10,000 Matching Annotations
  1. Mar 2025
    1. SQL/PGQ reduces the difference in functionality between relational DBMSs and native graph DBMSs. Basically, this new feature makes it easier to query data in tables as if it were in a graph database, providing a possibly more intuitive alternative to writing complex join queries.
    1. Although core memory is obsolete, computer memory is still sometimes called "core" even though it is made of semiconductors, particularly by people who had worked with machines having actual core memory. The files that result from saving the entire contents of memory to disk for inspection, which is nowadays commonly performed automatically when a major error occurs in a computer program, are still called "core dumps". Algorithms which work on more data than the main memory can fit are likewise called out-of-core algorithms. Algorithms which only work inside the main memory are sometimes called in-core algorithms.

      This is how core dump called in history.

    1. It is too complicated (the spec is several hundred pages in a very technical language), so it is hard to use by non-experts—but many non-experts need schemas to describe data formats

      an abomination

    1. John Keats used the phrase only briefly in a private letter to his brothers George and Thomas on 22 December 1817, and it became known only after his correspondence was collected and published. Keats described a conversation he had been engaged in a few days previously:[1] I had not a dispute but a disquisition with Dilke, upon various subjects; several things dove-tailed in my mind, and at once it struck me what quality went to form a Man of Achievement, especially in Literature, and which Shakespeare possessed so enormously—I mean Negative Capability, that is, when a man is capable of being in uncertainties, mysteries, doubts, without any irritable reaching after fact and reason—Coleridge, for instance, would let go by a fine isolated verisimilitude caught from the Penetralium of mystery, from being incapable of remaining content with half-knowledge. This pursued through volumes would perhaps take us no further than this, that with a great poet the sense of Beauty overcomes every other consideration, or rather obliterates all consideration.[2]

      content with half-knowledge! no uneasiness about first-principles...

    1. grain-oriented so it has a square hysteresis loop and much lower core losses, for better performance in transformers

      Wouldn't you not want a hysteresis loop to have a good transformer?

  2. Feb 2025
    1. The Roswell incident is a conspiracy theory that alleges that debris from a United States Army Air Forces balloon (pictured) recovered in 1947 near Roswell, New Mexico, was part of a crashed extraterrestrial spacecraft. The debris was from the top-secret Project Mogul, which used high-altitude balloons to detect nuclear tests. Roswell Army Air Field personnel, unaware of Mogul, gathered the material

      Today wikipedia day

    1. The Scotch yoke (also known as slotted link mechanism[1]) is a reciprocating motion mechanism, converting the linear motion of a slider into rotational motion, or vice versa.

      The piston or other reciprocating part is directly coupled to a sliding yoke with a slot that engages a pin on the rotating part.

      • Comparison of web annotation systems
        • [[Memex]]
          • Desktop
            • UI looks good
            • Live annotations on the site
            • Multiple notes on page
            • AI integration
            • Annotations for videos
          • Mobile
            • Annotations through the app
              • The app seems to keep the integrity of the original content (no content loss)
            • Buggy text input widget
          • Syncing
            • Require Readwise
              • Not bi-directional!
              • Unmodifiable log-based format
        • [[Hypothesis]]
          • Desktop
          • Mobile
            • Bookmarklet is a good option to bypass the need for extension
            • Proxy is also an option
            • Annotations on the original site (no content loss)
            • No annota
          • Syncing
            • Through Readwise
              • Nice format
              • Full control over frontmatter
            • Obsidian plugin
              • No control over frontmatter
        • [[Readwise]]
          • Desktop
            • UI looks old and unmaintained
            • Live annotations on the site
            • Multiple annotation on site can only be achieved by highlights
              • Only single note per page without highlighting
          • Mobile
            • Annotations through the app
              • Some content is lost when importing to the app
            • Text-to-speech
          • Syncing
            • Through Readwise
              • Not bi-directional!
              • Cleaner format then memex
    1. aortic bodies, aortic arch

      Inferior ganglion of vagus nerve

      IFN, expressed from viral detection response, activates intracellular anti viral mechanism pathways, including OSA > Ribonuclease ANK(ANKH)/pyrophosphate. ANKH (ANKYLOSIS, ie ankylosis spondylosis [autoimmune, macular degeneration, arthritis]) is membrane protein changed regulating pyrophosphate levels intra and extra. Pyrophosphate is an anion from converted ATP and is a CALCIUM AND METAL ION CHELATOR (CA+ SIGNALING DYSFUNCTION). IGVN is a high expression site of ANKH:

      • Aortic bodies/arch = happy hypoxia, POTS, tachycardia
      • epiglottitis
      • ear pain, ringing, pigmentation, facial nerve hives, ocular inflammation
      • tonsil swimming, coughing, hoarse
      • SOLITARY NUCLEUS = fear response, anxiety, acrophobia
      • gasping, nausea
      • axial lymph node
      • urinary bladder = frequent urination (as common in CFS)
      • successful results of ganglion block and vagal stimulation

      Google Gemini Clinical Significance: * Damage to the inferior ganglion can result in: * Dysphagia (difficulty swallowing) * Hoarseness * Heart palpitations * Nausea and vomiting * May be involved in certain neurological disorders, such as glossopharyngeal neuralgia and vagus nerve palsy

      ANKH Sites (Wikipedia): * IGVN = above * Tibia = shin splints * Parotid = heavy jaw line * Pons = hypersomnia * right ventricle = enlargement/swelling * Skeletal muscle tissue of biceps brachii = my crazy bicep tendon (spondylosis) pain issue * subthalamic nucleus = hypersomnia, anxiety, fear response, gasping, hydrocephalus * synovial joint = juvenile onset arthritis, myopia/astigmatism, macular degeneration, hydrocephalus * superior vestibular nucleus = see above * Skeletal muscle tissue of rectus abdominis = side stitch

      IFN/OSA/Ribonuclease:

      Destroys all mRNA, viral and host, and prevents cell molecular export and cellular metabolism.

