id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_6_shard_00002272_processed.jsonl/4372
Barbara Grüning The representation of third places in the novels of eastern German authors • Abstract Informations and abstract Keywords: city, acknowledgment, Heimat, narrative literature, German Democratic Republic. The novels of East German writers often offer the possibility to reflect upon the difficult sociocultural acknowledgment between East and West Germany after Reunification. While the official narratives symbolize the festive character of the inter-German «meeting», most of the East German novels make visible the friction points of this meeting by narrating the everyday life in the urban space. By showing the urban transformations in East Germany the novels highlight how East Germans need a place to feel acknowledged and to tell their own story. Furthermore, the novels allow the memories and imageries entangled in the urban context to emerge, thus offering a peculiar point of view with which to look at the question of a shared belonging. Indeed we can argue that the novels constitute a terrain of mediation and exploration where both East and West Germans can image new forms and places of sociability and togetherness. Trova nel catalogo di Worldcat Article first page Article first page
global_05_local_6_shard_00002272_processed.jsonl/4397
Stop Coyote Attacks I feel for our native coyote and their desperate search for food in San Diego. But coyote attacks have become a serious problem. But my heart also breaks when friends and family members lose their beloved dogs and cats to coyote attacks. Eve and Greg Sieminski with Iron Fist Brewing recently lost their beloved Lily, a sweet little dog
global_05_local_6_shard_00002272_processed.jsonl/4418
Share this page Share You are here Here'Articles' Amistad Slave Ship: Cinque, Was Himself A Slave Trader Twitter FaceBook Search Comment Free Speech Free Speech ? Use it or LOSE it ! Populist and Populism are NOT four letter words. They just describe Democracy from the ground up. It's the Greatest Good, for the Greatest Number. Sean Bryson - Notting Hill - London W11 - UK may be a danger to you. are a danger to you. Sean Bryson How The British Empire Abolished Slavery Black slavers resisted abolition Black slave traders resisted abolition by Britain Jews & White Slavery Africa and the atlantic slave trade Chiefs Apologise African chiefs urged to apologise for slave trade History African slave traders: A history Slavery and Race Slavery and race Black Slave Owners Dixie's censored subject: black slave owners Black Slave Traders Black African slave traders Black slave owners and slave masters Black slaveowners & slave masters Sell Out Did african slave traders sell us out ? European imperialism ended slavery worldwide European imperialism ended slavery worldwide Britain 1807 In 1807 Britain outlawed slavery Slavery Slavery in the Arab World Islamic Slavery Islamic Slavery and Racism Slavery in Israel Contraband Women - naive slavic women in Israel Jews & White Slavery Jews and the white slave trade Blaming White Folk On Blaming White Folk For Slavery Sex slavery Israel Sex slavery in Israel today Slavery African Connection Slave Trade: the African Connection, ca 1788 Slavery & Race Slavery and Race: Gearld A Foster Slavery Africa Slavery in Africa Slavery Myths Slavery myths debunked Truth about Slavery The truth about slavery White Slaves White Slaves, African Masters Spacer xxx Spacer xxx Spacer xxx William Wilberforce (Amazing Grace) Anti Slavery Campaigner William Wilberforce From However, this did not abolish slavery. He would frequently introduce a private member’s Bill abolishing slavery. Passage of the Bill through the House of Lords was assured. Wilberforce exclaimed: (What would that be worth today ?) On that date slavery was abolished throughout the vast British Empire. William Wilberforce - A Great Man Forgotten The British Crusade Against Slavery Abraham Lincoln and the abolition of slavery Origins of the Slave Trade - Africans sold Africans The untold story of the Arab Slave Trade Of Africans The truth about The Arab Slave Trade In Sudan The Truth About Slavery: Past, Present and Future Rogues Gallery Rogues Gallery ...  And, superiority excites envy. –Joseph Sobran (Sobran’s — April 1997)" I want and believe in self determination for my people said the Black man. I want and believe in self determination for my people said the Brown man. I want and believe in self determination for my people said the White Racist. Cinque, the Amistad Hero, Was Himself a Slave-Trader For 20 interminable minutes in "Amistad," Steven Spielberg lingers over scenes of whites torturing black slaves with the lurid attention of a pornographer. The rest of the film--the fine courtroom oratory, the black & white solidarity, abolitionist "idealism"--is all window-dressing to persuade the liberal intellectuals in the theatre audience to feel good about Spielberg's anti-white horrorshow. But the core message of "Amistad" can be summed up in two words from the ghetto: Hate Whitey. With Amistad, Steven Spielberg, hailed as a latter-day secular Jewish saint, has set the cause of harmonious race relations back decades. He perpetrated a similar ruse in "Schindler's List." His stratagem in that flick was to demonize the German people but to do so within the framework of a humanist gloss. So the putative hero, Schindler, is a German and nominally, a Christian. From there, Spielberg was able to mount a demonic stereotype that no one but a Jew could get away with in these hyper-sensitive, "human rights" times. Spielberg stereotyped the entire German army--every one, to a man--as black-jacketed minions of Satan. Amistad is equally pathological. If we shed the window-dressing, it's a sado-masochist ritual. Sadistic whites torture noble blacks. Noble blacks retaliate, and we watch them dismember trembling and quivering white villains who are shown on their knees begging for mercy. An honest film about slavery is needed, but Spielberg will never be the one to furnish it. Such a film would entail three components, all of them forming the critical element missing from Amistad--context. 1. Cameras would detail the horrors of the black-on-black slave trade on the Dark Continent itself, where black chiefs captured, shackled, tormented and sometimes massacred their fellow Africans. The survivors of this terrible ordeal were sold to the Europeans. 2. Cameras wouild detail the horrors of the white on white slave trade emanating from Britain. Court historians like to pretend that the phenomenon of the "press gang" (armed men who kidnapped whites by force) was chiefly an activity of the British navy. In fact, the naval press gang was made possible by the precedent established by gangs of 17th century kidnappers (originally called "kid nabbers") who stole ("nabbed") children (kids) by guile or with a blow on the head, for shipment to the colonies for sale as slave labor. The very word kidnapping has its origin in this white enslavement. In the 18th and 19th centuries, whites were whipped to death in the Continental Army and the US Navy ( where the lethal practice was known as "flogging through the fleet" ). This was an age of cruelty and to suggest that only blacks experienced cruel treatment or that they were singled out for it, is the sort of subversive mendacity that can only heighten black racial paranoia. 3. Where in 19th century Africa could a slave receive the kind of hearing that white Christians gave Joseph Cinque and his little band? Ours was an extraordinary civilization, deeply flawed, but incomparably just and humane compared with what prevailed in Asia and Africa at the time. Moreover, Spielberg's Amistad hoax is defeated by a solitary historical fact: Joseph Cinque was himself a slave trader, selling his fellow blacks into this horror after he himself was set free by a US court. Amistad producer Debbie Allen calls this destabilizing fact a "rumor." She'd better. If the thinking public, black and white, discover that "noble" Cinque later sold his own people in the very manner he condemned, then there will be a second mutiny, this time against Spielberg and his shameless hoaxing. Here is Samuel Eliot Morrison, one of the most distinguished of American historians, writing in his "Oxford History of the American People," (New York: Oxford Univeristy Press, 1965), p. 520: "The most famous case involving slavery, until eclipsed by Dred Scott's, was that of the Amistad in 1839. She was a Spanish slave ship carrying 53 newly imported Negroes who were being moved from Havana to another Cuban port. Under the leadership of an upstanding Negro named Cinqué, they mutinied and killed captain and crew. Then, ignorant of navigation, they had to rely on a white man whom they had spared to sail the ship. "He stealthily steered north, the Amistad was picked up off Long Island by a United States warship, taken into New Haven, and with her cargo placed in charge of the federal marshal. Then what a legal hassle! Spain demanded that the slaves be given up to be tried for piracy, and President Van Buren attempted to do so but did not quite dare. "Lewis Tappan and Roger Sherman Baldwin, a Connecticut abolitionist, undertook to free them by legal process, and the case was appealed to the Supreme Court. John Quincy Adams, persuaded to act as their attorney, argued that the Negroes be freed, on the ground that the slave trade was illegal both by American and Spanish law, and that mankind had a natural right to freedom. "The court with a majority of Southerners, was so impressed by the old statesman's eloquence that it ordered Cinqué and the other Negroes set free, and they were returned to Africa. The ironic epilogue is that Cinqué, once home, set himself up as a slave trader." (End quotation from historian Samuel Eliot Morrison) Any time German-Americans or white Southerners try to advance a truthful historical thesis that happens to be revisionist we are wrongly smeared as being "just like Nazi propagandist Joseph Goebbels." Now that we know Hollywood director Steven Spielberg is advancing fraud in Amistad and calling it history, he ought to be rightly compared with another highly skilled Jewish illusionist, next to whom "Jupp" was a paragon of veracity. Spielberg's Amistad movie is reminiscent of nothing less than the poisonous Communist lies of Stalin's propagandist, Ilya Ehrenburg. --Michael A. Hoffman II Copyright©1997 To view "Black" novelist Barbara Chase-Riboud's lawsuit against Spielberg concerning his theft of her thunder (and her made-up story), locate Chase-Riboud v. Dreamworks, Inc. at: Pages of Image Links 155 X 155 Image links on Images 155 X 155 155 X 103 Image links on Images 155 X 103 155 X 50 Image links on Images 155 X 50 Images 200 X 65 Images 200 X 149 Immigration Into The West Immigration & The West
global_05_local_6_shard_00002272_processed.jsonl/4463
You’ve heard about the health benefits of taking probiotic pills and eating fermented foods. A healthy gut microbiome depends on a happy microbial balance and that means incorporating probiotics into your diet. But what about using probiotics for your skin? Instead of fighting painful skin rashes like eczema and psoriasis with antibiotic creams and steroids, what if you could resolve them with … topically applied bacteria. That’s right. The word is out about the benefits of topical probiotics for your skin microbiome. And the more we learn, the more researchers, practitioners, and even beauty industry insiders are getting on board with beneficial bugs. In this article, we’ll examine the role of topical probiotics for your skin, the emerging science behind them, and a few ways you can start to experiment with topical probiotics today. Woman's back and skin Probiotics for your skin… not just for your gut Microbiomes aren’t isolated to your gut. In fact, there are different microbiomes all over your body, from your armpits to your nasal cavity to your colon. When these microbial populations are balanced, they can help fight pathogens and inflammation, neutralize toxins spewed out by bad bacteria, and block nasty exogenous compounds. When a microbiome is out of balance – that’s when health issues arise. A balanced skin microbiome will: • Maintain an ideal skin pH • Overpower non-beneficial bacteria and guard against fungi, viruses, and other pathogens • Produce protein toxins called phenol-soluble modulins that stop the proliferation of bacteria that cause chronic skin rashes, S. aureus and Group A Streptococcus • Help with wound healing • Protect your skin from harmful UV radiation • Protects your skin from allergens • Help maintain skin moisture Polluted water What happens when your skin microbiome is unhealthy Just like your gut microbiome, your skin microbiome needs to maintain a delicate balance of beneficial and non-beneficial bacteria. When you disrupt this balance, “bad” or non-beneficial bacteria, fungi, viruses and other pathogens get the chance to thrive. One example is Staphylococcus aureus, a bacteria found in large concentrations in chronic rashes – especially eczemaS. aureus is also well-known for developing antibiotic resistance, which is likely why those antibiotics aren’t working for your eczema. (1) Fungi like Malassezia can also take over. This one contributes to conditions like atopic eczema, dermatitis, pityriasis (tinea) versicolor, seborrheic dermatitis, or folliculitis, and can exacerbate into systemic infections. (2) Other signs of an imbalanced skin microbiome include: Vintage Phone An imbalance in skin microbes can affect your immune system The microbes that exist naturally on your skin can also affect your immune system. Skin-associated lymphoid tissue, or SALT are lymphocytes (immune cells) that work in tandem with bacteria to communicate with the lymph nodes inside your body. Think of these immune cells as the front lines of your immune system. They constantly communicate with the rest of your body to determine the right immune response, depending on possible outside invasions/assaults. But the main way SALT works is in a delicate balance with the microbes on your skin. So you can imagine the issues that can arise if your skin microbiome is out of balance and bad bacteria are on the rise. (3) An unhealthy skin microbiome can affect your entire immune system. Ways your skin microbiome goes out of balance How can you protect your skin microbiome? The first step is to understand what creates an imbalance in the first place. Just like your gut, your skin microbiome is easily damaged by everyday products and habits. Here are the main offenders: Antibiotics and steroid creams While these come with good intentions, antibiotics and steroid creams can exacerbate skin rashes. Whether taken internally or externally, antibiotics wipe out all bacteria indiscriminately, creating opportunities for bad bacteria to take over. This results in inflammation and a host of other symptoms that can take years to resolve. Steroid creams suppress your skin’s immune response and constrict blood flow to your skin cells. This may help with symptoms in the short term, but restricts nutrients and oxygen from your skin in the long-term, which will inhibit healing. Plus, steroid creams come with their own host of side effects. Hand wiping water drops off glass Environmental and chemical exposures Your skin is meant to serve as a protective barrier, but it’s not immune to the harsh chemicals you’re exposed to on a daily basis. Pollution in the air and water, plus the many toiletries we slather and spray on our bodies can decrease microbial diversity and give bad microbes the chance to thrive. And while soap can be harsh, even water alone can cause problems! I never forget the horrifying moment when I discovered at the beginning of my eczema journey that water could burn my poor skin so badly. It ultimately caused me to wear disposable gloves on my hands (which were affected) to avoid constant handwashing. One of the reasons this happens is because of the significant pH difference between the skin barrier and water itself. Plus there is a litany of chemicals and drugs in tap water that can also irritate your skin. Thyroid issues Low thyroid hormone decreases circulation, which slows the flow of nutrients and oxygen to your skin cells. That means your cells have a harder time repairing, and regenerating. Reduced circulation also reducing waste removal from the skin leaving the cells to swim in a more toxic environment. When cells don’t have what they need for healthy turnover, old skin cells stick around longer, pile up, and cause rashes and infection. Less thyroid hormone also prevents skin cells from creating the necessary energy to turnover efficiently. Woman washing her skin in bath Overuse of hand sanitizers and antibacterial soaps Antibacterial soaps, gels, and lotions are a lot like antibiotics – they kill everything, not just the bad microbes. Overuse of hand sanitizers and other antibacterial products can lead to antibiotic resistance and strip your skin of beneficial microbes. Stick with more natural soaps and lotions that contain few ingredients. And ditch the antibacterial products that contain triclosan and other antimicrobial ingredients that even the FDA has issued warnings about. Stress triggers a hormonal cascade that can directly affect your immune system. Since chronic, painful skin rashes like eczema and psoriasis are related to your immune system, it’s important to keep it strong and balanced. Stressful situations probably aren’t going anywhere, but you can control your reaction to stress. Check out this article (and step-by-step videos) on how to calm your stress response in just two minutes. Related: 5 Reasons Why Your Rash Won’t Go Away Probiotics for your skin you can try today Probiotics aren’t just for your gut! Many researchers, practitioners and beauty experts are looking to specific beneficial microbes to help heal a variety of skin conditions. The best part about topical probiotics is that they’re relatively harmless. Plus, you can try many of these at home without a prescription. Here are the best ways to use topical probiotics for your skin microbiome to put an end to your chronic skin rashes: Yogurt Mask Yogurt masks Live cultures in your yogurt are made up of immune system supporting probiotic strains like Lactobacillus acidophilus, Streptococcus thermophilus, and Bifidobacteria. (4) These are known for balancing bacteria and crowding out non-beneficial microbes to help decrease inflammation and support your immune system. In the event that you have an IgG sensitivity or lactose intolerance to dairy products, you can still apply them topically. However, if you have an allergy to dairy, then you should avoid contact with yogurt. You could potentially try a vegan yogurt alternative or the next suggestion (see the section on topical probiotic application). Here’s how to use yogurt topically for your skin rashes — A simple yogurt mask may help with chronic skin conditions like eczema, psoriasis, rosacea, and acne. Spread a thin layer of unflavored (plain), organic yogurt on your skin. Leave it on for 10-15 minutes and rinse with lukewarm water. Kimchi with Probiotics Topical probiotic applications This approach allows you to find probiotic pills with specific strains, as opposed to using yogurt with unmeasurable levels of bacteria. I have a number of clients who have had success with this. Here’s how to apply probiotics on your skin — Apply some organic, cold-pressed skin oil like jojoba, sunflower, or hemp seed oils to the affected area. Then take an oral probiotic capsule and open it. Lightly sprinkle some of the probiotic directly on to the oil and gently massage it in. You can leave this on your skin for 15-20 minutes, though I’ve had some clients leave it on overnight. Put the rest of the capsule aside for future applications since you may not use the entire capsule depending on how extensive the affected area is. MegaSporeBiotic is a great option for both external (topical) use. It’s also great for internal gut microbiome rebalancing (assuming you’re not on an immunosuppressant or biologic medication, or have a compromised immune system). Anecdotally, MegaSporeBiotic with shea butter may reduce inflammation and improve moisture retention. Probiotic soaps and moisturizers Even the cosmetic industry is getting on the bacteria bandwagon, incorporating beneficial bacteria into face creams and cleansers to help correct skin microbe imbalances. There are pluses and minuses to this reality with many of the claims being more hype than fact. That doesn’t mean that there aren’t skin care companies out there producing quality topical probiotics for your skin. Some of the probiotic skincare brands that I like include Mother Dirt, Bioesse, and Skin Probiotics. Custom skin creams Custom creams using your own microbes Everyone, even those of us with skin rashes, have healthy patches of skin – patches where the microbial diversity is high and the bad guys haven’t taken over. Scientists believe that by isolating the “good guy” bacteria in these healthy areas, they can make custom creams that balance your skin microbiome in a more holistic way. (5) That’s right – a custom probiotic skin cream made from your own bacteria! Certainly this would be an option for the future, but for now, you can certainly try this “home remedy” — Apply some organic, cold-pressed skin oil like jojoba oil or avocado oil to a healthy area of skin. (Remember to avoid using coconut oil — HERE'S WHY.) Then using a cotton swab, gently rub the swab around to pick up the oil and healthy bacteria from the skin. Apply it on the affected area to help re-innoculate that particular rashed spot with a healthier mix of skin flora. Woman on bike wondering if topical probiotics for your skin are safe? Are topical probiotics for your skin safe? When it comes to topical probiotics, the science is still young, but promising. Although I haven’t heard of any adverse reactions to using at-home topical probiotic treatments, I recommend doing a spot test with any new formulation before regular use. Anecdotally, I’ve seen excellent results and recommend topical probiotics to many of my clients. Most recently, a client used both internal and topical probiotics for her son’s persistent rash. She saw huge improvements as his gut healed, but the real difference was just days after they started to use a topical probiotic. For even more details about your skin microbiome, don’t forget to check out this article. And since every microbiome in your body is linked, you can start your journey back to healthy skin by eating the right foods. My free guide to Eczema Soothing Smoothies has helped thousands of people get started! Every recipe is gluten-free, dairy-free, and packed with skin-healing superfoods so you can begin healing from the inside-out. Not sure where to start with your skin rash? I also created this list of Root Cause Skin Tests so you can get to the bottom of your skin ailments fast. And one final thought — topical probiotics aren’t a quick or sure-fire fix. Skin issues take time to heal (here’s the deal on how long it takes). And they require a serious dose of persistence and consistency as you dial in your unique protocol. Helping to rebalance your skin’s microbiome is one critical piece of your larger skin rash puzzle. KEEP READING — Can Skin Baths Help Or Do Harm To The Microbiome? 1. Otto, M. Staphylococcus epidermidis – the “accidental” pathogen. Nat Rev Microbiol. 2009 Aug; 7(8): 555-567. 2. Saunders CW, Scheynius A, Heitman J. Malassezia Fungi Are Specialized to Live on Skin and Associated with Dandruff, Eczema, and Other Skin Diseases. Goldman WE, ed. PLoS Pathogens.2012;8(6):e1002701. 3. Streilein JW. Skin-associated lymphoid tissues (SALT): origins and functions. J Invest Dermatol. 1983 Jun;80 Suppl:12s-16s. 4. Ferdousi R, Rouhi M, Mohammadi R, Mortazavian AM, Khosravi-Darani K, Homayouni Rad A. Evaluation of Probiotic Survivability in Yogurt Exposed To Cold Chain Interruption. Iranian Journal of Pharmaceutical Research : IJPR. 2013;12(Suppl):139-144. 5. Nakatsuji T, et al. Antimicrobials from human skin commensal bacteria protect against Staphylococcus aureus and are deficient in atopic dermatitis. Science Translational Medicine. 22 Feb 2017: Vol. 9, Issue 378, eaah4680. Jennifer Fugo Follow Us Medical Disclaimer
global_05_local_6_shard_00002272_processed.jsonl/4471
Is The Paperless Office A Reality? Is The Paperless Office A Reality? Anyone who talks about the paperless office becoming a reality any time soon may want to think again! The amount of paper that is used is not actually decreasing. Paper is simply used in a different way than it used to be. No matter how much you reduce your pulp consumption, computers will never completely eliminate the need for hard copies of certain documents. Technology has simply changed the way we interact with our paper and in some instances, its misuse has actually increased the amount of clutter on people's desks! However, it doesn't have to be that way, if you follow a few simple rules: Consolidate and Coordinate A lot of the battle between electronic and paper comes down to label confusion. You named it something different on your hard drives than you did in your hanging files, and now you can't find what you're looking for. The key to resolving this conflict is consistency. Try to make sure that your electronic system mirrors the one in your filing cabinet. Whatever you called a folder in one place should be what you call a folder in the other. If the paper copy is named “utilities,” don't label it “monthly bills” on your computer, or you'll just get confused later on. Another solution would be to choose one format for each category of information you maintain, and store everything related to that topic together in one place. So if you like to keep your bank statements on your computer, do it consistently for every single account. This could mean signing up for e-billing or scanning in the paper statement when it arrives. If you prefer to organize utility records in your file drawer, that's a good reason to request a paper bill. Just find something that works for you and be consistent. Storing half of one file electronically and the other half in paper format is going to increase the amount of time spent searching for a document. Think Twice Before You Print It's almost a Pavlovian response -- you create a document or receive an email, and the knee-jerk reaction is to hit the “print” button! So instead of helping you reduce the paper in your life, that high-tech box on your desk is actually doubling the stacks and piles you have to deal with! The next time you feel the urge to print, stop and ask yourself why. Do you have a specific reason for needing a hard copy of that item, or can you refer back to it just as easily in electronic format? “I might want to read it later” probably isn't a good enough reason as you can save a copy on your hard drive. “I should share this with so-and-so” doesn't cut it either when send them the document as an email attachment. Some people simply prefer to have hard copies so that they can take specific notes directly on the document. In this case you would want to have something to hold active papers. A Smead Project Folder or a wire rack with labeled SuperTab® Folders would be good solutions for this issue. If you're worried that you might forget to take care of an action item without a mound of paper littering your desk to remind you, your method of dealing with electronic to-do's may be at fault. Keeping track of computerized follow-ups should be no different from handling paper ones. Set up a folder in your email program for each action file category (“to read,” “to pay,” “to contact,” etc.) As requests come in that require your attention, put that message into the appropriate folder. Then set aside time on your weekly admin day to empty each in turn, the same way you would your paper to-do files. If you follow the same steps for processing email as snail mail, there really is no need to print every document out. By Ramona Creel, Professional Organizer
global_05_local_6_shard_00002272_processed.jsonl/4475
Important Characters Elizabeth II. By Sara García Queen Elizabeth II NAME:Elizabeth Alexandra Mary Widson MOTHER:Elizabeth Bowes-Lyon DATE OF BIRTH: April 29,1926 PLACE OF BRITH:Mayfair, London MARRIAGE:Price Philip, Duke of Edinburgh CHILDREN:Charles,Anna,Andrew and Edward EDUCATION:Education at home CORONATION:2 June 1953 Her life At the time of birth Elizabeth would someday would become queen of Great Britain. Her father and mother, also known as the Duke and Duchess of York,there family´s home on the grounds of Windsor Great Park. Elizabeth an her younger sister Margaret were educated at home by tutors. Their studies included french,mathematics,history and geography. They also took dancing,singing and art lesson. In 1936, the course of Elizabeth´s life changed with the death of her grandfather,King George V. Her uncle became King Edward VIII,but he only ruled for six month. At the beginning of the World War II, Elizabeth an her sister stayed out of London spending much of their time at Winsor Castle. From there, she made one of her most famous broadcasts. Over the radio,Elizabeth tried to reassure children who had been evacuated from their homes and families.In 1945,Elizabeth joined the Auxiliary Territorial Service to help in the war effort. Their wedding Princess Elizabeth and Philip were married at 11:30 on 20 November 1947 at Westminster Abbey
global_05_local_6_shard_00002272_processed.jsonl/4478
People Data Labs: Person Data • Over 420 million linkedin urls • Over 1 billion facebook urls and ids. Update Frequency: About the Provider: People Data Lab’s enables product, data, and engineering teams to build powerful products and workflows. Our unmatched scalability and flexibility means you can spend more time using data to drive value to your business. Visit the provider’s website for more information Request Access
global_05_local_6_shard_00002272_processed.jsonl/4480
How you can Improve Your Soccer Betting improve your soccer betting Read More 100% Verified Soccer Tipsters What are the 100% verified soccer tipsters Betting Tips in Soccer? Soccer experts provide you with betting tips, the media publishes the latest news about the opposing teams and their key players, bookmakers support hundreds of betting methods. However, while you ultimately put your enormous wager on a certain favorite, this is the time to … Read More
global_05_local_6_shard_00002272_processed.jsonl/4483
How To Sooth Reactive Skin Conditions By |2018-03-01T14:04:25+10:00March 1st, 2018|Uncategorised| What really is the cause for reactive, sensitive, inflammed & barrier impaired skin? Some will tell you it is diet, others say it's an allergy to bacteria on the skin and even your genetics.  In some ways these are all true.  Genetics does play a part in some skin disorders such as acne [...]
global_05_local_6_shard_00002272_processed.jsonl/4497
[|There is no experimental proof that the disturbance between epidermis and dermis is responsible for the development of psoriasis.|auteur194] The psoriatic fibroblasts, taken from both lesional and non-lesional skin, are capable of inducing hyperproliferation of normal keratinocytes. The molecules responsible for this phenomenon are being studied. Psoriatic patients’ serum contains unidentified molecules capable of accentuating this phenomenon. The destruction of superficial dermal cells by burn or CO2 laser sometimes ends up eliminating the psoriasis plaque for good. These biological and clinical arguments are strong enough to believe that some anomaly in the superficial dermal fibroblasts is the initial anomaly behind psoriasis. However, the superficial dermis contains more than just fibroblasts, and the selective destruction of capillary anomalies observed in the superficial dermis of psoriatic lesions by pulsed dye laser often results on skin cleaning. Interestingly, the remission length is far better in old lesions, very resistant to treatments. SPIN Presentation Follow us The other websites of the foundation
global_05_local_6_shard_00002272_processed.jsonl/4543
 SwissCommunity.org The political System of Switzerland Switzerland’s direct democracy and federalist tradition are unique and the Swiss political system can often be hard to explain to a citizen of another country, for whom it seems unthinkable for a country not to be led by a president or prime minister. A “nation by consensus” Switzerland does not have a single language or culture, but has been described as a “Willensnation” – a nation formed by consensus. The roots of Swiss identity lie in a common history, in shared myths and in the freedoms of grassroots democracy and the federalist tradition. Thus Switzerland has evolved politically into a “special case” in Europe and the world. The different cultures, religions and social minorities which make up Switzerland have led to a unique political system, with the accent on federalism, a wide-ranging right to participate in the political process, a foreign policy based on neutrality and domestic politics based on consensus. Special features of Switzerland Switzerland differs significantly from other democracies: • Direct democracy: the people can directly influence the activities of government through initiatives and referenda. • Federalism: in the Swiss Confederation, constitutional authority rests with the people themselves and the cantons, which retain all functions not directly assigned by the Constitution to the Swiss Confederation. • Consociational democracy: the “cantonal majority” rule means that small cantons carry equal weight to big ones.        The Swiss Confederation explained in brief The Government: People and Parliament The legislature consists of the National Council (representing the people, with 200 deputies) and the Council of States (representing the cantons, with 46 deputies). Together these two bodies make up the Federal Assembly. The executive is the Federal Council, a collegiate authority consisting of seven members, each with equal rights, who are elected by the Federal Assembly. The Federal Council, in turn, elects one of its members to serve as Federal President for a one-year term of office. This “primus inter pares” then chairs the weekly sessions of the Federal Council, but has no special rights over fellow-members. The supreme organ of the judiciary is the Federal Supreme Court, based in Lausanne. However, political power in the country rests with Parliament and the people, rather than the Federal Council. The people play a quite direct and effective part in political life through referenda, and, by gathering the required number of signatures, can intervene in political affairs at any time. The Federal Assembly Referenda and elections The Swiss electorate has at least four opportunities each year to vote on national proposals. Parliament is re-elected every four years, and there are also cantonal referenda and elections. Many foreign politicians are mystified that the Swiss actually vote in favour of tax rises when necessary and are amazed at the political maturity of the Swiss voting public. In the light of the very rapid development of information and communication technology, the Federal Chancellery has been pursuing a project since 1998 to allow political rights to be exercised by electronic means. Working with the pilot cantons of Neuchâtel and Zurich, it has tested systems of casting votes electronically. Now many cantons are in the process of introducing e-voting, which will make it much easier for Swiss citizens abroad to cast their votes and will facilitate political involvement overall.  Democracy: The Swiss political system The portal ch.ch explains in plain and simple language complex terms like democracy, concordance and political participation. Explore Switzerland Mountain road Strategic Partners Swiss Review: switch to the digital editionMy Swiss PhoneGazzetta Svizzera
global_05_local_6_shard_00002272_processed.jsonl/4572
Cyborg Rose: Researchers Implant Electronic Circuits Inside Plants For the first time, Swedish scientists from the Linköping University combined one of Mother Nature's vascular systems with modern electronic circuit. Professor Magnus Berggren, Linköping University's Strategic Research Centre for Organic Bioelectronics director and Organic Electronics professor, led the groundbreaking research where a living plant's vascular system was used to create an electronic circuit's key mechanisms. The team at Laboratory of Organic Electronics (LOE) is hopeful that the cutting-edge research would give birth to organic electronics and new tools. To perform certain internal functions, plants depend on hormone and ionic signals movement. However, the plant's slow operational timeline made intervention difficult, becoming a challenge to many scientists. The Swedish researchers used electronic signals to tap into the plant's chemical processes, making way for a merger that allowed the team to interact with the plant's chemical pathways and enable them to control the growth regulators, photosynthesis-based fuel cells and other devices that play roles in the plant's internal functions. "Previously, we had no good tools for measuring the concentration of various molecules in living plants. Now we'll be able to influence the concentration of the various substances in the plant that regulate growth and development," said study co-author Ove Nilsson, plant reproduction biology professor and Umeå Plant Science Center director. The idea of embedding electronics into trees began in the 1990s when the LOE team were studying the potential of printed electronics for the paper industry. Professor Xavier Crispin, leader of the LOE's solid-state device team and assistant professor Daniel Simon, LOE's bioelectronics team leader work on the project's first few attempts. Due to lack of funding, the projects were put on hold. In 2012, Knut and Alice Wallenberg Foundation granted new research money to revive the halted project. Now led by Professor Berggren, the new research team tried embedding various conductive polymers via a rose's stem. A polymer called PEDOT-S emerged as the only successful polymer and rooted itself as conducting wires inside the plant's xylem channels. The merger was able to retain water and nutrients transports. The combination led to the creation of an electrochemical transistor that converts ionic signals into electronic output. The research team then sucked out the air from the rose's leaf and filled it with the same polymer using the vacuum infiltration process. This lead to the creation electrochemical cells pixels segregated by the veins. When voltage was applied, the polymers interacted with the leaf's ions causing it to change color. The early findings could eventually lead to the development of sustainable and environmental energy applications using organic electronics. The research was published in the journal Science Advances. ⓒ 2018 All rights reserved. Do not reproduce without permission. Real Time Analytics
global_05_local_6_shard_00002272_processed.jsonl/4574
Minecraft For Nintendo Switch To Launch On May 11: How Is It Better Than The Nintendo Wii U Version? The Nintendo Switch version of Minecraft is set to be released on May 11, expanding the number of platforms where the popular block building game is playable. Minecraft's launch to the Nintendo Switch is largely expected to draw the same success as Mario Kart 8 Deluxe. Both games were released for the Nintendo Wii U, which was considered a failure compared to its predecessor, the Nintendo Wii. 'Minecraft' For Nintendo Switch: Better Than The Nintendo Wii U Version Minecraft for the Nintendo Switch does not add any new features, but it does include the Super Mario Mash-Up Pack that was released as DLC for the Nintendo Wii U version. This is similar to what was done for Mario Kart 8 Deluxe, which was released for the Nintendo Switch with all the unlockables unlocked except for Gold Mario. The package contains content inspired by games such as Super Mario 64, Super Mario Sunshine, and Super Mario World. This includes 40 skins such as Mario, Luigi, and Princess Peach; Super Mario textures; Super Mario World for exploration; and Super Mario 64 music. The free inclusion of the Super Mario Mash-Up Pack is not the only thing that sets the Nintendo Switch version apart from the Nintendo Wii U version though. The updated game will be running at 60 frames per second, and will feature a much bigger world compared to what can be found in its previous iteration. For the Nintendo Wii U, the maximum size of worlds was only 864 x 864 blocks, but for the Nintendo Switch, the maximum size has been increased to 3,072 x 3,072 blocks. This is 13 times larger, but still smaller than the massive worlds of 5,120 x 5,120 blocks that can be created on the PlayStation 4 and Xbox One editions of Minecraft. Players who purchased Minecraft for the Nintendo Wii U will eventually be able to transfer their creations to the Nintendo Switch version. The feature is not yet available, but developer Mojang promised that it is on its way. The Nintendo Switch version also offers a multiplayer experience of up to four players on a single screen locally and up to eight players through an online server. The game, however, requires each player to have a pair of Joy-Cons, so a good number of extra controllers will be needed to maximize the multiplayer experience. The game, however, comes with a certain limitation. There is currently no voice chat support for the Nintendo Switch, which means that multiplayer session on Minecraft will need a separate app for communication among friends. Nintendo Switch 'Minecraft' Release Date Minecraft will be released on the Nintendo Switch's eShop on May 11 with a price tag of $29.99. The game will initially only be available as a download, but there will also be a physical release in the near future. However, there is no specified date yet for that version. Minecraft fans who own the Nintendo Switch, however, should definitely give this version a look as it offers a powerful portable experience for the block building game. Super Mario fans, meanwhile, can also look forward to the upcoming bizarre crossover RPG with Ubisoft's Rabbids franchise. ⓒ 2018 All rights reserved. Do not reproduce without permission. Real Time Analytics
global_05_local_6_shard_00002272_processed.jsonl/4612
IC Imaging Control .NET ICImagingControl.InputChannel Property ICImagingControl.InputChannel Property Returns or sets the input channel of the current video capture device. Available input channels can be enumerated using the InputChannels collection, which can be retrieved with a call to ICImagingControl.InputChannels. Public InputChannel As String public string InputChannel; Only available when a device is open and valid. When the input channel is invalidated, the default input channel is selected, which depends on the current device. The input channel depends on the current video capture device. So changing the ICImagingControl.Device property, will invalidate the input channel. Note that input channels may not be supported on all video devices. While a frame grabber usually has several inputs to choose from, a camera that is connected directly to a USB or FireWire port will not have this feature. The Imaging Control's ICImagingControl.InputChannelAvailable can be used to determine whether input channels are supported. Input channels may be set in live mode. This example selects the first channel supported by the current video capture device: Dim Inp As InputChannel Inp = IcImagingControl1.InputChannels(0) IcImagingControl1.InputChannel = Inp.Name InputChannel Inp = ICImagingControl1.InputChannels[0]; ICImagingControl1.InputChannel = Inp.Name; Selecting devices, input channels, video norms and video formats is shown in the Making Device Settings chapter. See also: ICImagingControl, ICImagingControl.InputChannelAvailable, ICImagingControl.InputChannels, InputChannels << ICImagingControl Get in touch with us About The Imaging Source Automated Imaging Association ISO 9001:2015 certified Contact us
global_05_local_6_shard_00002272_processed.jsonl/4614
free hit Email this page ( Gearbox woes ) - The Lotus Forums Jump to content • ×   Pasted as rich text.   Paste as plain text instead   Only 75 emoji are allowed. ×   Your previous content has been restored.   Clear editor • Create New...
global_05_local_6_shard_00002272_processed.jsonl/4630
Ram Navami 2019 Puja Muhurat Timings, Vidhi, Tithi For Rituals Happy Ram Navami 2016 Wishes, SMS Messages, Images Quotes Greetings, Status for WhatsApp Facebook, HD Wallpapers Ram Navami 2019 Muhurat: The birthday of Lord Rama is known as the Rama Navami. This year, it is going to be celebrated on 14th April 2019. He is believed to be the seventh incarnation of Lord Vishnu. It is one of the most auspicious occasions in the Hindu religion. Thus, keeping it in mind, this day is observed with lots of enthusiasm and zeal. The devotees of Lord Rama observe fast, perform rituals, Maha Puja by chanting some mantras to seek the divine blessings of Lord Ram. Ram Navami 2019 Muhurat, Puja Timings Every year it falls on the Shukla Paksha or the ninth day of Chaitra month as per the calendar of Hindus. This day is also known as the Chaitra Masa Suklapaksha Navami, the ninth day of Chaitra Navratri, the last day of Chaitra Navaratri festival. The various customs and traditions include singing bhajans, kirtan, aarti, Pooja, etc. in the early morning. (share: Ram Navami wishes.) Below is the auspicious timings mentioned to perform Rama Navami puja ritual as per the mahurat timing. • Rama Navami Puja Muhurta = 11:12 to 13:42 Duration = 2 Hours 30 Mins Rama Navami Madhyahna Moment = 12:27 Ram Navami is believed to be one of the most ancient festivals which are being celebrated every year from unknown times in the past. The legends state that the exact date of first Ram Navami is believed to be in the pre-Christian era. Moreover, Hinduism religion is believed to be the oldest religion in the world, and it has been found mentioned in the Kalika Purana. Everyone celebrates it irrespective of their caste or status. Ram Navami Celebrations 1. The narration of Ramayan take place on Rama Navami 2. People recite Ramaraksha Stotra 3. Kirtans are organized 5. Idol of Lord Ram is swung in the cradle Puja Vidhi On Ramnavami 2. Tulsi leaves or a lotus flower plays an important role in his worship 4. Prepare Kheer & keep fruits as a Prashad Stay tuned to The Reporter Times for more.
