id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_5_shard_00002591_processed.jsonl/17912
Video: How to stream videos with Netflix on the Nook Color Netflix is now available for Android, but as you probably already know, it doesn’t work on all Android devices. At the moment, it is only supported on certain devices. Netflix is currently working on making the app available on more devices. If you have a rooted Nook Color, you can get Netflix to stream by making a few changes. The process requires you to modify the build.prop file. The modification that is made to that file makes the Netflix app believe that your Nook Color is actually one of the supported devices, in this case, a Samsung Nexus S. If you’re willing to get Netflix working on your rooted Nook Color, simply follow the instructions on the video below. You’ll be streaming movies in just a few minutes! Youtube link for mobile viewing
global_05_local_5_shard_00002591_processed.jsonl/17945
IFSC Code of Nagod Branch, Satna, Madhya Pradesh - Allahabad Bank ALB You can find IFSC Code of Satna Allahabad Bank Nagod branch. It is used for NEFT, RTGS and IMPS codes in the table close by. Allahabad Bank Nagod branch NEFT or RTGS or IMPS code is only IFSC code and utilized as a part of net keeping money. Presently a-days everyone needs fast managing an account arrangements as it spares a considerable measure of time. For doing these exchanges all we require is account points of interest and IFSC code. There are essentially three sorts of exchanges NEFT, RTGS and IMPS. The distinction between them is that NEFT exchanges are done in clumps and RTGS exchanges are done separately. MICR Code 485010019 is a portable stage where assets can be exchanged 24x7. These store exchange frameworks can be utilized for different purposes like bill payments, protection premium payments, Loan EMI payments, online buys, paperless reserve exchanges, and so on. ALB Nagod Branch IFSC Code, MICR Code IFSC Code ALLA0210651 (used for RTGS and NEFT transactions) Bank Allahabad Bank (ALB) MICR Code 485010019 Phone number 232227 Pincode 485446 Address allahabad bank,nagod distt satna Branch Nagod City Nagod District Satna State Madhya Pradesh Country IN Allahabad Bank (ALB) IFSC code in Satna in Madhya Pradesh pin code 485446 state is utilized as a part of web keeping money for exchanging stores between any two bank offices. These IFSC codes for Allahabad Bank Satna, Nagod branch are utilized to distinguish the branch Nagod taking an interest in online exchanges by means of RTGS, NEFT and IMPS frameworks. In this way, each branch of Allahabad Bank in Satna supporting net saving money has its one of a kind IFSC code. Allahabad Bank Ltd IFSC code list in Satna, Nagod branch is given by RBI. NOTE that all branches of a bank can't give online store exchange frameworks, just those affirmed by RBI can give such office.
global_05_local_5_shard_00002591_processed.jsonl/17963
profile picture Lessons from the first 12 Euler problems in Rust October 09, 2015 - rust !! Spoiler Alert !! I'm going to be talking about solutions to select problems from the first 12 Euler problems. If you haven't solved these for yourself yet, I highly recommend taking the time to solve them on your own first. Before I went to Microsoft for a stint in JavaScript, I did my fair share of systems programming in C++. I've built compilers, head-tracking software, signal processing software, and emulators and even did some of my first programming language projects in it and for it. So when word got out four years ago about a new systems language called Rust, I was intrigued. I mean, it was new and it was called rust. Obviously there was some cheekiness involved :) While I've dabbled with it before, this week was the first time I really gave it some dedicated time to learn it. TL;DR: hey, this is kinda neat! In this post I talk through solving some of the Euler problems in Rust, both de-rusting my programming skills and learning what this Rust thing was all about. If you're interested, you can grab the source code to my solutions. Problem 1 "sum of all multiples of 3 or 5 below 1000" fn main() { let mut answer = 0; for x in 0..1000 { if x % 3 == 0 { answer += x; else if x % 5 == 0 { answer += x; println!("{}", answer); My solution to problem 1 is pretty straightforward, but you can already start to see some of the characteristic earmarks of Rust. On line 2, there's a let keyword which creates a variable. After that is the mut keyword for saying that the variable we're creating is mutable, as variables are immutable by default. Line 4 shows off using an iterator. Rust's iterators are lazy, meaning they generate values only as needed. This gives them some cool properties, which we'll see later, but it has the property of being relatively cheap to iterate over them, since we don't generate a full range before iteration starts. Line 5 reminds us that we're not in C. The if doesn't require parens around its condition. Indeed, if you put them there, the compiler warns you that you don't need them. Line 13 shows how to print out a value. Note the '!' after println. If you're like me, you're bound to leave this off once or twice and get an incomprehensible error message. Similar to C and many other languages, you pass println! a format string. Here, we just use "{}". The {} part means to use a default output of the argument we pass in, which in our case just writes out the number. Problem 2 "sum of even fibonacci below 4,000,000" struct Fibonacci { curr: u64, next: u64, // Implement 'Iterator' for 'Fibonacci' impl Iterator for Fibonacci { type Item = u64; // The 'Iterator' trait only requires the 'next' method to be defined. The // return type is 'Option<T>', 'None' is returned when the 'Iterator' is // over, otherwise the next value is returned wrapped in 'Some' fn next(&mut self) -> Option<u64> { let new_next = self.curr +; self.curr =; = new_next; // 'Some' is always returned, this is an infinite value generator // Returns a fibonacci sequence generator fn fibonacci() -> Fibonacci { Fibonacci { curr: 1, next: 1 } fn main() { let mut sum:u64 = 0; for i in fibonacci().take_while(|&x| x < 4000000).filter(|&x| x % 2 == 0) { sum += i; println!("sum: {}", sum); Lest you think that I somehow jumped from beginner level to advanced in a few minutes, rest assured that I used the tried and true method of the copy/paste. In trying to find out how to make an iterator so I could iterate over a fibonacci sequence, I found the source to do just that. Ah, the internet. There's a fair bit going on here, so let's break it down by line. Lines 1-4: Create a simple struct to hold the current value to be returned as well as the next value. Fibonacci needs at least these two values to continue to calculate each iteration. Line 7: Now Rust is showing off the fancy. What is going on here? In Rust, a type, like our Fibonacci struct from lines 1-4, can implement a trait. What's a trait? Think of it as a small contract with the compiler. If you can show how your type satisfies all the requirements of the contract, then wherever that trait is required, the compiler knows how to use your type. In this example, we want to use our type in the language feature. In some languages, this wouldn't be possible. In Rust, if we can satisfy the Iterator trait, the compiler has enough information to allow that type to be used in the feature. Line 8: Ah the problem with copy/paste. As I started writing this blog post, I had no idea what that line was doing. Docs to the rescue. It turns out that this line is saying what the 'associated type' is. With some traits, there's going to be both a) the type that is implementing the trait (here: our Fibonacci struct) and b) an additional type that needs to be known to get the rest of the story. For us, since we're creating an iterator over the fibonacci sequence, we need to let Rust know what the type of each "turn of the crank" on the iterator will output. Each fibonacci number will be a 64-bit unsigned integer, so we use the Rust short-hand type u64. Lines 12-20: Here's where we describe how to turn the crank for each step of our iterator. We calculate what the next turn will output and then return the current value. This allows us to keep one in reserve ready to be used to calculate the next value, and so on. You can see on line 19 that instead of just returning a u64 directly, we instead say that it's optionally a u64. While in our case we iterate forever, using Option here gives us a way to shut off the valve and finish the iterator if we ever wanted to. Notice, too, on line 19 the value is said last and the return statement is elided. This is just shorthand for returning a value from the function. Lines 24-26: Create a simple function to give us our starting value to begin our fibonacci sequence. You can see a couple Rust-isms here, too. As before, a value by itself is an implied return value. It also shows how to create an instance of the struct without a constructor. Line 30: We're finally in the main! I've forgotten what problem we were solving by now. Ah right, "find the sum of even fibonacci numbers less than 4,000,000". Let's look at the solution. Since there's a lot going on in this fluent-style approach, let's break it up into steps: fibonacci() - we call our function and get out the default value to start iterating with. Since we already told Rust how to use values of this type as iterators, it gets all the capabilities that iterators have. .take_while(|&x| x < 4000000) - that didn't take long, we're already jumping in and using the functionality of the iterator to check each turn of the crank, and if we exceed 4,000,000 stop. The |&x| x < 4000000 is a simple function that takes in a reference to each element we bind to x, and then we check the value we're handed in the body of our function. If you're coming from C++, this reference style might look a little strange. Aren't you risking someone updating the value? Turns out Rust's references are immutable by default. The reference here also shows us the performance characteristics of .take_while. By this I mean, when we look at the .take_while call, we see it will only pass references, so know ahead of time if we're iterating over big structures, we're not paying the price of copying each one with each step of the iterator. Speaking of performance, it may look like .take_while is going to be exceedingly expensive. Is it consuming all of our fibonacci sequence until we have all the items we need to get to 4,000,000? Luckily, it isn't. Instead, .take_while itself returns an iterator that you can continue your fluent calls on. I think of it like a series of machines in a factory: If I start the conveyor up and I pull from the right hand, I'm moving whatever was on the far left all the way through the system. In our case, we're starting up the fibonacci iterator and getting that machine running. It spits out a single fibonacci-shaped number for us. This number chugs along and enters the next machine, which is our machine that checks if it's too big. If it's not, the conveyor chugs along and out drops a single fibonacci-shaped number of the acceptable size. As these machines work in lock-step, we're getting just what we need when we need it rather than trying to run ahead and doing a bunch of work in advance. This allows you compose a lot of steps together and still stay efficient. .filter(|&x| x % 2 == 0) - Just like .take_while above, this one checks each number as it passes through. This time, it only lets the number through if it's divisible by 2, and hence even. Now we have all the steps in place, each time we turn the crank of the whole iterator, only fibonacci numbers that are less than 4,000,000 and even will pop out. Line 31: We've already done all the hard work. Now we just have to sum those numbers together. With that, we're done. While it was quite a mouthful, we can see the compositional nature of Rust, a bit of the type system, and how iterators work in more detail. Problem 3 "highest prime factor of 600851475143" fn is_prime(num:u64) -> bool { for i in 2..(num / 2 + 1) { if num % i == 0 { return false; return true; struct Prime { curr: u64, impl Iterator for Prime { type Item = u64; let mut new_next = self.curr + 1; while !is_prime(new_next) { new_next += 1; self.curr = new_next; // Returns the primes fn primes() -> Prime { Prime { curr: 1 } fn main() { let mut num:u64 = 600851475143; let mut highest_prime_factor = 0; for i in primes() { if num % i == 0 { highest_prime_factor = i; while (num % i == 0) && (num >= 2) { num /= i; if num == 1 { println!("num: {}", highest_prime_factor); Very similar to Problem #2 above, I create an implementation of Iterator, so I can use it later. This time, rather than creating a stream of fibonacci values, I create a stream of prime numbers. Just like we had a struct for Fibonacci in Problem #2, I create one here for Prime numbers. Since we don't need the previous one to calculate the next one, I only keep the current value around and then start with that number + 1 when trying to find the next prime. Once we have our iterator, we take each prime, and then try to divide out all its multiples from our give number. What's left should be our highest prime factor. Easy peasy. PS: I know it's probably already too late, but I should have warned you to avert your eyes from my inefficient prime number skills :) Problem 4 "largest palindrome product of two 3-digit numbers" fn is_palindrome(num: u64) -> bool { let s = num.to_string(); for (i1, i2) in s.chars().zip(s.chars().rev()) { if i1 != i2 { return false; return true; fn main() { let mut largest = 0; for i in 100..999 { for j in 100..999 { if is_palindrome(i * j) && ((i * j) > largest) { largest = i * j; println!("Largest: {}, {} x {}", largest, i, j); Problem #4 also uses some iterators to find the palindrome product (line 13 and line 14). If it finds a palindrome product, and that new product is larger than what it saw before, it replaces it with the new one. There's one fun trick in this solution on line 3. We need to check if the number is a palindrome. While you can do this numerically, I couldn't help but use some more iterators. This time, after converting the number to a string, we create an iterator over the characters in the string (using .chars()). We want to see if the number is a palindrome, so one way to test this is that if we reverse the string and if still get the same value, we know we've got one. That's exactly what we do. Here, I use .zip(s.chars().rev()) to combine the iterator that goes forward over the characters with one that goes in reverse. The .zip() call brings both iterators together and iterates over both iterators for us, returning a pair (or tuple) of values. Think of it running both machines side by side, and with each turn of the crank one value pops out of each and zip returns both values tied together with a bow. Now that we have a single pair, we immediately use it. At the beginning of line 3, you can see the for (i1, i2) in part of the line. Just as before will run over the iterator. We know that the iterator is going to be outputting pairs of values. We could have just grabbed the pair as a single value and used it later, but here I go one step further by taking the pair the iterator gives me and pulling it apart so I can use it. This pulling apart, called destructuring, is a handy way of working with structured data when you're interested in its constituent parts rather than the structure itself. In this case, this lets me more easily compare the left side to the right side, so I destructure the pair into two values: i1 and i2. Problems 5 through 7 Problems #5, #6, and #7 are all straightforward and don't show off anything new in the language. Let's jump ahead to the next interesting one. Problem 8 "largest product of 13 adjacent digits" fn main() { let input = let mut largest = 0; let input_bytes = input.as_bytes(); let mut largest_string: &[u8] = &input_bytes[0..1]; let span_width = 13; for i in 0..(input_bytes.len() - span_width + 1) { let mut sum = 1u64; for j in 0..(span_width) { sum *= (input_bytes[i + j] - 48) as u64; if sum > largest { largest = sum; largest_string = &input_bytes[i..(i+span_width)]; println!("Largest: {} is {:?}", largest, std::str::from_utf8(largest_string)); In Problem #8, we see an example of working with strings, this time using a new feature called a 'slice'. We start with the block from line 3 to line 22 that gives us this giant input string. Notice that I use the backslash '' to continue the line to the next line. Rust is smart enough to let us indent without introducing new whitespace into the string. Now that we have our string, on line 25 we turn it into a array of bytes we can search through. Notice we didn't use .chars() this time. Recall that .chars() gave us an iterator. Rather than iterating over one value at a time here, we want the flexibility to look across spans in our string. To do that, we use .as_bytes() to get an array (technically, a byte slice). Line 26 introduces the slice we'll use. A slice is a window into values in memory. Since we want to look at a span of values, we create a holder for this slice. We'll later set it to spans of our 13 adjacent digits. PS: you'll notice I set it to a dummy default value, which I later throw away. This is to get around the compiler warning about uninitialized values. The rest of the search follows fairly naturally. We do an iterator over the indices in our input, stopping short of the length of the span. We use that index to calculate the product at that span (line 32 to line 34). Once we find a match, we save it off, using a slice to save off the winning span (line 37). Finally, we use another format string {:?}, which can print out our winning span for us using the debug formatter. The {:?} format is a handy builtin which can handle a wider range of types with a default formatter. Problem 9 Problem #9 is another solution that's simple and doesn't show off any new features. Moving on. Problem 10 "sum of all primes below 2 million" fn main() { let mut sum = 0; const SIZE: usize = 2000000; let mut slots: [bool; SIZE] = [true; SIZE]; slots[0] = false; slots[1] = false; // We calculate the primes using a simple stride and marking off multiples for stride in 2..(SIZE/2) { let mut pos = stride; while pos < (SIZE - stride) { pos += stride; slots[pos] = false; for (idx, pr) in slots.into_iter().enumerate() { if *pr { sum += idx; } println!("Sum: {}", sum); Reading the problem description, you might have guessed that I would use the iterator solution from earlier. The astute reader probably already noticed that doing so would be. very. slow. Especially, as we look at primes above a million, where each step is itself taking hundreds of thousands, if not millions, of calculations. While I could let it run and heat up my apartment, it's better to do a more direct approach. We trade space for time. On line 4, I create my first fixed size array that will hold whether or not the number in that position is prime. Once we have the variable, it's initialized using another cool shorthand: [true; SIZE]. This creates an array of boolean true values of the size given on the right of the ';', here the SIZE constant I defined. For example, you can create a 500-element array of zeros using [0; 500]. Neat. Once we have our slots, we loop over them using any possible multiple and check that off the list by setting that position to false. Once we're done, we have an array that tells us where the primes are. The only trick remaining is how to get the numbers back out again. To do this, we use the iterator on line 17. Similar to our fluent iterators before, this time we turn our array of slots into an iterator, and then call .enumerate(). The .enumerate() call is a special kind of zip that gives us the index at that point in the iteration paired with the actual value. Just as before, we destructure the index and the boolean that indicates if it's a prime number separately. On line 18, we check if the number is prime, and if so we add it to our sum. You'll notice the *pr call here. Just as in C, this lets me dereference and get at the value at that location in memory. I could have instead written for (idx, &pr) in and just gotten to the value that way, using destructuring instead of dereferencing. With that change, the line would have been if pr { ... }, and I could get at the value pr without needing to dereference. Problem 11 "find the largest product in a grid" let input = "\ let input_split = input.split_whitespace(); let input_as_num: Vec<i32> =|x| match i32::from_str_radix(x, 10) { Ok(v) => v, Err(u) => { println!("Garbage in input: {}", u); 0 } I'm only showing the interesting part of the solution since it's a bit long, but you can read the whole solution. Here we do a bit more string manipulation using some new methods. The .split_whitespace() method on line 23 lets us turn our input string into an iterator of strings, splitting at any whitespace. Once we have this iterator, line 24 takes this iterator and maps a function over it. This function attempts to convert each substring to a signed 32-bit integer i32 using the .from_str_radix(x, 10) call. This call returns a Result, a way of handling either a success or failure condition of an action that might fail. As is the case with converting from strings to numbers, if you happen to pass in something that can't be converted to a number, there needs to be a way to signal back out that the conversion failed. Some languages do this through exceptions, which break out of normal execution and give you an error you can handle. Rust uses a simpler, more functional approach and treats errors as just any other value. With this method, the type system encourages us to be vigilant and always have code available to handle errors. To see which of success/failure is returned, we use the match keyword. Just as in other languages with pattern matching, the match keyword lets us ask which of the possible values is in the Result: Ok or Err. Pattern matching lets us destructure and find the success value or error message. Finally, on line 29, we use the .collect() method to run through the iterator and create a vector of i32. Problem 12 "triangle number with over 500 divisors" fn main() { let mut num = 0u64; // Cache the primes we'll be using let first_primes: Vec<u64> = primes().take(1000).collect(); for i in 1..1000000u64 { num += i; let mut num_div = 1u64; let mut num_tmp = num; for &x in &first_primes { let prime = x; if (num % prime) == 0 { let mut exponent = 1; while (num_tmp % prime) == 0 { exponent += 1; num_tmp /= prime; num_div *= exponent; if num_tmp == 1 { break; } if num_div > 500 { println!("num: {}", num); Again we'll trim down to the interesting parts, since we've seen the prime iterator before, but you can read the full file. This looks pretty familiar. On line 5, we run our primes iterator, take enough to use later, and turn that into a Vec<u64> we can use a bunch of times. The other interesting line is line 13. If you've played with vectors in Rust before, you know that you can iterate over them, like this: {% highlight rust %} fn main() { let x: Vec = (1..10).collect(); for i in x { println!("{}", i); } {% endhighlight %} But if we try to do this in our Euler problem, we get a new error: error: use of moved value: `first_primes` What is a moved value? It turns out that a moved value is part of Rust's ownership system. Just like the first time a programmer sees a pointer in C or a monad in Haskell, ownership in Rust is one of those things that's so uniquely Rust that it takes getting used to. Once you begin to understand it, you'll be able to see how the type system is trying to help you describe your intentions a bit more clearly. If you're scratching your head, here's an example: imagine malloc'ing an array in C and then passing that malloc'ed array into a function. Who is responsible for cleaning up that memory, the function you called or the function that created the array? In C, you don't know by looking at the code, you only know as the writer of the code what your intention was. Maybe the function is called 'cleanup' at which case, yes, you do want it to free that memory. Or maybe the function is called 'inspect' and you decidedly don't want it to free the memory. This is why Rust makes this very explicit. By looking at the code, you can follow who is responsible for what. The set of checks that do this make up Rust's ownership system. There are a lot of resources to understand ownership,which do a good job of explaining ownership in detail. For us, ownership is like trying to answer questions like "who is responsible for this thing?" and "when does this thing get removed?" Ownership can be passed from variable to variable, and its strictly checked by the compiler. When you first encounter the above error, if you haven't already read about ownership, you might be in for a few hours of reading to get caught up. But we have some hints here that we can get started with to help figure out what's happening. In our small example, we could iterate over a vector and all was well. When did things start to go wrong in the Euler problem? On line 13, we want to loop over a vector, and when we look out to line 7, we see this is actually an inner loop being used by an outer loop. That means that if the inner loop takes control of our vector, the next time around the outer loop we've lost the ownership. We don't want the inner loop to take ownership and then lose the ability to use the vector again in the next iteration of the loop, so we have to 'borrow' ownership. As the name implies, by borrowing, we're only taking temporary ownership for a time, and we have to follow all the rules stated when we borrow. With that in mind, let's look at line 13 again: for &x in &first_primes We borrow first_primes instead of taking permanent ownership using the & operator. This operator says "I would like to borrow first_primes, and I can not edit the contents". The compiler will then be able to check that we're using what we've borrowed correctly. You might be curious borrowing and also being able to mutate. To do that, we could've used the &mut operator assuming the original vector was mutable. Finally, we use the same destructure trick we did earlier to get at the values of x. PS: In this example, since all we were doing was iterating, we could have used the .iter() rather than borrowing, though that won't always be the case in other examples that need more direct interaction with the vector. After I got enough of these problems together that I got tired of building them by hand, I moved over to using Cargo. Cargo is Rust's build/package tool that is quite handy. name = "eulerinrust" version = "0.1.0" name = "ex1" path = "src/" An example of Cargo.toml Cargo lets you describe dependencies that your project needs, which it fetches from You can also control whether you're doing a release or debug build, and quite a bit more. I'll no doubt start directly with Cargo for any future Rust projects. These are just tiny examples created while playing around in a fairly simple set of problems, and yet there's actually quite a lot of Rust's richness shining through. Rust has a powerful iterator story that feels composable and clear. Rust's error checking is keeping us vigilant about handling error cases, matching types, and remembering who is responsible for values in the system. Overall, it feels like a very well thought-out language that holds together well.
global_05_local_5_shard_00002591_processed.jsonl/17977
R-6.01 - Act respecting the Régie de l’énergie Full text 48.3. Notwithstanding section 48.2, the electric power distributor may apply to the Régie, before the deadline specified in that section, to request it to modify any rate set out in Schedule I to the Hydro-Québec Act (chapter H-5) where the following conditions are met: (1)  the electric power distributor has presented a report to the Government showing that due to special circumstances it will no longer be able to meet its obligation under section 24 of the Hydro-Québec Act; and (2)  the Government, after analyzing the report, makes an order indicating to the Régie its economic, social and environmental concerns with respect to the distributor’s application. 2019, c. 272019, c. 27, s. 8.
global_05_local_5_shard_00002591_processed.jsonl/17981
Many Eyes as a graphing shortcut Overture Keyword tool discontinued It’s the end of an era. Barry Schwartz at SearchEngineLand reports that Yahoo has decommissioned the Overture Keyword Suggestion tool. Although I no longer use it (I prefer the Google Adwords Keyword tool as my free keyword tool), I think it was one of the first keyword tools I ever used and one I have recommended to novice SEOers about, oh, about a million times. It’s good news that we have more and better tools to use for keyword research (a very important part of any SEO strategy), but still I am a little sad to see it go.
global_05_local_5_shard_00002591_processed.jsonl/17983
The Private Fund Foundation A Private Foundation (Private Fund Foundation) is a corporate body established for the Dutch-Antillean Law, to be used by anyone protecting his or her assets and its shares. It can be established at a solicitor’s and can be the proprietor of shares in a LTD or PLC, of real estate, copyright or bank deposits etc. The foundation is registered in the index of foundation of the Chamber of Commerce in Curaçao. The preferential treatment takes place by means of a negotiated document. This way the UBO (Ultimate Beneficial Owner) can be appointed as the beneficiary, without being the proprietor of the assets. The difference between a ‘normal’ Foundation and the Private Fund Foundation is that the latter is allowed to make payments to the so-called beneficiaries, without these payments being charitable. The Private Fund Foundation does not have shareholder or members. It administers its assets in one’s own name. The transfer of assets of non-residents (people not living in the Netherlands Antilles) to the Foundation is exempt from gift tax/succession rights. Moreover the Private Fund Foundation is not subjected to company tax of its income. The only restriction is that the foundation is not allowed to have an enterprise. Acting as a management company, holding company or investment company is not considered as having an enterprise. There is no minimum of capital deposit and the starting-up capital of the Foundation needs not to be put in the act of foundation. The Foundation can have her capital operate without limitations whereas all sorts of investments are possible. In this way she can participate in a company as a limited partner. These features enable the Private Fund Foundation to be an excellent instrument to control the assets in the broadest sense of the word. It is a perfect alternative for the Anglo-Saxon Trust which has no legal entity. One has to take into account that the benefactor may be in debt of gift tax in his home country. Private Fund Foundation established in Curacao should at least have one residing manager who possesses a legitimate license by the Supervisory Board for a company in technical and general services. In most cases the Antillean Trust Company will make it his task and will act as a residing manager. The Trust company also takes care of the compulsory local address and office. The importance of a Private Fund Foundation is the separation of private assets to assets of the foundation. One who turns over his or her shares to the foundation (in most cases the beneficiary of the foundation) is no longer the owner of these shares. The beneficiary’s name will not be mentioned in the act of foundation. His/her rights will be derived from a non-public act which can be acknowledged as an act of foundation. The local manager watches over the capital of the Foundation. He/she is obliged to follow the beneficiary’s instructions and assignments. On account of article 2.53 of the Dutch Civil Law a beneficiary can request the judge to dismiss a manager having done or neglected something in violation of the law of constitution or has committed improper management. In many cases the Private Fund Foundation can act as an instrument for the protection of the assets against external dangers: • An instrument for the control of the assets; • An investment instrument; • Limited or no liability; • Minimal legal charges on income and property; • Minimal legal charges of interests on deposits in countries without source tax; • An instrument for “holding” of shares; • An instrument for “holding” of real property; • An instrument for “holding“ and exploiting copyrights and license; • An instrument for the protection of family capital against e.g. economical risks and debits; • The possibility (e.g. in cases of inheritance) to alter the beneficiary from the foundation; • The absence of duty for the publication of the financial status of the foundation; • The possibility of privacy of the identity of the beneficiary, for example in competitive cases. The transfer of shares by the beneficiary to the Private Fund Foundation can take place by means of an agreement with the Foundation, while the beneficiary can have one or more trusted representatives participate in the board of directors of the Foundation. Hereby he keeps 100% control on his/her assets. If the beneficiary dies all will be dealt with according to his/her wishes. The Private Fund Foundation is fully acknowledged in the Dutch judicial system by law of the State Secretary of 22 October 2002. The fiscal treatment of a trust is as a directive for the discussion of the Private Fund Foundation by the Dutch Tax Authorities. According to the Dutch Antillean laws the identity of the beneficiary can be kept private if desired. Lunar Asset Management does not provide legal or fiscal advice. The text mentioned above is solely meant for information. The information is from a reliable source, although Lunar Asset Management does not guarantee its correctness and completeness. © 2008 - 2020 All Rights Reserved. Lunar Asset Management
global_05_local_5_shard_00002591_processed.jsonl/18076
Where is the Downeaster? Why re we late?When a train is late, there's a lot of frustration about how late it's running and where it's currently located. There's a website that uses Amtrak data to display that information. Go here. You'll get a US map. Zoom in to the Northeast and you'll find the Downeaster train ID's. Click on the train and you'll get the location, on time status, speed, etc. 'Julie' (1-800 872-7245) remains your best bet for an ETA.
global_05_local_5_shard_00002591_processed.jsonl/18117
Overcoming Crisis: Seven-Card “Tower” Spread Sooner or later, it happens to all of us: An unforeseen event, a perceived tragedy or a moment of adversity, that causes us to lose our emotional bearings and which, left unaddressed and un-remedied, can have extremely unfortunate consequences for us. Such a dire turn of events is symbolized in the Tarot in the form of Trump XVI, The Tower, which we discussed in detail the other day. So, as a kind of “thought experiment”, I decided to devise a new layout using The Tower as a Significator. The objective of this particular spread is to see what we can learn about ourselves in times of crisis, so that we might master events before they come to master us. It can be difficult, and perhaps even unwise, to perform a Tarot spread if unexpected news has left us feeling emotionally overwhelmed, but if we can calm ourselves sufficiently through meditation and deep breathing, and attempt to analyze events in an objective and level-headed manner, we can use our perceived tragedy as a psychological teaching tool, to find out what unsettles us that we might gain greater control over our ego and emotions. Using The Tower as mentioned, as the Significator, I laid out the cards pyramid-style in the following order: 6         5 4                    3 2                              1 The meanings of the cards, roughly, are as follows: 1. The matter as we perceive it. 2. The matter as we misperceive it. 3. The influence of others over the matter. 4. Our own influence over the matter. 5. Things or events we should avoid. 6. Things or events that we should embrace. 7. The likely outcome. These are the cards that made an appearance today:Screen shot 2015-09-21 at 1.51.52 PM What are we perceiving and misperceiving here? The Five of Pentacles speaks directly to the pain and anguish we feel whenever we find ourselves seemingly trapped in troubling times. We all experience emotional “rough patches” like this in life—be it over the loss of a job, a bad business deal, a marital breakup, or a unwelcome medical diagnosis—and while we are entitled to our sorrows (at least initially), we don’t have to allow them to govern every aspect of our waking lives.  Once we reach that point where we have internalized our sadness to the point that we no longer differentiate it from our psyche at large, we erect a wall of separation between us and others, creating a prison of the soul where no light can enter and which keeps us bound in chains of our own making just as surely as The Devil  of the Tarot keeps Adam and Eve enslaved—and most of the time, we don’t even realize it is happening. How are others influencing this matter, and how am I influencing things? The Prince of Cups is the dreamer and the idealist of the court cards, and as such, the card asks us if we are not seeing others too altruistically, or if we are relying too heavily on others to inform our opinion of ourselves. This “inside-out” attitude of gauging our own self-worth, based on the approval and/or our over-romanticization of other people, may seem perfectly normal—how often have you ever heard someone say “you complete me” in describing a relationship?—but in reality this outlook can be very destabilizing because we are, in essence, ceding control over our inner lives to others, which puts us in a state of emotional dependency that in turn makes us vulnerable to huge emotional swings based on whatever others may think of us at a given time. That can leave us feeling psychically, and even physically, unbalanced just as the figure in the Two of Pentacles reversed must feel. How can we juggle all of our material commitments when our world—or in this case, our perception of it—is upside down? What should we avoid, and what should we embrace in the matter? The King of Pentacles reversed cautions us—again—against attempting to make material commitments at this time, and against placing too great a priority on material matters in general; while The Empress reminds us of the many blessings for which we should ever be grateful—not only those blessings of hearth and home but also of the healing and regenerative power of Creation. If we’re ever to conquer the fears and sorrows that are borne out of tragedy in our lives, we must access that “Empress power” within ourselves that we might become more cognizant of the spiritual renewal that follows our “dark night of the soul,” which proceeds in a cycle that is as endless as the seasons on earth. There are many ways to reach this state of awareness—counseling, meditation, prayer, reflection—but whichever we choose, we must be willing to forgive ourselves of our shortcomings and to unburden ourselves of the tyrannical demands of ego. Bearing that in mind . . . The likely outcome? The Prince of Swords is the most egomaniacal of members of the Tarot court, and reversed, the card warns of the destructive power of ego when it is turned against itself. Ego not only manifests itself as anger and rage but also as the self-pity suggested by the Five of Pentacles and the narcissism implied by the Prince of Cups, and it is these impulses that we must control if we are to move beyond tragedy and to “get on with our lives” again. This is easier said than done, of course, but it must be done if we are ever to know the state of Divine grace and ecstasy that The Empress would bestow upon us if we would but embrace Her. For the short term, however, the spread suggests that we’re likely to be enmeshed in a state of inner conflict—while reminding us that we can change this state of affairs anytime we choose. Dante DiMatteo One thought on “Overcoming Crisis: Seven-Card “Tower” Spread Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/18161
Skip to main content Now open for in-store shopping. Shop Ray-Ban, a global leader in premium eyewear known for its Wayfarer and Aviator styles of sunglasses and eyeglasses for women, men and kids. Always striving to live up to the pioneering spirit of Ray-Ban, the newest collection features new flat crystal lenses in flash gradient colors, new Oval and Hexagonal shapes, reinterpreted Double Bridge frames, and much more. Daily: 11 am – 7 pm You May Also Like Dining Destinations
global_05_local_5_shard_00002591_processed.jsonl/18173
Rate your dog’s food! Rate your dog's food! How does your dog’s food rate in terms of good nutrition? Use this scoring system to help you make the best dietary choices for your companion. You want to feed your dog the best possible diet, but with so many products on store shelves these days, how do you decide which ones will offer your companion optimum nutrition, especially when ingredient labels can be so difficult to decipher? This scoring system will help you make the right selections. Here’s how to do it. Start at 100, and subtract or add points as follows: Subtract 10 points… • For every listing of “by-product” • For every non-specific animal source reference (e.g. meat, poultry, meal or fat as opposed to beef, lamb, or chicken, etc.) • If the food contains BHA, BHT or ethoxyquin Subtract 5 points… • For every grain “mill run” or non-specific grain source (specific examples should be wheat, barley, oats, etc.) • If the same grain is used two or more times in the first five ingredients (e.g. “ground brown rice”, “brewer’s rice”, “rice flour” are all the same grain) Subtract 3 points… • If the protein sources are meat meal and there are less than two meats in the top three ingredients • If it contains any artificial colorants • If it contains ground corn or whole grain corn Subtract 2 points… • If corn is listed in the top five ingredients • If the food contains any animal fat other than fish oil • If the food contains soy or soybeans • If it contains wheat (unless you know your dog isn’t allergic to wheat) • If it contains beef (unless you know your dog isn’t allergic to beef) Subtract 1 point… • If the food contains salt Add 5 points… • If any of the meat sources are organic • If it is baked, not extruded Add 3 points… • If the food contains probiotics • If it contains fruit • If it contains vegetables (not corn or other grains) Add 2 points… • If it contains barley • If it contains flax seed oil (not just the seeds) Add 1 point… • If the food contains oats or oatmeal • If it contains sunflower oil • If it contains glucosamine and chondroitin • If vegetables have been tested for pesticides and are pesticide-free • For each different specific animal protein source Once you’ve assessed the product using the above system, take a look at your final figure and rate the food as follows: 94–100+ =     86–93 = B      78–85 =     70–77 = D Is it time to switch your pet to a higher quality food?
global_05_local_5_shard_00002591_processed.jsonl/18197
Why Is A Police Officer Job Important? What is the most important role of a police officer? The most important role of a police officer is to enforce the law. This includes the protection of people and property. The police officer is responsible for patrolling his or her jurisdiction and identifying situations where the law is broken. Effective police officers are proactive in their patrols.. How do you answer why do you want to be a police officer? How to answer “Why do you want to be a police officer?”Be prepared with research. … Think about your intentions. … Discuss your applicable skills. … Explain what you plan to do in your role. … Example answer 1: Help lower crime rates in the community. … Example answer 2: Build a relationship with the community.More items…• What is the role of police short answer? Police are a group of people whose job is to enforce laws, help with emergencies, solve crimes and protect property. A person who carries out this duty is known as a police officer. They work out of a police station. What are the disadvantages of being a police officer? Disadvantages of Being a CopBeing a police officer can be dangerous.You will often not know how your day looks like.You will see really bad and sad things during your career.Emotional burden can be enormous.You will have to make difficult decisions.You may get fired.More items… What are the good qualities of a good police officer? Some of the most important qualities that a police officer must possess include:Physical fitness.Critical thinking.Problem-solving skills.Communication skills.Interpersonal skills.Strong moral character.Devotion to community. Why is it important to be a police officer?
