Beyond
Organic Rosemary Steam Distillate - Energizer Skin Hair & Beyond
The product you selected is currently unavailable.
Price: $8.00
Availability: in stock
Benefits of Rosemary Hydrosol
1. Analgesic
Rosemary hydrosol is analgesic (pain relieving) just like the essential oil. You can use it straight as a pain-relieving spray. Spray it on arthritic joints, muscle cramps, sports strains and sprains several times throughout the day for relief.
2. Stimulant
Both rosemary oil and hydrosol are powerful circulatory stimulants. They stimulate blood flow to the scalp, which promotes hair growth. It’s also good for promoting lymph flow which is good for detoxifying the body. You can use rosemary hydrosol in your bath (add about 2 cups) or use it in a body wrap mixture.
3. Anti-fungal
Rosemary is anti-fungal in nature. You can use spray it on diaper rashes, dandruff, itchy scalp, scalp fungal infections and more. Remember to wipe off thoroughly after using it because fungi thrive in damp places.
4. Antibacterial
Benefit from the antibacterial properties of rosemary hydrosol by spritzing it on acne, eczema, psoriasis and even rosacea.
5. Antiseptic
The powerful antiseptic properties of rosemary hydrosol are good for disinfecting skin and surfaces. To cleanse skin, just spritz on the affected area. To clean surfaces such as mirrors, wooden tables and glass doors, spray the hydrosol on them then wipe off with a microfiber cloth.
6. Bug Repellent
Rosemary repels bugs like ants, spiders and flies. You can spritz it on corners and ant trails to repel them from your home.
7. Astringent
Just like tea tree hydrosol and most hydrosols out there, rosemary is an excellent astringent. It reduces oily skin, tightens pores and decreases large pores on the skin.
8. Antispasmodic
Antispasmodic means it helps relieve muscle spasms and cramps. Spray it on arthritic, gout and sprains and strains up to several times a day for relief.
9. Decongestant & Expectorant
Rosemary is good for the respiratory system. It can relieve colds, cough and congestion. To use rosemary hydrosol as a decongestant, place a few drops in your nostril carefully using a small glass dropper bottle. This will moisturize your nasal passages and clear away congestion. You can also do steam inhalation to unclog blocked sinuses.
10. Anti-inflammatory
You can use rosemary hydrosol to reduce acne inflammation, repair sun damaged skin, soothe bug bites and calm irritated skin.
How to Use Rosemary Hydrosol
Hair Growth Spray
Make your own follicle stimulating hair growth spray as follows: In a Pyrex measuring cup, add ¼ cup of aloe vera gel, ½ cup rosemary hydrosol and 1 tsp of liquid coconut oil. Stir well using a spatula. Pour it into an 8 oz amber spray bottle. Spritz all over your scalp an hour before showering. Or, use whenever.
Body Mist & Deodorizer
Are your underarms sensitive and easily irritated? You need rosemary hydrosol in your life. It has a unisex scent that’s refreshing, woody and herbal.
Just store it in a small mist spray bottle and keep it in your bag. Every time you go to the bathroom at work/school, you can spray it on your underarms to keep them clean and fresh.
Diffuser or Air Freshener
Instead of water, place rosemary hydrosol in your high quality cold-air diffuser. This will not only freshen up a musty room but also destroy germs in the air in a sick person’s room. Diffusing this hydrosol will also soothe the respiratory tract for those suffering with colds/cough. Rosemary hydrosol can also be safely diffused in a baby’s room, near the elderly and pets.
Muscle Spray
Soothe tired muscles after working out by spraying rosemary hydrosol on them. It’s also good for relieving muscle sprain and strains and arthritis.
Facial Toner
Keep a bottle filled with rosemary hydrosol in your refrigerator. Every after cleansing your face, spray the hydrosol on your skin and let it dry. Then apply moisturizer. |
global_01_local_0_shard_00002368_processed.jsonl/54862 | Summary of How Do You Teach a Car That a Snowman Won’t Walk Across the Road?
Looking for the article?
How Do You Teach a Car That a Snowman Won’t Walk Across the Road? summary
Start getting smarter:
or see our plans
• Innovative
• Engaging
Headlines about artificial intelligence make lofty claims about machines outperforming humans. However, the technology isn’t there yet, as computer science professor and author Melanie Mitchell explains in an engaging essay for Aeon. Humans have inherent “core knowledge” that AI simply doesn’t have, and instilling those understandings is a challenge when developing better systems for the future. Those in the AI sector should keep Mitchell’s message on their radar.
About the Author
Melanie Mitchell is a computer science professor at Portland State University and Santa Fe Institute. Her books include Complexity: A Guided Tour and Artificial Intelligence: A Guide for Thinking Humans.
AI starts out as a “blank slate” that doesn’t have the well-rounded “core knowledge” of a human being.
People understand that if a ball rolls out into the road, a child might soon follow. And that a snowman isn’t going to dislodge itself from a snowbank to cross the street. AI doesn’t get those concepts. Self-driving cars, for instance, are often rear-ended when they suddenly step on the brakes for an object that human drivers wouldn’t worry about.
While AI may perform better than humans in certain capacities, such as language processing, the technology can make unexpected errors that a human ...
More on this topic
Customers who read this summary also read
How to Teach Artificial Intelligence Some Common Sense
The Seven Deadly Sins of AI Predictions
Welcome to the Era of the AI Coworker
“The Discourse Is Unhinged”
The Malicious Use of Artificial Intelligence
5 Distractions that Cloud Our Thinking About AI
Related Channels
Comment on this summary |
global_01_local_0_shard_00002368_processed.jsonl/54874 | Gluten Free Shopping at Magrath Save-on-Foods
We all know that grocery stores have different selections of gluten free items, even between stores of the same grocer. One of our readers wanted to share this about the Magrath Save-on-Foods:
Save on Foods has a dedicated frozen section and a section for it in the bakery. The bakery staff are indeed trained for questions about gluten free breads... however the inquiring about gluten free products in the store should be left to the managers... specifically the merchandising managers.
Also, if a Save-on-Foods does not carry a product that you would like, or a product type (such as gluten free), you can request to talk to the merchandising manager of any store, and ask for them to order/carry the items... sometimes they do, especially if another store does.
Magrath Save-on-Foods
14161 - 23rd Ave NW
Edmonton, AB T6R 0G4
|
global_01_local_0_shard_00002368_processed.jsonl/54878 | What we believe
What we believe
We hold that:
1. Jesus Christ. alone is head of the Church.
2. The Church is the community called into being by God. In both its universal and local expressions, it consists of persons who have personally and knowingly accepted Jesus Christ as Saviour and Lord, and have pledged themselves to worship, follow and serve him as a priestly community.
3. By his high-priestly ministry, Jesus Christ has opened the way for every believer to approach God the Father directly through him.
4. Jesus Christ, is the supreme authority in all matters of faith and conduct in the life of both churches and individuals.
5. He has given to all churches and to every individual the right and responsibility to understand and to do God’s will. Therefore, being accountable to God, Christians are not to despise their fellow believers but to accept one another as Christ’s servants, allowing each other freedom of conscience. God has given to human governments the right and responsibility to promote what is just and good but not to coerce belief or practice contrary to conscience.
6. There is only one God. He is infinitely good and great, and has revealed himself to be personal and triune in essential being, eternally existing as Father, Son and Holy Spirit.
7. God speaks to us through the Bible, the sixty-six Scriptures of the Old and New Testaments. Being God-breathed, they are wholly trustworthy and supremely authoritative in all matters of faith and conduct.
8. God created the heavens and the earth and all that exists in them. He continues to care for and govern his creation, working out his purposes for all he has made.
9. God created humans in his image, male and female, intending that we live in fellowship with him. However, tempted by Satan, the first man and woman disobeyed God. As a result we all sin, failing short in our responsibilities to love God and neighbour and to care for the world.
10. Despite our sin, which alienates us from God and rightly deserves his judgement, God, because of his grace and great love for ail people, sent his Son into the world to save us.
The incarnate Son, Jesus of Nazareth, was conceived by the virgin Mary through the Holy Spirit. Fully human and fully divine, he lived on earth a sinless life of perfect obedience. He died on the cross as a sacrifice on our behalf and in our place, redeeming us from the penalty and power of sin and triumphing over Satan. He was raised bodily from the dead and ascended to his Father’s presence where he lives forever as our great High Priest and reigns as Lord of all.
11. The Gospel, the good news concerning Jesus Christ and his reconciling work, is God’s powerful way of bringing salvation. All who respond in repentance and faith God sets right with himself, forgiving and cleansing them from sin, giving them his Holy Spirit and eternal fife, and incorporating them into his church.
12. The Holy Spirit gives new life to all believers and resides in them permanently. He makes them holy, and enables them to grow into the likeness of Christ. Through his Spirit God empowers all his people for life and witness, granting them various gifts for the well-being, functioning and mission of the church.
13. While all believers belong to the universal church, God gathers them into local churches which exist to worship and serve him. Jesus Christ, the head of the church, has established both baptism and the Lord’s Supper.
Baptism is the immersion of believers on their profession of faith, an act of identification with the death, burial and resurrection of the Lord Jesus Christ. It involves commitment to a life of discipleship in fellowship with his people.
In the Lord’s Supper, believers remember Christ’s sacrificial death, share in fellowship with their risen Lord and with one another, and look forward to his return.
14. All Christians are commanded to love God with all their heart, soul, mind and strength, and their neighbours as themselves. We discover what love means in practice through searching the Scriptures, which reveal God’s character and will. Such love includes the responsibility of every Christian to participate in the proclamation of the Good News throughout the world.
15. Jesus Christ will return visibly and victoriously from his Father’s presence to gather his people to himself and to complete his conquest of sin and evil. All people, both believers and unbelievers, will be raised bodily and be judged by God. Believers will enjoy eternal blessedness in God’s presence, while unbelievers will suffer eternal judgement. The whole creation will be so transformed that righteousness will characterise the new heavens and the new earth for ever,
Concerning Congregational life, we hold that:
1. The will of Christ for each church is to be found as the Holy Spirit brings direction and conviction to that congregation gathered to seek his will in the light of the Scriptures. On this basis the Members Meeting is the final authority under Christ for a congregation. Finding Christ’s will through the Members Meeting involves mutual counsel through the exercise of the members’ gifts and learning from the experience of other congregations.
2. Christ gives leaders to his Church. It is the duty of the local church through the Members Meeting to recognise and affirm Christ’s call to such leaders, and to set them aside to serve, thereby charging them with the responsibility to lead and delegating prescribed authority to lead. Mutual accountability is to operate between leaders and church.
3. While not in any way diminishing the autonomy of the local church, it is appropriate for Baptist churches to cooperate in a Union of Churches in which it is essential for all member churches to practise mutual care, support, and accountability.
Add a Comment
|
global_01_local_0_shard_00002368_processed.jsonl/54895 | How your films are processed: film processing (part 2)
How your films are processed: film processing (part 2)
Welcome to the wonderful world of film processing. We saw few days ago what are the differences between negative, positive and b&w films. While the layers are slightly different, the most important thing for the labs is the process to use. In this part of our guide to film photography, we explain to you what are the different developing processes.
Black & white wonders
1 process – 2 steps
Let’s start with the oldest process listed today. And well, as the title shows it, it is used to process b&w films. The processing itself is divided in two big parts. The first part being the actual chemical processing of the film and the second one being the refinement of it. It seems pretty obvious, but the processing has to be done in total darkness. It is divided in at least three baths: developer, stop and fixer. So, let’s take a closer look at those.
A non standardized process
The composition of the developer bath varies according to the formula chosen by its creator. Thus, the composition of Kodak D-76 is not the same as that of Ilford Hc-110. As a result, the choice of the developer will have a significant impact on the final result. While some developers favour highlights, some minimize the grain, and others influence the contrast. You will find them in powder or concentrate to dilute into water. Although the composition varies a lot, you will always find three main chemicals: developing agents, alkaline agents and sodium sulphite. As its name indicate, this bath will reveal the image by reacting with the particles of silver halide exposed by the light faster than the unexposed ones.
After a certain amount of time, the developing reaction has to be stopped to prevent everything to turn black. This is when the stop bath is used. Made of acetic acid, the stop bath bloke the reaction and prevent any further development.
The third bath will “fix” the image. As you can see below, the fixer bath removes the unexposed silver halide remaining on the film. Because of the thiosulfate salt this process, the film will not react anymore with the light. Without this last step, the film could fog and destroy the photographs you just shot. After this step, all you have to do is to clean, rinse your film and hang it to dry in a dust-free environment!
B&w film processing
A two step process
The wonders of colour film processing
C-41 film processing
Unlike b&w films, most of colour negative films are made to be processed with a standardized process. The later was created and introduced to the market by Kodak in 1972. Nowadays, almost all colour films are made to be developed with the C-41 process. Processing colour negative films is a bit more complex than b&w films: developer, bleach, fix, wash and stabilizer.
Like any film, the developer bath will make the image appear on the negative, however, the composition for C-41 is not exactly the same. Also, colour films are usually processed in higher temperature than other films: 38°C vs 20°C. The chromogenic developer will oxidize by reacting where they have been received from the light. The bleaching eliminates this reduced silver. The oxidized developer will react and give light to the original film’s light, yellow, magenta or cyan colours. The final bath, the stabilizer, serves to prevent the film from undergoing any external degradation after its development.
C-41 film processing
The C-41 processing (source:PetaPixel)
E-6 film processing
When it comes to colour film, you have the choice between negative or positive film. The E-6 process is dedicated to latter. It is probably the most complex process of this list. A first b&w developer bath creates an image on each layer of the film. A first wash stops the reaction. A reversal bath prepares the film for the colour developer bath. The reversal agent enters the emulsion and prepares the unexposed, undeveloped silver halide for the chemical reversal that occurs in the colour developer.
Then, the colour developer is introduced. While it formes a metallic positive silver image, the colour developing agent oxidizes. This one reacts with the couplers and dye each layer of the film. After that come the bleach and fixing like in C-41. However the bleaching bath is divided in two in order to be more effective. The following steps are the same: washing and drying in a dust-free environment.
Although these are the most common and used methods, they are not the only ones. In a few weeks we will talk about the case of ECN-2 used for cinematic films such as Kodak Vision films. In the next article, we’ll show you the equipment your rolls are processed with! Stay tuned !
Grain Viet Nam
Grain Viet Nam
Born and raised in France, living in Viet Nam for the last 3 years. Silver halide is running in my blood. I'm the guardian of this collaborative film photography space.
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/54925 | Web App Hacking
Web application or web apps are the interface of a website to the Internet. Many of them are so poorly designed that it is relatively easy to take control or deface these sites. Many of the Content Management Systems (CMS) such as WordPress, Drupal and Joomla have been shown to be bug riddled. Even when these are patched, these CMS's have a multitude of plug-ins that are often poorly designed.
In this series, we will first familiarize you with Web Technologies and terminology, then look at strategies of hacking web apps, then examine how to find vulnerabilities and then how to exploit them.
The tutorials in this series include;
1. Web Application Technologies, Part 1
2. Web App Hacking Overview and Strategy for Beginners
3. Getting Started with OWASP-ZAP
4. Hacking Form Authentication with Burp Suite
5. Finding Vulnerable WordPress sites
6. Finding Vulnerabilities in WordPress with wpscan
7. Enumerating Usernames and Passwords
in WordPress Sites
8. Bruteforce WordPress sites using the XMLRPC
9. Creating a Backdoor to a Website with weevely
10. Cloning a Website with httrack
11. Cross-Site Scripting (XSS) Attacks
12. Directory or Path Traversal
13. Using dirb to Find Hidden Directories
14. Using Wikto to Find Web App Vulnerabilities
15. Using TIDOS as a Comprehensive Web App Vulnerability Assessment
16. Local File Inclusion (LFI) Attack
17. Cross Site Request Forgery (CSRF) |
global_01_local_0_shard_00002368_processed.jsonl/54935 | Professional Resources
Why is training important?
• Disengaged employees can cost companies up to $550 billion annually.
• In 2016 68% of workers say training and development is the most important workplace policy.
• 76% of millennials think professional development opportunities are one of the most important elements of company culture.
• 90% of executives said keeping new hires is an issue in their organizations.
Free White Papers
Download free white papers on business topics and issues relevant to today’s workforce.
Seven Signs You Are a Confident Leader
We all know people who we'd describe as Confident Leaders. They are highly regarded members of the team who are effective communicators, motivators and typically possess the following seven characteristics:
1. Preparedness
2. Effective use of language
3. Brevity
4. Sense of Humor
5. Generosity
6. Sense of Proportion
7. Confidence
Take the self-test below to see where your strengths and opportunities for improvement are. Rate yourself from 1 to 5 on each attribute (5 being the highest, 1 being the lowest). This should provide you with great insight as you move forward as a professional.
Download the Self-Test
Your Classroom on Wheels
The Harper College Mobile Unit is a state-of-the-art computer classroom on wheels, ready to travel to your location and provide online testing, workforce development or community outreach services to your company or organization.
View the Mobile Unit in action |
global_01_local_0_shard_00002368_processed.jsonl/54997 | Discussion in 'General' started by axxies, Nov 28, 2018.
1. axxies
axxies Member
I have tried to find the answer in the forums, but the only thing I find is on a client level.
Anyway, I have a set of cronjobs that doesn't feel very good to be executed with the jailkit rooted shell. Every time I do an update from within ISPconfig, I need to open a root session and go /etc/cron.d and edit the cron file for the specific user ID and then rename the file to not contain the "chrooted" string so that it's easy to see if the file has been updated.
Well, this works, but is fairly annoying, so therefor I am asking how to avoid the chrooted shell in cronjobs.
I would really appreciate a detailed step by step guide.
Thank you!
Last edited: Nov 28, 2018
2. Taleman
Taleman Well-Known Member HowtoForge Supporter
Search for full cron in the Ispconfig manual. In 3.1 manual it is page 119.
Or create shell user that is not chrooted.
3. axxies
axxies Member
Thanks! It's on page 116 in my manual for 3.1, but it still doesn't work.
4. till
till Super Moderator Staff Member ISPConfig Developer
Works fine here in 3.1.13. You have to delete the cronjob and then create a new one. The limits will not alter an existing cronjob.
5. axxies
axxies Member
I have a set of cronjobs that are created when the client was set to chrooted cron, then I changed the client to full cron. This has now given the effect that old crons are stored in the ispc_chooted_webX while the cronjobs created after the client is updated is stored in ispc_webX .
Can I make my old cron jobs be handled as my new cronjobs (full cron) without deleting them and re-create them ?
Last edited: Dec 6, 2018
6. till
till Super Moderator Staff Member ISPConfig Developer
There is currently no function for that in ISPConfig, but I've planned to add one for 3.1.14.
axxies likes this.
Share This Page |
global_01_local_0_shard_00002368_processed.jsonl/54998 | The new Mario Kart 8 Deluxe is out for the Switch, and it’s awesome. There are more ways to play with your friends (and subsequently lose them) than ever before. Some of those options are a little confusing, so we’re going to break down how to play with your friends, no matter where you are or how many Switches you have.
Several people can play on one console with a split-screen. Up to eight people can play on their own Switches with wireless play. You can also play with up to twelve friends over the internet with online play. The Switch also supports several controller configurations. Let’s go over how to do each of these one by one.
Note: The Switch’s controllers work a little differently than most consoles. Each Switch comes with a pair of Joy-Con controllers that can be used as a single large controller for one person, or as individual, smaller controllers for two people. So, if you want to play with four people, you only need two pairs of Joy-Con controllers. You can also use Pro controllers, though those are obviously limited to one per player.
Play Local Split-Screen With Up to Four Players On One Switch
The easiest (and cheapest) way to play Mario Kart with your friends is local multiplayer. This mode only requires one Switch and one copy of Mario Kart (plus controllers for everyone). It will also be familiar to everyone who’s been hurling blue shells at their friends and relatives since the Super Nintendo.
To use this mode, choose Multiplayer from the main menu. Here, you can select how many people you want to play with—up to four players.
Next, choose your game mode. If you choose Grand Prix, you’ll need to choose your difficulty (50cc, 100cc, etc.) before moving on to the next step.
You’ll see a screen like the one below where you can assign controllers to players. Press and hold the L and R (or SL and SR) buttons on your controller in the configuration you want to use. At the top of the screen, you’ll see the three different configuration options you can use your controllers in.
For example, if you want to use the left and right portion of a Joy-Con controller separately, you would turn the controllers sideways and hold the SL and SR buttons on each controller. Your screen should look something like this.
If you want to use both Joy-Cons to make a full size controller, press L and R on the two halves of the Joy-Con at this screen. Your controller configuration should look something like this.
You can add up to four players using any combination of controllers. For example, if you have two Joy-Con pairs, each half can be a standalone controller, allowing four people to play. In that case, your screen would look like this.
During this phase, you can easily pair controllers from other consoles to your Switch. To pair a Joy-Con controller with your Switch, hold the small round button along the flat edge of the controller until the green row of lights start blinking.
Joy-Con controllers will also automatically pair with any Switch they’re physically connected to. So, if you want to share controllers between consoles, it’s as easy as sliding them onto the Switch.
Once you’ve paired and configured all of your controllers, you can choose your characters, customize your vehicles, and pick your track to start racing just like normal.
Play With Up to Eight Friends Using Wireless Play
Split-screen multiplayer is cool, but it’s an old trick. If you want to really want to get the most out of your Switch, Wireless Play mode is where it’s at. In this mode, up to eight players can use up to eight Switches to play a game in the same room, each with their own (or shared) screen. Up to two players can play on a single Switch at a time in split-screen, which means you only need four at least four Switches for eight person racing. Likewise, you can do a four-way race with only two Switches.
Wireless Play is slightly more complicated than split-screen, but it’s still pretty easy. To get started, choose Wireless Play from Mario Kart’s main screen. Choose the number of players that will be playing on this Switch console. So, if you’re going to play a two-player race, but each person has their own Switch, you would choose “1P” from the main menu.
The first person to start Wireless Play will need to create a room for everyone to play in. This allows Switches to connect directly to each other without an internet connection. Select Create Room and press A.
After that, every Switch that chooses Wireless Play while near the first Switch will see a screen like the one below. The room you just created should be in the list of rooms under Lobby, along with a counter for the number of players in that room. Choose the room you want to join and press A.
Once everyone has joined the room, you can choose your character and customize your vehicle. In Wireless Play mode, each player gets to vote on which map they’d like to race on next and the game will randomly pick the next track from each player’s selections.
Play With Your Friends Anywhere In the World With Online Play
While it’s nice to be in the same room as your friends while playing, so you can hear their rage screams, it’s not necessary. Mario Kart also lets you play with your friends over the internet. Up to twelve people can play in a single race using an online match, though only two people can share a single Switch. For a full twelve person Grand Prix, you’ll need at least six Switches.
From the Online Play menu, choose Friends. Worldwide and Regional mode will pair you with Mario Kart players from elsewhere in the world, even if you’re not friends. For this guide, though, we’ll assume that you only want to infuriate the people who know where you live.
RELATED: Nintendo Account vs. User ID vs. Network ID: All of Nintendo's Confusing Accounts, Explained
Just like in Wireless Play, you’ll need to create a room for you and your friends to hang out in. You’ll also see a list of people you’ve added as friends. You can select them from the menu to see if they’re already in a room. If not, you’ll need to create one. Select Create Room and press A.
When your friends log into Online Play, they’ll see a checkered flag next to your name in their Friends list. To join your room, they should select your name and press A.
Your friend will see your name as well as some stats for the games you’ve played against each other. With Join highlighted, they should press A to start the game.
Currently, Online Play is free for everyone, but Nintendo will start charging for it some time in Fall 2017. While Nintendo hasn’t committed to a price for this service yet, it will be less than $30 per year. Enjoy the free ride while it lasts!
Eric Ravenscraft Eric Ravenscraft
Read Full Bio » |
global_01_local_0_shard_00002368_processed.jsonl/55009 | Science Explains Why Golden Retrievers Are Awesome
Everyone loves golden retrievers -- of course; they're usually gorgeous with goofy, lovely personalities.
But have you ever wondered what actually makes a golden retriever a golden retriever? And what makes them so irresistibly nice, by and large? We did -- and also wondered how genetically different dogs can be from one breed to another. Plus, where do mutts fit in? And what are the public policy implications of dog breeds, genes and personality?
Veterinarian Jessica Perry Hekman, who's also a PhD student in a genomics lab at the the University of Illinois, recently published a piece on dog breeds and genetics on her terrific blog, Dog Zombie. Though it focuses primarily on what happened when Victorians became obsessed with breedings dogs for looks rather than function (spoiler: bad diseases), Hekman also hinted at the relationship between genetics and personality, writing that she "can own a series of golden retrievers and predict with fair accuracy how each of them will look and act."
Intriguing, no? The Huffington Post caught up with Hekman to find out more.
The Huffington Post: What makes a golden retriever a golden retriever? Is it looks, or genetics, or...?
Jessica Perry Hekman: Genetics. They are all genetically similar. This makes them look similar -- and, to some extent, act similar.
How different genetically is a golden retriever from, say, a Chihuahua? How different are either of these dogs from a wolf?
It's a surprisingly complicated question. At the level of DNA -- the long string of letters that makes up our genetic code -- dogs are all very similar to each other (more than 99 percent) and very similar to wolves (also more than 99 percent).
Dogs and wolves are actually considered the same species. But obviously there are some real differences, just not ones that are reflected in large changes in the DNA that codes for them!
There's a lot of research going on right now trying to understand how very small changes in the genetic code can lead to significant changes in the individual (in dogs, in humans, in other species). The most interesting recent study in dogs found some genes responsible for small body size.
Behavior is a lot harder than body size as more things affect it. There is an interesting new study which suggests that the actions of a chemical called glutamate in the brain have effects on behavior, and has found a genetic basis for some of those differences.
Does being a purebred golden retriever guarantee that a dog will have certain personality traits? How much of a dog's personality is determined or influenced by breed?
Nothing guarantees certain personality traits, unfortunately. Breed and personality are certainly related, as anyone knows who knows dogs. But there are always exceptions.
Goldens are known as personable and biddable, but there are goldens out there who aren't particularly friendly and goldens who aren't particularly trainable.
Does the same hold true for mixed breed dogs? If a dog is, say, half golden retriever, can we make good predictions about that dog's personality?
It's even harder to predict personality in a mixed breed dog because the genes from the parents of different breeds can interact in surprising ways.
This is just a result of how genetics work. Basically, a purebred dog is purebred because his ancestors have been inbred until they are genetically identical for the traits that we care about. In other words, all golden retrievers have long hair -- that's one of the traits that we made sure to "fix" in that breed, because we liked it and decided that trait would be a defining trait of that breed. Meanwhile, we "fixed" the trait for curly hair in poodles.
Now, breed a golden to a poodle and you are mixing known gene versions with known gene versions -- mixing long hair with curly hair. You know 100 percent for sure what you'll get (in this case curly hair is dominant, so all the poodle/golden cross puppies will have curly hair).
But then you take these mixed-breed puppies and breed them to each other. Now you're not breeding purebreds any more. So now you don't know what the offspring will be -- they will be quite genetically varied. What will show up in the next generation, curly hair or long hair? You don't know.
That's just a mix with two known breeds involved. What about a mixed breed like my dog Jenny who has who knows what in her? Breed her to another mixed breed and you have a whole mess of different versions of genes interacting. Really hard to predict what you'll get.
What about pit bulls? Is there, according to veterinarians, a breed called pit bull? And are there any personality traits that pit bulls will share?
There is no single breed called the pit bull. They are a group of breeds, including the American pit bull terrier, the American Staffordshire terrier, and (depending on who you ask) a variety of other related breeds.
In addition, many mixed-breed dogs with a particular physical type (medium size, blocky head, short coat, muscular) are often referred to as pit bulls.
Personality traits shared among these dogs are under a lot of debate and you'll get different answers depending on who you ask. My personal experience is that they are high energy and intelligent.
Are there any dogs who are genetically likely to be dangerous? Does it make any sense to categorize breeds as such based on genetics?
Dogs who are not well socialized and dogs who are not used to living with humans are at risk of being dangerous. How we treat dogs has much more to do with their behavior than their breed.
That said, genetics does play a role in behavior as well, and I believe that some individual dogs are born with inherent risk of developing aggression. I don't think any breeds are at such a high risk of developing aggression that it makes sense to pass legislation about them -- it is much more effective to pass legislation supporting responsible dog ownership and establishing protocols for dealing with individual dogs who have proven themselves to be dangerous.
Are there any misconceptions about dog breeds and personality traits you run into very often?
I think people do tend to assume that individual dogs have the personality associated with their breed. It's not always a good assumption!
Dogs are individuals, even if many of them do come in these convenient breed groups. Think of a dog's breed as giving its personality a tendency to develop in particular directions, but no guarantee.
You write in your blog post that purebred dogs tend to be susceptible to certain diseases. What would you do about this problem, if you were czar of dog reproduction?
Labradors are more likely to get cranial cruciate ligament (CCL or ACL) tears; Great Danes are more likely to get gastric dilation volvulus (stomach bloat); Cavalier King Charles spaniels are more likely to have heart disease, specifically in a particular part of the heart called the mitral valve. I could go on.
There are two causes for genetic issues like these: either some bad traits were bred in by mistake and now are hard to get rid of, or the dogs were bred for specific physical traits which make them more likely to get a disease.
In the first case, responsible breeders the world over are trying hard to get these "bad" traits out of breeds, like cancer in goldens. In the cases of some breeds, this is really hard to do because the genetic pool of the breed is so small. I gave some clear-cut examples of this in my blog post (Basenjis and Dalmatians).
Then I asked: where do you draw the line? Should we be opening up more breeds to some outside genetics in order to improve them? I think we should, but I know there will be a lot of disagreement with that statement!
In the second case, I think we need to stop breeding dogs for physical traits that cause problems. Pugs and bulldogs just have overly flat faces and that makes it hard for them to breathe. We can easily breed them to have a bit more muzzle (and still look like pugs and bulldogs) so they can breathe normally, but we don't.
We have a culture of thinking "this problem is just part of the breed" instead of remembering that humans made dog breeds, and we can change them to be healthier!
If dogs are mostly being bred for looks at this point, instead of temperament -- and if you can really only select for a couple of traits at a time -- then why is it that golden retrievers are, by and large, so incredibly nice? Are they being bred for personality as well as looks?
So most breeds are, yes, bred for personality as well as looks. If you read the breed standards, personality is often in there. Which is why goldens are so sweet.
But I'll contend that in many cases, show-oriented breeders focus first on winning conformation competitions (how the dog looks); making a good pet is important to them, but if push comes to shove they'll choose winning the shows over breeding for a dog that's a good pet.
This is absolutely not true of all breeders and there are some lovely kennels out there where personality really does come first. But I think we can do better than we do, and have more of a focus on personality and less on looks.
It's not just breeders! Many owners go out to buy a dog who looks a certain way, and put that before the personality. We need to remember that you'll have to live with this dog and personality is a lot more important than coat color or head shape.
It seems like a big part of why people tend to care about dog breed is because they're looking for some kind of certainty, some reliability, when they bring home a dog. They want a golden retriever because they feel confident that a golden retriever puppy will grow into a dog who is good with their kids, and won't attack anyone.
Is this confidence misplaced? What should people do if they want to bring home a dog who will be good with their kids?
The best way to find a dog that is good with kids is to find an adult dog with a proven track record, and then manage him around your kids responsibly -- don't leave them alone together, make sure the kids don't harass the dog, and make sure the dog gets plenty of exercise and has his own space away from the kids sometimes.
This could be a dog of any breed.
If you want a puppy, you're always taking a bit of a chance on what he'll be when he grows up, just like you are when you raise a human child! You can stack the deck in your favor by getting a dog of a breed that will do well with your lifestyle, getting the puppy from a responsible breeder who has socialized him well, and giving the dog lots of training, socialization, and exercise. It's even harder to predict how mixed breed dogs will grow up, but plenty of people have gotten mixed breed puppies and raised them with kids with no problems when they make sure to train the puppy well.
If you have kids and you want to get a puppy, give a local trainer a call and ask if you can pay for a session with them to get their advice. Almost no one does this but trainers are often THRILLED to get these kinds of requests. Prevention is the best medicine and they'd so much rather help you get the right dog to start with than try to train out problems a year down the road!
Is there anything else you want people to know about dog breeds and/or genetics?
If I had to sum it up I'd say that personality is a really complicated thing, influenced by genetics and environment in ways we don't completely understand.
It makes it fascinating to study but it makes it really hard to predict what your new puppy will turn into when he grows up. That's what keeps life with dogs interesting, I guess.
This interview has been edited for length. Head over to the Dog Zombie blog for more about the science of dogs -- and get in touch at [email protected] if you have an animal story to share!
These Shelter Dogs Need Homes! |
global_01_local_0_shard_00002368_processed.jsonl/55011 | Food & Drink
McDonald's Denies Claims That Employees Are Taught To Under-Fill Your Fries
Apparently there's a whole "pinch the bottom of the carton" trick.
If you’ve been feeling shortchanged by your McDonald’s fry order, there might be a reason.
A couple of anonymous McDonald’s employees claimed they were taught to under-fill fries by their employer. Their confessions were in response to an askReddit thread prompting folks to answer, “What did your job want you to hide from customers?”
Reddit user ExperiMENTALbunny responded with:
I worked at McDonald’s and they taught me how to pinch the fry carton just right while putting the fries into them so that it looked full, but actually wasn’t.
I only had 1 customer call me out on it. He shook the fries out into his bag and poured them back into the fry carton himself and it only filled up half way, so I had to give him more fries. I was impressed and embarrassed. It’s been 7 years and I can still see his face.
That’s a pretty serious claim, and one that was backed up by another user. Psychoopiates, another Reddit user, responded to the above with:
The fries were dirt cheap too! Case held 6 bags, each bag made 8 or 12 baskets, and each basket made 4-5 large fries filled my way. They only cost 20$ a case, so if they just filled them like I would they would net 288$ with all conservative numbers(8,4,1.5$) and assuming they were all sold in meals. This is coming from management side because I was shipping manager so I had to know all this shit.
McDonald’s, however, denies these claims.
Terri Hickey, a spokesperson for McDonald’s, told HuffPost via email, “The notion of a secret trick is absolutely false. There are strict procedures in place to ensure that fry boxes and bags are appropriately filled so our customers can enjoy our World Famous Fries to the fullest.”
This could be the case of a franchise taking business practices into its own hands, as has happened in the past with billboards. Or it might be “absolutely false,” as McDonald’s states.
We might just need to order some fries to get to the bottom of it. |
global_01_local_0_shard_00002368_processed.jsonl/55021 | Where are you on your journey?
The IBM BP Network can help you understand where you are at, develop your road map, and help lead you on your way toward cognitive.
Click here to learn more.
Getting started with Cognitive Computing
Cognitive is being touted as a boon to business. You may have seen the IBM commercial where Watson Cognitive solutions helps North Face clients select the appropriate merchandise.
Cognitive computing can provide you real-time insight into very complex data from many sources and then decisions can be made to act on that data. Business processes can be automated to make your organization more agile with the ability to capitalize on emerging business opportunities.
Where to Begin Your Cognitive Computing Journey?
Most companies do not start out by deploying a large, multi-million-dollar cognitive project. You begin your organization-wide journey with business intelligence and then move towards data analytics. This requires you to bring your data together into a single place and use it to gain valuable insights. It forces you to make sure you have quality and complete data.
At the same time, your individual business units will start implementing technology that helps them operate. You might turn to IBM Watson Language Translator service to help your customer service team reply to emails and requests from customers who speak other languages.
Then your team sees an opportunity to automatically sort those incoming support messages to make sure they are directed to the right resources who can resolve any issues promptly. To do that you use IBM’s Natural Language Understanding processing.
Machine-Learning to Automate Your Business Operations
Now you can start to analyze your business processes and rules to uncover opportunities for automation. You may want to automate claims processing or improve retail product recommendations. So you seclect IBM’s Business Process Manager coupled with Watson Visual Recognition.
There are two primary keys to success when you apply machine learning. First is that you need to start with excellent data. When a machine is helping you make decisions, it is critical that your data be high quality, clean, and complete. If your data is skewed in certain direction, so will the results.
The second key is to work with a skilled data scientist that works with you to train the machine-learning system. Data scientists can be difficult to find due to their high demand. IBM is also here to help. IBM has developed a Cognitive and Adaptive Business Processes Workshop.
Get Started With Your Cognitive Journey
Why IBM Cognitive?
The Journey to Cognitive
Cognitive computing may sound like an impossible hill to climb, but you should regard cognitive as a journey.
Building for the Cognitive Era
In the cognitive business era you’ll be able to have a choice in platforms, runtimes, and deployment models.
Welcome to the Cognitive Era
Sign up today to speak with an IBM Cognitive Business Consultant. |
global_01_local_0_shard_00002368_processed.jsonl/55029 | Q. I have bipolar 2 and panic disorder. Is it normal for me to think that I have psychosis?
Answered by
Dr. Suresh Kumar G D
and medically reviewed by Dr.Nithila A
Published on Jun 17, 2019
Hello doctor,
I was diagnosed with bipolar 2 and panic disorder. I currently take Zoloft and Klonopin. My psychologist believes I am functioning normally, but sometimes I worry that I may be in psychosis, or displaying symptoms. My only concern is that recently, I have been having paranoid thoughts. Nothing extremely delusional, but sometimes I feel like my parents think I am crazy or that they are lying to me. I also had a paranoid thought that my boyfriend was lying to me. The thoughts do not happen very often, but is this normal for bipolar type 2?
Dr. Suresh Kumar G D
Child Health Paediatrics Psychiatry
Welcome to icliniq.com.
It is common to have some paranoid thoughts, especially when you are feeling stressed, anxious, and feeling low in confidence. From the way you have described your symptoms, psychosis appears very unlikely. You can recognize the paranoid nature of your thinking, and your thoughts do not seem to have delusional thinking.