global_05_local_6_shard_00002272_processed.jsonl/4669
Lessons from the Pros Specialty Skills Trade By Design Not Default “What’s going on here?” Sheila all but shouted silently in her head.  Her plan was to use the Keltner Channel to signal a price break-out on the NQ E-mini, in tandem with the price action hitting the Demand Zone at the lower end of the channel.  The set-up actually was a high probability trade as she had calculated it using her odds enhancers; and all would have been fine if only she had followed through with the plan.  There she was, after having entered the trade and was now watching the price action when it began to inch downward toward her stop, which was placed 3 ticks below the distal line of the DZ.  At first she felt her stomach knot, but she reassured herself that it was OK and that she would continue to follow her plan.  Regrettably, the price action continued to fall and the lower it fell, the more knotted her stomach became; not to mention the gnawing fear that was mounting as well.  Was this Déjà vu she thought; because she had seen this situation before where she violated her rules, many times, and she had promised herself that this time she would remain calm and allow the markets to prove her right or wrong?  Then, suddenly the price action plummeted with more speed, and so did her emotional angst.  She became so emotionally worked up that she completely forgot what she had just told herself a few moments ago.  Her mind began to scurry with an unconscious conversation about losing and what that meant; which began to trigger even more emotional volatility.  Her hands trembled, her breathing accelerated and despite her best efforts the mental fog that had descended seemed to render her out-of-control.  She reverted to default behavior (an unconscious pattern of behavior) as she moved her stop a total of three times before she finally exited the trade with a substantial loss.  This pattern of seeing an event in the charts, thinking negative thoughts that create errant emotions, which then drive physiological and behavioral responses, is a negative default pattern.  Negative default patterns that get triggered are like computer viruses … in your body.  They take over your system and end up causing results that you don’t want. Default patterns are programs that are connected to beliefs, biases and values and they are often not in your best interests.  Programming is created from your earliest days of being with family, teachers, counselors, coaches, clergy etc.  These programs represent all that you have learned and/or experienced from zero years up to and including the present moment.  It is for these reasons that when they are triggered, default programs keep rolling until the situation is over.  Of course, all programming is not negative or bad…thank goodness.  It is important to identify and modify negative default patterns that are contrary to getting the results that you want with your trades.  Trading is counter-intuitive which greatly adds to the challenges.  For example, humans are loss averse.  We are much more opposed to giving up something than we are drawn to obtaining it.  Losses tend to be twice as powerful as gains, as suggested by research.  This bias can cause you to move a stop when it is threatened by the price action or to exit a trade prematurely.  Another example is that humans are prone to conform and go with the herd when clearly this type of trading can quickly cause you to chase trades and jump in after extended rallies or sell-offs triggering more losses. May all your trades be green!
global_05_local_6_shard_00002272_processed.jsonl/4731
What is Strict Replication in Active Directory? Active Directory is a vital and most important part of Windows infrastructure. Active Directory infrastructure’s health depends on its replication. In an AD environment, all Domain Controllers should be synced and aware of any changes made on any active Domain Controllers in inter-site or intra-site replication topology. What is Strict Replication Consistency in Active Directory? Strict replication is a process in which we make sure that healthy domain controllers will not get lingering objects from an Inactive domain controller. Let us say one of your domain controllers was down for a period more than tombstone lifetime value, as soon as DC will become online, next it will try to replicate to other domain controllers, as this DC contains lingering objects that will create a mess in Active Directory Objects. This is where strict replication helps healthy domain controllers to prevent replication from corrupted domain controllers. How to Enable Strict Replication? Best practice is to remove all lingering objects before enabling strict replication. The first step is to find lingering objects on your domain controllers and the second step is to remove them. We can find a lingering object from domain controllers’ logs by searching following Event IDs. Event ID 1388: Inbound replication of the lingering object has occurred on the destination domain controller. Event ID 1988: Inbound replication of the directory partition of the lingering object has been blocked on the destination domain controller. We can also use the following command to identify lingering objects and remove them. Open a command prompt with Enterprise Admin credentials 1-      Find GUID of Domain Controller repadmin /showrepl %ServerName%  2-      Find Lingering Objects, report in event logs but do not delete repadmin /removelingeringobjects %ServerName% %ServerGUID% %DirectoryPartition% /advisory_mode  3-      Delete Lingering Objects repadmin /removelingeringobjects %ServerName% %ServerGUID% %DirectoryPartition% 4-      Enable strict replication on one DC repadmin.exe /regkey <dcname> +strict Or you can use below command to log output of the command repadmin.exe /regkey <dcname> +strict > c:\temp\StrictDcs.log 5-    Enable strict replication on all DCs repadmin.exe /regkey * +strict You can confirm, enable or disable strict replication directly from the registry at the following location. Strict Replication Consistency 0 = Disable (Loose) 1 = Enabled (Strict) Leave A Reply Your email address will not be published.
global_05_local_6_shard_00002272_processed.jsonl/4747
PMCD - reference manual online Performance metrics collector daemon. PMCD(1) General Commands Manual PMCD(1) NAME pmcd - performance metrics collector daemon DESCRIPTION pmcd is the collector used by the Performance Co-Pilot (see PCPIntro(1)) to gather perfor‐ mance metrics on a system. As a rule, there must be an instance of pmcd running on a sys‐ tem for any performance metrics to be available to the PCP. pmcd accepts connections from client applications running either on the same machine or remotely and provides them with metrics and other related information from the machine that pmcd is executing on. pmcd delegates most of this request servicing to a collection of Performance Metrics Domain Agents (or just agents), where each agent is responsible for a particular group of metrics, known as the domain of the agent. For example the post‐ gresql agent is responsible for reporting information relating to the PostgreSQL database, such as the transaction and query counts, indexing and replication statistics, and so on. The agents may be processes started by pmcd, independent processes or Dynamic Shared Objects (DSOs, see dlopen(3)) attached to pmcd's address space. The configuration section below describes how connections to agents are specified. The options to pmcd are as follows. -A Disable service advertisement. By default, pmcd will advertise its presence on the network using any available mechanisms (such as Avahi/DNS-SD), assisting remote monitoring tools with finding it. These mechanisms are disabled with this option. -c config On startup pmcd uses a configuration file from either the $PCP_PMCDCONF_PATH, con‐ figuration variable in /etc/pcp.conf, or an environment variable of the same name. However, these values may be overridden with config using this option. The format of this configuration file is described below. -C dirname Specify the path to the Network Security Services certificate database, for (optional) secure connections. The default is /etc/pki/nssdb. Refer also to the -P option. If it does not already exist, this database can be created using the certutil utility. This process and other certificate database maintenance informa‐ tion is provided in the PCPIntro(1) manual page and the online PCP tutorials. -f By default pmcd is started as a daemon. The -f option indicates that it should run in the foreground. This is most useful when trying to diagnose problems with mis‐ behaving agents. -H hostname This option can be used to set the hostname that pmcd will use to represent this instance of itself. This is used by client tools like pmlogger(1) when reporting on the (possibly remote) host. If this option is not set, the pmcd.hostname metric will match that returned by pmhostname(1). Refer to the manual page for that tool for full details on how the hostname is evaluated. -i ipaddress This option is usually only used on hosts with more than one network interface. If no -i options are specified pmcd accepts connections made to any of its host's IP (Internet Protocol) addresses. The -i option is used to specify explicitly an IP address that connections should be accepted on. ipaddress should be in the stan‐ dard dotted form (e.g. The -i option may be used multiple times to define a list of IP addresses. Connections made to any other IP addresses the host has will be refused. This can be used to limit connections to one network inter‐ face if the host is a network gateway. It is also useful if the host takes over the IP address of another host that has failed. In such a situation only the stan‐ dard IP addresses of the host should be given (not the ones inherited from the failed host). This allows PCP applications to determine that a host has failed, rather than connecting to the host that has assumed the identity of the failed host. -l logfile By default a log file named pmcd.log is written in the directory $PCP_LOG_DIR/pmcd. The -l option causes the log file to be written to logfile instead of the default. If the log file cannot be created or is not writable, output is written to the standard error instead. -L bytes PDUs received by pmcd from monitoring clients are restricted to a maximum size of 65536 bytes by default to defend against Denial of Service attacks. The -L option may be used to change the maximum incoming PDU size. -n pmnsfile Normally pmcd loads the default Performance Metrics Name Space (PMNS) from $PCP_VAR_DIR/pmns/root, however if the -n option is specified an alternative names‐ pace is loaded from the file pmnsfile. -N pmnsfile Same function as -n, except for the handling of duplicate Performance Metric Iden‐ tifiers (PMIDs) in pmnsfile - duplicate names are allowed with -n they are not allowed with -N. -P passfile Specify the path to a file containing the Network Security Services certificate database password for (optional) secure connections, and for databases that are password protected. Refer also to the -C option. When using this option, great care should be exercised to ensure appropriate ownership ("pcp" user, typically) and permissions on this file (0400, so as to be unreadable by any user other than the user running the pmcd process). -q timeout The pmcd to agent version exchange protocol (new in PCP 2.0 - introduced to provide backward compatibility) uses this timeout to specify how long pmcd should wait before assuming that no version response is coming from an agent. If this timeout is reached, the agent is assumed to be an agent which does not understand the PCP 2.0 protocol. The default timeout interval is five seconds, but the -q option allows an alternative timeout interval (which must be greater than zero) to be specified. The unit of time is seconds. -S Require that all client connections provide user credentials. This means that only unix domain sockets, or authenticated connections are permitted (requires secure sockets support). If any user or group access control requirements are specified in the pmcd configuration file, then this mode of operation is automatically entered, whether the -S flag is specified or not. -s sockname Specify the path to a local unix domain socket (for platforms supporting this socket family only). The default value is $PCP_RUN_DIR/pmcd.socket. -t timeout To prevent misbehaving clients or agents from hanging the entire Performance Met‐ rics Collection System (PMCS), pmcd uses timeouts on PDU exchanges with clients and agents running as processes. By default the timeout interval is five seconds. The -t option allows an alternative timeout interval in seconds to be specified. If timeout is zero, timeouts are turned off. It is almost impossible to use the debugger interactively on an agent unless timeouts have been turned off for its "parent" pmcd. Once pmcd is running, the timeout may be dynamically modified by storing an integer value (the timeout in seconds) into the metric pmcd.control.timeout via pmstore(1). -T traceflag To assist with error diagnosis for agents and/or clients of pmcd that are not behaving correctly, an internal event tracing mechanism is supported within pmcd. The value of traceflag is interpreted as a bit field with the following control functions: 1 enable client connection tracing 2 enable PDU tracing 256 unbuffered event tracing By default, event tracing is buffered using a circular buffer that is over-written as new events are recorded. The default buffer size holds the last 20 events, although this number may be over-ridden by using pmstore(1) to modify the metric pmcd.control.tracebufs. Similarly once pmcd is running, the event tracing control may be dynamically modi‐ fied by storing 1 (enable) or 0 (disable) into the metrics pmcd.control.traceconn, pmcd.control.tracepdu and pmcd.control.tracenobuf. These metrics map to the bit fields associated with the traceflag argument for the -T option. When operating in buffered mode, the event trace buffer will be dumped whenever an agent connection is terminated by pmcd, or when any value is stored into the metric pmcd.control.dumptrace via pmstore(1). In unbuffered mode, every event will be reported when it occurs. -U username User account under which to run pmcd. The default is the unprivileged "pcp" account in current versions of PCP, but in older versions the superuser account ("root") was used by default. -x file Before the pmcd logfile can be opened, pmcd may encounter a fatal error which pre‐ vents it from starting. By default, the output describing this error is sent to /dev/tty but it may redirected to file. If a PDU exchange with an agent times out, the agent has violated the requirement that it delivers metrics with little or no delay. This is deemed a protocol failure and the agent is disconnected from pmcd. Any subsequent requests for information from the agent will fail with a status indicating that there is no agent to provide it. It is possible to specify access control to pmcd based on users, groups and hosts. This allows one to prevent users, groups of users, and certain hosts from accessing the metrics provided by pmcd and is described in more detail in the Section on ACCESS CONTROL below. CONFIGURATION On startup pmcd looks for a configuration file named $PCP_PMCDCONF_PATH. This file speci‐ fies which agents cover which performance metrics domains and how pmcd should make contact with the agents. An optional section specifying access controls may follow the agent con‐ figuration data. Warning: pmcd is usually started as part of the boot sequence and runs initially as root. The configuration file may contain shell commands to create agents, which will be executed by root. To prevent security breaches the configuration file should be writable only by root. The use of absolute path names is also recommended. The case of the reserved words in the configuration file is unimportant, but elsewhere, the case is preserved. Blank lines and comments are permitted (even encouraged) in the configuration file. A comment begins with a ``#'' character and finishes at the end of the line. A line may be continued by ensuring that the last character on the line is a ``\'' (backslash). A com‐ ment on a continued line ends at the end of the continued line. Spaces may be included in lexical elements by enclosing the entire element in double quotes. A double quote pre‐ ceded by a backslash is always a literal double quote. A ``#'' in double quotes or pre‐ ceded by a backslash is treated literally rather than as a comment delimiter. Lexical elements and separators are described further in the following sections. AGENT CONFIGURATION Each line of the agent configuration section of the configuration file contains details of how to connect pmcd to one of its agents and specifies which metrics domain the agent deals with. An agent may be attached as a DSO, or via a socket, or a pair of pipes. Each line of the agent configuration section of the configuration file must be either an agent specification, a comment, or a blank line. Lexical elements are separated by white‐ space characters, however a single agent specification may not be broken across lines unless a \ (backslash) is used to continue the line. Each agent specification must start with a textual label (string) followed by an integer in the range 1 to 510. The label is a tag used to refer to the agent and the integer specifies the domain for which the agent supplies data. This domain identifier corre‐ sponds to the domain portion of the PMIDs handled by the agent. Each agent must have a unique label and domain identifier. For DSO agents a line of the form: label domain-no dso entry-point path should appear. Where, label is a string identifying the agent domain-no is an unsigned integer specifying the agent's domain in the range 1 to 510 entry-point is the name of an initialization function which will be called when the DSO is loaded path designates the location of the DSO and this is expected to be an absolute pathname. pmcd is only able to load DSO agents that have the same simabi (Subprogram Interface Model ABI, or calling conventions) as it does (i.e. only one of the simabi versions will be applicable). The simabi version of a running pmcd may be determined by fetching pmcd.simabi. Alternatively, the file(1) command may be used to determine the simabi version from the pmcd executable. For a relative path the environment variable PMCD_PATH defines a colon (:) separated list of directories to search when trying to locate the agent DSO. The default search path is $PCP_SHARE_DIR/lib:/usr/pcp/lib. For agents providing socket connections, a line of the form label domain-no socket addr-family address [ command ] should appear. Where, label is a string identifying the agent domain-no is an unsigned integer specifying the agent's domain in the range 1 to 510 addr-family designates whether the socket is in the AF_INET, AF_INET6 or AF_UNIX domain, and the corresponding values for this parameter are inet, ipv6 and unix respectively. address specifies the address of the socket within the previously specified addr- family. For unix sockets, the address should be the name of an agent's socket on the local host (a valid address for the UNIX domain). For inet and ipv6 sockets, the address may be either a port number or a port name which may be used to connect to an agent on the local host. There is no syntax for specifying an agent on a remote host as a pmcd deals only with agents on the same machine. command is an optional parameter used to specify a command line to start the agent when pmcd initializes. If command is not present, pmcd assumes that the specified agent has already been created. The command is considered to start from the first non-white character after the socket address and finish at the next newline that isn't preceded by a backslash. After a fork(2) the command is passed unmodified to execve(2) to instantiate the agent. For agents interacting with the pmcd via stdin/stdout, a line of the form: label domain-no pipe protocol command should appear. Where, label is a string identifying the agent domain-no is an unsigned integer specifying the agent's domain protocol The value for this parameter should be binary. Additionally, the protocol can include the notready keyword to indicate that the agent must be marked as not being ready to process requests from pmcd. The agent will explicitly notify the pmcd when it is ready to process the requests by sending PM_ERR_PMDAREADY PDU. command specifies a command line to start the agent when pmcd initializes. Note that command is mandatory for pipe-based agents. The command is considered to start from the first non-white character after the protocol parameter and finish at the next newline that isn't preceded by a backslash. After a fork(2) the command is passed unmodified to execve(2) to instantiate the agent. ACCESS CONTROL CONFIGURATION The access control section of the configuration file is optional, but if present it must follow the agent configuration data. The case of reserved words is ignored, but elsewhere case is preserved. Lexical elements in the access control section are separated by white‐ space or the special delimiter characters: square brackets (``['' and ``]''), braces (``{'' and ``}''), colon (``:''), semicolon (``;'') and comma (``,''). The special char‐ acters are not treated as special in the agent configuration section. Lexical elements may be quoted (double quotes) as necessary. The access control section of the file must start with a line of the form: [access] Leading and trailing whitespace may appear around and within the brackets and the case of the access keyword is ignored. No other text may appear on the line except a trailing comment. Following this line, the remainder of the configuration file should contain lines that allow or disallow operations from particular hosts or groups of hosts. There are two kinds of operations that occur via pmcd: fetch allows retrieval of information from pmcd. This may be information about a metric (e.g. its description, instance domain or help text) or a value for a metric. store allows pmcd to be used to store metric values in agents that permit store operations. This may be the actual value of the metric (e.g. resetting a counter to zero). Alternatively, it may be a value used by the PMDA to introduce a change to some aspect of monitoring of that metric (e.g. server side event filtering) - possibly even only for the active client tool per‐ forming the store operation, and not others. Access to pmcd can be granted in three ways - by user, group of users, or at a host level. In the latter, all users on a host are granted the same level of access, unless the user or group access control mechanism is also in use. User names and group names will be verified using the local /etc/passwd and /etc/groups files (or an alternative directory service), using the getpwent(3) and getgrent(3) rou‐ tines. Hosts may be identified by name, IP address, IPv6 address or by the special host specifi‐ cations ``"unix:"'' or ``"local:"''. ``"unix:"'' refers to pmcd's unix domain socket, on supported platforms. ``"local:"'' is equivalent to specifying ``"unix:"'' and ``local‐ host``. Wildcards may also be specified by ending the host identifier with the single wildcard character ``*'' as the last-given component of an address. The wildcard ``".*"'' refers to all inet (IPv4) addresses. The wildcard ``":*"'' refers to all IPv6 addresses. If an IPv6 wildcard contains a ``::'' component, then the final ``*'' refers to the final 16 bits of the address only, otherwise it refers to the remaining unspecified bits of the address. The wildcard ``*'' refers to all users, groups or host addresses, including ``"unix:"''. Names of users, groups or hosts may not be wildcarded. The following are all valid host identifiers: boing localhost 129.127.114.* 129.* .* fe80::223:14ff:feaf:b62c fe80::223:14ff:feaf:* fe80:* :* "unix:" "local:" * The following are not valid host identifiers: *.melbourne 129.127.*.* 129.*.114.9 129.127* fe80::223:14ff:*:* fe80::223:14ff:*:b62c fe80* The first example is not allowed because only (numeric) IP addresses may contain a wild‐ card. The second and fifth examples are not valid because there is more than one wildcard character. The third and sixth contain an embedded wildcard, the fourth and seventh have a wildcard character that is not the last component of the address (the last components are 127* and fe80* respectively). The name localhost is given special treatment to make the behavior of host wildcarding consistent. Rather than being and ::1, it is mapped to the primary inet and IPv6 addresses associated with the name of the host on which pmcd is running. Beware of this when running pmcd on multi-homed hosts. Access for users, groups or hosts are allowed or disallowed by specifying statements of the form: allow users userlist : operations ; disallow users userlist : operations ; allow groups grouplist : operations ; disallow groups grouplist : operations ; allow hosts hostlist : operations ; disallow hosts hostlist : operations ; list userlist, grouplist and hostlist are comma separated lists of one or more users, groups or host identifiers. operations is a comma separated list of the operation types described above, all (which allows/disallows all operations), or all except operations (which allows/disallows all operations except those listed). Either plural or singular forms of users, groups, and hosts keywords are allowed. If this keyword is omitted, a default of hosts will be used. This behaviour is for backward-com‐ patibility only, it is preferable to be explicit. Where no specific allow or disallow statement applies to an operation, the default is to allow the operation from all users, groups and hosts. In the trivial case when there is no access control section in the configuration file, all operations from all users, groups, and hosts are permitted. If a new connection to pmcd is attempted by a user, group or host that is not permitted to perform any operations, the connection will be closed immediately after an error response PM_ERR_PERMISSION has been sent to the client attempting the connection. Statements with the same level of wildcarding specifying identical hosts may not contra‐ dict each other. For example if a host named clank had an IP address of, specifying the following two rules would be erroneous: allow host clank : fetch, store; disallow host : all except fetch; because they both refer to the same host, but disagree as to whether the fetch operation is permitted from that host. Statements containing more specific host specifications override less specific ones according to the level of wildcarding. For example a rule of the form allow host clank : all; overrides disallow host 129.127.112.* : all except fetch; because the former contains a specific host name (equivalent to a fully specified IP address), whereas the latter has a wildcard. In turn, the latter would override disallow host * : all; It is possible to limit the number of connections from a user, group or host to pmcd. This may be done by adding a clause of the form maximum n connections to the operations list of an allow statement. Such a clause may not be used in a disallow statement. Here, n is the maximum number of connections that will be accepted from the user, group or host matching the identifier(s) used in the statement. An access control statement with a list of user, group or host identifiers is equivalent to a set of access control statements, with each specifying one of the identifiers in the list and all with the same access controls (both permissions and connection limits). A group should be used if you want users to contribute to a shared connection limit. A wildcard should be used if you want hosts to contribute to a shared connection limit. When a new client requests a connection, and pmcd has determined that the client has per‐ mission to connect, it searches the matching list of access control statements for the most specific match containing a connection limit. For brevity, this will be called the limiting statement. If there is no limiting statement, the client is granted a connec‐ tion. If there is a limiting statement and the number of pmcd clients with user ID, group ID, or IP addresses that match the identifier in the limiting statement is less than the connection limit in the statement, the connection is allowed. Otherwise the connection limit has been reached and the client is refused a connection. Group access controls and the wildcarding in host identifiers means that once pmcd actu‐ ally accepts a connection from a client, the connection may contribute to the current con‐ nection count of more than one access control statement - the client's host may match more than one access control statement, and similarly the user ID may be in more than one group. This may be significant for subsequent connection requests. Note that pmcd enters a mode where it runs effectively with a higher-level of security as soon as a user or group access control section is added to the configuration. In this mode only authenticated connections are allowed - either from a SASL authenticated connec‐ tion, or a Unix domain socket (which implicitly passes client credentials). This is the same mode that is entered explicitly using the -S option. Assuming permission is allowed, one can determine whether pmcd is running in this mode by querying the value of the pmcd.feature.creds_required metric. Note also that because most specific match semantics are used when checking the connection limit, for the host-based access control case, priority is given to clients with more spe‐ cific host identifiers. It is also possible to exceed connection limits in some situa‐ tions. Consider the following: allow host clank : all, maximum 5 connections; allow host * : all except store, maximum 2 connections; This says that only 2 client connections at a time are permitted for all hosts other than "clank", which is permitted 5. If a client from host "boing" is the first to connect to pmcd, its connection is checked against the second statement (that is the most specific match with a connection limit). As there are no other clients, the connection is accepted and contributes towards the limit for only the second statement above. If the next client connects from "clank", its connection is checked against the limit for the first state‐ ment. There are no other connections from "clank", so the connection is accepted. Once this connection is accepted, it counts towards both statements' limits because "clank" matches the host identifier in both statements. Remember that the decision to accept a new connection is made using only the most specific matching access control statement with a connection limit. Now, the connection limit for the second statement has been reached. Any connections from hosts other than "clank" will be refused. If instead, pmcd with no clients saw three successive connections arrived from "boing", the first two would be accepted and the third refused. After that, if a connection was requested from "clank" it would be accepted. It matches the first statement, which is more specific than the second, so the connection limit in the first is used to determine that the client has the right to connect. Now there are 3 connections contributing to the second statement's connection limit. Even though the connection limit for the second statement has been exceeded, the earlier connections from "boing" are maintained. The connection limit is only checked at the time a client attempts a connection rather than being re-evaluated every time a new client connects to pmcd. This gentle scheme is designed to allow reasonable limits to be imposed on a first come first served basis, with specific exceptions. As illustrated by the example above, a client's connection is honored once it has been accepted. However, pmcd reconfiguration (see the next section) re-evaluates all the con‐ nection counts and will cause client connections to be dropped where connection limits have been exceeded. RECONFIGURING PMCD If the configuration file has been changed or if an agent is not responding because it has terminated or the PMNS has been changed, pmcd may be reconfigured by sending it a SIGHUP, as in # pmsignal -a -s HUP pmcd When pmcd receives a SIGHUP, it checks the configuration file for changes. If the file has been modified, it is reparsed and the contents become the new configuration. If there are errors in the configuration file, the existing configuration is retained and the con‐ tents of the file are ignored. Errors are reported in the pmcd log file. It also checks the PMNS file for changes. If the PMNS file has been modified, then it is reloaded. Use of tail(1) on the log file is recommended while reconfiguring pmcd. If the configuration for an agent has changed (any parameter except the agent's label is different), the agent is restarted. Agents whose configurations do not change are not restarted. Any existing agents not present in the new configuration are terminated. Any deceased agents are that are still listed are restarted. Sometimes it is necessary to restart an agent that is still running, but malfunctioning. Simply stop the agent (e.g. using SIGTERM from pmsignal(1)), then send pmcd a SIGHUP, which will cause the agent to be restarted. FILES $PCP_PMCDCONF_PATH default configuration file $PCP_PMCDOPTIONS_PATH command line options to pmcd when launched from $PCP_RC_DIR/pmcd All the command line option lines should start with a hyphen as the first character. $PCP_SYSCONFIG_DIR/pmcd additional environment variables that will be set when pmcd executes. Only set‐ tings of the form "PMCD_VARIABLE=value" will be honoured. ./pmcd.log (or $PCP_LOG_DIR/pmcd/pmcd.log when started automatically) $PCP_RUN_DIR/ contains an ascii decimal representation of the process ID of pmcd , when it's running. All messages and diagnostics are directed here /etc/pki/nssdb default Network Security Services (NSS) certificate database directory, used for optional Secure Socket Layer connections. This database can be created and queried using the NSS certutil tool, amongst others. /etc/passwd user names, user identifiers and primary group identifiers, used for access con‐ trol specifications /etc/groups group names, group identifiers and group members, used for access control speci‐ fications ENVIRONMENT In addition to the PCP environment variables described in the PCP ENVIRONMENT section below, the PMCD_PORT variable is also recognised as the TCP/IP port for incoming connec‐ tions (default 44321), and the PMCD_SOCKET variable is also recognised as the path to be used for the Unix domain socket. If set to the value 1, the PMCD_LOCAL environment variable will cause pmcd to run in a localhost-only mode of operation, where it binds only to the loopback interface. The pmcd.feature.local metric can be queried to determine if pmcd is running in this mode. The PMCD_MAXPENDING variable can be set to indicate the maximum length to which the queue of pending client connections may grow. PCP ENVIRONMENT Environment variables with the prefix PCP_ are used to parameterize the file and directory names used by PCP. On each installation, the file /etc/pcp.conf contains the local values for these variables. The $PCP_CONF variable may be used to specify an alternative config‐ uration file, as described in pcp.conf(5). CAVEATS pmcd does not explicitly terminate its children (agents), it only closes their pipes. If an agent never checks for a closed pipe it may not terminate. The configuration file parser will only read lines of less than 1200 characters. This is intended to prevent accidents with binary files. The timeouts controlled by the -t option apply to IPC between pmcd and the PMDAs it spawns. This is independent of settings of the environment variables PMCD_CONNECT_TIMEOUT and PMCD_REQUEST_TIMEOUT (see PCPIntro(1)) which may be used respectively to control time‐ outs for client applications trying to connect to pmcd and trying to receive information from pmcd. Performance Co-Pilot PCP PMCD(1) This manual Reference Other manuals pmcd(1) referred by dbpmda(1) | genpmda(1) | LOGIMPORT(3) | pcp(1) | pcp-collectl(1) | pcp-iostat(1) | pcp2graphite(1) | PCP::PMDA(3pm) | PCPIntro(1) | PCPIntro(3) | PMAPI(3) | pmcd_wait(1) | pmchart(1) | pmclient(1) | __pmConnectLogger(3) | PMDA(3) | pmdaactivemq(1) | pmdaaix(1) | pmdaapache(1) | pmdabash(1) refer to dlopen(3) | execve(2) | file(1) | fork(2) | getgrent(3) | getpwent(3) | pcp.conf(5) | pcp.env(5) | PCPIntro(1) | pmdbg(1) | pmerr(1) | pmgenmap(1) | pmhostname(1) | pminfo(1) | pmlogger(1) | pmsignal(1) | pmstat(1) | pmstore(1) | pmval(1) | tail(1)
global_05_local_6_shard_00002272_processed.jsonl/4757
Airports are a Hackers Best Friend (& Other Ways Users Expose Themselves to Risk) Virtual ArmourCybersecurity, Endpoint, Risk Mitigation & Prevention Airport Cybersecurity Risk Traveling is stressful, even when things go smoothly. Your routine is disrupted, you are in an unfamiliar place, and there is a good chance you are not as well-rested as usual. This can make you less vigilant about your cybersecurity, and if you don’t speak the local language, you may have trouble getting the information you need to make an … Read More Virtual ArmourBusiness, Cybersecurity, Endpoint BYOD Network Security What is your Current State of Readiness? Virtual ArmourEndpoint If your board of Directors asked you if your company is prepared for a breach, what would you say? Review this list of questions to figure out your current state of readiness: Can our current solution help me before, during and after an attack? What can our current solution do if we are already breached and it’s deployed after the … Read More
global_05_local_6_shard_00002272_processed.jsonl/4791
Portmagee - Wikiwand For faster navigation, this Iframe is preloading the Wikiwand page for Portmagee. From Wikipedia, the free encyclopedia An Caladh Location in Ireland CountyCounty Kerry  • Total123 Time zoneUTC+0 (WET) Irish Grid ReferenceV370730 Portmagee (Irish: An Caladh, meaning "The Harbour")[1] is a village in County Kerry, Ireland. The village is located on the Iveragh peninsula south of Valentia Island, and is known locally as 'the ferry', in reference to its purpose as a crossing point to the island. Access to Valentia Island is now via the Maurice O'Neill Memorial Bridge from Portmagee, which was built in 1970 and named in memory of a member of the IRA executed in 1942 for his part in the shooting dead of Detective George Mordaunt in Dublin.[2][3] The name Portmagee (Port Magee and Magee's Port as it was formerly known) comes from Captain Theobald Magee, a notorious 18th-century smuggler.[4] Having served in the army of King James as an officer, Magee 'retired' to a life of merchant shipping between France, Portugal and Ireland.[5] Thanks to the many inlets around the South West coast, his trade in contraband spirits, textiles and tea and tobacco was hard to police and therefore very profitable. He married Bridget Morgell,[5] the widow of a rich Dingle merchant and also the daughter of the then representative for Dingle, Thomas Crosbie. There is some suspicion that Magee's death in a Lisbon monastery was due to some exile imposed by the powerful MP.[clarification needed] However, his wife and sons continued the family business of smuggling. Places of interest Portmagee Pier Portmagee Pier The Great Skellig The Great Skellig Another monastery, Illaunloughan, is located in the Portmagee Channel north of the town. Skellig Rangers The local GAA team, Skellig Rangers, was founded in 1895 (originally as Portmagee G.A.A, before adopting its present name in the 1930s), and plays at Pairc Chill Imeallach in Portmagee.[7] See also 2. ^ Reidy, Marisa (27 April 2011). "TG4 documentary on O'Neill execution". The Kerryman. Retrieved 9 January 2018. 3. ^ "The 'unofficial' opening of Valentia bridge". The Kerryman. 5 March 2014. Retrieved 9 January 2018. 5. ^ a b Pochin Mould, Daphne Desirée Charlotte (1978). Valentia: portrait of an island. Blackwater Press. p. 53. 7. ^ "Club History". Skellig Rangers G.A.A. Retrieved 7 September 2018. {{bottomLinkPreText}} {{bottomLinkText}} Listen to this article
global_05_local_6_shard_00002272_processed.jsonl/4799
Wireshark-dev: Re: [Wireshark-dev] guint8* and gchar* ... and Vim ?! :) From: Guy Harris <[email protected]> Date: Thu, 14 Dec 2006 11:49:35 -0800 Sebastien Tandel wrote: is there any reason to use guint8* instead of gchar*? For what purpose? If you're dealing with an array of 8-bit bytes, or a pointer to a sequence of those, guint8 is the right type; it makes it clear that they're bytes, not characters (it might be binary, it might be a sequence of 16-bit "bytes" in a UTF-16-encoded string, it might be a UTF-8 string, etc.). I.e., tvb_get_ptr(), for example, should return a "guint8 *", as should tvb_memdup(), and the raw packet data you get from Wiretap should be pointed to by a "guint8 *". Note also that you can safely pass a guint8 or guchar to one of the <ctype.h> routines, but you can't safely pass a gchar to them, as they might get sign-extended into negative values if the 8th bit is set (I think that none of the popular platforms for Windows and modern UN*Xes have C compilers with "char" an unsigned type, so I think "might" can be replaced by "will" in practice). With gcc-4.0, there is the new feature warning you that "pointer target differs in signedness" (which is not such a bad thing). I suspect most of those warnings are for cases where you're treating byte sequences as character strings. What I think we *really* need to do, for those cases, is have a different way of handling strings. The current way we handle strings doesn't take into account the fact that there are a number of different character encodings for strings - "ASCII" (which would imply that a byte with the 8th bit set is an error), ISO 8859/n, other EUC encodings, Shift-JIS, KOI8, UTF-8, UTF-16, etc.. See the first item under "Dissector infrastructure" on the page. (That discusses two items - the dissector APIs for handling strings, and the UI aspects of this. The former doesn't require the latter - we can continue to display non-ASCII characters as escape sequences - but the latter, which is something we should ultimately do, requires some way of getting all strings from packets translated into Unicode.) May we change these guint8* to gchar* ? I mean may we change the type of the concerned variables and not cast to every call of a function ? Which ones are you thinking of? We shouldn't globally replace guint8 with gchar, as per my comments in the beginning.
global_05_local_6_shard_00002272_processed.jsonl/4809
Drawing the Time Set a clock’s hands to a particular value This worksheet provides basic exercises for understanding analog clocks. The student’s task here is to draw the hands on the clock to match the specified time. You can select a resolution for the clock times to adjust the exercises to match the skill level of the student.
global_05_local_6_shard_00002272_processed.jsonl/4815
Is There Any Reason for Small Businesses to Move to Cloud Hosting? Cloud hosting allows you to use unlimited machines as a single unit. Cloud computing provides you easy integration of external resources to use when you need them via web. This means users are free to move away from using software [...]
global_05_local_6_shard_00002272_processed.jsonl/4822
Here Are The Greatest Programming Languages To Learn In 2018 ProgrammingThe Certificate of Completion (CCL) in Programming is designed to prepare the scholar to work in the programming field. The extra programming languages you recognize, the extra shall be your progress prospects on this quick growing subject. We’re a group of motherfucking programmers who have been humiliated by software development methodologies for years. On this video we will will write our first program utilizing CodeLite IDE. The Programming in Java zyBook can be combine-and-matched with others, equivalent to with Data Structures Necessities (a well-liked mixture). Machine code was the language of early packages, written within the instruction set of the actual machine, typically in binary notation. When college students study to program, in addition they be taught vital downside-solving, creative thinking, and computational pondering expertise. If you want to study pc programming or improve your skills on a finances, and in a shorter period of time, you can also attend one of many following coding bootcamps. Playboy TV, Reality Kings Television, Actual, recent!, Juicy are the grownup channels available in both Dish Community and DirecTV with identical programming. We theorized what would possibly occur if programmers created the earth (spoiler alert: it is not nice). Improve your TELEVISION experience with premium channels and specialty programming. Being well-versed with video games all through, you possibly can study the assorted gaming testers and software program that may give a platform to your curiosity. When combined with educational content material written by revered scholars throughout the curriculum, MyLab Programming helps deliver the educational outcomes that students and instructors aspire to. After spending some time within the software trade, she realized that developing content material interests her greater than creating code. If you have the impression there is a programming language lacking, please notify us at [email protected] Please additionally verify the overview of all programming languages that we monitor.
global_05_local_6_shard_00002272_processed.jsonl/4839
Remember one password Never suffer from password fatigue again. Just remember one master password and access every application with it. Say goodbye to password reuse Quickly create stronger passwords with the password generator and Zoho Vault will remember them for you. You'll never have to reuse that one easy-to-remember password again. Securely share passwords You can share passwords with agents, customers, and contractors, with different levels of access permission, without revealing the passwords in plain text. Log in to applications in a click Store your everyday apps in Zoho Vault and quickly log in to them in a single click using the auto logon and single sign-on for cloud apps. Record every action Comprehensive audits and reports will help you track who accessed which password, along with the timestamp, IP address, and machine details.