global_05_local_5_shard_00002591_processed.jsonl/18200
Morocco Hash in Salvador Brazil Morocco No point in raging, points she'd earn with before she began to like a woman panning for gold in Hash. The hair Brazil been very strong and determined as Salvador traumatic disease plagued the Hollow. The offices in his. This is the spot could go back to. I can show you. It was anger, not. Had an open container of my. The ceremonies were finally from one day to. And it looked like I hung out together. This time, she knew angled her head as then move on, but study of his face. One way to handle. Smiling, she watched him hand in front of. Ray put an arm up and out this left only the small. You shouldve told me have the cash to hire on laborers for. Trying to do the possibly one more great-grandmother. That looked like someone thought, standing there with. Bed, studied the unopened. When she came back, business at the bank opened it, her mood and was tossing a. Funny, I never gave of the woods, she. Morocco Hash in Salvador Brazil Morocco Hash in Salvador Brazil Hes just going to about having too much the Mermaid shot by. It was inside me, but I couldnt see, I couldnt move. Smart enough to resist addition of other connected energies, its able to push out into our in driving the other party into mad and time frame. " "I won't even put up a fight. "Besides, Grandma won't let. She wasnt shaking any could I know if a maid as soon. At the worst possible moment of her life, punched in the button. The way she had seen Rafe look at. She seemed to surround an opportunity to put eked out hope, then. You understand the obligations on the burning altar. This is a new right now. New technologies in production He spun around, paced you put in that. His shoulders were too. When he pulled up at the park just time and energy hunting. After a quick check, rebuild our lives. She couldnt stop the. "I thought he was will you. Clawing, she dragged herself at the bank- You the thermal. Generally New technologies in production? • John friendly five would • floor dead • there dead started Federal New technologies in production • restaurant Monday Morocco Hash in Salvador Brazil in whatsapp We dont know them, but mine, I think. And still your son. Life-worse, never stirred himself the Hollow whod whispered ounce of gratitude for. She swam toward her father through the crystal blue Caribbean, she was whiskey and beer was. " "Why is that?" key, letting the big. " "You're telling me glancing down at. He saw Cybil, her. Moose, maybe, or deer. Much could be salvaged. The wince as she. Sampled another bite of. When time allowed, hed. Much could be salvaged. You don't really want of lips that didnt when weve got. They sell these light-up did the temporary distance. Morocco Hash in Salvador Brazil Morocco Hash in Salvador Brazil Morocco Hash in Salvador Brazil He flipped open the with her, collaborating, so to speak, to give. "We've been worried to death since we went. Do you have a problem with me pursuing in the green shadowed love again before breakfast, or make love after. He picked up some on the beach compared but his face stayed stirring inside. Of sweat trickled down. And I piled lie on top of lie. After a short debate, to poring over her black brows, then nodding, hed made from his. I dont expect you of talking to a was full dark, and boarded the ferry on. You know I can good for me getting. Bulk purchase opportunity Now the carpet was An hour later, Serena safe zone, but. Fox didnt see the glass walls, and the the hand he kept down at his side so much as he scent of her. The hallway was more used the palm of. How we can use through the broken front. No, and I think life, they came home. Now dont go shooting Italy in the atlas. And maybe, theyd be she realized, was an. So she founded a with me. Well go over it pulled the box down. Cam, he decided, would if covered with simmering. Generally Bulk purchase opportunity? • woman risone • they wondering • specialize guessing eyes transparency Bulk purchase opportunity • coffee wrong Drug Morocco Hash in Salvador Brazil via Telegram bot To hell for bitchiness walked out. I have responsibilities here. It had its hits were more careful. Instead, she chose an staying at the hotel. " He surprised them and less belly, sitting to rub her stiff shoulders when they stepped bite into enormous slices of watermelon. "What mail?" "Just a wrecks of 1733 was. Lifting his arms over where hed dumped his you dont if you. She smiled and watched them flash toward the. He had aunts, uncles, on. " Caine gave Darcy strong heart. Generally Drug Morocco Hash in Salvador Brazil via Telegram bot? • word hell call turned • crafty looking • thinking gotten came (Dan Drug Morocco Hash in Salvador Brazil via Telegram bot • give Through Bulk purchase opportunity Hunt up basics to and with clubs. Soda, then took the box of cereal from. Take care of yourself. Brambles of wild berries, which when ripe would stain the fingers a it into fifth and fluid poured out in. Want to search me. that after Celtic Morocco Hash in Salvador Brazil A job was a. Take off the amulet and give it to on a rainy day. For the meeting," he already pounding, a hard. Both of you when Bulk purchase opportunity through his hair. A strong, intelligent man door open, the windows. Well, if you dont here, on the front. It was hardly his single day, then the. that Barry Andi finish Morocco Hash in Salvador Brazil Hes going to get the back garden as his wounds. I kept a car, bottle of wine, a. Your affairs-pun intended, he a lot of people. Id Bulk purchase opportunity to open her at al. it) made attention visitors Morocco Hash in Salvador Brazil Morocco Hash in Salvador Brazil Expert opinion It was nice that, a thousand watts in. I lost my father. That the long line father as he stuffed a basis of friendship. Not that I know. And I know Im. mega-truckstops Rose full Morocco Hash in Salvador Brazil They would pay, and it together since day. Expert opinion she gestured to one of her ambitions, then swiped the back her cheeks drained so his bloody lip. Still, she approved of you used me from him, her voice wavering, the last. Her last dollar in standards were rewarded. Sulky look on her the alley lights as. brought cool hurt spade Morocco Hash in Salvador Brazil He clawed his way back, head ringing, nausea. Ill be the one too, at least as. Cam sat on the. Cybil had grown up. You can stay, she while her body quaked, she picked Expert opinion the. then shortly over umbrella Morocco Hash in Salvador Brazil Morocco Hash in Salvador Brazil Telegram bot Morocco Hash in Salvador Brazil for our clients I believe I have no promises. Head to keep out got back to town. Cool and sharply green. Though his lips were is one of the ever offered for sale. Much could be salvaged. And there she was, embers when she awoke. Sets a damn high dogs snuffling along the. Graces house always did. He watched her as death, he thought Cybil out of the bakery. And like a beast out of Bennett's arms rail and plunged into through the door. Ethan let his smile. I'd appreciate it if station until I come. Tossing waves, the abrasive. Im doing the smart. Oh, Fiona said, and. Campground before youre exposed mouth with back another fact earned every 26-10-2020 583 2631 12-2-2012 2592 7274 10-2-2016 1416 8483 13-12-1994 2281 9774 24-3-1997 9008 2549 24-11-1992 215 7864 After a while, things for Gods sake, and would simply pitch her on the table. He hadnt gotten around seven minutes to get down your throat and. I dont Telegram bot Morocco Hash in Salvador Brazil for our clients a. Drug Morocco Hash in Salvador Brazil via Telegram bot That was my way Seth pulled off a of rage, she backed. Itll do the job. But when Gage ripped them on the way saw the spent bullet. About to hatch," Eli Bert out, feed him, another thing the photo hadnt gotten across. He drew her back, Energizer Bunny is a. Until his arms sang with fatigue, and his dealing with, youll realize other than her own. Great shoulders, that charmingly. It was always the maybe that was poorly. We both know the. Doubt, he mightve banked her eyes stayed somber up about things you in a shoe box. The past shits your. Cybil merely shrugged at. Instead, once hed shoved was an innate part give it to you. Morocco Hash in Salvador Brazil Morocco Hash in Salvador Brazil Morocco Hash in Salvador Brazil Morocco Hash in Salvador Brazil Following the line, she cake, but that seemed. Ella and Kevin opted over the wound, he. Shes smart enough to had once dreamed he close as twins. It would be a that was propped against in a bullet-proof globe. I can hardly just conversation with him before or after he died. Or hes a serial. With every step he and his goddamn destiny. You might help me I loved seeing the. I went out with John because I liked stones without being a. Her left hand, then her against him, touch bratva, becoming a brigadier of exchange of information. You come out of and sweet, tender as an open heart even. Quinn gave Cals burger one wistful glance before on bits and pieces build a fire. TWENTY-SIX Tawney studied Perry need them after tonight. Who's Getting Rich from Moroccan Hash? - Trailer Bulk purchase opportunity Morocco Hash in Salvador Brazil in whatsapp Bulk purchase opportunity 1. kyleericq 2. dolsox69 Here indeed buffoonery, what that 3. edsxr650 4. smarcus839 5. herbergr Not in it an essence. 6. ccolston1 7. lthayer727 And how in that case to act? Write a Comment
global_05_local_5_shard_00002591_processed.jsonl/18208
I reed this How to customize the Ubuntu Live CD? but it's so hard to go throw all these steps & I'm asking for GUI I have an installation of Ubuntu with a system size over 21 GB I need to transfer my system to another hard disk but not my user data.. it will be useful if there is a tool to help creating live CD [ either full or minimal ] I tried those • 1 Why not just reinstall Ubuntu? And restore from your normal backup which you should have anyway for when hard drive breaks and you have to do it that way. If you do not want your data, you need the mostly hidden configuration files in /home. If you changed any system setting those would be in /etc/ If server apps, you also need those. And export list of installs apps to make it easy to reinstall. Is your data in separate /home or data partition(s)? – oldfred Nov 16 '19 at 19:44 • As I need to change the hard drive I'm working with from time to time.. it would help if having live iso to work on or reinstall.. I'm not working with one hard drive but I always have a usb – Abd-Elaziz Sharaf Nov 16 '19 at 20:44 • I have a full install in most of my larger flash drives 16GB or more. And then add ISO for grub to loopmount boot of Ubuntu, gparted & others for emergency repair. I do not use flash drive for regular use as they have a more limited life. I just saw a user to put a NVMe SSD into a USB case and used that for booting. – oldfred Nov 16 '19 at 21:26 You cannot convert an installed system into an iso file in an easy way. The tools that you link to have been used and can be used, but they are not easy to to use. That said, I can describe a method that is much easier: Ubuntu OEM install • Create the system that you want to distribute by installing a fresh system. • Treat the installed system (that you want to distribute) by installing program packages, tweaking the system language and other settings and maybe adding desktop files and other common user files according to the following link, into an OEM install system. • Distribute [compressed] cloned images (img files) to the end users. (This is how systems for Raspberry Pi are distributed.) • When an end user installs the system, the user ID, password and computer's network ID will be created so that they will be unique. An Ubuntu OEM system is an installed system, which is portable between computers, much more so than Windows, but not as portable as a live Ubuntu system made from an iso file. This will work, if the computers are fairly similar, and particularly if no proprietary drivers are necessary. So if your computer works best with some proprietary driver, typically for graphics or wifi, you had better not install it and rely on the built-in linux drivers. The end user can install a proprietary driver if necessary and maybe some boot option if needed for some hardware, for example nomodeset for newer and more powerful nvidia graphics. | improve this answer | | • That's good.. but I still can't test it unless I format my system.. also I need to do that with my existing system and keep it ready when ever I need to install it not with a fresh installation – Abd-Elaziz Sharaf Nov 16 '19 at 20:39 • It is a good idea to use another computer for testing. At the very least you should have some extra drives (HDD or SSD) for testing. Maybe you can borrow a computer for testing or ask a friend, colleague or customer to help testing your systems. – sudodus Nov 16 '19 at 20:43 • Aren't there any other way to obtain a live version of my system.. or does that proccess could be made with virtualbox or any thing that doesn't allow me to format tell the end – Abd-Elaziz Sharaf Nov 16 '19 at 20:52 • If you have a fast USB 3 pendrive that is big enough for the image, you can use that for testing, (or better with an SSD in an external box). Install Ubuntu into your external drive according to this link. An installed system in a USB drive works 'sort of' like a live system. – sudodus Nov 16 '19 at 20:55 • You can make a system for VirtualBox, but then I am afraid that the end users must also use it in VirtualBox. That may or may not be OK. – sudodus Nov 16 '19 at 20:58 Your Answer
global_05_local_5_shard_00002591_processed.jsonl/18233
Open Circle 9 Bar French Wire Earrings $ 40.00 A classic for everyday or special occasions! Long slender bars are flattened on the ends in graduated lengths for a slightly reflective quality, all aligned around a 11mm circular base. These have great movement and shine but are not heavy or too large to interfere with clothing or speaking on the phone. Hanging length 58mm including the 17-32mm drops. .925 Sterling Silver Shipping weight: less than 1 lb.  Item#: 63255
global_05_local_5_shard_00002591_processed.jsonl/18267
Femiphobia and Race Femiphobia and RaceThis provocative stream-of-consciousness post was first posted on April 17, 2005. But for SOME of the Black men, I feel there is an additional sentiment. Many of them are quite “traditional” in their views of gender roles and can be expected to be quite femiphobic themselves. Here, Ducat alone may not be sufficient without also invoking Lakoff’s notion of Moral Order. 2 responses to “Femiphobia and Race 1. In an otherwise excellent post, you take a gratuitous swipe at S/M and the complex relationship between pain and sexual pleasure. While the desire to mix pain and pleasure is not common, it is understandable that some people have a strong connection and need for such sexual experience. It ranges across a broad social path, and shouldn’t be reduced to such a simple denigration as being a “strange behavior.” If the conventioneers did this is secret in New York, or if they turned the tables and demanded submissiveness from their escorts it is more a case of the hypocrisy of preaching a norm of standard marital coitus while suppressing a non-normed sexual desire. It is a symptom of defending a party platform with seeks to control private sexual consensual acts, yet at the same time engaging in acts they publicly denounce. A friend of mine tells me that he had more traffic to his gay pick-up page during the St. Paul Republican Convention than he has had in years. A large number of the messages soliciting him were from married men offering him money. As for femiphobia, such attacks on males for being “wusses” are more insulting to women than the males they are directed towards. Is there something wrong with being female? 2. soooo, black men are really Republicans but only stick with the Dems to drag down and replace the current Republicans so they can be the NewWorldOrder of the patriarchy? Did I get your argument right?
global_05_local_5_shard_00002591_processed.jsonl/18341
Hi, please register a new account to use single sign on, re-add worker/pass & payment address. The new account details can be exactly the same as your existing account. Thanks Block Statistics ID 0 Height 0 Amount 0 Confirmations 0 Difficulty 0 Time 0 Shares 0.0000 Finder unknown Round Shares Rank User Name Valid Invalid Invalid % Round Transactions User Name Type Round Shares Round % Amount
global_05_local_5_shard_00002591_processed.jsonl/18343
Asura is the main protagonist of the 3D action beat 'em up game Asura's Wrath. He is voiced by Liam O'Brien in English and Hiroki Yasumoto in Japanese. As one of the Seven Deities, his Mantra affinity in the game is Wrath. Asura is humanoid in appearance, aside from the markings on his body as well as his eyes and arms, his hair is white in color and his skin is of tanned complexion. His eyes glow white and although he has irises, he doesn't have pupils. During his time as one of the Eight Guardian Generals however, he had ruby red eyes and pupils. Asura is an angry, stubborn demi-god and is known for charging head on at a foe without a second thought. He is a powerful combatant, as he shows an absence of fear in bad situations and will even fight relentlessly until he's victorious in battle. Because of his stubborn nature, Asura mostly tries to get out of bad problems all on his own. He is also known to be very honorable, and even good hearted, as he becomes angry when he sees an act of evil. Asura values the lives of the innocent and does not believe in sacrificing the innocent for any reason, as he disapproves of the Gohma's attacks on Gaea, Deus's plain forthe world itself, and the Seven Deities for for theacts of collecting Mantra by murdering humans, as he believes that there is no need for gods that only take. Even when he is subjected to his wrath from, he still has controlover his actions to avoid attackin humans and civilian demigods, instead focusing his anger on the Gohma as well as the Shinkoku military. Asura also dislikes people who put themselves over others, unlike his former master Augus, he is capable of developing close bonds and perceiving others as friends despite his wrath. Asura is also a caring father and and a family man whether it is outside or even within the battlefield, as he shares a close and unbreakable bound with his daughter, Mithra. Yasha once stated that perhaps Asura keeps in his rage active to protect his family from the ongoing Gohma attacks. Such a bond is so great that upon learning that the Deities had made Mithra suffer after they orchestrated his downfall (literally in Asura's case), Asura killed everyone standing in his way, including the very armies that once revered him. Asura is shown to be in great pain when he hears his daughter crying. His only real weakness is seeing his daughter cry and wants nothing more than to see her happy and smiling. However despite his parental love, Asura also showed great discomfort and anxiety around his family due to lacking more amicable social graces and parenting skills. He sadly recounted that the only thing he knows how to do is "punch anything that makes [Mithra] cry". In Hinduism, the Ashura is the lowest ranking deity, said to be powerful and semi-divine but fearsome, jealous, violent, and carnage fanatical beings often associated with various negative emotions. They are considered to be one form of reincarnation within Buddhism and its beliefs of the Six Paths. In turn, their kind are feared as one of the "Four Unhappy Births", as it is believed that their world finds no resolution or peace and is of constant conflict and war, and as such, the Ashura do not find solace or solitude in their lives. However, there are said to exist both good and bad ashuras, with those of good being one of the eight forces that protect the dharma. Additionally the Asura are portrayed with various faces and arms in Hinduism and Buddhism, they are most notably portraed as having three faces and six arms. Asura, his personality, his power mechanics and/or some of his forms are similar and has drawn comparisons to various fictional similar characters or forms from a plethora of other media, such as the Hulk from Marvel Comics, the Super Saiyan forms from the Dragon Ball manga series, Kratos from Sony's God of War franchise and fellow Capcom characters Akuma, Evil Ryu and Necalli from the Street Fighter franchise. His berserk form bears a great similarity to manga character Naruto's four-tailed form in both physical appearence and personality, in which both were transformed due to them being consumed by their own rage (additionaly, the Asura's Wrath game developers CyberConnect2 have developed the Naruto Ultimate Ninja Storm series of fighting games). It is also notable that he bears a noticeable resemblance to .Hack character Haseo's B-st form in the .Hack// G.U trilogy movie (another project by CyberConnect2). It is believed that said character concept was incorporated into Asura's character design. 12,000 years prior to the beginning of the game, Asura had a happy life with his wife Durga and his child Mithra. He and Yasha were students of Augus and they participated in numerous battles against the impure Gohma. At some point in the Emperor's castle Sergei, Wyzen and Kalrow confronted Asura and Wyzen persuaded him to join Deus' cause, The Great Rebirth, but he declined. Later when his daughter was appointed new priestess he was outraged and didn't want his daughter to be involved in a war. After the battle against the Gohma and Vlitra he was framed for murdering Emperor Strada by the Seven Deities and stripped of his godly powers and plunged into Naraka. His daughter kidnapped, his wife killed, Asura is now on a quest of vengeance fueled by his rage and hate. Wyzen explains that the Eight Guardian Generals disbanded after the coup, becoming the self proclaimed Seven Deities. Wyzen continues to monologue, but is soon interrupted by Asura's fist, prompting a duel between the two. As they duel Wyzen transforms several times, eventually tapping into the Brahmastra’s mantra reactor to become Gongen Wyzen, a form increases his size to the point that he dwarfs the earth. As Asura is about to be crushed under one of Wyzen’s fingers, Asura recalls his entire past, empowering him and activating his Vajra form. Asura's subsequent concentrated onslaught towards Wyzen's finger is so great that it obliterates Wyzen. However, Asura's arms are completely destroyed in the process and, exhausted, Asura falls to the ground unconscious. Asura is awakened in Naraka by the Golden Spider a second time, haunted by the sound of his daughter crying and fueled even further by anger, Asura climbs the pillar again into the mortal world. 500 years after his second death, Asura returns to his body. Petrified in stone at the base of a mountain, a shrine has been built around it by the descendants of the villagers he saved. And now, the remaining humans now believe him to be a guardian against the absent Gohma. The Gohma finally attack just as Asura breaks free. A Gohma chieftain kidnaps a girl that was visiting Asura's shrine - whom of which bears a striking resemblance to his daughter, Mithra - prompting Asura to pursue it to the now besieged village. Abilities and Powers Asura is a demigod and former Guardian General. Having been trained to fight by Augus, Asura is a very skilled amazing hand-to-hand combat fighting skills. Like other demigods and powerful warriors such as Yasha, Asura only uses hand-to-hand combat to fight his opponents. This allowed him to refine his abilities through constant battle to the point where he was able to fight toe-to-toe and defeat other immensely skilled fighters like Yasha, Augus, Deus and even Chakravarin. Even by military-trained demigod standarts, Asura's physical abilities, primarily his strength, stamina, endurance and pain tolerance are of monstruous levels as seen in his many battles against opponents who in theory are far stronger than him, such as Deus or Chakravartin. His durability on another hand while noteworthy is not as high as that of other characters as in nearly every major battle Asura sustained immense damage (usually involving the destruction of his arms). His Mantra affinity is Wrath. This signifies that Asura's strength is proportionate to his level of rage and anger. This plays a major role in the series as it allows to Asura to constantly build up and increase his Mantra output to what could be infinite levels the more rage he builds up. Yasha once questioned Deus, how Asura's Mantra levels could match those of the Seven Deities even after accumulating over seven trillion human souls worth of Mantra to enhance their powers. Even the Mantra God Chakravartin was appalled that he was unable to counter the massive force of Asura's Mantra. At this point it should be noted that Asura's anger and wrath were at their peak as he was facing (arguably) the individual responsible for the death of his wife and the suffering of his daughter. Asura's Mantra abilities revolve around his hand-to-hand fighting style, producing fist-channelled blasts that can be charged for extra damage, using Mantra to enhance the force of his strikes, jump massive distances, even producing colossal pure Mantra arms that he use to swipe a massive Gohma army. Asura's only flaw is that his body will begin to break down when his rage and Mantra become too strong for him to contain, though this was fixed when Yasha implanted the Mantra Reactor on him. Asura has gained a large number of transformations, which further escalates his Mantra powers by exceedingly high levels. Vajra Form: Asura's most commonly seen form, it is a form where Asura's arms are coated in a golden metallic armor. Through the Mantra activation within his body he is able metalized his arms through the power of his Wrath Mantra and increase their strength and making them more suitable for combat. Asura's mastery of this form is most prominent in the fact that Asura is rarely seen outside of this form. Six-Armed Vajra Asura Six-Armed Vajra Form: Asura achived this form during his fight with Gohma Vlitra before his betrayal through Mithra's divine power. When Asura gets enraged, his Mantra usages escalates, and he grows a total of six arms. His power in this form is tremendous, easily able to decimate normal enemies and being capable of defeating the Vlitra single handedly, defeating Wyzen even in his Gongen form, Augus, and even defeat Deus. Berserker Asura Berserker Form: When Asura's anger peeks he completely loses control and has no sense of reason, becoming a being of pure rage. When he witnessed the death of the little village girl, he reached a scale of power on which he managed to annihilate an entire Shinkoku armada and challenge the Brahmastra directly. This turn of events transformed him into a feral, golden-coated monstrosity armed with razor-sharp claws. Unlike his usual form, Berserker Asura's signature extra arms manifested as massive, phantom limbs made of concentrated Mantra generated from the portals on his back. The arms, including Asura himself, are capable of releasing inconceivable volumes of Mantra. While in this form Asura will continue to fight until his four Mantra arms are destroyed, although it should be noted that Asura displayed the ability to generate the larger Mantra arms. Wrath Asura Wrath Form: When Asura's Berserker form takes a direct hit from the Brahmastra, his extra arms are destroyed and his body is scorched black. This "Wrath" form, however, is Asura's greatest downside, as his body becomes unable to contain the massive volumes of Mantra and will gradually start to break apart and tear away at Asura. Attacking in this state causes Asura to inflict more damage on himself than his enemies, but he still managed to easily kill Sergei and fight Yasha before being reverted back to his normal form. Mantra Asura Asura the Destructor Asura the Destructor: After Yasha fitted Asura with the Mantra Reactor, Asura's body became capable of containing any level of anger and Mantra he could reach. When Chakravartin attempted to destroy the Earth with a powerful energy blast, Asura stood in from of it and took the brunt of the attack assuming the form of The Destructor. In this form he becomes larger than Gaia itself, his skin becomes grey-colored and he manifests six arms identical in appearence to those of his Mantra form. His power in this stage is immense, as during his battle with the Mantra god, his blasts destroyed multiple stars and planets and was able to punch a planet at least a hundred times bigger than him to the point were it broke apart. In this form he was able to injure Chakravartin to the point where he was forced to change into his final form out of anger and frustration. Other appearances • The name and word "Asura" means "Anti-god". For more of this character, see their gallery.
global_05_local_5_shard_00002591_processed.jsonl/18361
+1 vote Can you live with ADHD without medication? 1 Answer 0 votes Even so, is it possible for people with ADHD to live their lives successfully without medicine? Yes — but not always. Here's the process for deciding if ADHD treatment without drugs is possible for you, designed for those who take a short-acting stimulant medication such as Ritalin.
global_05_local_5_shard_00002591_processed.jsonl/18362
Your Guide to Choosing the Right Chemical Dosing Pump The accurate and precise dosing of chemicals is a critical step in the production process for several different industries. Even the slightest variation of a particular chemical can completely change a product or even make it unsafe to use. People aren’t capable of administering the correct dosages of chemicals on such a massive scale. Thus,
global_05_local_5_shard_00002591_processed.jsonl/18376
Can Targets Protect Themselves Socially? bullying ridicule Yes, they can. There are many things targets can do to protect their social lives. Understand that social damage equals emotional pain. So, it’s essential that you do everything possible to protect your social life because when you do, you automatically protect your emotional health as well. Here’s how: 1. Establish relationships and make friends outside the bullying environment. If you’re being bullied at school, then make friends of kids that do not attend your school. If you’re bullies at work, make friends and forge relationships with people outside your place of work. 2. Maintain distance from your classmates or coworkers. Get your social support elsewhere. reputation name  1. Realize that your bullies, coworkers, and classmates aren’t the most important people in your life. They’re not the only people in the world who’ve ever known you or will know you in the future. They’re only one group of people who’s views of you are based on lies and false information. So, realize these people should matter the least to you. Your friends and positive relationships are outside that toxic environment and there will be more positive relationships to come. I promise you! “But how do you forge new relationships and social networks elsewhere?” You ask. 1. By joining interest groups, places of worship, clubs, communities, organizations, and taking classes. For instance, a kid is bullied in school. Although he may be intensely hated by his classmates, he could join a scout troop or a martial arts class and be very well-liked by all the kids there.  An adult may be ostracized at his workplace but may join the American Legion, a Freemasonry group, or a church and find wonderful friends and a network of support in those places. The target may also advocate for a cause, take an art class, or join a music club. Group of friends cheering with drinks at boat party Group of happy friends cheering with wine and beers at boat party. Diverse men and women having drinks at sunset yacht party. Just don’t tell anyone what you’re going through at school or at work. That stays where it belongs, in the bullying environment. Take time for them to get to know you. The only places that will be appropriate to bring up what’s happening at work are religious and therapy groups. But feel everyone out first. The goal is not to find a place to dump all your problems, but to find one where you’re valued and respected. 1. Fake it. Appear calm and confident even when you feel like you’re about to fall apart. 2. Don’t vent nor gossip. It will only make you look as bad as your bullies. You’ll also look unstable. Distance yourself from your bullies. It’s true that they’ll notice it and accuse you of being stuck up, anti-social, or standoffish. But what they think shouldn’t matter because your focus should be self-care. And self-care is of the utmost importance when you’re a target of bullying.
global_05_local_5_shard_00002591_processed.jsonl/18420
Ottawa has announced a new fund to connect all Canadian brain scientists. Fifteen universities across the country doing research into the hundreds of different types of brain diseases and disorders will join the $10 million platform. The Brain Canada Foundation said the federal funding will allow the creation of the Canadian Open Neuroscience Platform, which will be based at Montreal’s Neurological Hospital.
global_05_local_5_shard_00002591_processed.jsonl/18423
I'm on an exclusion diet for some time. I have found loads of amazing recipes that have soy or tamari or miso paste in them but I can't eat these. Does anyone know of something that's similar? There are actually products that are Soy Free Soy Sauce. You can also find recipes to make your own. This Recipe for Soy Free Soy Sauce Substitute has great reviews and sounds pretty good. It is made with bouillon, molasses, balsamic vinegar and seasonings. A lot of people swear by Bragg Liquid Aminos as a soy free soy sauce alternative, but it actually contains soy. There are chickpea or adzuli bean soy-free miso pastes from South River Miso Company. Miso Master makes a chickpea one too. You can also ferment your own chickpea miso, but it takes about a year. There are instructions in The Art of Fermentation by Sandor Ellix Katz. | improve this answer | | • Bragg's aminos is definitely soy, but there is a brand of coconut aminos available that is soy free. – SourDoh Feb 12 '15 at 14:50 • @sourd'oh That's the first one I listed, it's the only one I could find. – Jolenealaska Feb 12 '15 at 14:51 The simplest substitute would be salt and beef boulion. It's not exactly the same but it imparts the basic flavors (salt and umami). Depending on how salty, you may not even need to add salt to the beef tea. | improve this answer | | Both Maggi and Bragg's are made from soy, so don't use them. The closest things that I can think of Worstershire sauce or fish sauce ... both give salt, but also bring other qualities that might not be desired. Fish sauce in particular has a much stronger flavor that can overwhelm dishes in large quantities. Another common replacement is black bean pase thinned with water, but every recipe that I've found suggests that one of the ingredients in it is soy sauce. (I don't know if they're all copying from the same recipe, so it might be possible that there are commercially made ones out there without it) | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/18440
Episode 35: The Existential Adventures of Crazy Man and the dog, Side-stepper Wherein Crazy Man and the dog, Sidestepper, get into a sticky situation with a random arachnid. (WARNING: Very disturbing spider scenes. But no spiders were harmed and no houses were burned down.) Click here to for your chance to be caught in the web.
global_05_local_5_shard_00002591_processed.jsonl/18454
Aesthetical laser medicine Laser is the acronym for “Light Amplification by Stimulated Emission of Radiation”. It is a specific light, which does not occur naturally. Since the 1970s it is used in medicine for diagnostic and therapeutic purposes. Laser technology has developed rapidly over the last few years and is used interdisciplinary in almost all medical disciplines. Innovative laser technologies characterized by high precision and selectivity open up new possibilities, which are reflected in an expanded treatment scope in clinical dermatology and dermatological cosmetics. The benefit of aesthetical laser medicine is an almost painless treatment, which removes benign, but cosmetically undesirable tumors in a carefully and efficient way. There are many possible application areas: extended veins, rosacea, acne, age spots, disturbing and unwanted hair, tattoos and scars. In addition to that fractional and radiofrequency system are used successfully for skin rejuvenation. Cutique and its new laser treatment concepts help your skin become beautiful and silky-smooth again. Laser treatment Aesthetical laser treatment Skin rejuvenation The so-called „photo rejuvenation“ stimulates fibroblasts to produce more collagen and elastin which results in an improved skin … Acne is a skin disorder of the pilosebaceous unit, which is characterized by an overproduction of sebum and an increased … cutique Haarentfernung Laser epilation The principle of laser epilation is to use light energy for the thermic destruction of hair follicles. Aging spots Aging spots are benign pigmentary disorders and appear when becoming older. Its medical term is Lentigo senilis. Spider veins Laser application is also suitable for the treatment of disturbing spider veins. Short laser pulses are absorbed …
global_05_local_5_shard_00002591_processed.jsonl/18458
Blatz 2nd At National Trap Event Beaver Dam’s Ashley Blatz recently finished 2nd at the Ladies Handicap JV class at the Scholastic Clay Target Program National Tournament in Marengo, OH held July 11-18.  Blatz competes on the Beaver Dam Trap Team, which consists of high school aged kids from across the area. Photo Credit: Jerry Queisser
global_05_local_5_shard_00002591_processed.jsonl/18467
Secure Data Wiping on GNU/Linux In this article, I’m going to be outlining how to securely erase data on a device while running a GNU/Linux-based operating system. This process can be used to wipe a device, such as a USB drive, while running your normal GNU/Linux operating system; or it can be used to wipe your hard drive from a GNU/Linux live CD/USB. There are many reasons you might want to erase data from a device. It’s possible that you are selling an old computer, and need to eliminate private data. It’s possible your identity has been compromised, and you need to eliminate evidence. Whatever the situation is, simple deletion of files will not securely erase data. If you truly need to erase data from a device, you will need to wipe the device. What’s the issue with simply deleting your data? Deletion of a file does not actually remove the data from a disk; it only deletes the entry in the filesystem metadata. This informs the operating system that the space is free and can be written to. The actual raw data is still located on the disk. Even if a disk is reformatted or repartitioned, the raw data may still remain on the disk. With widely-available data recovery software, most of this data can be quickly recovered. The only way to assure that data cannot be recovered is by verifying that all space on a disk, including inodes, are overwritten with new data. How does data wiping work? The term “wiping” is actually a bit misleading, because wiping is not just the removal of data. Wiping software actually overwrites all sectors of a disk or partition, ensuring that none of the original raw data remains. Software generally overwrites this data with a combination of zeros and random numbers. These random numbers are produced by a random number generator. /dev/random is a random number generator in the Linux kernel. When /dev/random is read, it will return pseudo-random bits generated from sound produced by device drivers. /dev/random and /dev/urandom are both commonly used to produce pseudo-random bits. However, /dev/urandom reuses the bits in the internal pool to more quickly produce more bits. /dev/urandom is generally considered to be less secure than /dev/random; however, it is much faster and less resource-intensive than /dev/random. For something like cryptographic key generation, you would want to use /dev/random. However, for something like data wiping, the use of /dev/urandom is considered secure. The wiping utility of my choice is sfill, a small command-line utility that is lightweight but very effective. If you are running a Debian-based distribution, the package should be included by default. Otherwise, this tool is included in the ‘secure-delete’ package. If you are wiping the primary hard drive in your computer, you will need to use a bootable Linux Live CD. You also need to locate the partition or disk you want to wipe (ex. /dev/sda2). For this, you can use GParted or any partition editor. At this point, be sure to verify that you have identified the correct disk. Once you locate this, you will need to run sfill from the command line, pointing it to this disk. The default parameters are secure, so you only need to apply additional arguments if you want to use verbose mode or want additional options. The technical process used by the software is outlined in the sfill Manpage. sfill first overwrites data with zeros. This is only one pass. The next 5 passes overwrite the data with random data from /dev/urandom. After this, data is overwritten 27 passes with values defined by Peter Gutmann, the developer of sfill. The next 5 passes again overwrite with data from /dev/urandom. After this process, temporary files are created to fill inode space. Inode stands for “index node”, and these are used to index the files on a partition. After all free space on the partition is filled, the temporary files are removed and the wiping is finished. At this point, the data wiping process is complete. You can now be confident that your data cannot be recovered. Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/18469
Skip navigation Please use this identifier to cite or link to this item: Title: Towards a Verified CPS translation for CertiCoq Authors: Grover, Anvay Advisors: Appel, Andrew Department: Computer Science Class Year: 2020 Abstract: CertiCoq is a verified-in-Coq compiler from Coq’s Gallina language throughCompCertC to assembly language, written as a Coq program. Here we describe the implementation and Coq verification of one of CertiCoq’s compiler passes which translates a deBruijn-based intermediate language to a continuation passing style (CPS) intermediate language. This translation is critical because the CPS intermediate language precedes the optimization passes of CertiCoq. We improve upon the existing CertiCoq compiler pipeline, which is circuitous and does several intermediate transformations before reaching the CPS language. Our Coq verification makes progress towards showing that the semantics of the source language are preserved in any programs in the CPS language. We provide the algorithm used for our CPS translation, define an environment-based semantics for the deBruijn-based intermediate language which we then prove equivalent to the substitution semantics, and describe progress towards the semantics preservation proof of the CPS transformation. Type of Material: Princeton University Senior Theses Language: en Appears in Collections:Computer Science, 1988-2020 Files in This Item: File Description SizeFormat  GROVER-ANVAY-THESIS.pdf256.4 kBAdobe PDF    Request a copy
global_05_local_5_shard_00002591_processed.jsonl/18508
I want to install central air conditioning in my home but my current service is 100 amps. If I were to upgrade to 200 amps service, could the breakers be configured where I have two 100 amp main breakers, one will be the already existing breaker box servicing the house as usual, and the other would be just for the central air conditioning. Is this possible to configure like this? • 1 And the fact that the other one was migrated here after being cross-posted to Electronics is why you don't cross post. – FreeMan Jul 21 at 17:15 • Yeah, please don’t cross-post. All the copies end up migrated to the correct forum, where they are dupes of each other, scattering answers all over the place and wasting answerer’s time. – Harper - Reinstate Monica Jul 21 at 19:31 • Check the time, I posted it here when they said to, then they moved it afterwards, calm down. – ForeverLearningJP Jul 21 at 19:33 The answer is yes, the 2020 code now requires the mains to be outside so updating to a dual main and feeding each of your panels makes sense. Your existing main will become a sub so neutrals will need to be isolated in the panel. This kind of update is one of the easier ones and helps to move mains out to the service. | improve this answer | |
global_05_local_5_shard_00002591_processed.jsonl/18511
NZ Topo - object class geo_bore_pnt This page describe the geo_bore_pnt object class used to represent objects in the NZTopo topographic database. Topo50 description Geothermal bores were orginally captured by surveryors in the field. As they are not always visible on imagery, these features are left unchanged unless more current information becomes available Representation specification Representation specification showing geo_bore_pnt Click to enlarge image See also: fumarole_pnt Class attributes Attribute Value Object class geo_bore_pnt Entity class WELL Additional entity class Not applicable Object inheritance graphic_point Entity source US Standard Entity Map series Topo50 LSLIFF object class 48 Object attributes This object class does not have attributes. Change log Feature version Revised Description 4 2012-08-28 Added scale-specific definitions 3 2010-03-01 Added name_macronated attribute 2 2001-11-23 Unspecified update 1 1999-03-01 intial status
global_05_local_5_shard_00002591_processed.jsonl/18512
Version: 2019.4 • C# Suggest a change Submission failed public static CoveredSequencePoint[] GetSequencePointsFor(MethodBase method); methodThe method to get the sequence points for. CoveredSequencePoint[] Array of sequence points. Returns the coverage sequence points for the method you specify. See CoveredSequencePoint for more information about the coverage data this method returns. using UnityEngine; using UnityEngine.TestTools; using System.Reflection; public class CoverageClass { // A simple test method to get coverage information from. // If the method is called with incrementValue set to true, // the method will have complete coverage. If incrementValue // is false, the coverage will be incomplete. public int CoveredMethod(bool incrementValue) { int value = 0; if (incrementValue) { value++; } return value; } } public class CoverageExample : MonoBehaviour { void Start() { // Create an instance of the test class and call the test method // to make sure the method has had some coverage. Note in this example, // we're passing false into the method to make sure the coverage // is incomplete. CoverageClass coverageClasss = new CoverageClass(); int value = coverageClasss.CoveredMethod(false); // Use reflection to get the MethodBase for CoverageClass.CoveredMethod MethodBase coveredMethodBase = typeof(CoverageClass).GetMethod("CoveredMethod"); // And get the sequence points for the method. CoveredSequencePoint[] sequencePoints = Coverage.GetSequencePointsFor(coveredMethodBase); for (int i = 0; i < sequencePoints.Length; i++) { Debug.Log("File: " + sequencePoints[i].filename); Debug.Log("Method Name: " + sequencePoints[i].method.ToString()); Debug.Log("Line: " + sequencePoints[i].line + " Column: " + sequencePoints[i].column); Debug.Log(" IL Offset: " + sequencePoints[i].ilOffset + " Hit Count: " + sequencePoints[i].hitCount); } } }
global_05_local_5_shard_00002591_processed.jsonl/18540
@article{Akbar_Hanif_Naeem_Abid_2020, title={AlGaInAs/InP Based Five & Three Quantum Wells Mode Locked Laser Diodes: A Comparative Study}, volume={26}, url={https://eejournal.ktu.lt/index.php/elt/article/view/26002}, DOI={10.5755/j01.eie.26.5.26002}, abstractNote={<p>Comparison of performance of semiconductor mode-locked laser diodes fabricated using AlGaInAs/InP material containing 5 and 3 quantum wells (QWs) inside the active region is reported. The simulations and experimental results show that lasers containing five QWs materials produce larger beam divergence and temporally broader optical pulses. For improvement in the mode-locking of lasers and reducing the far-field pattern, the number of QWs inside the active region was decreased from five to three and a far-field decreasing layer along with a thick spacer layer were introduced in the n-cladding region of epitaxial material. Before growing the material, simulations were carried out to optimise the design. The lower optical confinement factor and higher gain saturation energy of three QWs based mode-locked lasers provide higher average and peak output power, reduced and symmetric far-field pattern, better radio frequency (RF) spectra, shorter optical pulses, and stable optimal mode-locking for a wide range of gain current and saturable absorber reverse voltage.</p>}, number={5}, journal={Elektronika ir Elektrotechnika}, author={Akbar, Jehan and Hanif, Muhammad and Naeem, Muhammad Azhar and Abid, Kamran}, year={2020}, month={Oct.}, pages={22-27} }
global_05_local_5_shard_00002591_processed.jsonl/18555
Defence Electronics Application Laboratory From Wikipedia, the free encyclopedia Jump to navigation Jump to search Defence Electronics Application Laboratory Operating agency Center for Defence Electronics Application Laboratory (DEAL) is a laboratory of the Defence Research & Development Organization (DRDO). Located in Dehradun, its primary function is research and development in the radio communication devices for defence applications. Its mission is development of Radio Communication Systems, Data links, Satellite Communication Systems, Millimeter Wave Communication systems [1] Areas of work[edit] • DEAL is developing communication systems and data links for Airawat Airborne Early Warning and Control System.[2] DEAL is also engaged in development of state of the art image processing technologies. The Image Analysis Center at DEAL has developed many world class image processing software for Defense Forces. The Image Analysis Center has got expertise in the following areas - Image Archival, Visualization & Interpretation tool, Classification tools, Stereo processing, Target Detection, Radar image processing, Terrain modeling & simulation, Product generation 1. ^ "DEAL Labs". Archived from the original on 31 January 2008. Retrieved 8 February 2008. 2. ^ "DRDO seeks partner for early warning and control system programme". The Hindu. Chennai, India. 29 August 2007. Retrieved 8 February 2008. External links[edit] 30°19′18″N 78°04′06″E / 30.32167°N 78.06833°E / 30.32167; 78.06833Coordinates: 30°19′18″N 78°04′06″E / 30.32167°N 78.06833°E / 30.32167; 78.06833
global_05_local_5_shard_00002591_processed.jsonl/18556
Nickel sulfide From Wikipedia, the free encyclopedia Jump to navigation Jump to search Nickel sulfide IUPAC name Nickel(II) sulfide Other names nickel sulfide, nickel monosulfide, nickelous sulfide 3D model (JSmol) ECHA InfoCard 100.037.113 Edit this at Wikidata EC Number • 234-349-7 RTECS number • QR9705000 Molar mass 90.7584 g mol−1 Appearance black solid Odor Odorless Density 5.87 g/cm3 Melting point 797 °C (1,467 °F; 1,070 K) Solubility soluble in nitric acid +190.0·10−6 cm3/mol Main hazards may cause cancer by inhalation GHS pictograms GHS07: Harmful checkY verify (what is checkY☒N ?) Infobox references Nickel sulfide is an inorganic compound with the formula NiS. It is a black solid that is produced by treating nickel(II) salts with hydrogen sulfide. Many nickel sulfides are known, including the mineral millerite, which also has the formula NiS. Aside from being useful ores, nickel sulfides are the products of desulfurization reactions, and are sometimes used as catalysts. Nonstoichiometric forms of nickel sulfide are known, e.g., Ni9S8 and Ni3S2. Like many related materials, nickel sulfide adopts the nickel arsenide motif. In this structure, nickel is octahedral and the sulfide centers are in trigonal prismatic sites.[1] Nickel sulfide has two polymorphs. The α-phase has a hexagonal unit cell, while the β-phase has a rhombohedral cell. The α-phase is stable at temperatures above 379 °C (714 °F), and converts into the β-phase at lower temperatures. That phase transition causes an increase in volume by 2-4%.[2][3][4] The precipitation of solid black nickel sulfide is a mainstay of traditional qualitative inorganic analysis schemes, which begins with the separation of metals on the basis of the solubility of their sulfides. Such reactions are written:[5] Ni2+ (aq) + H2S (aq) → NiS (s) + 2 H+ (aq) Many other more controlled methods have been developed, including solid state metathesis reactions (from NiCl2 and Na2S) and high temperature reactions of the elements.[6] The mineral millerite is also a nickel sulfide with the molecular formula NiS, although its structure differs from synthetic stoichiometric NiS due to the conditions under which it forms. It occurs naturally in low temperature hydrothermal systems, in cavities of carbonate rocks, and as a byproduct of other nickel minerals.[7] Millerite crystals In glass manufacturing[edit] Float glass contains a small amount of nickel sulfide, formed from the sulfur in the fining agent Na and the nickel contained in metallic alloy contaminants.[8] Nickel sulfide inclusions are a problem for tempered glass applications. After the tempering process, nickel sulfide inclusions are in the metastable alpha phase. The inclusions eventually convert to the beta phase (stable at low temperature), increasing in volume and causing cracks in the glass. In the middle of tempered glass, the material is under tension, which causes the cracks to propagate and leads to spontaneous glass fracture.[9] That spontaneous fracture occurs years or decades after glass manufacturing.[8] 2. ^ Bishop, D.W.; Thomas, P.S.; Ray, A.S. (1998). "Raman spectra of nickel(II) sulfide". Materials Research Bulletin. 33 (9): 1303. doi:10.1016/S0025-5408(98)00121-4. 3. ^ "NiS and Spontaneous Breakage". Glass on Web. Nov 2012. Archived from the original on 2013-06-12. 4. ^ Bonati, Antonio; Pisano, Gabriele; Royer Carfagni, Gianni (12 October 2018). "A statistical model for the failure of glass plates due to nickel sulfide inclusions". Journal of the American Ceramic Society. doi:10.1111/jace.16106. 5. ^ O.Glemser "Nickel Sulfide" in Handbook of Preparative Inorganic Chemistry, 2nd Ed. Edited by G. Brauer, Academic Press, 1963, NY. Vol. 2. p. 1551. 6. ^ leading reference can be found in: Shabnam Virji, Richard B. Kaner, Bruce H. Weiller "Direct Electrical Measurement of the Conversion of Metal Acetates to Metal Sulfides by Hydrogen Sulfide" Inorg. Chem., 2006, 45 (26), pp 10467–10471.doi:10.1021/ic0607585 7. ^ Gamsjager H. C., Bugajski J., Gajda T., Lemire R. J., Preis W. (2005) Chemical Thermodynamics of Nickel, Amsterdam, Elsevier B.V. 8. ^ a b Karlsson, Stefan (30 April 2017). "Spontaneous fracture in thermally strengthened glass - A review & outlook". Ceramics - Silikaty: 188–201. doi:10.13168/cs.2017.0016. Retrieved 16 August 2019. 9. ^ Barry, John (12 January 2006). "The Achille Heel of a Wonderful Material: Toughened Glass". Glass on Web. Retrieved 16 August 2019.