    1. The transformation mapping method is applied to exhibit distinct boundaries between incoming and outgoing data. The data flow diagrams allocate control input, processing and output along three separate modules.
    1. Cremation dates from at least 17,000 years ago[2][3] in the archaeological record, with the Mungo Lady, the remains of a partly cremated body found at Lake Mungo, Australia.

      Seems to be a very common practice in other cultures. some cultures may have practiced cremation longer than the ancient Indians?

    2. In the Middle East and Europe, both burial and cremation are evident in the archaeological record in the Neolithic era.

      Shows us that it was a widespread practice which dates back to times were religion were more important in the process of the dead.

    3. Cremation may serve as a funeral or post-funeral rite and as an alternative to burial. In some countries, including India, Nepal, and Syria, cremation on an open-air pyre is an ancient tradition. Starting in the 19th century, cremation was introduced or reintroduced into other parts of the world.

      We have learned a good amount about this in this class.

    1. Only effect while the token economy is active and no effect once stopped: in this case the token economy is functioning as a prosthesis (like a wheelchair); it does not permanently help the patient once terminated but is necessary to maintain normal functioning;

      Consider this. How many people pay for cure and get a prosthetics? Almost all tragedy tells this story.

    2. Tokens have no intrinsic value, but can be exchanged for other valued reinforcing events: back-up reinforcers, which act as rewards.

      My first thought was crypto currency, but this maps to likes and followers, even money itself. Followers and likes are interesting because they are not single use. £40,000 will get you a nice car, once. But 40,000 followers can get you a brand deal multiple times over. How interesting is that? I guess the trade of is that not everyones followers are equal (some demographics are in more demand than others)

    3. Rewarding behavior could increase the extrinsic motivation and at the same time decrease the intrinsic motivation for activities.

      Think about social media. No wonder sales teams have to constantly be roused up and consume drugs. When the ratio of extrinsic to intrinsic motivation skews too far to the former you end up unfulfilled and materialistic. You can't find the motivation so you set up a "system" of rewards to help you muster up the strength to do basic things - and then, of course, you fail. How else to deal with the discomfort of failure but with more distracting externals.

      But what of motivators like sex and outrage, are those not internal motivators? I suppose they are roused up by externals.

    1. XXI of the constitution contained the transitional provisions. Articles 379 and 394 of Part XXI which contained provisions for provisional parliament and other articles which contained provisions like citizenship, came into force on 26 November 1949, the date on which the constitution was adopted

      these provisions related to functioning of democracy came into force earlier than others

    1. Wikipedia is a free encyclopedia, written collaboratively by the people who use it. Since 2001, it has grown rapidly to become the world's largest reference website, with 6.9 million articles in English attracting billions

      awsedrtfuvyibunjkl

  3. Jan 2025
    1. The use of resolvable IRIs allows RDF documents containing more information to be transcluded which enables clients to discover new data by simply following those links; this principle is known as 'Follow Your Nose'.
    1. A Uniform Resource Identifier (URI), formerly Universal Resource Identifier, is a unique sequence of characters that identifies an abstract or physical resource,[1] such as resources on a webpage, mail address, phone number,[2] books, real-world objects such as people and places, concepts.[3]

      Incoherent concept, just like URL itself

      identity tied to location is no identity whatsoever

      It may e uniform but most certainly not universal

      Let's face it location addressing was just a broken concept at a conceptual level

    1. The Moot was a discussion group concerned with education, social reconstruction, and the role of culture in society.

      Its Mooter than ever

    1. The Disney Renaissance was prompted by competition with Don Bluth's animated productions, along with the evolution of overseas animation, most notably the Studio Ghibli anime productions from Japanese animator Hayao Miyazaki.[16] His Lupin the Third film adaptation of the animated TV series based on the Monkey Punch comics, Castle of Cagliostro (1979), influenced the climax of The Great Mouse Detective, which in turn paved the way for the Disney Renaissance.

      One of the key ingredients of scenius! Competition!!

    1. Ontology is the philosophical study of being. It is traditionally understood as the subdiscipline of metaphysics focused on the most general features of reality.

      Ontology definition

  4. Dec 2024
    1. The Grecian bend was a term applied first to a stooped posture[1] which became fashionable c. 1820,[2] named after the gracefully-inclined figures seen in the art of ancient Greece.

      what on earth

    1. Billy Possum is a type of stuffed toy depicting an opossum. Designed to be the replacement for the Teddy bear after Theodore Roosevelt vacated the office of President of the United States in 1909, the toy's popularity waned quickly, with the trend having lost all momentum by Christmas of that year.

