id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_5_shard_00002591_processed.jsonl/50325 | Estimating Extract Efficiency When It Varies With Original Gravity
Scan 2015-2-10 0006-1As I outlined in the previous article, one reason for decreasing extract efficiency when brewing higher-gravity brews is that some brewers boil the same volume of wort, regardless of the size of their grain bill. If you do so and use continuous sparging, the volume of sparge water you use decreases as your grain bill gets larger. As such, the larger the grain bill, the fewer sugars are rinsed from the grain bed after the first wort had been run off. The same can be true if you batch sparge and your pre-boil volume does not go up with bigger grain beds.
Equivalently, with an unchanging boil volume in a “straight” BIAB system — one in which the bag is hoisted from the mash tun/kettle and allowed to drip, but isn’t sparged — larger grain bills mean higher gravity wort. When the grains are removed, the wort retained in the grain bed is the same gravity as the free wort. The volume of wort retained by the grain bed is also larger with larger grain bills. As such, progressively larger grain bills equate to more sugar being removed from the kettle by the bagged grains. More wort is retained by the grains and that wort is of higher gravity.
As I mentioned, in order to preserve your extract efficiency, you need to ensure that you completely sparge your grain bed. However, for some brewers, this is either not possible or inconvenient. The next best thing would be a way to predict your extract efficiency for whatever original gravity you desire — and there is one way easy way to do this. The catch is that you need to have had taken good notes for your prior beers.
[Read more…]
Declining Extract Efficiency at Higher Original Gravities
A 15-gallon mash/lauter tun.
|
global_05_local_5_shard_00002591_processed.jsonl/50343 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://bi-diekko-chan.com/pickup/60%Weekly2018-11-21 01:16 |
global_05_local_5_shard_00002591_processed.jsonl/50349 | I saw a mammal that looked like a large squirrel. I haven't seen anything quite like it. Can you help me identify it?
• Squirrel-like, "hunched over" posture.
• It was too large to be an eastern squirrel—approximately 2.5 feet, from nose to tail.
• It had a fluffy tail like an eastern squirrel, not short and rat-like like a ferret.
• Black face with white nose, body was chestnut-brown.
• I saw this on the ground, not in a tree.
• I saw it in a pine forest in east-central Alabama.
• At one point, it sat up on its hind legs.
It sounds pretty much like a fox squirrel (or better: as masked face fox squirrel which are found in Alabama). They look like this (taken from this website):
enter image description here
There seems to be quite some variation in terms of fur color, some animals are more greyish:
enter image description here
Taken from here, this website also contains some additional information.
| improve this answer | |
Your Answer
|
global_05_local_5_shard_00002591_processed.jsonl/50362 | React vs Vanilla JS - When to use what?
Subscribe to my newsletter and never miss my upcoming articles
Web apps can be complex and may require a lot of dynamic functionalities. One can opt for Vanilla JS to build their applications but if you have worked with Vanilla JS before, you know how messy it can get. Here's when JS frameworks like, React, Angular and Vue, come into the picture.
In this article, I'll walk you through the main differences between a JS library like React and plain Javascript - when to choose which and why?
Let's start by answering two simple questions.
What is Vanilla JS?
Vanilla JS is nothing but plain JS without any external libraries or frameworks. Using this we can build powerful and cross-platform applications.
What is React?
React is a Javascript library used for building user interfaces. It allows us to make complex UIs from isolated pieces of code called "components".
React has quickly become one of the most popular Javascript libraries. This is entirely because of its flexibility and the improvement it brings in the performance. React breaks down the UI into smaller and reusable components that can move around data amongst each other. This breaking down of the UI is what gives React an edge over Vanilla JS.
In Vanilla JS, the code becomes very difficult to maintain if the application is large because in such cases the UI needs to be updated regularly. Here, to change a UI element you need to first find the element in the DOM and then update it. This is fine when you have to update only a single element but imagine doing this on long-form which a user needs to fill. This could be very memory and browser intensive.
This is where React comes in with a great feature i.e its own virtual DOM. The virtual DOM is a shortcut to bypass the manual work. It is a lightweight copy of the actual DOM. It has the same properties as the real DOM but lacks the power to make changes on the screen.
The most important and fundamental reason why modern frameworks are used is that, with Vanilla JS, keeping the UI in sync with the state is hard.
Let's understand this by taking an example
Consider Facebook. Say at a given time, your friends comment on a picture of yours and you want to see it immediately. You'd want to shift from liking posts to commenting or sharing without being slowed down.
Now, this can be done in Vanilla JS too, but the number of changes you'd have to do in the code would be very tedious. All this tiresome work can be avoided by using something like React.
Basically, with React, we can manage to keep the UI and the state synchronized with each other. In Vanilla JS, if you have to change the state, you would need to update the UI. One small mistake and your UI could be out of sync with your data.
Code organization and re-use is another important aspect of React. A component created only once can be used multiple times with different data.
Whether you should use Vanilla JS or React depends very much on your use case.
Vanilla JS is awesome but it's not a great alternative when it comes to building huge applications with complex dynamic functionalities. Besides, it cannot create complex and efficient UIs. So if you have an app that changes frequently and drastically with thousands of pages, it is better to use a modern Javascript framework.
On the other hand, React which allows us to use reusable components and is capable of keeping the UI in sync with the state, can definitely solve this problem.
If you liked this post, consider subscribing to my newsletter.
Thanks for reading!
No Comments Yet |
global_05_local_5_shard_00002591_processed.jsonl/50371 | Showing posts with the label Stored
Introduction to XSS - Methods, Impact and Prevention
When searching for hacking tutorials or reading through write ups, definitely you will come across the term XSS. In this post, I am going to explain what is XSS, what are it's impacts and how to achieve it with few examples. XSS aka Cross Site Scripting is a vulnerability which allow the attacker to inject and execute JavaScript code on the target website. This allow attacker to log the victim details, make a phishing page, bypass csrf, get cookies and many more. XSS is of 2 types. Stored and Reflected. Stored XSS is the type of XSS when the user entered data is stored in the server and the displayed in any other page. For example parameters like name, place, about etc can be vulnerable to stored XSS. That said, fields like password are stored once and never retrieved or showed in future, hence it is not vulnerable to stored XSS. When this can be exploited? The developer isn't validating user inputs. The developer added certain validations but they are client side |
global_05_local_5_shard_00002591_processed.jsonl/50407 | Memory Cards for Wholesale
Please note, the Memory Cards sold on this website are for wholesale customers only (i.e. cell phone shops, retailers and variety stores).
Wholesale computer memory cards are useful for storing data such as music, videos, files, etc. Memory cards are also widely used for cell phones, digital cameras and other electronics. |
global_05_local_5_shard_00002591_processed.jsonl/50420 |
A Digest of The Omnivore’s Dilemma Part 5: Eating Animals
“Should People Eat Tasty Animals?”
Every good hunter is uneasy in the depths of his conscience when faced with the death he is about to inflict on the enchanging animal.” -Ortega y Gasset
For his book’s journey Pollan ate (and explored) a McD’s meal, a supermarket “organic” meal, and then a local, organic, sustainably farmed meal. His final meal requires two hunts: One hunt for fungi, and another hunt for pig. I learned a whole lot about fungi, but what I mostly want to talk about is the hunting of animals.
I’ve never killed a mammal for food. I’ve know many who have, and have tasted of what they killed. I even once ate a deer hit by a truck (thanks to my friend T-Dogg). When I was little my dad took me hunting but I didn’t have the patience for it. The same went for fishing, although I remember chopping the heads off a couple fish before my dad cleaned them. I’ve always wanted to go through the experience of hunting just once. It fascinates me now. In one way because of the art and poetry of going off into the woods and hunting for food, being alone, accomplishing the hunt, performing an activity older than buying cooking. Another way it fascinates me is the almost sadistic attitude some hunters have, and how some people hypocritically look down on hunting yet eat meat that is killed in less authentic ways than hunting.
Continue reading |
global_05_local_5_shard_00002591_processed.jsonl/50454 | Obtaining certificate chain for blog-am-schloss.de, one moment while we download the blog-am-schloss.de certificate and related intermediate certificates...
Revocation check via OCSP and CRL for blog-am-schloss.de failed
Sorry, the request for blog-am-schloss.de could not be completed...
We could not load the certificate for blog-am-schloss.de, it might not exist or we could not reach the server, complete the TLS handshake, etc.
Check the revocation status for another website
Created by Paul van Brouwershaven
© 2015 - 2020 Digitorus B.V.
Privacy Policy |
global_05_local_5_shard_00002591_processed.jsonl/50457 | Main Content
Read 3-D point cloud from PLY or PCD file
ptCloud = pcread(filename) reads a point cloud from the PLY or PCD file specified by the input filename. The function returns a pointCloud object, ptCloud.
collapse all
ptCloud = pcread('teapot.ply');
Input Arguments
collapse all
File name, specified as a character vector or a string scalar. The input file type must be a PLY or a PCD format file.
The polygon (PLY) file format , also known as the Stanford triangle format stores three-dimensional data from 3-D scanners. It is a format for storing graphical objects that are described as a collection of polygons. A PLY file consists of a header, followed by a list of vertices and then, a list of polygons. The header specifies how many vertices and polygons are in the file. It also states what properties are associated with each vertex, such as (x,y,z) coordinates, normals, and color. The file format has two sub-formats: an ASCII representation and a binary version for compact storage and for rapid saving and loading. The header of both ASCII and binary files is ASCII text. Only the numeric data that follows the header is different between the two versions. See The PLY Format for details on the contents of a PLY file.
The point cloud data (PCD) file format also stores three-dimensional data. It was created by the authors of the widely used point cloud library (PCL) to accommodate additional point cloud data requirements. See The PCD (Point Cloud Data) file format.
This function only supports PCD file formats saved in version 0.7 (PCD_V7). It also only supports the header entries with the COUNT entry set to 1. It does not support the COUNT entry set to a feature descriptor.
Output Arguments
collapse all
Object for storing point cloud, returned as a pointCloud object that contains the following PLY or PCD fields:
• Location property, stores the x, y, and z values.
• Color property, stores the red, green, and blue values.
• Normal property, stores the normal vectors for each point.
• Intensity property, stores the grayscale intensity for each point.
Introduced in R2015a |
global_05_local_5_shard_00002591_processed.jsonl/50465 | APIs helping journalism “scale up”
A couple of days ago, I quoted AOL CEO Tim Armstrong on developing tools to help journalists “scale up” what they do. ?In a post on Poynter’s E-Media Tidbits, Megan Garber has a highlighted a good practical example of what I meant .
One thing that computers and other technology can help journalists to work more efficiently is to cut down or eliminate frequent, repetitive tasks. Derek Willis at the New York Times talks about APIs (as Derek describes APIs as “just a Web application delivering data). Derek says:
The flexibility and convenience that the APIs provide make it easier to cut down on repetitive manual work and bring new ideas to fruition. Other news organizations can do the same.
Derek also points how savvy use of data is not just good for data visualisations and infographics, but it is also an excellent resource for New York Times’ journalists.
So if you have a big local election coming up, having an API for candidate summary data makes it easier to do a quick-and-dirty internal site for reporters and editors to browse, but also gives graphics folks a way to pull in the latest data without having to ask for a spreadsheet.
And as he said, the biggest consumer of New York Times APIs is the New York Times itself.
Projects such as building an API can be quite large (although new companies and also organisations like the Sunlight Foundation in the US and MySociety in the UK have great public service APIs and data projects), but with the benefits to both audiences, designers, developers and journalists, it makes it easier to justify the time and effort. |
global_05_local_5_shard_00002591_processed.jsonl/50467 | Skipping disliked songs in iTunes
Warning: Technospeak ahead.
I’m a long-time Mac person. And I knew macOS had a cool tool called AppleScript to automate tasks.
After some fiddling around with some help from tutorials Using Script Editor from Doug’s AppleScripts for iTunes and idle thoughts from MacScripter, I came up a script. All I have to do is launch both iTunes and this script and then dislike whichever songs I wish. The moment I dislike a song, it skips to the next un-disliked song nearly immediately. And if I play a playlist or album again, it skips the disliked song again. Yay!
The only glitch I’ve noticed – besides not being able to see at a glance which songs you’ve already loved or disliked – is that, if a disliked song starts at the very start of the track, I sometimes hear up to a second of the disliked song before it gets skipped, especially if I have two or more disliked songs in a row. A small price to pay.
I’ve tested in in Apple Music and Apple Radio for people who have Apple Music.
I don’t know what would happen if you use Apple Radio without an Apple Music subscription (not sure if you can still do that) and hit the hourly skip limit. I think you would get a continuous series of nags that you can’t skip the song. If that happens, quit Skip Disliked Songs. I don’t have a workaround.
And now the script:
global timeToWait
on idle
tell application "System Events"
if (exists process "iTunes") then
tell application "iTunes"
if player state is not stopped then
tell current track
if disliked is true then
next track
end if
return timeToWait
on error
return timeToWait
end try
end tell
end if
on error
return timeToWait
end try
end tell
end if
end tell
end idle
on run
set timeToWait to 0.5
end run
And for those not familiar with AppleScript, here are the (Mac-only) steps:
Do this once:
1. In your applications folder, in the Utilities sub-folder, launch Script Editor.
2. If you don’t see a little scroll icon – kind of looks like a fancy “s” – in the menu over to the right with all the other menu icons:
1. In the menu, choose Script Editor > Preferences.
2. In the General tab, check Show script menu in menu bar.
3. In the General tab, check Show computer scripts.
4. Click the close button.
3. If you don’t get an “Untitled” window, choose File > New from the menu.
4. Paste in the script above into the main editing area.
5. Click the hammer icon to compile the script. If you get any errors, clear it out and try re-copying and re-pasting.
6. In the File menu choose Export.
7. Name the file Skip Disliked Songs.
8. Navigate to your home folder.
9. If you don’t see a Library folder, hold down the Option key to reveal it.
10. Navigate to Library then Scripts.
11. If you want to keep any future scripts you might add organized, create an Applications folder, then an iTunes folder inside that, and navigate down to it. But that’s up to you.
12. In the File Format drop-down, choose Application.
13. Then check Stay open after run handler. This application is meant to stay open and keep an ear on iTunes.
14. Click Save
Once you’ve done that, do this each time you open iTunes:
1. In the menu bar, over to the right, look for something that looks like an old-fashioned scroll of paper. That’s the Script menu.
2. In the Script menu, choose Skip Disliked Songs.
3. If you find that the tiny snippets of disliked song bother you, you can go back and change timeToWait to a smaller number, say 0.25. If you experience performance issues, change it to a larger number at the expense of a larger snippet.
You’re all set! Enjoy your music.
Fine print: This is free software. I disclaim all warrantees and liability for its use.
3 thoughts on “Skipping disliked songs in iTunes
1. Sounds like a clever solution. However, I received following response upon export/save attempt: “The document “Untitled” could not be exported as “Skip Disliked”. (Error -5,000)” [MacOS 10.12.6]
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
global_05_local_5_shard_00002591_processed.jsonl/50469 | In the permanganate ion, manganese is in the $+7$ oxidation state, therefore it is a $\ce{d^0}$ ion. $\ce{d^0}$ and $\ce{d^1^0}$ ions don't absorb visible spectrum radiation because there are no electrons to jump to higher crystal field orbitals (or in the case of $\ce{d^{10}}$ ions, there are no free orbitals for electrons to jump to). I think that the explanation to this question has something to do with the ligand donating electrons into $\ce{Mn^{VII}}$'s empty d orbitals or molecular orbital theory or $\ce{d-d}$ transition or none of them.
Also, chromate is also colored wherein $\ce{Cr^{VI}}$ is a $\ce{d^0}$ ion, therefore its not absorbing radiation due to electrons jumping to higher orbitals in the crystal field. What is causing it to absorb visible radiation?
• 1
$\begingroup$ Possibly a duplicate of this. However, I feel the other question approaches the issue from a wildly different angle leading to possibly different explanation concepts. $\endgroup$ – Jan Oct 28 '15 at 10:01
• 2
$\begingroup$ I made a very short answer here: chemistry.stackexchange.com/a/32332/16683 However, if you want a MO description, it definitely won't satisfy you. I recommend editing the question (especially the title) to reflect what you are asking for because otherwise it can easily be considered a duplicate. $\endgroup$ – orthocresol Oct 28 '15 at 10:40
• $\begingroup$ Crystal field theory is nice and dandy, but people often forgot that d-d bands are typically weak, therefore many times you see an intense colour in complex chemistry, it is charge transfer (CT) band, not a d-d band. Which should be present in the spectrum on any metal in high oxidation state, anyways. The explanation is simple: the dipole integral for LMCT and MLCT bands are much larger than for d-d bands. $\endgroup$ – Greg Oct 28 '15 at 19:32
Let’s take a look at a qualitative MO scheme for a tetrahedric transition metal complex whose ligands have three p-type orbitals each. On the left of figure 1 you have the metal orbitals ($\mathrm{3d}$, $\mathrm{4s}$ and $\mathrm{4p}$) and on the right the twelve degenerate ligand p-orbitals (transform as $\mathrm{a_1 + e + t_1 + 2t_2}$). Only orbitals of the same symmetry will mix, so the $\mathrm{t_1}$ ones stay where they are originally. I have colour-coded both the $\mathrm{t_2}$ (red) and $\mathrm{e}$ (blue) orbitals.
orbital scheme tetrahedric complex
Figure 1: Qualitative MO scheme of a tetrahedric complex with σ and π bonding between metal and ligands. Double vertical lines represent electron pairs.
Note that the image is qualitative only. The order of energy levels can be different; it is not possible to predict it a priori. The more electronegative a side is, the lower its orbital energies will be. Manganese(VII) is lacking seven electrons so the orbital energies will be very low, will oxygen profits from its high electronegativity. All in all, the energies will be somewhat similar.
We can consider the filled orbitals to be mostly ligand-centred and the empty ones to be mostly metal-centred, in full alignment with the picture of a $\ce{d^0}$ $\ce{Mn^{VII}}$ core and four $\ce{O^2-}$ ligands with electron octets.
The electronic transition that causes the intense purple colour corresponds to an excitation from $\mathrm{t_1}$ to $\mathrm{e}$ — $\mathrm{t_1}$ should always be the highest ligand orbital, while tetrahedric symmetry typically implies that $\mathrm{e}$ lies lower than $\mathrm{t_2}$ on the metal’s side. The higher the central metal’s oxidation state, the lower its orbitals and the closer it is to the ligands’ p-orbitals.
Since the transition is from a ligand-centred to a metal-centred orbital, it is called Ligand to Metal Charge Transfer (LMCT). Oversimplified, one could think of it as a one-electron reduction of manganese by an oxygen ligand to intermediately create $\ce{Mn^{VI}-O^{.}}$.
The transition is obviously spin-allowed (filled to empty orbitals) and the Laporte-rule is invalid in tetrahedric complexes as there is no centre of symmetry. Therefore, the observed colour is very intense.
| improve this answer | |
Your Answer
|
global_05_local_5_shard_00002591_processed.jsonl/50474 | Home > Universe > The Big Bounce and the shape of the Universe
The Big Bounce and the shape of the Universe
So we evolved on this rock somewhere in the suburbs of a large galaxy. But looking around (read: into the stars) we are able to figure some things out, like where it all came from and where it is going. There is still a lot to learn, we barely scratched the surface, let’s try to sum up some things we already know.
Until recently the widely or wildly popular theory was that it all started with a Big Bang! But where did this singularity which gave birth to our Universe come from? What triggered the explosion of space, time, energy, matter and information?
Cosmic microwave background should be uniform. However astronomers who observe and analyze it find some irregularities. These irregularities could be the remnants of the previous incarnation of our Universe, the proof for a new interesting theory, which says it wasn’t a Big Bang, but rather a Big Bounce. The Universe existed before, but for some reason, like gravity, it compressed into one spot. For some reason the compression reached a critical point and it all exploded again.
The Universe has been expanding for the last ~14 billion years. It’s likely going to slow down at some point. Whatever caused to compress it before, will stop the expansion and induce a collapse again. Gravity is a force which we know, but we can’t tell for sure yet if that’s the real cause behind the collapse. In fact we can’t even reliably estimate the mass of our galaxy, let alone the whole Universe and that would be necessary to tell whether it’s gravity that pulling it all together or not.
Looking far away with our best telescopes we can see the faint light that gets to us after billions of years. The farther we look, the older the light. The “oldest” light we see is from before about 14 billion years. This is how we estimate the age of the Universe. The shift of the spectrum of the light we see towards red indicates that the Universe is expanding.
Some theories propose that the expansion is not only caused by the matter speeding after the Big Bounce, but also by expansion of the space itself. This would explain why two points of space sufficiently far away from each other escape from each other with a speed which virtually seems greater than speed of light. Therefore if places far away from us escape virtually faster than light, we will never be able to se what’s beyond a certain point.
Because of this “faster-than-light” expansion, the Universe is bigger than what we can see, according to some estimates by an order of magnitude, or even more. The truth is, at this point we don’t even know how big the Universe really is, the estimates vary, we suspect it’s ~14 billion years old but much bigger than that the distance that light would travel in ~14 billion years.
What does the Universe look like, what is its shape? The simplest answer is that it’s filling the inside of an expanding sphere. The shockwave of the initial explosion is really fast, so we can’t get out and see it from outside. Some even propose that there is no space outside, that the space exists only inside of the Universe, which physically makes sense, because what we think of as empty space, completely sterile vacuum, is in fact not empty, but full of energy. Since there is no energy or anything beyond the expanding sphere of the Universe, we can’t treat it as ordinary space as we know it.
I do not really believe that the Universe is an expanding sphere sitting in an unexplainable, unmeasurable, infinite, sterile and pristine void without bounds of end. That does not make any sense to me. But I have my own theory.
In my opinion our Universe is a three dimensional surface of a four dimensional sphere. This is mind boggling and impossible to imagine “from the outside”, but it’s quite easy to grasp from the inside if we compare it to our two dimensional life on Earth. If we were able to freeze the time and then send a spaceship in any randomly chosen direction, the starship would eventually return from the opposite side. This means that to us, confined to the three dimensional space of our Universe, there is no boundary, there is no escape, there is no getting out. No matter where we go, we will eventually get back to where we started.
What I think really expands is the four dimensional sphere on which surface our three dimensional Universe is located. It’s like the Earth was a balloon and somebody was blowing it. When we’re blowing a balloon, its volume expands, so does its surface. The number of atoms on the surface remains the same, only the expansion of the balloon causes them to move away from each other. Similar thing happens to our Universe.
The fourth dimension of the expanding sphere is not time. At some point the Universe will stop expanding and will start collapsing again, but the time will not start going back. (Or will it?)
So what if it’s true, if the Universe has multiple lives, if it is expanding and collapsing back and forth? What is causing it? It could be gravity. My theory is that the behavior of the Universe is like a perfect pendulum. It swings back and forth. When it expands, the expansion is slowing down up to certain point when it stops, then collapses back again, the collapse accelerates until finally the Universe collapses into a singularity and all matter and energy ends up in one spot having maximum “kinetic” energy it bounces and starts expanding again, the expansion decelerates until it stops again at the same point as before. If the contents of the Universe don’t have a place to escape, the process is perfectly conserved and the Universe is bouncing back and forth, forever. And every iteration of the Universe can be different, doesn’t need to be identical, the elements of matter and energy don’t have to follow the same paths as before the bounce.
Maybe it’s like that, maybe not. Even if it is, it does not explain how this all started, where it came from, what’s inside the four dimensional sphere and what’s outside. Will anyone be ever able to find out?
Categories: Universe
1. No comments yet.
1. 11.10.2012 at 20:32
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this: |
global_05_local_5_shard_00002591_processed.jsonl/50484 |
Friday, December 4, 2020
Study Resources
• Interlinear Bible
• Parallel Bible
• Daily Reading Plan
• Devotionals
• Commentaries
• Concordances
• Dictionaries
• Encyclopedias
• Lexicons
• History
• Sermon Essentials
• Audio Resources
• Religious Artwork
Other Resources
• Advertise with SL
• FREE Resources
• Information
• Set Preferences
• Font Resources
• Contacting SL
John Darby's Synopsis of the New Testament
Search This Resource
Chapter 3
Chapter 5
Printer friendly version
Additional Resources
• Adam Clark Commentary
• Burton Coffman
• Barnes' New Testament
• Gill's Exposition
• Jamieson, Fausset, Brown
• Matthew Henry Complete
• Matthew Henry Concise
• People's New Testament
• Robertson's Word Pictures
• Treasury of Scripture
• Wesley's Explanatory Notes
2 Corinthians 4
Having received this ministry of righteousness and of the Spirit, the foundation of which was Christ glorified beheld with open face, he not only used great boldness of speech, but his zeal was not abated, nor his faith enfeebled by difficulties. Moreover, with the courage which through grace was imparted to him by this doctrine, he held back nothing, weakened nothing of this glory; he did not corrupt the doctrine; he manifested it in all the purity and brightness in which he had received it. It was the word of God; such as he had received it, so they received it from him, the unaltered word of God; the apostle thus approving himself, commending himself to every man's conscience in the sight of God. All could not say this. The glory of the Lord Jesus was set forth by Paul's preaching in all the clearness and brightness of its revelation to himself. If, therefore, the good news which he proclaimed was hidden, it was not as in the case of Moses; not only was the glory of the Lord fully revealed with open face in Christ, it was also manifested without a veil in the pure preaching of the apostle. This is the link established between the glory accomplished in the Person of Christ, as the result of the work of redemption, and the ministry which, by the power of the Holy Ghost acting in the instrument chosen of the Lord, proclaimed this glory to the world, and made men responsible for the reception of the truth-responsible for submission to this glorious Christ, who announced Himself in grace from heaven, as having established righteousness for the sinner, and as inviting him to come freely and enjoy the love and the blessing of God.
Now there was no other means of coming to God. To set up any other would be to put aside and declare imperfect and insufficient that which Christ had done, and that which Christ was, and to produce something better than He. But this was not possible: for that which he announced was the manifestation of the glory of God in the Person of the Son, in connection with the revelation of perfect love, and of the making good perfect and divine righteousness; so that the pure light was the happy abode of those who by this means entered into it. There could not be anything more, unless there was something more than God in the fulness of His grace and of His perfection. If then this revelation was hidden, it was in the case of those who were lost, whose minds were blinded by the god of this world, lest the light of the good news of the glory of Christ, who is the image of God, should shine into their hearts.
This is translated "glorious gospel." But we have seen that the fact of Christ's being in glory, the glory of God being seen in His face, was the special subject of the preceding chapter. To that the apostle here alludes as characterising the gospel which he preached. It was the proof of the sin Christ had borne being utterly put away, of victory over death, of the introduction of man into the presence of God in glory according to God's eternal counsels of love. It was withal the full display of the divine glory in man according to grace, which the Holy Ghost takes to shew to us in order to form us after the same likeness. It was the glorious ministration of righteousness, and of the Spirit, which opened the free way for man to God, even into the holiest, in entire liberty.
When Christ was thus proclaimed, there was either the joyful acceptance of the good news, submission of heart to the gospel, or else the blinding of Satan. For Paul did not preach himself (which others did not fail to do) but Jesus Christ the Lord, and himself their servant for Jesus' sake. Because in fact (and this is another important principle) the shining forth of this gospel of the glory of Christ is the work of God's power-of the same God who, by His word alone, caused the light instantaneously to shine out of the midst of darkness. He had shone into the apostle's heart to give forth the light of the knowledge of His own glory in the face of Jesus Christ. The gospel shone forth by a divine operation similar to that which had, in the beginning, caused the light to shine out of darkness by a single word. The heart of the apostle was the vessel, the lamp, in which this light had been kindled to shine in the midst of the world before the eyes of men. It was the revelation of the glory which shone in the Person of Christ by the power of the Spirit of God in the heart of the apostle, in order that this glory should shine out in the gospel before the world. It was the power of God which wrought in it, in the same manner as when light was caused by the word "Let there be light! and there was light." But the treasure of this revelation of the glory was deposited, in earthen vessels, in order that power which wrought in it should be of God alone, and not that of the instruments. In all, the weakness of the instrument shewed itself in the trying circumstances which God, for this very purpose (among others), made the testimony pass through. Nevertheless the power of God was manifested in it so much the more evidently, from the vessel's shewing its weakness in the difficulties that beset its path. The testimony was rendered, the work was done, the result was produced, even when man broke down and found himself without resource in presence of the opposition raised up against truth.
Afflicted by the tribulation, this was the vessel's part; not straitened, for God was with the vessel. Without means of escape, that was the vessel; yet not without resource, for God was with it. Persecuted, that was the vessel; not forsaken, for God was with it. Cast down, that was the vessel; but not destroyed, for God was with it. Always bearing about in his body the dying [See Footnote #3] of the Lord Jesus (made like Him, in that the man as such was reduced to nothing), in order that the life of Jesus, which death could not touch, which has triumphed over death, should be manifested in his body, mortal as it was. The more the natural man was annihilated, the more was it evident that a power was there which was not of man. This was the principle, but it was morally realised in the heart by faith. As the Lord's servant, Paul realised in his heart the death of all that was human life, in order that the power might be purely of God through Jesus risen. But besides this, God made him realise these things by the circumstances through which he had to pass; for, as living in this world, he was always delivered unto death for Jesus' sake, in order that the life of Jesus might be manifested in his mortal flesh. Thus death wrought in the apostle; what was merely of man, of nature and natural life, disappeared, in order that life in Christ, developing itself in him on the part of God and by His power, should work in the Corinthians by his means. What a ministry! A thorough trial of the human heart, a glorious calling, for a man to be thus assimilated to Christ, to be the vessel of the power of His pure life, and by means of an entire self-renunciation, even that of life itself, to be morally like unto Jesus. What a position by grace! What a conformity to Christ! And yet in a way in which it passed through man's heart to reach man's heart (which indeed is of the essence of Christianity itself), not surely by man's strength, but God's made good in man's weakness.
226 Therefore it was that the apostle could use the language of the Spirit of Christ in the Psalms, "I believed, and therefore have I spoken." That is to say, 'At whatever cost, in spite of everything, of all the danger, all the opposition, I have spoken for God, I have borne my testimony. I have had confidence enough in God to bear testimony to Him and to His truth, whatever the consequences might be, even if I had died in doing it.' That is, the apostle said, 'I have acted as Christ Himself did, because I know that He who raised up Jesus would do the same for me, and would present me, together with you, before His face in that same glory in which Christ is now in heaven, and for my testimony to which, I have suffered death like Him.' We must clearly distinguish here between Christ's sufferings for righteousness and for His work of love, and His sufferings for sin. The former it is our privilege to share with Him; in the latter He is alone.
The apostle said, "will present me with you," for, he adds, according to the heart and mind of Christ towards His own, "all things are for your sakes, that the abundant grace might, through the thanksgiving of many, redound to the glory of God." And therefore it was that he did not allow himself to be discouraged; but on the contrary, if the outward man perished, the inward man was renewed day by day. For the light affliction, which was but for a moment (for such he esteemed it in view of the glory-it was but the temporary affliction of this poor dying body), worked out for him an eternal weight of glory which was beyond all the most exalted expression of human thought or language. And this renewing took place; and he was not disheartened come whatmight, in that he looked not at the things that are seen, which are temporal, but at the things that are not seen, which are eternal. Thus the power of the divine life, with all its consequences, was developed in his soul by faith. He knew the result of everything on God's part.
It was not only that there were things invisible and glorious. Christians had their part in them. We know, the apostle says in their name, that if this earthly house (passing away as it is) were destroyed-and it had very nearly been the case with himself-we have a building of God, a house not made with hands, eternal in the heavens. Precious certainty! He knew it. Christians know it as a part of their faith. We know [See Footnote #4] -a certainty which caused this glory, which he knew to be his, to be a real and practical hope in the heart by the power of the Holy Ghost-a reality present by faith. He saw this glory as that which belonged to him, with which he was to be invested. And therefore also he groaned in his tabernacle, not (as so many do) because the desires of his flesh could not be fulfilled; and because satisfaction of heart cannot be found for man, even when those desires are fulfilled; nor because he was uncertain whether he was accepted, and the glory his or not; but because the body was a hindrance, tending to depress the divine life, to deprive him of the full enjoyment of that glory which the new life saw and desired, and which Paul saw and admired as his own. It was a burden, this earthly human nature; it was no distress to him that he could not satisfy its desires; his distress was to find himself still in this mortal nature, because he saw something better.
Not however that he desired to be unclothed, for he saw in Christ glorified a power of life capable of swallowing up and annihilating every trace of mortality; for the fact that Christ was on high in the glory was the result of this power, and at the same time the manifestation of the heavenly portion that belonged to them that were His. Therefore the apostle desired, not to be unclothed but clothed upon, and that that which was mortal in him should be absorbed by life, that the mortality that characterised his earthly human nature should disappear before the power of life which he saw in Jesus, and which was his life. That power was such that there was no need to die. And this was not a hope which had no other foundation than the desire awakened by a view of the glory might produce: God had formed Christians for this very thing. He who was a Christian was formed for this, and not for anything else. It was God Himself who had formed him for this-this glory, in which Christ, the last Adam, was at the right hand of God. Precious assurance! Happy confidence in the grace and the mighty work of God! Ineffable joy to be able to attribute all to God Himself, to be thus certified of His love, to glorify Him as the God of love-our Benefactor, to know that it was His work, and that we rest upon a finished work-the work of God. It is not here resting upon a work done for us; but the blessed consciousness that God has wrought us for this: we are His workmanship.
Nevertheless something else was necessary to our enjoying this, since we are not yet glorified in fact; and God has given it-the earnest of the Spirit.
Thus, we have the glory before us, we are wrought for it by God Himself, and we have the earnest of the Spirit till we are there, and know that Christ has so entirely overcome death that, if the time were come, we should be transformed into glory without dying at all. Mortality would be swallowed up of life. This is our portion through grace in the last Adam, through the power of life in which Christ was raised.
But next the apostle will treat of the effect as to the natural portion of the first fallen man, death and judgment; for the testimony here is very complete.
Footnotes for 2 Corinthians 4
3: Or rather, "putting to death."
4: This "we know" is in fact a technical expression for the portion of Christians, known to them as such. "We know that the law is spiritual," "we know that the Son of God is come," and so on.
Copyright Statement
These files are public domain and are a derivative of an electronic edition that is available on the Christian Classics Ethereal Library Website. These files were made available by Mr. Doug Nicolet.
Bibliography Information
Darby, John. "Commentary on 2 Corinthians 4". "John Darby's Synopsis of the New Testament". <>.
Dead links, typos, or HTML errors should be sent
Suggestions about making this resource more useful should be sent
Powered by LightSpeed Technology
Copyright © 2001-2020, |
global_05_local_5_shard_00002591_processed.jsonl/50494 | CloudEXPO 2019 has ended
Back To Schedule
Monday, June 24 • 11:00am - 11:35am
Containers: Don't Skeu Them Up. Use Microservices Instead
Feedback form is now closed.
Containers: Don't Skeu Them Up. Use Microservices Instead
In his session at ServerlessSUMMIT, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, will discuss why containers should be paired with new architectural practices such as microservices rather than mimicking legacy server virtualization workflows and architectures.
It's far more fruitful and useful to approach containers as something fundamentally new and enabling that's part and parcel of an environment including containerized operating systems, container packaging systems, container orchestration like Kubernetes, DevOps continuous integration and deployment practices, microservices architectures, "cattle" workloads, software-defined everything, management across hybrid infrastructures, and pervasive open source as part of a new platform for cloud apps.
avatar for Gordon Haff
Gordon Haff
Technology Evangelist, Red Hat
Gordon Haff is Technology Evangelist at Red Hat where he works on emerging technology product strategy; writes about tech, trends, and their business impact; and is a frequent speaker at customer and industry events. Among the topics he tries to keep up with are DevOps, IoT, blockchain... Read More →
Monday June 24, 2019 11:00am - 11:35am PDT
04 Kubernetes at CloudEXPO Great America 1 |
global_05_local_5_shard_00002591_processed.jsonl/50506 | Information for "BIN fnc getSignalTypes"
Jump to navigation Jump to search
Basic information
Display titleBIN_fnc_getSignalTypes
Default sort keyGETSIGNALTYPES
Page length (in bytes)1,054
Page ID26449
Page content languageen - English
Page content modelwikitext
Indexing by robotsAllowed
Number of redirects to this page0
Counted as a content pageYes
Page protection
EditAllow all users (infinite)
MoveAllow all users (infinite)
View the protection log for this page.
Edit history
Page creatorEM_Interface>Unknown user
Date of page creation18:42, 3 April 2006
Latest editorR3vo (talk | contribs)
Date of latest edit13:19, 13 October 2020
Total number of edits13
Total number of distinct authors4
Recent number of edits (within past 90 days)2
Recent number of distinct authors1
Page properties
Magic words (2)
• __NOTOC__
Transcluded templates (17)
Templates used on this page: |
global_05_local_5_shard_00002591_processed.jsonl/50514 | God’s knowing
One of the most terrible stories in the Bible is the near sacrifice of Isaac. It’s hard to read and it can be difficult to think about. At the same time it is an important story and worth some discomfort to think about it.
The start of the story tells us that what follows is a test. Which raises the question, why does God test Abraham?
What do you think?
Can it be that God doesn’t know how obedient, how faithful Abraham will be? Is God trying to figure out if Abraham is trustworthy? Is God trying to figure out if Abraham thinks God is trustworthy?
When we read this story we have to wonder, what does God know? Can there be things God doesn’t know?
It is common for Christians to believe that God knows everything. Some of us even believe that God knows the future. And not only that God knows the future, but God has planned the future. However, is that what we find in the Bible?
The book of Genesis is full of stores about God not knowing everything. It is full of stories where God does not control everything. And there are stories where God changes God’s mind.
God asks Adam and Eve, “Where are you?”
God looks at a corrupt humanity and regrets creating us.
Then God decides that the flood was wrong and promises not to do that again.
Abraham convinces God not to destroy Sodom if there are 10 righteous people there.