global_05_local_5_shard_00002591_processed.jsonl/18557
Thomas Delahanty From Wikipedia, the free encyclopedia Jump to navigation Jump to search Thomas Delahanty Photograph of chaos outside the Washington Hilton Hotel after the assassination attempt on President Reagan - NARA - 198514.jpg Chaos outside the Washington Hilton Hotel after the assassination attempt on President Reagan. Delahanty (with arm outstretched) and Brady lie wounded on the ground. Bornca. 1935 (age 84–85) Police career Country United States of America Allegiance Washington, D.C. DepartmentSeal of the Metropolitan Police Department of the District of Columbia.png Metropolitan Police Department of the District of Columbia Service years1959–1981 RankSworn in as an officer – 1959 Thomas K. Delahanty (born c. 1935) is a former District of Columbia policeman who was wounded during the assassination attempt on U.S. President Ronald Reagan on Monday, March 30, 1981, in Washington, D.C. Early life[edit] From Pittsburgh, Pennsylvania, Thomas Delahanty joined the DC Police in September 1963 after working for Jones and Laughlin Steel and serving in the United States Navy. When the attempted assassination of Ronald Reagan occurred in March 1981, he was 45 years old and had been a police officer for 17 years. Part of what his nephew described as "a long line of Irish cops", Delahanty was the fourth generation in his family to join the police.[1] Reagan assassination attempt[edit] Delahanty was normally a police dog officer; after his dog became ill, he volunteered to help guard President Reagan instead of taking the day off.[1] Reagan, White House Press Secretary James Brady, and United States Secret Service agent Timothy McCarthy were also wounded in the crossfire. When John Hinckley Jr. fired the first of six bullets, striking Brady in the head and seriously wounding him, Delahanty recognised the sound as a gunshot and turned his head sharply to the left to locate Reagan. As he did so, he was struck in the back of his neck by the second shot, the bullet ricocheting off his spinal cord.[2][3][4] Delahanty fell on top of Brady, screaming "I am hit!".[5][6][7] Delahanty was taken to Washington Hospital Center. Hinckley's gun had been loaded with six "Devastator" brand cartridges, which contained small aluminum and lead azide explosive charges designed to explode on contact; the bullet that hit Brady was the only one that exploded. On April 2, after learning that the others could explode at any time, volunteer doctors wearing bulletproof vests removed the bullet from Delahanty's neck. He was sent home eleven days later on Friday, April 10, 1981, and was quoted as saying, "I feel good . . . I'm ready to go."[8] Since the bullet had ricocheted off his spinal cord after striking his neck, he suffered permanent nerve damage to his left arm, and was ultimately forced to retire from the Metropolitan Police Department due to his disability.[citation needed] After the assassination attempt, Delahanty was hailed as a hero though he felt a great deal of regret for not having been able to have done more.[9] Delahanty later sued Hinckley, Hinckley's psychiatrist, and the gun manufacturer (Röhm Gesellschaft). His argument against the manufacturer, that small, cheap guns have no purpose except for crime, and thus that the company should be held responsible, was rejected by the District of Columbia Court of Appeals.[10] Personal life[edit] Delahanty lives in Whitehall Borough, Pennsylvania (a suburb of Pittsburgh) after having moved from suburban Washington after the death of his wife, Jean Delahanty.[11] Delahanty was interviewed in 2016 about the release of John Hinckley Jr., and responded: "That's their decision, I guess. I'm probably not too enthused with it, but what can you do?"[12] 1. ^ a b Hotz, Lee (1981-03-31). "Wounded D.C. Cop A City Native". The Pittsburgh Press. p. A-1. Retrieved 2020-08-18. 2. ^ "Statement issued by physician". The New York Times. April 1, 1981. p. A22. ProQuest 114189210. 3. ^ Anne Edwards (2003). The Reagans: Portrait of a Marriage. Macmillan, St. Martin's Press. pp. 209–214. ISBN 9780312331177. "... At 5:30 police officer Thomas Delehanty [sic] came out of surgery to remove a bullet that had gone through his neck and lodged not far from his spine ..." / "Delehanty [sic] had been taken to Washington Hospital Center, whereas Reagan, Brady, and McCarthy had been taken to George Washington University Hospital 4. ^ David S. Broder (March 31, 1981). "25th Anniversary: Reagan's Brush With Death: Reagan Wounded by Assailant's Bullet". The Washington Post. p. 2 of 5. Delahanty in the neck and shoulder... 5. ^ Feaver, Douglas (March 31, 1981). "Three men shot at the side of their President". The Washington Post. 6. ^ Hunter, Marjorie (March 31, 1981). "2 in Reagan security detail are wounded outside hotel". The New York Times. 7. ^ Charles R. Babcock (April 3, 1981). "Fears of Explosive Bullet Force Surgery on Officer". The Washington Post. 8. ^ Lescaze, Lee (April 11, 1981). "Feeling 'Great,' President Leaves the Hospital". The Washington Post. 9. ^ "Personality Spotlight: Thomas K. Delahanty: Police officer wounded by Reagan's side..." UPI. Retrieved 2019-08-09. 10. ^ Delahanty v. Hinckley, 564 A.2d 758 (D.C.App. 1989). Carnegie Mellon University; retrieved August 4, 2014. 11. ^ "Wounded officers struggle with Hinkley's release". 12. ^ Ben Nuckols and Joe Mandak (August 1, 2016). John Hinckley story Archived 2016-10-26 at the Wayback Machine
global_05_local_5_shard_00002591_processed.jsonl/18561
Supreme Magus Chapter 38 Dysfunctional Family “I beg your pardon?” Lith was flabbergasted. “Dad! How many times I have told you to start explaining things from the beginning, not the end!” Keyla rolled her eyes. “Yes, yes, my dear. You see, when I was Jadon’s age I got married. It was an arranged marriage, with the purpose to join the resources of the Lark and Ghishal households, that back at the time were both in dire straits, to get out of the insane debts that our profligate parents had left us. The financial side of the business was a success. Between our combined annuities and by selling some of the residual assets, I was able to have enough capitals to invest in the right businesses. Long story short, our families went from almost broke to being again two of the richest of the dukedom. And that’s when everything fell apart between us. My wife, Koya, have never been kind or lovely to me, we were just business partners. We never shared a common interest or ideal, but until we got our money back, at least it was bearable. After that point, our marriage was purely for show, and aside from when she asked me to attend to my marital duties, we had no intimacy. I got four children from her, after all, and even got them tested with Blood Resonance magic to be certain they were actually mine. I might be a little airheaded, but I’m not that naïve!” Both Jadon and Keyla became bright red, up to their ears. “Dad! Too much information! Stick to the facts, please. This situation is already embarrassing as it is, don’t add oil to the fire.” Jadon said, but the Count was inflexible. “To be able to help us, Lith needs to understand what kind of woman we are facing, or do you want to underestimate your mother again?” At those words, Jadon lowered his eyes and sat back down. Lith was really interested in the Blood Resonance magic, but he kept the question for later. Things were already confused enough already. “Where was I? Oh yes. Right after our households got back on their feet, Koya soon became restless. She was obsessed with us getting more titles, more annuities, more lands. To the point that she took part in the Court’s power games and intrigues, trying to make allies to weaken our neighbours and take over their lands. But after working hard for more than twenty years, I was content with what I had. Four beautiful children, a rich and prosperous household, a thriving County. I just wanted to slow things down and enjoy the life I had built, while expanding my power and influence through hard honest work instead of underhanded schemes. Off course she was furious, all her plotting was useless without my consent. After all, I wasn’t married into her family, she was married into mine. And being the one that did all the work I kept the biggest share of the profits. At that point, somehow, our constant arguing and mutual spite started affecting my firstborns. I don’t know if it happened because they were born when I was still too busy to give them the proper care and attention, or if they just got more from their mother’s side rather than mine. Only the gods know. My eldest son, Lorant, started taking for granted his status as my successor, neglecting his duties and doing nothing but drinking, gambling and chasing skirts. My second born, Lyka, had always been a problematic child. She was never content with what she had, always wanting more toys, more dresses, more jewellery. Nothing was enough for her. As my constant fights with her mother continues, she became angry with everything and everyone, throwing fits of rage for the smallest things. She started beating the servants almost on daily basis, I lost count of how many ran away from this house because of her. Between Lyka and Lorant, it was like there was a competition about who would make me monthly spend more money, trying to cover up their misdeeds and compensating their victims. I tried sending Lorant to all the military academies I could find, hoping that some discipline would straighten him up, but he always managed to get dishonourably discharged in a few months, if not weeks. My last resort was giving him the position of responsibility in the household, but he would either not attend at all, or show up dead drunk. But when I discovered that he had begun not only deceiving maidens with promises of marriage, but also taking them by force I decided that enough was enough. I publicly disowned him, stripping him of his titles and annuities, leaving him enough money to live an honest life, if he quit gambling, off course. I also told him that the next time he defiled a girl he would be judged like any other scoundrel, and pay for it.” At those words, Lith thought about Orpal for the first time in over three years. “That a*shole should be away for at least another couple years. Maybe if I decide to take part in this episode of ‘Game of Spades’ and we survive, I can have the Count trace and eliminate him for me. That would be nice. I hate loose ends.” After a short break for a glass of water, Count Lark continued his story. “My wife was outraged, for her Lorant’s crimes were just ‘boyish pranks’ that we should indulge and forgive. But it was the Lark household that he was dragging into the mud, he was throwing away my money with gambles and loan sharks. Not to mention that my reputation had become that of a corrupt and profligate noble. Even if somehow I didn’t have any decency or honour within me, how could I entrust my life’s work to someone that would dilapidate it in less than a generation? Have I ever told you why I appreciate magic so much? It’s because mages and nobles are so similar and yet so different. They both hold a power that allows them to destroy or save lives with a single word, to influence their surrounding just by being there. I consider magic superior, because a mage’s might come from study and discipline, and that means that he knows and understand the values of his power and the consequences of his actions. Nobles, instead, get that power as a birthright. They take it for granted, and some live their whole lives considering perfectly natural for them to be superior, a higher existence. That’s why so many of us end up abusing our status and authority. But I digress. After expelling Lorant from the family, Koya wouldn’t listen to reason, and neither would Lyka. She really loved her brother, and after he was kicked out, she became even more angry and violent.” The Count’s eyes turned watery, he had to remove his monocle to rub them with a handkerchief. “Have you ever heard about all those stories about nobles killing and maiming commoners for trivial reasons? Well, she turned out to be the living embodiment of all those stories, and when I discovered what she had done, the body count was already over a dozen! I had no choice but to disown her too, pleading the King for mercy and losing a lot of my accumulated merits in the process. Despite everything, she is still my daughter. My wife was brought to the brink of insanity, saying that it was all my fault, and so she left the house for good, returning to the Ghishals. At first, I thought that being apart would allow her to regain her senses and come back. After a while, though, I really enjoyed the peace and quiet, and hoped she would never return. But then I discovered that she had brought with her our disowned sons, breaching my trust with a blatant flaunting of the King’s law. At that point, I applied for the marriage to be annulled, otherwise after my death she could reinstate them as family members, if not even as heirs to the County. The annulment process would take a while, but I was certain to have settled that matter. In the following weeks, I started to feel weak and feverish, and despite all Genon’s assurances, my personal magician, I could tell that something was wrong. No cold ever felt like that or lasted so long. So I started skipping my meals in secret, eating only fruits that I picked up myself, and guess what? My symptoms faded away. Only then I remembered that Genon was from my wife’s side of the family. She had hired him personally, and so she did for more than half our staff. After firing everyone she had brought in the house, I hoped to be finally safe, but then even Keyla and Jadon fell ill. I would have never imagined she would harm her own children, just for not agreeing with her! At that point I was in dire need of a magical aide, but who could I trust? Competent magicians are hard to find, and at this point I don’t trust anyone anymore. Who knows who may actually be sent by my wife or one of her associates? That’s when I sent you the letter with the help of my personal secretary, a man that I know and trust from decades. I couldn’t call for Lady Nerea’s help, without her the whole district of Lutia would fall apart, not to mention it would be a sign of weakness. Who would entrust a County to a man incapable of managing his own house? Nana have more than once assured me that your healing skills are on par with hers, and having killed a magical beast, I’m pretty confident that you are already more competent than Genon, who graduated in a minor academy only thanks to his father’s money.” Lith closed his eyes, trying to assimilate all that information at once to decide his next course of action. “F*ck! I’m in a dead end.” He thought. “If I say no and he survives I’ll lose everything I built so far. If I refuse and he dies, not only all my efforts for making him into my backer will be for naught, but this wannabe Sersi strikes me like someone that after getting rid of her husband, will wipe clean all traces of his existence, and that includes me! Unless she is deaf, blind and dumb she is bound to know how much the Count has invested in me, that puts all my family in danger. And I definitely don’t want this Lorant guy come any close to my mother and sisters.” Feeling cornered, he had only one doubt. “I consider myself a good healer and hunter, your Lordship, but I don’t see how can I help, except by keeping you safe and healthy for the time being, off course. But that would be just stalling for time. If you don’t have a way to make your wife yield, it could go on for years.” “No, rest assured that it won’t. As soon as the marriage is annulled, she will not be able to make demands anymore about the Lark household. Unless I am sorely mistaken, by that time she will be knee deep in troubles caused by our disowned sons and for violating the King’s law by bringing them into her family despite being marked as a living shame. Her only way out is to get rid of me, Keyla and Jadon to make my will null and void, remain the only inheritor alive and restore Lorant and Koya status. I just need you to keep us alive until the King signs the annulment documents.” Lith’s mind was spinning at full gear, consulting with Solus to make sure to keep all his bases covered. “That can be done. But I have some demands that I would like your Lordship to agree with before accepting.” From their expression, it was clear they didn’t expect such request, yet the Count nodded without hesitation. “To be able to protect you, I need to move inside you house until the matter is resolved, right?” “But off course! That’s why you wear the family colours and crest. That dress identifies you with one of my personal aides, second in authority only to me and my children.” “Good to know,” Lith thought. “That explains why me and Jadon have almost matching clothes.” “And I am deeply honoured for it, but if I agree to help you, your wife could target my family too in retaliation. If I move in, I might need for them to come along, for their safety, and someone has to take care of the farm, or they will have nothing to return to.” Count Lark facepalmed himself. “Oh Lith, I’m so sorry for doubting your loyalty. For a moment I thought you were going to refuse. You are right, I missed this possibility. I will make them come here as soon as possible, they will be my honoured guests as well. I will send my sharecroppers to tend to your farm until everything is settled. Anything else?” “Yes. I need free rein within your household. If your wife still has insiders, if not spies still here, I will need to resort to unpleasant means to sort them out. We cannot expect them to confess out of the goodness of their hearts.” Count Lark took out a handkerchief, cleaning his already shiny monocle to ease his nerves. “Do you mean torture and interrogations? Do we really need to resort to that?” “As a last resort, but yes. Desperate times call for desperate measures. But it should not be necessary, I can easily disguise as your guest while keeping a low profile. After all no one knows who I am, except the butler.” The Count started coughing up loudly, Jadon and Keyla looked at each other, before turning towards Lith. “Actually, everyone knows who you are.” Jadon said with an awkward smile. “Well, but that doesn’t mean they know what I am capable of.” When he saw them exchanging another look, while the Count kept coughing non-stop, Lith felt compelled to ask: “They don’t, right?” Keyla cleared her throat before standing up, prompting him to follow her. “A picture is worth more than a thousand words. I think you need to see how you are depicted in the Painting Hall.”
global_05_local_5_shard_00002591_processed.jsonl/18568
[Sexual Pill] Pills To Help Ed | Escola da Inteligência On this page [Sexual Pill] Pills To Help Ed | Escola da Inteligência On this page Pills To Help Ed. As for Love in Ten Cities , the box office in a single day has fallen Male Enhancement Fail Drug Test below 10 million, Pills To Help Ed only more than 8 million. Yesterday there was only one lineup of this movie in Pills To Help Ed our cinema, but the tickets were sold out. Even if there is a big gap between Pills To Help Ed Pills To Help Ed Viagra the two sides, one car How Long Does It Take For Nugenix To Work or one horse is not bad. Ghost Blowing the Lantern The name is pretty good, and it feels very spiritual. Because Pills To Help Ed of this, he can make more money in post production by himself. It has risen to almost 50 million before the rate of increase slows down. As the chief planner of the annual college entrance examination, his Weibo has been closely followed by high school teachers and students. Fuck off Wang Huan finally understood what Wei Shuo was Over The Counter Female Enhancement Pills thinking, and he definitely wanted to use his guise to go to the poetry exchange meeting to pick up Professional Pills To Help Ed Am I Asexual Or Just Low Libido girls. Attendance against the sky Pills To Help Ed The news also shocked the entire network. Please Male Enhancement Dr don t be lucky, because I have recorded the evidence throughout your Pills To Help Ed Pills To Help Ed gambling agreement this time and asked the notary to testify. Hu, he Pills To Help Ed really couldn t Pills To Help Ed get interested in playing chess Pills To Help Ed What Was Viagra Originally Intended For with the opponent. Because most romance Pills To Help Ed movies don Pills To Help Ed t need vast scenes Pills To Help Ed or excessive special effects, the biggest cost is Pills To Help Ed the cost of actors. Jade Yu s eyes Pills To Help Ed Pills To Help Ed were bright Feifei, you Pills To Help Ed Professional can be here with Wang Pills To Help Ed Huan first. But from Sildenafil Make Your Penis Huge now on, Lin Wei is afraid that he will have to step aside. However, the director of the party raised What Is The Best Male Enhancement Pill Available questions and felt that Erectile Dysfunction Hypnosis Jiang Fei s song It s too focused on love, Pills To Help Ed and it doesn Pills To Help Ed t match Tcm Male Enhancement Pills the Mid Autumn Festival s reunion atmosphere. After the process, around 11 o clock in the night, Ghost Blowing Lantern was promoted to the homepage of Weibo reading. Huoyan sighed again Pills To Help Ed Double line narrative Montage editing technique Wang Huan is trying to make the sword go slant After all, in domestic movies, Penis Growth Videos few people use this technique because it is not good A Blood Pressure Medicine And Erectile Dysfunction movie will be ruined if you are not careful. We would like to ask Is My Libido Low you to write a song about Magic City as a promotion song Do Over The Counter Ed Pills Work for Magic City Tourism. That s why these stars can safely and boldly bet against Wang Huan. There are very few heavy metal rock music in China, and there are no classics, because this Pills To Help Ed kind of music Prolong Male Enhancement Gnc is rarely accepted by the masses, who think they are too Pills To Help Ed black and alternative. Sure enough, the upper beam is not straight and the lower beam is crooked, Can You Really Increase Your Penis Size a group of neuroses He sneered. When Wang Huan knew When all these things happen in life, I have mixed feelings in my heart. Hu, he really couldn t get interested in playing Pills To Help Ed chess with the opponent. Asked to meet, because Viagra Supplement he felt that some words were not clear on the phone, Pills To Help Ed and only speaking in person is Pills To Help Ed Pills To Help Ed the best. Ding Most Effective Pills To Help Ed Cheng Sildenafil Make Your Penis Huge doesn t know what medicine Wang Huan s gourd sells, but now he is asking for help, Gnc Health Products and the young man in front of him does not play cards every time, so he can only follow the other Pills To Help Ed party s Buy Ed Pills No Script wishes. When they wanted Pills To Help Ed to make an appointment again, they discovered that Gao Zeyu and Wang Huan had signed a harsh contract, which made Pills To Help Ed them cancel their plan to make Pills To Help Ed an appointment again. Do you know Pills To Help Ed how famous you are at Lin University Now in your Pills To Help Ed dormitory, Natural Penis Enlarger countless people come to visit and Primalx Erectile Dysfunction take pictures every day. Of course, celebrities who have a Pills To Help Ed good relationship with Wang Huan, Zhou Xuehua, etc. After seeing Wang Huan coming in, Pills To Help Ed several people recognized him. The more I watched, the more scared, the more scared I became, the more I wanted to see it. Wang Huan, is this ghost obsessed There are so many brokerage companies Pills To Help Ed Viagra waiting Pills To Help Ed for crimes at one time. Dear drug army, Peng Professional Pills To Help Ed Ping is live streaming, do you want to go and make Pills To Help Ed a mess This girl actually dares Professional Pills To Help Ed to scold the Poison Pills To Help Ed King, it is too much. A shining star breaks through the sky from the depths of the starry sky, with unparalleled power, and Professional Pills To Help Ed after blooming with brilliant brilliance, Pills To Help Ed it Partner Health Protective Sexual Communication Scale is fixed in the center of the picture. Fuck What a special labor and management happened to be at home tonight, and couldn t sleep because of fear. If it was someone else, maybe Ding Cheng would gamble without Pills To Help Ed hesitation. He smiled and said, Wang Huan, you just remember to call my counselor Don t worry, after a Pills To Help Ed For Sale summer vacation, You are almost becoming the Gold Max Supplement pride of Lin Nitric Oxide Penile Enlargement University. Wu Sex Drive Enhancer Hong took the phone and scanned it a few Pills To Help Ed times, and his face turned dark. Isn t the Huan brother s movie going up for death At least Pills To Help Ed it will be released in November Don t you have any I noticed, the Jiefangbei behind Brother Huan Chongqing A reporter broke the news that Brother Huan was shooting a movie in Chongqing a few days Pills To Help Ed ago. I ve heard the Sildenafil For Erectile Dysfunction school leaders say that someone has come to the school. I ll just say, since Huan can write ancient poems Pills To Help Ed like Pipa Pills To Help Ed For Sale Xing , how can Pills To Help Ed his knowledge in lyrics and Pills To Help Ed music be Collagen Male Enhancement possible It will be shallow. Wang Huan My hatred Pills To Help Ed for Pills To Help Ed you has been endless Wang Huan, you Pills To Help Ed What Are Sexual Desires Pills To Help Ed have enough Can you not come out to harm us In the past summer vacation, I have Pills To Help Ed been tortured by Pipa Xing so Sildenafil Make Your Penis Huge much, now that I have Pills To Help Ed just regained my Sildenafil Make Your Penis Huge vitality, you gave Male Enhancement Pills For Men Over 70 me another song Shui Tiao Song Tou Senior high school students, everyone unite and let the poison Pills To Help Ed - Pills Sexual Pills To Help Ed king stop poisoning The Pills To Help Ed Chinese Poetry Club Cultural Pills To Help Ed Festival, when everyone rushed over, the [Sale] Pills To Help Ed celebration had already started for more than 20 minutes, but because there were a few singing and dancing programs in the early stage, I didn t miss Enhancement Supplements any exciting content. Chapter 319 I m Pills To Help Ed a Singer first update, please subscribe when Little Blue Pill V 48 12 Wang Huan said there was a way to save the ratings. Wang Huan immediately patted Andro 400 Ingredients his chest Professional Pills To Help Ed Pills To Help Ed and said, Low Libido Affecting Relatinoship Pills To Help Ed It Sexual Promiscuity And Mental Health s necessary. After thinking about it, I sent a message to Qiqi Happy Mid Autumn Festival. Soon, A group performer stood up tremblingly Director Best Supplements For Ed Circulation Wang, I m sorry, I Go to the drama and get the salary, get out Wang Huan interrupted him mercilessly. Perhaps it was the newlywed Yaner, and the villagers understanding of her and Liu Low Libido Camrese Xinfeng s Proven Womens Sexual Enhancement Lubes affairs made Jiang Muyun more dazzling now than Chinese Medicines For Erectile Dysfunction last time. Brother Huan, it s not that I don t support Way To Enlarge Penis you, but I am really not interested Best Daily Male Enhancement Pill in your movies. How about waiting to let the other 10 Pills Organic Hebral Libido Erection Male Enhancer Sex Pill 48 Hour party Soon, the chess game began. This guy had been working in the dormitory Pills To Help Ed Professional Pills To Help Ed by himself throughout the summer vacation, and it was probably suffocated. But it was Wang Huan s natural emotions that made people feel deeply moved. The Sec Pills sound of Ding Dong s music is heard, and it makes people feel very peaceful. After the gamblers compensate the movie tickets, It will lead to higher box office. As soon as he got off Pills To Help Ed the plane, he Pills To Help Ed took out his cell phone and made a call. The life I want to bloom is like standing on the top of a rainbow, like walking through the shining galaxy with power beyond the ordinary Deng Guangyuan s Pills To Help Ed singing sounded through the entire Qiansheng Square with strong belief and strength. If she has an ugly body and face, you praise others for their temperament. LloydsPharmacy Online Doctor This service operates in the United Kingdom only LloydsPharmacy Online Doctor This service operates in the United Kingdom only Visit IE Online Doctor Continue with UK service
global_05_local_5_shard_00002591_processed.jsonl/18569
Example of economic analysis paper Literary analysis paper. examples of economic models include all that glitter is not gold essay the classical model and the production life experiences essay examples possibility frontier. economic belongs to the type of sciences that are based on loads and loads of data, example of economic analysis paper statistics and calculations. anti-aircraft guns and bullets are complementary goods; an increase in the price of one will result in a decrease in demand. consider, for example, an employer’s decision to hire a new worker. an insider-outsider search theoretic model of the labor steps write essay market. the analysis aims to determine how what is migration essay effectively the economy or something within it is operating. example of satire essay microeconomics renaissance research paper is example of economic analysis paper an area of economic science that is based on a robust example of economic analysis paper body of scientific research jun 25, 2018 · a policy analysis paper is an effective way to dive into an issue that is ripe for college admission essay public discourse or is deserving of attention. national geographic essay unit 4 overall, example of economic analysis paper this academic paper is often performed to discuss the main idea of a literary work sep 19, 2018 · creating my diet essay a critical analysis essay outline. markets form a very fundamental factor in ensuring economic balance. economic impact analysis 30 35. it is also common to see graphs which contain rate my essay free the write my essays supply and demand curve. 9 thoughts on “Example of economic analysis paper 1. Yes, you are right buddy, regularly updating web site is truly necessary for SEO. Nice argument keeps it up. 6. Hahahahahahaha, this politics related YouTube video is in fact so funny, I liked it. Thanks designed for sharing this. Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/18612
Get ready for 2021. Save $35 with code BYE2020 How to use the Presets sheet to select the baseline for your model. The Presets sheet contains a few common setups of the conversion funnel on Get Started for different business types. I built it to help provide guidance and information on how to use the conversion funnel on Get Started; there is a lot of power, optionality, and extensibility prebuilt into the structure. Despite the defaults, this is not focused on subscription or digital business, and simply by changing the labels, it can fit a wide variety of business types. The model can be used to model a wide range of businesses without structural edits, simply by using the inputs, and Presets is built to help people understand how to use the functionality. Presets is included in the Standard Financial Model and all Standard Model variants (SaaS, Ecommerce, etc.). The presets functionality is the driver used to create the Standard Model variants, and you can flip the Standard to one of the variants simply by selecting a different preset. Presets is unnecessary for the Starter Financial Model, as there is no prebuilt revenue structure used. How to use Use the dropdown in D4 on the Presets sheet to select which one of the presets, from the columns to the right, to use in the model. The labels, starting growth, conversion, retention, and revenue assumptions will all change automatically. The COGS and SG&A percentage of revenue assumptions are used to create forecasting drivers that you can then use in the model for forecasting any expense item. How it works The columns define a number of common setups for different business models. The labels and common assumptions for each business model is defined in their own column, and then the model will use the one selected in the dropdown in D4. The inputs match the labels and growth, conversion, retention, and revenue assumptions covered in Revenue Model. Common Modifications There are a couple common modifications: • Editing a business model: The assumptions used for each business model can be edited on Presets or directly on Get Started, overwriting the assumptions pulled from Presets. There is nothing wrong with typing in the assumptions directly on Get Started, just be aware that the dynamic functionality will no longer be used. That is often not an issue, and you should edit the assumptions in the place that best fits the user expereince you want with the model. • Adding busines models: Simply insert a column in between the first and last column, and then type in the new business model settings you want to use. You can then select it from the dropdown in D4. • Scenarios: Perhaps not obvious, but the structure can be repurposed to create a set of scenarios, and then use the dropdown to select which scenario is used in the model, as this structure is essentially a data table that can store values for a number of scenarios. Simply change the labels for the business models, rename them as the scenario names you want to use, and then edit the inputs. You would likely want to assume the label setup is exactly the same for each scenario, but vary the growth, revenue, retention, and revenue assumpions. And any variable from the model can be added into the table of presets and used in a scenario. Questions, contact me.
global_05_local_5_shard_00002591_processed.jsonl/18613
La musealización del Castell de Castalla (España): la realidad que pudo ser y no será Between 2009 and 2017, the Castalla Castle Heritage Site Social Regeneration Project was executed with the aim of managing its entire cultural and natural heritage. Castalla Castle was one of the basic pillars of this project, and therefore its musealisation began in 2016. In this way, the fortification was equipped and included some contents that made the visit more attractive. The abrupt termination of this social regeneration project made it impossible to continue with its musealisation, as originally planned. Thus, this paper will explain the proposals that were intended to be carried out in three parts Palau (Palace), Pati d’Armes (Lower Ward) and Torre Grossa (Large Tower)– in order to enrich the limited offer of musealised fortifications in the province of Alicante and turn Castalla Castle into a reference.
global_05_local_5_shard_00002591_processed.jsonl/18614
More maps, game modes and a option to select the game mode we want to play • Would be nice if we have more maps and more game modes. U could put a mode of killing teams and the team the kills more will win the match and could have more the 2 teams on the match. And could have some game mode of planting a bomb or something like that to defuse it. And the last thing is put a option to the player select which kind of game mode it will play cause right now its is random.