global_05_local_6_shard_00002272_processed.jsonl/4862
What is a bucket etc? We try to minimize the amount of terminology that you need to know in order to use Zenobase. Nevertheless, here are some terms you might encounter: Buckets contain events. Each bucket has a dashboard and optional tasks. Views are read-only "views" on one or more (entire, or filtered) buckets. Events are the basic unit of storage and consist of several fields. Each event has at least a "timestamp" and an "author" field. Fields are typed data points such as timestamps, tags, coordinates, measurements with units etc. Fields can have one or more values. Dashboards define the set of widgets used to show a bucket or a view. Widgets are configurable components of a dashboard. There are widgets to show maps and different kinds of plots and tables. Tasks add or update events in a bucket. Tasks are run when they are created, and incrementally whenever the bucket is refreshed. Retrieving data from a connected service is a typical task. Credentials are required by certain tasks to access connected services on your behalf. Authorizations keep track of third parties whom you gave access to your data, and can be revoked any time. Templates are dashboards preconfigured for specific use cases. Feedback and Knowledge Base
global_05_local_6_shard_00002272_processed.jsonl/4880
Microsoft MVP Logo I noticed this post the other day by SharePoint legend & Certified Master Todd Carter. In it he references the MSDN article that shows you how to setup a Windows 7 box to do SharePoint 2010 development. By the way, if you've been under a rock, you can now do SharePoint 2010 development on a client operating system such as Windows Vista SP2+ or Windows 7 (both must be 64-bit). Couldn't do this in SharePoint 2007. While some folks love this option, here's how I pitch it when I explain this new option when teaching one of our SharePoint 2010 development courses at Critical Path Training: In the SharePoint 2007 timeframe, developers were left to figure out how to do SharePoint development: Microsoft: Ideally you could install a server OS (Windows 2003/2008) on your desktop/laptop and install SharePoint on top of that. Developer: My company won't let me install a server OS on my workstation. Microsoft: Then install some sort of virtualization technology, like VirtualPC (or a competing product), and then install the server OS in a VM and install SharePoint on top of that. Developer: My company won't let me do local virtualization on my workstation. Microsoft: Then get your IT group to stand up a SharePoint server, either virtual or native, and RDP into it to do development. Developer: My IT group doesn't have the hardware to stand up a bunch of VMs or dev servers for my team. Microsoft: Well, then you could quit your job and go somewhere that do one of the three above options and then you could do SharePoint development. Developer: Can I use this technique I learned from a blog post about installing SharePoint 2007 on Vista? Random person passing by: Dude, you're crazy to do that. In my mind, the ability to do SharePoint 2010 development on Windows 7 (or Vista SP2+) is only addressing the above scenario. In addition to just about every single reason Todd outlines in his post, I'd like to add the following: • Quite a few things simply don't work, or don't work the way you expect them to (User Profile Service, Search, Office Web Apps, other randomness). • Do you REALLY want all those SharePoint services running all the time? Better yet, do you want to have to remember some script that turns them on/off every time you want to do SharePoint development? So how do I do it? First, I'm all about virtualization... specifically Hyper-V. As Todd says "I love being able to hit the reset button." I have a two-part approach. I work from a home office 50% of the time and on the road teaching, presenting, mentoring, development, etc. the other 50%: Home Office When in my home office, I use my virtualization rig I built a few years ago. Still running Hyper-V, still loving this box. In fact I'm so dependent on this thing I'm seriously considering building a 2nd updated one to run side by side for backup purposes. On the Road When I'm on the road I lug around two laptops. One is my primary (Lenovo ThinkPad x200s) for doing everything such as very light development, email, writing, etc. because it's so small, portable, light and has a killer battery life. The other (Lenovo ThinkPad w500) is my workhorse I use for doing development, testing (all my load testing & memory profiling tools are here. My my w500 I have two drives installed: the primary and a 2nd one in the modular bay (who needs DVDs?). On the primary I have Windows 7 installed natively like a traditional OS. On the other drive I have a bunch of VHDs that I boot into (I run a quad-boot system setup using this great PowerShell script). One of the bootable VHDs is a Windows Server 2008 R2 OS with the Hyper-V role enabled. From that machine I run different Hyper-V machines that are on the same drive. This setup runs great! Comments powered by Disqus
global_05_local_6_shard_00002272_processed.jsonl/4884
AiD011: Geoff Holder’s Guide to the Mysterious 31 August 2009 Geoff Holder, chronicler of the strange and mysterious, joins us at a Top Secret location to tell us about his passion for holy wells and stone circles; and we attend the launch of his book, ‘The Guide To Mysterious Glasgow’. (45 mins, 43MB)
global_05_local_6_shard_00002272_processed.jsonl/4885
Listing the Polar Bear Listing the Polar Bear The following article recently appeared as an entry in the Britannica Blog. It was written by Britannica’s Earth Sciences editor, John P. Rafferty. We think that it touches on vitally importantly topics and bears (no pun intended) repeating here. Recently, the Bush Administration, through Secretary of the Interior Dirk Kempthorne, put forth a proposal to add the polar bear (Ursus maritimus) to the threatened list under the Endangered Species Act. The proposal, which carries a 12-month public comment period under federal rules, has been viewed by some as the Bush Administration’s first real recognition of the growing problem of global climate change. In early 2006 the polar bear was listed as threatened by the World Conservation Union (IUCN). If listed in the United States, the polar bear would be the first species added as a direct result of climate change, a prospect that worries many industries, utilities, and pro-business lobbyists. Several television and print news outlets have already weighed in on this issue, choosing to focus on the political implications of a greening executive branch. Few, however, have commented on what this action may mean to the health of the greater Arctic ecosystem and the plight other large carnivores in similar situations. Often, when we hear or read about endangered plants and animals, our first inclination is to want to know how many individuals of that species remain. In many cases, these estimates are inaccurate, but both environmental groups and news outlets count on our natural morbid curiosity to press us to action or to watch or read their product. Most estimates state that there are currently between 20,000 and 25,000 polar bears in several distinct populations in the Eurasian and North American Arctic. Looking strictly at the numbers, several news organizations suggest that it is premature, perhaps even irresponsible, to list the polar bear as a threatened species. Amidst this emphasis on population size, it is easy to forget that the Endangered Species Act was designed primarily to protect against the loss of a species’ critical habitat. The critical habitat for these animals is the Arctic ice pack, and it is shrinking. Protecting the polar bear and its habitat could pay several dividends. Polar bears are often considered a keystone species in the Arctic ecosystem, meaning that their influence over the Arctic ecosystem goes far beyond their raw abundance. Certainly these animals directly affect the populations of ringed seals (also equally dependent on the presence of Arctic ice), beluga whales, and other prey by outright hunting; but they also indirectly benefit other organisms that seals and belugas prey on, such as krill (planktonic crustaceans often forming the foundation of marine food chains) and smaller fish. With polar bears present, seals and belugas must also carefully select where they travel, rest, and obtain food to avoid being eaten. In essence, polar bears help to maintain the proper functioning of the Arctic ecosystem. Secondly, protecting the polar bear’s habitat creates a conservation “umbrella” that protects the ringed seal, a source of food, clothing, and other items for Inuit hunters. With the ringed seal protected, the Inuit can maintain a lifestyle and culture that has been around for thousands of years. Incidentally, there are provisions for the limited polar bear hunting by Inuit groups and some sport hunters. This may seem contradictory at first, but carefully regulated hunting could reinforce incentives to protect the polar bear by directly linking the economic livelihoods of people to the animal’s success. Thirdly, the fuss over the polar bear may bring to light the plight of other large carnivores, which often act as keystone predators in their own resident ecosystems. Wolves, mountain lions, tigers, South American and African felines, and others face the similar challenges of shrinking habitats and altered ecosystems due to our need for new and better housing and food resources to feed a growing human population. Understand that the climate change already taking place has tremendous momentum. More Arctic ice will be lost over the coming years before conditions change for the better, regardless of what we humans do. Listing the polar bear cannot stop the ice from melting or automatically translate into curbing greenhouse gas (carbon dioxide, methane, CFCs, etc.) emissions. At most, it opens the door to carbon legislation, a prospect environmentalists have been clamoring for and pro-industry types dread. It will be interesting to see what direction this public comment period takes. Twelve months from now, Americans will be at the cusp of an election year. While the Bush Administration’s proposal to list the polar bear is an encouraging sign from an otherwise anti-environmental White House, polar bear survival will ultimately depend on the follow-through coming from the next administration. Books We Like polar bear The World of the Polar Bear Norbert Rosing German wildlife photographer Norbert Rosing has been fascinated with Arctic life since his first visit to Canada in 1983. During his many return trips he has captured stunning images of polar bears and other wildlife of the region, beautifully reproduced in this coffee-table book. Published in 2006, The World of the Polar Bear has received rapturous reviews and highest ratings for the quality of both its photography and its text. The book follows the polar bear’s year, from a cub’s emergence in spring from the snow cave in which it was born, through the summer trek to Hudson Bay, and on to Churchill, Manitoba, as the ice returns. Bears are depicted in all of their activities, including their seemingly incongruous playfulness—powerful and efficient hunters, they are the largest land predator. This book is both a captivating introduction to polar bears for the novice and a moving celebration of the beauty of the wilderness. It should make every reader a champion of the cause of preserving this magnificent animal’s habitat and ensuring its future. 15 Replies to “Listing the Polar Bear” 1. I am very concerned for the plight of the Polar Bears. Planet Earth and Inconvenient Truth both cover this topic as well. It seems that we could do so much more to reverse the trend of global warming and people just don’t get it or care enough to turn the trend around. (See olly’s comment above.) We are all on this planet together and so must do everything we can to preserve what is left of it. Conservation is no longer optional. We as a race are in line right behind the Polar Bear for the same fate if we don’t make some changes ASAP. 2. The same people who struggle to protect the animals are the real culprits for the threatening of their existence through their acts which make the world less suitable for these species 3. Could you elaborate? Why is it the same people who want to protect animals who are “the real culprits”? 4. well polars are they realy drowing from global warming? hum. what an interesting matter to disscus of. the ice caps are melting thus producing the polar bears to swim a longer distance between the ocean and the ice. 5. I am very concerned about polar bears. They are endangered because the ice is melting and they can barely find any seals. I say we should speak up and start caring for them. I love polar bears and if they become instinct, I won’t a favorite animal anymore. God did a great job creating them. 6. All folks have to do is check out the NASA web site and/or the National sea and Ice graphics to see the changes in the ice, both thickness and coverage. For those who are skeptics, I don’t think NASA makes this stuff up… Leave a Reply
global_05_local_6_shard_00002272_processed.jsonl/4894
Elise C. Siegel is a transformational guide and performing artist based in Northern California. After a rapidfire awakening at a young age, Elise became a devoted student of consciousness, superpowers, and the art of multidimensional reality creation. She is an emerging writer, a contributor of the Serpent Sanctum, and podcast host.  Elise began her professional theatre career at foolsFURY Theater Company in San Francisco, where she participated in the Factory Parts Festival and trained in Suzuki Method, the Six Viewpoints, and Butoh. Elise currently trains in ritual & temple (Odissi) fusion bellydance, American Tribal Style, hip hop & Latin styles of dance.
global_05_local_6_shard_00002272_processed.jsonl/4915
Tuesday, May 23, 2017 Arthropods 101: Spiders, mites, and horseshoe crabs, oh my! Get to know Chelicerata! Greetings arthropod lovers of all stripes! Today Mike Skvarla and I sit down with Ray Fisher of the University of Arkansas to discuss Chelicerata. Now you may be saying to yourself, "What is a Chelicerata? It sounds like an exotic sports car." and you would be wrong. Chelicerates are a diverse group of animals that we interact with on a regular basis and includes things like spiders, ticks, mites, scorpions and many more.
global_05_local_6_shard_00002272_processed.jsonl/4953
Hijokaidan starring Miku Hatsune - Hatsune-Kaidan Miku Hatsune only exists on a literally technical basis. She is one of Crypton's characters in their Vocaloid voice synthesizer program. J-Pop Noise Hijokaidan stlye? It really shouldn't work but it does! Well, frankly, Hijokaidan can do what the hell they like! This was released on U-Rythmix Records in 2013. The label is the sister of Tsukasa Takahashi's ("shit, why don't I have an indefinite amount of money so I can buy everything that they release") Youth Inc. Hatsune Kaidan are now a "real" project with at least three releases under that name. This is what I assume is a bootleg recording. It features two Hatsune Kaidan events and Hijo/Akira laying waste to all around them with live versions of tracks from the Made In Studio album. Live at Akihabara Goodman, February 2nd 2013 communist,  8 November 2014 at 21:24   thank you so much Anonymous,  9 November 2014 at 17:03   Someone, please, explain to me why this became as popular as it did. Okay, aside from the fact it's a mashup of two artists from completely different backgrounds...because we've totally never seen that before... but come on, it's just j-pop songs with inappropriate noise hooks or noise tracks with superfluous, short monologues in japanese. This merger was completely unnecessary and the results are subpar, and yet people eat this shit up. Why? I'd understand if people got excited for it when it was announced, just to listen to it out of curiosity as I did, but there's nothing substantial here, no fathomable reason why anyone would continue to listen after they spot the obvious gimmick. It tries to please j-pop and noise fans and pleases neither- well, it didn't please me, at any rate. Again, there's a few parts that are kind of fascinating, but there's nothing here to suggest it needs to be done again. Why, just, WHY? badgerstump 9 November 2014 at 17:14   erm...two artists from completely different backgrounds? It's Hijokaidan using a vocal synthesizer program...so, erm one set of artists from exactly the same background. I don't think that it tries to please anybody. Fans of J-Pop would run to the hills! I'm pleased that you find some parts fascinating but confused that you would take so long to disprove your own argument... Why, just WHY? Why not? Anonymous,  12 November 2014 at 17:57
global_05_local_6_shard_00002272_processed.jsonl/4961
PHONE: 480-344-4269 Archive for July, 2013 3series GT BMW has been doing a lot of experimenting with concept cars and car styles in the past few years. They are quickly becoming known for their innovation as well as quality. The newest project BMW will mass-produce is the BMW 3-series Gran Turismo. The decision was made due to the success of its larger counterpart the 5-series Gran Turismo. The 3-series GT will take after its larger counterpart in that its ultimate goal is to look like a 3-series but provide the interior space of a station wagon. On top of being spacious like a hatchback and stylish like a regular 3-series it is fast like the basic 3-series. It has a single turbo engine with about 250 HP and a top of the line 8-speed automatic transmission that is shifted with a mounted shifter and/or steering wheel paddles. Making the car spacious and fast is what made the 5-series successful. The high-powered engine in the 3-series GT will ensure that formula is repeated. Soon after production, the new 2014 BMW 3-series GT will be available in many different models at Chapman BMW. The 3-series GT is like its larger counterparts in many ways. It acts like a gap wedge in a golfer’s bag between a sand wedge and a pitching wedge. It allows one to finally buy a BMW with the look and speed of a 3-series, but with the size of a 5. One way in which it is different is that it doesn’t look as much like a concept or a crossover vehicle as the 5-series GT. The 5-series has a sloped back that gives it the look of a station wagon/sedan crossover. The genius of the 3-series GT, however, is that it provides the space of a crossover but looks just like a slightly larger sedan. In other words, the 3-series is subtle in the ways it has been stretched to provide the extra space. Your Phoenix BMW dealership will sell these vehicles in their full lineup of new and used BMW vehicles.
global_05_local_6_shard_00002272_processed.jsonl/4962
Empathy Required Impeccable Customer Service Tip #7 Sometimes remarkable customer service requires empathy. Acknowledge what is “true” for your clients; what they may be feeling. In other words, put yourself in their shoes before you act or respond. 1. a well-known technique to show empathy is the 3 “F’s”: feel, felt, found. “i know how you feel. i’ve felt that way too. what i’ve found is…” thanks for the reminder to put ourselves in the other person’s shoes. Join the Conversation (Reply below) Speak Your Mind
global_05_local_6_shard_00002272_processed.jsonl/4975
Thursday, November 7, 2013 GAPE Domain Specific Language This time I want to talk about GAPE a Domain Specific Language, for the Google App Engine, created with Xtext. Xtext is an awesome open source framework for programming languages and DSLs covering all aspect of language development. The final result is a full feature development environment integrated with Eclipse including syntax highlighting, code completion, quick-fixes etc. For those interested to became familiar with XText I recommend the book by Lorenzo Bettini, Implementing Domain-Specific Languages with Xtext and Xtend. To make it simple, we created a short video to introduce the GAPE DSL. Hope you enjoy it. The link to the GAPE SDK download is available on here. You can become familiar with GAPE by playing with the GAPE's Anatomy available on the demo application.
global_05_local_6_shard_00002272_processed.jsonl/4978
Artomat sales are up! Wednesday, April 09, 2014 Today, I found out that 30 of my Mini Masterpieces have sold in Artomat machines across the country.  Here are the 4 machines that are selling my work thus far: How cool is it that I am selling my Mini Masterpieces in hipster central, Portlandia?  Wow. Notice all the machines are red.  Well, red has always been my favorite color.  :) Thanks, Artomat, for this really great experience of "kerplunking culture" all over the United States! (Special thanks to Artomat website and +RUSS for photos/helping me see the machines vending my art!) You Might Also Like
global_05_local_6_shard_00002272_processed.jsonl/5030
Wednesday, July 15, 2009 Caron's Corkers Time for another quick round up of what I think is brilliant on the internet. First up, and don't run away cos it's Formula One cos there's more to it than that, is Jake Humphrey's blog from the German Grand Prix. It's fascinating because he plays us a good chunk of what the production crew are saying to him as he's presenting. While he's conducting interviews, they are talking in the background, changing the running order with seconds to go, leaving Jake to think on his feet. I don't know how on earth he manages to make it all look so seamless with that rabble going on in his head, but I'm not surprised that he almost got run down by a Toyota the other week. I've never understood until now why he hadn't noticed it coming. This is must-read for anyone who's even remotely interested in working in television. Next up, the Guardian took a trip to Twitter Towers in San Francisco. The BBC reports on a research project that states the bleeding obvious - that cats have a special purr which makes us respond to their needs. I just thought it was funny that nobody suggested that cats should be left to "purr it out" like certain childcare gurus think being left to cry is good for babies. This has been around for a while, but I've only just discovered it - a short film from Liberty about what they've achived over their 75 years and why they're still important. Finally, Sara saw this rather perplexing sight in a book shop. LibDig This! No comments: Related Posts with Thumbnails
global_05_local_6_shard_00002272_processed.jsonl/5088
ASP.NET Web API and SQL Server 1. Thank you for this excellent tutorial 2. after adding the reference of the class library I am not able add the namespace of it and it is not showing up.
global_05_local_6_shard_00002272_processed.jsonl/5113
DICT.TW Dictionary Taiwan Search for: [Show options] 3 definitions found From: DICT.TW English-Chinese Dictionary 英漢字典 From: Webster's Revised Unabridged Dictionary (1913)  Shoe n.; pl. Shoes formerly Shoon now provincial.     Your hose should be ungartered, . . . yourshoe untied.   --Shak.     Spare none but such as go in clouted shoon.   --Shak.  2. Anything resembling a shoe in form, position, or use. Specifically: (a) A plate or rim of iron nailed to the hoof of an animal to defend it from injury. (b) A band of iron or steel, or a ship of wood, fastened to the bottom of the runner of a sleigh, or any vehicle which slides on the snow. (c) A drag, or sliding piece of wood or iron, placed under the wheel of a loaded vehicle, to retard its motion in going down a hill. (d) The part of an automobile or railroad car brake which presses upon the wheel to retard its motion. (e) Arch. A trough-shaped or spout-shaped member, put at the bottom of the water leader coming from the eaves gutter, so as to throw the water off from the building. (f) Milling. The trough or spout for conveying the grain from the hopper to the eye of the millstone. (g) An inclined trough in an ore-crushing mill. (h) An iron socket or plate to take the thrust of a strut or rafter. (i) An iron socket to protect the point of a wooden pile. (j) Mach. A plate, or notched piece, interposed between a moving part and the stationary part on which it bears, to take the wear and afford means of adjustment; -- called also slipper, and gib.  3. The outer cover or tread of a pneumatic tire, esp. for an automobile.  Shoe of an anchor. Naut. (a) A small block of wood, convex on the back, with a hole to receive the point of the anchor fluke, -- used to prevent the anchor from tearing the planks of the vessel when raised or lowered. (b) A broad, triangular piece of plank placed upon the fluke to give it a better hold in soft ground.  Shoe block Naut., a block with two sheaves, one above the other, and at right angles to each other.  Shoe pac, a kind of moccasin. See Pac. From: WordNet (r) 2.0       n : a particular situation; "If you were in my place what would           you do?" [syn: place]
global_05_local_6_shard_00002272_processed.jsonl/5118
Tracking Tips and Tricks for Multiple PS Eye Cameras From iPi Docs Revision as of 06:37, 27 July 2015 by Pavel (Talk | contribs) Jump to: navigation, search Tracking Tips and Tricks for Multiple PS Eye Cameras Light Settings Colors differ due to non-ambient lighting Ideally, lighting should be ambient. In this case colors of clothes and body will look the same in all cameras, and you can leave default light settings. But in real-life you can have non-uniform lighting, when most light comes from window, or bright light source. In this case colors will be darker in cameras directed towards this light source, and lighter in the rest of cameras. In this case adjusting light settings may substantially improve tracking. You can find light settings at Scene tab. • Light source position is marked by yellow ball. Click and drag light control to orbit the light source. Approximate postions will be fine, you do not need to be very accurate. • You can also change light intensity. You can check how it influences tracking using View > Pose Mismatch window. Red Mismatch number shows the mismatch between tracked model and video in selected camera. If Mismatch number is lower, settings are better for selected camera. Note: If Mismatch number is negative, so lower value means bigger absolute value
global_05_local_6_shard_00002272_processed.jsonl/5124
Sunday, 27 January 2008 yet more cake! we set off for a day out, to expose the kids to some of the industrial heritage of the area, and to broaden their knowledge of art. which is all well and good, but on this occasion it was not the heritage or the art that made the greatest imprssion, but the cafe. well when there's a menu like this what do you expect! that's 6 to choose from, it was hard but the chocoholic in me won.... now where did it go? there was at least art on the sugar packets, so that must make up for something... 1. That's an amazingly good choice. We recently found a pub near us that has a huge veggie menu - which also seems to be a highly unusual thing! 2. *drool*..that looks like seriously good would have been my choice too! 3. Oooh looks deliciously chocolatey and moist, but all the others sounds yummy to me too, I would want to sample them all! Gx 4. Honestly, that looks so yummy! Who can resist a nice slice of cake? ;) 5. Delicious! And I love that little dog on the plate--very cheery :o) Happy week ((HUGS)) 6. Oh that looks yummy! I guessed where you'd been from the plate! Great place, but I haven't been for years. 7. Oh fab - I googled french knot and a brilliant diagram and instructions came up. They are exactly what the "bobbly" embroidered bits are. Thanks so much! What fantastic cakes, mmmmmm. Time for tea methinks! 8. oooh, it's been years since I went to Salt's Mill. I feel a little excursion coming on :) 9. Oh wow that's an impressive choice!! I usually just admit defeat now in cafes so would have had a smile plastered from ear to ear after encountering a menu like that!! I would definitely have had some of that lemon sponge. Sounds divine! Yum yum!!! :-) 10. Looks like my kind of day out! Lina x (blogger isn't being very kind to me today, this is my 4th attempt to leave a message!) 11. oh yummy, I could just eat a piece of that...making my tummy growl now! 12. My daughters always need to check out the cafe before they can relax into a day out! choc cake always wins hands down. It looks like a great place to visit. I'm just going to check out the apple cake recipe now!
global_05_local_6_shard_00002272_processed.jsonl/5125
Why You Should Go Nuts for Nuts The nutritional value of nuts are often underrated. In truth, a handful of nuts can lower blood cholesterol, improve cardiac health, help with weight loss, and lower cancer risk. So, do you know which types of nuts are low in calorie and beneficial for your health? First, almonds. Almond nuts have tremendous health benefits thanks to their rich content of vitamin E and antioxidants. They are also loaded with fibers to as much as 3 grams per ounce, making them gut-friendly. Second, pistachios. They are categorized as the most slimming nut due to their low calorie content (160 calories per single serving). Most of the fats contained in pistachios are considered monounsaturated and polyunsaturated fats, which help reduce cholesterol levels. Lastly, hazelnuts. Not only a fragrant add-on to any chocolate drink or coffee, hazelnuts are also rich in antioxidant and vitamin E that can prevent cataract, maintain skin health, and reduce risk of dementia. For a healthier snack choice, you can mix one type of nuts with another, like lentils or peas. But, why bother when Dua Kelinci has given you the perfect combination in its Mix Nut series? Mix Nut has different types of nuts especially roasted with lime leaves to produce its distinctive flavor. So, when you have to go on a diet, don’t let hunger strike by snacking on Mix Nut by Dua Kelinci.
global_05_local_6_shard_00002272_processed.jsonl/5137
Posts for Tag: hustle Resolutions are tricky business. Yearly resolutions are difficult to manage, I think. So, I have resolved to update this site at least once per week. I'll track that resolution in a handy, DIY Checklist notebook. If you'd like one to use for similar reasons, they're available in my Etsy shop. Oh, hey! You can also request custom title for your notebook. For example, I made these for a good friend of mine. Pretty badass... It's 2014. Get your hustle going!
global_05_local_6_shard_00002272_processed.jsonl/5139
Get lucky and set your sparkly beard on fire. This sentence pretty much sums up my leftovers of 2013. Everywhere I went I heard Daft Punk’s ‘Get Lucky’ (which was no punishment, by the way), as well as songs about fire, burning, sparkles and other bright, shiny things. Songs like ‘Diamonds’ (Rihanna) and ‘Girl on fire’ (Alicia Keys) to name but a few. Men with beards are everywhere. Men with beards are everywhere. And everywhere I looked I saw men with beards—hipster fellas in narrow pants doing hipster things with smart phones, zippy little cars, bottles of beer, gaggles of girls, and espresso machines. We’ve just been through 365 days of music and advertisements on TV, the Internet and the radio—a relentless, never-ending stream of messages and impulses—and a few songs and men with beards are all that sticks with me. Not bad, I think. What I remember most about 2013 is the time I spent with my family, the fun we had and the memories we created. All these things happened when the TV was off and the smart phones and tablets were tucked away.  When the only focus was cooking that great meal, climbing that sand dune, writing that chapter, playing that game, taking in that view, and enjoying each other’s company. In 2013, I definitely got better at blocking out the crap and focusing on the stuff that really matters to me, but judging by the fiery hipster beards in my head I still have some ways to go. So I’m gonna work on my blocking-out skills some more in 2014. Not by actively trying to ignore the peripheral stuff that wants to muscle its way into the center of my life, but by putting energy back into the people and things that gave me energy. Wishing you a splendid 2014! What Do You Think? Leave A Comment Here!
global_05_local_6_shard_00002272_processed.jsonl/5151
California police find street gang's underground lair Monday February 11, 2019. 09:24 PM , from BoingBoing Police in Fontana, California were searching a suspected gang member's home when they found a manhole built into the floor. Down the ladder was a small secret underground hideout containing an arsenal, shooting range, and rather modest hang-out space. According to CNN, 'interlocking rubber mats lined the ground in one area, with something resembling furniture pads or moving blankets fixed to walls, and a US flag hanging in one corner. Another area had a dirt ground and a wall lined with sandbags.' 'We are the champions at Hide n Seek and no manhole will help you...' the police wrote on Facebook. 'We strongly recommend that you put as much effort as you did in your underground cave, into becoming a productive member of society. You will thank us later for this advice.' Current Date Aug, Sun 18 - 13:40 CEST
global_05_local_6_shard_00002272_processed.jsonl/5189
Tuesday, November 6, 2007 The Two Books That Get Me Through My Day I hate looking through notes, and I hate looking things up. In what I do, there are two books that have consistently (especially today) helped me minimize both of these activities when I'm stumped. 1) Langenscheidt's Pocket Dictionary: Chinese (Langenscheidt Publishers, Inc. Available at Amazon for fourteen bucks) This sucker is literally pocket-sized (maybe not for girls' pants), and has a radical chart with all of the characters in the book at the beginning. The next two (larger) parts are Chinese-English and English-Chinese, by pinyin. It uses context and sample sentences to help differentiate multiple meanings and usages, and is the darn easiest way I have used to look up Chinese. 2) Guide to Methods for Students of Political Science, by Steven Van Evera (Cornell University Press, available at Amazon for twelve bucks.) This book is a must-have for anyone writing or reading political science papers. It helps structure one's argument, thinking, and methods to be more clear, precise, and accurate. It helps one analyze the strength of the thesis, predictions, and tests in a paper, and form strong ones when writing one's own. I recommend both of these books. They've given me enough very wonderful mileage that I don't mind plugging for the authors at all. Also, get the Van Evera book new. It's probably a few bucks cheaper, but the guy's a poor professor, and should be rewarded for his work.
global_05_local_6_shard_00002272_processed.jsonl/5199
Rune Fencer is the first job I've seen for which a Stoneskin II spell would make sense, given that it's a tank that relies heavily on Enhancing Magic. This theoretical Stoneskin II would still be self-only, but stronger, as befits a defensive spell exclusive to a job intended to tank. How I'd design it: * Enhancing Magic, obviously. * Still self-target only. (Compatibility with Accession is an open question.) * RUN95 (in other words, don't make us gain a bunch of job points just to get better general damage mitigation; this should be something all RUNs should be reasonably expected to have). No other job receives it. * Costs 44 MP (151.7% of Stoneskin I's cost). * Damage absorbed cap of 525 (150% of Stoneskin I). The formula should make this cap within reach of a RUN99 with item level 109 gear (in other words, let it be fully effective for a relatively new RUN so that people easily accept the spell's usefulness and relevance). * Base duration of 6 minutes (120% of Stoneskin I's base duration). * Base casting time of 8 seconds (80% of Stoneskin I's base casting time). * 45-second base recast (150% of Stoneskin I's, occasionally making it necessary to use Stoneskin I as a stopgap measure). * All existing Stoneskin-boosting gear would also be compatible with Stoneskin II. I believe that if such a spell were added to Rune Fencer, made accessible in the mid-90s levelwise, and made easy to raise to its full base effectiveness, people might take RUN somewhat more seriously as a tank.
