10,000 Matching Annotations
  1. Apr 2025
    1. In the design of the Xanadu computer system, a tumbler is an address of any range of content or link or a set of ranges or links. According to Gary Wolf in Wired, the idea of tumblers was that "the address would not only point the reader to the correct machine, it would also indicate the author of the document, the version of the document, the correct span of bytes, and the links associated with these bytes." Tumblers were created by Roger Gregory and Mark Miller.[1][2]

      TrailMarks can do alll and more that tumbler addressing wanted but still "keeping the links outside the file

      With Trailmarks not only ranges are defined but intentionall meaningfully named the name is given by the referring context

    1. Overview of Rights of Nature, of which Buen Vivir is an expression. parallels in indigenous cultures, religion and human rights law.

      Mentions a range of countries that have them, but doesn't mention legal entity it seems at first glance.

    1. Fa from faich (fa!) "behold!" or "see!" Fe from Fiadh (fee-a) "food"; Fi from fiú "good to eat" Fo from fogh (fó) "sufficient" and Fum from feum "hunger".

      I think I assumed the actual phrase was some kind of onomatopoeia...

      Let me tell you, this feels like one of the biggest intellectual discoveries of my life.

      I'm also pretty sure it's the fucking funniest so far.

    1. A counterweight is a weight that, by applying an opposite force, provides balance and stability of a mechanical system.[1] The purpose of a counterweight is to make lifting the load faster and more efficient, which saves energy and causes less wear and tear on the lifting machine.[2]

      Can be used to reduce the torque required from an actuator to lift a load.

    1. Bob Catley

      He also sings in songs such as In Quest for, The Story Ain't Over, Cry Just a Little, Lavender, and in the latest album Bring on the Night.

    1. The second generation of the Aston Martin Vanquish, a grand touring car, was produced between 2012 and 2018 by the British carmaker Aston Martin. It succeeded the DBS, resurrected the name of the 2001–2007 model, and was available as both a coupe and a convertible, the latter known as the Volante

      The second generation of the Aston Martin Vanquish, a grand touring car, was produced between 2012 and 2018 by the British carmaker Aston Martin. It succeeded the DBS, resurrected the name of the 2001–2007 model, and was available as both a coupe and a convertible, the latter known as the Volante.

    1. Aerospace and Electronic Systems Antennas and Propagation Broadcast Technology Circuits and Systems Communications Components Packaging, and Manufacturing Technology Computational Intelligence Computer Consumer Electronics Control Systems Dielectrics and Electrical Insulation Education Electromagnetic Compatibility Electron Devices Engineering in Medicine and Biology Geoscience and Remote Sensing Industrial Electronics Industry Applications Information Theory Instrumentation and Measurement Intelligent Transportation Systems Magnetics Nuclear and Plasma Sciences Oceanic Engineering Photonics Power and Energy Power Electronics Product Safety Engineering Professional Communication Reliability Robotics and Automation Signal Processing Social Implications of Technology Solid-State Circuits Systems, Man, and Cybernetics Technology Management Ultrasonics, Ferroelectrics, and Frequency Control Vehicular Technology

      The authors are many different organizations revolving around engineering coming together.

    2. Anyone can search IEEE Xplore and find bibliographic records and abstracts for its contents, while access to full-text documents may require an individual or institutional subscription

      The language described shows that any ordinary person who may not be involved with engineering could use this article/site.

    3. It contains material published mainly by the Institute of Electrical and Electronics Engineers (IEEE) and other partner publishers. IEEE Xplore provides web access to more than 5 million documents from publications in computer science, electrical engineering, electronics and allied fields.

      The audience is for people who are seeking documents and materials on the different engineering fields.

    4. .mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}"Excerpts from The IEEE LEADERSHIP WIRE" (PDF), IEEE Delhi News, 04 (1): 6, January 2004 ^ Roden, M S (Aug 2006). "IEEE Xplore 2.1". Choice. 43 (WEB X): 154. IEEE Xplore is essential for technical libraries serving electrical engineering students, faculty, and professionals. A comprehensive database of more than a million full-text documents with more than 25,000 pages added each month, it contains all IEEE journals, transactions, letters, magazines, conference proceedings, and standards beginning with 1988 and selected documents as early as 1952....With more and more libraries substituting electronic information for paper copies, this online resource has become a must for electrical engineering reference. ^ Wilde, Michelle (1 April 2016). "IEEE Xplore Digital Library". The Charleston Advisor. 17 (4): 24–30. doi:10.5260/chara.17.4.24. S2CID 64102919. The content of IEEE Xplore is technical in nature and will appeal to researchers working in technical fields, particularly electrical engineering, electronics, and computer science. ^ "IEEE Xplore - Overview". IEEE. Retrieved 25 July 2020. ^ Scardiui, Brandi (April 2015). "IEEE Xplore". Information Today. 32 (3): 23. IEEE adds about 25,000 new documents to Xplore each month. ^ Griffin, Luke (2002-01-01). "IEEE Xplore". Reference Reviews. 16 (4): 27–28. doi:10.1108/rr.2002.16.4.27.198. ISSN 0950-4125. ^ Griffin, Luke (August 2002). "IEEE Xplore. Version 1.3". Online Information Review. 26 (4): 285. doi:10.1108/oir.2002.26.4.285.12. ^ "IEEE Xplore Digital Library Subscriptions". IEEE. Retrieved 2020-09-04.