      We were robbed of greatness.

    1. converges uniformly with limit f : E → X if and only if

      For functions whose range is uniform space, the function then thus be defined as uniform space: $$ (f_1 \times f_2) (X) \subseteq U $$ Where \(U\) is entourage. We can apply Moore-Osgood Theorem to such function \( f(x, y) \) if \(f_x \rightrightarrows f\)

    1. Thinking, Fast and Slow is a 2011 popular science book by psychologist Daniel Kahneman. The book's main thesis is a differentiation between two modes of thought: "System 1" is fast, instinctive and emotional; "System 2" is slower, more deliberative, and more logical.

      for - similar to - - Daniel Kahnaman's system 1 fast, instinctive, emotional and system 2 slow, deliberative, logical is similar to - Ian McGilhirist's left brain, right brain

    1. Here's what ChatGPT shown me as summary of their Privacy policy: Analytics and Third-Party Services They use third-party analytics tools (e.g., Google Analytics) to understand how users interact with their services. These tools may collect anonymized or aggregated data, such as IP addresses or browsing behavior, but not personally identifiable information unless you've explicitly consented. Cookies and Tracking: Their cookies track usage patterns on their platform, which could include data about visited pages, clicks, or time spent on the site. However, this data is anonymized unless tied to your account or explicitly authorized.

      ^^ let's just trust em, right? or no? Ping me if that ended up being a no-no as I decide to continue using the app.

    1. a wild man created by the gods to stop Gilgamesh from oppressing the people of Uruk. After Enkidu becomes civilized through sexual initiation with Shamhat, he travels to Uruk, where he challenges Gilgamesh to a test of strength.

      the gender dynamics emerge with Gilgamesh's relationships with Enkidu, once he has his relations with Shamhat, there's a dichotomy between masculinity and feminity which is characterised by sexual seduction plus the ability to "tame" a "wild" man. which gives me the image that the gender roles here are tied to the feminine playing a role in bringing men into social and moral order.

    1. Trust Service Criteria Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    2. Trust Service Criteria[edit] Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC. Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy. Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed. SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1] Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication

      Trust Service Criteria Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    3. Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    4. Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC. Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy. Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed. SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1] Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

      Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    5. System and Organization Controls (SOC; also sometimes referred to as service organizations controls) as defined by the American Institute of Certified Public Accountants (AICPA), is the name of a suite of reports produced during an audit. It is intended for use by service organizations (organizations that provide information systems as a service to other organizations) to issue validated reports of internal controls over those information systems to the users of those services. The reports focus on controls grouped into five categories called Trust Service Criteria.[1] The Trust Services Criteria were established by The AICPA through its Assurance Services Executive Committee (ASEC) in 2017 (2017 TSC). These control criteria are to be used by the practitioner/examiner (Certified Public Accountant, CPA) in attestation or consulting engagements to evaluate and report on controls of information systems offered as a service. The engagements can be done on an entity wide, subsidiary, division, operating unit, product line or functional area basis. The Trust Services Criteria were modeled in conformity to The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control - Integrated Framework (COSO Framework). In addition, the Trust Services Criteria can be mapped to NIST SP 800 - 53 criteria and to EU General Data Protection Regulation (GDPR) Articles. The AICPA auditing standard Statement on Standards for Attestation Engagements no. 18 (SSAE 18), section 320, "Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting", defines two levels of reporting, type 1 and type 2. Additional AICPA guidance materials specify three types of reporting: SOC 1, SOC 2, and SOC 3.

      System and Organization Controls (SOC; also sometimes referred to as service organizations controls) as defined by the American Institute of Certified Public Accountants (AICPA), is the name of a suite of reports produced during an audit. It is intended for use by service organizations (organizations that provide information systems as a service to other organizations) to issue validated reports of internal controls over those information systems to the users of those services. The reports focus on controls grouped into five categories called Trust Service Criteria.[1] The Trust Services Criteria were established by The AICPA through its Assurance Services Executive Committee (ASEC) in 2017 (2017 TSC). These control criteria are to be used by the practitioner/examiner (Certified Public Accountant, CPA) in attestation or consulting engagements to evaluate and report on controls of information systems offered as a service. The engagements can be done on an entity wide, subsidiary, division, operating unit, product line or functional area basis. The Trust Services Criteria were modeled in conformity to The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control - Integrated Framework (COSO Framework). In addition, the Trust Services Criteria can be mapped to NIST SP 800 - 53 criteria and to EU General Data Protection Regulation (GDPR) Articles. The AICPA auditing standard Statement on Standards for Attestation Engagements no. 18 (SSAE 18), section 320, "Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting", defines two levels of reporting, type 1 and type 2. Additional AICPA guidance materials specify three types of reporting: SOC 1, SOC 2, and SOC 3.

    1. "self-replicating programs", "self-reproducing programs", and "self-copying programs".

