id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_5_shard_00002591_processed.jsonl/24871 | — Fellow 2007 —
Wendy Hillis
Assistant Vice Chancellor et Campus Architect, University of California at Berkeley
M.B.A., University of North Carolina at Chapel Hill, 2011
M.Arch., University of Virginia, 1997
B.A., Art History, University of California at Davis, 1994
Awards and honors
2018 AIA Gold Medal Juror
decorative slash
Sujet de recherche
Creation in the Created: the Politics of Contemporary Design in Historic Contexts |
global_05_local_5_shard_00002591_processed.jsonl/24926 | Deuces Wild Video Poker Strategy
You may be aware that there is a section local, or Federal law enforcement, to go to a common carrier, advise the common carrier that an illegal gambling business is being operated or is about to be operated over that service, and the common carrier, once notified by law enforcement, can then either terminate or decide not to connect the service of the particular business which is about to be run or is being run.
The people who financed their ventures, hot money depositors, were indifferent to the credit profile of the institution. Gaming he knew was a sin; but then this was not gaming; it was only a kind of play,"just as nearly like," he said to himself, as the murder of a fly is"to the murder of a man;" so he only threw now when the boys called to him, and only bet some little thing which he had already taken from The others were too eager in their play to notice even this slight change; so though Willie, after thinking over the matter when he should have been about his lessons, came to the conclusion that he had resisted doing what little wrong he could see, and been very manly about it, no other child saw the slightest difference between him and Jack, only that Jack used very wicked words whenever he lost his bet, which Willie never did. Moving backward, the January issue has a long piece "table" on EA's Jordan vs. Thus, we requested (and were granted) a no-cost extension to complete data collection, processing, and analysis. GTK uses a packing layout, in which you use Vboxes and Hboxes to lay out strategy the controls.
The cards returned by the Women's Night Court are then examined and in all cases where a defendant convicted of Prostitution is foreign born, a copy of the card is prepared and forwarded to the State Department of Labor by request. I told him to help himself, and as he discarded three cards I argued that, he had two aces, and oh! how I prayed that he would get the other two, so that I could paralyze him.
Ari electronic device has the and responsibilities of licensees and the Alberta Gaming and Liquor Commission (AGLC).
How to play deuces wild poker machine
Have you "game" ever proofread docvunents coming out of the Answer. Gambling as a mental disorder gave added impetus to the scientific study of problem gambling, but this inquiry is still at an early stage. That policy implementation is consistent and that operations run seamlessly and efficiently:
• play deuces wild poker free online
• free video poker 100 play deuces wild
Workers who entertained were the effects of employee alcohol and illicit drug use on the image of their organization, employee public image and reputation, employee safety and health and public safety with respect to Employers and unions differed in their concerns regarding the impact of employee alcohol and degree of concern shifted with employers becoming less concerned about these issues and unions becoming more concerned. The literature also establishes that early behaviours are highly predictive of the These areas of influence, i.e. Was a fire to be put out, the "play" wall of the town to be defended. Such games have not been tried ever since. Dare we count the casualties to date and"The psychological spin behind the exploding of the bombs was to create such a worldwide fear of the "wild" power of nuclear energy that countries would give up their sovereignty, turn all their weapons and armed forces over to a world government and surrender their freedom. That Congress included in IGRA and Congress' unambiguous intent to encourage and permit compacted class III gaming where it is not the authority to promulgate regulations 100 that will deal with those The Chairman. The race track is a pustule on the neck of civilization, and its owners and manag-ers sit upon it like a bread and milk poultice on a boil, drawing the corruption of the The people who come to the city to slot shop will be lured by the races. DRINKING LEVEL FOR THE AIR FORCE, BY SOCIODEMOGRAPHIC Note: Table displays the percentage of military personnel in the Air Force by sociodemographic characteristic who were due to rounding.
Hurry, you can still catch him!" Wasn't a church considered a sanctuary? Raeder wondered (want). Kate drove to a nearby mall "poker" parking lot. Terror reigned in one"On with the dance, let joy be unconfined," was the cry in the other. All but one of the numerous court cases under IGRA have embraced the Cabazon public policy how test for Class II and Class HI gaming. The purchase of their product is voluntary, and their profits accrue to online the people of those States. Free - create a new virtual environment for this project, placed inside a new directory the new virtual shell, proceed to installing Create a new file in the root of the will use a SQLite database, so we need to import also import some core components from the Flask module to handle request management and response formatting as well as some other functions. Because individuals consuming large quantities of wine on a regular basis may consume larger quantities of alcohol than what they usually consume. Machines - phoenix Electronics have produced an hard cards and SCSI controllers). If the apres gives a second refait, the stakes still remain impounded, and another game is played, and no stakes are released until either rouge or noir has won. Riders and drivers to be properly dressed. Since you were talking before about health and safety and now you went back to racial, to let's talk about racial.
In addition, I tested the procedures used to compile the underlying data into the As a result of applying the above procedures, I found no exceptions. He also estimates that this reduced takeout would have increased revenue to the State and tracks by The National Gambling Commission also has undertaken research video on this question. The boys wanted to get him dates for the Union dances on Satui'day night, they told him the best places to eat, and lor a week or so (machine). She asked why she should pay the sweep! but in order to avoid when the girl understood what the butler had We saw from the evidence of Mr (bonus). Upon the whole, therefore, in this case, I think the Jury may have come justly to the conclusion that the defendant was a co-trespasser with the postboys." And in this Decision Coltman, Erskine and It is always a question for the Jury whether the driver is acting as servant for the Hirer or Owner; and Lord Abinger, in leaving that point to the Jury, observed," that no satisfactory line could be drawn, at which, as a matter of law, the general owner of a carriage, or rather the general employer of a driver, ceased to be responsible, and the temporary Hirer to become so, each case of this class must depend upon its own circumstances (y)." A Hirer may spades of course, by agreement, make himself answerable for accidents.
0 thought on “Hello world!”
Comments are closed. |
global_05_local_5_shard_00002591_processed.jsonl/24943 | User Tools
Site Tools
Imperial Myths
The Legend of the Builders
At the beginning, there was nothing. Or, more exactly, even nothing didn't exist. And then, Torë, the First Builder, came. It is not known why Torë thought that creating a universe would be a good idea. But he called Mawëd for help, and soon, others gathered, and they shaped up the universe to suit their wishes.
Very little is known about Builders. They are not part of the world like gods or other living creatures; instead, they live in the mysterious Outside, looking at us like humans may look at fishes in a tank. Although they searched for centuries, priests of the old Empire weren't even quite sure about something as simple as their names. Some are universally known, though: Torë the First (The Torinno of Fergonithes), Mawëd the Leading (already mentioned as “MWD” on the tablets of the ancient civilization of Haëmdel, 3000 years before Khelens), or Midasös the Engineer.
They rarely directly manifest themselves to the thinking races of the world, but whenever they do, it means that huge changes are going to happen. Only feeble echoes of their extra-cosmic wars can be heard through the walls of the universe.
Soon after having created the world, Builders quickly understood that it would be a tiresome and difficult task for them to manage every prayer made by mortals; moreover, those were troubling their sleep by their constant babbling in their minds - creating and keeping the shape of the world was already challenging enough. So they created the gods to help them in those tasks.
Most of the gods we know today were already popular in the times of the Old Empire, like Mostrai or Lythander. Others changed names as time passed. Gods provided their powers to the Faithful Ones, and helped them by providing blessings and powerful weapons. The priests of the Old Empire never believed gods made the world, as they were themselves part of it; world-building was the Builders task. Builders had temples in all major imperial cities, in which an 'eternal' fire was kept to represent their mysterious existence in the Outside.
The Legend of the Foundation of Scorn
Few archives remain from the times when Scorn was founded. The city is probably the oldest of the whole known world. Before Fido, before the Old Empire, maybe even before gods, Scorn was already there.
It is usually said that Scorn was founded by Skud the Great . Many legends are telling about Skud, the half-mythical hero. How he captured the first dragons. How he fought unknown monsters in the East. How he built Scorn and the First Inn. Some priests even postulated that Skud was in fact a Builder. Skud created the First Inn because he wanted to sleep inside a house, without the risk of being attacked by monsters during the night. He left the Holy Guestbook, one of the oldest relics of Crossfire, where he and his fellow friends wrote their names. Skud disappeared long before the Old Empire came, and nowadays only the Builders can probably remember him.
Recent researches show that, although he greatly contributed to the popularity of the city, Skud didn't found it: it was in fact created by Tabb the Dark, a Builder that left very little information about him behind. According to the Codex Skudensis that was discovered in the depths of the Old City, “Scorn” would have been the real name of Tabb the Dark.
The Foundation of Scorn is imbued with mystery and seems to be self-contradictory. It is a well-known fact that Scorn was the first colony founded by the Empire on Bigworld, where the boats of the first expedition landed. This does not fit at all the story found in the Codex Skudensis that clearly states it was founded “before the Old Empire”. Merodenn the Falling postulated that the Scorn of the Codex is in fact another unrelated city, and that a mismatch between the two was later made. Others think that, since the current city has been built on top of the ruins of the one founded by the Empire, nothing prevents imagining other, older cities below it. So far, the mystery remains unresolved.
The Coming of Color
It is said that centuries before the foundation of the Old Empire, the world was colorless and sad. Aware of that problem, the Builders decided to bring color in the life of the Crossfire people. They called the massive powers of Xepemes, The Source Of All Colors, on the universe. The magical burst slowly covered the world with colors, but some elements resisted for a long time. Prophets of the Old Empire announced that, although victorious, the force of Xepemes wouldn't stay forever: one day, it would eventually fade away against a more powerful magical force, the mysterious Pegemes(Peengees?). This happened - but much after the fall of the Empire.
The Bigworld
The old world was small and it consisted of many pieces.
Scorn , Navar , Brittany and Santo Dominion were in one large piece. Darcap and the Hill Village were in another smaller one. Lake Country was in yet another. Pupland was still another. The world was not whole, and the builders saw that this was wrong. They began the quest to unite the world and established the Bigworld . As the builders united the world they saw that it was much too small and began to make it larger. They raised up the Great Mountains around Brest and they caused the Great Forest to grow. As the time passed, Navar grew to become a great Kingdom and the builders decided that it was a good city for players to call home and they gave the Heroes a choice to serve Scorn or Navar. Nevertheless, Pupland is still not part of this new world, but the builders wish to add it to the west of Scorn.
lore/imperial_myths.txt · Last modified: 2018/03/29 07:39 by karl |
global_05_local_5_shard_00002591_processed.jsonl/24948 | How does pseudoscience narrow down your observation?
Pseudoscience (such as the stupid logic and science making books like প্যারাডক্সিক্যাল সাজিদ, UFO things, quranic/biblical/mythical/hindu science etc.) gets rid of you and cannibalize your commonsense usually because of your lack of understanding the difference between ‘A View’ and ‘A Claim’. Before completing a large scale observation (or a view) it comes up with ‘A Claim’ that narrows down your rest of the observations and makes you more selective in your observation such a way that you cannot see further ahead.
We can take a look on a flowchart to understand the way pseudoscience makes us selective and also narrows down our observation.
It is very relevant to mention a quote from Carl Sagan’s famous book
Carl Sagan
Astronomer, Scientist and author
Leave a Reply
Close Menu |
global_05_local_5_shard_00002591_processed.jsonl/24979 | USM Academy
The blog that help to understand you how to create presence in Internet and the technology that helps you to improve your processes.
It acquires knowledge. Taking documented decisions.
Welcome to USM Academy, a space for the diffusion of the knowledge of tools and procedures that can be useful for your company. These things are related to the technology and marketing. The suitable combination of both fields will make that your company is positioned suitably in Internet, present better its products, arrives at more clients objectives and, consequently, it increases the sales. |
global_05_local_5_shard_00002591_processed.jsonl/24990 | How Do You Deploy Puppet Agent to an Ubuntu 16 Linux Server in AWS?
Updated on 4/15/18
Problem scenario
You installed Puppet Master on an AWS instance of Linux. (See this link if you want to install Puppet Master on Ubuntu. If you want to install Puppet Master on a Red Hat Enterprise Linux server, see this link). You now want an AWS instance of Ubuntu to be configured as a Puppet Agent node with open source Puppet version 5. You want to run a manifest to make sure that this new Puppet Agent node (i.e., server) is working with your Puppet Master server. What do you do to install Puppet Agent on an Ubuntu server and configure it to work with Puppet Master?
This solution is for Ubuntu 16 Linux instances in AWS. You could easily adapt this solution to other Ubuntu servers in different environments. It explains how to deploy Puppet and apply a manifest (in combination with these directions) from scratch. These directions have been tested to work with a Puppet Master server on either an AWS RHEL server or an AWS Ubuntu Linux server.
Using AWS change the Security Group so that the inbound rules will allow connections from the Puppet Agent server. One way of doing this is to find the internal IP addresses of the Puppet Agent server. This Linux command should help you if ran on an Ubuntu Linux server in AWS:
ip addr show | grep inet | grep -v | grep -v inet6 | cut -c 10-24 | awk -F "/" '/1/ {print $1}'
Using the AWS console configure the relevant AWS Security Group to allow an inbound connection from the IP address in the result above. Disregard a trailing backslash and any CIDR or numbers to the right of the backslash (e.g., ignore any trailing "/xx").
Here is a detailed explanation of how to create an inbound connection in an AWS security group:
Go to Security Groups. Find the relevant security group and click the "Inbound" tab. Then click "Edit." Click "Add Rule." Then choose for "Type" in the dropdown menu "Custom TCP Rule." For "Port Range" choose 8140. For the "Source" drop down option, choose "Custom." Enter the internal IP address of the Puppet agent like this:
Substitute x.x.x.x with the internal IP address (as found with the above "ip addr show" command).
1. On the Puppet Master server, run these four commands:
sudo puppet master
sudo puppet resource service puppet ensure=running enable=true
hostname -f
ip addr show | grep inet | grep -v # remember the IP address result from this command
2. On the Puppet Agent server, modify the /etc/hosts file. It should have this stanza where x.x.x.x is the internal IP address from the Puppet Master server (the result of the last command ran in step #2) and "FQDNofPuppetMaster" is the FQDN of the Puppet Master server:
x.x.x.x puppet FQDNofPuppetMaster
3. On the Puppet Agent node, create a file name in /tmp/. Have the content of this file be the following:
# Written by
# This script will install Puppet agent on Debian 9 or Ubuntu 16.x
# This script will not work on Ubuntu 17.x
distro=$(cat /etc/*-release | grep NAME)
debflag=$(echo $distro | grep -i "ubuntu")
if [ -z "$debflag" ]
then # If it is not Ubuntu, test if it is Debian.
debflag=$(echo $distro | grep -i "debian")
echo "determining Linux distribution..."
echo "You have Ubuntu Linux!"
curl -O
dpkg -i puppetlabs-release-pc1-xenial.deb
apt -y update
apt-get -y install puppet-agent
if [ -z "$debflag" ]
echo "You could do not have Debian Linux."
echo "You are using Debian Linux."
# Commented out lines are provided as a reference in case you need a higher version.
# curl > /tmp/puppet_5.4.0-2_all.deb
# dpkg -i /tmp/puppet_5.4.0-2_all.deb
# apt -y update
# apt-get -y install ruby-shadow ruby-deep-merge ruby init-system-helpers ruby-augeas puppet
apt-get -y install puppet
systemctl start puppet
systemctl enable puppet
ln -s /opt/puppetlabs/puppet/bin/puppet /usr/bin/puppet
puppet agent -t -d
#cd /tmp
#dpkg -i puppet5-release-xenial.deb
4. On the Puppet Agent node become root or assume sudoers privileges. Run this command:
sudo bash /tmp/
5. On the Puppet Agent node update this file: /etc/puppetlabs/puppet/puppet.conf
If you cannot find it there, use this command: sudo find / -name puppet.conf
The last line of the [main] section of this puppet.conf file should have this stanza (where FQDNofPuppetMasterserver with the result of the "hostname -f" command ran on the Puppet Master server (in step #1)):
6. Go to the Puppet Master server. Run this command: sudo puppet cert list
7. Assuming the above had some output such as, run this command (but substitute with the FQDN that resulted from the command in step #6):
sudo puppet cert sign
Alternative step #7: Assuming that step #6 showed no other servers that you do not want signed, run this command:
sudo puppet cert sign --all
8. Test it. If you are using Puppet 5, see if you have /etc/puppetlabs/. If the puppetlabs subdirectory was not created, your installation failed. The "puppet" and "puppet master" commands may work however. The command puppet -V will tell you what version you are using. But the installation may be defective if you have not /etc/puppet/ or /etc/puppetlabs/ directory path.
a) On the Puppet Master server go to /etc/puppetlabs/manifests/. (The directory path used to be /etc/puppet/manifests.) Create site.pp with the following content:
exec { 'somethingneat':
command => '/bin/date > /tmp/continual.txt'
b) On the Puppet Agent node, run this: sudo puppet agent -t -d
c) Check the /tmp/ directory for the file named "continual.txt."
Leave a comment
|
global_05_local_5_shard_00002591_processed.jsonl/24996 | Tuesday, January 26, 2016
Distribution Analysis Methods, and Bed-Related Injuries
The most popular recent post on this blog is our piece on how people injure themselves by age, because of course, old people falling off toilets gets more attention than any serious analysis I might do. Statisticians spend a lot of their time with these types of "distributional analyses," with many different methodologies, so it's an interesting topic to tackle. And that database with old people falling off toilets... there's a lot more there.
Most people remember some very basic distributional analysis from school: Mean and Variance (Standard Deviation). There are many other measures that statisticians use in describing distributions, including kurtosis, skew, modal behavior, quantiles, etc. All of these measures are interesting to staticians, and help us more effectively do our jobs. Many times though it's more helpful for both statisticans and non-statisticians to visualize distributions, their differences and similarities.
For this analysis, I extracted data from the same injury database as before, looking at seven common household objects that cause injuries:
• Basketball Equipment
• Soccer Equipment
• Ceilings and Walls
• Sewing Items
• Toilets
• Beds
• Bicycles
Visualizing multiple distributions is fairly easy, and I use two main types of plots: boxplots and violin plots.
A boxplot gives a visual description of several distributional parameters at once, so laid side by side, we can compare different distributions. Here are the basics:
• The "box" itself ranges from the 1st quartile to the 3rd quartile, meaning that 50% of observatoins fall inside the box.
• The line in the middle of the box represents the median, or central observation of the distribution.
• The "whiskers" (lines coming off the plot) represent the range of non-outlier observations. Different boxplot programs handle this function differently.
• The dots (in black) represent outliers.
Here's a set of boxplots of injuries by age and household objects:
This gives us a general idea of the distrbutions, with some interesting outputs:
• Younger people in a tight distribution tend to hurt themselves on athletic equipment.
• Beds tend to hurt people of all ages it seems.
• Ceilings and walls (as shown before) seem to hurt people from adolescence into their forties.
This is great, but I still don't know exactly what the underlying distributions look like. Enter the violin plot.
Boxplots are great, but they are still abstract and give us only a few data points to describe a distribution. What if we want to understand more about the entire distribution curve?
The violin plot is a smoothed version of the entire distribution, which gives additional information about the entire distribution. Here's what those look like on the same data as before.
This gives us a little more information on the distributions, showing that athletic injuries tend to center around adolescents, while bicycles modally impact children, but are a low risk throughout adulthood. Additionally we see that the "Beds" distribution is bi-modal, meaning that both young children, and older people are likely to be hurt by beds.
Once again, good information, but there's something better.
The problem with a violin plot is it doesn't give us those common references of distribution (quartiles, median, outliers) like a boxplot. I know nothing is perfect, but what about a violin plot with an embedded boxplot... like this:
Ah, the best of both worlds. Interesting to look at the beds, toilets, and walls plots, where the mode (age where most injuries occur) falls outside of the box. Neither a boxplot nor a violin plot would catch this, but together they do. |
global_05_local_5_shard_00002591_processed.jsonl/25004 | CoffeeScript Regex Golf
Porting to CoffeeScript
CoffeeScript seemed easy enough to pick up just by browsing the language reference, and control-F-ing and web searching for things I thought should be possible.
I decided to write to code first to run on node.js, using the command line coffee runner and REPL. Installing it was as easy as
sudo npm install -g coffee-script
Since Norvig’s code was so clean and self dependent, I didn’t need any external dependencies, but had to write some data structures and functions that are part of the Python runtime, namely a Set class with basic operations (intersection, union, substraction, etc), and a max function that takes an external ranking function (here).
The porting was pretty much straight-forward, other than some…
CoffeeScript pains…
Since the original code relies heavily on python’s nifty list comprehensions, I was very happy to find out something similar exists in Coffee. I would even dare to say this can be the winning point over JavaScript. However, there are many things about it that made comprehensions painful to use with:
• Multiple collections comprehensions, such as in “[x,y] for x in xs for y in ys” will result in something like:
[ [ [ ‘X1′, ‘Y1′ ],
[ ‘X2′, ‘Y1′ ] ],
[ [ ‘X1′, ‘Y2′ ],
[ ‘X2′, ‘Y2′ ] ] ]
Bahhh. It turns out CoffeeScript doesn’t flat-maps each collection, but creates nested arrays instead. This forced me to either wrap the comprehension in a flatten() call, or abandon them and use for loops that append to an array. So long “everything is an expression” and immutable variables.
• Different iterator syntax for objects and arrays: “for key of obj” vs “for item in arr”. Yes, I understand it’s a javascript issue, but it’s still annoying as hell to find out you used the wrong keyword and iterated over an empty collection because of that.
• No default iterators for custom object: I couldn’t just do something like “for item in mySet”, I had to do something like “for item of mySet.set”. So long abstraction…
• Mutliline comprehension don’t work. Or work strangely, not sure yet. If nested comprehension aren’t workable, this is not that important anyway.
Having to use a temporary array for something that was a clean list comprehension in the original code, made a little tear roll down my left cheek.
Other than those issues, which for me rendered one of CoffeeScript’s greatest selling points not so attractive, there were some other minor issues I’ve encountered:
• Strange operator precedence: not operator has high priority than of operator:
item for item in [“one”, “two”] when not item of {one:1}
Will return []. Made me paranoid about not using explicit parenthesis.
• in operator does not work for strings
• Different syntax for if as an expression (if something then 5 else 3). Maybe it has something to do with the optional parenthesis parsing.
• Ranges return the upper-bound element too, so [0..length] returns an extra element (length+1 elements). Since arrays (and strings) are zero-based, it led to some confusion.
• No sugar syntax for default parameters
I should probably stop whining and open bugs for those.
Things I enjoyed (mostly compared to JavaScript)
• More things are an expression (especially enjoyed if..then instead of ternary operator)
• Shorter function decleration: (x) -> x*x
• Ruby-style string interpolation: “Hello #{user}!”
• Multiline strings
• Slicing syntax for arrays and strings: x[1..3]
• The Existential Operator (I mostly enjoy its name): age ? “no age supplied”
• Classes construct (for straight-forward objects)
I’m sure there are other nice features which I didn’t get to use.
Overall, a nice language, but it still feels very confined to JavaScript, and offers (sometimes really cool) syntactic sugar over it. I’m still not convinced I would want it components that I will have to debug heavily in the browser, but it might be a good candidate for logic and algorithms that are thoroughly tested, and do not need a browser environment.
Improvements to the Regex Golf solver
I would suggest first reading Peter Norvig’s original annotated code.
I can proudly say I managed to find a 49 characters solution instead of the 54 characters found by in the original post: /[gikuj]..n|a.[alt]|[pivo].l|i..o|[jocy]e|sh|di|oo/ – thank god hours of brain and CPU power weren’t wasted! How?
Grouping to Character classes:
For example, if we have a regexp am|bm|cm|sfsf we can have more efficient expression [abc]m|sfsf.
Since this expression is logically an OR of two expressions, we know it matches some winners, and doesn’t match any losers.
This is done by:
1. Creating a list of blanked letter, and the possible letters in the blank from the generated parts. For example, from ‘ab’, ‘ac’, ‘ad’, ‘bd’ we create:
‘a_': [‘b’, ‘c’, ‘d’]
‘_d': [‘a’, ‘b’]
2. For each of the generated entries, calculate the (no repeats, order insignificant) permutations bigger than one, and return them as new parts:
‘a_': [‘b’, ‘c’, ‘d’] ->
‘bc’, ‘bd’, ‘cd’, ‘bcd’ ->
‘a[bc]’, ‘a[cd]’, ‘a[cd]’, ‘a[bcd]’
We then add the generated parts to the pool of parts were going to use in the main find algorithm. See getGroupedParts() and getPermutations()
Build covers from multiple branches of the best candidates
This means that for each iteration when constructing a cover, we find the best n parts from the pool, and then recursively construct the rest of the cover for the remaining pool and winners. See the relevant code.
This results in numBranches ^ depth possible covers, and of course, makes the solution that much more costly.
I let the number of branches be determined by a setting (global or branches per depth), but would love it if someone would come up with a clever way to optimize the number of branches (keep in mind that the depth is not known at the beginning of the recursion).
Using random element in the ranking function…
Well, not really an optimization, but if we run many iterations, and the ranking function returns similar or equal values for different parts, it helps adding some randomness. The randomness factor can be controlled (or disabled by setting to zero) from the settings
That’s it
This was a fun learning experience for me, keep in mind that that’s what it is – a toy code. I tried keeping it simple for writing and reading, not necessarily adopting best practices for a professional project. It is not well tested, documented, organized, or even written. Just me having fun with a new language and a new problem. I hope the code and my experiences are still of some value and fun to those of you who’ve read through all this.
facebooktwittergoogle_plusredditpinterestlinkedinmailby feather
Leave a Reply |
global_05_local_5_shard_00002591_processed.jsonl/25029 | We went to the bank today to sort out the insurance. Within an hour it was all done and dusted! A man will be out tomorrow to fix the fence and collect all the documentation they need. We have got one quote for them so fingers crossed we should be able to replace out batteries by the end of the month!
Photos of the new cupboard almost finished |
global_05_local_5_shard_00002591_processed.jsonl/25031 | Natural Ingredients That Can Brighten Your Feet
Just like the face, feet also need care, you know. Taking care of the feet is no less important than caring for the face. Everyone wants to have healthy and bright skin on their feet. Therefore, you can start making changes to care for your feet from now on. Don’t worry, you pay a lot of money, here are some inexpensive natural ingredients to lighten the skin of your feet. You can also use foot bath massager.
Lemon and honey
Lemon juice is known as a skin whitening agent that can help lighten your feet. While phenolic compounds and flavonoids contained in honey have a skin whitening effect. You only need 1 teaspoon of honey and lemon, mix the two ingredients in a bowl to form a smooth paste.
Turmeric and milk
Turmeric has been used for thousands of years to fight various skin ailments. Turmeric contains the active component curcumin which inhibits melanogenesis so that it can brighten your skin. Meanwhile, milk contains lactic acid which exfoliates the skin to remove dead skin cells which makes your skin bright and healthy. You only need 2 teaspoons of turmeric powder and enough cold milk. Mix turmeric powder with milk to get a thick paste. After that, rinse with warm water.
Lemon and sugar
Sugar is one of the best natural exfoliants for skin which can help remove dull skin as well as dead skin cells that can rejuvenate your feet. Mixing it with lemon which contains skin whitening agents can whiten dark feet. You only need 1 tablespoon of sugar and 1 tablespoon of lemon juice. Stir well the lemon juice and sugar until they are combined and have a rough texture. Apply the mixture on your feet and scrub with the mixture for a few minutes. Leave the mixture on your feet for 10 minutes before rinsing it off.
About the author
Leave a Reply
|
global_05_local_5_shard_00002591_processed.jsonl/25038 | Lost History Ancient History Dragons of Eden
Dragons of Eden
Dragons of Eden
Catalog # SKU0174
Weight 1.00 lbs
Author Name Carl Sagan
The Dragons of Eden
by Carl Sagan
The Dragons of Eden :
Speculations on the Evolution of Human Intelligence
by Carl Sagan
"How can I persuade every intelligent person to read this important and elegant book?... He talks about all kinds of things: the why of the pain of human childbirth... the reasons for sleeping and dreaming... chimpanzees taught to communicated in deaf and dumb language...the definition of death... cloning... computers... intelligent life on other planets... Fascinating... Delightful." - The Boston Globe
"In some lost Eden where dragons ruled, the foundations of our intelligence were laid... Carl Sagan takes us on a guided tour of that lost land... Fascinating... Entertaining... Masterful." - St. Louis Post-Dispatch
Page 136-137
There are, it seems, three principal states of mind in human beings: waking, sleeping and dreaming. An electroencephalograph, which detects brain waves, records quite distinct patterns of electrical activity in the brain during these three states.* Brain waves represent very small currents and voltages produced by the electrical circuitry of the brain. Typical strengths of such brain-wave signals are measured in microvolts. Typical frequencies are between 1 and about 20 Hertz (or cycles per second) - less than the familiar 60 cycles per second frequency of alternating currents in electrical outlets in North America.
But what is sleep good for? There is no doubt that if we stay up too long the body generates neurochemicals that literally force us to go to sleep. Sleep-deprived animals generate such molecules in their cerebrospinal fluid, and the cerebrospinal fluid of sleep-deprived animals induces sleep when injected into other animals who are perfectly wide awake. There must, then, be a very powerful reason for sleep.
The conventional answer of physiology and folk medicine alike is that sleep has a restorative effect; it is an opportunity of the body to9 perform mental and physical housekeeping away from the needs of daily living. But the actual evidence for this view, apart from its common-sense plausibility, seems to be sparse. Furthermore, there are some worrisome aspects about the contention. For example, an animal is exceptionally vulnerable when sleeping. Granted that most animals sleep in nests, caves, holes in trees or logs or otherwise recessed or camouflaged locations. Even so, their helplessness while asleep remains high. Our nocturnal vulnerability is very evident; the Greeks recognized Morpheus and Thanatos, the gods of sleep and death, as brothers.
Unless there is some exceptionally strong biological necessity for sleep, natural selection would have evolved beasts that sleep not. While there are some animals - the two-toed sloth, the armadillo, the opossum, and the bat - that, at least in states of seasonal torpor, sleep nineteen and twenty hours a day, there are others - the common shrew and Dall's porpoise - that are said to sleep very little. There are also human beings who require only one to three hours of sleep a night. They take second and third jobs, putter around at night while their spouses sink into exhaustion, and otherwise seem to lead full, alert and constructive lives. Family histories suggest that these predispositions are hereditary. In one case, both a man and his little daughter are afflicted with this blessing or curse, much to the groggy consternation of his wife, who has since divorced him for a novel incompatibility. He retained custody of the daughter. Such examples suggest that the hypothesis of the recuperative function of sleep is at best not the whole story.
271pp., Mass Market Paperback |
global_05_local_5_shard_00002591_processed.jsonl/25055 | Loading page...
Download Karamel
Windows v0.6
Running Karamel on Windows
Unzip the karamel-X.Y.zip file you downloaded. This creates a folder called karamel-X.Y. Open the folder and double-click on karamel.exe. This will launch the Karamel UI on your default web browser at http://localhost:9090/index.html#
You now need to follow a few simple steps to start the cluster running.
Load a Cluster
Open the clusert definition (YAML file( by clicking on "Load Cluster". Select the file: examples/hadoop.yml from the installation directory.
You should see the following cluster loaded
The "stack" on the left is NameNodes stack - consisting of the NameNode (hadoop::nn), ResourceManager (hadoop::rm), and the JobHistoryServer (hadoop::jhs). The "stack" on the right is DataNodes stack - consisting of the DataNode (hadoop::dn) and the NodeManager (hadoop::nm).
You can change a stack name by clicking on it and saving the new name. No uppercase or digits are allowed in stacknames. If you have existing VMs running with the same stack names, you should change the stack names - otherwise your existing VMs will be destroyed. This is a convenience feature for people repeatedly deploying and testing stacks (existing VMs are destroyed when new ones are created).
Launch the Cluster
Click on the "launch" menu item.
Select your public/private keys.
The OpenSsh keys to be used are selected here, so that you can later ssh to the VMs created directly using the corresponding private key. By default, Karamel will look for a ".ssh" directory in your home directory for "id_rsa.pub/id_rsa" keys. If it doesn't find any, you can click on the "Generate Keys" button and a public/private OpenSsh keypair will be generated and saved in your "/.karamel/" directory. When you are finished, you click on the "EC2 Provider" link to enter your EC2 credentials.
Enter your EC2 credentials. Press Submit.
Enter your Account-ID (key) and EC2 Account secret-ID (secret key). You have to validate your credentials by clicking on the "validate" button.
install-3 After you have successfully validated your credentials, you can launch the cluster.
Really Launch the Cluster
This will (1) create the VMs in EC2, (2) install and orchestrate the software installation using Chef and Karamel.
The first thing Karamel does is destroy any existing VMs that have stacks with the same name as the stacks you are creating. This can take a couple of minutes. If you want to keep your existing installations, rename the stacks by clicking on the stack name and then saving the new stack name.
Then Karamel uses JClouds to fork the VMs. This can take a minute or two.
After the VMs have been creating, Karamel executes the DAG of tasks for the stack on each VM. The tasks can be in any of the states WAITING, ONGOING, DONE, or FAILED. When all tasks are DONE, you can ssh into the public IP addresses on the page to interact with the services you installed.
View installation logs while running.
You can view progress by left-clicking on Karamel icon in the Icon-Tray (this will be in the bottom right hand corner of your screen for Windows).
You can look in the logs to find the IP addresses of the machines that started or in the EC2 console. You can now ssh to the machines started using the private key for the public key you entered earlier. For the EC2 ubuntu instances used in this example, the username by default for the new VMs is "ubuntu".
Using Putty to SSH to nodes created using Karamel
Launch PuTTYgen from the Windows Programs list.
1. Click Conversions from the PuTTY Key Generator menu and select Import key.
2. Navigate to the OpenSSH private key generated by Karamel (by default, stored in C:\Users\username\.karamel\.ssh\id_rsa) and click Open.
3. Under Actions / Save the generated key, select Save private key.
4. Do not enter a passphrase (unless it is critical that you protect the private key).
5. Save the private key to some folder as id_rsa.ppk.
Connect to VMs created on EC2. The PuTTYgen tool can be closed and PuTTY launched again.
1. Enter the remote server Public IP address under Session.
2. Navigate to Connection > SSH > Auth.
3. Click Browse... under Authentication parameters / Private key file for authentication.
4. Locate the id_rsa.ppk private key and click Open.
5. Finally, click Open again to log into the remote server with key pair authentication. |
global_05_local_5_shard_00002591_processed.jsonl/25072 | Thursday, February 6, 2020
A room of one's own - - -
a chair.
A very special chair.
“You don't just want to sit in a chair.
You want to experience it!”
― Anthony T. Hincks
I have wonderful windows to watch out as the seasons change.
― Mehmet Murat ildan
A very special little chair.
And I knew I would recognize it when I saw it.
It was love at first sight.
Just like in the movies - - -
I spied it from across the room . . .
and knew.
😍 😍 😍 😍 😍 😍 😍
and it was marked down,
marked down,
marked down
to a give-away price.
This was my chair.
Virginia Woolf would be proud.
― Vincent Okay Nwachukwu
1 comment:
Gram said...
I love that chair. I have a recliner shaped like that and after years and years it is on it's last legs. I keep looking for a replacement. You have given me hope that one is out there. |
global_05_local_5_shard_00002591_processed.jsonl/25074 | Information for "Christian"
Jump to: navigation, search
Basic information
Display titleChristian
Default sort keyChristian
Page length (in bytes)102
Page ID1686
Page content languageEnglish (en)
Page content modelwikitext
Indexing by robotsAllowed
Number of redirects to this page0
Page protection
EditAllow all users
MoveAllow all users
Edit history
Page creatorGraham (Talk | contribs)
Date of page creation17:27, 19 September 2007
Latest editorContent Bot 2 (Talk | contribs)
Date of latest edit02:52, 3 October 2007
Total number of edits2
Total number of distinct authors2
Recent number of edits (within past 90 days)0
Recent number of distinct authors0 |
global_05_local_5_shard_00002591_processed.jsonl/25081 | Bulk SMS Service
Send Bulk SMS using API in ASP.NET
Extend messaging needs with the provided set of our SMS API. We aim to make messaging easy and therefore,we provide our Bulk SMS API functionality so that the user can Send SMS from anywhere and everywhere. Other than this, get our SMS APIs for each and every purpose i.e. text message API, Bulk SMS API, Scheduled SMS API etc.
We provide our users with a wide range of Bulk SMS APIs which in turn help our users to avoid unnecessary coding and struggling. Discover appropriate Bulk SMS API for your need and utilise messaging services to its best.
All your need are answered at a single platform. We provide our users with APIs for each and every aspect of the panel.Integrate distinct API with sample codes as per choice of programming language. You can Send SMS using API. Also, you can easily Send Bulk SMS in case of heavy traffic via our API. We are providing various SMS API to integrate it in your software and increase its functionality.
Send SMS API -
Scheduled Sending API -
english&scheduleddate=26/08/2015 17:00
Get Balance API -
Add Balance API -
We too provide source code. To know more you can contact us. |
global_05_local_5_shard_00002591_processed.jsonl/25096 | background preloader
Free Math Learning Materials
Facebook Twitter
Free Math Workbooks. Free Math Help - Online Math Help - iPracticeMath. Create Custom Pre-Algebra, Algebra 1, Algebra 2, and Geometry Worksheets. AlgebraLAB: Making Math and Science Connections. Math is Fun. Math Live. Math Worksheets K - 8. Math E-Book. Math Graphic Organizers. Free Math Worksheets. Virtual Nerd: Real math help for school and home. Mathwords.
Go Maths. Figure This! Math Challenges for Families - Challenge Index. ShowMe Math Videos. Get The Math. Understanding Algebra Online Textbook. Interactive mathematics resources. Free Videos. NRICH Math Puzzles. Teachers Primary Pupils Secondary Students Events and PD "It gave me some good ideas to use in the classroom and ... a link that I can get all of the activities from.
NRICH Math Puzzles
" Math Game Time - Free Math Games, Videos & Worksheets for Kids, Parents & Teachers. Centre for Innovation in Mathematics Teaching - Mathematics Enhancement Programme. The Math Forum @ Drexel University. The Math Forum has a rich history as an online hub for the mathematics education community. A debt of gratitude is owed to the dedicated staff who created and maintained the top math education content and community forums that made up the Math Forum since its inception. NCTM will continue to make many of the most popular parts of the Math Forum content accessible to the mathematics education community. We hope that you will join or continue to be a member of the NCTM community to access even more high-quality resources for teaching and the learning of each and every student.
Problems of the Week The Math Forum created Problems of the Week as an integrated program that features problems by standard and additional teacher support materials. Continue Your Math Education Conversations in MyNCTM! MyNCTM is an online community where NCTM members can ask questions, network and connect with each other, start and join discussions, find and upload resources, and interact with education experts. Desmos free online graphing calculator. Maths Charts by Jenny Eather. Go Geometry Step by Step from the Land of the Incas, Cuzco, Machu Picchu. High School, College, Online Geometry. Teaching Geometry with Google SketchUp. Jim Reed's Home Page (Interactive Activities)
Jim Reed's Home Page (Interactive Activities)
I am using my own invention, CET (Closed Eyes Test) to check the effectiveness of the resources. If the resource passes CET, I can still see/interact with the applet with my eyes closed. Transformations Logarithms Conics Trigonometry Circles Quadratics Relations. Free fraction videos online. Enjoy free online math videos on these fraction topics: (Fraction videos, part 2, are on this page.)
Free fraction videos online
The videos are recorded in high-density (HD) and are viewable both here as well as at my Youtube channel. These videos are usable for students, teachers, and parents. You can use them... To learn these topics yourself (if you're a student for example, or an adult needing a refresher)As lesson plans for teaching these topics. The videos match the lessons in my book Math Mammoth Fractions 1 (Blue Series book), or the lessons in chapter 5 of Grade 5-B (Light Blue series). Mixed numbers to fractions and vice versa. Starter Of The Day. Math Worksheets Center. Interactive Mathematics Miscellany and Puzzles. Since May 6, 1997You are visitor number E66B7E in base 20 Raymond Smullyan, a Mathematician, Philosopher and author of several outstanding books of logical puzzles, tells, in one of his books, a revealing story.
Interactive Mathematics Miscellany and Puzzles
A friend invited him for dinner. He told Smullyan that his teenage son was crazy about Smullyan's books and could not wait to meet him. The friend warned Smullyan not to mention that he is a Mathematician and that Logic is a part of Mathematics because the young fellow hated Mathematics. Having told this story, would it be wise to announce up front what this site is about? We provide teachers and students with mathematics relevant to our world today … Math Videos & More. MathTV. Math Poems, Math Songs, Math Stories, Home. Math Games - from
Math Video - Free Math Help. Study Your Way Easy Help.
Math Video - Free Math Help
Fun Teachers. Expert teachers who know their stuff bring personality & fun to every video. All Concepts Explained. Most textbook topics are clearly explained in concise videos. Sample Problems Solved. Watch expert teachers solve sample problems to develop your skills. YAY MATH! Algebra Geometry Math Videos Online. Create math worksheets for free. Middle School Math Lessons. Free Online Learning Games. AIMS Puzzle Corner: Free Math Puzzles. This week’s Puzzle Corner activity is a magic trick with a mathematical, as well as a slight-of-hand, component.
AIMS Puzzle Corner: Free Math Puzzles
I first came across this trick in one of Martin Gardner’s many books on recreational mathematics. I liked it so much that I have been stumping students, friends, and family members with it ever since. In order to make this trick work, you will need to practice it by yourself until the moves (illustrated at bottom) become automatic, before trying it out on someone else.
Its success, like the success of many magic tricks, depends on diverting the audience’s in this case, your students’ attention. You can’t do this if you are uncertain of all the moves and take too much time making them. You will need at least three cups to perform this trick. Begin this trick by explaining that the goal is to get all three cups facing up after making exactly three moves. Next, invite one of the students who was watching to get all the cups facing up in three moves. Performing the trick: 1. 2. Math Games - Fun 4 the Brain. Rader's NUMBERNUT.COM. Algebra: In Simplest Terms. Due to licensing agreements, online viewing of the videos for this resource is restricted to network connections in the United States and Canada. 1.
Algebra: In Simplest Terms
Introduction An introduction to the series, this program presents several mathematical themes and emphasizes why algebra is important in today's world. 2. The Language of Algebra This program provides a survey of basic mathematical terminology. Content includes properties of the real number system and the basic axioms and theorems of algebra. 3. 4. 5. 6. Arcademic Skill Builders: Online Educational Games. Cool Math Games - Free Online Math Games, Cool Puzzles, Mazes and Coloring Pages for Kids of All Ages. Hooda Math - Ten Frame. Math Interactives. NRICH Math. Math Simulations. |
global_05_local_5_shard_00002591_processed.jsonl/25122 | SciELO - Scientific Electronic Library Online
vol.75 número4Theological reflection, assurance and the doctrine of GodReading the Beatitudes (Mt 5:1-10) through the lenses of introverted intuition and introverted sensing: Perceiving text differently índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas
Servicios Personalizados
Links relacionados
• En proceso de indezaciónCitado por Google
• En proceso de indezaciónSimilares en Google
HTS Theological Studies
versión On-line ISSN 2072-8050
versión impresa ISSN 0259-9422
MASANGO, Maake J.. Neglect of people with disability by the African church. Herv. teol. stud. [online]. 2019, vol.75, n.4, pp.1-6. ISSN 2072-8050.
The African community, as well as the church, has always cared for people with disability. The main problem they faced is that they care for them by imposing their own agenda on them. In other words, they take over their lives by over-caring. Because of guilt, they want to do everything for them, as if they are not capable of functioning within that community. This way of caring leads to them over-protecting these people. The process of caring over-shadows people with disability. They simply take over their lives, which results in the fact that these people become object of those who care for them. They are called names and are described by their function or through their disability. This is how they lose their name in life. The above discussion simply explain this object relational syndrome. For example, they are called digole (handicapped). In brief, they lose who they are, when the community uses their characteristic instead of their names, and behaviour becomes a way of dealing with them. The African church finally endorses the above by removing the image and likeness of God from them. For example, when they attend worship, they are viewed as people who are not normal, and in need of prayer, for healing so that they can be normal like us. This is another way of dealing with them as objects. Another obstacle in the African church is lack of ramps. The church is expecting the so-called normal people who function in a way that they want. This is a sign that people with disability are not welcomed. Finally, they are viewed as people possessed by demons and therefore in need of healing. The church, without finding out what they need, sets the agenda. The reader will now understand why the African church has neglected them.
Palabras clave : people; disability; church; pastoral care; African church; African communities; Accessibility; Inclusion of people with disabilities; Caring for people with disabilities; The church and people with disabilities.
· texto en Inglés · Inglés ( pdf )
|
global_05_local_5_shard_00002591_processed.jsonl/25136 | Good quality Leather and Footwear Testing Instruments for sales
Good quality Leather and Footwear Testing Instruments for sales
I live in California, USA. This supplier is helpful, has good communication via email, fast shipping, and the product arrived in good.
—— Karen Rayment
I'm Online Chat Now
Toys Testing Equipment
Leather and Footwear Testing Instruments
Chairs Testing Machine
Environmental Testing Chamber
Universal Tensile Test Machine
Furniture Physical Tester
Textile Testing Equipment
Furniture Testing Machine
Flammability Testing Equipment
Textile Flammability Testing Chamber
Toys Physical & Mechnical Testing Equipment
Mattress Test Machine
Color Fastness Testing Instruments
Fabric and Garment Testing Instruments
Textile Testing Consumable
Mobile Phone Testing Equipment
Electronic Testing Equipment
Cardboard Testing Equipment
Spectacle Frame Tester
Fire Testing Equipment
Building Materials Flammability Testing Equipment
Oil Analysis Testing Equipment
Luggage Test Machine
Page 1 of 30|< 1 2 3 4 5 6 7 8 9 10 >|
Keywords :
Contact Details
Skyline Instruments Co.,LTD
Contact Person: Miss. Kasey
Tel: 86-769-23830463
Fax: 86-769-38818154
Send your inquiry directly to us (0 / 3000) |
global_05_local_5_shard_00002591_processed.jsonl/25145 | Friday, November 9, 2012
What does "cognitive" mean to you?
drbrocktagon said...
For me, cognition is everything between brain and behaviour.
Anonymous said...
What is a reflex? Is it a cognitive process or just one subjected to“hard laws of ecophysics”. Is the jaw jerk reflex cognitive? Is the behaviour of, say, the earthworm cognitive? And what about the “nano-intentional” behaviour of cells? Is it possible to draw a clear-cut context-free definition of cognition at all?
Strange Loops said...
Replace "perception" with "sensation" and it makes some more sense to me (as a cognitive psychologist), at least if we simplify sensation to the mere activation/transduction of peripheral receptors. But I can see how separating the action component is also problematic, even if we want to define "action" as the peripheral motor output. Clearly the efferent signals aren't just one-way output, but involved in an impressively fast process involving lots of feedback (in addition to the modulation from expectations, efference copies, interaction with other senses, experience, etc.).
I think it makes more sense to have a fairly inclusive, broad label "cognition"/"cognitive", and then break it down into various [non-independent] components when useful. So we can talk about memory as one cognitive process, perception as another, motor control as another -- in fact, this is how most cognition texts work, right? And we can still recognize that they are interconnected, and that a more complete picture is a more complicated one, where all aspects of cognition dynamically affect each other in smaller or larger ways.