      The sources are cited using a bulleted format and not in a somewhat MLA style.

    5. Institute of Electrical and Electronics Engineers and Institution of Engineering and Technology

      The publisher/author is the Institute of Electrical and Electronics Engineers.

    6. IEEE Xplore (stylized as IEEE Xplore) digital library is a research database for discovery and access to journal articles, conference proceedings, technical standards, and related materials on computer science, electrical engineering and electronics, and allied fields.

      The purpose is to give people a place to discover and access journal materials related to the different engineering fields.

    1. In 2013 a hybrid open-access model was introduced providing authors whose papers have been accepted for publication with an open access publication option.

      The format and style of the article is straight to the point and doesn't really lead you on a massive paper trail.

    2. The articles are designed to be accessible to a general engineering audience and were made available free of charge, without a subscription, from the journal's website.

      The audience is for the general engineering audience.

    3. The articles are designed to be accessible to a general engineering audience and were made available free of charge, without a subscription, from the journal's website.

      The purpose is to give people who are in the engineering field or people who are not a chance to look at papers or articles on engineering free of charge.

    4. Institution of Electrical Engineers (IEE) Institution of Incorporated Engineers (IIE) Society of Engineers (UK) Journals Electronics Letters IET Software IET Information Security Awards IET Faraday Medal IET Achievement Medals IET Mountbatten Medal Presidents John Midwinter (2000) Michael Sterling (2002) Sir John Chisholm (2006) Sir Robin Saxby (2006) John Loughhead (2007) Christopher Snowden (2009) Andrew Hopper (2012) Naomi Wendy Climer (2015) Jeremy Watson (2016) Peter Bonfield (2019) Related Pinkerton Lecture Society of Professional Engineers UK Turing Talk

      The sources that are cited are listed in an order but not in any style and most are just sources to different websites/articles.

    5. It specializes in the rapid publication of short communications on all areas of electronic engineering, including optical, communication, and biomedical engineering, as well as electronic circuits and signal processing.

      The language used implies that only people who are interested or are in the field would know and want to know about this.

    6. John Midwinter (2000) Michael Sterling (2002) Sir John Chisholm (2006) Sir Robin Saxby (2006) John Loughhead (2007) Christopher Snowden (2009) Andrew Hopper (2012) Naomi Wendy Climer (2015) Jeremy Watson (2016) Peter Bonfield (2019)

      The authors of and creators of the Electronic Letters. The Presidents being a group effort to create the site.

  2. Mar 2025
    1. Amino

      Notice the very special valine, leucine, isoleucine group.

      • This group is connected to anabolic biosynthesis.
      • This group is connected to showing particular supplementation causes cancer (leucine?)
      • This group is in the a-ketoglutarate pathway (keto diet, which is stopping cancer and breaking up amyloids)
      • This group, via a-ketoglutarate pathway, is creating glutamine/glutamate which is, via glutamine fermentation, driving (providing ATP and tumor growth) cancer
      • This pathway is all happening in mitochondria and intimately forked to the TCA OXPHOS cycle.
      • Immediate thoughts: blocking OXPHOS could backup the TCA supply chain causing diversion to glutamine synth pathway in presence of carbohydrate. In absence of carbohydrate, glutamine synth is diverted to ketogenesis.
    1. SQL/PGQ reduces the difference in functionality between relational DBMSs and native graph DBMSs. Basically, this new feature makes it easier to query data in tables as if it were in a graph database, providing a possibly more intuitive alternative to writing complex join queries.
    1. Although core memory is obsolete, computer memory is still sometimes called "core" even though it is made of semiconductors, particularly by people who had worked with machines having actual core memory. The files that result from saving the entire contents of memory to disk for inspection, which is nowadays commonly performed automatically when a major error occurs in a computer program, are still called "core dumps". Algorithms which work on more data than the main memory can fit are likewise called out-of-core algorithms. Algorithms which only work inside the main memory are sometimes called in-core algorithms.

      This is how core dump called in history.

    1. It is too complicated (the spec is several hundred pages in a very technical language), so it is hard to use by non-experts—but many non-experts need schemas to describe data formats

      an abomination

    1. John Keats used the phrase only briefly in a private letter to his brothers George and Thomas on 22 December 1817, and it became known only after his correspondence was collected and published. Keats described a conversation he had been engaged in a few days previously:[1] I had not a dispute but a disquisition with Dilke, upon various subjects; several things dove-tailed in my mind, and at once it struck me what quality went to form a Man of Achievement, especially in Literature, and which Shakespeare possessed so enormously—I mean Negative Capability, that is, when a man is capable of being in uncertainties, mysteries, doubts, without any irritable reaching after fact and reason—Coleridge, for instance, would let go by a fine isolated verisimilitude caught from the Penetralium of mystery, from being incapable of remaining content with half-knowledge. This pursued through volumes would perhaps take us no further than this, that with a great poet the sense of Beauty overcomes every other consideration, or rather obliterates all consideration.[2]

      content with half-knowledge! no uneasiness about first-principles...

    1. grain-oriented so it has a square hysteresis loop and much lower core losses, for better performance in transformers

      Wouldn't you not want a hysteresis loop to have a good transformer?