      It is not self-replication that is the goal but self-creation

    1. In hell, those punished are Christians who have erred. While some usual sins such as usury, adultery, and women having sex before marriage are condemned, the Apocalypse of Paul goes beyond this. Various "bad" Christians are made to stand in a river of fire, including Christians who left the church and argued; Christians who took the Eucharist but then fornicated; and Christians who "slandered" other Christians while in church. Christians who did not trust in the Lord are buried in deep pits. Christians who failed to pay attention as the word of God was read in Church are forced to gnaw on their tongues eternally. Christians who commit infanticide are torn to shreds by beasts eternally while also on fire. Church leaders and theologians who preached incorrect doctrine or were simply incompetent in their positions are punished with torture. For example, a church reader who failed to implement the word of God he read during church services in his own life is thrown into a river of fire while an angel slashes his lips and tongue with a razor. Unholy nuns are thrown into a furnace of fire along with a bishop as punishment (in one Latin manuscript, likely a later addition). Failed ascetics are also punished; those who ended their fasts before their appointed time are taunted by abundant food and water just out of reach as they lie parched and starving in hell. Those who wore the habit of a monk or nun while failing to show charity are given new habits of pitch and sulphur, serpents are wrapped around their necks, and fiery angels physically beat them. The worst punishments ("seven times worse" than those described so far) are reserved for theologically deviant Christians, such as those who believe that Jesus's Second Coming will be a "spiritual" resurrection rather than a "physical" resurrection, or who deny that Jesus came in the flesh (docetism). The exact nature of their punishment is left to the imagination; an awful stench rises from a sealed well that hints of their torment below.[6] One theological oddity is that the text portrays Christians, the angels, and Paul as more merciful than God. Paul expresses pity for those suffering in Hell, but Jesus rebukes him and says that everyone in Hell truly deserves their punishment. The Archangel Michael says he prays continuously for Christians while they are alive, and weeps for the torments the failed Christians endure after it is too late. The twenty-four elders on thrones (presumably the 12 apostles and the 12 patriarchs) as well as the four beasts described in God's throne room in the Book of Revelation also make intercession for the inhabitants of hell. The Christian friends and family of those in Hell also make prayers for the dead that their suffering might be lessened. In responses to the pleas of Paul (or the Virgin Mary in the Apocalypse of the Virgin), Michael, the elders, and the living Christians on Earth, Jesus agrees to release those in hell from their suffering on the day of his resurrection—presumably every Sunday. Manuscripts include variants of the ending: A Coptic manuscript instead describes it as specifically Easter, albeit with a 50-day period afterward, possibly in addition to the Sunday off; the Greek Apocalypse of the Virgin specifically excludes damned Jews from this mercy; and an Armenian manuscript has all sinners released from hell unconditionally.[6][8][4]

      In hell, those punished are Christians who have erred. While some usual sins such as usury, adultery, and women having sex before marriage are condemned, the Apocalypse of Paul goes beyond this. Various "bad" Christians are made to stand in a river of fire, including Christians who left the church and argued; Christians who took the Eucharist but then fornicated; and Christians who "slandered" other Christians while in church. Christians who did not trust in the Lord are buried in deep pits. Christians who failed to pay attention as the word of God was read in Church are forced to gnaw on their tongues eternally. Christians who commit infanticide are torn to shreds by beasts eternally while also on fire. Church leaders and theologians who preached incorrect doctrine or were simply incompetent in their positions are punished with torture. For example, a church reader who failed to implement the word of God he read during church services in his own life is thrown into a river of fire while an angel slashes his lips and tongue with a razor. Unholy nuns are thrown into a furnace of fire along with a bishop as punishment (in one Latin manuscript, likely a later addition). Failed ascetics are also punished; those who ended their fasts before their appointed time are taunted by abundant food and water just out of reach as they lie parched and starving in hell. Those who wore the habit of a monk or nun while failing to show charity are given new habits of pitch and sulphur, serpents are wrapped around their necks, and fiery angels physically beat them. The worst punishments ("seven times worse" than those described so far) are reserved for theologically deviant Christians, such as those who believe that Jesus's Second Coming will be a "spiritual" resurrection rather than a "physical" resurrection, or who deny that Jesus came in the flesh (docetism). The exact nature of their punishment is left to the imagination; an awful stench rises from a sealed well that hints of their torment below.[6]

      One theological oddity is that the text portrays Christians, the angels, and Paul as more merciful than God. Paul expresses pity for those suffering in Hell, but Jesus rebukes him and says that everyone in Hell truly deserves their punishment. The Archangel Michael says he prays continuously for Christians while they are alive, and weeps for the torments the failed Christians endure after it is too late. The twenty-four elders on thrones (presumably the 12 apostles and the 12 patriarchs) as well as the four beasts described in God's throne room in the Book of Revelation also make intercession for the inhabitants of hell. The Christian friends and family of those in Hell also make prayers for the dead that their suffering might be lessened. In responses to the pleas of Paul (or the Virgin Mary in the Apocalypse of the Virgin), Michael, the elders, and the living Christians on Earth, Jesus agrees to release those in hell from their suffering on the day of his resurrection—presumably every Sunday. Manuscripts include variants of the ending: A Coptic manuscript instead describes it as specifically Easter, albeit with a 50-day period afterward, possibly in addition to the Sunday off; the Greek Apocalypse of the Virgin specifically excludes damned Jews from this mercy; and an Armenian manuscript has all sinners released from hell unconditionally.[6][8][4]