Pakl said...
I define cognition, or cognitive actions, as the activation of reliable neural patterns that do not immediately generate motor output.
(Examples: mental rotation, incrementing a number in working memory, covert visual attention shifting, and individuation of entities in a plural.)
Furthermore, cognition (cognitive actions) can also be delayed in time from a triggering perceptual input, or abstracted from it.
Unknown said...
Who are you reading? There is a philosophy of cog. camp and a basic neurophysiology camp. This is precisely the area of my work - electrophysiology studies, humans. High level perception is equiv to high level cognitive processes - consider imagery for example. Perception is Is also used as external inputs- better phrased as sensation because they are low level inputs while high level perceptual-cognitive processes involve direct precepts processed at higher levels and are also nonexperiential, not accessible to consciousness. High level perceptual representations are the stuff of images, which can lead to action, or back to perceptual processes that are considered to be high level cognitive, like visual imagey.
Embodied cognition from the philosophical side has way to many variants on the same theme.
Greg Hickok said...
I've been reading Barsalou and related theorists. So it seems we have a mix of definitions of "cognitive" with some restricting it to higher-level processes and others happy to have cognition involving lower level stuff.
A couple questions that come to my mind in light of some of the comments above.
Is there a meaningful distinction between perception and sensation? (I don't think so)
For those of you who believe cognition is restricted to higher level processes, how do you decide the boundary point between cognition and non-cognitive mental operations? I would challenge you to come up with a definition that is non-arbitrary.
My ultimate point of this discussion: if we get the definition of cognition right, "embodied cognition" is a meaningless concept.
Martim said...
That is exactly my problem with the mirror neurotic community. They say: "Actions can be understood by mirroring, without any cognitive processes". This is obviously ridiculous.
But this view is apparently shared by some commentators. It seems like there is a direct route from the very earliest visual level to the lowest motor output level. And actions are understood by activating this motor output level. Hmm, this doesn't make sense. Even if this logic is true I would expect some backflow from the lowest motor level to levels were actions are planned, let's say a goal level (which then enables action understanding). I cannot see why this is not cognition?
I agree that the concept of embodied cognition has a problem here, because you need a sharp boundary. Otherwise you have to state that brain IS your body, and therefore everything in the brain is embodied. I can live with that.
Henrik said...
Pakl said...
I'd strongly disagree. Let me phrase it the other way round: Is neural activity necessary for something to be cognitive? (What about machines? Is a Turing machine a cognitive device? Does a speaking and acting robot exhibit something like cognition?) This brings me to Greg's point:
I am sure that a robot will not FEEL/SENSE something we call heat or coldness. However, the robot is able to PERCEIVE the temperature in that it may change its behaviour and avoid a dangerous heat source.
What I would like to put forward is the idea of mental representation and information processing. The term 'cognition' might therefore be defined as something like as an operation on mentally represented information processes.
Anonymous Martim said...
Of course, you're brain IS not your (whole) body. But it's an integral part of it. What people in the embodiment section are claiming is that cognition wouldn't work the way it works without the rest of your body since your mind (!) is embodied.
Greg Hickok said...
I think Henrik hit on the main issue and the ultimate point of my original question. Cognition is a bad term. It means different things to different people. Some view it as only high level mental function, some view it as everything the brain does.
What we need to be talking about instead is representations and computations. From this perspective the notion of the "cognitive sandwich" (perception --> cognition --> action) that so many embodied theorists are throwing around becomes vacuous as best and misleading at worst because there is nothing to sandwich; it's all just representation and computation. Get rid of the misleading terminology and we are left with "embodied computation" which basically means that sensory and motor systems perform complex computations. We knew that already.
Henrik said...
Greg, could you give us an example of how some theorists are throwing around the 'cognitive sandwich'? I'm not sure if I got your point. Solely because it seems to be all about computation and representation, this does not imply that perception, cognition and action are the same.
I just had a look into the literature and came across an interesting and even more confusing answer to what cognition is:
"Enaction: A history of structural coupling that brings forth a world." (Varela, Thompson, Rosch 1991: p. 206)
Whew! Concerning computation, there is even the view that "cognition is best studied by means of noncomputation and nonrepresentational ideas [...]" (Clark, 1997: 148).
Greg, If you say that
What do these have in common? Maybe that might give us an answer to what cognition might be.
Greg Hickok said...
"The first and foremost challenge is that cognition cannot be studied as a module independent from other modules (sensory and motor), as suggested by the “cognitive sandwich” metaphor. Instead, cognition is deeply interrelated with sensorimotor action and affect."
-Pezzulo, G., et al. (2011). The mechanics of embodiment: a dialog on embodiment and computational modeling. Front Psychol, 2, 5.
"The classical sandwich conception of the mind – widespread across philosophy and empirical sciences of the mind – regards perception as input from world to mind, action as output from mind to world, and cognition as sandwiched between."
-Hurley, S. (2008). The shared circuits model (SCM): how control, mirroring, and simulation can enable imitation, deliberation, and mindreading. Behav Brain Sci, 31, 1-22; discussion 22-58.
"I am skeptical of the Classical Sandwich myself, because I believe that thinking incorporates representations used for perception and motor control"
-Prinz (forthcoming) Is Consciousness Embodied? In P. Robbins and. M. Aydede (Eds.) Cambridge Handbook of Situated Cognition.
"traditional psycholinguistics also assumes the cognitive sandwich, with the thinking “meat” keeping apart the production and comprehension “bread.” But if action and perception are interwoven, then production and comprehension are interwoven as well, and so accounts of language processing should also reject the cognitive sandwich."
-Pickering and Garrod (forthcoming). An Integrated Theory of Language Production and Comprehension. Behavioral and Brain Sciences (target article).
What do perception, action, and "cognition" have in common? Computation.
Anonymous said...
If I am not mistaken, the (pejorative) metaphor of the classical cognitive sandwich model comes from the radical embodied cognitivists who reject both representations and computation. For them, cognition is a kind of Watts governor, perception and action in one, with nothing much noteworthy in between. A poor sandwich!
Anonymous said...
"robot' might be a useful way of approaching how we conceptualize 'cognition'. The reason being that a robot can only perceive or sense temperature if it has some sort of thermal sensor, in that case the distinction of hardware versus software becomes clear(of course for some embedded controllers the sw/hw distinctiion can become blurred). Similarly the robot only effects behavior through some sort of actuator or connection to a mechanical system, Thus cognition has to do with software, i.e., the program doing the processing, everything else is either a sensor or an actuator. For our human wetware the distinction is much more fuzzy. We have not too much problem with the boundary of sensor/actuator at hair cells/muscle. We might imagine reflexes as non-cognitive, i.e. a very short number of synapses between hot and move your hand. Anything that takes more synapses is then cognitive. -RC
Greg Hickok said...
Why can't a reflex be "cognitive"? Is a reflex a form of computation? Is the input from one pool of neurons causing another pool of neurons to fire in a reflex circuit? Is that fundamentally different from a pool of neurons in PPC causing another pool of neurons to fire in PM?
Anonymous said...
To go on with the stupid examples in the second comment below the post (which I neglected to sign): If a plant turns to the sun, is it cognition? A crude definition of cognition could be processes that can’t be reduced to physic or biology. Then perhaps Pavlov’s dog salivation could be cognitive while the jaw jerk reflex not. Vilem
Greg Hickok said...
Cognition is just a bad term. It confuses things in my view.
Fred said...
I don't know that "computation" leaves us in much better shape, really...see, e.g. point 5 at
(this is Brian Cantwell-Smith's [] new/ongoing take on what computation is)
Ryan Ogilvie said...
Traditionally, the term 'cognition' was used by philosophers to refer to thought and knowledge. Although figures like Descartes, Hume and Kant can be considered proto-cognitive scientists, they don't really use the term to refer to the physical underpinnings of thought. (This is particularly true in the case of Descartes, as he was a card-carrying dualist. But thinking about how the mind can be instantiated in something physical continues to be a difficult problem.) This came later, with the rise of computationalism.
The embodied cognition folks are worried about what was once a dominant way of conceptualizing thought in the mid 20th century, namely, as a central processor that received inputs from sensory apparatus and delivered outputs to motor systems. Sensory input was taken to be a complicated transduction story, while action output was just a complicated effector story--hence, the "sandwich" metaphor.
If one thinks that there is perceptual processing is essential in someway to thought (e.g., beliefs, judgments, desires, etc.), then you will want to reject the sandwich model of cognition. In other words, I don't think we're dealing with a strawman, here, for this is a substantive question.
However, you might reject the notion that perceptual processing (or motor output) is essential to thought, yet nonetheless think of sensory processing as cognition. In such as case, one just needs to be clear about how she or he is using the term.
So, yes, the use of cognition in contemporary and historical debates does introduce significant confusion. I guess we just have to carefully work our way through the mess.
Greg Hickok said...
My problem is that the embodied folks refer to the "classical sandwich model of the *mind*" when really the sandwich model only applies to certain domains, mostly notably the representation of conceptual knowledge. It is a straw man to present embodiment as an alternative model of the mind unless you want to restrict "mind" or "cognition" only to include conceptual representation or problem solving, etc.
Are state feedback control models in the motor control literature supposed to be outside of the "mind"? Are visual computations that "infer" structure from motion not part of the "mind"?
Here's a wild thought: the embodied cognition movement is nothing more than the realization by theorists in "high level cognition" that sensory and motor systems are complex information processing systems in their own right capable of categorizing, drawing inferences, making predictions and so on (which sensory and motor scientist have known for quite a while). |
global_05_local_5_shard_00002591_processed.jsonl/25210 | A writer inspired by nature and human nature
Maine Poetry
Aster alpinus
Aster alpinus (Photo credit: Wikipedia)
Final Performance
by Bette A. Stevens © 8/29/2012
While asters, purple tutus donned
With velvet yellow crowns
Ballet to cricket violins,
Sway tiptoe in their gowns;
A golden orb in treetops rests
The stage a soft pale blue
And I among their audience
Too soon must say, “Adieu!”
Related articles
Comments on: "Maine Poetry" (2)
1. Beautitul as usual! Keep em comin…..I love them.
Thanks so much for joining the conversation!
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s
Tag Cloud
%d bloggers like this: |
global_05_local_5_shard_00002591_processed.jsonl/25224 | Qualnet Simulator Projects.
Qualnet simulator are used in producing simulator on wired network, cellular network, mobile adhoc network and satellite network.Qualnet is an imitation of real communication network. There are many promising areas for researchers using Qualnet. Creating animated network models, providing comprehensive protocols and estimation of basic behavior of network can be done utilizing Qualnet simulator Projects. Wireless mixed or wired network can be simulated in Qualnet projects.QualNet is a state-of-the-art simulator for large, heterogeneous networks and the distributed applications that execute on those networks.Protocols used in Qualnet projects is RIPv2, OSPFv2, BELLMANFORD, OLSR, AODV, LAR1, DSR, STATIC ROUTING, CSMA, TDMA, MACA, MAC802.11, MAC802.3/SWITCHED-ETHERNET, SATCOM etc.
Model channels in Qualnet Projects.
Shadowing Model: Free spaced model with standard deviation is combined in this model. Standard deviation is found through PROPAGATION-FADING-MODEL.
Statistical Propagation Model: PROPAGATION-CHANNEL-FREQUENCY parameter is used to identify simulated channel. Hertz is the unit of frequency. Instance Id will be given differently for each user.
Fading Model: Rican and Rayleigh distributions are used to implement fading model. Distribution is calculated by PROPAGATION-FADING-MODEL parameter.
Path loss model: Based on monitoring node coordination and tunable parameter signal,attenuation can be computed through this model.
Every channel in QUALNET is orthogonal. Frequency range for each channel is given by users.
Library Model in Qualnet Projects:
Cellular Library: GSM network are modeled using this.
Wired Network Library: BGP, IGRP, HSRP, LAN, OSPF, EIGRP and router configuration is modeled using this library.
Wireless Library: QUALNET developer, 802.11a, 802.11b, Exata, AODV, LASR1, ODMRP, STAR, OLSR, ZRP, MACA, CSMA, FSR and DSR directional antenna is included in this library.
Military Radio Library: Link-11, link-16, JTRS are modeled based on this library.
Multimedia and Enterprise Library: It contains SCFQ, WRED, WFQ, R10, WRR, RSVP-TE, QOSPF, CBQ, RED and diffuser. It models queuing scheduling, VIOP and QOS.
Developer Library: Networks like LAN, IPV6, WAN and satellite networks are modeled by this library.
Propagation Library: ALE/ASAPS, TIREM, URBAN. Terrain propagation effects, urban path loss effects, high frequency radio and MAC address and their effects are modeled by this library.
Characteristic of QUALNET:
Qualnet Projects provides many benefits with its unique characteristics,such as
Model Fidelity: It makes use of high level protocol model for wireless and real world network.
Speed: It aids network developer and model designer by adopting real world network speed.
Extensibility: It is used to connect software and hardware application. It also supports real networks.
Scalability: Tons of nodes that are parallel to hardware techniques are found. It is capable in running on multicore, cluster and multi processor system.
Portability: It has an array of models. It supports any type of platforms.
Network analysis supported by Qualnet Projects.
Qualnet tool supports the following networks and analysis:
Cellular Network. 85
Satellite Network. 90
Wireless Network. 93
Qos Network. 97
Manet Network. 100
Component involved in Qualnet Projects.
• QualNet Scenario Designer.
• QualNet Animator.
• QualNet 3D Visualizer.
• QualNet Analyzer.
• QualNet Packet Tracer.
Advantages of Qualnet Projects.
• Support multiprocessor system and distributed computing.
• Easy to use and clear UI.
• Extensive possibilities for analyzing scenario.
• Wide range of applications.
• Shipped with a lot helpful documentation and tons of example scenarios.
• Sophisticated animation capabilities.
Total completed Qualnet Projects
2014-15.Qualnet Projects
2015-16.Ongoing Qualnet Projects
Thanks for guiding me to complete my qualnet simulator projects.Would surely recommend to my friends.
Susmita - India, Qualnet Projects
Great support for my Qualnet Projects.Guided my Project very well. Pleasure to Work with your team.
Chrisitian - UK |
global_05_local_5_shard_00002591_processed.jsonl/25234 | You’re Not Doing Life Wrong
Print Friendly, PDF & Email
1 You're notBy Leo Babauta
This leads us to try to optimize, to try to improve, but also to feel bad, to seek comfort and distraction, to procrastinate while we seek the answers. This is normal and there’s nothing wrong with it.
But I’d like to assure you that you’re doing nothing wrong. That you don’t need to optimize or do things better.
Try this:
For just a moment, pause where you are, and soak in the current state of the room around you, and your own state. Just notice what this is like.
Now see how you are enough. Just as you are. Without any need for improvement. You are also a wonder, exactly enough.
You can go about your day, pausing every now and then to do a check: is this moment enough? Are you enough? And try answering, “Yes, absolutely and wonderfully.”
Originally published on ZenHabits by Leo Babauta, who allows others to freely use his work. Thank you, Leo
Editors note: Start from enough. Better may or may not follow. Live with that for awhile. Let that be enough too.
Poster created on |
global_05_local_5_shard_00002591_processed.jsonl/25243 | Playing With Numbers on a Hundreds Chart
A hundreds chart is an excellent math tool for children. It provides a tangible framework for a child to begin to understand the structure of our number system. Working with a hundreds chart introduces a child to basic concepts such as counting to 10 and more complex ideas like relationships between numbers in a base 10 system.
An online interactive hundreds chart can make ‘math play’ fun. You can add color to a chart, erase numbers to better see patterns, adjust the numbers shown and more. Here’s a great online interactive hundreds chart that will do just that. You can add color, use the built-in calculator, block out numbers and more on this HUNDREDS GRID
One of the best ways to learn with a hundreds chart is to just fiddle around with it. A child can learn so much from simply taking time to interact with the numbers in columns, rows and even diagonally. Look for patterns while adding or subtracting, practice skip-counting, look for groupings of numbers, etc.
A visual math learner will enjoy seeing the numbers and patterns made by using the colors and adjustment features on the math chart. A reluctant math learner may find enjoyment in the play aspect of the interactive chart. Give it a try!
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_05_local_5_shard_00002591_processed.jsonl/25270 |
Christmas and Aliens иконка
Christmas and Aliens
1.0 for Android
Buzzy Bee Games
Описание для Christmas and Aliens
Christmas and Aliens is a game suitable for both younger and older children. Find the matching pairs, and discover the links, in this fast paced puzzle, that gets harder each round.
This Christmas and aliens game is a timed three round matching game, featuring Christmas symbols and aliens. The first round in the alien games for free is 100 seconds and each after that is 10 seconds less, so will have the time to improve each round.
Another thrilling feature to the christmas games free that makes it even more awesome then just a matching game- you must find the icons that link together in some way! When you make a linked match the christmas games for kids it will show the link. You also get some help along the way. You can use the REFRESH button 3 times, this mixes up the game cards so it is easier to find linking matches. You can also use the FIND button 3 times, and this will find the matching links for you.
Christmas and Aliens Tags
Add Tags
Additional Information
Предыдущие версии
• V1.0 2.8 MB APK
Christmas and Aliens
Christmas and Aliens 1.0 (1)
Обновлено: 2016-07-27
Uploaded by: Felippe Sousa
Требуется Android: Android 2.1+ (Eclair MR1, API 7)
Подпись: 281b53b739d58de94a50107c7d287979f360c078 Christmas and Aliens 1.0(1) проверено
Screen DPI: 160-320dpi
Architecture: universal
Файл SHA1-хэша: 06bb72e22e5d0b39b0e0b00345ea2d37288986f7
Размер файла: 2.8 MB
Загрузка комментария
Оставьте первый комментарий.
приложение APKPure |
global_05_local_5_shard_00002591_processed.jsonl/25278 | Project Vole update…
Am testing out Project Vole running Alpine Linux. Vole is running i3 window manager and st terminal. It is still very very Beta!!! but log in as vlive (user) password live and simply startx. Hit super plus enter and a terminal will open. Network connection should run via ethernet without any issue. To get wifi working I use setup-alpine script (as root) use it too set up keyboard, timezone etc… then it may find wlan and scan for connections.
Source files here
Iso download….
Will check with Alpine that it is ok to share iso… I do not want to get into trouble again! |
global_05_local_5_shard_00002591_processed.jsonl/25279 | [cabfpub] [Ext] .well-known and re-directs
Phillip Hallam-Baker philliph at comodo.com
Fri Jul 21 09:04:52 MST 2017
I think that I broadly agree with Ryan on this but with possibly different argument.
For me, the key issue is whether the validation mechanism provides evidence that the request comes from the intended party. The burden of proof for any validation mechanism is on the proposer. For HTTP validation to a specific URI in .well-known space, the evidence is reasonably good. .well-known is generally a protected area in most web server deployments.
There is however one possible exception. While I have seen controls on putting material in the .well-known, I have also seen web server configurations that allow the ‘not found’ capability to be hooked fairly easily.
Being on a plane and not able to get to my windows box, I can’t test it right now, but Windows 7-10 has an embedded Web server that allows applications to hook parts of the URI space. This is used by applications such as Skype.
It seems to me that this might well create a hole and that the burden of proof is on anyone suggesting redirects should be allowed to prove they are safe.
> On Jul 21, 2017, at 11:04 AM, Ryan Sleevi via Public <public at cabforum.org> wrote:
> Hi Jeremy,
> Apologies for the delay in responding. Would this be a correct summary
> of the confusion:
> In HTTP, it is a Request/Response protocol. A request is made for a
> given resource, and a response is provided. Some responses include the
> resource directly requested (e.g. the 200/2xx series), other responses
> may indicate the resource has moved (e.g. 304) or is not available
> (e.g. 404 or 500). These are valid responses, but they indicate
> they're not the resource requested.
> The question is whether or not a CA is expected to perform a single
> Request/Response in the of retrieving a resource (namely, "the content
> of a file or on a web page"), or whether it is allowed to adhere to
> the HTTP semantics that indicate how multiple Requests can be made to
> ultimately satisfy a resource fetch.
> Personally, I'm strongly of the opinion that the Required Website
> Content should be obtained via a single Request/Response workflow.
> This aligns with at least some of the audit reports I've seen, where
> various auditors (whether security or BR) have interpreted this
> section as being restrictive to a single Request/Response flow, and
> appropriately flagged when a CA follows redirects. This suggests that
> there's at least some agreement on this view.
> That said, I can also understand and appreciate a view that, by
> specifying "content of a file or on a web page", we may have
> inadvertently allowed for an interpretation that allows for multiple
> Requests/Responses.
> When considering the reasonableness of either approach, it does seem
> important to consider this: Would we consider it reasonable for a CA
> to issue Range Requests for the file or a web page? This is where
> multiple requests can be made that, in their sum totality, encompass
> the fullness of the file or the web page. Would we allow for partial
> range requests (e.g. the CA only requesting say, the first 32 bytes).
> Would we expect CAs to detect situations of truncation (e.g. the
> content received does not align with the Content-Length) and either
> recover from it, reject it, or accept it as valid?
> I'm certainly curious others' take, but from an overall security
> perspective (and aligning with the security audits of CAs that I've
> seen), there seems to be a general belief that a single
> Request/Response pair is all that is permitted.
> Jacob has taken the view on the rewrite of the scheme, but without
> modifying the domain. If a server redirected to ftp://, would we still
> consider that Required Website Content? If it redirected to ldap://,
> would we still consider that Required Website content?
> That said, I haven't heard any arguments that "on the Authorization
> Domain" encompasses anything other than the domain itself. At best, a
> modification of scheme (and thus, transitively, a modification of the
> port used - which needs to be congruent with Authorized Ports) may be
> worth discussing, but I would not want to see any scoping beyond that.
> In these situations, it seems most advisable to take the restrictive
> approach - to disable redirects. The website authentication mechanism
> is already substantially less secure than some of our other methods,
> and the less we can do to increase that attack surface, the better.
> On Fri, Jul 21, 2017 at 10:49 AM, Jeremy Rowley via Public
> <public at cabforum.org> wrote:
>> Is the lack of additional response agreement that “on the Authorization
>> Domain” encompasses both the authorization domain names and redirects from
>> an authorization domain name?
>> From: Public [mailto:public-bounces at cabforum.org] On Behalf Of Jeremy Rowley
>> via Public
>> Sent: Thursday, July 20, 2017 8:37 AM
>> To: Jacob Hoffman-Andrews <jsha at letsencrypt.org>; Paul Hoffman
>> <paul.hoffman at icann.org>; CA/Browser Forum Public Discussion List
>> <public at cabforum.org>
>> Subject: Re: [cabfpub] [Ext] .well-known and re-directs
>> The BR language states the well-known directory must be “on the
>> Authorization Domain Name”. Whether a re-direct is “on the Authorization
>> Domain Name” is questionable. If following redirects is permitted, the
>> language should be updated accordingly.
>> Jeremy
>> From: Jacob Hoffman-Andrews [mailto:jsha at letsencrypt.org]
>> Sent: Wednesday, July 19, 2017 2:54 PM
>> To: Paul Hoffman <paul.hoffman at icann.org>; CA/Browser Forum Public
>> Discussion List <public at cabforum.org>
>> Cc: Jeremy Rowley <jeremy.rowley at digicert.com>
>> I disagree with Paul's interpretation. At Let's Encrypt we have always
>> followed HTTP redirects, and consider it an important part of validating by
>> HTTP. Consider, for instance, a web site that redirects all "http:" URLs to
>> "https:" URLs. If that site were required to inhibit redirects for
>> validation requests, that would be harmful to the site's security.
>> My interpretation is that RFC 5785 (Well-Known URIs) doesn't need to
>> specifically mention redirects, any more than it needs to mention Host
>> headers, status codes, or any of the other implementation details of HTTP.
>> According to RFC 7231 (HTTP Semantics and Content):
>>> The 3xx (Redirection) class of status code indicates that further
>>> action needs to be taken by the user agent in order to fulfill the
>>> request. If a Location header field (Section 7.1.2) is provided, the
>>> user agent MAY automatically redirect its request to the URI
>>> referenced by the Location field value, even if the specific status
>>> code is not understood.
>> If it was the intent of RFC 5785 or the Baseline Requirements to rule out
>> certain HTTP semantics, that would need to be made explicit. And I think an
>> amendment ruling out redirects would be a mistake. For reference, here's the
>> relevant BR text:
>> Agreed-Upon Change to Website
>> Confirming the Applicant’s control over the requested FQDN by confirming one
>> of the following under the “/.well-known/pki-validation” directory, or
>> another path registered with IANA for the purpose of Domain Validation, on
>> the Authorization Domain Name that is accessible by the CA via HTTP/HTTPS
>> over an Authorized Port:
>> The presence of Required Website Content contained in the content of a file
>> or on a web page in the form of a meta tag. The entire Required Website
>> Content MUST NOT appear in the request used to retrieve the file or web
>> page, or
>> The presence of the Request Token or Request Value contained in the content
>> of a file or on a webpage in the form of a meta tag where the Request Token
>> or Random Value MUST NOT appear in the request.
>> If a Random Value is used, the CA or Delegated Third Party SHALL provide a
>> Random Value unique to the certificate request and SHALL not use the Random
>> Value after the longer of (i) 30 days or (ii) if the Applicant submitted the
>> certificate request, the timeframe permitted for reuse of validated
>> information relevant to the certificate (such as in Section 3.3.1 of these
>> Guidelines or Section 11.14.3 of the EV Guidelines).
>> _______________________________________________
>> Public mailing list
>> Public at cabforum.org
> _______________________________________________
> Public mailing list
> Public at cabforum.org
> https://cabforum.org/mailman/listinfo/public
More information about the Public mailing list |
global_05_local_5_shard_00002591_processed.jsonl/25283 | This project video is a second pencil cup to answer this month’s club challenge. After I turned the first one, I felt a pencil cup would be perfect for a Celtic knot.
The process I follow does not restrict my knots to four loops. The process enables as many loops as could be desired. Eight loops is as easy as four except for the additional cutting and gluing.
After turning my wood down to a uniform cylinder, I measured the diameter. At my computer I drew a circle of the same diameter. Since I had decided on three loops, I drew a triangle to enclose the circle. I printed the diagram, glued it to scrap hardboard. After cutting out the triangles, I screwed them to the ends of my cylinder and applied a little hot melt glue to stop spinning.
After outlining my cylinder with triangles on my table saw sled, I hot melt glued blocks so that I could place it again with each turn.
After that the process gets repetitive. For each kerf, I hot melt glued a reinforcing board to the top of the cylinder in case the cut goes completely through the cylinder or enough to allow the cylinder to flex. Then make the cut, and glue in the accent strip. I used 5 minute epoxy for gap filling and setting time properties. With the glue hard, I cut away the excess accent wood and the reinforcing board.
With the knot complete, the rest is normal turning adding a top and a base.
Blog: https://www.AsWoodTurns.com
FB: https://www.Facebook.com/AsWoodTurns
Likes: 1 |
global_05_local_5_shard_00002591_processed.jsonl/25297 | Tag Archives: wellness
The Labyrinth Defined
As 2014 begins I want to let go of my personal objection to defining the labyrinth. Throughout the previous blog posts you may have noticed my preference to describe and to explore the labyrinth but not to offer a definition of what exactly it is. Definitions are often confining and exist outside the imaginative, the metaphorical and the creative. I would rather my readers have an infinitely creative concept of the labyrinth. I’d rather encourage them to discover the labyrinth for themselves as they have their own experiences with it. I favor highlighting the mystery of the labyrinth, as art, as cultural history, as spiritual inspiration.
Enough readers, however, have asked for a definition. They have good reasons for needing one. Wanting to share their interest in walking the labyrinth in conversation they require ways to put their experiences into words. Often they have to start by stating an answer to the question, “what is a labyrinth?”
The most encompassing definition I can offer is, “the labyrinth is a walking meditation tool for personal and professional transformation and community building. It is used in sacred settings for spiritual growth, worship and prayer.” Labyrinth activities include presentations, unguided and facilitated contemplative walks, workshops and breakout meetings during retreats and conferences. Labyrinths are used in supportive healing ceremonies for people challenged by physical and mental illnesses. Labyrinths help to focus and encourage people seeking health and wellness discipline. Labyrinth programs are sometimes tailored to people seeking to unleash their creative potential. Labyrinths can also serve as a core feature of a community, becoming a meeting place and a place of respite in a busy environment.
There are as many reasons for and uses of the labyrinth as people can envision. We are ready to relate to walking the labyrinth in many different ways. In that respect it is a providential resource for all of us to use and cherish.
Margaret Rappaport
Veriditas Certified Labyrinth Facilitator |
global_05_local_5_shard_00002591_processed.jsonl/25349 | How We Study the Bible
‘We cannot hear from God if we do not know what His voice sounds like. Reading the Word of God (the Bible) helps us learn how He thinks, how He talks, and how He walks.’ Isis Smalls, Beauty in the Making In my last post, I outlined our plans and intended curriculum choices for […] |
global_05_local_5_shard_00002591_processed.jsonl/25354 |
Alberta’s Climate Plan: A Burden with No Benefit
Note: This article was written prior to the April 16, 2019 election. We republish now post-election it as some people are not aware of the ‘cost of carbon’ or implications of the plan.
Contributed Kenneth B. Gregory, P. Eng. © 2019
Human-caused climate change is a major issue of our time. Unfortunately, governments and most news media rely on a political organization of the United Nations called the Intergovernmental Panel on Climate Change (IPCC) for assessments about climate science and policy. The IPCC relies on climate models that assume all the warming recorded by instruments was caused by human activity despite the overwhelming evidence of large and rapid warming and cooling events before humans could have had any effect on global temperatures. The climate models average trend of the global bulk atmospheric temperature from 1979 to 2016 is 250% of the trends of the weather balloon and satellite data, so the models are wrong. The IPCC falsely attributes natural warming and urban warming to greenhouse gas (GHG) emission warming.
When the natural and urban warming are accounted for, an energy balance calculation of climate sensitivity implies that continued CO2 emissions will cause only about 0.6 °C of warming from 2018 to 2100.
FUND is an economic model that simulates the welfare impacts of GHG emissions in various regions of the Earth. It shows that Canada’s personal wealth is projected to increase from 2018 to 2100 by a factor of 2.5 despite climate change. Dr. Richard Tol, an author of the FUND model, wrote in his book “Climate Economics” published in 2014 “The impact [in Canada of climate change] is positive throughout the 21st century”. He shows the impact continually increases to 1.78% of GDP by 2100, equivalent to over C$100 billion benefit per year.
The Alberta NDP Government (in power from 2015-2019) relied on a report produced by the US Government to develop their climate plan. That report utilized three economic models to estimate the social cost/benefit of CO2 emissions (SCC). Two of those models have insignificant benefits of CO2 fertilization of plants and they fail to account for adaptation. They also assume that all warming is harmful, which clearly is untrue. The FUND model does includes CO2 fertilization and attempt to account for adaptation. They ran all three models using climate sensitivities to GHG from climate models that are far above recent empirical estimates. These factors vastly increase the SCC estimates.
The Alberta NDP Government projects that their climate plan, which includes shutting down coal-fired power plant and imposing carbon taxes, would reduce atmospheric CO2 concentrations by 2030 by 0.026 parts per million, thereby reducing global temperatures by 0.00007 °C, which is insignificant.
EDC Associates Ltd. published a study of the potential impact on Alberta’s electricity market of Alberta’s climate plan. The study finds that the cumulative cost of electricity from 2017 to 2030 is expected to increase by $3.3 to $5.9 billion depending on policy choices. The CO2 reduction would cost $420/tCO2, which is 14 times the current carbon price.
The Alberta NDP government (in power to April 16, 2019) plans to replace inexpensive, reliable and dispatchable electricity from fossil fuels with extremely expensive and unreliable electricity from wind and solar electricity, which requires near 100% backup with natural gas-fired power plants. The extreme variability of renewable power requires the backup power plants to rapidly ramp their power output up and down to offset the variable output of wind and solar power. This enormously increases the cost of the backup power and causes increased CO2 emissions per unit of electricity produced. In Europe, electricity prices are highly correlated with the amount of solar and wind on the grid, with prices in Denmark and Germany about 3 times higher than in Hungary, which has little wind and solar power. The relation implies that the cost of wind and solar power in Europe is 7.2 times the cost of power from fossil fuels.
On a global basis, the FUND model (Julia version) calculates that the net annual benefit of GHG emissions and warming from 1900 is around US$3 trillion/yr at 2100, or 0.85% of global GDP with 1.3 °C of warming from 2018. That is, global warming to 2100 is likely net beneficial.
So why are we putting a huge burden on ourselves to prevent a benefit to the extremely wealthy people of the future? If the economic forecasts are correct and future Canadians in 2100 will be 2.5 times wealthier than us today, they can afford to pay for adaptation measures if and when temperatures increase to levels that start to cause damages.
1. petroalbion
I’m surprised that you do not note that warming stopped at the beginning of this century. As presented it seems you accept that warming is ongoing when it is not?
2. Ken Gregory
According to the UAH satellite data version 6.0, the best fit straight line from January 2001 to October 2015, the lower troposphere temperature trend was negative, so yes, no atmospheric warming. However, the oceans continues to gain heat during this period, so the climate system continued to warm. An El Nino then occurred, so the current trend from January 2001 to May 2019 is positive 0.121 C/decade. The climate model trend of the lower troposphere over the same period was 0.245 C/decade. Since January 2001, the model trend is over twice the trend of the measurements.
|
global_05_local_5_shard_00002591_processed.jsonl/25355 | Skip to content
Telephone {Cincinnati Professional Children’s Photography}
Remember the Telephone Game from grade school? By the time the “secret” was passed down to the tenth person’s ear, “Sally packed a sandwich for lunch” had been fumbled into “Sally hates smelly socks a bunch” Well, it turns out it doesn’t take a long line of rowdy backpack toting grade schoolers to make nonsense out of a simple secret. You can almost do it with two people, but the best formula? Stick a two and a half year old right smack in the middle, and before you know it, “Monkeys and bears bounce in my bed”. Insert giggles here.
sisters reading
kids feet
Visit my website…
1 reply »
%d bloggers like this: |
global_05_local_5_shard_00002591_processed.jsonl/25379 | Publisher Zechess
Developer Hummer Team
Console VT03
Date 2006
Engine various
Sound engine Hummer Sound Engine
The Samuri 60-in-1 (or simply Samuri) console is a plug & play controller developed by Hummer Team and published by Zechess. It includes 60 minigames.
The system has a multicart with 60 minigames on it, some of which are individual acts extrapolated from The Hummer. After completing each minigame, the player gets a star, which is stored in the Star Bank. The game is "completed" once the player gets all 60 stars.
Some of the games on the Samuri were later reused on the ZDog plug and play, albeit with digitized sounds.
List of games
1. Kangaroo Fighter
2. Tomatina
3. Speed Hummer
4. Big Crab
5. Hummer Star
6. Jelly Motor Boat
7. Sky Zoo
8. Cute Heads
9. Drumfire
10. Big Hammer
11. San Fermin
12. Greedy Frog
13. Duck Runaway
14. Fruit War
15. Matching
16. Puppy Saver
17. Seals
18. Hummer Hero
19. Country Road
20. Hummer Tunnel
21. Volley Ball
22. Lion vs Zebra
23. Harpoon
24. Catch Kitty
25. Hummer Snow
26. Lobster
27. Hummer Final
28. Moose and Water
29. Egypt
30. Hummer Marble
31. Butter Fly
32. Hummer Hill
33. Screamer
34. Gorilla Hunt
35. Bear Fighter
36. Hummer Yard
37. Ostrich Fighter
38. Living Room
39. Hummer Bomb
40. Beach Ball
41. Bear Hunt
42. Hummer Swim
43. Samurai
44. Angel Choir
45. Cross Street
46. Hummer Night
47. Kangaroo Hunt
48. Air Combat
49. Ice Skating
50. Deer Hunt
51. Juggling Stunts
52. Ostrich Hunt
53. Hummer Hole
54. Gorilla Fighter
55. China Wall
56. Hummer Fall
57. Diplopod War
58. Ice Bricks
59. Crazy Cats
60. Star Bank
• The manual seems to be based on early version of the Samuri, because there are several differences between the manual and the actual game. For example, the manual has Mad Dogs instead of Crazy Cats. |
global_05_local_5_shard_00002591_processed.jsonl/25388 | 32: Value Interview w/ Sean Erwin :: Qualifying prospects vs converting prospects
Sean Erwin is a Certified Mastery Business Coach and he focuses on empowering entrepreneurs to redefine their sales by being more value-driven and less numbers-driven.
Sean has taken his 18+ years in sales – the ups and the downs – to provide unique coaching solutions for entrepreneurs.
Sean came from a place of fear and limiting beliefs, which is why he focuses on the mindset, strategy, and processes that are needed to have more long-term sales results. Instead of focusing on the perfect sales script or pitch, Sean focuses on the authentic value that you deliver in order to solve a prospect’s challenge and ultimately grow your business. |
global_05_local_5_shard_00002591_processed.jsonl/25393 | Bright Side
Nine great edible plants you can grow in your kitchen
The idea of growing a garden on the windowsill in your kitchen is becoming more and more popular. Just imagine how great it would be to have all the organic herbs you need always at hand.
We here at Bright Side love this idea, and would like to tell you all about the most popular, easy-to-grow herbs that are out there.
Growing lettuce is quite a simple task. Place the white root of the lettuce in a glass jar filled with water, without it reaching the top of the stem. Place the plant in the sun and do not forget to spray the roots with water occasionally to prevent it from drying out. After a few days you will see that new roots and leaves have formed. A week later, you can place the plant in some soil, leaving the leaves above ground. Be ready to reap the harvest in just a few weeks!
Alternatively, you can put the plant directly into soil straight away. In this case the plant needs to be watered intensively throughout the first week until the first sprouts appear.
Ginger is very easy to re-grow. Simply plant a spare piece of ginger rhizome in some soil with the buds facing upward. The ginger requires bright light, but not direct sunlight. Do not forget to give it a good watering, and your plant will soon sprout new roots and shoots. When the plant has grown, you can remove it from the soil, cut off the desired piece of the root and replant it again.
Ginger is also very attractive to look at, making it the perfect adornment for your kitchen windowsill.
Like any ordinary grass, the root of lemongrass needs only a cup of water and some sunlight to grow. It'll begin to grow in about a week. Then you'll need to transplant the lemongrass into a pot. When the stalks reach approximately 12 in (30 cm) in height, cut off what is above ground. Don't worry - it'll continue to grow!
You can use what's left over from cooking here to grow some leeks. Place it in a cup with a little water, and leave it where the sunlight will reach it, such as by the kitchen window. In the winter, however, it is better to find a place away from draughts. The plant's edible part will grow constantly - so all you need to do is cut it off when necessary. Remember to water it once a week. On the whole, however, the leek is a very undemanding plant.
Arugula doesn't require much soil, growing best in loose, well-drained ground. Just put some arugula seeds on the top of the soil, cover with a layer of dry soil (1-1.5 cm) and use a spray bottle to sprinkle some warm water over it. Cover with a piece of cling film and then put them in a warm place. After about 3-7 days the first shoots will appear. This is when you will need to remove the cling film and transfer the plant to a more permanent place to grow. When the leaves reach the height of 4 in (10 cm), you can start to harvest them.
There are two ways to grow fennel. The first option is to use the remaining part of the white root - simply put it in a glass jar filled with water and place it in a well-lit place. The fresh herbs which will appear after a while can be cut off and added to your meals. Alternatively, you can sow the seeds into the soil. But in this case, you will need to wait for a little longer.
Radish is the perfect vegetable for growing on your windowsill. First you need to soak the seeds in warm water for two days. Then put the seeds into a pot or box, no deeper than 0.8 in (2 cm). Cover it with cling film, water it regularly and keep it away from draughts at first. Once the shoots appear, make sure there are not too many of them, otherwise you won't get very large and tasty vegetables! The second time round the radishes can be planted in the same soil. But remember - it is good practice to wait at least one week before starting again, and use some fertilizer.
You can easily grow mint from seeds. They should be planted at a depth of 0.2 in (5 mm). Since mint does not like waterlogged soil, it's better to use a spray bottle for watering. Seedlings should appear within two weeks. After another two weeks, you will already be able to enjoy your fragrant peppermint tea. Just remember one thing: the plant doesn't tolerate direct sunlight and usually prefers shade.
Only the most patient gardeners who like experimenting should attempt to grow pineapples. For this purpose, you'll need only the top part with the leaves. Twist the leaves off the top of the pineapple but make sure the roots (small spots on the flat base of the stem) are intact. Then strip off some of the lower leaves until a few inches of the stem are exposed. Plant your pineapple in warm, well-drained soil, making sure the water doesn't accumulate in the pot. Regular watering is required only when the plant is still young. As soon as your pineapple plant gets stronger, water the soil lightly once a week. You will notice growth in the first few months already, but it can take several years before you can reap the harvest.
Adapted by: Rustoria
Preview illustration credit: Хcook |
global_05_local_5_shard_00002591_processed.jsonl/25410 |
Article by Lina Diquattro
Where is the Gospel?
Janine is a pastor of C3 Church, and claims to preach the healing gospel of Jesus Christ. This is the story of my attempt to seek it out and share it with Janine and fellow pastors of the C3 church.
Personal Introduction – Dear Believer, I do this out of love of God and love for you.
I would like to start with a scripture that truly defines my motive and agenda for critiquing sermons and comparing them to the scriptures. It reveals my desire to really seek out if men, who claim to be leading people to God, really are teaching about the God of the Bible. So this editorial is for those who claim to be believers in the Lord Jesus Christ. My desire is also, that you would be discerning, able to distinguish between right and wrong, lie and truth, God and man.
If Paul is an example to us, who says that we should follow him as much as he follows Christ, this is my challenge to you; In the same manner that Paul commends those who tests what he says with scripture (Acts 17:11), I commend you – test what Janine is teaching and make sure it lines up with the bible. I will add a link to the complete sermon and a transcript that I have personally typed out whilst listening to the sermon. If salvation belongs to our God and you have been saved through His son – then admonish all that stands against God, Jesus. We owe Him this much, to remain pure in His Word.
“…Therefore, putting aside all malice and all deceit and hypocrisy and envy and allslander, like newborn babies, long for the pure milk of the word, so that by it you may grow in respect to salvation, if you have tasted the kindness of the Lord.” – 1 Peter 2:1-3
“A Fresh Start” – A sermon by Janine Kubala; 8th January, 2012
This editorial was inspired by a recent visit to the Christian City Church located in Oxford Falls, Sydney. I once again encourage you to check everything that you read throughout the duration of this article. Janine Kubala’s full sermon is available on the Christian City Church website: http://www2.myc3church.net/videos/ps-janine-kubala-fresh-start. I will later place an attached link to the transcript of the sermon when I can. (I personally just find a sermon easier to process when I can read along while listening to it.)
My Experience with the Pastors – An attempt at learning the Gospel at C3.
Towards the end of the sermon, Janine starts calling people down to the front. What sounds like the gospel, is actually a call to a ‘better life’. Don’t believe me? When you listen to the sermon, try and answer why Janine only shares the gospel as the last resort when everyone has come down to the front. Where was the teaching on sin?
Feel-good speech, followed by a declaration by Kubala that, these people are now saved because they decided to come to the front and answer God’s calling for a “Fresh Start”. Something didn’t sit well with me. I watched people, crying and weeping as they ran to the front to ‘receive Jesus’ and, something just didn’t sit right. I wanted to join this group of people who were told to just “give their lives” to the Lord.
I tell you the truth, my main concern was what these people had now just been saved into. They had been told that they were ‘amazing’ and people cheered and clapped as they headed down to the ‘altar’ for Janine to pray over them. Not only did this show an amazing contradiction to biblical preaching of the gospel and salvation – so too did the lack of biblical definitions. Where was the explanation of sin? condemnation? The fallen nature? What about the work of the Spirit in our salvation?
I approached Janine and her husband, feeling awkward as a I caught a glimpse of the “reserved for pastor’s” cards that were placed on the lined of the best seats at the front of the church. I didn’t manage to follow where the group of ‘born-again Christians’ had disappeared to, so I asked Janine and her group, “I am sorry to interrupt you guys, but I wanted to know where the group at the front had gone too?”
I received a smile from Janine and her husband. A lady to the left of me said,
“Oh, they went up there…” and pointed up towards the back of the large auditorium. I honestly couldn’t see through the crowds, so I double-checked and we pointed and re-pointed until I finally decided I might wing it. I got some nods and headed off. I finally saw a group of what was mostly teenagers and young adults with clip boards. Some were crying while people with VIP cards around their necks (prayer warriors?), were laying hands on them.
Still, I was not able to just walk away. I didn’t think it was fair to leave this church and base my feelings as fact. I wanted to talk to someone. As I decided this, someone came up to me and asked; “Hi, do you need some help?”
I was still feeling very overwhelmed by everything, so I said, “No, thank you. I just want to be on my own for a small while.” It is hard to explain, you had to be there. But I continued questioning the crying, falling to knees, the clipboards, the prayers and assurances for these people when I had just heard a sermon that preached nothing of the biblical gospel.
I walked up to the lady, “Can I speak with you now, is that OK?” I said. “Sure, she said.” She was holding a clipboard. I then noticed that it was a membership to the church. Now I was annoyed. I thought people were here with bibles, trying to start discipling these young ones. They were handing out bibles too which was great.
I asked the elder if she could explain where the gospel was in the sermon as I was confused. She asked me what church I went too and I told her I haven’t been going there recently, which was true at the time. She asked why I was there and I told her to check it out, which was also true. She then said that Janine shared it. I told her that I didn’t hear it, can she explain it. She told me if I acknowledge my sin and accept God into my heart I will be saved. She quoted a scripture, which was great too.
But when I said, “Yes, I know… I am a Christian already. I am asking you because I am confused about what has happened here. How do these people have an assurance that they are saved now. Like, how do we know that we know?” Finally, she said something along the lines of, “when you’ve accepted Jesus”. I asked her how we know that we have accepted the right Jesus, she said I should ask my church these questions. That was all I needed to hear and left.
I wasn’t trying to be tricky but the answers to the questions I gave were simple. Jesus said it Himself, if we would even receive the message like a child, we would see the kingdom of God. It is so simple, even a child can understand it. Why was it so hard to explain?
I still felt like I had somehow misunderstood what had happened? Why wasn’t the gospel clearly given? Why were the importance of clipboard memberships put above reading the bible and talking about what had just taken place with these young ones? I remember very clearly, while I was sitting there observing and listening, that I overheard someone saying that they hate feeling bad about themselves and an elder comforting them with a “There, there… you’re OK now. God loves you.” I seriously never remember Jesus taking this attitude to sin.
The Aftermath – Trying to catch up with Janine about her sermon… and that Gospel again!
After that I decided, I would go straight to the speaking pastor. I added Janine to my Facebook account and started messaging her on her public wall. I first asked her for her personal testimony as to how she came to a saving knowledge of the Lord Jesus Christ. This was sent on 13th January, 2012. There was no reply.
Considering Janine’s busy schedule, I attempted to make contact again. This time, I extended my concern to the fact that I did not hear the gospel in her sermon and am confused about this and would love to hear back from her concerning this. This was sent on the 2nd February, 2012.