  3. Feb 2025
    1. The Roswell incident is a conspiracy theory that alleges that debris from a United States Army Air Forces balloon (pictured) recovered in 1947 near Roswell, New Mexico, was part of a crashed extraterrestrial spacecraft. The debris was from the top-secret Project Mogul, which used high-altitude balloons to detect nuclear tests. Roswell Army Air Field personnel, unaware of Mogul, gathered the material

      Today wikipedia day

    1. The Scotch yoke (also known as slotted link mechanism[1]) is a reciprocating motion mechanism, converting the linear motion of a slider into rotational motion, or vice versa.

      The piston or other reciprocating part is directly coupled to a sliding yoke with a slot that engages a pin on the rotating part.

      • Comparison of web annotation systems
        • [[Memex]]
          • Desktop
            • UI looks good
            • Live annotations on the site
            • Multiple notes on page
            • AI integration
            • Annotations for videos
          • Mobile
            • Annotations through the app
              • The app seems to keep the integrity of the original content (no content loss)
            • Buggy text input widget
          • Syncing
            • Require Readwise
              • Not bi-directional!
              • Unmodifiable log-based format
        • [[Hypothesis]]
          • Desktop
          • Mobile
            • Bookmarklet is a good option to bypass the need for extension
            • Proxy is also an option
            • Annotations on the original site (no content loss)
            • No annota
          • Syncing
            • Through Readwise
              • Nice format
              • Full control over frontmatter
            • Obsidian plugin
              • No control over frontmatter
        • [[Readwise]]
          • Desktop
            • UI looks old and unmaintained
            • Live annotations on the site
            • Multiple annotation on site can only be achieved by highlights
              • Only single note per page without highlighting
          • Mobile
            • Annotations through the app
              • Some content is lost when importing to the app
            • Text-to-speech
          • Syncing
            • Through Readwise
              • Not bi-directional!
              • Cleaner format then memex
    1. aortic bodies, aortic arch

      Inferior ganglion of vagus nerve

      IFN, expressed from viral detection response, activates intracellular anti viral mechanism pathways, including OSA > Ribonuclease ANK(ANKH)/pyrophosphate. ANKH (ANKYLOSIS, ie ankylosis spondylosis [autoimmune, macular degeneration, arthritis]) is membrane protein changed regulating pyrophosphate levels intra and extra. Pyrophosphate is an anion from converted ATP and is a CALCIUM AND METAL ION CHELATOR (CA+ SIGNALING DYSFUNCTION). IGVN is a high expression site of ANKH:

      • Aortic bodies/arch = happy hypoxia, POTS, tachycardia
      • epiglottitis
      • ear pain, ringing, pigmentation, facial nerve hives, ocular inflammation
      • tonsil swimming, coughing, hoarse
      • SOLITARY NUCLEUS = fear response, anxiety, acrophobia
      • gasping, nausea
      • axial lymph node
      • urinary bladder = frequent urination (as common in CFS)
      • successful results of ganglion block and vagal stimulation

      Google Gemini Clinical Significance: * Damage to the inferior ganglion can result in: * Dysphagia (difficulty swallowing) * Hoarseness * Heart palpitations * Nausea and vomiting * May be involved in certain neurological disorders, such as glossopharyngeal neuralgia and vagus nerve palsy

      ANKH Sites (Wikipedia): * IGVN = above * Tibia = shin splints * Parotid = heavy jaw line * Pons = hypersomnia * right ventricle = enlargement/swelling * Skeletal muscle tissue of biceps brachii = my crazy bicep tendon (spondylosis) pain issue * subthalamic nucleus = hypersomnia, anxiety, fear response, gasping, hydrocephalus * synovial joint = juvenile onset arthritis, myopia/astigmatism, macular degeneration, hydrocephalus * superior vestibular nucleus = see above * Skeletal muscle tissue of rectus abdominis = side stitch

      IFN/OSA/Ribonuclease:

      Destroys all mRNA, viral and host, and prevents cell molecular export and cellular metabolism.

    1. The transformation mapping method is applied to exhibit distinct boundaries between incoming and outgoing data. The data flow diagrams allocate control input, processing and output along three separate modules.
    1. Cremation dates from at least 17,000 years ago[2][3] in the archaeological record, with the Mungo Lady, the remains of a partly cremated body found at Lake Mungo, Australia.

      Seems to be a very common practice in other cultures. some cultures may have practiced cremation longer than the ancient Indians?

    2. In the Middle East and Europe, both burial and cremation are evident in the archaeological record in the Neolithic era.

      Shows us that it was a widespread practice which dates back to times were religion were more important in the process of the dead.

    3. Cremation may serve as a funeral or post-funeral rite and as an alternative to burial. In some countries, including India, Nepal, and Syria, cremation on an open-air pyre is an ancient tradition. Starting in the 19th century, cremation was introduced or reintroduced into other parts of the world.

      We have learned a good amount about this in this class.

    1. Only effect while the token economy is active and no effect once stopped: in this case the token economy is functioning as a prosthesis (like a wheelchair); it does not permanently help the patient once terminated but is necessary to maintain normal functioning;

      Consider this. How many people pay for cure and get a prosthetics? Almost all tragedy tells this story.

    2. Tokens have no intrinsic value, but can be exchanged for other valued reinforcing events: back-up reinforcers, which act as rewards.