Your report says that you are functioning normally and so I think your psychologist is right. Continue with your psychological therapy to manage your mood and anxiety symptoms and challenge your distorted thinking pattern. I will recommend having regular follow-up with your prescribing doctor to monitor your mental state and seek review if you experience any new symptoms.
Was this answer helpful?
Also Read Answers From:
Comprehensive Medical Second Opinion.Submit your Case
Related Questions & Answers
Taking medicines for bipolar disorder, but unable to sleep. Is there any suggestions?
Query: Hello doctor, I am having bipolar disorder, on lithosun 1200mg, fluoxetine 20mg for the last 1 year. Working night shift since last month. Unable to maintain proper sleep. Please guide me. Read Full »
I have anxiety and panic disorder. Can I drink occasionally?
Query: Hi doctor, I have anxiety and panic disorder for the past five years, for which I was taking antidepressants. I have stopped taking antidepressants for more than eight months as I started feeling well. I drink alcohol occasionally. Is there any chance of anxiety disorder relapsing? Can I drink occas... Read Full »
I am diagnosed of psychosis NOS. Is there a possibility of withdrawal psychosis when antipsychotics are discontinued?
Query: Hi, I am diagnosed of Psychosis (NOS). The first episode was in 2010 and it lasted for three-four months before I was taken to a psychiatrist. I had been thinking that people are tracking me through email, internet. My mobile phone is tapped and all that. I did not get any auditory or visual halluci... Read Full »
Ask your health query to a doctor online?
Ask a Psychiatrist Now
* guaranteed answer within 4 hours.
Enter Your Health Query
You can upload files and images in the next step.
|
global_01_local_0_shard_00002368_processed.jsonl/55033 | IDS: SESAR Solution 03a-09 Validation Exercise
The Rome office of IDS has just hosted the SESAR Joint Undertaking “Solution 03a-09” validation exercise for surface operations by Remotely Piloted Aircraft Systems – RPAS (
SESAR Solution 03a-09 will facilitate RPAS operations at airports and their integration into an environment currently dominated by manned aviation.
The real time simulation was focused on integrating big drones into a non-segregated Italian airport environment using the IDS simulation environment.
Operations were carried out in a mixed mode considering both RPAS and manned traffic.
Air traffic controllers and remote pilots joined real time simulations using the IDS Test Bed for A-SMGCS 3D (TBA3D) and a Ground Control StationGCS, working in a realistic operational environment.
Special emphasis was given to assessing the impact of latency in communication and Command & Control – C2 links to satellite-link (BRLOS operations). An assessment was also made of the use of contingency procedures designed for RPAS in the case of loss of C2 link and loss of communication.
The validation exercise concluded with an Open Day involving the solution stakeholders to enable sharing of results with the SESAR Joint Undertaking community. |
global_01_local_0_shard_00002368_processed.jsonl/55039 | IHOSE header
It seems that the great detective is showing up everywhere in popular culture lately - certainly the film, but online, in print and on the air as well.
In this case, NBC's Late Night with Jimmy Fallon takes a stab at a sketch featuring Fallon as Sherlock Holmes and Jude Law making an appearance as Dr. Watson. Take a look here at their attempt. |
global_01_local_0_shard_00002368_processed.jsonl/55046 | Extreme Data Management Analysis and Visualization for Climate Data Exploration
Tuesday, November 19, 2013 - 11:00am - 11:40am
Lind 305
Valerio Pascucci (The University of Utah)
Effective use of data management techniques for massive climate models is a crucial ingredient for the success of modern environmental research. Developing such techniques involves a number of major challenges such as the real-time management of massive data, or the quantitative analysis of scientific features of unprecedented complexity. The Center for Extreme Data Management Analysis and Visualization (CEDMAV) addresses these challenges with and interdisciplinary research in diverse topics including the mathematical foundations of data representations, the design of robust, efficient algorithms, and the integration with relevant applications.
In this talk, I will discuss one approach developed for dealing with massive amount of information via a framework for processing large scale scientific data with high performance selective queries on multiple terabytes of raw data. The combination of this data model with progressive streaming techniques allows achieving interactive processing rates on a variety of computing devices ranging from handheld devices like an iPhone, to simple workstations, to the I/O of parallel supercomputers. With this framework we demonstrated how one can enable the real time streaming of massive simulations from DOE platforms such as Hopper2 at LBNL and Intrepid at ANL.
I will also present the application of a discrete topological framework for the representation and analysis of the same large scale scientific data. Due to the combinatorial nature of this framework, we can implement the core constructs of Morse theory without the approximations and instabilities of classical numerical techniques. The inherent robustness of the combinatorial algorithms allows us to address the high complexity of the feature extraction problem for high resolution scientific data such as eddies ocean simulations.
During the talk, I will provide a live demonstration of the effectiveness of some software tools developed in CEDMAV and discuss the deployment strategies in an increasing heterogeneous computing environment.
MSC Code: |
global_01_local_0_shard_00002368_processed.jsonl/55144 | Skip to content
Aniseed Cough Ovals
These boiled, aniseed flavoured lollies are a classic for a reason and ours are made in Perth! Try a bag today.
Ingredients: Sugar,glucose,natural aniseed oil, colour 102, 122, 133
Contains Small amounts of Gluten
Best before 11/02/2020 |
global_01_local_0_shard_00002368_processed.jsonl/55198 | Skip to main content
New 13-inch MacBook to Replace Air This Year (Report)
The MacBook Air's successor could be on the way soon. A new report claims Apple plans to release a 13-inch MacBook in the latter half of 2018, and do so at a more affordable price.
While this report from the Taipei, China-based Digitimes publication doesn't call the laptop a MacBook Air outright, its description of the new notebook as "an entry-level 13-inch MacBook" brings to mind Air, which just turned 10 and is in dire need of a modern revamp.
Whether the phrase "entry-level" is meant to match the $999 MacBook Air, Apple's current most-affordable notebook, its $1,299 12-inch MacBook or hit another price is still up in the air.
The DigiTimes story sites "industry sources" for this claim and frames its story around an increase of LCD panel orders from Apple. DigiTimes doesn't have the sterling reputation of analysts such as Ming-Chi Kuo of KGI securities, but its track record includes predicting the all-glass iPhone 8 as well as that smartphone's wireless charging.
If this laptop is meant to replace the MacBook Air, we hope those LCD panels are of retina-quality. When I reviewed the 2017 MacBook Air, an update that featured nothing more than a slight processor upgrade, I noted that its "1440 x 900-pixel screen has aged more poorly than any of its other aspects, lacking full HD and vibrant colors."
And if this 13-inch MacBook winds up being simply a more affordable version of today's 12-inch model, I'm hoping the company adds more key travel and a full-size USB port.
macOS High Sierra Tips |
global_01_local_0_shard_00002368_processed.jsonl/55203 | Miles MatthiasCTO at inKind
I'm the CTO at inKind, a restaurant investment platform that allows restaurant owners to raise capital from their best customers.
Recent Answers
I'm the CTO of a company, so I'll answer your original question.
One of the areas I'd love to see a SaaS product solution is reporting. Developers like myself often just focus on building the product and if they're smart, like yours truly, we add analytics.
But getting a clear picture of the business can still be difficult with different people on the team preferring different methods of communication. Some of our stats go out via email, and the people that like email only see part of the picture. All of our stats go over Slack, but not everyone likes Slack. I ended up building weekly email reports that totals everything up and gives the single, clear picture. Not every team has this capability though, and a single API to report significant events in the application with configurable communication methods for reporting and notifications would definitely be something worth paying for.
Along with other people in this thread, I'd definitely recommend talking to as many developers and companies as you can to identify real problems, rather than looking for one where it may not exist.
I hear this a lot and always say the same thing: if you can test your idea manually, without having to build any software, do it. There are so many great free software services out there nowadays and for most app ideas, you can string a couple services together or do part of it by hand to get everything going initially. Having real sales and usage will help you discover the things you couldn't have foreseen and understand your target user much better. Real sales/traction is also the best way to attract investors and technical co-founders.
The two option I would look into are using a gem called Paperclip, which provides the tools for uploads, url generation, and attachments as model attributes with any number of storage options, and using a service like Cloudinary. Cloudinary does the same things as paperclip, but is the hosting service for the uploads as well, which with images means they can do a bunch of cool stuff like color, size, and shape transformation on the fly. Cloudinary is a little more expensive though, so it's common for people to start with Paperclip and migrate to Cloudinary when the app grows.
For a basic first version, they should be able to knock it out in a weekend. If they can't, it's because your first version is too complicated.
Happy to discuss more about working with developers on a call! I'm a CTO with experience managing developers.
It really depends on what you're building here. If you can do any part of your product manually, I would suggest doing that in the first version.
The absolute fastest way is to hire a contractor to get it done, but that can be expensive. If your first prototype can't be built with a prototyping tool (even a Keynote presentation) and it's too expensive or difficult to build on your own, you have to convince other people that you are solving an important problem, that your solution solves that problem, and that you have the right team to do it. VCs in a seed round will care more about the team than the idea, but crowdfunders will care about both. And obviously getting designers or developers to join your team for equity will require convincing them of all 3.
Happy to give more specific advice based on your app thrugh a Clarity call!
I've created several MVPs for startup ideas, so I understand how to pair large ideas down into the most essential proof of concept and build it.
What's the main value add of your new social network? If the main value add is that it's a community specifically for a certain group of people, I would start by actually creating a community and getting those people involved in the community. If you can show that people actually use and value a community of specific people, that is way more compelling than just email signups of people that are interested in possibly leveraging a community that doesn't exist yet.
If I were you, I would use something like https://clubhouse.cc or Slack.com or Google Groups or Facebook groups to actually create a community and see whether or not it's a value add to your targeted users. Then when you prove that there are people leveraging the community and engaging, it's an easy sell to an investor that you just need money to build a custom app for your community, rather than a shot in the dark based on email signups.
Contact on Clarity
$ 5.00 /min
Schedule a Call
Send Message
Access Startup Experts
Connect with over 20,000 Startup Experts to answer your questions.
Learn More
Copyright © 2020 Startups.com LLC. All rights reserved. |
global_01_local_0_shard_00002368_processed.jsonl/55205 | Indian tribe.
Indian tribe. An Indian tribe, band, nation, or other organized group or community, including a native village, regional corporation or village corporation, as those terms are defined in Section 3 of the Alaska Native Claims Settlement Act (43 U.S.C. 1602), which is recognized as eligible for the special programs and services provided by the United States to Indians because of their status as Indians (see 36 CFR 800.16).
7 CFR § 1970.6
Scoping language
Is this correct? or |
global_01_local_0_shard_00002368_processed.jsonl/55243 | How do you download or install software?
Well-Known Member
Yes, as far as I can tell, you have installed it correctly. But you have to load it from the terminal when you want to use it.
Later, if you want, we can figure out how to make a menu item, if you want it... or a desktop icon, or panel icon. These things can be done.
But not tonight. I'm old... I'm going to bed! :p:D
Have fun!
That is is also a sign of a poorly crafted app
I don't know if it is poorly designed, I'm thinking since they aren't a big market name or maybe most of their customers are non Linux users they don't feel the need to do such. for what it's worth it does a good job for me and you can't beat the price. I don't download much but when I need to I like to know I'm elsewhere lol
Well-Known Member
Well-Known Member
I just installed surfshark on my own pc
The installed size is around 17kb
It does not have the ability to set a desktop or panel icon
Just out of curiosity, I looked at my own vpn (airvpn)...
It has an installed size of 8400kb
It will take someone with more knowledge than me to answer the question ...why ?
My guess is it transfers info off pc's and works with it elsewhere....that is a guess
Members online
Latest posts |
global_01_local_0_shard_00002368_processed.jsonl/55244 | How to install I2P on Ubuntu
Open a terminal and enter:
sudo apt-add-repository ppa:i2p-maintainers/i2p
Update your repositories and install i2p:
sudo apt-get update
sudo apt-get install i2p
Start the I2P router (never as root):
i2prouter start
Preferences --> Advanced --> Network tab.
1. I am testing also freenetproject, is seems similar to Tor, but without any central server to take down
2. It has been really helpful! Thanks for this quick method of connecting your device to WiFi via single command.I am so happy to know this quick method.
Post a Comment
Popular posts from this blog
How to be anonymous on the internet (99-100%)
Deep Web Link List (.onion)
Automatically Check The Raspberry Pi's Temperature (+Prevent Overheating) |
global_01_local_0_shard_00002368_processed.jsonl/55245 | Morgan Harris
Morgan Harris got into Litecoin back in 2014, but his interest quickly expanded to everything Litecoin-related. He's particularly excited about real-world applications of blockchain technology. Having worked as a professional content writer for three years on blockchain-centered projects and hasn't looked back ever since.
Litecoin Made a Strong Bounce Back of More than 15%
Meta Data: Litecoin has shown some sign of strengthening. As of now, the trends are bullish but be cautious in trading. There is a piece of good news for the investors of Litecoin (LTC), as from now onwards they can use LTC chips on to purchase gift cards. These gift cards can be used […]Read More |
global_01_local_0_shard_00002368_processed.jsonl/55249 | Skip to main content
Iron Man Technology Has Real-Life Analogs
iron man
Iron Man, the most technologically advanced super-hero to ever hit film, is making a triumphant return to the big screen this week. Now sneak a peek into the inventions that power Tony Stark in his quest to save the world.
Alert — spoilers below.
The arc reactor
The power that drives Iron Man's fantastic exploits comes from the fictional "arc reactor." The movie reveals the one embedded in Stark's chest is slowly poisoning him with palladium, which in real life actually can be toxic, although probably not in the fanciful way depicted in the movie. (Graphic: The technology behind Iron Man 2)
It might seem odd at first that a reactor might rely on a precious metal akin to platinum, but this mystery clears somewhat given palladium's central role in claims regarding "cold fusion." Experiments two decades ago suggested nuclear fusion at close to room temperature, raising hopes of a cheap and abundant source of energy. Although most scientists now regard cold fusion as bunk, researchers at the U.S. Navy's Space and Naval Warfare Systems Center are still pursuing it, suggesting that Iron Man's use of cold fusion in warfare might not be so farfetched after all.
New elements
To avoid death from palladium, Stark instead creates an entirely new element to use in the arc reactor. The novelizations that the movie is based upon notes this new element is "vibranium," a fictional energy-absorbing substance that pops up regularly in the Marvel Universe, notably in Captain America's shield.
Scientists are in fact endeavoring to create new elements, with the most recent announcement coming in April of element 117, which bears the temporary name ununseptium. Unlike the vibranium Stark manufactures, the new elements scientists have actually created so far are all unstable, with only six atoms of ununseptium detected before they decayed into lighter elements. Still, physicists do conjecture the existence of an "island of stability" of super-heavy elements that don't break down immediately, which the vibranium in the film might belong to.
The fictional vibranium and the real ununseptium were both created using cyclotrons, or circular particle accelerators that can smash atoms together to generate heavier elements. Real scientists would probably not build cyclotrons in their basements as Stark did, however, and would probably want a lot more shielding to avoid death from radiation.
Hot weapons, flying saucers
Iron Man and the main villain of the film, Ivan Varko, fight each other using weapons apparently based on plasma, the electrically charged state of matter that makes up stars and lightning.
Iron Man fires pulses of the stuff, while Varko, who resembles the Marvel super-villain "Whiplash," uses what the novelizations say are plasma whips made of tungsten carbide wrapped in copper wire, with the tungsten carbide supposedly remaining magnetic even at extraordinarily high temperatures, thus holding the copper in place when it gets transformed into plasma at nearly 4,900 degrees F (2,700 degrees C).
Iron Man also flies around with plasma thrusters. Although it seems unlikely that disk-shaped engines small enough to fit into boots or gloves could fly a man around at supersonic speeds, there are inventors who are say they are developing aircraft — flying saucers, no less — that fly around using plasma, electrically generating plasma on their surfaces and electromagnetically manipulating it for propulsion.
Suits of armor
Stark's most outstanding invention of the movie is, of course, the Iron Man suit that brings all these technologies together. Scientists are actually creating exoskeletons that can amplify strength, with two companies developing prototypes for the U.S. Army and researchers also manufacturing exoskeletons in Japan.
The armors shown in the movie show the mind-boggling ability to protect their wearers from blows that might otherwise liquefy them. One might imagine there are incredibly strong cushions inside the suits, and in fact researchers have made foams made of carbon nanotubes, or pipes just nanometers or billionths of a meter wide, that are exceptionally springy and strong, perhaps just what Iron Man needs to prevent every bone in his body from being broken during fights.
Mindless drones
The villain of the movie might have the right idea, though, when it comes to how future warfare will actually be waged. Instead of relying on flying soldiers, Varko employed robots. These could keep soldiers from dying on the field and perform at levels and in conditions that people never could. The growing use of drones in the military clearly shows how useful commanders find them, and real soldiers even seem to love their robot brethren.
Unfortunately, as the movie also points out, robots can get hacked, with reports emerging in December of Iraqi militants intercepting live video feeds from U.S. Predator drones, potentially gaining information they needed to evade or spy on U.S. military operations. Perhaps keeping an Iron Man or two around might not be too much of a fantasy after all. |
global_01_local_0_shard_00002368_processed.jsonl/55285 | How To Create a Quick Presentation Using Evernote
How To Create Quick Presentation Using Evernote
Getting Started
Cool Evernote Presentation -mte- Start
Cool Evernote Presentation -mte- Mobile
Cool Evernote Presentation -mte- Exit
Customizing the Display
Cool Evernote Presentation -mte- Settings - Font
Cool Evernote Presentation -mte- Night Mode
Cool Evernote Presentation -mte- Pointer Color
Creating Slides
Cool Evernote Presentation -mte- Presentation Layout
Cool Evernote Presentation -mte- Sidebar Break 1
Cool Evernote Presentation -mte- Sidebar Break 2
Linking Notes
Cool Evernote Presentation -mte- Note Link
Cool Evernote Presentation -mte- Insert Link
1. I’m doing it right now – using it for a presentation for the first time. I’m a math educator, so all my talks have some type of “mathy” stuff in them. But the single sans serif font Evernote uses for presentation doesn’t make variables and equations look very nice. Even using the traditional × (different from the letter x) doesn’t help.
I think for now I’m going to use y and z or a and b, but I sure hope Evernote takes us math/sci folks into consideration with the upgrade.
2. The main problem with Evernote for presentations in my classes is the lack of font size control. Even with the largest font size selected it’s simply too small for people to see in the class when projected.
So I switched to using OneNote for class presentations, while I’m still using Evernote for “stores of misc data” for easy search. Stuff where it doesn’t matter how well it’s formatted.
Formatting in Evernote leaves a lot to be desired.
Comments are closed. |
global_01_local_0_shard_00002368_processed.jsonl/55286 | How to Selectively Color Images in 5 Minutes
Using color to highlight a particular portion of your image can have drastic effects on the end result. Using photo editors like Photoshop and Gimp you can emphasize whatever colors you choose in an image. Music videos and films like Sin City used this extensively, and the resulting look can be replicated in Gimp in just a few minutes. In this guide we’ll use two layers and some basic Gimp tools to highlight only the blue tones in a sample image, leaving the rest of the image black and white.
Note: There are multiple ways of accomplishing this effect that will give different results. The method demonstrated here is just one quick, easy way.
Picking the Right Image
To get the best results, you’ll want an image that has clear, vibrant colors to begin with. We can always adjust them later, but good colors to start with will give us the best results. Also, since some of our work will involve painting by hand, the shapes you intend to color should be fairly simple with clear edges. If you wish, you can use this image which will be our example for the rest of this guide.
Once you’ve got your image, open it in Gimp. If you don’t have Gimp, it can be downloaded here for Windows, Linux, and Mac.
With your desired image open, move your mouse over to the Layers window and click the Duplicate Layer.
You should now see two identical layers. Make sure the top one is selected, go back to your image. To make this layer black & white, pick Colors -> Desaturate.
In the dialog box, make sure Preview is enabled and try out the different settings to find the one that looks best to you. When finished, your Layers window should now show both layers, but only the bottom one is colored.
Coloring Zones
This is the fun part. How this works is that we will be erasing the certain portions of the black & white layer to let the colored layer underneath show through, like a transparency on a projector.
If the image you’re working with is a JPG, you’ll have one additional step. In the Layers window, right-click your black & white layer and choose “Add Alpha Channel”. If the option is grayed out, then you already have an alpha channel and you’re good to go.
Now, from the Toolbox window, choose the pink eraser tool (or hit Shift+E). Down below, you’ll have some options for your eraser. I’d suggest starting with a plain circle, size 7 or so. Fuzzy brushes can also be useful when doing this kind of coloring, but a solid circle will work for now.
We’ll start with the eyes, so it will be helpful to zoom in. You can do that from the View menu, or by holding Ctrl and scrolling your mouse wheel. When close enough, paint with the eraser over the portion you wish to color.
Alternate Techniques
You don’t necessarily need to hand paint every spot. If the section you want to color is a simple shape, you may be able to use the rectangle or ellipse selection tools, and hit Delete to remove the selection from the layer. The Fuzzy Select tool can be very helpful here as well if you adjust the Threshold value properly.
In particular, I recommend the Scissors Select Tool for this job. Click that from the toolbox (or hit I) and your mouse cursor should show a pair of scissors. This tool works by connecting dots that you specify, and try its best to properly wrap around the shape between those dots. Make the first dot by clicking anywhere you wish along the edge of the object you want to color.
When finished, click on the first dot again to complete the loop, and hit Enter to turn your series of dots into a normal selection. Hit the Delete key to remove the parts of the layer inside the selection.
Continue, using whichever tool seems appropriate for the task, for any objects you wish to color.
1. Not the most effective way. Selecting the image parts manually could be a pain for beginners. Instead, the selective coloring can simply be achieved via histogram and color curve settings. Cheers!
1. Would you care to be very specific for the new peeps in exactly ‘how’ to do this step by step then please?
2. cool article and the baby is sooo cute!! just want to squeeze him. omg!
3. Thank you sir…
Comments are closed. |
global_01_local_0_shard_00002368_processed.jsonl/55289 | Ego plays spoil sport on our “happiness” and is the source of our spiritual ignorance, as it is the root cause of doubts. According to Ramana Maharishi, repeated questioning itself is not good, as this not only works on our ego, but also works on our intellect. Someone could be highly knowledgeable and can answer all the spiritual questions; but this does not mean that he is a realized person. Unless ego is shed, quest for the Self will not be real. “Every question that arises is vitiated by the ignorance which takes the ego at its face value, as the real Self. All questions are therefore reducible to one “Who am I”. Only through the quest for the Self, egoless state can be reached. What is egoless state? It is the state of silence, where quest for all answers are annulled. Muṇḍaka Upaniṣad (II.ii.8) says, “If a person can realize Brahman, as the cause and effect as his own Self, all his doubts are dispelled and the fruits of all his work also get destroyed” When we see ourselves as the cause and effect of everything, our ego gets destroyed. Egoless state is not nothingness.
Ego is the root cause of all desires. In the blissful state, ego is destroyed completely, as in the powerful waves of bliss, a tiny piece of ego is swept away, not to rear its ugly head again, unless one is destined to fall from the heights of spiritual evolution. If one falls, it is again due to the improper destruction of ego. Reflection on the Truth is hundred times superior to hearing. Meditation on the truth is a hundred thousand times greater than reflection and this reflection is possible only in the egoless state.
What is the difference between Paramātmā and jīvātmā? Paramātmā is egoless state as It is not bound; whereas jīvātmā has inherent ego and is bound. However, be it Paramātmā or jīvātmā, the Self is the same. The only difference is that the Self really exists and the self does not really exist. The self becomes the Self when the ego is annihilated. We are not able to realize the Self as the Self because of our material desires and ego. Desires are products of mind, and mind by nature seeks the material pleasures and when the mind is active through organs of perception, naturally ego will be predominant. Often mind and ego go together.
The Self always exists in all the three states of consciousness (active, dream and deep sleep). This way, the Self always exists within us perpetually. This Self is immortal and would survive the reduction to nothingness of the unreal, called egoism. Bliss is the inherent nature of the Self, where ego is absent. Hence great importance is stressed on egoless state to realize the Self. When we enter into egoless state, we automatically enter into the state of silence. “Silence is the language of the Self and it is the most perfect teaching. Language is like the glow of the filament of an electric bulb; but silence is the electricity, which silently makes the bulb to burn.” This is the basis for saying that Self-realized persons are always silent and down to earth in behaviour. There is another saying. “He who speaks about It (the Self) has not seen It. He who has seen It does not speak” A real Guru is the one who falls under the second category.
Kaṭha Upaniṣad (II.iii.14) says, “When a man destroys all the desires in his mind, he attains the immortality and becomes one with the Self in this life itself.” But this is not as easy as we think. There are two impediments, mind and ego combine. Unless the ego is destroyed, thought processes in the mind cannot be destroyed. Unless the ego is surrendered, it is not possible to realize the Self, as in order to become one with something, we have to have the quality of the same thing. Muṇḍaka Upaniṣad (III.39) further explains this. “There is a kind of yoga called asparśayoga which deprives all sorts of contacts with the external world. It is difficult even for yogis to practice and perfect this yoga. This yoga leads to state of fearlessness (as ego is destroyed here). Ironically, yogis are frightened away from this state, as they do not want to lose their ego.” Thus it is easier to talk about egoless state, but in reality, only those who have complete desire to realize the Self can reach egoless state.
In deep sleep state, we become egoless, but on waking up, our ego is back. Same is the experience with trance. Only in the liberated state, ego is completely annihilated. State of spiritual a preceptor or a Guru can be ascertained from the level of his ego. Mere pāṇḍitya (knowledge) is of no use in the path of Self-realization. Pāṇḍitya often makes a person more egoistic and hence pāṇḍitya and Self-realization never go together. The egoless state can be attained only after liberation. Liberation is the point of no return for ego, as otherwise, it is like ego returning after we wake up from deep sleep. There are references where sages never slept for days together and continued in trance for infinite number of days. When the mind is reactivated after meditation, it starts to function from the point where one entered into trance. Once the Self is realized, then sleep and meditation do not matter for the mind and ego.
“The Sage enters the egoless state by extinguishing his ego, which is part of innate ignorance. He loses contact with his subtle and gross bodies by the dissolution of his causal body, which is primary ignorance. He passes straightaway from his active state. Hence the Sage becomes free from his causal body. But for this body, there is no sort of connection between the Real Self, which is the condition of the Sage, and other bodies. Thus the Sage is both bodiless and mindless.” In the case of common man, during his sleep, his causal body or primary ignorance are not dissolved and continued to exist and into it, both ego and mind are merged and is in the form of a seed to sprout again after sleep. Sages have explained the ego ridden existence is death (to transmigrate again).
Ramana Maharishi says, “Unless the ego, the identification with the body dies, it will be impossible for anyone to realize that natural and abiding state of absorption within the heart. Until this merger happens, there is no liberation for the jīva.
“You think that you can get happiness when there is contact with something separate from you. But that is not the truth. Bliss is the very nature of the Self. The happiness that you get from other things is part of the happiness of the Self, but it is not the complete happiness. So long as external object is required for happiness, incompleteness is felt. When it is felt that Self alone is there, permanent happiness stays forever.” This is true egoless state, where we experience perpetual Bliss; and we unknowingly enter into Shiva Consciousness. |
global_01_local_0_shard_00002368_processed.jsonl/55298 | Request a demo
AI Marketing - Market Logic Software - Marketers-Smart-Insights
How smart does AI have to be to help marketers?
AI for Insights 6 MIN READ
How smart does AI have to be to help marketers?
It would seem to some that AI marketing is a natural marriage for a marketer looking to deliver value by way of insights. However is that still a dream? Way back in 1965, Herbert Simon at MIT predicted that machines would be able to do anything a human can do in twenty years’ time. Fifty years later we’re still not there, but today’s AI hype cycle would suggest otherwise.
That’s why I thought I’d clean up some of the misunderstandings in this blog post. Here’s my best effort to describe what is currently possible, what is currently not possible, and why you as a decision maker in marketing technology should care.
It’s easy to see there are massively inflated expectations toward some of the highly publicized AI systems, which are fuelled by remarkable demonstrations of machines outperforming humans at games like jeopardy and go.
These demonstrations pair state of the art machine-learned models with handcrafted programs to manage a huge volume of domain insights, such as the complete rule book for Go and every possible move you can make.
The results are impressive, to say the least, showcasing breathtaking performance in an admittedly complex problem domain. But the reality is these demonstrators only simulate one generic form of AI. They may well beat the best trained human brains in the ancient game of Go, but that machine wouldn’t stand a chance answering questions a 3-year old could answer, like “is ice warm?” Why is that?
Today’s AI systems can be categorized as either pattern recognition or algorithmic intelligence. To match the intellectual capabilities of a 3-year-old child, the system needs to combine both.
Pattern recognition intelligence
World-renowned thinkers in the domain of economic principles long held the view that computers are only good at following specific rules. For example, they presumed that in the domain of credit risk rating, a human programmer could define a set of IF, THEN, ELSE rules to describe whether someone should be granted financial credit, so a computer could then ingest inputs to evaluate rule compliance at amazing speeds, without error.
So far so good. But the same experts also assumed the computer would never be able to design the rules and patterns that define the problem-solving decision process.
Today, we all know this was a wrong assumption. Computers are mastering the art of pattern recognition because human data scientists have found mathematical ways to recognize patterns, paired with the inherent advantages computer systems have in general (such as signal transmission at the speed of light or the capability to tirelessly repeat a process ad infinitum without theoretically ever making an error).
For example, computers are already at human quality levels when it comes to solving geometric problems like finding a pattern that describes a low-risk credit; or the meaning of the word ‘benefit’ in the hair care business of an FMCG company
Algorithmic intelligence
No surprises here, computers are way better than humans at executing algorithms. AI systems show superior performance solving abstract problems that combine pattern recognition intelligence with, for instance, graph or search-based methods.
Back to parlour games, where a great example would be the part of the AlphaGo system that applies pattern-recognition based evaluation of the positions of stones on the board to the decision about which move to make next. No human is capable of executing the algorithm required to make this decision with the speed and continuous quality a machine can achieve here.
The big difference between the “intelligent” systems we see today, which only appear to display superhuman cognitive capabilities, and actual, super-human intelligence capabilities (compared to our three-year-old), is not only the ability to combine pattern recognition and algorithmic intelligence, but to integrate far more complex architectures that solve the two problem domains at much more detailed levels.
What does that mean?
To solve a problem like Go, programmers have to create the modules that recognize the pattern of a promising board position, and also write the algorithm that defines what to do with these evaluations.
A human knows how to do both. Given a problem, we develop strategies to solve it, while simultaneously training our mental patterns to recognize and auto-evaluate the board position we see, and also cognitively dealing with all the latent problems of existing in a physical world, like walking, talking, eating and breathing.
The current state of the art in AI is far from being so universal
I am not saying that these combinations are completely unexplored. Yes, technical exploration of these combinations is underway. Methods also exist to automatically search for solutions to algorithmic problems, even to learn how to construct pattern recognition architectures. But the combination of the two is far removed from what is needed to approximate human universality.
So there’s nothing wrong with being impressed by the fascinating new capabilities of deep learning architectures, but it’s dangerous to assume that general artificial intelligence has been achieved yet, or to call more or less every AI service “cognitive.”
Over-promising what to expect from AI systems, poses a serious change management problem as, and I assume that is really where everyone agrees, nothing is more expensive than winning back a user who has been disappointed by the real capabilities of an AI.
That’s why it’s important for AI marketing, marketers should look to invest in AI technologies AS WELL AS verticalization in the domain of their core business model, which combines pattern recognition intelligence with algorithmic intelligence.
At Market Logic, we help clients to solve these problems by integrating supervised pattern recognition capabilities (for the specific vertical) with supervised algorithmic capabilities, which is the minimum a buyer should invest into with a marketing insights platform that will leverage the power of AI marketing.
Both are then combined with an AI marketing insight for the problem domain, from the market logic knowledge graph. Of course, our system is not yet able to solve that domain all by itself, no system can do so currently – but we can make sure it solves already known problems with supervised machine learning.
This is where our data science team crafts models and architectures that generate ROI from day one while working on methods of higher abstracted problem-solving capabilities in the medium term.
Subscribe to our blog
Thank you for subscribing to our blog!
Look out for our monthly update with new posts.
Your browser is out-of-date!
|
global_01_local_0_shard_00002368_processed.jsonl/55303 | Cuban Missile Crisis
Low-level photograph of nuclear missile construction site at San Cristobal, Cuba, 25 Oct 1962.
In October 1962, the world held its collective breath while the United States and the Soviet Union stood at the brink of full-scale nuclear warfare. Recent disclosures show that the prospect of annihilation was even closer than most participants realized.
At issue was the discovery that the Soviets were installing nuclear weapons in Cuba, which had been subject to an ongoing campaign of harassment, including the failed Bay of Pigs invasion, Operation Mongoose's sabotage and subversion activities, and plots to assassinate Fidel Castro. Although the U.S. had nuclear missiles in foreign countries pointing at the Soviet Union, particularly in Turkey, U.S. officials were adamant that a Communist nuclear beachhead not be established in the Western hemisphere.
President Kennedy convened the so-called ExComm meetings in tight secrecy, and participants debated what course of action to take. Most advised air strikes followed by an invasion of Cuba to take out the missiles. After much deliberation, Kennedy opted for a naval blockade of Cuba coupled with demands that the Soviets withdraw the missiles, and also private communications with Khrushchev to try to defuse the tensions.
The strategy worked, and the missiles were withdrawn. Part of the arrangement reached was that Kennedy promised not to invade Cuba, contingent upon UN inspections proving the missiles were actually removed (Castro refused to allow this). He also made assurances that the missiles in Turkey, which were becoming obsolete anyway with the advent of a nuclear-armed submarine fleet, would be quietly removed at a later date.
Many hawks in the U.S. were furious over Kennedy's failure to seize the event as a justification for invading Cuba and removing Castro. Air Force Chief Curtis LeMay told Kennedy that this was "almost as bad as the appeasement at Munich," referring to the British government's failure to confront Hitler over his invasion of Poland. What neither Kennedy nor LeMay knew was that Soviet field commanders in Cuba had tactical nuclear weapons at their disposal, and an invasion would almost certainly have triggered a nuclear response.
Cuban Missile Crisis: 35 Years Ago on Tape, by JFK Lancer.
The Cuban Missile Tape Crisis: Just how helpful are the White House recordings?, by David Greenberg.
Ted Sorenson's Fallible Memory of the Cuban Missile Crisis, by Sheldon M. Stern.
FUTURE POLICY TOWARD CUBA. This 1963 State Dept. memo for the President presents a plan for future policy in Cuba, following the missile crisis and the abandonment of Operation Mongoose.
UNITED STATES POLICY TOWARD CUBA. Another memo, this one from the Defense Dept. in January 1963, outlines possible courses of action regarding Cuba in the aftermath of the missile crisis.
McCone to McNamara memo of 9 Feb 1963. CIA Director McCone forwarded deep concerns about U.S. Security being expressed in Congress due to the administration's failure to anticipate the placement of nuclear missiles in Cuba.
FRUS 1961-1963, Volume VII: Arms Control and Disarmament. This State Department volume covers arms control negotiations throughout the Kennedy presidency, including the missile crisis.
Other Links
The Cuban Missile Crisis, 1962: The 40th Anniversary. The National Security Archive site includes documents, audio clips, photographs, and information on a 40th anniversary conference held in October 2002 in Havana. is a website affiliated with Harvard University whose sole subject is the Cuban Missile Crisis.
The Cuban Missile Crisis, October 18-29, 1962. History Out Loud offers several audio recordings of ExComm meetings, along with commentary and transcript excerpts.
Foreign Relations of the United States, 1961-1963, Volume XI: Cuban Missile Crisis and Aftermath.
A World on the Brink: John F. Kennedy and the Cuban Missile Crisis. The JFK Library website contains discussion, documents, and audio from the missile crisis.
Cuban Missile Crisis - Photographs. The Federation of American Scientists has a collection of reconnaissance photos taken in 1962 upon discovery of the missiles in Cuba.
Cuban Missile Crisis on wikipedia.
Related Starting Points
Peter Dale Scott discusses what was resolved in the aftermath of the Cuban Missile Crisis and what was left unresolved, and how that affected adminstration policy toward Cuba in 1963.
(running time: 4:33)
Books of Interest
Thirteen Days
Robert F. Kennedy
W.W. Norton & Company, 1968
Ernest R. May and Philip D. Zelikow
The Belknap Press of Harvard University Press, 1997
Averting the 'Final Failure': John F. Kennedy and the Secret Cuban Missile Crisis Meetings
Sheldon M. Stern
Stanford University Press, 2003
Aleksandr Fursenko and Timothy Naftali
W.W. Norton and Company, 1997
Theodore C. Sorensen
Harper and Row, 1965
Cuba and the Missile Crisis
Carlos Lechuga
Ocean Press, 2001
|
global_01_local_0_shard_00002368_processed.jsonl/55305 | Skip to Main Content
Legal Alert
New Minnesota Supreme Court Decision Protects Tip Income and Deductions from Employee Earnings
August 22, 2013
Businesses that employ workers who receive tips as part of their income will want to know about a new Minnesota Supreme Court decision that provides employees with new protection of their gratuities. The case dealt with a restaurant operator's practice of requiring employees to use their tips to cover register shortages and pay for customers who leave without paying their tabs or without signing credit card receipts. The employees objected to their tips being used for these reasons and filed a class action lawsuit, complaining that these practices amounted to unauthorized deductions from their wages in violation of Minnesota law. The Supreme Court sided with the employees, placing employers in the hospitality and other industries featuring tipped income on notice that they cannot make deductions from those gratuities without a voluntary, signed written authorization from the employee.