    1. After an initial ascension, Beatrice guides Dante through the nine celestial spheres of Heaven. These are concentric and spherical, as in Aristotelian and Ptolemaic cosmology. While the structures of the Inferno and Purgatorio were based on different classifications of sin, the structure of the Paradiso is based on the four cardinal virtues and the three theological virtues. The seven lowest spheres of Heaven deal solely with the cardinal virtues of Prudence, Fortitude, Justice and Temperance. The first three spheres involve a deficiency of one of the cardinal virtues – the Moon, containing the inconstant, whose vows to God waned as the moon and thus lack fortitude; Mercury, containing the ambitious, who were virtuous for glory and thus lacked justice; and Venus, containing the lovers, whose love was directed towards another than God and thus lacked temperance. The final four incidentally are positive examples of the cardinal virtues, all led on by the Sun, containing the prudent, whose wisdom lighted the way for the other virtues, to which the others are bound (constituting a category on its own). Mars contains the men of fortitude who died in the cause of Christianity; Jupiter contains the kings of justice; and Saturn contains the temperate, the monks. The seven subdivided into three are raised further by two more categories: the eighth sphere of the fixed stars that contain those who achieved the theological virtues of faith, hope, and love, and represent the Church Triumphant – the total perfection of humanity, cleansed of all the sins and carrying all the virtues of heaven; and the ninth circle, or Primum Mobile (corresponding to the geocentricism of medieval astronomy), which contains the angels, creatures never poisoned by original sin. Topping them all is the Empyrean, which contains the essence of God, completing the nine-fold division to ten. Dante meets and converses with several great saints of the Church, including Thomas Aquinas, Bonaventure, Saint Peter, and St. John. Near the end, Beatrice departs and Bernard of Clairvaux takes over as the guide.[29] The Paradiso is more theological in nature than the Inferno and the Purgatorio. However, Dante admits that the vision of heaven he receives is merely the one his human eyes permit him to see, and thus Dante's personal vision. The Divine Comedy finishes with Dante seeing the Triune God. In a flash of understanding that he cannot express, Dante finally understands the mystery of Christ's divinity and humanity, and his soul becomes aligned with God's love:[30] But already my desire and my will were being turned like a wheel, all at one speed, by the Love which moves the sun and the other stars.[31]

      After an initial ascension, Beatrice guides Dante through the nine celestial spheres of Heaven. These are concentric and spherical, as in Aristotelian and Ptolemaic cosmology. While the structures of the Inferno and Purgatorio were based on different classifications of sin, the structure of the Paradiso is based on the four cardinal virtues and the three theological virtues.

      The seven lowest spheres of Heaven deal solely with the cardinal virtues of Prudence, Fortitude, Justice and Temperance. The first three spheres involve a deficiency of one of the cardinal virtues – the Moon, containing the inconstant, whose vows to God waned as the moon and thus lack fortitude; Mercury, containing the ambitious, who were virtuous for glory and thus lacked justice; and Venus, containing the lovers, whose love was directed towards another than God and thus lacked temperance. The final four incidentally are positive examples of the cardinal virtues, all led on by the Sun, containing the prudent, whose wisdom lighted the way for the other virtues, to which the others are bound (constituting a category on its own). Mars contains the men of fortitude who died in the cause of Christianity; Jupiter contains the kings of justice; and Saturn contains the temperate, the monks. The seven subdivided into three are raised further by two more categories: the eighth sphere of the fixed stars that contain those who achieved the theological virtues of faith, hope, and love, and represent the Church Triumphant – the total perfection of humanity, cleansed of all the sins and carrying all the virtues of heaven; and the ninth circle, or Primum Mobile (corresponding to the geocentricism of medieval astronomy), which contains the angels, creatures never poisoned by original sin. Topping them all is the Empyrean, which contains the essence of God, completing the nine-fold division to ten.

      Dante meets and converses with several great saints of the Church, including Thomas Aquinas, Bonaventure, Saint Peter, and St. John. Near the end, Beatrice departs and Bernard of Clairvaux takes over as the guide.[29] The Paradiso is more theological in nature than the Inferno and the Purgatorio. However, Dante admits that the vision of heaven he receives is merely the one his human eyes permit him to see, and thus Dante's personal vision.

      The Divine Comedy finishes with Dante seeing the Triune God. In a flash of understanding that he cannot express, Dante finally understands the mystery of Christ's divinity and humanity, and his soul becomes aligned with God's love:[30]

      But already my desire and my will were being turned like a wheel, all at one speed, by the Love which moves the sun and the other stars.[31]

