id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_5_shard_00002591_processed.jsonl/15140
Aboriginal Ritual Chant Aboriginal artwork multiple colors and symbolism Forever Oneness… who sings to us in silence… who teaches us through each other Remind me of the gift of heritage of selfless sacrifices by ancestors. Let me teach as I was taught that we drink from wells we did not dig and warmed by fires we did not kindle. May I see the lessons as I walk, to honor the meaning and purpose of all things. Help me see and touch with respect. May I walk, talk, and act with humility, empowering others to discover, to walk beyond my shadow. Help me to always speak from behind my eyes. Let me observe and learn… not judge. May I take joy in the joys of others. May I cause no harm and leave music, peace and beauty after my brief visit. May I leave one day without fear with dignity. When I return to forever, may the circle be closed and the spiral be broader.
global_05_local_5_shard_00002591_processed.jsonl/15141
Being in a relationship, whether it is a marriage or an informal commitment to another person, requires patience, understanding, and compassion for one another. It isn’t always easy being around the same person day in and day out and sometimes, we fall into these “traps” that set our relationship up for failure. According to Bryan Robinson, Ph.D., who is a professor at the University in North Carolina and author of more than 37 books, there are five reasons, or behaviors we engage in, that cause our relationships to fail. 1. We think we can read minds.Whether it’s making up stories about a situation or jumping to conclusions about what our partner is thinking or doing without checking it out, we are constantly trying to play the role of a mind reader. The truth is, we aren’t mind readers and while you might think your partner is doing something behind your back, without actually knowing, you are basing your thoughts on a mere assumption. 1. Emotional Reading.Humans have a tendency of jumping to conclusions regarding what a person thinks about them without actually confirming it. For instance, if you assume that your partner is mad at you for one reason or another, rather than accuse them of being mad, simply ask them and address the situation from there. 1. Name-Calling.It’s easy to label your partner with a name that is generally used in a negative context when you are upset or angry. However, Dr. Robinson suggests that you refrain from saying “You’re mean and selfish” to using “I-messages. For example, if the dialogue between you and your partner has turned sour, try telling them “I’m uncomfortable with how we’re talking; I’d like to take a timeout and come back when we’re calmer.” Not only can this help diffuse the situation, but it can prevent you both from saying things you don’t actually mean. 1. Put-downs.You criticize your partner’s behavior or habits rather than help them correct unhealthy behavior or recognize a bad habit. 1. Giving commands. Couples sometimes tell each other what to do and when to do it and this can become rather frustrating for both people in the relationship. Instead, if someone has a bad eating habit and you want to acknowledge this, instead of telling what to eat and when to eat it, Dr. Robinson recommends asking a question that sheds light on the issue but doesn’t imply you are commanding them to eat a certain way. [Source: Psychology Today]. Overindulging in this type of behavior can become toxic to any relationship which is perhaps why Dr. Robinson has identified them as reasons why relationships fail. And while there is a good chance there are plenty more reasons that contribute to a relationship failing, these are some things you may be able to acknowledge that you do and potentially refrain from doing so that you can work toward saving your marriage and avoiding having to file for divorce. However, if your marriage is currently on the rocks or you have come to terms that it is time to look into divorce, you can always consult with a divorce lawyer at Barkley & Kennedy in Rockville, MD who can provide you with some useful advice regarding filing for divorce and the process that goes along with it. You can contact Barkley & Kennedy at: 51 Monroe Street, #1407 Rockville, MD 20850
global_05_local_5_shard_00002591_processed.jsonl/15147
Quote of the day! September 20, 2013 Lady Astor to Winston Churchill…”Mr Churchill, if you were my husband, I would put poison in your coffee”, to which Churchill replied “Lady Astor, if you were my wife I would drink it”! Thinking and mulling over the topic of “temptation” as I prepare to speak in a few weeks time. For once a topic I am more than qualified to speak on! %d bloggers like this:
global_05_local_5_shard_00002591_processed.jsonl/15150
IronOCR for VB .NET VB .NET OCR is a complex and difficult task that is performed by the IronOCR OCR component for C# and VB .NET. It supports .Net Framework and will soon be released for .NEt Core and .Net Standard. Iron OCR implements a full API, allowing developers to read text from images in a single line of code using the Auto OCR class or with advanced setup using the Advanced OCR class within the Iron OCR namespace. Iron OCR fully supports the PDF standard and allows PDF documents to be read back to text, even if they are encrypted. For high performance, Iron OCR uses multithreading when reading PDF pages using one thread per page. Iron OCR can be installed using a single reference to the Auto OCR class, and an entire document can be read back to text again using a single line of code using AutoOCR.Read. Iron OCR differentiates itself in two functions primarily, its ease of use to install because it doesn't require platform-specific setup for C++ binaries such as Tesseract. In addition, Iron OCR is specifically good at reading real world documents such as scans and photographs which may have digital noise or be skewed. These may throw traditional OCR libraries off the trail and provide very poor results, but Iron OCR detects these imperfections and corrects for them during the OCR process, generally giving greater than 95% OCR accuracy. Language packs available for Arabic, Simplified Chinese, Traditional Chinese, Danish, English, Finnish, French, German, Hebrew, Italian, Japanese, Korean, Portuguese, Russian, Spanish, and Swedish Iron OCR can be used with VB.NET to create Windows desktop applications, server applications such as ASP.NET websites, and even web services hosted on the Azure framework. It can also be used to create simple command line applications and console applications in VB.NET. Price USD 399 License Free to try File Size 42.03 MB Version 4.4 Operating System Windows Windows 7 Windows 8 Windows 10 System Requirements .NET Framework 4.5 or above
global_05_local_5_shard_00002591_processed.jsonl/15178
Correlation and Causality  There are three main topics (problem types): describing correlations, measuring correlations, and evaluating here scatterplots. Please review attachment and answer 2 questions. The post Correlation and Causality appeared first on Psychology Homework.
global_05_local_5_shard_00002591_processed.jsonl/15183
I want to be able to start my truck with a li-ion pack I made. It is a 4S1P pack made from Headway 38120 cells. They have a max continuous discharge of over 100A. I can't recall the max pulse discharge rating, but the site I bought them from said they had been able to start a car from the same 4S1P configuration. When my car battery died, I connected the pack via jumper cables (14.4V fully charged), but it didn't quite have enough oomph to get it to start. Was this caused by a voltage sag resulting from a huge current demand? Or is it more likely that the impedance of the jumper cables combined with the cells' internal impedance was too high to deliver enough current? Can I fix this by going from 4S to 5S, or do I need to go from 4S1P to 4S2P? • \$\begingroup\$ Can you ask the place you bought it from if you need a functional battery also, or can you run the vehicle only on the Li-IOn pack? Also what was their setup for testing this pack and starting a vehicle? \$\endgroup\$ – CFCBazar com May 7 at 23:20 • 1 \$\begingroup\$ I think their setup was with a smaller Honda. I’m thinking maybe that a small Honda doesn’t need as much power to start as a big truck does... \$\endgroup\$ – Ryan May 7 at 23:23 • \$\begingroup\$ Certainly the smaller one takes less. The vehicle drains a large current at the start, but after that the current drain is stable. Can you give us the rating of your standard truck battery, so we can tell you the current needed. Than you can check if your Li-IOn pack can supply it. The jumper cables do not or at least should not make a difference. \$\endgroup\$ – CFCBazar com May 7 at 23:26 • \$\begingroup\$ What gauge jumper cables? Those cheap ones drop a lot of voltage during a start. \$\endgroup\$ – relayman357 May 7 at 23:26 • \$\begingroup\$ @relayman357 I think 4 or 6 AWG \$\endgroup\$ – Ryan May 7 at 23:29 Kirchoff’s Law would explain the failure if you had any measurments. Even a lead acid battery might not have enough with poor contacts or cables and good contacts might fail with a high ESR battery. the best approach is to transfer the charge from the external to internal battery for a few minutes to eliminate the external ESR issues. The internal battery will have high ESR with low charge and the action is visa versa with external charging. with sufficient charge Q=CV and low ESR the voltage sag = I* ESR should be less than 40% and it should start. | improve this answer | | 100A is awfully light for starting a car engine. Certainly a truck engine is more. Yes, at these triple digit amperes, you need to think about the internal resistance of everything. The person started a 1st generation Hyundai Santa Fe, a smallish SUV with a 3500 "Sigma" engine. It's a Korean fast-revving engine. That experience may not translate to a serious truck engine. Also note in the video that the seller had the battery hooked up directly to the OEM battery cables (themselves with surprisingly thin wires, again reflecting the lower current of that starter). It's also possible this whole thing was a put-up and that the seller simply used the normal car battery. Jumper cables, especially cheap ones, are surprisingly thin. They are not made to carry 100% of the cranking current, they are designed to short-term recharge a struggling battery so it can do most of the heavy lifting during start. So if you added a length of jumper cables to it, no wonder. Yeah, well, that stuff is sold on eBay and Amazon Marketplace, the "caveat emptor" flea market of the internet. You need to be smarter about expectations from such unvetted China-sourced crud. You notice Digi-Key and Mouser don't sell those things? There's a reason for that... | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/15191
Health & Wellbeing The Low-Down on Breaking Wind foods that cause farting Farts (i.e. gas, breaking wind, flatus, flatulence, booty bombs ha-ha) are the passing of gas from the digestive system out through the back passage. Some people only pass gas a few times per day, while for others it might be anywhere from 10-30 times per day. Sometimes you might not even notice it! Excess gas can be caused by swallowing air, or eating a lot of food that is not digested in your small intestine.  When we eat food we cannot fully digest (e.g. fibre), the microbes in our large intestine ferment it, and produce gas as a by-product. This means that how much gas a person produces can be influenced by how much fibre they eat, and what kind of microbes they have. Though it might be a little taboo, passing gas is normal and an indicator that things are running smoothly. Despite this, flatulence can of course be inconvenient and totally embarrassing – particularly if it’s in a work environment. Additionally, excess gas can be related to underlying health problems such as Irritable Bowel Syndrome (IBS). If you suspect something more serious is going on, or excess wind is affecting your day-to-day, you should absolutely seek help from a health professional! When it’s too much OR too smelly… People are typically troubled by either excessive gas, or smelly gas. If your personal gas producing qualities are making your life difficult – we are here to help! Treat constipation: In constipation, the digesting food spends more time in the large intestine, meaning the bacteria have more time to ferment, and more gas can therefore result. Constipation can occur for a number of personal reasons – with two of the big ones being inadequate fibre and fluid intake. Eat slowly & chew your food: Eating slowly and chewing your food really well (until it is a paste in your mouth), will help to reduce the amount of air you swallow. Using a straw and chewing gum can also result in extra air being swallowed, and carbonated drinks can add gas to the digestive system – so are best avoided if passing gas is a concern. Do light exercise: Even low-intensity exercise like walking, stretching and yoga can help your muscles to contract, and remove gas from your gut. Avoid sugar-free sweeteners: Sugar-free sweeteners (found in chewing gum, fizzy drinks etc.) can be a trigger for excess gas. They are not absorbed in the small bowel, so they travel on into the large bowel and are fermented, and produce gas. Food intolerances may cause something similar to occur – so it can be worth to get guidance from your GP and dietitian if you think this might be an issue for you. Limit sulpher-containing foods: If you are worried about smelly farts – this one is for you. Though a high-fibre diet might lead to a lot of gas, it doesn’t make it smelly. Certain foods cause gases that contain sulphur – which is not so nice on the nose. These include alcohol (in particular wine), meat, protein powders, eggs and cruciferous vegetables (like broccoli, cauliflower and kale).  If your protein (e.g. meat, protein powder, eggs) intake is high – say you’re a body builder with increased requirements – ensure to have high fibre foods with the protein to balance things out. Include fermented milk foods: In various studies, consuming fermented milk products (that contain certain probiotics = good bacteria) have been shown to improve tolerance to a healthy high-fibre diet, and reduce gas. One recent study used a product similar to the Activia probiotic yoghurt with great effect, and there are other products on the market with similar claims. A final note If you have tried much of the above and are still struggling with excess or smelly gas, you might benefit from trialing a reduction in some high FODMAP foods. These foods are highly fermentable, and thus for certain individuals, can cause excess gas. We strongly recommend doing so under the guidance of a dietitian experienced in this. To start, you might even keep a food and symptom diary, and see if you can identify any patterns in your own diet! Need help? If you are struggling with gut symptoms and need help – you don’t have to go it alone. Reach out and find out how we can help!
global_05_local_5_shard_00002591_processed.jsonl/15192
Make a contribution Using our online contribution payment facility you don't have to worry about your schedule or payment being lost or delayed in the post and you'll get an on-screen acknowledgment when you submit your payment. These instructions apply to non auto enrolment schemes only. If you have an auto enrolment scheme, please use our online service for auto enrolment to make your contribution. How to submit a contribution Select 'Submit Contribution Schedule' using either of the links as highlighted in the image below to take you to the contribution schedule menu. screengrab, showing you how to submit the contribution payment schedule Select either 'Pre-fill Schedule from Previous Month's Data' or 'Pre-fill Schedule from Payroll Data' depending on whether you have the details on a spreadsheet or not. Pre-fill Schedule from Previous Month's Data 1. Select Pre-fill Schedule from Previous Month's Data. 2. The schedule page will open where you can amend any payment amounts if required. 3. Once all the details are correct and the total equals the amount you want to pay select submit below the schedule then click continue. 4. Click continue on the validation pages which follow. Pre-fill Schedule from Payroll Data 1. If you have the payment details already on a spreadsheet you can select Pre-fill Schedule from Payroll Data. 2. This will allow you to upload the file containing the information, match the header fields to the corresponding fields on our online service then add the payment. Please refer to your scheme administration guide if you would like more detailed instructions on submitting a payment. The administration guide link is on the left hand navigation bar - as shown in the image above.
global_05_local_5_shard_00002591_processed.jsonl/15198
From Wikisource Jump to navigation Jump to search This page has been validated. inspection of the prohibitions. Can any one doubt whether a mother is a blood-relation? Is evasion here possible? Let the reader open his Bible, and look at the first prohibition, (v. 7.) What is it? "The nakedness of thy mother shalt thou not uncover: she is thy mother; thou shalt not uncover her nakedness." Observe, too, the prohibition is repeated. 3. Omicron in fact yields the point in dispute; for he shows that a step-daughter is expressly prohibited, in verse 17. What is a step-daughter? Not a blood-relation, as he represents her to be, but manifestly a relation by affinity, or marriage. Thus, by his own showing, the general rule in the sixth verse includes relations by affinity, as well as by consanguinity. If there were no other cases of the kind, this single prohibition would be decisive of the question. But there are more; not less than eight, as already shown, (page 177,) viz., step-mother, father's brother's wife, daughter-in-law, brother's wife, wife's daughter or step-daughter, wife's son's daughter, and her daughter's daughter, and wife's sister. So that the number of affinity-relations is
global_05_local_5_shard_00002591_processed.jsonl/15202
The Box Lover This week’s Phun Phriday post appealed to me for a few reasons: 1. I have a bulldog that has this exact personality (and level of intelligence), 2. It shows that perseverance is pretty useless when you keep doing the same thing, 3. I have been feeling like I am this bulldog lately… (This might not necessarily be a video to show kids as the humans do call the poor dog, “Dummy” which I think is unfair, and keep telling him to “go potty” which seems like it should be a small priority given the circumstances. Of course, you could always mute the sound and have a nice discussion about the difference between stubbornness and perseverance.) Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/15212
An exchange-traded fund is a type of investment fund and exchange-traded product, meaning that is traded on stock exchanges, much like other securities such as stocks but with an underlying asset. ETFs are similar in many ways to mutual funds, except that ETFs are bought and sold throughout the day on stock exchanges.
global_05_local_5_shard_00002591_processed.jsonl/15215
Ten years ago: I was beginning to loathe the idea of moving for the eleventh time in four years. Boxes I had emptied six months before were slowly being restored to their natural packed state. Anything not tied down or in immediate need was herded into the living room, which was converted into the packing area. I threw myself into that mess immediately because it was a much more approachable problem than the logistics of actually moving everything back to New York. Being poor and license-less immediately removed the possibility of renting a truck and driving my things back. I wasn't about to leave things in my brother's basement again, because the last time I did that I wasn't able to see my belongings for nearly two years. I went through and trashed everything I could bear to discard, but there was still way too much left. Out of desperation, I began thinking about carrying as much as I could onto a Greyhound bus, and then shipping everything else ahead of me. This wasn't the first time I was going to try moving on the bus, and I had a rough idea of how much I was willing to lug around with me. The shipping bit frustrated me though, as I figured it was going to be expensive and potentially harmful. There was no winning, but I had committed myself to the goal of getting back, and there was no turning back. And then there was Isabella. Isabella worked at the store down the hall that sold all of the little glittery accessories that the kids like. It was a very girly store, and I had never actually set foot into it at all merely out of a complete lack of interest. I would run into her while out and about in the mall scene, but at most it was a nod of recognition or maybe a wave. One day we started talking. I don't remember how it happened but it did, and then we were saying hi to each other as we passed instead of nodding. And then we were stopping and chatting instead of saying hi. And then we were both closing one night and in the midst of our conversation it came up that I didn't own any summer shorts. She found this idea appalling and weird for some reason, and insisted that she take me up to the bigger mall in Grand Rapids to take care of the "problem". She took me up there on that Saturday, and she dragged me into every store I would have fanatically avoided otherwise: the Gap, some place called Anchor Blue, motherfucking Old Navy of all places. I would protest at the threshold of every store, and she would convince me that she was only doing this for my own good, and then I would relent and she would run around the store like a woman possessed. She would pull any pair of shorts off of the rack and hold them up to me with a critical eye I clearly did not have, and then throw them at me while I shook my head and began protesting. And it was fun in the weird sort of way that trying out a new aspect of a person is fun. I tried to convince myself that I was just out having fun with my weird new friend, but I also saw that dynamic creeping up between us and I was afraid of it. I didn't want this to be a situation where I built her expectations up. Even if I wasn't in the midst of trying to get myself back to New York I at least possessed the understanding that I was not capable of putting together a fully realized relationship. On the drive back home I actually had the presence of mind to say these words to her in a coherent way. She demurred, saying that we were just hanging out and it was fun and all of that, but that certainly didn't seem to be the case to me. Either way, I was proud of myself for clearing the air all on my own, and defusing the situation and my anxiety at the same time. And I did get a pair of shorts that night. I still have them actually, and I do wear them from time to time. They are the kind of shorts that have zippers in the hem, so that one can attach the legs and turn them into pants. It was the closest I was going to come in those days. Notes on a life in exile: A retrospective Previous: May 30, 2010 <|> Next: June 14, 2010 (how did i get here i am not good with mining) Having made the fortress's first artifact mechanism apparently bought me enough political capital to be de facto fortress leader for a while! What fun! Early spring 1052 and what this fortress needs, I've decided, is a beach. I've set the miner drones to digging an adequate thatch of channel and assigned an odd handful of indigent migrants to bucket duty. Call it a make-work project. These are troubled times and we're mostly starving. Did I mention the beach? I'm not sure exactly how the military works, but I think we have one now. They even have a clubhouse to train in. Weapons rack, bunk beds, Spider-Man backissues. They haven't done much sparring yet, but, prepared for the worst, I built a grand & sprawling hospital. As far as I can tell, this mostly involves a lot of tables and chests. What do the bedrooms need chests for, anyway? Some tall, pointy-earred fellows showed up - procurred a Companion Bear and Therapy Alligator for the hospital. This, then, will be my legacy. The tale of Outpost Copperstrapped A Dwarf Fortress Bloodlines Game, told in parts Start | Next -> I do not give a rat's ass that BP CEO Tony Hayward said "I want my life back." Or a shit. Or a monkey's left fart. So he was honest, said what was on his mind. What the fuck is the big deal? Everybody's selfish. Nobody, 100% of the time, has entire scope of a problem right there in the front of their minds. We're all mostly, most of the time, concerned with our own lives, how each predicament will affect us personally. If I were him I might say something like that. And anybody saying they would never say anything like that, that all they're thinking about is the environment and how screwed up the lives of all the animals and other people down there are because of it, is lying. And this includes all the people right now bitching about how insensitive he was for saying it. I'd bet good money, if it could be proven, that every single one of them is a hypocrite, only interested in crucifying the most visible scapegoat for an audible gaffe. Everybody whining about this is a waste of time, let's put more collective energy into actually trying to help solve the problem (if anybody can afford to put any energy toward that endeavor begin with). Regardless of how Mr. Hayward fell into the whole chain of events leading up to the Gulf oil disaster, of how numerous and how big his own personal fuck-ups lead to it, he's apparently spending most of his time, every day, trying to fix the problem. And I'm not defending him, I'll be the first to tell you that that effort is just one big epic fail after another. What I'm defending here is honesty. Yes, this man for the forseeable future has nothing else in his life but a metric fuckton of oil in the ocean and and eleventy assloads of incompetence. If he has a wife and/or kids he's probably not seeing them much. What he meant when he said "I want my life back" is "OK I'm down here every fucking day and my life sucks because of it right now so yes, even though I want it over for different reasons than that oil-covered duck over there, I do want it over, and as fast as fucking possible, so I'm doing everything I can possibly do to make this thing go away." But it turns into one giganto "GOTCHA!" and everybody's all up in arms because nobody can ever be honest about anything they fucking say any more and most of the time you can never say what's really on your mind because the wrong people might hear it and make a big goddamn deal about it even though, more or less, everybody is just as selfish as the next person and is always thinking things that might piss somebody off. Now, especially in today's age with cameras everywhere and Facebook and Twitter Myspacethat other site nobody uses anymore, and blogs and bloggers, it's not just celebrities that have to worry about this shit anymore. So now we all have to mince our words, watch every little thing we say, and lie, spin, lie, spin, lie. Can we just please have a happy medium between this world we live in now and the fictional, ultra-honest world depicted in The Invention of Lying?
global_05_local_5_shard_00002591_processed.jsonl/15216
Tight"en (?), v. t. [imp. & p. p. Tightened (?); p. pr. & vb. n. Tightening.] To draw tighter; to straiten; to make more close in any manner. Just where I please, with tightened rein I'll urge thee round the dusty plain. Fawkes. Tightening pulley Mach., a pulley which rests, or is forced, against a driving belt to tighten it. © Webster 1913.
global_05_local_5_shard_00002591_processed.jsonl/15225
Giving Options Give Securely Online Our online giving portal enables you to securely give a one-time offering or set up recurring donations using a credit/debit card or by ACH through your bank account. Please note that ACH donations are the most cost-effective for the church. Online Bill Pay Have your regular offering deducted from your checking account through your bank/credit union online bill pay service. Be sure to note what your gift is meant for – General Budget, Building Faith, Missions, etc. Check by Mail You may mail a check or drop it off at the church office Tues.-Fri. from 9AM-4PM. Faith Community Church 345 Parkway 575, Suite 100 Woodstock, GA 30188 Questions about giving? 4 + 6 =
global_05_local_5_shard_00002591_processed.jsonl/15231
Favorite gospel songs by Jimmy Swaggart Jimmy Swaggart sings a lot of my favorite gospel songs. Back in the mid 60’s a guy in Bulawayo lent me one of his records called: “I’m nearer home,” and wondered if I would like it. Well, I loved it. A few years later I attended the Salisbury Polytechnic to do a survey course, and Pastor Marks lent me 4 of his records. They were such a blessing to me. When I came back to my room, the Beatles would be blaring from one room, and the Rolling Stones from another, and I would go into my room and put on Jimmy Swaggart. It was like heaven came down, and glory filled my soul. In 1970, I went into the ministry as a gospel singer, showing religious movies. In Durban we went to one of Evangelist Arthur Nippers meetings. He sold Jimmy Swaggart records, and I bought 10 singing records, and he persuaded me to buy 2 preaching ones. These records were such a blessing to me. I played them over and over again for hours, just soaking in the presence of the Lord. 1. I’ve never loved Him better than today – One of my favorite gospel songs by Jimmy Swaggart I love the fast songs on his early records. 2. God took away my yesterdays This was the second record.. 3. Some Golden Daybreak This was the first record. 4. In the shelter of His arms I seem to remember a picture of him standing outside a stone church building. When I would listen to the record, I imagined myself sitting inside just basking in the presence of the Lord. 5. At an altar of prayer I seem to remember a family picture, with his wife and little boy. 6. The last mile of the way Last night I was singing this song to myself, which inspired me to do this section. 7. You don’t need to understand This song is such a comfort. 8. There is a river This record was a tremendous blessing to me. Thank you. 9. He touched me I recall this song being on a record where he had the open Bible in front of him. The title was: “Someone to care.” 10. When I get to the end of the way Another nice song. 11. I’ve never been this homesick before I first heard this song on his record when I was having meetings with Pastor Eldon King in Arkansas in 1983. I loved this song so much, as I was so homesick for South Africa. 12. He brought me out of the miry clay All of us sinners are saved through faith in Jesus Christ, and his shed blood on the cross of Calvary. 13. Jesus, just the mention of your name The credits say this song was written by Mike Murdock. Wow. 14. He chose me We have a tape of Pastor Johannes Minnie of Port Elizabeth singing this song. He is a big fan of Jimmy Swaggart, so I am guessing that that is where he heard it. 15. Jesus will outshine them all I had this LP when we lived in South Africa. 16. His hand in mine I had an this record, plus one of Elvis singing the same song. 17. Remind me This song was a tremendous blessing to me, and I often sang it at meetings. Years later I heard of Dottie Rambo, who wrote it. 18. If that isn’t love This is one of my favorite gospel songs. 19. Wasted years I have often sang this song too. 20. Glory, glory, hallelujah, since I laid my burdens down The other night I was singing in my room, and after I had sung this song, I ended up on my knees by my bed. I feel such an anointing on this song, and such a presence of the Lord when I sing it. 21. Will the circle be unbroken Pastor Nipper sold me this preaching record and another one. I wasn’t much into listening to preaching, so I hadn’t listened to it. One day I was singing at a church, and a guy asked me if I had this record. I said yes, and he drove a long way back to the Concord Mission Home to buy it from me, and went away rejoicing. This shocked me, so I decided to listen to the other record. It was called: “What shall the end be.” When I finished listening it, I was on my knees next to the record player. Some years later I had some meetings with a minister who had this record, so I was listening to it in his living room, when his wife walked in. I felt such a fool. There I was crying, with tears running down my cheeks. 22. A crown of thorns Jesus suffered so much for our salvation. If we reject him, we have no hope of eternal life. I had this record, and I wish I had the song: “Down the sawdust trail.” 23. Jesus use me That is my prayer. 24. He washed my eyes with tears “I saw the blood he spilt upon the sands.” 25. This is just what heaven means to me To be reunited with loved ones, and see Jesus. 26. I know the Lord will make a way for me 27. Jesus is the sweetest name I know This chorus takes me way back to my childhood years, when I sang it over and over again in my mind. 28. Railway to heaven An old favorite gospel song. 29. Where the roses never fade Some people that have been to heaven and back say that the grass is singing all the time. Everything is alive and singing. 30. No one ever cared for me like Jesus Another old favorite gospel song. 31. Build my mansion One lady that went to heaven said that for each soul you save, you get one brick towards your mansion. 32. At the crossing I was so blessed by this song. I love it when people put pictures that tell the story about the song. Very beautiful. 33. This is like heaven to me This goes way back. 34. I shall not be moved We need to be like the tree by the water. The water is the Holy Spirit. 35. King Jesus When we were near the Dome of the Rock in Jerusalem looking over at the Golden Gate, we were singing this song. Then a Muslim soldier with a rifle came and told us that we cannot sing that song here. 36. Friendship with Jesus This is just piano. He plays the piano so good, just like David with his harp. The anointing flows through the fingers. 37. How Great Thou Art The greatest worship song. 38. How long has it been God wants us to talk to Him and worship Him. 39. I’ll never be lonely again An old favorite. In the Bible it says the the Lord puts the lonely into families. God doesn’t want anyone to be lonely. 40. Peace in the valley Peace in the midst of the storm. Like the dove in the hole in the cliff by the sea, where the storm is raging, and the waves are crashing, but the little dove sits there peacefully. 41. Farther along When my little sister was small, she thought we were singing about Dad. 42. I’d rather have Jesus I think this was written by George Beverly Shea, who sang at the Billy Graham meetings. 43. Now I have everything I first heard this by James Blackwood. 44. One more valley One more trial. Sometimes people buckle under trials. I think of the two nuns who committed suicde one day before the money came in. If they had waited just one more day, they would have had plenty of money. The whole story is on my other website: favourite-love-songs.com 45. Gone I have been to the empty tomb too. He has gone! Praise the Lord. 46. Got any rivers We sang this song many times in churches when I was a teenager. It was a very popular faith chorus. 47. Jesus on the mainline I played this one a couple of times, and danced around the room. When we first visited America in 1976, we were at a church that danced for about an hour in every service, and this is one of the choruses they used to sing. 48. In the sweet bye and bye I was so happy to find this record cover. It took me back so many years when I bought all of Brother Swaggarts records. I used to imagine myself sitting in that church listening to him sing and play the piano. 49. The old rugged cross made the difference I think I heard this one first by the Gaither Trio. A very holy song. 50. Only believe This is another chorus that churches often sang during revival services when I was a teenager. 51. Let me touch Him This is another song I used to sing a lot back in the 70’s. Such a tremendous song, and I would feel such an anointing. 52. Then I met the Master That is the most important decision in 53. God on the mountain – Cowboy Cumbia I found it so funny when Brother Jimmy Lee takes his cowboy hat, then puts it on, and says he always wanted to take on the devil at Dodge City. 54. One more river to cross – Young Singers I had a record of the Singing Rambos singing this one. I think it was written by Bud Chambers. When we had meetings in Arkansas, we used to change the words. “One more river to cross, one more mountain to climb, one more valley that I gotta go through, leava that skunkie behind.” Those skunks on the road had such a bad smell! 55. Through it all This is one of my wife’s favorite songs. Very good words. 56. Our Lord is coming back to earth again Come Lord Jesus. 57. Look for me I looked up this song. If I can remember correctly, it was written by Rusty Goodman, who passed away. 58. I know who holds tomorrow I know who holds my trembling hand. I have MORE Jimmy Swaggart songs on my gospel site:  http://countrygospelandbible.com/
global_05_local_5_shard_00002591_processed.jsonl/15252
Quote Originally Posted by fluid_matrix View Post Check out Retro Repairs on YT. He does a good job of showing step-by-step the proper way testing with a multimeter. Quote Originally Posted by Slate View Post Thanks, I watched his Another Conker's BFD vid as shown below. I opened my copy of Paper Mario and by using the conductivity tester, I found that pins 36 and 40 are missing traces on the board in easily accessed points much like this Conker cartridge was and it was also for the same reason. I'll see what I can do about that. I tried checking out my copy of Landstalker on Genesis by this same method and I'm not yet sure why it's not working. Its battery still holds a charge. - Austin Fluid_Matrix, this worked on my copy of Paper Mario; traces 36 and 40 were gone. I'm soaking the RF Shield in Vinegar now. Thanks! - Austin
global_05_local_5_shard_00002591_processed.jsonl/15262
The AI improvement when? Any news on when the brain dead AI is going to be fixed? People have been waiting for this since Beta started. Or can we just honestly hear its not going to happen this year? Noting that these are the first steps needed to improve further AI, I would understand if you started going “mob AI!”. What do you mean by “brain dead AI”? Like how thralls and pet wont defend themselves outside of raid hours? I think OP talking about a revamp of the general A.I, I believe @Enyo created a petition thread about this once that got the support of several players, not sure if we had some sort of confirmation on the FC side if we’re getting it eventually, I guess we all hope we will. 1 Like News and Announcements -> Christmas and Current Focus Am I the only one who finds every single post by TheLOLxd2 to just be utter nonsense accompanied by a link to gamepedia? I haven’t touched CoE since October. One of the reasons is the brain dead AI it just kills the experience for me, especially since this is a problem from the launch of the EA. I don’t think we really want to start looking at motives here, because y’all might accuse me of being a fanboy. :smiley: In my observation, LOLxd has become a curator of the Wiki, in at least the sense there are backlinks, and cross-references from here, to there and elsewhere. And I find his or her contributions quite helpful, as far as connecting the dots… breadcrumbs and all that. Quoted for visibility. I am still waiting patiently for both the building loading changes, and the AI changes, discussed and ratified, on behalf and through the persistence of Enyo. 1 Like
global_05_local_5_shard_00002591_processed.jsonl/15263
Jump to content • Content Count • Joined • Last visited • Days Won Everything posted by DocDoomII 1. We already have enough streamlined cRPG out there. Dragon Age II is the master of streamlining and unrealism, and its quite awful. 2. Not the Oblivion scaling I hope. A little level scaling wouldn't be too bad, but not at the point where if you go back to the starting region, every critter scaled up to your level and became godlike too. 3. I'd really like if they actually influenced the fight. Like breaking the wrist of the arm of your enemy would decrease his ability in swinging his sword or prevent it altogether. 4. Anything but, please, not something like the stupid Skyrim inventory. Skyrim and Dragon Age II inventory are like, the most horrible things ever brought to life. 5. Putting Icewind Dale saga together with Planescape: Torment is kind of mean though. The first is heavily combat centered, while the second, I always felt, had fights just to be more appealing to people who like combat in their breakfast. 6. Not so much of a combat log as intended by the OP, but a personal favourite of mine is the "kills log". I love when a game keeps track of how many skeleton I killed, how many trolls and so on. In the good old Diablo 1 you'd discover more about a certain type of monster, the more you killed of its kind. Like how many max HP can it have, what level range can it be and such. 7. That wouldn't be random thoug... If you happen to clear a dungeon in a region inhabited by a tribal race of "whatever" and they don't even know what a coin is, it would be kind of stupid if they had a merchant that trades in gold coins... But maybe you can trade with them for shiny gems or by trading a piece of armor for a mimetic cloak. Why not? But maybe you like best to 'fast travel' to another continent where gold coin is universally accepted. 8. One think that I personally wouldn't like as a money sink is item durability. Diablo III is a good example of what I dislike most. And if implemented I would at least like to be able to repair things by myself with raw materials or scraps. I don't want to be forced to go about, find a smith or thinker and pay him to fix my stuff every hour or so. 9. Exactly, he just said that there are stone-age elves, although they might not be like that by the game's start. Yes, I noticed only after I posted Sounds very interesting! 10. Well, I'm good until I don't see stuff like "your every single choice will be carried over to the end of the trilogy" 11. Agree with the 'smarter' aspect. Icewind Dale did this, if memory serves. The more times you sold a specific item to a merchant, the less he paid for it. As for unlimited money, I'm kind of torn.On the one hand, I absolutely see the reason behind a merchant not having unlimited funds. On the other, all it seems to is force tedious travel to other merchants to unload your loot. And I don't like tedium. Well if you consider point 4 you have more options and not necessarily need to look for other shopkeepers. Plus having to walk a bit more than normal in the various cities/settlement would 12. I'd rather see an elven race akin to the Kagonesti from DragonLance setting. I'm quite bored by elves always being high and noble and advanced. A more tribal race of elves would be awesome. 13. I want my combat log to be separated from the conversation log. Today's monitors are wide enough to have a combat log left and a conversation log on the right. Or vice versa. 14. On my ps3 I'm a trophy whore, but on PC and in this kind of games I just can't be bothered. I just want to play the game. 15. My opinion. A system that values weight and volume is interesting. A "slot-less dynamic" inventory is the most fitting I think. Simply put the game should check weight and volume and when you get overburden you can't carry anything else. You could go as far as carrying an additional (limited) amount while suffering in walking speed, fighting, being stealthy and whatever else. Graphically, different items should be put one beside the other and identical items should just stack. This would save from having to play tetris after every fight. One thing that I'd like to change from the or 16. If we manage the 2.3 million I'll change my pledge from 50$ to 110$ for the digital tier with beta key 17. Why hello fellow adventurers. I only registered today and would like to give few suggestion regarding economy for this promising project. Usually in cRPG it goes like this: Lot of kills Lot of loots Go to shop ???? Profit To the point where after few hours you have enough money to buy whatever you need to upgrade your gear whenever you find something more powerful than what you already have. This aspect should be cured and expanded a little more! I won't talk about implementing 'social' skills like "Barter" or "Haggling" because many cRPG already have such things, and they a • Create New...