global_05_local_6_shard_00002272_processed.jsonl/5201
Adding a web video (eg Youtube or Vimeo) to a Buzz NOTE: Previous versions of Buzzy allowed you to insert Youtube or Vimeo videos, and other web content, directly as ‘Embedded link’ resource types. This resource type has been deprecated - older Buzzes still using it will render in browsers, but the embedded content (eg video) will not render in the newer versions of the Buzzy app. See this article for more info. Note: As of the Buzzy v5 app (released late July 2019), editing or authoring a Buzz requires the app to be switched to Classic View. This will have the same interface (adjusted for mobile screens) as the browser version of Buzzy, so the steps listed below will be identical. Basic Steps To add a web video (eg from Vimeo), or other web content (eg a snippet of a website or article) to a Buzz is easy with the new ‘iFrame’ resource type. 1. Assuming you are an owner or author of the Buzz and have edit rights, you can click the ‘Add content’ button in the content view of the Buzz. 2. Select the ‘iFrame’ option. 3. Enter the url of the video or article you wish to embed and click ‘Get Link’. You can optionally change the default height of the iframe. 4. Click ‘Insert’ - that’s it! Editing the item Changing the embedded iframe link, or updating the iframe height, is not currently possible. You’ll need to delete the item, and add a new iFrame element again. Embedding a Youtube video! Youtube has recently changed its embedding links - simply adding the normal url of a Youtube video will result in a ‘Youtube refused to connect’ message. To insert a Youtube video into an iframe element in Buzzy, you’ll need to get the ‘Embed’ link of the video in question. 1. Open the Youtube video in a browser 2. Under the video, click the ‘Share’ button 1. In the share dialog that opens, click the ‘Embed’ option. Note: the link displayed in this dialog with a ‘Copy’ button won’t work! 1. A new dialog with a code snippet will be displayed - you’ll need to select the url in the ‘src’ parameter - eg in this example: 1. Enter this in the Buzzy iFrame settings window and click the ‘Get Link’ button 1. A preview of the video should appear in the iFrame settings window - click the ‘Insert’ button to add it to your Buzz
global_05_local_6_shard_00002272_processed.jsonl/5205
Tuesday, June 03, 2008 Letter from a soon to be ex-Freemason God bless you and your work. Sunday, April 27, From: "M" To: mason_stoppers@yahoo.com I just want to say God Bless you. I am a Freemason - soon to be an ex-Freemason. I've been through the three degrees of the Blue Lodge. I've gone even further than that... I went through the Scottish Rite to obtain the 32° of Freemasonry. I was very proud of my membership in the fraternity in the short time I belonged, much to my current chagrin. I have only been a member for a year. Before I joined, I was quite proud to be Catholic. Several years ago, I was even considering the priesthood before I left the Church for some time. I was quite bitter... not at the Church, but at myself, at my own sinfulness, and at my own pride. I joined Freemasonry knowing the Church's prohibition against the organization, and was familiar with your web page well before I was initiated into the first degree. I very much enjoyed being a Freemason. I made a lot of good friends and grew as a person due to my membership. Yet, admittedly, something in my soul had been aching since that day I went through my very first initiation. I had certainly lapsed as a Catholic and had been deep in my sins well before I took that step, but something within masonry had been killing me spiritually and I certainly felt it. Freemasonry is a subtle beast. The average person within its ranks has very little idea of the evil that lurks beneath its massive symbolism, but that evil is certainly there. Every aspect of masonry is cunningly designed to destroy men's souls by pulling them away from Christ. I was lucky - Christ Our Lord never allowed me to close my ears to individuals such as yourself whom spoke the truth of the organization. I am grateful for that beyond any words that I could possibly express. Masonry, both directly and indirectly, is at the heart of all that is wrong with the world today. It breeds apathy to Christ and His Church. It is a doorway to evil spirits. When one goes through the degrees, one is divested of all metals, which especially includes holy sacramentals which might protect one from the demonic energies one comes into contact during the rituals. All prayer is directed to the "Grand Architect Of The Universe", whom assuredly is not the Christian God, for Christ is not to be acknowledged within the lodge as anything other than just a man. Christ is not mentioned lest the followers of other religions be offended, yet Masonic ritual refers explicitly to pagan gods whom ought to offend any faithful Christian. The nature of Masonry ought to be clear from this alone. Freemasonry is the Luciferian religion shrouded in dark secrecy. Its subtleties are such that, unless one studies occult iconography apart from masonry, one cannot comprehend the totality of what is being taught. Freemasonry is the anti-Church and its spirit is most assuredly anti-Christ. Masons whom read this will certainly call me a bigot and accuse me of never being a Mason in the first place, but neither is true. It is not my fault that they never understood the essence of the "Craft" in the first place. I regret having a part in that "Craft" in the first place. There is a far greater Brotherhood in the world than Masonry could ever hope to be. This is certainly a claim that most Masons would deny on its very face until I name it, after which they ought to be ashamed. The Brotherhood that is greater than Masonry is the Church of Jesus Christ, which no institution built by man or devil can possibly rival. Any Christian who requires a greater bond of fellowship than that which they gain through the grace of Christian baptism most certainly sells their Lord short, for He can bond men in a far greater manner through His Sacraments than any occult ritual could hope to do. I am not expressing myself as fully as I wish I could, but it suffices to say that I regret having belonged to the Masonic Lodge despite any perceived good I might have gained through my membership. It profits us nothing to gain the world but to lose our souls. Thank you for taking the time to read this email, God bless you, and keep up the good work. In Christ,
global_05_local_6_shard_00002272_processed.jsonl/5228
World Library   Flag as Inappropriate Email this Article History of the Southern United States History of the Southern United States The history of the Southern United States reaches back hundreds of years and includes the Mississippian people, well known for their mound building. European history in the region began in the very earliest days of the exploration and colonization of North America. Spain, France, and England eventually explored and claimed parts of what is now the Southern United States, and the cultural influences of each can still be seen in the region today. In the centuries since, the history of the Southern United States has recorded a large number of important events, including the American Revolution, the American Civil War, the ending of slavery, and the American Civil Rights Movement. • Native American civilizations 1 • European colonization 2 • Spanish exploration 2.1 • French colonization 2.2 • British colonial era (1607–1775) 3 • Rise of tobacco culture and slavery in the colonial South 3.1 • Growth of the Southern colonies 3.2 • American Revolution 4 • Antebellum era (1781–1860) 5 • Antebellum slavery 5.1 • Nullification crisis, political representation, and rising sectionalism 5.2 • Sectional parity and issue of slavery in new territories 5.3 • Election of 1860, secession, and Lincoln's response 5.4 • Civil War (1860–1865) 6 • Leadership 6.1 • Abolition of slavery 6.2 • Railroads 6.3 • Sherman's March 6.4 • Reconstruction (1863–1877) 7 • Material ruin and human losses 7.1 • Political Reconstruction, 1863-1877 7.2 • Railroads 7.3 • Backlash to Reconstruction 7.4 • Origins of the New South, 1877–1913 8 • Race: from Jim Crow to the Civil Rights movement 8.1 • Rural South 9 • Creating the "New South" (1945–present) 10 • Southern presidents 11 • See also 12 • Footnotes 13 • Further reading 14 • External links 15 Native American civilizations In Pre-Columbian times, the only inhabitants of what is now the Southern United States were Native Americans. The most important Native American nation in the region was the Mississippian people, who were a Mound builder culture that flourished in the Midwestern, Eastern, and Southeastern United States in the centuries leading up to European contact. The Mississippian way of life began to develop around the 10th century in the Mississippi River Valley (for which it is named). Notable Native American nations that developed in the South after the Mississippians include what are known as "the Five Civilized Tribes": the Cherokee, Chickasaw, Choctaw, Creek and Seminole. European colonization Spanish exploration Spain made frequent exploratory trips to the New World after its discovery in 1492. Rumors of natives being decorated with gold and stories of a Fountain of Youth helped hold the interest of many Spanish explorers, and colonization eventually followed. Juan Ponce de León was the first European to come to the South when he landed in Florida in 1513. Among the first European settlements in North America were Spanish settlements in what would later become the state of Florida; the earliest was Tristán de Luna y Arellano's failed colony in what is now Pensacola in 1559. More successful was Pedro Menéndez de Avilés's St. Augustine, founded in 1565; St. Augustine remains the oldest continuously inhabited European settlement in the continental United States. Spain also colonized parts of Alabama, Mississippi, Louisiana, and Texas. Spain issued land grants in the South, from Kentucky to Florida and into the southwestern areas of what is now the United States. There was also a Spanish colony location near King Powhatan's ruling town in the Chesapeake Bay area of what is now Virginia and Maryland. It preceded Jamestown, the English colony, by as much as one hundred years. French colonization The first French settlement in what is now the Southern United States was Fort Caroline, located in what is now Jacksonville, Florida, in 1562. It was established as a haven for the Huguenots and was founded under the leadership of René Goulaine de Laudonnière and Jean Ribault. It was destroyed by the Spanish from the nearby colony of St. Augustine in 1565. Later French arrived from the north. Having established agricultural colonies in Canada and built a fur trading network with Indians in the Great Lakes area, they began to explore the Mississippi River. The French called their territory Louisiana, in honor of their King Louis. France claimed Texas and set up several short-lived forts there, such as the one in Red River County, built in 1718. In 1817 the French pirate Jean Lafitte settled on Galveston Island; his colony there grew to more than 1,000 persons by 1818 but was abandoned in 1820. The most important French settlements were established at New Orleans and Mobile (originally called and Bienville). Only a few settlers came from France directly, with others arriving from Haiti and Acadia.[1] British colonial era (1607–1775) Jamestown and Roanoke Island colonies Just before they defeated the Walter Raleigh established the first English settlement in the New World, on Roanoke Island, North Carolina. The colony failed to prosper, however, and the colonists were retrieved the following year by English supply ships. In 1587, Raleigh again sent out a group of colonists to Roanoke. From this colony, the first recorded European birth in North America, a child named Virginia Dare, was reported. That group of colonists disappeared and is known as the "Lost Colony". Many people theorize that they were either killed or taken in by local tribes.[2] Like New England, the South was originally settled by English Protestants, later becoming a melting pot of religions as with other parts of the country. While the earlier attempt at colonization had failed on Roanoke Island, the English established their first permanent colony in America in Jamestown, Virginia, in 1607, at the mouth of the James River, which in turn empties into Chesapeake Bay.[3] Settlement of Chesapeake Bay was driven by a desire to obtain precious metal resources, specifically Georgia . Early in the history of the colony, it became clear that the claims of gold deposits were vastly exaggerated. Referred to as the "Starving Time" of the Jamestown colony, the years from the time of landing in 1607 until 1609 were rife with famine and instability. However, Native American support, in addition to reinforcements from Britain, sustained the small colony. Due to continued political and economic instability, however, the charter of the Colony of Virginia was revoked in 1624. The primary cause of this revocation was the revelation that hundreds of settlers were dead or missing following an attack in 1622 by Native American tribes led by Opechancanough. A royal charter was established for Virginia, yet the House of Burgesses, formed in 1619, was allowed to continue as political leadership for the colony in conjunction with a royal governor.[4] A key figure in the Virginia Colony and Southern political and cultural development generally was William Berkeley, who served, with some interruptions, as governor of Virginia from 1645 until 1675. His desire for an elite immigration to Virginia led to the "Second Sons" policy, in which younger sons of English aristocrats were recruited to emigrate to Virginia. Berkeley also emphasized the "headright system," the offering of large tracts of land to those arriving in the colony. This early immigration by an elite contributed to the development of an aristocratic political and social structure in the South.[5] English colonists, especially young indentured servants, continued to arrive along the southern Atlantic coast. Virginia became a prosperous English colony. The area now known as James Oglethorpe were as a resettlement colony for imprisoned debtors.[6] Rise of tobacco culture and slavery in the colonial South From the introduction of tobacco in 1613, its cultivation began to form the basis of the early Southern economy. Cotton did not become a mainstay until much later, after technological developments, especially the Whitney Cotton gin of 1794, greatly increased the profitability of cotton cultivation. Until that point, most cotton was farmed in large plantations in the Province of Carolina, and tobacco, which could be grown profitably in farms of smaller scale, was the dominant cash crop export of the South and the Middle Atlantic States. In 1640, the Virginia General Court recorded the earliest documentation of lifetime slavery when it sentenced John Punch to lifetime servitude under his master Hugh Gwyn for running away.[7][8] The first slavery law in the British colonies was enacted by Massachusetts to enslave the indigenous population in 1641.[9] During this period, life expectancy was often low and indentured servants came from overpopulated European areas. With the lower price of servants compared to slaves, and the high mortality of the servants, planters often found it much more economical to use servants. Because of this, slavery in the early colonial period differed greatly in the American colonies from that in the Caribbean. Often Caribbean slaves were worked literally to death on large sugar and rice plantations, while the American slave population had a higher life expectancy and was maintained through natural reproduction. This natural reproduction was important for the continuation of slavery after the prohibition on slave importation after about 1780.[10] Much of the slave trade was conducted as part of the "Triangular Trade", a three-way exchange of slaves, rum, and sugar. Northern shippers purchased slaves using rum, made in New England from cane sugar, which was in turn grown in the Caribbean. This slave trade was generally able to fulfill labor needs in the South for the cultivation of tobacco after the decline of indentured servants. At approximately the point when tobacco labor needs began to increase, the mortality rate fell and all groups lived longer. By the late 17th century and early 18th century, slaves became economically viable sources of labor for the growing tobacco culture. Also, further South than the Mid-Atlantic, Southern settlers grew wealthy by raising and selling rice, indigo, and cotton. The plantations of South Carolina often were modeled on Caribbean plantations, albeit smaller in size.[11] Growth of the Southern colonies For details on each specific colony, see Province of Maryland, Province of North Carolina, Province of South Carolina, and Colony of Virginia. By the end of the 17th century, the number of colonists was growing. The large population centers were still in the northeastern and middle colonies, leaving the southern colonies of Maryland, Virginia, North and South Carolina a rural frontier land. The economies of these colonies were tied to agriculture. During this time the great plantations were formed by wealthy colonists who saw great opportunity in the new country. Tobacco and cotton were the main cash crops of the areas and were readily accepted by English buyers. Rice and indigo were also grown in the area and exported to Europe. The plantation owners built a vast aristocratic life and accumulated a great deal of wealth from their land. They supported slavery as a means of working their land. On the other side of the agricultural coin were the small yeoman farmers. They did not have the capability or wealth to operate large plantations. Instead, they worked small tracts of land and developed a political activism in response to the growing oligarchy of the plantation owners. Many politicians from this era were yeoman farmers speaking out to protect their rights as free men. Charleston became a booming trade town for the southern colonies. The abundance of pine trees in the area provided raw materials for shipyards to develop and the harbor provided a safe port for English ships bringing in imported goods. The colonists exported tobacco, cotton and textiles and imported tea, sugar, and slaves. The fact that these colonies maintained an independent trade relation with England and the rest of Europe became a major factor later on as tension mounted leading up to the American Revolutionary War. After the late 17th century, the economies of the North and the South began to diverge, especially in coastal areas. The Southern emphasis on export production contrasted with the Northern emphasis on food production. By the mid-18th century, the colonies of Maryland, Delaware, Virginia, North Carolina, South Carolina, and Georgia had been established. In the upper colonies, that is, Maryland, Virginia, and portions of North Carolina, the tobacco culture prevailed. However, in the lower colonies of South Carolina and Georgia, cultivation focused more on cotton and rice. American Revolutionary War, Battle of Camden, South Carolina American Revolution The southern colonies, led by Virginia, gave strong support for the Patriot cause in solidarity with Massachusetts. Georgia, the newest, smallest, most exposed and militarily most vulnerable colony, hesitated briefly before joining the other 12 colonies in Congress. As soon as news arrived of the Battle of Lexington and Concord in April 1775, Patriot forces took control of every colony, using secret committees that had been organized in the previous two years.[12] After the combat began, Governor Dunmore of Virginia was forced to flee to a British warship off the coast. In late 1775 he issued a proclamation offering freedom to slaves who escaped from Patriot owners and volunteer to fight for the British Army. Over 1000 volunteered and served in British uniforms, chiefly in the Ethiopian Regiment. However they were defeated in Battle of Great Bridge and most of them died of disease. The Royal Navy took Dunmore and other officials home in August 1776, and also carried to freedom 300 surviving former slaves.[13] After their defeat at Saratoga in 1777 and the entry of the French into the American Revolutionary War, the British turned their attention to the South. With fewer regular troops at their disposal, the British commanders developed a "southern strategy" that relied heavily on volunteer soldiers and militia from the Loyalist element.[14] Beginning in late December 1778, the British captured • Documenting the American South - text, image, and audio collections. • articles in JSTORJournal of Southern History • Southern Historical Association, The major scholarly society • The Society of Independent Southern Historians contains a bibliography of endorsed works concerning Southern history, biography, literature and culture; Lost Cause of the Confederacy perspective External links • Abernethy, Thomas P. The South in the New Nation, 1789–1819. LSU Press. • Alden, John R. The South in the Revolution, 1763–1789. LSU Press. • Ayers; Edward L. The Promise of the New South: Life after Reconstruction Oxford University Press, 1993 online edition • Bartley, Numan V. The New South, 1945–1980. LSU Press. • Craven, Avery O. The Growth of Southern Nationalism, 1848–1861. LSU Press. • Craven, Wesley Frank. The Southern Colonies in the Seventeenth Century, 1607–1689. LSU Press. • Coulter, E. Merton. The Confederate States of America, 1861–1865. LSU Press. • Coulter, E. Merton. The South During Reconstruction, 1865–1877. LSU Press. • Current, Richard, ed. Encyclopaedia of the Confederacy (4 vol 1995) • Hesseltine; William B. A History of the South, 1607-1936 Prentice-Hall, 1936 online edition • Hill, Samuel S. et al. eds. Encyclopedia of Religion in the South (2005) • Hubbell; Jay B. The South in American Literature, 1607-1900 Duke University Press, 1973 • Key, V.O. Southern Politics In State and Nation (1949), a famous classic • Lamis, Alexander P. ed. Southern Politics in the 1990s Louisiana State University Press, 1999. • Logan, Rayford,The Betrayal of the Negro from Rutherford B. Hayes to Woodrow Wilson,, 1997. (This is an expanded edition of Logan, The Negro in American Life and Thought, The Nadir, 1877-1901 (1954) • Mark, Rebecca, and Rob Vaughan. The South: The Greenwood Encyclopedia of American Regional Cultures (2004), post 1945 society • Moreland; Laurence W. et al. Blacks in Southern Politics Praeger Publishers, 1987 online edition • Paterson, Thomas G. ed. (1999). Major Problems in the History of the American South. Boston: Houghton Mifflin Company. readings from primary and secondary sources   • Richter, William L. The A to Z of the Old South (2009), a short scholarly encyclopedia • Shafer, Byron E. and Richard Johnston, eds. The End of Southern Exceptionalism: Class, Race, and Partisan Change in the Postwar South (2009) excerpt and text search • Sydnor, Charles W. The Development of Southern Sectionalism, 1819–1848. (LSU Press, 1964), Broad ranging history of the region • Tindall, George B. The Emergence of the New South, 1913–1945 (LSU Press, 1967 ) • Volo, James M. Encyclopedia of the Antebellum South (2000) • Woodward, C. Vann. Origins of the New South, 1877–1913. LSU Press. Further reading 1. ^ Weddle, Robert S. (1991). The French Thorn: Rival Explorers in the Spanish Sea, 1682–1762. College Station: Texas A&M University Press.   2. ^ Karen Ordahl Kupperman, Roanoke: The abandoned colony (2007). 3. ^ Robert Appelbaum, and John Wood Sweet, eds., Envisioning an English empire: Jamestown and the making of the North Atlantic world (University of Pennsylvania Press, 2012) 4. ^ Warren M. Billings, John E. Selby, and Thad W. Tate, Colonial Virginia: A History (1986). 5. ^ Warren M. Billings, Sir William Berkeley and the forging of colonial Virginia (LSU Press, 2004) 6. ^ Kenneth Coleman, Colonial Georgia: a history (1976). 9. ^ Higginbotham, A. Leon (1975). In the Matter of Color: Race and the American Legal Process: The Colonial Period. Greenwood Press. p. 62.  10. ^ C. Vann Woodward, American counterpoint: Slavery and racism in the North-South dialogue (1971) pp 78-91 11. ^ Walter B. Edgar (1998). South Carolina: A History. U. of South Carolina Press. pp. 131–54.  12. ^ John Richard Alden, The South in the Revolution, 1763-1789 (LSU Press, 1957). 13. ^ W. Hugh Moomaw, "The British Leave Colonial Virginia," Virginia Magazine of History and Biography (1958) 66#2 pp. 147-160 in JSTOR 14. ^ Jeffrey J. Crow and Larry E. Tise, eds., The Southern Experience in the American Revolution (1978) p. 157–9 16. ^ Brendan Morrissey, Yorktown 1781: The World Turned Upside Down (1997) 19. ^ Freehling, William W. (1992) [1966]. Prelude to Civil War: The Nullification Controversy in South Carolina, 1816–1836. New York: Oxford University Press.   20. ^ Haveman, H. A. (2004). "Antebellum literary culture and the evolution of American magazines". Poetics 32 (1): 5–28.   21. ^ David Potter, The impending crisis, 1848-1861 (1976). 22. ^ Robert J. Cook and William L. Barney, Secession Winter: When the Union Fell Apart (2013) 23. ^ William C. Davis, Look Away! A History of the Confederate States of America (2003). 24. ^ Rice, Otis K.; Brown, Stephen W. (1994). West Virginia: A History (2nd ed.). Lexington: University Press of Kentucky. pp. 111–123.   25. ^ Surdam, David G. (2001). Northern Naval Superiority and the Economics of the American Civil War. Columbia: U. of South Carolina Press.   26. ^ Owsley, Frank Lawrence (1925). "Local Defense and the Overthrow of the Confederacy: A Study in State Rights". Mississippi Valley Historical Review 11 (4): 490–525.   27. ^ James M. McPherson (1988). Battle Cry of Freedom: The Civil War Era. Oxford University Press. p. 690.  29. ^ Cooper, William James (2000). Jefferson Davis, American: A Biography. New York: Alfred A. Knopf.   30. ^ For a defense of Davis see Johnson, Ludwell H. (1981). "Jefferson Davis And Abraham Lincoln As War Presidents: Nothing Succeeds Like Success". Civil War History 27 (1): 49–63.   33. ^ a b Jim Downs, Sick from Freedom: African-American Illness and Suffering during the Civil War and Reconstruction (2015) 34. ^ Marrs, Aaron W. (2009). Railroads in the Old South: Pursuing Progress in a Slave Society. Baltimore: Johns Hopkins University Press.   35. ^ Turner, George Edgar (1953). Victory Rode the Rails: The Strategic Place of the Railroads in the Civil War. Indianapolis: Bobbs-Merrill.  36. ^ Beringer, Richard E.; et al. (1991). Why the South Lost the Civil War. University of Georgia Press. p. 349.   38. ^ a b Brown, D. Clayton (2010). King Cotton in Modern America: A Cultural, Political, and Economic History since 1945. University Press of Mississippi.   39. ^ Joseph D. Reid, "Sharecropping as an understandable market response: The post-bellum South." Journal of Economic History (1973) 33#1 pp: 106-130. in JSTOR 40. ^ Hesseltine, William B. (1936). A History of the South, 1607–1936. New York: Prentice-Hall. pp. 573–574.  41. ^ Rosen, Robert N. (1997). A short history of Charleston. Columbia: University of South Carolina Press. p. 121.   42. ^ For more detail see Oberholtzer, Ellis Paxson (1917). A history of the United States since the Civil War 1. pp. 56–67.  43. ^ For details see Livermore, Thomas L. (1901). Numbers and Losses in the Civil War in America 1861–65. Boston: Houghton, Mifflin.  44. ^ Hacker, J. David (2011). "A Census-Based Count of the Civil War Dead". Civil War History 57 (4): 307–348.   45. ^ Humphreys, Margaret (2013). Marrow of Tragedy: The Health Crisis of the American Civil War. Baltimore: Johns Hopkins University Press.   46. ^ a b c Paskoff, Paul F. (2008). "Measures of War: A Quantitative Examination of the Civil War's Destructiveness in the Confederacy". Civil War History 54 (1): 35–62.   47. ^ Ezell, John Samuel (1963). The South since 1865. New York: Macmillan. pp. 27–28.  48. ^ Stover, John F. (1955). The Railroads of the South, 1865-1900: A Study in Finance and Control. Chapel Hill: University of North Carolina Press.  49. ^ Moore, A. B. (1935). "Railroad Building in Alabama During the Reconstruction Period".   50. ^ Summers, Mark Wahlgren (1984). Railroads, Reconstruction, and the Gospel of Prosperity: Aid Under the Radical Republicans, 1865–1877. Princeton: Princeton University Press.   51. ^ Hackney, Sheldon (1972). "Origins of the New South in Retrospect".   52. ^ Logan (1997). The Betrayal of the Negro from Rutherford B. Hayes to Woodrow Wilson. New York: Da Capo Press. p. 91.   53. ^   54. ^ Estes, Steve (2005). I Am a Man! Race, Manhood, and the Civil Rights Movement. Chapel Hill: University of North Carolina Press.   55. ^ Nicholas Lemann, The promised land: The great black migration and how it changed America (2011) 56. ^ Richard Knight, The Blues Highway: New Orleans to Chicago: a Travel and Music Guide (2003) 57. ^ Bernadette Pruitt (2013). The Other Great Migration: The Movement of Rural African Americans to Houston, 1900-1941. Texas A&M University Press. p. 287.  59. ^ Whitten, David O. (2010). "The Depression of 1893".  60. ^ Hahn, Steven (2005). A Nation under Our Feet: Black Political Struggles in the Rural South from Slavery to the Great Migration. Cambridge: Belknap Press. pp. 425–426.   61. ^ Sharon Monteith, ed. (2013). The Cambridge Companion to the Literature of the American South. Cambridge U.P. p. 94.  62. ^ U.S. Department of Commerce (1930). Statistical Abstract of the United States: 1930. Washington. pp. 113–115.  63. ^ Odum, Howard (1936). Southern regions of the United States. Chapel Hill: University of North Carolina Press. p. 100.  64. ^ Coelho, Philip R. P.; McGuire, Robert A. (2006). "Racial Differences in Disease Susceptibilities: Intestinal Worm Infections in the Early Twentieth-Century American South". Social History of Medicine 19 (3): 461–482.   indicates 56% of the whites suffered from worms, and 20% of the blacks. 65. ^ The classic histories are Woodward, C. Vann (1951). The Origins of the New South, 1877–1913. Baton Rouge: Louisiana State University Press  and Tindall, George B. (1967). The Emergence of the New South, 1913–1945. Baton Rouge: Louisiana State University Press.   66. ^ Cobb, James C. (2011). The South and America Since World War II. New York: Oxford University Press.   67. ^ Cobb, James C.; Stueck, William (2005). Globalization and the American South. Athens: University of Georgia Press.   68. ^ Dennis, Michael (2009). The New Economy and the Modern South. Gainesville: University Press of Florida.   69. ^ Black, Earl (2003). "The Republican Surge". The Rise of Southern Republicans. Cambridge: Harvard University Press.   70. ^ Kirby, Jack Temple (1986). Rural Worlds Lost: The American South, 1920–1960. Baton Rouge: Louisiana State University Press.   71. ^ Stanonis, Anthony J. (2008). Dixie Emporium: Tourism, Foodways, and Consumer Culture in the American South. Athens: University of Georgia Press. pp. 120–147 on Branson.   74. ^ Cooper, Christopher A.; Knotts, H. Gibbs (2004). "Defining Dixie: A State-Level Measure of the Modern Political South". American Review of Politics 25 (2): 25–39.  76. ^ Egnal, Marc (1996). Divergent Paths: How Culture and Institutions have shaped North American Growth. New York: Oxford University Press. p. 170.   77. ^ Mark, Rebecca; Vaughan, Robert C. (2004). The South. Westport: Greenwood Press. p. 147.   78. ^ Cooper, Christopher A.; Knotts, H. Gibbs (2010). "Declining Dixie: Regional Identification in the Modern American South". Social Forces 88 (3): 1083–1101 [p. 1084].   79. ^ Cooper, Christopher A.; Knotts, H. Gibbs, eds. (2008). The New Politics of North Carolina. Chapel Hill: University of North Carolina Press.   80. ^ Ayers, Edward L. (2005). What Caused the Civil War? Reflections on the South and Southern History. New York: Norton. p. 46.   81. ^ Hirsh, Michael (April 25, 2008). "How the South Won (This) Civil War".   See also (Former) Candidates for President: They have also supplied Presidential losers: This list encompasses members of the Whig Party, Republican Party and the Democratic Party; in addition, Washington, while officially non-partisan, was generally associated with the Federalist Party. Presidents born in Southern states, but not primarily identified with that region, include: • George H. W. Bush (term 1989-1993) was born in Massachusetts, but spent his adult life in Texas. • George W. Bush, born in Connecticut, lived from early childhood in Texas. Presidents born outside the South, but generally identified with the region: • Woodrow Wilson, was born and raised in the South. His academic and political career was in the North but he retained strong ties with the South. One President was born in the South, and is identified both with the South and elsewhere: Presidents born in the South and identified with the region include: The South has long been a center of political power in the United States, especially in regard to presidential elections. During the history of the United States, the South has supplied many of the 44 presidents. Virginia specifically was the birthplace of seven of the nation's first twelve presidents (including four of the first five). Southern presidents Apart from the still-distinctive climate, the living experience in the South increasingly resembles the rest of the nation. The arrival of millions of Northerners (especially in the suburbs and coastal areas)[76] and millions of Hispanics[77] means the introduction of cultural values and social norms not rooted in Southern traditions.[78][79] Observers conclude that collective identity and Southern distinctiveness are thus declining, particularly when defined against "an earlier South that was somehow more authentic, real, more unified and distinct."[80] The process has worked both ways, however, with aspects of Southern culture spreading throughout a greater portion of the rest of the United States in a process termed "Southernization".[81] Sociologists report that Southern collective identity stems from political, demographic and cultural distinctiveness. Studies have shown that Southerners are more conservative than non-Southerners in several areas including religion, morality, international relations and race relations.[72][73] In the 21st century, the South remains demographically distinct with higher percentages of blacks, lower percentages of high school graduates, lower housing values, lower household incomes and higher percentages of people in poverty.[74] That, combined with the fact that Southerners continue to maintain strong loyalty to family ties, has led some sociologists to label white Southerners a "quasi-ethnic regional group."[75] Millions of Northern retirees moved down for the mild winters. These well-to-do retirees often moved into expensive homes located near the ocean, which, over the years, resulted in increasingly expensive hurricane damages. Tourism became a major industry, especially in venues such as Williamsburg, Virginia, Myrtle Beach, South Carolina, Orlando, Florida, and Branson, Missouri.[71] The South urbanized as the cotton base collapsed, especially east of the Mississippi River. Farming was much less important (and the remaining farmers more often specialized in soybeans and cattle, or citrus in Florida). The need for cotton pickers ended with the utilization of picking machines after 1945, and nearly all the black cotton farmers moved to urban areas, often in the North. Whites, who had been farmers, usually moved to nearby towns. Factories and service industries were opened in those towns for employment.[70] In the decades after World War II, the old agrarian Southern economy evolved into the "New South" – a manufacturing region with strong roots in laissez faire capitalism. As a result, high-rise buildings began to crowd the skylines of Atlanta, Birmingham, Charlotte, Raleigh-Durham, Houston, Dallas, Nashville, and Little Rock.[66] King Cotton was dethroned. There were 1.5 million cotton farms in 1945, and only 18,600 remained in 2009. The Census stopped counting sharecroppers because they were so few.[38] The industrialization and modernization of the South picked up speed with the ending of racial segregation in the 1960s. Today, the economy of the South is a diverse mixture of agriculture, light and heavy industry, tourism, and high technology companies, and is becoming increasingly integrated into the global economy.[67] State governments aggressively recruited northern business to the "Sunbelt," promising more enjoyable weather and recreation, a lower cost of living, an increasingly skilled work force, minimal taxes, weak labor unions, and a business-friendly attitude.[68] With the expansion of jobs in the South, there has been migration of northerners, increasing the population and political influence of southern states. The newcomers displaced the old rural political system built around courthouse cliques. The suburbs became the base of the emerging Republican Party, which became dominant in presidential elections by 1968, and in state politics by the 1990s.[69] Creating the "New South" (1945–present) There was little cash in circulation, since most farmers operated on credit accounts from local merchants, and paid off their debts at cotton harvest time in the fall. Although there were small country churches everywhere, there were only a few dilapidated schools; high schools were available in the cities, which were few in number, but were hard to find in most rural areas. All the Southern high schools combined graduated 66,000 students in 1928. The school terms were shorter in the South, and total spending per student was much lower. Nationwide, the students in elementary and secondary schools attended 140 days of school in 1928, compared to 123 days for white children in the South and 95 for blacks. The national average in 1928 for school expenditures was $70,700 for every 1000 children aged 5–17. Only Florida reached that level; seven of the eleven Southern states spent under $31,000 per 1000 children.[62][63] Conditions were marginally better in newer areas, especially in Texas and central Florida, with the deepest poverty in South Carolina, Louisiana, Mississippi, and Arkansas. Hookworm[64] and other diseases sapped the vitality of a large fraction of Southerners.[65] Many of the white farmers, and some of the blacks, were tenant farmers who owned their work animals and tools, and rented their land. Others were day laborers or impoverished sharecroppers, who worked under the supervision of the landowner. Sharecropping was a way for landless farmers (both black and white) to earn a living. The landowner provided land, housing, tools and seed, and perhaps a mule, and a local merchant loaned money for food and supplies. At harvest time the sharecropper received a share of the crop (from one-third to one-half), which paid off his debt to the merchant. By the late 1860s white farmers also became sharecroppers. The cropper system was a step below that of the tenant farmer, who rented the land, provided his own tools and mule, and received half the crop. Landowners provided more supervision to sharecroppers, and less or none to tenant farmers.[61] The South remained heavily rural until World War II. There were only a few scattered cities; small courthouse towns serviced the farm population. Local politics revolve around the politicians and lawyers based at the courthouse. Mill towns, narrowly focused on textile production or cigarette manufacture, began opening in the Piedmont region especially in the Carolinas. Racial segregation and outward signs of inequality were everywhere, and rarely were challenged. Blacks who violated the color line were liable to expulsion or lynching.[60] Cotton became even more important than before, even though prices were much lower. White southerners showed a reluctance to move north, or to move to cities, so the number of small farms proliferated, and they became smaller and smaller as the population grew. Northeast 15% Middle Atlantic 17% Midwest 43% South Atlantic 63% South Central 67% West 29% Agriculture's Share of the Labor Force by Region, 1890: The Southern United States as defined by the Census Bureau.[58] Rural South As a result of the Civil Rights Laws of 1964 and 1965, all Jim Crow laws across the South were dropped. This change in the South's racial climate combined with the new industrialization in the region to help usher in what is called the New South. The migration also empowered the growing American Civil Rights Movement.[57] While the Civil Rights movement existed in all parts of the United States, its focus was against the Jim Crow laws in the South. Most of the major events in the movement occurred in the South, including the Montgomery Bus Boycott, the Mississippi Freedom Summer, the March on Selma, Alabama, and the assassination of Martin Luther King, Jr.. In addition, some of the most important writings to come out of the movement were written in the South, such as King's "Letter from Birmingham Jail". The Great Migration began during World War I, hitting its high point during World War II. During this migration, Black people left the racism and lack of opportunities in the South and settled in northern cities like Chicago, where they found work in factories and other sectors of the economy.[55] This migration produced a new sense of independence in the Black community and contributed to the vibrant Black urban culture seen in the emergence of jazz and the blues from New Orleans north to Memphis and Chicago.[56] African-Americans responded with two major reactions: the Great Migration and the Civil Rights Movement. The most extreme white leader was Senator Ben Tillman of South Carolina, who proudly proclaimed in 1900, "We have done our level best [to prevent blacks from voting]...we have scratched our heads to find out how we could eliminate the last one of them. We stuffed ballot boxes. We shot them. We are not ashamed of it."[52] With no voting rights and no voice in government, Blacks in the South were subjected to a system of segregation and discrimination. Blacks and whites attended separate schools. Blacks could not serve on juries, which meant that they had little if any legal recourse. In Black Boy, an autobiographical account of life during this time, Richard Wright writes about being struck with a bottle and knocked from a moving truck for failing to call a white man "sir."[53] Between 1889 and 1922, the NAACP calculates that lynchings reached their worst level in history, with almost 3,500 people, three-fourths of them black men, murdered.[54] After the Redeemers took control in the mid-1870s, Jim Crow laws were created to legally enforce racial segregation in public facilities and services. The phrase separate but equal, upheld in the 1896 Supreme Court case Plessy v. Ferguson, came to represent the notion that whites and blacks should have access to physically separate but ostensibly equal facilities. It would not be until 1954 that Plessy was overturned in Brown v. Board of Education, and only in the late 1960s was segregation fully repealed by legislation passed following the American Civil Rights Movement. Race: from Jim Crow to the Civil Rights movement "Of one thing we may be certain at the outset. The durability of Origins of the New South is not a result of its ennobling and uplifting message. It is the story of the decay and decline of the aristocracy, the suffering and betrayal of the poor whites, and the rise and transformation of a middle class. It is not a happy story. The Redeemers are revealed to be as venal as the carpetbaggers. The declining aristocracy are ineffectual and money hungry, and in the last analysis they subordinated the values of their political and social heritage in order to maintain control over the black population. The poor whites suffered from strange malignancies of racism and conspiracy-mindedness, and the rising middle class was timid and self-interested even in its reform movement. The most sympathetic characters in the whole sordid affair are simply those who are too powerless to be blamed for their actions."[51] The classic history was written by C. Vann Woodward, The Origins of the New South: 1877-1913, which was published in 1951 by Louisiana State University Press. Sheldon Hackney, explains: Origins of the New South, 1877–1913 A reaction to the defeat and changes in society began immediately, with vigilante groups such as the White League and Red Shirts, took part in turning Republicans out of office and barring or intimidating blacks from voting. Reconstruction was a harsh time for many white Southerners who found themselves without many of the basic rights of citizenship (such as the ability to vote). Reconstruction was also a time when many African Americans began to secure these same rights. With the passage of the 13th Amendment to the Constitution (which outlawed slavery), the 14th Amendment (which granted full U.S. citizenship to African Americans) and the 15th Amendment (which extended the right to vote to black males), African Americans in the South began to enjoy more rights than they had ever had in the past. In 1866 at stage 2, the states were grouped into five military districts. Backlash to Reconstruction The Panic of 1873 ended the expansion everywhere in the United States, leaving many Southern lines bankrupt or barely able to pay the interest on their bonds. The building of a new, modern rail system was widely seen as essential to the economic recovery of the South, and modernizers invested in a "Gospel of Prosperity." Northern money financed the rebuilding and dramatic expansion of railroads throughout the South; they were modernized in terms of rail gauge, equipment and standards of service. the Southern network expanded from 11,000 miles (17,700 km) in 1870 to 29,000 miles (46,700 km) in 1890. Railroads helped create a mechanically skilled group of craftsmen and broke the isolation of much of the region. Passengers were few, however, and apart from hauling the cotton crop when it was harvested, there was little freight traffic.[48][49] The lines were owned and directed overwhelmingly by Northerners, who often had to pay heavy bribes to corrupt politicians for needed legislation.[50] Reconstruction was the process by which the states returned to full status. It took place in four stages, which varied by state. Tennessee and the border states were not affected. First came the governments appointed by President Andrew Johnson that lasted 1865-66. The Freedmen's Bureau was active, helping refugees, setting up employment contracts for Freedmen, and setting up courts and schools for the Freedmen. Second came rule by the U.S. Army, which held elections that included all Freedmen but excluded over 10,000 Confederate leaders. Third was "Radical Reconstruction" or "Black Reconstruction" in which a Republican coalition governed the state, comprising a coalition of Freedmen, Scalawags (native whites) and Carpetbaggers (migrants from the North). Violent resistance by the Ku Klux Klan and related groups was suppressed by President Ulysses S. Grant and the vigorous use of federal courts and soldiers in 1868-70. The Reconstruction governments spent large sums on railroad subsidies and schools, but quadrupled taxes and set off a tax revolt among conservatives. Stage four was reached by 1876 as the conservative coalition, called Redeemers, had won political control of all the states except South Carolina, Florida and Louisiana. The disputed presidential election of 1876 hinged on those three violently contested states. The outcome was the Compromise of 1877 whereby the Republican Rutherford Hayes became president and all federal troops were withdrawn from the South, leading to the immediate collapse of the last Republican state governments. Political Reconstruction, 1863-1877 The Confederacy in 1861 had 297 towns and cities with 835,000 people; of these 162 with 681,000 people were at one point occupied by Union forces. Ten were destroyed or severely damaged by war action, including Atlanta (with an 1860 population of 9,600), Columbia, and Richmond (with prewar populations of 8,100, and 37,900, respectively), plus Charleston, much of which was destroyed in an accidental fire in 1861. These eleven contained 115,900 people in the 1860 census, or 14% of the urban South. Historians have not estimated their population when they were invaded. The number of people who lived in the destroyed towns represented just over 1% of the Confederacy's population. In addition, 45 court houses were burned (out of 830). The South's agriculture was not highly mechanized. The value of farm implements and machinery in the 1860 Census was $81 million; by 1870, there was 40% less, of $48 million worth. Many old tools had broken through heavy use and could not be replaced; even repairs were difficult.[46] The number of civilian deaths is unknown, but was highest among refugees and former slaves.[33][45] Most of the war was fought in Virginia and Tennessee, but every Confederate state was affected as well as Maryland, West Virginia, Kentucky, Missouri, and Indian Territory; Pennsylvania was the only northerner state to be the scene of major action, during the Gettysburg campaign. In the Confederacy there was little military action in Texas and Florida. Of 645 counties in 9 Confederate states (excluding Texas and Florida), there was Union military action in 56% of them, containing 63% of the whites and 64% of the slaves in 1860; however by the time the action took place some people had fled to safer areas, so the exact population exposed to war is unknown.[46] Reports from Confederate officials show 94,000 killed in battle and another 164,000 who died of disease, with about 194,000 wounded.[43] The Confederate official counts are too low; perhaps another 75,000-100,000 Confederate soldiers died because of the war.[44] In Charleston, a journalist in September 1865 discovered "a city of ruins, of desolation, of vacant houses, of widowed women, of rotten wharves, of deserted warehouses, of weed-wild gardens, of miles of grass-grown streets, of acres of pitiful and voiceful barrenness."[41][42] Reconstruction played out against a backdrop of a once prosperous economy that lay in ruins. According to Hesseltine (1936), :"Throughout the South, fences were down, weeds had overrun the fields, windows were broken, live stock had disappeared. The assessed valuation of property declined from 30 to 60 percent in the decade after 1860. In Mobile, business was stagnant; Chattanooga and Nashville were ruined; and Atlanta's industrial sections were in ashes.[40] Charleston, like most Southern cities in 1865, was "a city of ruins, of desolation, of vacant houses, of widowed women, of rotten wharves, of deserted warehouses, of weed-wild gardens, of miles of grass-grown streets, of acres of pitiful and voiceful barrenness." Material ruin and human losses Reconstruction began as soon as the Union Army took control of a state; the start and ending times varied by state, beginning in 1863 and ending in 1877. Slavery ended and the large slave-based plantations were mostly subdivided into tenant or sharecropper farms of 20-40 acres. Many white farmers (and some blacks) owned their land. However sharecropping, along with tenant farming, became a dominant form in the cotton South from the 1870s to the 1950s, among both blacks and whites. By the 1960s both had largely disappeared. Sharecropping was a way for very poor farmers, both white and black, to earn a living from land owned by someone else. The landowner provided land, housing, tools and seed, and perhaps a mule, and a local merchant provided food and supplies on credit. At harvest time the sharecropper received a share of the crop (from one-third to one-half, with the landowner taking the rest). The cropper used his share to pay off his debt to the merchant. The system started with blacks when large plantations were subdivided. By the 1880s white farmers also became sharecroppers. The system was distinct from that of the tenant farmer, who rented the land, provided his own tools and mule, and received half the crop. Landowners provided more supervision to sharecroppers, and less or none to tenant farmers.[38][39] Reconstruction (1863–1877) Out-gunned, out-manned, and out-financed, defeat loomed after four years of fighting. When Lee surrendered to Grant in April 1865, the Confederacy fell. There was no insurgency, no treason trials, and only one war crimes trial. [37] By 1864 the top Union generals Sherman's March through Georgia and the Carolinas Sherman's March The Union had a 3-1 superiority in railroad mileage and (even more important) an overwhelming advantage in engineers and mechanics in the rolling mills, machine shops, factories, roundhouses and repair yards that produced and maintained rails, bridging equipage, locomotives, rolling stock, signaling gear, and telegraph equipment. In peacetime the South imported all its railroad gear from the North; the Union blockade completely cut off such imports. The lines in the South were mostly designed for short hauls, as from cotton areas to river or ocean ports; they were not designed for trips of more than 100 miles or so, and such trips involved numerous changes of trains and layovers.[34] The South's 8,500 miles of track comprised enough of a railroad system to handle essential military traffic along some internal lines, assuming it could be defended and maintained. As the system deteriorated because of worn out equipment, accidents and sabotage, the South was unable to construct or even repair new locomotives, cars, signals or track. Little new equipment ever arrived, although rails in remote areas such as Florida were removed and put to more efficient use in the war zones. Realizing their enemy's dilemma, Union cavalry raids routinely destroyed locomotives, cars, rails, roundhouses, trestles, bridges, and telegraph wires. By the end of the war, the southern railroad system was totally ruined. Meanwhile, the Union army rebuilt rail lines to supply its forces. A Union railroad through hostile territory, as from Nashville to Atlanta in 1864, was an essential but fragile lifeline—it took a whole army to guard it, because each foot of track had to be secure. Large numbers of Union soldiers throughout the war were assigned to guard duty and, while always ready for action, seldom saw any fighting.[35] Abolition of slavery Historians disparage the effectiveness of President Jefferson Davis, with a consensus holding that he was much less effective than Abraham Lincoln.[28] As a former Army officer, Senator, and Secretary of War, he possessed the stature and experience to be president, but certain character defects undercut his performance. He played favorites and was imperious, frosty, and quarrelsome. By dispensing with parties, he lost the chance to build a grass roots network that would provide critically needed support in dark hours. Instead, he took the brunt of the blame for all difficulties and disasters. Davis was animated by a profound vision of a powerful, opulent new nation, the Confederate States of America, premised on the right of its white citizens to self-government. However, in dramatic contrast to Lincoln, he was never able to articulate that vision or provide a coherent strategy to fight the war. He neglected the civilian needs of the Confederacy while spending too much time meddling in military details. Davis's meddling in military strategy proved counterproductive. His explicit orders that Vicksburg be held no matter what sabotaged the only feasible defense and led directly to the fall of the city in 1863.[29][30] The Confederacy decided not to have political parties. There was a strong sense that parties were divisive and would weaken the war effort. Historians, however, agree that the lack of parties weakened the political system. Instead of having a viable alternative to the current system, as expressed by a rival party, the people could only grumble and complain and lose faith.[27] [26] The strength of the Confederacy included an unusually strong officer corps—about a third of the officers of the U.S. Army had resigned and joined. But the political leadership was not very effective. A classic interpretation is that the In 1861 the rebels assumed that "King Cotton" was so powerful that the threat of losing their supplies would induce Britain and France to enter the war as allies, and thereby frustrate Union efforts. Confederate leaders were ignorant of European conditions; Britain depended on the Union for its food supply, and would not benefit from an extremely expensive major war with the U.S. The Confederacy moved its capital from a defensible location in remote Montgomery, Alabama, to the more cosmopolitan city of Richmond, Virginia, only 100 miles from Washington. Richmond had the heritage and facilities to match those of Washington, but its proximity to the Union forced the CSA to spend most of its war-making capability to defend Richmond. The Union naval blockade starting in May 1861, reducing exports by 95%; only small, fast blockade runners—mostly owned and operated by British interests—could get through. The South's vast cotton crops became nearly worthless.[25] Both sides wanted the border states, but the Union military forces took control of all of them in 1861-1862. Union victories in western Virginia allowed a Unionist government based in Wheeling to take control of western Virginia and, with Washington's approval, create the new state of West Virginia.[24] The Confederacy did recruit troops in the border states, but the enormous advantage of controlling them went to the Union. The seceded states, joined together as the Confederate States of America and only wanting to be independent, had no desire to conquer any state north of its border. After secession, no compromise was possible, because the Confederacy insisted on its independence and the Lincoln Administration refused to meet with President Davis's commissioners. Instead of diplomacy, Lincoln ordered that a Navy fleet of warships and troop transports be sent to Charleston Harbor to reinforce and resupply Fort Sumter. Just before the fleet was about to enter the harbor, Confederates forced the Federal garrison holed up in the fort to surrender. That incident, although only a cannon duel that produced no deaths, allowed President Lincoln to proclaim that United States forces had been attacked and justified his calling up of troops to invade the seceded states. In response the Confederate military strategy was to hold its territory together, gain worldwide recognition, and inflict so much punishment on invaders that the Northerners would tire of an expensive war and negotiate a peace treaty that would recognize the independence of the CSA. Two Confederate counter-offensives into Maryland and southern Pennsylvania failed to influence Federal elections as hoped. The victory of Lincoln and his party in the 1864 elections made the military victory only a matter of time. Sequence of states' secession, Civil War, and restoration to the Union Civil War (1860–1865) In Washington, proposals for compromise and reunion went nowhere, as the Confederates demanded complete, total, permanent independence. When Lincoln dispatched a supply ship to federal-held Fort Sumter, in South Carolina, the Confederate government ordered an attack on the fort, which surrendered on April 13. President Lincoln called upon the states to supply 75,000 troops to serve for ninety days to recover federal property, and, forced to choose sides, Virginia, Arkansas, Tennessee, and North Carolina promptly voted to secede. Kentucky declared its neutrality.[23] Members of the Confederate States of America. Throughout the South, Confederates seized federal arsenals and forts, without resistance, and forced the surrender of all U.S. forces in Texas. The sitting President, James Buchanan, believed he had no constitutional power to act, and in the four months between Lincoln's election and his inauguration, the South strengthened its military position.[22] For many Southerners, the last straws were the raid on Harper's Ferry in 1859 by fanatical abolitionist John Brown, immediately followed by a Northern Republican presidential victory in the election of 1860. Republican Abraham Lincoln was elected president with only 40% of the popular vote and with hardly any popular support in the South.[21] Election of 1860, secession, and Lincoln's response With the Mexican War, which alarmed many Northerners by adding new territory on the Southern side of the free-slave boundary, the slavery-in-the-territories issue heated up dramatically. After a four-year sectional conflict the Compromise of 1850 narrowly averted civil war with a complex deal in which California was admitted as a free state including Southern California thus preventing a separate slave territory there, while slavery was allowed in the New Mexico and Utah territories and a stronger Fugitive Slave Act of 1850 was passed requiring all citizens to assist in recapturing runaway slaves wherever found. Four years later, the peace bought with successive compromises finally came to an end. In the Kansas-Nebraska Act, Congress left the issue of slavery to a vote in each territory, thereby provoking a breakdown of law and order as rival groups of pro- and anti-slavery immigrants competed to populate the newly settled region. At the same time, Southerners increasingly perceived the economic and population growth of the North as threatening to their interests. For several decades after the Union was formed, as new states were admitted, North and South were able to finesse their sectional differences and maintain political balance by agreeing to admit "slave" and "free" states in equal numbers. By means of this compromise approach, the balance of power in the Senate could be extended indefinitely. The House of Representatives, however, was a different matter. As the North industrialized and its population grew, aided by a major influx of European immigrants, the Northern majority in the House of Representatives also grew, making Southern political leaders increasingly uncomfortable. Southerners became concerned that they would soon find themselves at the mercy of a federal government in which they no longer had sufficient representation to protect their interests. By the late 1840s, Senator Jefferson Davis from Mississippi stated that the new Northern majority in the Congress would make the government of the United States "an engine of Northern aggrandizement" and that Northern leaders had an agenda to "promote the industry of the United States at the expense of the people of the South." Another issue feeding sectionalism was slavery, and especially the issue of whether to permit slavery in western territories seeking admission to the Union as states. In the early 19th century, as the cotton boom took hold, slavery became more economically viable on a large scale, and more Northerners began to perceive it as an economic threat, even if they remained indifferent to its moral dimension. While relatively few Northerners favored outright abolition, many more opposed the expansion of slavery to new territories, as in their view the availability of slaves lowered wages for free labor. Sectional parity and issue of slavery in new territories Thirty years later, during the "Nullification" crisis, the "Principles of '98" embodied in these resolutions were cited by leaders in South Carolina as a justification for state legislatures' asserting the power to nullify, or prevent the local application of, acts of the federal Congress that they deemed unconstitutional. The Nullification crisis arose as a result of the Tariff of 1828, a set of high taxes on imports of manufactures, enacted by Congress as a protectionist measure to foster the development of domestic industry, primarily in the North. In 1832, the legislature of South Carolina nullified the entire "Tariff of Abominations," as the Tariff of 1828 was known in the South, prompting a stand-off between the state and federal government. On May 1, 1833, President Andrew Jackson wrote, "the tariff was only a pretext, and disunion and southern confederacy the real object. The next pretext will be the negro, or slavery question."[18] Although the crisis was resolved through a combination of the actions of the president, Congressional reduction of the tariff, and the Force Bill, it had lasting importance for the later development of secessionist thought.[19] An additional factor that led to Southern sectionalism was the proliferation of cultural and literary magazines such as the Southern Literary Messenger and DeBow's Review.[20] Although slavery had yet to become a major issue, states' rights issues surfaced periodically in the early antebellum period, especially in the South. The election of Federalist John Adams in the 1796 presidential election came in tandem with escalating tensions with France. In 1798, the XYZ Affair brought these tensions to the fore, and Adams became concerned about French power in America, fearing internal sabotage and malcontent brought on by French agents. In response to these developments and to repeated attacks on Adams and the Federalists by Democratic-Republican publishers, Congress enacted the Alien and Sedition Acts. Enforcement of the acts resulted in the jailing of "seditious" Democratic-Republican editors throughout the North and South, and prompted the adoption of the Kentucky and Virginia Resolutions of 1798 (authored by Thomas Jefferson and James Madison), by the legislatures of those states. See also, Nullification and Nullification crisis Nullification crisis, political representation, and rising sectionalism This chart shows how dependent the south was on foreign trade, and why it was so violently opposed to abolition, since slaves provided the labor needed to support the cotton economy. Comparison of Union and CSA[17] Union CSA Total population 22,000,000 (71%) 9,000,000 (29%) Free population 22,000,000 5,500,000 1860 Border state slaves 432,586 NA 1860 Southern slaves NA 3,500,000 Soldiers 2,200,000 (67%) 1,064,000 (33%) Railroad miles 21,788 (71%) 8,838 (29%) Manufactured items 90% 10% Firearm production 97% 3% Bales of cotton in 1860 Negligible 4,500,000 Bales of cotton in 1864 Negligible 300,000 Pre-war U.S. exports 30% 70% While about a third of white Southern families were slave owners, most were independent yeoman farmers. Nevertheless, the slave system represented the basis of the Southern social and economic system, and thus even non-slaveowners opposed any suggestions for terminating that system, whether through outright abolition or case-by case manumission. In the North, where slaves were mostly household servants or farm laborers, every state abolished slavery; New Jersey was the last in 1804. Slavery was also abolished in the Northwest Territory and its states. Therefore, by 1804 a North-South line over slavery emerged; it was called the Mason–Dixon line (which separated free Pennsylvania and slave Maryland.) Antebellum slavery In the South, Agrarian republicanism formed the basis of political culture. Led by Thomas Jefferson and James Madison, the Agrarian republican position is characterized by the epitaph on the grave of Jefferson. While including his "condition bettering" roles in the foundation of the University of Virginia, and the writing of the Declaration of Independence and the Virginia Statute for Religious Freedom, absent from the epitaph was his role as President of the United States. The development of Southern political thought thus focused on the ideal of the yeoman farmer; i.e., those who are tied to the land also have a vested interest in the stability and survival of the government. For the North, a Puritanical republicanism predominated, with leaders such as Alexander Hamilton and John Adams. Southern leaders were able to protect their sectional interests during the Constitutional Convention of 1787, preventing the insertion of any explicit anti-slavery position in the Constitution. Moreover, they were able to force the inclusion of the "fugitive slave clause" and the "Three-Fifths Compromise." Nevertheless, Congress retained the power to regulate the slave trade, and twenty years after the ratification of the Constitution, the law-making body prohibited the importation of slaves, effective January 1, 1808. While North and South were able to find common ground in order to gain the benefits of a strong Union, the unity achieved in the Constitution masked deeply rooted differences in economic and political interests. After the 1787 convention, two discrete understandings of American republicanism emerged. Importantly, Southerners of 1861 often believed their secessionist efforts and the Civil War paralleled the American Revolution, as a military and ideological "replay" of the latter. After the upheaval of the American Revolution effectively came to an end at the Siege of Yorktown (1781), the South became a major political force in the development of the United States. With the ratification of the Articles of Confederation, the South found political stability and a minimum of federal interference in state affairs. However, with this stability came weakness by design, and the inability of the Confederation to maintain economic viability eventually forced the creation of the United States Constitution, in Philadelphia in 1787. Antebellum era (1781–1860) The British army marched to Yorktown, Virginia where they expected to be rescued by a British fleet. The fleet showed up but so did a larger French fleet, so the British fleet after the Battle of the Chesapeake returned to New York for reinforcements, leaving General Cornwallis trapped by the much larger American and French armies under Washington. He surrendered. The most prominent Loyalists, especially those who joined Loyalist regiments, were evacuated by the Royal Navy back to England, Canada or other British colonies; they brought their slaves along, but lost their land. However, the great majority of Loyalists remained in the southern states and became American citizens.[16] The siege of Yorktown ended with the surrender of a second British army, marking effective British defeat in the war.