The Decision
The Supreme Court's decision, in Karl v. Uptown Drink, involved a restaurant group with approximately 750 servers, bartenders, and security guards. In response to the employees' claims that the employers were making unlawful deductions from their tips, the employers argued that the employees had not suffered deductions because the employees had decided to cover the cash shortages rather than face disciplinary action for failing to correctly handle cash. At the trial, the jury agreed with the employers, and by the time the employees reached the Supreme Court, two lower courts had let the jury verdict stand. The reasoning was that even after the employees covered the losses with their tips, they were still making more than the minimum wage.
The Supreme Court, however, made two key findings in support of the employees. First, gratuities are wages under the Minnesota law that regulates when, how, and under what circumstances employers may lawfully make deductions to cover indebtedness. Second, the Supreme Court held that it did not matter that the employees still made more than minimum wage after the deductions from their tips. Rather, the tips are part of the employees' wages, and regardless of what they have left after the deductions, the money belongs to the employees unless and until they agree in writing to give some of it back to cover a debt.
Our Recommendations
For all employers, Minnesota tightly regulates and limits deductions from employee pay. The public policy is to protect employees from unfair pay practices that affect what they have earned. By extending the definition of wages to include tips, Karl v. Uptown Drink makes that point. There are legal ways for employers to make deductions, but they require following established rules that require employees to authorize those deductions in writing. Employers should review their wage deduction policies and practices immediately to ensure compliance with this decision and the various state laws that regulate deductions from employee wages and tips.
This case should serve as a reminder to employers that wage and hour litigation has increased and employers may want to audit their policies and practices for compliance prior to litigation. While Karl v. Uptown Drink involved the application of Minnesota law, many states have their own rules governing pay practices, including those involving deductions from employee earnings.
We Can Help.
Maslon's Labor & Employment Group can answer any questions employers have about this important new legal development, including providing suggested language for employer communications, application forms, and conditional job offers.New Minnesota Supreme Court Decision Protects Tip Income and Deductions from Employee Earnings
Thank you for your interest in contacting us by email.
|
global_01_local_0_shard_00002368_processed.jsonl/55310 | If you case has been granted an appeal and you want me to write you a letter of support, want your appeal date brought forward, or haven’t yet heard when your appeal date will be, please email me using the form below.
Please provide accurate information. The more you provide, the quicker I and my office can look into your case. |
global_01_local_0_shard_00002368_processed.jsonl/55328 | What is the immunochemistry hallmark finding of acute lymphoblastic leukemia (ALL)?
Updated: Jun 20, 2019
• Print
A negative myeloperoxidase (MPO) stain and a positive and terminal deoxynucleotidyl transferase (TdT) is the hallmark of the diagnosis of most cases of acute lymphoblastic leukemia (ALL). However, positive confirmation of lymphoid (and not myeloid) lineage should be performed by flow cytometric demonstration of lymphoid antigens, such as CD3 (T-lineage ALL) or CD19 (B-lineage ALL).
Did this answer your question?
Additional feedback? (Optional)
Thank you for your feedback! |
global_01_local_0_shard_00002368_processed.jsonl/55347 | Tuesday, June 16, 2015
Podcast Catch-Up, Pt 3: Starmageddon
I don't think I've actually mentioned this on the blog, but I'm the co-host of a weekly Star Wars/Star Trek podcast called Starmageddon. It's the brainchild of writer Dan Taylor (Hero Happy Hour) who also used to edit Star Trek comics for IDW before returning to writing full time. Dan's a huge nerd for both series and knew that I am too, so we decided to start talking about them regular-like.
I won't be giving updates on when new episodes come out, because... every week. But we've got three episodes up so far and the next one's being edited. You can find them all on the website or through your usual way of listening to podcasts.
After an episode 00 where Dan and I just talked about our history with the shows, we've settled into a format where we use recent news to springboard into other discussions. Should we be getting our hopes up about Star Trek Beyond? Would it be cool to see a live action Ahsoka appear in The Force Awakens? What should a new Star Trek TV series be like? What does "canon" even mean in the Star Wars universe? I'm having a blast hashing this stuff out.
Starting with our next episode, we're also adding guests to the format. Some will be other passionate fans and some will be actual Trek and Wars newsmakers. And sometimes we'll have both in the same episode. I hope you'll give it a try.
1 comment:
Erik Johnson Illustrator said...
Oh I forgot you mentioned this one! Sounds like I have some catching up to do!
My 20 Most Anticipated Movies of 2020
Related Posts with Thumbnails |
global_01_local_0_shard_00002368_processed.jsonl/55372 | • BLOG
• Part I of III: MobileIron and Microsoft Strategy
Part I of III: MobileIron and Microsoft Strategy
April 23, 2017
This three-part video blog series is my perspective on Microsoft’s strategy, the evolution of Microsoft Intune, and the critical role MobileIron plays in a Microsoft shop. My opinions are based on publicly available and third-party data plus my analysis of Microsoft’s actions. Part II of this series provides a high-level comparison between MobileIron and Microsoft Intune, while Part III provides technical details on that comparison.
Like almost every infrastructure software company in the world, MobileIron is both partner and competitor with Microsoft. Most of our customers are also Microsoft customers.
I believe Microsoft’s future depends on the success of three initiatives:
• Migrate compute workload quickly to Azure
• Don’t lose the battle for identity
• Win back the developer
Three product solutions provide the underlying pillars for these three initiatives.
1. All roads lead to Microsoft Azure
For Microsoft to win, enterprise workload must move to Microsoft Azure instead of Amazon Web Services (AWS) or Google Cloud Platform. Azure consumption is a central metric Microsoft can measure to gauge whether its strategy is working. Each month, compute cycles, data storage, and transactions in Azure must increase at a rate higher than the rest of the market.
Will it increase Azure workload?” is a simple litmus test to predict Microsoft’s actions.
2. All roads start from Microsoft Azure Active Directory
Microsoft cannot afford to lose its position as the system of record for identity. I believe Microsoft Azure Active Directory is the most important product in the Microsoft stack. Microsoft has been very public that “identity is the control plane.” As a result, Azure services are all tightly tied to the identity services that Microsoft provides.
If a Google or an Okta starts taking over identity within a customer, Microsoft loses its most important architectural control point. Office 365 is not only a productivity suite, but also a forcing function to drive identity into the Microsoft Cloud.
3. All roads are built on Microsoft Graph
Before we talk about Microsoft Graph, let’s first turn the clock back 20 years. Microsoft became the largest software company in the world because it won the hearts and minds of developers. Customers go where developers are, and developers were inevitably on Microsoft platforms. Both server-side and client-side developers built on Windows. Microsoft Developer Network (MSDN) was the center of the universe because almost everyone used Microsoft tools.
Then Linux matured and many new developers, like MobileIron, chose it as their server platform. At the same time, client applications on the desktop moved into the browser. In 2010, iOS and Android adoption exploded and, as always, developers followed their customers and started building native apps for those OS platforms. Meanwhile, cloud became the primary infrastructure choice of startups, and AWS quickly established a leadership position.
Now it is 2017. A new startup, funded today, will most likely run in AWS, with Android, iOS, and web apps on the front-end. There is a good chance that the startup will not use any Microsoft development technologies even if the service is consumed on Windows devices. That was infeasible 15 years ago, but practical now.
Microsoft must win back the developer. Winning with Office 365 but losing the developer is not an option.
Microsoft Graph is the centerpiece of the Azure developer strategy. It is the API stack for Azure, and Microsoft needs as many developers to use it as possible.
The Role of MobileIron and Microsoft Intune
At MobileIron, we’ve seen Microsoft’s strategy evolve over the last few years. Microsoft Intune is a perfect example. Because of the strong position Microsoft System Center Configuration Manager (SCCM) has held in the traditional desktop management market, I believe Microsoft assumed Intune could easily achieve a similar position in the enterprise mobility management (EMM) market.
But it didn’t work out that way. Intune struggled with capability breadth, depth, and maturity against the more established EMM players. Intune lacked the fundamental advantage of SCCM – control of the operating system. Apple and Google, not Microsoft, were the primary OS vendors in mobile.
Intune needed a product advantage and it came in the form of Office 365 controls. Microsoft decided not to use the native frameworks for app configuration and security that Apple and Google had built into their operating systems (http://www.appconfig.org/), even though that was the preference of many Microsoft customers. Instead Microsoft built a proprietary set of controls for Office 365 apps and only exposed them to their EMM product, Intune. This meant that other EMM products could not leverage incremental security functions for Office apps, like preventing copy / paste or ensuring that a document was not saved to a consumer storage service.
The Microsoft sales team starting pitching that “only Intune secures Office 365.” They tried to convince customers to uproot their entire existing EMM infrastructure and switch to Intune to access a handful of Office configurations. Customers pushed back and the common outcome was not that they switched to Intune, but rather that they lived without these additional, useful configurations.
In January 2017, Microsoft changed course and exposed these functions through new Microsoft Graph APIs. Access to these APIs still requires the customer to buy Microsoft’s Enterprise Mobility + Security (EMS) suite, which includes Intune, so the Microsoft sales team does not lose a revenue opportunity. However, to me it indicates that Microsoft realized adopting a closed approach to Office security was not in the customer’s or Microsoft’s best interests.
I believe that, over time, product economics and strategy alignment will naturally shift the focus of Intune from trying to compete head-to-head for EMM business to instead providing Azure policy middleware that other EMM products can leverage. The middleware model better meets customer requirements and, more importantly for Microsoft, drives adoption of Microsoft Graph. Microsoft has a tremendous incentive to secure Azure services but none to secure Android or iOS as OS platforms.
The true battle for Microsoft is not EMM. It’s winning back the developer through Microsoft Graph and moving enterprise workload to Azure with identity at the core.
Please read Part II of this series, “MobileIron and Microsoft Intune,” for more details on these two products.
Any information concerning products and services other than MobileIron’s comes from public and third-party sources. Although we believe it to be accurate, we have not independently verified it and we cannot guarantee its accuracy.
Ojas Rege
Ojas Rege, Chief Strategy Officer
About the author
twitter icon
Similar Blogs |
global_01_local_0_shard_00002368_processed.jsonl/55378 | Easiest Sweet Potato Tots Recipe Ever
• This is the EASIEST tater tot recipe I make and is always a hit with my kids. Even better, these easy sweet potato tots are made with only two ingredients (not including salt, which you can omit if you like). All you need to make this addictive bite-sized snack are sweet potatoes and parmesan cheese. They’re my go-to for a weeknight side, and I love not having to buy a frozen bag of tots for my kids to eat anymore.
RELATED: 31 Easy-to-Make Alternatives to French Fries (Kids Love These!)
Easiest Sweet Potato Tots Recipe Ever
These are way better than the frozen kind, and only take two ingredients to make.
Prep Time:
Cook time:
Servings: 20 tots
• sweet potatoes: 2 large, peeled and cubed (3 cups cubed)
• finely grated parmesan cheese: 1 cup
• salt: 1 pinch (optional)
Step 1: Bring a medium-sized pot to a boil and cook until just tender (about 8 minutes). Alternatively, you can also steam the sweet potato.
Step 2: Preheat oven to 425 F and drain the water from the sweet potatoes (if boiling).
Step 3: Transfer the cooked sweet potatoes and parmesan cheese to the bowl of the food processor and pulse until crumbly.
Step 4: Shape the mixture into equal sized tater tots and place on a parchment-lined baking sheet. Bake for about 15 minutes or until firm. After about 7 minutes of cooking time, flip the tater tots so the other side crisps up. Serve with your choice of condiments.
dipping a tot into ketchup
More Snack Recipes: |
global_01_local_0_shard_00002368_processed.jsonl/55389 | [media-credit name=”Joel Trick fws.gov” align=”alignleft” width=”300″]Melissa Blue Butterfly[/media-credit] Misc Tips:
Look for a catchlight in the eye.
Focus on the eyes.
Know your equipment. If you need to use one of the fancy features on your camera, but have to consult the manual to figure it out, you’ve lost the shot.
Fill the frame – not necessarily with a tight head shot, but leave no dead space.
• If the critter is a bird, make sure the beak is in profile so you can tell it’s a bird.
Watch the background. Eliminate signs of human intervention – signs, roads, fences – make it simple, not distracting.
Photograph critters from their eye level.
Show action when you can.
Put some humor into it.
Show cuteness (babies are always cute)
• They are stimulated by bright colors, so wear brown or green so they won’t notice you.
• Wear a hat to prevent eyeglass reflection.
• Don’t wear jewelry.
• Avoid hanging lens caps that move and make noise.
• Keep low and don’t cast a shadow on the butterfly.
• Insect repellents also repel butterflies.
Raptors usually return to the same nest.
Raptors are creatures of habit, they choose their perches based on time of day, angle of the sun and other things. If you see one perched, he’ll be there the same time tomorrow.
Keep notes and see what works.
|
global_01_local_0_shard_00002368_processed.jsonl/55410 | Without a Doubt, This Book Genre Will Give You Something to Think About
Dark humor anyone?
woman reading a book
Emilija Manevska/Getty Images
This article is updated twice a year with our latest picks.
If you love entertainment that makes you laugh out loud while highlighting the absurdity in issues that are actually pretty serious, then you're probably a big fan of satirical fiction. Even if you aren't already, the reading list we compiled of the best 15 satirical books will definitely convert you. Think dark humor, plenty of irony, and exaggeration veering on fantasy, all in the name of critiquing problematic political structures, societal norms, and figures. The goal is to hyperbolize what we accept as normal and expose its underbelly, while also helping us keep our sense of humor (albeit a dark one) along the way.
Satire is a mode, a mood, a mockery, and so much more. Here are our picks for the best satirical books to add to your collection.
01 of 15
The Sympathizer by Viet Thanh Nguyen
The Sympathizer
Viet Thanh Nguyen The Sympathizer $10
In The Sympathizer, A half-French, half-Vietnamese double agent relocates to America after the fall of Saigon, and betrayal, both personal and political, unfolds. At once a love story, spy novel, and period piece about the legacy and evils of colonialism, the Vietnam War, and ensuing refugee experience in the U.S., you won't be able to put down this Pulitzer Prize winner.
Aside from being satirical, sharp, suspenseful, and poignant, it's also a great way to study the history of the Vietnam War outside of a textbook. When he's not writing fiction, Nguyen is researching and teaching as a professor of English, American Studies and ethnicity, and comparative literature at the University of Southern California. If you like this book, pick up his nonfiction counterpart next, Nothing Ever Dies: Vietnam and the Memory of War.
02 of 15
Infinite Jest by David Foster Wallace
Infinite Jest
David Foster Wallace Infinite Jest $11
Reading Infinite Jest is a life-changing experience, each page containing at least one sentence that'll teach you to a truly prophetic lesson. Finishing it, on the other hand, is arguably harder than running a marathon. It's about a dysfunctional but lovable family whose members are all in the pursuit of happiness. Classic, right? As to be expected from David Foster Wallace, it's hilarious, brilliant, and very, very long-winded.
03 of 15
Super Sad True Love Story by Gary Shteyngart
Super Sad True Love Story
Gary Shteyngart Super Sad True Love Story $16
For a more science-fiction approach to satire, try Super Sad True Love Story. Gary Shteyngart takes us to the bleak United States of the near future, which is toiling in financial ruin. Given the rather somber content, the hilarious tone is a welcome surprise. It follows a Russian immigrant with "an absurdly low—and embarrassingly public—Male Hotness rating" as he falls in love with a Korean American woman. In short, take the title at face value, and expect what the title defines it as.
04 of 15
Shoplifting from American Apparel by Tao Lin
Shoplifting from American Apparel
Tao Lin Shoplifting from American Apparel $13
If you want something short, though not exactly very sweet, pick up Shoplifting from American Apparel. Tao Lin's novella is a semi-autobiographical, following a young writer with "a cultish following," though it's also about much larger issues, like class, culture, and art in the digital era. Like the rest of his work, this book features Lin's notoriously deadpan and dark, yet strangely seductive, voice. It's also about how the selling of a book (aka the cover and the title) has nothing to do with what it's actually about.
05 of 15
Homo Zapiens by Victor Pelevin
Homo Zapiens
Victor Pelevin Homo Zapiens $12
Do you like reading fiction that's straight-up weird? Victor Pelevin's novel about life in Russia after the collapse of the Soviet Union will definitely do the trick. Here's a hint: the protagonist is Che Guevara's ghost. It'll also make you think about marketing and consumerism with a much more discerning eye, and consider the ways in which we define our own culture by distinguishing it from another.
06 of 15
Fight Club by Chuck Palahniuk
Fight Club
Chuck Palahniuk Fight Club $1
This classic satire book explores the different representations and expectations around American masculinity, and it's also just a really fun book to read if you love humor, action, and feel like venting about consumerism. It's also a great window into the mindset of the mid-1990s and the frustration with the monotony of conventional life, as well as the futility of pop culture.
07 of 15
The Sellout by Paul Beatty
The Sellout
Paul Beatty The Sellout $12
Part period piece, part comedic masterpiece, The Sellout is about a young man who reinstates slavery and segregation in schools when his town is removed from the map since it only brings the state embarrassment. At times disturbing and dark, it'll also make you laugh at least once a page with its biting observations about our culture's depravity.
08 of 15
American Psycho by Bret Easton Ellis
American Psycho
Bret Easton Ellis American Psycho $13
A serial-killing yuppie with a dry sense of humor is definitely not a winning combo in real life, but if you'd like to step inside the mind of one without actually getting too close, here's your chance. Patrick Bateman will make you cry, scream, and analyze consumer culture like never before as he unabashedly confesses his violent tirades and crimes against women. You'll love to hate him.
09 of 15
Brave New World by Aldous Huxley
Brave New World
Aldous Huxley Brave New World $13
This dystopic classic was written in the 1930s, though it still feels extremely topical today. It takes place in a future iteration of the world, where humans are genetically bred and medicated to be docile, and prop up a totalitarian regime. Though it sounds far-fetched, it's very much rooted in familiar places and narratives around the absence of free will, originality, and personhood.
10 of 15
Her Body and Other Parties by Carmen Maria Machado
Her Body and Other Parties
Carmen Maria Machado Her Body and Other Parties $10
Each short story in Her Body and other Parties is a modern reinterpretation of a scary legend, iconic pop culture product, or a scarily realistic sci-fi experiment. And though that's interesting enough on its own, they're also written with such beauty that you'll find yourself hungry for more on the last page of each one. Some are eerie and some are erotic, while some teeter on the absurd and satirical, but each of them is an emotionally impactful feminist feat.
11 of 15
Diary of an Oxygen Thief by Anonymous
Diary of an Oxygen Thief
Anonymous Diary of an Oxygen Thief $11
The Diary of an Oxygen Thief spotlights another deeply misogynistic narrator you'll love to hate. He's so hideous a character, indeed, you might even wonder if you're reading some alternative horror novel. And interestingly enough, the author remains anonymous, even 12 years after it was published. The most infuriating part is that he's smart and wry, forcing the reader to see their own role in the dynamic of "hurt people hurt people." If that doesn't convince you, the Amazon review compares it a theoretical "novel in which Holden Caulfield was an alcoholic and Lolita was a photographer's assistant, and somehow they met in Bright Lights, Big City." What a treat.
12 of 15
Slaughterhouse-Five by Kurt Vonnegut
Kurt Vonnegut Slaughterhouse-Five $12
If you didn't already have to read this growing up, definitely give it a chance now. Kurt Vonnegut is a master novelist, and this science-fiction book is one of his best. At once full of funny, touching, and eye-opening, Slaughterhouse-Five is also a disturbing war story full of time travel and alien interference when a veteran re-experiences his life out of chronological order and sometimes simultaneously.
13 of 15
Boomsday by Christopher Buckley
Christopher Buckley Boomsday $13
Our 29-year-old protagonist is nothing but likable and charming. That is, until she ever-so-politely proposes the idea that Baby Boomers over the age of 75 kill themselves in the name of reallocating funds. What starts out as a totally absurd idea starts to gain more momentum in this dystopic satirical novel.
14 of 15
Animal Farm by George Orwell
Animal Farm
George Orwell Animal Farm $7
Though you had to or will have had to read this for an eight or ninth grade humanities class, it'll always be a fun, classic read. Published in 1945, this allegorical and satiric fable about "society's blind march toward totalitarianism" and the Russian Revolution is still just as relevant today.
15 of 15
1984 by George Orwell
George Orwell 1984 $13
Another Orwell classic, this one takes place in the totalitarian state of Oceania, where someone is always watching you and the Thought Police can read your mind. It's Big Brother at it's most terrifying, and shows a fantasy of a political future that was meant to magnify and examine the present.
Related Stories |
global_01_local_0_shard_00002368_processed.jsonl/55418 | Visual Sensory
The sensory organ of the visual system is the eye. The eye and the brain communicate and work together to help us interpret our physical surroundings using sight, or, what we see. Work on visual tracking skills by engaging with moving objects or with stationary objects while the body is moving.
Net Orders Checkout
Item Price Qty Total
Subtotal $0.00
Shipping Address
Shipping Methods |
global_01_local_0_shard_00002368_processed.jsonl/55457 | @article{EvaluasiLapangTerhadapDampakAplikasiInsektisidaIsoprocarbPadaSeranggaPredatorDanHamaKutuPerisaiAulacaspisTegalensisZhntHomopteraDiaspididaeDiPertanamanTebu, author = {Rosma Hasibuan}, title = {Evaluasi Lapang Terhadap Dampak Aplikasi Insektisida Isoprocarb Pada Serangga Predator Dan Hama Kutu Perisai Aulacaspis Tegalensis Zhnt. (Homoptera: Diaspididae) Di Pertanaman Tebu}, number = {2}, volume = {4}, journal = {Jurnal Hama dan Penyakit Tumbuhan Tropika}, pages = {69--74}, month = {9}, year = {2004}, abstract = {Field evaluation of isoprocarb insecticide-application-effects on predacious insects and scale pest Aulacaspis tegalensis Zhnt. (Homoptera: Diaspididae) in sugarcane plantations. The sugarcane scale, Aulacaspis tegalensis Zehntner, is a new serious pest of sugarcane in Lampung Province. Over the years, most control practices against A. tegalensis rely on the use of chemical insecticide. A field study was conducted to assess the impact of isoprocarb (carbamate-insecticide) on sugarcane scale pests and their natural predators in sugarcane plantation. The results indicated that the application of isoprocarb (at recommended concentration = 1.25 mg/L) in sugarcane field failed to cause a significant reduction on scale pest populations. In contrast, the numbers of predacious insects was significantly reduced in isoprocarb-treated-field plots. The predacious insects in association with scale pests in sugarcane fields were predominantly coccinellids. Four species of primary predacious coccinellids attacking scale pests were: Chilocorus melanophthalmus, Chilocorus sp., Scymnus sp, and Telsimia sp. This field study indicated that the predacious species were more susceptible to isoprocarb than their prey.}, } |
global_01_local_0_shard_00002368_processed.jsonl/55469 | ‘The Atlantic’s’ Litany of Racist Sins: Being White Is a ‘Bloody Heirloom’
Race relations and identity politics are what drive some people to make some unbelievable judgments on the United States. Long before the Charlottesville incident in August, the left has slimed the right at racists and white supremacists.
In The Atlantic, an essay by National Correspondent Ta-Nehisi Coates, with the headline, “The First White President,” was published this week. Coates, of course, is a man so blinded by his own rage-addled racism that he declared the cops and firemen who died in the 9-11 attacks “were not human to me.” An excerpt from his new book, We Were Eight Years in Power, the essay detailed the sins of white folk in politics since 1776.
Coates referred to the supposed stigma of being white as the “bloody heirloom,” something that apparently no white politician can shake off. (It’s not exactly something that can be surgically removed.) And while Trump is, in his opinion, the ultimate negation of the legacy of Barack Obama, everyone, liberals and conservatives alike, is at fault for promoting blatant racism in the political world.
It began “with Virginia slaveholders claiming that Britain sought to make slaves of them.” Coates’ opinion on historical conflicts is that if there was a grievance, it could be compared in relation to slavery. There is no grey area in history: either a group was fighting off slavery, or it wasn’t.
While the rest of American politicians, from 1776 onward, made use of the “passive power of whiteness” to achieve their public positions, at least, according to Coates, they had other recommendations to power. Not so with Trump: his “ideology is white supremacy, in all its truculent and sanctimonious power.”
Liberals are at fault even more so than conservatives, because while conservatives--especially the working class--promote white supremacists, liberals fail consistently, in Coates’ opinion, to point this out. Instead, white working class people, a group that is “imagined,” are pitied, while black people are allegedly ignored. “That black people, who have lived for centuries under such derision and condescension, have not yet been driven into the arms of Trump does not trouble these theoreticians,” said Coates.
And while not every Trump supporter is a white supremacist, they are complicit in the “ideology,” because they “felt it acceptable to hand the fate of the country over to one.”
“Racism remains, as it has since 1776, at the heart of this country’s political life,” Coates generalized. However, while he stated that Trump supporters were mainly white, with a higher average income than minorities, he failed to take into account that, at least according to the 2016 census, the United States’ population is actually 76% white people. That doesn’t mean that whoever the white people vote for will be a white supremacist. It’s just numbers.
Coates said that the only reason Obama supposed left the presidency with the country more divided than before was because “most Americans identify as white.” Of course, it had nothing to do with Obama’s overreach of the executive office’s powers, (thus resulting in DACA), or his poor foreign policy execution (remember the “apology tour?”)
But Coates will never find anything wrong with the Obama administration. In the past, he has even said that Obama’s “belief in the heart of white people blinded him to believe in the appeal of Trump.”
Americans are sick of identity politics, it’s true. But that doesn’t make the entire white population complicit in racism.
Charlottesville violence Atlantic Ta-Nehisi Coates
Sponsored Links |
global_01_local_0_shard_00002368_processed.jsonl/55474 | Listen now to Radio New Springs - Click here to listen.
City Biz
Brick Upon Brick, Stone Upon Stone
Loughborough Church - Brick upon brick, stone upon stoneLuke 1:37 “For with God nothing shall be impossible.” Don’t you just love verses like this? Or maybe you hate reading them. Because love it or hate it, they challenge you to walk into a different space with God. What seems impossible to man is not impossible for God.
Jesus also said:
Mark 9:23 (NKJV)
You often hear us talk about the “faith space”, what is the faith space? It is stepping into a space with God when He calls you to do something that is outside of your ability.
It’s the “faith space” why because if it is going to be done it needs God to show up.
God loves it when we choose to enter into that place, when we realise we are not able, but with God it can be done, when we exercise faith in Him. It is trusting in our Almighty God.
Hebrews 11:6 (NASB)
Faith is not a passive thing; it is shown by our willingness to act, to enter into that space with a living God.
When God asks us to do something, it will always require us to enter into that faith space with Him, where our trust is in Him. It is faith in action.
I love the account of Nehemiah rebuilding the wall of Jerusalem, now here is a man who entered into the faith space.
I wonder what it was like for Nehemiah, faced with an overwhelming task of rebuilding the walls of Jerusalem, they had stood like it for decades, broken down, heaps of burnt out stones. Gates off their hinges at best, others just burnt for firewood. There were gaping holes everywhere. The City was in a bit of a mess to say the least.
Yet he knew that God had placed in him the vision to rebuild the walls the walls of the city.
He had signs of favour from the king of Persia, letters to support the need.
You know what I love about this account, He didn’t scour the land for skilled craftsmen, and He didn’t go looking for “Bob the Builder” or look to shop in the nation’s top city building company. He went to the people that were there, and presented the vision. It is interesting how faith in God is contagious. The people caught the vision, suddenly the people who had lived there for years; saw through eyes of faith what could be done.
There are suddenlys with God, they are not suddenlys to God because God always knew, they are just sunddenlys to us.
The people began to get hold of the vision, and committed themselves to the task, working as families and groups they managed to complete the task in 52 days!
It was not without opposition and they had to keep focused on what God had told them to do. But together they accomplished what God had put before them.
We are exploring what God is saying to us about the building on Belton Road. This is not an easy task, if this is what God is asking us to do, it will require us all to be in this together; all of us doing what we can. I believe that God’s people are the most powerful force on earth when they are united in the purposes of God.
Whether it is this building or another, there is one thing for sure; we will have to step into the faith space with God.
Remember Luke 1:37 “For with God nothing shall be impossible.” |
global_01_local_0_shard_00002368_processed.jsonl/55480 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://www.ninoyuri.com/top/80%Weekly2019-01-29 20:12
https://www.ninoyuri.com/ikuos-review/80%Weekly2018-09-29 10:58 |
global_01_local_0_shard_00002368_processed.jsonl/55510 | This is the first post in a series of posts where we will learn how to build a cross-platform C++ library which can be seamlessly called from .NET Core applications using P/Invoke on all supported platforms. We will gradually build a library which will take us from a simple “Hello world” to more complex tasks like string and structure manipulations.
All source code is available at my GitHub repo: You can easily inspect the code for each post using tags. For this post the tag is 1_hello_world.
In this post will set up the environment and cover basic things we will need to compile our native library.
The design
As you probably know, C++ libraries are generally compiled straight to machine code without the use of any intermediate language. This prevents us from compiling a single binary and using it on all platforms. Instead, we will compile a separate binary for each supported platform.
We will also create a single .NET Core application which will call the appropriate native library depending on the platform. This takes us to the task of managing the native binaries. We could just bundle those binaries along with our assembly and it would work. But I prefer to pack native dependencies inside the .NET assembly and then unpack the needed native library at runtime depending on the platform.
Now let's setup our environments under Windows, Linux and MacOs. You can easily omit platforms you are not interested in.
Setting up the environment
Under Windows things are pretty simple: just install Visual Studio 2019 with the following workloads:
• Desktop development with C++
• .NET Core cross-platform development
Make sure to select C++ CMake tools for Windows in “Installation details” pane under “Desktop development with C++” workload.
In this post we will use Ubuntu to build and test our library. First of all, we will install essential build tools:
sudo apt install build-essential
Then we will need to install latest CMake. In this post I will cover CMake 3.14 which is the latest version at the time of writing. We will have to compile CMake from source, since most Ubuntu distributions still use older versions in their package repos.
The steps to build CMake are easy:
1. Visit and write down the version of the latest stable release. In my case it's 3.14.5.
2. Execute these commands substituting the version from step 1:
tar xf cmake-3.14.5.tar.gz
cd cmake-3.14.5
sudo make install
You can now execute cmake --version. If everything went smoothly, you will see the version you've just installed.
After this we will install .NET Core. There is always an up-to-date version of .NET Core installation instructions here: You can choose your Linux version from the drop-down list and follow the instructions.
Under MacOs we will need to install XCode Command Line Tools. If you already have full XCode installed, skip this step.
Open the Terminal and run
gcc --version
If you already have the tools installed, it will pring gcc version. If not, the dialog will appear which will prompt to install either XCode or just the Command Line Tools. You can install full XCode, but Command Line Tools alone will suffice for our job.
Now let's install Homebrew. It's a command-line package manager for MacOs, much like apt for Ubuntu. We will use Homebrew to install CMake.
Go to Homebrew page at and execute the installation command at the top of the page.
Now just run:
brew cask install cmake
And after that install latest .NET Core SDK using instructions at
Creating a cross-platfrom C++ library
Now we will create a simple C++ library with hello() exported function which will print “Hello from [OS]” to console depending on the platform it's run on.
First of all, let's create a heder file for our library.
#if defined DLL_EXPORTS
#if defined WIN32
#define LIB_API(RetType) extern "C" __declspec(dllexport) RetType
#define LIB_API(RetType) extern "C" RetType __attribute__((visibility("default")))
#if defined WIN32
#define LIB_API(RetType) extern "C" __declspec(dllimport) RetType
#define LIB_API(RetType) extern "C" RetType
LIB_API(void) hello();
Let's see what happened here.
Include guard
There is a standard include guard to prevent our header to be included multiple times. I'm aware of #pragma once, but we will use old-style include guards for reasons stated here: caveats.
Import-export block
Library functions are not exported by default on Windows, so if you want to make some function available to be called from outside the library, you need to decorate this function with __declspec(dllexport). And if you want to call some exported function, you need to declare it with __declspec(dllimport) in your code.
Taking this into account we will have to distinguish between two cases:
1. The header was included in the library itself and the fucntion needs to be exported.
2. The header was included in some client code and the function needs to be imported.
Also, we always need to export and import our function with plain C semantics, as C++ tends to mangle function names in order to support classes. We can only call unmangled functions from .NET, so we need to always use extern "C" on our functions.
To make our function declarations easy, we define the LIB_API macro that takes the return type of the function as an argument. We also check for DLL_EXPORTS macro, which we will always define when compiling our library. This way, our library will export functions defined with LIB_API macro, and client applications will import those functions since there will be no DLL_EXPORTS macro defined.
As you can see, we also check for WIN32 macro, which means that our code is being compiled on Windows.
The function
And finally, we declare our function:
LIB_API(void) hello();
This is a simple function which doesn't receive any arguments and doesn't return anything.
The source
Now let's write the actual source code for our library:
#include "library.h"
#include <iostream>
#if defined(_WIN32)
#define OS "Windows"
#elif defined(__linux__)
#define OS "Linux"
#elif defined(__APPLE__)
#define OS "MacOS"
#define OS "Unknown OS"
void hello() {
std::cout << "Hello from " << OS << "!" << std::endl;
This is a dead-simple source file. First of all, we use some compiler predefined macros to distinguish between platforms: Windows, Linux or MacOs. If you want to have more fine-grained checks and detect stuff like iOS, you will have to write more sophisticated checks. We define the OS macro to substitute a string depending on the platform.
Then we just implement our hello() function and print a greeting to standard output.
The last piece of the puzzle we need to compile our library is the makefile. We are using CMake, so we will have something like this:
cmake_minimum_required(VERSION 3.14)
add_library(TestLib SHARED library.cpp library.h)
This is, again, a very simple CMake file which will let us build our shared library under all three platforms. Notice the DLL_EXPORTS that we define for our build.
Building the library
Now we will build our native library for each platform. Note that to use CMake under Windows, you will need to use Developer Command Prompt for VS. Find it in the Start menu. Under Linux and MacOs you can just use your terminal of choice.
We will perform an out-of-source CMake build. This means that we will create a separate build directory and store all build artifacts there. Commands are identical for all three platforms:
cd [clone_dir]/TestLib
mkdir build
cd build
cmake --build . --config Release
You will find a compiled binary in build directory on Linux and MacOs and in build\Release directory on Windows. The library will have the .dll extension on Windows, .so extension on Linux and .dylib on MacOs.
Congratulations! You've just compiled a completely cross-platfrom library ready to be called from .NET Core!
In the next post we will create a .NET Core Console app, pack our native binaries as resources and learn how to extract and call them under different platforms. |
global_01_local_0_shard_00002368_processed.jsonl/55518 | Important Do as directed for Board Exam 2019, for SSC 10th Standard Students.
1. Pick out the infinitives from the following sentence.
He would teach me to write whole sentences and to add numbers.
Answer: To write and to add are infinitives.
2. Make a meaningful sentence by using the following phrase, ‘in pursuit of’
Answer: Mahatma Gandhi spent his time in pursuit of truth.
3. Find out 2 hidden words of minimum 4 letters from - ‘tracheotomy’
Answer: motor and arch
4. Punctuate the following sentence.
You have never heard of Bach he asked.
Answer: “You have never heard of Bach?” he asked.
5. Identify the type of sentence.
What a horrifying news it is!
Answer: Exclamatory sentence.
6. Write down a pair of “Homophones” with difference in meanings.
Answer: sea and see, Here sea means the expanse of salt water, see means perceive with the eyes.
7. Spot the error in the following sentence and rewrite it.
We was discussing this unusual birthday party.
Answer: We were discussing this unusual birthday party.
8. Write two present participle in which, the last letter is doubled.
Answer: running, batting. |
global_01_local_0_shard_00002368_processed.jsonl/55531 | Brice Folden is one of the most respected wildlife trackers in the world. The Black Rhino. The Mountain Lion. The Komodo Dragon.
Armed with a tranquilizer gun, he is on a quest for exotic species.
HUNTING FOR SCIENCE combines extreme eco-tourism with the thrill of big game
hunting. Each episode begins with charismatic host Brice Folden reporting to Tracker Tactical Control where he is given a creature to hunt and an exotic location. Once he is briefed on all the ways he could die, the adventure begins.
HUNTING FOR SCIENCE is unafraid to take on any challenge in any environment. Action packed, death defying tracking serves the objective of providing knowledge that could save a species. Respect for local customs, making new friends, eating strange foods, and saving species creates a joyful celebration of life.
Radical science. Radical adventure.
© 2014 Open Sky Pictures
Designed by Cristoval Castillon |
global_01_local_0_shard_00002368_processed.jsonl/55550 | Top 2 Breathing Techniques for COPD
Are you ready for all of the fun activities in 2018? If you suffer from COPD or other lung/breathing related illnesses you may notice that with the cold weather and with increased physical activity your breathing isn’t as easy as it should be. Luckily we’ve put together two simple and easy to follow techniques to keep you breathing easy and relaxed!
The most important thing to remember when you're having difficulty breathing is to relax. Tensing up and becoming anxious will only work to hinder your breathing further. To ensure these breathing techniques are right for you, we suggest consulting your doctor.
The following two breathing techniques are recommended by respiratory therapists. These techniques generally work to relax you and help give the muscles around your lungs, as well as your lungs themselves, a gentle but brisk work-out.
Educate yourself with our Free Oxygen Therapy Guide
1. Pursed-Lip Breathing
Starting to feel short of breath? This breathing technique will slow down your breathing and open up your lungs to allow more oxygen in as well as allow for more carbon dioxide to escape. This technique is called pursed-lip breathing and it reduces the work of breathing in the long run and increases how long you’re able to perform physical activities.