global_05_local_5_shard_00002591_processed.jsonl/15272
XML Sitemap Index URL of sub-sitemapLast modified (GMT) https://friseurbartl.de/sitemap-misc.html2020-09-22 19:24 https://friseurbartl.de/sitemap-pt-page-2017-03.html2020-09-22 19:24
global_05_local_5_shard_00002591_processed.jsonl/15278
The meat served in IKEA’s restaurant is made of people who couldn’t find the way out. You Might Also Like GUY: are u in the 1% ME: more like the 2% GUY: well that’s still great ME: [wondering why this guy’s so in to milk] it’s pretty cool I guess GOD: Okay so you’re super smart, this is the alphabet. You can use it— DOLPHIN: What’s that one? GOD: That’s an e. DOLPHIN: I’m just gonna use that one. GOD: But you— DOLPHIN: Eeee-eeEEEeee. Like that. I’ve had like 6 red bulls, so of course I’m vacuuming the front yard. “I’m quite content on this side of the street, thank you.” — No squirrel ever. All I want for Christmas is for the adults who say “See you next year” to be repeatedly tased. judge: do you swear to tell the truth, the whole truth and nothing but the truth me: no judge: [covers mic] what do I do [my funeral] college professor(standing over my casket): I just want to remind you that attendance is a big part of your final grade.
global_05_local_5_shard_00002591_processed.jsonl/15309
1. look at those fucking idiots. most liberals are atheist, so they don’t know the 1st thing about religious faith or how muslims see them as degenerate infidels that need to be raped & murdered. 1. Uh, hang on a minute. Not all atheists are liberal. I for one am a nationalist atheist. I have all sorts of reasons for opposing muslim invasion of my country. 2. You see enough of this stuff and …. Can you really blame the tribe for viewing us as dumb cattle that exist only to serve them? Are these grinning, self-satisfied, nitwits really anything other than stupid beasts? Are they really anything more than neutered dogs desperate for a pat on the head from their masters? Someone make a case for them because I can’t. Liked by 1 person 1. We Whites have a creative spark that has allowed us to conquer the world, invent everything, produce the best artists and intellects in every discipline, etc., but by and large we’re dumb as dirt when it comes to common sense. Jews, chinks, even spics and niggers, none would fall for this crap. Only Whites are suckers enough. Liked by 2 people 2. That’s the nighmare of understanding all this…you realize that most of us deserve it. The smug, coddled faggotry. Submission masquerading as a virtue. Hopeless. 3. You won’t be able to stand with them when your head has been cut off. It’s more like lying down in a big pool of blood. Ask Lee Rigby. 1. This video has to be a made up spoof. I cannot imaging a major corporation or ad agency producing something like this. 4. Even if the “Banned Sprite” video is a hoax, it’s just a step or two further down a road “legitimate” advertising loves to take. Makes me think about lamp-post decorating. And the effect of gravity on falling bodies. 1. It combines 3 things that make it believable: 1) BM-WF couple in an ad 2) Foreign markets have racier ads (pun not intended) 3) Every single Sprite ad features a million-dollar niggre rapper or afflete that has all sorts of white people on their knees worshipping them. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/15320
Buttermilk Pancake Recipe This buttermilk pancakes recipe makes fantastic light fluffy pancakes. When you serve pancakes there is nothing that tastes better with them than real maple syrup and perhaps even a few slices of bacon! 3 eggs, separated 1 2/3 cups buttermilk 1 1/2 cups all purpose flour 1 Tablespoon granulated sugar 1 teaspoon baking soda 2 teaspoons baking powder 1/2 teaspoon salt 3 Tablespoons butter, melted (Makes about 20 pancakes) In a large mixing bowl, beat the egg yolks. Use an electric mixer and beat on medium speed until pale and smooth. Mix in the in the buttermilk. Beat the dry ingredients into the wet a little at a time, making sure there are no lumps. Add in the melted butter and mix well. In a clean bowl, using electric mixer on medium to high speed, beat the egg whites until stiff. Fold the egg whites into the batter until well combines. Let batter rest for 20 minutes before you make your pancakes. Preheat the frying pan. You want the surface hot when you ladle on the pancakes. Using a scrunched up paper towel, rub a little oil onto the surface of the pan, being careful not to burn your fingers. Use a ladle to pour the pancakes into the frying pan. Depending on the size of your pan, you may fix 4 or so. Do not flip them until you see bubbles form across the top of the pancakes, then, flip the pancakes over and allow to brown on the second side. Stack the pancakes onto a plate and keep covered with a dome until they are all cooked. Serve with butter, real and real maple syrup.
global_05_local_5_shard_00002591_processed.jsonl/15346
Installation Guide - Maliki Installation Guide 1: Uncompress the downloaded .rar file in your favourite Sample Libraries folder. 2: Kontakt patches are stored in Instruments folder. NOTE: Please, remember to keep both files and folder structures or Kontakt will pop-up an error message asking for missing files. In that case, all samples are stored into Samples folder. You need FULL version of Kontakt 5.1 or higher in order to properly load this library. Kontakt Player is not supported
global_05_local_5_shard_00002591_processed.jsonl/15350
Are there any Mantra, Stotra; requesting GOD to guard us against our enemies.. Protect us from internal enemies like Shadripu and External enemies.. • I have come across these two Nirvana Shatakam and Atharva Veda 8.4.22 which might help with internal enemies Shadripu and Aditya Hridayam.. – HinduKid Feb 26 at 13:17 • Im mostly looking for protection against internal enemies, enemies of mind.. – HinduKid Feb 26 at 13:38 • Shathru Samhara , << is this a mantra, are there any mantra of Lord Subramanya for help against enemies.. – HinduKid Mar 1 at 11:27 You can recite / read / listen Durga Kavach, This is a prayer to the Divine Mother for ultimate protection from all enemies, ghosts, complete body, fire, etc. This is my personal favourite sung by Gundecha Brothers Video : Lyrics : https://www.voidcan.org/durga-kavach/ You can also listen to the world famous Hanuman Chalisa or Bajrang Baan in that there are stanzas which provides protection. Bajrang Baan is very powerful in this there is a promise been given to Hanumanji of Lord Ram to serve the purpose. From Bajrang Baan : जय जय जय धुनि होत अकासा सुमिरत होय दुसह दु:ख नाशा चरन पकरी कर जोरि मनावौं यहि अवसर अब केहि गोहरावहौं उठ उठ चलु तोहि राम दुहाई पाय परौं कर जोरि मनाई ॐ चं चं चं चं चपल चलंता ॐ हनु हनु हनु हन हनुु हनुमंता | improve this answer | | • Thanks :-)..... – HinduKid Feb 26 at 13:43 • If the answer is satisfisable to you, please accept it. – 5eeker Feb 26 at 18:26 • 1 Im just waiting for others answers :-) – HinduKid Feb 26 at 18:31 • ^^ above comment.. – HinduKid Mar 1 at 11:31 You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_05_local_5_shard_00002591_processed.jsonl/15355
Is there a nexus where Anthropology, Epidemiology and Microbiology meet? So what is it that I want to study, if I do go back for a PhD? Well I’m still interested in Anthropology and more precisely, Food Anthropology. I’m interested in how food plays an integral part of daily culture and how even those foods that might be bad for us (e.g. bread!) are held with such high esteem. I’m interested in what paleolithic man ate and why he never had dental caries. If he didn’t get eaten by a saber toothed tiger, would his life expectancy have been longer?  I’m interested in Weston A. Price’s studies on native peoples whose facial structures morphed dramatically after switching from their traditional diet to today’s modern foods, overabundant in grains, sugar, and processed… crap (?) – what we affectionally call SAD (the Standard American Diet). And I’m interested in knowing how different populations have adapted to certain foods of today, such as Scandinavians being the only real ethnic group with the ability to still digest milk into adulthood. Finally, I’m interested in studying more traditional methods of preparing foods, such as fermenting fruits, vegetables and dairy, and soaking beans. I am also interested in how our modern diet is affecting chronic disease. So I think this falls under the category of Epidemiology.  Having spent a number of years running Stuffed Pepper, I can say with certainty that Gluten Sensitivity is not just a fad diet for celiac wannabes, but in fact a real disorder that has far-reaching consequences, and which scientists are still unraveling. I want to learn more about what diseases gluten can potentially cause. Under that realm falls many (if not most?) autoimmune disorders. Obesity is of course a huge problem in the US and other countries, as well, and surely our diet has something to do with this. And what about the rise in food allergies? They are most likely because of leaky gut, caused by (among other things), gluten. But these theories need to be backed up with scientific evidence, and that is why I am most interested in the epidemiological side of things, too. We need charts and graphs to back us up, baby. At the cross section of Epidemiology and Food Anthropology, is Medical Anthropology, at least in my mind (and on my Venn Diagram). Which could be a possible course of study for me as well. Finally, I am interested in Microbiology and specifically microbiology of the gut. I want to know more about the effect of grains on gut health. Are just gluten grains bad? What about the other grains? I am fascinated by lectins, and especially WGA, and want to see them in action. I am also interested in the health of the gut, the diversity of flora and fauna that exist there, and the complications that arise when the gut is damaged, such as as the missing GLUT5 receptor on the intestinal border brush, that causes fructose malabsorption in its absence. How do we repair the gut, once its been injured? How do we replace the good flora and fauna, once they’ve become extinct from the gut microbiome? Yes, I have a lot interests, and a lot of questions. But they all fit together somehow. I would love to do a combined degree where the three disciplines of Anthropology, Epidemiology and Microbiology meet. But does such a nexus exist?
global_05_local_5_shard_00002591_processed.jsonl/15358
Binary Options and the Christian Binary options is a money making option that I recently came to know about when I searched the internet for ways by which I can invest the money I earn from doing business on It is a very easy to enter trading space yet so much of a risk that one can lose all they have on it yet it is 100 percent legal in many countries such that no one would put you in jail for it. The world standard is not compromised whenever a person participates or trades binary options but then the question is, ‘does the same apply for Christians?’ The Christians adds another consideration when deciding on money making methods, ‘will it not defile the holiness / righteousness garment’. This means that praying about it, reading scriptures for guidance and listening to the conscious with high sensitivity should be applied. If you are not sure, you are better not participating. Sadly, the tendency is for Christians to reason about things and ignore the fact that Christianity is not about reasoning but goes according to what the Bible says. Christians have discussed a lot on binary options online but I wouldn’t want to delve much into these discussions. I do want to highlight that some Christians do trade binary options and we can only hope they gain their intended outcome from it. For me, the Holy Spirit or rather let me say, my conscious, did not allow me to put my money and trade binary options. I shun binary options for the following reasons: 1. The principle of working before earning something is violated. Psalm 128:2 says, ‘You shall eat the fruit of the labor of your hands; you shall be blessed, and it shall be well with you’. If God were to ask a binary option trader what work has he or she done to earn whatever amount of money earned, the answer would not be satisfactory. All unsatisfactory answers fall under sin. 2. The emotions and the greed gear of urgent desire for success that kicks in do not put me at the right position with my God. Thanks to IQ options for providing a trial account with dummy credit. This has made me experience how it feels to trade binary options. The trading triggers the desire for money and when you do make some money you tend to want even more. 1 Timothy 6:10 says, ‘For the love of money is a root of all kinds of evils. It is through this craving that some have wandered away from the faith and pierced themselves with many pangs’. The desire for money is not what Christian living associates with. These reasons, even if it was one, make me feel that putting my money into and trading binary options would defile my soul. This therefore means that if I happen to die while participating in it, I would be rejected and lament my participation in hell eternally. Just this one sin not so obvious sin like many others that are not necessarily written in the Bible can lead to the irreversible condition of hell. Revised: 27 Nov 2017 Tagged binary options, business and Christianity, business that God disprove, greed with binary options, love for money Christians, trading money. Bookmark the permalink. About Musawenkosi Dube 2 Responses to Binary Options and the Christian 1. Olagunle Morakinyo says: Thanks for your opinion and spiritual level of faith, sometimes we Christians (steward) do find our self in “impoverishment”, but with the bible ref. (Matt. 7:7) I think am conscious enough to mend my Holiness and Faith according to (psalm 23:1) (psalm 46:1) I quit my attempt. Shalom Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/15370
Fluid circulation valve FCV (for TXV pump) The fluid circulation valve (FCV) is designed for applications where the hydraulic variable displacement pump is used in standby mode for a long period of time, for example engine PTO. This valve allows oil circulation in the pump, which protects the pump from overheating. • The valve flow varies between 20 and 22 l/min. • Maximum pressure is 420 bar. • The closing pressure is 7 bar min. and 15 bar max. hydroleduc fcv
global_05_local_5_shard_00002591_processed.jsonl/15373
The Best of The Lucy Show S1 Ep 10 Vivian Sues Lucy Viv trips over one of Jerry's toys and suffers a minor ankle injury. Upset that Lucy thinks she'd sue over this little mishap, Vivian decides to teach the Lucy a lesson. Related videos Check out some of these famous faces...
global_05_local_5_shard_00002591_processed.jsonl/15376
KaneboSensai Silky Purifying Cleansing Cream (New Packaging) 125ml/4.3oz Kanebo Sensai Silky Purifying Cleansing Cream 125ml, 4.3oz 59.00 USD  A rapid acting, quick dissolving cleanserFeatures an ultra relieving, satiny textureHelps mildly yet profoundly purify skinEliminates contaminants which stick on skin's lipid filmContains Rice Bran Extract to foster skinSkin is found flexible, invigoratedIdeal and sleek for every skin types Brand: Kanebo, buy Kanebo
global_05_local_5_shard_00002591_processed.jsonl/15381
Posted in Uncategorized, Viewing Pleasures Well, okay, maybe not Robin. Tell ’em, Harris! 20 thoughts on “Sweet/Vicious 1. Thank you! 😀 Haha, yeah I’ve got no personal issues with Robin (except maybe Damian Wayne in the Injustice comics lol), Ophelia’s comment made me laugh though so I had to poke a little fun with it in the review. 😛 Liked by 1 person 1. Ha ha, yes indeed my friend, I do understand, whenever my older brother and I played Batman and Robin as kids he would always be Batman relegating me to be the sidekick (little did he know that I would one day grow up to be the most feared and coolest masked vigilante ever – Red Hood… Bwa ha ha ha!) 😉 🙂 Liked by 1 person 1. You have piqued my interest. As someone who impales at least one rapist in all of her stories, I have a complicated relationship with vigilantism, too. But when laws don’t bring about justice, it’s an understandable effect. I’m adding this to my watch list. Is there a site you’re catching it on? I have no idea how to watch shows that aren’t cartoons or on Netflix anymore hehe. Liked by 1 person 1. Well said. 🙂 I’ve just been watching it as it airs on MTV so unfortunately I don’t have any suggestions for a site to have it on. Sorry! I hope you can find it though. They have *some* of the episodes on Comcast OnDemand if you have that, but not the entire season unfortunately. :/ If I find anything more though I will let you know! 😉 Liked by 1 person 2. You should follow the blog on the Syfy Wire site Lots of strong female writers who cover a lot of the topics you post about here. Who knows…they’re always looking for guest bloggers and posts! Liked by 1 person Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/15390
_Basic Steps: Setup Permissions => Allocate Staff members _ **How to restrict Permissions** => Tick "No". => Click "Save Changes". How to setup viewing and moving Students Selections: => With the above permissions you can also allow the users to view which students have selected each course. => They can do this by viewing the course and then viewing the data table at the bottom of it. => They will need the following additional permission: See & Move Students. How to setup Permissions by Learning Area: => Navigate to "Users" in the left hand navigation. => Select the Staff member/s that you would like to set up Permissions for. => Select the "Edit" button if you are only creating a Permission for one Staff member, alternatively select the "Bulk Edit" button for multiple Staff members. => Select the check box for your Learning Area. => Click "Save". Note: If "Manage Selected Learning Areas ONLY" is ticked, then it is a requirement to also tick either "View Courses" or "Edit Courses" so that either the editing function is available to the Staff Member, or view only. They must tick one of these options before they will see their list of courses. Was this article helpful? Thank you!
global_05_local_5_shard_00002591_processed.jsonl/15406
JLPT Journal Comments 5 JLPT Journal #4: How I study N1 grammar I am writing three JLPT posts on how I study vocabulary, grammar and kanji. This is the second one, and it’s all about grammar! Two resources I am using two resources to learn N1 grammar. The first one is So-matome grammar and the second one is the dictionary 『日本語文型辞典』. I use the So-matome mainly for its structure. I like that similar grammar is grouped together and the quantity of new content in each lesson is perfect for me. However, I think that the book lacks explanations, and I am often unable to understand the difference between two different grammar points, or even, to tell exactly what a grammar rule means. This is where the dictionary is useful. How I study new grammar I am studying 2 or 3 lessons of So-matome per week. First of all, I read the whole page and decide whether or not I understand the grammar in it. For example, I understood the grammar くらいなら at once, and I didn’t think that I needed further explanations. The example sentence そんなことをするくらいなら、死んだほうがましだ (I would rather die than do that) was clear enough. In this case, I only read the example sentences twice, make sure I understand them well and start creating my physical flashcards (see the section below). But to be honest, most of the time, I don’t understand the grammar well. So-matome does not give any explanation concerning the grammar points. The book gives an equivalent in Japanese and a translation in English. While it is enough to understand what the sentence means, I don’t think that it is enough to really master the grammar point. When is it used? What nuance, what meaning does it convey? What is the intention of the speaker when using this grammar? Moreover, I find that the So-matome book tends to present several different grammar points as if they were the same. It certainly comes from the compact layout of the series. In this case, I need to study with the dictionary. I look up all the grammar that I don’t understand and take notes on a loose paper sheet. To give you a concrete example: The lesson of week 3 day 1 presents three different grammar points using まで. The problem is that the book presents several different grammar points in the same section. The best example is the first “grammar” called までだ. This is how the book looks like: As you can see, the example sentences have very different meanings. The first one means “I just wanted to…”, the second one and the third one have the meaning of “I don’t have another choice than to…” and the last one means “it is not useful at all”. I was very confused about what exactly the grammar meant. When I looked up the dictionary, I realised that there were three different grammar points here: Vる+まで, Vた+まで and それまで. Explaining these grammar points is not the point of this post, so I will just show you the kind of notes I take: I always try to explain the grammar in my mother tongue (French) and give an equivalent in French. More importantly, writing these three columns really made things clear to me: three different grammar points, three different meanings. I have a lot of similar notes. It does take some time to look up the dictionary and write things down, but it is this process that really makes me understand and remember the grammar. I remember that at school, our teacher would tell us to re-write our lesson using our own words, instead of just reading it over and over. This is exactly what I am doing, I am re-writing the So-matome in my own words, using my mother tongue, using my own structure and layout. Only then can I say: I know exactly what this grammar means. How I review the previous lessons Reviewing the grammar has always been a challenge to me. Until now, I could not find a good method to review the lessons I had learned, and I always had the feeling that I was forgetting the previous rules as soon as I was learning a new one. This year, I finally found a method that works for me: using physical flashcards. I have never been into physical flashcards, and I have always considered it unpractical. I have used Anki extensively to learn vocabulary and grammar, and two years ago, I would probably have created an Anki deck for grammar. But some time ago, I saw someone showing their physical flashcards on Twitter and thought that I could give it a try myself. I have been using this system for a month now, and I can say that it works and that I will stick to it. This system allows me to reduce the time I spend studying Anki. While I love Anki and could not do without it, I don’t like spending too much time with it. If I were to learn vocabulary, grammar and kanji with Anki, all my study time would be spent adding new notes to Anki and studying one deck after the other. Physical flashcards vs Anki flashcards While physical flashcards do not provide a spaced repetition system, they also have advantages: • First of all, I like having the cards in my hand and physically touch them. It might sound strange, but I remember a grammar point or sentence more easily if I have it in my hand, written in my handwriting. The physical contact somehow supports the memorising process. • I don’t have an SRS (Spaced Repetition System), but I still can create a system to roughly manage my cards. I keep it simple and only have three groups of cards: the new cards that need to be reviewed quickly, the cards I don’t know well and that I need to review regularly, the cards I know well and can review only once in a while. • I don’t review grammar every day, so not using Anki is a plus here. Sometimes, I even spend 3 or 4 days without reviewing the grammar. When I do, I just grab some of my cards (the new ones or the ones I don’t know well) and review them. I don’t feel overwhelmed with 200 cards waiting for me in my Anki deck. • Sometimes, I have 5 or 10 minutes of inactivity between two things. It is easy to grab a pile of cards and review some of them for 5 minutes. I could open Anki and start a custom study, but I don’t usually do it. • I know that there are tags in Anki, but I still find it easier to group and manage the flashcards on paper. Sometimes, I want to keep several grammar points together and study them together because they are similar. It is easily managed with physical flashcards, just group them together in a single pile. I have never taken the time to master tags in Anki. I am not saying that physical flashcards are better than Anki or Memrise, but it is a different way of studying and while learning on paper is the old method, after years of using Anki it feels quite new. I would never prefer physical flashcards to Anki when it comes to vocabulary (I would end up with thousands of cards!), but as far as grammar is concerned, it is manageable and offers a bunch of advantages. How I create the flashcards I have always reviewed grammar through example sentences. I think that it is the best way to remember both the meaning of the grammar point, how it is formed and in which context it is used. To create my flashcards, I use the example sentences of So-matome. On the front side, I write the sentence and leave a blank space for the grammatical pattern. I also write the equivalent in easier Japanese (provided by So-matome). On the back, I write the answer with the grammatical structure in a different colour. The underlined part is the answer. I write the grammar (in bold in So-matome) in colour on my flashcard. I use the equivalent given in Japanese as a hint. I don’t write the English translation. I use rubber bands of different colours to group my cards: new cards in green, cards I need to review regularly in yellow and cards I know well in pink. I find that Instax mini are perfect to separate the cards I want to study together. I also thought of using a blank card and drawing something funny and encouraging on it. Track N1 grammar in native resources The most interesting part of the process is to track the N1 grammar in native resources (mainly novels in my case). For most of the N1 grammar, there is an easier way to convey a similar meaning so it might be frustrating to learn these grammar points, especially for the purpose of speaking. If you already know one easy way of conveying something, why learn another complicated grammar rule? But N1 grammar is widely used in Japanese media, and this becomes obvious when you start reading in Japanese. While I have been learning the N1 grammar for only a little more than a month, I have already seen several occurrences of the grammar I have learned in books. To give you some examples, I saw the grammar Nだの…Nだの in a novel the day after I studied it. Honestly, when I learned this grammar, I had this suspicion that many learners have when studying advanced grammar “what’s that? I never saw this structure before?! It’s probably never used! I’m learning useless grammar points!!”. And the day after that, I saw this sentence: 「あんた、本当にカフェだのラジオ局だので、町が蘇ると思ってるべか?」. In the novel, people are discussing several ways of giving a new life to the deserted mine coal town they live in. Someone is dismissing the idea that the town can find vitality again through cafés or radio stations. (『向田理髪店』by Hideo Okuda, p49.) Another example is the grammar point なり. It has different meanings depending on the grammatical pattern in which it is used. Since I learned it, I saw an occurrence for two of its meanings. The first one is the structure Vる+なり which means “as soon as”. I saw this structure in Harry Potter, The Chamber of Secrets (p.132). When Harry and Ron arrive at Hogwarts in Ron’s father’s car, they are first confronted by Snape. Then professor McGonagall comes and “as soon as she enters” the room waves her wand: 「部屋に入ってくるなり、先生は杖を振り上げた。」(spoiler: it was just to light the fire.)  In another novel, I saw the expression “自分なりの答え”, which would certainly be translated by “one’s own answer”. I find the nuance given by なり hard to explain, but I somehow understood it better thanks to the context of the novel. In the novel, the family members of a murder victim are asked whether they want to choose the retaliation law to avenge themselves on the murderer. They usually start talking about the victim to find their “own” answer. (『ジャッジメント』by Yuka Kobayashi, p. 183.) Finding N1 grammar in native resources is the fun part of studying grammar. In these moments, I feel that I am not working for the purpose of the JLPT only, but that I am improving my level in Japanese and becoming better at reading. This is my system to study and review the grammar. I will stick to it as long as I am studying the So-matome textbook. I don’t know it this system will change when I skip to another textbook (probably the Shin Kanzen), but I think that I will keep making and reviewing flashcards until the end of the year! 1. Have you tried bunPro? I think they are great grammar learning/review tools. You have to type in the answer as you go through each grammar review and i think thats much more engaging when you are studying. Liked by 1 person • I never tried it, and I didn’t even know there was a Japanese Grammar SRS online. Thank you very much for the information, I will try it! 2. Pingback: JLPT Journal #5: How I learn the kanji for N1, part 1 | Inside That Japanese Book Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/15420
Collect a 4⭐ Sentinel Crimean Soldier GUARANTEED in the Lord of Light! Conquer the Lord of Light to earn Crimean Soldier AND Lilith Soul Fragments! Earn Sentinel Crimean Soldier fragments in the Lord of Light Dungeons from July 8th to July 11th at 5pm PT! The Crimean Soldier is a single target true damage dealer who can remove Immunity and inflict Perfect Disable on his enemy. He is also able to passively grant himself Perfect Hit, and grant Immunity to Burns to all his allies! We’ve placed a free pack of 10 Sentinel Crimean Soldier in the Store to get you started! Trade extra Sentinel Crimean Soldier Fragments for additional rewards in the Event Store! 250 Sentinel Crimean Soldier Soul Fragments will get you 50 Talisman Soul Fragments, whereas 375 Sentinel Crimean Soldier Soul Fragments will get you a Gate Talisman in the subtype of your choice (Arcane, Power, Sorcery)! Gate Talismans are blue talismans with a 4 set effect that is not available anywhere else! Equip a full set to grant Immunity to Magic Damage. This Talisman set will also transform Negative Effects on your character into a Random Beneficial Effect! Gate Talismans also permanently Increase the MAX HP of all allies by 2% whenever you take damage! 🎉Collect Lilith Soul Fragments! These special Fragments have a chance of dropping from all floors of the Lord of Light dungeons during this week’s Sentinel Crimean Soldier event! 🔥500 Lilith Soul Fragments = 1 Lilith Soul 🔥 💎BONUS! Rare Soul drop rates in the Lord of Light dungeons have increased by x3 during this event only! Also, as part of our 3rd Anniversary bonuses, all Lord of Light Dungeons will also drop 2x the regular amount of Evo and XP Shards! 💎 Start collecting fragments NOW:
global_05_local_5_shard_00002591_processed.jsonl/15427
Session won't start unless I reboot Post Reply New Member Posts: 1 Joined: Wed Mar 06, 2019 6:02 pm Session won't start unless I reboot Post by Tooonzzz » I was working on a project. I deleted by mistake the stereo out than I re added it from the studio connections. I closed it and saved a template out of it to mix all the CD tracks on that same template. Now each time I want to open the project or the template, cubase shuts down automatically after trying to load the project or template. I need to reboot the PC in order to be able to access it. Any help? Post Reply Return to “Issues” Who is online Users browsing this forum: No registered users and 0 guests
global_05_local_5_shard_00002591_processed.jsonl/15436
Baron 56TC Question Well-Known Member A friend told me that the Baron 56TC is capable of 250 knots, is that true? Pretty fast for a 4 seat piston. Does any one here have any time in them? What makes them so fast? Well-Known Member That might be TAS at max operating altitude, like FL200 or so. Of course, since it's unpressurized, you'd have to be suckin oxygen. That still seems pretty fast though. Well-Known Member It has the Duke (BE-60) engines in it so how ever high the Duke can go it can go. Staff member Sounds like a pretty high number to me, but may be possible. I didn't run across any 56TC numbers on a quick search but I'm sure that they are out there. The think that the Baron 56TC uses the same 380 hp engines as the Duke, and a quick check shows the Duke rated at something like 233 knots (way up high, I'm sure). The Baron with 310 hp engines is rated at 75% power at something like 213 knots, so the 56TC may run up into the mid-200 knot range at oxygen+ altitudes. Someone doing a little more homework could probably give you a more exact answer...
global_05_local_5_shard_00002591_processed.jsonl/15452
Kajs Jewelry is handmade from start to finish. Follow along as we explain our process to see what goes into the piece you just bought or are about to order:   • Concept: Inspiration might come from the walk to the studio, finding an interesting texture on an old forgotten button, or from hearing a client express their vision of their new piece. Sometimes the idea makes it onto a piece of paper. But after many years of creative experience and learning the limitations of a 2D representation, the jewelry often starts to take form by working with the metal or wax directly. • Stone: If a stone is part of the design it tends to dictate the direction of the design. How is the stone going to stay in there? Should prongs, bezels, or another stone setting method be used to give the most pleasing design? These all need to be considered before the piece even starts to take shape. • Metal Work:  • Fabrication: One method of creating the piece is by the jewelry from wire, sheet metal, metal components (findings), chains, and then forming and soldering it together. It is amazing what one can do with a humble sheet of metal and a few tools! • Lost Wax Casting: This method is a bit more involved, but the scope of what one can make using this method is endless. We do most of our own sterling silver casting in our studio, but send away some of our more complicated (and expensive) gold pieces to be cast at a local refinery. 1. Model: One either carves out the desired piece from a piece of wax or uses a found object as the model. This piece can often be cast directly, but one may also choose to create a mold of the piece so that it can be replicated, or to create a better image of the object.   2. Mold: The mold is created by pouring a two-component rubbery compound into a form encapsulating the object. When the compound has cured it is time to cut out the object leaving behind a perfect imprint of it in the mold. 3. Wax: Pellets of wax are melted (in something resembling a crock-pot with a fountain), and with pressure poured into the mold that was made. Once a satisfactory piece is been created a sprue (short wax stick) is attached to the piece. 4. Wax Tree: Usually more than one piece is created at a time (because of this long laborious process). All of the pieces to be cast are carefully assembled onto a wax tree connected to a rubber base. 5. Investment: A metal cylinder called a flask is then attached to the base. Liquid investment (a type of plaster) is mixed up and poured into the flask, careful not to break off any of the delicate wax pieces. It is left to harden. 6. Burnout: When the investment has hardened the rubber base is taken off and the flask and is placed in a kiln. Here the wax heats up and runs out and/or burns up. Left is the empty space (hopefully) in the shape of the object created.  7. Vacuum Casting: Metal is heated up until liquid, and poured into the small hole left behind from the burned up wax. Our casting is done using a vacuum, removing the air and forcing the metal into the place the wax left behind. 8. Quenching: The metal solidifies, but before the flask is has cooled off it is submerged into a bucket full of water. This causes the investment to burst, and if successful, leaves behind the metal casting. 9. Clean up: Each piece is removed by sawing through the sprue. Remaining pieces of investment are removed with a toothbrush. The pieces spend some time in an acid solution to get rid of any oxidization that might have happened during the casting process. The sprue is completely removed by grinding with a burr. This is the point where any additional soldering usually happens (adding jump rings, earring posts, bales, etc.). • Polishing: The piece is meticulously polished and inspected. This is often one of the most labor-intensive parts of the process. For some pieces a tumbler can be used, which can polish many pieces at one time, get into all the nooks and crannies, while also hardening the piece (making it less bendable which is often undesirable).  • Stone Setting: Stones are set into a piece of jewelry in many different ways. The aesthetic and design of the piece, the hardness of the stone, the shape of the stone, are a few of the factors involved in choosing the appropriate method. Harder stones like diamonds and sapphires tend to be easier to set, while softer stones like amethyst and opals are much more delicate and are prone to chipping and cracking.  • Final Touches: Once the stone/s are set one carefully cleans up the metal around the setting by polishing. An ultrasonic cleaner (or hot water, soap, and a toothbrush) is used to clean behind stones and in crevices to make the piece clean and shiny.  In summary, this is how a piece of Kajs Jewelry is created. It is not always a fluid process and doesn't always follow these steps quite so seamlessly. It is almost impossible to answer how long it takes to make one piece (a question we often get asked), which might be a little more clear after reading about the steps involved. Being part of the creative process from concept to end product is very rewarding. Seeing an idea come to life is where I find beauty and joy in this tedious art.