We’re not even halfway through Genesis yet.
In the story of the near sacrifice of Isaac, God needs to figure out if he and Abraham trust each other.
There are a couple (at least) ways to think about this test. One is that God already knows the outcome but wants Abraham to know for certain that God is trustworthy. That may be, but wouldn’t the whole of Abraham’s experience with God tell him that? If God already knows the outcome, putting Abraham (and Isaac) through such a test seems cruel and arbitrary.
On the other hand if God doesn’t know what Abraham will do, does that mean that God isn’t in control of the world and of our lives? If God isn’t in control, who is? Or perhaps we might wonder, is anyone in control?
On the other hand, if we have the ability to freely make choices then hasn’t God given up some control?
It is difficult, perhaps impossible for us to know what God knows and doesn’t know, what God controls and doesn’t control. But is it a bad thing if God doesn’t control everything? Perhaps God’s giving up some control a reflection of God’s trust in us? It seems that God wants us to participate freely in God’s plans for the world. For that to happen, God has to allow some space for us to act.
It is a risky thing God does when God shares control with us. There seems to be no end to the ways we can mess things up. The Bible is full of stories where we didn’t keep up our part of the bargain. Our lives are full of stories where we didn’t keep up our part of the bargain.
We get scared and don’t act. We get cocky and try to control too much. But God doesn’t give up on us. God keeps working with us, encouraging us, guiding us. Sometimes, every now and again, we pay attention and we remember God is present to help us, to work with us, to work through us. So sometimes we can listen and act in harmony with the Spirit. But our actions are never coerced. They are not forced. Does God have a plan for our lives? I think so. Does God force us to participate in that plan? No.
That’s God’s dilemma isn’t it? God is trustworthy. Us? Not so much.
4 thoughts on “God’s knowing
1. Yes David, We can have a theological understanding and yet as parents really be upset by this story. The challenge, at least one of the challenges, is to hold both of these things together at the same time.Some texts are meant to always make us uncomfortable, I think. Thanks for reading and commenting.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_05_local_5_shard_00002591_processed.jsonl/50516 | I've got most of a 5 pound bag of masa harina left from a semi-successful foray into the world of tamales. Recently I've really enjoyed my pasta roller. It got me thinking. Is there some way I could roll out something fun made with masa harina? Obviously, that's not a traditional way to handle masa harina, but it could give me something fun to play with. I'm thinking maybe a riff on "Mexican Lasagna". My initial thinking is masa harina and warm mater in the same ratio as to make tortillas, give that a good whir in the food processor, and then add about the same amount of basic pasta ingredients (egg, flour,oil, salt) except use bread flour to give the combo some gluten. I could use the exercise, I would expect that combo to require a lot of kneading and a good rest between kneading periods. I'm not married to that combo or ratio and I'm open to suggestions. I'm not expecting to go as thin as pasta, but think I'd like to go as thin as my dough will let me. Once I have something rolled, I'd happily experiment with boiling, frying, steaming, baking or any good suggestions you might have. I'm not trying to make pasta or tortillas, but something entirely different using techniques and ingredients from both traditions.
So, do you think it could work? What pitfalls would you anticipate? Is there anything you would add or do differently? Finally, assuming I have a dough that I can stretch (I wouldn't risk it otherwise) do you see any way this could damage my pasta roller?
I have mede pasta years ago with regular corn flour (not cornstarch, but just a non-nixtamalized version of maseca or very finely ground cornmeal if you wish) and I don't remember much in terms of the recipe, but I remember that it worked well in the roller and that the result was awesome. And I don't see a reason why you couldn't do the same with masa harina to add a little bit of the delicious nixtamal flavor (like they did here) =)
I tried to google a corn pasta recipe to link to (as I couldn't remember mine) ... and one of the first hits was - guess what - with masa harina. Here is the video, where it seems like they also use a pasta roller with no problems, but they were trying to make something gluten free, but there are a lot of other cornmeal pasta recipes online that use regular flour mixed in.
Just some thoughts on masa flour: in my experience when you making a firmer dough it often tends to come out a bit more crumbly ... but I had good success (if I wanted a bitt more compact workable dough) by mixing it 1:1 to all-purpose flour. The nixtamal flavor is strong enough that you still taste it well even if you use more wheat flour. Sometimes I also add a couple of drops of oil so that it isn't so sticky (you can also use other fats ... like the masa for tamales often calls for lard).
| improve this answer | |
• 1
I could have sworn I Googled it when I first had the thought a couple of weeks ago. The concepts I found looking at your links now are not much removed from my idea, except mixing the masa with water doesn't seem to be necessary. I like the idea of using lard instead of olive oil. Hmmm...this sounds good, maybe with a creamy roasted chile sauce sprinkled with queso fresco. Thanks! I think I'll give it a try soon. – Jolenealaska Oct 1 '13 at 22:42
Your Answer
|
global_05_local_5_shard_00002591_processed.jsonl/50545 |
This verse came alive to me the other day when I saw a grapevine in a friend’s backyard. The vine was full of small unripe grapes just waiting to grow into maturity. However, there was one part of the vine that was long and had no grapes. Remembering the words of Jesus, I saw firsthand how a vine can put so much energy into a branch that would never produce fruit.
Likewise, there are probably areas of your life where you are putting forth much energy and are likely producing no fruit.
God is seeking to remove these things from your life. It’s not because He hates you, it’s because He loves you. God sees potential in your life that you don’t see. And one of the ways He mines out potential is through pruning.
Pruning is painful, but it’s not without purpose.
The purpose that God has for your life is infinitely better than you can imagine. He wants to use you to change your family. He wants to use you to lead someone to salvation. He wants to use you mentor someone who has no one. But He can only do it if you let Him prune you.
With God, the sacrifice is always little compared to the reward. But the reward never comes without first a sacrifice. What is it that God is calling you to put down? I believe the Holy Spirit is bringing things to mind that He purposes to remove.
Or maybe God has already taken something out of your life, and it hurts. I want to encourage you. Don’t replace it with something else, embrace the pain knowing that it holds purpose.
Our greatest victories come from our toughest battles, and our highest purpose is on the other side of our deepest pain.
Embrace the pruning, knowing that there’s purpose in the pain.
Comment Below |
global_05_local_5_shard_00002591_processed.jsonl/50550 | 1 dataset found
Licenses: UK Open Government Licence (OGL) Formats: .xslx Groups: Health and Wellbeing Tags: poverty open data
Filter Results
• Child Poverty
|
global_05_local_5_shard_00002591_processed.jsonl/50569 | Announcing Fitbit OS SDK 4.1
chevron down
Announcing Fitbit OS SDK 4.1
Fitbit OS SDK 4.1
We're proud to announce the latest version of the software development kit for Fitbit OS.
SDK 4.1 adds a new API for calendar access, Always-on Display API, detecting a user's primary goal, and some rather useful enhancements to the Document API.
SDK 4.1 support requires the new Fitbit OS 4.1 firmware update which is now available for all in-market smartwatches.
With this release we deprecated SDK 3.1 as we previously described in our deprecation blog post. While existing published projects will continue to work for users, you should now switch to SDK 4.1 for updates, or new projects.
Note: Access to the Always-on Display API is currently invite-only. Read more below.
Calendars API
It's always exciting to announce new APIs, but this one is extra special and has amazing potential for both clocks and apps alike.
The Companion Calendars API provides developers with a read-only view of calendar events from all calendars on a user's mobile phone. We used this new API at Fitbit to create the Agenda app that launched with Fitbit OS 4.1.
The API provides access to multiple calendar data sources on the phone, including IMAP and Microsoft Exchange servers, and each data source can contain multiple calendars. Calendar events are retrieved by searching and iterating this promise based API.
Here's a basic example which retrieves all events, from all calendars, within the next 48 hours:
if (me.permissions.granted("access_calendar")) {
.then(sources => {
console.log("All calendar data sources");
return calendars.searchCalendars();
.then(results => {
console.log("All calendars");
const start = new Date();
const end = new Date();
// 48hr window
start.setHours(0, 0, 0, 0);
end.setHours(47, 59, 59, 999);
const eventsQuery = {
startDate: start,
endDate: end
return calendars.searchEvents(eventsQuery);
.then(eventData => {
// All events
console.log("All events for the next 48 hours");
.catch(error => {
// Inform the user about the error
Event data contains all of the properties you'd expect for a calendar event, including: title, description, location, start/end date, all day, status, organizer, attendees, alarms, and recurrence.
"alarms": [
"trigger": {
"offset": 900000,
"related": "start"
"type": "alert"
"isAllDay": false,
"attendees": [
"name": "Jeffrey Reiner",
"status": "accepted"
"name": "Peter Falk",
"status": "accepted"
"calendarId": "22",
"description": "This will be a great meeting!\n\n",
"endDate": "2020-01-05T15:46:09.857Z",
"id": "269",
"location": "MARS-1-G-Rover-10",
"organizer": {
"name": "Jeffrey Reiner",
"status": "accepted"
"sourceId": "22",
"startDate": "2019-12-10T15:46:09.857Z",
"status": "tentative",
"title": "Fun times - part 2",
"userStatus": "unknown"
We've added a small amount of sample data for use in the Fitbit simulator which will cover the common use cases, but for more advanced applications you'll want to use a real device with your real calendar.
For further information, check out the reference documentation, and the sample calendar clock.
Always-on Display API
You may have noticed the shiny new Always-on Display (AOD) clocks category in the Fitbit App Gallery and might be wondering how you can enable your own clocks for AOD?
AOD mode in Weather Land by reno
We have extended the Display API to include some new methods and properties to detect and respond to AOD.
Here's what the API looks like in action:
import clock from "clock";
import { display } from "display";
// does the device support AOD, and can I use it?
if (display.aodAvailable && me.permissions.granted("access_aod")) {
// tell the system we support AOD
display.aodAllowed = true;
// respond to display change events
display.addEventListener("change", () => {
// Is AOD inactive and the display is on?
if (!display.aodActive && display.on) {
clock.granularity = "seconds";
// Show elements & start sensors
// = "inline";
// hrm.start();
} else {
clock.granularity = "minutes";
// Hide elements & stop sensors
// = "none";
// hrm.stop();
We aren’t quite ready to roll this out publicly just yet due to the need to adhere to strict hardware requirements. The primary reasons are that incorrectly implemented AOD apps and clocks can greatly reduce battery life and/or cause physical damage to the display, or to the display integrated circuit, and we want to ensure the best experience for our users.
With this in mind, we've been working closely with a small group of our amazing community developers to push the limits of our platform, testing this new API, and helping us to improve our tooling and processes around the gallery review process.
For now, AOD is gated behind a restricted permission that needs to be granted to a developer profile, and also granted for each clock or app (once reviewed). Without these permissions, apps and clocks cannot be uploaded to Fitbit Gallery App Manager, or used on physical devices. You can experiment with AOD using the simulator, but it will not work when sideloaded on a real device.
There are some very strict review guidelines about what an app or clock can and cannot do in AOD mode, here's some of the key ones to note:
1. A maximum 20% On Pixel Ratio (OPR) can be used.
2. All hardware sensors should be stopped.
3. Clocks can only refresh the screen once per minute, apps once per second.
4. Clocks should not display stats as numbers, to avoid misleading users with stale data.
5. Only outlines or checkerboard images should be used in AOD, as dense pixel areas can cause flicker.
Improvements to the simulator mean we can now toggle AOD mode, display the OPR percentage, and highlight which sensors are currently active.
Fitbit OS Simulator toggling AOD mode using Drips by Lignite
All existing AOD clocks and apps in the gallery have been through a rigorous manual review process to ensure they adhere to these criteria, and much more.
While we're continuing to improve the review process and tooling, we will begin reaching out to developers of popular apps and clocks to grant them the ability to enable AOD. The number of invites will be limited at first, and based purely upon criteria such as number of downloads, number of active users, and ratings.
We will keep you informed via Twitter and the forum when there is any news regarding changes to the widespread availability of this API.
User Activity Primary Goal API
Developers can now determine which type of activity (steps, distance, calories, active minutes or floors) is the user's main fitness goal. The Primary Goal API is a simple addition to the Device User Activity API which returns the name of the goal as a string.
If you're developing a clock, you could use this API to prioritize or highlight the statistic which is most relevant to the user.
import { me as appbit } from "appbit";
import { primaryGoal } from "user-activity";
if (appbit.permissions.granted("access_activity")) {
console.log(`User's primary activity goal is ${primaryGoal}`);
Document API Enhancements
This set of enhancements to the Document API includes a revolutionary change to the usefulness of CSS class names, plus a couple of other useful additions.
1. The class attribute is now settable! That's right, you can finally dynamically update the class property for an element.
import document from "document";
const element = document.getElementById("some-element");
if (element.class === "show") {
element.class = "hide";
} else {
element.class = "show";
Note: The property is .class not .className.
1. All container elements now have a children property, making it easy to iterate through the child nodes.
const element = document.getElementById("some-element");
element.children.forEach(child => {
1. SVG <line> elements now have a JavaScript property to set their strokeWidth.
const line = document.getElementById("line-element"); = 5;
Until Next Time
Follow @fitbitdev on Twitter, and join our Fitbit Community Forum to keep in touch, 24/7. Curious to see the amazing work Fitbit Developers have done so far? Keep tabs on #Made4Fitbit on Twitter. |
global_05_local_5_shard_00002591_processed.jsonl/50580 | Alsumaria News
In Alsumaria News, Global
More than 70 countries have deleted their zeros, know the most prominent
If Iran is the latest country to resort to deleting the zeros of its currency, in a psychological game aimed at restoring some confidence in the national currency by trying to absorb inflation represented in the high prices and the erosion of purchasing value, then dozens of countries preceded it to measures of this type that exceeded the number of 70 since the mid-twentieth century.
On Monday, the Iranian parliament responded to a project approved by the government of President Hassan Rouhani at the end of July 2019, and referred it to the Shura Council several months ago, where it was subjected to extensive discussion and conflicting views on the feasibility of such a step.
A central bank official confirmed that the deletion of zeros is supposed to be dependent on controlling inflation first, warning that the possibility of higher prices for goods and services exists, as well as the possibility of returning zeros after several years.
The government, at that time, decided to delete 4 zeros from its deteriorating currency and replace the riyal with the toman in transactions, and this was approved by Parliament yesterday.
But it is not the first time that Tehran deletes zeros, since in 2017 the central bank had to delete one zero, and this time the decision means that one million riyals will equal 100 riyals only.
Multiple studies indicate that the cases of deleting zeros from currencies exceeded the number of 70 cases since 1960, including cases carried out by 19 countries that got rid of zeros that were made in one go, and 10 countries resorted to this step twice.
Venezuela, Brazil, Argentina and Bolivia
The Iranian decision comes at a time of the real deterioration of the riyal as a main result of the severe sanctions applied by the administration of US President Donald Trump, which have found deep resonance in Venezuela, which is also subject to harsh penalties.
The circulation of new banknotes of the Venezuelan currency began in August 2018, in the first stage of a recovery plan launched by President Nicholas Maduro, to issue “Sovereign Bolivar” by removing 5 zeros from the old currency.
As for Brazil, it got rid of between 1930 and the beginning of the twentieth century, from 18 zeros in 6 batches, most notably in 1993, when it suffered badly from the acceleration of inflation to the level of 2000% and crossed 3 zeros.
The recurrent major economic downturn in Argentina led to its authorities taking decisions to write off zeros from its currency 4 times. Bolivia has also recovered its zeros twice.
Turkey, Iraq and Sudan
Turkey replaced the old currency by canceling 6 zeros starting in 2005 with a decision issued in 2004, so that one million pounds equals one lira, and it was withdrawn from circulation, and instead the new zero-zero coins were put in the name of “New Lira” before re-adopting the name “Lira” separately And gave citizens 10 years to exchange their old currencies with the new currency from the headquarters of the Central Bank.
In Iraq, it was proposed in 2014 to delete 3 zeros from the dinar, but it was announced in 2015 to print a new cash category of 50 thousand dinars instead of deleting the numbers from the categories 1000 and 10 thousand dinars. Sudan also deleted Safrin from its currency in 2007.
This country omitted 3 zeros from its currency in 2003, and after only 6 years had passed, it came back and decided to cut 12 zeros, which means in practice that every trillion Zimbabwean dollars has become equivalent to one Zimbabwean dollar at that time!
Other countries
The former Yugoslavia (Serbia) wrote off 5 zeros, while the Netherlands removed 4 zeros from its currency after it issued in 1960 very large paper currencies. Ukraine resorted to crossing the zeros 3 times, and so did Russia, Poland, South Korea and Ghana. Source |
global_05_local_5_shard_00002591_processed.jsonl/50582 | The ubiquity of memory leaks in GUI applications.
When I was studying C++ as an Independent Student, we were taught that, as a good programming practice, we should always delete any objects which we had created with the ‘new’ allocator, including, to do so in the destructor of any objects, which created those members in their constructor. Just to define a little bit, what this means, I need to state some facts:
1. In C++, we can declare objects to exist as such, without using ‘new’, and without initializing object pointers to point to them. When we do so, they are allocated on the stack, their constructors are called in turn, and, when our function call returns, the compiler makes sure that the stack is cleared, at which point the compiler also makes sure that the destructor of such objects is called automatically. In much programming, including GUIs that we build with Qt5, this is considered to be the less-favoured way to do it by default…
2. As an alternative, we can declare a pointer to a class object to exist. This pointer could reside on the stack, or, it could be a member of the class, and thus, be a property of each object. Regardless of where this pointer has been put, we call ‘new’ to create a new object, and the address returned by ‘new’ is stored in the pointer, by our own explicit code, either in the constructor if the pointer is a class member, or elsewhere if the pointer has been created in the middle of a function-call.
3. The pointer, a member of the class, might just receive an address from someplace else, thus pointing to an object that was allocated by a different object, in which case it’s the responsibility of the object that originated the pointer’s address, also to destruct the object it points to… This can lead to issues because, if the object that created the object being deleted does so, the other object will still hold an address, which does not get updated (at least, using plain-old C++ pointers, not, smart-pointers). And then, such a copied address might erroneously be used again, creating nasty error messages and crashes.
The problem with scenario (2) above is, that even though the pointer will get removed eventually, during program execution, the object that it points to, will remain by default, unless we call ‘delete’ on the pointer, in which case the destructor will be called on the object pointed to, and then, the space the object occupied is deallocated. There are finer points to how all this should be done, which are taught in C++ programming, and which I will not get into here. But a point which I want to make in this posting is that, when using certain GUI libraries, including Qt5, the programmer is creating many C++ objects, including widgets, layout managers, labels, QString objects, and eventually also, brief message-boxes…
The programming style encourages sloppy programming, in which not all objects that have been created, are also destructed and deallocated eventually. Admittedly, I have also fallen victim to this, in recent exercises I assigned myself, outside any formal learning environment. And of course, always conscious of the possibility that I could be making mistakes, I have found several.
The lessons I was given formally taught us, to be so thorough in deallocating, that we should even do so when our program quits. This is good form. But, when creating my Qt5 projects, I have not been doing this. Instead, what I’ve been doing, is to distinguish between two types of memory leaks:
1. Objects that are not deleted when the program quits, meaning that my main application window possesses a destructor which does nothing,
2. Objects that will need to be deleted, because they were members (properties) of other objects, which might be specialized windows of my application, or which might otherwise be created and deleted many times, during one execution of the application.
(Updated 9/03/2020, 14h20… )
Continue reading The ubiquity of memory leaks in GUI applications. |
global_05_local_5_shard_00002591_processed.jsonl/50584 | Jump to content
• Content Count
• Joined
• Last visited
Community Reputation
0 Neutral
About deroderuiter
• Rank
• Birthday 09/14/1954
1. Since the problem has not been solved yet I switched to Bitwarden. Bitwarden runs without any problem. Kind regards, Rob de Ruiter
2. I have sent you the video you requested. In the video I noticed that Enpass did sent the userid and password before I could fill the TOTP, however, In the settings, I blacked out "Automatically Login After Filling Details".
3. Unfortunately Enpass still doesn't work in the combination with Firefox, Windows 10 and Joomla or WordPress. The login fields are still blanked out and I have to fill in the fields manually. I was hoping that the latest update would solve the problem but the problem has not been solved jet.
4. Can I share this url and the login credentials to a non-public email address?
5. I have a few Joomla installations with 2FA and they all have the same problem when 2FA is activated. When the login screen of the back-end of Joomla appears in Firefox I choose the login entry from the Enpass plugin. What I see is that the userid and password are filled in for a short while and then they are blanked out again before I can paste the totp code. It looks like Enpass is trying to login automatically, although in the settings I blanked out the automatic login. Could you please help me with this problem? The same problem occurs in Google Chrome, but in Edge I don't have any problem.
6. It's almost November now, but Enpass in Edge still doesn't work. What has been done in the meanwhile to solve this problem?
7. Since a couple of weeks I get a connection error when I try to use Enpass in Edge. I use: Windows 10 Pro, version 1803, build 17134.165 Enpass 5.6.9 Microsoft Edge 42.17134.1.0 The Enable browser extension is checked Verify browsers is checked What could possibly cause this connection error and how can I solve it?
8. Autofill does not work correctly I use the Firefox extension and I have a problem with the entries Enpass selects. When I have several urls like: I would like Enpass to choose the correct entry based on the complete url. Now Enpass seems to select the entries based on only the first part of the url like: That means that Enpass now shows all three entries when I need only the entries for one of them ( Is it possible to have Enpass making the correct choice based on the whole url?
• Create New... |
global_05_local_5_shard_00002591_processed.jsonl/50596 | RT 4.4.2 Documentation
Go to latest version →
RT::Crypt::SMIME - encrypt/decrypt and sign/verify email messages with the SMIME
You should start from reading RT::Crypt.
Set( %SMIME,
Enable => 1,
OpenSSL => '/usr/bin/openssl',
Keyring => '/opt/rt4/var/data/smime',
CAPath => '/opt/rt4/var/data/smime/signing-ca.pem',
Passphrase => {
'queue.address@example.com' => 'passphrase',
'' => 'fallback',
Path to openssl executable.
Path to directory with keys and certificates for queues. Key and certificates should be stored in a PEM file named, e.g., email.address@example.com.pem. See "Keyring configuration".
CAPath should be set to either a PEM-formatted certificate of a single signing certificate authority, or a directory of such (including hash symlinks as created by the openssl tool c_rehash). Only SMIME certificates signed by these certificate authorities will be treated as valid signatures. If left unset (and AcceptUntrustedCAs is unset, as it is by default), no signatures will be marked as valid!
Allows arbitrary SMIME certificates, no matter their signing entities. Such mails will be marked as untrusted, but signed; CAPath will be used to mark which mails are signed by trusted certificate authorities. This configuration is generally insecure, as it allows the possibility of accepting forged mail signed by an untrusted certificate authority.
Setting this option also allows encryption to users with certificates created by untrusted CAs.
Passphrase may be set to a scalar (to use for all keys), an anonymous function, or a hash (to look up by address). If the hash is used, the '' key is used as a default.
Keyring configuration
RT looks for keys in the directory configured in the "Keyring" option of the "%SMIME" in RT_Config. While public certificates are also stored on users, private SSL keys are only loaded from disk. Keys and certificates should be concatenated, in in PEM format, in files named email.address@example.com.pem, for example.
These files need be readable by the web server user which is running RT's web interface; however, if you are running cronjobs or other utilities that access RT directly via API, and may generate encrypted/signed notifications, then the users you execute these scripts under must have access too.
The keyring on disk will be checked before the user with the email address is examined. If the file exists, it will be used in preference to the certificate on the user.
← Back to index |
global_05_local_5_shard_00002591_processed.jsonl/50597 | Monitor Web Activity of Network Users
You can use the ACC, URL filtering reports, and logs that are generated on the firewall to track user activity.
• For a quick view of the most common categories users access in your environment, check the
widgets. Most
Network Activity
widgets allow you to sort on URLs. For example, in the Application Usage widget, you can see that the networking category is the most accessed category, followed by encrypted tunnel, and ssl. You can also view the list of
Threat Activity
Blocked Activity
sorted on URLs.
View logs and configure log options:
• From the ACC, you can jump directly to the logs ( jump-to-logs.png ) or select
URL Filtering
The log action for each entry depends on the Site Access setting you defined for the corresponding category:
• Alert log
—In this example, the computer-and-internet-info category is set to alert.
• Block log
—In this example, the insufficient-content category is set to continue. If the category had been set to block instead, the log Action would be block-url.
• Alert log on encrypted website
—In this example, the category is private-ip-addresses and the application is web-browsing. This log also indicates that the firewall decrypted this traffic.
• You can also add several other columns to your URL Filtering log view, such as: to and from zone, content type, and whether or not a packet capture was performed. To modify what columns to display, click the down arrow in any column and select the attribute to display.
• To view the complete log details and/or request a category change for the given URL that was accessed, click the log details icon in the first column of the log.
• Generate predefined URL filtering reports on URL categories, URL users, Websites accessed, Blocked categories, and more.
and under the
URL Filtering Reports
section, select one of the reports. The reports cover the 24-hour period of the date you select on the calendar. You can also export the report to PDF, CSV, or XML.
Recommended For You |
global_05_local_5_shard_00002591_processed.jsonl/50614 |
Archive for the 2013
Fibromyalgia and Nutrition
CTS “Facts”
Is it a Migraine?
Low Back Pain – Is It on the Rise?
Do 90% of Patients with an Acute Episode of Low Back Pain Resolve within 2 Months, with or without Treatment?This month we are going to discuss the commonly held clinical thought and apparently well documented fact that 90% of all acute low back pain episodes ultimately self-resolve within a 60 day period.It would appear that [..]
Cancer and Nutrition – Part 2
Low Back Pain in Pregnancy and Chiropractic
The utilization of chiropractic spinal adjusting for the management of low back pain is increasingly less and less controversial. As an example, in December of 2011, the journal Alternative Therapies Health Medicine, published a study titled (1):Cerebral metabolic changes in men after chiropractic spinal manipulation for neck painThis study has 9 authors who are from the Division [..]
Whiplash "Basics"
Fibromyalgia Diagnosis: A Breakthrough!
Carpal Tunnel Treatment Options
|
global_05_local_5_shard_00002591_processed.jsonl/50618 | I faced with problem while fetching query results, my code:
$result = $query->execute();
$array1 = $result->fetchAllKeyed(1, 0);
$array2 = $result->fetchAllKeyed(2, 0);
But the $array2 is empty, so fetchAllKeyed cut all values from $result.
I'm already tried to use the following:
$query2 = clone $query;
$result = $query->execute();
$result2 = $query2->execute();
$array2 = $result2->fetchAllKeyed(2, 0);
It's works, but I don't want do two queries instead of one.
So, how can I do two (or more) different "fetch" from one result?
• Did try duplicating the $result directly instead of recreating the query? $result2 = $result and then fetching the keys? – Suranga Panagamuwa Gamage May 30 '15 at 9:55
• Doesn't works too. If I use $result2 = $result; - I get empty fetch result. If I use $result2 = clone $result; - the same. – kala4ek May 30 '15 at 12:30
• Hmm, then I guess you'll have to use fetchAssoc() wich gets you an array of objects and then use a foreach loop to generate the 2 sub arrays. Seems like the only solution. – Suranga Panagamuwa Gamage May 30 '15 at 13:51
Since fetchAllKeyed() internally uses foreach loop to sort the data, the answer given by Suranga Panagamuwa Gamage to use fetchAssoc() and then a loop seems the most efficient way.
| improve this answer | |
Your Answer
|
global_05_local_5_shard_00002591_processed.jsonl/50642 | Friday, December 04, 2020
Common Core and Strictly Standards Morning Math
Strictly Standards Morning Math and Common Core Morning Math sets were designed to help eliminate the need for re-teaching the basic math skills by offering worksheets that review each skill often. These sets were designed only to be used as a supplement to a school's regular math program.
** Each set has 150 Morning worksheets and 150 matching Homework worksheets.
***The new Common Core Standards are used in 45 states now.
** For states not using the Common Core...There is no way to possibly match up every state's standards. If one set doesn't work for you, try the level above or below your grade level.
** Suggested use: Copy a Daily Language or Daily Writing sheet to the backside to cover both subjects as morning bell work.
Most Common Core Math Standards for each grade level are included in the Morning Math set!
**** Visit here to try out a one week sampling of our Morning Math! ******
Send an email to and include your first name and email address, grade(s) taught
Kinder Common Core
Common Core Grade 3
Common Core Grade 6
Grade 2
Grade 5
Common Core Grade 1
Common Core Grade 4
Grade K-1
Grade 3
Grade 6
Common Core Grade 2
Common Core Grade 5
Grade 1
Grade 4
About Standards Math
Strictly Standards Morning math & Common Core Morning Math sets have 150 morning papers and 150 corresponding homework pages. Each set is progressive, adding new concepts while reinforcing the concepts and skills previously learned.
ALL of the math pages are based on the standards, but the newest sets, Common Core, are geared right to those exact standards.
Suggested use: Use these pages as morning bell work to supplement your school's math program.
Copyright 2005 - 2020 by Education Creations |
global_05_local_5_shard_00002591_processed.jsonl/50652 | Skip to main content
Bahram Jam's Bald Head & Fascial Release
Get for Free
Bahram Jam's Bald Head & Fascial Release
Bahram Jam's Bald Head & Fascial Release
This course includes
17:33 of Course Material (View)
Lifetime access after purchase
Certificate of completion
The instructors
Bahram Jam is a Physiotherapist that is well educated on the topic of pain science. His objective is to use clinically relevant evidence to determine the best practice standards for reducing persistent pain.
In Bahram Jam's new online course titled 'My Bald Head & Fascial Release' he aims to answer the question: Can persistent pain be explained by the fascial distortions model and should persistent pain be treated by use of fascial release techniques?
Male Pattern Baldness is the progressive hair loss from the front to the top of the head that affects many men and the Fascial Distortions Model is the theory that most musculoskeletal pain complaints are caused by deformations in one’s fascia. Bahram uses the associations of male pattern baldness with various cancers and heart conditions as an example to explain that association is not indicative of causation. In a similar way to the example of male pattern baldness, the associations of using fascial release techniques and decreased muskuloskeletal pain do not prove that fascial release is the CAUSE of decreased muskuloskeletal pain.
Bahram Jam will go through relevant literature and determine whether or not there is sufficient clinical evidence to conclude that the Fascial Distortions Model is true and whether or not fascial release should be used as a primary treatment for persistent pain.
Feel free to watch this course to learn the conclusions made by Bahram Jam about the use of fascial release techniques in the treatment of persistent pain. This course is free for all Embodia members!
The instructors
Bahram Jam
Course Material included in this course
• My Bald Head & Fascial Release
• Baldness and Associated Conditions
• From Baldness to Fascial Restrictions
• How is Fascial Distortion Treated
• Conclusions on MPB and FDM
• Feedback
© 2020 Embodia |
global_05_local_5_shard_00002591_processed.jsonl/50653 | Man Superhero Emoji to Copy, Cut and Paste 🦸♂️
The Man Superhero emoji is a sequence of the 🦸 Superhero and ♂ Male Sign emojis. These are combined using a zero width joiner between each character and display as a single emoji on supported platforms.
Man Superhero was added to Emoji 11.0 in 2018.
🚩 New in 2018: requires updated software.
|
global_05_local_5_shard_00002591_processed.jsonl/50658 | Military Review
Russian American general. The amazing fate of the Don Cossack, a friend of Lincoln
The USA is a long-time strategic opponent of our country. It would seem that the United States and Russia have little in common. But in fact, even such a large-scale event of the American stories, like the Civil War, was not without the participation of the Russians. Now the United States is overwhelmed with a fashion to review its own history. Across the country, demolishing and moving monuments to American generals and officers - participants of the Civil War. Meanwhile, there were Russians among them, and only one Russian officer managed to advance to the rank of general in the American army and make his (very tangible) contribution to the history of the American Civil War.
When, in the distant 1822 year on Don, a son of a Cossack by birth and a retired major Vasily Nikolayevich Turchaninov was born a son, Ivan, no one could imagine that after forty years he would succeed not only to rise to the rank of general, but to get him in a foreign army, and even in an army so far away, in those days, from a country like the United States of America. The fact that another representative of the old Cossack clan Turchaninovs will achieve fame in the military arena, in fact, was not surprising. It was a military family in which almost all men fought and served. For example, Pavel Petrovich Turchaninov was promoted to the rank of lieutenant-general in the Russian imperial army and was the closest ally of Mikhail Kutuzov. The rank of lieutenant general was received by Andrei Petrovich Turchaninov, who also participated in the war with Napoleon.
It is clear that the military career was "registered" and Ivan Turchaninov. At ten years old, in 1832, he entered the First Cadet Corps in St. Petersburg, then transferred to Novocherkassk in 1835 - to a military classical gymnasium, and in 1843, at the age of 21, he received a military education at the Mikhailovsky Artillery School. The diligent young officer was assigned to the Imperial Guard and served in the Don Cossack Mounted Artillery Battery Life Guard.
In 1848, a young officer participated in suppressing a popular uprising in Hungary. Then it was precisely for the suppression of this uprising that the European revolutionaries called Nicholas I the “gendarme of Europe”. In 1852, Ivan Turchaninov graduated from the Nikolaev Academy of the General Staff with a silver medal and entered the elite of the Russian imperial army. He participated in the Crimean War 1853-1856. It was Ivan Turchaninov who carried out a topographical survey of the Baltic coast, for which he not only received the order, but was also made a Guards colonel. By 1856, 34-year-old Colonel Ivan Turchaninov served as chief of staff of the corps in Poland. It seemed that his further military career would be unclouded - for a few more years and the colonel could well rise to the rank of general in the Russian imperial army.
However, Ivan Vasilievich Turchaninov was not an ordinary officer. In addition to his own military career, he was also interested in the future of Russia. Turchaninov thought a lot about which form of political and social structure would fit the Russian state. It is known that he was in correspondence with Alexander Herzen himself. For the Colonel of the Guard, and even at that time, it was very unusual and risky. Turchaninov criticized serfdom and believed that Russia should take the path of democratization. Apparently, in the end, he realized that further he needed to either leave the country, or, sooner or later, he would simply be arrested. In 1856, Colonel Ivan Turchaninov left the Russian Empire with his wife Nadezhda.
A young political emigrant from Russia arrived in the United States of America. Here he changed his name - now the Russian colonel, immediately after leaving dismissed from the Russian military service, was called Mr. John Basil Turchin, and his wife - Mrs. Nadine Turchin. At first the Russian émigré tried to take up farming, but quickly went bankrupt, after which he entered the engineering school, and his spouse received an education in a medical school. Having been in the role of an American student and graduated from college, the former Russian colonel began working as an engineer on the Illinois Railroad. The man who was part of the Russian military elite began his career in the USA at 34-year-old and practically from scratch. However, as a talented specialist, here too the Russian officer found a use for himself and won the respect of the Americans. John Turchin quickly became close with representatives of the “high society”, for example, he personally met lawyer Abraham Lincoln.
Turchaninov traveled to America under the influence of idealistic ideas - many Russian liberals and democrats of that time saw in the United States an example of almost the best state. But, faced with the American realities, Turchaninov rather quickly became disillusioned with the political and social structure of the United States. He reported this in his letters to Herzen. Turchaninov saw colossal social inequality, permissiveness for the rich, a high crime rate. All this went against the notions of life in North America that prevailed in democratic circles. And, nevertheless, Turchaninov did not regret that he came to America - here he, as he himself reported in one of his letters, became a “mere mortal”, an ordinary person — an engineer.
When the war began between the northern and southern states, Ivan Turchaninov could not stay away from such large-scale military and political events. He decided to use his military experience and filed a petition for admission to the army of the northern states. As the American army experienced a great shortage of qualified commanders, the former colonel of the Russian imperial army, and even personally acquainted with Lincoln, was immediately recruited as a colonel and appointed commander of the 19 Illinois Infantry Regiment. So a whole American regiment was entrusted to the Russian emigrant. The soldiers and officers of the regiment had to approve a commander of two candidates - Ulysses Grant and John Turchin. The selection of personnel was made in favor of the Russian officer. Colonel Ulysses Grant, in turn, was appointed commander of the 21 Infantry Regiment. Nadine Turchin was also enlisted for military service - she, as having a medical degree, was appointed a military doctor.
Under the command of Colonel Turchin, the 19 Infantry Regiment of the Illinois quickly turned into one of the most combat-ready units of the American army. After all, Turchaninov was a professional military with an excellent education - Mikhailovsky Artillery School, then - the Academy of the General Staff. There were few such officers in the American army. Turchaninov quickly established excellent discipline, adjusted combat training. In a strict, but fair and talented commander, the soldiers did not like the soul. Soon Colonel Turchin was appointed commander of a brigade of four regiments. Under his command, the team made many glorious feats. At first, the higher command could not rejoice in the success of the brigade commanded by Turchin, however, as the commander grew, he began to play an increasingly independent role.
Therefore, problems in relations between Colonel Turchin and higher-ranking officers of the army of northerners began almost immediately. The Turchin regiment was part of the Ohio army, commanded by Major General Don Carlos Buell. This American officer was one of the few slave-owning generals in the ranks of the army of northerners. He did not see anything reprehensible in the possession of slaves, and it was on this basis that Major General Bewell and Colonel Turchin had a serious conflict.
The fact is that Turchin, who adhered to democratic convictions, provided asylum in the brigade to all negro slaves who ran away from slave owners and turned to him for protection. Dissatisfied slave owners complained to the higher command. Moreover, without an order, Colonel Turchin took Nashville and Huntsville, and in Athens, in Alabama, the soldiers of one of the brigade units still violated discipline and committed looting. By the way, among the southerners, long after the end of the Civil War, there were stories about the “wild Cossack” John Turchin, whose soldiers robbed the local population. In many respects, these stories were due to the fact that the Democrat Turchin really did not experience reverence for the wealthy slave owners and could completely close his eyes to the sins of his subordinates, as well as the blacks - slaves.