      My first thought was crypto currency, but this maps to likes and followers, even money itself. Followers and likes are interesting because they are not single use. £40,000 will get you a nice car, once. But 40,000 followers can get you a brand deal multiple times over. How interesting is that? I guess the trade of is that not everyones followers are equal (some demographics are in more demand than others)

    3. Rewarding behavior could increase the extrinsic motivation and at the same time decrease the intrinsic motivation for activities.

      Think about social media. No wonder sales teams have to constantly be roused up and consume drugs. When the ratio of extrinsic to intrinsic motivation skews too far to the former you end up unfulfilled and materialistic. You can't find the motivation so you set up a "system" of rewards to help you muster up the strength to do basic things - and then, of course, you fail. How else to deal with the discomfort of failure but with more distracting externals.

      But what of motivators like sex and outrage, are those not internal motivators? I suppose they are roused up by externals.

    1. XXI of the constitution contained the transitional provisions. Articles 379 and 394 of Part XXI which contained provisions for provisional parliament and other articles which contained provisions like citizenship, came into force on 26 November 1949, the date on which the constitution was adopted

      these provisions related to functioning of democracy came into force earlier than others

    1. Wikipedia is a free encyclopedia, written collaboratively by the people who use it. Since 2001, it has grown rapidly to become the world's largest reference website, with 6.9 million articles in English attracting billions

      awsedrtfuvyibunjkl

  4. Jan 2025
    1. The use of resolvable IRIs allows RDF documents containing more information to be transcluded which enables clients to discover new data by simply following those links; this principle is known as 'Follow Your Nose'.
    1. A Uniform Resource Identifier (URI), formerly Universal Resource Identifier, is a unique sequence of characters that identifies an abstract or physical resource,[1] such as resources on a webpage, mail address, phone number,[2] books, real-world objects such as people and places, concepts.[3]

      Incoherent concept, just like URL itself

      identity tied to location is no identity whatsoever

      It may e uniform but most certainly not universal

      Let's face it location addressing was just a broken concept at a conceptual level

    1. The Moot was a discussion group concerned with education, social reconstruction, and the role of culture in society.

      Its Mooter than ever

    1. The Disney Renaissance was prompted by competition with Don Bluth's animated productions, along with the evolution of overseas animation, most notably the Studio Ghibli anime productions from Japanese animator Hayao Miyazaki.[16] His Lupin the Third film adaptation of the animated TV series based on the Monkey Punch comics, Castle of Cagliostro (1979), influenced the climax of The Great Mouse Detective, which in turn paved the way for the Disney Renaissance.

      One of the key ingredients of scenius! Competition!!

    1. Ontology is the philosophical study of being. It is traditionally understood as the subdiscipline of metaphysics focused on the most general features of reality.

      Ontology definition

  5. Dec 2024
    1. The Grecian bend was a term applied first to a stooped posture[1] which became fashionable c. 1820,[2] named after the gracefully-inclined figures seen in the art of ancient Greece.

      what on earth

    1. Billy Possum is a type of stuffed toy depicting an opossum. Designed to be the replacement for the Teddy bear after Theodore Roosevelt vacated the office of President of the United States in 1909, the toy's popularity waned quickly, with the trend having lost all momentum by Christmas of that year.

      We were robbed of greatness.

    1. converges uniformly with limit f : E → X if and only if

      For functions whose range is uniform space, the function then thus be defined as uniform space: $$ (f_1 \times f_2) (X) \subseteq U $$ Where \(U\) is entourage. We can apply Moore-Osgood Theorem to such function \( f(x, y) \) if \(f_x \rightrightarrows f\)

    1. Thinking, Fast and Slow is a 2011 popular science book by psychologist Daniel Kahneman. The book's main thesis is a differentiation between two modes of thought: "System 1" is fast, instinctive and emotional; "System 2" is slower, more deliberative, and more logical.

      for - similar to - - Daniel Kahnaman's system 1 fast, instinctive, emotional and system 2 slow, deliberative, logical is similar to - Ian McGilhirist's left brain, right brain

    1. Here's what ChatGPT shown me as summary of their Privacy policy: Analytics and Third-Party Services They use third-party analytics tools (e.g., Google Analytics) to understand how users interact with their services. These tools may collect anonymized or aggregated data, such as IP addresses or browsing behavior, but not personally identifiable information unless you've explicitly consented. Cookies and Tracking: Their cookies track usage patterns on their platform, which could include data about visited pages, clicks, or time spent on the site. However, this data is anonymized unless tied to your account or explicitly authorized.

      ^^ let's just trust em, right? or no? Ping me if that ended up being a no-no as I decide to continue using the app.

    1. a wild man created by the gods to stop Gilgamesh from oppressing the people of Uruk. After Enkidu becomes civilized through sexual initiation with Shamhat, he travels to Uruk, where he challenges Gilgamesh to a test of strength.

      the gender dynamics emerge with Gilgamesh's relationships with Enkidu, once he has his relations with Shamhat, there's a dichotomy between masculinity and feminity which is characterised by sexual seduction plus the ability to "tame" a "wild" man. which gives me the image that the gender roles here are tied to the feminine playing a role in bringing men into social and moral order.