    2. The Divine Comedy is composed of 14,233 lines that are divided into three cantiche (singular cantica) – Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Paradise) – each consisting of 33 cantos (Italian plural canti). An initial canto, serving as an introduction to the poem and generally considered to be part of the first cantica, brings the total number of cantos to 100. It is generally accepted, however, that the first two cantos serve as a unitary prologue to the entire epic, and that the opening two cantos of each cantica serve as prologues to each of the three cantiche.[7][8][9] The number three is prominent in the work, represented in part by the number of cantiche and their lengths. Additionally, the verse scheme used, terza rima, is hendecasyllabic (lines of eleven syllables), with the lines composing tercets according to the rhyme scheme ABA BCB CDC DED ...[10] The total number of syllables in each tercet is thus 33, the same as the number of cantos in each cantica. Written in the first person, the poem tells of Dante's journey through the three realms of the dead, lasting from the night before Good Friday to the Wednesday after Easter in the spring of 1300. The Roman poet Virgil guides him through Hell and Purgatory; Beatrice, Dante's ideal woman, guides him through Heaven.[11] Beatrice was a Florentine woman he had met in childhood and admired from afar in the mode of the then-fashionable courtly love tradition, which is highlighted in Dante's earlier work La Vita Nuova.[12] The Cistercian abbot Bernard of Clairvaux guides Dante through the last three cantos.[13] .mw-parser-output .tmulti .multiimageinner{display:flex;flex-direction:column}.mw-parser-output .tmulti .trow{display:flex;flex-direction:row;clear:left;flex-wrap:wrap;width:100%;box-sizing:border-box}.mw-parser-output .tmulti .tsingle{margin:1px;float:left}.mw-parser-output .tmulti .theader{clear:both;font-weight:bold;text-align:center;align-self:center;background-color:transparent;width:100%}.mw-parser-output .tmulti .thumbcaption{background-color:transparent}.mw-parser-output .tmulti .text-align-left{text-align:left}.mw-parser-output .tmulti .text-align-right{text-align:right}.mw-parser-output .tmulti .text-align-center{text-align:center}@media all and (max-width:720px){.mw-parser-output .tmulti .thumbinner{width:100%!important;box-sizing:border-box;max-width:none!important;align-items:center}.mw-parser-output .tmulti .trow{justify-content:center}.mw-parser-output .tmulti .tsingle{float:none!important;max-width:100%!important;box-sizing:border-box;text-align:center}.mw-parser-output .tmulti .tsingle .thumbcaption{text-align:left}.mw-parser-output .tmulti .trow>.thumbcaption{text-align:center}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .tmulti .multiimageinner img{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .tmulti .multiimageinner img{background-color:white}}Dante's guides in the poemVirgilBeatriceSaint Bernard The structure of the three realms follows a common numerical pattern of 9 plus 1, for a total of 10. There are nine circles of the Inferno, followed by Lucifer contained at its bottom; nine rings of Mount Purgatory, followed by the Garden of Eden crowning its summit; and the nine celestial bodies of Paradiso, followed by the Empyrean containing the very essence of God. Within each group of nine, seven elements correspond to a specific moral scheme, subdivided into three subcategories, while two others of greater particularity are added to total nine. For example, the seven deadly sins that are cleansed in Purgatory are joined by special realms for the late repentant and the excommunicated. The core seven sins within Purgatory correspond to a moral scheme of love perverted, subdivided into three groups corresponding to excessive love (Lust, Gluttony, Greed), deficient love (Sloth), and malicious love (Wrath, Envy, Pride).[14] In central Italy's political struggle between Guelphs and Ghibellines, Dante was part of the Guelphs, who in general favoured the papacy over the Holy Roman Emperor. Florence's Guelphs split into factions around 1300 – the White Guelphs and the Black Guelphs. Dante was among the White Guelphs who were exiled in 1302 by the Lord-Mayor Cante de' Gabrielli di Gubbio, after troops under Charles of Valois entered the city, at the request of Pope Boniface VIII, who supported the Black Guelphs. This exile, which lasted the rest of Dante's life, shows its influence in many parts of the Comedy, from prophecies of Dante's exile to Dante's views of politics, to the eternal damnation of some of his opponents.[15] The last word in each of the three cantiche is stelle ("stars").

      The Divine Comedy is composed of 14,233 lines that are divided into three cantiche (singular cantica) – Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Paradise) – each consisting of 33 cantos (Italian plural canti). An initial canto, serving as an introduction to the poem and generally considered to be part of the first cantica, brings the total number of cantos to 100. It is generally accepted, however, that the first two cantos serve as a unitary prologue to the entire epic, and that the opening two cantos of each cantica serve as prologues to each of the three cantiche.[7][8][9]

      The number three is prominent in the work, represented in part by the number of cantiche and their lengths. Additionally, the verse scheme used, terza rima, is hendecasyllabic (lines of eleven syllables), with the lines composing tercets according to the rhyme scheme ABA BCB CDC DED ...[10] The total number of syllables in each tercet is thus 33, the same as the number of cantos in each cantica.

      Written in the first person, the poem tells of Dante's journey through the three realms of the dead, lasting from the night before Good Friday to the Wednesday after Easter in the spring of 1300. The Roman poet Virgil guides him through Hell and Purgatory; Beatrice, Dante's ideal woman, guides him through Heaven.[11] Beatrice was a Florentine woman he had met in childhood and admired from afar in the mode of the then-fashionable courtly love tradition, which is highlighted in Dante's earlier work La Vita Nuova.[12] The Cistercian abbot Bernard of Clairvaux guides Dante through the last three cantos.[13]