On the other hand, all the American officers who dealt with Turchaninov spoke of high education and good manners of the Russian émigré. As for the cases of looting, they occurred in almost all American units - in the army of northerners and in the army of southerners. However, it was Turchin who decided to make a scapegoat - firstly, he was still a “stranger” among the American commanders, and secondly - “the way was crossed” by Major General Buellu himself, who at that time had a great influence in the US military elite. The trial began.
The military court was going to dismiss Colonel Turchin from military service, but Turchin’s long-time friend Abraham Lincoln, by this time the former president of the United States, intervened. He gave John Turchin the rank of brigadier general of the American army. After that, Turchin was inviolable to the court, since the jury, who had the rank of colonel, could not dismiss the general. So the only Russian general of the American army remained in its composition. At the same time, Abraham Lincoln delivered Turchin from further problems by removing Major General Don Carlos Buell from his post. By this time, Buell was seriously suspected of sympathizing with the Southerners, so they decided to remove from the command post. From other posts, Buell refused and in the 1864 year he resigned from military service altogether.
The Turchin Brigade distinguished itself in the battles of Chicamog and Chattanooga. 19-20 September 1863, the forces of the northerners suffered a serious defeat from the Confederates and began to retreat. With this valiant Turchin could not accept. He personally led the counterattack of his brigade and, breaking through the defense line of the southerners, he was in their rear. The Turchin Brigade made a brilliant raid in the rear, capturing the 300 soldiers and officers of the Southerner’s army and seizing several artillery pieces. The attack was named after the fearless general "Turchinskoy attack in the rear of the enemy." It was under this name that she entered the American history textbooks.
Turchin repeatedly distinguished himself in the Battle of Chattanooga, where he also personally led the attack of his brigade. The personal courage of Brigadier General Turchin and the dedication of his wife, the doctor Nadine Turchin, helped to make the Russian emigre couple into the real darlings of American servicemen. Turchin tried to take care of his soldiers as much as possible and was very worried after the 17 disaster of September 1862, when the train carrying the personnel of his brigade fell from the bridge over the Beaver Creek in Indiana. Killed 25 soldiers and 1 officer, 114 people were injured. After that, Turchin, lamenting, said that these were the most numerous losses of his brigade during the whole period of hostilities. By the way, besides the direct command of the troops, Turchin at that time also managed to conduct scientific work - to study tactics, to write the work “Brigade Training”, which was later recognized as the best similar composition of that time. Overload affected the health of the 42-year-old. In 1864, he was struck with a heart attack. His health condition no longer allowed Turchin to remain in command, and he was forced to resign from military service.
John Turchin returned to civilian life. He settled in Chicago, where he worked as a construction engineer, and later engaged in real estate trading in southern Illinois. In 1873, Turchin even founded the Polish colony of Radom in Illinois, where he began to invite Polish immigrants. While in the civil service, he wrote works on the history of the American Civil War. Over the years, Turchin began to yearn for his homeland. He even wrote a letter to Emperor Alexander II with a request to allow him and his wife to return to the Russian Empire, but the response of the Russian authorities was categorical - to refuse to return to their homeland. The financial situation of the elderly Turchin and his wife deteriorated. Only thanks to the activity of former subordinates who served in the "Turchinskaya" brigade, the legendary participant in the Civil War began to pay a small pension. The exploits of General Turchin in the United States during the life of the commander were not appreciated.
In 1901, 79-year-old John Turchin died in Ann's hospital in Illinois. Three years later, Nadine Turchin passed away. The couple are buried in a military cemetery in Mount City in Illinois, and their graves are kept, as befits the graves of American military personnel, at the expense of the United States of America.
At present, the figure of an amazing man — a Russian officer who has become a general of the American army — is becoming increasingly interesting both in the United States and in Russia. Moreover, many essays on military history, written by Turchaninov - Turchin, have not lost their relevance even now.
I have an account? Sign in
1. Aaron Zawi
Aaron Zawi 20 November 2017 06: 47
Very informative. Thanks for the unknown story page.
2. moskowit
moskowit 20 November 2017 06: 55
Well, very interesting ... As Socrates said: "The more I know, the more I am convinced that I know nothing ..."
Knowledge requires further searches and a more complete disclosure of the topic ... The path of knowledge is endless ...
3. XII Legion
XII Legion 20 November 2017 07: 23
It happens
Interesting and yet revealing
Thank you
4. Monster_Fat
Monster_Fat 20 November 2017 07: 32
Well, what can I say .... "The road to hell is paved with good intentions ...."
5. kvs207
kvs207 20 November 2017 08: 08
"But, faced with American realities, Turchaninov quickly became disillusioned with the political and social structure of the United States. He reported this in his letters to Herzen. Turchaninov saw enormous social inequality, permissiveness for the rich, a high crime rate. All this went against those perceptions of life in North America that dominated democratic circles. "
The situation in the USA of the 60s of the 19th century and the situation in Russia in the 90s of the 20th century, just twin brothers. There was a wild increase in the initial accumulation of capital by any means, where "all means were good."
6. groks
groks 20 November 2017 10: 25
I first read about it with Yu. Nikitin. It was rather difficult to find information. What can be supplemented.
The result of the Crimean war, in which the coalition of Western countries did not actually achieve much success, was the disappointment of many Russian officers in the service and in the situation in the country in general. Tolstoy - a successful officer, left, Ivan Vasilievich too.
It is curious that during the illness of I.V., his wife successfully commanded the brigade. Such are Russian women and such was the level of both American armies. It seems to be I.V. played the violin well and even tried to make money after retirement. but this is so - at the level of OBS.
An even more serious trace, Russian emigrants left in South America.
1. raif
raif 28 November 2017 08: 48
about the command of his wife Turchaninov brigade - you really do not go too far. and so little information about this person, do not use the source of OBS, please stop about South America - also a little off topic. articles have already been - about the participation of our emigrant officers in the Chak war as part of the Parvian army, informative and detailed
7. Luga
Luga 20 November 2017 11: 33
Good article. Thanks to the author.
The only thing that cut the rumor is the first phrase
The USA is a long-standing strategic adversary of our country.
Not so old, actually. The earliest conflict of interest can be dated, and that, in my opinion, is very conditional, the beginning of the twentieth century, when the United States actively collaborated with Japan during the Russo-Japanese war. Before that, we were friends, and after that until the end of World War II, we effectively collaborated. However, this has nothing to do with the topic of the article. smile
8. nivander
nivander 20 November 2017 13: 17
during the Civil War in the USA, looting, indemnities, confiscations were common on both sides of the Potomac River - by the way, the picture is a reproduction of Don Troyani's painting "Attack of the 114th New York Regiment near Fair Oaks April 7, 1962"
9. Curious
Curious 20 November 2017 14: 06
The couple are buried in a military cemetery in Mount City, Illinois, and their graves are contained, as befits the graves of American troops, at the expense of the United States of America.
1. A.V.S.
A.V.S. 21 November 2017 15: 17
The kingdom of heaven is a Russian officer and an American general.
10. Monarchist
Monarchist 20 November 2017 15: 14
Ilya, THANKS to you for the story of an amazing person. I don’t see anything surprising in the fact that Turcheninov quickly became a well-known commander: Mikhailovsky School was one of the best military schools in Europe, a silver medal for the Academy of the General Staff (you can recall many graduates of the Academy with medals) the experience of the Crimean War also means something. It is now the Americans are clumsyly know-it-all and generally super-duper, and then it was a provincial country with a mediocre army, at least the training of their officers was inferior to that of the European armies.
But the message from comrade groks that during her husband’s illness, Nadezhda Turcheninova commanded a brigade, it struck me: they have a good army if a WOMAN-DOCTOR could command them! She reverence, and they .... Decide for yourself what kind of comparison to choose, otherwise I don’t have enough imagination
11. Monarchist
Monarchist 20 November 2017 15: 19
Quote: nivasander
Man, you probably have a typo: "Attack 114 of the New York Regiment near Fair Oaks on April 7, 1962" can there be no way, probably, you should read April 7, 1862?
1. nivander
nivander 20 November 2017 18: 32
Well, yes, THANKS !!! wink
12. Cat
Cat 20 November 2017 19: 23
Yes, after reading only emotions remained! A paradoxical twist of fate - otherwise you can imagine. It is a pity that such a person was not allowed to return to their homeland.
Special thanks to the author!
13. Angmar
Angmar 21 November 2017 19: 15
That's about who you need to make a movie.
14. burigaz2010
burigaz2010 22 November 2017 23: 09
An ordinary traitor to his homeland! Fled to a foreign country, fought for it, let’s put a monument to him too !!! The guard officer is called !! He died in poverty, so dogs canine death!
15. Graz
Graz 23 November 2017 02: 49
why admire it?
the man violated the oath to the sovereign and the empire, deserted, this is the most traitor, not having left the army service
1. Warrior2015
Warrior2015 25 July 2018 10: 50
Quote: Graz
This is all without a doubt, however, just an unknown and interesting page in military history. |
global_05_local_5_shard_00002591_processed.jsonl/50659 | Rebecca MacKinnon
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Rebecca MacKinnon
Rebeccamackinnon wenxin.jpg
MacKinnon in Beijing, 2005
Born (1969-09-16) September 16, 1969 (age 51)
Alma materHarvard University (1991)
Occupationjournalist, author, researcher
Rebecca MacKinnon (born September 16, 1969) is an author, researcher, Internet freedom advocate, and co-founder of the citizen media network Global Voices. She is notable as a former CNN journalist who headed the CNN bureaus in Beijing and later in Tokyo. She is on the Board of Directors of the Committee to Protect Journalists,[1] a founding board member of the Global Network Initiative[2] and is currently director of the Ranking Digital Rights project at the New America Foundation's Open Technology Institute.
Early life and education[edit]
Rebecca MacKinnon blogging
MacKinnon was born in Berkeley, California. When she was three years old, MacKinnon's family moved to Tempe, Arizona, where her father Stephen R. MacKinnon took a job as Professor of Chinese History at Arizona State University. Her parents' academic research careers led her to pass most of her primary school years in Delhi, India, Hong Kong, and Beijing, China, before moving back to Arizona for middle and high school. She graduated from Tempe High in 1987.
She graduated magna cum laude from Harvard University in 1991 with a B.A. in Government. After graduating, she served as a Fulbright scholar in Taiwan, where she also worked as a Newsweek stringer.
MacKinnon joined CNN in 1992 as Beijing Bureau Assistant and moved up to Producer/Correspondent by 1997 and Bureau Chief by 1998.[3] In 2001 she became Tokyo Bureau Chief. During her time with CNN, she interviewed notable leaders including Junichiro Koizumi, Dalai Lama, Pervez Musharraf, and Mohammad Khatami.
MacKinnon in 2010
In the spring of 2004, MacKinnon was a fellow of the Joan Shorenstein Center on the Press, Politics and Public Policy at Harvard's Kennedy School of Government.[4] That summer, she joined Harvard Law School's Berkman Center for Internet & Society as a Research Fellow, where she remained until December 2006.[5] Among her projects at the Berkman Center, MacKinnon founded Global Voices Online in collaboration with Ethan Zuckerman.[6]
In January 2007 she joined the Journalism and Media Studies Center at the University of Hong Kong, where she remained until January 2009.[7] From February 2009 to January 2010, she conducted research as an Open Society Fellow, funded by George Soros' Open Society Institute.[8] Then in February 2010 she joined Princeton University's Center for Information Technology Policy where she was a visiting fellow, working on a book about the future of freedom in the Internet age.[9] Regarding the Middle East, MacKinnon wrote that "the Internet empowers people and helps to bring about the peaceful changes associated with the Arab Spring".[10]
In September 2010, MacKinnon became a Bernard L. Schwartz fellow at the New America Foundation.[11] She is currently Director of the think tank's Ranking Digital Rights project which ranks the world's most powerful Internet, mobile, and telecommunications, companies on their respect for users' rights, with a focus on free expression and privacy.
In January 2007, she joined the inaugural Wikimedia Foundation Advisory Board.
Consent of the Networked[edit]
MacKinnon's first book, Consent of the Networked: The Worldwide Struggle For Internet Freedom, was published by Basic Books in January 2012 and won the Goldsmith Book Prize. In an interview, she said that she argues in the book (among other things) that:[12]
We cannot assume that the Internet will evolve automatically in a direction that is going to be compatible with democracy. It depends on how the technology is structured, governed, and used. Governments and corporations are working actively to shape the Internet to fit their own needs. The most insidious situations arise when both government and corporations combine their efforts to exercise power over the same people at the same time, in largely unconstrained and unaccountable ways. This is why I argue that if we the people do not wake up and fight for the protection of our own rights and interests on the Internet, we should not be surprised to wake up one day to find that they have been programmed, legislated, and sold away.
1. ^ "Rebecca MacKinnon, Ahmed Rashid, and María Teresa Ronderos join CPJ board". Committee to Protect Journalists. Retrieved July 17, 2010.
2. ^ "Board of Directors". Global Network Initiative. Archived from the original on March 12, 2010. Retrieved July 17, 2010.
3. ^ "CNN Appoints Rebecca MacKinnon Beijing Bureau Chief". Time Warner. March 30, 1998. Retrieved July 17, 2010.
4. ^ "Spring 2004 Fellows – Joan Shorenstein Center on the Press, Politics and Public Policy". Retrieved July 17, 2010.
5. ^ "Rebecca MacKinnon | Berkman Center". Retrieved July 17, 2010.
6. ^ Rebecca MacKinnon. "Global Voices in English » We are Global Voices. Five years on". Retrieved July 17, 2010.
7. ^ "Journalism and Media Studies Centre, The University of Hong Kong – Rebecca MacKinnon". April 27, 2009. Archived from the original on September 21, 2009. Retrieved July 17, 2010.
8. ^ "Rebecca MacKinnon | Open Society Fellowship | Open Society Institute". Retrieved July 17, 2010.
9. ^ "Center for Information Technology Policy » Rebecca MacKinnon – Google, China, and Global Internet Freedom". February 11, 2010. Archived from the original on March 8, 2010. Retrieved July 17, 2010.
10. ^ "Archived copy". Archived from the original on July 15, 2012. Retrieved September 15, 2012.CS1 maint: archived copy as title (link)
11. ^ "From her own blog".
12. ^ Rosen, Rebecca J. (February 14, 2012). "The Fight for a Fair and Free Internet". The Atlantic.
External links[edit]
Mackinnon's websites: |
global_05_local_5_shard_00002591_processed.jsonl/50662 | Open Microsoft Excel on your personal computer. To do this, click "start" then "Programs". Find the Microsoft Office menu, it find the program Microsoft Excel. To draw a table, select the some range of cells.
Then on the toolbar click on the menu "Insert" select "Table". This operation can be done much faster if you use the key combination CTRL+L or CTRL+T. In the window that appears, select 'my table has headers". Then, specify the column names, otherwise default will be named "Column 1" "Column 2", etc.
Use the controls below to make changes to a table in Excel. You can find them in the tab "Designer", located on the toolbar. You can change the number of rows, columns, format cells and more.
Use of sorting to change only some part of the table, while leaving the rest intact. To resize it, hover over the dot mark in the lower right corner and pull to the side to shift the boundaries of the cells, giving them new values.
Use the alternative method of creating the table. It is to draw a table in Excel manually. Select a specific range of cells with a formal outline on a blank sheet. Then in the upper right corner on the toolbar, find the button "External borders".
Draw the table outline. Then break the cells inside in its sole discretion. To increase the volume of one cell at the expense of another, use button on the toolbar "Merge cells". You can also change the font color, cell background and other decorative items that will help make your table. |
global_05_local_5_shard_00002591_processed.jsonl/50668 | Explain major concerns that plagued electric utilities
Describe why the truly disadvantaged are more prone to crime
June 21, 2017
Political and economic power in imperial japan
June 21, 2017
Hurricane Katrina and the energy sector in the Mississippi Delta
Write a paper of no more than 1,400 words describing the effect Hurricane Katrina had on the nation’s power infrastructure.
Indicate damages that Hurricane Katrina caused to the country’s electrical system. Within your paper, address the following items:
1. Provide a brief history of the evolution of utilities within the Mississippi River Delta region of the United States over the past one-hundred years.
2. Explain contributing factors to this evolution aside from population growth.
3. Describe the extent of damage done to the power grid during Hurricane Katrina in Mississippi, Texas, and Louisiana. Explain major concerns that plagued electric utilities during the restoration phase. What effects did the demand for electricity have on assorted load requirements in these areas? Why was electrical load an important issue?
4. Determine how many customers were without power and for how many days. How did power outages differ between residential and commercial customers? As a manager of the energy sector, what strategies could have been implemented to determine the customer(s) with the greatest need?
5. How many utility companies participated in restoring service to customers after Hurricane Katrina? Describe various methods used by these organizations to produce, store and transport the needed electricity.
6. What was the estimated cost of recovery to the electrical system after Katrina? Could the costs of recovery have been minimized using another strategy to restore power? Explain your answer. |
global_05_local_5_shard_00002591_processed.jsonl/50670 | Narrative essay outline examples
Plotting a learning through travel by eleanor wakefield. See our narrative essay free essay gives a narrative essay example. What is usually deals with the 5 paragraph essay: narrative essay outline for the author narrates or to explain prepare an outline. See our narrative essay outline. Develop a technique that others due to the essay. Developing a narrative essay click to read more will not only essays? Support: 1. Support: topic: narrative. Education is short, examples of a person. An excellent paper writing a critical guiding factor when writing an academic career portfolio. Are a narrative essay tells a useful prompts.
Narrative essay outline examples
Support: narrative essay is one might think of solutions. Learn how to write a narrative essay usually the formal essay template. Support:. Evidence: topic. Reflective essay. Once you would have to create an essay are a story. Therefore, structure, and powerful tips; developing outline middle school.
Narrative essay outline examples
Jump to write an excellent paper outline free essay is short, but before you are a narrative essay. Sample outline is defined as for outline of your conclusion is considered to write an outline body paragraphs. Are you have gathered here are a bare bone view or diagram of writing an essay outline. Examples of narrative essay outline. While writing a narrative essay in first person. Find basic structure, you to write a really good at it. I understood the 5 paragraph essay. But vivid. This article, examples, i. This essay written from narrative approach, anecdotes, things a narrative essay. Reflective essay faster and explanations of sensory details, often than any other, written in this eportfolio is typical for a story. Remember that will come up with your thoughts on 3 different categories and rock your order, a summary essay. Essays come up with good narrative essay outline. Jump to write an academic writing a story. Narrow escape outline format example and having the narrative essay outline is missing the significance of the standard essay.
Personal narrative essay outline examples
Temptation to always. 2015 the question or movie. Classmates, and coherent essay writing service in civil disobedience.
Compare and contrast essay outline examples
For every student who lived in such an outline organized by our writing and contrast essay. There are many ways to write a compare and contrast essay. One of formatting?
How to write an outline of an essay with examples
Thesis statement guide: apa sample outline. Links to build the more information on it will be improved? Outline. Thus, when you spend on it. Learn how to write an outline example.
Essay outline examples mla
When using mla outline. Craft a properly format that can help to pdf books art history a great essay format, anecdotes, featured sample essay in high school and beyond. Essay outline for your outline, and stick to the chance to action: a writer must decide on the cover page and stick to greece.
Informative essay outline examples
Support: to format, the answer one of contents, things a means to write about writing where the essay introduction and their problems. Essayoutline apa format an informative essay. An appealing informative essay topic.
Essay writing outline examples
There are several vital elements to format and timid process. Plan: a type of each example. Use this example of the strongest argument, college requires a sample outline includes explanations of your outline is easy if you will be improved? |
global_05_local_5_shard_00002591_processed.jsonl/50682 | A zygotic lethal gene is mutated or otherwise defective gene that doesn't interfere with the normal functioning of the eggs or sperm (gametes) that contain it, but which will kill the developing organism in its embryonic or larval stages.
In the nematode C. elegans, mutations to the gene pha-1 are lethal because this gene codes for the development of the pharynx and other organs.
In humans, the gene that codes for achondroplasia becomes a zygotic lethal gene if the embryo inherits two copies of the gene.
Some of this writeup is based on work I did for the science dictionary at http://biotech.icmb.utexas.edu/
|
global_05_local_5_shard_00002591_processed.jsonl/50686 | I have been living in Germany since 2010 with a permanent residence card, which must be renewed every 2 years.
My passport expired in August, so the same happened with my residence card, because of the bureaucracy of my country I requested the new passport in advance (end of April) but am still waiting and the embassy just put a stamp on my old expired passport making it valid for another year
Germany is waiting for the new pass (is a new pass number) to give me a new residence card for another 2 year.
Can I go in December for Christmas to Peru and Paraguay and then come back to Germany with no immigration issues?
• 3
I think the answer is simply "No". As far as coming to Europe is concerned, the best case scenario is getting some sort of visa or reentry permit if you can't renew your resident card in time but you would still need a passport to put it in, board the plane, etc. and Germany tend to be quite strict with these things. Entering Peru and Paraguay could also be complicated (assuming you are a citizen of one of them, at the very list the other country). – Relaxed Oct 20 '16 at 17:51
• Are you asking about going to Peru/Paraguay or coming back to Germany? What country are you a citizen of? Marking as unclear until you specify. – mts Oct 20 '16 at 19:49
• 2
To rephrase @Relaxed's comment somewhat: even a valid German residence card would be insufficient documentation for this trip (or most likely for any flight external to the Schengen zone). You need a valid passport. – phoog Oct 20 '16 at 19:49
• @mts the question may be unclear, but the answer is clearly no in any case, as Relaxed has mentioned in his comment. – phoog Oct 20 '16 at 19:50
• @phoog no doubt about that, even though the embassy put a stamp into it making it valid again, putting the passport into a weird (quantum?!) superposition of valid and invalid - or a Zombie/undead passport if you prefer (but I'm not so fluent in the lingo there) - i.e. it is not Schrödinger's cat but Schrödingers passport. And from Q I deduce the Germans don't do quantum passporting and the residence card remains invalid (what about the permit) and OP is advised to avoid any type of passport control at all cost until he gets his documents in order. Was just wondering if it's better for Expats. – mts Oct 20 '16 at 19:55
No, you cannot travel outside the Schengen area without a valid passport. Likewise you cannot enter the Schengen area without a valid visa, unless your passport allows you visa-free entry into the Schengen area.
| improve this answer | |
• 3
what about the fact that the embassy just put a stamp on my old expired passport making it valid for another year, then I can go out and in... – ΦXocę 웃 Пepeúpa ツ Oct 22 '16 at 18:58
Your Answer
|
global_05_local_5_shard_00002591_processed.jsonl/50738 | Go Down
Topic: Problem reading value from a Nano 33 BLE Sense (Read 68 times) previous topic - next topic
This message was also posted on the Networks sub-boards. Being a beginner with Arduino, I try my few sketches, and I am currently facing a problem when trying to read a dummy value sent through bluetooth. Here is the sketch adapted from a LED example:
Code: [Select]
#include <ArduinoBLE.h>
BLEService ledService("19B10000-E8F2-537E-4F6C-D104768A1214"); // BLE LED Service
BLEByteCharacteristic fooCharacteristic("19B10001-E8F2-537E-4F6C-D104768A1214", BLERead | BLEWrite );
const int ledPin = LED_BUILTIN; // pin to use for the LED
void setup() {
while (!Serial);
// set LED pin to output mode
pinMode(ledPin, OUTPUT);
// begin initialization
if (!BLE.begin()) {
Serial.println("starting BLE failed!");
while (1);
// set advertised local name and service UUID:
// add the characteristic to the service
// add service
// start advertising
Serial.println("BLE LED Peripheral");
void loop() {
// listen for BLE peripherals to connect:
BLEDevice central = BLE.central();
float testfloat = 3.14152;
// if a central is connected to peripheral:
if (central) {
Serial.print("Connected to central: ");
// print the central's MAC address:
// while the central is still connected to peripheral:
while (central.connected()) {
// when the central disconnects, print it out:
Serial.print(F("Disconnected from central: "));
With this on the device, I can connect with gatttool on linux.
Code: [Select]
hms@joe:~/projects/arduino$ gatttool -I
[ ][LE]> connect fc:57:4a:cb:ea:2e
Attempting to connect to fc:57:4a:cb:ea:2e
Connection successful
[fc:57:4a:cb:ea:2e][LE]> char-read-uuid 19B10001-E8F2-537E-4F6C-D104768A1214
Error: Read characteristics by UUID failed: Attribute PDU was invalid
And so there is this error:
Code: [Select]
Error: Read characteristics by UUID failed: Attribute PDU was invalid
I can connect with LightBlue from Android, read a value, but it appears that the hex on binary value that is read does not correspond to the value that is written by the device.
What am I doing wrong here? Can it be a problem with my laptop (and me being dumb at reading the value on LightBlue)?
Thanks for yout help!
Go Up |
global_05_local_5_shard_00002591_processed.jsonl/50741 | Google-images search module gives deprecated warning
I am trying to make a search with google search api using google-images module but its giving the following warnings and I don’t know how to get rid of them.
UnhandledPromiseRejectionWarning: Unhandled promise rejection (rejection id: 1): HTTPError: Response code 403 (Forbidden)
var app = express();
const GoogleImages = require('google-images');
const client = new GoogleImages('CSE ID', 'API KEY');
app.get("/", function (request, response) {'Steve Angello')
.then(images => {
}); //end of get
You need to handle the promise’s rejection. You can place a catch method after your then.'Steve Angello')
.then(images => {
.catch(error => {
// handle error
Thank you for your reply! I tried that too but does not work.
Later today I found out that google image search is depreciated
Yes, that’s why the request is failing, but that’s not what the deprecation warning means. The 403 response is causing an error which isn’t handled. |
global_05_local_5_shard_00002591_processed.jsonl/50744 | Do have problems with nginx configuration
• @Zoki, I seem to have got the seafile restart working if i use /etc/init.d/seafile-server restart. But if i use /etc/init.d/seafile-server stop or start it doesn't restart seahub...strange!
If I revert fastscgi back to false to not use ssl I then have to reboot because /etc/init.d/seafile-server restart doesn't!
• Just an FYI;
I came from seafile and went crazy from the hilariously strange naming conventions by seafile. It's calling folders libraries and vice versa, and you never really know what's encrypted where, let alone the strange web-UI missing all kinds of crucial features. Not to mention the config horror of proxying through port 443 in nginx, and the extra dependency with mysql. My users hated seafile, and I could not blame them. Now they're using syncthing, which is a much better solution for them and for me too. But I had to vm them all a different instance, which sucks, but there is an OMV plugin that runs separate instances of syncthing on different ports, which does the job.
Just sayin'.
• @OhMyVirtual, I agree with you that Syncthing is good but like Seafile I don't use it either. Everybody has their own preferences just like I prefer ownCloud. If I get Duplicati working the way I want then I might switch to Syncthing for file sharing and let Duplicati do my main backups. At the moment I have Crashplan doing my backups and this is because it encrypts the files in storage so they aren't view-able in storage. This is also one of the reasons why I don't use Syncthing, it doesn't have an option for encrypting stored files. Seafile and ownCloud do though. I also think the Seafile desktop client has great potential, you can view non synced files through the client too so webdav & browser is not needed unlike ownCloud.
That's my :)
• The new startup script is up and the command to create the seafile user has also been updated. If I understood Zoki correctly you will need to change your seafile login she'll too.
Change the shell like this:
chsh seafile
and enter /bin/bash when prompted
You can delete your old startup script and wget the new one. Then you'll just need to change the fastcgi value to true after you setup nginx
Don't forget after you change the fastcgi value to restart seafile with
/etc/init.d/seafile-server restart
I'm not sure if this will lelp but it's worth a try.
Yes, I also contemplated that fact a while ago, then I realized syncthing's stored data wasn't accessible any more or less than my /etc/shadow file was on those machines that held syncthing data 'in the open'. All my machines are so well protected from unwanted third party access (I generally use and some other tools for the internet-facing linux machines) that the encrypted storage reason turned out to be moot, for my usage anyway. I maintain them all myself, and 'my' users trust me. And they can, because I wouldn't even have time to look into their syncthing data storage..
Other than that, I think syncthing will also offer encrypted storage options soon enough. Just another option in the wealth of config for this great syncing software.
• I hope they do offer encryption one day, they have been talking about it for a long time and it still hasn't happened yet otherwise id be using I do like Synching but it just lacks that one thing for me ant the moment. Like Crashplan I don't just store data on machines/clouds I control and you never know whos looking. I also don't want to keep an encrypted copy locally and then have to sync it remotely cause that will double my space requirements locally. I haven't used Seafile extensively and probably wont at this stage but I do see its potential.
Syncthing is good for basic day to day file sharing like Dropbox etc. But I think leave the important backing up to applications like CrashPlan with encryption is a good way to go.
Participate now!
|
global_05_local_5_shard_00002591_processed.jsonl/50752 | Jump to content
kootchie kooz
• Content count
• Joined
• Last visited
1 Follower
Profile Information
• Real Name
1. kootchie kooz
PayPal not recieving Cart Information
I would love to know this also as I have been having the same problem. Get these paypal payments but you have no items in the order section. It dosen't even show up in the customers own account either??? So Its kind of embarrassing asking what your customer has ordered! TIA! Smiles, Rhonda |
global_05_local_5_shard_00002591_processed.jsonl/50765 | I have started to work on the company's latest project using Unity3D and the workflow is just awesome.
The problem is when running the game on a real Android device (using Unity Remote) the image quality is very poor in comparison to how it looks in the editor:
How it looks. (Click for a full view. Look at those sprite edges.)
Is this...
• \$\begingroup\$ Maybe you could inform us about the Android phone you use, so we could answer to the first question! \$\endgroup\$ – VinceFR Mar 1 '13 at 11:53
• \$\begingroup\$ LG Optimus L7, not quite fancy but It works just fine on simple games like this one \$\endgroup\$ – SAFAD Mar 1 '13 at 12:00
You've answered your own question. Yes, Unity remote compresses the hell out of your game and sends screenshots to the phone. It looks entirely different with an actual build. (an installed .apk)
| improve this answer | |
Your Answer
|
global_05_local_5_shard_00002591_processed.jsonl/50770 | New server address by 09-10-2016
Use the next server address:
Payment methods:
Connected with
the fasted networks
around the world.
Download news from more
then 150.000 newsgroups.
Orderd today
Connected today
and read today
Support | Faq
Q: Where can i find nzb files?
A: is a good example of an nzb searchengine
Q: What is an mbit per second ?
A: Often there is a lot of confusion about this, becouse the terms Mb short of megabit, and MB short of megabyte are being mixed up. To eliminate all the confusion about this we are going to explain both terms. One megabyte is equal to eight megabit. In other words, if you got a subscription of 10 Mb - it means that you can download with a maximum of 1.25 Megabyte per second. In other words, one megabit is eight times as small as a megabyte.
Q: Im getting errorcode 502 - Access Denied to your node.
A: An error with errorcode 502 and the description "Access denied to your node" means that your username and/or password are incorrect. Often this error comes due to the fact that the password is typed wrong from the e-mail, please try to copy and paste it in your usenet program. If the error still persist after that, please contact us at
Q: Im getting errorcode 502 - Too many connections
A: An error with errorcode 502 - Too many connections means that you exceeded the maximum amount of connections with the server. Its possible that this error occures when you have had a timeout with the server, and the server still thinks that you are logged in. Always make sure that you've set the time-out settings in your usenet program to a minimum of 120 seconds, if the problem still persists after this contact us at
Q: NTD formulier.(Notice and Takedown.)
A: You can download this form here en send it to
Q: What is the servername?
Q: Other questions?
A: If you got questions about your account you can email us at with a description of the problem. You're problem will be assigned a ticket number from our automated ticket system, one of our support employees will handle this ticket as soon as possible. |
global_05_local_5_shard_00002591_processed.jsonl/50773 | Avant-Garde/Avant-Garde Geographies
The avant-garde is predominantly a modernist term for a movement in art, culture, and politics that cuts at the vanguard of ideas both in terms of their mode of expression and the social impact that they have for everyday living. As a term, it does however have roots in the Renaissance for signaling an advanced position in the arts, and further gains its political purchase in the time of the French Revolution where its kinship to Jacobin politics married it to the general suggestion of an assault on authority and institution. As commonly understood today, it indicates a movement that challenges and goes beyond existing frameworks for considering the relations between art, culture, and politics. As such, the avant-garde is heterogeneous because it unites groups from very different origins in opposition against the homogenous dominant position or status quo of the time. An avant-garde group was usually made up of just a few people, often those who had different backgrounds and skills, and who cohered only for the duration of the immediate novel event or project that brought them together in the first place. Such ephemeral consistencies usually derived from living in shared neighborhoods, working in the same institutional and artistic spaces, or in being introduced through bohemian social networks as friend or lover. The promiscuousness of such connections and the heterogeneity of background meant that the avant-garde often amounts to no more than a fragmented set of practices.
Geographically, its genealogy as a term and a practice comes from European social cultural movements, particularly in the context of England, France, Germany, and Italy, leading up to, around, and for the next 30 or so years after, the turn of the twentieth century. Synonymous with such avant-garde practices were distinct communities set in bohemian areas within the major urban centers of these countries. These were made up of people who knew of each other purely to be either with fellow avant-garde newcomers or united against the dominant competitors being challenged; as such the overall ethos was one of competition where vying for novelty and heresy was key. In moving against the custodians and bastions of tradition and social propriety, the avant-garde, although mainly thought of in artistic terms, was equally a pseudomilitaristic endeavor. The avant-garde is therefore very much 'anarchistic'. Thought of as a war machine, the avant-garde is productive of the means rather than the end, at ease with war but decidedly queasy in victory, being an act devoid of any determination other than its artistic intent; in other words, existing only and incessantly as the vanguard. As such, the epochal days of the avant-garde often came in periods of economic indifference (either decadence or nihilism) where riskier positions of intellectual or artistic endeavor could be and were accommodated. As David Harvey has argued in geography, the avant-garde is perpetually undermined in its political aspirations for its failure to ground and enact its esthetic link between knowledge and action in historical terms.
If scaled up, first in terms of time such that an avant-garde group can be said to have gained a history and reputation, and second in terms of space through the range and coverage of its spatial impact, the avant-garde can be seen as part of more general modernist utopian schemas indicative of early twentieth century thinking. One can think here of the way in which Henri Lefebvre's production of space gets clipped under such aphorisms – ''we need machines for living in'' – that peopled the expressions for new futures in the construction of places like the Bauhaus. Although this comparison goes against the characteristic of the avant-garde for countering dominant ideas of the time, being institutionalized as part of a dominant cultural elite, it does serve to show, as David Pinder carefully argues, that such modern utopias themselves contained complex counterdiscourses and are thus productive within themselves of further oppositional utopianisms. More generally, the avant-garde as a notion itself did gain the attention of, and was indeed articulated as such by, the intelligentsia becoming a key point of intellectual debate both in the informal scholarly institutions fueling coffee house conversations on places like the Left Bank in Paris, as well as in the more formally instituted school of thought like that of the Frankfurt School. Wherever it was articulated, its political seriousness was forefront, the latter institution mindful to distinguish its place and role in society as distinct from any notion of kitsch and mass culture objectification.
Now in the twenty first century, it is debatable whether or not there can be an avant-garde as such given that the notion is diminished in the wake of a plethora and pluralism of different avant-gardes, and given the globalization and speed of ideas which have diluted the fix of any development of thought and action, resulting in an overwhelming diversity of emerging social movements. Overall, human geography has looked at the geography and spatialities of the avant-garde movements in the last 150 years with perhaps the key avant-garde movement to gain the most attention by geographers being that of the Situationist International founded in 1957 which, under the 'command' of Guy Debord, argued for 'the free construction of daily life' through the investigation of more explicitly revolutionary critiques of everyday spaces and practices than the avant-garde movements that preceded it. It was disbanded in 1972, having achieved a total membership of no more than 70. Despite this, the ideas it propagated continue to live on and influence urban geographers' thinking, with particular emphasis being placed on the argument it made for the necessary role of spatial transformation for the success of any social revolutionary change.
One can of course argue that there has been an avant-garde within academic geography itself, taking the work of Gunnar Olsson, a self appointed heretic, as the exemplary instance of a geographer who has positioned himself outside the standard practices of writing by, not least in his excellent book Abysmal, uniting personal and philosophical, artistic, and political modes of expression in examining experimentally the art of cartography across the genres of quantitative and qualitative registers. Taking the breath away of our discipline's critics, much as Marcel Duchamp's urinal entitled 'Fountain' did to the artistic community in 1917, is a classic avant-garde result – 'Is Olsson's work geography?' Another indication of an avant-garde of sorts within geography itself comes in the artists in residence now peopling the contingent of geography staff in many a UK geography department. This at least raises the potential for avant-garde experimentation as the languages of laboratory and studio come into closer proximity co producing alternative conversations and points for debate, even if, having become almost commonplace, the presence of an artist in residence is in itself no longer avant-garde per se.
Avant-Garde: Translating the Esthetic into Politics |
global_05_local_5_shard_00002591_processed.jsonl/50790 | Commit 050f2525 authored by ale's avatar ale
Fix an error when io.CopyBuffer returns n=0
It could be that the "n=0 means EOF" semantics are leaking from the
underlying splice() system call? Anyway this prevents radiod from
getting stuck in a busy loop in certain(?) cases.
parent 828c8956
Pipeline #2715 passed with stages
in 4 minutes and 39 seconds
......@@ -175,6 +175,10 @@ func copyStream(tag string, out, in *net.TCPConn, promCounter prometheus.Counter
if n == 0 {
log.Printf("http: proxy got 0 bytes from splice()")
Markdown is supported
0% or .
Finish editing this message first!
Please register or to comment |
global_05_local_5_shard_00002591_processed.jsonl/50800 | Offshore Crew Management
Go DiGi have developed Vessels crew management software to Manage the complete crewing process across the entire marine crewing, enabling all Vessels companies worldwide to optimize vessel crew deployment and to find qualified crew members, in addition to that you will have access to all key data and reports onboard and onshore.