Step 1: Inhale deeply through your nose for roughly 2 seconds.
Step 2: Purse your lips like you’re about to drink through a straw.
Step 3: Breathe out slowly for roughly 4-8 seconds (should be 2 to 4 times longer than your inhale breath)
Step 4: Repeat steps 1-3, 10 times per session.
2. Diaphragmatic Breathing
This technique is used to strengthen the diaphragm, which is the muscle you should use when you breath. If you suffer from COPD, your diaphragm is naturally weaker and your breathing may be controlled with your back and neck muscles. This style of breathing may result in shallow breathing and does not use the diaphragm muscles it should. Instead work to strengthen the diaphragm muscles with this more difficult technique. As always we suggest consulting your doctor to ensure these exercises are safe for your current condition.
Step 1: Relax your shoulders.
Step 2: Rest one hand on your chest and the other hand on your stomach.
Step 3: Inhale through your nose for roughly 2 seconds.
Step 4: Breathe in and expand your stomach outward. Your stomach should expand father than your chest.
Step 5: Breathe out and gently press on your extended stomach. This will assist in getting all of the air out by putting slight pressure on your diaphragm.
Step 6: Repeat steps 1 through 5, 5 times per session.
These breathing techniques are great ways to retrain yourself to breath correctly. They’ll also help you strengthen the muscles you need to breath which will help you avoid developing shallow breathing as a habit.
As always, consult your doctor before beginning any new habits or routines. If you have any health related concerns, please contact your doctor. Your individual physician will have the inside knowledge into your current and past medical history in order to best assist you with any health related concerns and inquiries.
18 thoughts on “Top 2 Breathing Techniques for COPD”
Leave a Comment |
global_01_local_0_shard_00002368_processed.jsonl/55563 | distribute quondam your means to officially redirect cover dog
rensning af macbook air | 14.08.2019
The greatest messed-up with one-upping friends (except for the points that they can be in toto annoying) is that it can unseat rioquan.fromop.se/min-dagbog/rensning-af-macbook-air.php out your own competitive behavior. When you’re constantly looking to “route” your friends’ lifestyles, you muscle be driven to desiccate ago your means to officially be satisfying outdistance dog.
Přidat nový příspěvek |
global_01_local_0_shard_00002368_processed.jsonl/55592 | Customer Information Management
For Omnichannel Success, Retailers Must Embrace Location Intelligence
Adopting an omnichannel strategy is the best way for retailers to stay relevant in the minds of consumers
"A lot of what is driving the big decisions in retail is Location Intelligence harvested from customer data, which is easier to harness today than ever before." Linda Mitchell
Senior Director, Solutions Management - Retail and Telecommunications Vertical Manager
Pitney Bowes
Retail used to be a relatively straightforward industry. In the past, malls, town centers, and commercial districts would provide the primary point of contact between consumers and their preferred brands. Today, however, retail has become an omnichannel industry, allowing shoppers to interact with brands through any physical or digital channel that’s most convenient to them.
This shift gives consumers great freedom and flexibility in deciding both how they will interact with brands, and which retailers they ultimately shop with. This has changed the operational structure of most retailers, as they have to embrace both physical and digital channels to drive sales and loyalty, rather than choosing one over the other.
Retailers must reorganize to meet customers on their terms
For instance, retailers that are closing physical storefronts may give off the perception that their business is suffering, when in reality they are actually adapting to new trends. By utilizing customer data, a particular retailer may have decided that a lean brick-and-mortar operation and expanded focus on their online storefront makes more financial sense than the old model.
That isn’t to say that all brands embracing digital are necessarily doing omnichannel correctly. While on social media, for instance, a consumer may be bombarded with targeted advertising from a brand that they’ve shopped with once or twice in the past. But, if this advertising is more of an annoyance than an enticement, is this retailer actually succeeding in marketing, and ultimately selling, their product? Is this retailer actually succeeding in building brand loyalty, or driving traffic to their store, and ultimately selling their product?
Location Intelligence can help drive critical business changes
A lot of what is driving the big decisions in retail is Location Intelligence harvested from customer data, which is easier to harness today than ever before. The retailer deciding to scale back on their brick-and-mortar branches, for example, may have studied buyer habits and seen that the customers they most want to target have a proclivity for browsing products on their phones.
On the flipside of that scenario, the brand that’s bombarding users with ads on social media may be casting too wide of a net, turning off customers who are less receptive to targeted advertising without nurturing more appropriate ways of outreach, a result of a lack of understanding each customer as an individual, their buying history including location and channel.
Location Intelligence also provides the means for brands to grow, not just reorganize. Retailers can now collect information from many resources to inform their Location Intelligence initiatives. Card Transactions have geotags, for example, that can help retailers figure out not only which of their physical stores are performing best, but also where geographically their buyers are more likely to shop online. Taking that a step further, retailers can even decipher which online shopping portals customers are utilizing to align their marketing efforts alongside the most profitable channels.
Looking at regional competition can help inform a retailer’s entry into a new market. At the same time, costs associated with transporting stock between a warehouse and a storefront can be calculated based on distance, potentially making or breaking a real estate decision. The challenge with the deluge of big data for retailers is extracting actionable insights that fit alongside a brand’s specific business needs.
To learn more about how retailers can utilize Location Intelligence to improve their bottom line and customer experience, download the new whitepaper, “Optimize Your Selling Channel,” from Retail Customer Experience, sponsored by Pitney Bowes. In it, the author takes a deep dive into the different opportunities for retailers to embrace an omnichannel retail landscape to better serve the customers they want. |
global_01_local_0_shard_00002368_processed.jsonl/55595 | Join Donate
Emily LakdawallaFebruary 23, 2011
Asteroid (216) Kleopatra has been interesting to astronomers for a long time because its brightness is highly variable, but it seems to get more interesting every time somebody looks at it with a new instrument. In 2000 it was found to be "dog-bone" shaped; in 2008 it was discovered to have two moons. This week a paper was published in Icarus by Pascal Descamps, Franck Marchis, and 17 coauthors, who used measurements of the orbits of those moons to determine Kleopatra's mass and density, which revealed that it's 30 to 50% empty space.
Just in time for the paper to appear in print, the IAU has approved names for the two moons: Cleoselene and Alexhelios. As the UC Berkeley press release states, these names were chosen for the twin children of Cleopatra: "The Committee on Small Body Nomenclature of the International Astronomical Union accepted the proposal of Marchis and his collaborators to name the moons after Cleopatra's twins by Mark Antony: Cleopatra Selene II and Alexander Helios. The outermost moon is named Alexhelios and the innermost moon is Cleoselene. In Greek mythology, Helios and Selene represented the sun and moon, respectively." The new names were announced here (on page 371 of the linked PDF).
Here's a summary of the past research into Kleopatra:
Here's one of the images from Keck II showing the newly discovered moons, which also actually resolves the asteroid as a dog-bone shape:
Kleopatra, Alexhelios, and Cleoselene
Franck Marchis
Kleopatra, Alexhelios, and Cleoselene
An image from the adaptive optics-equipped Keck II Telescope resolves the dog-bone shape of asteroid (216) Kleopatra and its two moons, outer Alexhelios (1) and inner Cleoselene (2). Kleopatra is about 271 kilometers long, with two lobes each 80 kilometers long joined by a neck about 50 to 65 kilometers wide. The two moons are between 5 and 10 kilometers in diameter and orbit 454 and 678 kilometers away from Kleopatra.
And here's a spiffy animation of inner Cleoselene and outer Alexhelios in motion around the spinning Kleopatra:
Animation of Kleopatra, Alexhelios, and Cleoselene
Franck Marchis
Animation of Kleopatra, Alexhelios, and Cleoselene
A model for the shape of asteroid (216) Kleopatra spins while its two moons, inner Cleoselene and outer Alexhelios, orbit it.
This discovery made (216) Kleopatra the fourth discovered triple asteroid in the Main Belt, after (87) Sylvia, (45) Eugenia, and (3749) Balam. With three nights of observations -- on September 19 and October 5 and 9, 2008 -- the astronomers were able to determine the size, shape, mass, and density of the primary body and the size and orbital parameters of the moons.
Diameter (km) 6.9 ± 1.6 8.9 ± 1.6
Semi-major axis (km) 454 ± 6 678 ± 13
Period (days) 1.24 ± 0.02 2.32 ± 0.02
Knowing the sizes and orbits of the moons, they looked back at some data from a 1980 occultation of a bright star by Kleopatra, and it now appears that one pair of observers might actually have seen Alexhelios occult the star!
They described Kleopatra's shape this way:
Kleopatra is confirmed to be irregularly shaped and strongly bifurcated. Its spatial extent is about 271 x 65 km. It appears to look more like a dumbbell than a dog-bone. Two equal-sized misshapen lobes, each 80 km across, are joined by a thin and long bridge of matter about 50 to 65 km across and 90 km long. From a quick comparison between AO images and projected radar model, it appears that Kleopatra seems much narrower than its radar model and therefore is likely a more stretched body than believed. Despite these slight disagreements the radar shape model is a good reference to estimate the size of Kleopatra.
From the size and the mass determined from Alexhelios and Cleoselene's orbits using Kepler's second law, they were able to determine a bulk density for Kleopatra of 3.6 ± 0.4 grams per cubic centimeter.
Now, this is an interesting number. It's denser than the densest of common rock-forming minerals, the densest of which comes in at about 3.5 g/cm3. However, it's far less dense than the next denser common compositions for asteroidal bodies, which are silica-bearing iron meteorites at 5.0 or iron meteorites at 7.5. Multiple lines of evidence -- its M-type spectrum, its very high radar albedo, its extreme radar smoothness, and extremely high thermal inertia -- all suggest that it is metallic. If it is, in fact, metallic, it must consist of almost 50% empty space in order to have a bulk density of only 3.6; it's a loosely agglomerated rubble pile.
From all of this information, Descamps and his coauthors write, "We can now draw a convincing picture of Kleopatra's story, born from the aftermath of a reaccumulation process following the violent disruption of a parent body and sped up fast enough to deform according to the rough guidelines given by the equilibrium sequences of a spinning liquid mass.... This does not mean that the interiors are liquid but only that the loosely packed internal structure may interact and react in a similar manner as a liquid mass does over a long period of time. As to the origin of Kleopatra's companions, they could be a byproduct of the spinning-up process leading to mass shedding in orbit." In other words, Cleoselene and Alexhelios likely were born from Kleopatra as the asteroid spun faster and faster.
Read more: asteroids, optical telescopes
You are here:
Emily Lakdawalla 2017 headshot square serene
Emily Lakdawalla
Solar System Specialist for The Planetary Society
Read more articles by Emily Lakdawalla
Comments & Sharing
Bill Nye and people
Let's Change the World
Join Today
The Planetary Fund
"We're changing the world. Are you in?"
- CEO Bill Nye
Sign Up for Email Updates |
global_01_local_0_shard_00002368_processed.jsonl/55606 | Against Medical Recommendations, FDA Approves Potent New Painkiller
The FDA's medical advisory board voted against approving Zohydro, an opioid painkiller drug with up to 10 times more hydrocodone than Vicodin.
And now the FDA has approved an even more addictive pill. Medical experts warned the agency that Zohydro, an opiod painkiller that contains an unusually high dose of hydrocodone—up to 10 times more than Vicodin—has high potential for abuse. This is the first hydrocodone drug the FDA has approved that isn't diluted with another painkiller like acetaminophen, which can make opioid medications less addictive but also can cause liver damage. Oxycontin, which similarly contains the undiluted opioid oxycodone, has high rates of abuse and overdose.
See the full story from Mother Jones. |
global_01_local_0_shard_00002368_processed.jsonl/55622 |
Quick Navigation Menu
We post links, such as those above, to websites which we like and which have content compatible with our website.
We particularly appreciate having a reciprocal link agreement with you, in which you agree to place a link back to us on your website.
For that purpose, we offer this HTML link code which you may place in your website.
Note that our logo image size defaults to 300 pixels width and 50 pixels height.
It looks like this:
You may use copy/paste in this box. |
global_01_local_0_shard_00002368_processed.jsonl/55624 | • Image
Salamander Grill
A salamander is a culinary broiler characterized by very high temperature overhead infrared heating elements which may be powered by either electricity or gas. It is used primarily in professional kitchens for overhead grilling (US: broiling). It is also used for toasting, as well as browning of gratin dishes, melting cheeses onto sandwiches, and caramelising desserts such as creme brulee. Salamanders are generally similar to an oven without a front door, with the heating elements at the top. They are more compact: typically only half the height and depth of a conventional oven. They are often wall mounted at eye level enabling easy access and close control of the cooking process. Many salamanders can be fitted with a cast iron "branding" plate which are used to make grill marks on the surface of meat. Some grills can also be fitted with a rotisserie accessory for roasting meats. |
global_01_local_0_shard_00002368_processed.jsonl/55659 | Monday, May 13, 2019
family pictures
what are you staring at over there??
no kittens - over here
so close
look lady - just give it up
The kittens are doing very well together. Mom checked on them the other day and there were 4 out
of 6 kittens stacked up on the penthouse on top of the Kitty Kasas. The decoders are fine with their collars which is nice since it is easier to tell them apart in pictures and even on the web cam.
The vacuum kittens are doing so much better and are seeking attention and love from mom. She thinks that they were mostly jumpy due to Bissell being jumpy. It really does make a huge difference for kittens to have examples showing them that things are OK.
They are having a blast running around the foster room. Sometimes it is absolutely silent and you wonder if there are kittens in there are all, and other times it sounds like there is an army in there.
1. These two litters make a formidable gang!
2. Getting the kittens used to humans and other cats is terrific!
3. hay ewe wee onez... lesson number 5: just keep starin coz it freekz out peepulz when ya due that...matterz knot WHAT ya stare at...just stare ;) ☺☺♥♥
4. Oh my, the fun! Good to hear the vacuum kitties are learning from their room mates.
5. Yes, good examples for kittens are important, I've found, too. I like the idea of adopting kittens together or, better yet, I think, into a home with an older cat.
6. I'm always suspicious of quiet! But I swear sometimes my two sound like elephants running up and down the hall after each other!
We love to hear from you..... |
global_01_local_0_shard_00002368_processed.jsonl/55661 | The Bling Ring Movie Quotes
Movie and TV Quotes
101 votes 47 voters 12.2k views 10 items
"The Bling Ring" movie quotes rehash the true story of a group of fame-obsessed teenagers who orchestrated a string of robberies with Hollywood's hottest celebrities as the victims. Based on the Vanity Fair article titled "The Suspects Wore Louboutins" by Nancy Jo Sales, Sofia Coppola wrote, directed and produced the crime drama film. "The Bling Ring" first premiered at the 2013 Cannes Film Festival before opening across the United States on June 21, 2013.
In "The Bling Ring," the title group of friends forms when Rebecca (Katie Chang), Nicki (Emma Watson), Marc (Isreal Broussard), Sam (Taissa Farmiga) and Chloe (Claire Julien) meet at a nightclub. As the teens get to know one another and dance, they are captivated by the fact that they're parting among the biggest young celebrities in Hollywood, including Paris Hilton and Kirsten Dunst, both of whom make cameos as themselves in the film. This sense of being among the hottest celebs take over the group, specifically Marc and Rebecca, and turns into something they crave.
Since the teens cannot just instantly join the entourage of these celebrities, they decide to make themselves part of the lives of these celebs through crime. Using the Internet and social media, they track the whereabouts of stars like Paris Hilton and Lindsay Lohan then break into their homes when the starlets are elsewhere. They get away with the robberies for a while but the same thing that helped them get in, technology, ultimately leads to their downfall as police are soon on their trail.
If "The Bling Ring" isn't something that interests you, theaters have many other great movies at the same time including "World War Z," "Man of Steel," "This Is the End," "The Internship," "The Purge," "After Earth," "Fast and Furious 6," "The Hangover Part III," "The Great Gatsby," "The Big Wedding," "Oblivion," "Scary Movie 5," "Evil Dead," "Jurassic Park 3D," "G.I. Joe: Retaliation," "Olympus Has Fallen," "Admission," "The Incredible Burt Wonderstone."
Let's Go to Paris's
Ranker Video
Video: YouTube
Marc: "Paris Hilton's hosting a party in Vegas tonight."
Rebecca: "Where does she live? Do you think we could find a way in?"
Marc: "I… I don't know."
Rebecca: "Come on, let's go to Paris's."
Upon learning that Paris Hilton will not be home on a specific night, Rebecca, the ring leader of the Bling Ring, gets the idea to break into Paris's home. But before they do that, they'll need to research the heist, something made much easier by technology and the Internet.
Should this be higher or lower?
Learning Lesson
Learning Lesson is listed (or ranked) 2 on the list The Bling Ring Movie Quotes
Photo: null/Metaweb/CC-BY
After her arrest, Nicki speaks to the press gathered outside of the government building to give what could be described as a really bad attempt at a coached statement when it's really apparent that Nicki has no belief in what she's saying.
Should this be higher or lower?
I Wanna Rob
Ranker Video
Video: YouTube
Nicki: "I wanna rob!"
Giving her best Paris Hilton impression, Nicki jokes about how she wants to rob celebrities. It was no joke though as that's exactly what she and the others did.
Should this be higher or lower?
Let's Go Shopping
Ranker Video
Video: YouTube
Rebecca: "Let's go shopping!"
For Rebecca, the heists are not crimes, rather lavish shopping trips where they enter the homes and closets of celebrities and simply take what they wish. Too bad for Rebecca though that the celebrities and police see it much differently, as criminal activity.
Should this be higher or lower? |
global_01_local_0_shard_00002368_processed.jsonl/55670 | John Constantine: Hellblazer Vol. 21: The Laughing Magician
In these stories from HELLBLAZER #239-249, when the war-mage Mako carves a bloody swath through London’s occult underworld, John Constantine tries to rally his former allies, despite all the bridges he’s burned... Plus, when something goes horribly wrong in a secret room in the Vatican, a priest is forced to turn to Constantine for help. And in a story from HELLBLAZER SPECIAL: LADY CONSTANTINE #1-4, Johanna Constantine, 18th-century ancestor of Hellblazer, lands a job that promises a future of wealth and entitlement-and almost certain death and damnation in the frozen North Sea!
Customer Rating
Average Rating (11):
Drama Horror Mature Movies & TV
About Book
Page Count
344 Pages
Print Release Date
July 30 2019
Digital Release Date
July 30 2019
Age Rating
17+ Only |
global_01_local_0_shard_00002368_processed.jsonl/55671 | The seventy-five day period in which God will pour out His indignation.
The indignation is a 75 day period that will occur at the end of Daniel's seventieth week. It is a technical term in the prophetic scriptures that refers to a series of judgments. A number of references will make clear that this period is when God will vent His indignation on the earth for, above all, rejecting His Son.
Two attacks of the Assyrian. Generally speaking, the indignation stretches across the two attacks of the Assyrian. A verse to show that is Isa. 10:5. From Daniel and Revelation we can conclude that the first attack of the Assyrian (the King of the North) will occur at 1260 days, and the second attack (Gog and Magog) will occur at 1335 days measured from the middle of Daniel's 70th week. The space of time covered by the indignation therefore is 75 days.
"O Assyrian, the rod of mine anger, and the staff in their hand is mine indignation. ... For yet a very little while, and the indignation shall cease, and mine anger in their destruction." Isa. 10:5, 25
Seven Battles of the Indignation. Students of prophecy have used different schemes to describe the events of this period, but my favorite approach is to view the indignation as a series of seven battles (credit to Bruce Anstey). Over the period of 75 days, there will be more bloodshed than ever in the history of the world.
Battle #1: King of the South Advances
“And at the time of the end shall the King of the South push at him [the King of the North]…” Dan. 11:40
“Who is this that cometh up as a flood, whose waters are moved as the rivers? Egypt riseth up like a flood, and his waters are moved like the rivers; and he saith, I will go up, and will cover the earth; I will destroy the city and the inhabitants thereof. Come up, ye horses; and rage, ye chariots; and let the mighty men come forth; the Ethiopians and the Libyans, that handle the shield; and the Lydians, that handle and bend the bow.” Jer. 46:3-9
“And it shall come to pass in that day, that Jehovah will hiss [or, whistle] for the fly which is at the extremity of the streams of Egypt…” Isa. 7:18
The first “battle” of the indignation will be a military campaign of the southern confederacy into Palestine. The King of the South will push north against “him” (Antichrist, in Israel). He will have a confederacy, consisting of Egypt, Libya, and Ethiopia (Dan. 11:43; Ezek. 30:4-5), as well as other African nations. He will come with tremendous military force, “rising up like a flood” to “cover the earth”.
Battle #2: The King of the North Sweeps Down
The attack of the King of the North is the second battle of the indignation. Terms referring to this battle:
• The Invasion of the King of the North
• The First Attack of the Assyrian
• The Consumption.
“Jehovah will hiss [or, whistle]… for the bee which is in the land of Assyria; and they shall come…” Isaiah 7:19
Just as a man whistles for his dog or cat to come, Jehovah has the movements of nations in His hand, and He alone can command them for His purposes. He whistles once, and the King of the South comes up. He whistles again, and the King of the North comes down. God will not allow them to attack until the moment that He has appointed. This moment is pictured in Revelation as the drying of the great river Euphrates (sixth bowl, Rev 16:12) to open up “the way of the kings from the rising of the sun”
“… and the King of the North shall come against him like a whirlwind, with chariots, and with horsemen, and with many ships; and he shall enter into the countries, and overflow and pass through. And he shall enter into the land of beauty, and many countries shall be overthrown… And he shall stretch forth his hand upon the countries;” Daniel 11:40-41
The defeat of the King of the South. The advance of the King of the South will provoke the King of the North to come down, and he will do so with alarming speed (“as a whirlwind”) and force (“chariots, horsemen, many ships”). His confederacy will number 200,000,000 men! (Rev. 9:16). For the time, his soldiers will be invincible (Joel 2:1-11, Isa. 5:26-30). The relative strength of the King of the North will overwhelm the King of the South.
“and the land of Egypt shall not escape. And he shall have power over the treasures of gold and of silver, and over all the precious things of Egypt; and the Libyans and the Ethiopians shall be at his steps.” Daniel 11:42-43
What happens to Antichrist? When the King of the North begins his descent, the Antichrist flees, deserting the Jews:
• The Antichrist will “prosper until the indignation” (Dan. 11:36)
• The “hireling” flees when he sees the wolf coming (John 10:13)
• The “foolish and worthless shepherd” leaves the sheep (Zech. 11: 17)
• The Lord will “drive him from his office” in preparation for the true Messiah (Isa. 22: 19-21)
He flees presumably to Rome. He returns a few weeks later with the Beast, to fight the Lord at His appearing (Rev. 19:20).
The Consumption. “The consumption” is a technical term to describe the devastating effects of the King of the North.
“For though thy people Israel be as the sand of the sea, [only] a remnant of them shall return: the consumption determined shall overflow in righteousness.” Isa. 10:22 (see Isa. 28:22)
“And because of the protection of abominations [there shall be] a desolator, even until that the consumption and what is determined shall be poured out upon the desolate.” Dan. 9:27
As the King of the North sweeps down, he will pass through “many countries” including the land of Israel. He will wreak havoc along the way. As such his army is pictured as locusts in the prophet Joel; consuming everything, and leaving nothing behind. Miraculously, God will preserve those of the faithful remnant who are in the land at that time. But the apostate Jews who have rejected the gospel of the kingdom and have followed the Beast will be consumed. The net result of the consumption is that two thirds of the Jews who will be gathered back into the land of Israel will be killed! (Zech. 13:8). Approx. 12-13 million will be slaughtered in a period of a few days!
The Approach of the Assyrian. The King of the North will enter the land of Israel from the north (Isa. 9:1). His confederacy will number 200,000,000 men! (Rev. 9:16). For the time, his soldiers will be invincible (Joel 2:1-11, Isa. 5:26-30). Their marching will be “running” rather than walking. They will climb walls, jump, and enter buildings through windows. The noise of their feet will be like the roaring of the sea, and like the roaring of a lion. They will go from city to city in a destructive march, heading for Jerusalem.
As the allied armies of the King of the North approach, terror will strike the city. Isa. 10:28-32 gives a striking progression:
“He is come to Aiath … he hath passed through Migron … at Michmash he layeth up his baggage … They are gone through the pass … they make their lodging at Geba … Ramah trembleth … Gibeah of Saul is fled … Lift up thy voice, daughter of Gallim! … Hearken, O Laish! … Poor Anathoth! … Madmenah is fugitive … the inhabitants of Gebim take to flight … Still a day of halting at Nob … he shaketh his hand against the mount of the daughter of Zion, the hill of Jerusalem…” Isa. 10:28-32
The destruction of Jerusalem is the judgment on Israel for their unbelief. The prophet mocks the terror, the expressions of woe, from the apostate nation of Israel.
“The burden of the valley of vision. What aileth thee now, that thou art wholly gone up to the housetops?” Isa. 22:1
The destruction of Jerusalem. The King of the North will allow “Elam” (Iran), “Kir” (Moab), and “Edom” (Arabia) to lead the assault on Jerusalem. Men of Edom will shout repeatedly, “Lay it bare!” (Psa. 137:7). Obadiah 11-14 describes how Edom will watch with pleasure while Jerusalem is rifled, will loot the abandoned houses of the Jews, and will stand guard on the crossway, cutting down those who escape. For this reason, God will prepare a special judgment for Edom… a taste of his own medicine! (Obadiah 7).
Zeph. 1:10-12 gives us precise details of how the armies will enter the city:
“There shall be the noise of a cry from the fish gate, and an howling from the second, and a great crashing from the hills… And it shall come to pass at that time, that I will search Jerusalem with candles, and punish the men that are settled on their lees…” Zeph. 1:10-12
The faithful remnant. What will happen to the faithful Jews who remain in Jerusalem? They will be miraculously preserved because they trusted in the “precious corner stone” the “sure foundation” laid in Zion. (Isa. 28:16)
Ye shall be hid in the day of Jehovah’s anger.” Zeph. 2:3
“I will bring the third part into the fire, and will refine them as silver is refined, and will try them as gold is tried.” Zech. 13:9
The apostate Jews. While the remnant is preserved, the apostate Jews who trusted Antichrist will be slaughtered; “Their blood have they shed like water round about Jerusalem” (Psalm 79:3). Half of the city will be taken captive (Zech. 14:2). The temple will be destroyed, and burned with fire (Psa. 74: 1-8; Isa. 63:18; 64:11).
Other countries consumedThen, the King of the North will betray some of his own confederates (Edom, Moab, Ammon, Syria). Isa. 10:7 shows that the King of the North has “in his heart” a desire “to extirpate and cut off nations not a few.” These judgments are the subjects of Isa. 14:29 – 23:17, Jer. 46-49, Ezek. 25-30, and Amos. 1-2:8. Particularly, the Spirit of God foretells how Edom will be betrayed:
“All the men of thy confederacy have pushed thee to the border; the men that were at peace with thee have deceived thee, they have prevailed against thee; they that eat thy bread have laid a snare under thee.” Obadiah 7
Conquest of North Africa. The King of the North will continue his conquest down into North East Africa, destroying the King of the South (Egypt) and his allies: Libya, Ethiopia.
“And the Egyptians will I give over into the hand of a cruel lord, and a fierce king shall rule over them, saith the Lord, Jehovah of hosts” Isaiah 19:4.
The King of the North will destroy the King of the South, taking possession of Egypt and her allies. The “the treasures of gold and of silver” indicate that Egypt will be enriched by this time.
“And the sword shall come upon Egypt, and there shall be anguish in Ethiopia, when the slain shall fall in Egypt, and they shall take away her multitude, and her foundations shall be overthrown. Cush, and Phut, and Lud, and all the mingled people, and Chub, and the children of the land that is in league, shall fall with them by the sword.” Ezekiel 30:4-5
Battle #3: The Beast mounts a Counter-attack
The Counter Attack. The 6th trumpet is a broad look at the net effect of the Assyrian’s inroads. In short, when the King of the North invades the eastern border of the empire (Israel) with his Arab Confederacy, the empire will suffer a tremendous blow from this attack. The Beast will mount a counter attack, and sail across the Mediterranean with his navy, the “ships of Chittim” (Num. 24:24) to interfere in an ancient struggle between the Kings of the North and South (Dan. 11). This counter-attack will be in response to the descent of the Assyrian through Palestine, a land under Roman protection (the “protection of abominations”, Dan. 9:27).
The ships of Chittim. In history, the strife between the Kings of the North and South was brought to a halt (6th Syrian War) when the Roman Empire interfered in the conflict (Daniel 11:29-30a) by sending the “ships of Chittim”. William Kelly said, regarding Chittim (or, Kittim):
“… a term beyond controversy applied to two of the peninsulas of Europe, first Greece [or Macedon], then Rome or Italy.” – W. Kelly, The Early Chapters of Genesis
In a similar way, the Beast (revived Rome) will attempt to interfere again, but this time will be unsuccessful.
“And ships shall come from the coast of Chittim, and afflict Asshur, and afflict Eber, and he also shall be for destruction.” Numbers 24:24
We have already shown that Chittim is an ancient name for the peninsulas of Europe (Gen. 10:4), and the “ships of Chittim” are the Roman navy (Daniel 11:29-30a). Asshur is an ancient name for Assyria (Gen. 10:11) which is the land of the King of the North. “Eber” is the ancestor of the Jews (Gen. 10:24). So this indicates that, in the last days, the revived Roman Empire will send a large navy against Palestine and the King of the North!
“And I saw out of the mouth of the dragon, and out of the mouth of the beast, and out of the mouth of the false prophet, three unclean spirits, as frogs; for they are the spirits of demons, doing signs; which go out to the kings of the whole habitable world to gather them together to the war of that great day of God the Almighty.” Revelation 16:13-14
Armageddon. Rev. 16:16 tells us that the Gentile nations will be gathered together “to the place called in Hebrew, Armageddon.” The Hebrew form of Armageddon is “Megiddo”, a place to the north of Israel where God, in the Old Testament, came forth to fight against those who raised themselves against Him, see Jud. 5:19-20 (see 2 Chron. 35:22, Zech. 12:11). It is the area in Israel called the valley of Jezreel, or the Plain of Esdraelon. This is where the ravenous birds are gathered to the supper of God in Rev. 19:17-18. This is where the Beast, Antichrist, and the armies of Europe gather (Rev. 19:19-20), near where the Beast’s navy will make landfall. While Rev. 16:16 says the armies are specifically gathered together in a place called Armageddon, we can see by the reference made to “the whole habitable world” that it is a broader term – a series of battles during “the indignation,” beginning with the King of the South coming up.
Battle #4: The Appearing of Christ
Surprise! The Beast has crossed the Mediterranean with his navy to intercept the King of the North, but instead of the King of the North, the Beast and his armies will be met by the King of kings and Lord of lords coming out of heaven with His armies (Rev. 19:11-21). What a surprise! Shockingly, the Beast will attempt to “make war against him that sat upon the horse, and against his army.” At the battleground of Megiddo, the armies of Europe will be destroyed, and the Beast and False Prophet cast alive into the lake of fire. The only weapon in play will be “the sword of him that sat upon the horse” (Rev. 19:21). The battle will be over in an instant.
“And I saw the beast and the kings of the earth and their armies gathered together to make war against him that sat upon the horse, and against his army. And the beast was taken, and the false prophet that [was] with him, who wrought the signs before him by which he deceived them that received the mark of the beast, and those that worship his image. Alive were both cast into the lake of fire which burns with brimstone; and the rest were slain with the sword of him that sat upon the horse, which goes out of his mouth; and all the birds were filled with their flesh.” Revelation 19:19-21
“And then shall that Wicked be revealed, whom the Lord shall consume with the spirit of his mouth, and shall destroy with the brightness of his coming.” 2 Thess. 2:8
The Lord’s appearing will be in the north of the land, where He will destroy the Beast and his armies. Israel remarks that the faithful remnant at the north of the land, which had been “degraded” by the Assyrian (first attack), will be “honored” first by His glorious appearing at Megiddo. They will see “a great light” – a reference to the brightness of the Appearing of Christ (2 Thess. 2:8).
“…the land of Zebulun and the land of Naphtali, — the way of the sea, beyond the Jordan, Galilee of the nations: the people that walked in darkness have seen a great light; they that dwelt in the land of the shadow of death, upon them light hath shone.” Isa. 9:1-2
The Harvest Judgment (Rev. 14:14-16; Isaiah 21 – 24). At the time of the appearing, the angels will go forth over the Beast's empire and “reap” those who have refused the gospel of the kingdom. This is called the harvest judgment. The Harvest Judgment is a discriminating judgment, pictured in Matt. 13 by the harvestmen removing the tares from the field.
"One shall be taken [for judgment] and the other left [for blessing]." (Matt; 24:40-41)
"The Son of man shall send his angels, and they shall gather out of his kingdom all offences, and those that practise lawlessnessand they shall cast them into the furnace of fire; there shall be the weeping and the gnashing of teeth." (Matt. 13:14)
The Lord will send out His angels into “the whole world” to cleanse “the kingdom of the Son of man”, which is the prophetic earth (Matt. 13:37-42). It is discriminating because only the impostors (who have made a false profession of Christianity) will be taken by the angels. Those taken will be cast directly into the lake of fire. The Lord was marked out as the One who would baptize with fire (Matt.3:11). This is what Christ as the "Son of man sitting on the cloud" will do with the Christian testimony at the harvest judgment. The harvest judgment will take place between the appearing of Christ and 1290 days measured from the middle of Daniel’s seventieth week. It will only involve the prophetic earth (Israel and Europe). If it was the entire world then Gog and Magog wouldn’t be able to come down against them after the harvest.
The appearing. Five times we read of Christ coming like “a thief in the night” (1 Thess. 5:2; 5:4; 2 Pet. 3:10; Rev 3:3; 16:15), and never once does it refer to His coming for His saints, but always to His appearing. The Lord will appear on “a white horse”, the symbol of a victorious conqueror. “The armies which are in the heaven” will follow Him into battle, being composed of “all His saints”, including those raised and/or caught up at the Rapture, as well as the raised tribulation martyrs (Rev. 19:14). He will destroy the armies of the Beast, and the Antichrist with “the brightness of His coming.” (2 Thess. 2:8). The 7th trumpet (Rev. 11:15-18) and the 7th vial (Rev. 16:15-21) refer to this moment. The Lord will cast the personal Beast and the Antichrist alive into the lake of fire (Rev. 19:20-21).
The times of the Gentiles finished. The “times of the Gentiles” (Luke 21:24) – the period of Gentile supremacy over Israel – will be over. This will close Daniel’s 70th week, seven years from the time when Revived Rome made a covenant with the Nation of Israel. Just as Nebuchadnezzar’s dream had foretold, the times of the Gentiles will be finished when the “Stone cut out without hands” (Christ) smashes the ten toes of the image, which are the revived Roman Empire (Dan. 2:34-35). Read more…
“Thou sawest till that a stone was cut out without hands, which smote the image upon his feet that were of iron and clay, and brake them to pieces… and became like the chaff of the summer threshingfloors; and the wind carried them away, that no place was found for them.” Daniel 2:34-35
The sign of the Son of Man. No man knows the day nor the hour of the Lord’s Appearing (Matt. 24:36-41), but just before He appears, something called “the sign of the Son of Man” (Matt. 24:30) will appear in the sky. At this moment, “the Mystery of God will be ended” (Rev. 10:8) – the Mystery of why evil is allowed to go on “seemingly unchecked” in the earth. It will be a public manifestation.
Battle #5: The King of the North returns
The return from Egypt. When the King of the North is down in the south (Egypt), he hears these troubling rumors from the north and east. The “north” is where the Assyrian comes from. The “east” is the region he controls (Syrian, Iraq, Iran). His own countries send him troubling news; something that makes him hasten back home (through Palestine) with the intent to “exterminate” and “utterly destroy” some enemy.
“But tidings out of the east and out of the north shall trouble him; and he shall go forth with great fury to exterminate, and utterly to destroy many.” Dan. 11:44
What are the troubling rumors? There are a few things it could be. Russia and her confederacy will begin gearing up for war at this time (Ezek. 38-39). Being allied with Russia, the Assyrian may fear that a double-cross has occurred, and decide to head north to encounter the northeastern giant. But I want to give another reason that I believe is the most likely cause. The landing of a massive western army, and the commotion that follows could be the trigger for the Assyrian’s territories in the north and east to reach out to him with “troubling rumors”. We can’t say for sure.
Details of the fall of the King of the North. The Lord will be at the north of the land (Zebulon and Naphtali) where He will have just destroyed the Beast at Megiddo (Rev. 16:16; 19:19-20). The Jews there "have seen a great light" (Isa. 9:1-2). The King of the North will return from the land of Egypt "with great fury to exterminate, and utterly to destroy many" (Dan. 11:44). The remainder of the faithful remnant in Jerusalem will flee, but will be trapped at the Mount of Olives. Just at dusk, the Lord will plant His feet "upon the Mount of Olives" - the very place He ascended from - fulfilling Acts 1:11-12. The whole region will become light. The Mount of Olives will split in half, and separate, creating a valley running east to west (Zech. 14:4). The remnant will flee into that valley, all the way to Azal (Zech. 14:5) reaching safety. The Lord will reveal Himself to the Jews at this time. The Lord will encamp around His "house" (Zech. 9:8), and cover Jerusalem with His "wings" (Isa. 34:5). He will refuse to let the "exactor" pass through a second time. The King of the North will "plant the tents of his palace" - his temporary military base - “between the [Mediterranean] sea and the mountain of holy beauty [Zion]" (Dan. 11:45). The King of the North will "stand up against the Prince of princes" in battle (Dan. 8:25). By the sound of His voice, the Lord will "break the Assyrian" in the mountains below the city (Isa. 14:24-25). The Lord will then drive the King of the North "afar off" into a desert place, with his back to the Mediterranean and his front to the Dead Sea (Joel 2:20). The Lord will consume them with a fire that kills "both soul and body". Their bodies will collapse "as when a sick man faints" (Isa. 10:18). By morning, the vast army will be destroyed (Isa. 17:14). The entire ordeal will be over in one day (Isa. 10:17-18). The Lord will cast the King of the North into the lake of fire (Isa. 30:33).