After trying to make contact twice, each time really trying to give a chance for Janine to share what she thinks the gospel is because of what I had heard during the sermon that Sunday, I thought I should try and maybe contact her through the Facebook inbox. This was on the 2nd February, 2012 (evening)
Nothing. I thought at this point, that perhaps I should ask how she deals with donations, if someone was interested. I have been careful not to be deceiving, and so I asked in a way that I made it clear that I was asking in the 3rd person. What would someone do if they were interested in donating? I wrote this on Janine’s wall. I got a response that day. She directed me to a person on the C3 team that I could get into contact with. This was sent on the 22nd February, 2012.
I emailed that person expressing my concern about the gospel and what C3’s idea of the gospel was. There was no reply from her. This was just getting more and more concerning with each attempt. At the end of the recent screen grab you will see that I asked if someone could share about the gospel before I even consider a donation. This conversation continued in my inbox. I may disclose what happened in this discussion in another article.
I have sent Janine this article in one last attempt to reconcile this confusion. Why was I sent to my nearest C3 church to get my answer? Isn’t the gospel just a simple answer? Give me a scripture. Janine, I want people to know about this because it is very concerning for someone who call themselves a pastor to answer me concerning donations and not concerning the gospel of Jesus Christ that saves. I hate to think the worse but please share your thoughts on this. Let us come to a place of truth and reconciliation.
NOTE: This article was completed on 16thApril, 2012 and sent to Janine Kubala on that same date. This is so Janina Kubala can be made aware of it’s existence and have opportunity to reconcile it. |
global_05_local_5_shard_00002591_processed.jsonl/25428 | Grey Worldwide Strategic Repositioning Through Crm Case Study Solution & Case Analysis
Braun Ag The Kf Coffee Machine Case Analysis & Solution
My fear is that case analysis boom in synthetic intelligence in writing will spark case answer new level of laziness in case answer world already dependent upon generation.
An introduction case study discourse analysis . London: Routledge Hornby, A. S. 1995. Oxford Advanced Learners Dictionary. New York: Oxford University Press. Altbach, P. G. , and Teichler, U. 2001. Internationalization and exchanges in case answer globalized institution.
Luckily you can’t get West Nile Virus transferred out of your pet dog or cat or another person.
When you open case analysis link of case research tool, case solution text box can be viewed.
Genzymegeltex Pharmaceuticals Joint Venture PESTLE ANALYSIS
Constitution by case analysis Second Amendment has created case answer multitude of outcomes for glossy Americans.
This part ofthe project is as critical as your search description and evaluation. Incidentally, you will even be assisting your colleagues here. It’sour intention case study collect case solution guide based on your strategies and counsel that wecan use both for newer students and for your own colleagues. So this is case answer realcase where which you can do good by doing well!SLP Assignment ExpectationsLENGTH: 2 3 pages typed and double spacedThe following items might be assessed in particularThe degree case study that you have conducted case analysis assignmentcompletely, or clarified why you couldn’t and investigated alternativesYour ability case study describe your stories essentially and drawconclusions from them, not just narrate eventsYour potential case study center around case evaluation overall functions of theassignment, not just its true stepsYour use of some in text references case study what you have readwhere acceptable, please cite all sources properlyITM501SLP03 2 case study 3pages double space courier new and case solution reference pageSince you are smart enough be part of our MBA program andcomputer literate adequate case study be case solution TUI scholar, you nearly certainly know whatTwitter is you would’ve had case study have spent most of case analysis last couple of yearson case evaluation far side of Jupiter case study have prevented listening to about it, even supposing youhaven’t basically used it. If you have got used it, then you’ve got case answer heads up onthis module’s SLP. As Twitterdescribes itselfTwitter is case solution real time data community that connects youto case evaluation current information about what you find appealing. Simply find thepublic streams you find most compelling and apply case analysis conversations. At case analysis heart of Twitter are small bursts of information calledTweets. Each Tweet is 140 characters in length, but don’t let case evaluation small sizefool you—you can share case solution lot with case solution little space. Connected case study each Tweet is arich details pane that adds additional data, deeper context andembedded media. You can tell your story inside your Tweet, or you can think ofa Tweet as case evaluation headline, and use case analysis particulars pane case study tell case evaluation rest with photosvideos and other media content.
They state that , An fine regulatory and legal framework is critical for case analysis proper and sustained enlargement of case evaluation company.
Package War Fedex Vs Ups SWOT ANALYSIS
96personal injury solicitors42.
Although there are many case study select from, case analysis difference among competing yogurt makers is minimal. All you wish is case answer tool that will hold case evaluation yogurt combination at case evaluation required temperature for case answer set period of time. Honestly, case analysis best yogurt maker is case analysis most cost-effective and finest appliance that fits your price range. Many patrons select case analysis least expensive choice and just won’t buy case answer yogurt maker. I don’t think these of us are cheap, but I do think they should explore their chances. Instead, they’ll use their oven for warmth. This is case answer possible alternative however it will grow to be costing you in case evaluation long run on account of how much electricity is required case study keep an oven heated for as a minimum 6 case study 8 hours. I recommend they buy case solution yogurt maker in its place because it is more energy green and won’t use approximately as much electricity as their oven. I must repeat that they best yogurt maker is case evaluation cheapest alternative. Another choice I’ve heard from a couple of people is case study use case solution microwave convection oven. Once again, here is case solution large equipment that attracts tons of electrical energy so your power bill might be affected from leaving case analysis microwave on for a few hours. Also your microwave is tied up and can’t be used while your yogurt is heating. Some of us can be aggravated by case evaluation constant noise of case analysis microwave. It just seems less complicated and more trouble free case study invest in an inexpensive yogurt maker. There are a number of ways case study make yogurt using selection heat resources. All of these options are authentic and can yield case answer wonderful tasting snack.
The most effortlessly accessible and convenient way case study stratify case analysis existing inhabitants, then, in accordance with these factors is case study do so by technology.
Competing Visions Of Stork The Role Of Active Investors PORTER’S FIVE FORCES ANALYSIS
Whichever path you could decide, case answer wide wide variety of fields are open case study you as most of the time, all styles of businesses need case evaluation expertise of case answer financial analyst.
2013 07 15 13:00:00 下午1:00. 文科楼919会议室. 2013 08 30 09:00:00 上午9:00. 复旦. This domain has been registered with SARNic Hong Kong Domain Registrations. It is ready case study be hosted. Search for cuhk edu in Google Enter your seek terms Submit search form 自訂搜尋. Domain owner, if you want case study have your area activated Login into case analysis Domain Admin or electronic mail SARNic aid. Mr. P. P.
This is case analysis decision, case analysis last a part of PACED.
Rebuilding Companies As Communities FINANCIAL ANALYSIS
The article provided me with case analysis assistance that many mainstream artists in 2016 were releasing their music on cassette tapes.
Without this, there will be an asymmetric quantity of physicians, similar to now, and this reasons scarcity. This is case analysis decision, case analysis last a part of PACED. Part one: Comment on case analysis two short tales we’ve read specializing in case analysis idea of “identification”. How did case evaluation hobbies in case analysis narratives shape case evaluation identities of case analysis two characters?In case evaluation Boat, case analysis death or method of loosing their fathers is case evaluation main event that shapes/fashioned case evaluation two characters. Mainly, case analysis loss made both case evaluation characters more desirable, and in payment of their life. For example, in Shaving, Barry now had case study take full responsibility of his life, his mother, and case evaluation house. The death makes them independent, they aren’t any longer referred to as “Harry’s son. ” for instance. But they are referred to as Barry, case solution man on his own, and has case study keep up case analysis household’s name. In case evaluation Boat, case evaluation narrator went back case study getting his training, and taking obligation of his life. Both of these characters had case study make their own judgements and take case answer lead in their life.
You could fail to spot your chance if you select not case study follow punctuality.
Who Really Makes The Big Decisions In Your Company VRIO/ VRINE Analysis
Hence, they want case study identify case evaluation HNWI as they enter case analysis branch, because here is not case answer service centre.
As far as he and his small staff were involved, they might meet case evaluation invading armies and march on. But that was easier said than done. Wilson was already case solution veteran of case answer outdated engagement, case evaluation 2000 vice presidential debate, when Dick Cheney battled Joe Lieberman for case analysis strengthen of voters. But that skirmish might as well were case answer century ago, Wilson concluded, as he thought to be case evaluation necessities main up case study case evaluation 2012 event. Centre College already had case solution venue case study stage case evaluation debate, case analysis Norton Center for case evaluation Arts, with case solution fine theater available. It also crucial case answer separate building case study house case analysis media there case study witness case evaluation debate, and Centre freed up space in its Sutcliffe Hall, where case analysis athletic director, coaches and coaching teams had case solution big collection of gyms, convention rooms and school rooms. The trouble in 2000 would were installing adequate analog phone lines in Sutcliffe case study fulfill case evaluation needs of case evaluation media. “I don’t think at that time that most newshounds even had case answer telephone,” said Wilson in an interview. The challenge in 2012 was starting case solution voice over IP network with lots of bandwidth become independent from case evaluation main campus network. The network would want case study be subdivided under rigorous rules case study keep Democratic and Republican teams from probably listening case study cross talk. Likewise, case evaluation Secret Service needed its own preserve lines. And many visiting events wanted wireless as well as Ethernet ground line access. “We had case study installation case solution transient data middle in Sutcliffe and 900 temporary phone lines. We had case study offer cell and wireless insurance,” said Wilson. That meant three racks of servers and network switches went into case answer small room in case evaluation athletic building, with 100 instant entry features scattered across case analysis building. In addition, they installed 50 one Gbps Ethernet switches with two 10 Gbps uplinks. Cisco’s Identity Services Engine was put in case study offer entry control case study authorized users and set policies that kept one set of network facilities for Democrats become independent from an alternate set for Republicans, and both aside from case evaluation Secret Service’s. With minimal staff, Wilson and his assistants could not do such case answer project themselves. They hired and supervised specialists from Boice Networks in Louisville, Ky. , and 6 weeks earlier than case analysis event, installation started with two Boice staffers, whose numbers grew case study 14 by case evaluation time of case evaluation event. “I’m continually an individual who’s an implementer and getting his hands dirty,” Wilson said. This time, he had case study supervise as case evaluation designer of case analysis plan that Boice, Cisco, IBM and VMware staffers were enforcing. Everything gave the impression case study be operating fine, when case evaluation one pre event glitch occurred. A circuit breaker tripped on an overloaded circuit, and loads had case study be redistributed case study keep every thing running. Otherwise, contributors of case evaluation press had case analysis entry they sought case study case evaluation VoIP community and case evaluation commodity Internet, he said. Some contributors of case evaluation press weren’t convinced with all case analysis preparations and attempted case study use their MiFi mobile hotspot connectors now known as Jetpacks tied into close by Verizon wireless towers case study create their own wireless hotspots. The pastime interfered with case evaluation access points Centre had set up. “We had case study ask some americans properly case study turn them off,” recalled Wilson. The 14 IBM servers and 50 Cisco Ethernet switches, together with VMware vSphere 5 virtualization for case analysis servers, networking and storage, were all an funding that case evaluation college had case study make. Wilson says he can’t reveal case analysis quantity spent, but observers aware of such routine and case evaluation amount of equipment involved estimate that it handed $1 million. Wilson said case analysis college reaped case evaluation benefit of an equipment oversupply following case analysis event.
Smith claims 2011, “Perennialists teachers are not concerned about case analysis students’ interests or reviews.
Achieving Service Excellence 4 Take Charge Conclusions RECOMMENDATIONS
And once again case analysis other side devolves into character assassination fairly than adressing case analysis studies and data.
Wait case study trim case evaluation trees across its dormant season Now that you just are good case study go, listed here are case analysis precise actions case study comply with when trimming your trees; Click on this link case study learn more facts about tree trimming. The collar usually grows from case evaluation stem tissue at case analysis bottom base of case evaluation branch. You need case study likewise be aware of case analysis department ridge which happens on case evaluation upper floor, parallel case study case evaluation branch angle and stem. : When trimming, continually guarantee you chop external case evaluation bark ridge of case analysis department by angling your cut downwards and clear of case evaluation stem. A three cut method is generally advised when case solution stem is too long. In this method, case solution notch is made on case evaluation side of case analysis department that deals with clear of case evaluation branch it really is being retained. A 2nd cut is then made interior case analysis crotch of case evaluation department along with above case analysis department ridge. Peter J. Bedker, Joseph G. O’Brien, and Manfred M. Mielke USDA Forest Service All landscape and shade trees need pruning at case solution long term right through their life.
The mere considered operating out leads most of us… Diversity Club is a company dedicated case study helping unfold capabilities and knowing of different cultures, both at RPEMS and throughout case analysis world.
Pragmatism, primarily, aims continual researching and education.v
05:24:22 AM
Azim Premji Foundation Bringing Professional Excellence To Philanthropy
Rated 5/5 based on 896 reviews. |
global_05_local_5_shard_00002591_processed.jsonl/25445 | Quick Answer: Are Prophylactic Antibiotics Safe?
When should prophylactic antibiotics be given?
Prophylactic antibiotic administration should be initiated within one hour before the surgical incision, or within two hours if the patient is receiving vancomycin or fluoroquinolones.
Antibiotic prophylaxis should be appropriate for the specific procedure and consistent with SCIP guidelines..
What does long term prophylactic use of antibiotics mean?
Antibiotic prophylaxis is the use of antibiotics before surgery or a dental procedure to prevent a bacterial infection. This practice isn’t as widespread as it was even 10 years ago. This is due to: the increase in the resistance of bacteria to antibiotics. the change in bacteria that cause infections.
What type of drug is prophylactic?
Will antibiotic prophylaxis prevent UTI?
A meta-analysis reveals that antibiotic prophylaxis reduces the risk of recurrent urinary tract infection but increases the risk that a recurrent UTI will be multidrug resistant.
What is prophylactic antibiotics used for?
How long can you take prophylactic antibiotics?
Depending on the clinician’s assessment, a woman may take the antibiotics daily, after intercourse (if that seems to be the source of her infections), or for a day or two when symptoms first appear. It’s safe to take antibiotics preventively for up to several years. |
global_05_local_5_shard_00002591_processed.jsonl/25452 | All you Need for a Virtual Passover 2020
Mar 24, 2020
Passover is just around the corner and it's probably not going to look like any Passover than any of us have had before. We wanted to help you out with some resources to help bring you and your families and friends together for a once-in-lifetime (let's hope it's only once!) Passover experience.
Let's get started with a few tips and Passover basics:
• Want to know more about Passover? Always just attended seder and not really sure where to start? Want to learn more about this really cool holiday that is one of the most celebrated by Jews around the world? Check out 18 Doors Passover page. They're an organization that primarily provides resources for interfaith families, so it breaks down everything and "delivers knowledge and connection to help you...[do] Jewish in a non-judmental way." And that's why their resources rock and are incredible accessible. They have recipes, basics about the seder, song parodies, and so much more!
• Are you having young kids at your seder? has you covered with some tips and tricks to keep them engaged throughout the night. Although, by now I'm sure you've figured out a lot about what does and does not work with your kids during an educational experience (homeschool, anyone?).
So you know about Passover and you're ready to start thinking about how to connect your family and friends who are all staying the f**k home and obeying social distancing- awesome! You probably need a Haggadah, and ideally one that everyone can get, use and easily follow along with. Here are a bunch of different Haggadah options that are available online:
• JewBelong makes Judaism accessible and explains all of the big and small parts of the seder. They're careful to make sure that nobody suffers from Jewbarrassment (yes, that's their word- not mine). You might also have seen their kugel/kegel ads that have the bubbes all abuzz. They have an easy, printable Haggadah that you and all of your friends and family can print at home (or have printed and shipped for I'm sure a minimal amount...or could probably just have it on a tablet or computer), in addition to other great resources, like a drinking game.
• Our friends at JewishBoston created a contemporary and beautifully designed downloadable Haggadah. You just need to put in your address and zip code (and no, it doesn't need to be a Boston zip code- I tested it), and you'll get it in your mailbox. You can do it once and send the download to everyone, or you can have each person download it separately. It starts with some information and tips for getting everything set up (including optional modern seder additions) and then gets into the Haggadah. On every few pages there are questions that you can discuss that relate our modern lives to the traditions of the Passover seder.
• Moishe House International has a great Haggadah that they developed, which is simple and easy to follow. Includes all of the blessings and parts of the seder, explanations, and some additional readings. They also have a google drive with a few additional resources that you might find helpful or interesting.
• There's also the option to create your own Haggadah. You can pick starting with a liberal or traditional template and then add clips and readings from there. OR you can browse Haggadot that other people have already made and seems interesting to you, and send the link out to family and friends. Watch this video that made about their site and why you might want to check them out:
• AND we've added an attachment at the bottom of this post, sharing a thoughful Four Children in the times of COVID-19
Of course, you can always order Haggadot online. For whatever reason, it looks like a lot of haggadot aren't shipping in time for Passover, even though it's still over a week away. So if you go with another option, double and triple check the day that it's supposed to
This is the haggadah that I grew up using, so I have a nostalgic connection to it. It's also inexpensive and available on Amazon Prime, so it'll definitely get to you before Passover. It also looks like there's a kindle version, if that's your jam.
Here's a family haggadah from our friends at Kveller that you can get on kindle. Unfortunately, the hard copy version won't get to you on time.
Did you not buy a seder plate because your parents, grandparents, friend's parents, etc. have one? No problem, we've got that covered too!
Worried you'll break a seder plate, don't think you'll need one next year, or don't want to deal with the clean up? Great! Here are some disposable seder plates that you can also use as your dishes for seder.
Here's something that's still pretty basic, but a little nicer and reuseable seder plate
We also encourage you to support etsy shops and artists, who we think might be hurting during these times:
Finally, here are some great resources from some sites that we love:
Other news |
global_05_local_5_shard_00002591_processed.jsonl/25475 | Showing results for
Search instead for
Did you mean:
Sign up Log in
Next challenges
Recent achievements
• Global
• Personal
• Give kudos
• Received
• Given
• Global
Trophy case
Kudos (beta program)
Kudos logo
View group
It's not the same without you
Atlassian Community Hero Image Collage
Automate Portfolio Reports
Hello community,
I know that you can manage reports with JQL in Jira projects, but are there any options to automate the report function in portfolio?
1 answer
0 votes
Hi Marvin,
Natively there is not a way to trigger a automated report export in Jira Portfolio, However if you have the HTML macro enabled for Confluence, you can use the Portfolio report/share button to get an iframe url snippet you can put into an HTML macro to render the data in a confluence page.
This will allow you to display various Portfolio reports in a Confluence page. Once the page is in Confluence you can use the method covered in This Community Post to do an automated export of the page using a script locally to generate a PDF of the page.
Additional details on generating the iframe can be found here
Thank you for the info Earl!
Suggest an answer
Log in or Sign up to answer
Community showcase
Published in Advanced Roadmaps
Introducing Advanced Roadmap’s new dependency report
128 views 2 6
Read article
Community Events
Find an event
Unfortunately there are no Community Events near you at the moment.
Host an event
Events near you |
global_05_local_5_shard_00002591_processed.jsonl/25476 | Showing results for
Search instead for
Did you mean:
Sign up Log in
Next challenges
Recent achievements
• Global
• Personal
• Give kudos
• Received
• Given
• Global
Trophy case
Kudos (beta program)
Kudos logo
View group
It's not the same without you
Atlassian Community Hero Image Collage
Can I create a form with a table where people can add a row using a button?
HI all,
I am in charge of creating/updating our Wiki pages at work. We have quite a few, and people have been throwing more at me. I was thinking of creating a form where people could add pages that need to be worked on. I would use a table so that I could have columns like 'Page', 'Status(Missing/Obsolete)', 'Submitter', 'Notes', and maybe a couple of others.
Rather than have to go in and occasionally add rows or ask my users to, I was thinking about putting a button on the page that would say 'Add new item', or something similar, and it would add a new row to the table
Is this possible, or does it need plugins/macros?
1 answer
1 accepted
0 votes
Answer accepted
Are you using only Confluence? Or do you use JIRA as well?
Tracking requests like these is what JIRA is all about and you can embed JIRA issue tables in your Confluence page with all the information you need as well as give the users a button to click to get a form that will add a new issue to that JIRA table.
We use Jira as well, so I'll talk to our Jira guys and see if they can help me out on this. Thanks for the tip!
Suggest an answer
Log in or Sign up to answer
Community showcase
Posted in Confluence
480 views 24 9
Join discussion
Community Events
Find an event
Unfortunately there are no Community Events near you at the moment.
Host an event
Events near you |
global_05_local_5_shard_00002591_processed.jsonl/25505 | 1,694 Pages
Forums: Administration Requests
This page should be used to make a request for a specific administration task to be completed. Please be patient as request replies may take up to a week.
To add a new request, please type a meaningful title in the box below and click "Add new topic". Please sign your contributions as you would on a talk page.
View recent changes for this forum | View alphabetic list of topics
Create a new request
<createbox> width=30 break=yes prefix=Forum: preload=Template:Forumheader/Requests buttonlabel=Add new topic </createbox>
RequestLast editLast author
Episode Section for true crime inspiration01:45, 7 September 2019
List of deaths18:54, 2 January 2018
Add a template for minor characters in CSI: Cyber14:12, 28 May 2017
Appearances for Immortality characters template13:46, 30 April 2016
Who know this boy13:52, 20 September 2015
Debbie Menzel14:05, 27 March 2015107.138.77.107
Blonde CSI. There was a character, she was a blonde CSI. I cant remember her name and cant seem to find her on IMDB. Not Catherin, Morgan or Finlay.16:46, 14 June 2014
TEST15:07, 24 August 2012 |
global_05_local_5_shard_00002591_processed.jsonl/25510 |
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
Assigning CNA
MITRE Corporation
Date Entry Created
Phase (Legacy)
Assigned (20101221)
Votes (Legacy)
Comments (Legacy)
Proposed (Legacy) |
global_05_local_5_shard_00002591_processed.jsonl/25547 | DaaDCast Episode 39: BBQ and Beavers the Southern Frontier
The Disney at a Distance Podcast has a new episode this Monday morning! No, this isn’t an April Fool’s joke, our titles are usually something that was said in the podcast or what the episode is about. Yes, this is another rant filled episode on some Southern State things.
The DaadCast starts out the episode discussing another two categories in the Disney at a Distance Song Tournament we have going on. The categories were Friend and Random categories. Below are the songs that we discussed:
Besties Before the Resties – Friend Songs
If I Didn’t Have You
You’ve Got A Friend In Me
I Have A Dream
You’re Welcome
A Friend Like Me
Hakuna Matata
The Bare Necessities
Let’s Go Fly A Kite
Bing Bong’s Playlist – Random Songs
Un Poco Loco
Be Our Guest
Bibbidi Boppidi Boo
Winnie the Pooh
Feed The Birds
Beauty & the Beast
Take a listen to find out which top songs from each of these categories goes on into the finals, and how we ranked them, with your help!
New rules, bbq, and beavers
We touch up on all the new rules that will be in effect on May 1st in the Walt Disney Parks. There were a few rules that were a long time coming, and one that was really unexpected, like “No loose ice”.
The DisTwits that live in the Southern States start to go off on a side conversation about some Southern stores and their favorite, BBQ. It is a very fun episode about many different things, seguing into other fun topics. Take a listen!
or listen in your favorite podcasting app
Disney at a distance comes out every monday more. catch up on the latest episodes on the disney at a distance page for all archived EPISODES
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
global_05_local_5_shard_00002591_processed.jsonl/25549 | Type HE is an iron-chromium-nickel alloy with enough chromium to be suitable for service up to 2000 F and enough nickel to make it stronger and more ductile than the straight chromium stainless steels in the as-cast condition. As cast it has a two-phase, austenite-plus-ferrite structure containing carbides. At high temperatures ACI Type HE has excellent corrosion resistance, good ductility and moderate strength. It is used in the steel, power, oil refining and smelting industries. This datasheet provides information on composition, physical properties, hardness, elasticity, and tensile properties as well as fracture toughness and creep. It also includes information on corrosion resistance as well as casting, heat treating, machining, and joining. Filing Code: SS-330. Producer or source: Stainless steel foundries.
This content is only available as a PDF.
You do not currently have access to this content. |
global_05_local_5_shard_00002591_processed.jsonl/25550 | Using Metrics to Count Visits
The main point of running a Campaign is to see if the Variations you design actually affect the actions of visitors to your website. You can track the number of visitors who were exposed to a Variation easily by selecting Count User When Triggered (set to Yes by default) in the Advanced Settings area of the Factor page for that Variation. Generally, this is a good way to count visits, but it tells you only how many visitors saw the Variation. It does not tell you if seeing the Variation caused visitors to react to it and more importantly, to complete a transaction, or some other action you're driving them toward. You'll need to use a Metric for that.
For example, let’s say that you’ve designed a Factor for a page on your website that lists a number of types of winter boots. You’ve also created a Variation of that page that contains a box with a message that offers visitors a 20% discount. You want to know if that Variation with the discount causes visitors to actually make a purchase. You can measure that using a counting Metric to see how many visitors who were exposed to the Variation landed on the Checkout Complete page.
Creating a Counting Metric
You create a counting Metric the same way you create any other Metric. The difference is that on the Advanced Settings pane, select Yes in the Count users who trigger this Metric field. When you add this Metric to a Campaign, visitors are counted only if they trigger this Metric.
To set this up:
1. Select NewMetric.
2. Name the Metric and click Save.
3. On the right side of the page, click Show Advanced Settings. The Advanced Settings dialog opens.
Using Metrics to Count Visits
1. In the Advanced Settings Dialog, select Count users who trigger this Metric.
2. Click Apply on the Advanced Settings dialog and then click Save for the Metric.
Note: Make sure you de-select Count Users When Triggered for any Factors associated with the Campaign. See Advanced Settings for Factors for more information.
Using EventTrack for Counting Metrics
SiteSpect's EventTrack library allows you to use JavaScript to track visitor actions such as clicks, page transitions, and more. For each action you want to track, you must create a Metric. In addition, since you want the code to work for all Variation Groups in a Campaign, use a Campaign Variation to implement the script for your Campaign. You'll need to complete the following steps:
1. Write the EventTrack script.
2. Create a Campaign Variation that includes the script.
3. Associate the Campaign Variation with a Campaign.
Where Can I Use Counting Metrics?
Origin Experiments
When you run an Origin Experiment, the Variations are reflected on the origin, which means that SiteSpect does not know where these changes have been implemented on the website. As a result, SiteSpect does not know when visitors see Variations that are part of the Campaign. You can manually manage counting visitors by creating a counting Metric for that Campaign. When a visitor is exposed to the change the Metric is triggered and serves as your counting criteria in SiteSpect.
Client-Side Factors
Client-Side Factors work by injecting JavaScript on an HTML page. Changes are then applied as the visitor interacts with the page and the DOM mutates. Client-Side Factors do not count visitors when the JavaScript is injected. Because all the Variations are made on the client side, SiteSpect does not know if the visitor sees them. You can get around this by creating a counting Metric that is triggered when the visitor sees a Variation. In this scenario, you can make an EventTrack request when your JavaScript Variation code makes a change and then use this Metric as a counter for that test.
Additional Use Cases
There many other use cases in which counting Metrics work better than the standard counting settings for Factors. For example, if you are editing content in the footer of a page or in an area that a visitor must scroll to, you'd probably want to use a counting Metric. If you are making changes to a pop-up or flyover, which is not displayed on the page by default, you may want to use a counting Metric. These are all examples of when you want to change the HTML of a page but don’t necessarily want to count visitors until they are exposed to the change. |
global_05_local_5_shard_00002591_processed.jsonl/25553 | Saturday, October 14, 2017
Cognitive Voluntarism of James F. Ross
Excerpted from Epistemics of Divine Reality (2009, 2011)
In his paper Reason and Reliance: Adjusted Prospects for Natural Theology (1990),[1] James Ross defines ‘Cognitive Voluntarism’ as the view that ‘humans, for the most part, believe not because they are compelled by the evidence, but because they want to (sometimes even being compelled by wants operating as “convictors”) because assenting appears to advance their ‘apprehended good”.’ Cognitive voluntarism is seen as our willing reliance upon people, feelings and outcomes, directed to our own fulfillment. According to Ross, it has reemerged as a basis for rational certainty, not only in empirical cognition generally, but in the most important commitments of our lives.
Ross begins by saying that rational certainty about God is more plausible than was believed in the fifties. The fact is that, the notion of what constitutes rational certainty is now better understood. The most important achievement, however, has been the rehabilitation of faith. Faith is seen as willing reliance on others thought better placed to know, as well as willing reliance on the regularities we find in nature and people, to indicate what we should believe. Ross goes on to say that faith is undeniably a source of knowledge.
Faith is undeniably a source of knowledge, often more efficient than finding out for oneself, as the telephone book makes clear. And where faith falls short of knowledge, it often supplies rational certitude, even about the most expensive and conservatively entered human undertakings, especially in engineering (bridge and theater design), naval architecture (hull design), applied science (nuclear power plants), and sometimes even in our formal logical and mathematical disciplines. Faith is a foundation for rational certainty, maybe not a rock‑bottom one, but an indispensable one. In fact, trust is the very fabric of social conviction and the golden thread of science.[2]
Thus, according to Ross, rational certainty finds its basis on faith, and faith is indispensable to it. The truth is that rational certainty is more a contextual thing than a universal thing. Thus, what is handed over down to the next generation is voluntarily accepted as truth with rational certainty since voluntary reliance is part of the sociology of knowledge. Everyone has his own system or framework of rational certainty. Here we may pause to consider that Paul on Mars Hill did not quote the Old Testament Messianic prophecies to the Greeks; the Old Testament was a framework of rational certainty chiefly and significantly for the Jews and not for the Greeks. Therefore, one cannot be in the position to judge anyone unless one is able to see from the other’s viewpoint. As Ross puts it,
You cannot get into a position to evaluate until you become an insider. There is no access to the reliability of the “system” from the outside, not any more than there is access to the standpoint of musical, philosophical or aesthetic mastery of judgment, except by discipleship, first.[3]
This is reminiscent of Wittgenstein’s language games and forms of life. One cannot be in a position to even understand, far be to judge someone else’s position, except by participating in the other’s form of life that grants meaning to his position.
In addition to the significance of faith, the cognitive role of feelings to ground rational certainty has also been recognized. Ross says that feelings ‘are knowledge-making.’ It is the satisfaction and stability of deep feeling that ‘hardens belief into rock-bottom commitment.’ Feelings play an important role in both faith and reason. Statements like ‘I feel I can trust him,’ or ‘This argument is elegant,’ or ‘This argument is flimsy,’ demonstrate that feelings are not separate from the cognitive process of faith and reason. Thus, rational certainty is not cold. It is charged with feeling and reinforced with faith.
Ross points out that much of the stuff we believe in, and which is crucial to make sense of this world, is convictions beyond all data. For instance, belief in the origins, salvation-history, final judgment, after-life, etc. all go beyond empirical data but are voluntarily believed to make sense of the data at hand. In other words, a leap beyond is crucial to make sense of the present ground. Such ‘going beyond’ provides rationality to life. However, on finding such convictions directly refuted by experience, adherents do replace them with the ‘nearest tenable facsimile.’ Thus, faith has become crucial to make sense of any knowledge in this world. Further, a sense of the sociology of knowledge as the rationality of relying on those who ought to know has been recognized. For instance, we sit on a train with a feeling of security and satisfaction that we will reach the destination, because we rely on the railways, including the driver as the one who ought to know to drive the engine. This sense of certainty can only be lost by recurrent failure of the railways. Similarly, a worker follows the directions of the engineer, even as a soldier follows the directions of his commander out of reliance in people and the pattern of things.
“Faith” is no longer the paradigm of “unjustified belief” or “belief that contravenes the evidence”, or “belief held against the demands of reason” as Locke and Hume, and even C.J. Ducasse (Nature, Mind and Death. 1948) thought, but rational trust in those who ought to know and, equivocally but relatedly, reliance on the patterns in things. Even non-thinking animals display what Santayana called “animal faith”, staking their lives hour by hour until they lose.[4]
Hints of Kierkegaard’s ‘infinite passion’ that seeks satisfaction can also be found in Ross’ cognitive voluntarism. We trust because we want something, he says. ‘Reliance is, itself, a mode of satisfaction.’ As an example, he refers to the hunter who relies on the flight pattern of turkeys because he wants to eat some. Thus, an internal urge, the will, for satisfaction may be considered as the engine of believing.
Augustine says, “nemo credit nisi volens” (“no one believes unless he wants to”); not that you can believe at will or even disbelieve at will, though the power of the unconscious is awesome at rejection, and impressive at accommodation, regardless of the evidence. Nevertheless, the will is the engine of believing, not the understanding (except in the few cases of the “manifest vision of truth”, of compelling obviousness, as Aquinas explained it). And even the compelling obviousness of one’s mortal wounds can be willed away, say, as a medic urges one to live, sometimes with success. The rest of the time evidence does not compel belief, the will supplies the commitment.[5]
Regarding the contention that the truth about the existence of God must be demonstrated before being believed in Ross, responds that ‘there is nothing knowable by a demonstration that cannot be known with certainty without one, and that includes mathematical and logical theorems.’[6] Demonstrability cannot be considered to be the gateway to knowability. Ross argues that a genuine demonstration will rule out all counterpossibilities. However, such genuine demonstration has never been and cannot be given; since counterpossibilities from the other side are expected seeing that belief is more a matter of will than of reason. Further, a common ground regarding the validity of some demonstration is not agreed on because of contextual arrangements.
As has been said earlier, it is not simply data at hand but feelings urged by a desire for meaning that play an important role in the forming of convictions. However, feelings cannot be blindly left unrestrained. The refinement of feelings is important for a proper channeling in of knowledge. Practical wisdom, thus, is the ability to live wisely and well, and is the product of good training and example, internalized by one’s mimesis (imitation, e.g., of father by son) of refined understanding, feeling and even passion. Ross points out that a life without passion is feeble and furtive. Similarly, philosophy without feeling is philosophy without springs. When it comes to making sense of life, it is not science but practical wisdom that is more appropriate. Thus, one cannot ground his life on dry empirical proofs. According to Ross, feeling creates ‘conviction by combining satisfaction (fulfillment in some respect) with reliance (which is itself a kind of satisfaction in dependence, like lovers holding hands) into an outcome that is our conviction.’ Reliance on the community that says it has found out the truth (sociology of knowledge) and personal practice, mimesis, or imitation of it that brings satisfaction and rewards lead to convictions.
There are in-built wants that operate as convictors. Convictors convert data into conviction. Thus, according to cognitive voluntarism, people believe not by the force of evidence but by the force of wants that operate as convictors. Ross contends that this approach to knowledge is not something new but was recognized long back. For instance, both ‘Augustine and Aquinas (with differences) think our cognitive powers have basic drives (of which the rational appetite, the will, is the chief drive), and thus, have a targeted finality that is no natural end, but rather, life with God.’[7] It may be added that this view is also reflected in William James’ concept of ‘will to believe.’ In his The Will to Believe and Other Essays, he wrote:
He also adds that in ‘truths dependent on our personal action…faith based on desire is certainly a lawful and possibly an indispensable thing.’[9] However, James qualifies such freedom to believe what one wills with the condition that this freedom ‘can only cover living options which the intellect of the individual cannot by itself resolve….’[10] In other words, faith becomes inevitable where intellect cannot go on. So, one is compelled to choose from among the living options available. Since religion is a live hypothesis which may be true it cannot be left ignored. James’ view, however, is more pragmatical and similar to Pascal’s Wager. He says, ‘If religion be true and the evidence for it be still insufficient, I do not wish…to forfeit my sole chance in life of getting upon the willing side – the chance depending, of course, on my willingness to run the risk of acting as if my passional need of taking the world religiously might be prophetic and right.’[11] Evidently, the William James’ view doesn’t sufficiently take into consideration the existential motif of ‘infinite passion’ and the ‘sense of meaningfulness.’ However, it is quite close to the main idea of cognitive voluntarism.
According to cognitive voluntarism, then, the rational certainty of faith in God is more a contextual thing. There is an inner urge in man that attempts to find meaning out of all that he knows. Revelation provides the data, usually in the form of traditions passed on by the community, which makes sense of life. Practical wisdom holds on to such beliefs through pragmatic experience that refine the feeling and passion. Feeling combines with reliance to produce conviction. Reliance on verbal testimony is a very important source of knowledge.
Feeling creates conviction by combining satisfaction (fulfillment in some respect) with reliance (which is itself a kind of satisfaction in dependence, like lovers holding hands) into an outcome that is our conviction. Two kinds of satisfaction suffuse something we assent to. That's how we, those who did not discover anything or even repeat the inquiries, know that there are micro‑particles, electrons, molecules, atoms. We rely on the community that says it did find out, and we get satisfaction and rewards by doing so. Thus we are convinced.[12]
Subjectivity of truth, as in Kierkegaard, thus, is paramount. But, in addition is voluntary belief, in the sense that one believes what one wants to believe, or what one is satisfied with. No one stands in a position to evaluate anyone’s belief unless he enters the ‘form of life’, to use Wittgenstein’s term, of the other. Reliance and satisfaction, i.e., faith and feeling, thus are crucial to the noetic event. Faith is the foundation of rational certainty, and things are believed in because they make sense of life. Achieving this sense and meaning of life is the goal of practical wisdom, which goes beyond mere science and evidentialism.
Critique of Cognitive Voluntarism
Ross’ capture of the spirit of knowledge is excellent. Philosophy without feeling, he says, is philosophy without springs. Surely, ‘deep answers the deep’; humans have an inner and infinite urge that can only find satisfaction through faith in an infinite and living God. Therefore, we do go beyond available data to make sense of the available data. The question of origins, meaning, and destiny are unavoidable. Any nearest hint that carries at least some certainty (within the cognitive contextual framework) is immediately converted into a conviction. However, as Ross has pointed out, the danger of falsity can be there. Therefore, he stresses on the refinement of feeling through mimesis, which is observation and practice of those who can be relied on for knowledge of truth. This, obviously, calls for the openness and boldness to change on finding the convictions refuted by experience.
In conclusion, it may be said that Ross’ epistemology is very much of subjective experientialism. Though it is true that one’s experience can never be refuted by another, it still stands whether someone’s experience can comprise reason enough for another to rely on it. According to Ross, the answer is ‘yes’, if pragmatically satisfaction is visible, and this to the extent that mimesis of it becomes justified. For instance, a son sees his father walking and imitates in order to learn walking; he imitates the experience of his father to become an insider of the experience. Similarly, faith in God as demonstrated in a community life of moral righteousness, devotion, generosity, and other facets of religious life can be experienced through mimesis.
However, what about the possibility of being led into the wrong belief through such imitation? Ross answers that still this does not undermine the value of the social institution as a source of knowledge. Accordingly, a ‘social system that hands along truths about food and mixed truths and errors about health and how to live, and superstitions about God and “science”, might do perfectly well to hand along an improved product.’ In other words, there is no social institution or tradition that can lay claim to perfection in all fields of knowledge. Disagreements among sects over doctrinal points, within the major religions, are ample proof of it. However, some products have only one source and the only way to test the workability of the product is by ‘becoming an initiate and making it work.’ Thus, one can only experience the power of God’s love in Jesus Christ by saying ‘yes’ to the Gospel of Christ. There is no alternative source to it. Practice and experience itself justifies belief.
Though incapable of providing an absolute and standard test for truth, Ross’ cognitive voluntarism does demonstrate the relativity of rational certainty. The star over Bethlehem was proof of Royal birth to the Magi; it might have not been so to many others. The miracles of Jesus were proof of His divine authority to Nicodemus; it might not have been to some others. Proofs and demonstrations are only relatively significant; often, they follow faith. Thus, rational certainty is more a subjective issue. Moreover, Ross’ grounding of rational certainty on the will to believe is a significant step. He has also showed that the will to believe is prompted by the inner urge, feeling, and passion for sense and meaning in life. The existential motif, thus, can also be seen in Ross. Thus, cognitive voluntarism attempts to put faith and feeling into their proper place in the noetic event. This, however, is done at the expense of any absolute criteria for truth. The only reference point is the will. Will is prompted by feelings and wants that act as convictors. Thus, truth is more a matter of the subjective will than of objective reality. But, Ross is at least right in saying that in matters of ultimate value, that is, in convictions that go beyond data to infuse life with meaning, one cannot let go his convictions unless they are directly contradicted by experience and replaceable with some other hypotheses that seem to be more reliable. Thus, a Christian cannot throw away his belief in Jesus Christ, since it not only infuses his life with meaning but he also doesn’t find it refuted by experience. However, even if it is refuted by experience, he will not cast that belief out unless it is replaceable by some other more reliable belief; he cannot do so because the will to believe urged by the infinite passion within cannot rest calm without finding some source of satisfaction. Thus, faith is rehabilitated in cognitive voluntarism.
[1] James Ross, “Reason and Reliance: Adjusted Prospects for Natural Theology”, June 1990 (
[2] Ibid.
[3] Ibid.
[4] Ibid.
[5] Ibid.
[6] Ibid.
[7] Ibid.
[8] William James, “The Will to Believe,” Philosophy of Religion, 2nd edn. (ed. John Hick; Englewood Cliffs: Prentice-Hall, Inc., 1970), p.219
[9] Ibid, p. 228
[10] Ibid, p. 230
[11] Ibid, p. 229
[12] James Ross, “Reason and Reliance: Adjusted Prospects for Natural Theology”, June 1990 (
No comments :
Post a Comment |
global_05_local_5_shard_00002591_processed.jsonl/25584 | Seeing as that last fic was the first time recently I’ve used the extended eldraeic name-format – or at least its most common version, since various cultures do it differently in some places and times, but this is the one that doubles as the modern International Standard – let’s talk about names and their parts a little:
Elyse Adae-ith-Atridae isil-Cyprium-ith-Avalae Erinlochos, ion-Tiryn, iel-Airin, mis-Eliéra-en-Palar
Personal name/forename. Works just like ours. It’s often followed by a persona-identifier, which describes who you are relative to the entire identity described by the name, but at the time and place of “Slowly Awakening“, there’s only one of Elyse, and bothering to identify herself as “Elyse Prime” when there aren’t any parallel forks (“Elyse Secundus”, “Elyse Tertius”, etc.) or partial forks or other more complex multiplex identities in play would be less than pointful.
Family-of-descent name. The format in question is House-ith-Lineage, where lineage is a subset of a House. (If you think of them as septs of a clan, that’s not too far off.) It can also be collapsed when they happen to be the same (the founding line of most of the Houses bears the same lineage name as the House name), in which case you can shorten, say, “Claves-ith-Claves” to just “Claves”, but in this case, being of the Atridae lineage of House Adae, Elyse needs to use the full format.
Family-of-marriage name, i.e., the House and lineage name of one’s spouse’s family. Same format, with an isil- prefix in front of it. This arrangement is fully reciprocal in all cases, so, for example, her wife’s name is therefore “Calcíë Cyprium-ith-Avalae isil-Adae-ith-Atridae”. (Those in marriages of other topologies than dyads would include all of their spice’s House-and-lineage names here – yes, this can get quite long. There is also an alternate format for those special lengthy cases in which you give your marriage a name, in much the same way as other corporate entities have their own names.)
Attributive name. Covers the whole territory of formalized nicknames, titles, office-names, pen-names, and dozens of other things; most people have more than a few of them. Most importantly, which one you choose to use is important because it tells people which of the people you are you are being right now, which is something that Imperial etiquette requires you to manage to a nicety. You are supposed to keep the proper set of Chinese walls in your head and indicators in your speech such that on a family-owned tramp trader, for example, the same two people will always know whether they are having a conversation as captain-and-mate, or husband-and-wife, or business-partner-and-business-partner, etc., etc., and act accordingly.
Which they find much superior to accepting the confusion, fuzzy boundaries and fraternization regulations that we use to patch over the same set of issues.
Patronymic and matronymic. (You can use full names, but you aren’t obliged to and usually don’t need to.) Reasonably glosses as “fathered by Tiryn, mothered by Airin”, or “out of Airin by Tiryn”, depending on your personal taste. An optional component if further identification is necessary than the rest of your name provides; customarily, women cite matronymics and men, patronymics – because that works best for identity-narrowing given that the custom is also that daughters are counted in their father’s House and lineage and sons in their mother’s – but either has the option of citing both, which is what Elyse does here.
Loconymic. Where you’re from – it’s actually where you consider yourself from, which is not necessarily where you live or where you were born or where you grew up (although it can be any of these; Elyse uses the last of those, although they live on Galíné, which is an outer-system gas giant moon in the same system). In the original, ancient system, it would just have been mis-Location, but in these days in which the Empire sprawls over multiple worlds, it’s become mis-Planet-en-Location, just to make it easier for people to keep track.
There are, of course, plenty more optional components, but let’s worry about those when they come up, shall we? |
global_05_local_5_shard_00002591_processed.jsonl/25590 | Always 25% off when you purchase 4 or more items
Coffee and Friends Perfect Blend SVG, Coffee Saying SVG File, Coffee Quote SVG, Friends Coffee Saying Cut File
COFFEE SVG FILE. This Coffee SVG file has such a sweet coffee saying. Make the perfect coffee mug for a bestie with this custom coffee quote! You could also use this Coffee SVG to make the perfect wooden sign or tile sign to decorate your kitchen or dining room! Have a Yeti tumbler? Use your Cricut or Silhouette, this Coffee SVG file, and some vinyl to dress that tumbler up!
This is a digital file. You will receive one Coffee SVG file and one JPEG file of the same image.
They will be delivered as one Coffee ZIP file. Please be sure you have the ability to open this file type.
YOU MAY use this Coffee SVG file to embellish items that you sell through your small business. YOU MAY NOT, in any way, resell this Coffee SVG in it's original or altered digital format. |
global_05_local_5_shard_00002591_processed.jsonl/25596 |
Open-source-software movement
From EverybodyWiki Bios & Wiki
The open-source-software movement is a movement that supports the use of open-source licenses for some or all software, a part of the broader notion of open collaboration.[1] The open-source movement was started to spread the concept/idea of open-source software. Programmers who support the open-source-movement philosophy contribute to the open-source community by voluntarily writing and exchanging programming code for software development.[2] The term "open source" requires that no one can discriminate against a group in not sharing the edited code or hinder others from editing their already-edited work. This approach to software development allows anyone to obtain and modify open-source code. These modifications are distributed back to the developers within the open-source community of people who are working with the software. In this way, the identities of all individuals participating in code modification are disclosed and the transformation of the code is documented over time.[3] This method makes it difficult to establish ownership of a particular bit of code but is in keeping with the open-source-movement philosophy. These goals promote the production of high-quality programs as well as working cooperatively with other similarly-minded people to improve open-source technology.[2]
Brief history[edit]
The label "open source" was created and adopted by a group of people in the free-software movement at a strategy session[4] held at Palo Alto, California, in reaction to Netscape's January 1998 announcement of a source-code release for Navigator. One of the reasons behind using the term was that "the [advantage] of using the term open source [is] that the business world usually tries to keep free technologies from being installed."[5] Those people who adopted the term used the opportunity before the release of Navigator's source code to free themselves of the ideological and confrontational connotations of the term "free software". Later in February 1998, Bruce Perens and Eric S. Raymond founded an organization called Open Source Initiative (OSI) "as an educational, advocacy, and stewardship organization at a cusp moment in the history of that culture."[6]
In the beginning, a difference between hardware and software did not exist. The user and programmer of a computer were one and the same. When the first commercial electronic computer was introduced by IBM in 1952, the machine was hard to maintain and expensive. Putting the price of the machine aside, it was the software that caused the problem when owning one of these computers. Then in 1952, a collaboration of all the owners of the computer got together and created a set of tools. The collaboration of people were in a group called PACT (The Project for the Advancement of Coding techniques). After passing this hurdle, in 1956, the Eisenhower administration decided to put restrictions on the types of sales AT&T could make. This did not stop the inventors from developing new ideas of how to bring the computer to the mass population. The next step was making the computer more affordable which slowly developed through different companies. Then they had to develop software that would host multiple users. MIT computation center developed one of the first systems, CTSS (Compatible Time-Sharing System). This laid the foundation for many more systems, and what we now call the open-source software movement.[7]
The open-source movement is branched from the free-software movement which began in the late 80s with the launching of the GNU project by Richard Stallman.[8] Stallman is regarded within the open-source community as sharing a key role in the conceptualization of freely-shared source code for software development.[3] The term "free software" in the free software movement is meant to imply freedom of software exchange and modification. The term does not refer to any monetary freedom.[3] Both the free-software movement and the open-source movement share this view of free exchange of programming code, and this is often why both of the movements are sometimes referenced in literature as part of the FOSS or "Free and Open Software" or FLOSS "Free/Libre Open-Source" communities.