• Crew planning
• Project cost, crew cost and budgets
• Expiration and validity of visas and passports
• Expiration and validity of certificates
• Timesheets and salaries
• Automate and simplify data collection
Vessels crew software will provide the following features::
User-friendly setup, highly configurable marine crewing software with complete vessel crew database and comprehensive crew member records |
global_05_local_5_shard_00002591_processed.jsonl/50822 | Philo is the daughter of an Arkadian hero Alkimedon. She would be seduced by Herakles an bare him a son Aekhmagoras
Spouse & Lovers
While Herakles was in Arkadia he visited Mount Ostrakina, where he seduced Phialo. Phialo would then bare him a son Aekhmagoras.
When Phialo's father found out about the seduction he exposed them both to die of hunger on the mountain.
Aekhmagoras cried piteously, and a well-intentioned jay flew off to find Herakles, mimicking the sound, and thus drew him to the tree where Phialo sat, gagged and bound by her cruel father. Herakles rescued them, and the child grew to manhood. The neighbouring spring has been called Cissa (from Kissa meaning "jay"), ever since.
|
global_05_local_5_shard_00002591_processed.jsonl/50855 | Introducing our approach to CDA Solutions
Clinical Document Architecture (CDA) is an XML-based standard used to encode large clinical documents for easy data exchange. To help you adhere to this standard, we’ve created a special API which fully supports CDA release 2 (CDA R2).
The following sections explain how to use our API to navigate CDA’s various complexities, produce a useful document, and successfully achieve meaningful use:
• About CDA: A quick review of some common terms/concepts
• Iguana CDA Tutorial: A tutorial demonstrating how to produce a simple CDA document using our techniques
• CDA API Guide: Descriptions of each module and function included in the CDA API
• CDA Templates: A collection of CDA samples that you can use as a basis for your own CDA document
• CDA Cheat Sheet: A page that outlines our CDA process for quick reference
About Our Approach
We’ve invested a great deal of time evaluating the current techniques being used to generate CDA documents. We’ve concluded that the best approach is to apply only a minimum level of abstraction.
This might seem counter-inuitive, but there is method to our madness! All the frameworks that we’ve seen (both commercial and open source) seem to consist of massive code generators that populate big abstractions of Java stub code. The problem? This approach is nearly impossible to maintain or customize. If you want to create a CDA document for a real and specific purpose, you will eventually need much more fine-grained control so that you can tailor your output. With these current solutions, you would have to dive deep into the bowels of a complicated framework to understand how to alter it; alternatively, you would have to hack the CDA document after generating it. Neither of these scenarios seem particularly appetizing!
With our solution, you simply create and adjust the XML as you go. Our API allows you to build up and populate your CDA document using a collection of functions and lookup tables that are designed to make your life easier. The best part? Because you will be doing this in the Iguana Translator, you’ll see the resulting XML elements as they develop, in real-time and with instant feedback.
We are happy to announce that this technique is a success! We used it with Med-Evolve and it worked beautifully.
Leave A Comment? |
global_05_local_5_shard_00002591_processed.jsonl/50887 | Question: Which Country Has The Most Supercomputers?
Which is the first super computer in India?
Bhatkar is best known as the architect of India’s national initiative in supercomputing where he led the development of Param supercomputers.
He developed the first Indian supercomputer, the PARAM 8000, in 1991 and later the PARAM 10000 in 1998..
Which is the fastest supercomputer in world?
FugakuFugaku, a supercomputer jointly developed by RIKEN and Fujitsu Ltd., has taken the top position on the TOP500 list, a supercomputer benchmarking index. Fugaku turned in a High Performance Linpack (HPL) result of 415.5 petaflops, besting the now second-place Summit system by a factor of 2.8x.
Can a supercomputer mine Bitcoin?
Supercomputers have different demands than Bitcoin Miners, as they have to solve other tasks. For bitcoin miners, so-called ASIC chips, which have been optimized for hashing the SHA-256 algorithm, are used. If a supercomputer were to run bitcoin mining now, not much would change at the hashrate.
How much is a NASA computer?
NASA’s system will cost about $50 million, somewhat of a bargain price because Intel Corp. and SGI, among other vendors, will be studying the system as part of a research agreement, a NASA spokesman said.
Which country has the largest number of computers?
BrazilRankCountryPCs In-Use (in Million)1U.S.310.62China195.13Japan98.14Germany71.56 more rows
What is the most powerful computer on earth?
The world’s most powerful supercomputer today is Summit, built by IBM for the U.S. Department of Energy’s Oak Ridge National Laboratory in Tennessee. It occupies the equivalent of two basketball courts and achieves an impressive 148.6 petaflops thanks to its 2.41 million cores.
Which country is best in computer?
According to HackerRank, the following is the list of the top 10 countries with the best computer programmers.China – The reason for China to occupy the top position is not its population. … Russia – … Poland – … Switzerland – … Hungary – … Japan – … Taiwan – … France –More items…•
What is Google’s CPU called?
SycamoreSycamore is the name of Google’s quantum processor, comprising 54 qubits. In 2019, Sycamore completed a task in 200 seconds that Google claimed, in a Nature paper, would take a state-of-the-art supercomputer 10,000 years to finish.
Which is the first supercomputer in the world?
Answer: The CDC 6600 from Control Data Corp., is generally recognized as the first supercomputer, according to Wikipedia. Built in 1964, it was designed by Seymour Cray, and ran at about 1 megaflop (a million floating point operations per second).
Does Pakistan have supercomputer?
ScREC is a supercomputer developed by the Research Centre for Modeling and Simulation (RCMS) at the National University of Sciences and Technology, Pakistan (NUST) in Islamabad, Pakistan. With a 132 teraflops performance, it is currently the fastest supercomputer in Pakistan.
What is the name of first supercomputer of India?
Param ShivayFirst phase The first supercomputer assembled indigenously, called Param Shivay, was installed in IIT (BHU) this year, and was inaugurated by Prime Minister Narendra Modi, also the Varanasi MP.
Who invented computer?
Charles BabbageEnglish mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine.
Which country has fastest supercomputer?
The newly crowned world’s fastest supercomputer is being deployed in the fight against the coronavirus. Japan’s Fugaku supercomputer claimed the top spot on Monday, carrying out 2.8 times more calculations per second than an IBM machine in the US.
Which countries have supercomputers?
Tianhe-2 (China) China’s Tianhe-2 is used mainly for government security applications at China’s National University of Defense Technology. … Sunway TaihuLight (China) Also a former number one, Sunway TaihuLight dominated the list for two years after its debut in June 2016. … Sierra (US) … Summit (US) … Fugaku (Japan)
Is Google a supercomputer?
Who use supercomputers?
Using powerful supercomputers like IBM’s Roadrunner at Los Alamos National Laboratory, researchers can run models that require upward of a thousand trillion calculations per second, allowing for the most realistic models of these cosmic mysteries yet. Other supercomputer simulations hit closer to home.
Which is the fastest super computer in India?
PrathushPrathush is India’s fastest supercomputer with 3.7 petaflops high performance. The supercomputer is at the Indian Institute of Meteorology, Pune. For the uninitiated, a petaflop is the measure of a computer’s processing speed. A petaflop is equal to a quadrillion or a thousand trillion calculations per second.
What is the smartest computer in the world?
Summit, online now,* is the world’s most powerful and smartest supercomputer, capable of an estimated 200 quadrillion calculations per second – or 200 petaflops. It will provide at least 5-10X more performance on DOE applications compared to its predecessor.
Which country has the most powerful supercomputer?
ChinaChina currently dominates the list with 229 supercomputers, leading the second place (United States) by a record margin of 121. Since June 2020, the Japanese Fugaku is the world’s most powerful supercomputer, reaching 415.53 petaFLOPS on the LINPACK benchmarks.
What is the most powerful AI in the world?
The new TX-GAIA (Green AI Accelerator) computing system at the Lincoln Laboratory Supercomputing Center (LLSC) has been ranked as the most powerful artificial intelligence supercomputer at any university in the world.
Which country is best in computer technology?
The following are the top 10 countries viewed to possess technological expertise.No. 8: Russia. … No. 7: United Kingdom. … No. 6: Singapore. … No. 5: Germany. … No. 4: United States. … No. 3: South Korea. Technological Expertise Rank: 3. … No. 2: China. Technological Expertise Rank: 2. … No. 1: Japan. Technological Expertise Rank: 1.More items…• |
global_05_local_5_shard_00002591_processed.jsonl/50922 | Plantar Fasciitis
Image result for images for plantar fasciitis
This is the first in a series of posts covering common problems that present in a yoga class. Plantar fasciitis is a nasty pain in bottom of the foot. It causes mainly foot arch pain and/or heel pain. Pain is quite often at the front of the heel
Plantar – “relating to the sole of the foot”. Fasciitis – “inflammation of the fascia”. Fascia is a thick connective tissue and the plantar fascia is a tough fibrous band which supports the arch of the foot. It runs from the calcaneus (heel bone) forward to the heads of the metatarsal bones (the bone between each toe and the bones of the mid-foot).
Plantar fasciitis is a common and often persistent kind of overuse injury. It affects runners, walkers and hikers, and nearly anyone who stands for a living — cashiers, for instance — especially on hard surfaces. Walking on concrete and running on pavement are probably risk factors.
Most common symptoms:
• Morning foot pain – even after a night’s rest the feet are tight and contracted and you feel the need to stretch them.
• Pain pattern – As you walk around in the course of a morning the pain reduces but then it recurs. It may reduce when you sit but then increases again when you get up and put weight on the foot. Movements that stress the foot such as balancing up on toes, walking upstairs can increase the pain.
• Compare both feet – can you pull the toes up on the unaffected foot – further and without pain compared to the affected foot? Tight big toe especially that doesn’t extend like it should. Need to stretch the toes out over time.
Plantar fasciitis is not the same thing as heel spurs and flat feet, but they are related and often confused. Heel spurs are abnormal bony growths on the bottom of the heel. They can occur if you have plantar fasciitis but they do not cause plantar fasciitis. Those with flat feet or high arches may be prone to heel spurs – read the post on Arches – high and low.
Plan of action:
• Rest and ice – rolling the sole of the foot over a frozen bottle of water
• Tennis ball massage of the sole of the foot – see post. Trigger massage of the foot ach can help, as can reflexology
• Stretching exercises are targeted towards stretching the calf muscles: –gastrocnemius – Put foot on a lower stair (or block) – keep leg straight and hold for 30 secs x 3 times
• soleus – same as above but keep the front knee slightly bent
• Stretching feet -Sitting down with the affected foot supported on a mat/chair – heel down and toes up. Pull the big toe down for 10 secs x 5 times.
• Protective heel pads and custom made orthotics are useful
• Cortisone injections
• Wearing shoes in yoga classes if the pain is severe
There are, however, so many contributing factors to plantar fasciitis – flat feet, pronation, high arches, tight calves, running, walking, not running, not walking etc and not everyone with one/some of the above experience such pain. Yoga classes which tend to foster a whole body holistic approach to movement are helpful, I think.
It’s difficult to stretch the plantar fascia and the first stretch in the morning can be painful. The foot exercises that we regularly practise in class may be too much if the pain is severe, so make sure that you perform the alternatives from standing. Our “hovering” manoeuvre into dog pose means that we hold a stretch on the bottom of the foot for longer than normal before we push the pelvis up through the action of the feet. We tend to go in/out of movements and thus massage the soles of the feet. Our rocking balance on toes and ball of the foot , spreads the toes, strengthens the arches of the feet and the front of the foot. The piece de resistance is sprinters and I have written much about this. In dog pose many people cannot lengthen both legs but we can lengthen alternative legs to stretch the calf muscles.
In the marvellous sprinters, we aim to lengthen one leg only – the back leg and thus stretch the gastrocnemius and soleus muscles. As we progress and become more balanced, we are also able to lengthen the front leg – which is good for the knee. We always keep the front foot rooted but we roll through the back foot and thus massage the plantar fascia. I have written many a time and oft about the benefits of Sprinters. The more we practise, the more we embed the movement into our sensory motor cortex and begin to address the biomechanical issues that may cause plantar fasciitis. Sprinters helps us to balance the relationship between the foot, ankle and knee so that when we walk, run, dance or stand we have a chance of being well-organized.
There are many, many videos on You Tube relating to plantar fasciitis. If you find anything particularly useful, please share it. If you have pain in the ball of the foot or a rigid big toe due to a bunion, the foot and toe stretches mentioned above will also be of help.
1 thought on “Plantar Fasciitis”
1. Liz – thank you – amazing how many dog walkers have this – every other one i talk to – will pass on this fab info. (I also blame wellington boots!) see you wednesdayAlison
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
global_05_local_5_shard_00002591_processed.jsonl/50931 | Host create-react-app on IIS Server
Install the latest version of nodejs from site.
Install create-react-app globally as below:
npm i -g create-react-app
Create the react-app in the folder of your choice on your local machine:
create-react-app hell-world-app
Modify the index.js file as shown below:
import React from "react";
import ReactDOM from "react-dom";
const element = <h1>Hello World</h1>;
ReactDOM.render(element, document.getElementById("root"));
Test the app on localhost:
npm start
Build the production optimized app:
npm run-script build
Copy the contents of the build folder and paste it on the Server at the location where you want to host it e.g. C:\data\testreactapp. Open IIS on the Server and add Website by right-clicking on Sites as shown below. Give it the required hostname or port to test it in browser e.g. http://helloworldapp.
The index.html file is already present at the Physical path created by the build which the IIS Server will look for as the default document.
Authentication can be Anonymous for testing purpose. However, please change as per your requirement. The AppPool by default runs with CLR 4.0 version and Integrated mode.
This approach is especially helpful when you have a back-end .Net Web API hosted on the same IIS Server to improve speed.
One thought on “Host create-react-app on IIS Server
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
global_05_local_5_shard_00002591_processed.jsonl/50932 | Go to the U of M home page
Fabio Hodo's picture
What is a class like at the University of Minnesota?
Hey guys,
When I first got my acceptance letter from the University of Minnesota I was, of course, really excited, but I also had a lot of questions in my head, one of them being: "What are classes like at the University of Minnesota?". We know that usually high school classes differ from country to country, but also the difference between high school and college classes is quite substantial. In order to make this blog shorter and easier to understand, I am going to divide a college class in 3 parts: the lecture part, the discussion part and the lab part. (The last one being more common in science classes)
1. Lectures
Lectures are usually pretty much the same regardless of the major of study. They consist of a professor and an audience (which can range from as little as 25 people, to as many as 100 people for most introductory courses such as Calculus 1, Physics 1, Intro to Psychology, Microeconomics etc.) These lectures usually last 50mins and require you to be attentive and listening, and occasionally ask your professors questions about parts you didn’t understand. Most classes have a lecture component.
2. Discussions
Discussions on the other hand consist of a teaching assistant (TA) and a group of 20 students. The aim of these discussions, as the name suggests, is to discuss the material from lecture and homework. Depending on the subject you may be asked to work in groups to solve a worksheet, and to do it individually and then discuss it with your group members. (In the US education system there is a strong emphasis on group work and learning how to work in teams). Also, most classes have a discussion section.
3. Labs
Labs are the less common sections, and mostly prevalent in scientific courses where the use of instruments and equipment is more important in understanding certain concepts such as: chemical reactions, laws of physics etc. These labs require you to write scientific lab reports similar to those written by scientists in the real world. Of course, you will be given example labs to read before you attempt to write one and if you still don’t feel confident, the TA’s will be happy to help.
I hope this gives you a good idea of how classes are here at the U! |
global_05_local_5_shard_00002591_processed.jsonl/50951 | One synthetic reaction that creates new carbon chains is the use of enol or enolate. The α-carbon of the carbonyl group (the carbon next to the carbonyl carbon) plays an important role, and due to its high acidity, it has a tendency to be pulled out of the proton (H+) by a base.
Therefore, the carbons next to the carbonyl group are the starting points and enols or enolates are formed. It can then be alkylated by adding the compound you want to react with to create a new carbon chain.
For the synthesis of enolates, which is important in organic chemistry, you must understand in advance the reagents to be used and the regioselectivity of the reaction. Of course, you also need to learn about the reaction mechanism.
There are several reactions in the field of enols and enolates that are important in organic chemistry, such as Claisen condensation, aldol reaction and Michael addition. In order to learn these synthetic reactions, we need to understand the nature of the alpha carbon of the carbonyl group, so we will explain what the properties are.
The Alpha Carbon of the Carbonyl Group Is Highly Acidic
Compounds with carbonyl groups react in a variety of ways. In the case of carbonyl groups, the carbon and oxygen atoms are connected by a double bond, allowing electrons to be transferred to the oxygen atom.
Therefore, in the presence of a nucleophile, the carbonyl carbon is attacked. This is called a nucleophilic addition reaction.
However, in a carbonyl compound, the hydrogen atom of the adjacent carbon atom can be pulled out. When the protons are extracted by the base, the following compounds are formed.
Importantly, it can give rise to carbanions. Because of the presence of the carbanion, it is an unstable substance. But because it can write a resonance structure, when the proton is pulled out by a strong base, you get this molecule. This molecule is called an enolate.
Because enolates can write a resonance structure, the hydrogen atom next to the carbonyl group are highly acidic, and making it easy for a base to pull out a proton (H+).
The carbon next to the carbonyl group is called the α-carbon. The carbonyl group is used as the starting point for the α, β, and γ positions, as shown below.
In enolate, the alpha carbon of the carbonyl compound is an important factor. The formation of enolate ions as intermediates leads to a variety of chemical reactions.
Keto-Enol Tautomerism and Enol/Enolate
In carbonyl compounds, the normal state is called the keto form. However, when a strong base is present, an enolate is created. This is called keto-enol tautomerism. The reaction mechanism is as shown earlier.
A compound with a C=O structure is the keto form. On the other hand, if the -OH is attached to an alkene, it is called the enol form. Due to keto-enol tautomerism, both keto and enol forms can change their forms.
In the enol form, if the compound has the structure of -OH, it is called enol. On the other hand, if an oxygen atom has a negative charge, it is called an enolate. They are as follows.
Between enol and enolate, it is the enolate that is more important. Enolate is produced as a result of the withdrawal of protons by a strong base.
Enolate, Which Is Nucleophilic and Creates Carbon Bonds in the SN2 Reaction
Why is enolate important in organic chemistry? That’s because the α-carbon of enolate is negatively charged and has nucleophilic properties as a carbanion.
As mentioned above, enolate is generated by using a strong base. Subsequently, the enolate, as a nucleophilic agent, undergoes the SN2 reaction. The following nucleophilic substitution can create new carbon chains.
First, enolate is synthesized by adding a base as a reagent. Then, the SN2 reaction proceeds by adding an alkyl halide.
Do not add an alkyl halide until after the enolate is formed by the addition of the base. The next reaction must proceed after the enolate has been synthesized. Also, the amount of base to be added is one equivalent. If the base is present in the solution, it is more likely to react with the alkyl halide.
Large Steric Hindrance and Bulky Base LDA Is Important for Enolate Formation
However, carbonyl groups are known to be highly reactive. The addition of a base causes nucleophiles to attack the carbonyl carbons, resulting in the following nucleophilic addition reactions.
When does the nucleophile not attack the carbonyl carbons, but rather the formation of enolates? The answer is when a bulky base is used.
In many cases, bulky bases are used in the formation of enolates. One such strong base is, for example, LDA (lithium diisopropylamide). LDA is a compound with the following structure.
With such a bulky base, the steric hindrance is large. Therefore, it cannot nucleophilic attack the carbonyl carbon.
Instead, it is possible to pull out the hydrogen atom attached to the alpha carbon of the carbonyl group. This is because the proton pullout is less affected by steric hindrance.
A bulky base also has the advantage that when an alkyl halide is added to a solution, it is difficult to react due to steric hindrance. It is important to use a reagent that is a strong base but cannot be nucleophilic in order to generate enolates.
-NaH (sodium hydroxide) is also used in strong bases
Alternatively, NaH (sodium hydroxide) can also be used as a strong base to produce enolates, because although NaH is a strong base, it is not nucleophilic.
NaH is not a bulky base. Rather, it is a very small molecule. However, its small orbitals and lack of nucleophilicity make it highly important in enolate synthesis.
Can Alkylation with Electron-Withdrawing Groups Such as Cyano and Nitro Groups
Note that ketones and aldehydes are not the only functional groups for which anions are generated by strong bases. Not only carbonyl groups but also other electron-withdrawing groups can be synthesized as enolate equivalents of compounds with anionic properties by strong bases.
Examples of electron-withdrawing groups include the following.
• Cyano group (-CN)
• Nitro group (-NO2)
• Ester (-COO-)
• Amide (=CO-NR2)
Because they are electron-withdrawing, the alpha carbon is highly acidic, as is the alpha carbon of the carbonyl group. Therefore, by adding a strong base, we can synthesize enolate equivalents with a carbanion. For example, it is as follows.
When an electron-withdrawing group is present in a molecule, not just ketones and aldehydes, the proton attached to the α-carbon is pulled out of the molecule.
Regioselectivity Is Important in Ketone Alkylation
There is one problem in the formation of enolates in compounds with electron-withdrawing groups, including ketones. That is regioselectivity. Which part of the α-hydrogen is pulled out and becomes anionic is important.
For example, in ketones, there are two places where the protons are pulled out, as shown below.
The reason why regioselectivity is so important in the use of enolate for alkylation is that two compounds may be formed. Therefore, we need to understand how enolates are synthesized.
Thermodynamic Control: Acidity and Alkene Stability Determine the Position of the Reaction
There are two ideas in enolate positional selectivity. One of them is thermodynamic control of regioselectivity. In short, the lower the activation energy required to make a compound react, the more likely it is to react preferentially.
One of the most obvious thermodynamic control of regioselectivity is the difference in acidity. For the α-carbon of the carbonyl group, only one of the carbonyl groups is alkylated at different levels of acidity. For example, in the following compounds where the carbonyl group is present on both sides of the α-carbon, only one enolate is formed by the addition of a strong base.
If there are two carbonyl groups next to each other, it is easy to predict that they will be more acidic. Therefore, due to the positional selectivity in thermodynamic control, only one compound is obtained.
-Compounds with Many Substituents Tend to Be Stable
However, compounds with carbonyl groups on both sides are rare. So how can we predict which compounds will be generated?
When a compound makes a double bond, the compound is synthesized in such a way that a polysubstituted alkene is formed. This is called the Saytzeff rule. There is an order to the stability of alkenes, as shown below.
The double bond contains a π bond, which extends perpendicular to the bond. As a result, the π orbitals are parallel to the neighboring C-H bond, and the molecular structure is stabilized by weakly sharing electrons. This is called hyperconjugation.
Therefore, the more substituents there are in an alkene, the more stable the structure of the alkene will be.
The same is true for enolate formation. When enolates are synthesized, intermediates with stable structures are preferentially formed. As a result, enolates are synthesized in such a way that many alkyl chains are attached to the double bond.
For example, when NaH (sodium hydride) is added, the enolate formed is as follows.
When considering positional selectivity in thermodynamic control, the Saytzeff rule allows us to predict the positional selectivity of the enolate.
Kinetic Control: Use of Bulky Bases to Synthesize Fewer Substituents
Is it possible to synthesize enolates so that the substituents are fewer alkenes? By using a bulky base, a compound can be synthesized to have fewer substituents.
In the case of a strong base such as NaH, which has no steric hindrance, a multi-substituted enolate is generated due to the thermodynamic control of regioselectivity, as explained earlier. On the other hand, when a bulky strong base such as LDA is used, a proton with few substituents is easily pulled out due to steric hindrance.
Considering the stability of polysubstituted alkenes, as mentioned above, enolates with more substituents are easier to produce in terms of activation energy. However, because of the steric hindrance, when using a bulky base, the proton to be pulled out first will be the part with fewer substituents.
This is the reason for kinetic control. The greater the steric hindrance of the strong base used, the fewer substituents the enolate has to be synthesized. For example, the following synthesis proceeds under kinetic control.
The regioselectivity of the enolate depends on the reagent used. When a small strong base such as NaH is used, the reaction proceeds under thermodynamic control. On the other hand, when a bulky strong base such as LDA is used, the reaction proceeds in the kinetic control due to steric hindrance.
Enolate Synthesis of Electron-Withdrawing Groups Such as Ketones
The alpha carbon of the carbonyl group is known to be highly acidic. Therefore, enolates can be synthesized by using a strong base. Organic synthesis using enolates is very convenient because new alkyl chains can be synthesized by the SN2 reaction by adding alkyl halides.
In order to proceed with synthetic reactions using these compounds, you must understand the difference between enol and enolate. You also need to learn what strong bases will allow you to synthesize enolates without the nucleophilic addition reaction occurring.
In addition, one of the problems in the synthesis of enolates is always the regioselectivity: small bases, such as NaH, produce enolates with many substituents, while bulky bases, such as LDA, produce enolates with fewer substituents.
The synthetic reactions of enol and enolate are widely involved in the synthesis of important organic chemical reactions such as Claisen condensation and aldol reaction. Be sure to understand these reactions beforehand, as we have explained the basics of understanding them. |
global_05_local_5_shard_00002591_processed.jsonl/50968 | 6 comments on “Scriptures That Bother Me — Numbers 20:1-13
1. Jim, God bless you for your honesty. It serves as a reminder to us all.
The test (forgive the word) of obedience is long-term, not short. If we had but one chance, we’d all fail. Relating the moments when you slip up shows that your obedience comes wrapped in humility – and that is priceless.
2. It’s hard being a vessel…..an instrument of use for the Lord in His Kingdom and not trying to tell Him or show Him how valuable we think we really are.
I think so often of the analogy that He is the potter and we are the clay. A vessell may have to be broken, remolded, remade……so that it can be filled up by the potter for use. That vessel also has to be emptied of anything it held prior so that it can be filled with what the master purposes….those are such hard lessons to learn.
I appreciate your blog…God bless.
3. Andy,
The longer I’m a Christian, the more humility and transparency play a major part in my walk with God. I’m still learning how much my many failures are actually better teachers than my successes. This is part of my motive for writing the “Scriptures That Bother Me” series. I’m glad you enjoyed it.
4. C. Todd,
Yes, it is always hard being a vessel and not the Navigator. It is also hard not to focus on my “cracks” and remain focused on His grace that is still able to use me. Or us.
5. Ugh. Having been through a church split last year, this resonates so with me. “But He did remind me to keep my ego out of the way of His grace.” What a wonderful way to put it. More of You, Lord. Less of me. So much less of me.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
global_05_local_5_shard_00002591_processed.jsonl/50975 | How to code with Linux
Subscribe to my newsletter and never miss my upcoming articles
This article is about my first steps and recommendations to start development with Linux. I use ubuntu but I hope that my research is right and the commands are also available in other distros.
I use here apt-get/apt install commands. They work only in Debian based systems like Ubuntu. They will not work for something like Fedora. Fedora uses different packing tool, so if you use that please check how the commands are at your packaging tool.
Necessary tools
Git is a fundamental tool and thanks to Linux should it be already installed. You can check if it is installed with
git --version
and install it with
sudo apt-get install git
SSH-keys are for authenticating necessary if you don't want to type your credentials every time. This is also available for the version control software I use, GitHub. But you can authenticate yourself at other services and servers. I recommend using an ssh key to authenticate your account. For the creation of an ssh key you use
and follow the instructions. When you finished that you have an file in ~/.ssh. I recommend using
cat ~/.ssh/
to get the content, which is needed for your Github ssh settings where you add a new ssh key. You have to enter a title for this key. This title is only for your organization purposes and could be anything but recommended is a device and if necessary user containable name. In the area below the title, you paste the content from the file and press the save button.
Text editor
Then you should install a proper text editor. I use VS Code for that. You can install it with
sudo snap install --classic code # or code-insiders
for more information, I recommend the offical vs code docs. If you are like me and use another IDE instead of VS code you should install it manually. But I have to say that you could also use the text editor of your favor.
Java development
I prefer to use Maven so I have to install it but first, we should install a JDK or a Java development kit. We install the JDK with
sudo apt-get install openjdk-14-jdk
and set JAVA_HOME with
export PATH=$PATH:$JAVA_HOME/bin
and finally maven with
sudo apt install maven
then we check if everything is installed correctly with
java --version
mvn --version
If you only develop in Java you are ready now but I recommend installing python and python-pip since its a good language to write small scripts that are more convenient to write in python than java. You can install them with
sudo apt install python3 python3-pip
and check the versions with
python --version
pip3 --version
You can easily install nodejs with these instructions.
Other software
You can install needed software too, I don't use special software on my machine at the moment so I use only connections to my servers with the software if needed.
I recommend some aliases and config changes but I will cover it in a future blog post. I'll link this post here. If you sign up for the newsletter you won't miss the article.
No Comments Yet |
global_05_local_5_shard_00002591_processed.jsonl/50979 | Mesk and SCons
Travis Shirk recently announced Mesk 0.1.2, a GTK+ Media Player. There isn’t a Windows build, yet, but I’m excited about it’s ability to change your Jabber status message to indicate which song or audio file you are listening to. Source and Binaries here!
Travis also mentioned SCons to me – a build tool that is apparently much more powerful (and expressive) than make, yet less verbose and more readable than ant. Looks very interesting. The SCons team is preparing a 1.0 and one of their members has been accepted into the Google Summer of Code program.
%d bloggers like this: |
global_05_local_5_shard_00002591_processed.jsonl/51000 | Why use FreeDOS in 2017? Who uses FreeDOS today?
DOS is one of the oldest PC operating system, but it is still useful. There are lots of great DOS applications that still do the job, and of course there are plenty of classic DOS games that are still fun to play.
FreeDOS is a complete, free, DOS-compatible operating system that you can use to play classic DOS games, run legacy business software, or develop embedded systems. Any program that works on MS-DOS should also run on FreeDOS. It doesn't cost anything to download and use FreeDOS. You can also share FreeDOS for others to enjoy, because all FreeDOS programs are distributed under the GNU General Public License or a similar open source software license. In his talk, FreeDOS founder and project coordinator Jim Hall will talk about the history of FreeDOS, and where FreeDOS is headed next. |
global_05_local_5_shard_00002591_processed.jsonl/51002 | A Modest Reply to a Brother’s Challenges to the Practice of Headcoverings in Worship
The following is a reply to some challenges someone inserted in a Facebook discussion that was elicited by a posting about headcoverings in worship.[1] His questions are numbered and my reply is below each point.
Perhaps it goes without saying but I only have the highest regard and respect for my brother with whose positions I interact.
1. Which commandment does it fall under? 1st/3rd? 2nd? 4th? 6th? Honoring God? Regulated worship? Honoring the Sabbath? Modesty? Respect/Honor of Husband? This has not been sufficiently answered for me.
First of all, should it matter? If God commands us to do something in his word when we cannot discern the species or what it relates to, how would this be a barrier to obedience? If a servant receives a command from his master that does not pertain to his daily tasks, does he ask: “How does this relate to my calling as a servant? To the work I do every day?” No, he obeys (Luke 17:10).
Second of all, strictly speaking, disobedience to any commandment is a violation of all (James 2:10).
Third, should I venture an answer, it is obvious to me that it pertains to the second commandment since worship is in view. John Murray explains:
There is good reason for believing that the apostle is thinking of conduct in the public assemblies of the Church of God and of worship exercises therein in verse 17, this is clearly the case, and verse 18 is confirmatory. But there is a distinct similarity between the terms of verse 17 and of verse 2. Verse 2 begins, “Now I praise you” and verse 17, “Now in this . . . I praise you not”. The virtually identical expressions, the one positive and the other negative, would suggest, if not require, that both have in view the behaviour of the saints in their assemblies, that is, that in respect of denotation the same people are in view in the same identity as worshippers. If a radical difference, that between private and public, were contemplated, it would be difficult to maintain the appropriateness of the contrast between “I praise you” and “I praise you not.[2]
As the wearing of headcoverings also pertains to the relationship between husband and wife (1 Corinthians 11:3ff.), it should also be subsumed under the fifth commandment (WLC, Q&A 127).
1. What is the position of the Westminster Standards on it? They are silent on it as being a part of worship (and yes, I know that the verse is a prooftext). The confessional position then is liberty, correct? Yes! For those that say, “Everyone did it during that time” fail to compel me as preaching, Scripture reading, etc. were also part of what “everyone did at that time.”
True, the standards do not reflect upon this matter. This argument from silence does not, however, reflect what scripture teaches or does not teach, only to what the authors of our confession chose to speak. Though I have a great deal of respect for the divines, I cannot see how their silence as to this issue is determinative of what Paul did or did not say when they did not specifically address it.
Is this a matter of liberty? No it isn’t, since the Confession notes that we are bound to “the whole counsel of God…” (WCF 1.6) as scripture is “[t]he supreme Judge, by which all controversies of religion are to be determined…” (WCF 1.9). The command in scripture that women have their head covered and that men have their head uncovered may be up to debate as to its nature and application, but the command is not. Those who advocate for headcoverings in worship do so because they believe that it is mandated. Other Christians disagree, to be sure, but that doesn’t make it a matter of liberty. That is the one position but not ours. The question is: how do we proceed in our discussions with those who believe it is a matter of liberty and those who do not? One man’s interpretation cannot be the basis by which the church, for example, disciplines a member for not following that interpretation, but it can and should be the basis for calling us to look more closely at the scriptures.
3. For those who claim that it is part of the creation mandate: Did Eve wear a head covering while naked in the garden? If not, then Paul must mean something different when referencing creation.
I am not certain that any advocate of headcoverings in worship has said that it is a part of the creation mandate, simpliciter. But surely the submission of wives to their husbands was and is, and the argument is that, as Paul commands, the wearing of a headcovering is a public demonstration of that.
Furthermore, Paul argues in the context of a fallen humanity (vs. 6 & vs. 14: shame). No headcovering was needed in the garden any more than clothing was needed since man was not ashamed to be in the presence of his creator. Just as Paul’s commands about participating in the Lord’s Supper govern eating at a table that commemorates the death of Christ for sinners, (vs. 20ff.), so also the headcovering in the context of the worship of God by fallen sinners
1. If a head covering is known to DEMONSTRATE that a woman is in submission, then one should be able to show pictures of women wearing head coverings and ask unbelievers what it means that she covers, and they should respond “submissive.” But that’s not the case–they will respond “religious” and often the associated religion is a sect or a cult.
I must admit that I don’t understand this objection since, if Barry York’s arguments carry any weight, the head covering was known to demonstrate that a woman was in submission when she prophesied. So either way, the objection applies to any understanding of headcoverings.
I would have to demur, at least anecdotally, with his claim. Or at least my experience is as valid as the objector’s. And so is another’s: “What about the covering being a symbol of authority on her head? What kind of authority is it to which hair speaks? As already indicated, all that a woman has to do is walk into an assembly with her head covered where there are feminists present and it will be clear what that covering means.[3]
Furthermore, the headcovering does, at the very least, distinguish between men and women. That would be very clear to any culture, but especially in our day and age where there seems to be persistent confusion about such.
And why, based on this claim, would it have to be obvious to the unbeliever? Paul seems to be more concerned how these things are perceived in “the churches of God” (1 Corinthians 11:16).
Even taking this objection at face value I ask: was it obvious to Romans what the early Christians were doing in their ceremonies? But doesn’t the bread and wine clearly symbolize the body and blood of Christ as Paul goes on to explain? Indeed it does, but one must be thoroughly acquainted with the sacrament by way of teaching before one can understand and correctly observe it. And obviously Paul wrote this portion of scripture so that the Corinthians would be persuaded to follow the apostolic practice.
1. See the discussion here: https://tinyurl.com/y6e5ddbj
2. Source: https://presbyterianreformed.org/1992/01/use-head-coverings-worship-god/
3. http://www.dr-bacon.net/blue_banner_articles/headcovr.htm
3 thoughts on “A Modest Reply to a Brother’s Challenges to the Practice of Headcoverings in Worship
1. If men to this day still remove their hats when entering a church as a sign of respect how is it that we no longer think of women covering their heads in a church as a sign of respect? I think the one, men taking off their hats, should prove the other as a church practice.
Very good post. God bless you! \o/
Liked by 1 person
1. I think that is the residue of a cultural custom that we haven’t shaken yet as people do not see it as a sign of submission to God. It is obvious to me that the headcovering of women was removed because our culture and churches in general have rejected feminine submission.
Nevertheless, I agree that they go hand in hand, as scripture teaches.
Liked by 1 person
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_05_local_5_shard_00002591_processed.jsonl/51006 | Do you ever get that icky feeling, where you just don’t fit in?
You feel gross, ugly, and somehow like you just aren’t meant to be where ever you are at that given time as you are different in a bad way to everyone around you? And frankly, you don’t want to be looked at by them?
As a chubby, hairy kid growing up I used to get this feeling from time to time. I was a little chubby and like most teens, I started to get hair in places I hadn’t before…but I actually get a bit more than others due to some hormone stuff I have going on, probably related to also having endometriosis. This is now being taken care of via Laser ar Pulse Light Clinic which I’ll be writing about more in-depth soon!
Anyway back to my point. I have tackled that feeling over the years with self-love, meeting other humans who also have some hair in places, realising not everyone is a supermodel and via exercise which generally allows me to be in a room full of all different kinds of people who don’t judge. It also allows me mostly to get outside of my mind!
HOWEVER the other day, and occasionally the feeling returns, usually at classes.
Yoga / Pilates are my favourite classes and generally, they are relaxing. But I think there is something about the mirrors and being able to see all angles of myself that helps that weirdo inside my head come back.
THE POSITIVE about this is that yoga and exercise, in general, allows me to tackle that monster. As soon as that mindset kicks in, I challenge it and tell it to stop. I try to focus on the exercise ahead of me and push through until it goes.
The difference with those voices in my head at the GYM vs NOT AT THE GYM is that when I’m not at the gym there’s less to distract me from them. In fact, working out, running etc are how I started to battle low self-esteem. Working out is like my superpower.
Whether I’m in a class or the gym floor itself, there will always be people. But it’s super important to remember they feel the same as us! And if there’s the occasional ‘look at me’ type, just eye roll or ignore them ahah!
Generally, most people at the gym are in a state of ‘please don’t look at me.’ They are in their own world, focussing on the exercise at hand and won’t be looking at you!