global_05_local_5_shard_00002591_processed.jsonl/15475
How to Teach Your Kid to Read In the difficult world of COVID-19, teaching kids to read has fallen onto parent's shoulders. Find out how a child learns to read and what to do in case of reading difficulties. Due to COVID-19, a lot of education has fallen onto the parents’ shoulders. Our daily thoughts changed from “I need to notify my boss about this” to “how to teach my kid math in 3rd grade” and “how to teach my kid to read”. Online learning proved to be “an okay” alternative, but not an effective long-term substitute for in-school teaching. Teachers simply cannot support the kids via remote learning the way they can in person. The pandemic, on the other hand, is not letting up, with reports surfacing we might not return to “normal” for quite some time. The sad reality is the education system will not be able to support your kid the way it did in the past. And yes, it was not a perfect system, far from it, but with the pandemic staying, the education system might become even more ineffective Kobi Dyslexia Corona Schools Closed The job of teaching your kid to read and making sure they continue their development will most likely become your responsibility as a parent. All kids in the future may be semi-homeschooled. And we understand this might seem like a daunting task, so to make your life as parents just a little bit easier, we are going to take a moment to examine how a child learns to read and what you can do to support your kid’s reading development. Teaching Kids to Read Teaching your kid to read might be a very simple task. Kids often pick up language rules on the go, by listening to you talk or by reading simple stories. Every fourth child learns to read automatically. Teaching your kid to read only becomes a challenge when certain difficulties arise. Children might struggle with letter reversals (not knowing whether a letter is a b or a d), they might have issues connecting sounds to appropriate letters or blending those sounds together. In that case, you have a longer road ahead of you, but do not worry, every road leads to a destination. How A Child Learns to Read Reading is a complex cognitive skill with 25% (1 in 4) of the population having significant problems learning to read. For a person to become a fluent reader, a process called orthographic mapping needs to happen. Orthographic Mapping In very simple terms, orthographic mapping is the process that turns any word (even one that we haven’t seen before) into a sight word (we read it on sight). For example, when you see the word ‘read’ you immediately know to pronounce it /ri:d/. The same goes for the word pead. Because it follows the same language rules, you know you have to pronounce it /pi:d/, even if you don’t know the meaning. In this case, you cannot know the meaning, since the word does not exist. For any word to turn into a sight word, we need three skills.  • The letter-sound skill or Phonics (Attaching sounds to letters, ie. /h/ /a/ /t/) • Blending (Combining those three sounds into a word, ie. hat) • Acquiring the patterns (Knowing the rules of the language, ie. “a” in the middle of two consonants is pronounced as /a/). So for your kid to become a successful reader, you need to teach them about phonics, blending, and language rules. Whole-Word Approach VS Phonics Approach to Teaching Your Kid to Read What we have mentioned in the paragraphs above is the phonics approach to teaching your kid to read. The phonics approach teaches your kid a system that they can use to learn and form new words on the go. This is not what is traditionally thought in schools. Although private schools often use the phonics-based approach to teaching your kid to read, public schools still rely on the whole-word approach. The whole word approach does not break down words into syllables but relies on learning whole words by heart. This approach to teaching kids to read is useful for about 70% of children but ineffective for the rest. If your kid shows signs of reading difficulties or is falling behind in class, it is very possible they would prefer the phonics approach. Interested in a hands-on e-book that will guide you through a kid’s learning process? The four stages of learning to read Kids typically go through 4 stages of reading before becoming fluent readers. The stages differ in length but are all equally important. Your kid needs to overlearn every one of these stages for reading to become automatic. Phase 1: Pretend Reading Pretend Reading is the initial stage of the reading process. During this first phase, children are getting familiar with sounds, simple words, images, and other concepts related to reading. They can recognize these concepts from stories, previously read to them. Through these concepts, they get a first feel for the world around them and how language, letters, words, images work together in order to create a story. How to teach your kid to read during this phase Start teaching the kid by reading to them and with them. Ideally, you would read to your kid once a day for 15-30 minutes, although that can depend on the child’s ability to focus. Try setting up a schedule and sticking to it. Phase 2: Teaching Phonics Children pass on to phase two of the learning process when they are familiar with letters and sounds. They now have to start processing the relationship between those two, as well as the relationship between printed and spoken letters. When the eye sees the letter, the brain has to “hear” it. The issue with the English language is that the same letter (or a combination of letters) can sound out differently depending on the position in the word. For example, the letter “o” in “browse” is spoken almost as /a/, while the same letter “o” in “snow” is spoken as /o/. Fluent readers do not think about that or see that as an issue, but for a novice reader, all those rules make no sense. How to teach your kid to read during this phase Start putting more focus on rhyme games. You can play in the car on the way to the kindergarten or school as well as at home while you are preparing dinner. Rhymes help familiarize your kid with words and syllables that sound similar. More importantly, they are fun for kids who are learning to read. Continue reading to and with your kid. Phase 3: Teaching Blending Once a child has learned the basic sounds and connected them to appropriate letters, they need to start blending those sounds together to create meaningful words. Blending phonemes into words is a crucial phase of the learning to read process. It helps young readers decode unfamiliar words using letter-sound patterns when reading. The key to successful blending is practice. How to teach your kid to read during this phase Start by selecting 5 words your kid is familiar with. These must be one-syllable, regular words, like cat or fox. Try using words from stories you have been reading to your kid. Take the first word and write it down in front of your kid. Then break it down and point the finger to each of the sounds in the word, saying: “The first sound in the word cat is ‘k’. The second sound in the word cat is ‘a’. The third sound in the word cat is ‘t’.” Then spell the word out, slowly, so your kid can hear the separate sounds. “Kkkkaaattt”. Let your child repeat the exercise. Once he does, repeat for the next four words. The next day, choose 5 new words, plus the 5 words of the previous day. Start by repeating the words from the day before and continue by introducing the new word. Repeat this exercise every day for about 15-20 minutes, depending on how quickly your kid can follow. If your child can get this done in 10 minutes, raise the number of words you are teaching. Don’t forget to still read with your kid on occasion or play fun games with letters and sounds. Find more exercises in our Learn to Read: A Comprehensive Guide for Parents! Phase 4: Reading of Connected Text Once a child has mastered the basics it is time for the longest phase of them all. Reading of connected text. To develop into a fluent reader, the kid needs to practice, practice, and practice some more. Ideally starting with simple stories, gradually moving to more difficult, complicated texts. The goal of this phase is to train the brain so they read the written text the same way they listen to spoken words. How to teach your kid to read during this phase Start giving your kid more autonomy. Instead of you reading most of the story to them, let them read to you. Occasionally ask them about the story and encourage them to share their thoughts on the characters. After reading, ask them questions about what they have read to make sure they understood the content. Occasionally switch around and read them a good night story. The practice is crucial. Even more so for struggling readers. Encourage your kid to read as much as possible. If you can’t motivate them or if reading is difficult for them, download the Kobi app and start a free trial. The combination of reading from a tablet and Kobi’s motivational tools helps motivate kids so they start reading. Keep practicing for 15 minutes a day. Support your kid with Learn to Read: A Comprehensive Guide for Parents Share on facebook Share on twitter Share on linkedin Share on print Share on email Let's stay in touch Subscribe and receive updates about new features
global_05_local_5_shard_00002591_processed.jsonl/15496
Introduction to a Metric Engine My new video describes what a metric engine–as opposed to a search engine–would look like.  Think of your world before or without a search engine; how difficult getting  information would be.  But search engines primarily deliver textual data, not metric, not quantitative data.  A metric engine might have far reaching an impacts, like a search engine, and perhaps even more because the vast majority of … Continue reading Introduction to a Metric Engine Data Supply Chains Defined I’ve released Episode 9 of Conversations with Kip, Data Supply Chain Defined here YouTube Video Link.  It covers Finance, Performance Management, Risk and Customer Analytics,  and briefly shows the impact of them on reporting quality.    I think Conversations with Kip is the best financial system vlog there is (well, yes, I know, it is perhaps the only financial systems vlog there is) Continue reading Data Supply Chains Defined
global_05_local_5_shard_00002591_processed.jsonl/15502
Skip to main content Archives and Special Collections subject guides Subject Guides 1964 Alaska earthquake collections 1989 Exxon Valdez oil spill collections Advocacy collections African American history in Alaska collections Alaska Constitutional Convention and statehood collections Alaska Highway construction collections Alaska Native collections Alaska state legislators and legislation collections Anchorage charter commissions collections Anchorage history collections Anchorage winter Olympics bids ANCSA, ANILCA, and D-2 collections Anthropology collections Archives in Alaska Arctic research collections Aviation collections Businesses, clubs, and organizations Canol Pipeline collections Cold War era (1945-1992) collections Communications systems Creative writing collections Education collections Engineering collections Fine arts collections Fishing, fisheries, and canneries collections Fur Rendezvous related collections Fur trading, trapping, and farming Gardening and botany collections Geography and environmental studies collections Geology related collections Gold rush collections Governors of Alaska Greenspace collections Hope and Sunrise, Alaska related collections Iditarod Trail Sled Dog Race related collections International collections Journalism and broadcasting  Labor collections Law related collections LGBT related collections Mapping and surveying collections Matanuska Colony collections Medicine and health collections Miners and mining collections Non-English language collections Nursing collections Performing arts collections Permanent Fund Dividend Petroleum and natural gas related collections Poetry collections Senior Citizen Issues and Advocacy Seward, Alaska related collections Skiing and mountaineering collections Steamship related collections Student newspapers, Anchorage Community College and University of Alaska Anchorage Tourism in Alaska Women’s organizations and women’s issues collections World War II in Alaska collections The 1930s collections Subject Guide Staff Archives and Special Collections's picture Staff Archives and Special Collections 3211 Providence Drive Anchorage AK 99508
global_05_local_5_shard_00002591_processed.jsonl/15508
Boost logo Boost : From: Noah Roberts (roberts.noah_at_[hidden]) Date: 2007-01-28 16:08:40 Matthias Schabel wrote: > Any input on optimizing the library would be most welcome - I expect > that it should > be possible to have code using quantities run exactly as fast as for > built in types, > but that remains to be proven... So far that seems to run true if you use the highest optimization level for g++. In VC++ I'm finding otherwise. >> as deep a recursion level without a seg fault...this is actually by >> quite a margin...several orders of magnitude. Both versions fail >> at the >> same point. Here is test code...add a 0 to the end of tlim and I >> get a >> crash on the quantity version: > I'm personally more concerned about runtime performance than > recursion at this > point, but this is an interesting point... I'm not completely clear > on what you mean > about increasing tlim : do you mean that the equivalent code with > doubles can > recurse several orders of magnitude deeper, and mcs::units recurses > one order > of magnitude deeper than your quantity code? tlim is the variable in the code I pasted that sets the recursion depth.  Yours and mine both have the same issue and crash at the same level (or close enough). Doubles can recurse several orders of magnitude deeper.  If you add a zero to 50000 then that is the point with both mcs units, and my own similar construct, crash... > It looks like I'm having a dumb day today. Do you mean that there are > more operations > in the quantity code than there are for doubles??? There must be but I haven't looked at the asm. It is possible that even the recursive double function is getting inlined and the quantity version not but I used recursion hoping the actual functions wouldn't be and only the quantity would so I could get an accurate assessment of double vs. quantity speed. It is important in my case that they are the same or close to it. Having a recursion limit depth of 50,000 isn't a big deal..not for me anyway, but it is interesting to note. BTW, my project, which has different goals than yours but some similar constructs (and similar issues), is unitlib on sourceforge.
global_05_local_5_shard_00002591_processed.jsonl/15509
ldap attribute aliases Andrew Tridgell tridge at osdl.org Sat Jan 15 03:53:01 GMT 2005 > Active Directory also includes some attribute supertypes in returned > output (eg. "name" for the RDN value of an entry). hmm, ok. We're treating 'name' as a normal attribute in ldb at the moment. We should probably switch it to be a generated attribute based on the RDN (thats the "relative DN", or leftmost portion of the DN, > The use of "distinguishedName", which is supposed to be an abstract > attribute supertype, is somewhat non-standard. But what isn't? ok, thanks. For the moment I've added distinguishedName as a special Cheers, Tridge More information about the samba-technical mailing list
global_05_local_5_shard_00002591_processed.jsonl/15532
Best Pastry With an Unpronounceable Name | Best of Chicago 2014 | Food & Drink | Chicago Reader Best Pastry With an Unpronounceable Name Kouign amann at Bad Wolf Coffee Critics' Picks Yes, it can be annoying when the only obstacle between you and one of the most magnificent pastries you will ever eat is a tongue twister of a name. But it's not so hard. Just say "queen ah-mahn." It means "butter cake" in Breton, the language traditionally spoken in Brittany, in northwest France. What should really annoy you is that Bretons have been making this magnificent confection—composed of dozens of layers of pastry and salted butter covered in a crust of caramelized sugar—for at least 150 years, but until recently it was virtually unknown in the U.S. That's right: kouign amann existed, and you were eating cupcakes. Don't waste any more time. Go to Bad Wolf Coffee right now and try Jonathan Ory's version. Ory claims it's not hard to make kouign amann. (There's the outrage again: if it's so easy how come no one was doing it?) That may be true, if, like Ory, you're a pastry chef—here in Chicago, Floriole and Hewn also produce delicious specimens. But Ory's is the best. His pastry is rich and buttery without being greasy, and its flattened shape ensures maximum surface area for the caramelized sugar. It's pastry bliss. Again, that's "queen ah-mahn." What other unpronounceable glories are those Bretons hiding? In This Section: showing 1 to 30 of 113 Start Over
global_05_local_5_shard_00002591_processed.jsonl/15540
Re: Autonomous System Sanity Protocol William Allen Simpson <> Tue, 29 April 1997 20:04 UTC Received: from cnri by id aa11310; 29 Apr 97 16:04 EDT Received: from by CNRI.Reston.VA.US id aa18685; 29 Apr 97 16:04 EDT Received: from mailing-list by (8.6.9/1.0) id FAA14848; Wed, 30 Apr 1997 05:56:46 +1000 Received: from munnari.OZ.AU by (8.6.9/1.0) with SMTP id FAA14818; Wed, 30 Apr 1997 05:50:27 +1000 Received: from by munnari.OZ.AU with SMTP (5.83--+1.3.1+0.56) id TA20898; Wed, 30 Apr 1997 05:50:21 +1000 (from Received: from Bill.Simpson.DialUp.Mich.Net ( []) by (8.8.5/8.8.5) with SMTP id PAA07237 for <big-internet@munnari.OZ.AU>; Tue, 29 Apr 1997 15:50:16 -0400 (EDT) Date: Tue, 29 Apr 97 19:08:10 GMT From: William Allen Simpson <> Message-Id: <> Subject: Re: Autonomous System Sanity Protocol Precedence: bulk Unfortunately, connectivity was down all weekend to morningstar (until monday afternoon), and all these messages have been propagating to my mailbox all night.... Catching up: > From: Andrew Partan <> > > [The problem came in two parts. ... The second part is that the routes > > didn't get widthdrawn correctly - they still existed in various parts of > > the Internet some 24 hours after B disconnected itself from the Internet.] > > > > Right, and this was the part I found most interesting. Of course, I'd claim > > that failures like this are almost inevitable in DV type systems! :-) > This was a failure in the propogation of the routing information > - such failures can happen in DV or MP or any routing system. One of the features of securing the routing information would be to prevent these software bugs in the first place. In this case, the bad routes would not have been believed, and therefore not propagated. The bugs would have been detected much sooner (before shipping), as simple tests would have prevented any routing from occuring. An ounce of prevention is worth a pound of cure. And I agree with Noel, these particular forms of bug (bogus announcement with truncated path, and failure to withdraw) were both more likely to occur with DV style propagation.
global_05_local_5_shard_00002591_processed.jsonl/15559
Web design tips Are you learning web design? I’ve been working professionally as a web developer for over 20 years and this website is where I share my web design tips. Check out my website layouts for interface designs, navigation prototypes, responsive design demos and commonly requested page layouts such as my perfect liquid layouts. See my CSS tutorials section for some of my best CSS techniques and tricks. My experimental web design section contains more unusual ideas and experiments that I’ve explored over the years. Some of these are quite fun. I’m also interested in search engine optimisation and have worked in this field professionally for a number of years. Many of my articles cover the methods I use to improve website rankings in Google. See my web design portfolio for examples of websites I’ve built. I’ve also been an active member on Stack Overflow for over 10 years and often help answer people’s web design questions. CSS tutorials See the CSS techniques and tactics I use when building websites Web Design Courses Learn how to build websites from scratch with these recommended HTML and CSS courses.
global_05_local_5_shard_00002591_processed.jsonl/15560
TDE in Standard Edition on SQL 2019 What is TDE? Setting up TDE Encrypting an Existing Database with TDE Understanding Keys and Certificates with TDE How Secure is TDE – And how to Prevent Hacking Thoughts on Query Performance with TDE Enabled Migrating or Recovering a TDE Protected Database Recovering a TDE Protected Database Without the Certificate TDE – Regenerating the Database Encryption Key Rotating TDE Certificates Without Having to Re-Encrypt the Data Checking for Membership of a Specific Active Directory Group SELECT IS_MEMBER('db_owner'); RDS encryption vs TDE If you’re starting to use cloud services, the number of options available can be confusing. Particularly when they may seem to do the same thing. If you’re on AWS, and you want to create a SQL Server instance on RDS (Relational Database Service), then you potentially have a couple of different options for enabling encryption at rest. If you’re deploying an Enterprise Edition SQL Server instance then you could use TDE (Transparent Database Encryption), the technology most of us in the SQL Server world already have some awareness of. RDS also has its own at-rest encryption though, so what’s the difference? The answer is that (at least in terms of what they protect) they are pretty much equivalent. RDS encryption can be used with whichever database platform you choose to use – Aurora, MySQL, MariaDB, PostgreSQL, Oracle or SQL Server. As many people want this functionality it made sense for Amazon to provide it. Only Oracle and SQL Server have their own built-in equivalent – TDE – so in these cases you have a choice of which want you want to use. You may prefer to use the one you are familiar with from your on-premise deployments, or you may prefer to go with the RDS one. A key difference is going to be database backups. RDS handles backups for you, and of course these backups will be encrypted whichever option you choose. However, you would be wise to also take your own set of backups which you store outside the RDS instance. With RDS encryption these backups would not be encrypted, however with TDE they would be. Even this though is not a killer point, with SQL Server (from 2014 onward) you have backup encryption, so even if you were using RDS, you could use this to make sure that externally stored backups were also encrypted. A big reason you might want to use the RS encryption is price. TDE is only available on SQL Server Enterprise Edition, whereas you can use RDS encryption on Standard Edition also. UPDATE (03/12/2019): From SQL Server 2019 TDE is available in standard edition, so price is no longer a factor. The difference in cost for SQL Server Standard vs Enterprise licences is significant. Last time I checked the standard price was around $2,000 dollars per CPU core for Standard, but $7,000 with Enterprise. The price difference in RDS is also large. If I look at a “db.m4.xlarge” instance which is 4 virtual CPUs and 16GB RAM, then the price quoted is roughly  $750 dollars a month for SQL Server Standard Edition, $1,650 for Enterprise. Of course, there are differences between each technology in terms of how you set it up and manage it, how and where the keys are stored etc. But if you’re confronted with the choice, then mostly, you can just pick the one you prefer, it doesn’t really matter. What does matter is that if you prefer not to pay for Enterprise Edition, then you still have the option of at-rest encryption. Which is great news. TDE – Regenerating the Database Encryption Key As discussed in the last post, with TDE (Transparent Data Encryption), you generally do not need to change the Database Encryption Key (DEK) as it is separately protected by a certificate in the master database and you can rotate the certificate periodically. Rotating TDE Certificates without re-encrypting data As also mentioned, if you did need to change the DEK then this will be a resource intensive operation as SQL Server will need to decrypt all your existing data using the existing DEK value, then re-encrypt it with the new one. Nonetheless, there may be scenarios when you wish to do this. There could be a security breach where you don’t feel confident unless all the keys are updated. Or you might need to support a higher level of encryption than had been previously used. More commonly, you may publish a database from a development environment and wish to regenerate the keys so that there are unique to your production environment. In either case, the process is simple and transparent from your point of view, you issue the ALTER DATABASE ENCRYPTION KEY command, specifying REGENERATE and the encryption algorithm you wish to use: In the previous post I talked about rotating the certificate, and it’s worth noting that you can perform both these actions at the same time e.g. Where you have a lot of data in the database this could take a while to complete. You can check the status of the operation by looking in the dm_database_encryption_keys view: SELECT k.encryption_state, k.create_date, k.regenerate_date,k.percent_complete FROM sys.dm_database_encryption_keys k INNER JOIN sys.databases d ON k.database_id = d.database_id Note that the encryption_state is set to 4 which means “key change in progress”. In a brief test I compared the time taken to change the key with the time taken to encrypt a fresh un-encrypted database. Surprisingly it was about the same, I had expected it would be longer due to the need to decrypt and re-encrypt each data item. Rotating TDE Certificates without re-encrypting data I talked previously about why we have each of the layers in the encryption hierarchy used to support TDE (Transparent Data Encryption). Understanding Keys and Certificates with Transparent Data Encryption (TDE) At the time I mused about why we need the encryption key in the database itself, rather than just encrypting with the keys associated with the certificate stored in the master database. I mentioned one reason – that these keys are intended for asymmetric encryption which has a higher overhead (the DEK is a symmetric key). In a light-bulb moment, the more important reason has come to me since, and that is about key rotation. In any form of encryption, it is possible that at some point an individual could gain access to the keys. For example, administrators of your SQL Server instance can freely make a backup of the certificate with a password they choose which can be used to encrypt it. Whilst that in itself is not a problem, it is good practice to periodically refresh those keys so that if someone gained access to an old copy it would be of no use to them. Or if you are aware that there has been a potential breach of security, you can quickly replace your keys. If you have any form of security certification in your organisation, then it is likely it will be stipulated that you must change these in a defined timescale-  e.g. annually. However, this forms a problem if you want to change the key that is used to actually encrypt the data, to change that you would need to decrypt all the data using the old key and re-encrypt it using the old one. That would be an intensive activity, but also could lead to vulnerability while the process was underway. As a result, many forms of encryption use separation between the actual key that is used for the encryption, and another object that is used to protect that key. You can back up the latter separately outside the database to ensure you can recover your data in case of a failure. With TDE we have the database encryption key (DEK) – the key that is actually used to encrypt/decrypt the data, stored encrypted in the database itself. In the normal run of things, we never access this key directly and never store it anywhere else, so it should be fairly safe, i.e. we should rarely have to worry about replacing it – though the functionality exists to allow us to do so if we require. Then we have the certificate which is used to encrypt that key – without the certificate the key is useless and TDE can’t work. The certificate we keep a password protected backup of, so is a bit more vulnerable/public. Due to that, certificates have an expiry date. This date is a reminder to us that, as a good practice, we should create a new certificate and use that going forward before the existing one expires. TDE doesn’t stop working if the certificate expires, it is up to you to monitor your certificates and replace them when they come to the end of their life. If you think about it, we might not like it if TDE did enforce this, it would be a big impact if we suddenly could no longer read or write to our database. Of course, MS could probably implement functionality to lock us out, but still allow us to use the certificate for rotating the key, but still it would probably upset a lot of people and be less than “transparent”. If we look at the sys.certificates view we can find our TDE certificate and examine the expiry date: SELECT name, subject, expiry_date WHERE name = ‘MyTDECert’; I didn’t specify an expiry date for this certificate when I created it, so it was automatically given one that was a year in the future. Let’s create a new certificate, and this time we’ll specify a longer expiry. Then we rotate the encryption to use that one. WITH SUBJECT = ‘Certificate used for TDE in the TestTDE database for years to come’, EXPIRY_DATE = ‘20201231’; And let’s have a look at the values that has in the store: What do we mean by rotation? Rotation is the process of moving from the old certificate to the new one. In this case all that happens is that the encrypted value of the database encryption key (stored in our TDE protected database) is decrypted with the old certificate, re-encrypted with the new certificate, and that new encrypted value is stored in the database, overwriting the old one. The Key value itself hasn’t changed, just the object protecting it, and as such we can still read/write data from the database without any additional work. To rotate the certificate used is as simple as: And you’re done. The operation is almost instantaneous, shouldn’t require any database down time, or create additional overhead on your server. Though in production I’d still do it when things are quiet just in case anything goes wrong! Recovering a TDE protected database without the Certificate • One encrypted by the machine account • Once encrypted by the SQL Server service account The method is going to involve: sqlservr.exe -c -m -s {InstanceName} C:\> sqlcmd -s {InstanceName} Then at the prompt that opens up within your command window: 2> GO Reboot your new server –the whole server, not just SQL Msg 15151, Level 16, State 1, Line 7 TO FILE = 'C:\Test\MyTDECert'       FILE = 'C:\Test\MyTDECert_PrivateKeyFile',       ENCRYPTION BY PASSWORD = 'UseAStrongPasswordHereToo!£$7'   Other articles about TDE: What is Transparent Data Encryption? Setting up Transparent Data Encryption (TDE) Encrypting an existing database with TDE Understanding Keys and Certificates with Transparent Data Encryption (TDE) Migrating or Recovering a TDE protected Database TDE and backup compression – still not working? TDE and backup compression – still not working? Outcome: Succeeded Duration: 00:00:02 Msg 3189, Level 16, State 1, Line 1 Damage to the backup set was detected. Msg 3013, Level 16, State 1, Line 1 VERIFY DATABASE is terminating abnormally. Outcome: Failed Duration: 00:00:03 5 percent processed. Msg 3183, Level 16, State 1, Line 2 Msg 3013, Level 16, State 1, Line 2 RESTORE DATABASE is terminating abnormally. More articles on TDE What is Transparent Data Encryption? Setting up Transparent Data Encryption (TDE) Encrypting an existing database with TDE Understanding Keys and Certificates with Transparent Data Encryption (TDE) Migrating or Recovering a TDE protected Database Migrating or Recovering a TDE protected Database TO FILE = 'C:\Test\MyTDECert'       FILE = 'C:\Test\MyTDECert_PrivateKeyFile',       ENCRYPTION BY PASSWORD = 'UseAStrongPasswordHereToo!£$7'   In summary you need: • The database backup file • The backup of the certificate • The backup of the private key • The password used to encrypt the private key Working on the new SQL instance, the steps are straightforward. Create a Database Master Key if one doesn’t exist ENCRYPTION BY PASSWORD = 'UseAStrongPasswordHere!£$7'; Restore the Certificate and Private Key FROM FILE = 'C:\Test\MyTDECert.cer'    FILE = 'C:\Test\MyTDECert_PrivateKeyFile.pvk',    DECRYPTION BY PASSWORD = 'UseAStrongPasswordHereToo!£$7' Msg 15208, Level 16, State 6, Line 56 Restore the Database Msg 33111, Level 16, State 3, Line 2 Cannot find server certificate with thumbprint ‘0x682C8797633B9AD8875967502861CCAE33ECAD66’. Msg 3013, Level 16, State 1, Line 2 RESTORE DATABASE is terminating abnormally. So what do I do if I can’t restore the certificate? Other articles on TDE: What is Transparent Data Encryption? Setting up Transparent Data Encryption (TDE) Encrypting an existing database with TDE Understanding Keys and Certificates with Transparent Data Encryption (TDE) TDE is commonly described as “at-rest” encryption, i.e. it protects your data wherever it is stored on disk. This includes the database files, any backups taken (including Log and Differential), and any data that may get temporarily persisted to TempDB (when you use TDE to encrypt any database on an instance TempDB will get automatically encrypted also). TDE does not however give any additional protection against those accessing data by querying the database. If you have access to the database then TDE transparently allows that to continue without any change in the functionality. Understanding that, if we are implementing TDE we can only expect it to fully protect us from people who have access to the file system but do not have access to the data stored through any other avenue – for instance by querying SQL Server. In most scenarios we probably don’t plan on there being such a person, i.e. we don’t grant the world read access to our database servers and say “go on, feel free, have a play”. In most production systems access is tightly tied down, and if you work in an environment where this is not the case then you probably have things you should address before you start looking at implementing encryption. In reality though, mistakes or oversights happen, or sometimes malicious parties are able to gain access they should not have. What TDE offers us is, like many other forms of encryption, an additional layer or protection. The first line of defence gets breached, but there is still the next one to get past. There is also the scenario of database backups, where these might be stored off the database server and even offsite. TDE gives us some assurance that in these scenarios the data is protected irrespective of the access restrictions in force in those other places. We’ve all read of breaches which were enabled by a database backup being stored on a location that was easier to access than it should have been. Of course this protection of the backups could simply be achieved by using backup encryption – which is a separate feature of SQL Server and does not have the performance overhead associated with TDE. So, if we are specifically implementing TDE rather than just backups it might be that we are specifically trying to protect ourselves from someone gaining direct access to the database files. That could be seen as quite an edge case – but that doesn’t mean it isn’t worth protecting against. One thing to remember with TDE is that it is not (on its own) going to protect you against someone who has Admin right either over the box where SQL Server is installed, or over SQL itself. A local Admin can add themselves as an administrator on SQL – though they will need to restart the instance to do so. And an administrator on SQL can do pretty much whatever they like, including exporting a copy of the certificate and key used by TDE so that they can use that to read stolen data. Still, there is some level of protection gained from TDE and if you combine it with tight access controls, and auditing, then it can help you reduce the scenarios where your data is at risk. Hacking TDE There is a great post and accompanying video out there by Simon McAuliffe that shows a method that can be used to break TDE: Simon’s not a big fan of TDE and he makes a good argument, the reality is that a lot of the time people are using it to tick a box “yes, all our data in encrypted at rest” and no-one questions the particular scenarios where it is – and is not – offering protection. While I agree with Simon’s points, I don’t feel as strongly as he does. You just need to be making an informed decision to implement TDE based on a full understanding of what it can and cannot protect you from. It’s not a magic bullet, but it’s not totally useless either. Nonetheless the method Simon outlines for breaking TDE is concerning as it only requires basic level read access over the server to be able to grab all the objects you need to crack a TDE protected database. Sure, you need to have a certain knowledge base to be able to do that, but protection that is based on an attacker not having the right skillset, is not of the greatest value. I won’t go into Simon’s method in full detail – you can check out his post for that. But I’ll give you enough of a summary so you can hopefully understand the principles involved. What he details is an inevitable vulnerability that he specifies would not be unique to TDE – but common to any similar technology. It’s back to the “T” of TDE again, “Transparent”. The concept of TDE is that it is fully self-contained and managed in the background for you by SQL Server. It doesn’t require you to supply additional passwords or keys when querying data, and it doesn’t need to access any objects stored outside of the SQL instance. Let’s look again at the diagram with the encryption key hierarchy: Starting at the bottom, each key is protected by the one above it. But what happens when we get to the top? There is nothing left to protect the uppermost DPAPI keys, so they must be stored unencrypted somewhere on the system. You simply cannot get around that, SQL needs to be able to – all on its own – encrypt and decrypt data. Even if we say we’ll encrypt the DPAPI keys, what will we encrypt them with and where will we store that object? You can’t get away from the fact that at some point we need to store an unencrypted key, or password, or whatever, somewhere. As a consequence, it’s remarkable easy to pick these root DPAPI keys up, though you need a few basic hacker skills/tools to be able to do anything with them. Once you have the DPAPI keys, you can use those tools – in combination with a copy of the database files (or backup) from the Master database to obtain the SMK and thus break encryption all the way back down the hierarchy. So what has just happened? A skilled and motivated hacker with mere read permissions to your server was able to steal your files and decrypt your data. Just the scenario you implemented TDE to prevent. They keys are held in the following directory on most Windows systems: And by default, as long as you have read access to the file system you can read them. Preventing this Hacking of TDE Fortunately there is a basic action you can take to mitigate this. Strangely, this step isn’t mentioned (as far as I know) in any of the other documentation about setting up TDE. The solution is that when you are setting up TDE you should take an additional step. Very simply, you need to secure this directory so that only Local Administrators to the server, the LOCAL SYSTEM account, and the SQL Server service account can read anything within it. Once that’s done TDE should be offering you what you expect, i.e. casual read access to the server will not allow people to read your data. Only administrators would be able to gain access to the data, and as we’ve discussed already – Admins can access your TDE protected data anyway. The only downside of doing this is that you are restricting access to the DPAPI (Data Protection API) from any other accounts. If you are running a pure SQL server then this should not be a problem – i.e. the server is for an installation of SQL and nothing else. If you also have application services running on the same box though, and these services wish to use encryption, then you may need to extend the permissions assigned to that directory. Though a better choice would be to move these services off the box. Understanding Keys and Certificates with Transparent Data Encryption (TDE) I’ve been taking a bit of a deep dive into understanding Transparent Data Encryption (TDE). As part of that I’ve been reading a lot of blog posts, stack overflow answers and technical documentation to try and deepen my knowledge. Within that I’ve found a lot of contradiction I’ve needed to overcome. In particular this has been around what objects you need to recover an encrypted database to another SQL Server – be that when you’re doing a straight restore, working with log shipping, or using Availability Groups. Most of the solutions offered work, but many describe additional steps that are not necessary. I feel that part of the problem is that people are misunderstanding the basics about encryption keys in SQL Server, so I thought it would be worthwhile going over that in a bit of detail before digging deeper into TDE in general. I think it’s important to understand this stuff clearly, because then you have a clear view of when you’re protected and when you are vulnerable. If we’re engaging in encryption then we clearly have a desire for security – to be sure of that we have to be clear in our understanding. Keys in SQL usually have three components (and this is the same for the Column Encryption Keys in Always Encrypted that I spoke about previously): Understanding Keys and Certificates with Always Encrypted The Key itself – Usually can be thought of a number expressed in binary format. Long and random enough to make it difficult to guess even by brute force attempts. Another object that’s used to protect the key – This object might be another key, it might be a certificate, or it might just be a password. This object is used the encrypt the key. The encrypted value of the key – Formed from the original value of the key, encrypted by the protecting object. In SQL we rarely (maybe even never) see the actual value of the key. We have the encrypted version and we usually know what object was used to encrypt it. That second object may even be another key that is itself encrypted by a third object. When it comes down to it though, the actual thing that is used to encrypt or decrypt data is the Key itself, not the encrypted value, and not the hierarchy of objects that may have been used to protect it. So, all I really need to read your data, is your key. Let’s look at that in the context of TDE. Here’s a standard diagram from books online that shows the hierarchy of encryption for TDE. There are other ways of working with TDE but this is the standard: So, right down at the bottom of the diagram is the Database Encryption Key (DEK). That is what is used to encrypt/decrypt the data in the database. It sits in the database itself. So when you backup the database the DEK is held in the backup. BUT – the DEK is itself encrypted by the certificate that sits in the master database, so even if someone has your backup they can’t access the key – and nor can any system they try and restore your backup to. So they also can’t access your data. To be able to decrypt the DEK, the certificate is required. In fact, what is really required is the private key associated with the certificate as that’s what’s used for encrypting stuff. The private key however is itself encrypted by the Database Master Key (DMK) that sits in the master database. So you’ll be forgiven at this stage for thinking that in order to read our backup of the database, we need the backup (containing the DEK), the Certificate (include the private key) and the DMK. When you realise that the DMK is itself encrypted by the Service Master Key(SMK), and that the SMK is also encrypted then you might think you need to include those too – and whatever encrypted the SMK. Where will it end!? In reality we just go back to our certificate and its associated private key. Let’s say I have a certificate called MyTDECert. I can (and must) backup this up outside of the database. If this is lost, then so is my data. The command for backing it up looks something like this: TO FILE = 'D:\Temp\MattTest\MyTDECert'       FILE = 'D:\Temp\MattTest\SQLPrivateKeyFile',       ENCRYPTION BY PASSWORD = 'C0rrecth0rserbatterystab1e'   When I back this up I specify a password to encrypt the Private Key. Remember that the Private Key was already encrypted by the DMK? Well, this backup certificate command doesn’t just encrypt it a second time – what would be the point of that? No, the reason I need to supply a password is that the command retrieves the unencrypted version of the private key, re-encrypts it with the password INSTEAD and then that is what gets save to disk. Remember that at the point I run the command SQL has access to all the objects, all the way up the chain, that are used for the encryption. So it has no problem getting the actual value for the Private Key. Now, when I restore that certificate to – let’s say another instance of SQL Server)- the command looks like this: FROM FILE = 'D:\Temp\MattTest\MyTDECert'       DECRYPTION BY PASSWORD = 'C0rrecth0rserbatterystab1e' Considering what the BACKUP command did, you can intuit that the above command will do the opposite. It first of all decrypts the Private Key using the password supplied. Then it encrypts it again using the DMK for the local instance before saving it in the master database locally. Remember it is the Actual Values of Keys that get used for encryption – not their encrypted value. So the private key for this certificate is exactly the same as it was where we backed it up from – though the encrypted value will be different as it has used a different DMK. So if I now go to restore a copy of a database whose DEK has been encrypted with this certificate onto the new instance I can do so without any problem. Many articles will tell you that you also need to migrate the DMK from your old instance, and some will say that you also need the SMK. This is simply not correct – I mean, it will work if you do that (in the right order) but it isn’t necessary. And in some scenarios it may simply not be possible. Imagine that the instance you are migrating to is already using encryption based on its current SMK and DMK, if you replace those with the ones from the instance you are migrating from then you are going to break existing stuff. So all you need to restore a database protected by TDE is the database backup, the certificate/private key, and the password specified when the certificate and key were backup up. Equally that’s all someone else needs too, so make sure those things are protected. In my next post we’ll look at a possible way of hacking TDE and the additional steps you need to protect yourself to make sure TDE is giving you the level of protection you expect. When that post is live you should be able to see a link to it in the comments.