“And he shall plant the tents of his palace between the sea and the mountain of holy beauty; and he shall come to his end, and there shall be none to help him.” Daniel 11:44-45
“And Asshur shall fall by the sword, not of a great man; and the sword, not of a mean man, shall devour him: and he shall flee from the sword, and his young men shall become tributary.” Isa. 31:8
“…but he shall be broken without hand.” Daniel 8:25
“Jehovah of hosts hath sworn saying, Assuredly as I have thought, so shall it come to pass; and as I have purposed, it shall stand: to break the Assyrian in my land; and upon my mountains will I tread him under foot; and his yoke shall depart from off them, and his burden depart from off their shoulders.” Isa. 14:24-25
“And I will remove far off from you him that cometh from the north, and will drive him into a land barren and desolate, his face toward the eastern sea, and his rear toward the hinder sea; and his stench shall come up, and his ill odour shall come up, for he hath exalted himself to do great things.” Joel 2:20
This is how the largest army in the history of the world will be demolished in one day.
The Restoration of Israel
Two phases of the Restoration of Israel. It will occur in two phases:
• The restoration of the two tribes – guilty of crucifying Messiah as well as breaking the law.
• The restoration of the ten tribes – guilty only of breaking the law.
Jews Restored
A private manifestation. On the backside of the mountains, the Lord will reveal Himself to the Jews in a quiet and intimate manifestation, much the same way Joseph revealed himself to his brethren (Gen 45:1-5). This private revelation will be between the Lord and the Jews alone (Zech. 12:10-14).
The Gospel of Peace. These ones that stayed in Jerusalem the entire 3 ½ years and possibly suffered the most, they are given the privilege to run to the hidden Jewish remnant in the mountains with the “Gospel of Peace”. So overjoyed will the war-torn, hidden remnant be, that they will exclaim, “How beautiful upon the mountains are the feet of him that bringeth good tidings, that publisheth peace; that bringeth good tidings of good, that publisheth salvation; that saith unto Zion, Thy God reigneth!” (Isa. 52:7).
National Repentance. The Jewish remnant will be brought to repentance. They will own their national blood-guiltiness in crucifying the Lord and will be restored to Him at this time. It is not individual repentance, but national repentance. The cross was 2000 years ago, but God wants to see a national change of heart in His earthly people. This work may begin earlier in the Great Tribulation, especially for the Maschilim (a special class of teachers, referred to in the Psalms, and in Dan. 11:33; 12:3), but the work will be completed when they “look upon Him whom they have pierced” and mourn in repentance.
“Then shall all the tribes of the earth mourn.” Matt. 24:30
“Deliver me from bloodguiltiness, O God, thou God of my salvation: and my tongue shall sing aloud of thy righteousness.” Psa. 51:14
Isa. 53 will be the essence of their confession; He was despised, and they esteemed Him not, etc. Then they will recognize what they were blind to at His first coming; the truth that Christ was suffering for their sins, so that they might be “healed” and have “peace” as a nation.
A Care for the Ten Tribes. One result of their restoration will be a felt care for the ten scattered tribes. We know that there was enmity between the ten tribes and the two tribes historically, but once the Jews are restored to the Lord, those hard feelings will be removed for their brethren. We see a similar care in the Shulamite for her younger sister in Song. 8:8-9. She pledges to build her little sister up and enhance her in any way possible; “If she be a wall, we will build upon her a turret of silver; and if she be a door, we will enclose her with boards of cedar.” The remnant of Judah and Benjamin (the Jews) will weep for their brethren, the scattered tribes of Israel, and the Lord will comfort them with the promise that they will be recovered:
“Thus saith Jehovah: A voice hath been heard in Ramah, the wail of very bitter weeping, — Rachel weeping for her children, refusing to be comforted for her children, because they are not. Thus saith the Lord; Refrain thy voice from weeping, and thine eyes from tears: for thy work shall be rewarded, saith the Lord; and they shall come again from the land of the enemy. And there is hope in thine end, saith the Lord, that thy children shall come again to their own border.” Jer. 31:15-17
Almost in reward for this loving care, God will give some of the Jewish remnant the privilege of being used of the Lord to go to the ten scattered tribes and tell them to return!
“And I heard the voice of the Lord saying, Whom shall I send, and who will go for us? And I said, Here am I; send me. And he said, Go; and thou shalt say unto this people…” Isa. 6:8-9
Ten Tribes Restored
Where will the ten tribes return from? The ten tribes will return from all over the world. It will be a great miracle all in itself. Some will come from as far as China! This is the prophetic fulfillment of The Feast of Trumpets” (Lev. 23:24-25).
“And he shall send his angels with a great sound of trumpet, and they shall gather together his elect from the four winds, from the one extremity of the heavens to the other extremity of them.” Matt. 24:31
“And it shall come to pass in that day, that the Lord shall set his hand again the second time to acquire the remnant of his people which shall be left, from Assyria, and from Egypt, and from Pathros [upper Egypt], and from Cush [North Africa /Arabia], and from Elam [Iran], and from Shinar [Iraq], and from Hamath [Syria], and from the islands of the sea. And he shall lift up a banner to the nations, and shall assemble the outcasts of Israel, and gather together the dispersed of Judah from the four corners of the earth.” Isa. 11:11-12
“In the ninth year of Hoshea the king of Assyria took Samaria, and carried Israel away into Assyria, and placed them in Halah and in Habor by the river of Gozan, and in the cities of the Medes [Kurdistan].” 2 Kings 17: 6
“And I will make all my mountains a way, and my highways shall be exalted. Behold, these shall come from far: and, lo, these from the north [Russia (see Psa. 120:5)] and from the west [Europe]; and these from the land of Sinim [China].” Isa. 49:11-12
Opening the Way for the Returning Tribes. There are a number of geological barriers that prevent the mass migration of millions of Israelites to Palestine. In order to open the way, a number of changes will come to pass. First, the “tongue of the Red Sea” (the east and west arms of the sea which form the Sinai Peninsula) will be dried (Isa. 11:15). Secondly, the “depths of the Nile” (Zech. 10:11) and her seven streams (Isa. 11:15) will also be dried. This will open up a clear and easy passage for the tribes returning from the south. Furthermore, a “highway” (cleared path) will be made from Assyria to Israel (Isa. 11:16). In the millennium, this will be a formal highway that will extend into Egypt (Isa. 19:23). Another highway will be made from China, “the land of Sinim” (Isa. 49:11-12). Note: Isa. 49 is the only Biblical reference to China!
Sign-posts will mark the places where returning tribes can exit:
“Is Ephraim [ten tribes] my dear son? is he a pleasant child? for since I spake against him, I do earnestly remember him still: therefore my bowels are troubled for him; I will surely have mercy upon him, saith the Lord. Set thee up waymarks, make thee high heaps: set thine heart toward the highway, even the way which thou wentest: turn again, O virgin of Israel, turn again to these thy cities.” (Jeremiah 31:20-21)
It has been over 2700 years… they are finally home:
“But Zion said, The Lord hath forsaken me, and my Lord hath forgotten me… Can a woman forget her sucking child, that she should not have compassion on the son of her womb? yea, they may forget, yet will I not forget thee. Behold, I have graven thee upon the palms of my hands; thy walls are continually before me.” (Isa. 49:14-15)
Israel’s Spiritual Restoration. When the returned tribes see the Lord, they will own their guilt of being under the curse of a broken law, and will be restored to the Lord. This will be the prophetic fulfillment of “the Day of Atonement” (Lev. 26:40-42). The restored nation of Israel (a remnant of the whole twelve tribes) will seem to be “born at once” (Isa. 66:8). Ezekiel 37 pictures Israel as a valley of dried bones. The Lord asks Ezekiel, “Shall these bones live?” The answer is “YES!, but it will take a work of the Holy Spirit!” This restored nation of Israel will be instantly forged into a fearsome army, under the leadership of Messiah (Ezek. 37:10). The Lord will make “a new covenant” with Israel (Jer. 31:31-34). Although only a remnant of the nation is left, yet “all Israel shall be saved” (Rom. 11:26). All enmity will be removed between the tribes of Israel; “And the envy of Ephraim shall depart” (Isa. 11:13).
Re-population of Palestine. The returned tribes of Israel will fill the land to the point that there will not be enough room for them (Zech. 10:10). As the sand of the sea in number, they will ask the Lord for enlarged borders. “The place is too narrow for me: make room for me, that I may dwell” (Isa. 49:19-20).
Battle #6: The Attack of Gog and Magog
Timing and Motivations. Gog and Magog will come down after the Lord has dealt with the Beast and the King of the North, and has restored the regathered nation of Israel; “In that day when my people Israel dwelleth in safety, shalt thou not know it?” (Ezek. 38:14). It will be an enticing opportunity, and the Lord will dangle it in front of Gog like bait before a fish; “And I will turn thee back, and put hooks into thy jaws, and I will bring thee forth, and all thine army, etc.” (Ezek. 38:4). This attack is foreshadowed in the Old Testament by the attack of Sennacherib king of Assyria who unsuccessfully tried to take the Southern Kingdom of Judah in the days of Hezekiah. In this way, the prophets adapt the title “the Assyrian” to Gog and Magog as well as the King of the North. We often refer to this great event as the “second attack of the Assyrian”. This will take place at the very end of the indignation, prior to the Millennium; “it shall be at the end of days” (Ezek. 38:15).
The attack. Great masses of infantry will come down with Russia, very well armed; “thine army, horses and horsemen, all of them clothed with all sorts of armour, even a great company with bucklers and shields, all of them handling swords” (Ezek. 28:4). Russia will not be alone, for they will “come from thy place out of the uttermost north, thou and many peoples with thee”. In the northern confederacy will be: parts of Iran, parts of northern Africa, Germany, Armenia, and “many” other nations (Micah 4:11-12, Joel 3:2). The nations will come up in vast hordes, Russia in the lead, coming up “like a cloud to cover the land.” To deal with the army, the Lord will cause a great earthquake in the land. The armies will be thrown into confusion, and will kill one another. Then the Lord will rain hail, fire, and brimstone upon them (Ezek. 38). The Russian Confederacy will be destroyed in the Winepress Judgment. Afterward, the Lord will “send a fire on Magog” (Ezek. 39:6) and “a great whirlwind” (Jer. 25:32).
The Vintage (Winepress) Judgment (Rev. 14:17-20; Isaiah 26:20 - 27:5; Isaiah 63:1-6) will take place at 1335 days measured from the middle of Daniel's seventieth week. Those destroyed are Russia (Ezek. 38-39), many confederate nations (Micah 4:11-12, Joel 3:2), and the rebels of the ten tribes (Ezek. 20:35-38). The winepress judgment is referred to as “Jehovah’s sacrifice in Bozrah and slaughter in Edom” because Bozrah was the capital of Edom (Isa. 34:2-6). The nations will come up in vast hordes, Russia in the lead, coming up “like a cloud to cover the land.” The land of Edom is where the proud (Zeph. 3:11) and the rebellious (Ezek. 20:38) of the ten tribes will be trapped, at the “border” (Ezek. 11:10). The Lord will personally “plead” with them “face to face” (Ezek. 20:35)… but they will be “stubborn and rebellious” (Deut. 21:18-23). The border land to the south of Israel (Edom) is referred to as the Lord’s “threshing floor” (Micah 4:11-12). There the Lord will “sift” the ten tribes “like as corn is sifted in a sieve” (Amos 9:9-10). Ninety percent of the returning ten tribes will be destroyed (Isa. 6:13). “The Lord also shall roar out of Zion” (Joel 3:16) and destroy Russia specifically “upon the mountains of Israel” (Ezek. 39:2). The “valley of Jehoshaphat” (Joel 3:1, 12-13), also called “without the city” (Rev. 14:20), is where the winepress begins. It continues 1600 stadia (or 200 miles), which is approximately the distance from the valley of Jehoshaphat to the south of Edom. The "vine of the earth", who are the rebels of the ten tribes, will be caught up in the vortex of judgment. The carnage will be so tremendous that the blood will run out "to the horses bits". Horses speak of human agencies, all are in vain against the Lord. As He stamps personally upon His enemies, it will be His "fury", not His love, that will sustain Him (Isa. 63:1-6) while "He treadeth the winepress of the fierceness and wrath of Almighty God" (Rev. 19:15).
The Hamon-Gog Graveyard (Ezek. 39:9-12). The carnage from the Winepress Judgment will be so great that It will take Israel seven months just to bury the dead, and seven years to burn the weapons of war! A massive graveyard will be constructed to the east of the Dead Sea where all the bodies will be buried. It will be beside one of the Millennial highways “to stop the way of the passers-by”; a kind of tourist information site – a solemn reminder for 1000 years of the wages of rebellion. A whole system will be developed; a city built just for the burial crews and their families, a marker-system for when someone finds a bone, etc. (Ezek. 39:13-15). The point is that the judgment of Gog and Magog will be full and final.
Battle #7: Mop-up Operations
Restored Israel a Fearsome Army. Under the Messiah’s leadership, Israel will be a fearsome army. God will allow some of the enemies from the surrounding nations to survive so that Israel can have the honor of putting them down for the last time.
Thou [restored Israel] art my battle axe and weapons of war: for with thee will I break in pieces the nations, and with thee will I destroy kingdoms.” Jer. 51:20
Gaza, Edom, Moab, Ammon Defeated by Israel. The surrounding Muslim nations will be destroyed by Israel.
Edom will come under especially severe judgment because of his cruelty to Israel. The book of Obadiah traces out the judgment of Edom three times! His judgment by the King of the North is recorded in vv.1-9. His judgment by Christ at the winepress is recorded in vv.10-16. Finally, his judgment by the armies of restored Israel is recorded in vv.17-21.
The millennial possession. Even at the greatest extent under Solomon, Israel in the Old Testament was never able to conquer the entire portion of land promised to Abraham and to Israel. After these final mop-up operations are complete, Israel will finally possess what was promised to them!
“Every place whereon the sole of your foot shall tread shall be yours; from the wilderness and Lebanon [northern border], from the river, the river Euphrates [eastern border], even unto the hinder sea [western border] shall your border be.” Deuteronomy 11:24
“On the same day Jehovah made a covenant with Abram, saying, Unto thy seed I give this land, from the river of Egypt [southern border] to the great river, the river Euphrates [eastern border].” Genesis 15:8
Summary of the Seven Battles of the Indignation
Results of Daniel’s 70th Week
The immediate result will be death to many of God’s enemies:
“I will make a man more precious than fine gold.” Isa. 13:12
Judgment is the Lord’s “strange work” (Isa. 28:21), and so He will make it a “short work” (Rom. 9:28). But judgment is not the goal. The goal is the exaltation of Christ, and secondarily the blessing of the earth.
The lasting result will be righteousness and peace in the earth:
“For when thy judgments are in the earth, the inhabitants of the world learn righteousness. If favour be shewn to the wicked, he doth not learn righteousness: in the land of uprightness he dealeth unjustly, and beholdeth not the majesty of Jehovah.” Isa. 26:9-10
All of God’s grace to this world will never produce righteousness from the first man. Judgment is absolutely necessary to bring in the “righteousness of the ages” (Dan. 9:26). A great example of this is Nebuchadnezzar; it wasn’t until God subjected him to judgment that a change was brought about in his life.
“And the work of righteousness shall be peace; and the effect of righteousness, quietness and assurance for ever.” Isa. 32:17
Historical Note: Isa. 32 is the chapter that the Lord used to show J.N. Darby that the majority of prophecy has yet to be fulfilled. This led him to the recovery of the whole scope of prophecy, dispensational truth, and the truth of the pre-tribulation rapture!
Can you provide comments, suggestions, or corrections? |
global_01_local_0_shard_00002368_processed.jsonl/55695 | The first Biodiversity Action Plan for London, produced in 2007, includes “wastelands” as a distinctive category of habitat. Yet changes in the scope and orientation of municipal government for London since the 1980s mark a marginalization of scientific expertise and a reorientation in planning discourse towards development interests. Perhaps more than any other aspect of nature conservation urban sites reveal tensions between aesthetic discourses, scientific autonomy, and the interests of the state in its ambivalent guise as both “protector” of urban bio-diversity but also “enabler” of development. Cut backs in state funding for taxonomic research and nature conservation agencies have led to emerging critical skills shortages for key groups of biological indicators such as insects. Professional botanists, entomologists and others have noted that bio-diversity policy and the protection of “wild nature” is often driven by a public-relations emphasis on certain easily recognizable “flagship species” (see Lorimer, 2007) rather than detailed knowledge about sites, species and the ecological dynamics of urban space. |
global_01_local_0_shard_00002368_processed.jsonl/55715 | Rockbox.org home
dev builds
themes manual
device status forums
mailing lists
IRC bugs
dev guide
Rockbox mail archive
Subject: RE: Battery life
From: Stuart Tedford (stuart.tedford_at_piresearch.co.uk)
Date: 2002-08-02
My battery life using the original recorder firmware (1.26) was 10 hours 50
minutes. I am using a toshiba 40GB HDD in my recorder so does anyone know
if this battery life is roughly the same | worse | better than the stock
fujitsu HDD?
The battery level indicator on the stock firmware is very misleading. The
last 2 thirds of batery life are consumed in about 2 hours!
I am now doing the same test with RockBox cvs build of 20020801.
Page was last modified "Jan 10 2012" The Rockbox Crew |
global_01_local_0_shard_00002368_processed.jsonl/55735 | Setting encrypted backup Email server
April 14, 2013
There is a popular Internet saying that people are divided into two groups - those who make backups, and those who will. I strongly believe into that, that's why despite that I trust my mailserver setup completely, I still want to keep them in some other safe place. Probably somewhere, where somebody else takes care of everything :) That's why I chose ZOHO MAIL as my backup server.
Mostly for three reasons:
• They have IMAP
• They have enough space for free
• They also provide a nice webmail
So my next task was to configure postfix in a way, that it will deliver all the messages as it does currently, but also forward them to Of course I wasn't THAT crazy, to send my private emails over the Internet as they are, so I also needed some kind of encryption before that. It appeared that somebody had the same problem, and there is a tool for that called gpg-mailgate. Unfortunately it's a very unfinished application, and lots of things doesn't work (multipart messages support, attachmenets encryption, extra email encryption and so on), so I needed to do a little bit of extra hacking. And I strongly recommend you, to use my version if you thinking about encrypting your email out of the box. Ok, that's for the beginning - let's do some configuration!
Setting gpg
First thing is to install and configure a gpg account. I strongly recommend to not to use your gpg keys (if you already have some), but create new, clean key. Also, we need a new user in the file system for postfix to handle key support. Lastly, gpg-mailgate comes with a Python library, which also needs to be installed.
Install GPG:
apt-get install gpg
Create a gpg user and give him the key (don't forget to disable the password, and set trust to ultimate - otherwise tour scripts will stop to ask about confirmation - and eventually fail):
useradd -s /bin/false -d /var/gpg -M gpgmap
mkdir -p /var/gpg/.gnupg
chown -R gpgmap /var/gpg
chmod 700 /var/gpg/.gnupg
sudo -u gpgmap /usr/bin/gpg --gen-key --homedir=/var/gpg/.gnupg
sudo -u gpgmap gpg --edit-key trust quit
Setting gpg-mailgate
Install GnuPG Python library, and gpg-mailgate itself:
cd /root
git clone
cd gpg-mailgate
cp -R GnuPG /usr/lib/python2.6
cp /usr/local/bin/
cp gpg-mailgate.conf.sample /etc/gpg-mailgate.conf
Config file is pretty explanatory - what you have to change is "domains" parameter (put only domains, which you want to receive encrypted messages), keyhome (set to /var/gpg/.gnupg) and keymap (map all the emails which should receive encrypted content there - follow the hint in file). So all in all your config file should look similar to this:
add_header = yes
domains =
keyhome = /var/gpg/.gnupg
file = /tmp/gpg-mailgate.log
host =
port = 10028
[keymap] = 123456789ABCDEF
Setting postfix
The last thing is postfix configuration which is (surprisingly) really easy, just activate content filter in and add relay to One last thing is to add X-GPG-* headers to tell the script, which extra email addresses we want to deliver messages encrypted. Normally gpg-mailgate encrypts only messages to addresses that are configured in gpg-mailgate.conf file and available in To/Cc/Bcc headers of original message. Unfortunatelly, we are using a totally different email intended only for backups - it will never appear in original message headers, because it's not the recipient. To make it appear - simply add X-GPG-Encrypt-Cc header to your message. So, the configuration will present as follows:
# gpg
header_checks = regexp:/etc/postfix/header_checks
content_filter = gpg-mailgate
/^From: .*/ PREPEND X-GPG-Encrypt-Cc:
# gpg-mailgate
gpg-mailgate unix - n n - - pipe
flags= user=gpgmap argv=/usr/local/bin/ inet n - n - 10 smtpd
-o content_filter=
-o receive_override_options=no_unknown_recipient_checks,no_header_body_checks
-o smtpd_helo_restrictions=
-o smtpd_client_restrictions=
-o smtpd_sender_restrictions=
-o smtpd_recipient_restrictions=permit_mynetworks,reject
-o mynetworks=
-o smtpd_authorized_xforward_hosts=
Don't forget to create header_checks.db and restart postfix.
postmap header_checks
/etc/init.d/postfix restart
And that's pretty much everything. Send yourself an email, and enjoy your new, shiny and secure backup :) |
global_01_local_0_shard_00002368_processed.jsonl/55736 | Religious significance of Yoga
“Yoga is not a religion. It is a science, science of well-being, the science of youthfulness, the science of integrating body, mind, and soul.” – Amit Ray
Yoga, A Religion or not?
India is a religious state, a secular nation where every citizen irrespective of their religion have a fair chance to express their thoughts and ideas. Hinduism, Sikhism, Jainism, Islam, Christianity, and Buddhism are the major religions in India. But can we call yoga as a religion? No, but if we look at it through the lens of a community that promotes the importance of good physical, mental and spiritual health amongst individuals, yes! Yoga is the spiritual art of living and a “Health Religion”.
Yoga is a 5000-year-old Indian body of knowledge and the potpourri of physical, mental, and spiritual disciplines. This science of well-being has also been listed by UNESCO as an Intangible cultural heritage because of its usage in curing diseases and maintaining a state of equilibrium between the mind and the body.
Yoga in religions
“The essence of yoga is to reach oneness with God.” – Pattabhi Jois
The historic significance of yoga as a practice to relax the body and calm the mind can be traced from its allusion in the religious and spiritual texts like Bhagavad Gita, Katha Upanishad, Rig Veda, Mahabharata and etc. The first known appearance of the word “yoga”, with the same meaning as today in the modern world, can be seen and read in the Katha Upanishad. The term ‘yoga’ literally translates into ‘union’, the union of the conscious with the unconscious. Hatha Yoga and Raja Yoga are amongst the most practiced and known form of yoga used in the entire world. Yoga as a physical exercise with a meditative and spiritual core has been well propagated by religions like Buddhism, Jainism, Hinduism, and Shaivism i.e. a tradition of Hinduism that venerates lord Shiva.
Yoga in Hinduism
“Yoga is from the Vedas.” – T.K.V. Desikachar
Samkhya, Yoga, Nyaya, Vaisheshika, Mimamsa, and Vedanta are the six āstika schools of Hinduism that accept the Vedas as a source of knowledge and are referred to as a philosophical school in Hinduism.
Majority of the Hindu texts summarise yoga as a practice to control the senses and eventually, the mind. Bhagavad Gita is the most famous spiritual text in which Krishna talk about of four types of yoga – bhakti, or devotion; jnana, or knowledge; karma, or action; and dhyana, or concentration as paths to achieve moksha or nirvana, the ultimate goal of humans according to Hindu understanding. Out of these four types, dhyana yoga can be found related to the type of yoga we practice in the modern world today.
Yoga in Jainism
“Yoga means the `Cessation of the states of mind” – Yoga Sutra
Jainism recognizes Yoga as the ideal path of spiritual realization that merges the finite with the infinite and includes Dhyana (Meditation), Samadhi (Concentration).
Yoga is referred to as Caritra (conduct) in Jainism. In Jainism, Yoga is defined as the real practice of one’s knowledge and the core of Indian Spiritual Sadhana that invokes practical realization of the self. According to them, yoga is of two types, one which consists in the inner poise, self-mastery, its conquest of anger, sensitiveness, pride and ambition and the other that consists the knowledge about the Self, its bondage, liberation and the path of liberation.
Yoga in Buddhism
Yoga and Buddhism have been synonymously used since historic times. Buddhist meditation embraces a variety of meditation techniques that intend to develop composure, calmness, concentration, tranquility, and insight in individuals practicing it regularly.
Bhāvanā and jhāna/dhyāna are the Buddhist words that refer to meditation, the core element of yoga. The principal techniques of yoga have been preserved in ancient Buddhist texts and the Buddhists practice meditation as the path toward Enlightenment and Nirvana.
Yoga in Shaivism
Yoga and meditation have been an integral part of Shaivism. It is defined as the union of the kundalini with Lord Shiva. In Shaivism, Hatha yoga is the most practiced form and has been a major reformer of techniques such as those in Hatha Yoga. Several important Shiva temples in the nation and entire world depict Lord Shiva as a giant statue wherein the lord poses as yogi meditating, as seen in Shaiva texts.
Yoga is the ultimate path of self-realization. From having originated in India, it has spread in the entire world and also being taught and practiced in various yoga teacher training institutes in India. Yoga isn’t a religion of lords being worshipped for the sake of traversing into the state of have-all. It is just a religious and spiritual practice of uniting the conscious with the unconscious.
About The Author:
Nikita is a content writer at Justgoweb Digital, a full-service Digital Marketing Agency in Delhi. She loves writing about yoga, retreat, health, and meditation. |
global_01_local_0_shard_00002368_processed.jsonl/55740 | 15 Nov
Reaching new heights in Vietnam
15 Nov, 2016
Ascending Fansipan, the highest mountain in Vietnam
Over the next six hours I hopped over streams on rocks, crawled up and slid down boulders (not a nail was broken!), climbed steps half as tall as me and even scaled the odd ladder helpfully put in over tricky stretches. The bamboo forest grew more beautiful, less misty and occasionally opened out to reveal views of the other mountains.
Just before sunset, we arrived at our overnight camp. Amenities were few and basic, but to be honest I didn’t care because there was food to be had. No one who knows me will be surprised to hear this. Wearing three layers, a sleeping bag and a head torch I tucked into a veritable feast of local food, which I can barely believe our multi-talented porters knocked up in fading daylight, over a gas stove in a hut. Noodles, garlic potatoes, stir-fried beef and chicken, and what I thought was water and turned out to be small cup of vodka!
I can’t remember falling asleep but was awoken by loud shouts in Vietnamese and English. I threw off my sleeping bag and ran out to see our guide waving madly by the ridge – he was calling me out to catch the sunrise. It was obvious to see why it’s called the sea of clouds!
For breakfast, we ate enough noodles to power a horse and started off for the last third of the ascent. This was my favourite part. I climbed and climbed, way above the clouds under brilliant sunshine and views so incredible they didn’t seem real. I felt like a true athlete, a paragon of health and endurance. Then I fell in some mud and ripped my trousers. Let's just say the tear was not in a great place.
Ah, but the views…the views! As we scaled the last section, suddenly there were green peaks all around us, mountains I hadn’t noticed before. I realised how high I had climbed, and my Netflix and pizza-loving self felt a surge of pride. Then we reached the foot of the viewing platform and saw stairs. Why? Why stairs? Why would they do this? My poor jelly legs. Poor Rouling, she had to wait about 40 minutes for me to get to the top.
And I did - here I am, I’d like to point out I don’t normally look like this. Normally I am less sweaty, but never quite this amazingly happy and proud of myself.
I enjoyed it so much that I'm going back…are you coming too? April 21-24 2017. Be there or be square.
For information on how to take part in the event, click here to email the events team.
Maria can be found tweeting here.
Share this article:
• Sailors’ Society on Twitter
• Sailors’ Society on Facebook
• Sailors’ Society on LinkedIn
You might also be interested in
Keep in touch
Join us on social |
global_01_local_0_shard_00002368_processed.jsonl/55747 | K Select Species
A Biological Category that Applies to Most Parrots.
by Sally Blanchard
Most parrot-family birds fit into a biologically defined group that is referred to as K-selected Species. These mammals and birds have a long lifetime, mature slowly, have a large body size in comparison to other animals in their niche, and produce a limited number of offspring each year with intense parental care. They generally have a well defined and stable ecological niche and their young tend to stay in that niche. When all goes well, K-selected species compete well for nest sites, food sources, and other survival needs in their environment.
It is when there is a major upset in their ability to get these needs met that K-select species are in trouble. It is the mammals and birds that are classed as K-selected species that are experiencing serious declines in their populations as their habitats dwindle and/or are drastically changed. It is these mammals and birds that are becoming increasingly endangered and many perch on edge of extinction. Other K-selected species besides parrots include (but are not limited to) elephants, raptors, gorillas, penguins, whales, large trees, and (taa-dah) humans (the ones who are ruining the balance for everyone else).
VIEWED PRODUCTS |
global_01_local_0_shard_00002368_processed.jsonl/55749 | For Physicians
San Dimas Community Hospital, an affiliate of Prime Healthcare Services, welcomes physicians of all specialties. San Dimas Community Hospital's successful operations are founded on Physician-Driven, Patient-Focused proven medical management protocols which involves active participation in day-to-day operations of the hospital. We have active participations of physicians from the community including positions on the Board.
To join our family, please mail your CV to:
San Dimas Community Hospital
1350 W Covina Blvd,
San Dimas, CA 91773
Ph: (909) 599-6811
To find out opportunities at our other hospitals or clinics, please visit our corporate web site for Prime Healthcare Services. |
global_01_local_0_shard_00002368_processed.jsonl/55767 | Maintenance and Operations
Maintenance of traffic signals is a very important topic. The Traffic Signal Installation and Maintenance Manual, published by ITE, covers the maintenance of traffic signals in great detail.
A simple preventative maintenance program requires: regularly replacing lamps before the end of their rated life; overhauling the parts of controller units; repainting equipment and hardware; routine checking of voltage; and regular inspection of the equipment. Traffic signal timings should be re-evaluated every 3 to 5 years or when significant changes to traffic flow patterns occur.
Traffic signal maintenance is either preventive or in response to an identified need. Poor traffic signal maintenance leads to frequent breakdowns resulting in motorist complaints and discredit to the responsible authority.
Based on ITE data, an average intersection requires 52 hours of signal maintenance annually. Too often, traffic signal maintenance becomes a secondary, noncritical responsibility.
Maintenance: Using Contractors
Military installations not able to fully staff and operate a signal maintenance shop should consider hiring a contractor for signal maintenance work.
1. Minor improvements are easier to implement under a maintenance contract than under a formal bidding process.
2. Since the contractor provides all spare parts and equipment, an inventory of replacement parts is not needed.
3. The contractor assumes a greater liability role if he/she fails to perform or respond within a reasonable time.
4. Contractor should have more expertise in the maintenance of traffic signals.
1. The response time to signal calls may be poor because of inadequate manpower and distance from contractor's office.
2. Maintenance will be more constly than if it was performed by an in-house operation.
3. A signal may be left in a flashing mode for long periods of time.
Previous Section |
global_01_local_0_shard_00002368_processed.jsonl/55771 | Ben A. Barres
Scholar: 1994
Awarded Institution
Stanford University
Professor, Department of Neurobiology
Research Interests
Our laboratory is interested in the development and function of glial cells in the mammalian central nervous system. To understand the interactions between neurons and glial cells we have developed methods to highly purify and culture rodent retinal ganglion cells (neurons) as well as the glial cell types they interact with, oligodendrocytes and astrocytes, from the rodent optic nerve. We are using a large variety of methods to address these issues including cell purification by immunopanning, tissue culture, patch clamping, immunohistochemistry and molecular biology. Currently we are focussing on several questions:
1. What are the cell-cell interactions that control myelination and node of Ranvier formation?
2. Do glial cells play a role in synapse formation and function?
3. What are the signals that promote the survival and growth of retinal ganglion cells and can we use this knowledge to promote their survival and regeneration after injury?
4. How do protoplasmic astrocytes, the main glial cell type in grey matter, develop and what is their function?
We have found evidence of several novel glial signals that induce the onset of myelination, the clustering of axonal sodium channels, the survival of retinal ganglion cells, and the formation of synapses. We are characterizing these processes and are attempting to identify these glial-derived molecules. |
global_01_local_0_shard_00002368_processed.jsonl/55774 | Why Choose Shield For Your Drupal Site?
Blog Article
Sectorlink website hosting services
Why Choose Shield For Your Drupal Site?
August 6th, 2019
Are you a site developer? Have you ever thought about a module for Drupal that can add extra security while you are developing sites for your clients? Look no further! The Shield Drupal module allows you to protect your website using Apache Authentication. If a user does not know the user/password, it hides the site. This can all be configured within the administration interface, so there is no file editing. Shield can be applied to either single or multiple sites. This module is fantastic while developing your website.
PHP Authentication shield
Shield creates a shield for the site with Apache authentication. It hides the website if the user does not know a simple username/password. It handles Drupal as a "walled garden." This module helps you to protect your (dev) site with HTTP authentication.
If you don't need the authentication, just leave the user field blank.
1. enable the module
2. go to the admin interface (admin/config/system/shield) and fill the form
3. nothing else
Plain Old CGI
Since the Drupal 7.23 release, you don't need any .htaccess modification for CGI. However, if you use plain old CGI, you still need a modification:
Modify .htaccess, inside . Add the following line at the beginning of the section:
RewriteRule .* - [E=REMOTE_USER:%{HTTP:Authorization}]
As a site developer, you should not pass up on this important tool! Shield is a powerful tool to keep your website hidden while under development. If you are a site developer, you should consider using Shield while developing your clients’ Drupal sites. |
global_01_local_0_shard_00002368_processed.jsonl/55779 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://www.selectalarms.co.nz/100%Daily2019-11-20 15:47
https://www.selectalarms.co.nz/sitemap.html50%Monthly2019-11-20 15:47 |
global_01_local_0_shard_00002368_processed.jsonl/55784 |
Sermon Illustrations
After the Battle of the Bulge during World War II, one German officer described the capture of an American unit early in the fighting. Among the booty was a box that contained a cake. What was remarkable about the cake is that it had been sent to an American soldier from Boston and it was still fresh. The German described his feelings when he realised that the Americans had the resources to fly over cakes from home even in the midst of a global war. He said that he knew then, that they would never defeat an enemy that had such resources for the waging of the battle. When we stand in Christ we have that sort of support, and so much more.
Related Sermon Illustrations
Related Sermons
Browse All Media
Related Media |
global_01_local_0_shard_00002368_processed.jsonl/55806 | Study Guide
Incidents in the Life of a Slave Girl Analysis
• Tone
Critical, Emotional
So, Linda has a tricky job. She has to make emotional pleas for abolition, but she also wants to make sharp, pointed critiques of the whole institution of slavery—including Northern complicities. In other words: how is she going to make her point without alienating her readers?
Well, one strategy is employing both methods at once or one after the other, to maximize her chances of succeeding with the reader. Linda often uses exclamations such as “O, reader,” when she's going after the emotional appeal: “O, what days and nights of fear and sorrow that man caused me! Reader […] I do it to kindle a flame of compassion in your hearts for my sisters who are still in bondage, suffering as I once suffered” (5.4).
But then she'll sharpen that up with a catchy, biting aphorism, like “Cruelty is contagious in uncivilized communities” (9.6), or "Hot weather brings out snakes and slaveholders" (34.10). She's also not afraid to lay on the sarcasm, as when she writes, of the rare slaveholder who is a good Christian, "Her religion was not a garb put on for Sunday, and laid aside till Sunday returned again” (9.13).
Basically, this seems to be a narrator who can't make up her mind whether she wants to lecture her readers or make them cry. It could be that this uneven tone helps explain why Incidents wasn't immediately popular.
• Genre
Slave Narrative, Sentimental Novel, Gothic Novel
The most obvious genre that Incidents plays with is the slave narrative. Books like Uncle Tom's Cabin and Frederick Douglass's Narrative of the Life of Frederick Douglass, an American Slave use a set of conventions including lots that we find in Incidents: a title page with the claim of authenticity; supporting documents from white friends and abolitionists; and then a bunch of particulars in the narrative. We're going to quote a few of these, because they're so dead on:
4. an account of one extraordinarily strong, hardworking slave—often "pure African"—who, because there is no reason for it, refuses to be whipped;
Sound familiar? This is only a partial list, so check out the source for more if you're interested.
The point is, Jacobs obviously knew what she was doing. This isn't just an autobiography; it's a particular kind of autobiography, one that is going to fit readers' expectations.
And she also throws in some surprising twists. Instead of physical abuse of the kind that male slave narratives often record, Jacobs's account emphasizes the sexual abuse of female slaves. By focusing on her family and on getting her children to safety, rather than just herself, Jacobs makes her narrative different. It's almost as though she creates a new genre: the female slave narrative.
A Novel Approach
Check it out:
A brutal, corrupt master pursues a servant. With plots, tricks, and manipulation, he attempts to seduce and ruin her. Eventually, her natural strength and goodness triumphs, and he sees the error of his ways.
If you leave off the "error of his ways," then this should sound pretty familiar. It would sound extra-familiar if you happened to be familiar with books like Samuel Richardson's Clarissa and Pamela, or, with some variations, Ann Radcliffe's The Mysteries of Udolpho. These books, popular at the end of the eighteenth century, sound awfully similar to Jacobs's. The big difference? At the end, the victory the heroines win is respectable marriage that preserves their virtue. (Check out "What's Up With the Ending?" for more about the differences.)