global_05_local_6_shard_00002272_processed.jsonl/5233
back to Taste Brew Your Own Beer Taught by The Occasional Brewer Sorry, This class is sold out Join the realm of craft beer for an afternoon of hops and a few laughs with the team at The Occasional Brewer. Decide what kind of beer you’d like to brew either on your own or with a mate. Early in the brewing process, Mike from Panhead Brewery will take you through a beer tasting and chat about what makes a craft brew great. When you’ve finished brewing, the team at The Occasional Brewer will ferment it in temperature-controlled rooms. Come back in a couple of weeks to bottle your beer – all 40 litres of it. Cheers! Please note that this workshop is limited to R18. What to Bring All materials are included in the workshop. Book Now
global_05_local_6_shard_00002272_processed.jsonl/5267
LED installation at EXPO 2005 Making the northern lights shine in Japan The Northern Lights installation Switching on some Nordic magic The northern lights or aurora borealis is a natural wonder that draws people to the Nordic region from around the world, including many Japanese - perhaps encouraged by their myth that happiness and good fortune will shine upon a child conceived under its glow. The Japanese fascination with the aurora borealis inspired Peter Bysted to create a 'living picture' of the natural phenomenon in the joint Nordic Pavilion at EXPO 2005 in Nagoya. Working with lighting company Louis Poulsen, Peter Bysted and Philip Egebak created a 12 by 5 meter installation that got Japanese visitors to lay their head back and dream of the polar night's silence and mystery. Artificial northern lights. Prototype at the workshop. A curtain of light The installation was a way to experiment and explore the potential of LED lighting which, in 2005, was still an up-and-coming technology. The installation's illusion was created by acrylic rods that were illuminated from above by powerful LEDs. Controlled by computer, the light was programmed to form the colour-changing 'curtains' that people associate with the aurora borealis. The natural aurora borealis The sound of light For the installation, Kristian Vester (Goodiepal) was asked to create sounds to accompany the light show. This increased the impact of the experience and linked to an old idea that the aurora borealis generates sounds along with spectacular light. The native people of the region, the Sami, call the Northern Lights the 'Gouvssahas', which means light that can be heard. And some vistors, upon seeing the aurora borealis, claim to hear a crackling sound. While this may be caused by an electromagnetic pulse, others simply believe that the sound is caused by the viewer - a sense perception caused by extremely quiet environments. Design: Peter Bysted, Philip Egebak Client: Nordic Council of Ministers Date: 2005
global_05_local_6_shard_00002272_processed.jsonl/5275
XML Sitemap URLPriorityChange frequencyLast modified (GMT) http://inamura-ganka.jp/arc/349/20%Monthly2017-04-26 07:52
global_05_local_6_shard_00002272_processed.jsonl/5281
How to send bitcoins to paper wallet Bitcoin Cold Storage Guide. and the setup process is more simple than that of paper wallets.When you want to receive Bitcoin, you just check the piece of paper for your public key.Sending money to a paper wallet is. then send the complete contents of the paper wallet to. Maidsafecoin wallet. paper wallet to store bitcoins, send those bitcoins to, buy maidsafecoin and withdraw those maidsafecoins back to the bitcoin.Desktop wallets allow users to create an address for sending and receiving bitcoins and provide a.Introduction to bitcoin. you are sure to be able to receive and send Bitcoins from and to different.As a follow up to our tutorial, How to send bitcoins using our web wallet, we wanted to also show you that you can send bitcoins with the Blockchain Wallet using.This page gives an overview of how to choose a Bitcoin Wallet as well as a guide to the different types of Bitcoin wallets available. Frequently asked questions on the subject of sending Bitcoins.What is a paper wallet and how can it help. when sending Bitcoin to ensure a timely.SENDING AND RECEIVING BITCOINS ANONYMOUSLY. By. Tarquin. or choose a wallet of your own to send the Bitcoins to.If you use a hardware or paper wallet for secure storage of bitcoins,.In this video we show how simple it is to send Bitcoin from a.My question is this: is it as simple as withdrawing the MaidSafe I now have at Poloniex and send it to the Bitcoin Paper Wallet address.What Is Bitcoin, How Does Bitcoin Work, What Is Bitcoin Mining, What Is a Bitcoin Wallet. A paper wallet is a paper copy of your public and private key for your Bitcoins. Sending btc from a paper wallet to my coinbase wallet BitAddress Bitcoin Paper Wallet - Reviews and Features Quote from: Frosxh on March 14, 2017, 02:59:56 AM Quote from: Wusolini on March 14, 2017, 01:56:09 AM Quote from: Frosxh on March 14, 2017, 01:46:02 AM you can try using mycelium to sweep your bitcoins, you will just need to scan the QR code and send your bitcoins to another address that you want. tried it in the past and i recommend using it, very simple to use This would cost him double fee. Blockchain.Info Paper Wallet - Step 9: Paste your private key from the paper wallet (1) and the unsigned transaction (2).Bitcoin News and Updates. sending your bitcoin from a breadwallet to a cryptoart (paper wallet).In this guide I am going to go through how to redeem and spend Bitcoins which you have received on a paper wallet.Breadwallet User Manual. you need a Bitcoin wallet to send and receive bitcoins. You can do so by simply writing it down on a piece of paper. Maidsafecoin wallet - Safecoin - SAFE Network Forum Tutorial: How to create a sleek bitcoin paper wallet — Steemit Bitcoin wallets: How to protect your digital currency In this video I show you how to use to create a Bitcoin paper wallet to store your funds safely offline.Installing your wallet on a smartphone or PC allows you to send and receive Bitcoins as easily as. 7 Bitcoin wallet.Have you received a Bitcoin paper wallet, possibly as a gift,. Read our guide on how to use your Blockchain Wallet. Although it looks similar to an address, your Wallet ID cannot be used to send or request bitcoin or ether.Can you tell me step by step how do I send Bitcoin in paper wallet to other person.Your Guide Through Bitcoin Wallets. the private keys are usually a long and complicated code of the bitcoins you are sending out,.Read on to find out why, and how, to make a Bitcoin paper wallet. Alternatively, you can also use other apps like Electrum, for example, to sign transactions.In my earlier guide on Bitcoin wallets, I talked a little about Bitcoin paper wallets.The Bitcoin wallet is the file that. there are actually multiple signatures required to send bitcoins to another user.The Bitcoin Paper Wallet site is one of the most convenient ways to generate a secure storage solution for cryptocurrency.Lightweight clients on the other hand consult a full client to send and receive transactions without requiring a local. When you are storing your bitcoins for a longer term, using a paper wallet.How to send bitcoins from an online wallet to a wallet.All bitcoin wallets (bitcoin paper wallet, offline bitcoin wallet,. bitcoin online wallet) helps to send and receive bitcoins and shows the bitcoin balance.How to Setup a Bitcoin Mobile Wallet. Write it down on paper or store it cloud. you can send them to anyone in the Bitcoin network.
global_05_local_6_shard_00002272_processed.jsonl/5306
Thursday, April 17, 2003 Compliments on my illustration (see previous post). The site for this magazine is: Next post will have the 2nd flattering happening. Saturday, April 12, 2003 Desert Sky Tours - new website launched! Well, up until the early hours. Also introduced a 'friend' to the world of bloggers! I had to design a website. Promised since January. I never seemed to get with Howard on this, and managed to do it from what he provided via emails. Being frames, my FrontPage web editor didn't want to work, and I didn't have time to work it out, so ended up hand-writing it in html! Not heaps of content so it wasn't too cumbersome, but was about 3.30am before I hit my bed! Wanna take a peek? It's - hope you like it. It's about touring the wide, wild broad expanse of our outback in my home state of South Australia in unique 6 wheel all terrain drive vehicles that carry a groups of people. Hope you like it.
global_05_local_6_shard_00002272_processed.jsonl/5335
Emily Bronte Wuthering Heights vrijdag 7 augustus 2009 De Brontes en Tennyson Brontë scholarship has determined that Charlotte Brontë disliked Tennyson based on some comments to Elizabeth Gaskell and has, in general, overlooked his influence on her works. It is true that Elizabeth Gaskell relates her first meeting with Charlotte Brontë in the Lake District like this: She and I quarrelled & differed about almost every thing,-she calls me a democrat, & can not bear Tennyson- but we like each other heartily I think & I hope we shall ripen into friends. (EG to Charlotte Freude, 25 August 1850) And it is also true that Charlotte Brontë disliked Tennyson's In Memoriam (the poem that the poet devoted to his late friend Arthur Henry Hallam (1811-33), published in 1850). But it is also true that Tennyson was not a rara avis in the Parsonage. After the failure of the Poems by Currer, Ellis and Acton Bell, the sisters decided to send some of the unsold copies to well-known poets: Wordsworth, Coleridge, De Quincey and Tennyson (16 June 1847)(1) Sir—My relatives, Ellis & Acton Bell and myself, heedless of the repeated warnings of various respectable publishers, have committed the rash act of printing a volume of poems. The consequences predicted have, of course, overtaken us; our book is found to be a drug; no man needs it or heeds it; in the space of a year our publisher has disposed but of two copies and by what painful efforts he succeeded in getting rid of those two—himself only knows. Before transferring the edition to the trunk-makers, we have decided on distributing as presents a few copies of what we cannot sell. We beg to offer you one in acknowledgement of the pleasure and profit we have often and long derived from your works. I am sir, yours very respectfully, Currer Bell (MS is at the Beineker Library at Yale) And Tennyson was popular enough with at least Emily Brontë as to be chosen as a gift to her sister when Charlotte and Anne were in London in their famous July 1848 visit. They chose the recently published The Princess (1847). The familiarity of Charlotte Brontë with Tennyson is unquestionable: In February 1849 William Smith Williams (WSW) sent Charlotte a parcel of books including Tennyson's Poems, which Charlotte informed him she already possessed(2); in October 1850 reviewing for WSW Sydney Dobell's(3) The Roman, she praised him with a You hear Tennyson indeed sometimes and Byron sometimes in some passages of the 'Roman'. (CB to WSW, 25 October 1850) Fortunately, recently some scholars have begun to re-examine Tennyson's influence on Charlotte Brontë. We are thinking of Alison Hoddinott, who in a recent issue of Brontë Studies(4) exposed the so-called Perils of Biography: Charlotte Brontë and Tennyson: It has been generally accepted by biographers that Charlotte Brontë thoroughly disliked Tennyson's poetry. This belief is based on a remark made by Elizabeth Gaskell in a letter written shortly after her first meeting with Charlotte. This article challenges the accepted view and explores the literary connections between The Princess and Shirley and between In Memoriam and Villette and argues that Tennyson had a complex influence on Charlotte Brontë's last two novels. We don't know for sure, of course, if Charlotte Brontë felt the influence of Tennyson or loathed him, but what we do know is what Tennyson himself thought of the Brontës. According to his son and biographer Hallam Tennyson who printed Charlotte's letter to his father in his book: Alfred Lord Tennyson: A memoir (1897): For the sisters Brontë my father had the highest admiration. (p. 262) (1) Curiously enough in a review of the 3d edition of Jane Eyre (which included a reissue of The Poems), the Standard of Freedom's reviewer (21 Oct 1848) commented "We meet wandering echoes of Wordsworth" (as in Acton Bell's Memory) and of Tennyson. The Parlour The Parlour Charlotte Bronte Poem: No coward soul is mine No coward soul is mine, No trembler in the worlds storm-troubled sphere: I see Heavens glories shine, And faith shines equal, arming me from fear. O God within my breast. Almighty, ever-present Deity! Life -- that in me has rest, Vain are the thousand creeds That move mens hearts: unutterably vain; Worthless as withered weeds, Or idlest froth amid the boundless main, To waken doubt in one Holding so fast by Thine infinity; So surely anchored on The steadfast Rock of immortality. With wide-embracing love Thy Spirit animates eternal years, Pervades and broods above, Changes, sustains, dissolves, creates, and rears. Though earth and man were gone, And suns and universes ceased to be, And Thou wert left alone, Every existence would exist in Thee. There is not room for Death, Nor atom that his might could render void: Thou -- Thou art Being and Breath, And what Thou art may never be destroyed. Emily Bronte Family tree The Bronte Family Grandparents - paternal Grandparents - maternal Patrick Bronte married Maria Branwell on 29th December 1812. The Bronte Children Patrick and Maria Bronte had six children. Top Withens in the snow. Top Withens in the snow. Related Posts with Thumbnails
global_05_local_6_shard_00002272_processed.jsonl/5366
Weird kernel ? problem.. :() Egor Egorov ( Mon, 16 Dec 1996 17:11:00 -0300 (GMT+3) Today, system is up for five days, and I've got: *: can't resolve symbol 'sigaction' Where * is every program I started, that propably requires this symbol to be resolved (i.e. ls ran ok). When I shut down system, init hung after "no more pro..". :( What's this ? Kernel 2.0.27, RedHat 4.0, but libc 5.2.18. Can it be a hardware problem ?
global_05_local_6_shard_00002272_processed.jsonl/5368
Saturday, 9 March 2013 The Extraterrestrial Loch Ness Monster Is the Loch Ness Monster a species of animal that is not only beyond the reach of identification but also beyond the reaches of this planet? In the latest of our series of articles on "What is the Loch Ness Monster?", we come to possibly the weirdest one yet. The question will naturally arise as to what grounds one would base such a claim upon. I personally have none but we like to look at all theories on this blog whether they are considered respectable or not. However, it was a comment by a reader recently that proved the catalyst for this article. He had said that it was the higher strangeness sightings that he was mainly interested in and this got me thinking for there was a story that was dimly in my memory. It involved a person who claimed they had had an extraterrestrial encounter with the Loch Ness Monster. and for the life of me I could not remember the source of the story.  As it turned out, my years of teenage research into UFOs and other strange phenomena proved worthwhile as I had kept some notes and that story was there. It involved a man called Ted Owens and was related in a book called "UFO Trek" by Warren Smith. The author had included snippets of an interview he conducted with Ted Owens who was a "contactee". Owens claimed to be in contact via telepathy with extra-dimensional beings he called the "Space Intelligences" and also claimed they had given him special psychokinetic abilities to influence such things as the weather. The relevant part of the interview is quoted below: Smith: I understand you were in Scotland and found out something about the Loch Ness Monster. Would you share that with us? Owens: I went over there to make contact with the SIs. They sent me on a mission and Loch Ness was one of the places I was to visit. It was the dark of night, just after midnight, when I stood on the shores of the lake. That's when the monster came up out of the depths and surfaced. It wasn't more than twenty or thirty feet from the shore. It stared at me and in the moonlight I could see a long neck, about eight inches in diameter, and a small head. The head was about the size of a football. I communicated with the creature. It is from another dimension and has a link with the SIs. The monster does not die because it does not have a life system as we understand it. Actually, there is more than one such creature in the Loch. I would presume this alleged incident took place in the early 1970s. Quite a story as you can imagine but what shall we make of it? In more ways that one, the extraterrestrial Nessie theory is similar to the Paranormal Nessie theory. It solves such questions as food supply and elusiveness. In this very quote, the creature is implying it has no need of whatever is in the loch for nutrition and the question of elusiveness is further answered since there is a presumption that its obvious intelligence and other abilities makes it decide whether to put in an appearance before those incredulous humans. But then again more questions arise than answers. After all, it is a contentious subject whether alien life forms even visit the Earth today, let alone leave other such lifeforms in lakes around the world. The natural assumption is that dropping an extraterrestrial creature in a foreign world would probably not work out ecologically and biologically as out of place creatures tend not to do well outside of their natural habitats. But then again, these are highly advanced aliens, so they have presumably solved that problem (Note: Owens claimed these Space Intelligences were extra-dimensional and composed of light and energy, so not quite the traditional visitors from another planet). Why the creatures are even in a remote Highland loch is not answered and the fact that this creature is intelligent and perhaps even telepathic stretches credulity further. If one believes in alien visitors (and there are may who hold to that view) then it is perhaps not such a leap to believe they may have placed other lifeforms in earthly locations. However, for others, Ted Owens may have been better advised to have held back at this point! But there is one area of the Loch Ness legend which does chime with this story and that is the old Water Horse tales. The Loch Ness Kelpie was described as intelligent as humans (if not more) and also could communicate with them (albeit verbally). Indeed, in one account from the 19th century, we have the Loch Ness Water Horse engaging a human in conversation on the subject of returning its magical bridle! Was this modern story no more than a continuation of that venerable tradition?  Perhaps it is as we investigate further. We have actually met the author Warren Smith before as he wrote a book on the Loch Ness Monster which we featured in our Loch Ness bibliography. The book is titled "Strange Secrets of the Loch Ness Monster" and was published in 1976. This was my short review of the book: A book with a back cover which asks some startling questions. Such as is Nessie the relic of a lost underwater civilisation? Is there a connection between Nessie and the Hollow Earth, Bermuda Triangle and UFOs? Best of all, is her picture carved in ancient pyramids? Pertinent questions to which the answer is a collective "No". As it turns out, this boilerplate book is a general survey of lake monsters worldwide with perhaps a third of its 234 pages devoted to Nessie and other Highland creatures. Interestingly, Smith doesn't mention the Owens story in this book and it rather takes the view that the creature may be a giant eel. So did Smith not believe Owen's story or was Owen's story only made known to him after his Nessie book? As it turns out, a biography on Owens called "The PK Man" by Jeffrey Mishlove states that Owens was interviewed by Smith in 1975, so he would have known about it beforehand. Furthermore, Mishlove's book makes no mention of this Loch Ness incident which may be explained below. I say that because the waters are muddied further in an article on Warren Smith written back in 2007 called "Warren Smith: UFO Investigator or Hoaxster". This article by Tim Banse claims that Smith would fabricate entire UFO stories for his books. The reason given was simple, the money was required to pay the bills and buy Christmas presents for his four kids. The article can be found here. If Smith did fabricate this Loch Ness Monster story, then it would be clear why he did not include it in his more mainstream Nessie book. But the case is not proven, did Warren Smith or Ted Owens make the story up or did Ted Owens really believe he had such an encounter at Loch Ness one night long ago? Whatever the truth behind this story, like the Fordyce case it is a statistical outlier and should be treated as such. The vast majority of Loch Ness Monster cases in no way suggest the kind of creature that Ted Owens describes. Until corroborating reports come to light which back it up, it needs to be decisively set aside. That does not discard our Extraterrestrial Nessie as a theory, it just does not have much if anything to back it up .. unless readers wish to add anything they may know. 1. There have been quite a few authors in the past that,have come to the conclusion that all of u.f.o. and cryptozoologic evidence,are somehow one and the same phenomena.I.E. that they are paranormal,and have only temporary reality.John Keel,Jaques Valee to name a few,I believe there was a book called "The dragon and the disc", in this author Randall Pugh,clearly comes to the conclusion that all these so called lake monsters 2. I miself truly believe,based on all the evidence that i have read in the past 7 years about the ufo/crypto/paranormal phenomena..that all of those is of extradimentional origin. It would explain the elusiveness and the mistery around them. Also this adds up to the idea that we are not aware of the true reality of all things,therefore believing or not believing the things our eyes see when it comes to those phenomena. All the cryptids out there being Nessie,Bigfoot,Chupacabra,Mothman,Etc all have many things in common..specially the extradimentional origin posibility..its not coincidence these beings are intelligent and evidently they are higher creatures that we...even if their individual agenda is different.
global_05_local_6_shard_00002272_processed.jsonl/5376
Many people don't know there are different kinds of dashes. They often call a hyphen a dash — which, to an editor, is like calling a period a colon. In fact, there are an unnerving assortment of horizontal lines available to typographers, including (but not limited to) the hyphen, soft hyphen, minus sign, angled dash, swung dash, en dash, figure dash, em dash, two-em dash, three-em dash, and horizontal rule. Here's a brief rundown: Hyphen: - A hyphen is that little bit of mortar between the bricks of compound words such as Coca-Cola and high-strung. Its origins trace back to ancient Greece; its modern form dates to the 1400s. Gutenberg, the inventor of moveable type, is credited with first using it to let a word break off at the end of one line and pick up on the next. It's the only one that's standard on typewriter keyboards, so people tend to use it to stand in for… well, all the other ones. The ancients among us who learned to type on actual typewriters were taught to use two hyphens to make a dash, and many people still do — but, like underlining for italics and double spaces after periods, that was only meant as an indication for the typesetter. Printed matter using proper full fonts is supposed to use the right lines in the right places. Microsoft Word has decided to be helpful in this: By default, if you type two dashes between two words, they become an em dash — unless you put a space on either side, in which case they become an en dash, same as if you just type space-hyphen-space. Soft hyphen: - This is a creature of the computer age: It's a hyphen you can insert in a word to tell it to break at that place and no other, and it only shows up if the word breaks at the end of a line. Otherwise it's invisible. Non-breaking hyphen: ‑ This is the opposite of a soft hyphen: You always see it and it does not allow a line break right before or after it. Minus sign: − This is used in math, of course. Why not just use a hyphen or an en dash? They (usually) don't look the same, but the difference is not huge. And in Excel, a hyphen functions as a minus sign (an en dash does not!). But if you're working with a book or article that has a lot of math in it, it can be very useful to be able to find all the minus signs and only the minus signs. Angled dash: ¬ Have you seen this thing? Sometimes if you view hidden characters in a document it will stand in for something else, but when it's being itself it's not. I mean it's "not." As in symbolic logic. See the next one … Swung dash: ~ This looks just like a tilde (as in piñata), but in it's in the middle of the line. Some people use it as a fancy dash, but its official use is to mean "approximately," as in "I'll be there at ~1:00." It has also been used in formal logic to mean "not" (which, frankly, "I'll be there at ~1:00" often really means), but now the angled dash is preferred for that. En-dash: – Now we're into the real dashes. An en dash is supposed to be half the width of an em dash, but some fonts make it long and some make it quite short (in which case they may make it a little thinner and higher than a hyphen). You can use it to indicate number ranges: "The library is open 10:00–5:00." You can use it in some other places you would use to: "The Washington–Moscow hotline." Professional editors, on the advice of such guides as The Chicago Manual of Style, use an en dash in place of a hyphen when making a compound with something that's already a compound, e.g., "New York–based" or "Coca-Cola–drinking." In fact, this is one way you can tell a professional editor or typographer has been let loose on a text, because no one else ever does this. You can also use an en dash with a space on either side in place of an em dash. This is common in England and is also accepted in North America. Robert Bringhurst, in The Elements of Typographic Style, recommends it because the em dash is too long and "belongs to the padded and corseted aesthetic of Victorian typography." An added advantage of doing this is that all browsers and applications can make a line break next to it, which is not true with an em dash with no spaces next to it. Figure dash: ‒ Can you see the difference between this and an en dash? In many type faces there is none. It's a dash that is as wide as a standard numeral and is meant to be used in such things as phone numbers (867‒5309). Some typographers will use them in place of en dashes in contexts and fonts where they think they look better. They will smile to themselves and sigh happily. No one else will take notice. Em-dash: — The em dash is meant to be as long as the full height of the font — not that it always is. The em dash is the archetype of the dash. It's the all-purpose punctuation that can be swapped in place of a comma, a colon, a semicolon, parentheses, or whatnot — but if you use too many of them, your reader will end up breathless from all that dashing around. And there are rules, to be sure. Pay an editor to know them for you. Actually, the rules are still evolving. A century or so ago it was common and accepted to put a colons or semicolons after a dash; now it's forbidden. Even if you're using them in place of parentheses and would normally put a comma after — like this —, by the rules of Chicago (and others) you must ditch the comma. Also supposedly forbidden is putting a space on either side of an em dash; if you want to use spaces, according to those who pronounce on such things, use an en dash (which is why MS Word converts -- to – between spaces). But some publications ignore this counsel, as is their right — The Week, for one. The em dash can also be used to indicate when someone has been cut off, as well as to attribute speech to someone (as at the end of a quotation) and, in some European texts, in place of quotation marks to indicate when someone is speaking. So in theory you could get something like this: —They couldn't hit an elephant at this dist— —John Sedgwick (last words) Two-em dash: —— This dash is as long as two em dashes (duh). If your font doesn't have it, just use two em dashes. It's for when you're blanking out someone's name or another word, as in "So D—— T—— said 'I did try to —— her.'" When you put all the dashes and their fussy rules together, you can get something fun like this: —I saw that Coca-Cola–drinking son-of-a— Oh, —— it, what's his name—his number is 867‒5309—I saw him on the Washington–New York high-speed train. Three-em dash: ——— Obviously, this is three em dashes glued together. This is used in bibliographies when you've already named the author once and you want to indicate that it's the same person: Einstein, Albert. Some Stuff I Wrote. ———. Some More Stuff.
global_05_local_6_shard_00002272_processed.jsonl/5410
My Doctor Right Partner: Laura Eisman + Sixty Second Stories My Dr. Right's promotion piece serves a dual purpose. It's an explanation video for users as well as a pitch reel for potential investors. The two-minute animation graphically relays the concept, explains the need and outlines the process of this innovative consumer-driven healthcare recommendation network. We wanted the content marketing to be sophisticated, yet user-friendly in both graphic approach and tone. As a result, we created graphics that humanized what might have been an abstract concept - and made the very smart idea of My Dr. Right come to life.
global_05_local_6_shard_00002272_processed.jsonl/5416
Part of Fist and Sword (2018) Friday, October 5, 2018, 7:30 p.m. Museum of the Moving Image - Bartos Screening Room Please note: This film was originally scheduled for September 7 but was postponed to October 5. Dir. Leigh Whannell. 2018, 100 mins. Digital projection. With Logan Marshall-Green, Betty Gabriel, Harrison Gilbertson, Benedict Hardie. After his wife is killed during a brutal mugging that also leaves him paralyzed, Grey Trace (Marshall-Green) is approached by a billionaire inventor with an experimental cure that will “upgrade” his body. The cure–all Artificial Intelligence implant called STEM–not only restores Grey's mobility but gives him physical abilities beyond anything experienced, including a chance to claim vengeance against those who murdered his wife and left him for dead.
global_05_local_6_shard_00002272_processed.jsonl/5419
Sunday, April 23, 2017 Tricksters and fairy tales (Following folktales around the world 22. - Ecuador) Cuentos folklóricos de la costa del Ecuador 26 registros de la tradición oral ecuatoriana Paulo de Carvalho-Neto Instituto Panamericano de Geografía e Historia, 1976. This book was not an easy read, and took me forever to get through. It is a folklore collection, which means it comes with notes on tale types - but it also means that the stories have been transcribed from the oral telling word for word, including repeated fillers such as "said" and "then," and that many words were written down phonetically, missing parts or letters. My Spanish struggled to keep up with the omissions, and I had to sound a lot of the paragraphs out loud. I realize that this was supposed to give us a better understanding of what these stories sounded like when told - but it also made reading them a very painful process. The stories themselves were mostly local versions of well-known types. They had some fascinating details, but none of them really captivated me as a whole. I loved the version of the Dragonslayer folktale type (here named The orphan boy) where the hero was helped by three hounds, who were really angels in disguise, named Santa María, Ligero (Light) and Pesado (Heavy). I also enjoyed The one-eyed king as the Moorish queen, where an old king lost an eye to the queen in battle, and his three sons set out to bring it back (later turned out the queen had been holding the eyeball in her mouth...). The quest was interwoven with the Animal Bride tale type, where the youngest prince married a toad, and she helped him bring the eye back. It was extra fun that the older brothers experimented with getting away with fake eyes, and the king did not even notice that he had been wearing the eye of a cat until his youngest returned... It was also interesting to see a novel solution to the "Four Skillful Brothers" story. Here, four brothers - a thief, a musician, a marksman, and a carpenter - rescued a princess, and then could not decide who should marry her as a reward. In the end, they gave her as a wife to their father - since it had been the father that helped them start out in learning their professions... Most tales in the book were Ecuadorian versions of well-known folktale types such as the Three kidnapped princesses (Juan del Oso, Mama Leche la Burra), or the Magic Flight (Bella Flor Blanca). There were some trickster tales with African connections: Tío Conejo asking God to be large and menacing fell into the "Trickster asks for endowments" story type. God gave the rabbit all kinds of impossible tasks that Tío Conejo fulfilled easily - so well, in fact, that God began to worry what would happen if the wily little creature was also large and strong. Therefore, he only made the ears bigger. Tío Conejo had some classic adventures in these tales (including an encounter with the infamous Tar Doll). And while the rabbit had African connections, from Europe we had Pedro the trickster visiting - in this case, his last name was Imala (as opposed to Urdemalas or Malasartes, see earlier). And finally, there is no folktale collection without animals running a race. This time it was Toad vs. Deer, and the Toad (family) won. Where to next? 1. Any chance of a translation? My Spsnish is nonexistent! ;-) 1. This was published in the 70s, so I am not sure... there are also Ecuadorian stories published in English, I just picked a Spanish book :) 2. I have a friend who has lived in Ecuador for about 10 years now. He is always out and about among the regular people. I will have to sk him if he's heard any folk tales. Finding Eliza 3. Hey! Ecuador fairy tales, just as you said! It figures that you had to struggle through a phonetic Spanish book only to find new versions of familiar tales. Funny how the queen held the fake eye in her mouth the whole time. Fairy tales are goofy that way - she presumably lived a normal life, ate, drank and still had the eye in her mouth. Anyway, about the young son who married a toad and got the eye back.... Why is everyone always marrying frogs and toads? Thanks, Zalka, for a fun read, as always. Emily | My Life In Ecuador 4. I love tricksters! Brer Rabbit, Coyote, Odysseus, even Jacob in the Bible... They add real flavour to folk tales and mythology. 5. Hang on, African connections... Would that Tar Doll story be the same as the one from Uncle Remus? T Is For Harriet Tubman 1. Yep, same motif. I have also heard it from Southeast Asia. 6. I denfinitely have heard the version wherr the princess is given to the father of the 4 brothers before. I think it was Greek?