global_05_local_5_shard_00002591_processed.jsonl/15566
Ultrathin needle can deliver drugs directly to the brain Tiny implant opens way to deliver drugs deep into the brain This undated image provided by researcher Canan Dagdeviren in January 2018 shows an implant that can precisely drip medications deep into the brain by remote control. The device could mark a new approach to treating brain diseases—potentially reducing side effects by targeting only the hard-to-reach specific sections that need care. (Canan Dagdeviren/Massachusetts Institute of Technology) "We can infuse very small amounts of multiple drugs compared to what we can do intravenously or orally, and also manipulate behavioral changes through drug infusion," says Canan Dagdeviren, the LG Electronics Career Development Assistant Professor of Media Arts and Sciences and the lead author of the paper, which appears in the Jan. 24 issue of Science Translational Medicine. "We believe this tiny microfabricated device could have tremendous impact in understanding brain diseases, as well as providing new ways of delivering biopharmaceuticals and performing biosensing in the brain," says Robert Langer, the David H. Koch Institute Professor at MIT and one of the paper's senior authors. Targeted action Drugs used to treat brain disorders often interact with brain chemicals called neurotransmitters or the cell receptors that interact with neurotransmitters. Examples include l-dopa, a dopamine precursor used to treat Parkinson's disease, and Prozac, used to boost serotonin levels in patients with depression. However, these drugs can have side effects because they act throughout the brain. "One of the problems with central nervous system drugs is that they're not specific, and if you're taking them orally they go everywhere. The only way we can limit the exposure is to just deliver to a cubic millimeter of the brain, and in order to do that, you have to have extremely small cannulas," Cima says. The MIT team set out to develop a miniaturized cannula (a thin tube used to deliver medicine) that could target very small areas. Using microfabrication techniques, the researchers constructed tubes with diameters of about 30 micrometers and lengths up to 10 centimeters. These tubes are contained within a stainless steel needle with a diameter of about 150 microns. "The device is very stable and robust, and you can place it anywhere that you are interested," Dagdeviren says. Previous studies have shown that muscimol induces symptoms similar to those seen in Parkinson's disease. The researchers were able to generate those effects, which include stimulating the rats to continually turn in a clockwise direction, using their miniaturized delivery needle. They also showed that they could halt the Parkinsonian behavior by delivering a dose of saline through a different channel, to wash the drug away. "Since the device can be customizable, in the future we can have different channels for different chemicals, or for light, to target tumors or neurological disorders such as Parkinson's disease or Alzheimer's," Dagdeviren says. "Even if scientists and clinicians can identify a therapeutic molecule to treat neural disorders, there remains the formidable problem of how to delivery the therapy to the right cells—those most affected in the disorder. Because the brain is so structurally complex, new accurate ways to deliver drugs or related therapeutic agents locally are urgently needed," says Ann Graybiel, an MIT Institute Professor and a member of MIT's McGovern Institute for Brain Research, who is also an author of the paper. Measuring drug response The researchers also showed that they could incorporate an electrode into the tip of the cannula, which can be used to monitor how neurons' electrical activity changes after drug treatment. They are now working on adapting the device so it can also be used to measure chemical or mechanical changes that occur in the brain following treatment. Explore further Making brain implants smaller could prolong their lifespan More information: C. Dagdeviren el al., "Miniaturized neural system for chronic, local intracerebral drug delivery," Science Translational Medicine (2018). stm.sciencemag.org/lookup/doi/ … scitranslmed.aan2742 Journal information: Science Translational Medicine Citation: Ultrathin needle can deliver drugs directly to the brain (2018, January 24) retrieved 4 December 2020 from https://medicalxpress.com/news/2018-01-ultrathin-needle-drugs-brain.html Feedback to editors User comments
global_05_local_5_shard_00002591_processed.jsonl/15568
The 2 Main Reasons Why Jiu-Jitsu Is The Single Best Martial Art For Self-Defense And Fighting This is still one of the most common questions about Jiu-Jitsu. In this video, I will explain my perspective on... • Why the early UFCs answered the question about which martial art was most effective… and why those answers are still relevant today [0:56]  • How the original structure of the UFC, which included 3 or 4 fights per night to win, and no-gloves and barely any rules, shaped the world of Mixed Martial Arts  • How Royce Gracie really forced the world to learn Jiu-Jitsu (hint: it wasn’t just the fact he won his fights… it was how he won) [7:50]  • Why if you’re doing Jiu-Jitsu correctly, it’s never a fair fight, and the odds are always in your favor [9:20]  • Why the MMA glove was created, and why it’s misleading for what’s effective in a real life fight [11:40]  • Why you may want to revisit the first couple UFCs to see what happened for yourself.  If you practice Jiu-Jitsu for self-defense... Continue Reading... Training to Be Strong Everywhere I once asked Rickson, what he felt was the weakest part of his game and it wasn't so much his answer that surprised me but his explanation that made a tremendous impact in how I still train myself to this day. He told me he has no weaknesses in his game, he's trained all the weaknesses out so that anywhere the fight goes he’s comfortable.  He explained to me anytime he felt like one area of his game was weaker than the others he would work on it until he felt completely comfortable there. I apply this principle to my training to this day. I love training Jiu-Jitsu, and although just “rolling” is fun, it's not the type of training I really do to help my game improve. For me rolling is better for getting a workout and although there will still be some improvement over time, it's is not as beneficial for me as focusing on a specific aspect of my game to develop. When I'm focusing on improving my Jiu-Jitsu, I usually ask myself what part of my game do I currently... Continue Reading... Jiu Jitsu Journey Interview with Henry Akins by Shawn Mozen Shawn is one of the foremost authorities in kettlebell training in the world and a lifelong martial artist.  He found out about me and Hidden Jiu-Jitsu from a Faceobook ad and I was lucky enough to have him come by Dynamix MMA and train for a few days while he was visiting in Los Angeles. We talked a little about the site, my ideas on jiu-jitsu and I shared with him some basic ideas and adjustments to make some techniques more effective. In this video we review some details on why framing on the bottom doesn't always work and another option. We also reviewed a couple examples of how normal BJJ training can leave you wide open to be hit and the small changes that can implement in your training that can keep you safe from strikes.  The styles do blend together. To check out all the amazing fitness and strength and conditioning stuff Shawn does go here Continue Reading... Ever since attending Rickson's Black Belt only JJGF Self Defense certification seminar. I have been flooded with people asking what he covered. It was about 100 different Self Defense techniques that Rickson wanted to make sure were not forgotten in Gracie Jiu Jitsu. But the crazy part is with 20 Black Belts there Rickson showed so many concepts, details, and techniques we had never seen! Here is one he taught us I think is very important for everyone to master. It is a Street Defense that also leads into a submission when someone grabs you from behind around your waist. A couple details that really help this technique to be successful is the way I step to be able to grab the ankle and also how I make my opponent fall to the ground.  I found if the person is big and strong or if they have weight on their foot it's not possible to grab the ankle and pull it off the ground, instead I take my feet off the ground and sit all my weight into the thigh while just holding the ankle to... Continue Reading... Kron Gracie Vs. Asen Yamamoto HJJ Breakdown Congratulations to Kron Gracie on his victory against Asen Yamamoto, and to all of you who saw the fight! For me every experience in life is an opportunity to learn and grow.  I wanted to use the fight as an opportunity to help you get a deeper understanding of Jiu-Jitsu. After the fight I heard a lot of people comment on "How the heck did Yamamoto escape that super tight armlock!???" Yamamoto looked like he should of been done! But as you all know there is an escape for everything, and fortunately he used the right move for the right situation.  In this video I'm going to share with you, I show and explain how to make your armlock super tight and prevent the roll out escape. The details and adjustments are so small if I don't point them out they may stay Hidden to you! Continue Reading... Ahh the good old days of Gracie Jiu Jitsu!... How you train is how you're going to react in a fight. Butt scooting, inverting and so many other things you see in modern jiu-jitsu exist because people have forgotten the true purpose of jiu-jitsu. The basics is what works! That's why I teach the basics taught to me by Rickson Gracie. Continue Reading... 50% Complete
global_05_local_5_shard_00002591_processed.jsonl/15596
Providing Work Instructions to Job Operators in Microsoft Dynamics 365 for Finance and Operations & AX November 14 2018 In a typical manufacturing company, the factory personnel will have received training on the machines and tools they work with. Yet for the manufacture of certain products, it is often the case that special work instructions are needed, especially in Engineer-to-Order environments where novelty can be a daily occurrence. An ERP system provides the needed information for production orders like the Bill of Material and the Routing steps. Those are the basics. In addition, the CAD drawing is often provided to the floor workers. Any additional work instructions would have to be entered in some other way, like notes or attached documents. In this article we will explore what is possible in Microsoft Dynamics 365 for Finance and Operations and in AX 2012. Add notes to BOM lines (use paperclip) or/and add notes to routing steps. The last tab of the routing step has an option for this. (Paperclip not needed, but the attached note or file will show up under the paperclip after this) Microsoft Dynamics 365 for Finance and Operations work orders Use the Document group (a new feature in D365FO only) to define documents and notes that should be available to operators using the Job card device (also a new feature in D365FO only). About Evert Bos More about Evert Bos jepowell's picture Finally someone brought some clarity to this. Thanks Evert!
global_05_local_5_shard_00002591_processed.jsonl/15607
Hackers attempt breaking into a Bitcoin Wallet with $690 Million net worth $690 Million Bitcoin Wallet November 6, 2020 Reading Time: 2 minutes For almost a year, a  bitcoin wallet estimated to contain 69,370 BTC translating to $690 million was circulating in the hands of hackers for decryption. This wallet is considered to be among the top 7 largest bitcoin holders in circulation as reported by a site that tracks the amounts contained in crypto wallets. It was as well reported that a Google security engineer made attempts to access an amount worth $300,000 in a lost wallet. The report was made public after the wallet hackers leaked the information to a market forum called  “All private keys” to crack the wallet. Alon Gal, the CTO of Hudson Rock, a cybercrime intelligence organization, discovered that the $690 million BTC had been advertised for hacking operation on RaidForum a site best known to hack Bitcoin wallet with huge assets. The business in RaidForum has been to acquire the crypto wallets from victims and attempt to decode them, failure to yield success, they often sell them to other groups for further hacking attempts. As per the information issued by Alon Gal, the bitcoin wallet might have been made up by fraudsters, and it allegedly did not contain the said $690 million worth of Bitcoin. Bitcoin experts as well explain that making up bitcoin wallets is possible; besides, it can be speculatively made to look like it contains large sums of BTC in it, which on the contrary, is merely a fraud. “The wallets with password going up to 15 characters that are jumbled up with foreign characters, uppercase, lowercase, special characters, and many more, would be simply impossible to crack the wallet,” A company selling recovery services of wallets suggested. As per the statement made by Jeremy Gosney, Terahash CEO, and founder, he claimed that cracking the password would only be possible if it contained few characters. He further commented on the attempts made by the hackers was a dead-end situation, and according to him, he would not waste any resources on the same. Submit a Comment Start earning profit Trade crypto like a pro Related Posts… Pin It on Pinterest Share This
global_05_local_5_shard_00002591_processed.jsonl/15608
Baby Gifts for New Parents So, a friend and her husband are expecting a new baby. You're overjoyed for them, but you have no idea what kind of gift to buy. You know they'll need some basic baby gear, but you don't want to arrive bearing the same-old baby gifts you've seen at other showers over the years. You want to bring a gift that wows the new parents and shows them that you gave careful thought to your gift choice. Ideally a baby gift should be both useful and stylish. It should address a parent's or baby's need, whether that need is practical, like blankets and diapers, or emotional, like a thoughtful keepsake. The type of gift you buy depends on how well you know the parents, what their interests are, and of course, what you're willing to spend. Practically Perfect • Clothing. If you choose to buy clothing for the baby, make sure it's in bigger sizes. Newborn shirts, dresses and pants may be absolutely adorable to look at, but your friend's baby will grow out of it faster than you think. Plan ahead and get sizes the baby can wear 6 months to a year in the future. And don't forget to plan for the season. If you get a spring baby an outfit she'll be able to wear at 6 months old, make sure it will be suitable for the chilly fall weather.
global_05_local_5_shard_00002591_processed.jsonl/15642
Sharing is caring! The Elder Scrolls game franchise is one of the longest running and most successful ones ever. Taking in consideration that there are already five installments in the franchise, it’s easy to see how The Elder Scrolls managed to gather such a massive fan following. Additionally, Skyrim which is the last installment is one of the most successful RPG themed games on both console and PC platforms. The game is still being played to this day, especially since Bethesda launched a re-mastered edition of it during 2016. Seeing how much success Bethesda has been having with The Elder Scrolls franchise it comes as a surprise that the game company isn’t in a hurry to create another installment. We think it’s safe to say that if Bethesda does decide to launch The Elder Scrolls 6 this day, without any advertisement the game would sell faster than hot bread. With that being said, the question that sits in everyone’s mind right now is why isn’t Bethesda focusing on this game franchise. Well, the answer is quite simple Bethesda has other projects which are being developed right now. While not everyone might know this, Bethesda is the creator of the critically acclaimed Fallout franchise. During 2015 Bethesda launched Fallout 4 and this game, same as with Skyrim, got the whole gaming community riled up. Now that the VR market is booming, Bethesda wants to capitalize on that by creating a full VR edition of Fallout 4 and this is one of the reasons why The Elder Scrolls 6 is not being developed right now. Another important factor to why The Elder Scrolls 6 is being pushed back is because the developers behind the game want to change things up and implement new technology in the game. The main speculation is that Bethesda wants to introduce artificial intelligence in the game. The only problem with this is that the necessary technology isn’t out yet. Bethesda’s official development team actually confirmed this. What we can get from this is that we might have to wait a couple of years before we can get our hands on The Elder Scrolls 6.
global_05_local_5_shard_00002591_processed.jsonl/15650
The assumption that all intangible value is constrained to that which can be expressed through code is flawed. A better argument would be bootstrapping may be infeasible for start-ups producing tangible goods. >If you’re sincere about getting into startups, start learning to code today. Tech start-ups, yes, and a diminutive definition of technology at that (you know what you don't need to know for, say, an interior design, drilling technology, or infrastructure start-up?). We all have a tendency to over-articulate our fields - it's in the structure of how normal science progresses [1]. I tend to do it with finance, coding, and engineering. Just as everyone need not know how to tranche out a capital structure or Fourier transform their cat, not every problem need be (nor can be) addressed through code. [1] http://www.amazon.com/The-Structure-Scientific-Revolutions-e...
global_05_local_5_shard_00002591_processed.jsonl/15673
Subscribe to NSLog(); Header Image SpamSieve Since 2.0 Since the 2.0 release, SpamSieve's stats on my system are: Good Messages.......655 Spam Messages.......2317 False Positives.....25 False Negatives.....3 Not bad. The highest I got on the previous version was about 93%, which still meant I had to deal with a lot of spam. The false positives number is disconcerting, but I started with a blank whitelist, and as that grows to allow messages from various folks, the accuracy will tend upwards. 5 Responses to "SpamSieve Since 2.0" 1. I wish I got spam as well so I can try all these nice spam filters... Somehow, the spammers must have missed me. Well, I hid a honeypot email address in a HTML comment on my site. Let's see how long it takes for it to be discovered. 2. Erik: the high false positives number is likely due to having a lot more spam messages than good ones in your corpus. In SpamSieve 1.x, this was helpful for catching more spam. In 2.x, it's probably best not to have more than twice as many spam messages as good ones. 3. SpamSieve Erik posted his SpamSieve 2.0 stats, and I'm equally impressed. Still getting more false positives than I like, but I'm sure that will improve as I'm diligent about telling SpamSieve what it's doing wrong through the scripts. What I love... 4. Who in the hell opens messages that look like this? This is a screenshot of the subject column of my spam folder. If people didn't... 5. Ok, I get no spam at all, here's why. 1. I don't post my email address to sites that make it public, including RSS/BLOG/Webcrossing/etc. and Usenet, IM profiles, etc. 2. I do put my email address in the signature that I use in, but I only send email to real people from there, not mailing lists. 3. I do subscribe to Yahoo! and MSN Groups regularly, however they have their own webmail that I never bother to check but once each 6 months or so. 4. I use Javascript on my website to hide my email address but still make it link-able. for my Resume I'm switching to PDF exclusively with a Word document available upon request. I tried munging, doesn't work well, newbies don't know how to delete the .removethispart. for some reason in their new mail messages. I tried entity encoding and it actually made me a target for web crawlers, wound up having to get a new shell account because of that. 5. I love freeshell ( because they offer shell for the life of their service for just $1.00 or €5.00 with web (15MB) and gopher (15MB) hosting, email (15MB), webmail access, and of course really great BSD shell access. Trackback URI | Comments RSS Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/15675
January 10, 2017 Article I: Name and Principal Office Section 1: Name. The name of the Chapter shall be New York State Chapter of the American Solidarity Party, hereinafter referred to as “the Chapter.” Section 2. Principal Office. The principal office of the Chapter shall be located at such place as shall be designated by committee resolution from time to time. Section 3. Other Offices. The Chapter may also have offices at such other places, within or without its state, where it is qualified to do business, as its business and activities may require, and as the committee may, from time to time, designate. Article II: Nonprofit Purposes Section 1. Purposes. The Chapter is organized exclusively for one or more of the purposes as specified in Section 527 of the Internal Revenue Code. Section 2. Specific Objectives and Purposes. The specific objectives and purposes of the Chapter shall be to further the cause of the American Solidarity Party in American politics. Section 3. Authorization and Limitations. The committee shall have the authority to exercise all powers conferred upon State Chapters affiliated with the American Solidarity Party as subcommittees. These include but not limited to the power to accept donations, or any interest therein, provided that only such powers be exercised as permitted by a nonprofit Party that qualifies as a Party described in Section 527 of the Internal Revenue Code. It shall not engage directly or indirectly in any activity which would cause the loss of such qualification. In all circumstances, the authority of the Chapter shall be limited by the operation of law and the rules of the American Solidarity Party governing State chapters. Article III: Officers of the State Chapter Section 1. Number. The number of State Chapter Officers shall be an odd number with a minimum of five (5) and a maximum of fifteen (15) and shall be known as the Chapter Officers Committee. The Committee may increase or decrease the number by amendment of the Bylaws, but no decrease shall shorten the term of any incumbent Officers. Section 2. Qualifications. Officers of the Committee shall also be members of the American Solidarity Party and must sign the Affirmation of Principles of the Chapter “I affirm my recognition of the sanctity of human life, the necessity of social justice, our responsibility for the environment, and the possibility of a more peaceful world.” Officers must be eighteen (18) years of age. Officers who accept a position with another political Party will be considered to have resigned from their seats. Section 3. Powers and Compensation. Subject to the provisions of the laws of this state and any rules of the American Solidarity Party and these Bylaws relating to action required or permitted to be taken, the activities and affairs of the Chapter shall be conducted and all powers shall be exercised by or under the direction of the committee. The Officers receive no compensation but may be reimbursed for reasonable expenses as determined by the Committee. Section 4. Duties. It shall be the duty of the Officers to: (a) Perform any and all duties imposed on them collectively or individually by law, American Solidarity Party Rules and by these Bylaws; (b) Appoint and remove, employ, supervise, and discharge, prescribe the duties and fix the compensation, if any, of all Officers, agents, and employees of the Chapter; (c) Meet at such times and places as required by these Bylaws. Section 5. Election and Term of Office. Officers shall be elected by the Chapter members. Each Officer shall be elected to a term of two (2) years and except in the case of the resignation, removal, death or incapacity, Officers shall hold office until the expiration of their terms and election of their successors. Successors for Officers whose terms are expiring shall be elected at the biennial Chapter Organizing meeting by vote of the members. This Organizing meeting shall be schedule for the Month of ______. The nomination and election procedures used for the election of Officers may be established by the committee, provided, however, that such procedures are consistent with these Bylaws. Section 6. Election Procedures. Any member can nominate a candidate to the slate of nominees for the National Committee by presenting a petition supporting nomination to the secretary of the National Committee. Candidates shall be elected by the method designated by the Officers Committee. The methods shall include allowing for nominations up to one week before the election and for the casting of ballots electronically and by means that allow all State chapter members to vote. Section 7. Removal. Upon the vote of a majority of the Officers then in office, the committee may remove any Officers for cause at any regularly scheduled meeting of the committee or any special meeting of the committee called for that purpose. Grounds for terminating Officers include, but are not limited to, acts or behavior detrimental to the purposes of the Chapter and continued nonattendance at Committee Meetings. Section 8. Resignation. Any Officers may resign from office at any time by delivering a resignation in writing to the Committee. The resignation shall take effect on the 14th days from date the notice is given, once accepted by the Committee, or at any later time as specified in the notice. The acceptance of the resignation, unless required by its terms, shall not be necessary to make the resignation effective. Section 9. Vacancies. The committee, by vote of a majority of the Officers then in office, Shall elect Officers to fill any vacancies on the committee as the next order of business. Officers so elected shall serve until the next Chapter organizing meeting, at which the election of the Officers is in the regular order of business. Section 10. Place and Time of Meetings. The Committee shall hold a regular meeting monthly for the transaction of business, unless quorum cannot be met, and hold biennial Chapter organizing meeting for the purpose of election of Officers and Officers and for the transaction of other business. The location of the regular meetings and Chapter Organizing meeting shall be at such place as determined by the committee. Section 11. Special Meetings. Special meetings may be called by the Chair or a simple majority of the Committee and shall be held at such time and place as those calling it shall designate. Section 12. Notice of Meeting. Notice of the time and place of each regular or special meeting, or Chapter Organizing meeting, shall be given to each Officers in writing at least five (5) days in advance. The notice of a special meeting shall state the purpose for the meeting. Notice of a meeting need not be given to any Officers who submits a signed waiver of notice, or who attends the meeting without protesting lack of notice. Section 13. Quorum and Voting. The presence of a majority of the Officers then in office shall constitute a quorum of the Committee for the transaction of business. Officers are required to attend all normally scheduled committee meetings. Section 14. Action by the Committee. Any action required or permitted to be taken by the Committee may be taken without a meeting if all Officers consent in writing to the adoption of a resolution authorizing the action. The resolution and the written consents shall be filed with the minutes. Participation of one or more Officers by telephone conference or other equipment allowing all persons participating to hear each other at the same time shall constitute presence at a meeting. Section 15. Nonliability of Officers. The Officers shall not be personally liable for the debts, liabilities, or other obligations of the Chapter. Article IV: Officers Section 1. Officers and Duties. At the Chapter Organizing meeting, the Committee shall elect Officers of the Chapter, consisting of a Chair, Vice Chair, Secretary, Treasurer, and Vice Treasurer which constitute the Executive Team. The term of office for Officers shall be one (1) year. The Committee may elect such other Officers as it determines necessary and may appoint them to the Executive Team. (a) Chair. The Chair shall preside at meetings of the Committee and the Executive Team. The Chair, or her/his designee, is the official spokesperson and chief executive Officer of the Chapter, and subject to the control of the Committee, shall, in general (i) administer all of the business and affairs of the Chapter; (ii) appoint agents and employees of the Chapter, define their powers, duties, terms and compensation and to delegate authority to them; (iii) have authority to sign, on behalf of the Chapter, documents or instruments necessary or proper for the Chapter’s regular business; (iv) report to the Committee; (v) have authority to conduct banking activities on behalf of the Chapter including but not limited to, the authority to open and close bank accounts, sign checks, and perform other banking duties as may be necessary to Party business and accounts; (vi) designate an Officer to fulfill the duties of any other Officer who is absent from a meeting for the duration of that meeting; and (vii) perform all duties incident to the office of Chair. (b) Vice Chair. The Vice Chair shall have duties as assigned by the Chair and the Executive Team, and assumes the Chair’s duties if he/she is unable to serve. (c) Secretary. The Secretary shall be custodian of records, responsible to give notice of and attend meetings, conduct all correspondence, maintain contact information for each Officer, Officers and employee, and track the attendance of all meetings/events and minutes. The Secretary shall distribute the meeting agendas which are set by the Chair or the Committee as a whole in advance. Every agenda shall include reports from the Chair, the Treasurer, and any existing subcommittees. (d) Treasurer. The Treasurer shall perform all duties customary to that office and shall keep full and accurate records of all funds, receipts, and disbursements in the Chapter’s books. The Treasurer shall prepare a financial report and present it to the Committee at each meeting. The Treasurer shall deposit monies in the Chapter’s name with the National Party Treasurer. The Treasurer shall not have authority to conduct banking activities on behalf of the Chapter, other than through the National Treasurers account. At the point that the State Chapter deems it necessary to operate independent State Chapter accounts, these bylaws will be revised as necessary and the State chapter shall incorporate under the nonprofit corporation laws of _____State and the Chapter shall register as a 527 entity with the Internal Revenue Service and prepare applicable financial disclosure reports. (e) Vice Treasurer. The Vice Treasurer shall have duties as assigned by the Treasurer and the Executive Team, and assumes the Treasurer’s duties if he/she is unable to serve. Section 2. Qualifications. Any person who signs the Affirmation of Principles and serves on the Committee may serve as an Officer of the Chapter. Officers who affiliate in an elected position with another political Party will be considered to have resigned from their offices. Section 3. Removal. Upon a majority vote, the Committee may remove any Officer. Section 4. Resignation. Any Officer may resign at any time via written resignation to the Committee, effective as specified in the notice. The acceptance of the resignation is not necessary to be effective. Section 5. Vacancies. The Committee may elect Officers to fill vacancies. But for resignation, removal, death, or incapacity, Officers serve until the Chapter Organizing meeting’s election of their successors. Section 6. Compensation. The Officers shall perform their duties voluntarily and without pay, except that they shall be reimbursed for any reasonable expenses approved by a majority of the Committee. Article V: Subcommittees Section 1. Subcommittees. The Chapter may have such subcommittees as designated by Committee resolution, and which may consist of other non-officer members. They shall act in an advisory capacity or in a manner as directed by the Officers. Section 2. Meetings and Action of Subcommittees. Meetings and action of subcommittees shall be governed by and held in accordance with the provisions of these Bylaws concerning Committee meetings. Section 4. Local Subcommittees. All Local chapters of the State Chapter shall be considered Subcommittees of the State Chapter. Article VI: Membership Section 1. Membership. The Chapter shall not be a Membership organization in the legal sense, meaning that Members shall not have an ownership stake in the organization. The term “Members” is used herein in its colloquial sense. Membership shall be defined to include and be limited to all persons over the age of 18 registered with the American Solidarity Party and residing within New York State. Article VII: Records Section 1. Maintenance of Records. The Chapter shall keep at its principal office: (a) Minutes of all meetings of Officers and committees of the Committee; (b) A copy of the Chapter’s Bylaws; (c) Adequate and correct books and financial records; (d) Copies of all correspondence and filings with the IRS. Article VIII: Conflict of Interest Section 1. Conflict of Interest. No Officers or Officer may enter into a contract or receive compensation from the Chapter without approval of a majority of the Committee. Officers may be compensated for services if he/she abstains from a vote in which the Committee invokes this clause and authorizes the services. All interested Party transactions must meet the following requirements: (a) The transaction must be in the best interests of the Chapter; (b) The transaction must be determined to be fair and reasonable to the Chapter; (c) The transaction must be approved without the participation of the interested Party in the discussion of the transaction and the approval process; (d) The minutes of the meeting at which such a transaction is approved shall reflect that: (i) disclosure of the benefit to the interested Party was provided; (ii) the interested Party abstained from voting; and (iii) it was determined that the Chapter could not obtain a more advantageous transaction with an unrelated Party. Article IX: IRC 527 Tax Exemption Provisions Section 1. Limitation on Activities. The Chapter is a subcommittee of the American Solidarity Party and is organized and operated primarily for the purpose of directly or indirectly accepting contributions or making expenditures, or both, for an exempt political function, defined as influencing or attempting to influence the selection, nomination, election or appointment of an individual to a federal, state, or local public office or office in a political organization. The Chapter may engage in activities that are not exempt function activities, but these may not be its primary activities. The Chapter shall not carry on any activity prohibited to one defined by Section 527 of the Internal Revenue Code. Section 2. Prohibition against Private Inurement. No part of the net earnings of the Chapter shall inure to the benefit of, or be distributable to, its Directors, trustees, Officers, or other private persons, except that the Chapter shall be authorized to pay reasonable compensation for services rendered and to make payments in furtherance of its purposes. Section 3. Distribution of Assets. Upon the dissolution of the Chapter, its assets remaining after payment of all debts shall be remain with the American Solidarity Party Article X: Fiscal Year Section 1. Fiscal Year. The Fiscal Year for the Chapter shall end on December 31. Article XI: Amendment of Bylaws Section 1. Amendment. These Bylaws may be altered, amended, or repealed and new Bylaws adopted by approval of a two thirds majority of the Members. Any such modification of the bylaws must be submitted in writing to the Secretary and placed on the agenda in advance of the meeting at which the modification is to be discussed and voted upon. Voting on such bylaws shall be conducted by rules adopted by the Officers to include procedures that allow electronic voting and other methods which allow all members to vote. Article XII: Construction and Terms Section 1. Procedure. If the Bylaws are silent as to any procedural aspect of any action or meeting, the procedures used shall be determined by a quorum of the Officers Committee or by the Executive Team in the interests between the meetings of the Committee. Section 3. Invalidity. Should any of the provisions or portions of these Bylaws be held unenforceable or invalid for any reason, the remaining provisions and portions shall be unaffected. Section 4. IRC. All references in these Bylaws to a section or sections of the Internal Revenue Code shall be to such sections of the Internal Revenue Code of 1986 as amended from time to time, or to corresponding provisions of any future federal tax code. Article XII: Indemnification Section 1: Indemnification. Subject to the limitations of this Article XII, the Chapter shall indemnify a person who is or was an Officer or Officers to the extent authorized by law. (a) The Chapter shall indemnify any Officers or Officer against expenses and liabilities actually or reasonably incurred personally in a proceeding to which the Officers or Officer was a Party because he or she is or was a Officers or Officer, unless liability was incurred because the Officers or Officer breached or failed to perform a duty he or she owed to the Chapter and the breach or failure to perform constituted any of the following: (i) a willful failure to deal fairly with the Chapter or its Officers in connection with a matter in which the Officers or Officer had a material conflict of interest; (ii) a violation of criminal law; (iii) A transaction from which the Officers or Officer derived an improper personal profit; or (iv) Gross negligence or willful misconduct. The termination of a proceeding by judgment, order, settlement or conviction, or upon plea of no contest or equivalent does not alone create a presumption against indemnification. (b) Indemnification is not required if the Officers or Officer has previously received indemnification or allowance of expenses in connection with the same proceeding. (c) Unless otherwise provided by written agreement between the Officers or Officer and the Party, the Officers or Officer seeking indemnification shall make a written request which shall designate one of the following means for determination: (i) By majority vote of a quorum of the Committee or a committee of Directors consisting of Officers who are not then parties to the same or related proceeding; (ii) By independent legal counsel selected by a quorum of the Committee or its committee or if unable to obtain such a quorum or committee, by a majority vote of the full Committee, including Officers who are parties to the same or related proceeding; (iii) By arbitration; or (iv) By an affirmative vote of a majority of the Officers provided, however, that Officers who are at the time parties to the same or related proceedings, as plaintiffs or defendants or in any other capacity, may not vote in making the determination. Any eligible expenses shall be paid to the person requesting indemnification within sixty (60) days of the Chapter’s receipt of the written request. (d) If a Officers or Officer is determined to be entitled to indemnification as to some claims or matters, but not as to others, the indemnification may be limited as appropriate. (e) The Committee may provide indemnification and/or expenses in advance of a final determination of any proceeding in which an employee or agent was a defendant because of his/her actions in that capacity, provided the Committee first determines the employee or agent acted in good faith, reasonably believing the action to be in the Chapter’s best interest. (f) The rights to indemnification and advancement of expenses provided by, or granted pursuant to this Section, shall inure to his/her heirs, executors and administrators. (g) No amendment or repeal of this Section shall reduce the obligations of the Chapter with respect to any proceeding based upon prior occurrences.