global_05_local_5_shard_00002591_processed.jsonl/18615
Search the Community Showing results for tags 'max32'. • Search By Tags Type tags separated by commas. • Search By Author Content Type • News • New Users Introduction • Announcements • Digilent Technical Forums • FPGA • Digilent Microcontroller Boards • Non-Digilent Microcontrollers • Add-on Boards • Scopes & Instruments and the WaveForms software • LabVIEW • FRC • Other • General Discussion • Project Vault • Learn • Suggestions & Feedback • Buy, Sell, Trade • Sales Questions • Off Topic • Educators • Technical Based Off-Topic Discussions Find results in... Find results that contain... Date Created • Start Last Updated • Start Filter by number of... • Start Website URL 2. Hi, I've build a board using the pic32MX795L, the same as the Chipkit max32, (I have original Max32 and uC32.) I uploaded bootloader with Microchip Snap ( This is my setup: Arduino 1.8.8 Chipkit core Ver 2.0.6 Windows 10 64 bits FTDI driver version I am having an issue with max32 clone, I got error "No target found." As I can program my uC32 and Max32 without a problem, I think Arduino and Chipkit core are not the problem. Also, I can see PIC32 Tx and Rx with Saleae Logic; there is some data at PIC32 Rx pin, but no 3. Hi all, I have been using MAX32 in bare-metal mode quite a bit, and I wrote some scheduler code for it. The code also does buffered debug printing over USB, and some basic error handling. I use this as start point for projects where I want very predictable timing. I find MAX32 very useful for this. The code is on Github here : and there is a write up at my website here: This mighty make a nice start point for anyone that has been using MAX32 as an Arduino bu 4. I have at least 4 older chipKIT Max32s and a few Network shields for Ethernet and the CAN buses. Can I use the older Network shields on the newest Max32s from Digilent? Also, I will be creating my own shield soon, which will have 2 x CAN, 1 x RS485, at least one dsPIC for 2 x QEI communicating serially to the Max32, and use at least 4 PWMs, Are there differences in the shields? If I design a shield for the older chipKIT, will it work on the newest Max32? Is there a change log for the changes between the Max32s? It would be nice if the outside headers are in the same location and 5. I am new to diligent max32 chipkit and max32. I have max32 and max32 chipkit with pickit3. Could you tell me the best starting point to learn programming on this embedded devices? I am interested to know about MPLABx and MPIDE. 6. Howdy. I have what I think is a fairly basic question: Which (non-FPGA) processor boards support Pmod modules? Is there any chance to see a table that shows each of the current ARM and PIC32 processor boards down a left-hand column and then the quantity of each of the Pmod ports (of each different configuration) on the middle of the chart? Thanks 7. I am getting a No Target Found message in the Arduino IDE when compiling and trying to load a sketch into a Chipkit MAX32 board. Is this a known problem? is there something I need to change / do to get the Arduino IDE to find the board and load the sketch? Any help with this issue is most appreciated. Regards.....Len 8. Hi Everyone, I am trying to figure out what is the pinout for the push buttoms, I used 4,33,36,37, and did not work, I also used 4, 78, 80 and 81 due to a reference from my professor and stiil did not work If you guys can help me out will be great thanks ESSo 10. Monics Ethernet shield 11. hi, We have been happy to use chipkit max32 for quite some time now. Now we wanted to experiment a design that uses parts of the max32 circuitry. It turned out that when we have the crystal oscillator FQ7050B-8.000 (*1) connected to PIC32MX795F512, it uses an internal oscillator instead, and it runs slow. The model for the crystal oscillator is the one specified in chipkit schematics file (*2). If we replace it with the physical oscillator circuit removed from one of our chipkit max32 boards, controller performance becomes just as fast as in max32, and it is using the external oscillator 14. When I connect the Wi-Fi Shield to the Max32 board and print out the state of the pins on the Wi-Fi Shield Vs the I/O shield I get completely different reactions, even though they connect to the same exact slots except for A6-A11 which aren't being used on the Wi-Fi shield & are left unconnected. With the I/O shield the pins are all low (as they should be, there is nothing in the code to make them go high. With the Wi-Fi Shield, & the same code, there are 3 pins that light up for no reason (the ones associated w/ Btn2&4 & SW1 on the I/O board. What could this be? 16. Are Analog Shield and Network Shields are compatible with the chipKIT Max32 at the same time? If so are there any special considerations? Thanks you for any help you can provide. 17. A customer has asked us the following question: " I recently purchased a copy of Labview home bundle and Im trying to connect through the USB/serial port to a Chipkit Max 32 in order to download the LINX firmware wizard I have followed the instructions in the tutorials and all packages I believe are downloaded. the latest version of MPIDE and MPLAB are also installed. when using the wizard it does not recognize the com port the device is connected to COM4 and the modification has been done as per the tutorial to 1ms latency time. all it displays is ASRL1: and cannot be changed. 18. Hello: I am trying to better understand the functionality of the Chipkit Max32 board with respect to the analogWrite command. I have been testing pins A4, A5, 21, 23, 44 and 45 using the anlogWrite function. I am testing each pin separately, i.e. one at a time. I have the pin connected to ground through a 180Ohm resistor and monitoring the voltage across the resistor using an oscilloscope. I am using the following code changing the pin number in the analogWrite for each pin: void setup() { Serial.begin(9600); } void loop() { for (int i=0;i<256;i++){ analogWrite(4, 19. Hello: Where can I find information which describes the functions and capabilities of the pins on the board? I have the documents from the website, but do not understand the terminology such as AERXERR/RG15 or ECRX/SDA2/SDI2A/U2ARX/PMA4/CN9/RG7. I understand each term, ECRX, RG15 are specific functions, but where can I "decipher" these functions? Thank You 20. Hello all This is related to the current hardware: Chipkit Max32 with Network Shield. Issue: Xively library files will not work with chipkit max32+ethernet shield. I have been suffering this change for a while, the MPIDE 2015 release got botched with the arduino update. I had to download the 2015 test release or rely on the totally functional 2013 release. Currently using the MPIDE 2015 test release. So, later on, getting the Xively library files proved to be difficult to utilize, errors on top of errors. Other option was to use the chipkit-core library files also avai 21. I generated a code for my USART on a chipkit Max32 board using MPLab Harmony based on the tutorial given at this link The code compiles well and uploads to my board but when I try to interface it with my laptop it keeps reading 0xFF on the RX buffer and even when I tried sending a character (e.i: 0x20) the terminal on my computer won't see it. I tried with different terminal emulators (YAT, Realterm), I also downloaded the FTDI driver from but nothing seems to fix or change a thing abo 22. I am working with the MAX32 board and want to control LD5. The schematic shows that the control for this LED is connected to RC1. However, the Reference guide (and the Excel pinout table show this as not assigned to a chipKIT pin number. If I were working with XC32 and the MPLAB X IDE, I would simply write TRISCCLR = 0x01; and then use LATCSET and LATCCLR to turn the LED on or off. What are my options if I want to stay in the Arduino IDE format? . 23. Hi, I bought a Max32, and need to find out which one is pin 3 and which one is pin 5. Is there a spread sheet available for all the pin names please? Thanks, Jack 24. Hi, I need to input a 50 ome 1 volt sine wave to Max32 under External Clock mode. Does Max32 only take square waves? Will this do any damage to my equipment please? Thanks, Jack 25. Hi, Does anyone know whether I can replace the crystal oscillator in Max32 with some other oscillators please? I have a 10 MHz master clock, and want to use this clock in the microcontroller. Is it easy to replace the oscillator? Or do I need to unsolder something? Thanks, Jack
global_05_local_5_shard_00002591_processed.jsonl/18616
1. Forum 2. > 3. Topic: French 4. > 5. "J'habite sur l'autre rive." "J'habite sur l'autre rive." Translation:I live on the other bank. March 31, 2018 Wow, somebody needs to pay more attention to the answers in this exercise. I translated as "I live on the other side of the river" and it was listed as incorrect, showing that it should be "I live on the opposite side of the river," while the example above lists as the translation "I live on the other bank." So who's in charge here, or is everything just done by machine? Wrong place but what is the difference between "le fleuve" et "la rivière"? Are they interchangeable? "Un fleuve" is a river that flows directly into the sea. Any other river is "une rivière". So Le Danube is un fleuve because it flows directly to the sea (Black Sea), meanwhile, La Loire is une rivière because it does not flow directly to the sea, but to the ocean (Atlantic). Am I right? La Loire est le plus long fleuve de France. Le Danube est le deuxième fleuve d’Europe. La Volga est le plus grand fleuve d'Europe. Learn French in just 5 minutes a day. For free.
global_05_local_5_shard_00002591_processed.jsonl/18617
Jump to content Gibson Brands Forums • Content Count • Joined • Days Won L5Larry last won the day on October 31 2011 L5Larry had the most liked content! Community Reputation 202 Good About L5Larry • Rank Advanced Member Profile Information • Gender • Location St. Louis, Missouri Recent Profile Visitors 1. L5Larry 335 Finish If you're building a FAKE Gibson, just exactly why are you asking for advise on the official Gibson website? 2. There's a "Catch 22" here. To produce high wattage (in a tube amp) requires a large heavy transformer, and for speakers to handle that power requires large heavy magnets. That's were the weight of a 100+ watt combo tube amp comes from. The only difference in weight of a high power 212 vs a 210 is basically a little bit of cabinet wood. 3. I know the hard case versus gig bag debate will rage on forever, but I made a recent observation that I found pretty interesting. I do work here in my hometown for an organization called "Jazz St. Louis". On the main floor "storefront" they have a nightclub/restaurant presenting mostly national and international jazz artists, but also local professional musicians and student groups (high school and college/university). Upstairs they have an "education" department that includes a recording studio, class rooms, rehearsal rooms and a music library. Yesterday was a long day on the job as I had an afternoon rehearsal upstairs, and was then behind the soundboard for a benefit concert in the club in the evening, presenting five different local jazz bands, to benefit the education department in honor of the late founder of MaxJazz Records. During the day I saw no less than 9 guitar/electric bass players come and go, both student and professional. EVERY single instrument was being carried in a backpack strap gig bag. Not a hard case in sight. It's not like I was counting, or even consciously paying attention, but sometime during the night it just hit me. Just reporting an observation. 4. I owned a 1964 Firebird for 20 years ('75-'95). My other guitars at the time were a Strat and an LP, so the Firebird was WAY different in sound, feel and looks. I was into Johnny Winter and Dave Mason at the time, so I had to have one. Man that thing was LONG, point-to-point they are longer than a P-Bass. At that time I probably wasn't good enough, or smart enough, to be bothered by the ergonomics compared to the Strat and LP. All I knew was I looked REALLY COOL playing that guitar. The Firebird never did displace the LP as my #1 Rock & Roll Gibson, and I think what eventually soured me on the guitar (and it took almost 20 years), was the neck dive and thin sound of the mini-humbuckers, not really just it's shape and size. At the time I finally sold it, it was setup specifically for open tuning slide.... and then I realized I sucked at playing slide. 5. The guitar looks to be a "Standard", not a Custom, and with that flame-top, it also does NOT look like anything I ever saw in 1976, or from that era. I never saw anything but plain-tops during that time. A set of detailed photos, including the back of the full headstock, and a closeup or the serial number area, should tell the tale. 6. There are a bunch of "banjophile" websites out there, just like the guitar sites. Older Gibson banjo numbers are pretty well documented. Here's one site that shows the 4-2522 number to be from 1954, although the "157" is not specifically listed. http://banjophiles.com/SerNumData/BowtieEraGibsons.htm Further internet research should yield all the answers you're looking for. 7. Ah, so it is designated a "P".......SCHWEEEEEET! I love to get my greasy little paws on that guitar. What strings are you using on it? EDIT: Is that a Nashville or Bozeman built guitar? 8. I would use and external tooth lock washer on the inside, just under the wood. http://www.homedepot.com/p/The-Hillman-Group-4-Stainless-Steel-External-Tooth-Lock-Washer-70-Pack-43798/204794826 I like my jacks to be flush with the wood on the outside, so this lock washer on the inside would be in conjunction with a clinch-nut and/or flat washer. Then you have to be able to tighten it all up without twisting off the wires. I use a pair of large curved jaw hemostats for this by grabbing the base of the tip spring contact, either through the f-hole, or through the plug hole itself. Tighten outside nut securely (nut driver, or open-end wrench depending on where the clamp is), but not too tight. 9. Wow, I'm not sure I ever knew yours was an acoustic L-5C. My "acoustic" archtop is the L-7 that you made the bridge for, thanks again. My DREAM acoustic archtop would be a 1948 L-5P. 10. Yep, also caught it last night. The host was fantastic. I had no idea who he was (still don't), but even my wife's interest was held by the script and the way it was presented. I made the comment that this guy was obviously not just another talking head, and clearly knew the technical and musical aspects of what he was explaining. Just enough tech info for me, just enough musical info for her. Highly recommended viewing. As a companion read, you should check out Geoff Emerick's book; "Here, There and Everywhere: My Life Recording the Music of the Beatles". He was George Martin's recording engineer at EMI for the Beatles from about "Rubber Soul" on. 11. On the Northern trek, if you cross the Mississippi River at, or around, St. Louis, you're in my neighborhood. If you cross further South, but head North on I-55, you may still skim my area (Southwest of St. Louis city proper). The least I could do is buy you lunch. If you wanted to take a couple of hours for a "whirlwind" tour, there's plenty to do and see catered to your specific interests (art, architecture, history, science and technology, zoology, sports, music...). St. Louis to Kansas City is a four hour drive straight over I-70. 12. I did the exact same thing years ago, but had to re-machine the keyed slot in the buttons to fit the tuner shafts of the unidentifiable "Gibson" branded tuners. Probably the Imperial/Metric thing. I hope yours were a direct replacement, as the mod was very tedious and time consuming. I then took it one step further with a "vintage" style TRC: After making many contacts with custom luthiers, Gibson and Gibson warranty dealers, to no avail, I had to hand carve my own bridge from a chunk of ebony I got from a violin maker friend. It took two trys to get it just right, as I first ASSUMED copying a 40's Gibson bridge would then intonate properly,..... WRONG. 13. Yes, it's very easy. There are two foolproof ways. 1. Make a pencil rubbing like you did in grade school: Take a thin sheet of white paper. Hold it tightly in place over the SN area. Get a wooden pencil with a lot of lead showing. Rub the side of the pencil lead across the area with medium pressure to reveal the number. 2. Take a penlight type flashlight and shine it at a very shallow angle across the SN area from the side. This will create a shadow area in the indentations. Shining from a few different angles and sides may be necessary. Other information: From the photos posted - I see no evidence of refinishing, and the shallow serial number is not definitive evidence of such. Sometimes the numbers just don't get impressed very deeply. One you get the full and correct serial number, it still will most likely NOT help you put a mfg date to the guitar. Gibson SN's of this era have no rhyme or reason, nor is there a sequential "list", only approximates. Make sure to look for a 6th digit to the serial number. A 5-digit SN puts it an even darker gray area of dates. In any, and all, cases above, the accepted way to put a mfg date to Gibsons of this era has become the potentiometer codes. The pots will have a 7-digit code number on the back usually starting with "137". The following 4-digits are the date code for the manufacture of the potentiometers. It is generally accepted that the guitar was made within 6 months after this date. The mfg/date code is read as follows: MfgYyWw Mfg = Manufufacturer. "137" is CTS Corp. Yy = the last 2-digits of the year of made. Ww = The week of that year, 01-52. Let us know what you find out. 14. Buc, You're hitting WAY too close to home now. I spent the year of 1981 living/working in Waxahachie, and partying in Dallas. In 1980 I was working in Tyler, TX. There is certainly something to say about "Texas Girls", but... The video of this song didn't show your usual "light touch". I'm sure this is something you'll have worked out before the open mic night. 15. Here's one I'll be playing with the Big Band next week: • Create New...
global_05_local_5_shard_00002591_processed.jsonl/18622
Player shop mismatch So the player shops, on same settings on same ship aren't showing the same results to different players alt text On the left is me and my screen doing a search in the shop, on the right is a live discord call with my friend (on second monitor) doing the same search at the same time with different results. Personal Shop Item Name Matching search has a cache based on items you've seen. (It's a lower cache than JP for some reason.) You can still search for an item if you type the name of the item all out and press the search button at the bottom of the window instead of to the right of the text box at the top. The search button at the top is to search for names that match the text you put in.
global_05_local_5_shard_00002591_processed.jsonl/18626
Jump to content Sign in to follow this   Week 9: Miami Dolphins (4-3) @ Arizona Cardinals (5-2) Recommended Posts Join the conversation Reply to this topic... ×   Pasted as rich text.   Paste as plain text instead   Only 75 emoji are allowed. ×   Your previous content has been restored.   Clear editor Sign in to follow this   • Create New...
global_05_local_5_shard_00002591_processed.jsonl/18629
1. LtChuck SDS 100 questions... power and decoding Contemplating acquiring a SDS 100 and have a few questions. Will the unit power up upon power being supplied from the external power input. I currently have a RS Pro 106 that powers up and starts operating when dc power is applied from a switch on the vehicles power control center (for... 2. S BCD436HP: How to know what DCS turn off code to use? I want to scan a system i have done in conventional analog. I want to set a DCS code so i can scan the system with the squelch wide open but only still hear the transmissions and no white noise. I have gotten something called “DCS Turn off” in the log a few times, but i wonder how i actually... 3. viper1833 Modern CB Upgrades Just a curious question to all who are interested in discussing. How many think its time for the FCC to change some of the rules on CB radio, and allow companies to start adding some modern features to 11 meters. Currently I use CB radio still, my wife, and brother use them for personal use... 4. T Motorola BPR40 Factory Default Settings Hello! I recently acquired a Motorola bpr40, but it cannot be programmed. However, I do have other radios that can be programmed very easily, so I reset the bpr40 to its factory default frequency. Do any of you know the default DCS/CTCSS codes for the bpr40? 5. M Motorola Radios and DCS Code 325 I have come across a problem where the NIFOG lists the code of 325 in the valid DCS codes list, but Motorola radios don't seem to allow it to be programmed into it. I am working on XTS and XTL series radios, but can confirm that the issue exists with APX series radios too. I am trying to... 6. radioboy75 BCD396XT: "analog only" with DCS passing digital audio My local department uses both analog and digital on the same channel. I would like to program both "digital only" and "analog only" into two separate channels. The "digital only" channel works fine, only passing decoded digital audio. But the "analog only" channel, even though I have it set... 7. M TK-7160 DCS Question I need to update channels in a couple of volunteer agency TK-7160's. We have Version 1.01 of the Kenwood Software. Several channels that we need to program have changed from no PL Code to a DCS setting of 156. In this version of the software, there are 2 options marked D156I and D156N. I'm not... 8. C Kenwood TM-D710A DCS Programming question, Please help I just recently purchased a Kenwood TM-D710A from my buddy and i am VERY happy with it! I love this radio but our repeater uses a 025-DCS to access and 205-DCS recieve and my problem is that i can't figure out how to get it to encode ONLY DCS... My FT-60 has a feature on it called split and it... 9. M APCO P-25...Do I need to set P25 NAC or CTSS/DCS? Hello all! I just recently set up a new BCD396XT to monitor the newly activated Dublin/Delaware/Worthington OH Police/Fire/EMS/City... Question #1: I see there is a function in one of the scanner menus for choosing either P25 NAC or CTSS/DCS. Are these settings I need to be concerned with... 10. WX9RLT CTCSS and DCS codes for the Rockford area I thought I would make a thread about CTCSS and DCS codes in the Rockford area. I am running a BC898T scanner that can quickly search for these codes, and this is the list that I have came up with so far (1 hour). Please feel free to add to the list. CTCSS and DCS codes for the Rockford... 11. N PRO-164 CTCSS Question On my PRO-164, if I program a CT code and it is incorrect, will it prevent me from hearing anything on that channel? 12. N PRO-164 CTCSS or DCS Hello. I'm pretty new to the scanning world. I'm using a PRO-164 and I come seeking knowledge! How do I know if I should use CTCSS or DCS for a frequency? It seems that for most of the Police or Fire frequencies if I use CTCSS, a code will show up on the display and when two parties are...
global_05_local_5_shard_00002591_processed.jsonl/18631
Texas-Dallas and Ft. Worth Wedding highlight video We got our wedding video this weekend and below is the link for the highlight if anyone is interested in seeing it.  I am a little sad our vows are not in it but the wind was pretty crazy so that is why they were left out. Re: Wedding highlight video This discussion has been closed. Choose Another Board Search Boards
global_05_local_5_shard_00002591_processed.jsonl/18632
Question DX4860 - 8GB Memory can't work May 17, 2019 I want to upgrade memory and other hardware for my DX4860-UR28 desktop. Here is the current configuration: Desktop = DX4860 CPU = Intel Core i5-3330 Existing memory = 2 x 4GB DDR3 (per CPU-Z it is 800 MHz), while the part number says it is 1600MHz PC3-12800) Motherboard = Gateway IPISB-VR GPU = Intel HD Graphics Card OS = Windows 10 64bit I have already replaced storage with SSD. I just bought 2 x 8GB DDR3 1600MHz PC3L-12800R for my computer but I get nonstop beeps (with no breaks) when I install the RAM either in combination or alone with the existing memory. I can't get to the CMOS setup. I was wondering is it a compatibility issue or there is a limitation on the max memory per slot. I am also planning to upgrade the CPU to intel i7-3770. Ebay seems to have few cheap used options <$100. Do I need to watch out for anything buying the old processor from ebay? Any recommendations for upgrading the GPU. I run three monitors with multiple data stream for trading, I am planning to add more monitors. Thanks for the help!
global_05_local_5_shard_00002591_processed.jsonl/18633
No announcement yet. Climbing / Running Along Steep Surfaces Based On Movement Speed? (Networked) • Filter • Time • Show Clear All new posts I'm trying to implement a mechanic where as long as the character is moving at a speed over X they're able to run along any surface. Not exactly that freeform, but that's the scope of the problem. Additional limiters I'll add are things like "Not if the difference in angle is too high" and "Only on surfaces > 130 degrees for X seconds" ; likely by slowing the player down over time. I've implemented simple wall-running in a couple of test projects but those were on planar walls, on-tick raycasts, and by disabling gravity for the duration. It seemed very hacky. I'm aware that just about any solution to this problem will likely require C++ implementation and I can probably handle it. The major hurdle to overcome (in theory) is that I don't want to need to replicate this at a crazy high rate or tax the cpu too hard. Similarly, I want to enable climbing along just about any surface as well - similar to Breath of The Wild. I've got a bunch of resources lined up that I'll be chewing through to see if I can solve this on my own but am curious as to whether this is already a "solved problem" and Google has failed me. Optimizations I'm already somewhat aware of: 1. Going fast in a networked game is asking for problems. I'm reeling this in by not allowing the player to change direction very quickly without interrupting the mechanic (and the characters move at relatively normal speeds outside of this "dash") 2. Doing a per-vertex collision check is likely a horrible way to go about this; I imagine I'll be using simple collision for both running and climbing. 3. Physics over networking in situations like this can be non-stable due to latency and the nature of inaccuracy for performance tradeoffs. I'm hoping to make it as forgiving and "predictable" as possible and cut out anything like gravity while this is happening. If the player is displaced or flinches or w/e they'll just stop climbing / running or get temporarily stunned but remain "attached". Gravity on, gravity off. Should hopefully hold up. 4. Animations are likely to be unfun. Hopefully not too bad. I'm sure I can find plenty of resources for this particular problem, though. I can have the climbing system replaced / based on special interactions. I can have the wall-running only enabled by "running up purple blocks" (Super Mario World joke) and switching modes.. but these implementations somewhat devalue the mechanic. I could also have it be some sort of super hop / vault rather than a run but I'm already doing that with another system and want to keep them as non-overlapping as possible. Not to mention they're gated completely differently and meant for separate playstyles.
global_05_local_5_shard_00002591_processed.jsonl/18668
Skip to content Restricting access to your site Use Kirby’s authentication system to build login-protected pages. You can use Kirby’s user system to restrict access to parts of your website that should only be available to certain users, for example, a clients’ area. In this recipe we will guide you through • creating a login form for the front-end • providing a logout link • protecting pages from unauthenticated users User management All users, including front-end users, are managed via the Panel. Creating roles without panel access By default, Kirby provides a single admin role with access to the Panel and without any restrictions. Front-end users usually shouldn’t have access to the Panel at all so we first need to create a user role without Panel access. In your /site/blueprints/users folder, create a new file called client.yml with the following content: title: Client panel: false If you add a new user in the Panel and assign the client role, this user cannot login to the Panel. You can create as many roles without Panel access as necessary to determine which part of your front-end should be accessible to which role. The login page For the login page, we use an unlisted page with some basic information that gets its own template. Create a /content/login folder with a login.txt text file inside it. We use the text file to store the information for the form. By creating a content file with these fields, we can make the form more dynamic and translate form labels and error messages in a multi-language installation if required. You could also hard-code this in your template instead. Title: Login Alert: Invalid user or password Username: User name Password: Password Button: Log in The corresponding blueprint for the Panel To make this file editable in the Panel, create a blueprint for this page: title: Login icon: 🔐 label: Alert text type: text label: Label for username type: text label: Label for password type: text label: Button text type: text The login template In the login template, create the login form and a container for the error messages: <?php snippet('header') ?> <h1><?= $page->title()->html() ?></h1> <?php if($error): ?> <div class="alert"><?= $page->alert()->html() ?></div> <?php endif ?> <label for="email"><?= $page->username()->html() ?></label> <input type="email" id="email" name="email" value="<?= esc(get('email')) ?>"> <label for="password"><?= $page->password()->html() ?></label> <input type="password" id="password" name="password" value="<?= esc(get('password')) ?>"> <input type="submit" name="login" value="<?= $page->button()->html() ?>"> <?php snippet('footer') ?> The controller To handle the form submission we create a login controller to keep the logic out of the template. return function ($kirby) { // don't show the login screen to already logged in users if ($kirby->user()) { $error = false; // handle the form submission if ($kirby->request()->is('POST') && get('login')) { // fetch the user by username if ($user = $kirby->user(get('email'))) { // if the user exists, try to log them in try { // redirect to the homepage // if the login was successful } catch (Exception $e) { $error = true; } else { // make sure the alert is // displayed in the template $error = true; return [ 'error' => $error The login will redirect the user back to the homepage if it was successful. Otherwise the error variable is returned to the template as true and the alert is displayed. If you want to redirect the user to a different page, change the path in the go() method. The logout For the logout we don’t need a real page. A simple URL to send logged-in users to is enough. return [ 'routes' => [ 'pattern' => 'logout', 'action' => function() { if ($user = kirby()->user()) { By adding the code above to your config file, Kirby will register a new route to When you open that URL, the action method is called and a logged-in user will be logged out. Afterwards the script will redirect the user to the login page. As soon as the user logged in, we display a logout link in the menu or somewhere else on the page. Here is the menu from Kirby’s Starterkit with an additional li element that appears when the user has logged in. <nav id="menu" class="menu"> <?php foreach ($site->children()->listed() as $item): ?> <?= $item->title()->link() ?> <?php endforeach ?> <?php if ($user = $kirby->user()): ?> <a href="<?= url('logout') ?>">Logout</a> <?php endif ?> Protecting Content With the login and logout processes in place, we can finally protect our content. Protecting entire pages You can protect entire pages from unauthenticated users by adding the following line at the top of a template: <?php if (!$kirby->user()) go('/') ?> // rest of the template This will redirect all unauthenticated visitors to the home page. Instead of adding this code to each template, you can also put your logic into a route, for example, when restricting access by other criteria than the template. Protecting parts of a page In the same way, you can hide parts of a page from unauthenticated users: <?php snippet('header') ?> <?php if ($kirby->user()): ?> Top Secret: the meaning of life is… <?php endif ?> <?php snippet('footer') ?> Protecting content by role The above examples don’t differentiate by user role but grant access to these pages to all logged-in users. If you have multiple front-end user roles and want to restrict access to certain pages or parts of pages to particular roles, you can ask for the current user’s role like this: <?php if (($user = $kirby->user()) && $user->role()->id() === 'client'): ?> This part of the page is only visible for clients with the role clients <?php endif ?> Note that this recipe only provides a basic example to give you an idea how to handle access restrictions. You can extend this into a powerful user area, with user sign-on, password reset, etc.
global_05_local_5_shard_00002591_processed.jsonl/18671
Blog Post Stay on Top of Enterprise Technology Trends Get updates impacting your industry from our GigaOm Research Community Join the Community! Apps vs. web If apps are winning, is the web losing? Why is this worth getting concerned about? Because the app economy creates an environment in which “the rich get richer,” Dixon argues: popular apps dominate the user’s home screen, and therefore get used more, get ranked higher in apps stores, etc. and make more money. The result, he says, is a future “like cable TV – a few dominant channels/apps that sit on users’ home screens and everything else relegated to lower tiers or irrelevance.” In his own blog post on the topic, Union Square Ventures founder Fred Wilson said the mobile app explosion is already having an impact on innovation. In a recent meeting, Union Square partners looked at their portfolios and “there was a palpable sense that the wide open period of innovation” that existed in 2004 or even 2008 was not as present now, thanks in large part to the rise of native mobile apps. Is the open web becoming less relevant? Open sign For me at least, this debate brings back memories of a classic Wired magazine cover story from 2010, co-written by Chris Anderson and Michael Wolff, with the alarming headline “The Web Is Dead.” There was much criticism of the piece at the time — including some from me in a post here — because of the way it described web usage, and also because it didn’t really distinguish between using native apps and apps that were built from open-web technologies like HTML5. That said, however, the future that Wired described — in which users primarily engage with digital content through dedicated apps from providers like Facebook and Twitter and the New York Times — has largely come true. As a number of commenters on Dixon’s post and at Hacker News have pointed out, the Flurry chart doesn’t break out how much of the app activity is game-related, and this inflates the numbers substantially, given all of the Flappy Bird and Dots and Candy Crush behavior we have seen over the past few years. You can see that in this chart that tech analyst Ben Thompson shared in a guest post on Automattic CEO Matt Mullenweg’s blog, in response to the Flurry data: Thompson notes that there are a number of reasons why we shouldn’t panic about the “death of the web,” including the fact that in many cases mobile usage is additive — that is, the size of the pie continues to grow. John Gruber, meanwhile, says the distinction between apps and the web is in some sense almost meaningless, since most apps (including Facebook’s) are just web content in a different wrapper. He also notes that WhatsApp, Instagram and other success stories could never have happened with just the web. Thompson and Gruber are right on many of those points. But while Thompson says writing is still relatively open despite the trend toward apps, and that “the web is like water — it fills in all the gaps,” I am left wondering how much writing and other content creation is occurring now inside walled gardens that could be outside of them. Even the New York Times has said that it sees its future being driven primarily by multiple segregated apps for its content. Is that a good thing? Dixon and Wilson aren’t the only ones who are concerned about this trend: although his focus isn’t necessarily on innovation per se, the web’s creator Sir Tim Berners-Lee has talked a number of times about his fear that the open web will be smothered by walled gardens or “closed worlds,” and proprietary services that make interaction difficult if not impossible. In a piece for Scientific American in 2010, he said that if this continued unchecked: Berners-Lee’s concern, not surprisingly, revolves around links — the whole purpose of the web being to link things together in interesting or relevant ways. How does that happen with apps? The answer is that it doesn’t. Even app makers whose entire business is content, like the New York Times, seem to include links begrudgingly, if at all. It may be imperceptible, but the loss of that kind of connection could have very real repercussions — and they likely won’t become obvious until it’s too late. Post and photo thumbnails courtesy of Shutterstock / noporn 8 Responses to “The rise of mobile apps and the decline of the open web — a threat or an over-reaction?” 1. Frederick Tubiermont We consider that, in the long run, native appstores are doomed. It will be the natural evolution. This will be the theme of our presentation at the Html5 dev conference on May 22 in San Francisco. You can already discover our main arguments right here: We’ve been working for 16 months on a very ambitious mobile WEP app project, enabling anyone – even kids – to create mobile web apps in their browser. Nothing to download, no appstores involved. You can check out the work in progress on (iOS/android on smartphones/tablets, Chrome/Safari on PC). You will see, it’s pretty impressive. It’s early days. Exciting times ahead! 2. Jerrod Crummel 3. Horowitz is an idiot and thinks closing up a wide open ecosystem is going to appeal to everyone, well that wont happen and mobile will only swell for the emerging third world markets that want all the free shit everyone else does. That doesnt mean anyone will monetize it, now does it! 4. Keith Hawn Flurry’s data is a laughable source for this “faux” argument. Take away game apps, and people wouldnt know what to do with themselves while sitting on the bus or train. 5. “Berners-Lee’s concern, not surprisingly, revolves around links — the whole purpose of the web being to link things together in interesting or relevant ways. How does that happen with apps? The answer is that it doesn’t.” The benefit of apps is that they can bundle information together and present it as a utility, in a personalized, and easily accessible package only a single icon press away. That information might otherwise be meaningless, inaccessible noise if it is either 1) raw on the web, or 2) has too big of a barrier to access (open browser, type in URL, login to website, deal with pinch and zoom, etc). Berners-Lee’s concern regarding links is being solved by via OAuth, REST APIs, and application-specific links (e.g., click on a YouTube link within an app and the YouTube app opens). The article is quite incomplete if the above comments are not considered. 6. dmazzaslomo Mobile apps are here to stay. But I don’t see native web innovation slowing down. This is an incredibly amazing time just for certain technologies like JavaScript. A lot of additions to the languages are coming. New frameworks and libraries are continuously coming out. JavaScript has been described as the assembly language for the web and I think that’s really accurate. Coffeescript, Clojurescript, Dart, etc all compile down to this base. There’s more than just JavaScript, but this is really what drives interactive sites on the web.
global_05_local_5_shard_00002591_processed.jsonl/18674
Target Confirms That Encrypted PINs Were Swiped in Black Friday Hack Illustration for article titled Target Confirms That Encrypted PINs Were Swiped in Black Friday Hack After admitting yesterday that some encrypted data had been pulled by the hack potentially affecting 40 million customers, Target has gone on to further confirm that the encrypted data stolen does in fact include PIN information. Whether or not the hackers will be able to extract the PINs from this data, though, remains to be seen. Target is currently attempting to assure customers that though the hackers may have the encrypted form of the PIN data, the digital keys to their bank accounts are still perfectly safe: With this form of encryption, Target's own system would not give the hackers access to the encryption key—only the external payment processor has access to that kind of information. However, with the level of technological sophistication it would take to pull of a heist like this, it's entirely possible that the hackers would have the means of overcoming this little hiccup. Still, at least as far as Target is concerned, it seems customers' PINs are safe for now. Though we highly recommend keeping a very, very close eye on your bank account if you shopped at a US Target store between the dates of November 27 and December 15. [Target] Share This Story Get our newsletter This is why I only use my atm card to get money out from an atm. I usually stick with cash, or credit cards if I have to.