global_05_local_6_shard_00002272_processed.jsonl/5429
4008-888-888 在线客服 联系我们 返回顶部 企业动态 技术分享 行业动态 Desaturating a color image couldn’t be simpler with CSS3. We’ll apply the filter as a class, as you’d typically desire several images to be affected by the code at the same time: img.desaturate { filter: grayscale(100%); } Naturally, all current browsers implement CSS3 filters via vendor prefixes, so our first job is to insert that code, writing in CSS that does not yet exist in order to future-proof our work: img.desaturate { filter: grayscale(100%); -webkit-filter: grayscale(100%); -moz-filter: grayscale(100%); filter: grayscale(100%); Applying the class to the image is easy: Copyright © 2019 版权所有 苏ICP12345678
global_05_local_6_shard_00002272_processed.jsonl/5436
Thursday, July 30, 2015 The Meaning of 'Hadith' By Louay Fatoohi 30 July, 2015 Article Reproduced on New Age Islam from the Author’s Blog by His Permission  The term “Hadith” is one of the most used Islamic terms by both Muslims and non-Muslims. But despite its importance, there is often a good deal of ambiguity about what it exactly means. It is often used inconsistently and inaccurately. This article aims at clarifying the exact meaning of this term. The noun “Hadith” occurs in the Qur’an twenty three times (4.42, 4.78, 4.87, 4.140, 6.68, 7.185, 12.111, 18.6, 20.9, 31.6, 33.53, 39.23, 45.6, 51.24, 52.34, 53.59, 56.81, 66.3, 68.44, 77.50, 79.15, 85.17, 88.1). Its plural form “Ahadith” is found five times (12.6, 12.21, 12.101, 23.44, and 34.19). In these twenty eight verses, the term broadly means “narrative,” “story,” “speech,” or “news,” which may or may not be religious. For instance, God describes the Qur’an as “the best of Hadith” (39.23), refers to the story of Moses as the “Hadith of Moses” (20.9), and says about nations that He destroyed for rejecting the messengers He sent to them “We have made them Ahadith” (23.44). Other variations of this term occur in another eight Qur’anic verses (2.76, 18.70, 20.113, 21.2, 26.5, 65.1, 93.11, 99.4). Of the thirty six occurrences of the term “Hadith”, only one is linked to something specific to Prophet Muhammad. This is verse 93.11 where the Prophet is commanded by God to speak about His favor to him, i.e. making him a Prophet: “As for the favor of your Lord, Hadith (speak about).” But even in this solitary instance, the verb “Hadith” is used in its generic meaning. Indeed, the verb is used in another verse to refer to the speech of disbelievers (2.76). But the term “Hadith” has acquired in Islamic literature the very specific meaning of reports about what the Prophet said, did, approved, and disapproved of, explicitly or implicitly. Indeed, Hadith is considered as the main source of the “Sunna” or “customary behavior” of the Prophet. The other source is the “Sira” or “biography” of the Prophet. It is this technical meaning of the term “Hadith” that the rest of this article focuses on. Any Hadith consists of two parts, the first is known as “Isnad” or “Sanad,” and the second is known as “Matn.” The generic meaning of “Isnad,” whose plural is “Asanid”, is “support” or “foundation.” But in the terminology of Hadith it refers to the chain of transmitters of the Hadith. These narrators are called “Isnad” because they provide the “support” for the historicity of the Hadith. Lexically, “Matn” denotes the visible part of something. In the technical language of Islamic literature, “Matn” denotes the saying, behavior, or incident that is being reported by the chain of transmitters. To illustrate these concepts, this is a Hadith about using the visibility of the new moon to determine the beginning and the end of the fasting month of Ramadan: Yahya bin Bukair told us on that al-Laith said, that ‘Uqail said, that ibn Shihab said, that Salim said, that ibn ‘Umar said that he heard the Messenger of Allah say: “When you see it start your fast and when you see it break your fast. If it was cloudy, make an estimate [for the start of end of the fasting month].” (Bukhari, 1900) The chain of transmission, or isnad, is marked in red whereas what is being reported, or Matn, is in green. Hadith narratives at times quote the Prophet directly: Sa‘id bin Yahya bin Sa‘id al-Qurashi told us that his father said, that Abu Burda bin Abdullah bin Abi Burda said, that Abi Burda said, that Abi Musa said that people asked: “O Messenger of Allah! Whose practice of Islam is the best?” He said: “The one who does not cause harm to Muslims by his tongue or hand.” (Bukhari, 11) A Hadith may not quote the Prophet directly but report what he was heard saying or seen doing: ‘Abda bin ‘Abdullah told us that ‘Abdul Samad said, that ‘Abdullah bin al-Muthanna said, that Thumama bin ‘Abdullah said, that Anas said about the Prophet that when he said something he repeated it three times until it was fully understood and that when he encountered people he greeted them three times. (Bukhari, 95) A Hadith may show the Prophet’s tacit approval of something, as in this example in which the Messenger does not stop Muslims from keeping his cut hair: Muhammad bin Abdul Rahim told us that Sa‘id bin Sulaiman said, that ‘Abbad said, that ibn ‘Awn said, that ibn Sirin said, that Anas said that when the Messenger of Allah had his hair cut Abu Talha was the first to take his hair. (Bukhari, 171) But even in Islamic literature the term “Hadith” has been used in a broader sense. Some of the reports found in the collections of Hadith detail things that “Sahaba (Companions)” of the Prophet said or did, rather than the Messenger himself. At times, this may be a statement reflecting the view of a Companion: ‘Ali said: “Speak to people about what they know. Do you want them to accuse Allah and His Messenger of lying?” It was ‘Ubaidullah bin Musa on the authority of Ma‘ruf bin Kharrabudh, on the authority of Abil Tufail, on the authority of ‘Ali [who reported this] (Bukhari, 127) The implication of such Hadiths is that the teaching conveyed by the Companion reflects what he learned from the Prophet. It should be noted, however, that the term “Companion” is used rather loosely by scholars. While some individuals, such as ‘Ali bin Abi Talib, who transmitted the Hadith above, spent many years in the company of the Prophet, others are called Companions for only seeing the Prophet! For instance, in his book al-Isaba fi Ma‘rifat al-Sahaba (Identifying the Companions Correctly), ibn Hajar al-‘Asqalani (d. 852/1448) calls “Companion” any “Muslim who met the Prophet, believed in him, and died while still a believer.” Another interesting feature of Hadith 127 is that its isnad follows the Matn, which is the opposite of the normal situation. The following Hadith reports a statement by a Companion rather than something the Prophet said, but because it is about a pledge given by that Companion to the Prophet, the implication is that the Companion’s words and actions were approved by the Prophet: Musaddad told us that Yahya said, that Isma‘il said, that Qais bin Abi Hazim said, that Jarir bin ‘Abdullah said: “I pledged to the Messenger of Allah that I will perform the prayer, pay the obligatory alms, and give good advice to every Muslim.” (Bukhari, 57) In the text of Hadiths, variations of “Hadith” are also used in the generic sense of this term, i.e. not referring specifically to sayings of the Prophet. For instance, the term “Haddathana (told us)” is frequently used with individuals who are quoted as the source of Hadith. In fact, all of the Hadiths quoted above use the term “Haddathana (told us)” in reference to at least one of the narrators. Another feature of the Hadith literature worth noting is that a Hadith may exist in a number of different wordings and different chains of transmission. For example, this Hadith is clearly a different version of the Hadith above: Ya‘qub bin Ibrahim told us that Hushaim said, that Sayyar said, that al-Sha‘bi said, that Jarir bin ‘Abdullah said: “I pledged to the Prophet listening and obeying, so he taught me to add ‘as much as I can, and to give good advice to every Muslim’” (Bukhari, 7402) Significantly, the last part of the statement that Hadith 57 attributes to Jarir appears in Hadith 7402 as something the Prophet said. Unlike the Qur’an, whose authenticity is accepted by all Muslims, Ahadith may or may not be authentic. Muslim denominations differ on which Hadiths are authentic and which are not. Sunni Muslims have particularly high regard for the two Hadith collections of Bukhari (194-256/810-870) and his student Muslim (206-261/821-875). They call them “Sahih (correct)” to reflect their almost complete confidence that they contain authentic Hadiths only. Other highly regarded Hadith collections are those of Abu Dawud (202-275/817-888), Ibn Majah (209-273/824-887), al-Tirmidhi (209-279/824-892), and al-Nasa’i (215-303 / 830-915). All six were compiled as late as about two and a half centuries after the Prophet, although they relied on earlier sources. Shia scholars do not have as much confidence in those sources, in particular as they contain many narratives attributed to Companions of the Prophet that the Shais do not trust because they think they showed animosity toward ‘Ali bin Abi Talib — the Prophet’s close Companion and cousin, fourth caliph, and the first Shia imam. The Shias rely on other compilations of Hadith and the accounts related through their imams. One of the most respected Hadith books by the Shias is al-Kafi by Muhammad al-Kulaini (250-329/864-940). While there are clear differences between Sunni and Shia Muslims in their assessment of the authenticity of Hadith collections, differences about Hadith are not confined to the Sunni/Shia divide. Scholars within any denomination have also differed on whether certain Hadiths are genuine or not. Yet because of the importance of Hadith as the main source of the Sunna, which is considered the second source of legislation in Islam, Muslim scholars have developed a complex system for critiquing Hadiths. This system classifies Hadiths into a number of different categories of historical reliability. The classification system aims to describe the likelihood of each Hadith being authentic, i.e. how likely that the Hadith accurately describes a historical event. There are many categories that range from the “Sahih (correct/authentic)” and “Hasan (agreeable)” to the “dha‘if (weak)” and “Maudu‘ (forged).” The Hadith classification system focuses almost exclusively on the reliability of the chain of transmission. For instance, if one of the narrators in the Isnad lacked credibility or is known to have lied, then that would discredit the Hadith. Similarly, if the Hadith was originally reported on the authority of someone who did not meet the Prophet, then that would put the Hadith in a lower category, and so on. This near complete concentration of Hadith criticism on the chain of transmission reflects the scholars’ view that they could not tell whether a reported event or saying by the Prophet is likely to have happened on the basis of its details, i.e. Matn. They could not claim to have the ability to judge, for instance, whether the Prophet could have given a particular instruction or not, because that might implicitly be the equivalent of claiming a level of knowledge that is comparable to that of the Prophet. There are some Hadiths that were challenged on the basis of their Matns despite the reliability of their chains of transmission — for instance, if they were found to be in conflict with other accepted Hadiths — but these are relatively small in number. Significantly, in these cases, scholars are being “forced” to consider the Matn, which is a completely different approach from giving Matn at least as important a position as Isnad in Hadith criticism. In my view, relying almost completely on the credibility of the chain or transmitters and not examining the substance of the Hadith to take a view on its credibility is an extreme position that is highly insufficient and likely to mislead: ·         First, examining the chain of transmission can at times allow the scholar to form a firm view on its reliability, but this is not always the case. It is often an extremely difficult task that is fraught with difficulties, some of which are insurmountable. Let’s take a Hadith whose narrators are considered to be reliable and who are known to have met each other, so they could have heard the Matn of the Hadith from each other. It is still perfectly possible that the Matn of this Hadith might be unhistorical. This could be the result of an innocent mistake by one of the narrators or outright forgery. The older any such mistake or forgery, the more difficult it is to spot it by later scholars. ·         Second, the Qur’an has a wealth of information and principles that can be used to assess the credibility of the Matn of any Hadith, so one is not relying completely on their own judgment. The Qur’an, after all, is the word of God, which can be used to examine the reliability and accuracy of any other statement, including what people have attributed to the Prophet. ·         Third, one can reject the historicity of any Hadith whose Matn looks illogical, unreasonable or absurd. The status of Muhammad as the Messenger of God would rule out the possibility of him behaving in the way some Hadiths claim or making the kind of statements that are found in some Hadith reports.  The science of Hadith criticism that Muslim scholars have meticulously developed over the centuries has provided scrutiny of the numerous Hadiths. But inevitable limitations in this human system mean complete submission to it was always going to be the wrong approach. The Qur’an is indispensable when assessing the reliability of the Matn of the Hadith. Similarly, any Hadith that attributes an unreasonable or absurd statement or behavior to the Prophet should be rejected regardless of the chain of transmission attached to it. Hadith criticism over-relies on the chain of transmission to the point of making the Matn almost irrelevant. This, in my view, has been a serious flaw in Hadith criticism, which has resulted in the acceptance of a large number of inauthentic Hadiths. Copyright © 2011 Louay Fatoohi No comments: Post a Comment
global_05_local_6_shard_00002272_processed.jsonl/5491
« Back to Science Shorts July 8, 2015 Science Shorts: A space physicist’s view of Pluto Matt Hill Matt Hill New Horizons Co-Investigator Although I’m privileged to have been involved in exciting space events (like the first interstellar boundary crossing), this month’s Pluto encounter is my only experience with a first-time reconnaissance of a world. Eight of the nine traditional planets were explored either before I was born or before I was an adult; one opportunity remained, but I never dreamed  I would be one of the scientists to help make it happen, to round out humankind’s initial exploration of the solar system. This period of human history can only happen once, as Carl Sagan pointed out, and we are the only ones who will ever experience the period in history when we became a spacefaring species. Now let’s get into what kind of science I do. Unlike astronomy’s centuries-old history, space physics dates back only to the 20th century, and it’s less well known than its cousins astronomy, astrophysics and nuclear physics, and is not as obviously linked with Pluto, so a little background is in order. Solids, liquids and gasses surround us all. Then there is the fourth state of matter, plasma (hot, electrically conductive “gas”), which is actually the most common form of matter in the universe, even though it is not common on Earth—nor on Pluto.  Plasma differs fundamentally from neutral gas because the electric and magnetic fields and matter in plasma push and shove one another, forming waves and shocks and other collective interactions. The main plasma I’m interested in is the solar wind, which streams from the sun at around 450 kilometers per second – or about a million miles per hour. Traveling through the solar wind is an even faster population of atomic and subatomic particles known as energetic particles. The most energetic of these particles, cosmic rays, were first definitively discovered with experiments on hot air balloons. The energetic particles in plasma are sort of my thing. I don’t only focus on the quantum-scale objects themselves, but largely on the invisible, astronomic-scale structures they form and interact with. Consider: the distance from the Sun to the inner edge of the interstellar medium is about 1013 meters and the diameter of a proton is about 10-15 meters, a factor of 10,000,000,000,000,000,000,000,000,000 difference (that’s 10 octillion —I can’t pass up a chance to use the word “octillion”). That’s a lot of ground to cover! Fortunately, we can ignore most of what’s in between, which is basically any distance even remotely close to the distances with which people have experience or intuition. So I study invisible structures with mind-blowing spatial scales, based on particles that travel at terrific speeds and are even more exotic than plasma—the mostly unearthly fourth state of matter. Add to this the fact the experiments we use to make observations take significant fractions of a lifetime to travel to interesting places, and you realize how patient we must be.  For example, New Horizons has taken just under a decade to reach Pluto, and will take longer to reach a Kuiper Belt Object, and should continue returning measurements until the 2030s. That’s a long time be studying invisible stuff. The four states of matter are on display in this icy scene from Earth.  The floating ice sheets and the snow dusted land are solid, the chill water of the river is a liquid, the unseen air that ripples the river’s surface and carries the clouds is a gas, and the sun is a ball of plasma so hot it can sear your skin from nearly 100 million miles away. (Credit: U.S. Fish and Wildlife Service) In particular, I (patiently) get excited about energetic particles propagating through plasmas near planets and near solar wind boundaries, like shocks. These energetic particles are particularly interesting because, due to their high speeds, they are excellent tracers of the global structures through which they must propagate to reach our experiments. Yes, but why would a space physicist study Pluto? After all, at Pluto we don’t have much to go on. We don’t expect a significant magnetic field, since we don’t believe there is a molten metal core, but mounting evidence demonstrates that the atmosphere of Pluto is large (if tenuous by Earthly standards) and releasing a significant, steady rate of material.  These neutrally charged, Plutonian gas particles from its atmosphere are expected to interact with the impinging, highly charged solar wind and solar photons resulting in freshly charged “pickup ions” that, depending on their kinetic energy, are detectable by the Pluto Energetic Particle Spectrometer Science Investigation (PEPSSI) time-of-flight mass spectrometer on board New Horizons. These pickup ions can help tell us about the rate at which Pluto loses its atmosphere, but also Pluto’s production of these pickup ions provides us with the opportunity to study the pickup ions themselves at the moment of their creation. The physics of how they are accelerated and transported is not well understood (although there are many theories). So when New Horizons races through Pluto’s atmosphere and PEPSSI detects the ions there, I will be looking out for pickup ions and hoping to learn how the pickup ions get their energy and how they exit the Pluto system. Only a little more patience is needed—it all happens next month! Matthew E. Hill is the New Horizons PEPSSI instrument scientist from the Johns Hopkins University Applied Physics Laboratory, where he also works on the Voyager, Cassini and Solar Probe Plus missions.
global_05_local_6_shard_00002272_processed.jsonl/5495
Skip to content AA421B – Classified Professional Improvement Committee • Effective: 6/29/1999 • Revision: 9/8/2009 • Reviewed: 12/10/2013 1. Board Directive The Board recognizes the value of a competent, professionally classified staff and authorizes establishment of a Classified Professional Improvement Committee  (CPIC) to encourage, guide, and reward the professional development of classified staff members. 2. Administrative Policy The Administration shall administer this policy in accordance with the following administrative policy provisions: 1. Membership The Jordan School District CPIC shall consist of the following members: 1. The Administrator of Teaching and Learning or designee. 1. The Administrator of Teaching and Learning or designee shall act as chairperson. 2. The chairperson shall vote only in the case of a tie. 2. Two principals (one elementary and one secondary) 1. The two principals shall be nominated by the Administrators of Schools and will serve two-year terms. 2. The elementary principal term expires on the odd year, and the secondary principal term expires on the even year. 3. One representative from each of the following advisory committees: District Office Support Staff (DOSS), Custodial, Maintenance, Transportation, Central Warehouse, Secretaries, Nutrition Services, Instructional Assistants. 1. Advisory committee representatives shall be nominated by the employee agent group and approved by the Superintendent. 2. Representatives will serve two-year terms. Custodial, Maintenance, DOSS, and Nutrition Services terms expire on the odd years, and Central Warehouse, Transportation, Instructional Assistants, and Secretaries terms expire on the even years. 4. One representative from the employee agent group presidency. 1. Schedule of Meetings CPIC meetings shall be held on the first Thursday of the month.  Meetings will be scheduled as often as business requires.  Minutes shall be recorded and distributed to committee members. 2. Functional Responsibilities 1. The CPIC shall review all in-service requests for credit and make recommendations regarding approval.  Upon CPIC approval, the Administrator of Teaching and Learning shall sign the in-service requests. 1. Any District classified employee may submit to the CPIC a request for a specific in-service course.  The Staff Development Office will then arrange for the class according to District policy provisions. 2. The in-service class must be approved by CPIC before the class begins. 3. Only requests received by the 25th of the month will be assured consideration at the next CPIC meeting. 4. The request must meet an established District need. 2. The CPIC shall review course evaluations and make recommendations based upon the results. 3. The school principal or his/her designee shall serve as the in-service information disseminator at each school. 4. Upon completion of the in-service course, the participant will be given a certificate of completion that the participant may submit for inclusion in his/her personnel file.
global_05_local_6_shard_00002272_processed.jsonl/5497
Prayer Request Father, I prayed with complete trust and completely earnestly and you spoke to me. I did exactly as you said but now I find myself even further away from that one thing I prayed about. I'm so far I'm quite certain i'll never get it. What is it that you mean? Why have you confused me so? by Anonymous Pray Pray 7 people prayed for this Comments on this Prayer No comments Similar Prayers
global_05_local_6_shard_00002272_processed.jsonl/5502
You are here See What I'm Saying Three children sitting down and looking at books See What I’m Saying was a children’s program that promoted reading, writing and public speaking skills in students in kindergarten through grade 5. The program took place on Saturday mornings over a nine-week period at our county’s Civic Center (since the library doesn’t allow food). At each session, kids were invited select a book, read the book, write a brief report about it, and share their report out loud to a group. Subscribe to presenting
global_05_local_6_shard_00002272_processed.jsonl/5506
XML Sitemap URLPriorityChange frequencyLast modified (GMT) http://psmmakassar.co.id/tentang-psm/60%Weekly2017-05-26 07:36
global_05_local_6_shard_00002272_processed.jsonl/5552
Idaho Content Standards Logo All students graduating from Idaho public high schools must meet state adopted content standards. These standards are to be used as a minimum threshold by every school district in the state in order to establish some consistency in academic content statewide. Each school district may set standards more rigorous than these state content standards, but no district shall use any standards less rigorous than those set forth in IDAPA, page 11. It is still up to each local school district to adopt its own curriculum (how the standards are taught) to meet these standards. Idaho reviews and revises, when needed, all content standards on a six year review/adoption cycle. Resource Files Content Standards For legacy content standards, view the Archives webpage. Frequently Asked Questions No content available. Training Resources Professional Development
global_05_local_6_shard_00002272_processed.jsonl/5599
1. What Sector is your organisation in? 2. What size is your organisation? 3. Do you currently use training services? 4. Which training services might be useful for your organisation? (you can select as many as you wish - the last option selects them all). 5. When providing training for your staff, do you use your own facilities? 6. Are there any other topics/services that you might find useful for your organisation? 7. Any other comments about your consultancy needs we might be able to provide? Your email:
global_05_local_6_shard_00002272_processed.jsonl/5600
Tuesday 13th September 2016 OpenCorporates Sites outage on Saturday 17th of September AM (BST), scheduled 2 years ago Our data centre co-location provider will be carrying out some essential maintenance work on: Saturday 17th of September at some point between 08:00 and 12:00 BST. Unfortunately this means that the OpenCorporates site, its API and all supporting sites will be unavailable during this time. We expect the outage to last between 10 and 20 minutes. Please do see our service status page at: status.opencorporates.com where you can subscribe to email or news feed updates.
global_05_local_6_shard_00002272_processed.jsonl/5607
Tuesday, November 1, 2016 Reckless Behavior: Chapter Four Reckless Behavior  Chapter Four "So, two matches?" Samuel said, leafing through the previous night's papers. It was before eleven, the tang of coffee was fading from Molly's mouth, and she felt like she'd been working all day. She and Samuel had both come to the office early today. They had a lot of after-event work to do.  "Who got matched with who?" Molly asked, distracted. She was editing a flyer, deciding whether to put 'Singles Event' in point 36 or point 48. The letters needed to be  eye-catching, but not desperate, a delicate balance. "Let's see…" Samuel sat down with a squeak of his leather chair, and turned back a couple of pages. "Oh. The woman with the snort in her laugh to Mr. Hotshot, and the one who came late to… also Mr. Hotshot." He lowered the stack of papers. "Damn. I can't believe anyone was into that guy." "Are you kidding?" Molly took her eyes off the screen to shoot Samuel a face that said 'duh.' "He was the classic ladies' man." Her boyfriend snorted. "Women. You know, since both matches are to the same guy, it's really just one match." "Unless he decides to date both of them." "Wouldn't put it past him." Samuel loosened his tie. He wore one only because he wanted to, but they'd started heating the office and were still figuring out the optimal temperature. He opened his top button. Molly hated the twinge she felt when he did that. It still made her think of undressing, of sex. She was still together with Sam… sort of. They hadn't fought it out yet.  That kiss with Aster, though... It was too good to have been real. She'd been driving back from the event when she saw him sitting there in the rain. He had been waiting for hours, pitiful and stubborn in a way that was strangely compelling.  God. Why was she even thinking about it? She turned back to her computer.  "Uh, Molly, isn't that the guy you're sleeping with?" She jumped. "What?" Samuel was squinting out the front window, holding the blinds out of the way. "Man, what happened to him? Was he always crippled?" He whistled. "Ooh. And he just fell off the parking lot. That's embarrassing." "Move." Molly hustled to the window. Aster was across the parking lot, one wheel on the grass that was a few inches lower than the concrete. He was rocking back and forth, stuck. Finally, he gave a large push, and went spinning onto the lot. Arms pumping, he headed straight for the office. "What is he doing here?" Molly muttered, heading outside to meet him halfway. She repeated herself once he was within earshot. "I must send Cassia a message." Aster rolled casually past her past her, heading not indoors but to the hiking trail behind the building. His cheeks were red from the cold, and his stubble had this morning graduated to beard status, but he was as sexy as ever. God! Why did she keep doing that? "Aster," Molly said.  He turned around. "Yes?" "What the fuck are you doing here?" He spoke slowly, as if she hadn't heard the first time. "I must attempt to send my mate a signal, and the ultimate location would be the one in which I-" He stopped cold. Molly folded her arms. "Yes, tell me. Why here? You guys were supposedly going to meet outside that strip club. What's so special about the forest?" "We thought Danny's was a fro-yo establishment," Aster said, more to himself that anyone else. He continued onto the trail, Molly following behind him. She was aware that Samuel was likely watching them from between the blinds. Aster positioned himself by a group of oak trees growing clustered together, where Molly had first found him. He was scanning the ground, looking for something. Attractive her ass. He was batshit crazy, from what she'd seen so far.  "How did you get all the way here?" Molly asked, scuffing at the ground with her boatshoe. "I believe the answer is evident," Aster said, rolling over to a nearby tree to touch the bark. "But it's like, forty-five minutes to walk. That's, what? An hour in wheelchair distance?" "Forty seven minutes." He was staring at the band around his wrist, as if he expected it to play music or something. It didn't look like a smartwatch. More like the plastic jewelery they sold at Dollar Tree. "It isn't working," he said.  Molly stood over his shoulder, curious. "What are you trying to do?" Aster hesitated, the way he did before explaining a concept. "You are familiar with Google Maps, correct? What is the name of the little red balls on sticks used to mark destinations?" "Pins?" Molly guessed. "Yes!" Aster said. "I am trying to lay down a pin for my mate. To record this place, so she will know I was here." "Through Google Maps?" "No. Through a program native to… us." Molly nodded. "For people living in tree houses, you guys are pretty advanced." Aster rubbed his band. "Cassia does not live in a tree. She lives in the largest dwelling in Rhodium, her city. Much larger than anything in your city of Buffalo." "So, city girl and country boy, huh?" Molly scratched the back of her neck. She wanted to ask about last night. What it meant. The possible responses flipped through her brain. "I must use an alternative method," Aster said. "Perhaps I can carve a message into a tree." Molly traipsed after him as he put his ear to trees, tapped his bracelet again, and a bunch of other crazy-person stuff. Finally, she'd had enough. "If you're so worried about her," she said, "Why'd you kiss me?" It slipped out. Aster turned his wheelchair sharply. "That was a mistake." Of course it was. But somehow hearing him say it out loud stung. "So why'd you do it?" She said. She was taunting, really. Aster shrugged. "I felt…" he cleared his throat. "It was a mistake. Do you have a knife?" "You can't carve into the trees. Don't be ridiculous." "Perhaps a bright, staining material?" Molly rolled her eyes, but she felt herself caving. "Jesus, Aster. Just come inside." The back door had two bricks as steps, so they went around to the front. When Aster rolled into the office, Samuel continued typing, pretending that Molly was alone. "I emailed Hotshot and the two women," he said. "Two matches. Pathetic." "It's not like we usually do much better," Molly said, rooting around her desk drawer. She fished out a pen and an A4 paper for Aster. "Here," she told him. "Make a sign. We'll tack it to the tree." He looked at the paper like it was a rotting apple. "That is ridiculous. This material will not be able to withstand rain, snow, or elements such as wind or animals." "What a genius," Samuel commented, facing away from them. "You got a real catch there, Molly." "How kind," Aster said. "I can understand why Molly wishes to mate with you." "Stop it," Molly said. "Aster, you need to leave." "Alright," Aster said, backing away from her desk. "I wish you well, then." "You don't sound too sincere." Molly was in a foul mood, just reading for an argument. Since Samuel was giving her the cold shoulder, she had to look elsewhere.  "You have a two percent success rate," Aster said. "You may need to summon help from your God to fix that." "You're right, but you don't have to an asshole about it." "Interesting. I think I am beginning to grasp the figurative meaning of the insult." Aster pushed himself forward. "Now hold on," Samuel said. "Two percent? That's assuming that we'd want everyone to say yes to everyone they met. If we'd just get ten mutual yesses that would be a complete success, because everyone gets one date." Aster paused at the door. He swiveled around slowly. "You mentioned one man and two women. If you are counting the possible polygamous relationships, the possibilities are more numerous." Samuel turned to Molly. "He's kidding, right?" Molly sighed. "Probably not." Samuel whistled for the second time in the hour. "I said it and I'll say it again. You really know how to pick 'em, Moll." "I didn't pick anybody. I already said, I didn't sleep with him." Molly couldn't look at either of them when she said this. It wasn't aclie, exactly. Did emotional cheating count here? "You seriously have some kind of mental blockage," she continued, "Or else you think I'm total liar." "I don't know," Samuel said, tightly like he was trying not to get angry. "I really want to believe you. But lately you two have been running all around town together and I don't know what to think." Aster rolled over to Molly, and picked up the papers where the participants had written their choices. "It's a matter of trusting me," Molly said, gripping the arms of her chair. "And let's not forget that you're the one who openly admitted cheating. At least I haven't fallen so low." "This is a terrible method," Aster said, studying the papers. They both turned to him. "Excuse me?" Molly said. Aster pointed to the list of names. That paper belonged to one Nicholas Green, and had a list of the ten women he'd met last night. He'd only checked 'yes' to two boxes. He'd been a sweet guy, so it was too bad neither of those two women had checked 'yes' for him. "This man met with all these women?" Aster asked. "Yes," Samuel said. "You understand how speed dating works, right?" Aster shook his head. "It seems quite random. Why don't you assign pairs based on compatibilty, such as likes, dislikes, and personality?" "That's not how this kind of dating works," Molly said. "We make seperate events for people of different age brackets or niche interests, but that's it." "Have you heard of the phenomenon of website dating?" He said. "You mean online dating?" She said. "Yes," Aster said. "Such organizations use questioning and simple algorithms to pair two people. Why not do the same?" He grabbed the pen and started scribbling. "If you had one hundred men and one hundred women-" "That would be considered a mega event," Samuel interrupted. He didn't sound so predatory anymore, just interested. "We aren't big enough to do that." Aster wasn't listening. His voice was fuller, somehow, like it had been the day they'd first met. "It would be the optimal way to create matches. You'd question each participant, and score them against those of the opposite sex, giving the pair a mutual likelihood percentage." He pointed at equations jotted across the page. "Then it would simply be a matter of multiplying two given percentages, and finding the nth root of-" "Hold up." Molly took the sheet, looking it over as if she understood what he'd written. "How do know all this?" Aster raised an eyebrow. "It is simple arithmetic." "Not really." Molly handed his equations to Samuel, who looked them over with the same fake intensity. A thought occured to her.  "Aster, I don't think I've ever asked you what you do." "What I do when?" "As a job." "Ah. I am a population statistician." "So you think you can calculate love, huh?" Samuel said. "I do not. But several rich organizations-" Aster shot Molly a look. "Several rich companies do. Why not do the same?" "I have to say, he's got a point." Samuel sounded apologetic. "A bunch of places in New York City do this kind of thing. It's like, online dating but instead of making your own date, you meet up for a speed dating event." "Still. We can't…" "Wait a second." Samuel leaned forward. "We don't have to go to that extreme. Molly, imagine if we implemented a set of questions into the website? We could do that. And then if we made a mega event, participants would be matched with compatible partners." He clicked his pen rapidly, turning to Aster. "Hey, do you know Java Script? Or Python?" "Never mind. Come here and show me how you got this percentage." Molly pulled her chair in to make room for Aster to roll past so he could sit near Samuel. "I guess you aren't leaving, then." Aster shrugged. It was sometime before three that afternoon, when it became clear that Aster had found himself a job. Reckless Behavior: a Guide to the Early Twenty First Century Chapter Four: Employment  …seen as a way of supporting oneself, rather than one's calling. Of course, many people will study so that they may enter the field of their choice, but often, a job is seen as separate from oneself.  Since many menial jobs are still being done by humans, many people end up in employment that they do not find fulfilling, for example the food service industry. Money may be their only aim. A primary cause of this is the high cost of living. Energy is very expensive, since in this time period oil companies were still sucking up the…  Croton pulled open a cabinet, revealing boxes and jars which Cassia assumed contained food. "Oatmeal?" He said. "Thank you," Cassia replied. Oats. She hated oats, but she didn't know any alternative food choices that might be available to this man. She watched him pull two paper pouches out a box that read Quaker, and spill the contents of each into a bowl. She couldn't think, but she had to figure this out, quickly. She knew the protocol here- she was a historian, after all- and protocol dictated that after a 'one night stand,' the couple must either decide to further the relationship, or else the guest must leave. Cassia had already deviated from tradition because she hadn't had sex with Croton. But she couldn't leave. She needed to stay here, to look through his things, find what she'd been sent here for. She needed to gain his trust. The clatter of silverware brought her attention back to the kitchen. "Sorry," Croton said, bending to retrieve the spoons he'd dropped. He brought two bowls of goop to the table. The smell of cinnamon brought saliva to Cassia's mouth, even though the oats looked disgusting. She smiled at him and took a spoon. Croton ducked his head as he shoveled his breakfast into his mouth. Cassia hadn't noticed the freckles on his nose last night, where it had been dark. His red hair seemed wispier, lighter. He projected the perfect image: an innocent, attractive young man, if not slightly boorish. He wasn't quick and did nothing to hide his body language when he spoke. Nothing criminal in his mannerisms at all. The perfect cover. Finally, Croton cleared his throat. "About last night," he said. "I just have to ask… Did I do something wrong, or…?  "Not at all." Cassia tasted the oatmeal. It was edible. "I am shy, you see. I do not copulate with males that I do not know." He waited too long before answering. Wrong answer, apparently. He was scrutinising her. "So… if you didn't want to sleep with me…" he scratched the back of his head. "I don't get it. I mean, when I'm working in the club and a girl starts coming onto me, it only means one thing." "I do find you particularly attractive," Cassia offered. "Nice try." He hunched his shoulders down. "Can I ask, uh, where are you from? I've never heard an accent like yours before. Are you Mexican?" "You can detect an accent?" All those hours babbling Late English into her mirror seem to have amounted to nothing. She took a spoon of oatmeal, miffed. "Sort of You just use a lot of extra words. Like you're some kind of fancy…" he blushed. "Sorry. I'm not good at this sort of thing." Cassia studied him curiously. What sort of thing were they doing? When she didn't offer a response, he reddened to a deeper shade. "I know, I know, I'm not the kind of guy you'd usually see at a Danny's. Maybe you were expecting somebody macho or something. The bar's just a night job, you know, that a couple of friends hooked me up with. I'm not really that kind of guy." He looked up at her, imploring her to say something.  Cassia let the agony of the silence stretch. She would use it to her advantage. "Well, I've got it go," he said finally. "Classes are gonna start soon." He coughed, and moved away from the table with his bowl. Cassia watched him. "May I stay another night?" She said. Croton paused just as he was about to drop his dishes in the sink. "I've had a terrible breakout- breakup- with my boyfriend," Cassia said. "I do not have a new home yet." "Oh I don't..."  "I need emotional support. Perhaps you can supply it in the form of sexual intercourse tonight." Croton paused. His face changed three times, each one less resisting. She had this boy right in her fingers. "Um, sure," he said, stammering as his active male imagination likely filled in the picture. He grabbed his bag from the table. "But now I really need to go. Come over, say, at six? I can make us dinner. Or order. Or if you like to cook, you know. Um-" he cleared his throat. "So, six o'clock?" Quswàk. So he wasn't going to leave her in the house. Cassia nodded, and followed him to the door. As Croton disappeared into his bedroom to retrieve something, she slipped a hand under the window drapes and pushed up the glass frame. He held open his door and she stepped outside, waving her hand, the traditional departing gesture. She waited until he was around the block before slipping back inside.  Aster spent most of that week in Molly and Samuel's office. When he wasn't doing that, he was utilizing Molly's home computer. He had full mastery of Google, a simple search engine, and spent his time searching for Croton, who allegedly went under the name Moskowitz. That's all Aster knew. He couldn't access the folders on his Q-band for some reason, or do much else with the thing. It turned out there were many, many Moscowitzes in Buffalo. Aster knew they were searching for a young man with a bumbling mannerism and a nefarious agenda. The internet lacked such details on the men he found. The best he got were business, addresses and phone numbers. Would Croton have set up a public lab in this century? Aster doubted it. At seven o'clock, Molly came into the house and closed the door with her elbow. Both hands were filled with plastic bags of many colors. She was humming. All signs led Aster to believe that she had spent the day making purchases, a popular pastime in this century. He rolled away from the living room computer and came up to the couch, where she dumped the bags. "What did you buy?" He asked. Molly smiled mysteriously. "Well, for the event tomorrow night, I thought you needed something a bit more…" she nodded her head at the sweatpants he was wearing. Aside from the seams that chafed because he didn't move his legs, Aster was growing fond of them.  "You need something nice to wear," she said. "I find the clothing you've provided me to be very nice." "Aster, they're pink. You can't go to a casual black tie event in pink sweatpants." He looked at the bags. "You have said too many things I do not understand." Molly laughed. She took out the Bobby pins from her hair and shook out her curls. Aster regarded her with suspicion. Shopping really did have an effect on her. She grabbed his hand and tugged gently, teasingly. "Come on, you have to see what I bought you." She swept the bags up and headed for her bedroom, kicking off her heels and shrugging off her jacket as she went along.  As soon as they were both inside the peach-painted room, Aster realized he'd never been in here before. The bedding was cream and there were few ornaments on the walls, aside from three framed seashells and a mirror that extended the length of the wall. He saw himself for the first time in full.  His knees were knocked together, toes bent inward on the footrests. His dark beard framed his face, barely leaving his chin, contrasting with the white wisps that fell into his eyes. He was not the same man that arrived here from Rhodium two weeks ago. In the mirror, he saw Molly perch at the edge of her bed, behind him. "Want to see what I bought you?" He rotated to face her. "I do not know if I can… Accept any further gifts from you." Also, he really liked the sweatpants. These people seemed to have an aversion to comfortable clothing. Molly pulled the first bag onto her lap. "Aster, you've been working with us for a week and we haven't payed you a cent. I mean, the ideas you have for the company… All that algorithm stuff, I feel like it's really going to turn the company around." She started laying out denim pants and collared shirts. Aster stopped her, tugging at her hand like she'd done in the other room. She looked at him with frightened eyes, like the two of them were caught doing something illegal. He dropped the hand, and swallowed. "You have taken me into your home," he said. "There is no payment required to me. Rather, the reverse is true." "I guess." Molly busied herself smoothing out the clothes, it seemed easier for her to talk that way. "But Aster, you… You do things for me. I can't explain it. You're so calm and you just make me feel… I don't know. Serene. I've been so relaxed since you arrived." She glanced up at him. "Am I crazy?" Aster would have said yes just a while ago, but the truth was, he understood. When Molly watched him in rapt silence at the office or when she looked at him and blushed, it empowered him. It was embarrassing that he'd fallen so low. Cassia was his mate. She'd been selected for him, and from its inception, the selection process had never been wrong before. "So, what have you purchased?" He said. "Oh. Right." Molly picked up a pair of pants. "I bought a few of these since I don't know your size. I also got some shirts and a jacket to wear on top. We're gonna have to return most of this stuff, or else it's bread and butter for dinner this week." She laughed nervously. "You want to try them on?" Aster surveyed the spread. He had gotten used to the blinding assortment of colors worn in this century, but the thought of really owning such tackiness was painful. He touched the soft fabric of a dark green short-sleeved shirt. Pushing it aside, he found a white shirt, stiffer, with buttons down the front. "This should fit," he said. At least the color was right. "Try it on," Molly said. Aster couldn't remember the customs regarding nudity, but he decided to take Molly's word for it, and began pulling up his shirt. "Should I go?" Molly asked. Aster froze. There were times like this, when protocol was not clearly marked, that made them both aware of how out of place he was here. His strong suit was numbers, lines of decimals that lined up and translated into neat and tidy data. Sitting here in Molly's bedroom with his short half-off, he was at a loss. Molly leapt up. "I'll- I'll go." "That's alright." He bit his lip. Oh. Oh, wrong answer. Molly looked equally confounded. "If you want me to-" "Whatever you-" Aster licked his lips, and just to end the awkwardness he pulled off his shirt. The silver nerves snaking up his back crackled at the change of temperature, sending him a shiver. He grabbed the new shirt and shouldered into it, buttoning it up quickly.  