global_05_local_5_shard_00002591_processed.jsonl/15708
Open main menu Information for "Winterborne Tomson, Dorset Genealogy" Basic information Display titleWinterborne Tomson, Dorset Genealogy Default sort keyWinterborne Tomson, Dorset Genealogy Page length (in bytes)6,259 Page ID52020 Page content languageen - English Page content modelwikitext Indexing by robotsAllowed Number of redirects to this page3 Counted as a content pageYes Page protection EditAllow all users (infinite) MoveAllow all users (infinite) View the protection log for this page. Edit history Page creatorWardKM (talk | contribs) Date of page creation11:03, 9 April 2010 Latest editorKjrn5sons (talk | contribs) Date of latest edit18:27, 26 November 2019 Total number of edits51 Total number of distinct authors18 Recent number of edits (within past 90 days)0 Recent number of distinct authors0 Page properties Transcluded templates (16) Templates used on this page:
global_05_local_5_shard_00002591_processed.jsonl/15711
King Louie is a character in The Jungle Book. In the 1967 film, he was voiced by Louis Prima. In Talespin, he was voiced by Jim Cummings. In the 2016 film, he was voiced by Christopher Walken. He never appears in the sequel. He played King Bumi in Avatar: The Last Airbending Animal, as well as in Avatar: The Last Airbender (Nuclearzeon Style) He is a crazy old earthbender He played Dexter Jettster in Animation Star Wars He is a diner He played The March Hare in Snow White in Wonderland (Disneystyle8 Style) He is a hare King Louie played Friar Tuck in Robin Hood (Animated Style) Heis a badger King Louie played Uncle Albert in Kiara Poppins and Sawyer Poppins King Louie played Ottoriki in GoGoRiki (Disney and Sega Style) King Louie played Darwin in The Wild Berenstain Bears Movie, The Wild Berenstain Bears Movie and Lion Cubs Go Wild He is a monkey King Louie played Rafiki in The Cat King and The Cat King 2: Danny's Pride He is a baboon King Louie played UncleIroh in Avatar The Last Airbender Animal Style He is a Iroh King Louie played Bashful in Bridgette White and the Seven Mammals He is a dwarf King Louie played Yao in Nellan and Nellan 2 He is a Chinese man King Louie played Donald Duck in Conker and the Beanstalk, The Prince and the Pauper (Disney and Sega Style), A Kenai Movie and Who Framed Jose Carioca He is a duck King Louie played Bombay in El Arca (CoolZDane Style) He played Otto in Leap Hood He is a dog He played the Beast in Beauty and the Orangutan He is a beast King Louie played Scuttle in The Little Jewish Mexican Girl He is a seagull King Louie played Bruno in Charityrella He is a dog King Louie played Rabbit in The Many Adventures of Ben Ali Gator He is a rabbit King Louie played Danny in Apes Don't Dance He is a cat King Louie played Basil of Baker Street in The Great Ape Detective He is a mouse King Louie played Pongo in 101 Primates He is a dalmatian King Louie played Captain Gutt in Microraptor Age 4: Continental Drift He is a pirate captain King Louie played Rafiki in The Equestria King (Zachary the Dino) King Louie played Chief Roofless in The Dog and the Cat
global_05_local_5_shard_00002591_processed.jsonl/15722
Weight Management Archives - PERLA Health PCOS and Disordered Eating PCOS and Disordered Eating Polycystic ovary syndrome (PCOS) is a common disorder of the endocrine system in women, characterized by ovulatory problems, weight gain, and signs of excess androgens such as acne, excess hair growth, and scalp hair loss. Many of the symptoms of PCOS can lead to body... Not sure where to start? Download our 'Understanding PCOS' eBook! Your guide in on the way. Check your inbox!
global_05_local_5_shard_00002591_processed.jsonl/15726
In the question What should we look for in a kitty companion for our rabbit? we learned that cats and rabbits can make good friends for each other, but it was stated the litter boxes could be a problem. What do I need know or do concerning litter boxes when a rabbit and cat share the same home. You likely do not want a rabbit to share a littler pan with a cat (or dog) due to possible parasite transfer. Cat (and dog) feces may contain worm eggs. Contact with this is the primary way a house rabbit can contract worms. Another issue you may run into with sharing a litter box is odor, and while you may be tempted to use cat litter for it's odor fighting properties, this can be harmful to a rabbit. Rabbits have sensitive airway passages and the dust form clay litter can cause a lot of problems. Instead, ensure that the cat box is in a place only accessible to the cats and not the rabbits. In contrast, indoor cats with low exposure to outside animals (like mice), are much less likely to be worm egg carriers. If you are going to try to share a litter pan, then pick the litter that's best for the rabbit not the cat. Use hardwood pellets I have personally found that hardwood pellets make the best litter for a rabbit as it is edible and does the best job at moping up their pee (which is usually what makes the box stinky). However, while ideal for rabbits, it is likely not going to do a great job at masking the smell of cat feces. If the smell is intolerable, then you should not combine litter pans. ref: Worming your Rabbit | improve this answer | | • @JamesJenkins I hadn't thought about that. Hope it's now covered. – virtualxtc Feb 13 '14 at 3:30 Your Answer
global_05_local_5_shard_00002591_processed.jsonl/15730
This question has to do with scientific claims about the universe and could be asked in a number of ways. To my own very imperfect understanding, claims about "the universe" cannot be scientific claims in any proper sense. As claims about a single entity they do not and could not submit to standard principles of verification. (They might even be subject to Hume's arguments about miracles.) As claims about a totality that presumably includes the claimants, they fall prey to paradoxes of self-reference, such as sets of all sets, and so forth. Yet scientists and philosophers of science regularly do make highly considered claims about "the universe." They also make claims about the possibility of a "unified physical theory" that would seem to involve some of the same sorts of problems. Is this just a manner of speaking on the part of scientific pragmatists? Or do physicists understand themselves to be making perfectly valid claims about the physical universe, implying that such claims can be made from "outside" the physical totality, so to speak? Which suggests dualism of a nearly Cartesian order. Perhaps I am misunderstanding something obvious here. How do philosophers of physics deal with such issues? Is this a well understood problem? Do the potential fallacies here in any way relate to the emergence of "other universe" theories as an attempt to provide some apparatus of comparison for "this universe"? • So the claim the Earth is round is not scientific because there is only one Earth? No, because it can be verified by multiple paths, and none of them reach an edge. The same way, we can test most propositions about the Universe because they would have multiple effects, each testable. – user9166 Feb 22 '16 at 21:26 • Perhaps I'm not stating this correctly. In one sense there is only "one" of any particular thing, but they must nonetheless fall under some concept of what they are "like." The "universe" seems to have very different status as a completely singular totality, a totality that includes whatever can be said about it. But I guess I'm not expressing this clearly, because I don't have my terminology clear. It isn't an original idea. but I'll have to find how it is stated by others. – Nelson Alexander Feb 22 '16 at 22:01 • This ignores the fact that the roundness of the Earth can be confirmed by multiple paths. Every general-enough fact, e.g. geodesic following in General Relativity, is in some sense a fact about the whole universe, that can be tested at various points and considered true if it does not seem to vary. The universe is not a non-repeatable event, like a miracle or a single case of a disease remission, it is a large collection of events that are statistically related. So the whole notion of uniqueness leading to non-repeatability does not really apply. – user9166 Feb 22 '16 at 22:11 • If I discovered something so unique there was nothing like it elsewhere at all, say a lost alien spacecraft inside which the laws of physics were different, I could still make a whole science out of studying it, if it were large or complex enough to consider all the various parts important. – user9166 Feb 22 '16 at 22:18 There is no problem studying unique systems in science (the earth or the sun are examples). As for the problem of totality: cosmology is not about the totality of facts but about the global structure of the universe. | improve this answer | | • Thanks, but our "sun" can be compared to other "suns" and placed in a range of measurements under the concept "sun." There is no logical problem saying "the sun" is X years old. But to say "the universe" is X years old is quite different. All, any statement about the universe would seemingly be, in some sense, about the statement as well. As in Russell's paradox of set of all sets. Perhaps I am not getting my idea across, because I don't have a clear grasp of it. – Nelson Alexander Feb 22 '16 at 1:42 • @NelsonAlexander there could be a problem if we thought that cosmological models include ourselves but it's not really the case. Cosmological models don't even include galaxies since they take the universe to be homogeneous (just like the model of a gas in statistical mechanics needs not assign precise states to every single particle to make predictions). The global structure of the universe does not predict life, consciousness and what we think about the universe. – Quentin Ruyant Feb 22 '16 at 14:01 • @NelsonAlexander about unique systems: take the theory of continent formation. We don't have other planets with continents and oceans to compare yet we model the earth... – Quentin Ruyant Feb 22 '16 at 14:02 • Right, theories about the whole have multiple consequences, each separately open to having alternate states due to different causes if the theory did not hold. Each falsifying alternate explanation is usually separately testable. – user9166 Feb 22 '16 at 21:29 Abduction is the key word for understanding the approach they take. Scientists have gotten in the habit of speaking about their discoveries as ontological truths, such as "The Higgs Boson exists." In actuality, their data merely suggests that they have observed data which fits well with their model in a region of the state-space which could have potentially falsified their theory. However, science has received enough trust from the people that they are permitted to make such ontological truths. They are not the only ones. For example, the Christians are permitted to say "He is risen" when one might have required them to say "I believe he is risen." Abduction is the inference to the best hypothesis. It is saying "out of all the possibilities I can think of, hypothesis A fits the data so much better than any other hypothesis that I am going to presume A is actually true." Making this assumption is very tricky, and many are not even aware they are making it! Physical Cosmologists are proposing models for how our universe works. If one of them shows great promise, they may change their wording to start suggesting it as an ontological truth. This is perhaps justified by the fact that English is a messy language, and one may use syntax associated with ontology to express semantics which are empirical in nature. If at some point they truly believe their model is correct, then they have engaged in abduction. | improve this answer | | • Thanks, but this seems more about the bracketed status of all scientific claims. I am not asking about truth claims. I am wondered about the specific problems of scientific claims about a "totality" or "single case" such as "the universe," not "parts of the universe," where there is no possible comparison, repetitions of events, or "external stance." I'm not sure your answer addresses that. – Nelson Alexander Feb 21 '16 at 22:33 • @NelsonAlexander One can develop a theory of everything which makes claims about what happens in the "single case," which are naturally unverifiable by scientific means, and also makes a plethora of "parts of the universe" cases which can be verified. Typically the goal of physical cosmology is to try to identify the "simplest" explanation for all that is. – Cort Ammon Feb 21 '16 at 22:35 • I think one might draw an analogy to how, in cryptography, we say "breaking this by brute force woudl require 3/4 of the energy in the known galaxy," when all we have are some scribbles on the paper to suggest that's hwo much energy it would take. Nobody can test it. However, it is effective to make such a claim (btw, thats how much energy it takes to simply advance the 256 bit counter needed as part of cracking AES by brute force... 3/4 of the known energy in the galaxy!) – Cort Ammon Feb 21 '16 at 22:37 • Okay, then it does seem "universe" is not really an object of science per se, but a pragmatic term with various definitions. But it still seems to necessarily consist in observations about a totality that by definition includes the observer and the observations. Which is a logical problem unlike estimating energy in the galaxy, which is just a practical problem. – Nelson Alexander Feb 21 '16 at 23:32 • 1 @NelsonAlexander I find science always removes the observer from their model, unless something forces them to include it. Science's fundamental assumptions of independent identically distributed variables does not work unless one can show that the effect of the observer can approach zero. I don't think they like to admit that one, though. The cosmologists are only concerned with values which are theoretically too large for the observe to influence, but you are correct. Inclusion of the observer an the observations (and the observe's actions) is a major limitation of science. – Cort Ammon Feb 22 '16 at 0:00 Your Answer
global_05_local_5_shard_00002591_processed.jsonl/15731
Layer Effects – transfer from one layer to the next. Good to know tip. Some people may know this – but it is very useful for those who don’t. Using Photoshop cs2 Q: How do I copy blending option effects (layer style) from one layer to the next? A: Simply place your cursor over the effect layer – Hold down on alt and than drag the effects to the layer where you want the effects to be added. If you do not hold down on both alt and shift than your effect will simply be replaced and not multiplied. Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/15752
A Level and IB History Revision Guides: Mr Allsop History Manage series 2475067 Audio podcast revision guides for AS, A2 and IB History courses in 19th and 20th Century History. 20 episodes
global_05_local_5_shard_00002591_processed.jsonl/15753
Minisode: Never Have I Ever Manage episode 264011586 series 2464243 At the behest of critics (and a few listeners), we dive into Never Have I Ever, which has a great lead performance by Maitreyi Ramakrishnan as a grief-stricken teen who directs her energy into becoming popular and having sex. We discuss the cultural comedy, the show's nuanced treatment of female agency, and debate the mother/daughter relationship. We also have some strong thoughts about what's not working, including the best friends playing stock caricatures and that voice over by famed tennis star, John McEnroe. In homework: Joe checks out "Spanish Gossip Girl" series Elite (also on Netflix) and Brenna reads through listener emails, including a call for resources for a UK Librarian. Wanna connect with the show? Use #HKHSPod on Twitter: • Brenna: @brennacgray • Joe: @bstolemyremote Have something longer to say or a minisode topic? Email us at See you on the page and on the screen! 113 episodes
global_05_local_5_shard_00002591_processed.jsonl/15769
Previous section. Protocols for Interworking: XNFS, Version 3W Copyright © 1998 The Open Group Call Arguments struct createargs { diropargs where; sattr attributes; }; diropargs and sattr are defined in Basic Data Types . Return Arguments union diropres switch (stat status) { case NFS_OK: struct diropok diropok; default: void; }; fhandle, fattr and stat are defined in Basic Data Types . RPC Procedure Description diropres NFSPROC_CREATE(createargs) = 9; The file name is created in the directory given by dir. The initial attributes of the new file are given by diropok.attributes. A reply status of NFS_OK indicates that the file was created, and reply diropok.file and reply attributes are its file handle and attributes. Any other reply status means that the operation failed and no file was created. This procedure is used to create regular files only; directories may be created by the NFSPROC_MKDIR procedure (see Name ). Note that this call will succeed even if the file already exists. Return Codes Indicates that the call completed successfully and the results are valid. Some sort of hard error occurred when the operation was in progress. This could be a disk error, for example. Permission denied. The caller does not have the correct permission to perform the requested operation. Is a directory. The caller specified a directory in a non-directory operation. No space left on device. The operation caused the server's file system to reach its limit. Read-only file system. Write attempted on a read-only file system. File name too long. The filename in an operation was too long. Disk quota exceeded. The client's disk quota on the server has been exceeded. The fhandle given in the arguments was invalid. That is, the file referred to by that file handle no longer exists, or access to it has been revoked. Why not acquire a nicely bound hard copy? Contents Next section Index
global_05_local_5_shard_00002591_processed.jsonl/15848
10 Ways to Survive Christmas with Your Ex A 27 Ways Novella There are hundreds of things we know we must never do. For example, we shouldn’t run with scissors or take candy from strangers. But there’s another lesser-known rule, and it’s just as important as the ones you learned as a child: Never, never call your ex-boyfriend when your life is falling apart. But that’s exactly what I did. What do you call it when your ex-girlfriend contacts you out of the blue on the very same day her mother invites you over for Christmas? Some would call it fate, others coincidence. I call it an opportunity. One I’m not going to pass up…
global_05_local_5_shard_00002591_processed.jsonl/15858
Your ad here? Lion King, The 1. Piccolo, flute, Irish [wooden] flute in E-flat, Irish [wooden] flute in E, Irish [wooden] flute in F, dizi in B [no membrane], dizi in B [with membrane], dizi in C [no membrane], dizi in high F [no membrane], bansuri in low A, panflute in C, panflute in F, panflute in G [or all the previous panflutes may be replaced with one 4-octave tunable panflute], bass panflute [toyo] 1. Updated per information received from Steve Kujala, Reed 1 in the Los Angeles production 2. Tom Kmiecik says: The Reed 2 book for this show is not used in the touring version (but it is used on Broadway and was used when I played the Las Vegas production). The book requires a bass clarinet to low C. Leave a comment
global_05_local_5_shard_00002591_processed.jsonl/15862
What is Lupus? Lupus is an incurable autoimmune disease that affects many parts of the body.  It is a complex condition that is poorly understood and often left undiagnosed for many years. Being an autoimmune condition means that Lupus is caused by problems with the immune system.  The immune system is the body’s natural defence against illness and infection.  Its job is to detect the presence of foreign bacteria or infectious invaders, and then send in the white blood cells and antibodies to hunt them down and destroy them. Well, that’s the protocol in a normal, healthy body at least. For reasons not yet understood, the immune system in people with Lupus ignores the harmful viruses and releases antibodies to start attacking the host body instead.  In other words, it goes rogue.  It does this because it mistakenly thinks foreign material is present. As a result of this unprovoked rampage, healthy tissue, cells and organs are repeatedly attacked and destroyed. sickandalwaystired.com arrow2
global_05_local_5_shard_00002591_processed.jsonl/15872
My question was inspired by this question here. Essentially for questions with an impossible negation it was advised that the best approach is to say we don't know or simply give a summary of current knowledge on the subject. What I would like to know is if there is any guideline for considering a hypothesis over alternates. Perhaps showing answers to similar questions or situations could be one approach, but is not reliable and probably should not be used as support. If there is an absence of evidence and no way to verify either way should we simply say that we do not know, or is it perhaps better to outline the most likely answers and give reasoning, as these can then be debated which aids in our quest for knowledge? I have added some example questions which I hope illustrate my point with more clarity. Is there a shadow government exerting control over global matters? This question is not asking if organizations exist attempting to do that, but whether or not an organization has successfully done so and is secretly running the world. It is interesting because it should be possible to investigate and establish an answer, except that most people simply don't have the means to do so. Since a reliable investigation, scientific or otherwise is out of the question, then is using reasoning based on what we do know acceptable? For example: 1. With the worlds most powerful countries continually being manipulated, with the amount of people privy to this knowledge someone would have come forward. 2. There is poor evidence of collusion on such a grand scale. The worlds most powerful countries often disagree on key matters 3. If ultimate control is the key, why not do it in a more direct way? Depending on how long a shadow government may have been in control, would it not have the resources to take more direct control? Problems with such arguments are that they are not exactly backed by hard evidence. For answer 1 you can show that through history conspiracies tend to be exposed, it would be easy enough to find evidence for 2 and 3. Counter arguments could be that the organization is powerful enough to prevent exposure through death or threats, that the seeming lack of collusion is orchestrated to keep people from learning the truth Such claims becomes increasingly complex, so if Occam's razor is applied than my examples answers would be adequate for such a question? Another example question Do donkeys kill more people than airplane crashes? Perhaps. The Snopes article linked to states that we have insufficient data on deaths caused by donkeys to reach a firm conclusion. Based on what we do know: 1. Airplanes are statistically one of the safest methods of travel. 2. Donkeys are a very passive animal, exceptionally rarely attacking humans. 3. Even if a Donkey were to attack a human it would likely not be with the intention of killing and would stop if the human were to flee. It would seem then that for a donkey to directly kill a human would be an exceptionally rare event, not often observed and thus occurs substantially less than fatalities by plane crash. In this case evidence of absence is a reasonable indicator, combined with the knowledge we have about plane crashes and donkeys. Are musicians more likely to die when reaching 27 years of age? The so called 27 club. There is no hard data or research on this particular issue, although when musicians are taken as a whole deaths at 27 are not significantly high. It seems there is no reason to assume something unique to musicians that would make a death more likely at a specific age. Potential reasons why people might think this: 1. A string of coincidental deaths at age 27 causing any further musicians dying at age 27 to be noticed more. 2. Potentially higher use of dangerous substances associated with a rock lifestyle may lead to earlier deaths. None of my example questions have been asked, although related questions have been. In my example answers I have not really checked or properly sourced them, however I hope they serve as examples even if incorrect. Should these kinds of questions and answers simply not be allowed? I would argue that they should be allowed as example answers such as the above still aid in reaching a conclusion after a skeptical analysis. | | It's quite hard to give a generally valid answer to your question, because the risk is that the debate is simply moved to "what questions are about impossible negations?". I think that we should always answer in the spirit of the site, which is: bring evidence to the table. I do not think that the correct spirit is: find the ultimate truth. For example, I think that all of these are acceptable answers: 1. "We don't know as there is no consensus about the answer: [link to expert opinion/papers that prove no consensus]" 2. "The problem has not been addressed in scientific literature, thus the question cannot be settled for the moment, however the following evidence provides a partial answer [link]" 3. "We don't know whether there is a teapot in orbit between here and Mars, however Bertrand Russel has [something to say] about this hypothesis. Furthermore, the [list of known near-Earth objects] does not contain teapots." Also, I would consider as off-topic or not constructive questions that cannot, in principle, be (ever) answered with evidence. For this reason, for example, questions about motivations are not allowed. For this very reason I disagree with Oddthinking that we should have a boilerplate answer for such questions. They should simply not be allowed. | | • I don't understand your first statement...if discussing a question with an impossible negation why would you then start questioning if it did or not? There are certainly questions that can likely never be answered with evidence, or not in our life time, but that doesn't mean less direct evidence and reasoning can not be of use. – Sonny Ordell Nov 18 '11 at 2:39 • Also, the spirit should be a quest for knowledge. Every question, no matter how impossible will have evidence, however indirect it may be. In which case where do you draw the line with indirect evidence and inferring the most reasonable hypothesis? – Sonny Ordell Nov 18 '11 at 3:48 • Sorry for not being clear. I still do not believe motivation questions should be allowed. I was thinking more like these questions: Secret colony on Mars, Go as war-decider, Coke executive story. – Oddthinking Nov 18 '11 at 6:17 • The colony on mars is a great example, and go is as well to a lesser extent. Would the coke question not simply rely on anecdotes, so not really ever be useful on this site? – Sonny Ordell Nov 18 '11 at 7:30 • @sonny the point is that questions should be decidable with facts, at least in theory. Questions for which we are merely "unlikely" to have an answer, are perfectly allowed and welcome here, as any other SE site. Finally any subjective "measure" of sincerity or usefulness is not something we should ever adopt. – Sklivvz Nov 18 '11 at 8:28 • @odd why is the coke manager any different from all other historical/literature/citation questions? – Sklivvz Nov 18 '11 at 8:31 • @odd all the questions you mention are perfectly answerable and there is absolutely no problem with them. They are not impossible negatives at all. – Sklivvz Nov 18 '11 at 8:37 • @Sklivvz, it is a question of scale. Some questions are not able to be directly answered with facts, so then it becomes a question of to what extent do we use indirect facts or reasoning. The colony on mars question for example relies on indirect evidence, as first hand evidence is unavailable. – Sonny Ordell Nov 18 '11 at 9:41 • @SonnyOrdell Not a question of scale. If there were a colony on Mars, it would be perfectly answerable. The point is that you need to assume there is no colony before you can state that answers can only "rely on indirect evidence". But how can you support your assumption? – Sklivvz Nov 18 '11 at 9:50 • @Sklivvz Except that isn't what really happens on this site. People post questions about claims. The person posting the question is not supporting the claim, but asking if it is reasonable or likely. Hence in answers explaining why or why not, scale becomes relevant. Explaining why it makes sense to assume there is no colony on mars is different to why fire can cause paper to burn. One is directly verifiable and reproducible, the other relies on indirect evidence and reasoning. – Sonny Ordell Nov 18 '11 at 9:58 • @SonnyOrdell my point is that you are asking us not to allow questions based on mere assumptions. I don't think we should do that. – Sklivvz Nov 18 '11 at 10:02 • @Sklivvz, I am asking to what extent indirect evidence and reasoning should be used in such questions. There is no question that such questions are already allowed. – Sonny Ordell Nov 18 '11 at 10:05 • @SonnyOrdell that fundamentally depends on what evidence you can find. Sometimes, there is simply no good evidence. The important thing is generally to look at all the available evidence (direct, indirect) and present it appropriately. A good, referenced partial answer is always acceptable. In the worst case scenario, if you can only bring tidbits to the table, it is customary to put up a CW answer for everyone to contribute to. – Sklivvz Nov 18 '11 at 10:13 • @Sklivvz so then in your opinion, the example question and example answers in my actual question are fine with you? – Sonny Ordell Nov 18 '11 at 10:38 • @SonnyOrdell it depends on the evidence available. In principle, though, I see nothing wrong with the questions and answers you propose. I see nothing wrong with a weak answer if it's clearly stated that it is as such -- the requirement is only evidence. – Sklivvz Nov 18 '11 at 10:45 Edit: This answer has significantly changed due to examples being provided and in response to Sklivvz's answer. 27 Club: there is no good reason why a study could not be made to answer this question with a True or False answer. I do not see this question has an impossible negation. Conjecturing that drugs may cause more deaths in musicians at 27 is completely unhelpful if/when it turns out that they do not die earlier. Conjecture like that is what Yahoo.Answers - in fact, most of the rest of the Internet - is built upon, and why it is completely untrustworthy. Donkeys: again, there is no good reason why a study could not be be made to answer this question with a True or False answer. Shadow Government: Now, we get to the philosophically interesting one. Either: • It is true, and someone can prove it! Hooray! • It is false, and someone can prove it! I cannot see how they could, but I have been surprised by the ingenuity of people here before. Hooray! • It is true or false, but no-one can prove it yet. Ideally, the question would stay open until some evidence was found. Alternatively, it could be answered that some expert has looked for the evidence and found it lacking either way. • It is false, and no-one will ever be able to prove it. This is where it is tricky. That tricky final case could be addressed with conjecture, but it was conjecture that got us into this situation in the first place. Without evidence, I see little value in conjecturing about it - except as an exercise in extracting predictions that could then be tested. The same logic could be applied to these questions, which I suggested in a comment on Sklivvz's answer: Secret colony on Mars, Go as war-decider, Coke executive story. Each of these answers might be true, but if (as I suspect) they are false, that could (sans surprising twists of logic) never be shown. An idea I continue to be considering is to allow people to put a CW placeholder answer that points to a meta-question with a high-quality general-purpose answer. The referenced answer would explain: • how to deal with conjectures that have no evidence, • the idea of provisionally accepting a position, • the power of Ockham's Razor, • the need for extraordinary evidence for extraordinary claims, • the burden of proof ... basically what it means to take a skeptical position. Such an answer would be a second-grade answer, in that it wouldn't be as nearly valuable as a direct True/False answer, but it would allow some of the unanswered claims to get an answer when (consensus would suggest) they are both false and unable to ever be proven false. | | • "Is there a shadow government exerting control over global matters?", this is quite easily answered by taking the conspiracy theory and debunking its mechanisms. Of course there's still the "Is there an undetectable conspiracy secretly controlling our lives?" version which is easily answered by linking to classic paranoia cases. ;-) – Sklivvz Nov 18 '11 at 14:43 You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_05_local_5_shard_00002591_processed.jsonl/15886
I am looking for Android or iOS application that can give me an alert whenever I am close to a speed camera in South Korea when driving. My only requirement is that the application misses as few speed cameras as possible. It's OK if the application focuses on static speed cameras only or mobile speed cameras only: I am fine using multiple applications concurrently. • A few Koreans I know uses Waze – kenchew Apr 17 '16 at 16:56 You can use Kakao Navi (카카오내비): • Free of charge • gives an alert whenever the driver is close to a static speed camera in South Korea. I believe that it was 100% accurate over the 2000 km I drove. • gives an alert whenever the driver is in a speed controlled area. • can record the video in background enter image description here | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/15903
Just now I saw Michael Phelps competing in the 400m Medley heats (London Olympics 2012). After he finished the race, I saw him take off two caps. I can imagine that a swimmer uses one, but what is the reason for wearing two caps? Is this something new? Does it help him swim faster? Actually, most swimmers at this level of competition wear two caps. Dana Vollmer, who won gold with a new world-record time in the 100m butterfly, actually lost her outer cap in the pool on the return leg of that event. Thus, the first reason; redundancy. These caps are latex rubber, which doesn't mix well with chlorine and will eventually degrade, and as Dana's swim shows, even a brand-new cap can slip right off. If the swimmer, especially a female swimmer, had only one cap, losing it and releasing their hair would drastically increase the drag they have to swim against in the water. Second, as Rory states, a common (though not universal) way to put all your headgear on is to put one swim cap on, then put your goggles on, then cover the goggle strap with another swim cap. Not only does it reduce drag on the goggle strap (which is minor), it helps keep your goggles in one place (MUCH more important). I was on a swim team when I was much younger, and I lost count of how many times the shock of entering the water ripped my goggles right off my eyes. You still have to swim if it happens, but it becomes a HUGE distraction that can take you right out of the race. At your average junior swim meet, losing a race to your goggles is embarassing but not devastating. At the Olympics, it would be a heartbreaker. | improve this answer | | • I wouldn't say most swimmers wear two caps, but at the higher level of competition, those small benefits of peace of mind that your gear won't come off and reduced drag from goggles can be the difference between a spot on the podium or not. – user1301 Apr 28 '13 at 21:28 • I'll rephrase; most professional competitive swimmers. Most recreational swimmers don't even bother with one. – KeithS May 1 '13 at 14:46 The two caps are also made of different materials. The inner cap is latex, which stays on the head better, but wrinkles. The outer cap is silicone, better for reducing drag. "The outer silicone cap better maintains the shape and does not wrinkle as much, thereby causing less drag," Salo told Yahoo! Sports. - Why do Olympic-level swimmers wear two caps? | improve this answer | | It is for speed- if you have your goggles on over your cap it upsets water flow, so the second cap over that holds the goggles safely on and streamlines the head. Sure, it's an infinitesimally small benefit, but at that level it is important. Additionally, some sports manufacturers make some specifically to be worn like this to reduce drag further. | improve this answer | | • 5 Why not put the goggles below a single cap? You then have the same advantages, right? – Bernhard Jul 28 '12 at 22:56 • 3 goggles over a cap pretty much fixes the strap in place higher up than you can do on a bare head, due to friction. Much more comfortable. – Rory Alsop Jul 29 '12 at 8:18 It helps them swim faster. it not for hair. Its help b/c the water will just flow over the cap. I know because we are talking about it in science | improve this answer | | • For the first cap I agree, but I am specifically asking for the second one. What does it add fluid dynamically speaking? – Bernhard Oct 3 '13 at 7:05 he wore two caps only because if one comes off he has a back up already on and it supports the goggles making them stay in their lace under the second cap as the goggles may come off from diving. | improve this answer | | • 1 Thanks for your answer, but I don't really see how it adds anything as compared to the answers that are already there? – Bernhard May 30 '14 at 19:51
global_05_local_5_shard_00002591_processed.jsonl/15907
I have just been entering a comment, pressed CTRL-Z a few times in order to improve the wording, and suddenly my comment disappeared (or used white text color, whatsoever). When trying to re-enter the comment (or to comment on a different question), still the text dows not appear (or in an invisible color). The problem just disappeared after closing and restarting Firefox. Is this a known StackExchange bug? (And if so, does anyone mind?) asked 02 Dec '09, 12:49 Volker%20Barth's gravatar image Volker Barth accept rate: 34% edited 11 Jan '14, 07:50 Graeme%20Perrow's gravatar image Graeme Perrow Couldn't withstand from re-tagging:) (02 Dec '09, 16:51) Volker Barth dead-chicken is an EXCELLENT tag, it will have many uses! (04 Dec '09, 11:36) Breck Carter Have you waved a dead chicken over the keyboard? (seriously, don't anyone vote this answer up) FWIW I have experienced an increasing number of Firefox bugs lately, plus stuff that just does not work in FF but is OK in IE8. So it might be SQLA, it might be FF... I still use FF as my main browser but that's looking more and more like too lazy to switch on my part. ...and don't anyone go quoting their horrible IE6 experiences to me, IE8 is not your grandfather's browser :) permanent link answered 02 Dec '09, 15:37 Breck%20Carter's gravatar image Breck Carter accept rate: 20% I'm running sqla in chrome at windows, and firefox at mac. With no issues on both. (02 Dec '09, 16:03) Zote Guess I treat my question as "primarily for the record"...and as to the chicken, that's seems invisible, too:) (02 Dec '09, 16:49) Volker Barth @Breck: Thanks for removing the single tags "dead" and "chicken" that I had generated by accident. Of course these are only relevant for SQLA when used together. - Anyone wants to google for "dead chicken Breck"? That might give even more results than "stealth Kleisath":) (03 Dec '09, 16:10) Volker Barth @Volker: I removed nothing, I don't think direct deletion is possible... I'm betting they got dropped when the last usage was dropped. I'm wayyyy behind on my administrative duties, for what that's worth. (04 Dec '09, 11:34) Breck Carter @Breck: I see - the equivalent to a ON DELETE CASCADE semantics. By the way - that seems to be a missing DRI action - to auto-delete a "parent object" when no longer referenced by any "child"... (07 Dec '09, 21:11) Volker Barth @Volker: ON DELETE CASCADE isn't creepy enough for you? You want ON DELETE ANNIHILATE FAMILY? :) (08 Dec '09, 15:33) Breck Carter @Breck: Well, let's say the existing alternative is a trigger-based approach, and that is creepier, as you will agree. However, your syntax proposal might not make in the next SQL standard, I suppose. @World: Obviously, this is merely a test how many comments SE can handle and display... (09 Dec '09, 08:30) Volker Barth @Volker: Trigger-based versus Cascade... Serial killer versus mass-murderer, splitting hairs if you're the victim, very important if you're Henry Lee Lucas http://www.serialkillercalendar.com/Brief-Bio-of-HENRY-LEE-LUCAS.html (09 Dec '09, 13:52) Breck Carter More comments hidden showing 5 of 8 show all flat view It sometimes takes long: Just found out that typing a capital umlaut turns the edit window in its "invisible state", at least with Firefox 3.5 and above. That's my typical typo when trying to insert an apostrophe because the key is just next to an 'Ä'... No problem for all ye English users out there, methinks:) permanent link answered 08 Feb '10, 13:27 Volker%20Barth's gravatar image Volker Barth accept rate: 34% Comment Text Removed To be more precise, it only happens with the capital 'Ä', other umlauts are o.k. (08 Feb '10, 13:29) Volker Barth Trying to add a comment, pressing voluntarily the Ä and then Ctrl-Z did not do something unusual. Repeating the same and stepping back with Ctrl-Z until also the Ä was erased: neither. I'm using FF 3.6 (08 Feb '10, 14:42) Reimer Pods @Reimer: Nor does it on other boxes I have tested. Seems to be a problem on my workplace machine - So no need to bother:) (09 Feb '10, 20:33) Volker Barth Instead of using the answer option, is it possible to use the "add comment" option? Or is that available only after posting an answer? I will see it now :) permanent link answered 27 Dec '09, 09:30 Kumar's gravatar image accept rate: 25% Got it. One can comment only on their answers, otherwise they should own the thread. (27 Dec '09, 09:31) Kumar @Kumar: Once you get 50 "reputation points" you can add comments on everything. And yes, posting a comment is an excellent alternative to posting an actual "answer", it all depends on what YOU want to do, and how you want it to appear. If you want to read about the "philosophy" of this site, read some of the questions posted by me and tagged "faq"... you can also read some articles on sqlanywhere.blogspot.com - search on "sqla" (27 Dec '09, 09:54) Breck Carter Your answer toggle preview Follow this question By Email: Answers and Comments Markdown Basics • *italic* or _italic_ • **bold** or __bold__ • numbered list: 1. Foo 2. Bar • basic HTML tags are also supported Question tags: question asked: 02 Dec '09, 12:49 question was seen: 3,615 times last updated: 11 Jan '14, 07:50
global_05_local_5_shard_00002591_processed.jsonl/15918
Log in No account? Create an account Don't Eat With Your Mouth Full Where can we live but days? steepholm steepholm Previous Entry Share Flag Next Entry The Scouring of the Shires Neither cafe nor pub is safe from the new Shadow that has risen in the West... "SZC" is its name, a harsh and guttural word that has meaning only in the language of More-dosh. More to the point- doesn't the Tolkein estate own the rights, not some bunch of US money grabbers? I assume those rights got sold at some point... It's not that I object to people asserting their copyright. If people were selling knock-off copies of The Hobbit or pirate DVDs I'd happily condemn them (and I speak as someone whose novels can be downloaded for free at at pirate sites, much to my chagrin). It's the lack of proportion and common sense that's the problem here. No one in their right mind is going to think that the Hungry Hobbit cafe is endorsed by this Hollywood company, nor is its existence going to rob them of one cent of revenue - the reverse, if anything. It's just mean! Well yes, but some of these namings will long predate the influence of movie-dom upon these characterisations and something like 'hobbit' has been in the OED (and therefore is common usage) for over three decades. It's just another example of people on that side of the pond needing to get a clue! This is the worst sort of cultural appropriation and a pernicious form of imperialism. I thought the films completely missed the point of the books anyway, but then I'm English and studied old and middle english as an undergrad so I have, shall we say, views............. I share your dislike of companies trying to copyright existing words. It's a bit like the attempt to copyright molecules or naturally occurring species - playing God and King Canute all in one go. Not that it's entirely a transatlantic phenomenon. I remember the case of a butcher called Mr Virgin (whose shop was Virgin Butcher) being sued by Branson's mob on similar grounds a few years ago - and he'd been in business for decades, since the time when Mike Oldfield's only instrument was a comb and toilet paper. Edited at 2012-03-15 09:27 am (UTC) There was a cheapy shop hereabouts that called itself: ' 'Arrods' and Al Fayed took the hump. He won the case and they changed to name of the shop. To: 'Not 'Arrods' :o)
global_05_local_5_shard_00002591_processed.jsonl/15921
So Sad and Blue                             Feeling a bit down today                             Thinking about my days at school                             Where I was the subject of constant crap                            Where all the kids were cruel                           Pushed down stairs,pants pulled down,                          Broken toe in woodwork,head held down,                        in a toilet full of shit,tied naked to a tree,                         dead leg,punched,kicked,spat on,abused,                       in the showers,called names,etc.                      So Sad and Blue                      I don’t know what to do                     I don’t understand,what did I do?                    Ineed a razor,maybe a gun                    Too many tears,over the years.