    1. Trust Service Criteria Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    2. Trust Service Criteria[edit] Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC. Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy. Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed. SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1] Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication

      Trust Service Criteria Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    3. Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    4. Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC. Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy. Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed. SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1] Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

      Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    5. System and Organization Controls (SOC; also sometimes referred to as service organizations controls) as defined by the American Institute of Certified Public Accountants (AICPA), is the name of a suite of reports produced during an audit. It is intended for use by service organizations (organizations that provide information systems as a service to other organizations) to issue validated reports of internal controls over those information systems to the users of those services. The reports focus on controls grouped into five categories called Trust Service Criteria.[1] The Trust Services Criteria were established by The AICPA through its Assurance Services Executive Committee (ASEC) in 2017 (2017 TSC). These control criteria are to be used by the practitioner/examiner (Certified Public Accountant, CPA) in attestation or consulting engagements to evaluate and report on controls of information systems offered as a service. The engagements can be done on an entity wide, subsidiary, division, operating unit, product line or functional area basis. The Trust Services Criteria were modeled in conformity to The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control - Integrated Framework (COSO Framework). In addition, the Trust Services Criteria can be mapped to NIST SP 800 - 53 criteria and to EU General Data Protection Regulation (GDPR) Articles. The AICPA auditing standard Statement on Standards for Attestation Engagements no. 18 (SSAE 18), section 320, "Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting", defines two levels of reporting, type 1 and type 2. Additional AICPA guidance materials specify three types of reporting: SOC 1, SOC 2, and SOC 3.

      System and Organization Controls (SOC; also sometimes referred to as service organizations controls) as defined by the American Institute of Certified Public Accountants (AICPA), is the name of a suite of reports produced during an audit. It is intended for use by service organizations (organizations that provide information systems as a service to other organizations) to issue validated reports of internal controls over those information systems to the users of those services. The reports focus on controls grouped into five categories called Trust Service Criteria.[1] The Trust Services Criteria were established by The AICPA through its Assurance Services Executive Committee (ASEC) in 2017 (2017 TSC). These control criteria are to be used by the practitioner/examiner (Certified Public Accountant, CPA) in attestation or consulting engagements to evaluate and report on controls of information systems offered as a service. The engagements can be done on an entity wide, subsidiary, division, operating unit, product line or functional area basis. The Trust Services Criteria were modeled in conformity to The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control - Integrated Framework (COSO Framework). In addition, the Trust Services Criteria can be mapped to NIST SP 800 - 53 criteria and to EU General Data Protection Regulation (GDPR) Articles. The AICPA auditing standard Statement on Standards for Attestation Engagements no. 18 (SSAE 18), section 320, "Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting", defines two levels of reporting, type 1 and type 2. Additional AICPA guidance materials specify three types of reporting: SOC 1, SOC 2, and SOC 3.

    1. "self-replicating programs", "self-reproducing programs", and "self-copying programs".

      It is not self-replication that is the goal but self-creation

    1. In hell, those punished are Christians who have erred. While some usual sins such as usury, adultery, and women having sex before marriage are condemned, the Apocalypse of Paul goes beyond this. Various "bad" Christians are made to stand in a river of fire, including Christians who left the church and argued; Christians who took the Eucharist but then fornicated; and Christians who "slandered" other Christians while in church. Christians who did not trust in the Lord are buried in deep pits. Christians who failed to pay attention as the word of God was read in Church are forced to gnaw on their tongues eternally. Christians who commit infanticide are torn to shreds by beasts eternally while also on fire. Church leaders and theologians who preached incorrect doctrine or were simply incompetent in their positions are punished with torture. For example, a church reader who failed to implement the word of God he read during church services in his own life is thrown into a river of fire while an angel slashes his lips and tongue with a razor. Unholy nuns are thrown into a furnace of fire along with a bishop as punishment (in one Latin manuscript, likely a later addition). Failed ascetics are also punished; those who ended their fasts before their appointed time are taunted by abundant food and water just out of reach as they lie parched and starving in hell. Those who wore the habit of a monk or nun while failing to show charity are given new habits of pitch and sulphur, serpents are wrapped around their necks, and fiery angels physically beat them. The worst punishments ("seven times worse" than those described so far) are reserved for theologically deviant Christians, such as those who believe that Jesus's Second Coming will be a "spiritual" resurrection rather than a "physical" resurrection, or who deny that Jesus came in the flesh (docetism). The exact nature of their punishment is left to the imagination; an awful stench rises from a sealed well that hints of their torment below.[6] One theological oddity is that the text portrays Christians, the angels, and Paul as more merciful than God. Paul expresses pity for those suffering in Hell, but Jesus rebukes him and says that everyone in Hell truly deserves their punishment. The Archangel Michael says he prays continuously for Christians while they are alive, and weeps for the torments the failed Christians endure after it is too late. The twenty-four elders on thrones (presumably the 12 apostles and the 12 patriarchs) as well as the four beasts described in God's throne room in the Book of Revelation also make intercession for the inhabitants of hell. The Christian friends and family of those in Hell also make prayers for the dead that their suffering might be lessened. In responses to the pleas of Paul (or the Virgin Mary in the Apocalypse of the Virgin), Michael, the elders, and the living Christians on Earth, Jesus agrees to release those in hell from their suffering on the day of his resurrection—presumably every Sunday. Manuscripts include variants of the ending: A Coptic manuscript instead describes it as specifically Easter, albeit with a 50-day period afterward, possibly in addition to the Sunday off; the Greek Apocalypse of the Virgin specifically excludes damned Jews from this mercy; and an Armenian manuscript has all sinners released from hell unconditionally.[6][8][4]