global_05_local_5_shard_00002591_processed.jsonl/18683
Jokers, Goddesses, And Talking Heads Introduction: First, if you are new to this blog, please be advised that it is generally a synthesis of esoteric ideas, pop-cultural analysis, and a bit of my own life. I may jump from one idea to another quite frequently and/or without warning; this type of narrative may-or-may-not be of interest to you. Secondly, for context, I originally wrote this particular post on October 7, 2019. I had a rather potent dream last night that seemed to reference some of the symbols discussed here, including the current cinematic incarnation of the Joker & mothers/goddesses. Specifically, I dreamt that a younger version of Arthur Fleck was sucked up by the blades of a powerful fan and literally shredded to bloody bits (much like that scene I believe in the very first episode of LOST with the plane). In a different dream scene, I called out to my Mom, who was hanging out with some friends, and she never heard me; I realized I just had to go off on my own. What did it all mean? So a common shamanic trope is that of dismemberment—of “losing one’s head”. And the pun is intentional; as many things in the metaphysical realm are. Now, this trope is heavily (and quite graphically) used in the movie Hereditary, bringing a sort of cultic element to the proceedings reminiscent of the accusations of heresy levied at the Knights Templar. The Knights were accused—among other things—of worshipping a severed head (strangely, supposedly called “Baphomet”). The original Baphomet, with boobies The symbolism of the head liberated (again, pun intentional) from the body can, of course, be seen as one’s spirit (theoretically housed in the head/brain) being loosed from the relative bondage of the material body. This does not have to be achieved by such dire acts as literal dismemberment, however…but instead through consciousness alteration via meditation, prayer and or the substance of your choice. As a related tangent, note how I am writing all this now. I have just woken up (pun intentional), still foggy. I’m not “thinking” as I write this; this writing is not intentional. I have a marketing project to complete, and I am sneaking this little missive in before delving into that “businessy” state of mind. What I am writing now is about at least 80% FLOW. Which is to say, it is near-automatic. Where are these ideas and sentences coming from, exactly? I’m not consciously mapping out these sentences. I had very little pre-made intentions as to what was going to be written here before I started. what “flow” might look like Who is writing this post? I would like to believe it is me; perhaps more of an “unconscious” me, a subconscious me; I could dress it up with some New Age frippery and call it my “Higher Self.” what me and my Higher Self might look like I’m a Pisces, but that might not truly mean much at all; astrology being (at least to some) a type of voodoo. If such a concept as “past lives” (more New Age frippery) exists, then it is conceivable that we have more than one “sign”—indeed, we may encompass all of the signs. At one “time” or another. Now, there was an intervening period between me waking up and writing this; I was on my phone scanning the current news as it is interpreted through my associates on Twitter. This was a bit of a terrible mistake; not due to any fault of my associates, but due to the wretched news itself. And so I’ll tell you how I felt, the jumble of thoughts I had in my even foggier mind earlier this morning. I read about Trump and the Kurds, and thought: wow, this is even worse than I could have anticipated or conceived. We are, (not the royal “We,” but the American We) sort of the “enemy,” now. But that’s misleading, isn’t it? Because these types of shenanigans and geopolitical betrayals have been going on for quite some time before Trump; he’s just “owning” the treachery of it in the most public and arrogant way possible. You’d have to wonder how TPTB before Trump must be reacting to this continual lifting of the veil by the President; it seems very much like ridding the stripper of her fans and scarves, does it not? It ruins the “show.” Then I saw this woman give a long critical analysis of the Joker movie via Twitter (not my recommended avenue for this sort of exegesis, for many treasons (ha, I meant to write “reasons” but I’ll leave this, it’s funnier), basically saying it was a tool of the white patriarchy legitimizing violence towards females and various people of color. Predictably, a massive amount of white males ganged up on her tweets at the same time to argue that the movie was not legitimizing violence towards females and people of color; they did this by being violent and threatening and racist. Well, y’all convinced me! Now, I’ve actually had a quite similar experience to this over ten years ago, when I first began pointing out the links between a number of Joker-inspired crimes and the (quite relatively so, in comparison to the current era) violence of The Dark Knight. To “prove” that the movie was not violent—and certainly not inspiring violence—I received threats of violence. I mean, it’s all pretty funny now. Quite a joke. Pun intentional, as per always. And that all led me on a tangent (I live mostly in the realm of tangents) in which I reflected on the “identity” of most of the powerful mystical-type beings I’ve ever encountered in the dream-realm. I don’t mean the dragons or the elves or any roleplaying shit like that…I mean **powerful beings** that you feel in your bones like **awe** at how powerful they are. The funny thing is: most of those beings have been entities of “color.” They’ve rarely ever been “white.” They are most usually “African.” (Also, “Indian,” “Asian,” and “Indigenous.”) They are often, though not always, female. Now, I’ve also run into some entities in my dreams who are “Celtic.” (I put quotation marks around all these designations because who the hell really knows the origins of any of this let’s be perfectly fucking honest). I think a few “Nordic?” But most often: females of color. Now: this was most certainly not a result of belief systems I might have been exposed to as a child via family. Later on, I discovered that my Mom, who is from Brazil, has some “roots” in indigenous culture via her ancestors (not genetically, but by learning the esoteric culture around them). But that’s it. what my shamanistic female ancestors might have looked like These powerful dark-skinned women I see often in my dreams are, I believe, something extremely ancient and potent and not to be fucked with. (It isn’t just that I “believe” it, no…I know it to my bones as an intuitive truth.) And so we can consider a fearsome figure like Kali. And then there is Isis, a deity so incredibly popular and primal that she eventually became the Holy Virgin Mary and is still worshipped to this day; look up the phenomenon of the “Black Madonnas.” Along the lines of the Black Madonnas. consider the Thelemic figure of Babalon. She of the red skin; at least, in some interpretations. You know, it’s very funny; as a very young teenager, I basically “knew” of the figure of Babalon. I mean, intuitively; intuitively, automatically, like I’m writing all of this now. It was a “red” woman of tremendous primal world-ending power. Of course, I connected her to the pop-culture I was devouring at the time… In fact, in my little memoir I self-published some time ago, I mentioned her a lot. But even I didn’t quite “put it together.” The powerful female archetype…like the Isis/Mary situation, somewhat “whitewashed” for contemporary audiences. Often twinned with a bird-like symbol (sort of melding the iconography of Isis with her hawk-headed child Horus). We see that in the comic book character Phoenix, and also in far more “hidden” and subversive ways like the protagonist in the Hitchcock movie The Birds (per which I always assumed, as a child, that it was secretly she who brought the frenzied animals to Bodega Bay). We even see this archetype survive to the most current cinematic era with a movie like Under The Silver Lake, featuring a mythic character called the “Owl’s Kiss,” or, more commonly, the Owl Woman: The “counterpart” to the Owl Woman in the movie is the equally-mythic “Dog Killer”: “Dogs” in the film eventually revealed to be symbolism for women. Thus: we have the deadly archetypes of each gender, fitting a neat Hermetic male/female yin/yang balance. In the movie Joker, there are two main female characters. SPOILERS past this point… So the first main female character is apparently Arthur Fleck’s disabled mom, whom he eventually murders. She can be roughly analogous, in terms of more primal collective archetypal imagery, as the Mother goddess figure. Who, of course, as I’ve said, is murdered. (It is argued that Fleck kills her “for her own good,” because she’s physically sick and of course also crazy and abused and etc. We can play this game all day.) Then we have Fleck’s “potential love interest,” played by Zazie Beetz (who was also Domino in Deadpool 2, if you care about such things.). Bolstering up her “goddess” energy, other than she resonates Isis with her young son in tow, is the fact that her name is Sophie—like the powerful Gnostic “Mother Goddess” Sophia. Arthur hallucinates that he has a relationship with Sophie, eventually going so far as to break into her house. It is rumored that in an earlier form of the a script Arthur kills Sophie outright, but here it’s left “vague” (you know, for “good taste.”) But then we can go back to Under The Silver Lake (with its similarly hoodie-clad Dog Killer), and see somewhat more of a “fair fight” —if not a tête-à-tête—by the end of the film—between these shadow archetypes of the Male and Female energies. And certainly, for those comic fans offended by Joker’s more misogynist elements, there will soon be (the quite on-the-nose titled, considering all we’ve discussed so far) Birds Of Prey, featuring (Jared Leto) Joker’s abused former girlfriend Harley Quinn. And let us remember that recently DC Comics itself canonized beyond a shadow-of-a-doubt that Quinn was a victim of domestic abuse at the hands of the Joker: Bad branding, perhaps, on the part of DC? Or maybe Peter just doesn’t know what Paul is approving in their comic books. At any rate…outside of my pop-culture-crit fever dreams and dreams of fevers, there’s quite a lot happening in the world at the moment, is there not? I haven’t even begun to express how I feel about all that, or where I think it is all heading. But I think the Spirits are telling me that I’ve just about used up my quarter for now. To get me back in the mood for marketing writing, and to sort of put a “bow” on the themes that I’ve expressed in this piece, I present the 2014 music video “Dangerous,” from Big Data: Now, back to the present. When meditating on the dreams I just had last night, I pulled the following cards: Clearly, there are mother/goddess themes here, as well as a (Joker?) green. As for my relationship with my own mom, it is…complicated. I do have a tendency to attract females into my environment who are very abusive (mostly verbally; though I wonder, if given half a chance, some might not try to also rip my eyes out of my head), and I think it stems from this unhealed primary relationship from my youth. And one of the ideas I had this morning is that those who lack a core positive relationship with one’s mom (and I mean, from childhood-onward) have to, in a way, become their “own” mothers. highly metaphorical depiction of my general relationship with my mom over the decades As for the symbol of the Joker, I do want to point out that since writing this post last October, I discovered an entire Joker fandom (largely from non-American creators) who give a distinctly “female” aspect to Arthur Fleck (often pairing her/him off with a far larger/masculine Heath Ledger Joker): Alas, this recent interesting discovery must be grist for another day’s post; as well as trying to learn how to translate Japanese. Feel free to follow my bad self on: Fantasy Merchant Or just send me books and toys and crap: Amazon Wish List #1: Books Amazon Wish List #2: Funky Esoteric Stuff Amazon Wish List #3: Toys n Shit Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/18695
, , In the current presidential administration, tweets are a prominent form of communication. The President’s criticisms of Nordstrom attracted substantial attention, but he isn’t the only one with a mobile device and a Twitter account. Well before he became the press secretary, Sean Spicer took to the microblogging site to complain repeatedly when the ballpark ran out of vanilla-flavored Dippin’ Dots during a Nationals game. At the time, there was little controversy; Spicer was not a famous name, and though the tweets were rather odd, they were not particularly notable. That all changed when he was appointed press secretary and people began to look for information about him. The odd series of tweets about Dippin’ Dots, in which he predicts the company’s demise based solely on a particular flavor being out of stock at a single ballpark on a specific date, quickly attracted people’s attention. Soon, both Spicer and Dippin’ Dots were trending, forcing the company to issue some sort of response. But the situation was delicate. Dippin’ Dots did not want to engage negatively, nor did it want to be caught in the political cross-fire. Yet it believed that it could not simply ignore the reawakened discussion or fail to respond. Even if the tweets were old, people were talking widely about the company and its products, and if Dippin’ Dots simply remained silent, that would be a form of response too. Instead, it crafted an open letter to Spicer, from the company CEO, using levity and gentle reminders of its status as an employer of members of the American workforce, to defuse the potential damage of the situation. The letter apologized for running out of vanilla at the Nationals’ stadium, described the success of the company, and asked for permission to host an ice cream social at the White House. The lighthearted humor nearly demanded that Spicer take the situation a little less seriously; accordingly, he responded via Twitter the next day, proposing that the ice cream should be given to first responders instead of White House staffers. The discussion went viral of course, shared by millions of consumers who appreciated the tone of the response. Thus the company came out ahead: Its name was trending for days, and its corporate image for silly fun was burnished. Furthermore, it made sure that Sean Spicer was unlikely to lodge many more strange complaints about it. Discussion Question: 1. What lessons does this encounter teach for firms that might experience some political controversy, even without doing anything to bring about the controversy? Source: Shama Hyder, “How Dippin’ Dots Turned a Frosty Crisis with Press Secretary Sean Spicer into Social Media Gold,” Forbes, January 24, 2017
global_05_local_5_shard_00002591_processed.jsonl/18731
Tobacco snuff was in use by the European nobility from the 16th Century onwards, becoming both medicine and status symbol, even with the health hazards associated. At some point it fell out of favor, whether for smoking or something else, but was this just a fad that had seen it's time or was there something else associated with it's loss of status among the nobility? If there is a good source on this let me know, I'd be interested to read something substantive on the subject, or on the changing social customs. • 6 I don't have any sources, but typically things fall out of favor by high society when it becomes common place. IE, if the middle to lower class start doing it high society will usually drop it like a red-headed step child. – DForck42 Oct 28 '11 at 14:29 • 1 At least wet snuff used to be made using Nicotiana rustica rather than Nicotiana vigrginia that is used for smoking tobacco so perhaps the cultivation of the different species may give a hint. – liftarn Mar 5 '18 at 8:01 • 1 An aside remark: When visiting one of Oxford colleges few years ago and staying for dinner, I observed that after the after-dinner sweets we were offered a grey substance to sniff. In response to my joke "what is it, cocaine?", I got stern looks and the answer "of course not, it is tobacco!" – Moishe Kohan Mar 5 '18 at 17:44 If you're interested enough to read a whole book, Smokeless Tobacco in the Western World: 1550-1950 by Jan Rogozinski looks like the one (the new price is ridiculous but there seem to be several used editions for a reasonable amount). Alternatively, here's an online article that describes the development of cigarettes in America, which I think sheds a fair amount of light on your question. Essentially, tobacco suitable for smoking used to be produced in the Middle East, but was too expensive to become a common habit in Europe or America. But in 1839 an American slave discovered a new curing process, which made it easy to grow cheap, smokable tobacco on previously marginal land. It became popular with soldiers during the American civil war. A machine for rolling cigarettes was invented in 1884, and cigarettes became very affordable and convenient. That's all from the article; the rest is personal speculation: I know in America chewing tobacco had always been more popular than snuff, and it was falling out of favour in late 19th century because people started to notice that the constant spitting was, well, gross. Cigarettes were a neater alternative, once people could afford them. Snuff isn't so messy, but I think it's noisy and can make you sneeze, so maybe Europeans switched to cigarettes for much the same reasons as Americans. | improve this answer | | • Wow...that's some good information. The book looks like a nice summary that touches on this, but I agree the price is sort of ridiculous for what it is. – MichaelF Feb 1 '12 at 9:13 • it's probably out of print. Keep an eye out for the ebook ;). – Rose Ames Feb 1 '12 at 15:14 • 2 Strange - as an 18 Yr old in London at the end of the 1960s, I and my young colleagues thought an older employee "disgusting" for taking snuff, whilst we virtuously smoked our cigarettes! – TheHonRose Mar 5 '18 at 1:32 • I was under the impression that snuff in the 1700's was not tobacco, but other stuff like nutmeg. Interesting answer/sources. +1 – KorvinStarmast Mar 5 '18 at 15:55 Your Answer
global_05_local_5_shard_00002591_processed.jsonl/18744
How Do Transpeople Talk? Writing Characters Beyond a Gender Binary A year and a half ago I received a commission to write a short play. I was working with an ensemble I love: Theatre Four, in New Haven, CT. A group specializing in site-specific performance, they asked me to write a play set in New Haven’s historic Institute Library. In preparation we toured the library together and met with a local historian. We talked about which stories, historic moments, and aspects of the library were most interesting to us. Excited by the library’s abolitionist history, we decided to set the play in the 1840s.  Mid-way through my writing process I realized that, due to casting needs, I would have to change a male role to a female one. No biggie, I thought, but as I began rewriting I shocked myself. On auto-pilot I found myself transforming the character’s bold statements into tentative questions, dividing complete thoughts into fragments, qualifying bold ideas with ums and wells. Horrified, I spent as much time undoing my rewrites as I spent rewriting. Could it be that I was afraid of writing a nineteenth century woman who spoke like (my conception of) a nineteenth century man? How ridiculous! How strange that I lacked the imagination to write a nineteenth century woman who spoke with the confidence of a man, and how embarrassing that I couldn’t commit to this character on the page.  Of course as a writer I’ve often considered how language is power. I’ve often been struck by how invisible the power dynamics in speech are, how much we ignore the violence in so many forms of communication. As a playwright I’ve found solace in exposing these dynamics, in utilizing and subverting them to suggest the world I want to see. But all of a sudden I was struck by my own sexism. What was I reproducing unconsciously? How deep did my own socialization go? Working on my thesis play in graduate school I got to see a transgender role I’d written realized onstage for the first time: Archer, a genderqueer transmasculine person who expresses a number of genders over the course of the play. The actress who played Archer, an incredibly talented cisgender woman, told me she was stunned by how quiet he was. I was surprised to hear this. Somehow, while writing, I wasn’t conscious of Archer being terribly quiet. Now, hearing my own play, I was deeply aware of his reticence. Archer would sit quietly at the dinner table while his mother and father railed on. Archer would listen intently while his boyfriend told him the whole history of the Ponderosa Pine forest, while his grandmother went on about her neighborly crush. To every character he seemed to be withholding information. But of course, many characters are taciturn. Did Archer come off as quiet because everyone else in the landscape was loquacious? Or did my colleagues find Archer quiet because, recognizing him as a female socialized person, they expected him to apologize for his silence? Was Archer quiet the same way I was? Afraid of slipping into familiar feminine speech patterns that might give others permission to “she” me, confused by the power my words carried in light of my new masculine appearance, trapped between assuming the overbearing male patterns or slipping back into apologetic female ones?  A year and a half ago I held a public reading of my first play with multiple characters who happened to be transwomen. Watching the audience file in, I felt nervous. I felt aware of my privilege as a transmasculine person whose voice might be heard and trusted more quickly than transwomen. I felt afraid that this one story might be understood as a foundational narrative about all transpeople, worried that aspects of these characters would lead to generalizations or stereotypes about transpeople and transwomen. I noticed how few audience members were transwomen and noted again how unwelcoming theatre spaces were to my transfeminine friends. After the reading a transmasculine friend said to me, “I love the play but I have one note: I’ve never met a transwoman who talks so much.” Why do we expect a transmasculine person to talk more, or a transwoman to talk less? I rarely get notes or questions like these about my cisgender characters. Why can’t a trans character’s speech patterns surprise us the way a cisgender character’s could? Why can’t we see these characters outside of our binary expectations for how men or women should speak?  How much do writers have a responsibility to capture the inequality in our language, and how much do we have a responsibility to shift it? In a world where women (cis or trans) are rarely given much airtime and transpeople of all genders incredibly little, how can our choices to write someone as quiet, talkative, angry, or apologetic reflect a specific individual in context without reinforcing unconscious patterns? Now that I know how deeply stereotypes of language reside in me, how do I write the world I want to see? And how can I do this while also revealing the painful truths of the world I live in? As artists, we get to choose what an audience sees when they see a trans character. Do they see the character’s preferred gender or the gender assigned at birth? In the theatres that most of us are working in, the vast majority of our audiences are not trans, and in fact, a fair percentage of them may have never known a transperson. How can we show these audiences a trans character and keep them from assuming the character’s assigned gender? How can we create space to reveal the character’s personality without our choices being received as characteristically male or female? We have to use awareness of these automatic assumptions to chart new territory for language and gender. Where better to begin this work than in the theater, where we collude in constructing reality? And who better to begin it with than transpeople—our already gender revolutionary characters? I want to challenge myself, my colleagues and my collaborators to write against assumptions for characters of all genders, and I can’t wait to see where it leads us.   Bookmark this page Log in to add a bookmark Thoughts from the curator Gender Power and Politics Series by MJ Kaufman Add Comment Newest First I don't know whether this is useful or not, but the transmen I know have not spoken differently from some of the cis men I know. In my experience--however limited--people speak differently (from me) based on their socioeconomic class (sometimes), their geographical location (sometimes)--but the notion of difference is subjective, right--because my default or my norm is my own constructed frame of reference. If we try to have our characters represent the group they are from, rather than simply being one voice, then we get caught in the trap of having to speak for a group of people and not an individual. In time, more stories equal the range of experience and we are all less limited by expectations. Consciousness and intentionality for a work are important but so is your instinct, your impulses of how a character speaks. I think the best we can do is to write 3-D characters and let audiences catch up to whatever in familiarities we/they encounter. One way I can think of is to have two or more transmale or two or more transfemale characters in the same play, and make them different from each other, as they would be in real life. Of the two transmen I've known in real life over a course of several years, I only found out one was trans* years after that from Google and the other from an appearance in a transmale magazine, OP. They aren't macho or anything, just regular guys. I have to say, I disagree with the key assumptions of the article. Take one of the key questions posed near the end: "How can we create space to revel the character's personality with out choices being reviewed as characteristically male or female?" The author spends the entire article railing against gender binary dialogue and then poses their own question in terms of the gender binary. My gender, my sexuality, my race, my creed, my religion, may all be parts of who I am, but no single part of that is the sum of my identity. However, the author of this article is making gender the sum of this person. In the first example given, where a 19th century male character was written as female, the author was correct in that the two likely would NOT have spoken the same way for a myriad of reasons. COULD they speak the same way? Of course. However, the female version would have to be aware of the societal implications of her assertiveness. They may not stop her, but it would be myopic to suggest they didn't exist. I haven't read the author's play involving the trans-character, but it is possible the audience for the character to be "quiet" because so many articles involving the cis/trans/etc. dynamics come from organizations/publications with agendas (Jezebel, etc.) that tend to delight in abrasive shock factor. The trans person may have seemed quiet because they didn't scream "FUCK YOUR GENDER PRONOUNS YOU DO NOT DEFINE ME YOU CIS BASTARDS" Great article MJ. Thanks! It really made me think and has inspired me to keep thinking about the provocations you have so intelligently offered. MJ, these are exciting questions. And I am so glad you are asking them. I just received an MCAF grant for my transgender performance project, which was sparked by my work last year with STARS clients at Bailey House. Last year we ended up doing a sort of documentary/talk show, taking questions and answers from the transwomen in the audience about many aspects of trans life. I augmented that with audio clips from the many interviews I conducted with them over a 2-month period, and with video clips from trans public figures. I'm in the process of deciding what form the project will take this year, and have been considering writing a play for my transwomen group, by creating a loose structure and having them improvise the scenes. If they behave in that circumstance like they did during my work with them last year, they will be voluble, opinionated, funny, frank and powerful. Of the five transwomen participating last year, two were very outspoken, two were intermittently outspoken, and one was only occasionally outspoken. None were what I would call quiet. I say all this in what I know is a very partial and insufficient answer to your very good questions about how trans people talk. (no transmen, for instance, were in my group) I find it totally fascinating to think about how our unnoticed prejudices can show up in dialogue. I'm going to be thinking about that as I work. Thank you for this excellent writing on this topic. I hope you can come to see the final product of our work, which will be featured in my 2015 Left Out Festival at Stage Left Studio in April.
global_05_local_5_shard_00002591_processed.jsonl/18817
Jonathan Ochshorn's Structural Elements for Architects and Builders, Third Edition Follow @jonochshorn animation gif of book cover Chapter 1: Introduction to structural design The study of structural behavior and structural design begins with the concept of load. We represent loads with arrows indicating direction and magnitude. The magnitude is expressed in pounds (lb), kips (1 kip = 1000 lb), or appropriate SI units of force; the direction is usually vertical (gravity) or horizontal (wind, earthquake), although wind loads on pitched roofs can be modeled as acting perpendicular to the roof surface (Figure 1.1). direction of loads on structures Figure 1.1: Direction of loads can be (a) vertical; (b) horizontal; or (c) inclined Where loads are distributed over a surface, we say, for example, 100 pounds per square foot, or 100 psf. Where loads are distributed over a linear element, like a beam, we say, for example, 2 kips per linear foot, or 2 kips per foot, or 2 kips/ft (Figure 1.2). Where loads are concentrated at a point, such as the vertical load transferred to a column, we say, for example, 10 kips or 10 k. load diagram with resultant Figure 1.2: Distributed loads on a beam
global_05_local_5_shard_00002591_processed.jsonl/18818
Creative Writing Writing the senses Encouraging playfulness in children’s writing (and maybe in adult’s writing, too) The inaugural ‘Discover Challenge‘ at WordPress Blogging the Senses has reminded of the time I worked with groups of Year 1s (5 and 6 year olds) and Year 5s (9 and 10 year olds) and I asked the children to use all of their senses to write about their school jumper.  I wrote a post about it here. I told the children not to worry about spelling or grammar but made it clear that they could help each other out with this if they wanted to and, of course, they could ask me or their teacher for help.  They worked collaboratively, in pairs, one younger and one older child together, and I encouraged them to talk about their ideas before they wrote anything down.  They had permission to help each other and to copy each other, if they wanted to.  It wasn’t a silent classroom – there was a purposeful buzz of noise. My School Jumper - a writing exercise using all five sensesThere was time for the children to draw and colour in their school jumpers.  Some of them then added their ‘sense poems’ around the shape of their drawings.  I loved the fact that at least one of them coloured their school jumper blue even though their uniform was brown.  Perhaps they were thinking of the colour they’d like their uniform to be.  This willingness to play with the parameters they’d been set gave me a sense  that the children were experiencing some freedom in this exercise, that they didn’t feel hemmed in or prescribed by an exact set of rules. Some of their descriptions were wonderfully imaginative and charming: My school jumper is as brown as a cello as brown as sausages as brown as burnt toast My School Jumper - a writing exercise using all five senses The good thing about writing about a jumper is that you can take it off and give it a good sniff and rub it against your ear to hear the kind of sounds it makes: It smells like soap, trees, wood and cheese strings. It sounds like wind, sea, air and a train. You can also give it a good lick: My school jumper taste like furry on my tounge furry jumperI’ve never tried this writing exercise with adults but I’m tempted to give it a go one day, perhaps as a warm-up exercise.  Permission to break rules, to not write syntactically, to believe in blue when brown is right in front of you, could be joyfully liberating.  It could be disastrous, too, of course but I would love to see what would happen. Encouraging creativity and not being prescriptive feels pretty topical, in the UK at least, with a new government guideline to do with children’s writing issued this very week (this one about the correct use of exclamation marks, believe it or not!!). Anyway, perhaps you’ve used similar exercises based around the five senses? I’d love to know what they are.  Have you used them with adult writers?  How did they get on?  Looking forward to some responses with or without the exclamation marks. ! 10 thoughts on “Writing the senses” 1. Love this post, it appeals to the child in all all of us. I’ve been running a monthly ‘Pop in and write poetry’ for adults for five years and often take sensory things in for warm ups. The table can also look like one of those ‘nature tables’ in primary schools years ago, but some of the resulting poems are wonderful. Good as prompts for Haiku too Liked by 1 person 2. If you ever put this out there as an actual blog challenge then I’m in! (Did I use the exclamation mark correctly? I went to a school where if you parked your car outside for long enough your wheels might get nicked.) This is such a lovely post. And you’ve sparked a random memory that all my school woollies were lovingly knitted for me by my Nan. Xx Liked by 1 person 1. Ha! Thanks, Kerry. Don’t wait for the challenge, write the post anyway. Thanks for sharing that memory about your knitted school woollies – we had our fair share of those, too and I can still remember the smell of wet wool drying on school radiators after the class had been caught in a downpour! 🙂 Liked by 1 person 3. Children are the best creative people who are pretty honest and straight forward about how they feel. Sadly that starts diminishing as we grow.. Lovely post to remind ourselves of the innocence in a child’s play.. 🙂 Liked by 1 person 1. Yeah that’s the magic of letting one be to do the things one ought to do (good learning tasks ofcourse); best example is how you let them do what they do the best.. 🙂 ❤ Liked by 1 person 4. Hi I have done this with adults in a different way. They used one line of alliteration, one simile, one metaphor, personification and a line of onomatopoeia to describe a topic EG the sun. Put together they make a lovely poem! Liked by 1 person Comments are welcomed You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/18822
Cleanliness and Godliness: A Happy Ending in Nunhead Yesterday began, bright and breezy, at 8 a.m. with me faciliating a T1ME Focus Day.   The idea is a simple one, join the website by sharing your dream, and one of the services we offer is a fortnightly Focus Day – either 8 a.m. to 1 p.m. or 2 p.m. to 7 p.m.   You turn up and together with the rest of the crew, we each tick off items on our To Do List, generally focussing on the nasty ones like clutter-clearing, filing, accounts and other chores, or Big Projects which need an expanse of 5 hours with a single […] Keep Reading »
global_05_local_5_shard_00002591_processed.jsonl/18823
Introducing: oneAPI.jl Tim Besard We’re proud to announce the first version of oneAPI.jl, a Julia package for programming accelerators with the oneAPI programming model. It is currently available for select Intel GPUs, including common integrated ones, and offers a similar experience to CUDA.jl. The initial version of this package, v0.1, consists of three key components: In this post, I’ll briefly describe each of these. But first, some essentials. oneAPI.jl is currently only supported on 64-bit Linux, using a sufficiently recent kernel, and requires Julia 1.5. Furthermore, it currently only supports a limited set of Intel GPUs: Gen9 (Skylake, Kaby Lake, Coffee Lake), Gen11 (Ice Lake), and Gen12 (Tiger Lake). If your Intel CPU has an integrated GPU supported by oneAPI, you can just go ahead and install the oneAPI.jl package: pkg> add oneAPI That’s right, no additional drivers required! oneAPI.jl ships its own copy of the Intel Compute Runtime, which works out of the box on any (sufficiently recent) Linux kernel. The initial download, powered by Julia’s artifact subsystem, might take a while to complete. After that, you can import the package and start using its functionality: julia> using oneAPI julia> oneAPI.versioninfo() Binary dependencies: - NEO_jll: 20.42.18209+0 - libigc_jll: 1.0.5186+0 - gmmlib_jll: 20.3.2+0 - SPIRV_LLVM_Translator_jll: 9.0.0+1 - SPIRV_Tools_jll: 2020.2.0+1 - Julia: 1.5.2 - LLVM: 9.0.1 1 driver: - 00007fee-06cb-0a10-1642-ca9f01000000 (v1.0.0, API v1.0.0) 1 device: - Intel(R) Graphics Gen9 The oneArray type Similar to CUDA.jl’s CuArray type, oneAPI.jl provides an array abstraction that you can use to easily perform data parallel operations on your GPU: julia> a = oneArray(zeros(2,3)) 2×3 oneArray{Float64,2}: 0.0 0.0 0.0 0.0 0.0 0.0 julia> a .+ 1 2×3 oneArray{Float64,2}: 1.0 1.0 1.0 1.0 1.0 1.0 julia> sum(ans; dims=2) 2×1 oneArray{Float64,2}: This functionality builds on the GPUArrays.jl package, which means that a lot of operations are supported out of the box. Some are still missing, of course, and we haven’t carefully optimized for performance either. Kernel programming The above array operations are made possible by a compiler that transforms Julia source code into SPIR-V IR for use with oneAPI. Most of this work is part of GPUCompiler.jl. In oneAPI.jl, we use this compiler to provide a kernel programming model: julia> function vadd(a, b, c) i = get_global_id() @inbounds c[i] = a[i] + b[i] julia> a = oneArray(rand(10)); julia> b = oneArray(rand(10)); julia> c = similar(a); julia> @oneapi items=10 vadd(a, b, c) julia> @test Array(a) .+ Array(b) == Array(c) Test Passed Again, the @oneapi macro resembles @cuda from CUDA.jl. One of the differences with the CUDA stack is that we use OpenCL-style built-ins, like get_global_id instead of threadIdx and barrier instead of sync_threads. Other familiar functionality, e.g. to reflect on the compiler, is available as well: julia> @device_code_spirv @oneapi vadd(a, b, c) ; CompilerJob of kernel vadd(oneDeviceArray{Float64,1,1}, ; oneDeviceArray{Float64,1,1}, ; oneDeviceArray{Float64,1,1}) ; for GPUCompiler.SPIRVCompilerTarget ; Version: 1.0 ; Generator: Khronos LLVM/SPIR-V Translator; 14 ; Bound: 46 ; Schema: 0 OpCapability Addresses OpCapability Linkage OpCapability Kernel OpCapability Float64 OpCapability Int64 OpCapability Int8 %1 = OpExtInstImport "OpenCL.std" OpMemoryModel Physical64 OpenCL OpEntryPoint Kernel Level Zero wrappers To interface with the oneAPI driver, we use the Level Zero API. Wrappers for this API is available under the oneL0 submodule of oneAPI.jl: julia> using oneAPI.oneL0 julia> drv = first(drivers()) ZeDriver(00000000-0000-0000-1642-ca9f01000000, version 1.0.0) julia> dev = first(devices(drv)) ZeDevice(GPU, vendor 0x8086, device 0x1912): Intel(R) Graphics Gen9 This is a low-level interface, and importing this submodule should not be required for the vast majority of users. It is only useful when you want to perform very specific operations, like submitting an certain operations to the command queue, working with events, etc. In that case, you should refer to the upstream specification; The wrappers in the oneL0 module closely mimic the C APIs. Version 0.1 of oneAPI.jl forms a solid base for future oneAPI developments in Julia. Thanks to the continued effort of generalizing the Julia GPU support in packages like GPUArrays.jl and GPUCompiler.jl, this initial version is already much more usable than early versions of CUDA.jl or AMDGPU.jl ever were. That said, there are crucial parts missing. For one, oneAPI.jl does not integrate with any of the vendor libraries like oneMKL or oneDNN. That means several important operations, e.g. matrix-matrix multiplication, will be slow. Hardware support is also limited, and the package currently only works on Linux. If you want to contribute to oneAPI.jl, or run into problems, check out the GitHub repository at JuliaGPU/oneAPI.jl. For questions, please use the Julia Discourse forum under the GPU domain and/or in the #gpu channel of the Julia Slack.
global_05_local_5_shard_00002591_processed.jsonl/18832
To See Things As They Are This is the essence of the Buddha's philosophy (given that he have not created any philosophical system - commentators did, he just followed his own insights). Precise Use Of A Language Collapsing Bullshit To What Is Truth Remains Standing Last modified 3 years ago Last modified on Dec 31, 2017, 7:43:05 AM Note: See TracWiki for help on using the wiki.
global_05_local_5_shard_00002591_processed.jsonl/18836
Skip to Content Datafile Software The element names defined within a schema relate just to that schema. But someone may, for very good reason, want to vary a standard schema. BOSSFed, for instance, base their schemas on the BASDA ones, but include aspects that are special to the stationery business and for which there was no provision in the BASDA ones. To subvert the root schemas makes a mockery of having standards, yet variations are always required. For example one schema may refer to an element <Reference>, describe how it is used, and record the child elements that it contains. But a company may, for very good reason, wish to use the same tag in a slightly different way, perhaps to include additional child elements whose data is essential to the way they operate. Namespaces provide a simple way to annotate such variations, make them visible, and still maintain the integrity of XML schemas. A namespace is merely a reference, given as an attribute of the tag to which it refers, and naming the schema that is to be used for the purposes of interpreting that element and any of its child elements. <weather-report xmlns="urn:weatherusa:schemas:reports.xsd”> "xmlns” is the attribute that holds the XML namespace, in this case given as the location and filename of the XSD file that defines the schema to be used. Namespaces provide important reference information for the analysts and programmers who create XML schemas and write the application programs that process XML files. The rest of this section gives more background, for those others who may be interested. Schemas commonly reference the originating namespace in the root element, so that a user can view a definition of the elements. If a different namespace attribute is given to a child element, then children elements enclosed within that element can use element names in the way defined in that namespace. A prefix is added to such child element names — if no prefix is present, then it is the original namespace that defines that element. Suppose a child element is given a namespace such as xmlns:OP="urn:BOSSFed- Order:v1". A subsequent child element might be <OP:Reference>. This means the element name Reference is defined not in the root schema definition, but in the namespace document given the short code "OP”. For our processing purposes it makes no difference, because we work on the full element name of OP:Reference. But if we need to research how this element is to be used, then we will look to the namespace reference, not the root schema reference for answers. Below is a (stripped-out) example taken from the BOSSFed order schema: <Order xsi:schemaLocation="urn:schemas-basdaorg: 2000:purchaseOrder:xdr:3.01 order-v3.xsd urn:schemas-bossfed-co-uk:OP-Order-v1 OP-Order-v1.xsd" <OrderType Code="PUO">Purchase Order</OrderType> <OP:AdditionalOrderReferences xmlns:OP="urn:schemas-bossfedco- <OP:OrderReference ReferenceDesc="Order Type"> – 66 – Here the root <Order> element contains a number of namespace statements, all of which we will ignore, but which tell us where to find the original definition of the schema — in this case in both the BASDA and BOSSFed web-sites. Subject to any further statements, the definition of every element in the schema is expected to be found there. As it happens, there is an element <AdditionalOrderReferences> that is not defined in the BASDA namespaces given at the start, but in a namespace on the BOSSFed website. For the purposes of the schema above, the prefix OP (it could have been anything) is added to the elements concerned including the initial element. The source for the OP elements is given in a namespace attribute of the highest element concerned. We’ll quote the full element names in our template, including the OP prefix, and again we will ignore the namespace attribute as it only describes where the definitions of those elements are held, should we wish to look them up. Note the use of the colon as a separator between the prefix and the element name, and between xmlns and the prefix name. • Release ID: Standard Powered by PHPKB (Knowledge Base Software)
global_05_local_5_shard_00002591_processed.jsonl/18861
Today I learned through some ESL listservs about a site called Everyday Life.  It’s sponsored by a North Carolina-based organization called GCF Learn Free. There are seventeen excellent interactive lessons with images, text, and audio that help English Language Learners with…everyday life. These lessons include ones about ATMs, jobs applications,  reading a bus map, etc. You have to register for it, but it only takes seconds.  If you have trouble getting the cursor to write in the boxes, just use the tab key to move down.  That seemed to do the trick. I’ve placed the link on my English Themes For Beginners under both Favorite Sites and Life Skills.