global_05_local_5_shard_00002591_processed.jsonl/15928
Ask Strategy Girl Got questions? We’ve got answers.  How do I research the best colleges to study business (or insert any other field of interest)? What is the most appropriate way to go about asking a teacher for a letter of recommendation? Who do I email at a company where I want to intern, but that has no positions open online? -Does work-life flow exist, and if so, how do I take steps to achieve it?  If you have a specific question for Strategy Girl, please send it using the form below, and we will post a reply on our blog in the coming weeks.
global_05_local_5_shard_00002591_processed.jsonl/15938
Get your site hosted on a secure server today! Pay with Credit Cards on Stripe For a single basic site: For a single site with SSL: For a site with advanced needs: Basic plans starting at $12/month 1. How many sites do you want to host here? 2. How many of your sites need a dedicated IP for SSL? 3. Do you want to become a Reseller? Pay $20 and save 50% on each site.
global_05_local_5_shard_00002591_processed.jsonl/15942
Faculty of Information Technology Software Engineering Group Opened 4 years ago Last modified 4 years ago #104 new defect Reported by: Jan Vrany Owned by: Priority: major Milestone: Component: virtual machine Keywords: Cc: Also affects CVS HEAD (eXept version): no The VM just hangs up. No CPU consumption. Wait chain traversal reports a deadlock. This happens only on 32bit Windows and only on some systems, most notably on Jenkins build slave. • When number of reading/writing threads is 50 (variable count) then the test pass. With 58 threads it does not, i.e., hangs up • It is not possible to attach to the stx.exe process, the DebugActiveProcess() reports not enough memory to process command • Looking at it in WinDBG is just hopeless. Change History (1) comment:1 Changed 4 years ago by Jan Vrany Commit c540e1f444ea/stx.goodies.regression temporarily lowers the number of threads so it should pass on Windows as well. Nonetheless, this should be fixed! Note: See TracTickets for help on using tickets.
global_05_local_5_shard_00002591_processed.jsonl/15955
Skip to main content Table 1 Overview of dynamic modeling methods From: Dynamic models of immune responses: what is the ideal level of detail? Dynamic modeling method Granularity Examples in immunology Pros and cons Refs. Discrete dynamic models Discrete time and discrete (abstract) state Modeling of Bordetella infection pathogenesis, T cell receptor signaling Can deal with many components but the simple state description cannot replicate continuous variation of immune components. [6, 4447] Continuous-discrete hybrid models (e.g. piecewise linear differential equations) Combination of discrete and continuous state, continuous time Modeling of infection pathogenesis and pathogen time-courses The number of components that can be modeled is smaller than in discrete models because of the increase in the number of parameters. The state of the variables may not be directly comparable with experimental measurements. Although there are few parameters per component, parameter estimation becomes an issue for large systems. [7, 36] Differential equations Continuous time and state SIR (Susceptible Infectious and Recovered) models of target cells and pathogens, T cell differentiation The variables of the model can reproduce the experimentally observed concentrations. Insufficient data to inform the functional forms and parameter values can limit the use of this method. Less scalable than discrete approaches. [11, 13, 20] Finite state automata (e.g. agent-based models) Discrete states (abstraction of cell state), discrete space and continuous time Cell to cell communications Simplified way to simulate spatial aspects. Can handle a few immune components in detail. Computationally expensive. [4850] Partial differential equations Continuous time, state and space Transport of cells across vascular membranes Appropriate to model a few immune components in detail. Computationally expensive and the determination of parameters is rather difficult. [51, 52]
global_05_local_5_shard_00002591_processed.jsonl/15961
The Spooky Inner Workings of a Horror Game Published: Friday, October 28, 2016 - 13:00 | By: Robert N. Adams Horror games have been around for decades now in various forms. Survival horror, thrillers, and mysteries have spooked delighted players time and time again. But one thing that not every horror game takes advantage of is the unique capabilities of the medium. I firmly believe that any storyteller worth their salt will tell you that the most frightening thing is the unknown. You'll get a lot more mileage out of a movie monster by not showing it than showing it. For example, the titular murderous monster in Alien is on screen for a handful of minutes out of the entire movie and most of those appearances are partial ones at best. Arguably, some other movies have been ruined by a slow, panning shot showing you exactly what the monster looks like. Video games can and do apply similar techniques, but not all of them really make the best use of the medium. It's like having an orchestra in a silent movie; you're missing out on the best part of the philharmonic. However, some games do get it right. We'll explore some of those here. Non-Euclidian Geometry Euclidian Geometry is, in short, geometry that follows all of the rules we've learned in grade school and high school. A cube has six corners, six edges, and six faces. Try as you might, you can't really picture a cube with a seventh face. It's not a cube, and it doesn't make sense to call it that within the framework of Euclidian Geometry. Sometimes called Alien Geometries, Non-Euclidian geometry can serve to disorient, confuse, and terrify the player. Movies and art have tinkered with the concept in the past, but games are uniquely positioned in that they can let you see and experience it firsthand. The most well-known example isn't likely to be considered a horror game at all: Antichamber. The big hook of Antichamber is that you will find yourself moving through rooms that do not make sense. You'll seamlessly make six right turns in hallways of similar length and not backtrack at all. You'll walk through a door and turn around to find that the room you've just left has been replaced by another. Even in something that isn't a horror game, the effect is subtly unsettling. Some spooky games do make use of the effect. Hektor features series of rooms that repeat endlessly. Wooden Floor does the whole "the room you just left is gone now" thing quite well. But out of the totality of horror games out there, only a few really make good use of the effect. I've seen quite a few movies that mess with your sense of direction, but they just don't compare to experiencing it yourself firsthand. Good implementation of this technique will make it seem like some supernatural force—perhaps even the world itself—is against the player. And much like magic, it's all the more spectacular when you can't quite figure out the trick. Although Antichamber isn't strictly a horror game, the subtle sense of the world being "off" is scary in its own right. Other horror games have adapted some of the techniques used in the game, but in my opinion, Antichamber still does it the best. God help us if Alexander Bruce ever decides to branch out into horror. A Lack of Resources 28 Days Later is positively terrifying. Hordes of fast zombies charging at you and no weapon to save yourself. What could you possibly do? Perhaps you might have an old hunting shotgun laying about in the attic, but that certainly isn't a precision weapon meant for dealing with crowds of people. One of the key points of terror in 28 Days Later (and similar films) is how poorly armed the survivors are. The denizens of The Winchester had, well, a Winchester and a handful of melee weapons. The Road works well as a post-apocalyptic movie (which is terrifying in its own right) in part due to the handful of bullets the protagonists have. (In fact, it's not even a handful.) I often joke that if 28 Days Later had happened in America, it wouldn't have gone down the same way. An entire country crippled by a bunch of people running really fast? There are people in this country with arsenals that rival most police stations. For ten people that are scared out of their mind there's the one guy who's finally happy to put the thousands of ammo he's stockpiled to use. Hell, he was collecting guns and bullets just for this day. But, I digress, 28 Days Later set in one of the more gun-friendly states in America would make for a terrible horror film. (It'd make a great action movie, though.) Horror games work much the same way. If you give your protagonist a machine gun with hundreds of rounds of ammo, it's not a horror game—it's DOOM. One of the key elements of horror is vulnerability, and nothing makes you feel more vulnerable than six bullets in your revolver and five enemies coming at you. This vulnerability can be extended to all resources. Save points ought to be rare (if they exist at all), but not so rare as to become frustrating. Healing items should ideally keep you just barely alive. One series that arguably handles this the best is the Left 4 Dead games. The A.I. Director dynamically changes the rules of the game world to keep you on your toes. If you have full ammo, the Director will give you something to shoot at. If you're hunkered down, it will send Special Infected at you to get you moving again. Other games can fail in this by being too forgiving or too harsh. For that reason, a dynamic approach in doling out resources is probably the best way to do it. The Monster in the Closet A classic trope of horror is the "Monster in the Closet." An inattentive person hangs around their home, completely unaware of the murderous slasher watching them from the hall closet. They drop their keys, pick them up, and when they stand the camera pans up to reveal the killer is standing right behind them. Classic. The difference between movies and games is the limitations of your perspective. You don't even necessarily see everything the person on screen sees—you see the point of view of the camera. The director shows you what he wants you to see, and that can easily make the sudden appearance of the bogeyman all the more terrifying. In games, this is much, much more difficult. Ever since the days of DOOM, gamers have been trained to explore every single nook and cranny. They're looking for secrets, more ammo, collectibles, or even just a cool Easter egg. And when you have something appear behind you from a room you've just left, it feels cheap. Out of everything here, this might be the most difficult thing to do of all. As gamers, well, game, they learn. They learn that a chest-high wall they can't leap over might very well have a monster pop out of it. They'll learn that a generous amount of health and ammo outside of a large arena means a boss fight is a-comin'. They'll learn what they can and can't do, and the moment they figure out their limitations is arguably when the majesty of the whole performance of a horror game fails. That's where the real challenge lies. Limit players too much and they'll feel the challenge is unfair. Give them too much freedom, and a monster appearing suddenly behind them will feel cheap. Show the monster stalking you from the shadows like so many horror classics and perhaps you'll strike the right balance. Hide a trapdoor or have it crash through a window.  Give you the hint of something there but no real confirmation. Outlast is arguably the premier "hide in a closet terrified for your life" simulator. The control of information & perspective through the camera combined with the limited amount of camera batteries serves to create a constant pressure that can build up to unbearable levels—perfect for a good scare. Believability & Inspiring Fear As a package, I think a horror game probably has the most difficult job of all games. If you pick a random game developer off of the street and asked them what they would like a player to get out of their game, I'd wager that they would say either "fun" or "a compelling experience." (Granted, some of the more cynical devs might say "their money's worth.") Developers of horror games will instead say that their goal, first and foremost, is to inspire terror. And thankfully, there's plenty of choices out there both old and new. Fans bemoaned the changes made in Resident Evil 4 precisely because of this. The game shifted more to action and away from horror; now you're shooting zombies as if you're at an arcade game rather than desperately trying to make a hole you can run through. Fear is a negative emotion. We don't want to feel true, genuine fear, and if we see the light at the end of the tunnel, we'll break out of the illusion. While gamers might be charitable at certain changes to real-world mechanics for the sake of fun, I doubt anyone would want to actually play through a true 24 hour day in The Sims—horror games are not afforded that luxury. You'll either do it right and perfectly create an environment conducive to scaring the everloving crap out of your audience, or you'll fail. For a game developer, that's probably the scariest thing of all. What's your favorite horror game of all time? Which horror games "do it right" and which ones fall flat on their ass? What was the scariest moment you've ever seen in a horror game? Let us know in the comments below! Share On: Topics | Opinion Featured Video (All Videos) More Gaming Articles A photograph of Robert N Adams Senior Writer
global_05_local_5_shard_00002591_processed.jsonl/15970
Abbi and Ilana vs Hot Sauce (PG-13: Language) Broad City creators Abbi Jacobson and Ilana Glazer dropped by Hot Ones to take on spicy cauliflower “wings,” while regaling us with stories of their online success, making an insane mobile game, and some of their more delicious experiences with edibles. Advertise | Facebook | Twitter | Pinterest | Sites We Like Visit our Friends at: Not Always Right
global_05_local_5_shard_00002591_processed.jsonl/15978
The CyberWire Daily Podcast 6.7.19 Ep 860 | 6.7.19 Recruiting spies at university? GoldBrute botnet and RDP vulnerabilities. MuddyWater update. RIG delivers Buran. Achilles claims to sell access. NRC’s IG reports on cyber. Antitrust for Big Tech. Dave Bittner: [00:00:04] The Australian National University hack and data loss look to many observers like the work of Chinese intelligence services. The GoldBrute botnet is scanning vulnerable RDP servers. MuddyWater is back, undeterred by leaks and learning from the best. The RIG exploit kit is delivering Buran ransomware. Achilles says he's got the goods. The Nuclear Regulatory Commission IG looks at cyber inspections. And big tech prepares for big antitrust. Dave Bittner: [00:02:04] From The CyberWire studios at DataTribe, I'm Dave Bittner with your CyberWire summary for Friday, June 7th, 2019. Dave Bittner: [00:02:11] As investigators continue to look into the cyber incident at the Australian National University, signs point to Chinese intelligence services as the operators behind the recent hack. It's consistent with other Chinese operations, which have aimed either at the cultivation of sources or the acquisition of intellectual property. In this case, the ANU hackers appear to have been engaged in recruitment. The attackers exfiltrated some two decades worth of personal data that the Sydney Morning Herald says includes bank account numbers, tax information and academic records of both students and staff. Dave Bittner: [00:02:48] Investigators believe one of the campaign's principal objectives was to groom Australian students headed into civil service careers for recruitment as agents. ANU graduates are heavily represented in public service. The evidence pointing to China is circumstantial. First, only a small number of countries have the technical wherewithal to execute an attack of this kind. Second, an even smaller subset of those would be interested in doing so. And third, the attack seems to fit the pattern displayed in other Chinese cyberespionage campaigns. Dave Bittner: [00:03:21] Why would an intelligence service be interested in financial and academic records? For any number of reasons. The more one knows about prospective agents, the easier it is to get your hooks into them. You might wish to develop the sort of rapport that might be useful in recruitment. You studied Li Bai's poetry? What a coincidence. Me too. I always found "Quiet Night Thought" particularly moving. Or maybe - you wouldn't believe the trouble I had with the credit department at regional - what? You too? Let's talk. Dave Bittner: [00:03:51] Or you could accustom them to doing small innocent favors that lead to less innocent favors that lead to quite guilty favors. I've completely lost touch with Chloe. You remember her from ANU? You wouldn't happen to have a copy of a staff directory you could give me? I'd so love to get back in touch. And who wouldn't want to help out Chloe? And the next staff directory might be from an Australian Signals Directorate contractor, and then maybe an internal memo would be much appreciated because that nice person is interested in investments. Eventually, you would get the point where you feel you have to refuse, but by then, you may have given away things that, the nice person points out, well, people just wouldn't understand. Better for you if you keep playing ball. Dave Bittner: [00:04:35] And rougher still, it's also possible to turn up material that might be useful in compromising a target. I notice you wrote an honors essay on Li Bai's "Waking From Drunkenness On A Spring Day." Did your drinking problems at Canberra lead you to that particular poem? Or perhaps worst of all, something like this. It would be a shame if your second cousin in Sanxiang lost his job. Actually, losing his job might be the least bad thing that could happen. Chinese operators have been behind this kind of hack before, and it fits well into traditional espionage craft. Dave Bittner: [00:05:11] The risks of remote desktop protocol vulnerabilities are coming into sharper focus. Morphus Labs warns that a botnet, GoldBrute, is scanning and brute-forcing about a million and a half RDP servers. There are several known RDP vulnerabilities out there, and there are patches available, including patches for BlueKeep, which Microsoft and NSA and their sisters and cousins and their aunts are really urging everyone to patch. Dave Bittner: [00:05:38] Iran's hacking group MuddyWater, also known as Seedworm, might have seen more of its tools leaked online, but that hasn't made it pull in its horns. ClearSky warns that the threat group is actively impersonating government accounts and using at least two new techniques. Microsoft documents carrying malicious macros, an exploitation of CVE-2017-0199 - that is, Microsoft Office WordPad Remote Execution Vulnerability w/Windows API. These, of course, aren't new attack tactics, but they're new for MuddyWater and represent Iranian intelligence and security services' long-standing determination to learn lessons and improve their game. It doesn't have to be novel, and it doesn't have to be innovative. It just has to be well-executed, and it just has to work. These work, especially against unprepared victims. Dave Bittner: [00:06:30] The RIG exploit kit is now being used to deliver Buran ransomware. Buran looks like gangland for-profit work, although of course, there is often a degree of penetration and control of the Russian mob by organs of the Russian state. The best defense against this Russian strain of ransomware are updated security software - since Buran arrives via exploit kits - sound offline backup and properly suspicious users. That, of course, is good advice at any time. Our linguistic desk helpfully points out that Buran means blizzard. Dave Bittner: [00:07:06] Researchers at security firm Advanced Intelligence are calling out another criminal active in dark web markets. He goes by the name Achilles, speaks English and is suspected of being Iranian. He's selling, he claims, credentials that would give the buyer access to security companies, charities and at least one international organization, UNICEF. There is no confirmation yet that Achilles can deliver the goods he's offering, but he enjoys a good reputation in this very bad neighborhood. His criminal clients consistently give him strong reviews, so maybe there's something there. In any case, Achilles bears watching. Dave Bittner: [00:07:44] Cryptocurrency firms are under attack, as usual. Github users lost some $9.7 million, and blockchain startup Komodo - not to be confused with security firm Comodo - hastily patched a vulnerability in its wallet. Dave Bittner: [00:08:00] The U.S. Nuclear Regulatory Commission is short on cyber workers. A report by the commission's inspector general found that the NRC's cybersecurity inspections, quote, "generally provide reasonable assurance that nuclear power plant licensees adequately protect digital computers, communications systems and networks associated with safety, important to safety, security and emergency preparedness," end quote. But the NRC, as much as it trains current staff to conduct cyber inspections, still finds itself facing a familiar problem. Good cyber talent is in high demand and not that easy to hire, especially into the government. The IG also found that the current cyber inspection program is risk-informed but not fully performance-based. The report urges the commission to work on appropriate performance measures. Dave Bittner: [00:08:51] And finally, as the antitrust sharks circle big tech, big tech is putting K Street shark repellent into the Beltway waters, hiring lobbyists to fend off the regulatory predators. And Facebook is reported to have begun bringing in more defense talent to its legal team. The administration seems to be serious about the feedings, which for now are divided between justice and the Federal Trade Commission. Congress is also taking an interest. Dave Bittner: [00:10:32] And joining me once again is Robert M. Lee. He's the CEO at Dragos. Robert, welcome back. You know, I thought we could run through some of the ICS environments that you all deal with. And why don't we start with natural gas? Give us an idea. Here in the United States, what is the lay of the land with our natural gas system? How is it controlled, and what are the threats? Robert M.: [00:10:54] Absolutely. So when it comes to natural gas, it's at an interesting changing point for the industry. For years, although it was still critical and important, there wasn't as much national attention on it because it wasn't as critical to the bulk electric system. As we have moved away from coal and move more towards renewable sources, we still need a quick way to be able to generate power, which is natural gas. And so natural gas is starting to feed the electric grid, much more so - even a lot of larger energy companies buying up natural gas companies, which means that that national focus has definitely increased. Robert M.: [00:11:28] There are threats that have targeted natural gas already, and we've heard about these over the years. We've never seen destruction or disruption as a result of an intentional attack, but of course, it's still something that weighs very heavily on folks' minds, especially when we start seeing the criticality the industry increase. What they're sort of up against today is a variety of risk that they're trying to mitigate. One of the factors for them is they do have sort of that traditional SCATA approach, meaning they have very long distances - right? - a lot of pipelines, very large landscape that they have to cover as well as very boutique kind of systems. You know, a gas compressor station along the side of a pipeline is not really normal knowledge for a lot of those, even in the industrial control and security community. Robert M.: [00:12:14] So for them, they're trying to reduce that risk - not only the physical threats and the things you have to deal with, like crazies along the pipelines, but also in the fact that their threats can get out to those locations. And it's not some easily tapped infrastructure. It's not like they could drive to every single gas compressor station and every single aspect of the pipeline and storage wells and all that and throw a managed switch on there and start tapping that traffic. It's not really achievable in that way. So they're much more around ingress and egress filtering and understanding if they can identify threats from the control center down or back up again from those sites. And at the same time, they're just dealing with the nature of the politics. Robert M.: [00:12:50] So you got some good organizations like the Downstream Natural Gas ISAC, who's trying to do a lot of advocacy and outreach in that sector. But I expect this will be a very turbulent next couple years for them as they try to figure out how to articulate what the real risk is while minimizing it without letting, as you noted, the hysteria get taken away as congressional members and others start asking questions on - oh, no. What is the threat to this new industry? Well, it's not really new, but this industry that's new in its criticality to the electric grid. So fantastic opportunity for them. Definite challenges, but as always, we got some fantastic people taking on that challenge. Dave Bittner: [00:13:25] And what would be the impact of an interruption of natural gas service? Robert M.: [00:13:30] It could be significant. It depends on a lot of factors, but one of the factors to consider is other generations' sources of power in that region as well as time of the year. So as an example of a particularly bad scenario, if we're talking about the dark sort of months of the year, we're not getting as much in terms of, like, solar. And we move towards solar more in the grid, and we also combine that with it being winter in places like the Northeast or Northwest. You know, a significant outage could actually have loss of life impact when it comes to people in that region. Now, we're not talking about everybody in the region dying, but nobody should take any loss of life lightly. So we're talking a number that is uncomfortable mostly just because we're talking about people's lives there. Robert M.: [00:14:15] So I think there's a realistic scenario where an attacker can make planned and coordinated strikes against pipelines that have real repercussions, but it still is much more difficult and nuanced than people make it out to be. But the complexity of a natural gas pipeline is not the same as the complexity of the overall grid, which means to take down a giant portion of the grid for any significant portion of time is a very complex problem. It's not as complex in gas pipelines, but it is still not trivial by any stretch of the imagination. Dave Bittner: [00:14:45] Robert M. Lee, thanks for joining us. Dave Bittner: [00:15:51] My guest today is Frank Downs. He's director of cybersecurity practices at ISACA, an international professional association for IT auditors and cybersecurity professionals. Our conversation today focuses on his experience as an adjunct professor in cybersecurity and the challenges he sees the community facing when it comes to educating the next generation of cybersecurity pros. Frank Downs: [00:16:15] There's kind of a two-prong problem here with getting everybody - actually, there's more like a three-pronged problem here when we're talking about getting everybody up to snuff for cybersecurity. First and foremost, we have this continually growing gap of - a great quote that was told to me by one of our members was, every time someone buys a new iPad or iPhone or computer or laptop, the internet gets a little bit bigger, right? And we - with the pace of new devices coming online every day, we're not making cybersecurity professionals or training cybersecurity individuals fast enough. So the gap keeps growing. If you take a look at our State of Cyber report every year we put out, the gap is still there, and it's still concerning. Frank Downs: [00:16:59] The second thing is, when it comes to training these professionals, is that you're using more traditional - primarily more traditional methodologies, such as passive learning for the individuals, for the students. That means - think of when you were in college, right? You would sit in these big halls. And you would have people sit, and they would all learn math from one person who would put it up on the chalkboard. And then it was your job to take it all in and then regurgitate it when it came exam time. That doesn't really work for cybersecurity. That doesn't really work for cybersecurity at all. You can't just, you know, sit down, have a passive death-by-PowerPoint experience, go in, sit down, take a multiple-choice exam and then all of a sudden be good at cyber. You're right. It just doesn't work that way. And so we have to change more thoroughly the method of learning across the board, not just in academia. Frank Downs: [00:17:50] And thirdly, there needs to be greater awareness, in my opinion. There was a study that was put out last year where nine out of 10 students - nine out of 10 millennials graduating - said that they didn't even consider cybersecurity as a career path. Not like they thought about it and then said no - as in it just never even crossed their mind as an option, which means there's lack of awareness. And they took a look at that one out of 10, and one of the things that they really had in common was that they had somebody who worked in the field directly or had told them about it in school. So that lack of awareness that's even an option is also concerning. So it's a three-pronged approach - three-pronged problem, if you will - that we are working with and trying to remedy. Dave Bittner: [00:18:39] Yeah. I mean, it's a really interesting insight, and I wonder - I mean, what you describe there of - you know, that's literally old-school technique of a professor at the front of a big lecture hall, which I certainly experienced, you know, way back in the day. Do we need to be shifting something more along the lines of a trade school? Frank Downs: [00:18:57] That's a good point because that's exactly how I learned, too, back in the day. And I imagine neither you nor I want to talk about how back in the day that was, right? Dave Bittner: [00:19:04] That's right. Frank Downs: [00:19:05] I think you might be onto something there, but I don't want to overgeneralize, right? Because right now there seems to be the strong push of college is bad, trade school is good, right? It's - everything seems to be flipped on its ear. And that's not necessarily the case, right? Trade school is good, and college is good. But I think we needed to look at something on a more basic base level - right? - a more basic level of how do we train these individuals, whether it is in some type of trade school or whether it is in college, right? Because what we've seen is individuals who do best in the field have some type of experience. Frank Downs: [00:19:40] I'll give you a great example. I've had several students over the last several years who have come to me and have said, I want to get a job in this field, but I don't even know how to do this. And I'm really concerned about it, right? Now these are my graduate students in - that I would - that I teach at night, and I teach them cybersecurity. And they were really concerned - right? - because most of these students come in, and their big thing is we would like to get a job. Meanwhile, I talk to every - all these different professionals in the field, many of these executives, and they go, we need more people for these jobs. There's clearly a miscommunication there, right? Frank Downs: [00:20:13] And I told the student, I said, you really shouldn't be concerned. You've done so much practical hands-on stuff here that when you go to this interview, compared to X, Y or Z individual or applicant, you're going to blow them out of the water. That, and you actually know what the NIST policies are. I can't make you comfortable, but I can encourage you that things will go well. And I'll tell you what. She was one of our best students. She came back and said, you were 100% correct. They said the majority of the people who are applying to this have no actual hands-on experience, haven't actually worked with malware, haven't actually worked with PAC analysis and so forth. So when they knew that I could do these things, and I even showed them, that combined with the misunderstanding of the NIST policies, well, they gave me a job. Frank Downs: [00:20:56] So I think - and that was in a college environment, right? That was in a grad school environment. Now can this be replicated in a trade-like experience? Yes. And as a matter of fact, it is on a regular basis. There are several different things that ISACA is working with partners on having more of a trade school environment wherein individuals can come, can sit down and don't have to go - don't necessarily experience this more formal education path and are able to reskill into the field of cybersecurity. So I think it's an issue that is both impactful for trade schools and for traditional academia as well. Dave Bittner: [00:21:33] So the institutions that are doing it right, those colleges and universities even down to the community college level, the ones who are - who, in your estimation, are setting up the proper mix of things here. What do they have in common? What are they doing that that sets them apart? Frank Downs: [00:21:55] There's two things that I've seen in a lot of successful academic institutions and schools and programs. One is they're ensuring that the students are getting real experience. Whether that takes the form of a range - right? - or whether that takes the form of a lab that they do in class, they're actually working with real malware. They're working with real denial-of-service attacks. They're stopping these things. They're responding to incidents. And people are living them - right? - because there's no substitute for experience. There's no substitute for sitting down saying, oh, yes, I've dealt with Spectre, right? I've dealt with Meltdown. We can work with these things. Frank Downs: [00:22:32] The other thing that they're doing is they have partnerships and or programs that help these individuals get lined up with a job and can point them, or at least prepare them, to be competitive in the job market. I think that some institutions who aren't doing as well have this consistent mentality of, well, you got your degree, didn't you? Go ahead and get that job. That's not me. When you're starting to see some schools actually take a step back - and what's really, really interesting is you're seeing some schools do this with certain, like, liberal arts majors for example, right? You - it's no longer - and speaking as a liberal arts major - getting an English degree doesn't necessarily equate to getting a job. Frank Downs: [00:23:13] And you're seeing a lot of these more successful schools say, OK, well done. You got the English degree. Good job. You may notice that it's a little hard to get a job. We have this program that is a - either cybersecurity or IT or technical or engineering program that we can put you through and give you these additional skills that can make you more attractive, which I'll be perfectly honest with you, speaking from experience, it wasn't always my English degree that got me my job. In fact, it pretty much never was my English degree that got me the job. Frank Downs: [00:23:41] Now, I could write. And that did help at the job. And I could communicate. And as you probably know, in the field of IT or cyber or any other field, someone who can do the job and communicate it effectively, that - I mean, that's really valuable. So in the long term, they're setting these students up. But not all of these programs in these institutions are doing that, which makes it a lot more difficult for these students to then succeed. Frank Downs: [00:24:03] People need to know that this is an option. So I think we're finally getting a good beachhead established in trade schools and academia and reskilling programs for adults. However, I think there needs to be - I think we don't really have a good long-term solution until, as a field, we've successfully infiltrated, say, that high school and middle school level of learning and understanding. We're going to need to actually come together and build a more consistent and capable workforce through having a consistent training mechanism and methodology. When I start seeing these classes offered in high schools, and it's a curriculum they can take, then I'll be a little more encouraged. And I think we are going in that direction. That's just going to take some more time. It's really - because like I said, we're fighting this fight on multiple fronts. Dave Bittner: [00:24:51] That's Frank Downs. He's the director of cybersecurity practices at ISACA. Dave Bittner: [00:25:00] And that's the CyberWire. Thanks to all of our sponsors for making the CyberWire possible, especially our supporting sponsor ObserveIT, the leading insider threat management platform. Learn more at
global_05_local_5_shard_00002591_processed.jsonl/15981
Facebook is simulating users’ bad behavior using AI Facebook is simulating users’ bad behavior using AI Illustration by Alex Castro / Th Facebook’s engineers have developed a new method to help them identify and prevent harmful behavior like users spreading spam, scamming others, or buying and selling weapons and drugs. They can now simulate the actions of bad actors using AI-powered bots by letting them loose on a parallel version of Facebook. Researchers can then study the bots’ behavior in simulation and experiment with new ways to stop them. The simulator is known as WW, pronounced “Dub Dub,” and is based on Facebook’s real code base. The company published a paper on WW (so called because the simulator is a truncated version of WWW, the world wide web) earlier this year, but shared more information about the work in a recent roundtable. The research is being led by Facebook engineer Mark Harman and the company’s AI department in London. Speaking to journalists, Harman said WW was a hugely flexible tool that could be used to limit a wide range of harmful behavior on the site, and he gave the example of using the simulation to develop new defenses against scammers. In real life, scammers often start their work by prowling a users’ friendship groups to find potential marks. To model this behavior in WW, Facebook engineers created a group of “innocent” bots to act as targets and trained a number of “bad” bots who explored the network to try to find them. The engineers then tried different ways to stop the bad bots, introducing various constraints, like limiting the number of private messages and posts the bots could send each minute, to see how this affected their behavior. Harman compares the work to that of city planners trying to reduce speeding on busy roads. In that case, engineers model traffic flows in simulators and then experiment with introducing things like speed bumps on certain streets to see what effect they have. WW simulation allows Facebook to do the same thing but with Facebook users. Simulating behavior you want to study is a common enough practice in machine learning, but the WW project is notable because the simulation is based on the real version of Facebook. Facebook calls its approach “web-based simulation.” He stressed, though, that despite this use of real infrastructure, bots are unable to interact with users in any way. “They actually can’t, by construction, interact with anything other than other bots,” he says. Notably, the simulation is not a visual copy of Facebook. Don’t imagine scientists studying the behavior of bots the same way you might watch people interact with one another in a Facebook group. WW doesn’t produce results via Facebook’s GUI, but instead records all the interactions as numerical data. Think of it as the difference between watching a football game (real Facebook) and simply reading the match statistics (WW). Right now, WW is also in the research stages, and none of the simulations the company has run with bots have resulted in real life changes to Facebook. Harman says his group is still running tests to check that the simulations match real-life behaviors with high enough fidelity to justify real-life changes. But he thinks the work will result in modifications to Facebook’s code by the end of the year. There are certainly limitations to the simulator, too. WW can’t model user intent, for example, and nor can it simulate complex behaviors. Facebook says the bots search, make friend requests, leave comments, make posts, and send messages, but the actual content of these actions (like, the content of a conversation) isn’t simulated. Harman says the power of WW, though, is its ability to operate on a huge scale. It lets Facebook run thousands of simulations to check all sorts of minor changes to the site without affecting users, and from that, it finds new patterns of behavior. “The statistical power that comes from big data is still not fully appreciated, I think,” he says. One of the more exciting aspects of the work is the potential for WW to uncover new weaknesses in Facebook’s architecture through the bots’ actions. The bots can be trained in various ways. Sometimes they’re given explicit instructions on how to act; sometimes they are asked to imitate real-life behavior; and sometimes they are just given certain goals and left to decide their own actions. It’s in the latter scenario (a method known as unsupervised machine learning) that unexpected behaviors can occur, as the bots find ways to reach their goal that the engineers did not predict. Harman says the group has already seen some unexpected behavior from the bots, but declined to share any details. He said he didn’t want to give the scammers any clues.