      In hell, those punished are Christians who have erred. While some usual sins such as usury, adultery, and women having sex before marriage are condemned, the Apocalypse of Paul goes beyond this. Various "bad" Christians are made to stand in a river of fire, including Christians who left the church and argued; Christians who took the Eucharist but then fornicated; and Christians who "slandered" other Christians while in church. Christians who did not trust in the Lord are buried in deep pits. Christians who failed to pay attention as the word of God was read in Church are forced to gnaw on their tongues eternally. Christians who commit infanticide are torn to shreds by beasts eternally while also on fire. Church leaders and theologians who preached incorrect doctrine or were simply incompetent in their positions are punished with torture. For example, a church reader who failed to implement the word of God he read during church services in his own life is thrown into a river of fire while an angel slashes his lips and tongue with a razor. Unholy nuns are thrown into a furnace of fire along with a bishop as punishment (in one Latin manuscript, likely a later addition). Failed ascetics are also punished; those who ended their fasts before their appointed time are taunted by abundant food and water just out of reach as they lie parched and starving in hell. Those who wore the habit of a monk or nun while failing to show charity are given new habits of pitch and sulphur, serpents are wrapped around their necks, and fiery angels physically beat them. The worst punishments ("seven times worse" than those described so far) are reserved for theologically deviant Christians, such as those who believe that Jesus's Second Coming will be a "spiritual" resurrection rather than a "physical" resurrection, or who deny that Jesus came in the flesh (docetism). The exact nature of their punishment is left to the imagination; an awful stench rises from a sealed well that hints of their torment below.[6]

      One theological oddity is that the text portrays Christians, the angels, and Paul as more merciful than God. Paul expresses pity for those suffering in Hell, but Jesus rebukes him and says that everyone in Hell truly deserves their punishment. The Archangel Michael says he prays continuously for Christians while they are alive, and weeps for the torments the failed Christians endure after it is too late. The twenty-four elders on thrones (presumably the 12 apostles and the 12 patriarchs) as well as the four beasts described in God's throne room in the Book of Revelation also make intercession for the inhabitants of hell. The Christian friends and family of those in Hell also make prayers for the dead that their suffering might be lessened. In responses to the pleas of Paul (or the Virgin Mary in the Apocalypse of the Virgin), Michael, the elders, and the living Christians on Earth, Jesus agrees to release those in hell from their suffering on the day of his resurrection—presumably every Sunday. Manuscripts include variants of the ending: A Coptic manuscript instead describes it as specifically Easter, albeit with a 50-day period afterward, possibly in addition to the Sunday off; the Greek Apocalypse of the Virgin specifically excludes damned Jews from this mercy; and an Armenian manuscript has all sinners released from hell unconditionally.[6][8][4]

    1. After an initial ascension, Beatrice guides Dante through the nine celestial spheres of Heaven. These are concentric and spherical, as in Aristotelian and Ptolemaic cosmology. While the structures of the Inferno and Purgatorio were based on different classifications of sin, the structure of the Paradiso is based on the four cardinal virtues and the three theological virtues. The seven lowest spheres of Heaven deal solely with the cardinal virtues of Prudence, Fortitude, Justice and Temperance. The first three spheres involve a deficiency of one of the cardinal virtues – the Moon, containing the inconstant, whose vows to God waned as the moon and thus lack fortitude; Mercury, containing the ambitious, who were virtuous for glory and thus lacked justice; and Venus, containing the lovers, whose love was directed towards another than God and thus lacked temperance. The final four incidentally are positive examples of the cardinal virtues, all led on by the Sun, containing the prudent, whose wisdom lighted the way for the other virtues, to which the others are bound (constituting a category on its own). Mars contains the men of fortitude who died in the cause of Christianity; Jupiter contains the kings of justice; and Saturn contains the temperate, the monks. The seven subdivided into three are raised further by two more categories: the eighth sphere of the fixed stars that contain those who achieved the theological virtues of faith, hope, and love, and represent the Church Triumphant – the total perfection of humanity, cleansed of all the sins and carrying all the virtues of heaven; and the ninth circle, or Primum Mobile (corresponding to the geocentricism of medieval astronomy), which contains the angels, creatures never poisoned by original sin. Topping them all is the Empyrean, which contains the essence of God, completing the nine-fold division to ten. Dante meets and converses with several great saints of the Church, including Thomas Aquinas, Bonaventure, Saint Peter, and St. John. Near the end, Beatrice departs and Bernard of Clairvaux takes over as the guide.[29] The Paradiso is more theological in nature than the Inferno and the Purgatorio. However, Dante admits that the vision of heaven he receives is merely the one his human eyes permit him to see, and thus Dante's personal vision. The Divine Comedy finishes with Dante seeing the Triune God. In a flash of understanding that he cannot express, Dante finally understands the mystery of Christ's divinity and humanity, and his soul becomes aligned with God's love:[30] But already my desire and my will were being turned like a wheel, all at one speed, by the Love which moves the sun and the other stars.[31]

      After an initial ascension, Beatrice guides Dante through the nine celestial spheres of Heaven. These are concentric and spherical, as in Aristotelian and Ptolemaic cosmology. While the structures of the Inferno and Purgatorio were based on different classifications of sin, the structure of the Paradiso is based on the four cardinal virtues and the three theological virtues.