So, why does Jacobs's story sound so similar to these sentimental and Gothic novels, with their big bad villains and their creepy domestic spaces, like that crawlspace Linda hides in?
Well, early readers just assumed it was a novel. We know that it's mostly autobiographical, so, sure, maybe she just happened to have a really novelistic life. But check out what Linda says at the end: "Reader, my story ends with freedom; not in the usual way, with marriage" (41).
Apparently, Linda knows exactly what her story sounds like. A far more likely explanation—we think—is that, rather than just happening to sound like a storybook life, Linda emphasized certain incidents in order to craft a narrative that had already proved super-appealing to bored middle-class women. After all, everyone likes a good suspense story.
• What's Up With the Title?
Here's proof that words matter. Check it out:
"Incidents in the Life of a Slave Girl"
"Incidents in the Life of Harriet Jacobs"
See the difference? By using the universal-sounding phrase "a slave girl"—with particularly emphasis on that "a" rather than, say, "the," Jacobs makes her story about more than just herself. It may seem like a humble move, like, "Oh, look at little ol' me not even putting my name on the thing," but it's actually a way of making her life into an archetype for, well, all enslaved girls everywhere.
Using the word "girl" also alerts readers that this isn't just your ordinary slave narrative, which was already a well-established genre in 1861, when the book was published. So if you feel like the whole slavery thing is getting a little stale, here's something a little different: it's the very first one about a girl.
And finally, moving backwards, we get to "incidents." This is kind of a cool word to find here, because it suggests that Jacobs isn't claiming to tell a nice, neat, integrated story of her life. There's no creative nonfiction to muddy up the facts, just life as she happened to live it. Now, whether or not you want to believe her claim that all she's writing is incidents—that's a different story.
• What's Up With the Ending?
Jacobs seems to know herself that something is up with her ending:
Reader, my story ends with freedom; not in the usual way, with marriage. (41.25)
By “the usual way,” Jacobs means that both novels such as Jane Eyre and slave narratives like Narrative of the Life of Frederick Douglass, an American Slave typically end with marriage and a retreat into comfortable domesticity. (We didn’t pick Jane Eyre out of a hat: the last chapter of that book begins with the sentence, "Reader, I married him" [38.1]. Sounds to us like Jacobs is making herself a little allusion, there.)
So, Jacobs is saying that she knows perfectly well her ending is a little off. Although Linda is free now, she still lives in servitude to Mrs. Bruce and her life’s dream—“to sit with my children in a home of my own” (41.25)—hasn't come true.
And it's not just that this traditional marriage ending hasn't happened. It seems like Jacobs might not even want that tradition ending. See, white women of your typical nineteenth-century novel and the African-American men of slave narratives seem to value marriage as the ultimate goal of life (and of their stories). But not Linda. Linda values legal and physical freedom.
When you think about it, this makes sense. For women in the nineteenth century, especially the first half, marriage meant that you basically became your husband's property. Now, we're not at all saying that it was like being a slave—but it was definitely a kind of legal bondage. So why would Linda want to end by becoming someone's property again?
• Setting
Edenton, North Carolina in the 1800s / the Northern Free States in the 1800s
The first two-thirds of the novel take place in Edenton, North Carolina, the town where Harriet Jacobs was actually born and raised.
We don't learn very much about Edenton. Linda doesn't describe it, but we get the sense that it's a small town with only one or two main streets. From her hiding space above her grandmother's shed, Linda seems to be able to keep a good eye on what's happening.
It's also a tight-knit town, and the black and white communities seem closer than you'd expect. Linda says that "many people" in the neighborhood wanted to buy crackers from her grandmother, and all the white people respected her so much that no one would buy her when Dr. Flint put her up for sale (1). And, before Mrs. Flint gets jealous about her husband's interest in Linda, "there had been a time," Linda says, "when Dr. Flint's wife came to take tea with us, and when her children were also sent to have a feast of 'Aunt Marthy's' nice cooking" (16).
One of the weirdest things for us reading this narrative is that the picture of slavery it draws—while obviously awful—isn't exactly what we're used to hearing. We don't really meet any slave hands; nobody we know is whipped (although there's definitely physical abuse); and none of the main characters are sold away. Dr. Flint, presumably, could have used force and raped Linda whenever he wanted, but instead he seems to think that he needs to win her consent.
Sure, it's obviously not really consent, since, you know, he owns her. But Linda, her children, and most of her extended family seem to exist in this odd state where they're enslaved but have some surprising freedoms. Like, after Linda is pregnant and has her first child, she stops living with Dr. Flint, even though she's still his slave.
One thing to think about is that North Carolina didn’t play a huge role in the early slave trade. The numerous little islands that make up North Carolina’s Outer Banks were risky for ships, so slave traders preferred to land in ports either to the north or the south of North Carolina. North Carolina also lacked the huge plantations of the Deep South.
This narrative helps us remember that there were lots of different kinds of slavery. In a way, it's an answer to people who said—and this was something that people actually did say—that slaves were better off than the poor in other countries. Well, Linda goes to England and tells us straight out that they're not. She says, "I repeat that the most ignorant and the most destitute of these peasants was a thousand fold better off than the most pampered American slave" (37).
And from some perspective, Linda is a pampered slave. She gets to stay with her family; she's never raped or whipped; she wins respect and even affection from many of the white people in her town. But Incidents reminds us that, no matter how nice this setting seems in comparison to, say, a rice plantation in Georgia or a cotton plantation in Alabama, Linda is still a slave.
The Free States
Just as the white and black communities are more intertwined than you might expect, the Northern and Southern states have a close relationship. And this close relationship makes the North just as culpable for slavery as the South.
Sure, at first Linda is blown away by how awesome Northern city life is. Her first morning in Philadelphia is a revelation:
At daylight, I heard women crying fresh fish, berries, radishes, and various other things. All this was new to me. I dressed myself at an early hour, and sat at the window to watch that unknown tide of life. Philadelphia seemed to be a wonderfully great place. (31)
But Linda quickly figures out that the North isn't quite the promised land it was supposed to be. When her son, arriving in Boston, says, "I 'spose free boys can get along here at the north as well as white boys" (34), she doesn't have the heart to tell him about a little thing called Jim Crow. The North might oppose slavery, but they sure didn't oppose racial stereotypes.
The other problem, Linda suggests, is that there just isn't enough difference between North and South. Northerners marry Southerners; Southerners vacation in the North. She's constantly afraid that someone from the South is going to see her and recognize her as a fugitive slave, and it gets worse when Congress passes the Fugitive Slave Law.
Look, we're not saying that the North isn't better. Obviously, it is. Linda finds work, friends, and freedom. But Incidents seems to be saying that, as long as the North is still part of the same country, it's just as much to blame.
• What's Up With the Epigraph?
“Northerners know nothing at all about Slavery. They think it is perpetual bondage only. They have no conception of the depth of degradation involved in that word, Slavery; if they had, they would never cease their efforts until so horrible a system was overthrown.”
—A Woman of North Carolina
“Rise up, ye women that are at ease! Hear my voice, ye careless daughters! Give ear unto my speech.”
—Isaiah 32.9
We start off with Angelina E. Grimke’s Appeal to the Christian Women of the South. Published in 1936, Grimke’s essay musters the heavy artillery of both the Declaration of Independence and the Bible to point out that, you know, slavery might not be the most American or Christian thing to be doing. By quoting a female abolitionist, Jacobs lets us know that she's (1) well-read, and (2) part of a long line of outspoken ladies.
Then we head back in time for the second quote, from the Hebrew Bible's Book of Isaiah. The prophet Isaiah is lecturing the women of Jerusalem for being self-indulgent and lazy. Just what you want to hear, right? Well, this quote lets Jacobs highlight women as her targeted audience and to raise her novel up to the status of prophecy: whether they like it or not, women need to hear this message in order to be truly moral beings.
Taken together, both epigraphs really boost Jacobs’s authority—a bold move for a former slave woman.
• Writing Style
Realistic, Conversational, Classic
One early review of Incidents published in the Anti-Slavery Bugle said that the book’s style was “simple and attractive—you feel less as though you are reading a book, than talking with the woman herself.”
That seems about right. Jacobs's language is pretty simple. She’s not big on metaphors or symbolism and gets her meaning across through anecdotes and dialogue. Like this straightforward introduction: "I was born a slave; but I never knew it till six years of happy childhood has passed away" (1.1).
Plus, Linda seems to be talking to the reader because, well, she addresses the reader. One key stylistic feature of Incidents is its direct appeals. After zooming in on a slave girl and predicting the horrible future that awaits her, the narrator turns out from the page and directly indicts the reader: “In view of these things, why are ye silent, ye free men and women of the north? Why do your tongues falter in maintenance of the right?” (5.7).
These moments occur when the narrator recounts a vivid scene of violence or injustice. By pairing anecdotes with direct appeals to the reader, the narrator links the institution of slavery to the nineteenth-century reader’s own failure to oppose it.
At other times, the narrator’s address of the reader seems to just be a way to check in through questions such as “Reader, did you ever hate? I hope not” (7.13). In these moments, the narrator wants to draw us into the story and make her experience relevant to our own.
Put a Period on It
But then, after all this talky appeal, we come across something like this doozy:
What we've got here is a little thing called a periodic sentence. Periodic sentences are a little invention from ancient Greek rhetoric. They're tightly crafted masterpieces of writerly awesomeness, keeping you in suspense until the very last word. But they can also be a bear to read. You've got to keep all these clauses in your head as you read through the sentence and finally put them all together at the end.
In other words, they're basically the opposite of realistic, ordinary speech, which generally consists of people saying things in the order that thought occur to them. So you can imagine that these sentences are a great way of showing off that Jacobs has some real authority. She's not just an ignorant slave. She's a cultured, well-read, skillful writer.
• The Loophole of Retreat
Pop quiz: Which classic Brit Lit poem begins with the poet talking about a couch?
Answer: William Cowper's "The Task” (1784), which also happens to be the source for Jacobs's chapter title, "The Loophole of Retreat":
'Tis pleasant through the loopholes of retreat
To peep at such a world; to see the stir
Of the great Babel and not feel the crowd;
To hear the roar she sends through all her gates
At a safe distance, where the dying sound
Falls a soft murmur on the uninjured ear.
Here, the loophole represents a place from which the poet can view the world’s misfortunes. Not so much for Linda, who experiences the loophole as a particularly intense form of slavery, so much that it becomes a symbol for the captivity of Southern slaves. Separated from her family, physically uncomfortable, voiceless, and so powerless that she can't even move, Linda is getting a crash course in what slavery is like for the majority of slaves.
But maybe the reference to Cowper (pronounced "cooper," BTW) can let us put an unexpected spin on Linda's crawlspace. Sure, it's a hellhole of rats, ants, and snow, but it's also protection from Dr. Flint, and a place where she can keep an eye on her kids.
It gives her a new, or at least deeper, perspective on slavery, since, as she says, "Southerners have the habit of stopping and talking in the streets, and I heard many conversations not intended to meet my ears" (21). It's a perch from which she can really come to terms with how awful slavery is.
So, in a strange way, the attic also comes to represent certain possibilities within slavery. The most important aspect of the attic is that Linda chooses her confinement. She would rather lie immobile for seven years than allow Dr. Flint possession of her body. In this sense, the crawlspace becomes a symbol of Linda’s self-possession and resilience in the face of adversity.
• Dr. Flint
Dr. Flint is definitely a real person and a character in his own right. Jacobs based him on her real-life master and tormenter, Dr. James Norcom, and he seems to have been as awful as she said.
In Incidents, however, Dr. Flint rises beyond the real-life man and becomes a symbol of the cruelties and casualties of slavery. Linda talks about the "all-pervading corruption produced by slavery" and the fact that "the slaveholder's sons"—like Dr. Flint, we assume—"are, of course, vitiated, even while boys, by the unclean influences every where around them" (9).
In his sexual obsession with Linda, Dr. Flint illustrates that slavery corrupts and abuses children. His cruelty to her children shows that institution of slavery ruins family bonds. And, in his constant lies to his wife, Dr. Flint shows that slavery makes "jealousy and hatred enter the flowery home[s]" (6) of white families.
By making Dr. Flint into a symbol of everything that's wrong with slavery, especially with white slaveowners, Linda turns her own struggle into a mythical allegory against evil. Each time that Linda resists Dr. Flint’s advances, she's also resisting slavery’s violent, immoral, corrupting power.
• Linda
Incidents may be an autobiography, but it's also a mythic account of Linda's rise out of slavery and triumph over evil. In that sense, Linda herself is a big, fat symbol: of triumph, of determination, and of the American spirit.
Even the title of the book tells us that she's more than just an individual person. "Incidents in the Life of a Slave Girl" strips the story of personal details and makes the slave girl of the title a symbol for all slave girls, everywhere. Linda's struggles are no different than any other girl's struggles.
But, of course, they are, because Linda manages to persevere her way out of slavery. Her story does not end "in the usual way" (41), because Linda is not just a symbol of an oppressed and degraded slave girl: she's a symbol of an American icon, the go-getter who pulls herself (or himself) up by her bootstraps to win respect, independence, and fortune. Sure, Linda's fortune might be her children rather than a pile of cash, but it's still a pretty good ending.
• Narrator Point of View
First Person (Central Narrator)
• Booker's Seven Basic Plots Analysis
Anticipation Stage and ‘Call’
The "Peculiar Institution"
Linda doesn’t fully understand the horrors of slavery. She knows that her role is to serve white people, but doesn't really understand what that means. But she's a smart girl, and she starts noticing things. Things like, her new masters, the Flints, are really cruel to her brother William. And the difference between the way her mistress is dressed and the raggedy clothes that she's forced to wear. Or the way Mrs. Flint can't lift a finger around the house but has no trouble watching a slave whipped until she bleeds.
So, yeah. Linda starts getting a pretty good picture of the "monster" that is slavery.
Frustration Stage
I've Got a Golden Ticket… Not
Linda takes a lover, Mr. Sands, hoping that it'll get the lascivious Dr. Flint off her back. Not so much. In fact, Mr. Flint ends up enslaving Linda in an entirely different way. Once her children are born, she can't exactly leave them behind while she goes gallivanting off to seek freedom.
Nightmare Stage
Hiding in Plain Sight
It doesn't get much more nightmarish than this. Linda hides herself away in her grandmother's teeny garret, but it's not the romantic kind. Mice and rats crawl on her, ants bite her, she freezes in the winter, and soaks in the summer. Oh, also, she can't sit or stand, because the ceiling is too low. The one bright point? She can peep out at her children and overhear conversations on the street.
The Thrilling Escape From Death and Death of the Monster
Ding, Dong, the Dr. is Dead
Seven years later, Linda leaves her awfully grave-like crawlspace and goes North. She scores a job as a nursemaid for the British-born Mrs. Bruce who is super nice and helps Linda out a lot. Even though Dr. Flint is still pursuing her, a network of friends and family keeps her safe.
And then Dr. Flint dies. Hooray! Sure, now his daughter technically owns Linda, but the second Mrs. Bruce manages to buy her. Linda and her children are finally free.
• Plot Analysis
Initial Situation
Born in Chains
Linda realizes she's a slave when she's six years old. One of her mistresses teaches her how to read, and Linda starts getting ideas—like, maybe she shouldn't be a slave. In fact, maybe no one should be a slave.
Not-So-Sweet Nothings
When Linda is fifteen, Dr. Flint gets that special glint in his eye. He sends her creepy notes and whispers dirty things in her ear. To make the whole experience extra appealing, Dr. Flint insists that he'll never sell her to anyone else. She's going to belong to him forever.
16 and Pregnant... Again
Linda gets herself knocked up, hoping it'll gross Dr. Flint out enough that he'll sell her. No such luck. And now she's stuck, because she can't just jet off to the North and leave her kids behind. Even though she does finally run away, she hides herself in a tiny crawlspace for seven years just so she can be near them.
Follow the Drinking Gourd
Finally, Linda's friend Peter comes to her with a plan to board a ship sailing North. After some hemming and hawing, Linda heads for the boat and sails off toward an uncertain future.
New York, New York
Linda loves her new home and her new job, but she doesn't love that Dr. Flint is still after her. Seriously, he just can't take a hint. He tries one ploy after another, but Linda manages to evade him. The suspense rises when the U.S. government passes the Fugitive Slave Act, meaning that all the northerners helping Linda are now breaking the law.
What You Get for… $300
Finally, Linda's employer Mrs. Bruce convinces Dr. Flint's daughter to sell her. With the help of an elaborate community of family, friends, and random do-gooders, Linda has finally achieved one of the major goals of her life: freedom for herself and for her children.
There's No Place Like Home
But that's only one of her goals. At the end of Incidents, Linda is still not completely satisfied. What she really wants is the American Dream: to live in her own house with her children.
• Three-Act Plot Analysis
Act I
Linda's happy little life ends at six years old, when she (1) realizes that she's a slave and then, a few years later, (2) is sent to work for the Flint family. Dr. and Mrs. Flint are apparently in competition to see who is the bigger sociopath, and they torment Linda emotionally, physically, and—in Dr. Flint's case—sexually.
Act II
Eventually, Linda's had it and runs away. But not very far. By this point, she's had two children by another (white) man, and she can't bear to leave them. Her solution, which we can't entirely get behind, is to hide in the leaky, rat-infested crawlspace above her grandmother's shed. For seven years.
Act III
Linda’s friend Peter finds a ship's captain to carry Linda to Philadelphia. The North is not as awesome as Linda had hoped, but it's still pretty great, especially once she manages to reunite with her children. Eventually, she finds work, friendship, and freedom: almost, but not quite, everything she wants.
• Allusions
Literary and Philosophical References
• Mark 12.31 (1.6)
• Matthew 7.3-5, Luke 6.41-42 (4.10)
• Lord Byron, “The Lament of Tasso” (7.1)
• Exodus 20.15 (9.2)
• John Norris, The Parting (9.12)
• Robert Blair, The Grave (9.12)
• Amelia Matilda Murray (37.5)
• Mary Howitt, “The Spider and the Fly” (38.3)
• Thomas Gray, “Elegy Written in a Country Churchyard” (40.3)
• Uncle Tom's Cabin (40.15)
• Ecclesiastes 7.7 (40.13)
• Job 3.17 (41.23)
Historical References
• Nat Turner’s Slave Rebellion (12.1)
• Irish Potato Famine (6.1)
• Albert G. Brown, a Mississippi senator (23.5)
• Compromise of 1850, a.k.a. “The Fugitive Slave Law” (40.1)
• Amy Post, Quaker abolitionist (39.5)
Pop Culture References
• Jenny Lind (40.3) |
global_01_local_0_shard_00002368_processed.jsonl/55830 | Crowdsourcing Preference Judgments for Evaluation of Music Similarity Tasks - PowerPoint PPT Presentation
crowdsourcing preference judgments for evaluation of music similarity tasks n.
Skip this Video
Loading SlideShow in 5 Seconds..
Crowdsourcing Preference Judgments for Evaluation of Music Similarity Tasks PowerPoint Presentation
Download Presentation
Crowdsourcing Preference Judgments for Evaluation of Music Similarity Tasks
Loading in 2 Seconds...
play fullscreen
1 / 39
Download Presentation
Download Presentation
Crowdsourcing Preference Judgments for Evaluation of Music Similarity Tasks
Presentation Transcript
1. CrowdsourcingPreference Judgments for Evaluation of Music Similarity Tasks JuliánUrbano, Jorge Morato,Mónica Marrero and Diego Martín SIGIR CSE 2010Geneva, Switzerland · July 23rd
2. Outline • Introduction • Motivation • Alternative Methodology • Crowdsourcing Preferences • Results • Conclusions and Future Work
3. Evaluation Experiments • Essential for Information Retrieval [Voorhees, 2002] • Traditionally followed the Cranfield paradigm • Relevance judgments are the most important part of test collections (and the most expensive) • In the music domain evaluation has not been taken too seriously until very recently • MIREX appeared in 2005 [Downie et al., 2010] • Additional problems with the construction and maintenance of test collections [Downie, 2004]
4. Music Similarity Tasks • Given a music piece (i.e. the query) return a ranked list of other pieces similar to it • Actual music contents, forget the metadata! • It comes in two flavors • Symbolic Melodic Similarity (SMS) • Audio Music Similarity (AMS) • It is inherently more complex to evaluate • Relevance judgments are very problematic
5. Relevance (Similarity) Judgments • Relevance is usually considered on a fixed scale • Relevant, not relevant, very relevant… • For music similarity tasks relevance is rather continuous [Selfridge-Field, 1998][Typke et al., 2005][Jones et al., 2007] • Single melodic changes are not perceived to change the overall melody • Move a note up or down in pitch, shorten it, etc. • But the similarity is weaker as more changes apply • Where is the line between relevance levels?
6. Partially Ordered Lists • The relevance of a document is implied by its position in a partially ordered list [Typke et al., 2005] • Does not need any prefixed relevance scale • Ordered groups of documents equally relevant • Have to keep the order of the groups • Allow permutations within the same group • Assessors only need to be sure that any pair of documents is ordered properly
7. Partially Ordered Lists (II)
8. Partially Ordered Lists (and III) • Used in the first edition of MIREX in 2005[Downie et al., 2005] • Widely accepted by the MIR communityto report new developments [Urbano et al., 2010a][Pinto et al., 2008][Hanna et al., 2007][Gratchen et al., 2006] • MIREX was forced to move to traditionallevel-based relevance since 2006 • Partially ordered lists are expensive • And have some inconsistencies
9. Expensiveness • The ground truth for just 11 queries took 35 music experts for 2 hours [Typke et al., 2005] • Only 11 of them had time to work on all 11 queries • This exceeds MIREX’s resources for a single task • MIREX had to move to level-based relevance • BROAD: Not Similar, Somewhat Similar, Very Similar • FINE: numerical, from 0 to 10 with one decimal digit • Problems with assessor consistency came up
10. Issues with Assessor Consistency • The line between levels is certainly unclear[Jones et al., 2007][Downie et al., 2010]
11. Original Methodology • Go back to partially ordered lists • Filter the collection • Have the experts rank the candidates • Arrange the candidates by rank • Aggregate candidates whose ranks are not significantly different (Mann-Whitney U) • There are known odd results and inconsistencies [Typke et al., 2005][Hanna et al., 2007][Urbano et al., 2010b] • Disregard changes that do not alter the actual perception, such as clef or key and time signature • Something like changing the language of a text and use synonyms [Urbano et al., 2010a]
12. Inconsistencies due to Ranking
13. Alternative Methodology • Minimize inconsistencies [Urbano et al., 2010b] • Cheapen the whole process • Reasonable Person hypothesis [Downie, 2004] • With crowdsourcing (finally) • Use Amazon Mechanical Turk • Get rid of experts [Alonso et al., 2008][Alonso et al., 2009] • Work with “reasonable turkers” • Explore other domains to apply crowdsourcing
14. Equally Relevant Documents • Experts were forced to give totally ordered lists • One would expect ranks to randomly average out • Half the experts prefer one document • Half the experts prefer the other one • That is hardly the case • Do not expect similar ranks if the expertscan not give similar ranks in the first place
15. Give Audio instead of Images • Experts may guide by the images, not the music • Some irrelevant changes in the image can deceive • No music expertise should be needed • Reasonable personturker hypothesis
16. Preference Judgments • In their heads, experts actually do preference judgments • Similar to a binary search • Accelerates assessor fatigue as the list grows • Already noted for level-based relevance • Go back and re-judge [Downie et al., 2010][Jones et al., 2007] • Overlapping between BROAD and FINE scores • Change the relevance assessment question • Which is more similar to Q: A or B? [Carterette et al., 2008]
17. Preference Judgments (II) • Better than traditional level-based relevance • Inter-assessor agreement • Time to answer • In our case, three-point preferences • A < B (A is more similar) • A = B (they are equally similar/dissimilar) • A > B (B is more similar)
18. Preference Judgments (and III) • Use a modified QuickSort algorithm to sort documents in a partially ordered list • Do not need all O(n2) judgments, but O(n·log n) X is the current pivot on the segment X has been pivot already
19. How Many Assessors? • Ranks are given to each document in a pair • +1 if it is preferred over the other one • -1 if the other one is preferred • 0 if they were judged equally similar/dissimilar • Test for signed differences in the samples • In the original lists 35 experts were used • Ranks of a document between 1 and more than 20 • Our rank sample is less (and equally) variable • rank(A) = -rank(B) ⇒ var(A) = var (B) • Effect size is larger so statistical power increases • Fewer assessors are needed overall
20. Crowdsourcing Preferences • Crowdsourcing seems very appropriate • Reasonable person hypothesis • Audio instead of images • Preference judgments • QuickSort for partially ordered lists • The task can be split into very small assignments • It should be much more cheap and consistent • Do not need experts • Do not deceive and increase consistency • Easier and faster to judge • Need fewer judgments and judges
21. New Domain of Application • Crowdsourcing has been used mainly to evaluate text documents in English • How about other languages? • Spanish [Alonso et al., 2010] • How about multimedia? • Image tagging? [Nowak et al., 2010] • Music similarity?
22. Data • MIREX 2005 Evaluation collection • ~550 musical incipits in MIDI format • 11 queries also in MIDI format • 4 to 23 candidates per query • Convert to MP3 as it is easier to play in browsers • Trim the leading and tailing silence • 1 to 57 secs. (mean 6) to 1 to 26 secs. (mean 4) • 4 to 24 secs. (mean 13) to listen to all 3 incipits • Uploaded all MP3 files and a Flash player to a private server to stream data on the fly
23. HIT Design 2 yummy cents of dollar
24. Threats to Validity • Basically had to randomize everything • Initial order of candidates in the first segment • Alternate between queries • Alternate between pivots of the same query • Alternate pivots as variations A and B • Let the workers know about this randomization • In first trials some documents were judged more similar to the query than the query itself! • Require at least 95% acceptance rate • Ask for 10 different workers per HIT [Alonso et al., 2009] • Beware of bots (always judged equal in 8 secs.)
25. Summary of Submissions • The 11 lists account for 119 candidates to judge • Sent 8 batches (QuickSort iterations) to MTurk • Had to judge 281 pairs (38%) = 2810 judgments • 79 unique workers for about 1 day and a half • A total cost (excluding trials) of $70.25
26. Feedback and Music Background • 23 of the 79 workers gave us feedback • 4 very positive comments: very relaxing music • 1 greedy worker: give me more money • 2 technical problems loading the audio in 2 HITs • Not reported by any of the other 9 workers • 5 reported no music background • 6 had formal music education • 9 professional practitioners for several years • 9 play an instrument, mainly piano • 6 performers in choir
27. Agreement between Workers • Forget about Fleiss’ Kappa • Does not account for the size of the disagreement • A<B and A=B is not as bad as A<B and B<A • Look at all 45 pairs of judgments per pair • +2 if total agreement (e.g. A<B and A<B) • +1 if partial agreement (e.g. A<B and A=B) • 0 if no agreement (i.e. A<B and B<A) • Divide by 90 (all pairs with total agreement) • Average agreement score per pair was 0.664 • From 0.506 (iteration 8) to 0.822 (iteration 2)
28. Agreement Workers-Experts • Those 10 judgments were actually aggregated Percentages per row total • 155 (55%) total agreement • 102 (36%) partial agreement • 23 (8%) no agreement • Total agreement score = 0.735 • Supports the reasonable person hypothesis
29. Agreement Single Worker-Experts
30. Agreement (Summary) • Very similar judgments overall • The reasonable person hypothesis stands still • Crowdsourcing seems a doable alternative • No music expertise seems necessary • We could use just one assessor per pair • If we could keep him/her throughout the query
31. Ground Truth Similarity • Do high agreement scores translate intohighly similar ground truth lists? • Consider the original lists (All-2) as ground truth • And the crowdsourced lists as a system’s result • Compute the Average Dynamic Recall [Typke et al., 2006] • And then the other way around • Also compare with the (more consistent) original lists aggregated in Any-1 form [Urbano et al., 2010b]
32. Ground Truth Similarity (II) • The result depends on the initial ordering • Ground truth = (A, B, C), (D, E) • Results1 = (A, B), (D, E, C) • ADR score = 0.933 • Results2 =(A, B), (C, D, E) • ADR score = 1 • Results1 is identical to Results2 • Generate 1000 (identical) versions by randomly permuting the documents within a group
33. Ground Truth Similarity (and III) Min. and Max. between square brackets • Very similar to the original All-2 lists • Like the Any-1 version, also more restrictive • More consistent (workers were not deceived)
34. MIREX 2005 Revisited • Would the evaluation have been affected? • Re-evaluated the 7 systems that participated • Included our Splines system [Urbano et al., 2010a] • All systems perform significantly worse • ADR score drops between 9-15% • But their ranking is just the same • Kendall’s τ= 1
35. Conclusions • Partially ordered lists should come back • We proposed an alternative methodology • Asked for three-point preference judgments • Used Amazon Mechanical Turk • Crowdsourcing can be used for music-related tasks • Provided empirical evidence supporting the reasonable person hypothesis • What for? • More affordable and large-scale evaluations
36. Conclusions (and II) • We need fewer assessors • More queries with the same man-power • Preferences are easier and faster to judge • Fewer judgments are required • Sorting algorithm • Avoid inconsistencies (A=B option) • Using audio instead of images gets rid of experts • From 70 expert hours to 35 hours for $70
37. Future Work • Choice of pivots in the sorting algorithm • e.g. the query itself would not provide information • Study the collections for Audio Tasks • They have more data • Inaccessible • But no partially ordered list (yet) • Use our methodology with one real expert judging preferences for the same query • Try crowdsourcing too with one single worker
38. Future Work (and II) • Experimental study on the characteristics of music similarity perception by humans • Is it transitive? • We assumed it is • Is it symmetrical? • If these properties do not hold we have problems • Id they do, we can start thinking on Minimal and Incremental Test Collections[Carterette et al., 2005]
39. And That’s It! Picture by 姒儿喵喵 |
global_01_local_0_shard_00002368_processed.jsonl/55833 | Polaris Slingshot Forum banner
daily driver
1. Who Here Daily Drives Their Slingshot?
Polaris Slingshot Discussions
I took the sling out today to fill 'er with gas and such and holy sh*t - I don't think my hands have ever been so cold in my life. Granted - the heated ego from taking HOV lanes for free kept me warm enough, but people - who here daily's the Sling and if so, where the hell do you live?? |
global_01_local_0_shard_00002368_processed.jsonl/55852 | Play Wild West Solitaire
Wild West Solitaire is played in a similar way to Klondike Solitaire but with a few different levels and rule improvements.
Do you enjoy playing this game? Share it via email with your friends or family, or bookmark it so you always find it back.
Share via email Bookmark
Rate this game:
Wild West Solitaire Instructions
This card game has similar rules to Klondike Solitaire.
Your goal is to build up the four foundation piles from Ace to King. On the tableau (the cards below the foundation) you can build columns in descending order, but using alternating colored cards. For example Jack (either Clubs or Spades) can only be followed by a Ten which is either hearts or diamonds.
Click on the stack of cards in the top right to get a new one.
The faster you complete a level the more bonus points you will get at the end of the round.
Hints and Tips
• Unlike Klondike Solitaire you can place any card (rather than just the King) on an empty column. This is very useful and makes the game a bit easier.
• Like most solitaire games its important to plan a little.
• You can turn the music off by clicking the musical note in the bottom left of the screen! |
global_01_local_0_shard_00002368_processed.jsonl/55859 | Agencies in the same countryIn the same countryarrow_drop_downAgencies in Genevaarrow_forwardAgencies in Züricharrow_forwardAgencies in Sachselnarrow_forwardAgencies in Lausannearrow_forwardAgencies in Luganoarrow_forwardAgencies in Bernarrow_forwardAgencies in Nyonarrow_forwardAgencies in Lucernearrow_forwardAgencies in Neuchâtelarrow_forwardAgencies in Badenarrow_forwardOther citiesarrow_forwardAgencies in other expertisesIn other expertisesarrow_drop_downDesign Agenciesarrow_forwardWeb Design Agenciesarrow_forwardAdvertising Agenciesarrow_forwardDigital Marketing Agenciesarrow_forwardBranding Agenciesarrow_forwardSEO Agenciesarrow_forwardMobile App Development Agenciesarrow_forwardSocial Media Agenciesarrow_forwardWeb Development Agenciesarrow_forwardVideo Production Agenciesarrow_forwardOther categoriesarrow_forwardI'm an agencyI need an agency
Best Digital Marketing Agencies in Zug
Which one is the best for your company?
Find my agency
14 results
No Time?
We select the best agencies for you!
Want to be listed here?
Let’s go! Launch your project in Zug today!
How we guide you to the right agency.
What can you anticipate from an agency competent in digital strategy in the region of Zug!
Searching for an agency in the area of Zug for your next communication activity? Do not waste any time and call us. Because digital marketing companies will be an enormous support for your digital strategy building or your linkbuilding activities.
In what way will a digital marketing company aid you? And what is digital strategy?
A mountain of distinctive solutions are offered by companies competent in digital strategy. And it is generally difficult to smoke out the ideal company in Zug. So don't make any blunders and call us, from that day on solely have faith in Sortlist and lie down, we will do the rest.
We affirm it is safe to say that kicking off an activity in digital strategy building or in linkbuilding alone can speedily develop into a unproductive and money-consuming faux pas if your company doesn't finalize it well. Don’t overthink it and take on an agency in Zug to certify your triumph!
Zug, digital marketing companies to begin your assignment.
Every man comprehends that a valuable relationship is the initial stride towards a fruitful cooperation. And straightaway your company can quickly have the chance to be amazed by a digital marketing company that was picked expressly for you. So, you can know without a doubt that a cooperation with a digital marketing company in Zug will be great.
Cooperating with our digital marketing companies, a positive power!
Listing the profuseness of advantages of cooperating with a digital marketing company and their partners in the household products and political organization industry, would be exceedingly lengthy. But a real perk that we can tell is that this partnership is the fitting practice to acquire the latest technologies and tools.
End the frustration and eternal hunting for the perfect digital marketing company, Sortlist is the finest service. Transfer Sortlist your campaign now, and our team will advise your company in finding the most adapted bureau.
Kenneth De Maeyer
Kenneth De Maeyer
Marketing & Communication Manager at Mega
Let us guide you to the best agency
Then, compare and hire the one that's right for you.
Find my agency
|
global_01_local_0_shard_00002368_processed.jsonl/55860 | germany police
There have been no immediate reports of casualties although ambulances were reportedly spotted at the site of the incident.
An unidentified assailant armed with an axe took one patron of a slot machine hall in the German city of Buchholz, in Lower Saxony, hostage at around 12 p.m. local time on 30 November, the online media outlet Nonstopnews reported.
An hour later, responding police units commenced the operation to free the hostage, with the perpetrator reportedly fleeing from them into the gaming hall's restroom. The person was later overpowered and arrested by police officers.
A gaming hall employee and two guests were evacuated from the building and are currently being attended to by medics in an ambulance, which arrived at the scene along with the police. There is currently no information if someone was injured in the incident.
Police are working to reconstruct the incident and promised to publish a proper press release later. |
global_01_local_0_shard_00002368_processed.jsonl/55861 | Forgot your password?
Thanks! Check your email to reset your password.
Sign Up
A few more things
Almost there,
Terms and Conditions
Questions or comments?
Shoot us an email or call one of our studios.
request a SoulCycle in your area
Studio Spotlight: Westlake
Three words to describe the team?
Favorite songs to rock out to on the bike?
TBT's all day! we love a good 90s throwback!
Off the bike/in the studio?
Favorite snacks to power your days?
Think Thin Bites... all day every day!!!
Favorite spots around the Westlake studio?
Salad from Mendocino Farms, juice from Pressed Juicery, Yoga at Core Power and anything and everything at Gelsons. #plazalife (shoutout to Rachel Stephens).
Favorite Westlake memories?
Selling out our first class of the day of opening day! Dreams do come true!
Studio theme song?
“Work” by Riri and Drake!
Best part about bringing SOUL to Westlake?
THE PEOPLE... and each other!!!
Anything else to add?
Shape Created with Sketch.