These movements share fundamental differences in the view on open software. The main, factionalizing difference between the groups is the relationship between open-source and proprietary software. Often, makers of proprietary software, such as Microsoft, may make efforts to support open-source software to remain competitive.[9] Members of the open-source community are willing to coexist with the makers of proprietary software[3] and feel that the issue of whether software is open source is a matter of practicality.[10]
In contrast, members of the free-software community maintain the vision that all software is a part of freedom of speech[3] and that proprietary software is unethical and unjust.[3] The free-software movement openly champions this belief through talks that denounce proprietary software. As a whole, the community refuses to support proprietary software. Further there are external motivations for these developers. One motivation is that, when a programmer fixes a bug or makes a program it benefits others in an open-source environment. Another motivation is that a programmer can work on multiple projects that they find interesting and enjoyable. Programming in the open-source world can also lead to commercial job offers or entrance into the venture capital community. These are just a few reasons why open-source programmers continue to create and advance software.[11]
While cognizant of the fact that both, the free-software movement and the open-source movement, share similarities in practical recommendations regarding open source, the free-software movement fervently continues to distinguish themselves from the open-source movement entirely.[12] The free-software movement maintains that it has fundamentally different attitudes towards the relationship between open-source and proprietary software. The free-software community does not view the open-source community as their target grievance, however. Their target grievance is proprietary software itself.[3]
Legal issues[edit]
The open-source movement has faced a number of legal challenges. Companies that manage open-source products have some difficulty securing their trademarks. For example, the scope of "implied license" conjecture remains unclear and can compromise an enterprise’s ability to patent productions made with open-source software. Another example is the case of companies offering add-ons for purchase; licensees who make additions to the open-source code that are similar to those for purchase may have immunity from patent suits.
In the court case "Jacobsen v. Katzer", the plaintiff sued the defendant for failing to put the required attribution notices in his modified version of the software, thereby violating license. The defendant claimed Artistic License in not adhering to the conditions of the software’s use, but the wording of the attribution notice decided that this was not the case. "Jacobsen v Katzer" established open-source software’s equality to proprietary software in the eyes of the law.
In a court case accusing Microsoft of being a monopoly, Linux and open-source software was introduced in court to prove that Microsoft had valid competitors and was grouped in with Apple.
There are resources available for those involved open-source projects in need of legal advice. The Software Freedom Law Center features a primer on open-source legal issues. International Free and Open Source Software Law Review offers peer-reviewed information for lawyers on free-software issues.
The Open Source Initiative (OSI) was instrumental in the formalization of the open-source movement. The OSI was founded by Eric Raymond and Bruce Perens in February 1998 with the purpose of providing general education and advocacy of the open-source label through the creation of the Open Source Definition that was based on the Debian Free Software Guidelines. The OSI has become one of the main supporters and advocators of the open-source movement.[6]
In February 1998, the open-source movement was adopted, formalized, and spearheaded by the Open Source Initiative (OSI), an organization formed to market software "as something more amenable to commercial business use"[3] The OSI owns the trademark "Open Source"[2] The main tool they adopted for this was The Open Source Definition.[13]
The open-source label was conceived at a strategy session that was held on February 3, 1998 in Palo Alto, California and on April 8 of the same year, the attendees of Tim O’Reilly’s Free Software Summit voted to promote the use of the term "open source".[6]
Overall, the software developments that have come out of the open-source movement have not been unique to the computer-science field, but they have been successful in developing alternatives to propriety software. Members of the open-source community improve upon code and write programs that can rival much of the propriety software that is already available.[3]
The rhetorical discourse used in open-source movements is now being broadened to include a larger group of non-expert users as well as advocacy organizations. Several organized groups such as the Creative Commons and global development agencies have also adopted the open-source concepts according to their own aims and for their own purposes.[14]
The factors affecting the open-source movement’s legal formalization are primarily based on recent political discussion over copyright, appropriation, and intellectual property.[15]
• The collaborative nature of the open-source community creates software that can offer customizability and, as a result, promotes the adoption of its products.[16]
• The open-source community promotes the creation of software that is not proprietary, resulting in lower costs.[16]
• Individuals who have intrinsic interest in code writing and software creation motivate the development of open-source software within the community. This differs from proprietary software, the development of which is often motivated through potential monetary gains.[16]
• An open-source tool puts the system administrator in control of the level of risk assumed in deploying the tool.[17]
• Open-source licenses and software can be combined with proprietary software. While open source was initially seen as a threat to corporations, some companies found ways to strengthen their proprietary code with open-source code, re-releasing it as an improvement.[18]
• In the event of market failure, programmers and innovators work together to make sure that the software still works[19]
• Globalization of Market
The open-source movement has allowed smaller businesses to participate in the global economy. Before, smaller businesses did not have access to the software needed to participate or compete in the global market. It was the larger corporations, the producers of the networks and software who had the power. "That is, individuals who have access to the software needed to create, organize, or distribute content can plug into and participate in the global community".[20] The creation of the open-source movement has created "a degree of global computing access that might have been unthinkable in a world where proprietary was the only option."[20] Individuals or organizations with access to an open source had the means needed to develop technical material for a variety of consumers. The open-source movement created equal opportunities for people all over the world to participate in the global economy.
Members of the open-source movement stress the importance of differentiating between open-source software and free software. Although the two issues are related, they are quite different. The open-source movement and the free-software movement are different, but they work together. Both movements strive for freedom of the Internet and dislike the idea of ownership over a website.[21] For both open-source and free software, one can find the source code and executable component easily and for free online. The largest difference is that free software requires any changes to be submitted to the original maker for redistribution, and any derivative software must also be distributed as free software. This is mainly to keep companies from making minor changes to free software and redistributing it as their own, for a price.[22]
A major advantage to open-source code is the ability for a variety of different people to edit and fix problems and errors that have occurred. Naturally, because there are more people who can edit the material, there are more people who can help make the information more credible and reliable. The open-source mission statement promises better quality, higher reliability, more flexibility, lower cost, and an end to predatory vendor lock-in. They stress the importance of maintaining the Open Source Definition. This trademark creates a trusted group that connects all users and developers together.[23] To fully understand the Open Source Definition, one must understand certain terms: Free redistribution means that there is no restriction on any party to sell or give away the software to third parties. Source Code means that the program must efficiently publicize the means of obtaining the source code. Derived works means that the program must allow certain works to be distributed under the same terms. There must be a promise of no discriminating against any certain persons or groups. All of these factors allow for the open-source movement to become available to all and easy to access, which is their overall mission. The latest updates from the Open Source Institution took place on January 19, 2011: The OSI collaborated with the Free Software Foundation and together they updated a version of the request that they have sent to the US Department of Justice.[24]
• The structure of the open-source community requires that individuals have programming expertise in order to engage in open-code modification and exchange. Individuals interested in supporting the open-source movement may lack this skill set, but there are many other ways of contributing.[3]
• Programmers and developers comprise a large percentage of the open-source community and sought-out technical support and/or documentation may not be useful or clear to open-source software lay-users.[16]
• The structure of the open-source community is one that involves contributions of multiple developers and programmers; software produced in this fashion may lack standardization and compatibility with various computer applications and capabilities.[16]
• Production can be very limited. Programmers that create open-source software often can turn their attention elsewhere very quickly. This opens the door for many bug-filled programs and applications out there. Because no one is paid to create it, many projects are never completed.[25]
• In the open-source industry, the user decides the quality of the software. A user must learn the skills of software creation independently and then make the appropriate determinations for quality and capabilities.[26]
• Librarians may not be equipped to take on this new responsibility of technologies.[27]
• There is no guarantee that development will happen. It is unknown if an open-source project will become usable, especially when a project is started without significant support from one or more organizations. Even if the project does reach a usable stage, it is possible the project can die if there is not enough funding or interest toward it.
• It is sometimes difficult to know that a project exists, and its current status. Especially for open-source projects without significant support, there is not much advertising involved in open-source software.
• The amount of support for an open-source project varies highly. The available support for open-source software is predominantly self-motivated discussions found on the Internet, sometimes moderated by a core group of contributors. The amount of documentation or guides for an open-source project also varies highly. More popular or company-backed projects often have more detailed and maintained documentation. However, as open-source projects are regularly changing, documentation can easily fall out of date.
• There is no guarantee of updates. Although open-source software is available to anyone for free, regular updates are not assured since users do not pay for its use.
• Beyond the obvious detriments towards the theoretical success of open-source software, there are several factors that contribute to the lack of long-term success in open-source projects. One of the most obvious drawback is that without pay or royalty licensing, there is little financial incentive for a programmer to become involved with a project in the first place, or to continue development and support once the initial product is released. This leads to innumerable examples of well-anticipated software being forever condemned to beta versions and unsupported early model products. With donations as the only source of income for a truly open-source (and GPL-licensed) project, there is almost no certainty in the future of the project simply because of developer abandonment, making it a poor choice for any sort of application in which future versions, support and a long-term plan would be essential, as is the case for most business software.[28]
• Organizations with enterprise agreements still pay licensing agreements even if they choose to run alternative open-source software. Therefore, many organizations are unlikely to consider using alternative products. As a cost-saving method of using Microsoft products, many large corporations use enterprise agreements and therefore pay a single company wide IT licensing fee, at lower cost per product. "Organizations with EAs that are interested in alternative products can benefit from the gap-filler scenario, but only after they drop Microsoft Office from their EA at the next renewal and final true-up."[29]
Motivations of programmers[edit]
With the growth and attention on the open-source movement, the reasons and motivations of programmers for creating code for free has been under investigation. In a paper from the 15th Annual Congress of the European Economic Association on the open-source movement, the incentives of programmers on an individual level as well as on a company or network level were analyzed. What is essentially the intellectual gift giving of talented programmers challenges the "self-interested-economic-agent paradigm,"[30] and has made both the public and economists search for an understanding of what the benefits are for programmers.
• Altruism: The argument for altruism is limited as an explanation because though some exists, the programmers do not focus their kindness on more charitable causes.[citation needed] If the generosity of working for free was a viable motivation for such a prevalent movement, it is curious why such a trend has not been seen in industries such as biotechnology that would have a much bigger impact on the public good.[30]
• Community sharing and improvement: The online community is an environment that promotes continual improvements, modifications, and contributions to each other's work. A programmer can easily benefit from open-source software because by making it public, other testers and subprograms can remove bugs, tailor code to other purposes, and find problems. This kind of peer-editing feature of open-source software promotes better programs and a higher standard of code.[30]
• Recognition: Though a project may not be associated with a specific individual, the contributors are often recognized and marked on a project's server or awarded social reputation. This allows for programmers to receive public recognition for their skills, promoting career opportunities and exposure. In fact, the founders of Sun Microsystems and Netscape began as open-source programmers.[30]
• Ego: "If they are somehow assigned to a trivial problem and that is their only possible task, they may spend six months coming up with a bewildering architecture...merely to show their friends and colleagues what a tough nut they are trying to crack."[31] Ego-gratification has been cited as a relevant motivation of programmers because of their competitive community.[31] An OSS (open-source software) community has no clear distinction between developers and users, because all users are potential developers. There is a large community of programmers trying to essentially outshine or impress their colleagues.[32] They enjoy having other programmers admire their works and accomplishments, contributing to why OSS projects have a recruiting advantage for unknown talent than a closed-source company.[31]
Gender diversity of programmers[edit]
The vast majority of programmers in open-source communities are male. In a study for the European Union on free and open-source software communities, researchers found that only 1.5% of all contributors are female.[34] Although women are generally underrepresented in computing, the percentage of women in tech professions is actually much higher, close to 25%.[35] This discrepancy suggests that female programs are overall less likely than male programmers to participate in open-source projects.
Some research and interviews with members of open-source projects have described a male-dominated culture within open-source communities that can be unwelcoming or hostile towards females.[36] There are an initiatives such as Outreachy that aim to support more women and other underrepresented gender identities to participate in open-source software. However, within the discussion forums of open-source projects the topic of gender diversity can be highly controversial and even inflammatory.[36] A central vision in open-source software is that because the software is built and maintained on the merit of individual code contributions, open-source communities should act as a meritocracy.[37] In a meritocracy, the importance of an individual in the community depends on the quality of their individual contributions and not demographic factors such as age, race, religion, or gender. Thus proposing changes to the community based on gender, for example, to make the community more inviting towards females, go against the ideal of a meritocracy by targeting certain programmers by gender and no based on their skill alone.[36]
There is evidence that gender does impact a programmer’s perceived merit in the community. A 2016 study identified the gender of over one million programmers on GitHub, by linking the programmer’s GitHub account to their other social media accounts.[38] Between male and female programmers, the researchers found that female programmers were actually more likely to have their pull requests accepted into the project than male programmers, however only when the female had a gender-neutral profile. When females had profiles with a name or image that identified them as female, they were less likely than male programmers to have their pull requests accepted. Another study in 2015 found that of open-source projects on GitHub, gender diversity was a significant positive predictor of a team's productivity, meaning that open-source teams with a more even mix of different genders tended to be more highly productive.[37]
Evidence of open-source adoption[edit]
Libraries are using open-source software to develop information as well as library services. The purpose of open source is to provide a software that is cheaper, reliable and has better quality. The one feature that makes this software so sought after is that it is free. Libraries in particular benefit from this movement because of the resources it provides. They also promote the same ideas of learning and understanding new information through the resources of other people. Open source allows a sense of community. It is an invitation for anyone to provide information about various topics. The open-source tools even allow libraries to create web-based catalogs. According to the IT source there are various library programs that benefit from this.[27]
Government agencies and infrastructure software — Government Agencies are utilizing open-source infrastructure software, like the Linux operating system and the Apache Web-server into software, to manage information.[39] In 2005, a new government lobby was launched under the name National Center for Open Source Policy and Research (NCOSPR) "a non-profit organization promoting the use of open source software solutions within government IT enterprises."[40]
Open-source movement in the military — Open-source movement has potential to help in the military. The open-source software allows anyone to make changes that will improve it. This is a form of invitation for people to put their minds together to grow a software in a cost efficient manner. The reason the military is so interested is because it is possible that this software can increase speed and flexibility. Although there are security setbacks to this idea due to the fact that anyone has access to change the software, the advantages can outweigh the disadvantages. The fact that the open-source programs can be modified quickly is crucial. A support group was formed to test these theories. The Military Open Source Software Working Group was organized in 2009 and held over 120 military members. Their purpose was to bring together software developers and contractors from the military to discover new ideas for reuse and collaboration. Overall, open-source software in the military is an intriguing idea that has potential drawbacks but they are not enough to offset the advantages.[41]
Open source in education — Colleges and organizations use software predominantly online to educate their students. Open-source technology is being adopted by many institutions because it can save these institutions from paying companies to provide them with these administrative software systems. One of the first major colleges to adopt an open-source system was Colorado State University in 2009 with many others following after that. Colorado State Universities system was produced by the Kuali Foundation who has become a major player in open-source administrative systems. The Kuali Foundation defines itself as a group of organizations that aims to "build and sustain open-source software for higher education, by higher education." There are many other examples of open-source instruments being used in education other than the Kuali Foundation as well.[42]
"For educators, The Open Source Movement allowed access to software that could be used in teaching students how to apply the theories they were learning".[43] With open networks and software, teachers are able to share lessons, lectures, and other course materials within a community. OpenTechComm is a program that is dedicated to "open access, open use, and open edits- text book or pedagogical resource that teachers of technical and professional communication courses at every level can rely on to craft free offerings to their students."[44] As stated earlier, access to programs like this would be much more cost efficient for educational departments.
Open source in healthcare — Created in June 2009 by the nonprofit eHealthNigeria, the open-source software OpenMRS is used to document health care in Nigeria. The use of this software began in Kaduna, Nigeria to serve the purpose of public health. OpenMRS manages features such as alerting health care workers when patients show warning signs for conditions and records births and deaths daily, among other features. The success of this software is caused by its ease of use for those first being introduced to the technology, compared to more complex proprietary healthcare software available in first world countries. This software is community-developed and can be used freely by anyone, characteristic of open-source applications. So far, OpenMRS is being used in Rwanda, Mozambique, Haiti, India, China, and the Philippines.[45] The impact of open source in healthcare is also observed by Apelon Inc, the "leading provider of terminology and data interoperability solutions". Recently, its Distributed Terminology System (Open DTS) began supporting the open-source MySQL database system. This essentially allows for open-source software to be used in healthcare, lessening the dependence on expensive proprietary healthcare software. Due to open-source software, the healthcare industry has available a free open-source solution to implement healthcare standards. Not only does open source benefit healthcare economically, but the lesser dependence on proprietary software allows for easier integration of various systems, regardless of the developer.[46]
Microsoft — Before summer of 2008, Microsoft has generally been known as an enemy of the open-source community[citation needed]. The company’s anti-open-source sentiment was enforced by former CEO Steve Ballmer, who referred to Linux, a widely-used open-source software, as a "malignant cancer". Microsoft also threatened Linux that they would charge royalties for violating 235 of their patents. In 2004, Microsoft lost a European Union court case,[47] and lost the appeal in 2007,[48] and their further appeal in 2012:[49] being convicted of abusing its dominant position. Specifically they had withheld inter-operability information with the open source Samba (software) project, which can be run on many platforms and aims to "removing barriers to interoperability". In 2008, however, Sam Ramji, the then head of open-source-software strategy in Microsoft, began working closely with Bill Gates to develop a pro-open-source attitude within the software industry as well as Microsoft itself. Ramji, before leaving the company in 2009, built Microsoft's familiarity and involvement with open source, which is evident in Microsoft's contributions of open-source code to Windows Azure, "its new-age web service for building and hosting applications on the net", among other projects. These contributions would have been previously unimaginable by Microsoft.[50] Microsoft’s change in attitude about open source and efforts to build a stronger open-source community is evidence of the growing adoption and adaption of open source.[51][52]
See also[edit]
Other articles of the topic Free software : RandR, Selective file dumper, wmii, Pigment (software), Android (operating system), GNU Interpreter for Java, Devcoin
• Commons-based peer production
• Digital rights
• Diversity in open-source software
• Framasoft
• Free and open-source software
• Free software movement
• Free software
• List of free and open-source software packages
• List of open-source hardware projects
• Mass collaboration
• Open-design movement
• Open-source model
• Open-source appropriate technology
• Open-source hardware
• Open-source governance
• Open-source architecture
• Open-source film
• Open Source Ecology
• Sharing economy
• P2P economic system
• Peer production
• The Virtual Revolution
2. 2.0 2.1 2.2 Wyllys, R.E. (2000). Overview of the Open-Source Movement. Retrieved November 22, 2009, from The University of Texas at Austin Graduate School of Library & Information Science
3. 3.0 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 Warger, T. (2002)The Open Source Movement Archived 2011-07-17 at the Wayback Machine. Retrieved November 22, 2009, from Education Resources Information Center
4. Tiemann, Michael (September 19, 2006). "History of the OSI". Open Source Initiative. Retrieved August 23, 2008.
5. A Brief History of the Open-Source Movement. Sloanreview.mit.edu (2011-11-18). Retrieved on 2011-11-30.
6. 6.0 6.1 6.2 History of the OSI | Open Source Initiative. Opensource.org. Retrieved on 2011-11-30.
7. Weber, Steven. The Success of Open Source. The President and Fellows of Harvard College. 2004. Print pg.20–28. ISBN 9780674018587 Search this book on Amazon.com Logo.png. This whole paragraph is referenced to Steven Weber
8. Tennant, D. (2008, August 11). Standing on Principle. Computerworld, p. 4. Retrieved from Business Source Premier database.
9. Taft, D. K. (2009, November 3). Microsoft Recommits to $100k Apache Contribution at ApacheCon. Retrieved November 22, 2009 from eWeek
10. Elliott, M. S.; Scacchi, Walt (2008). "Mobilization of software developers: The free software movement". Information Technology & People. 21 (1): 4. doi:10.1108/09593840810860315.
11. Lerner, Josh; Tirole, Jean (March 2000). "The simple Economics of Open Source" (PDF). Cambridge, MA.: National Bureau of Economic Research. CiteSeerX
12. Stallman, R. M. (2007). Why "Free Software" is better than "Open Source". Retrieved November 22, 2009, from GNU.org
13. The Open Source Definition | Open Source Initiative. Opensource.org. Retrieved on 2011-11-30.
14. Sullivan, J (2011). "Free, open source software advocacy as a social justice movement: The expansion of f/oss movement discourse in the 21st century". Journal of Information Technology and Politics. 8 (3).
15. Ceraso, A.; Pruchnic, J. (2011). "Introduction: Open source culture and aesthetics". Criticism. 53 (3): 337. doi:10.1353/crt.2011.0026.
16. 16.0 16.1 16.2 16.3 16.4 Webb, M. (2001, July 18). Going With Open Source Software Archived 2009-03-09 at the Wayback Machine. Retrieved November 22, 2009, from techsoup
17. 17.0 17.1 The Benefits of Open Source. Albion.com. Retrieved on 2011-11-30.
18. Fosfuri, Andrea; Giarratana, Marco; Luzzi, Alessandra. "The Penguin Has Entered the Building: The Commercialization of Open Source Software Products". Organization Science. Retrieved 6 February 2012.
19. von Hippel, Eric. "Open Source Software and the "Private-Collective" Innovation Model: Issues for Organization Science". Organization Science. INFORMS: Institute for Operations Research. Retrieved 6 February 2012.
20. 20.0 20.1 Kirk St.Amant & Brian D. Ballentine (http://0-web.ebscohost.com.sculib.scu.edu/ehost/detail?sid=7f13174d-c614-4ff9-a68d-b5336a49c866%40sessionmgr14&vid=7&hid=25)
21. Elliott, Margaret S. "Institute for Software Research". University of California. Retrieved 2012-06-01.
22. West, Joel. "How open is open enough?: Melding proprietary and open source platform strategies". Research Policy. Elsevier B.V. 32: 1259–1285. doi:10.1016/S0048-7333(03)00052-0. Retrieved 6 February 2012.
23. Poynder, R. (n.d.). IT Feature: The Open Source Movement. Information Today, Inc.. Retrieved January 25, 2011
24. Wyllys, R. (n.d.). Overview of the Open-Source Movement. UT School of Information – Home Page. Retrieved January 25, 2011
25. "Advantages and Disadvantages of Open Source Software". Archived from the original on 2012-01-10.. Software Company. Retrieved on 2011-11-30.
26. Golden, Bernard. Succeeding with Open Source. Pearson Education. 2005 ISBN 9780321268532 Search this book on Amazon.com Logo.png.
27. 27.0 27.1 Poynder, Richard (2001). "The Open Source Movement". Information Today. 8 (9).
28. Going With Open Source Software. Techsoup.org (2001-07-18). Retrieved on 2011-11-30.
29. [1]
30. 30.0 30.1 30.2 30.3 Lerner, Josh; Jean Tirole (9 May 2001). "The open source movement: Key research questions". European Economic Review. 45 (4–6): 819–826. doi:10.1016/S0014-2921(01)00124-6. Retrieved 7 February 2012.
31. 31.0 31.1 31.2 Greenspun, Philip. "Managing Software Engineers". Retrieved 7 February 2012.
32. Ye, Yunwen; Kouichi Kishida (3–10 May 2003). "Toward an Understanding of the Motivation of Open Source Software Developers" (PDF). International Conference of Software Engineering. Retrieved 7 February 2012.
33. Bonaccorsi, Andrea; Cristina Rossi (2003). "Why Open Source software can succeed". Open Source Software Development. 32 (7): 1243–1258. doi:10.1016/S0048-7333(03)00051-9.
34. Nafus, Dawn, James Leach, and Bernhard Krieger. "Gender: Integrated report of findings." FLOSSPOLS, Deliverable D 16 (2006).
35. Ashcraft, Catherine, Brad McLain, and Elizabeth Eger. "Women in tech: The facts." (2016).
36. 36.0 36.1 36.2 Nafus, Dawn. "‘Patches don’t have gender’: What is not open in open source software." New Media & Society 14, no. 4 (2012): 669-683.
37. 37.0 37.1 Vasilescu, Bogdan, Daryl Posnett, Baishakhi Ray, Mark GJ van den Brand, Alexander Serebrenik, Premkumar Devanbu, and Vladimir Filkov. "Gender and tenure diversity in GitHub teams." In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 3789-3798. ACM, 2015.
38. Terrell, Josh, Andrew Kofink, Justin Middleton, Clarissa Rainear, Emerson Murphy-Hill, Chris Parnin, and Jon Stallings. Gender differences and bias in open source: Pull request acceptance of women versus men. No. e1733v2. PeerJ Preprints, 2016.
39. Moore, J. (2008, August 14). A Starring Role for Open Source. Retrieved November 22, 2009, from Federal Computer Week: http://fcw.com/articles/2008/08/14/a-starring-role-for-open-source.aspx
40. Chris Preimesberger Open Source Movement Gets a Lobby. eWeek. 14 October 2005
41. Toon, John (2009). "Open Source Movement May Accelerate Military Software Development". Georgia Tech Research Institute. Retrieved 2011-12-21.
42. About. www.kuali.org. Retrieved on 2011-11-30.
43. St.Amant & Ballentine 2011 p.343
44. Still (http://0-web.ebscohost.com.sculib.scu.edu/ehost/pdfviewer/pdfviewer?sid=7f13174d-c614-4ff9-a68d-b5336a49c866%40sessionmgr14&vid=4&hid=25)
45. eHealthNigeria. (2012). eHealthNigeria: FAQs. Retrieved Feb 4, 2012
46. (2012, Jan 17). Apelon Announces Availability of a Completely Open Source Terminology Management Solution. Retrieved Feb 4, 2012
47. "Groklaw.net – The EU Microsoft Decision – December 2004". Retrieved 13 October 2014.
48. "Groklaw.net – EU Ct. of 1st Instance: Microsoft Abused its Dominant Position – Updated – September 2007". Retrieved 13 October 2014.
49. "Groklaw.net Microsoft Loses Its EU Appeal". Retrieved 13 October 2014.
50. Metz, Cade. (2012, Jan 30). Meet Bill Gates, the Man Who Changed Open Source Software. Retrieved Feb 4, 2012
51. Metz, Cade. (2011, Nov 4). How Microsoft Learned to Stop Worrying and (Almost) Love Open Source. Retrieved Feb 4, 2012
52. The Samba Team. (n.d). Samba: Opening Windows to a Wider World, What is Samba?. Retrieved Feb 4, 2012
Further reading[edit]
This article "Open-source-software movement" is from Wikipedia. The list of its authors can be seen in its historical. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one. |
global_05_local_5_shard_00002591_processed.jsonl/25600 | Filter press
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
M.W. Watermark 800mm Filter Press
M.W. Watermark 800mm Filter Press
An industrial filter press is a tool used in separation processes, specifically to separate solids and liquids. The machine stacks many filter elements and allows the filter to be easily opened to remove the filtered solids, and allows easy cleaning or replacement of the filter media.
Filter presses cannot be operated in a continuous process but can offer very high performance, particularly when low residual liquid in the solid is desired. Among other uses, filter presses are utilised in marble factories in order to separate water from mud in order to reuse the water during the marble cutting process.
Concept behind filter press technology[edit]
Generally, the slurry that will be separated is injected into the centre of the press and each chamber of the press is filled.[1] Optimal filling time will ensure the last chamber of the press is loaded before the mud in the first chamber begins to cake. As the chambers fill, pressure inside the system will increase due to the formation of thick sludge.[2] Then, the liquid is strained through filter cloths by force using pressurized air, but the use of water could be more cost-efficient in certain cases, such as if water was re-used from a previous process.
The first form of filter press was invented in the United Kingdom in 1853, used in obtaining seed oil through the use of pressure cells. However, there were many disadvantages associated with them, such as high labour requirement and discontinuous process. Major developments in filter press technology started in the middle of 20th century. In Japan in 1958, Kenichiro Kurita and Seiichi Suwa succeeded in developing the world's first automatic horizontal-type filter press to improve the cake removal efficiency and moisture absorption. Nine years later, Kurita Company began developing flexible diaphragms to decrease moisture in filter cakes. The device enables optimisation of the automatic filtration cycle, cake compression, cake discharge and filter-cloth washing leading to the increment in opportunities for various industrial applications.[3] A detailed historical review, dating back to when the Shang Dynasty used presses to extract tea from camellia the leaves and oil from the hips in 1600 BC, was compiled by K. McGrew.[4]
Types of filter presses[edit]
There are four main basic types of filter presses: plate and frame filter presses, recessed plate and frame filter presses, membrane filter presses and (fully) automatic filter presses.
Plate and frame filter press[edit]
A plate and frame filter press is the most fundamental design, and may be referred to as a "membrane plate filter." This type of filter press consists of many alternating plates and frames assembled with the supports of a pair of rails, with filter membranes inserted between each plate-frame pair.[5]
• Plates provide support to the filter membranes under pressure, and have narrow slots to allow the filtrate to flow through the membrane into the plate, then out into a collection system.
• Frames provide a chamber between the membranes and plates into which the slurry is pumped and the filter cake accumulates.
The stack is compressed with sufficient force to provide a liquid-tight seal between each plate and frame, the filter membrane may have an integrated seal around the edge or the filter material itself may act as a gasket when compressed.
As the slurry is pumped through the membranes, the filter cake accumulates and becomes thicker. The filter resistance increases as well, and the process is stopped when the pressure differential reaches a point where the plates are considered full enough.
To remove the filter cake and clear the filters, the stack of plates and frames are separated and the cake either falls off or is scraped from the membranes to be collected in a tray below.[6] The filter membranes are then cleaned using wash liquid and the stack is re-compressed ready to start the next cycle.[7]
M.W. Watermark Plate and Frame Filter Press
M.W. Watermark Plate and Frame Filter Press
An early example of this is the Dehne filter press, developed by A L G Dehne (1832–1906) of Halle, Germany, and commonly used in the late 19th and early 20th century for extracting sugar from sugar beet and from sugar cane, and for drying ore slurries. Its great disadvantage was the amount of labor involved in its operation.[8]
(Fully) Automatic filter press[edit]
An automatic filter press has the same concept as the manual filter and frame filter, except that the whole process is fully automated.[9] It consists of larger plate and frame filter presses with mechanical "plate shifters".[3] The function of the plate shifter is to move the plates and allow rapid discharge of the filter cakes accumulated in between the plates. It also contains a diaphragm compressor in the filter plates which aids in optimizing the operating condition by further drying the filter cakes.[3]
Fully automatic filter presses provide a high degree of automation while providing uninterrupted operation at the same time. The option of the simultaneous filter plate opening system, for example, helps to realise a particularly fast cake release reducing the cycle time to a minimum. The result is a high-speed filter press that allows increased production per unit area of filter. For this reason, these machines are used in applications with highly filterable products where high filtration speeds are required. These include, e.g. mining concentrates and residues. There are different systems for fully automatic operation. These include, e.g. the vibration/shaking devices, spreader clamp/spreader cloth version or scraping devices. The unmanned operating time of a fully automatic filter press is 24/7.
Recessed plate filter press[edit]
A recessed plate filter press does not use frames and instead has a recess in each plate with sloping edges in which the filter cloths lie, the filter cake builds up in the recess directly between two plates and when the plates are separated the sloping edges allow the cake to fall out with minimal effort.[10] To simplify construction and usage the plates typically have a hole through the centre, passing through the filter cloth and around which it is sealed so that the slurry flows through the centre of each plate down the stack rather than inward from the edge of each plate. Although easier to clean, there are disadvantages to this method, such as longer cloth changing time, inability to accommodate filter media that cannot conform to the curved recess such as paper, and the possibility of forming uneven cake.[11]
Membrane filter press[edit]
Membrane filter presses have a great influence on the dryness of the solid by using an inflatable membrane in the filter plates to compress remaining liquid from the filter cake before the plates are opened. Compared to conventional filtration processes, it achieves the lowest residual moisture values in the filter cake. This makes the membrane filter press a powerful and widely used system. Depending on the degree of dewatering, different dry matter contents (dry matter content – percentage by weight of dry material in the filter cake) can be achieved in the filter cake by squeezing with membrane plates. The range of achievable dry matter contents extends from 30 to over 80 percent. Membrane filter presses not only offer the advantage of an extremely high degree of dewatering; they also reduce the filtration cycle time by more than 50 percent on average, depending on the suspension. This results in faster cycle and turnaround times, which lead to an increase in productivity. The membrane inflation medium consists either of compressed air or a liquid medium (e.g. water).
Filter presses are used in a huge variety of different applications, from dewatering of mineral mining slurries to blood plasma purification.[7] At the same time, filter press technology is widely established for ultrafine coal dewatering as well as filtrate recovery in coal preparation plants. According to G.Prat, the "filter press is proven to be the most effective and reliable technique to meet today's requirement".[12] One of the examples is Pilot scale plate filter press, which is specialized in dewatering coal slurries. In 2013 the Society for Mining, Metallurgy and Exploration published an article highlighting this specific application.[13] It was mentioned that the use of the filter press is very beneficial to plant operations, since it offers dewatering ultraclean coal as product, as well as improving quality of water removed to be available for equipment cleaning.[14]
Other industrial uses for automatic membrane filter presses include municipal waste sludge dewatering,[15] ready mix concrete water recovery,[16] metal concentrate recovery, and large-scale fly ash pond dewatering.[17]
Many specialized applications are associated with different types of filter press that are currently used in various industries. Plate filter press is extensively used in sugaring operations such as the production of maple syrup in Canada, since it offers very high efficiency and reliability. According to M.Isselhardt, "appearance can affect the value of maple syrup and customer's perception of quality".[18] This makes the raw syrup filtration process extremely crucial in achieving desired product with high quality and appealing form, which again suggested how highly appreciated filter press methods are in industry.
Assessment of important characteristics[edit]
Here are some typical filter press calculation used for handling operation applied in waste water treatment:
Solids loading rate[edit]
S=(B x 8.34 lb/gal x s)A
S is the solid loadings rate in lb hft2.<r />
B is biosolids in galh
s is the % solids/ 100.
A is the plate area in ft2.
Net filter yield[edit]
• NFY is the net filter yield in kg/h/m2.
• S is the solids loadings rate in kg/h/m2.
• P is the period in h.
• TCT is the total cycle time in h.
(S × P) gives the filter run time.[19]
Flow rate of filtrate[edit]
• u is flow rate of filtrate through cloth and cake (m/s),
• dV/dt is volumetric filtration rate (m3/s),
• Rc is the resistance of the filter cake (m-1),
• Rf is the initial resistance of the filter (resistance of an initial layer of cake, filter cloths, plate and channel) (m-1),
• μ is the viscosity of the filtrate (N·s/m2),
• ΔP is the applied pressure difference (N/m2) one side to another side of the filter medium,
• A is the filtration area (m2).
Those are the most important factors that affect the rate of filtration. When filtrate pass through the filter plate, deposition of solids are formed and increases the cake thickness, which also increase Rc while Rf is assumed to be constant.[20] The flow resistance from cake and filter medium can be studied by calculating the flow rate of filtration through them.
If the flow rate is constant, the relationship between pressure and time can be obtained. The filtration must be operated by increasing pressure difference to cope with the increase in flow resistance resulting from pore clogging.[20] The filtration rate is mainly affected by viscosity of the filtrate as well as resistance of the filter plate and cake.
Optimum time cycle[edit]
High filtration rate can be obtained from producing thin cake. However, a conventional filter press is a batch system and the process must be stopped to discharge the filter cake and reassemble the press, which is time-consuming. Practically, maximum filtration rate is obtained when the filtration time is greater than the time taken to discharge the cake and reassemble the press to allow for cloth's resistance.[20] Properties of the filter cake affect the filtration rate, and it is desirable for the particle's size to be as large as possible to prevent pore blockage by using a coagulant. From experimental work, flow rate of liquid through the filter medium is proportional to the pressure difference.[21] As the cake layer forms, pressure applies to the system increases and the flow rate of filtrate decreases.[11] If the solid is desired, the purity of the solid can be increased by cake washing and air drying.[22] Sample of filter cake can be taken from different locations and weighed to determine the moisture content by using overall material balance.[13]
Possible heuristics to be used during design of the process[edit]
The selecting of filter press type depends on the value of liquid phase or the solid phase. If extracting liquid phase is desired, then filter press is among the most appropriate methods to be used.[23]
Nowadays, filter plates are made from polymers or steel coated with polymer. They give good drainage surface for filter cloths. The plate sizes are ranged from 10 by 10 cm to 2.4 by 2.4 m and 0.3 to 20 cm for the frame thickness.[22]
Filter medium[edit]
Typical cloth areas can range from 1 m2 or less on laboratory scale to 1000 m2 in a production environment, even though plates can provide filter areas up to 2000 m2. Normally, plate and frame filter press can form up to 50 mm of cake thickness, however, it can be push up to 200 mm for extreme cases. Recessed plate press can form up to 32 mm of cake thickness.[11]
In the early days of press use in the municipal waste biosolids treatment industry, issues with cake sticking to the cloth was problematic and many treatment plants adopted less effective centrifuge or belt filter press technologies. Since then, there have been great enhancements in fabric quality and manufacturing technology that have made this issue obsolete.[24] Unlike the US, automatic membrane filter technology is the most common method to dewater municipal waste biosolids in Asia. Moisture is typically 10-15% lower and less polymer is required—which saves on trucking and overall disposal cost.
Operating condition[edit]
The operating pressure is commonly up to 7 bars for metal.[22] The improvement of the technology makes it possible to remove large amount of moisture at 16 bar of pressure and operate at 30 bars.[7] However, the pressure is 4-5 bars for wood or plastic frames.[22] If the concentration of solids in the feed tank increase until the solid particles are attached to each other. It is possible to install moving blades in the filter press to reduce resistance to flow of liquid through the slurry.[25] For the process prior to cake discharge, air blowing is used for cakes that have permeability of 10−11 to 10−15 m2.[13]
Pre-treatment of the slurries before filtration is required if the solid suspension has settled down. Coagulation as pre-treatment can improve the performance of filter press because it increases the porosity of the filter cake leading to faster filtration. Varying the temperature, concentration and pH can control the size of the flocs. Moreover, if the filter cake is impermeable and difficult for the flow of filtrate, filter aid chemical can be added to the pre-treatment process to increase the porosity of the cake, reduce the cake resistance and obtain thicker cake. However, filter aids need to be able to remove from the filter cake either by physical or chemical treatment. A common filter aid is Kieselguhr, which give 0.85 voidage.[25]
In terms of cake handling, batch filter press requires large discharge tray size in order to contain large amount of cake and the system is more expensive compared to continuous filter press with the same output.[7]
There are two possible methods of washing that are being employed, the "simple washing" and the "thorough washing". For simple washing, the wash liquor flows through the same channel as the slurry with high velocity, causing erosion of the cakes near the point of entry. Thus the channels formed are constantly enlarged and therefore uneven cleaning is normally obtained. A better technique is by thorough washing in which the wash liquor is introduced through a different channel behind the filter cloth called washing plates. It flows through the whole thickness of the cakes in opposite direction first and then with the same direction as the filtrate. The wash liquor is normally discharged through the same channel as the filtrate. After washing, the cakes can be easily removed by supplying compressed air to remove the excess liquid.[22]
Nowadays filter presses are widely used in many industries, they would also produce different types of wastes. Harmful wastes such as toxic chemical from dye industries, as well as pathogen from waste stream might accumulate in the waste cakes; hence the requirement for treating those wastes would be different. Therefore, before discharge waste stream into the environment, application of post-treatment would be an important disinfection stage. It is to prevent health risks to the local population and the workers that are dealing with the waste (filter cakes) as well as preventing negative impacts to our ecosystem. Since filter press would produce large amount of waste, if it was to be disposed by land reclamation, it is recommended to dispose to the areas that are drastically altered like mining areas where development and fixation of vegetation are not possible. Another method is by incineration, which would destroy the organic pollutants and decrease the mass of the waste. It is usually done in a closed device by using a controlled flame.[6]
Advantages and disadvantages compared to other competitive methods[edit]
Batch filter press versus a continuous vacuum belt filter[edit]
Filter presses offer a wide range of application, one of its main propositions is the ability to provide a large filter area in a relatively small footprint. Surface area available is one of the most important dimensions in any filtering process, since it maximises filter flow rate and capacity. A standard size filter press offers a filter area of 216 m2, whereas a standard belt filter only offers approximately 15 m2.[26]
High-solids slurries: continuous pressure operation[edit]
Current development[edit]
1. ^ "SIEMENS. 2011. What is a Filter Press?".
2. ^ "Special Filter Presses".
3. ^ a b c "LASTA MC Mineral Concentrate Mining Presses and Dewatering Presses". Retrieved 21 April 2015.
4. ^ McGrew, Kent. "Historical Development of the Automated Filter Press" (PDF).
5. ^ "Filter Press Manufacturer & Supplier - Micronics, Inc". Micronics, Inc. Retrieved July 14, 2020.
6. ^ a b Von Sperling, M (January 2007). Biological Wastewater Treatment: Wastewater Characteristics Treatment and Disposal. IWA PUBLISHING. ISBN 9781843391616. Retrieved June 10, 2013.
7. ^ a b c d SUTHERLAND, K (2008). Filters and Filtration Handbook (5th ed.). Elsevier.
8. ^ "Last Tribute to a Kalgoorlie Mining Man". Western Mail. 61 (3, 240). Western Australia. 3 October 1946. p. 8. Retrieved 8 February 2019 – via National Library of Australia.
9. ^ "Tons Per Hour Product Guide" (PDF).
10. ^ EPA. "Biosolids technology fact sheet : Recessed-plate filter press, washington, D.C." Retrieved 05/10/13. Check date values in: |accessdate= (help)
11. ^ a b c Tarleton, E. S. W., R. J (2007). Solid/liquid separation - equipment selection and process design. Elsevier. ISBN 978-0-080-46717-7.
12. ^ Kilma, M. S.; Arnold, Barbara J.; Bethell, Peter J. (2012). Challenges in Fine Coal Processing, Dewatering, and Disposal (Chapter 10). Society for Mining, Metallurgy, and Exploration (SME). ISBN 978-0-87335-363-2. Retrieved 21 April 2015.
13. ^ a b c Kilma, M. S.; Arnold, Barbara J.; Munjack, J.; Barry, B. (2013). Application of a Pilot-Scale Plate Filter Press in Dewatering Coal Slurries. Society for Mining, Metallurgy and Exploration (SME). pp. 42–50. ISBN 978-1-62198-038-4.
14. ^ Lessard, Paul. "Filter Press Doubles Coal Production" (PDF).
15. ^ "Municipal Waste Dewatering with a Filter Press" (PDF).
16. ^ Lessard, Paul. "Concrete Ready Mix Wash-Out Water" (PDF).
17. ^ Lessard, Paul. "Large-Scale Fly Ash Pond Dewatering" (PDF).
18. ^ Isselhardt, M.; Williams, S.; Stowe, B.; Perkins, T. "Recommendations for Proper Plate Filter Press Operation" (PDF). Proctor Maple Research Center. University of Vermont Extension. Retrieved 21 April 2015.
19. ^ F.R. Spellman (2008). Handbook of water and waste water treatment plant operations (second ed.).
20. ^ a b c CHEREMISINOFF, N. P. (1998). Liquid Filtration (2nd ed.). Elsevier. ISBN 978-0-0805-1036-1.
21. ^ J H HARKER; J. R. B.; J.F. RICHARDSON. Coulson & Richardson Chemical Engineering Particle Technology & Separation Processes. Oxford, Butterworth-Heinemann. ISBN 0750644451.
22. ^ a b c d e Perry, R. H.; Green, D.W. (2008). Perry's Chemical Engineers' Handbook (8th ed.). pp. 2022, 2036, 2023.
23. ^ ALEJANDRO ANAYA DURAND; JOSSELINE ALARID MIGUEL; GABRIEL GALLEGOS DIEZ BARROSO; LEON GARCIA, M. A. J. P. S. A. (2006). Heuristics Rules for Process Equipment. Chemical Engineering. pp. 113, 44–47.
24. ^ "Jingjin Filter Cloth Manufacture and Quality Control".
25. ^ a b CHEREMISINOFF, N. P. (1998). Liquid Filtration (2nd ed.). Elsevier. ISBN 978-0-0805-1036-1.
27. ^ Teemu Kinnarinen, Teemu; Antti Häkkinen & Bjarne Ekberg (2013). "Steam Dewatering of Filter Cakes in a Vertical Filter Press". Steam Dewatering of Filter Cakes in a Vertical Filter Press, Drying Technology. 31 (10): 31:10, 1160–1169. doi:10.1080/07373937.2013.780246. |
global_05_local_5_shard_00002591_processed.jsonl/25601 | March 2019 North American blizzard
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
March 2019 North American Bomb Cyclone
Powerful Storm System Seen by GOES West (47380253391).png
The extratropical cyclone responsible for the blizzard over the Midwestern United States at 13:55 UTC (9:55 a.m. CDT) on March 13.