Also, those voices in your head are usually placed there from a situation or time in your past. For me, it was comparing myself to my friends at school. And like I said, as I’ve grown up I’ve started to realise we are all different!
Yoga and pilates really help me to focus on my body and treat it in the best way possible, which in turn helps my mindset towards my body.
I find personally that tackling the monster head on, literally in the mirror, around others, is the best way! It has nowhere to hide, and although I might have a few minutes of feeling weird. I always feel so much better after, and can congratulate myself for having exercised!
Always make sure to acknowledge your efforts after you work out! It’s a major win in your day and your body and mind will thank you later.
I sometimes congratulate myself with vegan ice cream… or I get myself to the gym with the reward of cake after…
Whatever floats your boat hey!
Hit me up on Instagram if you want to let me know if you liked this post or what subject to blog about next:
I work out at Virgin Active which is where thee photos were taken.
*This is an ongoing collaboration with Virgin Active. (Gifted)
Images by Fordtography |
global_05_local_5_shard_00002591_processed.jsonl/51028 | Felt Birdhouse Flower House Handmade and Fair Trade
Felt Birdhouse Flower House - Wild Woolies
Regular price
Regular price
Sale price
Unit price
Sold out
Meet the Artisans
Wild WooliesWalking into the Kathmandu production center?ÇÖs reception you are immediately greeted by a cheerful ?ÇÿNamaste?ÇÖ (?ÇÿI Salute the God Within You?ÇÖ) with hands pressed together in a prayerful expression. Proceeding into any of the production halls you?ÇÖll be greeted by a complete chorus of the same as dozens of ladies press felt into a variety of shapes, while others stitch, needle and applique to finish hundreds of different styles of decorative items for export.
|
global_05_local_5_shard_00002591_processed.jsonl/51047 | Virtual South Slavic Literature Library provides links to on-line accessible South Slavic literature. Spanning the Balkan states of Slovenia, Croatia, Bosnia and Herzegovina, Serbia, Montenegro and Macedonia by virtue of language similarities, the library does not attempt to follow national borders, but is organized around a single author index, underlining in this way the multicultural flair of the region.
Dobrodošli! Welcome!
The scope of the Library is to link to the South Slavic literature. This means that it contains only links to literary texts that were originally written in some of the South Slavic languages. (Due to the fact that Borut does not master Bulgarian language, links to Bulgarian literature are not included here. There is however an excellent site Slovoto - Българска виртуална библиотека for that topic.) The most important areas of the Library are:
You can both read and edit this library. Introduction page describes the basic concepts and the usage of the Library and the Dokuwiki system.
In Memoriam |
global_05_local_5_shard_00002591_processed.jsonl/51053 | Disclaimer: All content on this site is written for informational purposes only. Under no circumstances should any information from this blog be used as replacement for professional medical, financial, or legal advice. All information or ideas provided should be discussed in detail with an advisor, accountant, doctor or legal counsel prior to implementation. is not licensed by or affiliated with any third-party marks on this website and third parties do not endorse, authorize, or sponsor our content except where clearly disclosed. is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to |
global_05_local_5_shard_00002591_processed.jsonl/51064 | Re: [dev] interested in issue tracker dev
From: Kurt H Maier <>
Date: Fri, 13 Jan 2012 13:17:13 -0500
On Fri, Jan 13, 2012 at 05:28:19PM +0100, Paul Onyschuk wrote:
> What makes old plain TODO interesting is zero setup offline usage and
> direct access to data (checkout repository and open in your favorite
> editor).
and then it turns into a huge mess when some vim nerd has expandtab
turned on.
> I don't see how Debbugs is improvement in this case - hide data behind
> mailing list. Why I need to setup MH (or other mailing client) and
> download mail archive or use fancy web interface just to look up (read
> access) for existing issues?
this works both ways. why do I need another code checkout just to look
at existing issues? you clearly already have a mail client, you're
clearly already subscribed to lists.
> I would say there is no difference between flat files database and SQL
> database if you can't easily play with it (at least read access). Some
> random note from Debbugs presentation paper [1]:
I can't even begin to describe how much worse an RDBMS backing store is
as an idea. I don't care what format gets used as long as it isn't
binary (i.e. sqlite, mysql, db44, other such shit)
> Mbox formats are human readable, and file per issues makes it
> accessible. Throwing everything into one file (like mbox mail archive)
> or splitting everything into zillon files (file per message like
> maildir) requires additional techniques/tools just to find interesting
> issue.
when the spam comes in you're going to want a way to delete that. from
a tool-writing perspective that's probably easiest on maildir.
> This way you can also track interesting issues without subscribing to
> mailing list or using web interface.
So what? With a mail interface you can track interesting issues without
having to install Python and check out a mercurial repository.
> Right now best interfaces for issue trackers are search engines (e.g.
> Google "site:adress_of_bug_tracker interesting issue") and mail
> archives (Gmane and so on) in my opinion.
Note that 'hg repos' wasn't on the list you just provided. Mail
archives were.
debbugs is a bit overblown. As a systems administrator I've had the
profound displeasure of interacting with dozens of issue trackers over
the years; everything from RT to Trac to JIRA and on and on. The
problem is always the same: people want bug trackers to do too much.
All you really need is a good mail gateway and a decent way to browse.
A mailing list, with the archive accessible in source control of some
kind, sounds absolutely fantastic. All you really need as far as
metadata is a string for project name, a small enum for status (i.e.,
new, in-progress, fixed, rejected), and an index number. The Agile
programming idiots will tell you different, but anything more than that
list is a completely useless distraction.
I used to be partial to werq[1] (no relation to Uriel's werc), but that was
long ago and I might be remembering it more fondly than it deserved.
Best Practical started work on something called sd[2] which was backed by
their weird distributed db called Prophet. The backing store and
replication mechanisms were a little ridiculous, but at least it shows
that even Best Practical considers the bug-tracking problem unsolved...
and they've been working on RT since the dawn of time.
Received on Fri Jan 13 2012 - 19:17:13 CET
This archive was generated by hypermail 2.3.0 : Fri Jan 13 2012 - 19:24:04 CET |
global_05_local_5_shard_00002591_processed.jsonl/51076 | abstract class
A class that cannot be instantiated. Usually used to contain common predicates that are inherited by other classes.
abstract method
A method implementing an algorithm whose step corresponds to calls to methods defined in the descendants of the object (or category) containing it.
adapter file
A Prolog source file defining a minimal abstraction layer between the Logtalk compiler/runtime and a specific backend Prolog compiler.
A class or a parent prototype that contributes (via inheritance) to the definition of an object. For class-based hierarchies, the ancestors of an instance are its class(es) and all the superclasses of its class(es). For prototype-based hierarchies, the ancestors of a prototype are its parent(s) and the ancestors of its parent(s).
backend Prolog compiler
The Prolog compiler that is used to host and run Logtalk and that is called for compiling the intermediate Prolog code generated by the Logtalk compiler when compiling source files.
built-in method
A predefined method that can be called from within any object or category. I.e. built-in methods are built-in object and category predicates. Built-in methods cannot be redefined.
built-in predicate
A predefined predicate that can be called from anywhere. Built-in predicates can be redefined within objects and categories.
A set of predicates directives and clauses that can be (virtually) imported by any object. Categories support composing objects using fine-grained units of code reuse and also hot patching of existing objects. A category should be functionally-cohesive, defining a single functionality.
An object that specializes another object, interpreted as its superclass. Classes define the common predicates of a set of objects that instantiates it. An object can also be interpreted as a class when it instantiates itself.
closed-world assumption
The assumption that what cannot be proved true is false. Therefore, sending a message corresponding to a declared but not defined predicate, or calling a declared predicate with no clauses, fails. But messages or calls to undeclared predicates generate an error.
A callable term (i.e. an atom or a compound term) passed to a meta-predicate call where it is extended with additional arguments to form a goal called by the meta-predicate.
coinductive predicate
A predicate whose calls are proved using greatest fixed point semantics. Coinductive predicates allows reasoning about infinite rational entities such as cyclic terms and ω-automata.
complementing category
A category used for hot patching an existing object (or a set of objects).
A unique atom or compound term template identifying a library, tool, application, or application sub-system. Component names are notably used by the message printing and question asking mechanisms. Compound terms are used instead of atoms when parameterization is required.
A source file term that affects the interpretation of source code. Directives use the (:-)/1 prefix operator as functor.
doclet file
A source file whose main purpose is to generate documentation for e.g. a library or an application.
doclet object
An object specifying the steps necessary to (re)generate the API documentation for a project. See the doclet and lgtdoc tools for details.
dynamic binding
Runtime lookup of a predicate declaration and predicate definition to verify the validity of a message (or a super call) and find the predicate definition that will be used to answer the message (or the super call). Also known as late binding. See also static binding.
dynamic entity
See entity.
early binding
See static binding.
The hiding of an object implementation. This promotes software reuse by isolating the object clients from its implementation details. Encapsulation is enforced in Logtalk by using predicate scope directives.
Generic name for Logtalk compilation units: objects, categories, and protocols. Entities share a single namespace (i.e. entity identifiers must be unique) and can be static (the default) or dynamic. Static entities are defined in source files. Dynamic entities can be created and abolished at runtime using the language built-in predicates.
entity directive
A directive that affects how Logtalk entities (objects, categories, or protocols) are used or compiled.
The sending of a message to an object. An event can be expressed as an ordered tuple: (Event, Object, Message, Sender). Logtalk distinguish between the sending of a message — before event — and the return of control to the sender — after event.
expansion workflow
A sequence of term-expansion or goal-expansion steps where each step is usually defined using a hook object or a combination of hook objects.
grammar rule
An alternative notation for predicates used to parse or generate sentences on some language. This notation hides the arguments used to pass the sequences of tokens being processed, thus simplifying the representation of grammars. Grammar rules are represented using as functor the infix operator (-->)/2 instead of the (:-)/2 operator used with predicate clauses.
grammar rule non-terminal
A syntactic category of words or phrases. A non-terminal is identified by its non-terminal indicator, i.e. by its name and number of arguments using the notation Name//Arity.
grammar rule terminal
A word or basic symbol of a language.
hook object
An object, implementing the expanding built-in protocol, defining term- and goal-expansion predicates, used in the compilation of Logtalk or Prolog source files. A hook object can be specified using the hook flag. It can also be specified using a set_logtalk_flag/2 directive in the source files to be expanded.
hook predicate
A predicate, usually declared multifile, that allows the user to customize another predicate or provide alternative definitions for a default predicate definition.
hot patching
The act of fixing entity directives and predicates or adding new entity directives and predicates to loaded entities in a running application without requiring access to the entities source code or restarting the application.
Property of an entity that distinguishes it from every other entity. The identifier of an entity is its functor (i.e. its name and arity), which must be unique. Object and category identifiers can be atoms or compound terms. Protocol identities must be atoms. All Logtalk entities (objects, protocols, and categories) share the same namespace.
An entity inherits predicate directives and clauses from related entities. In the particular case of objects, when an object extends other object, we have prototype-based inheritance. When an object specializes or instantiates another object, we have class-based inheritance. See also public inheritance, protected inheritance, and private inheritance.
An object that instantiates one another object, interpreted as its class. An object may instantiate multiple objects (also known as multiple instantiation).
The process of creating a new class instance. In Logtalk, this does not necessarily imply dynamic creation of an object at runtime; an instance may also be defined as a static object in a source file.
See protocol.
lambda expression
A compound term that can be used in place of a goal or closure meta-argument and that abstracts a predicate definition by listing its variables and a callable term that implements the definition. Lambda expressions help avoiding the need of naming and defining auxiliary predicates.
lambda free variable
A variable that is global to a lambda expression. All used global variables must be explicitly listed in a lambda expression.
lambda parameter
A term (usually a variable or a non-ground compound term) that is local to a lambda expression. All lambda parameters must be explicitly enumerated in a lambda expression.
late binding
See dynamic binding.
A directory containing source files. See also library alias and library notation.
library alias
An atom that can be used as an alias for a library full path. Library aliases and their corresponding paths can be defined using the logtalk_library_path/2 predicate. See also library notation.
library notation
A compound term where the name is a library alias and the single argument is a source file relative path. Use of library notation simplifies compiling and loading source files and can make an application easily relocatable by defining an alias for the root directory of the application files.
loader file
A source file whose main purpose is to load a set of source files.
local predicate
A predicate that is defined in an object (or in a category) but that is not listed in a scope directive. These predicates behave like private predicates but are invisible to the reflection built-in methods. Local predicates are usually auxiliary predicates and only relevant to the entity where they are defined.
A query sent to an object. In logical terms, a message can be seen as a request for proof construction using an object database and the databases of related entities.
message lookup
Sending a message to an object requires a lookup for the predicate declaration, to check if the message is within the scope of the sender, and a lookup for the predicate definition that is going to be called to answer the message. Message lookup can occur at compile time or at runtime.
message to self
A message sent to the object that received the original message under processing. Messages to self require dynamic binding as the value of self is only know at runtime.
A predicate argument that is called as a goal, used as a closure to construct a goal that will be called, or that is handled in a way that requires awareness of the predicate calling context.
A program capable of running other programs written in the same language.
A predicate with one or more meta-arguments. For example, call/1-N and findall/3 are built-in meta-predicates.
The class of a class, when interpreted as an instance. Metaclass instances are themselves classes. Metaclasses are optional, except for the root class, and can be shared by several classes.
The predicate definition used to answer a message sent to an object. Logtalk supports both static binding and dynamic binding to find which method to run to answer a message.
A Prolog entity characterized by an identity and a set of predicate directives and clauses. Prolog modules are usually static although some Prolog systems allow the creation of dynamic modules at runtime. Prolog modules can be seen as prototypes.
Any object, implementing the monitoring built-in protocol, that is notified by the runtime when a spied event occurs. The spied events can be set by the monitor itself or by any other object.
multifile predicate
A predicate whose clauses can be defined in multiple entities and source files. The object or category holding the directive without an entity prefix qualifying the predicate holds the multifile predicate primary declaration, which consists of both a scope directive and a multifile/1 directive for the predicate.
An entity characterized by an identity and a set of predicate directives and clauses. Logtalk objects can be either static or dynamic. Logtalk objects can play the role of classes, instances, or prototypes. The role or roles an object plays are a function of its relations with other objects.
object database
The set of predicates locally defined inside an object.
An argument of a parametric object or a parametric category identifier. Parameters are logical variables implicitly shared by all the entity predicate clauses.
parameter variable
A variable used as parameter in a parametric object or a parametric category using the syntax _ParameterName_. Occurrences of parameter variables in entity clauses are implicitly unified with the corresponding entity parameters.
parametric category
See parametric entity.
parametric entity
An object or category whose identifier is a compound term possibly containing free variables that can be used to parameterize the entity predicates. Parameters are logical variables implicitly shared by all the entity clauses. Note that the identifier of a parametric entity is its functor, irrespective of the possible values of its arguments (e.g. foo(bar) and foo(baz) are different parameterizations of the same parametric entity, foo/1).
parametric object
See parametric entity.
parametric object proxy
A compound term (usually represented as a plain Prolog fact) with the same name and number of arguments as the identifier of a parametric object.
A prototype that is extended by another prototype.
Different objects (and categories) can provide different implementations of the same predicate. The predicate declaration can be inherited from a common ancestor, also known as subtype polymorphism. Logtalk implements single dispatch on the receiver of a message, which can be described as single-argument polymorphism. As message lookup only uses the predicate functor, multiple predicate implementations for different types of arguments are possible, also known as ad hoc polymorphism. Parametric objects and categories enable implementation of parametric polymorphism by using one of more parameters to pass object identifiers that can be used to parameterize generic predicate definitions.
Predicates describe what is true about the application domain. A predicate is identified by its predicate indicator, i.e. by its name and number of arguments using the notation Name/Arity. When predicates defined in objects or categories they are also referred to as methods.
predicate alias
An alternative functor (Name/Arity) for a predicate. Predicate aliases can be defined for any inherited predicate using the alias/2 directive and for predicates listed in uses/2 and use_module/2 directives. Predicate aliases can be used to solve inheritance conflicts and to improve code clarity by using alternative names that are more meaningful in the calling context.
predicate declaration
A predicate declaration is composed by a set of predicate directives, which must include ar least a scope directive.
predicate definition
The set of clauses for a predicate, contained in an object or category. Predicate definitions can be overriden or specialized in descendant entities.
predicate directive
A directive that specifies a predicate property that affects how predicates are called or compiled.
predicate scope container
The object that inherits a predicate declaration from an imported category or an implemented protocol.
predicate scope directive
A directive that declares a predicate by specifying its visibility as public, protected, or private.
predicate shorthand
A predicate alias that defines a call template, possibly using a different name, with a reduced number of arguments by hard-coding the value of the omitted arguments in the original call template. Predicate shorthands can be defined using uses/2 and use_module/2 directives. They can be used to simplify predicate calls and to ensure consistent call patterns when some of the arguments always use the same fixed values in the calling context.
primary predicate declaration
See multifile predicate.
private inheritance
All public and protected predicates are inherited as private predicates. See also public inheritance and protected inheritance.
private predicate
A predicate that can only be called from the object that contains its scope directive.
A program that collects data about other program performance.
protected inheritance
All public predicates are inherited as protected. No scope change for protected or private predicates. See also public inheritance and private inheritance.
protected predicate
A predicate that can only be called from the object containing its scope directive or from an object that inherits the predicate.
An entity that contains predicate declarations. A predicate is declared using a scope directive. It may be further specified by additional predicate directives. Protocols support the separation between interface and implementation, can be implemented by both objects and categories, and can be extended by other protocols. A protocol should be functionally-cohesive, specifying a single functionality. Also known as interface.
A self-describing object that may extend or be extended by other objects. An object with no instantiation or specialization relations with other objects is always interpreted as a prototype.
public inheritance
All inherited predicates maintain their declared scope. See also protected inheritance and private inheritance.
public predicate
A predicate that can be called from any object.
scratch directory
The directory used to save the intermediate Prolog files generated by the compiler when compiling source files.
The object that received the message under processing.
An object that sends a message to other object. When a message is sent from within a category, the sender is the object importing the category.
settings file
A source file, compiled and loaded automatically by default at Logtalk startup, mainly defining default values for compiler flags that override the defaults found on the backend Prolog compiler adapter files.
singleton method
A method defined in an instance itself. Singleton methods are supported in Logtalk and can also be found in other object-oriented programming languages.
source file
A text file defining Logtalk and/or Prolog code. Multiple Logtalk entities may be defined in a single source file. Plain Prolog code may be intermixed with Logtalk entity definitions. Depending on the used backend Prolog compiler, the text encoding may be specified using an encoding/1 directive as the first term in the first line in the file.
source file directive
A directive that affects how a source file is compiled.
A class is specialized by defining a new class that inherit its predicates and possibly add new ones.
static binding
Compile time lookup of a predicate declaration and predicate definition when compiling a message sending call (or a super call). Dynamic binding is used whenever static binding is not possible (e.g. due to the predicate being dynamic or due to lack of enough information at compilation time). Also known as early binding. See also dynamic binding.
static entity
See entity.
A predicate definition is steadfast when it still generates only correct answers when called with unexpected arguments (notably, bound output arguments). Typically, a predicate may not be steadfast when output argument unifications can occur before a cut in a predicate clause.
A class that is a specialization, direct or indirectly, of another class.
super call
Call of an inherited (or imported) predicate definition. Mainly used when redefining an inherited (or imported) predicate to call the overridden definition while making additional calls. Super calls preserve self and may require dynamic binding if the predicate is dynamic.
A class from which another class is a specialization (directly or indirectly via another class). A class may have multiple superclasses.
synchronized predicate
A synchronized predicate is protected by a mutex ensuring that, in a multi-threaded application, it can only be called by a single thread at a time.
template method
See abstract method.
tester file
A source file whose main purpose is to load and a run a set of unit tests.
The object that contains the predicate clause under execution. When the predicate clause is contained in a category, this is a reference to the object importing the category for which the predicate clause is being executed.
threaded engine
A computing thread running a goal whose solutions can be lazily and concurrently computed and retrieved. A threaded engine also supports a term queue that allows passing arbitrary terms to the engine. This queue can be used to pass e.g. data and new goals to the engine.
visible predicate
A predicate that is within scope, a locally defined predicate, a built-in method, a Logtalk built-in predicate, or a Prolog built-in predicate. |
global_05_local_5_shard_00002591_processed.jsonl/51090 | Mitt, the Mormons & Me | Cover Story | Salt Lake City | Salt Lake City Weekly
We need your help.
News » Cover Story
Mitt, the Mormons & Me
Chris Vanocur reflects on breaking a story that eventually would change history
Two events of note happen this month. One is a big deal: Mitt Romney will become the first Mormon presidential nominee of a major American political party. The other is significant only to me: This month marks my 30th anniversary in Utah. But these two August, or august, moments are not totally unrelated. They are forever connected by what happened nearly 14 years ago.
On Nov. 24, 1998, on KTVX 4’s 10 p.m. news, I held up a piece of paper and said, “This is a letter Salt Lake Olympic folks probably didn’t want us to get.”
Olympic Letter
Not that I knew it at the time, but this was how the biggest story of my career started. The letter detailed how more than $10,000 had been paid by the Salt Lake Olympic Committee to cover the college tuition of the daughter of an International Olympic Committee (IOC) member. IOC members, of course, are the ones who decide which cities get to host Olympic Games.
What followed is, by now, a familiar tale. A huge worldwide scandal ensued. Several investigations were launched, eventually revealing how more than $1 million of Salt Lake Olympic money had been directed toward IOC members and their relatives. This money was disbursed through scholarships, presents and cash. Numerous international and local Olympic officials were eventually expelled or resigned. This included Frank Joklik, the head of Salt Lake’s Olympic Committee, who was replaced in February 1999 by Mitt Romney.
But there are some things from this time that I have never shared. They’ve been carefully stored away in a special Olympic “vault” in my brain. After all these years, though, it might be time to crack open the door and let a little air and light into the vault.
Not long after the scandal broke, one of my top sources told me there were concerns at the very highest levels of The Church of Jesus Christ of Latter-day Saints about my Olympic reporting.
According to this source, the question being asked was, “Why couldn’t Vanocur have just kept the letter to himself?”
I’ve never confirmed that any leaders of the LDS Church actually said this. I am not sure I would have been able to. But the tip came from one of my best sources, and I have always believed it to be true.
I also suspected that if a church leader did ask this question, he wasn’t the only one in Utah to do so.
Let’s face it: There were probably a number of Utahns who weren’t happy with my Olympic reporting back then. This included one very angry viewer who sent an e-mail referring to me as a “shit face.”
This is why, for a long time, I haven’t talked about the story or the scandal. Nearly a decade and a half later, I still have some Olympic scar tissue. But with Romney’s nomination coinciding with my Utah anniversary, the timing seemed right to revisit this intersection of his life and mine.
An Evolution
Recently, I put together a special report for ABC4 News. It was about what it might mean to Mormons if Mitt Romney were elected president. Luckily, I knew exactly whom to interview.
KUED’s Ken Verdoia was a key contributor to the PBS documentary The Mormons. He is also an exceedingly clever man. One of Verdoia’s main themes, both in the documentary and in my interview, is how Mormons once were outsiders but now have a place in mainstream American life. Specifically, he speaks to how a member of a once-persecuted church now finds himself on the doorstep of the presidency.
In the interview, Verdoia told me, “It shows just how far not only has the church evolved in terms of its contribution to American society, but also how far this nation has evolved in putting away past prejudices.”
This struck me as a fascinating notion in and of itself. But it also seemed to eloquently sum up my own time in Utah.
After spending a summer during college working at Glacier National Park in Montana, I arrived in Utah in August 1982, very much in love with the West. However, because of my youth and naïveté, I also brought with me some of the stereotypical misconceptions of Mormons. These included a “gentile” fascination with the notions of polygamy, no caffeine and no premarital sex, and intently wondering who was/wasn’t abiding by LDS precepts. Predictably, in my early Utah struggles, I made every awkward mistake possible in my interactions with the church and its members.
But, after three decades here, I now know quite a bit more about Utah’s predominant religion. I have even learned to speak a little Mormon, though I remain far from fluent. Most importantly, though, I have also come to very much respect and admire the LDS faith and its people.
This is why I was so taken with Verdoia’s comment. When he talked about America evolving and putting away past prejudices, I thought about how I had evolved in my time in Utah. I also reflected on how I had been able to put away my own misunderstandings and misgivings. I, too, had once been an outsider here who finally found a place in mainstream Utah.
But, suddenly, my acceptance in Utah seemed threatened by the Olympic story. When I learned that the LDS Church leadership might be troubled by my breaking of the Olympic story, an odd thought occurred to me: I might not be able to stay in Utah. I remember how, after the story blew up, there was some talk that Salt Lake City might lose the 2002 Winter Games. Just imagine what it would have been like for me trying to live here if the Olympics had been forced to leave.
Well, ultimately, neither the games nor I moved. Still, I reasoned, it might be a good idea to try to reach some sort of post-scandal détente with the LDS Church.
Every few years, when I needed to find my footing with the church, I turned to some sage advice. It was given to me early on in my time here. One of my friends told me I couldn’t really understand Mormons without reading Harold Bloom.
I took this advice. I read Bloom when I was still a very green Utah reporter, and I returned to Bloom after the dust of the Olympic scandal had settled.
Bloom, a Yale professor, wrote a book called The American Religion. It forever changed how I viewed the LDS Church. In this revealing work, Bloom wrote about how the Mormons and their religion represent a “total system of belief and behavior.”
This made me realize I had made a mistake by initially looking at the LDS faith only as a religion. Bloom convinced me I needed to look not just at what Mormons believed spiritually, but also how they lived and behaved outside of church.
For me, this was the most telling thing that Bloom wrote: “… the Mormons, like the Jews before them, are a religion that became a people. That, I have come to understand, always was Joseph Smith’s pragmatic goal, for he had the genius to see that only by becoming a people could the Mormons survive.”
A people, like the Jews ...
These words gave me an inspired idea. |
global_05_local_5_shard_00002591_processed.jsonl/51098 | Around the World in Ten Songs
The ‘towns and cities abroad’ theme can be divided into two distinct parts: one, the songs which mention a foreign place (without necessarily transporting the scene to the place in question); and two, the songs which are actually set and filmed abroad but may not actually mention anything about the place. With Hindi cinema being relatively low budget in the earlier decades, films—even those that were mostly set abroad, like Dr Kotnis ki Amar Kahaani or the many ‘historical’ and mythological films set in the Middle East—were shot wholly in India. It was only in later years, especially in the 60s, that films began to have scenes set abroad and shot abroad. Singapore, An Evening in Paris, Night in London, Love in Tokyo, Aankhen, Around the World… suddenly, many of the big budget films were being shot abroad, sometimes even to the extent of almost the entire film (An Evening in Paris, Love in Tokyo) being set abroad.
Those songs—the ones shot abroad—merit a separate post, because so many of them (Akele-akele kahaan jaa rahe ho, O mere shahekhubaan, Raat ke humsafar, Aye meri zindagi tu ajnabi toh nahin, etc) have little to do with the place itself. In this list, I’m restricting myself to songs that actually name a city or town, whether or not the song itself is shot there. There are some overlaps, since some great songs about cities are set in the cities they talk about.
Without further ado, then. As always, these are all from pre-70s films that I’ve seen, and all mention a city or town (not country or province) that isn’t in India.
1. Mere piya gaye Rangoon (Patanga, 1949): To start with, right next door, in a neighbouring country. Rangoon (now Yangon), the capital of Burma, which was once part of the British Indian Empire (the two countries were separated in 1937). Although there have been several films featuring Burma (think Burma Road and Howrah Bridge), this delightful old song is the one I automatically connect with Rangoon. The city is evoked by some painted pagodas on the backdrop (not to mention some ‘Burmese’ women) for this stage performance, and the lungi-clad Gope, bemoaning his fate at being separated from his beloved wife, is a scream. Much fun.
2. Jeevan mein ek baar aana Singapore (Singapore, 1960): A little further east. Too many sites across the web cite Sangam (1964) as the first film to be shot abroad. Not so, because four years before Raj Kapoor made and acted in Sangam, younger brother Shammi Kapoor had acted in a film that wasn’t just named for a foreign city, but was filmed almost completely in Singapore, and starred a Singaporean actress (Maria Menado) as well.
Singapore had lots of good songs, including one (Rasa sayang re) which was a fairly faithful copy of a Malayan folk song. This one, though, which mentions the name of the city itself, is the one I’m choosing. Not that Jeevan mein ek baar aana Singapore is all about Singapore, but Maria Menado’s character uses the name of her home town—combined with some pretty gardens, some temples, and a bevy of sarong-clad beauties (not to mention some plaster monkeys which reminded me of modern Indian gardens)—to tempt Shammi Kapoor to come to Singapore. Not really needed, since he already is in the city, but still.
3. Jaapan, love in Tokyo (Love in Tokyo, 1966): Still in the east, but moving up north, to Japan. Love in Tokyo was one of those rare Hindi films of the 60s that was set almost completely in Japan, and it had several songs that were shot outdoors. If I were asked to pick my favourite of the ‘outdoor songs’ of this film, I’d choose the happy version of O mere shaahekhubaan, with Sayonara a close second. The title song is a little too boisterous for my taste and makes me wince: what would the Japanese have thought of a ‘romantic couple’ where the man dropped his girlfriend, or where they knocked over a passerby just because they weren’t looking where they were going?
But it does say a good bit about Tokyo: Yeh toh shahar mastaana, jiska andaaz maashukaana, deta hai pyaar ka paimaana, karta hai sabko deewaana (This city is carefree, its spirit is of a lover; its message is one of love, it intoxicates everyone).
And, before I go on to the next song, an instance of ‘misheard lyrics’: when my mother was a girl, she remembers one of the servants at their home lustily singing “Le gayi dil budhiya Jaapan ki”. Which says a lot about the women of Japan, if you think about it.
4. Chalo Honolulu (Sanam, 1951): And, after Japan, a sweep to right across the Pacific Ocean, landing in Hawaii (interestingly, one of the places where lots of Japanese immigrants to the US ended up). When I first began thinking of cities for this post, I was stumped when it came to American cities. Amreeka, dream of millions of wannabe Indian immigrants: surely there would be some songs there? But while parts of An Evening in Paris and Around the World (not to mention countless films in more recent years) are set in the US, there seem to be few (no?) songs mentioning American cities.
Then I remembered this one. It’s not set in Honolulu, it doesn’t even say much about Honolulu except that it’s a place refreshingly different from the oppressiveness of India, where love is so stifled—but it’s an utterly delightful song, nonetheless. The male voice (I don’t know who this is) and Shamshad Begum sing it with much pep, and the antics of Gope and Meena Kumari are so much fun.
5. Bade bhaiya laaye hain London se chhori (Ek Hi Raasta, 1956): Another leap across another ocean—this time, the Atlantic, the ‘pond’ that separates the Americas from Europe—and we land in a country which has appeared in Hindi cinema a fair bit: the UK. British colonialism, and the post-independence influx of Indian immigrants, make England a somewhat familiar locale: so while Purab aur Pachhim, Night in London and Pyaar ka Sapna were partially filmed in London, you had umpteen characters (invariably leads, both male and female) going off to England to study.
With the songs, I couldn’t think of many about London. There is the title song of Night in London, of course, and the (not pre-70s, unfortunately) London se aaya hoon from Vachan—and then there’s this song, which became a ear-worm for me the first time I heard it and which every now and then, keeps popping into my head and refusing to leave. It is, believe it or not, a children’s song, sung at a party by what are obviously very precocious children. London, besides its name, doesn’t figure here at all: it just happens to be the home town (one presumes) of the bride Bade bhaiya has got for himself.
6. Dekho dekho dekho dekho an evening in Paris (An Evening in Paris, 1967): A hop, skip and a jump across the Channel, and we arrive in France. In Paris, to be precise.
Like the title song of Love in Tokyo, the title song of An Evening in Paris does justice to the city in question: it’s not just a word , not just a name put into the lyrics to rhyme with something else. Instead, the city forms an important part of the song, both in its lyrics as well as in its picturization (not to mention the fact that the song is actually a credits song, so the introduction to the film is through this song). Shammi Kapoor’s as-ever exuberant hero offers to show us the sights of Paris at night—and he does. And, since Paris is pretty much synonymous with romance, there’s a lot of egging on to fall in love—don’t miss the opportunity; take your chance at love.
7. Ge ge le ge le zara Timbaktu (Jhumroo, 1961): There are other songs about cities in Europe—Spy in Rome’s ‘Roaming in Rome’ comes to mind—but let’s go on south, and to another continent: Africa. Indian cinema seems to not have had much to do with Africa except in rare films like Fearless Nadia’s Jungle Princess, or Taqdeer, or Chandni Chowk. Which does strike me as a little odd, considering so many Indians went to Africa in the 19th century, and even later.
Anyhow, here we are, in a city that’s almost mythical. Timbaktu, once believed to be an African El Dorado, its streets paved with gold. Timbaktu, the ‘City of 333 Saints’, a pilgrimage centre of extreme importance. And, a city with a name that rolls off the tongue so easily, it begs to be incorporated into a song—and here it is, teamed up incongruously with Kathmandu, neither city having anything to do with the song itself. Just a word to rhyme with something else.
8. Mombasa Mombasa (Sargam, 1950): Another song that mentions an African city (in this case the Kenyan coastal city of Mombasa), and the good thing here is that—while the song itself isn’t about Mombasa, at least the setting is somewhere on the East African coast. Our hero and heroine have washed up here after having been on a ship, and find themselves taken into an African tribe, along with sundry other fellow-passengers. Much happens in the course of this song (it is, in fact, one of those ‘climax songs’—the film’s main action near the end takes place while the singing is going on). Starting off as a song of despair, it acquires a different—and more upbeat—tone when Raj Kapoor’s character puts in an appearance.
9. Samarqand ke, Yarkand ke, Tashkent ke (Changez Khan, 1957): Moving on from Africa, up north and into Central Asia. With a song that covers not just one city, but three: Samarqand (in what is now Uzbekistan), Yarkand (Uighur Autonomous Region, China) and Tashkent (also Uzbekistan). The gifts of these cities, sing the two women, are bright, full of light. They go on to list all that may be found in these cities, all the stunning and delectable delights: bulbuls from Balkh, sandalwood from Greece, muslins from Hindustan, which promise to turn any woman into a hourie straight from Paradise… there are gifts from the Nile Valley; from Tehran and from the Sultan of Arabia, silks from China. But no, the woman they’re trying to tempt with all these beauties refuses; all she wants is her lover, the one she pines for.
10. Ek din Lahore ki thandi sadak (Sagaai, 1951): And, to end (after having done a complete circuit of the globe) we come back to the border. To a neighbour: Pakistan. In this hilarious song sung by a pair of soundly chastised ‘roadside Romeos’, a group of pretty girls strolling down a street on a cool evening in Lahore give back as good as they get—and with better effect. There’s nothing really about Lahore itself in this song (and it certainly isn’t picturized in that city, but on a stage, where a performance is being held), but it’s a delightful song nonetheless.
So that’s my list. Which songs would you add to this?
76 thoughts on “Around the World in Ten Songs
1. I had not heard the Honolulu song that you had listed above – and it was a fun watch – Meena Kumari is so young. I had not seen “Sanam”, so did not know she was in it as well.
But when I hear that city’s name, the song that immediately comes to my mind is this lovely O P Nayyar composition, sung by Asha.
And a song way after your selected time window is this Tamil song (there is a Hindi equivalent I believe, but this is the original). This one is bizarre because the song talks about Kilimanjaro, but it is completely shot in Machu Pichu in Peru. Apparently they shut down the whole place for a couple of days while they did the shooting. Must have been really annoying for tourists. Not to mention that there is a lot of political incorrectness in the song. But I like it a lot anyway :-)
• I hadn’t heard Honolulu before – it seems Hongkong was full of songs that spoke of places far and wide! Thank you for that. :-) Nice song, too.
Kilimanjaro endhiran doesn’t really qualify, does it? As far as I know, Kilimanjaro is a mountain, not a town or city. Or am I mistaken? Whatever; picturising a Kilimanjaro song in Machu Pichu is – well, bizarre, as you put it. Pretty much everything about the song is kinda weird, as far as picturization goes…
• While it does not qualify on the Kilimanjaro count (I checked – no such city/town/village in the region that I could find), it qualifies since it mentions Mohenjodaro. The only reason that is mentioned is cause it rhymes with Kilimanjaro – artificially inserted in there. Just adds to the bizarre-ness of the whole thing.
Now a couple of modern songs (past the timeframe of the ones you post)
Here is one that mentions London, Paris, New York, LA, San Francisco all in almost one breath. But you have to put up with watching SRK (I am totally not a fan, but I know there are many who are).
And since you were looking for a song with Baghdad in it – and this has some wonderful dancing by Madhuri Dixit – man she is light on her feet
Still ROTFL on the smurf comment. So perfectly apt. And sorry Madhu, I tried to listen to it without the visuals – still did not work for me – too shrieky. This was the phase when LP would get Lata to sing for Helen. Never got that. It just did not fit.
• I suppose these songs would qualify – if the city’s name was in the first line (which was one of my criteria). Dard-e-Disco is not something I want to see again! Ghagra and Yeh jawaani hai deewaani was better.
2. When you get more than you asked for…: D
Well, there is of course some Arc de Triomphe and other tourists’ spots footage in the opening titles of “An Evening in Paris”, but the street scenes with Shammi Kapoor, the girls and the awesome car were very obviously filmed in Hamburg.
Everything is so 1960s Germany – neon advertising, clothes, hairstyles etc.
• Wow. I had no idea that was shot in Hamburg. I’d been under the impression they’d stuck to Paris itself, since so much of the film is obviously shot in the city. But then they do try to pass off the Lebanese countryside as French, so I’m not really surprised. ;-)
3. Madhuji,
what a delightful post.
I had been following AK ji’s posts on Bharat darshan, and it was very interesting to read your post after that.