Create Account
Sorry, please fix the following:
|
global_01_local_0_shard_00002368_processed.jsonl/55866 | current article
submit an article
contact span
the brains and their function
problems are of two kinds; ones arising from the reactions to the thought out reality, and the others are simply facing the new for the first time. the thought out version of what is comes from the brains' store house, the memory that looks for the familiar occurrence in the past. but since, in nature nothing happens twice, all the brains can do is to recall an event somewhat similar. but as the memory cannot reproduce the past event into the present experiential state of being in it, it creates a description, which is thought. and a reaction to thought is also produced in thought. when being put in a new, heather to unknown event, there is the instantaneous response in which the memory cells of the brains are not required due to the unfamiliar grounds requiring the immediate response. it is how the eye lids close sensing the dust particles approaching the eyes without thinking that one has to close eyelids.
that is how there is no descartes in the non urban world, for the creatures do not have to follow the made to order urban way of life like him. in it the socio-economically well placed persons like descartes led so protected a life, that the only way they could experience the existence is in thinking: "i think, therefore i am." and the class conscious brains of the thinkers is to consider every person and creature that does not need to look for precedence in the constance, change, in order to exist to be inferior.
problems are the justification for having brains. and problems are nothing but the cognizance of the evolutionary nature of existence; or knowing that living is not a performance on stage. what one does on stage is all learnt, rehearsed, memorized and directed acting. and even the very acting is for the sake of carving out a socio-economic niche in the increasingly commercialized worth of one's chosen identity acquired from the school syllabus. acting is no different from any other profession, which, once enrolled in, shuts out the rest of the brains' faculties of discerning what harms it does even to oneself when not functioning wholesomely. a good actor is one who is able to activate only those brain cells of his that mobilize those limbs and organs called for by the script. 4th century sanskrit dramatist named bharat muni has written a book of the treaties of the theatrics, elaborating on the expressions of the human moods in a given state of being divided into 9 basic states of being, ranging from romance to fear, digust and equanimity. the western politicians have similarly employed techniques that turn on the applauding brain cells of the audience: plant the paid cheerleaders placed randomly in the audience. their role is to motivate the audience to behave like the idea of 'the monkey see, monkey do'. so do the scantily dressed shapely cheerleader girls and the salaried professional art and book critics thus manipulate the selective brain cells of the masses that are otherwise in a state of slumber.
it is in the nature of the teaching profession to impart what the teacher has known about his chosen field. and all a certified teacher has known is all book knowledge, much of which is unchecked and otherwise meaningless in the sense that it makes no difference in students' lives if they knew or did not know. whether the jupiter has six planets or none at all, or whether the chinese or the mesopotemian culture was the oldest has no bearing outside of the classroom. and yet, not knowing the prescribed answer would lower one's chances in the one up-man-ship.
just as the computer keyboard does not object to its keys being pressed randomly or in any linguistic pattern, the brains, too, do not refuse to function when given an input, whether useful or harmful to others and even to oneself. the conditioning through the familial patterns, the schooling, the advertizing industry and the laws of the state make use of this observation of the peoples' brains. and all these conditioning agencies are interconnected. so they, unawares, and otherwise purposefully overlook the adverse effects of each other's acts upon the people at large. and, too, their brains function in the same way as do a toddler's brains. just watch how mutilating small children's actions are with something they grab hold of, and unintentionally ruin it, and in the process may even hurt themselves. this is due to the evolutionary process of the growth, in which the stages of development are according to the immediate functions of the limbs and organs. and only that isolated segment of their brains related to that particular motion of limbs is actively engaged there. at that instance children cannot know what is good for them, but only learn to enable themselves to adapt to a thing or act as taught. that is potty training. execrating of the stool is within the range of involuntary motions. doing it in the potty is regulated by training the brains of infants. why so, it is beyond the children's grasp, so only where to do it is taught. even the parents themselves do it in the adult version of the potty, which is flush toilet.
a bright brains university professor flushes the toilet much the same as a mother of an infant dumps a diaper in the trash can without ever wondering about the effects of such an act. and in the increasingly commercially urbanized living it becomes next to impossible to wonder about the consequences of such disjointed acts, except in the ecology classroom. an entrepreneur businessman's brains activate only that segment of his brains that makes an adult potty look attractive even when there is no urge to use it. look at the bathroom fixtures in the upscale department stores for the rich. but just as the potty training of the infant progresses into enabling one to defend one's doctoral thesis on equally disjointed perception of something verbal, each and every thing a modern person is surrounded with is the product invented by a tiny segment of the brains of each and every person, perceived and manufactured in total isolation of one another.
now observe the upbringing differences between the two mothers of the same species, one free and another in captivity. the free mother's protective instincts would not let anyone near her baby, the captive mother would not see any harm in it. likewise, the baby of the free mother would be kept close to its mother, while the captive baby might even be entrusted to a stranger. the captive foals thus begin to unwittingly learn their first lessons in being broken by running beside their mothers who are actually being trained. the urbanized human parents thus enroll their children to preschool and kindergarten to become like father like son, like mother like daughter.
in the urban human life there is nothing evolutionary happening, only the improvisation of the setting. man has made machines that have taken him deep into the outer space, but only enwrapped in cocoon-like space suit. in order not to subject themselves to the unknown consequences, men of science are using other creatures to find out if what they have created would harm them, whether it is monkey in the outer space, or rabbits and mice and other creatures in psychologists' and pharmacologists' laboratories. nazis had used jews and others in the concentration camps as the human 'guinea pigs' to experiment on. so did the u.s. and australian governments use the aborigines to observe the effects of their experiments on humans. that is objective perception, which being devoid of the experiencing state of being create only thought about what being put in such condition would feel.
thus what those scientists did not know remains a mystery for them, generating speculations, which they call theories. it is a mystery only in the sense that, the musing natural to perception of the new then in the next instance becomes an urge to experience it. the modern urban culture developed by the industrial revolution has substituted this natural urge with he improvisation of the same known. scientists, who are seated like the modern day high priests by the commerce controlled state and private agencies, are reared and employed to use their brains in isolation. thus though the physicists point out, that what pervades in the cosmos are the same elements that constitute the human form, are very class oriented. consequently, in their theoretical perception of the elemental interdependence of all things and beings and acts the creatures labeled as guinea pigs are excluded. there, one finds no difference between the men acting as butchers in the slaughter house, or scientists dissecting the a creature or a commander in chief of a nation commanding an atrocious invasion of a foreign land. only parts of their brains that are trained to safeguard their learnt role playing are touched; the rest of their brains are untouched, like all the untouched keys of computer or piano or a string instrument. potentially all able to respond to the touch forming a profound insight in words or a resonance of spirit in sound.
the elemental similarity of brains being the same, it is not specialty of the biological nature that makes one a sage and another a ruthless killer. it is the way of life regulating the function of the biological body connected with only those segments of their brains perceiving only those actions deemed to be necessary for their acquired self-identity. the problem with the self-image created function of the brains is that it cannot happen without the acquired description, and acquisitions are made and valued only of the known.
if both sinbad, the sailor
and christopher columbus had stayed
the course
charted by the processional tour guides,
there would be no stories for you to read
and be lured to places you were guided
to imagine.
but columbus wasn't looking
for anything new.
he simply sought the short cut
to the known.
so anything unknown
he chanced stumbled upon,
he strived to change
into known forms;
so that those who came after him
would further reduce the whole new world
into a medieval european battleground
where people fought and killed each other
to keep each other from having
what can't be possessed.
additional articles:
climate change is manmade; man is made up
on the world stage: dress codes from diapers to dress rehearsal
on being surgically reformed human: and ecologically uncomfortable perception
the i.r.s.: taxation and tax deduction
a letter to congressperson alexandia ocasio-cortez
nature: creator is the creation
expanding the limits
kalejaa, the heart
creating a subspecies: the urban human
sibling rivalry
whence and where to
the me, too, culture: the peer pressure
commercial cannibalism
buddhist economics
decentralization of power
counterculture in capitalism
of trust and trustees
within and without the picture frame
"Whiteman's burden"
life sustains on life
work and workout
on reading and writing
knowledge: intellectual property
mind over matter
medium of communication: english
one or many
economics of procreative organs
selfless act
medal of freedom
rebel with subconscious cause
literacy: revolution in the concept of education
on being an actor among pretenders
on ecocentric parenting
between birth and death
culture and counterculture
literacy: knowing what is read
the brains and their function
no-mind: nothingness and no thing-ness
energy: purpose and conservation
poverty : inflicted by others and self imposed
rose by any other name: identity and the content relationship
the american way of life: from the eyes of a foreigner
on noninterference: interfered with the acquired ideals
web of maya: on possessions and being possessed
transfer of authority from infancy to adulthood
emperor without the clothes
laws of nature and laws of man
on science and technology
on being poor or rich
letter to barack obama
on seeing eye to eye
to be or not to be: the sense of being
on language
on seeing what is
on energy
on rearing the young
on education
understanding the place
a proposal for prison reform
individual is indivisible
on the imposed emnity
the social change; an ecological perspective
on education and philanthropy |
global_01_local_0_shard_00002368_processed.jsonl/55928 | ©2018 by Tales of the Mind. Proudly created with Wix.com
The Life of Two Souls
November 18, 2018
Back from vacation and with a new story. This is just a short version from a longer one.
The Life of Two Souls
The smell of burning wood filled the air with the sounds of screaming. Only darkness was seen but a faint light pierced through it and the silhouette of a man stood in front, saying something. The voice was muffled and not recognizable. As the person on the floor moved, they were inside a crater. Shards of metal covered in blood surrounded it, and smoke came from the black ground. The man climbed down the hole, and his features were more distinguished. His black beard was covered with a bit of gray, and his face had wrinkles. His head was covered by a white turban. His light brown eyes scanned the person, and there was fear in them but at the same time happiness. He spoke again but the sound was not clear, and the darkness returned.
The man lifted the person from the crater and climbed back up. Some of the men helped him up and looked at the child who he held in his arms. Her face was covered in dirt and blood, but there were no signs of cuts, only her clothing was damaged from the bomb that fell from the sky. Everyone quickly fled from the area as the man went to his home. When he arrived at his house, his wife saw them, and she ran to them asking what had happened. The man explained to her and was shocked to learn that her daughter was bombed but survived it. He took his daughter inside and laid her on the ground. Her mother examined her and found nothing. She caressed her daughter’s head as she opened her eyes and looked at her mother.
“Mama, what are you doing here?”
“Oh, my daughter.” She began to cry. “It is a miracle.”
The child looked around the place and noticed that she was inside her house.
The next day as the child sat in front of the house, she was watching the other children playing. There was something different about everything, and it seemed as if she was not part of this world. She sat there quietly, and her mother called to her.
“Halah come here.”
She stood and went inside. “Yes, mama.”
“I need you to take this to your uncle.” Her mother held a basket. “There’s something inside that he needs for his wife.”
“Okay.” Halah grabbed it and left.
The walk to her uncle’s house was pleasant. Many of the people who saw her waved which was strange for Halah. Around the corner, she viewed the crater which was being filled in. Four men were examining some of the fragments, and one of them noticed Halah. He called to her, and she walked to him.
“Ah, Halah.” He smiled at her. “I see you are well.”
“Yes.” She answered.
“You are blessed to be alive. No one has ever lived through something like that or have one’s limbs intact.”
Halah stared at the man’s eyes and saw something inside of them. It was a strange shadow, and it smiled. It frightened Halah and quickly walked away. All the men looked at her strangely and wondered what happened. As Halah continued onward, a voice spoke to her, and she turned her head to see who it was, but no one was looking at her. She took a few more steps and stopped when the voice spoke again.
“W—who’s there?” She said in a low voice.
No answer just the sound of cars and the people walking. Halah wrapped her arms around her and felt frightened. She wanted to run back home but stood there like a statue.
“Are you well child?” Halah turned to see a woman whose head was covered by a black veil. “Are you lost?”
“No,” Halah said. “I’m just thinking.”
The woman smiled and there in her eyes was another shadow, but it was different from the one on the man’s eyes. The woman walked past her, but Halah followed the woman. Once the woman reached a point, she turned and looked at the child.
“Why are you following me?”
“Oh, sorry.” Halah bowed her head and walked away. After a few minutes, she reached her uncle’s house and found him sitting on the floor with his son.
“Halah.” He smiled. “It’s good to see you again. I heard about the bombing. Are you well?”
“Yes, I’m fine.” She lowered the basket and pulled out a bottle. “Mama send this to you.”
“Ah, she is a good sister.” He grabbed it and opened the top to smell it. “She makes it like our mother. Sit Halah and tell me about your day.”
She sat next to him and looked at her baby cousin. His light brown eyes glimmer at her and something moved inside of them. Halah smiled and reached out to grab his hand. The boy laughed and shouted with joy which surprised his father.
“Look at him. He really likes you.” He passed the boy to Halah. “I will take these things, and we can talk later.”
As her uncle walked away, Halah looked at the boy’s eyes. The shadow moved around, and she felt that it was happy. Halah wondered what it was as she looked around the room. Everything inside seemed worthless as if the material did not have an attraction to her. The voice spoke again, and the boy laughed and stretched out his hands towards her. Halah saw that it did not scare the baby, so she closed her eyes and focused on the voice.
“Hello, Halah.”
She opened her eyes and saw that no one was there. The baby yawned and laid its head on her chest. Just then her uncle came in and saw the sleeping baby.
“I see that it’s time for his nap. Here, I will lay him to rest.”
Halah past the baby and stood as they went to the room. Once he returned, they spoke for a while, and Halah told him everything. He was amazed and said to her that she had a purpose for surviving the bombing. She nodded and looked at his eyes. The shadow in him was different from the baby. It was much darker and seemed sad.
“Something wrong?” He asked.
“Oh, no. I should be heading back home.”
“All right and thank your mother for me.”
Halah walked out of the house and returned to her home. On her way, she examined everyone’s eyes that came in contact with her. Some were bright and happy which were mostly children, and those that were dark and sad were adults. Halah did not understand why she saw it or why a voice was speaking to her.
At home, Halah told her mother about her uncle and nothing more. Later that night as she laid to bed, she closed her eyes and focused on the voice. At first, there was nothing, but after a few minutes, it spoke.
“Halah, do not be afraid.”
“Who are you and what do you want?” She said with a quiet voice.
“I am a soul that became part of you and saved you from the bomb. Right now, you would be dead if I have not intervened.”
“Why did you save me?”
“I am seeking out something that was left here and am using you as a vessel to fulfill it. Once I am done, you will leave this world.”
Halah opened her eyes and gasped as she felt pain in her chest. She pressed her hand over and wept quietly.
“I am sorry to tell you that.” The pain subsided, and Halah looked around the dark room. “I promise that it will be painless when the time comes. You will have gifts that will help you on this journey and will help others with them. Now rest.”
Halah laid back down and dozed off.
The next day Halah was up early and was back at the crater looking at it. A flash came over her, and she began to remember about that day.
Her father was across the plaza speaking to a man about a part that broke from the car. Halah was hopping around on the ground and stopped to see a stone that was shining on the ground. She crouched down and picked it. While she was busy examining it, four vehicles pulled behind her and several men climbed out of them. One of the men saw Halah and shouted at her. She stood and looked at him. Just then a whistling sound was heard. Halah looked up then everything became black. As she stood there thinking about it, a man walked by her and asked what she was doing.
“Thinking about that day.” She said without looking at him.
“Oh, you are the child that lived.” The man limped over to her. “I was amazed that nothing happened to you. The only thing you had on you was dirt and blood.”
Halah looked at the man and stared at his eyes. There was light in them but at the same time despair. She looked at his leg which was bandaged and had dry blood on it. She slowly reached with her finger and touched it. The man moaned and began to scratch his leg. After a while, he walked away and noticed that his steps were different. He lifted his leg up and moved around then he began to shout that he was healed. Halah looked at him and walked away. She heard the voice and told her to head to a house nearby. She stepped inside and found a woman who was laying on the bed and her daughter was crying. Halah walked to them and asked what the matter was.
“My mother is dying.” The girl wiped her eyes. “There’s nothing that will save her.”
Halah watched the woman, and something came over her.
“I know this mortal.” The voice said to her. “Place your hand on her and ask for water from the child.”
She asked the girl if she could have water. The girl nodded and went to fetch it. Halah observed the ill woman and placed her hand over her face and waited for the water. As soon as the water was brought to her, Halah lifted the woman’s head and let her drink it. Once she swallowed all of it, Halah moved away and asked the girl if she had any white stones.
“Yes, I do but why not go outside and gather some?”
“These are different.”
The child rubbed her head and went to get them. Halah smiled at the woman who was asleep. When the girl returned, Halah grabbed the four stones and thanked the girl and told her that her mother should be well in a few hours. Halah strolled out of the city and climbed a high hill and found a circle that had the four stones missing.
“This is what I was missing. Place the four stones back and lay inside.”
Halah did as the voice told her then laid on the ground. Slowly the stars appeared overhead and she closed her eyes never to open them again.
Please reload
Our Recent Posts
Finally, it's coming out
November 9, 2019
A change of things
October 27, 2019
So, this is a story I'm working on. The idea of it, I don't remember where I got it from but it is a science fiction, different from the other stories...
Busy, busy
September 22, 2019
Almost three months since I posted. I've been busy as I got a new job. The other place was just slow and I was not going anywhere with that company. T...
Please reload
I'm busy working on my blog posts. Watch this space!
Please reload |
global_01_local_0_shard_00002368_processed.jsonl/55943 | Skip to main content
Forget Windows, Linux or MacOS: Our choice of the best alternative operating systems
(Image credit: Pixabay)
If you're fed up with Windows, Linux, or macOS, you'll want to know if there's a great alternative desktop operating system that's worth using.
While there are no absolute definitive answers here – everyone's use case is different, after all – we've discovered ten distinct examples that fall outside the usual bounds.
Our list even includes a few true outsiders, independent operating systems built from the ground up which serve mainly to prove just how difficult it is to create an entire functioning OS without a large number of brains working on it.
Everything here can be tested reasonably within a virtual machine, so if something grabs your interest don't hesitate to download and give it a try.
(Image credit: Arca Noae)
1. ArcaOS
The last of the OS/2 projects
Continued development
Multilingual support coming
For older PCs
ArcaOS is an operating system based on the last IBM release for OS/2. While OS/2 barely survives as a legacy system, even after being extended for a while as eComStation, ArcaOS is still being actively developed with Spanish and German language editions expected to be released in the next update.
ArcaOS includes a robust Unix compatibility subsystem, featuring a variety of ported OSS Linux apps and some drivers, but still features the OS/2 Workplace Shell.
ArcaOS is a 32-bit OS that runs on the x86 processor architecture, so should be compatible with some particularly old PCs. Though it's native file system is JFS, it can still work with FAT12, FAT16, or FAT32 formating.
There are two editions available: Personal, which retails for $129 per license, and Commercial, which retails at $229 per license though volume discounts are available. The personal edition includes 6-months support and maintenance, while the commercial edition includes one-year of priority support and maintenance.
(Image credit: Future)
(Image credit: Haiku)
2. Haiku
The modular successor to BeOS
Successor to BeOS
Modular design
Slow release schedule
We're a bit sad that BeOS didn't take off. A stylish multitasking OS that introduced a whole host of features that Windows, Linux and macOS would later adopt for their own, BeOS was a true multimedia innovator that left the market with a whimper when its rights were sold to Palm in 2001.
Despite being closed source, the spirit of BeOS lives on in the form of Haiku, an open source re-implementation which began development immediately after Be's demise, and it has been developed since.
Built as open source software from the ground up but designed to be backward-compatible with its classic quarry, Haiku follows BeOS' lead in its entirely modular design, allowing different components of the OS to be developed concurrently. It last saw a major release over three years ago, but you can try nightly builds to test out current developments.
It's worth playing with just for the cleanness of its desktop, and there are working web browsers and media players, although it's still rather experimental and many of the features of BeOS haven't quite been fully realized as yet.
(Image credit: Future)
(Image credit: ReactOS)
3. ReactOS
An alternative to Windows Server 2003
Designed to work with Windows server
No MS code
Runs open source software
Slow development time
Linux, as you may know, is a ground-up reinterpretation of UNIX. ReactOS does the same for the Windows NT architecture upon which all modern Windows versions are based. It's completely open source, using no proprietary Windows code, yet ReactOS is designed to be (and in some cases actually is) compatible with Windows drivers and applications.
Your mileage may vary – it's certainly not going to play nice with high-end games or software, and ReactOS isn't quite up to the Windows 10 level yet. It's currently aiming at full compatibility with Windows Server 2003.
So it's clearly a bit behind the times, but ReactOS does have its uses. Incorporating parts of noted Windows emulator Wine, it runs LibreOffice, Firefox, Opera and more quite happily, and can even manage (earlier) commercial applications like Adobe Photoshop.
Given that it's free, it's certainly worth a test to see if any of your older business-critical applications are compatible – setting up workstations without Windows licensing is a tempting prospect, although we can't vouch for its resistance to attacks.
(Image credit: Future)
(Image credit: FreeDOS)
4. FreeDOS
An open-source alternative to DOS
Open source DOS
Active development
Stable environment
No GUI or multitasking
A ridiculous amount of business software relies on MS-DOS, even to this day. We're still seeing bespoke, newly-developed text-mode apps that run directly from the shell, probably because the complexity and potential for disaster that graphical interfaces add to the mix is not worth the risk in situations that demand 100% uptime.
That business-critical software may rely on MS-DOS, but it doesn't have to know you're actually running FreeDOS. It's an entirely compatible but completely free and open source remake of DOS that can handle just about everything its predecessor can do. That does, of course, mean no multitasking, no protected mode, no GUI, but it'll run your games and can even manage Windows 3.1 as long as you're running it in standard mode.
As you might expect, it's not a static recreation of the final commercial DOS release in 1995, and indeed hasn't been static since FreeDOS first emerged in 1998. In fact, FreeDOS remains in active development, and features a number of integrated improvements compared to its rather archaic ancestor.
(Image credit: Future)
(Image credit: Future)
5. Chrome OS
The browser-based OS expansion
Open source option
Lots of functionality
Limited production use
We're cheating a little, here, seeing as Chrome OS is built upon the Linux kernel, but it would be a shame to ignore Google's operating system on a technicality. Besides, when using Chrome OS you essentially run an expanded version of the Chrome browser and nothing else. Yes, you can drop to a terminal if you know how, but the desktop itself is a pure feat of HTML5 wrangling.
It's testament to the maturity of the web that there's not a huge amount you can't do with Chrome OS, at least as long as you know where to look online. And it's not an OS that's exclusive to Chromebooks, either – you can build a version of Chromium OS (the open source development from which Google gleans its final code) on top of Ubuntu 14.4 then install it on your own hardware.
One of the more professionally assembled operating systems on this list, Chrome OS is good for an experiment, and a solid choice if you're handing a laptop to someone who's likely to break any other OS. But perhaps it's a bit limited for production use.
(Image credit: Future)
(Image credit: FreeBSD)
6. FreeBSD
The secure UNIX alternative
Stable and reliable
Free and open source
Basis for macOS
No GUI by default
While Linux is a recreation of UNIX, FreeBSD is more of a continuation. It was initially developed by students working from a Research Unix source license obtained by the University of California Berkeley – the 'BSD' bit stands for Berkeley Software Distribution. The only reason it's not called BSD Unix is that pesky trademark and licensing gremlin.
The OS runs on its own kernel, and all of its key components have been developed as part of a single whole. Linux, on the other hand, is just the kernel; the rest of it is supplied by third parties so it lacks BSD's overall coherency.
This is a highly complete and very reliable operating system, perfect both for server applications and desktop use. That said, it doesn't come with a GUI by default – the X-window system is thankfully straightforward to install, and there are ports of Linux window managers like Gnome and KDE available.
One final note: BSD forms the core of perhaps the most polished and stable desktop operating system out there in macOS, so you know you're in good hands here.
(Image credit: Future)
(Image credit: IBM)
7. Solaris
The successor to SunOS
Free to download
Long development
Requires commercial license
Sun Microsystems' SunOS – which evolved into the rechristened Solaris – began as a proprietary UNIX distribution designed to support Sun's SPARC processors. Its hardware reach widened as it grew, and in 2005 Sun released the source code in the form of OpenSolaris, leading to advanced community development. And then Oracle purchased Sun, renamed the OS once more to Oracle Solaris, and decided to cease source releases, effectively closing the source once again.
That's a long story made much shorter, but it's a good explanation of exactly what Solaris offers: long development, a period of community improvement, and the backing of a large tech company that makes it perfect for systems with high demand and support requirements. You can download and use it for free, although the license terms state that you'll need a support contract from Oracle if you wish to use it commercially.
Solaris installs with a version of the GNOME desktop by default, and there's built-in support for Linux binaries if you need to extend it further.
(Image credit: Future)
(Image credit: TempleOS)
8. TempleOS
A unique and fast if limited OS
Unique hyperlink structure
Super quick
Limited hardware support
Whether the extreme religious doctrine behind it interests you or not, our final selection is an interesting example of a completely independent, unique OS. It's been made and maintained with extreme dedication by one man, Terry A. Davis, over the course of ten years.
TempleOS – programmed entirely using Davis' own language, the excellently named HolyC, which you also use to interact with its shell – deliberately includes no networking and absolutely no hardware support beyond that which forms the core PC system. So what's the point?
TempleOS has been built from the ground up with what seems like no hang-ups on existing operating systems. The entire thing is hyperlinked, meaning you can quickly burrow down to the source of a program just as easily as you can find its dependencies, and it's super-quick; there's no paging, so the whole OS gets up and running within a second or two.
It's unlikely you'll be able to use TempleOS for anything solid, and Davis' well-documented mental health struggles haven't helped its standing in the community. But it includes a huge number of interesting ideas, particularly the blurring of the division between document and program, which could impact more traditional operating systems. Check out Davis' quick tour of the OS below to see what it's all about in more detail.
Gone but not forgotten: other Operating Systems
It's worth noting that there have been a number of other operating systems that were previously popular but have since been discountinued. One of the most famous of which is AmigaOS, used in Amiga personal computers during the 1990's and which had a reputation for solid stability.
However, here are a couple more than you may or may not have come across before now.
9. eComStation
OS/2 may not have set the world on fire, but it actually maintained a decent industrial and commercial install base long after its desktop aspirations died. eComStation was a derivative OS that uses classic OS/2 technologies on modern hardware.
Much like its ancestor it's been developed with security and stability in mind for commercial applications. We see the claim 'zero downtime' repeated all over the place, and while it's theoretically possible to lock up your hardware with the wrong application, this is something that could have been a real killer feature.
There's a host of open source software ported to eComStation including Firefox, OpenOffice, VLC and more, and it's capable of running DOS, Java and OS/2 applications. You almost certainly don't need it, but if there's something system-critical and OS/2-only that your business relies on, running this on bare metal is a much more reliable idea than setting up a VM.
As eComStation hasn't been updated for some years, if you're looking for OS/2 support and development it might be best to look at ArcaOS in the above list.
10. Syllable Desktop
Developed between 1994 and 2001, AtheOS – initially planned as a clone of AmigaOS but later following its own path – was the work of a lone Norwegian programmer, Kurt Skauen. After Skauen abandoned the project, its GPL-licensed source code was picked up by the community and Syllable Desktop was born.
The majority of it is composed of unique code, although certain components have been pulled from the vast library of open source Linux programs; there's also a Server version, which is more traditionally Linux.
Syllable's key selling point – ignoring the fact that it's free – is its speed and lightness. The creators recommend a Pentium CPU with 32MB of RAM, which should give you an idea of how lightweight it is. Slap this on a modern PC and you'll likely never have seen an OS so quick.
Syllable does lack the ports that make other indie operating systems attractive, though it contains a number of native apps for web browsing, email, VNC and more. We're not entirely positive that it's still active – the last official update was some time in 2012 – but if there's a very, very old PC you need to resurrect with reasonably modern system architecture, try this.
11. SkyOS
The development of SkyOS has sadly been halted, but it's still worth looking at as an example of an OS constructed from scratch. Developed initially as an open source project by coder Robert Szeleney, SkyOS was based on concepts gleaned from other platforms but didn't originally borrow their code.
That said, a few components are based on other packages – there's no sense, for example, developing an entirely new compiler when GCC already exists, and the SkyFS filesystem is forked from OpenBFS. Later in its life, Szeleney appears to have experimented with a version of SkyOS built on top of a Linux kernel in an attempt to help with driver compatibility.
The source was closed midway through its life, and Szeleney continued development based on feedback from a popular (paid) public beta program. Unfortunately the struggle to keep up with ever-diversifying computing standards became too much for the lone coder, and development was halted in 2009, with the most recent beta made publicly available in 2013.
It's obviously incomplete, and not suitable for any kind of business environment, but as a curio to run within a VM it's very interesting. |
global_01_local_0_shard_00002368_processed.jsonl/55945 | X-Plane for Mac 10.22
4.9 MB
4.2 11 votes
Welcome to the world of props, jets, single* and multi-engine airplanes, as well as gliders, helicopters and VTOLs such as the V-22 Osprey and AV8-B Harrier.
X-Plane comes with subsonic and supersonic flight dynamics, sporting aircraft from the Bell 206 Jet-Ranger helicopter and Cessna 172 light plane to the supersonic Concorde and Mach-3 XB-70 Valkyrie. X-Plane comes with about 40 aircraft spanning the aviation industry (and history), and several hundred more are freely downloadable from the internet.
X-Plane scenery is world-wide, with scenery for the entire planet Earth AND MARS! (thanks to the Mars Orbiting Laser Altimeter, which mapped that planet's elevation) You can land at any of over 18,000 airports, as well as test your mettle on aircraft carriers, helipads on building tops, frigates that pitch and roll in the waves, and oil rigs.
X-Plane also has detailed failure-modeling, with 35 systems that can be failed manually or randomly, when you least expect it! You can fail instruments, engines, flight controls, and landing gear at any moment.
While X-Plane is the world's most COMPREHENSIVE flight sim, your purchase also comes with Plane-Maker (to create your own airplanes) World-Maker (to create your own scenery), and Weather Briefer (to get a weather briefing before the flight if you use real weather conditions downloaded from the net).
X-Plane's accuracy (in flight model), scope (in aircraft and terrain coverage), versatility (in aircraft type and weather conditions), add-on programs (in aircraft and scenery editors), user-customizability, downloadable aircraft, and downloadable scenery makes it the ULTIMATE flight simulation experience for Macintosh AND Windows platforms.
X-Plane's flight model can handle flying wings and fly-by-wire systems, as needed for a B-2 simulation.
What's New:
• Sim gamma defaults to 2.2 for OS X 10.6
• DVD will be found on newer Linux distros
• QuickTime Record won't fail for long aircraft names
• QuickTime Record won't hang on exit for huge screen res
• New December apt.dat data
• New Datarefs
• Hang on start with NVidia hardware on Windows fixed
• Macintosh CPU PowerMac G4 or G5 1ghz+ or Intel
• RAM 512 meg
• Disk Space 10 gig
• DVD
• 3-D CARD OpenGL
• VRAM 16 meg
• Monitor 1024x768+
• Joystick/Yoke USB. |
global_01_local_0_shard_00002368_processed.jsonl/55986 | Trust In Your Third Eye
Trust is an inner eye. Just as the two outer eyes are for seeing the universe, there is a third eye inside of you whose name is trust. With this eye of trust the divine is seen. The eye of trust means the eye of love. There are some things which only love can know. There is no other way to know them.
If you love someone you will see certain things in the person that no one else will see. You will see in that person a sweetness that no one else can see. That sweetness is delicate and the touch of love is needed for it, only then is it revealed. You will hear the echo of a song in that person that no one else will hear. To hear it one has to come closer than anyone else has come. Only you are that close.
This is why beauty begins to manifest in the person whom you love. The one you fall in love with begins to be beautiful – all of life’s grandeur, all of its dignity is revealed in the person. And it is not that you are imagining it.
As soon as the eye of love opens the invisible begins to be visible to you, the unperceivable begins to be perceivable. The presence of what is hidden begins to be experienced.
"Finding upon waking the doors yet bolted, Who knows by which door he enters and leaves.”
This is a very lovely couplet from Bihari. The beloved is sleeping with all the doors and windows of the room bolted, yet in her dreams her lover visits her. Later she wakes up and sees that the doors are still closed with the bolts in place, just as they were. Who knows how he enters and by which route he leaves?
“Which way do you enter, which way do you depart? From which window do you peep?” This window is called trust.
Someone living in logic will never know anything deeper than the material; his life will be meaningless. He may well collect money, but all his wealth will be left lying there when he dies and he will have missed meditation. And it is only meditation that will accompany you in death. Such a person will not attain the ultimate wealth. Only the one who has the eye of trust within attains the ultimate wealth.
Trust is the culmination of love. Trust is the faith that what has not already happened so far will happen. Trust also arises from what has already happened: there is such beauty in this universe, there is such light, such music…the throat of each bird is filled with song… There is beauty in each leaf, light in each star; this universe is so full of magnificence, there must be some energy or other behind it.
Trust means trusting that there must be some energy creating all this colour. Trust means trusting that where so much beauty is being showered, the source of such beauty must also exist. Trust means accepting the existence of the source from which you receive these subtle, delicate indications.
Excerpt from Die O Yogi Die. Courtesy: Osho International Foundation,
Post a Comment |
global_01_local_0_shard_00002368_processed.jsonl/56015 | Section Navigation (click to expand)
Scroll to current section
Scroll to current section
All Kindreds Wail!
A day of weeping & wailing so universal, it is comparable to the miseries of those in hellfire; and, yet, being upon earth, there’s hope for the trembling mourners.
My reader, it behooves us (as readers of prophecy) to approach this climactic occasion of futurity from afar; that, in our approach, we would proceed cautiously! For, the hurried reader will look and see nothing of what prophecy unveils. Boastful readers will gloat as having beheld the future and yet… they’ve seen nothing! For, had they seen it, and truly beheld the tearful occasion, they themselves would be weeping tears of astonishment and wonder. Yet, at having read of it, and not truly seen it, they abide tearless at the testimony of worldwide weeping and wailing! Therefore, I plead, let us look upon the scenery of futurity and approach cautiously. Lest the enormity of these events go unrealized, let us consider them prayerfully.
then shall all the tribes of the earth mourn” – Matt. 24:30
all the kindreds of the earth shall wail because of Him” – Rev. 1:7
A fluid reading of Jeremiah 50-51 applied in its superior and ultimate fulfillment of the future illustrates the final moments that lead up to Day 1,290 and the aftermath thereof, the day that marks the full overthrow of the Empire of Babylon which, in turn, means the liberation of the Jews. If the totality of this conclusive victory could be summed up in but a few words, or if one observation were to be uttered in a single breath, a frightened observer would remark: “all the kindreds of the earth do wail because of Him” (Rev. 1:7, Matt. 24:30)! Literally, every single family of the earth will be weeping and wailing in this remarkable moment of victory! My reader, that includes the family of the Jews – both, in Jerusalem (Zech. 12:10-14), and in the uttermost parts of the world (Zech. 14:1-2; Jer. 50:4-8, 31:8-9, 51:50).
In those days, and in that time, saith the LORD, the children of Israel shall come, they and the children of Judah together, going and WEEPING: they shall GO, and SEEK THE LORD their God. They shall ask the way to Zion with THEIR FACES THITHERWARD, saying, Come, and let us join ourselves to the LORD in a perpetual covenant that shall not be forgotten. My people hath been lost sheep: their shepherds have caused them to go astray, they have turned them away on the mountains: they have gone from mountain to hill, they have forgotten their resting place. All that found them have devoured them: and their adversaries said, We offend not, because they have sinned against the LORD, the habitation of justice, even the LORD, the hope of their fathers. REMOVE OUT of the midst of Babylon, and GO FORTH out of the land of the Chaldeans, and be as the he goats before the flocks.” – Jer. 50:4-8
“…a great company shall RETURN thither. They shall COME with WEEPING, and with SUPPLICATIONS will I lead them: I will cause them to walk by the rivers of waters in a straight way, wherein they shall not stumble: for I am a father to Israel, and Ephraim is my firstborn.” – Jer. 31:8-9
“Ye that have escaped the sword, GO AWAY, STAND NOT STILL: remember the LORD afar off, and let Jerusalem come into your mind.” – Jer. 51:50
When the Lord of Glory roared upon His enemies in the initial descent upon Jerusalem, and then tread the Winepress, the desired affect was accomplished. Who, among all the Jewish inhabitants of Jerusalem, could abide tearless while seeing and hearing such things! Even so, also, when the swords of the Armies of Heaven were unsheathed and bathed in blood, the desired affect was accomplished. Namely, because the Jewish Captives of Babylon scattered throughout the world, also called “Prisoners of Hope” (Zech. 9:12), are turning their tear-stained faces toward Jerusalem! The Gentile survivors of the war, also, weeping and wailing as they go, “shall turn every one to his people, and they shall flee every one to his own land” (Jer. 50:16)! Babylon is abased. Babylon is abandoned. Babylon is fallen! Yea, and in the aftermath of the war when the noise of the worldwide battle is quieted, a steady roar of weeping and crying can be heard from coast to coast in every continent of the earth!
And there shall be a great cry throughout all the land of Egypt, such as there was none like it, nor shall be like it any more.” – Ex. 11:6
And the men that died not were smitten with the emerods: and the cry of the city went up to heaven.” – 1 Sam. 5:12
Egypt cried. Philistia cried. Even so, every nation of Babylon’s World will cry! When Egypt cried, the Egyptians yielded to the demands of Jehovah and hastened to relinquish the Jews to their God! When Philistia cried, and the sound thereof went up to heaven, they came to the frightening realization that the God of Israel, who was sojourning among them via the Ark, was putting His heavy hand upon them. Yea, but Babylon’s World will realize much, much more!
An invasion, being fearful enough, flattens the pride of towering mountains (Isa. 40:4-5)! A weight, being heavy enough, collapses the stoutest bodies to the floor! Thus, to no surprise, God bows the unbending knees of Babylon. The Empire imploded for fear in looking upon Christ & the Horse-Riding Armies of Heaven (“…a certain fearful looking for of judgment and fiery indignation, which shall devour the adversaries.” – Heb. 10:27)! The Lord, whose voice roared the universe into trembling and scattered adversarial hosts at the Winepress, did verbally direct the Armies of Heaven in their courses throughout the ongoing war around the globe until all faces were reduced to tears (Jer. 50:21, Rev. 19:11-16).
As each remaining City, State, Nation, and Kingdom were invaded and conquered, the sound of the battle could be heard worldwide insomuch that the Babylonian Empire suffered a great destruction unlike any other since the world began (Jer. 50:22-23); moreover, when every blood-bathed sword was put to rest in the scabbard (Jer. 47:6), or any undeserving soul was overpassed in the judgment, every surviving individual of Babylon’s World was still in the throes of distress! Yea, when the angry countenances of the Armies of Heaven were eased in the judgment (Prov. 29:27, Zech. 6:8) and meanwhile delighted in the sound of the world in dismay (Rev. 16:5-7, 19:1-6, Ps. 137:9, 149:6-8, Prov. 21:15), their eyes will widen in happy anticipation of what comes next! Yea, while the corrupt masses of earth do erupt into “weeping and wailing”, the righteous minorities of every age do “rejoice” over Babylon (Rev. 18:9-24)! Why? For, so great a mighty and utter destruction will befall Babylon, it is nothing short of the LORD opening His armory to wield the weapons of His indignation (Jer. 50:25-27), while all surviving peoples of mankind will be pained to realize that it’s all for a mighty and glorious restoration of the Jewish People in a resurrected Jerusalem!