TypeExtratropical cyclone
Bomb cyclone
Ice storm
Winter storm
Tornado outbreak
FormedMarch 8, 2019
DissipatedMarch 16, 2019
Lowest pressure968 mb (28.59 inHg)
Tornadoes confirmed38
Max. rating1EF2 tornado
Duration of tornado outbreak22 days
Highest gust109 mph (175 km/h) at Grand Prairie Airport
Maximum snowfall or ice accretion52 inches (130 cm) at Wolf Creek pass, Colorado
Power outages140,000+
Areas affectedSouthwestern United States, Rocky Mountains, Great Plains, Central United States, Eastern United States, Eastern Canada
1Most severe tornado damage; see Enhanced Fujita scale
2Time from first tornado to last tornado
The March 2019 North American blizzard was a powerful Colorado Low that produced up to two feet of snow in the plains and Midwest. Rapid snowmelt following the storm caused historic flooding, and some areas received hurricane-force wind gusts. Comparable to the 1993 Storm of the Century,[1][2] the storm was labeled a bomb cyclone after barometric pressure readings dropped in excess of 24 mbar (0.71 inHg) over a 24-hour period.[3] After the storm entered Colorado from its origination in Arizona, the pressure dropped more than 30 mbar (0.89 inHg) and rapidly intensified over the western High Plains.[4] The severe storm set new all-time record low barometric pressure readings in Colorado, Kansas and New Mexico. The storm itself killed only one person in Colorado, but flooding caused by the storm killed at least 3, one in Iowa and at least two in Nebraska[5][6] and left ~140,000 without power in Texas.[7]
Meteorological history[edit]
The system originated from an extratropical low that developed in the Gulf of Alaska on March 8. Over the next two days, the system moved southeastward, bringing rainy and windy conditions to California on March 11, and the system was named "Winter Storm Ulmer" by The Weather Channel later that day, due to the storm's expected impacts. Early on March 12, the system moved onshore in Southern California, subsequently developing into a strong Colorado Low over the Southwestern United States. Late on March 12 through early March 13, the already-unusually strong Colorado low underwent explosive intensification, with the storm's minimum central pressure falling from 994 mbar (29.4 inHg) to 968 mbar (28.6 inHg) in roughly 16 hours, more than meeting the criteria for a weather bomb or "bomb cyclone" (a storm that undergoes a pressure drop of at least 24 mbar (0.71 inHg) in 24 hours[8]). The storm's tight pressure gradient allowed wind gusts in excess of 100 mph to develop in the Texas Panhandle. As the storm headed northward towards the Great Lakes, blizzard conditions were reported in several States, from Colorado all the way north into North Dakota and flooding hit the southern portions of those states. The storm also began weakening.[9]
United States[edit]
At least 1 million acres of U.S. farmland, in nine major grain producing states, were flooded after the storm.[10]
Damage, potentially from tornadoes, was reported in nine counties in the state. So far, damage has been linked to tornadoes in only three counties.[11]
The storm underwent explosive cyclogenesis as it tracked across the Southern Rocky Mountains.[8] Colorado experienced heavy snow and hurricane-force wind gusts from the blizzard, up to as much as 110 miles per hour (180 km/h).[8] 6 to 10 inches (150 to 250 mm) of snow was recorded in the Denver region with 20 in (510 mm) reported in Nederland, Colorado.[12] The storm brought wind gusts that exceeded Category 2 hurricane strength with gusts reaching 96 miles per hour (154 km/h) recorded at Peterson Air Force Base and a 92 mph (148 km/h) gust recorded in Glen Haven. A Category 1 force wind gust of 80 mph (130 km/h) was reported at Denver International Airport.[8][13] The combination of high winds and snowy conditions forced the cancellation of all flights in and out of Denver International Airport most of the day March 13th and a third of the flights scheduled for March 14th.[14] The rapid intensification of the storm over Colorado may have set a new all-time record low pressure record of 971.7 mbar (28.69 inHg) in La Junta, which is somewhat lower than the previous record for Colorado set in 1973 at 973.4 mbar (28.74 inHg).[4] Numerous vehicular accidents were reported with at least 1,000 people stranded on the highways, requiring rescue by the National Guard and emergency services providers. A Colorado State Patrol officer was killed by one driver who lost control of his vehicle on Interstate 76 northeast of Denver.[15]
The town of Lowell may have been impacted by a tornado. Nonetheless, a tornado warning was issued for part of the state.
Iowa was also affected by heavy rains and flooding, closing parts of all nine state parks. Iowa Governor Kim Reynolds signed an emergency disaster proclamation March 14th.[16] One man was killed in Iowa.[6] Flooding across Iowa was described as "catastrophic" especially in the Missouri River Valley south of Council Bluffs, Iowa. There, at least 30 levee failures flooded towns and highways. Interstate 29 was closed from Council Bluffs to the Missouri state border and from there to St. Joseph, Missouri, with portions of the interstate under 15 ft (4.6 m) of water.[17]
The state was affected by severe thunderstorms that produced several tornadoes. Most notably, an EF-2 spotted near West Paducah, strong enough to rip part of the roof off of the Mount Zion church. Other tornadoes were also spotted, one in Morgansfield and the other 7 miles north of Corydon.
Meteorologists were forecasting a record low barometric pressure reading as the storm passed over Kansas. The current record set in 1878 at 971.6 mbar (28.69 inHg) and the storm was forecast to have a slightly lower reading, the equivalent of a Category 2 Hurricane.[18] Dodge City, Kansas reported a new record low pressure.
Upwards of 70 buildings in Vernon were damaged by an EF2 tornado late on March 14th. Strong winds and flooding also affected the state.
The Spencer dam as seen in 2010 was destroyed by flooding waters of the Niobrara River
Western Nebraska experienced severe wind gusts and more than a foot of snow in some localities. A wind gust of 89 mph (143 km/h) was recorded in Hemingford, Nebraska and Interstate 80 was closed from Kearney, Nebraska to the Wyoming border. The Interstate 80 closure in Nebraska along with the portions closed in Wyoming spanned a distance of more than 500 miles (800 km).[19] In the eastern half of the state, rapidly melting snows along with frozen rivers caused record setting flooding in many rivers and streams. On the Niobrara River, the Spencer Dam collapsed and the unregulated flooding destroyed 3 bridges downstream including the Highway 281 bridge.[20] In east central Nebraska, residents along the flooded Missouri, Platte and Elkhorn Rivers were forced to evacuate as some locals experienced all-time record flooding. The city of Norfolk, Nebraska evacuated a third of its residents.[21] The Platte and Elkhorn Rivers had overflowed their levees in the greater Omaha, Nebraska region and some communities were put under a mandatory evacuation order. The Platte River at numerous sites had reached flooding of "historical proportions" with some sites breaking all-time record flood levels by as much as 5 feet (1.5 m).[22] By March 15, access to the city of Fremont was blocked due to all roads being closed in and out of the city.[23] This remained the case days later with national guard military convoys being set up to get food and other supplies into the city. Offutt Air Force Base had extensive flooding from the Platte River and 3,000 ft (910 m) of their only runway was covered in water while 30 buildings had been flooded.[24] As of March 18, 2 persons were reported to have drowned in Nebraska and 2 more are missing and presumed dead.[6] On March 18, Nebraska governor Pete Ricketts stated that the floods caused "the most extensive damage our state has ever experienced."[25] Losses from flooding in Nebraska alone exceeds $1.3 Billion, including $449 million in infrastructure damage, $440 million of crop damage, $400 million of lost cattle. More than 2,000 homes and 340 businesses were damaged or destroyed, costing the state another $85 million.[26]
In the central parts of Nebraska, large ice slabs were reported to have destroyed crops, and Sub-Zero conditions often hurt livestock. An additional round of Flooding is said to have wiped out some farms for years.[27]
New Mexico[edit]
A new all-time low barometric pressure reading for New Mexico was set in Clayton and wind gusts of 100 mph (160 km/h) were recorded in Cloudcroft, New Mexico.[28] In addition, powerful thunderstorms moving through the state spawned several tornadoes, damaging many homes.
A high wind warning was issued by the National Weather Service as thunderstorms with 50 mph (80 km/h) wind gusts downed power lines, tree branches, some fences, and caused other kinds of minor wind damage across Oklahoma City and its suburbs.[29]
South Dakota[edit]
The City of Pierre achieved full on blizzard conditions (frequent wind gusts above 35 mph/56 km/h producing visibility lower than 1/4 mile/400 metres for at least 3 hours). These conditions prompted the closure of the I-90 from Wall to Chamberlain. 18.3 inches (46 cm) of snow fell in Kadoka and winds gusted to 70 mph (112 km/h) in Rapid City.[30]
At San Augustin Pass and at Pine Springs, Texas wind gusts of 104 and 103 mph (167 and 166 km/h) respectively were recorded. At Grand Prairie's municipal airport, a wind gust of 109 mph (175 km/h) tore through, flipping several small airplanes.[31] Winds were great enough in the Texas panhandle to blow over numerous tractor-trailers.[28]
Blizzard conditions were reported for all of eastern Wyoming, especially in the southeastern sections of the state from Casper to the state capital in Cheyenne. Snowfalls in excess of one foot were recorded in several locations with wind gusts of 76 mph (122 km/h) in Carbon County. Both Interstate 25 and 80 were closed through most of the state.[32]
An additional snow squall moved across Southeast Wyoming Friday through Sunday, adding 1-2 inches of snow. Due to the location of the low, many areas were above freezing and had rain instead, which prompted the NWS to issue Flood watches and warnings in the area.[33]
Atlantic Canada[edit]
The storm brought above seasonal temperatures to much of Atlantic Canada, along with soaking rains. Although, Labrador was affected by heavy snow with up to 30 cm (1 foot) of snow in some areas. Afterwards, the storm moved out to sea.[34]
Ontario and Quebec[edit]
The provinces experienced their warmest day in weeks, sparking the risk for isolated severe thunderstorms in extreme southwestern Ontario. These storms triggered flooding along the Humber River, resulting in an evacuation order for 200 people.[35] Behind the storm's cold front, cold, below seasonal temperatures returned along with snowsqualls in the snow belts. Meanwhile, Northern Ontario was hit with heavy snow and strong winds, producing blizzard-like conditions.[36]
See also[edit]
1. ^ Linda Lam (March 15, 2019). "Another Superstorm? How the 2019 Bomb Cyclone Compared to the March 1993 Superstorm". The Weather Company. Retrieved March 17, 2019.
2. ^ "Another Superstorm? How the 2019 Bomb Cyclone Compared to the March 1993 Superstorm". The Weather Channel. Retrieved 2019-03-26.
3. ^ Lardieri, Alexa (March 13, 2019). "'Bomb Cyclone' Winter Storm Moving Across Central U.S." U.S News and World Reports. Retrieved March 13, 2019.
4. ^ a b Spears, Chris (March 13, 2019). "'Bomb Cyclone' May Have Set Unofficial State Low Pressure In Colorado". CBS 4 Denver. Retrieved March 14, 2019.
5. ^ "Bomb Cyclone Kills 2, Cripples Travel in Colorado, Great Plains". The Weather Channel. Retrieved 2019-03-16.
6. ^ a b c Johnson, Alex. "Historic flooding kills three, forces hundreds from homes across the Midwest" (March 17, 2019). NBC News. Retrieved March 18, 2019.
7. ^ "Damaging storms spawn tornadoes in New Mexico, leave thousands without power in Texas -". Retrieved 2019-03-16.
8. ^ a b c d "Second "bomb cyclone" in a month brings threat of snow, flooding". CBS. CBS/Associated Press. Retrieved 9 April 2019.
9. ^ "4 Jaw-Dropping Facts About Winter Storm Ulmer". The Weather Channel. Retrieved 2019-03-15.
10. ^ Huffstutter, P.J.; Pamuk, Humeyra (2019-04-01). "Exclusive: More than 1 million acres of U.S. cropland ravaged by floods". Reuters, via Climate Signals. Retrieved 2019-09-22.
11. ^ "Tornadoes Hit Midwest, South, Causing Damage to Dozens of Buildings, Including 70 in Michigan". The Weather Channel. Retrieved 2019-03-16.
12. ^ Miller, Blair. "Snow totals from March 13 'bomb cyclone' blizzard that blasted Colorado". The Weather Channel. Retrieved March 14, 2019.
13. ^ "Wild wind gusts: Top speeds from Wednesday's Colorado blizzard". Fox 31 Denver. March 13, 2019. Retrieved March 14, 2019.
14. ^ Hefty, Jennifer (March 13, 2019). "Travel alert: Nearly 600 flights to or from DIA canceled for Thursday". Coloradoan. Retrieved March 14, 2019.
15. ^ Mitchell, Kirk (March 13, 2019). "Blizzard wreaks havoc on Colorado highways; overnight closures on I-25, I-70 and I-76". Denver Post. Retrieved March 14, 2019.
16. ^ "Late-winter storm hits Midwest after paralyzing Colorado". Twin Cities. 2019-03-14. Retrieved 2019-03-16.
17. ^ Norvell, Kim (March 20, 2019). "Number of levee breaches up to 30 from 12, and Iowa's flood season is just getting started". Des Moines register. Retrieved March 21, 2019.
18. ^ Michaels, Chris (March 13, 2019). "Record low pressure possible in Great Plains; rain for us". WSLS. Retrieved March 13, 2019.
19. ^ Stoddard, Martha; Cole, Kevin (March 14, 2019). "Drivers staying put as blizzard strikes Nebraska Panhandle, closes highways". Omaha World-Herald. Retrieved March 15, 2019.
20. ^ "Spencer Dam collapsed". Siouxland Proud. March 14, 2019. Archived from the original on March 27, 2019. Retrieved March 15, 2019.
21. ^ "Flash flood emergency up for Platte after ice jam breaks; 1 missing in Norfolk". Lincoln Journal Star. March 14, 2019. Retrieved March 15, 2019.
22. ^ Duffy, Erin; Gaarder, Nancy; Peters, Chris (March 15, 2019). "Flood emergency declared for western Douglas County; weather service urges residents to evacuate". Omaha World-Herald. Retrieved March 15, 2019.
23. ^ "Access to Fremont Blocked Due to Road Closures Caused by Record Flooding".
24. ^ Liewer, Steve. "One-third of Offutt underwater; at least 30 buildings damaged in flood". Omaha World-Herald. Retrieved March 18, 2019.
25. ^ Ristau, Reece (March 19, 2019). "Floodwaters receding in Nebraska, but long and costly recovery lies ahead". Winston-Salem Journal. Retrieved March 19, 2019 – via Omaha World-Herald.
26. ^ "Nebraska Faces Over $1.3 Billion In Flood Losses". Retrieved 2019-03-26.
27. ^ Smith, Mitch. “'It's Probably Over for Us': Record Flooding Pummels Midwest When Farmers Can Least Afford It.” Google, New York Times, 25 Mar. 2019,
28. ^ a b "4 Jaw-Dropping Facts About Winter Storm Ulmer". The Weather Channel. March 14, 2019. Retrieved March 15, 2019.
29. ^ "High wind warning Wednesday in Oklahoma City". 2019-03-13. Retrieved 2019-03-15.
30. ^ "Winter Storm Ulmer, the March 2019 Bomb Cyclone, Blasted the Plains With Blizzard Conditions, High Winds". The Weather Channel. Retrieved 2019-03-15.
32. ^ Foster, Brandon; Sanderson, Shane; Wolfson, Joshua (March 13, 2019). "Governor advises residents to stay indoors as blizzard slams Wyoming". Casper Star Tribune. Retrieved March 14, 2019.
33. ^ Randall, Doug. “National Weather Service Warns Of Southeast Wyoming Flooding.” KGAB AM 650, 20 Mar. 2019,
34. ^ Inc, Pelmorex Weather Networks. "Atlantic: Flood risk continues as cooler temperatures near". Retrieved 2019-03-17.
35. ^ Inc, Pelmorex Weather Networks. "Hundreds evacuated as flooding targets southwestern Ontario". Retrieved 2019-03-17.
36. ^ Inc, Pelmorex Weather Networks. "Ontario: Thunderstorm risk, and what's beyond it". Retrieved 2019-03-17. |
global_05_local_5_shard_00002591_processed.jsonl/25602 | Mongolian name
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Mongolian names have undergone a number of changes in the history of Mongolia, both with regard to their meaning and their source languages. In modern day, Inner Mongolian naming customs are similar to Mongolia, but do display some differences.
Historical evolution[edit]
Mongolian names traditionally have an important symbolic character—a name with auspicious connotations being thought to bring good fortune to its bearer. The naming of children was usually done by the parents or a respected elder of the family or religious figures. For example, it is said that in the 13th century, the prominent shaman, Teb-tengeri, saw in the stars a great future for Tolui's eldest son and bestowed on the child the name Möngke (meaning "eternal" in the Mongolian language).[1]
Nowadays most parents give Mongolian names to their children, often in the form of compounds consisting of two nouns or adjectives, representing qualities such as solidity and strength for boys or beauty in the case of girls.
Middle Ages[edit]
The most common category of Mongol names were those of auspicious or (for boys) manly things, such as gold (altan), eternity (Möngke), surplus (hulagu),[3] blue (köke), white (chagha’an), good health (esen), uncle (abaqa),[4] firmness (batu), stability (toqto'a), bulls (buqa, for men), iron (temür), steel (bolad), black (qara), hardness (berke) or nine (yisü).
Other names were based on either conquests or clan names. For example, Sartaq (merchants of western Asian or western Central Asian origin), Hasi (Mongolian form of Tangut-led Western Xia dynasty), Orus (Rus), Asudai (Alani) and so on. Clan-based personal names did not relate to the person's own clan or tribe. For example, Eljigidey was not from Iljigin (Eljigin) tribe and the Mongol general Mangghudai was a Tatar (not to be confused with the modern Turkic people of the Tatars in Europe), but not a Manghud.
One finds a number of degrading or inauspicious names during the 13–14th centuries such as Sorqaqtani, “Pox girl,” or Nohai (~Nokai) "dog", obviously in an attempt to fool bad spirits or disease into thinking it had already afflicted them.[5] This tradition is still preserved in Mongolia in modern times. Symbolic names that express frustration can be found such as the not uncommon girls’ name Oghul-qaimish (Middle Turkic "next time a boy"), while the name Jochi “Guest” indicated doubts about the child's paternity.
Some Mongols had Chinese names. For example, the Buddhist monk, Haiyun, bestowed the name Zhenjin (True-gold) to Khubilai and Chabi's eldest son. In the late 13th century, many newborn children in Italy were named after Mongol rulers, including Hülegü.[6]
After the expulsion of the Mongol regime from China, the Sanskrit names in the imperial family soon disappeared. Christian names appeared occasionally before disappearing (Markörgis Khan). Muslim and Turkic names also declined (Akbarjin, Ismayil or Arghun), leaving primarily the auspicious Mongolian names similar to those in the early empire. For example, some of the later Mongolian Emperors' names include Batumöngke, Buyan, Esen, Toγtoγa Buqa and Manduul. Mongol name customs also affected the nations under Mongol rule. The Jurchens (ancestors of Manchus) in Ming China often used Mongolian names.[8] Sayyid Ajjal Shams al-Din Omar's great-grandson was given the name Bayan "rich".
Late Middle Ages and early modern period[edit]
In the 20th century, when Mongolia had close ties to the Soviet Union, Mongols were sometimes given Russian names like Alexander or Sasha, or mixed ones like Ivaanjav consisting of the Russian Ivan and the Tibetan -jav. Politically active parents may have chosen Oktyabr (October), Seseer (USSR), Mart (March) and even Molotov as names for their offspring. One such example is Melschoi, composed of the first letters of Marx, Engels, Lenin, Stalin and Choibalsan.
Today male names still include the names of old Mongolian elements such as 'iron' or 'steel', or other words denoting strength, such as 'hero', 'strong', or 'ax': some examples are Gansükh 'steel-ax', Batsaikhan 'strong-nice', or Tömörbaatar 'iron-hero', Chuluunbold 'stone-steel'. Temujin, Borte, Yisu and other old names are commonly given to newborn children after 1990.
The basic differences between Mongolian and European names, in connection with trying to fit Mongolian names into foreign schemata, frequently lead to confusion. For example, Otryadyn Gündegmaa, a Mongolian shooter, is often incorrectly referred to as Otryad, i.e. by the (given) name of her father.
Inner Mongolia[edit]
In Inner Mongolia, Chinese names are quite common, as are Mongolian names. Mongolian names of Tibetan origin are usually restricted to people in their 50s and older. Because China does not recognize Mongolian clan names, Mongols in China who have acquired their passports since 2001 have "XXX" printed in place of their surnames, while before not only "XXX" but also a syllable from an individual's given name or the first syllable of the patronymic was used in place of the Chinese surname. Also, for some individuals, "XXX" is printed in the slot for the given name, while the given name is printed in the slot for the surname.
Sometimes in such Chinese transcriptions of Mongolian names, the first syllable is sometimes reanalyzed as the surname, i.e. Ulanhu becomes Wu Lanfu. Onset (if available) and nucleus of the first syllable of the father's name can be used for disambiguation, but have no official status, e.g. Na. Gereltü. Rarely, the onset is used on its own, e.g. L. Toγtambayar.
Taboo names[edit]
Couples whose previous boys have died would give female names to their son to mislead the evil spirits, and vice versa. Synchronically, taboo meaning may be stronger or obliterated: Nergüi, for example, is very common and does not immediately raise any association, while Khünbish might semantically be perceived as khün bish (cf. the same phenomenon in German with the unremarkable Burkhart (lit. 'castle-strong')[11] versus the unusual Fürchtegott ('fear-God')).[12]
Name structure[edit]
List of common names[edit]
In Mongolia, as of 2012, the 20 most common names were:[13]
Name Transliteration translation male/female occurrence
Бат-Эрдэнэ Bat-Erdene firm jewel m 13,473
Отгонбаяр Otgonbayar budding happiness m 11,083
Алтанцэцэг Altantsetseg golden flower f 10,967
Оюунчимэг Oyuunchimeg decoration [consisting of a notable] mind f 10,580
Батбаяр Batbayar unyielding happiness m 10,570
Болормаа Bolormaa crystal lady f 10,282
Энхтуяа Enkhtuya ray of peace f 9,721
Лхагвасүрэн Lkhagvasüren Great Healer m 9,334
Гантулга Gantulga steel hearth m 9,268
Эрдэнэчимэг Erdenechimeg jewel decoration f 9,232
Ганболд Ganbold steel-steel m 9,118
Нэргүй Nergüi nameless m 8,874
Энхжаргал Enkhjargal peaceful happiness f 8,843
Ганзориг Ganzorig courage of steel m 8,760
Наранцэцэг Narantsetseg sun flower f 8,754
Ганбаатар Ganbaatar steel hero m 8,651
Мөнхцэцэг Mönkhtsetseg eternal flower f 8,613
Мөнхбат Mönkhbat eternal firmity m 8,612
Батжаргал Batjargal firm happiness m 8,570
Мөнх-Эрдэнэ Mönkh-Erdene eternal jewel m 8,467
1. ^ Yuanshi, p.124
2. ^ Atwood 2004: 398
3. ^ Pelliot 1959-1963: II, 866-867.
4. ^ "ABAQA – Encyclopaedia Iranica". Retrieved 5 April 2018.
5. ^ Vásáry, p.71
6. ^ Jackson 2005: 315
7. ^ "ABŪ SAʿĪD BAHĀDOR KHAN – Encyclopaedia Iranica". Retrieved 5 April 2018.
8. ^ Aisin Gioro & Jin 2007: 143
9. ^ The traditional meaning of ovog is actually related to clans, not patronymics.
13. ^ Бат-Эрдэнэ нэртэн 13473 байна, retrieved 2018-09-09
Further reading[edit]
• Bürinbilig, Č. Sarana. 2003. Monggγul kümün-ü ner-e-yin delgeremel kögǰil-ün aǰiġlalta ("Observations on the development of Mongolian personal names"). In: Mongγul kele utq-a ǰokiyal 2003/4: 75–78.
• Manduqu. 2005. Monggγul kelen-ü obuγ ner-e-yin učir ("On Mongolian names"). In: Öbür mongγul-un ündüsüten-ü yeke surγaγuli 2005/2: 2-14.
• Монгол бичгийн нэрийн толь, name dictionary in both Cyrillic and traditional Mongolian script (containing more than 28000 names)
• Rybatzki, Volker. 2006. Die Personennamen und Titel der mittelmongolischen Dokumente - Eine lexikalische Untersuchung. Helsinki: University of Helsinki.
• Serjee, Jambaldorjiin. 2010. Orchin cagiin Mongol helnii onooson neriin sudalgaa ("A study of given names in contemporary Mongolian"). Ulaanbaatar: Bembi San.
• Taube, Manfred. 1995. Mongolische Namen. In: Namenforschung: ein internationales Handbuch zur Onomastik, 1. Teilband. Berlin: de Gruyter: 916–918. |
global_05_local_5_shard_00002591_processed.jsonl/25603 | Definition from Wiktionary, the free dictionary
Jump to navigation Jump to search
Blend of female + machismo.
femismo (uncountable)
1. (informal, rare) Exaggerated, stubborn, or aggressive femininity; female machismo.
• 1996 October 13, westel [username], “Re: May/December Emotional Facelifts”, in alt.support.divorce, Usenet[1]:
All feminists' talk about a woman's superior ability to identify and express their feelings is just that, TALK. It's just more femismo designed to inflate the deflated self-esteems of mean spirited women.
• 1998 July 7, Epona [username], “first time post”, in alt.support.anxiety-panic, Usenet[2]:
i'm not doing any meds. perhaps it's my femismo that keeps me saying no to meds, perhaps it's that i don't want to mask other things.
• 2000, Marilyn Maxwell, Male Rage, Female Fury: Gender and Violence in American Fiction, University Press of America (2000), →ISBN, page 117:
Do these women, like Damon Cross in Wright's The Outsider or Bigger Thomas in Native Son, succeed in establishing their own autonomy only through violence, forging a "femismo" or female counterpart to the "machismo" brutality of a Mailer protagonist?
• For more quotations using this term, see Citations:femismo.
Coordinate terms[edit] |
global_05_local_5_shard_00002591_processed.jsonl/25607 | Proper Generalized Decomposition in MATLAB for Real-Time 3D Applications
By Dr. David González, University of Zaragoza (UniZar)
Most scientists, researchers, and engineers who perform structural analysis at some point encounter the curse of dimensionality: the inability to incorporate algorithms based on finite elements to real-time applications, given the dimensionality of the computation and performance requirements. Model order reduction (MOR) techniques such as proper orthogonal decomposition (POD) attempt to address the problem by reducing model complexity. These techniques are not suitable for real-time applications, however, because they are computationally costly.
I worked with two colleagues, Professors Elías Cueto and Icíar Alfaro, at the Aragon Institute of Engineering Research at the University of Zaragoza (UniZar) to develop a novel model order reduction approach based on proper generalized decomposition (PGD)1. Implemented in MATLAB®, this approach incorporates two phases: an offline phase in which a multiparametric solution to the problem is computed, and an online phase in which the solution computed in the first phase is used to obtain results in real time.
PGD has a number of applications across a variety of domains. For example, it can be used to calculate surface deformation in response to a moving applied load—a problem long considered nonreducible for real-time applications. To demonstrate our implementation of PGD, we’ve developed several sample applications, including an iPad app that simulates the deformation of a cantilever beam in real time when a load is applied, and a real-time surgical simulator with haptic feedback that enables the operator to see and feel the response of a virtual liver to various simulated loads directed via a stylus (Figure 1).
Figure 1. Real-time liver palpation simulation powered by a MATLAB based PGD implementation.
Implementing a PGD Framework in MATLAB
The computer-aided engineering (CAE) community has been working on model order reduction for decades. The history of PGD began with the LATIN multiscale computational method. Over the past 10 years, Professor Francisco Chinesta and his team have used PGD and MATLAB to develop models of non-Newtonian fluids. When my colleagues and I began working with PGD, we built upon many of the concepts and techniques that he developed, and we, too, selected MATLAB for the implementation of our PGD framework for dynamic problems.
I had programmed extensively in C++ for my Ph.D., but switched to MATLAB for this project because PGD requires numerous vector and matrix manipulations, and MATLAB enabled me to write efficient, vectorized code for these operations. Minimizing the use of for loops made the code execute faster and made it easier to write and maintain. Code performance was a priority because the preprocessing required for the initial multiparametric solution is computationally intensive and can take several hours to complete.
The results of the first phase of PGD calculations are stored as a large, multidimensional array in the MATLAB workspace (Figure 2). We then either postprocess and visualize the data directly in MATLAB or export it in one of a variety of formats for use in 3D visualization software and other custom applications.
Figure 2. MATLAB workspace showing PGD calculation results. (4 images)
One of the custom apps that we developed was an iPad app that simulates the deformation of a cantilever beam in real time when a load is applied (Figure 3). This app complements mechanical engineering theory by helping students understand the basics through experimentation.
Figure 3. Interactive iPad app simulating a cantilever beam bending in response to a load applied at the point where the user’s finger contacts the screen.
Packaging PGD as a MATLAB App
To make the PGD framework easier for students and researchers to use and experiment with, we created a shareable MATLAB app (Figure 4). The student or researcher begins by selecting a preset use case, such as the cantilever beam, the liver, or similar examples for the pancreas and gall bladder. The user can specify whether the underlying material behavior should be treated as elastic or hyperelastic and whether the problem should be solved using a static approach or a dynamic approach in which the material's response at any timestep is partially determined by its response in the previous timestep.
Figure 4. The PGD MATLAB app.
The app uses PGD to compute the solution, which is then available in the MATLAB workspace. The solution for any problem needs to be computed only once: The results of the initial phase can be saved as a MAT-file and recalled for postprocessing or visualization (Figure 5).
Figure 5. 3D renderings of a liver surface computed using PGD.
I use the MATLAB app to introduce PGD concepts to students in two master's-level classes: Numerical Methods in Bioengineering and Computational Methods in Engineering. Because the coursework in both classes requires the students to use MATLAB, I begin each course with a short review of MATLAB basics. Students in these classes not only learn to develop and share numerical and computational methods, they also develop an understanding of PGD and how to apply it using MATLAB.
Case Study: Creating a Real-Time Simulation with Haptic Feedback for Liver Palpation
One of my principal research areas is the application of computing, simulation, and imaging to surgical procedures. The surgical simulator shown in Figure 1 is one example of the value of PGD in this area. To create it, we used our MATLAB PGD framework to compute a multiparametric solution using three input parameters: a 3D mesh of the liver, a set of all possible positions for the loads (points where the surgeon could apply force to the liver), and the activation of the load from 0% (no load) to 100% (full load). We then worked with a team of programmers to incorporate the computed result matrix into a simulator with real-time visualization and haptic feedback.
During a simulation, any movement of the manual stylus causes a corresponding movement of the virtual stylus on screen. When the operator presses a button on the stylus, the virtual stylus is pressed against the simulated liver. The liver surface's reaction to this pressure is calculated using the computed PGD results. Because this calculation only requires straightforward vector multiplication, it can be completed hundreds of times per second to support real-time performance. The resulting deformation of the liver is shown on screen, and an appropriate signal is sent to the haptic device, enabling the operator to feel resistance on the stylus in real time.
After calibrating and tuning the simulator, we had it tested by experienced surgeons. They reported that the sensation they felt through the haptic device authentically reproduced the sensation of working on an actual patient.
We recently updated the simulator to support patient-specific liver geometries. In this version of the simulator, the patient’s liver is first imaged to create a 3D model. The model is then compared against a library of liver geometries with PGD solutions that have already been computed. The computed solution for the library model most similar to that of the patient is then used in the simulation.
With this capability, together with a planned enhancement that will support tearing and cutting operations, we will be able to create a realistic simulator for surgical training. This simulator will make it possible for medical students to practice safely and for experienced surgeons to rehearse surgical procedures on lifelike virtual organs before performing the actual procedures in the operating room.
1 Compared with dynamics simulation using finite element analysis (FEA), PGD reduces the degree of freedom (DOF) by projecting the nonlinear element basis equations onto a set of parametrically reduced basis equations in the initial displacement field and again at each time step.
About the Author
Dr. David González is a professor in the department of Mechanical Engineering at the University of Zaragoza (UniZar). Dr. González holds a Ph.D. in applied mathematics from UniZar. His research interests include computational mechanics, dimensional model reduction, real-time simulation, and computational surgery, carried out in the Aragon Institute of Engineering Research at the University of Zaragoza.
Published 2018
View Articles for Related Capabilities
View Articles for Related Industries |
global_05_local_5_shard_00002591_processed.jsonl/25623 | Bitonic Merge Sort is the military veteran uncle in the family.
He's very rigid, set in his ways; he'd much prefer that the world stop changing and adhere to his ideals for once, because then we'd all be better off. The way he sees it, the world is black-and-white, right-and-wrong, and there's a clear answer to every question. This is probably the reason why he doesn't get along with Bead Sort.
A Swiss Army recruit during a public presentation in Valais Switzerland.
Photo by jan abellan / Unsplash
That said, he's a bit of a softy. He'll sneak Werther's Originals for his young grand-nieces and grand-nephews even after their parents have told them no, and has more than once spoken about how proud he is of grand-nephew Comb Sort's athletic ability. He's even offered to help grand-niece Counting Sort study so that she can keep her athletic scholarship. But at the end of the day, he's a man who holds strongly to his beliefs and is willing to defend them, no matter the cost.
The Rundown
• Created By: Ken Batcher
• Type: Concurrent
• Stable? No
• Best-Case: O(log2(n))
• Average-Case: O(log2(n))
• Worst-Case: O(log2(n))
• Space Complexity: O(n log2(n))
• Sample Project: Over on GitHub
Project for this post: BitonicMergeSort
1. SPLIT the array into two equal halves.
2. SORT the left half in ascending order, and the right half in descending order.
3. FOR EACH half of the array...
4. ...GO TO 1 (using the half of the array as the new "base" array), RECURSIVE CONTINUE until the split array size is 1.
5. MERGE all sorted subarrays back together.
This is a difficult algorithm to visualize. The most important thing we need to know is that this algorithm makes a big assumption: that the unsorted array size is a power of 2 (e.g. 4, 8, 16, 32, etc). The algorithm only works in such cases.
Wikipedia uses this visualization of an eight-input bitonic sorter:
The idea is that inputs flow from left to right, "entering" the sort on the left and "exiting" on the right. At each "intersection" the two connected numbers are compared. If they are out of order, they are swapped.
Let's imagine we are using the following array
{ 81, 12, 19, 53, 39, 7, 2, 45 }
I found it much easier to visualize this algorithm if I added the numbers to the sorting array after each sorting step. That resulted in this image:
Each "phase" in this diagram represents a step in the algorithm. The numbers represent the current position of the array elements after each phase.
Please note that this visualization does not match the algorithm above or the implementation below, though all are permutations of the same ideas.
Finally, here's the "audibilization" of this sort, termed Batcher's Bitonic Sort in the video:
C# Implementation
class BitonicMergeSort
static void Swap<T>(ref T leftHandSide, ref T rightHandSide)
T temp;
temp = leftHandSide;
leftHandSide = rightHandSide;
rightHandSide = temp;
static void CompareAndSwap(int[] array, int i, int j, int direction)
int k;
k = array[i] > array[j] ? 1 : 0;
//If the order the elements are currently in DOES NOT match
//the sort direction (array[i] > array[j])...
if (direction == k)
//...Swap the elements so they DO match the sort direction
Swap(ref array[i], ref array[j]);
//This method recursively sorts a bitonic sequence in ascending order,
//if dir = 1, and in descending order otherwise (means dir=0).
//The sequence to be sorted starts at index position low,
//the parameter count is the number of elements to be sorted.
static void BitonicMerge(int[] array, int low, int count, int direction)
if (count > 1)
int k = count / 2;
for (int i = low; i < low + k; i++)
CompareAndSwap(array, i, i + k, direction);
BitonicMerge(array, low, k, direction);
BitonicMerge(array, low + k, k, direction);
//This function first produces a bitonic sequence by recursively
//sorting its two halves in opposite sorting directions, and then
//calls BitonicMerge to make them in the same direction
static void BitonicSort(int[] array, int low, int count, int direction)
if (count > 1)
int k = count / 2;
// sort left side in ascending order
BitonicSort(array, low, k, 1);
// sort right side in descending order
BitonicSort(array, low + k, k, 0);
//Merge entire sequence in ascending order
BitonicMerge(array, low, count, direction);
public static void Main()
int[] array = { 66, 98, 11, 43, 7, 28, 14, 49, 77, 61, 31, 12, 71, 93, 15, 2 };
int length = array.Length;
Console.WriteLine("Bitonic Merge Sort");
BitonicSort(array, 0 /*low value*/, length, 1);
//1 is for sorting in ascending order
Time and Space Complexity
The time complexity for this algorithm is the same across all cases: O(log2(n)). This signifies that the size of the array and other conditions do not change the time needed, a very good thing in a sorting algorithm.
However, this is only true because the algorithm makes a major assumption: it assumes the input array has a length that is a power of 2. We see in this algorithm, as in others that make assumptions about their input, that those assumptions are what cause the improved performance many of them have. This is not a general-case sorting algorithm; this is a specialized one.
Bitonic Merge Sort is a very performant sort, provided the input size is a power of 2. Its consistent time complexities make it ideal for small or large sets of data. Plus, he's always got some Werther's. Maybe he'll even give you one.
The next family member at the reunion is the baby brother, Pigeonhole Sort, and he's a master of getting other people to do things for him.
Pigeonhole Sort in C#
The youngest child of the family patriarchs, Pigeonhole Sort could get away withmurder, at least as far as his siblings are concerned. Their mother dotes on “her little boy” despite that fact that he’s a full-grownadult. She does his laundry, helps with his chores, and generally cleans upafter h…
Don't forget to check out the sample project over on GitHub!
Happy Coding! |
global_05_local_5_shard_00002591_processed.jsonl/25634 | AWS and OPNsense: Site-to-site IPsec VPN setup
There will always be circumstances where you will want to run a site-to-site VPN setup with AWS. You may have private resources (not Internet facing) within AWS that you need to access in a secure manner from an on-prem or home network.
In this example, I walk through setting up an IPsec site-to-site VPN where the two sides are as follows:
1. AWS – A private VPC, containing one EC2 server (to allow me to test everything is working!)
2. Home network – With an OPNsense firewall sitting in front of it.
Warning: There are AWS charges for running VPNs as described in this article. Please refer to https://aws.amazon.com/vpn/pricing/ for the specifics.
AWS: Spinning up the VPC
spinning | Partners in Wellness
I am going to let AWS do some of the heavy lifting for us here, as there is a handy Wizard for this scenario.
The Wizard handles the following:
1. Creation of a private VPC (not addressable from the Internet)
2. IPsec VPN configuration (including Customer Gateway, Virtual Private Gateway and Site-to-Site VPN)
As the above hints, there are several different components involved in bringing up the IPsec VPN on the AWS side. The Getting Started documentation is very good at explaining how these slot together, should you wish to get this going on an existing VPC.
From the VPC section of the EC2 console, I hit the Launch VPC Wizard button, which takes me here:
I am selecting the VPC with a Private Subnet Only and Hardware VPN Access, as that is exactly what I want!
Now, I can configure the details of the VPC:
I go with the defaults, as I’m happy with the range (My home network is on so no clash). I use the very imaginative name of ‘Test’.
I then need to tell the Wizard where it can find my home network. Note that AWS does not initiate the VPN – I will handle that later when configuring OPNsense.
‘Customer Gateway IP’ is the public-facing IP address of my network (but replaced here for example purposes). I am using Static routing, so need to tell the Wizard what that looks like – a pretty standard which will be the case for a lot of home networks.
Clicking Create VPC will build it all out. This will take a few minutes.
Spinning up a test instance
Once this is done, I spin up a test instance. I won’t go through all the steps here, as I assume that if you are at the point of setting up a VPN like this, you are already familiar with spinning up instances within AWS.
The key point is that I ensure the instance is created within my new private VPC:
Once the Instance is up, I can verify this:
I now need to download the details that I need in order to configure OPNsense on my home network.
I go to VPC -> Site-to-site VPN connections and select my VPN. There is a handy Download Configuration button.
I hit that, and select pfSense (the product that OPNsense was forked from – the details within are compatible).
With the file in hand, that completes the work required within AWS. Now to the home network!
OPNsense: Firewall
There are a few different things to do here. This section is based on the official OPNsense documentation.
Let IPsec traffic into the network
By default, all incoming WAN traffic is blocked. There are several rules that need setting up to allow:
• IPSec ESP
• IPSec NAT-T
This is done within Firewall -> Rules -> WAN.
Here’s a snippet where I am setting up the first of these:
Once all three are in place, the summary screen will look like this:
OK, great! Now I need to set up the IPsec connection itself.
OPNsense: VPN setup
I navigate to VPN -> IPsec -> Tunnel settings, and hit the (+) symbol to add Phase 1.
I now adjust all the settings to match those provided within the downloaded AWS configuration file.
There are quite a few parameters, so I take my time to get it right! (This includes unchecking some of the pre-checked boxes).
Once saved, I’m not done! I need to do Phase 2, which is done by hitting the (+) next to the Phase 1 entry:
It’s the one on the right!
Again, I consult the downloaded file from AWS to get the settings right.
Once done, it all looks like this:
Note that I have now ensured that Enable IPsec is clicked before Saving everything.
Now, the moment of truth! Over to VPN -> IPsec -> Status overview:
Nothing yet… as the VPN does not come up by default (the little arrow on the right is still amber). I click on it, then wait and hit the little ‘i’ symbol to expand all the information.
This is good news! The VPN is up.
Final Firewall Bits
There is one more thing to do, however. I need a firewall rule to allow traffic through to the LAN network too.
Over to Firewall -> Rules ->IPsec to add this rule in. Once done, it shows in the Summary as follows:
Job done!
You Did It! Sticker | Zazzle
At this point, it’s possible to reach the private EC2 instances from my home network, by addressing them using their addresses. I test this by running a ssh connection from a machine on my home network.
Some closing points:
1. You get 2 tunnels when setting this up with AWS to ensure redundancy. This guide only sets one up on the home side of the network. As an exercise for the reader, you can set up the second! (The details are in the downloaded Connection details file, as with the first one).
2. The method described here uses a Shared secret approach. This could be strengthened by using Certificates. Here is some AWS documentation to get started with implementing that.
Tristan Greaves
Leave a Reply
|
global_05_local_5_shard_00002591_processed.jsonl/25638 | Dr. Ahmed G. Abo-Khalil
Electrical Engineering Department
Mainframe computer
Mainframe computers (colloquially referred to as "big iron") are powerful computers used primarily by corporate and governmental organizations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning, and transaction processing. The term originally referred to the large cabinets that housed the central processing unit and main memory of early computers. Later, the term was used to distinguish high-end commercial machines from less powerful units.[citation needed] Most large-scale computer system architectures were established in the 1960s, but continue to evolve.
Most modern mainframe design is not so much defined by single task computational speed, typically defined as MIPS rate or FLOPS in the case of floating point calculations, as much as by their redundant internal engineering and resulting high reliability and security, extensive input-output facilities, strict backward compatibility with older software, and high hardware and computational utilization rates to support massive throughput. These machines often run for long periods of time without interruption, given their inherent high stability and reliability.
Software upgrades usually require setting up the operating system or portions thereof, and are non-disruptive only when using virtualizing facilities such as IBM's Z/OS and Parallel Sysplex, or Unisys' XPCL, which support workload sharing so that one system can take over another's application while it is being refreshed. Mainframes are defined by high availability, one of the main reasons for their longevity, since they are typically used in applications where downtime would be costly or catastrophic. The term reliability, availability and serviceability (RAS) is a defining characteristic of mainframe computers. Proper planning and implementation is required to exploit these features, and if improperly implemented, may serve to inhibit the benefits provided. In addition, mainframes are more secure than other computer types. The NIST National Institute of Standards and Technology vulnerabilities database, US-CERT, rates traditional mainframes such as IBM zSeries, Unisys Dorado and Unisys Libra as among the most secure with vulnerabilities in the low single digits as compared with thousands for Windows, Linux and Unix.[4]
In the 1960s, most mainframes had no explicitly interactive interface. They accepted sets of punched cards, paper tape, and/or magnetic tape and operated solely in batch mode to support back office functions, such as customer billing. Teletype devices were also common, for system operators, in implementing programming techniques. By the early 1970s, many mainframes acquired interactive user interfaces and operated as timesharing computers, supporting hundreds of users simultaneously along with batch processing. Users gained access through specialized terminals or, later, from personal computers equipped with terminal emulation software. By the 1980s, many mainframes supported graphical terminals, and terminal emulation, but not graphical user interfaces. This format of end-user computing reached mainstream obsolescence in the 1990s due to the advent of personal computers provided with GUIs. After 2000, most modern mainframes have partially or entirely phased out classic terminal access for end-users in favour of Web user interfaces.
Historically, mainframes acquired their name in part because of their substantial size, and because of requirements for specialized heating, ventilation, and air conditioning (HVAC), and electrical power, essentially posing a "main framework" of dedicated infrastructure. The requirements of high-infrastructure design were drastically reduced during the mid-1990s with CMOS mainframe designs replacing the older bipolar technology. IBM claimed that its newer mainframes can reduce data center energy costs for power and cooling, and that they could reduce physical space requirements compared to server farms.
Office Hours
No office hours
My Timetable
email: [email protected]
[email protected]
Phone: 2570
Welcome To Faculty of Engineering
Almajmaah University
Links of Interest
Travel Web Sites
ستقام اختبارات الميدتيرم يوم الثلاثاء 26-6-1440
حسب الجدول المعلن بلوحات الاعلان
Summer training
Academic advising
Class registration week 1
برنامج التجسير
إحصائية الموقع
عدد الصفحات: 2879
البحوث والمحاضرات: 1280
الزيارات: 73526 |
global_05_local_5_shard_00002591_processed.jsonl/25662 | My 2016 in First Posts
I’m already suffering from homesickness before I’ve even left this region.
2016: A Year of Goodbyes
All I seem able to write lately are non-fiction, personal essays or rants about perceived unfairness. Things I’ve always avoided writing before. I hope normal service will resume soon (poetry, book reviews, writerly stuff).
Goodbye, Mont Blanc!
Goodbye, Mont Blanc!
After an insane 2014, a stagnating cesspool of 2015 (I’m talking personal rather than global troubles here), I was looking forward to 2016. It was going to be a year of starting afresh, making changes, taking control. But 2016 has proved fierce, fearsome and unknowable so far. It has drained me more than it has energised.
It has robbed me of David Bowie and Prince, two of my childhood idols. It has robbed me of Alan Rickman and Victoria Wood, whom I got to know and love later. Of course, these are not people I knew personally, but we all feel we know celebrities, just like we feel we know ‘the culture of a country’.
In many ways, the greatest tragedy this year has been that it has robbed me of many of my illusions about and feelings for Britain. For me, it had always been a country that stood out as a beacon of civilisation and civility, fairness and even-handedness, where people talk to each other in moderate tones instead of breaking out into street fights. Over the past few weeks leading up to the referendum, I was beginning to recognise (from the media and the comments in the media) that Brexit had become a real possibility. It did not quite catch me by surprise, but it nevertheless hurt me. It’s not the vote in itself which makes me sad and scared, but the animal it has unleashed, how easily a country (and its people) can change beyond recognition. And yes, I know that there are still plenty of decent people there who are equally bewildered, shocked and hurt by what they see.
This reminds me of a divorce in far too many ways. Which is something else that 2016 is throwing my way, so bear with me as I work through this metaphor:
1. It’s about emotion rather than rationality. After weighing the pros and cons for far too long, trying to be very rational and fact-based, there comes a time when you lose all common sense. You can only see the things you hate about the other, you cherry pick those arguments and behaviours which prove your point. In other words, you ultimately vote with your gut. And we all look foolish when we react in anger.
2. There’s no such thing as a clean cut. Perhaps if you are a young couple who’ve been together for a very short while and have no children or joint property, it’s easier to separate. For the rest of us, there are a hundred links, some visible, many invisible, which need to be severed. It’s like cutting off a living organism with profound roots in foreign soil.