      Dante's guides in the poem Virgil Virgil

      Beatrice

      Saint Bernard The structure of the three realms follows a common numerical pattern of 9 plus 1, for a total of 10. There are nine circles of the Inferno, followed by Lucifer contained at its bottom; nine rings of Mount Purgatory, followed by the Garden of Eden crowning its summit; and the nine celestial bodies of Paradiso, followed by the Empyrean containing the very essence of God. Within each group of nine, seven elements correspond to a specific moral scheme, subdivided into three subcategories, while two others of greater particularity are added to total nine. For example, the seven deadly sins that are cleansed in Purgatory are joined by special realms for the late repentant and the excommunicated. The core seven sins within Purgatory correspond to a moral scheme of love perverted, subdivided into three groups corresponding to excessive love (Lust, Gluttony, Greed), deficient love (Sloth), and malicious love (Wrath, Envy, Pride).[14]

      In central Italy's political struggle between Guelphs and Ghibellines, Dante was part of the Guelphs, who in general favoured the papacy over the Holy Roman Emperor. Florence's Guelphs split into factions around 1300 – the White Guelphs and the Black Guelphs. Dante was among the White Guelphs who were exiled in 1302 by the Lord-Mayor Cante de' Gabrielli di Gubbio, after troops under Charles of Valois entered the city, at the request of Pope Boniface VIII, who supported the Black Guelphs. This exile, which lasted the rest of Dante's life, shows its influence in many parts of the Comedy, from prophecies of Dante's exile to Dante's views of politics, to the eternal damnation of some of his opponents.[15]

      The last word in each of the three cantiche is stelle ("stars").

    1. Melanin may also be able to help the fungus metabolize radiation, but more evidence and research is still needed.[1]

      Would be interesting to see hypotheses as to the mechanism in which energy could be harvested by melanin and any experiments that could test it?

    1. Panentheism (/pæˈnɛnθiɪzəm/;[1] "all in God", from the Greek πᾶν, pân, 'all', ἐν, en, 'in' and Θεός, Theós, 'God')[2] is the belief that the divine intersects every part of the universe and also extends beyond space and time.

      penentheism

      al in god

    1. Get out of here with your crazy ideas." Nelson took this as permission to develop the idea independently.

      crazy ideas develop independently

    1. To become conscious of their gains from slavery, segregation, and voter suppression would shatter that Dream.

      people experiencing racism, sexism, violence cannot drink the koolaid. but are there enough of them for revolution?

    2. He contrasts these experiences with neat suburban life, which he calls "the Dream" because it is an exclusionary fantasy for White people who are enabled by, yet largely ignorant of, their history of privilege and suppression

      how can you have both of these completely seperate groups, living in the same nation, where all their votes are equal? how can a society encompass all of them equally?

    3. Coates's position is that absent the religious rhetoric of "hope and dreams and faith and progress," only systems of White supremacy remain along with no real evidence that those systems are bound to change.[

      is religion the koolaid? kammas kammas says religion creates better citizens is religion both a pacifying agent and an agent that works agasint the state?

    1. British engineer John Hoyte led an expedition that tried to reenact aspects of Hannibal's crossing of the Alps during the Second Punic War in 218 BCE. The group took the female Asian elephant Jumbo, provided by a zoo in Turin, from France over the Col du Mont Cenis into Italy.

      Don't do your archeology experiments with elephants! Leave the elephants alone!!

    1. At the opening of the play Aphrodite, Goddess of love, explains that Hippolytus has sworn chastity and refuses to revere her. Instead, he honours the Goddess of the hunt, Artemis. This has led Aphrodite to initiate a plan of vengeance on Hippolytus. When Hippolytus went to Athens two years previously Aphrodite caused Phaedra to fall in love with him. Hippolytus appears with his followers and shows reverence to a statue of Artemis, a chaste goddess. A servant warns him about slighting Aphrodite, but Hippolytus refuses to listen. The chorus, consisting of young married women of Troezen, enters and describes how Theseus's wife, Phaedra, has not eaten or slept in three days. Phaedra, sickly, appears with her nurse. After an agonizing discussion, Phaedra finally confesses why she is ill: she loves Hippolytus. The nurse and the chorus are shocked. Phaedra explains that she must starve herself and die with her honour intact and to save Theseus from shame. However, the nurse quickly retracts her initial response and tells Phaedra that she has a magical charm to cure her. However, in an aside she reveals different plans. The nurse, after making Hippolytus swear not to tell anyone, informs Hippolytus of Phaedra's desire and suggests that Hippolytus consider yielding to her. He reacts with a furious tirade and threatens to tell his father, Theseus, everything as soon as he arrives. Phaedra realizes disaster has fallen. After making the chorus swear secrecy, she goes inside and hangs herself. Theseus returns and discovers his wife's dead body. Because the chorus is sworn to secrecy, they cannot tell Theseus why she killed herself. Theseus discovers a letter on Phaedra's body, which falsely asserts that she was raped by Hippolytus. Enraged, Theseus curses his son either to death or at least exile. To execute the curse, Theseus calls upon his father, the god Poseidon, who has promised to grant his son three wishes. Hippolytus enters and protests his innocence but cannot tell the truth because of the binding oath that he swore. Taking Phaedra's letter as proof, Hippolytus proudly defends his innocence, saying that he has never looked at any woman with sexual desire. Theseus does not believe his son and still exiles him. As Hippolytus is departing he swears that if he is lying then Zeus should strike him down on the spot. The chorus sings a lament for Hippolytus. A messenger enters and describes a gruesome scene to Theseus; as Hippolytus got in his chariot to leave the kingdom, a bull roared out of the sea, frightening his horses, which dashed his chariot among the rocks, dragging Hippolytus behind. Hippolytus seems to be dying. The messenger protests Hippolytus' innocence, but Theseus refuses to believe him. Theseus is glad that Hippolytus is suffering and about to die. But then the goddess, Artemis, appears and rages at Theseus for killing his own son. She brutally tells him the truth and that Aphrodite was behind all their suffering, because she felt disrespected by Hippolytus's pride in his chastity. Artemis states that there was no rape, Phaedra had lied, and Theseus' son is innocent. Theseus is devastated by this revelation. Hippolytus is carried in physically battered and barely clinging to life. In the last moments of the play, Hippolytus forgives his father, kind words are exchanged between father and son, and then Hippolytus dies. Theseus is then left living to dwell on the fact that he killed his beloved son. Interpretations[edit] In this play, all characters, humans and gods, have blindnesses that prevent them from understanding others, and these blindnesses combine to result in tragedy. The clash between Phaedra and Hippolytus is a conflict between what is repugnant and depraved — a woman sexually desiring her step son–and what is inhuman and arrogant–a young man that finds sexuality repellant. Hippolytus is possessed by a desire for purity, which is represented by the goddess Artemis. Hippolytus describes the goddess' purifying power in terms of the ancient Greek concept of sophrosyne, which is translated in the script variously as the situation requires–"wisdom, chastity, moderation, character". This play illustrates that it is not possible for a person to be sophron and also a devotee of Aphrodite.[3] Scholar Rachel Bruzzone argued in 2012 that Pygmalion in Book X of Ovid's Metamorphoses and Hippolytus share certain characteristics. The main antagonist of both stories is Aphrodite, who seeks revenge on both for insulting her by remaining virgins. They are also both obsessed with remaining pure. Both are misogynistic with Hippolytus believing that women are morally corrupt and will ruin his pureness. Pygmalion believes the same in that women are just lust-filled creatures that will ruin his pureness.