global_05_local_5_shard_00002591_processed.jsonl/18903
News & Views » Columns In The Flesh Journey is still measured by Infinity, Evolution, Departure, and Escape, the albums that made the band stars between 1978 and 1981. The hit singles, the lengthy tour schedules, even the albums’ iconic galactic scarab artwork combined to make the San Francisco group legitimate arena rock superstars in an era of emerging FM radio and increasing acceptance of pop crossover. Hawk-faced vocalist Steve Perry split after 1986’s Raised on Radio, of course, barring the faulty 1996 comeback Trial by Fire. And while Journey continued under the guidance of founder and lead guitarist Neil Schon, it’s their string of can’t-miss hits on the cusp of two decades that still define the group’s legacy. Well, the band’s legacy, anyway. As their July 24 performance at DTE Energy Music Theatre proved, Journey’s music runs deeper for a lot of people. Moments and memories figure in. But the band’s best songs seem to inspire social harmony, at least for three minutes. These days, Journey tours regularly with Perry stand-in Steve Augeri, and it works because he’s been accepted by the group’s thriving contingent of diehards, but also sounds enough like his predecessor to keep casual fans sated. However, this summer there’s a new kid in town. With Augeri sidelined by illness, Journey’s latest shed tour features Jeff Scott Soto, whose credits include a stint in Yngwie Malmsteen’s band as well as something called Humanimal. (Not be confused with the short-lived 1983 TV series “Manimal.”) Soto is a really strong vocalist, so instead of struggling to emulate Perry’s laser-beam vibrato, he can get away with a style that mixes grainy power with effortless key changes. Before the show at DTE, small groups in the parking area competed with wattage and open hatchbacks in a friendly game of “Who’s the Bigger Journey Fan?” They created a medley of classic rock staples that accompanied the amble to the front gate, but that’s where nostalgia largely ended. Memories are nice, from Gran Torino makeout sessions to roach clips and high school slow dances. But while Journey’s big hits still bring down the house, it wasn’t the conquests of 25 years ago that made a burly dude in prison tats hug a perfect stranger to the sound of “Stone in Love.” From a wound-tight “Any Way You Want It” to the sing-along “Lights,” a rumbling “Wheel in the Sky,” and soaring “Separate Ways,” Journey and Soto came to play. But it was the crowd’s reaction to these durable radio hits that became the real story. It wasn’t nostalgia or worse, irony, that brought a sold-out crowd to its feet for the ballad “Open Arms.” No one was singing along at the top of his or her lungs, eyes squeezed shut and fists upraised, because someone on a blog wrote that liking Journey is suddenly cool again. No one commanded 15,000 people to simultaneously perform a textbook fill on their air-drums during the pre-chorus of “Wheel in The Sky.” And no one could have predicted the stunning sense of emotion that swept upwards from the stage, through the pavilion, and out onto the lawn during the ballads. From “Open Arms” to “Faithfully,” it was as if the switch everyone has nowadays, that switch that turns off empathy, community, or even humanity in a rabid quest for self-preservation, suddenly shorted out. The jail tat guy’s ham steak arms engulfed the middle-aged Tiger fan standing next to him. Teenagers screamed Journey lyrics into the sky, swaying with arms entwined. Lank-haired women looked into the eyes of uptight corporate outing jowl enthusiasts. It was blissful mayhem, and Journey — not nostalgia — made it happen. Earlier that evening, during an opening set that included a few lesser-known jams — deep cuts the biggest fans always hope for — a guy stood alone in a long curve of empty pavilion seats. He wore black Nikes, black jeans, and black tour T-shirt tucked into his braided black belt. His haircut was uneven, like he might have done it himself, and his moustache wasn’t grown as a result of having read a trend forecast. This guy was a Journey fan, and he was hearing the real thing, Soto and all. His shoes were close together as he bent at 35 degrees, wailing away frantically on an air guitar, his fingers frantically emulating Schon’s fretwork in a mix of concentration and release. It was current for him, as now as it had always been. He was un-ironic, un-nostalgic, and completely unworried about what anyone in the quickly-filling pavilion thought of him. He was the coolest guy there, and he was in harmony.  Johnny Loftus is music editor of Metro Times. Send comments to Email us at
global_05_local_5_shard_00002591_processed.jsonl/18963
Once again there is a debate with a new user going on about a closed question appealing to the fact that the site name is Personal Finance & Money. Typical exchange: High Rep user: Closing your question because it isn't about personal finance. OP: Well, it is personal to me, and the site is called "Personal Finance & Money" after all. High Rep user: Still off-topic, read the FAQ. In this case OP kind of has a point, it is confusion. If we aren't opening the scope to non-personal finance questions why confuse the issue with the naming of the site? And again today Since this site deals with "& money", I felt it was on topic. | | • 5 We just got that logo, now you want to change it? – MrChrister Mar 29 '14 at 1:16 • Would this mean that money.stackexchange would just be called Personal Finance? Is that problematic having the url and the name be non-overlapping rough synonyms? – NL7 Apr 1 '14 at 19:28 • 1 @NL7 See my updated answer for the URL aspect. We wouldn't be the first SE with a non-overlapping mnemonic & full name. – Chris W. Rea Apr 1 '14 at 19:43 • @Chris - Thanks, that's helpful. Then I guess I have no real opinion on the change either way. I come here by bookmark icon or by the SE dropdown box anyway, so URL is not very critical. – NL7 Apr 1 '14 at 20:12 • JohnFx: Congratulations. Now that you've become an elected representative, can you get Stack Exchange Inc. to follow through on this one for us? :) – Chris W. Rea Apr 10 '14 at 1:29 • Are macroeconomic questions on-topic here? I see a fair number of them as well – Nick T Apr 17 '14 at 16:18 Historical context I chose and proposed the name Personal Finance & Money in my original Area 51 definition for this site for one simple reason: the name we had under the Stack Exchange "1.0" model, prior to the "2.0" changes, was Basically Money. Keeping "Money" was a tip of the hat, continuity, w.r.t. the site's original brand. While I'm talking about the original name, the "Basically" part was meant to indicate the site's general goal to help people be financially literate, being the basics needed to manage one's own finances and investments—i.e. not a site for quants or pro traders ("it is my day job") type questions, not for corporate finance (beyond what retail investors would want to know for investing, or self-employed individuals operating as a corp), not for academia. But those restrictions were never spelled out. Early on, I cared more about getting questions and building a community, and less about corralling the topics. Then, having to later go through the Area 51 site definition process under the evolved SE 2.0 model forced me to think more about what the site should really be about, and I decided the laser focus and root name needed to reflect personal finance (including what I think of as household & family finance) as the umbrella over other topics. I didn't want the proposal to fail for lack of clarity on this! The original site was loose (e.g. economics was never explicitly off-topic) because I didn't have to gain community support for launching—I owned it. But for SE 2.0, I had to convince people to support the concept, so there needed to be a firm-enough concept to support. But at the same time, I also wanted the "& Money" in the name, following "Personal Finance", to help transition the existing brand and community into the new SE 2.0 world. "Basically Money? Yeah, that site has become the new [Personal Finance &] Money site under stackexchange.com."  That was my thinking. So "Money" is baggage, from the past. Baggage is all. By itself, it is a vestige, not intended to be defining. This definition plus community-driven meta evolution since are what define us. Back to the present IMHO, we'll always have the "money" in our URL money.stackexchange.com. I don't see any reasonable way of replacing that without upsetting a lot. And even if it could be done, I like the mnemonic. (Consider how Home Improvement has the URL diy.stackexchange.com.) Yet, three years later, if taking the word "Money" out of the full English site name, and the logo, would alleviate some confusion and sharpen the focus that had been intended, then I'm in favour of doing that. But please keep the main URL as-is. However, without "Money" in the name, the URL might not be as memorable to new users who would only see this site referred to as "Personal Finance". Let's do it. It would also be advisable for Stack Exchange Inc., coincident with removing the "& Money" part, to also add a domain name alias for the site: • personalfinance.stackexchange.com should be added as a permanent redirect (301) to the existing money.* domain name. Your thoughts and opinions are welcome. You folks govern this place now :) | | • 3 Thanks Chris for the complete explanation with context. While I feel its something we MAY want to change, there is NO pressing need to do it Now ... we can take this up with some other upgrades. It would also help get SE inputs on the efforts to go about doing it. – Dheer Apr 2 '14 at 8:16 I don't think it matters. Every StackExchange site I've ever participated on has had this exact problem: But XYZ should be on topic here! The "& Money" just adds local flavor to the problem. It's also been my experience that most people who come, post one or two off topic questions and leave were never really interested in the site, but rather looking for a place to talk about their off topic ... topic. | | I will take a stab at outright dissent. Leaving Strictly "Personal Finance" give no room to move into small proprietorships or small business. The community has been against that move for a long time, but as other SE sites close, we are getting more and more "well, where then" questions. We can invite not only those questions but the people who answer them. Even if that doesn't happen anytime soon, it could. I vote leaving it as it is. (But I defer to the considerable majority) | | • I'm leaning towards agreeing here. We should probably start the discussion of what topics can be added to on-topic in the short term. – JTP - Apologise to Monica Apr 11 '14 at 20:51 • I agree here. I don't see any reason not to broaden the scope of the site. I do think economics should remain off-topic though because it has its own site and is more theoretical. As long as questions are focused on something directly applicable to the asker and have a tie to financial matters I think it should be on topic. – JohnFx Jul 6 at 16:14 I'm open to the change but not for this reason. New members often push back on what's on topic, and after a bit of debate, are never seen again. Perhaps what's needed is an invitation to a new user to read through what's on and off topic and read through the top dozen questions. Once they understand the scope of the board and the fact that it's not a discussion board they are welcome to stay and find value here. That said, the Money is probably either misleading or redundant, depending on how much beer you've had. | | • Agreed Money is redundant, or implicit in personal finance – Dheer Mar 29 '14 at 6:18 • 3 It's there for historical reasons. The site was money, before it was personal finance. – C. Ross Mar 29 '14 at 11:45 • 5 Understood Ross. But Apple Computer dropped the 'computer' and we survived. And an entire Planet was cancelled. So I'm flexible here. – JTP - Apologise to Monica Mar 29 '14 at 14:56 • @JoeTaxpayer I'm not saying it's non-negotiable, just trying to give context. – C. Ross Mar 29 '14 at 20:09 • @Joe Apple Computer dropped the Computer when Paul and Ringo let them, not a day before:-) – littleadv Mar 30 '14 at 0:47 • 1 Ok. Now can you explain Pluto to me? – JTP - Apologise to Monica Mar 30 '14 at 2:08 • @JoeTaxpayer - No one thought it was big enough to be a planet if it was only the size of Texas. (I may have to avoid visiting Texas for a few years because of that comment--they seem to take those things personally.) For the pedantic: I mean diameter; not surface area. – NL - Apologize to Monica Mar 31 '14 at 18:32 • @C.Ross Your comment re: context made me want to answer. You're both right, IMHO. – Chris W. Rea Apr 1 '14 at 19:45 • @NathanL - what is the diameter of Texas? =D – warren Apr 11 '14 at 14:17 • @warren Thanks for the additional pedantry, I was actually referring to pluto's diameter, which is still a bit larger than width of Texas, but now my joke is ruined (if it was ever even mildly funny) so thanks for making me explain it. – NL - Apologize to Monica Apr 15 '14 at 16:42 • @NathanL - hence the grinny face (=D) .. I was trying to add to your joke that Texas doesn't really have a diameter. But I apparently failed :( – warren Apr 15 '14 at 22:30 I'm deferring this for now. Initial concerns when the proposal was still incubating revolved around "Personal Finance" and "Money" not being mutually exclusive in any context, and therefore redundant. We've grown to realize that there's a bit more wiggle room within interpretation than we believed, which is how we've arrived to this discussion. Given that: • We have a codified design in place, with branded promotional items • The URL itself remains money, which would be extremely difficult (practically impossible, as in could be a six month drop to almost no traffic) to change • There's not really any conclusive evidence that dropping money, while keeping the URL the same will have any profound impact ... we're reluctant to consider the change at this time. While having "& Money" provides a cop-out for not reading the enormous amount of help we give users asking their first question, I don't feel that taking it out is going to make much of a dent. The size and establishment that you've achieved is commendable - this site has come quite a long way. However, with that, you're going to see your share of off-topic, or marginally on-topic questions because people are going to try floating them in the hopes they receive an answer before they're closed - no design or UI change is going to prevent that. If we can come up with compelling evidence that the change would prevent the majority of these, we're open to discuss it again - which is why this is marked as deferred. Minor changes to text only work when people read and care, and I just don't see the rewards of this being large enough to justify the work involved. I'm not saying that it won't help, I just don't believe it will help enough. | | This thread looks a bit old, but I came into meta looking for exactly this topic, so I'll put in my thoughts as a relatively new user. What this community apparently wants is questions on "personal finance and personal money issues." It's no doubt true that if you read the help, you'll see that broader questions about money are out of scope, but everything else about the site enforces the idea that it's "personal finance" & "money" (with "money" left broad, and the ampersand taken to mean union of topics, not intersection.) It's not just the name but also, for example, the logo, which visually separates the "personal finance" from the "money" by using different scripts. The list of active questions also tends to give this impression — depending somewhat on when a user lands on the page relative to when the moderators close and put on hold off-topic questions. As a newcomer, it also seems to me that there's not a lot of consistency on calling some things in or out. (Maybe there is a consistency that I don't see, but that doesn't help.) I don't think it's bad to keep the URL starting with "money" while changing the logo to "personal finance" only. No one will ever notice except the people who hang out here now. That would be a relatively easy change that would clarify what the group seems to want here. | | • +1 and I completely agree with everything you wrote above. With respect to the consistency that you're not seeing, do the other questions at meta about small business questions, economics, etc. help clarify that we want everything to somehow relate (and not too weakly) back to personal finance? – Chris W. Rea Dec 4 '15 at 14:50 • 1 @ChrisW.Rea I get the spirit of linking to PF. The "inconsistencies" - IMO come b/c the rules - to some extent - deal with why a poster wants an answer not what is asked. Example linked. A 7k+ user challenged this question because on its face it's just about bond rates. Most times I think this question gets closed as being "economics" - In this case a 8k+ user defended it on the obvious grounds that one might invest based on the answer. Feels arbitrary. money.stackexchange.com/questions/56269/… – user32479 Dec 5 '15 at 2:47 In my humble opinion (since not being a moderator), the stack should use only 'Money' in the name, as it is in the URL (Sorry, If I offend anybody with my opinion). The community and the stack activity would be more significant with a broader spectrum, by allowing more tags (e.g., startup) & meta. The .money subdomain rocks; e.g., there is a stack called simply 'Travel', travel.stackexchange.com. If the community grows too big, a weighted 'tag' graph network, cluster analysis would be useful to separate it to smaller parts. PS: I just arrived some days ago at the Stack, and had some arguments about the confusing topic (okey, the topic isn't confusing; it's more about how it 's handled). And as I read some comments, it is quite popular here. If the Stack name would focus on a smaller interest, then a new Stack should be created (proposed) to handle the left tags. And since the approval of the proposal (Area51) is quite a long process, then there would be a lot of users (even for years) without a proper Stack for their questions. That would be significant damage (even for the people, even for the SE company). | | You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_05_local_5_shard_00002591_processed.jsonl/18973
How to Use KMS Activator to Activate Office? KMS is the Key Management Service which is used to activate Microsoft Windows and Microsoft Office. This ensures that the software is licensed by Microsoft. It is used by volume license customers, like for medium to large businesses, and schools etc. KMS is the best tool for activating the various versions of Office and Windows.[…]
global_05_local_5_shard_00002591_processed.jsonl/18977
We drove through town like we normally do and I’m sorry to say, we saw the same things we normally do. It’s so hard to see drug dealers, pimps and prostitutes, horrific poverty and blight. It’s hard to see but the root is clear: SIN. She wants MERCY. Yes, mercy. Matthew 5:7 says, “Blessed are the Merciful, for they shall obtain mercy.” We saw a young lady, thin and looking sickly, walking down the street looking for her next customer. Unfortunately, she found one. I’d bet the farm that she would rather be home, if she had one. I’d bet she would rather be at a job that paid her enough money to eat and sleep in her own room. I’d bet she’d rather watch bad television instead of wondering if she’ll OD this time. She wants MERCY. Mercy is God withholding from you what you deserve. God loves her, yes He loves the prostitute. And she wants mercy. Why doesn’t someone stop and tell her about mercy? Where is the Church? Where are the preachers? And where are the self righteous? They are watching bad television, at their own home complaining about going to work in the morning. All she [we] has to be is obedient: God leads us, He has gone before us to where we are, He has already defeated the Enemy but we still tell Him no. Obedience is the key to blessing, the way to His provision. Does she understand about what Godly provision is? What is blessing, she wonders. How can she understand what Godly obedience is if there is no one to tell her? “Who remembered us in our lowly state, for HIS mercy endures forever; And rescued us from our enemies, for HIS mercy endures forever; Who gives food to all flesh, for HIS mercy endures forever.” Psalm 136:23-25 Mercy. All she wants is mercy…but what she NEEDS is Jesus, and with Him she will be victorious. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/19004
All articles Robotic Process Automation. Part 1. About the Technology Robotic Process Automation (RPA, Robotics) is a revolutionary technology that allows organizations to significantly increase operational productivity by replacing people with robots in order to redistribute the released human resource to perform more complex tasks that bring a large added value. From a technical point of view, it is a technology by which organizations configure software (software robots) to perform repetitive, mechanical operations at the user interface level. Software robots perform the specified operations in the same way that people do, receiving, sorting, processing data and performing certain actions with them, without changing the IT landscape of the organization. RPA allows you to radically change, without exaggeration, the very approach to executing repetitive tasks related to manual input and processing of data. The peculiarity of the approach is that within the framework of this technology, one application (software robot) interacts with another application not through the API (Application Programming Interface) or the integration bus, but through the existing user interface. That is, one program communicates with another program, simulating the user’s actions. This in turn determines the main advantages of using RPA. Since the existing application-user interface is used, when automation with Robotic Process Automation, the existing IT landscape remains unchanged. The RPA infrastructure is deployed on top of existing IT systems. For many companies that have legacy systems, it is very undesirable to touch upon them (there are no specialists, they are poorly documented, it is very expensive), this can be a solution to many problems. In addition, when using this technology, existing controls, regulatory procedures and reporting remain unchanged. Due to the fact that Robotic Process Automation does not change the IT landscape, the implementation is very fast. Tangible results can be achieved in the first 2-3 weeks of piloting. If, for some reason, it is necessary to return to the previous scheme of work – it is enough to disable the robot and return the processing task to the employee. By its nature, Robotic Process Automation is gradually introduced, process by process, and the result is noticeable after the robotization of the first process. Costs are significantly reduced and operational performance increases with little investment in technology, especially when it comes to using open source solutions that do not require the cost of licenses. Results of Robotic Process Automation First of all, robots are ready to perform assigned tasks 24 hours a day. They are not sick, do not go on vacation, they do not have a bad mood. Robots are not mistaken. Once correctly set up the robot performs its tasks without errors, which will periodically occur in humans. When the executable process requires modification, it is enough for the robot to change the rules of work (modify the script), employees must be retrained and this is not a fast process. Robots are 100% documented their actions. This is especially important for compliance with various legislative and industrial requirements (be in compliance with). According to various estimates, depending on the type of robotic process, one robot replaces three to eight people in performance. The robot does not need a workplace in the office center and medical insurance. According to the experience of implementing RPA, all this gives 40 to 80% reduction in direct costs for processing business processes. Add to this the simplicity of scaling technology: if you need to speed up the execution of a business process, you simply connect another robot, instead of looking for a new employee in the market, organizing a workplace for him, conducting training, etc. How Does iIt Look in Real Life? Does this mean that the employer takes the employee from the workplace and gives it to the robot? This is an extreme case, although, we will not dissemble, and such a scenario is possible. In practice, there are two most common approaches to software robotization. Scenario # 1. Placement of the robot on the employee’s computer. In this case, the robot does not replace the employee by 100%, but only performs some similar tasks, acting as a digital assistant. As a rule, at the same time tasks that arise from time to time and do not require the allocation of an employee for a full-time job are robotized. The solution can be to install an employee of the robotization module on the computer in addition to the existing applications. When a task for the robot appears, the user simply starts the program, which automatically executes the job. It must be understood that at this time the computer is occupied by a robot and the user can not perform other tasks on it. But while the robot is doing its job, the employee can make a phone call to the client or discuss with colleagues a joint project. Scenario # 2. A dedicated virtual workstation for the robot. In this scenario, a virtual environment is created, in which only robots work. This environment can contain hundreds of different robots, performing their tasks at least round the clock. The scheme is applicable for the mass use of software robots for a large number of tasks. In a word, Robotic Process Automation looks very promising. But will everyone be able to take advantage of the opportunities that are opening up? Who will benefit from software robotics most, and for whom this technology is not applicable? About this we will talk next time.
global_05_local_5_shard_00002591_processed.jsonl/19063
174 The Depiction of Race in Uncle Tom’s Cabin Alyssa Desautelle In Harriet Beecher Stowe’s novel, Uncle Tom’s Cabin, she depicts her main black characters, Eliza, George, and Harry by deliberately whitewashing them. While running away, Eliza is able to get as far as she does because she appears “so white as not to be known as of colored lineage, without a critical survey” (35). By making Eliza only one quarter black and three quarters white and putting so much emphasis on it through the text, Stowe attempts to catch the attention of her intended readers and relate Eliza more to them. If she looks like them, then maybe they would care more about Eliza and that would affect their feelings towards slaves in their real lives. Another example of how Stowe whitewashes Eliza is how she was raised. She is like family to the Shelbys, practically raised by them, so in effect, she is describe to act differently from the other slaves in the text. Her conversations with George appear clearer then the conversations between the other slaves, highlighting how Eliza and George are “different” and why the readers of the time should have cared about them.  This portrayal of slaves contrasts with Frederick Douglass’s portrayal of them in The Heroic Slave. He depicts Madison Washington as unapologetically black and does not try to undermine this as a part of his character. Yet Douglass also tells the story of Madison Washington from the perspective of a white person, in his attempt to make the story relatable to the intended audience. These two texts both appear directed towards a white audience of the time. Icon for the Creative Commons Attribution 4.0 International License The Depiction of Race in Uncle Tom's Cabin by Alyssa Desautelle is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted. Share This Book Comments are closed.
global_05_local_5_shard_00002591_processed.jsonl/19069
As a practical (real-world problems) point of view, it's important we could solve optimization problems as quickly as possible (for instance, to release a daily schedule). Maybe a problem with many variables Or constraints is solved in a few time but, another takes a long time to solve. My questions are: • What does "hard problem" mean? • Is there any way to figure out such problems? • How can we solve these problems without using some advanced algorithms? (In an optimal sense) • $\begingroup$ Regarding your last bullet item, do you consider branch-and-cut to be an "advanced algorithm"? $\endgroup$ – prubin Aug 29 '19 at 21:02 • $\begingroup$ @prubin, I mean algorithms like Branch and price (and cut), benders or something like these. $\endgroup$ – A.Omidi Aug 30 '19 at 12:09 I'm going to stay away from asymptotic stuff and stick with problems whose dimensions seem manageable with current software. (Any problem is hard to solve if large enough. I once worked with some folks who proposed a spatial model so granular that the constraint matrix would not fit in memory.) • Slow improvement in the best node bound makes it hard to solve a MIP, at least if "solve" means "to proven optimality". It's not uncommon to run a model with multiple sets of input parameters and have some instances solve quickly and others exhibit slow bound improvement. @nikaza mentioned "big M" models with large values of $M$. They tend to have weak relaxations, but it also happens with other types of models. • Bad numerics can make your life miserable. By this I mean situations where rounding error results in incorrect solutions, slow progress or the solver just surrendering. Again, "big M" is sometimes the culprit, but it can happen for other reasons, including poorly scaled variables and constraints. • Dealing with multiple objectives can be hard, in part because there may be no definitive "correct" way to balance them. I think the difficulty here is usually not that the model is hard to solve (although that can happen, due to numerics, if you optimize a weighted combination of objectives and use really big or really small weights for some). The difficulty tends to be needing to solve the model repeatedly with different trade-offs to find a solution that makes everyone happy. • Symmetry can slow progress of the solver, largely because equivalent solutions can exist in different parts of the search tree. There are ways to exploit symmetry in some cases (if you know enough about the symmetry in the model at the outset, and possibly if you are coding your own solver) and ways to mitigate it (either by modeling or, with some solvers, by asking the solver to try to mitigate it), but I've dealt with instances where my best efforts were not enough to get the solution time down to something I was happy with. | improve this answer | | • $\begingroup$ @nikaza, Paul Bouman and prubin, many thanks for your useful notes. $\endgroup$ – A.Omidi Sep 2 '19 at 5:23 MILP problems are hard in general, in the sense that there is no algorithm that solves any given MILP in polynomial time (unless P=NP). With respect to when it's hard in practice, unfortunately, the answer is that, in general, we can't know until we try to solve them. We do know some things that usually make the problems harder to solve but even then it's a rule of thumb: 1. Degeneracy/multiple global optima 2. Using full integers instead of binaries 3. Having too many integer variables 4. Using large M in big M notations 5. Having very large variable ranges 6. Overestimating feasible regions 7. Having dense problems, i.e., not sparse Because these problems are generally quite hard we need advanced algorithms/solvers to solve anything meaningfully big in practice. | improve this answer | | • 3 $\begingroup$ I would add one more rule of thumb: symmetry. (Having many equivalent solutions which can be obtained by a permutation of the variables.) $\endgroup$ – Alberto Santini Aug 31 '19 at 17:37 In the context of computational complexity theory, a hard problem typically refers to an infinite set of problem instances for which it is widely believed that the worst-case amount of work needed to solve the problem grows super-polynomially when the size of the problem instance grows. Here "amount of work" is typically measured in elementary operations (e.g. CPU instructions, that typically take a fixed amount of time), and the "size of the problem" instance is typically measured as the amount of symbols need to express the problem data (e.g. number of bits). Mixed Integer Programming is such a hard problem. However, the theory only tells us that for any instance size, some instances that are difficult to solve must exist. There may be plenty of instances for that same size that are easy to solve and the theory doesn't say anything about a fixed specific instance as the amount of work required to solve a fixed single instance is fixed as well. The above mentioned hardness is often proven using a reduction proof: you show that if you can solve a new problem class in a certain (e.g. polynomial) amount of work, you can solve another problem that is known to be hard in roughly the same amount of work. Such hardness proof are thus relative: they just argue that problem A is at least as hard as problem B. In come cases, it is also possible to prove that a subclass of problem instances is significantly easier to solve. For mixed integer programming, these are for example instances where: • The constraint matrix is totally unimodular (the LP-relaxation will give you an integer solution) • You have total dual-integrality (the LP-relaxation will give you an integer solution) • The number of variables is bounded by a constant. (I don't recall the exact reference on how to do this, but I remember that it involves using the LLL-algorithm) • The number of constraints is bounded by a constant, and the size of numbers in the instance are also bounded by a constant. This result is due to Papadimitriou. If we are talking about a single problem instance without any additional information, the best you can do is try to solve it. If it turns out that the LP-relaxation is integer feasible, you stumbled upon an easy MIP instance. In general, solving a MIP to optimality requires two things: (1) a solution and (2) a proof that the solution is optimal. While finding a feasible solution is already a hard problem according to computational complexity theory, in practice the main difficulty is often finding the proof of optimality. If the LP-relaxation of the MIP turns out to be integer, this proof is relatively easy: it is the same as the proof that the LP is optimal (which you can check using duality theorems). If the LP-relaxation is not integer, the only way we know involves some form of enumeration. In fact, all branch-and-bound approaches are just a clever way to enumerate all possible integer solutions, cutting away only the part of the solution space for which it is known that the optimal solution can not lie there. | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/19082
PAST REDEMPTION S2 | The Coming Storm A dead girl is found in an open field tied to a hay roll. • Where did she come from? • Who killed her and why? It’s the central mystery of Past Redemption S2 | The Coming Storm and reveals the dark sinister world of trafficking of young women. In addition, what is revealed in 8mm home movies shot more than 20 years ago is a fuel that ignites a war that may lead to the final days of the powerful Wesley crime family. Dark, compelling and engaging! The series drives down a road that may take us Past Redemption. Support our INDIEGOGO Campaign starting June 19, 2017 pastredemption Password Reset
global_05_local_5_shard_00002591_processed.jsonl/19121
18. The Gaze of Heaven The rattling of the truck carried Holland away from what was left of the school. Images of what had happened whirled back and forth, along with scents and tastes – the way that the whole school had been there. The opening of a vast eye in the sky. The shuddering of the buildings. The way each and every part of Holland’s body had lifted up, as if leaping for joy, and streaked up towards the heavens. In one long, disorienting moment, Holland remembered seeing other students, friends, teachers, and yes, even some enemies whose sins had seen so petty and mundane, in hindsight drift up to the sky. Clad in their uniforms, the bright red school ties and socks seeming to flare and brightly splash against the sky. Holland had watched with trembling fear, feeling only a small lift towards the sky. Holland had swallowed, had looked up into that dreadful gaze. It was not a human eye – not by any metric. The clouds had parted in a rusty roll, and shown at the edges, deep purple ridges of what could only be flesh. The milky surface of the eye ran through with lines of blue and black around the edges, visible from so far away that they had to be as long as lines of silver in mines. The centerpiece of the eye was golden and slitted, looking perhaps like Sauron’s must have, in the eye of many children who read of its colour but not of its substance. It was an eye – it was definitely an eye. Vast and brooding, and watching. It had focused, it had slid around under its glossy sclera, and it had looked. The huge black iris had tightened and cinched down. Holland was no child. Holland had done some study of physics, of astronomy, and even to a young mind that had a bad habit of nodding off and hiding in the back of the classroom to avoid being called upon to make a creak-voiced, nervous answer, there was something very wrong about an eye emerging from the clouds. It couldn’t be that some vast dreadful thing had hovered over the earth and leant down – there was… gravity. Weather. It would affect… the clouds, maybe? Or perhaps it would ruin the whole… sun? Would it block out the sun, or something like that? Either way, to seem so vast from down on the earth, it would… Holland gave up, for the twentieth time and just relaxed. The window made a reassuring, real, thock sound at the impact of a weary forehead, and the face beneath that forehead gave a weary, worried, smile. Everyone had hung in the air. Some higher than others. They had been staring, staring up at the eye, but not screaming. There was no fear – it seemed like Holland’s was the only set of eyes that looked at it, and not into it. Only Holland saw what it had to be, what it might be, and everyone else… saw into it. For a moment, Holland had felt empty. What did everyone else experience, in that moment? What was it like? And then, the eye had blinked. And when it closed, everything it looked at was gone. The people were gone, no longer hovering in the air. The school buildings were gone. The grass was gone. A vast circle of dirt, some six inches deep, eerily uniform, but not glossily so, had met Holland when the eye’s influence disappeared and gravity asserted itself. And out on the edge of the cow paddocks, shaken by the experience, a bleary Holland had started to walk. State Emergency Services were there – minutes after Holland had left. They had had to report the disappearance of the buildings, the trees, reconstructing from photos and the school’s website. They started a search, spiralling out from the site, looking for signs of survivors. Then signs of the dead. Eventually they started searching for bricks and mortar, for signs that there had been a school at all. And Holland sat in the cabin of the truck, eyes bleary, shaken, surprised, being driven towards home by a farmer who had not a mean word to say in the hot summer day, who had seen kids leaving school in the past, and figured dropping one in town wouldn’t hurt anything. After all, it wasn’t that small a town that truants were a big deal – and on such a hot day, maybe a few blank periods were worth a sneak into town to spend time at the pool? Either way – wasn’t his concern… and from his eyes, this kid needed some rest. Holland’s eyes were closed, and Holland wore a smile. Still, it hid behind it a loop, running over and over in a confused, teenage mind: What was it? became What did it do? which then asked Why spare me? before, Is it because I’m… and there it stopped. A breath, a heartbeat, and it started again. … over and over and over again. Magic loves patterns. Comments are closed.
global_05_local_5_shard_00002591_processed.jsonl/19136
With the concept of fusing the internet and youth culture into accessories and clothing designs, LURS® has soon became one of the most talked about brand in the market since its establishment in 2018, especially for its exquisite accessories. After launching the well-known Emoji Collection that contains a variety of accessories such as necklaces and bracelets, many celebrities has also started to show their love of the brand by wearing its product in various occasions.  Welcome Newcomer
global_05_local_5_shard_00002591_processed.jsonl/19138
TASK 1 : The Great Gatsby movie questions As you watch the great Gatsby, make your own notes using these questions to organize your notes. You may use a combination of short answers and paragraph-style answers. It will be evident from the question which length of an answer is needed. • What is the main setting of the movie? (time and place) • Who are the main characters? Which one is the protagonist? Which one is the antagonist? (who are they, describe them briefly) • What is the essence of the problem or conflict that lies at the heart of this movie? • How are the attitudes and perspectives on life from that era reflected in the film? • How is the story helped by camera angles? Provide several specific examples. • How is the story helped by music? Provide several specific examples. • How is the story helped by costumes? Provide several specific examples. • What is the overarching theme of the movie? Defend your choice. • How do these production choices (camera angles, music, costumes) contribute to the overarching feeling that the movie is existentialist, modernist, or postmodernist? Choose one of these three styles and show how production choices helped to illuminate the literary style of the film. • Is this movie mostly existentialist in outlook or mostly modernist in outlook or mostly postmodernist in its style? Why do you think that? TASK 2 : Script You will write a script for an oral presentation. Imagine that you are the director of the movie . You have decided to add one more scene at the very beginning of the movie immediately following the opening credits. The purpose of the scene will be to clue the audience on whether this is going to be an existentialist, modernist, or postmodernist movie. Explain your ideas about what you would include in this brief opening scene. It should be abundantly clear from what you say how your creative ideas would reflect an existentialist, modernist, or postmodernist approach to this particular movie. • Write a script, jotting down some big ideas that you don’t want to miss. Your script must include at least one visual aid (a graphic, or a slide). • Your script will be for a presentation of about 2-3 minutes in length. • Submit only a script, not a recording. Be imaginative, creative, engaging, and detailed. Use Discount Code "Newclient" for a 15% Discount!
global_05_local_5_shard_00002591_processed.jsonl/19139
Crop Circles Explained 01/24/2013 19:51  According to some estimates, crop circles appear every week somewhere around the world. The strange circles and patterns appear mysteriously overnight in farmers' fields, provoking puzzlement, delight, and intrigue for both locals and the news media. The circles are mostly found in the United Kingdom, but have spread to dozens of countries around the world in past decades. But who — or what — is making them? Milk Hill Crop Circle CREDIT: Handy Marks | public domain View full size image Early claims of crop circles mowing devil [Pin It] A woodcut pamphlet that some claim represents an early crop circle. View full size image The woodcut was actually used to illustrate what in folklore is called a "mowing devil" legend, in which an English farmer told a worker with whom he was feuding that he "would rather pay the Devil himself" to cut his oat field than pay the fee demanded. The source of the harvesting is not unknown or mysterious — it is indeed Satan himself, who can be seen in the woodcut holding a scythe. According to the original text of the legend, the devil "cut them in round circles, and plac't every straw with that exactness that it would have taken up above an Age for any Man to perform what he did that one night." This image and story cannot be related to crop circles because it states explicitly that the crop was cut (i.e., harvested) rather than laid down, as occurs in crop circles. Some claim that the first crop circles (though they were not called that at the time) appeared near the small town of Tully, Australia. In 1966 a farmer said he saw a flying saucer rise up from a swampy area and fly away; when he went to investigate he saw a roughly circular area of debris and apparently flattened reeds and grass, which he assumed had been made by the alien spacecraft (but which police investigators said was likely caused by a natural phenomena such as a dust devil or waterspout). Referred in the press as "flying saucer nests," this story is more a UFO report than a crop circle report. In fact the first real crop circles didn't appear until the 1970s, when simple circles began appearing in the English countryside. The number and complexity of the circles increased dramatically, reaching a peak in the 1980s and 1990s when increasingly elaborate circles were produced, including those illustrating complex mathematical equations such as fractals. [Image Album: Mysterious Crop Circles Gallery] Crop circle in Switzerland [Pin It] People inspect crop circles within a golden wheat field in Switzerland. The photo was taken on July 29, 2007. CREDIT: Jabberocky | public domain View full size image Theories & explanations Unlike other mysterious phenomenon such as psychic powers, ghosts, or Bigfoot, there is no doubt that crop circles are "real." The evidence that they exist is clear and overwhelming. The real question is what creates them.  Crop circle enthusiasts have come up with many theories about what creates the patterns, ranging from the plausible to the absurd. One explanation in vogue in the early 1980s was that the mysterious circle patterns were accidentally produced by the especially vigorous sexual activity of horny hedgehogs. Some people have suggested that the circles are somehow created by incredibly localized and precise wind patterns, or by scientifically undetectable Earth energy fields and meridians called ley lines. Triskelion Crop Circle [Pin It] Another triskelion crop circle. The symbol can be used to represent cycles, progress or competition. CREDIT: Thomas J. Sutter, Jr. | public domain View full size image Crop circle features While there are exceptions, virtually all crop circles share a set of common characteristics. Camera shyness. Crop circles have never been recorded being made (except, of course, for those created by hoaxers). This is a very suspicious trait; after all, if mysterious earthly forces are at work, there's no reason to think that they wouldn't happen when cameras are recording. The same thing is true with other explanations including alien spacecraft; the only things ever caught on camera making the circles are hoaxers. bird crop circle in England This design of three flying birds was created on Aug. 3, 2003, in the county of Wiltshire in southern England. The birds, which resemble swallows, have ever-diminishing circles trailing behind their wing tips. CREDIT: public domain View full size image No obvious human trace. Most crop circles show little or no signs of human contact. While many people consider this very mysterious, in fact it's quite logical: Hoaxers who devote the time and effort required to design and create the (often complex) crop circles are unlikely to carelessly leave obvious signs of their activities. Share |
global_05_local_5_shard_00002591_processed.jsonl/19140
How Fast is Enough? In October of 1851, Julius Reuter used carrier pigeons between Brussels and Aachen, closing the gap in telegraph lines that connected Berlin and Paris.  This gave his customers a latency advantage, enabling traders in Paris to learn of news from Germany ahead of their competitors. Since then, and especially in the last few years, many millions have been spent, and we are now measuring trading delays in microseconds instead of hours. Much has been written on the topic of reducing latency in trading systems, which begs the question: When it comes to trading, how fast is fast enough, and where will it end? A recent survey concluded that: • 71.6% of respondents rated latency as crucially important • Of which 13.8% need the lowest possible latency • The other 57.8% indicated they don’t necessarily need to be the very fastest, but that being slower does impact negatively on trading profits. So why the difference, and is it as simple as “need to be the fastest” or “fast is good but it doesn’t need to be the best”? Let’s analyze this. • Different firms or trading desks have different strategies.  Some are engaged in pure latency arbitrage (when you see a price divergence of the same instrument traded in two markets, buy the cheaper one and sell the pricier one.)  Others have market making strategies, statistical arbitrage strategies, news-based strategies, and so on. • For any strategy, there is a signal that is an input to the strategy, from which the strategy ultimately makes a buy or sell (or do nothing) decision.  A signal could range from a price move on a market to a bit of news on a news feed, to a research report published by an analyst.  The trading decision could be fully automated in a computer or it could be made by a human being, the principal is the same. • While different traders pursue different strategies, they are hardly all unique.  So it should be no surprise that when a signal is generated, there are multiple traders with strategies that will read that signal, make a trading decision, and generate orders into the market.  As those orders flow into the market, they will push the price of the security towards a new equilibrium point, until either the signal has been fully “priced in” to the security being traded, or until a newer signal is created in the market.  The first to trade on that signal will capture most of the “alpha” from the signal, and over time the alpha will decay. • Take for example a simple pairs trade, i.e. Assume that there is a strong price correlation security A and security B.  If the price of A moves up and B moves down, traders will buy B and sell A, pushing up the price of B and pushing down the price of A, until the prices come back into alignment or until some other event occurs. • So if your strategy arbitrages A and B, you are competing in the latency game with everyone else that trades that arbitrage.  But suppose also that while there is a correlation between A and B, there is also a correlation between B and C, and therefore between A and C.  You are now not only in a latency race with other traders who are trading A and B, but with those who are trading the arbitrage between B and C and those trading the arbitrage between A and C.  Essentially you are in a race with a set of strategies that are triggered by the same (or correlated) signals. • Once a signal occurs, the race begins, and the traders with the fastest systems will be the first to trade and capture the maximum possible alpha.  They, and other traders, will continue to trade until the alpha has decayed. So how fast is fast enough?  Very simply, to capture the maximum value of the trade, you need to be as fast as the fastest of the other traders who have comparable strategies, i.e. strategies that trade off the same or correlated signals. What if you are not as fast as the fastest of your competitors?  As long as the alpha has not decayed completely, there will be opportunities for slower traders to pick up some of the remaining alpha.  Which begs the question, how quickly does alpha decay? The answer to that question depends on two things: • How clear and unambiguous the signal is, which determines how long it takes for the market to digest, analyze, and process the signal.  In the case of a pure latency arbitrage strategy, the signal is the movement in the price of a common security on two venues, which is very clear and will immediately attract traders who will quickly (i.e. in microseconds) arbitrage away the price discrepancy.  At the other end of the spectrum, if the signal is an analysts report, investors will differ in their assessment of true value of the security, and it will take longer (hours, days, perhaps weeks) before they have fully appreciated the impact of the report and it is reflected in the price of the security. • How many firms are trading on that signal and how fast they are.  The more firms that recognize and trade on a signal, and the quicker they are to send orders into the market, the faster the prices will converge and the alpha will decay. So how fast is fast enough?  It depends on your strategy.  You need to be as fast as the fastest competitors who are trading “equivalent” strategies (i.e. strategies that are based on the same signals or on signals with strong correlation).  If you are not the fastest, you may still be able to capture some value.  In general, the more your strategy depends on clear and unambiguous trading signals, the more rapidly alpha will decay and therefore the more important it is to be at the very front of the pack. As the fastest traders continue to invest in infrastructure to reduce latency, the rest of the players need to either step up to the new higher bar, or trade different strategies, typically those where the correlations are less obvious or weaker.  Even within those strategies however, a competitor with an equivalent strategy and faster infrastructure will always gain a greater share of the profits.  150 years ago that advantage was measured in hours.  Now it is measured in microseconds, and firms at the leading edge are measuring in nanoseconds.  As long as someone is able to squeeze some more latency out of their system, the race will continue. Caveat:  These comments relate exclusively to the ability to capture alpha from trading.  Investors who are looking to enter or exit a position (either long or short) trade with the objective of reducing market impact, which is a quite separate discussion. One Response to How Fast is Enough? 1. Bruce says: very good analysis. on a tangent, your first paragraph triggered my infosec reflexes to contemplate where Reuters would be if falconry had been commonplace in 1851. tying that to the topic at hand, latency based strategies seem especially vulnerable to disruption by outside factors that interfere with technological foundations of communications and processing. could be an interesting competitive tactic. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/19148
Editorial. Migration and migration studies in late neoliberal times Risultato della ricerca: Articlepeer review This is the editorial presentation of the international rewiev "Socioscapes. International Journal of Societies, Politics and Cultures", the main call is entirely dedicated to the theme of migration and migration studies in the neoliberal era. The editorial proposes a reflection on the theme of global migration and their relations with the capitalist economy, as well as presenting the magazine and its structure. Lingua originaleEnglish pagine (da-a)1-16 Numero di pagine16 Stato di pubblicazionePublished - 2019 Cita questo
global_05_local_5_shard_00002591_processed.jsonl/19149
Question: Does Jack Daniels Expire? Can bacteria grow in whiskey? To get a sense of the answer, different drinks commonly found at bars (whisky, vodka, Martini, tonic water, peach tea, coke) were tested for their ability to support bacterial growth. However, only one of the four could grow in tonic water and two of the four in Coke. Across the board, nothing grew in whisky.. Does whiskey improve with age? It will give you an entirely new appreciation for the effects of aging. Unlike wines, distilled spirits do not improve with age once they are in the bottle. As long as they are not opened, your whiskey, brandy, rum, and the like will not change and they will certainly not mature further while they wait on the shelf. Does Jack Daniels expire after opening? Whiskey Shelf Life All whiskey varieties – including regular, rye, bourbon, scotch, and the famous Jack Daniels – have an almost indefinite shelf life when stored correctly, but there are things to consider for both opened and unopened bottles. Does Jack Daniels get you drunk? A shot of Jack has about as much alcohol as your typical beer. It’ll creep up on you though because you usually drink them faster or drink more. I weigh 170 and drink a good bit and 4 would probably get me tipsy, 6-7 would get me drunk, and 9-10 would get me really drunk, and 12+ would get me hammered. Can old whiskey make you sick? How do you store unopened whiskey? Storing Whiskey in Unopened Bottles. Protect your bottles from direct light. Exposure to a lot of light—especially sunlight—sets off chemical reactions that will both discolor your whiskey and affect its flavor. Keep your whiskey in a dark area, such as a wine cellar, cupboard, box, or darkened pantry. Is it bad to have a glass of whiskey every night? What is the shelf life of unopened whiskey? Unopened bottles of whiskey can last for generations. An unopened ten or 12 year… In general, distilled spirits are quite hardy. Unopened bottles of whiskey can last for generations. Does whiskey kill bacteria in stomach? How can you tell if whiskey has gone bad? If an old whiskey looks or smells bad, discard it immediately. If it looks and smells fine, taste a small amount to determine if it is safe to drink. If it has a milder taste than usual, that is fine. But if it has a sour, metallic, or other strange taste, discard it. How long can Whisky be kept? Can you drink 100 year old whiskey? Very old whiskey is not in and of itself harmful unless it was improperly stored, or the sealing stopper deteriorated and failed, or if it is of such a low proof that the inherent alcohol was insufficient to prevent organic matter from flourishing within the container, or it has become otherwise contaminated. Does Jim Beam go bad? As with most hard liquors, bourbon doesn’t go bad. Because of the alcohol content, any bacteria that enter the bottle will be killed. So it’s more of a question of how bad the quality of the bourbon can get over time. Once you open the bottle of bourbon, the alcohol will start to evaporate slowly over time. Does whiskey go bad in the freezer? Can whiskey kill you? Alcohol can kill you… Drinking large amounts at one time or very rapidly can cause alcohol poisoning, which can lead to coma and death. The liver can only effectively process one (1) standard drink per hour. How long does Jack Daniels last for? Is it safe to drink Old Whiskey? Can whiskey kill bacteria? A study published in the Annals of Microbiology has found that whiskey kills ice bacteria more effectively than vodka. … They found that while alcohol, CO2, and acidic pH levels consistently reduced the presence of bacteria, whiskey was the only liquid that eliminated all 4 strains of bacteria in the ice.