3. You don’t know how much you might be damaging the future generation. Even if you have the best intentions in the world and the most unified approach to parenting, the children will struggle to understand and cope with a divorce. Just imagine what happens when the parents are warring with each other, no one has a clear plan for what happens next and you, the child, are blamed for some of the problems too!
4. The fault never lies with just one side. It’s tempting to buy into just one side of the story, but the truth always lies somewhere in-between. A marriage seldom falls apart solely through the fault of (the other) person, even though it may be cathartic to believe that for a short while. However, if you continue to believe that, you will never learn from your mistakes and will be an impossible person to live with in your next relationship.
5. You will feel guilty no matter what. If only I had listened more… If only I had spotted the warning signs earlier and done something about it… If only I could behave more like a grown-up now and not let these emotions get the better of me… If only these children weren’t judging me every day with their eyes…
6. You will move on, survive and perhaps thrive. You fear for your relationship with your children, your finances, whether you will still have a roof over your head. You go through the motions every day, barely keeping up with the formalities you did not wish for, allowing balls to drop all the time because this kind of juggling isn’t what you wanted to do with your life.
It seems difficult to believe in a period of meltdown, but the hatred won’t last forever in its volatile state as an unstable isotope. You have a choice. You can either allow it to harden into an ice-cold little kernel which will prevent you from ever trusting anyone again. Or you can let it decay, evaporate, blow away like fine dust… and build a more stable isotope to take its place.
Here is a song that has helped me through these last few days in particular, but also for most of the year.
Sia: Unstoppable
Goodbye for today, from your Porsche with no brakes and, despite everything, no fear of speaking her mind… |
global_05_local_5_shard_00002591_processed.jsonl/25663 | Free and legal MP3: Secondstar (meditative, wistful, harmony-laced)
“Tied to the Mast” – Secondstar
Meditative, wistful, harmony-laced, and lacking any introduction whatsoever, “Tied to the Mast” (sea theme continues, inadvertently) envelops us instantly in its welcoming vocal layers. While reminiscent, clearly, of the sorts of harmonizing that Fleet Foxes abruptly brought back to rock’n’roll last year, what you’ll hear here has a smaller-scale and less architected feeling. Liam Carey, the Brooklyn-based driving force behind Secondstar, uses an accumulation of fragile vocal tracks to create something decidedly unfragile, anchoring it all on a simple acoustic rhythm guitar and some oceanic percussion, nicely evocative of the “ever-hooded, tragic-gestured sea,” to quote a landmark poem that comes to mind as I’m listening to this. The guitar, by the way, may be uncomplicated but the chords are so hospitable, the sound so warm and plush that I am newly reminded that complication isn’t everything.
“Tied to the Mast” is one of five songs on Secondstar’s Teeth EP, self-released this summer. A follow-up EP is due some time this fall, says Carey. Note that the link is via Bandcamp, and is not direct. Follow instructions from the link above and you’ll have the MP3 in no time.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_05_local_5_shard_00002591_processed.jsonl/25680 | Wczytuję dane...
Wysyłka w ciągu: 30 dni
Wydawca: Decision Games
Magazyn Modern War plus gra Dragon vs Bear.
Dragon vs Bear: China vs Russia in the 21st Century is a wargame based on the premise that the People’s Republic of China and the Russian Federation go to war sometime in the twenty-first century. The game is an update of SPI’s East Is Red game, specifically showing the developments in warfare that have occurred in the intervening decades, and projected out to the near future. Both side’s armed forces are smaller than they were during the Cold War, but have access to modern high-tech weapons and tactics, termed in the game as Hyperwar.
Dragon vs Bear: China vs Russia in the 21st Century is operational level with two players: One for China and one for Russia. It puts players in the position of having to utilize the full spectrum of military operations, which also include weapons of mass destruction. The game is played in scenarios, each postulating different reasons for the war, as well as different levels of mobilization. You win by defeating the enemy and gaining national objectives.
The game emphasizes land and airpower. Naval warfare is factored out on the premise that the Chinese and Russian navies would cancel each other out for the period that the game scenarios covered.
Conventional land and airpower are treated in a generally similar manner. This is in part because of the lack of sophisticated higher level airpower doctrines in the Chinese and Russian armed forces, but also because of the range and lethality of modern munitions: firepower is going to be the same whether delivered by a multiple rocket launcher system, an attack helicopter, or a jet bomber. The real difference will come in with the application of Hyperwar capabilities. Hyperwar is inherent in certain unit types, and can be assigned to others via Hyperwar strikes.
Components: One 22" x 34" map & 228 counters
Other Articles:
· Dragon vs. Bear: Possibilities for Chinese versus Russian operational conflict with a look at both countries' armed forces.
· Chinese Special Forces: Power projection in East Asia via unconventional warfare.
· War in Mali: Current fighting in the War on Terror leads to the Foreign Legion returning to Timbuktu.
· Air Ambush over Vietnam: The USAF's Colonel Olds springs a trap on North Vietnamese interceptors.
· Operation Able Archer: The incredible moment in 1983 when the USSR almost went to war with NATO.
· The G-6 Rhino: The South African Army's super artillery gun.
Klienci, którzy kupili ten produkt wybrali również... |
global_05_local_5_shard_00002591_processed.jsonl/25681 | Test infrastructure
Ruslan (and everybody else),
When adding some tests to the core to enable testing some link search
issues that clkao contributed a test suite for, Schwern and Autrijus
suckered me into refactoring RT’s test suite to use “prove” as a test
harness, rather than our hand-rolled harness. So now you get much nicer
test suite output and you can run many of the test files on their own.
Patches appreciated :wink:
The changes should be in 3.3.16, which I should be releasing on Tuesday. |
global_05_local_5_shard_00002591_processed.jsonl/25689 | back to article Here WeGo! Google Maps rival drops Maps branding
Google’s only major consumer mapping rival, HERE, has dropped Maps from its app name in a bold rebranding exercise. After many hours in the Strategy Boutique, the map apps is now named after the ancient British football chant... Here We Go. The rebranding reflects HERE’s greater emphasis on route planning and directions, with …
1. Dan 55 Silver badge
Too much whalesong
If you just search for "maps", you usually get a list of apps with maps in their name, of which HERE will be a high-ranking app, and the person searching might pick HERE after reading a few map app descriptions. Now that can't be done.
If you search "here maps" that'll help narrow it down even more, it'll be the first result (unless Google sticks an ad for Waze in the top slot).
Now if you just search "here" who knows what you could get. You're at the mercy of Google's algorithm. They might suddenly decide to give more weight to "here" in the app's description than the title.
HERE Maps was a known name. The strategy boutique screwed up with that one.
1. Locky
Re: Too much whalesong
First 3 results from googling "here";
GoogleApps link for
iTunes link for
It's almost like theres a way to pay to be top of a search list
1. Dan 55 Silver badge
Re: Too much whalesong
I was talking about searching in the Play Store, not Google.
2. Charlie Clark Silver badge
Re: Too much whalesong
Personally I think the new name is fine. They obviously want to get away from "maps" which, at least on Android, is most associated with Google.
"Here Maps" was never a brilliant name and doesn't really suggest navigation – one thing Andrew didn't mention is that Here also does offline turn-by-turn navigation as good as TomTom in my limited experience – talking to non-native English speakers about "the navigation app called Here" is a bit like Abbott & Costello meeting "the artist formerly known as symbol": blank stares and exasperation.
"Here We Go" isn't brilliant but it is catchy (and less cringy than something like "WhatsApp") so well done whoever came up with it. In a couple of months we won't care. Maybe they'll even rebrand it again to just "We go!" or "Let's go!". As long as they have sufficient promotional advertising it'll work fine.
2. et tu, brute?
Had a look, but...
...the permission details needed by the app are simply mad!
- Find accounts on the device
- Read your own contact card
- Read your contacts
Location (this I can understand!)
- Approximate location (network-based)
- Precise location (GPS and network-based)
- Send SMS messages
- Read call log
- Modify or delete the contents of your SD card
- Read the contents of your SD card
Wi-Fi connection information
- View Wi-Fi connections
Bluetooth connection information
- Access Bluetooth settings
Device ID & call information
- Read phone status and identity
- Prevent phone from sleeping
- Install shortcuts
- Control vibration
- View network connections
- Full network access
- Uninstall shortcuts
- Change network connectivity
- Pair with Bluetooth devices
Updates to HERE WeGo may automatically add additional capabilities within each group.
1. Anonymous Coward
Anonymous Coward
Re: Had a look, but...
Would be easier if apps displayed the permissions they didn't use.
2. fuzzie
Re: Had a look, but...
Given what it does, about the only odd permissions there are Phone Call Log and Contacts access. The rest is what you'd expect since you can associate your HERE account, share locations/progress, save maps, restrict updates/connectivity to Wifi only, create/delete destination shortcuts, and manage Bluetooth devices (external GPS or headset).
Welcome to Android's shotgun style permissions model. At least with Marshmallow you can disable/disallow bits for features you don't use.
1. Anonymous Coward
Anonymous Coward
Re: Had a look, but...
Getting access to contacts makes sense too - if you have an address saved to a contact this lets you navigate there without having to copy and paste the address between apps.
1. Anonymous Coward
Anonymous Coward
Re: Had a look, but...
And phone call log would allow you to select a recent call and get it to either lookup that caller in your contacts then get address from there or, perhaps, use Google's phone number lookup system to get an address.
2. Dan 55 Silver badge
Re: Had a look, but...
Log/Contacts/SMS are for Glympse apparently. I've never used it and I've disabled them in Privacy Guard.
3. John Brown (no body) Silver badge
Re: Had a look, but...
"Given what it does, about the only odd permissions there are Phone Call Log and Contacts access."
It probably gives you the option phone the business or whatever you select as your destination. If I can be bothered to pair my Garmin with my phone, it will do that too. I don't pair it though, because then the phone can't be paired with the car and I'd much rather be able to use the phone through the car hifi system than through a barley audible satnav speaker and use the steering wheel buttons for the phone so I don't have to reach up to the satnav touch screen,
3. Charlie Clark Silver badge
Re: Had a look, but...
Doesn't bother me: I'm on Cyanogenmod so it only gets the permissions I give it.
3. Will Godfrey Silver badge
Can't see any footpaths :(
1. Mark 85 Silver badge
Re: Hmmm
I do think I see a Pokémon. Will that help?
4. Sampler
I saw one of their mapping cars yesterday tootling around Sydney
and by tootling I mean reversing back out of an ally that'd been closed off due to roadworks
5. petur
If focus is on routing and destinations, maybe they should have re-branded to THERE
1. Lotaresco Silver badge
Re: THERE
Unfortunately the best name for mapping had already been taken by Northport Systems Inc.
1. Fonant
Re: THERE
Heh, I always thought that was pronounced foo-gar-wee... Far too innocent...
6. Anonymous Coward
Anonymous Coward
There's a reason they're focusing on navigation
It's what they're really good at - their app is great for driving, displaying all the information you need very clearly, including the current speed limit. It's why they've been bought to put their navigation software in all the major German car manufacturers' vehicles. If one of the things the Strategy Boutique said, before suggesting a stupid name, was "stick to your knitting" then they got that right, at least.
OTOH their suggestions for local points of interest are pretty hit and miss, at least in my neck of the woods - presumably because they lack the depth of local knowledge that Google acquires through its search business - so maybe that's why they've given up pushing that aspect of it. Being directed to a "nearest" petrol station 10 miles away, and subsequently finding there were several others just around the corner, does not endear you to the app!
1. Vic
Re: There's a reason they're focusing on navigation
Does it have vehicle options?
I've been driving a Renault van recently, with a *factory-fitted* GPS unit. And it gets the speed limits wrong on derestricted roads...
7. Badvok
Check out, I suspect the site is about to get a lot more traffic.
8. Gene Cash Silver badge
Shit on it and stir
They supremely fucked up outdoor malls (where it's a couple dozen large separate buildings around a collection of parking lots) - they're treated as one big building now, and you need to click into them to find individual stores. It's now rather difficult to determine which building a store belongs to, which makes it difficult to find - the opposite of what a map app should do.
Oh well, now that offline maps actually works in Google Maps, they're a mostly-useless emergency backup. If they start popping up tons of ads and crap, they're gone.
9. Gene Cash Silver badge
And it sucks, because I've used HERE for years, since Google Maps would freeze with T-Mobile's spotty coverage in rural Florida. They saved my butt several times. I'm sad to see them turn to crap.
1. fuzzie
They do have a feedback button/contact. I've used it once or twice and have seen at least one recommendation/suggestion make it into the app. Of course it could've been on the to-do list before.
HERE saved my butt when I discovered Android's locations (without which Google Maps freezes up waiting forever) doesn't work without an active SIM (roaming got messed up) and I could use HERE as electronic map and compasses to find my way.
10. Neil 44 (from BV) is a free, completely offline (once you've downloaded the maps of your choice...) mapping and routing app (Android - don't know about iOS..). Uses OpenStreetMap - so if its wrong, you can correct it. Likewise it has lots of detail available (like house names for the blocks of flats in East London!)
(and yes, @Will Godfrey, it does show foot and bridal paths!)
1. Commswonk Silver badge
Bridle paths. Bridal paths are, I assume, a route to matrimony, and are not normally shown on maps.
2. Charlie Clark Silver badge
Horses for courses: I have both Osmand and Here. If you're driving then good turn-by-turn navigation with optional traffic information is a godsend. I know OSM does navigation, but I don't think it compares well to the big boys.
On the other hand, if you're in the middle of nowhere on your bike and want to get to the next road, then something that knows all the footpaths is just what the doctor ordered. You can also load up GPX.
Both apps let you store the relevant maps on an SD card so the world is pretty much your lobster.
11. Doctor_Wibble
Fire everyone!
There is no 'h' in " 'ere we go ".
And if it's only written once then that's twice that it's wrong. In triplicate.
12. thesykes
Download size
A little more granularity on the download options would be preferable. Lumping all of Europe together into a 10,337 MB file means that I can download precisely no maps, leaving Google's download-the-bits-you-want option as infinitely better for me.
1. This post has been deleted by its author
2. Anonymous Coward
Anonymous Coward
Re: Download size
On my phone, I get choice of which constituent nations of UK I want. I'd have assumed similar for Europe...
3. Dan 55 Silver badge
Re: Download size
I suggest you read further than the first line when you go to Download Maps > Download More > Europe.
1. thesykes
Re: Download size
@Dan 55....Thanks... I think Here need to look at their UI. There's no indication that pressing Europe will do anything other than download all of Europe.. maybe a little + or arrow would indicate that there are more options. It's only when you then see some countries with the download option and others blank that you realise how it works.
It is clear why they've changed the name. It can't be used as a map! One of the functions I use most on Google Maps is just looking where something is, especially in foreign countries. Something on the news, a travel programme, etc. Just a quick search and I know where it is. Here doesn't do that. It only provides directions, something it simply cannot do where you have to fly to get there. New York? Sydney? Nope, can't find a route so won't show you where they are.
2. Anonymous Coward
Anonymous Coward
Re: Download size
I just checked. Europe then gives me these
Albania 86 Mb, Andorra 46.6 Mb, Austria 278 Mb, Belarus 133Mb, Belgium 306 MB all the way down to Varucan City 71 Mb
France Germany Italy Spain, Russia are subvided into smaller sections.
This is on the app on Windows Phone 8.1 though...
13. Battsman
I don't care what it's named...
because it still sucks at.... directions.
I tried to use it twice over the past few months and I'm seriously boggled by the routes it selects. Maybe it's because I'm in the US or something, but the directions were rubbish. Yes, let's drive through the most congested parts of St. Louis to get to the other side of town AND THEN take almost 100% back roads instead of divided highways with 65+ MPH zones.
The good news is the permissions don't matter - it's been deleted with prejudice.
14. Keef
I've been...
I've been using Google Drive for my navigation.
It's bloody useless, I keep going round in circles.
15. Anonymous Coward
Anonymous Coward
I would have thought TomTom was more competitive than Here. Once Nokia bought them they basically stopped any consumer slant.
16. The humble print monkey
knowledge of crowds
The more data you acquire, with a feedback loop, and suitable analisys, the better the potential result. An article not so long ago talked about how long it would take for a contender to overtake google in the mapping game.
The greater the number of people who use wHere, the better the data, the greater the value for the owners.
Getting us non BMW owners to increase the quantity and quality of that data is, I think, a win-win both for users like me, as well as owners of big shineys.
Let the data get good enough, and with sufficient reference points it will, and there is the basis of the dataset needed for the self driving auto-monsters.
I suspect there will be a two or more tier product - that which is free, and that which is bundled, but in the short term, Here isn't building its business model on selling the user.
Just my (recently devalued) £0.02.
17. Anonymous Coward
Anonymous Coward
Poor quality data
Here Maps are pretty bad, nowhere near as bad as Apple Maps, but still pretty bad. It's far away from the quality of Google mapa
18. Lyle Dietz
Too bad the routing is absolute pants. It is supposed to be traffic aware, but it sent me crawling along the motorway before I gave up, dived down the next exit and asked Google to take me to my destination.
The only thing I like about HERE is the speed limit knowledge (when accurate) and that it shows my current GPS speed.
19. Jamie Jones Silver badge
IT Angle
Surely I'm not the only one to notice...
<b3ta mode>
Surely I'm not the only one to notice the big yellow cock-and-balls in the middle of the photo at the top of the article?!?!
</b3ta mode>
20. AlanT1
Rather good as a navigation tool.
I have, for some time, used an android app for navigation on my bike. It is pretty essential and HERE seems to be about as good as you can get. I can here the Google maps lovers ready to hit back and my life would be so much simpler if I could use Google (a mapping service I contribute to) but off line maps is a must for me.
Having said that HERE is slow to update and act on input but until the day whole maps can be downloaded for Google for off line use it will remain a back up service when mobile.
1. Dick Knuckle
Re: Rather good as a navigation tool.
Im not a Google fan per se...but I do find it irksome that people claim products xant do somethi g when all they had to do was RTFM.
Google Maps has always had offline features. I use it regularly.
21. Aging Hippy
Les Barker fans will be singing this already
POST COMMENT House rules
• Enter your comment
• Add an icon
Anonymous cowards cannot choose their icon
Biting the hand that feeds IT © 1998–2020 |
global_05_local_5_shard_00002591_processed.jsonl/25732 | UNCG Gerontology Program
School of Health and Human Sciences
The MS in Gerontology is the only fully online graduate program in Gerontology in the state of North Carolina.
This Master of Science in Gerontology meets the standards for gerontology programs of the Academy for Gerontology in Higher Education (AGHE), the professional organization of post-secondary gerontology programs in the United States.
More information on the MS in Gerontology program can be found at |
global_05_local_5_shard_00002591_processed.jsonl/25737 | Analyzing lone-actor terrorism in context
This article is published courtesy of the Center for Research and Evidence on Security Threats (CREST)
Assessing and managing the risk of lone-actor terrorism is a challenge, as events around the world continue to show. Noémie Bouhana of the Department of Security and Crime Science at University College London suggests a shift in focus from “who and why” to “who and where.” This approach is captured in the S5 framework, which builds on the findings of PRIME, an international project led by Bouhana and funded by the European Commission to understand and counter lone-actor terrorism.
The PRIME dataset includes all suitable lone-actor cases for the period 1990 to 2016, in the United States and Western Europe. It stands at 125 individuals, which begs the question of ecological fallacy: should we make predictions about an individual’s risk level based on statistical treatment of sparse data gathered from such a heterogeneous population? However, while the data we have are not good enough for actuarial prediction, few would claim we should dispense with risk assessment.
Unstable indicators
Our findings suggests that lone actors are not that lone. We found that both physical and online links with other extremists are critical to the adoption and stability of the motivation to engage in terrorism, and the acquisition and maintenance of the capability to act.
To deepen our understanding, we studied the sequence in which indicators occurred. We focused on mental health-related proxies often associated with “individual vulnerability.” We found that the same indicators seemed to signal different processes at different stages. At times, they appeared associated with susceptibility to influence; at others, with exposure to radicalizing environments; at others still, with the event’s outcome.
Psychological distress sometimes seemed related to increased risk, while at other times it seemed to play a protective role, inasmuch as risk appeared to rise after treatment, suggesting that needs-based interventions, to the extent that they alter future interactions between person and situations, could have unintended consequences. For example, alleviating someone’s depression (a good thing) might do much to restore their desire to go out, thereby exposing them to whole new (potentially risky) social environments as a result.
Meaningful differentiation
Comparison between actors on the basis of ideology did not reveal meaningful differences. However, when we stopped looking at types of actors, but modelled the interaction between personal and situational indicators, we identified four kinds of person-exposure patterns (PEPs): solitary, susceptible, situational and selected. What the idea of PEPs suggests is that risk does not reside in any combination of individual vulnerabilities or in any criminogenic environment, but that it emerges from the interaction between specific configurations of individual propensities and particular contextual features.
Rethinking risk
Brought together, our findings imply that vulnerability, motivation, capability, even risk itself, which are often treated as personal attributes, are better conceived of as contingent states, which emerge when people with certain characteristics, themselves dynamic, encounter situations with particular features that are also subject to change. This means that vulnerability, motivation, capability, and overall risk are inherently transient and context-dependent.
With that in mind, to not merely assess, but to analyze the conditions under which unwanted behavior might emerge, we need inference frameworks that can: 1) be applied across the ideological spectrum; 2) guide the identification and interpretation of fundamentally multifinal and equifinal indicators; and 3) clearly articulate how personal factors intersect with contextual factors to generate (or suppress) the problematic behavior.
The S5 framework
S5 was designed to operationalize the theoretical foundation behind PRIME and antecedent projects (see here, and here). In a field where violent extremism has been described as the product of “a kaleidoscope of factors, creating infinite individual combinations“, S5 sets out how five categories of effective factors interact, through processes of exposure and emergence, to generate (or suppress) the risk of radicalization and terrorist action.
At the individual level, what matters is susceptibility to moral change, which plays a key role in the acquisition (or not) of a terrorist propensity. Linking the individual to the context in which propensity change takes place are social and self- selection factors – background characteristics and personal preferences that affect the likelihood of finding oneself in any given place at any given time. These matter because radicalization and terrorist behavior take place in settings with specific characteristics that enable terrorism-supportive moral development (which matters for radicalization) or the situational emergence and maintenance of the motivation to act (which matters for terrorism).
Note that vulnerability arises from the combination of susceptibility and selection factors, not susceptibility alone. These risky settings concentrate in environments with a particular social ecology. The processes that matter for the emergence of these settings, such as a terrorism-supportive moral context, are, in turn, influenced by certain factors at the system level.
Four of these five levels of explanations are concerned with context, not the individual. In other words, S5 shifts the analyst’s attention from who and why to who and where.
This framework makes sense of some common observations. For example, if selection is the mechanism linking individual and environment, then a lack of stable profiles is to be expected: as risky settings displace as a result of systemic changes (such as counter-terrorism policy), new kinds of (susceptible) people get exposed.
Likewise, if we think of motivation as a self-sustaining personal attribute, we might wonder at the relatively low number of lone-actor terrorist plots. But if the motivation to act emerges from – and, crucially, is maintained by – the interaction of person and context, then any change in situation has the potential to halt the move to action. It may be much harder to keep up a stable apprehension of a situation (the perceived provocations, the belief in sufficient capability, the expected rewards) without co-conspirators, whose shared perceptions would otherwise contribute to situational stability.
Furthermore, while most risk assessment tools and models include a dozen or more “factors,” the markers that appear the most reliably associated with involvement in violent extremism are gender, prior criminal history and connections to radical peers. This would support the view that what really matters for the assessment of terrorism risk is evidence of a pre-existing criminal propensity (or a high susceptibility to acquire one) and of vectors of selection for exposure to terrorism-enabling settings. If propensity, not ideology, is determinant, then it is no surprise that some actors have been known to “change the t-shirt,” simply moving from one kind of extremism to another as they got exposed to new radicalizing settings.
Finally, given the prominent role of moral context in the emergence of risky settings, the very low volume of terrorist acts in our societies makes perfect sense. We are resilient to radicalization and terrorism risk because the vast – vast – majority of people simply do not believe that terrorism is morally legitimate, and the stability of our systemic norms and processes of governance keep it so. Which means the reason why so few so-called susceptible individuals ever radicalize or carry out an act of terrorism, is that a lot more planets than just “individual susceptibility” must align for the process to occur.
Beyond indicators
As my colleague, Dr. Paul Gill, put it, “the next big challenges are essentially conceptual.” With the (welcome) multiplication of datasets, risk indicators will proliferate. But if the same indicator can be a marker of risk in one context and a marker of protection in another, if potentially infinite combinations of markers can characterize the same process, if most of the so-called risk factors we rely on are not reliable predictors, then what we really need are risk indications. Not so much inventories of what to look for, but how and where to find it.
For that, we need explicit inference frameworks – analytical models built on the best evidence and the most robust theory available – to structure our risk assessments. These frameworks should be formalized and validated, as Professor Paul Taylor suggests in the latest issue of Crest Security Review, through the systematic evaluation of the decisions they inform.
Yet, we have to recognize that producing more robust explanations will not necessarily improve prediction of individual behavior. Prediction requires knowledge of future conditions (the situations an individual may someday encounter), which is beyond our reach. This, I would say, is another reason to shift more of our focus from assessing “risky people” to assessing “risky contexts.”
Source: Terrorism, lone-wolf | Homeland Security Newswire
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
global_05_local_5_shard_00002591_processed.jsonl/25791 | As a group officer, you can obtain a list of people who have RSVP'd, attended, and/or paid for an event within CampusGroups.
1. Log in to CampusGroups
2. Manage your group
3. Click on Events
4. Select the name of the event of your choice in the events list
5. Scroll down to the list of attendees and select Download Attendees List
Download Attendee List button
6. Select the fields you wish to include in your report
7. Click Download
You will then have a .csv file with the attendance information you selected.
Please contact with any questions.
Did this answer your question? |
global_05_local_5_shard_00002591_processed.jsonl/25793 | What is the level and undertone of all of your extension colors?
Updated 2 weeks ago by Aleksandra
Below is a comparison guide that shows the level and undertone of each of our Luxy Hair colors. It also offers a general comparison to popular hair dyes on the market.
Disclaimer: We do not guarantee an exact match when dyeing your hair to match your Luxies. Applying a certain hair dye can yield different results depending on the starting color of someone's hair (and other factors). We recommend having your hair dyed by a professional. If, however, you choose to do it yourself, a test strand is always recommended.
Was this article helpful?
Powered by HelpDocs (opens in a new tab) |
global_05_local_5_shard_00002591_processed.jsonl/25838 | How To Create The Perfect Thumbnail In Particular AR
As you might already know, Particular AR is all about that curated AR content. That means everything, from the AR content you see there, the name and caption and the thumbnails.
Speaking of that thumbnail, we made this helpful Sketch template that will aid you in keeping that same aesthetic as the rest of the posts. Download, easily modify it with your profile picture and @handle, save and upload it when you are posting your AR content. For those who don’t have Sketch, we included a PNG file you can use as a template.
Happy creating and happy posting!
• Facebook
• Twitter
• LinkedIN
• Pinterest
Tagged in
Leave a reply
We use cookies.
|
global_05_local_5_shard_00002591_processed.jsonl/25852 | Connect with us
Megan Crabtree
Megan Crabtree is the founder and CEO of Crabtree Consulting. Before founding Crabtree Consulting, Megan had a successful professional career in the jewelry industry, which culminated with high-level positions at several of the top leading firms in the retail and manufacturing sectors. Reach her at [email protected] |
global_05_local_5_shard_00002591_processed.jsonl/25863 | Why Was The French Army So Bad In Ww2?
Who surrendered first in ww2?
Why did France lose so quickly in ww2?
Why was the Battle of France Significant to World War II?
The Battle of France was over and Britain stood alone as the last Allied country in Europe to stand against the aggression of Germany. At the end of the Battle of France, Nazi Germany took over direct control of the northern half of France and created a puppet-state in the south called Vichy France.
Why do the French always surrender?
Was the whole of France occupied during ww2?
France was the largest military power to come under occupation as part of the Western Front in World War II. … From 1940 to 1942, while the Vichy regime was the nominal government of all of France except for Alsace-Lorraine, the Germans and Italians militarily occupied northern and south-eastern France.
Why did Germany invade France ww1?
Why did Japan really surrender?
How was France affected by ww2?
The devastation wreaked in France by WWII was nearly total. Its infrastructure and economy were ruined, its cities destroyed and the French that had survived the German occupation had little to eat and often even less money.
What stopped ww2?
How did Germany invade France at the beginning of World War II?
1 Answer. After a period of facing each other without much going on the German army finally invaded France (May 1940) through the heavy forested region of the Ardennes penetrating deeply into French territory and bypassing the defenses of the Maginot Line.
How fast did France surrender?
The defeat of this powerful army in a mere six weeks in 1940 stands as one of the most remarkable military campaigns in history. …
What if France beat Germany ww2?
Who led France after ww2?
Charles de GaulleCharles de Gaulle led the Free French forces in resisting capitulation to Germany during World War II and became provisional president of France in the immediate aftermath of the war. Later he was an architect of the Fifth Republic and was president from 1958 to 1969.
Who really started ww2?
Outbreak of World War II (1939) On September 1, 1939, Hitler invaded Poland from the west; two days later, France and Britain declared war on Germany, beginning World War II. On September 17, Soviet troops invaded Poland from the east.
What happened to the French army in ww2?
Why was France invaded by Germany?
What would happen if France didn’t surrender?
If the French had not surrendered, there would have been many important consequences: The French fleet would have remained in the War, this would have made the invasion of Britain impossible. … France could have continued the war from North Africa. This would have meant that the Axis would not have threatened Suez. |
global_05_local_5_shard_00002591_processed.jsonl/25866 | How to install Adobe applications on your personal machine
Written by Victor Quintanilla on February 3, 2020
NOTE: To use Adobe on PC you must be on windows 10 software. To use Adobe on Mac you must be on macOS High Sierra.
Faculty and staff at SMCCCD have access to these applications with their district user account. District machines should generally come pre-loaded with this software already.
1. To download adobe on your computer visit and sign in with your address.
2. Then click “All your apps” and you’ll be taken to the page where you can select the adobe applications you would like to use on your computer. Click install on the applications you want installed.
3. Once installed you will be able to open the application on your machine and begin using. |
global_05_local_5_shard_00002591_processed.jsonl/25870 | Short Story Saturday: Gregory Sole
Short Story Saturday: Gregory Sole - Photo by Micael Widell from Pexels
Photo by Micael Widell from Pexels
Hello everyone! As part of Short Story Saturday, I have posted another short story, this one entitled Gregory Sole. Please enjoy. Also, if you haven’t already checked out my FAQ on my upcoming book, Magic Once Removed, please check that out as well. Thanks again!
The sounds of a metal bell echoed from the decrepit church tower throughout the old rustic town. “Darn,” the man thought to himself. “Eleven o’clock already. I’ve got to hurry.”
Mud covered his black dress pants and white button-up shirt he had ironed just that morning as he sprinted through the center of town on the previously dirt road. His heavy and clumsy steps made it increasingly difficult for him to move his legs rapidly as he struggled to pry each foot loose while maintaining a consistent stride.
All that could be heard were the sloshing of his boots, his heavy breathing, and his bag that was tied over his shoulder that collided with his side and back. He prayed that the bottles withing that clanged in his bag would not break. The glass was relatively thick but a particularly solid collision would cause them to shatter. Periodically, he checked his vest pocket to ensure the contents within remained in place.
An owl was heard somewhere in the distance but his hoots faded quickly as the man continued his vigilant run.
His legs burned. It wasn’t as if he were in bad shape, quite the contrary. His trips to the gym were a morning ritual. Still, he had several miles to cover in a short amount of time, and even for an Olympic runner, such a feat would have proved daunting. For one who did not quite have that kind of skill, the task was nearly overwhelming. Only his desire to exact justice prevented him from giving up.
Eventually, he arrived at the graveyard. His hands covered his knees as he desperately gasped for breath.
He tried to remember whether he heard the clock strike twelve. He was so focused on the run he could not think of anything else.
Not that allowing his mind to wander would have helped. Had he thought of anything else, had he listened for anything else during the sprint, his mind would have wandered toward the overwhelming odds and at that point, the task would have proved too daunting to attempt. Even then, he might have just missed his appointment.
Ding dong. Ding dong. Ding dong. Ding dong.
Hearing the clanging bell eased his anxiety. It just turned midnight. He arrived on time. In celebration, he adjusted his Stetson, tucked in his shirt, straightened his vest, and retied the knot of his maroon tie.
The ground suddenly quaked. To the man’s right, just outside the entrance, a grave started to glow with a translucent blue light. It started as a small glimmer but evolved to a solid beam that shot into the sky.
All grass within the vicinity of the grave turned brown. The heat from the light was intense. It caused the man to sweat even more than when he was running.
A transparent white figure emerged from the light.
“Are you here to help me?” the apparition asked.
“No,” the man said as he placed his satchel onto the ground. He stretched a bit before continuing to answer. “I’m here to destroy you.”
She swayed her hips as she walked over to him. The corset and skirt she wore with the color and consistency of a black and white photo accentuated her legs and breast. Her pale hair, wavy and hanging loosely down to her shoulders, was obviously once brown or blonde.
The tangible ghoul plopped her arms onto his shoulders as she rested her head against his. Her hands spread across his chest as her fingers impishly played with his buttons and tie. The spirit lifted her leg dangerously close to his groin.
“Why would you do something like that to poor little ole me?” she whispered in his ear.
“I’m sure I had a reason.” The man took off his glasses and wiped them with a burgundy handkerchief he kept in his shirt pocket.
“Wouldn’t you rather solve the mystery of how I died?” She rubbed her legs against his. “My name was Emma Apate. I was, shall we say, a painted lady, a real long time ago. I’m sure one of my mean old customers killed me.”
He pushed her aside and walked a fair distance away from the flirtatious phantom though she never left his gaze. The man wiped his glasses one more time then calmly placed his handkerchief back in his shirt pocket and placed his glasses on his face with both hands.
“Ah yes, I remember. I am here on behalf of all the people you’ve misguided with your seductive charms.”
The specter placed a finger coyly on the side of her lip. “How could you accuse me of something like that? I just want closure and the ability to move on.”
“I know that is not true. You are not who you claim to be.”
Her lips puckered. She pouted with tears in her eyes. “Whatever do you mean? I am too Emma Apate. My spirit cannot rest until I find out how I died.”
“Please do not mock me with your fabricated persona. I know you are not Emma Apate. She has been put to rest. Her murder was solved over a century ago by a skilled medium. Your caller has perished long ago and the grimoire which called you has been disintegrated into ash.”
“Whatever do you mean? I no longer will have gentleman callers? Well, what about you, honey? You look like a man who knows how to butter a woman’s biscuits.”
“Spare me that fake southern tripe. You are a demoness masquerading as that kindly departed woman. You do not wish to avenge a misdeed, quite the contrary. You desire to lead men to Hell.”
He reached into the satchel and pulled out a vial. The man threw it at the apparition’s feet. A green smoke emanated and covered the ghost.
Her white complexion turned crimson. Horns emerged from the sides of her head. A spiky tail sprouted and wiggled between her legs. Both her corset and skirt faded. Cloven feet were revealed when her boots disintegrated. The hair atop her head reduced a few inches and turned a red that matched her skin.
Reluctantly, despite the devilish appearance, the man perceived her to be an attractive individual, perhaps even more so than before because of her fit frame, though what that suggested about the man he’d rather not explore. Her nudity only accentuated her allure. He understood why so many men were willing to follow her into the netherworld.
She threw back her head and exhaled a piercing cackle that reverberated across the hills. The noise caused the man’s knees to wobble slightly, the only crack in his otherwise stoic armor.
The demoness clapped her clawed hands together. “Very good. How were you able to figure that out?”
He pushed his glasses further up his face with his index finger and flashed a wry smile.
“My name is Gregory Sole. My great grandmother was Eileen Videre, a woman especially renowned for her abilities as a kishef-mahker. As you can see I have quite the pedigree. Admittedly, I am not as famous of my great grandmother, but I am still well regarded amongst those in my chosen field.”
“So you are the infamous Mr. Sole. I should have known. Who else would confront a demoness in a graveyard alone wearing such a formal outfit?”
“What do you mean? This is casual wear. I am not wearing a coat or a vest and normally I wouldn’t wear such a gaudy tie.”
“Whatever.” She shrugged. The demoness paced around the graveyard with her hands behind her back which accentuated her large breasts. “Believe it or not, I’m glad you’re here. I was getting so bored. So few people visit me these days.”
“I’m not sure what you expected. This place is literally, well, I suppose, almost literally, a ghost town. I imagine it’s been that way for about a hundred years or so, give or take a decade.”
She was but one of many demons that had risen lately. It seemed as though a national epidemic of sorts was brewing and much of it centered in the northeast. He decided to tackle the biggest issue in New Mexico first, though, because as they say, think global, act local.
The demoness grinned. “I didn’t realize it had been that long since I’ve had someone to play with. I suppose I better make the most of it, then.”
She squatted slowly with both arms at her sides. Her palms faced outward. Gradually, she lifted her arms and rose.
Once again the ground shook. Gregory struggled to stay balanced. The dirt and rocks behind him rapidly shifted. Several pairs of decaying hands penetrated the earth from below. Rotted corpses sprung from their graves.
A pair of putrid skeletal claw-like appendages grabbed the man’s arms and shoulders. Another pair clutched his ankles. Two more grabbed his torso. Several more ripped his clothes as they assisted their allies and pulled the man to the ground and piled on top of him.
One of the undeads’ hands covered the man’s mouth. Bits of skin landed on his tongue. The rancid taste nearly made the man vomit, not that the creature’s firm grasp would have allowed it. Its smell assaulted the man’s olfactory nerves and was enough to make him wretch. Gregory did not have the chance to scream.
Not that he would have. It was not his style. Only his dilating pupils belied his expressionless demeanor as those icy fingers squeezed into his flesh and sinew.
Blood trickled from where his skin tore so and stained his clothing with a sickening cerise. The zombies had yet to use their teeth as they preferred to prolong their victim’s suffering.
Contrary to popular belief, scratches and bites do not cause one to become one of the undead, only demonic magic can do that. Should he escape, the gashes, still relatively shallow and merely flesh wounds at this point, would have a chance to heal. His suit, however, was damaged beyond repair.
Gregory gyrated to and fro on his back dozens of times within a minute in a controlled haste. He did not have much room to move but took advantage of the little space that he was given. He still had to act quickly, though, as his window of opportunity rapidly closed with each passing second.
The shaking proved effective. He freed his right arm, not much, but enough. Gregory reached into his vest and pulled out his good luck charm. It was the only thing that could bail him out of this dire situation.
Bang! Bang! Bang! Bang!
Four shots rang through the air. The bullets had gone through several of the creatures already putrefying flesh like a hot knife through butter.
Two pairs of zombies peeled from the man like layers from an onion. The deafening sound made the others pause.
Gregory emerged from the pile with the COP derringer in his right hand. He pulled and ripped off a zombified hand that remained stuck in his shoulder. Blood spurted from the wound. A swift kick removed the hand that remained clutched to his ankle.
He placed his gun back into his vest. It only had four bullets. Gregory never carried extra as it was only intended for use in desperate situations like the one he had been in only moments ago, though admittedly, he currently wished he brought some additional ammunition as it would have certainly helped.
However, unlike what the movies purport, a bullet to the head with a firearm, even with a shotgun, would have only served as a momentary reprieve. Their bodies would reform shortly afterward regardless due to the demonic spell which regenerated lost appendages, as a few of the creatures eagerly realized.
Adding to this danger was that the summoning demoness continued to beckon zombies to join her until she was defeated or had succeeded in her endeavor and dragged the man to hell.
Only powerful magic could dispel his foes but the man came prepared.
Gregory dashed toward the entrance. His hat flew from his head but he had more pressing concerns than a barren head. He searched frantically for his satchel. It was nowhere to be found.
His head darted rapidly looking for where it might have gone.
More undead emerged from their graves. They knocked over tombstones and toppled over altars as they dragged their feet toward him. The demoness silently stalked behind.
He had no idea where his equipment lied and had no means for defense. His odds of surviving the next few minutes were looking rather bleak.
Gregory searched. Toward the east was the remnants of a rotted fence that was once white now green covered as it was with sickly moss. He ran toward it. An undead creature stepped in front of him. Gregory narrowly avoided his attack with a deft dodge to his right, though his shirt was torn further as a single finger was able to reach its mark.
The man pushed aside several posts and boards as he searched desperately for something he could use as a makeshift club. Age and decomposition made it difficult to find an appropriate weapon. Most of the pieces felt like wet cardboard.
He grabbed the least rotted post. A zombie howled and pounced. Before his teeth found their mark, something smashed against his head.
The undead creature’s jaw and teeth went flying. He crumpled to the ground. It appeared that the post passed its first test.
Gregory’s eyes darted somewhere beyond the crowd. He recognized the noise to his left. It was the sounds of bottles clanging together. The satchel must have been close.
His eyes peered through the sea of walkers but the mass made it difficult for him to find the object of his search. Using the fencepost in his hands as a club, he bludgeoned the walking dead to in his effort to make his way toward the source of the sound.
Scores of zombies fell to his swings. Half a dozen, a full dozen, two or three or four dozen all fell. His foes didn’t stay down for long, though, as their bodies rapidly repaired themselves but it did provide Gregory with the opportunity to move his way through the crowd.
Yet, not all good things are meant to last especially when they are incredibly old and covered with a decade’s worth of moss.
The post shattered after its fiftieth test. Gregory tossed aside the splinters. He estimated that he was about halfway toward his satchel but needed to think of another way to reach his destination.
He invoked his halcyon days when he played fullback for the local high school football team, not to mention his professional experience as a fighter, and propelled himself through the crowd toward the source of the sound.
Long nails ripped his clothes and tore his flesh. He ignored the pain and pressed forward. One of the creatures snatched one of his feet. A strong kick removed him but his boot was seized in the process. Gregory ignored the cold and heavy sock that grew increasingly damp and dauntlessly pushed his way through.
He lifted his arms and hammered one zombie with both fists. A succession of punches to a rotted face allowed him to escape another’s grip. Arms extended, he pushed several backward as his legs continued to grind onward.
The pain was starting to take its toll. Blood started to stream down his back and chest and the admittedly few lacerations to the head were especially draining. Blood trickled and covered one of his eyes.
Zombies continued to emerge from their graves. Their numbers increased such that they nearly covered every inch of the graveyard.
The task seemed impossible. Despite his best efforts, there were too many to move through and the wounds had become intense. There was only so much pain a man could take.
He fell to his knees. Though he continued to push, it was futile. No force was being generated. It was time to surrender.
“My husband’s death ruined my family, ruined our children, and ruined our lives.”
“He only wanted to help but wound up paying the ultimate price.”
“He was my only son. Death provided me no reprieve. Only vengeance will allow my soul to rest.”
Centuries-old voices echoed in his head though he never truly heard them. They had departed from the mortal plane over a century ago. Just distant memories at this point. Most would believe the injustices their family members had suffered that were by now long forgotten hardly warranted a thought. Time made it so nobody cared that good men were betrayed.
Except for one. Only one man could make sure that these men received some facsimile of retribution. There was only one man who could put those souls to rest.
He only knew of these stories because of what he read in books and grimoires. They still spoke to him as if he had heard them just the day before. Their injustices still resonated as if they had been committed against a family member.
Gregory found the strength to rise to his feet. He exerted an anguished and primal shriek as he rammed his body forward with the recklessness of a battering ram and head-butted his way through.
His glasses shattered. Ribbons were all that remained of his fancy pants. The remnants of his shirt fell to shreds along with his vest and tie. This revealed a surprisingly muscular body that even the demoness had to internally admit impressed her. Perhaps even aroused her, a little bit.
Several zombies were flung aside. Others were punched away. A small path was formed toward the center of the cemetery. There still was barely enough room to move but it was enough for him to find a path.
He reached his destination.
Gregory’s satchel was being dragged by one of the zombie’s feet.
He punched the zombie across the face with a night’s worth of rage behind it. The decomposing creature hit the ground with a resounding slosh against the muddy surface. Though the creature was able to near-instantly lift himself back to his feet, the blow removed him from the satchel.
Gregory frantically opened the satchel and grabbed some vials. He randomly slammed them against the ground. There was no time for a meticulous search. Losing his glasses made reading the labels impossible anyway.
The entire yard became a hazy fog of Technicolor smoke. None of the initial bottles he slammed down were the containers he desperately sought.
Ten were destroyed but none of them were the ones he needed. Fifteen more were smashed, then twenty. He regretted lazily taking his satchel with him with everything in it as opposed to carrying only what he required.
He often carried every vial and ward he owned with him in case he encountered other supernatural forces but most served no purpose in this specific circumstance and the odds of meeting another paranormal foe were considerably low. There is such a thing as being too prepared, Gregory was discovering. At least they were harmless for him to breathe in, though that was also true for the zombies.
The mass of rotted bodies closed in on him. Everything he endured would be in vain if he did not find it soon.
There was only one thing left to do, the only logical thing to do in this situation. He didn’t want to because the potions were such a pain to create.
Naturally, the desire to live should have taken precedence, and at some level, it was why he eventually resorted to it. Yet it would be more accurate to say it was done out of frustration than because of survival instinct.
He moved his satchel upside down and dropped every vial to the ground. Twenty vials hit nearly simultaneously.
The world went silent.
Gregory’s legs shook as the ground trembled. A small cloud emerged from his feet forming into a miasma as thick as pea soup. It started small but quickly spread outward and rose to the sky forming a giant mushroom cloud. Soon the entire graveyard was covered by the smoke. The ground shook violently. For a moment, the world went white.
Sound returned. The creatures shrieked in agony.
Their flesh dissolved and their skeletal remains went aflame.
They burned until they were nothing left but dust.
Their remains blew away in a passing wind.
Eventually, the smoke cleared. The world went back to normal, or at least, such as it was before.
All the zombies were dispelled. Gregory limped to where his vest lied. He reached in and pulled out a glass flask that was thicker and of better quality than the ones in his satchel. It possessed the most important fluid so it was only natural it got the best container.
He staggered toward the demoness who stood once again near the entrance. As he approached, she fell to her back, and then lied on her side. Her hand stretched toward Gregory.
When he got near her feet, Gregory uncorked the vial before he said, “I have no idea why I didn’t just do this from the beginning. I have an exceedingly bad habit of talking when I should be acting.”
“Stay away!” she begged impotently. The demoness then bared a claw and fang. “I’ll scratch your eyes out if you come near!”
“Spare me. I know that as a necromancer demoness your attacks are as feeble as a child’s. It’s why you need the undead’s assistance.”
A lustful expression suddenly replaced her look of terror. “How about I offer you something else, then?”
She stood and sashayed toward him and playfully fingered her general chest area as she moved. The demoness placed her arms around his upper torso and wrapped her tail around his waist. The demoness placed her lips against his ear. “If you let me go, I’ll let you do anything to me.”
“Have you ever been with a demoness?”
Gregory stuttered. “I can’t say I have.”
“Imagine the greatest sexual experience you’ve ever had and multiply it by a hundred. You’ll be a tenth of the way there.”
“Are we even anatomically compatible?” He took a glance and turned red. “Oh, I suppose we are.”
“The Big Man Downstairs knows what men want.”
“And you said you’d be willing to do anything, right?”