global_05_local_5_shard_00002591_processed.jsonl/15982
Keyword research for your online store Keyword research for your online store When you start an ecommerce site, having a keyword strategy might seem less important. You’re selling products, right? So the product names are your keywords. While that might be true in a few cases, in most cases you need to focus on the keywords that describe the problem you or your products are solving for your customer. Selling sun protection? The problems you’re solving (or rather preventing) are, among others, sunburn and skin cancer, so these are your keywords as well. In this post, I’ll give you a practical approach on how to perform keyword research for your online store. After you’ve defined your position and found your niche, you must have a pretty good idea of the main keywords for your website. By putting some real effort in positioning your website, you unconsciously were thinking about what we like to call ‘long-tail keywords’. You were thinking about how you could refine your product or better: product description to match a certain target market. What is keyword research for online stores? Your keyword strategy follows that definition, as it consists of all the decisions you make based on that keyword research for your ecommerce site. This is where your search marketing starts: what do you do, explained in the language of your target market. It will help you come up with an extensive list of (long tail) keywords you’d like to rank for. Keyword research for your online store consists of three steps: 1. Write down the mission of your business. 3. Create landing pages for all keywords. Our ultimate guide to keyword research has more on this important topic. Step 1: What is your mission? We have talked about this before. The mission of your online store consists of the ideas you have about your website and your company. For the moment, let’s not focus on if that mission statement will prove to be genius enough to sell to people. This also largely depends on the market you are in. Some markets are highly competitive, with large companies dominating the search results. For instance, an ecommerce store with illustrations for children would even have to compete with online giants like Disney. Did you know Disney is an online publisher as well? Blogs like Disney Family attract hundreds of thousands of readers per day. I can assure you that these companies have a bit more budget for marketing (and SEO) than a starting online store like yours might be. Competing in these markets is hard, ranking in these markets is hard. All the more reason to make a good decision on niches and positioning. And keywords, obviously. Please note that if you decide on a specific long-tail keyword, that doesn’t mean you can forget about the competitive keywords altogether. These need to be mentioned, or better need to have a role in your website as well. You can’t optimize for [gluten-free vegan chocolate cupcakes] without focusing on [cupcakes] and [chocolate cupcakes] as well. Step 2: Making a list of keywords Try to focus on what benefits you bring to the customer, not on what you are selling from your own point of view. Normally, that will give you keywords they will most likely to use in their Google searches as well. Ask yourself: What will these people be looking for? What kind of search terms could they be using while looking for your amazing service or product? Ask yourself these questions and write down as many answers as you possibly can. Keep your unique selling point, or your customer’s unique buying reasons in mind when drafting your list of keywords. Make sure these keywords fit your ecommerce site. To get there, start with search intent. Uncover search intent Search intent is all about the why behind a search. There are four types of search intent, but only three are valuable for online stores: • Informational intent: People are looking for information; • Commercial intent: People are looking to buy something but they are not yet willing; • Transactional intent: People are willing to buy and are looking for the best place to do that. In general, people don’t go from thinking they need something to buying it the next second. Especially for larger purchases that buying process goes through a few steps. It goes from awareness to researching and all the way to find out where and how to buy it. This is called search intent. In all these phases, customers use different terms to find the products they need. To make your online store a success you need to know how the buying process or user journey of your customer works. All these insights help you reach them with awesome products and relevant content. Here’s how you can use the search results to create intent-based content. We all know the valuable insights a tool like Google Adwords Keyword Planner can give you. It’s one of the many tools that can give you an idea of the words you might want to rank for. If you need any help with finding the right keywords, please go read this post by Marieke about keyword tools you can use. For your ecommerce site, there are other ways to get to know the language and terms around a specific product or service. Professional SEO tools like SEMrush and Ahrefs have more in-depth data about your proposed keyphrases, including how difficult it might be to target those terms. Taking the difficulty into account, prevents you from trying to target impossible head terms that are probably dominated by big brands anyway. Tools like Ahrefs give detailed information about possible keyphrases For products, it also makes sense to take a look at that other huge search engine: Amazon. Amazon is a goldmine for product-related keyphrases and related terms. You can also use Amazon’s information architecture to learn how to classify your product. Search for your product (category) and see related — or long-tail — keyphrases pop up. Also, take a good look at the titles and product descriptions to gather more information about the products. Here, you’ll often find valuable keywords that your customers use to describe/search for the product. So it might not simply be a streaming microphone they are looking for, but a streaming microphone with a built-in pop filter and a tap-to-mute feature that’s compatible with all gaming systems and other computers. Amazon is a goldmine for product-related keyword research Eyeing your competitor There are probably many companies in your niche trying to woe the same customer. It’s good to keep a close eye on these. The ones that rank well for your keyphrases or products tend to have done their research. They found the terms needed to reach your customer and built content around these terms to stand out in the search results. Good for them! But you want that spot, right? Be sure to check out what they are doing and how they are doing it. Run their domain through an SEO tool like the aforementioned ones to uncover which terms the site is ranking for. This can give you enough ideas for awesome content that can steal their rankings! Don’t steal their content though. Step 3: Start create landing pages We did an article on this subject, which will help you understand how to set up a proper landing page. We’ve also listed five things you can do to improve your product pages. Don’t forget to structure your pages! By the way, feel free to perform an exit-intent survey to ask your visitors what keyword they used to find your site, and if they found sufficient information about the topic. Oxfam uses a form like that: oxfam-exit-intent-survey_1CCA5DA4 (1) TL;DR: Keyword research for online stores Want your store’s pages to rank? Then you should carry out keyword research for your online store! You can do keyword research in three steps: 1. Determine the mission of your business. Write down the ideas you have about your company, your website, your products, and your customers. Narrowing down your business automatically forces you to think about (long tail) keywords. 3. Create landing pages for all of these keywords. So go and determine a keywords strategy for your online store! Read more: Why should you focus on multiple keywords? » Keyword research for your online storeYoast.
global_05_local_5_shard_00002591_processed.jsonl/15997
94a The Mysterious Death of Edward II Time to vote? Did Edward die in 1327? Edwards NemesisNow, traditionally, Edward II is supposed to have died after an unfortunate meeting with a red hot poker. Which had always been my firmly and fondly held belief.  But ladies and gentlemen,History sleuths,  other views are, in fact, available. So this episode is all about whether Edward was  A) Murdered in 1327 on the orders of Roger Mortimer  B) Died but we don't know where or how C) Edward III killed him, not Mortimer! E) Dunno Now I realise that it's not easy to do this by podcast – much ink has been spilt after all. But hey – have a go at voting, either here or at the Facebook group. So, just post a comment below. I'll tot them all up and we'll see which side wins… 94a The Mysterious death of Edward II  Want to know more?  You might like to do a bit of research – you may be fascinated. If you are, here are some links to a couple of sites.  First of all here's a link to the full text of the Fieschi letter – it's not very long and if you are interested it's very interesting.  Edward II Blog – I Edward II Blog – II Edward II Blog – III Ian Mortimer's site Or, you might like to just revisit what I have said. In which case, here's the transcript of what I said.  Download 94a The Mysterious death of Edward II Transcript Happy sleuthing! 38 thoughts on “94a The Mysterious Death of Edward II 2. I like the conspiricy theory. One question though burns in my mind. Who would die for something they know to be a lie? If any of those on trial for their lives were in a conspiricy they would only have to blow the whistle on the whole thing to get off of a murder charge. It seems to me that probably the conspiricy to swap Edward II for another corpse was probably John Maltravers, William Ockley and Thomas Gurney who all fled the country. They probably pulled the wool over the eyes of Mortimer and Berkley. Berkley probably just tried to cover up what he thought to be a murder of an ex King. So Mortimer and Berkley would have been convinced of the reality of the murder and so, thought themselves guilty when put on trial. I recon that Edward III was unawares but gradually smelt a right royal rat. Hence his investigations into the matter. These were not so much to bring the murderers to justice but rather to find the truth as to his Father’s whereabouts. As for isabella, she was probably thought to be too much of a risk to involve in any plot, even if people close to her knew of a body swap having gone on. Edward III probably kept his suspicions and any facts that he had to his father’s whereabouts a secret from her to save her any more grief. So, when she died she was unaware that the body in the tomb was not that of her husband. How about that one? By the way, in those sealed up tombs bodies last a long time. Couldn’t someone try to get a DNA sample from the four edwards (I, II, III and the black prince) maybe the mystery of the body in the tomb could be settled once and for all that way. 3. There aren’t many motives in stories like this one except Money, Sex, Power and saving your own backside. Mortimer wanted the ex-king dead so that his position would be more secure (no attempted coups to put the old king back on the throne). He probably also wanted more than the little attention he was probably getting from Isabella. She was his ticket to power but her love for her husband was getting in the way of the more that he wanted. Berkley want to please uncle Mortimer and also get a slice of power. Edward II wanted to save his life. So, if he was forwarned would most likely have escaped. If my theory is correct the henchmen wanted to save their backsides by producing the dead Ed to Berkley, so they covered up the escape and disfigured the convenient corpse enough to fool Berkley. Mortimer and Berkley (thinking the body to be that of Ed II – dead Ed you might say) then had the motive to disguise the now obvious murder as a natural death by the funeral arrangements. Isabella was out of any loop because she was too much of a loose canon by her deep love for Ed II. To me it seems likely that Ed III once he was old enough set out to find the Truth. His motivation being a deep love of his father (even though he was a loser). Ed II just wanted to retire in peace. What a retirement plan eh! Plenty of credible motives there I think! 4. Maybe however, Ed II did die. He probably mistook the offer of a game of poker with the henchmen as having something to do with cards. I still like my theory though. Much more hollywood I think! 5. I am by nature deeply compliant, much given to believing and doing what I am told. And so, by and large, I think conspiracy theories are utter rubbish. This one is strangely compelling – and indeed worthy of good brother Cadfael! The Earl of Kent DID seem to rumble it. The letter is very actual by a reliable witness. Most of all, Mortimer had a real hold over edward III by so doing. All seems rather incredible at one level but…. 7. F) Edward II is immortal, still alive and living happily like a prince in Patagonia, supping on grapes and whatnot. In the 50’s he got bored and became a hip-swaying rock n’ roller by the name of Elvis and continues to make occasional public appearances. Sorry, THoE – that many people can’t keep a secret a secret that long. It must be A. 8. A… The complete answer is that really we do not “know” as this debate proves. So we should fall back on what we “know” and I do not mean by that the facts that we know but that by cultural acceptance, we know that Edward II was murdered with a red-hot poker up the ****. It would be such a shame if it weren’t true, not least because debunking the idea that it was done as some sort of retribution for his homosexuality quietens the homophobes. The theory being that the use of the poker was a useful way of not leaving any outward marks. So can’t we just have A because that is our story and be done with it? 9. It doesn’t help when the major villain of the piece and the historian being reference both have the same name. Also, what a coincidence that Thomas Berkley lived in a castle of the same name as him!!!! LOL 10. There seemed to be too many that saw the body after Mortimer had him killed. I agree that the brutality of the death is over the top but it certainly makes for a great legend and justifies Edward III’s revenge. 11. But Luke, what about the never ending search for truth?! I do think it’s really interesting how hard it is to shift and change the received history of England. As far as historians are concerned, the red hot poker thing is a myth. It doesn’t really make any sense – why go to all that bother? You are much more likely to leave an accidental mark with e red hot poker than a pillow. But despite all that, it’s still the popular view. It’s a bit the same with Richard I – generations of historians had a go, but basically he’s still the crusading hero… 12. D – Although I have relished telling the hot poker story over the years, I regrettably must side with the theory that he escaped and lived incognito. 13. Although I like the thought that Edward got away, I think he was murdered because he was always going to be a threat to the new regime. I am not sure about how he was murdered but smothering seems a little more subtle than the red hot poker story. 14. Killing God’s annointed king was a very, very serious mortal sin. Edward clearly did have his supporters, despite his bad press in the history books, as he was able to make an escape from Berkeley Castle, even in the official story. Story is similar in status to that of Perkin Warbeck. Fieschi’s letter is convincing. Edward was perhaps a reluctant king, and would welcome a kind of retirement, like his much, much later namesake. I vote D. 15. Loved the podcast, but in the same way that I never believed the JFK conspiracy theories, I don’t believe this one either. I vote A. Keep up the good work…..you are the history teacher that I always wanted but never got. 16. I caught up with this most entertaining episode today. Based solely on the evidence as you presented it (note to future jury members – that is how you are supposed to do it), I vote A. I did enjoy the various Elvis related comments above. If the poker thing is true, Ed II will have been more than simply “All Shook Up”, indeed, “Come on baby light my fire” might be the most apt song for that scenario. 17. You know how elderly spouses often die shortly after their spouses? I think this is because of the absence of routine and the obvious absence of the love of their lives. Now imagine being a King one day, then not a King the next day. Despite E II robust health up until this, I believe the heartbreak and stress from this trauma brought about his death, or at least hurt him to such a degree that made him susceptible to illness, always close by at this time in history. Was E II, who I believe was an incompetent king, really a threat to Mortimer? Plus, I believe the earliest chronicles suggest he died of “broken heart” or grief. He probably lost the will to live or stopped taking care of himself. I don’t believe we need Mortimer to order his death, for E II to die. Perhaps I am full of touchy feely emotions and deserve to have my opinion scoffed at by serious historians, but whatever. I vote B Wonderful podcast by the way, I enjoyed this episode tremendously. 18. Historians can be a dull old lot can’t they – debunking the red hot poker story has robbed us all of a good line in history gags! The evidence is, Charlie, that Edward II did not take his deposition well at all. Dying of a broken heart would be pretty much in character I think. 19. Even in medieval times, I find it hard to believe Edward II was able to park himself outside the country for a number of years without anyone noticing. That’s like no one in Sheboygan, Wisconsin noticing that Elvis was working in the local 7-11 convenience store years after he faked his own death. 🙂 My money’s on A. That rascal Mortimer orchestrated the whole thing. 20. Option B… dull as dishwater, completely without sex appeal, but obviously true. He’s dead. And we can’t agree on much of anything else. 21. Along with the Elvis comments, don’t forget the words of Jerry Lee Lewis “Goodness! Gracious! Great Balls of Fire! 22. There is always the Prince of Wales argument. EIII didn’t create his son PoW until the mid 1340s. EII had been created PoW by EI but had not necessarily resigned that title and EIII didn’t recreate it until he knew that his father was dead. 23. One commenter somewhere did note that Edward II had lots of quiet habits -hedging, ditching, rowing. Everyone thought it terribly in appropriate at the time, but maybe he would have enjoyed not being king? Either way he wasobviously pretty emotional – took it very badly at Kenilworth Castle when he was told. So the borken heart thing’s not daft, I agree 24. I agree with Chris Roberts and vote D. Killing a king, annointed by God, is a very very serious crime and sin. I can’t believe that they would have been so bent on regicide. Killing a king in battle is different. How many English kings were known to have been murdered? Henry VI comes to mind, but I can’t think of many. 25. Further to that I would add killing a King sets a precedent that Kings are as disposable as anyone else. A queen would be fearful of this as then they may decide a queen is disposable too. 26. I believe that in the medieval mind the idea of the punishment matching the crime was popular, so in the case of Edward II a red hot poker in the bum would be seen as just. Of course Edward II had to be killed, so I think there is a good chance the killers would choose the poker. That is why I vote Edward Hotbottoms. Leave a Reply to Les Read Cancel reply
global_05_local_5_shard_00002591_processed.jsonl/16001
JD Streams, The JD: Unplugged The JD: Unplugged #3 Welcome everyone to episode #3 of The JD: Unplugged. Today we welcome Joe Van's sister to the conversation! The topics we cover in today's episode are: -Our locations -Protest -Lockdown -Businesses and taxes -Toilet paper rolls -Sundays or Mondays -Gendered roles -Mini worlds and babies -Dumb names -Scissors -Mandelbrots The Final Frontier https://youtu.be/eTK5G2npZl0 It's hard to articulate, but the void; a word to describe nothing... Nothing, that isn't a thing, but a lack of, like the space between atoms, is the only thing that existed for all of us before we were born. This milestone edition of Thoughts is on the topic: the Final Frontier. None of… Continue reading The Final Frontier I would like, if I may, to take you on a strange journey.(The Rocky Horror Picture Show) Be afraid... Be very afraid.(The Fly) It's Halloween, everyone's entitled to one good scare.(Halloween) Double, double, toil and trouble; Fire burn and cauldron bubble!(Macbeth) The ghosts are bad but the one that’s cursed, is the headless horseman; he’s… Continue reading Halloween JD Streams, Spoken Thoughts Thoughts 47: Life in 100 Years In episode forty-seven of Thoughts, I ask you to join me in a thought experiment! We ponder the question: What will life look like in one-hundred years? We go over governments and infrastructure, to human lifespans and potential events. I hope to hear from y'all. Enjoy! https://youtu.be/hdV1QPfoq4s Spoken Thoughts Thoughts 46: Where Did We Come From? Part Two In episode forty-six of Thoughts, I continue our journey through the deep history of our species. What did we create on our own and what came instilled in us? How long did we wonder, and what traces of our ancestors can be seen in us today? I hope you all enjoy this take! It was… Continue reading Thoughts 46: Where Did We Come From? Part Two Spoken Thoughts Thoughts 45: Aliens In episode forty-five of Thoughts, I dive deep into the history and lore of aliens, what the word means, and how we've come to understand the possibility of other lifeforms in the universe. Enjoy! https://youtu.be/qIz_3cuvvn0 Spoken Thoughts Thoughts 44: Where Did We Come From? In episode forty-four of Thoughts, I go over the vast account of our ancestral lineage. From creation myth, to ancient aliens, to the facts, our time on Earth has been unfathomably long. Enjoy! https://youtu.be/yCY_NR-Ti5Q Where Did We Come From? Part Two What Is It Like to Be a Bat? is a paper that was written by American philosopher Thomas Nagel, first published in 1974. It was the public's introduction to the idea of, not only, 'I think; therefore I am,' but, 'there must be ways in which it is like to be something, other than our… Continue reading Where Did We Come From? Part Two Joe Van's Secret Podcast SP 61: Physiotherapy Welcome to episode 61 of Joe Van's Secret Podcast! In this episode I interview a newly acquainted gentleman and professional who specializes in the therapy of the body. In his words, he 'beats people up until they're better'. I couldn't have put it better myself. Enjoy! What's that, in the sky? It's a bird! A plane! No, it's a U.F.O. BRO! Holy S**T Bro WHAT THE F**K?! Hey everybody and welcome back to another thought piece by me, ya boy, Joe Van! Today we will be going over the topic of aliens! Whether you mean people from another country, an unusual… Continue reading Aliens AA EH, JD Streams AA EH 11 Welcome back everyone to the AA EH! Also known as the triple A podcast, where we talk everything from alcoholism to recovery. In this episode we go over societal norms around drinking and how smoking has changed. As well as the potential inclusions of parties for the future. Enjoy! Spoken Thoughts Thoughts 41: Introductions In episode forty-one of Thoughts, I read to you guys from the beginning page of my four completed novels. I start the narrative with a mini thought piece to prime y'all for the what the story will cover. Let me know if you guys liked this video however you can! It's greatly appreciated. Enjoy! https://youtu.be/sTaHpVYMSbc AA EH, JD Streams AA EH 10: Introduction To This Pod Everyone welcome the 3rd and newest series to this RSS feed! The AA EH, also known as the triple A podcast! Where we talk everything AA from alcoholism to recovery. Co-hosted by Joe Van and Derron G. In our 10th episode, we catch everyone up to speed with the two of us and how we've… Continue reading AA EH 10: Introduction To This Pod Spoken Thoughts Thoughts 40: Reality In episode forty of Thoughts, I talk about the one thing we all perceive yet all perceive differently: reality. I go over how much we know or could know about reality, along with how our minds construct the reality we all personally experience. Enjoy! https://youtu.be/ZI_DSEB62pE Where Did We Come From? https://www.youtube.com/watch?v=yCY_NR-Ti5Q Well, once upon a time, Adam and Eve were made by God. According to the creation myth of the Abrahamic religions, they were the first man and woman. Okay, okay, I'm just messin' with you, but for the longest time this story and others (where we all came from one pair) was the only answer we would get… Continue reading Where Did We Come From? Great Value Deluxe Mixed Nuts (with 40% cashews) houses many nuts, one of them being hazelnuts... but on the packaging they refer to hazelnuts as filberts. My girlfriend wondered at first what filberts were and why they didn't put hazelnuts on the can. Great Value isn't a Canadian brand as it is owned by Walmart,… Continue reading Filberts Spoken Thoughts Thoughts 38: Ending Adolescence In episode thirty-eight of Thoughts, I talk about growing up, from childhood to adolescence to adulthood. Life holds so many changes for us and we've charted them to great detail, save narrowly for the ending of adolescence, in my mind. I go over this and what it means to really grow up. Enjoy! https://youtu.be/roRjSVP5K0M States of Consciousness When I put together my visualized Thoughts piece: Reality, (that you may or may not have seen yet depending on when you're reading this,) I used psychedelic visuals to start the video, yet at no point did I talk about the mind in that altered state, only that hallucinations are to be taken with care...… Continue reading States of Consciousness Before getting into it, I just wanted to preface this piece by saying that if you believe in astrology, turn away now! I come at it with my biases and am rude to the subject. Now, with that said... Ahh the reading of one's psychology through the motion of planets and stars, peak science. Welcome… Continue reading Astrology Ending Adolescence Adolescence itself is the period following the onset of puberty, during which a young person develops from a child into an adult. We all know about adolescence. Aside from us personally experiencing it, countless coming-of-age movies and shows cover it. Most of the other major life changes are covered as well. Growing up is a… Continue reading Ending Adolescence Proper Introductions 2020 https://youtu.be/Am2x4AGUzp0 Hello one and all! Check out my YouTube channel found through this video here or in my CHANNELS page. I'd love to have a conversation with you about any of the topics I've talked about, and the others I have yet to! Let me know what you think anywhere you can comment, and enjoy! Joe Van's Secret Podcast SP 60: Beautiful Simplicity Welcome to episode 60 of Joe Van's Secret Podcast! In this episode I bring back my first new guest post COVID-19 to continue our deep dive into various subjects! We cover the economy and how by not increasing pay during something like inflation IS in itself an action, we cover our earliest memories, health and… Continue reading SP 60: Beautiful Simplicity The Legend of Zelda The Legend of Zelda is a video game franchise where you play a silent-type heroic character clad in green, that fights the flood- wait! Wait waitwait, wrong franchise. Sorry. In the Legend of Zelda, you play as a character appointed by your commanding nation to quell the forces against your kind, harnessing little more than… Continue reading The Legend of Zelda Joe Van's Secret Podcast SP 59: Context Welcome to episode 59 of Joe Van’s Secret Podcast! Today I have on my fifth guest post COVID-19. We waste no time jumping into Ang Lee's discography, conspiracies- both ludicrous and true, how separation leads to hate, the new viral 'woke and racist' skit on Twitter, Oakville's checkered past AND present, why Canada should not… Continue reading SP 59: Context Joe Van's Secret Podcast SP 58: What we Observe Welcome to episode 58 of Joe Van’s Secret Podcast! Today I have my first NEW guest, post COVID-19. We waste no time jumping into heavy topics such as belief, hard concepts that will ne'er have an answer, working to learn how you want to work, and living situations. It was a blast to have him… Continue reading SP 58: What we Observe When you think of tolerance, do you think of physical tolerance, or philosophical tolerance? The capacity to endure continued subjection to something, be it a drug, transplant, antigen, or environmental conditions, without adverse reaction, is physical tolerance. The ability or willingness to forbear something, in particular the existence of opinions or behavior that one does… Continue reading Tolerance Late Nights I gave you guys a late night thought of mine in Transient Thoughts, and here I just wanted to talk about late nights in general. They are the time of a 24 hour cycle where most people are asleep. It's when it's quietest in your corner of the world, and it's when deep thoughts can… Continue reading Late Nights Plugs, Spoken Thoughts Joe Van Recommends https://youtu.be/J42QWgMhFcU Hey everybody! It's ya boy, Joe Van, comin' back at ya with another piece, but this one's different from the rest. In this piece I wanted to recommend some YouTube channels to you guys. These channels are ones I've come across over years of binge-watching YouTuber content. So, they'll come in no particular order,… Continue reading Joe Van Recommends At my elementary school, when you rose to grade five, you were inducted to the fictional island of Foo. You learned their language and pastime sports, and near the end of the year you would compete with your peers to claim victory in each category. That was the first and only time I truly learned… Continue reading Language The Conflict with Conflict Does life need conflict? More specifically, do humans need conflict in our lives to keep things interesting? Just look at animals in zoos for Pete's sake. They got no worries in the world, but also nothing to do. Good stories certainly need conflict. And states of higher consciousness or enlightenment are merely momentary, so it… Continue reading The Conflict with Conflict https://youtu.be/JUIsH7grZW0 When you first saw Halo, were you blinded by its majesty? Before I jump into the video game that I'm actually referring to, let's cover the other uses of the word. A halo is a disk or circle of light shown surrounding or above the head of a saint or holy person to represent… Continue reading Halo Love is compassion and attraction. It's kindness and well wishes. It's hidden magic, being in it, and something worth fighting for. If life is a game, love is the prize! It's the one thing everyone wants. But does true love really exist? Sorry to keep playing the word game with you guys, but let's look… Continue reading Love Joe Van's Secret Podcast SP 57: Simulated Frights Welcome to episode 57 of Joe Van's Secret Podcast! Today I have another 2nd time returning guest come back from the top of the year to discuss their experience during Canada's quarantine time. We talk about Black Lives Matters protests, films to watch, Jay-walking, what the odds are that we live in a simulated reality,… Continue reading SP 57: Simulated Frights Strength and Power Strength! Power! Austin POWERS. What is strength, and what is power? Strength is physical, and strength is emotional. Power is external control and authority, and control is an illusion. So what does that say about the people seeking power? One could say they're chasing a fleeting dream, like chasing the pink dragon- something they might… Continue reading Strength and Power
global_05_local_5_shard_00002591_processed.jsonl/16008
Bluefin on Fly Words by JD Filmalter Images by Fabien Forget and JD Filmalter The prospect of targeting the mighty Atlantic Bluefin tuna on fly didn’t allow for much sleep the night before, so it was a somewhat weary trip down the coast from Séte to Perpignan, just north of the Spanish boarder on the French Mediterranean coast. [...]
global_05_local_5_shard_00002591_processed.jsonl/16010
February, 2019 Gifts and Gods When I fly, I never talk to the person next to me. I sit quietly and read a book while they sit quietly and watch a video, just as God ordained airline passengers to behave. But every once in a while, I accidentally slip into a conversation that causes me to question my silent-flying philosophy. Last week I flew home from a Hearing God Conference in Colorado. The man next to me asked me if I... Read More
global_05_local_5_shard_00002591_processed.jsonl/16020
My Treatment Plan I’ll never stop fighting to find my joy, but I have learned the value of feeling for healing. Here’s the process that has worked for me: When your heart wants to break, let it! Let go. Feel all of it. The heavy and simultaneous empty. Feel it ripping apart your insides. Cry. Wale. Carry on like a child (but preferably in your war room closet so the kids don’t worry: But if they do, they learn compassion). Tear apart the invisible cord extending from your chest straight down through your solar plexus. Rage. Love. Hate. Reminisce. Overthink, overanalyze, change your mind, change it again because it needs to be done. Go down into the dark well- for you know your rope it tethered to God. And when you have sufficiently exhausted your soul, thank the Lord for holding that space for you. Take a nap. Wake up and when the pain creeps back on like a wave crashing on your heart, let it! Let your eyes well up. Exhale bursts of sadness. Breathe in divine love. Look around. Thank God for the multitude of blessings in your life. Allow yourself to be overcome by the loneliness of not sharing your blessings with a lover. Walk around in a daze. Lost in empty thoughts. Then be distracted by someone else’s drama. Hulu and Netflix are great helpers for this step. Hold your children. Kiss their forehead and know how much love you get and have to give! Think of the times you were joyful. How do you get back there? Breathe. Deeply. Into the belly, filling it like a balloon. Exhale the doubt that says you don’t have a purpose. Be your joy. Make a conscious choice to get back up. This is the crucial point… do you take back your joy or do you let misery win? Let it all go. All of it. You are made new! You have a purpose and someone out there will receive you! When we trust in the Father, we have hope. Hold that hope. Love always fucking wins! Get some rest. Tomorrow will be a brand new morning. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/16031
How to make your own page markers Hey everyone! A while back, I bought a notebook to use as my next bullet journal, but I realised when it was delivered that it didn’t come with page markers i.e. the thread you use in diaries to mark which page you’re in. Since I use it a lot to keep up with my bullet journal and open to the current spread efficiently, I decided to make one myself. And I thought, why not make a blog post on it, so here we are! I’m making this for my Doodle notebook (which I’ve reviewed here). Materials required:  • Your notebook • A blade/pair of scissors. • Long scale • Ribbon NOTE: This is only for the notebooks which have space between the cover and the pages. Like in the following picture. Step 1: Measure the ribbon Take a little more than twice the length of your notebook. Now, just to check the length and how it would be I folded the ribbon twice and put half of it through the space. You don’t have to do this. Step 2: Cut one half of the ribbon into three strips Keeping the ribbon on a newspaper, cut half of the length into three even strips using a scale and a blade (or scissors, if you prefer). There might be some strands of the ribbon coming off and making your work look messy, but don’t worry about them. That will happen and you’re doing nothing wrong. Step 3: Twist the strips This is to make them thin and also to give a little bit of volume to them. Why? You’ll find out in the next step. Step 4: Braid them! IMG_20161127_140443637.jpgI like braids. On anything, basically. I even made a bunch of (like 50 or so) bookmarks for an event in school last year and they were braided. So, I braided this too! (Should I mention here that this was the first time I was doing this and had absolutely no reference? I was just following an idea.) Since we cut only half the length into three strips, we are only braiding that part. Let the other half remain as it is, since it’ll be going through the gap. This (see right) is how it looks after braiding. Cut off any thin strands sticking out so as to make the braiding look neat. Step 5: Put it through the gap IMG_20161127_140746387.jpg(I’m using “the gap” so much, maybe I should trademark it :P) Fold the untouched half of the ribbon twice and carefully put it through the gap from the top, so the braided side will be coming out from the top. The more it’s folded, the easier it will go. Once it comes out the other side (below), bring it out a bit more so we have some length. Now, if the length of the braid is just what you want, tie the end by doing a knot so it wont come off or staple the end. In this picture, I’ve made a knot. As for the other little bit of simply folded length that we have through the gap, make a knot with that length TWICE, one over another, so that it will not slip and come out back if we pull the braided side. After the knot, keep a bit of length so the knot wont unwind and you can cut off the rest if you don’t want it long. And that’s it! Your page marker is made and you can now be happy with your notebook! I hope you understood how to make these and this was helpful 🙂 If you make it, let me know how it turns out! 4 thoughts on “How to make your own page markers” Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/16038
About Eating Your Own Tail I just read Netflix demolishes own business model on John Caddell's blog and I think it's very much worth passing on. John is posting about Netflix now working with various (he just installed a Roku digital video player at his house) on-demand options that potentially cannibalize it's main business of DVDs by mail. It's got to be a tough world in video media these days. Things change fast. That gap we used to fill by renting videotapes turned to DVDs and then DVR and now at our house we've also got video on demand from iTunes and Amazon Unbox and Comcast, as well as Netflix instant. For a while there, Netflix was the only really competitive game in town. As far as I'm concerned, they blew Blockbuster out of the water. But then the whole world of DVD rental starts to go away, and what do you do? John says: What’s so impressive to me about this is that Netflix is investing in technology and partnerships expressly designed to make their old business model obsolete. When I think about how much they have spent, in dollars and time and thought, on the sending-videos-through the mail model, I wonder how they were able to make the leap to say, “We have this process optimized, but it’s not the future. Time to build a new model”–meaning internet streaming. Netflix founder Reed Hastings recently said "We named the company Netflix, not DVDs by Mail, because we knew that eventually we would deliver movies directly over the Internet." That's in a post listing his 4 secrets of success: Target a niche, stay flexible, never underestimate the competition, and take no shortcuts. It speaks to flexibility, of course. John has a more troublesome word for it: "cannibalization." One of the most repugnant terms in the English language – referring to one of the greatest human taboos – is used when a company’s new products take sales away from its older products. So I propose the revisionist phrase "eating your own tail." Because you're eating yourself, in a way. But isn't that also the best way to go in a fast-changing market? John concludes: The problem is, the marketplace is a bit like the jungle. If you don’t eat your own, someone will eat them for you. And this has happened again and again. One example: GM’s abandonment of the EV1 electric car just a few years before Toyota introduced the Prius. To survive, companies will have to get rid of that taboo against cannibalization and act more like Netflix. I have a suggestion for marketers. If you want to get approval to introduce a better product, instead of referring to “cannibalization,” call it “upselling.” And I have a conclusion too. I'm in awe. Can you imagine what it takes to not spend all their time defending DVDs by mail? Can you imagine how hard it was, there in the Netflix headquarters, to really move into video on demand? That's so hard to do. There's a lesson there for every business. 2 thoughts on “About Eating Your Own Tail 1. Tim, I'm a bit in awe as well. You took a partially-thought-through idea, probed it, refined it and added to it. The result is kind of a diptych–two linked posts that form the basis of a dialog on an important subject (important to me, anyway). This kind of collaboration is unique to social media. And that's one of the things that really annoys me when the MSM denigrates blogs as useful info sources. Peer-to-peer, emerging dialog just doesn't happen in the MSM. It's one voice (with an editor in the background, perhaps). It's static. Even when MSM outlets use blogs and other online capabilities, they enfeeble them. Newspapers put older articles (some as recent as 2 weeks old!) behind pay firewalls. The New Yorker blogs, which are superbly written and insightful, as you'd expect, don't allow comments (!?!). This to me is like purchasing a new car and refusing to use reverse gear. It's just crazy. (Perhaps fueled by fear of eating one's own tail, to bring it back to the subject of the dialog.) Sorry to drag on, but I think your post highlighted one of the distinctive values of blogging & social media. It's one of the reasons fewer people buy newspapers, & more people are participating & creating their own information sources. regards, John 2. Thanks John. Interesting take on this too. I was with a group of students today, an entrepreneurship class, undergrads, who seemed to take for granted that news in the future will be web-based, involving micropayments, and newspapers will die. None of them, however, pointed towards this kind of advantage with social media. My favorite news outlet is Huffington Post, which goes to your point, but I'm biased because I post there. But I have to admit that I also spend a lot of time with NYTimes, and there too, the comments are part of the medium. Look at the Freakonomics blog there, or David Pogue's areas, and you'll see conversation and dialog. And Paul Krug is often bringing and minding the conversation. It's a new world. And I'm with you, I like it. Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/16043
1, Paarlampi, all android apps started to "update" asked 2014-04-11 11:52:21 +0200 JoneK gravatar image updated 2014-04-11 12:05:41 +0200 After updating, all the android prgorams started to run the "update" animation. edit retag flag offensive close delete It is stated in the release notes and is expected behaviour. bockersjv ( 2014-04-11 12:19:09 +0200 )edit 2 Answers Sort by » oldest newest most voted answered 2014-04-11 12:05:57 +0200 rainisto gravatar image updated 2014-04-11 12:35:48 +0200 Yes, newer version of alien dalvik needs to reinstall all the apk's in the background for 1st boot. We forgot to mention that in release notes... notes will be updated. edit flag offensive delete publish link more Do I need manualy reinstall all apks? koloss ( 2014-04-11 12:45:40 +0200 )edit No, it's automatically done by the system, just give it a few minutes. VDVsx ( 2014-04-11 12:50:03 +0200 )edit I didn't have any network connection, the first time I booted in Are my apps already reinstalled? Do I have to manually do it? Thanks magullo ( 2014-04-11 15:52:28 +0200 )edit @magullo, like already answered, its done automatically and you don't need network or any manual steps. rainisto ( 2014-04-11 17:08:03 +0200 )edit FWIW, the Android apps (all 4 of them) took a very long time to update, so I checked the aliendalvik service: [root@Jolla nemo]# systemctl status aliendalvik.service aliendalvik.service - Myriad Alien Dalvik Loaded: loaded (/lib/systemd/system/aliendalvik.service; static) Active: inactive (dead) CGroup: name=systemd:/system/aliendalvik.service So I restarted it: [root@Jolla nemo]# systemctl start aliendalvik.service and after that the four Android apps updated in seconds. I found the solution in coments here: https://together.jolla.com/question/38508/release-notes-software-version-10516-paarlampi/ tingo ( 2014-04-12 19:03:13 +0200 )edit answered 2014-04-11 18:00:20 +0200 sledges gravatar image Apparently if you have big applications like games, it may take a while. Had a case 30 apps with 4 angry bird games with them, were updating for ~2 hours. So please be patient edit flag offensive delete publish link more Have a little another question, how I can check via CLI if all my 16 app updated ? After reboot I have got message about update of android apps and it said it can rearrange order of apps. I pressed OK, but I didn't saw any spinning animation on the icons of android apps, all icons on the same places and I don't now if it updated or not. Any command to check if this update done ? Thanks P.S. Checked dates via File browser in /data/app, looks like all app have got new date (today), probably it means all apps updated... Schturman ( 2014-04-12 01:39:22 +0200 )edit My android apps have been reinstalling for 24 hours. 17 apps, with Real racers 3, the only large one. Signalman ( 2014-04-12 17:32:17 +0200 )edit Same question as schturman here, is there anyway to check if the Androids apps have been updated? I am surprised that sms support does not work in one of my app (Waze). lunatix ( 2014-04-14 13:52:42 +0200 )edit Login/Signup to Answer Question tools Asked: 2014-04-11 11:52:21 +0200 Seen: 728 times Last updated: Apr 11 '14
global_05_local_5_shard_00002591_processed.jsonl/16046
Apple Web Stuff Cleaning up Word HTML Today, whilst building a new data downloads section for the Archaeology at Heathrow T5 website, I had to convert a load of Word documents full of tables and subheadings into beautiful xHTML Strict for pages in a WordPress environment. Normally, I’d open the files in Word 2004 (on a Mac), save them as HTML, then use Dreamweaver 8 to open each file, clean up the HTML via the “Clean Up Word HTML” command, then perhaps do a bit of cleaning by hand (i.e. removing the inline CSS). But faced with 8 fairly complex documents, I decided that there must be a more efficient way of doing this. A quick Google (“clean word html osx”) revealed a remarkably simple process. I’ll repeat it here, just for my own notes. Open the Word documents in TextEdit (I’m a Mac user, remember!). In TextEdit go to Preferences, then go to the “Opening and Saving” tab. In the HTML saving options select “XHTML 1.0 Strict” and “No CSS”. You can also tick “Ignore rich text commands in HTML files if you like. Then saving your Word documents as HTML using TextEdit gives you beautifully clean code to work with. TextEdit’s HTML export options 2 replies on “Cleaning up Word HTML” Comments are closed.