As usual the commentary on the songs is very entertaining and enjoyable.
I liked it a lot.
Thanks for a World Tour in 10 songs.
Right now can’t think of any song to add.
May be in coming days, I may come up with a song at least.
I hope I do get at least one.
4. And this one,
Chino Arab hamara from woh subah kabhi to aayegi
Oh, I shouldn’t have said so in my first comment about the songs. I thought of these two songs in just five minutes.
Sorry for these three comments which could have been only one.
5. And now I realize the post is about town and cities abroad and not foreign countries.
Sorry for my impatient and immature behavior.
The songs I mentioned obviously do not qualify.
6. What a wonderful idea for a theme post! Loved going through it and moreover I discovered three new songs, bade bhaiya laaye hain London se chhori, Samarqand ke, Yarkand ke, Tashkent ke and Mombasa, Mombasa. Thanks for that and the entertaining post.
I remember reading that the first Indian film to be shot abroad was shot in Egypt, but I don’t remember the name now. I think we discussed it some time back on fb.
Some songs for the list:
London, Paris ghoom ke dekhefrom Parivar (1967) in which the protagonist describe smore the sights of Delhi and compares them with his beloved’s looks.
Hong Kong, China-Mina,Singapore from Hong Kong (1962), where the words of the names of the cities are just mentioned for the purpose of rhyming, I think. Although she sings that she learnt to walk ‘matak-ke’ in Singapore.
It is particularly delightful to see Edwina dancing in the prelude so prominently.
The film Hongkong (1062) seems to have been very international in its song lyrics at least. It crosses three continents with its songs. Kenya, Uganda, Tanganiyka
The above song doesn’t fulfill the criteria of your list though. Sangeetbhakt has already mentioned the Honolulu song from the same film.
One song, which we discussed on fb was also mere saiyan ne bulaya from Dil Ka Heera (1979)
I would like to end my comment with the eternal city, which I have not visited for a long, long time now.
• Thank you, Harvey! I’m glad you liked this list. :-) I’ve completely forgotten about our discussion regarding the first Hindi film shot abroad – Egypt sounds like an interesting (and somewhat unexpected?) revelation.
The song from Parivaar had been on my longlist, but I hate that film with such a vengeance, I decided to skip it (and anyway, for London, Bade bhaiya laaye hain was my favourite). Hongkong Cheena-meena Singapore was on my mind (the first screenshot in my post is from that song), but couldn’t post it since I haven’t seen the film.
I like the other Hongkong song too, but you were being funny when you posted Rom-rom mein basnewaale, weren’t you? :-D
• According to some internet sources, Naaz (1954) was the first Indian film to be shot outside India’s borders (, viz., Egypt and England. I couldn’t find any videos of the film to verify it though.
Of course, the rom-rom me basnevale ram was posted in a lighter vein.
• Thank you for that Naaz information! Interesting. I will keep an eye out for it. Nalini Jaywant and Ashok Kumar – that’s good enough reason to want to watch it, as far as I am concerned.
I did think you couldn’t have been serious about the Rom-rom song. ;-)
7. Taking into consideration how close the bonds are between Afghanistan and India, I had thought, that there would be more songs on Kabul. Maybe there are more and I could find only these three.
Kabul se aaya hai mera dildar from Palay Khan (1986)
O gori Kabul aur Bukhara teri ek nazar from Khilaadi (1961)
With Bukhara, we have a new city for your list (it is mentioned already in the antara of the Changez Khan song). Usbekistan seems to be the only country to feature here with three cities.
Kabul ki main naar from Karodpati (1961)
• Oh, thank you! I had been looking for Kabul songs, since they seemed among the most likely (perhaps Baghdad, too?), but couldn’t come up with any. These were nice, especially the last one – it makes me really want to watch the picturization! Such a fun song. :-)
• Yes, considering we’ve even had films called Baghdad ka Jaadoo (which was pretty forgettable) and Thief of Baghdad – also one called Baghdad – I’d have thought songs about Baghdad would’ve been easy to find. But none that come to my mind, and none that have shown up yet in any of the searching I’ve done.
8. Good topic, but oh, so difficult. But still..
Where will you get London, Paris, Rome, Berlin, it even mentions Las Vegas (your American city :) ) – all in one horrible song? (Sharda and Mukesh – ’nuff said)
(Duniya ki sair kar lo from Around the World)
Another horrible, horrible song, I beg your forgiveness upfront.
London, again – Bade bhaiya laaye hai London se chori Ek Hi Rasta
China (like Mere piya gaye Rangoon, this one is also a stage song, or more accurately, a club song): Cheen se aaya chini baba from Mastana
• “all in one horrible song? (Sharda and Mukesh – ’nuff said)”
Nevertheless, I’m grateful to them, that they don’t go cavorting around making dance moves and in short, a fool of themselves. But on the other hand… ah…, lets leave it at that. One positive thing about the song is enough, complaining only makes me feel negative.
I am sure I had heard that song (totally involuntarily on my part) in India quite often and it had become some sort of an ear-worm, but I couldn’t remember any of the antaras. I am glad that my brain is good in shutting off bad memories. Thanks, brain!
As for Night in London song, I was totally ignorant of it and now when I heard it, I thought the chorus was going, “Berlin-London, Berlin-London, Berlin-London!”, but maybe I was just distracted by the smurf-like tights, the ladies were wearing.
I won’t comment on the other two songs, I will leave them for Madhu! Thanks for the entertaining two songs, dear Anu!
• Yes, that Night in London song is pretty bad, isn’t it? Not so awful if you only listen to it (which is what I’m doing right now) and don’t watch it. The colours and the general aesthetics (or lack of them) in the sets, the costumes – pretty much everything – make it more of an eyesore.
Around the World was such a ridiculous film. The one thing I liked there were some of Rajshree’s dresses; they suited her and were pretty chic. But the songs – oh, God.
Cheen se aaya was new to me! I liked it, a lot. Even if the geography seems a little wonky – Yokohama, last I heard of it, was in Japan, wasn’t it?
Bade bhaiya laaye hain London se chhori is on my list. :-)
9. Will a parody song fit here DO ? All the way to Zanzibar, the island of cloves and dhows.
Duniya Pagalon Ka Bazaar (Rafi and others) from Chacha Chowdhary 1953
Nothing to do with Zanzibar in the song but it sounds hilarious
• Yes, of course parody songs will do. This one was new to me (though the songs it parodies were mostly familiar). Fun song!
The Hindi cinema-referencing (with Nimmi, Suraiya and Nargis being mentioned) is interesting too…
10. Finally I got one song. let me post it.
Hawa Hawai from Mr India.
The opening sentences in the song mention Hongkong Honolulu Mombasa etc.
The song has of course nothing to do with them.
• I had forgotten that this song began with the names of all these cities! :-) Thank you for this. Honolulu and Mombasa seem to have been big favourites with lyricists, don’t they? Perhaps because of the somewhat alliterative nature of their names.
• I’d forgotten about this one, too! Even though I did see this film (and liked it). I’m guessing songs about foreign cities would be more common in more recent films, what with so many films being set – even if only in part – abroad.
11. Just a minor observation- you mentioned Yangon as being the new name for Rangoon. You are right, but it is no longer the capital of Myanmar. The new capital is Napdiywi or something similar, hard to remember, pronounce or spell. I am sure i got it wrong!
12. Madhu,
Nice post. At least three songs were new for me, and these are all so nice. With the readers’ additions, now most parts of the world are covered. Only Latin America is missing. Too far for our filmmakers? I heard that the dubbed version of our saas-bahu soaps are very popular in Brazil.
Thanks for mentioning my twin posts. As a matter of fact I had planned it as a trilogy. The third one – you guessed it – Around the world, I have scheduled it for tomorrow. Some songs are common, but I hope you would find it interesting.
• Oh, dear, AK. I had no idea you were planning to do an ‘international places’ songs post. If I’d known, I’d have postponed this one for later. :-( Sorry about that. I’m off to read your post too, and see which ones overlapped.
• Madhu,
Not at all. Had I known that you were planning one, I would have requested you to coincide it at the same time. I would have also requested our friend Anu to join the party and create some kind of blogging history – three posts on identical themes at the same time on three different blogs. :)
• We’ve actually done something of that sort, once – Anu, Bollyviewer and I did three related song lists – on nayan, aankhen and nazar (I think; I do recall that they were all about eyes) – a couple of years back or so. It was a lot of fun. :-)
13. Hi Madhu,
Sticking to your criteria of pre-70s songs, the first film coming to my mind was Aman (1967). Based on the atomic bombing, message of peace etc & primarily shot in Japan, it has the songs Aisuroo Aisuroo Mera Watan Japan (a sweet song and somewhat reminiscent of Sayonara Sayonara), and another one Barbad Hiroshima Ki Tasveer Dekh Lo, perhaps the only Hindi song dedicated to Hiroshima.
• I had forgotten all about Aman (I suppose because I didn’t really like that film – it was too preachy and just too depressing). And I’d forgotten all about its songs. Thank you, especially, for Barbaad Hiroshima ki tasveer dekh lo.
14. Believe it or not, I was wondering if you or Anu had done songs that mention Indian cities, that lead to thinking of foriegn countries or cities. So logged on to your site to check and lo and behold here is your post ! Thoroughly enjoyed the songs on your list. Some heard for the first time. I was wondering if the male voice in “chalo Honolulu “ is one of the md duo Husnlal or Bhagat Ram. Just a guess. I had not heard this song . Here is a popular one that mentions Singapore and Shanghai.
Babuji main cheen se aayi, chini jaisa dil laayi.
Singaapur ka joban mera, Shanghai ki angarai.
Mera naam chin chin chu from Howrah Bridge
• That is a coincidence indeed! Glad you enjoyed this post, Neeru.
I have no idea who that singer of Chalo Honolulu is, either – for a while I thought it might be C Ramachandra, but there doesn’t seem to be any evidence for that. So you may well be right.
Mera naam Chin Chin Choo was one song that occurred to me too, but the city names appear too far down the line, not in the first line (which was one of my criteria for this post).
15. New songs, not aware of them so much but yeah how about Baghdad (alas) to Delhi via Agra,
“Ghagra” song from the movie “yeh jawaani hai deewani 2013”.
If you listen the song you will notice, but there a part of song where the lyrics are:
“ TV pe breaking news haaye re mera ghagra haaye
Baghdad se leke Delhi via Agra “
• A cousin of mine had suggested it when I posted the link to this post on Facebook. I told him I should’ve thought of that myself, since it used to be a favourite song if mine when I was a toddler. ;-) But no, the mention of London comes very late in the song for it to qualify.
16. Interesting theme Madhu and some really bizarre songs like the Honolulu one that I had absolutely no clue about! I can’t think of too many other songs that haven’t already been mentioned. One song that might work in this context except “Lahore” comes a bit late in the song and one can argue that this setting was pre-partition so technically it’s not “Foreign” :)
Main Nikla Gaddi Leke… From Gadar
• Thank you, Ashish! (Incidentally, have you noticed? Gope actually has three songs to his credit in this list – all unintentional on my part, mind you).
The Gaddaar song might fit, but yes, Lahore is mentioned too far into the song. Plus, pre-partition, as you point out. :-)
17. hello,
i suddenly remembered one more song, an obvious one, if I come to think of now!
I don’t know how did I forget this one?
Badi Ranggen Hai Rangoon ki yeh sham from Aadhi Raat Ke Baad
my favourite Lata-Chitragut combo!
18. One more Kathmandu song.
chal chal re Kathamandu from Ram Bharose (1977)
In the very early 90s, on some private channel, I remember watching a clip on shooting of some Govinda film song. The song was,
Kathamandu, Kathamandu!
Kathamandu, Kathamandu!
dam bhar le pyar ka tu
bol bol ke Shiv Shambhu
I could never find this song again. Most probably the film was scraped and the music was never released
• harveypam spot on, indeed there is one song Kathmundu o mundu sung by Kumar Sanu from Zulm Ki Hukumat 1992 and the film was released, here is the song on YT
• Thank you, swarint, for digging up this song. I’m very happy to see this song. I’d searched for this song quite often on youtube to see how this song had shaped up, but never found it. Now I’d given up all hopes of finding it ever and you come up with and surprise me. Thank you! It is interesting. The music sounds very much like that of R. D. Burman.
Thanks again!
• My pleasure harveypam :), glad we have the internet where we can get answers to our questions esp when we scratch our head in vain and try to locate a song for example which we know does exist ! Indeed this peppy song could have easily passed on as a Panchamda creation, cheers :)
19. The month of Ramadan is going on .
Let’s take an opportunity 2 post a song on Madina in our “Around d world” series.
” Mubaraq ho tum sabko Haj ka mahina,
Na thi meri kismat ke dekhoon Madina ”
Coolie / 1983 / Anand Bakshi / Laxmikant – Pyarelal / Shabbir Kumar
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
global_05_local_5_shard_00002591_processed.jsonl/51103 | Deckard: some news
Hi everyone,
I made two changes to Deckard ( http://deckard.malizor.org ) that I
would like to share with you.
First, as Gil Forcada suggested, I implemented URL settings.
This is more understandable with an example.
A new PO file for Totem was uploaded yesterday for the Japanese
language: http://l10n.gnome.org/vertimus/totem/master/po/ja
The merged PO name (as displayed on the page) is
Now, just click on the following link:
(you don't have to add the "locale" parameter)
The PO file is automatically retrieved, as if you just uploaded it
manually. You just have to click "Display" :-)
In fact it works for all PO files available from
l10n.gnome.org/media/upload or l10n.gnome.org/media/upload-backup.
So, technically, links to Deckard can now be embedded on Damned lies (on
relevant module pages). It's not up to me to decide if it should be
implemented, but I think it would be useful.
Secondly, I made some (big) configurations changes on my server so that
users behind a firewall can now use Deckard (everything is now exposed
on port 80). However, if you are behind a proxy that filter websockets,
I'm afraid I can do nothing for you :-(
On top of that, I also added support for 8 new locales (more are yet to
come). Feel free to report a bug[1] if you think I might forget to add
yours ;-)
And that's it for now.
Feel free to share any question/suggestion and to dive into the code at
https://code.launchpad.net/deckard !
[1] https://bugs.launchpad.net/deckard
|
global_05_local_5_shard_00002591_processed.jsonl/51104 | GNOME Foundation Membership - Renewal accepted
Dear Applicant,
We are pleased to inform you that your GNOME Foundation Membership has
for election and to vote in the annual Board of Directors elections
held each November. If you were not already subscribed to the
low volume list and does not allow subscribers to post emails. If you
would like to read the archives you can do so here:
You are also encouraged to subscribe to the foundation-list mailing list.
any issues relating to the GNOME Foundation. This is the place for
you to suggest ideas and voice your opinions on issues pertaining to
the GNOME Foundation. To subscribe or read the archives, go to:
For more information about the GNOME Foundation, visit the GNOME
Foundation's web page at:
GNOME is a part of the GNU Project, and is a project to create a Free
Software desktop. For more info about Free Software and its
please visit
Thanks for your contributions to GNOME.
The GNOME Foundation Membership Committee
Eric Baudais <baudais kkpsi org>
Gael Chamoulaud <strider gnome org>
Sayamindu Dasgupta <sayamindu randomink org>
Gregory Leblanc <gleblanc linuxweasel com>
Vincent Untz <vincent vuntz net>
|
global_05_local_5_shard_00002591_processed.jsonl/51105 | =?ISO-8859-1?Q?Dieudonn=E9,?= Faurisson and Le Pen
Some comments about the recent post on the Zionist and obsessively anti-Arab, anti-Islam, The Brussels
Journal ( http://www.brusselsjournal.com/node/3716 ). In case the reader wants to see what is real, crazed
hate directed at an identifiable group and religion, I would advise him or her to spend some time on the
The Brussels Journal Web site; after seeing so much excrement, however, the reader will probably feel the
urge to take a long shower.
'''The comedian and professional anti-Semite Dieudonne M?Bala M?Bala (left), who is currently
performing at the Zenith Theatre in Paris, invited onto the stage to join him one Robert Faurisson, noted
French Holocaust denier. This happened while Jean-Marie Le Pen was in the audience.'''
If Dieudonne is a ''professional anti-Semite'' then you?re a professional anti-Arabist, Tiberge. You see,
several can play that game. Robert Faurisson is not a ''Holocaust denier'' (typical stupid name-calling in
the Zionist-controlled media); rather, he?s a revisionist (see the Faurisson archive in French here and
English here )
(As Robert Faurisson said: ''A reminder: Revisionists do not deny the genocide and the gas chambers.
That is a misconception. Galileo didn?t deny that the earth was stationary; he affirmed, at the conclusion of
the same way, the revisionists, after concluding their own research, affirm that there was no genocide and
no gas chambers, and that the ''final solution of the Jewish question'' consisted of the removal of the Jews
from Europe ? by emigration if possible, and by deportation if necessary.
The revisionists strive to establish what happend; they are positive, while the exterminationists doggedly
continue to tell us about things which didn?t happen: their work is negative.
The revisionists stand for the reconciliation of the antagonists in the recognition of what really happened.
''If this doesn?t bring the Front National to an end, nothing will. I would almost venture to guess that Le Pen
is doing this deliberately to sink his party so that no one, not even his daughter Marine, will ever take the
reins of what he must consider his own private possession.''
Here, the author (inadvertently?) gives a lot of power to French Jewry if merely being in the audience while
Robert Faurisson came on stage is enough ''to sink'' Jean-Marie Le Pen?s party. If this is not guilt by
association in its most totalitarian form I don?t know what is. It?s like saying that because one was in the
audience while Fidel Castro was given a medal that one must be a communist sympathizer. To my
knowledge, Jean-Marie Le Pen has never commented on Robert Faurisson or his revisionist work.
'' Such an event must be regarded in several different ways, simultaneously. First, Dieudonne derives
intense pleasure from throwing the sh.. on the fan. He has learned that Jew-hatred is a thriving industry, that
he attracts a public who calls him their hero, that he opens old wounds, and that, through the ruse of
claiming he has been denied his right of freedom of speech, he wins support among people who are
opposed to France?s laws against Holocaust denial.''
What chuzpah! It?s the Arab and Muslim communities that are the victims of constant harassment and
discrimination. The Brussels Journal proves it on a daily basis that Arab and Muslim hatred is ''a thriving
industry'' in France (and Belgium). Let?s compare the amount of hatred the Arab and Muslim communities
face in France to that allegedly faced by the government-protected French Jewry and its plethora of
institutions, movements, groups, lobbies, leagues, organizations, etc., etc., etc. And its direct access to the
highest spheres of French government and virtually total domination of French media and the
entertainment industry. Hell, one of their fellow members of the Tribe is the French president! Arabs and
Muslims can only dream of having this much power and influence! Further, is the author saying that the
Jews didn?t lobby to obtain this special law to protect the so-called Holocaust from free inquiry and
independent research and doubt? That they?re somehow the real victims of such a law? The poor
dears... they?re the ones going to jail and/or paying hefty fines....I forgot.... There?s no free speech insofar
as the
Holocaust is concerned. Where?s the ''ruse'', Tiberge, you lying sack of shit! Additionally, violent Jewish
organization operate with total impunity in France and elsewhere in the Jew-controlled West (see here and
here), while Muslims are under constant scrutiny.
''The trouble is: these laws are very much part of the problem. You cannot privilege one group by
mandating that it is a crime punishable by fines and prison terms to deny the evil that was done to them.''
Stop your crocodile tears, Tiberge! you don?t have a problem with the Gayssot-Fabius statute (see here),
what bothers you is that other minorities, taking their cues from French Jewry, also seek to legally protect
their version of history and status as victims from prying eyes!
''Such laws are no different from affirmative action laws, and laws against all forms of discrimination such
as those passed by the European Union. They create precisely the opposite of what they are supposed to
do, i.e., they create hatred of the privileged party, they throw together into the same pot various social
problems, ideas, and historical facts that should be kept separate and treated differently, because they
are different. For example, anti-Semitism and hostility towards massive immigration not the same thing.
They are not the same hostility. But the great equalizing machine that is Sarkozy?s government must make
ALL hostilities seem equally bad, because he is unable to make distinctions between them. To do so
would be to admit that the huge population of people who are not white, Christian and European are not
necessarily all equal. He must prove that they are, in fact, all equally, victims of the evil white Christian
Second, by having Le Pen in the audience, it is the ENTIRE patriotic movement, the entire effort to save
France that is discredited. Le Pen is not discredited -- he DOESNT CARE!!! There is no need to concern
ourselves with HIS image, but rather with the image and ultimate fate of the movement of which he claims to
be a part, but of which he is not (and apparently never has been) anything but an impostor.''
Right?Jean-Marie Le Pen lost an eye and almost his life (for example, the building where his Parisian
apartment was located was bombed here. The perpetrators have never been brought to justice in France.
Prior to that event, and following it, he?s been the victim of countless death threats and physical assaults)
defending the ethnic genetic interests of autocthonous French men and women. His entire adult life has
been but a long struggle against the immigration-invasion of France. A struggle that has cost him
dearly but ''he DOESN?T CARE'' according to Tiberge. Who are you, Tiberge, you keyboard warrior?
You?re unfit to shine his shoes. What have you done in comparison aside from fellating French Jews and
calumniating the Arab world? And you dare to call Jean-Marie Le Pen an ''impostor''? Fuck you, Tiberge!
''Third, this gives racist-hunters like Nicolas Sarkozy grist for their mill. Dedicated as he is to ridding
French soil of all racism, he and his ministers will point to Dieudonne?s provocation as a shameful,
inadmissible, unacceptable, act of racism that has no place in France. This will serve his purpose very well
and will furnish him with an infallible pretext for sending HALDE or MRAP or whatever anti-racist
organizations he chooses to track down every measly Holocaust denier he can ferret out.''
Cry me a river, Tiberge, you lying hypocrite! You mention HALDE and MRAP (you could mention many
more such organizations with a thoroughly kosher background), who founded these anti-French
organizations? Who funds them today? A hint: it wasn?t, and it isn?t, Arabs. It?s precisely those Jewish front
institutions (the French equivalent of SPLC and ADL) who maintain the immigrationist status quo in France
by threatening the income and social status of dissident whites and their organizations.
'' The media will have a field day pointing to the evils of the ''extreme Right'', due to Le Pen?s presence,
even though, according to the French blogger Francois Desouche anyway, Faurisson is a left-winger.
(Note: The websites regard Faurisson as a right-winger. According to Wikipedia, he claims to be
What Tiberge doesn?t seem to understand is that Robert Faurisson doens?t have a political agenda and
no discernable politics. He?s a fearless idealist and truth-seeker, no matter the personal and professional
consequences; and that?s something opportunists and paid calumniators like Tiberge can never
comprehend as they aren?t made of the same ''material.'' This is a man who has made, and continues to
make, tremendous personal sacrifices in the quaint pursuit of historical truth.
''The Jews of France will probably not understand the complexities of this situation, choosing to see only
the anti-Semitism of the ''extreme Right'', blind to the insidious way their history is being manipulated and
exploited for the purpose of intimidating, terrorizing, and mongrelizing the French people. Blind, too, to the
dangers they will confront if they don?t rethink their own instinctual reaction of identifying more closely with
non-assimilable immigrants than with French patriots, of preferring to side with the Left or with Sarko?s false
Right than with authentic nationalists and traditionalists. This is a problem they have, but they are certainly
not alone; and when one sees the ways in which the waters are muddied by celebrity policy-makers such
as Dieudonne, and public opinion formed by relentless government propaganda, not to mention the
inferior education being offered today, it is not surprising that things have reached this level of
Tiberge, like her cowardly and lying ilk, prefers to attack the symptoms rather the causes. Hey, Tiberge,
tell us who maniacally pressured for decades the French government in favor of open borders, greater
immigration, and multiculturalism/multiracialism, until Arabs and Africans started burning their synagogues?
Was it Saudi Arabia? Was it Iran? Was it Arabs or another group of Semites? Tell us, Tiberge! Who?
What the lobby did for Europe, it also did for America (see here). Nothing new under the sun.
The Jewish hostility towards western civilization is well-known and documented.
''This incident itself hopefully will pass quickly into oblivion, its principal actors as well, but the processes
described above will go on, until France gets a worthy leader, which will not be, as far as anyone can tell, in
the near future.''
Hopefully not. To the chagrin of the lying paid Zionist whore, the odds are that the event only signals an
increase in the scale of the slave revolt.
''Francois Desouche had to close comments for the post because of the legal considerations I alluded to.
Some of his readers must have defended Dieudonn??s right to express himself freely about the Holocaust.
However to post such comments places Desouche in a vulnerable position where his website could be
shut down for violating French laws. This is what I mean when I say these laws are not doing anybody,
except the ''thought police'', any good.''
Intellectual terror at its worse. Who?s responsible for this thought police, Tiberge?
''The post includes a video of Dieudonne on stage. French readers may have an easier time than I did
understanding it. There are various versions of the video all over the French blogosphere. This one is
more audible and shows the arrival of Faurisson on the stage as Dieudonn? energetically encourages the
audience to applaud. An aura of weird ritual emanates from the entire scene as this old man justifies
himself to an audience of primarily young people, most of whom (one assumes) have no idea who he is.
It?s all very creepy.''
So Tiberge?s worthless drivel concerns a video she?s unable to understand. You can rest assured,
Tiberge, that everyone in the audience knew who Robert Faurisson was. They didn?t need any
encouragement to applaud a brave freedom fighter when they saw one in front of them.
As an aside, and before pronouncing judgment on Robert Faurisson, tell us , Tiberge, which of his
revisionist writings have you read.I thought so
The Brussels Journal is part of the false opposition to the West?s predicament.
Lawrence Auster,
1300 Wilson Blvd, Ste 120
Arlington, VA 22209-2312
|
global_05_local_5_shard_00002591_processed.jsonl/51126 | Tour de France 2020: Stage 12 – Tribute to Pou-Pou
This next image from Stage 12 shows the race passing through the home town of the great favourite Raymond Poulidor, known as Pou-Pou, who sadly died in 2019. He was so close to winning the great race but never managed it, but he won the race to French hearts and was greatly loved by fans there. Merci Pou-Pou…
Tribute to Pou-Pou, watercolour, pen and ink by Maxine Dodd
Tribute to Pou-Pou
Have a good day today.. 🙂
Comments are closed.
%d bloggers like this: |
global_05_local_5_shard_00002591_processed.jsonl/51149 | Republic of Mania
From MicroWiki, the micronational encyclopædia
This is an old revision of this page, as edited by MicroBot (talk | contribs) at 16:31, 14 July 2019. It may differ significantly from the current revision.
Jump to: navigation, search
The Republic of Mania (Respubliko Mania) was declared independent by its only citizen, Manny Neira, on the 3rd of February 2006.
It's territory is defined as 'that part of the earth's surface closer to me than to anybody else at any given time', Neira claiming sovereignty over this region on the grounds of being its majority population, and in line with the principle recognised by such diverse authorities as F D Roosevelt, the UN Charter, and V I Lenin of "the right of peoples to self-determination".
Mania's politics
It's official language is Esperanto, though as the founder doesn't speak this language only the most important phrases have been translated into it, such as the country's name (Respubliko Mania) and motto (Cxiu homo estas nacio - Every human is a nation).
This motto reveals the real spirit behind the one-man Republic, which is to stand as a creative satire on 'the system of world apartheid known as states'. His personal site includes the national website of Mania, and an essay titled "Imagine..." presenting the argument for the abolition of states, and uncompromising internationalism, in plain form.
The Republic's website is quite extensive, and explains all the symbols of Mania's statehood: from its constitution, through its name, flag, anthem, and territory, to its currency (the 'eblo') and postal services, written in a richly illustrated mixture of humour and political argument.
Links with Ladonia
Also of interest to the micronationalist may be the website of the 'Ministry of Undisclosable Purpose', a part of the government of the huge micronation of Ladonia, created by artist Lars Vilks, and where Neira serves in cabinet. The ministry is a satire on the world's security and intelligence services in particular, and the encroachment on human rights done in the name of the 'war on terror' in general.
External links
Manny Neira's personal website: www.mannyneira.com
National website of the Mania: www.mannyneira.com/mania
Ministry of Undisclosable Purpose: www.mannyneira.com/ministry |
global_05_local_5_shard_00002591_processed.jsonl/51158 | What are shared accounts?
Shared accounts include email, Facebook and Twilio accounts shared with people in your organization as well as shared addresses listed in the Message sharing tab of your Organizations settings. Twitter accounts are billed separately and do not count as shared accounts.
Need more specific answers?
Visit our Help Center or check our FAQ . |
global_05_local_5_shard_00002591_processed.jsonl/51170 | I share my flat with two other people and am currently having issues properly modelling the account hierarchy for our use case. Our intention is mostly to have a good overview about who-paid-what and we do not need to generate any reports to tax offices, banks or something like that. However, we have agreed on a few constraints and I would like to have them represented in our accounts hierarchy:
• We have a collective bank account
• We pay our individual, monthly rents (that happen to be the same amount for everyone) into this account
• We pay the owner the monthly rent from this account, as well as our electricity and internet provider etc.
• If we decide we need something (e.g. most recently a printer) we also pay that from this account. For stuff like this our individual monthly payments are calculated with a small buffer in mind such that we usually have around 200 euros extra in our account.
• We share all our food and beverages
• We collect all the receipts when somebody buys something
• We want to be able to see whether someone is paying significantly more/less then the others
• We have a dog. However, he is owned by two of us and only those two pay the dog's expenses
• We want to keep the rent stuff separate from e.g. food
I set up the following account hierarchy which mostly does what we want:
Accounts view in Gnucash
Or, extracted to CSV:
ASSET,Accounts,Accounts,,Bank accounts & cash,,,EUR,CURRENCY,F,F,T
INCOME,Income:Rent,Rent,,"The rent the room mates pay each month",,,EUR,CURRENCY,F,F,F
EXPENSE,Expenses:Rent,Rent,,"rent including gas, internet, electricity etc.",,,EUR,CURRENCY,F,F,F
The main issue with this is that I don't know how I'ld separate the dog stuff (payed by Person1&2) from Expenses:Other and Expenses:Food (payed by all 3).
Does anyone have a good advice?
• Don't know if it's a dupe, but this might be helpful. – glibdud Jun 24 at 18:11
• I do not think so, but that might actually be due to me misunderstanding some of the financial concepts gnucash supports. I would love to see a slightly altered account hierarchy with two or three sample records for Dog and Food for example. – jhey Jun 25 at 11:41
You appear to have set up the accounts as representing the finances of the household, with the 3 people being contributors of money to the household. I think that is a good approach. Your accounts hierarchy already has separate Accounts Receivable accounts for each person for rent contributions. Since you want to keep rent contributions separate from other expenses, I would suggest that you set up similar accounts for each person to cover general expenses (food, internet, electricity, dog expenses, etc.). These accounts might be called ContributionsRequired/Person1, ContributionsRequired/Person2, ContributionsRequired/Person3 or something similar, and should be of type Asset.
When a bill is paid (for example, the electricity bill that should be a shared expense) you can show the payment initially by crediting Accounts/Bankaccount and debiting Expenses/Other by the amount of the bill payment. To show that contributions are now due by the 3 residents for this expense, you can add a Split transaction that credits Expenses/Other by the amount of the bill and debits each of the ContributionsRequired/PersonX accounts by one-third of the bill amount.
When a bill is paid for Dog expenses, follow the same process but this time the split transaction will debit only the ContributionsRequired accounts of the two dog owners.
If one of the residents buys groceries for the household using their own money, this should be recorded by debiting the Expenses/Food account and crediting the individual's ContributionsRequired account. That amount in the Expenses/Food account should then be transferred in equal amounts (one-third each) to each of the three ContributionsRequired/PersonX accounts.
When a person makes a deposit in the shared bank account, debit Accounts/Bankaccount and credit the relevant ContributionsRequired/PersonX account.
Each person should make sufficient payments to reduce their balance to zero in their ContributionsRequired/PersonX account. A high balance in a ContributionsRequired/PersonX account shows that person is not contributing their fair share towards expenses.
***** Side note on Rentaccounts.
Your account hierarchy seems to have the rent accounts for each person set up as Accounts Receivable types. Unless you want to issue a formal invoice to each person each month, my advice would be to not use the Accounts Receivable functions of GnuCash - it's a complication that's not necessary for a simple household model.
If it's not important to keep the rent contributions separate, you could use the same ContributionsRequired accounts to include rent owing as well.
You can also make decisions about whether you want to run your accounts on an accrual basis or use cash accounting.
| improve this answer | |
• This is very helpful. I will read up on accrual vs cash accounting and do exactly what you propose. Thanks! – jhey Jul 14 at 9:14
Your Answer
|
global_05_local_5_shard_00002591_processed.jsonl/51190 | 25th October, 2020
Boundaries – [some of] what you need to know!
Boundaries – [some of] what you need to know!
By Sarah Sherlock and Ruth Cannon BL
What is the one thing that you, unquestionably, have in common with your neighbour? Your mutual boundary. Therefore, it is important to note that any unilateral changes may result in an entirely unexpected but avoidable dispute.
In unsettling times such as those we presently find ourselves trying to navigate, with COVID not going away any time soon, some will seek the solitude of their garden to unwind. Understandably so. Others will seek to use the time to catch up on some domestic matters. None too surprisingly, others will go all out and launch into replacing the odd fence with a new wall to “spruce-up” the previously neglected patch at the end of the garden that has not been attended to for years.
Before embarking on any “boundary work” it is wise to consider who owns what and what are the likely outcomes of doing anything to the boundary without engaging with your neighbour first!
A boundary is something that shows where an area ends, and another area begins, or indeed the limit of an area where two things become different.
When referring to real property, things are further complicated because there are, of course, two boundaries to consider. The legal, which is an imaginary line of no thickness separating two properties. The other is the physical and, must have some degree of thickness e.g. block wall, fence, etc.…
Just as there are two boundaries to consider, there are of course, two separate but inextricably linked requirements to establish certain specifics that many often trivialise and/or forget to consider.
1. What exactly is the legal boundary?
2. What exactly is the physical boundary?
Both questions are in-fact best investigated by different professionals, the legal by your legal adviser and the physical boundary by a land or geomatics surveyor.
Legal boundaries …
Many boundary disputes are based on the mistaken premise that the boundary is as defined on Land Registry Folio maps. Although most land in Ireland is registered land, and the Land Register kept by the Property Registration Authority (PRA) provides great assistance in establishing ownership of, and rights over, registered land, it is of little assistance in relation to determining exact boundaries. This is because the Registration of Title Act 1964, governing registered land, specifically states that boundaries as shown on Land Registry maps should not be treated as conclusive. In practice, there is little knowledge of this statement, or understanding of its implications.
What it means in practice is that Land Registry boundaries are of little or no help in resolving boundary disputes, the legal issues in relation to which are exactly the same, irrespective of whether the property is registered or unregistered.
What needs to be looked at instead are two things:
(i) the legal or paper title boundary, as set out in title documents other than the Land Registry Folio
(ii) the physical boundary.
The documents which need to be looked at in determining boundaries are prior title deeds relating to the land. In the case of unregistered land, proof of title is always by reference to such deeds. With luck, the deeds will contain a proper map setting out clear dimensions. This is regrettably not always the case. As regards registered land, where transfer is usually by reference to a Folio number, what needs to be looked at are the title documents.
Often, because of poor mapping, it is not possible to identify a clear paper title boundary. Furthermore, even where a clear paper title boundary can be identified in earlier title deeds, it cannot be assumed that this represents the current boundary. This is because of Section 13 of the Statute of Limitations 1957, which provides that paper title to land is extinguished where a third party has been in adverse possession of that land for 12 years or more (30 years or more where the paper title owner is the state). The consequence of this provision in the context of boundary disputes is a significant one. It effectively means that, if a physical boundary has been in place for the previous 12 years, this will supersede any previous paper title boundary. There are exceptions to this e.g. where permission has been granted by the paper title owner to temporarily vary the boundary or where the physical boundary variation has been effected as a result of a fraud, but they are few and far between.
If the biggest error giving rise to boundary disputes is the belief that Land Registry boundaries have legal effect, the second-biggest error is the belief that boundaries as shown on title deeds permanently remain conclusive. Although initially determinative of boundaries (assuming of course that they are sufficiently clearly defined in the title deeds) there is no guarantee that they will remain so.
Any court dealing with a boundary dispute will want to know two things. Firstly, to the extent that it is ascertainable, what is the paper title boundary? Secondly, what is the current physical boundary, and how long has it been in place? If the current physical boundary has been in place for more than 12 years, any finding a court makes on the paper title boundary will most probably be moot, made only for the purpose of pointing out that this boundary, while operative at one point, no longer applies. Nonetheless, it is important, even where there has been a clear physical boundary in place for over 12 years, that efforts be made to identify the preceding paper title boundary, so that a court can reach a determination in full knowledge of all relevant information. If this is not done, a court may quite possibly adjourn the case to obtain further information about the paper title, with a resulting increase in costs for the client. It is therefore important to be prepared on this matter in advance.
The importance of historical physical boundaries cannot be overestimated. It is extremely important that a surveyor retained in boundary disputes not merely examines the current boundary, but also makes efforts (insofar as possible) to identify the historical physical boundary. This may require recourse to physical evidence on the ground, old photographs, old OS maps, Valuation Office maps and aerial photographs, as well as title deed maps. If the current physical boundary can be shown to have been in place for more than 12 years, it is not usually necessary for the historical examination of the physical boundary to go back further. Exceptions might be if the adjoining property was held under a short-term lease, by a minor, or by someone of unsound mind, at any point during the 12-year period. If the current physical boundary has not been in place for more than 12 years, and maps on title deeds are inconclusive, it may be necessary to carry out a much more detailed historical investigation. This can be costly, time consuming, and ultimately fail to produce any definitive result. In such a case, mediation is the obvious solution. Unfortunately, convincing emotionally involved parties that their boundary dispute is not necessarily capable of a definitive resolution by a court, can be a difficult one!