      This play is another example of a woman causing a tragedy because of her emotions. Hippolytus, the "pure" hero, reveres Artemis instead of Aphrodite and swears chastity. Aphrodite wants revenge and causes Phaedra to yearn for Hippolytus. Hippolytus refuses her advances and she kills herself. Hippolytus is then accused of raping her, turning his own father against him. False allegations are once again made by a woman. Hippolytus denies the accusations, but cannot tell what really happened because of his oath of secrecy. Theseus curses Hippolytus, causing Hippolytus's death. Hippolytus dies because of his righteousness; he does not break his oath. Neither Phaedra nor Hippolytus would have died if the "vengeful" Aphrodite did not cause Phaedra to fall for Hippolytus.

    1. However, Siyâvash repeatedly rejects her advances and also strikes down her suggestion to kill his father so that they can rule together. Fearing that he might inform the Shah and have her executed, Sudabeh falsely accuses Siyâvash of raping her.

      I find a bit of a pattern with many stories and the main character being accused of rape. It's also terrible that his father seems to be so quick to believe the accusation, and then when he proves himself innocent, their relationship grows weak. Sadly though, this still happens today in our world and not many have the fortune to be proven innocent, such as Siyavash was.

    2. Owing to his birth to a non-aristocratic mother, Siyâvash is sent away by his father to Zabulistan, where he is raised by the holy warrior Rostam to be well-versed in the arts of war. He returns as a highly skilled and handsome young man, and is granted entry to the royal court as a prince and the new ruler of Ctesiphon. Shortly thereafter, he meets his

      I find it messed up that he was sent away, was it for money? I like how he comes back better than ever and is given the title of a prince. Its weird that his step mother "lusts" over him though.

  5. Nov 2024
    1. This article is about Homer's epic poem.

      The use of the word epic to describe this piece of literary work is a perfect example on how to use the word. I don't think it is appropriate to use epic to describe a concert performance or a TV show.

    1. Natural resources are resources that are drawn from nature and used with few modifications. This includes the sources of valued characteristics such as commercial and industrial use, aesthetic value, scientific interest, and cultural value. On Earth, it includes sunlight, atmosphere, water, land, all minerals along with all vegetation, and wildlife.[1][2][3][4] Natural resources are part of humanity's natural heritage or protected in nature reserves. Particular areas (such as the rainforest in Fatu-Hiva) often feature biodiversity and geodiversity in their ecosystems. Natural resources may be classified in different ways. Natural resources are materials and components (something that can be used) found within the environment. Every man-made product is composed of natural resources (at its fundamental level).

      Natural Resource Definition

    1. Co-founder Jackson Palmer left the cryptocurrency community in 2015 and has no plans to return, having come to the belief that cryptocurrency, originally conceived as a libertarian alternative to money, is fundamentally exploitative and built to enrich its top proponents. His co-founder, Billy Markus, agreed that Palmer's position was generally valid.[26]

      LMAO. LMAO.

    1. 13 counties 3 cities 6 special municipalities

      Special municipalities Counties Cities Kaohsiung City New Taipei City Taichung City Tainan City Taipei City Taoyuan City Changhua County Chiayi County Hsinchu County Hualien County Miaoli County Nantou County Pingtung County Taitung County Yilan County Yunlin County Chiayi City Hsinchu City Keelung City