A sound of battle is in the land, and of great destructionHow is the hammer of the whole earth cut asunder and broken! how is Babylon become a desolation among the nations!” – Jer. 50:22-23
Thus saith the LORD of hosts; The children of Israel and the children of Judah were oppressed together: and all that took them captives held them fast; they refused to let them go. Their Redeemer is strong; the LORD of hosts is his name: He shall throughly plead their cause, that He may give rest to the land, and disquiet the inhabitants of Babylon.” – Jer. 50:33-34
In other words, these acts of war will be on behalf of the Jews because their Captors will refuse to let them go (Jer. 50:33). Thus, the disquieting of Babylon by war will grant rest to the Jews (Jer. 50:34). Through the onslaught of the sword upon man and beast, bulwark and battlement, every Babylonian man will scream and cry like a woman (Jer. 50:35-37)! The polluted waters of this Empire will be dried up (Jer. 50:38, 51:36, Rev. 16:12) so that a cleansing fountain might flow from Jerusalem (Ezek. 47:1-12, Zech. 13:1).
How is Sheshach taken! And how is the praise of the whole earth surprised! How is Babylon become an astonishment among the nations!” – Jer. 51:41
“…their voice shall roar like the sea, and they shall ride upon horses, every one put in array, like a man to the battle, against thee, O daughter of Babylon. The King of Babylon hath heard the report of them, and his hands waxed feeble: anguish took hold of him, and pangs as of a woman in travail.” – Jer. 50:42-43
Rejoice over her thou Heaven, and ye holy apostles and prophets; for God hath avenged you on her.” – Rev. 18:20
The redeemed of every age and from every nation, tribe, and tongue – being resurrected as Israelite Kings (Jer. 51:19-24, Rev. 19:11-16) – will roar like the sea and show no mercy in the Battle (Jer. 50:42-43)! So dreadful a Horse-Riding Army this shall be that the Antichrist, who fortified himself at Jerusalem before it fell, waxed feeble and was thrown into anguish as a woman in travail just at the report of the Armies of Heaven & their Commander (Jer. 50:43)! Lo and behold, the lion who terrorized the whole earth will be put in fear and made to wish for an opportunity to flee just like all the others (Jer. 50:44)! Amazingly, even the least of the Armies of Heaven will dismay Babylon as each coast and borderland is visited, and hereby the earth will be moved insomuch that a cry will be heard among the nations (Jer. 50:45-46)!
“And when they arose early on the morrow morning, behold, Dagon was fallen upon his face to the ground before the Ark of the LORD; and the head of Dagon and both the palms of his hands were cut off upon the threshold; only the stump of Dagon was left to him.” – 1 Sam. 5:4
“…And when the men of Ashdod saw that it was so, they said, The Ark of the God of Israel shall not abide with us: for His hand is sore upon us, and upon Dagon our god.” – 1 Sam. 5:7
Therefore hear ye the counsel of the LORD, that He hath taken against Babylon; and His purposes, that He hath purposed against the land of the Chaldeans: Surely the least of the flock shall draw them out: surely He shall make their habitation desolate with them. At the noise of the taking of Babylon the earth is moved, and the cry is heard among the nations.” – Jer. 50:45-46
Let the reader understand and remember well how the Babylonians refused to weep and wail (the Gathering; Rev. 16:12-16, 17:14, 19:19), just as the Egyptians did in the old time. The Babylonians assayed to steal the Throne of God, usurping Jerusalem, just as the Philistines stole the Ark of old. Yet, in a little while… after dreamlike woes do befall them in the 2nd Advent War (Isa. 29:5-8)! …and, after they behold the sights and sounds of a swift annihilation on every side! – Lo, they would cherish the opportunity to relinquish what belongs to God! Or, they would hope for the opportunity to simply depart from His borders! Or, they would wish to be even as Philistia of old, who sent the Ark back to the Land of Israel (1 Sam. 5:4-7)! Or, they would wish to be as Egypt of old when they relinquished possession of the Jews in Goshen! In history, God was appeased in the giving back of what the LORD was claiming as His own. Yet, in futurity, the LORD isn’t passing through like before. In futurity, the LORD is coming to claim all.
“We give Thee thanks, O Lord God Almighty, …because Thou hast taken to Thee Thy great power, and hast reigned” – Rev. 11:17
“Who shall not fear Thee, O Lord, and glorify Thy Name? for Thou only art holy: for all nations shall come and worship before Thee; for Thy judgments are made manifest.” – Rev. 15:4
Like with Dagon (1 Sam. 5:4-5), that which was built-up for the Antichrist (“the Seat of the Beast” – Rev. 16:10) has been broken down by Christ. Now, the lofty stones of shattered buildings lay prostrate in humble adoration (Matt. 24:2, Lk. 19:40, 44). The smoke of Jerusalem’s burning was seen from afar as astonished escapees hurried to the Mountains and Rocks in hopes to evade the torment of this dreadful Invader that descended from Heaven (Rev. 6:15-17, 18:9-10)! And, if this was the aftermath of the first battle at the start of the 2nd Advent War, what is to be expected at the end of the War except that all the kindreds of the earth shall wail because of Him (Rev. 1:7, Matt. 24:30)!
Even so, just as Egypt hastened to undo their enslavement of the Jews and make right the wrongs done to them for fear of the LORD (Ex. 3:21-22, 12:35-36, Ps. 105:37), even so shall the surviving Babylonians hasten to do the Jews good and not evil all the days of their life. For, as Dagon was chopped down and prostrated of old (just as the Image of the Beast is demolished), even so shall the loyal beast-worshippers of Babylon prostrate themselves and wish for an end of the violence. This response is simply irresistible! For example, take another look at Egypt; this time, look upon her as she will be made to react in the events of futurity amidst the 2nd Advent War.
“…Behold, the LORD rideth upon a swift cloud, and shall come into Egypt: and the idols of Egypt shall be moved at His presence, and the heart of Egypt shall melt in the midst of it.” – Isa. 19:1
Even so, my reader, the heart of Babylon’s World will melt with terror and flow in tears (Jer. 51:17-24)! The people’s mouths will be filled with earnest entreaties of peace before the ongoing Armies of Heaven! Ah, but the LORD will be unmerciful towards all men who refuse to answer the Call! Thus, upon fleeing, the Babylonians will be chased, captured, and killed! …their families will be slain without pity (Jer. 51:3-5, Ps. 137:8-9, Isa. 49:25-26)!
Against him that bendeth let the archer bend his bow, and against him that lifteth himself up in his brigandine: and spare ye not her young men; destroy ye utterly all her host. Thus the slain shall fall in the land of the Chaldeans, and they that are thrust through in her streets. For Israel hath not been forsaken, nor Judah of his God, of the LORD of hosts; though their land was filled with sin against the Holy One of Israel.” – Jer. 51:3-5
The vast Empire of Babylon, which contained all the peoples of the earth, will be radically reduced in number. I repeat, only those who answer the Call will remain alive by the end of the 2nd Advent War. However, as you may have noticed, there’s more to the Call than “defy Babylon and live!”, or, “Who is on the LORD’s side?”. Now, in looking beyond the events of Day 1,290 (as is the subject of our study henceforth), it is expedient that we understand all that will potentially be communicated in the Call. Yet, proceeding cautiously, let us briefly consider how, or in what way, the LORD will give joy for mourning and to whom. |
global_01_local_0_shard_00002368_processed.jsonl/56027 | Vermont Legislature Withdraws Proposed AWB Bill
Following the lead of New York’s new gun ban, a number of states have introduced similar legislation. Vermont (a constitutional carry state) was one of them, but apparently due to extreme pressure from vocal citizens, their legislature has pulled the bill from consideration. For now . . .
From WCAX:
Less than a week after proposing a gun control bill that would have banned assault weapons and high-capacity magazines statewide, Vermont’s Senate majority leader says he now plans to withdraw the bill.
Sen. Philip Baruth, D-Chittenden County, says there’s not enough support among his colleagues for the bill and there’s mounting opposition from outside the Statehouse.
Especially moving were the Senator’s words on the matter.
But it is painfully clear to me now that little support exists in the Vermont Statehouse for this sort of bill. It’s equally clear that focusing the debate on the banning of a certain class of weapons may already be overshadowing measures with greater consensus, like tightening background checks, stopping the exchange of guns for drugs, and closing gun show loopholes. Finally, as incoming Majority Leader, I owe it to my caucus to remove an issue that seems increasingly likely to complicate our shared agenda this biennium.
Huh. Looks like a grassroots movement to make the voices of the millions of legal gun owners heard can work. Occasionally.
1. avatar BlinkyPete says:
Thank focking god. It’s a little kept secret that Vermont is one of the freest gun states there is (the one state that has never had a CC license), I’m glad they kept it that way.
1. avatar Devin says:
Alaska doesn’t require a CC license either. Up here, you expect people to be carrying.
1. avatar blinkypete says:
I don’t recall the history, but you do or did at one time offer a CC. I believe it may be that it was optional for reciprocity.
2. avatar Zac says:
I hope it does. It’s the only thing keeping me in VT
2. avatar AlphaGeek says:
My keenest wish for 2013 is that whatever has infected the VT legislature is massively contagious and rapidly propagates through the US.
Not gonna happen, I know, but I can dream…
1. avatar bontai Joe says:
I’m dreaming with ya!
2. avatar JB says:
Stop dreaming. This as yet unclassified contagion spreads through phone lines and e-mails. Flu shots be damned.
3. avatar In Memphis says:
Congradulations Vermont!
Awesome use of a movie quote. I saw Independance Day close to 15 times in the theater.
4. avatar Lance says:
Love your video RF. Hope they die from Maine to Oregon. Good to get good news!
5. avatar Aharon says:
“violence that is clearly spreading”
— I’m not sure he has a grasp of the details about mass shootings, gun free zones, and the overall declining violent crime rate.
My favorite gun in the photo above is the one on the far right.
1. avatar Steve in MA says:
1. avatar Aharon says:
What do I know? I thought it was the Garand.
2. avatar AlphaGeek says:
“Violence that is clearly spreading”
Yeah, outside the poor areas where it’s minorities shooting other minorities. Much bigger deal when it’s white people getting shot in predominantly white areas.
(For the avoidance of doubt, I am a white guy, so I have good standing to offer this observation.)
6. avatar Outlaw says:
“To the many responsible gun-owners with whom I’ve communicated over the last several weeks: I’ve heard you. Please hear me when I say that government is not your enemy – we are all alike threatened by the kind of violence we saw in Newtown, violence that is clearly spreading.
Lie lie lie lie lie.
1. avatar AlphaGeek says:
Some folks in government actually believe this, and work harf towards that end. I know that doesn’t fit the anti-gov orthodoxy of many ’round these parts, but there are good folks in government.
Just not nearly enough of them…
1. avatar BlinkyPete says:
I agree with you. I really wish there were more examples.
1. avatar Ralph says:
I wish there was one example.
2. avatar Outlaw says:
When his statement is filled with two blatant lies I don’t care if he has good intentions. He’s a damned liar.
1. This violence isn’t becoming more commonplace.
2. We’re not all threatened by that kind of violence.
I’ll also add a third:
3. He’s part of the government and wanted to restrict your rights, then claims the government is not your enemy. Put enough of people like him in power and it certainly will be. See: New York.
7. avatar Matt in FL says:
There’s a flip side to this argument. Vermont, as Blinky said “one of the freest states in the nation,” barely escaped being swept up into stupidity in this latest wave. The lesson is, if it can be that close in “one of the freest states in the nation,” that is a demonstration of how tough a fight it needs to be everywhere else.
1. avatar BlinkyPete says:
I guess there should have been an asterisk there, in that Vermont, or likely any of the three Northern New England states, while gun friendly, are probably more susceptible to buying into gun related hysteria than say, Texas, Kentucky, or Wyoming.
That said, excellent point. We need to be vigilant on all fronts here.
2. avatar Ralph says:
Vermont isn’t a free state. It’s a Blue State. End of discussion.
1. avatar Not Anon in Ct For Long says:
Well it was, but then there was a passive-aggressive takeover by Massholes and NYers. Same thing in New Hampshire, except only Massholes.
2. avatar blinkypete says:
Ralph – What an obtuse and ignorant point of view.
Anon – Vermont’s native politics are complicated. The range from ultra liberal to ultra conservative, and the only real outside influence comes from the college towns. Beyond that the influx has been fairly minimal. New Hampshire, on the other hand, has always been fairly moderate, leaning on the conservative side. You’re right, though, that “mass holes” have been moving there, but it ain’t the liberals. Look at any political heat map and you’ll find the native north is blue, and the immigrant south is red.
1. avatar bdk NH says:
Blinky +1
As a current NH resident and former Masshole who is a socially moderate and fiscally conservative Liberterian registered independent voter, I am continually mystified by NH’s blue voting death spiral. I don’t understand why any of my neighbors vote for Obama. If NH keeps voting like is, we will vote The Live Free or Die state into extinction as a place where there is no sales tax, no income tax, and where individual rights are not only valued but are protected vigorously.
8. avatar Joke & Dagger says:
Don’t celebrate too much. They are just retrenching. He still wants to close the “gun show loophole”, whatever that is. Meaning no private sales without an FFL and the likely associated recording of who owns what.
1. avatar Pascal says:
It would not need an FFL however the proper forms would be required. We have never had a so call mis-named “gun show loophole” in CT. It is a ban of private sale of weapons without documentation.
In CT we fill out the paperwork and call the central state name for a sales authorization #. You put the number on the paper work and your done. It takes all of 15min and is free.
1. avatar mountocean says:
Very interested in that. How much information goes on the form? I assume it’s tied to a statewide registry of all firearm ownership, or at least as close as they can get.
1. avatar Not Anon in Ct For Long says:
Pretty much. I’ve never bought a used firearm, but everything bought new is definitely recorded at state and local level. Happily our local cops are pretty good guys, and actually went out of their way to help us with our pistol permit application. And I’ve got a great, and inexpensive, local FFL guy.
2. avatar Mike in NC says:
The only “gun show loophole” that was specific to guns shows I can even vaguely remember had to do with waiving the initial Brady waiting period for handguns at gun shows. This loophole closed with the start of NICS.
9. avatar LSUTigersFan says:
New Yorkers, isn’t Vermont right next door? It doesn’t look like you guys have many places close to which you guys could move.
1. avatar Dr. Mike says:
It is right next door! Moving there would only add twenty minutes to my daily commute. Problem Solved.
10. avatar Aharon says:
If they passed the ban I was going to stop buying Vermont Maple Syrup. My pancakes and sausage will continue to be happy.
11. avatar Sixpack70 says:
Don’t stop writing. Don’t stop the phone calls. A retreat is performed to trade land for time. That is exactly what the confiscation crew is attempting. Keep sending them the facts about the 50% reduction in crime. The amidst the noise video might be good to send to this guy.
12. avatar DrVino says:
“…violence that is clearly spreading.”
13. avatar Ralph says:
I can’t believe that a Democrat proposed a gun ban in the first place. I mean, they never do that. Ever.
14. avatar pk in AZ says:
Gun hating and American hating trolls are awfully quiet…
1. avatar AJ says:
mikeynumbers is probably sobbing in a corner.
15. avatar Bob says:
-chuckle- A mosin is in the photo!
1. avatar Matt in FL says:
I’m pretty sure those are mostly, if not all, Nick’s. I know 5 of them are, for sure.
16. avatar Dustin says:
What happened to the New York proposed legislation story? It was there and then the link didn’t work, and then it was gone.
17. avatar Johnny says:
Now Vermont just has to allow suppressors and full autos and I’d probably move there.
1. avatar blinkypete says:
I’m stunned to find that silencers are indeed technically illegal there, but it’s only a $25 fine. That still means you couldn’t register it, which is a no-no.
Machine guns are all good… as long as they’re registered with the ATF you’re good.
18. avatar pat says:
Ha ha. You can see the sadness (and fear about losing seats) in these liberals. May the tide turn more quickly on the great gun grabbing scheme of late 2012-2013.
19. avatar Alan says:
I was really proud of my state and the responses that were sent in saying we do not want this. Glad they listened. Proud to be a Vermonter.
20. avatar Cold Frog says:
As a proud VTer, I am always heartened to hear that Vermont still leads the way in most areas. Unfortunately, I live in Washington. Vermont legislature-Keep listening to your bosses (Vermonters).
Leave a Reply to Bob Cancel reply
button to share on facebook
button to tweet
button to share via email |
global_01_local_0_shard_00002368_processed.jsonl/56045 | Dublin Climate Change
View All Projects
As well as developing a website and video materials for Codema we also designed and developed the website for their Climate Change Action Plan Initiative. Even though the site is content heavy, users can quickly glide and digest panels of information and easily navigate through sections. Visit Dublin Climate Change
Group 33Created with Sketch.
GroupCreated with Sketch.
You have a vision. We can get you there |
global_01_local_0_shard_00002368_processed.jsonl/56046 | A slutty student fucks with old teachers in their cabinet
A slutty student decided to pass an exam with her body. She touched a cock of an old teacher through his pants, sat on a chair and spread her legs. A mature man understood the hint and made the cutie a cunnilingus. While the lady was making him a blowjob, another professor joined them. The girl willingly served two lovers with her mouth and pussy.
27 Aug 2018
4 892
(Be the first one to comment!)
Post Comment: |
global_01_local_0_shard_00002368_processed.jsonl/56066 | Other cities, towns, and suburbs near Quilengues, Angola:
Caluquembe, Angola
Quipungo, Angola
Bibala, Angola
Lubango, Angola
Caconda, Angola
Caimbambo, Angola
Cubal, Angola
Matala, Angola
Humpata, Angola
Chibia, Angola
Ganda, Angola
Folgares, Angola
Folgares, ang
Dombe Grande, Angola
Tchindjenje, Angola
The center of each city listed is within 167 km of Quilengues, Angola.
Powered by MediaAlpha
Map of local cities around Quilengues, Angola
Click here to show map
Major cities near Quilengues, Angola
This is a list of large cities closest to Quilengues, Angola. A big city usually has a population of at least 200,000 and you can often fly into a major airport. If you need to book a flight, search for the nearest airport to Quilengues, Angola. You can also look for cities 100 miles from Quilengues, Angola (or 50 miles or 30 miles).
More trip calculations
vacation deals to Quilengues, Angola
Quilengues, Angola
City: Quilengues
Region: Huíla
Country: Angola
Category: cities
find the closest cities
Search for cities near:
Nearest cities
|
global_01_local_0_shard_00002368_processed.jsonl/56072 | Why you should never buy shrimp from China
CC BY 2.0 Eirik Solheim
China exports most of the world's seafood, including shrimp, but it has a huge problem with antibiotic overuse that's threatening global safety.
There are a lot of reasons to stop eating shrimp. The production process is environmentally disruptive, destroying natural mangrove swamps to make way for manmade ponds. The industry relies on cruel and illegal slave labor practices, and the trawling methods used to catch shrimp are devastating to countless other marine species. But one of the most disturbing and important reasons to avoid shrimp is that of antibiotic resistance.
Most of the shrimp eaten in the United States comes from abroad, as the little pink shellfish has gone from being a luxury food product to a popular dietary staple. Overseas production is cheaper, often sold below market value, much to the anger of national shrimp farmers and fishermen; nor do overseas producers adhere to rules about aquaculture production that exist in North America.
Take China, for example. It provides 60 percent of the world’s farmed seafood, which means that a significant portion of sea creatures like shrimp and tilapia eaten by Americans likely comes from China. This is problematic because China uses dangerous amounts of powerful antibiotics in aquaculture and land-based agriculture. Unfortunately these two methods overlap, as pigpens are frequently located near to fish ponds and goose ponds. When the livestock pens are hosed down for cleaning, the residual feces and urine is flushed into nearby aquaculture ponds.
In a feature article on this topic, Bloomberg Business News explains why this is dangerous:
“The waste from the pigpens at the Jiangmen farm flowing into the ponds, for example, exposes the fish to almost the same doses of medicine the livestock get—and that’s in addition to the antibiotics added to the water to prevent and treat aquatic disease outbreaks. The fish pond drains into a canal connected to the West River, which eventually empties into the Pearl River estuary, on which sit Guangzhou, Shenzhen, Hong Kong, and Macau. The estuary receives 193 metric tons (213 tons) of antibiotics a year, Chinese scientists estimated in 2013.”
Bloomberg reports that the chemicals used at the Jiangmen farm are among the most powerful antibiotics in the world, including colistin, used as a last resort for humans. Earlier this year scientists announced the discovery of an American infected by a colistin-resistant superbug. It’s only getting worse. Residents of China have some of the highest drug resistance rates in the world, with 42 to 83 percent of healthy people carrying in their bowels “bacteria that produce extended-spectrum beta-lactamases, which create reservoirs of potential pathogens that can destroy penicillin and most of its variants.”
The U.S. Food and Drug Administration knows about the widespread contamination of Chinese shrimp and other seafoods, and in 2006 it tightened the regulations surrounding imports from China; but then it became evident that Chinese suppliers were simply transferring their seafood to Malaysia in order to hide their true origin. Bloomberg writes:
“The FDA alert has virtually halted Malaysian shrimp imports [as of April 2016]. But that doesn’t mean tainted Chinese shrimp aren’t making it into the U.S. Industry and trade experts say many companies transship Chinese shrimp by… creating disposable import companies that can simply fold, or reincorporate under another name, at the first sign of regulatory scrutiny.”
Now it appears that Ecuador is taking Malaysia’s place as an international transshipping hub.
All of this is to say that a package of shrimp on your supermarket shelf, though small, is a key player in the important fight against antibiotic resistance. Food is a crucial vector, and eating those chemicals will bring them into your body, making the battle even harder. It's better just to refuse.
Why you should never buy shrimp from China
Related Content on Treehugger.com |
global_01_local_0_shard_00002368_processed.jsonl/56088 | Statistics - Standard Error ( SE )
The standard deviation of a sampling distribution is called as standard error. In sampling, the three most important characteristics are: accuracy, bias and precision. It can be said that:
• The estimate derived from any one sample is accurate to the extent that it differs from the population parameter. Since the population parameters can only be determined by a sample survey, hence they are generally unknown and the actual difference between the sample estimate and population parameter cannot be measured.
• The estimator is unbiased if the mean of the estimates derived from all the possible samples equals the population parameter.
• Even if the estimator is unbiased an individual sample is most likely going to yield inaccurate estimate and as stated earlier, inaccuracy cannot be measured. However it is possible to measure the precision i.e. the range between which the true value of the population parameter is expected to lie, using the concept of standard error.
$SE_\bar{x} = \frac{s}{\sqrt{n}}$
Where −
• ${s}$ = Standard Deviation
• and ${n}$ = No.of observations
Problem Statement:
Calculate Standard Error for the following individual data:
Let's first compute the Arithmetic Mean $\bar{x}$
$\bar{x} = \frac{14 + 36 + 45 + 70 + 105}{5} \\[7pt] \, = \frac{270}{5} \\[7pt] \, = {54}$
Let's now compute the Standard Deviation ${s}$
$s = \sqrt{\frac{1}{n-1}((x_{1}-\bar{x})^{2}+(x_{2}-\bar{x})^{2}+...+(x_{n}-\bar{x})^{2})} \\[7pt] \, = \sqrt{\frac{1}{5-1}((14-54)^{2}+(36-54)^{2}+(45-54)^{2}+(70-54)^{2}+(105-54)^{2})} \\[7pt] \, = \sqrt{\frac{1}{4}(1600+324+81+256+2601)} \\[7pt] \, = {34.86}$
Thus the Standard Error $SE_\bar{x}$
$SE_\bar{x} = \frac{s}{\sqrt{n}} \\[7pt] \, = \frac{34.86}{\sqrt{5}} \\[7pt] \, = \frac{34.86}{2.23} \\[7pt] \, = {15.63}$
The Standard Error of the given numbers is 15.63.
The smaller the proportion of the population that is sampled the less is the effect of this multiplier because then the finite multiplier will be close to one and will affect the standard error negligibly. Hence if the sample size is less than 5% of population, the finite multiplier is ignored. |
global_01_local_0_shard_00002368_processed.jsonl/56139 | Skills Your Child Should Know Before Kindergarten
17 Things You Can Do to Get Your Children Prepared for School
Female daycare provider playing with child on floor
Creative Images / Getty Images
You want to make sure you do everything you can to prepare your child for kindergarten. But - what does "prepared for kindergarten" really mean in this day and age?
Maybe you worry that since kindergarten is the new first grade, you need to teach your child how to read before they even begin school (you don't.) Or you worry that if you teach them too much they will be bored sitting in a classroom where they know everything but aren't really socially and developmentally mature enough to be advanced a grade.
Children's Skills Vary When They Start Kindergarten
Before you dive into what you can teach your child to prepare for kindergarten, remember: kindergarten teachers know that children vary a lot when they start kindergarten. Kindergarten classes are designed to reach this widely varying group of kids.
Some kids will have just barely turned five while others will be almost six. Some will recognize just a few letters of the alphabet while others will be reading short words. All of these widely varying academic skills are fine to start kindergarten.
What matters most isn't what your child already knows when they begin kindergarten, but that your child is ready to learn.
Skills That Make a Kid's Transition to Kindergarten Easier
Of course, having some background pre-academic skills can make the transition to kindergarten much easier. This resource was created after reviewing the Common Core State Standards in language arts and math to see what kindergarteners across the nation are learning.
A simplified list of kindergarten skills for each major subject (math, reading, and writing) is below. Following the skills list is suggested teaching activities to prepare or introduce an idea or concept. In many cases just being familiar with an idea is enough, your child will not need to master it before kindergarten.
The goal of this list is simply to prepare your child for kindergarten. If you think your child is ready to learn more than what is here, you can certainly teach your child beyond what is here without concern that they will somehow be ruined for kindergarten.
The idea here is to present the minimum for a child to be extremely well prepared. Knowing a little extra won't hurt, and may even help ease your child's transition to kindergarten.
Math Skills
Regarding math skills, in kindergarten children learn:
• To count to 100
• Count by twos, fives and tens
• Add and subtract within five
• Understand how to add or subtract to get to ten
• Describe objects using measurement -- the length and weight of objects
• Learn to compare two objects -- such as bigger/smaller, greater than/ less than
• Sort and categorize objects
• Identify shapes that are 2-dimensional and 3-dimensional -- triangles, square, rectangle, rhombus, circle, pyramid, cube, prism and sphere
7 Math Skills to Teach Pre-K
1. Verbally count to 20 This can simply be memorizing the words one, two, three...
2. Get familiar with counting objects up to ten. For example, counting up to ten toys. You can also set out a group of objects (keep it below 10) and ask your child to count it. If your child isn't ready, ask them to count it with you.
3. That bigger numbers can be reached by smaller numbers. For example, when you have five toys, count them up to five. Then separate the toys into two and three toys, count the two and three, put them together and count to five. Don't worry about whether or not your child can fully understand this, just show it to them to spark the idea.
4. If your child has mastered counting to 20 verbally, demonstrate skip counting by twos. You can line up ten pairs of shoes to demonstrate this. First, count the shoes one by one, then do it again, only skip count by two with each pair. Once again, your child does not need to master this idea, you are just introducing the concept.
5. Talk with your child about different measurements Show them that objects can be measured by weight. You could weigh yourself, and then your child on a scale to demonstrate. You can also show them a ruler and that objects can be measured by length. Point to the numbers on a clock, and tell them that clocks measure time. At this stage, you are just pointing out that numbers are used for different types of measuring, not teaching how to measure
6. Use position words when talking with your child. Call attention to them and talk about the opposite, i.e. in front of/ behind, on top/ below, next to, and beside. Your child will learn the meaning by hearing you talk about this concept in context. The bonus on this one -- it is also a reading skill.
7. Talk about the differences between flat shapes and solid shapes. A flat paper circle, compared to a ball, a square compared to a block. Talk about shape names regularly. Describe things with the name of the shape, pizza is a circle shape. Once again, your child doesn't need to memorize this. Introducing the idea is enough.
Reading Skills
In kindergarten children learn:
• The full upper and lower case letters of the alphabet and the sounds each letter makes
• How words are read from left to right and top to bottom of a page.
• That words are separated by a space, and that spoken words and represented by written letters and language
• How to read single-syllable words
• Long and short vowel sounds
• To read and understand very beginner level readers, i.e. "phonics readers" or "leveled readers'
• To recognize the title, author, illustrator, and the front, back and title page of a book
• To identify the main characters, setting, and events in a story
• To understand how the illustrations support the text in a story
• To recognize common types of text, such as storybooks and poems
5 Reading Skills to Teach Pre-K
Today's parents have heard about the importance of reading to your child regularly to develop good pre-reading skills. You probably already do some of these activities with your child. Here you can see how it is preparing your child for kindergarten. You may also find some new ideas.
1. Teach your child nursery rhymes and children's songs to help your child recognize the patterns of language. You can ask them afterwords which words rhyme, or if they can hum the tune of the rhyme.
2. Read a variety of different books to your child. Read them storybooks, books of rhymes and poetry, non-fiction books with facts about animals or nature, books that describe real events and situations. Spread these out over time, you don't want to overwhelm yourself or your child.
3. When reading a book, occasionally point out some of the basic rules of reading. One rule is that you read the book from front to back. You can also trace under the words at times when you are reading, and explain that since the letters and words on the page represent the words you are reading out loud, that you read the words in the order on the page. For silly exercise, try reading the words on the page in reverse order, or randomly to show that it doesn’t make any sense when not read left to right. Just showing this to your child to peak curiosity is enough at this point.
4. Teach your child to sing the alphabet song. This will introduce the names of all letters to your child, and the use of a tune will make it easier for your child to remember. Many of today's parents learned the alphabet to the tune of Twinkle, Twinkle Little Star. If your child enjoys watching the PBS children's show "Superwhy" they may enjoy learning the alphabet to the tune used in each episode of the show.
5. Teach your child to recognize at least ten letters. A good place to begin is the letters of their first name, as they will be of great interest to your child. You can also use letters from your name, names of pets, favorite objects or foods. The idea is to introduce letters that your child can relate to something they find interest. To teach them to recognize the letter you can ask your child to look for it on signs or objects around your home. You can also get a set of magnetic letters or an alphabet puzzle, and place the letters you are focusing on in a bag. Draw out letters randomly and see how many your child knows.
Writing Skills
In kindergarten, kids typically learn how to:
• Use drawing, speaking, or writing to explain what happened in a story or text that was read to the child.
• Use drawing, writing or speaking to explain events, such as what they did during the weekend or at an event.
• With support, answer questions and add detail to their drawing/speaking/writing of a story or event.
• Explore using digital tools to produce and publish writing with adult help.
• Describe familiar places, people, and settings with some help.
• Work in a group to answer questions or explain an event using drawing, speaking or writing.
• Write all upper and lower case letters of the alphabet.
• Use nouns, verbs, and prepositions properly.
• Understand what a question is and that who, what, when, where, why, and how are question words.
• Spell simple one-syllable words.
5 Writing Skills to Teach Pre-K
There is a great deal of overlap between reading and writing skills in the pre-K stage. This list will be a little shorter because the reading activities above directly support pre-K writing skills.
1. Make lots of small talk with your child. Ask them all kinds of questions that will cause them to think about an answer. Ask them "What are your favorite stories, colors, clothes, or animals?" Ask them how they feel and what happened that led to them feeling the way they do. Feel free to offer some suggestions if they don't seem to have the words to express themselves. Not only will this give them foundational writing skills, but it can also enhance your relationship with your child.
2. Specifically ask your child questions about familiar things that have an order to them, such as "What did you do today?" "What did you do on your play date with your friend?" you can extend this to books you have read to your child by asking them to tell you what happened in a storybook.
3. Encourage your child to color and draw pictures. Being familiar with writing tools and knowing how to do even simple drawings will prepare them for using drawings to tell a story.
4. Let your child use a few digital tools before attending school. Playing games on a tablet or cell phone will familiarize your child with digital media which will prepare them for the new standard of using digital media to produce and publish writing.
5. Teach your child to write their name. There are several ways you can teach your child to write their name. Once your child knows how to write their name, they will be able to write their name on their school assignments. Many children are very proud of being able to write their own name and enjoy practicing it. One way to teach this is to sit down beside your child, with each of you having a sheet of very wide lined paper. Write each letter slowly, and ask your child to copy and follow along. the first few times, you may have to stop and show them each letter or stroke several times.
Remember to try and foster a growth mindset while working with your child on the above skills.
While your child may already feel proud when they know something or when skill comes easily, it's critical to encourage your child when they find a task a challenge or don't know something right away.
You can point out how awesome it is that they are learning something new if they don't know the name of a letter yet. Praise them for the practice they put into writing their name. Remind them that if they continue to learn and work at learning, they will get more knowledge rather than only having the set of skills they started with.
A Word From Verywell
While this list is inspired by the rigorous standards for kindergarten being used throughout the United States, there are no single hard lines for kindergarten readiness. Again, your child will not need to master every skill on the above list to be ready for kindergarten.
Was this page helpful?
Article Sources
|
global_01_local_0_shard_00002368_processed.jsonl/56140 | Breakthrough Pain Definition
What happens when your usual pain management plan doesn't work?
Back Pain
Back Pain.
Breakthrough pain and flare ups are episodes in which pain is not full managed by your usual medication.
What Is Breakthrough Pain?
Breakthrough pain, also called episodic pain and/or flare up, is the name given to pain — both cancer and non-cancer related, although much more is known about the cancer type — that comes on very quickly and severely when you are already being treated with long-acting pain medications.
In a flare up, the pain "breaks through" your routine medication.
Breakthrough pain may become severe enough to disable or immobilize. In order for pain to be identified as breakthrough pain, persistent pain that is controlled and stable, usually by medication, must first be present.
Breakthrough pain is usually, but not always, experienced at the same places as the underlying persistent pain.
If you experience breakthrough pain frequently, it may be because your persistent pain is not being treated adequately; according to a 2007 study published in the journal Pain Medicine, if you have five or more episodes per day, it may be time for a reassessment, of both the cause and the current treatment protocol, with your doctor.
Up to ninety five percent of people with persistent back pain experience breakthrough pain, the author of the Pain Medicine study reports. A more recent (2015) study, published in the journal Pain confirms that breakthrough pain is very prevalent, putting the number at eighty percent.
Who Gets Breakthrough Pain?
A 2018 study published in the journal Pain Research and Treatment found that about thirty seven percent of patients with chronic low back pain experience breakthrough pain, and that the prevalence is equal between men and women. Most are over fifty years of age.
Types of Breakthrough Pain
Experts categorize breakthrough pain in two ways: by the way it's induced and the type of pain.
Pain can be incident, idiopathic or end of dose. Of these, the incident sub-type of breakthrough pain is the most common. It tends to be predictable and related to movements such as coughing or turning over in bed.
But incident breakthrough pain may be unpredictable, too. In this case, it may be due to contraction or spasms in muscles that are in your organs.
The author of the Pain Medicine study reports that up to half of all breakthrough pain is the incident type.
Idiopathic breakthrough pain has no known cause.
In general, breakthrough pain takes about 10 minutes to ramp up to full intensity, and may last up to (a median of) sixty minutes, according to a 2009 British Journal of Anaesthia study. But this can vary according to sub-type.
For example, if you have end of dose breakthrough pain, a sub-type where the pain shows up just before your next regularly scheduled dose of medication, you may find that it takes longer than ten minutes for the pain to come to its full intensity; it also may last longer than sixty minutes.
The second type of categorization relates to the body system responsible for the pain. These are somatic, which refers to muscle, visceral, referring to organs, and neuropathic, or nerve related breakthrough pain.
If you have nerve-related breakthrough pain, episodes may be shorter and more frequent than the typical scenario described above. This timing may then contribute to altered responses to pain and other stimuli common in people with nerve pain. Examples of such responses include:
Breakthrough Pain Medications
Regardless of the sub-type or timing of your breakthrough pain, symptoms are often subjective in nature, which may lead to missed diagnoses and under-treatment. This is why it's important to communicate accurately and thoroughly with your treating physician.
Your doctor will need to know about you, your medical history, your back condition, and your recent pain, as treatment will likely be tailored to you individually. Keeping a pain chart or diary will likely help you here because it is a form of self-reporting that doctors tend to rely on in their assessments. Your doctor uses the information you give her about timing and frequency, cause, if you have that information, intensity, and onset to determine the type you have and to match a particular quick-acting opioid medication to it.
Medication given for breakthrough pain is referred to as rescue medication.
Breakthrough pain is most often treated with short-acting opioids, or narcotics.
When breakthrough pain can be predicted, your doctor may give you short-acting opioids preemptively. An entirely different type of medication may be given when breakthrough pain cannot be predicted.
But some doctors disagree with the use of narcotics to treat breakthrough pain, and, in fact, don't believe the phenomenon of breakthrough pain is even real. A 2011 review of studies published in the journal Pain Physician found no scientific evidence for the phenomenon of breakthrough pain. The authors conclude that the use of opioids to treat it is suspect.
They report that treatment of chronic non-cancer pain with opioid narcotics has escalated in the past decade or so, and assert that the rise in prescribing has led to explosive use by physicians, as well as misuse of the drug, and many complications, which are also known as adverse drug events.
The 2018 study mentioned above found that fentanyl, a narcotic opioid, is the preferred drug for controlling breakthrough pain, and just over half of the patients that take it for this purpose do so through through the nose.
Non-Drug and At-Home Treatments for Breakthrough Pain
Non-drug treatments are sometimes integrated with narcotic medication. Your doctor may counsel you to limit your activity, to use ice or heat, or other at-home therapies. She may also refer you to physical or massage therapy, or to a specialist for a nerve block.
Was this page helpful?
Article Sources
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.