      The seven lowest spheres of Heaven deal solely with the cardinal virtues of Prudence, Fortitude, Justice and Temperance. The first three spheres involve a deficiency of one of the cardinal virtues – the Moon, containing the inconstant, whose vows to God waned as the moon and thus lack fortitude; Mercury, containing the ambitious, who were virtuous for glory and thus lacked justice; and Venus, containing the lovers, whose love was directed towards another than God and thus lacked temperance. The final four incidentally are positive examples of the cardinal virtues, all led on by the Sun, containing the prudent, whose wisdom lighted the way for the other virtues, to which the others are bound (constituting a category on its own). Mars contains the men of fortitude who died in the cause of Christianity; Jupiter contains the kings of justice; and Saturn contains the temperate, the monks. The seven subdivided into three are raised further by two more categories: the eighth sphere of the fixed stars that contain those who achieved the theological virtues of faith, hope, and love, and represent the Church Triumphant – the total perfection of humanity, cleansed of all the sins and carrying all the virtues of heaven; and the ninth circle, or Primum Mobile (corresponding to the geocentricism of medieval astronomy), which contains the angels, creatures never poisoned by original sin. Topping them all is the Empyrean, which contains the essence of God, completing the nine-fold division to ten.

      Dante meets and converses with several great saints of the Church, including Thomas Aquinas, Bonaventure, Saint Peter, and St. John. Near the end, Beatrice departs and Bernard of Clairvaux takes over as the guide.[29] The Paradiso is more theological in nature than the Inferno and the Purgatorio. However, Dante admits that the vision of heaven he receives is merely the one his human eyes permit him to see, and thus Dante's personal vision.

      The Divine Comedy finishes with Dante seeing the Triune God. In a flash of understanding that he cannot express, Dante finally understands the mystery of Christ's divinity and humanity, and his soul becomes aligned with God's love:[30]

      But already my desire and my will were being turned like a wheel, all at one speed, by the Love which moves the sun and the other stars.[31]

    2. The Divine Comedy is composed of 14,233 lines that are divided into three cantiche (singular cantica) – Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Paradise) – each consisting of 33 cantos (Italian plural canti). An initial canto, serving as an introduction to the poem and generally considered to be part of the first cantica, brings the total number of cantos to 100. It is generally accepted, however, that the first two cantos serve as a unitary prologue to the entire epic, and that the opening two cantos of each cantica serve as prologues to each of the three cantiche.[7][8][9] The number three is prominent in the work, represented in part by the number of cantiche and their lengths. Additionally, the verse scheme used, terza rima, is hendecasyllabic (lines of eleven syllables), with the lines composing tercets according to the rhyme scheme ABA BCB CDC DED ...[10] The total number of syllables in each tercet is thus 33, the same as the number of cantos in each cantica. Written in the first person, the poem tells of Dante's journey through the three realms of the dead, lasting from the night before Good Friday to the Wednesday after Easter in the spring of 1300. The Roman poet Virgil guides him through Hell and Purgatory; Beatrice, Dante's ideal woman, guides him through Heaven.[11] Beatrice was a Florentine woman he had met in childhood and admired from afar in the mode of the then-fashionable courtly love tradition, which is highlighted in Dante's earlier work La Vita Nuova.[12] The Cistercian abbot Bernard of Clairvaux guides Dante through the last three cantos.[13] .mw-parser-output .tmulti .multiimageinner{display:flex;flex-direction:column}.mw-parser-output .tmulti .trow{display:flex;flex-direction:row;clear:left;flex-wrap:wrap;width:100%;box-sizing:border-box}.mw-parser-output .tmulti .tsingle{margin:1px;float:left}.mw-parser-output .tmulti .theader{clear:both;font-weight:bold;text-align:center;align-self:center;background-color:transparent;width:100%}.mw-parser-output .tmulti .thumbcaption{background-color:transparent}.mw-parser-output .tmulti .text-align-left{text-align:left}.mw-parser-output .tmulti .text-align-right{text-align:right}.mw-parser-output .tmulti .text-align-center{text-align:center}@media all and (max-width:720px){.mw-parser-output .tmulti .thumbinner{width:100%!important;box-sizing:border-box;max-width:none!important;align-items:center}.mw-parser-output .tmulti .trow{justify-content:center}.mw-parser-output .tmulti .tsingle{float:none!important;max-width:100%!important;box-sizing:border-box;text-align:center}.mw-parser-output .tmulti .tsingle .thumbcaption{text-align:left}.mw-parser-output .tmulti .trow>.thumbcaption{text-align:center}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .tmulti .multiimageinner img{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .tmulti .multiimageinner img{background-color:white}}Dante's guides in the poemVirgilBeatriceSaint Bernard The structure of the three realms follows a common numerical pattern of 9 plus 1, for a total of 10. There are nine circles of the Inferno, followed by Lucifer contained at its bottom; nine rings of Mount Purgatory, followed by the Garden of Eden crowning its summit; and the nine celestial bodies of Paradiso, followed by the Empyrean containing the very essence of God. Within each group of nine, seven elements correspond to a specific moral scheme, subdivided into three subcategories, while two others of greater particularity are added to total nine. For example, the seven deadly sins that are cleansed in Purgatory are joined by special realms for the late repentant and the excommunicated. The core seven sins within Purgatory correspond to a moral scheme of love perverted, subdivided into three groups corresponding to excessive love (Lust, Gluttony, Greed), deficient love (Sloth), and malicious love (Wrath, Envy, Pride).[14] In central Italy's political struggle between Guelphs and Ghibellines, Dante was part of the Guelphs, who in general favoured the papacy over the Holy Roman Emperor. Florence's Guelphs split into factions around 1300 – the White Guelphs and the Black Guelphs. Dante was among the White Guelphs who were exiled in 1302 by the Lord-Mayor Cante de' Gabrielli di Gubbio, after troops under Charles of Valois entered the city, at the request of Pope Boniface VIII, who supported the Black Guelphs. This exile, which lasted the rest of Dante's life, shows its influence in many parts of the Comedy, from prophecies of Dante's exile to Dante's views of politics, to the eternal damnation of some of his opponents.[15] The last word in each of the three cantiche is stelle ("stars").