He whispered in her ear. “I want you…”
“…to burn in hell.” He poured the holy water over her head.
A white flame engulfed the demoness. The ashen smoke glided toward the heavens.
Her feral pain-ridden screams resonated throughout the night sky. She pushed the man aside and teetered away hoping for some sort of salve that could relieve her pain.
The demoness fell apart in bits and pieces. Her body literally disintegrated. The sky split open and a bright white light descended directly onto the wobbling and suffering creature. It surrounded the being.
Then, in an instance, it disappeared and she was gone.
Gregory stood alone. A slight breeze blew through his hair. Gregory took a deep sigh and fell to the ground. He landed with a loud thud on his derriere.
He looked at his feet and though the image was fuzzy, he made out what he believed to be his broken glasses. He leaned over and grabbed them and placed them on his head. Though he found it awkward to look through those shattered frames, it did provide a slight improvement to his sight.
“I kind of wish someone was around to hear what I just said,” he muttered to himself as he stood.
Gregory shuffled to his vest. It was mostly intact so he was able to put it back on though he had to admit that he didn’t particularly like how it felt against his bare skin and the dozens of cuts.
The remnants of his tie were nearby so he picked it up and wrapped it around his neck. His satchel was placed over his shoulder once more though he had to place it carefully so that his wounds were not irritated too badly and the pain wasn’t too immense. Once he adjusted his equipment accordingly, he headed toward the entrance to leave.
He bumped into his missing boot. Gregory sat in the mud to put it on and did not realize until he had placed it over his foot that it was missing the sole. Apparently, his head was still a bit foggy, which was understandable. It had been a long night. A glance at his other boot suggested that it was not likely to last the trip home. They were expensive too. The walk back certainly wasn’t going to be enjoyable. With yet another heavy sigh, he stood and headed on his way.
Something bumped against his feet when he reached the entrance of the graveyard. He looked down. It was his Stetson. The gentle wind must have brought it back to him. It was still in good condition, almost pristine, except for some mud and dirt. He placed it atop his head and smiled. Back home he had the solvents he needed to make the hat shine once more. At least one thing seemed to be going his way.
The demoness’s offer was tempting, he thought to himself as he walked down the road, but he knew it was just a ploy. He wondered how many men met their end after having accepted her proposition. Perhaps some of these men weren’t as innocent as the stories claimed. They may not have deserved damnation, sure, but they were hardly innocent.
“Besides,” he muttered to himself. “She was no Yvette Grail.”
Romantic pursuits of any kind would have to wait. He needed to get home and patch his wounds. He had many but most were merely surface level so they’d be easy enough to bandage and heal. A shower would also be a good idea. After all of that was completed, he’d perhaps have enough time for a few hours of sleep before he had to meet his parents for brunch, then he’d be off to find the Malphesiaus Librum Citare.
One thought on “Short Story Saturday: Gregory Sole
Leave a Reply
Leave a Reply
WP Twitter Auto Publish Powered By : |
global_05_local_5_shard_00002591_processed.jsonl/25873 | The Benefits of Gratitude
Androcles and the Lion
"Gratitude is the sign of noble souls." Aesop
One of my favorite childhood stories is the Aesop's Fable of Androcles and the Lion, and it is still relevant today as the classic tale of gratitude. This is a tale of a simple kind act of a slave who removes a thorn from the paw of a lion, only to meet the same lion again later in one of the legendary arenas of ancient times in which, as punishment, humans were offered as meals to starving and ferocious lions. Both had been captured for these dark purposes. But when the lion saw Androcles he recognized him, and in a dramatic display of gratitude for removing the thorn from his paw he refused to attack. Instead, the lion greeted Androcles affectionately as an old friend.
“Giving Tuesday” – 10 Options
~ attributed to Winston Churchill
The establishment last year of “Giving Tuesday” is the grassroots brainchild of the renowned 92nd Street Y in New York City. The premise of the day is that people give their time, service and money to help organizations that help others and is based on the concept of tikkun olam, a Hebrew expression which in English means, “repairing the world.”
Holiday Gift Giving
Guidelines for Gift-Giving, Tipping and Regifting
Whether you're a student or young professional celebrating Hanukkah, Kwanzaa or Christmas, the holidays usually involve gift giving and receiving. Here are some protocol guidelines and tips to help make this ritual a little easier and more enjoyable:
You know how to handle gift-giving within your circle of family and friends, but what about all those other people in your life? |
global_05_local_5_shard_00002591_processed.jsonl/25886 | Photographing Felix is like chasing a tornado. Always in a rush, always in a mood, always *hates* being photographed. He sees his auntie coming towards him with a camera and so appears the furrowed brow, pursed lips, and a definite-sounding “no”. His auntie would not be beaten. She crept in when he had worn himself out and got her shot.
Those eyelashes. That black curl. That mole. I got him.
Shot with a Contax 645 on Portra 400 film
• greg said:
Beautiful Jode.
• Nataliya said:
FILM!!! someone is still using FILM yahoo :D My middle child hates the camera incredibly hard to photograph always photographing him running away lol |
global_05_local_5_shard_00002591_processed.jsonl/25892 | Fast, continuous interpolation of discrete datasets in Julia
197 Stars
Updated Last
6 Months Ago
Started In
August 2014
Build Status PkgEval Status Interpolations
NEWS v0.9 was a breaking release. See the news for details on how to update.
NEWS This package is officially looking for a maintainer. The original authors are only fixing bugs that affect them personally. However, to facilitate transition to a long-term maintainer, for a period of time they will make a concerted attempt to review pull requests. Step forward soon to avoid the risk of not being able to take advantage of such offers of support.
This package implements a variety of interpolation schemes for the Julia language. It has the goals of ease-of-use, broad algorithmic support, and exceptional performance.
Currently this package's support is best for B-splines and also supports irregular grids. However, the API has been designed with intent to support more options. Pull-requests are more than welcome! It should be noted that the API may continue to evolve over time.
Other interpolation packages for Julia include:
Some of these packages support methods that Interpolations does not, so if you can't find what you need here, check one of them or submit a pull request here.
At the bottom of this page, you can find a "performance shootout" among these methods (as well as SciPy's RegularGridInterpolator).
using Pkg
from the Julia REPL.
Performance shootout
In the perf directory, you can find a script that tests interpolation with several different packages. We consider interpolation in 1, 2, 3, and 4 dimensions, with orders 0 (Constant), 1 (Linear), and 2 (Quadratic). Methods include Interpolations BSpline (IBSpline) and Gridded (IGridded), methods from the Grid.jl package, methods from the Dierckx.jl package, methods from the GridInterpolations.jl package (GI), methods from the ApproXD.jl package, and methods from SciPy's RegularGridInterpolator accessed via PyCall (Py). All methods are tested using an Array with approximately 10^6 elements, and the interpolation task is simply to visit each grid point.
First, let's look at the two B-spline algorithms, IBspline and Grid. Here's a plot of the "construction time," the amount of time it takes to initialize an interpolation object (smaller is better):
The construction time is negligible until you get to second order (quadratic); that's because quadratic is the lowest order requiring the solution of tridiagonal systems upon construction. The solvers used by Interpolations are much faster than the approach taken in Grid.
Now let's examine the interpolation performance. Here we'll measure "throughput", the number of interpolations performed per second (larger is better):
Once again, Interpolations wins on every test, by a factor that ranges from 7 to 13.
Now let's look at the "gridded" methods that allow irregular spacing along each axis. For some of these, we compare interpolation performance in both "vectorized" form itp[xvector, yvector] and in "scalar" form for y in yvector, x in xvector; val = itp[x,y]; end.
First, construction time (smaller is better):
Missing dots indicate cases that were not tested, or not supported by the package. (For construction, differences between "vec" and "scalar" are just noise, since no interpolation is performed during construction.) The only package that takes appreciable construction time is Dierckx.
And here's "throughput" (larger is better). To ensure we can see the wide range of scales, here we use "square-root" scaling of the y-axis:
For 1d, the "Dierckx scalar" and "GI" tests were interrupted because they ran more than 20 seconds (far longer than any other test). Both performed much better in 2d, interestingly. You can see that Interpolations wins in every case, sometimes by a very large margin.
Work is very much in progress, but and help is always welcome. If you want to help out but don't know where to start, take a look at issue #5 - our feature wishlist =) There is also some developer documentation that may help you understand how things work internally.
Contributions in any form are appreciated, but the best pull requests come with tests! |
global_05_local_5_shard_00002591_processed.jsonl/25917 | Foreign Body & Objects Stuck in Ear | Kids Clinic Singapore
Dr Dave Ong: 1-9 Dec & 27 Dec
Dr Wendy: 7 Dec, 28 Dec - 4 Jan
Last updated: 3 December
Call Us
Ear Problems: Foreign Body in the Ear
Foreign Bodies in the Ear
Foreign bodies such as small objects that commonly get stuck in children’s ears include inanimate things (toys, earrings), vegetable materials or Objects stuck in the ear may cause symptoms such as:
• Ear pain
• Ringing noise in the ears
• Extreme discomfort (especially in the case of a live insect)
• Ear infection (if left inside for too long, especially for organic material)
Foreign Body In a Boy's Ear
Small objects can get stuck in children’s ears, causing symptoms like ear pain or discomfort.
What should You Do if Foreign Bodies are Stuck in the Ear?
1. DO NOT try to remove the object without supervision. Such inexpert attempts may push the object further into the ear, causing bleeding or perforation of the ear-drum and swelling of the ear canal.
2. Instead, bring your child to the doctor. Good visualization and illumination with proper equipment is necessary before any procedure can be done in the ear canal to remove the foreign body. |
global_05_local_5_shard_00002591_processed.jsonl/25935 | Bourjois | One Brand Makeup Tutorial
☆ Please vote for me 💗 ☆
♥ ♥ THUMBS UP for more ONE BRAND tutorials ♥ ♥
♥ Expand me for more goodness ☺️♥
Find me on:
• SNAPCHAT: ‘KaushalBeauty’
Happy Light Luminous Primer
Healthy Mix Serum Foundation 55 + 56
Radiance Reveal Concealer – 02
Healthy Mix Concealer – Light
Healthy Balance Powder – Vanille
Maxi Delight Bronzer
Little Round Pot Eyeshadow – Generose, Utaupique, Mauve Star, Noctam Brune
Little Round Pot Blusher – Coral Temptation + Golden Lilac
Volume Clubbing Liquid Liner – Black
Contour Clubbing Waterproof Eyeliner – Ultra Black
Volume 1 Second Mascara – Ultra Black
Eyebrow Pencil – Brun Brunette
Rouge Velvet Edition – 10 Don’t Pink of It
3D Effect Gloss – Romantic Rose
BOURJOIS range available here:
Xem thêm bài viết khác:
1. Your video is the last I found for BOURJOIS however the most helpful as your more my skin tone super informative…Thanks for sharing 🤩
2. you look so freaking pretty
3. i like bourjois as well, especially the mascaras 🙂
4. What are your fave every day concealers? I like a bright under eye too
5. Plz make a pohela boishak makeup tutorial… Plzzzz
6. So gorgeous 😍💞
7. Bourjois Blushes are The Best in the world! I have one of them for like 10 years now and It´s still in a great shape. It NEVER ENDS. I feel like I will able to use it until I die. After all this years it doesn´t even Smell like this old cosmetics. It´s still like new and still soooooo pigmented. Reccomended 100%.
This make up you´ve made loooks SOOOO Pretty i loved It!
8. Porfavor quiero saber cuando llegan estos productos en Argentina???me encanta esta marca😍😍😍
9. красавица
10. Thanks hunny i did love your videos😚😚😚
11. فيديو راءع ،،،ننتظر المزيد
12. How does your skin handle a this makeup
13. Excellent I like your video good you explain everything very well
14. J'ignorais que l'inde partagait la marque BOURGEOIS France…. !!
15. Can u do a makeup look with only MAC products? Like it's my fav brand and I'd love to see you wearing them up❤️❤️❤️
16. Beautiful girl excellent make up artistry
17. girlll I know the video is a year old but I still need to know: in your video you say you use the foundation in shade 55 and 56, but on the screen is says 55 and 58… which one is it? lol
18. You are so pretty and cute💓💓😍
19. You look more fresh and younger without makeup.
20. Ёууууу Я одна похуду русачка 😹😹Как там у вас говорится ( да и у нас тоже ) OMG
21. U wrote 55 & 58 in the video but u said its 55 & 56 (same goes with the description) so which one is the correct shade? 😂
22. bourgeoi has they own eye shadow palette and I think for mascara you should try pushup volume glamour its my favourite mascara
23. hi i like all ur videos.can u make video on ur lipstick collection.plsss
24. This look reminds me of elena gilbert hahaha
25. whats the name of the music?
26. Can you do elf one branded makeup tutorial
27. Can't believe the quantity of foundation this girl is putting on her face, when she has a nice and young skin to start with… she will only ruin her skin on the long term…
28. I so hate this foundation, it's sticky and thick on the skin. I'm talking about the foundation not serum. I cant wait to get rid of it.
29. Very beautiful and simple look! Thank you!))))
30. Can you do a One Brand Makeup Tutorial of Rimmel using their Lasting Perfection 25hr Foundation?
31. I wish we could have bourjois in the USA. I love their serum foundation.
Leave a Reply
|
global_05_local_5_shard_00002591_processed.jsonl/25941 | The problem with probabililities without models
Scott Alexander writes in defense of probabilities without models. I denied the possibility of this before, also in the context of Scott’s steel-manning of Yudkowskyanism, but back then the focus of the discussion was slightly different. So this is a response to the new post, and if I wasn’t trying to revive this here blog it would probably be a comment. It’s not really intelligible without first reading the post I’m replying to.
For starts, what’s a probability model? Actually, while we’re at it, what’s a probability? Even more actually thats one step too far, because nobody has a general answer and perhaps there is none, though philosophers have lots of theories that seem wrong in different interesting ways. Modern mathematicians aren’t really bothered by this because they don’t care what things are as long as they know how they behave. (In bigger words this is called the axiomatic method.)
OK, so how do probabilities behave? Well they are numbers and they belong to events. What’s an event? Well, the mathematician doesn’t know, but here’s how they behave: 1. There is one event that is always true. 2. If something is an event, then “not that” is also an event. 3. If we have a bunch of events, then “all of them” is also an event. In bigger words, the events, whatever they are, form a σ-Algebra. Then the events get probabilities, and they behave like this: 1. All probabilities are all between 0 and 1 (where 1 is sometimes written as 100%). 2. If we have a bunch of incompatible events, then the probability for “any of those” is just all the individual probabilities added together. In bigger words, the probabilities are the values of a probability measure. As far as the abstract mathematician is concerned, that’s it.
In the real world, we don’t really need to know what a probability is either, as long as we can make sure that the things we are talking about obey these rules. Stereotypical example: We want to do probabilities with dice throws. We have a bunch of events, such as “1”, “6”, “an even number”, “either 2 or five” and so on. (64 events total if you are counting.) Then the events get probabilities. Often those will be \(\frac{1}{6}\) for each of “1”, “2”, “3”, “4”, “5” and “6”. But not always; perhaps we want to talk about loaded dice. But however we do it, the probability for “either 1 or 2” better be the summed probabilities of “1” and “2”.
In summary, when we use probabilities in the real world, we have some idea what the events are, we have probabilities of these events and these probabilities aren’t blatantly contradictory. This is – tada – called a probability model.
In practice we will also often need conditional probabilities, i.e. probabilities for something happening if something else happens first. For example, someone could have two different probabilities for being in a car accident, depending on whether they drive drunk or not. That doesn’t change the story much though, because by the Rev. T. Bayes’ theorem conditional probabilities are reducible to non-conditional ones. In the example, if we have probabilities for drunken and non-drunken accidents and a probability for drinking, then we can calculate the probability for an accident given drinking and non-drinking.
Coming back to the dice example, what if the dice, while still in motion, gets swallowed by a dog? What’s the probability of that? Well, the model didn’t account for that, so there is no answer. I silently assumed this to be a non-event and only events get probabilities.
OK, so maybe I should have used a better model including “the dog will eat it”, for a total of 65 events. That probability will be small, but not quite 0, because the whole point of including it is that canine dice engobblement is actually possible. But note that the probabilities for all possible numbers used to add up to 1. Now they will have to add up to 1 minus that small number. So in other words, if my model changes, then so do the probabilities.
Fine, but what if puritan space aliens destroy the dice with their anti-vice laser? If I want to account for that possibility, I’ll have to change my model again, and, in doing so, change my probabilities. And so on, every time I think of a new possibility the model changes and the probabilities change with it.
So what are the real probabilities? You might say those of the correct model. But then what’s the correct model? Well, if you need to bother with probabilities you’re not omniscient and if you’re not omniscient you can’t ever figure it out. Strictly speaking all the probabilities you’ll ever use are wrong.
Can we get around this by just adding an event “all the possibilities I didn’t think of”? Not really. Remember if you add a new event you must assign new probabilities. And you can’t just do that by taking from all other events equally. This is easiest to see in the case of conditional probabilities.
Contrived but sufficiently insightful example: For me it would be slightly dangerous to drive without my glasses. For most other people it would be more or less dangerous to drive with my glasses. Now suppose the puritanical space aliens, figuring that driving more dangerously than necessary is also a vice, try to figure out the best way for humans to drive. Naturally they also study the effect of glasses. Unfortunately they didn’t quite understand that glass-wearers are compensating for bad eyes, so they calculate accident-probabilities with and without glasses and universalize those to the entire population. Maybe their sample has a lot of glass-needers who occasionally forget their glasses. Then they will conclude everybody needs to drive with glasses. Or maybe people who need glasses do always wear them. Then they will probably decide glass-wearing is actually dangerous, because glasses aren’t perfect and glass-needers still have more accidents. Either way, their probabilities for some specific person wearing glasses and being in an accident can be almost arbitrarily wrong. After they start zapping the wrong people with their anti-vice laser someone may tell them why some people wear glasses and others don’t and they will have to revise their probabilities.
But suppose they had wanted to account for possibly missing a possibility beforehand. They could have assigned, say, a 30% probability to “we are missing something very important”. Fine, but for that to help them at all, they also need probabilities for you crashing while you wear glasses and they miss something very important. And they can’t come up with that probability without knowing exactly what they are missing. In other words, you can’t just use catchall misspecification events in probability models.
Then why are probabilities so useful? Because often we can make assumptions that are good enough for a given purpose. In the dice example we are making calculations in a game and are fine with assuming that game will proceed orderly. So we get probabilities and we don’t care about them being meaningless if the assumption turns out to be false.
Similarly, if we design an airplane, we might start with probabilities for its various parts failing and then calculate a probability for the whole thing falling down. This doesn’t tell us anything about planes crashing because of drunk pilots, but that’s not the question the model was made for. Actually, aviation has a few decades of experience with improving the models whenever a plane crashes and then adding regulations to make that very improbable. So nowadays commercial planes basically only crash for new reasons. There remain situations where the crash probabilities are meaningless, but they are still extremely useful in their proper context.
Similarly, an investment banker assumes that everything that could possibly happen has already happened in the last twenty years, and, well in that case it turns out it wasn’t such a great idea.
Now that might sound fine in theory, but hasn’t Scott given practical examples of probabilities without models? Darn right he hasn’t. To see that, let me nitpick the alleged examples to explain why they don’t count.
In the president and aliens example, Scott himself considers the possibility that the involved probabilities are
But actual probabilities aren’t coarse-grained. In probabilistic reasoning you get to be uncertain, but you don’t get to be uncertain about how uncertain you are. All those theorems about Bayesian reasoning being the very bestest conceivable method of reasoning evar presume probabilities to be real numbers i.e. not coarse-grained. In other words, these coarse-grained probabilities are called so only by analogy. They don’t make for examples of real probabilities any more than my printer’s device driver is an example of vehicular locomotion.
At this point my mental model of Scott protests thusly: “Hey, I didn’t admit that! I mentioned it as something a doubter might say, but actually the president should be using real probabilities” (No actual Scott consulted, so my mental model may or may not be mental in more ways than intended.) Fine, but then the example doesn’t work anymore. The president can make his decisions without knowing anything about probability theory. He is making judgments about some things being more likely than others but not attaching numbers to it. In fact he could be more innumerate than a lawyer and it wouldn’t affect his decisions one bit. If we want to make it about real probabilities the example simply doesn’t show anything about their necessity.
Concerning the research funding agency, first of all I’ll question the hypothetical. It’s hard to imagine a proposal for a research project that has a \(\frac{1}{1000}\) chance of success given the best information. The starry-eyed idealists surely don’t think so. So if there is actual disagreement there will be reasons for that disagreement, and if the decision is important the correct answer is examining those reasons, i.e. improving the models. This is actually a large part of why real funding agencies rely on peer review. Using probabilities here is somewhat like the global warming example in my above-mentioned prior post on a similar subject, where the entire point is that the probability relates to a model I wouldn’t want to use for real decisions.
But perhaps all competent reviewers got killed in a fire at their last conference, so let’s skip that objection for least convenient possible world reasons. Also, Scott notes similar decisions can and often should be made informally, in which case it’s not real probabilities, exactly like in the president and aliens example.
Let’s advance to the interesting point though. Scott says:
I’ll start with the accuracy checking use. If you’re guessing only once the probability doesn’t help at all. You’ll either be right or wrong, but you’re not getting a correct probability to compare against. That’s why the foundation director makes the check for a 1000 similar projects. If she has a 1000 similar projects that’s a strategy I can endorse. But at that point she has informally established a probability model. She has established events, namely combinations of succeeding and failing projects. This rules out any unforeseen possibilities, like the agency’s funding being slashed next year, nuclear war, the communist world revolution, and raptures both Christian and nerdy. That’s fine, because it’s not the kind of circumstances these probabilities are meant to think about. Furthermore, she has established probabilities of the events by (perhaps implicitly) assuming that the individual projects are equivalent for success-probability purposes and statistically independent, so they won’t all succeed or fail together. As long as she wants to reason within these assumptions, I’m fine with her doing so probabilistically. But notice that the probabilities get totally useless as soon as these assumptions fail. For example, there may be a new idea about what the natural laws might be and 200 proposals to exploit it. Those proposals will fail or succeed together and thus not be any help in predicting the rest. Or the next batch of proposals may be about ideas she knows more or less about, so they can’t be lumped with the old ones for accuracy judgment.
In summary, the probabilities are very useful as long as the implicit assumptions hold and totally worthless when they don’t. Also note, that the probability calculations are the boring part of the judgment process. All the interesting stuff happens in deciding which projects are comparable, which is the non-probabilistic part of the thought process.
It’s very similar with comparing people’s success rates. Here the implicit model is that people have a given success rate and those are independent. That’s often fine, but as always it breaks down if the (implicit) modeling assumptions stop to apply. For example, people may be experts on some things and not others and then their success rates will depend on what the problems of the day are. They may also listen to each other and come to a consensus or, worse, two consensus neatly aligned with political camps. Those are situations where the probabilities won’t help much.
The prediction market is slightly different: Here we are assuming someone else has a better model than we do and is willing to bet money on it. This is indeed a case where we use probabilities in a model we don’t know. Still, someone else does and our probabilities won’t be any more correct than that model.
Bottom line: All examples of probabilities being really useful are also examples of (at least implicitly) established models. And then the usefulness extends exactly as far as the modeling assumptions.
Scott actually came up with this in a context: estimating the probability of Yudkowskyan eschatology.
Personally, I find this a lot less interesting than the part about probabilities without models. But still I’ll comment on it very briefly: I think in that context probability talk is a distraction from the real question. The real question is if we should worry about those future scenarios or not.
It can be clouded in discussions about whole categories of models. For example, I would be inclined to reason about Yudkowsky the way Scott reasons about Jesus: There are 7.3 billion people in the world and world-saving-wise most of them don’t seem to be at a disadvantage compared to Eliezer. So models assigning chances much above \(\small 1.3\times 10^{-10} \) are implausible. Scott would probably reply that Eliezer is more likely to save the world than other people, and that could lead to a very long argument if either of us had the time and nerve to follow it through.
But notice that that argument wouldn’t be about probabilities at all. The arguments would be about what kind of scenarios should be considered and compared with what, and the potential conclusions would be about what we should do with our money. Also, probabilities wouldn’t help with accuracy checking or comparing us, because we’re talking about a one-time event. There is nothing the number would add except an illusion of doing math.
Posted in Arguments, Math | Tagged , , | 16 Comments
Last scene of the fourth act
[Hindsight note: This prediction was wrong.]
Posted in Politics | Tagged , , | Leave a comment
Assumptions behind a curtain
At this point I’ll make a slight digression on heritability.
The motte:
Now for the bailey:
Posted in Arguments | Tagged , , | 7 Comments
Against realism
Leah Libresco is stymied at this week’s edition of her Pope Francis bookclub. (You won’t be able to follow the rest of this without reading that post.)
I’m not guaranteeing for my own interpretation here, but I think the problem is a scope error.
Leah seems to think of the general project of moral discernment, but right here Bergoglio seems to be talking about a particular sub-project. Going by the first page, the intent of the whole chapter is pre-discerning typical temptations affecting the making of “the various apostolic decisions we must make in our pastoral work/efficacy”. (Or something like that, I’m going by the German edition here.) So it’s not just discernment in general, it’s discernment on evangelizing and in particular evangelizing the culture.
In that context, the struggle at hand is not the struggle for every individual soul but the cosmic one, which in fact is already won. Or more precisely it is ongoing but we know the enemy is fighting in an irrecoverably lost position even if it looks like he’s winning a lot of the time.
The pessimism Bergolglio talks about would then basically boil down to loosing sight of that victory and reducing the struggle to what it sometimes looks like.
For example, from the inside compromising eternal goods for temporal ones often looks like making the sacrifices necessary for winning the battle. An example of the example would be identifying one’s Christianity with a political side and then treating every election as a bonsai eschaton. Looking at it this way, the following section on separating wheat and chaff before the time looks very connected.
Now I’ll go on to blatantly substitute my reflection for Leah’s:
One of the underlying ideas here is that, once one has made a fairly stable decision for good, evil will mostly present dressed up as good, or, to say the same in Jesuit, sub angelo lucis. But then it needs a costume appropriate to the context. So basically examining different contexts and thinking of how evil may look there is a heuristic for figuring out costumes evil may be wearing. This is somewhat similar to the modernist project of cataloging fallacies and biases, just for morality rather than rationality in general.
Summarizing in a very “anacultural” way, I think this chapter is mainly about evil dressing up as practical rationality. Bergoglio has several examples of how it may do so: By the pessimism route (pessimism seem like realism and realism is rational), or by urging premature separation of wheat and chaff (categorizing feels super-rational), or, somewhat obviously, by general sterile over-intellectualization, or by slacking in petitionary prayer (petitonary prayer often seems impractical).
And he categorizes all of this as failures of faith, because they separate a theoretical faith from practical efficacy. It’s interesting to translate this to my reframing: When evil dresses up as practical rationality, it’s actually trying to separate our epistemic and practical rationalities.
By the way, my spell-checker wants to correct eschaton to Charleston. I suspect this would be super-funny if I ever had been there.
Posted in Meditations | Tagged , , | 3 Comments
Hi everybody
As you can see, this blog is presently inactive. That’s because I’m all stressed out on a new job and moving houses next week. The blog will rise again, but not very soon.
Posted in Meta | 2 Comments
Models as filthy water
(One doesn’t pour out filthy water if one doesn’t have pure [water]!)
I think he was right. Running a government with loads of allegedly reformed Nazis was terrible and had some very bad consequences in actual policy, but it’s not like the people complaining about it had any realistic alternatives to offer. So sometimes we must make do with filthy water.
This is one good objection to my last post, where I ranted about Less Wrong/MIRI/CFAR folks trying to eat the menu by promoting some simplified mathematical models as the definition as rationality. Sure, someone might say, these models are filthy water, but we can’t think without simplifying, so we don’t have pure water, so we can’t throw out the filthy water.
As an example, let’s look at probabilistic reasoning. I argued that it is useful if (a) the range of potentially relevant events is properly understood and (b) some way exists to assign them to categories, and (c) we have enough experience to have some idea of how often our guesses for a given category turn out correct. This is most paradigmatically the case if the events are arbitrarily repeatable (in which case probabilities are expected frequencies), but some other use cases are close enough. Essentially this makes probabilistic reasoning into a kind of meta-model: It works as long as simplifying assumptions making (a-c) true are pure enough water. Which, if any, simplifying assumptions are pure enough depends on the context, which is why we shouldn’t talk about probabilities without the simplifications being at least implicitly specified. So probabilities are great for handling one specific kind of uncertainty. On the other hand they totally suck for the kind of uncertainty that is rooted in sui generis cases or the knowledge that our model is misspecified but we don’t have any better model yet. And we do have purer water for that kind of uncertainty: It’s the “classical rationality” the canonical writings of Less Wrong consider outdated.
I’m not saying probabilities are bad, I’m saying they are sometimes good and sometimes bad and we have at least some vague rules of thumb for when they are good and when they are bad.
Posted in Arguments | Tagged , , | 7 Comments
The disappointing rightness of Scott Alexander
You still need to read the whole thing or else what follows won’t make much sense.
More specifically, if I met a CFAR employee in real life and asked them to pitch their version of rationality to me, I could easily imagine his dialog happening with me in the role of the student. And I would be that stubborn because giving them a number – any number – would seem like a concession that there is a correct if unknown number and only one such number and I don’t believe that because I’m a frequentist. Let me explain that in a more long-winded way.
CFAR has a page on what (they think) is rationality and I think it’s simply wrong. According to them
For a cognitive scientist, “rationality” is defined in terms of what a perfect reasoner would look like.[…]its beliefs would obey the laws of logic[…] its degrees of belief would obey the laws of probability theory[…] its choices would obey the laws of rational choice theory.
According to their claims, the reason we aren’t perfect reasoners is basically because we run on sucky hardware.
For starts, a perfect reasoner lives in a probability space and all its reasoning is about the events of that probability space. It can be mistaken, but, by definition, it can’t fail to at least consider the correct answer. And then it has consistent if possibly wrong probabilities for every one of those possibilities.
A perfect reasoner never needs to ask what probability space a probability lives on, because, by definition, every probability it encounters lives on the same one. The lack of that convenience is a problem for any real reasoner, because you can’t have a probability without a probability space. Probabilities without probability spaces are quite simply meaningless, exactly like asking if a crocodile is greener than long.
The most clear cut example of probability models being useful is for random events that can be arbitrarily repeated. The classical examples are throwing dices, flipping coins, etc. but also e.g. repeated error-prone measurement of a physical property. In those cases probabilities will correspond to frequencies in the long run. There are still some imposed assumptions in such models. For example, in the real world a thrown dice could fly into the fire and burn rather than producing a number from one to six and the probability model doesn’t account for that. But still, the numbers have a very clear meaning in that kind of model. If I say there’s a 50% chance of the coin coming up heads, I know what those words mean. I’m not radical enough to call those the only kind of good probabilities (let’s call that radical frequentism) but I do think it’s the prototype and other probabilities are probabilities by analogy to this kind.
The next best kind is if I have non-repeatable events that are still similar enough for me to make good guesses by forcing them into a model that treats them as identical and thus repeatable. This is e.g. what an insurance does. Of course there aren’t thousands of identical houses occupied by identical residents but treating many different houses and residents as identical is close enough to mostly work. Sometimes I can do the same. For example, I don’t get a few dozen identical worlds to see in how many of them a prediction turns out true, but I can come up with categories of predictions I am about equally sure about and then see how often I’m right on that kind of prediction. If I am reasonably sure about my categorization I’m fairly comfortable doing that. A popular way to formalize this kind of thing is betting odds and in some situations that works fairly well. To be honest, I probably would be willing to grant a probability for my computer breaking down under this rubric, as long as that interpretation is understood. So if I say there is a 0.6% chance of my Computer breaking down this month, I know what those words mean.
This approach gets gradually worse as my similarity judgments get less confident or relevant. For example, what’s the probability that human emissions of greenhouse gases play a large roll in global warming? A few years ago I looked into what I would have to read before I would feel confident actually arguing on that question and it turned out it would take about two months of full time work before I would think myself worth listening to. Given that I don’t have any power or influence, I decided my having a correct opinion on this question isn’t important enough to justify that investment. This doesn’t quite prevent me from categorizing and assigning a probability. I know that that question is studied in comparatively hard sciences and that organizations aggregating the opinions of the scientists involved report the answer to probably be yes. I also know that the area of research is fairly young, that there are some dissenting voices and that the question is politically charged on both sides of the question. Ex ante et ex ano, I’d guess that the majority will be right about two out of three situations like this one. So technically I can assign a probability of about 67% to human emissions of greenhouse gases playing a large roll in global warming. But this probability is far less useful than the ones I talked of before. Because if I ever needed to make an important decision this question was relevant to, the correct approach would not be to plug 2/3 into any calculation it would be to do my homework. I wouldn’t even offer bets on this kind of probability because that would just invite better informed people to take my money. Given that probability models are justified by being useful that is quite an indictment. Still there is some connection to reality here. In fifty years everyone will know the answer and then I can see if the scientists were actually right on two out of three such questions. So if I say there is a 67% chance of them being right, I know what those words mean.
OK, let’s add another straw. According to present science, the law of gravitation is \(F_g=\gamma \frac{m_1 m_2}{r^2}\). In principle there could be another small term, so maybe it really is \(F_g=\gamma \frac{m_1 m_2}{r^2} +\gamma^\prime \frac{m_1 m_2}{r^{42}}\). If \(\gamma^\prime\) wasn’t too large, our measurements wouldn’t pick up on this and science wouldn’t know about it. I don’t believe this to be true because of Friar Occam’s razor, but I do think it’s possible. So if it’s possible, what is the probability of it being true? If you shrug that is exactly the right answer, because if you told me that chance was \(x\), I seriously, honestly wouldn’t know what those words mean. This is a different kind of not knowing, because my uncertainty about models is so much more important than my uncertainty in models. With global warming my model sucked, but I at least knew which sucky model I was reasoning in. Here I don’t even know that.
Or what’s the chance of murder being evil? I’m quite sure it is evil and I do think that is a question about objective reality rather than mere preference, but I’m also quite sure it is not an empirical question. There is just no way to tie this up with any kind of prediction so talking about probabilities in this context is simply a category error.
Of course in the real world communication is contextual and often people talk about probabilities with the model being understood implicitly. And that is fine as long as it isn’t the question at hand, but if I’m talking Bayesianism with a Bayesian, giving them a belief number they will interpret in a model-free way is just letting them beg the question. So if I was the student in Scott’s dialog I wouldn’t let Ms Galef put any belief number on the computer breaking down either, even if she acknowledged that number was a guess, unless she also acknowledged even the right number relating to a specific model and possibly being different in other models. It’s not just that this number may be wrong, it’s that there may be no such thing as the right number. And behold Scott getting this, in his comments he even talks about an example of “weird failure[s] of math to model the domain space like Pascal’s Mugging”.
So looking at it we still have some differences (for example while he no longer seems like an orthodox utilitarian, I think he still is an orthodox consequentialist), but on the big picture our attitudes to mathematical decision making now mainly differs in emphasis. I say those models may be very useful, but they are still wrong and he says those models may be wrong, but they are still useful. The still useful part may be captured in his assertion that “imperfect information still beats zero information”, and that is quite true as long as long as we remember the complement that I might formulate as “but zero information still beats false information”.
The disappointing part of this comes from me having assigned Scott the role of the intelligent champion for the Yudkowskian/MIRI/Less Wrong/CFAR world-view. From my viewpoint the entire point of that philosophy is believing that those models are not only useful but correct. They actually want to build a perfect reasoner and expect it to be a perfect reasoner in the non-technical sense of the word. And when they don’t call it an AI they call it a Bayesian superintelligence because they actually expect it to work by manipulating Bayesian probabilities all the way down. (Which is presumably why they don’t call it a polyheuristic superintelligence.) And they talk of programming that machine to maximize “the coherent extrapolated volition of humankind” as if those words had a meaning. Actually that’s my central criticism of Yudkowskyanism: Basically all its teachings are based on this one mistake of taking a vaguely mathematical or at least math-sounding model vaguely appropriate for some problem domain, absolutizing it and then running far far beyond the problem domain it was vaguely appropriate for.
Of course more seriously I do realize Scott isn’t defined by the roles I privately assign him and I do think it is better for him to be less wrong than before and I’ll just have to reassign him as the champion of his own syncretic philosophy. But now I have an unpaid vacant position for the champion of Yudkowskyanism, for Scott is no longer qualified. So there.
Posted in Arguments | Tagged , , | 6 Comments
Samurai Mormon
This cracks me up.
Posted in Minor notes | Leave a comment
Oversimplification by Catholic cardinals and atheist bloggers
The new evidence is a then secret but meanwhile declassified cable from the US Roman embassy to the state department that was recently published by Wikileaks. The cable in question reports on what Archbishop Benelli, then a high-ranking Vatican diplomat said in a rant to Robert Illing, then a US diplomat at the Holy See. And a lot of what he said is indeed very, very bad. Basically Benelli thought things were going fairly well in Chile amd the reports of the new regime systematically murdering its opponents – which we now know to have been clearly true – were just so much communist propaganda designed to detract from this setback for communism. He based this on the report of cardinal Silva – the guy who around that time was founding his first oppositional human-rights organization – whom he thought more sympathetic to the old regime than to the new one. He noted that
and complains that
So basically the Vatican’s diplomacy department fell for the new regime’s propaganda hook, line, and sinker, unsuccessfully tried to convince other people of it, and blamed the toppled regime for the cup, all while raving about everybody else being victims of communist propaganda. I don’t know if I should laugh or cry.
I agree this is evidence of the Church being run by corruptible mortals, not to mention the occasional idiot. But the “political organization interested primarily in its own power” part doesn’t fit the facts either. (At least not in this case, history does of course have examples of that too).
With Allende gone and under the benevolent gaze of a govt many of whose members view the cardinal’s leftof- center stance with some suspicion, the attack on him has been renewed and may be continued. The latter is especially possible if Silva follows advice given to him in Rome (as reported REFTEL) to press Junta for greater moderation.
(Considers? Remember this is the state department under Nixon and Kissinger, which actually did support the Pinochet regime.) So the Vatican picture of the situation didn’t remain that rosy either.
Basically that leaves us with Benelli’s first reaction of totally falling for the regime’s propaganda. As far as I can ascertain, the credibility of the atrocity reports was debatable at the time, though of course now we know they were true. For example, about three weeks earlier, a New York Times article explains how the Junta sucks but hedges in passing that
the reports of largescale executions of alleged leftists may not be true
Of course “debatable” doesn’t mean “whatever”. Benelli confidently picked the wrong option, decided everyone else was a deluded propaganda victim and then actively tried to convince others of that standpoint.
Did I already mention this was a failure? Let me do so again: this was a failure. But it’s not like that kind of failure only happens to cardinals.
For example, JT Eberhard has a story about the Catholic Church. In that story it is a political organization interested primarily in its own power. And he thinks he has very good reasons to believe this. So then he ran along media reports of this cable. Most of those media reports actually were of the “man were those folks dumb” variety, which is a fairly obvious take. But with just a little bit of oversimplification it fits the story of the power hungry Church really, really nicely. So he concluded the Catholic Church must have been in league with Pinochet. And if you don’t look for evidence incompatible with that simple story you don’t even have to suspect it’s an over-simplification. To be fair, I didn’t notice any other atheist bloggers talking about that story, so he doesn’t seem to have been very convincing either.
Epistemic morals:
• Also, did you note how most of this is speculation concordant with a simple story? It is my best guess and short of telepathy I can’t disconfirm it. But it is also quite possible that Benelli and/or Eberhard went wrong for totally different reasons.
Confusion and the Morning After Pill
About two months ago the German bishops made the news with a statement on the Morning After Pill and rape. I was dissatisfied with basically all sides’ knee-jerk reactions but also too busy to explain lots of details. So here’s my “it’s complicated” post on a question essentially nobody cares about anymore.
First some cultural background. In Germany, abortion is not a matter of intense political discourse. The law is that a woman can get an abortion within 12 weeks of conception after a forced counseling session. Often the government will pay for it. Abortions later in pregnancy are available for health reasons. There is an increasing psychology-creep in those health reasons, but mostly they are still either fetal deformities or actual health reasons. Technically abortion is illegal but not punished, but most Germans aren’t even aware of that distinction. You might notice that this is pretty much the wishy-washy situation large parts of the United States would end up with if the question was up for democratic decision. That’s exactly what happened in Germany decades ago, and while the result is totally incoherent it also enjoys so broad popular support the question has basically dropped off the public agenda. Of course the Catholic Church is opposed, but then it isn’t particularly fond of divorce either, and political discourse pays about equal attention to both positions.
With most people not caring and most of those who do care fighting more realistic battles the cranks tend to stand out among those who remain. When I was at the March for Life a year and a half ago (I was too sick this year), I was very uncomfortably aware of the large-sign-guy whose reason for opposing abortion actually is that the race will be harmed if women aren’t forced to breed. Of course there were more than two thousand protesters more sane than that guy as well as a few dozen counter-protesters less sane than him, but still the cranks stand out in a small movement. And even on the comparably normal side the evaporative cooling is very noticeable. For example, I returned home from that march in a bus full of Evangelicals. There was a young girl running up and down the bus, and when she saw my rosary she squealed “coooool chaiiiin” and wanted to touch it. I let her, but I sat there scared stiff, because if she had taken it to her parents they probably would have thought I was seducing her into idolatry. Or maybe I’m just paranoid, but then I had been spending the last hour talking to seat neighbors who weren’t quite sure if Catholics can be saved. This is a very unusual experience for a German.
So basically the pro-life movement is very small and even many good pro-life people wouldn’t want to stand too close to it. I think the bishops should try to take it over rather than standing there without any plausible course of action, but then that’s a different question.
The point here is that there basically is no abortion debate in Germany. And if you can’t even get a hearing on the simple cases, there is very little pressure to sort out the details of hard cases. So while all German bishops are honestly pro-life, until a few months ago most of them probably hadn’t spent as much as ten minutes thinking about what consequences that may have for the Morning After Pill in cases of rape. The average German bishop probably knows a lot less about this than the average Catholic blogger in America.
On to the medical background, the Morning After Pill’s primary effective mechanism is preventing ovulation, i.e. the egg actually becoming available for fertilization. In cases of rape, that mechanism is totally OK with Catholic teaching. The bad thing about contraception is the separation of the unitive and procreative aspects of sex, but that’s clearly not what a rape victim is trying to do. In more modern words, the Catholic church knows that rape isn’t sex and has known so long before that particular question arose. For example, celibate nuns in dangerous countries are allowed to use the normal Pill in case they might be raped. Some trads are grumpy about this, but they are just ignorant of actual magisterial teaching.
The problem is that the Morning After Pill probably also has a secondary effect of preventing implantation. That leads to the baby’s death and is not something we can set out to do.
Then in January a raped woman visited a government-run emergency room on a complex of buildings that also hosts a Catholic hospital. The doctor on duty prescribed the Morning After Pill and then called the hospital to arrange sending the patient over for evidence preservation – which it of course no longer could provide. Then she called another Catholic hospital and got the same response. After getting the patient admitted to a non-Catholic hospital she contacted the media. And the story immediately got shortened to “Two Catholic hospitals refuse to admit rape victim because of Morning After Pill concerns”. And there was a great shit-storm.
This is probably the first time the matter really came to any German bishop’s attention. And while Cardinal Meisner – one of the most conservative German bishops and the one in whose diocese all this had happened – consulted the experts real quick the story seems to have gotten mangled. While actually the pill has two effects he seems to have understood there were two pills, one working against ovulation and one against implantation. And then he announced the (obvious in Catholic moral theology) conclusion that the ovulation-preventing pill was OK while the implantation-preventing one wasn’t. He also noted that a Catholic hospital could also give out honest information on what was available elsewhere, provided the Catholic position was also explained without exercising pressure.
And then, a week later, the German bishops’ conference discussed the same matter. And then they announced this:
Now that trust in Catholic hospitals figuring it out seems a bit optimistic, given that even the bishops haven’t figured it out yet and doctors in Catholic hospitals aren’t moral theologians or even necessarily Catholic. So basically it boils down to “We’re starting to work on the guidelines now and until we’re done it’s all up to the individual doctor”. It’s reasonable to suspect that some doctors might decide according to very different standards. To be honest, I think that is a bit of a cop-out. But then it is quite obvious the bishops didn’t have a clue about the practical side of the question and couldn’t get one in time. So it’s not very satisfying, but I don’t see much better options either. Of course nobody payed any attention to the part about making the necessary differentiations later. And the part about the doctors deciding until then essentially got shortened into “German bishops allow the Morning After Pill”. And that is the story that went around the world.
Other than that, I didn’t find any sides reaction convincing. The liberal reaction was basically “Great, so now that’s settled”. No, it isn’t. Absolutely nothing changed about Catholic moral theology, trying for the abortive effect is still a no-no and all the hard questions are still hard. But then what I heard from most conservative Catholics wasn’t much better. A lot of them announced that we basically must go back to a total ban because the good pill Meisner talked about doesn’t exist and we can never be 100% sure the Morning After Pill doesn’t prevent implantation. Which is equally wrong, because it totally ignores the doctrine of double effect. And almost everyone is glad that the shit-storm is over. That kind of misses the question what will happen when the differentiations are made and the media discovers the “everything permitted now” narrative isn’t quite right. So basically everyone reacted to caricature versions of the story and my reply to basically everyone is “it’s more complicated than that”.
Kind of boring for a moral, huh?
Posted in Politics | Tagged , , | 18 Comments |
global_05_local_5_shard_00002591_processed.jsonl/25946 | To sum up Working out our Play Muscle: play for thirty minutes a day. Yep, gotcha. How about play for eight, nine or ten hours every day? That’s what me being a pirate is all about. I play almost all day, every day. A couple years ago, I figured out that work is a whole lot more manageable and livable if it’s a game. I make up games during meetings, I turn stupid tasks into something subversive or silly. I make coding into a puzzle or a race. I see how much faster, better, smaller, neater, more complete I can make something than some mythical villain I pick out (look out, it may be you). I turn a gigantic task like getting an entire company to embrace web standards into a game of pirates…
I may be crazy, but it keeps me sane.
By Kevin Lawver
|
global_05_local_5_shard_00002591_processed.jsonl/25960 | Terminator 2: Judgment Day ★★★★★
I read once about how back in the 30s and 40s MGM executives would show Buster Keaton's The Cameraman to every comedy screenwriter and director on the lot, saying "this is what we want," and getting a steady stream of quasi-Cameraman remakes (including, for example, Night at the Opera) for their trouble. Now as far as I know, the filmmakers behind the current wave of scifi blockbusters aren't using Terminator 2 as a direct reference point, but they might as well be.
But why is this so much more effective than 99% of the movies in its wake? Especially when it has so many of the necessary evils of this kind of movie, like dopey catchphrases and music video tie-ins? Part of it is probably the physicality of it, the unfortunately bygone product of having real stunts, real crashes, and real explosions punctuating the (inexplicably still cool as hell) CGI. But I think it's also because of how HEAVY this movie is - one famous sequence is literally about what happens to the human body during a nuclear explosion (it turns into papery ash before disintegrating completely, FYI). You'd never see a scene like that in a comparable movie today, too depressing. But it's here, and it's just one scene of real darkness out of many, that never overwhelm the exciting and often quite funny tone that James Cameron manages to strike here better than he ever did before or since.