global_05_local_5_shard_00002591_processed.jsonl/16047
There are different possible notations for languages: textual and graphical are the two larger families. We can define graphical notations for formal languages. For example we can define a graphical notation to define state machines. A Domain Specific Language for state machines can be defined using JetBrains MPS. However the user would have to edit the state machine inside MPS. I wonder if we could instead specify a state machine just by sketching something on a whiteboard. Consider this example: We have a start state (the white circle on top) which leads us to the state A without needing any event. Then from state A we can go to state B when an event of type b occurs. Or we can go to state C if an event of type a occurs. From C we need a state of type c to move to D. Note that I did not represent the direction of transitions, we could assume that they always lead from the higher state to the lower. I think that at this point we should just make a picture to this sketch and obtain a program which would permit to run this state machine. To do that we should recognize the different shape, the text present and assign everything to a corresponding concept in our DSL. The first step would be to recognize rectangles. I guess there are already libraries to do that. I tried OpenCV but I really do not like the way C++ dependencies are handled. I started playing with BoofCV instead, which is written in Java. I first used functions to recognize segments and I got something like this: Screenshot from 2016-03-28 19-12-53 Then I wrote some functions to merge segments which have endpoints very close and similar slope, to reduce the number of segments. That did not work particularly well. Screenshot from 2016-03-28 19-13-03 I realized I should probably use some pre-processing: first a Gaussian blur and then calculate the derivatives over the X and Y axis. I got something like this. The colors depends on the values present in the derivates X and Y images. I should use those values to recognize horizontal and vertical lines with common endpoints and so get rectangles. Screenshot from 2016-03-29 18-49-46 This is not as easy as I hoped but I would love to spend more time on it in the future. Still, people will need some ability to formalize their thoughts but we can definitely remove some of the incidental barriers due to languages, notations and tools. Download the guide with 68 resources on Creating Programming Languages Powered by ConvertKit Creating a Programming Language Learn to Create Programming Languages
global_05_local_5_shard_00002591_processed.jsonl/16053
Centre Holidays - Redefining Travel Classical Greece A cruise unlike any other, experience an inspiring voyage unravelling the wonders of classical Greece, through the Aegean Sea to the Peloponnese mainland. Day 1: Friday Marina Zea, Athens Kea Delos Embarkation at Marina Zea in Athens, between 2:00 pm - 3:00 pm. Enjoy a welcome drink and meet your crew and fellow passengers. Depart via Cape Sounion to Kea. Time at leisure to explore Kea’s tiny port, Coressia after dinner. Departure in the early hours for Delos. Overnight at sea. Day 2: Saturday Day 3: Sunday Day 4: Monday Day 5: Tuesday Late morning swim stop and afternoon arrival to Kythira, a less known island gem now fast becoming a favorite among visitors to Greece. Evening at leisure to visit the picturesque main town of Chora and experience the subdued charms of this peaceful island. Overnight in Kythira. Day 6: Wednesday Day 7: Thursday Optional tour to Mycenae, the powerful walled palace of Agamemnon, the Homeric Achaean king. Early afternoon departure for the island of Hydra. Time at leisure to explore this picturesque port town. Captain’s Farewell Dinner. After midnight arrival at Marina Zea, Athens. Day 8: Friday Disembarkation at 9:00 am after breakfast. Travelling Chicken Make A Reservation
global_05_local_5_shard_00002591_processed.jsonl/16083
Douglas Todd: Men do well in science and tech, but lag elsewhere Article content In light of this, high-profile efforts are usually aimed at encouraging more girls and women to move into STEM. But there’s a big kicker to men’s success in STEM: Young males aren’t doing at all well in other fields. “The conventional wisdom is that the gender gap is about women and the forces — discrimination, sexism, parenting, aptitudes and choices — that make women less likely to study in STEM fields,” says Alex Tabarrok, a high-profile Canadian-American economist who has reviewed the study. Story continues below Article content continued Canadian economist Alex Tabarrok speaking at TED in 2009.jpg. MUST credit Bill Holsinger-Robinson/Wikipedia. CC2.0 copyright licence applies. [PNG Merlin Archive] Bill Holsinger-Robinson, PNG Canadian-American economist Alex Tabarrok notes that men are generally doing well only in so called STEM subjects, while women are doing well in STEM and other fields. Photo by Bill Holsinger-Robinson /PNG But the real reason more males complete STEM degrees, says Tabarrok, of George Mason University, is that, to put it too bluntly, “the only men who are good enough to get into university are men who are good at STEM. Women are good enough to go into non-STEM and STEM fields.” “If we accept the results (of Card and Payne), the gender-industry gap is focused on the wrong thing. The real gender gap is that men are having trouble competing everywhere except in STEM,” says Tabarrok (who obtained his bachelors at the University of Victoria). More On This Topic A Korn Ferry study, which obtained data on 20 million employees in 100 nations, explored whether women should be seething at the thought their male friend in the same office makes more money because he’s a guy. Story continues below Article content continued “After all, the headlines proclaim there’s a gender pay gap where women typically earn 20 per cent less than men, right? Not exactly,” writes Peggy Hazard, lead researcher. Korn Ferry found, in fact, the wage gap is “remarkably small” in France (2.7 per cent), Australia (1.4 per cent) and Britain (0.8 per cent) for like positions. Wage differences across nations were very narrow in each of the 16 job levels analyzed in the database created by Korn Ferry, which didn’t release information on Canada. The only significant gender gap Korn Ferry found was in salaries for the highest-level positions — CEOs, for instance. The Korn Ferry results tie into my experience in journalism (for what that’s worth), because since the 1980s I have almost always reported directly, or indirectly, to female bosses, including an editor in chief. My Vancouver Sun senior editors — Ann Barling, Shelley Fralic, Daphne Gray-Grant, Patricia Graham, Bev Wake, Adrienne Tanner and Valerie Casselton — all earned larger salaries than me.  Which is only fitting, since they were joining with males in taking on the headaches of managing staff (and I can assure readers that herding reporters and columnists is no walk in the park). All of which goes to suggest a key reason that labour statistics often show women on average earning roughly 20 per cent less than men is not necessarily sexism — it’s that men and women make different choices about working outside the home. Story continues below Article content continued Western labour markets, for instance, are dramatically “segregated” — with men tending to work in the private sector and women in the public. Statistics Canada’s labour surveys reveal women are four times more likely than men to be employed in the health and social assistance sector — 1.6 million women compared to only 349,000 men. These female-majority jobs are also often unionized, with such employees generally enjoying superior benefits and pensions, things are not always measured as wages. Meanwhile, Canadian men are far more likely than women to work in the private sector, in, to put it broadly, outdoor jobs. They’re seven times more likely than women to be in construction, four times more likely to labour in mines and oilfields. And men are a whopping 14 times more inclined to make a living driving trucks and plying various trades. In addition, men are so far the majority in STEM jobs. But how do you compare the monetary value of work across such diverse fields? It is not easy to juxtapose a teacher of Grade 4 children to someone who prepares algorithms for Amazon or a ministry of finance. How do we equate providing personal care to a senior or working in an art gallery with toiling 1,000 metres underground in a nickel-cadmium mine? Rather than arguing about a gender wage gap that doesn’t exist among rank-and-file workers who perform the same jobs, a better way forward is to encourage more women and men to go into fields that aren’t traditional for their gender. Story continues below Article content continued That’s happening big time when it comes to luring more girls and women into STEM. It’s also happening with elevating women into the highest-paying executive jobs. Korn Ferry is among many bent on advancing more women into Fortune 500 boardrooms, including by advocating changes in women’s career choices and child-raising preferences and combating the lack of universal daycare and executive mentorship. But it’s rare to hear of programs aimed at understanding why many young men are under-performing, and now account for only 40 per cent of university undergraduates. Efforts to get more males into fields that have become predominantly female are almost unheard of. Would it not be fair to try to shift more males into the humanities, nursing, office administration, psychology and other female-majority fields? It seems particularly important to encourage more males to become teachers of kindergarten to Grade 12 classes, since public education is where the problems are now starting for too many under-achieving and insecure boys. Douglas Todd: Men and suicide: The silent epidemic Sexualized women and ‘idiot’ men: Fighting stereotypes She’s fighting to bridge the gap between men and women
global_05_local_5_shard_00002591_processed.jsonl/16092
The theory of the Extended Mind: psyche beyond our brain The theory of the Extended Mind: psyche beyond our brain It is well known that the term “mind” refers to the set of cognitive processes, that is, consciousness, thought, intelligence, perception, memory, attention, etc. But does the mind have a material reality? Is it a tangible and concrete entity or space? Or is it an abstract concept that groups together a series of immaterial experiences? The philosophy of mind, together with cognitive science, has offered different theories to answer these questions. In turn, the answers have often been formulated around the traditional opposition between body and mind. To resolve this opposition, the theory of the Extended Mind questions whether it is possible to understand mind beyond the brain , and even beyond the individual himself. In the following text we will briefly see what the proposals of the Extended Mind hypothesis are, as well as some of its main background. Theory of the Extended Mind – mental processes beyond the brain? The theory of the Extended Mind began its formal development in 1998, from the works of the philosopher Susan Hurley , who proposed that mental processes did not necessarily have to be explained as internal processes, since the mind did not only exist within the narrow limits of the skull. In her work “Consciousness in action” she criticized the input/output perspective of traditional cognitive theory. In the same year, the philosophers Andy Clark and David Chalmers published the article “The extended mind” which is considered the founding text of this theory. And a decade later, in 2008, Andy Clark publishes Supersizing the mind , which ends up introducing the hypothesis of the extended mind in the debates of the philosophy of mind and cognitive sciences. From computer metaphor to cyborg metaphor The theories of the Extended Mind are part of the historical development of the philosophy of mind and the cognitive sciences. Within this development different theories have emerged on the functioning of mental states and their consequences in human life. We will briefly see what the latter consists of. The Individualistic Model and Computing The more classical tradition of cognitive science has taken the metaphor of the computer operating system as an explanatory model of the mind. It roughly proposes that cognitive processing starts with inputs (sensory inputs), and ends with outputs (behavioral outputs). In the same sense, mental states are faithful representations of the elements of the world, they are produced before internal manipulations of information, and they generate a series of inferences. For example, perception would be an individual and precise reflection of the external world; and occurs in an internal logical order similar to that of a digital operating system . In this way, the mind or mental states are an entity that is found within each individual. In fact, it is these states that give us the quality of being subjects (autonomous and independent of the environment and relations with it). It is a theory that follows the dualistic and individualistic tradition on reasoning and the human being; whose maximum precursor was Rene Descartes, who doubted everything but what he thought. So much so that he inherited from us the now famous “I think, therefore I am”. But, with the development of science, it was possible to suggest that the mind is not only an abstraction but that there is a tangible place within the human body for its storage . This place is the brain, which under the premises of the computational perspective would fulfill the functions of a hardware, while it is the material and self-configurable support of the mental processes. Mind-Brain Identity This emerges in continuous debate with the theories of mind-brain identity, which suggest that mental processes are nothing more than physicochemical activity of the brain . In this sense, the brain is not only the material support of mental processes, but the mind itself is the result of the activity of that organ; with which, it can only be understood through the physical laws of nature. Both mental processes and subjectivity thus become an epiphenomenon (phenomena secondary to the physical events of the brain). In this sense it is a theory of naturalistic approach , and besides a brain-centric theory, since everything human would be reduced to the action potentials and the physicochemical activity of our neuronal networks. Among the most representative of these theories is, for example, materialistic eliminativism or neurological monism. Beyond the Brain (and the Individual) In the face of the latter, other theories or explanatory models of the mind emerge. One of them is the theory of the Extended Mind, which has tried to locate information processing, and other mental states, beyond the brain; that is, in the relationships that the person establishes with the environment and its objects. It is a question, then, of extending the concept of “mind” beyond the individual himself. The latter represents an important break with the individualism typical of more classical cognitive science. But in order to achieve this it was necessary to start by redefining both the concept of mind and the mental processes, and in this, the reference model was the functionalist one. In other words, it was necessary to understand the mental processes from the effects they cause, or as effects caused by different causes. This paradigm had already permeated computational hypotheses as well. However, for the theory of the Extended Mind, mental processes are not only generated within the individual, but also outside it. And they are “functional” states insofar as they are defined by a cause-effect relationship with a specific function (a relationship that encompasses a set of material elements, even without a life of their own). To put it another way, mental states are the last link in a long chain of causes that ultimately have the effect of such processes. And the other links in the chain can range from bodily and sensory-motor skills to a calculator, a computer, a watch or a mobile phone. All of these are elements that allow us to generate what we know as intelligence, thought, beliefs, etc. Consequently, our mind extends beyond the specific limits of our brain , and even beyond our general physical limits. So what’s a “subject”? This not only changes the way of understanding “mind” but also the definition of “self” (understood as an “extended self”), as well as the definition of one’s own behavior, since it is no longer a rationally planned action. It is about a learning that is the result of practices in the material environment . As a result, the “individual” is more like a “subject/agent”. For the same reason, this theory is considered by many as a radical and active determinism. It is no longer that the environment shapes the mind, but that the environment is part of the mind itself: “cognitive states have a wide location and not limited by the narrow border of the human body” (Andrada de Gregorio and Sánchez Parera, 2005). The subject is susceptible to being constantly modified by its continuous contact with the other material elements . But it is not enough just to have a first contact (for example, with a technological device) to consider it an extension of the mind and the subject. To be able to think of it in this way, it is essential that conditions such as automatism and accessibility exist. To exemplify this, Clark and Chalmers (quoted by Andrada de Gregorio and Sánchez Parera, 2005) give the example of a subject who has Alzheimer’s. In order to compensate for his memory loss, the subject writes down everything that seems important to him in a notebook; to the extent that, automatically, he gets used to reviewing this tool in the interaction and resolution of everyday problems. The notebook serves as a storage device for their beliefs, as well as a material extension of their memory. The notebook then plays an active role in the cognition of this person, and together, they establish a cognitive system. The latter opens up a new question: does the extension of the mind have limits? According to its authors, mental activity occurs in a constant negotiation with such limits. However, the theory of the Extended Mind has been questioned precisely because it does not offer concrete answers to this. Likewise, the theory of the Extended Mind has been rejected by the more brain-centered perspectives, of which the philosophers of the mind Robert Rupert and Jerry Fodor are important exponents. In this sense, he has also been questioned for not delving into the field of subjective experiences, and for focusing on a vision that is strongly focused on the achievement of objectives. Are we all cyborgs? It seems that the theory of the Extended Mind comes close to proposing that human beings are and act as a hybrid species similar to the figure of the cyborg. The latter understood as the fusion between a living organism and a machine , and whose purpose is to enhance, or in some cases to replace, the organic functions. In fact, the term “cyborg” is an Anglicism that means “cybernetic organism”. But the theory of the Extended Mind is not the only one that has allowed reflection on this issue. In fact, a few years before the founding works, in 1983 the feminist philosopher Donna Haraway published an essay called Cyborg Manifesto . Broadly speaking, by means of this metaphor, she intended to question the problems of Western traditions that are strongly rooted in an “antagonistic dualism”, with visible effects on skeletalism, colonialism and patriarchy (issues that have been present in some traditions of feminism itself). Thus, we could say that the metaphor of the cyborg opens the possibility of thinking a hybrid subject beyond the mind-body dualisms . The difference between one and another is that the proposal of the Extended Mind is inscribed in a tradition closer to the logical positivism, with a very specific conceptual rigor; whereas Haraway’s proposal follows the line of the critical theory, with a determining sociopolitical component (Andrada de Gregorio and Sánchez Parera, 2005). Bibliographic references: • García, I. (2014). Review by Andy Clark and David Chalmers, The Extended Mind, KRK, Editions, Oviedo, 2011. Diánoia, LIX (72): 169-172. • Andrada de Gregorio, G. and Sánchez Parera, P. (2005). Towards a continental-analytical alliance: the cyborg and the extended mind. Colectivo Guindilla Bunda Coord. (Ábalos, H.; García, J.; Jiménez, A. Montañez, D.) Memorias del 50º. Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/16106
Email us Call us on Appointing a Receiver A creditor with a security interest over some of the companies assets can appoint a receiver to manage the company. In the event, the directors cease control of the company, and the receiver will run the business, for the benefit of the creditor that appointed the receiver. The Grantor The company who gives a security interest to someone else is called a Grantor, as in they have granted something. If a company allows a bank to take a security interest in company property then that company is called the Grantor. A Debenture is a loan backed up by some security over a company or its assets. The Debenture document will give the creditor rights in the event of a breach of the loan agreement. In some cases, the Debenture holder can take over the asset (as in a bank selling a house if the mortgage is unpaid), or it can appoint a receiver to run the Company. The Process All documents from the company must make it clear that the company is in receivership. The receiver has the power to run the business in receivership, including hiring staff, managing property, selling assets, entering into contracts. The receiver can call up unpaid capital. In a receivership the directors’ powers are suspended sufficiently to allow the receiver to do his job. They do not cease to be directors, and can undertake some action in the name of the company. In reality, this is limited to legal action. The company in receivership, the grantor, must make all documents, bank details etc, available to the receiver. A Liquidator acts in the interest of all creditors. A receiver only acts in the interest of the Debenture holder that appointed him. The receiver has a primary duty of care to the debenture holder who appointed him. However, the receiver also has a duty of care to the company and other creditors not to act in a negligent manner. If a receiver is negligent he risks being held liable by other creditors and by the company. The receiver has a statutory obligation to obtain the best price for the assets. He cannot, therefore, sell the assets cheaply to recover just enough for the debenture holder at the expense of other creditors and the grantor. The receiver must, within two months, and again after every six months after his appointment, report on the progress of the receivership. These reports are to go to the grantor and the appointing debenture holder. If appointed by the Court, the court must also receive a copy of his reports. A receiver can be held personally liable for other costs of the company in receivership. In most circumstances the receiver will seek and indemnify him from the creditor from the appointing creditor firm before accepting a receivership. A receiver must also report any defalcations he becomes aware of during the receivership The act does not refer to the 1994 Tax Administration act, so, if you the company has not been paying taxes, the receiver is obligated to report it. Fraudulent returns is considered proffering a document for pecuniary advantage and is covered by the Crimes Act, which is mentioned in the Act. Once a receiver has sold a property or asset, any security interests in that property that are subordinate to the security interests of the appointing creditor are vacated. If there is anything left over, this money will be paid out by the receiver according to the following: • Any person with a security interest registered in the PPSR • Any person with a security interest not registered in the PPSR • The Grantor The ranking of priorities when it comes to paying out the surplus comes under the PPSR Legislation. Once the Receiver has recovered funds from the sale of the secured asset, the receiver pays off any other securities, the company in receivership (the Grantor) and any other security interest in the asset ceases. If the receiver is unable to sort out competing claims on any surplus, he can deposit the funds with the court and let a judge sort it out. WordPress › Error There has been a critical error on your website. Learn more about debugging in WordPress.
global_05_local_5_shard_00002591_processed.jsonl/16126
For any help from WNCGreenBuilding Call Us Now : Windows Update The tech giant Microsoft admits that Windows 10 updates are deleting personal data and important files from the user’s PC and this raised cold social media war among the Users and  Microsoft and it worsens when it turns out that this could have been prevented. In the month of October 2018, several users report that version 1809 wipes out all their data and few users with a technical background even implied that it is a bug that is doing all these. It then re-releases on November 13, 2018. Microsoft stated on its support site “they pause the rollout of Windows version 1809 for all users as they inspect several reports of Users missing personal files after the update”. In a few instances, when you try to upgrade the new version of Windows10, the system setup may shift the User files to the previous installation backup situating inside the “Windows.old” folder. Nevertheless, in this case, it is not the same that happened. Users couldn’t find any of their data anywhere in their PC after experiencing a sudden loss of personal data. What Happened after Updating to Version 1809 of Windows 10? After the incident, it’s like the social media platforms and Microsoft support was full of horror stories from Users Source 1: “I was very interested in Updating the latest version of Windows 10 (version 1809) buy who knew it would turn out to be exhausting and me losing all my personal data” Source 2: “While upgrading to Windows 10 there were no issues. I updated to version 1809 and it went absolutely right. The problem is I guess it happens to associate with only the Desktop users. After the update, most of my documents and pictures folders just disappeared. There is no trace of those files in any location of my desktop. I searched in the Windows. old folder but there was no sign of the lost files”. Source 3: “One of my clients having a Laptop of Windows 10 Home asked me to Update his operating system to Windows 10 version 1809 and he was quite expecting the good side of the updates. After it is complete, he boots and logs in and after a while he figures out that all of his documents and pictures are not there in any destination. He still has the background image, his iTunes music is there apart from the documents and images which were very crucial to him. I ran the TreeSize just to make sure and found out the files are nowhere in the PC”. Source 4: “Last night I updated to version 1809 and to be honest it all went smoothly at first, but then I find that all my files in Documents are ERASED. Just gone. This included may important documents and even financial information. Yes, I have a backup but this is pretty bad for sure”. The worst part possibly is that Windows Insiders warns Microsoft about this issue month ago it releases and no one cares to examine it in the first place. Unluckily the reports were either lost or ignored. And as I mentioned earlier this auto-deletion issue even violent Microsoft’s loyal fans to attack the company. They said that “this automation of deleting user data is, without doubt, the number one nightmare scenario of any user of any platform”. The cause of the Issue Millions of users prefer Windows 10 because of its user experience. The number of users affected by the same problem is still unknown. But even if it is a small group, it still is terrible because the concern is Microsoft’s huge testing center couldn’t detect any of these incoming issues related to version 1809 October Update. The previous version 1809 bug happens to delete data and Microsoft says “it happens with 1 user among 10,000 Users”. Now think what would be the result for 500 million devices running Windows 10. According to Hacks reports, several users reports against these issues but some are saying that Windows 10 is actually mishandling files that are contained in compressed (ZIP) archives. But in most of the other operations, it would definitely ask users permission first if there is an instance of overwriting a file if there is disagreement between source and destination folders Then It worsens as the file operation never turns out to be fruitful. The problem is Windows won’t even let you know if the file shifts its location from a compressed archive. It will just be unsuccessful and will not even write the file which as a result deletes the files from the archive. Wrapping things Up  I hope this article has given you an insight into what really is the issue and what is the response of Users and Microsoft. On the date of November 13th,2018 Microsoft re-release the Windows 10 version 1809. They say all the issues have been fixed and are available for download and installation.
global_05_local_5_shard_00002591_processed.jsonl/16146
Symbols and Symbolism in the Poems of Robert Frost 1448 Words6 Pages Symbolism in the Poems of Robert Frost It can easily be argued that Frost believed that little difference existed between humanity’s inner nature and the nature of the world which surrounded him. Time and again Frost personifies nature in human terms and points out the many ways in which what happens in an individual’s life is a reflection of what is occurs in the natural world. In fact, it can be said that this poet viewed nature as being separate from humanity only by the virtue by which humanity removes itself from the outside world. In other words, nature never leaves, humans are the ones to leave nature. Many of Frost’s poem clearly demonstrate the ways in which the peace of being fully juxtaposed to nature when a human steps outside their rigid human realm and learn to appreciate their natural surroundings. Robert Frost has always been noted for his incredible poetry that is full of imagery, symbolism, tone, and depth. The depth in his poems appears to be most often portrayed through his use of symbolism, as this is one veritable way to give the reader something to dwell upon and examine. For example, if Fr... ... middle of paper ... But when was that ever a bar To any watch they keep? This poem portrays in a metaphorical manner the constant awareness by men that they must die; and it does this without appealing to the pity or horror acquainted with death. This poem leads the reader to contemplate the fast within the metaphor quite steadily. Frost was a rural Yankee whose writings reflect everyday experiences-his own experiences, but was one who saw metaphorical dimensions in the everyday things he encountered. These everyday encounters held ground as his subject manner, combined with the rural setting of New England nature, seasons, weather and times of day. Frost’s goal was to write his poetry in such a way that it would cover familiar ground, but in an unfamiliar way or uncommon in expression. Works Cited and Consulted Frost and Nature, Open Document
global_05_local_5_shard_00002591_processed.jsonl/16157
How to Solve 500 Internal Server Error in WordPress? If you’re surfing the web atleast for a year now, you might’ve noticed the HTTP 500 Internal Server Error on some blogs. This HTTP 500 error is the most common WordPress error that leaves the WordPress beginner in panic. In case you’ve encountered this Internal Server Error on your WordPress blog, just don’t panic. You can easily fix this issue by following the steps below. What causes Internal Server Error in WordPress? This particular error is caused due to several reasons such as a WordPress plugin or theme malfunctioning, corrupted .htaccess file or even the PHP memory limit issue. How to Fix the Internal Server Error in WordPress? 1.Check for Corrupt .htaccess File One of the few causes for getting Internal server error is the corrupted .htaccess file. In order to check it, simply use your FTP software and rename your main .htaccess file to something like .htaccess_old. You can locate the file in the same location where the wp-content, wp-admin folders are located. Once renamed, try to load your blog and if it loads well, then there is a problem with your .htaccess file. Note: If the file is corrupted, you’ll need to regenerate the .htaccess file again or else your posts will return a 404 error. To do so, go to WordPress dashboard > Settings > Permalinks and simply click ‘Save settings’. It will then generate a new .htaccess file with correct rewrite rules. In case your blog didn’t load even when you rename your htaccess file, then it means there is no problem with your file. You may now rename the .htaccess_old back to its original name and move on to the next step. 2.Increase the PHP Memory Limit If the internal server error only appearing when you either try to login to your blog or while uploading an image, then the problem is with the memory limit. In order to increase the PHP memory limit, simply follow the steps below. 1. Open notepad and paste the following code in it. 2. memory=64MB 3. Save the file with the name ‘php.ini’ 4. Upload it into your /wp-admin/ folder either directly using the File Manager (cPanel) or using any FTP software like FileZilla. The memory limit problem will be solved temporarily but not permanently. It is because, the problem may rise again if you’re using a plugin or theme that is poorely coded. So, it is better to contact your WordPress hosting provider for the exact diagnostics. Even after trying the above fix, the internal server error may still exist sometimes, which means your WordPress blog need to be checked in-depth. There are two ways to hard-core trouble shoot your WordPress blog for errors. • Deactivate All Plugins • Re-upload Core WordPress Files 3.Deactivating all WordPress Plugins If none of the above fixes didn’t solve your problem, then the internal server error may be caused by some poorely coed plugin. Unfortunately, there is no proper to judge which particular plugin is causing the problem. How to Deactivate All PLugins when not able to Access WP-Admin? Use any FTP software or your default File Manager (from cPanel) and go to /wp-content/ folder. In that you’ll find a folder called ‘plugins’. Renaming the folder will automatically deactivate all your plugins. Once done, you’ll be able to access your WordPress admin panel (login). Now, try to activate one plugin (Plugins) at a time until your site breaks again. You can then know which plugin is causing the problem and get rid of it, report the error to the author of the plugin. 4.Re-upload Core Files In case the above plugin option didn’t work too, then the final solution would be to re-upload the wp-admin and wp-includes folder from a fresh WordPress build. Don’t worry! This will not remove any of the existing information from your blog but could solve the internal server problem in case any of these files were corrupted. Also see: How to Delete Unused WordPress Core Files? | How to Install Plugins via FTP? There is also a worst scenario where none of the above solutions work. In such situations, you should contact your hosting provider and seek help. Did you encounter the Internal Server Error in your WordPress blog earlier? What solved your problem? Please do share with us. Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/16160
This message is the property of Accent Group NZ Ltd. The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorised. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it is prohibited and may be unlawful. If you have received this message in error, please notify Accent Group NZ Ltd immediately via email to [email protected].
global_05_local_5_shard_00002591_processed.jsonl/16178
Urologists are doctors who specialize in the treatment of diseases and complications of the urinary system. They also treat conditions of the male reproductive system, a function which, in women, is performed by a gynecologist. Urologists treat more male conditions than female ones, and men therefore are advised to visit urologists more often than women. The result is that women suffer from conditions of the urinary system in silence or they try to self treat. In almost all cases, this approach makes the condition worse. Reasons Why Women Avoid Urologists The main reason women avoid urologists is that female urological conditions carry social stigma. A lot of women are afraid that if they reveal they have a serious urinary tract infection, it will say something about their personal hygiene. Conditions such as incontinence and pelvic organ prolapse are looked upon as shameful. This kind of social stigma prevents many women from going to urologists. Lauren Masters, ARNPMost women also confuse a problem of the urinary system with a condition of the reproductive system. They visit gynecologists for most of their medical problems, even when they are of the urological system. Women should be taught from a very early age to feel confident about seeking treatment for any part of their bodies. They also should be made aware that problems of the urinary system are extremely common and that treatment options are readily available from most urologists’ offices. Common Problems of the Female Urinary System There are several conditions that women suffer from and which should always be referred to a urologist. These include: 1. Urinary Tract Infections. These are more common in women than men. They have a tendency to recur and may be simple infections or serious ones related to another health problem. Urologists are well trained to treat these. 2. Urinary Incontinence. This is also referred to as urine leakage. It can get very complicated if left untreated. 3. Kidney stones. These are very painful and should be treated at the earliest stages. 4. Pelvic Organ Prolapse. This occurs when the bladder, the upper roof of the vagina or even the rectum droops into the vagina. It affects a lot of women but it is not widely discussed. It makes all aspects of a woman’s existence very uncomfortable. Urologists are uniquely qualified to treat it. Women should understand that a urologist is as important to their health as a gynecologist. They also should know that urologists understand the need to make female patients comfortable. And women should know that female urological problems are treatable and that most urologists, such as the Advanced Urology Institute, have invested heavily in the treatment of these problems. Their team of specialists can answer your questions, help with diagnosis and treatment of problems with the urinary system. For more information, visit the Advanced Urology Institute website. Recommended Posts