      The Divine Comedy is composed of 14,233 lines that are divided into three cantiche (singular cantica) – Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Paradise) – each consisting of 33 cantos (Italian plural canti). An initial canto, serving as an introduction to the poem and generally considered to be part of the first cantica, brings the total number of cantos to 100. It is generally accepted, however, that the first two cantos serve as a unitary prologue to the entire epic, and that the opening two cantos of each cantica serve as prologues to each of the three cantiche.[7][8][9]

      The number three is prominent in the work, represented in part by the number of cantiche and their lengths. Additionally, the verse scheme used, terza rima, is hendecasyllabic (lines of eleven syllables), with the lines composing tercets according to the rhyme scheme ABA BCB CDC DED ...[10] The total number of syllables in each tercet is thus 33, the same as the number of cantos in each cantica.

      Written in the first person, the poem tells of Dante's journey through the three realms of the dead, lasting from the night before Good Friday to the Wednesday after Easter in the spring of 1300. The Roman poet Virgil guides him through Hell and Purgatory; Beatrice, Dante's ideal woman, guides him through Heaven.[11] Beatrice was a Florentine woman he had met in childhood and admired from afar in the mode of the then-fashionable courtly love tradition, which is highlighted in Dante's earlier work La Vita Nuova.[12] The Cistercian abbot Bernard of Clairvaux guides Dante through the last three cantos.[13]

      Dante's guides in the poem Virgil Virgil

      Beatrice

      Saint Bernard The structure of the three realms follows a common numerical pattern of 9 plus 1, for a total of 10. There are nine circles of the Inferno, followed by Lucifer contained at its bottom; nine rings of Mount Purgatory, followed by the Garden of Eden crowning its summit; and the nine celestial bodies of Paradiso, followed by the Empyrean containing the very essence of God. Within each group of nine, seven elements correspond to a specific moral scheme, subdivided into three subcategories, while two others of greater particularity are added to total nine. For example, the seven deadly sins that are cleansed in Purgatory are joined by special realms for the late repentant and the excommunicated. The core seven sins within Purgatory correspond to a moral scheme of love perverted, subdivided into three groups corresponding to excessive love (Lust, Gluttony, Greed), deficient love (Sloth), and malicious love (Wrath, Envy, Pride).[14]

      In central Italy's political struggle between Guelphs and Ghibellines, Dante was part of the Guelphs, who in general favoured the papacy over the Holy Roman Emperor. Florence's Guelphs split into factions around 1300 – the White Guelphs and the Black Guelphs. Dante was among the White Guelphs who were exiled in 1302 by the Lord-Mayor Cante de' Gabrielli di Gubbio, after troops under Charles of Valois entered the city, at the request of Pope Boniface VIII, who supported the Black Guelphs. This exile, which lasted the rest of Dante's life, shows its influence in many parts of the Comedy, from prophecies of Dante's exile to Dante's views of politics, to the eternal damnation of some of his opponents.[15]

      The last word in each of the three cantiche is stelle ("stars").

    1. Melanin may also be able to help the fungus metabolize radiation, but more evidence and research is still needed.[1]

      Would be interesting to see hypotheses as to the mechanism in which energy could be harvested by melanin and any experiments that could test it?

    1. Panentheism (/pæˈnɛnθiɪzəm/;[1] "all in God", from the Greek πᾶν, pân, 'all', ἐν, en, 'in' and Θεός, Theós, 'God')[2] is the belief that the divine intersects every part of the universe and also extends beyond space and time.

      penentheism

      al in god

    1. Get out of here with your crazy ideas." Nelson took this as permission to develop the idea independently.

      crazy ideas develop independently

    1. To become conscious of their gains from slavery, segregation, and voter suppression would shatter that Dream.

      people experiencing racism, sexism, violence cannot drink the koolaid. but are there enough of them for revolution?

    2. He contrasts these experiences with neat suburban life, which he calls "the Dream" because it is an exclusionary fantasy for White people who are enabled by, yet largely ignorant of, their history of privilege and suppression

      how can you have both of these completely seperate groups, living in the same nation, where all their votes are equal? how can a society encompass all of them equally?

    3. Coates's position is that absent the religious rhetoric of "hope and dreams and faith and progress," only systems of White supremacy remain along with no real evidence that those systems are bound to change.[

      is religion the koolaid? kammas kammas says religion creates better citizens is religion both a pacifying agent and an agent that works agasint the state?

    1. British engineer John Hoyte led an expedition that tried to reenact aspects of Hannibal's crossing of the Alps during the Second Punic War in 218 BCE. The group took the female Asian elephant Jumbo, provided by a zoo in Turin, from France over the Col du Mont Cenis into Italy.

      Don't do your archeology experiments with elephants! Leave the elephants alone!!