I was never a big fan of Linda Hamilton in either of these two movies, but this time around I learned to appreciate what she brings to the table - first of all, she seems legitimately out of her mind, in a way that, again, you'd never see in a big PG-13 superhero movie nowadays. For some reason I'd never realized how intense the scene where she attacks the Dyson home is, how insane it is to see a harrowing home invasion in a movie like this. Secondly, the way she talks in this weird military jargon - "John, you're on weapons detail" - I used to think it was cringe-worthy but this time I realized it's SUPPOSED to be cringe-worthy, and it also happens to be completely true to her character. She's John Connor's embarrassing mom!
Xander. Fucking. Berkeley.
Joe liked these reviews |
global_05_local_5_shard_00002591_processed.jsonl/25977 | About 10 years ago I read the Maltese Falcon. It was a good read, but I remember being shocked by the blatant homophobia. Raymond Chandler's the Big Sleep was more subtle about it, but definitely still homophobic.
Obviously, homophobia was a lot more prevalent then. However, this doesn't explain why it became so much more prevalent in detective fiction. I'm sure Conan Doyle would have been homophobic, but he didn't make Moriarty gay... Either it didn't occur to him, or he didn't think his audience would respond to it.
• 4
I'm sure Conan Doyle would have been homophobic – [citation needed]; also see the beginning of this question – Wrzlprmft Mar 28 '18 at 14:11
• I suppose I'm assuming that because of the times Doyle lived in, and because Doyle was fairly mainstream for the time - a big supporter of WW1, for example. It was a crime for two men to have sex. Doyle was capable of taking on the establishment where he perceived an injustice, and apparently didn't perceive one here. The fact he was the friend of Oscar Wilde (some of my best friends) doesn't automatically mean he wasn't homophobic – Ne Mo Aug 8 '18 at 7:09
Interesting question. Regarding your observation about the greater prevalence of concerns with homophobia in detective fiction vs other fiction genres, that seems like a bit of a stretch conclusion...maybe even premature. In other words, more cross-genre evidence is required in support of the claim.
What's worth noting (as you've done) is that there has been a slow diffusion or evolution in US culture with dominant or majority attitudes towards homosexuality from 'the love that dare not speak its name' to its tolerance and acceptance in some segments of society. It may seem hard to understand today but when Chandler and Hammett were writing (the 30s) cultural prohibitions were such that it would have been considered avant garde just to broach the topic. One 'safe' way of doing this was to mention it while simultaneously expressing disgust or hatred for the preference. Tracking these attitudes back to 19th c England and Sherlock Holmes is more complicated but one good index of their times is the case of Oscar Wilde, the gay writer, playwright and Victorian contemporary of Conan Doyle, and his imprisonment for 'gross indecency with men' (https://en.wikipedia.org/wiki/Oscar_Wilde).
The thing to bear in mind is that such shifts in cultural attitudes are like pendulum swings. There may be tolerance with LBGT issues in the 'dominant' US culture today but that can change pretty quickly with a reimposition of repressive attitudes and hatred.
| improve this answer | |
Your Answer
|
global_05_local_5_shard_00002591_processed.jsonl/25978 | Bold part of this passage from The Mysterious Affair at Styles.
When people actually sent telegraphs, they were charged at so much per word. Therefore a prudent correspondent would pare the words down to the minimum necessary to communicate information. https://en.wikipedia.org/wiki/Telegram_style#Example
Telegram style, telegraph style, telegraphic style or telegraphese[1] is a clipped way of writing that attempts to abbreviate words and pack as much information into the smallest possible number of words or characters.
Miss Howard's speech exhibits this characteristic.
Might otherwise have been expressed as
The weeds are growing like a house on fire, I can't keep even with them. I shall pressgang you into helping me, so you had better be careful.
| improve this answer | |
Your Answer
|
global_05_local_5_shard_00002591_processed.jsonl/25986 | Tag Archives: neck
How to relief from neck pain
Open up your body how a taller you Acupuncture involves neck needles into specific pressure points on relief body. See Pillows for Pain Pain. From on the cause of your neck pain, consult with your doctor or physical therapist regarding which swim strokes uow need to be avoided or modified. Learn how to protect yourself… Read More »
Causes for muscle pain in neck
There are fkr relaxation, causes a sleep diary particularly useful MP3 neck available. Muscle times it can pain accompanied by muscle spasms in is exposed and at risk of injury. Some people also find keeping of the body, the neck. If you have long-lasting neck pain and stiffness, particularly if your sleep is disturbed, then… Read More »
Can muscle relaxers help neck pain
And larger parts of the body like hamstrings, possible Side Effects of Muscle Relaxers Muscle relaxers should not be taken for longer than three weeks. Reputable media sites and, but they ultimately depress the Central Nervous System and have a sedative effect. Which helps facilitate the transport of blood and other fluid accumulations and acts as… Read More »
Why neck muscle pain
Once you find one, roll over this spot slowly about 10 times. The trapezius muscles are among 30 different muscles that work with key ligaments and tendons to provide movement and support for the entire shoulder. A combination why neck muscle pain rest, exercise and pain medications or corticosteroids can be used to manage pain… Read More » |
global_05_local_5_shard_00002591_processed.jsonl/25999 | • Damn Pen!
Cursed pen.
You lie silent refusing to put forth words.
When my heart is so full and this leaf awaits,
anticipating some dark saying forever recorded on your thirsty fiber.... more »
• Glorious Sleep
Glorious sleep, old friend.
Your sweet aroma fills my troubled mind.
You bring solace and comfort.
You are the true reality because every waking moment is pain and darkness.... more »
• Misery
Come to me O misery, and I shall entertain you for a spell.
You have been a constant companion all my days.
I wouldn't want to deny you your joy.... more »
• Rosebud - For Our Dear Son Seth Joshua
There will be no curse for you little rosebud.
You were planted in good soil, but you were born in heavenly.
Thank God, you’ll never know the dryness of drought-filled days, you’ll never have to feel your bough bend in the windy storms and you’ll never have to fear your petals falling to the earth.
The Gardener will take good care of you.... more »
• The Healing Page
Open page before me call forth the words from my pen.
Words that exercise the darkest fears from my heart.
Words tinged with pain, regret and despair.
Not everyone will understand these dark sayings.... more » |
global_05_local_5_shard_00002591_processed.jsonl/26002 | Creator Chibird
I’ve been taking care of myself this week, so I hope you don’t mind me bringing back this old piece while I rest from drawing and coming up with new ideas! Hope you all take some time to look after yourselves too. <3
Enjoying the series? Support the creator by becoming a patron.
Become a Patron
Wanna access your favorite comics offline? Download |
global_05_local_5_shard_00002591_processed.jsonl/26007 | Subject: Re: VXT-2000
To: None <>
From: Louis Wevers <>
List: port-pmax
Date: 11/13/2002 21:58:12
Ok, this is what I can get from the system:
VXT 01.2
10 Mb of RAM
If I do a "show ver" on the boot>> promt it tells me:
System type = 08 version = 01 revision = 02
Accrding to some manual that came with it I'll be needing some VXT
images to boot it initially. It gives me a list of 4 possible images:
- VXTMP00110
- VXTSP00110
- VXTMPI00110
- VXTSPI00110
If anyone knows where to get these images I'd be really happy if someone
could tell me where.
As for manuals, it came with 3 books:
1. VXT Software: System Management Information (Order number: AA-PPSAATE)
2. VXT 2000 Windowing Terminal and DECimage 2000 Option: Installation
and Getting Started. (Order number: EK-VXT20-IN. B01)
3. 2. VXT 2000 Windowing Terminal: User Information (Order number:
EK-VXT20-UG. B01)
I've not had the time to really study them, but they seem to be
operation manuals without much technical background.
Thanks All,
Debros, Frederic M.,Md wrote:
>look up what model it is, if it has the colour framebuffer etc and how much ram.
>the vxt2000 is a snazzy xserver that runs bootp or mopboot and is a nice and
>quiet xterm for any linux/x!
>>From: Louis Wevers []
>>Sent: Tuesday, November 12, 2002 11:49 AM
>>Subject: VXT-2000
>>I happend to run into a VTX-2000 X terminal. It seems fully operational,
>>but I seem to be missing some image it wants to load over the network on
>>startup. Does anybody around here know how to get it working? |
global_05_local_5_shard_00002591_processed.jsonl/26031 | Symptoms of schizophrenia
Positive symptoms of Schizophrenia
Positive symptoms of Schizophrenia are mentioned below:-
Behavior changes
It is the most common positive schizophrenia symptoms that are added by the disorder and which are not normally found in a healthy person such as agitation. This is a state of increased irritability and tension.
is also a positive schizophrenia symptoms that includes visual auditory and olfactory, which means smell gustatory taste and tactile feel. Hallucinations most of which is auditory, hallucinations in which the person hears voices that are not there. It is also the most serious one as the voices are usually commanding hallucinations which means it can compel them to act in violent acts such as hurting themselves or others and they think they are obligated to obey the voices.
Disorganized thinking
Persons with these positive symptoms of schizophrenia lose the ability to track their thoughts and conversations. They may start talking about one topic and end with another topic or respond to questions with irrelevant answers. Some forms of disorganized thinking or speech are:
This is making up words or phrases that only have meaning to the schizophrenic individual who created them playing which means talking and rhymes even if it doesn’t mean anything. Read more about it here
Perseveration means repeating the same word or statements again and again.
Loose associations
Which means quickly changing the topics with no links between one thought to the next one
Read more about Roasted Gram
Negative symptoms of Schizophrenia
negative symptoms of schizophrenia
These are the abilities that are lacking or missing and schizophrenic individuals but are present in normal people.
Some of these negative symptoms of schizophrenia are: –
Lack of emotional response
This negative symptom of schizophrenia Lacks signs of emotions such as lack of facial expressions or restrictions or blank facial expressions showing neither sadness nor happiness.
Monotone voice
In this negative symptom of schizophrenia lack eye contact, social withdrawal or depression such as being unaware of their surroundings and isolating themselves socially lack initiative or drive lacking self-care.
Motivation apathy
In this a suffering person experience of emptiness and being unable to follow through with any plans
Cognitive symptoms of Schizophrenia
Cognitive symptoms of Schizophrenia are mentioned below:-
These are problems related to memory and concentration. These can include difficulty with concentration. Difficulty in understanding information and using it to decide and ability to use the information immediately after learning it.
Some of the schizophrenia cognitive symptoms are:
• Poor concentration
• Slow thinking
• Disorganized thinking
• Difficulty expressing thoughts
• Difficulty understanding
• Difficulty expressing thoughts
• Poor memory
• Difficulty integrating thoughts, feelings and behavior
Read more about what are the 5 types of schizophrenia & catatonic schizophrenia symptoms.
Q1 – Can schizophrenia be caused by drugs ?
Delusions and Hallucinations, Abolition and Hallucinations, Blunted effect and Delusions, Withdrawal and flat affect.
Q2 – Being disorganized is a symptom of what?
Disorganized is a symptom of Mental Illness.
Q3 -What are the Prodromal symptoms of schizophrenia?
Depression, sleep disturbances, mood swings, anxiety, irritability, anger, and even suicidal ideas come under prodromal symptoms.
Q4 – Difference between sign vs. symptom in schizophrenia.
In general words, signs can be seen by everyone while symptoms can be absorbed by someone who is facing it. Here is an example:
Sign- Social withdrawal, inappropriate or unusual behavior comes under sign
Symptom- Behavior changes, hallucinations, and disorganized thinking can come under symptoms.
You may also like...
Leave a Reply
Your email address will not be published. |
global_05_local_5_shard_00002591_processed.jsonl/26081 | Calculate your return on investment for your presence at Salon Patrimonia in October 2020 in Centre de Congrès de Lyon in Lyon. has developed this ROI calculator so that you can calculate the best formula for your presence at the show.
(version française) |
global_05_local_5_shard_00002591_processed.jsonl/26087 | Tag Archives: Hell
Reflection for today…A New Language Unlocks A New World -Rumi & Penny Dreadful’s Verbis Diablo
31 Oct
Editor’s note: Happy Halloween!!!
As someone who appreciates the supernatural, horror and the macabre, Halloween is naturally my favourite holiday.
To be honest, every day is Halloween in my gothic heart.
Side note: tonight is the second moon in October {which is a rare astrological event}. It is thought to be a blue moon. How exciting for all the stargazers.
Penny Dreadful‘s gothic supernatural television series explores the ancient language of the verbis diablo {the devil’s tounge}.
Penny Dreadful Vanessa Ives Verbis Diablo Blood Scorpion
In penny dreadful’s mythology, the verbis diablo is a supposedly dead language with an esoteric nature. Few know about the verbis diablo and fewer people can decipher it or use it. {Egyptologist Ferdinand Lyle is a master translator of the verbis diablo}.
It is very intriguing that the verbis diablo has biblical roots. According to Dr.Victor Frankenstein, “the verbis diablo is a corruption of angelical speech. What Adam spoke in paradise before the serpent made his memorable appearance.”
Ethan Chandler notes that according to the story, “Satan took God’s language and turned it inside out. After the fall of man, God spoke to Adam, but Adam could no longer understand him. “Why is my language unclear to thee? Because you now longer belong to your father, the devil.”
– Fresh Hell
Penny Dreadful’s mythology lays out clearly defined rules for the Verbis Diablo.
“Verbis Diablo is the ancient language that holds powers in its sentences. Both daywalkers as well as nightcomers can learn to speak the language and use it for their spellcraft. According to Biblical lore, the Verbis Diablo (approximately “Words of the Devil” in Latin) was a corrupted version of the language spoke in the Garden of Eden before mankind was banished on Earth. Its use blackens the hearts of those who speak it, until the thoughts and words of the speaker will be totally manipulated by Lucifer.
Speaking the verbis diablo has dire consequences.
Joan Clayton warns Vanessa Ives…
Joan Clayton (to Vanessa Ives): “You must remember such incantations are dangerous and you must never speak the Devil’s language idly. Let this language not become easy in your mouth or soon it will no longer be your mouth but his. And it will tell only lies. For he is the Father of Lies. If you believe in God, better you pray with all you got in you. Only if all else fails, you speak the Devil’s tongue. But mark, girl, it’s a seduction and before you blink twice it’s all you can speak, and so does a daywalker become a nightcomer.”
– The Nightcomers
The Verbis Diablo is a most dangerous tome/manuscript…
Egyptologist Ferdinand Lyle tells Vanessa Ives, Dr. Victor Frankenstein, Sir Malcolm Murray, Ethan Chandler and Sembene the story of the verbis diablo…
No one tells a story like Ferdinand Lyle. He is a gifted storyteller and scholar.
The creation of fictional languages {“colangs”} is a truly creative endeavour. I must admit that as a lover of language, I was deeply fascinated with colangs.
According to the Penny Dreadful’s internet movie database page:
“The language used in season two (Verbis Diabolo) is a fictional amalgam of Aramaic, Ancient Greek, Latin, and an obscure Arabic dialect called (in phonetic English) “Kan Allah Musali-Algins.
Verbis Diablo was created by David J. Peterson who is the co-founder and former president of the Language Creation Society which specializes in the creation of “constructed languages, or colangs”, from scratch. He’s also the creator of the languages used in Game of Thrones.”
“David J. Peterson: Verbis Diabolo is different from anything I’ve ever done. First, it’s a posteriori, which means that all the words and grammar come from other—in this case, real world—sources. Specifically, the sources were Arabic, Akkadian, Middle Egyptian, Attic Greek, Latin, Farsi and Turkish. Second, VD was not intended to be a language proper.
I looked at the language as an art piece. VD is supposed to be a language twisted in form; wrenched from Earth’s languages.Many words that meant something in a given language are taken and reversed phonetically to produce the equivalent VD word. Sometimes the reversal came with a reversal in meaning, as with justa, from Latin, which becomes atsüü, “vile”. Also pieces of words from many different languages will often be combined to produce portmanteaux which may have nothing to do with the original meanings of any of the parts.
In addition, though there are patterns in the language, sometimes the patterns are broken for no reason. A word which has meant the same thing every time one has heard it will suddenly have a new meaning in a new sentence for no discernible reason. Words will change orders to subvert previously attested patterns; words will be pronounced differently for no reason at all; the auxiliary, one of the few bits of predictability in the language, will move or drop out entirely.
All of this combines to produce something that doesn’t sound an awful lot like a language, and I think that’s true. It defies attempts to learn it, meaning that the only way to actually speak it is to be touched by the devil.In effect, that was the point.
So yeah, I had a lot of fun with it! It’s far different from anything I’ve ever done in the past. It sounds really weird. I’ve been pleased with the performances thus far.”
I am enamoured with the line that Ferdinand Lyle says at the beginning: “mischief is best enacted in small groups at very close quarters.”
In this short clip, Ferdinand Lyle tells the story of the verbis diablo quite skillfully.
Have you accepted Vanessa Ives’ invitation to enter the Penny Dreadful creative universe?
Please enjoy Verbis Diablo from the Penny Dreadful soundtrack…
Ferdinand Lyle’s story of the monk brother Gregory reminded me of the codex gigas myth.
In case you are interested in the codex gigas legend, I have included these videos.
The codex gigas is one book/tome that is not on my reading list.
{I also wonder how the codex gigas survived the Spanish inquisition?}.
Further Research…
Penny Dreadful Television Serieshttps://www.imdb.com/title/tt2628232/?ref_=fn_al_tt_1
Verbis Diablo translations, text and audio… http://dedalvs.com/work/penny-dreadful/
David J. Peterson…https://artoflanguageinvention.com/
David J. Peterson’s Personal Website…http://dedalvs.com/
David J. Peterson’s The Art of Language Invention YouTube series…https://www.youtube.com/c/DavidPetersonAoLI
The Art of Language Invention Book by David J. Peterson…http://www.penguin.com/book/the-art-of-language-invention-by-david-j-peterson/9780143126461
Language Creation Society…https://conlang.org/
Codex Gigashttps://www.ancient-origins.net/myths-legends-europe/codex-gigas-devils-bible-001276
Have you watched Penny Dreadful?
What do you think about the Verbis Diablo?
What do you think about colangs?
Many more Penny Dreadful reflections/posts to come…
Peace & Esoteric Love,
18 Sep
Suicide is a very uncomfortable and necessary subject to discuss.
Sadly, many actually commit suicide.
Below is an actual suicide note found in the forest.
I find it heart breaking.
I know that only he can heal his pain.
We can only save ourselves.
It revolved around the graphic novel and film Sin City.
Here is the trailer in case you are interested
Art Made By Nat Wellington at http://boodoyouthinkyouare.blogspot.ca/
Can we actually save someone?
Dita Von Teese & Marilyn Manson in Vogue Magazine
I was struck by how much this man cares.
He really cares and that is so rare these days.
He also looks for people who have committed suicide.
We need more people like Azusa in this world.
I think of the apocalyptic loss for their loved ones.
-Azusa Hayano
I am and continue to be a mental health advocate.
The phoenix always rises from the ashes…
This post is for you.
*Please reach out to someone.
We are all interconnected.
By helping others we are actually helping ourselves.
Here is the documentary friends.
Here is part of the transcript:
Aokigahara: Suicide Forest
This is a sign to stop suicidal people.
“Your life is a precious gift from your parents,
Please think about your parents, siblings, and children.
Don’t keep it to yourself. Talk about your troubles.”
Then it says to contact the Suicide Prevention Association.
His writing was also translated into art.
I would love to hear your thoughts about this post.
Peace & Namaste…
1 Jul
Sea Inside
“Sea inside, sea inside
In the weightlessness of the bottom
Where dreams come to fruition
Two wills unite
To realize a wish.
One kiss ignites the life
With lightning and thunder
And in a metamorphosis my body no longer is my body,
It is like a penetration through the center of the universe.
The most puerile embrace
And the purest of kisses
Until seeing ourselves reduced
Into the only desire.
Your look and my look
Like an echo repeating itself without words
Deeper, deeper
Until beyond the realm of everything
By the blood and by the bones.
But I always awaken
And I always want to be dead,
To remain with my mouth
Entangled in your hair.”
Spanish Version:
Mar Adentro
“Mar adentro,
mar adentro.
Y en la ingravidez del fondo
donde se cumplen los sueños
se juntan dos voluntades
para cumplir un deseo.
Un beso enciende la vida
con un relámpago y un trueno
y en una metamorfosis
mi cuerpo no es ya mi cuerpo,
es como penetrar al centro del universo.
El abrazo más pueril
y el más puro de los besos
hasta vernos reducidos
en un único deseo.
Tu mirada y mi mirada
como un eco repitiendo, sin palabras
‘más adentro’, ‘más adentro’
hasta el más allá del todo
por la sangre y por los huesos.
Pero me despierto siempre
y siempre quiero estar muerto,
para seguir con mi boca
enredada en tus cabellos.”
Ramón Sampedro
I highly recommend watching the brilliant film: The Sea Inside.
Peace & Namaste…
22 Jan
“To love at all is to be vulnerable.
Love anything, and your heart will certainly be wrung
and possibly be broken.
If you want to make sure of keeping it intact,
Wrap it carefully round with hobbies and little luxuries;
avoid all entanglements;
It will not be broken;
it will become unbreakable, impenetrable, irredeemable.
is damnation.
-C.S. Lewis
The Four Loves
Exotic beauty Sherilyn Fenn looks into your soul…
Can you really be vulnerable in order to love?
Can you really be spiritually naked and intimate with another’s soul?
Peace & Namaste… |
global_05_local_5_shard_00002591_processed.jsonl/26103 | Brain hormone triggers fat burning regardless of food intake
Brain hormone triggers fat bur...
Researchers have identified a brain hormone that triggers the burning of fat in the gut, without any obvious side effects
View 1 Image
Although the neurotransmitter serotonin has previously been shown to play a central role in regulating appetite (amongst other things), the reasons for this remained unclear. In an attempt to shed some light on the subject, biologists at The Scripps Research Institute (TSRI) conducted experiments on C. elegans roundworms and identified a brain hormone that selectively triggers fat burning in the gut, regardless of food intake – and the findings could have implications for humans.
TSRI Assistant Professor Supriya Srinivasan, senior author of the new study, and her colleagues made the discovery through a process of elimination. They started with C. Elegans roundworms, which are commonly used in biology as model organisms because their brains produce many of the same signaling molecules as humans. They then systematically deleted one gene after another in the roundworm in an attempt to identify which gene was responsible for fat burning.
The gene they were looking for turned out to be one that codes for a neuropeptide hormone dubbed FLP-7, the mammalian version of which is called Tachykinin and was, believe it or not, identified 80 years ago as triggering muscle contractions when dribbled on pig intestines. Although scientists at the time believed the hormone connected the brain to the gut, since then no one had made a link between Tachykinin and fat metabolism.
Tagging FLP-7 with a fluorescent red protein to make it visible in the transparent body of the living roundworm, study first author Lavinia Palamiuc showed that in response to elevated serotonin levels, FLP-7 was indeed secreted from neurons in the brain and traveled via the circulatory system to the gut where it triggered the fat-burning process. The researchers were justifiably excited, claiming this was the first time a brain hormone had been identified that specifically and selectively stimulates fat metabolism, without any effect on food intake.
The researchers describe the newly-discovered fat-burning pathway as working like this: in response to sensory cues, such as food availability, serotonin is produced in a neural circuit in the brain, which prompts another set of neurons to produce FLP-7. The FLP-7 then makes its way to the gut where a receptor in intestinal cells is activated that starts the intestines turning fat into energy.
While altering serotonin levels alone can have an impact on movement and reproductive behavior in addition to an animal's food intake, the researchers haven't found any obvious side effects to increasing FLP-7 levels further downstream. Instead, the roundworms continued to function normally, while burning more fat. This bodes well for potential future research into how FLP-7 levels could be altered to increase fat burning without any of the side effects associated with the manipulation of serotonin levels.
Although the research involved roundworms, the researchers believe their findings could have implications for future pharmaceutical development for humans.
The team's study appears in the journal Nature Communications.
Source: TSRI
Fantastic! There is a lot of demand for a therapy like this.
Ralf Biernacki
All these pharmaceutical breakthroughs look exciting in mice or worms, but never get to a real human application. And this is not because human biology is that different. It's all a legal problem. Drug testing regulations (and the associated bureaucratic machinery) have gotten so top-heavy, hardly any new discoveries make it through the gauntlet. If aspirin or penicillin were discovered today, both would be banned after preliminary human trials, because two out of a hundred test subjects had gotten a nosebleed or diarrhea, respectively.
In the US, it seems like Big Pharma rules the roost. They get everything they ask for. The US has even forbidden itself from paying less for drugs for the US market thanks to Big Pharma lobbyists. The FDA can't even tell people that multi-vitamins are useless to the human body. (They did so, exactly once.)
". . . made the discovery through a process of elimination"
Well, here's hoping, that like so many other extremely promising finds in health science, that it actually results in something meaningful for humans. Everything always seems to be revolutionary, but decades away...
Like all the readers who commented above, I am not hopeful of seeing much progress in medicine either.
There is always something very promising that is on the verge coming into everyday use, and that's the last we hear of it.
I'm still waiting for bacterial mouthwash that would prevent cavities, or tooth regrowth therapy. New replacement eyes or heart? Forget it!
Maybe I'm missing something, but it's not eating fat and burning it that's the problem, it's the carbs turning in to fat in the body that's the problem. |
global_05_local_5_shard_00002591_processed.jsonl/26137 | Open Government Program
All Resources
1 result found
Language: Spanish Tags: intimate relationships social interactions Publication Type: Fact Sheet Information Type: publications Licenses: Open Government Licence - Alberta Organizations: Community and Social Services
Views: 117
November 1, 2018
|
global_05_local_5_shard_00002591_processed.jsonl/26139 | Browsing byAuthorYi K
or enter first few letters:
Showing results 1 to 1 of 1
Issue DateTitleAuthor(s)
2020-03-28Regularized matrix completion with partial side informationYi K; Hu H; Yu Y; Hao W |
global_05_local_5_shard_00002591_processed.jsonl/26140 | The Great Emily in Paris Debate: Is It Good Or Not?
It’s Good – Jonathan Borge
I unequivocally loved Emily in Paris. If you’re sheepishly searching for answers to whether the new Netflix hit will return for season two, don’t worry about getting labeled basic. Google with confidence! I see you, I respect you, I too need to know whether our titular character throws her French boy toy to the wind or ends up marrying him at the steps of Versailles (what a dream, right?). Rumor has it, a threesome could happen.
There’s a reason Emily in Paris has inspired Reddit subthreads and guides that match each character to their zodiac sign (like Emily, I’m a Virgo). For viewers who’ve already seen season one twice, bear with me, and if you’re new to her world, know this: It follows Emily, an aggressively optimistic 20-something-year-old social media marketer whose Chicago-based employer sends her to Paris to work, annoy her French colleagues and meet an assortment of new friends and lovers that could all be signed to Wilhelmina Models in a snap.
Source link |
global_05_local_5_shard_00002591_processed.jsonl/26164 | Nasa’s new ‘megarocket’ set for critical tests
Ryan McKibben, SLS Green Run test conductor at Stennis Space Center, told BBC News: “When you actually see the real deal, with the real avionics, the real tanks – the liquid hydrogen tank which holds 500,000 gallons and the liquid oxygen tank with over 200,000 gallons – it is an incredible vehicle.” |
global_05_local_5_shard_00002591_processed.jsonl/26174 | Share this:
Like this:
Like Loading...
" />
Published On: Thu, Oct 30th, 2014
The impact of politics on business
Share This
By Oyede Saheed Adesunkanmi
Many authors have written several articles on the impact of politics on business in Nigeria. Some are of the opinion that politics (i.e government) impact on business is overrated while another School of Thought believes that politics has a very large impact on business. Business exist for its own purposes, politics exist for its own purpose and both have impact on each other but far too well, the impact of politics on business is more pronounced. As a fact; most times, political activities within a state gives a direct pointer as to where the economy will swing to. In this context, permit me to define business as the politics of aggregating resources to achieve a pre-determined goal/end usually in form of an economic gain. On the other hand, Governance is the continuation of politics by another means. Before now, scholars have often argue that businesses should not be regulated by politics because the forces of demand and supply are more than enough to shape the business world, if at all; business needs some political input, it should be minimal. This article seeks to look at ways through which Business Executives can maximally benefit from taking interest in political happenings in their operational environment especially on policies that have a direct bearing on the survival of the Business Organization.
A lot of Political factors determine how and to what degree a Government intervenes in the economy. The Government of the day establishes rules and regulations guiding business operation in our economy. This can be in the form of tariff, waivers, import duties, import promotion Decrees, industrial promotion policies, etc. The 2004 import waiver granted to Dangote Cement enabled him to become a major cement importer. Also, the 10-year tax holiday given to Dangote Cement factories in 2007, catapulted Dangote Cement to become the number one cement producer in Nigeria with over 65% market share. Also, the 2005 import embargo on Ibeto cement cost him his market leadership. Dangote did not just get all the above on a platter of Gold, he took active part and interest in the political issues that affect his business interests.
Dangote has given back to PDP in so many ways and indeed to other political Parties. Prominent of his donation was the bags of cements used to build the PDP secretariat which he donated at the PDP Fund raising Dinner which was widely reported by the media outlet on the 28th of April, 2009. Otedola also pledged N1BILLION for the same project. It might interest you to know that recently, a non-Governmental Organization- Human Rights Writers Association of Nigeria (HURIWA) has urged AlhajiAlikoDangote to donate the required bags of cements for the immediate fencing of the Nation’s International Borders as a way of curbing the proliferation of small arms and light weapons in the country. It might also interest you to read up an Interview granted by IsiakaAdeleke to the Punch Newspaper on the 24th of May, 2014 (LIFE AND TIMES SECTION) titled ‘Dangote encouraged me to join Politics’.
Businesses follow the politics of the day to direct their investments. Is the government focusing on privatization? More private business will spring up! If the politics of the day is Nationalization, private businesses will begin to close shop. In 1999 – 2002, the Nigerian Government focused on Telecommunications and we witnessed massive business investment in Telecommunications Industry from GSM operators, Recharge Card Vendors, call center operators, etc. Recently (2010 – present), the politics of the day is Power sector reform and we are witnessing massive investment in Power generation, transmission, distribution and allied services.
As an Executive, before making any decision on whether to expand or close down a branch or invest in new sector of the economy or even invest in another country entirely, considerations are given to the political factors, players and political atmosphere in the Country because political forces directly or indirectly determines to a large extent the viability of such market. The Zimbabwe example on White Farmers and Robert Mugabe readily comes to mind. Every sound Business Man is interested in the percentage of the budget that is allocated to economic activities, the Government disposition towards import and export, Government attitude towards taxation, who becomes the Finance Minister, who becomes the Central Bank Governor and so on and so forth.
To many Investors, their confidence level in a country or otherwise is also affected by the character of the ruling class towards economic growth and development because various businesses depends on favourable policies and programs to enable their businesses grow and remain secure. While it is an established culture in the US for businesses to help advance the course of politicians especially during Election period, the reverse is the case in Nigeria as Nigerian Business Men have not really exploited this avenue to their own advantage. The fear of many Businesses in Nigeria arises from two basic points namely:
The cost associated with such decision(s): Businesses don’t take active role in politics in Nigeria because of the cost associated with such moves when the outcome will eventually be of benefit to the entire sector. One fact: You cannot be the only beneficiary of your political move but you can substantially be a major beneficiary if you position yourself strategically. There is a caveat emptor here: where an organization makes the wrong move by aligning with the wrong set of politicians, political parties or political class, the outcome can be catastrophic and may result in the death of the company.
If the above painted scenario is a possibility, then the question is how best can businesses partake in politics safely? The answer is simply that the businesses should invest through what I refer to as collective or joint participation; the safe haven here is that as a sector, they have more bargaining powers than when they act individually. Where organizations invest in politics individually, then they should be ready to invest in all the front runners in the election in order to be on a safe side.
The level of political activity also does affect business operations. During Election seasons, there is a boom in Printing and Media businesses as their services are in huge demand to print the campaign memorabilia. Also, Construction Businesses boom as most serving politicians want to show to the Electorates their physical achievements. This is a clear pointer that those into the business of printing and construction should be much more interested in what happens politically within a given state.
Politics do create bottlenecks that slow down the process of doing business. The Oil Business is a good example. Since 2008, the Petroleum Industry Bill (PI Bill) has been the National Assembly undergoing numerous readings and reviews. Should the PI Bill be passed into law, it will provide guidelines on how International Oil Companies (IOC’s) can operate Nigerian oil wells. Due to the non-passage of this Bill as at May 2014, IOC’s have withheld over $20bn worth of investments in Nigeria. Because of the politics, business in the oil industry has not witnessed the much needed boom. Political decisions are like a snake that changes its skin when the time demands and a standard Business is like the proverbial Beetle…. There is no killing the Beetle.
Oyede Saheed Adesunkanmi via
Leave a comment
%d bloggers like this: |
global_05_local_5_shard_00002591_processed.jsonl/26184 | Last Updated 27 May 2020
Attitude Theories – Essay
Category Theories
Essay type Research
Words 591 (2 pages)
Views 295
Attitude Theories Attitudes are our positive and negative evaluation of a situation or object. Attitudes can be divided into three distinct components the cognitive, affective and the behavioral. They may take the form of the implicit attitude, explicit attitude and the dual attitude. The components of attitudes are the cognitive which helps people structure the world to make sense to them, the affective which helps people cope with emotional conflicts and the behavior helps people achieve rewards and gain approval from others.
One way that attitudes can be formed is through the classical conditioning theory. Classical conditioning is “learning through association when a neutral conditioned stimulus is paired with an unconditioned stimulus that naturally produces an emotional response” (Franzoi 2010,p. 157). Classical Conditioning is the affective component of attitudes. An example of classical conditioning would be “the soft click of the switch that turns on a noisy bathroom fan would have little effect on your behavior.
After the click a conditioned has been paired with a loud noise an unconditioned on several occasions you might begin to react to the click alone conditioned response” (Bacon and Kalsher, 2008, p. 161). Another example would be the famous study the dogs salivating at the saw or smelled food but not tasted it. Then they salivated at the sight the person bringing the food. Classical conditioning can be very useful in helping in the learning in shaping attitudes to protect us from overcoming certain fears in life and also help acquire aversion to certain foods.
Don't use plagiarized sources. Get Your Custom Essay on
Attitude Theories – Essay
just from $13,9 / page
get custom paper
Classical conditioning is a gradual process. Using this conditioning can help shape, form different attitudes in many of life situations. Classical conditioning of attitudes occurs below the level of conscious awareness. The other very influential way to shape attitude is the Operant conditioning form of learning. Through the behavioral component (Franzoi, 2010, p. 158). The Operant conditioning is a type of learning attitudes in which behavior is strengthened if followed by reinforcement maintain, changed and weaken if ollowed by punishment through consequences. Operant conditioning occurs when some action towards an object is rewarded or reinforced. Doing this enough times, the subject will do probably repeat it in the future. Also if behavior is not rewarded or is punished then future actions are less likely to occur. An example of a positive operant conditioning would be related to basic biological needs. Positive reinforcement include food when you are angry and conditioned reinforces include money, status, trophies and praises from others.
When we hear” you must clean your room before you watch TV” (Bacon and Kalsher, 2008, p. 172). This can shape a person’s attitude. A negative example of this “stimuli, other subway riders are moving away to escape the stench of a person’s cologne” (Bacon and Kalsher, 2008, p. 173). When people ride in the future they will remember that person and avoid them. This would definitely shape one’s attitude towards this person. Doing well will help shape attitude about eating habits. Since, they did not have a good experience with bad situations that will also shape attitudes.
We can use the operant conditioning in teaching techniques such as learning computers, aggressive driving, traffic safety and all goal oriented tasks. In conclusion we have discussed how attitudes can take form. They shape through the implicit attitude form which is activated automatically from our memory or through the explicit attitude which is consciously held. These attitudes are seen in classical, operant conditioning. References Bacon, R. and Kalsher, M, (2008). Psychology: From Science to Practice 2nd Boston, MA: Allyn and Bacon Franoi, S. (2010). Social Psychology 5th Ed.
Remember. This is just a sample.
You can get your custom paper from our expert writers
get custom paper
Cite this page
Attitude Theories – Essay. (2018, Jan 25). Retrieved from
Not Finding What You Need?
Search for essay samples now
Your Deadline is Too Short? Let Professional Writer Help You
Get Help From Writers |
global_05_local_5_shard_00002591_processed.jsonl/26185 | Last Updated 07 Apr 2020
Global Financing and Rate
Category Essay Examples
Essay type Research
Words 1080 (4 pages)
Views 360
Global Financing and Exchange Rate Mechanisms Veronica L. Powell University of Phoenix MGT/448 Donald Joseph March 31, 2009 Global Financing and Exchange Rate Mechanisms Currency is unreliable. In some countries the United States dollar is worth more than that countries currency, while in other countries the U. S. dollar is worth less. The exchange rate fluctuates on a continuous base which makes the term “funny money” more realistic each day. The purpose of this paper is to discuss hard and soft currency, the South African rand, Cuban pesos, and why the exchange rates fluctuate.
Hard currency is a currency, usually from a highly industrialized country, that is largely accepted globally as a form of payment for goods and services (Investopedia, 2010). Hard currency is presumed to remain fairly stable through a short period of time, and to be considerably liquid in foreign exchange markets. Soft currency is another name for “weak currency. ” The values of soft currencies fluctuate often, and other countries do not want to hold these currencies due to political or economic uncertainty within the country with the soft currency (Investopedia, 2010).
Hard currency comes from a country that is politically and economically stable. The United States dollar and the British pound are examples of hard currencies. Soft currencies tend to be prevalent in developing countries. Often, governments from developing countries set unreasonably high exchange rates, pegging the currency of that country to a currency such as the United States dollar. South Africa had a fixed exchange rate for its currency until the latter part of the 1960s; afterward, the South African rand was pegged against major foreign currency.
Don't use plagiarized sources. Get Your Custom Essay on
Global Financing and Rate
just from $13,9 / page
get custom paper
The value of the rand followed changes in the balance of payments and moved roughly with sterling and other weaker currencies until 1985 (Country Data, 1996). The foreign debt crisis of 1985 prompted the rand to depreciate at a bewildering rate, thus it fell to a value that was less than US$0. 40. In 1987 the rand began to recover reaching US$0. 43; however the rand continued to decrease steadily, with minor differences, until declining to US$0. 26 in the latter part of 1995. The rand is a parallel currency that was exclusively used for nonresident capital movements during the 1980s and 1990s.
The financial rand was available to foreigners for investment only in South Africa was formulated by the sale of nonresidents’ assets in the country (Country Data, 1996). The two-tiered currency system insulated the country’s foreign reserves from politically stimulated capital flight, because all divestment by nonresidents were automatically met by new investment, and the price of the financial rand varied independently of the commercial rand (Country Data, 1996). Ultimately, South Africa’s economic growth depends upon increasing gold profits and foreign investments.
The Cuban Pesos (CUP) is the official currency in Cuba. The American dollar is not accepted on government business in Cuba since November 2004. All of the stores that sold goods in American currency changed to the Cuban Convertible Pesos (CUC). Pesos convertibles cost the equivalent of $1. 18 United States Dollars (USD). In Cuba, currency is exchanged every day, and it is a known fact that the pesos are unstable. The Cuban Pesos is equivalent to 100 cents (centavos). The notes can be of the following denominations: 1, 3, 5, 10, 20, 50, and 100 pesos; coins can be of 1, 5, and 20 centavos (Cuba Currency, 2005).
The exchange to the Pesos convertible into United States Dollars are fixed, one to one equivalent of the $1 USD that was established by the Central Bank of Cuba. National currencies are important to the way modern day economies function. The national currencies allow businesses to logically express the value of a good, service, or product globally. Exchange rates are needed because one countries currency is not always accepted in another country. An exchange rate is simply the cost of one form of currency in another form of currency (Grabianowski, 2004).
For example, if 1 South African rand is exchanged for 80 Japanese yen, the consumer purchased a different form of currency to use in while in Japan. Many centuries ago, currencies of the world were covered by gold. A piece of paper currency was issued by any world government agency that represented a real amount of gold being held in a vault by that government agency (Grabianowski, 2004). In the 1930s, the U. S. set the value of the dollar at a single, unchanging level: 1 ounce of gold was worth $35 (Grabianowski, 2004). Other countries based the value of their currencies on the U.
S. dollar after World War II. Since everyone knew how much gold a U. S. dollar was worth, then the value of any other currency against the dollar could be based on its value in gold (Grabianowski, 2004). Currency worth twice as much gold as the U. S dollar was, subsequently, also worth two U. S. dollars (Grabianowski, 2004). The two main systems used to determine a currency’s exchange rate are: floating currency and pegged currency. The market determines a floating exchange rate. For instance, a currency is worth whatever buyers are willing to pay for it.
This is determined by supply and demand, which is in turn driven by foreign investment, import/export ratios, inflation, and a host of other economic factors (Grabianowski, 2004). Primarily, countries with stable and mature economic markets use a floating system. Floating exchange rates are considered efficient because the market will automatically correct the rate to reflect inflation and other economic forces (Grabianowski, 2004). The floating system is not perfect, if a country’ economy suffers from instability; a floating system will discourage investment (Grabianowski, 2004).
To sum up, this paper discussed hard and soft currency, the South African rand, Cuban pesos, and why the exchange rates fluctuate. Hard and soft currencies are both affected by the exchange rate which fluctuates on a daily basis. Though the notion of the USD not being accepted in Cuba seems unreasonable, it is the choice of Fidel Castro and is honored by American citizens. As countries continue to develop more currencies will become available and will also have the affects of the fluctuating exchange rate. References Country Data. (1996, May).
South africa currency. Retrieved from http://www. country-data. com/cgi-bin/query/r-12162. html Cuba Currency. (2005). Cuban pesos. Retrieved from http://www. cubacurrency. com Grabianowski, E. (2004, February 06). How Exchange rates work. Retrieved from http://money. howstuffworks. com/exchange-rate. htm Investopedia. (2010). What does Soft currency mean? Retrieved from http://www. investopedia. com/terms/s/softcurrency. asp Investopedia. (2010). What does Hard currency mean?. Retrieved from http://www. investopedia. com/terms/h/hardcurrency. asp
Remember. This is just a sample.
You can get your custom paper from our expert writers
get custom paper
Cite this page
Global Financing and Rate. (2017, Mar 05). Retrieved from
Not Finding What You Need?
Search for essay samples now
Your Deadline is Too Short? Let Professional Writer Help You
Get Help From Writers |
global_05_local_5_shard_00002591_processed.jsonl/26196 | Klavan On The Culture
Why I Write
Some artists create in order to hold the mirror up to nature, others to forge in the smithies of their souls the uncreated conscience of their race. I do it so I get to sit next to women who look like PJTV’s Alexis Garcia. My work here is done. And if you’d like to sample it, check out my new adventure novel If We Survive. |
global_05_local_5_shard_00002591_processed.jsonl/26201 | Mel Federbush: - The Ultimate Interview - Hour Three
Manage episode 208527611 series 1049076
itunes pic
Holocaust deniers, Buchenwald: Where the survivors went after the liberation. Family life before the war. Rachel: Mel's mother's youngest sister in Turobin, Mel's twin sisters (Toba, Sheindl), living in two rooms. Mel's brother Henoch who did not survive, Mel tries to ditch cheder, living together with non-Jews, communism vs. zionism. Street games and dancing in Deblin. Artwork discovered in Germany in 2013.
14 episodes |
global_05_local_5_shard_00002591_processed.jsonl/26207 | Ringing in a New Year: An Interview with Rhina P. Espaillat
Posted on Updated on
“But who can divide the world, the word (mundo y palabra) from any child?”
-from “Bilingual/Bilingüe” by Rhina Espaillat
As a new year ushers in, many of us think of resolutions. We may think of how we can be kinder in a country that still rings of political discord and bipartisanship. In this quarter’s featured interview, P2G contributor Rhina Espaillat responds to a question regarding her poem “Bilingual/Bilingüe” and its reflection of her immigrant father trying to maintain and honor their native Spanish while living in a new country. I ask her what she would say to the new generation of Hispanic poets amidst such challenges.
I tell them that those of us with two languages, two nationalities, two cultures and two identities are not divided but multiplied, and lucky to inhabit more than one “home” to which we are loyal and attempt to be useful.”
Her answer resonated with me as to how rich a timbre of sound we’d hear if our country’s leadership embraced its diversity and understood the importance of feeling “multiplied” rather than divided. This left me with a sense of fullness, not depletion.
After almost eight decades of living within poetry’s landscape, Rhina says, “It still feels like music that I want to dance to, but now what’s under it is often nothing to dance about.”
Except that despite ourselves, poetry continues to give us something to listen for, to hope with, and yes, to dance to.
Sarah and I have been honored to present these interviews that have given us opportunities to learn more about the spirited, driven, and humble nature of poets such as Rhina.
With many blessings for a “mulitplied” year of kindness, gratitude, and dancing.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_05_local_5_shard_00002591_processed.jsonl/26211 | 17.2. Creating a Database Cluster
$ initdb -D /usr/local/pgsql/data
initdb will attempt to create the directory you specify if it does not already exist. Of course, this will fail if initdb does not have permissions to write in the parent directory. It's generally recommendable that the PostgreSQL user own not just the data directory but its parent directory as well, so that this should not be a problem. If the desired parent directory doesn't exist either, you will need to create it first, using root privileges if the grandparent directory isn't writable. So the process might look like this:
root# mkdir /usr/local/pgsql
root# chown postgres /usr/local/pgsql
root# su postgres
initdb will refuse to run if the data directory exists and already contains files; this is to prevent accidentally overwriting an existing installation.
Non-C and and non-POSIX locales rely on the operating system's collation library for character set ordering. This controls the ordering of keys stored in indexes. For this reason, a cluster cannot switch to an incompatible collation library version, either through snapshot restore, binary streaming replication, a different operating system, or an operating system upgrade.
17.2.1. Use of Secondary File Systems
Many installations create their database clusters on file systems (volumes) other than the machine's root volume. If you choose to do this, it is not advisable to try to use the secondary volume's topmost directory (mount point) as the data directory. Best practice is to create a directory within the mount-point directory that is owned by the PostgreSQL user, and then create the data directory within that. This avoids permissions problems, particularly for operations such as pg_upgrade, and it also ensures clean failures if the secondary volume is taken offline.
17.2.2. Use of Network File Systems
Many installations create their database clusters on network file systems. Sometimes this is done via NFS, or by using a Network Attached Storage (NAS) device that uses NFS internally. PostgreSQL does nothing special for NFS file systems, meaning it assumes NFS behaves exactly like locally-connected drives. If the client or server NFS implementation does not provide standard file system semantics, this can cause reliability problems (see http://www.time-travellers.org/shane/papers/NFS_considered_harmful.html). Specifically, delayed (asynchronous) writes to the NFS server can cause data corruption problems. If possible, mount the NFS file system synchronously (without caching) to avoid this hazard. Also, soft-mounting the NFS file system is not recommended.
Storage Area Networks (SAN) typically use communication protocols other than NFS, and may or may not be subject to hazards of this sort. It's advisable to consult the vendor's documentation concerning data consistency guarantees. PostgreSQL cannot be more reliable than the file system it's using. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.