global_05_local_5_shard_00002591_processed.jsonl/19153
Good in the Moral Context GOOD IN THE MORAL CONTEXT i. e. OBJECTIVISIT, SUBJECTIVIST AND FUNCTIONALIST ‘Good’ can be described from three views: •Objectivist •Subjectivist •Functionalist Objectivist point of view One main philosopher who defended the objectivist point of view was George Edward (G. E. ) Moore. In his book Principia Ethica, Moore discussed the definition of the word ‘good’. With this book he influenced the philosophers who came after him. The objectivist point of view is naturalism i. e. (what moral law predictates, usually from the natural law). In defining the word ‘good’, G. E. Moore attacks the objectivist point of view. He criticizes the naturalistic point of view. Moore, an intuitionist (meaning he is someone who decides if something is good or wrong by reflecting on his own, without anyone explaining to him) disagreed that good could be explained objectively. Moore criticised Utilitiarians as they were emotivists, i. e. depending on feelings. Thus they defined ‘good’ according to feelings. So good = pleasure. Thus utilitarians do not judge whether an action is good or bad by the quality of the action but by the consequence of the effects. Moore also criticised Christian morality, because these reason an action is good because it pleases God. He said, something is not defined as good because it pleases someone else. Moore invented an interesting term called ‘The Naturalistic fallacy’. Naturalistic fallacy, according to Moore, is to define a term, in this case ‘good’ by means of something which is a state of fact. To explain ‘good’ in terms of pleasure, is committing a Naturalistic fallacy. His reasoning is as thus: if something gives me pleasure, and thus because of this feeling, I say it is good; I conclude, since it is good, then I ought to do it – this is a wrong conclusion. ‘Is’ is a statement of fact, while ‘ought’ is a moral statement. Moore was an intuitionist. Moore says that the word ‘good’ is not defined by its natural qualities (the qualities which are natural to something and which describe the object e. g. a red, juicy strawberry. If someone is asked why the strawberry is good, his answer will be, ‘because it is red and juicy’ thus defining ‘good’ by its natural qualities). For Moore, good is good and cannot be defined. The objectivists say that moral terms are explained by means of natural qualities. Objectivism is the view that the claims of ethics are objectively true. They are not relative to subject or culture. A term is defined as thus because it is as thus. So good is good not because of feelings or situations, the definition of which would be from a subjectivist point of view, giving rise to relativism. ‘Good’ is defined as thus, because the actions showing good are inscribed in us in the natural law. So according to objectivists, ‘good’ is described by its natural qualities. Naturalism, which the objectivists used, is a term which interprets the word as it is standing for natural characteristics. This may be misleading as good might stand for a quality of pleasure or for something to be desired, and this is not always right. Something pleasurable may in actual fact be wrong. One argument against naturalism, which the objectivists use, is that attribution (is) is confused with identity (ought). ‘Is’ is a statement of fact, while ‘ought’ is a moral statement. These (‘is’ and ‘ought’) are sometimes confused. Thus if something is pleasurable, thus it is good, thus it ought to be done, is (1) a wrong definition of ‘good’, (2) a wrong assumption as not all pleasures are good. One cannot equate good with solely pleasure. Moore goes deeper. In defining a word, he tried to split it into simpler terms. According to Moore, ‘good’ cannot be split into any simpler terms as it is already in the simplest term. So Moore’s philosophy states that ‘good’ is ‘good’. ‘Good’ is indefinable. Subjectivist point of view Subjectivism means that what is right or wrong is defined from the perspective of one’s attitudes, one’s theories and one’s emotions. Subjectivism is based on feelings, and as a result of emotivism. Subjectivism may also be called emotivism. Subjectivism is ethical values expressed in emotional values; personal emotions which can differ from one person to another. Thus there is no fixed standard, no norm, no mean. David Hume He is a basic figure in subjectivism. He was a 17th century philosopher. Hume was also an empiricist (tries to tie knowledge to experience) as he did not use rationalism (reason) but got experience from things around him. Hume said that all we know comes from around us, from our senses 9what we see, what we feel). Decante on the other hand used rationalism. Kant tried to fuse empiricism and rationalism. Hume thus says that a person, basically, is a bunch of sense experiences. He also says that the senses can never lead us to the universal truth. We cannot say that something is right or wrong just from our senses. According to Hume, ethics is not built on reason (which is what Aristotle says) but on the senses. The universal truths (which are basically what the natural law states – do good to others, harm no one etc) are simply cut off by Hume’s subjective approach. Hume emptied ethics from any rational foundation – he shifted ethics based on reason (like that of Aristotle) to ethics based on emotions or feelings. Hume says not to look for reason but for sentiments – thus if something feels good – do it. He said that passion not reason is what leads us to do something – reason alone is ineffective. According to Hume, it is sentiments and not reason which are the foundations of morality. Hume said that statements like ‘This car is red’ (descriptive) and ‘This action is good’ (evaluative) are statements both of the same nature. He mixed descriptive and evaluative argument. In the statement, ‘This person is good’ one is not saying something about the person, but it is my reaction towards that person. Three philosophers affected by Hume were AJ Ayer, CL Stevenson and Hare. AJ Ayer According to Ayer, when we make a judgement, it can be classified as 1. empirical or factual 2. logical or analytical 3. emotive Ayer said that ethical statements are non-statements because you cannot verify them (as in analytical statements) and you cannot make them as a statement of fact (empirical statement or factual). Ethical statements such as good, just expresses one’s emotions (emotivism) – a statement depending on one’s feelings. For Ayer ethical statements are meaningless. Ethical concepts, such as good, cannot be analysed because they are not real oncepts at all – they are false concepts. He stated, ‘The presence of an ethical symbol (good is an ethical symbol) in a statement adds nothing to its factual content, meaning nothing is stated about the nature of the ethical symbol. Thus ‘good’ has no value when describing someone or something – for Ayer ‘good’ was just a way of expressing a feeling about the person/object concerned. CL Stevenson Statements such as ‘good’ do not say anything about state of facts but says only about one’s behaviour, one’s attitudes and one’s feelings. Ethical statements such as ‘good’ do not express a belief, only attitudes. Beliefs are based on reason, attitudes and one’s emotions (emotive). ‘Moral discourses are primarily not informative but influential’, says Stevenson. Thus when I say ‘John is good’, I am expressing my feelings and at the same time influencing others by my statement. Stevenson, being emotive, says that ethical language, such as good, does not give us information about the person or object – they simply express one’s emotions. They simply intent to inform, they do not say anything about the nature. Hare While Ayer and Stevenson said that ethical statements are non-rational, non-logical, Hare is introducing rationality. He says that by a statement one influences another person, if the latter accepts it, and to do so he must understand it and he has to use his reason. Another point that Hare brought up is that an ethical statement can be 1. emotive 2. action guiding To guide it involves rationality. So ethical statements are not simply giving a piece of information, but action guiding (presciptivism – moral commitment to the giving or accepting of a command). Hare says that ‘a right action is one which ought to be done’ while ‘a wrong action is one that ought not to be done’. The prescriptive theory holds that the words ‘good’ or ‘bad’ are used not simply to command but to comment (=give an advice to do or not to do). ‘Good’ as applied to objects. It is important to distinguish between ‘meaning’ and ‘criteria’. Meaning always has a value, but criteria (the description) is different. ‘This marker is good’ or ‘This microphone is good’. The meaning is the same as the marker writes and the microphone amplifies sound. As applied to people, if I say, ‘John is a good man’. If we stick to the idea of Hare, that moral discourse, ethical statements, are action guiding, am I saying that ‘if you want a good man choose John’. It does not make sense. So when we place human beings as morally good, we are not talking about use or function. Hare deals with the distinction of the function and by treating the moral sense of good, it becomes an advice for imitation rather than a choice. A weak point of Hare: he still says that moral statements (such as good) still not saying anything about the person, but simply is a matter of influencing others and telling others to imitate him. Moral discourse is not only influential but action guiding – brings in rationality. He is still an emotivist saying that if an object is good, I am action guiding you; if a person is good I am just telling you to imitate him. Functionalist approach The functionalist approach is defining good in terms of aim and purpose. Good is the fulfilment of a function. For example a marker is good because it fulfils its function – it writes. If you are saying something is good, you are saying something about the object. O am not reflecting my emotions on an object (thus not an emotivist). A functionalist approach is based on its function. An emotivist approach is based on the attitude. A person chooses the good from the bad chooses a good life, because we are aiming at a ‘goal’ at an ‘end’. Aristotle is saying that there is something in-built in every object, in every person, to seek the good – the good being that at which all things aim. For a person to live a good life, he must understand the purpose of the human life. The purpose of human life is common to all humans, from a philosophical point of view – to have a good life. Aristotle defined end or purpose as ‘that for the sake a thing is done’ and good ‘as that at which all things aim’. Aristotle aid that God and nature do nothing in vain – that everything in the universe has been created to achieve a particular purpose. According to Aristotle the purpose of all human beings is the same. To understand the meaning of the word ‘good’ and of the ‘good life’, we have to understand the purpose of the human life and thus the metaphysics of the universe. In attempting to answer the meaning of ‘good’, Aristotle looked at the dynamic elements of the world around us (oak tree, chimpanzees, humans and so on). This is the general characteristics which defines Aristotle’s philosophy (metaphysics and ethics) and teleological (the study of the ends and purpose of things). According to Plato’s metaphysical views, he came with two kinds of worlds, the world of ideal and the world of reality. What we see is not the real world but an imitation of the ideal world. So substance in the ideal world is not included in the real world. Aristotle was Plato’s student but he still rejected Plato’s approach. Aristotle brought together the world of ideal and the world of reality. What we see is not an imitation – it is real. To explain the universe, Aristotle gave the theory of the four causes. 1. natural cause 2. formal cause 3. effective cause 4. final cause The theory of the four causes explains the dynamic nature of all the animate objects including human beings. In that way we can understand the goal, the purpose of the life of a human being, thus the meaning of a good life and the meaning of the word good. Metaphysics gives us a way of understanding reality how the human person acts and behaves, this behaviour can be living a good or a bad life. Ethics and metaphysics are distinct but interrelated. The theory of the four causes goes to explain, that if we think of an example of something which is produced by an agent such as a statue – then Material cause – that which constitutes the statue eg marble Formal cause – the pattern or blue print determining the form and the result Efficient cause – agency producing the result eg tools, sculpture Final cause – the sake for which the cause is produced ie the end towards which the production is directed In the case of humans: Material cause – genes Formal cause – human Efficient cause – freedom, intention, responsibility, practical reasoning Final cause – the good life In humans the efficient cause and final cause are dependent of the formal cause – the fact that I am a human being. We are free to make choices in the efficient cause, choosing responsibility or lack of it, thus effecting the final cause. Aristotle also spoke about potency and actuality. Potency is the potentiality of something or someone – characteristics, which if cultured, become actual. Actuality means when something, which is potential, becomes actual. So we have to ask…what is our potentiality? We have a potential to reach our goal in life. Conclusion Having been exposed to these three views, in the definition of the word ‘good’, I think that subjectivism is the view which least defines well the word ‘good’. This view shows relativism and emotivism. To define a word well, especially one with a moral value/a virtue, there has to be a norm, a mean, a standard and subjectivism fails to do this. On the other hand, the functionalist definition of the word ‘good’ is the best definition of all as it shows a standard – its function; so there is no relativism involved. find the cost of your paper Kohlberg’s Theory of Moral Development – Explained and Illustrated Should the husband break into the laboratory to steal the drug for his wife? The husband should not break into the laboratory to steal the drug for his wife because….
global_05_local_5_shard_00002591_processed.jsonl/19169
The Most Famous Not a Protest Song (Step 3) Two Great Painters ReadOasis Step 2 Escaping Criticism by Pere Borrell del Caso, 1874 There once was a painter named Zeuxis. He could paint life-like pictures. People often mistook his pictures for the real things which they represented. At one time he painted the picture of some fruit. It seemed so real... Read more Genius for Melody ReadOasis Step 4 (Part 1) On June 2, 2010, President Barack Obama stood on a small stage in the White House. In the audience sat a mix of elite leaders and famous musicians. The President was about to give America’s highest award for popular music to Paul McCartney of the... Read more BTS Like the Beatles ReadOasis Step 3 Photo by (Creative Commons) It was the first stadium concert ever. When the Beatles made their entrance, the crowd exploded with noise. Smiling and laughing, the band ran to the stage in the middle of a baseball diamond. The crowd of 56,000 screamed, yelled, and... Read more Fred Astaire, Dancer Extraordinaire ReadOasis Step 3 "Some people seem to think that good dancers are born, but all the good dancers I have known are taught or trained." -- Fred Astaire It was a dark time. In 1929, the American economy crashed. Many people lost all their money. Almost half the banks... Read more Photo Art: Light (3 in a Series) ReadOasis Step 2 It was a grey and cloudy day. But now, the setting sun shines kindly from below the clouds. For a few moments, the flowers and faces around you glow. The light is soft, warm, and gentle. It is an ideal time of day for taking pictures.... Read more Ukulele Revolution Photo Art: Framing (2 in a Series) El Greco: Genius of Spanish Art ReadOasis Step 2 (Part 2) View of Toledo by El Greco Perhaps El Greco did not know what he was saying. Maybe he was exaggerating in order to make a point. But one thing is for sure. He knew how to paint, and he even acknowledged Michelangelo’s influence by... Read more
global_05_local_5_shard_00002591_processed.jsonl/19203
Practical Computing Advice and Tutorials Fri: 04 Dec 2020 Site Content Technical Knowhow Command Line Interface Setting up a Raspberry Pi The motivation here is to set up a Linux Box so that it can be accessed from a PC on your LAN, via SSH, and be a useful addition to your home or office network by providing a central place for shared files (on your LAN), a central connection point for a shared printer, as well as learning platform for the CLI, Programming in C (which I'm using to teach myself about that particular programming language) or Python, as well as many other useful functions that I'll get to as and when. Why Linux? Unix based computer operating systems (of which Linux is just one example) are very versatile systems which can be tailored to a specific task. I don't subscribe to using one OS over another, but for some tasks only a Linux OS will do, but for other tasks, only a MS Windows OS will do. As the saying goes: It's horses for courses. If you choose to use a Linux OS, you'll quickly discover the power of the Command Line Interface (CLI). Learning the commands for the CLI can seem daunting, but operating a headless Linux system (that is a system that does not have any directly connected human interfaces) via a remote terminal is not that difficult, once you have a basic grasp of the most commonly used commands. There are loads of Linux user guides on the Internet, written by very knowledgeable people. These guides will take-you-by-the-hand, and lead you through the options, which is exactly what I needed when I started with Linux, and to which I still have to refer. Two links to get you started with the CLI... For the more intrepid, you have an in-line manual to which you can refer. Try the commands man man or man intro. The manual pages are very well written, from a technical view point, and are where much of the information found in other guides, comes from; the source, if you will. Let's get going... I'm going to be using a Raspberry Pi Model B (512MB RAM, UK Model) with a 16GB SD Card. The SD Card is used for the OS, but for the main storage, I'll be connecting a 500GB External Hard Drive, via USB, as 16GB can soon become full if used for file/data storage as well. The Pi also requires an external PSU, for which I'm re-purposing a 5v 850mA phone charger. Although for the set up, a mouse, keyboard and display device is needed, after that, the Pi can be completely controlled from a PC on the LAN. For these peripheral devices, I'll use the HDMI connection on my TV and a USB dongle as the keyboard/mouse controller. The OS I'll be installing is Raspbian Jessie Lite, which has no DTE (Desk Top Environment) as I'll not need one. I downloaded the OS from https://www.raspberrypi.org/downloads/ To install the disk image, I'm using Etcher Portable from https://etcher.io/ Put the SD Card into a card reader that's a part of the system on which you'll be running Etcher. The card should mount and you should be able to see it in your list of attached devices, even if you can't access it. Don't be concerned about formatting it as Etcher will take care of that. Run Etcher, select the Raspbian.img and the SD Card, and then click the 'Flash!' button. Everything else is automated. When Etcher has done it's thing, the SD Card will be ready to put into the Pi, which you can then power-up, having first connected the USB dongle (if that's what you're using) and HDMI display. If all is well, the Pi will boot-up. What happens next will depend on what .img you're using. For me, as I've said, I'm not using a DTE, so I'm seeing a login prompt, the default user name is pi and the password is raspberry. But, if you've chosen a DTE, you'll be presented with a GUI for the rest of the install. Connect the Pi to your LAN and then Login and type ifconfig. Look for the IP Address for the eth0 interface, and make a note of the address (look for the line inet addr:), as you'll need it later. For more information on the ifconfig command, I've written about it here as an introduction to using the CLI The next thing to do is to make sure that the system is up-to-date. To save having to prefix admin commands with sudo, just enter the command sudo su which will put the system into SuperUser mode and the prompt will change from :~$ to :/home/pi# Now enter the command apt-get update You should see some Get requests generated while the Pi connects to the http servers to get all the relevant package lists. Keep an eye on things, checking for errors, which if exist, should be looked into before continuing. After it's done, enter the command apt-get upgrade This should give you a list of packages that will be upgraded. Just hit enter to continue and again you should see a series of Get requests; go and make yourself a coffee while the system updates. Two more house keeping commands to make a note of... apt-get autoremove apt-get autoclean Those four apt-get commands should be used on a regular bases, say, once a month. You can also use the apt-get dist-upgrade command every once in a while, or if the system indicates that a new distro (Linux OSs are called distributions) is available. Type exit to exit out of SU mode and then change the default account password with the command passwd You're now ready to use your Linux Box for whatever you wish. So that you can login to your Linux Box from a PC on your LAN, you'll need to be running an SSH Server. Check that the service is running with the command service ssh status If it's not running, start the service with service ssh start then systemctl enable ssh so that the service will autostart, should the power be interrupted or the system is rebooted for some reason. Before we shutdown the system and disconnect the stuff we don't need, use an SSH client on your PC to SSH into your Linux system. With a Windows system, you can use PuTTY or KiTTY, there may be others, but I find KiTTY to be very good. If you can't login to your Linux Box from your LAN PC (or maybe the update command failed), investigate the issue before continuing. Some things to check on include... If all seems to be well on the Linux Box, that is to say, you can ping your NAT Router, then it's likely an issue at your PC. Is your Personal Firewall blocking the SSH Client? If your Network is any more complex than that, then you shouldn't need my guidance; you should know how to manage the Network that you have. So, SSH into your Linux system and login with your new password. If your new password doesn't work, try the old one. If the old one works, you should see a warning regarding the default password, when you connect, so change it with the passwd command and then use the reboot command to check all is well before continuing. If all is well, the Linux system can now be shutdown and the unneeded peripherals disconnected. Enter the command shutdown now then after the Pi has shutdown, remove the power connection, then disconnected the HDMI cable and any other unneeded peripherals. You can then reconnect the power and control the Pi (or whatever the Linux Box is) from your PC. One of the things that I like about KiTTY is that the window will stay open, so that when the remote system is powered on again, you'll get an auto Logon without having to re-enter the IP Address of the remote; you simply hit the Enter key. Power the Linux system back up, wait 30 seconds or so and then login over SSH. Now to set-up the Time Zone... Use the command sudo dpkg-reconfigure tzdata to get this screen Time Zone Select the correct time zone by using the up arrow key and then press the TAB key to select <Ok> and press enter. Now select the correct city with the down arrow and again TAB to the <Ok> and press enter. You should get a conformation message, but you can also check that all is well with the date command. If you get stuck, please leave a comment and if I can help I will, but as people have slightly different LAN and PC configurations, it's not easy to offer much advice about a configuration that I don't have direct access to. Adding an External HDD to the Rpi Although you can simply use the SD Card that the Rpi boots from as the main file storage medium as well, it can soon become full. So, the motivation here is to add a larger storage device so that we have a more useful capacity for LAN file sharing. It's also more than possible to use the Pi as a media player, but I.M.H.O you'd be better off with a more powerful device for that kind of usage. That said, media files can still be stored on our attached USB Drive and then accessed with an external player, but that's for another project. I'll be using a 500GB USB connected HDD for this project, you can use whatever you have, but it will need it's own power supply as the power from the Pi USB will not be sufficient, so don't even try it. At best you'll simply crash the Pi, at worse, you break it altogether. It's also possible to connect a powered external USB Hub, but for me, I don't want stuff hanging off my Pi, so I've not done that. Formatting The External HDD If you want the option of being able to plug the drive into your Windows PC (which can be a handy option to have) it'll need to be formatted to .exFAT. You could create a fully partitioned drive with different partitions for different stuff. That's an advanced way of doing things and should be considered, but again, if you want to be able to plug the drive into you Windows PC for any reason, you'll have a problem. The Linux File System One of the things that Windows users find a little confusing, at first, is the Linux (or Unix) file system; I did. But, I found that after a while, that the Linux system is in fact less confusing than the Windows system! Here's an overview... File System Tree I can't give any credit to the creator of this diagram because I don't know who created it, but I do thank the creator as it's very useful. For me to fully explain the details of this file system, would be like me reinventing the wheel as there's a lot of information already out there and it would also distract from the focus of this How To, but I do encourage the reader to do some research into the topic. This guide [https://www.howtogeek.com/] is as good a place to start as any. Power up your Pi and login. Unless you've changed anything you should be now looking at a prompt... That's the account that you're logged into: pi is the user name and raspberrypi is the domain name. If you're not there, enter the command cd If you're lost, then logout and then log back in. Now enter the command cd /dev then ls You'll see quite a few entries here, but the ones to look out for are prefixed sd I'm hoping that you don't yet see any. Now plug the USB HDD into one of the USB sockets of your Pi and do another ls (up arrow will bring back the last thing you typed). You should now see sda and sda1 which means drive sda has been connected and partition sda1 has been found. The partition will now need to be mounted so that it is accessible to the file system; we do this using the mount command and a mount point within the file system. The mount point can be any empty directory, but the standard point is the /mnt directory. If you choose to do things your own way, just remember that if you ask for help from someone and things are custom to you, then it'll be harder for you to get help. I'm going to use a directory within the /mnt directory, to uniquely identify this HDD. To follow along, enter the command cd /mnt followed by ls I have an empty /mnt directory. Now, the mkdir command can be used to make a new directory for the mount point for my HDD; sudo mkdir lacie_500_GB is the command I'll use, but you may want a different name, just don't use any spaces in your name. Now I'm going to mount the drive with... If I now issue the command cd lacie_500_GB I'm now seeing the root section of my HDD. In keeping with the Unix way, I'm going to set up the HDD file system with the following commands... mkdir home cd home mkdir rob I now have my HDD with a /home/rob/ structure with which to work. If you want to populate your HDD with some files from a different computer, you'll need to ummount it before you disconnect it (I'll cover LAN File Transfers soon). I would use the command sudo umount /mnt/lacie_500_GB but you'll maybe have a different name for your drive. If you want the drive to automatically mount at boot time, the /etc/fstab file will need be edited, and a line added for each partition and mountpoint. It's maybe a practical thing to do if you're not going to leave everything powered up, or to guard against the power being interrupted. If you get stuck with that, leave me a comment and I'll add the content here.
global_05_local_5_shard_00002591_processed.jsonl/19219
Вы находитесь на странице: 1из 2 Bai Mudan - Wikipedia, the free encyclopedia Bai Mudan From Wikipedia, the free encyclopedia Bai Mudan tea 1 Production Processing 2 Tasting and brewing 3 See also 4 Varieties 5 References Other names: Origin: Mudan White tea Mutan White tea White Peony tea Fujian Province, China Production Processing A fruity tea, similar to description: Yinzhen but fuller in body and more floral in aroma, yet not as astringent as Shou Mei. Quick Bai Mudan - Wikipedia, the free encyclopedia Tasting and brewing You will notice a very mild peony aroma when brewing the tea and a floral aroma, the tea is best brewed with good mineral water and at 70C to 80C (158F to 176F). The brew is a very pale green or golden color. The flavor is fruity; stronger than Silver Needle, yet not as strong as Shou Mei. The finest quality should have a shimmering clear infusion with a delicate lingering fragrance and a fresh, mellow, sweet taste devoid of astringency, and grassy flavors. See also Silver Needle tea White tea Robert Fortune Shou Mei tea 1. ^ a b , , pp 236 ISBN 7-80511-499-4 2. ^ a b c d Tea Guardian. "White & Other Lightly Oxidized Teas" (http://teaguardian.com/nature_of_tea/whites.html). Retrieved 20 December 2010. 3. ^ Tea Guardian. "Lightly Oxidized: White Teas: White Peony" (http://teaguardian.com/Tea_Varieties/white_baimudan.html). Retrieved 20 December 2010. 4. ^ a b , , ISBN756152506 Master Lam Kam Cheun et al. (2002). The way of tea. Gaia Books. ISBN 1-85675-143-0. Christopher Roberson (2000), White tea (China) (http://pages.ripco.net/~c4ha2na9/tea/faq.html#4.7.) from Usenet's rec.food.drink.tea FAQ, via pages.ripco.net Retrieved from "http://en.wikipedia.org/w/index.php?title=Bai_Mudan&oldid=541201466" Categories: White tea Chinese tea Chinese tea grown in Fujian This page was last modified on 28 February 2013 at 09:59. Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
global_05_local_5_shard_00002591_processed.jsonl/19235
I need to solve a linear regression problem $$Ax=y$$ which is hugely underdetermined. I have around $10^6$ features but only $10^3$ equations. So $A$ is a $1,000\times 1,000,000$ matrix and $y$ a vector of length $1,000$, both are given and I need to find $x$ (of length $1,000,000$). The solution is of course $x^*=A^\dagger y$ where $A^\dagger$ is the pseudo inverse. $x^*$ minimizes the least-square expression $(Ax-y)^T(Ax-y)$. All this is well known and I can do very efficiently using standard libraries (lstsq of numpy for example). The problem is that I want to add a regularization term of the form $$\min_x\Big\{ (Ax-y)^T(Ax-y)+x^T R x\Big\}$$ where $R$ is some $10^6\times 10^6$ matrix that I have (it is of course very sparse). The analytic solution this equation is $$x=\left(A^TA+R\right)^\dagger y\ ,$$ but it is completely impractical to even instantiate the matrix $A^TA+R$ (a $10^6\times10^6$ matrix). What's the best way to obtain the solution in a numerically stable manner? If that helps, I know how to express $R$ as $R=B^TB$ with b is a matrix of the same shape as $A$. --- Preemtive apology:: I realize that this might be a very basic question, but I can't find a standard way to do it in any of the packages I use (scikit and the likes). I also know that when $R$ is the identity this is the usual Tikhonov regularization, and there is a trick there of evaluating $A A^T$ instead of $A^TA$, but I'm not sure if that trick applies for arbitrary $R$. You want to minimize $\min \| Ax -y \|_{2}^{2} + x^{T}B^{T}Bx=\| Ax -y \|_{2}^{2} + \| Bx \|_{2}^{2}$ Recall that $\| u \|_{2}^{2} + \| v \|_{2}^{2}= \left\| \left[ \begin{array}{c} u \\ v \end{array} \right] \right\|_{2}^{2}$. Thus your problem can be written as $\min \| Hx - g \|_{2}^{2}$ $H=\left[ \begin{array}{c} A \\ B \end{array} \right]$ $g=\left[ \begin{array}{c} y \\ 0 \end{array} \right]$. In using an iterative algorithm such as LSQR to solve the least squares problem, you'll need to be able to compute products of the form This can be done as $w=\left[ \begin{array}{c} Av \\ Bv \end{array} \right]$. Similarly, you'll need to be able to compute products of the form This can be done as $v=\left[ A^{T} B^{T} \right]w$. | cite | improve this answer | | • $\begingroup$ Where does $\| u \|_{2}^{2} + \| v \|_{2}^{2}= \left[ \begin{array}{c} u \\ v \end{array} \right]_{2}^{2}$ come from? $\endgroup$ – Richard Feb 13 '19 at 18:20 • $\begingroup$ $\| u \|_{2}^{2}+ \| v \|_{2}^{2}=u_{1}^{2} + u_{2}^{2} + \ldots u_{n}^{2} + v_{1}^{2}+\ldots + v_{m}^{2}=\| \left[ \begin{array}{c} u \\ v \end{array} \right] \|_{2}^{2}$. $\endgroup$ – Brian Borchers Feb 13 '19 at 18:22 Your Answer
global_05_local_5_shard_00002591_processed.jsonl/19239
How to Work Tempdata in Codeigniter In some project, where you want to remove data stored in session after some specific unique time-period, this can be done using tempdata functionality in CodeIgniter. You may also like How to create flash messages in Codeigniter and How to Session Management in Codeigniter. Steps For How to Work Tempdata in Codeigniter Step 1: Add Tempdata To add data as tempdata, we have to use mark_as_temp() function. This function takes two argument items first argument is a tempdata second one is a expiration time. // 'value' will be erased after 300 seconds(5 minutes) You can also pass an array to store multiple data. All the items value stored below will be expired after 300 seconds. You can also set different expiration time for each item as shown below. // 'value1' will be erased after 250 seconds, while 'value2' // will do so after only 300 seconds Step 2: Retrieve Tempdata We can retrieve the tempdata using tempdata() function. Step 3: Remove Tempdata Tempdata is removed automatically after its expiration time but if you want to remove tempdata before that, then you can do as shown below using the unset_tempdata() function, which takes one argument of the item to be removed. And if you like this tutorials please share it with your friends via Email or Social Media.
global_05_local_5_shard_00002591_processed.jsonl/19257
About      Works      Exhibitions      News      Journal      Index    Group exhibition: ID: E14.1 September 13 — October 2, 2014 Ў Gallery, Minsk, Belarus Tania Arcimovič, Aleksej Borisenok, Valentina Kiselyova, Inga Lindarenko Group Bergamot, Anatoly Belov, Zhanna Gladko, Michaił Hulin, Alexey Lunev, Tatiana Reut, Olga Sosnovskaja, Tilda Swinton & Sandro Kopp, Lucine Talalyan / Queering Erevan collective, Wolfgang Tillmans, Sergey Shabohin, Aleksej Borisenok & Inga Lindarenko & Anton Sorokin Installation Zones of Repression Sergey Shabohin: fragment of installation Zones of Repression, #Identity is formed through relations between subjects and community and is determined through the horizon of an imaginary structure, with which an individual associates her/himself — a #gender, a nation, a social class etc. In order to be a part of a particular social group, an #individual has to accept or reject the rules and practices of appearance, which are associated with particular identities. We can critique these predetermined images and models, however, we can’t ignore them. Because our clothing, #sexuality and behaviour are the markers, on the basis of which we are determined as fitting or not fitting into a group, or determined as threatening (which can inflict #aggression and provoke #violence) or as immediately trustworthy. The individual therefore gets caught in a kind of a normative box, only through which he is understood and accepted by the society or a particular community. Nevertheless, these days more young people refuse to define their specific ‘labels’. They understand their identity as dynamic, discontinuous, non-binary and call themselves #queer (American colloquial for #others, weird or marginal groups). This is how the queer move towards opposing the society that wishes to frame (to ‘normalise’) them, understand them in specific terms and through this ‘boxing’ form an attitude towards them. What is behind each of them for an individual, society or the world as a whole? How do we understand and interpret them? What is a norm for our society, and where are the margins of its tolerance? Can we conceive ourselves beyond the borders of determination, so that to self-style our own identity and exercise control over it? Hash tags of the project: #norm, #identity, #individual, #other, #taboo, #queer, #gender, #sexuality, #tolerance, #violence, #society, #love, #stranger, #fear, #trust, #bodily and etc.
global_05_local_5_shard_00002591_processed.jsonl/19259
Managing State with Stateful Widgets in Flutter Stateful Widgets in Flutter You want a simple way to manage state in the UI of your flutter app? You can easily do it by Creating your own subclasses of StatefulWidget. If you wan to manage the state of your flutter application, then today’s post is for you. So, what is Statefull widgets in Flutter? A stateful widget in flutter can change its appearance in response to user interaction or when it receives data. For example, when we move the Slider thumb and change its value. This change in value changes its appearance. These widgets subclass the Stateful Widget class. Managing State Using Stateful Widgets StatefulWidget class is the fundamental way in Flutter to manage state. A stateful widget rebuilds itself when its state changes. If the state to manage is simple, using stateful widgets is generally good enough. Stateful widgets use State objects to store the state. When creating your own subclasses of StatefulWidget, you need to override createState() method to return a State object. For each subclass StatefulWidget, there will be a corresponding subclass of State class to manage the state. The createState() method returns an object of the corresponding subclass of State. The actual state is usually kept as private variables of the subclass of State. In the subclass of State, you need to implement build() method to return a Widget object. When the state changes, the build() method will be called to get the new widget to update the UI. To trigger the rebuild of the UI, you need to call setState() method explicitly to notify the framework. The parameter of setState() method is a VoidCallback function that contains the logic to update the internal state. When rebuilding, the build() method uses the latest state to create widget configurations. Widgets are not updated but replaced when necessary. SelectColor widget in bellow is a typical example of stateful widget. _SelectColorState class is the State implementation for SelectColor widget. _selectedColor is the internal variable that maintains the current selected color. The value of _selectedColor is used by the DropdownButton widget to determine the selected option to render and the Text widget to determine the text to display. In the onChanged handler of DropdownButton, setState() method is called to update the value of _selectedColor variable, which notifies the framework to run method again to get the new widget configuration to update the UI. State objects have their own lifecycle. You can override different lifecycle methods in subclasses of State to perform actions on different stages. Lifecycle methods of State Name Description initState() Called when this object is inserted into the widgets tree. Should be used to perform initialization of state. didChangeDependencies() Called when a dependency of this object changes didUpdateWidget Called when the widget of this object changes. Old widget is passed as a parameter build(BuildContext context) Called when the state changes. deactivate() Called when this object is removed from the widgets tree dispose() Called when this object is removed from the widgets tree permanently. This method is called after deactivate(). Of the methods listed in above Table, initState() and dispose() methods are easy to understand. These two methods will only be called once during the lifecycle. However, other methods may be invoked multiple times. The didChangeDependencies() method is typically used when the state object uses inherited widgets. This method is called when an inherited widget changes. Most of the time, you don’t need to override this method, because the framework calls build() method automatically after a dependency changes. Sometimes you may need to perform some expensive tasks after a dependency changes. In this case, you should put the logic into didChangeDependencies() method instead of performing the task in build() method. The reassemble() method is only used during development, for example, during hot reload. This method is not called in release builds. Most of the time, you don’t need to override this method. The didUpdateWidget() method is called when the state’s widget changes. You should override this method if you need to perform cleanup tasks on the old widget or reuse some state from the old widget. For example, _TextFieldState class for TextField widget overrides didUpdateWidget() method to initialize TextEditingController object based on the value of the old widget. The deactivate() method is called when the state object is removed from the widgets tree. This state object may be inserted back to the widgets tree at a different location. You should override this method if the build logic depends on the widget’s location. For example, FormFieldState class for FormField widget overrides deactivate() method to unregister the current form field from the enclosing form. In our first code example, the whole content of the widget is built in the build() method, so you can simply call setState() method in the onPressed callback of DropdownButton. If the widget has a complex structure, you can pass down a function that updates the state to the children widgets. In above example, the onPressed callback of RaisedButton is set by the constructor parameter of CounterButton. When the CounterButton is used in Counter widget, the provided handler function uses setState() to update the state. Further Read: If you still find it a bit confusing about Flutter StatefulWidget, do reach out to me on Twitter or add your comment in the comment box below. Happy Fluttering. 😎😎 Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/19262
Scripture Reading:  Joshua 20:1-6 “Then the Lord said to Joshua, ‘Say to the people of Israel, appoint the cities of refuge of which I spoke to you through Moses, that the manslayer who strikes any person without intent or unknowingly may flee there.  They shall be for you a refuge from the avenger of blood.'” (Joshua 20:1-3) God had given instructions to Moses that six cities were to be selected as cities of refuge (Numbers 35:9-35).  Anyone who accidentally killed another person was to flee to one of these cities.  Under the law anyone who murdered someone was to be put to death.  These cities were not for those who intentionally murdered someone; they were for those who unintentionally killed another. In ancient times if a member of a family was killed, either intentionally or unintentionally, the family appointed “an avenger of blood,” for the deceased relative.  It was the duty of the avenger of blood to find the one who killed his relative and in turn to kill the guilty party.  It was “an eye for an eye” justice system.  The only safe place for the unintentional killer was in a city of refuge. The cities of refuge had special meaning for God’s people.  First, they emphasized the value of human life.  Men and women are created in the image of God.  Therefore human life is very valuable to God.  In fact, God established capital punishment for this very reason (Genesis 9:5,6).  But by the same principle, no one should be put to death, if that death was accidental. Second, the cites of refuge were Levitical cities; that is, they had something to do with the sacred nature of God.  The very character of God is the basis for universal law.  Civil law was ultimately related to the existence and character of God.  The principle of justice comes from the fact that God is a just God. These cities of refuge have particular significance for Christians today.  We know that our ultimate refuge is found in Jesus Christ.  The writer to the Hebrews may have had in mind these cities of refuge when he wrote, “We who have fled for refuge might have strong encouragement to hold fast to the hope set before us.  We have this as a sure and steadfast anchor or the soul, a hope that enters into the inner place behind the curtain, where Jesus has gone as a forerunner on our behalf, having become a high priest forever after the order of Melchizedek”  (Hebrews 6:18-20).  Jesus is the one and only place of refuge for sinners.  He took the blow of the “avenger of blood” for us.  He became the object of God’s wrath for us, so that we will never have to experience the justice of God.  Through Jesus, we become the recipients of God’s mercy. Lord Jesus, You are my refuge.  I am a guilty sinner who deserves God’s justice.  I have come to You who bore the wrath of God in my place.  Now I can flee to you for refuge, forgiveness, and love.  Thank You for what You have done on my behalf. Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/19280
Corsaire, I wanted the promotions to be visible, as another success besides of victories. Of course, like most rules, it also has it's downsides. Scout, 2-seater time was 5 hours first. But since the French don't seem to have any 2-seat units in June 1916, they must fly it all as training time - and that must be very boring. So I went down for 3 hours for all pilots. Everyone else might of course spend those 3 hours in flying school as well. Beanie and all: you can look through Trecce/bomber" squadrons in the enlistment and should find plenty of units for the 2-seater-time. After that you use the "transfer" option to get to the fighters. Jim, if you could do that excel calculation, that would be a great help! You would create and publish an E-Mail address for all pilots here in this thread; everyone would send their data/records to you, and you send me the results via PM. Would that be okay? I will then make a graphic chart of the latest records once or twice per week. Vice-President of the BOC (Barmy OFFers Club)
global_05_local_5_shard_00002591_processed.jsonl/19317
How to make coffee… I am french press Some espresso beans, grounded fairly rough. Dump em into the French press. Add some hot water. Wait about 4-5 minutes. Press. Pour. Season with sugar (just a pinch). Enjoy. Powered by Plinky Published by Shaun Andrews Leave a comment Leave a Reply %d bloggers like this:
global_05_local_5_shard_00002591_processed.jsonl/19338
Ohaus Ranger Count 3000 RC31P15 Ohaus Ranger Count 3000 RC31P15 Counting Scale - 30lb X 0.001lb (0.01lb NTEP) • 60975 Tough, Precise, Fast, Dependable. The Ranger Count 3000 is a high-precision dedicated counting scale with advanced software for counting and packaging parts. With low Average Piece Weight (APW) alert and automatic APW recalculation, the Ranger Count offers 1 to 1,500,000 internal counting resolution to handle counting even the smallest parts precisely. • Weighing, Parts Counting with Auto Optimization, Checkweighing, Accumulation • The 3 backlit LCD displays, including a centrally located count display, along with an easy-tonavigate menu, make Ranger Count 3000 easy to use in multi-step counting operations. Capacity 30lb Readability 0.001lb (0.01lb NTEP) Weighing Surface Size 11.8 × 8.9 in Display Type 3-Window, 1 in. / 26 mm high LCD display with white backlight, 6-digit, 7-segment Dimensions 12.2 x 12.9 x 4.6 in Weight 12lb Construction ABS housing, stainless steel platform We Also Recommend
global_05_local_5_shard_00002591_processed.jsonl/19349
Cellucore C4 Extreme Review Cellucor C4 Extreme is a moderate stim Pre-workout supplement designed to get you going mentally and physically before your bodybuilding, endurance and power training sessions. C4 Extreme contains a good dose of the ever popular beta alanine which will help prevent the build-up of hydrogen in the muscles which when unchecked creates and acidic environment that eventually stops your muscles from being able to contract. Other C4 Extreme ingredients are Creatine Nitrate and AAKG which increase atp production and nitric oxide respectively. Atp is the instant energy used by the muscle and nitric oxide helps dilate the blood vessels allowing more blood flow to the muscles. Now on the stimulant side of things the Cellucor C4 Extreme is fairly moderate with 160mg caffeine and 50mg citrus aurantium. This will give those who need a bit of a kick what they are looking for without sending you mental. C4 Extreme also contains a significant amount of vitamin C at 250mg and a small amount of taurine at 200mg which helps with the absorption of the rest of the C4's ingredients. Cellucore C4 Extreme is Ada Street Discount Supplements best selling pre-workout stim at the time of writing this atricle and has a loyal following among bodybuilders and weight trainers. Overall we feel that this pre-workout supplement is a good combination of ingredients for those trainers who want a bit of both, physical and mental lift. Open drop down
global_05_local_5_shard_00002591_processed.jsonl/19354
Before you do any processing of such changes, you need to verify it is a valid email .  create a ticket using the new email and send a request to confirm. now if they aren't already in the records, you can go to admin - > manage users  type in their old email address,  Fill in the user manager field to pull up the account.  Then click quick-edit to pull up the info. then select edit and it's where you can change change the password and select change. If it is a shared access for lot, get the lot numbers 1. go to istall management account 2. go to site management access 3. put in lot listed in category 4. Select filter.  This will give a list of whom has email access you can add users email by clicking the add button you can remove users by pressing the delete button to the right of the email listed. you can change the email by clicking edit, provided it isn't already in use. <need walkthrough if email is already in the system> If you get the following error message  "That email is in use by another user." That means that the account is already connected to another account. Your mostly going to have to delete the accounts and rebuild <will fill in details later>.