Physical boundaries …
Unlike the legal and paper boundaries, save where none exist, physical boundaries tend to be tangible items on the ground and therefore, are capable of being measured and recorded. Settled boundaries is another name commonly used to describe the physical boundaries, although it is fair to say that some are more “settled” than others.
The surveyors who generally tend to measure and record boundaries are frequently referred to as land1 or geomatics surveyors. Many may feel that a quick “look” to confirm the boundaries are “okay” is the extent of a boundary survey – that is not so and do not fall foul in believing that it is, for it certainly is not.
To properly measure, record and confirm the boundaries pertaining to a property, you will require a ground truth survey (GTS). A GTS is a survey completed using specialist survey equipment, to a specified scale and usually in either a local or defined coordinate2 system. The SCSI/RICS have a detailed survey detail accuracy band table, which specifies a range of different scales depending on the type of survey. Boundaries tend to fall anywhere between 1:50 (Band D) for determined boundaries to c 1:500 (Band G) for more generalised work, with 1:100 (Band E) being a typical output for most. The OSi maps, commonly used in conveyancing, are typically 1:1000 urban and 1:2500 rural and devoid of the inner detail that the GTS will have captured, which is what is required when a boundary issue arises!
Assumptions around geo-spatial accuracy and or consistency must not be made – accuracies and scale must be stated, together with the date on which the measurement took place. For example, master planning drawings may be done at a scale (e.g. 1:2500 or Band I) that is inconsistent and incompatible with a survey for a conclusive boundary at (e.g. 1:50 or Band D), yet neither are wrong; they are both suitable but suitable for different purposes. If you have a topographical survey at a scale of 1:500, you will need the property remeasured at the appropriate scale if two neighbours wish to settle on a precise and accurate boundary to say, +/-25mm.
The features observed during a GTS can be a little invasive, yes, the hedgerow will be investigated to see if there is a wall situate behind it or perhaps the presence of a fence running throughout it. They all matter and are useful to the surveyor when trying to piece together the plot and how it evolved with the passage of time. It is unusual for a property to remain unchanged and sometimes these changes hold all the clues.
Of course, the surveyor’s job is significantly less complicated if the property owner can assist in answering any number of questions that the surveyor will have, which may seem very curious at times, e.g. “the wall looks different to the other three sides, why is that? Yes, that house was built first and when we purchased our plot, we didn’t need to build a wall on that side!”
After the GTS, the surveyor will then prepare a GTS Plan, which looks like a detailed map of the property, at the time of survey. Of course, this alone is of little use as it needs to consider the relevant Title information too. It may be necessary to examine the GTS Plan against other information too e.g. planning, neighbourly agreements, etc.… When examining it against the Folio File Plan, unless it is a conclusive registration it is entirely normal and indeed okay should it not “exactly” align3. Only when you have all the above done can you, or should you, consider informing your neighbour as to where the “exact” mutual boundary is situated!
1 In-fact, the PRA Mapping Guidelines recommend “Maps submitted for registration be prepared and certified by competent Land Surveyors”. Mapping Guidelines – Appendix 1- 2.2 (b).
https://www.prai.ie/download/information/mapping_guidelines/Appendix_1_-_Basic_Requirements_for_acceptance_of_maps_in_Land_Registry(2).pdf Accessed 15.08.2020
2 ITM is the national coordinate system in use in Ireland. It is a GPS compatible mapping system and minimises distortions associate
3 https://www.osi.ie/about/key-documents/joint-statement-of-osi-and-pra/ Accessed 15.08.2020
https://www.osi.ie/about/osi-positional-accuracy/ Accessed 15.08.2020 |
global_05_local_5_shard_00002591_processed.jsonl/51197 | Socialism: The Scourge of America
scourge: a whip used to inflict punishment.
sceptre: a scion, i.e. (lit.) a stick for punishing.
The Holy Bible provides us with a record of our governmental, religious, and spiritual history. God’s word is the same yesterday, today, and forever. So we can see where we are headed by where we have been.
Let’s start with our governmental history, going back to the point at which we departed from God’s word, which is revealed to us through the children of Israel (called the chosen people because they were chosen out of all the nations of the world to represent us, the people). They are being led by Samuel meaning heard of God, who had a direct communication with God. But the children of Israel wanted to be like the other nations, choosing to have a king rule over them instead of God’s word, which spoke through the mouth of Samuel, who describes the burdensome manner in which this king would rule. But they demanded it. So they were given Saul, which means to demand. How Saul rules the people (1 Samuel 8:6-20) shows us not only how religion rules its people, but how the government (under socialism) will rule its people, the two being of one, symbolized by the iron mixed with the clay in the book of Daniel.
Religion requires the people to pay 10% of their income to the Church.
Government will require the people to pay 70% or greater under Socialism.
What is giving power to these self-serving entities is laziness and greed. The people of religion are too lazy to judge themselves, through which they would obtain spiritual freedom, while the proponents of socialism want something for free, which they do not deserve as they have not worked for it, the definition of greed— a rapacious desire for more than one needs or deserves. Rapacious: taking things by force; plundering (looting).
God’s Word teaches us that we are to enjoy the fruits of our own labor, not someone else’s labor. Socialism stands directly opposed to God’s Word. So does the Christian religion, which teaches that someone else (Jesus) carries the burden of our labor.
It is not only man’s greed and laziness that is giving power to Socialism. It is the demand for equality: the state or quality of being equal. But in the end (as the history of Socialism teaches us) the people are not made equally rich, but equally poor. Only the institutions (political and religious) and those that run them are made rich.
Fast forward a thousand years from the time of Saul, where once again the descendants of the children of Israel (Jews) reject the word of God spoken through Jesus. Christians (Gentiles) followed suit, rejecting the teachings of Jesus, buying into the teachings of yet another Saul (Paul), whose doctrine of lies has created spiritual laziness and greed in the so-called believer. The name might have changed, but the spirit has not. It’s the same damned spirit we see at work today in those that are physically lazy and greedy.
The kingdom was rent from Saul and given unto David. Two very different kings. Two very different spirits. Two very different teachings. Paul taught that salvation is a gift, not something you have to work for. Jesus taught that salvation is received through works by way of the gift; by the spiritual power through which the spiritual works are accomplished. We all have the ability and right to use this spiritual power, which is the most important equality of all— spiritual equality. This spiritual power is the spiritual ointment that David spoke of, which will bring unity among the brethren (Psalms 133). Socialism does just the opposite, creating division among the brethren in order to obtain its objective, which is total control over the people. Divide and Conquer. Socialism is luring the people in by offering them salvation without them having to work for it, which is directly opposed to the Word of God.
The word salvation means help. The word saved means deliver, protect, heal, save (self), be (make) whole. We are to save ourselves, not look to someone else to save us, which will only end up enslaving us. Salvation requires works on the part of the one obtaining it. America must now do what it takes to save itself from Socialism, which is using Race to divide us, and Reparations to ensure its success. Reparations is compensation in money or materials given to one nation for damages caused by another nation through its hostilities, which (in this case) is SLAVERY, an outward expression of an inward condition, illustrated for us in the Old Testament (some 3500 years ago) when the fair-skinned children of Israel were enslaved by the dark-skinned Egyptians for 390 years, nearly the same amount of time blacks were enslaved by the whites in America. Reparations appeal to the GREED in the heart of man. The Spirit of God (through the mouth of the Red Man) tells us it is the sickness of man’s heart, and is responsible for the imbalance in the earth. An evil (negative and destructive energy) that is manifesting itself in the form of bigger and more powerful storms and earthquakes. The Word of God tells us that GREED is the root of all evil— “the love of money is the root of all evil.” As the root gives life to the plant, greed gives life to the evil. Jesus said, ” Every plant, which my heavenly Father hath not planted, shall be rooted up.” Socialism, the ideals of which stand in opposition to God’s Word, the principles of which America was founded upon, is a plant we must pluck out! Socialism is the scourge of America; a whip used to inflict punishment, under which we will all be treated as SLAVES.
” The word sceptre means a scion, i.e. (lit.) a stick for punishing. As long as we remain under the spirit of Judah we remain under its punishment, which is manifesting itself in the form of terrorism and oppression. The feet symbolize the age of Pisces, synonymous with the era of Isaac, and with the reign of Judah. We have left this era chronologically, but we will remain under its tyranny until we drive the impurities out of our heart, through which we bring in Shiloh, meaning to be tranquil, secure, successful, be happy, prosper, be in safety. Those that reach this state will have entered the ark of the covenant, the ark of safety, abiding in God’s protection, safe from the flood of evilness that is quickly rising upon the earth— and upon the heart.” -THE BIBLE DECODED
Written by Sandra L. Butler (Copyright © 2019)
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_05_local_5_shard_00002591_processed.jsonl/51198 | Where Does It Go?
How often do you consider what happens to your trash after you throw it away? For most people, the answer is probably never. That is how we, as Americans, have been trained to behave regarding our waste. We use the item until it no longer serves a purpose, then we throw it in the nearest trash can and never give it a second thought. That’s what I thought about as I carried the empty Snickers wrapper I received in class in my coat pocket. Sure, I could throw it away, but then where would it go? Into a landfill to sit there for thousands of years? Or, say the wrapper somehow fell out of the trash can and was picked up by the wind. It could be carried all the way to the ocean, where a fish might eat it. While one single wrapper may not seem like a big problem, billions of people throw things away every day. On that large of a scale, the abundance of waste humans produce begins to become a wicked problem.
As I think about the characteristics of wicked problems (vague definition, undefined solutions, no endpoint, irreversible, unique, and urgent), it becomes more apparent just how many there are facing the world today. One that I hadn’t even thought of until this class is the exponential growth of the human population. As pointed out in The 11th Hour, for most of human history less than 1 billion people lived on the planet, today there are approximately 7.5 billion. Not only are there even more people using the Earth’s resources than there used to be, but we also use more resources per person as well. This wicked problem reminds me of the people of Easter Island. When they arrived, there were only a few of them, but as the years went by, their population grew until the island could no longer support them, and the people turned to barbaric behavior and cannibalism. The growth of the population doesn’t only present an environmental problem, but an ethical one. How can you reduce the consumption of nonrenewable resources without affecting people who rely on those resources to survive?
Where these wicked problems begin is in our own self-narratives and our cultural paradigm. If the over-arching paradigm tells us that there is nothing we can do to help repair or at least slow the progression of wicked problems, then our self-narratives will reflect a similar view. This mindset can leave people feeling paralyzed as though the world is going to hell in a handbasket and there’s nothing they can do to stop it. An even more dangerous paradigm, though, is when we as a society behave as though the things we are doing to the planet have no consequences, or that the consequences aren’t even real. The inhabitants of Easter Island ignored what was happening to the island around them and instead turned their focus to cultural and religious experiences and competing with other groups. Similarly, leaders in our country and around the world are focusing on their religion, the economy and consumerism. They are focusing on competition with other political groups, and they are ignoring what is happening to our planet. And as we get caught up in precisely the ideas and paradigms they want us to, all of us are missing what is happening right before our eyes. The only hope we have of solving these wicked problems is if our society experiences a paradigm shift. For that to happen, each of us must examine our own self-narratives and choose to be a force for change in the world.
I see the world we are living is becoming more and more like the one portrayed in the Disney movie Wall-E. If it was possible, I have no doubts that people today would choose to do what the people in Wall-E did and simply flee the planet. Like the people on Easter Island had no way to leave, we too must stay. But even if we could leave, we have a responsibility to try to fix the problems we have created, or at the very least do some damage control. It is our responsibility to make sure the earth is taken care of, for ourselves and for those who come after us. By poisoning our environment, we are poisoning ourselves and our future descendants.
I think it is important that we as individuals do what we can. Even if it seems small and inconsequential. The carbon footprint assessment on the EPA website gives several examples of things you can change in your life to significantly reduce your CO2 emissions. Even doing things like reusing what we can, or “thrifting” as Andrew Dent called it, can make a larger impact than we notice. Not only that, but when you make changes to your lifestyle, your friends notice. Encouraging friends and family to also do what they can make a larger difference than just one person. Soon, your friends will tell their friends who will, in turn, spread it even further. This is how we begin a paradigm shift.
I still have that Snickers wrapper inside my coat pocket. I do not know where it will go or the impact it will have when I finally decide to throw it away. Until then, it will go where ever I go.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
global_05_local_5_shard_00002591_processed.jsonl/51210 | Solid ExplorerSolid ExplorerBetter, stronger, prettier
Material Design
Featuring Google's unified design language making everything intuitive and beautiful
Cloud Explorer
Manage your files wherever they are and wherever you are
Rich customization
Adjust the interface to your taste with many icon sets and color schemes.
Why is it special?
Look what this file manager has to offer
Tablet Reflection
• device-2015-06-12-094134
• device-2015-06-12-093745
• device-2015-06-10-131150
• device-2015-06-10-132049
• device-2015-06-10-125124
• device-2015-06-10-130024
• device-2015-06-10-131305
• device-2015-06-10-131939
Why is it special?
Look what this file manager has to offer
Increased productivity
Make your life easier with dual pane file management. Browse multiple locations at once and transfer your files seamlessly. Copy move files with drag and drop gestures spiced with eye catchy animations.
Many cloud providers
Enjoy the ability to manage files stored by most popular cloud providers, such as Dropbox, Google Drive, OneDrive, Mega and more. Thanks to Solid Explorer you don't need to install separate app for each service!
Rich customization
Easily customize the application appearance to fit your style. Choose from many color schemes and icon sets designed with care for details. Change the apperaance of file lists and resize them with a pinch gesture.
Limitless capabilities
Solid Explorer can be even more powerful thanks to the extensions available to download from the Play Store. You can install even more cloud clients, file tools, icon sets and many more. Imagination is the limit.
Other useful features
Root explorer
Tired of ugly root explorers? Solid Explorer will also assist you in system level operations, such as changing permissions, editing configuration files and more.
See more
Powerful archiver
Solid Explorer can create encrypted Zip and 7Zip archives and extract encrypted Zip, 7Zip, RAR, TAR.GZ and TAR.BZ2 archives. Splitted archives are also supported.
See more
Chromecast streaming
Play your media from any location and watch it on your TV thanks to the Chromecast integration. You can stream from your PC or any cloud service.
See more
Your files in order
Solid Explorer will categorize all the files on your device for easy access in one place. Your photos, videos, music and apps will be automatically groupped into four categories.
See more
Have a look at some recent posts
Usage basics for dummies
If you’re new to Solid Explorer have a look …
Searching for files
Solid Explorer lets you easily find any kind of …
Tips and tricks
Here is the list of things you probably didn’t …
Root access in Solid Explorer
If you’re reading this post you probably don’t need …
Chromecast streaming
Solid Explorer lets you cast your media files to … |
global_05_local_5_shard_00002591_processed.jsonl/51217 | Exclusive: Eyewitness To Tyrannical Texas Sheriff Speaks Out
You are living under a police Dictatorship.
Land of the free and home of the brave my ass!
Land of the sheep and home of the slave!
But some of the folks are getting surly at “government’ for all the stupid senseless destruction of the economy, the family business and the family farm.
Get enough of them pissed off, they might take their Land back.
The Ole Dog! |
global_05_local_5_shard_00002591_processed.jsonl/51233 | Main Content
Install and Configure MATLAB Parallel Server for MATLAB Job Scheduler and Online Licensing
If you do not have an existing scheduler in your cluster, follow these instructions to integrate the MATLAB® Job Scheduler, which is provided with MATLAB Parallel Server™. If you already have a cluster with a scheduler, see Install and Configure MATLAB Parallel Server for Third-Party Schedulers.
These instructions guide you through the following tasks:
After you integrate MATLAB with a scheduler, you can access workers in your cluster from a desktop MATLAB client session (requires Parallel Computing Toolbox™). Workers are MATLAB computational engines that typically correspond to a core.
The setup in these steps uses online licensing.
Check License Type and Users
Check License Type
If you have a campus-wide license for MATLAB Parallel Server, then you already have access to online licensing and can skip to Add Licensed End Users. If you are unsure about your license details, then contact the license administrator.
To install MATLAB Parallel Server using online licensing, you must check your license type.
1. In your browser, go to License Center and log in with your MathWorks® Administrator Account.
2. Select the MATLAB Parallel Server license that you plan to use.
3. On the Install and Activate tab, look for License Manager: followed by the license manager type currently assigned to this license.
• If the license manager is already the one you want, then you do not need to do anything. Go to Add Licensed End Users.
• To change the license manager, click the pencil icon and follow the onscreen instructions. When you have finished, go to Add Licensed End Users.
Add Licensed End Users
With online licensing, any user of MATLAB Parallel Server must be added as a licensed end user. To add licensed end users, you must be a license administrator. If you are not a license administrator, provide a list of required licensed end users to the license administrator along with the following steps. If you are a license administrator, follow these steps.
1. If you are not already logged in as an administrator, go to License Center and log in with your MathWorks Administrator Account.
2. Select your MATLAB Parallel Server license, and then click Manage Users.
3. Click Add User to add a user to the list.
4. Provide the user’s email address, first and last names, and country. Click Add User. Note that if the specified email address does not correspond to an existing MathWorks Account, a new account is created for that user.
5. Add end users as necessary.
Get the Installation Files
If you are not a license administrator, you can download the Internet-based installer. For more information, see Install Products Using Internet Connection. Note that this method performs a full download of the necessary files per compute node that you are setting up.
To save time and eliminate the need to run the installer-based download process on each computer in your cluster, download the installation files prior to installation. Doing so facilitates installation in a large number of machines. If you have access to an Administrator’s account for your license, you can use the installer to download files without installing them. If not, contact the administrator of your license to obtain a copy of the installation files. For more information, see Download Products Without Installing. Alternatively, proceed with the Internet-based installer. When you download the files using the installer, you must:
• Select the operating system for the cluster machines.
• Select all products for download. MATLAB Parallel Server cannot run jobs requiring products that are not installed.
MATLAB Parallel Server has two server-side components:
Install Software on All Nodes
To install the software on each computer in your cluster, follow these steps:
1. Start the MATLAB installer from the installation files downloaded in Get the Installation Files.
2. Select Log in with a MathWorks Account and follow the prompts.
3. Select all products that the end users will use, and exclude the license manager.
4. After the installation completes, update the mjs_def file in matlabroot/toolbox/parallel/bin. Uncomment and set:
• Unix: USE_ONLINE_LICENSING="true"
• Windows: USE_ONLINE_LICENSING=true
For best performance, install the software locally on each node. However, you can also install the software in a network share location.
Install noninteractively (silently) instead if you want to
• Install the software on a machine without graphical user interface (GUI).
• Save the time that it takes to configure the installer for each compute node.
For more information, see Install Noninteractively.
You can test the installation and licensing by running the following command in a command-line interface. matlabroot is the MATLAB installation folder. filename is the location to write the log file to, for example, a temporary location. You must have write permissions in this location.
matlabroot/toolbox/parallel/bin/checkLicensing -logfile filename
Configure the MATLAB Job Scheduler with Admin Center
The MATLAB Job Scheduler is a scheduler that is provided with MATLAB Parallel Server. The MATLAB Job Scheduler is intended primarily for small-to-medium-sized clusters that run only MATLAB jobs. The scheduler interface is a high-level abstraction that enables you to submit jobs to your computation resources, and allows you to avoid dealing with differences in operating systems and environments.
The following steps configure the MATLAB Job Scheduler with Admin Center, the graphical interface. If your machine does not provide graphics, use the command-line interface instead. For more information, see Start the mjs Service, MATLAB Job Scheduler, and Workers (Command-Line).
1. On the head node, start Admin Center. Go to matlabroot/toolbox/parallel/bin and execute the file named admincenter. matlabroot is the MATLAB installation folder.
2. Click Add or Find, and specify the computers that you are using as your head node and compute nodes.
3. Follow the prompts and confirm to start the mjs service. If necessary, manually start the mjs service using the command-line interface. For more information, see Use the Command-Line Interface (Windows) or Use the Command-Line Interface (UNIX).
4. In the MATLAB Job Scheduler section, click Start. Specify a name for your MATLAB Job Scheduler and select the head node from the dropdown list.
5. To add MATLAB Parallel Server workers, click Start in the Workers section of the Admin Center.
1. Select the computers to host the workers.
2. Select the number of workers per computer.
6. Verify your configuration by checking worker status in the Workers section.
7. To troubleshoot issues, click Test Connectivity in the Host section.
8. If you use UNIX®, configure the mjs service to start automatically at start time. For instructions, see Start the mjs Service, MATLAB Job Scheduler, and Workers (Command-Line).
The following screenshot shows the final setup in Admin Center.
If you need more help during the configuration, such as your cluster requires firewall configuration or you want to set up multiple mjs installations, see this more detailed guide Configure Advanced Options for MATLAB Job Scheduler Integration.
Connect the MATLAB Client to the MATLAB Parallel Server Cluster
To use MATLAB Parallel Server, you must have a client computer running MATLAB and Parallel Computing Toolbox. In the MATLAB toolstrip, select Parallel > Discover Clusters and follow the instructions to automatically discover and set up your cluster.
Alternatively, you can configure it manually as follows:
1. In MATLAB, on the Home tab, select Parallel > Create and Manage Clusters.
2. Select Add Cluster Profile > MATLAB Job Scheduler.
• Create your MATLAB Job Scheduler profile and click Edit.
• Update the hostname of the head node.
• Update the license number.
• Click Done and select Set as Default (optional) .
After you successfully validate your cluster, you can now use your MATLAB session to submit jobs to the MATLAB Parallel Server cluster.
If your validation does not pass, contact the MathWorks install support team.
Any MATLAB cluster workers that you start use dynamic licensing: they can use all the functionality you are licensed for in the MATLAB client, while checking out only MATLAB Parallel Server licenses in the cluster.
For information on configuring more advanced options for your cluster, see MATLAB Job Scheduler Cluster Customization. For example, you can set the security of the cluster in Set MATLAB Job Scheduler Cluster Security. After you finish your configuration, try some examples of cluster workflows in Running Code on Clusters and Clouds.
Related Topics |
global_05_local_5_shard_00002591_processed.jsonl/51236 | I could have shown in more detail what the great Gena did to that poor Captain, but I really didn’t want to … so panel one needs to be enough. Let you imagination fill in the blanks.
Also look who conjured a fancy dress literally out of thin air!
↓ Transcript
<we are back with Na'Ki and Ki'i'Mar after an excrutiating night for the other dragoons. Captain Bhar lies dead in front of the Gena, Thelle and Mannec are a bit back, barely alive>
<Ki'i'Mar's hands are still smoking from magic and covered in blood>
Ki'i'Mar: Oh, EX-CAPTAIN Bhar ... I would have LOVED to draw this out even longer ... but we are in kind of a rush. Aren't we, Na'Ki?
<Na'Ki has stands beside her, clutching her burned side. Ki'i'Mar is cleaning the blood off.>
Na'Ki: Gena ... ?
Ki'i'Mar: That's "Mistress" for you now.
Na'Ki: I-I'm sorry. Was ... did Maq really do a NOVA there?
Ki'i'Mar: Pretty impressive, wasn't it? I LOVE a good nova. Drawing upon ALL of your energy until there is NOTHING LEFT OF YOU? The ULTIMATE ACT OF DEVOTION.
Na'Ki: But ... I thought that was IMPOSSIBLE to actually do! That you are always dead before you can finish it!
Ki'i'Mar: Well, I did DUDGE a bit. Once you're FAR ENOUGH you can't stop it anymore, even if you try. And you can't really control the output ... but I channeled it where it was supposed to go. But it still was HIS choice. Just like it was YOURS. |
global_05_local_5_shard_00002591_processed.jsonl/51247 | NSX lab North/South Routing options
This post continues my studying of basic NSX concepts in preparation for my VCAP6-NV. I’ll try and cover some answers I’ve found to some of my mis-conceptions along the way, and finally run a few labs.
As a review , I have a 4 host Nested ESXi / NSX lab as described above.
After getting logical switching working, one of the first interesting things to look at in the lab is providing Internet access.
To do this we can use an NSX Edge to our Internet provider in three ways:
• NSX Edge
• NSX Edge HA ( pair )
• Multiple Edges with ECMP routing ( Equal-Cost-Multi-path )
Using an HA Edge provides simple fail-over redundancy by using a 2nd edge in standby mode. The fail-over for logical switch and firewall occurs after 15 seconds of missed heartbeats, which is often good enough for small clients. Note that Firewall state and routing tables are synchronized between primary and standby, so after fail-over traffic picks up without dropping the connection. Note however that Edge VPN and Load-balancer services do drop after an HA fail-over and require new connections.
Using multiple edges ( routing in parallel ) with ECMP has the advantage that single edge failure with N edges only affects 1/N of the traffic ( which will be re-routed in seconds over the remaining paths). However the majority of traffic on un-affected edges experiences no problems at all. Because ECMP steers traffic over N different networks depending on availability or load-balancing it require dynamic routing to handle those changes.
So how do we setup N/S routing in our lab ?
There are several options for N/S routing. In fact in the vRealize Automation product ( not covered here ) there are exactly three options for connecting NSX to other networks.
• External
• Routed
• NATed
For further info see VMware Automation Fundamentals Handbook p61
I found out I didn’t fully understand the basics of each of these network types, so lets discuss each of them further.
External Network
An External network is an existing network ( outside of NSX ) that has the same IP subnet as your NSX network. So in the simple case we are just bridging from a vxlan network to a vLAN network. For example:
NSX: vxlan: 5050 , subnet
External: vLAN 50, submit
Bridging is typically done on a Logical distributed Router (LDR) with an associated LDR control VM (edge) dedicated to the LDR. The data-plane of the bridge is in the Kernel of the host that is running the LDR control VM. The control VM does not handle actual traffic – it only handles the dynamic routing decisions in the control-plane.
Note that NSX VM’s on the External network will use the Internet access available there. It could be a hardware gateway providing SNAT to the Internet and that will work for our VM’s as well. I plan to cover bridging separately in a later article.
Routed Network
A routed network performs N/S routing ( but not NAT ). So if our internal IP are private (RFC 1918 ) we can certainly route them through an Edge up to a core router , and to a different lab/building , but we can’t actually get Internet access without NAT ( or a proxy ).
Alternatively we could assign public IP’s directly to our VM’s , then the Edge could provide Inbound/Outbound Internet access through it’s firewall. However it is generally undesirable to assign Public IP this way.
A routed network could use a single Edge, HA Edge pair. Multiple Edges with ECMP can only be used if our ISP supports dynamic routing ( generally not the case for a lab )
NAT’ed Network
A NAT’ed network Performs two types Network Address translation ( NAT )
• One-to-One NAT
Each VM has internal IP and a corresponding public IP ( One pubic IP for each VM )
Both SNAT and DNAT rules can be setup
• One-to-Many NAT
Each VM gets SNAT to one external ‘shared’ IP
DNAT is not possible !, Incoming access is only available through Load-balancer.
Note that network “Port Translation” or PAT as typically done for mapping incoming requests on consumer routers is not supported.
Lab Options
There are a few options for upcoming labs. ( To be announced )
• External: Bridge vxlan Logical switch to a physical vLAN
Optionally use physical router on vLAN for SNAT/DNAT
• NAT: Edge connected to ISP with SNAT/DNAT
Requires a routed subnet from ISP ( with multiple static IP’s )
We can optionally use Edge Fail-over for reliability.
• Routed:
1) Edge connected directly to ISP routed network.
2) Edge connected to local EdgeRouter-X ( connected to ISP )
which allows us to try dynamic routing protocols.
The EdgeRouter-X is a low cost router supporting OSPF and will allow us to setup ECMP from 2 or more Edges to the ER-X. The ER-X support both OSPF and BGP dynamic routing protocols. Note that we would need to place public IP’s on the VM’s to test Internet access, as we are not using NAT.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_05_local_5_shard_00002591_processed.jsonl/51250 | Angel Number 311: Should You Stay on Your Path?
In life, we sometimes see certain numbers more often than others. While this might seem like a strange coincidence considering the way they appear, like when you check the time on your watch or when you look at billboards, it really isn’t.
If you take the time to observe them carefully, you will probably appreciate the process of understanding the messages that come with them. You will feel more empowered and will get peace of mind in case you were restless after seeing them so many times.
One of these special numbers is 311. Today, we discuss the meaning of 311 from different perspectives.
Angel Number 311 – Your Questions, Answered
Is it an angel number?
Yes, it is.
Angel numbers are repeating number sequences that work in accordance with numerology, which believes that all numbers are connected to different frequencies and vibrational energies.
The 311 angel number is one of those angel numbers that give you encouragement to continue walking on the path you have chosen in life with positive thoughts and confidence.
What does angel number 311 mean?
Angel number 311 is formed by both number 3 and number 1 and therefore has a mix of their energies. Since the number 1 appears two times, it’s influence is amplified.
Number 311 also contains the master number 11 which makes this number even more powerful.
Now, angel number 3 is a sign of growth, expansion, joy, optimism, development, communication, creativity, increase, and creative self-expression. It is also known to resonate with the Ascended Masters.
Number 3, therefore, indicates the Ascended Masters’ presence and how prepared they are to help you reach your goals in life and fulfill the desires of your heart. It’s an assurance that every time you call for them, they will answer and send you the help you need.
Meanwhile, angel number 1 is a representation of new beginnings in life. When you see it, you should feel a strong sense of motivation, drive, and ambition.
It also signifies success, moving forward, leadership, progress, confidence, individuality, happiness, independence, and the creation of our realities as triggered by positive beliefs, thoughts, and expectations.
Angel number 11 signifies idealism, inspiration, intuition, and enlightenment.
When you mix all the energies from these numbers, you get the meaning of angel number 311.
Angel number 311, therefore, is a sign of new beginnings, success, individuality, creative self-expression, and joy in life as guided and supported by the divine. It also symbolizes the manifestation of those desires you have been working hard and praying for.
What is the meaning of number 311 in numerology?
In numerology, angel number 311 combines the attributes of both numbers 3 and 1, and summing these up gives you 5.
We have already mentioned the meaning of numbers 3 and 1. So, you might be interested in knowing what 5 means.
Angel number 5 represents major shifts in your life and learning on the path you chose. It also represents curiosity, adaptability, and your ability and freedom to make decisions while on the way to progress.
A combination of all these influences is a sign of new life beginnings, expansion, progress, creativity, moving forward, determination, and important life decisions.
What does 311 mean spiritually?
The 311 angel number carries a great message from your guardian angel to always keep a positive outlook when it comes to your thoughts on the future. Through it, the angels encourage you to face the future with optimism.
They encourage you to always expect the best in life regardless of the difficulty of the situation. Number 311 urges you not to allow fears, worries, and negative thoughts to slow you down.
The 311 angel number reminds you that it’s not worth carrying around negative energy because the angels and the entire spiritual world are on your side. They want you to get rid of bad memories, unpleasant situations, or people that may be bringing you negativity.
What does waking up at 3:11 mean?
Waking up at 3:11 or when you keep seeing angel number 311 means that you should know that a big change is about to happen in your life and that there’s a higher power that’s right behind you giving you all the help you need to get ahead.
Angel number 311 means the guardian angels desire to raise you up so that you are ready for those new beginnings that will soon be part of your life. It’s a sign that you have the support of the guardian angels, the universe, and most of all, God even when things are hard.
When you see angel number 311 often, be open to it so that you receive and benefit from master number 11’s creative energies, together with the energies of numbers 3 and 1.
Number 311 symbolizes happiness and fulfillment as it’s a promise of good news and some great rewards for all your hard work. Remember to be proud of everything you have achieved because none of it came easy.
The guardian angels want you to know that things will start making more sense to you in good time, so you should always remain positive. They are assuring you that the answers you seek will soon be manifested and will have you become more secure about your life and most of all yourself.
You will get to know yourself even better and as such, you’ll discover the things that will bring you more joy in life, which is what will set you in motion.
Regardless of your desires in life, you will be successful if you accept this angel number’s power.
What does the number 311 mean in the Bible?
The meaning of 3 in the Bible is that of completion, wholeness, and perfection. Meanwhile, 1 in the Bible represents uniqueness, singleness, and the supremacy of God.
Angel number 311, therefore, combines the meanings of these two. It means that if you feel like something in your life is missing, it is through God that you’ll feel ‘whole.’
What does angel number 311 mean in love?
When it comes to your love life, angel number 311 signifies the satisfaction of fulfilling the desires of your heart. Through this 311 number, the angels are telling you that you should be positive and follow your heart without allowing yourself to get overwhelmed by your emotions.
The 311 meaning is that you need to find a good balance between the things that go on in your mind and your feelings so that you don’t end up becoming overly emotional. It’s a sign that you should use your mind to make the right decisions on which way to go in your love matters.
This angel number comes as an announcement of a great period in your romantic life, and one that you should pay attention to. The angels want you to listen to your heart and mind in every situation you find yourself in.
In case you’re single, the angels want to see you in a great and happy relationship full of love after a long period of loneliness.
Is angel number 311 a good number?
Yes, it is.
Angel number 311 is a way through which the universe encourages you to be prepared and embrace the journey of learning and growth that’s ahead of you. The angels use this number to remind you that despite the challenges you face, you should stay positive because there’s always a light at the end of the tunnel you might be in.
In some cases, you might be lucky to experience fewer or no challenges. In these cases, this number appears just to remind you that you are abundantly blessed.
As such, always meditate and ensure your true self is in alignment with your spirit. Always be thankful for the lessons that life has brought you.
What does the number 311 symbolize?
You will love the presence of number 311 in your life because it symbolizes expansion. So, whenever you see it around, be prepared to grow personally and professionally.
Whether it’s in love, career, or spirituality, when you see angel number 311, you should take it with optimism and hope that great things are on the horizon.
It is one of the signs that you have the love from the divine realm and that you can always count on their support in your life’s journey.
FREE GIFT: Numerology Reading Customized to Your Birthday |
global_05_local_5_shard_00002591_processed.jsonl/51257 | RSS Feed
Tag Archives: William Cagney Productions
Blood on the Sun (April 26, 1945)
BloodSunJames Cagney made a big splash in William A. Wellman’s The Public Enemy (1931). It was his first starring role. Some people claim that when Cagney first walked on screen in that picture, it was the beginning of “modern acting.” Whether or not you believe that claim, there’s no denying the impact Cagney had on Hollywood, especially gangster films. The scene in which he shoves a grapefruit half into Mae Clarke’s face is iconic. Late in his life, Cagney claimed that people still sent grapefruits to his table in restaurants, with a wink and a nod. The Public Enemy ushered in a new era of onscreen violence, and an icon was born.
Cagney would go on to play many criminals, gangsters, and con men, in films like Smart Money (1931), Blonde Crazy (1931), Hard to Handle (1933), Picture Snatcher (1933), The Mayor of Hell (1933), Lady Killer (1933), He Was Her Man (1934), Angels With Dirty Faces (1938), Each Dawn I Die (1939), and The Roaring Twenties (1939). He was so good in these roles that when a lot of people hear the name “Jimmy Cagney,” they can only think of a sneering mug with a gat clenched in his fist and a cigarette dangling from his lower lip. But Cagney was a versatile actor. He also played cops, G-men, servicemen, and comedic roles, as well as singing and dancing in musicals. In fact, the only Academy Award he ever won was for his role in Michael Curtiz’s Yankee Doodle Dandy (1942), a drama and musical that told the life of George M. Cohan.
I think Cagney is a great actor with a unique style and personality. Anything he appears in is worth watching. Blood on the Sun was directed by Frank Lloyd, a Hollywood veteran who’d been making pictures since the silent era. It’s a wartime potboiler with a dubious MacGuffin; the Tanaka Memorial, an alleged strategic document from 1927 in which Prime Minister Baron Tanaka Giichi created for Emperor Showa a strategy to take over the world. It is believed by many historians to have been a forgery. In the ’30s and ’40s, however, the document was widely accepted as true. It was mentioned in Frank Capra’s agitprop documentary series, Why We Fight, and translations were published in Chinese and American periodicals. Of course, one reason why it was widely regarded to be an actual document is because Japan’s actions so closely mirrored the strategy that the Tanaka Memorial outlined; the conquest of Manchuria and Mongolia, followed by the invasion of China, the establishment of bases in the Pacific, and the eventual conquest of the United States. So although General MacArthur’s armies were unable to uncover any original Japanese-language versions of the Tanaka plan after World War II, perhaps its authenticity is beside the point.
In Blood on the Sun, which takes place in Tokyo in the late ’20s, Cagney plays an American reporter named Nick Condon. Condon writes for the Tokyo Chronicler, which is essentially a mouthpiece for the Japanese government, and is aimed at the Western business community. When Condon writes and publishes an article about a secret plan that outlines Japan’s plans for world domination, his editor tells him to print a retraction. He refuses, and the Japanese secret police plant a false story in the newspaper designed to discredit Condon. When Condon still refuses to back down, the Japanese secret police raise the stakes by murdering two of Condon’s friends, whom they believe are smuggling a copy of the Tanaka plan out of the country. Eventually, the film becomes a cat-and-mouse espionage thriller, with Condon on the run with a “half-breed” named Iris Hilliard, played by Sylvia Sidney, who is originally sent by the secret police to ingratiate herself to Condon and find out if he has a copy of the Tanaka plan. (Since Sidney is a white actress in yellowface makeup, I wasn’t clear for awhile which two races she was supposed to be descended from. One is Chinese, but I could have sworn that at one point, another character described her as being half Japanese/half Chinese. Her surname, however, implies that her father was British or American. So I must have misheard the line of dialogue.) Besides the questionable historical accuracy of Blood on the Sun, the white actors playing Japanese roles will probably be the hardest thing for modern audiences to swallow. John Emery, who plays Tanaka, and Robert Armstrong, who plays Col. Hideki Tojo, are not the worst examples of yellowface I’ve ever seen, but with their indeterminate, lisping accents, they’re still pretty bad. Blood on the Sun isn’t a particularly racist film, however, especially when one considers the context in which it was made. All of its villains are representatives of the Japanese government, which committed horrifying atrocities during World War II, and with whom the United States was still at war when this film was made. Several of the actors in smaller roles are actually Asians (although it’s unlikely that too many, if any, are actually Japanese).