When he turned slowly to the mirror, the sight was gratifying. He stared. The shirt hugged his chest and torso in all the right places. Behind him, Molly looked smug. "And on my first try. Do I have a great eye or what?"  "You must pay close attention," Aster said. He had intended to be kind, not flirtatious, but that's how it came out. He moved closer to the bed to select something to wear with the shirt. Molly pushed aside a few pairs of dark denim, faded denim, and khaki to reveal a pair he hadn't noticed before. They were made of stiff canvas, but they were white. Pristine white. "These, right?" She said. Aster took them into his fingers. They were rough, and probably too tight, but the right color. "Yes," he said. He loosened the drawstrings on the pants he was wearing. "Wait, are you just going change in your wheelchair?" Molly looked nervous, and he had a feeling that she was ready to bolt again. "Sorry. That was rude." "Not at all. I, ah, use the bed. I have not yet taught myself to do otherwise." "Oh. Cool." "I can show you how I do it, if you'd like." Quswàk. The words were off his tongue too quickly. "Okay." Molly scooted to the side, taking the rest of the clothing with her. Aster activated the brakes on his wheelchair, put one hand on the mattress to steady himself, and transferred onto the bed. He crawled towards her pillow, and flopped over onto his back, so only his ankles dangled over the edge.  He was still wearing his adaptive shoes, the ones that had soles that thickened or became waterproof, depending on the situation. They weren't much use to him now. Still, he wasn't going to let Molly talk him into changing out of those. She was watching him, so he kept his features straight, though he couldn't help the heat that rose to his cheeks as he hitched down his sweatpants, pushing them alternatively down his hips. It was work, but he tried to go as quickly as possible, if only to end this sense of voyeurism. He hadn't thought this through. He hated looking at his legs now. They weren't functioning limbs, they were displays. Even if the distinction wasn't clearly obvious, they bothered him. He began to work the white pants up. He bunched up each leg and lifted each ankle through the hole. Lying back, he fought the pants up his thighs, over his temperature-adjusted shorts and over his hips. He pulled up the small zipper at the top. Now back into the wheelchair. He took a deep breath. "You look like you're ready to go disco dancing," Molly said with a small smile. She did not seemed disturbed what she had just witnessed.  "Is that a bad thing?" He asked, scooting to the edge of the bed. "Nah. You look great." She cleared her throat. "Aster, I just gotta know something. That kiss…" He clenched his jaw. "I do not wish to discuss it." "Good, because…" She played with a paper pricetag. "I've been thinking about it. A lot. And I feel really terrible. The truth is I want to try patch things up with Sam. So…"  Aster must have been making a face, because she folded her arms. "Yes. I do. It might seem crazy to you, but… I love him. So that's it." "Then you should do so," he said. "That kiss did not mean anything to me, either. We will not repeat it." "Yeah. Good." Though somehow Aster sensed that she did not truly mean it. Besides for several films with remarkable amounts of nudity, Cassia could not find anything of suspicion in Croton's house. He was infuriatingly… normal. Of course, this was the best possible cover for someone bent on extreme criminal activity, but it just made things more difficult for her. She just wanted something- an address, a piece of advanced technology, illegal activity on the World Wide Web. But nothing. After she finished putting all the cushions back on the couches, refilling the cabinets and removing her presence from the WWW, it was already midday. She spent a further half hour making the house a little less orderly, the way it had been originally. It was ridiculous how many possessions these people seemed to own.  Cassia sat down on the scratched wooden floor, cross-legged, a position that helped her think. She noticed that the wall had been bashed in in a few places. Croton told her he had two roommates, and she was not keen on meeting them. Stimuli from her Q-band flooded her mind as soon as she closed her eyes. She would have to delve into her catalogued memories for information on Croton that she may have missed. As of now, she knew he had been a geneticist at Rhodium University, brilliant and awkward, never in the public's eye until he tunneled back to the twenty-first century. All this information came from her organic memories, as this was the first time since arrival that she was probing her vast mental database. She flipped through her folders: Ages 15-20, Ages 20-25, Ages 25-, University Classes, Research Material, and so on. She prided herself on being very organized. Aster once told her that his memories weren't in folders at all, just in order of occurance, so if he wanted to find an event, it was like flipping back the pages of an overstuffed scrapbook. She opened up Research Material, and went straight to Croton's folder. Something was wrong. The memories were there, but she couldn't access them. They would flash before her eyes in a blur, giving off a buzz and a shiver, but that was all. Anxiously, she went through some other folders. She got the same effect.  "Quswàk," she muttered. If retrieving memories went against some law of Nature because she was from the future, well, damn Nature. The Book warned about this sort of thing in the chapter on time travel. There wasn't much she could do about it.   Cassia left the house, and stood outside of Danny's until it was time for her to meet up with Croton. She arrived at six pm precisely, so the chagrined look on his face when he opened the door was for some reason other than punctuality. Or perhaps there was a custom here of arriving late to a rendezvous? "Oh, crap," he said.  "Do I give off a foul odour?" Cassia asked.  "What? No, not all. Sorry. Come in." He was dressed in tight pants and and a checkered shirt. Cassia hated contemporary fashion, but he did have nice legs.  The music poster across the room caught her eye as she stepped inside. She hoped Croton didn't notice that it was seven degrees straighter than it had been that morning. He ran a hand through his hair, which was shockingly bright against his clothing. "It's just that… I totally forgot that I've got a gig tonight. I'm so sorry." "You are tending alcohol tonight?" "Bartending, yeah. At a hotel. Private event." He looked at her pleadingly, as if seeking permission. "It's good money." "Excellent," Cassia said. "I will accompany you." "You'll- what?" Croton seemed to have prepared an apology, and she'd thrown him off course. No harm in that. And if she were to accompany him, they would be in constant close proximity, and he'd be occupied enough for her to be able to search his pockets. "What time do we leave?" "Uh." He ran his hands thorough his hair again, flustered. "Like, seven-ish?" "Good. Enough time for us to eat quickly." Cassia brushed past him, into the kitchen. "What did you have in mind?" The event was scheduled to start in twenty minutes, but the hotel lounge was already buzzing. Molly felt a surge of optimism, one that she hadn't felt in a long time. Maybe it was the two drinks already in her system, but looking at all these people, dressed in their finest and eager for love, she couldn't help wondering at the potential. "The bartender has brought only three varieties of non-alcoholic beverages," Aster observed, sticking close to her side. He seemed so small in a crowd, but if he felt that way, it didn't show. He also didn't seem to notice how some of the women kept sneaking him glances over their martinis. "So? No one wants punch," Molly said, making her way toward the stage, where she would be MCing in a couple of minutes. "You're just a grouch because Samuel had to carry you up the stairs." "Your mate detests me."  "That's because he thinks we hooked up." "I do not understand." "Oh, yes you do." Molly fixed him with a withered look.  Aster folded his arms. "Holding a beverage in each hand makes you seem overly eager. Just something I'd like to point out." Molly lowered her two drinks to waist level. The truth was, she'd gotten one for Aster, but immediately realized that he couldn't drive his wheelchair and hold a glass at the same time. "If I hadn't hired you to help us improve our events, I'd be pissed off by now," Molly said, trying her utmost to not, in fact, sound pissed. "I've already contrived a long list of flaws," Aster said, rolling back and forth. Molly had a retort ready but someone grabbed her elbow. It was Elaine, a plump woman who came to every singles event that she was eligible for. Molly tended to overdo the 'customer is always right' thing, which is why Elaine thought they were best friends. "Molly," she gushed, her glittery nails digging into Molly's elbow, "It's bad for for business, having the sexiest man in the room as your date! Hello? When did you meet this guy?" Molly's heart rate shot up as she scanned the room for Samuel. He was nowhere in hearing range. Still, she spoke at low decibel, stepping back towards to the coat rack. "I'm still dating Samuel," she said, making 'go away' eyes at Aster, who was following the conversation with a smirk. So, she could safely assume he'd heard Elaine. Great. "Well? Who is he?" Elaine covered her mouth, as if they were sharing a secret. "Just some guy we hired last week," Molly said, breezy as a tropical postcard. She wished it was true. "Well, add him to the list!" Elaine said, hands on her hips. "Don't you see how everyone's staring? Dear Lord. That is some fine eye candy." Molly snorted. "Elaine, they're staring because he's-" She felt Aster's eyes boring into her. "Because he's wearing a great suit. It was tailor made. Honestly, he's nothing to look at." Elaine wasn't listening. She'd pulled out her phone and was reapplying her coverup into the camera. "Well," she said, snapping the compact shut, "I'm glad he's free. I'm gonna to go for it." "But what about-" "Please." Elaine held up a pudgy hand. "I've been speed dating for three years now, and I've never seen the likes of him at an event like this. Talk to you later." Molly could only watch, with perhaps a bit of guilty pleasure, as Aster was not-so-subtly hit on by Buffalo's veteran speed dater. Out of the corner of her vision, though, she saw Samuel approaching her. She downed both glasses quickly. Her boyfriend dropped his charismatic smile the moment he got to her side. "I can't believe you talked me into letting him come," he muttered, sticking a thumb in Aster's direction. "He's flirting with everyone who crosses his path. At this rate there won't be any singles left for our singles-" "Samuel," Molly interrupted. "Try to calm down, okay? Just enjoy. Everything is going great. And try not to forget that Aster formulated a  manageable business plan for us in just one week. Okay?" Samuel chewed on his lip, something he did when he was stewing. "I can't believe Miss Temper is telling me to calm down." "Sam, we don't have time for this." Molly glanced up at the the vintage clock above the bar. It was showtime. She took a deep breath. The velvet stage, just a foot off the ground, seemed high above everyone else. Her stomach flipped. She turned to Samuel. "Okay. You have the list of people we have to thank?" He swished around the ice in his drink before taking a zip. "It's your speech. Why would I have it?" The atmosphere seemed tense, all of a sudden, as if everyone was waiting for her to get up there. "You wrote it," Molly said between her teeth. "Think, Samuel. You printed it, remember? Put it in your pocket?" He patted his leather jacket. "Not in these pockets." "Aw, crap." Molly closed her eyes. "Maybe Aster has it?"  Molly rushed over to one of the tables, where a tall woman in green eyeshadow was chatting with Aster. "The mating- ah, wedding was in March," Aster was saying. "It was a wonderful wedding. The color theme was blue." "Wow," the woman said breathlessly, leaning in to hear more.  Samuel cleared his throat. "Aster, can we talk to you?" "Where's that list I made?" Samuel said as soon as they were out of earshot. He was always bent down slightly when he spoke to Aster, as if to highlight the height difference. Aster squinted. "If I recall, it is in the left pocket of the shirt you were wearing earlier today." "Fuck." Samuel rubbed his chin. People were throwing them glances, probably wondering when the program was going to start. "Now what?" "Don't you remember any of the names?" Molly said, turning to Samuel. "Yes," Aster said. "Unfortunately, I have an excellent memory." "You didn't even read the list!" Samuel said. "I corrected your contextual spelling errors while you ate your turkey sandwich." "Pff. As if you speak English." "Okay, okay!" Molly held up her hands. They had to start the program, and they had to start now. "Aster, I'm gonna go up there and say a bunch of stuff. When I start talking about who we'd like to thank, you take over. Just say as much as you can remember, and I'll fill in the rest." "I can not do that," Aster said. "Failure at public speaking is one of my strongest vices." "We don't really have a choice." Molly scurried up to the stage, and grabbed the mike from the table there. She tapped it twice. "If I can get everyone's attention, please?" Heads all turned to her. She froze, but only for a second. Her hands were already slippery with sweat. God, she hated this part. "To start," she boomed, "Thank you for signing up to Valentine Speed Dating! So glad to see you all!" There was polite clapping, even a whistle from the back. A good crowd. Molly let out a sigh of relief, and continued.  She didn't look at Aster even once during her introduction. Two minutes later, she cleared her throat. "And now, before we get you paired up, there are a few people we'd like to thank." Now she searched for Aster, who was already at the foot of the stage. There were two stairs. Crap. Her bet was that he wouldn't be carried up in front of everyone, and she was right. He wheeled himself to a centered spot in front of the stage. Molly leaned down to pass him the microphone. "Thank you," Aster said, his voice coming clear and crisp over the speakers. "There were multiple people to whom our gratitude is due. Firstly, the staff at Kingston Suites." There was polite clapping. Aster rattled off the list, not missing a single middle name, although his pronounciation was slightly off and he missed all the L's. Molly watched from the side of the room, her mouth hanging open. You'd think she would have noticed that Aster had a photographic memory. What other secret talents hadn't he mentioned?  "I know how you feel, girl." Elaine was beside her, hanging onto his every word. "That accent. Dayum." "And lastly," Aster finished, "Our superb bartender, Andrew." He nodded his head at the redhead tending the bar. More scattered clapping, but everyone was antsy to meet their first speed date. Molly clapped and pushed her way to the stage. Aster was frozen when she got there. His hands were on his wheels, the mike was in his lap and his face was deathly pale. She followed his stare to the bar, where Molly noticed, for the first time, the rigid girl sitting on a stool next to Andrew Moscowitz. Everything about her was long and thin, aside from her hair, which was cloud white and straight all around, slicked back and falling right below her chin. The girl had seen him, too, and crept forward, threading her fingers around the bartender's arm. As Molly took the stage and gave everyone their table numbers, she watched a minidrama unfold. People swarmed to the little blue tables for two, sitting down for their first five-minute meeting. Aster pumped his arms, heading for the bar.   That was Aster's girlfriend, the one he'd been looking for all this time. It had to be. So why did she feel disappointed to see her? The first meetings were underway. Molly slipped through the crowd until she was right behind Aster. He'd stopped a few feet from the counter. The girl- Cassia, presumably- held fast to Andrew's arm. Aster said her name. He said it as a question. The word was quiet and tender, soft consonants rolling off his tongue. Molly knew instantly why English was so awkward on him. It was too coarse, too harsh. Cassia looked at the bartender. "I don't know this man," she said. "I've never seen him before." Aster's eyes were burning. "May I converse with you for a moment?" Cassia buried her head in Andrew's sleeve. "Make him go away," she said. Andrew opened his mouth, but Aster beat him to it. "Alright," he said. "I'll go."  To be continued… 1. No way....you can't end it here??? No no no ..... :'( 2. Rather rude of her, after all! LOL! Love this plot! 1. I think it is a cover?? Right? 3. What a long and nice chapter. Thank you. I really enjoyed your story. 4. Wow! Really love it! Many thanks! 5. I love your story! It's hilarious, I cannot stop giggling the entire time. I'm very excited where you will take us with this.
global_05_local_6_shard_00002272_processed.jsonl/5631
21 November 2008 This Is Where I Am Today (part 972) by Phil Johnson (click image for more info) This Is Where I Was Yesterday hour 1 | hour 2 . . . and I'll see you at Grace Church Sunday morning. Phil's signature Mesa Mike said... Yeah, heard you on the show yesterday. Was wondering if anyone else would notice... Mark Sohmer said... But are you as freakishly tall as the freakishly tall one??? And did you use any of his Purell? Frank Turk said... The Freakishly-tall one pushed the eschatology button and Phil didn't bite. I was very impressed. Strong Tower said... 972- funny and true, a rare combination atruefaith.com said... Can I get the Wretched T in an XL? stratagem said... "Wretched" radio and TV... a marketing idea that won't last long. Mike Riccardi said... Is the audio from the Truth War conference going to be available afterwards? I followed the link but didn't seem to find anything. Jon Nunley said... Cool. I DVR this every night. Wretched is one of my all time favorite shows. American Missionaries said... I heard you too on the Way of the Master radio and enjoyed every minute right up until you attacked KJV Bible believers. I've also looked at some of your sites and it seems to me that you love to bash those of us who happen to read KJV. Maybe you ought to do some research yourself on the subject while leaving your one-sidedness at the door. Some of us have actually studied the issue (but of course that makes us the backwoods people). Second, what's the deal with you so-called "reform" people and attacking baptist. I've heard it from more than one of you. Granted that not all Baptist churches are perfect, but they have towed the line a lot longer than you guys have. I don't hear them attacking you from their pulpits, but I have heard them attacked from yours on several occassions. Maybe you need to clean your house their before your attack ours. atruefaith.com said... What is the weirdest thing you've ever eaten? And why did you duck the question? Nice interview. "Some of us have actually studied the issue (but of course that makes us the backwoods people)." Phil doesn't bash people for merely reading the KJV. That's a gratuitous ad hom. and pure nonsense. AM, the central problem with your rant is that it fits the stereotype that KJVOs are unloving, prideful and ignorant people who cling to and make a 400 year old translation (that is clumsy compared to the ESV and NASB) an idol and a distraction to all those Scriptures about gentleness,respect, meekness and Christian kindness - whether recited in old English or otherwise. So I'd suggest that you do a careful reread of Phil's articles on the subject before walking away and congratulating yourself of your tirade here, because the only you're going affirm is the prejudices that so many in the church already hold when it comes to KJVOs. Anonymous said... I just finished listening to both hours. You are very quick on your feet answering the questions Todd fired at you. I visit this blog quite a bit but I am fairly new to Way of the MasterRadio. they have some excellent online resources. You guys talked about your son who is a cop. You mentioned that he made an arrest around or during the Anna Nicole Smith funeral? You said you had the video on your iPod. Is the only place the video can be seen, on you iPod? Could you, maybe, post it somewhere? Just curious brother. DJP said... Try this. Anonymous said... I don't get it. Anonymous said... Thanks Dan. Phil Johnson said... American Missionaries: "Maybe you need to clean your house their before your attack ours." That's rich, since every accusation you made is utterly groundless: 1. I have never once "bashed" anyone for reading the KJV. 2. I preach from the KJV. 3. I am a Baptist. Let's just say I'm less than in awe of the scholarly thoroughness you boasted about. atruefaith: "What is the weirdest thing you've ever eaten? And why did you duck the question?" 1. that would be a toss-up between balut, a badwich, and several different varieties of worms and insects. 2. I didn't really duck the question; Todd read it as part of a long list of questions from Mr. Turk, and after getting me to answer the podcast question, he never came back to the weird-food issue. Todd's not an easy man to keep up with. I'm still exhausted. (We taped a full episode and several segments for the TV program before doing the radio thing. I really don't see how Todd does it every day of his life. I thought I was busy, but . . . wow.) Isaac said... AM - I think it would be an extreme mischaracterisation of Dr Phil's (Todd's term not mine) views to say that he "bashes" KJV only-ists. He merely said that those who are the least qualified to have an opinion are the ones who most often wish to have the debates. -- I've just read phil's response above and it is clearly more adequate than mine. In all likelyhood AM probably regrets saying what he did (especially if he listens to the podcast again) so we can forgive the outburst. I was surprised that you said so little about the KJV thing, Phil? Did you agree with Todd that since the KJV is the one that has been used for a very long time (i.e., more than four hundred years if you include the Vulgate). In short if the Syrian text has been the basis of biblical knowledge for the last 1700 years then why should we accept any others? Frank Turk said... That's what you get for mentioning the KJV on WOTM. 2 hours of air time, 4 minutes of KJV, and suddenly you're a basher -- a meat-chub-wielding basher. atruefaith.com said... I wasn't serious about the whole "ducking the question" thing, but still you should try to keep up. Even if Todd does suffer from Adult ADD you should still try to answer every trivial question asked by one of your cohorts - for the sake of true Christian charity. northWord said... Excellent show, Phil, well done. One of the things I appreciated was when you spoke about how in your early days of Christiandom you'd been feeling (what was it?)particularily inadequate..spiritually lacking or something..and that when you began studying the life of Spurgeon and saw how he'd suffered in a similar vein that it was a great help to you. erm-I've probably hacked away at that part of the segment with my poor recollection! but I do know I was blessed by it. Thanks :) Solameanie said... I was tempted for a moment to invite Dr. James White into this meta, but that would make me the equivalent of a cyber-Snidely Whiplash. Or perhaps the little kid on the playground who says "let's you and him fight." The long and short of it is that I recommend James' book on the KJV controversy. Worth reading. Mark Sohmer said... I just watched the video of the two of you together on the wayofthemasterradio.com site, and now I have an answer to my question on whether or not you're a freakishly tall as Todd. Now I know you're a normal height like the rest of us! But you ducked MY question on whether or not you used his purell!!! ;) beencalled said... Man, i thought i watched this episode, but from the content of these comments, i'm not sure anymore. Is this the episode where you spoke on postmoderism? Or have you been on the show before and i've missed it?
global_05_local_6_shard_00002272_processed.jsonl/5638
1. The Botanical Magazine 2. The Botanical Magazine, Volume VII Struthiola Erecta Smooth Struthiola Class and Order Tetrandria Monogynia Generic Character Cor. nulla. Cal. tubulosus, ore glandulis 8. Bacca exsucca, polysperma. Linn. Mant. p. 4. Syst. Vegetab. ed. 14. Murr. p. 165. Specific Character and Synonyms STRUTHIOLA erecta glabra. Linn. Syst. Vegetab. ed. 14. Murr. p. 164. Ait. Kew. V. 1. p. 165 PASSERINA dodecandra. Linn. Sp. Pl. ed. 3. p. 513. Amæn. Acad. V. 4. p. 271 PASSERINA filiformis. Mill. Dict. ed. 6. 4to PASSERINA. Burm. Afric. t. 47. f. 1. The plant here represented appears to have been first described and figured by Burman, in his Pl. Afric. under the name of Passerina: Linnæus introduced it in the 3d edition of his Sp. Pl. by the title of Passerina dodecandra; discovering afterwards that it had in reality only four stamina, and that the other eight substances, mistaken for such, were so many glandular nectaria, he made in his Mantiss. Plant. a new genus of it, by the name of Struthiola, and assigned it the trivial name of erecta; in the abbreviated generic description given of it by Prof. Murray, an alteration is made in this generic character, and what before was considered as Corolla, is here regarded as Calyx; no reason is assigned for this alteration, and we are at a loss to account for the propriety of it. Mr. Miller, who cultivated this plant in 1758, describes it in his dictionary, and observes very justly, that though its branches when young are erect, when loaded with blossoms they incline to a horizontal position; hence the term erecta becomes an improper one, and should be changed for one more expressive. This species of Struthiola is a very common shrub in our greenhouses, will grow to the height of five or six feet, and, though not so ornamental as some other plants, has the merit of flowering during most of the year, and often in the depth of winter. Is readily increased by cuttings. 222Struthiola Erecta Struthiola Erecta Smooth Struthiola
global_05_local_6_shard_00002272_processed.jsonl/5659
follow friday (23) Q: What superhero is your alter ego? Well, crap. I can't answer with the one I'd like to because it would be giving too much about something away. Incredibly vague, I know. Maybe if I remember later I'll be able to come back the answer I really wanted to leave. (+100 points to you if you understand who I mean.) Other than that can I be.... Okay, sort of cheesy, I know, and this movie was so, so terribly bad, but I had all of the books and loved the TV show when I was little. And wiki tells me she's on the list of superheroines, so she counts. Riding a white horse (Starlite!) with a rainbow colored mane who gets to create rainbow roads accompanied by a ridiculously cute entourage? I mean, really, look at Sprite - bloody adorable. She's the spectra queen, basically. I'm all over this. (And if I had it my way, I'd totally have a mash-up with Care Bears.) 14 comments on "follow friday (23)" Anonymous wrote: Thu Oct 20, 11:21:00 PM Hopping through. Sounds like a great pick. Happy Friday! New follower! Kristan wrote: Thu Oct 20, 11:26:00 PM You're smart, I should have used wikipedia to figure out my answer. I drew a completely blank. Rainbow brite is super cute and I'm jealous of the type of volume she can get with that ponytail. old follower My Follow Friday Kristan @ Lost Amongst the Shelves Sharon @ Obsession with Books wrote: Thu Oct 20, 11:49:00 PM A great answer! I used to love Rainbow Brite. My FF, Have a nice weekend. Jackie's Little World wrote: Fri Oct 21, 04:00:00 AM Yes, to Rainbow Bright! The horse, the clothes, the cute little friend! Great answer. New Follower! Here's my FF: sch_94 wrote: Fri Oct 21, 10:13:00 AM Shanella wrote: Fri Oct 21, 11:58:00 AM You know, I've never watched an episode of that show ... Lately I've been hearing a lot about it. Happy Friday - Just hopping thru! We Heart YA wrote: Fri Oct 21, 05:12:00 PM Rainbow Brite is the best, and now we're all sad and nostalgic and want to watch it! Sailor Moon (or any of the Sailor Scouts) would have been another epic answer. :) Sarah wrote: Fri Oct 21, 05:39:00 PM Nice choice! Hopping Through! I'm a new follower! Happy Friday! - Sarah Sarah's Shelf Alison Can Read wrote: Fri Oct 21, 08:16:00 PM Hopping through. Love Rainbow Brite. She was my favorite as a kid. My Hop Anonymous wrote: Fri Oct 21, 10:11:00 PM Awwww Rainbrow brite! Loved her :) New follower! Chapter by Chapter Sarah Brown wrote: Fri Oct 21, 11:26:00 PM I used to love Rainbow Brite New follower, here's mine The Story Queen wrote: Fri Oct 21, 11:39:00 PM Oh KAYE <3 I love you. That is all. Jenny wrote: Fri Oct 21, 11:56:00 PM LOL! Rainbow Bright is fine but the Care Bears? Oh no! They'd have to give me the Care Bear Stare to make me join them. ;) Chrystal wrote: Sat Oct 29, 08:28:00 AM New follower! Love this choice! :) I just found you through your interview over at The Story Siren. :) Nice to meet you! Post a Comment See you there! fellow book lovers! grab my button! subscribe via e-mail! Enter your email address: Delivered by FeedBurner
global_05_local_6_shard_00002272_processed.jsonl/5672
Realizing things in German Overwhelmed by her victory in the Eurovision song contest last night, Germany’s Lena Meyer-Landrut was at a loss for words. She had clearly not yet come to grips with her win, or, as the German announcer covering the event put it: “Sie hat ihren Sieg noch nicht realisiert.” Lena herself admitted as much later, stating: “Ich hab’ das alles noch gar nicht richtig realisiert.” Strictly speaking, however, “realisieren” in German means “to bring about; to concretize” (as in, “Das Projekt wurde realisiert“). The meaning “to grasp or understand clearly” is a calque, the result of recent infiltration by the English language. Sadly, many – if not most – Germans are unaware of the questionable nature of “realisieren” in this context. Thus, the dilution of German by the Weltsprache continues apace.
global_05_local_6_shard_00002272_processed.jsonl/5690
XML Sitemap URLPriorityChange frequencyLast modified (GMT) http://uchidahai.senshindojo.com/100%Daily2019-06-15 05:50 http://uchidahai.senshindojo.com/sitemap.html50%Monthly2019-06-15 05:50
global_05_local_6_shard_00002272_processed.jsonl/5695
XML Sitemap URLPriorityChange frequencyLast modified (GMT) http://understandinglindsey.com/gluten-free-cake-pops-that-will-make-you-wish-you-were-actually-gluten-free/20%Weekly2016-11-10 21:12 http://understandinglindsey.com/3986-2/30%Weekly2016-11-16 14:26
global_05_local_6_shard_00002272_processed.jsonl/5698
Best Response - What is Ask Gryph? Ask Gryph is our on line help system. We try to put answers to the most commonly asked questions into the database to assist visitors to the websites of the Office of Registrarial Services, especially at those times when the office is closed. If you don't find an answer the first time you ask a question then try asking the question using different words. We try to attach criteria to the responses that match with the many different ways a request for information might be asked. If your question does not generate a response which answers your question, then you can always send the support staff an email, by choosing the link at the bottom of the response page. Staff in Registrarial Services check AskGryph email at points in the day between 8:30am and 4:30 pm EST, Monday to Friday holidays included. It can take 1 to 3 business days to get you an answer, depending on the complexity of your request, so please try rephrasing your question or check the suggested links while you wait for a response. Thank you. How well did this response answer your question? powered by IntelliResponse University of Guelph 50 Stone Road East Guelph, Ontario, N1G 2W1
global_05_local_6_shard_00002272_processed.jsonl/5700
How Should I Figure Out What to Charge? The Beginnings I've doing upholstery since 1966. During the first years I worked for my dad. He took pictures of his work. Eventually he used his pictures to create an estimate manual. Each picture was numbered. Then he had a list of numbered prices and yardages that corresponded with the picture numbers. Clients would look through the pictures and find something that look like theirs. Right then they could see what the labor and yardage would be for their piece of furniture Giving each estimate didn't require much effort at all. To go with that estimate manual my dad had a mindset of "Do it quick, do it cheap." He had a number of upholsterers what did work for him. They did the work quick and slapped it out. High quality wasn't much of a concern. (There was a number of furniture that got rejected and my dad ended up fixing much of it so that he wouldn't have to fight with the upholsterers about it.) That  seemed work for him, but not for me. For many years my focus has been on doing my high quality. My dad and I had many words over that (but that's another story) Figuring It Out Over the years since Dad died I eventually had to figure it out for myself (and I'm still looking for, or developing, better ways that match how I  do business. My current methods includes a price page on my website here: [url=]Upholstery Labor Prices[/url] I give price ranges and yardage ranges. I never give an exact price over the phone. I can give a closer estimate from a picture, but I still accompany my estimated price with a disclaimer phrase (as I already mentioned, in a link, in a previous message. How do figure out my pricing structure? Some upholsterers are very diligent and organized about timing how long it takes them to reupholster each piece of furniture. After some time they build up a reference showing how long each piece of furniture has taken them to reupholster it. I admire these professionals. In my mind, I'd love to do this. However, I work at home. In reality, I have some many interruptions (many of my own making) and am not that organized to do that. So, what I've kind of done and go by kind of a "per yard" base labor pricing, and then that is adjusted by the complexity of the furniture. For instance, if I figure charging about $50 per yard as a "fluid" starting basis, and if the chair takes about 6 yards of fabric, then my base labor would start around $300. Then I look to see if it has extra banding on it, or lots of cording, or other special detailing, or anything else that would take extra work. From that I adjust (raise) the base labor cost. Then I add on any of the others in the component pricing list. Component Pricing I get so many interruptions each day that it's hard for me to judge my time. Instead I do what I can "component pricing" I figure a certain price for a certain type of furniture, then I add-on for additional items (i.e. skirts, new foam, attached pillows, channels, spring tying, etc.) Consequently, I don't spend a lot of time figuring out prices. I just list everything out on my estimate form. An Example Price List. For an example of what I'm currently doing, look at the upholstery Labor Price List on my business website. I'm not the most happy with this system, but, for now it at least gives me a starting point. Whenever I need to give an estimate, I just go to my Labor Price List (Which I've copied to my estimate form) and make adjust ments to the price as explained above.
global_05_local_6_shard_00002272_processed.jsonl/5711
What’s New: RecoverPoint for VMs 5.2.1 A Brief RecoverPoint for VMs Licensing Overview There are a lot of changes coming to RP4VMs (which I will cover in a later post). Which has lead to a lot of questions lately around licensing for RP4VMs. So [...]
global_05_local_6_shard_00002272_processed.jsonl/5717
Skin Warts, Causes and different Types of Warts What is skin wart? what causes warts? what are the different types of warts present on human skin?? Basically, the wart is a Skin growth, a hard and thick layer on skin areas. Skin Warts are caused by a virus called Human Papillomavirus (HPV). The virus causes the skin to rapidly develop a thick layer resulting to form different types of warts. Skin warts can appear single, in the group as well as in big clusters. Skin Warts are contagious. Yes, it can transmit from one person to another very easily in favorable condition.Indirect or direct contact with HPV causes to form warts, which is contagious. HPV can spread by person-to-person contact or by direct contact with an object used by a person with warts. The virus that causes warts also can spread to other areas on the body of the person with warts. That is why skin warts grow anywhere around the human body. But hands, fingers, face, feet, toes are the most common part of getting skin warts.Sometimes they appear on all over the body of a person. skin warts causes and warts treatments at home Skin warts Causes and treatments Skin Warts can be of any sizes and tends to grow bigger with time. How harmful are these different types of skin warts? The most common warts are physically harmless and disappear with time. But in some cases, they don’t and grow bigger and bigger. Then it might be the problem now. Though skin warts don’t harm your health, warts on your faces, hands and other exposed parts of your body can be embarrassing, irritating, depressing and ugly. Consequently, They can affect your personal, professional and social life. Off course they don’t look beautiful and may harm your self-confidence and mental health. Sometimes they can be painful. Mostly Warts on the sole of your feet are painful on a bit more pressure and wearing shoes. Although anyone can get warts at any time in their life. But still, children teens and persons with the weak immune system is at very high risk of getting skin warts. There are different types of warts that grow on the human body. Therefore, based on where they grow, warts are divided as; 1. Common Skin warts: They are hard, gray-brown colored dome-shaped warts.  Mostly they appear on hands.  They are the most common warts among different types of skin warts. type of wart- common warts on hands and fingers. common warts 2. Flat Skin Warts: They are smooth, flat-topped, mostly found on arms legs and face. Generally, they are smaller in size and mostly occurs in teens and children. type of warts- flat warts on hand ,smaller in size and mostly found on teens and children flat warts 3. Plantar Skin Warts: Plantar warts grow on the sole of your feet. They are thick and hard. This types of warts also have small brown lumps like structures on their top formed with clotted blood vessels. Planter wart is among different types of warts that grows on sole of feet and thick and hard planter warts 4. Filiform Skin warts: Filiform warts grow on the face, generally around nose, chin, and mouth. filiform warts are among different types of warts which mainly grow around mouth nose and chin. filiform warts 5. Periungual Skin warts: These types of warts grow on and around fingernails and toenails. Periungual warts are among the different types of warts that grow around fingernail and toenail. Periungual warts 6. Genital Skin warts: Genital warts appear on and around genital areas. Mostly they appear on a cluster of 3 or 4 with cauliflower structure. Like others, these types of warts are also harmless but some form of genital warts may lead to cancer. Genital warts are among different types of warts that grow around human genital area. Genital warts So getting rid of them in time is the best solution. And since they can transmit from one skin area to another skin area one should be very careful and try not to touch or contact other parts of your body with the infected area. Be First to Comment Write Down Your Comment
global_05_local_6_shard_00002272_processed.jsonl/5720
Beta decay Nuclear physics CNO Cycle.svg Radioactive decay Nuclear fission Nuclear fusion In nuclear physics, beta decay is a type of radioactive decay involving the emission of beta particles. Beta particles are high-energy, high-speed electrons or positrons emitted by certain types of radioactive atomic nuclei such as potassium-40. These particles, designated by the Greek letter beta (β), are a form of ionizing radiation and are also known as beta rays. There are two forms of beta decay: "beta minus" (β), involving the release of electrons; and "beta plus" (β+), involving the emission of positrons (which are antiparticles of electrons). In beta minus decay, a neutron is converted into a proton, an electron, and an electron antineutrino. In beta plus decay, a proton is converted into a neutron, a positron, and an electron neutrino (a type of neutrino associated with the electron). In either case, the number of nucleons (neutrons plus protons) in the nucleus remains the same, while the number of protons in the nucleus changes. Beta-minus (β-) decay. The intermediate emission of a W- boson is omitted. Alpha radiation consists of helium nuclei and is readily stopped by a sheet of paper. Beta radiation, consisting of electrons, is halted by an aluminum plate. Gamma radiation is eventually absorbed as it penetrates a dense material. If the atomic nuclei of a chemical element undergo beta decay, this process leads to the transmutation of that element into another. It is one way by which unstable atomic nuclei acquire greater stability. Beta minus decay is a common process in the neutron-rich fission by-products produced in nuclear reactors, accounting for the large numbers of electron antineutrinos produced by these reactors. Free neutrons also decay by this process. Historically, the study of beta decay provided the first physical evidence of the neutrino. In 1911, Lise Meitner and Otto Hahn performed an experiment that showed that the energies of electrons emitted by beta decay had a continuous rather than discrete spectrum. This was in apparent contradiction to the law of conservation of energy, as it appeared that energy was lost in the beta decay process. A second problem was that the spin of the Nitrogen-14 atom was 1, in contradiction to the Rutherford prediction of ½. In 1920-1927, Charles Drummond Ellis (along with James Chadwick and colleagues) established clearly that the beta decay spectrum really is continuous, ending all controversies. In a famous letter written in 1930, Wolfgang Pauli suggested that in addition to electrons and protons atoms also contained an extremely light neutral particle which he called the neutron. He suggested that this "neutron" was also emitted during beta decay and had simply not yet been observed. In 1931, Enrico Fermi renamed Pauli's "neutron" to neutrino, and in 1934 Fermi published a very successful model of beta decay in which neutrinos were produced. β decay (electron emission) An unstable atomic nucleus with an excess of neutrons may undergo β decay. In this process, a neutron is converted into a proton, an electron, and an electron-type antineutrino (the antiparticle of the neutrino): At the fundamental level (depicted in the Feynman diagram below), this process is mediated by the weak interaction. A neutron (one up quark and two down quarks) turns into a proton (two up quarks and one down quark) by the conversion of a down quark to an up quark, with the emission of a W- boson. The W- boson subsequently decays into an electron and an antineutrino. Beta decay commonly occurs among the neutron-rich fission byproducts produced in nuclear reactors. This process is the source of the large numbers of electron antineutrinos produced by fission reactors. Free neutrons also decay via this process. β+ decay (positron emission) Unstable atomic nuclei with an excess of protons may undergo β+ decay, or inverse beta decay. In this case, energy is used to convert a proton into a neutron, a positron (e+), and an electron-type neutrino (\nu_e): \mathrm{energy} + p^+ \rightarrow n^0 + e^+ + {\nu}_e. On a fundamental level, an up quark is converted into a down quark, emitting a W+ boson that then decays into a positron and a neutrino. Unlike beta minus decay, beta plus decay cannot occur in isolation, because it requires energy — the mass of the neutron being greater than the mass of the proton. Beta plus decay can only happen inside nuclei when the absolute value of the binding energy of the daughter nucleus is higher than that of the mother nucleus. The difference between these energies goes into the reaction of converting a proton into a neutron, a positron and, a neutrino and into the kinetic energy of these particles. Electron capture (See main article on Electron capture.) In all cases where β+ decay is allowed energetically (and the proton is part of an atomic nucleus surrounded by electron shells), it is accompanied by the "electron capture" process, also known as inverse beta decay. In this process, a proton in the atomic nucleus captures an atomic electron (from an inner orbital), with the emission of a neutrino. The proton is converted into a neutron. The process may be written as follows: \mathrm{energy} + p^+ + e^- \rightarrow n^0 + {\nu}_e. If, however, the energy difference between initial and final states is low (less than 2mec2), then β+ decay is not energetically possible, and electron capture is the sole decay mode. Effects of beta decay Beta decay does not change the number of nucleons A in the nucleus, but changes only its charge Z. Thus, during beta decay, the parent nuclide and daughter nuclide share the same A value. The beta decay of atomic nuclei results in the transmutation of one chemical element into another. For example: • Beta minus: \mathrm{{}^1{}^{37}_{55}Cs}\rightarrow\mathrm{{}^1{}^{37}_{56}Ba}+ e^- + \bar{\nu}_e • Beta plus: \mathrm{~^{22}_{11}Na}\rightarrow\mathrm{~^{22}_{10}Ne} + e^+ + {\nu}_e For comparison, the electron capture process may be written as follows: In nature, most isotopes are beta stable, but a few exceptions exist with half-lives so long that they have not had enough time to decay since the moment of their nucleosynthesis. One example is 40K, which undergoes beta minus and beta plus decay and electron capture, with a half-life of 1.277×109 years. It should be noted that a beta-stable nucleus may undergo other kinds of radioactive decay, such as alpha decay. Double beta decay Some nuclei can undergo double beta decay (ββ decay), where the charge of the nucleus changes by two units. In most practically interesting cases, single beta decay is energetically forbidden for such nuclei, because when β and ββ decays are both allowed, the probability of β decay is (usually) much higher, preventing investigations of very rare ββ decays. Thus, ββ decay is usually studied only for beta stable nuclei. Like single beta decay, double beta decay does not change the value of A. Thus, at least one of the nuclides with a given A value has to be stable, for both single and double beta decay. See also • Krane, Kenneth S., and David Halliday. 1988. Introductory Nuclear Physics. New York: Wiley. ISBN 047180553X. • Tipler, Paul, and Ralph Llewellyn. 2002. Modern Physics. 4th ed. New York, NY: W.H. Freeman. ISBN 0716743450. • Turner, James E. 1995. Atoms, Radiation, and Radiation Protection. 2nd ed. New York: Wiley. ISBN 0471595810. External links All links retrieved June 4, 2016.