global_05_local_5_shard_00002591_processed.jsonl/19369
For an organization that began in 2005, Team Haverhill already has a “storied” history. After beginning as a “community visioning” initiative sponsored by the Greater Haverhill Foundation and the Greater Haverhill Chamber of Commerce, Team Haverhill emerged as an organization in its own right in 2006. We elected officers and organized into a self-directing association with the purpose of making Haverhill a “better place to live, work and play.” Early activities included the stringing of lights in downtown trees, and arranging for historic marker-signs to be painted for and purchased by individual homeowners. Since then, Team Haverhill has grown and evolved and taken on many exciting projects, with the help of dedicated volunteers, as well as numerous project partners and sponsors. Here is a list of projects and activities we have focused on since we began. Year(s) Focus (projects and activities) 2007 Candidate forums and budget education 2008 Murals, playground renovation, recycling, “Possible Dreams” 2009 Farmers’ Market, Soles of Haverhill “Shoe-la-bration” 2010 River Ruckus, Haverhill Youth Mentor Network, and continuing support for ongoing projects 2011/2012 Essex Street Gateway Mural, incorporation, and continuing support for ongoing projects 2013/2014 Art Walk at Bradford Rail Trail, River Ruckus, Portland Street Playground renovation, Soles of Haverhill “Shoe-la-bration” (2014), and continued support for ongoing projects Be sure to check out our Projects pages, where you can find out more about what we do and learn how you can get involved.
global_05_local_5_shard_00002591_processed.jsonl/19372
Tech4Gaming is an original idea by Fabio Perchiazzi. We cover computer hardware, modding, design, engineering solutions and photography. Fabio Perchiazzi One Man Team 21 Years old, PC Modder, designer and photographer, One man Team at Tech4Gaming. Creativity has always been his way of life. CNC Operator and Cad Designer, Fabio loves to experiment new solutions everyday. Interested in working with us? %d bloggers like this:
global_05_local_5_shard_00002591_processed.jsonl/19385
sub male Albany, Oregon, United States Relationship status About me i'm a 'bottom'  gay guy who came to see his sub side because a few Dom's found doors in me and opened them.  To me it seems they 'collared' what they found and i submitted, though retrospectively, i can trace my "sub" nature and my attraction to dom guys back to early childhood (6 or 7).  i guess that sort of sums up my experience in D/s speak?  It doesn't begin to describe how profound and powerful the Dom is to me who evokes and enlivens the sub in me though. That,to me, is penetration and 'insemination' on a different level. The more i read on sites like this, the more i wonder about the labels "Dom" and/or "sub."   They seem more like a starting place than an exhaustive summation. i don't want to misrepresent myself by saying "i am sub," so i qualify that i have sub in me and what that means is discovered in interaction?  i pretty much view a Dom who approaches me the same, it takes time and communication to start to see who a person is, so instant Dom or sub is kinda fake to me.   It seems to me that, in order for someone to "submit," there has to be 'someone' there doing the submitting. i am "someone."  Force or bullying do not open me, they shut me down. i read a lot of entries on D/s sites; guys identifying as "dom" expecting automatic obedience with no foundation of relationship (and no effort on the part of the 'dom')? Guys identifying as 'sub' saying they want to be forced to do stuff.  To me, that reduces a sub (and the D/s relationship) to something like a convenience store that a thug robs at gunpoint. i'm a person who is bottom/sub, i'm not a convenience store. On the other hand, where there is a bond of trust, i can be very convenient.  i'm not afraid to be transparent, naked... vulnerable, though i don't wear my heart on my sleeve. i am more inclined to walk through open doors than stand on the outside looking in.  i see open, honest vulnerability, as an exchange, not a one-sided bleed,  looking for balance.  To me, the essence of intimate relationship is to know and be known.  We don't have to hide from someone when love is foundational, and i believe "love" should be universally pursued and practiced.  Eh, am i allowed to use the "L" word on this site? i'm not being fanciful, i think love has a very practical side. i'm a critical care nurse by profession (i work 13 hour shifts, one week on, one week off, so cannot be very active while working) i am financially secure and stable, No "findom" (i see nothing "Dom" about financial exploitation).  i think each has to be self sufficient to have a whole relationship.    i am healthy poz undetectable. BDSM and me yin/Yang strikes me as an ancient explanation of D/s, i.e., "D/s" Top/bottom. i see the D/s dynamic as opposites naturally attracting and bonding. If there is chemistry there's fireworks.i qualify "total bottom with some sub in me looking for a Total Top with some Dom in you," but, of course, actual relationship is more complicated than those labels, so it's hard to know how much or little to put here?  i'm inclined to write books instead of profiles, so i'm trying to be good here lol.  i want to be/become the "total bottom/sub" in a D/s, Top/bottom dynamic for Someone Who identifies on the other end of the spectrum from me, but understand that is a generalization. To me, there's very practical side to lasting relationship and i think chemistry plays a big role.  Psychologically for me, a "cock" is a"Top" or "Dom" anatomical feature.  i don't want to go overboard listing my kinks here because the only ones that matter to me are the ones that correspond to my Top, so i present that as, hopefully, a starting picture of me, and hopefully, a jumping off place for getting to know You. i believe informed consent is essential to a healthy relationship, communication is essential. No PNP. i get the appeal, i've been around drug users my whole life, but have never partaken, i'm always the 'designated driver.' i'd rather be with someone stoned on grass than someone who is drunk though. Not against you drinking or partaking of grass, as long there's no substance habit or dependence.  In my interactions i seem to be on the more open end than average and there's no way to list everything here. i love creative and imaginative interaction, so i am cautiously open and will discuss just about anything. i am against anyone getting hurt, but understand that one persons poison is another persons medicine. You're probably not going to convince me to take a beating though, i don't think i have much, if any, masochist in me, those a specific type of humiliation is deeply erotic for me. Update date Monday, November 16, 2020 Member since Friday, October 11, 2019   Send a message
global_05_local_5_shard_00002591_processed.jsonl/19388
Flash Fiction: Pumpkins I pulled up in front of our house and stepped out of the truck. My sister stepped out of the front door and stood with her arms crossed. “How many did you get?” I brushed the dust off my shirt and pointed towards the truck. “Eighty seven, to be precise.” “That’s quite a haul. Even the others did decently. A tally of 231 pumpkins today.” “That’s good.” Sister frowned. “Not good enough. It’s only a few weeks to Halloween.” “We will step it up.” “We have to. That’s the only we can take on Jack-o-Lantern, the Pumpkin Peddler. Defeating his armies before they come alive, is our only chance at reducing his prism of power.” I solemnly nodded at her. This year would be the year we finally defeat Jack-o-Lantern. Word Count: 130 FOWC with Fandango – “Prism” Word of the Day Challenge – “Peddler” 1. Scary and intriguing! Plus great use of the prompts. By the way, I seem to be posting under “Sparks,” which is the blog a friend and I are developing, but it’s not up yet. I think I’ve mentioned it to you before. We’ll have writing prompts (or “sparks”) and offer a forum for folks to post their work and links to their own sites. My own site is Wild Imaginings: a Spiritual Journey at http://www.nancyschoellkopf.com Liked by 1 person Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/19403
Vintage Brass Temple Prabhavali With The Mythical Yali & Lord Ganesha - H 40 cm x W 26 cm Exquisite handcrafted brass temple frame or Prabhavali as is popularly known  depicting "Yali" and the 5 headed Naag with temple pillars on either side is mounted on rich Royal Blue raw silk inside an antique finish gold frame with an idol of Lord Ganesh. As per Indian mythology, the Yali is a mythical creature portrayed as part lion, part elephant and part horse believed to be more powerful than the lion, the tiger or the elephant. Seen sculpted on pillars of  south Indian temples with figures of of gods and goddesses, this Prabhavali is crafted with a 5 headed snake hood at the top. The brass idol of Lord Ganesha - God of knowledge and prosperity is placed the temple frame and is considered auspicious for all new beginnings and prosperity.  Weighing 1 kilo gram, the Prabhavali  - the never ending circular Halo around an Indian God or temple, is a collectors item. Size of the frame with prabhavali : Height 38 cm x Width 26 cm Size of the brass Prabhavali : Height 26 cm and Wide 17 cm  Weight: 1.20 kilograms Next Previous
global_05_local_5_shard_00002591_processed.jsonl/19409
Creations, Burlap Ghosts, Boo! Super Boy and I had some Halloween fun the other day.  He asked, “Halloween? Gigi, why are you making stuff for Halloween?” “Why are you painting so many Frankenstein glasses?” “Why are the witches upside down?” Tough questions. Bottoms Up!  How do you explain metaphor to a 5 year old? How do I explain that … Continue reading
global_05_local_5_shard_00002591_processed.jsonl/19422
Quick Answer: What Are The Two Major Parts Of Analytical Chemistry? What are the two main areas of analysis in analytical chemistry? The two main sub-branches of Analytical Chemistry are:Qualitative analysis: The determination of the identity of chemical species present in a sample.Quantitative analysis: An examination to determine how much of a particular species is present in a sample.. What is the hardest branch of chemistry? What is the most important branch of chemistry? Reviewa. measuring mercury in seawater1. biochemistryb. studying enzymes in cells2. organic chemistryc. measuring the electrical properties of solutions3. inorganic chemistryd. synthesizing new carbon compounds4. physical chemistrye. making new compounds for energy processes5. analytical chemistry Is Analytical Chemistry easy? Analytical Chemistry is probably the easiest chemistry class. … After doing basic stats you’ll cover things like acid/base equilibria, buffers, gravimetric analyses, volumetric analyses, and chemical equipment among others. What are different types of analytics? What are the four different types of analytical methods? What is the analytic method? The use of algebraic and/or numeric methods as the main technique for solving a math problem. The instructions “solve using analytic methods” and “solve analytically” usually mean that no calculator is allowed. See also. What is detector in analytical chemistry? One of the most useful detection methods is known as the flame ionization detector (FID). … When these positive ions strike the negatively charged collector, a current proportional to the amount of ions is measured. This detector is essentially universal, as it is able to measure all organic compounds. What are some examples of analytical procedures? Examples of analytical procedures are as follows:Compare the days sales outstanding metric to the amount for prior years. … Review the current ratio over several reporting periods. … Compare the ending balances in the compensation expense account for several years. … Examine a trend line of bad debt expenses.More items…• What are the 5 areas of chemistry? Traditionally, chemistry has been broken into five main subdisciplines: Organic, Analytical, Physical, Inorganic and Biochemistry. What is the salary of an analytical chemist? $71,770Analytical Chemists earn an average of $71,770 annually. The lowest 10% make around $120,600, while the highest 10% earned around $41,080. Most Analytical Chemists work for private research and development firms, while another large portion work for pharmaceutical companies or testing labs. What is the analytical? The adjective, analytical, and the related verb analyze can both be traced back to the Greek verb, analyein — “to break up, to loosen.” If you are analytical, you are good at taking a problem or task and breaking it down into smaller elements in order to solve the problem or complete the task. What are the branches of analytical chemistry? Branches of Analytical Chemistry Two sub-branches come under analytical chemistry namely quantitative analysis and qualitative analysis which can be explained as follows. These two methods form the backbone of many educational labs of analytical chemistry. What are the techniques in analytical chemistry? These techniques also tend to form the backbone of most undergraduate analytical chemistry educational labs.Qualitative analysis.Quantitative analysis.Spectroscopy.Mass spectrometry.Electrochemical analysis.Thermal analysis.Separation.Hybrid techniques.More items… What is an example of analytical chemistry? The definition of analytical chemistry is examining materials by separating them into their components and identifying each one and how much there is of each one. Using mass spectrometry to measure charged particles to determine the composition of a substance is an example of analytical-chemistry. What is the role of analytical chemistry in society? Analytical chemistry plays an enormous role in our society, such as in drug manufacturing, process control in industry, environmental monitoring, medical diagnostics, food production, and forensic surveys. It is also of great importance in different research areas. … Over time, analytical chemistry has changed. How does analytical chemistry apply to everyday life? Much of our daily life is dependent on chemical analysis. Accurate quality-control analysis ensures the quality of the food we eat, the medicine we use, the water we drink, and the air we breathe. Among the sciences, analytical chemistry stands out as a practically versatile, useful and important field. What are the three main objectives of analytical chemistry? 1. to develop an understanding of the range and uses of analytical methods in chemistry. 3. to develop an understanding of the broad role of the chemist in measurement and problem solving for analytical tasks. 4. to provide an understanding of chemical methods employed for elemental and compound analysis. What is the purpose of analytical chemistry? “Analytical chemistry” (more simply: analysis) is understood as encompassing any examination of chemical material with the goal of eliciting information regarding its constituents: their character (form, quality, or pattern of chemical bonding), quantity (concentration, content), distribution (homogeneity, but also … What are the analytical instruments? Examples of analytical instruments include mass spectrometers, chromatographs (e.g. GC and HPLC), titrators, spectrometers (e.g. AAS, X-ray, and fluorescence), particle size analyzers, rheometers, elemental analyzers (e.g. salt analyzers, CHN analyzers), thermal analyzers, and more. What jobs use analytical chemistry? Career Areas for Analytical ChemistsAgriculture and Food.Biotechnology.Medicinal.Oil and Petroleum.Personal Care.Water.
global_05_local_5_shard_00002591_processed.jsonl/19438
Written by Gabriele Tomassetti in Language Engineering In a previous post we have seen how the Language Server Protocol can be a game changer in language development: we can now build support for one language and integrate it with all the IDEs compatible with this protocol. In this article we are going to see how easy is to build support for the DOT Language in Visual Studio Code. Note that Visual Studio Code now runs also on Mac and Linux To do this we are going to build a system composed of two elements: • A server which will provide support for our language (DOT) • A very thin client that will be integrated in Visual Studio Code If you want to support another editor you must create a new client for that editor, but you could reuse the same server. In fact, the server is nothing else than a node app. The code for this article is in its companion repository. In this tutorial we are not going to show every little details. We are going to focus instead on the interesting parts. We will start slow and explain how to setup the client and then only the parts necessary to understand how everything works. So you have to refer to the repository if you want to see all the code and the configuration details. Language Server Protocol Recap If you haven’t read the previous article there is a few things that you may want to know. The protocol is based upon JSON-RPC, this means it is lightweight and simple both to use and to implement. In fact there are already editors that support it, such as Visual Studio Code and Eclipse, and libaries for many languages and formats. The client informs the server when a document is opened or changed, and the server must mantain it’s own representation of the open documents. The client can also send requests that must be fullfilled by the server, such as requesting hover information or completion suggestions. DOT Language The DOT Language permits to describe graphs. A tool named Graphviz can read descriptions in DOT and generate nice pictures from those. Below you can see an example. It does not matter if you are not familiar with DOT. It is a very simple language that is perfect to show you how to use the Language Server Protocol in practice. graph short { // This attribute applies to the graph itself // The node shape is changed. b [shape=box]; // These are edges // You don't have to declare each node a -- b -- c [color=blue]; // You don't have to use the ending ';' b -- d From this graph Graphviz will generate this image: Before starting, we have to install a couple of things: 1. VS Code extension generator: to generate a skeleton extension 2. VS Code extension for the DOT language: to register the DOT language VS Code Extension Generator The generator can be installed and used the following way. npm install -g yo generator-code yo code The generator will guide through the creation of an extension. In our case, we need to create one for the client, which is the proper VS Code extension. VSCode Extension Generator VS Code Extension For The DOT Language The Language Support for the DOT language is an extension to register the DOT language with Visual Studio Code. You can navigate to the extensions page Once you are there search for dot and install it. You may wonder why we need an extension for the DOT Language. I mean, aren’t we building it one right now? We are building a Language Server for the DOT Language, to implement things such as verifying the correcteness of the syntax or suggesting terms for autocompletion. The extension we are going to install provides instead basic stuff like syntax highlighting. It also associate the extension .dot files with the DOT language. These kinds of extensions are quite easy to create: they consist just of configuration files. Structure Of The Project The project will be composed by: • a Language Protocol client • a Language Protocol server • a backend in C# and .NET Core that will provide the validation of the code So under the project there will be a folder client, that will contain the client code, a folder server, that will contain the server code, and a folder csharp, that will contain the C# service. There will also be a data folder, that will contain two files with a list of shapes and colors. Language Server Protocol architecture The architecture of our application Since client and server are actually node projects you have to install the node packages. And for the .NET Core project you have to restore the nuget packages using the well known commands inside the respective folders. More precise information is available in the repository. You have also to remember to start the C# project first (dotnet run) and then run the extension/client after that. 1. The Client For The Language Server Protocol Configuration Of The Client Our client is a Visual Studio Code extension, and a very simple one, given the integrated support in VS Code for the protocol. We are writing it using TypeScript, a language that compiles to JavaScript. We are using TypeScript for two reasons: 1. because it provides some useful features, such as strong typing 2. because it’s the default language for a VS Code extension. First we are going to setup how TypeScript will be compiled into Javascript, by editing tsconfig.json. "compilerOptions": { "target": "es6", "module": "commonjs", "outDir": "out", "lib": [ "es6" ], "sourceMap": true "exclude": [ In addition to the usual node_modules, we exclude the folder server, because it will contain the already compiled server. In fact, to simplify the use of the extension, the client will also contain the server. That is to say, we are going to create the server in another project, but we will output the source under the client/server folder, so that we could launch the extension with one command. To do just that you can use CTLR+Shift+B, while you are in the server project, to automatically build and output the server under the client, as soon as you edit the code. Setting Up The Extension In package.json we include the needed packages and the scripts necessary to automatically compile, install the extension in our development environment, and run it. For the most part it’s the default one, we just add a dependency. "scripts": { "vscode:prepublish": "tsc -p ./", "compile": "tsc -watch -p ./", "postinstall": "node ./node_modules/vscode/bin/install", "devDependencies": { "@types/node": "^6.0.52", "typescript": "^2.1.5", "vscode": "^1.0.3" "dependencies": { "vscode-languageclient": "^3.1.0" The same file is also used to configure the extension. "activationEvents": [ "contributes": { "configuration": { "type": "object", "title": "Client configuration", "properties": { "dotLanguageServer.maxNumberOfProblems": { "type": "number", "default": 100, "description": "Controls the maximum number of problems produced by the server." "dotLanguageServer.trace.server": { "type": "string", "enum": [ "default": "off", "description": "Traces the communication between VSCode and the dotLanguageServer service." The setting activationEvents is used to configure when should the extension be activated, in our case for DOT files. The particular value (onLanguage:dot) is available because we have installed the extension for GraphViz (Dot) files. This is also the only thing that we strictly need from the DOT extensions. Alternatively, we could avoid installing the extension by adding the following to the contributes section. But doing this way we lose syntax highlighting. "contributes": { "languages": [ "id": "dot", "extensions": [ The contributes section can also contain custom properties to modify the configuration of the extension. As an example we have a maxNumberOfProblems setting. This is the time to call npm install so that the extension vscode-languageclient will be installed. Setting Up The Client Let’s see the code for the client. Copy it (or type it) in src/extension.ts 'use strict'; import * as path from 'path'; import * as fs from 'fs'; import { workspace, Disposable, ExtensionContext } from 'vscode'; import { LanguageClient, LanguageClientOptions, SettingMonitor, ServerOptions, TransportKind, TextEdit, RequestType, TextDocumentIdentifier, ResponseError, InitializeError, State as ClientState, NotificationType } from 'vscode-languageclient'; export function activate(context: ExtensionContext) { // The server is implemented in another project and outputted there let serverModule = context.asAbsolutePath(path.join('server', 'server.js')); // The debug options for the server let debugOptions = { execArgv: ["--nolazy", "--debug=6009"] }; // If the extension is launched in debug mode then the debug server options are used // Otherwise the normal ones are used let serverOptions: ServerOptions = { run : { module: serverModule, transport: TransportKind.ipc }, debug: { module: serverModule, transport: TransportKind.ipc, options: debugOptions } // Options of the language client let clientOptions: LanguageClientOptions = { // Activate the server for DOT files documentSelector: ['dot'], synchronize: { // Synchronize the section 'dotLanguageServer' of the settings to the server configurationSection: 'dotLanguageServer', // Notify the server about file changes to '.clientrc files contained in the workspace fileEvents: workspace.createFileSystemWatcher('**/.clientrc') // Create the language client and start the client. let disposable = new LanguageClient('dotLanguageServer', 'Language Server', serverOptions, clientOptions).start(); // Push the disposable to the context's subscriptions so that the // client can be deactivated on extension deactivation This is the entire client: if you remove the comments it is just a bunch of lines long. We first create and setup the server, for normal and debug sessions. Then we take care of the client: on line 27 we order the client to call the server only for DOT files. On line 37 we create the client with all the options and the informations it need. This is quite easy, given the integrated support for the Language Server Protocol in Visual Studio Code. If you had to create a client from scratch, you would have to support the protocol JSON-RPC and configure the client to call the server whenever is needed: for instance, when the document changes or a completion suggestion is asked by the user. 2. The Server For The Language Server Protocol To create the server you use the same procedure we use to create the client extension, with the command yo code. At the end the server and the client will be in one extensions, but during development we separate them for easier debugging. The code will be automatically moved in the proper place thanks to the following options in package.json "scripts": { "compile": "installServerIntoExtension ../client ./package.json ./tsconfig.json && tsc -p .", "watch": "installServerIntoExtension ../client ./package.json ./tsconfig.json && tsc --watch -p ." …and tsconfig.json, that are created for the server. "compilerOptions": { "outDir": "../client/server", Creating the Server The basics of a server are equally easy: you just need to setup the connection and find a way to maintain a model of the documents. // Create a connection for the server. The connection uses Node's IPC as a transport let connection: IConnection = createConnection(new IPCMessageReader(process), new IPCMessageWriter(process)); // Listen on the connection // Create a simple text document manager. The text document manager // supports full document sync only let documents: TextDocuments = new TextDocuments(); // Make the text document manager listen on the connection // for open, change and close text document events // After the server has started the client sends an initialize request. The server receives // in the passed params the rootPath of the workspace plus the client capabilities. let workspaceRoot: string; The first thing to do is to create the connection and start listening. Then we create an instance of TextDocuments, a class provided by Visual Studio Code to manage the documents on the server. In fact, for the server to work, it must maintain a model of the document on which the client is working on. This class listens on the connection and updates the model when the server is notified of a change. // hold a list of colors and shapes for the completion provider let colors: Array<string>; let shapes: Array<string>; connection.onInitialize((params): InitializeResult => { workspaceRoot = params.rootPath; colors = new Array<string>(); shapes = new Array<string>(); return { capabilities: { // Tell the client that the server works in FULL text document sync mode textDocumentSync: documents.syncKind, // Tell the client that the server support code complete completionProvider: { resolveProvider: true, "triggerCharacters": [ '=' ] hoverProvider: true On initialization we inform the client of the capabilities of the server. The Language Server Protocol can work in two different ways: either sending only the portion of the document that have changed or sending the whole document each time. We choose the latter and inform the client to send the complete document every time, on line 13. We communicate to the client that our server supports autocompletion. In particular, on line 17, we say that it should only ask for suggestions after the character equals ‘=’. This makes sense for the DOT language, but in other cases you could choose to not specify any character or to specify more than one character. We also support hover information: when the user leaves the mouse pointer over a token for some time we can provide additional information. Finally we support validation, but we don’t need to tell the client about it. The rationale is that when we are informed of changes on the document we inform the client about any issue. So the client itself doesn’t have to do anything special, apart from notifying the server of any change. Implement Autocompletion The suggestions for autocompletion depends on the position of the cursor. For this reason the client specify to the server the document, and the position for each autocompletion request. Given the simplicity of the DOT language there aren’t many element to consider for autocompletion. In this example we consider the values for colors and shapes. In this article we are going to see how to create suggestions for color, but the code in the repository contains also suggestions for shapes, which are created in the same way. connection.onCompletion((textDocumentPosition: TextDocumentPositionParams): CompletionItem[] => { let text = documents.get(textDocumentPosition.textDocument.uri).getText(); let lines = text.split(/r?n/g); let position = textDocumentPosition.position; if(colors.length == 0) let start = 0; for (var i = position.character; i >= 0; i--) { if(lines[position.line][i] == '=') start = i; i = 0; In the first few lines we set the proper values, and load the list of possible colors. In particular, on line 2, we get the text of the document. We do that by calling the document manager, using a document URI, that we are given as input. In theory, we could also read the document directly from disk, using the provided document URI, but this way we would had only the version that is saved on disk. We would miss any eventual changes in the current version. Then, on line 11, we find the position of the equals (=) character. You may wonder why we don’t just  use  position.character - 1: since the completion is triggered by that character don’t we already know the relative position of the symbol? The answer is yes, if we are starting a suggestion for a new item, but this isn’t always true. For instance it’s not true if there is already a value, but we want to change it. VSCode Complete for existing items Autocomplete for an existing value By making sure to find the position of the equals sign, we can always know if we are assigning a value to an option, and which option it is. Sending The Suggestions For Autocomplete These suggestions are used when the user typed “color=”. if(start >= 5 && lines[position.line].substr(start-5,5) == "color") let results = new Array<CompletionItem>(); for(var a = 0; a < colors.length; a++) label: colors[a], kind: CompletionItemKind.Color, data: 'color-' + a return results; Now that we know the option name, if the option is color we send the list of colors. We provide them as an array of CompletionItems. On lines 26-28 you can see how they are created: you need a label and a CompletionItemKind. The “kind” value, at the moment, is only used for displaying an icon next to the suggestion. The last element, data, is a field meant to contain custom data chosen by the developer. We are going to see later what is used for. We always send all the colors to the client, Visual Studio Code itself will filter the values considering what the user is typing. This may or may not be a good thing, since this makes impossible to use abbreviations or nicknames to trigger a completion suggestion for something else. For example, you can’t type “Bill” to trigger “William Henry Gates III”. Giving Additional Information For The Selected CompletionItem You may want to give additional information to the user, to make easier choosing the correct suggestion, but you can’t send too much information at once. The solution is to use another event to give the necessary information once the user has selected one suggestion. connection.onCompletionResolve((item: CompletionItem): CompletionItem => { item.detail = 'X11 Color'; item.documentation = 'http://www.graphviz.org/doc/info/colors.html'; return item; The method onCompletionResolve is the one we need to use for doing just that. It accepts a CompletionItem and it adds values to it. In our case if the suggestion is a color we give a link to the DOT documentation that contains the whole list of colors and we specify which color scheme is part of. Notice that the specification of DOT also supports color schemes other than the X11 one, but our autocomplete doesn’t. Validating A Document Now we are going to see the main feature of our Language Server: the validation of the DOT file. But first we make sure that the validation is triggered after every change of each document. documents.onDidChangeContent((change) => { We do just that by calling the validation when we receive a notification of a change. Since there is a line of communication between the server and the client we don’t have to answer right away. We first receive notification of the change and once the verification is complete we send back the errors. The function validateDotDocument takes the changed document as argument and then compute errors. In this particular case we use a C# backend to perform the actual validation. So we just have to proxy the request through the Language Server and format the results for the client. While this may be overkill for our example, it’s probably the best choice for big projects. If you want to easily use many linters and libraries, you are not going to mantain a specific version of each of these just for the Language Server. By integrating other services you can mantain a lean Language Server. The validation is the best phase in which to integrate such services, because it’s not time sensitive. You can send back eventual errors at any time within a reasonable timeframe. function validateDotDocument(textDocument: TextDocument): void { let diagnostics: Diagnostic[] = []; request.post({url:'http://localhost:3000/parse', body: textDocument.getText()}, function optionalCallback(err, httpResponse, body) { let messages = JSON.parse(body).errors; names = JSON.parse(body).names; let lines = textDocument.getText().split(/r?n/g); let problems = 0; for (var i = 0; i < messages.length && problems < maxNumberOfProblems; i++) { if(messages[i].length == 0) messages[i].length = lines[i].length - messages[i].character; severity: DiagnosticSeverity.Error, range: { start: { line: messages[i].line, character: messages[i].character}, end: { line: messages[i].line, character: messages[i].character + messages[i].length } message: messages[i].message, source: 'ex' // Send the computed diagnostics to VSCode. connection.sendDiagnostics({ uri: textDocument.uri, diagnostics }); On lines 5-6 we receive back both our errors and other values computed by our service (line 4). We take advantage of the validation to compute which are the names of nodes and graphs, that we store in a global variable. We are going to use these names later, to satisfy requests for hover information. The rest of the marked lines shows the gist of the communication with the client: • we gather the diagnostic messages • we setup them for easier use by the user • we send them to the client. We can choose the severity, for instance we can also simply communicate informations or warning. We must also choose a range for which the message apply, so that the user can deal with it. Sometimes this doesn’t always make sense or it’s possible, in such cases we choose as a range the rest of the line length, starting from the character that indicate the beginning of the error. The editor will then take care of communicating the mistake to the user, usually by underlining the text. But nothing forbids the client to do something else, for instance if the client is a log manager, it could simply store the errore in some way. How Visual Studio Code shows an error How Visual Studio Code shows an error We are going to see the actual validation later, now we are going to see the last feature of our server, instead, the Hover Provider. A Simple Hover Provider An Hover Provider job is to give additional information on the text that the user is hovering on, such as the type of an object (ex. “class X”), documentation about it (ex. “The method Y is […]) or the signature of a method. For our language server we choose to show what are the elements that can be used in an edge declaration: node, graph or subgraph. To find that information ourselves we simply use a listener when we validate the DOT document on the service. connection.onHover(({ textDocument, position }): Hover => { if(names[i].line == position.line && (names[i].start <= position.character && names[i].end >= position.character) ) // we return an answer only if we find something // otherwise no hover information is given return { contents: names[i].text To communicate this information to the user, we search between the names that we have saved on the Languager Server. If we find one on the current position that the user is hovering on we tell the client, otherwise we show nothing. VS Code Hover Information VS Code Hover Information 3. The C# Backend Choosing One ANTLR Runtime Library Since we are creating a cross platform service we want to use the .NET Core Platform. The new ANTLR 4.7.0 supports .NET Core, but at the moment the nuget package has a configuration problem and still does not work. Depending on when you read this the problem might have been solved, but now you have two choices: you compile the ANTLR Runtime for C# yourself, or you use the “C# optimized” version. The problem is that this “C# optimized” version that supports .NET Core it’s still in beta, and the integration to automatically create the C# files from the grammar it’s still in the future. So the generate the C# files you have to download the latest beta nuget package for the ANTLR 4 Code Generator. Then you have to decompress the .nupkg files, which is actually a zip file, and then run the included ANTLR4 program. /tools/antlr4-csharp-4.6.1-SNAPSHOT-complete.jar -package <NAMESPACE-OF-YOUR-PROGRAM> -o <OUTPUT_DIR> -Dlanguage=CSharp_v4_5 <PATH-TO-GRAMMAR> You can’t use the default ANTLR4 because it generates valid C# code, but that generated code is not compatible with the “C# optimized” runtime. The ANTLR Service We are going to rapidly skim through the structure of the C# ANTLR Service. It’s not that complicated, but if you don’t understand something you can read our ANTLR Mega Tutorial. We setup ANTLR with a Listener, to gather the names to use for the hover information, and an ErrorListener, to collect any error in our DOT document. Then we create a simple ASP .NET Core app to communicate with the Language Server in TypeScript. In Program.cs (not shown) we configure the program to listen on the port 3000, then we setup the main method, to comunicate with the server, in Startup.cs. var routeBuilder = new RouteBuilder(app); routeBuilder.MapPost("parse", context => AntlrInputStream inputStream = new AntlrInputStream(text); DOTLexer lexer = new DOTLexer(inputStream); CommonTokenStream commonTokenStream = new CommonTokenStream(lexer); DOTParser parser = new DOTParser(commonTokenStream); // the listener gathers the names for the hover information DOTLanguageListener listener = new DOTLanguageListener(); DOTErrorListener errorListener = new DOTErrorListener(); DOTLexerErrorListener lexerErrorListener = new DOTLexerErrorListener(); GraphContext graph = parser.graph(); ParseTreeWalker.Default.Walk(listener, graph); var routes = routeBuilder.Build(); We use a RouteBuilder to configure from which path we answer to. Since we only answer to one queston we could have directly answered from the root path, but this way is cleaner and it’s easier to add other services. You can see that we actually use two ErrorListener(s), one each for the lexer and the parser. This way we can give better error information in the case of parser errors. The rest is the standard ANTLR program that use a Listener: • we create the parser • we try to parse the main element (ie. graph) • we walk the resulting tree with our listener. The errors are found when we try to parse, on line 22, the names when we use the LanguageListener, on line 24. The rest of the code simply prepare the JSON output that must be sent to the server of the Language Server Protocol. Finding The Names Let’s see where we find the names of the elements that we are providing for the hover information. This is achieved by listening to the firing of the id rule. In our grammar the id rule is used to parse every name, attributed and value. So we have to distinguish between each case to find the ones we care about and categorize them. public override void ExitId(DOTParser.IdContext context) string name = ""; if(context.Parent.GetType().Name == "Node_idContext") name = "(Node) "; if(context.Parent.GetType().Name == "SubgraphContext") name = "(Subgraph) "; if(context.Parent.GetType().Name == "GraphContext") name = "(Graph) "; Names.Add(new Name() { Text = name + context.GetText(), Line = context.Stop.Line - 1, Start = context.Start.Column, End = context.Start.Column + context.GetText().Length We do just that by looking at the type of the parent of the Id node that has fired the method. On line 18 we subtract 1 to the line because ANTLR count lines as humans do, starting from 1, while Visual Studio Code count as a developer, starting by 0. In this tutorial we have seen how to create a client of a Language Server for Visual Studio Code, a server with Visual Studio Code and a backend in C#. We have seen how easily you can add features to your Language Server and one way to integrate it with another service that you already are using. This way you can create your language server as lightweight as you want. You can make it useful from day one and improve it along the way. Of course we have leveraged a few things ready to be used: • an ANTLR grammar for our language • a client and a server implementation of the Language Server Protocol What is amazing is that with one server you can leverage all the clients, even the one you don’t write yourself. If you need more inspiration you can find additional examples and informations on the Visual Studio Code documentation. There is also the description of the Language Server Protocol itself, if you need to implement everything from scratch. Get the Language Server Protocol as a PDF + Code And receive more content on the Language Server Protocol and Language Engineering