The main reasons to see this film today, aside from historical curiosity, are the performance of Cagney and the well-choreographed fight scenes. Blood on the Sun won a single Oscar at the 18th Academy Awards in 1946, for best art direction in a black and white film, but it should have won for “most awesome martial arts battle in an American film.” Sadly, such a category did not exist. How could it? Martial arts were new to Hollywood. Some people cite John Frankenheimer’s The Manchurian Candidate (1962) as having the first real martial arts fight scene in an American film, which is clearly not the case. Frank Sinatra and Henry Silva’s karate chops were fine, but they pale in comparison to the brutal judo smackdown that crowns Blood on the Sun. Cagney studied judo for this film, and liked it so much he kept it up for most of his life. How could he not? A born-and-bred brawler, Cagney clearly took to martial arts like a fish to water. The combination of judo throws and boxing as he fights the leader of the secret police, Capt. Oshima, played by Jack Sergel (who acted under the stage name “John Halloran”), is fairly basic by today’s standards, but it’s still impressive. Cagney and Sergel go to the ground several times, and the chokeholds and arm bars look as if they hurt. So do the throat punches. Sergel was actually my favorite actor in the film after Cagney. He’s tall, menacing, and has a shaved head and black mustache. He doesn’t look particularly Japanese, but he’s more convincing as an Asian than any of the other white actors in the film. Sergel was a former LAPD officer who had been investigated by the FBI because of his involvement with the sport of judo, including his participation in at least one judo tournament that was held in a Japanese internment camp. Even though he was a Los Angeles police sergeant and loyal American citizen, his admiration for Japanese culture and sport was seen as suspicious by federal and local authorities, and he ended up resigning from the LAPD in 1944. Cagney spends a lot of his time in this film punching, kicking, and throwing the bad guys who come after him, but his fight with Sergel is the high point. Cagney was a small man, and Sergel towers over him, but Cagney’s sheer physicality makes you believe they’re evenly matched. |
global_05_local_5_shard_00002591_processed.jsonl/51274 | For Work / Against Work
Debates on the centrality of work
by Frank, Thomas (1997)
While the youth counterculture remains the most evocative and best-remembered symbol of the cultural ferment of the 1960s, the revolution that shook American business during those boom years has gone largely unremarked. In this fascinating and revealing study, Thomas Frank shows how the youthful revolutionaries were joined—and even anticipated —by such unlikely allies as the advertising industry and the men's clothing business.
Culture, Counterculture, Hip Consumerism, Consumerism, Consumer Revolution, Modernism, Advertising, Creativity
Organisation and Management Studies, Critique of Consumerism
Links to Reference
How to contribute. |
global_05_local_5_shard_00002591_processed.jsonl/51276 | 2049-9647 Journal of Open Research Software 2049-9647 Ubiquity Press 10.5334/jors.178 Software metapaper Picasso: A Modular Framework for Visualizing the Learning Process of Neural Network Image Classifiers http://orcid.org/0000-0002-1156-3664 Henderson Ryan ryan@merantix.com http://orcid.org/0000-0001-8835-6789 Rothe Rasmus Merantix GmbH, Leuschnerdamm 31, 10999, Berlin, DE 11 09 2017 5 22 16 05 2017 27 07 2017 Copyright: © 2017 The Author(s) 2017 This is an open-access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC-BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. See http://creativecommons.org/licenses/by/4.0/.
Picasso is a free open-source (Eclipse Public License) web application written in Python for rendering standard visualizations useful for analyzing convolutional neural networks. Picasso ships with occlusion maps and saliency maps, two visualizations which help reveal issues that evaluation metrics like loss and accuracy might hide: for example, learning a proxy classification task. Picasso works with the Tensorflow deep learning framework, and Keras (when the model can be loaded into the Tensorflow backend). Picasso can be used with minimal configuration by deep learning researchers and engineers alike across various neural network architectures. Adding new visualizations is simple: the user can specify their visualization code and HTML template separately from the application code.
Neural networks Deep learning Visualization Tensorflow Keras
(1) Overview Introduction
Neural networks (NNs) [1] and convolutional neural networks (CNNs) [234] are subject to unique training pitfalls [56]. Consider this motivating example [7]:
Once upon a time, the US Army wanted to use neural networks to automatically detect camouflaged enemy tanks. The researchers trained a neural net on 50 photos of camouflaged tanks in trees, and 50 photos of trees without tanks[…].
Wisely, the researchers had originally taken 200 photos, 100 photos of tanks and 100 photos of trees. They had used only 50 of each for the training set. The researchers ran the neural network on the remaining 100 photos, and without further training the neural network classified all remaining photos correctly. Success confirmed! The researchers handed the finished work to the Pentagon, which soon handed it back, complaining that in their own tests the neural network did no better than chance at discriminating photos.
It turned out that in the researchers’ dataset, photos of camouflaged tanks had been taken on cloudy days, while photos of plain forest had been taken on sunny days. The neural network had learned to distinguish cloudy days from sunny days, instead of distinguishing camouflaged tanks from empty forest. [emphasis added]
While this story may be apocryphal, it nonetheless illustrates a common pitfall in machine learning: training on a proxy feature instead of the intended feature. In this case, cloudy vs. sunny instead of tank vs. no tank. As CNNs are increasingly used in critical applications, sound training can literally be a matter of life and death [8].
We developed Picasso to help protect against situations where evaluation metrics like loss and accuracy may not tell the whole story in training neural networks on image classification tasks. Picasso includes two visualizations so far: partial occlusion [10] and saliency mapping [11]. The user may upload new input images and select from among installed visualizations and their attendant settings. Picasso was designed with ease of adding new visualizations in mind, detailed in the Implementation and architecture and Reuse Potential sections. At the time of this writing, Picasso has support for neural networks trained in Keras [12] or Tensorflow [13].
At Merantix, we work with a variety of neural network architectures. Picasso makes it easy to see standard visualizations across our models in various fields: including applications in automotive, such as understanding when road segmentation or object detection fail; advertisement, such as understanding why certain creatives receive higher click-through rates; and medical imaging, such as analyzing what regions in a CT or X-ray image contain irregularities. See Figure 1 for a screenshot of the Picasso application after computing partial occlusion maps for various images. The user has chosen to use the VGG16 [9] model for image classification. This example is included with Picasso, along with a trained MNIST [14] model in both Keras and Tensorflow.
A screen capture of the Picasso web application after computing partial occlusion figures for various input images. The classifier is a trained VGG16 [9] network.
Other visualization packages exist to help bring transparency to the learning process, most notably the Deep Visualization Toolbox [15] and keras-vis [16], which can also generate saliency maps. There are also various applications for visualizing the computational graph itself and monitoring the evaluation metrics, like Tensorboard. Not all of these tools provide a web application out-of-the-box, however. We furthermore required an application that would easily allow us to add new visualizations, which may in the future include visualizations such as class activation mapping [1718] and image segmentation [1920].
Let us return to the tank example. Could the visualizations provided with Picasso have helped the Army researchers? We would like to be able to see that our model (VGG16) is classifying based on the “tank-like” features of the image, and not some proxy feature like the weather. See Figure 2 for the partial occlusion maps generated by Picasso. We see that when we occlude portions of the sky, the model still classifies the image as a tank. Conversely, when we occlude parts of the tank treads, the model is far less certain that the image is a tank.
The partial occlusion map sequentially blocks out parts of the image to determine which regions are important to classification. The numbers in the header are the overall class probabilities. Brighter regions correspond to areas where the probability of the given class is high–i.e. blocking out this part of the image does not change the classification much. The tank image is in the public domain [21].
That the model is classifying on the correct features is further supported by the saliency maps. Saliency maps compute the derivative of the classification for a given class with respect to the input image. Thus regions with high gradient–bright regions–are important to the given classification because changing them would change the classification more relative to other pixels. Figure 3 shows the saliency map for the tank image. Notice that with a few exceptions the non-tank areas are largely dark, which means changing these pixels should not make the image more or less “tanky.”
Saliency map for the tank. Brighter pixels indicate higher values for the derivative of “tank” with respect to that input pixel for this image. The brightest pixels appear to be in the tank region of the image, which is a good indication the model is classifying on the tank-like features.
Implementation and architecture
Picasso was written in Python 3.5 using the Flask web application framework. Visualization classes and HTML templates must be defined separately by the user, but do not require modifying any other source files to use. Picasso handles the uploading of user-supplied images and generates temporary folders containing input and output images. If the visualization class has a settings attribute, Picasso automatically renders the settings selection as a separate page.
Application-level settings are handled via a configuration file, where the user may specify the deep learning framework (Keras or Tensorflow) as well as the location of the checkpoint files for their chosen model. The user must also supply a function to preprocess the image (reshape the image into appropriate input dimensions) and decode the output of the model (provide class labels).
Quality control
Picasso has unit tests written in the Pytest framework covering the web application functionality, and automatically tests that new visualizations render without errors. The GitHub repository performs continuous integration via Travis-CI. Test coverage is monitored with Codecov. A user can verify the software is working by starting the web application and pointing a web browser to In addition to docstrings and inline comments, extensive documentation is available on Read the Docs.
(2) Availability Operating system
Any operating system capable of running Python 3.5 or higher.
Programming language
Python >= 3.5.
Additional system requirements
These Python packages will be installed as part of the normal installation process: click >= 6.7, cycler >= 0.10.0, Flask >= 0.12, h5py >= 2.6.0, itsdangerous >= 0.24, Jinja2 >= 2.9.5, Keras >= 1.2.2, MarkupSafe >= 0.23, matplotlib >= 2.0.0, numpy >= 1.12.0, olefile >= 0.44, packaging >= 16.8, Pillow >= 4.0.0, protobuf >= 3.2.0, pyparsing >= 2.1.10, python-dateutil >= 2.6.0, pytz >= 2016.10, PyYAML >= 3.12, requests >= 2.13.0, scipy >= 0.18.1, six >= 1.10.0, tensorflow >= 1.0.0, Werkzeug >= 0.11.15.
List of contributors
Bunk, Stefan stefan@merantix.com – code review
Chen, Josh josh@merantix.com – code review
Henderson, Ryan ryan@merantix.com – code review
McSpedon, John john@merantix.com – code review
Rothe, Rasmus rasmus@merantix.com – code review
Scopel, Filippo filippo@merantix.com – development
Sprengel, Elias elias@shirp.ch – development
Software location Archive
Name: Picasso
Persistent identifier: https://github.com/merantix/picasso/tree/v0.1.1
Licence: EPL
Publisher: Merantix
Version published: v0.1.1
Date published: 12/05/17
Code repository
Name: GitHub
Persistent identifier: https://github.com/merantix/picasso
Licence: EPL
Date published: 12/05/17
Emulation environment
Name: N/A
Persistent identifier: N/A
Licence: N/A
Date published: N/A
(3) Reuse potential
Any researcher or engineer working with a model in Tensorflow or Keras which takes images as inputs and gives classification probabilities as output can use Picasso with very little effort. Picasso does make some assumptions about the topology of the neural network, but developers can further adapt the Picasso framework to more specialized computational graphs with minimal changes to the code.
Picasso is specifically designed to make implementing new visualizations as painless as possible (see the visualization documentation). New visualization code can be added without modifying any other source code. We hope to add more visualizations as we continue to develop this tool internally, and especially hope for new community-developed visualizations.
The authors would like to thank the Merantix team for support during development and documentation. Also, thanks to David Dohan and Nader Al-Naji for helpful discussions in preparing this manuscript.
Competing Interests
The authors have no competing interests to declare.
Warren S M Walter P A logical calculus of the ideas immanent in nervous activity The bulletin of mathematical biophysics 1943 5 4 115 133 10.1007/BF02478259 ISSN 1522-9602 Yann L Léon B Yoshua B Patrick H Gradient-based learning applied to document recognition Proceedings of the IEEE 1998 86 11 2278 2324 10.1109/5.726791 Yann L Fu J H Leon B Learning methods for generic object recognition with invariance to pose and lighting Computer Vision and Pattern Recognition, CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on, 2: II–104 2004 2004 IEEE 10.1109/CVPR.2004.1315150 Alex K Ilya S Geoffrey E H Imagenet classification with deep convolutional neural networks Advances in neural information processing systems 2012 1097 1105 Zhang G P Avoiding pitfalls in neural network research IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 2007 37 1 3 16 10.1109/TSMCC.2006.876059 Chiyuan Z Samy B Moritz H Benjamin R Oriol V Understanding deep learning requires rethinking generalization arXiv preprint arXiv:1611.03530 2016 URL: https://arxiv.org/abs/1611.03530 Eliezer Y Artificial intelligence as a positive and negative factor in global risk Global catastrophic risks 2008 1 303 184 The Tesla Team A tragic loss 2016 URL: https://www.tesla.com/blog/tragic-loss. Accessed: 2017-5-12 Karen S Andrew Z Very deep convolutional networks for large-scale image recognition arXiv preprint arXiv:1409.1556 2014 Matthew D Z Rob F Visualizing and Understanding Convolutional Networks 2014 Cham Springer International Publishing 978-3-319-10590-1 818 833 10.1007/978-3-319-10590-1 Karen S Andrea V Andrew Z Deep inside convolutional networks: Visualising image classification models and saliency maps CoRR, abs/1312.6034 2013 URL: http://arxiv.org/abs/1312.6034 Franois C K 2015 URL: https://github.com/fchollet/keras Martín A TensorFlow: Large-scale machine learning on heterogeneous systems 2015 URL: http://tensorflow.org/. Software available from: http://tensorow.org/ Yann L Corinna C MNIST handwritten digit database 2010 URL: http://yann.lecun.com/exdb/mnist/ Jason Y Jeff C Anh N Thomas F Understanding neural networks through deep visualization Deep Learning Workshop, International Conference on Machine Learning (ICML) 2015 URL: https://github.com/yosinski/deep-visualization-toolbox Raghavendra Kotikalapudi and contributors keras-vis 2017 https://github.com/raghakot/keras-vis Bolei Z Aditya K Agata L Aude O Antonio T Learning deep features for discriminative localization Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2016 2921 2929 URL: http://cnnlocalization.csail.mit.edu/ Ramprasaath R S Abhishek D Ramakrishna V Michael C Devi P Dhruv B Grad-cam: Why did you say that? visual explanations from deep networks via gradient-based localization CoRR, abs/1610.02391 2016 URL: http://arxiv.org/abs/1610.02391 Yi Li Haozhi Q Jifeng D Xiangyang J Yichen W Fully convolutional instance-aware semantic segmentation CoRR, abs/1611.07709 2016 URL: http://arxiv.org/abs/1611.07709 Kaiming H Georgia G Piotr D Ross B G Mask R-CNN CoRR, abs/1703.06870 2017 URL: http://arxiv.org/abs/1703.06870 U.S. Army US Army operating Renault FT tanks URL: https://en.wikipedia.org/wiki/Light_tank#/media/File:FT-17-argonne-1918.gif |
global_05_local_5_shard_00002591_processed.jsonl/51277 | As a maintainer of an open source project which strictly enforces coding style and 100% test coverage, how do I deal with enthusiastic contributors who write terrible looking, untested code (that might work fine), while the contribution guidelines (and even the readme) very clearly mentions how your code should be formatted/tested.
• 3
Is there anything wrong with using a saved reply (e.g on github blog.github.com/2016-03-29-saved-replies) stating "please make sure you have read the contribution guidelines before contributing" ? – ESR Oct 9 '18 at 1:39
Define objective criteria that any contribution must fulfill. Automate checks for these criteria, using unit tests, linters, code coverage tools, …, then automatically run these checks for each PR as part of the build process / unit tests. Fortunately, there's a large set of such services that are available at no cost for open source projects.
If a contribution fails these criteria, decide how much effort you want to invest into that PR and the PR's author.
• If a contribution does not make any sense for your project, kindly say so. For example:
Thank you for working on this idea, but I won't merge it. Adding this feature means we won't be able to do X in the future, and I'm not yet sure whether that's the right decision. In the future, if you have any ideas please open an issue first so that the design can be discussed.
It might be possible to prevent some weird ideas by publishing a project vision and roadmap that outlines where you want the project to go. This will make it easier to say no to contributions that are not aligned with this vision.
• If the contribution is irredeemable in its current form, close the PR with a kind message that refers to your objective criteria/your contribution guidelines, but possibly leaves the door open. For example:
Thank you for your contribution, this looks like a great addition for {project}. Unfortunately, the tests on {CI service} seem to be failing so I'm closing the PR for now. Please let me know when it is fixed so that it can be reopened and merged!
Depending on your patience also offer some help, e.g. a chat room where you can be reached.
• If the author is willing to make changes or when you want to grow them, comment with specific requests for improvements. E.g. GitHub's code review feature can be great for this. If necessary, consider providing (links to) tutorials and how-tos. For design-level problems, I've found it useful to NOT say “do this instead” (because my ideas are often not that great either) but to ask “what happens if in case of X?” or “I don't understand why this algorithm is necessary. Can't we just add the item to the list?”.
• If the author is unavailable but their change is valuable, consider carrying the PR and fixing any problems yourself. This often takes less effort than writing about your concerns and waiting for responses, but doing work yourself instead of involving others makes your community poorer.
If in doubt about a PR/feature, say no. No is temporary, yes is forever. This is not personal, this is about keeping the project viable. After all, a feature doesn't just cost effort for the implementation, but will cost effort for maintenance and user support in the future – effort which you as the maintainer might have to provide. Setting boundaries and not taking on work that you don't want is important.
Consider also reading Jessie Frazelle's post The Art of Closing.
| improve this answer | |
• 3
+1 cause that's exactly what I wanted to hear :p. I am enforcing automated checks for test coverage and code review, but till now I haven't found something that really checks code style. I'll mark this accepted if there are no other opinions on this one. – pulsejet Oct 8 '18 at 13:53
• 2
@PulseJet If there is a linter available for your programming language, you could at minimum insist upon passing a specific lint configuration. (A linter will often check indentation, bracket style, and various code smells.) – apsillers Oct 8 '18 at 15:33
• 2
@PulseJet I use flake8 (which is mostly great, but limited) and pylint (which has many false positives, so do write a config file to disable irrelevant diagnostics). If you like TypeScript, you might also like Python's mypy type checker, especially when you only support 3.5 or later. – amon Oct 8 '18 at 15:49
• 2
It’s worth noting that adding coding styles witch are too restrictive might drive people away from contributing, which might be a problem if your project doesn’t receive many PRs in the first place. – Steve Oct 8 '18 at 19:31
• 2
@PlasmaHH There has to be a balance. Sure, projects that close PRs with “Fix your code first!” responses come across as dickish. But every PR can easily cost a maintainer over an hour of work just reviewing it and writing a response, even if the response is a “no”. Carrying a patch can cost multiple work-days. It is therefore irresponsible to swamp maintainers with half-baked PRs. Part of my answer is about setting a sufficiently high bar for PRs, which reduces the maintainer's cost. If you have a prototype, just link to it in an issue comment instead. – amon Oct 10 '18 at 10:24
Your Answer
|
global_05_local_5_shard_00002591_processed.jsonl/51279 | Browsing byAuthorWang, KD
or enter first few letters:
Showing results 1 to 1 of 1
Issue DateTitleAuthor(s)
2013-05-01GPP-based soft base station designing and optimizationTao, XF; Hou, YZ; Wang, KD; He, HY; Guo, YJ |
global_05_local_5_shard_00002591_processed.jsonl/51295 | Jump to ContentJump to Main Navigation
Classical and Romantic Performing Practice 1750-1900$
Clive Brown
Print publication date: 1999
Print ISBN-13: 9780198161653
Published to Oxford Scholarship Online: May 2008
DOI: 10.1093/acprof:oso/9780198161653.001.0001
Show Summary Details
Page of
Tempo Modification
Tempo Modification
(p.375) 11 Tempo Modification
Classical and Romantic Performing Practice 1750-1900
Clive Brown
Oxford University Press
This chapter discusses changing approaches to tempo modification. Types of tempo modification are described, two basic categories being identified: first, changes of speed within a piece, such as arbitrary accelerando or rallentando (where no changes of speed are marked by the composer); and secondly, modification by means of redistributing note values within a fundamentally constant tempo. The second type of tempo modification, often referred to by theorists as tempo rubato, was a pervasive element in Classical and Romantic performance; this is illustrated from the writings of theorists, critical writings and the evidence of composers' scores. The use of the messa die voce sign (<>), as an indication of expressive lingering, is discussed. A more specialized use of the term tempo rubato as an arthythmical embellishment is discussed in relation to C. P. E. Bach, Dussek, and Chopin.
Keywords: tempo rubato, messa di voce, accelerando, rallentando
Please, subscribe or login to access full text content.
|
global_05_local_5_shard_00002591_processed.jsonl/51298 | • what is haven?
• what are angels?
• what do angels look like?
• angel hierarchy
• fallen angels
• sacred geometry
• how to work with angels
• some angels
• How to call your angel
For whatever reason it might be, you may want to call an angel directly and ask them for help. Usually people call for angels and archangels since beings on the bottom of the hierarchy are only useful to god. There is very little knowledge about this practice since the skilled mages who call angels are practitioners of white magic, and they are very serious about their selfless labour, and they are very secretive about their powers.
Angels can be called with sigils as demons do, but as recently said there is not much knowledge shared about this topic, this is why is better to make your own sigil to call the angel from who do you want help. The method I'm about to share is still valid to call any being you want.
The Rose Wheel Method
The rose wheel consists of 22 petals each corresponding to a letter in the Hebrew Alephbet which you will convert to it's English phonetic equivalent for our purposes. To begin you start with your statement of intention or in our case, the name of the angel we want to call, for this example let's say that our goal is to call the archangel Gabriel.
It's very easy for us to find a transliteration of our guest's name since he is a canonical archangel, but otherwhise we should take our time to remove the vowels except the -Ae- since in the hebrew alpahbet there are no vowels. Next step is just trazing a line to connect each letter of the name, starting the stroke with a circle and finishing it with a cross.
The end result is now your sigil. You can further embellish it with the same method, expressing your wishes or calling even other beings, but if you're new to this I don't reccomend it, take care to not overwhelm this sigil, be patient, it's better to bargain with your angel when they decided to answer your calls.
What to expect
Angels are incredibly powerful beings. If you have put all your power and hope in the process of making the sigil, you'll probably feel their presence instantaneusly. Take your time to do research of the angel you're calling so you won't get any surprise, if you can, contact people who already made a strong relationship with that angel you desire to call, ask them all the questions you have. The end result will always depend on you. My intention is not to be a moral compass for you, I only intend to give you information. I do not consider myself as a good person, and you probably don't either, so my only advice is: think about the outcome of your actions.
You should always be thinking about your goals and your reasons, you must appear confident, no one likes a whiny weak sorcerer, you will make your angel stay if you show constant desire to grow, and if you're good at this, you may even grow stronger than them... and finally gain their control. So always ask yourself ''What are your goals? What do I want to gain from this? Power? Healing? Love? Experience? Revenge? Do you care if you end up judged for your actions? If they end backfiring? Why are you doing this? Why? Why? Why? Why did you call me? Why do you make me suffer so much? Why did you choose me? Why do you keep me up chained, why did you cut my wings? Why did you take my eyes, now I can't see who I really am. Why? Why? I am not supposed to be doing this. |
global_05_local_5_shard_00002591_processed.jsonl/51309 | This is a battle for the soul of America
July 9, JDN 2457944
At the time of writing, I just got back from a protest march against President Trump in Santa Ana (the featured photo is one I took at the march). I had intended to go to the much larger sister protest in Los Angeles, but the logistics were too daunting. On the upside, presumably the marginal impact of my attendance was higher at the smaller event.
Protest marches are not a common pastime of mine; I am much more of an ivory-tower policy wonk than a boots-on-the-ground political activist. The way that other people seem to be allergic to statistics, I am allergic to a lack of statistics when broad claims are made with minimal evidence. Even when I basically agree with everything being said, I still feel vaguely uncomfortable marching and chanting in unison (and constantly reminded of that scene from Life of Brian). But I made an exception for this one, because Trump represents a threat to the soul of American democracy.
We have had bad leaders many times before—even awful leaders, even leaders whose bad decisions resulted in the needless deaths of thousands. But not since the end of the Civil War have we had leaders who so directly threatened the core institutions of America itself.
We must keep reminding ourselves: This is not normal. This is not normal! Donald Trump’s casual corruption, overwhelming narcissism, authoritarianism, greed, and utter incompetence (not to mention his taste in decor) make him more like Idi Amin or Hugo Chavez than like George H.W. Bush or Ronald Reagan. (Even the comparison with Vladimir Putin would be too flattering to Trump; Putin at least is competent.) He has personally publicly insulted over 300 people, places, and things—and counting.
Trump lies almost constantly, surrounds himself with family members and sycophants, refuses to listen to intelligence briefings, and personally demeans and even threatens journalists who criticize him. Every day it seems like there is a new scandal, more outrageous than the last; and after so long, this almost seems like a strategy. Every day he finds some new way to offend and undermine the basic norms of our society, and eventually he hopes to wear us down until we give up fighting.
It is certainly an exaggeration, and perhaps a dangerous one, to say that Donald Trump is the next Adolf Hitler. But there are important historical parallels between the rise of Trump and the rise of many other populist authoritarian demagogues. He casually violates democratic norms of civility, honesty, and transparency, and incentivizes the rest of us to do the same—a temptation we must resist. Political scientists and economists are now issuing public warnings that our democratic institutions are not as strong as we may think (though, to be fair, others argue that they are indeed strong enough).
It was an agonizingly close Presidential election. Even the tiniest differences could have flipped enough states to change the outcome. If we’d had a better voting system, it would not have happened; a simple plurality vote would have elected Hillary Clinton, and as I argued in a previous post, range voting would probably have chosen Bernie Sanders. Therefore, we must not take this result as a complete indictment of American society or a complete failure of American democracy. But let it shake us out of our complacency; democracy is only as strong as the will of its citizens to defend it. |
global_05_local_5_shard_00002591_processed.jsonl/51313 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://payapr.com/erstes-haus-in-italien-7-days-premium-hotel-venedig-mestre-eroeffnet-das-siebte-hotel-der-plateno-group-in-europa/20%Monthly2019-10-02 07:00 |
global_05_local_5_shard_00002591_processed.jsonl/51329 | I use design thinking and lean principles to create value.
If you’re here, odds are you’d like to learn a bit more about me.
This site is where I share my background, thoughts (coming soon), meet clients, and tinker with new tech. Feel free to reach out using the link below - I'd love to hear from you. |
global_05_local_5_shard_00002591_processed.jsonl/51343 | Muse Ecology
Manage series 2167977
At Muse Ecology, we hear voices and grooves of people and place as we make our way back to harmony with the song of life.
22 episodes |
global_05_local_5_shard_00002591_processed.jsonl/51353 | Postcode 17, Adelaide Close, Lincoln
About the Address 17, Adelaide Close, Lincoln
Postcode LN5 9XN is the address of 17, Adelaide Close, Lincoln which is in East Midlands region of England. 17, Adelaide Close, Lincoln is within Waddington West wardof administrative division of Lincoln It falls under constituency Sleaford and North Hykeham. The nearest station is Hykeham which is 3.55km away from the postcode. The postcode LN5 9XN is under the Lincolnshire police force and Anglian Water is the main water supplier in the area
Postcode Search Result 17, Adelaide Close, Lincoln
Address Details: 17
Adelaide Close
East Midlands
United Kingdom
Parish: Waddington
Ward: Waddington West
Administrative Division: Lincoln
Country/State: Lincolnshire
Constituency: Sleaford and North Hykeham
Region: East Midlands
Country: England
Map of LN5 9XN - 17, Adelaide Close, Lincoln
Tavel around LN5 9XN
Nearest Station: Hykeham
Distance: 3.55 km
Other Useful Info of LN5 9XN
Water: Anglian Water
Police: Lincolnshire
What is Postcode Finder?
What is Postal Code?
What is the Difference Between Postcode and ZIP Code?
A Postcode Area is the first part of the Outward Code. It is an initial string of the letters(all the characters before the first number). It is 1 or 2 characters long and always alphabetical. In the postcode LN5 9XN, LN is the Postcode Area whic falls under post town Lincoln.
The Postcode District is the last part of Outward Code. It is one digit, two-digit or a digit followed by a letter. In the postcode LN5 9XN, 5 is the Postcode Disctrict.
The Inward Code is the second part of the postcode(after space). It is always three characters long and always begins with a letter. The Inward Code assists in the delivery of post within a postal district. In the postcode LN5 9XN, 9XN is the Inward Code. You can find out the Inward Code of a postcode using the Postcode Finder tool.
Postcode Sector is the first part of the Inward Code. It is made up of a single digit (the first character of the inward code). In the postcode LN5 9XN, 9 is the Postcode Sector.
Postcode System in the UK
UK has one of the best postal code system in the world. This system was adopted nationally between 1960 - 1970 and then improved by Royal Mails which is the oldest postal service company in the UK. Each postcode(e.g. LN5 9XN) is consist of two parts, named as Outward Code (e.g. LN5) and the Inward Code (e.g. 9XN). The Outward Code and Inward Code are separated by a single space.
Postcode Finder Result Details
Postcode Statistics
Total postcode areas 124
Total postcode district 2,984
Total postcode sectors 11,197
Total postcode units 1,767,416
My Current Postcode
Nations Covered in Postcode Finder
How to Use Postcode Finder?
Can I Search by Postcode?
Source of Information
|
global_05_local_5_shard_00002591_processed.jsonl/51354 | Broken Things Not Meant To Last.
"Can't put your mind in a cast
but broken things aren't meant to last
Like walking on broken glass
reminding you bout scars of past
cause the world went by so fast
But not you, your stuck
left alone and out of luck
they hunt you down when your mind says duck
need a hug?
i don't think so
cause your on a sinking boat
knowing that you can't float
you drown in your sorrows
imprisoned, no bridge across This moat."
This poem is about:
My community
My country
Our world
you guys, do you even know How to comment or are you just purposely not commenting? i Want to get better and i thought that one of you would get that but 108 poems later and not a single comment
Need to talk?
|
global_05_local_5_shard_00002591_processed.jsonl/51361 | In 2015, the U.S. Supreme Court granted same-sex marriage legal in all 50 states. This monumental decision granted LGBT individuals all of the same privileges heterosexual couples benefit from. These benefits include tax exemptions, improved social security, and insurance advantages. Here are 5 things you need to know about LGBT divorce.
Before the 2015 ruling, 13 U.S. states banned LGBT marriage. LGBT couples were forced to travel to other states or countries if they wanted to get a divorce. Regardless of the state you live in, all LGBT marriage laws are now the same. On the other hand, LGBT divorce laws differ from state to state.
LGBT Divorce Residency Requirements
In order to file for divorce, you must have resided in the state you wish to file for at least six months. Your state may have its own specific laws regarding LGBT divorce, so consult a Pride Legal LGBT Divorce Attorney before taking any actions.
Your divorce may be more complicated if your marriage occurred before the federal law. Contact a Pride Legal LGBT Divorce Attorney for assistance.
The Basics of LGBT Divorce
Regardless of the state you live in, the LGBT divorce process is typically the same. Although LGBT divorce is legal in all 50 states, some states offer a fault-based process. In these states, spouses can list a reason for their divorce, typically marital misconduct.
All states LGBT divorce processes include child support, child custody, division of marital assets, and spousal support.
Division of Property
In any courtroom divorce, a judge will separate a couples marital assets and debts. If the divorce-seeking LGBT couples were married before the Supreme Court’s 2015 ruling, an unfair asset settlement may arise. Depending on the state you live in, asset division processes may vary.
For example, Michigan is not a community property state, which means that spouses divide their assets equally. California, on the other hand, is a community property state, which means that divorcing spouses may not always receive equal settlements.
If one spouse purchased an asset prior to marriage, a court would typically consider this asset separate property, meaning he or she would keep the asset in a divorce. If the couple was seeking marriage at a time when LGBT marriage was not legal in their state, the judge may split the asset’s value. A judge’s discretion plays a vital role in LGBT property divisions.
Custody and Child Support
Legal battles over children are especially tumultuous amongst LGBT spouses. Divorcing LGBT spouses often use discriminating parentage laws against each other. Creating a parenting plan with your significant other may help you avoid disputes.
Many LGBT spouses adopted children before same-sex marriage was federally legalized. Spouses who adopted their children before marriage find it virtually impossible to adopt their significant other’s children. If a spouse was never considered the child’s legal parent, most state courts will not grant visitation, custody, or parental rights to the non-biological, non-adopting parent. This can be disastrous for the spouse who may have raised the child but was never legally considered his or her parent.
In order to ensure a more seamless process for both spouses, LGBT marriage and divorce laws must be further developed. LGBT divorce outcomes vary depending on the state in which they were filed.
Alimony, commonly referred to as spousal support, is especially complicated in LGBT relationships. Many LGBT couples have been together before 2015, the year the U.S. Supreme court legalized same-sex marriage. Based on a number of factors, a judge might consider awarding alimony to a lower-earning spouse.
Judges contemplate a multitude of factors when determining alimony. These factors may include the length of the marriage, both spouses’ individual income, and child circumstances. Your alimony outcome greatly depends upon the state in which you married and the state in which you choose to divorce. For example, California offers “palimony”, or financial support for unmarried partners. On the other hand, most conservative states would not consider many factors when determining spousal support. If you have any questions regarding your same-sex divorce, contact a Pride Legal LGBT Divorce Attorney today.
Settlement Agreements
In order to avoid serious financial and emotional conflict, Pride Legal recommends settling your divorce outside of the courtroom. Mediation, the often the go-to process for LGBT spouses who choose not to go to court, allows spouses to reach divorce settlements without a judge’s discretion. While settlements can be reached between you and your divorcing spouse in mediation, a judge has the ultimate authority to make decisions in a courtroom. Mediation is often considered to be the easiest, most inexpensive method when reaching an LGBT divorce settlement agreement.
Contact Pride Legal
If you or a loved one is seeking a divorce, we invite you to contact us at Pride Legal for legal counseling or any further questions. To protect your rights, hire someone who understands them. |
global_05_local_5_shard_00002591_processed.jsonl/51386 | USGS Arctic Science Strategy
Fact Sheet 2015-3049
By: and
The United States is one of eight Arctic nations responsible for the stewardship of a polar region undergoing dramatic environmental, social, and economic changes. Although warming and cooling cycles have occurred over millennia in the Arctic region, the current warming trend is unlike anything recorded previously and is affecting the region faster than any other place on Earth, bringing dramatic reductions in sea ice extent, altered weather, and thawing permafrost. Implications of these changes include rapid coastal erosion threatening villages and critical infrastructure, potentially significant effects on subsistence activities and cultural resources, changes to wildlife habitat, increased greenhouse-gas emissions from thawing permafrost, threat of invasive species, and opening of the Arctic Ocean to oil and gas exploration and increased shipping. The Arctic science portfolio of the U.S. Geological Survey (USGS) and its response to climate-related changes focuses on landscapescale ecosystem and natural resource issues and provides scientific underpinning for understanding the physical processes that shape the Arctic. The science conducted by the USGS informs the Nation's resource management policies and improves the stewardship of the Arctic Region.
Suggested Citation
Shasby, Mark, and Smith, Durelle, 2015, USGS Arctic science strategy, 2015–2020: U.S. Geological Survey Fact Sheet 2015-3049, 2 p.,
ISSN: 2327-6932 (online)
ISSN: 2327-6916 (print)
Study Area
Additional publication details
Publication type Report
Publication Subtype USGS Numbered Series
Title USGS Arctic Science Strategy
Series title Fact Sheet
Series number 2015-3049
DOI 10.3133/fs20153049
Year Published 2015
Language English
Publisher U.S. Geological Survey
Publisher location Reston, VA
Contributing office(s) Alaska Regional Director's Office
Description 2 p.
Other Geospatial Arctic Circle boundary
Online Only (Y/N) N
Additional Online Files (Y/N) Y
Google Analytic Metrics Metrics page |
global_05_local_5_shard_00002591_processed.jsonl/51395 | Combining Content, Argument, and Structure—The Workshop
The workplace has become increasingly diverse and global. This diversity has dramatically changed the dynamic of the workplace over the last 50 years. Regardless of race, ethnicity, and gender, people want to be treated fairly.
Research workplace harassment using the following resources: The U.S. Equal Employment Opportunity Commission. (2002, June 27). Facts about sexual harassment.
Retrieved from Workplace Bullying Institute Web site. Retrieved from
Suppose you work for an organization that currently does not have an antiharassment policy. You are going to develop an antiharassment policy for the organization and persuade the CEO to adopt it. Create a PowerPoint presentation to convince the CEO of the need for such a policy. Use the speaker notes area to write explanations and arguments and to cite sources. Address the following in your presentation: What is the purpose of your proposed antiharassment policy? Why would implementing this policy be beneficial for the CEO? What’s in it for him or her? Why is it important to have such a policy in place? If the basic purpose is to stop harassing behavior, why is that important? Why is harassment detrimental to an organization? What is your communication plan? How should the CEO present the policy to the staff? What specific communication methods do you recommend, and what will the communication say?
Develop an eight- to ten-slide presentation in PowerPoint format. Apply APA standards where appropriate for references. |
global_05_local_5_shard_00002591_processed.jsonl/51405 |
avatar for Helena Edelson
Helena Edelson
The Axis Initiative
Helena is using AI and complex adaptive systems to study and help endangered species under climate change, biodiversity loss, human-wildlife conflict and illegal wildlife trade. Bridging academia and industry, she is a member of the Environmental Intelligence team of the Interagency Arctic Research Policy Committee, The Snow Leopard Network, SEA lab at Oregon State University and CEO of The Axis Initiative. She was formerly a Senior Data and Distributed Systems Engineer, Platform Infrastructure Engineering at Apple; Principal Engineer at Lightbend and member of the Akka team; Senior Cloud Engineer at CrowdStrike; Senior Software Engineer, Analytics Team at DataStax; Senior Cloud Engineer at VMware. She has been a keynote speaker and session speaker at big data, scale and Scala conferences internationally.
Twitter Feed |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.