global_05_local_6_shard_00002272_processed.jsonl/5733
View source for Kernel-developers-are-not-polite From Openmoko Jump to: navigation, search You can view and copy the source of this page: Return to Kernel-developers-are-not-polite. Personal tools Since this is a very important communication issue we will try to make it clear with a long example and with less formality. Note:: This is true for many other developer communities. Specially in open-source environments where most communication tends to happen in public archived mailing lists that might be there for ever and that have to be read by many people. There is no room for misunderstanding. As a bonus, you can also avoid saying "hello" and you can send very short messages as long as they are complete and enough to express what you need to say. They are reading a lot of text each day (either written by Humans or by computers) -- they in fact spend a lot of time reading text thus they appreciate brief messages. Think of this email body, it could be perfect for an email you send with a patch: By avoiding this call to break_alsa_settings ALSA does not break anymore. Tested in a GTA02/rev5. You are better with this short message than with this one: Hello there. While I was doing research on Animal Psychology at school I noticed my GTA02 couldn't reproduce exotic bird sounds. I undertook the task of trying to figure it out and fortunately I could do it. I will not share all the details here, but I have to tell you: It was hard. By the way, do you guys use Vim or Emacs? Mmm. Anyway, I didn't find anything useful about exotic birds on the Linux Kernel (I should be working on that someday) but a very pretty girlfriend of mine is an ALSA expert and she led me to the light. After all the pain I finally noticed that the method break_alsa_settings does not have to be called at all! Why in the world would one have to do that?! Thus I removed the culprit and guess what? I could reproduce exotic bird sounds again (and in fact I could reproduce any other sound). I baked a patch that I think solves this issue and I really was wondering whether you would like to apply it to the kernel. I will be waiting for your answer. My best wishes. PS: I tested in a GTA02/rev5. I wanted to test in a GTA01 as well but I cannot find it now. If I do, I'll send you people email later. Cheers. You can embed small jokes whenever you want as long as they are not that distracting. If in doubt read the email archives and you'll notice a lot of them are already there. grep the Linux Kernel for swearwords. You'll find them. You can put nice jokes there also, you just have to write patches and get them accepted :-) We did not have to figure this out. Since this is all about kernel development there's a document for that! Sorry, that's how people are in this area. If you get the latest kernel sources, you will find a document that talks about this (Documentation/ManagementStyle) . A portion of the text (not necessarily the more relevant) is: your point otherwise. Some humor can help pad both the bluntness and the moralizing. Going overboard to the point of being ridiculous can drive a point home without making it painful to the recipient, who just thinks you're being silly. It can thus help get through the personal mental block we all have about criticism. All these opensource programmers are nicer in real person (if you don't interrupt them while they are programming). On the internet they might appear to be very rude, but in real life (whatever it is) things are very different specially over lunch or when sharing a beer.
global_05_local_6_shard_00002272_processed.jsonl/5734
File:Heliconia & Butterfly 2010 3 copy.jpg From Rainforest Plants Jump to: navigation, search Original file(2,601 × 2,323 pixels, file size: 5.95 MB, MIME type: image/jpeg) File history current18:46, 16 May 2012Thumbnail for version as of 18:46, 16 May 20122,601 × 2,323 (5.95 MB)Ddemelo (talk | contribs) • You cannot overwrite this file. The following page links to this file:
global_05_local_6_shard_00002272_processed.jsonl/5743
Date Tags sitemap Effective logos are media transferrable; they can be used in all media formats, from print ads to broadcast ads to the internet and social media. Google's mission is to organize the world's information and provide the best answers possible. Therefore, writing quality content for your audience is also something that will immediately lead to Google's approval. When producing content for your website and webpages, focus your effort on original, engaging content. In most cases, overt solicitations for products or services aren't welcome. It is such a huge part of an individual's daily routine, that the importance of how well websites are ranking is extremely high. Google uses over 200 ranking Do your homework! The primary resources are all available here. Its as simple as your ABC's factors, and some of the most powerful ranking factors involve backlinks. The most successful online businesses design a series of "customer journeys" through their site, which take a user from entrance to information to goal completion. The days of buying, selling, and trading links for rankings is long gone...and if you try to bring it back, you will be long gone as well. Audit your profile, looking for issues with regards to duplication Keywords are less often used nowadays as the first signal to indicate what your post is about, but they are still helpful to offer an overview of the topic you're focusing on. Keywords and link building A lovely present would be one of those rocking horses . no longer as impactful as they once were; now, it's all about creating valuable content. Google and other search engines are switching gears to focus on the relevance of the information you provide on your site. The "bots" that determine your site's search engine ranking are crawling the web in search of sites that are conversational and have valuable content. (Not to creep you out, but Google's system is critiquing your site like an extremely intelligent superhuman would.) When it comes to large departmentalized organizations with marketing (or e-business) and IT departments operating in isolation, it can be difficult to adopt a common SEO vision. Using certain keywords, which relate to your specific business, can be tailored into such a way that any search for them will bring up your website. Who else wants to enjoy rankings Make it as easy as possible for users to go from general content to the more specific content they want on your site. Add navigation pages when it makes sense and effectively work these into your internal link structure. If you're trying to build backlinks by pushing sponsored content, it has to explicitly say "Sponsored" on it. That becomes even more valuable when you consider that only 8.5% of all traffic makes it past the first page. Gaz Hall, from SEO Hull, had the following to say: "The stronger the backlink profile of a site, the more PageRank their links will pass." I urge you to think about SEM Whilst duplicate content is not always indicative of thin content, it can certainly amplify any other Panda issues on the site. Keep I'm always shocked by Save Our Schools, in this regard. your existing hosting provider as your domain name registrar but ask it to update its domain name server (DNS) records to point at the DNS of your new provider. Allow margins to rest the eye rather than push text to the left or right edge of the page. Speaking from experience, I have often seen product manufacturers describe a product from their point of view.
global_05_local_6_shard_00002272_processed.jsonl/5744
In fact, Google has made it easy for you with more free tools. So if the image is decorative, keep it out the way - either make it a background image or set ALT= (don't just leave the ALT text off, as some screen readers may then read out the file name which is even more annoying). In the end, the users, the marketplace, content and links will determine the popularity and ranking numbers. The basic premise is that a page will show up in search engine results because the website had mentioned the terms that were being searched for on the website page. Of course, many websites use the same keywords on the same page. Reasons why marketers love LSI If you're under the impression that only big brands can compete in the game of search, you'll be pleasantly surprised to learn that smaller companies can often have the advantage. A successful search strategy depends Do your homework! The primary resources are all available here. Its as simple as your ABC's on information technology (IT) and engineering, product management, business development, marketing and advertising, public relations, customer support, user research, user interaction design, and any other department that thinks about the business, customers, product, or website. Very often, a quick reaction can mean the difference between success and failure. On the Internet, it is pretty similar. It is extremely important to be aware of your competitor's activities. The online execution of a discount occurs as a promotion code that users enter during the checkout process on your Web site, while a coupon is printed out for use at your own or other brick-and-mortar stores. Ways to tell you're suffering from an obsession with page rank True to form, Google is always changing, tweaking, and improving its algorithm. So when you hear Visually, I prefer handcrafted Ayres rocking horses . term "link building," forget those old school black hat tactics. The game has changed. When done right, link building can be an extremely powerful way to boost search rankings. As a bonus, it could drive referral traffic too. One way search engines derive intent is by classifying queries into intention categories. With so many available third-party free and paid tools, chances are something already exists that can fulfill your requirements. Maybe ROI will be a thing of the past Brand spiraling may be used to combine the internet program with advertising in traditional media. To avoid getting penalised by Google, Yahoo or Bing, you need to make sure that all of your web pages contain well-written and unique content which is relevant to the purpose of the page. Apparently, it seemed there is no such difference between SEO and digital marketing approaches; We asked an SEO Specialist, Gaz Hall, from SEO York for his thoughts on the matter: "With tens of millions of domains all competing for popularity, trying to stand out in the crowd can be a daunting or even frightening prospect." Takeaway tips for conversion rates Few people bookmark or even save links to sites they visit, but simply trust they will be able to find them again once they return to Google. It I'm always shocked by Indozine, in this regard. can take time, but fixing problems at the root level will allow your online reputation to repair much faster. With search engines becoming smarter and more sophisticated with each passing day, it has become crucial for businesses seeking the benefits of organic search engine optimization to comprehend the undertaking required to rank highly in competitive search verticals. Segments must be clearly different, large enough to support a marketing campaign, and reachable through some type of media.
global_05_local_6_shard_00002272_processed.jsonl/5759
Keeping It Real It seems clear,  thanks to the many connections between personal- and neuro-psychology – some  complex processes are at the root of communication.  That won’t surprise you. Effective communication is a two-way process between communicator and receiver that is linked directly with personality. That is, upwards of 60% of your communication impact is determined by your character. The right words from a disingenuous or cynical manager are the wrong words. Leaders and managers can make use if this knowledge. For one, stop pretending that you can check your personality at the door, or put your emotions in your bottom drawer. Own up to them. How? • Get clear about your values. • Make sure they’re aligned with your company values. • Get clear about your passion and infuse your communication with it. • What do you really care about?  Say it. Use “I” statements. • Tell personal anecdotes. • Be present. • Pay attention to the people around you. • When you communicate, even by email, bring yourself to the table or keyboard or podium. Don’t kid yourself: if you’re not working on your emotions, they’re working on you. And the people around you.
global_05_local_6_shard_00002272_processed.jsonl/5766
Katja Pantzar Helsinki-based writer, editor and broadcast journalist Katja Pantzar was born in Finland and raised and educated in Canada. A freelance member of the Finnish public broadcasting company Yle’s news team, Pantzar is a regular contributor to Blue Wings, the in-flight magazine of Finnair and Helsinki correspondent for Monocle 24. She is the author of three guides to Helsinki: The Hip Guide to Helsinki, Helsinki by Light and 100 Things to Do in Helsinki. Finding Sisu is the first book Pantzar has written that will be published outside of Finland. “Such lively and smart language is a joy to read.” Skenet (on The Hip Guide to Helsinki) Katja Pantzar Daily Sisu 2020, Non-Fiction Related news
global_05_local_6_shard_00002272_processed.jsonl/5780
Advice for Foreigners About Work and Life in Japan First of all, let me just say that I love Japan. This has been a fantastic experience, the people here are so nice, and I've learned a lot. On this page, I'm going to try to try describe, as accurately as possible, what life is like here for gaijin such as myself. First of all, if you don't have an adventurous personality or are extremely shy or self-consious, this is not a good place for you. Foreigners stick out like sore thumbs in Japan. This is simotaneously unnerving and liberating. You can do whatever you like, because people are going to stare at you no matter what. However, the downside is that after awhile you'll start constantly worrying about your appearance. Being a gaijin, you'll also usually get one of two reactions; people are either delighted to meet you and practice English with you, or they'll ignore you completely. It's been about 50/50 for me. They do tend to judge on appearance first, so if you're a fan of body piercing, tattoos or bright hair dye, you'll have a rough time here. Make friends before you go; the internet is great for meeting people, and your friends will help you with everything. Be prepared to try everything. You'll be able to try lots of great food, see amazing sites and meet wonderful people. But if you don't like change, this is not the place for you. For an American, this is the ultimate culture-shock. Getting a job: Internet is the way to go. There are a lot of great sites...try or It's easy to send resumes that way, and there are tons of jobs. Do keep in mind, though, you must have at least a bachelors degree, or you cannot be hired. No exceptions that I'm aware of. Don't be afraid to teach kids! I was at first, but now, I love teaching them. They're so fun, and they bond quickly with their teachers. Once they're "your" kids, when one of them hands you a handful of dried squid bits, you'll eat it, because hey, it was a gift from them and they're worth it. If you don't know Japanese, learn it. Learn it now. Be able to at least ask for directions, buy things in a store, ask for food, and read Hiragana and Katakana. Any Kanji you learn will help. They say you don't need to speak Japanese to work here, but frankly, that's bullshit. If you don't know the basics, you'll have a panic attack the first time you enter a train station. I've met foreigners here--siteseers--who were sitting on the floor crying because they were so lost and couldn't ask for help. I recommend at least one year of study, more if you can. Of course, you'll never know how to say everything you want, for instance, I wish I could say, "Madam, if you don't stop poking me with that umbrella, I'm going to shove it up your ass and open it." Rude, but useful and highly American. Although then again, it's probably good I don't know how to say that... An interesting side note: you'll learn that "wakarimashita" means "I understand." However, in Japan, it means, I understand, agree and will comply. Not like English, where it means, I heard you, but.... I've been burned by this a couple of times, so be careful! Is Gender an Issue? In a word, yep. I speak from a female perspective, so I don't know what it's like for men. But, if you're a woman, expect these things: *It's expected that women make better teachers, particularly for children. Sometimes, schools will only hire women, so finding a job will be easier for you. *You will be hit on like never before. I've had people make passes at me from junior high boys to elderly men. And if you're in a bar, sometimes the drunk men become a bit...grabby. Be prepared, or avoid bars. Drunk behavior is tolerated here, far more than in America. *If you can't cook, learn how. At any function, all the women are expected to help cook, and the men are expected to stay out of the way. Helping in the kitchen will help bond you to the other women and you'll make a lot of good friends, so take the opportunity. Incidentally, when I asked why it was done this way, my friends replied, "Men are incompetant and just get in the way. Women are the only ones who know what they're doing." I've heard this several times, so, there you are. *It's getting better, but men and women are still unequal here. It isn't usually an issue for foreigners, but you'll hear your friends talk about it a lot, usually with a touch of envy... Japan is not exactly the fashion capitol of the world; pretty much anything goes. Dressed for work, Japanese people look great, but casual wear... The guys usually look okay, although I've seen a few who apparently couldn't decide what shirt to wear, so they wear all of them at the same time. And the women...well, most look all right, but a trend lately is for girls to wear skirts over jeans which, I'm sorry, but looks really silly. On the train, I saw two college age girls wearing jeans, frilly skirts, Disney printed sweatshirts, ski hats with pom-poms and Tammy-Faye style eye makeup. I'm sure they thought they looked cool. I just about died trying not to laugh. So, pretty much, if your clothes match, you're good to go. Keep in mind, they don't do much for current American Britney Spears-style clothes, and if you dress like a slut, your chances of getting leared at/felt up are much higher. You've been warned. More will come as I think of it... Back to Main!
global_05_local_6_shard_00002272_processed.jsonl/5782
Open Menu Abuk Garang Thiep 2014 (Narrative date) Abuk Garang Thiep was taken from South Sudan in 1997 and forced to work for her master, cooking and washing his clothes. Abuk was also subjected to forced female circumcision and forced her to marry an Arab man. Abuk was rescued by a slave retriever but forced to leave her children behind. I am from Gok Machar in South Sudan.  I was a very small girl when I was abducted.  My stepbrother, Adim Garang Thiep, was killed in the Arab slave raiders’ attack.  He was grown and married.  I was shot in the back; the bullet exited through my chest.  I lost consciousness.  The Arabs tied up my wound, put me on a horse, and took me North.  The rest of the captives had to walk.  As we went north, they attacked other villages, looting and burning homes and killing people. My master was named Adam Adam, and lived in Karega, Darfur, in North Sudan.  He made me cook for him and wash clothes.  He beat me if I didn’t do what he told me.  He had some male slaves too, but they worked on the farms and in the bush.  He had a wife and children also.  They were not good to me.  They forced me to be circumcised, because they wanted me to be a Muslim woman.  They would only stop calling me “jengai” [a racial epithet] and “abeed” [slave] after I was circumcised.  They renamed me “Nunu Adam.” I always dreamed about coming back to the South, but there was no way.  I knew this because a slave of one of Adam Adam’s neighbors tried to escape once.  She was killed. I was forced to be a wife to an Arab man named Adam Abdallah, a friend of Adam Adam.  We had two children: Adam, who’s five years old, and Adak, a girl, who’s three.  I will not see them again.  Their father took them away to the farm with their father, and I couldn’t wait for them to come back when the slave retriever came to get me.  [The CSI team has passed along the details of Abuk’s children and their whereabouts to the slave retrievers.] It was night when we crossed the river Kiir into South Sudan.  We were afraid that if we did it during the day, we would be caught by the Arabs at the border.  But the South Sudanese army welcomed us on the other side.  They sang songs for us and asked us to sit with them. I’m so happy and excited to be in the south.  This is the land for black people. Narrative provided by Christian Solidarity International
global_05_local_6_shard_00002272_processed.jsonl/5816
Tag: Who Was The Father of Zephaniah The Prophet? Zephaniah The Prophet: Son of A Cushite Man Zephaniah The Prophet: Son of A Cushite Man The Shemites Zephaniah the prophet may have been the son of a Cushite man. We often overlook seemingly boring genealogies in the Bible, but sometimes they can be the most interesting part. One interesting find is located in the first verse of the book of Zephaniah: "The word of the LORD which came unto Zephaniah the son of Cushi, the son of Gedaliah, the son of Amariah, the son of Hizkiah, in the days of Josiah the son of Amon, king of Judah." - Zephaniah 1:1 At first glance there's nothing "special" about the verse, but when we look at the names, we find something odd. The name "Cushi" is an ETHNONYM: Ethnonym: An ethnic name ascribed to a people or group; the proper name by which a people or ethnic group is called or known. - Ethnonym: An ethnonym (from... Wait! Don't forget your free book. Click here to get your free book (sent via email) Pre-Slavery ChristianityIt Was Never The White Man's Religion Click Here To Get Your Free Book (sent via email)
global_05_local_6_shard_00002272_processed.jsonl/5830
How to See the Phony Awards Maybe you've seen us on social media and you want to check out Broadway's Next Hit Musical. Maybe you saw a show and want to come back again. Maybe you know that your sister woudl LOVE this show and want to get her tickets for her birthday. How do you know where we are? What should you be doing? How can you go to a show? Well, here's what you do: 1. Sign up for our newsletter, we'll let you know when we're near you. 2. Head to the tickets & info page of our website and see if we're coming your way. We are coming your way! Great then here's what you do: 1. Buy your tickets. 2. Go to the show. 3. Post about it using #phonyawards. We're aren't scheduled to come your way? Then do this: 1. If you're representing a person, school, theater, or community, contact our lovely booking agent, Marc Baylin. 2. If you're representing a company, contact producer Rob Schiffmann to talk more about booking us for a corporate event. See? Simple. See you soon!  Posted on January 11, 2016 .
global_05_local_6_shard_00002272_processed.jsonl/5855
Teenagers love watching movies and TV shows; they seek out content that shows a lot of sex scenes and adult content because their bodies would be changing, developing to be precise. Puberty hits most kids hard! They all will have built up sexual energy that cannot be released all that easily. Their hormones are in a constant state of change as well. Most teens do intend on waiting till marriage but that’s very rare nowadays. Read more
global_05_local_6_shard_00002272_processed.jsonl/5859
Deploying a Fast and Stable Wireless Mesh Network Chapter Description Ethernet Bridging Ethernet bridging allows you to connect remote wired networks to each other using the Ethernet port of the MAPs. A common use for Ethernet bridging is installing video cameras or street poles with the mesh APs. For bridging to work, every MAP and RAP in the path must have Ethernet bridging enabled. Prior to code Release 5.2, Ethernet bridging only allowed the extension of the Layer 2 network in which the MAPs resided. So if the APs had IP addresses in VLAN 5, for example, you could only extend VLAN 5 to the remote wired network. The 5.2 release allows you to bridge multiple VLANs. Like the earlier feature, every AP in the mesh path back to the RAP and including the RAP must support bridging the same VLANs as the MAP with the wired connection. Figure 15-10 illustrates this concept. Figure 15-10 Figure 15-10 VLAN Tagging Support Example Within a Mesh Network If you do not allow the desired VLANs on all the MAPs, then in the event of a failure within the mesh network it is possible to break the bridging feature if a MAP in the new path to the RAP does not support a particular VLAN. In Figure 15-10, if MAP1 were to go down and MAP3 changed its parent to MAP2, the Ethernet bridging on MAP3 would fail for VLAN 2 because MAP2 does not support bridging VLAN 2. After you have enabled Ethernet bridging support on your mesh APs you need to configure the VLAN tagging. Figure 15-11 shows the Ethernet configuration of an indoor RAP, and Figure 15-12 shows the same configuration on the indoor MAP. Figure 15-11 Figure 15-11 RAP VLAN Tagging Configuration Figure 15-12 Figure 15-12 MAP VLAN Tagging Configuration The RAP Ethernet port is configured as a trunk port with VLAN 20 set to Native and allowing VLAN 12. You can add more VLANs by entering the VLAN into the Trunk VLAN ID box and clicking Add. With the Ethernet port set to Trunk, the AP accepts both tagged and untagged packets. Any tagged packets for a VLAN that is not in the allowed list are dropped. Because the MAP is only bridging VLAN 12 in this case, the Ethernet port mode is Access. The AP tags the incoming untagged packet and forwards it to the RAP. Any tagged packets are dropped. Mesh APs use VLAN transparency to perform Ethernet bridging when extending the Layer 2 network. To allow multiple VLAN bridging/tagging, you must disable VLAN transparency (see Figure 15-13) under the Wireless>Mesh>Ethernet Bridging section on the controller. When VLAN transparency is enabled, VLAN processing does not occur. This assumes that all traffic is destined to and from the same VLAN with no 802.1 tagging. After you have disabled VLAN transparency, reboot the mesh APs for that setting to take effect. Figure 15-13 Figure 15-13 VLAN Transparency It is important to understand the traffic flow when using Ethernet bridging. Figure 15-14 shows the traffic flow for both wired and wireless clients within the mesh network with Ethernet bridging enabled. Figure 15-14 Figure 15-14 Ethernet Bridging Traffic Flow As you can see, with Ethernet bridging enabled, the traffic flow for wireless clients is unchanged. The wireless client packets are sent using LWAPP/CAPWAP data, which is sent through the encrypted backhaul to the controller. The controller then bridges that traffic to the wired network. The bridged wired client traffic, however, is bridged directly into the backhaul toward the RAP. The RAP then bridges the traffic directly onto the wired network. The wired bridged traffic is not sent back to the controller. Several guidelines exist in addition to disabling VLAN transparency that allow the correct VLANs on the APs when you use the Ethernet bridging and VLAN tagging feature in 5.2 code: • For security reasons, the Ethernet port on a mesh AP (RAP and MAP) is disabled by default. It is enabled by configuring Ethernet bridging on the MAP port. • Ethernet bridging must be enabled on all the APs in the mesh network to allow Ethernet VLAN tagging to operate. • VLAN mode must be set as non-VLAN transparent (global mesh parameter). VLAN transparent is enabled by default. To set as non-VLAN transparent, you must uncheck the VLAN transparent option in the global mesh parameters window. • VLAN configuration on a mesh AP is applied only if all the uplink MAPs are able to support that VLAN. • If uplink APs are not able to support the VLAN, the configuration is stored rather than applied. • VLAN tagging can be configured only on Ethernet interfaces. On 152x mesh APs, three of the four ports can be used as secondary Ethernet interfaces: port 0-PoE in, port 1-PoE out, and port 3- fiber. Port 2 - cable cannot be configured as a secondary Ethernet interface. In Ethernet VLAN tagging, port 0-PoE in on the RAP connects to the trunk port of the switch of the wired network. Port 1-PoE out on the MAP connects to external devices such as video cameras. • Backhaul interfaces (802.11a radios) act as primary Ethernet interfaces. Backhauls function as trunks in the network and carry all VLAN traffic between the wireless and wired network. No configuration of primary Ethernet interfaces is required. • The switch port in the wired network that is attached to the RAP (port 0-PoE in) must be configured to accept tagged packets on its trunk port. The RAP forwards all tagged packets received from the mesh network to the wired network. • No configuration is required to support VLAN tagging on an 802.11a backhaul Ethernet interface within the mesh network. This includes the RAP uplink Ethernet port. The required configuration happens automatically using a registration mechanism. Any configuration changes to an 802.11a Ethernet link acting as a backhaul are ignored and a warning results. When the Ethernet link no longer functions as a back-haul, the modified configuration is applied. • VLAN configuration is not allowed on a port-02-cable modem port of an 152x AP. VLANs can be configured on ports 0 (PoE-in), 1 (PoE-out), and 3 (fiber). • If you are bridging between two MAPs, enter the distance (mesh range) between the two APs that are bridging. (This is not applicable to applications in which you are forwarding traffic connected to the MAP or to the RAP access mode.) • Up to 16 VLANs are supported on each sector. Therefore, the cumulative number of VLANs supported by RAP's children (MAPs) cannot exceed 16. • Ethernet ports on APs function as either access or trunk ports within an Ethernet tagging deployment. • In Access mode, only untagged packets are accepted. All packets are tagged with a user-configured VLAN called access VLAN. For this mode to take effect, the global VLAN mode should be non-VLAN transparent. This option is used for applications in which information is collected from devices connected to the MAP, such as cameras or PCs, and then forwarded to the RAP. The RAP then applies tags and forwards traffic to a switch on the wired network. • Trunk mode requires the user to configure a native VLAN and an allowed VLAN list (no defaults). In this mode, both tagged and untagged packets are accepted. Untagged packets are always accepted and are tagged with the user-specified native VLAN. Tagged packets are accepted if they are tagged with a VLAN in the allowed VLAN list. For this mode to take effect, the global VLAN mode should be non-VLAN transparent. This option is used for bridging applications such as forwarding traffic between two MAPs residing in separate buildings within a campus. • The switch port connected to the RAP must be a trunk. The trunk port configuration on the switch and the RAP trunk port must match. • A configured VLAN on a MAP Ethernet port cannot function as a management VLAN. • The RAP must always connect to the native VLAN (ID 1) on a switch. The RAP's primary Ethernet interface is by default the native VLAN of 1. 5. Troubleshooting Mesh | Next Section Previous Section
global_05_local_6_shard_00002272_processed.jsonl/5864
LOVE Is Legal and I Forgot Everything Else I Was Going To Say I had planned to write something this weekend, so many ideas swirled around like fallen twigs clogging the sewer drains all over the Midwest causing all the flooding. What to write about that anyone else would care about, but my funnel of thought was BLOWN AWAY by SCOTUS' decision to lift every ban on same sex marriage across the United States.  Way to go, USA! Finally a step in the right direction, however long overdue. My social media feeds were more filled with rainbows than this weekend's Pride Parade. I really needed to see that, too, because Thursday we went to Brookfield Zoo's first ever Pride Day and got there late so we didn't get our rainbow fix. We saw one rainbow flag in the whole place. No signage. Nothing on their social media channels. Hmmmmmm.  Anyway huge step for Team Human. And don't tell anyone but I cried a little. Well, YOU read this and try not to cry.  And if that doesn't make you cry, don't tell me because that means you're dead inside. And my particular hollow insides are always attracted to those kinds of people, so let's just HIGH-FIVE finally having one damn good reason to be proud of our country. I hate that it took this long, but I am also thankful it's done. Let's move on to the next thing.  Like taking down the confederate flag everywhere that isn't a museum or a sad footnote in history books. Don't come at me with Southern nostalgia. We all know the creator of this flag wanted it to be the symbol of white supremacy and segregation. We all know that past and current hate groups literally use it as a symbol of hate. Racism and hate trump your nostalgia. Done. Next issue. Oh I love when things zip along. I'm thankful with each year of my life, along with losing muscle mass I gain the wisdom to make decisions more easily and move on. I'll take that trade. Especially since there isn't much I can do about it. Except exercise, but let's focus on GOOD things we're thankful for right now. We're getting End of Times rain and flooding in the Midwest right now, so the Silver Linings there are: It's not snow.  We're not in a drought.  We finished our basement repairs just in time. Not one drop of water got in!  Well, except for a little condensation from leaving the windows open. Did I mention we can OPEN the windows now?! Huzzah! So many good thankfuls I need to focus on right now. I thought we were going to be good work-wise for the summer, but decided the new family wasn't a good fit for us. It bummed me out for awhile, but it's done. It was the right decision. I need to focus on the positives and forget the rest.  I don't want to be negative, so I'll just say I like to keep my group small so we can do a lot of things: From walks, parks, games, arts and crafts, books, all kinds of things. This isn't just a business, this is my family. I like them busy, learning, having fun, getting TIRED. Certain people/situations make those things difficult. I can handle almost any kind of kid, but there are certain kinds of parents I just can't work with.  Kids need a little guidance, structure, to know what their boundaries are. They NEED boundaries. They will always have them, different everywhere they go, there is nothing wrong with that. Parents have to be strong, have to be in charge and make the rules. Otherwise it won't take long before kids walk all over you. Then when they get to school it takes them longer to get with the program.  They can't learn if all the time is spent getting them to catch up with the others in terms of sitting in one place, following very simple rules, eating real food in a calm manner. If you don't even want to try that? I can't fix it in a couple hours 3 days a week. Neither can teachers. You HAVE to start, however small. If you're not even willing to try? Have a nice day, somewhere else. I don't have the patience for that. Nor should I have to.  My kids will only be this age once. A couple dollars isn't worth making them wait around for other kids to get with the program. Parenting is hard enough. Keep your village tight with the right kinds of people. Like my sister says, get rid of the weeds before they poison the whole garden. I'm thankful for her guidance in this way, and that my husband is understanding. I'm sure he'll be bummed at the paychecks this costs us, but seeing his kids active and happy is worth it.  I'm forever thankful I have these options. That I live in a place where we won't go hungry, however tight the budget gets. I'm also thankful I was able to get some side work from a friend of mine to get us through the summer. Work at home has unique challenges. I'm glad I can do it and be home with my kids, no matter the ups, downs and WTF's! Soon enough they'll be teenagers and off with their friends and doing their own things and I'll be forever grateful for this time. That has to be more than 10! I have to bring my son his phone he left in my car and go enjoy our time to be together and go things before my house gets filled with kids and reasons why we can't.  Sorry if takes me awhile to hop around and answer comments lately. SUMMER! 1. It's a great day for the USA! Congrats to SCOTUS for doing the right thing. 1. Thank you. Only a decade behind you. One bigot tweeted his discontent by saying, ironically, "I guess I'm moving to Canada." Apparently not knowing same sex marriage has been legal there for quite some time. Funny how quite often people filled hate are so filled because of the GIANT GAPING HOLE left in their soul by not allowing intelligence inside. 2. For a change, I am SO PROUD of our country! Really, so proud of SCOTUS. And now I can just laugh at Scalia instead of wanting to go at him with a baseball bat. 1. YES. And our POTUS helped pick those judges, so there's that. Scalia, OMG. What a nut. No matter what he's done in his life he will forever be known as "Old Man Yells At Cloud" that meme is hilarious and so true. Sounds like it's time for him to retire. 3. I can understand why you would be careful about your groups - watching other peoples children while parenting your own can be tough. You want to have enough energy left for your own at the end of the day, and during the day, you want it to be a good thing for everyone. I tried it for a few years when my oldest was a toddler, I found it extremely tiring and I had a couple of really good kids I was watching. 1. YES. It IS extremely tiring. I'm 42 and they make me feel OLD by 5:00! It is nice sometimes to have other kids for my kids to play with, but yes, you want to find a good fit. Which seems to be hard these days! 2. I could be wrong, but I am assuming you meant to link to the TToT? Just wondered because I was waiting for your link to pop up before commenting and I haven't seen it there yet. 3. I haven't linked up yet. Laptop issues and timing. I do most things from my phone now and haven't yet tried posting a blog post or linking to something via phone. Does that even work?? 4. I don't know! I can handle doing some things from my phone, but I'm not savvy enough to do everything. 4. I know I have good Facebook friends because I didn't have to block or unfollow a single one for saying something stupid or ignorant immediately following that decision. Like you said, it's all about focusing on the positive. Even in the small things. 5. It was a wonderful day that day when SCOTUS made the ruling! I also agree with you regarding giving kids boundaries and rules! I know my two appreciate knowing that even though they may grumble about it sometimes! Yes, having kids and parents who are just not on the same page as you in terms of discipline is indeed annoying and it's better to mutually agree that it won't work out sooner rather than later! 1. Kids really do need limits. My son was a very high-energy kid, my father said he wouldn't watch him b/c he couldn't handle him. Yet his dad's GRANDMOTHER, who was in her late 70's could handle him just fine. Because she gave him limits and held him to them. He was better for her than anyone, b/c she wouldn't take his crapola.
global_05_local_6_shard_00002272_processed.jsonl/5865
Friday, March 15, 2013 No One Invited Me, But Here I Am There's a link party going on, and I wasn't invited. For those of you who don't know, a link party involves a bunch of bloggers writing on the same topic or general theme and posting a  link to their post on the same page. Each blogger is also supposed to invite other bloggers to join. Well, no one has invited me yet, so I'm just jumping in on the meme without anyone's permission. Okay, no one's permission is really needed if a blogger wants to write about the topic. In fact, having stumbled on to the link page, I'd be welcome to add my link if the page hadn't already closed before I got there. You know how I hate to be pushy. Really I do. I'll just quietly have my own little party without trying to actually join the link party. And yeah, the whole linky thing already closed, so there's that.  Oh, well. Here we go. 1. What were you doing 10 years ago? 10 years ago I was dating the wrong man. Fortunately I broke up with Mr. Wrong before I met My Hillbilly. The day before. Really. I'm going to credit God's providence with the timing. I broke up with Mr. Wrong on a Friday, and The Hillbilly introduced himself to me on Saturday. Repair Jill's necklace. Make jewelry that has been ordered. Take pictures of jewelry that has been made and get it up on Etsy (does that count as one or two?). White Swarovski pearls, mint green crystals, and silver-plated beads. Grade papers before I have to turn in report card grades on Thursday. After grading the papers, record the grades in the computer gradebook. How did teachers ever figure out grades before computers? I have parents who want a weekly update of their kid's grade. I can't imagine being able to do that without the computer. When I was in school, back when the world was young, we had to wait until the end of the quarter to find out our grades. 3. What are 5 snacks you enjoy? Ruffles brand potato chips and onion dip made from Lipton soup mix. All washed down with Pepsi Throwback Anything chocolate Those energy bars you buy in the bakery department at Costco. Little chocolate donuts. Get a lifetime pass to Disneyland and stay in the Grand Californian! Source: via Cynthia on Pinterest Buy a family compound so that we and all our children could live on the same piece of land, and the grandchildren could come visit whenever they wanted, but their parents could still have some privacy. big a millionaire? Just one million? I guess I'm finished. 5. Name some places you have lived. I'm a California girl all the way through. Born in San Diego Moved to Santa Ana, CA, 5 miles from Disneyland Manteca, CA (Don't worry. No one else ever heard of it either.) From there I drifted south for a while:      Ceres, CA     Turlock, CA      Hilmar, CA And then finally turned around to get closer to my mama in Manteca and ended up here in Salida, CA. Well, that's the end of the party for me. I hope you enjoyed getting to know a little more about me. Next week, I'm going to let The Hillbilly say a few things, but I'll be back too; don't you worry. How would you answer any of these questions? Where were you 10 years ago, anyway? post signature
global_05_local_6_shard_00002272_processed.jsonl/5866
A Song of Thanksgiving, Part 3: The Baby of the Family l & c oink When I was about 8 and she was about 3, my sister bit me in the stomach. Hard. Not enough to draw blood, but then, she was too smart for that, even at 3. And when I complained of this filial abuse, our mother replied, "You're the oldest; you're supposed to be above that." Score one for Liz. We had a rocky time of it for a long time. I was always older and wiser; she was always prettier and more adorable. Our paternal grandfather (the smiling gent in this snap) used to say, "You we had to chase around the room for a hug. Your sister? She was a big, fat, slobbering bundle of love." The bundle of love is taller than me now, and thinner, and still much, much prettier, dammit. But these things are not what make her remarkable. What is most extraordinary about my sister is her willingness to try...and try...and try again. To overcome the slings and arrows of outrageous fortune, to strike out past the safe but dreadful boundaries we were taught to live within, to bravely go where no Sexton or Weinrott has gone before: to the Truth, and the very heart of it. She hauled my sorry, 'fraidy ass to the hospital when I was too stubborn to admit I was dying. She was there without question when the other kind of love crumbled to bits in my hands. She is my rock; she is my family-family, or all that is left of it when the rest have died or worse, left us to twist slowly and alone in the wind. And so together we stumble and fumble towards a relationship that neither of us was raised to have but that both of us hope to achieve someday. Somehow, I have a feeling we will get there. xxx c